Introduction About Site Map

XML
RSS 2 Feed RSS 2 Feed
Navigation

Main Page | Blog Index

Friday, August 14th, 2015, 8:38 am

Synergy for Expanded Workspace Without Extra Cables

Quad head

IF ONE looks for a laptop with a graphics card that has more than one output, the outputs often cannot be used concurrently, so for instance, my work laptop can either use an external display via HDMI or via VGA, not both at the same time. How does one easily expand one’s workspace? Get a budget Chromebook (15-inch Acer in this case), install GNU/Linux on it, extend the display to an external monitor (28 inches in this case), then connect to the other (primary) laptop using Synergy. Voila! Quad-head laptop (see above). There are no excuses anymore for not choosing laptops over desktop.

Friday, August 7th, 2015, 11:11 am

Debunking the Alleged ‘Necessity’ of Facebook

Bathroom

One of the alleged “reasons” for Facebook registration is sharing one’s personal photos with family and friends, or at least view some. It is, however, quite antisocial to require a friend, peer, parent or sibling to give away a lot of personal details to a malicious company just to be allowed into the walled gardens of this company and view photos that this company has nothing to do with (not even copyrights).

Several years ago Rianne and I set up an album in this site, obviating the need for some privacy-infringing Facebook account, which practically helps spy on both the uploader and the viewers, who are supposed to be “friends” and thus not massively spied on. Later this week the album will have had half a million views, showing (we hope) that even a decentralised platform can host one’s photos and receive views from one’s connections, without the need for a massive surveillance network masquerading as ‘social’ media.

The only sad thing is, Yahoo! recently destroyed the slideshow part of our gallery by buying a company that had provided this third-party service for years (in the form of JavaScript), silently taking out all the code and server resources only months later (we estimate this happened half a year after the acquisition). Browsing photos more rapidly has therefore become harder and we are hoping to find a replacement some time in the future (none has been found yet which is fit for purpose). By buying this company, which is sad for a lot of people except perhaps the staff, Yahoo! basically broke the slideshow functionality in tens or hundreds of thousands of Gallery 2/3 Web sites. It is another legitimate reason to hate Yahoo!

Saturday, August 1st, 2015, 10:19 am

When Mozilla Puts an Advertising Network at the Very Heart of Firefox

IT IS no secret that Mozilla has been planning to put ads inside Firefox. This is a very controversial decision, so Mozilla is apparently still experimenting with it, mostly promoting its own products and services. Today, however, I saw one of my ‘speed-dial’ buttons (linking to Twitter) spontaneously replaced with Mozilla ads, some of them “sponsored” and some proprietary software (like Pocket). I took screenshots to serve as proof of this and here are four examples.

firefox-ads

It might not be long before Firefox spies on the users, transmits user data to Mozilla, and then Mozilla sends targeted ads for whatever product/brand exists in the market and looks for clients. Mozilla would be utterly stupid to do such a thing, for the media (not just users) would definitely strike back. If Mozilla needs more sources of revenue, this shouldn’t be it. The negative publicity would induce greater losses than the temporary gains (from sales of advertisement slots).

Wednesday, July 22nd, 2015, 8:24 am

Moving the Whole Neighbourhood Away From BT and BT Openreach Lines (Updated)

IT HAS been nearly four months since a serious REIN issue developed here in this neighbourhood. It took me over 20 hours on the phone before BT sent out an engineer (I wasn’t the only one complaining) and perhaps 40 hours on the phone (set aside other forms of correspondence, many visits from engineers, and the suffering from a poor connection for many months in a row) to send out the Precision Test Officer. Much of it was gradually chronicled in the following posts:

Dumping BT isn’t quite a solution because it’s the BT Openreach line that has an issue with it. It doesn’t matter if one moves to a different ISP, the cables stay the same. My neighbours who experience similar issues and complain about it are not even with BT as their ISP. So we need alternative cables, e.g. Virgin. A couple of days ago I responded to BT (see the latest in the third link above).

Virgin is now polling/asking (by post) the whole area if there’s enough demand for fiber-optic connection. I think that they already have some infrastructure in place, based on what the precision testing officer told me. BT Openreach wiring here cannot be trusted anymore, and there is no imminent remedy, not even hope of a fix.

If I get my way, we might be able to get new wiring from BT’s competition here. That will help resolve the issue for good, I hope, helping a lot of people…

And later on the connection got so bad that I escalated this to the highest BT managers with the following strongly-worded message:

We have just been disconnected SEVEN times in a 30-minute period. This is not acceptable and I cannot accept closure of this issue. If need be, I shall work to have alternative cables introduced in our neighbourhood and lobby all my neighbour (using letters) to dump BT for good, showing them how poorly the company has dealt with this issue that I first reported nearly 4 months ago. I have detailed documentation of this case, so facts are on my site. It took more than 3 months to merely send a precision testing officer out! http://schestowitz.com/Weblog/archives/2015/06/23/bt-rein/

Yesterday I spent half an hour with BT on the phone. We’re still trying get get alternative wiring/cabling (alternative to BT Openreach), whereupon we can finally leave.

Judging by some reactions that I received online, other people in England and even in Scotland had similar experiences with BT and only by dumping BT’s cables have these problems been ‘resolved’. This BT monopoly on the cables (BT Openreach) needs to end.

Update: BT Retail sent the following message.

Hi Mr Schestowitz,

I’d like to thank for your emails and time you have spent with me on the phone it was very much appreciated and I’d like to thank you for your patience with the issues you’ve faced.

The Future
I’ve closed your complaint as we discussed on the phone. If you have any other problems, please get in touch on [redacted] or [redacted] using PIN 1089. Or you can email my team at [redacted]

For anything else our Customer Services will be happy to help on 0800 800 150. Or why not take a look at our website www.bt.com. Alternatively for any issues with your BT services the Technical Helpdesk are available on 0800 111 4567 should you need them.

What we’ve done…
You reported you were facing issues with your Broadband in that it was intermittent, dropping connection multiple times per day. After multiple tests and engineers have been out heavy REIN interference was suspected. A REIN trained engineer and both a Precision Test Engineer have both surveyed the area but were unable to locate a source for the interference.

Currently legislation exists in the form of the Electromagnetic Compatibility Regulations (Statutory Instrument 2006 No.3418). It ensures that when new equipment is placed on the market in the UK it mustn’t cause interference to radio services and telecommunications networks. Conformance being indicated by the affixation of the CE mark.

Unfortunately in most REIN cases the source of the noise is not a device that is causing problems from new, but has degraded during its life such that it generates excessive noise in the order of 50dB (100,000 times) higher than when it was new, and met the EMC regulations and was CE marked. This excessive noise is usually due to components failing within the power supply, but unfortunately the equipment still appears to operate normally to the owner.

We’ve talked about such issues with BIS and Ofcom in the past and they all agree that there’s currently no legislation that we can use to stop this interference being caused. The EMC regulations are a market entry requirement to allow free movement of goods around Europe and hence only apply when equipment is first sold and so has no application to in-life issues that subsequently occur.

In most cases when such issues are bought to the attention of the owner of the faulty equipment they are co-operative and will take action to repair or replace the equipment causing the problems. However in a limited number of cases (like this one) that co-operation is not forthcoming and then there is currently nothing that BT or anyone can do. It is for these cases that new legislation is required. Ideally any new legislation should allow an enforcement authority to issue a suspension notice (something along the lines of Article 43 of SI2006: 3418) to the owner of the equipment that is causing the interference.

I hope this helps you understand our position better, and why this has been a lengthy process. As the engineers have confirmed that they are unable to locate the sources of the REIN in the area they’ve had no choice other than to close off their investigation and with this there are no further actions we can take.

I’d like to thank you for both your time on the phone and the understanding of the situation.

Monies…

Due to the issues you were facing and as we discussed I would like to credit you half of the Broadband cost for the 4 month you have been facing these problems. You will see a single credit on your next bill of £44.25. This is in full and final settlement of your complaint as we agreed.

