Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $26,834
Woo hoo!! And the first 30% is in!! Thank you all very much!! God bless.

Keyword: bots

Brevity: Headers | « Text »
  • Beware of Twitter Robots Telling People How to Vote

    07/19/2016 3:15:16 PM PDT · by Swordmaker · 33 replies
    Heat Street ^ | 1:02 pm, July 18, 2016 | By Mark Buchanan
    Voting is partially a social endeavor, in which people consider the opinions of others when making up their own minds. Increasingly, though, they’re being influenced by an inhuman force: software robots specifically designed to deceive them. Lest democracy be undermined, humans need help in distinguishing their brethren from the bots. Two years ago, in a report filed with the U.S. Securities and Exchange Commission, the social networking site Twitter estimated that more than 23 million of its active user accounts were being run by “bots” — software agents or bits of code that act on their own to respond to...
  • 5 things shills don't want you to know

    08/29/2015 10:57:01 AM PDT · by Company Man · 4 replies
    Youtube ^ | July 25, 2015 | Youtube
    The internet has revolutionized numerous disciplines, and propaganda is no exception. How can you know who's saying what -- and why -- online? Join Ben, Matt, and special guest Joe to learn more about the future of online manipulation.
  • Half a million Mac computers 'infected with malware'

    04/05/2012 8:45:23 AM PDT · by null and void · 184 replies
    BBC ^ | April 2012 Last updated at 08:54 ET
    An investigation by Dr Web suggests that about 600,000 Macs have the malware - potentially allowing them to be hijacked and used as a "botnet". It says that more than half that number are in the US. Flashback was first detected last September when anti-virus researchers flagged software masquerading itself as a Flash Player update. Once downloaded it deactivated some of the computer's security software. Remote control "By introducing the code criminals are potentially able to control the machine," the firm's chief executive Boris Sharov told the BBC. "We stress the word potential as we have never seen any malicious...
  • Small-business nightmare: 8 million sites hacked to harm customers' computers

    08/12/2011 10:04:03 PM PDT · by Libloather · 7 replies
    Link only - Small-business nightmare: 8 million sites hacked to harm customers' computers
  • Anybody having computer problems - Browser hijacking

    12/09/2010 12:00:17 PM PST · by ncfool · 48 replies · 1+ views
    self | 12/9/2010 | self
    Has anybody had a recent problem with Browser hijacking on their computer. Since Saturday when I got infected with a program called Think Point which makes itself look like Microsoft Defender my computer has had all kinds of problems. No matter which Malware program you try and clean it with it still shows back up. We have tried all the major fixes. I am not sure how I got it but it can't be cleaned. There are many sites talking about it. Now every time I try and do a search using Google, Yahoo, Chrome. You can see where its...
  • Military Hoping Chat Bots Will Replace Deployed Parents

    01/06/2009 1:44:27 PM PST · by BGHater · 8 replies · 340+ views
    Information Week ^ | 02 Jan 2009 | Thomas Claburn
    While Skype or similar teleconferencing technologies might seem like a more cost-effective and immediately available solution, the Defense Department rejects that possibility. The U.S. Department of Defense is looking to develop virtual parents to comfort children when moms and dads on active duty aren't available to talk. In a solicitation for proposals posted on the department's Small Business Innovation Research Web site, the military says it's seeking to "develop a highly interactive PC- or Web-based application to allow family members to verbally interact with 'virtual' renditions of deployed Service Members." "The child should be able to have a simulated conversation...
  • Malicious 'botnets' turn PCs into 'zombie' slaves

    10/21/2008 7:03:04 AM PDT · by Bean Counter · 20 replies · 953+ views
    The Oregonian ^ | 10-21-08 | JOHN MARKOFF
    Scourge - Programs hiding on the Internet can take over a computer and make it send spam or perform other evil acts REDMOND, Wash. -- In a windowless room on Microsoft's campus in Redmond, T.J. Campana, a cybercrime investigator, connects an unprotected computer running an early version of Windows XP to the Internet. In less than a minute the computer is "owned." An automated program lurking on the Internet has remotely taken over the PC and turned it into a "zombie." That computer and other zombie machines are then assembled into systems called "botnets" -- home and business PCs hooked...
  • Russian Gang Hijacking PCs in Vast Scheme

