Category Archives: WOT (Web of Trust)

Midget Lesbian Porn, Trannies With Knives, and Other Assorted Spam Comments

There’s not much that’s funny about comment spam. Comment spam has the potential to be dangerous – if it’s allowed to be blindly posted. I’ve written a number of articles dealing with the hows/whys of comment spam in the past, so I won’t belabor the point. If you wish you can checkout – Comment Spam Is Dangerous BS!

Over and above the danger it may pose to Internet travellers, by its very nature, comment spam is a pain in the patootie for bloggers who have to deal with it. Here on this site – every morning I’m forced to deal with upwards of 300+ pieces of comment spam. This morning for example – 358. These numbers do not include the 200 or more spam comments, that will arrive throughout the day.

Not a big problem you might think – just hit “delete all spam.” Done – over with – on to the next thing. Except, the downside to the quick erase method is; some genuine comments that may have a link/attachment (which will trigger the spam filter), get lost in the flush.

Recently, for example, a reader made the point that I had not posted his previous comment and questioned, if I intended to handle his current comment in the same way. Since I do not filter genuine comments, I could only assume that this reader’s prior comment had fallen victim to the “flush it down the toilet” method. An apology, of course, was in order. So, a pain in the patootie? You bet.

Even so, hard as it is to imagine – there is a bit of a silver lining to comment spam. Sure, I had to dig deep to find it – but, I have to admit – there are those rare moments when I get my morning coffee up my nose, when the unintentional humor of a spam comment catches me unaware.

Now, I don’t mean any disrespect to those who consider Midget Lesbian Porn to be the height of eroticism …………………….. (no, I better not write what I really want to say). But, the following brought tears to my eyes – tears of laughter, that is.

Midget lesbian porn dominican-republic-travelxxxxxx/ x
hflrzwnxko@vkukou.com

Lolita midget porn videos – dominican-republic-travelxxxxxx

Midget asian porn http://dominican-republic-travel-dealsxxx

Hard core midget porn pics, QzpMldJ.

All of the links actually resolve to – http:midgetporntube4u.com/?act=public_html/dominican-republic-travel-deals.net/&

Travelling to the site – if you’re running WOT – would pop up the following warning. Just a quick question for WOT though – why would “Child safety” be unrated?

image

But lets move on to the following. Both of these put a cramp in my sense of how to comment, in this post, gracefully. So, I’ll just say – WHAT?

Ticked off trannies with knives (referral link removed).

Penis enlargement bible free download (referral link removed).

But the best, the spam comments that leave me in stitches, are the Google Translate fails. One would think, that if a spammer went to all the trouble of writing a complex spam comment, he’d a least get it right.  Here’s a few recent examples.   Smile

I beloved up to you’ll receive carried out proper here. The comic strip is tasteful, your authored material stylish. however, you command get bought an impatience over that you wish be turning in the following. ill without a doubt come further beforehand once more since precisely the same nearly very incessantly inside case you protect this hike.

Pretty element of content. I simply stumbled upon your blog and in accession capital to say that I acquire actually loved account your blog posts. Anyway I’ll be subscribing in your augment or even I success you get admission to constantly quickly.

Undeniably imagine that that you stated. Your favourite justification seemed
to be at the internet the easiest thing to have in mind of. I say to you, I certainly get annoyed while folks consider concerns that they plainly don’t recognize about. You controlled to hit the nail upon the top and defined out the entire thing with no need side effect , other people can take a signal. Will probably be back to get more. Thank you

Simply desire to say your article is as astounding. The clarity to your put up is just nice and i could suppose you’re knowledgeable in this subject. Well together with your permission let me to grab your feed to keep updated with approaching post. Thank you one million and please carry on the rewarding work.

Fantastic goods from you, man. I’ve be aware your stuff prior to and you’re just too excellent. I really like what you’ve got right here, really like what you are stating and the way by which you are saying it. You are making it entertaining and you continue to take care of to stay it sensible. I cant wait to learn far more from you. This is really a great web site.

