On Sat, Feb 9, 2013 at 7:55 PM, UXB denn...@uxbinternet.com wrote:
From a security perspective cookies are a better option because passing
ID's in the open can result in session hijacking when someone bookmarks a
link.
This isn't even the biggest threat. Since you are passing the SessionID
It appears that there are either Web Developers running sites with current
infections, or there is a new round happening.
I have seen one site hacked twice in the last two weeks, and although they
were never able to run the code, there is very little evidence that this
exploit is from the web
I just got the below on a site. Not sure how to decrypt to tell exactly
what it's doing though.
Client noticed that Google had flagged the site as 'comprimised.
I'm pointing my finger at the hosting company - they've got a security
issue if this can happen, correct?
So, anybody know what this
One thing I hate about some hosting companies is that they have Robust
Exceptions switched on, but what concerns me even more is that they don't
care that this is a security risk... If your hosting company is one of
them, get in their ears about having it switched off.
If they refuse then its
Still I am not sure how they are uploading these files
as there is nothing in the logs that indicates this.
For mine in the previous message, the altered file still had the
ORIGINAL creation date on it - 2011 something - although it was altered
last week. So, a search of all the site files
That would indicate that they where able to get the file stamp before
modifying it and reapplying the time stamp Extreme long shot, but who
knows how they are doing this.
--
Regards,
Andrew Scott
WebSite: http://www.andyscott.id.au/
Google+: http://plus.google.com/113032480415921517411
6 matches
Mail list logo