The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
||||
|
||||
![]() Quote:
|
#12
|
|||
|
|||
![]() Quote:
His name was Brandon and claimed to be 14, that much I remember, but something to that effect, but not those two. As for server access I am the only one with that. All the changes I've implemented have come from here. I trust the content from this site above all. I've had no run ins since that, so I assume it was someone doing it for fun as opposed to some one targeting me for specific reasons. |
#13
|
||||
|
||||
![]() Quote:
The only barrier to posting a hack here is being on a Priority Support list at vB.com. As every owner can add 3 addresses there, that leaves the window wide open for anyone to (intentionally or not) post a hack that compromises your Forum's security. |
#14
|
||||
|
||||
![]()
This happens to me about once a month as my site is a highly targeted domain for these activities. The method that they commonly use is "PHP Injections", and they "inject" a file onto your server through php functions, typically administered through the URL, and name it "index.php". They don't need FTP access to do this if they know what they are doing.
A way around this is to get your server setup to use another filename such as mainindex134.php as a root file, instead of index.php, default.php etc... Hope this helps. Do some research on "PHP Injection Hacking". |
#15
|
|||
|
|||
![]()
I had this and resolved it. They got into my site via the flashchat script on my forum. My host told me to upgrade to the latest version but I have just removed it and it works fine now.
Hope that helps. |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|