26

(1,382 replies, posted in General discussion)

bitch    roll

27

(1,382 replies, posted in General discussion)

down

28

(13 replies, posted in PunBB 1.2 show off)

Looking good... will try it on my test machine soon big_smile

You could add a field to the post table that saves the current post count for that user.

I can already imagine the name... 

Adobe Macromedia Go Live CS2


SVG will live on wink

31

(11 replies, posted in News)

Well with uptime like that...  wink   good to have you back online.

32

(51 replies, posted in Feature requests)

Someone was talking about trolls earlier ...    wink  tongue

33

(3 replies, posted in PunBB 1.2 troubleshooting)

This is probably an effort to save some space, as you say less than 1.6% of your subscribers has longer email.
If you do the neccesary changes in the db you can probably raise the limit in your code.

34

(21 replies, posted in PunBB 1.2 discussion)

Add me to that list wink

35

(3 replies, posted in Programming)

It probably set a cookie on your machine so although the vote didn't go into the db the cookie got written to your machine.

36

(26 replies, posted in Feature requests)

sfackler wrote:

Random salt hashing would work well, to, but after you get one pass, wouldn't you have the salt for all the other passwords?

Well if you check the article Rickard pointed to you find these words that descripe the essence of the random salt wink

Dictionary attacks with pre-generated lists of hashes will be useless for the same reason - the attacker will now have to recalculate their entire dictionary for every individual account they're attempting to crack.

So even though they would know the random hash it doesn't matter, you've added an N to the calculation so instead of 1 dictionary for 100 users they would need 100 dictionaries(1 dict * 100 users) for the attack and that is assuming they have access to your DB and know your random salt string.

37

(12 replies, posted in Programming)

Worked for me although the " changed into an /...   I assume you have fixed this by now?
Anyway > http://www.omgultime.com/archives.php?id=52 < might wanna delete that wink

38

(1,382 replies, posted in General discussion)

Sex pistols

39

(1,382 replies, posted in General discussion)

Gabriel Byrne

40

(30 replies, posted in PunBB 1.2 discussion)

"Please deposit 2 billion quarters in the slot!"

41

(1,382 replies, posted in General discussion)

unemployment

42

(254 replies, posted in PunBB 1.2 discussion)

Guilty wink

I didn't know that you minored in mind reading...
but then again my mistakes are sometimes... big_smile

43

(254 replies, posted in PunBB 1.2 discussion)

Yes, and it didn't fix it then but it worked now.
Must have been a S.U.M. on my behalf big_smile

44

(6 replies, posted in Programming)

This is a javascript job.

You can go a dirty and expensive way if you insist on using server programing.

You can get the counter from the url and by using meta-refresh set on... say 1 sec you could then count upwards. But as I said, VERY dirty and loads your server.
i.e.

$c = $_GET['counter'];
$c++;
echo '<META HTTP-EQUIV="refresh" content="1;URL=page.php?counter"'.$c.'>'; 

Use javascript smile

45

(254 replies, posted in PunBB 1.2 discussion)

I get this error

Notice: Undefined index: p_force_guest_email in /home/.badjun/svg/tf-egd.net/new/spjall/admin_permissions.php on line 116
Notice: Undefined index: p_force_guest_email in /home/.badjun/svg/tf-egd.net/new/spjall/admin_permissions.php on line 116

I still have this input in my config table >  p_force_guest_email 1


I have to say that Paul did a superb job on the CSS side and I'm also very happy with the changes in 1.2 big_smile Good job Rickard

46

(277 replies, posted in PunBB 1.2 discussion)

In Soviet Russia register regstrates you!

47

(1,382 replies, posted in General discussion)

day

48

(1,382 replies, posted in General discussion)

old

49

(1,382 replies, posted in General discussion)

Coalition

50

(1,382 replies, posted in General discussion)

turkey