    08/06/2008 12:00:14 PM PDT · by Perseverando · 9 replies · 558+ views
    The New York Times ^ | August 5, 2008 | John Markoff
    A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. The new form of attack indicates that little progress has been made in defusing the threat of botnets, networks of infected computers that criminals use to send spam, steal passwords and do other forms of damage, according to computer security investigators. Several security experts say that although attacks against network administrators are not new, the systematic use of administrative software to spread malicious software...
  • Opinion: Four laws Congress needs to pass now to boost computer security

    02/02/2007 12:32:07 AM PST · by HAL9000 · 5 replies · 340+ views
    ComputerWorld ^ | February 2, 2007 | Ira Winkler
    Excerpts - ... 1. Make ISPs (and all organizations providing computer access to more than 100 people) responsible for filtering scan and attack traffic across their networks. ... 2. Make ISPs (and all organizations providing computer access to more than 100 people) responsible for knocking customer PCs off their network if they become bots. ... 3. Make end users liable if losses are incurred because of outdated security software. ... 4. Write some kind of law concerning efficient security software. ...
  • Invasion of the Computer Snatchers

    02/18/2006 8:12:00 AM PST · by MRMEAN · 65 replies · 1,546+ views
    The Washington Post ^ | Sunday, February 19, 2006; W10 | By Brian Krebs
    Hackers are hijacking thousands of PCs to spy on users, shake down online businesses, steal identities and send millions of pieces of spam. If you think your computer is safe, think again In the six hours between crashing into bed and rolling out of it, the 21-year-old hacker has broken into nearly 2,000 personal computers around the globe. He slept while software he wrote scoured the Internet for vulnerable computers and infected them with viruses that turned them into slaves. Now, with the smoke of his day's first Marlboro curling across the living room of his parents' brick rambler, the...
  • What happened to the Robot Age?

    01/27/2006 11:34:08 AM PST · by Willie Green · 42 replies · 797+ views
    BBC News Magazine ^ | Friday, 27 January 2006, | Jonathan Duffy
    For education and discussion only. Not for commercial use. Sony's decision to ditch its Aibo robotic dog, along with its entire robot development team, is a reminder that we are still a long way from the age of automated domestic servants. Architects of the Robot Age have been busy rethinking the future. In the 1980s you could hardly move for suggestions that the Robot Age was upon us. From Metal Mickey, the wisecracking, head-spinning star of his eponymous sitcom, to the stylishly choreographed Fiat advert in which the Italian carmaker smugly revealed how it had apparently dispensed with humans altogether...
  • US hacker pleads guilty to hijacking thousands of computers

    01/25/2006 5:35:35 AM PST · by Calpernia · 16 replies · 639+ views
    Middle East Times ^ | January 25, 2006
    LOS ANGELES, CA, USA -- A US computer hacker on Monday pleaded guilty to hijacking around 400,000 computers, including military servers, and infecting them with malicious software. In the first such prosecution of its kind, "botmaster" Jeanson Ancheta, 20, admitted infecting the computers with software that caused them to send spam, show ads and launch crippling attacks on Internet sites. In federal court in Los Angeles, Ancheta admitted conspiring to violate both the Computer Fraud Abuse Act and an anti-spam law, to causing damage to US defense computers and to hacking into computers to commit fraud. His plea comes after...
  • You'll never beat poker robots

    11/29/2005 10:13:36 AM PST · by E. Pluribus Unum · 19 replies · 1,348+ views ^ | 28 November 2005 | Phil Robinson
    THE time is 5am. A watery dawn light is bringing a new day into my study; I'm reaching the weary end of a bottle of brandy and a gruelling six-hour internet session on And I've just haemorrhaged a packet. It all started so well. I broke even for the first few hours. But since 2am, I've lost £670. They say you should never play poker with any more money than you can afford to take to the bottom of your garden and burn; I can't afford to burn £670. So now I'm playing like a wild man, trying to...
  • Tech's Big Gamble: Online poker 'rife with cheats'

    11/04/2005 10:05:43 AM PST · by Phantom Lord · 55 replies · 2,404+ views ^ | 11/04/2005 | Will Sturgeon
    Tech's Big Gamble Online poker 'rife with cheats' Notorious casino cheat claims 99 per cent of players will one day be cheating... By Will Sturgeon Published: Friday 4 November 2005 The boom in internet gambling may be about to hit its greatest hurdle with one of the world's most famous casino cheats claiming the online world is far more at risk from cheating than the casinos in which he made millions. Richard Marcus is among an elite of casino cheats and during a 25-year reign he and a small team took casinos in Las Vegas, Atlantic City, London and Monte...
  • Did Miers Allow Armed Forces to Flout Law?

