Jump to content

User:COIBot/LinkReports/informatics.indiana.edu

From Meta, a Wikimedia project coordination wiki
This is an automated report generated by COIBot
If your username appears here, COIBot has had a reason (now or in the past) to pick up a link you have been adding.
  • The link has been reported to e.g. en:Wikipedia talk:WikiProject Spam;
  • The link has been added by someone whose username is very similar to the domain being added;
  • The IP related to the link is added by someone with an IP close to the IP of the link.


These reasons why can be found in the blacklist and monitor reasons above the actual records (if they are not there, the link is not monitored/blacklisted anymore).
The reason behind your name will be one of the reasons listed in the reasons why it is monitored/blacklisted. Your appearance there does not mean you have a conflict of interest with adding the link, it may very well be accidental overlap, or a good link which was picked up by the bot accidentally, or a good link which is nonetheless under investigation of the wikiprojects en:Wikipedia:Conflict of interest/Noticeboard or en:Wikipedia:WikiProject Spam


For more information on the working of the bot, see the user page of COIBot. If you have further questions, notify COIBot's maintainer, Dirk Beetstra, or on en:Wikipedia talk:WikiProject Spam.

WARNING to users of this data. At the moment of creation, parts of the database were not available (due to maintenance or database problems) – be careful: there may be more additions available
  • Old table deactivated
  • Main store table deactivated
    Older revids of this page may contain data pertaining other additions.


[edit]
















  • informatics.indiana.edu is hosted on soic.indiana.edu










  • xavier.informatics.indiana.edu resolves to 156.56.94.5


Users

[edit]








  • 2D
    User is whitelisted: User is in a trusted group rollbacker on some wikis












  • Bongwarrior
    User is whitelisted: User is in a trusted group sysop on some wikis


  • Capricorn42
    User is whitelisted: User is in a trusted group rollbacker on some wikis
  • ClueBot
    User is whitelisted: User is in trusted groups bot, rollbacker, reviewer on some wikis
  • ClueBot NG
    User is whitelisted: User is in trusted groups bot, rollbacker, reviewer on some wikis
  • CorenSearchBot
    User is whitelisted: User is in a trusted group bot on some wikis
  • Courcelles
    User is whitelisted: User is in a trusted group sysop on some wikis
  • Dcirovic
    User is whitelisted: User is in a trusted group rollbacker on some wikis
  • Dekimasu
    User is whitelisted: User is in a trusted group sysop on some wikis
  • Diba
    User is whitelisted: User is in a trusted group editor on some wikis


  • Drmies
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis


  • Epbr123
    User is whitelisted: User is in a trusted group sysop on some wikis
  • Excirial
    User is whitelisted: User is in a trusted group sysop on some wikis




  • FordPrefect42
    User is whitelisted: User is in a trusted group editor on some wikis
  • Helder.wiki
    User is whitelisted: User is in trusted groups sysop, reviewer on some wikis
  • IRP
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • ImperatorExercitus
    User is whitelisted: User is in a trusted group rollbacker on some wikis
  • Inferno, Lord of Penguins
    User is whitelisted: User is in a trusted group rollbacker on some wikis
  • JaGa
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Jeff G.
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Kraftlos
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Longharulo
    User is whitelisted: User is in a trusted group editor on some wikis
  • Luckas Blade
    User is whitelisted: User is in trusted groups sysop, bureaucrat, rollbacker, editor, reviewer on some wikis
  • MER-C
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Mnmngb
    User is whitelisted: User is in a trusted group editor on some wikis


  • My76Strat
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Nickptar
    User is whitelisted: User is in a trusted group sysop on some wikis
  • Pinkadelica
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis




  • Redfarmer
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Rrburke
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Rubin16
    User is whitelisted: User is in trusted groups sysop, bureaucrat, editor on some wikis
  • Ruud Koot
    User is whitelisted: User is in trusted groups sysop, reviewer on some wikis
  • RyanCross
    User is whitelisted: User is in trusted groups sysop, bureaucrat, rollbacker on some wikis
  • Salebot
    User is whitelisted: User is in a trusted group bot on some wikis


  • ScottyBerg
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis


  • Sesu Prime
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis


  • SimonTrew
    User is whitelisted: User is in a trusted group reviewer on some wikis


  • Stormbay
    User is whitelisted: User is in a trusted group reviewer on some wikis




  • The Thing That Should Not Be
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Thingg
    User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
  • Ukexpat
    User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
  • Versus22
    User is whitelisted: User is in a trusted group rollbacker on some wikis




  • İnfoCan
    User is whitelisted: User is in trusted groups sysop, bureaucrat on some wikis

Additions

[edit]
  1. 2008-05-27 09:57:37 w:en:User:CorenSearchBot (talk, contribs, -1) to w:en:Music informatics (diff, not top edit), link xavier.informatics.indiana.edu/gradsites/music/masters (RXL,Search)
    Other links: xavier.informatics.indiana.edu/gradsites/music/masters (-1,2,X,X,,RXL)

    User is in a trusted group bot on some wikis
  2. 2008-06-01 19:19:02 w:zh:User:Eliot (talk, contribs, 1307) to w:zh:PubChem (diff, not top edit), link cheminfo.informatics.indiana.edu/PubChemSR/ (RXL,Search)
    Other links: depth-first.com/articles/2007/09/26/p (1307,9,1,1,,RXL) cheminfo.informatics.indiana.edu/PubChemSR/ (1307,6,1,1,,RXL) pubchem.ncbi.nlm.nih.gov/help.html (1307,-1,X,X,,RXL) pubchem.ncbi.nlm.nih.gov/help.html#faq (1307,-1,X,X,,RXL) pubchem.ncbi.nlm.nih.gov/search/ (1307,-1,X,X,,RXL) pubchem.ncbi.nlm.nih.gov (1307,-1,X,X,,RXL)
  3. 2008-06-06 14:19:16 w:en:User:Redfarmer (talk, contribs, 1360) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (1360,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (1360,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (1360,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (1360,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (1360,3398,X,X,,RXL) itre.cis.upenn.edu (1360,1206,X,X,,RXL) www.technewsworld.com/story/47607.html. (1360,652,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (1360,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (1360,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (1360,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (1360,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (1360,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (1360,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (1360,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (1360,-1,X,X,,RXL) www.browser-recon.info (1360,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (1360,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (1360,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (1360,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (1360,201,X,X,,RXL) www.indiana.edu (1360,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (1360,-1,X,X,,RXL) www.yourbank.example.com (1360,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (1360,-1,X,X,,RXL) [email protected] (1360,-1,X,X,,RXL) support.microsoft.com/kb/834489 (1360,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (1360,46,X,X,,RXL) www.cs.technion.ac.il (1360,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (1360,-1,X,X,,RXL) q.queso.com/archives/001617 (1360,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (1360,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (1360,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (1360,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (1360,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (1360,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (1360,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (1360,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (1360,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (1360,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (1360,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (1360,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (1360,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (1360,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (1360,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (1360,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (1360,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (1360,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (1360,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (1360,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (1360,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (1360,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (1360,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (1360,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (1360,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (1360,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (1360,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (1360,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (1360,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (1360,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (1360,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (1360,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (1360,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (1360,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (1360,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (1360,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (1360,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (1360,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (1360,-1,X,X,,RXL) www.deas.harvard.edu (1360,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (1360,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (1360,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (1360,623,X,X,,RXL) people.deas.harvard.edu (1360,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (1360,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (1360,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (1360,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (1360,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (1360,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (1360,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (1360,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (1360,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (1360,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (1360,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (1360,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (1360,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (1360,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (1360,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (1360,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (1360,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (1360,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (1360,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (1360,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (1360,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (1360,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (1360,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (1360,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (1360,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (1360,3684,X,X,,RXL) www.vnunet.com/vnunet/news/2215894/scammers-aim-google-adwords (1360,830,X,X,,RXL) www.antiphishing.org (1360,101,X,X,,RXL) www.banksafeonline.org.uk (1360,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (1360,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (1360,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (1360,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (1360,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (1360,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (1360,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (1360,108,X,X,,RXL) atlas.arbor.net/summary/phishing (1360,55,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  4. 2008-06-10 10:24:45 w:en:User:ClueBot (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (-1,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu (-1,1206,X,X,,RXL) www.technewsworld.com/story/47607.html. (-1,652,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.vnunet.com/vnunet/news/2215894/scammers-aim-google-adwords (-1,830,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  5. 2008-06-11 04:19:29 w:zh:User:Fishingsnow (talk, contribs, 7) to w:zh:生物数学 (diff, not top edit), link www.informatics.indiana.edu/schnell/research/enzymology.asp (RXL,Search)
    Other links: www.maths.gla.ac.uk/research/groups/biology/kal.htm (7,23,2,1,,RXL) www.maths.gla.ac.uk/ (7,23,2,1,,RXL) www.informatics.indiana.edu/schnell/research/enzymology.asp (7,114,1,1,,RXL) calvino.polito.it/ (7,3,1,1,,RXL) www.ma.hw.ac.uk/ (7,117,2,1,,RXL) www.ma.hw.ac.uk/ (7,117,2,1,,RXL) www.sbi.uni-rostock. (7,1,1,1,,RXL)
  6. 2008-06-13 05:58:03 w:en:User:Soaringbear (talk, contribs, 11) to w:en:PubChem (diff, not top edit), link darwin.informatics.indiana.edu/juhur/Tools/PubChemSR/ (RXL,Search)
    Other links: darwin.informatics.indiana.edu/juhur/Tools/PubChemSR/ (11,1,1,1,,RXL)
  7. 2008-06-14 02:14:12 w:en:User:ClueBot (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (-1,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu (-1,1206,X,X,,RXL) www.technewsworld.com/story/47607.html. (-1,652,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.vnunet.com/vnunet/news/2215894/scammers-aim-google-adwords (-1,830,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  8. 2008-06-14 20:28:01 w:it:User:Shony (talk, contribs, 54) to w:it:Chemioinformatica (diff, not top edit), link cheminfo.informatics.indiana.edu (RXL,Search)
    Other links: www.molinspiration.com/chemoinformatics.html (54,13,1,1,,RXL) infochim.u-strasbg.fr/chemoinformatics/Obernai%20Declaration.pdf (54,-1,X,X,,RXL) www.leadfinding.com (54,1,1,1,,RXL) www.blueobelisk.org (54,11,1,1,,RXL) www.echeminfo.com (54,5,1,1,,RXL) cheminfo.informatics.indiana.edu (54,6,1,1,,RXL) www (54,-1,X,X,,RXL)
  9. 2008-06-16 18:38:23 w:en:User:DonAByrd (talk, contribs, 3) to w:en:Musical notation (diff, not top edit), link www.informatics.indiana.edu/donbyrd/CMNExtremes.htm (RXL,Search)
    Other links: www.informatics.indiana.edu/donbyrd/CMNExtremes.htm (3,114,2,1,,RXL)
  10. 2008-06-20 04:27:00 w:pt:User:Helder.wiki (talk, contribs, 283) to w:pt:Gnuplot (diff, not top edit), link cheminfo.informatics.indiana.edu/ (RXL,Search)
    Other links: www.gnuplot.info/ (283,30,X,X,,RXL) www.gnuplot.info/ (283,30,X,X,,RXL) www.cpan.org (283,42,X,X,,RXL) gnuplot-py.sourceforge.net/ (283,-1,X,X,,RXL) rgnuplot.sourceforge.net (283,-1,X,X,,RXL) www.gnuplot.info/faq/faq.html#section00032000000000000000 (283,30,X,X,,RXL) www.gnuplot.info/ (283,30,X,X,,RXL) gnuplot.sourceforge.net/demo_4.2/ (283,-1,X,X,,RXL) t16web.lanl.gov/kawano/gnuplot/index-e.html (283,9,X,X,,RXL) www.manning.com/janert (283,148,X,X,,RXL) www-128.ibm.com/developerworks/library/l-gnuplot/ (283,693,X,X,,RXL) www.cs.unc.edu/ (283,137,X,X,,RXL) www.sci.muni.cz/ (283,77,X,X,,RXL) www.sccs.swarthmore.edu/users/07/mustpaks/howto.php?doc=histogram (283,70,X,X,,RXL) www.dmoz.org/science/math/software/graphing/gnuplot// (283,-1,X,X,,RXL) cheminfo.informatics.indiana.edu/ (283,6,X,X,,RXL)

