![]() |
did you admit this to them before they confronted you?
|
Quote:
Quote:
Quote:
|
Quote:
|
Quote:
I've seen a few programs put in their terms let us know before sending a test sale, like that makes any fucking sense, "Hey I'm about to send a test sale to see if your skimming me" :1orglaugh |
What's suspicious is an affiliate sending such low traffic numbers and thinking there's a need for a test and that there's something wrong in the first place. Now if the aff had sent 30,000 hits or some crazy number maybe, but 1200 spread out over how long?
Come on now. |
Quote:
Hey man, listen fucking carefully --> this is what we get here at the office for Amakings for the LAST TWO FUCKING YEARS on our systems. Look at it closely and then reformat your computer for a day and a half. http://oi58.tinypic.com/fehz55.jpg We gave up after 6 months, tried to contact, and then never signed up, and all the other sites are the same malware alert. It's been that way and no one will find out why. I was with them in the early days and totally respect the brand, and when I came back ready to do biz, this is what we saw - daily - (the screen cap was taken 5 minutes ago btw). Notice it's from BOTH Kaspersky AND Malwarebytes. <--- You cannot argue nor debate with that. I warned NUMEROUS other affil. managers over a year ago. and, just now I got off Skype 2 seconds ago with a highup affill manager with a big ass company (you all know) telling him about this very post that is going up. Any of you who don't run Anti-Malware software with eXploit protection are fucking idiots and don't need to be in our business. I'm sick of companies and morons spreading disease around the Net like an STD with a hot bitch without being proactive in spreading their shit to the hackers that destroy our lives everyday. Enough is enough. I've been around too fucking long to keep seeing this shit. I've mentioned it in other threads here, posts and so on. But morons keep a blind eye. In our business will you companies please run some decent detection software please? Or maybe you're running fucking ridiculous AVG on your backend?!! W.T.F. Idiots. Or, at least, check your servers once in 2 fucking years. Of course, unless it's intentional. |
Quote:
|
Yes. And your point is?
"...those companies." "Those companies" are the ones who warn assfucks about stupid shit on the internet. Ya know, like anti virus and shit. The LEAST they can do - and I notice you have a 'hosting company' referral link in your sig - is to run MalDet on the backend. And that's not to mention exploits. Or is that hosting company a bunch of tards too? meh |
Quote:
Listen, MALICIOUS CODE is malicious code. End of subject. There is no going around that. There is no defense against it. If you aren't playing by the rules, and exploits are shown, You. Are. Fucked. By the Engines, by Anti-Virus companies, Exploit companies, etc. It's been done since the earliest of days here. Anyone remember how it was in 1994, 95, 96, 97? Some of us here have been there, done that. If you don't play by the rules, you are fucked. That goes for Mainstream as well as Adult. Hosts included. You don't think your own HOST might be the culprit? And you become the victim? Or maybe you're running a Wordpress backend? Which I know Eric, Sly, et al. know completely about since the inception of GFY on VB. It. Is. A. Never. Ending. Battle. Always was, still is. Either way, it doesn't matter, whether it be custom built, or custom tweaked, malicious code is still malicious code. If you had Admin access to the server on the serverside, you don't see how powerful that position is? It might not be the client, some times it's the Host too. All possibilities remain. Think about that. The problem is, Adult is the spread of this kind of shit. Remember a very famous multi-million dollar company that was exposed for spreading intentional malware, and caught in public some years ago? Notice the word 'intentional..." I'd like to think ppl in this biz are on the up-and-up, but it's just not that way. Mainstream is infected yes. But Adult is infected uber-times the amount of sites online at any given moment. And it SHOULD be a DAILY check for anyone running a fucking Sponsor program online raking in hundreds of thousands of dollars all the time. When we posted about MoneyCult (not to mention the YNOT Virus that was the initial point of the posts)- here a while back about the same thing, those motherfuckers had that shit fixed in a matter of a day or two - maybe hours) - even though they did not respond to the thread - and that's fucking respectful. They at least realized that they MAY HAVE BEEN COMPROMISED. And my fucking hat goes off to them. THAT was cool. MoneyCult was compromised in a motherfucking --> SUB-folder, not Root. And no one knew. And, it was taken care of ASAP after posting here, even though we had gone to great lengths to contact them, the shit was still fixed. Same with YNOT. Shit. Got. Done. ASAP. With that said, I don't want to see bullshit flying around about "yeah, well what about this, and what about that.." Fuck that bullshit. Wake up you newbie idiots and smell the Internet for all the disease it is. And that's why it's a shame that Amakings has had auto-pilot on for over 2 fucking years and let this kind of shit happen. .PS- I'm the one who called out the Home Depot hack 2 fucking months before it made national news. I kept telling them - almost begging them - to get in touch with regional management, but the two heads of their dept. wouldn't listen. (...and yes, I have proof - Skype me: riklear and I'll give you the names and fucking phone number to call at HD). Amakings needs to get off the money train and auto pilot and check their servers so that all of you are not constantly infected with "...malicious code" <--- Read: "Mal-I-Cious Code.". Secure your shit or you will be on a forum somewhere crying. Otherwise, blame the fucking Chinese who bot your backend 5 times a nanosecond. Yes, I said nanosecond. Or don't you have alerts in ConficServer active. Whether it be a Unix backend, CloudLinux or whatever the fuck you're running - you should stay in touch with your server every day. When was the last time you updated your Kernel? Did you know that there are extreme PHP security updates just days ago by NIST? Did you upgrade your Apache last week for those updates? Morons. PS - Those updates will BREAK your WP installs by-the-fucking-way. Newbies, and veterans alike, need to get on the band wagon and step it up a notch. Whether it be Russia, China, Ukraine or some schmuck sitting his grandma's basement - stay up on shit and GET YOUR SHIT TOGETHER! .:2 cents: And on a side note, I'd LOVE to hear the horror stories with the GFY crew about ALL of the hacks they've come across over the long years. Ever think about that ya' all? I'm sure they could tell stories about their servers and the attacks they've had that would fill an entire forum. P-fucking-S-S: Don't come back with bullshit responses, this is about Amakings and their sub-sites giving us Malware warnings for about 2 years now. Only 'constructive' adult security-minded conversation please. Otherwise, I'll pounce on your ass like a kitten looking for a mouse in a bail of hay. . |
This escalated quickly
|
|
Well, I can't say anything bad to amakings. Yes, it's a bit challenging to convert, but if you have the right audience, it's good... I have a 1:230 ratio with them, not pushing tho lol
|
Quote:
Quote:
Quote:
That being said, if I send 7,200 uniques to ANYTHING on the web and I do not see a sale? You are damn Skippy I would pop off a test sale to make sure that somebody is not a thieving scumbag. Would I have handled that test sale differently? Of course. The fact of the matter is? I can't blame him. For all I know he is trickling in blind, false thumbnail clicked traffic. I have no fucking idea. I learned a LONG time ago to let a surfer know EXACTLY what they are getting into before they click. I'll take a 1:7 ratio on 7 clicks a day over a ZERO and 125,000 any day. Anybody that has every fucked with PPC would understand this. :2 cents: |
Quote:
|
All times are GMT -7. The time now is 10:30 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123