tag:blogger.com,1999:blog-6733122.comments2021-08-11T10:44:35.523-07:00Dr Dave's TECHBlog"Dr" Dave Masonhttp://www.blogger.com/profile/10698689867807157448noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-6733122.post-67003556560509157872008-12-12T04:17:00.000-07:002008-12-12T04:17:00.000-07:00Exceptional beauty!Exceptional beauty!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6733122.post-8200695617034632112008-12-05T08:51:00.000-07:002008-12-05T08:51:00.000-07:00This is much more far reaching than reported by mo...This is much more far reaching than reported by most sources. A large percentage of U.S. Banks use Checkfree as their BillPay product. Their servers re-direct you to Checkfree(typically by name). So a huge number of people paying their bills at their bank were subjected to this.<BR/><BR/>According to the news articles, CheckFree KNOWINGLY allowed its customers to be subjected to malware downloads for over 5 hours and provided NO notification to individuals and corporations doing business with them.<BR/><BR/>This is unconscionable behavior. They should be held legally liable for the expense of cleaning up individual PC's as well as the expenses of PR campaigns that need to be taken by their corporate customers that re-sold their service.<BR/><BR/>I agree that individual users should be responsible for keeping up to date Anti-Virus, Anti-Spyware, and other security measures in place. But, someone in this company made a conscious decision to withhold this information from its business partners. Given that, there should be repercussions for their actions. At the very least, I hope that they lose enough customers to force them to change their behavior.<BR/><BR/>The DNS re-direction should never have happened. If you follow the stories, what actually happened is that they logged into CheckFree's Network Solutions account and changed the DNS entries just like CheckFree would have done for a legitimate change.<BR/><BR/>If you follow the link below, you'll see that a massive Phishing campaign was launched targeting the Network Solutions and eNom customers' logins. This was launched by the Russian Business Network (RBN) and the site that checkfree was re-directed to is a known RBN server.<BR/><BR/>LINK: http://news.softpedia.com/news/EstDomains-039-Accreditation-Problem-Prompts-Domain-Accounts-Phishing-Campaigns-96913.shtml<BR/><BR/>In my opinion it seems that the most likely situation is that someone at CheckFree responded to the above referenced Phishing attack and provided them with the login credentials for Network Solutions. Then the RBN got the server ready, then changed the DNS entries, and began collecting customer information. I would expect that this will be followed up by massive amounts of fraud. The malware being served were Trojans of at least two different Bloodhound variants. These are Key Logging Trojans.<BR/><BR/>This whole thing strikes me as a serious of major failures on the part of CheckFree.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6733122.post-26381419621448137822008-01-09T08:13:00.000-07:002008-01-09T08:13:00.000-07:00Another is www.leadsexplorer.com incorporating a C...Another is www.leadsexplorer.com incorporating a CRM, bringing additional functions and features for lead generation, customer retention, lead nurturing, lead qualification, ...Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6733122.post-71412801105729051482007-11-28T07:56:00.000-07:002007-11-28T07:56:00.000-07:00have been using DomoDomain for 3 months now and re...have been using DomoDomain for 3 months now and really like. one of my b2b clients really love the product and the salespeople log in all the time - we noticed that the sales people were making their callbacks to prospects with an incredible degree of confidence if the visitor appeared on domodomain. Domodomain doesn't capture the name of every visitor, the data available depends on the ISP and other factors --- but we were able to tag visitors that we were pretty sure of the IP address if it didn't show...this has helped with proving results, we have been using Domodomain in conjunction with Google Analytics and another IP tracking tool --- and Domodomain is the tool that we have been using everyday. It does help you to see who is visiting your website and a large percentage of the visitors are leads or prospect who are checking out your company after a phone call or email.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6733122.post-29258990721230438582007-09-29T07:30:00.000-07:002007-09-29T07:30:00.000-07:00My computer was attacked within minutes of first u...My computer was attacked within minutes of first using it. An attempt to hijack the browser was made, and the next time I turned it on there was a new file on the desktop full of pornographic websites . . .scary!valeriehttps://www.blogger.com/profile/14349565013653361941noreply@blogger.comtag:blogger.com,1999:blog-6733122.post-76104342201883007962007-09-24T14:18:00.000-07:002007-09-24T14:18:00.000-07:00Thanks for the reminder Dean. Here's the fix:Go to...Thanks for the reminder Dean. Here's the fix:<BR/>Go to HKEY_LOCAL_MACHINE\<BR/>SYSTEM\CurrentControlSet\Services\<BR/>Audiosrv\Dep” in the registry to remove MMCS and set MMCS to disabled in services. Reboot, and you should be bakc to light speed network performance.<BR/>Dr Dave"Dr" Dave Masonhttps://www.blogger.com/profile/10698689867807157448noreply@blogger.comtag:blogger.com,1999:blog-6733122.post-65031968304082230412007-09-10T12:30:00.000-07:002007-09-10T12:30:00.000-07:00Saturday before last you said you would put up a w...Saturday before last you said you would put up a way on the web site a way to shut off MMCS. I've done a search but have been unable to find it. You suggested it would work on one of the areas where Vista is slow (displaying files on a network resource); sure would like to have that.Anonymousnoreply@blogger.com