    User is in trusted groups sysop, reviewer on some wikis
  11. 2008-06-21 09:05:34 w:en:User:RyanCross (talk, contribs, 1671) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (1671,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (1671,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (1671,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (1671,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (1671,3398,X,X,,RXL) itre.cis.upenn.edu (1671,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (1671,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (1671,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (1671,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (1671,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (1671,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (1671,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (1671,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (1671,-1,X,X,,RXL) www.browser-recon.info (1671,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (1671,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (1671,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (1671,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (1671,201,X,X,,RXL) www.indiana.edu (1671,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (1671,-1,X,X,,RXL) www.yourbank.example.com (1671,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (1671,-1,X,X,,RXL) [email protected] (1671,-1,X,X,,RXL) support.microsoft.com/kb/834489 (1671,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (1671,46,X,X,,RXL) www.cs.technion.ac.il (1671,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (1671,-1,X,X,,RXL) q.queso.com/archives/001617 (1671,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (1671,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (1671,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (1671,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (1671,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (1671,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (1671,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (1671,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (1671,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (1671,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (1671,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (1671,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (1671,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (1671,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (1671,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (1671,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (1671,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (1671,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (1671,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (1671,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (1671,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (1671,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (1671,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (1671,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (1671,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (1671,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (1671,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (1671,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (1671,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (1671,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (1671,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (1671,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (1671,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (1671,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (1671,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (1671,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (1671,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (1671,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (1671,-1,X,X,,RXL) www.deas.harvard.edu (1671,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (1671,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (1671,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (1671,623,X,X,,RXL) people.deas.harvard.edu (1671,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (1671,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (1671,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (1671,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (1671,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (1671,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (1671,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (1671,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (1671,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (1671,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (1671,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (1671,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (1671,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (1671,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (1671,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (1671,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (1671,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (1671,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (1671,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (1671,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (1671,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (1671,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (1671,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (1671,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (1671,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (1671,3684,X,X,,RXL) www.antiphishing.org (1671,101,X,X,,RXL) www.banksafeonline.org.uk (1671,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (1671,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (1671,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (1671,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (1671,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (1671,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (1671,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (1671,108,X,X,,RXL) atlas.arbor.net/summary/phishing (1671,55,X,X,,RXL)

    User is in trusted groups sysop, bureaucrat, rollbacker on some wikis
  12. 2008-06-21 12:53:53 w:en:User:MER-C (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (-1,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  13. 2008-06-21 12:57:52 w:en:User:JaGa (talk, contribs, 10292) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/mmn.pdf (RXL,Search)
    Other links: atlas.arbor.net/summary/phishing (10292,55,X,X,,RXL) www.technicalinfo.net/papers/Phishing.html (10292,108,X,X,,RXL) www.honeynet.org/papers/phishing/ (10292,99,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (10292,153,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (10292,-1,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (10292,-1,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (10292,61,X,X,,RXL) www.securityfocus.com/infocus/1745 (10292,999,X,X,,RXL) www.banksafeonline.org.uk (10292,30,X,X,,RXL) www.antiphishing.org (10292,101,X,X,,RXL) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (10292,3684,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (10292,-1,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (10292,-1,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (10292,3345,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (10292,87,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (10292,-1,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (10292,-1,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (10292,34,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (10292,109,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (10292,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (10292,770,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (10292,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (10292,-1,X,X,,RXL) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (10292,-1,X,X,,RXL) informationweek.com/story/showArticle.jhtml?articleID=60404811 (10292,3684,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (10292,559,X,X,,RXL) www.cybercrime.gov/mantovaniIndict.htm (10292,73,X,X,,RXL) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (10292,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (10292,353,X,X,,RXL) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (10292,-1,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (10292,623,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (10292,278,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (10292,101,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (10292,46,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (10292,1289,X,X,,RXL) people.deas.harvard.edu (10292,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (10292,623,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (10292,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (10292,196,X,X,,RXL) www.deas.harvard.edu (10292,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (10292,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (10292,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (10292,118,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (10292,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (10292,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (10292,191,X,X,,RXL) www.mozilla.org/security/phishing-test.html (10292,-1,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (10292,767,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (10292,64,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (10292,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (10292,-1,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (10292,-1,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (10292,61,X,X,,RXL) www2006.org/programme/item.php?id=3533 (10292,86,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (10292,37,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (10292,114,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (10292,871,X,X,,RXL) www.hexview.com/sdp/node/24 (10292,41,X,X,,RXL) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (10292,-1,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (10292,38,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (10292,830,X,X,,RXL) applications.boi.com/updates/Article?PR_ID=1430 (10292,35,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (10292,613,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (10292,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (10292,196,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (10292,915,X,X,,RXL) www.csoonline.com/talkback/071905.html (10292,252,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/A59349-2004Nov18 (10292,-1,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (10292,114,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (10292,131,X,X,,RXL) www.techweb.com/wire/security/186701001 (10292,601,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (10292,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (10292,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (10292,613,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (10292,-1,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (10292,-1,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (10292,60,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (10292,613,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (10292,-1,X,X,,RXL) q.queso.com/archives/001617 (10292,36,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (10292,-1,X,X,,RXL) www.cs.technion.ac.il (10292,138,X,X,,RXL) www.shmoo.com/idn/homograph.txt (10292,46,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (10292,-1,X,X,,RXL) support.microsoft.com/kb/834489 (10292,-1,X,X,,RXL) [email protected] (10292,-1,X,X,,RXL) www.w3.org/Addressing/rfc1738.txt (10292,-1,X,X,,RXL) www.yourbank.example.com (10292,35,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (10292,-1,X,X,,RXL) www.indiana.edu (10292,2117,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (10292,201,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (10292,-1,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (10292,-1,X,X,,RXL) www.browser-recon.info (10292,39,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (10292,-1,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (10292,933,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (10292,216,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (10292,62,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (10292,67,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (10292,-1,X,X,,RXL) www.wordspy.com/words/phishing.asp (10292,399,X,X,,RXL) www.technicalinfo.net/papers/Phishing.html (10292,108,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (10292,3398,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (10292,-1,X,X,,RXL) www.technewsworld.com/story/47607.html. (10292,652,X,X,,RXL) itre.cis.upenn.edu (10292,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (10292,3398,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (10292,-1,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (10292,-1,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (10292,173,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (10292,88,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  14. 2008-06-23 21:54:16 w:pt:User:Plataformista (talk, contribs, 3) to w:pt:Cibernética (diff, not top edit), link informatics.indiana.edu/edenm/EdenMedinaJLASAugust2006.pdf (RXL,Search)
    Other links: www.infoamerica.org/documentos_word/shannon-wiener.htm (3,66,1,1,,RXL) informatics.indiana.edu/edenm/EdenMedinaJLASAugust2006.pdf (3,114,1,1,,RXL)
  15. 2008-06-24 07:11:10 w:en:User:ClueBot (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  16. 2008-06-24 07:11:49 w:en:User:Bongwarrior (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu/ (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info/ (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu/ (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com/ (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected]/ (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il/ (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu/ (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu/ (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk/ (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in a trusted group sysop on some wikis
  17. 2008-06-24 07:12:04 w:en:User:Nickptar (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) searchsecurity.techtarget.com/tip/0,289483,sid14_gci1193304,00.html (-1,173,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu (-1,1206,X,X,,RXL) www.technewsworld.com/story/47607.html. (-1,652,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.vnunet.com/vnunet/news/2215894/scammers-aim-google-adwords (-1,830,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL)

    User is in a trusted group sysop on some wikis
  18. 2008-06-25 17:19:00 w:en:User:Stormbay (talk, contribs, -1) to w:en:L. Jean Camp (diff, not top edit), link www.informatics.indiana.edu/people/profiles.asp?u=ljcamp (RXL,Search), redirect help.soic.indiana.edu/redirect/informatics.php?referrer=people/profiles.asp, RXL
    Other links: www.informatics.indiana.edu/people/profiles.asp?u=ljcamp (-1,114,X,X,,RXL)

    User is in a trusted group reviewer on some wikis
  19. 2008-06-26 17:27:58 w:en:User:156.56.202.11 (talk, contribs, 1) to w:en:Bio-inspired computing (diff, not top edit), link informatics.indiana.edu/rocha/i-bic/ (RXL,Search)
    Other links: informatics.indiana.edu/rocha/i-bic/ (1,114,1,1,,RXL)
  20. 2008-06-28 10:36:50 w:en:User:ClueBot (talk, contribs, -1) to w:en:Web crawler (diff, not top edit), link informatics.indiana.edu/fil/papers/aa98.ps (RXL,Search)
    Other links: wiki.foaf-project.org/scutter (-1,7,X,X,,RXL) doi.acm.org/10.1145/358923.358934 (-1,-1,X,X,,RXL) www10.org/cdrom/papers/210/index.html (-1,18,X,X,,RXL) www10.org/cdrom/papers/pdf/p208.pdf (-1,18,X,X,,RXL) www.dcc.uchile.cl/%7eccastill/papers/baeza05_crawling_country_better_breadth_first_web_page_ordering.pdf (-1,65,X,X,,RXL) www.webist.org (-1,15,X,X,,RXL) llama.org/hamster/monkey/page.html (-1,17,X,X,,RXL) informatics.indiana.edu/fil/papers/icml.ps (-1,114,X,X,,RXL) informatics.indiana.edu/fil/papers/aa98.ps (-1,114,X,X,,RXL) web.archive.org/web/20040317210216/http://www.fxpal.com/people/vdberg/pubs/www8/www1999f.pdf (-1,-1,X,X,,RXL) web.archive.org/web/20010904075500/http://archive.ncsa.uiuc.edu/sdg/it94/proceedings/searching/pinkerton/webcrawler.html (-1,-1,X,X,,RXL) nautilus.dii.unisi.it/pubblicazioni/files/conference/2000-diligenti-vldb.pdf (-1,8,X,X,,RXL) www.netdynamics.eu/analytics/text-scannings-from-google-bot.html (-1,14,X,X,,RXL) portal.acm.org/citation.cfm?doid=958942.958945 (-1,-1,X,X,,RXL) pages.stern.nyu.edu (-1,309,X,X,,RXL) www.robotstxt.org/wc/exclusion.html (-1,38,X,X,,RXL) www.robotstxt.org/wc/guidelines.html (-1,38,X,X,,RXL) www.dcc.uchile.cl (-1,65,X,X,,RXL) www.mccurley.org/papers/fractal.pdf (-1,7,X,X,,RXL) www.scit.wlv.ac.uk/%7ecm1993/papers/web_crawling_ethics_preprint.doc (-1,26,X,X,,RXL) infolab.stanford.edu (-1,-1,X,X,,RXL) cis.poly.edu/tr/tr-cis-2001-03.pdf (-1,9,X,X,,RXL) mingo.info-science.uiowa.edu/eichmann/www94/spider.ps (-1,6,X,X,,RXL) cis.poly.edu/polybot/ (-1,9,X,X,,RXL) grid.ucy.ac.cy/webrace/ (-1,3,X,X,,RXL) www.cs.ucr.edu (-1,57,X,X,,RXL) law.dsi.unimi.it/index.php (-1,5,X,X,,RXL) citeseer.ist.psu.edu/rd/1549722%2c509701%2c1%2c0.25%2cdownload/http://citeseer.ist.psu.edu/cache/papers/cs/26004/http:zszzszwww.idi.ntnu.nozsz%7ealgkonzszgenereltzszse-dynamicweb1.pdf/risvik02search.pdf (-1,-1,X,X,,RXL) www.cs.berkeley.edu (-1,342,X,X,,RXL) j-spider.sourceforge.net (-1,-1,X,X,,RXL) larbin.sourceforge.net/index-eng.html (-1,-1,X,X,,RXL) sourceforge.net/projects/webtools4larbin/ (-1,-1,X,X,,RXL) bithack.se/methabot/ (-1,23,X,X,,RXL) dbpubs.stanford.edu:8091 (-1,-1,X,X,,RXL) dbpubs.stanford.edu:8091 (-1,-1,X,X,,RXL) www.cs.cmu.edu (-1,2314,X,X,,RXL) www.cwr.cl/projects/wire/ (-1,3,X,X,,RXL) search.cpan.org (-1,864,X,X,,RXL) dev.perl.org/licenses/ (-1,57,X,X,,RXL) www.noviway.com/code/web-crawler.aspx (-1,2,X,X,,RXL) www.ucw.cz/holmes/ (-1,4,X,X,,RXL) www.centrum.cz (-1,6,X,X,,RXL) sourceforge.net/projects/ruya/ (-1,-1,X,X,,RXL) ruya.sourceforge.net/ruya.singledomaindelaycrawler-class.html (-1,-1,X,X,,RXL) uicrawler.sourceforge.net (-1,-1,X,X,,RXL) www.agentkernel.com (-1,2,X,X,,RXL) www.perlspider.com (-1,2,X,X,,RXL) arachnode.net (-1,5,X,X,,RXL) dinejs.googlecode.com (-1,3,X,X,,RXL) spci.st.ewi.tudelft.nl/crawljax/ (-1,3,X,X,,RXL) www2003.org/cdrom/papers/refereed/p007/p7-abiteboul.html (-1,8,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/ubicrawler.pdf (-1,14,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/paradoxicalpagerank.pdf (-1,14,X,X,,RXL) www.webtechniques.com/archives/1997/05/burner/ (-1,6,X,X,,RXL) chato.cl/research/crawling_thesis (-1,9,X,X,,RXL) dbpubs.stanford.edu/pub/1998-51 (-1,-1,X,X,,RXL) www.cs.brown.edu/courses/cs227/2002/cache/cho.pdf (-1,200,X,X,,RXL) portal.acm.org/citation.cfm?id=511464 (-1,-1,X,X,,RXL) portal.acm.org/citation.cfm?doid=857166.857170 (-1,-1,X,X,,RXL) dx.doi.org/10.1002/asi.20078 (-1,-1,X,X,,RXL) www.cindoc.csic.es/cybermetrics/pdf/68.pdf (-1,19,X,X,,RXL) www.nature.com/doifinder/10.1038/21987 (-1,-1,X,X,,RXL) www.cs.cmu.edu (-1,2314,X,X,,RXL) arxiv.org/abs/cs/0503069 (-1,-1,X,X,,RXL) dollar.biz.uiowa.edu (-1,12,X,X,,RXL) www.dcc.fua.br (-1,3,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  21. 2008-07-08 11:26:36 w:en:User:ClueBot (talk, contribs, -1) to w:en:List of systems biology research groups (diff, not top edit), link www.informatics.indiana.edu/systemsbiology/ (RXL,Search)
    Other links: www.ibi.ucalgary.ca (-1,3,X,X,,RXL) mededu.med.uottawa.ca/oisb/ (-1,1,X,X,,RXL) tdccbr.med.utoronto.ca (-1,2,X,X,,RXL) www.csb.utoronto.ca (-1,3,X,X,,RXL) www.bu.edu/abl (-1,2334,X,X,,RXL) magnet.c2b2.columbia.edu (-1,-1,X,X,,RXL) www.c2b2.columbia.edu (-1,-1,X,X,,RXL) sysbio.med.harvard.edu (-1,-1,X,X,,RXL) www.informatics.indiana.edu/systemsbiology/ (-1,114,X,X,,RXL) csbi.mit.edu (-1,-1,X,X,,RXL) www.vcu.edu/csbc/ (-1,253,X,X,,RXL) www.sysbio.org (-1,10,X,X,,RXL) biomaps.rutgers.edu (-1,4,X,X,,RXL) biox.stanford.edu (-1,-1,X,X,,RXL) medicine.tamhsc.edu/basic_sciences/sbtm (-1,11,X,X,,RXL) www.sys-bio.org (-1,3,X,X,,RXL) bioengineering.ucsd.edu (-1,1,X,X,,RXL) www.vbi.vt.edu (-1,12,X,X,,RXL) www.enfin.org (-1,2,X,X,,RXL) www.psb.ugent.be (-1,11,X,X,,RXL) www.cbs.dtu.dk/researchgroups/ (-1,92,X,X,,RXL) www.phys-mito.u-bordeaux2.fr (-1,1,X,X,,RXL) www-helix.inrialpes.fr (-1,1,X,X,,RXL) www.pasteur.fr/recherche/unites/biolsys/ (-1,525,X,X,,RXL) www.molgen.mpg.de (-1,7,X,X,,RXL) www.hepatosys.de/en/index.html (-1,2,X,X,,RXL) www.sbi.uni-rostock.de/index2.html (-1,2,X,X,,RXL) www.charite.de/sysbio/ (-1,170,X,X,,RXL) systemsbiology.rcsi.ie (-1,1,X,X,,RXL) www.systemsbiologyireland.org (-1,1,X,X,,RXL) www.cosbi.eu (-1,21,X,X,,RXL) www.cigene.no (-1,4,X,X,,RXL) www.sysbiol.net (-1,1,X,X,,RXL) www.systemsx.ch (-1,23,X,X,,RXL) www.imsb.ethz.ch (-1,3,X,X,,RXL) dbkgroup.org (-1,5,X,X,,RXL) www.ebi.ac.uk/compneur/ (-1,2079,X,X,,RXL) www2.warwick.ac.uk/fac/sci/systemsbiology/ (-1,1048,X,X,,RXL) www3.imperial.ac.uk/cisbic (-1,637,X,X,,RXL) csbe.bio.ed.ac.uk (-1,1,X,X,,RXL) www.bioch.ox.ac.uk/sysbio/ (-1,13,X,X,,RXL) www.mycib.ac.uk (-1,1,X,X,,RXL) www.cpib.info (-1,1,X,X,,RXL) www.cisban.ac.uk (-1,1,X,X,,RXL) www.systemsbiology.ulster.ac.uk (-1,2,X,X,,RXL) www.insysbio.ru (-1,3,X,X,,RXL) www.igib.res.in (-1,7,X,X,,RXL) www.sbi.jp (-1,1,X,X,,RXL) systemsbiology.snu.ac.kr (-1,1,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  22. 2008-07-12 00:14:19 w:it:User:83.103.75.204 (talk, contribs, 2) to w:it:Erico Menczer (diff, not top edit), link homer.informatics.indiana.edu (RXL,Search)
    Other links: homer.informatics.indiana.edu (2,1,1,1,,RXL)
  23. 2008-08-15 03:32:25 w:en:User:76.215.34.191 (talk, contribs, 1) to w:en:Informatics (academic field) (diff, not top edit), link informatics.indiana.edu (RXL,Search), redirect www.soic.indiana.edu/, RXL
    Other links: informatics.indiana.edu (1,114,1,1,,RXL)
  24. 2008-09-10 20:19:17 w:en:User:ClueBot (talk, contribs, -1) to w:en:Web crawler (diff, not top edit), link informatics.indiana.edu/fil/papers/aa98.ps (RXL,Search)
    Other links: www10.org/cdrom/papers/210/index.html (-1,18,X,X,,RXL) www10.org/cdrom/papers/pdf/p208.pdf (-1,18,X,X,,RXL) www.dcc.uchile.cl/%7eccastill/papers/baeza05_crawling_country_better_breadth_first_web_page_ordering.pdf (-1,65,X,X,,RXL) www.webist.org (-1,15,X,X,,RXL) llama.org/hamster/monkey/page.html (-1,17,X,X,,RXL) informatics.indiana.edu/fil/papers/icml.ps (-1,114,X,X,,RXL) informatics.indiana.edu/fil/papers/aa98.ps (-1,114,X,X,,RXL) web.archive.org/web/20040317210216/http://www.fxpal.com/people/vdberg/pubs/www8/www1999f.pdf (-1,-1,X,X,,RXL) web.archive.org/web/20010904075500/http://archive.ncsa.uiuc.edu/sdg/it94/proceedings/searching/pinkerton/webcrawler.html (-1,-1,X,X,,RXL) nautilus.dii.unisi.it/pubblicazioni/files/conference/2000-diligenti-vldb.pdf (-1,8,X,X,,RXL) www.netdynamics.eu/analytics/text-scannings-from-google-bot.html (-1,14,X,X,,RXL) portal.acm.org/citation.cfm?doid=958942.958945 (-1,-1,X,X,,RXL) pages.stern.nyu.edu (-1,309,X,X,,RXL) www.robotstxt.org/wc/exclusion.html (-1,38,X,X,,RXL) www.robotstxt.org/wc/guidelines.html (-1,38,X,X,,RXL) www.dcc.uchile.cl (-1,65,X,X,,RXL) www.mccurley.org/papers/fractal.pdf (-1,7,X,X,,RXL) www.scit.wlv.ac.uk/%7ecm1993/papers/web_crawling_ethics_preprint.doc (-1,26,X,X,,RXL) infolab.stanford.edu (-1,-1,X,X,,RXL) cis.poly.edu/tr/tr-cis-2001-03.pdf (-1,9,X,X,,RXL) mingo.info-science.uiowa.edu/eichmann/www94/spider.ps (-1,6,X,X,,RXL) cis.poly.edu/polybot/ (-1,9,X,X,,RXL) grid.ucy.ac.cy/webrace/ (-1,3,X,X,,RXL) www.cs.ucr.edu (-1,57,X,X,,RXL) law.dsi.unimi.it/index.php (-1,5,X,X,,RXL) citeseer.ist.psu.edu/rd/1549722%2c509701%2c1%2c0.25%2cdownload/http://citeseer.ist.psu.edu/cache/papers/cs/26004/http:zszzszwww.idi.ntnu.nozsz%7ealgkonzszgenereltzszse-dynamicweb1.pdf/risvik02search.pdf (-1,-1,X,X,,RXL) www.cs.berkeley.edu (-1,342,X,X,,RXL) j-spider.sourceforge.net (-1,-1,X,X,,RXL) larbin.sourceforge.net/index-eng.html (-1,-1,X,X,,RXL) sourceforge.net/projects/webtools4larbin/ (-1,-1,X,X,,RXL) bithack.se/methabot/ (-1,23,X,X,,RXL) www.jaeksoft.com/websearch.html (-1,5,X,X,,RXL) dbpubs.stanford.edu:8091 (-1,-1,X,X,,RXL) dbpubs.stanford.edu:8091 (-1,-1,X,X,,RXL) www.cs.cmu.edu (-1,2314,X,X,,RXL) www.cwr.cl/projects/wire/ (-1,3,X,X,,RXL) search.cpan.org (-1,864,X,X,,RXL) dev.perl.org/licenses/ (-1,57,X,X,,RXL) www.noviway.com/code/web-crawler.aspx (-1,2,X,X,,RXL) www.ucw.cz/holmes/ (-1,4,X,X,,RXL) www.centrum.cz (-1,6,X,X,,RXL) sourceforge.net/projects/ruya/ (-1,-1,X,X,,RXL) ruya.sourceforge.net/ruya.singledomaindelaycrawler-class.html (-1,-1,X,X,,RXL) uicrawler.sourceforge.net (-1,-1,X,X,,RXL) www.agentkernel.com (-1,2,X,X,,RXL) www.perlspider.com (-1,2,X,X,,RXL) arachnode.net (-1,5,X,X,,RXL) dinejs.googlecode.com (-1,3,X,X,,RXL) spci.st.ewi.tudelft.nl/crawljax/ (-1,3,X,X,,RXL) www2003.org/cdrom/papers/refereed/p007/p7-abiteboul.html (-1,8,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/ubicrawler.pdf (-1,14,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/paradoxicalpagerank.pdf (-1,14,X,X,,RXL) www.webtechniques.com/archives/1997/05/burner/ (-1,6,X,X,,RXL) chato.cl/research/crawling_thesis (-1,9,X,X,,RXL) dbpubs.stanford.edu/pub/1998-51 (-1,-1,X,X,,RXL) www.cs.brown.edu/courses/cs227/2002/cache/cho.pdf (-1,200,X,X,,RXL) portal.acm.org/citation.cfm?id=511464 (-1,-1,X,X,,RXL) portal.acm.org/citation.cfm?doid=857166.857170 (-1,-1,X,X,,RXL) dx.doi.org/10.1002/asi.20078 (-1,-1,X,X,,RXL) www.cindoc.csic.es/cybermetrics/pdf/68.pdf (-1,19,X,X,,RXL) www.nature.com/doifinder/10.1038/21987 (-1,-1,X,X,,RXL) www.cs.cmu.edu (-1,2314,X,X,,RXL) arxiv.org/abs/cs/0503069 (-1,-1,X,X,,RXL) dollar.biz.uiowa.edu (-1,12,X,X,,RXL) www.dcc.fua.br (-1,3,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  25. 2008-10-10 16:23:17 w:en:User:2D (talk, contribs, 7) to w:en:Musical notation (diff, not top edit), link www.informatics.indiana.edu/donbyrd/cmnextremes.htm (RXL,Search)
    Other links: www.muslimheritage.com/uploads/music2.pdf (7,2092,X,X,,RXL) www.omenad.net/articles/omeswarlipi.htm (7,112,X,X,,RXL) www.britac.ac.uk/events/2004/abstracts/2004-bagley.htm (7,332,X,X,,RXL) www.olga.net/ (7,5,X,X,,RXL) musicnotation.org (7,12,X,X,,RXL) www.musicmarkup.info/scope/markuplanguages.html (7,5,X,X,,RXL) emusician.com/ar/emusic_xml_music/ (7,232,X,X,,RXL) www.scribeserver.com/neumes/ (7,8,X,X,,RXL) pianostudioone.ca/brushed2.mp3 (7,19,X,X,,RXL) www.sju.edu/ (7,218,X,X,,RXL) www.byzantine-musics.com/welcomepage.htm (7,4,X,X,,RXL) www.philtulga.com/counter.html (7,74,X,X,,RXL) ninagilbert.googlepages.com/british.html (7,7,X,X,,RXL) www.musictheory.net (7,15,X,X,,RXL) www.informatics.indiana.edu/donbyrd/cmnextremes.htm (7,114,X,X,,RXL) 253.ccarh.org/ (7,3,X,X,,RXL) ling.kgw.tu-berlin.de/semiotik/english/zfs/zfs87_3-4_e.htm#7 (7,9,X,X,,RXL) www.tigerbill.com/drumlessons.htm#theory (7,7,X,X,,RXL) d.t.read.googlepages.com/readingpotatoprint (7,3,X,X,,RXL) musicnotation.org (7,12,X,X,,RXL) www.kerylos.fr/repertoire.php (7,24,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  26. 2008-10-10 17:43:27 w:en:User:Epbr123 (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: [email protected] (-1,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (-1,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu/ (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info/ (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu/ (-1,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.yourbank.example.com/ (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected]/ (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il/ (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (-1,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (-1,28,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu/ (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu/ (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk/ (-1,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL)

    User is in a trusted group sysop on some wikis
  27. 2008-10-24 22:01:12 w:en:User:ImperatorExercitus (talk, contribs, 3797) to w:en:Musical notation (diff, not top edit), link www.informatics.indiana.edu/donbyrd/cmnextremes.htm (RXL,Search)
    Other links: www.muslimheritage.com/uploads/music2.pdf (3797,2092,X,X,,RXL) www.omenad.net/articles/omeswarlipi.htm (3797,112,X,X,,RXL) www.britac.ac.uk/events/2004/abstracts/2004-bagley.htm (3797,332,X,X,,RXL) www.olga.net/ (3797,5,X,X,,RXL) musicnotation.org (3797,12,X,X,,RXL) www.musicmarkup.info/scope/markuplanguages.html (3797,5,X,X,,RXL) emusician.com/ar/emusic_xml_music/ (3797,232,X,X,,RXL) www.scribeserver.com/neumes/ (3797,8,X,X,,RXL) pianostudioone.ca/brushed2.mp3 (3797,19,X,X,,RXL) www.sju.edu/ (3797,218,X,X,,RXL) www.byzantine-musics.com/welcomepage.htm (3797,4,X,X,,RXL) www.philtulga.com/counter.html (3797,74,X,X,,RXL) ninagilbert.googlepages.com/british.html (3797,7,X,X,,RXL) www.musictheory.net (3797,15,X,X,,RXL) www.informatics.indiana.edu/donbyrd/cmnextremes.htm (3797,114,X,X,,RXL) 253.ccarh.org/ (3797,3,X,X,,RXL) ling.kgw.tu-berlin.de/semiotik/english/zfs/zfs87_3-4_e.htm#7 (3797,9,X,X,,RXL) www.tigerbill.com/drumlessons.htm#theory (3797,7,X,X,,RXL) d.t.read.googlepages.com/readingpotatoprint (3797,3,X,X,,RXL) musicnotation.org (3797,12,X,X,,RXL) www.kerylos.fr/repertoire.php (3797,24,X,X,,RXL) www.simplifiedmusicnotation.org (3797,5,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  28. 2008-11-02 19:01:15 w:en:User:Jeff G. (talk, contribs, 26196) to w:en:Salvador Allende (diff, not top edit), link www.informatics.indiana.edu/edenm/publications/publications.html (RXL,Search)
    Other links: www.salvador-allende.cl/biografia/trayectoria.pdf (26196,40,X,X,,RXL) www.elclarin.cl/fpa/temas/20.html (26196,81,X,X,,RXL) www.elclarin.cl/fpa/pdf/p_020605.pdf (26196,81,X,X,,RXL) foia.state.gov/reports/churchreport.asp#c.%20the%201970%20election (26196,-1,X,X,,RXL) www.frontpagemag.com/articles/readarticle.asp?id=10612 (26196,2115,X,X,,RXL) www.elcato.org/node/2108 (26196,85,X,X,,RXL) web.archive.org/web/20050307181050/http://icarito.latercera.cl/icarito/2003/912/pag1a.htm (26196,-1,X,X,,RXL) web.archive.org/web/20030922064807/http://icarito.latercera.cl/icarito/2003/912/pag1b.htm (26196,-1,X,X,,RXL) www.iglesia.cl/iglesiachile/2003/1973/aplenenu.html (26196,76,X,X,,RXL) www.informatics.indiana.edu/edenm/publications/publications.html (26196,114,X,X,,RXL) www.guardian.co.uk/venezuela/story/0,,1948020,00.html (26196,-1,X,X,,RXL) countrystudies.us/chile/85.htm (26196,-1,X,X,,RXL) countrystudies.us/chile/ (26196,-1,X,X,,RXL) web.archive.org/web/20030922064040/http://icarito.latercera.cl/icarito/2003/912/pag1c.htm (26196,-1,X,X,,RXL) www.geocities.com/educhile_1970s/tanquetazo.html (26196,-1,X,X,,RXL) www.geocities.com/educhile_1970s/index.html (26196,-1,X,X,,RXL) www.lewrockwell.com/roberts/roberts189.html (26196,2510,X,X,,RXL) www.presidencia.gob.cl/view/viewgaleriapresidentes.asp?id=31&seccion=presidencia%20por%20dentro&interfazseccion=galeria%20presidentes#a31 (26196,6,X,X,,RXL) www.geocities.com/ajhrhodes/doc-three.htm#_ftn3 (26196,-1,X,X,,RXL) www2.eluniversal.com.mx/pls/impreso/noticia.html?id_nota=164983&tabla=notas (26196,-1,X,X,,RXL) www.timesonline.co.uk/tol/news/world/article568154.ece (26196,-1,X,X,,RXL) foia.state.gov/reports/hincheyreport.asp (26196,-1,X,X,,RXL) foia.state.gov/reports/churchreport.asp (26196,-1,X,X,,RXL) cbsnews.cbs.com/stories/2000/09/11/world/main232452.shtml (26196,-1,X,X,,RXL) www.guardian.co.uk/international/story/0,3604,260382,00.html (26196,-1,X,X,,RXL) www.namebase.org/chile.html (26196,155,X,X,,RXL) www.gwu.edu/ (26196,-1,X,X,,RXL) www.gwu.edu/ (26196,-1,X,X,,RXL) www.tercera.com/medio/articulo/0,0,3255_5664_266608320,00.html (26196,97,X,X,,RXL) www.gwu.edu/ (26196,-1,X,X,,RXL) www.gwu.edu/ (26196,-1,X,X,,RXL) cafehistoria.ning.com/video/video/show?id=1980410%3avideo%3a43317 (26196,11,X,X,,RXL) www.radiolaprimerisima.com/noticias/3510 (26196,99,X,X,,RXL) findarticles.com/p/articles/mi_qa3613/is_200309/ai_n9294265/pg_5?tag=artbody;col1 (26196,-1,X,X,,RXL) www.abacq.org/calle/index.php (26196,23,X,X,,RXL) www.cyberussr.com/hcunn/for/chile-73.html (26196,83,X,X,,RXL) mrzine.monthlyreview.org/allende110906.html (26196,312,X,X,,RXL) www.salvador-allende.cl/audio/salvador_allende_11sept_1973.mp3 (26196,40,X,X,,RXL) www.elclarin.cl/fpa/hemeroteca.html (26196,81,X,X,,RXL) www.elclarin.cl/index.php?option=com_content&task=view&id=12166&itemid=73 (26196,81,X,X,,RXL) video.google.com/videoplay?docid=-2562611999831760993 (26196,-1,X,X,,RXL) www.lanacion.cl/prontus_noticias/site/artic/20050925/pags/20050925205502.html (26196,1570,X,X,,RXL) www.josepinera.com/pag/pag_tex_quiebredemoc_en.htm (26196,58,X,X,,RXL) www.misantiago.cl/pxs/entrete/pxs12.htm (26196,56,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  29. 2008-11-03 00:08:12 w:zh:User:Zanhsieh (talk, contribs, 2248) to w:zh:钓鱼式攻击 (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: [email protected] (2248,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (2248,88,1,1,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (2248,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (2248,73,2,1,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (2248,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (2248,3398,X,X,,RXL) itre.cis.upenn.edu (2248,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (2248,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (2248,108,2,1,,RXL) www.wordspy.com/words/phishing.asp (2248,399,1,0,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (2248,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (2248,67,1,1,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (2248,216,1,1,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (2248,933,1,0,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (2248,-1,X,X,,RXL) www.browser-recon.info (2248,39,1,1,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (2248,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (2248,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (2248,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (2248,201,1,1,,RXL) www.indiana.edu (2248,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (2248,-1,X,X,,RXL) www.您的銀行.範例.com (2248,1,0,0,,RXL) redirect www.%C3%A6%C2%82%C2%A8%C3%A7%C2%9A%C2%84%C3%A9%C2%8A%C2%80%C3%A8%C2%A1%C2%8C.%C3%A7%C2%AF%C2%84%C3%A4%C2%BE%C2%8B.com (RXL) www.w3.org/addressing/rfc1738.txt (2248,-1,X,X,,RXL) [email protected] (2248,-1,X,X,,RXL) support.microsoft.com/kb/834489 (2248,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (2248,46,1,1,,RXL) www.cs.technion.ac.il (2248,138,1,1,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (2248,-1,X,X,,RXL) q.queso.com/archives/001617 (2248,36,1,1,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (2248,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (2248,613,4,0,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (2248,60,1,1,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (2248,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (2248,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (2248,613,4,0,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (2248,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (2248,613,4,0,,RXL) www.techweb.com/wire/security/186701001 (2248,601,1,0,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (2248,131,1,1,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (2248,114,2,1,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (2248,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (2248,252,1,0,,RXL) www.gartner.com/it/page.jsp?id=565125 (2248,915,1,0,,RXL) www.finextra.com/fullstory.asp?id=15013 (2248,196,2,1,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (2248,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (2248,613,4,0,,RXL) applications.boi.com/updates/article?pr_id=1430 (2248,35,1,1,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (2248,830,1,0,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (2248,38,1,1,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (2248,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (2248,41,1,1,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (2248,114,2,1,,RXL) isc.incidents.org/diary.php?storyid=1194 (2248,37,1,1,,RXL) www2006.org/programme/item.php?id=3533 (2248,86,1,1,,RXL) www.zdnetindia.com/news/features/stories/126569.html (2248,61,1,1,,RXL) www.pcworld.com/article/125739-1/article.html (2248,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (2248,73,2,1,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (2248,28,1,1,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (2248,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (2248,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (2248,64,1,1,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (2248,767,1,0,,RXL) www.mozilla.org/security/phishing-test.html (2248,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (2248,191,1,1,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (2248,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (2248,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (2248,118,1,1,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (2248,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (2248,-1,X,X,,RXL) www.deas.harvard.edu (2248,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (2248,196,2,1,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (2248,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (2248,623,2,0,,RXL) people.deas.harvard.edu (2248,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (2248,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (2248,46,1,1,,RXL) www.antiphishing.org/solutions.html#takedown (2248,101,2,1,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (2248,278,1,0,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (2248,623,2,0,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (2248,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (2248,353,1,0,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (2248,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (2248,73,1,1,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (2248,559,1,0,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (2248,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (2248,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (2248,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (2248,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (2248,770,1,0,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (2248,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (2248,109,1,1,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (2248,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (2248,-1,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (2248,34,1,1,,RXL) www.earthlink.net/about/press/pr_phishersite/ (2248,87,1,1,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (2248,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (2248,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (2248,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (2248,3684,X,X,,RXL) www.antiphishing.org (2248,101,2,1,,RXL) www.banksafeonline.org.uk (2248,30,1,1,,RXL) www.utica.edu/academic/institutes/cimip/ (2248,61,1,1,,RXL) www.fbi.gov/cyberinvest/escams.htm (2248,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (2248,55,1,1,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (2248,153,1,1,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (2248,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (2248,99,1,1,,RXL) www.securityfocus.com/infocus/1745 (2248,999,1,0,,RXL) www.technicalinfo.net/papers/phishing.html (2248,108,2,1,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (2248,29,1,1,,RXL)
  30. 2008-11-04 22:44:18 w:en:User:IRP (talk, contribs, 38334) to w:en:Salvador Allende (diff, not top edit), link www.informatics.indiana.edu/edenm/publications/publications.html (RXL,Search)
    Other links: web.archive.org/web/20050307181050/http://icarito.latercera.cl/icarito/2003/912/pag1a.htm (38334,-1,X,X,,RXL) web.archive.org/web/20030922064807/http://icarito.latercera.cl/icarito/2003/912/pag1b.htm (38334,-1,X,X,,RXL) www.iglesia.cl/iglesiachile/2003/1973/aplenenu.html (38334,76,X,X,,RXL) www.informatics.indiana.edu/edenm/publications/publications.html (38334,114,X,X,,RXL) www.guardian.co.uk/venezuela/story/0,,1948020,00.html (38334,-1,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  31. 2008-11-05 02:49:12 w:en:User:The Thing That Should Not Be (talk, contribs, 0) to w:en:Enzyme kinetics (diff, not top edit), link www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (RXL,Search)
    Other links: www.rcsb.org/pdb/explore.do?structureid=7dfr (0,770,X,X,,RXL) www.jbc.org/cgi/content/full/274/23/15967 (0,2135,X,X,,RXL) web.lemoyne.edu (0,816,X,X,,RXL) www.jbc.org/cgi/reprint/243/4/820 (0,2135,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1259181&blobtype=pdf (0,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=1463456 (0,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577687 (0,-1,X,X,,RXL) genomebiology.com/2003/4/9/r54 (0,312,X,X,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6t29-49321s6-2&_coverdate=08%2f31%2f2003&_alid=466052639&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=4913&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=965e18a4c2ad0af711ba05d1a (0,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577688 (0,-1,X,X,,RXL) mmbr.asm.org/cgi/content/full/65/3/404?view=long&pmid=11528003 (0,763,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1269615&blobtype=pdf (0,-1,X,X,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6wb5-4dd8dxj-8&_coverdate=01%2f01%2f2005&_alid=466049795&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=6701&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=cf322c4a1c7db6b9f89551a84 (0,-1,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=335371&blobtype=pdf (0,-1,X,X,,RXL) content.febsjournal.org/cgi/content/full/269/13/3096 (0,20,X,X,,RXL) cti.itc.virginia.edu (0,-1,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (0,54,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dntp.html (0,54,X,X,,RXL) courses.cm.utexas.edu/jrobertus/ch339k/overheads-2/06_21_chymotrypsin.html (0,7,X,X,,RXL) www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (0,114,X,X,,RXL) www.kscience.co.uk/animations/model.swf (0,4,X,X,,RXL) www.ebi.ac.uk/thornton-srv/databases/macie/ (0,2079,X,X,,RXL) us.expasy.org/enzyme/ (0,-1,X,X,,RXL) mbs.cbrc.jp/ezcatdb/ (0,7,X,X,,RXL) www.brenda-enzymes.info (0,49,X,X,,RXL) sabio.villa-bosch.de/sabiork/ (0,6,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (0,54,X,X,,RXL) www.chem.qmul.ac.uk/iubmb/kinetics/ (0,831,X,X,,RXL) orion1.paisley.ac.uk/kinetics/contents.html (0,15,X,X,,RXL) www.wiley.com/college/pratt/0471393878/student/animations/enzyme_kinetics/index.html (0,-1,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  32. 2008-11-11 17:18:12 w:pt:User:Salebot (talk, contribs, -1) to w:pt:Cibernética (diff, not top edit), link informatics.indiana.edu/edenm/edenmedinajlasaugust2006.pdf (RXL,Search)
    Other links: www.infoamerica.org/documentos_word/shannon-wiener.htm (-1,66,X,X,,RXL) informatics.indiana.edu/edenm/edenmedinajlasaugust2006.pdf (-1,114,X,X,,RXL)

