Jump to content

Smithikakart

Members
  • Posts

    41
  • Joined

  • Last visited

About Smithikakart

  • Birthday 07/01/1983

Contact Methods

Profile Information

  • Location
    India
  • First Name
    SUNDAR
  • Last Name
    rajamani
  • Activity
    Merchant

Recent Profile Visitors

1,082 profile views

Smithikakart's Achievements

Apprentice

Apprentice (3/14)

  • Reacting Well Rare
  • Dedicated Rare
  • First Post Rare
  • Collaborator Rare
  • Conversation Starter Rare

Recent Badges

0

Reputation

  1. same issue from google console is the above code fixed your solution? I think similar product module giving this canonical issue?
  2. I have received this message in customer service is it spam message or any serious action need to take? Your Site Has Been Hacked PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS! We have hacked your website https://smithikakart.in and extracted your databases. How did this happen? Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server. What does this mean? We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your https://smithikakart.in was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index our targets. How do I stop this? We are willing to refrain from destroying your site’s reputation for a small fee. The current fee is $2500 in bitcoins (BTC). Please send the bitcoin to the following Bitcoin address (Copy and paste as it is case sensitive): 3LKf6NWhJA8L5cmD5p9u6WksjW9SC2jauu Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 7 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WILL start! How do I get Bitcoins? You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM. What if I don’t pay? If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there’s no counter measure to this, you will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers. This is not a hoax, do not reply to this email, don’t try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again! Please note that Bitcoin is anonymous and no one will find out that you have complied.
  3. yes am using inmotion still looks like they are the better option but for root level u have to spend some more money even for root level option also they are too good with their support level if u r not get ur proper response for ur query better close that session and try to communicate with some other good knowledged guy they will teach u more... and for cloudflare yes still am using...
  4. it was VPS nginx cache issue now if u face this issue in shared hosting server means, make sure u have the cache control in cpanel options if u have that kindly share that screenshot let u know the exact option to disable to fix this nginx image issue...
  5. oh sorry forget to mention its PHP 7.2 only prestashop 1.7.6.4 supports upto PHP 7.2 only
  6. yes bro using latest version 1.0.6 only and tried module reset done. cleared cache under performance, cloudflare cache cleared and manual cleared cache and var folder also done still problem not solved kindly help to fix this one customers are suffered to place order COD payment is important one...
  7. here is the screenshot of the error Using prestashop 1.7.6.4
  8. Hey getting internal 500 error after order process complete in validation page, while enabled debug mode getting this error msg Error: Illegal length modifier specified 'f' in s[np]printf call smarty internal runtime writefile.php line78
  9. hey i have tried this way to trace the error, you have posted this 2016 but now i have tried this way for prestashop version 1.7.6.4 once inserted the line before php fatal error line after that my whole site not open got the error 500 message completely, is there any other way to trace the error for latest version
  10. these errors are coming in to the cpanel php error log....
  11. After changed block name from footer to foot and everything fine now and one more anyone help me out to fix sp one step checkout? module installed and once enabled nothing reflect in the checkout page any one pls help.....
×
×
  • Create New...