Solved

APACHE: colon (:) error 403 on the beginning

Posted on 2009-07-11
8
277 Views
Last Modified: 2013-12-25
When I enter: http://localhost/AndyPSV:xxx I get 403 error from apache, what to do?
0
Comment
Question by:AndyPSV
8 Comments
 
LVL 108

Expert Comment

by:Ray Paseur
ID: 24832492
That is the "access denied" code.  Check out a few of these links:
http://www.lmgtfy.com?q=http+error+403

;-)

~Ray
0
 

Author Comment

by:AndyPSV
ID: 24832553
yes, I know what is it; but what to do to make work ":" (colon) sign in url?
0
 

Author Comment

by:AndyPSV
ID: 24832558
ray: could you send me your e-mail on andypsv XXX rcdrugs . com? I would have some little for you in next week (up to 1-2h)
0
 
LVL 7

Expert Comment

by:droyden
ID: 24832664
does that file actually exist?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:AndyPSV
ID: 24832786
yes
0
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 24832951
Hi,

":" is a special character and it should be encoded when used in an url. So pleas try to use %3A instead of ":" such  as:

 http://localhost/AndyPSV%3Axxx

This one.
0
 
LVL 19

Accepted Solution

by:
Michael701 earned 500 total points
ID: 24834656
When you use : in a url it's for the port number. are you trying to hide a site by requiring a different port number? ie http://www.mysite.com/login.php:4242

Is so then you'll have to setup the apache config to listen for that port

# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, in addition to the default. See also the <VirtualHost>
# directive.
#
#Listen 3000
#Listen 12.34.56.78:80
#Listen 80
0
 

Author Comment

by:AndyPSV
ID: 24834700
I've used already ; sign, thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Things That Drive Us Nuts Have you noticed the use of the reCaptcha feature at EE and other web sites?  It wants you to read and retype something that looks like this.Insanity!  It's not EE's fault - that's just the way reCaptcha works.  But it is …
This article discusses four methods for overlaying images in a container on a web page
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now