I should’ve written this up when we bought it, but there are two main reasons I went with the Netgear WGT624 router over another brand with similar features.

First: familiarity. Since I hadn’t researched specific models, I wanted a brand I knew or had used before. This meant Netgear, Linksys, or Belkin.

Belkin was out of the question. In fact, I was muttering about how I’d never buy a Belkin router, when I was approached by a Belkin representative who proceeded to explain about how much better their product was than any of the others. The problem is that Belkin lost my trust last year when they set their routers to redirect web requests to their own advertisement page. (Basically one every eight hours until you bought the filtering service or clicked on an opt-out link on that web page). Aside from the annoyance factor, there’s a lot of web traffic that isn’t actually trying to load a web page. It could be your antivirus program trying to download new definitions, or your news reader updating an RSS or Atom feed. It could be Windows Update. Sure, they eventually disabled the “feature”, but come on!

So at that point it basically a toss-up between Netgear and Linksys. The Netgear packaging was more focused on the networking capabilities, and the Linksys packaging was more focused on the parental controls, so I went with the Netgear.

Some people think it’s a great idea to block spam by having their email system automatically reply to any unfamiliar address, forcing the sender to jump through hoops that spammers presumably won’t bother with.

About half an hour ago, the IEEE Communications Society sent out a call for papers on its mailing list.

So far I have gotten three challenge-response requests, two out-of-office notices, and a response to one of the CRs.

I expect to see more when I get back from lunch.

Update 2:30pm: Four more challenges, another vacation autoreply, and four more responses. No sign yet of any discussion, complaints, or even (as I half-expected) a rash of misdirected “unsubscribe me” messages.

I just got an email that starts out, “We are the leading manufacturer and exporter in China.”

OK, good for you, but what does this have to do with my personal website in California?

It all just adds to the noise…

By way of Justin Mason and the SpamAssassin mailing list comes this post about writing add-ons for Outlook.

Seth Goodman writes of Outlook’s contact list:

This feature was apparently added for the convenience of virus writers, who it appears were one of the key groups that set the design requirements for this product

Ronald F. Guilmette replies:

So if I want source code for a software tool that can extract addresses from a personal Outlook address book, I guess that I should just go out and hire a virus writer! Hummm. I would have no problem with that. At least this would give them some honest work for a change… keeping them off the streets and out of trouble for a short while.

So now, where does one post a ‘HELP WANTED’ ad for a virus writer?

We were having a discussion last night about the specifics of copyright law on derivative works, sparked by a ridiculous flamewar discussion thread on fan-made music videos. While it’s generally known that posting fanfic and fanart is illegal, we were speculating on when exactly these creations become violations of the law. Is it when you distribute the work? When you show it to a stranger, whether they get a copy or not? When you show it to your spouse? Turns out that unless you have specific permission from the copyright holder to use the specific work involved, it’s not legal to create fanart or fic at all, whether you show it to anyone or not.

This runs up against a belief of mine that I’ve termed “the Six-Year-Old Doctrine:” if, in order to fully enforce a law, authorities would need to prosecute a fair number of unwitting six-year-olds, that law is in need of changing. With respect to copyright and derivative works, every first-grader who draws a picture of Dora the Explorer or Barney or Bugs Bunny is technically in violation of copyright law. Realistically, no one is going to issue C&D letters to a classful of fans, or sue their parents for damages. Sadly, the owners of the depicted property do have that right.

Copyright law is quite black and white, but feels incredibly gray. And no wonder, with the fineness of the dividing lines between legal and illegal. Continue reading

Last week I started looking at ways to cut down on false positives in our spam filters. I’ve only seen two in my own mailbox this year, but of course everyone gets different kinds of email. I’ve been trolling the server logs for low-scoring “spam,” looking for anything that looks like it might be legit, particularly if the Bayes subsystem has already identified it correctly but isn’t enough to counteract the score assigned by other rules. (Unfortunately, it’s hard to tell when all you’ve got is the sender, subject, and list of spam rules.)

One item I noticed was a copy of the Microsoft Technet Flash newsletter. I thought this was odd, since I’d gotten a copy of the same newsletter and it hadn’t been labeled. In fact, it turned out that my copy only scored 0.3 points, and the other hit 6.4! (5 points indicates probable spam.) What could explain such a disparity?

Answer: two very small differences. Continue reading

Great. Just great. Now there are ad networks using banners to install malware.

The article from Netcraft goes on to say that some phishing attacks are using banners to install keystroke loggers and other spyware. So now, just by using an insecure browser* to click on the link in a message claiming to be from your bank can make it possible for hackers to steal your passwords, credit card numbers, etc., even if you realize the site’s a scam and don’t fill in the form. Fun, fun, fun!

Time to look into those alternative browsers again…

* Yes, security holes have been found in Mozilla, Opera, etc. With the rise in popularity of Firefox, some attackers are starting to target Mozilla. But aside from looking at the sheer number of holes in IE compared to other browsers, just about everyone seems to have a better track record at fixing vulnerabilities than Microsoft does.

ยปAll pages site-wide with this tag