On Sun, May 09, 2004 at 11:02:31AM -0400, Michael Banta said
> Does anyone know where I can obtain a copy of phpnuke? As a Debian package?
> tarball? Anything.
>
> apt-cache search phpnuke comes up with nothing.
>
> phpnuke.org only seems to have a windows .zip file avai
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sunday 17 November 2002 6:43 am, Rob Weir wrote:
> I vaugely remember someone telling me that some versions of IE had a bug
> to do with following relative or absolute links with funny characters in
> them (as PHPNuke URLs would), bu
On Sun, Nov 10, 2002 at 12:44:57AM +, Alan Chandler wrote:
> I have setup phpnuke to act as a small site for my home network.
>
> When I access this site from my konqueror browser (on two separate machines)
> it works fine.
> When I access it via Windows/IE on one machine it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have setup phpnuke to act as a small site for my home network.
When I access this site from my konqueror browser (on two separate machines)
it works fine.
When I access it via Windows/IE on one machine it works fine, but when I try
it on another
* Damon Muller <[EMAIL PROTECTED]> [2001.10.27 00:30:44+1000]:
> > > > PHP Nuke requires me to change all files to 666 (chmod -R 666 *) and to
> > > > 777 all direcotories in order to use the file manager... Can this be
> > > > done
> > > > in a sinle operation?
chmod -R a=rwX .
will change all
PostNuke (www.postnuke.com) might be a better option. It's built on
PHPNuke, but seems to be a bit more security conscious.
HTH,
damon
Quoth Alexander Wallace,
> Well, that's scary... Anyone knows of more secure alternatives?
>
> On Thu, 25 Oct 2001, Damon Muller wrote:
>
001/1018/security.php3),
>
> Login vulnerability in PostNuke. The PostNuke web portal system
> (up to version 0.64) has a vulnerability which can allow an
> attacker to log into other users' accounts. A fix is included in
> the report. It appears t
ers' accounts. A fix is included in
the report. It appears that PhpNuke is also vulnerable to this
attack. (We also still have not seen a new PhpNuke release
fixing the severe, widely-exploited vulnerability in version
5.2.)
You really should consider checking out so
In article
<[EMAIL PROTECTED]>
[EMAIL PROTECTED] writes:
>This is more of a linux question... Is there a way to change recursivly
>the mode to directories only?
find . -type d -print0 | xargs -0 chmod a=rwx
--
Blars Blarson [EMAIL PROTECTED]
Thanks, but the one with the find should work right?
On Wed, 24 Oct 2001, Nathan E Norman wrote:
> On Wed, Oct 24, 2001 at 02:42:09PM -0500, Nathan E Norman wrote:
> > $ chmod a+rwx /basedir
> > $ chmod -R a+rwX /basedir
>
> If I could type I'd be dangerous. The first command is not needed.
>
Thanks! That's what i needed!
On Wed, 24 Oct 2001, Nathan E Norman wrote:
> On Wed, Oct 24, 2001 at 08:46:00AM -0500, Alexander Wallace wrote:
> > This is more of a linux question... Is there a way to change recursivly
> > the mode to directories only?
> >
> > PHP Nuke requires me to change all
On Wed, Oct 24, 2001 at 02:42:09PM -0500, Nathan E Norman wrote:
> $ chmod a+rwx /basedir
> $ chmod -R a+rwX /basedir
If I could type I'd be dangerous. The first command is not needed.
Cheers,
--
Nathan Norman - Staff Engineer | A good plan today is better
Micromuse Ltd. | than
On Wed, Oct 24, 2001 at 08:46:00AM -0500, Alexander Wallace wrote:
> This is more of a linux question... Is there a way to change recursivly
> the mode to directories only?
>
> PHP Nuke requires me to change all files to 666 (chmod -R 666 *) and to
> 777 all direcotories in order to use the file m
This is more of a linux question... Is there a way to change recursivly
the mode to directories only?
PHP Nuke requires me to change all files to 666 (chmod -R 666 *) and to
777 all direcotories in order to use the file manager... Can this be done
in a sinle operation?
Thanks!
14 matches
Mail list logo