Syndicate content

force

Insecure $ENV{PATH} ...

Today, I was trying to run psql from a program when I got this error:

  Insecure $ENV{PATH} while running setuid at ...

At first, I thought that psql would be testing something about the user, but in fact, psql is a perl script that runs in secure mode. In other words, this applies to any tool written in perl.

The perl interpreter makes sure that the current user identifier is the same as the effective user identifier. When there is a mismatch, the interpreter breaks with that error.

Actions in Drupal, or should I say Rules?

I spent hours today to find this one module: Rules.

In most cases, you can set up a rule in Drupal with their Actions and Triggers and it will work just fine. The fact is that these options are extremely limited if you want any kind of condition on the Rule before triggering the action.

The idea is very simple:

1. Something happens

2. Check whether it is of interest1

3. Trigger the action

I needed that functionality for a couple of websites because I wanted to get an event whenever someone created a new page, but not for any type of ...

  • 1. This part is what is missing in Drupal Core v6.x

Force the download of any file

How to force a download of any file in a CGI script

I have been wondering for a while, now I have the answer, so I can share it with you guys.

Your script has to do the following steps:

  1. Print a header which at least includes:

    1. Content-Type: application/force-download

      (you can also use octet-stream instead of force-download)

Syndicate content Syndicate content

Diverse Realty

Diverse Realty Team

Want a New Home?
Want to Sell Your House?

Call Alex at
+1 (916)
220 6482

Alexis Wilke, Realtor
Salesperson
Lic. # 02024063

Cory Marcus, Broker
Lic. # 01079165

     

Terms of Site Index

Find the page/content you are looking for with our index.

  • NSS
  • SSL

    Secure Socket Layer, this is a protocol used to transmit secure data between two computers. Both computers will first agree on an encryption secret code, then all the data sent back and forth will be encoded using that code. In order to make it secure, you generate two set of numbers (called keys) one that is public and one that is private. The public key sole purpose is to encrypt the data. The private key sole purpose is to decrypt the data.

  • Unix

    An Operating System that works. All the specifications are free and Linux, AIX, HP-UX, SunOS, Solaris, IRIX are examples of a Unix implementation.

  • libwww
  • options