I’d like to add:
I don’t know if the hacker used the log file. Maybe they used another way to get these informations, of maybe it’s just bad luck.
But I think the debug log should not contain the IP address, for security reasons.
Matthieu
I’d like to add:
I don’t know if the hacker used the log file. Maybe they used another way to get these informations, of maybe it’s just bad luck.
But I think the debug log should not contain the IP address, for security reasons.
Matthieu