ROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEX
10 July 2011, 06:05 AM | #1 |
Member
Join Date: Mar 2009
Location: Nashville, TN
Posts: 42
|
Rogue Sites masquerading as TRF?
I just realized today that I think I screwed up last night. While doing some googling, I was surprised to find I needed to log in in order to view the pics when clicking on a link.
A similar thing again today, but this time I happened to notice the URL of the site I was logging into. It wasn't http://www.rolexforums.com/ !!! Is someone screen scraping TRF to reconstruct this site in order to harvest passwords??? (I changed my password today) |
10 July 2011, 06:08 AM | #2 |
Member
Join Date: Mar 2009
Location: Nashville, TN
Posts: 42
|
BTW, would someone here please put a Pepsi insert on the market soon? My new watch would thank you.
|
10 July 2011, 06:28 AM | #3 | |
"TRF" Member
Join Date: Apr 2006
Real Name: Paul
Location: Wales, UK
Posts: 14,578
|
Quote:
Perhaps you could be more specific. You mention an alternate URL which you were apparently logging into, was it 50.XX.XX.XX (replace XX with numbers)?
__________________
..33 |
|
10 July 2011, 11:08 AM | #4 |
Member
Join Date: Mar 2009
Location: Nashville, TN
Posts: 42
|
1) I was using google to find watch related information
2) I found links to sites that had TRF in their banner, but were not using the rolexforums.com domain name 3) I gave one of those sites my [old] TRF password Maybe it's okay, though. I didn't write down the URLs from my previous search results, but if I run this query google://"62510 jubilee -rolexforums -network54" then, I get --> http://50.30.33.71/ which is fine since > `ping rolexforums.com` PING rolexforums.com (50.30.33.71): 56 data bytes 64 bytes from 50.30.33.71: icmp_seq=0 ttl=52 time=32.217 ms 64 bytes from 50.30.33.71: icmp_seq=1 ttl=52 time=33.353 ms * It's a great [evil] idea though, non? |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|
*Banners
Of The Month*
This space is provided to horological resources.