<br>
I actually came across a very interesting link....in regards,with this matter....<br>
<br>
<a href="http://www.mambogani.com/forums/index.php?showtopic=6273">http://www.mambogani.com/forums/index.php?showtopic=6273</a><br>
<br>
They key part,being:<br>
<br>
<br>
Folks,<br>
<br>
A few days ago, some sick nuthead, whom we suspect
is a NARC-K sympathiser, or perhaps the latest government project,
using mwaikibaki@yahoo. com address, discreetly sent e-mails to
individuals who are known to support ODM-K, especially in Washington
DC. The e-mails simply notified them of the following websites:
Kalonzofoundation. org. and <a href="http://odm-kenya.org">odm-kenya.org</a>. Clicking on the
Kalonzofoundation. org URL re-directs one to the <a href="http://Raila2007.com">Raila2007.com</a> website,
with the top browser bar showing a message that reads: "Kalonzo backs
Raila". Clicking on the <a href="http://odm-kenya.org">odm-kenya.org</a> URL re-directs one to a Kenya
government website. But a quick check reveals that neither
kalonzofoundation. org belongs to Hon. Kalonzo Musyoka Foundation, nor
does <a href="http://odm-kenya.org">odm-kenya.org</a> belong to ODM-K. Needless to say, the fraudsters are
attempting to hoodwink Kenyans into believing a lie. This is only a
sick prank, as none of the genuine websites have been hacked. <br>
<br>
The
fact is, the correct website for Hon. Kalonzo Musyoka is:
www.kalonzomusyokaf oundation. org, while ODM-K's website, which is not
fully developed is: <a href="http://www.odmk.org">www.odmk.org</a>. None of these websites were hacked.
The Standard's headline, unfortunately, is misleading. The pranksters
simply registered variations of the names of the said organizations and
re-directed any queries to <a href="http://Raila2007.com">Raila2007.com</a>, and to the government website
respectively. This is not the same as hacking. Anyone with a website
can re-direct their URLs to another website. It doesn't take
half-a-brain to do this. <br>
The pranksters simply juggled the names
and registered them. The jargon for this kind of registration is
"cyber-squatting" . People register names with the hopes of cutting a
cash deal with the real owners. In most cases, all the squatter needs
to cough up is only $10.00 to register a domain name. It's as cheap as
$2.00 with other companies. These particular dunderhead(s) registered
these names with the following internet domain registrar:<br>
<br>
DomainsByProxy. com<br>
15111 N. Hayden Rd., Ste 160, PMB 353<br>
Scottsdale, Arizona 85260<br>
United States<br>
Phone:+1.4806242599<br>
<br>
Registration details:<br>
Admin Email:KALONZOFOUNDA TION.ORG@ domainsbyproxy. com<br>
Tech ID:GODA-116462376<br>
Tech Email:KALONZOFOUNDA TION.ORG@ domainsbyproxy. com<br>
Name Server:NS3.SECURESE <a href="http://RVER.NET">RVER.NET</a><br>
Name Server:NS4.SECURESE <a href="http://RVER.NET">RVER.NET</a><br>
Admin Email:ODM-KENYA. ORG@domainsbypro <a href="http://xy.com">xy.com</a><br>
Tech ID:GODA-122841719<br>
Tech Name:Registration Private<br>
Tech Organization: Domains by Proxy, Inc.<br>
DomainsByProxy. com<br>
15111 N. Hayden Rd., Ste 160, PMB 353<br>
City:Scottsdale<br>
State/Province: Arizona<br>
Tech Postal Code:85260<br>
Country:US<br>
Phone:+1.4806242599<br>
FAX:+1.4806242599<br>
Email:ODM-KENYA. ORG@domainsbypro <a href="http://xy.com">xy.com</a><br>
Name Server:PARK9. SECURESERVER. NET<br>
Name Server:PARK10. SECURESERVER. NET<br>
All
the compainant needs to do is contact the company and file a complaint.
