473,382 Members | 1,766 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

security issues... please help asap!!!

djsjm
23
hi guys....

i just went to fill out a contact form on someone's webpage and got this error message at the top of the page:

*** We are sorry but spam from your ip address: xx.xx.xxx.xxx is not allowed! ***

(obviously, i replaced my address with x's).

what does this mean???? is my computer at risk... or has something already happened?

help!

=(
Nov 7 '08 #1
3 1028
YarrOfDoom
1,247 Expert 1GB
Could you give a link to that form?

I'm guessing that your ISP is on the blacklist of that site, if this is the case, then there's no problem at your side.
Nov 7 '08 #2
djsjm
23
hey there... thanks for your quick response. i called them and left a message explaining what happened. he called back and said that he's experimenting with spam filtering on his website and that's why i got the message.

nice.

scare the crap out of me.

seems he needs to fix whatever he's doing.... because i could very well be only one among many who weren't able to contact him... some of whom probably just took their business elsewhere!

the irony is... the guy is a web designer. should i hire a guy who makes things like this happen? (rhetorical question!!!)

thanks again for your response!!!

i just adore you guys over here!
Nov 7 '08 #3
gits
5,390 Expert Mod 4TB
the irony is... the guy is a web designer. should i hire a guy who makes things like this happen? (rhetorical question!!!)
good 'rhetorical question' :) ... of course you should hire people that think about spam-filtering for their applications rather then ones that just forget about it :) ... even when there might be problems with the filter itself, or its implementation. and i would appreciate your call when it would have been my filter so that i would be aware of the problem with it ... so this is just a nice example for the importance of testing - when this problem could lead to loss of money then it should have been tested in a way to avoid those problem as best as it could be avoided ... in case it is just an experimental page then this was the test ;) ... so such features are to be planned very well depending on the context where they will be productive in the end ... (rhetorical answer ;) )

kind regards
Nov 9 '08 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

28
by: grahamd | last post by:
Who are the appropriate people to report security problems to in respect of a module included with the Python distribution? I don't feel it appropriate to be reporting it on general mailing lists.
3
by: Stephen Cairns | last post by:
I have a small security problem. I have a number of pages on a server and I want things set-up so as the user can't get into other pages without going to the index page and logging in first. At...
6
by: jmev7 | last post by:
I have heard of security issues with IIS while on a T1 line or on a cable modem, etc. I learned of a "break in" at a state office, and it was traced to an "open door" while using IIS. Due to that...
24
by: Bob Alston | last post by:
Could develop web pages that would interact with the access/jet database - like DAP but without the security flaw??? One of Access' competitors (Filemaker Pro as I recall) touts its EASY way to...
2
by: Sanjay Poojari | last post by:
Hi All, Need some advice on some of the security issues in my ASP.Net application. There are certain tasks that I need to implement so need advice/guidance on them as well as safeguards that I...
0
by: Ken North | last post by:
Microsoft's Dan Rogers will be one of the panel members in an important discussion of Web services security. On August 10, the San Diego Software Industry Council (SDSIC) is sponsoring a panel...
2
by: gundam.f0rtre55 | last post by:
Hi everybody, for a new release of our J2EE Webapplication, our customer wish to allow the usage of bookmarklets. The application must be able to register URLs with several protocol types, one of...
0
by: Worku Yohannes | last post by:
I am happy to join you. Hellow, By proffession I am an economist(ethiopian), but when I observed the challenges of microfinance institutions, I had decided to develop a software to manage their...
5
by: prognoob | last post by:
I have searched online, and what I mostly come across is what these security issues are... for example, Worms, Backdoor Trojan Horses, Hijacking and Impersonation, Denial of Service etc. but I...
3
by: amjad905 | last post by:
Hi, I have created some dynamic labels and some dynamic linkbuttons... those linkbuttons have addhandlers assigned to them... but in postback those buttons gets deleted... the code is shown...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.