Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Spam It's funny.  Laugh. Operating Systems Software Windows

Artists Against 419 Releases Mugu Marauder 222

An anonymous reader writes "Similar in scope to the (now defunct) screensaver created by Lycos that targeted spam sites, the newly-released Mugu Marauder is intended to take fraudulent bank sites off the air by sponging up their bandwidth. Mugu Marauder can be downloaded at www.aa419.org/mm/ It's currently only available for Windows, though a Linux port is allegedly in the works."
This discussion has been archived. No new comments can be posted.

Artists Against 419 Releases Mugu Marauder

Comments Filter:
  • FP (Score:5, Insightful)

    by michaelhood ( 667393 ) on Wednesday February 09, 2005 @06:03AM (#11616737)
    Beware of getting slammed by your ISP with a "friendly" letter, after consuming tons of bandwidth using something like this.
    • Re:FP (Score:3, Insightful)

      by Anonymous Coward
      Great, instead of contacting the hosting companies involved we DDOS them. Most scammers use shared hosting (usually signing up with a fraudulent credit card) and hence any such attacks can affect the whole server taking out hundreds of web sites, and even a whole subnet if network traffic is high too.

      • by Anonymous Coward
        Most scammers use shared hosting (usually signing up with a fraudulent credit card) and hence any such attacks can affect the whole server taking out hundreds of web sites

        That's a bonus!!!! If those affected website owners complain enough then the ISP will pull the offender!
      • Re:FP (Score:3, Insightful)

        by andynz ( 686071 )
        A lot of the 419 sites use cheap or free hosting services. The goal of these tools is to exceed the allocated bandwith of the site, and possibly to make the hosting companies take notice. Every site targeted has already been brought to the attention of the hosting companies involved. If they cannot be bothered doing anything about it they should be prepared for the consequences.
    • Re:FP (Score:3, Interesting)

      by Jugalator ( 259273 )
      Beware of getting slammed by your ISP with a "friendly" letter, after consuming tons of bandwidth using something like this.

      So, how much data do you send/receive?

      It's hard to judge the relevancy of what you say without knowing that.
      • Re:FP (Score:3, Interesting)

        by Jugalator ( 259273 )
        Off-topic? Maybe I should clarify:

        With "you" I meant "you as a user of this tool".

        So...

        How much data do this software transfer?

        1 MB / month? As much as it can?

        This is highly relevant to the "getting slammed by ISP for consuming tons of bandwidth", especially since this software may not consume "tons of bandwidth" at all. It would be very helpful to know how much it consumes.
    • yeah right, if you live in the freakin sticks. I have been using my entire upstream bandwidth pretty much constantly since I got a cable modem 2 years ago, with nary a whisper from time warner. Its capped anyway so its not like I am saturating a Big Pipe (tm).
  • Ha! (Score:5, Funny)

    by Anonymous Coward on Wednesday February 09, 2005 @06:04AM (#11616740)
    Why not just post a link to them on Slashdot.
    • Re:Ha! (Score:2, Interesting)

      by Anonymous Coward
      Better yet, let's scam the scammer... [419eater.com]
    • Why are they not using their botnets to DDOS the phishing sites and spammers?

      I mean, then MS security vulnerabilities would suddenly make sense.

      -silence
    • Too many things wrong with this.

      First, a slashdot effect only last a few hours. To really hit a site, the editors would need to describe the link as a photo site of Nathalie Portman dumping a bowl of hot grits down her pants.

      But after a few fake postings like that, /.ers would stop following links.

      Then you have the stories posted by Michael, which would have his bizarre editorial comments to drive people away.

      Even worse, over the next weekend, Commander Toco, who never reads his own site, would post a d
  • Yay (*sigh*) (Score:5, Insightful)

    by n0dalus ( 807994 ) on Wednesday February 09, 2005 @06:08AM (#11616752) Journal
    Once these sites get hit they redirect the dns towards legitamate services and change addresses.
    So this will probably just end up DDoS'ing the real banks instead of the fake ones, these fake banks move around a lot and create extra damage in their wake as a result of something like this.
    Fighting fire with fire just doesn't work like it should.
    • so you're saying I can't hard code an IP address into a program, or crc16/32 the index.html to verify i'm beating the right guy over the head?
      • Of course you can hard code an IP address into a program. But these places are notorious for not having static IP's.
        And crc'ing the index.html isn't always helpful either, since very often these places are using an *identical* layout and code to the real banks on their main page, also, they're likely to have small changes on them regularly, just like real banks, that would make verifying it with crc a nightmare.
    • Well, as a starter, most of these fraudalent sites work IP based because they dont have the real domain.
      So I'm guessing this problem you mention would not happen if you just attack the IP. When you attack the IP you'd be attacking their server, even if they point their domains to some other site.
    • Artists Against 419 works by getting people to download all the images on the fraudulent web page -- if they redirect the domain, these images will no longer exist. I would hope that the screensaver would be designed such that after one file not found error, it would no longer try to retrieve that file. Thus, unless the Mugus were able to somehow both redirect the site and use the same image names, this will really only affect their own server and associated ISP.
      • I would hope that the screensaver would be designed such that after one file not found error, it would no longer try to retrieve that file.

        I'd suggest a doubling delay time; start with a delay of 60 seconds -- a normal browser timeout-- after the fifth failure trying to load an image. If the picture doesn't load the next time, a two minute delay. Try again, four minutes. Probably cap it at 1024 minutes-- a little under a day, just because. In any case, such a delay would prevent a temporary /.ing from be

  • another dumb idea (Score:5, Insightful)

    by RMH101 ( 636144 ) on Wednesday February 09, 2005 @06:08AM (#11616753)
    Just like the Lycos screensaver that strangled spammer's bandwidth by not-quite-DDOS-ing them, this is a stupid idea. Legally you'd be opening yourself up to all kind of problems running this kind of thing: ISPs don't tend to take to kindly to this sort of denial of service attack.
    It's not sexy, or headline-grabbing, but the correct way to go about this is the same as it's always been: go after the ISPs to pull their accounts. If they're RFC-ignorant, add their IP blocks to the usual blacklists until they comply or are connected to an intranet.
    • Re:another dumb idea (Score:4, Interesting)

      by ForestGrump ( 644805 ) on Wednesday February 09, 2005 @06:13AM (#11616771) Homepage Journal
      The idea behind AA419 DDOS is that the hosting providers have been either unresponsive or unwilling to pull their accounts.

      The extreme measure is to consume the alloted bandwidth to the account and thus take the fake bank offline.

      Grump
    • Desperate times. Desperate measures.
    • Re:another dumb idea (Score:5, Informative)

      by maztuhblastah ( 745586 ) on Wednesday February 09, 2005 @08:23AM (#11617144) Journal
      As an actual member of 419eater, I feel compelled to feed the troll, or at least respond to it. As it stands, we have code that spiders the sites and checks if a bandwidth limit exceeded page has been reached. When it has, the hitlist is updated to no longer have that target on it. We have yet to have a hoster tell us we're DDOS'ing them...mainly because we have never, and will never DDOS them. We only try to exceed the bandwidth limit, not knock out the server.

      -maztuh
      • Well bandwidth on the internet is an issue. Using it up for this type of "operation" is stealing bandwidth from everyone else. Then there is always the problem with trusting that your code does what you say and that all the sites targeted are ones that are evil.

        Who makes that choice? Do the sites have any recourse to appeal if you make a wrong decision?

        Is the code which turns someones PC into your Zombie ever at risk of your benevolent control being taken over by someone else, or someone in your group wi
        • Using it up for this type of "operation" is stealing bandwidth from everyone else.

          Cry me a river. Better to "steal bandwidth" if we can stop these crooks from stealing real money from people. Wouldn't you put up with a slightly slower connection for a few hours if it meant a few thousand people didn't get screwed out of real money? If not, then you're a selfish ass.
          • "If not, then you're a selfish ass", I think my point was a more central point that had to do with the approval of vigilante action. Our system of justice has a central important principle that is "innocent until proven guilty". Which I would say fits here with some group taking it apon themselves to take action with the assumption that they are correct and doing justice or Gods work or whatever. It is a real danger. The other central theme is that the use of a public resource (not actually public but here
        • your just an bunch of idiots if you think this is a bad idea. read the post above and you will understand. these sites are all hosted on crumby free hosts who give them 500 meg of allowance or something of that nature. it takes fuck all time to consume that in this method. your not dosing the isp because they have obviously allowed for that bandwidth. so read and make informed comments, not just blathing shit spewing out your mouth. bank fraud is a major problem. i know from experience that free hosts don't
          • I understand from the previous posts that the thought is that the flooding is done carefully and like a precision guided weapon it only takes out the building that it is suppose to, but other posts also tell of action these sites are taking to re-route that traffic to the actual bank sites. This in military parlance is collateral damage.

            Is it your contention that any collateral damage is worth it?

            My point is that "then end does not justify the means"

            Once a arrow is loosed, it can not be recalled. Actions
  • Linux/unix version (Score:5, Insightful)

    by CvD ( 94050 ) * on Wednesday February 09, 2005 @06:09AM (#11616754) Homepage Journal
    Copy & paste the sites that are listed on the front page of the link in the article into a file called sites.txt, each on one line, and then run the following command:
    while true; do wget -q -i sites.txt --delete-after ; done
    A daemonized version shouldn't be that hard to write, just have it parse the URLs on the front page out every day, and re-run wget on the new list.

    Happy marauding...
  • Lad Vampire (Score:5, Informative)

    by apikoros ( 774290 ) * on Wednesday February 09, 2005 @06:10AM (#11616761)

    I like this, but prefer the lad vampire [aa419.org] at the same site. There is something somehow more satisfying about watching the images flash by.

    Just put it in a browser tab and let it run!

    • I abhor vigilantism but lad vampire [aa419.org] itself is an interesting, if not informative, concept. I wonder if the stock images used by the faux banks on their sites were legally paid for? If not, that kind of copyright infringement could be a potential legal argument brought against them, exposing their falsehood.

      I giggled when I read one of the fake banks was named fichnet.net [fichnet.net]. At least some of the scammers have a sense of humor.

  • Gee, thats great (Score:5, Insightful)

    by gowen ( 141411 ) <gwowen@gmail.com> on Wednesday February 09, 2005 @06:11AM (#11616763) Homepage Journal
    Vigilante justive via DDOS. Well, that won't set a horrible precedent for people knobbling the web site's of those they don't like. Who's next? Radical pro-life groups DDOS'ing websites with abortion information?

    (Yes, I know this has a slippery-slope element to it, but there are plenty of activist groups out there willing to be vigilantes, because they believe their actions to be either unambiguously moral, or divinely inspired.)
    • There's a critical difference between DDOSing a 409 scammer and DDOSing people you don't like politically. 409 scamming is illegal.

      This is only a slippery slope if you think crooks who accidentally drop their guns at the scene of the crime - and go back to ask for it back the next day - have a "point" (it's their property after all!). For the rest of us, we understand that DDOSing democrats.org or gop.org is much more likely to get you in legal trouble than doing that to some random phisher. And rightl
  • Think about it. (Score:5, Insightful)

    by Sheetrock ( 152993 ) on Wednesday February 09, 2005 @06:13AM (#11616773) Homepage Journal
    One successful 419 scam (where they soak some victim for hundreds of thousands of dollars) will pay quite handily for one of these fake websites, DoS or no DoS.

    On the other hand, the rest of us pay thrice: once for the victimization of regular people not yet wise to this game, once for the waste of bandwidth because of the huge amount of spam being sent out for this scam, and now once for do-gooders pumping loads of worthless data back through our shared Internet at these websites, which are replaced faster than they go down.

    On the surface it looks like a good idea, but it's just adding to the damage like all these other vigilante anti-spam tactics. A better technical solution already exists; switch from e-mail to instant messaging within a company and save all your instant messages.

    • Re:Think about it. (Score:5, Insightful)

      by macshit ( 157376 ) * <[snogglethorpe] [at] [gmail.com]> on Wednesday February 09, 2005 @06:39AM (#11616830) Homepage
      A better technical solution already exists; switch from e-mail to instant messaging within a company and save all your instant messages.

      You've got to be kidding...

      That's like switching to pogo sticks because you're afraid of car-jacking.

      How about instead: (1) use less brain-dead mail clients, and (2) educate your employees so they're not (quite) so brain-dead themselves. The advantage of being a company is that you can actually do these sorts of things.

      [I know, I know, some companies demand brain-death. I suppose it's pogo sticks for them.]
  • Is this (Score:2, Insightful)

    by Anonymous Coward
    legal?
    • Re:Is this (Score:5, Insightful)

      by DaHat ( 247651 ) on Wednesday February 09, 2005 @07:34AM (#11616958)
      Probably not.

      It's kinda like stealing pot from a dealer, chances are, he's not going to report the theft.

