Quote:
Originally Posted by xug
Is there somebody who can help me?
|
Couldn't they just use a malicious file after you've added it? I mean, like add a some hacking protocols, give it the same name as the one you added via the ACP, upload the file to their server and get to you that way? Just want to make sure you have everything covered and sometimes, being up this late makes you think of the craziest ++++... ><