these people are using some nasty hack... im going by the instructions on this page now:
http://se2.php.net/manual/sv/function.include.php
<?php
/ verify the validity of GET var page
if not set, do a default case /
if(isset($HTTP_GET_VARS['page']))
{
$p = $HTTP_GET_VARS['page'];
}
else
{
$p = 'index';
}
switch($p)
{
case 'index':
require('welcome.php');
break;
case 'news':
require('news.php');
break;
case 'what you want':
require('the file you want');
break;
default:
exit('Wrong parameter for file inclusion');
}
?>
but when i run the url they use to access my website using phpshell script they still get in!!!!!!!!