Please Read Re: SPAM

Having problems with the board or the online guidebook?
Suggestions welcome.
Wes
Posts: 6530
Joined: Thu Sep 19, 2002 3:46 pm

Please Read Re: SPAM

Post by Wes »

We, like many forums, have been getting more and more spam users and posts. Ray has done some really cool stuff to stop most the bots, but many times it is a person out there creating the accounts, etc. So, please be careful of any links you click on from users with one or two posts, same with the web link in a users profile. We try to remove the posts and users as quickly as they come up, but sometimes we miss them, or out doing fun stuff, like climbing.

Wes
"There is no secret ingredient"

Po, the kung fu panda
Mike Jones
Posts: 241
Joined: Wed Oct 19, 2005 12:55 pm

Post by Mike Jones »

Easily fixed. Hollar @ your "1337" rap star.
Who is Mike Jones?
Yasmeen
Posts: 4663
Joined: Tue Oct 08, 2002 10:42 am

Post by Yasmeen »

His solution is pretty dang cool. It's kept spambots out of his company's site, and out of the calendar sale page.
"I snatched defeat from the jaws of victory." --Paul
---
(Emails > PMs)
Mike Jones
Posts: 241
Joined: Wed Oct 19, 2005 12:55 pm

Post by Mike Jones »

Yasmeen wrote a bot that tracks, hunts, and kills other bots. The bot then de-references the pointers and feasts on the internal system calls. Her bot then tosses all the functions together in salad form, and grinds the main function on top of the function salad as a type of dressing. The header is saved for last. Here is dessert:

Code: Select all

           typedef struct {
                   unsigned char   e_ident[ELF_NIDENT];
                   Elf32_Half      e_type;
                   Elf32_Half      e_machine;
                   Elf32_Word      e_version;
                   Elf32_Addr      e_entry;
                   Elf32_Off       e_phoff;
                   Elf32_Off       e_shoff;
                   Elf32_Word      e_flags;
                   Elf32_Half      e_ehsize;
                   Elf32_Half      e_phentsize;
                   Elf32_Half      e_phnum;
                   Elf32_Half      e_shentsize;
                   Elf32_Half      e_shnum;
                   Elf32_Half      e_shstrndx;
           } Elf32_Ehdr;
Who is Mike Jones?
Yasmeen
Posts: 4663
Joined: Tue Oct 08, 2002 10:42 am

Post by Yasmeen »

:lol: You wish!
"I snatched defeat from the jaws of victory." --Paul
---
(Emails > PMs)
User avatar
pigsteak
Posts: 9684
Joined: Tue Jun 17, 2003 6:49 pm

Post by pigsteak »

where's the croutons though?
Positive vibes brah...positive vibes.
dipsi
Posts: 4217
Joined: Thu Sep 26, 2002 9:54 pm

Post by dipsi »

I will not have you talking about Yasi's bot in public, Young Man! :evil:
What I love about running is you can meditate while running. It's a peaceful place.

Sister Mary Elizabeth Lloyd, Runs marathons to raise money and awareness about children orphaned by AIDS
Mike Jones
Posts: 241
Joined: Wed Oct 19, 2005 12:55 pm

Post by Mike Jones »

The croutons are hanging pointers from double frees. The byte code is then UPX packed and fuzzed to all hell!

Dipsi, I figure it's worth talking about the bot while we still can. It will soon become self-aware, a la SkyNet. Find Sarah Connor.
Who is Mike Jones?
User avatar
ynot
Posts: 6432
Joined: Mon Oct 07, 2002 1:02 am

Post by ynot »

jeeze, I'm no geek but I figured that one out. Computers are going to take over Di! run for the hills!
"Everyone should have a plan for the zombie apocolipse" Courtney
tomdarch
Posts: 2407
Joined: Wed Dec 04, 2002 9:22 pm

Post by tomdarch »

Reminds me of "corewars" - it was an uber-geek computer game. Basically, it was a primitive virtual machine with its own simple machine code. There is a memory space and two 'applications' running (alternating one instruction at a time), and no limits on the 'apps' ability to write or jump execution into anywhere in that memory space. The goal was to write an app that would kill the oposing app. You could write a little app that would sit in one place and randomly bomb the memory space with random bytes hoping to scramble the opponent, you could write an app that would copy itself around the the memory and then jump execution to one of the copies in the hope that you are overwriting your opponent, and so on. ahhh, good times!
Bacon is meat candy.
Post Reply