-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Everyone, In light of the recent PHP attacks, I've added as a precautionary measure the mod_security module to my RPM for the httpd (Apache) web server to help secure things more. I haven't experienced the problem; yet, KNOCKING on WOOD LOUDLY. But with the recent spike of activity of this worm, I have to take proactive action. Anyone using my version of the updates can disable the security module by going to /etc/httpd/conf.d/security.conf and commenting out the LoadModule line in the configuration file. I'll probably be acting by updating PHP also for FC1, if someone doesn't get going on this for FC1 & FC2 builds... which seem to be susceptible to this attach. http://support.intcomgrp.com/~jkosin James Kosin -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDchU4kNLDmnu1kSkRA27TAJ0R6ujZEbMu42H/xxwk7trIb2o51QCgg+yG b3b9F4EZEoP1bUGA8Mmlz2I= =D6S2 -----END PGP SIGNATURE----- -- Scanned by ClamAV - http://www.clamav.net -- fedora-legacy-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-legacy-list