Enhancement
Additional logging of malicious requests
Issue description
In order to have a better overview over hacking attempts, conspicuous requests (in particular) POSTs should be logged seperately.
|
Work sessions5
| Start |
2018-06-14T07:42:35
|
| End |
2018-06-14T12:30:00
|
| Participant |
Robert Cerny
|
| Start |
2018-06-14T14:02:57
|
| End |
2018-06-14T15:03:20
|
| Participant |
Robert Cerny
|
| Start |
2018-06-23T07:46:58
|
| End |
2018-06-23T09:01:15
|
| Participant |
Robert Cerny
|
| Start |
2018-06-24T11:35:13
|
| End |
2018-06-24T12:00:00
|
| Participant |
Robert Cerny
|
| Start |
2018-06-24T16:25:35
|
| End |
2018-06-24T16:53:51
|
| Participant |
Robert Cerny
|
|
We are sorry
This page cannot be displayed in your browser. Use Firefox, Opera, Safari, or Chrome instead.