AW: AW: ANN: GLX2 3.05
J. Landman Gay
jacque at hyperactivesw.com
Thu Jun 14 22:29:15 CDT 2012
On 6/14/12 8:58 PM, stephen barncard wrote:
> these guys would pack a string of URLEncoded PHP code with no white space
> into a global, then decode and call it. It was usually placed at the bottom
> of one's document.
It's still not clear to me how they did this.
The security snafu was a year ago and the hacker didn't get any
passwords, only a few user names. Unless anyone's password is "12345" I
kind of doubt this recent incident is related, and it was a long time
Is there a likely explanation how they got in this time? Something we
should watch out for?
Jacqueline Landman Gay | jacque at hyperactivesw.com
HyperActive Software | http://www.hyperactivesw.com
More information about the use-livecode