lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <448DEA8F.6030401@science.org>
Date: Tue Jun 13 01:25:55 2006
From: jasonc at science.org (Jason Coombs)
Subject: ZoneEdit.com Forcing Pop-Unders on
	WebForward-Configured Domains

Problem:

DNS service ZoneEdit.com now owned by MyDomains.com has started forcing 
JavaScript pop-Unders onto users' browsers when the domain owner uses 
the ZoneEdit WebForward feature.


References:

www.zoneedit.com

www.mydomains.com/support.php

www.casalemedia.com/contact.html


Details:

Casale Media, Inc. is the Pop-Under Spammer responsible for paying My 
Domains cash money to distribute this crap to users. Example script 
shown below, embedded within the WebForward "Cloaking" frame.

script language="JavaScript" src="http://as.casalemedia.com/sd?s=65701&f=1"


Possible Resolutions:

Stop using ZoneEdit for backup/failover or primary DNS service.

Remove the economic incentive to lie, cheat and steal.

Prosecute the offenders and send them to prison.

Send/Fax your objections to ZoneEdit/MyDomains

Correspondence or payment by check may be sent to our office at:
ZoneEdit, Inc.
111 Broadway, 11th Floor
New York, NY 10006
Fax: 	+1 (847) 461-1893

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