From: eldy <>
Date: Tue, 17 Feb 2004 01:20:09 +0000 (+0000)
Subject: Fixed minor typo errors.
X-Git-Tag: AWSTATS_6_1_BETA~112
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a3cb339744dfbd6cba4a380c7b3663585f49ac46;p=thirdparty%2FAWStats.git
Fixed minor typo errors.
---
diff --git a/docs/awstats_faq.html b/docs/awstats_faq.html
index 9e28291a..463e7e83 100644
--- a/docs/awstats_faq.html
+++ b/docs/awstats_faq.html
@@ -1400,7 +1400,7 @@ unknown URL like this one:
URL is generated by the infected robot and the purpose is to exploit a vulnerability of the web server (In most cases, only IIS is vulnerable).
With such attacks, you will will always find a 'common string' in those URLs.
For example, with Code Red worm, there is always default.ida in the URL string. Some other worms send URLs with cmd.exe in it.
-With 6.0 version and higher, you can set the LevelForFormDetection
+With 6.0 version and higher, you can set the LevelForWormsDetection
parameter to "2" and ShowWormsStats to "HBL" in
config file to enable the worm filtering nd reporting.
However, this feature reduce seriously AWStats speed and the worms database (lib/worms.pm file) can't contain