<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Security and Legal</title>
    <description>Keep your forum safe and secure from hackers. Learn about Legal Issues, and how to stay away from them.</description>
    <pubDate>Thu, 23 Apr 2026 02:19:05 +0000</pubDate>
    <lastBuildDate>Thu, 23 Apr 2026 02:19:05 +0000</lastBuildDate>
    <generator>Admin Talk Forums</generator>
    <link>https://www.admin-talk.com/forums/security-and-legal.34/</link>
    <atom:link rel="self" type="application/rss+xml" href="https://www.admin-talk.com/forums/security-and-legal.34/index.rss"/>
    <item>
      <title>PMs - Private or Not?</title>
      <pubDate>Wed, 28 Aug 2019 17:45:36 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/pms-private-or-not.51550/</link>
      <guid>https://www.admin-talk.com/threads/pms-private-or-not.51550/</guid>
      <author>invalid@example.com (Zook)</author>
      <dc:creator>Zook</dc:creator>
      <content:encoded><![CDATA[This may or may not have been discussed in the past, but Id like to have some discussion regarding the reading of PMs as it relates to security purposes. I know any forum owner can easily access this data via the database or by utilizing any one of several hacks that are available from a variety of sources. From what information I have been able to gather, much like an employer/employee relationship, data delivered though a forum&#039;s server becomes the property of  the forum owner and can...<br />
<br />
<a href="https://www.admin-talk.com/threads/pms-private-or-not.51550/" class="internalLink">PMs - Private or Not?</a>]]></content:encoded>
      <slash:comments>15</slash:comments>
    </item>
    <item>
      <title>Let's talk about passwords!</title>
      <pubDate>Sun, 22 Jan 2017 10:16:36 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/lets-talk-about-passwords.7164/</link>
      <guid>https://www.admin-talk.com/threads/lets-talk-about-passwords.7164/</guid>
      <author>invalid@example.com (Dan Hutter)</author>
      <dc:creator>Dan Hutter</dc:creator>
      <content:encoded><![CDATA[With the recent hacking and subsequent password leaks of major site likes <a href="http://admin-talk.com/threads/6954/" target="_blank" class="externalLink" rel="nofollow">Linked In</a> and <a href="http://admin-talk.com/threads/7143/" target="_blank" class="externalLink" rel="nofollow">Yahoo</a> secure passwords should be at the forefront of every webmaster&#039;s mind. From your cPanel and FTP account, to your database password, to your admin account everything needs it&#039;s own unique &amp; secure password. A secure password is at least 12 characters and contains random UPPERCASE and lower case letters,...<br />
<br />
<a href="https://www.admin-talk.com/threads/lets-talk-about-passwords.7164/" class="internalLink">Let&#039;s talk about passwords!</a>]]></content:encoded>
      <slash:comments>47</slash:comments>
    </item>
    <item>
      <title>One of Australia's Largest Forums Being Sued</title>
      <pubDate>Tue, 02 Jun 2015 13:32:13 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/one-of-australias-largest-forums-being-sued.51232/</link>
      <guid>https://www.admin-talk.com/threads/one-of-australias-largest-forums-being-sued.51232/</guid>
      <author>invalid@example.com (BamaStangGuy)</author>
      <dc:creator>BamaStangGuy</dc:creator>
      <content:encoded><![CDATA[Interesting news going on in Australia - one of the forums I am a member on is being sued<br />
<br />
<ul>
<li><a href="http://www.smh.com.au/business/financial-services-group-wcs-sues-online-forum-whirlpool-over-negative-post-20140815-1045zz.html" target="_blank" class="externalLink" rel="nofollow">http://www.smh.com.au/business/fina...lpool-over-negative-post-20140815-1045zz.html</a></li>
<li><a href="http://www.afr.com/p/technology/financial_services_group_post_sues_8qTstj0lwAc9YdHaJ9RUhO" target="_blank" class="externalLink" rel="nofollow">http://www.afr.com/p/technology/financial_services_group_post_sues_8qTstj0lwAc9YdHaJ9RUhO</a></li>
</ul><br />



<div class="bbCodeBlock bbCodeQuote">
	<aside>
		
		<blockquote class="quoteContainer"><div class="quote">A financial services business licenced through National Australia Bank is suing an online forum for refusing to remove an allegedly...</div><div class="quoteExpand">Click to expand...</div></blockquote>
	</aside>
</div><a href="https://www.admin-talk.com/threads/one-of-australias-largest-forums-being-sued.51232/" class="internalLink">One of Australia&#039;s Largest Forums Being Sued</a>]]></content:encoded>
      <slash:comments>11</slash:comments>
    </item>
    <item>
      <title>Trojans and Keyloggers</title>
      <pubDate>Thu, 22 Jan 2015 00:22:54 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/trojans-and-keyloggers.44063/</link>
      <guid>https://www.admin-talk.com/threads/trojans-and-keyloggers.44063/</guid>
      <author>invalid@example.com (Big al)</author>
      <dc:creator>Big al</dc:creator>
      <content:encoded><![CDATA[<a href="http://www.computerworld.com/s/article/9243537/Cryptolocker_How_to_avoid_getting_infected_and_what_to_do_if_you_are_" target="_blank" class="externalLink" rel="nofollow">http://www.computerworld.com/s/arti...d_getting_infected_and_what_to_do_if_you_are_</a><br />
<br />
There is a new nasty ransomware  going around called &quot;Cryptolocker&quot;  <br />
<br />



<div class="bbCodeBlock bbCodeQuote">
	<aside>
		
		<blockquote class="quoteContainer"><div class="quote">There&#039;s a big threat wiling around on the Internet right now: A particularly nasty piece of ransomware called Cryptolocker. Many, many organizations are being infected with this malware, but fortunately, there are surefire ways to avoid it and also ways to mitigate the damage without...</div><div class="quoteExpand">Click to expand...</div></blockquote>
	</aside>
</div><a href="https://www.admin-talk.com/threads/trojans-and-keyloggers.44063/" class="internalLink">Trojans and Keyloggers</a>]]></content:encoded>
      <slash:comments>11</slash:comments>
    </item>
    <item>
      <title>Some IIS Rewrite and htaccess Additions to Block Bad Bots</title>
      <pubDate>Sun, 16 Nov 2014 03:24:47 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/some-iis-rewrite-and-htaccess-additions-to-block-bad-bots.44283/</link>
      <guid>https://www.admin-talk.com/threads/some-iis-rewrite-and-htaccess-additions-to-block-bad-bots.44283/</guid>
      <author>invalid@example.com (AWS)</author>
      <dc:creator>AWS</dc:creator>
      <content:encoded><![CDATA[I found this somewhere online a few years ago and through the years I&#039;ve updated it to catch new spam bots as I see them. It catches about 90% of the baddies. <br />
<br />
Just add the following to your .htaccess file.<br />


<div class="bbCodeBlock bbCodeCode">
	<div class="type">Code:</div>
	<pre>
# IF THE USER AGENT STARTS WITH THESE
RewriteCond %{HTTP_USER_AGENT} ^(aesop_com_spiderman|alexibot|backweb|bandit|batchftp|bigfoot) [NC,OR]
RewriteCond %{HTTP_USER_AGENT} ^(black.?hole|blackwidow|blowfish|botalot|buddy|builtbottough|bullseye) [NC,OR]
RewriteCond...</pre>
</div><a href="https://www.admin-talk.com/threads/some-iis-rewrite-and-htaccess-additions-to-block-bad-bots.44283/" class="internalLink">Some IIS Rewrite and htaccess Additions to Block Bad Bots</a>]]></content:encoded>
      <slash:comments>4</slash:comments>
    </item>
    <item>
      <title>Disable any "send to a friend" type pages</title>
      <pubDate>Thu, 06 Nov 2014 16:55:23 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/disable-any-send-to-a-friend-type-pages.51336/</link>
      <guid>https://www.admin-talk.com/threads/disable-any-send-to-a-friend-type-pages.51336/</guid>
      <author>invalid@example.com (Lee G)</author>
      <dc:creator>Lee G</dc:creator>
      <content:encoded><![CDATA[Long story short, Im presently trying to get my main domain I use for my email out the gmail black list after an email marketer found a hole in my forum<br />
<br />
In my case it was in a photo gallery add on I use which had a page to let people share the image links<br />
But, you can change all the text in the box&#039;s to what ever you want<br />
<br />
I had been hit nine times, when I finally found out what and how they were doing it. Each time they had done lists of about 1000 email addresses at a guess. I would say...<br />
<br />
<a href="https://www.admin-talk.com/threads/disable-any-send-to-a-friend-type-pages.51336/" class="internalLink">Disable any &quot;send to a friend&quot; type pages</a>]]></content:encoded>
    </item>
    <item>
      <title>What ive come up with</title>
      <pubDate>Mon, 14 Jul 2014 05:33:02 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/what-ive-come-up-with.51118/</link>
      <guid>https://www.admin-talk.com/threads/what-ive-come-up-with.51118/</guid>
      <author>invalid@example.com (DriveHosting)</author>
      <dc:creator>DriveHosting</dc:creator>
      <content:encoded><![CDATA[So over the past few weeks before getting maxmind ive came across a load of lost cash due to paypal charge-backs and credit card frauding from buyers. Ive become smart lemme know what you think of this, basically what im doing now is after my maxmind verification im taking the initiative to personally verify every client who goes through my site with the following. <br />
<br />


	<a href="https://www.admin-talk.com/attachments/27670/" target="_blank">View attachment 27670</a>
	
 

	<a href="https://www.admin-talk.com/attachments/27671/" target="_blank">View attachment 27671</a>]]></content:encoded>
      <slash:comments>13</slash:comments>
    </item>
    <item>
      <title>Forums attacked by spamers???</title>
      <pubDate>Thu, 12 Jun 2014 18:57:17 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/forums-attacked-by-spamers.50928/</link>
      <guid>https://www.admin-talk.com/threads/forums-attacked-by-spamers.50928/</guid>
      <author>invalid@example.com (Sylvain)</author>
      <dc:creator>Sylvain</dc:creator>
      <content:encoded><![CDATA[My Xenforo forum has been attacked by massive spamming today.<br />
<br />
All the threads were started by MartyAge, FredHolnes or DamienGangl<br />
<br />
I googled few of the thread titles and many forums have been attacked...<br />
<br />
<br />
Anyone heard about this?]]></content:encoded>
      <slash:comments>10</slash:comments>
    </item>
    <item>
      <title>Is there a stronger copyleft license than the GPL?</title>
      <pubDate>Mon, 26 May 2014 15:37:12 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/is-there-a-stronger-copyleft-license-than-the-gpl.51076/</link>
      <guid>https://www.admin-talk.com/threads/is-there-a-stronger-copyleft-license-than-the-gpl.51076/</guid>
      <author>invalid@example.com (CM30)</author>
      <dc:creator>CM30</dc:creator>
      <content:encoded><![CDATA[One which basically says the following:<br />
<br />
1. This work is free (to use and distribute), will always be free and can never be used as part of a proprietary system.<br />
<br />
2. Everything extended from it is free (like the GPL)<br />
<br />
3. It cannot be used with commercial software<br />
<br />
4. This software cannot be linked to or interface with commercial or proprietary software.<br />
<br />
So basically, if you made a script like WordPress or phpBB, any software made to extend it (or made to run alongside it) would have to be...<br />
<br />
<a href="https://www.admin-talk.com/threads/is-there-a-stronger-copyleft-license-than-the-gpl.51076/" class="internalLink">Is there a stronger copyleft license than the GPL?</a>]]></content:encoded>
      <slash:comments>4</slash:comments>
    </item>
    <item>
      <title>New Breed of Spammers</title>
      <pubDate>Tue, 06 May 2014 21:32:36 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/new-breed-of-spammers.50940/</link>
      <guid>https://www.admin-talk.com/threads/new-breed-of-spammers.50940/</guid>
      <author>invalid@example.com (AWS)</author>
      <dc:creator>AWS</dc:creator>
      <content:encoded><![CDATA[I&#039;ve noticed that spammers are adapting to the measures we take to stop them. One thing they do is use a clean IP, one that isn&#039;t in any spam database, and use it to register. Once they get past the registration they change IP to confirm registration and more times thnn not that IP will be listed hundreds of time in SFS or other spam databases.<br />
<br />
While this makes it easier for them and harder for us not many of these spammers actually post so if we don&#039;t check each registration we would never...<br />
<br />
<a href="https://www.admin-talk.com/threads/new-breed-of-spammers.50940/" class="internalLink">New Breed of Spammers</a>]]></content:encoded>
      <slash:comments>13</slash:comments>
    </item>
    <item>
      <title>Please don't do this with your forum captcha...</title>
      <pubDate>Fri, 18 Apr 2014 02:27:23 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/please-dont-do-this-with-your-forum-captcha.50969/</link>
      <guid>https://www.admin-talk.com/threads/please-dont-do-this-with-your-forum-captcha.50969/</guid>
      <author>invalid@example.com (CM30)</author>
      <dc:creator>CM30</dc:creator>
      <content:encoded><![CDATA[<a href="https://www.admin-talk.com/attachments/27591/" target="_blank">View attachment 27591</a>
	
