On 11/18/2011 8:21 AM, andy pugh wrote:
> Somebody on the forum has spotted that the LinuxCNC website serves
> different content to web browsers that declare themselves as
> "googlebot" rather than their real User Agent
> (I tried it with Chrome)
> http://www.linuxcnc.org/component/option,com_kunena/Itemid,20/func,view/id,14843/catid,51/limit,6/limitstart,0/lang,en/#14843
>
> This probably explains why the Google search results remain "hacked"
>
> I don't know where the hack-age must be for this to be the case, but I
> suspect in the server rather than the page content.
>
> What also realyy puzzles me is why this was done, as far as I know
> there is no linkage to the putative discounted software (and I would
> happily buy millions of licenses for any software at 129% off, as
> presumably that means that they pay me?)
>
Andy:

If you've ever tracked all the exchanges going on behind the curtain as 
you browse the web you probably feel the same that I do...it's a miracle 
anything comes out they way we want it to.

I'm sure the links to evil sites used to work. Hackers frequently 
piggyback their work on successes of others; over time the 'payloads' 
accumulate junk much the same way human DNA has. Fortunately, some of it 
becomes benign with age; unfortunately, some of it remains dangerous.

Thanks for the link to the jooma-pharma-hack page, by the way. It should 
give you a clue of how the site can be hacked without changing its content.

Regards,
Kent


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Emc-developers mailing list
Emc-developers@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-developers

Reply via email to