If this is your first visit, be sure to
check out the FAQ. You will have to register
before you can post. To start viewing messages,
select the forum that you want to visit from the selection below.
Please do not use the CODE tag when pasting content that contains formatting (colored, bold, underline, italic, etc).
The CODE tag displays all content as plain text, including the formatting tags, making it difficult to read.
The following Topic Prefixes are designated for use in Community Cafe:
DS (Distribution Showdown)
GN (Geek News)
KLD (Kubuntu or Linux Discussion)
TWC (The Water Cooler)
KUT (Kubuntu User Testimony)
NRD (Next Release Discussion)
While use is not required, doing so allows for efficient Filtering.
If a user accesses Facebook from a computer infected with DNS Changer malware, the site will display an alert with a link to a website that instructs users on how to remove the malware.
Training unsophisticated computer users to heed and obey what they read on a popup from a website... yeah, nothing bad could ever come from that.
The DNS-Changer malware control servers were shut down several months ago. Replacement DNS servers operated by the ISC have been serving the infected machines since then. IMO, the best way to have gone about notifying people with infected machines would have been for the ISC (and / or popular sites such as Google and Facebook) to have logged the IP addresses of said infected machines and forward that info to the relevant ISPs. The ISPs could then have sent out letters informing affected customers that their machines are infected, with instructions on how to clean their PCs.
(Edit) According to Wikipedia, something like that was supposed to have been done... but it is estimated that even after seven months, some 300,000 machines may still be infected.
Last edited by HalationEffect; Jul 06, 2012, 04:16 PM.
Reason: Extra info
Comment