Servlet chaining is what the Java web server will do, and it has nothing to
do with load balancing (that I can think of).
ipchains is the command to enable firewall/packet filter/packet masquerading
capability in linux. I would suppose that it can be used to round-robin
requests or something, but
opment, etc. where menus differ based on some
> criteria for users)
>
> --Jon Robison
>
>
> David Young wrote:
>>
>> fliptop wrote:
>>> Joe Breeden wrote:
>>>>
>>>> How does this work in an environment with two (or more) computers with the
>
Well, I didn't see any other replies to this... so I'll comment: I don't get
what you are saying here... Could you rephrase it and clarify if you are
talking about AuthTicket or AuthCookie?
> From: Steven Lembark <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> Date: Fri, 07 Dec 2001 01:34:57
I'd say "no". Uploading the file is a function of the browser and not under
your control.
> From: "El Capitan" <[EMAIL PROTECTED]>
> Reply-To: <[EMAIL PROTECTED]>
> Date: Mon, 3 Dec 2001 15:29:08 -0800
> To: <[EMAIL PROTECTED]>
> Subject: delayed file uploads...
>
> i have a simple question. im
This is not really a mod_perl question. Pop-up windows can only be created
using client-side scripting like Javascript. Your handler would need to
output the necessary Javascript to cause the pop, like:
url = "/pop/source.html";
name = "popwin";
h = 250;
w = 350;
var theWin =
There seems to be some confusion over exactly what we're talking about...
Apache::Session may work fine for creating a unique session ID, however this
thread has really been about how to ensure that a session hasn't been
hijacked. People have been suggesting various bits of info they could get
fr
As I mentioned before, if you dissect what they do with cookies and when,
you'll find they maintain two levels of session tracking, one for
"non-sensitive" personalization uses and one for "sensitive" authentication
uses. The URL session ID is likely only the former, and not exposing
anything sens
Yes I remember reading about this some time ago. Of course I am short on
specifics, but IIRC those were some sort of signature put in by ISPs who
were bundling IE, and the id transmitted only configuration info but not
specific user details.
> From: Stephen Adkins <[EMAIL PROTECTED]>
> Date: Fri,
fliptop wrote:
> Joe Breeden wrote:
>>
>> How does this work in an environment with two (or more) computers with the
>> exact same configuration, and probably the same HTTP_USER_AGENT behind the
>> same proxy? How do you know that one user isn't using another users session?
>
> you don't. the s
I don't think that really solves Joe's proposed problem. Joe wants to ensure
that the cookie is coming back from the client he sent it to. If you
generate a unique ID, someone can sniff the network, grab the cookie, and
send it as their own. The Eagle book does half-heartedly suggest IP address
as
This will not work all the time for all configurations. 80 is the default
port for http and 443 is the default port for https. However, just as you
may choose to run your http server on any port you wish, you may also choose
to run your https server on any port you wish.
> From: Rob Nagler <[EMAI
FWIW, Apache::CodeRed seemed like a good idea for a while, and then Nimbda
showed up, and it was apparent no one was actually doing anything about the
infected machines. I got sick of the notifications and the junk in my error
log, so I resorted to this handler:
SetHandler perl-script
Hey, it just so happens I was reading-up on the voluminous mod_perl
documentation out there, and it would appear I stumbled across the answer to
your problem:
http://perl.apache.org/dist/mod_perl_traps.html#Perl_Modules_and_Extensions
> From: Peter Pilsl <[EMAIL PROTECTED]>
> Date: Wed, 24 Oct 2
I had users complaining of intermittent "document contains no data" errors
when logging in (using AuthCookie). I wrote a script to repeatedly POST to
the AuthCookie LOGIN method. I am finding that after 15,000 POSTs or so, I
start getting a lot of segfaults (child pid 12494 exit signal Segmentatio
http://perl.apache.org/features/tmpl-cmp.html
- Original Message -
From: "Mike V. Andreev" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, August 23, 2001 11:28 AM
Subject: embedding perl code to html
>
> Hi!
>
> I have a tree of static html files and perl cgi-scripts. But s
Agreed, however I'd like to at least say "The username and/or password you
entered was not recognized".
> From: Ged Haywood <[EMAIL PROTECTED]>
> Date: Tue, 21 Aug 2001 00:36:33 +0100 (BST)
> To: David Young <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]
Before I tackle this myself, has anyone added functionality to AuthCookie so
that it will report *why* a user is being asked to login? Currently, if a
user enters in a wrong username or password, they just get redirected back
to the login form with no explanation.
Thanks,
--David
From: Mark Maunder <[EMAIL PROTECTED]>
> Perhaps we should just keep a central database of where the attempts are
> coming from.
> We could even extend it to work like the RBL - connects are not allowed from
> IP's that have attempted the exploit
Would that really help anything? The traffic woul
About 80% of the Code Red probes I get leave the message "Client sent
malformed header" in my error_log. Just curious if others are seeing this?
I agree with Vivek. With an URL in the format:
://:
The browser will use to connect to on . If you
don't specify , then the browser will pick the default for
, but if the server is not serving the specified on the
default , you won't get .
> From: Vivek Khera <[EMAIL PROTECTED]>
> Organizat
>From: "Rodney Broom" <[EMAIL PROTECTED]>
> From: David Young <[EMAIL PROTECTED]>
> DY> I've found that if I post to this PerlAccessHandler, I get no response:
> DY> $r->header_out(Location => "http://www.modperl.com/";);
&g
I've found that if I post to this PerlAccessHandler, I get no response:
#
package Apache::Redirect;
use strict;
use Apache::Constants qw(REDIRECT);
use CGI ();
sub handler {
my($r) = @_;
my $q = new CGI();
$r->header_out(Location => "http://www.modperl.
22 matches
Mail list logo