• Hello there guest and Welcome to The #1 Classic Mustang forum!
    To gain full access you must Register. Registration is free and it takes only a few moments to complete.
    Already a member? Login here then!

Site issues

"Laurie S." said:
Why doesn't my login stick? Just a temporary problem?

Having the same problem as Laurie, my login needs to be redone everytime I try to log on
 
"Midlife" said:
"Sluggo" said:
"Midlife" said:
Is this the permanent location now? I have it as: 69.195.124.124/~stangfix/index.php

At the moment, there's no way to access my profile to change such things as the timeofday, avatar, etc.

Yes. It shows that because the domain is not transferred yet. Once that is done it will display normally.

I can access your profile. Tried clearing you cache and sessions?
Cleared cache. Banner only has Home, Help, Moderate, Member Map, Logout. Under User, has Hello, # of PM's, Unread Posts, Unread Replies, My Images, Logout. Could it be because I have Moderator privileges?

Does the theme look normal or is it blue?

Laurie, same here. I think that's due to the fact that the cookie is related to the domain but the domain is only pointed to the site until I transfer it permanently.
 
Theme appears to be blue, if that is any help.

I'm not complaining, but I'm sure Sluggo would appreciate knowing about any quirks that appear.
 
Not complaining, either, I remember this happened the last time. I can access my profile fine.
 
Profile and pm are permissions issues. I thought I carried the permissions over from the old database but apparently not.

I have reset them for donator class. Should be good now. I'll get to the rest when I can. Probably in the morning.
 
"Midlife" said:
Theme appears to be blue, if that is any help.

I'm not complaining, but I'm sure Sluggo would appreciate knowing about any quirks that appear.

You should be reset to the normal stangfix theme
 
"cmayna" said:
No problem accessing my PM's and profile. But losing all my food pics - :eek:mg

I'll be working on that today. I may have to just move the pics and then fix broken links as we find them.

There seems to be some inconsistencies in the theme colors as well. I need help with that stuff. If you see something that's whack, please report it in this thread.

Since I did a fresh software install, I was able to make quite a few performance tweaks to help the site be more efficient. One of those was to change the avatar upload directory. According to documentation, if left in the default location each page load will make multiple calls to the database to load a single avatar. Changing the directory location results in a single call.
 
Posting in case any of this is helpful. Which it probably isn't, and in that case just ignore...

Tried to access the site via my bookmark in Firefox, got an error page.
Tried just shortening url to stangfix.com since my old link involved the 'test forum'.
That brought up the site, but I could not log in.
Tried security question (first pet) to reset password, was rebuffed. Tried all lower case. Same result.
Used 'email password' feature to try resetting my old password.
Denied, has to be at least 8 characters.
Used 8+ character PW, which obviously worked. So you guys will just have to continue to deal with me 8)

I noticed I am still showing as not logged in via 'stangfix.com' homepage, but if I click on the Mustang emblem in the upper left it forwards me here (http://69.195.124.124/~stangfix/index.php) and of course I'm good to go.
 
"DougG69" said:
Posting in case any of this is helpful. Which it probably isn't, and in that case just ignore...

Tried to access the site via my bookmark in Firefox, got an error page.
Tried just shortening url to stangfix.com since my old link involved the 'test forum'.
That brought up the site, but I could not log in.
Tried security question (first pet) to reset password, was rebuffed. Tried all lower case. Same result.
Used 'email password' feature to try resetting my old password.
Denied, has to be at least 8 characters.
Used 8+ character PW, which obviously worked. So you guys will just have to continue to deal with me 8)

I noticed I am still showing as not logged in via 'stangfix.com' homepage, but if I click on the Mustang emblem in the upper left it forwards me here (http://69.195.124.124/~stangfix/index.php) and of course I'm good to go.

It's set up now to go straight in using stangfix.com. Once the domain is transferred permanently the ip address will go away.

I changed the password strength to medium. The registration page does not explain that a password must be a mixture of caps, letters, numbers and symbols. It is a pain in the ass. New users also have to answer 3 questions any mustang guy should know, pass the captcha image and pass the spam blocker.
 
Cut and paste test.

CAPTCHA
From Wikipedia, the free encyclopedia
Not to be confused with reCAPTCHA.
A CAPTCHA (an initialism for "Completely Automated Public Turing test to tell Computers and Humans Apart"), a trademark of Carnegie Mellon University, is a type of challenge-response test used in computing to determine whether or not the user is human. The term was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper of Carnegie Mellon University, and John Langford of IBM. The most common type of CAPTCHA was first invented by Mark D. Lillibridge, Martin Abadi, Krishna Bharat, and Andrei Z. Broder. This form of CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen. Because the test is administered by a computer, in contrast to the standard Turing test that is administered by a human, a CAPTCHA is sometimes described as a reverse Turing test. This term is ambiguous because it could also mean a Turing test in which the participants are both attempting to prove they are the computer.

This CAPTCHA of "smwm" obscures its message from computer interpretation by twisting the letters and adding a background color gradient.
Contents [hide]
1 Origin and inventorship
2 Applications
3 Characteristics
4 Accessibility
5 Circumvention
5.1 Cheap or unwitting human labor
5.2 Insecure implementation
5.3 Computer character recognition
5.4 Image recognition CAPTCHAs vs. character recognition CAPTCHAs
6 References
7 External links
7.1 Defeating CAPTCHAs
Origin and inventorship[edit]

Since the early days of the Internet, users have wanted to make text illegible to computers. The first such people were hackers, posting about sensitive topics to online forums they thought were being automatically monitored for keywords. To circumvent such filters, they would replace a word with look-alike characters. HELLO could become |-|3|_|_() or )-(3££0, as well as numerous other variants, such that a filter could not possibly detect all of them. This later became known as leetspeak.
The first discussion of automated tests which distinguish humans from computers for the purpose of controlling access to web services appears in a 1996 manuscript of Moni Naor from the Weizmann Institute of Science, entitled "Verification of a human in the loop, or Identification via the Turing Test".
Subsequent to that work, two teams of people have claimed to be the first to invent the CAPTCHAs used throughout the Web today. The first team consists of Mark D. Lillibridge, Martin Abadi, Krishna Bharat, and Andrei Z. Broder, who used CAPTCHAs in 1997 at AltaVista to prevent bots from adding URLs to their search engine. Looking for a way to make their images resistant to OCR attack, the team looked at the manual to their Brother scanner, which had recommendations for improving OCR's results (similar typefaces, plain backgrounds, etc.). The team created puzzles by attempting to simulate what the manual claimed would cause bad OCR.
The second team to claim inventorship of CAPTCHAs consists of Luis von Ahn and Manuel Blum, who described CAPTCHAs in a 2003 publication[1] and subsequently received much coverage in the popular press. Their notion of CAPTCHA covers any program that can distinguish humans from computers, including many different examples of CAPTCHAs.
The controversy of inventorship has been settled by the existence of a 1998 patent by Lillibridge, Abadi, Bharat, and Broder,[2] which predates other publications by several years. Though the patent does not use the term CAPTCHA, it describes the ideas in detail and precisely depicts the graphical CAPTCHAs used in the Web today.
Applications[edit]

CAPTCHAs are used to prevent bots from using various types of computing services or collecting certain types of sensitive information. Applications include preventing bots from taking part in online polls, registering for free email accounts (which may then be used to send spam) and collecting email addresses. CAPTCHAs can prevent bot-generated spam by requiring that the (unrecognized) sender pass a CAPTCHA test before the email message is delivered, but the technology can also be exploited by spammers by impeding OCR detection of spam in images attached to email messages. CAPTCHAs have also been used to prevent people from using bots to assist with massive downloading of content from multimedia websites. They are used in online message boards and blog comments to prevent bots from posting spam links as a comment or message.
Characteristics[edit]

CAPTCHAs are by definition fully automated, requiring little human maintenance or intervention in administering the test. This has obvious benefits in cost and reliability.
By definition, the algorithm used to create the CAPTCHA must be made public, though it may be covered by a patent. This is done to demonstrate that breaking it requires the solution to a difficult problem in the field of artificial intelligence (AI) rather than just the discovery of the (secret) algorithm, which could be obtained through reverse engineering or other means.
Accessibility[edit]

