On Sun, 2016-05-22 at 04:05 +0100, Alessandro Re wrote:
> #!/usr/bin/sh
Is that a typo or an unusual filesystem?
Does your script run from the commandline
(as "/path/to/test.cgi", not as "sh test.cgi")?
--
Nick Kew
-
To unsu
Dear community,
I do not like to cross-post, but I cannot find a solution to this
problem (yes, I searched). The discussion started at [1], but I am
seeking help also here, because I cannot get what is wrong and I
cannot understand how to get more detailed error logs - so I thought
that a speciali
On Fri, May 20, 2016 at 7:09 PM, Kurtis Rader wrote:
> On Fri, May 20, 2016 at 4:00 PM, Roman Gelfand
> wrote:
>
>> Also, what does this mean?
>>
>
>> ::1 - - [20/May/2016:18:26:09 -0400] "OPTIONS * HTTP/1.0" 200 - "-"
>> "Apache/2.4.6 (Red Hat Enterprise Linux) PHP/5.4.16 (internal dummy
>> con
I am using Apache as a web and proxy server, but I am unhappy with
Apache as a WebDAV file server.
I am missing a good file permission or ACL configuration in Apache mod_dav.
My wishlist:
* "good/flexible" permission control (important)
* stable and secure (important)
* Apache >= 2.4 based
Hi folks,
I have a Python ornado base websocket application that listens on a
Unix domain socket. It was initially written to work with nginx as its
frontend webserver.
Now i'm trying to make it work with Apache but it seems that
mod_proxy_wstunnel is not meant to work with Unix domain sockets.
> Date: Saturday, May 21, 2016 09:22:24 -0400
> From: "D'Arcy J.M. Cain"
>
> On 5/20/16 4:00 PM, Roman Gelfand wrote:
>> In the last 2 days we have received roughly 1milion of the
>> following requests. Just to confirm, is this a DOS attack?
>>
>> 191.96.249.52 - - [20/May/2016:18:19:22 -0400]
On 05/21/2016 06:22 AM, D'Arcy J.M. Cain wrote:
victim but if the coders of these things were smart they would be
making real money with legitimate work.
Not always that simple. A lot of smart people have trouble getting hired.
As for the break-in attempt, there are enough common passwords th
On 5/20/16 4:00 PM, Roman Gelfand wrote:
> In the last 2 days we have received roughly 1milion of the following
> requests. Just to confirm, is this a DOS attack?
>
> 191.96.249.52 - - [20/May/2016:18:19:22 -0400] "POST /xmlrpc.php
> HTTP/1.0" 500 251 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Window