    10/15/2005 1:54:46 PM PDT · by Ol' Sparky · 11 replies · 506+ views
    Human Events Online ^ | 10/14/05 | Elaine Donnelly
    Did Miers Allow Armed Forces to Flout Law? by Elaine Donnelly Posted Oct 14, 2005 There is no reason to doubt the integrity of Harriet Miers, a person whom President Bush trusts and has nominated to the Supreme Court. There is reason for concern, however, about her actions as White House counsel on legal matters affecting the military. Miers does not have a judicial paper trail, but to the greatest extent possible the Senate should consider her record as the President’s chief legal adviser. The Office of White House Counsel sits at the intersection of law, politics and policy. Given...
  • Drunk With Power, Spending Out of Control (GOP)

    08/25/2005 11:36:29 AM PDT · by LouAvul · 82 replies · 1,548+ views
    fox ^ | 8-25-05 | Radley Balko
    The Washington Post reports that in 1987, President Ronald Reagan vetoed a transportation bill passed by Congress because it had 157 "earmarks"— money set aside for Congress members' pet projects that would ostensibly be considered too wasteful to pass as laws on their own merit. Reagan made a show of his veto. It was a symbolic stroke against government waste, against the Democrats’ tradition of, for example, diverting every federal highway through West Virginia, then naming it after Sen. Robert Byrd. Fast-forward to 2005. Republicans control the White House and both houses of Congress. Early on a Saturday morning in...
  • The first lesson in schools will be devoted to European Union (brainwashing kids for the EU)

    08/16/2005 8:41:31 AM PDT · by jb6 · 9 replies · 433+ views
    Forum Ukraine ^ | 16 August
    On September 1, for pupils of 5-11th forms, the first lesson will be devoted to European choice of Ukraine. Ministry of Education recommended the topic "Ukraine is a European state" for the first lesson. As reported in press-service of Ministry, in senior classes it is offered to conduct the lesson in form of a debate or a roundtable – "Why did Ukraine make European choice?", "We are citizens of Europe." For pupils of junior classes the topics are the following: "My native school" and "Ukraine is my homeland."
  • Microsoft, Protecting us yet again

    04/13/2005 6:32:56 AM PDT · by chronic_loser · 26 replies · 628+ views
    Ryan Naraine - eWEEK The Microsoft security train made its scheduled monthly stop on Tuesday, dropping off eight updates to cover 18 vulnerabilities in a range of widely deployed products. Five of the eight advisories are rated "critical" and Redmond officials are urging customers to apply at least three immediately as high-priority updates. The top three include fixes for high-risk flaws in Microsoft Corp.'s implementation of the TCP/IP stack; a cumulative patch for the Internet Explorer browser; and a patch for a remote code-execution hole in the enterprise-focused Microsoft Exchange Server.
  • The Web: 'Bots' pushing poll results

    10/13/2004 11:14:09 AM PDT · by kerrywearsbotox · 19 replies · 996+ views
    United Press International ^ | October 13, 2004 | Gene Koprowski
    By Gene J. Koprowski United Press International Published 10/13/2004 12:26 PM CHICAGO, Oct. 13 (UPI) -- President George W. Bush and Sen. John F. Kerry will walk across the stage Wednesday night and greet each other at the beginning of the third and final presidential debate. Already, across the country, e-mail messages are arriving in newsroom inboxes declaring a winner. A new form of spam is emerging this fall, called debate-spin spam, experts told UPI's The Web. The veracity of the e-mail messages being sent as letters to the editor is coming into question, as are the timing and content...
  • Baffling the Bots: Anti-spammers take on automatons posing as humans

    10/20/2003 6:25:31 AM PDT · by stainlessbanner · 3 replies · 161+ views
    SCIAM ^ | October 13, 2003 | Lee Bruno
    Three years ago rogue computer software programs called bots posed as teenagers in Yahoo's chat rooms on the Web. There they created mischief by collecting personal information about the teens who visited or by pointing chat participants to advertisements. The bots operated by waiting until a visitor typed a question mark. They would then automatically create a response about where a person could find an answer and provide a URL that would deliver the visitor to an advertising site. Bots are well known for helping to generate millions of spam messages advertising printer cartridges, septic systems, Viagra and Nigerian money...