Fourm error Help Cant Get RidOf It

  Post new topicReply to topicPrintable Version
<< View previous topic View next topic >>
Share: Del.icio.us  Digg  Google  Spurl  Blink  Furl  Y! MyWeb  
#1   Fourm error Help Cant Get RidOf It
rlgnak
CZ Super Newbie
rlgnak has been a member for over 20 year's 20 Year Member
usa.gif alaska.gif
Occupation: College
Gender: Male
Status: Offline
Joined: Jun 22, 2004
0.01 posts per day
Posts: 62
Points: 3,367
   
Im'a Trying toget rid of this its at the top of my fourm page
Any Help Would Be Greatly Appreciated

Warning: Cannot modify header information - headers already sent by (output started at /home/freehost/t35.com/r/l/rlgnak/header.php:32) in /home/freehost/t35.com/r/l/rlgnak/includes/sessions.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at /home/freehost/t35.com/r/l/rlgnak/header.php:32) in /home/freehost/t35.com/r/l/rlgnak/includes/sessions.php on line 251



Back to top Reply with quote
#2   re: Fourm error Help Cant Get RidOf It
Taut
PayPal Donation
CZ Revered Member
 Codezwiz Site Donator
usa.gif california.gif
Occupation: Entrepreneur
Gender: Female
Fav. Sports Team: SF Giants
Status: Offline
Joined: May 27, 2003
0.70 posts per day
Posts: 5530
Points: 481,695
   
post includes/sessions.php file please



Back to top Reply with quote
#3   re: Fourm error Help Cant Get RidOf It
Dauthus
CZ Addict
 Codezwiz Site Donator
Dauthus has been a member for over 20 year's 20 Year Member
usa.gif illinois.gif
Age: 61
Gender: Male
Website:
Status: Offline
Joined: Mar 17, 2004
0.06 posts per day
Posts: 426
Points: 15,917
   
Try looking here:
[ Register or login to view links on this board. ]




_________________
[ Register or login to view links on this board.]
Vivere disce, cogita mori
Back to top Reply with quote
#4   re: Fourm error Help Cant Get RidOf It
rlgnak
CZ Super Newbie
rlgnak has been a member for over 20 year's 20 Year Member
usa.gif alaska.gif
Occupation: College
Gender: Male
Status: Offline
Joined: Jun 22, 2004
0.01 posts per day
Posts: 62
Points: 3,367
   
here ya go thanx

<?php
/***************************************************************************
*                                sessions.php
*                            -------------------
*   begin                : Saturday, Feb 13, 2001
*   copyright            : (C) 2001 The phpBB Group
*   email                : [ Register or login to view links on this board. ]
*
*   $Id: sessions.php,v 1.58.2.10 2003/04/05 12:04:33 acydburn Exp $
*
*
***************************************************************************/

/***************************************************************************
* phpbb2 forums port version 2.0.5 (c) 2003 - Nuke Cops (http://nukecops.com)
*
* Ported by Nuke Cops to phpbb2 standalone 2.0.5 Test
* and debugging completed by the Elite Nukers and site members.
*
* You run this package at your sole risk. Nuke Cops and affiliates cannot
* be held liable if anything goes wrong. You are advised to test this
* package on a development system. Backup everything before implementing
* in a production environment. If something goes wrong, you can always
* backout and restore your backups.
*
* Installing and running this also means you agree to the terms of the AUP
* found at Nuke Cops.
*
* This is version 2.0.5 of the phpbb2 forum port for PHP-Nuke. Work is based
* on Tom Nitzschner's forum port version 2.0.6. Tom's 2.0.6 port was based
* on the phpbb2 standalone version 2.0.3. Our version 2.0.5 from Nuke Cops is
* now reflecting phpbb2 standalone 2.0.5 that fixes some bugs and the
* invalid_session error message.
***************************************************************************/
/***************************************************************************
*   This file is part of the phpBB2 port to Nuke 6.0 (c) copyright 2002
*   by Tom Nitzschner (tom@toms-home.com)
*   http://bbtonuke.sourceforge.net (or http://www.toms-home.com)
*
*   As always, make a backup before messing with anything. All code
*   release by me is considered sample code only. It may be fully
*   functual, but you use it at your own risk, if you break it,
*   you get to fix it too. No waranty is given or implied.
*
*   Please post all questions/request about this port on http://bbtonuke.sourceforge.net first,
*   then on my site. All original header code and copyright messages will be maintained
*   to give credit where credit is due. If you modify this, the only requirement is
*   that you also maintain all original copyright messages. All my work is released
*   under the GNU GENERAL PUBLIC LICENSE. Please see the README for more information.
*
***************************************************************************/

