Difference between revisions of "Main Page"
From OpenPLi Wiki
Rick Hunter (talk | contribs) |
Rick Hunter (talk | contribs) |
||
Line 2: | Line 2: | ||
<span style="color:SteelBlue;font-size: 200%">Welcome to the Open'''PLi'''<sub><small>®</small></sub> Wiki<br/> | <span style="color:SteelBlue;font-size: 200%">Welcome to the Open'''PLi'''<sub><small>®</small></sub> Wiki<br/> | ||
<span style="color:Black;font-size: 50%"> | <span style="color:Black;font-size: 50%"> | ||
− | + | It is now: {{CURRENTDAYNAME}}, {{CURRENTMONTHNAME}} {{CURRENTDAY}} {{CURRENTYEAR}} - {{CURRENTTIME}} GMT | |
---- | ---- |
Revision as of 23:55, 24 June 2017
Welcome to the OpenPLi® Wiki
It is now: Friday, November 1 2024 - 05:37 GMT
Basic section:
Advanced section:
• External device support | • Overscan | |
• Unicable / Jess | • GStreamer | |
• SD HD 4K | • VPN | |
• TV-Headend | • DVB-S/S2/C/T/S2X Tuners | • Multistream |
• Offline decoding | • Full Band Capture Tuner (FBC) |
Expert section:
• Information for Developers
• How to create a Bootlogo
• UP-Download magazine (Dutch language)
It is our goal to make this OpenPLi® WikiPedia:Wiki into a OpenPLi® software knowledge base, with all information imaginable about both enigma based and the OpenPLi® firmware images.
Looking for our forum? Go to https://forums.openpli.org
Attention
With the CVE number mentioned below a serious vulnerability in relation to the OpenWebIf has been reported. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details. The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!! The OpenWebIf team has released a solution for this problem. Receivers with a image BEFORE june 25th 2017 are affected this problem. Posted at: june 24th 2017 |