Accès interdit! erreur 403.

Réduire
Ce sujet est fermé.
X
X
 
  • Filtrer
  • Heure
  • Afficher
Tout effacer
nouveaux messages

  • [RÉGLÉ] Accès interdit! erreur 403.

    Bonjour,

    Je viens de dézipper un fichier sauvegarde fait à partir de ANGIE Backup et il y a cette erreur sur la page quand j’accède à la page pour la restauration du site:Accès interdit! Vous n'avez pas le droit d'accéder au répertoire demandé. Soit il n'y a pas de document index soit le répertoire est protégé. Erreur 403.
    ici pour plus de détails Cliquez sur l'image pour l'afficher en taille normale

Nom : Accès interdit! - Mozilla Firefox.jpg 
Affichages : 1 
Taille : 33,0 Ko 
ID : 1821376 . Pourtant j'ai pas touché à quoi que ce soit. Comment résoudre ce problème?

    Cordialement.
    Si vous ne réussissez pas du premier coup, appelez ça version 1.0

  • #2
    Re : Accès interdit! erreur 403.

    Bon voilà je viens de trouver que ça viens de mon fichier .htacess car quand je l'enlève ça marche correctement mais de quelle ligne pourrait-elle s'agir?

    ##
    # @package Joomla
    # @copyright Copyright (C) 2005 - 2014 Open Source Matters. All rights reserved.
    # @license GNU General Public License version 2 or later; see LICENSE.txt
    ##

    ##
    # READ THIS COMPLETELY IF YOU CHOOSE TO USE THIS FILE!
    #
    # The line just below this section: 'Options +FollowSymLinks' may cause problems
    # with some server configurations. It is required for use of mod_rewrite, but may already
    # be set by your server administrator in a way that dissallows changing it in
    # your .htaccess file. If using it causes your server to error out, comment it out (add # to
    # beginning of line), reload your site in your browser and test your sef url's. If they work,
    # it has been set by your server administrator and you do not need it set here.
    ##

    ## Can be commented out if causes errors, see notes above.
    Options +FollowSymLinks

    ## Mod_rewrite in use.

    RewriteEngine On

    ## Begin - Rewrite rules to block out some common exploits.
    # If you experience problems on your site block out the operations listed below
    # This attempts to block the most common type of exploit `attempts` to Joomla!
    #
    # Block out any script trying to base64_encode data within the URL.
    RewriteCond %{QUERY_STRING} base64_encode[^(]*\([^)]*\) [OR]
    # Block out any script that includes a <script> tag in URL.
    RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
    # Block out any script trying to set a PHP GLOBALS variable via URL.
    RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
    # Block out any script trying to modify a _REQUEST variable via URL.
    RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2})
    # Return 403 Forbidden header and show the content of the root homepage
    RewriteRule .* index.php [F]
    #
    ## End - Rewrite rules to block out some common exploits.

    ## Begin - Custom redirects
    #
    # If you need to redirect some pages, or set a canonical non-www to
    # www redirect (or vice versa), place that code here. Ensure those
    # redirects use the correct RewriteRule syntax and the [R=301,L] flags.
    #
    ## End - Custom redirects

    ##
    # Uncomment following line if your webserver's URL
    # is not directly related to physical file paths.
    # Update Your Joomla! Directory (just / for root).
    ##

    # RewriteBase /

    ## Begin - Joomla! core SEF Section.
    #
    RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization}]
    #
    # If the requested path and file is not /index.php and the request
    # has not already been internally rewritten to the index.php script
    RewriteCond %{REQUEST_URI} !^/index\.php
    # and the requested path and file doesn't directly match a physical file
    RewriteCond %{REQUEST_FILENAME} !-f
    # and the requested path and file doesn't directly match a physical folder
    RewriteCond %{REQUEST_FILENAME} !-d
    # internally rewrite the request to the index.php script
    RewriteRule .* index.php [L]
    #
    ## End - Joomla! core SEF Section.

