Commenting Moderation Concerns Addressed

September 2011
Moderate Voice;9/12/2011, p3
Blog Entry
The article offers the author's insight on the abuse and loophole they found in the moderation tools of "The Moderate Voice" (TMV) web site, which forced them to make some verification of access and other features to address concerns. The author states that the verification cleared moderation queues, while the comment moderation has been locked and limited to users. The author apologizes for the frustrations caused by the problems.


Related Articles

  • Movin' Out? Evans, David // Plastic Surgery Practice;Sep2014, Vol. 24 Issue 9, p10 

    The article offers suggestions for the cosmetic surgeons before renting their websites. Topics discussed include the need of ensuring one's own website contents including content, images, and graphics before any upgrades, the need to take necessary precautions while hiring a company to develop a...

  • WEB SERVER AUTHORISATION WITH THE POLICYUPDATER ACCESS CONTROL SYSTEM. Crescini, Vino Fernando; Zhang, Yan; Wang, Weiyuan // Proceedings of the IADIS International Conference on WWW/Interne;Nov2004, p945 

    The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based language to represent access control policies. In this paper, we discuss the underlying details of the PolicyUpdater...

  • You Dun Goofed! Hayward, David // Micro Mart;8/1/2013, Issue 1271, p108 

    The article focuses on a hacking attack against the website Ubuntu Forums on July 20, 2013. The attackers defaced the website and stole the local username, password and electronic mail (email) address of every user. According to the author, the hacking incident reveals a lack of security on the...

  • Cyber thieves. Colman, Robert // CMA Management;Aug/Sep2003, Vol. 77 Issue 5, p44 

    Focuses of the need for business enterprises to protect their web sites from the cyber crime of domain slamming. Method of operation of domain slammers; Information on some cases of domain slamming in Canada; Steps suggested for companies to deal with the issue.

  • Guest Editors' Introduction to the Special Issue on Quantitative Evaluation of Computer Systems. Hillston, Jane; Kwiatkowska, Marta; Telek, Mikl√≥s // IEEE Transactions on Software Engineering;Mar/Apr2009, Vol. 35 Issue 2, p145 

    The article discusses various reports published within in the issue, including one about enhanced modeling and solution of layered queueing networks, another one about using simulation to examine the behavior of systems, and another one about quantitative verification.

  • 3 STEPS: PROCESS SUMMARY.  // APC (Bauer Media Group);Mar2009, Vol. 29 Issue 3, p102 

    The article offers step-by-step instruction in installing the Distriblend render queue manager for a computer distributed rendering benchmarks.

  • Detecting Phishing Websites: On the Effectiveness of Users' Tips. Alnajim, Abdullah; Munro, Malcolm // Journal of Digital Information Management;Oct2009, Vol. 7 Issue 5, p276 

    Phishing attacks have become a serious problem for users of online banking and e-commerce websites. Many anti-Phishing approaches have been proposed to detect and prevent Phishing. One such approach is the anti-Phishing tips published by many governmental and private organizations to help users...

  • Robust Detection of copy move forgeries for scanned documents using multiple methods. Prabhu, Anirudh; Zil Shah; Shah, Manan // International Journal of Computer Science Issues (IJCSI);Nov2012, Vol. 9 Issue 6, p436 

    Cybercrime and forgeries are growing at an alarming rate. There are a lot of places on the web that store scanned documents for future use. These documents are prone to damage and tampering. Misuse of such documents can turn out to be very dangerous. This paper proposes an easy way of detecting...

  • VXML: Proposing an Alternative Technology for Accessing Website Contents in Malaysia. Zamin, Norshuhani; Hashim, Mohd. Hafiz; Taib, Shakirah Mohd. // Proceedings of World Academy of Science: Engineering & Technolog;Feb2009 Supplement, Vol. 50, p1119 

    Voice Extensible Markup Language (VoiceXML)-enabled websites allow users to access the contents of the website via phone call. The use of VoiceXML technology that connects the callers to the application via Public Switched Telephone Network (PSTN) has made the phone-based application accessible...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics