303 Topics
![]() | |
A New Zealand company is [URL="http://businessblogs.co.nz/2010/07/18/suspended-on-twitter-businesses-be-very-worried/"]reporting [/URL]that its Twitter account has been suspended due to “Updates consisting mainly of links, and not personal updates" -- which, if true, means that any other business that posts a lot of links could suffer the same fate. "I suspect the Reuters account [url]http://twitter.com/reuters[/url] … | |
Writing in the latest edition of Vanity Fair, [Kurt Eichenwald states](http://www.vanityfair.com/business/2013/05/facebook-future-mark-zuckerberg-sheryl-sandberg) that Facebook has "quietly been pioneering a marketing business model unlike any other" and goes on to praise the social networking Goliath for developing new targeting techniques that give "advertisers an unprecedented ability to reach only the potential audiences … | |
If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit. [attach]15822[/attach]The latest [URL="http://www.commtouch.com/download/1753"]Internet Threat … | |
Global online cash provider [Ukash](http://www.ukash.com), founded in 2001 and with a presence in more than 50 countries across 6 continents, has warned users not to get scammed by a loan company con doing the rounds at the moment. Ukash works on a code basis, with the user buying a voucher … ![]() | |
The latest VIPRE Report from [GFI Labs](http://www.gfi.com) suggests that 2013 started off as a bad year for social network-based cybercrime attacks. The report, which analysed the ten most prevalent threats detected during the month of January, identified phishing messages on both Twitter and Facebook as well as malicious spam messages … | |
[ATTACH=right]16696[/ATTACH]Facebook really dislikes that new 'dislike' button that's been popping up across the social network, and you should, too. That's because it could be a fake - a malicious little app that's actually a survey spam scam of the same ilk as that "[URL="http://www.esecurityplanet.com/headlines/article.php/3885881/Facebook-Phishing-Attack-Promises-Free-iPad.htm"]Free iPad event[/URL]" invitation you've likely received … | |
How forum admins Mark the users as spammers and is there any strategy ? how to overcome this blocking by doing spamming successfully? | |
Think of apps and you probably think of your smartphone. After all, Apple pretty much built an iPhone empire around the concept of apps and users of Android and Windows handsets are just as hooked. Truth be told though, and this 'Age of Apps' has spread far beyond the smartphone … ![]() | |
The media, online and off, has been full of scare stories about the 'biggest Internet attack ever' and how a distributed denial of service (DDoS) campaign aimed against anti-spam outfit Spamhaus peaked at an attack volume of 300 Gbps (the highest ever recorded by those who record such things) was … | |
With a billion members, active social circles and more than it's fair share of relative newbies to the world of online security, it should come as no surprise that Facebook continues to be the focus of much attention from those who would do you, your data and your bank balance … ![]() | |
This one nearly escaped my radar, and does not seem to have ruffled many news source feathers either. Which is surprising, because in my never humble opinion it is actually quite an important bit of news. The Virginia Court of Appeals has upheld the conviction of Jeremy Jaynes (the 8th … ![]() | |
Just as your average Joe starts to 'get' the importance of online security, and that means using anti-virus software, so the bad guys start exploiting this new found understanding by flooding the Internet with fake AV products. [attach]16913[/attach]Security researchers at [URL="http://www.sophos.com"]SophosLabs have today identified a major new fake anti-virus software … ![]() | |
[ATTACH=RIGHT]22213[/ATTACH]You may not be a big fan of Microsoft, but you wouldn't expect your computer to be held to ransom by the company would you? In recent months it has become quite commonplace, at least across Europe, for scammers posing as Microsoft technical support staff to 'cold call' people on … | |
McAfee publish a list of the top 10 spam subject lines, because of the work done by their threat research and filtering labs as well as customer feedback, and the latest for July shows how the spammer is now concentrating more on ID theft and less on helping you achieve … ![]() | |
Why has it taken six years for someone to take a contract out on my life? Or, more accurately, for a scammer to send me an email demanding payment of a bribe in order for him to cancel a supposed contract. The first hitman scam was spotted almost exactly six … | |
