Re: [WebDNA] Captcha question (and free code)
This WebDNA talk-list message is from 2009
It keeps the original formatting.
numero = 103467
interpreted = N
texte = --Apple-Mail-145-266079948Content-Type: text/plain;charset=US-ASCII;format=flowed;delsp=yesContent-Transfer-Encoding: 7bitThe latest CAPTCHA techniques usually involve asking a question like, "What is one plus one?" or "What is the last name of the U.S. President?"Another effective technique is to display 4 or more images and ask the user to identify which one is the duck, for example. The more images you display, the less likely the automated bot will guess the right one.Of course, all CAPTCHAs are worthless against an actual human being. Many of my sites get comment spam that's actually posted by a human.On Aug 25, 2009, at 9:43 AM, Kenneth Grome wrote:> Do hackers these days use scripts that:>> 1- read the content of a web page> 2- extract strings like "two hundred eighty three"> 3- convert them into numbers like "283"> 4- enter these values into blank form fields>> ... so they can get past text-based captcha systems designed to > prevent forms from being submitted by hackers?--Apple-Mail-145-266079948Content-Type: text/html;charset=US-ASCIIContent-Transfer-Encoding: quoted-printable
The latest CAPTCHA =techniques usually involve asking a question like, "What is one plus =one?" or "What is the last name of the U.S. =President?"
Another effective technique is to =display 4 or more images and ask the user to identify which one is the =duck, for example. The more images you display, the less likely the =automated bot will guess the right one.
Of =course, all CAPTCHAs are worthless against an actual human being. Many =of my sites get comment spam that's actually posted by a =human.
On Aug 25, 2009, at 9:43 AM, =Kenneth Grome wrote:
Do hackers these days use scripts that:
1- =read the content of a web page
2- extract strings like "two hundred =eighty three"
3- =convert them into numbers like "283"
4- enter these values into blank =form fields
... so they can get past text-based captcha systems =designed to prevent forms from being submitted by =hackers?
=--Apple-Mail-145-266079948--
Associated Messages, from the most recent to the oldest:
--Apple-Mail-145-266079948Content-Type: text/plain;charset=US-ASCII;format=flowed;delsp=yesContent-Transfer-Encoding: 7bitThe latest CAPTCHA techniques usually involve asking a question like, "What is one plus one?" or "What is the last name of the U.S. President?"Another effective technique is to display 4 or more images and ask the user to identify which one is the duck, for example. The more images you display, the less likely the automated bot will guess the right one.Of course, all CAPTCHAs are worthless against an actual human being. Many of my sites get comment spam that's actually posted by a human.On Aug 25, 2009, at 9:43 AM, Kenneth Grome wrote:> Do hackers these days use scripts that:>> 1- read the content of a web page> 2- extract strings like "two hundred eighty three"> 3- convert them into numbers like "283"> 4- enter these values into blank form fields>> ... so they can get past text-based captcha systems designed to > prevent forms from being submitted by hackers?--Apple-Mail-145-266079948Content-Type: text/html;charset=US-ASCIIContent-Transfer-Encoding: quoted-printable
The latest CAPTCHA =techniques usually involve asking a question like, "What is one plus =one?" or "What is the last name of the U.S. =President?"
Another effective technique is to =display 4 or more images and ask the user to identify which one is the =duck, for example. The more images you display, the less likely the =automated bot will guess the right one.
Of =course, all CAPTCHAs are worthless against an actual human being. Many =of my sites get comment spam that's actually posted by a =human.
On Aug 25, 2009, at 9:43 AM, =Kenneth Grome wrote:
Do hackers these days use scripts that:
1- =read the content of a web page
2- extract strings like "two hundred =eighty three"
3- =convert them into numbers like "283"
4- enter these values into blank =form fields
... so they can get past text-based captcha systems =designed to prevent forms from being submitted by =hackers?
=--Apple-Mail-145-266079948--
Clint Davis
DOWNLOAD WEBDNA NOW!
Top Articles:
Talk List
The WebDNA community talk-list is the best place to get some help: several hundred extremely proficient programmers with an excellent knowledge of WebDNA and an excellent spirit will deliver all the tips and tricks you can imagine...
Related Readings:
WebCat2b13 Mac plugin - [sendmail] and checkboxes (1997)
Problems deleting when a search field is blank... (1998)
Retirement (2000)
frames & carts (1997)
db security on NT (1997)
PIXO support (1997)
WebMerchant 1.6 and SHTML (1997)
[REPLACE] inside [FOUNDITEMS] (1998)
Ongoing group search problems ... (1997)
WebTEN vs webSTAR (1998)
WebCatb15 Mac CGI -- [purchase] (1997)
html in a database (1998)
Web Browser %Numbers - A must read for web developers (2003)
WebCat2final1 crashes (1997)
New Docs (2003)
2 easy questions re: [showif] and [sendmail] (1997)
RE: [WebDNA] Electronic Delivery (download) (2008)
Further on formula.db failure to calculate shipCost (1997)
[WebDNA] [ipaddress] - [RealIP] - Not working properly (2016)
Searchable WebCat (etc.) Docs ? (1997)