Robbie
Finally we have tracked down how my server was being hacked into. The attacker was able to upload a file called zq.php to "/var/www/html/roundcubemail-0.1.1/logs/zq.php" and was executed at http://seekqa.co.nz/roundcube/logs/zq.php. I have disabled that file. This is a bad one
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.
PET:0.036820888519287