On Wed, Oct 21, 2009 at 8:16 PM, Alice Bevan-McGregor <[email protected]>wrote:
> > Howdy! > > > I was looking through my access logs the other day, and noticed > > several attempts to hit my server looking for explointable urls: > > /w00tw00t.at.ISC.SANS.DFind:) > > //includes/general.js > > //zencart/includes/general.js > > //admin/includes/general.js > > //zen/includes/general.js > > //cart/includes/general.js > > //ZenCart/includes/general.js > > //roundcube/ > > //webmail/ > > ...and so on. > > I've set up exception logging to go to my e-mail, so each morning I > wake up with ~40 or so "X callable doesn't accept Y as an argument" > type errors. I've been using Linux's built-in iptables firewall > capability to block them: > > http://www.netadmintools.com/art216.html > > One good trick that already saved the day on my work is to block on the webserver requests using HTTP 1.0 and also requests with bogus user agents. My two cents. -- Leon Waldman SysAdmin Linux - Arquiteto de Infra-Estrutura & TI. > — Alice. > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "web.py" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/webpy?hl=en -~----------~----~----~----~------~----~------~--~---
