473,396 Members | 1,865 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

webhost question, can this happen?

Ana
I've got a really puzzling problem I hope you can shed some light on. One
of my clients that I do webwork for has recently noticed a rogue porn link
on one of their deep pages. There's only one link, and it's buried several
folders down, not on a main page or anything.

How could this have gotten there? I thought hackers mostly hacked a site
and made it obvious. Could it be that someone hacked in? Could it have
been a virus that planted a link to increase traffic to their porn
site? The site is relatively popular and has a high hit count.

I didn't put the link there, and the other two people with access to the
site are like me, very vigilant about checking their computers for viruses
and not downloading anything. The host claims they check for viruses too
and it couldn't be them.

Any idea how a link can get planted on a website? I mean, a person had to
put it there, right? Or is there any other way??

Thanks in advance,
Ana
Jul 20 '05 #1
5 1775
MH
> ... recently noticed a rogue porn link on one of their deep pages.
...
How could this have gotten there?


One easy way I know is to put a link in a guestbook type of page but that is
probably not your case..

Otherwise; to put a link in a page you would have to have access to the
source code, edit it to put the link in, and save it again on the server. So
that leaves either you or other people who have access with a user name and
password, either direct or through FTP --- or hackers.

--------
MH
Jul 20 '05 #2
What OS is this on? :-)

On Tue, 23 Dec 2003 16:38:26 +0000, Ana wrote:
Any idea how a link can get planted on a website? I mean, a person had to
put it there, right? Or is there any other way??


--

..

Jul 20 '05 #3
On Tue, 23 Dec 2003 16:38:26 +0000 (UTC), Ana <no*******@um.edu>
wrote:
I've got a really puzzling problem I hope you can shed some light on. One
of my clients that I do webwork for has recently noticed a rogue porn link
on one of their deep pages. There's only one link, and it's buried several
folders down, not on a main page or anything.

Is it a new link, or an existing link which now points at a porn site?
I ask because an organisation I am involved with got into a dispute
with the registrar of their original domain name (who was essentially
holding it to ransom), so I just registered a new domain name for
them. The original name later lapsed and was picked up by someone else
who had it redirecting to a porn site (perhaps intending to blackmail
the charity in question).
Any idea how a link can get planted on a website? I mean, a person had to
put it there, right? Or is there any other way??
Is it in a part where anonymous visitors can post comments?

Thanks in advance,
Ana

--
Pete Gray
while ($cat!="home"){$mice=="play";}
Jul 20 '05 #4
Ana
Pete Gray <ne**@redbadge.fsnet.co.uk> wrote:
: Is it a new link, or an existing link which now points at a porn site?

: Is it in a part where anonymous visitors can post comments?

It's a new link, buried on a page of other links. No where on the site is
a place for people to post comments.

Ugh, I guess this means someone got in.

Ok, now what do I do? I'm assuming changing the password isn't good enough
once they're in... or is it? Should I switch hosts?

Ana
Jul 20 '05 #5
Pete Gray <ne**@redbadge.fsnet.co.uk> wrote:
Is it a new link, or an existing link which now points at a porn site?

Is it in a part where anonymous visitors can post comments?

Ana <no******@um.edu> wrote: It's a new link, buried on a page of other links. No where on the site is
a place for people to post comments.

Ugh, I guess this means someone got in.
Maybe. Maybe not.

When was the link added? If you haven't kept your own archives, then
http://www.archive.org/ may help. But you really should have your own
archives.

Where was the link added? Was it added on your development system (from
which it migrated to your production system)? Was it added directly on your
production system (bypassing your development system)?

How was the link added? Who added it?
Ok, now what do I do? I'm assuming changing the password isn't good enough
once they're in... or is it? Should I switch hosts?


It doesn't make any sense to change your hosting service if the security
breach occurred elsewhere. You need more information.
--
Darin McGrew, mc****@stanfordalumni.org, http://www.rahul.net/mcgrew/
Web Design Group, da***@htmlhelp.com, http://www.HTMLHelp.com/

"FAILURE IS NOT AN OPTION. It comes bundled with the software."
Jul 20 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Nick | last post by:
hi, all I just started to create my own website and I registered a new domain from yahoo, and then I want to register a webhost plan. And how to use this domain I registered? What I undertood...
0
by: hugo_herrera | last post by:
Hi there, Anyone know of a webhost that provides an API that allows the website code to automate the domain/subdomain/alias/email account creation? The website we are looking to run generates...
112
by: Prisoner at War | last post by:
Friends, your opinions and advice, please: I have a very simple JavaScript image-swap which works on my end but when uploaded to my host at http://buildit.sitesell.com/sunnyside.html does not...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.