babbage's Journal babbage's use Perl Journal en-us use Perl; is Copyright 1998-2006, Chris Nandor. Stories, comments, journals, and other submissions posted on use Perl; are Copyright their respective owners. 2012-01-25T02:16:20+00:00 pudge Technology hourly 1 1970-01-01T00:00+00:00 babbage's Journal Anti-blog spam efforts <p>So, anecdotally, it looks like <a href="">Google's anti-blog-spam campaign</a> may be working. A handful of easy changes to <a href="">my home blog</a> seems to have helped tremendously: </p><ul> <li>I looked over <a href="">Google's plan</a>, and <a href="">Movable Type's recommendations</a>.</li> <li>I added the <a href="">Movable Type implementation of the "nofollow" plugin</a> </li><li>I renamed all the MT CGI scripts so that spammers have to actually look to find the comment URL.</li><li>I added a new script at the old comment &amp; trackback URL:<blockquote><div><p> <tt>#!/usr/bin/perl -wT<br>print "Content-type: text/plain\n\n";<br>1</tt></p></div> </blockquote></li> <li>After noticing that the spammers all seem to have a referer of <tt>"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2;<nobr> <wbr></nobr>.NET CLR 1.1.4322)"</tt>, I added the following code to the comment script:<blockquote><div><p> <tt>sub squash_spammers {<br>&nbsp; &nbsp; my $agent&nbsp; = $ENV{'HTTP_USER_AGENT'} ||= "";<br>&nbsp; &nbsp; my $referer = $ENV{'HTTP_REFERER'} ||= "";<br>&nbsp; &nbsp; if ( ( $agent =~ m/NET CLR 1.1.4322/ ) ||<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;( $referer =~ m@\.info/$@ ) )<br>&nbsp; &nbsp; {<br>&nbsp; &nbsp; &nbsp; # print "Content-type: text/plain\n\nsorry\n";<br>&nbsp; &nbsp; &nbsp; &nbsp; die "Sorry, this is a spam-free zone. $!";<br>&nbsp; &nbsp; }<br>&nbsp; &nbsp; return;<br>}</tt></p></div> </blockquote><p>This is now called in the <tt>eval</tt> block that does the rest of the work for the comment script, so attempts to spam me automatically fail. If I need to add more criteria, I can hook them in as needed, but these two rules seem to have caught everything so far.</p></li></ul><p>Since making these changes, things have gotten <i>much</i> better. I've had <i>no</i> comment spam this week (usually, a handful makes it past the <a href="">comment spam plugin</a>), and more strikingly, the amount of referer traffic -- requests for random URLs with referer fields like "<tt></tt>" -- has almost, if not quite entirely, disappeared. This is wonderful.</p><p>We'll see how well it's working a month from now though<nobr> <wbr></nobr>...</p> babbage 2005-01-24T00:17:44+00:00 bugs Freeware video rotation options? <p>Dear Aunty <tt>use.perl;</tt> </p><p>Like many people, my wife and I have digital cameras that can record short mpeg video files in addition to traditional jpeg stills. Like any still camera, taking photos with the camera held vertically is a perfectly conventional thing to do, if the subject matter being photographed would be better framed that way. Caught up in the moment though, we've also got some video files that were shot this way, and fixing these is proving to be much harder to correct. Does anyone know of a good, relatively painless way to rotate video files so that they're right side up? As video-capable digital cameras become more common, this is a feature that I'd assume an increasing number of people will want.</p><p>I'd prefer some kind of freeware approach to this, but so far haven't found anything that seems like it will help. It seems like ImageMagick <a href="">might be the most promising tool</a>, if I can get the mpeg2vidcodec_v12 plugin working on my Mac (lots of <tt>make test</tt> errors so far...), but even then will it be as simple as a <a href=""> <tt>convert -rotate 90 &gt;</tt> </a>? So far, I can't even get to that point with the IM toolkit. <a href="">CinePaint</a> (nee FilmGimp) didn't seem to want to open *.MOV files to begin with, which confused me as I thought that was the whole point of CinePaint. I've also looked into <a href=";group_id=5776">mjpegtools</a>, <a href="">mpgtx</a>, <a href="">VirtualDub</a> and <a href="">TMPGenc</a>, but none of them seems able to do rotate the contents of video files. I <i>was</i> able to open a sideways video file as a series of hundreds of separate still images in <a href="">Adobe ImageReady</a>, but even with that program's automation tools (and my admittedly shaky grasp of how to use them), rotating them all &amp; stitching it back into one file seems like it'll be annoying. I've also tried Apple's iMovie, but it seems to be geared towards stitching together a collection of video clips rather than manipulating the contents of any given clip in any significant way. I don't have any other commercial software available, and am not that interested in shelling out possibly hundreds for the kind of "pro" software that might work but would be overkill for my usual needs. </p><p>As an added bonus, it would be nice to be able to convert individual frames to JPEGs for making thumbnails, or ranges of frames into low-resolution GIF/MNG animations. I have a hunch that the ability to do that may fall out of any solution to the bigger problem, so I'm putting off worrying about this for now, but would like to be able to do it eventually.</p><p>Does anyone know of a good way to rotate video files? I realize that the proportions of the converted file will be "wrong", but I don't care -- they're low resolution files meant only for viewing on my computer or maybe a web page, and if I ever want to put the files on a television screen then I can just put up with the vertical letterboxing. So far, the only approach that seems to have any traction at all is to find a way to treat the file as individual frames, rotate one by one, then stitch it back together -- but that seems annoying, particularly if the file also has an audio component that has to be kept track of. Still, for lack of tools to do it any other way, that's the best approach I've been able to come up with. Can anyone suggest something better?</p> babbage 2003-12-13T16:34:11+00:00 wishlist "software security device"? <p>Dear aunty <tt></tt>, </p><p>Does anyone here understand how Mozilla / Firebird's current security module system works? In particular, does anyone know what's up with the "software security device"? </p><p>My fiancee's computer -- a WinXP laptop with no user account passwords (it's just two of us using it, and we trust each other) -- keeps throwing these annoying dialog windows demanding that you "Please enter the master password for the Software Security Device." whenever you take Firebird to a web page with a username &amp; password. </p><p>The catch though is that no password I can think of as a likely candidate works. A bit of <a href=";sourceid=mozilla-search&amp;start=0&amp;start=0&amp;ie=utf-8&amp;oe=utf-8">Googling</a> points to a couple of <a href="">semi-promising solutions</a>, and while all the ones I've found so far talk about Linux, the general description of the issue seems to be spot on. The workaround -- enter the Linux login account -- doesn't seem to apply here: there is no Windows system login for this account, and leaving the password field blank doesn't work either. </p><p>Following on from the Mandrake advice, I tried opening up Firebird's dialog window for the security device settings (go to <tt>Tools -&gt; Options</tt>, then <tt>Advanced -&gt; Certificates -&gt; Manage Security Devices</tt> [there's a disclaimer that this is subject to move around in future releases]). This brings up a cryptic dialog window with the "Device Manager" (yay! trusted computing IN OUR TIME), with a hierarchy of cryptically labelled "Security Modules and Devices" on the left (e.g. <tt>NSS Internal PKCS #11 Module -&gt; Software Security Device</tt>), some cryptic "details" and "values" in the middle panel, and a column of cryptic buttons over on the right. (For a crypto system, they've got being cryptic nailed<nobr> <wbr></nobr>:-/ ). </p><p>With those right-side buttons, three seem to do with managing what appears to be the equivalent of OSX's Keychain ("<tt>Login</tt>", "<tt>Change Password</tt>", and "<tt>Load</tt>"), but again if you click on any of those you get asked for the master password -- the lack thereof being the rabbit I'm chasing down this hole. There's also a button labelled "<tt>Enable FIPS</tt>", but there seems to be no indication of what happens when you click it or what FIPS stands for (if in fact it's an acronym in the first place). </p><p>Hilariously, there's also a "<tt>Help</tt>" button on the bottom of the dialog, but it doesn't seem to be hooked up to anything. Har har har. </p><p>---- </p><p>So, the QUESTION: </p><p>Where did this thing come from, and how can one either fix or disable it? If it's like Keychain, and provides some kind of encrypted safekeeping for sensitive form data, I have no problem with doing it "right" and working logged into the subsystem. As it is now though, it's just getting in the way, and I can't figure out how to reliably get it to go away and stay away. </p><p>I say "reliably", because on some sites I get the dialog almost every time I follow a link, while on others it's just at the initial login -- I assume that this has to do with how accounts are being managed on the server, but haven't been ablle to pin down what's going on there. One annoyance per site I could deal with, but repeating it all the time like this is really getting on my nerves... </p><p>Any help wins an ice cream cone -- TIA<nobr> <wbr></nobr>:-)</p> babbage 2003-10-16T00:30:09+00:00 mozilla Suggestions for photo gallery sites <p>I have a loosely organized directory tree of photos on my site. I'd like a nicer way to present these than simple Apache directory listings, but I'd rather reuse existing code (even if possibly modifying code, templates &amp; stylesheets) than start from scratch. I've poked around a bit, but nothing I've seen seems to quite meet the rough criteria I have in mind. For people that have photo galleries on your sites, are there good solutions available from somewhere like CPAN or Sourceforge?</p><p>Ideal functional criteria that I'm looking for:</p><ul> <li>Easy, automatic. If I transfer a new directory of image files from my camera to, say,<nobr> <wbr></nobr><tt>/web/htdocs/photos/2003/08/09/</tt> (or something more descriptive like <tt>09_roadtrip</tt> or <tt>09/roadtrip</tt> etc), then this should become visible at an associated url with no additional setup work required, complete with thumbnails, titles, maybe an image resize feature, and other page decoration.</li><li>Listings should allow for visitor comments. If I put up a directory with 100 photos from a relative's wedding, I don't want to be forced to fill in the details for what every image depicts -- but if visitors want to add that that's fine with me.</li><li>Categorization: There should be an optional way to add metadata, so that for example if I or a visitor indicates that a given picture is of a certain person, place, or event, then visitors should be able to browse or search within that category. Ideally, index level pages should be aware of the categories associated with images in that section, and users should be able to follow links back &amp; forth between (say) a directory hierarchy focused organization of links and a category focused organization.</li><li>Something able to run mod_perl1 would be ideal. PHP would be tolerable if the package were very nice (I might as well learn PHP sooner or later...), but given the choice between a "C+" mod_perl application and a "B+" PHP one, I'll probably go with mod_perl. Anything written in Python / Ruby / TCL / Scheme / Bourne / Zope / compiled-C would get a silly look but not necessarily be ruled out. Anything in ASP or JSP is straight out.</li><li>I'm not worried about most internal or external dependencies. That is, having to pull in modules from CPAN is fine with me, as is depending on Imagemagick. If it uses a templating system (Mason, Template Toolkit, or HTML::Template) that's great with me; if layout is done with CSS/XHTML1+, that's even better. I don't mind if the application depends on an external MySQL or PostgreSQL database, or some other storage layer (DBM, XML, text files, etc).</li></ul><p>Most of the ones I've looked at seem okay, but not overwhelmingly so. The comment feature, which really appeals to me, doesn't seem to be available in most of the packages I've looked into. The main exception I can think of is a Movable Type based photoblog, which does well with comments but is cumbersome in other ways -- images have to be added one at a time, and as far as I can tell only the site owner can do anything with categories or other metadata.</p><p>The best photo sites I can think of are on a couple of different people's personal sites, but it isn't clear to me if the examples I've seen were custom written or if there's some great, uncredited gallery toolkit out there that these people are taking advantage of.