Catch up on stories from the past week (and beyond) at the Slashdot story archive
Nickname:
Password:
Only cpanel apaches vulnerable and modified httpd easily found by grep'ing a string?
*yawn*
Yeah, and I'm sure you could fix it with an apropriate hosts file.
Or a Privoxy rule: [Redacted] (Your comment violated the "postercomment" compression filter. Try less whitespace and/or less repetition.)
Doh. It's not like commenters on a nerd site want to post code-like text that may contain repetition.
Try appending a host file. That way the filter doesn't think it's spam.... only the readers do.
Is redirection to ::1 all the rage for hosts files these days? I'm out of touch.
There may be more comments in this discussion. Without JavaScript enabled, you might want to turn on Classic Discussion System in your preferences instead.
Often statistics are used as a drunken man uses lampposts -- for support rather than illumination.
doesn't look so scary (Score:5, Insightful)
Only cpanel apaches vulnerable and modified httpd easily found by grep'ing a string?
*yawn*
Re: (Score:5, Funny)
Yeah, and I'm sure you could fix it with an apropriate hosts file.
Re: (Score:1)
Doh. It's not like commenters on a nerd site want to post code-like text that may contain repetition.
Re:doesn't look so scary (Score:-1)
Or a Privoxy rule: [Redacted] (Your comment violated the "postercomment" compression filter. Try less whitespace and/or less repetition.)
Doh. It's not like commenters on a nerd site want to post code-like text that may contain repetition.
Try appending a host file. That way the filter doesn't think it's spam.... only the readers do.
Re: (Score:2)
Is redirection to ::1 all the rage for hosts files these days? I'm out of touch.