While building a new site in Joomla 4 our RSS Feeds showed “Feed not found“. This happened after we upgraded to 4.2. We contacted Joomla and they are aware of the issue. They said this will be a bug fix in the next release or 4.2.1. Meanwhile it is hard to work on site that has something broken on each page. Until the update is released we did the following to fix the issue.
We had an Akeeba backup from before the 4.2 upgrade. We installed this site locally and moved the following files over into the site we are working on. Here are the files and their location.
AtomParser.php – \libraries\src\Feed\Parser
RssParser.php – \libraries\src\Feed\Parser
We copied these two files from the restored backup to the new site and everything was working the way it should.
We were uploading some videos into the Media section of a customers website when we got the error “Unexpected response from the server. The file may have been uploaded successfully. Check in the Media Library or reload the page.” We uploaded 5 videos and only 3 uploaded. The other two had an error. These two videos where 30 megabytes each and the Media Library had a limit of 40 megabytes, so it should have uploaded.
File size seemed to be the issue, but we didn’t have access to the CPanel yet to change the PHP.ini file. We were working localhost, and were able to add some PHP code to our Functions.php file in the our child theme. This didn’t solve the issue. Our upload limit in the media library upload say we can do up to 256 megabytes now.
We cleared the cache, and still had the issue. We found something on StackExchange that mentioned the “Security” plugin.
We had a customer getting 30ish spammed emails from their website each day, but it wasn’t coming from the website. We handle their website and email so by looking into the back-end of the website we could see there were no form submissions. This meant it was spoofed to seem like it was coming from the site.
We needed something to use to block these emails. The customer forwarded a couple of the emails so we could look at the internet headers. Opened the email in Outlook and then went to File >> Properties.
Scrolling through the header we found the offending email address “krates@host.pcmdns.com“, the IP address and domain.
We went into their Office365 online account and went to the Admin >> Show All >> Security.
This will take to you https://security.microsoft.com. Once there you will click on “Policies & rules” >> Threat policies >> Anti-spam.
Once there to block the IP we went to Connection filter policy (Default) >> Edit connection filter policy.
Enter the IP address you want to block and hit “save”. Make sure it did save. We had to do this a couple of times before the IP showed in our policy list.
We also created a separate policy to handle the email address. Start with clicking on the “Create policy” >> “Inbound“. In the Users section add the email addresses you want to protect. We didn’t add any groups. We put their “their-domain.com” and “microsoft.their-domain.com” for the Domains section. For the Action we sent the emails to the junk folder. In the “Allow & block list” we added the offending email address.
Microsoft documentation was a little outdated, but helped us. We found that information here.
We received a invoice today from Domain Networks to renew our main domain SCDIT.com. Problem with this invoice is our domain is not with Domain Networks. They want $285.00 to renew for another year. Domains do not cost that much. If you or someone you know gets a letter/invoice from Domain Networks it is a scam.
We know that internal links in your website is desired with Google, but how do you link to home page in the top menu and bottom menu without being penalized by Search Engines. Well the best way is to tell Google which one is a one you want indexed. You do this by adding a “rel=”canonical”” in your link.
We like using the Gantry framework and Gantry makes this task easy. In the Admin area click on the menu item and go to the “Gantry Menu” tab.
Then click on the “–” button next the “Link Tag Attributes” .
Add the “key” of “rel“, and “Value” of “canonical“, and “Save” this menu item.
This works easy for the Main Menu particle. You will need a different approach for another menu. You will go into the Template Style. Once in the Gantry Template Style in the upper right corner you will click on the “Menu” button at the top. Then select the menu you want in the drop down. Then hover over the menu item to get the “cog” icon to edit this item.
Then add the “rel” and “canonical” tag in the “Link Tag Attributes” area.
We often check the Web Access Firewalls we run on out site as well as our customers sites, and over the past week we have noticed an incredible up tick in attacks. Many coming from other Countries. We typically see maybe 5 attacks a week, but in the last three days we have had over 2,500 attempts on just one site.
If you are unsure if your site is protected feel free to reach out to us, and we can investigate it for you. We have plenty of recommendations for WordPress, Joomla, and Drupal users.
We have a customer who purchased business class emails with Network Solutions. Our customer had issues right away with delays in email and rejections. This turned out to be a outdated Sender Policy Framework (SPF) record in the DNS settings. This didn’t solve all the issues.
One user was still having issues with delayed emails. We sent an email to user-1 but got a rejection for user-2. Turned out user-1 was set to forward to user-2. We added user-1 email address to user-2 email account as a safe sender; however, we got still got rejections. We ended up just turning the forwarding off and everything was working.
Not really a solution, but it is working. We are not a fan of Network Solution here.
We use icons all the time. Sometimes it is a simple FontAwesome or Icomoon fonts. Other times we make our own through Illustrator. We stumbled upon Google’s icons and discovered there are a ton of them. Great looking artwork and easy to use. We watched the following video before using them and found it helpful.
This is something we see often; however, today we got this message and it took several tries to get it right. Often we jump into the Active Directory and reset the password with the option for the user to change the password again on next sign on. This is method I took and we got the following afterwards.
We had to set the password and this time we did not check the “must change password on next sign on. “
This got us into the machine. Once in we were able to hit CTL + ALT + DEL, go the Password Change option, and the user was able to set the password they wanted.
We have used a number of these in the past, but this new one is fantastic. You can control everything from fonts, shape, colors, and more. If you are looking for one check this one out. We were able to export one that was print quality with the colors we wanted.