As many have pointed out, the blog post does not offer sufficient detail, but does offer the rather sensational headline "SQL injection attack claims 132,000+". The Google Safe Browsing diagnostic page for 318x.com has it closer to 1200 or so:
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, 318x.com appeared to function as an intermediary for the infection of 1202 site(s) including 37y.org/, jxagri.gov.cn/, glojj.com/.
Has this site hosted malware?
Yes, this site has hosted malicious software over the past 90 days. It infected 1269 domain(s), including 37y.org/, cec.org.cn/, jxagri.gov.cn/.
I recently had the exact same question. After an exhaustive search, I found these guys who specialize in ESD control packaging:
I ordered their 37305 In-Plant Handler (which accommodates up to forty 3.5" hard drives and PCI cards beautifully) from these guys (the only ones I could find who would ship outside the continental U.S.):
I swap hard drives / PCI cards regularly and am very happy with this solution.
Not sure why this was modded down - very important point. Why was an entire site by volunteers simply shuttered with no time to move the donated content elsewhere? It was a goldmine of anti-malware tips and techniques generously given by hundreds, if not thousands, of users over the years. Geeks (even more than most people perhaps) generally abhor having to figure something out that has already been solved. It is simply a waste of brain power (which God knows is in rather short supply). Now with this repository of valuable information gone, much of it will have to be solved anew unless archives can be found.
I am a very occasional (though appreciative!) user of Nmap, but after reading this:
So I dumped the potential publisher and added the screen shots anyway
I immediately bought a copy via the Amazon link. Fyodor, well done, sir!
To err is human, to moo bovine.