tag:blogger.com,1999:blog-50570564761066151572024-03-07T21:43:57.171-08:00InBoxRevengeInBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-5057056476106615157.post-16536778600638093982012-03-07T23:19:00.002-08:002012-03-07T23:19:18.499-08:00<u style="background-color: #ffe599; color: #4c1130;"><b>New scam killing tools</b></u><span style="color: black;"> (March 2012)</span><u><b style="color: blue;"><br /></b></u><br />
<br />
Inboxrevenge has a proud history of providing useful tools for combating spam.<br />
<br />
2012 has ushered in some new tools, with a new target - Scams.<br />
We are seeing a considerable increase in the frequency of spams hitting our inboxes that have one clear purpose - to separate the unwary from their money.<br />
<br />
There are many categories of scams. The most prevalent is known as the Advance Fee Fraud. These encompass fake lotteries, bequests of millions of dollars, fake scams involving smuggling money out of certain countries, claims by military personnel that they want to pass a stash of millions through your bank account, young girls seeking romance and so on.<br />
<br />
These scams depend on communication back and forth via an email address. The scammers in over 99% of cases use free email services, most prominently from Yahoo, Microsoft, Google, GMX and Rediffmail. But there are over 600 others also abused in the same manner.<br />
<br />
The quickest way to nip these vermin's scams is to have their email addresses shut down before they can get their scams off the ground. To make this happen, the team at InBoxRevenge.com have put together some useful automated reporting tools and released the free of charge. The members only forums at IBR provide support for such tools as<br />
<ol>
<li>419 Nigerian ScamerAtor</li>
<li>419 Automated Reporters</li>
</ol>
The tools can be downloaded from the <a href="http://spamtrackers.eu/downloads">spamtrackers download site under Spam Reporters </a><br />
<br />
<br />InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-91992221607984466902011-04-06T16:57:00.000-07:002011-04-06T16:57:23.074-07:00Outage for maintenance Friday April 8, 2011We expect some downtime of about 30 minutes for site maintenance on Friday, April 8th, 2011 at 10pm (EDT or GMT -4),InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-50420175750775233852011-04-05T11:57:00.001-07:002011-04-05T13:04:08.749-07:00April 5, 2011 outageOur hosting company had a hardware issue that caused a brief outage today. No malicious activity was occurring.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-82245678509783614952009-11-19T15:57:00.000-08:002009-11-19T15:57:14.986-08:00The DDoS is still going on at a low level, so members with dynamic IP addresses may have difficulty getting access. Contact an admin through the forum email address (see below), or submit as a comment here if you don't get email notifications for forum posts.<br />
<br />
For those of you who aren't members and are wondering what got the spammers so pissed off at us, the public areas of the site are still available via Google cache. Just do a search on <br />
<br />
site:inboxrevenge.com<br />
<br />
with or without additional search terms.<br />
<br />
Areas of the forum only visible to registered members won't be available that way, but apparently even the public areas were good enough to earn the spammer seal of disapproval.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com2tag:blogger.com,1999:blog-5057056476106615157.post-8178005359145075522009-11-17T17:36:00.000-08:002009-11-17T17:36:33.993-08:00InboxRevenge.com currently up with limited accessThe attack on IBR has slackened, so the forum is available on a limited basis. Still, there is a high likelihood members will find themselves blocked or that the attack will ramp up again. <br />
<br />
You can contact an administrator about problems with access by replying to the same email address your forum notifications come from. Otherwise, you can post a private comment to this blog to request assistance. (Comments are moderated and won't appear if you ask us not to post them.)InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-13538903129934460942009-11-17T10:08:00.000-08:002009-11-17T10:08:47.527-08:00DDoS against InboxRevenge.com continuingWe obviously weren't surprised the DDoS would start up again. We've had plenty of experience with attacks, both against our forum and Castlecops.com. In those instances, they kept coming back, week after week, each time the forums reappeared. <br />
<br />
But the intensity of this attack is a bit of a puzzle. They're conducting a much heavier attack this time. IBR just went off line the last time when hit with the smaller attack. So regardless of how much traffic they send, they're still not striking any target. They do allow us to collect more IP addresses during brief periods of data collection. But there's not much point going nuclear when we were perfectly happy to go off line and wait during the less intense attack. <br />
<br />
On the other hand, I do hope law enforcement is noting that these attackers are a serious threat and should be addressed aggressively. Not all websites have the luxury of conducting their operations offline whenever needed. What would a bunch of criminals like these guys be doing with that botnet when they aren't attacking us? I'm sure they're not using it to sell Girl Scout Cookies.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-37411125184697716912009-11-16T15:45:00.000-08:002009-11-16T16:32:00.225-08:00InboxRevenge.com again under DDoSInboxRevenge.com members who are trying to log in are getting time outs. Another DDoS has been going on for several hours now. Our server is off line for now, so they are attacking nothing.<br /><br />As before, our strategy has not been to try to weather the attack head on. The reason we have accomplished so much in fighting internet crime is that we are patient and take the long view. We will can go off line and come back as often as necessary. Meanwhile this blatantly criminal attack exposes the attackers to greater scrutiny from law enforcement.<br /><br />The best strategy for our members is to continue submitting reports on illegal websites to registrars, and to continue to get the word out about the fraudulent nature of spamvertised websites. As long as there is a person on the planet who thinks "Canadian Pharmacy" and "My Canadian Pharmacy" are in Canada, our work is not done.<br /><br />Tell some friends about the following sources of information, put some links on your own websites, consider becoming a reviewer for SiteAdvisor or WebOfTrust to make sure anyone who tries to research a domain mentioned in a spam will find accurate information in the top search engine results:<br /><br />The Spamwiki -- If possible, mention specific spamvertised brands and link to their spamwiki pages. This is an opportunity to educate people that buying from spammers means sharing your personal and credit card information with criminals:<br /><a href="http://www.spamtrackers.eu/wiki/index.php/Main_Page">http://www.spamtrackers.eu/wiki/index.php/Main_Page</a><br /><br />Blogs and information sites including this blog. They can't shut them all down:<br /><a href="http://spamitmustfall.blogspot.com/">http://spamitmustfall.blogspot.com/</a><br /><a href="http://ikillspammers.blogspot.com/">http://ikillspammers.blogspot.com/</a><br /><a href="http://garwarner.blogspot.com/">http://garwarner.blogspot.com/</a><br /><a href="http://twitter.com/inboxrevenge">http://twitter.com/inboxrevenge</a><br /><a href="http://inboxrevenge.blogspot.com/">http://inboxrevenge.blogspot.com/</a><br /><a href="http://inboxrevenge.spaces.live.com/">http://inboxrevenge.spaces.live.com/</a><br /><a href="http://inboxrevenge.wordpress.com/">http://inboxrevenge.wordpress.com/</a><br /><a href="http://spamtrackers.org/">http://spamtrackers.org/</a><br /><br />SiteAdvisor and WebOfTrust-- many IBR members are highly rated reviewers for these:<br /><a href="http://www.siteadvisor.com/analysis/reviewercentral/">http://www.siteadvisor.com/analysis/reviewercentral/</a><br /><a href="http://www.mywot.com/">http://www.mywot.com/</a><br /><br />Other antispam and security forums that many of our members participate in:<br /><a href="http://spywarehammer.com/simplemachinesforum/index.php">http://spywarehammer.com/simplemachinesforum/index.php</a><br /><a href="http://www.cybercrimeops.com/forums/index.php">http://www.cybercrimeops.com/forums/index.php</a><br /><br />Sites that accept forwarded spam/phish:<br /><a href="http://knujon.com/">http://knujon.com/</a><br /><a href="http://www.spamcop.net/">http://www.spamcop.net/</a><br /><br />Information on reporting active phishing sites, from IBR on Google cache:<br /><a href="http://bit.ly/238Ges">http://bit.ly/238Ges</a>InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-49703155700370685302009-11-04T15:23:00.000-08:002009-11-04T16:03:49.264-08:00Here are some more fresh spammer URL's to report:<br />ceyanfk.cn<br />bacydfhh.cn<br />www<span style="font-weight: bold;">.</span>danceraise.com<br />legacyback.com<br />rodriguezqan81.chat.ru<br />feedproxy.google.com/~r/CraigslistBolognaAllJobsSearch/~3/nlnRHliBpBY/<br />pearwatches.cn<br />rigojeb.cn<br /><br />Still getting lots of spam for<br />awakehim.com and now danceraise.com<br />-- high value targets<br /><br />domains already down:<br />hqasqwe1.me.uk<br />cegixbj.cn<br />ersd12wh.eu<br />doneswim.com<br /><br />hanging by a thread:<br />pharmsstockmeant.com -- look at these nameservers:<br />ns3.whichdaring.com [59.63.157.207] 211.20.210.74 237ms<br />ns1.coolexcite.com [61.61.61.61] (Blackhole) <br />ns2.coolexcite.com [61.61.61.61] (Blackhole)<br />ns4.whichdaring.com [211.20.210.74] Timeout <br /><br />And as for the <span id="registrar_whois">whichdaring.com</span>, anyone think <span style="font-style: italic;">this</span> is a valid whois?