| 11:14 pm on Jan 10, 2012 (gmt 0)|
|Academia should strive to uphold standards, not erode them. |
Agreed, however being an academic gives insight that student projects often ignore the very curriculum built from those standards.
| 11:53 pm on Jan 10, 2012 (gmt 0)|
I have 192.35.222/24 blocked since last Jan.
| 8:40 pm on Jan 14, 2012 (gmt 0)|
|I have 192.35.222/24 blocked since last Jan. |
A few other characteristics about their connections that stand out:
$_SERVER['HTTP_USER_AGENT']='Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)';
| 11:12 pm on Jan 14, 2012 (gmt 0)|
The MSIE 6 alone would get them rewritten to a custom page. "Boy, what a boring site. Every single page just says 'I think I don't like your face'."
| 3:17 am on Jan 22, 2012 (gmt 0)|
FWIW: Infected machine at the so-called Security Group, too. URI=REF and tried POST to botbait:
ucsb seclab crawler
"GET /botbait/ HTTP/1.1" 200
"POST /botbait/ HTTP/1.1" 405 "http://www.example.com/botbait/"
| 8:58 pm on Jan 22, 2012 (gmt 0)|
I blocked that /24 almost exactly a year ago! :)
I see a lot of spam and "hacks" from domains claiming to be "security", most of them from compromised servers. :(
| 9:02 pm on Jan 22, 2012 (gmt 0)|
urllib in the UA is more than enough to see all accesses bounced to oblivion here...