Li wrote:
> "~BD~" <~BD~@nomail.afraid.com> wrote in message
> news:_-WdndXfCIjLjqzTnZ2dnUVZ8sKdnZ2d@bt.com...
>> Was 'Do as you're told!'
>>
>> Li wrote:
>>>
>>> Why haven't you found this one? It's controlled by a bot named
>>> scrawl.....
>>>
>>> http://searchirc.com/network/AnnexCafe
>>>

>>
>> You are *assuming* that I haven't, Li,

>
>
> Nope. I *know* you'd never seen it..... until now.



I don't believe you. You cannot *possibly* know that, Li.

Unless, unless ......... No. *You* tell folk how you *know*, eh? ;-)


>> You, of course, wouldn't be aware if there *are* web bugs on some/all
>> of the Annexcafe pages - or would you?!!
>>

>
> Of course not. How would I know anything of the sort? (I wonder who has
> access to the AC pages?)



FYI ......

The Drive-by Download Threat

Drive-by downloading is a hacker technique designed to steal information
from Internet users by forcing them to automatically download malicious
software without their knowledge or consent.

Drive-by download attacks are entirely silent. They require no user
interaction such as clicking on a specific link. It is enough to simply
visit a vulnerable web page that has been injected with malicious
iframes or Javascript that exploit end-user PC vulnerabilities to force
automatic download and execution of malicious software (malware).

Website owners have no idea that this attack has occurred and that their
website is compromising their customers' security.

On-line advertising mechanisms present an ideal avenue for targeted
malware drive-by downloads based on geographic location, browser or PC
type and time of day. This phenomenon is referred to as "malvertising".

The drive-by downloading process is as follows:

A hacker injects malicious code or scripts into a vulnerable website

When Internet users browse the website, the injected code exploits
vulnerabilities in their web browser or in plug-ins such as flash or
adobe. The hacker takes control of the exploited browser and directs it
to a 3rd party site to download malware.

In general the malware has the following features:

Downloads silently without the Internet user's consent or knowledge

Evades detection by commercial desktop anti-virus solutions

Downloaded malware silently executes and runs malicious programs to
control end-user PCs and to steal personal information.

**
Ref: https://hackalert.armorize.com/learnmore.php


Maybe you could/would tell Mr Gooden about this phenomenon and suggest
that he might like to run a trial of the software, available here:-
https://hackalert.armorize.com/default.php

HTH

Dave