Googling "..." today, I found my own website, comp-arch.net. / But I also found another website, waboba.info, that seems to be a clone of comp-arch.net. / This is probably a malware site, probably directing people to attack code, or at least trying to promote search engine scores. / In a way, it is flattering that comp-arch.net might be considered worth cloning. But then again, I imagine that this sort of thing is automated by the bad guys. / If you ever use comp-arch.net stuff, beware of waboba.info, and other possible clones.
- Yep, so it is.
- I very much doubt that any true intelligence, human or artificial, could point out that this post violates their malware policy.
---+ The Email from "The Blogger Team" received 4/17/2023
As you may know, our Community Guidelines (https://blogger.com/go/contentpolicy) describe the boundaries for what we allow-- and don't allow-- on Blogger. Your post titled "comp-arch.net mal-hacked - cloned, maybe broken into." was flagged to us for review. We have determined that it violates our guidelines and have unpublished the URL http://blog.andy.glew.ca/2011/08/comp-archnet-mal-hacked-cloned-maybe.html, making it unavailable to blog readers.
Why was your blog post unpublished?
Your content has violated our Malware and Viruses policy. Please visit our Community Guidelines page linked in this email to learn more.
If you are interested in republishing the post, please update the content to adhere to Blogger's Community Guidelines. Once the content is updated, you may republish it at https://www.blogger.com/go/appeal-post?blogId=2425290326823263574&postId=389663627174261254. This will trigger a review of the post.
For more information, please review the following resources:
Terms of Service: https://www.blogger.com/go/terms
Blogger Community Guidelines: https://blogger.com/go/contentpolicy
The Blogger Team
---+ Their Malware Policy
Malware and Similar Malicious Content
Do not transmit malware or any content that harms or interferes with the operation of the networks, servers, end user devices, or other infrastructure. This includes the direct hosting, embedding, or transmission of malware, viruses, destructive code, or other harmful or unwanted software or similar content. This also includes content that transmits viruses, causes pop-ups, attempts to install software without the user’s consent, or otherwise impacts users with malicious code. See our Safe Browsing Policies for more information.