Has anybody had any luck confronting the jerks that are responsible
for this? Clearly, this is "hacking" - especially by today's new
standards, this may even be a kind of "terrorism"! I've looked inside
toolbar.dll with a hex editor - I would think that reverse-engineering
it would be trivial. It would seem that the folks who actually made
this thing are to be found at:
http://www.idownload.com
Check the WHOIS results:
Registrant:
iDownload.com
701 Brazos
Suite 500
Austin, TX 78701
US
800-844-5919
Domain Name: IDOWNLOAD.COM
Administrative Contact:
Management, Domain (e-mail address removed)
701 Brazos
Suite 500
Austin, TX 78701
US
800-844-5919
Technical Contact:
Management, Domain (e-mail address removed)
701 Brazos
Suite 500
Austin, TX 78701
US
800-844-5919
Record last updated 02-10-2004 12:32:38 PM
Record expires on 10-31-2004
Record created on 11-01-1998
Domain servers in listed order:
NS.WEBAIR.NET 216.130.161.1
NS2.WEBAIR.NET 216.130.161.6
And here is the isearch.com WHOIS results:
Registrant:
iSearch Internet
701 Brazos
Suite 500
Austin, TX 78701
US
866-845-6873
Domain Name: ISEARCH.COM
Administrative Contact:
Manager, Domain (e-mail address removed)
701 Brazos
Suite 500
Austin, TX 78701
US
866-845-6873
Technical Contact:
Manager, Domain (e-mail address removed)
701 Brazos
Suite 500
Austin, TX 78701
US
866-845-6873
Record last updated 04-06-2004 10:41:38 AM
Record expires on 10-05-2005
Record created on 10-06-1995
Domain servers in listed order:
NS.WEBAIR.NET 216.130.161.1
NS2.WEBAIR.NET 216.130.161.6
Looks like the same people to me.