CFDIRECTORY filesystem interaction

2000-10-06 Thread Tim Lieberman

I have an administrative interface that uses CFDIRECTORY to rename and
delete directories.  It seems that NT won't allow those operations if
a web-user has caused the application to read any of the templates in
the directory in question within the past (apprx) 60 seconds, and CF
throws an error.

Is there a work-around for this?  

--
Archives: http://www.mail-archive.com/cf-talk@houseoffusion.com/
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



Re: How do you end a Session????

2000-04-13 Thread Tim Lieberman

At 01:19 PM 00/04/13 -0400, you wrote:
I'm trying to use session variables for unique users in my CF program, but
when i change users the session doesnt end.

1) What is the code to end a session?

I generally use StructClear(session).  Session variables are stored in a
structure.  That destroys that structure, and all session variables with it.  


2) Then, how would i incorporate the code to end the session by pressing a
"log off" button?

Have the link go to a page with something like:

cfset temp = StructClear(session)
cflocation url="homepage.html"


thanks,
Brian
---
FREE! The World's Best Email Address @email.com
Reserve your name now at http://www.email.com


---
---
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.


--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



Re: Show Of Hande

2000-04-06 Thread Tim Lieberman

I agree, it wouldn't be very hard for allaire to include a special,
reserved, application-scope variable which would point to a custom-tags
folder for that application.  I'd like to see that very much in a future
release.


At 01:29 PM 00/04/06 -0500, you wrote:

OK - (seriously) can I get a show of hands (via email) of those developers
who think the ability to specify the path to a custom tag would be a good
feature - specifically NOT using cf module...and here's why.

I like the ability to call a custom tag inside a site, while having that
sites/apps structure NOT rely on any specific hosting provider. So if I
create and or use custom tags and keep them in a central place for use
througout the site I need to use cfmodule and provide attributes.

My problem with this solution comes in the form of writing VTML dialog boxes
for easy implementation. The minute you call the tag in cfmodule and then
you want to go back and edit it (using the VTML dialog box, or tag insight
you wrote) you can't because the tag now is a cfmodule tag and thus uses
the
cfmodule VTML file..

Does anyone else see this as a problem???

Thanks
James

Thanks for your response Dan..
(I'm trying to get a quorum of developers - so I can pass this along to
Allaire and hopefully have it implemented on the next release - the majority
rules here folks, sqeeky wheel and all that...)
---
---
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.



Tim Lieberman   Take a break and have a listen, 
Electric Mind Control   Do It NOW:
Workshop  Funk Bakery  http://www.mp3.com/emcw 
--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



RE: Security holes revisited -- reward offered

2000-04-05 Thread Tim Lieberman

It's only extortion if there's a threat implied.  

Think of it this way:
1) If there is an exploitable hole, your box is insecure.
2) Assuming I don't cause any damage[*], all I'm doing is
alerting you to a security problem.  

It's not really ethical to do this, but it's not extortion either.  It's
more like a locksmith walking into your locked office at night, and leaving
a note that says: "Your locks suck - I was able to pick them in under 30
seconds.  Call me at number and we'll talk about getting you some real
security".

Yes he was trespassing, but it's not extortion.  Some might call it
"breaking and entering", but assuming the lock still functions (in what is
now recognized as a limited capacity), I wouldn't agree with the "breaking"
part.

Extortion would be, for example, if I hacked your box, deleted some
unimportant data, and said that if I didn't get paid, I'd come back and
delete some important stuff.  

[*] Some companies try to claim that someone breaking their security causes
damage in the form of losses to upgrade/update/fix their security.  This is
a fallacy, the hole was there before the 'hacker' exploited/called
attention to it.  


At 06:15 PM 00/04/05 -0400, you wrote:
Gee sounds like a classic mafia protection racket. Pay us or your business
will suddenly have some broken windows. Most places call this extortion.

 - Steve


-Original Message-
From: Jennifer [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, April 05, 2000 12:57 PM
To: [EMAIL PROTECTED]
Subject: Re: Security holes revisited -- reward offered


At 08:29 AM 4/5/00 -0500, you wrote:
So what do you guys think about part time hackers that attempt a breakin,
post general results on a website, and then ask for payment to fix your
problems?

---
---
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.



Tim Lieberman   Take a break and have a listen, 
Electric Mind Control   Do It NOW:
Workshop  Funk Bakery  http://www.mp3.com/emcw 
--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



RE: Security holes revisited

2000-04-05 Thread Tim Lieberman

At 07:32 PM 00/04/05 -0400, you wrote:
 Not to mention the fact that you don't actually have to utilize a
 vulnerability to know that it is there. Vulnerabilities all
 have signatures or characteristics that make them visible without
 doing anything illegal at all, unless you want to argue that having
 your router route traffic to the machine in question constitutes
 improper use of your private property. Anyway, there are numerous
 tools out there that will not only scan a machine for vulnerabilities
 and report back what they are, but also how they work, and how they
 can be fixed. In my opinion, this is like driving by a house with
 all the doors wide open and then leaving a note saying, "Hey, silly
 person! You left your doors wide open." As long as they don't take
 your TV or tell their friend to do so nothing has changed. I feel
 that a lot of the anger and rant following this sort of thing stems
 from pure embarrassment. Get over it and learn to tighten up the ship.
 If it's that critical it shouldn't be scannable to begin with.

