Advertisement
-
Posts
5,256 -
Joined
-
Last visited
-
Days Won
699
Content Type
Profiles
Forums
Downloads
Bugs
WF Feature Plan
Suggestions
WebFlake Release Notes
FAQ
Store
Blogs
Applications
Ideas
Everything posted by Tony
-
Ip.Downloads files uploading problem
Tony replied to mr.freakout's question in Invision Answered Questions
From what I can see, it likely didn't finish uploading.. (you're using the flash uploader). -
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.
-
Not always true.. I've been using GoDaddy for years (multiple domains).. and I'm also an affiliate/partner.
-
It's an application... download it, upload the necessary files, install it, and configure it. You can also use the tutorial posted by Sanctuary a few moments ago, to hard-code it:
-
How to add user group css as seen on SkinBox.net?
Tony replied to a question in Invision Answered Questions
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic. -
It's entirely necessary for users who haven't upgraded their Shoutbox app, or for those who continue to use IPB 3.3.4 (a version the latest copy of IP.Shoutbox is not compatible with).
-
To an advanced webmaster, this guide is redundant. To an aspiring webmaster, this guide will outline the most common web page errors you may encounter. HTTP status codes are three-digit numbers that provide Web browsers with information about the page's status. You might see some of these errors while browsing the Internet, or you might have received them in your own hosting account. Here's a quick list to help you understand the most common error codes with suggestions for what to do to fix the error: 400 — Bad Request The Web server couldn't parse a malformed script. Most often, programming problems cause this issue. You should talk to your developer or software provider for help resolving this issue. 401 — Authentication Required This page requires a user name and password to access it. If you try to access it without it, you get a 401 — Authentication Required message. 403 — Forbidden Forbidden errors display when somebody tries to access a directory, file, or script without appropriate permissions. For example, if a script is readable only to the user and others cannot access the file, they'll see a 403 error. Invalid index files and empty directories can also cause 403 errors. 404 — Not Found If visitors access URLs that don't exist, they receive 404 errors. The cause can be anything from invalid URLs, missing files, or redirects to URLs that no longer exist. 500 — Internal Server Error This is a very general error that means there's a problem with the website displaying, but the details aren't readily available. Invalid .htaccess files, or invalid rules in them, commonly cause 500 errors with Linux based hosting accounts. With Windows based hosting accounts, it's most commonly invalid requests through a web.config file. To find out what causes the issue: Linux — Review your Apache® error logs. Windows — Enable detailed errors in your web.config file. For more information, check out the list of status code definitions at W3.org: http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
-
Just because most folks know how to handle a gun appropriately, and have no intentions of killing people.. doesn't mean everyone should have one. The same applies to this download limit. Some folks abuse our downloads system, others don't. We cannot make exceptions for every individual who complains about it.. so, it's one cap, for everyone. Simple logic.
-
Malware comes in many forms, from an unwanted ad reappearing on your site to an executable file that infects visitors who click on it. Telltale signs that your site is infected can include unexplained ads, links or pop-ups, but some malware can have no noticeable effects at all. Your best defenses against malware are staying current with third-party application patches and using strong server passwords. When checking for the presence of malware, be sure to check the code residing on your server and not your backup files. Always use a virtual machine for verification to avoid infecting your own computer. Consider taking your site down immediately to prevent infecting visitors, and take action quickly to identify/remove it. Identifying Malware Removing Malware Preventing Malware
-
A password is your first and last line of defense in computer security. Typically people choose bad passwords because they are easy to remember. However, you wouldn't leave the door to your home unlocked because it is too much of a hassle to unlock it before you open the door, would you? A weak password is the same thing. Using words that appear in a dictionary, in any language, make cracking your password that much easier. Adding numbers to dictionary words doesn't increase the password's strength at all if it is based on a dictionary word. Even with character replacements like capital letters and non-alphanumeric symbols, you're not getting a stronger password. A true strong password should consist of 8 or more characters and be part of a "passphrase". A passphrase consists of a phrase that has special meaning to you, therefore making it easier to remember. For example: Mickey Mouse for President. It would be awesome! One simple approach to create a better password is to take the first letter of each word in your passphrase, giving you: mmfpiwba That looks seemingly random, and it's a fairly hard password to crack. But why not make it harder by using the punctuation from the sentence? mmfp.iwba! Now that is a much harder password to crack. Why stop there, though? Let's make it even stronger by capitalizing some letters and adding numbers. MM4P.Iwba! Now you have truly difficult password to crack; but is still fairly easy to remember. To make it even stronger, you can salt it with non-alphanumeric character replacements for greater difficulty. For example, replacing an "a" with a "@" leaving you with: MM4P.Iwb@! NOTE: Some web hosts do not allow the following symbols to be used in the password (second symbol is a space): ? ^'":$&><~;` Typically, the following symbols are acceptable: !