Ravens PHP Scripts: Forums
Forum Index • Forum FAQ • Search • Memberlist • Usergroups • Profile • Log in to check your private messages • Log in |
Search found 50 matches |
Ravens PHP Scripts And Web Hosting Forum Index |
Author | Message |
---|---|
Topic: need user documentation for user documenation! | |
steve1 Replies: 5 Views: 8930 ![]() |
![]() |
well dont mix up things,i asume you mean the sentinel userguide...
Yes, Sentinel user guid. |
|
Topic: how to import a lot of ip's | |
steve1 Replies: 16 Views: 22357 ![]() |
![]() |
okay okay....ive got like 4 files...thats about 4mb....lol
You can have that to steve,and if you ask nice at the nukecops forum they will provide you even more... ![]() hiwalker, I hope you are j ... |
|
Topic: Some considerations | |
steve1 Replies: 4 Views: 10384 ![]() |
![]() |
I have some recommendations for future versions (otherwise excellent product!):
-do NOT use stristr -- you kill all php4 installs, just implement a stristr_clone function like phpnuke 7.7 does... o ... |
|
Topic: need user documentation for user documenation! | |
steve1 Replies: 5 Views: 8930 ![]() |
![]() |
Thanks hitwalker,
Sentinel is working fine for me. I just basically need to see user doc. Are you saying that is a module, and has to be installed as a module? (I did not realize that). steve |
|
Topic: how to import a lot of ip's | |
steve1 Replies: 16 Views: 22357 ![]() |
![]() |
Hi,
Can someone please tell me how to import a lot of ip's into sentinel. Specially when I visit nukecops, they have a whole bunch of ip's to ban. I like to just cut and past those into sentinel. ... |
|
Topic: Some considerations | |
steve1 Replies: 4 Views: 10384 ![]() |
![]() |
I have some recommendations for future versions (otherwise excellent product!):
-do NOT use stristr -- you kill all php4 installs, just implement a stristr_clone function like phpnuke 7.7 does... o ... |
|
Topic: need user documentation for user documenation! | |
steve1 Replies: 5 Views: 8930 ![]() |
![]() |
Hi,
I downloaded user documentation and try to run it using index.php. It says module not active. Help, I need user doc on running user docs. Thanks, steve |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
Don't really know what to do about AOL. I think I will just watch what's happening.
As far as automated lookups, it is not necessary until there is a lot of attack, otherwise as you say, URL will ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
Protector system (which I use) already has the feature of informing someone coming thru banned ip's, so I am not worried about that personally.
What is of interest to me is banning someone who come ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
sixonetonoffun, nice job. My question is at this point: what are we going to do with the ip range. Are we banning the whole range?
I think I would need geo information. If the IP is from certai ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
sixonetonoffun, reading your post again, I think the additional functionality that you are talking about ARE GREAT.
I would like to suggest that they be included within Protector. Protector is 99% ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
sixonetonoffun, I am working within the confines of Protector, so I did not have the luxury of a fancy banning system, the way you described. So in my model, you either get banned or get a warning. ... | |
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
I have released ptap version 1.0 which implements the function described here.
http://www.nukecops.com/postp114384.html#114384 |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
You'd have to make it something like
if($protector = true) or did I miss protector getting added to the official distro? But I like the idea ![]() True, the function will internally check for exis ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
Well, to make it more clear, I am asking people who write secruity patches to implement something like this in their code. This is a programming discipline:
So for example, right now we do: Code ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
Function protector_alert($comment, $type, $arg, $severity_level)
input parameters: $comment: security codes comments e.g. "hack happened xyz..." $type: 0=url 1=Get 2=Post 3=Union .. $arg: ur ... |
|
Topic: Standard Security API | |
steve1 Replies: 21 Views: 20218 ![]() |
![]() |
I am interested in your feedback on this. I am thinking about a standard function that all security patches would implement. So instead of doing a "die" upon a hack attemp, the script would call a s ... | |
Topic: Building a better mousetrap | |
steve1 Replies: 42 Views: 49260 ![]() |
![]() |
Hi, Mick
I would say that is a nice improvement ![]() My dev env ... |
|
Topic: Building a better mousetrap | |
steve1 Replies: 42 Views: 49260 ![]() |
![]() |
good. I don't know why since I don't have this problem. You can test if your old cache was initialized just before your user code snippet by putting in something like this:
if (isset($C ... |
|
Topic: Building a better mousetrap | |
steve1 Replies: 42 Views: 49260 ![]() |
![]() |
ok, you did the first part right. Now somehow your cache is not initializing properly (the stuff in mainfile.php).
So we can try this. Just before the code that you just changed, initialize a new ... |
|
Topic: Building a better mousetrap | |
steve1 Replies: 42 Views: 49260 ![]() |
![]() |
Paul, this code assumes that your cache is already set up (via the code snippet starting with NUKER... which I believe you have done).
Now I see that you are replacing 5 lines. Try to replace only ... |
|
Topic: SQL Injections be gone! | |
steve1 Replies: 11 Views: 10134 ![]() |
![]() |
sure, I will do this anyways.
As far as sql injection, I grep'ed for mysql_query, and found the following: backup.php ** forums.php ** mysql.php mysql4.php sql_layer.php I am only running ... |
|
Topic: SQL Injections be gone! | |
steve1 Replies: 11 Views: 10134 ![]() |
![]() |
On second thought, there is only one way to query mysql, mysql_query... so it would be easy to grep all the occurances of this throughout your code, and replease it with a function that traps the call ... | |
Topic: SQL Injections be gone! | |
steve1 Replies: 11 Views: 10134 ![]() |
![]() |
While I agree conceptually here, enforcing is impossible. You, as the webmaster, will have to modify probably most of the addons for compliance. Not everyone users the abstration layer. Maintenance ... | |
Topic: SQL Injections be gone! | |
steve1 Replies: 11 Views: 10134 ![]() |
![]() |
There is a function called like this:
message_die(GENERAL_ERROR, $msg, '', __LINE__, __FILE__, $sql); It is just a matter of making sure there is a conditional insider the function that does not ... |
|
Ravens PHP Scripts And Web Hosting Forum Index Goto page 1, 2 Next |
Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours