Fusker: Difference between revisions
→Etymology: Pfuscher only /very/ rarely translates dabbler or charlatan. |
Citation bot (talk | contribs) Added date. | Use this bot. Report bugs. | Suggested by Dominic3203 | Category:Web scraping | #UCB_Category 8/31 |
||
(28 intermediate revisions by 19 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Software that extracts images in bulk from websites}} |
|||
'''Fusker''' is a type of [[website]] or [[utility software|utility]] that extracts images from a web page, typically from [[free hosted galleries]]. Fusker software allows users to identify a sequence of images with a single pattern, for example: |
|||
'''Fusker''' is a type of [[website]] or [[Utility software|utility]] that extracts images in bulk from a website (typically from [[free hosted galleries]]) by systematically loading and downloading images following a pattern in the website's URL scheme. '''Fusking''' or '''fuskering''' is often used to extract private and nude photos without consent of the owner.<ref>{{Cite web|title=Photobucket shuts down Reddit's nude photo thieves|url=http://www.nbcnews.com/technolog/photobucket-shuts-down-reddits-nude-photo-thieves-947131|access-date=2021-08-14|website=NBC News|date=16 August 2012 |language=en}}</ref> |
|||
⚫ | Fusker software allows users to identify a sequence of images with a single pattern, for example: <code><nowiki>http://www.example.com/images/pic</nowiki>[1-16].jpg</code>. This example would identify images pic1.jpg through pic16.jpg. When this pattern is given to a fusker website, the website would produce a page that displays all sixteen images in that range. Patterns can also contain lists of words, such as <code><nowiki>http://www.example.com/images/{small,medium,big}.jpg</nowiki></code>, which will produce three URLs, each with one word from the bracketed list. The web page is then presented to the person who entered the fusker, and can also be saved on the fusker web server so that other people may view it. |
||
<nowiki>http://www.example.com/images/pic[1-16].jpg</nowiki> |
|||
This would identify images pic1.jpg, pic2.jpg, through pic16.jpg. |
|||
⚫ | When this pattern is given to a fusker website, the website would produce a page that displays all sixteen images in that range. |
||
== Fusker implementations == |
== Fusker implementations == |
||
[[Server-side]] fusker software extracts content (e.g. image or video) from its original location and displays it in a new page on the client-side (user's web browser). |
[[Server-side]] fusker software extracts content (e.g. image or video) from its original location and displays it in a new page on the client-side (user's web browser). Content is separated from the surrounding information that the content host may have intended (e.g. links to affiliates or pay-per-click ads). However, the content is not downloaded locally to the client by the fusker server; the new page that the fusker server produces [[hotlink|instructs the client web browser to retrieve each piece of content from the content host web server and display it in the new page]]. This can lead to excessive internet bandwidth usage and waste. Many [[server-side]] implementations of the Fusker technology are available on the web. |
||
In addition, a fusker can also be implemented as [[client software]] that completely bypasses the need for a third-party fusker web site. By eliminating the need to fusker via a [[web site]], the need to use a [[web browser]] is also eliminated. Due to not using a [[web browser]], fusker [[client software]] will often store downloaded content locally on the [[client machine]]. This reduces [[Internet]] [[ |
In addition, a fusker can also be implemented as [[client software]] that completely bypasses the need for a third-party fusker web site. By eliminating the need to fusker via a [[web site]], the need to use a [[web browser]] is also eliminated. Due to not using a [[web browser]], fusker [[client software]] will often store downloaded content locally on the [[client machine]]. This reduces [[Internet]] [[Bandwidth (computing)|bandwidth]] usage since fusker [[client software]], unlike a [[web browser]], only retrieves content once (no repeat visits to web pages). Fusker [[client software]] is able to do this because it can effectively [[Emulator|emulate]] a [[web browser]]; [[HTTP referrer|referrer]] and [[User Agent|user agent]] headers are rewritten to an acceptable value, and more complex implementations can also [[Emulator|emulate]] a [[web browser]] to the point of being able to click [[Hyperlink|links]] and [[Login|log in]] to accounts. However, just like [[Server (computing)|server]]-based fuskers, [[client software]] fuskers also separate content from its original surroundings, which may have included [[advertisements]] on the content host's [[web site]]. |
||
With the sophistication of the modern [[web browser]] it is now possible to run a client |
With the sophistication of the modern [[web browser]] it is now possible to run a client-side fusker [[software application]] fully within a [[web browser]] such as [[Internet Explorer]]. These [[web browser]] implementations are capable of reading and extracting the image information in the web pages you browse. They no longer rely on searches of domains with random search strings nor [[IP address spoofing]] by impersonating a [[HTTP referrer|referrer]] or [[User Agent|user agent]]. [[Web browser]] fusker applications essentially provide a [[scrapbooking]] interface within the [[web browser]] which allows direct and customized access to the web image content. Some implementations allow you to save sets of fusker information as a collection file which can be electronically shared with other users of the fusker application without the need to store or transmit gigabytes of image data. |
||
==Criticism== |
== Criticism == |
||
