Stéphan S
My feedback
15 results found
-
111 votes
Stéphan S supported this idea ·
-
203 votes
Thank you for your input! We will consider this functionality in upcoming releases, if it will be popular.
Everyone, please continue voting for this feature if you consider it important.—
IGStéphan S supported this idea ·
-
98 votes
Hi everyone,
This seems to be important, so we’ll address it in one of the upcoming Plesk releases.
Please continue to vote so we can accurately assess the popularity of this request.
— AK
An error occurred while saving the comment -
9 votes
Stéphan S supported this idea ·
-
14 votes
Thank you for your input! We will consider this functionality in upcoming releases if it will be popular.
Everyone, please continue voting for this feature if you consider it important.— rk
Stéphan S supported this idea ·
-
82 votes
Thank you for your input. We will consider this functionality in upcoming releases, if it will be popular.
Everyone, please continue voting for this feature if you consider it important.- SU
Stéphan S supported this idea ·
-
45 votes
Thank you for your input! We will consider this functionality in upcoming releases if it will be popular.
Everyone, please continue voting for this feature if you consider it important.
— AA
Stéphan S shared this idea ·
-
1,194 votes
An error occurred while saving the comment Stéphan S commented
Really?
Cronjobs to look for virusses?Mail is filtered in real-time on the way in.
FTP should also be filtered in real-time on the way in, this can be done using Mod_Clamav.
Mod_Clamav only works with the Atomic psa-proftpd since Parallels compiles proftpd without --enable-dsoIncoming threats via HTTP should be scanned realtime using a Web Application Firewall.
Plesk 12 is already compatible here. -
52 votes
Looks like “plesk repair fs” can help: https://docs.plesk.com/en-US/12.5/administrator-guide/plesk-administration/plesk-repair-utility/plesk-repair-utility-file-system.75675/
Everyone, please continue voting for this feature if you consider it important!
— rk
Stéphan S shared this idea ·
-
19 votes
An error occurred while saving the comment Stéphan S commented
Love the idea!
Relevant to us aswell. -
22 votes
Thank you for your input. We will consider the possibility of implementing this feature in upcoming releases.
— ES
An error occurred while saving the comment Stéphan S commented
More info on http://www.adminer.org/en/phpmyadmin/
Stéphan S shared this idea ·
-
388 votes
Thank you for your input! We will consider this functionality in upcoming releases if it will be popular.
Everyone, please continue voting for this feature if you consider it important.
— AY
An error occurred while saving the comment Stéphan S commented
You can do this with Postfix and Sender Dependent Relayhost Maps:
http://www.postfix.org/postconf.5.html#sender_dependent_relayhost_mapsBut would indeed be nice if Plesk allowed for this via panel.
I'm not sure that is more than an edge case though. -
442 votes
An error occurred while saving the comment Stéphan S commented
I have written a quick guide for a quick 'n dirty hack:
http://forum.parallels.com/showthread.php?297343-How-To-Host-1-site-on-multiple-IP-s
It can also be done via custom vhost templates, but I feel the best way for this to be incorporated is for Plesk to have it as default.
-
542 votes
We have serious doubts this function can really increase server security:
1) Plesk has built-in protection against brute-force on login – it will lock the login form. So no one can try multiple attempts
2) Arbitrary login name adds very little guess-complexity to a proper password. If you have concerns for your login brute-forced – add another 5-7 characters into your password and feel safe.As changed login name is still very likely to be some sort of vocabulary word or derived from your other account name – this function would only give a false sense of better security. Your security strength is in complex password, not in a complex login name. If you have one good password, you don’t need to treat login as your “second password” – one good password is enough.
As for concerns that default password requirement is set in “weak”, that fail2ban module is not…
An error occurred while saving the comment Stéphan S commented
Again,
very good idea!
Is the id of admin also 0 ?
Or is there no id used to login (webgui / API)?Anything to make it harder on them is a great win on our side.
-
57 votes
An error occurred while saving the comment Stéphan S commented
Stéphan S shared this idea ·
Hi,
what is the current status on this?
Thank you!