May 11 2009

Emailaholics Reveal Their Habits

KentuckyFC writes “People can be accurately classified according to their email habits, say scientists from Yahoo Research in NYC, who have been studying the way 125,000 people use email on university campuses in the US and Europe. The team found that people fall into two clearly distinct types of emailer. The first group, “day labororers”, tend to send emails throughout the normal working day between 0900 and 1800 but not at other times. On the other hand, “emailaholics” tend to send emails throughout the waking hours from 0900 to 0100. These groups are pretty stable: roughly 75% of users stay in the same group over a 2 year period. That gives a pretty good way of classifying individuals that could be used by demographers. Interestingly, the technique can also be used to spot spambots which do not fit into either group.”

Read more of this story at Slashdot.


Share

May 8 2009

College Threatens Students Over Email Addresses

superdave98 writes “As a sign that a CIO has way too much time on his hands, Santa Rosa Junior College is sending emails threatening lawsuits to staff and students who have the letters ‘SRJC’ in their private email addresses. They contend that people could be confused and think these are official email addresses. Sure, I suppose people who fall for 419 scams probably could be fooled, but not any reasonable humans. I can’t believe they found a lawyer who thought this was a good idea.”

Read more of this story at Slashdot.


Share

May 7 2009

Court Sets Rules For RIAA Hard Drive Inspection

NewYorkCountryLawyer writes “In a Boston RIAA case, SONY BMG Music Entertainment v. Tenenbaum, the Court has issued a detailed protective order establishing strict protocols for the RIAA’s requested inspection of the defendant’s hard drive, in order to protect the defendant’s privacy. The order (PDF) provides that the hard drive will be turned over to a computer forensics expert of the RIAA’s choosing, for mirror imaging, but that only the forensics expert — and not the plaintiffs or their attorneys — will be able to examine the mirror image. The forensics expert will then issue a report which will describe (a) any music files found on the drive, (b) any file-sharing information associated with each file, and any other records of file-sharing activity, and (c) any evidence that the hard-drive has been ‘wiped’ or erased since the initiation of the litigation. The expert will be precluded from examining ‘any non-relevant files or data, including … emails, word-processing documents, PDF documents, spreadsheet documents, image files, video files, or stored web-pages.'”

Read more of this story at Slashdot.


Share

Apr 27 2009

UK Government To Monitor All Internet Use

nk497 writes “The UK government has further detailed plans to track all communications — mobile phone calls, text messages, email and browser sessions — in the fight against terrorism, pedophiles and organized crime. The government said it’s not looking to see what you’re saying, just to whom and when and how. Contrary to previous plans to keep it all in a massive database, it will now let ISPs and telecoms firms store the data themselves, and access it when it feels it needs it.” And to clarify this Barence writes “The UK Government has dropped plans to create a massive database of all internet communications, following stern criticism from privacy advocates. Instead the Government wants ISPs and mobile phone companies to retain details of mobile phone calls, emails and internet sites visited. As with the original scheme, the actual content of the phone calls and messages won’t be recorded, just the dates, duration and location/IP address of messages sent. The security services would then have to apply to the ISP or telecoms company to have the data released. The new proposals would also require ISPs to retain details of communications that originated in other countries but passed over the UK’s network, such as instant messages.”

Read more of this story at Slashdot.

Share

Apr 18 2009

Comic Sans, Font of Ill Will

Kelson writes “The Wall Street Journal profiles Vincent Connare, designer of the web’s most-hated font, Comic Sans. Not surprisingly, the font’s origins go back to Microsoft Bob, where he saw a talking dog speaking in Times New Roman. Connare pulled out Watchmen and The Dark Knight Returns for reference, and created the comic book-style font over the next week. ‘Mr. Connare has looked on, alternately amused and mortified, as Comic Sans has spread from a software project at Microsoft Corp. 15 years ago to grade-school fliers and holiday newsletters, Disney ads and Beanie Baby tags, business emails, street signs, Bibles, porn sites, gravestones and hospital posters about bowel cancer. … The jolly typeface has spawned the Ban Comic Sans movement, nearly a decade old but stronger now than ever, thanks to the Web.”

Read more of this story at Slashdot.

