The Internet

uSocial Sells Twitter Followers By the Thousand 118

bfire writes to tell us that marketing firm uSocial has decided to apply a new monetization scheme to the Twitter service by providing packages of followers for purchase. "According to the firm, a single Twitter follower could be worth $0.10 a month. It is selling followers in various packages, starting at 1,000 for $87, which is delivered in seven days, and going all the way up to 100,000 followers at a cost of $3,479, delivered over a year." This is just the latest in a number of different exploits and problems of the Twitter universe as individuals try to subvert a popular tool into a self-serving device.
Communications

A Look At Google's Email Spam Prevention 176

CNet has a story about the security measures Google employs to protect their email systems and fight the never-ending war on spam. Their Postini team, acquired two years ago, has a variety of monitoring tools and automated response systems to find and block undesirable messages. Quoting: "The system scores each message on numerous combinations of criteria, assigning a weight to each and then comparing the score to those in a database of several hundred thousand message types that have been flagged as good or bad from Postini honey pots and customer spam reports. ... To block fresh spam attacks not covered by existing heuristic technologies and viruses not covered by existing signature databases Postini relies on proprietary Zero-Hour technology to identify new outbreaks that show up in the traffic patterns and quarantine them for later rescanning. Customers can also create and build out their own white lists of message senders they trust and blacklist others they don't trust. It takes an average of 150 milliseconds for a message to be scanned by the antivirus engines that Postini licenses from McAfee and Authentium.
Spam

Fake Tamiflu "Out-Spams Viagra On Web" 65

cin62 writes "The number of Internet scammers offering fake versions of the anti-swine flu drug Tamiflu has surpassed those selling counterfeit Viagra, reports CNN. Since the H1N1 virus, also known as swine flu, was declared a global pandemic last month, there has been an increase in the number of Web sites and junk emails offering Tamiflu for sale. 'Every Web site that used to sell Viagra is now selling Tamiflu. We are pretty sure that the same people are making the Tamiflu as are making the Viagra,' said Director of Policy for the UK's Royal Pharmaceutical Society." This news fits in nicely with a report Wired ran a couple weeks ago about the hysteria behind H1N1.
Communications

SolarNetOne Wants Stable Internet Connections For Developing Nations 73

There are many initiatives to bring tech to developing areas of the globe; things like OLPC, Geekcorps, and UN programs. One new approach from SolarNetOne strives to allow users in those developing areas to have access to an internet connection without having to depend on unreliable infrastructure. "Each SolarNetOne kit is a self-powered communications network. Energy is produced from a solar array sized to each locale's latitude and predominant weather conditions. The generated power is stored in a substantial battery array, and circuit breakers and electronics protect the gear from overloads and other perturbations. A basic kit includes five 'seats,' implemented as thin clients connected through a LAN to a central server. The networking gear also includes a long-range, omnidirectional WiFi access point, and a Session Initiation Protocol (SIP) device. Each kit also includes all the cables and wires required to assemble the system, so few additional materials are required for an installation."
Privacy

Lenovo Software Update Stealthily Installs Adware 186

An anonymous reader writes "A recent Lenovo automatic software update has the great feature of displaying annoying pop-up ads for Lenovo products. What's worse, it appears that many users are unable to turn the advertisement 'feature' off, subjecting them to pop-ups every couple of hours. Gee guys, a note about your 20% off sale in my e-mail wouldn't have bothered me that much, but you really had to pop up over top of my PowerPoint slides? I'm sure that all of my office colleagues will be running to order ThinkPads ..."
Encryption

IBM Claims Breakthrough In Analysis of Encrypted Data 199

An anonymous reader writes "An IBM researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called 'privacy homomorphism,' or 'fully homomorphic encryption,' makes possible the deep and unlimited analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality." Reader ElasticVapor writes that the solution IBM claims "might better enable a cloud computing vendor to perform computations on clients' data at their request, such as analyzing sales patterns, without exposing the original data. Other potential applications include enabling filters to identify spam, even in encrypted email, or protecting information contained in electronic medical records."
Spam

The Imminent Demise of SORBS 290

An anonymous reader lets us know about the dire straits the SORBS anti-spam blacklist finds itself in. According to a notice posted on the top page, long-time host the University of Queensland has "decided not to honor their agreement with... SORBS and terminate the hosting contract." The post, signed "Michelle Sullivan (Previously known as Matthew Sullivan)," says that the project needs either to "find alternative hosting for a 42RU rack in the Brisbane area of Queensland Australia" or to find a buyer. Offers are solicited for the assets of SORBS as an ongoing anti-spam service — it's now handling over 30 billion DNS queries per day. An update to the post says "A number of offers have already been made, we are evaluating each on their own merits." Failing a successful resolution, SORBS will cease operations on July 20, 2009 at 12 noon Brisbane time. Such a shutdown could slow or disrupt anti-spam efforts for large numbers of mail hosts worldwide.
Spam

Has Google Broken JavaScript Spam Munging? 288

Baxil writes "For years now, Javascript munging has been a useful tool to share email addresses on the Web without exposing them to spammers. However, Google is now apparently evaluating Javascript when assembling summary text for web pages' listings, and publishing the un-munged email addresses to the world; and spammers have started to take advantage of this kind service." Anyone else seen this affecting their carefully protected email addresses?
Spam

Spammer Alan Ralsky Pleads Guilty 144

Czmyt sends the excellent news that one of the US's most notorious spammers has pleaded guilty and could serve 6 years in jail. "Five individuals pleaded guilty today in federal court in Detroit for their roles in a wide-ranging international stock fraud scheme involving the illegal use of bulk commercial e-mails, or 'spamming'... Alan M. Ralsky, 64, of West Bloomfield, Mich., and Scott K. Bradley, 38, also of West Bloomfield, both pleaded guilty to conspiracy to commit wire fraud, mail fraud and to violate the CAN-SPAM Act. ... Ralsky and Bradley also pleaded guilty to wire fraud, money laundering, and violating the CAN-SPAM Act. Under the terms of his plea agreement, Ralsky acknowledges he is facing up to 87 months in prison and a $1 million fine..."
The Internet

Weather Balloons To Provide Broadband In Africa 179

An anonymous reader writes "Two African entrepreneurs have secured exclusive access to market near-space technology — developed by Space Data, an American telecommunications company — throughout Africa. The technology raises hydrogen-filled weather balloons to 80,000 — 100,000 feet, which individuals contact via modems. The balloons, in turn, serve as satellite substitutes which can connect Africans to broadband Internet. 'Network operation centers are located close to a fiber optic cable — say, in Lagos or Accra — and a signal is sent back and forth to the [balloon] in near space,' says one of the entrepreneurs, Timothy Anyasi. The technology will also allow mobile phone operators to offer wireless modems to customers."
Image

Drupal 6: Ultimate Community Site Guide Screenshot-sm 63

Michael J. Ross writes "Among the more popular and better-regarded content management systems (CMSs), Drupal is distinguished partly by its building-block approach, in which a website's functionality is built up in pieces, each of which is a module (either core or contributed). The opposite approach — using far fewer but more encompassing modules — is generally preferred by non-developers who do not relish integrating a sizable collection of modules or trying to modify the underlying code. Nonetheless, anyone who wishes to build a Drupal-based social website, can learn how to do so in a new e-book titled Drupal 6: Ultimate Community Site Guide." Read below for the rest of Michael's review.
Security

New Denial-of-Service Attacks Threaten Wireless Data Networks 31

alphadogg writes "Forget spam, viruses, worms, malware, and phishing. These threats are apparently old-school when compared to a new class of denial-of-service attacks that threaten wireless data networks. The threats were outlined in a talk in NYC Thursday by Krishan Sabnani, vice president of networking research at Bell Labs, at the Cyber Infrastructure Protection Conference at City College of New York. Sabnani said they are the result of inherent weaknesses in Mobile IP, a protocol that uses tunneling and complex network triangulation to allow mobile devices to move freely from one network to another. 'We need to especially monitor the mobile networks — with limited bandwidth and terminal battery — for DOS attacks,' Sabnani said, adding that the newest DOS attacks on wireless networks involve repeatedly establishing and releasing connections. These attacks are easy to launch and hard to detect, he said."
Math

String Theory Predicts Behavior of Superfluids 348

schrodingers_rabbit writes "Despite formidable odds, condensed matter physicists have made a breakthrough most thought impossible — finding a practical use for string theory. The initial breakthrough was made by physicist and cosmologist Juan Maldacena. His theory states that the known universe is only a 2D construct in anti-de-Sitter space, projected into 3 dimensions. This theory manages to model black holes and quantum theory congruently, a feat that has eluded scientists for decades; but it fails to correspond to the shape of space-time in the known universe. However, it does predict thermodynamic properties of black holes, including higher-dimensional viscosity — the equations for which elegantly and almost exactly calculate the behavior of quark-gluon plasma and other superfluids. According to Jan Zaanen at the University of Leiden, 'The theory is calculating precisely what we are seeing in experiments.' Unfortunately, the correspondence cannot prove or disprove string theory, although it is a positive step." Not an easy path to follow: one condensed matter theorist said, "It took two years and two 1000-page books of dense mathematics, but I learned string theory and got kind of enchanted by it. [When the string-theory related] thing began to... make predictions about high-temperature superconductors, my traditional mainstay, I was one of the few condensed matter physicists with the preparation to take it up."
The Courts

FTC Shuts Down Calif. ISP For Botnets, Child Porn 224

An anonymous reader writes "The Federal Trade Commission has convinced a federal judge to pull the plug on a 3FN.net, a.k.a. 'Pricewert LLC,' a Northern California based hosting provider. The FTC alleges that 3FN/Pricewert was directly involved in setting up spam-spewing botnets, among other illegal activities, the Washington Post's Security Fix Blog writes. From the story: 'Pricewert hosts very little legitimate content and vast quantities of illegal, malicious, and harmful content, including child pornography, botnet command and control servers, spyware, viruses, trojans, phishing related sites, illegal online pharmacies, investment and other Web-based scams, and pornography featuring violence, bestiality, and incest.' The story quotes a former Justice Dept. expert saying the FTC action may be a smoke screen for a larger criminal investigation by the federal government in 3FN's activities."
Security

Testing So-Called 'Unified Threat Managers' 98

snydeq writes "The InfoWorld Test Center has released vulnerability testing results for four so-called 'unified threat managers' — single units that combine firewall, VPN, intrusion detection and prevention, anti-malware, anti-spam, and Web content filtering in lieu of a relay rack stuffed top to bottom with appliances. The lab threw nearly 600 exploits of known vulnerabilities in a wide range of popular OSes, applications, and protocols, and despite being designed to thwart such threats, the UTMs as a class allowed hundreds to pass through. Why did the UTMs miss so many exploits? A lack of horsepower to perform the necessary deep packet inspection under load is suspected, as the lab pushed the limits of each unit's throughput with legitimate traffic. 'The upshot is, although the vendors have packed these devices with additional gateway security functions, clearly many UTMs are still strictly firewalls at heart.'"
Graphics

Budget Graphics Card Roundup 186

Anonymous Coward writes "Not all of us are prepared to drop $500 for a killer graphics card. Generally, the sweet spot in price and performance is in the budget category of GPUs. Joel Durham Jr. over at ExtremeTech reviews nine current graphics cards, all of which are below $250, some below $150, to determine which cards are worth the time and money for the gamer on a budget. In the sub $150 category, the ATI Radeon 4770 performed the best for its price. Spend a little more and Joel recommends the GeForce 260."
The Courts

Unmasking Blog Commenters Not a Huge Threat To Freedom 105

Frequent Slashdot contributor Bennett Haselton writes with his take on a recent court decision about the rights of online commenters. "Although a court has ruled that the police can subpoena the identities of users who posted comments in a newspaper's blog, I think this is not as big of a threat to journalistic integrity as it might seem. And in any case when the judge ruled against the privacy rights of 'bloggers,' he didn't actually mean 'bloggers." Read on for the rest of Bennett's thoughts.
Bug

Skype Billing Gone Haywire For Some Users 154

Cousin Scuzzy writes "This morning I awoke to 26 e-mail messages from Skype and PayPal notifying me of multiple payments for my Skype account that had been charged to my credit card and subsequently refunded. At first I suspected that this was a new wave of spam that had slipped through my defenses, but it quickly became apparent that they were legitimate messages. I then began to worry that my Skype account had been compromised. The first message from Skype thanked me for setting up their "Auto-Recharge" service which automatically purchases Skype credit when the balance falls below a certain amount. This was very suspicious, as I had never requested this service. Based on posts to Skype's forum, it now appears that there have been serious billing problems at Skype relating to Auto-Recharge for over a month. Although I believe that all unauthorized charges to my credit card have been refunded, it is worrisome that Skype, or anyone, would charge my account erroneously. Skype, for their part, has not yet e-mailed me an explanation or posted one online. This problem reinforces my aversion to automatic bill payment services that give companies the authority to draw money from my bank account at their discretion." For all the Skype users out there, have you experienced this? For what it's worth, the company's own response on the linked forum thread says that the problem is now solved.
Image

Front End Drupal Screenshot-sm 68

Michael J. Ross writes "Content management systems (CMSs) are created largely by Web developers using back-end programming languages (such as PHP, by far the most common choice). The free CMSs are built as open source projects, by volunteers who have many demands on their time. As a result of both of these competing factors, far less time is devoted to the front-end aspects of these CMSs. In turn, the "themes" that define the appearance of a CMS-based website are typically substandard, in the eyes of many Web designers and, most likely, countless users of those sites. This criticism has been leveled even against Drupal, although the situation is improving. A new book, Front End Drupal: Designing, Theming, Scripting, is intended to help Drupal designers everywhere speed up that process of improvement." Read on for the rest of Michael's review.

A System For Handling 'Impostor' Complaints 165

Frequent Slashdot contributor Bennett Haselton writes "A woman sued Yahoo because they wouldn't remove a page created by her ex-boyfriend pretending to be her and soliciting strangers for sex. What would be an effective system for large companies like Yahoo to handle 'impostor' complaints, without getting bogged down by phony complaints and unrelated disputes? This is a harder problem than it seems because of the several possible cases that have to be considered. One possible solution is given here." Read on for Bennett's analysis.

Slashdot Top Deals