<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_27_1437217</id>
	<title>Massive Badware Campaign Targets Google's "Long Tail"</title>
	<author>kdawson</author>
	<datestamp>1259337000000</datestamp>
	<htmltext>A post by Cyberveillance a couple of weeks back revealed a complex black-hat operation involving <a href="http://www.cyveillanceblog.com/general-cyberintel/malware-google-search-results">Google searches leading to hundreds of thousands of bogus blogs</a>, exploiting the "long tail" of search results and isolated from Google's auto-detection of malware sites by a shifting network of redirectors. The fake blog posts are innocuous when visited directly, but make aggressive attempts to install a fake Windows anti-virus tool (which is actually a Trojan horse) if clicked through from Google. Other search engines do not index the bogus sites. The Unmask Parasites site has a <a href="http://blog.unmaskparasites.com/2009/11/26/rogue-blogs-regirect-search-traffic-to-bogus-av-sites-part-1/">detailed two-part analysis</a> of the <a href="http://blog.unmaskparasites.com/2009/11/27/rogue-blogs-regirect-search-traffic-to-bogus-av-sites-part-2/">badware operation</a>, which puts some numbers on its scope: almost 688,000 bogus scareware blogs can be located in Google; some of them have upwards of 1000 posts. This analysis also reveals that a large majority of the sites hacked to host fake blogs are on the network of <a href="http://www.servage.net/">Servage.net</a>. From the second Unmask Parasites link: <i>"What we have here is millions of rogue web pages targeting the long tail of web search (millions of keywords) where each page tries to install fake (and malicious) "anti-virus" software on visitors' computers. While this black-hat campaign is active for at least 6 months, webmasters of the compromised sites and their hosting providers don't simply notice this illicit activity. The good news is Google seems to have noticed this problem. Probably thanks to the Cyveillance blog post. During the week after that post I see a steady decrease in search results returned by the queries that you can find in this post."</i></htmltext>
<tokenext>A post by Cyberveillance a couple of weeks back revealed a complex black-hat operation involving Google searches leading to hundreds of thousands of bogus blogs , exploiting the " long tail " of search results and isolated from Google 's auto-detection of malware sites by a shifting network of redirectors .
The fake blog posts are innocuous when visited directly , but make aggressive attempts to install a fake Windows anti-virus tool ( which is actually a Trojan horse ) if clicked through from Google .
Other search engines do not index the bogus sites .
The Unmask Parasites site has a detailed two-part analysis of the badware operation , which puts some numbers on its scope : almost 688,000 bogus scareware blogs can be located in Google ; some of them have upwards of 1000 posts .
This analysis also reveals that a large majority of the sites hacked to host fake blogs are on the network of Servage.net .
From the second Unmask Parasites link : " What we have here is millions of rogue web pages targeting the long tail of web search ( millions of keywords ) where each page tries to install fake ( and malicious ) " anti-virus " software on visitors ' computers .
While this black-hat campaign is active for at least 6 months , webmasters of the compromised sites and their hosting providers do n't simply notice this illicit activity .
The good news is Google seems to have noticed this problem .
Probably thanks to the Cyveillance blog post .
During the week after that post I see a steady decrease in search results returned by the queries that you can find in this post .
"</tokentext>
<sentencetext>A post by Cyberveillance a couple of weeks back revealed a complex black-hat operation involving Google searches leading to hundreds of thousands of bogus blogs, exploiting the "long tail" of search results and isolated from Google's auto-detection of malware sites by a shifting network of redirectors.
The fake blog posts are innocuous when visited directly, but make aggressive attempts to install a fake Windows anti-virus tool (which is actually a Trojan horse) if clicked through from Google.
Other search engines do not index the bogus sites.
The Unmask Parasites site has a detailed two-part analysis of the badware operation, which puts some numbers on its scope: almost 688,000 bogus scareware blogs can be located in Google; some of them have upwards of 1000 posts.
This analysis also reveals that a large majority of the sites hacked to host fake blogs are on the network of Servage.net.
From the second Unmask Parasites link: "What we have here is millions of rogue web pages targeting the long tail of web search (millions of keywords) where each page tries to install fake (and malicious) "anti-virus" software on visitors' computers.
While this black-hat campaign is active for at least 6 months, webmasters of the compromised sites and their hosting providers don't simply notice this illicit activity.
The good news is Google seems to have noticed this problem.
Probably thanks to the Cyveillance blog post.
During the week after that post I see a steady decrease in search results returned by the queries that you can find in this post.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246324</id>
	<title>First good thing about the work firewall then</title>
	<author>mikael\_j</author>
	<datestamp>1259342940000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>This could possibly be the only time one of the retarded things our company-wide firewall did turns out to be right, it strips all referrer headers from HTTP traffic (which has caused me endless pain since some of my work involves said headers).</p><p>Of course, it still blocks all "application/---" MIME types which makes no sense and has caused even more issues (apparently anything with a MIME type that starts with application/ is a dangerous executable and must be blocked).</p><p>/Mikael</p></htmltext>
<tokenext>This could possibly be the only time one of the retarded things our company-wide firewall did turns out to be right , it strips all referrer headers from HTTP traffic ( which has caused me endless pain since some of my work involves said headers ) .Of course , it still blocks all " application/--- " MIME types which makes no sense and has caused even more issues ( apparently anything with a MIME type that starts with application/ is a dangerous executable and must be blocked ) ./Mikael</tokentext>
<sentencetext>This could possibly be the only time one of the retarded things our company-wide firewall did turns out to be right, it strips all referrer headers from HTTP traffic (which has caused me endless pain since some of my work involves said headers).Of course, it still blocks all "application/---" MIME types which makes no sense and has caused even more issues (apparently anything with a MIME type that starts with application/ is a dangerous executable and must be blocked)./Mikael</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246338</id>
	<title>Lorenzo Von Matterhorn</title>
	<author>Anonymous</author>
	<datestamp>1259343060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You got played. It's the "Lorenzo Von Matterhorn".  http://en.wikipedia.org/wiki/The\_Playbook\_(How\_I\_Met\_Your\_Mother)</p></htmltext>
<tokenext>You got played .
It 's the " Lorenzo Von Matterhorn " .
http : //en.wikipedia.org/wiki/The \ _Playbook \ _ ( How \ _I \ _Met \ _Your \ _Mother )</tokentext>
<sentencetext>You got played.
It's the "Lorenzo Von Matterhorn".
http://en.wikipedia.org/wiki/The\_Playbook\_(How\_I\_Met\_Your\_Mother)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</id>
	<title>Badware?</title>
	<author>xorsyst</author>
	<datestamp>1259342220000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>When did the word badware appear?  Is it because some people couldn't cope with Malware?</p></htmltext>
<tokenext>When did the word badware appear ?
Is it because some people could n't cope with Malware ?</tokentext>
<sentencetext>When did the word badware appear?
Is it because some people couldn't cope with Malware?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247074</id>
	<title>Re:Yet Another Reason</title>
	<author>Anonymous</author>
	<datestamp>1259348040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>There are already abundant reasons not to give away your usage data to anyone who wants it; this just provides one more.</p></div><p>Please explain why you'd rather not reveal your referrer data. (New example from TFA aside.)<br>Working with web analytics, I can say referrer information is extremely useful, and not in a way which would lead you to any downsides, that <strong>I</strong> can think of at least.</p><p>(Not trolling, I'm genuinely interested...)</p></div>
	</htmltext>
<tokenext>There are already abundant reasons not to give away your usage data to anyone who wants it ; this just provides one more.Please explain why you 'd rather not reveal your referrer data .
( New example from TFA aside .
) Working with web analytics , I can say referrer information is extremely useful , and not in a way which would lead you to any downsides , that I can think of at least .
( Not trolling , I 'm genuinely interested... )</tokentext>
<sentencetext>There are already abundant reasons not to give away your usage data to anyone who wants it; this just provides one more.Please explain why you'd rather not reveal your referrer data.
(New example from TFA aside.
)Working with web analytics, I can say referrer information is extremely useful, and not in a way which would lead you to any downsides, that I can think of at least.
(Not trolling, I'm genuinely interested...)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342</id>
	<title>Ho Hum</title>
	<author>The Cisco Kid</author>
	<datestamp>1259343060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"Windows is a vulnerable POS" "New virus/trojan/worm affects Windows" "Every Windows computer can be assumed to be compromised, trojan-laden, and part of some botnet thats either being used to compromise other Windows machines, capture the user's personal information and/or to pump out anonymous spam".</p><p>Assume these as static truths. Eg, not 'news'.</p><p>Now what would *really* be news, is if a day went by and there wasn't some new compromise/attack/vulnerability affecting Windows machines.</p><p>I live in hope that someday one of these trojan/worm/virus writers, distribute something that erases the entire hard drive, flashes all flashable memory on the machine, and then powers it down. But of course, they'll never do that, because then they'd be destroying the very resources they use to proliferate.</p></htmltext>
<tokenext>" Windows is a vulnerable POS " " New virus/trojan/worm affects Windows " " Every Windows computer can be assumed to be compromised , trojan-laden , and part of some botnet thats either being used to compromise other Windows machines , capture the user 's personal information and/or to pump out anonymous spam " .Assume these as static truths .
