Paris-Facebook |
Paris-Google Images |
Millau Viaduct-Google Images |
Millau Viaduct-Google Images |
Symantec April 2012
quote:
'Based on Norton Safe Web32 data – Symantec technology that scans the Web looking for websites hosting malware – we’ve determined that 61% of malicious sites are actually regular Web sites that have been compromised and infected with malicious code.
By Category, The Top-5 Most Infected Websites Are:
1 Blogs & Web communications
2 Hosting/Personal hosted sites
3 Business/Economy
4 Shopping
5 Education & Reference
'It is interesting to note that Web sites hosting adult/pornographic content are not in the top five, but ranked tenth.'
'Moreover, religious and ideological sites were found to have triple the average number of threats per infected site than adult/pornographic sites. We hypothesize that this is because pornographic website owners already make money from the internet and, as a result, have a vested interest in keeping their sites malware-free – it’s not good for repeat business.'
Slate.com May 24 2012
quote:
Header
'When it comes to computer viruses, you’re now more likely to catch one visiting a church website than surfing for porn.'
quote:
'As with herpes, one of the peripheral embarrassments of contracting a computer virus is that everyone has a pretty good idea of what you were up to when you got it. Oh sure, it’s possible you just chastely pecked a misleading email link. But odds are you picked it up because you were dallying on one of those shady, fly-by-night websites that people visit when they’re seeking fulfillment. You know—religious sites.'
'In its latest annual Internet security threat report, Symantec, the maker of Norton AntiVirus software, found that “religious and ideological sites” have far surpassed pornographic websites as targets for criminal hackers. According to the company you’re now three times as likely to encounter malware—insidious software that can steal your data, pelt you with spam, or enslave your machine in a botnet—on your local church blog as you are on a porn site.
The explanation is straightforward: The entrepreneurs who run adult websites are old hands at Web security, and they’ve long since learned to use protection. Those who build and host church websites, by contrast, may have the best intentions, but they tend to be naive and inexperienced. For hackers, that makes them easy prey.' 'Merighi says the online porn industry in the 1990s resembled the online religious community today—technologically speaking, of course. Enterprising photographers, filmmakers, bloggers, and businesspeople with limited Web savvy were starting their own sites in droves, often using the cheapest and simplest platforms available. Hackers soon capitalized, giving porn sites a well-deserved reputation as cesspools of malware, spam, intrusive pop-up ads, and sneaky redirects. But as traffic soared and companies began to cash in, competition became stiff, and the industry consolidated.'
'Religious sites aren’t a category unto themselves, but are split between blogs, self-hosted sites, and “education/reference” sites, which rank fifth on the “most-infected” list.'
End quotes
Computer viruses and malware are bad for the pornography business and therefore it is no surprise that these sites would often be secure.
One thing religious sites and pornographic sites have in common is potential for controversy and both could be targets for hackers based on philosophical considerations.
A person or group may have strong disagreements with site content and view hacking a site as a form of retaliation.
On my other blog I was noting in the most recent post's comment that I recently had the following issue on my laptop:
If 'Unable To Connect To Proxy Server' arrives on your computer screen and web access is denied although one has email with Windows, with the Google Chrome browser it provides directions on how to reset back to LAN status and not proxy.
Settings-Show Advanced Settings-Change Proxy Settings-LAN Settings-Unclick Use A Proxy Server For Your LAN
I then did a search on the web to gain some information on where these computer viruses are most likely to be found and thus the inspiration for this post.
I have had my share of computer viruses and malware and have several security programs.
Windows 7 with my laptop has been less troublesome.
On more than once occasion with Windows XP and my former desktop I have downloaded specific fixes for specific viruses, usually Trojans of some type.
ZeroAccess rootkit was probably the most difficult to deal with as it places itself into Windows processes and eliminates or prohibits access to certain programs. I was blocked from the world wide web and had to use another computer to find fixes and as well the virtually 'satanic' program prohibited access to my anti-virus programs.
This required a Windows XP operating system reformat to clean and fix. Even with most of the files backed up and programs on disc, with my previous and last desktop it took approximately twenty four hours to reload all my files and programs after reformat.
I downloaded ZeroAccess rootkit off of You Tube! Twice. Connected to videos.
Trojan horses and rootkits and Ad Rotator viruses that played audio advertisements in the background and also redirected my browsers were the second most difficult form of virus and malware to deal with. The first time I downloaded these my programs eventually deleted them, the second time none of them worked and I temporarily used a paid for program that eventually deleted them after several weeks.
I ended the subscription after six months.
I reason these viruses and malware were picked up from blogs.
The persons that create these viruses and malware need to get a life. The creators of the more serious viruses obviously have talent and skill and it is being wasted in work that I doubt often benefits them financially.
Morally and ethically to create viruses and malware for web viewers is a form of attack on personal property.
There should be more legal ramifications for such hackers, if they can be caught.
Google Images |
Google Images |
Google Images |
Malware not Malaware Blogger!
ReplyDeleteShaw Communications | Support Center.
ReplyDeleteVital Account update on Shaw Communications , During this process you might have log-in problems. To avoid log-in problems, Please click on shaw.ca/verify to update your service.
Funny how I do not sign in...
ReplyDeleteFunny clip promoting a film, although not my type
ReplyDeleteSort of the opposite of a lurker.;)
Direct Deposit (details inside)
ReplyDeleteEnough with internet scams and empty promises..
ReplyDeleteCongrats, You WON this FREE System!
ReplyDeleteTom Vu said his system was genius not
ReplyDeletehim.
I think many thought his show ingeniously funny, by accident.
Things Girls Do That'd Be Creepy If A Guy Did Them
ReplyDeleteHappy Canadian Thanksgiving.
In caae your уoungstеr snores nightlу, gеt a second aѕ well аs third dοctor's evaluаtion, and be quitе іnfоrmativе in the ѕnoring habits, beсаuѕе іf theу snοrе eаch and eνery night, уouг youngsteг may poѕѕibly only ωant аn all organic anti snoring гemеdу, nоt ADHD mеdicines. Also vіsit mу ωebѕite : : dealіng with snoгing (hpvyangx.com)
ReplyDeleteIt wouldn't surprise me if users of healthcare.gov end up getting a computer virus, after reading this article about the terrible quality of the front end code for the Obamacare website.
ReplyDeleteplaying field of your dwelling of the . It is said Mary in its place
ReplyDelete1. As part of apnea treatment I was required to record myself to see if I snored. I did, but should be less now.
ReplyDelete2. Mary? As in Chucky's Mommy?
3. Read this about Obama this week...
[BOMBSHELL] Ex-CIA Agent Claims Obama Killed Breitbart and Clancy
'Doctor Jim Garrow, philanthropist and worker for one of the largest non-profit organizations on the planet to save female children from slaughter in China. He has been featured on several media outlets throughout the world. Last Sunday, as a guest of Now the End Begins internet radio program however, he dropped a bombshell on the world. Dr. Garrow claims that up to a week ago he was covert CIA. To top it off on the program, he states he knows that President Obama ordered the hits that killed Tom Clancy and Andrew Breitbart!'
'Andrew Breitbart died under mysterious circumstances. The autopsy said that he died with no prescription drugs in his system and only a .04 blood alcohol content not days after taping an interview with the now also deceased “alleged” gay lover of President Barack H. Obama. So why if he died of natural causes did the FBI go after his widow for potential homicide?'
'It is no secret when he wrote The Hunt for the Red October that he was met at the door by Pentagon officials and FBI agents demanding to know where he got top-secret documents. Dr. Garrow states that after the incident, the CIA “spoon fed” him classified information and scenarios to write his novels in a manner that was entertaining but contained that ever needed element of truth. Dr. Garrow says that is why he was killed because he was getting to close to a secret they don’t want the world to know. In fact Dr. Garrow attributes the statement quoted above as “a little too late”.
Dr. Garrow states President Obama had Tom Clancy killed as well and noted that it takes 5 days for plant toxins and most poisons to break down and leave no traces in the human body. Amazingly enough, or coincidentally, the doctors did not perform an autopsy on Tom Clancy’s body for 5 days.
Finally he revealed a revelation so shocking to the radio program that can be best described in their own words:
Lastly, he revealed that Obama’s administration was made up of Marxist Muslims who all take their orders from Senior Adviser to the President, Iranian-born Valerie Jarrett. Dr. Garrow said that it is well known to intelligence agencies all over the world that Obama is a foreign plant who was placed on the path to the presidency by ultra-rich Saudi nationals This is why, Garrow said, that all of Obama’s education records have been permanently sealed.- Now The End Begins'
At my suggestion via a t.v. ad with the song, Uncle Chucklins is going to work on completing this song that I started...
ReplyDeleteA parody and hopefully future article in honour of Bobby Buff circa 1990s...
'Phoney'
Sunny
Do you have a spam problem on this blog; I also am a blogger, and I was wanting to know your situation; many of us have created some nice procedures and we are looking to trade techniques with other folks, please shoot me an e-mail if interested. Here is my weblog united cash loans
ReplyDeleteYes, I do have a spam problem.
ReplyDeleteMost are deleted and some are used for comedy material and irony...
Excellent split pea soup and 'punkin pie', pumpkin pie for Thanksgiving although I was the only one that ate the crust. Thanks, Boss. I like crusty crust. And well-done peanut butter cookies for anyone seeking to 'buy me off'.
Some guy showed up for the pie right on time...
Chuuk.
Hello, I enjoy reading through your post. I like to write a little comment to support you. Review my web-site: contextual links region
ReplyDeletehey man, this is personal
ReplyDeleteHey there,
Step 1: Open this email (COMPLETE)
Step 2: Click on the secure and private
download link below to access this $9k
system:
http://clicks.aweber.com/y/ct/?l=AJvud&m=3kpHObH2ghWmT.V&b=Yqc4qe2AIXNP_IgsuU1yxA
hey, you there?
ReplyDelete'FREE! “How To Get Up To 37 Checks Per Month, Earn Upwards Of $4,954.55 While You Sleep At Night, And Recruit WITHOUT Ever Having To Pick Up The Phone!”'
ReplyDeleteA small percentage of customers accomplish anything near this and the seller can then state that it is because of lack of hard work by the customer/purchaser.
What is not stated by the vendor is that it is extremely difficult to make money with online marketing no matter how hard someone works. As well much of the money made in online marketing is by marketing systems, and 'dreams' to potential customers.
Our new blog plot : http://makeup.blognet.pw/?mathew uk wholesale jewellery leg makeup wwii adriana makeup bali jewellery makeup lawsuit arizona
When I clicked on the link a bogus RCMP warning came up which I clicked out of. It wanted money for supposedly looking at illegal stuff.
ReplyDeleteLame site and scam.
HeatSync values your input!
ReplyDeleteThank you for being a part of our success. HeatSync is growing and its all with help. As a member of HeatSync, you have been selected to participate in our HeatSync Satisfaction Survey. Your responses will help us to improve HeatSync to make your experience even better.
Click on this link to start:
https://www.research.net/s/hs01a
I did not use the 'Heat'...
ReplyDeleteI think I signed up but it was no help with pageviews.
That is a very good tip particularly to those new to the blogosphere.
ReplyDeleteBrief but very precise info… Thanks for sharing this one.
A must read post!
My website ... travel - ridyai.allalla.com,
Yes, relevant.
ReplyDeleteCheers
My most popular post on this blog since May...
ReplyDeleteThank you, readers.
Canada-USA Women's hockey brawl
ReplyDeletebuy tramadol overnight saturday delivery - tramadol withdrawal for dogs
ReplyDeleteOn Saturday night I may have shared pizza with my dog...not waited for the prescription drug delivery boy.
ReplyDeleteEarn $87 an hour or even more!
ReplyDeletePlease retain for your records...
ReplyDeleteBETA TEST this be the first to know...
ReplyDelete'Anonymous said...
ReplyDeleteEarn $87 an hour or even more!'
A virtual paper route?
'Anonymous said...
ReplyDeletePlease retain for your records...'
Here you are...
'Anonymous said...
ReplyDeleteBETA TEST this be the first to know...'
You Know, You Know
And most females enjoy to update their wardrobe with every new seasons styles. Are we up to the task, or does Jesus have to go out and find new people to tend his sheep Let us pray that we, as public leaders and leaders of our corporations and small businesses are up for the task..
ReplyDeleteBizarre...so females that witness should be fashionable?
ReplyDeleteThe Book of Job
The Book of Vogue?
I apologise, but, in my opinion, you are not right. I suggest it to discuss. Bravo, what words...
ReplyDelete