• Hi, Pleskians! We are running a UX testing of our upcoming product intended for server management and monitoring.
    We would like to invite you to have a call with us and have some fun checking our prototype. The agenda is pretty simple - we bring new design and some scenarios that you need to walk through and succeed. We will be watching and taking insights for further development of the design.
    If you would like to participate, please use this link to book a meeting. We will sent the link to the clickable prototype at the meeting.
  • (Plesk for Windows):
    MySQL Connector/ODBC 3.51, 5.1, and 5.3 are no longer shipped with Plesk because they have reached end of life. MariaDB Connector/ODBC 64-bit 3.2.4 is now used instead.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

hacking

  1. weareimpulse

    Resolved AbuseIPDB - spurious network activity from our server to third-party networks

    hi, does anyone have any advice for our business/server? we currently have a server that hosts around 40 WordPress sites - and a few months ago, we were contacted by our server providers to say that our server had been reported for complaints of spurious network activity from our server to...
  2. I

    Resolved Hacking attempt!

    Hi, today happend something what we didn't expect and we had a long time (means many years) peace of mind. I don't know why I did it, but openned the 'Active Plesk Sessions' section and saw there are two admins logged in. One was me and the other one was logged in as 'admin' with an IP...
  3. L

    PHP script injections, can Plesk help me find the culprit

    Hi all, my server is compromised as every day I can see malicous PHP scripts created and burried in some websites. I'm able to find these from the access log, looking for POST requests on unusual PHP locations (example : POST /assets/images/actus/start.php HTTP/1.0). So I've created a fail2ban...
Back
Top