Eg , not 'news'.Now what would * really * be news , is if a day went by and there was n't some new compromise/attack/vulnerability affecting Windows machines.I live in hope that someday one of these trojan/worm/virus writers , distribute something that erases the entire hard drive , flashes all flashable memory on the machine , and then powers it down .
But of course , they 'll never do that , because then they 'd be destroying the very resources they use to proliferate .</tokentext>
<sentencetext>"Windows is a vulnerable POS" "New virus/trojan/worm affects Windows" "Every Windows computer can be assumed to be compromised, trojan-laden, and part of some botnet thats either being used to compromise other Windows machines, capture the user's personal information and/or to pump out anonymous spam".Assume these as static truths.
Eg, not 'news'.Now what would *really* be news, is if a day went by and there wasn't some new compromise/attack/vulnerability affecting Windows machines.I live in hope that someday one of these trojan/worm/virus writers, distribute something that erases the entire hard drive, flashes all flashable memory on the machine, and then powers it down.
But of course, they'll never do that, because then they'd be destroying the very resources they use to proliferate.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247312</id>
	<title>Filtering out the bottom-feeders.</title>
	<author>Animats</author>
	<datestamp>1259349660000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>
The big search engines remain too "soft" on bottom-feeders.  Google once took a harder line.  In 2004 and 2005, Google sponsored the Web Spam Summit.  Then they had a down quarter and turned to the dark side.  Since then, from 2006 to 2009, they've sponsored the Search Engine Strategies conference, the web spammer's convention.
</p><p>
Google has to do this to remain profitable. <a href="http://www.sitetruth.net/" title="sitetruth.net">35\% of AdWords advertisers, by domain, are "bottom-feeders"</a> [sitetruth.net] - sites with no identifiable legitimate business behind them. A significant portion of Google's revenue comes from those bottom-feeders, and the AdWords ads on their sites.  If Google filtered out all spam blogs, their revenue would decline.
</p><p>
We, of course, run <a href="http://www.sitetruth.com/" title="sitetruth.com">SiteTruth</a> [sitetruth.com], as a demo to show that search can have less evil.  Try putting some of those "bad" sites into SiteTruth and see how it rates them.
</p><p>
(We get some whining, of course.  "I wanna run ads on my blog and I don't wanna say who I am."  Tough. You're operating a business, and businesses, by law, don't get to be anonymous. Even in the EU.  Deal with it.)</p></htmltext>
<tokenext>The big search engines remain too " soft " on bottom-feeders .
Google once took a harder line .
In 2004 and 2005 , Google sponsored the Web Spam Summit .
Then they had a down quarter and turned to the dark side .
Since then , from 2006 to 2009 , they 've sponsored the Search Engine Strategies conference , the web spammer 's convention .
Google has to do this to remain profitable .
35 \ % of AdWords advertisers , by domain , are " bottom-feeders " [ sitetruth.net ] - sites with no identifiable legitimate business behind them .
A significant portion of Google 's revenue comes from those bottom-feeders , and the AdWords ads on their sites .
If Google filtered out all spam blogs , their revenue would decline .
We , of course , run SiteTruth [ sitetruth.com ] , as a demo to show that search can have less evil .
Try putting some of those " bad " sites into SiteTruth and see how it rates them .
( We get some whining , of course .
" I wan na run ads on my blog and I do n't wan na say who I am .
" Tough .
You 're operating a business , and businesses , by law , do n't get to be anonymous .
Even in the EU .
Deal with it .
)</tokentext>
<sentencetext>
The big search engines remain too "soft" on bottom-feeders.
Google once took a harder line.
In 2004 and 2005, Google sponsored the Web Spam Summit.
Then they had a down quarter and turned to the dark side.
Since then, from 2006 to 2009, they've sponsored the Search Engine Strategies conference, the web spammer's convention.
Google has to do this to remain profitable.
35\% of AdWords advertisers, by domain, are "bottom-feeders" [sitetruth.net] - sites with no identifiable legitimate business behind them.
A significant portion of Google's revenue comes from those bottom-feeders, and the AdWords ads on their sites.
If Google filtered out all spam blogs, their revenue would decline.
We, of course, run SiteTruth [sitetruth.com], as a demo to show that search can have less evil.
Try putting some of those "bad" sites into SiteTruth and see how it rates them.
(We get some whining, of course.
"I wanna run ads on my blog and I don't wanna say who I am.
"  Tough.
You're operating a business, and businesses, by law, don't get to be anonymous.
Even in the EU.
Deal with it.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248468</id>
	<title>Why is nobody...</title>
	<author>Hurricane78</author>
	<datestamp>1259313960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>...targeting <em>my</em> &ldquo;long tail&rdquo;?</p><p>Oh... with <em>badware</em>? Well then, no thanks. ^^</p></htmltext>
<tokenext>...targeting my    long tail    ? Oh... with badware ?
Well then , no thanks .
^ ^</tokentext>
<sentencetext>...targeting my “long tail”?Oh... with badware?
Well then, no thanks.
^^</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246322</id>
	<title>Re:Yet Another Reason</title>
	<author>fph il quozientatore</author>
	<datestamp>1259342940000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>For example, the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been</p></div></blockquote><p>

Want that. Is that a released add-on or did you just patch and recompile the source?</p></div>
	</htmltext>
<tokenext>For example , the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been Want that .
Is that a released add-on or did you just patch and recompile the source ?</tokentext>
<sentencetext>For example, the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been

Want that.
Is that a released add-on or did you just patch and recompile the source?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246416</id>
	<title>Re:Badware?</title>
	<author>jDeepbeep</author>
	<datestamp>1259343600000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>When did the word badware appear?  Is it because some people couldn't cope with Malware?</p></div><p>It's not badware. It's goodware-challenged.</p></div>
	</htmltext>
<tokenext>When did the word badware appear ?
Is it because some people could n't cope with Malware ? It 's not badware .
It 's goodware-challenged .</tokentext>
<sentencetext>When did the word badware appear?
Is it because some people couldn't cope with Malware?It's not badware.
It's goodware-challenged.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246388</id>
	<title>Ahah.  So that's who's doing it...</title>
	<author>rickb928</author>
	<datestamp>1259343480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>But I just shrugged these off as random malware.</p><p>Blogs are going to be another morass of evil, because of so many that just regurgitate/copy/mimic each other, the insecurity problem, and the general lameness of nobody saying nothing.</p><p>And Google gets to look good on this, which is not really making me feel warm &amp; fuzzy.</p></htmltext>
<tokenext>But I just shrugged these off as random malware.Blogs are going to be another morass of evil , because of so many that just regurgitate/copy/mimic each other , the insecurity problem , and the general lameness of nobody saying nothing.And Google gets to look good on this , which is not really making me feel warm &amp; fuzzy .</tokentext>
<sentencetext>But I just shrugged these off as random malware.Blogs are going to be another morass of evil, because of so many that just regurgitate/copy/mimic each other, the insecurity problem, and the general lameness of nobody saying nothing.And Google gets to look good on this, which is not really making me feel warm &amp; fuzzy.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247358</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>phantomcircuit</author>
	<datestamp>1259350080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I despise sites that simply reproduce content from forums or mailing lists like that.</p><p>Which is why whenever I find one with my comment on it I immediately send their host a DMCA take down.</p><p>Finally a good use for the DMCA<nobr> <wbr></nobr>:P</p></htmltext>
<tokenext>I despise sites that simply reproduce content from forums or mailing lists like that.Which is why whenever I find one with my comment on it I immediately send their host a DMCA take down.Finally a good use for the DMCA : P</tokentext>
<sentencetext>I despise sites that simply reproduce content from forums or mailing lists like that.Which is why whenever I find one with my comment on it I immediately send their host a DMCA take down.Finally a good use for the DMCA :P</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246354</id>
	<title>Re:Badware?</title>
	<author>Anonymous</author>
	<datestamp>1259343180000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><p>It's an Americanism. I first heard it about a year ago while dealing with some people at our Boston branch (the company and I are both Austrian).</p><p>Maybe it's the American media or the American schools or something, but apparently for many speakers of American English, they don't realize that the "mal-" prefix means "bad".</p><p>The people I dealt with heard it over the phone as "mall-wear", as in clothes you'd buy at a shopping mall. They couldn't understand what clothing had to do with the viruses and worms that were slowing their office computers and network down...</p></htmltext>
<tokenext>It 's an Americanism .
I first heard it about a year ago while dealing with some people at our Boston branch ( the company and I are both Austrian ) .Maybe it 's the American media or the American schools or something , but apparently for many speakers of American English , they do n't realize that the " mal- " prefix means " bad " .The people I dealt with heard it over the phone as " mall-wear " , as in clothes you 'd buy at a shopping mall .
They could n't understand what clothing had to do with the viruses and worms that were slowing their office computers and network down.. .</tokentext>
<sentencetext>It's an Americanism.
I first heard it about a year ago while dealing with some people at our Boston branch (the company and I are both Austrian).Maybe it's the American media or the American schools or something, but apparently for many speakers of American English, they don't realize that the "mal-" prefix means "bad".The people I dealt with heard it over the phone as "mall-wear", as in clothes you'd buy at a shopping mall.
They couldn't understand what clothing had to do with the viruses and worms that were slowing their office computers and network down...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246590</id>
	<title>mod 3own</title>
	<author>Anonymous</author>
	<datestamp>1259344740000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext>has brought u4#on</htmltext>
<tokenext>has brought u4 # on</tokentext>
<sentencetext>has brought u4#on</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246616</id>
	<title>Re:Badware?</title>
	<author>LordAndrewSama</author>
	<datestamp>1259344920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If I weren't happily in love I'd see that as an opportunity to get the receptionist naked...</htmltext>
<tokenext>If I were n't happily in love I 'd see that as an opportunity to get the receptionist naked.. .</tokentext>
<sentencetext>If I weren't happily in love I'd see that as an opportunity to get the receptionist naked...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246354</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246334</id>
	<title>Re:Badware?</title>
	<author>Barefoot Monkey</author>
	<datestamp>1259343060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>When did the word badware appear? Is it because some people couldn't cope with Malware?</p></div></blockquote><p>Same thing really - after all, "mal" <em>is</em> "bad"... in Latin</p></div>
	</htmltext>
<tokenext>When did the word badware appear ?
Is it because some people could n't cope with Malware ? Same thing really - after all , " mal " is " bad " ... in Latin</tokentext>
<sentencetext>When did the word badware appear?
Is it because some people couldn't cope with Malware?Same thing really - after all, "mal" is "bad"... in Latin
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246438</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>Anonymous</author>
	<datestamp>1259343780000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.  I wish google would realize these are all the exact same thread and combine them into a single response.</p></div><p>No joke.  You omitted one part, however.  You'll find the same message thread on 10 or more different sites, true.  The part I would add is that in each instance, someone is asking the question but no one has responded with a meaningful answer.  Sometimes I have better luck excluding terms like "archive" and "mailing list" from the search results.
<br> <br>
I forgot their name but there is a company or two that I would describe as parasites.  They try hard to have high visibility in search results when it comes to someone asking questions.  When you click the link, however, you find that they want you to pay a fee to see the answer.  Usually this is for basic technical support information that is not secret or otherwise proprietary in any way.  I bet they had to work really hard to craft their pages in such a way that the Google summary gives no indication that it's a for-pay site.  It makes me wonder if they are subsidized in some way or whether enough people really do pay them enough money to stay in business on their own.</p></div>
	</htmltext>
<tokenext>Speaking of bogus blogs... What really ticks me off is if I 'm searching for a answer to a technical problem , I often find the same message thread on 10 different sites .
I wish google would realize these are all the exact same thread and combine them into a single response.No joke .
You omitted one part , however .
You 'll find the same message thread on 10 or more different sites , true .
The part I would add is that in each instance , someone is asking the question but no one has responded with a meaningful answer .
Sometimes I have better luck excluding terms like " archive " and " mailing list " from the search results .
I forgot their name but there is a company or two that I would describe as parasites .
They try hard to have high visibility in search results when it comes to someone asking questions .
When you click the link , however , you find that they want you to pay a fee to see the answer .
Usually this is for basic technical support information that is not secret or otherwise proprietary in any way .
I bet they had to work really hard to craft their pages in such a way that the Google summary gives no indication that it 's a for-pay site .
It makes me wonder if they are subsidized in some way or whether enough people really do pay them enough money to stay in business on their own .</tokentext>
<sentencetext>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.
I wish google would realize these are all the exact same thread and combine them into a single response.No joke.
You omitted one part, however.
You'll find the same message thread on 10 or more different sites, true.
The part I would add is that in each instance, someone is asking the question but no one has responded with a meaningful answer.
Sometimes I have better luck excluding terms like "archive" and "mailing list" from the search results.
I forgot their name but there is a company or two that I would describe as parasites.
They try hard to have high visibility in search results when it comes to someone asking questions.
When you click the link, however, you find that they want you to pay a fee to see the answer.
Usually this is for basic technical support information that is not secret or otherwise proprietary in any way.
I bet they had to work really hard to craft their pages in such a way that the Google summary gives no indication that it's a for-pay site.
It makes me wonder if they are subsidized in some way or whether enough people really do pay them enough money to stay in business on their own.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247136</id>
	<title>Re:Yet Another Reason</title>
	<author>Jazz-Masta</author>
	<datestamp>1259348580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Sites that were hacked were done using an<nobr> <wbr></nobr>.htaccess user agent redirect. In a strange twist, IIS' web.config does not have that particular feature (well, with plugins, but not by default) so IIS is by-and-large not affected by this hack. Most of the sites had an<nobr> <wbr></nobr>.htaccess file that was writeable, in fact, many were chmod 777. Many CMS auto-upgrade scripts and url-rewrite plugins require a chmod 755 using apache's<nobr> <wbr></nobr>.htaccess file, but so many people just 777 it.</p></htmltext>
<tokenext>Sites that were hacked were done using an .htaccess user agent redirect .
In a strange twist , IIS ' web.config does not have that particular feature ( well , with plugins , but not by default ) so IIS is by-and-large not affected by this hack .
Most of the sites had an .htaccess file that was writeable , in fact , many were chmod 777 .
Many CMS auto-upgrade scripts and url-rewrite plugins require a chmod 755 using apache 's .htaccess file , but so many people just 777 it .</tokentext>
<sentencetext>Sites that were hacked were done using an .htaccess user agent redirect.
In a strange twist, IIS' web.config does not have that particular feature (well, with plugins, but not by default) so IIS is by-and-large not affected by this hack.
Most of the sites had an .htaccess file that was writeable, in fact, many were chmod 777.
Many CMS auto-upgrade scripts and url-rewrite plugins require a chmod 755 using apache's .htaccess file, but so many people just 777 it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246310</id>
	<title>Re:Yet Another Reason</title>
	<author>Anonymous</author>
	<datestamp>1259342880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Meh.  The best security is simplicity.  That's why I use 'dumb' browsers that aren't actually smart enough to implement http refer (uzbl/surf)</p></htmltext>
<tokenext>Meh .
The best security is simplicity .
That 's why I use 'dumb ' browsers that are n't actually smart enough to implement http refer ( uzbl/surf )</tokentext>
<sentencetext>Meh.
The best security is simplicity.
That's why I use 'dumb' browsers that aren't actually smart enough to implement http refer (uzbl/surf)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246296</id>
	<title>Re:Badware?</title>
	<author>Rogerborg</author>
	<datestamp>1259342760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>No, see, you may have paid someone to protect you from <em>Malware, but they didn't protect you from <em>Bad</em>ware.  It's <em>totally</em> different.  However, I can protect you, for a nominal fee...</em></htmltext>
<tokenext>No , see , you may have paid someone to protect you from Malware , but they did n't protect you from Badware .
It 's totally different .
However , I can protect you , for a nominal fee.. .</tokentext>
<sentencetext>No, see, you may have paid someone to protect you from Malware, but they didn't protect you from Badware.
It's totally different.
However, I can protect you, for a nominal fee...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247192</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>Jazz-Masta</author>
	<datestamp>1259348940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.  I wish google would realize these are all the exact same thread and combine them into a single response.</p></div><p>The problem I have with Googling technical problems is that the 10 sites that do show up often have all the wrong information.</p><p>I was searching for info on converting latin1 to utf8 to make a similar point, and I went through almost all the top 100 results before I got to a post that mentioned you needed to convert the content INSIDE the database as well...and that post didn't even mention how. There are about 20 Wordpress scripts that convert the databases from latin1 to utf8, but do so by converting the database itself. There is only one, and not popular, that converts the string types to binary first to save the content (special characters, etc), then converts the tables and database, then converts the string types back. I can't believe how much misinformation there is floating around. One person posts something and 100 people take it as gospel and post it on their blogs, while the technically correct info is posted on a website deep in the Google index because it hasn't been updated!</p></div>
	</htmltext>
<tokenext>Speaking of bogus blogs... What really ticks me off is if I 'm searching for a answer to a technical problem , I often find the same message thread on 10 different sites .
I wish google would realize these are all the exact same thread and combine them into a single response.The problem I have with Googling technical problems is that the 10 sites that do show up often have all the wrong information.I was searching for info on converting latin1 to utf8 to make a similar point , and I went through almost all the top 100 results before I got to a post that mentioned you needed to convert the content INSIDE the database as well...and that post did n't even mention how .
There are about 20 Wordpress scripts that convert the databases from latin1 to utf8 , but do so by converting the database itself .
There is only one , and not popular , that converts the string types to binary first to save the content ( special characters , etc ) , then converts the tables and database , then converts the string types back .
I ca n't believe how much misinformation there is floating around .
One person posts something and 100 people take it as gospel and post it on their blogs , while the technically correct info is posted on a website deep in the Google index because it has n't been updated !</tokentext>
<sentencetext>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.
I wish google would realize these are all the exact same thread and combine them into a single response.The problem I have with Googling technical problems is that the 10 sites that do show up often have all the wrong information.I was searching for info on converting latin1 to utf8 to make a similar point, and I went through almost all the top 100 results before I got to a post that mentioned you needed to convert the content INSIDE the database as well...and that post didn't even mention how.
There are about 20 Wordpress scripts that convert the databases from latin1 to utf8, but do so by converting the database itself.
There is only one, and not popular, that converts the string types to binary first to save the content (special characters, etc), then converts the tables and database, then converts the string types back.
I can't believe how much misinformation there is floating around.
One person posts something and 100 people take it as gospel and post it on their blogs, while the technically correct info is posted on a website deep in the Google index because it hasn't been updated!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248218</id>
	<title>Re:Yet Another Reason</title>
	<author>youknowjack</author>
	<datestamp>1259355360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Please explain why you'd rather not reveal your referrer data. (New example from TFA aside.)</p></div><p>
Maybe if you're embarassed because you still use Altavista search</p></div>
	</htmltext>
<tokenext>Please explain why you 'd rather not reveal your referrer data .
( New example from TFA aside .
) Maybe if you 're embarassed because you still use Altavista search</tokentext>
<sentencetext>Please explain why you'd rather not reveal your referrer data.
(New example from TFA aside.
)
Maybe if you're embarassed because you still use Altavista search
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247074</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247882</id>
	<title>Poor unsuspecting non-geeks...=)</title>
	<author>Shaper of Myths</author>
	<datestamp>1259353140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use all the same things that fellow geeks tend to use...Adblock Plus, NoScript, host file, etc. They work great for me but for the average person (family, friends, customers, etc) I find that a few minutes of explaining the existence and nature of the 'dark side', combined with the addition of a few basic measures keeps most of the crap at bay with little effort on their part. From speaking to them on a regular basis (I've been driving around fixing home and business machines for over 5 years now (3-5 calls per day) with a small Boston-area company so I've seen a huge cross-section of users) I've pieced together what I think is the root of the matter..."Internet Security" programs...</p><p>These things (Norton and McAfee are the worst) claim to do everything but make people breakfast, not only on the package but also on their websites. Most machines even come with free trials of these bastards installed by default. They have cartoon interfaces with green lights and checkboxes and all manner of condescending 'you are safe' messages all over them. What they fail to mention is that they can only effectively protect against what is on their 'lists'. I understand they need to make money but its downright deceptive to give people the expectation that they don't have to do anything to keep themselves safe. Once the average person installs one of these monsters they assume (and yes its foolish to assume anything but to them the computer is a tool, not a second job) that nothing can harm them. After all they paid money for it to protect them. Most are horrified to find out that these things are smoke and mirrors and that even though their AV says 'you're protected' they still ended up infected with a rootkit or something similar that completely evaded detection because it had hit the ground running less than 24hrs previously.</p><p>The particular attack form that hits sites like the ones mentioned in the article is the worst, and actually relies on the AV vendors own obnoxiousness to trick people. Regular AV software loves to pop up and announce how great a job its doing. Most people ignore these and just click whatever they have to to dismiss them. Why? Not out of stupidity (usually) but because it happens so frequently that they've become desensitized to it. So when they are on a site and a popup announces they've been infected and that unfortunately they need to renew their subscription to fix the problem, they click what they need to in order to get back to what they were doing. They don't notice that words are slightly mis-spelled or that Antivirus 2010 doesn't say McAfee or whatever it is that they've got. They see a giant cartoon with warning messages and a 'fix it' button. It all happens so quickly that most of the time when I'm talking to a customer about it they don't remember actually doing it until an hour into the call.</p><p>Whats the solution? I don't think there is a perfect one, but I can say that I've had tremendous luck over the last several years with a very basic approach. Currently it consists of the following...</p><p>Education - a 15 minute conversation (in plain english btw) can save you hours of repairs later. once people have a realistic expectation of what their role is in their own safety they become better users<br>Getting them to use IE only for the sites they absolutely need it for (usually internal work-related ones)<br>Migrating them to Firefox w/Adblock Plus and Web of Trust (the ad filtering is a great way to get most people to dump IE in a heartbeat)<br>OpenDNS set up on their router with the updater service running on one of their machines (only if they want sites blocked for kids/employees/whatever)<br>Basic antivirus (AVG, MSE, etc) with as many of the more annoying features shut off as is possible so that when they see a message they might stop to read it.</p><p>With the above stuff in place the only malware-related things I need to get rid of are usually related to a toolbar that something like Java installed on them or if someones kid went off to pirate something and got infected (thus bypassing any security in place by looking for trouble actively).</p><p>YMMV of course...</p></htmltext>
<tokenext>I use all the same things that fellow geeks tend to use...Adblock Plus , NoScript , host file , etc .
They work great for me but for the average person ( family , friends , customers , etc ) I find that a few minutes of explaining the existence and nature of the 'dark side ' , combined with the addition of a few basic measures keeps most of the crap at bay with little effort on their part .
From speaking to them on a regular basis ( I 've been driving around fixing home and business machines for over 5 years now ( 3-5 calls per day ) with a small Boston-area company so I 've seen a huge cross-section of users ) I 've pieced together what I think is the root of the matter... " Internet Security " programs...These things ( Norton and McAfee are the worst ) claim to do everything but make people breakfast , not only on the package but also on their websites .
Most machines even come with free trials of these bastards installed by default .
They have cartoon interfaces with green lights and checkboxes and all manner of condescending 'you are safe ' messages all over them .
What they fail to mention is that they can only effectively protect against what is on their 'lists' .
I understand they need to make money but its downright deceptive to give people the expectation that they do n't have to do anything to keep themselves safe .
Once the average person installs one of these monsters they assume ( and yes its foolish to assume anything but to them the computer is a tool , not a second job ) that nothing can harm them .
After all they paid money for it to protect them .
Most are horrified to find out that these things are smoke and mirrors and that even though their AV says 'you 're protected ' they still ended up infected with a rootkit or something similar that completely evaded detection because it had hit the ground running less than 24hrs previously.The particular attack form that hits sites like the ones mentioned in the article is the worst , and actually relies on the AV vendors own obnoxiousness to trick people .
Regular AV software loves to pop up and announce how great a job its doing .
Most people ignore these and just click whatever they have to to dismiss them .
Why ? Not out of stupidity ( usually ) but because it happens so frequently that they 've become desensitized to it .
So when they are on a site and a popup announces they 've been infected and that unfortunately they need to renew their subscription to fix the problem , they click what they need to in order to get back to what they were doing .
They do n't notice that words are slightly mis-spelled or that Antivirus 2010 does n't say McAfee or whatever it is that they 've got .
They see a giant cartoon with warning messages and a 'fix it ' button .
It all happens so quickly that most of the time when I 'm talking to a customer about it they do n't remember actually doing it until an hour into the call.Whats the solution ?
I do n't think there is a perfect one , but I can say that I 've had tremendous luck over the last several years with a very basic approach .