Think of spam and chances are your mind immediately turns to China or Russia and messages about sexual dysfunction or a financial deal you cannot believe. Maybe, though, your thoughts should be closer to home. Especially if home is in the United States. [ATTACH=RIGHT]22797[/ATTACH]According to the latest research from security … ![]() | |
Hi all, I'd like to clarify something here please, the inconsistent behaviour of browsers with regards to the pseudo class :visited. I had done quite a lot of research into it ont he web and it seems to me that every browser does something different. I appreciate this has a … | |
Is there any chance that a set of rules could be implemented to prevent abuse of the endorsement system? It seems that currently, anyone can endorse anyone and there is no restriction. I can provide an example of what appears to be abuse of the system, however, I am against … | |
Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example.  … ![]() | |
The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool … | |
Hello Everyone, Please accept my simple and humble contribution. This script will validate if the user or visitor is a suspected spammer, by utilizing the stopforumspam API. Example implementation ## example usage. These items can be from database or from form input. The choice of implementation is all up to … ![]() | |
Hello people! This afternoon I've recieved a phonecall on my main line, not a cell, from scammers (I think they're from Eastern Europe). I've recorded a part of this conversation in which the scammers were warning me about a nonexistant malware in my computer by having me show myself some … | |
I am getting rather fed up of seeing posts in the feeds of my Facebook Friends, including many who really should know better, advertising a supposed £175 value Tesco supermarket voucher giveaway. I say 'should know better' as the culprits have included technology journalists, computer magazine editors and IT consultants; … | |
I send out a newsletter using a PHP based mailing list manager installed on my server, which uses phpmailer to send. For most users that I send to, they get the newsletter fine, but users who have email accounts with cox.net , windstream.net , roadrunner.com, rr.com , earthlink.net seem to … | |
Hi, Over the last few weeks I've been getting e-mails to my e-mail address, not spam, and the subject matter is blank. Usually, I avoid things like this, but being a tech for 15 yrs., my curiosity got the best of me, because I new these people.When I opened the … | |
Just curious as to how to report spam here or if it should be reported at all. I received an email from babyl which reads: > Hello >My name is amaram I am tall ,good looking, perfect body figure and sexy.I saw your profile and was delighted to contact you, … | |
The head of the UK MI5 intelligence agency, Jonathan Evans, has this week warned that the [London 2012 Olympic Games](http://www.london2012.com/) "present an attractive target for our enemies and they will be at the centre of the world's attention in a month or so". But most of the concern, and indeed … | |
As a three times winner of the IT Security Journalist of the Year award in the UK, I am used to writing about all kinds of scams. Whilst most of them try and weasel their way into the bank accounts of the victim through purely online means, increasingly the bad … | |
I'm trying to think of better ways to fight spam than having a captcha that a user needs to fill in. I've considered emailing a confirmation link to the user that they need to click in order to send the message they filled out in the form, but with Google … | |
I am creating a website although during a trial run with a couple of friends they uncovered a bit of a major issue.... the ability to spam. I have added a hidden box e.t.c. to attempt to prevent bots from spamming but my friends where able to post twenty messages … | |
Hi, Something that is interesting for webmasters, and SEO. Google announced a new algorithm change to reduce the ranking of 'perceived' spammers. http://insidesearch.blogspot.com/2012/04/another-step-to-reward-high-quality.html This latest update appears to target keyword stuffing (lists of keywords) and article spinning. This will reduce the rank of the website with spam keywords in their … | |
Just as the title asks ... can selenium be used to automate forum spamming? If so, what are some techniques to combat that? | |
Probably the most common Olympic Games 2012 scam is that of unofficial ticket sales. No great surprise there, but the fact that Google appears to be in on the act might come as a shock to many. So what, exactly, is going on? [ATTACH=RIGHT]23779[/ATTACH]A little known law in the UK … | |
Hey guys, I've been working on a game for the past few months and I've decided to read up on game scripting to see how it could help me improve my current game. What I've gathered so far, is that using a scripting language saves the developer time (since compiling … | |
[CODE]IF OBJECT_ID('tempdb..#Table', 'U') IS NOT NULL DROP TABLE #Table GO Create Table #Table ( CorrectionDate datetime, Origdesc nvarchar(50), Newdesc nvarchar(50), Total int ) Insert Into #Table (CorrectionDate, Origdesc,Newdesc,Total) Values ('2011-08-01 00:00:00.000','RMAWAR','NTF',193) Insert Into #Table (CorrectionDate, Origdesc,Newdesc,Total) Values ('2011-08-01 00:00:00.000','NTF','RMAWAR',108) Insert Into #Table (CorrectionDate, Origdesc,Newdesc,Total) Values ('2011-08-01 00:00:00.000','RMAWAR','Sub Abuse',86) Insert Into … | |
how to do error trapping in textbox where the user cannot abuse the space bar. for example: i want to type hi h i | |
[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the … | |
Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The … | |
Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect … | |
Facebook users have been making a lot of use of the new 'like' feature which allows users to link to webpages that they, well, like funnily enough. Not so funny when Facebook users are claiming to like a site called "101 Hottest Women in the World" which features an image … | |
[ATTACH=RIGHT]22256[/ATTACH]England just scraped to a hard fought win against a physical and enthusiastic Argentina side in their opening match of the 2011 Rugby World Cup campaign in New Zealand. But while sports fans the world over get excited about how their country is performing in the initial pool group matches, … | |
iam building a training set for spam filtering using java,training set data is given as words in text files in one folder,but im unable to debug whats going wrong in java collections [CODE]/* *folder part 1 conatins various text files having name format * **spmsg***.txt and ***legit***.txt e.g 11927legit569.txt ,106127spmsgc26 … | |
Hello. My whole code is bellow and I getting the error message: {"responseData": null, "responseDetails": "Suspected Terms of Service Abuse. Please see http://code.google.com/apis/errors", "responseStatus": 403}. Do you have some suggestion? [CODE]#include <fstream> #include <vector> #include <iostream> #include <sstream> #include <string> #include <stdio.h> #include <stdlib.h> #include "/usr/include/curl/curl.h" #include "/usr/include/curl/easy.h" size_t write_data(void … | |
[B]Beginner's guide to C++0x: Avoiding Memory Problems by Design of Ownership[/B] If you ever read any resources on C++ programming or object-oriented programming, you must have heard some rethorics like "inheritance is for the [I]is a[/I] relation, composition is for the [I]has a[/I] relation". Is that all? Is that the … | |
I just wanted to know what would happen if you abuse the CharStack class by pop()ing more characters than you push()? Would it be an error of out of exception or something else. | |
Hi guys, I'm trying to create a "pool" of data that once added to is saved on a public domain. For example, data is stored at "url.com/data.txt". data.txt: [CODE]18473,948263,384292,47239,[/CODE] Client 1 connects to some url (which I need help with, thinking some PHP) with data as arguments. Adds: 39458,359835 Client … | |
It may seem like email has been around forever, but actually it is exactly 40 years since the first email was sent by the man credited with inventing it, engineer Ray Tomlinson, on Wednesday 8th June 1971. [attach]21227[/attach] Tomlinson was a computer engineer who was working for a company that … | |
Hello guys, I am using php mail form where visitors contact with the registered site members. Searching for a solution to avoid unwanted spam messages. Is there a way to put in code which deny sending messages from custom mail ids? Thanks in advance. Using this post to great thank … ![]() | |
Ordinarily I tend to agree with many of the things PCWorld's John C. Dvorak has to say, but a [URL="http://www.pcmag.com/article2/0,2817,2343209,00.asp?kc=PCRSS03079TX1K0000584"]column he wrote this week[/URL] has left me scratching my head. He asserts that the email system is fundamentally flawed and has pronounced it "dead." Email? Dead? What? Dvorak gives readers … ![]() | |
So I wrote a little remote control client/server based app to turn off my roomates torrent client at night (to avoid having to go into his room). I could have done this with remote software such as teamviewer or VNC but I don't need all the functionality that they provide … |
The End.