1
router & port problems / Re: Routing system, or several roots for several websites ?
« on: May 01, 2022, 02:30:12 PM »
👍 Thumbs up for such a patient and devoted programmer ! The vHost plugin is an awesome feature.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
i need to know the user acknowledge to the content of the popupSolution : add a button with "OK" text.
When you say "admin mode" are you referring to the UAC ?No : I refer to right-click -> launch as administrator (or make a shortcut, go in its properties, advanced, and check the bock "always launch as admin").
I'm not fluent with python, but i had quick look at it and didn't find anything harmful.I think the simple routing aspect with no protection against injections, combined with the amount of attacks in a period of time, is enough to say that there's something malicious here, but indeed, the script in itself is as harmless as a door built in a wall with no lock.
Losing trust is terrible. Even more terrible if it's all caused by outsider stalkers. Terrible for both person. Yet more if plus region things.Yeah. You're so victim of "outsiders" from foreign countries, stalking* you (??) and using racism on you to a point that you feel horribly bad where you are.
@naitlee, you are right and i feel bad for you because i know you were trying to helpAnd you don't feel bad that a python script is shared on your forum with just no interest in helping to counter those attacks ?
The problem is that when the address of a target is known to a hacker, there is little chance that it will not be testedI don't understand the logic here, but about me spreading my DUCKDNS address, I only did it AFTER the attacks appeared : https://rejetto.com/forum/index.php?topic=13535.msg1067415#msg1067415
From Rom_1983's point of view, nothing accuses you, but given the suspicion that you are under surveillance, it suggests that these attacks are indirectly linked to your Python scripts.My point of view is : it is very unlikely that I can be subject to such an amount of hacking attempts just after a Python script was given to me, just by pure coincidence, and that one of the origin of those attacks is the same than the author of the script. If those attacks on port:80 had been going on since years, I would have had a clue of it (an error message, a sound, antivirus reacting, etc). Sorry but I don't buy the " if you open a web server on the internet, and using ports on common numbers makes it just much worse/frequent." : I've already used local HTTP serving with PHP before, I've never, NEVER, experience such an amount of attacks in any CLI opened.
They are still false positives.You have nerves to dare saying that after I send you a PM with the antivirus screenshot that you never answered. You preferred to come here right after it and talk to admins/moderators, instead of conversing with me. I've always been polite with you, don't try to dodge like that.
Connect? Just another non-sense that try to horrify you.BOO ! — Nod32
but I'll take some precautions to lessen unnecessary sufferings.
what if i told you i just finished a 15-lines plugin that gives you this.
...HFS 3 of course
One thing to clarify is, I wrote the Python script all by sincere and no malicious thing. I'll never fault anyone.I want to believe you, I'm thinking about a hasardous coincidence.
The -b is for middleware to "bind" an network address, (ex. "-b 127.0.0.1" for only listening to localhostOk but how could our computer "listen to" to another computer's requets like if the script was running on it ? That seems impossible to me. That's why I find this option strange.
My thought is different, because what a domain name "hosts" (virtually) which "directory" is totally up to you.That doesn't answer to my question (or I don't understand). Anyway I can't test it and observe the redirection, because your script doesn't work and I have ERRORS as I said.
@echo off
start cmd /k py middle.py -p 80 -d 127.0.0.1 -q 8000 -v sandwichtv.duckdns.org,sites_publics/sandwichTV
exit /b
I'm taking note and will try soon. That would be cool.Woohooooo
192.168.1.1 - - [22/Apr/2022 18:58:39] "GET / HTTP/1.1" 400 -
192.168.1.1 - - [22/Apr/2022 18:58:48] "GET / HTTP/1.1" 400 -
162.221.192.90 - - [22/Apr/2022 19:00:52] "GET / HTTP/1.1" 200 -
192.168.1.1 - - [22/Apr/2022 19:02:42] "GET / HTTP/1.1" 400 -
19:00:52 192.168.1.1:55200 Requested GET /
project1.duckdns.org/project1
project2.duckdns.org/project2
project1.duckdns.org/public_websites/project1
project2.duckdns.org/public_websites/project2
{.header|host.}