Re: on-rev hacked

2012-06-08 Thread stephen barncard
I had major Pakistani and Indonesian script kiddie/hack issues at Dreamhost until a couple of months ago, when I followed all of their recommendations, changed all passwords, fixed all Wordpress and Gallery 2 galleries, but most importantly, went to using SFTP. They also have proactive detection

Re: on-rev hacked

2012-06-08 Thread Mark Wieder
Mark- Friday, June 8, 2012, 3:33:24 PM, you wrote: > Looks like they got you again Yep. I caught it and fixed it already. -- -Mark Wieder mwie...@ahsoftware.net ___ use-livecode mailing list use-livecode@lists.runrev.com Please visit this url

Re: on-rev hacked

2012-06-08 Thread Mark Laffoon
he Nachricht- > > Von: use-livecode-boun...@lists.runrev.com [mailto:use-livecode- > > boun...@lists.runrev.com] Im Auftrag von Bob Sneidar > > Gesendet: Dienstag, 5. Juni 2012 17:38 > > An: How to use LiveCode > > Betreff: Re

AW: on-rev hacked

2012-06-06 Thread Tiemo Hollmann TB
sts.runrev.com [mailto:use-livecode- > boun...@lists.runrev.com] Im Auftrag von Bob Sneidar > Gesendet: Dienstag, 5. Juni 2012 17:38 > An: How to use LiveCode > Betreff: Re: on-rev hacked > > So who maintains the list? Is it updated on a regular basis? How do they > fund the effor

Re: on-rev hacked

2012-06-05 Thread Bob Sneidar
Also comes highly recommended by Leo Laporte, the tech guy (radio talk show host, best I've heard). I cannot use it here because last time I checked it doesn't have a centrally managed interface. Not practical for large commercial installations. Bob On Jun 5, 2012, at 12:23 AM, Mark Wieder w

Re: on-rev hacked

2012-06-05 Thread Bob Sneidar
So who maintains the list? Is it updated on a regular basis? How do they fund the effort without anyone having to pay for it? Bob On Jun 4, 2012, at 5:12 PM, Pierre Sahores wrote: > Good reminder. In my experience, 5G Blacklist 2012 is a must, trustable and > usable with great satisfaction.

Re: on-rev hacked

2012-06-05 Thread Mark Wieder
Andre- Monday, June 4, 2012, 4:24:34 PM, you wrote: > Mark, > Do you have a potential idea of how the hacking occurred? Were you using > any popular PHP FOSS there? I've seen hackings such as this happen thru > Wordpress exploitation. > Any idea how it happened? I upgraded WordPress to 3.3 (I

Re: on-rev hacked

2012-06-05 Thread Mark Wieder
Matthias- Monday, June 4, 2012, 4:11:33 PM, you wrote: > http://perishablepress.com/5g-blacklist-2012/ Yes, thanks. I've got that implemented now. I meant to look into it before but never got to it. Interestingly, in the process of cleaning the html files I ftped them to a local Windows machine,

Re: on-rev hacked

2012-06-04 Thread Mark Wieder
Tim- Monday, June 4, 2012, 7:02:32 PM, you wrote: > Thanks for the heads up. My sites seem to be okay... which server > are you on? I'm on Odin. -- -Mark Wieder mwie...@ahsoftware.net ___ use-livecode mailing list use-livecode@lists.runrev.com Pl

Blacklist script (was: on-rev hacked)

2012-06-04 Thread FlexibleLearning
I can confirm that the 5G-Blacklist .httaccess script really works. It stopped all but a handful of nasties overnight and dead in their tracks. The only ones that get through are requests for any unspecified .php files, most likely due to my syntax ignorance. Can someone correct this or give me an

Re: on-rev hacked

2012-06-04 Thread Pierre Sahores
Hi Nicolas, Le 5 juin 2012 à 03:53, Nicolas Cueto a écrit : > Some advice about how to implement this? > > > > The instructions at 5G Black say this: > > "To install the 5G Firewall, append the following code to your site’s > root .htaccess:" > > > I'm unsure what directory is indicated by

Re: on-rev hacked

2012-06-04 Thread Shawn Blc
root would be home/username/ * that's where you'd put your .htaccess file On Mon, Jun 4, 2012 at 9:02 PM, Tim Selander wrote: > Thanks for the heads up. My sites seem to be okay... which server are you > on? > > Tim Selander > Tokyo, Japan > > > On 6/5/12 7:57 AM, Mark Wieder wrote: > >> It

Re: on-rev hacked

2012-06-04 Thread Tim Selander
Thanks for the heads up. My sites seem to be okay... which server are you on? Tim Selander Tokyo, Japan On 6/5/12 7:57 AM, Mark Wieder wrote: It was pointed out to me over the weekend (thanks Mark!) that my on-rev website had been hit by a bot that did two things: replaced my .htaccess file wi

Re: on-rev hacked

2012-06-04 Thread Nicolas Cueto
Some advice about how to implement this? The instructions at 5G Black say this: "To install the 5G Firewall, append the following code to your site’s root .htaccess:" I'm unsure what directory is indicated by "your site's root". Does "root" mean my "public_html" directory? Or is some Apache-s

Re: on-rev hacked

2012-06-04 Thread Pierre Sahores
Good reminder. In my experience, 5G Blacklist 2012 is a must, trustable and usable with great satisfaction. Le 5 juin 2012 à 01:11, Matthias Rebbe a écrit : > Mark, > > thanks for the info. Maybe > > http://perishablepress.com/5g-blacklist-2012/ > > is of use for you and other´s. This soluti

Re: on-rev hacked

2012-06-04 Thread Bob Sneidar
I would also be interested if your SQL server (not sure if you use it) was accessed. That would REALLY suck. I don't have any web sites there, so I think I am clear, so long as this was not a pervasive breach of lots of account logins. Bob On Jun 4, 2012, at 4:24 PM, Andre Garzia wrote: > M

Re: on-rev hacked

2012-06-04 Thread Andre Garzia
Mark, Do you have a potential idea of how the hacking occurred? Were you using any popular PHP FOSS there? I've seen hackings such as this happen thru Wordpress exploitation. Any idea how it happened? Cheers andre On Mon, Jun 4, 2012 at 7:57 PM, Mark Wieder wrote: > It was pointed out to me o

Re: on-rev hacked

2012-06-04 Thread Matthias Rebbe
Mark, thanks for the info. Maybe http://perishablepress.com/5g-blacklist-2012/ is of use for you and other´s. This solution was mentioned on the list last year by Andre, if i remember right. I am using that since then in the hope it prevents my account from being hacked. Regards, Matthias Am

on-rev hacked

2012-06-04 Thread Mark Wieder
It was pointed out to me over the weekend (thanks Mark!) that my on-rev website had been hit by a bot that did two things: replaced my .htaccess file with an empty (zero-length) one, and inserted a javascript pointing to "thesalivan.com" right after the tag in all the .html and .htm files. Simple