On Tuesday 10 July 2007 01:23, Zach wrote:
> On 7/10/07, Mike Bird <[EMAIL PROTECTED]> wrote:
> > He or she will neither boot the drives nor execute any
> > program or script on them, for they are all compromised. He or she will
> > only read the compromised drives.
>
> How can I do this? Assume
On Monday 09 July 2007 22:14, rocky wrote:
> Thank you very much for your help! Are you meaning someone has been
> controlling our server?
Given that your server is attacking other servers, and assuming you
yourself are not attacking those other servers, then someone else is
running attack softwar
On Jul 10, 12:10 pm, Mike Bird <[EMAIL PROTECTED]> wrote:
> On Monday 09 July 2007 20:05, rocky wrote:
>
> > Thank you very much for your reply! Yes all of the rest are getting a
> > 403 response. The problem is that the log files are sending over by
> > FortressITX Abuse Dept. They are complaining
On Monday 09 July 2007 20:05, rocky wrote:
> Thank you very much for your reply! Yes all of the rest are getting a
> 403 response. The problem is that the log files are sending over by
> FortressITX Abuse Dept. They are complaining our server is used to do
> injection attack against other servers.
On Jul 10, 10:50 am, Roberto C. Sánchez <[EMAIL PROTECTED]> wrote:
> On Tue, Jul 10, 2007 at 01:55:54AM -, rocky wrote:
> > Hey list,
>
> > Currently, we get some notice about some one is using our server doing
> > injection attacks against other servers.
>
> > Below are some log files they sen
On Tue, Jul 10, 2007 at 01:55:54AM -, rocky wrote:
> Hey list,
>
> Currently, we get some notice about some one is using our server doing
> injection attacks against other servers.
>
> Below are some log files they sent to us
> $--Snap begin---$
> our.
Hey list,
Currently, we get some notice about some one is using our server doing
injection attacks against other servers.
Below are some log files they sent to us
$--Snap begin---$
our.server.ip.address - - [09/Jul/2007:00:31:43 +0200] "GET
> //.comhttp:/
7 matches
Mail list logo