Well, it's back up and running again, for the moment. If it's importaint to you, salvage what you can, while you can can!
Well, it's back up and running again, for the moment. If it's importaint to you, salvage what you can, while you can can!
I blinked and missed it.
Last edited by walksthedogs; 06-25-2010 at 06:51 PM.
For reasons known only to those who never feel the need to explain their reasons, they changed their IP again. Seems the DNS servers caught up with them though because scam.com will get you there, but at the moment 208.86.2.178 is what they are calling themselves.
scam.com does not work for me, but the IP does. Looks like they've had basically no posting since the 21st, little today. Hmmm. Should I brave the wrath of G~d and put realscam in my sig?
Don't take life too serious. You'll never escape it alive anyway.
~ Elbert Hubbard
GEORGE DRANICHAK - OWNER OF SCAM.COM, PORN MOGUL AND KING OF THE PORN SPAMMERS
I saved a few interesting posts, since they're online again.
Oooooh, I will so put a link in my signature. I'm currently debating whether or not to respond to Len's post in the Berryview thread... he's such an idiot that I'm not sure he'd get anything else I'd say to him. It's funny how when you take his words and throw them back in his face he suddenly doesn't understand.
Maybe I should just accuse him of being a troll and baiting me. LOL
LOL, I couldn't help myself. I had to respond. Now I just have to change my siggie.
The trolls took over, and the mods cannot will not stand against them, the wimps.
lol, I kinda moved that topic outta there, resellerratings.com/store/BerryRevuew_Store_8 ;). They are a retail merchant after all. :cool:
Huh. Since that one time I got on last night, I haven't been able to get on again...
Don't take life too serious. You'll never escape it alive anyway.
~ Elbert Hubbard
Realscam.com is in my sig over at the "cesspool" as Lenny affectionately refers to the site he serves as an admin for. How much do you guys want to bet I am the first one LM bans for it?
Soapboxmom
Last edited by Seriously?; 06-26-2010 at 07:34 AM.
Don't take life too serious. You'll never escape it alive anyway.
~ Elbert Hubbard
I bookmarked it last night and can get on and off with no problem.
Maybe it has something to do with:
Any geeks here care to comment?Denial of Service attack. They are rather nasty and We took a bad hit. At least, that's what we have been told.
Lady Mod
I bookmarked it yesterday: here is what shows in the address bar:
scams - report the scam here
(http://208.86.2.178/index.php).
Last edited by walksthedogs; 06-26-2010 at 07:54 AM.
Denial of Service usually indicates you havnt paid your bill!
I managed to log on and save some of my work.Ive added the url to this website on my signature,it will be interesting to see if anything happens.Also PMed some regular posters making them aware of this new forum.
The Ray st Clair/Gary Beaver Saga.
www.realscam.com
If it was, indeed a denial of service "attack" it would more likely to be a "distributed denial of service" attack, commonly referred to as a "DDOS" attack, rather than disconnection for non payment of an account.
DDOS attacks are not at all uncommon in the world of HYIP and ponzi scams, and is the reason many, if not most, online HYIP ponzi scams boast of having "DDOS protected server/websites"Denial-of-service attack
From Wikipedia, the free encyclopedia
Jump to: navigation, search
"DoS" redirects here. For other uses, see DOS (disambiguation).
DDoS Stacheldraht Attack diagram.
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management.[1]
One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.[2]
The following link points to a page which recounts the unfolding of a DDOS attack and those behind it on one of the 'nets most respected 'net security companies, Gibson Research Corporation.
The .PDF makes fascinating reading for those who still think that 'net fraud and fraudsters are just a harmless bunch of tricksters:
The bizarre tale of a DDOS attack
Very interesting.I have to admit Ive never heard of DDOS before.
So who would perpetrate such a thing against Scam.com?
Any ideas?
The Ray st Clair/Gary Beaver Saga.
www.realscam.com
A ddos attack is basically a bunch of computers sending large requests to the server and tying up its resources causing the server to not have any resources left for other users trying to access the website(s).
This isn't the first time scam has been down, I think they get attacked quite often (server busy messages). Who knows who does it, but I doubt it will ever stop.
Lots of ideas, but no proof.
There are some well known regular posters on Scam with PLENTY of experience at the lower end of the scam business.
Amidst all the fun and frivolity, people forget that some/many of the scams being discussed involve HUGE sums of money.
e.g. "AdSurf Daily" purportedly had over USD $400 MILLION pass through its' books. Over USD$90 MILLION was in its' Bank of America accounts when it was busted.
The "Legisi/Greg McKnight" HYIP ponzi is alleged to have raked in over USD $72 MILLION before the SEC stepped in during 2008.
The Colon End Parenthesis (CEP) "autosurf" ponzi was a relatively small time HYIP, yet it raked in over USD $12 MILLION during 2007.
We are not talking small potatoes here and DDOS attackers are relatively easy to find and cheap to hire. As discussed on the GRC article posted, MiRC in particular, is the home of many "warbot" controllers.
As entertaining as it may be to some people, this is a multi billion dollar problem, and many of the criminals behind it are deadly serious. There are hundreds of millions of dollars at stake.
DDOS attacks, although serious, are nothing, compared to the actual economic, criminal and personal damage being done on a daily basis.
Read up on what's been called "botnet." Basically a lose network of virus infected "zombie" computers that can be controlled in some fashion by central operator. They then rent the use of their network to anyone willing to pay for massive spamming, DDOS attacks and the like. Several years back scam.com was greatly impaired and several other anti-scam sites were inaccessible by fairly massive coordinated DDOS attack, that had to be the work of a pretty damn large and well articulated botnet.
I don't think scam's recent trouble was DDOS, anyone who cared enough about what was being said about them there to pay a group of Botnet organizers to knock that site down most likely realizes that a bogus legal threat on a dummied up legal firm letterhead would get any thread deleted from the site. Why pay a criminal gang when all you really need to pay is postage?
Bookmarks