Sponsored Content
Top Forums Web Development override rw-r--r-- root/staff for .htaccess? Post 302319306 by aneuryzma on Monday 25th of May 2009 03:28:29 AM
Old 05-25-2009
override rw-r--r-- root/staff for .htaccess?

Hi,

I get this question in the console when I try to delete a htaccess file. What does it mean ?

override rw-r--r-- root/staff for .htaccess?

thanks
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

root cron was override w/ 3rd party software

Hi Guys, I'm new in Unix Environment. Any Unix Guru around...I need help. My question is, is it possible that the root cron could be override with 3rd party software?How can it happen. Another thing, how the cron job works?, I mean how the Unix process the cron job , I don't have an idea... (2 Replies)
Discussion started by: kupal
2 Replies

2. UNIX for Dummies Questions & Answers

Can you override root shell?

Hi, I'm trying to figure out the logic of my user shell and root shell :confused: This might be best illustrated with an example. If I log into the linux host I'm using and run the following: -bash-3.2$ which python /usr/local/bin/python I now run sudo bash to become root and run the... (2 Replies)
Discussion started by: cuchulainn
2 Replies

3. Post Here to Contact Site Administrators and Moderators

How to become Forum Advisor / Staff?

Hi, Just curious to know how does one become a Forum Advisor or Forum Staff or Admin in unix.com? regards, Ahamed (4 Replies)
Discussion started by: ahamed101
4 Replies
UPSSET.CONF(5)							    NUT Manual							    UPSSET.CONF(5)

NAME
upsset.conf - Configuration for Network UPS Tools upsset.cgi DESCRIPTION
This file only does one job--it lets you convince upsset.cgi(8) that your system's CGI directory is secure. The program will not run until this file has been properly defined. SECURITY REQUIREMENTS
upsset.cgi(8) allows you to try login name and password combinations. There is no rate limiting, as the program shuts down between every request. Such is the nature of CGI programs. Normally, attackers would not be able to access your upsd(8) server directly as it would be protected by the LISTEN directives in your upsd.conf(5) file, tcp-wrappers (if available when NUT was built), and hopefully local firewall settings in your OS. upsset runs on your web server, so upsd will see it as a connection from a host on an internal network. It doesn't know that the connection is actually coming from someone on the outside. This is why you must secure it. On Apache, you can use the .htaccess file or put the directives in your httpd.conf. It looks something like this, assuming the .htaccess method: <Files upsset.cgi> deny from all allow from your.network.addresses </Files> You will probably have to set "AllowOverride Limit" for this directory in your server-level configuration file as well. If this doesn't make sense, then stop reading and leave this program alone. It's not something you absolutely need to have anyway. Assuming you have all this done, and it actually works (test it!), then you may add the following directive to this file: I_HAVE_SECURED_MY_CGI_DIRECTORY If you lie to the program and someone beats on your upsd through your web server, don't blame me. SEE ALSO
upsset.cgi(8) Internet resources: The NUT (Network UPS Tools) home page: http://www.networkupstools.org/ Network UPS Tools 05/22/2012 UPSSET.CONF(5)
All times are GMT -4. The time now is 01:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy