My web server has started to get probed pretty heavily with traversal attacks it looks like. I've been trying to read up on this and make sure it's working like it should, but I wanted to confirm that A) I'm handling it right and B) I'm not letting someone through. Here is an example from the access_log: 198.154.231.202 - - [10/Nov/2014:09:01:35 +0000] "GET /content/plugins/wallpapersby trekkie - Other discussion
![]() |
![]() |
![]() |
![]() |
|