Sponsored Content
Special Forums Cybersecurity Web hosting security question Post 302543502 by agriz on Monday 1st of August 2011 03:40:11 AM
Old 08-01-2011
Web hosting security question

Hi,

Recently my has been hacked. A .pl script has been uploaded in the root of the directory, which uploaded lot of unwanted files and changed their file permission to 777.

I have no clue how did they upload that .pl file in my hosting.
Website is in shared hosting. Could they access my web root from other website which hosted in the same server?

Or any idea how could they reached my site root?
 

4 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Web page hosting

I built my website based on Dreamweaver, on Windows platform. My server uses Unix, and the page doesn't look too good. Is there any way to solve this problem without too much of a headache? (1 Reply)
Discussion started by: PCL
1 Replies

2. Cybersecurity

Web hosting security

Hello, guys ! The company I work for has a few web hosting servers and I'd like to know how can I secure the servers a little bit ? The situation is like this: Apache runs as nobody so all users can run scripts as nobody. This is a big security problem beacause if I have an account on the... (4 Replies)
Discussion started by: Sergiu-IT
4 Replies

3. Web Development

ASP.NET 5 Application on Centos OS7 Web Hosting Server

Hi All, Frankly I'm new to Linux Environment. While we are trying to Host an ASP.NET 5 Web Application on Centos OS7 Web hosting Server. There were couple of steps which we are supposed to go through, please see this link - We are stuck at Create a Container & then Running the Container,... (1 Reply)
Discussion started by: John Fredric
1 Replies

4. Shell Programming and Scripting

Ldap connection after hosting on Web Server

Hi.. I have very limited knowledge on LDAP and its configuration and but I have been trying to figure out one issue that takes place when I am running the program that is written in php, but so far its unsuccessful. The server, I am working on is ldap server, which is running on Apache. After... (1 Reply)
Discussion started by: GomathiUoM
1 Replies
ABRT.CONF(5)							    ABRT Manual 						      ABRT.CONF(5)

NAME
abrt.conf - Configuration file for abrt. DESCRIPTION
abrt is a daemon that watches for application crashes. When a crash occurs, it collects the problem data and takes action according to its configuration. This document describes abrt's configuration file. The configuration file consists of items in the format "Option = Value". A description of each item follows: DumpLocation = directory The directory where should abrt store coredumps and all files which are needed for reporting. The default is /var/tmp/abrt. MaxCrashReportsSize = number The maximum disk space (specified in megabytes) that abrt will use for all the crash dumps. Specify a value here to ensure that the crash dumps will not fill all available storage space. The default is 1000. WatchCrashdumpArchiveDir = directory The daemon will watch this directory and call abrt-handle-upload on files which appear there. This is used to auto-unpack crashdump tarballs uploaded via ftp, scp, etc. The directory must exist and be writable for abrt. There is no default. DeleteUploaded = yes/no The daemon will delete an uploaded crashdump archive after an atempt to unpack it. An archive will be delete whether unpacking finishes successfully or not. The default value is no. SEE ALSO
abrtd(8) abrt-action-save-package-data.conf(5) abrt-handle-upload(1) AUTHORS
o ABRT team abrt 2.1.11 06/18/2014 ABRT.CONF(5)
All times are GMT -4. The time now is 02:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy