дай ми индеха да го видя
<?
session_start();
header("Cache-control: private");
ob_start();
require("config.php");
include("includes/functions.php");
include ("ctracker.php");
include ("safesql.class.php");
include("class.floodblocker.php");
include ("anti-inject-base64.php");
include("flood/gate.php");
include("tweety.php");
magic();
htmlspecialchars($_REQUEST);
include("includes/functions.login.php");
include("includes/functions.user.php");
login();
logincheck();
admincheck();
logoutadmin();
check_user();
check_user_admin();
$queryString = strtolower($_SERVER['QUERY_STRING']);
if (strstr($queryString,"<") OR strstr($queryString,">") OR strstr($queryString,"(") OR strstr($queryString,")") OR
strstr($queryString,"..") OR
strstr($queryString,"%") OR
strstr($queryString,"*") OR
strstr($queryString,"+") OR
strstr($queryString,"!") OR
strstr($queryString,"@")) {
$loc = $_SERVER['PHP_SELF'];
$ip = $_SERVER['REMOTE_ADDR'];
$date = date ("d-m-Y @ h:i");
$lfh = "log.txt";
$lfh = "logove.php";
$log = fopen ( $lfh,"a+" );
fputs ($log, "Attack Date: $date | Attacker IP: $ip | QueryString: $loc?=$queryString\n");
fclose($log);
echo "You think you can hack me? Now You will eat the BANN!!";
}
language();
?>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1251">
<meta name="keywords" content="muonline, mu, muo, ovia, game, mmorpg, rpg, online, server, BgZoneMu, BgZoneMu , muserver 99b, muserver, MuOnline 97d, bgzonemu.com, bgzone, NakazaTeLq, Top mu">
<script type="text/javascript" src="includes/overlib.js"></script>
<script type="text/javascript" src="includes/helptip.js"></script>
<script language="JavaScript" type="text/javascript">
<!--
//Disable right click script III- By Renigade ([email protected])
//For full source code, visit http://www.dynamicdrive.com
var message="";
///////////////////////////////////
function clickIE() {if (document.all) {(message);return false;}}
function clickNS(e) {if
(document.layers||(document.getElementById&&!document.all)) {
if (e.which==2||e.which==3) {(message);return false;}}}
if (document.layers)
{document.captureEvents(Event.MOUSEDOWN);document.onmousedown=clickNS;}
else{document.onmouseup=clickNS;document.oncontextmenu=clickIE;}
document.oncontextmenu=new Function("return false")
// -->
</script>
<link rel="stylesheet" href="images/css.css" type="text/css" media="screen">
<link href="images/style.css" rel="stylesheet" type="text/css">
<title>BgZoneMu</title>
</head>
<body text="red" style="background-color: #000000;">
<table width="964" border="0" cellpadding="0" cellspacing="0" align="center">
<tr><td>
<img src="images/logo1.png" width="100%" height="200" alt="">
</td></tr>
</table>
и т.н.....Code:<? session_start(); header("Cache-control: private"); ob_start(); require("config.php"); include("includes/functions.php"); include ("ctracker.php"); include ("safesql.class.php"); include("class.floodblocker.php"); include ("anti-inject-base64.php"); include("flood/gate.php"); include("tweety.php"); magic(); htmlspecialchars($_REQUEST); include("includes/functions.login.php"); include("includes/functions.user.php"); login(); logincheck(); admincheck(); logoutadmin(); check_user(); check_user_admin(); $queryString = strtolower($_SERVER['QUERY_STRING']); if (strstr($queryString,"<") OR strstr($queryString,">") OR strstr($queryString,"(") OR strstr($queryString,")") OR strstr($queryString,"..") OR strstr($queryString,"%") OR strstr($queryString,"*") OR strstr($queryString,"+") OR strstr($queryString,"!") OR strstr($queryString,"@")) { $loc = $_SERVER['PHP_SELF']; $ip = $_SERVER['REMOTE_ADDR']; $date = date ("d-m-Y @ h:i"); $lfh = "log.txt"; $lfh = "logove.php"; $log = fopen ( $lfh,"a+" ); fputs ($log, "Attack Date: $date | Attacker IP: $ip | QueryString: $loc?=$queryString\n"); fclose($log); echo "You think you can hack me? Now You will eat the BANN!!"; } language(); ?> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=windows-1251"> <meta name="keywords" content="muonline, mu, muo, ovia, game, mmorpg, rpg, online, server, BgZoneMu, BgZoneMu , muserver 99b, muserver, MuOnline 97d, bgzonemu.com, bgzone, NakazaTeLq, Top mu"> <script type="text/javascript" src="includes/overlib.js"></script> <script type="text/javascript" src="includes/helptip.js"></script> <script language="JavaScript" type="text/javascript"> <!-- //Disable right click script III- By Renigade ([email protected]) //For full source code, visit http://www.dynamicdrive.com var message=""; /////////////////////////////////// function clickIE() {if (document.all) {(message);return false;}} function clickNS(e) {if (document.layers||(document.getElementById&&!document.all)) { if (e.which==2||e.which==3) {(message);return false;}}} if (document.layers) {document.captureEvents(Event.MOUSEDOWN);document.onmousedown=clickNS;} else{document.onmouseup=clickNS;document.oncontextmenu=clickIE;} document.oncontextmenu=new Function("return false") // --> </script> <link rel="stylesheet" href="images/css.css" type="text/css" media="screen"> <link href="images/style.css" rel="stylesheet" type="text/css"> <title>BgZoneMu</title> </head> <body text="red" style="background-color: #000000;"> <table width="964" border="0" cellpadding="0" cellspacing="0" align="center"> <tr><td> <img src="images/logo1.png" width="100%" height="200" alt=""> </td></tr> </table>
How to do this?4 Step :
How to Avoid some DDoS Attacks :
Add in xampp/apache/conf/httpd.conf
LimitRequestBody 10240000
This is 10 mb upload size per user and can be used to avoid some tips of DDoS attacks !
LimitRequestBody 102400
This is 100 kb ...
Happy avoiding DDoS Attacks ! Read and other instructions !!
Please help me
I use xampp 1.7.1In some versions of Apache not have it included .
Better use mod_dosevasive .
Can someone give me download link of mod_dosevasive.In some versions of Apache not have it included .
Better use mod_dosevasive .