So you see – even comment spam has an upside. Sort of.   Smile

A quick note: In the 20 minutes it took to write this short piece, I’ve become the ungrateful recipient of another 118 spam comments. These guys just never give up.

16 Comments

Filed under Comment Spam, Porn, WOT (Web of Trust)

Google Gives Users The Finger One More Time

image

The Internet is one kickass place – survey after survey continue to show that cybercriminals are picking off unaware/undereducated users, as if they were shooting fish in a barrel. And Google, the “Do No Evil” company has just made it easier for the bad guys to take aim at you, and me. Read on.

As I reported in March of last year – Search Engine Results – More Malware Surprises Than Ever!

Cyber criminals have bumped up the level of search engine malware.

One in five search topics lead to malware…………

Google search results produced 38 percent of overall search engine malware.

Luckily, those users in the know – were aware that steps could be taken to mitigate the risk of an infection transmitted through a bad search engine result. The tool of choice – one I have long recommended to regular readers here – has been WOT (Web of Trust).

WOT, one of the most downloaded Firefox Add-ons at the Mozilla add-on site, (also compatible with Internet Explorer and Chrome), is a free Internet Browser resource which  investigates web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams – helping you avoid unsafe web sites.

For example, here’s a Google search in which WOT indicates which sites are safe. Notice the unsafe (red) sites, in the Google ads!

image

You can now scratch the reputation icon associated with the Google ads shown in the previous screen capture. Here’s the bad news. Google has reversed course, and no longer (as of April 13) allows a reputation assessment icon (in other words – a SAFETY assessment icon), to be displayed on Google sponsored ads.

According to WOT – “Due to Google’s policy change, WOT and some other similar tools can no longer show reputations for sponsored links on Google’s search results, or elsewhere on Google ads.”

In the following screen capture (taken today), you’ll notice WOT’s reputation icon (the green circle), attached to generic search results. You’ll also notice, on the TigerDirect (a Google ad), a reputation assessment is no longer available.

image

In my view, Google can take its “Do No Evil” motto, and “shove it where the sun don’t shine”. No matter the reasoning behind this move – the net result is, Internet surfers are at more risk than they were last week. Tell me that’s not EVIL!

A big “thank you” to regular reader Michael F. for the heads up.

26 Comments

Filed under Browser add-ons, Google, Internet Safety Tools, Software, WOT (Web of Trust)

Web of Trust (WOT) And Facebook Collaborate To Protect Users From Malicious Links

imageIf you’re a Facebook user and you haven’t met a cybercriminal yet; hang in there – you will. Survey after survey continue to show that cybercriminals are picking off Facebook users as if they were shooting fish in a barrel.

Most cybercriminal schemes on Facebook are outrageous. But the bad guys know, that even the most outrageous schemes stand a better than average chance of being successful when targeted at Facebook’s largely unaware, and unsophisticated, user base.

With the collaborative effort announced today by Facebook and Web of Trust, WOT will now provide protection against dubious and malicious web links, that Facebook users continue to be exposed to. When a Facebook user clicks a link that leads to a page with a poor reputation rating as defined by the WOT community, Facebook will show a clear warning message.

Click on graphic to expand to original.

image

The plan is to roll out to US users 100% on May 12, and then the following week, after the translators have time to finish their work, roll out globally.

A quick reminder:

WOT’s Browser add-on users see reputation icons on Web sites, Google search results, email links, Twitter, as well as shortened URLs. WOT ratings are recalculated every 30 minutes to ensure users have the freshest and most reliable information. The free WOT add-on works in all web browsers and can be downloaded here.

You can read a full review on the benefits of adding WOT to your Browser here on this site – WOT (Web of Trust) – Is It The Most Important Browser Security Add-on You Need To Install?

