[1/5] from: norsepower:uswest at: 5-Oct-2000 21:28
OK. My hosting service shut down The BeOS Journal at http:// www.beosjournal.com because of a "runaway CGI/PERL script." Well, the site is built dynamically using REBOL. What next? I asked them for stats to see if it might have been a DoS attack or whatever, but I'm still waiting. Sigh. -Ryan
[2/5] from: tim:johnsons-web at: 5-Oct-2000 20:51
Hi Ryan: I'm just curious, but is this a secure site? Or more precisely are any of the cgi programs linked through a secure URL? I have had that problem myself. Runaway process that ate up to 98% of server resources. That reminds me, I need to check on that end to see if latest /core for linux has solved that.... -Tim [norsepower--uswest--net] wrote:
[3/5] from: norsepower:uswest at: 5-Oct-2000 23:59
I just use a basic hosting service. I don't understand what might have gone wrong.
[4/5] from: brett::codeconscious::com at: 6-Oct-2000 16:47
What versions are being used? Released/Experimental? Does the script have iterative sections or is it guaranteed to complete? I absolutely want to avoid such a scenario and is the main reason I haven't been experimenting with CGI on an ISP server yet so I would like to know if it Rebol or not. Thanks, Brett.
[5/5] from: norsepower:uswest at: 6-Oct-2000 8:47
It is the /Core 2.3 version for Solaris on Sparc.