Blog

Blog/

How to clean your website infected with Malware

If Google detects that your site has been compromised, Google will tell you about it in Webmaster Tools (to ensure that you’re notified quickly, you can have your Message Center messages forwarded to your email account). If the hacker inserted malware into your site, Google also identify your site as infected in our search results to protect other users.If your site has been hacked or infected with malware, you should act quickly to repair the damage. Google recommends reviewing therecommendations provided by the organization antiphishing.org.

Whatever your platform or type of infection, Google recommends the following steps:

[faq title=”” open1st=”0″ openAll=”0″]

[faq_item title=”Quarantine your site” number=”1″]

It’s extremely important that you take action to prevent your site from infecting others and to prevent hackers from further abusing the system.

  • Take your site down immediately. It’s extremely important that you take action to prevent your site from infecting others.
  • Contact your web hoster. If the attack affects other sites they host, they may already be taking steps to address the problem.
  • Change the passwords for all users and all accounts (for example, FTP access, administrator account, content management system authoring accounts). Check your users: It’s possible that the hacker created one or more new accounts. Password guidelines.

If you have access to your server, Google recommends configuring it to return a 503 status code. Taking your site offline is better than using robots.txt to prevent it from being crawled.

[/faq_item]

[faq_item title=”Assess the damage” number=”2″]

Once you’ve locked down your site, you’ll need to identify the scope and scale of the damage that’s been caused. Google recommends the following steps:

  • Visit the Google SafeBrowsing diagnostics page for your site (http://www.google.com/safebrowsing/diagnostic?site=www.example.com) (replace www.example.com with the URL of your own site) to see specific information about what Google’s automatic scanners have found.
  • Scan your computer using an up-to-date scanning program to identify any malicious code the hackers might have added. Be sure to scan all your content, not just text-based files, as malicious content can often be embedded in images.
  • If your site has been infected with malware, check the Malware page in Webmaster Tools. (On the site dashboard, click Health and then click Malware.) This page lists sample URLs from your site that have been identified as containing malicious code. Sometimes hackers will add new URLs to your site for their nefarious purposes (for example, phishing).
  • Use the URL Removal tool in Webmaster Tools to request removal of hacked pages or URLs. This will prevent the hacked pages from being served to users.
  • Report phishing pages to the Google Safe Browsing team.
  • Use the Fetch as Google tool in Webmaster Tools to detect malware that might be hidden from the users’ browsers, but served to Google’s search engine crawler.
  • Review the antiphishing.org recommendations on dealing with hacked sites.
  • If you have other sites, check to see if these have also been hacked.

If you have access to your server, follow these additional steps:

  • Check to see if any open redirects in your site have been exploited.
  • Check your .htaccess file (Apache) or other access control mechanisms depending on your website platform for any malicious changes.
  • Check your server logs to see when files were hacked (bearing in mind that hackers can alter your logs). Look for suspicious activity such as failed sign-in attempts, command history (especially as root), or unknown user accounts.[/faq_item]

[faq_item title=”Clean your Website” number=”3″]Clean up your content, removing any pages that were added, any spammy content, and any suspicious code identified by virus scanners or the Malware Details tool. If you have backups of your content, consider deleting your content entirely and replacing it with your last known good backup (once you’ve checked to make sure it’s clean and free of hacked content). You can check whether you’ve completely cleaned out the hacked content by using the Fetch as Google tool in Webmaster Tools.If you have access to your server, Google recommends the following steps:

  • Update any software packages to the latest version. Google recommends doing a complete reinstall of your OS from a trusted source to be sure that you’ve removed everything the hacker may have done. Also make sure to reinstall or update blogging platforms, content management systems, or any other type of third-party software installed.
  • Once you feel confident that your site is clean, change your passwords again.
  • Get your system back online. Change your server’s configuration so that it no longer returns a 503 status code and perform any other necessary steps to make your site publicly available.
  • If you used the URL Removal tool to request removal of any URLs that are now clean and ready to appear again in search results, use the same tool to revoke your request.

