Blog / May 2009
-
31 May 2009Public testing of new website release
The new website release is now in public testing phase! Please read the forum post carefully if you are interested in testing. You can post suggestions and bug reports in that same topic. Thank you!
I will use the test period to document the changes and will write again before the site goes live, to cover these changes in detail. I have a lot more to talk about, what this "refactored" version was all about, how will future releases work, etc which I will do over the course of the test period. Stay tuned!
-
21 May 2009Drive-By Download and Adobe Software Exploits
I am now almost certain that the website was victim of a malware/trojan exploit (cf. recent news) because I had an old version of Adobe Reader installed, and not because of lack of Windows Updates or carelessness with downloads and such.
The irony is, I'm not even using Adobe Reader, I'm using FoxitReader ever since versions 8 and 9 of Adobe Reader became so slow and bloated. But having not heard before of all the vulnerability problems with Adobe software, I still had the old version 7 lying around.
Read on for useful links and tips for Windows users...While I didn't use Adobe Reader myself, the plugin was still present and active in the browsers! That's a very important point! I highly recommend to all Windows users to either uninstall Adobe Reader entirely and get FoxitReader, or to make sure you have the most up-to-date version of Flash and Reader (so that your browser plugins are uptodate), AND go to Adobe Reader Preferences > Javascript and TURN OFF Javascript.
Having an up-to-date anti-virus can protect you, but won't solve the root of the problem. Windows users who haven't updated their Adobe plugins (Reader/Flash) since May 13, do it ASAP!
PS: last time I checked Adobe Reader 9 was still incapable of remembering the last visited page of recently opened PDF documents (think of a "bookmark"). When you download a lot of documentation in PDF format, it's very handy to go to the File menu, and pick one of your recently opened documents, and continue reading from where you last were. That feature alone is worth downloading FoxitReader (it is also a standard feature on MacOS's PDF viewer).
Useful links
- Adobe Confirms PDF Zero-Day, Says Kill JavaScript (Slashdot)
- FoxitReader, lightweight, FAST PDF Reader (download.com)
- Gumblar Malware Exploit Circulating (us-cert.gov)
-
17 May 2009For Greasemonkey scripts users
The website recovery yesterday has affected a couple scripts from our extremely prolific author woelpad! (apologies, as I had to restore the site from a copy that had small differences in the code).
Please check the Woelpad's scripts topic for the updated scripts (as of writing woelpad has updated "Alter Sequence", and "Substitute Keywords"). Also see RevTK Lite. -
16 May 2009About the long downtime Fri & Sat
On Thursday May 14, approx 5pm US time, the website fell victim to a very recent malware exploit dubbed "Grumblar.cn" (also identified as "Js:Redirector" by the aVast antivirus software).
Reviewing the Kanji was in good company with much bigger sites like Variety.com and Tennis.com among the victims... though that is little consolation.
So how did it happen ?
Read on for the gory story, and some instructions for Windows users who would have visited the site yesterday, and who may have been exposed to the malware.First let me clear up a couple things:
- I'm using a fairly secure FTP password made of a lot of uppercas/lowercase letters mixed with random special characters, not something easily guessed.
- My computer is "clean", and I rarely ever use P2P programs or download "cracks" these days.
As I was doing an update yesterday by FTP, the trojan detected my password and sent it to the hacker's site. Just an hour later, their script logged in with my credentials and injected their code into 500+ files in a matter of SECONDS!
My best guess is that this trojan found its way into my computer because I had Windows Updates on "manual", and didn't use resident virus protection (I usually scan files, but don't run the cpu-hogging local protection). Since this exploit is very recent, many infected websites are not yet blacklisted, and Google Chrome wouldn't show the security warning. On top of that, I found out that both aVast and Malware Bytes could not detect the trojan unless the virus database was just a COUPLE days old!
Which brings me to this important observation: if you use an anti-virus leave the automatic updates on, otherwise they are simply useless. Next, if you're a sucker for optimization like me, then I would recommend with aVast to keep at minimum the "Web Shield" and "Network Shield".
