Skip to:
Content
Pages
Categories
Search
Top
Bottom

Search Results for 'bots'

Viewing 25 results - 251 through 275 (of 331 total)
  • Author
    Search Results
  • #82553

    For those of you that want to directly influence the future of BuddyPress, http://trac.buddypress.org. Make it your friend. Learn it. Love it. Live it. Give it a hug everyday and patch a bug.

    The Trac is where you can post code snippets, or giant mega patches of code that you think should be integrated into BuddyPress. You can see the timeline of when people have done what, and see the outstanding bugs that need squashing before we can safely release the next version. The more bugs you fix, the more code you contribute, the more you are directly involved not only in the community, but directly in the future of the platform as a whole.

    As incentive to help out, if your goal is to be a developer and make a career out of BuddyPress, consider walking into a meeting with a possible client, and when they ask what your level of involvement is with WordPress or BuddyPress, and you can respond with “I make it,” your chances of securing that client are pretty good. In order to help make BuddyPress, you have to actually help us make it, and you do that via the Trac. I can say this, because that’s how I did it with both WordPress and BuddyPress, and I’m down to help you guys do it too. :)

    There are plenty of people that are highly active in the Trac that aren’t so much so in the forums, and vice versa. Since we moved BuddyPress.org over to 1.2, both Andy and myself have been busy with our own assignments that yes, do involve BuddyPress, but also involve other neat things like the WordPress.com “Like” feature and planning some neat things for a WordCamp.org redesign.

    Truth be told, if /anyone/ is concerned about where I am or what I’m doing in regards to BuddyPress or the future of the project, there are at least 10 methods to contact me directly and I am totally happy and not annoyed by anything that has to do with BuddyPress. Drop me a line, let’s chat :) http://en.gravatar.com/johnjamesjacoby

    To answer a few of the questions/comments/statements in this topic: Private Messages are turned off because spam bots have started targeting BuddyPress installations and we were getting hit pretty hard after we upgraded the site. Raise your hand if you got a PM from someone claiming to love you enough to help you with male enhancement. Regarding my absence in the forums, I’ve really just taken on too many clients and haven’t had the time to look backwards at support AND forwards at development at the same time. It won’t always be that way, but it has been lately and I like it about as much as you all seem to too. I love being in the forums and helping people out, and I’m sad I haven’t been able too recently.

    Andy is the figure head of BuddyPress and serves as the guiding light of the project similar to how Matt does for WordPress and bbPress, but there is no shortage of capable people in the BuddyPress community that could take this project by the horns and make it their own at any point. I know I’m not Andy, but if I can pretend to be to help anyone when he’s not around, ping me. :)

    Along the lines of what @matt said, I love using @nacin as an example. He stormed into the WordPress Trac and started contributing code and patching bugs. Some were great, and some were rubbish, but he learned as he contributed and within 1 calendar year he has merited his way into being a core committer for WordPress, and contributed something insane; like 60% or more of the commits on the WP3.0 branch are his doing or somehow as a result of his hard work and commitment to the project. While there is only one @nacin, there is plenty of room for any one of you to be very @nacin like.

    By the way, if there is an election and I’m voted out, I’m not leaving without a fight. :P You’ll have to chase me out of town with torches and pitchforks. :D

    #81605
    bobs12
    Participant

    Now… my spambusher script gives me some very rudimentary statistics… and in the 2 days and 9 hours since that post above, the number of spam registrations has gone up 50%… but the number that I actually delete myself has gone down by about the same number :D

    Which tells me two things:

    1. People or bots are actually following the link above and tripping the spambush

    2. Links to buddypress sites from buddypress.org are just ASKING to be spammed :)

    #81565
    r-a-y
    Keymaster

    Glad you figured it out.

    FYI, the community takes time out of their day to help people and write documentation for free. Contrary to popular belief, we are not robots! ;) We need more people like you to contribute to the codex, after all this is an open-source project. The more people that contribute, the more rich the documentation will be — open source documentation!

    Also, sometimes forum posts are missed due to the amount that gets posted. A simple post to bump your thread after 24 hours will help bring attention to your issue.

    #81394
    Philo Hagen
    Participant

    Spammers target all social networks. They literally overran an elgg site I have and I’m rebuilding with WP/BP. A few still get through with the latest BP and anti-spam and custom profile fields, not a lot, two or three a day, but that’s nothing. I found about 600 in my first month in my users that never made it to the surface. As for the few that did, having a couple fill in custom profile fields is really helpful. The bots that do sneak through fill those two spots with gibberish, in my case age and location, so it’s easy to identify spam members.

    #80416

    In reply to: Spam Blogs

    David Lewis
    Participant

    Actually… Terry is correct. SPAMers are in fact hiring people from India to fill our registration forms and CAPTCHA’s by hand. They get paid next to nothing and just sit there for hours and hours a day filling out CAPTCHA’s. I’m sure the majority of SPAM comes from Bots… but it’s not all bots. And there is no way to stop a human short of banning entire countries.

    #80171

    In reply to: Spam Blogs

    Sam Steiner
    Participant

    I am also having this problem – I guess everybody is. I also followed the tips you mentioned and initially, it reduced splogger registrations a lot.

    However, I disagree with Terry: there are not real people setting up blogs and answering captchas, these are bots. As kiwipearls mentioned, if you go and try to sign up manually, you have to fill in the required fields.

    There is a leak somewhere in BuddyPress/WPMU registration and all methods to stop the oil have failed until now. BP (haha) people say it’s WPMU and the other way around, I guess. The leak has been here for months and nobody seems to want to fix it. Maybe it’s some kind of corruption since the premium site Terry mentioned has a way to fix it.

    #78417
    Peter Kirn
    Participant

    Hi Jeff, I can’t make the chat Wednesday as I’m going to be on a plane between London and Hamburg, but I wanted to add to this:

    1. wp-recaptcha — I’m working with the developer of this plug-in so that we have one fork that works everywhere, BP included. Given that this is the topic, let me try to get that basic code up. Even with simple recaptcha support, there’s a huge decrease in spam signups. It seems not to solve the smartest scripts, the ones that send PMs (at least not on our site), so I think once we get one recaptcha working, making the “failed” recaptchas more intelligent to avoid these automated bots would be great. Thanks for the ideas above — this is great fodder — so I’d encourage people to get involved on the same fork so we can put this into action sooner rather than later. Let me post a separate update within the next couple of days.

    2. Since PMs are a big problem, and this thread is getting very, very ambitious, why not at least begin testing this with a separate plugin? I’d like to at least see something that stops mass-mailings and highlights that user, as that’d be an easy way to weed people out, at least as more comprehensive solutions are developed.

    3. Reviewing core is probably worthwhile. A mistake in bp_signup_validate’s code was being exploited by hackers. I know this is part of 1.2.4, but I went ahead and applied the diff attached to this (now-closed) ticket to our current 1.2.3 install:
    https://trac.buddypress.org/ticket/2289
    — this made a big difference. I wonder if anything else follows this pattern, and how we might hunt it down.

    Grand, wide-reaching plans sound terrific, but I’d hate if that derailed some short-term fixes; seems we can have both.

    #78129
    fox3man
    Member

    Well! “SI CAPTCHA Anti-Spam” not really works. Spammers registration keep coming. The number of a day has been reduced but still can’t stop them. I assume the spammer bots may smart enough to OCR the words in CAPTCHA or could listen to the audio assist then they could generate a correct input to pass the registration. So I set CAPTCHA to “high” level and uncheck the audio option. The last 24 hours I got 10 spam registers. I wonder if a plug-in can spell check the field input may help eliminate most of these spammers.

    #78004
    fox3man
    Member

    Yeah! I believe they are spam accounts. They are keep coming from all over the world. I have just install plugin “SI CAPTCHA Anti-Spam” on all three wpmu web sites. It should stops the spam bots if you are not “human”….lol. Thanks all you guys!

    geekoftodd
    Member

    My error log (I deleted info that I believe to be private.

    File does not exist: public_html/robots.txt

    File does not exist: public_html/feed

    File does not exist: public_html/wp-content/themes/unplugged/_inc/css/reset.css, referer: http://geekoftodd.com/

    File does not exist: public_html/members, referer: http://geekoftodd.com/members/

    File does not exist: public_html/favicon.ico, referer: http://geekoftodd.com/

    File does not exist: public_html/activity, referer: http://geekoftodd.com/

    I’m guessing that I need to move some buddypress files so hostgator can find them or is this like in certain programs where I have to locate them manually for them to be recognized? Thanks any help would be great.

    #77941
    gibbyesl
    Member

    I guess these could be spam bots inputting data to pass the registration
    I know a lot of work is going on now in the background to help stop this
    Stay tuned

    #77288
    foxly
    Participant

    PART 3 – STRONG -vs- WEAK METHODS

    When it comes to spam on BP sites, you’ll see all sorts of stuff posted on blogs saying “change [whatever] on your site and your spam problem will disappear”.

    Truthfully, a lot of these tricks will actually work …for a while… but eventually, the spammer makes a minor change to their bot, and they’re back in business. In fact, many of the leading blog spamming packages include sophisticated logging features to catch the errors that “uniquely configured” blogs generate and help the spammer quickly fix the “problem”.

    If we’re going to have a reliable anti-spam solution for BuddyPress, we should probably focus on “Mathematically Strong” methods, not on “Obfuscation” and “Moving Things Around”. That way, we won’t have to constantly change our spam protection methods.

    Changing Page Slugs

    Many people recommend changing the page slugs on BP installations to reduce spam. While this is certainly easy to do, you of course need to give your users *links* to those page slugs somewhere on your site so they can actually visit the pages. And if users can follow the links, so can a spam bot.

    Changing page slugs is kind of like boarding-up the front door of your house, installing a new door in the side of your house, and then attaching a piece of string from the front door to the side door of so everyone can find the new door.

    The “change your page slugs” approach seems to come from the “change your admin menu URL” technique. Changing your admin menu URL is actually a *strong* protection technique. Since there is no link to it anywhere on the site and you’re the only one that knows the URL, it’s like having two passwords on your admin login. An attacker would have to try billions of URL’s to find it.

    Not so with all the other URL’s on your site. They have to be linked off other pages so your users can find them.

    Adding Fake Form Fields

    Many people recommend adding a few extra fields to forms throughout your site (sign-up, login, post to group, etc) and “hiding” these fields using CSS. If any of the “trap” fields are filled out, in theory, you’ve just detected a bot, because a normal user would never see the fields and fill them out.

    This approach *might* defeat a very simple bot that searches every web page it can find for forms, and fills every field in every form with random spam; but it will not defeat a bot that understands CSS or is specifically targeted at BuddyPress, especially considering that BuddyPress is *open source*.

    Don’t think bots can analyze CSS? Read this: http://www.google.com/support/webmasters/bin/answer.py?answer=66353

    A bot designer can simply read through the BP source code and discover the names of the fields that should be filled in and the names of the fields that should be left empty.

    To use our “house” analogy, adding extra form fields is like installing 3 front doors on your house and rigging two of them with grenades …then hanging a big red “out of order” sign on the the two rigged doors so your friends don’t use them.

    Obviously if your friends can read the signs, so can your enemies.

    JavaScript Proof of Work

    Javascript proof of work (Wp Hashcash) defeats spammers by making visitor’s web browsers solve a math problem in JavaScript before they are allowed to post.

    Because everyone knows spam bots can’t run JavaScript.

    http://forums.digitalpoint.com/showthread.php?t=1124949
    http://www.scrapebox.com/
    http://blogcommentdemon.com/
    http://www.senuke.com
    http://www.botmasternet.com/more1/

    Except when they can. ;)

    There’s also the issue of what to do with visitors that don’t have JavaScript enabled.

    The WordPress and BuddyPress development teams have put an epic amount of work into ensuring both platforms will work reliably when JavaScript isn’t available. Requiring users to have JavaScript to post any kind of content to the site nullifies much of this work.

    Proof-of-work was a great idea back in 1997 when spammers ran hundreds of attack threads from a single server and solving the JavaScript math problems slowed it to a crawl.

    In 1997, we’d be dealing with a single spammer running 1000 attack threads against the site. Because the spammer was running 1000 threads, each of which would have to solve the JavaScript problem, they would effectively be penalized 1000 fold over a normal user. The end result is they would only be able to run a few threads before their computer slowed to a crawl and their spamming abilities would be sharply limited.

    Epic win for site.

    Unfortunately, things are different in 2010.

    Spam bots have become the tool of choice for basement SEO marketers. Instead of a few members of the “spam elite”, we’re dealing with tens of thousands of “do it yourself” spammers each running 1 attack thread using the new “automatic backlink software” they just picked up for $29.00 off some random SEO website. Instead of fighting one spammer splitting their resources across a thousand threads, we’re fighting a thousand spammers running a single thread dedicated *just to our site*.

    Skipping a ton of math, what this means, is that in order to cause a spammer a 1-second delay while their computer solves our JavaScript challenge, we have to cause each of our *legitimate users* a 1 second delay while *their* computer solves our JavaScript challenge. And, considering the 3 to 5 second database lag I see on 90% of the BP sites I visit, the challenge would need to take much longer than a second to have any merit at all …otherwise page refresh time would be the limiting factor, not the JS challenge.

    So what happens when a user visits the site using a computer that is much slower than a typical desktop …say a mobile phone or an old laptop? The challenge would take proportionally longer to complete. A challenge that requires 5 seconds to solve on a desktop PC, could take 30 seconds on an iphone …and 30 second response times would not make for an enjoyable user experience.

    Overall, proof-of-work challenges are probably not a good choice in the 2010 Internet landscape.

    Mathematically Strong Methods

    In the next post, I’ll cover the specific details of the methods I’ve proposed for the BP spam solution, and why they will defeat most spam attacks.

    ^F^

    #77148

    In reply to: Members only

    Shnooka30
    Participant

    Thanks, I did install that and there is a load of info there. Maybe ill work on that and see how it is.

    This plug-in works great, however it sends users to the backend login form and not the register page. Can’t figure out how to redirect to register page.

    class RegisteredUsersOnly {
    var $exclusions = array();
    // Class initialization
    function RegisteredUsersOnly ()
    {
    // Register our hooks
    add_action( ‘wp’, array(&$this, ‘MaybeRedirect’) );
    add_action( ‘init’, array(&$this, ‘LoginFormMessage’) );
    add_action( ‘login_head’, array(&$this, ‘NoIndex’), 1 );

    }

    // Depending on conditions, run an authentication check
    function MaybeRedirect() {
    global $bp;
    // If the user is logged in, then abort
    if ( current_user_can(‘read’) ) return;

    if ($bp&&($bp->current_component == BP_REGISTER_SLUG ))//buddypress
    return;
    #’wp-trackback.php’,
    #’wp-app.php’,
    $this->exclusions = array(
    ‘wp-login.php’,
    ‘wp-signup.php’,
    ‘wp-register.php’,
    ‘wp-activate.php’,
    ‘wp-cron.php’ // Just incase
    );
    // If the current script name is in the exclusion list, abort
    if ( in_array( basename($_SERVER), apply_filters( ‘registered-users-only_exclusions’, $this->exclusions) ) ) return;

    // Still here? Okay, then redirect to the login form
    auth_redirect();
    }

    // Use some deprecate code (yeah, I know) to insert a “You must login” error message to the login form
    // If this breaks in the future, oh well, it’s just a pretty message for users
    function LoginFormMessage() {
    // Don’t show the error message if anything else is going on (registration, etc.)
    if ( ‘wp-login.php’ != basename($_SERVER) || !empty($_POST) || ( !empty($_GET) && empty($_GET) ) ) return;

    global $error;
    $error = __( ‘Only registered users can watch this site. Please register or login.’, ‘registered-users-only’ );
    }

    // Tell bots to go away (they shouldn’t index the login form)
    function NoIndex() {
    echo ” n”;
    }

    }

    // Start this plugin once all other plugins are fully loaded
    add_action( ‘plugins_loaded’, create_function( ”, ‘global $RegisteredUsersOnly; $RegisteredUsersOnly = new RegisteredUsersOnly();’ ) );

    #77018
    5887735
    Inactive

    My BP site is fairly new. I had one PM spammer and I changed my register slug and added birth day to the required fields and so far no return spammers (about 1000 new members per month, 4,000 current). I’m sure this won’t end attacks, but hopefully it with stave off many of the BOTS.