[/faq_item]

[faq_item title=”Ask Google to review your website” number=”4″]

Once you’re sure that all malicious code has been removed, you can request a malware review of your site. Google will check your site and, if no malware is detected, will remove the warning label that appears in your site’s listing on the search results page.

  1. On the Webmaster Tools Home page, select the site you want.
  2. Click Site Status, and then click Malware.
  3. Click Request a review.

Once it’s confirmed that your site is clean, it can take up to a day or so for the malware warning to be removed from your site in search results.

If the hackers put spam on your site

Once your site is completely free of spam, you can ask Google to reconsider it for inclusion in search results.To request reconsideration of your site:

  1. Sign in to Webmaster Tools with your Google Account.
  2. Make sure you have added and verified the site you want reconsidered.
  3. Request reconsideration of your site.

[/faq_item]

[/faq]

USEFUL RESOURCES

Here are some resources to help clean things up and prevent reinfection of your site.

Solved: Default port 80 used by other Application in Windows 8

windows_8_port_80usage

If you have upgraded from previous Windows version to the latest Microsoft’s Windows 8, you may not probably be able to get your local server get to work.

When you try to start Apache, you will get error saying the port 80 is being used by other applications. After trying to dig into so many queries, I found that the World Wide Web Publishing in Windows 8 service is using that default server port 80.

Therefore, open your “Services” window and disable that WWW service. After disabling that service, Apache server in local server package like XAMPP or AMPPS works flawlessly.

AMD deal brings Android apps to Windows 8

_63172331_015879632-1

Microsoft is working hard to convince developers to make apps for Windows 8

Some Windows 8 laptops and PCs could end up running more Android apps than ones written for Microsoft’s software.

Gadgets built around chips made by AMD will come optimised to run the Android apps.

A collaboration between AMD and software firm Bluestacks lets the devices run the 500,000 apps more usually found on Android phones.

By contrast, Microsoft reportedly only has a few thousand apps written specifically for Windows 8 at launch.

The Android apps will be available on Windows 8 devices via AMD’s AppZone player. Inside this is code from Bluestacks that acts as a wrapper around the mobile phone programs so they can run on desktops, laptops and tablets.

AMD has made changes to the core code that runs its processors and graphics cards to ensure apps built for the small screens on mobile phones look good and run well on larger displays.

Store war

The deal means future AMD-based gadgets will ship with the AppZone player installed, letting users get at apps such as Fruit Ninja and Flipboard that they know from their phone.

The player also lets users synchronise their apps across both a PC and an Android phone or tablet. AMD has about a 25% share of the market for desktop computers.

As Windows 8 has been developed to work well with portable devices such as tablets, Microsoft has been working to create an ecosystem of apps for the operating system. However, some reports suggest that a month prior to the launch of Windows 8 there are only about 2,000 apps available for it in Microsoft’s Windows Store.

Bluestacks’ Android-running software also works on Intel-powered devices, including Macs, but typically has to be installed after a gadget has been bought and booted up.

Bluestacks is also talking to other PC makers to get its software installed as PCs are put together in a factory.

Source: BBC News

Joomla 3.0.0 released

The Joomla! Project is pleased to announce the immediate availability of Joomla 3.0.0. This is the next major release of the Joomla CMS in the Standard Term Support (STS) track. All 3.0 users will need to plan to update to the new versions available in the STS release cycle every six months until version 3.5 is released. These updates are expected to be simple and backwards compatible.

Who is this release for?

The standard-term releases are designed for users who need access to the new features. Most users with existing 2.5.x sites will not want to update to version 3.0. Users creating new sites can use either version 2.5 or 3.0, depending on which best suits their needs. Please consider the availability of third-party templates and extensions when deciding which Joomla version to use. Also, if you decide to use version 3.0, please be aware that you will need to update your site every six months (to 3.1, 3.2, and so on) until version 3.5 is available. These updates are expected to be simple and backwards compatible.

What is the status of Joomla! 2.5?

Version 2.5 of the Joomla! CMS is a Long Term Support (LTS) release and support for it will continue until shortly after the release of Joomla 3.5, scheduled for Spring 2014. Users on version 2.5 do not need to migrate to Joomla 3.0.

What is the status of Joomla! 1.5?

Support for Joomla 1.5 will end shortly after the release of Joomla 3.0. It is currently supported only for security issues.

Will I be able to update directly from 2.5 to Joomla! 3?

Yes. Any update issues will be a top priority and will likely be resolved early in the 3.x release train. However, it is likely that many templates and extensions for Joomla 2.5 will need modification to work with Joomla 3. Always test prior to migrating and consult with the developers of any extensions and templates you use. Be aware that the technical requirements for running Joomla 3.0 are different. In addition to requiring newer versions of software, certain settings that were once recommmened are now required such as requiring that magic quotes is off. See the Technical Requirements page for the specifications. See the Joomla 3.0.0 Post-Release FAQs for more detailed information about updating from 2.5 to 3.0.

What are the new features of Joomla! 3?

  • Incorporation of Twitter Bootstrap into a jui media package.
  • A new responsive, mobile device friendly administrator template–Isis– and interface.
  • A new front end template–Protostar– built using Twitter Bootstrap.
  • Updated accessible template called Beez3.
  • A simplified 3-step installation process.
  • PostgreSQL Driver. You will be able to run Joomla 3.0 sites using the PostgreSQL database.
  • PHP Memcached Driver
  • Use of JFeed for feed management rather than SimplePie
  • Installation of language packages directly from the extension manager
  • Guest user group present by default
  • Saving blank articles allowed
  • New administrator statistics module
  • Update TinyMCE to version 3.5.6
  • Continued clean up of older unused code, files and database fields and tables and improved standardization of tables.
  • Improvements to Smart Search
  • Extensive work on code style standardisation and consistency
  • Unit testing in the CMS
  • Updated system tests in the CMS
  • Custom active menu item for menu module
  • Let the SEF plug-in add the canonical url to the head
  • Version 12.2 of the Joomla Platform

This release also includes the current version (12.2) of the Joomla! Platform, which includes a large number of new and improved packages.

Download

New Installations: Click here to download Joomla 3.0.0 (Full package) »

See the Download page for other packages and information on updating.

Note: Please read the Joomla 3.0 FAQ and the update instructions before updating.

Source: Joomla

Can Apple’s App Store maintain its lead over Google Play?

Google’s store is just 25,000 applications away, putting it within striking distance of overtaking Apple’s App Store.

Google_Play_25B_app_downloads_610x471

(Credit: Google)

 

Apple’s App Store has always offered the most apps to users. But that could change.

Google announced yesterday that its Google Play store now offers 675,000 applications. Apple announced earlier this month that its store had 700,000 applications available.

Both Google’s app marketplace and the App Store launched in 2008. However, as Inside Mobile Apps pointed out yesterday in its deep dive into the growth of both marketplaces, Apple’s option has historically been the leader by a wide margin. In 2010, for example, Apple announced that it had reached 250,000 downloaded apps. Google’s store, then known as the Android Market, didn’t hit that tally until July 2011.

However, it appears developers are responding more kindly to Google Play. Apple’s App Store reached 650,000 applications in July. Considering Google Play has 675,000 apps now, it appears that the store is less than two months behind Apple’s marketplace.

That rapid catch-up might surprise some who remember a study released earlier this year by IDC and Appcelerator, a company that makes cross-platform programming tools for developers. In that study, the companies found that the number of developers who were “very interested” in programming for Android smartphones dropped from 83.3 percent to 78.6 percent. A similar step down occurred for Android tablets. Apple’s iPhone and iPad stayed atop the list with 89 percent and 88 percent interest, respectively.

Source: CNET News

Go to Top