I think it is immune, until someone gets in the front door. Then all bets are 
off. I had an ex-employee who was able to hack into the database of most PHP 
enabled sites, because people who set them up do not know how to harden them. 
He demonstrated this on more than one occasion. Others have reported Wordpress 
vulnerabilities. Still others foolishly use the same login credentials for 
multiple things like email and FTP. Once email is compromised, they have 
credentials to multiple things if they can find them, which they usually can 
because those things are probably somewhere in the email history. 

Bob


On Jun 14, 2012, at 1:53 PM, J. Landman Gay wrote:

> On 6/14/12 2:28 PM, stephen barncard wrote:
>> I use that google thing too and still found code that wasn't mine and an
>> .irev file whose name was changed to a .php type.
>> I resorted to sorting files by date and scanning each one.
>>  I hate this crap.
> 
> How does this stuff happen? Does a site require php or wordpress or something 
> for the hack to work? I thought an irev page was immune.
> 
> -- 
> Jacqueline Landman Gay         |     jac...@hyperactivesw.com
> HyperActive Software           |     http://www.hyperactivesw.com
> 
> _______________________________________________
> use-livecode mailing list
> use-livecode@lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode


_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to