when I open up my page on local host I see this:
When I open up it on my real ip address it looks like this:
Uploaded with ImageShack.us
Code: Select all
#header{
width:100%;
height: 180px;
background-image:url("./images/header.png");
}
Code: Select all
#header{
width:100%;
height: 180px;
background-image:url("./images/header.png");
}
Yes I do see blue background.Eigen wrote:But if you use
background: #0000ff url("./images/header.png");
do you then see a blue background? In that case it can't find the image.
Code: Select all
kazymjir@stallman2:~$ wget -d http://62.80.252.115/images/header.png
DEBUG output created by Wget 1.12 on linux-gnu.
--2010-12-08 11:03:41-- http://62.80.252.115/images/header.png
Connecting to 62.80.252.115:80... connected.
Created socket 3.
Releasing 0x0000000000720fc0 (new refcount 0).
Deleting unused 0x0000000000720fc0.
---request begin---
GET /images/header.png HTTP/1.0
User-Agent: Wget/1.12 (linux-gnu)
Accept: */*
Host: 62.80.252.115
Connection: Keep-Alive
---request end---
HTTP request sent, awaiting response...
---response begin---
---response end---
200 No headers, assuming HTTP/0.9 <<------------------------------[
Length: unspecified
Saving to: `header.png.1'
Code: Select all
kazymjir@stallman2:~$ wget -d http://62.80.252.115/images/grad.gif
DEBUG output created by Wget 1.12 on linux-gnu.
--2010-12-08 11:04:56-- http://62.80.252.115/images/grad.gif
Connecting to 62.80.252.115:80... connected.
Created socket 3.
Releasing 0x0000000001b66fc0 (new refcount 0).
Deleting unused 0x0000000001b66fc0.
---request begin---
GET /images/grad.gif HTTP/1.0
User-Agent: Wget/1.12 (linux-gnu)
Accept: */*
Host: 62.80.252.115
Connection: Keep-Alive
---request end---
HTTP request sent, awaiting response...
---response begin---
HTTP/1.1 200 OK
Date: Wed, 08 Dec 2010 10:04:55 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 07 Dec 2010 17:29:50 GMT
ETag: "2ac2147-4f4-496d55a1e8bf2"
Accept-Ranges: bytes
Content-Length: 1268
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif
---response end---
200 OK <<------------------------------[
Registered socket 3 for persistent reuse.
Length: 1268 (1.2K) [image/gif]
Saving to: `grad.gif.1'
Code: Select all
# EnableMMAP and EnableSendfile: On systems that support it,
# memory-mapping or the sendfile syscall is used to deliver
# files. This usually improves server performance, but must
# be turned off when serving from networked-mounted
# filesystems or if support for these functions is otherwise
# broken on your system.
#
EnableSendfile off
Code: Select all
8 December 2010<br />connected!<br />Array
(
[0] => 3
[1] => serengeor
[2] => ccbb64c63b4020cb79990402f2a096761f523cb4
[3] => serengeor@gmail.com
[4] => male
[5] => 0
[6] => 2010-12-06 23:23:17
)
<br />Array
(
[0] => 4
[1] => MomDadLolWow
[2] => 88d28ff59b031dbd906ca6d8f0e9535ae40c4ad5
[3] => Maxjoe2007@gmail.comN
[4] => male
[5] => 0
[6] => 2010-12-06 23:26:43
)
<br />Array
(
[0] => 5
[1] => serenge
[2] => ccbb64c63b4020cb79990402f2a096761f523cb4
[3] => serengeor@gmail.com1
[4] => male
[5] => 0
[6] => 2010-12-06 23:33:35
)
<br />
http://www.schneier.com/blog/archives/2 ... roken.htmlserengeor wrote:But there isn't any way to recover password from sha1 hash without brute force, or is there?
huhJordan is correct - 2^69 is still a large data space to search.
However, as Randell points out, this is a lot better than 2^80.
Assume you had 100,000 CPUs each capable of 4,000,000,000 tests per second.
That works out to 1,475,739 seconds to find a collision or about 17 days.
It is unlikely that such equipment exists, but it gives an idea of a possible worst case.
However, many digital signatures need to be secure much longer than 3 weeks.