<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>superhosting.bg &#8211; doncho.net</title>
	<atom:link href="https://doncho.net/tag/superhosting-bg/feed/" rel="self" type="application/rss+xml" />
	<link>https://doncho.net</link>
	<description>Късчета живот</description>
	<lastBuildDate>Mon, 24 Jun 2013 03:42:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/doncho.net/wp-content/uploads/2021/01/cropped-Doncho-Angelov.jpg?fit=32%2C32&#038;ssl=1</url>
	<title>superhosting.bg &#8211; doncho.net</title>
	<link>https://doncho.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">12604956</site>	<item>
		<title>Goodbye, WestHost!</title>
		<link>https://doncho.net/2013/06/goodbye-westhost/</link>
					<comments>https://doncho.net/2013/06/goodbye-westhost/#comments</comments>
		
		<dc:creator><![CDATA[Doncho]]></dc:creator>
		<pubDate>Mon, 24 Jun 2013 03:42:52 +0000</pubDate>
				<category><![CDATA[English]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[superhosting.bg]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[WestHost]]></category>
		<guid isPermaLink="false">http://doncho.net/?p=2067</guid>

					<description><![CDATA[Finally! Last evening, at around 02:00AM, I finally had the chance to flip doncho.net nameservers from WestHost to SuperHosting. It&#8217;s been almost 2 years since I decided to throw away WestHost services. I cannot even count the number of incidents I had with them, varying from simple &#8220;No service&#8221; cases to &#8220;We have had blocked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Finally! Last evening, at around 02:00AM, I finally had the chance to flip doncho.net nameservers from WestHost to SuperHosting.</p>
<p>It&#8217;s been <a href="https://doncho.net/2011/01/%D0%BA%D1%8A%D0%BC-wordpress-3-0-4/" target="_blank">almost 2 years since I decided to throw away WestHost services</a>. I cannot even count the number of incidents I had with them, varying from simple &#8220;No service&#8221; cases to &#8220;We have had blocked your (home) IP, because you have entered your password wrong three times&#8221;. Idiotic rules, threatening e-mails (you&#8217;re using way too much processor), etc.</p>
<p>Since doncho.net has a lot of content, I was really afraid from the migration plan. But after migrating my main blog to Superhosting took like 30 min (the download took hours!), my hopes went high. And indeed, for less than 4 hours total (spread in 3 days), I was finally ready to flip the nameservers trigger. And I also had (back <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> ) all the passwords&#8217; lists for MySQL databases, etc.</p>
<p>Now all should be already in place. My permalinks (finally!) work. And my blog is (finally!) loading fast.</p>
<p>Last but not least, I need to mention the great Superhosting support line. They were excellent. They even offered me them to do the migration, but I wanted to do it myself, for various reasons.</p>
<p>Let&#8217;s see now!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://doncho.net/2013/06/goodbye-westhost/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2067</post-id>	</item>
		<item>
		<title>Massive hacking attacks</title>
		<link>https://doncho.net/2013/04/massive-hacking-attacks/</link>
					<comments>https://doncho.net/2013/04/massive-hacking-attacks/#comments</comments>
		
		<dc:creator><![CDATA[Doncho]]></dc:creator>
		<pubDate>Mon, 15 Apr 2013 20:03:08 +0000</pubDate>
				<category><![CDATA[Daily]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[admin]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[limit login attempts]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[plugin]]></category>
		<category><![CDATA[superhosting.bg]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://doncho.net/?p=2020</guid>

