Hello Brian,
Sunday, October 12, 2008, 11:13:01 AM, you wrote:
>
Did they even offer any logs that you could review so you could "fix your software" (since they say that's at fault) ?
That was the part that floored me. They threw it out there with NO other justification or ANY evide
Mike,
Yeah, I've ran into hosts like that before. As soon as they refuse to
accept even the remote possibility that they are at fault it's time to move
on, especially when it comes to a hack to that extent.
Did they even offer any logs that you could review so you could "fix your
software" (sinc
Mike,
Please let us know if we can help - we do host sites in a more secure
fashion and monitor all the servers at a high level
rates are on planetnoc.com (we are small but very high powered)
-Dan Horning
On Sun, 2008-10-12 at 10:43 +0800, [EMAIL PROTECTED] wrote:
>
> Thanks again.
>
>
> --
Hello Brian,
I checked all the points you made and thanks for taking the time.
"It sounds like you'll need a crash course in Apache configuration..."
That works for me here on my development system that is an XP pro Box running WAMPSERVER but unfortunately my host has all the marbles and se
[EMAIL PROTECTED] wrote:
Hello Brian,
Saturday, October 11, 2008, 10:03:37 PM, you wrote:
Thanks very much for the feedback. I have been thinking since I moved to
this server in May that something wasn't quite right.
and just who is this host?
--
=
Michael Southwell
Vic
Hello Brian,
Saturday, October 11, 2008, 10:03:37 PM, you wrote:
Thanks very much for the feedback. I have been thinking since I moved to this server in May that something wasn't quite right. All of my administrative email accounts have been hijacked and forged headers have been used to exec
this totally sucks and i'm sorry to hear this happened. It sounds like
you'll need a crash course in Apache configuration...
My advice to you is to do a couple things:
a) Most importantly, consider *finding a new host*, because
1) they should have records of all connectivity to that server
2
On Sat, 2008-10-11 at 21:55 +0800, [EMAIL PROTECTED] wrote:
> Hello David,
>
> Saturday, October 11, 2008, 9:42:46 PM, you wrote:
>
> > [EMAIL PROTECTED] wrote:
> >> I checked my test system also and when I do a directory the /xml
> >> folder, it shows me the content of the folder which is yet an
On Sat, 2008-10-11 at 09:42 -0400, David Krings wrote:
> [EMAIL PROTECTED] wrote:
> > I checked my test system also and when I do a directory the /xml
> > folder, it shows me the content of the folder which is yet another
> > outcome unexpected.
> >
>
> There is a setting in the Apache config tha
g/show_participation.php
> __ Information from ESET Smart Security, version of virus
> signature database 3514 (20081011) __
> The message was checked by ESET Smart Security.
> http://www.eset.com
HA! My thoughts exactly. I was blown away when they suggested my
scripts
[EMAIL PROTECTED] wrote:
I checked my test system also and when I do a directory the /xml
folder, it shows me the content of the folder which is yet another
outcome unexpected.
There is a setting in the Apache config that prevents the listing of
directories. In a production system that should
Are allowoverride and options set correctly in httpd.conf for that directory?
-Original Message-
From: [EMAIL PROTECTED]
Date: Sat, 11 Oct 2008 20:51:37
To: NYPHP Talk
Subject: [nyphp-talk] Need some understanding about a hacker attack...
Hello NYPHP,
One of my sites went down yest
Hello NYPHP,
One of my sites went down yesterday with "Out of Bandwidth". When I
checked into it, a badguy had hijacked an application folder called
/xml that usually contains one php file that serves the application
menu system. I have no idea why the software developer chose this
metho
13 matches
Mail list logo