![]() # Miscellaneous badware, comment spam (including Zhou Pizhong and DataShack) and exploiting hosts and servers: # If your web server is covered by this blocklist the included page will get a 403 forbidden server status. # Example of a page that might be blocked: You use PHP (or SSI) includes for headers, navigation links, or footers, using this form: You can find your website's IP address by logging into your website's Control Panel (e.g. # If this occurs you should find the IP of your website, or server, and allow it, using the example form: allow from (your IP address(es)) ![]() # If your website, or dedicated server, has an IP address falling within the ones below and you use absolute URLs in your includes or links, those pages will be blocked from loading. # BEFORE USING THIS BLOCKLIST, MAKE SURE THAT YOUR WEBSITE IS RUNNING ON APACHE WEB SERVER 2.4 OR NEWER. # THEY WILL CAUSE A SERVER 500 ERROR LOCKOUT IN EARLIER VERSIONS OF APACHE! # NOTE: THE COMMANDS IN THIS BLOCKLIST APPLY TO APACHE 2.4 AND NEWER.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |