And the regex would be correct because it actually *is* an URL.Probably:
Code:"LDAP://dc=yourdomain, dc=com"looks like a URL to the crude regex parser
And the regex would be correct because it actually *is* an URL.Probably:
Code:"LDAP://dc=yourdomain, dc=com"looks like a URL to the crude regex parser
I think it sits at 100 currentlyCan anyone tell me what thread count I need to have to get past this level of scrutiny?
Is it not actually a URI ?because it actually *is* an URL.
://And being able to recognise a link when you post one?OK, so it seems as if it is purely dependent on finding://
Trying explicitly:
View attachment 119271
results in:
View attachment 119272
Whereas simply doing:
View attachment 119273
is OK:
View attachment 119274
Using a resource but without completing the double forward slash is also OK:
View attachment 119275
The post goes through:
View attachment 119276
Curiously, getting the colon and slashes back to front also triggers the blocker:
View attachment 119277
like so:
View attachment 119278
So, @HavingDatabaseRelations, it really isn't anything personal against you - it's a PITA for everyone!
How do you mean?And being able to recognise a link when you post one?![]()
Well there was a link in what the O/P posted, but they did not recognise that fact?How do you mean?
Yes, look at the image of the text the OP was trying to post. It was contains the LDAP url, albeit within quote marks.Well there was a link in what the O/P posted, but they did not recognise that fact?
I am sure there are other criteria in play as well.I have had that oops message myself now and again
Oops, not enough coffee yet and i dislexically swapped 'there' and 'was' as i read it.Well there was a link in what the O/P posted,
That makes sense. I also think that hackers/spammers can work in teams, setting up accounts that lie dormant for a while until they are exploited.I cannot remember the exact reasons why I chose 100 posts, but it might be due to hackers using old accounts for spamming. Most user accounts have less than 100 posts.
That is exactly what they do, because the dormant user doesn't notice posts that they didn't make.That makes sense. I also think that hackers/spammers can work in teams, setting up accounts that lie dormant for a while until they are exploited.
It's more likely to be bots that they set up rather than actual people sitting there doing the posting.I also think that hackers/spammers can work in teams,