Share

Apr 15 2009

The Ecological Impact of Spam

krou writes “A new study entitled ‘The Carbon Footprint of Spam’ (PDF) published by ICF International and commissioned by McAfee claims that spam uses around 33 billion kilowatt hours of energy annually, which is approximately enough to power 2.4 million US homes (or roughly 3.1 million cars) for a year. They calculated that the average CO2 emission for a spam email is around 0.3 grams. Interestingly, the majority of energy usage (around 80%) comes from users viewing and deleting spam, and searching for legitimate emails within spam filters. They also claim that ‘An individual company can find that one fifth of the energy budget of its email system is wasted on spam.’ One of the report’s authors, Richi Jennings, writes on his blog that ‘spam filtering actually saves an incredible amount of energy.’ He continues, ‘Imagine if every inbox were protected by a state-of-the-art spam filter. We could save about 75% of the spam energy used today — 25 TWh per year; that’s like taking 2.3 million cars off the road.””

Read more of this story at Slashdot.

Share

Apr 13 2009

MPAA Spying Case To Be Appealed

esocid writes “Back in 2005, the MPAA hired Robert Anderson, a former associate of TorrentSpy’s owner, to illegally obtain internal emails and trade secrets. He did so by routing the email from the internal server to his own Gmail account. He subsequently sold 34 pages of stolen information for ,000 to the MPAA. TorrentSpy owner Justin Bunnel sued them for spying, but lost the case due to a ruling that stated it was not illegal since the information was not intercepted under the Wiretap Act. The EFF called this decision a ‘dangerous attempt to circumvent privacy laws,’ since it implies that the unauthorized interception of anyone’s personal email is legal. The appeal could have ramifications for MPAA president Dan Glickman, as the decision is expected around the time of his contract renewal.”

Read more of this story at Slashdot.

Share

Apr 5 2009

Spammers Say the Darndest Things

The Narrative Fallacy writes “Bill Sweetman has a tongue-in-cheek post about how a few years ago he started collecting some of the more outlandish and amusing email subject lines from the many thousands of spam emails he received promoting various ‘solutions’ related to his private parts. Sweetman, a Canadian internet marketeer now working for Tucows gets a guilty pleasure from the copywriting ‘skills’ of the spammers. ‘Sometimes the writing is clever. Sometimes it is accidentally funny. And sometimes it’s just plain bizarre.’ Sweetman writes that it takes a certain twisted creative genius to make your spam message stand out from the rest. and gives us ten of his favorite spam subject lines as well as his would-be replies to the messages. Favorites spam subject lines include ‘Small friend is for hiding, big friend is for showing off’ and Sweetman’s reply: ‘Even if the product they are pitching works as promised, I still don’t think I would be walking around the neighborhood showing off the results.'”

Read more of this story at Slashdot.

Share

Apr 5 2009

Designer Accused of Copying His Own Work By Stock Art Website

the_harlequin writes “A successful designer, who has a showcase of his own work available online, has had a stock image site accuse him of copyright infringement over his own illustrations, citing damages of ,000. The story doesn’t end there; the stock photo site hired lawyers, who have contacted the original designer’s clients. The lawyers told them the designer is being investigated for copyright infringement and their logos might be copied, thus damaging his reputation. ‘My theory is that someone copied my artwork, separated them from any typography and then posted them for sale on the stock site. Someone working for the site either saw my [LogoPond] showcase or was alerted to the similarities. They then prepared the bill and sent it to me. The good thing is that the bill gives me a record of every single image they took from me. That helps me gather dates, sketches, emails, etc. to help me prove my case. The bad thing is that despite my explanations and proof, they will not let this go.'”

Read more of this story at Slashdot.

Share

Mar 31 2009

Anonymous Blogger Outed By Politician

Snoskred writes with the story of a blogger who chose to remain pseudonymous, who has been outed by an Alaskan politician in his legislative newsletter. Alaska Rep. Mike Doogan had been writing bizarre emails to people who emailed him, and the Alaskan blogger “Mudflats” was one of those who called him on it. (Mudflats first began getting noticed after blogging about Sarah Palin from a local point of view.) Doogan seems to have developed a particular itch to learn who Mudflats is, and he finally found out, though he got her last name wrong, and named her in his official newsletter. The Huffington Post is one of the many outlets writing about the affair. The blogger happens to be Democrat — as is Doogan — but that is immaterial to the question of the right to anonymity in political speech. Does an American have the right to post political opinion online anonymously? May a government official breach that anonymity absent a compelling state interest?

Read more of this story at Slashdot.

Share