      Regardless of what is worse, 419ing of DoSing, both are bad and both are illegal, and just like copyright infringement on P2P, people will try to justify it "it's not like I am going to pay for it anyway" and "they already have enough money".
      • It also raises a risk. Like somebody said, the 419ers could easily redirect their domains onto whoever. Like the virus that DDOSed SCO. Somebody had suggested that SCO could simply redirect their domain to nothing to protect themselves, or even 127.0.0.1 so people with the virus end up flooding themselves, or worst of all, being truely evil and redirecting their domain onto Linux websites and DDOSing them.

        Say I'm intentionally and knowingly running this program, and the 419ers redirect their domain to, say
  • Leave well alone (Score:5, Insightful)

    by mattbee ( 17533 ) <matthew@bytemark.co.uk> on Wednesday February 09, 2005 @06:16AM (#11616780) Homepage
    I don't care who you're or how pretty the screensaver, just don't download programs for network abuse like this and expect your ISP to take it lightly. If you really want to take action against a phising site, call the ISP hosting it and complain to them. Same principle, less innocent parties affected along the way. If you don't get a response from that ISP, call the ISP further upstream... this is how we deal with network abuse; it's slow but it's legal, and it works.
    • Or if the ISPs don't respond, pretend you're a reporter for a newspaper, or some other "authority" that'll make them at least look into it.
    • by Pastis ( 145655 )
      I've just done it yesterday and they closed the account within minutes.

      See here: http://support.beamhost.co.uk/helpdesk/view.php?t i cketid=6360&auth=8f64e9b4

      The site is probably going to reopen somewhere else. But I've probably spent less time than it takes for them to reopen it.

      What's needed is a program that automates that.
      You feed it an URL and the program automatically search for a contact email (e.g. abuse@) and prepares an email for you to send.

      Then as most phishing sites are introduced by sp
    • Re:Leave well alone (Score:2, Informative)

      by waldonova ( 769039 )
      Some of us 419 baiters set out to find and close down the fake bank / lottery sites that are used as part of the scams. Victims are referred to these sites to help with the confidence scam and some even require thousands of dollars to open an "account [swissroyallbank.com]". One site has services that support every 419 modality that I know of [standardtrustfin.com], right down to the "Private Dumbered Bank Account!" All joking aside, not only can you loose money [theregister.co.uk] but some have even been killed [news24.com] by 419 fraudsters. We have had great success shutting do
  • Why a binary? (Score:4, Interesting)

    by eddy ( 18759 ) on Wednesday February 09, 2005 @06:25AM (#11616805) Homepage Journal

    >It's currently only available for Windows,

    Why? I once saw a webpage that did this using only javascript. A simple page reload would give you updated arrays of images which your browser then loaded over and over and over again to exhaust the spamvertized sites bandwidth.

  • by October_30th ( 531777 ) on Wednesday February 09, 2005 @06:25AM (#11616806) Homepage Journal
    Similar in scope to the (now defunct) screensaver created by Lycos that targeted spam sites

    And will probably work just as well... vigilante justice never works and should not be tolerated.

  • by Kickasso ( 210195 ) on Wednesday February 09, 2005 @06:30AM (#11616815)
    aa419.org, that is. They apparently think it's legal and acceptable, so they won't complain.
  • Apparently... (Score:5, Interesting)

    by Tuxedo Jack ( 648130 ) on Wednesday February 09, 2005 @06:58AM (#11616876) Homepage
    It assigns a UID when the installer is run.

    Each one is something like this:

    620ad934fc97bebb65f77bc883211351

    That makes me wonder - just what does each one represent?

    • > Each one is something like this:

      > 620ad934fc97bebb65f77bc883211351

      > That makes me wonder - just what does each one represent?

      It's either a compressed and encrypted representation of everything on your hard drive, or else a fortune cookie in 4un94r14n 1337.

  • by Serious Simon ( 701084 ) on Wednesday February 09, 2005 @07:00AM (#11616882)
    What about a program that enables you to automatically send fake responses to a 419-scam e-mail, using different FROM: addresses and variable contents, so they cannot be easily identified as such?

    Imagine a 419-scammer sitting in an internet café in Lagos, getting thousands and thousands of mails appearing to be from people genuinely interested in the proposal, and having to follow up on them all just in case one or two are from real persons...

    • by Anonymous Coward
      Better yet set up a premium rate fax number and ask them to fax you the details. You scam the scammers for hard cash, with no nasty side effects. For good measure you could always set the baud rate on your machine nice and low so it takes longer to send the fax and costs them even more money.