Many Thanks

[redacted]
Executive Level Technical Complaints
BT Retail

Thursday, July 2nd, 2015, 8:54 am

Amazon Says I Need to Sue in Order to Merely Find Out Who Uses Their Own Facilities (AWS) to Attack My Site (Update)

AWS logo

OVER the past few days I spent a lot of time (never mind emotional impact) pressuring Amazon, having already spent a lot of time battling DDOS attacks which rendered my biggest site inaccessible. After much stonewalling (I had to repeat my request about 5 times only to receive useless replies or no replies at all) I got a message. It took a very long time and much strongly-worded nagging and I finally got a reply (after a day and a half of silence) saying that Amazon cannot “release any customer information upon request. You will need to provide a valid subpoena issued by a court of law” (i.e. start legal action).

So in layman’s terms, my site got attacked by Amazon servers which were rented out to an Amazon customer and when when I ask Amazon who is doing this (so that I can take action) they say they cannot tell me and that I must go to expensive lawyers to do so, wasting both time and money in a courtroom.

I have secured evidence of the attacks by now. Tomorrow I may visit some local attorneys, provided any of them might even know what DDOS means (British police certainly didn’t understand what I was talking about when I took my complaints to them).

Here is Amazon’s reply in full:

Hello Roy,

I apologize that you are not satisfied with the communication that you have been receiving. I’d also like to apologize that you were not told that our privacy policy does not permit us to release any customer information upon request. You will need to provide a valid subpoena issued by a court of law. I am sure that you understand that there are laws we need to follow and I would also like to thank you for reporting this as we take security very seriously.

Please forward the subpoena documentation to:

Amazon.com, Inc.
Corporation Service Company
300 Deschutes Way SW, Suite 304
Tumwater, WA 98501
Attn: Legal Department – Subpoena

The request should include the IP address(es) as well as an exact, accurate timestamp, including the timezone, associated with each address.

I apologize for any inconvenience caused by privacy laws. I can assure you that the matter is being dealt with by our specialized abuse team.

I hope that this is helpful.

Thank you for your inquiry. Did I solve your problem?

If yes, please click here:

http://www.amazon.com/gp/help/survey?p=A2O0DWEQD3E8HK&k=hy

If no, please click here:

http://www.amazon.com/gp/help/survey?p=A2O0DWEQD3E8HK&k=hn

Best regards,

[redacted]

http://aws.amazon.com

In short: Waste of money and time in order to find out who’s engaging in abuse, which is very much ridiculous. Amazon is just covering its own behind in case of lawsuits from the client over revelation of identity. Since the abusive servers are Amazon’s I suppose I can just start legal action against Amazon itself, both for DDOS and for refusal to respond to my questions regarding accountability.

My response to Amazon was as follows:

Unless Amazon is willing to settle, I am going to sue Amazon, not waste time and money sending a subpoena. The attacks on my site came, on numerous occasions, from servers owned and operated by Amazon.

Amazon, moreover, repeatedly stonewalled my requests to find out who is accountable, both inside Amazon and in its client/s, whom it is unwilling to unmask despite acknowledgement of abuse (AWS staff already confirmed this in writing).

Please provide me with the address to serve legal papers to, as I am going to sue Amazon for damages, misconducts, and waste of my time.

In the mean time, I shall continue to publicly shame Amazon for this abusive behaviour, in various social media sites and my own e.g. http://schestowitz.com/Weblog/archives/2015/06/28/aws-ddos/

Just because you rent out computing resources does not exempt you from accountability for how these are used.

Updated (29/7/2015): Amazon AWS has just replied to me. Almost ONE MONTH late. I think I know now who knocked the site offline. Bad publicly (online) probably caused this belated reaction from Amazon. To quote AWS:

Dear abuse reporter,

We sincerely apologize for the delay in addressing this abuse case. Our customer has confirmed that the party responsible for this traffic has modified their crawler appropriately. If you’d like to prevent them from crawling your site in future, you can add the following directive to your robots.txt file:

User-agent: revivebot
Disallow: /

If this problem recurs, please open a new abuse report with timestamped logs showing the unwanted traffic. We will make every effort to work with you and our customer to reach a solution.

Thank you for your patience and attention to this matter.

Regards,
AWS Abuse team

Monday, June 29th, 2015, 12:50 am

HP Chromebook 14 Keyboard and Other Low-Quality HP Equipment

WHO thought that a hardware company like HP cannot make a well-working low-budget laptop? Despite positive reviews, only 6 months after buying HP Chromebook 14 an entire section of keys stopped working or works intermittently (intermediately causing huge nuisance!), making it almost impossible to type sentences. This is the hallmark of bad connections/wiring — the hallmark of cheaply-made keyboards with lousy components (my Palm PDA keyboard only had this kind of issue more than a decade after I had started using it). HP’s hardware quality control surely is lacking, or maybe HP puts its brand on poorly made hardware put together by low-paid labour with cheap/shoddy components (which would cost a lot in the long term, if a buyer falls into it).

According to numerous responses in this first thread I found (didn’t search for any particular brand, but HP Chromebook 14 gets mentioned a lot), quite a lot of people experience the exact same hardware fault (same keys too) in months-old HP Chromebook 14. Rubbish quality seems to be the culprit. This sure sounds like a manufacturing issue that is systemic. Nothing gets spilled and the keyboards are treated gently. It’s just poor quality build and maybe — however sadly — this is where HP is heading. That’s s shame because a lot of computer equipment in our house is HP-branded (keyboards, mice, printer, tablet, laptops). We bought “HP” we because we though it would assure reliability. Only 2 weeks ago my HP laptop charger just popped and burned (smoke, no fire), necessitating an expensive replacement because HP has some kind of proprietary (hard to find) connector.

I have lost trust and am losing respect for HP.

Sunday, June 28th, 2015, 9:01 am

Amazon AWS Used for DDOS Attacks Against My Web Sites, Amazon Takes 14 Hours to Reply But Not Take Action (Updatedx5)

AWS logo

Over the past year my biggest sites have come under various DDOS attacks. It is hard to guess who to attribute these to, but the matter of fact is, someone does not want these sites to be accessible. It is possible that different factions are independently behind these attacks, but since British police won’t lift a finger to help prevent this or even investigate this, I am left having to defend myself.

Blocking offending machines is sometimes possible, but it is very hard to block based on affiliation (or assignment) of an IP address, especially if the IP is assigned to some very large entity. Since Amazon controls so many IP blocks (even the A block of an IP address changes a great deal, not just the B block), it is very hard to block AWS servers that engage in DDOS attacks based on IP patterns, geography, etc. It makes AWS enormously dangerous and potentially destructive. It can easily take down online stores, causing huge financial damage and upsetting regular customers.

Several months ago it was alleged (albeit later denied by Amazon) that Sony had acquired access to AWS servers for the purpose of engaging in DDOS attacks, trying desperately to stop the distribution or leaks of its internal E-mails (now in Wikileaks, which Amazon banned after political pressure). AWS has a massive (over half a billion dollars) deal with the CIA and last week AWS also opened up to the NSA, which needs additional computational resources to spy on people and crack encryption. There’s no room for trust and AWS clearly disregards ethics, as a matter of policy.

There is a type of attack that has gone on several times now, meaning that it’s not some random incident and that it’s not going to stop unless serious action is taken, if not against the offender, then against the facilitator (host). This is why I decided to take it up with Amazon. I filled out the following form, having already lost many hours fighting DDOS (visitors were not able to access the site).

AWS DDOS

Here is a confirmation that they have received my report (around 7PM last night).

AWS report

These are essentially DDOS attacks on Techrights, there is not much ambiguity there. Very large IP pools (not zombies PCs but AWS, unless Amazon’s servers too became zombies) are behind it, so I reported to Amazon that their systems are DDOSing my sites. They don’t even have “DDOS” as option. “Excessive web crawling” is the closest description to the activity, the others being completely irrelevant. Perhaps Amazon just views itself as incapable of doing such malicious things. How arrogant.

This is clearly a DDOS attack. This happened also less than one week ago (same attacker, same tools), for over an hour. It’s happening again this weekend.

Pattern of the attack: about 100 simultaneous requests (at the very same second) to many CPU-heavy pages, repeating in a cycle, taking down the httpd service, then waiting for the next round. Example request (time in US Western):

[27/Jun/2015:11:05:20 -0700] “GET /2015/01/ HTTP/1.1″ 200 331187 “-” “Typhoeus – https://github.com/typhoeus/typhoeus”

Typhoeus is always the Swiss army knife.

From Varnish we get the original IP addresses, e.g.:


  643 SessionOpen  c 54.225.55.182 46051 10.0.10.11:80
  643 ReqStart     c 54.225.55.182 46051 1557192107
  643 RxRequest    c HEAD
  643 RxURL        c /category/osdl/
  643 RxProtocol   c HTTP/1.1
  643 RxHeader     c Host: techrights.org
  643 RxHeader     c Accept: */*
  643 RxHeader     c User-Agent: Typhoeus - https://github.com/typhoeus/typhoeus
  643 VCL_call     c recv lookup
  643 VCL_call     c hash
  643 Hash         c /category/osdl/
  643 Hash         c techrights.org
  643 VCL_return   c hash
  643 VCL_call     c miss fetch
  643 FetchError   c no backend connection
  643 VCL_call     c error deliver
  643 VCL_call     c deliver deliver
  643 TxProtocol   c HTTP/1.1
  643 TxStatus     c 503
  643 TxResponse   c Service Unavailable
  643 TxHeader     c Server: Varnish
  643 TxHeader     c Content-Type: text/html; charset=utf-8
  643 TxHeader     c Retry-After: 5
  643 TxHeader     c Content-Length: 419
  643 TxHeader     c Accept-Ranges: bytes
  643 TxHeader     c Date: Sat, 27 Jun 2015 17:56:01 GMT
  643 TxHeader     c X-Varnish: 1557192107
  643 TxHeader     c Age: 1
  643 TxHeader     c Via: 1.1 varnish
  643 TxHeader     c Connection: close
  643 Length       c 419
  643 ReqEnd       c 1557192107 1435427760.530639887 1435427761.228856087 0.219283819 0.698100090 0.000116110
  643 SessionClose c error
  643 StatSess     c 54.225.55.182 46051 1 1 1 0 0 0 257 419

This is clearly abuse as it amounts to about 100 requests per second lasting for a long period of time.

I told Amazon: “Deal with it as soon as possible and keep me informed or I will take action against Amazon for harbouring DDOS attacks.”

The attacker’s IPs vary too much to block, but they are all AWS (54.225.55.182 and many others).

Amazon has not even responded to acknowledge that they’ve received my abuse report. It had been about 14 hours and I was still waiting. There was nothing to even say they’re looking into it. They are clearly not taking disciplinary measure and security measures, perhaps not employing staff in the weekend to deal with abuses by their network, only to their own network (when it’s them who are the victim).

Amazon is a malicious, irresponsible company.

14 hours after my report they finally got back to me and even then their response was weak and useless. Here is what they wrote:

Hello,

Thank you for contacting Amazon Web Services. We take reports of unauthorized network activity from our environment very seriously. It is specifically forbidden in our terms of use.

Because Amazon EC2 Public IP addresses may change ownership frequently, without additional information we will be unable to identify the correct owner of the IP address for the period of time in question.

So that we can process your report and identify the actual customer in question, we require the following additional information. Please note that we will not open attachments under any circumstance.

* Destination Port and Protocol
* Intensity and frequency of activity in short log extracts, no larger than 4KB

For a faster response, please file your report using the AWS Abuse form at the link below:

http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse

We appreciate your help in providing the necessary information requested.

Best regards,
Amazon EC2 Abuse Team

I am going to follow this up with updates.

Based on the time of Amazon’s response, around 9AM UK time, Amazon is just trying to save money and thus increase its profit (while famously evading tax in the UK) by strictly working from 9 to 5. Abuses like these require a dedicated 24/7 team.