CAPTCHAs based on reading text — or other visual-perception tasks — prevent blind or visually impaired users from accessing the protected resource.[3] However, CAPTCHAs do not have to be visual. Any hard artificial intelligence problem, such as speech recognition, can be used as the basis of a CAPTCHA. Some implementations of CAPTCHAs permit users to opt for an audio CAPTCHA.[4] Other implementations do not require users to enter text, instead asking the user to pick images with common themes from a random selection.[5]
For non-sighted users (for example blind users, or the color blind on a color-using test), visual CAPTCHAs present serious problems. Because CAPTCHAs are designed to be unreadable by machines, common assistive technology tools such as screen readers cannot interpret them. Since sites may use CAPTCHAs as part of the initial registration process, or even every login, this challenge can completely block access. In certain jurisdictions, site owners could become target of litigation if they are using CAPTCHAs that discriminate against certain people with disabilities. For example, a CAPTCHA may make a site incompatible with Section 508 in the United States. In other cases, those with sight difficulties can choose to identify a word being read to them.
While providing an audio CAPTCHA allows blind users to read the text, it still hinders those who are both visually and hearing impaired. According to sense.org.uk, about 4% of people over 60 in the UK have both vision and hearing impairments. There are about 23,000 people in the UK who have serious vision and hearing impairments. According to The National Technical Assistance Consortium for Children and Young Adults Who Are Deaf-Blind (NTAC), there were 9,516 deafblind children in the USA in 2004.[6] Gallaudet University quotes a 1993 estimate of 35,000 fully deafblind adults in the USA.[7] Deafblind population estimates depend heavily on the degree of impairment used in the definition. An open question is what fraction of people cited as impaired use websites that would restrict them.
The use of CAPTCHA thus excludes a small number of individuals from using significant subsets of such common Web-based services as PayPal, GMail, Orkut, Yahoo!, many forum and weblog systems, etc.
Even for perfectly sighted individuals, new generations of graphical CAPTCHAs, designed to overcome sophisticated recognition software, can be very hard or impossible to read.
A method of improving the CAPTCHA to ease the work with it was proposed by ProtectWebForm and was called "Smart CAPTCHA".[8] Developers advise to combine the CAPTCHA with JavaScript support. Since it is too hard for most of spam robots to parse and execute JavaScript, using a simple script which fills the CAPTCHA fields and hides the image and the field from human eyes was proposed.
One alternative method involves displaying to the user a simple mathematical equation and requiring the user to enter the solution as verification. Although these are much easier to defeat using software, they are suitable for scenarios where graphical imagery is not appropriate, and they provide a much higher level of accessibility for visually impaired users than the image-based CAPTCHAs. These are sometimes referred to as MAPTCHAs (M = 'Mathematical'). However, these may be difficult for users with a cognitive disorder.
Other kinds of challenges, such as those that require understanding the meaning of some text (e.g., a logic puzzle, trivia question, or instructions on how to create a password) can also be used as a CAPTCHA. Again, there is little research into their resistance against countermeasures.
See also: Web accessibility
Circumvention[edit]

There are a few approaches to defeating CAPTCHAs: using cheap human labor to recognize them, exploiting bugs in the implementation that allow the attacker to completely bypass the CAPTCHA, and finally improving character recognition software.
Cheap or unwitting human labor[edit]
It may be possible to subvert CAPTCHAs by relaying them to a sweatshop of human operators who are employed to decode CAPTCHAs. The W3C paper linked below states that such an operator "could easily verify hundreds of them each hour". Nonetheless, some have suggested that this would still not be economically viable.[9] Another technique used consists of using a script to re-post the target site's CAPTCHA as a CAPTCHA to a site owned by the attacker, which unsuspecting humans visit and correctly solve within a short while for the script to use.[10]
Insecure implementation[edit]
Howard Yeend has identified two implementation issues with poorly designed CAPTCHA systems:[11]
Some CAPTCHA protection systems can be bypassed without using OCR simply by re-using the session ID of a known CAPTCHA image.
Captchas residing on shared servers also present a problem; a security issue on another virtual host may leave the CAPTCHA issuer's site vulnerable.
Sometimes, if part of the software generating the CAPTCHA is client-side (the validation is done on a server but the text that the user is required to identify is rendered on the client side), then users can modify the client to display the unrendered text. Some CAPTCHA systems use MD5 hashes stored client-side, which may leave the CAPTCHA vulnerable to a brute-force attack.[citation needed]
Computer character recognition[edit]
Although CAPTCHAs were originally designed to defeat standard OCR software designed for document scanning, a number of research projects have proven that it is possible to defeat many CAPTCHAs with programs that are specifically tuned for a particular type of CAPTCHA. For CAPTCHAs with distorted letters, the approach typically consists of the following steps:
Removal of background clutter, for example with color filters and detection of thin lines.
Segmentation, i.e. splitting the image into segments containing a single letter.
Identifying the letter for each segment.
Step 1 is typically very easy to do automatically. In 2005, it was also shown that neural network algorithms have a lower error rate than humans in step 3.[12] The only part where humans still outperform computers is step 2. If the background clutter consists of shapes similar to letter shapes, and the letters are connected by this clutter, the segmentation becomes nearly impossible with current software. Hence, an effective CAPTCHA should focus on step 2, the segmentation.
Neural networks have been used with great success to defeat CAPTCHAs as they are generally indifferent to both affine and non-linear transformations. As they learn by example rather than through explicit coding, with appropriate tools very limited technical knowledge is required to defeat more complex CAPTCHAs.
Some CAPTCHA-defeating projects:
Mori et al. published a paper in IEEE CVPR'03 detailing a method for defeating one of the most popular CAPTCHAs, EZ-Gimpy, which was tested as being 92% accurate in defeating it.[13] The same method was also shown to defeat the more complex and less-widely deployed Gimpy program 33% of the time. However, the existence of implementations of their algorithm in actual use is indeterminate at this time.
PWNtcha has made significant progress in defeating commonly used CAPTCHAs, which has contributed to a general migration towards more sophisticated CAPTCHAs.[14]
A number of Microsoft Research papers describe how computer programs and humans cope with varying degrees of distortion.[15]
Image recognition CAPTCHAs vs. character recognition CAPTCHAs[edit]
With the demonstration (through research publications) that character recognition CAPTCHAs are vulnerable to computer vision based attacks, some researchers have proposed alternatives to character recognition, in the form of image recognition CAPTCHAs which require users to identify simple objects in the images presented. The argument is that object recognition is typically considered a more challenging problem than character recognition, due to the limited domain of characters and digits in the English alphabet.
Some proposed image recognition CAPTCHAs include:
Chew et al. published their work in the 7th International Information Security Conference, ISC'04, proposing three different versions of image recognition CAPTCHAs, and validating the proposal with user studies. It is suggested that one of the versions, the anomaly CAPTCHA, is best with 100% of human users being able to pass an anomaly CAPTCHA with at least 90% probability in 42 seconds.[16]
Datta et al. published their paper in the ACM Multimedia '05 Conference, named IMAGINATION (IMAge Generation for INternet AuthenticaTION), proposing a systematic way to image recognition CAPTCHAs. Images are distorted in such a way that state-of-the-art image recognition approaches[17] (which are potential attack technologies) fail to recognize them.[18]
 
"Laurie S." said:
Why doesn't my login stick? Just a temporary problem?

Dunno if anyone else is having the same problem, but I too have to log in each time. I tried deleting the old cookies so I had fresh ones, as well as flushing my cache. Same issue each time. Not complaining mind you, just pointing it out to help work the bugs out. Thanks for all your hard work!


p.s. I also just noticed all of the old message icons are gone (hadn't seen that one mentioned by anyone else).
 
"Ponyman66" said:
"Laurie S." said:
Why doesn't my login stick? Just a temporary problem?

Dunno if anyone else is having the same problem, but I too have to log in each time. I tried deleting the old cookies so I had fresh ones, as well as flushing my cache. Same issue each time. Not complaining mind you, just pointing it out to help work the bugs out. Thanks for all your hard work![nb]That will cure itself when the domain is transferred permanently [/nb]


p.s. I also just noticed all of the old message icons are gone (hadn't seen that one mentioned by anyone else).[nb]I'm not sure of what you speak. Please elaborate.[/nb]
 
Back
Top