<br /><span id="registrar_whois">Domain Name.......... whichdaring.com<br />Creation Date........ 2009-08-03 03:30:42<br />Registration Date.... 2009-08-03 03:30:42<br />Expiry Date.......... 2010-08-03 03:30:42<br />Organisation Name.... Cheng sixixa<br />Organisation Address. Nan guang qu chong qing lu bai huo da lou B1 lou<br />Organisation Address.<br />Organisation Address. Nanguanqu<br />Organisation Address. 130025<br />Organisation Address. BJ<br />Organisation Address. CN<br /><br />Admin Name........... Chengsixixa<br />Admin Address........ Nan guang qu chong qing lu bai huo da lou B1 lou<br />Admin Address........<br />Admin Address........ Nanguanqu<br />Admin Address........ 130025<br />Admin Address........ BJ<br />Admin Address........ CN<br />Admin Email.......... </span><span id="registrar_whois">chengyudanyuaner</span><span id="registrar_whois">@163.com<br />Admin Phone.......... +86.4315685301-0<br />Admin Fax............ +86.4315685301<br /><br />Tech Name............ zeng xiwu<br />Tech Address......... wanbaodadao<br />Tech Address.........<br />Tech Address......... Changsha<br />Tech Address......... 410000<br />Tech Address......... HN<br />Tech Address......... CN<br />Tech Email........... </span><span id="registrar_whois">agent19535</span><span id="registrar_whois">@agent.dns.com.cn<br />Tech Phone........... +86.7312259236<br />Tech Fax............. +86.7312259236<br /><br />Bill Name............ zeng xiwu<br />Bill Address......... wanbaodadao<br />Bill Address.........<br />Bill Address......... Changsha <br />Bill Address......... 410000 <br />Bill Address......... HN <br />Bill Address......... CN<br />Bill Email........... agent19535@agent.dns.com.cn<br />Bill Phone........... +86.7312259236<br />Bill Fax............. +86.7312259236<br />Name Server.......... ns4.whichdaring.com<br />Name Server.......... ns3.whichdaring.com</span>InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-5698275067866074912009-11-04T09:56:00.000-08:002009-11-04T10:19:57.146-08:00Continued recognition of our anti-spam effortsAs of the current time we're back off line due to continued DDoS. We're definitely getting lots of attention from spammers. You rock, folks! We're small but get the job done.<br /><br />Here are some domains to report while you're waiting. There are phishing sites, scam pharmacies, "replica" sites, etc. You know what to do :)<br /><br />http<span style="font-weight: bold;">:</span>//feedproxy.google.com/~r/Cr454rAndBear45utaii/~3/91kzfjex8tI/<br />http<span style="font-weight: bold;">:</span>//pharmsstockmeant.com/?said=MED-22-3<br />http<span style="font-weight: bold;">:</span>//rolexll.com<br />http<span style="font-weight: bold;">:</span>//www.rxcomputing.cn<br />http<span style="font-weight: bold;">:</span>//d55ad0.cegixbj.cn/<br />http<span style="font-weight: bold;">:</span>//www.ifleads.com<br />http<span style="font-weight: bold;">:</span>//www.facebook.com.hqasqwe1.me.uk/globaldirectory/LoginFacebook.php<br />http<span style="font-weight: bold;">:</span>//ripuvat.cn<br />http<span style="font-weight: bold;">:</span>//9ZTWIR.ittjbity.cn<br />http<span style="font-weight: bold;">:</span>//PNQ.ittjasos.cn<br />http<span style="font-weight: bold;">:</span>//awakehim.com<br />http<span style="font-weight: bold;">:</span>//crowduntil.com<br />http<span style="font-weight: bold;">:</span>//www.rxunimplemented.cn<br /><br />Post a comment and let us know how you've made out with these.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-62843801758974897992009-11-03T09:17:00.000-08:002009-11-03T09:22:03.383-08:00Difficulty accessing the forum?The forum is up and running normally. There has been continued attack activity, but most has been blocked. Our hosting service, Servint, has done an outstanding job blocking a lot of the traffic before it even hits our server. The remainder has not been enough of an issue to slow anything down.<br /><br />If you are still unable to access the forum, your IP address may have been included in a block of troublesome addresses. Let us know, so we can try to troubleshoot the problem. You can reply to the administrative email address for the forum (the one where your forum notifications come from). Or you can post it as a comment to this blog.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-18213079189138918162009-11-01T16:45:00.000-08:002009-11-01T17:05:54.726-08:00Continued DDoS attacks on InboxRevenge.comThe DDoS attack from yesterday continues. Blocking a few troublesome IPs brought the traffic down to a level that was not a serious inconvenience, so the site came back on line this morning. You can expect it to go up and down or be slow intermittently for now. The server will be up at times even during a heavy attack to collect IP addresses of attacking bots for evidence.<br /><br />If you're a regular member and not able to get on at all, please email us to make sure your IP isn't blocked. The easiest way is to reply to one of the emails you have received notifying you of forum post replies.