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

24 Comments

Filed under Anti-Malware Tools, Browser Plug-ins, Cyber Crime, Cyber Criminals, cybercrime, Don't Get Scammed, Don't Get Hacked, FaceBook, Firefox Add-ons, Freeware, Internet Explorer Add-ons, Malware Protection, Online Safety, social networking, Social Networks, Software, Windows Tips and Tools, WOT (Web of Trust)

WOT Beta for Social Media – Facebook, Twitter Protection And More

imageWOT (Web of Trust), has just raised the Internet security bar a notch by releasing a Beta version of their award winning Browser add-on which will provide protection against cybercriminals in a number of their favorite hunting grounds – Facebook and Twitter.

Hopefully, WOT’s reputation icons on links in Facebook, Twitter and additionally for shortened URLs by most popular services, such as bit.ly and t.co, will help thwart some of the most outrageous criminal schemes perpetrated on unaware social networking site users.

At the moment, the beta of WOT for social media is available for Firefox only. But, be quick – there are only 1000 preview downloads available!

Download the beta version of WOT for Social Media here.

According to WOT – “The new WOT version will be released in a few weeks for general WOT users, and newcomers.”

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Anti-Malware Tools, Browser add-ons, cybercrime, Firefox Add-ons, Freeware, Internet Safety Tools, Online Safety, Safe Surfing, social networking, Software, WOT (Web of Trust)

Cyber Criminals Bump Up Efficiency Using Cloud Services

In a comment response yesterday to regular reader Mal C., I made the point – “It’s the person at the keyboard, that’s where the trouble starts – not the OS”. Continuing the discussion with regular reader John B., I expanded on this –

“It’s the person at the keyboard, that’s where the trouble starts – not the OS”, is operative – no matter the operating system.

Just one example: Email accounts are continuously been phished (“your account will be deactivated”, is a popular approach), with the objective being to have the user respond with, password, DOB, mobile telephone number, etc.

If the phish is successful (and many are), the crook ends up controlling that account. Cyber crimes like this, are not system specific. They depend on unaware, undereducated users, for their success.”

As luck would have it, this morning I got an invitation from Commtouch, to post an upcoming article here on Tech Thoughts (which will be published on their site shortly), that partly supports this view.

Cloud Streamlines Efficiency of Identity Theft

Working with cloud-based services significantly improves economies of scale – for cybercriminals, too. Phishers are already benefiting from free hosting by hiding phishing pages within hacked legitimate sites.  Now, they are leveraging cloud-based form management sites, such as Google docs or formbuddy.com. to collect information from unwitting victims.

With this technique, the phisher does not have to worry about creating/managing/storing back-end form data and can more easily scale the harvesting of phished data.  Those duped into filling out the form will not be aware of this nuance.

We just hope victims are paying attention when they fill out a seemingly legitimate form that directly asks for an “email address password.” If their attention lags, they are giving the phisher a significant pay-off for a minimal investment: Identity theft.

This attack targets users of HomeAway holiday rentals – See the images below. Click on an image to expand.

image

A look at the page source reveals that the filled in form is sent to “formbuddy.com” and not collected directly by the phisher.  Formbuddy.com collects and stores all the responses to the “form” shown above, and then emails a neat summary to the phisher (whose login name is “fanek”).

image

As a matter of interest, WOT (Web of Trust) warns against visiting formbuddy.com, as per the following screen capture.

image

As an aware and educated computer user, I know that you wouldn’t be deceived by this type of clumsy attempt to defraud – under no circumstances would you disclose your email address password to anyone.

As I said at the opening, these schemes depend on unaware, undereducated users, for their success. Unfortunately, that describes far to many Internet users.

About Commtouch:

Commtouch provides proven Internet security technology to more than 150 security companies and service providers including 1&1, Check Point, F-Secure, Google, Microsoft, Panda Security, Rackspace, US Internet, WatchGuard and Webroot,, for integration into their solutions. Commtouch’s GlobalView™ and patented Recurrent Pattern Detection™ (RPD™) technologies are founded on a unique cloud-based approach, and protect effectively in all languages and formats.  Commtouch’s Command Antivirus utilizes a multi-layered approach to provide award winning malware detection and industry-leading performance.

More information is available here.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Cloud Computing, Cyber Crime, Cyber Criminals, Don't Get Scammed, Don't Get Hacked, email scams, Freeware, Internet Security Alerts, Online Safety, Phishing, Windows Tips and Tools, WOT (Web of Trust)

A Reader Wants To Know….

imageWe receive a wide variety of questions here, from the very simple, to the complex – all of which are equally as interesting. The following thought-provoking questions were all recently posed by a reader.

Which Antivirus application(s) would you recommend?

Let me answer this by telling you what I run on my principal home machine. Despite the fact that I’m provided with a free license for all the security applications I test, I have chosen the following applications.

Microsoft Security Essentials (free)

Immunet Protect – a free Cloud based companion antimalware application.

ThreatFire (free)

WinPatrol (free)

Pc Tools Firewall Plus (free) – I recently changed from ZoneAlarm (free), since I finally tired of their incessant ads.

Zemana AntiLogger (paid) – I’ve managed to pick up a free license each of the last 2 years, however.

Each of these applications has been reviewed (some several times), on my site. A site search using the search box will lead you to the relevant article/s.

How many Antivirus application(s) should I have installed on my laptop.

Typically the answer is straightforward – one (in order to avoid potential conflicts). However, nothing is really straightforward with a computer. For an in-depth answer, please read Can I Install And Use More Than One Antimalware Application? on my site.

Which Firewall would you recommend?

Over time, I have installed virtually every available Firewall, and I must admit, my favorite has always been ZoneAlarm – not only for its effectiveness, but also for its ease of use. As I said earlier though, I recently made the change back to PC Tools Firewall Plus – a Firewall I’ve used in the past that is as effective and as easy to use as ZoneAlarm (without the annoying ads).

Comodo Firewall, which you’re presently using, is an excellent application. I’ve used and reviewed this application in the past, and I have no difficulty in recommending it.

Which Malware/Spyware application(s) would you recommend?

Since Microsoft Security Essentials combines both antivirus, and antispyware in the same application, this is a very workable solution. Additionally, the issue of maintaining good control over system resource usage is addressed by employing this combination.

How many Malware/Spyware applications should I have installed on my laptop?

The same answer applies here as in the Antivirus question.

Which Backup and Recovery program(s) would you suggest?

The principal issues affecting backups are determined by how (the skill level of the user), and for what purpose, a computer is used. Typically, average users are convinced that backing up is beyond their knowledge level, and so avoid this necessary chore.

The reality is, major advances have been made in the development of simple, “push button” easy, backup applications. There are a many applications to choose from, both paid and free, and the one I’m very enthusiastic about at the moment is Free EASEUS Todo Backup. You can reread my recent review of this application here.

Which registry cleaner would you recommend?

Registry Cleaners are often referred to as the “snake oil” of the computer industry. There is a major difference of opinion concerning the value of these applications.

Generally speaking, it’s my view that this type of application should not be used by an average user – except for a very mild cleaner, such as Ccleaner, which I do, in fact, highly recommend.

There are times when a powerful cleaner, (such as RegSeeker), in skilled hands, can be beneficial.

Which Anonymous Surfing application would you recommend? (My privacy is mine and important to me).

I’ve reviewed and recommended quite a number of such applications here, but the application I’m most partial to (at the moment), is Free Hotspot Shield. You can read the latest review of this application here.

Finally – while you mentioned WOT and SnoopFree Privacy Shield, additional Browser protection is a critical ingredient in overall system protection. I recommend that you read the following article here – An IT Professional’s Must Have Firefox and Chrome Add-ons

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

23 Comments

Filed under Anti-Malware Tools, Antivirus Applications, Backup Applications, Browser add-ons, Computer Tools, downloads, Free Anti-malware Software, Free Firewalls, Free Security Programs, Interconnectivity, PC Tools, Point of View, Safe Surfing, Software, Spyware - Adware Protection, Utilities, Windows Tips and Tools, WOT (Web of Trust)