background preloader

The Spamhaus Project

The Spamhaus Project

Recording Changes to the Repository You have a bona fide Git repository and a checkout or working copy of the files for that project. You need to make some changes and commit snapshots of those changes into your repository each time the project reaches a state you want to record. Remember that each file in your working directory can be in one of two states: tracked or untracked. As you edit files, Git sees them as modified, because you’ve changed them since your last commit. Figure 2-1. Checking the Status of Your Files The main tool you use to determine which files are in which state is the git status command. $ git status On branch master nothing to commit, working directory clean This means you have a clean working directory — in other words, no tracked files are modified. Let’s say you add a new file to your project, a simple README file. You can see that your new README file is untracked, because it’s under the “Untracked files” heading in your status output. Tracking New Files $ git add README Staging Modified Files

njabl.org Worldwide Slump Makes Nigeria's Online Scammers Work That Much Harder LAGOS, Nigeria -- Online swindling takes dedication even in the best of times, the scammer said earnestly. The spinal cord aches from sitting at a desk. The eyes itch from staring at a computer. The heart thumps from drinking bitter cola to stay awake for chats with Americans in faraway time zones. The wallet shrinks from buying potions that supposedly compel the Americans to pay. Succeeding in the midst of a worldwide economic meltdown? "We are working harder. Banjo is a polite young man in a button-down shirt, and he is the sort of guy on the other end of that block-lettered missive requesting your "URGENT ASSISTANCE" in transferring millions of dollars. U.S. authorities say Americans -- the easiest prey, according to Nigerian scammers -- lose hundreds of millions of dollars a year to cybercrimes, including a scheme known as the Nigerian 419 fraud, named for a section of the Nigerian criminal code. "My maga don pay/Shout alleluia!"

Cloaking to Stop Scraping | PlagiarismToday Cloaking is generally thought of as a black hat SEO tactic that involves tricking the search engine into believing that a page has one thing on it when, in fact, visitors will see something else, often completley unrelated. However, cloaking actually much more broad than that. Though the black hat use is the best known, it can also be used to offer different content to different browsers to ensure compatibility, different sized images to different screen resolutions or even display content in different languages based on country. Any time a page automatically dispalys different content to one person or one group of people than it does another, that is considered cloaking. White hats, recently, found another positive use for cloaking, the ability to stop scraping by providing different content to a scraper than to the rest of the world. The Ballad of RSnake RSnake is a blogger at ha.ckers.org , an Internet security site that has been in operation since May. How it Was Done (WordPress)

SpamWeasel SpamWeasel Free This freeware utility will delete or archive spam and place an optional warning notice on any suspect spam mail it allows through to your inbox. It has been superseded by SpamWeasel Pro which embodies feedback from the many thousands of users of the Free product who asked us for an enhanced utility to defeat the more sophisticated techniques used by spammers, and one that was easier to install. The low-cost Pro product has superior spam trapping ability, an installation Wizard that takes you through the installation and registration process, and it allows a free 30-day evaluation period. The Free program needs to be manually installed and, like the Pro product, is pre-configured to collect mail from multiple POP accounts using rules that permit passing, blocking, labeling, deleting, archiving, viewing, sorting and forwarding suspect spam. It works with any standard POP3 client. Features NB.

Le blog de NicoLargoTerminator, le terminal ultime sous GNU/Linux | Le blog de NicoLargo | Une des grande différence entre un Linuxien et un Windowsien est le temps passé devant le terminal (console en mode graphique). Si les terminaux fournis par défaut sous GNU/Linux sont à des années lumières des pauvres consoles CMD ou PowerShell de Microsoft, ils sont encore loin derrière le logiciel dont je vais vous parler dans ce billet. Terminator (logiciel libre sous licence GPL) propose les fonctions suivantes: configuration de la fontes et des couleurs avec gestion de la transparence (association dans des profils)division horizontale et verticale de la fenêtre pour disposer de plusieurs terminauxchaque terminal peut disposer d'un profil différentpossibilité d'envoyer les lignes de commandes saisies au clavier sur un groupe de terminauxcapture d'écran du terminal en 2 clics de sourisscroll bar infiniepossibilité de lancer des commandes automatiquement au démarrage du terminal Voici donc un aperçu de la bête: Autre fonction très utile, le regroupement.

The CBL Phishing-Initiative just the basics "Spam" is defined as unsolicited commercial e-mail. It is sent to you by unscrupulous people trying to make a fast buck -- usually by ripping you off. Many spams say that you can get off the mailing list when you ask, but very often if you try it, it leads to more junk mail because you're confirming to these unscrupulous people that your address is good. The people who send spam are, by definition, unscrupulous criminals who either want to defraud you by selling you junk, or unscrupulous criminals who are trying to steal your money by identity theft. Most wonder how spammers got their e-mail address. There are some ways to keep your address from spammers, but it's not as easy as you may think! Once you start getting spam, it's too late: spammers won't "remove" you, and you will continue to get it forever until you get a new address that is not shown in any public place. There are, however, a few instances when you can reasonably safely ask to stop getting spam. There's a law, right?

Anti-telemarketing Counterscript The Direct Marketing sector regards the telephone as one of its most successful tools. Consumers experience telemarketing from a completely different point of view: more than 92% perceive commercial telephone calls as a violation of privacy. Telemarketers make use of a telescript - a guideline for a telephone conversation. This script creates an imbalance in the conversation between the marketer and the consumer. It is this imbalance, most of all, that makes telemarketing successful. copyright ©1994-2005 EGBG - martijn engelbregt nieuwe uilenburgerstraat 5, 1011 lm amsterdam, the netherlands, e-mail: info@egbg.nl phone: 0031.20.6208784, fax: 0031.20.6209573, mobile: 0031.6.26082709 A Cloud as an Interface SORBS (Spam and Open-Relay Blocking System)

Related: