Community forum to discuss cxs.
If you believe that there is a problem with your cxs installation and want support then, as a paid product, you should use the helpdesk after having consulted the documentation.
clamd daemon is running as the clam user (member of group clam)
/home/*/public_html folders permissions are set as 0750/drwxr-x---
As such, cxs/clamd is unable to scan any public_html folders/files for viruses.
- Should I set o+x to the public_html folders? (insecure)
- Should I add my clam user to the nobody group? (the public_html folders group is set to nobody)
Is it possible to create an scan for a reseller and it's users?
You can manual select the users but i would be nice if you can select and Reseller and when they at an user it will be automatic added the to scan (like it is i you choice for all the users).
my cpanel server ip changed
After changing the IP of the server and change the IP license
Shell can not remove cxs
Shell has already been removed in less than 1 second shell, but now run loose, but not deleted
I have reported excess process running on my VPS resulting in clamd and Mysql termination frequently.
My web host has advised following:
===========================================
It is advised that it would be preferable to uninstall ClamAV since CXS is already installed on the server. The working of both the applications is the same hence it is suggested to uninstall the ClamAV. We would...
Hi,
I recently installed CXS installed on my server.
I now have some unusual issues that I am trying to figure out if it is tied to CXS and if so, how I can make things work again.
On one of the websites I have a post form that I will be inputting into a textarea field XML data for processing. For some reason when I copy and paste the xml data straight into the form and submit, this is no...
I changed the primary IP for this web server and now cxs hascxs is not licensed for this server failed with this error message:
cxs is not licensed for this server
We are seeing dozens of emails every day alerting us to files being uploaded to /tmp by web scripts, some of which do not even exist. I am guessing that the bad guys are POSTing blindly, and the files are uploaded to /tmp until they are finished uploading, then when the script doesn't exist or handle the upload, the hack is failed and the bad guys move on.
May i know if there is a list or online database that provide more information on the type of exploit that is causing the files to be quaratined inside CXS ?
For example the exploit below P0966 is there more information to be found on the type of exploit it is, what it does etc ?
I realized that the function (W) world writable directory (777) and chmod to 755
stopped working. I discovered the problem after trying to fix permissions for an account, as I often do. To my surprise the files with 777 permissions were not detected nor mentioned in the log CSX.
I do not always when the problem started or what version. I'm currently using the version 5.30, and problem occurs on...
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum