Well...neat to ME, folks like Skuzzy obviously already know this. A smear site deriding Palin showed up, which at first glance, would seem to be from a right-wing anti-gay group. Then the guy from LGF started following the link backwards:
http://www.sarahpalingayrights.com/blah, blah, then at the end:
Sarah Palin’s veto gave gays the same rights as married couples in Alaska.
A vote for McCain/Palin is a vote for gay marriage.
I don't really care about the gist of this either way, but here's where the neat stuff starts:
(From LGF)
Interesting. There’s nothing else on the page. This sure looks like the work of the dastardly right-wing anti-gay attack machine, doesn’t it?
But look who’s really behind this.
In the Linux console, if you enter the following commands, you can learn the secrets of a political dirty trick. First, look up the host of ‘sarahpalingayrights.com’ to get the site’s IP address.
host sarahpalingayrights.com
sarahpalingayrights.com has address 74.208.74.232
Then use the same command to look up the domain name pointer of that IP address.
host 74.208.74.232
232.74.208.74.in-addr.arpa domain name pointer obamadefense.com
Well, well. “Obamadefense.com,” eh?
And what happens if you enter obamadefense.com on your browser’s address line?
Why, you’re redirected to none other than FightTheSmears.com, the official Barack Obama site that’s supposed to be defending him against smears.
Looks like they may have a second purpose: to generate a few smears of their own.
Intardnet is neat stuff