The Death of WorldCom

By | November 22, 2011

WorldCom, once the U.S.’ second largest long distance phone company before falling into bankruptcy and fraud convictions, is no more. At least, as a name. As Netcraft, a UK-based Internet monitoring and security company, records:

WorldCom.com has been taken offline, erasing the web’s last traces of the brand that became a symbol of white collar crime and the largest bankruptcy in U.S. history. The domains worldcom.com and worldcom.net have been taken out of the DNS database, meaning requests for those URLs return no response. The domains continue to be owned by MCI, Inc. the WorldCom successor that was bought earlier this year by Verizon for $7.6 billion.

When a company is acquired, its domain names are typically redirected to the web site of the acquiring company to capture potential customers searching for the old URL. Redirection services are freely provided by most registrars. But worldcom.com and worldcom.net have no A record listed in their DNS settings, suggesting the domains have been intentionally taken offline to “retire” the name.

The MCIWorldcom.com, however, takes you to http://euat-consumer.mci.com/ .

The Blue Frog vs PharmaMaster

By | November 22, 2011

I’ve been trying to make some sense of this recent drama involving Blue Security, an anti-spam registry that effectively tries to deter uncooperative spammers by overwhelming their servers, and recent outages at TypePad and LiveJournal apparently caused by a revenge attack by spammers on Blue Security. (Here’s some more information on Blue Security and the Blue Frog.) The outages were caused when Blue Security redirected the spammers’ attacks on its website to the company’s blogs which were hosted on TypePad and LiveJournal.

So what really happened?

  • Blue Security’s web site has been under attack for most of this past week, via a distributed denial-of-service (DoS) attack which basically tries to overwhelm a site with traffic sent from as many computers as possible (the site is now back up);
  • To try to deflect the attack, which effectively suspended its service, Blue Security changed its Internet address to its TypePad blog;
  • This overwhelmed SixApart’s servers, temporarily affecting all its blogging services, including TypePad and LiveJournal;
  • Meanwhile, spammers presumably linked to the DDoS attack sent threatening emails to, apparently, anyone on the list of the Blue Security do-not-intrude registry. Blue Security works by building a network of users who report spam. The source of the spam is then contacted and then asked to remove all email addresses of its members from their spam lists. If they fail to do so, software installed on users’ computers fills out forms on websites linked to in any subsequent spam, creating a wave of traffic to the spammer’s web site, that, in theory, brings the spammer’s activities to a stop.
  • The spammer, or another spammer, then contacted Blue Security via ICQ instant message, to taunt and threaten the company, apparently in a bid to stop its activities.
  • The spammer, or another spammer, has also been sending emails containing Blue Security contact and registration information. This might have been done in the hope of getting recipients to complain to those email addresses and phone numbers to further overwhelm the company’s resources.

This account is not uncontested. According to a Blue Security press release:

  • Blue Security claims that it was not the victim of a DDoS attack, but that the spammer — identified as PharmaMaster –– persuaded a staff member of a top-tier Internet Service Provider to block Blue Security’s IP address at the backbone. This would have blocked all traffic from outside Israel, where the Blue Security web site is located.
  • Blue Security then closed its web site and posted a note on its blog (hosted elsewhere.)
  • Shortly afterwards, Blue Security says, PharmaMaster launched a DDoS attack on any site associated with Blue Security, causing outages at five top hosting providers, a major DNS provider and a popular blog site.
  • Blue Security has denied reports, including one by the Associated Press, saying that its do-no-intrude lists have been compromised. Blue Security works by allowing compliant spammers to run its email list through a program which compares it with a special encrypted list of Blue Security members. While the spammer is not able to see or access the Blue Security list, Blue Security members’ email addresses will be removed from the spammer’s list. This is done, in part, so individual Blue Security members are not then known to a spammer, and so the spammer cannot gain access to the Blue Security registry for spamming purposes. The AP report suggests the spammer has figured out a way to work out which email addresses belong to Blue Security members by merely comparing its own list before and after running it through the Blue Security removal process. Those email addresses no longer on the spammer’s list must be Blue Security members, the report says.

This account is contested by some security analysts, who point out what they say are some inconsistencies in Blue Security’s account:

  • Elsewhere Blue Security’s Eran Reshef acknowledges that Blue Security didn’t just post a note on its blog, but it redirected traffic from its bluesecurity.com URL to the TypePad blog. He is quoted as saying he didn’t anticipate that the spammer would launch a DDoS attack on such a large player. “I didn’t think he was so crazy as to attack them,” said Reshef. This raises the question: Was this done before or after the DDoS began? Rashef says it was.
  • If Blue Security’s routing was changed internally, as Blue Security suggests, there should be a record. One analyst says he can find no record of anything “fishy.”

Blue Security clearly has its supporters. An article on one website has received, at the time of writing, more than 200 comments. The Blue Security blog’s single post received more than 100 before comments were closed.

Perhaps one of the most interesting aspects to all this is how clearly at least one spammer perceives Blue Security as a threat to its business. Not only is it trying to scare the company and members of its registry into abandoning their approach, but it is also adopting more open tactics: contacting the target directly via ICQ, perhaps in an effort to intimidate or negotiate, and to email and post comments to the above websites to try to scare members into removing their names from the registry and uninstalling the software that returns spam to the sender’s servers.

You don’t need to agree with Blue Security’s tactics to acknowledge they must be making some kind of impact for this to happen. What is perhaps a little bit scary is that Blue Security don’t seem to have been ready for this attack, and reveal some naivety and lack of understanding about how the Internet works by merely redirecting the assault to other servers. Not only would this not solve their problem, it also exposes them to legal action by the companies behind the redirected servers if it emerges that they were not informed beforehand. Still a lot of questions to be answered on this one.

Skype SMS’ Teething Problems

By | November 22, 2011

You’ve probably all heard of Skype’s new SMS service, which is very cool. If you have a Skype-Out account, you can send SMS messages to cellphones and, if you register you cellphone number with Skype, the recipients can reply to you on your mobile phone. Great idea. Only problem: It doesn’t work.

Well, it does work, but not always. At least one cellular operator doesn’t seem to pass the messages on. That wouldn’t be a problem, except that Skype says that the message has been delivered, and charges you for it. Teething troubles, I guess, but still a nuisance, if you’re counting your Skype pennies. (This experiment has so far set me back €0,44. Money that has gone forever. Forever.) Other folk are reporting similar problems, although it doesn’t sound widespread.

Skype’s technical people say you should raise a help ticket if this happens to you. The only problem is: How do you know that it doesn’t get through? An interesting conundrum as Skype ventures into new waters. Consider: Cellular SMS supports a service which allows you to receive notification of the arrival of your message; Skype users can tell whether other Skype members are online and available. But now you can send an SMS to someone, unless the pending/delivered/failed notification feature works properly, all those presence/delivery indicators are out the window.

A weird disjuncture, given that Skype is best used for non-local calls. Skype is all about reaching beyond the tyranny of long distance communication costs. And the same is true of Skype SMS, I suspect, especially in those places where SMS is very cheap. Here in Indonesia, for example, cellular SMS to an Indonesian phone costs 250 rupiah, or 3 US cents. A Skype SMS costs 14 US cents. No one is going to send a Skype SMS to someone locally if that kind of price difference exists. So Skype SMS might best work if you want to communicate with someone who is not at their computer, or doesn’t have Skype (or doesn’t have a computer) but doesn’t live in your zone. Not a bad niche. But the problem still remains: If SMS via Skype is really going to kick in, reliability is going to be an issue. Who is going to use the service if they have no way of knowing whether their messages landed?

Something that Skype needs to fix.

Spammers Need To Be Funnier

By | November 22, 2011

Spammers should understand that if the best way into our inbox is by entertaining us. Most spam is just awful: offensive, grammatically dreadful (even allowing for efforts to get around filters) and revealing of the piteous lives the spammers and their drones lead. But if they could only smarten up their act we’d probably let them through. The guy, or guys, with a random “from” address creator get my vote. I just can’t help scouring my junk folder for gems. Here were some I found a few months back. Here are a few more:

Microwaving C. Grammes
Maillol L. Shrews
Lofting C. Amendable
Monomania I. Buxom
Zelma Mooney
Trammelled S. Intercessions
Amateurism G. Causal
Highchairs P. Polyphemus

There is a strange genius at work here.