This is one of the rare times I have to disagree with you. Not all
vulnerabilities are simply a matter of scanning, and scanning itself,
carried to its extreme, is an intrusion. Following your analogy, a complete
system scan (say all ports from 1-65k, attempts to communicate with IPC
listeners, OS/service identification, etc) wouldn't be like someone driving
by my house, but more like someone walking through my house and looking in
the clothes hamper! Even if they didn't touch anything, they've gone where
they shouldn't. I'm not the only one who feels this way: do some complete,
non-subtle port scans on federal or state government networks, and see how
long it takes for the hostmaster for your IP address range to get an email
(The answer: less than 10 minutes).


I disagree.  Your open ports are your "interface" to the world. Is it wrong
for me to test one port?  That's essentially what I'd do if I tried typing
http://yoursite.com/ in by browser.  Two, what if I fingered your box 
when I found we were[n't] running a webserver.  If one or two ports are
legit, why not three, four, ... or 65k?

Slippery slope, yes.  But you could make the argument that it's unethical
to try to connect to a machine on port 80 if it hasn't been "advertized" as
a web server.

I guess the best real-world analogy is walking through an office and 
turning door knobs to see which are or aren't locked.  Of course, real-world
analogies are pretty flawed, but this one isn't too bad.  To qualify for
"looking in the clothes hamper" status, I think you'd have to actually
comprimise the system to some degree.  You can't look in a hamper just
by trying the doorknob, and seeing what happens. 

Oh, and about the locksmith scenerio, let's rephrase it so he doesn't enter
and leave a note.  He picks the lock, opens the door (maybe not even), 
closes it, locks it, leaves, and calls later to leave voicemail.

One more thing, that probably should be it's own message, but seeing as this
has gone pretty far OT

In my original post, I neglected the "post publicly" clause.  I agree that
it's wrong to do that.  Locksmith putting up a sign in the yard is a good
analogy.  The proper thing to do (regarless of whether the initial survey
is proper or not) would be to contact a sysadmin discreetly.


I once discovered a CF site (see, on topic! almost) that was vulnerable to 
the ::$DATA IIS problem.  I took his index.cfm and emailed it to him, with
some explanation and a couple of links.  I recieved a nice thank you note,
which I thought was appropriate.  Your attitude makes me feel like I should 
have kept my mouth shut for fear of p[ros|ers]ecution. 


--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



RE: Security holes revisited

2000-04-05 Thread Tim Lieberman

It could be possible.  Consider a protocol that utilized public-key
encryption.  Every packet would have to be signed with the sender's private
key.  Of course, anonymity goes completely out the window, but faking
return-addresses would be impossible.  Faking return addresses seems to be
fairly essential to TCP/IP flavored DOS attacks.  

-Tim

At 08:50 PM 00/04/05 -0400, you wrote:
I'm not sure I follow. I know a decent amount about protocols and networking
and, to my knowledge, there is no way, at the protocol level, to stop a DoS
attack. I don't care how efficient the protocol is, if the server gets
overloaded with requests, it can't provide service to every request,
therefore service is denied (DoS). You can implement some QoS tools which
will allow you to selectively service certain requests or protocols and/or
use your router or firewall effectively but, again, these tools also have
limits which, when reached, prevent the servicing of further requests (DoS).

As a more digestible example, if you and all your co-workers try to retrieve
your email at the same time  then some of the requests will take longer than
others. You frequently hear people say things like, "the mail server is slow
today." What is happening is an unintentional denial or reduction of
service. Hmmm, using that example, what's it called if everyone in your
building flushes the toilet at the same time :)

Steve

-Original Message-
From: Jennifer [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, April 05, 2000 8:01 PM
To: [EMAIL PROTECTED]
Subject: RE: Security holes revisited


At 07:32 PM 4/5/00 -0400, you wrote:
  Finally, if you follow your
scanning example to its logical extreme, then denial of service attacks are
just fine; they don't take advantage of any target vulnerabilities.

That is not true. DOS does take advantage of a target vulnerability. The
vulnerability isn't on the attacked computer, but in http itself. Other
transfer protocols don't have this problem. Supposedly, there is one
available with basically the same capabilities as http but that doesn't
make sites vulnerable to DOS attacks. It is more private also, but the
industry as a whole would have to shift to it and I don't see that
happening any time soon.

--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.

---
---
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.



Tim Lieberman   Take a break and have a listen, 
Electric Mind Control   Do It NOW:
Workshop  Funk Bakery  http://www.mp3.com/emcw 
--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



Re: (admin) Re: Is HomeSite Soon To Be History?

2000-04-05 Thread Tim Lieberman

Products can't be under NDA - only people who signed NDAs can be under
NDAs.  Products are incapable of signing contracts.

Also, I have signed no such contract.  Therefore it ought to be legal for
me to talk about such a product whenever I want.  Perhaps the original
poster was under NDA, but that should hardly affect the rest of the list
population.  If Macromedia has a problem, they'll have to take it up with
whomever violated said NDA.

my 2c

-Tim

At 09:56 PM 00/04/05 -0400, you wrote:
Please note that this product is still under NDA from what I know and those
who are beta testing it should not be speaking about it on the list.
Anything that is under NDA should NEVER be posted to the list. The last
thing we all need is a company coming down on us for 'breaking' NDA.
 That being said, let me say that any 'press releases' like this should have
a header on the subject line announcing themselves as such.

 WTF? What's going on here? Using a listserv to SPAM the entire CF
community,
 and under the weak guise of a query into the viability of HomeSite? This
is
 quite lame. I hope that Mike does not allow this to continue.

 Steve

 -Original Message-
 From: WorldNet [mailto:[EMAIL PROTECTED]]
 Sent: Wednesday, April 05, 2000 8:54 PM
 To: CF-Talk
 Subject: Is HomeSite Soon To Be History?


 HomeSite is the best and most popular development tool around *but* is
 extremely vulnerable to the fact that developers can no longer afford to
 *not* also use a layout-page-code generator in conjunction with HomeSite
or
 ***as a total replacement*** to be 100% productive.

 It seems Macromedia has not been as asleep at the wheel and I wonder what
 the near future will bring...Consider this announcement from Macromedia...

 Macromedia announces code name UltraDev at Internet World today.

 What is UltraDev?
 Designed specifically for application development, UltraDev is a brand
 new product based on the Dreamweaver core architecture. UltraDev is
 the first solution to support ASP, JSP and CFML within a single design
 environment.

 Once UltraDev ships it will allow you to:

 1. Create professional web applications
 UltraDev provides everything you need to build, manage, and deploy
 dynamic, database-driven Web applications.

 2. Maintain total control over code
 UltraDev is the only product with visual and source editing for total
 control over source code.

 3. Connect easily to databases
 Quickly connect existing, static web pages to any ODBC, JDBC, or ADO
 database including Oracle, Sybase, Informix, Microsoft SQL Server and
 Microsoft Access.

 4. View server-side data in the workspace
 Save time and avoid repetitive tasks by viewing, testing, and editing
 live data returned from the application server in your workspace.

 5. Build for industry-standard servers
 UltraDev is the only solution that lets you build ASP, JSP, and Cold
 Fusion sites in one single design environment. Build sites for robust
 industry servers like Microsoft IIS, Allaire Cold Fusion, IBM
 Websphere, BEA WebLogic, and Netscape Enterprise Server.

 6. Create robust enterprise-ready Web applications
 Through extensibility, UltraDev integrates with other leading servers,
 Web applications and e-commerce solutions.


  UltraDev is NOT a replacement to Dreamweaver, it's a new standalone
 product built on the Dreamweaver core architecture.

 UltraDev IS the replacement to Drumbeat.  Macromedia is not planning
 to rev Drumbeat.

 UltraDev is expected to ship in June.


 FAQ
 What is the difference between Dreamweaver and UltraDev?
 Dreamweaver is a visual design solution for creating HTML web sites.
 While Dreamweaver is open to integrating with leading web application
 servers, it is not engineered for visually creating web applications.
 UltraDev was built specifically for creating dynamic Web applications
 using technologies like ASP, JSP, and CFML.

 What is the price of UltraDev?
 Macromedia has not yet announced pricing for UltraDev. However, it
 will be priced competitively with other Web application development
 environments.

 I am a Macromedia customer and I currently develop Web applications.
 Will I be able to purchase UltraDev for a special price?
 Yes, but you must register your Macromedia product to qualify for any
 special offer.

 Is UltraDev an add-on to Dreamweaver?
 No, it is a new stand-alone product that is designed to meet the
 specific needs of Web application developers.

 Does UltraDev replace Drumbeat?
 Yes. When UltraDev ships it will replace Drumbeat as Macromedia's
 solution for Web application development.

 Will there be an upgrade path from Drumbeat to UltraDev?
 Yes, registered users of Drumbeat will be offered an upgrade at a very
 competitive price.

 Will you continue to support Drumbeat?
 Yes, we will continue to provide Drumbeat technical support through
 the end of the year.

 Does this mean you won't be updating Drumbeat?
 Correct, UltraDev replaces Drumbeat as the Macromedia solution for
 creating