EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.27.07

The ‘eet’ Nuisance Has Many Proxies/Indentities

Posted in Site News at 6:36 pm by Dr. Roy Schestowitz

The abusive character/s known as ‘eet’ (and dozens of variations of this name) is/are trying hard to get its/their personal attacks through and into this Web site. What’s curious is the wide variety of IP addresses that ‘eet’ is/are able to pull, even just minutes apart.

Recent examples (from the past hour alone):

  • 200.144.17.34 (smtp.jales.sp.gov.br)

Yes, that’s ‘eet’ posting from the government of Brasil.

  • 210.87.251.43 (tmhaos04.imsbiz.com)

Care to join ‘eet’ from Honk Kong?

  • 78.54.161.141 (f054161141.adsl.alicedsl.de)

That’s a German ISP.

  • 85.116.205.64 (64-205-116-85.dsl.manitu.net)

Another one.

‘eet’ seems to be getting around a little too much. Either it’s not one person, or that person has an extraordinary reach to many computer resources around the world, including the Brasilian government (maybe it’s a zombie PC). The more you find out about this ‘eet’ phenomenon, the more amazed you become. Someone who can post 40 comments in just one day (especially in a site that which asked it to go away) truly raises suspicion.

We’ll continue our attempts to intercept abusive trolling, but it seems to be getting harder. Perhaps the high levels of site traffic have given someone reason for concern.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

4 Comments

  1. Jim Powers said,

    November 28, 2007 at 12:24 am

    Gravatar

    The eet isomorphism:

    a) some [insert colorful description here] or several of said are essentially joy-riding. Getting off on trying to hack their way in to the site. It’s becoming a personal challenge.

    b) A clearly obsessed individual, ironically, considering how many times he’s suggested that Roy get a life seems to have all but dedicated his life to dropping random blobs of nonsense here. The downside is that sick people are potentially dangerous.

    c) A “professional” agent. Hired by the organizations criticized here yo actively harass this site and spread disinformation.

    Couple of potential next steps:

    1. Suppress the comments altogether. Unfortunately you will have to evaluate each post and decide for yourself if this is a post from the “offending parties” or not.

    2. Consider exposing more information. Perhaps along with the nifty troll banner on the bottom of each post you can also publish the email used and the IP address with whois information of where the post came from.

    You may have to go to a “close loop” identification system. One where you will have to have a validated e-mail address. So you’ll need a full sign-on and send out a validation e-mail with a code to close the loop. At least then he’ll have to keep making e-mail addresses. Of course this just means that he/she/it will have to keep creating e-mail accounts to sign up. But every time you shut down an account they will have to do it again.

    Anyway, my two cents. If I’d have to guess though, I’d be thinking professional infiltrator. A.K.A. union buster or some such.

  2. Roy Schestowitz said,

    November 28, 2007 at 12:50 am

    Gravatar

    At the moment I cage these comments, of which they are many (I won’t say how the problem was solved because that can help ‘eet’ penetrate the system). They are all abusive. These comments are read by just one person, but they won’t show up. Some of the previous IP addresses are also blocked and for those who have not followed this sage, we’re talking about an entity that was malicious enough to force us to do this.

  3. Tracy Reed said,

    November 28, 2007 at 1:07 am

    Gravatar

    I bet this is just one person using tor. tor has tons of exit nodes all over the net so it is easy to appear to control many IP’s

  4. Roy Schestowitz said,

    November 28, 2007 at 1:47 am

    Gravatar

    Hi Tracy,

    Yes, I’ve considered this. I’m aware of other people who do this (and if you keep an eye on USENET, you probably know which people I’m referring to).

What Else is New


  1. Links 2/9/2014: GNU/Linux in BBC, Calls Against systemd

    Links for the day



  2. Links 1/9/2014: Poettering on systemd, ITNews on DBMSs

    Links for the day



  3. Moving Away From Windows to GNU/Linux and the Abandonment of Windows as the Modest Proposal These Days

    Morale of GNU/Linux and an embrace of GNU/Linux is very high, despite recent propaganda from Microsoft MVPs and boosters (primarily security-themed and Munich-themed FUD)



  4. Korean Press Slams Microsoft Over Patent Extortion Against Linux/Android as New Abuses Resurface

    Harsh words from the national press of South Korea as Nokia's role in Microsoft's anti-Linux tactics becomes more apparent



  5. More Good News About Patents and Their Demise in the United States

    A roundup of news about software patents and patent trolls in the land where these thrive



  6. Links 31/8/2014: Linux 3.12.27, Akademy 2014

    Links for the day



  7. Links 30/8/2014: Jailhouse 0.1, *buntu 14.10 Beta

    Links for the day



  8. Links 28/8/2014: Many New Games, CTO of Red Hat Steps Down

    Links for the day



  9. We Are Gradually Winning the Battle Against Software Patents

    The once-elusive war on software patents is finally leading to some breakthrough and even the Federal Circuit reinforces the trend of software patents' demise



  10. Free/Open Source Software (FOSS) Companies Versus FOSS Moles (VMware, Sonatype, Xamarin)

    A look at three entities which pretend to be pro-FOSS but are actually FOSS-hostile and very much determined to replace FOSS with proprietary software



  11. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  12. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  13. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  14. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  15. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  16. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  17. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  18. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  19. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  20. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  21. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  22. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  23. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  24. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  25. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  26. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  27. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  28. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  29. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  30. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts