If you enabled the Sucuri firewall and VirtueMart is now responding with errors such as the one below, this step can resolve the issue. Subject: PayPal IPN Transaction on your site: Possible fraud Error code 506. Possible fraud. Error with REMOTE IP...
In case your website has HTTPS enabled, is loading correctly on most popular browsers, but Safari is returning "Safari could not open the page because the server stopped responding", please unset or ask your hosting provider or web...
Although Apple has announced that iTunes Podcasts are now compatible with Let’s Encrypt SSL, if you continue to face issues such as "Can’t read your feed", you have to upgrade to the Professional or Business plan (if your domain is...
There are a couple reasons why you might see this message. 1) After setting up the domain, it could take up to 20 minutes for all changes to be applied on the Website Firewall clusters. In this case, the **Domain Not Configured** message is...
As explained in "Session Cookies" of the Troubleshoot Cache Issues article, you must set the Cache Level to "Site Caching" and add the following code to your .htaccess file: # BEGIN Prevent Session Cookie Cache <ifModule...
If you are getting: The Jetpack server was unable to communicate with your site [HTTP 406] That usually means your hosting server has mod_security enabled and it is blocking the access. Contact your hosting support and ask them to disable...
If your OSCommerce reports show that all of your users have the same IP address, and you don\’t have access to your webserver to change the configuration as we described here, you can still correct this. To do so, edit the following file:...
When a user visits a page served over HTTPS, their connection with the web server is encrypted and safeguarded from man-in-the-middle (MiTM) attacks. If the HTTPS page includes content retrieved through cleartext HTTP, then the connection is only...
The Sucuri Firewall only proxy traffic going over port 80 (HTTP) and 443 (HTTPS). If your application runs on a different port, you should either: a) create a sub-domain pointing directly to your Hosting IP or b) proxy the application port from the...
The kill chain model was created by Lockheed Martin’s CIRT (incident response group)" to identify and categorize each stage of a network-based (cyber) attack. They followed the same concept used by the US military to structure their own...