The culprit will be smoked out and taken to court. The FBI has been on
the trail of such obscure websites, some of which are used by terrorist
organizations to convey coded messages. It will only be a matter of
time before these ones are smoked out.<br>
<br>
The purpose of this
infantile prank was of course meant to have the Kalonzo and Raila camps
go after each other's throats. What's surprising is the shallow and
very un-sophisticated manner in which it was played. It would have been
laughable had it not for the fact that many gullible Kenyans will be
hoodwinked into believing that this was actually the work of one ODM
camp against another. It would do us all good if the Standard corrects
this flawed perception that they have created. I think the newspaper
should have first done a thorough investigation before splashing such a
misleading headline.<br>
Whatever the case, the pumbavus will never
succeed, and the sooner they realize this the better. Fortunately,
those who received the e-mails saw through the sick jokes and decided
to ignore them.<br>
We hope other Kenyans will equally treat them with the contempt they deserve.<br>
<br>
Very Best regards<br>
<br>
J Sang.<br>
Washington DC<br>
============ =<br>
<br>
<br>
Kind Regards,<br>
<br><div><span class="gmail_quote">On 2/22/07, <b class="gmail_sendername">Bill Kagai</b> <<a href="mailto:billkagai@gmail.com">billkagai@gmail.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hiya,<br><br>I have received a fone call from an ODM supporter wishing to find out why their website <a href="http://www.odm-kenya.org" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">www.odm-kenya.org
</a>
is pointing to a government website. This poses a serious challenge to
us in the 'internet business' with regard to whether we have secure
systems in place.
<br><br>However, upon digging a bit deeper, I have realised that
possibly, this is a simple blackmail prank since the WHOIS records have
not been altered and only the MX record has been changed to point the
website to an innocent Govt server. Tracert'ing the address also shows
that it is the admin and registrant of the website who have access to
the odm website registry. I am sure many ODM supporters might be
pointing a finger at Govt just because someone managed to ping the
communications website and put the server address on the opposition
website to create a furore and possibly make money Pablo Escobar Way.
[Plata o plomo] Spanish for [silver or lead] literally meaning pay up
the bribe or face assassination.
<br><br>How do we contain these Matheri's of the internet???. Seems the games have just begun???<br clear="all"><br>-- <br>--<br>With Kind Regards,<br>Bildad Kagai<br>MD - Circuits & Packets Communications Ltd<br>
Content & Training Partner - JKUAT E-Government Academy<br>Suite B2, Tetu Apartments, State House Avenue<br>P. O. Box 20311 - 00200<br>Nairobi, Kenya<br>Tel. 254 20 272 8332<br>Fax. Rendered Obsolete<br><br>URL. <a href="http://www.circuitspackets.co.ke" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">
www.circuitspackets.co.ke</a><br>URL. <a href="http://www.JKUATEgovAcademy.ac.ke" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">www.JKUATEgovAcademy.ac.ke</a>
<br>_______________________________________________<br>kictanet mailing list<br><a onclick="return top.js.OpenExtLink(window,event,this)" href="mailto:kictanet@kictanet.or.ke">kictanet@kictanet.or.ke</a><br><a onclick="return top.js.OpenExtLink(window,event,this)" href="http://kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">
http://kictanet.or.ke/mailman/listinfo/kictanet</a><br><br>Please unsubscribe or change your options at <a onclick="return top.js.OpenExtLink(window,event,this)" href="http://kictanet.or.ke/mailman/options/kictanet/judyokite%40gmail.com" target="_blank">
http://kictanet.or.ke/mailman/options/kictanet/judyokite%40gmail.com</a><br></blockquote></div><br><br clear="all"><br>-- <br>Judy Ann Okite,<br>+254-721237507,+254-734252336<br>P.O. BOX 2228 00100,<br>NAIROBI,KENYA.<br><br>
<br>"Even if you are on the right track, you'll still get run over if you just sit there."