This user has administrator privileges on the English Wikipedia.

User talk:Crazycomputers

From Wikipedia, the free encyclopedia
Jump to: navigation, search
User:CrazycomputersNuvola apps edu languages.svg

About Me

User:Crazycomputers/Computer StuffGnome-fs-client.svg

Computer Stuff



User talk:CrazycomputersNuvola gaim.svg

Contact (Alternate)










Thoughtless edit summaries![edit]

In correcting a particularly obnoxious bit of vandalism on the Hiri trade cycle article I left a highly inappropriate edit summary. I will not copy it here, or (worse) translate it - but believe me it is really disgusting. At the moment I hit the "save page" button I think I probably forgot that while the edit summary in question will not be understood by very many Wiki users, the users it will be understood by are quite likely to visit this article!

Regardless, I am really bothered that anything as bad as this is enshrined in my my name, even on an edit summary. I hasten to add that the actual edit summarised is a straight and obvious vandalism correction - it's only the edit summary itself that needs to go - perhaps to be replaced with a simple "Revert vandalism" note. If this is possible. --Soundofmusicals (talk) 00:07, 2 March 2015 (UTC)

I have removed the edit summary in question. --Chris (talk) 23:31, 23 March 2015 (UTC)
Thank you very much indeed. Swearing is still swearing even if it is not understood. Actually Motu (including its Hiri variety) is a lovely language for swearing in, but everything in its place! All kidding aside, I am very grateful. --Soundofmusicals (talk) 09:24, 24 March 2015 (UTC)

Preciso. Da vossa ajuda! I need of you for help me — Preceding unsigned comment added by Alejadro Domingos (talkcontribs) 13:27, 21 May 2015 (UTC)

Quixotic plea[edit]

You are invited to join the discussion at Wikipedia talk:Wikipediholism test. Thanks. — {{U|Technical 13}} (etc) 04:45, 23 May 2015 (UTC)

Hello from the past[edit]

Hey, are you still active on Wiki? JaakobouChalk Talk 08:05, 30 October 2015 (UTC)

From time to time, yes. --Chris (talk) 16:10, 9 November 2015 (UTC)
Have you heard of the recent wave of stabbing (and other) attacks in Israel? I have reintroduced the issue of poetic militancy (aka "sharpen the weapons") due to the multiple daily stabbings. My original complaint is more valid than ever. As you saw the original complaint way back, I'd be happy if you review the matter a second time. See here. JaakobouChalk Talk 20:56, 9 November 2015 (UTC)

ArbCom elections are now open![edit]

You appear to be eligible to vote in the current Arbitration Committee election. The Arbitration Committee is the panel of editors responsible for conducting the Wikipedia arbitration process. It has the authority to enact binding solutions for disputes between editors, primarily related to serious behavioural issues that the community has been unable to resolve. This includes the ability to impose site bans, topic bans, editing restrictions, and other measures needed to maintain our editing environment. The arbitration policy describes the Committee's roles and responsibilities in greater detail. If you wish to participate, you are welcome to review the candidates' statements and submit your choices on the voting page. For the Election committee, MediaWiki message delivery (talk) 13:00, 23 November 2015 (UTC) DOWN - 502[edit] shows "502 Bad Gateway nginx/1.6.2" — Preceding unsigned comment added by Elvey (talkcontribs)

Thanks for letting me know. For some reason the backend process is occasionally crashing and fails to restart by itself.  :( --Chris (talk) 21:51, 8 January 2016 (UTC)
Thanks. Its up....
AND: I suspect I stumbled on a potential security issue in your app. I'm emailing you the details, Chris.
This is the error I'm seeing:
Runtime Error

A runtime error has occurred

Description: An application error occurred on the server. The current custom error settings for this application prevent the details of the application error from being viewed (for security reasons).

Details: To enable the details of this specific error message to be viewable, please create a <customErrors> tag within a "web.config" configuration file located in the root directory of the current web application. This <customErrors> tag should then have its "mode" attribute set to "Off".

<!-- Web.Config Configuration File -->

        <customErrors mode="Off"/>
Notes: The current error page you are seeing can be replaced by a custom error page by modifying the "defaultRedirect" attribute of the application's <customErrors> configuration tag to point to a custom error page URL.

<!-- Web.Config Configuration File -->

        <customErrors mode="RemoteOnly" defaultRedirect="mycustompage.htm"/>

Version Information: 3.4.0 ((no/c3fc3ba Wed Jul 2 14:50:54 UTC 2014); ASP.NET Version: 4.0.30319.17020
--Elvey(tc) 03:19, 9 January 2016 (UTC)

Thanks for your bug report. I've investigated and there is no security issue here. The value was stored correctly (as you entered it) into the database, and was being correctly read back out and escaped properly in every case I examined. The "runtime error" was actually the web framework aborting the request because it perceived the request to be malicious, as it contained a value that resembled an HTML tag. This is a framework feature that tries to prevent XSS attacks, but in this case actually prevented a legitimate request. I have disabled this feature. Please try to remove this entry again. (Thanks for giving me the details privately, and for your concern. I appreciate you disclosing the details responsibly, even if it turned out not to be a security problem. Better safe than sorry!) --Chris (talk) 03:48, 9 January 2016 (UTC)

Appreciate the response. You've convinced me. Solid explanation. (I wouldn't have disabled it - defence in depth and all.) I've removed the entry. (I guess I could have removed it on the command line w/o the disablement.) --Elvey(tc) 08:07, 10 January 2016 (UTC)
I thought about leaving it enabled, but the entire purpose of this feature is to prevent XSS attacks. It will only choke on posted data that looks like HTML. Since this utility doesn't show you other users' data, the only way you could conceivably be attacked is by yourself (or someone with your credentials, and in that case you have bigger problems). So I don't think that this feature defends against a reasonably useful attack vector. --Chris (talk) 20:37, 10 January 2016 (UTC)