					<description><![CDATA[Recently, I red in my fellow hosting provider Superhosting.BG about global, worldwide bruteforce attack over a lot of WordPress blogs (post in Bulgarian). I decided to quickly check what&#8217;s the actual attack activity and I installed the Limit Login Attempts WordPress plugin. What this plugin does is it logs all incorrect login attempts, and if [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" decoding="async" data-attachment-id="2024" data-permalink="https://doncho.net/2013/04/massive-hacking-attacks/hacking/" data-orig-file="https://i0.wp.com/doncho.net/wp-content/uploads/2013/04/hacking.jpg?fit=560%2C248&amp;ssl=1" data-orig-size="560,248" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Hacking" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/doncho.net/wp-content/uploads/2013/04/hacking.jpg?fit=560%2C248&amp;ssl=1" src="https://i0.wp.com/doncho.net/wp-content/uploads/2013/04/hacking.jpg?resize=280%2C124&#038;ssl=1" alt="Hacking" width="280" height="124" class="alignleft size-full wp-image-2024" srcset="https://i0.wp.com/doncho.net/wp-content/uploads/2013/04/hacking.jpg?w=560&amp;ssl=1 560w, https://i0.wp.com/doncho.net/wp-content/uploads/2013/04/hacking.jpg?resize=300%2C132&amp;ssl=1 300w" sizes="(max-width: 280px) 100vw, 280px" />Recently, I red in my fellow hosting provider <a href="http://superhosting.bg/" target="_blank">Superhosting.BG</a> about <a href="http://blog.superhosting.bg/global-wordpress-brute-force.html" target="_blank">global, worldwide bruteforce attack over a lot of WordPress blogs</a> (post in Bulgarian).</p>
<p>I decided to quickly check what&#8217;s the actual attack activity and I installed the <a href="http://devel.kostdoktorn.se/limit-login-attempts" target="_blank">Limit Login Attempts WordPress plugin</a>. What this plugin does is it logs all incorrect login attempts, and if they go above given treshold, it blocks the IP for a while and logs the blocking. After few blockings, it blocks the IP for a day or so.</p>
<p>This functionality, of course, immediately blocks any bruteforce attempts. What&#8217;s more interesting here though is the fact that it logs the attempts. That was more interesting for me, because it gave me a chance to evaluate the attack size. And here&#8217;s what I&#8217;ve got, just for 2 days:</p>
<table>
<tr>
<th>IP</th>
<th>Tried to log in as</th>
</tr>
<tr>
<td>94.242.237.110</td>
<td>admin (8 lockouts)</td>
</tr>
<td>85.114.133.118</td>
<td>admin (8 lockouts)</td>
</tr>
<tr>
<td>91.224.160.135</td>
<td>admin (2 lockouts)</td>
</tr>
<tr>
<td>67.215.243.250</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>178.137.163.16</td>
<td>Bymnacculnela (2 lockouts)</td>
</tr>
<tr>
<td>72.32.68.101</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>194.247.30.126</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>95.173.186.104</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>188.40.69.202</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>108.163.188.186</td>
<td>admin (1 lockout)</td>
</tr>
<tr>
<td>109.200.29.66</td>
<td>Admin (1 lockout)</td>
</tr>
<tr>
<td>24.234.3.189</td>
<td>admin (1 lockout)</td>
</tr>
</table>
<p>Obviously, there was some &#8220;unhealthy&#8221; interest. But I never expected that the scale would be that big. And they were all shooting for &#8220;the big fella&#8221;, the &#8220;admin&#8221; account.</p>
<p>So it was time to change the admin username. Obviously, the success factor of the attack is based on the fact that WordPress comes with default &#8220;admin&#8221; username. If I change the username to something else, the attack would never succeed, even if it by some crazy stupid chance succeeds to get my password right (12+ symbols password). It was pretty quick change, although I had to play with the database directly (I&#8217;m almost sure there&#8217;s a plugin to do the job as well).</p>
<p>Now all seems safe. My wordpress applications locked my account twice, until I realized that I have to change the username there too, but that was the only harm so far.</p>
<p>So, if you&#8217;re managing WordPress blog, I urgently advise you to install Limit Login Attempts and change your admin user password (if you have only one admin user, if you have many, you have to live with the plugin only). Otherwise, you&#8217;re pretty much exposed to (some) risk, especially if you have easily guessable WordPress admin password.</p>
<p>Good luck!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://doncho.net/2013/04/massive-hacking-attacks/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2020</post-id>	</item>
		<item>
		<title>Защо изпускам WordCamp 2011</title>
		<link>https://doncho.net/2011/09/%d0%b7%d0%b0%d1%89%d0%be-%d0%b8%d0%b7%d0%bf%d1%83%d1%81%d0%ba%d0%b0%d0%bc-wordcamp-2011/</link>
					<comments>https://doncho.net/2011/09/%d0%b7%d0%b0%d1%89%d0%be-%d0%b8%d0%b7%d0%bf%d1%83%d1%81%d0%ba%d0%b0%d0%bc-wordcamp-2011/#comments</comments>
		