I was also being over-confident with the non-Internet Explorer websites. This javascript malware exploits vulnerabilities in the Flash and Adobe Acrobat Reader plugins. This means that you can catch the malware regardless of which browser you use! A good lesson learned!
These are the steps I took to clean up the site and make sure it doesn't happen again:- First I removed the trojan with the help of this article.
- After removing the Trojan I was able to update the virus database of aVast Home Edition and Malware Bytes. I ran a complete scan and nothing else was found. Again I want to point out the fact that a complete scan with a virus database dated 10 May did not detect anything!
- After verifying that the trojan was gone (it blocked regedit and cmd.exe among other things), I updated the FTP password.
- Switched Windows Updates to automatic instead of manual.
- Enabled some resident protection in aVast: "Network shield" and "Web shield". aVast displays a warning if you access a page with this malware.
- Using a local copy of the production environment, I uploaded again all the php, html and javascript files. I double checked all the files with a FTP log of the hacker's script and all the files they touched. Because my local copy was not 100% up to date, and contained some experiments, it made the "restoration" process longer and more difficult.
FOR WINDOWS USERS:
The easiest way to check that your computer is clean is to go to the Start menu, choose "Run..." then type in "cmd" or "regedit" and press Enter. If you don't see the command shell window, or the regedit window, and the desktop seems to redraw itself, then you may have the trojan. Hopefully nobody will have been infected between the time the site was hit and when I was able to take it down. If you think you caught the trojan on a Windows OS, please post in this topic and I'll do my best to help.
I'm really sorry and sincerely hope nobody's computer was infected through this site. I've taken steps that I believe will make this very unlikely to happen in the future.
With that said, there's only so much you can do when you use Windows! This experience was a good reminder that not using IE is in fact NOT a guarantee for virus/malware protection.
Many thanks to member Burritolingus who first reported the problem. -
4 May 2009Scalable Vector Goodness
Development of the website is ongoing, and the refactoring of the existing website pages/features is almost complete.
Last week I have converted the Leitner bar chart to SVG (VML on Internet Explorer), with the excellent Raphaeljs javascript library. I was surprised to find that the graphics can work flawlessy in all major browsers: Safari, Opera, IE, Firefox, Chrome! This is very exciting because it means I don't need to use Google Charts, or FLASH, or complicated image/css tricks to do graphs anymore, I can draw them directly with simple vector graphics operations, and basically draw the charts any way I want!
As a result of this I have just added an option to switch the bar chart view between "simple" and "full" mode wherein "full" view you can see the 8 card boxes of this site's Leitner-based reviewing system.I am now aiming to publish the refactored site around 22 May.
To be able to meet this deadline I decided to move the Study area features for the very next release, and instead I am working on adding options to be able to manage flashcards freely, by adding any single card or range or cards, specified by RTK/"Heisig" frame number, OR by kanji. I am DETERMINED to make the review part of the site better!!
So the following Study area changes should be implemented in the very NEXT release after the upcoming May release (in other words, it would be the first update of the refactored site):
- Tagging your stories as "explicit" so that users can choose whether they want adult/visually explicit stories or not.
- Tagging the language of your stories, and allowing users to switch between languages in the shared stories area.
- A "Helpfulness"rating similar to that on Amazon. Basically the main difference is that you can vote DOWN something without necessarily "reporting" it. At the same time I am considering a few preset reporting options to let users flag stories that are not properly tagged.
Those Story area changes are not set in stone yet and comments and suggestions are welcome (please use this topic) !
