Archive for April 2003

Author of LaBrea “tarpit” software stops distribution citing free of super-DMCA law

FTC: Most Spam At Least Partly False

Information Week: Category: LINKS, spam  |  Comment

OMPUAC: Online Marketing Professionals United Against Censorship

Online Marketing Professionals United Against Censorship
Anti-Habeas trade group:
“Habeas Threatens Incomes”

SIEVE: A mail filtering language

Sieve Home Page
and
RFC3028

Probably not powerful or flexible enough, in my judgment.

AOL/Yahoo/Microsoft antispam techniques

InternetRetailer.com – Daily News for Monday, April 28, 2003

Hamlin says the Microsoft/AOL/Yahoo effort will concentrate on two basic goals: reducing the ability of spammers to spoof e-mail recipients with misleading “from” and “subject” headings, and establishing a set of anti-spam policies implemented throughout the e-mail world by both senders and recipients. A central part of this effort will be to leverage existing directories of Internet Protocol addresses, such as the Domain Name System, to verify the actual IP addresses of outbound e-mail. “You can`t spoof an IP address,” he says.

He adds that Microsoft and other participants will publish guidelines on how to configure inbound e-mail systems to work more closely with IP address registries. “It `s a minor effort for individual companies,” he says. “A single IT-person shop can do it.”

Among the other techniques the three companies will work on:

  • Inhibit the delivery of e-mail from network systems determined to be operating with open routers or other technology that leaves a system open to use by unauthorized senders of e-mail;
  • Eliminate the ability to create fraudulent e-mail accounts in bulk;
  • Define a mechanism that would allow consumers to communicate with e-mail service providers regarding spam complaints;
  • Develop better mechanisms for preserving electronic evidence of spamming activity to support enforcement actions;
  • Help coordinate industry-wide use of best practices in blocking spam.

The oft-repeated story of the cyberwar virus smuggled inside a printer

SecurityFocus HOME Columnists: Iraqi Cyberwar: an Ageless Joke
«
Frankly, this is a great story. It’s amusing to remember how it kicked up a storm in 1991 after its initial appearance as an April Fool’s joke in Infoworld magazine.
»

Detecting NAT Devices using sFlow

Detecting NAT Devices using sFlow: watch for variable TTLs

NYTimes: “Internet Is Losing Ground in Battle Against Spam”

Spam: there’s no standard way to get permission

David Berlind: Networking Updgrades / Slam, bam, no thank you, spam – Tech Update – ZDNet:

Perhaps the biggest problem is that there’s no standard way for getting permission. Most e-mail senders believe that if a closed permission loop exists, e-mail they send should get a hall pass. In a closed loop, if you try to sign me up for a newsletter, I will be given the opportunity to confirm that via e-mail. Presumably, I’m the only one with access to my inbox and, if I accept the confirmation, the newsletter will begin to flow to me on a periodic basis. If I don’t confirm it, I receive nothing.

Even Harvard’s Dean Misreads the DMCA

Legal Tags: Wendy Seltzer’s Weblog: Even Harvard’s Dean Misreads the DMCA:
‘A “repeat infringer” is not someone who has merely been accused of wrongdoing, but one who has been proven to have engaged in unlawful activity, twice.

The distinction is important because entertainment industry accusations are not proof of infringement; at times, they are downright laughable. Universal Studios recently sent a demand letter to the Internet Archive because some of the Archive’s public domain films had numerical filenames, apparently leading an automated ‘bot to mistake a promotional film of a seamstress-in-training for the submarine movie “U-571.” ’