API - XOOPS 2.5.11 Beta 2
By monxoops.fr
admin.php File Reference

Variables

const _MD_A_MYMENU_MYTPLSADMIN ''
 
const _MD_A_MYMENU_MYBLOCKSADMIN 'Permissions'
 
const _MD_A_MYMENU_MYPREFERENCES 'Preferences'
 
const _AM_TH_DATETIME 'Time'
 
const _AM_TH_USER 'User'
 
const _AM_TH_IP 'IP'
 
const _AM_TH_AGENT 'AGENT'
 
const _AM_TH_TYPE 'Type'
 
const _AM_TH_DESCRIPTION 'Description'
 
const _AM_TH_BADIPS 'Bad IPs<br><br><span style="font-weight:normal;">Write each IP a line<br>blank means all IPs are allowed</span>'
 
const _AM_TH_GROUP1IPS 'Allowed IPs for Group=1<br><br><span style="font-weight:normal;">Write each IP a line.<br>192.168. means 192.168.*<br>blank means all IPs are allowed</span>'
 
const _AM_LABEL_COMPACTLOG 'Compact log'
 
const _AM_BUTTON_COMPACTLOG 'Compact it!'
 
const _AM_JS_COMPACTLOGCONFIRM 'Duplicated (IP,Type) records will be removed'
 
const _AM_LABEL_REMOVEALL 'Remove all records'
 
const _AM_BUTTON_REMOVEALL 'Remove all!'
 
const _AM_JS_REMOVEALLCONFIRM 'All logs are removed absolutely. Are you really OK?'
 
const _AM_LABEL_REMOVE 'Remove the records checked:'
 
const _AM_BUTTON_REMOVE 'Remove!'
 
const _AM_JS_REMOVECONFIRM 'Remove OK?'
 
const _AM_MSG_IPFILESUPDATED 'Files for IPs have been updated'
 
const _AM_MSG_BADIPSCANTOPEN 'The file for bad IP cannot be opened'
 
const _AM_MSG_GROUP1IPSCANTOPEN 'The file for allowing group=1 cannot be opened'
 
const _AM_MSG_REMOVED 'Records are removed'
 
const _AM_FMT_CONFIGSNOTWRITABLE 'Turn the configs directory writable: %s'
 
const _AM_H3_PREFIXMAN 'Prefix Manager'
 
const _AM_MSG_DBUPDATED 'Database Updated Successfully!'
 
const _AM_CONFIRM_DELETE 'All data will be dropped. OK?'
 
const _AM_TXT_HOWTOCHANGEDB "If you want to change prefix,<br> edit %s/data/secure.php manually.<br><br>define('XOOPS_DB_PREFIX', '<b>%s</b>');"
 
const _AM_ADV_NOTSECURE 'Not secure'
 
const _AM_ADV_TRUSTPATHPUBLIC 'If you can see an image -NG- or the link returns normal page, your XOOPS_TRUST_PATH is not placed properly. The best place for XOOPS_TRUST_PATH is outside of DocumentRoot. If you cannot do that, you have to put .htaccess (DENY FROM ALL) just under XOOPS_TRUST_PATH as the second best way.'
 
const _AM_ADV_TRUSTPATHPUBLICLINK 'Check that PHP files inside TRUST_PATH are set to read-only (it must be 404,403 or 500 error)'
 
const _AM_ADV_REGISTERGLOBALS "If 'ON', this setting invites a variety of injecting attacks. If you can, set 'register_globals off' in php.ini, or if not possible, create or edit .htaccess in your XOOPS directory:"
 
const _AM_ADV_ALLOWURLFOPEN "If 'ON', this setting allows attackers to execute arbitrary scripts on remote servers.<br>Only administrator can change this option.<br>If you are an admin, edit php.ini or httpd.conf.<br><b>Sample of httpd.conf:<br> &nbsp; php_admin_flag &nbsp; allow_url_fopen &nbsp; off</b><br>Else, claim it to your administrators."
 
const _AM_ADV_USETRANSSID "If 'ON', your Session ID will be displayed in anchor tags etc.<br>To prevent session hi-jacking, add a line into .htaccess in XOOPS_ROOT_PATH.<br><b>php_flag session.use_trans_sid off</b>"
 
const _AM_ADV_DBPREFIX "This setting invites 'SQL Injections'.<br>Don't forget turning 'Force sanitizing *' ON in this module's preferences."
 
const _AM_ADV_LINK_TO_PREFIXMAN 'Go to prefix manager'
 
const _AM_ADV_MAINUNPATCHED 'You should edit your mainfile.php like written in README.'
 
const _AM_ADV_DBFACTORYPATCHED 'Your databasefactory is ready for DBLayer Trapping anti-SQL-Injection'
 
const _AM_ADV_DBFACTORYUNPATCHED 'Your databasefactory is not ready for DBLayer Trapping anti-SQL-Injection. Some patches are required.'
 
