Are you certain that this will suit your security needs? HTTP_REFERRER is
easy to spoof...
On Mon, Dec 24, 2012 at 5:10 PM, Andrey Utkin
andrey.krieger.ut...@gmail.com wrote:
I need to control access to particular directory with following logics:
if HTTP_REFERER is certain site (but not
I recommend mailing from a different domain name. 12 letter domain is
still considered to be a significant indicator by the makers of
spamassassin.
-w
On Thu, Aug 2, 2012 at 3:35 PM, Ben Johnson b...@indietorrent.org wrote:
On 7/26/2012 5:28 PM, Ben Johnson wrote:
The returned message:
RJ,
What am I doing wrong in the configuration?
Can you share with us a bit of your configuration?
Thanks
- Wade
On Thu, Dec 8, 2011 at 11:16 AM, R J rjoshi.subscripti...@gmail.com wrote:
Hi,
I am new to httpd. I am using httpd and mod_jk for load balancing. I am
running it under
If all you want to do is run PHP scripts to service AJAX requests, why not
load the php module, set the type handler, and move on to a more
interesting problem?
-w
On Wed, Nov 23, 2011 at 12:22 PM, Tim Streater t...@clothears.org.uk wrote:
I'm looking at how apache is set up under OS X Lion
, Tim Streater t...@clothears.org.uk wrote:
On 23 Nov 2011 at 20:39, Wade Evans wade.p.ev...@gmail.com wrote:
If all you want to do is run PHP scripts to service AJAX requests, why
not
load the php module, set the type handler, and move on to a more
interesting problem?
To me, in my present
Yay!
On Wed, Nov 23, 2011 at 3:02 PM, Tim Streater t...@clothears.org.uk wrote:
On 23 Nov 2011 at 21:45, Wade Evans wade.p.ev...@gmail.com wrote:
My naive recommendation is to stop using CGI, and use the PHP module
instead... to swim with the current, not against it.
Wade,
Thanks
That is a browser error message, not something from the web server.
Firefox has historically had problems with spurious error messages on
images being caused by plug-ins and extensions.
I suggest trying with curl, wget, or another browser before focusing on
apache. I run apache 2.2 under
Hugo,
If you are allowing users to upload files, and you also have content type
handlers and activated modules for executing scripts, you are creating a big
window of opportunity for your site to get hacked.
In the specific example you cite (PHP), you can do something about it by
focusing on the