    #77001
    5887735
    Inactive

    Maybe BP should require that you choose your own register slug after activating the plugin. Perhaps also require you name your required fields fields, instead of the default “name” or “base.” The less default settings BP has the harder it is for BOTS.

    #76958
    foxly
    Participant

    All About BuddyPress Spam

    From what I’ve seen over the past few days, the range of knowledge about spam in the BP community ranges from zero to PhD research project. So, to get this thread off to a productive start, I’m going to give everyone some background info on why spammers target our installations, how they do it, and what we can do to reduce or eliminate these kinds of attacks.

    1) Why do spammers attack BP communities?

    -> Spam is 100% economically motivated. Spammers do what they do because it’s very profitable. Even if only 1 out of a million messages the spammer sends actually reaches somebody, if it cost $2 to send out those million messages and the spammer makes $50 by tricking one person into giving them a credit card number, the spammer is going to throw every resource they have into sending out more messages …because they’re getting a 2500% return on their investment.

    -> Given the choice between multiple sites, a spammer will pick the one that gives the largest payout.

    Gmail is a “hard” target, with users that are experienced with spam. If a spammer sent a billion spam messages to accounts on Gmail, 99.9% of them would be probably be deleted by automated filters at other ISP’s along the way before even arriving at Gmail. The first thousand messages that arrived at gmail would likely be delivered but would be put in user’s spam folders; and the remaining 999,000 messages would be flat-out refused by Gmail’s servers.

    Because anyone with an email account is familiar with spam, probably 999 of those 1000 users would ignore the spam message and 1 user might act on it. So if it cost $20 to send those billion messages and the spammer made $50 by tricking the one person into giving them a credit card number, they’ve only made $30 for all that work.

    BP communities are usually “soft” targets that are inexperienced with spam.

    Once a spammer gets into a BP community, every single message they send is delivered to a member, and most members are NOT expecting to be attacked by other users on the site.

    If a user called “site_news” sends everyone a message that says: “Our site just got featured on Oprah! check out the video! http://www.youtube.com/watch/dQw4w9WgXcQ.cn” every single member is going to get that message, and probably half of them are going to click on the link. (did anyone notice what’s wrong with that “YouTube video” … ;) )

    Then, assuming there are 50,000 members on the BP site, half of them click on the link, half of those people are using Internet Explorer, and the attack site the link points to installs a backdoor on computers running IE …at $2 / install the spammer has just made $25,000!

    Now, if *you* were a spammer, which site would you attack?

    2) How do spammers find BP communities?

    Using Google.

    Example: http://www.google.ca/search?hl=en&q=%2B”is+proudly+powered+by+WordPress+and+BuddyPress” (front page of every BP site on the net)
    Example: http://www.google.ca/search?hl=en&q=inurl:%22/community/members/%22+%2Bbuddypress (members page of every BP site on the net)

    3) How do spammers attack websites?

    -> Most spam attacks are done using robots, because sheer volume of posts is usually the winning factor. In situations where there is a “captcha wall” or other defense blocking registration to a “high value” site (hint: yours), spammers will use people in low-wage countries to break the captcha and sign up on the site. The going rate is about $2 per 1000 captchas.

    http://www.decaptcher.com/client/

    Once inside the site, they will then use bots to post spam to all the members on the site.

    -> There are literally *thousands* of different programs available that spam websites, and they all have *different* venerabilities.

    For example, this program: http://forums.digitalpoint.com/showthread.php?t=1124949

    a) Will DEFEAT a “hidden fields” challenge,
    b) Will DEFEAT a “javascript proof of work” challenge,
    c) Will FAIL a “captcha” challenge
    d) Will FAIL an “Akismet” challenge
    e) Will FAIL a “Hashed Form Field ID” challenge

    But this program: http://www.botmasternet.com/more1/ , wikipedia: http://en.wikipedia.org/wiki/XRumer , video of it running: http://www.youtube.com/watch?v=AL2i4SNPJmg

    a) Will DEFEAT a “hidden fields” challenge,
    b) Will DEFEAT a “javascript proof of work” challenge,
    c) Will DEFEAT a “captcha” challenge
    d) Will DEFEAT an “Akismet” challenge (uses proxy networks, never sends the same message twice)
    e) Will DEFEAT a “Hashed Form Field ID” challenge
    f) Will FAIL a “enter the numbers with a triangle over them” challenge (as used by PlentyOfFish.com)
    g) Will FAIL a “click on the photos of cats but not the photos of dogs” challenge

    4) How do we stop spammers from attacking BP communities?

    -> By making it frustrating and unprofitable (but not necessarily impossible) for spammers to target us; while making these tactics invisible to normal users.

    I will cover how I propose to do this in the next post.

    ^F^

    #76476
    5887735
    Inactive

    I’m getting these on my own site. These are spam bots and they found a way into BP. This should be a number one priority for BP. I’ve seen this stuff with phpbb and other CMS. It very easy for these people to bring down your site.

    #76190

    In reply to: Avatar Upload issue

    jay
    Participant

    are you hosted at godaddy? my programmer thought it had to do with the following:

    • can you check the hosting company if they have GD library correctly installed- go daddy said everything was fine, but their email customer service seems to be done by robots as they never answer correctly, they said it had to do with folder permissions which was not the case.

    #75514
    jwack
    Participant

    Thanks.

    #75407
    r-a-y
    Keymaster

    WP does generate a virtual robots.txt file, but I’m not sure if you can count BP in the mix as I’m not quite sure if BP does anything to it.

    Try using this plugin to manage WP’s virtual robots.txt:
    https://wordpress.org/extend/plugins/pc-robotstxt/

    #75406
    jwack
    Participant

    ne1?

    #74956
    Michael J Challis
    Participant

    FYI, Today I updated SI CAPTCHA Anti-Spam for latest version of buddypress 1.2.3 compatibility

    SI CAPTCHA Anti-Spam

    https://wordpress.org/extend/plugins/si-captcha-for-wordpress/

    This plugin adds CAPTCHA anti-spam methods to WordPress on the comment form, registration form, login, or all. In order to post comments or register, users will have to type in the code shown on the image. This prevents spam from automated bots. Adds security. Works great with Akismet. Also is fully WP, WPMU, and BuddyPress compatible.

    #71137
    Gene53
    Participant

    The best trick I learned for fighting spam bots is to ask a question that only a human can answer and making them type it into a text box. If you change the question daily or randomize it, it makes it even tougher. Don’t do anything like math or captcha or something that a bot can calculate or decipher. Ask a question like “What color is snow?” or “How many sides does a triangle have?”

    +1 for that idea, I had this on 2 SMF forums and it does work. While it doesn’t stop the odd human Spammer from registering, it stops bots dead in their tracks.

    Maybe a coder would consider making such a BP plugin.

    #71077
    David Lewis
    Participant

    There are multiple entry points for SPAM bots… so any one measure probably won’t accomplish much. I posted a list of everything I did in the “Spam, Spam and more Spam” thread. Worse case… you could try captcha.

    #70348
    snark
    Participant

    Still looking for help on this. My new BP site finally went live today — http://www.wordlab.com/ — and I’m getting a couple signups per hour that never click on the activation link. Some may be legit but can’t figure out the activation process, but from email correspondence I’ve only found one who fit that bill — the others never respond to me, so I’m guessing a fair percentage of them are spambots using fake email addresses.

    So it would be great to have these improved User sorting options in the WP Admin, so I could track down bogus registrations, perhaps those that haven’t been activated after a set amount of time, and delete those users in batches. An alternate strategy would be to have the system auto delete (or delete en masse on command) any registrations that are never confirmed after a set period (10 days, 30 days, etc.)

Viewing 25 results - 251 through 275 (of 331 total)
Skip to toolbar