- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Apparently yours didn't educate you well at all, if you feel the need to rant profanely for no reason.
I don't have a problem, other than total morons wasting my time. Thanks for joining them.
Admin
+1 on the opinion that those students who responded to the original email with their account credentials should have been expelled for not having the minimum reading skills a University student should possess. If you make stupidity painless, you only encourage it.
Admin
That's so Gauling.
Admin
That's exactly what I tell anyone who threatens to ruin my credit. Especially the debt collectors. I mean what makes them think my credit is any good if they're calling me anyway?
Admin
Oops meant to reply to Kelly's comment.
Admin
Unfortunately, there are still a LOT of mailservers that accept by default, and bounce when they fail to deliver, plus a LOT of "virus scanners" that bounce messages when it fails a virus scan, and finally, a LOT of "antispam" that bounce a message because it appears to be spam or because the idiotic recipient has chosen to be a problem and use a whitelist.
Even if 99% of the world's mailservers check before accepting (and fail to accept), that 1% still causes a big problem due to the numbers.
The proper behavior is to fail to accept the message - return a permanent failure before the DATA stage. That way the sending mailserver can send the bounce back, and if it's properly set up to not be an open relay, will most likely go back to the originator. The exception are the bots that use the user's configured server to relay spam through. But those are a lot less common (as a single user sending thousands of emails a day... tends to be a red flag).
Of course, the worst solution I've seen are those "mailcheck" programs - they detect the email isn't on some whitelist, then they send back a challenge. These are the most annoying backscatter to receive - it means the recipient has decided to solve their spam problem by offloading it onto innocent third parties. (As I only receive them once in a while, I always do the challenge - it corrupts their whitelist and they get spam. And usually, I forward a nasty reply back calling THEM a spammer for sending unsolicited and unwanted email.
Greylisting works much better - whitelisted emails are sent through, and the rest are scanned. If it's obviously spam, it's dropped silently, if it's got the potential to be valid, it's bounced back (a trickle rather than a flood), or it's held by the server for the user to decide to accept or delete.
Admin
Why do that when you can send them something like
4030000010001234 5100000010001004 or 6011500080009080
They're all perfectly valid test credit cards. If they try to use them, one of two things will happen:
Admin
md %RANDOM% (at least on Win boxes)
Admin
The right answer is: 4) md 1xr2pdceglees2s61a45nh3oe7dx7nmi66a6xkf
That was generated by a series of coin flips, and guaranteed to be random!!
http://forums.thedailywtf.com/forums/p/9836/179015.aspx#179015
Admin
You've nailed it, Chris. Couldn't agree more. That's also one of the reasons why so many people voted Bush for the second term.
Admin
The biggest problem is that people somehow vindicate their non-reading of "long" text by (choose one or more options):
I am generally sorry for the wicked minds which raise such "arguments" (and those in similar vein).
Cheers, Kuba
Admin
This is actually a great idea. I'm dead serious. Otherwise people will never learn. It's like with small children -- either you give them timeout/take their "treats" away/whatnot, or they just pretend nothing happened...
Admin
Dear students,
Again I must emphasize you should never send any information via email. Doing so may result in illegal activity.
At campus security, we will actively scan for your private information and protect you.
Please acknowledge your receipt and understanding of this email by filling out the form below:
Name (first, last): Social security number: Date of Birth: Mother's maiden name: Drivers license number: Checking account routing number: Checking account number:
Thank you, and remember to surf safe,
-Hackz0rs
Admin
Udders?
Admin
In my community's local school district, the tech coordinator sent an example email to all staff almost identical to this one instructing staff and teachers to never send their username and password to anyone via email. Later that day I encountered one of the staff who complained of having a problem logging on. Turned out they were trying to reply to the email by filling in their username and password in the original message. Having to explain the intention of the email turned out to be quite difficult.
Admin
What makes you think the incoming message comes from a fully functional and standard MTA? The zombie just goes on to the next, maybe even logging the bad receiving server and moving on to a new server.
Admin
Sorry I'm late folks, I hope my account didn't get deleted... ok here it is:
Username: PhishFan Password: YouEnjoyMyself12-9-95 (one of the best YEMs ever, complete with a silent jam in the middle, from the raging Fall '95 tour)
Admin
username: licensed password: 123
(anyone who remember this will win a free dinner with the Irish girl)
Admin
You sometimes wonder how those people manage to not forget to breathe during the course of their day, slip on their own saliva, hit their head on the edge of the table and die, and most of all how absolutely terrifying the future is.
Admin
Admin
Wow, now THAT is pretty scary isnt it? Wussup with people now days?
Jess http://www.Ultimate-Anonymity.com
Admin
Admin
Actually, the paper does not claim that there is no correlation, just that they did not find any. Given the size of their study (22 persons) and the way they recruited the participants (getting volunteers for $15), that is not all that surprising.
Admin
I've seen mailboxes crushed under a pile of NDRs myself (first time it happened to me was in 2001, when I was still on dial-up) - but around 95% of these were from antivirus gateways helpfully informing the "sender" that the message was infected.
Admin
All I gotta say: self-pwned And now, face the camera and tell the world, "No, I am NOT smarter than an internet troll."
Admin
That's great, except most spammers don't use their actual e-mail addresses to send the spam. In fact, the From and Reply To addresses are usually spoofed. So the person who gets inundated with NDRs is most likely another innocent luser who has no idea where all the returned mail messages are coming from.
Admin
I got several thousand emails like that a few days ago. Apparently a spammer used my email address.
I periodically think that a fun thing to do would be to track down the real email of a spammer -- they must provide some means to contact them for the gullible idiots who actually want to buy their products -- and then post this information on a number of web sites, replicated many times. Get hundreds of sites to post the spammers email addresses. Provide an automated mechanism to keep the list updated. Then the other spammers automated trolling programs would find them, and start sending spam to the spammers. Maybe if we could get them tied up spamming each other, they'd burn themselves out.
Admin
In a blaze of gory.. er.. glory.
Admin
These comments illustrate EXACTLY why developers should not be UI Designers.
The original problem was NOT the users' fault, it was down to the layout of the original email. Usability studies (by Niesen et al) have shown that people do not read email newsletters/web pages word by word, rather, they scan. It is also well known that users do not read instructional text, rather they attempt to complete the task at hand first.
Thus it is perfectly logicial that people would respond to the email, as it would have been from a trusted source, and the salient area requests a username and password.
Admin
a story much like this happened at my university....
Admin
Welcome to 五島列島 Welcome to 水産加工 Come to 牡蠣 Come to きびなご
Admin
厚木 不動産 戸塚 不動産 横浜 土地
Admin
横浜 土地 神奈川 ホームページ制作 ホームページ制作 神奈川
Admin
湘南 不動産 藤沢 不動産
Admin
平塚 不動産
Admin
二宮 不動産
Admin
相模原 不動産
Admin
藤沢 不動産
Admin
A similar situation occurred at the university I work at (developing software for researchers). The admin took a slightly different approach though, and locked down the accounts of people who had returned their details, resetting their passwords only after making them visit him in person, to receive a rather stern verbal warning...
Admin
I'm sad to say my University had the same issue. I wept for the fate of mankind that day.
Admin
I see nothing wrong with ignoring certificate error - at least not in the way it is presented in the article. My line of thought would be: "okay, certificate is not correct so I won't enter any private information, but I want to / should see what is this page", clicks link in the email "aw shit, address looks wrong / suspicious, let's just leave".
Admin
chloroquine malaria https://chloroquineorigin.com/# dosage for hydroxychloroquine
Admin
cialis 20mg https://cialiswithdapoxetine.com/
Admin
pharmacies en ligne certifiГ©es http://kamagraenligne.com/# pharmacie en ligne avec ordonnance