Russ,
> On Sun, 12 Jun 2011, Mike Williams wrote:
>
> > Do you edit rewrite rules for every access that would
> > otherwise be a 404 and change it to a 301? If so, what do
> > you redirect them to, and why? Sounds like a lot of work.
>
> This was covered by me in a blog post some time ago, as t
On Wed, Jun 1, 2011 at 12:57 PM, wrote:
> I am stuck taking this stupid online training course from work. It just
> sits there doing nothing with firefox, so I pulled up konqueror, and tell
> it to lie and say it's IE. That works... until it gets to the content,
> which some HR moron is *positive
On Sun, 12 Jun 2011, Mike Williams wrote:
> Do you edit rewrite rules for every access that would
> otherwise be a 404 and change it to a 301? If so, what do
> you redirect them to, and why? Sounds like a lot of work.
This was covered by me in a blog post some time ago, as to my
approach:
On Sun, Jun 12, 2011 at 3:19 PM, Jason wrote:
>> When you see attempts to fetch things that are not installed on your
>> system it is usually someone up to no good.
> Well, I was creating ReWrite rules and directing to 301 when something came
> in that was not on my system, but it does involve al
> On Sun, Jun 12, 2011 at 1:49 PM, ken (mailto:geb...@mousecar.com)> wrote:
> > That's interesting and useful in its way. But I'd prefer to use the
> > same scripts used by the actual crackers/bots. Not only would I be able
> > to test my sites with them, but I'd be able to recognize the
> > prob
> On Sun, Jun 12, 2011 at 1:49 PM, ken (mailto:geb...@mousecar.com)> wrote:
> > That's interesting and useful in its way. But I'd prefer to use the
> > same scripts used by the actual crackers/bots. Not only would I be able
> > to test my sites with them, but I'd be able to recognize the
> > prob
On Sun, Jun 12, 2011 at 1:49 PM, ken wrote:
> That's interesting and useful in its way. But I'd prefer to use the
> same scripts used by the actual crackers/bots. Not only would I be able
> to test my sites with them, but I'd be able to recognize the
> probes/attacks when they appear in logs as
On 06/12/2011 10:21 AM Barry Brimer wrote:
>>> So my guess is they're fuzzing/scanning for potential weaknesses in
>>> jQuery...
>>
>> For those managing web sites it would be good to acquire such scripts
>> and run them in pre-production as system tests. So where do we get
>> scripts such as the
>> So my guess is they're fuzzing/scanning for potential weaknesses in
>> jQuery...
>
>
> For those managing web sites it would be good to acquire such scripts
> and run them in pre-production as system tests. So where do we get
> scripts such as the one run against Jason's site?
I don't know if
On 06/11/2011 10:42 PM st...@echo.id.au wrote:
> On Sat, Jun 11, 2011 at 06:14:36PM -0700, Jason wrote:
>> Hi All,
>>
>> My Logwatch was very long today with 404 requests to the Apache
>> server. I dont understand what the person was trying to do by what
>> they were attempting to access. Can anyo
On Sun, 12 Jun 2011, Alexander Farber wrote:
> does anybody know of a good source for a apr-util-pgsql rpm package
> for CentOS 5.6 / 64 bit and even more I'm curious why isn't it included
> but the apr-util-mysql is included...
I seem to have one built on a CentOS 5 platform, although I do
not
On Sun, Jun 12, 2011 at 10:09:54AM +0200, Alexander Farber wrote:
> Hello,
>
> does anybody know of a good source for a apr-util-pgsql rpm package
> for CentOS 5.6 / 64 bit and even more I'm curious why isn't it included
> but the apr-util-mysql is included...
Sorry, just realised I was getting m
On Sun, Jun 12, 2011 at 10:09:54AM +0200, Alexander Farber wrote:
> Hello,
>
> does anybody know of a good source for a apr-util-pgsql rpm package
> for CentOS 5.6 / 64 bit and even more I'm curious why isn't it included
> but the apr-util-mysql is included...
Disclaimer: you might want to wait f
Hello,
does anybody know of a good source for a apr-util-pgsql rpm package
for CentOS 5.6 / 64 bit and even more I'm curious why isn't it included
but the apr-util-mysql is included...
Thank you
Alex
___
CentOS mailing list
CentOS@centos.org
http://list
14 matches
Mail list logo