We all want a better and more prosperous life, especially, for our family. We all want to do good to improve our society. But sadly there are people who make a living by exploiting our good intentions. Take time to read a post by my friend Danny, regarding his personal experience with these kind of people. You can read it at part 1: http://dannybuntu.blogspot.com/2009/06/day-1037-how-to-make-300000-php-month.html. part 1b: http://dannybuntu.blogspot.com/2009/06/day-1037b-update-i-got-email-today.html part 2: http://dannybuntu.blogspot.com/2009/06/day-1037c-part-ii-how-not-to-invest-in.html part 3: http://dannybuntu.blogspot.com/2009/06/day-1038-summation-how-to-get-venture.html
I usually have no problem dealing with trojans and malwares but this one proved to be the hardest one yet. Because it operates in ways we don't expect. Usually trojans operate within your PC but what if the exploit is hosted somewhere else on the web. Woah! This took a week. Thanks to the people who commented on this blog. I could not figure out this solution without all of you who bounced your ideas here. Anyway, lets get rid of it . 1. In the Windows menu go to Start>Run 2. Type cmd 3. This will fire up the command window 4. Type ipconfig /all 5. This will display the actual configuration of your LAN card. Pay particular attention to the DNS entry. In my PC I got three entries: 0.255.122.15 85.255.112.156 1.2.3.4 Two of these entries are not correctly formed while 85.255.112.156 is the DNS address of the exploiter. A proper DNS entry given by your ISP should look something like - 58.69.254.143 6. Type ipconfig /release 7. Then ty...
Comments
I just got an email from another investor that is within the planning stage of filing a case of estafa against these people.
But, I advised him - it's legal. From my understanding if there is such a term - it is a legal scam. Meaning, we signed the MOA and we basically agreed to fooled by these SOBs.- more details on my blog.