nurke
My "dolphin" was hacked too. And I use hostforweb. vps.
Boonex guys say its the host problem, hostforweb says its the script.
Boonex says the host need to disable register_globals, host says I have to do it.
I have provided a link from my records( abuse notice) in one of earlier posts, looks like the hacker sent emails form aurora2.hosting4less.com.
xxxxxx
To: jclt@iecc.cambridge.ma.us
Subject: Aviso Importante.
X-PHP-Script: balkanlink.net/ray/modules/global/inc/content.inc.php see more for 201.86.181.91
From: Alto-AtendimentoBB <BancodoBrasil.gov.com@aurora2.hosting4less.com>
Reply-To: Alto-AtendimentoBB@server.balkanlink.net
MIME-Version: 1.0
Content-Type: text/html
Content-Transfer-Encoding: 8bit
xxxxxxxx

Now you tell me;
who is giver...who i receiver?
AndreyP
register_globals was first possible cause of all hack attacks
so
this old thing as
http://www.astalavista.com/index.php?section=exploits&cmd=details&id=6128
possible only if register_globals is On
this will impossible in Off value
So as result - hack-methods can be very much, so need to check all this, and if anybody have big experience with hacking - welcome :)
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.
PET:0.044496059417725