Jump to content

WHMCS Lawrence

WHMCS Technical Analyst
  • Content count

    100
  • Joined

  • Last visited

  • Days Won

    2

WHMCS Lawrence last won the day on June 16

WHMCS Lawrence had the most liked content!

Community Reputation

3 Neutral

About WHMCS Lawrence

  • Rank
    WHMCS Technical Analyst

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. WHMCS Lawrence

    POP3 Connection Error

    If your hosting provider has ruled out a DNS resolution issue on the server (as the error messages suggest there is), please feel free to open a ticket with our support team so this can be investigated further.
  2. WHMCS Lawrence

    Order Accept Encountered Problems

    That's good to hear. Hopefully it worked 🙂
  3. WHMCS Lawrence

    POP3 Connection Error

    If using localhost works, that would normally confirm a DNS issue as advised in my last reply, and may be a symptom of a larger issue on the server that will need to be corrected by your system administrator.
  4. WHMCS Lawrence

    Some domain renewals not getting invoiced

    I'd recommend ensuring that the domain wasn't previously invoiced for the current Next Due Date value, as that can cause WHMCS to not invoice for the renewal. A simple way to confirm and correct that is to edit the Next Due Date on the domain and set back backwards by 1 day. Then save your change and use the Invoice Selected Items function on the Client Summary page for the client to generate the renewal invoice.
  5. WHMCS Lawrence

    POP3 Connection Error

    It sounds like the DNS resolvers on your server may be malfunctioning, as IntoDNS reports no issues that should be causing that: https://intodns.com/danumhost.co.uk
  6. WHMCS Lawrence

    POP3 Connection Error

    It would seem that your Zimbra server is returning an "internal server error" message and would need to be investigated and corrected by your system administrator to resolve that. This is unrelated to the other issues in this thread.
  7. WHMCS Lawrence

    Order Accept Encountered Problems

    This would suggest that the product in question was set to use the AutoRelease module instead of cPanel at some point, and still had those values for the advanced settings after switching. If this occurs again, I'd recommend using the Advanced Mode option on the Module Settings for the affected product to correct as needed.
  8. WHMCS Lawrence

    Knowledgebase Tags

    If you use a truncate SQL query on the applicable tables, it should be fine. If you continue to experience issues like this, please contact our support team so we can investigate them further.
  9. WHMCS Lawrence

    Google reCAPTCHA

    If your template is only showing the default captcha, that means it hasn't been updated for the changes needed for captcha in WHMCS 7.7 and having your developer correct that should resolve it: https://docs.whmcs.com/Version_7.7.0_Release_Notes#Template_Changes
  10. WHMCS Lawrence

    Stripe Changes

    3DSecure is only for payments initiated by clients themselves - renewal payments will be handled as they are currently and treated as authorized renewal payments. I'd recommend asking Stripe about how they handle chargeback protection, as that would be part of their own policies and not specific to our module.
  11. WHMCS Lawrence

    Stripe Changes

    This is planned to be in 7.8, along with SCA, which is currently in development and should be available well in advance of Stripe's deadline.
  12. WHMCS Lawrence

    Paypal Subscriptions Changes

    That's correct 🙂 thanks for pointing that out!
  13. WHMCS Lawrence

    Invoice Unpaid Reminder

    If domain reminders are being sent and the domain falls within the invoicing settings (but hasn't been invoiced yet), this suggests that "Disable Auto Renew" is enabled on the domain. Disabling it will allow WHMCS to generate a renewal invoice during the next daily cron tasks run. Alternatively, an invoice can be generated immediately using the "Invoice Selected Items" function on the Client Summary page for the client in the admin area.
  14. WHMCS Lawrence

    How do i hacker hack a whmcs installation?

    Generally the most common source of intrusion can be traced to third party PHP software that has been installed alongside WHMCS, such as Joomla!, WordPress, or many others, that have publicly known exploits or weaknesses at the time. Following any compromise, a complete server or account audit is usually warranted, including searching for any files you do not recognize, in particular any shell scripts or uploaders that many hackers leave in place to allow future compromises. During a security audit, any scripts or third party software should be updated to the latest versions, including any security patches. Once this has been completed, our recommendation would be to delete all files on your WHMCS hosting account except for the WHMCS configuration.php file (including the files in other directories as well) in case the hackers have left any malicious files behind to be able to return later. This will allow you to begin with a "clean slate" by uploading a fresh set of WHMCS files, while using your existing database. Protecting your WHMCS installation is all about your server security. WHMCS can only ever be as secure as the server it is hosted on, so you need to ensure you have permissions on the server set appropriately so other shared users can't read or access your files, you also need to ensure you do not install any third party scripts which frequently have security issues in the same hosting account as WHMCS, and if possible you should consider moving WHMCS to an isolated VPS or dedicated environment for higher security. Please also view http://docs.whmcs.com/Further_Security_Steps for information on keeping your WHMCS Installation secure.
  15. WHMCS Lawrence

    How to hide the fact that my client area runs on whmcs

    To add to what @brian! said, you can customise the client area template to give your installation an unique look and feel, however the PHP file names would likely be a hint to anyone who is familiar with WHMCS and may still see attempts to a lesser degree than if your installation was running a default template. The exploit these attackers are trying to use is quite ancient and does not affect any supported version of WHMCS (if I recall correctly, this only affected early 5.x releases and older, and was quickly patched after discovery). Generally the most common source of intrusion can be traced to third party PHP software that has been installed alongside WHMCS, such as Joomla!, WordPress, or many others, that have publicly known exploits or weaknesses at the time. Following any compromise, a complete server or account audit is usually warranted, including searching for any files you do not recognize, in particular any shell scripts or uploaders that many hackers leave in place to allow future compromises. During a security audit, any scripts or third party software should be updated to the latest versions, including any security patches. Once this has been completed, our recommendation would be to delete all files on your WHMCS hosting account except for the WHMCS configuration.php file (including the files in other directories as well) in case the hackers have left any malicious files behind to be able to return later. This will allow you to begin with a "clean slate" by uploading a fresh set of WHMCS files, while using your existing database. Protecting your WHMCS installation is all about your server security. WHMCS can only ever be as secure as the server it is hosted on, so you need to ensure you have permissions on the server set appropriately so other shared users can't read or access your files, you also need to ensure you do not install any third party scripts which frequently have security issues in the same hosting account as WHMCS, and if possible you should consider moving WHMCS to an isolated VPS or dedicated environment for higher security. Please also view http://docs.whmcs.com/Further_Security_Steps for information on keeping your WHMCS Installation secure.
×

Important Information

By using this site, you agree to our Terms of Use & Guidelines and understand your posts will initially be pre-moderated