(Some more:

Schoolwork B. Unrepeatable <era…
Threatenings T. Unanimity <stefa…
Aquaplaned J. Mammography <ya…
Unscrambling A. Proposes <yves…
Geronimo A. Lagging <mpneves@j…
Mischievousness R. Chestnut <co…
Preying A. Pallets <wilson@puerto…

Geronimo A. Lagging somehow appeals to me)

May 9 2006. Some more just in:

Saffron I. Compression <kmccarty…   
Deliberations R. Torpedo <tausq@…   
Accompaniments B. Exhibiting <m…   
Amputation H. Ulna <sharma@pro…   
Dubrovnik G. Overnight <cate@sl…   
Lummoxes B. France <newsbastar…   
Gluey E. Suitcase <jorge_f@u2clu…   

May 12 2006. Some more:

Cathy A. Capitulating <marcpa@g…
Toil T. Synthesizes <kevink@good…
Mildew A. Devastation <od_K@gr…
Threnody A. Tonsillectomies <wsul…
Electrocardiographs L. Downer <s…

May 13. More:

Cathy A. Capitulating <marcpa@g…
Toil T. Synthesizes <kevink@good…
Mildew A. Devastation <od_K@gr…
Threnody A. Tonsillectomies <wsul…
Electrocardiographs L. Downer

May 14:
Coxswain I. Connoisseur <tkriehle…
Inch R. Snoozed <baque@glslab.com>
Microscopes V. Baluchistan <maec…
Caucus V. Summerhouses <mlovell…
Imperative C. Urges <rabe@goed…
Carson L. Hostage <happyguy_pt…
Altiplano J. Thirstiest <alwyns@gr…
Unkind U. Downstairs <binner@bri…

The Fish That Was Ahead of Its Time

By | November 22, 2011

This is old news but it still comes as something of a shock to me: You have probably never heard of Enfish but you see its legacy in every desktop search program you’ll come across. That’s because the company helped promote the idea that searching your own files was as useful an activity as searching the Internet. This was back in 1998. It wasn’t entirely novel (there was something called Discovery put out by Altavista), but they did it amazingly well with an application called Tracker Pro that has, in my view, never been improved upon (including by Enfish themselves).

EnfishThe software, as far as I can recall, only worked on Windows 98 but it was powerful, powerful stuff. It indexed your hard drive, network drives and removable drives in the background (OK, there were some performance issues, but nothing you couldn’t overcome) and searches were lightning fast. What I particularly loved about it were the trackers — complex searches you could save and launch from a sidebar. You could give those strings a user friendly name and then share them with other users. You could also, if I remember correctly, tag files to make for more customized, personal searches. All this in a pretty cool interface, which let you view the document, email or whatever within Tracker Pro itself.

Those days have long since been over. Enfish — Enter, Find, Share — developed in different directions. Since late last year, Enfish as a company and product basically doesn’t exist. Instead you find this message on their website:

Dear Enfish Customers, As of November 1, 2005, Enfish Software will no longer sell its own products, but rather license its technology and patents to others.

From now on the technology has been licensed to another company, EasyReach, which I’m hoping to try out. The sad thing to me was that Enfish, despite a really strong first product, seemed to veer off in the wrong direction, instead of focusing on their core strength: powerful indexing flexible search. I found this immensely frustrating, although I also found their team, including still chairman Louise Wannier, very approachable and enthusiastic. They just never quite built on the promise of their first product.

Perhaps it was just a simple case of Enfish being ahead of their time. Now all the big players are throwing out products that pretty much do what Enfish Tracker did eight years ago. But none of them has quite the style that Tracker Pro had, I reckon. Bye-bye, weird hand-shaped fish thing.