{"id":583,"date":"2007-05-06T19:15:52","date_gmt":"2007-05-07T03:15:52","guid":{"rendered":"https:\/\/blog.mhvt.net\/?p=583"},"modified":"2007-05-27T00:42:26","modified_gmt":"2007-05-27T08:42:26","slug":"if-you-notify-academic-institutions-of-exploitations","status":"publish","type":"post","link":"https:\/\/blog.mhvt.net\/?p=583","title":{"rendered":"If You Notify Academic Institutions of Exploitations&#8230;"},"content":{"rendered":"<table width=\"440\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\">\n<br \/><\/br><\/p>\n<td>We get a few spam comments every day at this blog website.  We make news out of them.  When the exploited website belongs to an academic institution, we often try to notify them of the exploitation and abuse.\n<\/td>\n<td><a href=\"mac\/anti-spam\/pharmacy_spam_05_06\/arkansas_state_university_2.gif\"><img loading=\"lazy\" decoding=\"async\" src=\"mac\/anti-spam\/pharmacy_spam_05_06\/arkansas_state_university_2.gif\" width=\"200\" height=\"122\" alt=\"anti spam\" \/><\/a><\/td>\n<\/tr>\n<\/table>\n<p>  <!--more--><\/p>\n<p>It&#8217;s rare for academic institutions to waste their time in writing back and showing a simple form of appreciation to us.  In contrast, we do waste our time and notify every academic institution of its spam exploitation.  We aren&#8217;t asking them for a reward or anything.  But, apparently, a majority of academic institutions ignore our messages.<\/p>\n<p>The screenshot above is just an example of how we are treated.  We wrote to 4 academic institutions and told them that their websites have been exploited for pharmacy spam.  Our message to Arkansas State University was rejected.  Is that because we sent the same message to four institutions at a time?  Oh, boy&#8230;  We hate this job.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We get a few spam comments every day at this blog website. We make news out of them. When the exploited website belongs to an academic institution, we often try to notify them of the exploitation and abuse.<\/p>\n","protected":false},"author":342,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-583","post","type-post","status-publish","format-standard","hentry","category-internet-security"],"_links":{"self":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=583"}],"version-history":[{"count":0,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/583\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}