FIXIT MENU:
home about us contact us

WHAT'S AVAILABLE:
free scripts advanced scripts online tools great books web related tutorials contributed tutorials news archive geek toys!

SUPPORT:
help forum live chat help



Archive

Get Firefox! The most secure, and featured browser on the Internet.
RSS feed   enewsbar Live Subscribe    Add to MyYahoo

HTMLfixIT Archive for the ‘Phishing and Criminal Behavior’ Category




Friday, October 27th, 2006 by Gary

News.com.au reports “a Perth-based company and its director has been fined $5.5 million for sending spam emails.”

The fine levied against Clarity1 Pty Ltd and its director is pretty significant, not only because of the price tag on the fine but because it is the first time an Australian company has been fined under the Spam Act since it became an Australian federal law in 2003. Looks like this law has some teeth after all!

If my maths is correct, a $5,500,000 fine for sending 280,000,000 unsolicited e-mails works out to nearly two cents per message. I’m not confident that sales income from spam sent would have covered this operating expense, but still my in-box expands……

No Comments »

Thursday, May 11th, 2006 by Don

This case is interesting because it involves the use of technology first to join two people who did not belong together, and then to break them apart. First an Indiana man allegedly met a 13 year old girl on the internet. She claimed to be 18 and had sexually suggestive material on the site according to the website. They agreed to meet and fortuitously the man gave out his cell phone number to the girl’s friend. When police decided to track them down, they then used the ability to track that cell phone to find where they were driving and stop the car. It is impressive that within two hours of the girl joining up with the man, the police can access this information and track his whereabouts with sufficient specificity to stop the vehicle.

No Comments »

Tuesday, March 28th, 2006 by Don

Anywhere you turn in life you must be vigilant to guard against people seeking to take advantage of you. Sales of big ticket items, such as automobiles on the internet are very suceptable to scammers because the payoff from a successful scam is of sufficient size to make it worth your while.

The other night my son asked me why vehicle pictures on ebay had the license plates masked. I do not know the real answer, but I would guess it is because it is an unneccessary bit of personal information that could lead to identity theft.

The rules are still the same …
1. anything too good to be true is too good to be true ….
and when you decide not this time it is not,
2. go back to rule number one!

No Comments »

Tuesday, March 28th, 2006 by Don

In a repeat of prior news … Microsoft’s Internet Explorer has a security hole and a third party has released a patch to fix it prior to Microsoft doing so. What takes a company with the resources at their disposal longer than a third party? The current active scripting hole allows a site that you visit to install spyware. Now there is a pleasant thought.

Do yourself a favor, get Firefox and support Mozilla.

No Comments »

Tuesday, January 31st, 2006 by Don

We have written in the past about the effect on employment that blogging may have. Now we see a school district taking action to place a bright student in an alternative education program as a result of a parody site that he did on myspace.com.

From the limited facts presented, it appears to be a serious case of overreaction by the school. People sometimes need to vent. On the other hand, at what point are you disrespecting authority? Interesting questions.

Also in recent news, a Judge who had ordered several teenages not to drink posted pictures of themselves and friends getting wasted and made fun of the Judge in the process. He happened onto the blog sites, and given the picture evidence, he put them in jail for disregarding his orders.

One of the effects of this type of conduct is that kids are going from the open forum xanga.com blogs to the more restricted closed forums like facebook.com.

Let’s start today with a list of people who face consequences for blogging. Drop a comment below if you know of a case where someone lost a job, got sanctioned by an employer or school system, or got put in jail as a result of exercising speech on the internet. At a later time we can try to make sense of it. If you see the page, how about a screenshot of it? Say you have it and I’ll be in touch.

Update 1: Students are disciplined from extra-curricular activities as a result of pictures of a drinking party when those pictures are placed on myspace.

Update 2: Here is another one. Appears to be a growing fad. In this case two students are apparently jailed after posting threats of violence in their school.

No Comments »

Friday, January 27th, 2006 by Don

A worm virus called Kama Sutra is alleged to be on the uptick. It will supposedly hit infected computers on the 3rd day of a month, with many expected to start next month. The payload will be an attempt to delete all PDF, Powerpoint, Word, Excel and Access files. To be straight, we should all have those files regularly backed up to a cd or other removable media regularly anyway — now shouldn’t we? Of course we get busy and forget, so take this as your reminder. Take an extra step and use this weekend for a backup. Burn a cd. You may not have the worm anyway if, like me, you “you practice safe computing,” but your hard drive will fail eventually, you will delete something accidentally. So make this your backup weekend.

No Comments »

Thursday, January 26th, 2006 by Don

This week a Michigan Court of Appeals panel upheld two lower courts who ruled that the act of copying a file containing child pornography will make you responsible for a 20 year felony of making pornography, instead of the four year offense of possessing it. This means that any person viewing child pornography would be guilty of the 20 year offense because your computer will copy the files being viewed to your internet cache. While it is hard to feel sympathy towards someone committing child pornography violations, one wonders if the law was not intended for people making multiple copies for distribution, not someone making their own copy of something they downloaded from a Russian website as was the case for the copied material here. Of course the intent is insignificant if the law is not written consistent with that intent. You can read about the decision in the paper here, or view the case here in pdf format.

The paper article says:

In a written opinion signed by justices William B. Murphy, Brian K. Zahra and Janet T. Neff, the appeals court stated: “(W)hen one ‘makes’ a ‘copy’ or ‘reproduction’ of a picture or image showing children engaged in sexual acts, he or she has made child sexually abusive material, which, according to (Michigan law), is a felony punishable by up to 20 years’ imprisonment.”

No Comments »







This site is totally free to use, you have absolutely no moral or legal obligations to help us continue.
There are however, some costs involved in running the site.

<random humor>
Plus Franki needs fish food for his little friends.
</random humor>

So if this site helped you find your way, perhaps you could consider contributing to our costs. Whatever amount you feel this site was worth to you would be just wonderful.
Use PayPal if you do decide to share and help us with the costs and in appreciation for our time and attention, or alternatively buy a book from our Bookstore..


  Time  in  Don's  part  of the world is:   September 23, 2017, 12:57 am
  Time in Franki's part of the world is:   September 23, 2017, 1:57 pm
  Don't worry neither one sleeps very long!



privacy policy :: support us :: home :: live chat help
contact us :: forum ::tutorials :: bookstore :: Site Map



      Valid XHTML 1.0!             powered by Apache Server
Pic 3 Pic 3

SEARCH:
USEFUL LINKS:

CIGHTML Firefox Thunderbird ClamWin WordPress SpyBot S&D TheGIMP Apache for Windows Registry Cleaners More cool stuff:

//-->

HTMLfixIT Site Stats.

Browser Statistics
Internet Explorer 85.88%
IE 717.63%
IE 62.3%
IE 50.00%
IE other8.6%
Moz Firefox 3.x3.03%
Moz Firefox 2.x0.18%
Moz Firefox 0.x/1.x26.65%
Netscape 8.x0.00%
NS 6+/Mozilla2.73%
Moz Seamonkey0.00%
K-meleon0.00%
Epiphany0.00%
Netscape 4.x0.00%
Opera 9.x0.00%
Opera 8.x0.00%
Opera 7.x0.42%
Opera 6.x0.00%
Opera other0.42%
Safari Mac/Intel5.21%
Safari Mac/PPC0.06%
Safari Windows25.2%
Google Chrome1.51%
Konqueror0.18%
Galeon0.00%
WebTV0.00%


Resolution Statistics
640 x 4800.25%
800 x 60026.14%
1024 x 76836.55%
1152 x 8640.25%
1280 x 80011.68%
1280 x 8540.00%
1280 x 102417.01%
1400 x 10500.00%
1600 x 12001.02%
1920 x 12007.11%
2560 x 10240.00%


OS Statistics
Windows 741.55%
Windows Vista2.4%
Windows 20033.91%
Windows XP20.86%
Windows 20000.36%
Windows NT40.05%
Windows 98/ME0.05%
Windows 950.00%
Linux/UNIX/BSD8.76%
Mac OSX8.03%
Mac Classic0.00%
Misc14.03%



New Windows Virus Alerts
also by sophos.

17 Apr 2011 Troj/Mdrop-DKE
17 Apr 2011 Troj/Sasfis-O
17 Apr 2011 Troj/Keygen-FU
17 Apr 2011 Troj/Zbot-AOY
17 Apr 2011 Troj/Zbot-AOW
17 Apr 2011 W32/Womble-E
17 Apr 2011 Troj/VB-FGD
17 Apr 2011 Troj/FakeAV-DFF
17 Apr 2011 Troj/SWFLdr-W
17 Apr 2011 W32/RorpiaMem-A

For details and removal instructions, click the virus in question.