Posted on Wednesday, June 04, 2008 @ 06:41:41 CDT in Software by Raven
NB1 writes: IETester is a free web browser specifically designed for testing web sites in Internet Explorer including IE 8 beta, IE 7, IE 6, IE 5.5 on both XP and Vista.
Like any web browser, IETester has the usual forward and back buttons, refresh, stop, home, and favorite buttons, but it also has a special feature that allows you to launch new tabs which render the web site in different versions of IE. With IE8's public beta just around the corner, web site owners need to verify that their sites are going to display properly in the new browser, which runs in standards-compliant mode by default.
IETester Homepage
|
Posted on Wednesday, June 04, 2008 @ 06:41:29 CDT in Add-Ons by Raven
queen_live78 writes: Ts Contact 1.0 Multilanguage is a new module for Php Nuke. It allows the dispatch of Email with Enclosed, key of protection captcha, I Help compilation on every single field of the form, Email sent Html in format (so with logo of the customizing site), some Sender, es reports Email receipt with the data: Avatar and Nickname.
Here: You can see the screenful 1° regarding the principal screenful of the form.
In Figure 2 we can see the graphic of the receipt email:
Released By Queen_live78 - Tuttosoft.it -
Php Nuke Italian Community
|
phpnuketheme writes: World of Warcraft (WoW) Burning Crusade theme was originally created for phpkit (by psd-resources.de) but converted to use it for phpNuke CMS by phpnuke-theme.com. The free WoW Burning Crusade theme comes with a matching font and original PSD images(editable with adobe photoshop). The theme does not come with phpnuke forum template.
Download WoW Burning Crusade phpNuke Theme
|
Posted on Wednesday, June 04, 2008 @ 06:40:53 CDT in Community by Raven
floppydrivez writes: Its time once again to offer free links to phpnuke cms users. This coupon gives you a free regular listing in the web directory with no strings attached.
At the bottom of the submission page, you will find a field to enter your coupon code. The promotional coupon code is freenukelinks. The coupon is valid for regular listings only and not featured.
This promotion is sponsored by RavenNuke(tm) and Clan Themes.
|
Posted on Saturday, May 31, 2008 @ 21:55:38 CDT in Add-Ons by BobMarion
I have setup a temporary forum for users to post suggestions for the upcoming NukeGroups(tm) release. I will read all posts made but I DO NOT make any guarantee that a reply will be posted. Nor does a reply guarantee that a suggestion will be adopted.
|
Posted on Saturday, May 31, 2008 @ 00:22:07 CDT in Security by Raven
Even though this article is written in response to SQL Injection attacks in/on ASP/IIS, it is just as relevant to PHP/MySQL.
Michael Howard writes: You may have read recently about a large number of Web servers that were compromised through a SQL injection attack. The malicious SQL payload is very well designed, somewhat database schema agnostic and generic so it could compromise as many database servers as possible. While the attack was a SQL injection attack that attacked and compromised back-end databases courtesy of vulnerable Web pages, from a user's perspective the real attack was compromised Web pages that serve up malware to attack user's through their browsers. In essence, there were two sets of victims: the Web site operators and the users who visited the affected Web sites. In this post, I want to focus on what the first set of users, the Web site operators, can do to protect themselves.
The fact that the malicious payload was so generic shows that the science of SQL injection has not taken a back seat to research in other vulnerability types, such as buffer overflows or cross-site scripting issues.
I think the first lesson from this attack is this:
If you have a Web server (doesn't matter what type), and it's hooked up to a database (doesn't matter what type) you need to go in and review your code that performs the database work.
So now that you've determined the database access code, now what? The SDL is very specific about what do here, there are three requirements - they are requirements not recommendations, which means you must do the following coding requirements and defenses
* Use SQL Parameterized Queries
* Use Stored Procedures
* Use SQL Execute-only Permission Read More...
|