Server tiegħi kien Hacked minħabba i jkollhom VBET.
DIN HIJA L-clue li JIKKONFERMA IT:
I ma jistax uninstall VBET!għerq 27,888 1 0 18:26? Ss 00:00 / usr / sbin / EXIM-Mc 1OSBjj-0007Cf-4S SERVER_SIGNATURE = <address> Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server fuq www **** com Port 80 </ indirizz>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2 (Red Hat modifikat) SERVER_PORT = 80 HTTP_HOST = www **** com DOCUMENT_ROOT = SCRIPT_FILENAME / home/w11s0s3r/public_html = / home/w11s0s3r/public_html/vbenterprisetranslator_seo.php REQUEST_URI = / Arkivju / index.php/f-23.html SCRIPT_NAME = / vbenterprisetranslator_seo.php HTTP_CONNECTION = Żomm-Alive REMOTE_PORT = 41,741 PASSAĠĠ = / bin: / usr / bin PWD = / home/w11s0s3r/public_html SERVER_ADMIN = webmaster **** com REDIRECT_UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ REDIRECT_STATUS = 200 HTTP_ACCEPT =* / * = REMOTE_ADDR 72.55.191.104 SHLVL = 1 SERVER_NAME = www *** com HTTP_PRAGMA = ebda cache SERVER_SOFTWARE = Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e -FIPS-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 QUERY_STRING = SERVER_ADDR = 188.165.193.93 GATEWAY_INTERFACE = CGI/1.1 SERVER_PROTOCOL = HTTP/1.0 REDIRECT_URL = / archive/index.php/f-23.html REQUEST_METHOD = RAS _ = / usr / sbin / Sendmail
w11s0s3r 27,996 27,888 1 18:26? D 0:00 / usr / sbin / EXIM-Mc 1OSBjj-0007Cf-4S SERVER_SIGNATURE = <address> Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server fuq www *** com Port 80 </ indirizz>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2 (Red Hat modifikat) SERVER_PORT = 80 HTTP_HOST = www **** com DOCUMENT_ROOT = SCRIPT_FILENAME / home/w11s0s3r/public_html = / home/w11s0s3r/public_html/vbenterprisetranslato ^ C
Jekk jogħġbok għinni server tiegħi hija li jibgħat ħafna ta 'SPAM e-mails!
Qed jiġi maqsum!
HELP Michał Podbielski!