My (send mail function WordPress) its made for salesstaus, has stop working after an update, maybe some code is outdatet

//send mail to owner if status set to 'Job Dispatched' if($  _POST['new_status'] == 10){     $  owner_email = get_option('purch_log_email');     $  result = $  wpdb->get_results('select wsf1.value as firstname                                      , wsf2.value as lastname                                     , wsf3.value as email                                     from XXXX2_wpsc_purchase_logs  wpl                                         left join XXXX2_wpsc_submited_form_data wsf1 ON wsf1.log_id = wpl.id AND wsf1.form_id = 2                                         left join XXXX2_wpsc_submited_form_data wsf2 ON wsf2.log_id = wpl.id AND wsf2.form_id = 3                                         left join XXXX2_wpsc_submited_form_data wsf3 ON wsf3.log_id = wpl.id AND wsf3.form_id = 9                                     where wpl.id = "'.$  _POST['id'].'"');         $  message    =   '<script type="application/json+trustpilot"> 

{‘ ."\n" ."\n" .’"recipientEmail": ‘.’"’.$ result[0]->email.’"’."," ."\n" ."\n" .’"recipientName": ‘.’"’.$ result[0]->firstname."".$ result[0]->lastname.’"’."," ."\n" ."\n" .’"referenceId": ‘.’"’.$ _POST[‘id’].’"’."," ."\n" ."\n" .’ }

‘;

    $  from       = "mysite.dk <info@mysite.dk>";     $  to         = $  owner_email;     $  subject    = "Trust Pilot"; 

// // $ headers = "From:" . $ from; $ headers = "From: " . $ from . "\r\n"; $ headers.= "Content-Type: text/plain;charset=utf-8\r\n";

    //wp_mail($  owner_email, 'New Dispatched Job', $  message);     

// Trust-Pilot

// mail(‘xxxxx@xxxxxx.trustpilot.dk’, $ subject, $ message, $ headers); mail(‘XXX@adr.dk’, $ subject, $ message, $ headers); }

How I can ensure that a link sent via email is opened only via user clicks from a mail client and not by bots?

In my web application I generate links in the following format:

https://example.com/^token^ 

Each link according to my specs is sent via email and should not allow robots to scrape it. In order to avoid visits via robot I placed the following robots.txt:

User-agent: * Disallow: / 

And on page’s <header></header> tag I placed:

    <meta name="robots" content="noindex">     <meta name="robots" content="nofollow"> 

The question is how I can ensure that a link is opened only when user has clicked upon it and not a random bot/spider scrapes it? Does the length and the randomness of the ^token^ in url factor into bot visit prevention?

In my application the ^token^ is a cryptographically-random 5 byte value that once generates is hex-econded. So in my case, if the token length takes a significant role on non-scrappines of this link, which is the recommended length of the random token?

My application is in Laravel and I use nginx and php-fpm combo in order to serve the content to the browser.

Shop sends Mail with order cancellation

We currently have a problem with our shop sending cancellations to our customers after they have successfully created and payed an order.

They place an order, pay and everything works fine. The status of the order is correct as well. But after a few minutes our system creates an cancellation document and sends it via mail to our customer.

Anyone an idea whats the problem here?

Thanks a lot in advance. All the best

What sequence of actions has to be taken in order to configure DB2 UDB SMTP mail?

I read https://www.ibm.com/support/knowledgecenter/SSEPGG_9.7.0/com.ibm.db2.luw.sql.rtn.doc/doc/r0055176.html and tried to run the command provided in the article, even though I fully expect SMTP to not work because my server requires a user name and password authentication that the command is missing.

So, just to try it out, I fired off:

db2 update db cfg using smtp_server 192.168.0.12 

It threw this error:

SQL1024N  A database connection does not exist.  SQLSTATE=08003 

Are there any prerequisites to the above command that I am missing?

And once we get this to work with the community’s help, how are we supposed to provide user name and password for the SMTP server in DB2 UDB?

Can the Heat Metal spell target a set of Dragon Scale Mail made from metallic dragon scales?

The heat metal spell can target "a manufactured metal object", including "a suit of heavy or medium metal armor".

A suit of Dragon Scale Mail is clearly a manufactured object, but if it’s made from metallic dragon scales, is it metal, and thus a valid target? Are bronze dragon scales actually made of bronze, or are they just colored like that?

I’m just assuming chromatic dragon scales are inarguably organic.

