The Use and Abuse of the Internet

Written by Jesse S. Somer


One small change made a huge impact in a day inrepparttar life of Zardinia Zaffas.

I can see you right now. You’re sitting at your desk staring intorepparttar 118574 computer screen,repparttar 118575 Internet is connected andrepparttar 118576 information is flowing like a river. If you are at work, you are randomly checking email, News sites and interesting topics in between your necessary tasks. There’s a woman like you out there, her name is Zardinia Zaffas and this is an interesting tale about a recent day inrepparttar 118577 life of her world.

Monday morning was like any other to Zardinia: waking up torepparttar 118578 sound of 60’s music on her clock radio, breakfast ofrepparttar 118579 usual oatmeal with maple syrup, grapefruit with a little brown sugar, peppermint tea and of course her favorite food-the sacred Pink Lady apple. This is followed by 20 minutes of yoga and a nice hot shower, then jump inrepparttar 118580 car and downrepparttar 118581 highway to her job as a software programmer.

However when Zardinia walked intorepparttar 118582 office on this particular Monday she could sense something was wrong. It was like an anxious buzzing cloud of confusion was raining weirdness inrepparttar 118583 air. As she sat down her supervisor walked up and gave herrepparttar 118584 news. The company’s Internet connection was temporarily ‘out of order’ and would be fixed at an indeterminate time. Well, life sure is unpredictable.

After logging in she realized she no longer had her usual access torepparttar 118585 daily News information. Deciding to go down torepparttar 118586 lobby whererepparttar 118587 newspapers were sold she took a ride downrepparttar 118588 elevator and grabbed a copy. Back at her desk as she perused throughrepparttar 118589 International section she heardrepparttar 118590 sound of a throat being cleared. Looking up overrepparttar 118591 paper she sawrepparttar 118592 face of her supervisor once again, although this time his demeanor had gone through an obvious transformation.

“We don’t pay our staff to read newspapers here Miss Zaffas. If you want to readrepparttar 118593 Newspaper please do it on your own time at lunch or at home.” he said obviously agitated.

Zardinia’s face contorted with obvious surprise, “I’m sorry Mr. Stevenson.” A red sunset spread across her cheeks. “I’ll get back to work sir.”

Anti Trackback and Comment Spam Methods

Written by Bobby Masteria


What is spam ?

Spam is text or URL, in one or several exemplars, neither being waited nor wished, not having, neither directly nor from its shipper, no relationship neither withrepparttar recipient nor with a possible
resource related torepparttar 118573 recipient.

How does spam appears in blogs ?

  • Throughrepparttar 118574 comments’ body and commentator’s URL.
  • Through trackbacks’ excerpt and permalink’s URL

What arerepparttar 118575 anti-spam methods?

  • Authentication by connection
  • CAPTCHA
  • Black List
  • Bayesian Filter

Other methods to minimize spam :

  • Time Interval between submissions / Number of submissions per hour.
  • DDD.
  • Secure Form Mode : force page and submission to be manual.
  • Rank Denial : Directs hyperlinks an intermediary server.
  • Autoclose after N days: entry stops accepting comments or trackbacks.

Which data are analyzed by these methods ?


    Active methods do analyzerepparttar 118576 shipper to check if it’s:
  • a spamer by coparing its IP address with blacklisted ones.
  • authorized by authentication
  • a human by CAPTCHA
    Passive methods do analyze :
  • comment’s data:
    • nickname
    • eMail address
    • URL
    • message
  • trackback’s data (concerningrepparttar 118577 shipping blog):
    • blog’s name
    • entry’s title
    • entry’s excerpt
    • permalink’s URL


Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use