Designing sites ranges from as low as 200,000/= to as much as 10,000,000/= even more. It is determined by:
1. Whom you approach 2. What functionalities you need 3. Levels of complexity especially when it comes to issues like database integration etc. Can you give us a better picture of what you need? Wire > hey Lug, can you guys give me the local average price > estimates for website design and maintenance? > > --- [EMAIL PROTECTED] wrote: > >> Send LUG mailing list submissions to >> [email protected] >> >> To subscribe or unsubscribe via the World Wide Web, >> visit >> http://kym.net/mailman/listinfo/lug >> or, via email, send a message with subject or body >> 'help' to >> [EMAIL PROTECTED] >> >> You can reach the person managing the list at >> [EMAIL PROTECTED] >> >> When replying, please edit your Subject line so it >> is more specific >> than "Re: Contents of LUG digest..." >> > Today's Topics: >> >> 1. Re: Mail admins wanted @yahoo! (McTim) >> 2. Re: [LUG]Ndugu Linux (Robert K Lutaaya) >> 3. Fwd: [c-nsp] Cisco Security Advisory: IOS HTTP >> Server Command >> Injection Vulnerability (Mark Tinka) >> 4. Re: [LUG]Ndugu Linux (Ernest Byaruhanga) >> > From: McTim <[EMAIL PROTECTED]> >> To: Linux Users Group Uganda <[email protected]> >> Date: Thu, 1 Dec 2005 12:09:18 +0300 >> Subject: Re: [LUG] Mail admins wanted @yahoo! >> >> On 12/1/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> >> wrote: >> > Sorbs is one of the most annoying Black lists I >> have had the displeasure of >> > encountering. You need to make some sort of >> "donation" of $50 to get off the >> > blacklist and you can get on it for no apparent >> reason. >> >> It is not a blacklist but more like blackmail (pun >> intended) >> >> I long ago made the >> > conclusion that anyone who uses Sorbs has no >> business getting mail from me >> > anyway! >> >> unfortunately, you can be Sorbed withut "using >> Sorbs" ;-( >> >> -- >> Cheers, >> >> McTim >> $ whois -h whois.afrinic.net mctim >> >> > From: "Robert K Lutaaya" <[EMAIL PROTECTED]> >> To: "Linux Users Group Uganda" <[email protected]> >> Date: Thu, 1 Dec 2005 21:48:03 +0300 (EAT) >> Subject: Re: [LUG]Ndugu Linux >> >> >> Chris Kasangaki of EACOSS is setting up Customised >> Debian Kernel for >> Schools, Small Buisnesses, Civil Society >> Organizations. >> >> You are all welcome to join the project. >> >> Robert >> >> >> >> >> On Thu, December 1, 2005 11:41 am, Ronny said: >> > At least 90% of families in Ug if not Africa have >> lost a member to the >> > pandemic.Can't forget this day.Good talent has >> been lost thank God we >> > still living but pray /"the deadly cron will be >> killed" hope you do get >> > that. >> > /Amazingly as usual Linux is in the fight against >> it :-\ >> > >> > --------------------------------------------------------------------------------- >> > Researchers at the University at Buffalo, the >> State University of New >> > York, have fired up a 2,000-node, 4,000 processor >> Linux cluster and hope >> > the cluster's help in studying the human genome >> will lead to >> > breakthroughs in the treatment of cancer, >> Alzheimer's and AIDS. >> > >> > http://os.newsforge.com/article.pl?sid=02/09/10/1516202&tid=2&tid=60&tid=16&tid=31 >> > >> > Yos >> > Ronny >> > >> > -- >> > >> > ******************************************************************* >> > PGP Fingerprint: 6695 794A B84E D922 88FB 73CC >> 6CBD 8036 B3CD 7304 >> > We can't become what we need to be by remaining >> what we are >> > >> > ******************************************************************* >> > >> > >> > >> > _______________________________________________ >> > LUG mailing list >> > [email protected] >> > http://kym.net/mailman/listinfo/lug >> > %LUG is generously hosted by INFOCOM >> http://www.infocom.co.ug/ >> > >> > The above comments and data are owned by whoever >> posted them (including >> > attachments if any). The List's Host is not >> responsible for them in any >> > way. >> > --------------------------------------- >> > >> > >> >> >> Robert K Lutaaya >> 075-808889 >> 041-223 802 >> EACOSS >> >> >> >> > From: Mark Tinka <[EMAIL PROTECTED]> >> To: "Linux Users Group Uganda" <[email protected]> >> Date: Thu, 1 Dec 2005 23:59:27 -0500 >> Subject: [LUG] Fwd: [c-nsp] Cisco Security Advisory: >> IOS HTTP Server Command >> Injection Vulnerability >> >> FYI. >> >> Mark. >> >> ---------- Forwarded Message ---------- >> >> Subject: [c-nsp] Cisco Security Advisory: IOS HTTP >> Server >> Command Injection Vulnerability >> Date: Friday 02 December 2005 00:43 >> From: Cisco Systems Product Security Incident >> Response >> Team <[EMAIL PROTECTED]> >> To: [EMAIL PROTECTED] >> Cc: [EMAIL PROTECTED] >> >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> >> Cisco Security Advisory: IOS HTTP Server Command >> Injection Vulnerability >> >> > ======================================================== >> ================ >> >> Document ID: 68322 >> >> Advisory ID: cisco-sa-20051201-http >> >> > http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht >> tp.shtml >> >> Revision 1.0 >> >> For Public Release 2005 December 01 2100 UTC (GMT) >> >> - >> >> > -------------------------------------------------------- >> --------------- >> >> Contents >> ======== >> >> Summary >> Affected Products >> Details >> Impact >> Software Versions and Fixes >> Workarounds >> Obtaining Fixed Software >> Exploitation and Public Announcements >> Status of This Notice: INTERIM >> Distribution >> Revision History >> Cisco Security Procedures >> >> - >> >> > -------------------------------------------------------- >> --------------- >> >> Summary >> ======= >> >> A vulnerability exists in the IOS HTTP server in >> which >> HTML code inserted into dynamically generated >> output, >> such as the output from a "show buffers" command, >> will >> be passed to the browser requesting the page. This >> HTML >> code could be interpreted by the client browser and >> potentially execute malicious commands against the >> device or other possible cross-site scripting >> attacks. >> Successful exploitation of this vulnerability >> requires >> that a user browse a page containing dynamic >> content in >> which HTML commands have been injected. >> >> Cisco will be making free software available to >> address >> this vulnerability for affected customers. There >> are >> workarounds available to mitigate the effects of >> the >> vulnerability. >> >> This advisory is posted at >> > http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht >> tp.shtml. >> >> Affected Products >> ================= >> >> This security advisory applies to all Cisco products >> that >> run Cisco IOS Software versions 11.0 through 12.4 >> with >> the HTTP server enabled. A system which contains >> the IOS >> HTTP server or HTTP secure server, but does not >> have it >> enabled, is not affected. >> >> To determine if the HTTP server is running on your >> device, issue the "show ip http server status" and >> "show >> ip http server secure status" commands at the >> prompt and >> look for output similar to: >> >> Router>show ip http server status >> HTTP server status: Enabled >> >> >> If the device is not running the HTTP server, you >> should >> see output similar to: >> >> Router>show ip http server status >> HTTP server status: Disabled >> >> >> Any version of Cisco IOS prior to the versions which >> will >> be listed in the Fixed Software section below may >> be >> vulnerable. >> >> Cisco IOS XR is not affected. >> >> To determine the software running on a Cisco >> product, log >> in to the device and issue the "show version" >> command to >> display the system banner. Cisco IOS Software will >> identify itself as "Internetwork Operating System >> Software" or simply "IOS". On the next line of >> output, >> the image name will be displayed between >> parentheses, >> followed by "Version" and the IOS release name. >> Other >> Cisco devices will not have the "show version" >> command >> or will give different output. >> >> The following example identifies a Cisco product >> running >> IOS release 12.3(6) with an installed image name of >> C3640-I-M: >> >> Cisco Internetwork Operating System Software >> IOS (tm) 3600 Software (C3640-I-M), Version >> 12.3(6), >> RELEASE SOFTWARE (fc3) >> >> >> The next example shows a product running IOS release >> 12.3(11)T3 with an image name of >> C3845-ADVIPSERVICESK9-M: >> >> Cisco IOS Software, 3800 Software >> (C3845-ADVIPSERVICESK9-M), Version 12.3(11)T3, >> RELEASE >> SOFTWARE (fc4) Technical Support: >> http://www.cisco.com/techsupport Copyright (c) >> 1986-2005 >> by Cisco Systems, Inc. >> >> >> Additional information about Cisco IOS release >> naming can >> be found at >> http://www.cisco.com/warp/public/620/1.html. >> >> No other Cisco products are currently known to be >> affected by the vulnerability addressed in this >> advisory. >> >> Details >> ======= >> >> The Cisco IOS Web browser interface (which enables >> the >> device to perform as an HTTP server) allows >> configuration and monitoring of a router or access >> server using any web browser. This feature was >> introduced in IOS 11.0. >> >> A vulnerability exists in the IOS HTTP server in >> which >> HTML code inserted into dynamically generated >> output, >> such as the output from a "show buffers" command, >> will >> > === message truncated ===> From: Ernest Byaruhanga > <[EMAIL PROTECTED]> >> CC: >> To: [EMAIL PROTECTED], Linux Users Group Uganda >> <[email protected]> >> Date: Fri, 02 Dec 2005 08:42:09 +0200 >> Subject: Re: [LUG]Ndugu Linux >> >> >> >> Robert K Lutaaya wrote the following on 12/01/2005 >> 08:48 PM: >> > Chris Kasangaki of EACOSS is setting up Customised >> Debian Kernel for >> > Schools, Small Buisnesses, Civil Society >> Organizations. >> >> what 'customizations' is he particulary putting in >> the kernel? >> >> ernest >> >> > _______________________________________________ >> LUG mailing list >> [email protected] >> http://kym.net/mailman/listinfo/lug >> > > > > > __________________________________ > Start your day with Yahoo! - Make it your home page! > http://www.yahoo.com/r/hs > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any > way. > --------------------------------------- > > > > > _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