Update: I had to spend more time reporting this to Amazon again, this time with stronger language:

You must take action immediately and tell me who is behind these attacks (your IP addresses). I am utterly disappointed with you taking 14 hours just to respond (and not take action against the attackers). I wrote about this with more details in http://schestowitz.com/Weblog/archives/2015/06/28/aws-ddos/

You have asked me for:

* Destination Port and Protocol
* Intensity and frequency of activity in short log extracts, no larger than 4KB

I already gave you those! But you are ignoring my report or failing to investigate, so I am adding yet more evidence from the Apache back end.

Please respond immediately and tell me who the perpetrator is so that I can take action. Failing to do so, I shall take action directly against Amazon.

Here is a screenshot of the form (they refuse to correspond by E-mail, so I have to refill their tedious forms each time).

DDOS repeated

Update #2: Almost 24 hours later and there is no breakthrough, just more waste of time. Here is what they wrote again, merely repeating themselves:

Hi Roy,

I apologize for the inconvenience caused from this attempt on your website.

I do understand the frustration and I am sorry that this has happened. I have checked with our Abuse team once again and they would indeed need additional information to continue their investigation. This was mentioned in their reply on the Abuse case that currently exist in the system.

The Abuse team will continue to investigate and take action against this, but they would need the additional information:
* Destination Port and Protocol
* Intensity and frequency of activity in short log extracts, no larger than 4KB

Once you have that information, please provide it by responding to their e-mail: ec2-abuse@amazon.com and including your case number:
55322041040

Best regards,
[redacted]
Thank you.
Amazon.com

Here is my response:

Hi,

I don’t understand why it is “Message From Customer Service” because I am not an Amazon customer, I am a victim of Amazon customers. I need to speak to technical people and the issue must be rectified as soon as possible. I need the names of people at Amazon who are dealing with the case and the Amazon customer who is the culprit in case I file a lawsuit. As for the additional requirements, which you sent to me twice despite me providing them already twice when I filled out an abuse report, what else do you need?

You say:

* Destination Port and Protocol
* Intensity and frequency of activity in short log extracts, no larger than 4KB

I provided these twice and even additional logs the second time (about 4KB). I need you to carry out an investigation as this is your job, not mine, and I don’t have the tools to figure out which of your customer uses your facilities to do this. Amazon is facilitating DDOS attacks and I demand to know who is dealing with my case and for further action to be taken immediately. You also have my phone number (since the time of the incidents) and you should have phoned me last night, not replied by E-mail 14 hours later.

Update #3: Amazon finally found the source of DDOS (its own servers abusing others) — 24 hours after I reported it! Very slow a reaction time.

Here is what I got at 3:36PM:

Dear Abuse Reporter,

Thank you for submitting your abuse report.

We’ve determined that an Amazon EC2 instance was running at the IP address you provided in your abuse report. We’ll investigate the complaint to determine what additional actions, if any, need to be taken in this case.

If you wish to provide additional information to EC2 or our customer regarding this case, please reply to ec2-abuse@amazon.com with the original subject line.

Thanks again for alerting us to this issue.

Case number: 55464910873

Your original report:

* Source IPs: 54.225.55.182
* Abuse Time: 2015-06-27 18:05:00.0

My response is still strong in tone, having suffered enough already:

Hi,

Please provide me with information about who the client is and the nature of the account that did this. It is imperative that I know this because DDOS attacks on my sites have been a major issue for quite some time and we have only speculations about who or what may be behind it. Hundreds of hours have been lost due to DDOS attacks this year alone. There was also damage to databases and hence partial data loss.

Additionally, please provide me with names of people in Amazon who dealt with this case. 24 hours response time to a DDOS report is totally accessible, especially for a multinational company like Amazon that operates massive datacentres with capacity to paralyse the world’s biggest operations. I shall be documenting this case in my blog and will pursue this as far as necessary.

Regards,

Update #4 (29/6/2015): Amazon has still not replied to my message. Instead I got some sort of public relations from them (this morning):

Hello Roy,

I do apologize for your emails being inappropriately addressed.