/***************************************************************************
*
*   This program is free software; you can redistribute it and/or modify
*   it under the terms of the GNU General Public License as published by
*   the Free Software Foundation; either version 2 of the License, or
*   (at your option) any later version.
*
***************************************************************************/

//
// Adds/updates a new session to the database for the given userid.
// Returns the new session ID on success.
//
function session_begin($user_id, $user_ip, $page_id, $auto_create = 0, $enable_autologin = 0)
{
   global $db, $board_config;
   global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID;

   $cookiename = $board_config['cookie_name'];
   $cookiepath = $board_config['cookie_path'];
   $cookiedomain = $board_config['cookie_domain'];
   $cookiesecure = $board_config['cookie_secure'];

   if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) || isset($HTTP_COOKIE_VARS[$cookiename . '_data']) )
   {
      $session_id = isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : '';
      $sessiondata = isset($HTTP_COOKIE_VARS[$cookiename . '_data']) ? unserialize(stripslashes($HTTP_COOKIE_VARS[$cookiename . '_data'])) : array();
      $sessionmethod = SESSION_METHOD_COOKIE;
   }
   else
   {
      $sessiondata = array();
      $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : '';
      $sessionmethod = SESSION_METHOD_GET;
   }

   $last_visit = 0;
   $current_time = time();
   $expiry_time = $current_time - $board_config['session_length'];

   //
   // Try and pull the last time stored in a cookie, if it exists
   //
   $sql = "SELECT *
      FROM " . USERS_TABLE . "
      WHERE user_id = '$user_id'";
   if ( !($result = $db->sql_query($sql)) )
   {
      message_die(CRITICAL_ERROR, 'Could not obtain lastvisit data from user table', '', __LINE__, __FILE__, $sql);
   }

   $userdata = $db->sql_fetchrow($result);

   if ( $user_id != ANONYMOUS )
   {
      $auto_login_key = $userdata['user_password'];

      if ( $auto_create )
      {
         if ( isset($sessiondata['autologinid']) && $userdata['user_active'] )
         {
            // We have to login automagically
            if( $sessiondata['autologinid'] == $auto_login_key )
            {
               // autologinid matches password
               $login = 1;
               $enable_autologin = 1;
            }
            else
            {
               // No match; don't login, set as anonymous user
               $login = 0;
               $enable_autologin = 0;
                                        $user_id = $userdata['user_id'] = ANONYMOUS;
            }
         }
         else
         {
            // Autologin is not set. Don't login, set as anonymous user
            $login = 0;
            $enable_autologin = 0;
                                $user_id = $userdata['user_id'] = ANONYMOUS;
         }
      }
      else
      {
         $login = 1;
      }
   }
   else
   {
      $login = 0;
      $enable_autologin = 0;
   }

   //
   // Initial ban check against user id, IP and email address
   //
   preg_match('/(..)(..)(..)(..)/', $user_ip, $user_ip_parts);

   $sql = "SELECT ban_ip, ban_userid, ban_email
      FROM " . BANLIST_TABLE . "
      WHERE ban_ip IN ('" . $user_ip_parts[1] . $user_ip_parts[2] . $user_ip_parts[3] . $user_ip_parts[4] . "', '" . $user_ip_parts[1] . $user_ip_parts[2] . $user_ip_parts[3] . "ff', '" . $user_ip_parts[1] . $user_ip_parts[2] . "ffff', '" . $user_ip_parts[1] . "ffffff')
         OR ban_userid = '$user_id'";
   if ( $user_id != ANONYMOUS )
   {
      $sql .= " OR ban_email LIKE '" . str_replace("\'", "''", $userdata['user_email']) . "'
         OR ban_email LIKE '" . substr(str_replace("\'", "''", $userdata['user_email']), strpos(str_replace("\'", "''", $userdata['user_email']), "@")) . "'";
   }
   if ( !($result = $db->sql_query($sql)) )
   {
      message_die(CRITICAL_ERROR, 'Could not obtain ban information', '', __LINE__, __FILE__, $sql);
   }

   if ( $ban_info = $db->sql_fetchrow($result) )
   {
      if ( $ban_info['ban_ip'] || $ban_info['ban_userid'] || $ban_info['ban_email'] )
      {
         message_die(CRITICAL_MESSAGE, 'You_been_banned');
      }
   }

   //
   // Create or update the session
   //
   $sql = "UPDATE " . SESSIONS_TABLE . "
      SET session_user_id = $user_id, session_start = $current_time, session_time = $current_time, session_page = $page_id, session_logged_in = $login
      WHERE session_id = '" . $session_id . "'
         AND session_ip = '$user_ip'";
   if ( !$db->sql_query($sql) || !$db->sql_affectedrows() )
   {
      $session_id = md5(uniqid($user_ip));

      $sql = "INSERT INTO " . SESSIONS_TABLE . "
         (session_id, session_user_id, session_start, session_time, session_ip, session_page, session_logged_in)
         VALUES ('$session_id', '$user_id', '$current_time', '$current_time', '$user_ip', '$page_id', '$login')";
      if ( !$db->sql_query($sql) )
      {
                $error = TRUE;
                if (SQL_LAYER == "mysql" || SQL_LAYER == "mysql4")
                {
                    $sql_error = $db->sql_error($result);
                    if ($sql_error["code"] == 1114)
                    {
                        $result = $db->sql_query('SHOW TABLE STATUS LIKE "'.SESSIONS_TABLE.'"');
                        $row = $db->sql_fetchrow($result);
                        if ($row["Type"] == "HEAP")
                        {
                            if ($row["Rows"] > 2500)
                            {
                                $delete_order = (SQL_LAYER=="mysql4") ? " ORDER BY session_time ASC" : "";
                                $db->sql_query("DELETE QUICK FROM ".SESSIONS_TABLE."$delete_order LIMIT 50");
                            }
                            else
                            {
                                $db->sql_query("ALTER TABLE ".SESSIONS_TABLE." MAX_ROWS=".($row["Rows"]+50));
                            }
                            if ($db->sql_query($sql))
                            {
                                $error = FALSE;
                            }
                        }
                    }
                }
                if ($error)
                {
                    message_die(CRITICAL_ERROR, "Error creating new session", "", __LINE__, __FILE__, $sql);
                }
                }
   }

   if ( $user_id != ANONYMOUS )
   {// ( $userdata['user_session_time'] > $expiry_time && $auto_create ) ? $userdata['user_lastvisit'] : (
      $last_visit = ( $userdata['user_session_time'] > 0 ) ? $userdata['user_session_time'] : $current_time;

      $sql = "UPDATE " . USERS_TABLE . "
         SET user_session_time = $current_time, user_session_page = $page_id, user_lastvisit = $last_visit
         WHERE user_id = '$user_id'";
      if ( !$db->sql_query($sql) )
      {
         message_die(CRITICAL_ERROR, 'Error updating last visit time', '', __LINE__, __FILE__, $sql);
      }

