Posted on Tuesday, 26th January 2010 by Michael

Using your web server logs to find compromised web servers Some people use Google and Google hacking Database to find their targets and others use their own servers to find potential compromised boxes. In this quick little update I am going to give you a basic idea on how to use your web server’s access […]

Posted in Papers | Comments (2)