Spambot Poisoner 187
halfelven writes: "Sugarplum, the anti-spambot fighting machine, is out! Quoting from their website: Sugarplum is an automated spam-poisoner. Its purpose is to feed realistic and enticing, but totally useless data to wandering spam-bots such as EmailSiphon, Cherry Picker, etc. The idea is to so contaminate spammers' databases as to require that they be discarded, or at least that all data retrieved from your site (including actual email addresses) be removed." I've seen this sort of thing before, but I just figured it's a fun thing to chat about on a holiday. It would be cool to put this on Slashdot some time: I bet I'm not the only Slashdot reader whose email address has been slurped.
Drop in the ocean (Score:1)
Do they even bother checking anyway? Don't they just trawl millions of things-that-look-like-email addresses, and sell them on CDs to the ****s that send the spams?
There's still bound to be far more valid email addresses than false ones trawled, anyway.
Re:Yuck! (Score:1)
Spam isn't just for meateaters anymore! (Score:1)
Um....maybe it's just me, but I haven't noticed any slow down from this type of refiling system, meant to filter unwanted spam. All I've noticed is an adaptation wherein the spam is more personal and harder to detect, thus making it more likely that I'll read one of these ridiculous suckers. Enough with the anti-spam....let's just spread the word that spamming causes impotence - that oughtta work.
P 2 P___H U M O R [mikegallay.com]
Re:Anti-Spam technique (Score:1)
Re:Or this: (Score:1)
Re:Get automatically sorted out (Score:1)
Personally, I always remove nospam from emails I'm trying to send... how would I know yours is genuine?
Andre060
Re: Spammers have evolved (Score:1)
You're obviously not paying attention. It was just explained how spammers may compile a list of valid addresses and you reply saying your address was sold? No it wasn't.
I highly doubt any reputable ISP, especially one the size of SW Bell, would ever sell the addresses of their user base.
--
Turn on, log in, burn out...
Re:Mirror Please... (Score:3)
Thanks for the attention, all. The freshmeat posting was quite managable, but slashdot's is more than the 128kbit outbound can handle. Asymmetric DSL sucks in a substantial number of ways.
aqua
(sugarplum's slashdotted author)
Re:Yuck! (Score:2)
Fascinating idea. Tell me though, what does invisible text sound like?
Is it also invisible in lynx?
How about collaborative wpoisoning? (Score:2)
It just might work.
Re:Speaking of spam... (Score:1)
Re:Spammers have evolved (Score:2)
Re:Teergrube (Score:2)
E-Mail is sent using SMTP. For this purpose a TCP/IP connection to the MX host of the recipient is established. Usually a computer is able to hold about 65500 TCP/IP
connections from/to a certain port. But in most cases it's a lot less due to limited resources.
If it is possible to hold a mail connection open (i.e. several hours), the productivity of the UBE sending equipment is dramatically reduced. SMTP offers continuation lines to hold a connection open without running into timeouts.
Only likely to work if you can force massive rfc 974 complience. Otherwise it's just another reason for spammers to prefer to use a third party (including ISP provided) relay.
Re:Anti-Spam technique (Score:1)
It still is cheaper to click BlockAddres in your Yahoo! account or make a rule in your Outlook
Re:Teergrube (Score:2)
Doubt it would stop ISP's providing their own third party relays. with some ISP business models there is little difference between the ISP machine and an open relay anyway.
spam pingpong (Score:1)
Re:Get automatically sorted out (Score:2)
Only if they are delivering their own mail. If they are using a relay they probably arn't going to care, since someone else will be getting the error messages
Re:Valid email addresses... (Score:2)
Then there's anything@spamcheck.bizland.com, where I can change 'anything' to the name of the site I'm giving it to (see my slashdot email), and later filter all mail coming to that address if it starts getting spammed.
--
Re:Poison? How about crasher? (Score:3)
I tend to think a spammer with an address database containing root@localhost [mailto], postmaster@localhost [mailto], abuse@localhost [mailto], root@localhost.localdomain [mailto], , [mailto]abuse@localhost.localdomain [mailto], root@[127.0.0.1] [mailto], postmaster@[127.0.0.1] [mailto], abuse@[127.0.0.1] [mailto], and uce@ftc.gov [mailto] wouldn't have too much fun before being kicked by his ISP.
Unfortunately, many spambots are probably intelligent enough to filter out the common variants of these...
Re:Great idea, but... (Score:1)
try variations of that name at various domains
uh. this is true, i've seen myself having multiple new e-mail addresses - of course they were only relayed through these odd servers but still... i'd like to nuke all spammers, as everybody else, but there's very little we can do right now. anyway, i didn't read the Sugarplum website but i'm heading there next..
Or this: (Score:2)
Teergrube (Score:5)
Blow the spammers away by stopping their tools:
From the Teergrubing FAQ: [iks-jena.de]
E-Mail is sent using SMTP. For this purpose a TCP/IP connection to the MX host of the recipient is established. Usually a computer is able to hold about 65500 TCP/IP connections from/to a certain port. But in most cases it's a lot less due to limited resources.
If it is possible to hold a mail connection open (i.e. several hours), the productivity of the UBE sending equipment is dramatically reduced. SMTP offers continuation lines to hold a connection open without running into timeouts.
A teergrube is a modified MTA (mail transport agent) able to do this to specified senders.
Read the full story in the Teergrubing FAQ: [iks-jena.de]
Re:I've got one of these running already. (Score:1)
Faked adresses & legitimate targets (Score:1)
I think except the approach mentioned in another posting to use several of my own subdomains to delay a spammer (30 MX x 30 A x 70 sec), there are the following legitimate targets to use as spam targets in your web pages:
Re:If a spam has a 1-800 number, call it a lot. (Score:1)
Re:Valid email addresses... (Score:2)
Problem here is the business model of allowing access before verification. But if this is what the "big boys" do then the mom & pops have to do the same to stay in business at all.
Re:Valid email addresses... (Score:1)
Re:Valid email addresses... (Score:1)
That reminds me... I recently set up a Hotmail account for the sole purpose of getting spam: I have never used it for anything except to send mail to a few places that have spammed me, replacing getrich@spammer.com (or whatever it was) with delete@spammer.com.
Interesting experiment, although I have to admit to being a bit disappointed -- I haven't received any spam yet!
Sadly, I get plenty of it sent to my real email address thanks to a misconfigured mailing list I'm on.
Re:Spammers cheat, this will not work (Score:2)
Using a your domain as a return address for spam strikes me as terribly unfair. It's a shame there are no existing laws to put folks who do that in jail.
I used to own "boy.com" many years ago and gave up the domain for similar reasons. There would be a ton of email forged with that as the return address. The last straw was possibly illegal porno being posted to USENET with "boy.com" as the hosting site (forged, of course.) Back then--in 1995-1996--I decided to get rid of it because I thought it may be impossible to convince authorities that we had nothing to do with those postings.
Fighting spammers using spamido techniques. (Score:1)
Sugarplum is an interesting idea but a better one is to use the spammers techniques against them. Turn their strengths into weaknesses.
A spammer looks for email addresses, and sugarplum goes some way to taking advantage of that fact by giving them crap addresses. Unfortunately it's fairly simple to check the validity of the domains and accounts.
A better solution is to give spammers valid email addresses which are aliased to a spamtrap account; This is a system account who's sole job is to receive spam. You then know that anyone who sends mail to this account is a spammer.
You now have information about who the spammers are and can use this information to block spam from real accounts.
This is all described on the Spamido web page [freeserve.co.uk] along with some procmail recipes which can be used to implement it.
Re:Mirror Please... (Score:1)
How hard would it to be for slashdot.org to provide a load-balancing mirror service? I'm thinking of a simple round-robin url-redirection to mirrors of potentially slashdotted sites.
So if I want to volunteer a mirror of a site referenced in an interesting slashdot thread I could submit it to slashdot.org with a maximum HPM ceiling so that my ISP wouldn't get bombed with excessive traffic.
This is nothing fancier than the typical web-farm distributed processing. I would be happy to offer *limited* bandwidth to mirror a site with relevant content. I just don't want to slashdot my own coop .
==============
(this post was spell-checked by OmniWeb - all grammatical errors are mine)
Re:Anti-Spam technique (Score:1)
Better than both: free and easy (Score:2)
--
Re: bots using a Mozilla user-agent string (Score:1)
These hosts generally don't read robots.txt, instead they start at www.yourdomain.com and follow all the links from there. Some of them are even stupid enough ti visit the same page multiple times if that page is reference from multiple pages on your site.
Probably the worst thing about these rogue web robots is that there is no way to identify and block them without having a daemon monitor the access logs in real time looking for this activity and adding the appropriate Deny rule to the config once a host is identified.
Re:Valid email addresses... (Score:1)
Re:My technique... (Score:2)
--
Valid email addresses... (Score:4)
And you've got to feel sorry for sweetp@dash.com!
address mangling (Score:2)
So the solution is: Get yourself a valid email address with "nospam" or the like in it - The spammers will do the work for you and exclude you from their lists.
That's something like reverse psychology for the spambots, isn't it?
Of course, if I were a spambot author, I'd include all sorts of regex's to de-mangle the most common forms of address mangling. With that in mind, I reason that the best course of action is to just mangle your address to the point that it doesn't look like one.
As an example, you may note that *my* slashdot email address has the @ and . enclosed in both braces and spaces. Any human would be able to demangle it to a vaild address, but spambots don't even see it. As an added bonus, the humans who email me don't have to decide which words of the address to delete, lessening the margin of error.
Re:Valid email addresses... (Score:3)
With the exception of psi.net, the rest actually do enforce their AUP.
The problem is, spammers will sign up about 50 accounts, many times using fake credit info, names and phone numbers. They do this on online signup pages for ISPs, usually the little mom and pop ones that don't do the immediate credit checks. They do this on Fri nights mostly. This way they have around till mon or tues before the accounts start getting whacked, problem is, in those few days, they can send millions of messages.
I have played whack a mole with hundreds of spammers at my previous job as an Abuse person at a very large ISP (will not name the backbone provider who is based in louden VA
Re:Anti-Spam technique (Score:3)
Well, this also has been posted many times...
Sneakemail.com [sneakemail.com] does all that for you without all that hassle.
Domain poisoning? (Score:4)
There are much better, older tools for this (Score:5)
His one actually generates addresses at subdomains of cooperating domains. These subdomains have special qualities - they typically have 30 MXs, and each MX host has 30 As. Every single one of the As will go to a host that doesn't exist, but is on a routable network. Given the timeout for opening TCP connections of 70 seconds, you can keep a spammer (or their third party relay) busy for 30 * 30 * 70 seconds, for a total of 63,000 seconds, or 17.5 hours.
I think Ron even has instructions on how to set one of these up.
Don't just pollute their database - make them (and the the queues at 3rd party relays who won't close up) spin their wheels for a day or so per address they scrape.
Re:Tall Hacking Tale (Score:2)
One thing that answers my first concern (the ability to make a screenshot) seems to be answered by the spammer's like of PC Anywhere. I thought of BO... but thought that installing the server would be unlikely at sudden notice. A misconfigured PC Anywhere session, though, would be usefull and fortunate for the attacker indeed!
Re:Spammers cheat, this will not work (Score:2)
A spamer hit my box and out of 23 messages only 6 were valid.
Re:Get automatically sorted out (Score:2)
Postmaster Alert? (Score:2)
Re:Valid email addresses... (Score:2)
Re:Poison? How about crasher? (Score:3)
Spammers have evolved (Score:2)
Re:My technique... (Score:2)
You just poisened your own method by posting those email addresses on slashdot. If a spambot finds them here, you'll think mp3.com sold or yahoo your e-mail address.
And yes spambots visit slashdot!! (so this program might be something they should use.)
Re:How about collaborative wpoisoning? (Score:2)
Re:Spammers have evolved (Score:2)
Not all MTA's will give a "user unknown" error. If the machine is not the final destination of the email it can't possibly know anyway.
