With all due respect to Kunsheng, I'd really need to know a whole lot about how the collected data is going to be used, how fast the client will scan, etc.
... and even then, my very first reaction is "no." Our web server logs show dozens of spiders, searching pages for mailto: links and known vulnerabilities, and as an ISP, that's all lost revenue. I suspect it's all reasonable, but for something like this, I have to know. It has to be impeccably clean. -- Lynn erbenton wrote: > Kunsheng Chen wrote: >> Hi everyone, >> >> >> Project Anansi has been fixed for several bugs and restart again. >> >> Following is the project link: >> >> >> http://canis.csc.ncsu.edu:8005/anansi >> >> >> The project locates in Raleigh North Carolina, which is maintained by NCSU. >> >> >> Feel free to join the project, we are looking forward to your helps! >> >> >> Thanks, >> >> -Kun >> >> >> >> >> _______________________________________________ >> boinc_dev mailing list >> [email protected] >> http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev >> To unsubscribe, visit the above URL and >> (near bottom of page) enter your email address. >> >> > What is this? sounds like a chinese web attack machine. > > From the Anansi sight linked in the post: > > About Anansi > Anansi is a research project that uses Internet-connected computers to > explore web resources around the world. > _______________________________________________ > boinc_dev mailing list > [email protected] > http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev > To unsubscribe, visit the above URL and > (near bottom of page) enter your email address. > _______________________________________________ boinc_dev mailing list [email protected] http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev To unsubscribe, visit the above URL and (near bottom of page) enter your email address.
