Designing sites ranges from as low as 200,000/= to as much as 10,000,000/=
even more. It is determined by:

1. Whom you approach
2. What functionalities you need
3. Levels of complexity especially when it comes to issues like database
integration etc.

Can you give us a better picture of what you need?

Wire

> hey Lug, can you guys give me the local average price
> estimates for website design and maintenance?
>
> --- [EMAIL PROTECTED] wrote:
>
>> Send LUG mailing list submissions to
>>      [email protected]
>>
>> To subscribe or unsubscribe via the World Wide Web,
>> visit
>>      http://kym.net/mailman/listinfo/lug
>> or, via email, send a message with subject or body
>> 'help' to
>>      [EMAIL PROTECTED]
>>
>> You can reach the person managing the list at
>>      [EMAIL PROTECTED]
>>
>> When replying, please edit your Subject line so it
>> is more specific
>> than "Re: Contents of LUG digest..."
>> > Today's Topics:
>>
>>    1. Re: Mail admins wanted @yahoo! (McTim)
>>    2. Re: [LUG]Ndugu Linux (Robert K Lutaaya)
>>    3. Fwd: [c-nsp] Cisco Security Advisory: IOS HTTP
>> Server Command
>>       Injection Vulnerability (Mark Tinka)
>>    4. Re: [LUG]Ndugu Linux (Ernest Byaruhanga)
>> > From: McTim <[EMAIL PROTECTED]>
>> To: Linux Users Group Uganda <[email protected]>
>> Date: Thu, 1 Dec 2005 12:09:18 +0300
>> Subject: Re: [LUG] Mail admins wanted @yahoo!
>>
>> On 12/1/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]>
>> wrote:
>> > Sorbs is one of the most annoying Black lists I
>> have had the displeasure of
>> > encountering. You need to make some sort of
>> "donation" of $50 to get off the
>> > blacklist and you can get on it for no apparent
>> reason.
>>
>> It is not a blacklist but more like blackmail (pun
>> intended)
>>
>> I long ago made the
>> > conclusion that anyone who uses Sorbs has no
>> business getting mail from me
>> > anyway!
>>
>> unfortunately, you can be Sorbed withut "using
>> Sorbs" ;-(
>>
>> --
>> Cheers,
>>
>> McTim
>> $ whois -h whois.afrinic.net mctim
>>
>> > From: "Robert K Lutaaya" <[EMAIL PROTECTED]>
>> To: "Linux Users Group Uganda" <[email protected]>
>> Date: Thu, 1 Dec 2005 21:48:03 +0300 (EAT)
>> Subject: Re: [LUG]Ndugu Linux
>>
>>
>> Chris Kasangaki of EACOSS is setting up Customised
>> Debian Kernel for
>> Schools, Small Buisnesses, Civil Society
>> Organizations.
>>
>> You are all welcome to join the project.
>>
>> Robert
>>
>>
>>
>>
>> On Thu, December 1, 2005 11:41 am, Ronny said:
>> > At least 90% of families in Ug if not Africa have
>> lost a member to the
>> > pandemic.Can't forget this day.Good talent has
>> been lost thank God we
>> > still living but pray /"the deadly cron will be
>> killed" hope you do get
>> > that.
>> > /Amazingly as usual Linux is in the fight against
>> it :-\
>> >
>>
> ---------------------------------------------------------------------------------
>> > Researchers at the University at Buffalo, the
>> State University of New
>> > York, have fired up a 2,000-node, 4,000 processor
>> Linux cluster and hope
>> > the cluster's help in studying the human genome
>> will lead to
>> > breakthroughs in the treatment of cancer,
>> Alzheimer's and AIDS.
>> >
>>
> http://os.newsforge.com/article.pl?sid=02/09/10/1516202&tid=2&tid=60&tid=16&tid=31
>> >
>> > Yos
>> > Ronny
>> >
>> > --
>> >
>>
> *******************************************************************
>> > PGP Fingerprint: 6695 794A B84E D922 88FB 73CC
>> 6CBD 8036 B3CD 7304
>> > We can't become what we need to be by remaining
>> what we are
>> >
>>
> *******************************************************************
>> >
>> >
>> >
>> > _______________________________________________
>> > LUG mailing list
>> > [email protected]
>> > http://kym.net/mailman/listinfo/lug
>> > %LUG is generously hosted by INFOCOM
>> http://www.infocom.co.ug/
>> >
>> > The above comments and data are owned by whoever
>> posted them (including
>> > attachments if any). The List's Host is not
>> responsible for them in any
>> > way.
>> > ---------------------------------------
>> >
>> >
>>
>>
>> Robert K Lutaaya
>> 075-808889
>> 041-223 802
>> EACOSS
>>
>>
>>
>> > From: Mark Tinka <[EMAIL PROTECTED]>
>> To: "Linux Users Group Uganda" <[email protected]>
>> Date: Thu, 1 Dec 2005 23:59:27 -0500
>> Subject: [LUG] Fwd: [c-nsp] Cisco Security Advisory:
>> IOS HTTP Server Command
>>      Injection Vulnerability
>>
>> FYI.
>>
>> Mark.
>>
>> ----------  Forwarded Message  ----------
>>
>> Subject: [c-nsp] Cisco Security Advisory: IOS HTTP
>> Server
>> Command Injection Vulnerability
>> Date: Friday 02 December 2005 00:43
>> From: Cisco Systems Product Security Incident
>> Response
>> Team <[EMAIL PROTECTED]>
>> To: [EMAIL PROTECTED]
>> Cc: [EMAIL PROTECTED]
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>>
>> Cisco Security Advisory: IOS HTTP Server Command
>>  Injection Vulnerability
>>
>>
> ========================================================
>> ================
>>
>> Document ID: 68322
>>
>> Advisory ID: cisco-sa-20051201-http
>>
>>
> http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht
>> tp.shtml
>>
>> Revision 1.0
>>
>> For Public Release 2005 December 01 2100 UTC (GMT)
>>
>> -
>>
>>
> --------------------------------------------------------
>> ---------------
>>
>> Contents
>> ========
>>
>>     Summary
>>     Affected Products
>>     Details
>>     Impact
>>     Software Versions and Fixes
>>     Workarounds
>>     Obtaining Fixed Software
>>     Exploitation and Public Announcements
>>     Status of This Notice: INTERIM
>>     Distribution
>>     Revision History
>>     Cisco Security Procedures
>>
>> -
>>
>>
> --------------------------------------------------------
>> ---------------
>>
>> Summary
>> =======
>>
>> A vulnerability exists in the IOS HTTP server in
>> which
>>  HTML code inserted into dynamically generated
>> output,
>>  such as the output from a "show buffers" command,
>> will
>>  be passed to the browser requesting the page. This
>> HTML
>>  code could be interpreted by the client browser and
>>  potentially execute malicious commands against the
>>  device or other possible cross-site scripting
>> attacks.
>>  Successful exploitation of this vulnerability
>> requires
>>  that a user browse a page containing dynamic
>> content in
>>  which HTML commands have been injected.
>>
>> Cisco will be making free software available to
>> address
>>  this vulnerability for affected customers. There
>> are
>>  workarounds available to mitigate the effects of
>> the
>>  vulnerability.
>>
>> This advisory is posted at
>>
> http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht
>> tp.shtml.
>>
>> Affected Products
>> =================
>>
>> This security advisory applies to all Cisco products
>> that
>>  run Cisco IOS Software versions 11.0 through 12.4
>> with
>>  the HTTP server enabled. A system which contains
>> the IOS
>>  HTTP server or HTTP secure server, but does not
>> have it
>>  enabled, is not affected.
>>
>> To determine if the HTTP server is running on your
>>  device, issue the "show ip http server status" and
>> "show
>>  ip http server secure status" commands at the
>> prompt and
>>  look for output similar to:
>>
>>     Router>show ip http server status
>>     HTTP server status: Enabled
>>
>>
>> If the device is not running the HTTP server, you
>> should
>>  see output similar to:
>>
>>     Router>show ip http server status
>>     HTTP server status: Disabled
>>
>>
>> Any version of Cisco IOS prior to the versions which
>> will
>>  be listed in the Fixed Software section below may
>> be
>>  vulnerable.
>>
>> Cisco IOS XR is not affected.
>>
>> To determine the software running on a Cisco
>> product, log
>>  in to the device and issue the "show version"
>> command to
>>  display the system banner. Cisco IOS Software will
>>  identify itself as "Internetwork Operating System
>>  Software" or simply "IOS". On the next line of
>> output,
>>  the image name will be displayed between
>> parentheses,
>>  followed by "Version" and the IOS release name.
>> Other
>>  Cisco devices will not have the "show version"
>> command
>>  or will give different output.
>>
>> The following example identifies a Cisco product
>> running
>>  IOS release 12.3(6) with an installed image name of
>>  C3640-I-M:
>>
>>     Cisco Internetwork Operating System Software
>>     IOS (tm) 3600 Software (C3640-I-M), Version
>> 12.3(6),
>>  RELEASE SOFTWARE (fc3)
>>
>>
>> The next example shows a product running IOS release
>>  12.3(11)T3 with an image name of
>>  C3845-ADVIPSERVICESK9-M:
>>
>>     Cisco IOS Software, 3800 Software
>>  (C3845-ADVIPSERVICESK9-M), Version 12.3(11)T3,
>> RELEASE
>>  SOFTWARE (fc4) Technical Support:
>>  http://www.cisco.com/techsupport Copyright (c)
>> 1986-2005
>>  by Cisco Systems, Inc.
>>
>>
>> Additional information about Cisco IOS release
>> naming can
>>  be found at
>> http://www.cisco.com/warp/public/620/1.html.
>>
>> No other Cisco products are currently known to be
>>  affected by the vulnerability addressed in this
>>  advisory.
>>
>> Details
>> =======
>>
>> The Cisco IOS Web browser interface (which enables
>> the
>>  device to perform as an HTTP server) allows
>>  configuration and monitoring of a router or access
>>  server using any web browser. This feature was
>>  introduced in IOS 11.0.
>>
>> A vulnerability exists in the IOS HTTP server in
>> which
>>  HTML code inserted into dynamically generated
>> output,
>>  such as the output from a "show buffers" command,
>> will
>>
> === message truncated ===> From: Ernest Byaruhanga
> <[EMAIL PROTECTED]>
>> CC:
>> To: [EMAIL PROTECTED], Linux Users Group Uganda
>> <[email protected]>
>> Date: Fri, 02 Dec 2005 08:42:09 +0200
>> Subject: Re: [LUG]Ndugu Linux
>>
>>
>>
>> Robert K Lutaaya wrote the following on 12/01/2005
>> 08:48 PM:
>> > Chris Kasangaki of EACOSS is setting up Customised
>> Debian Kernel for
>> > Schools, Small Buisnesses, Civil Society
>> Organizations.
>>
>> what 'customizations' is he particulary putting in
>> the kernel?
>>
>> ernest
>>
>> > _______________________________________________
>> LUG mailing list
>> [email protected]
>> http://kym.net/mailman/listinfo/lug
>>
>
>
>
>
> __________________________________
> Start your day with Yahoo! - Make it your home page!
> http://www.yahoo.com/r/hs
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any
> way.
> ---------------------------------------
>
>
>
>
>

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to