Wpoison rocks (Score:3)
It does catch the spammers! I have seen spam harvesters sit there for days just going through page after page after page. And of course I just let it.
However, make sure you have your robots.txt set up properly. I made a goof in the original one I had set up and ended up doing quite a number on Web Crawler. With some help from their tech support staff I got that fixed pretty fast.
On a similar note: Email "Cloaking Device" (Score:2)
Before any content is served, it checks the User Agent; if it's a bot, it translates any MAILTO: links in the HTML into gibberish.. it eliminates the need to "spam-proof" your MAILTO: links.. (The only thing I'm worried about is spammers altering their bots to ID themselves as Mozilla, or something similar..)
Re:Yuck! (Score:2)
`ø,,ø`ø,,ø!
Re:Spammers cheat, this will not work (Score:5)
Nowadays, there are an awful lot of people who are working to fight spam, which makes is quite a bit harder for a spammer. With cool services like Spam Cop [spamcop.net] (you copy-n-paste the spam w/ headers, and they track the spammer and stop that account, often within minutes), anyone can easily contribute to getting whatever account a spammer is abusing shut down as rapidly as possible.
It works. I've tried spamcop several times, and every time the result was that someone had already beat me to it and the ISP had already shut down the account that was being abused. The spammer wasn't caught, but they were delayed and their job was made harder.
This forces spammers to work harder, so the cost of sending a message is not zero. An an example, take a look at the material a hacker stole from spammer Premier Marketing, Inc [freewebsites.com]. It's clear that they had to use multiple people and a never-ending supply of stolen dialup accounts. They went to a lot of trouble to compile a giant list of know anti-spam activists who used services like Spam Cop (or read the headers themselves and called ISPs), so that their stolen dialups would hold out a little longer.
It's easy to just throw your hands up in the air and accept spam as a fact of life. It's easy to feel like spammers are unstoppable. The truth is that these anti-spam countermeasures do make things harder for spammers. They increase the cost, from virtually nothing, to something. Admittedly, not much, but it doesn't take much to make some of the really lame-ass scams these folks spew unprofitable.
There's also hope for the world in the kick-ass efforts of Paul F. Pete Wellborn III [federalcourts.com], the lawyer who's taken down a couple big-time spammers, most recently that annoying printer supplies guy!
So don't give up. Even if you just press delete without a second though, don't discourage others. There is hope. A lot of people are working against spam, and as more things like this come on-line, the cost and risk of sending spam will continue to slowly rise. A very Good Thing!
Re:Spammers cheat, this will not work (Score:2)
Bill - aka taniwha
--
Use the DMCA (Score:3)
According to the terms of agteements, they cannot use this the information from the board for spam.
There there is a statutory amount for copyright violation, why not use that against the list providers?
Re:Valid email addresses... (Score:2)
I'm in a similar situation; one of my two Hotmail addresses is completely unpublished, unknown etc., yet still gets plenty of spam. (The other is three letters and two numbers @hotmail.com, and gets spammed into the ground...)
A friend of mine set up two Hotmail accounts, with very different user profiles: one honest (late twenties male geek, a couple of interests), one not so (maximum age, no interests...). Both have attracted some spam, but the first one gets far more - and he hasn't used either address publicly.
So, no hard evidence here, but it looks to me like Hotmail have been leaking user profiles...
Anti-Spam Wish List (Score:2)
It is too bad there is no way to poison the sender of the spam. Spammers will evolve beyond this, they always do.
On my Christmas Wish List, I want Santa to bring me something that doesn't exist. Something that's a great idea, but not actually possible. Ya know, like world peace, honest politicians or stable Microsoft products.
I want an e-mail client that will automatically detect spam and e-mail virus hoaxes - with 100% accuracy, so I don't lose real messages - and without any intervention on my part, smurf the sender.
Because, Dear Santa, I wish to be able to post my e-mail address with impunity, for all to see.
Re:Spammers have evolved (Score:2)
Spammers are now running dictionary attacks against SMTP servers. A spammer will connect to mail.example.com and try a large (if not exaustive) list of possible usernames. If the mail server gives an 'OK' message the address is added to the spammers list; if it gets a 'user unknown' it discards it and goes on to the next.
Oh jeez, that's spooky.
I'm administering several small domains running Linux. Now, I gotta admit, I still haven't read the many great thick tomes on Sendmail. I do have relaying from outside my LANs turned off, of course, but that's the only overt anti-spam measure I've taken.
Running Sendmail 8.9.3, can anything be done to stop this?
I assume modifying Sendmail to give an OK reply to every attempted username would simply result in a deluge of messages being bounced which would eat my bandwidth and still wouldn't protect my users. Turning off the OK to username queries would probably effectively block all incoming e-mail.
So, what's a small-time sysadmin supposed to do?
Re:Get automatically sorted out (Score:2)
Burris
Re:Valid email addresses... (Score:2)
And run a few simple filters on the mail to check if it's all got the same body text, or similar addresses, or something, flag it for a human to look at.
Or, just keep all accounts from sending more than 50 pieces per day unless the user has specifically requested a higher limit - then watch the people who do for a while to make sure it's not spam.
This doesn't even entail reading the email, unless it all comes up as identical... just looking at addresses and sending patterns.
Blocking access to external mail servers would be a good idea too, at least until people ask for that to be changed on their account.
That way, anonymous spammers wouldn't be able to create and abuse tons of accounts but regular users would, at worst, have to email the support staff to get the email limit and such removed.
Re:Use the DMCA (Score:2)
Copyright *can* cover pulling addresses from lists and all, but only when the organization shows creative intent. An alphabetical list of phone numbers, no. A street-by-street listing of number, maybe. But in any case, to use that information isn't a copyright violation, only reproducing it would be.
Re:address mangling (Score:2)
Lucky for your commie ass that I won't be using that email address much longer.
If a spam has a 1-800 number, call it a lot. (Score:2)
A friend of mine runs a script which intermittently dials the numbers in the evening when he's asleep and not otherwise using his line. Vindictive, evil, yet somehow it seems just.
---
man sig
Re:It's about damn time... (Score:2)
It's about numbers. If a spammer sends out 10 million spams asking for $10, and 0.01% of the recipients are sufficiently naive to reply, he has made $1,000. If the spammer is just looking for credit card numbers to defraud, all it takes is one bone-dumb idiot out of millions of recipients to send theirs in. The odds look pretty good for the spammer.
Re:politicians' email addresses (Score:2)
However, it might be worthwhile to set up a bunch of forwarding addresses that don't end in
Another thought -- is it possible to get an email address that ends in
Spambot poisoner (Score:2)
There is at least one fellow who may have found a way to do something effective.
Check out the email address on this post. It is a real, non-munged email address. After you have admired it a few seconds, then go to http://www.suespammers.org, and get your very own free Washington-state based email account from a guy who is hoping to make a living suing the bastards.
bad for the DNS (Score:2)
The trouble I have with all these schemes is that it causes lots of extra work for the root servers of the DNS. By forging bogus addresses in invalid domains and offering those addresses to harvesters, you're guaranteeing that people using these lists will cause tons of root server queries. If the addresses are at valid domains like hotmail, you're burdening hotmail with the effort of looking up these (maybe) bogus users.
I just munge my address, adopting the form: mailto:foo%2bdomain%2etld , which all the browsers I tested understood just fine. So far, so good. A nice bit of poison that I like: postmaster@[127.0.0.1] and postmaster@localhost.
Speaking of spam... (Score:2)
1-800-206-3934 ex. 5858
***1-800-224-5988****
On checking the headers, I saw that my email address was contained in every message (in other words, no aliases or other things that merely resolved to my address). These guys deliberately spammed me multiple times.
That's fine, though, because I collect 1-800 spam numbers. It would be a real tragedy if they were called repeatedly from a worldwide audience who hates spam, wouldn't it?
Don't use your home phone. ANI will bite you on the ass if you do.
-Legion
Re:Spammers have evolved (Score:3)
Calm down. I never stated that. The spammer will start an interactive SMTP session and run thru a series of RCPT's and keep the OK's. Thus if a spammer got an OK on joe_blow while on 'mail.example.com', he would know that 'joe_blow@example.com' was a valid address.
