The wiki has a one-click launcher, and can transclude acceptance test
resources in an efficient and streamlined interface.
The wiki also has the most advanced emergent features available in wikidom.
You can import raw text or html into wiki pages, execute commands to
populate wiki pages, and you ran run, organize, and annotate thousands of
pages of test resources. This wiki has been used in production to constrain
all the and characters levels of a large video game.
Something tried to fetch that URI. If I were instead running the "right"
server, built with fix-length strings, the stuff on the end would have
overrun the string buffer and fallen as opcodes into my server's address
space. Then they'd run when my server returned to their address.
In article <1L%2e.27845$hU7.21277@newssvr33.news.prodigy.com>,
phlip_cpp@yahoo.com says...
A robust, full-featured, and installable MRW is now here:
Excellent! I have been considering hieriki... could you possibly
provide a brief comparison?
···
--
Jay Levitt |
Wellesley, MA | I feel calm. I feel ready. I can only
Faster: jay at jay dot fm | conclude that's because I don't have a http://www.jay.fm | full grasp of the situation. - Mark Adler
And here's an amusing anecdote. Something on the 'net just tried to crack my
MRW!
There seem to be quite a lot of crackers who automatically scan lots of of computers for security holes. A few days after they got a list of computers with possible security holes they come back and really crack them. If your machine allows SSH access over the net, grep for "Invalid user" or "POSSIBLE BREAKIN ATTEMPT" in your log files under /var/log/sshd.
I have recently become aware of this, because I accidently had a user with the name and password set to 'chris'. So one of these crackers had the luck to guess this account, and got onto my machine. I was lucky enough to recognize this before he could get root.
> And here's an amusing anecdote. Something on the 'net just tried to
crack my
> MRW!
There seem to be quite a lot of crackers who automatically scan lots of
of computers for security holes. A few days after they got a list of
computers with possible security holes they come back and really crack
them. If your machine allows SSH access over the net, grep for "Invalid
user" or "POSSIBLE BREAKIN ATTEMPT" in your log files under /var/log/sshd.
I have recently become aware of this, because I accidently had a user
with the name and password set to 'chris'. So one of these crackers had
the luck to guess this account, and got onto my machine. I was lucky
enough to recognize this before he could get root.
I use Win32, and MRW uses either a CGI server or its own built-in server,
which can't report cracks. Except by casually streaming what it is fetching.
I think I must disrecommend running MRW on port 80 with only a home
computer's firewall. MRW cannot be cracked, but you CAN hit it and write a
wiki page with a !run! command that does anything I can do from a command
prompt!
Y'all can run it at work, behind a real firewall that blocks your port.
I still don't know what "transclude" means since it's not in any
dictionary. For all I know, my acceptance test resources have already
been transcluded and I missed it.
···
On Apr 1, 2005 10:11 PM, Hal Fulton <hal9000@hypermetrics.com> wrote:
Gosh, Lyle... it may take surgery to remove
your tongue from your cheek...