spam Archives - Sky's Blog https://blog.red7.com/tag/spam/ Communicating in a networked world Mon, 02 Jan 2017 21:27:28 +0000 en-US hourly 1 https://wordpress.org/?v=6.8 https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png spam Archives - Sky's Blog https://blog.red7.com/tag/spam/ 32 32 All those watches! All that bandwidth? https://blog.red7.com/all-those-watches-all-that-bandwidth/ https://blog.red7.com/all-those-watches-all-that-bandwidth/#respond Sun, 06 Sep 2009 01:55:40 +0000 http://sky.dlfound.org/?p=1775 Being on the road mid-summer, and having to watch my use of bandwidth, I noticed an uptick in the number of spam messages encouraging me to buy cheap watches; or more watches; or fabulous watches; well, you get the drift. Since I already have enough watches, I would like to ignore these messages, but rather […]

The post All those watches! All that bandwidth? appeared first on Sky's Blog.

]]>
Traveling Geeks 2009 UKBeing on the road mid-summer, and having to watch my use of bandwidth, I noticed an uptick in the number of spam messages encouraging me to buy cheap watches; or more watches; or fabulous watches; well, you get the drift. Since I already have enough watches, I would like to ignore these messages, but rather than cause me to look at other folks’ wrists, they have caused me to look at the ticking clock of my broadband network usage.

The issue is the use of bandwidth by these messages, and for that matter, the use of bandwidth by everything else. Bandwidth, in spite of our living in the Internet age, was a recurring theme for the entire Traveling Geeks crew. We were on BT Mobile Broadband, which for the most part was reliable. I’d say that we varied between a high of 2.5mbps (mega bits per second) and a low of 4kbps (4k, yes), but if you disregard speed, we seemed to have access almost everywhere in London and Cambridge. Service winked out for a few minutes on the road between London and Cambridge, but regardless of that, there were several geeks online using their laptop computers during the entire bus journey that morning.  And I used BTOpenZones, which is a commercial service provided via wi-fi in public places, cafes and hotels. We were given complementary service by BT[1] and I can see that an average (non-business) user is going to get pretty good service for £10 to £15 a month, but heavy users are going to be bumping against the account limitations and the issue for the geeks is really how much data we are pushing into the cloud. I uploaded a couple of really large videos one day, and overstepped the 4GB cap on my account without knowing it. So BT “topped-up” the account for me, but several of the geeks seem to have hit their limit more than once.

Although I travel a fair amount, I’m seeing that bandwidth is hard to find. Even with wi-fi access, I’m getting top speeds in the 100kbps to 200kbps range. I’m gathering that it is because I’m sharing the connection with others, and yes it does seem that speeds are best in the early morning when few people would be online – and that they can be pretty low when another geek in the same hotel is uploading video – so perhaps shared bandwidth is the real issue.


[1] Disclosures: BT Corporate gave the Traveling Geeks free wi-fi and broadband modem access during our trip to the UK.

The post All those watches! All that bandwidth? appeared first on Sky's Blog.

]]>
https://blog.red7.com/all-those-watches-all-that-bandwidth/feed/ 0 1775
The Exploitation of the Online Class https://blog.red7.com/the-exploitation-of-the-online-class/ https://blog.red7.com/the-exploitation-of-the-online-class/#respond Sat, 19 Apr 2008 14:52:01 +0000 http://sky.dlfound.org/?p=431 I have been kept more than busy. Super busy. Recently with the many online exploits that assault us on all fronts. I wonder how many of you are noticing it yet. Steep uptick in the past two weeks. First, of course, spam continues to snowball. (A snowball from Hell!) Increasing at a ferocious rate. Since […]

The post The Exploitation of the Online Class appeared first on Sky's Blog.

]]>
exclamationI have been kept more than busy. Super busy. Recently with the many online exploits that assault us on all fronts.

I wonder how many of you are noticing it yet. Steep uptick in the past two weeks.

First, of course, spam continues to snowball. (A snowball from Hell!) Increasing at a ferocious rate. Since I manage email for a number of friends and customers, I have multiple spam filters in front of my mail because I receive hundreds of spam messages every day (many of them duplicates, of course, to the same account). Having three filters means that almost all spam messages are caught. But the filters are so aggressive that many messages I need to read also are trapped in the spam dragnet. So I have to go thru the spam box several times a day and 1) fish out the legitimate messages; and 2) trash-can the spam.

My defenses include: 1) SpamAssassin running on my mailserver, which catches at least half of the spam so it never reaches my computer, and almost never quarantines a message that I really want; plus 2) Intego Personal Anti-Spam which is more than aggressive and is rule and blacklist-driven; plus 3) SpamSieve, which is a Bayesian filter (looking at word combinations).

For virus-protection on the server side, I have Macafee anti-virus installed (integrated into my Kerio mailserver) – which updates its definitions every few hours, and on my computer I use Intego VirusBarrier, which complements Intego’s spam product.

The other problem that’s on the rise over the past couple of weeks is a malware explosion, including trojans/viruses embedded in attachments. We call ’em poisoned files. I have seen poisoned ZIP, RAR, PDF, DOC and JPG files recently. It has gotten so bad that I no longer open any attached files unless I know exactly what they are and where they came from.

And many of these viruses look like they came from friends – even though their computers seem to be uncompromised. (Viruses used to mail themselves from infected computers, but recently that has not been the attack vector and instead the viruses seem to know how to get a list of your friends from elsewhere and then use that list, plus a legitimate email you have sent in the past, to target only your friends who would be interested in that message. Truly social engineering.

And the most insidious attack vector is the poisoning of files that are legitimately available for download on well-traffic’d web sites. Particularly visible among the Tibet support groups, certain computers have been invaded and trojans and virus-laden versions of PDF and other files that are there for download have been poisoned with viruses. So you go to a perfectly-good web site, download a file you expect to be OK, and suddenly you’ve got a virus. This practice is so widespread that it’s almost impossible to tell 1) how the file got infected; 2) how the server was invaded; and 3) to even know that you shouldn’t download! (I can say more about this later on when we know more about the attack vectors and the results of the malware – this is still pretty new and is evolving rapidly.) I hear from friends that Kaspersky and F-Secure are the best protection against virus-laden downloads – at least for Windows users.

The post The Exploitation of the Online Class appeared first on Sky's Blog.

]]>
https://blog.red7.com/the-exploitation-of-the-online-class/feed/ 0 431