On Fri, Dec 21, 2012 at 04:56:39PM +0000, steve-ALUG@hst.me.uk wrote:
twice perhaps?
I suspect that they're attempts to hack the WordPress site at that URL, they don't seem to have succeeded, I can't see any corrupt pages. Anyway the site is a development one rather than a published one.
Silly question - does it need to be accessible to the outside world if it's a development website? If not, perhaps hide it behind a firewall until it's ready?
It's being developed by a couple of other people from 'outside', I could I suppose limit the accessibility but I'm not sure that it's worth the effort really.
I guess it *could* be a buffer overflow exploit, I'll have to check that out.
Yes, and check you webserver is up-to-date with all the software updates, inc Wordpress and Apache ones, and you research all the things you can do to "Harden" Wordpress and Apache.
Presumably you've got it all firewalled too and you've tried something like Shieldsup at grc.com to check that there are no unexpectedly open ports?
Yes, everything is pretty well tied down, and everything is very well backed up with care taken that a break-in won't be able to corrupt the backups as well.