Spam

Giving Your Greytrapping a Helping Hand 109

Peter N. M. Hansteen writes "Some spam houses have invested in real mail servers now, meaning that they are able to get past greylisting and even content filtering. Recently Peter Hansteen found himself resorting to active greytrapping to put some spammers in their place. The article also contains a list of spam houses' snail mail addresses in case you want to tour their sites."
The Internet

Canadian ISPs Speak Out Against Net Neutrality 213

Ars Technica reports on a proceeding being held by the Canadian Radio-television and Telecommunications Commission regarding net neutrality. They requested comments from the public as part of the debate, and several Canadian ISPs took the opportunity to explain why they think it's a bad idea. Quoting: "One of the more interesting responses came from an ISP called Videotron, which told the CRTC that controlling access to content ... 'could be beneficial not only to users of Internet services but to society in general.' As examples of such benefits, Videotron mentioned the control of spam, viruses, and child pornography. It went on to suggest that graduated response rules — kicking users off the 'Net after several accusations of copyright infringement — could also be included as a benefit to society in general. ... Rogers, one of Canada's big ISPs, also chimed in and explained that new regulations might limit its ability to throttle P2P uploads, which it does at the moment. 'P2P file sharing is designed to cause network congestion,' says the company. 'It contributes significantly to latency, thereby making the network unreliable for certain users at periods of such congestion.'"
Spam

Facebook Vs. Spammers, Round Two 57

An anonymous reader writes "Three months after being awarded $873 million in a lawsuit against Atlantis Blue Capital for violating the CAN-SPAM Act of 2003, Facebook earlier this week filed a federal complaint against 'Spam King' Sanford Wallace in San Jose District Court. Las Vegas night club manager Adam Arzoomanian and Scott Shaw are also named as defendants in the suit." These filings do not mark the first time Wallace has faced legal action; last May, MySpace won a $230 million judgment against him.
Privacy

Privacy In the Age of Persistence 120

Bruce Schneier recently wrote another essay on privacy for the BBC concentrating on how data seems to be the "pollution of the information age" and where this seems to be leading. "We're not going to stop the march of technology, just as we cannot un-invent the automobile or the coal furnace. We spent the industrial age relying on fossil fuels that polluted our air and transformed our climate. Now we are working to address the consequences. (While still using said fossil fuels, of course.) This time around, maybe we can be a little more proactive. Just as we look back at the beginning of the previous century and shake our heads at how people could ignore the pollution they caused, future generations will look back at us — living in the early decades of the information age — and judge our solutions to the proliferation of data."
The Courts

Use Your iPhone To Get Out of a Ticket 291

An anonymous reader writes to tell us that Parkingticket.com just announced new compatibility with the Safari web browser on Apple's iPhone, giving you new tools to immediately contest a parking ticket. The site is so confident in their service that if all steps are followed and the ticket is still not dismissed they will pay $10 towards your ticket. "The process begins by navigating the iPhone's Safari browser to the Parkingticket.com website where you'll find a straightforward means to fight a parking ticket; whether the ticket was issued in New York City, San Francisco, Boston, Philadelphia or Washington, D.C. Simply register for a free account and choose the city in which the ticket was issued. Enter your ticket and vehicle details then answer a few quick questions. The detailed process takes about ten minutes, from A-Z. To allow easy entry of your ticket, a look-a-like parking ticket is displayed — for your specific city — with interactive functionality."
The Internet

The Chinese (Web Servers) Are Coming 231

Glyn Moody writes "The February 2009 Netcraft survey is not the usual 'Apache continues to trounce Microsoft IIS' story: there's a new entrant — from China. 'This majority of this month's growth is down to the appearance of 20 million Chinese sites served by QZHTTP. This web server is used by QQ to serve millions of Qzone sites beneath the qq.com domain.' What exactly is this QZHTTP, and what does it all mean for the world of Web servers?"
Security

Hackers Jump On Newest IE7 Bug 162

CWmike writes "Attackers are already exploiting a bug in Internet Explorer 7 that Microsoft patched just last week, security researchers warned today. Although the attacks are currently in 'very, very small numbers,' they may be just the forerunner of a larger campaign, said Trend Micro's Jamz Yaneza. 'I see this as a proof-of-concept,' said Yaneza, who noted that the exploit's payload is extremely straightforward and explained that there has been no attempt to mask it by, say, planting a root kit on the victimized PC at the same time. 'I wouldn't be surprised to see this [exploit] show up in one of those Chinese exploit kits,' he added. The new attack code, which Trend Micro dubbed 'XML_Dloadr.a,' arrives in a spam message as a malicious file masquerading as a Microsoft Word document."
Spam

Verizon.net Finally Moving Email To Port 587 195

The Washington Post's Security Fix blog is reporting that Verizon, long identified as the largest ISP source of spam, is moving to require use of the submission port, 587, in outbound mail — and thus to require authentication. While spammers may still be able to relay spam through zombies in Verizon's network, if the victims let their mail clients remember their authentication credentials, at least the zombies will be easily identifiable. Verizon pledges to clean up their zombie problem quickly. We'll see.
Privacy

Ontario Court Wrong About IP Addresses, Too 258

Frequent Slashdot contributor Bennett Haselton comments on a breaking news story out of the Canadian courts: "An Ontario Superior Court Justice has ruled that Canadian police can obtain the identities of Internet users without a warrant, writing that there is 'no reasonable expectation of privacy' for a user's online identity, and drawing the analogy that 'One's name and address or the name and address of your spouse are not biographical information one expects would be kept private from the state.' But why in the world is it valid to compare an IP address with a street address in the phone book?" Read on for Bennett's analysis.
Hardware Hacking

Stop-Motion Modbook Upgrade Video 14

Brian Northway writes "This funny, stop-motion, photo-animated video shows the process of converting an Apple MacBook to an Axiotron Modbook tablet, in one minute and fifty-nine seconds — viewable in standard quality or high-definition (720p), for exceptional detail. It's the latest installment a series of light-speed technical videos that I've created, wihich include the explorational disassembly of a PSP-3000, a unibody MacBook Pro, a MacBook Air, an iPhone, and many other Apple devices."
Spam

KnujOn Updates Top 10 Spam-Friendly Registrars List 80

alphadogg writes "Some companies are more popular than others for spammers wanting to register their domain names. Spam-fighting organization KnujOn has updated its report on the top 10 registrars whose customers are linked to spam and other illicit activity. (We discussed the original report last year.) These 10 companies registered 83% of the domains spammed in KnujOn's sample of spam between June and January. KnujOn found that some companies have cleaned up their act in recent months and that others — most surprisingly, Network Solutions and GoDaddy sister company Wild West domains — have popped up on the list. At the top of KnujOn's list, for the second time in a row, is Xinnet.com, a Chinese registrar linked to more than 3 million spam messages. KnujOn recommends that ICANN threaten to pull Xinnet's accreditation, as it did for some of the offenders on the previous list."
Government

Could Fake Phishing Emails Help Fight Spam? 296

Glyn Moody writes "Apparently, the US Department of Justice has been sending out hoax emails to test the security awareness of its staff. How about applying a similar strategy to tackling spam among ordinary users? If fake spam messages offering all the usual benefits, and employing all the usual tricks, were sent out by national security agencies around the world, it would select precisely the people who tend to respond to spam. The agencies could then contact them from a suitably important-looking government address, warning about what could have happened. Some might become more cautious as a result, others will not. But again, it is precisely the latter who are more likely to respond to further fake spam messages in the future, allowing the process to be repeated as often as necessary. The system would be cheap to run — spam is very efficient — and could use the latest spam as templates."
Windows

If Windows 7 Fails, Citrix (Not Linux) Wins 638

Julie188 writes "Microsoft blogger Mitchell Ashley, who has been using Windows 7 full-time, predicts that Windows 7 will fail to lure XP users away from their beloved, aging operating system — after all, Windows 7 is little more than what Vista should have been, when it shipped two years ago. But eventually old PCs must be replaced and then we'll see corporations, desperate to get out of the expense of managing Windows machines, get wise. Instead of buying new Windows 7 PCs, they could deliver virtualized XP desktops to a worker's own PC and/or mobile device. Ashley believes that Citrix's Project Independence has the right idea."
The Internet

YouTube To Allow Self-Serve Ads For Major Media Players 115

thefickler writes to tell us that YouTube plans on raising revenue by allowing major media players to run their own ads on the video site for, not only their own content, but illegally uploaded content by other users. "The site says CBS is already on board for the scheme, with other giants expected to join. The scheme will allow TV, movie and music companies to upload content and then sell advertising themselves, for example through images or animations which are overlaid on suitable sections of the clips. YouTube will then take a cut of this advertising revenue."
Spam

Despite Gates' Prediction, Spam Far From a Thing of the Past 198

Slatterz writes "Bill Gates declared in 2004 at the World Economic Forum in Switzerland that spam would be 'a thing of the past' within five years. However, Graham Cluley, senior technology consultant at Sophos, has written in a blog post that 'with the prophecy's five-year anniversary approaching, spam continues to cause a headache for companies and home users.'"

Generational Windows Multicore Performance Tests 228

snydeq writes "Windows XP, Windows Vista, and (soon) Windows 7 all support SMP out of the box, but as InfoWorld's Randall Kennedy notes, 'experience has shown that multiprocessing across discrete CPUs is not the same thing as multiprocessing across integrated cores within the same CPU.' As such, Kennedy set out to stress the multiprocessing capabilities of Windows XP, Windows Vista, and Windows 7 in dual-core and quad-core performance tests. The comprehensive, multiprocess workload tests were undertaken to document scalability, execution efficiency, and raw performance of workloads. 'What I found may surprise you,' Kennedy writes. 'Not only does Microsoft have a firm grasp of multicore tuning, but its scalability story promises to keep getting better with time. In other words, Windows Vista and Windows 7 are poised to reap ever greater performance benefits as Intel and AMD extend the number of cores in future editions of their processors.'"

GPUs Used To Crack WiFi Passwords Faster 189

MojoKid writes "Russian-based ElcomSoft has just released ElcomSoft Wireless Security Auditor 1.0, which can take advantage of both Nvidia and ATI GPUs. ElcomSoft claims that the software uses a 'proprietary GPU acceleration technology,' which implies that neither CUDA, Stream, nor OpenCL are being utilized in this instance. At its heart, what ElcomSoft Wireless Security Auditor does is perform brute-force dictionary attacks of WPA and WPA2 passwords. If an access point is set up using a fairly insecure password that is based on dictionary words, there is a higher likelihood that a password can be guessed. ElcomSoft positions the software as a way to 'audit' wireless network security."

Slashdot Top Deals