Virtual Private Server (VPS)
Hosting provided by Central
Point Networking
cpnllc.com
Who's Online
For some reason, the
"Nodelist" and "Recent
Callers" features are
not working.
Recent Visitors
Ray Quinn Tue Jul 16 14:53:54 2024
from Visalia, CA
via HTTPS
Ray Quinn Tue Aug 13 20:46:21 2024
from Visalia, CA
via HTTPS
transx Tue Aug 13 20:37:57 2024
from My Town
via HTTPS
transx Tue Aug 13 20:18:46 2024
from My Town
via HTTPS
System Info
Sysop:
Ray Quinn
Location:
Visalia, CA
Users:
56
Nodes:
10 (0
/
10)
Uptime:
149:33:18
Calls:
9
Files:
12,168
Messages:
150,876
Check out the US 99
menu above for links
to information about
US Highway 99, after
which the US 99 BBS
is named.
Be sure to click on
the Amateur Radio
menu item above for
packet BBSes, packet
software, packet
organizations, as
well as packet
how-to's. Also
included is links to
local and some
not-so-local Amateur
Radio Clubs.
From Ogg@VERT/CAPCITY2 to All on Tue Nov 16 18:52:00 2021
An eTransfer typically allows for entering a short message of
up to 400 chars. For a recent eTransfer, I found it important
to enter something to reference the billing statement that I am
paying for. My typical message was something like this:
This payment is for the "60-90 days" portion of the
statement dated 11/15/21.
But that triggered an error message:
"There appears to be an error! All errors must be corrected
before continuing."
Please enter a valid message. It must not exceed 400
characters and contain only letters, numbers, and the
characters . ! @ / ; : , ' = $ ^ ? * ( ). It must not
contain the words http:, https:, www., javascript,
function, return.
In this case it seemed that the quote char and the dash was not
on the allowed list. Now, I'm just wondering WHY would a quote
or dash char need to be treated differently and excluded from a
valid set?
Likewise, why would even a simple word like function or return
be a problem for a message block? When the system dedicates a
400 char block for a message, why can't the system simply treat
that content as a benign group of chars and ignore any
"functionality" implied with http: https: or www, etc?
Could there be hacking vectors that haven't been solved in the
eTransfer system?