Comment Spam In Addition To Referer Spam Has Diverse Purposes

One of the nearly intriguing subjects discussed inward nice weblog spam (in our comments), together with referer spam (in our Stats logs), accept purposes - though amongst the continually varying content used inward both, it all looks really much similar random garbage.

If nosotros analyse the content, structure, together with book of the diverse spam attacks, nosotros tin come across patterns - together with an agreement of the overall utilisation of the spam.

Both our comments - together with our Stats logs - are continually assaulted yesteryear seemingly random together with useless noise, inward large volume. This is similar to the random spam which attacks our email.

If you lot await at plenty comment together with Stats log spam, you lot volition foremost to come across patterns - together with reasons for the spam. The spam, though patently random inward content, is non purposeless.

First, some alert may last appropriate.
  1. If you lot wishing to essay out the sites advertised inward comment or referer spam, larn to use a proxy server.
  2. Unless you lot are a figurer safety expert, amongst a properly protected (or intentionally sacrificial) computer, produce non surf these sites advertised, using an unprotected computer. Avoidance is the best agency to protect yourself.
  3. If you lot do, fifty-fifty inadvertently, surf a comment or referer spam site, quarantine together with scan your figurer equally presently equally convenient. If you lot must surf the sites advertised, spell unprotected, diagnosis is the side yesteryear side best agency to protect yourself (and others some you).

Examining the comment together with Stats based spam diagnostically, you'll come across diverse purposes behind the spam.
  • Spam delivery. It is called "comment spam" / "referer spam", later all.
  • Malware delivery. This is the secondary purpose, known yesteryear many people - together with the argue why I render the higher upward advice.
  • Attacks against 3rd party, non spammers. Various 3rd political party blogs together with websites, who produce non subscribe to the service, may last maliciously targeted, yesteryear some spam.
  • Strategic malware delivery. Some malware may last packaged inward portions, delivered through multiple attacks.
  • Filter poisoning. Some spam may last exactly intended to overwhelm the malware / spam detection systems.
  • Email address mining. Some really exceptional comment spam, which I telephone telephone "Nice Blog" spam, is a really imaginative email address mining technique.

The best agency to position comment together with referer spam may last to exactly follow the various forum discussions - together with respect which spam techniques are reported yesteryear multiple weblog owners, beingness assaulted inward identical style. As the one-time proverb goes,
If it quacks, it's likely a duck.

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel