<![CDATA[Messages posted by "unfaceguy"]]> /hvaonline/posts/listByUser/145549.html JForum - http://www.jforum.net Re: Giới thiệu về file .htaccess /hvaonline/posts/preList/72/111734.html#111734 /hvaonline/posts/preList/72/111734.html#111734 GMT Re: Hỏi về tấn công flash-DDoS! Trong này chỉ có bạn okgame_root là bị ăn đòn nhiều DDOS nhất bạn ấy ,bạn ấy vỗ ngực là admin của cái thế giới ngầm gì gì đó toàn con nít bị   Lạc chủ đề rồi ~_~
Tất cả các "firewall" chạy bằng script như php, asp.... đều không thể chống DDoS, kể cả x-flash.  
vậy anh conmale cho em hỏi là nếu mình có VPS or Dedicated Server thì chống ddos như thế nào ?]]>
/hvaonline/posts/preList/16548/102158.html#102158 /hvaonline/posts/preList/16548/102158.html#102158 GMT
Re: Tìm hiểu và triển khai DDoS - giúp em với !!!! /hvaonline/posts/preList/16964/101946.html#101946 /hvaonline/posts/preList/16964/101946.html#101946 GMT Re: Hỏi về tấn công flash-DDoS! <?php $conf['path'] = './firewall'; $conf['site_url'] = 'http://vidu'; $conf['mailadds'] = 'abc@gmail.com'; $conf['mailname'] = 'The InV-Staff'; $conf['maxaccess'] = 5; // If exceed the limits, the client will be banned from access $conf['interval'] = 2; // Time interval in seconds $conf['requests'] = 10; // Number of possible requests during $conf['interval'] seconds $conf['blocktime'] = 900; // How long the client has to wait when they are blocked ?>   Firewall.php
<?php # Global variables $conf = array(); require_once('./firewall/config.php'); $conf['now'] = time(); $conf['addr'] = fetch_ip(); $conf['save_log'] = $conf['addr'].' - '.$_SERVER['HTTP_USER_AGENT'].' - '.get_gmdate($conf['now']).' - "'.$_SERVER['REQUEST_METHOD'].' '.fetch_url().' '.$_SERVER['SERVER_PROTOCOL'].'"'."\r\n"; # Initiated check_spam($conf['path'].'/spamips.txt', $conf['save_log']); $bot_safe = check_bot(); if( ! $_GET['adsess'] || ! $bot_safe ) { check_attack($conf['path'].'/attackips.txt', $conf['save_log']); check_flood($conf['path'].'/'.$conf['addr']); } function check_bot() { # Search engine spider bots $apps[] = 'googlebot'; // Google $apps[] = 'mediapartners-google'; // Google Adsense $apps[] = 'yahoo! slurp'; // Yahoo $apps[] = 'yahoo-mm'; // Yahoo-MMCrawler/Yahoo-MMAudVid $apps[] = 'slurp@inktomi'; // Hot Bot $apps[] = 'lycos'; // Lycos $apps[] = 'fast-webcrawler'; // Fast AllTheWeb $apps[] = 'msnbot'; // MSN Search $apps[] = 'ask jeeves'; // Ask Jeeves $apps[] = 'teoma'; // Teoma $apps[] = 'scooter'; // Altavista $apps[] = 'ia_archiver'; // Archive.org $apps[] = 'almaden'; // IBM Almaden Web Crawler $apps[] = 'gigabot'; // Gigabot spider $apps[] = 'whatuseek'; // What You Seek # Various http utility libaries $apps[] = 'w3c_validator'; $apps[] = 'wdg_validator'; $apps[] = 'libwww-perl'; $apps[] = 'jakarta commons-httpclient'; $apps[] = 'python-urllib'; for( $i = 0; $i <= count($apps); $i++ ) { if( stristr($_SERVER['HTTP_USER_AGENT'], $apps[$i]) ) return TRUE; } } function check_spam($path,$log) { $apps = array('CherryPicker','Crescent','DDoSkit','EmailCollector','EmailSiphon','EmailWolf','ExtractorPro','FileHound','Mozilla/3.Mozilla/2.01','NICErsPRO','Wget','Whacker'); for( $i = 0; $i <= count($apps); $i++ ) { if( stristr($_SERVER['HTTP_USER_AGENT'], $apps[$i]) ) { check_log($path, 'a', $log); exit(); } } } function check_attack($path,$log) { $input = strtolower($_SERVER['QUERY_STRING']); $array = array('alter','create','drop','rename','delete%20','handler','insert','load%20data','replace','select','join','union','truncate','update','describe','lock%20tables','grant','revoke','set%20password','flush','kill','shutdown','distinct','having','procedure','order%20by','group%20by','exec'); $return = str_replace($array, "", $input); if( $input != $return ) { check_log($path, 'a', $log); print_error("Illegal use of this board has been detected. Legal actions will be taken..."); } } function check_flood($path) { global $conf; $pass = 0; # Take a small check $blocktime = check_log($path.'.lock','rb'); if( $blocktime == 'banned' ) { print_error("Your IP address <font color='red'>{$conf['addr']}</font> has been blocked ang logged due to website abuse activities.<br />Please use your register email to send a request email, with your IP info and member name,<br />to <a href='mailto:{$conf['mailadds']}'>{$conf['mailname']}</a> in order to remove your condition."); } elseif( $blocktime > 0 ) { if( ( $conf['now'] - $blocktime ) <= $conf['blocktime'] ) { print_error("Flood detected!<br />Please wait at least <font color='red'>{$conf['blocktime']}s</font> before trying again (Time passed: ".($conf['now'] - $blocktime)."s)."); } else { $pass = 1; check_log($path.'.lock'); } } # Log IP $content = check_log($path,'rb'); if( $content ) { $content = preg_replace("/,$/", "", $content); if( substr_count($content, ',') >= ( $conf['requests'] + 1 ) ) { $pass = 1; $count = 0; $cache = explode(',', $content); for( $i = 1; $i <= count($cache); $i++ ) { if( ( $cache[$i] - $cache[$i-1] ) <= $conf['interval'] ) $count++; } if( $count >= $conf['requests'] ) { # Check the number of attack $log_file = $conf['path'].'/floodips.txt'; $floodips = check_log($log_file,'rb'); $floodips = preg_replace("/,$/", "", $floodips); if( substr_count($floodips, $conf['addr']) <= $conf['maxaccess'] ) { check_log($path.'.lock', 'w', $conf['now']); check_log($log_file, 'a', $conf['save_log']); } else { check_log($path.'.lock', 'w', 'banned'); exit(); } } } else { $pass = 0; } } if( $pass ) { check_log($path); } else { check_log($path, 'a', $conf['now'].','); } } function check_log($path,$mode='w',$str='') { $buffer = ''; if( $FH = @fopen($path, $mode) ) { if( $mode == 'rb' ) { while( ! @feof($FH) ) { $buffer .= @fgets($FH, 1024); } } else { @fwrite($FH, $str); } @fclose($FH); @chmod($path, 0777); } return $buffer; } function fetch_ip() { # Enable X_FORWARDED_FOR IP matching? $do_check = 0; $addrs = array(); if( $do_check ) { foreach( array_reverse(explode(',', $_SERVER['HTTP_X_FORWARDED_FOR'])) as $x_f ) { $x_f = trim($x_f); if( preg_match('/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/', $x_f) ) { $addrs[] = $x_f; } } $addrs[] = $_SERVER['HTTP_CLIENT_IP']; $addrs[] = $_SERVER['HTTP_PROXY_USER']; } $addrs[] = $_SERVER['REMOTE_ADDR']; foreach( $addrs as $v ) { if( $v ) { preg_match("/^([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})$/", $v, $match); $ip = $match[1].'.'.$match[2].'.'.$match[3].'.'.$match[4]; if( $ip && $ip != '...' ) { break; } } } if( ! $ip || $ip == '...' ) { print_error("Could not determine your IP address."); } return $ip; } function fetch_url() { if( $_SERVER['REQUEST_URI'] || $_ENV['REQUEST_URI'] ) { $url = $_SERVER['REQUEST_URI'] ? $_SERVER['REQUEST_URI'] : $_ENV['REQUEST_URI']; } else { if( $_SERVER['PATH_INFO'] || $_ENV['PATH_INFO'] ) { $url = $_SERVER['PATH_INFO'] ? $_SERVER['PATH_INFO'] : $_ENV['PATH_INFO']; } elseif( $_SERVER['REDIRECT_URL'] || $_ENV['REDIRECT_URL'] ) { $url = $_SERVER['REDIRECT_URL'] ? $_SERVER['REDIRECT_URL'] : $_ENV['REDIRECT_URL']; } else { $url = $_SERVER['PHP_SELF'] ? $_SERVER['PHP_SELF'] : $_ENV['PHP_SELF']; } if( $_SERVER['QUERY_STRING'] || $_ENV['QUERY_STRING'] ) { $url .= '?'.( $_SERVER['QUERY_STRING'] ? $_SERVER['QUERY_STRING'] : $_ENV['QUERY_STRING'] ); } } $url = preg_replace('/s=[a-z0-9]{32}?&?/', '', $url); $url = preg_replace('/&(?!#[0-9]+;)/si', '&', $url); $url = str_replace(array('<','>','"'), array('<','>','"'), $url); $url = preg_replace(array('#javascript#i','#vbscript#i'), array('java script','vb script'), $url); return $url; } function get_gmdate($time="") { $offset = 7 * 3600; // GMT+07:00 $timenow = $time ? $time : time(); return gmdate("D d-M-Y H:i:s A", ($timenow + $offset)); } function print_error($msg) { echo " <html> <head><title>InV-Firewall System</title> <style type='text/css'> html{ overflow-x:auto; } body{ background:#FFF; color:#222; font-family:Arial, Verdana, Tahoma, Times New Roman, Courier; font-size:11px; line-height:135%; margin:0; padding:0; text-align:center; } a:link, a:visited, a:active{ background:transparent; color:#0066CC; text-decoration:none; } a:hover{ background:transparent; color:#000000; text-decoration:underline; } #wrapper{ margin:5px auto 20px auto; text-align:left; width:80%; } .borderwrap{ background:#FFF; border:1px solid #EEE; padding:3px; margin:0; } .borderwrap p{ background:#F9F9F9; border:1px solid #CCC; margin:5px; padding:10px; text-align:left; } .warnbox{ border:1px solid #F00; background:#FFE0E0; padding:6px; margin-right:1%; margin-left:1%; text-align:left; } </style> </head> <body> <div id='wrapper'><br /><br /> <div class='borderwrap'> <p style='font-size:15pt; color:#FF3300;'><b>Warning:</b></p><br /><br /> <div class='warnbox'> <b>$msg</b> </div><br /> </div><br /> <div align='center' style='border:1px solid #EEE; padding:5px 0px 5px 5px; color:#808080; font-face:Tahoma;'><a href='http://invisionviet.net/'>InV-Firewall Script v1.0.0</a> © ".date('Y')." <a href='mailto:ntd1712@hotmail.com'>ntd1712</a></div> </div> </body> </html>"; exit(); } ?>  
và cuối cùng là .htaccess
<FilesMatch "^(\.ht|conf_global.php)"> Order allow,deny Deny from all </FilesMatch> #AuthType Basic #AuthName "Password Required (User: @vone - Pass: @vone)" #AuthUserFile /wamp/www/ipb217/.htpasswd #Require valid-user <IfModule mod_rewrite.c> RewriteEngine on #RewriteCond %{HTTP_REFERER} !^$ #RewriteCond %{HTTP_REFERER} !^http://(www\.)?yourdomain.com/.*$ [NC] #RewriteRule \.(gif|jpg|png|mp3|mpg|avi|mov|swf)$ - [F] RewriteCond %{HTTP_USER_AGENT} ^Alexibot [OR] RewriteCond %{HTTP_USER_AGENT} ^asterias [OR] RewriteCond %{HTTP_USER_AGENT} ^BackDoorBot [OR] RewriteCond %{HTTP_USER_AGENT} ^Black.Hole [OR] RewriteCond %{HTTP_USER_AGENT} ^BlackWidow [OR] RewriteCond %{HTTP_USER_AGENT} ^BlowFish [OR] RewriteCond %{HTTP_USER_AGENT} ^BotALot [OR] RewriteCond %{HTTP_USER_AGENT} ^BuiltBotTough [OR] RewriteCond %{HTTP_USER_AGENT} ^Bullseye [OR] RewriteCond %{HTTP_USER_AGENT} ^BunnySlippers [OR] RewriteCond %{HTTP_USER_AGENT} ^Cegbfeieh [OR] RewriteCond %{HTTP_USER_AGENT} ^CheeseBot [OR] RewriteCond %{HTTP_USER_AGENT} ^ChinaClaw [OR] RewriteCond %{HTTP_USER_AGENT} ^CopyRightCheck [OR] RewriteCond %{HTTP_USER_AGENT} ^cosmos [OR] RewriteCond %{HTTP_USER_AGENT} ^Custo [OR] RewriteCond %{HTTP_USER_AGENT} ^DDoSkit [OR] RewriteCond %{HTTP_USER_AGENT} ^DISCo [OR] RewriteCond %{HTTP_USER_AGENT} ^DittoSpyder [OR] RewriteCond %{HTTP_USER_AGENT} ^Download\ Demon [OR] RewriteCond %{HTTP_USER_AGENT} ^eCatch [OR] RewriteCond %{HTTP_USER_AGENT} ^EirGrabber [OR] RewriteCond %{HTTP_USER_AGENT} ^EroCrawler [OR] RewriteCond %{HTTP_USER_AGENT} ^Express\ WebPictures [OR] RewriteCond %{HTTP_USER_AGENT} ^EyeNetIE [OR] RewriteCond %{HTTP_USER_AGENT} ^.*FileHound.*$ [OR] RewriteCond %{HTTP_USER_AGENT} ^FlashGet [OR] RewriteCond %{HTTP_USER_AGENT} ^Foobot [OR] RewriteCond %{HTTP_USER_AGENT} ^FrontPage [NC,OR] RewriteCond %{HTTP_USER_AGENT} ^GetRight [OR] RewriteCond %{HTTP_USER_AGENT} ^GetWeb! [OR] RewriteCond %{HTTP_USER_AGENT} ^Go-Ahead-Got-It [OR] RewriteCond %{HTTP_USER_AGENT} ^Googlebot-Image [OR] RewriteCond %{HTTP_USER_AGENT} ^Go!Zilla [OR] RewriteCond %{HTTP_USER_AGENT} ^GrabNet [OR] RewriteCond %{HTTP_USER_AGENT} ^Grafula [OR] RewriteCond %{HTTP_USER_AGENT} ^Harvest [OR] RewriteCond %{HTTP_USER_AGENT} ^hloader [OR] RewriteCond %{HTTP_USER_AGENT} ^HMView [OR] RewriteCond %{HTTP_USER_AGENT} ^httplib [OR] RewriteCond %{HTTP_USER_AGENT} ^HTTrack [NC,OR] RewriteCond %{HTTP_USER_AGENT} ^humanlinks [OR] RewriteCond %{HTTP_USER_AGENT} ^Image\ Stripper [OR] RewriteCond %{HTTP_USER_AGENT} ^Image\ Sucker [OR] RewriteCond %{HTTP_USER_AGENT} ^Indy\ Library [NC,OR] RewriteCond %{HTTP_USER_AGENT} ^InfoNaviRobot [OR] RewriteCond %{HTTP_USER_AGENT} ^InterGET [OR] RewriteCond %{HTTP_USER_AGENT} ^Internet\ Ninja [OR] RewriteCond %{HTTP_USER_AGENT} ^JennyBot [OR] RewriteCond %{HTTP_USER_AGENT} ^JetCar [OR] RewriteCond %{HTTP_USER_AGENT} ^JOC\ Web\ Spider [OR] RewriteCond %{HTTP_USER_AGENT} ^Kenjin.Spider [OR] RewriteCond %{HTTP_USER_AGENT} ^Keyword.Density [OR] RewriteCond %{HTTP_USER_AGENT} ^larbin [OR] RewriteCond %{HTTP_USER_AGENT} ^LeechFTP [OR] RewriteCond %{HTTP_USER_AGENT} ^LexiBot [OR] RewriteCond %{HTTP_USER_AGENT} ^libWeb/clsHTTP [OR] RewriteCond %{HTTP_USER_AGENT} ^LinkextractorPro [OR] RewriteCond %{HTTP_USER_AGENT} ^LinkScan/8.1a.Unix [OR] RewriteCond %{HTTP_USER_AGENT} ^LinkWalker [OR] RewriteCond %{HTTP_USER_AGENT} ^lwp-trivial [OR] RewriteCond %{HTTP_USER_AGENT} ^Mass\ Downloader [OR] RewriteCond %{HTTP_USER_AGENT} ^Mata.Hari [OR] RewriteCond %{HTTP_USER_AGENT} ^Microsoft.URL [OR] RewriteCond %{HTTP_USER_AGENT} ^MIDown\ tool [OR] RewriteCond %{HTTP_USER_AGENT} ^MIIxpc [OR] RewriteCond %{HTTP_USER_AGENT} ^Mister.PiX [OR] RewriteCond %{HTTP_USER_AGENT} ^Mister\ PiX [OR] RewriteCond %{HTTP_USER_AGENT} ^moget [OR] RewriteCond %{HTTP_USER_AGENT} ^Mozilla/2 [OR] RewriteCond %{HTTP_USER_AGENT} ^Mozilla/3.Mozilla/2.01 [OR] RewriteCond %{HTTP_USER_AGENT} ^Mozilla.*NEWT [OR] RewriteCond %{HTTP_USER_AGENT} ^Navroad [OR] RewriteCond %{HTTP_USER_AGENT} ^NearSite [OR] RewriteCond %{HTTP_USER_AGENT} ^NetAnts [OR] RewriteCond %{HTTP_USER_AGENT} ^NetMechanic [OR] RewriteCond %{HTTP_USER_AGENT} ^NetSpider [OR] RewriteCond %{HTTP_USER_AGENT} ^Net\ Vampire [OR] RewriteCond %{HTTP_USER_AGENT} ^NetZIP [OR] RewriteCond %{HTTP_USER_AGENT} ^NICErsPRO [OR] RewriteCond %{HTTP_USER_AGENT} ^NPBot [OR] RewriteCond %{HTTP_USER_AGENT} ^Octopus [OR] RewriteCond %{HTTP_USER_AGENT} ^Offline.Explorer [OR] RewriteCond %{HTTP_USER_AGENT} ^Offline\ Explorer [OR] RewriteCond %{HTTP_USER_AGENT} ^Offline\ Navigator [OR] RewriteCond %{HTTP_USER_AGENT} ^Openfind [OR] RewriteCond %{HTTP_USER_AGENT} ^PageGrabber [OR] RewriteCond %{HTTP_USER_AGENT} ^Papa\ Foto [OR] RewriteCond %{HTTP_USER_AGENT} ^pavuk [OR] RewriteCond %{HTTP_USER_AGENT} ^pcBrowser [OR] RewriteCond %{HTTP_USER_AGENT} ^ProPowerBot/2.14 [OR] RewriteCond %{HTTP_USER_AGENT} ^ProWebWalker [OR] RewriteCond %{HTTP_USER_AGENT} ^ProWebWalker [OR] RewriteCond %{HTTP_USER_AGENT} ^QueryN.Metasearch [OR] RewriteCond %{HTTP_USER_AGENT} ^ReGet [OR] RewriteCond %{HTTP_USER_AGENT} ^RepoMonkey [OR] RewriteCond %{HTTP_USER_AGENT} ^RMA [OR] RewriteCond %{HTTP_USER_AGENT} ^SiteSnagger [OR] RewriteCond %{HTTP_USER_AGENT} ^SlySearch [OR] RewriteCond %{HTTP_USER_AGENT} ^SmartDownload [OR] RewriteCond %{HTTP_USER_AGENT} ^SpankBot [OR] RewriteCond %{HTTP_USER_AGENT} ^spanner [OR] RewriteCond %{HTTP_USER_AGENT} ^SuperBot [OR] RewriteCond %{HTTP_USER_AGENT} ^SuperHTTP [OR] RewriteCond %{HTTP_USER_AGENT} ^Surfbot [OR] RewriteCond %{HTTP_USER_AGENT} ^suzuran [OR] RewriteCond %{HTTP_USER_AGENT} ^Szukacz/1.4 [OR] RewriteCond %{HTTP_USER_AGENT} ^tAkeOut [OR] RewriteCond %{HTTP_USER_AGENT} ^Teleport [OR] RewriteCond %{HTTP_USER_AGENT} ^Teleport\ Pro [OR] RewriteCond %{HTTP_USER_AGENT} ^Telesoft [OR] RewriteCond %{HTTP_USER_AGENT} ^The.Intraformant [OR] RewriteCond %{HTTP_USER_AGENT} ^TheNomad [OR] RewriteCond %{HTTP_USER_AGENT} ^TightTwatBot [OR] RewriteCond %{HTTP_USER_AGENT} ^Titan [OR] RewriteCond %{HTTP_USER_AGENT} ^toCrawl/UrlDispatcher [OR] RewriteCond %{HTTP_USER_AGENT} ^toCrawl/UrlDispatcher [OR] RewriteCond %{HTTP_USER_AGENT} ^True_Robot [OR] RewriteCond %{HTTP_USER_AGENT} ^turingos [OR] RewriteCond %{HTTP_USER_AGENT} ^TurnitinBot/1.5 [OR] RewriteCond %{HTTP_USER_AGENT} ^URLy.Warning [OR] RewriteCond %{HTTP_USER_AGENT} ^VCI [OR] RewriteCond %{HTTP_USER_AGENT} ^VoidEYE [OR] RewriteCond %{HTTP_USER_AGENT} ^WebAuto [OR] RewriteCond %{HTTP_USER_AGENT} ^WebBandit [OR] RewriteCond %{HTTP_USER_AGENT} ^WebCopier [OR] RewriteCond %{HTTP_USER_AGENT} ^WebEMailExtrac.* [OR] RewriteCond %{HTTP_USER_AGENT} ^WebEnhancer [OR] RewriteCond %{HTTP_USER_AGENT} ^WebFetch [OR] RewriteCond %{HTTP_USER_AGENT} ^WebGo\ IS [OR] RewriteCond %{HTTP_USER_AGENT} ^Web.Image.Collector [OR] RewriteCond %{HTTP_USER_AGENT} ^Web\ Image\ Collector [OR] RewriteCond %{HTTP_USER_AGENT} ^WebLeacher [OR] RewriteCond %{HTTP_USER_AGENT} ^WebmasterWorldForumBot [OR] RewriteCond %{HTTP_USER_AGENT} ^WebReaper [OR] RewriteCond %{HTTP_USER_AGENT} ^WebSauger [OR] RewriteCond %{HTTP_USER_AGENT} ^Website\ eXtractor [OR] RewriteCond %{HTTP_USER_AGENT} ^Website.Quester [OR] RewriteCond %{HTTP_USER_AGENT} ^Website\ Quester [OR] RewriteCond %{HTTP_USER_AGENT} ^Webster.Pro [OR] RewriteCond %{HTTP_USER_AGENT} ^WebStripper [OR] RewriteCond %{HTTP_USER_AGENT} ^Web\ Sucker [OR] RewriteCond %{HTTP_USER_AGENT} ^WebWhacker [OR] RewriteCond %{HTTP_USER_AGENT} ^WebZip [OR] RewriteCond %{HTTP_USER_AGENT} ^Wget [OR] RewriteCond %{HTTP_USER_AGENT} ^.*Whacker.*$ [OR] RewriteCond %{HTTP_USER_AGENT} ^Widow [OR] RewriteCond %{HTTP_USER_AGENT} ^[Ww]eb[Bb]andit [OR] RewriteCond %{HTTP_USER_AGENT} ^WWW-Collector-E [OR] RewriteCond %{HTTP_USER_AGENT} ^WWWOFFLE [OR] RewriteCond %{HTTP_USER_AGENT} ^Xaldon\ WebSpider [OR] RewriteCond %{HTTP_USER_AGENT} ^Xenu's [OR] RewriteCond %{HTTP_USER_AGENT} ^Zeus RewriteRule ^(.*)$ http://www.robotstxt.org/ [L] </IfModule>  
xem cái này có chống được xflash không? (kiểu máy móc, pro em kô nói)]]>
/hvaonline/posts/preList/16548/101759.html#101759 /hvaonline/posts/preList/16548/101759.html#101759 GMT
Re: Hỏi về tấn công flash-DDoS! /hvaonline/posts/preList/16548/101699.html#101699 /hvaonline/posts/preList/16548/101699.html#101699 GMT Help về USB của em
[/URL] toàn bộ dữ liệu quan trọng về môn học em trong đó :(( . có anh nào biết thì help em vơi T_T em xài SANDISK Cruzer® Micro USB 4G]]>
/hvaonline/posts/preList/16360/98115.html#98115 /hvaonline/posts/preList/16360/98115.html#98115 GMT
Re: How to anti attack flood SQL ? /hvaonline/posts/preList/15738/94433.html#94433 /hvaonline/posts/preList/15738/94433.html#94433 GMT Re: How to anti attack flood SQL ? SQL : Apache version 1.3.39   cái này la webserver mà :-?? Còn về SQL thì nhớ rằng phải có ít nhất quyền admin mơi làm được. Có thể do server bi thôi, nếu dùng shared host thì bị chung :x]]> /hvaonline/posts/preList/15738/94251.html#94251 /hvaonline/posts/preList/15738/94251.html#94251 GMT Re: Xin chỉ giúp cách chống DDOS (website đang bị DDOS) /hvaonline/posts/preList/13996/92258.html#92258 /hvaonline/posts/preList/13996/92258.html#92258 GMT Re: Hướng nghiệp về lập trình viên /hvaonline/posts/preList/15357/91813.html#91813 /hvaonline/posts/preList/15357/91813.html#91813 GMT Hướng nghiệp về lập trình viên /hvaonline/posts/preList/15357/91436.html#91436 /hvaonline/posts/preList/15357/91436.html#91436 GMT Re: Lỗi Data xin help /hvaonline/posts/preList/14808/89552.html#89552 /hvaonline/posts/preList/14808/89552.html#89552 GMT Re: Lỗi Data xin help Vậy thì lần sau nên cẩn thận hơn. Người khác trả lời mình cẩn thận thì trách nhiệm tối thiểu của mình là cũng cẩn thận như người đó dành cho mình.   thanks
Đối với vbb thì đơn giản stop apache, sau đó restart mysql rồi mới start apache lại. 
Cái lỗi data của em không phải lúc nào cũng bi mà là lâu lâu tự nhiên bị MySQL server has gone away . cái này là do host hay do .....?]]>
/hvaonline/posts/preList/14808/89539.html#89539 /hvaonline/posts/preList/14808/89539.html#89539 GMT
Re: Lỗi Data xin help MySQL server has gone away có nghĩa là MySQL service được restart trong khi một client (trong trường hợp này là vBulletin) đang connect vào nó. Thông thường, để restart MySQL cho sạch, các client đang connect vào nó phải disconnect trước. Ví dụ, bồ phải shutdown vBulletin forum, sau đó mới restart lại MySQL service rồi mới start VBulletin forum lại.   Em không hiểu cái này. như shutdown vbb thì là làm gì anh :|]]> /hvaonline/posts/preList/14808/89495.html#89495 /hvaonline/posts/preList/14808/89495.html#89495 GMT Re: Lỗi Data xin help /hvaonline/posts/preList/14808/89286.html#89286 /hvaonline/posts/preList/14808/89286.html#89286 GMT Re: Lỗi Data xin help /hvaonline/posts/preList/14808/89240.html#89240 /hvaonline/posts/preList/14808/89240.html#89240 GMT Lỗi Data xin help /hvaonline/posts/preList/14808/88223.html#88223 /hvaonline/posts/preList/14808/88223.html#88223 GMT Re: XIn HVA kiễm tra giùm forum http://vietgamer.net/forum Gửi unfaceguy Để mổ xẻ xem nó thế nào thì bạn nên Share code và style đang dùng đi có một lỗi nhìn thấy ngay khi mở ra đc thông báo dưới status của IE là "NcodeImageResize" is undefine, bạn đã uninstall Mod mà ko xóa code trong template. Nhìn sơ bộ: Bạn dùng nhiều Mod mà không kiểm soát đc nó, điều này rất nguy hiểm, nó dễ làm Forum hoạt động kém và sinh lỗi ..  mình up mod lên link : http://lovelylinh.us/jack/ mình kô hiểu y share forum là sao ~_~ có gì anh đó liên lạc qua nick :Y!M :iatk_1224 xin cám ơn]]> /hvaonline/posts/preList/14287/87875.html#87875 /hvaonline/posts/preList/14287/87875.html#87875 GMT Re: XIn HVA kiễm tra giùm forum http://vietgamer.net/forum mình xin bổ sung thêm acc là : tester pw:12345678 Mong mấy anh HVE giúp em .   xin lỗi mình đánh nhầm mấy anh HVA giúp vơi. acc là : tester pw:12345678 or jamesblack pw 12345678]]> /hvaonline/posts/preList/14287/85709.html#85709 /hvaonline/posts/preList/14287/85709.html#85709 GMT Re: XIn HVA kiễm tra giùm forum http://vietgamer.net/forum /hvaonline/posts/preList/14287/85628.html#85628 /hvaonline/posts/preList/14287/85628.html#85628 GMT Re: XIn HVA kiễm tra giùm forum http://vietgamer.net/forum /hvaonline/posts/preList/14287/85568.html#85568 /hvaonline/posts/preList/14287/85568.html#85568 GMT