How Hackers Are Using Google To Pwn Your Site
Jeremy Schoemaker tracked down a hacker by making good use of logs: So now here is where it gets interesting…. Now that I had figured out how the person was hacking into my box I was curious how in the hell the person found the file. It was in a subdirectory that I had not […]