Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Dr. Orly Taitz, Esq.'s Website Infected Free Republic
Oh for Goodness Sake ^ | Aug 9, 2009 | Oh for Goodness Sake

Posted on 08/09/2009 5:56:47 AM PDT by SvenMagnussen

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last
To: Keith in Iowa
However, the Webmaster should be intelligent enough to cleanse the site of this crap NOW, and prevent it from happening in the future.

I looked her site over, and also did a DNS lookup to see who was hosting it. Based on what I saw, the site is hosted by her registrar (NetworkSolutions), and I strongly suspect it was created using one of standard web page templates that Network Solutions offers free with registration.

Short version: I don't think there's a "webmaster" involved here. It looks like a DIY page, mostly likely do to her trying to save money for the fight. Perhaps any one of our freepers with good html skills could offer their services.

21 posted on 08/09/2009 7:15:22 AM PDT by libravoter (Live from the People's Republic of Cambridge)
[ Post Reply | Private Reply | To 15 | View Replies]

To: SvenMagnussen

Last weekend, about every time I came to FR, I would get a notice of a Trojan from my antivirus software. This might explain those results. I haven’t had the problem since then, but I’ve been avoiding the birth certificate stories since then.


22 posted on 08/09/2009 7:18:06 AM PDT by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: Keith in Iowa
However, the Webmaster should be intelligent enough to cleanse the site of this crap NOW, and prevent it from happening in the future. If they (the webmaster) don’t - then they’re as worthless as an 0bama Hawaii birth certificate.

A lot of these happen on shared host servers. The webmaster dutifully cleans them up, but they and the other thousand or two sites on that server are promptly reinfected. The domain host generally stonewalls and denies any problem.


23 posted on 08/09/2009 7:19:26 AM PDT by Gorzaloon (Roark, Architect.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: cripplecreek

McAfee went nuts on my laptop when I went to her site. Never went again.


24 posted on 08/09/2009 7:19:35 AM PDT by rintense (Senior Marketing / IT / UX architect unemployed and looking for work. Freepmail me if you have leads)
[ Post Reply | Private Reply | To 6 | View Replies]

To: SvenMagnussen; John Robinson
Just maybe you folks really ought to learn how to use Free Republic's Search feature, especially the Comments of our resident guru - JohnRob:

As someone else said - the Wild Wooly Web is NOT anonymous nor without potholes - and as the LDot info shows, it's not just the site itself you have to worry about. I run all over the place with my Firefox and AdblockPlus & NoScript plugins, and have AVG, SuperAntiSpyware, and AdAware running on the system. I don't use Infernal Exploder except to visit Micro$oft, and so far have not had any infection since I brought this system live on XP-SP2 in Sept, 2007; but a lot of nasty stuff has been blocked.

Be careful out there. By the way, the offending exploit in Orly Taitz site has been taken off - for now. Considering Obama has his Acorn IT team in the White House I'm sure it's all coincidence that the 'anti-Obama' sites are getting hammered!

25 posted on 08/09/2009 7:25:33 AM PDT by brityank (The more I learn about the Constitution, the more I realise this Government is UNconstitutional !!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: libravoter
It's not hard to imagine that Orly has many many enemies.

Even folks who hope she is right dislike her because she is such a gibbering idiot.

26 posted on 08/09/2009 7:38:43 AM PDT by humblegunner (My Kung Fu is ten times power!)
[ Post Reply | Private Reply | To 20 | View Replies]

To: All

.

From Orly Taitz website:

‘There is no malaware sitting on my site, but George Soros’s son is sitting on Google board. He should look up the meaning of the word treason.’


27 posted on 08/09/2009 7:39:30 AM PDT by patriot08
[ Post Reply | Private Reply | To 25 | View Replies]

To: SvenMagnussen
It’s trying to run a shockwave flash movie that is 1pixel by 1 pixel in size. This is a well known attack vector to try and take advantage of a known flaw in flash that allows code to be run on your computer

I am creating a Flash-based websites. What countermeasures of inoculations can one install?

28 posted on 08/09/2009 8:04:12 AM PDT by FreepShop1
[ Post Reply | Private Reply | To 1 | View Replies]

To: SvenMagnussen
It’s trying to run a shockwave flash movie that is 1pixel by 1 pixel in size. This is a well known attack vector to try and take advantage of a known flaw in flash that allows code to be run on your computer

I am creating a Flash-based websites. What countermeasures or inoculations can one install?

