Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 1 May 2013

Glipho

Posted on 12:18 by Unknown
About a month ago, though I could not give you the exact date, I embarked on a new journey in my blogging career. Little did I know that the blog I first intended to be a mirror to this blog would become a blog in it's own right.

It all started in Late march. I had just finished posting a new blog post and posting about it on Google+ when after a few minutes, I saw the one comment that would change my blogging career forever. From Glipho's profile on Google+, I saw the following text in praise of my blog: "So cool! Really enjoyed the post! Your blog is always such an awesome read! Would you be interested in sharing it on Glipho?"

At first I was skeptical, as someone in my line of work tends to be. But after a brief excursion through my favorite search engine for answers, I found that it was for real. I opened up a sandboxed browser and navigated to the Glipho website. In the sandbox, malware could not infect me from a website even if it was infected. Nothing that is suspect on my radar is going to infect me! Once I found that the website was real and was not harboring malware, I took a quick look at some of the posts on Glipho and found that there was no way a robot could have written posts like those. So I decided to take a plunge, I replied to the comment and asked how I sign up. The reply came quickly with a link on where to sign up. I signed up and got prompted to import my blog posts from another blog if I had one. Of course I wanted to do that, so I did.

It was a bit of a slow week the first week I spent blogging for Glipho, but things gradually picked up after a week. I realized that a blog on Glipho was not simply going to be a mirror to my main blog, it was going to get it's own readership while I did very little to promote it. It was like a get more readers free card, and one that I was not going to waste when the goal of my blog is to stop malware.

Interested? You can sign up and learn more at: http://glipho.com/
If you want to see my Glipho blog, it can be found at: http://glipho.com/anti-malware-blogger
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ▼  May (25)
      • Update on the new blog.
      • What's In a name: Rogue Antivirus
      • A break from blogging.
      • Apparently, my computer loves me. (Surprise ending)
      • How to keep spies from monitoring you through your...
      • Malware In Space: Not A Science Fiction Drama Gone...
      • Greyware and the Babylon Toolbar.
      • Decrypt Protect Ransomware and how to fully remove...
      • Plug In to Plugins.
      • How a fake tech support scam works.
      • Mac Malware is now getting past Gatekeeper.
      • Spotlight On Malware: Bring On The Flame!
      • Attack Of The Clones: What is a clone rogue?
      • The Big Game: Who's on our side?
      • KeyScrambler: A preventive measure against keylogg...
      • Spotlight on Malware: MyDoom
      • Spotlight on Malware: The Gruel Worm.
      • How (Not) to Make Your Computer Run Faster With th...
      • A brief look at Windows 8.
      • A few jokes about computers.
      • Malware: It could happen to iOS too.
      • Android Malware: The robot can be infected.
      • "Stupid Malware! You made me drop my sandwich!"
      • How to remove Internet Security (Rogue)
      • Glipho
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile