Software filters required that spammers get devious. Learn in this new segment about using great works of literature to circumvent the intricate filtering schemes of the best software engineers
Image: The MIT Press
-
Showcasing more than fifty of the most provocative, original, and significant online essays from 2011, The Best Science Writing Online 2012 will change the way...
Read More??
The arrival of filtering required spammers to switch strategy. The carpetbaggers of spam?s youth left the scene, ushering in criminal sophisticates who set to work spoofing the filters. The game had changed. As Finn Brunton recounts in his brilliant history of spam, excerpted here for a second day: ?Rather than sales pitches for goods or sites, they [messages] could be used for phishing, identity theft, credit card scams, and infecting the recipient?s computer with viruses, worms, adware, and other forms of dangerous and crooked malware. A successful spam message could net many thousands of dollars, rather than $5 or $10 plus whatever the spammer might make selling off their good addresses to other spammers.? Brunton illustrates the ingenuity of this transformation by detailing the highly inventive litspam?the hijacking of entire texts of Borges or Conan Doyle to waltz past spam filtering algorithms.
Litspam was only the beginning, to be followed by splogs, content farms and more. Enter the spam underworld for a second day. A table of contents guides you through the chapter?and, if you missed it, go back and read Part One of this captivating book excerpt.
TABLE OF CONTENTS
?
Reprinted from Spam: A Shadow History of the Internet, by Finn Brunton Copyright ? 2013, by Massachusetts Institute of Technology. Used with permission of the publisher The MIT Press.
Source: http://www.scientificamerican.com/article.cfm?id=spam-shadow-history-of-internet-excerpt-part-two
stephen jackson marchmadness mike d antoni nba trade rumors desean jackson 2012 ncaa tournament schedule laurent robinson
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.