    User is in a trusted group bot on some wikis
  33. 2008-11-14 18:41:47 w:en:User:Capricorn42 (talk, contribs, 3293) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: [email protected] (3293,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (3293,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (3293,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (3293,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (3293,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (3293,3398,X,X,,RXL) itre.cis.upenn.edu (3293,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (3293,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (3293,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (3293,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (3293,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (3293,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (3293,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (3293,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (3293,-1,X,X,,RXL) www.browser-recon.info (3293,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (3293,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (3293,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (3293,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (3293,201,X,X,,RXL) www.indiana.edu (3293,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (3293,-1,X,X,,RXL) www.yourbank.example.com (3293,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (3293,-1,X,X,,RXL) [email protected] (3293,-1,X,X,,RXL) support.microsoft.com/kb/834489 (3293,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (3293,46,X,X,,RXL) www.cs.technion.ac.il (3293,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (3293,-1,X,X,,RXL) q.queso.com/archives/001617 (3293,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (3293,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (3293,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (3293,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (3293,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (3293,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (3293,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (3293,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (3293,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (3293,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (3293,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (3293,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (3293,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (3293,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (3293,915,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (3293,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (3293,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (3293,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (3293,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (3293,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (3293,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (3293,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (3293,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (3293,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (3293,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (3293,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (3293,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (3293,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (3293,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (3293,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (3293,28,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (3293,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (3293,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (3293,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (3293,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (3293,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (3293,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (3293,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (3293,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (3293,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (3293,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (3293,-1,X,X,,RXL) www.deas.harvard.edu (3293,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (3293,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (3293,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (3293,623,X,X,,RXL) people.deas.harvard.edu (3293,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (3293,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (3293,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (3293,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (3293,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (3293,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (3293,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (3293,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (3293,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (3293,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (3293,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (3293,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (3293,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (3293,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (3293,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (3293,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (3293,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (3293,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (3293,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (3293,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (3293,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (3293,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (3293,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (3293,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (3293,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (3293,3684,X,X,,RXL) www.antiphishing.org (3293,101,X,X,,RXL) www.banksafeonline.org.uk (3293,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (3293,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (3293,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (3293,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (3293,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (3293,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (3293,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (3293,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (3293,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (3293,29,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  34. 2008-12-03 02:23:56 w:en:User:Inferno, Lord of Penguins (talk, contribs, 6117) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: [email protected] (6117,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (6117,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (6117,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (6117,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (6117,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (6117,3398,X,X,,RXL) itre.cis.upenn.edu/ (6117,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (6117,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6117,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (6117,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (6117,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (6117,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (6117,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (6117,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (6117,-1,X,X,,RXL) www.browser-recon.info/ (6117,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (6117,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (6117,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (6117,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (6117,201,X,X,,RXL) www.indiana.edu/ (6117,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (6117,-1,X,X,,RXL) www.yourbank.example.com/ (6117,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (6117,-1,X,X,,RXL) [email protected]/ (6117,-1,X,X,,RXL) support.microsoft.com/kb/834489 (6117,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (6117,46,X,X,,RXL) www.cs.technion.ac.il/ (6117,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (6117,-1,X,X,,RXL) q.queso.com/archives/001617 (6117,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (6117,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (6117,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (6117,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (6117,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (6117,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (6117,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (6117,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (6117,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (6117,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (6117,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (6117,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (6117,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (6117,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (6117,915,X,X,,RXL) research.microsoft.com/ (6117,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (6117,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (6117,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (6117,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (6117,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (6117,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (6117,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (6117,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (6117,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (6117,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (6117,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (6117,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (6117,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (6117,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (6117,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (6117,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (6117,28,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (6117,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (6117,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (6117,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (6117,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (6117,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (6117,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (6117,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (6117,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (6117,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (6117,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (6117,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (6117,-1,X,X,,RXL) www.deas.harvard.edu/ (6117,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (6117,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (6117,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (6117,623,X,X,,RXL) people.deas.harvard.edu/ (6117,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (6117,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (6117,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (6117,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (6117,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (6117,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (6117,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (6117,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (6117,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (6117,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (6117,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (6117,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (6117,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (6117,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (6117,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (6117,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (6117,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (6117,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (6117,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (6117,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (6117,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (6117,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (6117,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (6117,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (6117,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (6117,3684,X,X,,RXL) www.antiphishing.org (6117,101,X,X,,RXL) www.banksafeonline.org.uk/ (6117,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (6117,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (6117,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (6117,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (6117,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (6117,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (6117,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (6117,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6117,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (6117,29,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  35. 2008-12-03 02:23:56 w:en:User:Inferno, Lord of Penguins (talk, contribs, 6117) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: [email protected] (6117,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (6117,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (6117,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (6117,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (6117,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (6117,3398,X,X,,RXL) itre.cis.upenn.edu/ (6117,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (6117,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6117,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (6117,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (6117,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (6117,67,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (6117,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (6117,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (6117,-1,X,X,,RXL) www.browser-recon.info/ (6117,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (6117,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (6117,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (6117,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (6117,201,X,X,,RXL) www.indiana.edu/ (6117,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (6117,-1,X,X,,RXL) www.yourbank.example.com/ (6117,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (6117,-1,X,X,,RXL) [email protected]/ (6117,-1,X,X,,RXL) support.microsoft.com/kb/834489 (6117,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (6117,46,X,X,,RXL) www.cs.technion.ac.il/ (6117,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (6117,-1,X,X,,RXL) q.queso.com/archives/001617 (6117,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (6117,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (6117,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (6117,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (6117,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (6117,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (6117,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (6117,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (6117,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (6117,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (6117,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (6117,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (6117,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (6117,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (6117,915,X,X,,RXL) research.microsoft.com/ (6117,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (6117,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (6117,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (6117,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (6117,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (6117,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (6117,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (6117,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (6117,41,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (6117,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (6117,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (6117,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (6117,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (6117,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (6117,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (6117,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (6117,28,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (6117,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (6117,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (6117,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (6117,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (6117,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (6117,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (6117,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (6117,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (6117,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (6117,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (6117,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (6117,-1,X,X,,RXL) www.deas.harvard.edu/ (6117,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (6117,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (6117,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (6117,623,X,X,,RXL) people.deas.harvard.edu/ (6117,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (6117,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (6117,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (6117,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (6117,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (6117,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (6117,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (6117,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (6117,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (6117,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (6117,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (6117,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (6117,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (6117,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (6117,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (6117,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (6117,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (6117,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (6117,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (6117,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (6117,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (6117,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (6117,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (6117,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (6117,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (6117,3684,X,X,,RXL) www.antiphishing.org (6117,101,X,X,,RXL) www.banksafeonline.org.uk/ (6117,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (6117,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (6117,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (6117,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (6117,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (6117,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (6117,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (6117,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6117,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (6117,29,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  36. 2008-12-10 13:41:03 w:en:User:Kraftlos (talk, contribs, 2525) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (2525,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (2525,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (2525,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (2525,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (2525,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (2525,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (2525,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (2525,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (2525,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (2525,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (2525,67,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (2525,62,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (2525,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (2525,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (2525,-1,X,X,,RXL) www.browser-recon.info (2525,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (2525,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (2525,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (2525,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (2525,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (2525,2117,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (2525,-1,X,X,,RXL) www.yourbank.example.com (2525,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (2525,-1,X,X,,RXL) [email protected] (2525,-1,X,X,,RXL) support.microsoft.com/kb/834489 (2525,-1,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (2525,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (2525,46,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (2525,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (2525,-1,X,X,,RXL) q.queso.com/archives/001617 (2525,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (2525,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (2525,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (2525,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (2525,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (2525,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (2525,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (2525,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (2525,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (2525,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (2525,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (2525,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (2525,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (2525,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (2525,915,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (2525,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (2525,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (2525,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (2525,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (2525,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (2525,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (2525,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (2525,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (2525,41,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (2525,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (2525,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (2525,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (2525,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (2525,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (2525,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (2525,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (2525,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (2525,28,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (2525,62,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (2525,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (2525,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (2525,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (2525,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (2525,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (2525,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (2525,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (2525,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (2525,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (2525,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (2525,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (2525,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (2525,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (2525,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (2525,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (2525,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (2525,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (2525,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (2525,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (2525,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (2525,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (2525,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (2525,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (2525,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (2525,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (2525,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (2525,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (2525,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (2525,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (2525,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (2525,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (2525,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (2525,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (2525,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (2525,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (2525,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (2525,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (2525,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (2525,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (2525,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (2525,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (2525,3684,X,X,,RXL) www.antiphishing.org (2525,101,X,X,,RXL) www.banksafeonline.org.uk (2525,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (2525,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (2525,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (2525,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (2525,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (2525,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (2525,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (2525,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (2525,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (2525,29,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  37. 2008-12-22 22:30:05 w:en:User:72.37.171.52 (talk, contribs, 69) to w:en:Enzyme kinetics (diff, not top edit), link www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (RXL,Search)
    Other links: www.rcsb.org/pdb/explore.do?structureid=7dfr (69,770,1,0,,RXL) www.jbc.org/cgi/content/full/274/23/15967 (69,2135,X,X,,RXL) web.lemoyne.edu/~giunta/menten.html (69,816,1,0,,RXL) www.jbc.org/cgi/reprint/243/4/820 (69,2135,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1259181&blobtype=pdf (69,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=1463456 (69,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577687 (69,-1,X,X,,RXL) genomebiology.com/2003/4/9/r54 (69,312,1,0,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6t29-49321s6-2&_coverdate=08%2f31%2f2003&_alid=466052639&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=4913&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=965e18a4c2ad0af711ba05d1a (69,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577688 (69,-1,X,X,,RXL) mmbr.asm.org/cgi/content/full/65/3/404?view=long&pmid=11528003 (69,763,1,0,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1269615&blobtype=pdf (69,-1,X,X,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6wb5-4dd8dxj-8&_coverdate=01%2f01%2f2005&_alid=466049795&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=6701&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=cf322c4a1c7db6b9f89551a84 (69,-1,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=335371&blobtype=pdf (69,-1,X,X,,RXL) content.febsjournal.org/cgi/content/full/269/13/3096 (69,20,1,1,,RXL) cti.itc.virginia.edu/~cmg/demo/scriptframe.html (69,-1,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (69,54,3,1,,RXL) chem-faculty.ucsd.edu/kraut/dntp.html (69,54,3,1,,RXL) courses.cm.utexas.edu/jrobertus/ch339k/overheads-2/06_21_chymotrypsin.html (69,7,1,1,,RXL) www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (69,114,1,1,,RXL) www.kscience.co.uk/animations/model.swf (69,4,1,1,,RXL) www.ebi.ac.uk/thornton-srv/databases/macie/ (69,2079,X,X,,RXL) us.expasy.org/enzyme/ (69,-1,X,X,,RXL) mbs.cbrc.jp/ezcatdb/ (69,7,1,1,,RXL) www.brenda-enzymes.info (69,49,1,1,,RXL) sabio.villa-bosch.de/sabiork/ (69,6,1,1,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (69,54,3,1,,RXL) www.chem.qmul.ac.uk/iubmb/kinetics/ (69,831,1,0,,RXL) orion1.paisley.ac.uk/kinetics/contents.html (69,15,1,1,,RXL) www.wiley.com/college/pratt/0471393878/student/animations/enzyme_kinetics/index.html (69,-1,X,X,,RXL)
  38. 2008-12-23 17:35:41 w:en:User:Ukexpat (talk, contribs, 8969) to w:en:Enzyme kinetics (diff, not top edit), link www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (RXL,Search)
    Other links: www.rcsb.org/pdb/explore.do?structureid=7dfr (8969,770,X,X,,RXL) www.jbc.org/cgi/content/full/274/23/15967 (8969,2135,X,X,,RXL) web.lemoyne.edu/~giunta/menten.html (8969,816,X,X,,RXL) www.jbc.org/cgi/reprint/243/4/820 (8969,2135,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1259181&blobtype=pdf (8969,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=1463456 (8969,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577687 (8969,-1,X,X,,RXL) genomebiology.com/2003/4/9/r54 (8969,312,X,X,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6t29-49321s6-2&_coverdate=08%2f31%2f2003&_alid=466052639&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=4913&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=965e18a4c2ad0af711ba05d1a (8969,-1,X,X,,RXL) www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pubmed&pubmedid=11577688 (8969,-1,X,X,,RXL) mmbr.asm.org/cgi/content/full/65/3/404?view=long&pmid=11528003 (8969,763,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=1269615&blobtype=pdf (8969,-1,X,X,,RXL) www.sciencedirect.com/science?_ob=articleurl&_udi=b6wb5-4dd8dxj-8&_coverdate=01%2f01%2f2005&_alid=466049795&_rdoc=1&_fmt=&_orig=search&_qd=1&_cdi=6701&_sort=d&view=c&_acct=c000050221&_version=1&_urlversion=0&_userid=10&md5=cf322c4a1c7db6b9f89551a84 (8969,-1,X,X,,RXL) www.pubmedcentral.nih.gov/picrender.fcgi?artid=335371&blobtype=pdf (8969,-1,X,X,,RXL) content.febsjournal.org/cgi/content/full/269/13/3096 (8969,20,X,X,,RXL) cti.itc.virginia.edu/~cmg/demo/scriptframe.html (8969,-1,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (8969,54,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dntp.html (8969,54,X,X,,RXL) courses.cm.utexas.edu/jrobertus/ch339k/overheads-2/06_21_chymotrypsin.html (8969,7,X,X,,RXL) www.informatics.indiana.edu/schnell/papers/ctb8_169.pdf (8969,114,X,X,,RXL) www.kscience.co.uk/animations/model.swf (8969,4,X,X,,RXL) www.ebi.ac.uk/thornton-srv/databases/macie/ (8969,2079,X,X,,RXL) us.expasy.org/enzyme/ (8969,-1,X,X,,RXL) mbs.cbrc.jp/ezcatdb/ (8969,7,X,X,,RXL) www.brenda-enzymes.info (8969,49,X,X,,RXL) sabio.villa-bosch.de/sabiork/ (8969,6,X,X,,RXL) chem-faculty.ucsd.edu/kraut/dhfr.html (8969,54,X,X,,RXL) www.chem.qmul.ac.uk/iubmb/kinetics/ (8969,831,X,X,,RXL) orion1.paisley.ac.uk/kinetics/contents.html (8969,15,X,X,,RXL) www.wiley.com/college/pratt/0471393878/student/animations/enzyme_kinetics/index.html (8969,-1,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  39. 2009-01-09 18:44:56 w:en:User:Rrburke (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/mmn.pdf (RXL,Search)
    Other links: research.microsoft.com/en-us/um/people/cormac/papers/phishingastragedy.pdf (-1,1319,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (-1,29,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk/ (-1,30,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (-1,62,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (-1,28,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (-1,73,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1,137,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1,871,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (-1,1319,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1,138,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) [email protected]/ (-1,-1,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) www.yourbank.example.com/ (-1,35,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1,559,X,X,,RXL) rapidshare.de/en/phishing.html (-1,138,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (-1,2117,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.browser-recon.info/ (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (-1,62,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (-1,73,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis
  40. 2009-01-11 13:39:03 w:en:User:DonAByrd (talk, contribs, 3) to w:en:Tone cluster (diff, not top edit), link www.informatics.indiana.edu/donbyrd/cmnextremes.htm (RXL,Search)
    Other links: www.informatics.indiana.edu/donbyrd/cmnextremes.htm (3,114,2,1,,RXL)
  41. 2009-01-14 03:03:31 w:en:User:98.223.225.80 (talk, contribs, 1) to w:en:Indiana University Bloomington (diff, not top edit), link www.informatics.indiana.edu (RXL,Search), redirect www.soic.indiana.edu/, RXL
    Other links: www.informatics.indiana.edu (1,114,1,1,,RXL)
  42. 2009-01-17 16:06:56 w:en:User:ClueBot (talk, contribs, -1) to w:en:Web crawler (diff, not top edit), link informatics.indiana.edu/fil/papers/aa98.ps (RXL,Search)
    Other links: wiki.foaf-project.org/scutter (-1,7,X,X,,RXL) doi.acm.org/10.1145/358923.358934 (-1,-1,X,X,,RXL) www10.org/cdrom/papers/210/index.html (-1,18,X,X,,RXL) www10.org/cdrom/papers/pdf/p208.pdf (-1,18,X,X,,RXL) www.dcc.uchile.cl/%7eccastill/papers/baeza05_crawling_country_better_breadth_first_web_page_ordering.pdf (-1,65,X,X,,RXL) www.webist.org/ (-1,15,X,X,,RXL) llama.org/hamster/monkey/page.html (-1,17,X,X,,RXL) informatics.indiana.edu/fil/papers/icml.ps (-1,114,X,X,,RXL) informatics.indiana.edu/fil/papers/aa98.ps (-1,114,X,X,,RXL) web.archive.org/web/20040317210216/http://www.fxpal.com/people/vdberg/pubs/www8/www1999f.pdf (-1,-1,X,X,,RXL) web.archive.org/web/20010904075500/http://archive.ncsa.uiuc.edu/sdg/it94/proceedings/searching/pinkerton/webcrawler.html (-1,-1,X,X,,RXL) nautilus.dii.unisi.it/pubblicazioni/files/conference/2000-diligenti-vldb.pdf (-1,8,X,X,,RXL) www.netdynamics.eu/analytics/text-scannings-from-google-bot.html (-1,14,X,X,,RXL) portal.acm.org/citation.cfm?doid=958942.958945 (-1,-1,X,X,,RXL) pages.stern.nyu.edu/~panos/publications/icde2005.pdf (-1,309,X,X,,RXL) www.robotstxt.org/wc/exclusion.html (-1,38,X,X,,RXL) www.robotstxt.org/wc/guidelines.html (-1,38,X,X,,RXL) www.dcc.uchile.cl/~ccastill/papers/baeza02balancing.pdf (-1,65,X,X,,RXL) www.mccurley.org/papers/fractal.pdf (-1,7,X,X,,RXL) www.scit.wlv.ac.uk/%7ecm1993/papers/web_crawling_ethics_preprint.doc (-1,26,X,X,,RXL) infolab.stanford.edu/~backrub/google.html (-1,-1,X,X,,RXL) cis.poly.edu/tr/tr-cis-2001-03.pdf (-1,9,X,X,,RXL) mingo.info-science.uiowa.edu/eichmann/www94/spider.ps (-1,6,X,X,,RXL) www.cs.ucr.edu/~csyiazti/downloads/papers/ngits02/ngits02.pdf (-1,57,X,X,,RXL) citeseer.ist.psu.edu/rd/1549722%2c509701%2c1%2c0.25%2cdownload/http://citeseer.ist.psu.edu/cache/papers/cs/26004/http:zszzszwww.idi.ntnu.nozsz%7ealgkonzszgenereltzszse-dynamicweb1.pdf/risvik02search.pdf (-1,-1,X,X,,RXL) www.cs.berkeley.edu/~soumen/mining-the-web/ (-1,342,X,X,,RXL) wikiasearch.com (-1,3,X,X,,RXL) www2003.org/cdrom/papers/refereed/p007/p7-abiteboul.html (-1,8,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/ubicrawler.pdf (-1,14,X,X,,RXL) vigna.dsi.unimi.it/ftp/papers/paradoxicalpagerank.pdf (-1,14,X,X,,RXL) www.webtechniques.com/archives/1997/05/burner/ (-1,6,X,X,,RXL) chato.cl/research/crawling_thesis (-1,9,X,X,,RXL) dbpubs.stanford.edu/pub/1998-51 (-1,-1,X,X,,RXL) www.cs.brown.edu/courses/cs227/2002/cache/cho.pdf (-1,200,X,X,,RXL) portal.acm.org/citation.cfm?id=511464 (-1,-1,X,X,,RXL) portal.acm.org/citation.cfm?doid=857166.857170 (-1,-1,X,X,,RXL) dx.doi.org/10.1002/asi.20078 (-1,-1,X,X,,RXL) www.cindoc.csic.es/cybermetrics/pdf/68.pdf (-1,19,X,X,,RXL) www.nature.com/doifinder/10.1038/21987 (-1,-1,X,X,,RXL) www.cs.cmu.edu/~rcm/papers/www7/www7.html (-1,2314,X,X,,RXL) arxiv.org/abs/cs/0503069 (-1,-1,X,X,,RXL) dollar.biz.uiowa.edu/~pant/papers/crawling.pdf (-1,12,X,X,,RXL) www.dcc.fua.br/~alti/pubs/spire99_cow.ps.gz (-1,3,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  43. 2009-01-22 20:01:10 w:en:User:ClueBot (talk, contribs, -1) to w:en:Musical notation (diff, not top edit), link www.informatics.indiana.edu/donbyrd/cmnextremes.htm (RXL,Search)
    Other links: www.muslimheritage.com/uploads/music2.pdf (-1,2092,X,X,,RXL) www.omenad.net/articles/omeswarlipi.htm (-1,112,X,X,,RXL) www.britac.ac.uk/events/2004/abstracts/2004-bagley.htm (-1,332,X,X,,RXL) www.olga.net/ (-1,5,X,X,,RXL) musicnotation.org (-1,12,X,X,,RXL) www.musicmarkup.info/scope/markuplanguages.html (-1,5,X,X,,RXL) emusician.com/ar/emusic_xml_music/ (-1,232,X,X,,RXL) www.scribeserver.com/neumes/ (-1,8,X,X,,RXL) pianostudioone.ca/brushed2.mp3 (-1,19,X,X,,RXL) www.sju.edu/~rhall/rhythms/poets/arcadia.pdf (-1,218,X,X,,RXL) www.gutenberg.org/etext/19499 (-1,-1,X,X,,RXL) www.byzantine-musics.com/welcomepage.htm (-1,4,X,X,,RXL) www.philtulga.com/counter.html (-1,74,X,X,,RXL) ninagilbert.googlepages.com/british.html (-1,7,X,X,,RXL) mymusictheory.com (-1,3,X,X,,RXL) www.musictheory.net (-1,15,X,X,,RXL) www.informatics.indiana.edu/donbyrd/cmnextremes.htm (-1,114,X,X,,RXL) 253.ccarh.org/ (-1,3,X,X,,RXL) ling.kgw.tu-berlin.de/semiotik/english/zfs/zfs87_3-4_e.htm#7 (-1,9,X,X,,RXL) www.tigerbill.com/drumlessons.htm#theory (-1,7,X,X,,RXL) d.t.read.googlepages.com/readingpotatoprint (-1,3,X,X,,RXL) musicnotation.org (-1,12,X,X,,RXL) www.kerylos.fr/repertoire.php (-1,24,X,X,,RXL) www.simplifiedmusicnotation.org (-1,5,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  44. 2009-01-28 09:51:17 w:en:User:ClueBot (talk, contribs, -1) to w:en:Web crawler (diff, not top edit), link informatics.indiana.edu/fil/papers/aa98.ps (RXL,Search)
    Other links: www10.org/cdrom/papers/pdf/p208.pdf (-1,18,X,X,,RXL) www.dcc.uchile.cl/%7eccastill/papers/baeza05_crawling_country_better_breadth_first_web_page_ordering.pdf (-1,65,X,X,,RXL) www.webist.org/ (-1,15,X,X,,RXL) llama.org/hamster/monkey/page.html (-1,17,X,X,,RXL) informatics.indiana.edu/fil/papers/icml.ps (-1,114,X,X,,RXL) informatics.indiana.edu/fil/papers/aa98.ps (-1,114,X,X,,RXL) web.archive.org/web/20040317210216/http://www.fxpal.com/people/vdberg/pubs/www8/www1999f.pdf (-1,-1,X,X,,RXL) web.archive.org/web/20010904075500/http://archive.ncsa.uiuc.edu/sdg/it94/proceedings/searching/pinkerton/webcrawler.html (-1,-1,X,X,,RXL) nautilus.dii.unisi.it/pubblicazioni/files/conference/2000-diligenti-vldb.pdf (-1,8,X,X,,RXL) www.netdynamics.eu/analytics/text-scannings-from-google-bot.html (-1,14,X,X,,RXL)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  45. 2009-02-03 17:22:31 w:ru:User:Rubin16 (talk, contribs, 1314) to w:ru:Фишинг (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: www.albany.edu/iasymposium/2006/chandrasekaran.pdf (1314,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (1314,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (1314,101,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (1314,191,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (1314,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (1314,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (1314,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (1314,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (1314,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (1314,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (1314,-1,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (1314,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (1314,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (1314,3684,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (1314,623,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (1314,353,X,X,,RXL) www2006.org/programme/item.php?id=3533 (1314,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (1314,61,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (1314,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (1314,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (1314,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (1314,64,X,X,,RXL) www.mozilla.org/security/phishing-test.html (1314,-1,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (1314,278,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (1314,-1,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (1314,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (1314,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (1314,-1,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (1314,38,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (1314,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (1314,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (1314,37,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (1314,-1,X,X,,RXL)

