Are you certain that this will suit your security needs? HTTP_REFERRER is
easy to spoof...
On Mon, Dec 24, 2012 at 5:10 PM, Andrey Utkin <
andrey.krieger.ut...@gmail.com> wrote:
> I need to control access to particular directory with following logics:
> if HTTP_REFERER is certain site (but no
I recommend mailing from a different domain name. "12 letter domain" is
still considered to be a significant indicator by the makers of
spamassassin.
-w
On Thu, Aug 2, 2012 at 3:35 PM, Ben Johnson wrote:
> On 7/26/2012 5:28 PM, Ben Johnson wrote:
> > The returned message:
> >
> >
RJ,
> What am I doing wrong in the configuration?
Can you share with us a bit of your configuration?
Thanks
- Wade
On Thu, Dec 8, 2011 at 11:16 AM, R J wrote:
> Hi,
>
> I am new to httpd. I am using httpd and mod_jk for load balancing. I am
> running it under sticky bit configuration. I hav
Yay!
On Wed, Nov 23, 2011 at 3:02 PM, Tim Streater wrote:
> On 23 Nov 2011 at 21:45, Wade Evans wrote:
>
> > My naive recommendation is to stop using CGI, and use the PHP module
> > instead... to swim with the current, not against it.
>
> Wade,
>
> Thanks for that
v 23, 2011 at 1:26 PM, Tim Streater wrote:
> On 23 Nov 2011 at 20:39, Wade Evans wrote:
>
> > If all you want to do is run PHP scripts to service AJAX requests, why
> not
> > load the php module, set the type handler, and move on to a more
> > interesting problem?
>
&
If all you want to do is run PHP scripts to service AJAX requests, why not
load the php module, set the type handler, and move on to a more
interesting problem?
-w
On Wed, Nov 23, 2011 at 12:22 PM, Tim Streater wrote:
> I'm looking at how apache is set up under OS X Lion and Snow Leopard. It
>
That is a browser error message, not something from the web server.
Firefox has historically had problems with spurious error messages on
images being caused by plug-ins and extensions.
I suggest trying with curl, wget, or another browser before focusing on
apache. I run apache 2.2 under windows
Hugo,
If you are allowing users to upload files, and you also have content type
handlers and activated modules for executing scripts, you are creating a big
window of opportunity for your site to get hacked.
In the specific example you cite (PHP), you can do something about it by
focusing on the