      $userdata['user_lastvisit'] = $last_visit;

      $sessiondata['autologinid'] = ( $enable_autologin && $sessionmethod == SESSION_METHOD_COOKIE ) ? $auto_login_key : '';
      $sessiondata['userid'] = $user_id;
   }

   $userdata['session_id'] = $session_id;
   $userdata['session_ip'] = $user_ip;
   $userdata['session_user_id'] = $user_id;
   $userdata['session_logged_in'] = $login;
   $userdata['session_page'] = $page_id;
   $userdata['session_start'] = $current_time;
   $userdata['session_time'] = $current_time;

   setcookie($cookiename . '_data', serialize($sessiondata), $current_time + 31536000, $cookiepath, $cookiedomain, $cookiesecure);
   setcookie($cookiename . '_sid', $session_id, 0, $cookiepath, $cookiedomain, $cookiesecure);
   $SID = ( $sessionmethod == SESSION_METHOD_GET ) ? 'sid=' . $session_id : '';

   return $userdata;
}

//
// Checks for a given user session, tidies session table and updates user
// sessions at each page refresh
//
function session_pagestart($user_ip, $thispage_id, $nukeuser)
{
   global $db, $lang, $board_config, $session_id;
   global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID;

   $cookiename = $board_config['cookie_name'];
   $cookiepath = $board_config['cookie_path'];
   $cookiedomain = $board_config['cookie_domain'];
   $cookiesecure = $board_config['cookie_secure'];

   $current_time = time();
   unset($userdata);

   if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) || isset($HTTP_COOKIE_VARS[$cookiename . '_data']) )
   {
      $sessiondata = isset( $HTTP_COOKIE_VARS[$cookiename . '_data'] ) ? unserialize(stripslashes($HTTP_COOKIE_VARS[$cookiename . '_data'])) : array();
      $session_id = isset( $HTTP_COOKIE_VARS[$cookiename . '_sid'] ) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : '';
      $sessionmethod = SESSION_METHOD_COOKIE;
   }
   else
   {
      $sessiondata = array();
      $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : '';
      $sessionmethod = SESSION_METHOD_GET;
   }
        if ( ($nukeuser != "") && ($userdata['session_logged_in'] == "" )) {
                bblogin($nukeuser, $session_id);
        } else {
                $sessiondata = array();
        }

   //
   // Does a session exist?
   //
   if ( !empty($session_id) )
   {
      //
      // session_id exists so go ahead and attempt to grab all
      // data in preparation
      //
      $sql = "SELECT u.*, s.*
         FROM " . SESSIONS_TABLE . " s, " . USERS_TABLE . " u
         WHERE s.session_id = '$session_id'
            AND u.user_id = s.session_user_id";
      if ( !($result = $db->sql_query($sql)) )
      {
         message_die(CRITICAL_ERROR, 'Error doing DB query userdata row fetch', '', __LINE__, __FILE__, $sql);
      }

      $userdata = $db->sql_fetchrow($result);

      //
      // Did the session exist in the DB?
      //
      if ( isset($userdata['user_id']) )
      {
         //
         // Do not check IP assuming equivalence, if IPv4 we'll check only first 24
         // bits ... I've been told (by vHiker) this should alleviate problems with
         // load balanced et al proxies while retaining some reliance on IP security.
         //
         $ip_check_s = substr($userdata['session_ip'], 0, 6);
         $ip_check_u = substr($user_ip, 0, 6);

         if ($ip_check_s == $ip_check_u)
         {
            $SID = ($sessionmethod == SESSION_METHOD_GET || defined('IN_ADMIN')) ? 'sid=' . $session_id : '';

            //
            // Only update session DB a minute or so after last update
            //
            if ( $current_time - $userdata['session_time'] > 60 )
            {
               $sql = "UPDATE " . SESSIONS_TABLE . "
                  SET session_time = '$current_time', session_page = '$thispage_id'
                  WHERE session_id = '" . $userdata['session_id'] . "'";
               if ( !$db->sql_query($sql) )
               {
                  message_die(CRITICAL_ERROR, 'Error updating sessions table', '', __LINE__, __FILE__, $sql);
               }

               if ( $userdata['user_id'] != ANONYMOUS )
               {
                  $sql = "UPDATE " . USERS_TABLE . "
                     SET user_session_time = '$current_time', user_session_page = '$thispage_id'
                     WHERE user_id = " . $userdata['user_id'];
                  if ( !$db->sql_query($sql) )
                  {
                     message_die(CRITICAL_ERROR, 'Error updating sessions table', '', __LINE__, __FILE__, $sql);
                  }
               }

               //
               // Delete expired sessions
               //
               $expiry_time = $current_time - $board_config['session_length'];
               $sql = "DELETE FROM " . SESSIONS_TABLE . "
                  WHERE session_time < '$expiry_time'
                     AND session_id <> '$session_id'";
               if ( !$db->sql_query($sql) )
               {
                  message_die(CRITICAL_ERROR, 'Error clearing sessions table', '', __LINE__, __FILE__, $sql);
               }

               setcookie($cookiename . '_data', serialize($sessiondata), $current_time + 31536000, $cookiepath, $cookiedomain, $cookiesecure);
               setcookie($cookiename . '_sid', $session_id, 0, $cookiepath, $cookiedomain, $cookiesecure);
            }

            return $userdata;
         }
      }
   }

   //
   // If we reach here then no (valid) session exists. So we'll create a new one,
   // using the cookie user_id if available to pull basic user prefs.
   //
   $user_id = ( isset($sessiondata['userid']) ) ? intval($sessiondata['userid']) : ANONYMOUS;

   if ( !($userdata = session_begin($user_id, $user_ip, $thispage_id, TRUE)) )
   {
      message_die(CRITICAL_ERROR, 'Error creating user session', '', __LINE__, __FILE__, $sql);
   }

   return $userdata;

}

//
// session_end closes out a session
// deleting the corresponding entry
// in the sessions table
//
function session_end($session_id, $user_id)
{
   global $db, $lang, $board_config;
   global $HTTP_COOKIE_VARS, $HTTP_GET_VARS, $SID;

   $cookiename = $board_config['cookie_name'];
   $cookiepath = $board_config['cookie_path'];
   $cookiedomain = $board_config['cookie_domain'];
   $cookiesecure = $board_config['cookie_secure'];

   $current_time = time();
   //
   // Pull cookiedata or grab the URI propagated sid
   //
   if ( isset($HTTP_COOKIE_VARS[$cookiename . '_sid']) )
   {
      $session_id = isset( $HTTP_COOKIE_VARS[$cookiename . '_sid'] ) ? $HTTP_COOKIE_VARS[$cookiename . '_sid'] : '';
      $sessionmethod = SESSION_METHOD_COOKIE;
   }
   else
   {
      $session_id = ( isset($HTTP_GET_VARS['sid']) ) ? $HTTP_GET_VARS['sid'] : '';
      $sessionmethod = SESSION_METHOD_GET;
   }

   //
   // Delete existing session
   //
   $sql = "DELETE FROM " . SESSIONS_TABLE . "
      WHERE session_id = '$session_id'
         AND session_user_id = '$user_id'";
   if ( !$db->sql_query($sql) )
   {
      message_die(CRITICAL_ERROR, 'Error removing user session', '', __LINE__, __FILE__, $sql);
   }

   setcookie($cookiename . '_data', '', $current_time - 31536000, $cookiepath, $cookiedomain, $cookiesecure);
   setcookie($cookiename . '_sid', '', $current_time - 31536000, $cookiepath, $cookiedomain, $cookiesecure);

   return true;
}

//
// Append $SID to a url. Borrowed from phplib and modified. This is an
// extra routine utilised by the session code above and acts as a wrapper
// around every single URL and form action. If you replace the session
// code you must include this routine, even if it's empty.
//
function append_sid($url, $non_html_amp = false)
{
   global $SID, $admin;
   if (ereg("admin=1", $url) || ereg("admin_", $url) || ereg("pane=", $url)){
                        //  The format is fine, don't change a thing.
   } else if (ereg("Your_Account", $url)){
           $url = str_replace(".php", "", $url);       //  Strip the .php from all the files,
           $url = str_replace("modules", "modules.php", $url); //  and put it back for the modules.php
   }
   else if (ereg("redirect", $url))
   {
           $url = str_replace("login.php", "modules.php?name=Your_Account", $url);       //  Strip the .php from all the files,
           $url = str_replace(".php", "", $url);       //  Strip the .php from all the files,
           $url = str_replace("?redirect", "&redirect", $url);       //  Strip the .php from all the files,
           $url = str_replace("modules", "modules.php", $url); //  and put it back for the modules.php
   }
   else if (ereg("menu=1", $url))
   {
           $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to &
           $url = str_replace(".php", "", $url);       //  Strip the .php from all the files,
       $url = "../../../modules.php?name=Forums&file=$url";
   }
   else if ((ereg("privmsg", $url)) && (!ereg("highlight=privmsg", $url)))
   {
           $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to &
           $url = str_replace("privmsg.php", "modules.php?name=Private_Messages&file=index", $url); //  and put it back for the modules.php
   }
   else if ((ereg("profile", $url)) && (!ereg("highlight=profile", $url)))
   {
           $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to &
           $url = str_replace("profile.php", "modules.php?name=Forums&file=profile", $url); //  and put it back for the modules.php
       $dummy = 1;
   }
   else if ((ereg("memberlist", $url)) && (!ereg("highlight=memberlist", $url)))
   {
           $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to &
           $url = str_replace("memberlist.php", "modules.php?name=Members_List&file=index", $url); //  and put it back for the modules.php
   } else {
           $url = str_replace("?", "&", $url); // As we are already in nuke, change the ? to &
           $url = str_replace(".php", "", $url);
           $url = "modules.php?name=Forums&file=".$url; //Change to Nuke format
   }