const _AM_ADV_SUBTITLECHECK 'Check if Protector works well'
 
const _AM_ADV_CHECKCONTAMI 'Contamination'
 
const _AM_ADV_CHECKISOCOM 'Isolated Comments'
 
const _AM_ADV_REGISTERGLOBALS2 'and place in it the line below:'
 
const _AM_PROTECTOR_PREFIX 'Prefix'
 
const _AM_PROTECTOR_TABLES 'Tables'
 
const _AM_PROTECTOR_UPDATED 'Updated'
 
const _AM_PROTECTOR_COPY 'Copy'
 
const _AM_PROTECTOR_ACTIONS 'Actions'
 
const _AM_LABEL_BAN_BY_IP 'Ban the IPs on checked records:'
 
const _AM_BUTTON_BAN_BY_IP 'IP Ban!'
 
const _AM_JS_BANCONFIRM 'IP Bans OK?'
 
const _AM_MSG_BANNEDIP 'IPs are banned'
 
const _AM_ADMINSTATS_TITLE 'Protector Log Summary'
 
const _AM_ADMINSTATS_LAST_MONTH 'Last Month'
 
const _AM_ADMINSTATS_LAST_WEEK 'Last Week'
 
const _AM_ADMINSTATS_LAST_DAY 'Last Day'
 
const _AM_ADMINSTATS_LAST_HOUR 'Last Hour'
 

Variable Documentation

◆ _AM_ADMINSTATS_LAST_DAY

const _AM_ADMINSTATS_LAST_DAY 'Last Day'

◆ _AM_ADMINSTATS_LAST_HOUR

const _AM_ADMINSTATS_LAST_HOUR 'Last Hour'

◆ _AM_ADMINSTATS_LAST_MONTH

const _AM_ADMINSTATS_LAST_MONTH 'Last Month'

◆ _AM_ADMINSTATS_LAST_WEEK

const _AM_ADMINSTATS_LAST_WEEK 'Last Week'

◆ _AM_ADMINSTATS_TITLE

const _AM_ADMINSTATS_TITLE 'Protector Log Summary'

◆ _AM_ADV_ALLOWURLFOPEN

const _AM_ADV_ALLOWURLFOPEN "If 'ON', this setting allows attackers to execute arbitrary scripts on remote servers.<br>Only administrator can change this option.<br>If you are an admin, edit php.ini or httpd.conf.<br><b>Sample of httpd.conf:<br> &nbsp; php_admin_flag &nbsp; allow_url_fopen &nbsp; off</b><br>Else, claim it to your administrators."

◆ _AM_ADV_CHECKCONTAMI

const _AM_ADV_CHECKCONTAMI 'Contamination'

◆ _AM_ADV_CHECKISOCOM

const _AM_ADV_CHECKISOCOM 'Isolated Comments'

◆ _AM_ADV_DBFACTORYPATCHED

const _AM_ADV_DBFACTORYPATCHED 'Your databasefactory is ready for DBLayer Trapping anti-SQL-Injection'

◆ _AM_ADV_DBFACTORYUNPATCHED

const _AM_ADV_DBFACTORYUNPATCHED 'Your databasefactory is not ready for DBLayer Trapping anti-SQL-Injection. Some patches are required.'

◆ _AM_ADV_DBPREFIX

const _AM_ADV_DBPREFIX "This setting invites 'SQL Injections'.<br>Don't forget turning 'Force sanitizing *' ON in this module's preferences."

◆ _AM_ADV_LINK_TO_PREFIXMAN

const _AM_ADV_LINK_TO_PREFIXMAN 'Go to prefix manager'

◆ _AM_ADV_MAINUNPATCHED

const _AM_ADV_MAINUNPATCHED 'You should edit your mainfile.php like written in README.'

◆ _AM_ADV_NOTSECURE

const _AM_ADV_NOTSECURE 'Not secure'

◆ _AM_ADV_REGISTERGLOBALS

const _AM_ADV_REGISTERGLOBALS "If 'ON', this setting invites a variety of injecting attacks. If you can, set 'register_globals off' in php.ini, or if not possible, create or edit .htaccess in your XOOPS directory:"

◆ _AM_ADV_REGISTERGLOBALS2

const _AM_ADV_REGISTERGLOBALS2 'and place in it the line below:'

◆ _AM_ADV_SUBTITLECHECK

const _AM_ADV_SUBTITLECHECK 'Check if Protector works well'

◆ _AM_ADV_TRUSTPATHPUBLIC

const _AM_ADV_TRUSTPATHPUBLIC 'If you can see an image -NG- or the link returns normal page, your XOOPS_TRUST_PATH is not placed properly. The best place for XOOPS_TRUST_PATH is outside of DocumentRoot. If you cannot do that, you have to put .htaccess (DENY FROM ALL) just under XOOPS_TRUST_PATH as the second best way.'

◆ _AM_ADV_TRUSTPATHPUBLICLINK

const _AM_ADV_TRUSTPATHPUBLICLINK 'Check that PHP files inside TRUST_PATH are set to read-only (it must be 404,403 or 500 error)'

◆ _AM_ADV_USETRANSSID

const _AM_ADV_USETRANSSID "If 'ON', your Session ID will be displayed in anchor tags etc.<br>To prevent session hi-jacking, add a line into .htaccess in XOOPS_ROOT_PATH.<br><b>php_flag session.use_trans_sid off</b>"

◆ _AM_BUTTON_BAN_BY_IP

const _AM_BUTTON_BAN_BY_IP 'IP Ban!'

◆ _AM_BUTTON_COMPACTLOG

const _AM_BUTTON_COMPACTLOG 'Compact it!'

◆ _AM_BUTTON_REMOVE

const _AM_BUTTON_REMOVE 'Remove!'

◆ _AM_BUTTON_REMOVEALL

const _AM_BUTTON_REMOVEALL 'Remove all!'

◆ _AM_CONFIRM_DELETE

const _AM_CONFIRM_DELETE 'All data will be dropped. OK?'

◆ _AM_FMT_CONFIGSNOTWRITABLE

const _AM_FMT_CONFIGSNOTWRITABLE 'Turn the configs directory writable: %s'

◆ _AM_H3_PREFIXMAN

const _AM_H3_PREFIXMAN 'Prefix Manager'

◆ _AM_JS_BANCONFIRM

const _AM_JS_BANCONFIRM 'IP Bans OK?'

◆ _AM_JS_COMPACTLOGCONFIRM

const _AM_JS_COMPACTLOGCONFIRM 'Duplicated (IP,Type) records will be removed'

◆ _AM_JS_REMOVEALLCONFIRM

const _AM_JS_REMOVEALLCONFIRM 'All logs are removed absolutely. Are you really OK?'

◆ _AM_JS_REMOVECONFIRM

const _AM_JS_REMOVECONFIRM 'Remove OK?'

◆ _AM_LABEL_BAN_BY_IP

const _AM_LABEL_BAN_BY_IP 'Ban the IPs on checked records:'

◆ _AM_LABEL_COMPACTLOG

const _AM_LABEL_COMPACTLOG 'Compact log'

◆ _AM_LABEL_REMOVE

const _AM_LABEL_REMOVE 'Remove the records checked:'

◆ _AM_LABEL_REMOVEALL

const _AM_LABEL_REMOVEALL 'Remove all records'

◆ _AM_MSG_BADIPSCANTOPEN

const _AM_MSG_BADIPSCANTOPEN 'The file for bad IP cannot be opened'

◆ _AM_MSG_BANNEDIP

const _AM_MSG_BANNEDIP 'IPs are banned'

◆ _AM_MSG_DBUPDATED

const _AM_MSG_DBUPDATED 'Database Updated Successfully!'

◆ _AM_MSG_GROUP1IPSCANTOPEN

const _AM_MSG_GROUP1IPSCANTOPEN 'The file for allowing group=1 cannot be opened'

◆ _AM_MSG_IPFILESUPDATED

const _AM_MSG_IPFILESUPDATED 'Files for IPs have been updated'

◆ _AM_MSG_REMOVED

const _AM_MSG_REMOVED 'Records are removed'

◆ _AM_PROTECTOR_ACTIONS

const _AM_PROTECTOR_ACTIONS 'Actions'

◆ _AM_PROTECTOR_COPY

const _AM_PROTECTOR_COPY 'Copy'

◆ _AM_PROTECTOR_PREFIX

const _AM_PROTECTOR_PREFIX 'Prefix'

◆ _AM_PROTECTOR_TABLES

const _AM_PROTECTOR_TABLES 'Tables'

◆ _AM_PROTECTOR_UPDATED

const _AM_PROTECTOR_UPDATED 'Updated'

◆ _AM_TH_AGENT

const _AM_TH_AGENT 'AGENT'

◆ _AM_TH_BADIPS

const _AM_TH_BADIPS 'Bad IPs<br><br><span style="font-weight:normal;">Write each IP a line<br>blank means all IPs are allowed</span>'

◆ _AM_TH_DATETIME

const _AM_TH_DATETIME 'Time'

◆ _AM_TH_DESCRIPTION

const _AM_TH_DESCRIPTION 'Description'

◆ _AM_TH_GROUP1IPS

const _AM_TH_GROUP1IPS 'Allowed IPs for Group=1<br><br><span style="font-weight:normal;">Write each IP a line.<br>192.168. means 192.168.*<br>blank means all IPs are allowed</span>'

◆ _AM_TH_IP

const _AM_TH_IP 'IP'

◆ _AM_TH_TYPE

const _AM_TH_TYPE 'Type'

◆ _AM_TH_USER

const _AM_TH_USER 'User'

◆ _AM_TXT_HOWTOCHANGEDB

const _AM_TXT_HOWTOCHANGEDB "If you want to change prefix,<br> edit %s/data/secure.php manually.<br><br>define('XOOPS_DB_PREFIX', '<b>%s</b>');"

◆ _MD_A_MYMENU_MYBLOCKSADMIN

const _MD_A_MYMENU_MYBLOCKSADMIN 'Permissions'

◆ _MD_A_MYMENU_MYPREFERENCES

const _MD_A_MYMENU_MYPREFERENCES 'Preferences'

◆ _MD_A_MYMENU_MYTPLSADMIN

const _MD_A_MYMENU_MYTPLSADMIN ''