6 ноября 2013, 17:15

Important, now script installation included in price! Our programmers will install
script on your hosting for free!

5 ноября 2013, 15:56

From today our forum is open. You can ask any questions regarding HS there or ask
for help. Our moderators will be keen to help you or answer your questions.

1 ноября 2013, 21:00

From today all rights for CMS H-SCRIPT belongs to web-studio ArtWeb (
Deal value 20 000 USD. In addition to that, I agreed to lead ArtWeb development
department, and continue work on H-SCRIPT as a part of studio personnel. Now
all licenses/additional works on this script will be done through studio only. How
could it influence product? Now all the workforce: client-manager, two programmers,
designer, webpage designer and promoter will work on this project. I think that it's
a qualitative step forward, that will make our position on market stronger, and could
make us one of the leaders in near future!

9 октября 2013, 14:44

Dear admins! Enable security options in Admin account settings (../admin/account/
user/addinfo?id=1): - IP-address change control = Х.Х.Х.Х - Bind session to IP-
address = yes - Forbid parallel sessions = yes - Auto logout after N minutes (0 -
default) = 5 It will eliminate risk of your session stealing.

24 сентября 2013, 17:51

On popular request we've added extended statistics to admin panel

21 сентября 2013, 21:05

Multi-level currency indication added. Now you can change user's payment details
from admin panel.

16 сентября 2013, 20:21

ATTENTION! Cases of cracking PerfectMoney merchant became more frequent by
trial and error method "Alternative code phrase". If it is "simple", then malefactor will
evaluate it and "sign" for it fake transaction. Script will put stated sum on malefactor's
balance. Create code phrases no shorter than 16 SyMBolS/numbers length.

13 сентября 2013, 07:58

Set of templates in English added

22 августа 2013, 19:39

One curious tester (thanks for that) found vulnerability: If you send a message with
special js-script to a user (or admin), then it will be executed on opening this message.
1. Vulnerability worked only when message was opened from Profile. 2. Malefactor
could receive user's cookies, and if user hasn't set IP-binding, then malefactor could
access user's profile(and in admin case - Control panel). To fix vulnerability update
file ..module/message/show.php . If you have disabled "Personal messages" (or
activated "only support" mode), then you are on safe ground.

15 августа 2013, 06:13

On popular request: now you can reply to letters from support form from your mail.
Custom variable update in database "Was on site" now not oftener than once in a
minute (deloading database server).