What you have described is only going to work over a single domain, and even then only with an incredibly badly adminned mail server.
Even well adminned servers are abuseable. The attack does not use EXPN of VRFY; it acts like it is a normal mail transaction. Most pro-spammers have multiple phonelines (I know one who has 8 lines), so they can run against multiple servers at the same time and can easily snag 1/4 million addresses a night.
What ISP was this? indy.net (RIP)
Re:Speaking of spam... (Score:2)
Don't use your home phone. ANI will bite you on the ass if you do.
Yuck! (Score:2)
Still, it's great to see a means of getting the spammers to spam each other. If only the same thing could be done for junk snail-mail.
Re:Anti-Spam Wish List (Score:2)
Subject: Unsolicited e-messages
From: postmaster@northpole.org
To: BogBlockMopar
Dear Mr. Mopar,
My client, Mr. Claus, respectfully requests that you and all the other k1dd135 on the planet quit sending him unsolicited e-messages requesting toys. If you continue this practice, I will be forced to notify your ISP and ask them to terminate your account.
Tall Hacking Tale (Score:2)
The site looks interesting. But as the AC pointed out, the ability to get a screen capture via a sudden-notice attack on a Windows box (Win9x? WinNT?) seems very unlikely. There's reason to be skeptical.
I've been doing this for sometime (Score:2)
To try it, run lynx -useragent=EmailSiphon http://ibgwww.colorado.edu/
It is really funny to see some poor spambot spend an hour or two thinking it has hit some really rich website.
Re:Valid email addresses... (Score:3)
I have an address, no-one else knows it, and it wasn't published anywhere. It gets 3 spams a day from sexamp.com. It's also not an easy to guess one.
Either spammers spam random addresses, or hotmail is selling addresses to sex spammers.
Maybe one day I'll set up a uuidgen'd address like
29f03ca7-8f26-4675-b1a7-b61ebb13bb8f@hotmail.co
Re:Valid email addresses... (Score:5)
(there are a few amusing upsides - I've recieved other people's (paid for) passwords for, uh, 'premium content', before now)
A neat spamtrap I saw somewhere was a sentence halfway down someones page that just said: "Whatever you do don't mail me at pink-and-wobbly@asdkjlwelkj.com, because then I'll know you're just an address-harvester, and blacklist your IP until the end of time", just before their normal contact details.
Re:Teergrube (Score:2)
Get automatically sorted out (Score:5)
The spammers try to filter out invalid addresses, so all you need is a real address that seems to be invalid.
I discovered this by accident: I wanted to track which companies give my email address out, so I created a subdomain with throw-away addresses: "nospam.sig11.net", and gave out unique identifiers for the username. (See my email in the header - it is a valid address - do not remove "nospam".)
But the funny thing is: I never received any spam to these addresses. (And for the other addresses I see about 5-10 spam mails a day rejected by my spam filters...) It seems the address gets sorted out because of the "nospam" part.
So the solution is: Get yourself a valid email address with "nospam" or the like in it - The spammers will do the work for you and exclude you from their lists.
Profit margins (Score:2)
Spammers designed ways of gleaning email addresses from websurfers in order to avoid having to pay for verified email addresses; without a way of verifying the addresses they collect, spammers will have to switch back to paid lists gained from registrations, etc.
In this case, the need for verification will create that extra step for spammers, making it cheaper not to use the lists at all. Is anyone aware of a cheap and easy way, other than just emailing the person, to verify a valid yet false address?
The only way I can think of for spammers to evade Sugarplum would be the establishment of intermediate businesses to vet email lists gathered by spammers.
Re:Valid email addresses... (Score:2)
Murderers? (Score:2)
Spammers are a type of thief. It's that simple really. It's the online equivalent of if people could steal your car while you weren't using it, and return it when they are done with it but without paying for gas. They can make a big fuss about how they aren't stealing your car but they're using it and wearing it out without paying for any of it, and whether or not you also can use it is not relevant.