    User is in trusted groups sysop, bureaucrat, editor on some wikis
  46. 2009-02-11 03:26:21 w:en:User:150.203.160.121 (talk, contribs, 16) to w:en:Web crawler (diff, not top edit), link informatics.indiana.edu/fil/papers/aa98.ps (RXL,Search)
    Other links: llama.org/hamster/monkey/page.html (16,17,1,1,,RXL) informatics.indiana.edu/fil/papers/icml.ps (16,114,2,1,,RXL) informatics.indiana.edu/fil/papers/aa98.ps (16,114,2,1,,RXL) web.archive.org/web/20040317210216/http://www.fxpal.com/people/vdberg/pubs/www8/www1999f.pdf (16,-1,X,X,,RXL) nautilus.dii.unisi.it/pubblicazioni/files/conference/2000-diligenti-vldb.pdf (16,8,1,1,,RXL) www10.org/cdrom/papers/pdf/p208.pdf (16,18,1,1,,RXL) www.dcc.uchile.cl/%7eccastill/papers/baeza05_crawling_country_better_breadth_first_web_page_ordering.pdf (16,65,1,1,,RXL) www.webist.org (16,15,1,1,,RXL) www.netdynamics.eu/analytics/text-scannings-from-google-bot.html (16,14,1,1,,RXL) portal.acm.org/citation.cfm?doid=958942.958945 (16,-1,X,X,,RXL) pages.stern.nyu.edu/~panos/publications/icde2005.pdf (16,309,1,0,,RXL) www.robotstxt.org/wc/exclusion.html (16,38,2,1,,RXL) www.robotstxt.org/wc/guidelines.html (16,38,2,1,,RXL) www.chato.cl/papers/baeza02balancing.pdf (16,9,1,1,,RXL) www.mccurley.org/papers/fractal.pdf (16,7,1,1,,RXL) www.scit.wlv.ac.uk/%7ecm1993/papers/web_crawling_ethics_preprint.doc (16,26,1,1,,RXL)
  47. 2009-02-18 19:22:06 w:en:User:Luckas Blade (talk, contribs, 6808) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/mmn.pdf (RXL,Search)
    Other links: www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (6808,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (6808,623,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (6808,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (6808,613,X,X,,RXL) atlas.arbor.net/summary/phishing (6808,55,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (6808,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (6808,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (6808,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (6808,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (6808,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (6808,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (6808,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (6808,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (6808,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (6808,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (6808,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (6808,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (6808,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (6808,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (6808,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (6808,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (6808,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (6808,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (6808,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (6808,3684,X,X,,RXL) www.antiphishing.org (6808,101,X,X,,RXL) www.banksafeonline.org.uk/ (6808,30,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (6808,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (6808,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (6808,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (6808,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (6808,41,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (6808,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (6808,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (6808,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (6808,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (6808,767,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (6808,88,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (6808,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (6808,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (6808,37,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (6808,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (6808,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (6808,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (6808,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (6808,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (6808,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6808,108,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (6808,1319,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (6808,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (6808,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (6808,196,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (6808,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (6808,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (6808,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (6808,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (6808,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (6808,29,X,X,,RXL) research.microsoft.com/en-us/um/people/cormac/papers/phishingastragedy.pdf (6808,1319,X,X,,RXL) www.wordspy.com/words/phishing.asp (6808,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (6808,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (6808,67,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (6808,62,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (6808,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (6808,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (6808,-1,X,X,,RXL) www.browser-recon.info/ (6808,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (6808,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (6808,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (6808,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (6808,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (6808,2117,X,X,,RXL) rapidshare.de/en/phishing.html (6808,138,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (6808,559,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (6808,-1,X,X,,RXL) www.securityfocus.com/infocus/1860. (6808,999,X,X,,RXL) www.michigan.gov/cybersecurity/0,1607,7-217-34396-111902--,00.html (6808,-1,X,X,,RXL) www.yourbank.example.com/ (6808,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (6808,-1,X,X,,RXL) [email protected]/ (6808,-1,X,X,,RXL) support.microsoft.com/kb/834489 (6808,-1,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (6808,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (6808,46,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (6808,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (6808,-1,X,X,,RXL) q.queso.com/archives/001617 (6808,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (6808,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (6808,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (6808,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (6808,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (6808,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (6808,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (6808,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (6808,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (6808,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (6808,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (6808,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (6808,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (6808,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (6808,915,X,X,,RXL) www.mozilla.org/security/phishing-test.html (6808,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (6808,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (6808,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (6808,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (6808,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (6808,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (6808,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (6808,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (6808,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (6808,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (6808,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (6808,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (6808,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (6808,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (6808,101,X,X,,RXL) www2006.org/programme/item.php?id=3533 (6808,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (6808,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (6808,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (6808,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (6808,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (6808,28,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (6808,62,X,X,,RXL)

