• Welcome to the LegalBeagles Consumer and Legal Forum.
    Please Register to get the most out of the forum. Registration is free and only needs a username and email address.
    REGISTER
    Please do not post your full name, reference numbers or any identifiable details on the forum.

Scam Baiting

Collapse
Loading...
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • #46
    Re: Scam Baiting

    ok dunno if this will work
    this is her most recent profile http://www.bikerkiss.com/user_detail...page=favorites

    Comment


    • #47
      Re: Scam Baiting

      Does it cost to join cos you need to be a member to view

      Comment


      • #48
        Re: Scam Baiting

        bollox you need to be a member
        i won't tell you how i got in pmsl

        Comment


        • #49
          Re: Scam Baiting

          no tis free membership

          Comment


          • #50
            Re: Scam Baiting

            Heres a scam on the site
            http://www.bikerkiss.com/forum2/foru...er_id=15348144

            to prove it happens

            Comment


            • #51
              Re: Scam Baiting

              Can you pm me her details, and ile try and make contact

              Comment


              • #52
                Re: Scam Baiting

                yup we've told him..... but will he listen
                there are 4 of us that tell him repeatedly..... we just hope it doesn't end too badly if ya know what i mean

                Comment


                • #53
                  Re: Scam Baiting

                  yeah ill try and find em again

                  Comment


                  • #54
                    Re: Scam Baiting

                    i think you should be able to get her through the site.
                    her user name is Mylo100 ... the only other contact i got was one i acquired through my friend (can't tell you how i got that)

                    Comment


                    • #55
                      Re: Scam Baiting

                      let's just say when you know someone well it's not hard to figure out what password they would have used !!!! i'm sooooooo bad

                      Comment


                      • #56
                        Re: Scam Baiting

                        Well
                        Just got an email from one of my lads, although i dont think he meant to send it to me.
                        I am now in the possesion of a text file containing hundreds of email addresses, must be the next batch of unsuspecting victims to gwet scam emails soon

                        Comment


                        • #57
                          Re: Scam Baiting

                          just a quick note to say thanks PK,
                          after all the info you got on this woman.... I was able to find a little more... Think he's finally got the message..... and if he hasn't .....well he's on his own!!! we tried

                          Comment


                          • #58
                            Re: Scam Baiting

                            Originally posted by Tempty View Post
                            just a quick note to say thanks PK,
                            after all the info you got on this woman.... I was able to find a little more... Think he's finally got the message..... and if he hasn't .....well he's on his own!!! we tried
                            No probs,
                            Lets hope he is a bit wiser in the future now...

                            Comment


                            • #59
                              Re: Scam Baiting

                              A quick update on the Storm Botnets that have been crippling various anti /scam / 419 sites over the last months.

                              SecureWorks researcher Joe Stewart (left) has seen evidence that the massive Storm Worm botnet is being broken up into smaller networks, a surefire sign that the CPU power is up for sale to spammers and denial-of-service attackers.

                              Stewart, a reverse engineering guru who has been tracking Storm Worm closely, says the latest variants of Storm are now using a 40-byte key to encrypt their Overnet/eDonkey peer-to-peer traffic.

                              “This means that each node will only be able to communicate with nodes that use the same key. This effectively allows the Storm author to segment the Storm botnet into smaller networks. This could be a precursor to selling Storm to other spammers, as an end-to-end spam botnet system, complete with fast-flux DNS and hosting capabilities,” Stewart said in an e-mail message.

                              “If that’s the case, we might see a lot more of Storm in the future,” he warned.

                              The malware attacks behind this botnet have been relentless all year, using a wide range of clever social engineering lures to trick Windows users into downloading executable files with rootkit components. By some accounts, the malware has successfully created a massive botnet — between one million and 10 million CPUs — producing computing power to rival the world’s top 10 supercomputers.

                              Statistics from Microsoft’s monthly updated MSRC (malicious software removal tool) peg the size of the botnet at the low end of the supercomputer speculation.

                              Stewart sees a silver lining in the latest Storm Worm twist. Because of the new encryption scheme, Stewart says it is now easier to distinguish Storm-related traffic from “legitimate” Overnet/eDonkey P2P traffic.

                              “[It] makes it easier for network administrators to detect Storm nodes on networks where firewall policies normally allow P2P traffic,” he said.
                              If the statistics from Microsoft’s MSRT (malicious software removal tool) are anything to go by, the Storm Worm botnet is not quite the world’s most powerful supercomputer.

                              The tool — which is updated and shipped once a month on Patch Tuesday — removed malware associated with Storm Worm from 274,372 machines in the first week after September 11. In all the tool scanned more about 2.6 million Windows machines.

                              These numbers, released by Microsoft anti-virus guru Jimmy Kuo, puts the size of the botnet on the low end of speculation that Storm Worm has commandeered between 1 million and 10 million Windows machines around the world.
                              Kuo also confirmed fears that the botnet will slowly regain its strength once those cleaned machines become reinfected because those machines are likely unpatched and not equipped with any security software.
                              Last edited by Paule; 16th October 2007, 22:36:PM. Reason: Added Info

                              Comment

                              View our Terms and Conditions

                              LegalBeagles Group uses cookies to enhance your browsing experience and to create a secure and effective website. By using this website, you are consenting to such use.To find out more and learn how to manage cookies please read our Cookie and Privacy Policy.

                              If you would like to opt in, or out, of receiving news and marketing from LegalBeagles Group Ltd you can amend your settings at any time here.


                              If you would like to cancel your registration please Contact Us. We will delete your user details on request, however, any previously posted user content will remain on the site with your username removed and 'Guest' inserted.
                              Working...
                              X