The law doesn't let people steal your car just in case they plan to return it before you need it again. It forbids people from stealing your car in general terms because the stealing is taking place without your permission or consent. By the same token, spamming is use of your internet resources (from ISP right down to use of your inbox and 'mail visual scan' for important stuff) without your permission or consent- the resources being used are all YOURS, not the spammers. They have no right to use 'em, any more than they have a right to steal your car temporarily and use the gas up.
There is also no legitimate argument that their use of your resources is doing you some kind of informational favor. You would be just as able to access that information if you went to their website on your own- you don't owe them the attention, just for existing. I guess that's the bottom line really- spammers behave like attention is a right, calling it free speech and basically insisting they must be allowed to _seize_ the attention of anybody in the world. Attention is a privilege, not a right. Free speech laws never considered the situation of a person with a megaphone loud enough to yell at every single person that exists- free speech is based on an assumption that the speech is going to be somewhat localised, and that if you are somewhere else or not paying attention you won't hear it.
In a weird way stalking laws seem oddly applicable. If you continually follow a person berating them you may well be legally forced to stop as your demanding of their attention is considered a sort of assault. Spammers are, effectively, 'stalking' millions of people at a time. No-contact laws might be a good idea- if no-contact to specific individuals is too much like 'opt out' or too unrealistic, perhaps what's needed is 'no bulkmail/email at all' laws for a digital version of no-contact. The former would be a legal acceptance that spamming is a form of harassment, and a block against that person doing it again for any reason through any means- and the latter would be a recourse if the spammer refused to stop harassing.
If Kevin Mitnick can be forbidden to work in the computer industry just for being a troublemaker, why can't unrepentant spammers be forbidden to use email for any reason? There's always postal mail, the phone, and face to face contact- ALL of which already are covered legally against harassment situations.
Re:Yuck! (Score:2)
If I had to pay by the pound for snailmail the junkmail would bug me a lot more. The fact that the bulkmailer has to pay postage is a governing factor that keeps them from going too nuts with it. I have yet to see a Taiwanese sex toy emporium find it economical to flood me with unsolicited catalogs. Those cost _them_ actual money :)
Happy Thanksgiving, You've Been Slashdotted! (Score:4)
That's the holiday spirit alright... ;)
---
seumas.com
politicians' email addresses (Score:5)
Reminds me of.... (Score:2)
Reminds me of that TNG episode where they found a way to make the Borg examine a picture that constinued forever.
Hmm.. wouldn't that be interesting, have the feeder continuosly feed it email addresses and never stop. It's a better way to fight, don't resist, just give them exactly what they want, and lot's of it, until they stop it by themselves.
Anti-Spam technique (Score:4)
1. First - get a domain
2. Second, get hosting company that offers a default-mail-redirect. (i.e. If someone mails a message to jsahjfhjdkdsueue@yourdomain.com the server automatically forwards it to you@yourdomain.com
3. Now, when you enter you email-addy in a signup form somewhere, enter the name of the company as your adress (i.e. amazon@yourdomain.com, yahoo@yourdomain.com)
4. Now, everytime someone sends you spam, you can simply block them in your E-mail filter PLUS that your see what comany has been flithy enough to sell your adress!
It might not be perfect, but it's damn good.
Re:Tall Hacking Tale (Score:2)
But as the AC pointed out:
the ability to get a screen capture via a sudden-notice attack on a Windows box (Win9x? WinNT?) seems very unlikely. There's reason to be skeptical.
You can certainly read through the comments from the time is was discussed here on slashdot, but I'll boil it down a bit. There seems to be three schools of though (more or less).
Maybe it's all a hoax, but as many folks posted, the remote windows screen capture is apparantly a simple trick if the target has unsecure windows file sharing. The Back Orifice [bo2k.com] tool is certainly not a hoax.
So if it really was a hoax, I'd like to see some real evidence that it's a hoax... remembering that remote windoze screen capture being a relatively easy thing if file sharing is unsecure, and not even all that hard if you can trick the user into running some code in one of many ways pointed out in the June 7th discussion. A thing like this is much easier to prove to be a hoax than to confirm.
It may indeed be a hoax, so AC, if you're reading this, take a moment to post anything you can find to discredit the story, other than you don't believe the hack was possible because it's beyond your knowledge/paradigm. The hack is easy and many people have explained how to do it.
Re: address mangling (Score:2)
--
Turn on, log in, burn out...
Re:Anti-Spam Wish List (Score:2)
Is your email address: slant6mopar@yahxx.com ? It seems a spambot just scarfed it up!
Bastard! I hope you get a melanoma on your glans.
Re:Anti-Spam Wish List (Score:2)
To: BogBlockMopar
Hey! I've got a 625 CFM Carter AFB carburetor on a Chrysler 400 CID (6.6L) V8. She doesn't bog, I assure you.
Actually, it's in a pickup truck without a Sure-Grip differential. Pulling away from a light without smoking off a 235-75R15 is tough. Let alone killing my manifold vacuum.
[redneck carspeak] No sir, she don't bog.
My client, Mr. Claus, respectfully requests that you and all the other k1dd135 on the planet quit sending him unsolicited e-messages requesting toys. If you continue this practice, I will be forced to notify your ISP and ask them to terminate your account.Wouldn't even Santa find such a tool useful? :)
Re:On a similar note: Email "Cloaking Device" (Score:2)
A marginally better approach is to have pages with email addresses generated by php3/perl/etc, with mailto: links encoded for all requests -- s/(.)/'&#'.ord($1)/ge in document content, the same for URI-encoding in mailto: links. Still not impossible to decode, but the more spammers try to decode the content they harvest, the more bad data they get on their own. Moreover, most spammers aren't by reputation all that bright, and no self-respecting ethical programmer will work for a spammer, so their ability to adapt technologically isn't as good as ours.
aqua
(sugarplum's slashdotted author)
Re:Tall Hacking Tale (Score:2)
If the relative ease of breaking into unsecure Windows computers and remotely controlling them as well as you could a linux box is news to you, maybe this is a good time to check if your box is wide-open to attack. The days of "they can't get me because my OS doesn't network" ended in DOS (maybe Win 3.1).
There are many many ways to do this, but small company where I know someone has a very easy-to-use free port scan [sdesign.com], that will check if you've got any of the really obvious problems. There are some others available on the net, but this one will check a lot of other services besides just the usual Windoze problems.
Unfortunately, Secure Design [sdesign.com] has seen increasing costs in running this service, main to respond to threats from network admins who detect the scans (due to a request from one of their users), and their free port scan, which is probably the best of the simple free web-based scans, may be coming to an end. Oh well.
Not really new (Score:2)
From what it seems, the only two things this does that wpoison doesn't, is spams spammers and crashes the spammer's machine with denial of service attacks.
Having spammers spam other spammers seems okay, but attacking spammers with denial of service attacks? Sorry, but it my opinion, performing denial of service attacks on people you don't like makes you almost as bad as a spammer.
Aside from all that, if CmdrTaco hasn't noticed, this is Slashdot, not Freshmeat.
Spammers cheat, this will not work (Score:4)
Spammers don't follow the rules, all the crap they spout in emails about this bill and that bill making this legal are complete bullshit.
Spammers are the murderers and rapists of the techno world, they steal resources of other peoples networks, and the traffic they generate is enough to drop small networks and mail servers.
Re:Valid email addresses... (Score:2)
I'd think so, if it was my email address they managed to hit...
Cheers,
Tim
Re:There are much better, older tools for this (Score:2)
If you can make the telemarketer think that you MIGHT actually buy something, he'll waste his time trying to sell it to you. If the spambot thinks it's getting valid addresses, it'll keep on harvesting them. The longer you can keep feeding it garbage, the less time it will spend gathering useful information.
LK
My technique... (Score:3)
Second, I use the address as an identifier in my addresses. At mp3.com it's mp3@world-domination.net, at yahoo it's yahoo@world-domination.net. Then if I start getting spammed at one of those addresses, I know which site's fault it is, and I can change my address at that site and block all future mail to that address.
I admit this solution isn't for everyone, but it works great for me.