PHP Spam Poison – Free Download
Overview The PHP Spam Poison is a fake-page generator that simulates long lists of fake email addresses and links to more generated pages, to be harvested by spam-robots, effectively poisoning their databases with useless email addresses. This spam poisoner was inspired by the WPoison software from Monkeys.com. Features of the PHP Spam Poison It uses PHP, so no CGI access is needed. Fast and lightweight. Highly configurable. Can be included by others PHP pages. Require software available in most hosting services. Doesn’t require a SQL database. Works in Linux/Unix and Windows servers (with IIS or Apache). GPL license (open-source). Simple to install. Requirements Required: PHP 4.1.x or higher. Your web server should be able to interpret the PHP language. It really doesn’t matter the platform (tested with GNU/Linux and Windows 2000). Required: A web server. It should work with any web server running in your workstation or server (tested with Apache in GNU/Linux, with Apache in Windows 2000 and IIS in Windows 2000). Download the PHP Spam Poison The current version are available as a tar.gz package or as a zip file at http://www.mariovaldez.net/software/phpwpoison/ Also you can find ther the Readme (readme.txt), Changelog (version.txt), checksums (checksums.txt) and license (license.txt) files. Installation of the PHP Spam Poison Installation 1) Get the files Get the files from http://www.mariovaldez.net/software/phpwpoison/ (There are zip and tar.gz files available). Be sure to download also the wordlist. 2) Unpack Extract the script files in a web server directory. That will create a “phpwpoison” directory with few filesinside. Then unpack the wordlist and save it in the same directory. 3) Change ownership Change the ownership of those files and the directory “phpwpoison” to the user used by your web server (usually “nobody” in Unix/Linux). To change the ownership in Linux/Unix, you execute in a shell terminal. chown -h -R nobody:nobody phpwpoison/ In Windows environments, using the Windows Explorer, check the Security tab of the Properties dialog of the directory, and set the permissions so that the user IUSR_servername has permissions to read and write on the “phpwpoison” directory. If you cannot set the ownership, at least be sure to enable writting permissions in the directory. 4) Rename the […]