background preloader

The Secret Strategies Behind Many “Viral” Videos

The Secret Strategies Behind Many “Viral” Videos
Update: Dan has a follow up to this post, here. This guest post was written by Dan Ackerman Greenberg, co-founder of viral video marketing company The Comotion Group and lead TA for the Stanford Facebook Class. Dan will graduate from the Stanford Management Science & Engineering Masters program in June. Have you ever watched a video with 100,000 views on YouTube and thought to yourself: “How the hell did that video get so many views?” Chances are pretty good that this didn’t happen naturally, but rather that some company worked hard to make it happen – some company like mine. When most people talk about “viral videos,” they’re usually referring to videos like Miss Teen South Carolina, Smirnoff’s Tea Partay music video, the Sony Bravia ads, Soulja Boy – videos that have traveled all around the internet and been posted on YouTube, MySpace, Google Video, Facebook, Digg, blogs, etc. – videos with millions and millions of views. Secret #1: Not all viral videos are what they seem 2. 3. 4. 5. 6.

This link kills spam Put this image in your blog! Or for "This link kills spam" text link, use <a href=" This link kills spam</a><br /> Changelog Made the site a little "smarter" with more efficient codePeople complained about their domains showing up on this list, so I added three more letters, which decreases the likelyhood of it matching a real address by ^3Started working on a distributed version of this site, so other people can put the php on their site (it's a bit hard because of the dynamic stuff)Added randomly generated contact messagesThis site gets its first spammer! This link kills spam Email harvesting bots, otherwise known as data miners, follow links, grabbing email addresses out of each page it visits. This site renders these harvester's lists useless by filling them with invalid e-mail addresses. If you link to this page, whenever a harvester visits your site, it gets filled up with superfluous email addresses. Next webpage to harvest: /knlonvipl

The Spam Farms of the Social Web Blogs and other social media tools have changed the publishing landscape over the past few years, making it easier than ever to share information with the world. The ease of use and focused attention of the medium has also helped create new opportunities for spammers to automatically generate content, buy links, and get noticed by search engines and other points of aggregation. In this post I will break down the operations of one spam network utilizing social media technologies such as WordPress, Digg, del.icio.us, and more to climb the search results and generate revenue through ads and affiliate programs. Last weekend I noticed a Digg submission about weight loss tips had climbed the site’s front page, earning a covetous position in the top 5 technology stories of the moment. The spammer’s domain is managed by eBizzSol, a company with fake domain registration information including the address block of a Christian church in Fullerton, California. Follow the money Directories Virality

Why spam is out of control | Technology | Guardian Unlimited Technology For David Hart, monitoring spam is a matter of atonement. The technician, formerly a consultant for a spammer, reformed a couple of years ago and started his own DNS blackhole list - a list of internet addresses that have been identified as spam senders. Volunteers at TQM3, including Hart, watch email traffic for likely spammers and constantly update the list, which is then available to systems administrators across the internet. "There's a certain amount of guilt," says Hart. "I was wrong, and this is part of making amends for a profound misjudgment on my part." Recently he's been getting plenty of opportunities to redeem himself, thanks to the "tail" - a screen on his email server that shows all the IP addresses on the internet that are being added to his spam list. The growth in spam is also showing up at companies such as Postini, which analyses internet traffic using its filtering system before delivering it to clients. Why? These botnets have existed for about five years.

Welcome to the 419 Eater TITLE: The Incredible Shrinking Artwork SCAMMER NAME: John Boko SCAMMER LOCATION: Abidjan, Cote d'Ivoire SCAMBAITER: Shiver Metimbers A slightly different twist on my now familiar artwork anti-scam. I manage to secure two pieces of artwork, but unfortunately due to the temperature and humidity fluctuations between here and West Africa, as well as rogue rodents, there are problems. John Boko is a 419 scammer. Initially he sent out a standard 419 scam email under a different name. I gave him my standard Derek Trotter reply: Thank you very much for your very interesting email, however I am afraid that I will be unable to help you at this time. You may already know of me since it was you that contacted me. I am sorry but I am unable to enter into your business proposition at this time, however if you have any contacts in your part of the world who may be artists that you think may benefit from our financial help then I would be very interested to be put in touch with them. Sincerely, Sir, 1.

SpamBayes: Documentation Project documentation Search the mailing lists A quick-n-dirty google search interface for the mailing list archives - put your search terms in the box with the existing ones: Glossary A useful(?) Bayesian A form of statistical analysis used (in a form) in Paul Graham's initial "Plan for Spam" approach. corpus In this context, a body of messages. false negative A spam that's incorrectly classified as ham. false positive A ham that's incorrectly classified as spam. ham The opposite of spam; not necessarily email that you want or that you asked for, just anything that's not unsolicited bulk email. hapax, hapax legomenon A word or form occurring only once in a document or corpus. spam Broadly speaking, any email that's not wanted by the end-user. training The process of feeding spambayes some sample spam and ham messages, to teach it what to look for. unsure An email message that could not reliably be classified as either ham or spam.

Related: