hi,

despite me disabling the "proxy*" modules from my Apache, I see still 
occasionally some succesfull hack attempts via my server (code 200) :

125.46.73.7 - - [30/Jun/2011:11:54:09 +0200] "GET http://www.baidu.com/ 
HTTP/1.1" 200 240 "-" "Mozilla/4.0 (compatible; MSIE 4.01; Windows NT)"

The loaded modules in my Apache are :

# /usr/apache2/bin/httpd -M | sort
 actions_module (shared)
 alias_module (shared)
 auth_basic_module (shared)
 authn_dbm_module (shared)
 authn_default_module (shared)
 authn_file_module (shared)
 authz_dbm_module (shared)
 authz_default_module (shared)
 authz_groupfile_module (shared)
 authz_host_module (shared)
 authz_user_module (shared)
 autoindex_module (shared)
 cgi_module (shared)
 core_module (static)
 dbd_module (shared)
 dir_module (shared)
 dumpio_module (shared)
 env_module (shared)
 expires_module (shared)
 headers_module (shared)
 http_module (static)
 include_module (shared)
 log_config_module (shared)
 logio_module (shared)
 mime_module (shared)
 mpm_prefork_module (static)
 negotiation_module (shared)
 php5_module (shared)
 setenvif_module (shared)
 so_module (static)
 ssl_module (shared)
 vhost_alias_module (shared)

Can anyone please shed some light on this mystery  ?

thx a lot in advance
Rob


----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.

Reply via email to