El meu servidor va ser hackejat perquè tinc VBET.
Aquesta és la clau que confirma:
No puc desinstal lar VBET!arrel 27.888 1 0 18:26? Ss 0:00 / usr / sbin / exim Mc-1OSBjj-0007Cf-4S SERVER_SIGNATURE = <dirección> Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server a www com **** port 80 </ address>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2 (Red Hat modificat) SERVER_PORT = 80 = HTTP_HOST www com **** DOCUMENT_ROOT = SCRIPT_FILENAME / home/w11s0s3r/public_html = / = home/w11s0s3r/public_html/vbenterprisetranslator_seo.php REQUEST_URI / arxiu / index.php/f-23.html SCRIPT_NAME = / vbenterprisetranslator_seo.php HTTP_CONNECTION = Keep-Alive REMOTE_PORT = 41.741 PATH = / bin: / usr / bin PWD = / = home/w11s0s3r/public_html SERVER_ADMIN webmaster com **** REDIRECT_UNIQUE_ID = = 200 TCTYtbylwV0AAEFiMjYAAABQ REDIRECT_STATUS HTTP_ACCEPT =* / * REMOTE_ADDR = 72.55.191.104 SHLVL = 1 SERVER_NAME = com www *** HTTP_PRAGMA = no-cache = SERVER_SOFTWARE Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e -FIPS-RHEL5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 QUERY_STRING = SERVER_ADDR = 188.165.193.93 GATEWAY_INTERFACE = CGI/1.1 SERVER_PROTOCOL = HTTP/1.0 REDIRECT_URL = / = archive/index.php/f-23.html REQUEST_METHOD CAP _ = / usr / sbin / sendmail
w11s0s3r 27.996 27.888 1 18:26? D 0:00 / usr / sbin / exim Mc-1OSBjj-0007Cf-4S SERVER_SIGNATURE = <dirección> Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server en www *** com el port 80 </ address>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2 (Red Hat modificat) SERVER_PORT = 80 = HTTP_HOST www com **** DOCUMENT_ROOT = SCRIPT_FILENAME / home/w11s0s3r/public_html = / home/w11s0s3r/public_html/vbenterprisetranslato ^ C
Si us plau m'ajudi a meu servidor està enviant una gran quantitat de correus SPAM!
S'està esquerdada!
AJUDA Michał Podbielski!