    ## Begin Securitycheck Pro Prevent access to .ht files
    <FilesMatch "^.ht">
    Order deny,allow
    Deny from all
    </FilesMatch>
    ## End Securitycheck Pro Prevent access to .ht files

    ## Begin Securitycheck Pro Prevent Unauthorized Browsing
    Options All -Indexes
    ## End Securitycheck Pro Prevent Unauthorized Browsing

    ## Begin File Injection Protection
    RewriteCond %{REQUEST_METHOD} GET
    RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR]
    RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR]
    RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC]
    RewriteRule .* - [F]
    ## End File Injection Protection

    ## /proc/self/environ? Go away!
    RewriteCond %{QUERY_STRING} proc/self/environ [NC,OR]

    ## Begin Securitycheck Pro Default Blacklist
    RewriteCond %{HTTP_USER_AGENT} ^BlackWidow [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Bolt\ 0 [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Bot\ mailto:craftbot\@yahoo\.com [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} CazoodleBot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^ChinaClaw [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Custo [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Default\ Browser\ 0 [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^DIIbot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^DISCo [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} discobot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Download\ Demon [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^eCatch [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ecxi [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^EirGrabber [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^EmailCollector [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^EmailSiphon [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^EmailWolf [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Express\ WebPictures [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^ExtractorPro [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^EyeNetIE [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^FlashGet [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^GetRight [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^GetWeb! [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Go!Zilla [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Go-Ahead-Got-It [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^GrabNet [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Grafula [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} GT::WWW [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} heritrix [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^HMView [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} HTTP::Lite [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} HTTrack [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ia_archiver [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} IDBot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} id-search [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} id-search\.org [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Image\ Stripper [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Image\ Sucker [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Indy\ Library [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^InterGET [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Internet\ Ninja [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^InternetSeer\.com [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} IRLbot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ISC\ Systems\ iRc\ Search\ 2\.1 [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Java [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^JetCar [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^JOC\ Web\ Spider [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^larbin [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^LeechFTP [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} libwww [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} libwww-perl [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Link [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} LinksManager.com_bot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} linkwalker [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} lwp-trivial [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Mass\ Downloader [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Maxthon$ [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} MFC_Tear_Sample [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^microsoft\.url [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Microsoft\ URL\ Control [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^MIDown\ tool [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Mister\ PiX [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Missigua\ Locator [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Mozilla\.*Indy [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Mozilla\.*NEWT [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^MSFrontPage [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Navroad [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^NearSite [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^NetAnts [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^NetSpider [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Net\ Vampire [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^NetZIP [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Nutch [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Octopus [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Offline\ Explorer [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Offline\ Navigator [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^PageGrabber [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} panscient.com [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Papa\ Foto [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^pavuk [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} PECL::HTTP [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^PeoplePal [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^pcBrowser [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} PHPCrawl [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} PleaseCrawl [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^psbot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^RealDownload [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^ReGet [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Rippers\ 0 [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} SBIder [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^SeaMonkey$ [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^sitecheck\.internetseer\.com [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^SiteSnagger [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^SmartDownload [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Snoopy [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Steeler [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^SuperBot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^SuperHTTP [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Surfbot [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^tAkeOut [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Teleport\ Pro [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Toata\ dragostea\ mea\ pentru\ diavola [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} URI::Fetch [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} urllib [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} User-Agent [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^VoidEYE [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Web\ Image\ Collector [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Web\ Sucker [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Web\ Sucker [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} webalta [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebAuto [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^[Ww]eb[Bb]andit [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} WebCollage [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebCopier [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebFetch [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebGo\ IS [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebLeacher [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebReaper [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebSauger [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Website\ eXtractor [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Website\ Quester [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebStripper [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebWhacker [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WebZIP [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} Wells\ Search\ II [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} WEP\ Search [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Wget [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Widow [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WWW-Mechanize [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^WWWOFFLE [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Xaldon\ WebSpider [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} zermelo [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Zeus [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ^Zeus\.*Webster [NC,OR]
    RewriteCond %{HTTP_USER_AGENT} ZyBorg [NC]
    RewriteRule ^.* - [F,L]
    ## End Securitycheck Pro Default Blacklist

    ##### Common hacking tools and bandwidth hoggers block -- BEGIN
    SetEnvIf user-agent "WebBandit" stayout=1
    SetEnvIf user-agent "webbandit" stayout=1
    SetEnvIf user-agent "Acunetix" stayout=1
    SetEnvIf user-agent "binlar" stayout=1
    SetEnvIf user-agent "BlackWidow" stayout=1
    SetEnvIf user-agent "Bolt 0" stayout=1
    SetEnvIf user-agent "Bot mailto:craftbot@yahoo.com" stayout=1
    SetEnvIf user-agent "BOT for JCE" stayout=1
    SetEnvIf user-agent "casper" stayout=1
    SetEnvIf user-agent "checkprivacy" stayout=1
    SetEnvIf user-agent "ChinaClaw" stayout=1
    SetEnvIf user-agent "clshttp" stayout=1
    SetEnvIf user-agent "cmsworldmap" stayout=1
    SetEnvIf user-agent "comodo" stayout=1
    SetEnvIf user-agent "Custo" stayout=1
    SetEnvIf user-agent "Default Browser 0" stayout=1
    SetEnvIf user-agent "diavol" stayout=1
    SetEnvIf user-agent "DIIbot" stayout=1
    SetEnvIf user-agent "DISCo" stayout=1
    SetEnvIf user-agent "dotbot" stayout=1
    SetEnvIf user-agent "Download Demon" stayout=1
    SetEnvIf user-agent "eCatch" stayout=1
    SetEnvIf user-agent "EirGrabber" stayout=1
    SetEnvIf user-agent "EmailCollector" stayout=1
    SetEnvIf user-agent "EmailSiphon" stayout=1
    SetEnvIf user-agent "EmailWolf" stayout=1
    SetEnvIf user-agent "Express WebPictures" stayout=1
    SetEnvIf user-agent "extract" stayout=1
    SetEnvIf user-agent "ExtractorPro" stayout=1
    SetEnvIf user-agent "EyeNetIE" stayout=1
    SetEnvIf user-agent "feedfinder" stayout=1
    SetEnvIf user-agent "FHscan" stayout=1
    SetEnvIf user-agent "FlashGet" stayout=1
    SetEnvIf user-agent "flicky" stayout=1
    SetEnvIf user-agent "GetRight" stayout=1
    SetEnvIf user-agent "GetWeb!" stayout=1
    SetEnvIf user-agent "Go-Ahead-Got-It" stayout=1
    SetEnvIf user-agent "Go!Zilla" stayout=1
    SetEnvIf user-agent "grab" stayout=1
    SetEnvIf user-agent "GrabNet" stayout=1
    SetEnvIf user-agent "Grafula" stayout=1
    SetEnvIf user-agent "harvest" stayout=1
    SetEnvIf user-agent "HMView" stayout=1
    SetEnvIf user-agent "ia_archiver" stayout=1
    SetEnvIf user-agent "Image Stripper" stayout=1
    SetEnvIf user-agent "Image Sucker" stayout=1
    SetEnvIf user-agent "InterGET" stayout=1
    SetEnvIf user-agent "Internet Ninja" stayout=1
    SetEnvIf user-agent "InternetSeer.com" stayout=1
    SetEnvIf user-agent "jakarta" stayout=1
    SetEnvIf user-agent "Java" stayout=1
    SetEnvIf user-agent "JetCar" stayout=1
    SetEnvIf user-agent "JOC Web Spider" stayout=1
    SetEnvIf user-agent "kmccrew" stayout=1
    SetEnvIf user-agent "larbin" stayout=1
    SetEnvIf user-agent "LeechFTP" stayout=1
    SetEnvIf user-agent "libwww" stayout=1
    SetEnvIf user-agent "Mass Downloader" stayout=1
    SetEnvIf user-agent "Maxthon$" stayout=1
    SetEnvIf user-agent "microsoft.url" stayout=1
    SetEnvIf user-agent "MIDown tool" stayout=1
    SetEnvIf user-agent "miner" stayout=1
    SetEnvIf user-agent "Mister PiX" stayout=1
    SetEnvIf user-agent "NEWT" stayout=1
    SetEnvIf user-agent "MSFrontPage" stayout=1
    SetEnvIf user-agent "Navroad" stayout=1
    SetEnvIf user-agent "NearSite" stayout=1
    SetEnvIf user-agent "Net Vampire" stayout=1
    SetEnvIf user-agent "NetAnts" stayout=1
    SetEnvIf user-agent "NetSpider" stayout=1
    SetEnvIf user-agent "NetZIP" stayout=1
    SetEnvIf user-agent "nutch" stayout=1
    SetEnvIf user-agent "Octopus" stayout=1
    SetEnvIf user-agent "Offline Explorer" stayout=1
    SetEnvIf user-agent "Offline Navigator" stayout=1
    SetEnvIf user-agent "PageGrabber" stayout=1
    SetEnvIf user-agent "Papa Foto" stayout=1
    SetEnvIf user-agent "pavuk" stayout=1
    SetEnvIf user-agent "pcBrowser" stayout=1
    SetEnvIf user-agent "PeoplePal" stayout=1
    SetEnvIf user-agent "planetwork" stayout=1
    SetEnvIf user-agent "psbot" stayout=1
    SetEnvIf user-agent "purebot" stayout=1
    SetEnvIf user-agent "pycurl" stayout=1
    SetEnvIf user-agent "RealDownload" stayout=1
    SetEnvIf user-agent "ReGet" stayout=1
    SetEnvIf user-agent "Rippers 0" stayout=1
    SetEnvIf user-agent "SeaMonkey$" stayout=1
    SetEnvIf user-agent "sitecheck.internetseer.com" stayout=1
    SetEnvIf user-agent "SiteSnagger" stayout=1
    SetEnvIf user-agent "skygrid" stayout=1
    SetEnvIf user-agent "SmartDownload" stayout=1
    SetEnvIf user-agent "sucker" stayout=1
    SetEnvIf user-agent "SuperBot" stayout=1
    SetEnvIf user-agent "SuperHTTP" stayout=1
    SetEnvIf user-agent "Surfbot" stayout=1
    SetEnvIf user-agent "tAkeOut" stayout=1
    SetEnvIf user-agent "Teleport Pro" stayout=1
    SetEnvIf user-agent "Toata dragostea mea pentru diavola" stayout=1
    SetEnvIf user-agent "turnit" stayout=1
    SetEnvIf user-agent "vikspider" stayout=1
    SetEnvIf user-agent "VoidEYE" stayout=1
    SetEnvIf user-agent "Web Image Collector" stayout=1
    SetEnvIf user-agent "Web Sucker" stayout=1
    SetEnvIf user-agent "WebAuto" stayout=1
    SetEnvIf user-agent "WebCopier" stayout=1
    SetEnvIf user-agent "WebFetch" stayout=1
    SetEnvIf user-agent "WebGo IS" stayout=1
    SetEnvIf user-agent "WebLeacher" stayout=1
    SetEnvIf user-agent "WebReaper" stayout=1
    SetEnvIf user-agent "WebSauger" stayout=1
    SetEnvIf user-agent "Website eXtractor" stayout=1
    SetEnvIf user-agent "Website Quester" stayout=1
    SetEnvIf user-agent "WebStripper" stayout=1
    SetEnvIf user-agent "WebWhacker" stayout=1
    SetEnvIf user-agent "WebZIP" stayout=1
    SetEnvIf user-agent "Wget" stayout=1
    SetEnvIf user-agent "Widow" stayout=1
    SetEnvIf user-agent "WWW-Mechanize" stayout=1
    SetEnvIf user-agent "WWWOFFLE" stayout=1
    SetEnvIf user-agent "Xaldon WebSpider" stayout=1
    SetEnvIf user-agent "Yandex" stayout=1
    SetEnvIf user-agent "Zeus" stayout=1
    SetEnvIf user-agent "zmeu" stayout=1
    SetEnvIf user-agent "CazoodleBot" stayout=1
    SetEnvIf user-agent "discobot" stayout=1
    SetEnvIf user-agent "ecxi" stayout=1
    SetEnvIf user-agent "GT::WWW" stayout=1
    SetEnvIf user-agent "heritrix" stayout=1
    SetEnvIf user-agent "HTTP::Lite" stayout=1
    SetEnvIf user-agent "HTTrack" stayout=1
    SetEnvIf user-agent "ia_archiver" stayout=1
    SetEnvIf user-agent "id-search" stayout=1
    SetEnvIf user-agent "id-search.org" stayout=1
    SetEnvIf user-agent "IDBot" stayout=1
    SetEnvIf user-agent "Indy Library" stayout=1
    SetEnvIf user-agent "IRLbot" stayout=1
    SetEnvIf user-agent "ISC Systems iRc Search 2.1" stayout=1
    SetEnvIf user-agent "LinksManager.com_bot" stayout=1
    SetEnvIf user-agent "linkwalker" stayout=1
    SetEnvIf user-agent "lwp-trivial" stayout=1
    SetEnvIf user-agent "MFC_Tear_Sample" stayout=1
    SetEnvIf user-agent "Microsoft URL Control" stayout=1
    SetEnvIf user-agent "Missigua Locator" stayout=1
    SetEnvIf user-agent "panscient.com" stayout=1
    SetEnvIf user-agent "PECL::HTTP" stayout=1
    SetEnvIf user-agent "PHPCrawl" stayout=1
    SetEnvIf user-agent "PleaseCrawl" stayout=1
    SetEnvIf user-agent "SBIder" stayout=1
    SetEnvIf user-agent "Snoopy" stayout=1
    SetEnvIf user-agent "Steeler" stayout=1
    SetEnvIf user-agent "URI::Fetch" stayout=1
    SetEnvIf user-agent "urllib" stayout=1
    SetEnvIf user-agent "Web Sucker" stayout=1
    SetEnvIf user-agent "webalta" stayout=1
    SetEnvIf user-agent "WebCollage" stayout=1
    SetEnvIf user-agent "Wells Search II" stayout=1
    SetEnvIf user-agent "WEP Search" stayout=1
    SetEnvIf user-agent "zermelo" stayout=1
    SetEnvIf user-agent "ZyBorg" stayout=1
    SetEnvIf user-agent "Indy Library" stayout=1
    SetEnvIf user-agent "libwww-perl" stayout=1
    SetEnvIf user-agent "Go!Zilla" stayout=1
    SetEnvIf user-agent "TurnitinBot" stayout=1
    <IfModule !mod_authz_core.c>
    deny from env=stayout
    </IfModule>
    <IfModule mod_authz_core.c>
    <RequireAll>
    Require all granted
    Require not env stayout
    </RequireAll>
    </IfModule>
    ##### Common hacking tools and bandwidth hoggers block -- END

    ## Back-end protection
    RewriteRule ^administrator/?$ - [L]
    RewriteRule ^administrator/index\.(php|html?)$ - [L]
    RewriteRule ^administrator/index[23]\.php$ - [L]
    RewriteRule ^administrator/(components|modules|templates|images|plugins)/.*\.(jpe|jpg|jpeg|jp2|jpe2|png|gif|bmp|css|js|swf| html|mpg|mp3|mpeg|mp4|avi|wav|ogg|ogv|xls|xlsx|doc |docx|ppt|pptx|zip|rar|pdf|xps|txt|7z|svg|odt|ods| odp|flv|mov|htm|ttf|woff|eot|JPG|JPEG|PNG|GIF|CSS| JS|TTF|WOFF|EOT)$ - [L]
    RewriteRule ^administrator/ - [F]

    # Begin Securitycheck Pro Disable Server Signature
    ServerSignature Off
    ## End Securitycheck Pro Disable Server Signature

    ## Begin Securitycheck Pro Disallow Php Easter Eggs
    RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC]
    RewriteRule .* index.php [F]
    ## End Securitycheck Pro Disallow Php Easter Eggs

    ## Begin Securitycheck Pro Disallow Access To Sensitive Files
    RewriteRule ^(htaccess.txt|configuration.php(-dist)?|joomla.xml|README.txt|web.config.txt|CONTRI BUTING.md|phpunit.xml.dist)$ - [F]
    ## End Securitycheck Pro Disallow Access To Sensitive Files

    # Block mySQL injects
    RewriteCond %{QUERY_STRING} (;|<|>|’|”|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|cast|set|declare|drop|updat e|md5|benchmark) [NC,OR]

    RewriteCond %{QUERY_STRING} \.\./\.\. [OR]

    RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
    RewriteCond %{QUERY_STRING} \.[a-z0-9] [NC,OR]
    RewriteCond %{QUERY_STRING} (<|>|’|%0A|%0D|%27|%3C|%3E|%00) [NC]

    # BEGIN Cache-Control Headers
    <IfModule mod_headers.c>
    <FilesMatch ".(ico|jpe?g|png|gif|swf|flv|css|js|gz|pdf)$">
    Header set Cache-Control "max-age=2592000"
    </FilesMatch>

    # Désactive la mise en cache pour les fichier PHP et CGI
    <FilesMatch ".(php|cgi)$">
    Header unset Cache-Control
    </FilesMatch>
    </IfModule>
    Si vous ne réussissez pas du premier coup, appelez ça version 1.0

    Commentaire


    • #3
      Re : Accès interdit! erreur 403.

      J'ai supprimé cette ligne pour la solution
      ## Begin Securitycheck Pro Prevent Unauthorized Browsing
      Options All -Indexes
      ## End Securitycheck Pro Prevent Unauthorized Browsing
      Si vous ne réussissez pas du premier coup, appelez ça version 1.0

      Commentaire

      Annonce

      Réduire
      Aucune annonce pour le moment.

      Partenaire de l'association

      Réduire

      Hébergeur Web PlanetHoster
      Travaille ...
      X