further to my thread dlengines......what????
i contacted my host (fasthosts) and they have sent me the following instructions. which is fair enough but i really dont know how to do any of this. any help?? PLEASE
Further to your support call, hacked sites are commonly down to old > content management software being vulnerable. The weaknesses were not > server wide but rather just made it easier on a hacker to compromise > individual end user accounts.>> I suggest the following clean up procedure for both your accounts:>>
1. check all index pages for any signs of java script injected into their > coding. On windows servers check any "default.aspx" or> "default.cfm" pages as those are popular targets too.>>
2. Remove any "rouge" files or php scripts uploaded by the hackers into > your account. Such scripts allowed them to make account wide> changes, spam through your account, or spread their own .htaccess files > through all of your domains in that end user.>>
3. Check all .htaccess files, as hackers like to load re-directs into > them.>>
4. Change all passwords for that end user account. The cp password, the > ftp password, and any ftp sub accounts. Make sure to use a> "strong" password which includes upper case, lower case, numbers and NO > COMPLETE WORDS OR NAMES!>>
As what I have told you earlier, it is because of a .htaccess uploaded > into your site why it is being redirected to that url. Please remove that > via FTP
i contacted my host (fasthosts) and they have sent me the following instructions. which is fair enough but i really dont know how to do any of this. any help?? PLEASE
Further to your support call, hacked sites are commonly down to old > content management software being vulnerable. The weaknesses were not > server wide but rather just made it easier on a hacker to compromise > individual end user accounts.>> I suggest the following clean up procedure for both your accounts:>>
1. check all index pages for any signs of java script injected into their > coding. On windows servers check any "default.aspx" or> "default.cfm" pages as those are popular targets too.>>
2. Remove any "rouge" files or php scripts uploaded by the hackers into > your account. Such scripts allowed them to make account wide> changes, spam through your account, or spread their own .htaccess files > through all of your domains in that end user.>>
3. Check all .htaccess files, as hackers like to load re-directs into > them.>>
4. Change all passwords for that end user account. The cp password, the > ftp password, and any ftp sub accounts. Make sure to use a> "strong" password which includes upper case, lower case, numbers and NO > COMPLETE WORDS OR NAMES!>>
As what I have told you earlier, it is because of a .htaccess uploaded > into your site why it is being redirected to that url. Please remove that > via FTP
Comment