On 11/18/2011 8:21 AM, andy pugh wrote: > Somebody on the forum has spotted that the LinuxCNC website serves > different content to web browsers that declare themselves as > "googlebot" rather than their real User Agent > (I tried it with Chrome) > http://www.linuxcnc.org/component/option,com_kunena/Itemid,20/func,view/id,14843/catid,51/limit,6/limitstart,0/lang,en/#14843 > > This probably explains why the Google search results remain "hacked" > > I don't know where the hack-age must be for this to be the case, but I > suspect in the server rather than the page content. > > What also realyy puzzles me is why this was done, as far as I know > there is no linkage to the putative discounted software (and I would > happily buy millions of licenses for any software at 129% off, as > presumably that means that they pay me?) > Andy:
If you've ever tracked all the exchanges going on behind the curtain as you browse the web you probably feel the same that I do...it's a miracle anything comes out they way we want it to. I'm sure the links to evil sites used to work. Hackers frequently piggyback their work on successes of others; over time the 'payloads' accumulate junk much the same way human DNA has. Fortunately, some of it becomes benign with age; unfortunately, some of it remains dangerous. Thanks for the link to the jooma-pharma-hack page, by the way. It should give you a clue of how the site can be hacked without changing its content. Regards, Kent ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d _______________________________________________ Emc-developers mailing list Emc-developers@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-developers