Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Yesterday as usual, open hao123, find a novel station to see, is thinking hao123 I like the station removed it?
Suddenly found a floating ad on Hao123 's home page.
Originally also nothing, the website puts the advertisement very normal, then continues to browse the website, when opens the Ku6, also encounters this kind of question,
More and more wrong, even if ku6 for commercial interests may be put, but hao123 should not put so large floating on the home page, and advertising also shows that my region of a hospital ad
I intercepted an ad run address map:
I usually in addition to see their own site, is to visit some of the more often go to the station, basically can not stallion or by the plug-in.
And I also have a certain knowledge of protection, anti-virus software, firewalls are always monitored.
At first, I used all kinds of anti-virus software to kill the computer, but also did kill a few advertising horse (lack of ability, a lot of learning), thought it would be okay
Who knows the time of today's visit came out again. This is not just the problem of the Trojan,
Who has the ability to do this? And the ads show that my local, even if the horse, it is not possible to be so professional, or directional.
My internet is pull Netcom's line, then, this problem, is netcom doing good?
Just doubt, hehe
I also conducted a number of surveys, a group of friends in the reminder, the first view of Hao123 's homepage code:
<html>
<head>
<title></title>
<meta http-equiv= "Content-type" content= "HTML; charset=gb2312 ">
</head>
<body scroll=no topmargin=0 leftmargin=0 marginwidth=0 marginheight=0>
<iframe name= "Content" src= "http://221.204.253.59:6688/AIsend/AIsendurl.jsp?" realurl=http://www.hao123.com/"frameborder=" 0 "width=" 100% "height=" 100% ">
</iframe>
<script language= "JavaScript" src= http://221.204.253.55:8080/adms/present/adpresent.do?method=fordns& Domainname=www.hao123.com "></SCRIPT>
</body>
</html>