Category Archive 'Software'
28 Apr 2007

Tracking Down Spammers

, , , ,

Internetnews:

Some of the worst spammers in the United States could be in for a rude surprise shortly, as Unspam Technologies has taken the first steps in tracking them down, with help from the ISPs.

The company filed a lawsuit yesterday in the Eastern District of Virginia seeking the identities of spammers under the U.S. CAN-SPAM Act and the state of Virginia’s own anti-spam statute. The suit seeks damages that could potentially reach $1 billion, but Unspam said it would be happy with driving spammers out of business.

The idea of suing spammers may seem as ludicrous as suing God; where do you deliver the subpoena? But Jon Praed, the lawyer on the case, founding partner of the Internet Law Group and one of the top lawyers involved in spam suits, said not to think that way.

“We cannot fight them by treating them as if they are everywhere, because it lulls us into a false acceptance of the inevitability of the outcome,” he told internetnews.com. “If we focus on what they are using or make it hard to use those tools, we’re going to beat them. We are not fighting Acts of God, we are fighting criminal acts.”

Unspam’s secret for dealing with these non-deities? Project Honey Pot, a trap for spammers. Spammers use crawlers to crawl through every page on a Website for valid e-mail addresses, and then add these addresses to their database.

Any Website operator can download the Honey Pot software and it will set up a dummy page that gives a fake, unique e-mail address to the crawlers. When spam comes in to that unique address, it’s a double gotcha; both the IP address of the crawler that harvested the fake e-mail address is known, and Honey Pot also scores the IP address of the sender of the spam.

As a result, Honey Pot has collected 2.5 million IP addresses of spam senders and 15,000 IP addresses of crawlers. Now comes the one-two punch. The company has released what it calls the http:BL, a blacklist of the 2.5 million compromised computers.

Most spam today is sent out by a compromised computer with a zombie, or bot (define) installed on the computer. The users of these computers almost always have no idea they are compromised, because they have no antivirus software installed to stop such infection in the first place.

Well, with the http:BL they will find out. The blacklist can be installed on any Apache-based Website, so when one of the 2.5 million IP address with a botnet running on them visits that site, the site can deny them access to the home page and inform the user of their infection.

Punch number two is for the 15,000 IP addresses of crawlers. Those are the people collecting and selling e-mail addresses. Harvesting is a slow process and botnets are expensive to rent by the hour, so the spammers do it themselves, on their own computers with a constant connection, since one is needed.

Gotcha, said Matthew Prince, CEO of Unspam and Project Honey Pot. “Those will be some of the first targets from this litigation,” he said. “We’ve identified very specific targets. In some cases have a good sense of who these people are. Then we can bring the full weight of the law down on these people who are breaking it.”

The worst offender for spam crawlers is the U.S., with 22.7 percent of harvesting coming from U.S. IP addresses. Romania is second and Japan is third, both with less than ten percent of the harvesting addresses.

The lawsuit grants subpoena power, which the ISPs wanted. …

Russia has the bad reputation for spam and viruses, but Prince said there is a delineation between spam of U.S. and foreign origin. “I would say that in terms of selling physical products, anything that has to be shipped, they tend to be here. Mortgage types are here too. The ones in other countries are committing straight fraud, like the Nigerian princes or fake bank account,” he said. …

Praed doesn’t expect to squash all spammers but he does hope to make life rotten for a lot of them. “We don’t have to catch them. We just have to make it so costly for them that they move on,” he said. “We know we have limited resources and it’s one lawsuit, but we realize acts of spam are not like Acts of God. By targeting the case on the worst of the worst we think we can have an impact.”

Complete article

10 Apr 2007

Face Morphing Fun

, ,


Anime JDZ – How’d I get those bangs? And why are my eyes that weird color? Doesn’t look like a proper Bishōnen to me.

Ever wonder what you’d look like young, old, Caucasian, African, Oriental, an anime hero, or a member of the opposite sex, insert a photo image of yourself at this University of St. Andrews Perception Laboratory site, and morph away

Hat tip to Karen L. Myers, and GMSV, where she found it.

