Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - tfs
1
Archived fixes / Undefined index: display_quick_reply
« on November 9th, 2012, 01:34 AM »
This has been popping up in my error log.
Code: [Select]
Undefined
https://www.xxx.com/wedge1/index.php?action=media;sa=item;in=34;sort=0
8: Undefined index: display_quick_reply
/x/wedge1/Themes/default/Media.template.php
Line: 756
2
Archived fixes / Grammatical Typo: Paid Subscriptions
« on November 9th, 2012, 01:04 AM »
Wedge 0.1 Alpha 2

Grammatical issue in the Paid Subscriptions config screen.

Enable Paid Subscriptions:
This must be checked the paid subscriptions to be used on the forum.
3
Features / User configurable CC email accounts
« on May 16th, 2012, 05:56 PM »
An option I was thinking about (plugin?), that would solve some multi-users-using-one-account issues I'm currently having using SimpleDesk would be for a regular user to be able to add and remove CC email addresses from his own profile options.  This would allow my corporate users who login using a corporate account to take care of their own notifications when a help desk ticket is updated.

My clients are college admissions offices, and there's usually more than one person in an office whom I support.  (Admissions + IT)  They like to be able to keep abreast of each others' tickets because it often effects all of them.  Because of this, some of them like to setup a corporate login account that they all use.  The way it is now, we or they have to setup an email server to receive the single email and forward it to multiple users.  If this could be done by a user going to his own profile and setting up CC emails for himself it would simplify my life greatly.
4
Off-topic / MySQL Website Compromised; Serves Malware to Visitors
« on September 27th, 2011, 11:16 PM »
From SANS NewsBites Vol. 13 Num. 77,

 --MySQL Website Compromised; Serves Malware to Visitors (September 26, 2011)

On Monday, September 26, the MySQL website was compromised and was being
used to serve malware. The attack was discovered about 5 AM PDT; the
site was cleaned up several hours later. The JavaScript code known as
the Black Hole exploit kit attempts to launch a series of known browser
attacks against site visitors. Security journalist Brian Krebs noted
that administrative access to the site was being offered last week on
the hacker underground for US $3,000.

http://www.computerworld.com/s/article/9220295/MySQL.com_hacked_to_serve_malware?taxonomyId=17

http://www.theregister.co.uk/2011/09/26/mysql_hacked/

http://krebsonsecurity.com/2011/09/mysql-com-sold-for-3k-serves-malware/

[Editor's Note (Liston): This is the second time in a year that the
MySQL site has been compromised. The first compromise pegged the
ol' irony-meter by reportedly being the result of SQL-injection.  No
definitive word yet on the root cause of this latest attack.]