So no one showed to my study group. After waiting around two hours, I joined Caleb, Adric, Roni and Sam for lunch.
I've noticed some spammers on Crystal's site trying to spam the guestbook... still. Someone or something has figured out there is a captcha and is now requesting the cap. image. However, they are clearly unable to crack the captcha. I'm wondering if someone has taken the time to review the page, or if spam software has grown to the intelligence of automatically being able to determine what image the captcha resides. Tazz's site started getting hit by a spammer using the comments form. However, I had already implemented the captcha in this script, and it just needed to be enabled. So only a couple of spam messages were received before I prevented that from happening again.
Captchas get a lot of bad rep on the net, but I've had nothing but very positive experiences myself. I read a blog a few days ago talking about how captchas were ineffective, citing this site
with the stat that 92% of captchas can be defeated. Looking at the site, it's quickly obvious the site hasn't been updated in several years—the newest "news" article is from 2002. Not listed are any of the more recent captcha systems. Modern visual captchas are designed to defeat OCR software by creating problems OCR can't solve. Currently, the only way to defeat these systems is by convincing someone to type in the captcha word—an attack known as the "free porn" attack. The only decent alternative to captchas is filtering by either using some kind of IP blacklist or content analyse. Blacklists require a continuous updating source, and even then, you could always be one of the first. And content analyse is something many spammer take into consideration when sending messages, often testing against systems designed to weed out their messages. So, while some might find it annoying, I'm sticking with captchas—at least until something better and just as reliable comes along.
Pictured is Roni.