		<dc:creator><![CDATA[Doncho]]></dc:creator>
		<pubDate>Sat, 17 Sep 2011 07:00:31 +0000</pubDate>
				<category><![CDATA[Български]]></category>
		<category><![CDATA[проблеми]]></category>
		<category><![CDATA[хоби]]></category>
		<category><![CDATA[ma.tt]]></category>
		<category><![CDATA[superhosting.bg]]></category>
		<category><![CDATA[wordcamp]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://doncho.net/?p=1434</guid>

					<description><![CDATA[От доста време се знае за WordCamp 2011. Анонс тези дни излезе и в официалния блог на WordPress България. Ще бъде едно изключително интересно събитие, с гост Matt Mullenweg, основателят на проекта WordPress и основател на Automattic, компанията зад WordPress.com. Лектори освен това ще бъдат дзвера Весо, Еленко, Лонги, Методи от СуперХостинг.БГ и др. На [&#8230;]]]></description>
										<content:encoded><![CDATA[<p align="left"><a href="http://2011.sofia.wordcamp.org"><img data-recalc-dims="1" decoding="async" style="background-image: none; border-bottom: 0px; border-left: 0px; margin: 0px 5px 5px 0px; padding-left: 0px; padding-right: 0px; display: inline; float: left; border-top: 0px; border-right: 0px; padding-top: 0px" title="image" border="0" alt="image" align="left" src="https://i0.wp.com/doncho.net/wp-content/uploads/2011/09/image5.png?resize=244%2C59&#038;ssl=1" width="244" height="59" /></a>От доста време се знае за <a href="http://2011.sofia.wordcamp.org/">WordCamp 2011</a>. <a href="http://bg.wordpress.org/blog/2011/09/15/wordcamp-%D1%81%D0%BE%D1%84%D0%B8%D1%8F-2011/">Анонс</a> тези дни излезе и в <a href="http://bg.wordpress.org/blog">официалния блог на WordPress България</a>. Ще бъде едно изключително интересно събитие, с гост <a href="http://ma.tt/">Matt Mullenweg</a>, основателят на проекта <a href="http://wordpress.org/">WordPress</a> и основател на <a href="http://automattic.com/">Automattic</a>, компанията зад <a href="http://wordpress.com/">WordPress.com</a>. Лектори освен това ще бъдат <a href="http://dzver.com/blog/">дзвера Весо</a>, <a href="http://eenk.com">Еленко</a>, <a href="http://kaka-cuuka.com/3042">Лонги</a>, Методи от <a href="http://superhosting.bg/">СуперХостинг.БГ</a> и др. </p>
<p>На мен лично много ми се искаше да присъствам. Бях си го обещал миналата година, когато пак пропуснах. Още повече, че тази година и Мат щеше да е там, а срещата с емблематични хора винаги действа вдъхновяващо.</p>
<p>Но… пропуснах. Основната причина за това е, че събитието е определено да се случи през “дълъг уикенд”. Сигурен съм, че много други хора ще пропуснат поради същата причина, т.е. ако срещата беше в някой от “стандартните” уикенди, много повече хора щяха да присъстват. Организаторите може би си струва да помислият за това догодина…</p>
<p>Проблемът с дългите уикенди (този е четири дни) е, че в много случаи хората планират неща, които вършат вън от София. Знаете за какво става въпрос, най-вече го знаете от задръстванията на изходите на града.</p>
<p>И аз така, този дълъг уикенд няма да бъда в София. Лични причини, какво да правиш, но провалят иначе шанс за среща с уникален човек. И за слушане на интересни лекции от други интересни хора.</p>
<p>Ако вие можете обаче, ако сте блогър или просто имате интерес към платформата WordPress, горещо препоръчвам събитието! Ще е яко!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://doncho.net/2011/09/%d0%b7%d0%b0%d1%89%d0%be-%d0%b8%d0%b7%d0%bf%d1%83%d1%81%d0%ba%d0%b0%d0%bc-wordcamp-2011/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1434</post-id>	</item>
	</channel>
</rss>