    User is in trusted groups sysop, bureaucrat, rollbacker, editor, reviewer on some wikis
  48. 2009-02-18 19:24:49 w:en:User:Versus22 (talk, contribs, 98269) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (98269,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (98269,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (98269,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (98269,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (98269,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (98269,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (98269,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (98269,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (98269,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (98269,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (98269,67,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (98269,62,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (98269,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (98269,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (98269,-1,X,X,,RXL) www.browser-recon.info (98269,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (98269,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (98269,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (98269,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (98269,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (98269,2117,X,X,,RXL) rapidshare.de/en/phishing.html (98269,138,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (98269,559,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (98269,-1,X,X,,RXL) www.securityfocus.com/infocus/1860. (98269,999,X,X,,RXL) www.michigan.gov/cybersecurity/0,1607,7-217-34396-111902--,00.html (98269,-1,X,X,,RXL) www.yourbank.example.com (98269,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (98269,-1,X,X,,RXL) [email protected] (98269,-1,X,X,,RXL) support.microsoft.com/kb/834489 (98269,-1,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (98269,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (98269,46,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (98269,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (98269,-1,X,X,,RXL) q.queso.com/archives/001617 (98269,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (98269,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (98269,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (98269,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (98269,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (98269,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (98269,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (98269,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (98269,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (98269,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (98269,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (98269,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (98269,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (98269,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (98269,915,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (98269,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (98269,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (98269,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (98269,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (98269,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (98269,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (98269,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (98269,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (98269,41,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (98269,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (98269,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (98269,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (98269,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (98269,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (98269,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (98269,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (98269,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (98269,28,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (98269,62,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (98269,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (98269,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (98269,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (98269,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (98269,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (98269,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (98269,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (98269,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (98269,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (98269,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (98269,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (98269,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (98269,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (98269,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (98269,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (98269,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (98269,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (98269,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (98269,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (98269,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (98269,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (98269,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (98269,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (98269,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (98269,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (98269,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (98269,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (98269,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (98269,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (98269,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (98269,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (98269,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (98269,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (98269,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (98269,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (98269,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (98269,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (98269,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (98269,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (98269,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (98269,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (98269,3684,X,X,,RXL) www.antiphishing.org (98269,101,X,X,,RXL) www.banksafeonline.org.uk (98269,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (98269,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (98269,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (98269,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (98269,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (98269,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (98269,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (98269,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (98269,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (98269,29,X,X,,RXL) research.microsoft.com/en-us/um/people/cormac/papers/phishingastragedy.pdf (98269,1319,X,X,,RXL)