      The advantage of just emailing them back of course is that if enough people did it then the scam would stop. Imagine having to sort through 50,000 emails to find the real suckers, rather than a dozen or so. Identifying
    • What about a program that enables you to automatically send fake responses to a 419-scam e-mail, using different FROM: addresses and variable contents, so they cannot be easily identified as such?

      Different idea (not automated), but some people make it a hobby: http://419eater.com

      It's really hilarious stuff.
  • websense (at least how it's configured here) blocks access to all the sites mugu is trying to download from. i'll have to try it from home.
  • The implementation sucks. Who needs a screensaver?

    But there's a seed of a good idea here, if you throttle it. It would not take any serious bandwidth hogging to crud up the phishing net with data that the phisher has to carefully check by hand because it could lead the police to him/her. Likewise the spammers. Eat their profits by eating their time.

    Taking networks down to squash the cockroach is bad, but there is no reason not to lay a little boric acid out, so to speak.
  • by goldfndr ( 97724 ) on Wednesday February 09, 2005 @07:20AM (#11616933) Homepage Journal
    The site is currently sponsoring a flashmob [aa419.org] in celebration of Chinese New Year. It started 2005-02-08 at 16:00:01 GMT and lasts 48 hours.

    One of the links from the flashmob page is for bash scripts suitable for Linux/*nix [aa419.org] (and presumably OS X et al).

  • Block list (Score:5, Insightful)

    by blackest_k ( 761565 ) on Wednesday February 09, 2005 @07:29AM (#11616946) Homepage Journal
    It makes far more sense for a centralised block list, regularly updated, hosted by a reputible body.

    A small change in functionality to your web browser so that when you attempt to connect to a site on your blocklist. your browser informs you and the reason why and then asks you if you want to proceed anyway.

    its a much more economic use of resources and could be added to by local police agencys as victims become known or perhaps a phishing notify button added to our browsers.

    when we wander upon a site thats dodgy that url can be passed on to the hosts of the blocking lists, a site would be verified to prevent malicious use and if checked out as being ok, it wouldnt be reexamined till a certain number of other referals took place.

    No waste of bandwidth, no denial of service attack on any site just a hazard warning in your browser that the site may be harmful.

    perhaps the banking sites might even care to host such a list.
  • by famebait ( 450028 ) on Wednesday February 09, 2005 @07:44AM (#11616990)
    You mean to say Artists Against 419, after finally capturing Dr. Mugu Marauder, are now releasing him?
  • by mugu_marauder ( 857722 ) on Wednesday February 09, 2005 @07:50AM (#11617020) Homepage
    It is nice to know that the IT industry is full of experts who fail to do the first thing when presented with something new..... Try researching things guys. 1. The Mugu Marauder operates exactly the same as a web browser repeatedly refreshing with no cache on a specified list of target URL's (normally images because they typically have a large filesize compared to HTML pages). 2. The UID number generated for the application is used to tally stats for individual users, so just drop the paranoia. 3. FFS The sites targetted ARE NOT related in any way to legitimate banks. As I said if you did a little research before sprouting your "me too" crap you might realise just EXACTLY The Artists Against 419 are fighting against. 4. A DoS attack is defined as the act of deliberately trying to make a service on the attacked machine unavailable by flooding it with requests, sometimes using deliberately corrupted data packets. Now, I dont know where you tool come from or whether you sympathize with cyber criminals or are simply too dense to comprehend ths. We are downloading images from *CRIMINAL* fake banks after having tried to contact the hoster and shut down these *CRIMINALS* in vain at least two times or mopre. Then, and then only, do we actually start trying to deliberately exceed the allowed bandwidth of these *CRIMINALS*, so they cant use their bogus banks to prey on unsuspecting victims. It is *NOT* an attack on the servers, but on the *CRIMINAL* websites only.
    • We are downloading images from *CRIMINAL* fake banks after having tried to contact the hoster and shut down these *CRIMINALS* in vain at least two times or mopre. Then, and then only, do we actually start trying to deliberately exceed the allowed bandwidth of these *CRIMINALS*, so they cant use their bogus banks to prey on unsuspecting victims. It is *NOT* an attack on the servers, but on the *CRIMINAL* websites only.

      Oh come on, man. First of all, who made you a cop? Are you sworn to uphold the law?

      • I never said I was a cop.

        The sorry thing is that apart from South Africa, law enforcement is useless when it comes to enforcing or even recognising 419 fraud.

        Case in point; One of our members had compiled an tracked down a 419 gang operating in the UK. This evidence was taken to the MET who promptly did nothing. The evidence was full correspondence, details of bank accounts owned by the gang, phone numbers, photographs of the gang and their location. And you know what happened, NOTHING!!!

        Well, I lie,

    • It is *NOT* an attack on the servers, but on the *CRIMINAL* websites only.

      Right. Because hitting a particular site hard will have no effect on other sites being hosted on the same shared server, or subnet?
  • What exactly is the purpose of the frame site ciribank.co.uk?

  • Dear Sir (Score:5, Funny)

    by Flakeloaf ( 321975 ) on Wednesday February 09, 2005 @08:09AM (#11617083) Homepage
    Dear Verizon Subscriber:

    I am Dr. Muntange Dwambo, the nephew of the director of your internet service provider's Accepatble Use Enforcement division.

    It has come to our attention that you are consuming an unusual amount of bandwidth. I am therefore here to give you a one-time opportunity. My uncle has recently passed away, and left me in control of THREE HUNDRED THOUSAND GIGABYTES PER MONTH of bandwidth. Unfortunately that bandwidth is only available to Verizon subscribers, and that company does not yet offer their services in my native Nigeria.
  • Pointless again... (Score:4, Insightful)

    by Da Web Guru ( 215458 ) on Wednesday February 09, 2005 @08:28AM (#11617159)
    Of course, this will have no real impact on taking down phishing sites. The people that set up most phishing sites follow these simple steps:

    1) Find a vulnerable server and root it, or get just enough access (through something like a phpBB exploit) to upload a phishing site to the right directory. They will end up with a URL that probably looks like "http://aaa.bbb.ccc.ddd/online/wamu.html". Phishing sites don't bother with mundane details like DNS or domains (waste of time and energy) because the URL will be conviently hidden with javascript by your favorite HTML email client anyway.

    2) Repeat the above step as often as you like to have a "cluster" of phishing sites.

    3) Send out tons of spam advertising the phishing sites, randomly picking one of the above URLs to use for the login page.

    4) By the time the phishing sites are detected, reported, and disabled (could be as long as a week or two or four), hundreds of people could have attempted to log into each of the fake login sites.

    5) In most cases, the owner of the server being used for the phishing site is completely oblivious of the phishing site. (The rest of their web sites are working fine, so why should they be aware of any problems?) DDoS'ing them will only attack a confused victim.
  • by AviLazar ( 741826 ) on Wednesday February 09, 2005 @08:43AM (#11617241) Journal
    or just link the offending website on /.
  • At least with real vigilantes, they don't take out an entire neighborhood of innocent people just to get one person..

    The collateral damage on these sorts of things make the 'attackers' ( there is no better word for them ) no better then the scammers they are going after...
  • For those interested, here's [doubletongued.org] a definition of mugu [doubletongued.org]. It's a self-link.
  • anonymous (Score:5, Interesting)

    by glassesmonkey ( 684291 ) on Wednesday February 09, 2005 @12:57PM (#11620102) Homepage Journal
    Seems to me that filling their dB with useless information would be more effective. (Increasing the victim to fake ratio). These forms are where they are actually taking bank acct numbers. Taking their bandwidth is s temporary band-aid when they are opening webhosting accounts for free, or at most $5.

    Couldn't someone make a bookmarklet or javascript to fill forms with fake info? Here are some of the forms they use to get personal information.

    http://www.raboswiss.com/housec/ACCSETUP.HTM [raboswiss.com]
    http://www.swissroyallbank.com/onlinebanking/getst art.php [swissroyallbank.com]
    http://www.kashbankcorp.com/contact_us.php [kashbankcorp.com]
    http://www.alphapbonline.com/aibb/online_servces.h tm [alphapbonline.com]
    http://www.alliance-ctb.com/ebank/apply.asp [alliance-ctb.com]
    http://www.libertystrongholdgroup.com/aindex.html [libertystr...dgroup.com]
    http://www.fichnet.net/contact.php [fichnet.net]
  • Like I posted months ago [slashdot.org], what if the Lycos idea was used against other sites?

    This software allows you to do exactly what I predicted: you can put in any site you want and it'll start leeching from that site. Now all we need is a few dozen people to start leeching from some website they don't like, for example, some guy's private site who is unpopular on a forum, and you're looking at huge server bills and likely the site would be shutdown within a day if bandwidth went from a few megs a day to gigabyte

Business is a good game -- lots of competition and minimum of rules. You keep score with money. -- Nolan Bushnell, founder of Atari

Working...