14 Mar 2007

Volokh Conspiracy Hijacked by Trojan

, , , , , , ,

Last Saturday, I clicked on an Instapundit link to a Volokh posting, and got the traditional MS Explorer negative page-not-found response.

The page cannot be displayed

The page you are looking for is currently unavailable. The Web site might be experiencing technical difficulties, or you may need to adjust your browser settings.

Even important blogs have technical difficulties, so I simply shrugged and made a mental note to try again later.

But when the problem was still there on Monday, I concluded there was more to this than meets the eye.

About a year ago, my personal computer was infected by a Trojan, which exploited one of those only-too-numerous Microsoft vulnerabilities. It was the sort of thing which hijacks your computer to send out thousands of replications of itself covertly, degrading system performance significantly in the process.

I would never have known it was there, but for the fact that I could no longer log into Norton to update my antivirus software. The Trojan wrote to my Host file instructions directing all prominent antivirus website addresses to a dead address.

Wikipedia discusses this kind of hijacking technique in its Host file entry.

Further investigation established that my wife’s notebook was blocked from Volokh Conspiracy by the same malware. But a friend in California last night was not impacted by this problem.

I don’t recall exactly which file needs to be edited, but I can tell you that correcting this kind of problem is a lot of work. One has to turn off System Restore, reboot the computer in Safe mode, then edit the Registry to get rid of the illicit Host file entry. Entering Safe Mode is a bummer for me, because it will mess up all the icons on desk top, producing even more work sorting them all out again.

Would readers please check to see if they can link to Volokh Conspiracy, and tell me via email, or in Comments here, if they are also experiencing the same problem?

30 Jan 2007

Vista and Office 2007 Available Today

, , , , , ,

Microsoft announces the release of new versions of its flagship products.

Preston Galla of PC Word has 15 reasons to switch to Vista.

But Mike Elgan of Computerworld has some compelling arguments as to why you should wait to get Vista already installed on your next PC, or just switch to a MAC.

13 Jan 2007

Software For Starving Students

, ,

Good collection of Open-Source downloads.

link

Hat tip to John Murrell.

03 Oct 2006

Doodle

, ,

Extremely cool 3-D drawing program.

DOODLE

—————————

Hat tip to John Murrell.

16 Aug 2006

Greatest Software Ever Written

, ,

Charles Babcock, at Information Week, picks the dozen greatest pieces of software ever written. His choices were:

1. Unix

2. IBM System R

3. gene-sequencing software at the Institute for Genomic Research

4. IBM System/360

5. Java

6. Mosaic

7. Sabre system

8. First Mac Operating System

9. Excel spreadsheet

10. Apollo Guidance Computer

11. Google search rank

12. Morris worm

Somehow or other, he overlooked Castle Wolfenstein and Doom.

31 Jul 2006

Vista Voice Recognition Demo Goes Awry

, , , , ,

Failed demos are really embarassing, aren’t they?

Ambient noise? what ambient noise??

29 Jul 2006

That’s One Reason I Stopped Using It

, , ,

David DeJean has a few user complaints about a nightmare installation.

But for a truly epic installation, I have to give the Oscar for Best Drama to Symantec’s Norton Internet Security upgrade. I just went through it not once, but twice. It is longer than the death scene from “Camille,” and more emotionally draining. Is it going to start? Do I have enough disk space? What is it doing now? Will it ever, ever, ever end?

Finally, of course, it does end. And it’s not a good end, either, because for unknown reasons the laptop I was upgrading lost its scanner drivers and the upgrade cut me off from my wireless network. And all this entertainment for only $49.95! What a bargain!

20 May 2006

Satellite View Programs

, ,

Most people have probably already experienced the joys of playing with Google Earth and Windows Live Local. NASA is now offering another really cool satellite imaging program, with add-ons for Mars, the Moon, and the Night Sky. Go to: NASA World Wind, and download. Don’t forget the add ons.

Your are browsing
the Archives of Never Yet Melted in the 'Software' Category.
/div>








Feeds
Entries (RSS)
Comments (RSS)
Feed Shark