Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

use Perl Log In

Log In

[ Create a new account ]

Alias (5735)

  (email not shown publicly)

Journal of Alias (5735)

Thursday January 11, 2007
08:04 PM

Want to run a threatnet bot for me?

[ #32124 ]

Next week is

One of the more interesting pre-conference occurances for me has been the surprising level of interest in ThreatNet (to be renamed very soon for trademark reasons).

With a number of other spam fighting methods starting to fail, people are on the lookout for new methodologies.

Which may well just mean that ThreatNet is no long ahead of its time.

How can you help me out?

Well, if you have access to a mail server (especially postfix, for which we have cut and paste settings), I'd really appreciate it if you were able to run an ammobot from now until the end of next week (the duration of LCA).

It's quick to set up and uses negligable resources (10meg of ram, no CPU and a few meg of bandwidth per day).

In particular, I'd very much like to be able to stand up at a lightning talk and show a rapidly scrolling list of events on the giant screen to the combined glitterati of the Linux world.

If you'd like help setting it up and testing, drop into Freenode #threatnet.

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • From the website:

    When a computer goes "bad" and starts to hurt others, the first member to spot it spreads the word to all the other members, who can protect themselves against the bad computer in advance.

    Urm... what if a bad computer starts to badmouth other, good computers? Soon enough, the whole of internet will go down, and that'll be the end of ThreatNet.

    I'm sure the blackhats will start attacking ThreatNet, as soon as it starts to be significant in fighting the zombie networks.

  • These are known issues of course.

    The operator of the network is responsible for securing the network.

    And there isn't going to only be one giant network of course.

    So it's more of an operational problem at this point, and we'll see how well things scale...