Miscellaneous, Personal

Da*n I got fooled once again 🙁 I hope this will be the last time I got scammed. I already learn many experience with all those scammer. This is my newest real personal story about fraud domain appraisal. I know this happen because I’m not doing research first. For everyone please do research first before you do something. It’s will really help you to stop get scammed by many f*cking scammer out there.

So it began, *lol* One day I got email from someone I don’t know (hammond@thenamepros.com, other report he was using another email address but words completely almost same, the good news IP always same all coming from 213.140.225.228) He send mail to me and asking how much I sell my domain name (ahooy.net, actually I listed it for testing if someone interest on that domain name). This email coming after I list my domain name on SEDO, that’s why I give title with this words “Target SEDO User“. Of course I interest and reply that email, and then he started to foolish me “In order to successful transaction with him, I must buy certificate domain appraisal on website he want (this website own by him).

So I just trust this scammer without research and start to buy certificate domain appraisal on www.bestdomainexperts.com (this site owned by those scammer) After I pay and they send to me a FAKE result I try to contact this guy again. He started to acting like really interesting to buy my domain name and try to foolish me again to using www.bestdomainexperts.com service (listing) I started to smell something wrong in here, I do research on google and found out this guy is scam lot of people on there, look at this URL: http://www.namepros.com/639974-another-scam-letter-elite-investment-group-4.html

After found this page, I try to manipulate this scammer to reveal some information but no luck, all email just trash words talking blablabla.. I open dispute on paypal (now escalate to claim) and email SWREG about this scammer. I really want to puch this guy on his face till he die if he in front of me *lol* Because this case I’AM OFFICIALY CLOSED ALL BUSINESS, OFFER, PARTNERSHIP, AND FRIENDSHIP REQUEST FROM NIGERIA AND RUSSIAN.

Next, You can see all screenshot of this conversation (ALL REAL, I GUARANTEE WITHIN MY LIFE) :

NOTE:

My goal is not this $81.xx but I want to jailed this frauders, I can simply earn more than $81.xx in one day. This is all about reputation not about money.

This is my proof about this guy is one person, he’s frauder, he’s scammer, don’t trust his words, everything he say just TRASH.

I use two email address on this conversation, ist***o[at]gmail.com (me) and ratna*****[at]gmail.com (my sister). Scammer using two email address hammond@thenamepros.com and info@namesaleshop.com, but all coming from same IP 213.140.225.228.

Please don’t laugh when you read this stupid conversation 😀

1. Scammer start’s to refer me to website he want.


Read More »

Related Search Terms:

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS
Computer And Internet, Personal, Tips & Trick

Computer virus always using sociable technique to infecting their victims. When there is gossip virus creator always using this gossip to spreading their virus ex:paris hilton xxx movies, what FBI hidding from us, etc. This time they’re using facebook popularity to infect all facebook fans. This virus also has been reported bundled with FAKE antispyware security tools.

When you see this on your monitor that mean you’re already infected.

Just ignore this fake antispyware warning, if you follow it you will get more virus infected your computer or your operating system gonna be corrupt.

How to Remove Facebook Virus W32/Obfuscated.D2!genr :

1. It’s recommended to running windows in “safe mode” when in cleaning process, backup all your important data first!.

2. Disable “System Restore” when in cleaning process.

3. Disconnected your computers from local network.

4. Download “unlocker” and install it.

5. Download “security task manager” then kill virus process active in computer background.

[to_plus]

6. Download repair.inf then right click, choose “install”. Make sure repair.inf content same with this:

[Version]

Signature=”$Chicago$”
Provider=nobody

[DefaultInstall]
AddReg=inject
DelReg=rem

[inject]
HKLM, Software\CLASSES\batfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\comfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\exefile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\piffile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\regfile\shell\open\command,,,”regedit.exe €œ%1″”
HKLM, Software\CLASSES\scrfile\shell\open\command,,,”””%1″” %*”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, €œExplorer.exe”
HKCU, Software\Microsoft\Internet Explorer\Main, tart Page,0, €œabout:blank”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,userinit,0, €œuserinit.exe”

[rem]
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,reader_s
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,47543326
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,PromoReg
HKCU, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,reader_s
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,EnableProfileQuota
HKLM, SOFTWARE\AGProtect
HKLM, SOFTWARE\47543326
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network, UID
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion, Rlist
HKU, .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\{43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6}
HKU, .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\{8FFA689D-2C2B-2B2E-D865-74C04CA4EF06}

7. Delete this file list has been created by virus, before you doing this set your computers to show all hidden files.

%systemroot%\Documents and Settings\All Users\Application Data\47543326
%systemroot%\Documents and Settings\%user%\Start Menu\Programs\Security Tools.lnk
%systemroot%\Documents and Settings\%user%\Desktop\Security Tools.lnk
%systemroot%\Documents and Settings\%user%\Application Data\wiaservg.log
%systemroot%\Documents and Settings\%user%\Local Settings\Temp\*.tmp
%systemroot%\WINDOWS\Temp\wpv311256600826.exe
%systemroot%\WINDOWS\Temp\wpv411256806849.exe
%systemroot%\Documents and Settings\%user%\reader_s.exe
%systemroot%\Documents and Settings\%user%\Start Menu\Programs\Startup\isqsys32.exe
%systemroot%\WINDOWS\system32\reader_s.exe
%systemroot%\Windows\system32\wbem\proquota.exe
%systemroot%\windows\system32\sdra64.exe

%systemroot%\Windows\system32\lowsec
local.ds
user.ds
user.ds.lll

* NOTE: when you have problem deleted folder %systemroot%\Windows\system32\lowsec and file %systemroot%\windows\system32\sdra64.exe please use unlocker. Right click on folder/files then choose unlocker, choose deleted then click OK. If there any warning just ignore it.

7. Deleted all temporary files using ATF-Cleaner.

8. Update your best antivirus then scan full all your system, make sure there is no virus/worm/trojan left.

9. Subscribe to my blog… hehehe 😀

Good luck, have a great day 🙂

[/to_plus]

[Version]
Signature=”$Chicago$”
Provider=nobody[DefaultInstall]
AddReg=inject
DelReg=rem[inject]
HKLM, Software\CLASSES\batfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\comfile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\exefile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\piffile\shell\open\command,,,”””%1″” %*”
HKLM, Software\CLASSES\regfile\shell\open\command,,,”regedit.exe €œ%1″”
HKLM, Software\CLASSES\scrfile\shell\open\command,,,”””%1″” %*”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, €œExplorer.exe”
HKCU, Software\Microsoft\Internet Explorer\Main, tart Page,0, €œabout:blank”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon,userinit,0, €œuserinit.exe”

[rem]
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,reader_s
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,47543326
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,PromoReg
HKCU, SOFTWARE\Microsoft\Windows\CurrentVersion\Run,reader_s
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,EnableProfileQuota
HKLM, SOFTWARE\AGProtect
HKLM, SOFTWARE\47543326
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network, UID
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion, Rlist
HKU, .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\{43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6}
HKU, .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\{8FFA689D-2C2B-2B2E-D865-74C04CA4EF06}

Related Search Terms:

    Digg Del.icio.us StumbleUpon Reddit Twitter RSS