Re: attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Obviously, if you are running several vhosts and plesk you likely have 
other logs to check. Also, one can usually see the origin of the mail 
injection in the maillog (e.g. complaints about setting to an unsafe 
sender) or in the outgoing messages. At runtime you can see the connects 
with full URLs on the apache status page.

Kai

-- 
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conactive.com



_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux