As Mark already said, your current system is fundamentally flawed because you're essentially allowing users to input what file they want to see (anyone can change the URL to id=/whatever/file/i/want). This is bad! What if a user puts in id=/passwordfile? There goes your entire server's password file to the hacker.
What you need to do is change it so the SYSTEM decides which file should be included and only allows the include of valid files. Here is one suggestion (there are many different options for accomplishing this):
$valid = ("test1/index.htm", "test2/index.htm", "test3/index.htm", "valid/file/path.htm");
if (!in_array($id)) { $id = "News/update.htm"; }
include($id);
Every time you add a page, simply add the id argument to the $valid array. That way, anyone trying to abuse your server is stuck, they can only make requests that you have specifically allowed them to.