Wednesday, November 07, 2007 was hacked! and Unhacked!

Updates: (9th Nov 2007)
The so-called hacked blog of JohnCow is just a little joke as claimed by the owner to get the message of the importance of backing up the blog site. Do you find this joke amusing? Self-hacking own blog?

I would say this joke went too far and over the board in the spirit of blogging. I believe there are better ways to send the message rather than faking an own hacked site. There should be some lines of ethics or code of conducts that each blogger should adopt in this blogsphere.


One of the well known blog site, JohnCow was hacked and held ransom by a/some hacker/s. A message was left on the home page read as:

"This blog is hacked. If we do not receive $100 in 24 hours, Cow gets well done!!!"

A PayPal button was also inserted on the page for JohnCow to pay the ransom. Hey, is this a real hacking case or just a prank to generate more traffic? Just wait and see.

Screencaptured from

How to prevent your blog from being hacked?
Blogging Mix listed a few tips on how to prevent your blogger blog from being hacked:
  • Keep Your Personal Information Private
  • Avoid Using One Password For All Accounts You Create
  • Use 'Alpha-Numeric' Passwords
  • Don't Use a Password That Can be Found on Your Blog
  • Avoid Using Public Computers
  • Set Your Browser According to Your Preferred Security Level
  • Use Anti-Virus Softwares on Your Computer
  • Register and Use Your Own Domain Name
  • Always Back-up All Your Post / Content
For Wordpress user, has an article too on some steps to secure the wordpress.

Technical hackz and tricks has gone even further with a lengthy post on:
  • Step-by-step repair after a website hack
  • What to do BEFORE your website is hacked, so it doesn't get hacked
  • How to know if you've been hacked

Callender Create Blogs suggested to make sure the domain is being LOCKED. provide 7 steps in a very interesting post on how to recover your hacked blog or site:
  • Regain access or control to your site
  • Restore files and database from a backup
  • Restore missing information
  • Locate the vulnerability
  • Eliminate the vulnerability
  • Do a sweep for suspicious files
  • Monitor site activity

Tech Tags:

No comments: