|
Hmmm. I suspect they must have pushed another version out as I deleted one from this poster before reporting them as a spammer this morning.
|
|
|
|
|
Could be - I'm more interested in how this blatant a spam got through moderation...and if there are any others.
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
OriginalGriff wrote: I'm more interested in how this blatant a spam got through moderation By oneclicklogin.net
|
|
|
|
|
His rep (while he lived) wasn't good enough to get "unmoderated" article status, so he needed 5 votes to get it through.
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
Looking at some of the recent postings on The Weird and The Wonderful it occurred to me, although many of us can see the wrong thinking behind some of what's posted, newbies may not see the problem.
I think that the forum description could/should include a suggestion to explain why what's there is wrong.
Of course, this doesn't directly apply to the "Wonderful", although explaining those could be helpful, too!
|
|
|
|
|
At the bottom of this forum, there is a tag that says 'flags' with only one flag following it.
(I know, I warned you it was pedantic)
|
|
|
|
|
Those images above are also flags. It's just a shame they aren't aligned with the rejected flag.
|
|
|
|
|
Did you count them?
This space intentionally left blank.
|
|
|
|
|
You're showing the icons(Modify, Delete, Delete thread) when we(protectors) mouse over a message subject. But why we're getting the following message for those actions?
Quote: Items that need attention:
You do not have permission to perform this action
We want to delete spam messages ASAP instead of waiting for n number of reports.
And please implement 3rd option from this[^] quickly to make the forums cleaner.
thatrajaCode converters | Education Needed
No thanks, I am all stocked up. - Luc Pattyn
When you're wrestling a gorilla, you don't stop when you're tired, you stop when the gorilla is - Henry Minute
|
|
|
|
|
I agree with you. The "Message Automatically Removed" posts are actually making forums flooded unnecessarily.
Those need to be removed by Protectors.
Thanks,
|
|
|
|
|
Good morning!
Taking our 'Love Marriage Vashikaran Specialist baba' spammer as an example, I would like to propose an idea to deal with persistant spammers:
Automatic spam detection without annoying normal users is difficult. Still, there should be a form of detection when the message is posted.
The spam usually contains detectable keywords used before in other deleted messages. The more keywords appear, the more likely the message will be identified as spam.
That alone is not enough. I have used some of the keywords above and would also be seen as a spammer. A real spammer will most likely have posted very few messages and a high number, if not all, have been spam. A regular user with many posts and a low amount of potential spam messages would be left alone, at least until the messages are reported by other users.
The question is, what should be done with a potential spammer. First, the whole thing should be brought to the attention of an administrator with an automatic message, perhaps very much like a report from a user. When in doubt, a user could be given a notification when trying to post. Something like 'If you post this you look like a spammer and this could have consequences.'.
If the ratio of correct reports is acceptable, then temporarily blocking the user from posting until an administrator had a look might be helpful.
The language is JavaScript. that of Mordor, which I will not utter here
I hold an A-7 computer expert classification, Commodore. I'm well acquainted with Dr. Daystrom's theories and discoveries. The basic design of all our ship's computers are JavaScript.
|
|
|
|
|
Using the keyword "+91-9915202880" would take care of 80% of the recent spam.
|
|
|
|
|
It would however also take care of your post...
Soren Madsen
"When you don't know what you're doing it's best to do it quickly" - Jase #DuckDynasty
|
|
|
|
|
It's a sacrifice for the greater good i'm prepared to make.
|
|
|
|
|
I'm telling ya, you got to limit the frequency of posts that a new user can make.
If their reputation is below a certain threshold, limit them to something like one post every 20 minutes or so.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Then they will crate 20 accounts and make a message from one of them, move to the next and then come back to the beggining.
I don't know what would be more annoying, many messages from one account, or many accounts with less messages.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
That would make conversations with Newbies very drawn out and tedious.
|
|
|
|
|
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project.
Would this project type be allowed ??
The finished project would be very similar to the payload of a keylogger virus.
The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons.
Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
|
|
|
|
|
We (the CP readers, I can't speak for the staff) tend not to like articles like this. While I admire your zeal, the big problem is that while you aren't going to write a virus, there's no guarantee that all the readers of your article will hold themselves to your high standard.
|
|
|
|
|
I agree with Pete, that sort of knowledge is very dangerous in the wrong hands. I suggest trying a different subject, and a different forum - this is for Site Bugs.
|
|
|
|
|
A key logger as what it means is not likely to be approved by the coomunity - I speak as Member of this community, there may be other opinions.
Whatever, a slightly changed project may be as interesting as a keylogger: Something using an Arduino Board may be worth a try[^], but also an article on Barode scanners might be very interesting.
|
|
|
|
|
I too agree with Pete. Some evils out there always to misuse that. Once started those evils could get all mail logins, bank logins, etc., important details.
So please don't. A suggestion for your next article. Make a tool for disabling all keyloggers. Please ....
thatrajaCode converters | Education Needed
No thanks, I am all stocked up. - Luc Pattyn
When you're wrestling a gorilla, you don't stop when you're tired, you stop when the gorilla is - Henry Minute
|
|
|
|
|
I agree with Pete, Richard and Marco.
Exaggerating it a bit... it would be as explaining how to build a gun, you might make it with academical purpose, but in the wrong hands that information can end at someone killing another person.
On the other hand... for such themas as possible projects ending in articles, opinions about ideas or asking for help, CP has the Article Writing forum[^], I think you can get more opinions and make a debate about over there.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Firstly, the world has enough articles about key loggers. It's seriously been done to death.
Secondly, what do you think people are going to do with code for a keylogger? Create a cool app to monitor keyboard usage and suggest ways to improve your typing? Or write apps to scrape passwords?
Posting more keylogger code will not make the world a better place. Your skills and enthusiasm deserve better.
|
|
|
|
|
Thanks for the comments.
I guess I have decided not to publish this article, because ultimately it will not fly on CP.
However, I do not imagine my work would find it's way into any useful virus as there are more complex aspects to such solutions, including delivering the payload of the virus.
In answer to the question about 'why do a key logger', the project was conceived to be more than that, and if you read my original question properly, you would realized that. The project was to monitor key strokes, and then send them to a remote database using web services of some sort, also I would have attempted to configure the Windows firewall as well. I think this would have been a very worthy project from an academic perspective, and could have helped people in the community in the future when attempting some of the tasks described above. The key logger was give an obvious source of easily harvested data.
So, I will take the advice about changing the project slightly and find another data source, eg. CPU temperature, etc.
Cheers,
Baxter P.
|
|
|
|