@#%*)(_-=+|[]{}.,/ Do's and Do Not's of Password Security: Do: Combine letters, symbols, and numbers that are easy for you to remember and hard for someone else to guess. Create pronounceable passwords (even if they are not words) that are easier to remember, reducing the temptation to write down your password. Try using the initial letters of a phrase you love, especially if a number or special character is included. Take two familiar things, and then wrap them around a number or special character. Alternatively, change the spelling to include a special character. Do not: Use personal information such as derivatives of your user ID, names of family members, maiden names, cars, license plates, telephone numbers, pets, birthdays, social security numbers, addresses, or hobbies. Use any word in any language spelled forward or backward. Tie passwords to the month. For example, don't use "Mayday" in May. Create new passwords that are substantially similar to ones you've previously used. NOTE: No password is 100% secure. You still must take basic security precautions such as not sharing your password with others, changing it frequently and changing it immediately if you believe it may have been compromised.
-
What could be causing this to happen?
Tony replied to Omgrazza's question in Invision Answered Questions
As your topic appears to be a support request, it has been moved to IP.Board Support. -
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.
-
Welcome to WebFlake! Be sure to have a look at our Community Guidelines -- enjoy your stay! You mentioned you are a former donator.. be sure to review this post:
-
There's nothing on that site that is suggestive of what you posted. Even if there were, you're citing a community that is astronomically larger than anything the basic user here will ever manage to run.. (at least anytime in the near future). Trying to utilize the same approach as a much larger community isn't the wisest move.
-
Care to post your resolution for other users (before I mark the thread resolved)?
-
Je pense que vous voulez augmenter la taille de l'avatar ? Dans l'affirmative, cela devrait aider. ACP > System > System Settings > Members > User Profiles Look for:Show users full photo in topic view; maximum width If you enter a numerical value, then the full member's photo is shown with a maximum width of the entered value. If 0 or nothing is entered, then the 100x100 cropped thumb is used.
-
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.
-
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.
-
The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.
-
Putting it bluntly, this is a terrible idea. Rewarding an inactive user for inactivity isn't the best option. It sets a weak precedent, and quite frankly, there should never be any intermediary between Staff and members. Either you're Staff, or you're not. You risk sending the wrong message to the community (and the user in question).
-
Unless you have a site scanner (something typically offered by most web hosts for a fee), you'll be doing it all by hand (opening the file, looking for malicious content, editing as needed, then saving/closing). I also recommend using Google's WebMaster tools. You can request a free site scan that will detect any possible malware, and pinpoint where to look. http://www.google.com/webmasters/ Another site you will find particularly useful, is Stop Badware.. they have a TON of tutorials and information on finding and deleting infected content, as well as advice/tips on preventing it in the future: http://www.stopbadware.org/ Also, try out Google's Safe-Browsing Diagnostics.. replace example.com with your URL, and copy/paste it into your browser. http://www.google.com/safebrowsing/diagnostic?site=www.example.com
-
That's a definite malware infection. I advise getting rid of those folders ASAP. Be sure to scan any other .php files you have.. it will be time consuming, but overlooking them could be hazardous to your site or its users (you could also be blacklisted by search engines if it sits long enough). Most infections such as these are caused by using out-of-date software (WordPress, Joomla, etc).
-
Welcome to WebFlake! Be sure to have a look at our Community Guidelines -- enjoy your stay!
-
Il s'agit d'un forum parlant anglais. Je sais que certains francais, mais pas assez pour etre utile. S'il vous plait utiliser un traducteur. (For English speakers: This is an English speaking community. I'm fairly fluent in French, but the usage of a translator would be better).
-
[IPB 3.4.3] Quick Reply Box Not Function Properly?
Tony replied to a question in Invision Answered Questions
At least it works! Glad you were able to get it figured out. The question(s) in this support topic have been answered and the owner has been able to solve the problem. Because of this, the support topic has been closed and moved.If you have other questions, please open a new topic.