Ако си мислиш, че не пробвах и с Опера, и с Конкърър… Май само текстови браузър пропуснах. Оказа се, че сума ти народ пищи от тази грешка, не е персонално отношение към мен 🙂
1) your query looks similar to automated requests from a computer virus
[…]
2) we apologize for the inconvenience, and hope we’ll see you again on Google
яко… ами сега как какво – може би няма да си им чак такъв фен 😛
Я какво намерих току-що, мисля, че ще ти е интересно – Google online security blog обясняват причината за „We’re sorry..“ ерор месиджа:
„Some of you might have seen this message while searching on Google, and wondered what the reason behind it might be. Instead of search results, Google displays the „We’re sorry“ message when we detect anomalous queries from your network. As a regular user, it is possible to answer a CAPTCHA – a reverse Turing test meant to establish that we are talking to a human user – and to continue searching. However, automated processes such as worms would have a much harder time solving the CAPTCHA. Several things can trigger the sorry message. Often it’s due to infected computers or DSL routers that proxy search traffic through your network – this may be at home or even at a workplace where one or more computers might be infected. Overly aggressive SEO ranking tools may trigger this message, too. In other cases, we have seen self-propagating worms that use Google search to identify vulnerable web servers on the Internet and then exploit them. The exploited systems in turn then search Google for more vulnerable web servers and so on. This can lead to a noticeable increase in search queries and sorry is one of our mechanisms to deal with this.“
At ACM WORM 2006, we published a paper on Search Worms [PDF] that takes a much closer look at this phenomenon. Santy, one of the search worms we analyzed, looks for remote-execution vulnerabilities in the popular phpBB2 web application. In addition to exhibiting worm like propagation patterns, Santy also installs a botnet client as a payload that connects the compromised web server to an IRC channel. Adversaries can then remotely control the compromised web servers and use them for DDoS attacks, spam or phishing. Over time, the adversaries have realized that even though a botnet consisting of web servers provides a lot of aggregate bandwidth, they can increase leverage by changing the content on the compromised web servers to infect visitors and in turn join the computers of compromised visitors into much larger botnets. This fundamental change from remote attack to client based download of malware formed the basis of the research presented in our first post. In retrospect, it is interesting to see how two seemingly unrelated problems are tightly connected.“
„Имаш шоколад на устната… Отляво… Другото ляво.“ 8 години ago
Когато торентът стои трети ден на 99.5%… 8 години ago
Мине-не-мине година и пак взема, че уцеля липсващата плочка, изненадващия праг или стъпалото-капан – и се люсна в цял ръст на тротоара. 8 години ago
Най-интелигентният, красноречив и информиран FB приятел има cult following – свирепа банда тролове-дезинформатори, които ми късат нервите. 8 години ago
„Ела, красавице, да ти кажа, в чужбина на пазар ще ходиш, много хора ти завиждат, дай пари за едно кафе, красавице, не бъди горделива“… 8 години ago
21:37:32 ч., 20.09.2007 г.
I am sorry, but your query looks similar to automated requests from a computer virus 😉
сложи си опера :)P
21:43:49 ч., 20.09.2007 г.
Ако си мислиш, че не пробвах и с Опера, и с Конкърър… Май само текстови браузър пропуснах. Оказа се, че сума ти народ пищи от тази грешка, не е персонално отношение към мен 🙂
22:13:28 ч., 20.09.2007 г.
1) your query looks similar to automated requests from a computer virus
[…]
2) we apologize for the inconvenience, and hope we’ll see you again on Google
яко… ами сега как какво – може би няма да си им чак такъв фен 😛
22:14:25 ч., 20.09.2007 г.
Аз не мога да дублицирам поведението, как успяваш:)
22:59:46 ч., 20.09.2007 г.
И докато търсех инфо как се процедира в подобни случаи – то взе, че се оправи само.
23:50:00 ч., 20.09.2007 г.
Ето обяснение за въпросното съобщение:
http://googleonlinesecurity.blogspot.com/2007/07/reason-behind-were-sorry-message.html
00:01:34 ч., 21.09.2007 г.
Предполагам, че не си пропуснала с Firefox да опиташ; обаче пробва ли да зачистиш кеша?
00:12:34 ч., 21.09.2007 г.
Я какво намерих току-що, мисля, че ще ти е интересно – Google online security blog обясняват причината за „We’re sorry..“ ерор месиджа:
„Some of you might have seen this message while searching on Google, and wondered what the reason behind it might be. Instead of search results, Google displays the „We’re sorry“ message when we detect anomalous queries from your network. As a regular user, it is possible to answer a CAPTCHA – a reverse Turing test meant to establish that we are talking to a human user – and to continue searching. However, automated processes such as worms would have a much harder time solving the CAPTCHA. Several things can trigger the sorry message. Often it’s due to infected computers or DSL routers that proxy search traffic through your network – this may be at home or even at a workplace where one or more computers might be infected. Overly aggressive SEO ranking tools may trigger this message, too. In other cases, we have seen self-propagating worms that use Google search to identify vulnerable web servers on the Internet and then exploit them. The exploited systems in turn then search Google for more vulnerable web servers and so on. This can lead to a noticeable increase in search queries and sorry is one of our mechanisms to deal with this.“
The reason behind the „We’re sorry…“ message
Коментарите към поста също са интересни.
At ACM WORM 2006, we published a paper on Search Worms [PDF] that takes a much closer look at this phenomenon. Santy, one of the search worms we analyzed, looks for remote-execution vulnerabilities in the popular phpBB2 web application. In addition to exhibiting worm like propagation patterns, Santy also installs a botnet client as a payload that connects the compromised web server to an IRC channel. Adversaries can then remotely control the compromised web servers and use them for DDoS attacks, spam or phishing. Over time, the adversaries have realized that even though a botnet consisting of web servers provides a lot of aggregate bandwidth, they can increase leverage by changing the content on the compromised web servers to infect visitors and in turn join the computers of compromised visitors into much larger botnets. This fundamental change from remote attack to client based download of malware formed the basis of the research presented in our first post. In retrospect, it is interesting to see how two seemingly unrelated problems are tightly connected.“
10:43:28 ч., 21.09.2007 г.
@Антония: Ех, как не го видях вчера, да те спамна като едни Ангел Г. :).
Ами като не работи Гугъл, решението е search.live.com 😈
10:46:08 ч., 21.09.2007 г.
Бре, който е свикнал на своя си плъгин, как пуска неформатирани коментари. Оправи, моля те, горното __ __ на коректното удебеляване 🙂
11:06:09 ч., 21.09.2007 г.
Всичко е оправено – и на Дончо удебеляването 😆 , и Google грешките.
14:21:21 ч., 21.09.2007 г.
Ами вече няма да ни четеш, сори.
16:48:36 ч., 21.09.2007 г.
Изглежда логично, наистина – без блогспот, голяма работа
22:25:51 ч., 21.09.2007 г.
Чшшш!