home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
MacWorld 1999 April
/
Macworld (1999-04).dmg
/
Serious Software
/
SiteCam 3.0 demo
/
SiteCam
/
SiteCam.rsrc
/
TEXT_2001_pi_admin.txt
< prev
next >
Wrap
Text File
|
1998-12-19
|
1KB
|
38 lines
<HTML>
<HEAD>
<title>SiteCam Plug-in Admin</title>
</HEAD>
<BODY BGCOLOR="#FFFFFF">
<FORM action="pi_admin.mwc" method="POST">
SiteCam Plug-in Status Message Level: (0-2) <BR>
<INPUT TYPE="text" NAME="verbose" VALUE="<!--Verbose-->" SIZE=3>
(Level: 0 = no messages; 1 = normal messages; 2 = debug messages)
<BR>
<P><INPUT TYPE="checkbox" NAME="InUseCheck" <HJ_STATE>>Use Anti-Hijacking<BR>
<BLOCKQUOTE>
Referrer must match one of the following:<BR>
<INPUT TYPE="text" NAME="match1" VALUE="<HJ1>" SIZE=75><BR>
<INPUT TYPE="text" NAME="match2" VALUE="<HJ2>" SIZE=75><BR>
<INPUT TYPE="text" NAME="match3" VALUE="<HJ3>" SIZE=75><BR>
<INPUT TYPE="text" NAME="match4" VALUE="<HJ4>" SIZE=75><BR>
<INPUT TYPE="text" NAME="match5" VALUE="<HJ5>" SIZE=75><BR>
<INPUT TYPE="text" NAME="match6" VALUE="<HJ6>" SIZE=75><BR>
<INPUT TYPE="checkbox" NAME="DisallowCheck" <HJ_BLANKSTATE>>Disallow empty (blank) referer<BR>
</BLOCKQUOTE>
<P>When hijacked, the SiteCam plug-in will return:<BR>
1. The SiteCam document "<B>public</B>"<BR>
2. The image file "<B>sitecam_hijack.gif</B>" (located in the server's root directory)<BR>
OR<BR>
3. A single image of the document first requested.<BR>
Whichever is found first.
</P>
Current Hijack State: <!--CurHijackState--><BR>
<P><INPUT TYPE="submit" NAME="Submit" VALUE="Update"></P>
</FORM>
</BODY>
</HTML>