Jump to content

New FAQ entry about web-forms


Wazoo

Recommended Posts

OK typical advice starts with checking the e-mail logs on the server. Lots of folks can't find anything out of the ordinary.

Then suggested check of the server logs, looking for unauthorized access.

Then one suggests that firewall logs be checked for traffic that is bypassing the server itself.

Here's a possibility for those that "can't find anything" out of the oridinary, based on that this type of outgoing might be seen as ordinary ....

Web Contact Form Hacks Used to Send spam

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...