I contacted my server host about the problem and this is what their log shows.
Here is a log from our mod_security module which is use to disrupt hacking.
==0ab8d725==============================
Request:
www.gowgaming.com 65.73.74.214 - - [04/Jul/2006:20:15:47 -0500] "POST /roster/admin/update.php HTTP/1.1" 500 744 "-"
"UniUploader 2.0 (UU 2.4.1; English)" - "-"
----------------------------------------
POST /roster/admin/update.php HTTP/1.1
Connection: Keep-Alive
Content-Length: 120442
Content-Type: multipart/form-data; boundary=5cc0ab710a2f4e129d1dbecd487fa900
Expect: 100-continue
Host:
www.gowgaming.com
User-Agent: UniUploader 2.0 (UU 2.4.1; English)
mod_security-message: Access denied with code 500. Error processing request body: Multipart: invalid Content-Disposition head
er (-13): form-data; name="usize_CharacterProfiler";Content-Type: text/html [severity "EMERGENCY"]
mod_security-action: 500
120442
--5cc0ab710a2f4e129d1dbecd487fa900
Content-Disposition: form-data; name="CharacterProfiler"; filename="CharacterProfiler.lua.gz"
Content-Type: application/octet-stream
Our check seems to indicate that the lua file or the update file does not seems to comform with the RFC standard as such the rejection. You may want to contact who ever who have created these files for further clarifications. We are unable to disable this function specifically for your account as its a global setting.