menu dan link artikel muncul huruf rusia?


Status
Not open for further replies.

fienso

Beginner 2.0
Met malam Tuan,
1. Bisa minta bantuan? Kenapa menu dan link di http://www.masjidjami-alittihad-citraindah.com kalau diklik munculnya seperti huruf Rusia, seperti di bawah. Sebelumhya normal. Apakah karena setelah update joomla, sedangkan website yang lain tidak ada gangguan.

2. misal: Файл ключевиков keys/masjidjami-alittihad-citraindah.com.txt пуст или не существует. Пропишите туда хотя бы один ключевик.

3. Web http://www.masjidjami-alittihad-citraindah.com ini add-on dimain, yang dihosting jadi satu dengan http://citraindahciputra.com Anehnya kalau diakses dari http://masjidjami-alittihad-citraindah.citraindahciputra.com tidak ada masalah, semua menu dan link artikel tampil mulus. tidak ada kendala.

4. Sudah tanya ke pemilik hositng, jawabanya cuma: Mohon maaf, mengenai isi skrip website kami tidak incharge untuk pengecekan. Silahkan konsultasikan dengan pihak webdeveloper bapak.

5. Kalau pakai webdeveloper ya pasti gak tanya spt itu ke penyedia hosting.

6. Catatan: web pakai joomla terbaru Joomla! 3.4.8

Ditunggu bantuannya, Tuan. Biar tidak install ulang dan isi ulang website. Terima kasih.
 

fienso

Beginner 2.0
terima kasih banyak Om Pedagang. Sudah dipraktikkan, ternyata Ces Pleng. manjur. Ada susupan Malware. Buat yang mengalami serupa, silakan diatasi dengan sbb:

I have a backup on hand and reviewed the difference in the files - this is what the original Joomla file should look like:

application/x-httpd-php defines.php
PHP script text

<?php
/**
* @package Joomla.Site
*
* @copyright Copyright (C) 2005 - 2015 Open Source Matters, Inc. All rights reserved.
* @license GNU General Public License version 2 or later; see LICENSE.txt
*/

defined('_JEXEC') or die;

// Global definitions
$parts = explode(DIRECTORY_SEPARATOR, JPATH_BASE);

// Defines.
define('JPATH_ROOT', implode(DIRECTORY_SEPARATOR, $parts));
define('JPATH_SITE', JPATH_ROOT);
define('JPATH_CONFIGURATION', JPATH_ROOT);
define('JPATH_ADMINISTRATOR', JPATH_ROOT . DIRECTORY_SEPARATOR . 'administrator');
define('JPATH_LIBRARIES', JPATH_ROOT . DIRECTORY_SEPARATOR . 'libraries');
define('JPATH_PLUGINS', JPATH_ROOT . DIRECTORY_SEPARATOR . 'plugins');
define('JPATH_INSTALLATION', JPATH_ROOT . DIRECTORY_SEPARATOR . 'installation');
define('JPATH_THEMES', JPATH_BASE . DIRECTORY_SEPARATOR . 'templates');
define('JPATH_CACHE', JPATH_BASE . DIRECTORY_SEPARATOR . 'cache');
define('JPATH_MANIFESTS', JPATH_ADMINISTRATOR . DIRECTORY_SEPARATOR . 'manifests');

The MALWARE code that was added to this file began with: preg_replace("\x21\1 and went on for an additional 2 pages.

I hope this helps someone!
 

mustafaramadhan

Hosting Guru
terima kasih banyak Om Pedagang. Sudah dipraktikkan, ternyata Ces Pleng. manjur. Ada susupan Malware. Buat yang mengalami serupa, silakan diatasi dengan sbb:

I have a backup on hand and reviewed the difference in the files - this is what the original Joomla file should look like:

application/x-httpd-php defines.php
PHP script text

<?php
/**
* @package Joomla.Site
*
* @copyright Copyright (C) 2005 - 2015 Open Source Matters, Inc. All rights reserved.
* @license GNU General Public License version 2 or later; see LICENSE.txt
*/

defined('_JEXEC') or die;

// Global definitions
$parts = explode(DIRECTORY_SEPARATOR, JPATH_BASE);

// Defines.
define('JPATH_ROOT', implode(DIRECTORY_SEPARATOR, $parts));
define('JPATH_SITE', JPATH_ROOT);
define('JPATH_CONFIGURATION', JPATH_ROOT);
define('JPATH_ADMINISTRATOR', JPATH_ROOT . DIRECTORY_SEPARATOR . 'administrator');
define('JPATH_LIBRARIES', JPATH_ROOT . DIRECTORY_SEPARATOR . 'libraries');
define('JPATH_PLUGINS', JPATH_ROOT . DIRECTORY_SEPARATOR . 'plugins');
define('JPATH_INSTALLATION', JPATH_ROOT . DIRECTORY_SEPARATOR . 'installation');
define('JPATH_THEMES', JPATH_BASE . DIRECTORY_SEPARATOR . 'templates');
define('JPATH_CACHE', JPATH_BASE . DIRECTORY_SEPARATOR . 'cache');
define('JPATH_MANIFESTS', JPATH_ADMINISTRATOR . DIRECTORY_SEPARATOR . 'manifests');

The MALWARE code that was added to this file began with: preg_replace("\x21\1 and went on for an additional 2 pages.

I hope this helps someone!
Pakai maldet bisa terdeteksi tidak?.

Bisa 'pinjam' file yang terinfeksi?.
 

fienso

Beginner 2.0
citraindahciputra.com/ngx_pagespeed_beacon?url=http%3A%2F%2Ftattoo.crazy-app.com%2Ffree%3Fid%3Dinkrevealed%26s1%3D9245%26s2%3D138405073063%26p%3D542487

dari ip 202.153.229.116
 
Status
Not open for further replies.

Top