"But, unless you have got log entries or clear evidence that the system was broken in via the application, all you have got is an insecure system and no ideas." . . . .