   if ( !empty($SID) && !eregi('sid=', $url) && !areyouabot()  )
   {
       if ( !empty($SID) && !eregi('sid=', $url) )   {
      $url .= ( ( strpos($url, '?') != false ) ?  ( ( $non_html_amp ) ? '&' : '&amp;' ) : '?' ) . $SID;
       }
   }
   return($url);
}
function areyouabot()
{
global $HTTP_SERVER_VARS;
        $RobotsList = array (
        "antibot",
        "appie",
        "architext",
        "bjaaland",
        "digout4u",
        "echo",
        "fast-webcrawler",
        "ferret",
        "googlebot",
        "gulliver",
        "harvest",
        "htdig",
        "ia_archiver",
        "jeeves",
        "jennybot",
        "linkwalker",
        "lycos",
        "mercator",
        "moget",
        "muscatferret",
        "myweb",
        "netcraft",
        "nomad",
        "petersnews",
        "scooter",
        "slurp",
        "unlost_web_crawler",
        "voila",
        "voyager",
        "webbase",
        "weblayers",
        "wget",
        "wisenutbot",
        "acme.spider",
        "ahoythehomepagefinder",
        "alkaline",
        "arachnophilia",
        "aretha",
        "ariadne",
        "arks",
        "aspider",
        "atn.txt",
        "atomz",
        "auresys",
        "backrub",
        "bigbrother",
        "blackwidow",
        "blindekuh",
        "bloodhound",
        "brightnet",
        "bspider",
        "cactvschemistryspider",
        "cassandra",
        "cgireader",
        "checkbot",
        "churl",
        "cmc",
        "collective",
        "combine",
        "conceptbot",
        "coolbot",
        "core",
        "cosmos",
        "cruiser",
        "cusco",
        "cyberspyder",
        "deweb",
        "dienstspider",
        "digger",
        "diibot",
        "directhit",
        "dnabot",
        "download_express",
        "dragonbot",
        "dwcp",
        "e-collector",
        "ebiness",
        "eit",
        "elfinbot",
        "emacs",
        "emcspider",
        "esther",
        "evliyacelebi",
        "nzexplorer",
        "fdse",
        "felix",
        "fetchrover",
        "fido",
        "finnish",
        "fireball",
        "fouineur",
        "francoroute",
        "freecrawl",
        "funnelweb",
        "gama",
        "gazz",
        "gcreep",
        "getbot",
        "geturl",
        "golem",
        "grapnel",
        "griffon",
        "gromit",
        "hambot",
        "havindex",
        "hometown",
        "htmlgobble",
        "hyperdecontextualizer",
        "iajabot",
        "ibm",
        "iconoclast",
        "ilse",
        "imagelock",
        "incywincy",
        "informant",
        "infoseek",
        "infoseeksidewinder",
        "infospider",
        "inspectorwww",
        "intelliagent",
        "irobot",
        "iron33",
        "israelisearch",
        "javabee",
        "jbot",
        "jcrawler",
        "jobo",
        "jobot",
        "joebot",
        "jubii",
        "jumpstation",
        "katipo",
        "kdd",
        "kilroy",
        "ko_yappo_robot",
        "labelgrabber.txt",
        "larbin",
        "legs",
        "linkidator",
        "linkscan",
        "lockon",
        "logo_gif",
        "macworm",
        "magpie",
        "marvin",
        "mattie",
        "mediafox",
        "merzscope",
        "meshexplorer",
        "mindcrawler",
        "momspider",
        "monster",
        "motor",
        "mwdsearch",
        "netcarta",
        "netmechanic",
        "netscoop",
        "newscan-online",
        "nhse",
        "northstar",
        "occam",
        "octopus",
        "openfind",
        "orb_search",
        "packrat",
        "pageboy",
        "parasite",
        "patric",
        "pegasus",
        "perignator",
        "perlcrawler",
        "phantom",
        "piltdownman",
        "pimptrain",
        "pioneer",
        "pitkow",
        "pjspider",
        "pka",
        "plumtreewebaccessor",
        "poppi",
        "portalb",
        "puu",
        "python",
        "raven",
        "rbse",
        "resumerobot",
        "rhcs",
        "roadrunner",
        "robbie",
        "robi",
        "robofox",
        "robozilla",
        "roverbot",
        "rules",
        "safetynetrobot",
        "search_au",
        "searchprocess",
        "senrigan",
        "sgscout",
        "shaggy",
        "shaihulud",
        "sift",
        "simbot",
        "site-valet",
        "sitegrabber",
        "sitetech",
        "slcrawler",
        "smartspider",
        "snooper",
        "solbot",
        "spanner",
        "speedy",
        "spider_monkey",
        "spiderbot",
        "spiderline",
        "spiderman",
        "spiderview",
        "spry",
        "ssearcher",
        "suke",
        "suntek",
        "sven",
        "tach_bw",
        "tarantula",
        "tarspider",
        "techbot",
        "templeton",
        "teoma_agent1",
        "titin",
        "titan",
        "tkwww",
        "tlspider",
        "ucsd",
        "udmsearch",
        "urlck",
        "valkyrie",
        "victoria",
        "visionsearch",
        "vwbot",
        "w3index",
        "w3m2",
        "wallpaper",
        "wanderer",
        "wapspider",
        "webbandit",
        "webcatcher",
        "webcopy",
        "webfetcher",
        "webfoot",
        "weblinker",
        "webmirror",
        "webmoose",
        "webquest",
        "webreader",
        "webreaper",
        "websnarf",
        "webspider",
        "webvac",
        "webwalk",
        "webwalker",
        "webwatch",
        "whatuseek",
        "whowhere",
        "wired-digital",
        "wmir",
        "wolp",
        "wombat",
        "worm",
        "wwwc",
        "wz101",
        "xget",
        "awbot",
        "bobby",
        "boris",
        "bumblebee",
        "cscrawler",
        "daviesbot",
        "ezresult",
        "gigabot",
        "gnodspider",
        "internetseer",
        "justview",
        "linkbot",
        "linkchecker",
        "nederland.zoek",
        "perman",
        "pompos",
        "psbot",
        "redalert",
        "shoutcast",
        "slysearch",
        "ultraseek",
        "webcompass",
        "yandex",
        "robot",
        "crawl"
        );
        $botID = strtolower($HTTP_SERVER_VARS['HTTP_USER_AGENT']);
        for ($i = 0; $i < count($RobotsList); $i++)
        {
                if ( strstr($botID, $RobotsList[$i]) )
                {
                        return TRUE;
                }
        }
        return FALSE;

