Anti Trackback and Comment Spam Methods

What is spam ?

spam is text or URL, in one or several exemplars, neither being waited nor wished, not having, neither directly nor from its shipper, no relationship neither with the recipient nor with a possible
resource related to the recipient.

How does spam appears in blogs ?

  • Through the comments' body and commentator's URL.
  • Through trackbacks' excerpt and permalink's spam

What are the anti-spam methods?

  • Authentication by connection
  • spam
  • Black List
  • Bayesian Filter

Other methods to minimize spam :

  • Time Interval between submissions / Number of submissions per hour.
  • DDD.
  • Secure Form Mode : force page and submission to be manual.
  • Rank Denial : Directs hyperlinks an intermediary server.
  • Autoclose after N days: entry stops accepting comments or trackbacks.

Which data are analyzed by these methods ?

    Active methods do analyze the shipper to check if it's:
  • a spamer by coparing its IP address with blacklisted ones.
  • authorized by authentication
  • a human by CAPTCHA
    Passive methods do analyze :
  • comment's data:
    • nickname
    • eMail address
    • URL
    • message
  • trackback's data (concerning the shipping blog):
    • blog's name
    • entry's title
    • entry's excerpt
    • permalink's URL

What are the limits to these methods ?

Cross use of several of these methods allows excellent results concerning comments, but weak results concerning trackbakcs.
Difference between comments and trackbacks is that comments are sent from the recipient's blog, which allosw all above methods to be used, whereas trackbacks are sent from the shipping blog (this avoids the use and need of 2 interfaces).
- Consequently it's not possible to use CAPTCHA, authentication and Secure Form Mode methods with trackbacks.
- Another big problem, when all the trackback's data are unknown, especially the IP address, it is quite impossible to avoid spam, mainly because the blacklist and the bayesian filter are becoming inefficient.
- Last inconvenient, trackback autodiscovery is usefull for bookmarklets but also to spamers to who it gives the trackback URL.

spam

Copyright ? 2004 - Reflexive-Blog - Bobby Masteria
Webdesigner - WebMaster - MetaBlogger - Multi-Blogger - BlogMaster
spam - spam - spam - spam
Always use the URL Associated with this article. - Always use and mention my full name. - Never mention my eMail address.

shuttle from O'Hare Brocton .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
According to the FBI, cybercriminals are sending extortion letters, threatening to release victims' sensitive information unless a ransom is paid.
FireSat is a satellite project designed to detect and track wildfires early, aiming to detect a fire that's the size of a classroom within 20 minutes.
Tech expert Kurt “CyberGuy" Knutsson reports that researchers have uncovered a Chrome vulnerability used in a cyber espionage campaign.
Preserving voicemails securely on Android: Tech expert Kurt “CyberGuy" Knutsson reveals easy methods to keep memories alive forever.
This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ways to stay safe from Astaroth phishing attacks.
Tech expert Kurt “CyberGuy" Knutsson discusses Joby Aviation and Virgin Atlantic planning to launch 200-mph U.K. air taxis linking airports and cities.
Fake Apple virus warnings, security alerts and messages are tactics used to prompt you to call a number or click on a malicious link. The CyberGuy explains how to protect your devices.
The combination of artificial intelligence and neuroscience allows a paralyzed man to manipulate a robotic arm by using his brain to imagine movements.
With the help of artificial intelligence, sophisticated fraud techniques emerging today are virtually undetectable to the untrained eye.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
If you need to free up space on your Mac, consider deleting duplicate photos in your image library. Apple makes it easy to do, and the CyberGuy explains the process.
Microsoft is discontinuing Skype in May after 22 years of service. Kurt the CyberGuy addresses other options for internet-based phone and video service.
Tron 1, a Chinese company's two-legged robot, is versatile and can walk, roll and pivot, even on rough terrain. Tron 1 stands 33 inches tall and weighs 44 pounds.
Hackers are tricking people into installing password-stealing malware by making them press keyboard shortcuts under the pretense of proving they're not bots.
Saving the voices of loved ones can be a comforting way to keep alive memories. Kurt "the CyberGuy" Knutsson explains how to preserve voicemail messages.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI warns that some free online document converters load malware onto people's computers, making their private information vulnerable to attack.
Toyota's compact electric FT-Me is designed to tackle challenges of city living while offering an accessible and eco-friendly transportation solution.
Kurt “CyberGuy" Knutsson says 23andMe's bankruptcy raises data privacy fears: Opt out, download and delete data now.
UBTech and Zeekr unite with AI robot swarms to make car manufacturing faster and smarter. Tech expert Kurt “CyberGuy" Knutsson explains how the process works.
Tech expert Kurt “CyberGuy" Knutsson says Apple's Passwords app had a three-month phishing flaw from iOS 18 to 18.2 patch.
Tech expert Kurt “CyberGuy" Knutsson discusses how this super-small electric mini-truck takes a big step toward production.
Artificial intelligence-generated images and videos that use someone’s likeness typically target women without their consent. The CyberGuy unpacks how to protect loved ones.
A humanoid robot developed in China has transformed from a nimble dancer to performing kung fu moves with surprising precision and balance.

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Internet Tip of the Week: Cease and Desist

While we all admit that unsolicited commercial email is a... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

All About Spam

Spam is annoying. Period. Why people would want to send... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

Did you know that there are software programs that view... Read More

Sick Of Wading Through Spam?

It's a nightmare isn't it? You fire up your email... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Protecting Yourself With A Porn Filter

The harmful affects of pornography use and addiction are well... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

Get Your News Releases Through the Spam Filters in 11 Easy Steps

In today's spam-filled email world, it's sometimes VERY difficult to... Read More

I Love Spam!

What's the big deal? All you read on the internet... Read More

What To Do When You Get Spam

When you go to your mailbox and find pieces of... Read More

Chicago charter limousine service Hickory Hills ..