Gå til innhold

Webkafeen


Anbefalte innlegg

Videoannonse
Annonse

Flott arbeid, hva med mulighet for flere mapper i ett album?

Og kommer du til å offentligjøre kode slik at andre kan ta det i bruk?

8788649[/snapback]

 

GPL? :innocent:

8788660[/snapback]

Scriptet er jo 100% manuelt. Det er ikke noe hokus-pokus-php-involvert her. Alle thumbnails må lages manuelt og alle HTML-koder.

 

Så, scriptet står der. Use and abuse, I don't care :p. Eller kanskje ta med danielforsbakk.com :p

8793770[/snapback]

 

ZOMG, I MUST COPY JUR GALARI AS I DID EARLIAR!!

 

Lookin' good DaNIeL.

Lenke til kommentar
Er det mulig å tvinge nettleseren til å lese en side i ISO-8859-1 charsett i stede for UTF-8?

8794120[/snapback]

 

PHP:

PHP

<?php

header('Content-Type: text/html; charset=ISO-8859-1');

?>

HTML

<html>
 <head>
    <meta http-equiv="Content-Type" content=" text/html; charset=ISO-8859-1">
    <!-- ..... ->
 </head>
<!-- .... ->
</html>

Endret av Shadows0
Lenke til kommentar
Er det mulig å tvinge nettleseren til å lese en side i ISO-8859-1 charsett i stede for UTF-8?

8794120[/snapback]

 

PERL:

print "Content-Type: text/html; charset=ISO-8859-1\n\n";

 

Python bruker samme som perl, bare fjern ";" på slutten.

 

Java:

resource.setContentType ("text/html;charset=ISO-8859-1");

 

JSP:

<%@ page contentType="text/html; charset=ISO-8859-1" %>

 

ASP/ASP.NET:

<%Response.charset="ISO-8859-1"%>

Endret av DemoniZer
Lenke til kommentar
Klar over at dette blir litt 2.0, men tror ikke at en refleksjon kunne passet bedre til foretaksnavnet dog :)

 

Eieren ville ha x'en i fokus, samt en stilrent look.

8794475[/snapback]

Hvilken font er det? :)

8794852[/snapback]

 

Det er Steelfish, om jeg husker riktig :)

Lenke til kommentar

Dreamhost: Good luck, have fun.

 

 

 

Hello -

 

This email is regarding a potential security concern related to your

'******' FTP account.

 

We have detected what appears to be the exploit of a number of

accounts belonging to DreamHost customers, and it appears that your

account was one of those affected.

 

We're still working to determine how this occurred, but it appears

that a 3rd party found a way to obtain the password information

associated with approximately 3,500 separate FTP accounts and has

used that information to append data to the index files of customer

sites using automated scripts (primarily for search engine

optimization purposes).

 

Our records indicate that only roughly 20% of the accounts accessed -

less than 0.15% of the total accounts that we host - actually had

any changes made to them. Most accounts were untouched.

 

We ask that you do the following as soon as possible:

 

1. Immediately change your FTP password, as well as that of any other

accounts that may share the same password. We recommend the use of

passwords containing 8 or more random letters and numbers. You may

change your FTP password from the web panel ("Users" section, "Manage

Users" sub-section).

 

2. Review your hosted accounts/sites and ensure that nothing has been

uploaded or changed that you did not do yourself. Many of the

unauthorized logins did not result in changes at all (the intruder

logged in, obtained a directory listing and quickly logged back out)

but to be sure you should carefully review the full contents of your

account.

 

Again, only about 20% of the exploited accounts showed any

modifications, and of those the only known changes have been to site

index documents (ie. 'index.php', 'index.html', etc - though we

recommend looking for other changes as well).

 

It appears that the same intruder also attempted to gain direct

access to our internal customer information database, but this was

thwarted by protections we have in place to prevent such access.

Similarly, we have seen no indication that the intruder accessed

other customer account services such as email or MySQL databases.

 

In the last 24 hours we have made numerous significant behind-the-

scenes changes to improve internal security, including the discovery

and patching to prevent a handful of possible exploits.

 

We will, of course, continue to investigate the source of this

particular security breach and keep customers apprised of what we

find. Once we learn more, we will be sure to post updates as they

become available to our status weblog:

 

    http://www.dreamhoststatus.com/

 

Thank you for your patience. If you have any questions or concerns,

please let us know.

 

- DreamHost Security Team

 

Lenke til kommentar
Alt stresset du har hatt med Dreamhost, og den tidligere der alt du hadde ble slettet

8795079[/snapback]

Hm, stemmer. Dritt, altså.

Berre sytten minutt til eg får testa om Macbooken tåler Pirates of the Caribbean 2 i 1080p på ein 40" ekstern. Joy.

Endret av Henrik Lied
Lenke til kommentar

Opprett en konto eller logg inn for å kommentere

Du må være et medlem for å kunne skrive en kommentar

Opprett konto

Det er enkelt å melde seg inn for å starte en ny konto!

Start en konto

Logg inn

Har du allerede en konto? Logg inn her.

Logg inn nå
×
×
  • Opprett ny...