Currently it consists of the following...Education - a 15 minute conversation ( in plain english btw ) can save you hours of repairs later .
once people have a realistic expectation of what their role is in their own safety they become better usersGetting them to use IE only for the sites they absolutely need it for ( usually internal work-related ones ) Migrating them to Firefox w/Adblock Plus and Web of Trust ( the ad filtering is a great way to get most people to dump IE in a heartbeat ) OpenDNS set up on their router with the updater service running on one of their machines ( only if they want sites blocked for kids/employees/whatever ) Basic antivirus ( AVG , MSE , etc ) with as many of the more annoying features shut off as is possible so that when they see a message they might stop to read it.With the above stuff in place the only malware-related things I need to get rid of are usually related to a toolbar that something like Java installed on them or if someones kid went off to pirate something and got infected ( thus bypassing any security in place by looking for trouble actively ) .YMMV of course.. .</tokentext>
<sentencetext>I use all the same things that fellow geeks tend to use...Adblock Plus, NoScript, host file, etc.
They work great for me but for the average person (family, friends, customers, etc) I find that a few minutes of explaining the existence and nature of the 'dark side', combined with the addition of a few basic measures keeps most of the crap at bay with little effort on their part.
From speaking to them on a regular basis (I've been driving around fixing home and business machines for over 5 years now (3-5 calls per day) with a small Boston-area company so I've seen a huge cross-section of users) I've pieced together what I think is the root of the matter..."Internet Security" programs...These things (Norton and McAfee are the worst) claim to do everything but make people breakfast, not only on the package but also on their websites.
Most machines even come with free trials of these bastards installed by default.
They have cartoon interfaces with green lights and checkboxes and all manner of condescending 'you are safe' messages all over them.
What they fail to mention is that they can only effectively protect against what is on their 'lists'.
I understand they need to make money but its downright deceptive to give people the expectation that they don't have to do anything to keep themselves safe.
Once the average person installs one of these monsters they assume (and yes its foolish to assume anything but to them the computer is a tool, not a second job) that nothing can harm them.
After all they paid money for it to protect them.
Most are horrified to find out that these things are smoke and mirrors and that even though their AV says 'you're protected' they still ended up infected with a rootkit or something similar that completely evaded detection because it had hit the ground running less than 24hrs previously.The particular attack form that hits sites like the ones mentioned in the article is the worst, and actually relies on the AV vendors own obnoxiousness to trick people.
Regular AV software loves to pop up and announce how great a job its doing.
Most people ignore these and just click whatever they have to to dismiss them.
Why? Not out of stupidity (usually) but because it happens so frequently that they've become desensitized to it.
So when they are on a site and a popup announces they've been infected and that unfortunately they need to renew their subscription to fix the problem, they click what they need to in order to get back to what they were doing.
They don't notice that words are slightly mis-spelled or that Antivirus 2010 doesn't say McAfee or whatever it is that they've got.
They see a giant cartoon with warning messages and a 'fix it' button.
It all happens so quickly that most of the time when I'm talking to a customer about it they don't remember actually doing it until an hour into the call.Whats the solution?
I don't think there is a perfect one, but I can say that I've had tremendous luck over the last several years with a very basic approach.
Currently it consists of the following...Education - a 15 minute conversation (in plain english btw) can save you hours of repairs later.
once people have a realistic expectation of what their role is in their own safety they become better usersGetting them to use IE only for the sites they absolutely need it for (usually internal work-related ones)Migrating them to Firefox w/Adblock Plus and Web of Trust (the ad filtering is a great way to get most people to dump IE in a heartbeat)OpenDNS set up on their router with the updater service running on one of their machines (only if they want sites blocked for kids/employees/whatever)Basic antivirus (AVG, MSE, etc) with as many of the more annoying features shut off as is possible so that when they see a message they might stop to read it.With the above stuff in place the only malware-related things I need to get rid of are usually related to a toolbar that something like Java installed on them or if someones kid went off to pirate something and got infected (thus bypassing any security in place by looking for trouble actively).YMMV of course...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246042</id>
	<title>I don't think Google has a long tail.</title>
	<author>Shikaku</author>
	<datestamp>1259340900000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p>But it sure does have a hell of a deep end.</p></htmltext>
<tokenext>But it sure does have a hell of a deep end .</tokentext>
<sentencetext>But it sure does have a hell of a deep end.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30280310</id>
	<title>"Don't simply notice"?</title>
	<author>HTH NE1</author>
	<datestamp>1259700420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>webmasters of the compromised sites and their hosting providers don't simply notice this illicit activity.</p></div><p>How do they notice it then? Complexly?</p><p>You can't expect words to mean the same thing when you string them together out of order.</p></div>
	</htmltext>
<tokenext>webmasters of the compromised sites and their hosting providers do n't simply notice this illicit activity.How do they notice it then ?
Complexly ? You ca n't expect words to mean the same thing when you string them together out of order .</tokentext>
<sentencetext>webmasters of the compromised sites and their hosting providers don't simply notice this illicit activity.How do they notice it then?
Complexly?You can't expect words to mean the same thing when you string them together out of order.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246332</id>
	<title>Economic and Political Solutions?</title>
	<author>Anonymous</author>
	<datestamp>1259343060000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>I get what these extortion-ware programs are. I've removed a few from my various relatives windows machines with malwarebytes and 1 other program (it's funny how no 1 program seems to be able to remove these vicious buggers).  What I don't understand is how these a$$holes are getting their money.  So the last time it happened to my uncle I told him to pay.  He paid with a visa, waited a week and disputed the charge. It took him a few weeks, but finally got the chargeback, which I'm sure cost the a$$holes some of their own cash.  Of course, during this period of time, the "anti-virus 2009" wasn't actually removed, but was weakened enough for my uncle to hop on the net and download his own malwarebytes and clean his system up.  From now on, every time a relative gets this or one of its bastard brothers, I'm advising a "pay now and charge-back a week later" approach.  I hope it catches on and the credit card companies, whose love of money has thus far blinded them to the illegal extortion scheme they've been aiding, decides it just isn't profitable to keep moving money for the a$$holes.</p><p>Which brings me to my second point.  I have a 5 year old son. I explained in simple terms, without analogy what the a$$holes are doing, and HE grasped that it was wrong, so why haven't our law enforcement official done so? I assume without knowing that most of the a$$holes are foreign nationals. FOLLOW THE DAMN MONEY. I can hire a P.I. for $250 who could tell me where the money is going.  When the money get's where it's going, have our LEO on the phone with the local LEO and, just a name off the top of my head Hillary Clinton on 3-way, and a DEMAND that whoever got the money start talking.  If Hillary can't be bothered, fire the bitch and get someone who can spare 20 minutes to help thousands maybe hundreds of thousands of their countrymen not be extorted.  Rinse, repeat as necessary until we get to the BIG CHEESE.  Don't extradite, let them be tried wherever they're found, preferably with charges that translate to "screwing with our government's aid deals with the U.S. (there aren't THAT many countries the U.S. isn't funneling money, or at LEAST food too).</p><p>Functionally, there isn't much difference between these programs and foreign nationals walking into grandma's house and ripping her computer out and refusing to hand it back without $30.  If we can't fix such an obvious problem economically, or politically, then we are left with a 3'rd option. Find them and take them out with drones.  I'm not even remotely kidding. I hope it doesn't come to it, but how many of us would bat an eye if it did?</p></htmltext>
<tokenext>I get what these extortion-ware programs are .
I 've removed a few from my various relatives windows machines with malwarebytes and 1 other program ( it 's funny how no 1 program seems to be able to remove these vicious buggers ) .
What I do n't understand is how these a $ $ holes are getting their money .
So the last time it happened to my uncle I told him to pay .
He paid with a visa , waited a week and disputed the charge .
It took him a few weeks , but finally got the chargeback , which I 'm sure cost the a $ $ holes some of their own cash .
Of course , during this period of time , the " anti-virus 2009 " was n't actually removed , but was weakened enough for my uncle to hop on the net and download his own malwarebytes and clean his system up .
From now on , every time a relative gets this or one of its bastard brothers , I 'm advising a " pay now and charge-back a week later " approach .
I hope it catches on and the credit card companies , whose love of money has thus far blinded them to the illegal extortion scheme they 've been aiding , decides it just is n't profitable to keep moving money for the a $ $ holes.Which brings me to my second point .
I have a 5 year old son .
I explained in simple terms , without analogy what the a $ $ holes are doing , and HE grasped that it was wrong , so why have n't our law enforcement official done so ?
I assume without knowing that most of the a $ $ holes are foreign nationals .
FOLLOW THE DAMN MONEY .
I can hire a P.I .
for $ 250 who could tell me where the money is going .
When the money get 's where it 's going , have our LEO on the phone with the local LEO and , just a name off the top of my head Hillary Clinton on 3-way , and a DEMAND that whoever got the money start talking .
If Hillary ca n't be bothered , fire the bitch and get someone who can spare 20 minutes to help thousands maybe hundreds of thousands of their countrymen not be extorted .
Rinse , repeat as necessary until we get to the BIG CHEESE .
Do n't extradite , let them be tried wherever they 're found , preferably with charges that translate to " screwing with our government 's aid deals with the U.S. ( there are n't THAT many countries the U.S. is n't funneling money , or at LEAST food too ) .Functionally , there is n't much difference between these programs and foreign nationals walking into grandma 's house and ripping her computer out and refusing to hand it back without $ 30 .
If we ca n't fix such an obvious problem economically , or politically , then we are left with a 3'rd option .
Find them and take them out with drones .
I 'm not even remotely kidding .
I hope it does n't come to it , but how many of us would bat an eye if it did ?</tokentext>
<sentencetext>I get what these extortion-ware programs are.
I've removed a few from my various relatives windows machines with malwarebytes and 1 other program (it's funny how no 1 program seems to be able to remove these vicious buggers).
What I don't understand is how these a$$holes are getting their money.
So the last time it happened to my uncle I told him to pay.
He paid with a visa, waited a week and disputed the charge.
It took him a few weeks, but finally got the chargeback, which I'm sure cost the a$$holes some of their own cash.
Of course, during this period of time, the "anti-virus 2009" wasn't actually removed, but was weakened enough for my uncle to hop on the net and download his own malwarebytes and clean his system up.
From now on, every time a relative gets this or one of its bastard brothers, I'm advising a "pay now and charge-back a week later" approach.
I hope it catches on and the credit card companies, whose love of money has thus far blinded them to the illegal extortion scheme they've been aiding, decides it just isn't profitable to keep moving money for the a$$holes.Which brings me to my second point.
I have a 5 year old son.
I explained in simple terms, without analogy what the a$$holes are doing, and HE grasped that it was wrong, so why haven't our law enforcement official done so?
I assume without knowing that most of the a$$holes are foreign nationals.
FOLLOW THE DAMN MONEY.
I can hire a P.I.
for $250 who could tell me where the money is going.
When the money get's where it's going, have our LEO on the phone with the local LEO and, just a name off the top of my head Hillary Clinton on 3-way, and a DEMAND that whoever got the money start talking.
If Hillary can't be bothered, fire the bitch and get someone who can spare 20 minutes to help thousands maybe hundreds of thousands of their countrymen not be extorted.
Rinse, repeat as necessary until we get to the BIG CHEESE.
Don't extradite, let them be tried wherever they're found, preferably with charges that translate to "screwing with our government's aid deals with the U.S. (there aren't THAT many countries the U.S. isn't funneling money, or at LEAST food too).Functionally, there isn't much difference between these programs and foreign nationals walking into grandma's house and ripping her computer out and refusing to hand it back without $30.
If we can't fix such an obvious problem economically, or politically, then we are left with a 3'rd option.
Find them and take them out with drones.
I'm not even remotely kidding.
I hope it doesn't come to it, but how many of us would bat an eye if it did?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</id>
	<title>Bogus blogs and duplicate newsfeeds</title>
	<author>HockeyPuck</author>
	<datestamp>1259342340000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.  I wish google would realize these are all the exact same thread and combine them into a single response.</p></htmltext>
<tokenext>Speaking of bogus blogs... What really ticks me off is if I 'm searching for a answer to a technical problem , I often find the same message thread on 10 different sites .
I wish google would realize these are all the exact same thread and combine them into a single response .</tokentext>
<sentencetext>Speaking of bogus blogs... What really ticks me off is if I'm searching for a answer to a technical problem, I often find the same message thread on 10 different sites.
I wish google would realize these are all the exact same thread and combine them into a single response.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247540</id>
	<title>Re:Ho Hum</title>
	<author>Anonymous</author>
	<datestamp>1259351100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>"Windows is a vulnerable POS" "New virus/trojan/worm affects Windows" "Every Windows computer can be assumed to be compromised, trojan-laden, and part of some botnet thats either being used to compromise other Windows machines, capture the user's personal information and/or to pump out anonymous spam".</p><p>Assume these as static truths. Eg, not 'news'.</p><p>Now what would *really* be news, is if a day went by and there wasn't some new compromise/attack/vulnerability affecting Windows machines.</p><p>I live in hope that someday one of these trojan/worm/virus writers, distribute something that erases the entire hard drive, flashes all flashable memory on the machine, and then powers it down. But of course, they'll never do that, because then they'd be destroying the very resources they use to proliferate.</p></div><p>I can only hope that one day, somebody comes and destroys your life's work, simply because they disagreed with you.  This is what you are saying about 96\% of people who have a computer.
<br> <br>
Don't be an asshole.
<br> <br>
People's lives are on their computers anymore, everything from pictures of family/trips/random life, to family videos, to novels, academic papers, to every other goddamn thing they can have on a computer.  You want to ruin people's lives simply because they use Windows.
<br> <br>
You are quite possibly one of the biggest douchebags I have ever met online.</p></div>
	</htmltext>
<tokenext>" Windows is a vulnerable POS " " New virus/trojan/worm affects Windows " " Every Windows computer can be assumed to be compromised , trojan-laden , and part of some botnet thats either being used to compromise other Windows machines , capture the user 's personal information and/or to pump out anonymous spam " .Assume these as static truths .
Eg , not 'news'.Now what would * really * be news , is if a day went by and there was n't some new compromise/attack/vulnerability affecting Windows machines.I live in hope that someday one of these trojan/worm/virus writers , distribute something that erases the entire hard drive , flashes all flashable memory on the machine , and then powers it down .
But of course , they 'll never do that , because then they 'd be destroying the very resources they use to proliferate.I can only hope that one day , somebody comes and destroys your life 's work , simply because they disagreed with you .
This is what you are saying about 96 \ % of people who have a computer .
Do n't be an asshole .
People 's lives are on their computers anymore , everything from pictures of family/trips/random life , to family videos , to novels , academic papers , to every other goddamn thing they can have on a computer .
You want to ruin people 's lives simply because they use Windows .
You are quite possibly one of the biggest douchebags I have ever met online .</tokentext>
<sentencetext>"Windows is a vulnerable POS" "New virus/trojan/worm affects Windows" "Every Windows computer can be assumed to be compromised, trojan-laden, and part of some botnet thats either being used to compromise other Windows machines, capture the user's personal information and/or to pump out anonymous spam".Assume these as static truths.
Eg, not 'news'.Now what would *really* be news, is if a day went by and there wasn't some new compromise/attack/vulnerability affecting Windows machines.I live in hope that someday one of these trojan/worm/virus writers, distribute something that erases the entire hard drive, flashes all flashable memory on the machine, and then powers it down.
But of course, they'll never do that, because then they'd be destroying the very resources they use to proliferate.I can only hope that one day, somebody comes and destroys your life's work, simply because they disagreed with you.
This is what you are saying about 96\% of people who have a computer.
Don't be an asshole.
People's lives are on their computers anymore, everything from pictures of family/trips/random life, to family videos, to novels, academic papers, to every other goddamn thing they can have on a computer.
You want to ruin people's lives simply because they use Windows.
You are quite possibly one of the biggest douchebags I have ever met online.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246560</id>
	<title>No-Script</title>
	<author>Anonymous</author>
	<datestamp>1259344620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I tried to reproduce this.  But I was running noscript.  I had to enable a half dozen sites before I could see what they were talking about.</p></htmltext>
<tokenext>I tried to reproduce this .
But I was running noscript .
I had to enable a half dozen sites before I could see what they were talking about .</tokentext>
<sentencetext>I tried to reproduce this.
But I was running noscript.
I had to enable a half dozen sites before I could see what they were talking about.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30252894</id>
	<title>Clever social engineering</title>
	<author>Vadim Makarov</author>
	<datestamp>1259350380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I encountered this over a year ago. In the summer 2008, to be exact. A large academic publisher's website was hacked to redirect to malware when seeing "google" in the REFERER string, yet function normally otherwise. It has taken me a day to realize it wasn't Google's or my computer problem. It has taken me two or three emails to a journal editor over a couple weeks to have the site webmaster finally notice and believe it was his server responsible and not something else. Half the traffric was hijacked, yet webmasters usually checked their own websites not through Google and assumed everything looked normal. This was an efficient trick the first time it was used.</htmltext>
<tokenext>I encountered this over a year ago .
In the summer 2008 , to be exact .
A large academic publisher 's website was hacked to redirect to malware when seeing " google " in the REFERER string , yet function normally otherwise .
It has taken me a day to realize it was n't Google 's or my computer problem .
It has taken me two or three emails to a journal editor over a couple weeks to have the site webmaster finally notice and believe it was his server responsible and not something else .
Half the traffric was hijacked , yet webmasters usually checked their own websites not through Google and assumed everything looked normal .
This was an efficient trick the first time it was used .</tokentext>
<sentencetext>I encountered this over a year ago.
In the summer 2008, to be exact.
A large academic publisher's website was hacked to redirect to malware when seeing "google" in the REFERER string, yet function normally otherwise.
It has taken me a day to realize it wasn't Google's or my computer problem.
It has taken me two or three emails to a journal editor over a couple weeks to have the site webmaster finally notice and believe it was his server responsible and not something else.
Half the traffric was hijacked, yet webmasters usually checked their own websites not through Google and assumed everything looked normal.
This was an efficient trick the first time it was used.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247822</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>colesw</author>
	<datestamp>1259352840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As a note, at least for Experts Exchange, you can scroll to the bottom of the page to see the content.</htmltext>
<tokenext>As a note , at least for Experts Exchange , you can scroll to the bottom of the page to see the content .</tokentext>
<sentencetext>As a note, at least for Experts Exchange, you can scroll to the bottom of the page to see the content.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246374</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246374</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>Anonymous</author>
	<datestamp>1259343360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yes, those sites have actually become more annoying than the regular Experts Exchange-like sites that show content to google but not real users, at least those sites have the answer and can generally be tricked in various ways, the sites that just copy mailing lists are useless, especially the ones that "match" a hundred different questions so that they'll always be in the top 10 for a lot of searches yet they don't even have the answers to the questions, just other vaguely related questions.</p><p>/Mikael</p></htmltext>
<tokenext>Yes , those sites have actually become more annoying than the regular Experts Exchange-like sites that show content to google but not real users , at least those sites have the answer and can generally be tricked in various ways , the sites that just copy mailing lists are useless , especially the ones that " match " a hundred different questions so that they 'll always be in the top 10 for a lot of searches yet they do n't even have the answers to the questions , just other vaguely related questions./Mikael</tokentext>
<sentencetext>Yes, those sites have actually become more annoying than the regular Experts Exchange-like sites that show content to google but not real users, at least those sites have the answer and can generally be tricked in various ways, the sites that just copy mailing lists are useless, especially the ones that "match" a hundred different questions so that they'll always be in the top 10 for a lot of searches yet they don't even have the answers to the questions, just other vaguely related questions./Mikael</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246708</id>
	<title>Re:Badware?</title>
	<author>tyme</author>
	<datestamp>1259345580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Good point! It should be "ungoodware" (or, maybe, "double plus ungoodware")</p></htmltext>
<tokenext>Good point !
It should be " ungoodware " ( or , maybe , " double plus ungoodware " )</tokentext>
<sentencetext>Good point!
It should be "ungoodware" (or, maybe, "double plus ungoodware")</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247484</id>
	<title>Re:Ho Hum</title>
	<author>dskzero</author>
	<datestamp>1259350860000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>News would be that no one takes time to complain about windows whenever some new vulnerability is discovered.

I'm willing to be that if any one linux distribution was used as much as windows, the story would be different.</htmltext>
<tokenext>News would be that no one takes time to complain about windows whenever some new vulnerability is discovered .
I 'm willing to be that if any one linux distribution was used as much as windows , the story would be different .</tokentext>
<sentencetext>News would be that no one takes time to complain about windows whenever some new vulnerability is discovered.
I'm willing to be that if any one linux distribution was used as much as windows, the story would be different.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246396</id>
	<title>Interesting timing</title>
	<author>wwphx</author>
	<datestamp>1259343480000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>I've had probably 50 people try to register on my message board in the last couple of weeks, mainly from RIPE in Amsterdam and LACNIC in Montevideo.  I've considered banning RIPE's IP addresses entirely.  The ones that I have approved have been posting your typical porn and Viagra links, I'm not sure if this is exactly the same as I won't follow their liniks to see if it's to blog posts.<br> <br>
I wasn't sure if there'd been a compromise for SMF boards or if there's a list of low-activity boards that spammers share where my site got listed recently and thus people are trying to post there or what, but I've had to turn on administrator-approval of all memberships, which really ticks me off.  I'm thinking about reinstalling my board to change the directory but haven't had time to mess with it.</htmltext>
<tokenext>I 've had probably 50 people try to register on my message board in the last couple of weeks , mainly from RIPE in Amsterdam and LACNIC in Montevideo .
I 've considered banning RIPE 's IP addresses entirely .
The ones that I have approved have been posting your typical porn and Viagra links , I 'm not sure if this is exactly the same as I wo n't follow their liniks to see if it 's to blog posts .
I was n't sure if there 'd been a compromise for SMF boards or if there 's a list of low-activity boards that spammers share where my site got listed recently and thus people are trying to post there or what , but I 've had to turn on administrator-approval of all memberships , which really ticks me off .
I 'm thinking about reinstalling my board to change the directory but have n't had time to mess with it .</tokentext>
<sentencetext>I've had probably 50 people try to register on my message board in the last couple of weeks, mainly from RIPE in Amsterdam and LACNIC in Montevideo.
I've considered banning RIPE's IP addresses entirely.
The ones that I have approved have been posting your typical porn and Viagra links, I'm not sure if this is exactly the same as I won't follow their liniks to see if it's to blog posts.
I wasn't sure if there'd been a compromise for SMF boards or if there's a list of low-activity boards that spammers share where my site got listed recently and thus people are trying to post there or what, but I've had to turn on administrator-approval of all memberships, which really ticks me off.
I'm thinking about reinstalling my board to change the directory but haven't had time to mess with it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30250752</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>Anonymous</author>
	<datestamp>1259326020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I suppose you are referring to ExpertsExchange.com.</p><p>However, the answers actually ARE on the page.  You scroll to the bottom, past all the statements trying to get you to join, and the entire conversation, answers and all, are right there.</p><p>This is why the site (and others like it) get so many inbound links and does so well in google.</p></htmltext>
<tokenext>I suppose you are referring to ExpertsExchange.com.However , the answers actually ARE on the page .
You scroll to the bottom , past all the statements trying to get you to join , and the entire conversation , answers and all , are right there.This is why the site ( and others like it ) get so many inbound links and does so well in google .</tokentext>
<sentencetext>I suppose you are referring to ExpertsExchange.com.However, the answers actually ARE on the page.
You scroll to the bottom, past all the statements trying to get you to join, and the entire conversation, answers and all, are right there.This is why the site (and others like it) get so many inbound links and does so well in google.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246438</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248164</id>
	<title>Re:I noticed</title>
	<author>ralphdaugherty</author>
	<datestamp>1259355000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>Do they make more doing this than setting up something legal?</i></p><p>
&nbsp; &nbsp; &nbsp; short obvious answer, yes.</p></htmltext>
<tokenext>Do they make more doing this than setting up something legal ?
      short obvious answer , yes .</tokentext>
<sentencetext>Do they make more doing this than setting up something legal?
      short obvious answer, yes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246302</id>
	<title>Re:Badware?</title>
	<author>thijsh</author>
	<datestamp>1259342820000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>Good idea to dumb it down... most of my family or collegues will stop understanding and thus really listening when they hear words like malware. When you want to educate people be prepared to explain it in a simple way they understand, it will save you work later.<br>
And when you start to lose them just tell them "the evil hackers will plunder their bank account", this will give you about 3 minutes extra attention span.<nobr> <wbr></nobr>;)</htmltext>
<tokenext>Good idea to dumb it down... most of my family or collegues will stop understanding and thus really listening when they hear words like malware .
When you want to educate people be prepared to explain it in a simple way they understand , it will save you work later .
And when you start to lose them just tell them " the evil hackers will plunder their bank account " , this will give you about 3 minutes extra attention span .
; )</tokentext>
<sentencetext>Good idea to dumb it down... most of my family or collegues will stop understanding and thus really listening when they hear words like malware.
When you want to educate people be prepared to explain it in a simple way they understand, it will save you work later.
And when you start to lose them just tell them "the evil hackers will plunder their bank account", this will give you about 3 minutes extra attention span.
;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160</id>
	<title>Yet Another Reason</title>
	<author>Anonymous</author>
	<datestamp>1259341800000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext>to use anti-tracking measures.  For example, the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been.  I use several other measures as well (such as redirect removers) because Web sites are on a need-to-know basis and I don't recognize their need to know where I've been or how I got to their page.  If I visited such a blog from Google, the blog site would not know it and it would look to the site like I just went directly to its page.  I use Linux but if I were using a Windows system vulnerable to these exploits, I still would not receive the exploits.  There are already abundant reasons not to give away your usage data to anyone who wants it; this just provides one more.</htmltext>
<tokenext>to use anti-tracking measures .
For example , the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been .
I use several other measures as well ( such as redirect removers ) because Web sites are on a need-to-know basis and I do n't recognize their need to know where I 've been or how I got to their page .
If I visited such a blog from Google , the blog site would not know it and it would look to the site like I just went directly to its page .
I use Linux but if I were using a Windows system vulnerable to these exploits , I still would not receive the exploits .
There are already abundant reasons not to give away your usage data to anyone who wants it ; this just provides one more .</tokentext>
<sentencetext>to use anti-tracking measures.
For example, the HTTP Referrer sent by my browser always gives the site its own homepage no matter what the actual referrer would have been.
I use several other measures as well (such as redirect removers) because Web sites are on a need-to-know basis and I don't recognize their need to know where I've been or how I got to their page.
If I visited such a blog from Google, the blog site would not know it and it would look to the site like I just went directly to its page.
I use Linux but if I were using a Windows system vulnerable to these exploits, I still would not receive the exploits.
There are already abundant reasons not to give away your usage data to anyone who wants it; this just provides one more.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30251472</id>
	<title>Re:Bogus blogs and duplicate newsfeeds</title>
	<author>BillX</author>
	<datestamp>1259331060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Be thankful, those at least have some chance of having an answer to the technical problem, even if there are copies scattered all over. Outside of the "program x barfs cryptic error message y"-type queries, my results for any search containing a vaguely technical/engineering term all start with "System and method of..." I've actually started adding -patent to my queries to not have to click past the 3 pages of junk patent applications that somehow manage to claw their way to the top of the listings.</p></htmltext>
<tokenext>Be thankful , those at least have some chance of having an answer to the technical problem , even if there are copies scattered all over .
Outside of the " program x barfs cryptic error message y " -type queries , my results for any search containing a vaguely technical/engineering term all start with " System and method of... " I 've actually started adding -patent to my queries to not have to click past the 3 pages of junk patent applications that somehow manage to claw their way to the top of the listings .</tokentext>
<sentencetext>Be thankful, those at least have some chance of having an answer to the technical problem, even if there are copies scattered all over.
Outside of the "program x barfs cryptic error message y"-type queries, my results for any search containing a vaguely technical/engineering term all start with "System and method of..." I've actually started adding -patent to my queries to not have to click past the 3 pages of junk patent applications that somehow manage to claw their way to the top of the listings.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246456</id>
	<title>I noticed</title>
	<author>HangingChad</author>
	<datestamp>1259343900000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>One of my sites got hacked, along with a bunch of others on Inmotion Hosting.  Inmotion tried to claim the user client machines were compromised and all the hacks were just FTP connections, but I don't believe that.  It could have been related to an older version of phpbb I was running, but it didn't originate with my desktop.

</p><p>The hack added thousands of links to almost every html file in the site, pages and pages of links, and set up rogue directories packed with thousands of html pages (2,147 in one directory).  Took me days to clean all that crap out.  What was amazing was the sheer scope.  Thousands of websites all around the world compromised within a few days of one another and massive cross-linking network set up. It would take a big team to do that legally.

</p><p>It's hard to blame Google for an organization going to that much trouble to game the system.  I thought I ran a pretty secure site and it's hard to blame the host.

</p><p>Here's the head scratcher for me.  These people obviously have a very broad base of technical skill and resources.  Imagine if they applied that talent to something legal.  What's the payoff for all the trouble of building the link network?  Do they make more doing this than setting up something legal?</p></htmltext>
<tokenext>One of my sites got hacked , along with a bunch of others on Inmotion Hosting .
Inmotion tried to claim the user client machines were compromised and all the hacks were just FTP connections , but I do n't believe that .
It could have been related to an older version of phpbb I was running , but it did n't originate with my desktop .
The hack added thousands of links to almost every html file in the site , pages and pages of links , and set up rogue directories packed with thousands of html pages ( 2,147 in one directory ) .
Took me days to clean all that crap out .
What was amazing was the sheer scope .
Thousands of websites all around the world compromised within a few days of one another and massive cross-linking network set up .
It would take a big team to do that legally .
It 's hard to blame Google for an organization going to that much trouble to game the system .
I thought I ran a pretty secure site and it 's hard to blame the host .
Here 's the head scratcher for me .
These people obviously have a very broad base of technical skill and resources .
Imagine if they applied that talent to something legal .
What 's the payoff for all the trouble of building the link network ?
Do they make more doing this than setting up something legal ?</tokentext>
<sentencetext>One of my sites got hacked, along with a bunch of others on Inmotion Hosting.
Inmotion tried to claim the user client machines were compromised and all the hacks were just FTP connections, but I don't believe that.
It could have been related to an older version of phpbb I was running, but it didn't originate with my desktop.
The hack added thousands of links to almost every html file in the site, pages and pages of links, and set up rogue directories packed with thousands of html pages (2,147 in one directory).
Took me days to clean all that crap out.
What was amazing was the sheer scope.
Thousands of websites all around the world compromised within a few days of one another and massive cross-linking network set up.
It would take a big team to do that legally.
It's hard to blame Google for an organization going to that much trouble to game the system.
I thought I ran a pretty secure site and it's hard to blame the host.
Here's the head scratcher for me.
These people obviously have a very broad base of technical skill and resources.
Imagine if they applied that talent to something legal.
What's the payoff for all the trouble of building the link network?
Do they make more doing this than setting up something legal?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247294</id>
	<title>Bogus Antivirus</title>
	<author>GearheadX</author>
	<datestamp>1259349600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Been a lot longer than 6 months, I've been seeing these things on end user machines for over a year.</p></htmltext>
<tokenext>Been a lot longer than 6 months , I 've been seeing these things on end user machines for over a year .</tokentext>
<sentencetext>Been a lot longer than 6 months, I've been seeing these things on end user machines for over a year.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30254590</id>
	<title>Re:Ho Hum</title>
	<author>Anonymous</author>
	<datestamp>1259424480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you weren't quite so stupid, you'd realise that this, like most malware attacks, is a social engineering attack. They do not exploit any software vulnerability, they trick naive users into installing malware (which requires ignoring various warnings from the OS).</p><p>If you think a naive person who is tricked by a criminal deserves to lose whatever the criminal steals from them or destroys, then you are a pathetic excuse for a human being.</p></htmltext>
<tokenext>If you were n't quite so stupid , you 'd realise that this , like most malware attacks , is a social engineering attack .
They do not exploit any software vulnerability , they trick naive users into installing malware ( which requires ignoring various warnings from the OS ) .If you think a naive person who is tricked by a criminal deserves to lose whatever the criminal steals from them or destroys , then you are a pathetic excuse for a human being .</tokentext>
<sentencetext>If you weren't quite so stupid, you'd realise that this, like most malware attacks, is a social engineering attack.
They do not exploit any software vulnerability, they trick naive users into installing malware (which requires ignoring various warnings from the OS).If you think a naive person who is tricked by a criminal deserves to lose whatever the criminal steals from them or destroys, then you are a pathetic excuse for a human being.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246422</id>
	<title>Bing!</title>
	<author>blackfrancis75</author>
	<datestamp>1259343660000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>Those guys at Bing have been busy.<br>
(I know the trojan targets Windows - I say it's a hit they were willing to take)</htmltext>
<tokenext>Those guys at Bing have been busy .
( I know the trojan targets Windows - I say it 's a hit they were willing to take )</tokentext>
<sentencetext>Those guys at Bing have been busy.
(I know the trojan targets Windows - I say it's a hit they were willing to take)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246192</id>
	<title>Long Tail</title>
	<author>Kolargol00</author>
	<datestamp>1259342040000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext>The "long tail of search" TFA is referring to is explained in this <a href="http://www.wired.com/wired/archive/12.10/tail.html" title="wired.com" rel="nofollow">Wired article</a> [wired.com] and on <a href="http://longtail.typepad.com/the\_long\_tail/" title="typepad.com" rel="nofollow">its author's blog</a> [typepad.com].</htmltext>
<tokenext>The " long tail of search " TFA is referring to is explained in this Wired article [ wired.com ] and on its author 's blog [ typepad.com ] .</tokentext>
<sentencetext>The "long tail of search" TFA is referring to is explained in this Wired article [wired.com] and on its author's blog [typepad.com].</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248164
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246456
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246296
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247192
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248218
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247074
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30250752
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246438
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30251472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246310
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247136
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246302
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246708
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246322
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247540
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246616
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246354
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247484
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246374
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246334
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246416
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30254590
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_27_1437217_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247358
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246342
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247540
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30254590
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247484
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246332
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246218
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246416
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246302
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246354
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246616
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246334
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246296
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246708
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246236
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30251472
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247192
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246438
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30250752
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246374
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247822
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247358
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246396
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246160
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246310
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246322
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247074
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248218
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247136
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30246456
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30248164
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_27_1437217.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_27_1437217.30247312
</commentlist>
</conversation>