I do see that our dedicated technical abuse team has contacted you advising that the abuse case is being investigated and should you wish to provide or require any further information, that team would be the best to contact.

Please contact them at ec2-abuse@amazon.com.

I hope that this is helpful.

Thank you for your inquiry. Did I solve your problem?

If yes, please click here:

http://www.amazon.com/gp/help/survey?p=A3DTXBBD5H1UEV&k=hy

If no, please click here:

http://www.amazon.com/gp/help/survey?p=A3DTXBBD5H1UEV&k=hn

Best regards,

[redacted]

http://aws.amazon.com

I responded as follows:

Hi,

I am actually waiting for response from them. I have been waiting for over half a day now. Can you please rush them. I need to know who is behind the attacks (which Amazon customer) and who in Amazon deals with this case.

I also followed up with the other team:

I have been waiting for a response for nearly a day now and it seems like stonewalling. If you do not reply by the end of that day, I may pursue legal action against Amazon, whose facilities are being used against my site while Amazon remains unhelpful and unresponsive.

It turns out, in the mean time, that the EPO uses AWS and some suggest that I report the latest DDOS attacks to the FBI (where the server IPs are based).

Update #5 (30/6/2015): Still no real progress. It has been a long time since the second attack and Amazon gives plenty of reasons to take legal action.

I apologize for the late reply on this. If you could please respond with your abuse case number, I would be happy to reach out to the team on your behalf to expedite the process!

Let us know if you have any other questions or concerns. Thanks!

Thank you for your inquiry. Did I solve your problem?

If yes, please click here:

http://www.amazon.com/gp/help/survey?p=A31TVRCH796UWU&k=hy

If no, please click here:

http://www.amazon.com/gp/help/survey?p=A31TVRCH796UWU&k=hn

Best regards,

[redacted]

http://aws.amazon.com

This was a useless respond, so I gave the reference number:

EC2 Abuse Report [55464910873]

I expect a reply by the end of the day.

Hello Roy,

I hope this email finds you well.

In the event that you have not provided your abuse case number for us to follow up for you on, please kindly reply directly to ec2-abuse@amazon.com. I can see that you have been corresponding to aws@amazon.com.

Please include the abuse report number you wish to address in the subject line of your email.

I hope this helps.

Thank you for your inquiry. Did I solve your problem?

If yes, please click here:

http://www.amazon.com/gp/help/survey?p=ARC3CZ1A921WW&k=hy

If no, please click here:

http://www.amazon.com/gp/help/survey?p=ARC3CZ1A921WW&k=hn

Best regards,

[redacted]

http://aws.amazon.com

So Amazon failed to send the detailed requested by the end of yesterday, just wasting more time with a useless reply again. I sent the following more strongly-worded reply:

Hi,

I have received not one but two absolutely useless (lacking substance of any kind) replies from you. You wasted more time instead or responding to my message which said:

———-
I have been waiting for a response for nearly a day now and it seems
like stonewalling. If you do not reply by the end of that day, I may
pursue legal action against Amazon, whose facilities are being used
against my site while Amazon remains unhelpful and unresponsive.
———-

If you do not respond in the next few hours with names of people at Amazon who deal with this case (EC2 Abuse Report [55464910873]) and the identity of the offending account that has been attacking my site on numerous occasions, I will prepare a lawsuit against you, Amazon, first for launching DDOS attacks from your servers and second for not obeying my request to know who is attacking my site. I may, additionally, contact the FBI to investigate, as the IP addresses in question are based in the US and DDOS attacks are a federal crime. I give you 2 hours from now to respond to my original request.

Real-time Posts



Retrieval statistics: 23 queries taking a total of 0.415 seconds • Please report low bandwidth using the feedback form
Original styles created by Ian Main (all acknowledgements) • PHP scripts and styles later modified by Roy Schestowitz • Help yourself to a GPL'd copy
|— Proudly powered by W o r d P r e s s — based on a heavily-hacked version 1.2.1 (Mingus) installation —|