[EMAIL PROTECTED] wrote:
That was the part that floored me. They threw it out there with NO other justification or ANY evidence to support their assumption, nothing and in a really, really nonchalant tone which bugged me even more. Actually, they did refer to the folders in the product that require write access to do things like realtime image conversions and uploads, but definitely NO, "we found a hacker using such and such folder" nothing like that and as I mentioned the exploited folder was and is read only so that was another red herring they threw at me.
Maybe it was not a hack, but the hoster who rededicated your server space to someone else to rake in some more dough (pure speculation). Can you let us know who that hosting company is?
David _______________________________________________ New York PHP Community Talk Mailing List http://lists.nyphp.org/mailman/listinfo/talk NYPHPCon 2006 Presentations Online http://www.nyphpcon.com Show Your Participation in New York PHP http://www.nyphp.org/show_participation.php