Can a character wear both Chain mail and Leather to get a higher AC and to fool an enemy?

Background:
I am reading the anime book "Goblin Slayer", the light novel not the comic.

In it the main character wears leather armor over plate or chain to both stack his AC and to confuse his (not very intelligent) enemies into hitting where leather is vulnerable but plate or chain is not.

Question:
In dnd 5th edition, can one wear multiple types of armor and get an AC stack? Can it confuse weak foes like goblins?

Notes:
Here are answers that don’t speak to this question:

  • Can a chain shirt be concealed under normal clothing? (this is about concealed, I’m asking about stacked)
  • Stacking multiple types of armor (this is not dnd 5e centric)
  • Can you wear a Mithral Chain over Snakeskin Tunic and have their effect stack? (this is pathfinder)

Please, if you are going to down-vote, say why in the comments. If I don’t know what I did wrong, it is literally impossible for me to willfully act better and change that thing. It might happen by accident, but the universe doesn’t like happy accidents.

Was this spam email routed through Ukraine goverment’s mail servers? [closed]

I have recently received a typical spam email, but seeing it’s from domain gov.ua I have decided to examine it’s headers knowing that From field is not clear indicator of the sender.

To my surprise, the email originating from a mail client in South Africa had been routed through mail.mk.npu.gov.ua before reaching mx.gmail.com, Google’s mail exchange servers.

  1. Am I correct in assessing this?
  2. mk.npu.gov.ua belongs to Ukraine’s national police, so why would spam be routed through servers belonging to Ukrainian police?

Here is the relevant header excerpt:

Received: from mail.mk.npu.gov.ua (mail.mk.npu.gov.ua. [212.1.64.157])         by mx.google.com with ESMTPS id 127si3307596ljf.47.2020.09.03.22.16.27         (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);         Thu, 03 Sep 2020 22:16:27 -0700 (PDT) Received-SPF: pass (google.com: domain of ubnon01@mk.npu.gov.ua designates 212.1.64.157 as permitted sender) client-ip=212.1.64.157; Authentication-Results: mx.google.com;        spf=pass (google.com: domain of ubnon01@mk.npu.gov.ua designates 212.1.64.157 as permitted sender) smtp.mailfrom=ubnon01@mk.npu.gov.ua Received: from localhost (localhost [127.0.0.1])     by mail.mk.npu.gov.ua (Postfix) with ESMTP id A584F4EA7B6;     Fri,  4 Sep 2020 05:53:44 +0300 (EEST) Received: from mail.mk.npu.gov.ua ([127.0.0.1])     by localhost (mail.mk.npu.gov.ua [127.0.0.1]) (amavisd-new, port 10032)     with ESMTP id rGonvgTsqLKI; Fri,  4 Sep 2020 05:53:44 +0300 (EEST) Received: from localhost (localhost [127.0.0.1])     by mail.mk.npu.gov.ua (Postfix) with ESMTP id 8015750574B;     Fri,  4 Sep 2020 05:35:58 +0300 (EEST) X-Virus-Scanned: amavisd-new at mk.npu.gov.ua Received: from mail.mk.npu.gov.ua ([127.0.0.1])     by localhost (mail.mk.npu.gov.ua [127.0.0.1]) (amavisd-new, port 10026)     with ESMTP id QwWi9Xuk_Cn7; Fri,  4 Sep 2020 05:35:58 +0300 (EEST) Received: from [172.20.10.2] (unknown [105.12.7.241])     by mail.mk.npu.gov.ua (Postfix) with ESMTPSA id 7106E4EA8D6;     Fri,  4 Sep 2020 05:29:50 +0300 (EEST) 

Create a mail server w/ CyberPanel on Digital Ocean [closed]

I’m trying to create a mail server on Digital Ocean w/ CyberPanel. My idea is to host all my email accounts there while having websites on a different server.

I was trying to google how to set up this however there’s little to no information on how to do it w/ CyberPanel.

Any advise on how to do this would be appreciated. I do have a limited knowledge on this one so I would appreciate also advice on how to redirect my DNS records with my domain registrar (Porkbun).

Many thanks!

Spam Mail Related to my Browsing

I was searching google to find a good printer to buy. To my horror, the next day I got a spam mail with theme "Print smarter at low price". Is this a coincidence or is my PC breached? What should I do? No alerts from Anti-Virus. Or can that webpage I opened install some malware? I didn’t click on anything there.