    User is in a trusted group rollbacker on some wikis
  49. 2009-02-18 19:27:10 w:en:User:Thingg (talk, contribs, -1) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: bugzilla.mozilla.org/show_bug.cgi?id=232567 (-1,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (-1,46,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1,-1,X,X,,RXL) q.queso.com/archives/001617 (-1,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (-1,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (-1,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (-1,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (-1,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (-1,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (-1,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (-1,915,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (-1,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (-1,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (-1,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (-1,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (-1,41,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (-1,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (-1,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (-1,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (-1,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (-1,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (-1,73,X,X,,RXL) www.michigan.gov/cybersecurity/0,1607,7-217-34396-111902--,00.html (-1,-1,X,X,,RXL) www.yourbank.example.com (-1,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (-1,-1,X,X,,RXL) [email protected] (-1,-1,X,X,,RXL) support.microsoft.com/kb/834489 (-1,-1,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (-1,28,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (-1,62,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (-1,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (-1,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (-1,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (-1,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (-1,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (-1,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (-1,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (-1,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (-1,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (-1,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (-1,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (-1,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (-1,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (-1,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (-1,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (-1,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (-1,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (-1,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (-1,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (-1,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (-1,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (-1,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (-1,3684,X,X,,RXL) www.antiphishing.org (-1,101,X,X,,RXL) www.banksafeonline.org.uk (-1,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (-1,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (-1,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (-1,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (-1,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (-1,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (-1,999,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (-1,29,X,X,,RXL) research.microsoft.com/en-us/um/people/cormac/papers/phishingastragedy.pdf (-1,1319,X,X,,RXL) rapidshare.de/en/phishing.html (-1,138,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1,559,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (-1,-1,X,X,,RXL) www.securityfocus.com/infocus/1860. (-1,999,X,X,,RXL) isc.sans.org/diary.php?storyid=1905 (-1,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (-1,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (-1,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (-1,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (-1,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (-1,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (-1,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (-1,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1,67,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (-1,62,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (-1,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (-1,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1,-1,X,X,,RXL) www.browser-recon.info (-1,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (-1,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (-1,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (-1,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (-1,2117,X,X,,RXL)

    User is in trusted groups sysop, rollbacker on some wikis
  50. 2009-03-02 20:24:00 w:en:User:Pinkadelica (talk, contribs, 11565) to w:en:Phishing (diff, not top edit), link www.informatics.indiana.edu/markus/papers/trust_usec.pdf (RXL,Search)
    Other links: isc.sans.org/diary.php?storyid=1905 (11565,88,X,X,,RXL) www.microsoft.com/protect/yourself/phishing/engineering.mspx (11565,-1,X,X,,RXL) www.unik.no/people/josang/papers/jagam2007-acsac.pdf (11565,73,X,X,,RXL) www.pcworld.com/article/id,113431-page,1/article.html (11565,-1,X,X,,RXL) dictionary.oed.com/cgi/entry/30004304/ (11565,3398,X,X,,RXL) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (11565,1206,X,X,,RXL) dictionary.oed.com/cgi/entry/30004303/ (11565,3398,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (11565,108,X,X,,RXL) www.wordspy.com/words/phishing.asp (11565,399,X,X,,RXL) wired-vig.wired.com/news/technology/0,1282,9932,00.html (11565,-1,X,X,,RXL) www.rajuabju.com/warezirc/historyofaolwarez.htm (11565,67,X,X,,RXL) financialcryptography.com/mt/archives/000609.html (11565,62,X,X,,RXL) itmanagement.earthweb.com/secu/article.php/3451501 (11565,216,X,X,,RXL) www.firstmonday.org/issues/issue10_9/abad/ (11565,933,X,X,,RXL) www.irs.gov/newsroom/article/0,,id=155682,00.html (11565,-1,X,X,,RXL) www.browser-recon.info/ (11565,39,X,X,,RXL) www.microsoft.com/athome/security/email/spear_phishing.mspx (11565,-1,X,X,,RXL) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (11565,-1,X,X,,RXL) www.pcworld.com/resource/article/0,aid,125956,pg,1,rss,rss,00.asp (11565,-1,X,X,,RXL) www.websense.com/securitylabs/alerts/alert.php?alertid=708 (11565,201,X,X,,RXL) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (11565,2117,X,X,,RXL) rapidshare.de/en/phishing.html (11565,138,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (11565,559,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/st2007101202661.html?hpid=topnews (11565,-1,X,X,,RXL) www.securityfocus.com/infocus/1860. (11565,999,X,X,,RXL) www.michigan.gov/cybersecurity/0,1607,7-217-34396-111902--,00.html (11565,-1,X,X,,RXL) www.yourbank.example.com/ (11565,35,X,X,,RXL) www.w3.org/addressing/rfc1738.txt (11565,-1,X,X,,RXL) [email protected]/ (11565,-1,X,X,,RXL) support.microsoft.com/kb/834489 (11565,-1,X,X,,RXL) bugzilla.mozilla.org/show_bug.cgi?id=232567 (11565,-1,X,X,,RXL) www.shmoo.com/idn/homograph.txt (11565,46,X,X,,RXL) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (11565,138,X,X,,RXL) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (11565,-1,X,X,,RXL) q.queso.com/archives/001617 (11565,36,X,X,,RXL) www.theregister.co.uk/2007/12/12/phishing_redirection/ (11565,-1,X,X,,RXL) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (11565,613,X,X,,RXL) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (11565,60,X,X,,RXL) news.bbc.co.uk/1/hi/technology/3608943.stm (11565,-1,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (11565,-1,X,X,,RXL) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (11565,613,X,X,,RXL) www.eweek.com/article2/0,1895,2082039,00.asp (11565,-1,X,X,,RXL) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (11565,613,X,X,,RXL) www.techweb.com/wire/security/186701001 (11565,601,X,X,,RXL) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (11565,131,X,X,,RXL) www.informatics.indiana.edu/markus/papers/mmn.pdf (11565,114,X,X,,RXL) www.washingtonpost.com/ac2/wp-dyn/a59349-2004nov18 (11565,-1,X,X,,RXL) www.csoonline.com/talkback/071905.html (11565,252,X,X,,RXL) www.gartner.com/it/page.jsp?id=565125 (11565,915,X,X,,RXL) research.microsoft.com/~cormac/papers/phishingastragedy.pdf (11565,1319,X,X,,RXL) www.finextra.com/fullstory.asp?id=15013 (11565,196,X,X,,RXL) www.theregister.co.uk/2005/05/03/aol_phishing/ (11565,-1,X,X,,RXL) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (11565,613,X,X,,RXL) applications.boi.com/updates/article?pr_id=1430 (11565,35,X,X,,RXL) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (11565,830,X,X,,RXL) www.cylab.cmu.edu/files/cmucylab06017.pdf (11565,38,X,X,,RXL) online.wsj.com/public/article/0,,sb112424042313615131-z_8jlb2wkfcvtgdawf6lrh733sg_20060817,00.html?mod=blogs (11565,-1,X,X,,RXL) www.hexview.com/sdp/node/24 (11565,41,X,X,,RXL) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (11565,871,X,X,,RXL) www.informatics.indiana.edu/markus/papers/trust_usec.pdf (11565,114,X,X,,RXL) isc.incidents.org/diary.php?storyid=1194 (11565,37,X,X,,RXL) www2006.org/programme/item.php?id=3533 (11565,86,X,X,,RXL) www.zdnetindia.com/news/features/stories/126569.html (11565,61,X,X,,RXL) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (11565,137,X,X,,RXL) www.pcworld.com/article/125739-1/article.html (11565,-1,X,X,,RXL) www.unik.no/people/josang/papers/jp2005-auscert.pdf (11565,73,X,X,,RXL) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.htm (11565,28,X,X,,RXL) financialcryptography.com/mt/archives/000645.html (11565,62,X,X,,RXL) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (11565,-1,X,X,,RXL) www.mozilla.org/projects/bonecho/anti-phishing/ (11565,-1,X,X,,RXL) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (11565,-1,X,X,,RXL) www.3sharp.com/projects/antiphish/index.htm (11565,64,X,X,,RXL) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (11565,767,X,X,,RXL) www.mozilla.org/security/phishing-test.html (11565,-1,X,X,,RXL) www.darkreading.com/document.asp?doc_id=99089&wt.svl=news1_1 (11565,191,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (11565,-1,X,X,,RXL) www.eweek.com/article2/0,1759,1630161,00.asp (11565,-1,X,X,,RXL) www.bankofamerica.com/privacy/sitekey/ (11565,118,X,X,,RXL) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/ar2005071302181.html (11565,-1,X,X,,RXL) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (11565,-1,X,X,,RXL) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (11565,-1,X,X,,RXL) www.finextra.com/fullstory.asp?id=14384 (11565,196,X,X,,RXL) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (11565,-1,X,X,,RXL) www.schneier.com/blog/archives/2005/07/security_skins.html (11565,623,X,X,,RXL) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (11565,-1,X,X,,RXL) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (11565,1289,X,X,,RXL) reports-archive.adm.cs.cmu.edu/anon/isri2006/cmu-isri-06-112.pdf (11565,46,X,X,,RXL) www.antiphishing.org/solutions.html#takedown (11565,101,X,X,,RXL) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (11565,278,X,X,,RXL) www.schneier.com/blog/archives/2006/10/phishtank.html (11565,623,X,X,,RXL) www.cnn.com/2003/tech/internet/07/21/phishing.scam/index.html (11565,-1,X,X,,RXL) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (11565,353,X,X,,RXL) www.eweek.com/article2/0%2c1895%2c1831960%2c00.asp (11565,-1,X,X,,RXL) www.cybercrime.gov/mantovaniindict.htm (11565,73,X,X,,RXL) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (11565,559,X,X,,RXL) informationweek.com/story/showarticle.jhtml?articleid=60404811 (11565,3684,X,X,,RXL) www.opsi.gov.uk/acts/en2006/2006en35.htm (11565,-1,X,X,,RXL) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (11565,-1,X,X,,RXL) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (11565,-1,X,X,,RXL) news.zdnet.co.uk/0,39020330,39258528,00.htm (11565,770,X,X,,RXL) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (11565,-1,X,X,,RXL) corp.aol.com/whoweare/history/2006.shtml (11565,109,X,X,,RXL) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (11565,34,X,X,,RXL) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+hb2471 (11565,-1,X,X,,RXL) www.washingtonpost.com/wp-dyn/articles/a40578-2005apr9.html (11565,-1,X,X,,RXL) www.earthlink.net/about/press/pr_phishersite/ (11565,87,X,X,,RXL) www.pcmag.com/article2/0,1895,2085183,00.asp (11565,3345,X,X,,RXL) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (11565,-1,X,X,,RXL) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (11565,-1,X,X,,RXL) www.informationweek.com/story/showarticle.jhtml?articleid=199903450 (11565,3684,X,X,,RXL) www.antiphishing.org (11565,101,X,X,,RXL) www.banksafeonline.org.uk/ (11565,30,X,X,,RXL) www.utica.edu/academic/institutes/cimip/ (11565,61,X,X,,RXL) www.fbi.gov/cyberinvest/escams.htm (11565,-1,X,X,,RXL) atlas.arbor.net/summary/phishing (11565,55,X,X,,RXL) ha.ckers.org/blog/20060609/how-phishing-actually-works/ (11565,153,X,X,,RXL) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (11565,-1,X,X,,RXL) www.honeynet.org/papers/phishing/ (11565,99,X,X,,RXL) www.securityfocus.com/infocus/1745 (11565,999,X,X,,RXL) www.millersmiles.co.uk (11565,26,X,X,,RXL) www.technicalinfo.net/papers/phishing.html (11565,108,X,X,,RXL) cups.cs.cmu.edu/antiphishing_phil/ (11565,29,X,X,,RXL) research.microsoft.com/en-us/um/people/cormac/papers/phishingastragedy.pdf (11565,1319,X,X,,RXL) phonephishing.info/ (11565,16,X,X,,RXL)

    User is in trusted groups rollbacker, reviewer on some wikis

User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary

  • Displayed all 88 additions.