I'd like to add that the complete idiot behind this particular phishing effort hasn't even constructed the form properly.
Code:
<FORM NAME="Login" method="POST" action="www.emo-ett.si/done.php" onsubmit="javascript: return logintest(this);">
That will fail. He didn't include the "http://" in the "action" portion of the form tag, so it will look for a local file named "www.emo-ett.si/done.php", which doesn't exist.
Worse: he hasn't labeled his inputs, so there are five fields which aren't described, for which the phishing victim won't understand their expected values.
A true genius.
I'm reporting the phishing attack to the hosting company for emo-ett.si. Never hurts.
SiL