April 18, 2006
Soliciting Murder And Mayhem On The Internet
Nine people were killed in Tel Aviv by the 21-year-old Islamist jihadi nutcase, over 60 were wounded, in the Palestinian Islamic Jihad-conducted
Passover bombing!
There are Five Official Palestinian Islamic Jihad (PIJ) Sites (currently active online)
Eight Service Providers Keep Them Online, and they have been doing so for months - in some cases, years.
You will find that six of Those Service Providers are American Companies.
Should we be waiting for someone else to deal with the problem?
Bonus: Here are the top ten Salafyist/Jihadist sites on the Internet.
Hat tip - Internet Haganah
Cross posted from Hyscience
Posted by: Richard@hyscience at
09:21 AM
| Comments (7)
| Add Comment
Post contains 113 words, total size 1 kb.
1
You know what to do. Unplug 'em and burn 'em to the ground!
Posted by: Last word Larry at April 18, 2006 10:15 AM (FCC6c)
2
Heh...well, at least its a plan.
Leftists have no plan.
Or if they do, it involves giving billions in UN aid which end up being used to fund Arafat like lifestyles and more terrorism.
Posted by: mrclark at April 18, 2006 10:50 AM (S76hi)
3
The P.A. moon god worshipping swine, and dog eating scum.
My respects to the latest group of Jewish folks who were killed, and injured.
RAPMA
Posted by: Leatherneck at April 18, 2006 01:24 PM (D2g/j)
4
All these countries are deploying content filters, can't we deploy something in reverse, like a content filter that keeps their jihadic websurfers confined to their own countries?
Sure, Saudi Arabia can have the internet, but they can only access sites hosted in their own country. It they want access to US sites, then they can first clean up their own act.
As for these service providers, can Bush try to at least live up to a bit of the 'left's' demonization of him. If the Bush Administration is so fascist, can't they kill these sites hosted in the US? The act will drive the moonbats nuts and we can all have a good laugh at it.
Posted by: Fred Fry at April 18, 2006 07:39 PM (HJnrm)
5
Shouldn't the State Department be taking action against these ISPs for giving aid to a terrorist organization? Has anyone tried forwarding this to someone who would deal with that sort of thing?
Posted by: LC CanForce 101 at April 18, 2006 08:03 PM (3smJS)
Posted by: Last word Larry at April 18, 2006 09:34 PM (FCC6c)
7
Is that the only thing you can write larry? You dumb ass.
Posted by: Leatherneck at April 19, 2006 01:52 PM (D2g/j)
Hide Comments
| Add Comment
April 12, 2006
Online Terrorists Attack Blogger (Again)
Aaron is the
victim of online terrorism...
again. He's been put on a hit list at jihadi websites because of his over-the-top mocking of Mohammed. I'm soo jealous. Here's a screenshot of his website now. Good luck in getting it back up. Thanks to
The National Institute of Truth for the tip.
Update: Egyptian Sandmonkey has a translation of the original message left by the infamous al3isnet crew the other day.
Posted by: Rusty at
07:08 AM
| Comments (4)
| Add Comment
Post contains 80 words, total size 1 kb.
1
Darn, I'm so jealous! *posts pic of the prophet mohammed spanking his monkey* That should do it!
Posted by: Princess Kimberley at April 12, 2006 09:32 AM (7b8BZ)
2
Mwahahahahahahaha. "install.php" hahahahahahahahahaha
Posted by: caltechgirl at April 12, 2006 11:49 AM (jOkK0)
3
Aaron:
I'm subscribed to several of the software vulnerability tracking lists, and this was sent to one of them in March:
Severity: Normal
Title: WordPress: SQL injection vulnerability
Date: March 04, 2006
Bugs: #121661
ID: 200603-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
WordPress is vulnerable to an SQL injection vulnerability.
Background
==========
WordPress is a PHP and MySQL based content management and publishing
system.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-apps/wordpress = 2.0.1
Description
===========
Patrik Karlsson reported that WordPress 1.5.2 makes use of an
insufficiently filtered User Agent string in SQL queries related to
comments posting. This vulnerability was already fixed in the
2.0-series of WordPress.
Impact
======
An attacker could send a comment with a malicious User Agent parameter,
resulting in SQL injection and potentially in the subversion of the
WordPress database. This vulnerability wouldn't affect WordPress sites
which do not allow comments or which require that comments go through a
moderator.
.........
I'm not sure if you had patched that or not, but
Your sites current state, made me wonder if they did not inject a "DROP" statement, to delete your database.
Posted by: davec at April 12, 2006 09:02 PM (CcXvt)
Posted by: Aaron's cc: at April 18, 2006 06:00 AM (ov6Vw)
Hide Comments
| Add Comment
April 10, 2006
Blogger Hacked by Online Terrorists Over Mohammed Cartoons
Our good freind
Aaron has been hacked by the al3iznet crew. You can see a
captured image of the hacked page here. It appears that he was targetted for his promotion of the Mohammed cartoons as this particular group of online terrorists has turned their attention to supporters of free speech in Denmark.
The group is well known and has hacked the Kingdom of Bahrain's website in the past. They've also targetted several Danish bloggers such as Nodblog and Uriaposten. So, Aaron ought to feel himself in good company.
Apparently, the cyber attack originated from Saudi Arabia. You mean to tell me there are terrorists from Saudi Arabia? I don't believe it!
Beth calls this the online equivalent of a fatwa. I'm sooooo jealous. All this time I've put in for a fatwa and what do I get? Nothing!
Ever wanted to e-mail an online terrorist? It just so happens that we have the e-mail address of the crew responsible for the wave of online terrorism:
al3iz@hotmail.com
Why not drop a line and let this guy know what you think of him.
UPDATE: It looks like another old friend, TC Leather Penguin, was also hacked, but he's back up again. As McGehee notes, both attacks were on Word Press users. The same can be said of the Danish bloggers who were attacked. Is there a flaw in Word Press that the ROPers have learned to exploit to their own advantage?
Posted by: Rusty at
09:26 AM
| Comments (8)
| Add Comment
Post contains 256 words, total size 2 kb.
Posted by: McGehee at April 10, 2006 09:42 AM (lAOTn)
2
Heh. And now it looks like his site's been restored to its pre-hack condition.
ABUYD.
Posted by: McGehee at April 10, 2006 09:44 AM (lAOTn)
3
What a lame, pathetic attempt. Of course, it's no coincidence that muslims and liberals use the same bullying tactics, and to the same effect.
Posted by: Improbulus Maximus at April 10, 2006 09:46 AM (0yYS2)
4
No Beth, my foulmouthed female fellow traveller, I'm not on Hosting Matters. I trust my stuff to
DataPipe, who are GODS when it comes to fixing this kind of crap and had me back up and running in under and hour of me filing the work ticket.
Posted by: TC@LeatherPenguin at April 10, 2006 11:24 AM (kd/kM)
5
It wasn't through WordPress. It was through the CPanel.
ABUYD...
I always heard this as
"He who laughs last just did a backup."
Posted by: Aaron's cc: at April 10, 2006 11:35 AM (ov6Vw)
Posted by: Aaron's cc: at April 10, 2006 02:37 PM (ov6Vw)
7
Good grief. All this fuss over some cartoons. You know, while all that was going on the first week or two, I was getting some hits from Pakistan and other Middle Eastern countries.
Posted by: RepJ at April 10, 2006 09:42 PM (y6n8O)
8
He has been hacked again.
They must be really pissed!
Aaron: Keep pissing them off, please.
Posted by: sugiero at April 12, 2006 03:39 AM (WBE9k)
Hide Comments
| Add Comment
28kb generated in CPU 0.0159, elapsed 0.1091 seconds.
119 queries taking 0.0984 seconds, 255 records returned.
Powered by Minx 1.1.6c-pink.