Sponsor:

Server and Web Integrator
Link:
Kloxo-MR logo
6.5.0 or 7.0.0
Click for "How to install"
Donation/Sponsorship:
Kloxo-MR is open-source.
Donate and or Sponsorship always welcome.
Click to:
Click Here
Please login or register. 2024-05-09, 19:55:59

Author Topic: Is this an exploit?  (Read 2044 times)

0 Members and 1 Guest are viewing this topic.

Offline didge

  • Junior Member
  • *
  • Posts: 28
  • Karma: +0/-0
    • View Profile
Is this an exploit?
« on: 2014-10-22, 09:34:28 »
Executable:

/usr/bin/spamdyke


Command Line (often faked in exploits):

/usr/bin/spamdyke -f /etc/spamdyke.conf --tls-level=smtp-no-passthrough /var/qmail/bin/qmail-smtpd /home/vpopmail/bin/vchkpw /bin/true

Offline chrisf

  • Senior Master
  • **
  • Posts: 883
  • Karma: +11/-1
  • Gender: Male
  • Be the change that you wish to see in the world.
    • View Profile
    • Conviction's Hosting
Re: Is this an exploit?
« Reply #1 on: 2014-10-22, 12:57:11 »
No, add it to /etc/csf/csf.pignore, then restart csf/lfd
Christopher

Knowledge in: PHP, Perl, MySQL, Javascript, Actionscript, FLASH, HTML, CSS
Server Administrator / Developer: https://convictionshosting.com

 


MRatWork Affiliates:    BIGRAF(R) Inc.    House of LMAR    EFARgrafix
Click Here

Page created in 0.066 seconds with 21 queries.

web stats analysis