CIRA (The organization that runs the .ca namespace) also has a checker for the malware:
http://www.cira.ca/news/news-releases/d ... r-checker/Basically there is a list of known infected computers (because all the infected ones have been
accessing the proxy servers and could thus be logged) so when you access the site it checks
against the list of IPs that known infected computers are at. Basically it doesn't really "scan"
anything per se, it just check if you are on the "known infected" list.
As expected my computer comes up clean, probably helps that I run a hardware firewall/NAT,
turn off java for most of my web browsing (the main exception I make is for goolge sites
like youtube or google groups or if I go to archive.org), never open attachments, and never
install all those plug ins that some sites want you to.
Of course I occasionally found that a link I follow from coinflation to a news site takes me to
an error page, took me a while before I figured out it was from java being turned off, it looks
more like their server is down. I eventually found a more roundabout way of viewing the
article text without turning on java. A few extra steps are involved, if anyone wants to know
what I do just ask. Ironically the process I take keeps me from seeing the ads on their site,
had they just used normal HTML and put the ads in GIFs (animated or still) I could avoid the
extra steps and their ads would get seen. Can you say marketing backfire?