|
I added the following to one of our clients verotel script:
$remote_address = $ENV{'REMOTE_ADDR'};
$remote_address =~m!^195.20.32! || die "access denied to $remote_address to run this script.";
near the top, that stops anyone but verotels class C range from running the script.
people were saying it's more likely verotel themselves were hacked because only verotel passwords were leaking, not ccbill etc.
|