By Month
- Oct 2024 (1)
- Sep 2024 (1)
- Jun 2024 (2)
- May 2024 (4)
- Apr 2024 (3)
- Mar 2024 (1)
- Feb 2024 (1)
- Dec 2023 (1)
- Nov 2023 (2)
- Oct 2023 (2)
- Apr 2023 (2)
- Mar 2023 (2)
- Feb 2023 (1)
- Jan 2023 (2)
- Dec 2022 (1)
- Nov 2022 (2)
- Oct 2022 (3)
- Sep 2022 (1)
- May 2022 (4)
- Apr 2022 (1)
- Feb 2022 (2)
- Jan 2022 (2)
- Dec 2021 (4)
- Nov 2021 (2)
- Oct 2021 (2)
- Sep 2021 (2)
- Aug 2021 (1)
- Apr 2021 (2)
- Feb 2021 (3)
- Jan 2021 (3)
- Dec 2020 (1)
- Nov 2020 (1)
- May 2020 (1)
- Apr 2020 (1)
- Jan 2020 (1)
- Oct 2019 (1)
- Sep 2019 (1)
- Aug 2019 (4)
- Jul 2019 (3)
- Jun 2019 (1)
- May 2019 (1)
- Mar 2019 (2)
- Jan 2019 (1)
- Nov 2018 (3)
- Oct 2018 (8)
- Sep 2018 (4)
- Aug 2018 (3)
- Jul 2018 (1)
- Jun 2018 (4)
- May 2018 (1)
- Apr 2018 (1)
- Mar 2018 (1)
- Jan 2018 (1)
- Dec 2017 (6)
- Nov 2017 (4)
- Oct 2017 (4)
- Sep 2017 (5)
- Aug 2017 (5)
- Jun 2017 (3)
- May 2017 (2)
- Apr 2017 (3)
- Mar 2017 (7)
- Feb 2017 (10)
- Jan 2017 (11)
- Dec 2016 (6)
- Nov 2016 (5)
- Oct 2016 (6)
- Sep 2016 (7)
- Aug 2016 (3)
- May 2016 (1)
- Mar 2016 (2)
- Jan 2016 (1)
- Dec 2015 (3)
- Nov 2015 (1)
- Oct 2015 (1)
- Sep 2015 (7)
- Jul 2015 (2)
- Jun 2015 (1)
- May 2015 (5)
- Apr 2015 (4)
- Mar 2015 (5)
- Feb 2015 (4)
- Jan 2015 (5)
- Dec 2014 (4)
- Nov 2014 (3)
- Oct 2014 (2)
- Jun 2014 (1)
- Apr 2014 (2)
- Mar 2014 (4)
- Feb 2014 (3)
- Jan 2014 (4)
- Dec 2013 (2)
- Oct 2013 (1)
- Sep 2013 (1)
- Jun 2013 (4)
- May 2013 (1)
- Mar 2013 (1)
- Jan 2013 (2)
- Oct 2012 (2)
- Aug 2012 (1)
- Jul 2012 (2)
- Jun 2012 (2)
- May 2012 (1)
- Mar 2012 (2)
- May 2011 (1)
- Apr 2011 (4)
- Mar 2011 (3)
- Feb 2011 (2)
- Jan 2011 (2)
- Dec 2010 (8)
- Nov 2010 (8)
- Oct 2010 (3)
- Sep 2010 (3)
- Aug 2010 (1)
- Jul 2010 (2)
- Jun 2010 (5)
- May 2010 (1)
- Apr 2010 (3)
- Mar 2010 (4)
- Feb 2010 (2)
- Jan 2010 (1)
- Dec 2009 (5)
- Nov 2009 (5)
- Oct 2009 (1)
- Aug 2009 (1)
- May 2009 (5)
- Apr 2009 (2)
- Mar 2009 (1)
- Feb 2009 (2)
- Jan 2009 (2)
- Nov 2008 (1)
- Oct 2008 (1)
- Sep 2008 (1)
- May 2008 (2)
- Apr 2008 (1)
- Feb 2008 (6)
- Jan 2008 (5)
- Dec 2007 (6)
- Oct 2007 (1)
- Sep 2007 (2)
- Aug 2007 (3)
- Jun 2007 (1)
- May 2007 (5)
- Apr 2007 (1)
- Mar 2007 (2)
- Feb 2007 (1)
- Jan 2007 (4)
- Dec 2006 (3)
- Aug 2006 (1)
- Jun 2006 (3)
- Apr 2006 (6)
- Mar 2006 (8)
- Feb 2006 (1)
- Jan 2006 (4)
- Nov 2005 (1)
- Oct 2005 (4)
- Sep 2005 (1)
- Aug 2005 (11)