Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 28 July 2013

To the spammers of my blog, past, present, and future.

Posted on 07:30 by Unknown
First, to my readers:

As some of you may or may not know, my blogspot blog is starting to become more attractive to spammers who attempt to comment on it. Even with a Turing test for comments listed as anonymous, two spam comments have still made it through to comment moderation. And because I have to approve every comment before it goes through, you will not see these comments.

It seems that the trend is to comment on my blog in hopes of advertising a tech support service. In my evaluation, I found that these services were a bit shady. Even so, I give them the benefit of the doubt and contact them through the contact us form. After this, I never get a response. And not only that, when I left a comment on an offending company's fan page, they named me fan of the week.

Funny, to be sure, but I found out that it was an automated app, and I was the only one who commented that week. Still, I revived no response from them. Not even an acknowledgement of my complaint. This is why I feel in the future, this will continue happening. This is why I am writing this post, to try and nip it in the bud before it begins.

To any spammers reading any part of this blog:

You cannot stop my resolve to keep this blog of mine spam free. As I have a zero tolerance policy for spam, I have had a Turing test set up since the very beginning of my blog for those who comment as an anonymous reader. Not only that, but for comments made by humans, I have comment moderation in place. This also works against more advanced spamming machines which know how to get past the Turing test by a multitude of means.

Translation: I have a zero tolerance policy on spam. Both in my email and on my blog. And because I consider unpaid ads to be spam, that means that your comments will not be seen by anyone but me no matter who you are or what technology you employ to attempt to circumvent this.

That being said, I am willing to offer advertising if you really wish to advertise on my blog. I ask that anyone who would like to arrange a deal email me at the following email address: blogadrequests@yahoo.com

No, this is obviously not the personal account I use for regular email, but I will get your email. And I can dispose of this address whenever I would like, so do not spam this address or I will close it. This address is to be used for legitimate business deals in regards to my blog only.

Thank You for reading, I invite readers to comment with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ▼  July (26)
      • Spotlight on Malware: ZeroAccess Rootkit.
      • Hitman Pro: What is it, and what does it do?
      • Posts of the Month: July 2013
      • To the spammers of my blog, past, present, and fut...
      • How to remove Attentive Antivirus (Rogue)
      • Explaining the fine line between Annoying Software...
      • Malware Now Taking Advantage of Royal Baby News.
      • How to remove the New Zealand E-Crime Lab Ransomware.
      • Mac OS X Ransomware going global.
      • How to remove the Ministry of Public Safety Canada...
      • How the web works: The Technology
      • How the web works: The History
      • How to remove the SweetPacks/SweetIM toolbar.
      • F.B.I. Ransomware now targeting Mac OS X
      • How to remove the Mandiant U.S.A. Cyber Security R...
      • How to remove Antivirus System (Rogue Antivirus)
      • First Q&A session details.
      • What to keep in mind when choosing your antivirus ...
      • My opinion of Data Dealer.
      • Spotlight On Malware: The Koobface Worm
      • Back To Basics.
      • Typosquatting: What it is and how to avoid it.
      • My opinion of Microsoft Windows Defender.
      • Spotlight on Malware: The Happy 99 worm.
      • Symbiosis in malware
      • Spotlight On Malware: Zeus
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile