Megalan-Robert
Verified User
- Joined
- Oct 15, 2005
- Messages
- 21
Hi,
Today I removed an eggdrop from the server, most likely due to a php misuse in Postnuke, the eggdrop was residing in the temp directory of the postnuke site and the user running the eggdrop was apache.
I ran /.build update and ./build all to update apache and all the modules to make sure I had the latest versions. I also made sure every site was running under php safemode now (I always presumed that was for malicious local users which there are none since I'm the only one).
Is there any way to secure my server even more? Should I be worried about another attack using apache, is there anything I can do to make sure these unwanted guests stay out? I already have APF firewall and BFD running.
Thanks in advance
Today I removed an eggdrop from the server, most likely due to a php misuse in Postnuke, the eggdrop was residing in the temp directory of the postnuke site and the user running the eggdrop was apache.
I ran /.build update and ./build all to update apache and all the modules to make sure I had the latest versions. I also made sure every site was running under php safemode now (I always presumed that was for malicious local users which there are none since I'm the only one).
Is there any way to secure my server even more? Should I be worried about another attack using apache, is there anything I can do to make sure these unwanted guests stay out? I already have APF firewall and BFD running.
Thanks in advance