I added https capability to my forum for anyone who wanted to use it, but its not the default.
The same applies to vb.org, it will work here if you want, but its not the default.
We actually switched vb.com to use it as the default yesterday, since its needed for the IOS mobile app (mandatory soon).
Yep, that is exactly why I have to switch as well..
It would be interesting to see how switching impacts seo and traffic to Vbulletin.com.
--------------- Added [DATE]1480626162[/DATE] at [TIME]1480626162[/TIME] ---------------
I have been working on this and it turned out to be more complicated than I expected. Certain things are not functioning in the admincp I suppose from being blocked by browsers due to not being secure..
# START Deny attempts to view the Htaccess file. <Files .htaccess> Order allow,deny Deny from all </Files> # END Deny attempts to view the Htaccess file.
# Start Deny attempts to view the config file. <Files includes/config.php> Order allow,deny Deny from all </Files> # End Deny attempts to view the config file.
# proc/self/environ? no way! RewriteCond %{QUERY_STRING} proc/self/environ [OR] # Block out any script trying to set a mosConfig value through the URL RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|%3D) [OR] # Block out any script trying to base64_encode crap to send via URL RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR] # Block out any script that includes a <script> tag in URL RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR] # Block out any script trying to set a PHP GLOBALS variable via URL RewriteCond %{QUERY_STRING} GLOBALS(=|[|%[0-9A-Z]{0,2}) [OR] # Block out any script trying to modify a _REQUEST variable via URL RewriteCond %{QUERY_STRING} _REQUEST(=|[|%[0-9A-Z]{0,2})
# Measures to block out SQL injection attacks RewriteCond %{QUERY_STRING} ^.*(;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|cast|set|declare|drop|update|md5|benchmark).* [NC,OR]