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-33290325631747875462009-11-01T06:38:00.000-08:002009-11-01T06:59:19.327-08:00Good news -- DDoS attacks not overMembers may have noticed another recent outage for several hours. It was another confirmed DDoS, via a method called "syn flood." In the past, these sorts of attacks have gone on for weeks. We just roll with it.<br /><br />Why is it <span style="font-style: italic;">good</span> news? It lets us know our efforts are worthwhile, because making internet crime less profitable is exactly what we're trying to accomplish. If we weren't making criminals want to attack us, we'd have to wonder what we were doing wrong. We never expect to achieve the amazing level of spammer ire that Blue Security suffered in it's famous 2006 attack, but then we aren't planning to try to keep the site on line during the attacks. We just fall back to the alternate methods of spreading information. If our attackers would like to try to simultaneously take down Google, Microsoft, Twitter, Wordpress, and all the other sites we've established a presence on, they'll get themselves a lot more law enforcement attention than they're currently planning on.<br /><br />Comments are open for this blog, though they have to be approved by a moderator. And if you have a comment that seems to merit its own "thread," we can repaste it as a blog post that can get its own comments.<br /><br />Remember that SiL also has his two blogs, which also accept moderated comments:<br />http://ikillspammers.blogspot.com/<br />http://spamitmustfall.blogspot.com/<br /><br />And we have our other sites for announcements:<br />http://twitter.com/inboxrevenge<br />http://inboxrevenge.wordpress.com/<br />http://inboxrevenge.webs.com/<br />http://spamtrackers.org<br />http://inboxrevenge.spaces.live.com/<br /><br />As always, the best response to retaliation is to continue to do the reporting you were doing before -- but to do more of it.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-9213806485790277392009-10-30T10:03:00.000-07:002009-10-30T10:11:48.232-07:00InboxRevenge forum is back upApologies for the forum being unavailable a few days. The DDoS has subsided for now. Our policy is to just go off line as needed rather than to expend energy fighting such attacks.<br /><br />Our time is much better spent continuing to investigate and report the internet criminals behind your spam and all the illegal activity that goes with it. Notifications on blogs like this one are part of the layers of redundancy we've set up to make it possible to continue our usual activities when the forum is unavailable. If anything, having the effectiveness of our activities acknowledged by spammers has been a shot in the arm to motivate our members, who primarily are busy professionals doing this as a volunteer effort outside of their usual jobs.<br /><br />The forum thread for more information about this DDoS is at<br />http://ksforum.inboxrevenge.com/viewtopic.php?f=1&p=42237#p42237InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-12814478757307193342009-10-28T16:09:00.000-07:002009-10-28T16:42:59.519-07:00Google Feedproxy AbuseWell, just as the Yahoo Groups Spam becomes less overwhelming, along comes a new abuse: feedproxy.google.com URLs that redirect to the following Canadian Pharmacy domains:<br /><br />pharmsstockmeant.com<br />caringbread.com<br /><br />As InboxRevenge.com members know well, "Canadian Pharmacy" (CPh) is a scam.<br /><br />The site has nothing to do with Canada. The phone number they list, +1(650)452-6975, has a Texas area code but is a voice-over-internet number which connects to an overseas operator -- if it gets answered at all. The address listed on their sites belongs to a legitimate Canadian pharmacists' organization that denies any relationship to CPh. Why doesn't that organization make them stop? Because CPh sites are part of an affiliate program run by criminals in Russia, out of reach of Canadian or US law enforcement.<br /><br />The pills they sell are counterfeit generic versions of drugs that aren't legally available in generic version. A drug can't be sold generically until its patent has expired -- but again, they're out of reach of law enforcement.<br /><br />CPh markets them like some late night infomercial for Ginzu Knives, throwing in free tabs of their counterfeit "Viagra" with <span style="font-style: italic;">every</span> order -- even when that would be a potentially fatal combination. So either people are dying or the drugs are completely fake. Clearly no pharmacist has had any input into the operation, either way. And they're out of reach of law enforcement <br /><br />It's extremely stupid to give the operators of CPh your name, address, phone number, and/or credit card number. It's extremely stupid to wait however long they tell you to wait for delivery, allowing the time limit to file a complaint with your credit card company to expire. And it's even more stupid to swallow pills of unknown makeup from an unknown country made under unknown conditions of sanitation, should anything actually show up in your mailbox.<br /><br />That, and the fact that smuggling drugs is a federal crime. And <span style="font-style: italic;">you're </span>not out of reach of law enforcement.<br /><br />There's more information on the spamwiki:<br />http://spamtrackers.eu/wiki/index.php/Canadian_PharmacyInBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com4tag:blogger.com,1999:blog-5057056476106615157.post-73085078974681953012009-10-28T06:26:00.000-07:002009-10-28T07:07:59.664-07:00Inboxrevenge.com, the little forum that creates big headaches for internet criminals, is under another distributed denial of service (DDoS) attack. That means hundreds or thousands of zombie computers -- computers like yours that have been infected by malware and put under the control of criminals -- are all trying to access the site simultaneously. Websites can only handle a certain amount of traffic, so having so many requests going on continuously shuts out legitimate visitors.<br /><br />Frankly, we were wondering what took them so long. We've been through this before. We've got lots of backup means for forum admins and mods to communicate with each other and with the other members. We are prepared to just let the site be off line while these guys spend their money attacking. We'll just chill and spend the extra time reporting their domains and bots. The difference is they don't get to read about it.<br /><br />What the rest of our members can do is take extra time reporting. Report your spam emails to spamcop.net, so more of their IP's are blocklisted and more of their bots are disinfected. Fire up Complainterator and report domains and their nameservers to registrars. We are not some discrete target that can be shut down with a DDoS. We are our members, all over the world, and we're in it for the long term.<br /><br />http://twitter.com/inboxrevenge<br />http://inboxrevenge.wordpress.com/<br />http://inboxrevenge.webs.com/<br />http://spamtrackers.org<br />http://inboxrevenge.spaces.live.com/InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-57320974293897679772009-04-09T09:06:00.000-07:002009-04-09T09:10:03.911-07:00We have posted an open letter to the new FTC Chairman, Jon Leibowitz, at http://ksforum.inboxrevenge.com/viewtopic.php?f=9&t=2574<br /><br />It's about how the spam/internet fraud economy is interlaced with the less overt types of cyber crime that constitute a threat to national security. We think if the overt criminal activity like spam were pursued, it would rein in the types that are harder to detect, too.<br /><br />Please drop by, read the letter, comment, and recommend it to others, including your local media or US congresspersons.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-24867553791234476202009-03-24T06:14:00.000-07:002009-03-24T06:17:18.869-07:00March 24, 2008<br /><br />Inboxrevenge.com is down. Admins are investigating. More information here if downtime will be prolonged; it may be the hosting service taking longer than anticipated to do a planned upgrade.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-88308853495559289632009-02-17T19:59:00.000-08:002009-02-17T20:35:14.113-08:00<span style="font-weight: bold;">Feb 18, 2009</span><br /><br />Newcomers to ksforum.inboxrevenge.com as well as existing registered users should review the "Important Announcement" concerning pending changes in the password restrictions.<br /><br />Please change your password to meet the new requirements to ensure an easy transition and continued access.InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-44058447070165748152009-01-25T10:50:00.000-08:002009-01-25T11:38:36.507-08:00<span style="font-size: 14px;">Visitors to InboxRevenge.com were getting an over-quota message overnight. No worries -- it wasn't a DDoS. We were just getting heavy traffic from some search engines which is a good thing. We've made some adjustments so it shouldn't be a problem in the future.</span>InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0tag:blogger.com,1999:blog-5057056476106615157.post-25590099147707045072009-01-19T09:38:00.000-08:002009-01-19T09:43:31.679-08:00<table style="width: 350px; height: 201px;" border="0" cellpadding="0" cellspacing="0"><tbody><tr valign="top"></tr><tr valign="top"></tr><tr valign="top"><td colspan="1" height="140"><br /></td><td style="text-align: center;" colspan="1" rowspan="1" width="571"><span style="font-size:100%;"><b><span style="font-family:Trebuchet MS;">InBoxRevenge Forums are at </span></b><a href="http://ksforum.inboxrevenge.com/"><b><span style="font-family:Trebuchet MS;">ksforum.inboxrevenge.com.</span></b></a><b><span style="font-family:Trebuchet MS;"><br />The forum was created for exposing and shutting down illegal spammers.<br />Please join us.<br /><br />In the event the main site is unavailable, information will be posted here about how to continue the fight again internet criminals. They can attack a website, but they cannot stop our efforts.</span></b></span></td></tr></tbody></table>InBoxRevengehttp://www.blogger.com/profile/14245415886280969966noreply@blogger.com0