Solved

problem php not running correctly

Posted on 2003-11-25
2
242 Views
Last Modified: 2006-11-17
HI

i just set up php&mysql on solaris8, i seem to work fine, but when i run an application i get this error:

The requested object does not exist on this server. The link you followed is either outdated, inaccurate, or the server has been instructed not to let you have it. Please inform the site administrator of the referring page

It seems the page is not on server, but that's not the case the file exist... the same aplication run on nt server with no problem... i look at log error on iplanet server (on solaris8) and found this:

[25/Nov/2003:17:32:59] warning (21545):  for host 192.168.1.70 trying to GET /application/display_edoc.PHP, php4_execute reports: Cannot execute PHP script: /usr/iplanet/servers/docs/application/display_edoc.PHP (File not found)  

it's rare because as i told the page exists, and not only this file crashes... all the pages that have been called in hierarchy 3rd php call, and coming from a form
0
Comment
Question by:Alejandro_Lopez
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
aolXFT earned 500 total points
ID: 9821814
It really looks like the page in question cannot be found by the Operating System.

I notice the extension is in uppercase PHP, are you sure you are calling the script with an upper case extension in the browser, and are you sure the Server can handle uppercase PHP Extensions

All I can say is check you spelling, and all that. Good luck.
0
 

Author Comment

by:Alejandro_Lopez
ID: 9821858
OK very good one

thanks i just solve the problem!!!
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
This article discusses how to create an extensible mechanism for linked drop downs.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question