I keep coming across this issue on various deployment sites.
"Looks like you've followed a broken link or entered a URL that doesn't exist on this site."
I've searched through here so much that I figured I'd finally ask myself, since I never found a solution. Idk what I'm missing, and I'm happy to share screenshots if those will be any help. I just don't even know what to post/look for at this point
I tried many suggestions on here, and I was expecting some code that I was missing, or a step that I was missing. But I've been following suggestions and tutorials to a T and it's still not working, so I'm at a loss
Related
I'm a data analyst and first of all would like to thank you and your friends for a wonderful tool Tabula. I have been using it over the recent months periodically and during past week quite actively. And, suddenly the tool ran out of order. I even deleted it from my computer and downloaded again, however, could not resolve the problem.
One thing I hesitate caused a problem, is that I almost didn't delete previously imported files. Another cause may be the file names which were numerical. What do you think, could these be reasons for a trouble or not and how can I revive it?
Thank you in advance.
Best regards,
Karine.
I have a program that can find sites that are exploitable and exploit them, I posted this on my Github and people started using it. I recently have been contacted by an owner of one of the websites (my email address is there for troubleshooting issues) who was extremely upset about their website being exploited, and found using my tool.
Is there a license, thing to say (disclaimer), or something I can do to make it so that when someone uses my tool, if they exploit something, it doesn't fall back on me?
I'm thinking that since I created the tool, it would come back to haunt me ultimately, even though I am not able to control others actions. Any help with this would be appreciated, thank you.
I think a standard MIT license covers that:
link
Read the last part.
I wrote a pam_module whichs does a couple of things and became to huge to post any code here. It basically works similar to pam_abl but with a couple of additional features like City/Country based blocking as well as checking with a dns blacklist.
Now I want to give the user a reason why his login was not successful. Something like: login failed because your country is blocked.
I hope you get the idea. Although I did some research I did not find a possibility yet to do this in pam_auth. I hope someone can give me a hint and/or lead me in the right direction. Thanks in advance.
Edit: For anyone else with a similar problem: pam_info is what you are looking for.
Source code of pam_motd(8) or should give you some idea how to write back to the user.
Actually, there is function pam_info(3), which does exactly what you want.
I'm having almost the identical problem as here. Unfortunately this question provides no solutions. I'm using strictly HTTPS and still have the problem. I've tried all I can think of: Session.checkAgent=false, Session.cookieTimeout=0, Security.level=low, etc. I cannot re-produce the problem in any way, however, a small portion of our customers are complaining that their session is being lost. I don't know any way to debug and/or determine how/where the session is being destroyed. I don't know what else to do, can anyone help? I'm using CakePHP 2.4.5 and can upgrade to 2.5.5, but would like to determine what the issue is so I can have peace of mind that it has been fixed.
This may help
Configure::write('Session.referer_check' ,false);
But before putting that into production, you should know how it may affect your security.
The only real way to fix this is if you can reproduce it.
can someone pls tell me how bad the found malcode in one of my webserver is ?
I found it in public_html/outlet.
here is the code pastebin
i deleted the directory and try now to search my logs.
thanks for your answer
tango2000
It isn't evident how bad it is. However, the real bad part is that they were able to inject code into your server.
Since you don't know how did they do it, it doesn't matter that you deleted the folder that contained the script. The vulnerability is still there and they will hack you again eventually.