I had major Pakistani and Indonesian script kiddie/hack issues at
Dreamhost until a couple of months ago, when I followed all of their
recommendations, changed all passwords, fixed all Wordpress and Gallery 2
galleries, but most importantly, went to using SFTP. They also have
proactive detection
Mark-
Friday, June 8, 2012, 3:33:24 PM, you wrote:
> Looks like they got you again
Yep. I caught it and fixed it already.
--
-Mark Wieder
mwie...@ahsoftware.net
___
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url
he Nachricht-
> > Von: use-livecode-boun...@lists.runrev.com [mailto:use-livecode-
> > boun...@lists.runrev.com] Im Auftrag von Bob Sneidar
> > Gesendet: Dienstag, 5. Juni 2012 17:38
> > An: How to use LiveCode
> > Betreff: Re
sts.runrev.com [mailto:use-livecode-
> boun...@lists.runrev.com] Im Auftrag von Bob Sneidar
> Gesendet: Dienstag, 5. Juni 2012 17:38
> An: How to use LiveCode
> Betreff: Re: on-rev hacked
>
> So who maintains the list? Is it updated on a regular basis? How do they
> fund the effor
Also comes highly recommended by Leo Laporte, the tech guy (radio talk show
host, best I've heard). I cannot use it here because last time I checked it
doesn't have a centrally managed interface. Not practical for large commercial
installations.
Bob
On Jun 5, 2012, at 12:23 AM, Mark Wieder w
So who maintains the list? Is it updated on a regular basis? How do they fund
the effort without anyone having to pay for it?
Bob
On Jun 4, 2012, at 5:12 PM, Pierre Sahores wrote:
> Good reminder. In my experience, 5G Blacklist 2012 is a must, trustable and
> usable with great satisfaction.
Andre-
Monday, June 4, 2012, 4:24:34 PM, you wrote:
> Mark,
> Do you have a potential idea of how the hacking occurred? Were you using
> any popular PHP FOSS there? I've seen hackings such as this happen thru
> Wordpress exploitation.
> Any idea how it happened?
I upgraded WordPress to 3.3 (I
Matthias-
Monday, June 4, 2012, 4:11:33 PM, you wrote:
> http://perishablepress.com/5g-blacklist-2012/
Yes, thanks. I've got that implemented now. I meant to look into it
before but never got to it. Interestingly, in the process of cleaning
the html files I ftped them to a local Windows machine,
Tim-
Monday, June 4, 2012, 7:02:32 PM, you wrote:
> Thanks for the heads up. My sites seem to be okay... which server
> are you on?
I'm on Odin.
--
-Mark Wieder
mwie...@ahsoftware.net
___
use-livecode mailing list
use-livecode@lists.runrev.com
Pl
I can confirm that the 5G-Blacklist .httaccess script really works. It
stopped all but a handful of nasties overnight and dead in their tracks. The
only ones that get through are requests for any unspecified .php files, most
likely due to my syntax ignorance.
Can someone correct this or give me an
Hi Nicolas,
Le 5 juin 2012 à 03:53, Nicolas Cueto a écrit :
> Some advice about how to implement this?
>
>
>
> The instructions at 5G Black say this:
>
> "To install the 5G Firewall, append the following code to your site’s
> root .htaccess:"
>
>
> I'm unsure what directory is indicated by
root would be home/username/
* that's where you'd put your .htaccess file
On Mon, Jun 4, 2012 at 9:02 PM, Tim Selander wrote:
> Thanks for the heads up. My sites seem to be okay... which server are you
> on?
>
> Tim Selander
> Tokyo, Japan
>
>
> On 6/5/12 7:57 AM, Mark Wieder wrote:
>
>> It
Thanks for the heads up. My sites seem to be okay... which server
are you on?
Tim Selander
Tokyo, Japan
On 6/5/12 7:57 AM, Mark Wieder wrote:
It was pointed out to me over the weekend (thanks Mark!) that my on-rev website
had been hit by a bot that did two things: replaced my .htaccess file wi
Some advice about how to implement this?
The instructions at 5G Black say this:
"To install the 5G Firewall, append the following code to your site’s
root .htaccess:"
I'm unsure what directory is indicated by "your site's root". Does
"root" mean my "public_html" directory? Or is some Apache-s
Good reminder. In my experience, 5G Blacklist 2012 is a must, trustable and
usable with great satisfaction.
Le 5 juin 2012 à 01:11, Matthias Rebbe a écrit :
> Mark,
>
> thanks for the info. Maybe
>
> http://perishablepress.com/5g-blacklist-2012/
>
> is of use for you and other´s. This soluti
I would also be interested if your SQL server (not sure if you use it) was
accessed. That would REALLY suck. I don't have any web sites there, so I think
I am clear, so long as this was not a pervasive breach of lots of account
logins.
Bob
On Jun 4, 2012, at 4:24 PM, Andre Garzia wrote:
> M
Mark,
Do you have a potential idea of how the hacking occurred? Were you using
any popular PHP FOSS there? I've seen hackings such as this happen thru
Wordpress exploitation.
Any idea how it happened?
Cheers
andre
On Mon, Jun 4, 2012 at 7:57 PM, Mark Wieder wrote:
> It was pointed out to me o
Mark,
thanks for the info. Maybe
http://perishablepress.com/5g-blacklist-2012/
is of use for you and other´s. This solution was mentioned on the list last
year by Andre, if i remember right.
I am using that since then in the hope it prevents my account from being hacked.
Regards,
Matthias
Am
It was pointed out to me over the weekend (thanks Mark!) that my on-rev website
had been hit by a bot that did two things: replaced my .htaccess file with an
empty (zero-length) one, and inserted a javascript pointing to "thesalivan.com"
right after the tag in all the .html and .htm files.
Simple
19 matches
Mail list logo