[eluser]TheFuzzy0ne[/eluser]
I wouldn't have thought it would be that bad, so long as you're files are prefixed with:
Code:
<?php if ( ! defined('BASEPATH')) exit('No direct script access allowed');
The PHP file will be executed, and won't make it past that top line. Another tactic to be used in conjunction with this is to put an empty index.html file in each directory to help prevent directory listings, and then your htaccess file can add more security.
With that said, it's easier to move the system directory out of your Web root (if you have access).
EDIT: Whoops, I totally missed GSV Sleeper Service's post. Sorry...