29 posted on 08/09/2009 8:04:19 AM PDT by FreepShop1
[ Post Reply | Private Reply | To 1 | View Replies]

To: SvenMagnussen
It’s trying to run a shockwave flash movie that is 1pixel by 1 pixel in size. This is a well known attack vector to try and take advantage of a known flaw in flash that allows code to be run on your computer

I am creating a Flash-based websites. What countermeasures or inoculations can one install?

30 posted on 08/09/2009 8:04:31 AM PDT by FreepShop1
[ Post Reply | Private Reply | To 1 | View Replies]

To: patriot08

George Soros’s son is sitting on Google board

You have to be kidding me ?
This is turning into a nightmare.


31 posted on 08/09/2009 8:17:42 AM PDT by sonic109
[ Post Reply | Private Reply | To 27 | View Replies]

To: NYIslander
Well, I answered my own question here.

So, Firefox routinely asks Google whether a site is dangerous, or not. This is the default behavior, though it can be turned off.

As I said, I don't trust Google.

32 posted on 08/09/2009 8:21:56 AM PDT by Fresh Wind ("Prosperity is just around the corner." Herbert Hoover, 1932)
[ Post Reply | Private Reply | To 13 | View Replies]

To: DieHard the Hunter

The best option for something like this is a Firefox add on called “NoScript.” It won’t allow scripts to run without your permission. You can authorize safe sites, but it will automatically keep unknown third-party sites from running scripts like this.


33 posted on 08/09/2009 8:25:14 AM PDT by MediaMole
[ Post Reply | Private Reply | To 4 | View Replies]

To: FreepShop1
I am creating a Flash-based websites.

I Hate Flash websites. Anyone who doesn't provide an alternative for bypassing the Flash doesn't want my business.

34 posted on 08/09/2009 10:11:58 AM PDT by PAR35
[ Post Reply | Private Reply | To 29 | View Replies]

To: PAR35
I Hate Flash websites. Anyone who doesn't provide an alternative for bypassing the Flash doesn't want my business.

Not "flash-based" per se, but using Flash elements, which I am concerned might be hijacked by this method.

35 posted on 08/09/2009 10:23:42 AM PDT by FreepShop1
[ Post Reply | Private Reply | To 34 | View Replies]

To: humblegunner

Well, then there is also that.


36 posted on 08/09/2009 12:13:01 PM PDT by libravoter (Live from the People's Republic of Cambridge)
[ Post Reply | Private Reply | To 26 | View Replies]

To: FreepShop1

OK. When I hit a website,and I have to run Flash to do anything - no optional links to get in, I usually go somewhere else. If they have an option to enter without doing the Flash, I’ll be happy to visit.


37 posted on 08/09/2009 2:21:00 PM PDT by PAR35
[ Post Reply | Private Reply | To 35 | View Replies]

To: SvenMagnussen

I visited her website during the time it was supposedly contagious. Is it likely my machine got infected and if so what would the effects be?


38 posted on 08/09/2009 2:27:52 PM PDT by Yardstick
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yardstick
Is it likely my machine got infected and if so what would the effects be?

To begin with you may want to make backups of all your important data files. Recently had to format my web browsing computer twice. First time I got hit on the same weekend South Korea was attacked. I was simply downloading a large file from the MegaDownload site. The second time some malware came through one of my online 3rd party applications. That was an attack on our 3rd party application that was hosted on a server in Slovakia. We were running an application written by a Spanish company. So we were vulnerable and may be a canary in a cold mine for other sites hosted on the hopefully better protected US servers. All seven of my websites are now hosted on US servers now and we don't run any foreign written php programs anymore. If you allow users to upload files you are very vulnerable. Personally I think China and Russia should be completely disconnected from the web.

Thanks for posting that site that will block them through a third party domain.

39 posted on 08/09/2009 5:16:00 PM PDT by justa-hairyape
[ Post Reply | Private Reply | To 38 | View Replies]

To: justa-hairyape

Very interesting. So given the nature of the malware at Orly’s site, would it have been possible to have gotten infected just by viewing the page in my browser? Or would it have required doing something more, like opening a link or downloading an image from there or something?


40 posted on 08/09/2009 6:11:06 PM PDT by Yardstick
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson