hi, despite me disabling the "proxy*" modules from my Apache, I see still occasionally some succesfull hack attempts via my server (code 200) :
125.46.73.7 - - [30/Jun/2011:11:54:09 +0200] "GET http://www.baidu.com/ HTTP/1.1" 200 240 "-" "Mozilla/4.0 (compatible; MSIE 4.01; Windows NT)" The loaded modules in my Apache are : # /usr/apache2/bin/httpd -M | sort actions_module (shared) alias_module (shared) auth_basic_module (shared) authn_dbm_module (shared) authn_default_module (shared) authn_file_module (shared) authz_dbm_module (shared) authz_default_module (shared) authz_groupfile_module (shared) authz_host_module (shared) authz_user_module (shared) autoindex_module (shared) cgi_module (shared) core_module (static) dbd_module (shared) dir_module (shared) dumpio_module (shared) env_module (shared) expires_module (shared) headers_module (shared) http_module (static) include_module (shared) log_config_module (shared) logio_module (shared) mime_module (shared) mpm_prefork_module (static) negotiation_module (shared) php5_module (shared) setenvif_module (shared) so_module (static) ssl_module (shared) vhost_alias_module (shared) Can anyone please shed some light on this mystery ? thx a lot in advance Rob ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program.