Hosting r/Hosting is for discussions of web hosting services and service providers including: shared hosting, wordpress website hosting, cloud hosting, VPS providers, dedicated servers, and other hosting related services. General discussions on web hosting are welcome.
- Are Plesk and cPanel outdated?by /u/Full_Astern on January 12, 2026 at 2:44 pm
I see a lot of developers using auto deployment services to host their applications because they’re streamlined and quick. Such as https://forge.laravel.com/ Are services like Plesk and cPanel becoming obsolete? submitted by /u/Full_Astern [link] [comments]
- Hetzner cannot access to cloudflare websitesby /u/x3440 on January 12, 2026 at 9:01 am
submitted by /u/x3440 [link] [comments]
- How long does it take to connect a godaddy domain to WIX via NS?by /u/ideaskettle on January 12, 2026 at 3:54 am
It’s taking so so slow and my client is losing businesses 😞 WIX says it’s normal. It has never happened to me before. It was always connects within 30 mins. What are the real reasons for this? Could this be because there is something wrong with the domain? I checked propagation and it shows zero, nothing is propagated, it’s been 24 hours now. submitted by /u/ideaskettle [link] [comments]
- Linux Rootkit Toolkit (Ebury/Windigo)by /u/chuvadenovembro on January 11, 2026 at 3:04 pm
Pessoal, Criei esse script de detecção e desinfecção (não recomendado o uso dessa pratica), de um malware da familia Ebury Recentemente tive um servidor dedicado de um cliente com directadmin que o apache deixou de funcionar, então o custombuild deixou de funcionar (problemas para recompilar o php), se for esse seu caso é bem provável que esteja com algum problema de segurança… São dois scripts, um que apenas verifica se existe o malware e o outro é capaz de desinfectar… https://github.com/chuvadenovembro/Linux-Rootkit-Detector-libkeyutils- submitted by /u/chuvadenovembro [link] [comments]
- Yep it’s a SEO spam injectionby /u/Papenguito on January 11, 2026 at 3:02 pm
https://preview.redd.it/tb6khk8giqcg1.png?width=1333&format=png&auto=webp&s=e32e169f8957002aab087c19e21891ab25a909de i got this on google search console scanning the index of my web page i am working with astro and blue host what i know it’s that before someone else worked with wordpress and that was the moment where the malware got in. by now i want to know what can i do with these situation i have already blocked in GSC the routes and the prefix of infected routes but i need to know what can i do on the server and on the c panel submitted by /u/Papenguito [link] [comments]