61
Menu
Recent Topics
Who's Online
Site Stats
Site Staff
Burke Knight Administrator |
|
DeadMan Global Moderator |
Thoughts, Comments & Suggestions.
This chatbox is used on all BurkeKnight Entertainment sites.
Please Follow The Rules! | Setting up ChatBox profile.
Please Follow The Rules! | Setting up ChatBox profile.
62
Laugh Lounge / Best. Septic Truck. Ever.
Last post by Burke Knight -63
Introductions and Leaves of Absences / ⓈⓒⓞⓣⓣⒿⒷ❾❷❼❻
Last post by ScottJB9276 -I've got a blog and have hosting through All Points.
I'm going to be doing some trying out on different things, so hopefully I can make up a few more sites.
64
Forums / Up-Down Mobile Buttons
Last post by Burke Knight -In block, or template file:
Code: (ADD) [Select]
<div class="webestools"><div id="navigation_up_down_4137"><noscript>Javascript is disable - <a href="https://www.webestools.com/">https://www.webestools.com/</a> - <a href="http://www.webestools.com/navigation-buttons-generator-scroll-top-bottom-shortcut-page-up-down-scroll-buttons-javascript.html">Navigation Buttons Generator</a></noscript><script type="text/javascript" src="https://services.webestools.com/navigation_up_down/4-4137-right.js"></script></div></div>
In custom.css:
Code: (ADD) [Select]
/* hide mobile version by default */
.webestools {
display: none;
}
/* when screen is less than 500px wide
show mobile version navigation */
@media (max-width: 500px) {
.webestools {
display: block;
}
}
65
General Discussion / Re: GoDaddy: Hackers stole source code, installed malware in multi-year breach
Last post by Burke Knight -https://en.wikipedia.org/wiki/List_of_controversies_involving_GoDaddy
66
General Discussion / GoDaddy: Hackers stole source code, installed malware in multi-year breach
Last post by Burke Knight -Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.
While GoDaddy discovered the security breach in early December 2022 following customer reports that their sites were being used to redirect to random domains, the attackers had access to the company's network for multiple years.
"Based on our investigation, we believe these incidents are part of a multi-year campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy," the hosting firm said in an SEC filing.
The company says that previous breaches disclosed in November 2021 and March 2020 are also linked to this multi-year campaign.
The November 2021 incident led to a data breach affecting 1.2 million Managed WordPress customers after attackers breached GoDaddy's WordPress hosting environment using a compromised password.
They gained access to the email addresses of all impacted customers, their WordPress Admin passwords, sFTP and database credentials, and SSL private keys of a subset of active clients.
After the March 2020 breach, GoDaddy alerted 28,000 customers that an attacker used their web hosting account credentials in October 2019 to connect to their hosting account via SSH.
GoDaddy is now working with external cybersecurity forensics experts and law enforcement agencies worldwide as part of an ongoing investigation into the root cause of the breach.
Links to attacks targeting other hosting companies
GoDaddy says it also found additional evidence linking the threat actors to a broader campaign targeting other hosting companies worldwide over the years.
"We have evidence, and law enforcement has confirmed, that this incident was carried out by a sophisticated and organized group targeting hosting services like GoDaddy," the hosting company said in a statement.
"According to information we have received, their apparent goal is to infect websites and servers with malware for phishing campaigns, malware distribution and other malicious activities."
GoDaddy is one of the largest domain registrars, and it also provides hosting services to over 20 million customers worldwide.
Source: Bleeping Computer
67
Forums / ElkArte - Title Fix
Last post by Burke Knight -Example: Forum Title - Board Title
index.template.php
Code: (FIND) [Select]
<title>', $context['page_title_html_safe'], '</title>
Code: (REPLACE) [Select]
<title>', $context['forum_name_html_safe'], ' - ', $context['page_title_html_safe'], '</title>
index.english.php
Code: (FIND) [Select]
$txt['forum_index'] = '%1$s';
Code: (REPLACE) [Select]
$txt['forum_index'] = 'SITE SLOGAN';
Perfect spot to make sure your site slogan is in board index title.
68
Forums / ElkArte - Separation Theme - Header Gap Fix
Last post by Burke Knight -Code: (FIND) [Select]
/* The logo and slogan. */
#header {
height: 150px;
padding: 16px 2px 0;
}
Code: (REPLACE) [Select]
/* The logo and slogan. */
#header {
padding: 16px 2px 0;
}
69
Forums / ElkArte - Board Index Remake
Last post by Burke Knight -GenericBoards.Template.php
Code: (FIND) [Select]
// Show some basic information about the number of posts, etc.
echo '
</div>
Code: (REPLACE) [Select]
// Show some basic information about the number of posts, etc.
echo '
</div><hr />
Code: (FIND) [Select]
';
}
}
echo '
</ul>';
Code: (REPLACE) [Select]
';
}
echo '
<br />';
}
echo '
</ul>';
BoardsList.class.php
Code: (FIND) [Select]
$this_last_post['link'] = '<a href="' . $this_last_post['href'] . '" title="' . Util::htmlspecialchars($row_board['subject']). '">' . $row_board['short_subject'] . '</a>';
Code: (REPLACE) [Select]
$this_last_post['link'] = '<a href="' . $this_last_post['href'] . '" title="' . Util::htmlspecialchars($row_board['subject']). '">' . $row_board['subject'] . '</a>';
custom.css
Code: ("ADD AT BOTTOM") [Select]
.forum_category {
background: transparent !important;
box-shadow: none !important;
}
.board_latest {
border-left-color: transparent !important;
}
70
Forums / ElkArte - Board Images instead of names
Last post by Burke Knight -You'll need to name the images to the board ID number.
Image for board ID#1 would be 1.png
GenericBoards.template.php
Code: (FIND) [Select]
<h3 class="board_name">
<a', $board['is_redirect'] ? ' target="_blank"' : '', ' href="', $board['href'], '" id="b', $board['id'], '">', $board['name'], '</a>';
Code: (REPLACE) [Select]
<h3 class="board_name">
<a', $board['is_redirect'] ? ' target="_blank"' : '', ' href="', $board['href'], '" id="b', $board['id'], '"><img src="https://www.domain.tld/images/', $board['id'], '.png" title="', $board['name'], '" /></a>';
Of course, replace the img src URL with where you have the images stored.