<br />
<br />
Yeah.  Try not to edit the background of the input field, because otherwise it&#039;s very, very difficult to read.  It&#039;s a good site (that unfortunately does this), but due to their design, the captcha text has pretty much no contrast and is almost impossible to read (especially from a distance or with poor eyesight).<br />
<br />
Is this colour change something to avoid in captchas?]]></content:encoded>
      <slash:comments>4</slash:comments>
    </item>
    <item>
      <title>New SSL Heartbleed Bug A Serious Threat To Server Security!</title>
      <pubDate>Fri, 11 Apr 2014 07:15:45 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/new-ssl-heartbleed-bug-a-serious-threat-to-server-security.51011/</link>
      <guid>https://www.admin-talk.com/threads/new-ssl-heartbleed-bug-a-serious-threat-to-server-security.51011/</guid>
      <author>invalid@example.com (s.molinari)</author>
      <dc:creator>s.molinari</dc:creator>
      <content:encoded><![CDATA[Hi,<br />
<br />
Have a look at this.<br />
<br />
<a href="http://heartbleed.com/" target="_blank" class="externalLink" rel="nofollow">http://heartbleed.com/</a><br />
<br />
Looks like everyone needs to patch or update their OpenSSL software, if you are on versions 1.0.1 to 1.0.1f and then make sure to hard restart your server(s).<br />
<br />
Debian: <a href="http://www.debian.org/security/2014/dsa-2896" target="_blank" class="externalLink" rel="nofollow">Sec Advisory</a><br />
Ubuntu: <a href="http://www.ubuntu.com/usn/usn-2165-1/" target="_blank" class="externalLink" rel="nofollow">Sec Advisory</a><br />
CentOS: <a href="http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html" target="_blank" class="externalLink" rel="nofollow">Sec Advisory</a><br />
Red Hat:...<br />
<br />
<a href="https://www.admin-talk.com/threads/new-ssl-heartbleed-bug-a-serious-threat-to-server-security.51011/" class="internalLink">New SSL Heartbleed Bug A Serious Threat To Server Security!</a>]]></content:encoded>
      <slash:comments>5</slash:comments>
    </item>
    <item>
      <title>650 visitor Bots</title>
      <pubDate>Sat, 01 Mar 2014 20:51:05 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/650-visitor-bots.50920/</link>
      <guid>https://www.admin-talk.com/threads/650-visitor-bots.50920/</guid>
      <author>invalid@example.com (Rasty)</author>
      <dc:creator>Rasty</dc:creator>
      <content:encoded><![CDATA[Is 650 visitor bots preventable? What can or should be done as it&#039;s slowing the site down.]]></content:encoded>
      <slash:comments>6</slash:comments>
    </item>
    <item>
      <title>Massive DDOS Attack Today</title>
      <pubDate>Wed, 26 Feb 2014 01:02:36 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/massive-ddos-attack-today.50902/</link>
      <guid>https://www.admin-talk.com/threads/massive-ddos-attack-today.50902/</guid>
      <author>invalid@example.com (BamaStangGuy)</author>
      <dc:creator>BamaStangGuy</dc:creator>
      <content:encoded><![CDATA[Namecheap experienced a massive DDOS attack today against their DNS system which brought down my sites and many many thousands others. More info here: <a href="https://news.ycombinator.com/item?id=7271834" target="_blank" class="externalLink" rel="nofollow">https://news.ycombinator.com/item?id=7271834</a><br />
<br />
Attack visual during:<br />
<br />


	<a href="https://www.admin-talk.com/attachments/27517/" target="_blank">View attachment 27517</a>
	
<br />
<br />
<a href="https://www.admin-talk.com/threads/massive-ddos-attack-today.50902/" class="internalLink">Massive DDOS Attack Today</a>]]></content:encoded>
      <slash:comments>12</slash:comments>
    </item>
    <item>
      <title>List of Temporary Emails You Should Ban</title>
      <pubDate>Thu, 20 Feb 2014 18:35:29 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/list-of-temporary-emails-you-should-ban.42370/</link>
      <guid>https://www.admin-talk.com/threads/list-of-temporary-emails-you-should-ban.42370/</guid>
      <author>invalid@example.com (fattony69)</author>
      <dc:creator>fattony69</dc:creator>
      <content:encoded><![CDATA[I recently had a small issue where I had to deal with a human troll. Now, he decided to take the route of temporary emails to harass my forum. I thought I&#039;d help everyone out to list them all (that I&#039;ve found with the help of others) so you can ban them all on your forum.<br />
 <br />


<div class="bbCodeBlock bbCodeCode">
	<div class="type">Code:</div>
	<pre>*@7tags.com
*@*.mailexpire.com
*@0clickemail.com
*@99experts.com
*@ak.mintemail.com
*@anonymbox.com
*@beefmilk.com
*@bloatbox.com
*@bofthew.com
*@broadbandninja.com
*@bspamfree.org
*@cellurl.com
*@consumerriot.com...</pre>
</div><a href="https://www.admin-talk.com/threads/list-of-temporary-emails-you-should-ban.42370/" class="internalLink">List of Temporary Emails You Should Ban</a>]]></content:encoded>
      <slash:comments>13</slash:comments>
    </item>
    <item>
      <title>Model Claims Internet Brands Hushed Up Rapes</title>
      <pubDate>Mon, 10 Feb 2014 10:50:43 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/model-claims-internet-brands-hushed-up-rapes.50788/</link>
      <guid>https://www.admin-talk.com/threads/model-claims-internet-brands-hushed-up-rapes.50788/</guid>
      <author>invalid@example.com (Alfa1)</author>
      <dc:creator>Alfa1</dc:creator>
      <content:encoded><![CDATA[Does anyone know what became of this courtcase?<br />
<br />
Monday, April 30, 2012<br />


	<a href="https://www.admin-talk.com/attachments/27428/" target="_blank">View attachment 27428</a>
	
<br />
LOS ANGELES (CN) - A model claims in Federal Court that she was drugged and raped by two men who filmed the crime and sold it as pornography, and that defendant Internet Brands Inc. dba ModelMayhem.com did nothing to stop it.<br />
Jane Doe No. 14 claims that Internet Brands Inc. owns and operates more than 100 websites, including ModelMayhem.com, where she had an account to market herself as a...<br />
<br />
<a href="https://www.admin-talk.com/threads/model-claims-internet-brands-hushed-up-rapes.50788/" class="internalLink">Model Claims Internet Brands Hushed Up Rapes</a>]]></content:encoded>
      <slash:comments>8</slash:comments>
    </item>
    <item>
      <title>Man jailed over blog... In America</title>
      <pubDate>Thu, 16 Jan 2014 00:41:19 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/man-jailed-over-blog-in-america.50760/</link>
      <guid>https://www.admin-talk.com/threads/man-jailed-over-blog-in-america.50760/</guid>
      <author>invalid@example.com (Alfa1)</author>
      <dc:creator>Alfa1</dc:creator>
      <content:encoded><![CDATA[<span style="font-size: 22px"><b>Blogger’s Incarceration Raises First Amendment Questions</b></span><br />
<br />
<a href="http://mobile.nytimes.com/2014/01/12/us/bloggers-incarceration-raises-first-amendment-questions.html?referrer=" target="_blank" class="externalLink" rel="nofollow">http://mobile.nytimes.com/2014/01/1...ises-first-amendment-questions.html?referrer=</a><br />
<br />
<a href="https://www.admin-talk.com/threads/man-jailed-over-blog-in-america.50760/" class="internalLink">Man jailed over blog... In America</a>]]></content:encoded>
      <slash:comments>20</slash:comments>
    </item>
    <item>
      <title>Which Anti-Spam Hacks do you use to protect your forum from spam?</title>
      <pubDate>Tue, 17 Dec 2013 22:59:32 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/which-anti-spam-hacks-do-you-use-to-protect-your-forum-from-spam.2123/</link>
      <guid>https://www.admin-talk.com/threads/which-anti-spam-hacks-do-you-use-to-protect-your-forum-from-spam.2123/</guid>
      <author>invalid@example.com (Kaiser)</author>
      <dc:creator>Kaiser</dc:creator>
      <content:encoded><![CDATA[Each forum software has mods and plugins for Anti-Spam measures, what do you use to prevent spam on your forum?<br />
<br />
For XenForo I use the &quot;XenUtilities&quot; add-on which integrates StopForumSpam.com, BotScout.com <i>(Key Needed)</i>, and FSpamlist.com <i>(Key Needed)</i>.<br />
<br />
It does a great job at preventing spam, and those 3 sites are some of the biggest. If you use XenForo, I recommend XenUtilities, its great and its an awesome way to fight spam.]]></content:encoded>
      <slash:comments>22</slash:comments>
    </item>
    <item>
      <title>Ban Quick Email Providers From Your Forum. (Prevent Spam)</title>
      <pubDate>Wed, 04 Dec 2013 16:16:12 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/ban-quick-email-providers-from-your-forum-prevent-spam.1051/</link>
      <guid>https://www.admin-talk.com/threads/ban-quick-email-providers-from-your-forum-prevent-spam.1051/</guid>
      <author>invalid@example.com (Kaiser)</author>
      <dc:creator>Kaiser</dc:creator>
      <content:encoded><![CDATA[Spammers love to use email providers that are 100% registration free, and don&#039;t require any personal information to use. It gives them a very quick and easy way to register on your forum, and if you have email activation turned on, they can quickly activate their accounts using the quick email providers.<br />
<br />
What they do is, they go to the website and choose a quick name they want to use for their email and enter it, and then they can get the emails from the forums on which they register on,...<br />
<br />
<a href="https://www.admin-talk.com/threads/ban-quick-email-providers-from-your-forum-prevent-spam.1051/" class="internalLink">Ban Quick Email Providers From Your Forum. (Prevent Spam)</a>]]></content:encoded>
      <slash:comments>24</slash:comments>
    </item>
    <item>
      <title>DDOS Attacks</title>
      <pubDate>Tue, 03 Dec 2013 02:09:07 +0000</pubDate>
      <link>https://www.admin-talk.com/threads/ddos-attacks.44116/</link>
      <guid>https://www.admin-talk.com/threads/ddos-attacks.44116/</guid>
      <author>invalid@example.com (JoshSmith100)</author>
      <dc:creator>JoshSmith100</dc:creator>
      <content:encoded><![CDATA[Have any of you guys ever been targeted by a DDOS attack?Alot of sites that ive been on, have got attacked recently and I was wondering what techniques you guys have used to avoid the affects of a DDOS attack. Please let me know, id appreciate it.]]></content:encoded>
      <slash:comments>12</slash:comments>
    </item>
  </channel>
</rss>
