Solved

500 Error (sorry I'm new at this :)

Posted on 2004-04-09
6
198 Views
Last Modified: 2013-12-25
This will probably be an easy one..  I know a little bit about cgi..  I have a book example I'm playing with; it uses a c program to decode the form an spit out a response.  I've compiled it (on a windows box) and uploaded it to my website(nix).  Fill out the form, submit; 500 - Internal Server Error..  The form's pointing to the right place.  Do I need to compile this on 'nix??

I downloaded the code right from the book's site..  And, of course, it doesn't seem to do anything if I try to run it locally..

Thanks,

Shawn
0
Comment
Question by:ShawnCurry
  • 4
  • 2
6 Comments
 
LVL 18

Accepted Solution

by:
Morcalavin earned 500 total points
ID: 10795684
1) Check your permissions.
2) use the CGI::Carp qw (fatalsToBrowser) to give you a better error message other than the generice 500 error.
0
 
LVL 18

Expert Comment

by:Morcalavin
ID: 10795688
Bah.  I can't read apparently.  You are using c not perl.  Disregard step 2.
0
 
LVL 3

Author Comment

by:ShawnCurry
ID: 10795701
Ohh yeahh... Probably help if I made it executable huh??
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 3

Author Comment

by:ShawnCurry
ID: 10795738
Hmm..  Well I gave the execute permission to it, but it still doesn't work..  Guess I'll try compiling it on 'nix tomarrow. The html points to the right place, and if I run the file, it does print out the html tags.
0
 
LVL 3

Author Comment

by:ShawnCurry
ID: 10795739
>> and if I run the file,

Locally..
0
 
LVL 3

Author Comment

by:ShawnCurry
ID: 10799228
Turns out all I needed to do was complile on 'nix (and give it the execute permission)

Thanks,

Shawn
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This tutorial will discuss fancy secure registration forms, with AJAX technology support. In this article I assume you already know HTML and some JS. I will write the code using WhizBase Server Pages, so you need to know some basics in WBSP (you mig…
It is a general practice to get rid of old user profiles on a computer  in a LAN environment. As I have been working with a company in a LAN environment where users move from one place to some other place at times. This will make many user profil…
Learn the basics of modules and packages in Python. Every Python file is a module, ending in the suffix: .py: Modules are a collection of functions and variables.: Packages are a collection of modules.: Module functions and variables are accessed us…
Learn the basics of while and for loops in Python.  while loops are used for testing while, or until, a condition is met: The structure of a while loop is as follows:     while <condition>:         do something         repeate: The break statement m…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now