Prev: I wish I had this laptop
Next: NetNewsWire problem
From: dorayme on 20 May 2010 12:55 In article <michelle-1BF85A.06484720052010(a)62-183-169-81.bb.dnainternet.fi>, Michelle Steiner <michelle(a)michelle.org> wrote: > In article <X35Jn.4272$Z6.1798(a)edtnps82>, me(a)home.spamsucks.ca (Király) > wrote:have this checked > > > > Warning: Visiting this site may harm your computer > > > > www.kitsaptransit.org works for me. What DNS server are you using? > > I get the same warning the OP gets; I'm using Safari 4.0.5, and have the > fraudulent sites warning checkbox checked. You can have this checked without the warning coming up (which needs js enabled), by going to Develop menu, turning on things and then turning them off. Next time you quit and restart Safari, no warning. -- dorayme
From: Glen Labah on 21 May 2010 01:29 In article <yobocgajyys.fsf(a)panix3.panix.com>, BreadWithSpam(a)fractious.net wrote: > How that malware line got added to what looks like an otherwise > respectable page, I have no idea. It should be reported to the site > owner and the host. I've done that already, and this morning received a response that they have their web site people working on it. Kitsap Transit is a pretty low budget operation. One of the ferry services they operate (and in fact one of the services they operate that I have ridden) is with a boat that was built in 1917 simply because there isn't the money to replace it with something a bit more modern. So, they probably don't have the money for the best of the Seattle area's web site security people. -- Please note this e-mail address is a pit of spam due to e-mail address harvesters on Usenet. Response time to e-mail sent here is slow.
From: BreadWithSpam on 21 May 2010 01:34 Glen Labah <gl4317(a)yahoo.com> writes: > In article <yobocgajyys.fsf(a)panix3.panix.com>, > BreadWithSpam(a)fractious.net wrote: > > > How that malware line got added to what looks like an otherwise > > respectable page, I have no idea. It should be reported to the site > > owner and the host. > I've done that already, and this morning received a response that they > have their web site people working on it. Kitsap Transit is a pretty I hope you'll let us know what develops. It really is odd - either someone at the hosting company put it there, or somewhere there's lax security which allowed the files at their webhost to be modified. Should be interesting to find out the story. -- Plain Bread alone for e-mail, thanks. The rest gets trashed.
From: Wes Groleau on 21 May 2010 13:28 On 05-21-2010 01:34, BreadWithSpam(a)fractious.net wrote: > I hope you'll let us know what develops. It really is odd - either > someone at the hosting company put it there, or somewhere there's lax > security which allowed the files at their webhost to be modified. > Should be interesting to find out the story. I had a similar hacking on one of my GoDaddy hosted websites. Obfuscated Javascript was added which re-routed viewers to a website in Russia showing off pictures of "my new baby" It looked like that website had also been hacked for malicious purposes, but since all the text was in English, I think it may have been a decoy. -- Wes Groleau Race Doesn?t Matter http://Ideas.Lang-Learn.us/WWW?itemid=876
From: Glen Labah on 22 May 2010 03:59
In article <yobtyq124yp.fsf(a)panix3.panix.com>, BreadWithSpam(a)fractious.net wrote: > Glen Labah <gl4317(a)yahoo.com> writes: > > In article <yobocgajyys.fsf(a)panix3.panix.com>, > > BreadWithSpam(a)fractious.net wrote: > > > > > How that malware line got added to what looks like an otherwise > > > respectable page, I have no idea. It should be reported to the site > > > owner and the host. > > > I've done that already, and this morning received a response that they > > have their web site people working on it. Kitsap Transit is a pretty > > I hope you'll let us know what develops. It really is odd - either > someone at the hosting company put it there, or somewhere there's lax > security which allowed the files at their webhost to be modified. > Should be interesting to find out the story. Can't tell you the whole story, but they have removed the offending script from the web site, as it is no longer in the source HTML. -- Please note this e-mail address is a pit of spam due to e-mail address harvesters on Usenet. Response time to e-mail sent here is slow. |