}

function admin_sid($url, $non_html_amp = false)
{
   global $SID;
        $url = "../../../modules.php?name=Forums&file=$url";

   if ( !empty($SID) && !preg_match('#sid=#', $url) )
   {
      $url .= ( ( strpos($url, '?') != false ) ?  ( ( $non_html_amp ) ? '&' : '&' ) : '?' ) . $SID;
   }

   return $url;
}

?>



Back to top Reply with quote
#5   re: Fourm error Help Cant Get RidOf It
rlgnak
CZ Super Newbie
rlgnak has been a member for over 20 year's 20 Year Member
usa.gif alaska.gif
Occupation: College
Gender: Male
Status: Offline
Joined: Jun 22, 2004
0.01 posts per day
Posts: 62
Points: 3,367
   
Ps tried The Other GUys Idea But None Of Those Things Worked



Back to top Reply with quote
#6   re: Fourm error Help Cant Get RidOf It
Taut
PayPal Donation
CZ Revered Member
 Codezwiz Site Donator
usa.gif california.gif
Occupation: Entrepreneur
Gender: Female
Fav. Sports Team: SF Giants
Status: Offline
Joined: May 27, 2003
0.70 posts per day
Posts: 5530
Points: 481,695
   
please follow this thread as it talks about several possible ways to fix your problem.
[ Register or login to view links on this board. ]

if the answers in that post still don't work for you, try replacing the sessions.php page with a fresh one



Back to top Reply with quote
#7   re: Fourm error Help Cant Get RidOf It
rlgnak
CZ Super Newbie
rlgnak has been a member for over 20 year's 20 Year Member
usa.gif alaska.gif
Occupation: College
Gender: Male
Status: Offline
Joined: Jun 22, 2004
0.01 posts per day
Posts: 62
Points: 3,367
   
1st Idea Changing The Code... Code Was Not Found In The Mainfile.ph

2nd idea htacess Got No idea what That Is Or How To Make On

3rd idea i have no acess to the ini File

Im Stuck ... lol



Back to top Reply with quote
#8   re: Fourm error Help Cant Get RidOf It
Taut
PayPal Donation
CZ Revered Member
 Codezwiz Site Donator
usa.gif california.gif
Occupation: Entrepreneur
Gender: Female
Fav. Sports Team: SF Giants
Status: Offline
Joined: May 27, 2003
0.70 posts per day
Posts: 5530
Points: 481,695
   
2nd idea...I can't explain it any better than this site can. If you have further questions after you read it, post back

[ Register or login to view links on this board. ]



Back to top Reply with quote
Display posts from previous:      
Add To: Del.icio.us  Digg  Google  Spurl  Blink  Furl  Y! MyWeb  
<< View previous topic View next topic >>
Post new topicReply to topic

Jump to 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum