31
Sm0ka
Re: Theme selection
  • 2004/3/9 11:32

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


No problem



32
Sm0ka
Re: Theme selection
  • 2004/3/9 11:07

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


Go to file modules/system/blocks/system_blocks.php and on line 498 change this:

$block['theme_select'] = '<select name="xoops_theme_select" onchange="submit();" size="3">'.$theme_options.'</select>';


for this:

$block['theme_select'] = '<select name="xoops_theme_select" onchange="submit();" size="10">'.$theme_options.'</select>';



If i could test it i would give you a certain answer but i have no place to test it...if it doesn't work shout something back at me



33
Sm0ka
Re: Theme selection
  • 2004/3/9 10:39

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


so you want to show more then 3 themes right?



34
Sm0ka
Re: Theme selection
  • 2004/3/9 9:56

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


Try going to:

ctrl panel>system>blocks>themes>edit template and change the code:

<div style="text-align: center;">
<
form action="index.php" method="post">
<{
$block.theme_select}>
</
form>
</
div>


for

<MARQUEE onmouseover=this.stop() onmouseout=this.start() 
scrollAmount=1 direction=up width="100%" height=100>
<
div style="text-align: center;">
<
form action="index.php" method="post">
<{
$block.theme_select}>
</
form>
</
div>
</
marquee>


I can't test it but it should work fine.



35
Sm0ka
Re: Theme selection
  • 2004/3/9 9:45

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


Can you rephrase your question?
It's not clear (for me) what you want... do you want to have your blocks (top downloads for example) slide top/left via marquee? Do you want the theme selection block to slide via marquee?



36
Sm0ka
Re: Securing / Hardening XOOPs - Strategies, Experiences, Tips ?
  • 2004/3/9 9:39

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


In my opinion, if you are indeed wanting to use a CMs, XOOPS will be the most seure option. You can expect a few vulns regarding modules, but you would definitly be sure to check your sql server for injection vulns. This is the most common hacking way (along with XSS) on CMS. I usually do some auditing myself, but your sugestion of dummies is not bad, just be sure to pick the right people for the job.

I guess you already know this, but if you are into doing the audit yourself, nessus is the best of the best, of the best, but you can also check this kneet list http://www.insecure.org/tools.html.



37
Sm0ka
Re: How to hack back into site?!?
  • 2004/3/9 9:26

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


I guess that if you dump all your tables, create a new data base (same name as the one you used before) , and then fill it up with your .sql file everything should be ok, and i although 36mb is a big sql file i dont see why you have to cut it, unless your server as some sort of operation time out thingy...



38
Sm0ka
Re: How to hack back into site?!?
  • 2004/3/9 9:18

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


I would also sugest you using module backup to backup your sql database. I think you can also do this via phpmyadmin... this way next time your database is corrupted you can simple dump all in your table and upload the good saved sql.



39
Sm0ka
Re: Accessing $XOOPS Variables In Custom Blocks
  • 2004/3/9 8:52

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


hmmm... wouldn't it be great if there was a file with the smarty variables and their correspondents in block allowed variables? Or maybe open up a wiki for this?
Just an idea as it would be good for us rookies to access this on a simple way.



40
Sm0ka
Re: How to hack back into site?!?
  • 2004/3/9 8:48

  • Sm0ka

  • Just popping in

  • Posts: 41

  • Since: 2003/12/25


Quote:

Need more security!


I have to disagree. If you want to prevent nasty surprises, be carefull who you give admin rights to. All vulns i've known about regard modules and NOT XOOPS itself.

Plus, XOOPS is waaaaaay better than php/post-nuke, were you can find XSS vulns almosst every day

/edit

have you tried accessing you admin page directly? as inhttp://your_site.com/admin.php ?




TopTop
« 1 2 3 (4)



Login

Who's Online

214 user(s) are online (133 user(s) are browsing Support Forums)


Members: 0


Guests: 214


more...

Donat-O-Meter

Stats
Goal: $100.00
Due Date: May 31
Gross Amount: $0.00
Net Balance: $0.00
Left to go: $100.00
Make donations with PayPal!

Latest GitHub Commits