</p><p>Here's some of what I've looked into so far:</p><ul> <li>I've tried setting up a photoblog with Movable Type, and this is okay, but it seems like you have to add images one at a time. Additionally, the tutorials I've seen so far seem to revolve around uploading images through the browser, but I have access to put them there via <tt>scp</tt> or similar. Whether or not that's a real constraint of MT photoblogs, it still seems like the intended workflow is backwards from my point of view: select an image &amp; offer it up for review &amp; comment, rather than put up an array of images &amp; allow people to comment on any they happen to find interesting. While the MT one I've tried seems okay for the occasional exceptionally good image, organizing everything this way is much more work than I have in mind here.</li> <li>I've given Apache::Gallery a try, but from the sample sites linked from <a href=""></a>, none seem to be much fancier than the file browser in Nautilus or recent versions of Windows Explorer: it's still mainly a list of directories &amp; thumbnails, with some metadata, but no categories, no comments, etc. Mason Gallery, as demonstrated at <a href=""></a> and distributed at <a href=""></a>, seems to have the same default qualities &amp; limitations: prettified directories but no comments, categories, etc.</li><li>Randal Schwartz's site at <a href=""></a> looks nice (if a bit more "Star Trek: The Next Generation" than I would have gone for, but no matter<nobr> <wbr></nobr>:), but it doesn't seem to have categories or comment mechanism. Paul Mison's "Stem" site at <a href=""></a> looks pretty nice, and seems to have the functionality I want: thumbnails, categories, and comments. However, I can't tell how automatic everything is: the thumbnails are tidily cropped squares from rectangular originals, and most (all?) of the images have the title superimposed somewhere in the image. Both of these neat features seem like they'd have to be at least partly manual to me. In any case these two sites are the property of their owners, and I don't know if either of them intends to share the underlying code.</li></ul><p>So, of those that have photo sites, what publically available tools work well?</p><p>Thanks for any suggestions<nobr> <wbr></nobr>:)</p> babbage 2003-08-09T22:33:20+00:00 tools Office. It's good for shit. Is it me, or is <a href="">this man</a> (mirrored <a href="">here</a>, but please be merciful of my limited bandwidth) demonstrating that the best place to use office is, well, you "other" office? babbage 2003-07-11T14:08:02+00:00 releases Can't launch the .pkg for new iChat What's with this? The<nobr> <wbr></nobr>.dmg disc image file for the new iChat beta generates a<nobr> <wbr></nobr>.pkg installer for the new version, but when I open it the thing just flickers in the dock before going away without having done anything. If I tail the logs in, I see<blockquote><div><p> <tt>2003-06-23 23:04:11.366 Installer[7012] Unable to load nib file: PagedInstaller.nib, exiting</tt></p></div> </blockquote><p>I don't get it. There's no<nobr> <wbr></nobr>.nib files inside the<nobr> <wbr></nobr>.pkg directory, but I'd think that if there should be it would be part of the distribution, and apparently other people have been able to get the thing installed. Is this somewhere else on my computer then? It's not in either of my personal ~/Library or the system-wide<nobr> <wbr></nobr>/Library or<nobr> <wbr></nobr>/System/Library directories. Google has no idea what a "pagedinstaller" is, and neither do I. </p><p>Has anyone else seen a bug like this? </p><p> <b>Workaround found:</b> Based on a discussion at <a href=""></a>, I found out that<nobr> <wbr></nobr><tt>/usr/sbin/installer</tt> (see <tt>man installer</tt>) provides a command line interface:</p><blockquote><div><p> <tt>% sudo installer -pkg ~/Desktop/iChatAVBeta.pkg -target<nobr> <wbr></nobr>/<br> Password:<br> installer: Package name is iChat AV Public Beta<br> installer: Installing onto volume mounted at<nobr> <wbr></nobr>/.<br> installer: The install was successful.<br>%</tt></p></div> </blockquote><p>Not that that resolves the original question, but now [a] iChat is upgraded, and [b] I have a more "natural" (to me) way to install<nobr> <wbr></nobr>.pkg applications. So I'm mostly happy now...</p> babbage 2003-06-24T03:11:15+00:00 apple ;login: I've just received a copy of the June 2003 edition of<nobr> <wbr></nobr><a href="">;login:</a>, Usenix &amp; Sage's journal.<p>My <a href="">writeup</a> of the MIT Spam Conference is on page 65<nobr> <wbr></nobr>:-)</p><p>It looks like the permanent URL of the article will be <a href=""></a>, but that won't work until the next issue after this one comes out.</p> babbage 2003-06-24T02:46:21+00:00 books *cough* *weezer* *cough* Anna one --<blockquote><div><p> <i> OOO weee ooh I hack Perl like Buddy Hobbit...<br> Oh oh and you're Galadriel<br> I don't care what they say about this stupid ring<br> I don't care 'bout that </i></p></div> </blockquote><p> Anna two --</p><blockquote><div><p> <i> What's with these Ringwraiths, dissing my Shire?<br> Why do they gotta front?<br> What did we ever do to these guys<br> That made them so violent?<br> My-pre-cious, but you know I'm yours<br> My-pre-cious, and I know you're mine<br> My-pre-cious, and that's for all time<br> </i></p><p><i> Oo-ee-oo I look just like Bilbo Hobbit<br> Oh-oh, and you're Galadriel<br> I don't care what they say about this stupid ring<br> I don't care bout that<br> </i></p><p><i> Don't you ever fear, I'm always near<br> I know that you need help<br> Your tongue is twisted, your eyes are slit<br> You need Gandalf the Grey<br> My-pre-cious, but you know I'm yours<br> My-pre-cious, and I know you're mine<br> My-pre-cious, and that's for all time<br> </i></p><p><i> Oo-ee-oo I look just like Bilbo Hobbit<br> Oh-oh, and you're Galadriel<br> I don't care what they say about this stupid ring<br> I don't care bout that<br> I don't care bout that<br> </i></p><p><i> Bang, bang a knock on the door<br> Another big bang and you're down on the floor<br> Oh no! How do we feel?<br> Don't look now but I missed my meal<br> I can't run and I can't kick<br> What's a matter Bor' are you feeling sick?<br> what's a matter, what's a matter, what's a matter you?<br> What's a matter Bor', are you feeling blue? oh-oh!<br> And that's for all time<br> And that's for all time<br> </i></p><p><i> Oo-ee-oo I look just like Bilbo Hobbit<br> Oh-oh, and you're Galadriel<br> I don't care what they say about this stupid ring<br> I don't care bout that<br> I don't care bout that<br> I don't care bout that<br> I don't care bout that<br> </i></p></div> </blockquote><p> Anna three --</p><blockquote><div><p> <i> My name is Frodo<br> I'm carrying the ring<br> Thanks for all who've read us<br> But now we're in movies!<br> Come sit next to me<br> Pour yourself some tea<br> Just like Bilbo made<br> Before he ever found rings<br> Things were better then<br> Once but never again<br> We've all left the den<br> Let me tell you 'bout it<br> </i></p><p><i> The Fellowship left right on time<br> Ringbearing costs only your mind<br> The Wizard said, 'Hey man, we go all the way'<br> Of course we were willing to pay<br> </i></p><p><i> Our name is Smeagol<br> We gotta pocket full of your fishes<br> They're fresh out of water<br> But they're still makin' wishes (makin' wishes)<br> Tell us what to do<br> Now that Orcs have come --<br> Now with Elephants!<br> And you know what else?<br> Guess what we received<br> Out of Mordor today<br> Words of deep concern<br> From my little pressioussesss<br> </i></p><p><i> In Rohan it's not going as we planned<br> Their warlord has fallen betranced<br> The great Ents will not clear a path<br> The wizard swears he learned his math<br> </i></p><p><i> The Uruk-hai are leaving home<br> The Uruk-hai are leaving home<br> The Uruk-hai are leaving home<br> The Uruk-hai are leaving home<br> No!<br> </i></p><p><i> The Uruk-hai are leaving home<br> The Uruk-hai are leaving home<br> The Uruk-hai are leaving home<br> No! No! No!<br> </i></p><p><i> My name is Frodo<br> </i></p></div> </blockquote><p> Anna okay I'll stop now<nobr> <wbr></nobr>:-) </p><p>Really though, I think I would have actually liked all the singing bits in LOTR if they'd been done to some kind of crunchy AC-DC/Ramones/Weezer guitars. Nevermind the Boll^H^H^H^HZeppelin, a quick glance at Weezer's lyrics shows lots of places for funny LOTR riffs...<nobr> <wbr></nobr>:-)</p> babbage 2003-06-19T06:14:16+00:00 wishlist Buffy ends Okay, Buffy is over.<p>Can we please finish Perl 6 now?</p> babbage 2003-05-21T04:44:12+00:00 damian Spam Conference notes <blockquote><div><p> <b>Update</b>: A condensed version of this writeup appeared in the <a href="">June 2003</a> issue of<nobr> <wbr></nobr><a href="">;login:</a>, the magazine of Usenix &amp; SAGE. I'm a happy camper<nobr> <wbr></nobr>:-) A <a href="">PDF of the article</a> has been made available.</p></div> </blockquote><p>I was waiting for the review to show up on Slashdot, as the conference was really good. The audio proceedings have been <a href="">put online</a>, but I'm not sure if they can take a Slashdotting, so please be gentle<nobr> <wbr></nobr>:) If you have 8 hours to spare, the whole day was pretty good &amp; worth listening to, but the schedule as planned isn't exactly the sequence people spoke in, so you may have to jump around the RealAudio stream a little bit.</p><p>Turning my notes for the day into something vaguely coherent, here are some hightlights from the proceedings. There are a couple of speakers that I didn't write anything down for, but from mid-morning on this should be pretty comprehensive. Apologies in advance if my notes lead me to attribute certain comments to the wrong speaker -- if anyone notices any mistakes please feel free to add corrections: </p><ul> <li> <p>Bill Yerazunis - CRM114 &amp; MailFilter</p><p>Because Perl "freaks him out", Yerazunis came up with the CRM114 minilanguage (points for anyone that gets the joke in the name without googling for it<nobr> <wbr></nobr>:), then wrote MailFilter in CRM114 as an implementation of a filter that can be used with Procmail or SpamAssassin or what have you. The basic idea is to decompose a message into a set of "features" composed of various permutations of single words, consecutive words, words appearing within a certain distance of one another, etc, such that the set of features N is very much bigger than the set of words X. You then analyze the features in various ways and if you get above a certain arbitrary threshold, you flag the message as spam &amp; handle it accordingly.</p><p>He claimed that with this software he could get better than 99.9% accuracy in nailing spam, and a similar percentage in avoiding "ham" (the term everyone was using for false positives -- legit mail that was falsely identified as spam). One of Yerazunis' observations is that the best way to defeat the spam problem is to disrupt the economics: if a 99.9% or better filter rate were to become the norm, then the cost of delivering spam can be pushed higher than the cost of traditional mail and the problem will naturally go away without requiring legislation (which would be nice anyway, but we can't count on it).</p><p>The drawback of CRM114/MailFilter is that it can only handle about 20k of text per second, so it's not appropriate for large scale use yet. Still an interesting project to watch though: <a href=""></a> </p></li><li> <p>John Graham-Cumming - POPfile</p><p>Most of his very entertaining talk was about the ingenious tricks that spammers resort to to obfuscate spam against filters, including most diabolically one example that placed each column of monospace text in the message into an HTML column, so that the average HTML-capable mail client would render the message properly, but it would be absolute gibberish to most mail filters. The ultimate lesson was that any good filter has to focus not on "ascii-space" (the literal bytes as transmitted) but the "eye space" (the rendered text as seen by the user), which by extension may mean that any full scale spam parser/filter could also have to include a full-scale HTML &amp; Javascript engine. Yikes!</p><p>As for Graham-Cumming's software, it's a Perl application, available for all platforms (Windows, Mac, &amp; of course Linux) that allows users to filter POP3 mail. Interesting stuff if you're a POP user: <a href=""></a> </p></li><li> <p>John Draper - ShopIP</p><p>Most of Draper's work seemed to be focused on profiling spammers, as opposed to profiling spam itself, by throwing out a series of honeypot addresses &amp; using data collected to hunt down spammers. <a href=""></a> </p></li><li> <p>Paul Judge, CipherTrust</p><p>Judge's big argument, which no one really disagrees with, is that spam has become not just a nuisance, but an actual information security issue. To that end, he is advocating much more collaborative effort to address the problem than we have seen to date: conferences like this, mailing list discussions, better tools, and public data repositories of known spam [and ham]. To that last point, one of his observations (which others made as well) was that there are no universally agreed on standards for what qualifies as spam, so repositories for spam will not be accurate for all users (spam for your programmers will be the bread &amp; butter of your marketing department, etc). Plus, there are obvious privacy issues in publishing your spam &amp; ham for public scrutiny. And to add another wrinkle, one danger of public spam/ham databases is that spammers can poison them with false data, screwing things up for everyone. That said, he encouraged users to help out with building <a href=""></a>. </p></li><li> <p>Paul Graham</p><p>The man who organized the conference and kicked everything this week off with his landmark paper from last fall, <a href="">A Plan for Spam</a>. Graham's spam filtering technique famously makes use of Bayesian statistics, a technique popular with nearly all of the speakers. The nice thing about a statistical approach, as opposed to heuristics, simple phrase matching, RBLs, etc, is that they can be very robust &amp; accurate; the down sides are that they have to be trained against a sufficiently large "corpus" of spam (most techniques have this property though) and they have to be continually retrained over time (again, this is common). Graham was too modest to produce numbers, but subjectively his results seemed to be even better than what Yerazunis gets with MailFilter, by an order of magnitude or more.</p><p>Like other speakers, he predicted that spammers are going to make their messages appear more &amp; more like "normal" mail, so we're always going to have to be persistent about this -- as one example, he showed us an email he received IN ALL CAPS from a non-English speaker asking for programming help, and although it was legit, the filters insisted otherwise. "That message is the one that keeps me up at night."</p><p>Everyone interested in the spam issue should go read Graham's paper immediately.</p></li><li> <p>Robert Rothe, eXpurgate</p><p>Rothe works for Eleven, an ASP company from Berlin selling a spam management service/application called eXpurgate. His talk was short on details about how the tool worked (mainly that it searches for bulk mail), focusing instead on the high level functionality it provides to users -- basically, they classify mail as safe, questionable, or dangerous, and let the users handle them accordingly. Another speaker that sees spam as a network security issue, so they built their system accordingly, with privacy of the client's mail content in mind etc.</p><p>Like many speakers, he warned about the dangers of an anti-spam "monoculture": that Bayesian techniques might be great, but if that's all anyone uses then spammers will catch on and adjust their messages to look more like normal mail, to the point that Bayesian filters won't work anymore. As a result, we're going to need to attack the problem from several angles, using different techniques, to keep the spammers off balance as much as possible. </p></li><li> <p>Matt Sergeant, SpamAssassin</p><p>SA is a well known Perl application for heuristically profiling messages as spam, adding headers to the message saying for example "I am 72% sure this is spam because it has X Y Z", and passing off the message to procmail or whatever to be handled accordingly. SpamAssassin can handle a message throughput great enough that it can be deployed at the network level (whereas some of the others, which might have somewhat better hit rates, are still too inefficient at this point). Deployed this way, the differences in effectiveness for single vs. multiple users becomes very apparent, as 99% effective rates fall down into the 95-80% range. This happens because, again, different users define different things as spam, so mapping one fingerprint to all users can never work quite right. For an example of a tool that your company can deploy right now &amp; get fast, decent results, SA looks like a good choice; but for the long run it looks like a Bayesian technique is going to get better performance, and SA is adding a statistical component to its toolkit. Good talk.</p></li><li> <p>Barry Warsaw, Python Labs</p><p>This was another example of the "monocultures are dangerous" philosophy, as Warsaw explained how he is helping to use a variety of anti-spam techniques -- from clever Exim MTA configuration to good use of Spam Assassin &amp; Procmail to fine tuning of the MailMan mailing list engine -- to work together to manage the spam problem for all things Python (, Zope, many mailing lists, a few employees, etc).</p><p>He pointed out that some very simple filters can be surprisingly effective: run a sanity check on the message's date; look for obviously forged headers; make sure the recipients are legit; scan for missing Message-Id headers; etc. In response to the person that originally posted the article, yes, he did mention blocking outgoing SMTP as an effective element of a many tiered spam management approach.</p><p>Among other tricks for getting the different filtering tiers to play nice together, they make heavy use of the X-Warning header so that if an alarm goes off in one tier of their mail architecture, other components can respond appropriately. Cited projects included <a href="">ElSpy</a> and <a href="">SpamBayes</a>.</p></li><li> <p>Barry Shein, founder &amp; CEO of The World -- or as he laughingly put it, "President of the World". Har har har</p><p>This talk was mostly a let down for me -- Shein has made his views <a href="">very well known</a>, and his ranting, rambling talk didn't really introduce any new ideas for anyone that had read that interview (some good jokes &amp; quotes though).</p><p>His core argument is that spam is "the rise of organized crime on the internet", that filters are nice but that the mail architecture itself is fundamentally flawed, and that ISPs like his -- in 1989, The World was the world's first dialup ISP -- are being killed by the problem. Shein was very annoyed that all these talented people are having to clean up a mess like this when we should be out working on more interesting stuff, and not having to worry about this issue. His big hope seemed to be that legislation will someday come to the rescue, but he sounded very pessimisstic. (Others in the room seemed to feel that this was a very interesting machine learning problem, and weren't really fazed by his pessimism -- but then most of the people in the room don't run ISPs.)</p><p>He also suggested that we need to find a way to make spammers pay for the bandwidth they are consuming (rather than having users &amp; ISPs shoulder the burden) but didn't seem to know how we might go about implementing this. At all.</p><p>Fun rant to cheer along to, but for me it wasn't very constructive in the end.</p></li><li> <p>Jean-David Ruvini, eLabs SmartLook</p><p>This was an interesting product. Ruvini's company is developing an extension to Outlook 2000 &amp; XP that will watch the way users categorize messages into folders, come up with a profile for what kinds of messages end up in which folders, and then try to offer similar categorization on an automatic basis. Think of it as Procmail for Outlook, without having to mess with (or even be aware of!) all the nasty recipies.</p><p>Obviously if you have a spam folder, then spam will be one of the categories it looks for, but more broadly it will try to categorize all your mail as you would ordinarily categorize it. This makes SmartLook a broader tool than "just" a spam manager.</p><p>SmartLook is another statistical filter, though it uses non-Bayesian algorithms to get results. eLabs' tests suggest that the product is able to properly categorize messages about 96% of the time, with no false positives, and (for their tests, mind you) that it performed better than Bayes filters over three months of usage. </p><p>One nice property of this tool was that it works well with different [human] languages -- some strategies fall apart &amp;/or need retraining when you switch from English to some other language. For certain markets (eLabs seems to be a European company, perhaps French?) this is a crucial feature, and having a tool that works with one of the biggest mail clients out there (most people don't use Mutt or Pine, sadly enough) can be very valuable. Very clever -- watch for the inevitable embrace &amp; extend three years from now.</p></li><li> <p>Eric Raymond</p><p>He didn't say anything about guns, but he did try to correct one of the other speakers for misusing the term "hacker."</p><p>Like Graham, ESR is a Lisp fan, but he knows that the vast majority of people aren't, and he also knows that the vast majority of people need to be using something like Graham's spam software. So on a lark, he came up with a clean version in C, named it BogoFilter, and put it on Sourceforge, where a community sprung up to, well, embrace &amp; extend it.</p><p>As good as Graham's Bayesian algorithm is, ESR felt -- as did many of the other speakers -- that the nature of your spam/ham corpus is much more significant than the relative difference among any handful of reasonably good algorithms. (Back to the often repeated point about how corpus effectiveness falls apart when used for a group of users, as opposed to individuals.) To that end, he strongly feels that the best way to deal with the spam problem is to get good tools into the hands of as many people as possible, and to make them as easy to use as possible (ahh, the old "open source UIs always suck" argument<nobr> <wbr></nobr>:). As an example, one of the first things he did was to patch the Mutt mail agent so that it had two delete keys: one for general deletion, one for "get rid of this because it's spam." That second key, and interface touches like it, seem like the way to get average people to start using filters on a regular basis.</p></li><li> <p>Joshua Goodman, Microsoft Research</p><p>Unlike ESR, Goodman felt that algorithm selection does make a big difference, but this being Microsoft he refused to disclose what algorithms his team is working with -- except to say that, when delivered, they will be more accessible for average users than SpamAssassin, Procmail recipies, or Mutt<nobr> <wbr></nobr>:)</p><p>Microsoft has been working on the spam problem since 1997, but because of how big they are they've had unique problems in bringing solutions to market. As a case in point, they tried to introduce spam filters to a 1999 Outlook Express release, but were immediately sued by email greeting card company Blue Mountain because their messages were being inaccurately categorized as spam. With that in mind, they have been very reluctant to bring new anti-spam software out since then because they would like to see legislation protecting "good faith spam prevention efforts."</p><p>As a very large player, Microsoft faced certain difficulties in developing useful filters -- it may make sense for you as an individual to filter all mail from Korea, but this doesn't work so well if you are trying to attract customers *from* Korea<nobr> <wbr></nobr>:). This has forced them to put a lot of work into thoroughly testing different strategies before offering them to the public.</p><p>In spite of what millions of webmail users may have expected, Hotmail &amp; MSN are currently being filtered by Brightmail's service, and plans are underway to reintroduce spam management features to client side software again. (Just imagine how bad it would be if they weren't paying someone to filter for them! Unfortunately, no hecklers piped up to ask if they are really selling Hotmail's user database to spammers, and if that is a source of annoyance for his team.)</p><p>An interesting barrier his group has had to grapple with was what he called the "Chinese menu" or "madlibs" spam generation strategy: that it's easy to come up with a template for spam -- "[a very special offer] [to make your penis bigger] [and please your special lady friend all night!" vs. "[an exclusive deal] [for genital enlargement] [that will boost your sex life!]" etc -- and have a small handful of options for each 'bucket' multiplying into a huge variety of individual messages that are easy for a human to group together but almost impossible for software to identify. </p></li><li> <p>Michael Salib, extremely funny MIT student</p><p>Unlike nearly all other filter writers of the day, Salib's approach was heuristic: find a handful of reasonable spam discriminators, throw them all against his mail, and see how much he can identify that way. "It's sketchy, but this is a class project. I don't have to be realistic. [...] These results may be completely wrong."</p><p>Much to his surprise, he's trapping a lot of spam. He pulls in a little bit of RBL data ("the first two or three links from Google, whatever"), looks for some patterns and so on, and then churns it through LMMSE, an electrical engineering technique that as far as he can tell doesn't seem to be known in other fields. Basically this involves running the messages through a series of scary-but-fast-to-calculate linear equations). It turns out that he can process this much faster than a Bayes filter, to the point that customizing his approach for each user in a network would actually be feasible.</p><p>For a small spam corpus, he got results better than SpamAssassin did, though for a large corpus his results were worse; he couldn't really account for why this would be the case, or predict how things would scale as the corpus continued to grow.</p><p>When questioned about the RBL tactic by a member of the audience [who was apparently familiar to Salib -- I don't know who it was] about whether authenticating remote users might be the answer, Salib's response was "yes, I agree, but then you *do* work for Verisign, who is in the verification business, so you would say that."</p><p>Right on, Salib -- his talk was easily the funniest &amp; breezy of the day<nobr> <wbr></nobr>:)</p></li><li> <p>David Lewis, general researcher</p><p>The core of Lewis' argument, as ESR said earlier in the day, is that for any machine learning technique the quality of the learning corpus is much more important than the algorithm used. Bayes is one such algorithm, but there are many other good ones in the literature. In a dig at Goodman's refusal to disclose algorithms, Lewis pointed out that all of this has been publicly discussed since the first machine learning paper was published in 1961.</p><p>Observations: "lots of task inspecific stuff works badly, but task specific stuff helps a lot." It is important to use different corpuses [corpi?] for training and for general use, so that you don't train your machine to focus too much on certain types of input (this is a point that Microsoft's Goodman made as well).</p><p>As Graham did, Davis emphasized that spam is going to slowly start looking more like natural text, and we're going to have to deal with this as time goes on. <a href=""></a> </p></li><li> <p>Jon Praed, Internet Law Group</p><p>To a burst of tremendous applause, this talk began with the sentence "my name is Jon Praed, and I sue spammers."</p><p>He brought a legal take on the "not everything is spam to everybody" angle, emphasizing that we need a precise definition of what qualifies as Unsolicited Commercial Email (UCE). In particular, it has been difficult trying to pin down if the mail was really unsolicited, as this is where the spammers have the most wiggle room. However, if you can track down the spammer, they have to date rarely been able to verify that the user asked for mail, and so Praed has been able to successfully prosecute several spammers on this angle. He doesn't expect this to work forever though.</p><p>According to Praed, "laws against spam exist in every state, and more are pending", but he doubts that a legal solution will ever be completely effective as long as spam is lucrative. By analogy, he pointed out that people still rob banks and that has never been legal.</p><p>Praed informed the audience that there are several ways to get back at spammers, including injunctions, bankruptcy, and contempt, and all of these can be very effective. He pointed out that, to be blunt, a lot of these people are desperate low-lifes, and spam has been their biggest success in life. After these legal responses, their lives all get much worse. It hadn't occured to me to see spammers as pitiful before, but I can now. Most importantly, Praed stressed that these legal remedies can be very effective, and he strongly warned against taking vigilante action. This is almost always worse than the spam itself, and it only serves to get you in even deeper trouble than the spammer.</p><p>Identifying the sources of spam, most comes from offshore spam houses, abuse of free mail accounts (Hotmail &amp; Yahoo, free signups at ISPs, etc) and bulk software (which may apparently soon become illegal in certain areas, provided that a law can be found to ban spam software while allowing things like MailMan or MajorDomo). Interestingly, he questioned the idea that header spoofing is a big problem, and claimed that in every case he has dealt with he has been able to track down the messages to a legit source sooner or later.</p><p>Suggestion: if you get a spam citing a trademarked product [e.g. Viagra], forward it to the trademark holder and they will almost always follow up on it. Suggestion: be fast in trying to track down spammers, as some of them have gotten in the habit of leaving sites up long enough for mail recipients to visit, but taking them down before investigators get a chance to take a look. Legal observation: spam is almost always fraud, and can be prosecuted accordingly.</p><p>Praed wrapped up his talk by citing the encouraging precedent that the famous Verizon Online vs. Ralsky case set: [a] that the court is interested in where the harm occurs, not where the person doing harm was when causing it (so if you send spam to someone in Alaska and spam is a capital offence in Alaska, you can be tried as a citizen of that state even if you caused the harm from somewhere else), and [b] it is assumed that you have to be familiar with a remote ISPs acceptable usage policies, and ignorance is no defence (just as you can't say "I didn't know it was illegal to shoot someone", Ralsky couldn't say that he didn't know Verizon prohibits spam -- (he had to have known that the AUP wouldn't allow what he was doing, so he deliberately didn't read it)). That precedent makes future prosecution of spammers much more encouraging. While, again, legal solutions may never eliminate the spam problem, a precendent like this can be an important supplement to filtering efforts (the stick to the filter's carrot, or something -- my lousy analogy, not Praed's).</p></li><li> <p>David Berlind, ZDNet executive editor</p><p>His talk was primarily about how he receives a huge quantity of email from ZDNet readers, and he can't afford to use any spam filtering solution strategy that would allow *any* false positives. As one of the speakers said -- sorry, I forget who (Microsoft's Goodman?) -- getting a 0% false positive rate is easy: just classify nothing as spam. Getting a 100% hit rate is also easy: just classify everything as spam. Any solution besides those two is always going to have some degree of error either way, and determing how much of what kind of error you want to accept is up to you. Most users will tolerate a moderate false negative rate (some spam gets through) if it means that the false positive rate (legit mail is deleted) is very low. In Berlind's case, the false positive rate has to be vanishingly small, because reading all customer mail is a critical sign of respect for him.</p><p>Further, his business is also a legitimate mass emailer, sending out millions of free newsletters to users every day, and if Shein's proposal to bill bulk mailers were to catch on then even a very low rate would quickly put his company in the red. One obvious solution, which wasn't mentioned: start charging a subscription for these mailings, and make them profitable. I don't want to see this happen but if it did then the economics would tilt back toward making things feasible again.</p><p>Berlind is appreciative of the anti-spam work that is being done, but at the same time is skeptical of how pragmatic most of what is being proposed can really be. He feels we need a massive effort to rework the way mail is handled [Y2K anyone? It could get IT people back to work...], and to that end hopes ZDNet can help promote such a cooperative effort between the parties working on this. They don't want to be involved -- they are journalists &amp; publishers, not standards developers -- but they are eager to get things going &amp; want to cover the story as it progresses.</p><p>Like Shein said, he feels it's a waste for all these talented people to be working on combating penis enlargement offers, and hopes that we can find a way to get past this and work on real problems, "like world peace." This comment got a chuckle from the audience, but he seemed like the kind of guy that really meant that, and more importantly, he was right. A smart guy like Paul Graham or Bill Yerazunis shouldn't have to waste time tinkering with how many Viagra offers he can automagically delete when there are more fun things to be doing. </p></li><li> <p>Ken Schneider, Brightmail</p><p>As mentioned earlier, Brightmail provides an ASP service for real time filtering of both incoming &amp; outgoing mail. As would perhaps be expected, bigger ISPs and networks attract larger amounts of spam: 50% of mail coming into big ISPs and 40% coming into big companies is now spam. Brightmail offers the Probe Network, a &lt;slashdot-killfile-term&gt;patented&lt;/slashdot-killfil e-term&gt; system of decoy honeypot addresses that gather data for analysis at their logistics center, which in turn distributes spam filtering rules to their clients where a plugin for $MTA (using the open source or proprietary MTA of the client's choice) can act on the database.</p><p>An interesting property of their system is that they have a mechanism for both aging out dormant rules as well as for reactivating retired ones, so that the currently active ruleset can be kept as lean &amp; effient as possible. A big source of difficulty for them is legitimate commercial opt-in lists, because things have gotten more shady &amp; blurry over time and it's now hard to tell this mail from much of the spam out there. Whitelists help here, but the problem is still difficult.</p></li></ul><p>After each speaker had his turn, there was a panel discussion, but not much really happened there, and the moderator cut things short after only a couple of minutes. The original plan was for everyone to go out for Chinese food afterwards and continue the discussions over dinner, but when 580 people signed up that plan obviously fell apart.<nobr> <wbr></nobr>:) And so, here ends the notes...<br> <br> <br> <i> <a href=";cid=277050">DO NOT LEAVE IT IS NOT REAL</a> </i></p> babbage 2003-01-19T10:04:58+00:00 events This is interesting... Apropos to my blurb than ran in yesterda's <a href="">Slashback</a> I forward this:<blockquote><div><p><i>I was interested the license terms that Microsoft will ask people to agree to under its new "Communications Protocol Program". I'm not that interested yet in looking at what they're selling, I just wanted to see the terms for buying it.</i></p><p>The DOJ is asking people in the industry to look over the license agreements to ensure that they really are "reasonable and non-discriminitory", and being a patriotic American, I thought I'd help them out. I set off to</p><p>Of course, there was a snag. according to , I have to sign an NDA before I can see the license agreement.</p><p>That sounds funny. The DOJ wants industry input, but Microsoft doesn't want me to talk about it.</p><p>I figure, "that's alright, it's a public document, DOJ will give me a copy." So I called up the DOJ Antitrust Documents Group. They tell me first that I need to get it from MS. Then I explain, well, no, I can't. They want an NDA, which might preclude me from talking to DOJ about it.</p><p>They need to mull this over, so they say they'll call back. I never thought I would be looking forward to a phone call from John Ashcroft's Justice Department.</p><p>A DOJ attorney called me back. He's no longer on the case, but he worked on the remedy phase, and knows the right people to pass stuff along to. Furthermore, he's happy to do it, and to help address my concerns.</p><p>We discuss the NDA, and he tells me he hasn't read it, but believes it is supposed to contain an exception for talking to the DOJ. My concern is, how do I know that the terms are "reasonable and non-discriminitory" if I can't discuss the terms Microsoft gives me with others in the industry? They collect information on your company before they'll show you the license agreement. How do I know I got the same deal MegaCorp down the street got if I can't discuss the terms with them?</p><p>He says good point, and scribbles down some notes. He then tells me that there is a meeting of DOJ attorneys going on at that very moment discussing the NDA. He asks me to simply go to the Microsoft site, get the NDA, and see if there is anything in it which would cause me a problem.</p><p>So the good patriotic American trots off again. I click the link to see the NDA. What's this? Oh, I have to sign in with a Microsoft Passport first.</p><p>I don't have a Microsoft Passport. I don't want a Microsoft Passport. I want to read the NDA to see if there's anything objectionable in it so I can read the license agreement for a piece of software I may or may not use.</p><p>Call back the DOJ. The guy is still very friendly and helpful, even though I feel as if I could be annoying at this point. He assures me it's ok.</p><p>Unfortunatly, he also says he doesn't think DOJ has a problem with Microsoft requiring a Passport to view the NDA for the license for the code I might or might not use. Unless there's something specific to the Passport agreement that makes the license agreement bad.</p><p>So that's where I am now. I finally have a legal document in front of me to review. It's not the one I wanted though. It seems as if the answer to keeping the public out of your hair is to simply keep throwing up barriers, one after another, until finally people get sick of fighting and one of them sticks.</p></div></blockquote> babbage 2002-08-09T20:28:01+00:00 windows