Enhancement
Additional logging of malicious requests
Issue description
In order to have a better overview over hacking attempts, conspicuous requests (in particular) POSTs should be logged seperately.
|
Work sessions5
Start |
2018-06-14T07:42:35
|
End |
2018-06-14T12:30:00
|
Participant |
Robert Cerny
|
Start |
2018-06-14T14:02:57
|
End |
2018-06-14T15:03:20
|
Participant |
Robert Cerny
|
Start |
2018-06-23T07:46:58
|
End |
2018-06-23T09:01:15
|
Participant |
Robert Cerny
|
Start |
2018-06-24T11:35:13
|
End |
2018-06-24T12:00:00
|
Participant |
Robert Cerny
|
Start |
2018-06-24T16:25:35
|
End |
2018-06-24T16:53:51
|
Participant |
Robert Cerny
|
|
We are sorry
This page cannot be displayed in your browser. Use Firefox, Opera, Safari, or Chrome instead.