Visitors to a fusker website frequently see copyrighted [[Pornography|pornographic]] images that have been separated from their intended context, known as [[hot-linking]]. Fuskers have been used to obtain media from nude photos hosted on private or password-protected album in [[Photobucket]] without the consent of the media owners.<ref>{{cite web|last=Read|first=Max|title=Ladies: 8,000 Creeps on Reddit Are Sharing the Nude Photos You Posted to Photobucket|url=http://gawker.com/5932702/|url-status=dead|publisher=Gawker Media|accessdate=16 August 2012|archiveurl=https://web.archive.org/web/20120812044039/http://gawker.com/5932702/|archivedate=12 August 2012}}</ref><ref>{{cite web|last=Notopoulos|first=Katie|title=The Dark Art Of "Fusking"|date=7 August 2012 |url=https://www.buzzfeed.com/katienotopoulos/the-dark-art-of-fusking|publisher=BuzzFeed|accessdate=16 August 2012}}</ref> Some of these images were then uploaded to the r/photobucketplunder [[Reddit]] community, which had 8000 subscribers before it was shut down when Photobucket sent a [[Online Copyright Infringement Liability Limitation Act|DMCA request]] to the community's moderators.<ref>{{Cite web|last=Gilbert|first=Jason|date=2012-08-16|title=Photo Site Cracks Down On Peeping Toms|url=https://www.huffpost.com/entry/fusking-photobucket-takedown-notice-reddit_n_1792472|access-date=2021-08-14|website=HuffPost|language=en}}</ref> |
|||
⚫ | |||
⚫ | Companies that provide [[free hosted galleries]] strongly dislike fuskers because they have the potential to cost them a lot of money in bandwidth bills, and because the only reason the free galleries are provided is to entice the user into clicking on a more profitable link, and those links are no longer displayed when a fusker is used. {{Citation needed|date=August 2021}} |
||
Some client side fusker implementations blindly search domains for images based on common file names and directory structures. Some argue the numerous [[HTTP 404]] ''file not found'' and [[HTTP 403]] ''forbidden'' server errors generated constitute a [[denial of service]] attack.<ref>{{cite web|last=Limmer|first=Eric|title=What a DDoS Attack Looks Like|url=http://gizmodo.com/5995429/how-a-ddos-attack-looks-as-it-happens}}</ref> This behavior has in some cases given the practice of client side fusking a bad name. |
|||
In response, most web site administrators check the [[HTTP referrer|referrer]] and [[User Agent|user agent]] headers sent by the requesting client software to prevent their images from being "fuskered", or require users to log in.<ref>{{cite web|url=http://www.businessvoyeur.com/2005-03-13/how-to-block-fusker|title=How to block Fusker|date=2005-03-13}}</ref> However, some fusker software has the ability to emulate a legitimate web browser. [[HTTP referrer|referrer]] and [[User Agent|user agent]] headers are rewritten to an acceptable value, and more complex implementations can also emulate a web browser to the point of being able to click links and log |
Some client-side fusker implementations blindly search domains for images based on common file names and directory structures. Some argue the numerous [[HTTP 404]] ''file not found'' and [[HTTP 403]] ''forbidden'' server errors generated constitute a [[denial of service]] attack.<ref>{{cite web|last=Limmer|first=Eric|title=What a DDoS Attack Looks Like|url=https://gizmodo.com/5995429/how-a-ddos-attack-looks-as-it-happens}}</ref> In response, most web site administrators check the [[HTTP referrer|referrer]] and [[User Agent|user agent]] headers sent by the requesting client software to prevent their images from being "fuskered", or require users to log in.<ref>{{cite web|url=http://www.businessvoyeur.com/2005-03-13/how-to-block-fusker|title=How to block Fusker|date=2005-03-13}}</ref> However, some fusker software has the ability to emulate a legitimate web browser. [[HTTP referrer|referrer]] and [[User Agent|user agent]] headers are rewritten to an acceptable value, and more complex implementations can also emulate a web browser to the point of being able to click links and log into accounts. |
||
Web browser implementations running within a legitimate browser offer a more legitimate access to the web content. Access through these applications is very similar to having saved a bookmark to the image. However, unlike a bookmark, these implementations may access thousands of images at the same time and may also overload servers not capable of servicing this amount of content. |
Web browser implementations running within a legitimate browser offer a more legitimate access to the web content. Access through these applications is very similar to having saved a bookmark to the image. However, unlike a bookmark, these implementations may access thousands of images at the same time and may also overload servers not capable of servicing this amount of content. |
||
⚫ | |||
Fuskers have been used to obtain media from 'private' galleries hosted on [[Photobucket]] without the consent of the media owners.<ref>{{cite web|last=Read|first=Max|title=Ladies: 8,000 Creeps on Reddit Are Sharing the Nude Photos You Posted to Photobucket|url=http://gawker.com/5932702/|publisher=Gawker Media|accessdate=16 August 2012}}</ref><ref>{{cite web|last=Notopoulos|first=Katie|title=The Dark Art Of "Fusking"|url=http://www.buzzfeed.com/katienotopoulos/the-dark-art-of-fusking|publisher=BuzzFeed|accessdate=16 August 2012}}</ref> |
|||
⚫ | "Fusker" is a [[Danish language|Danish]] term which originally meant a person covertly doing work outside the official guilds. It came into Danish around 1700 from [[German language|German]] {{lang|de|pfuscher}}, meaning botcher. Later it came to mean someone cheating (for example using company resources for personal benefit) or alternately doing shoddy work.<ref>{{cite web|url=http://ordnet.dk/ods/opslag?id=450572|title=Fusker|publisher=Ordbog over det Danske Sprog}}</ref> |
||
⚫ | |||
⚫ | "Fusker" is a [[Danish language|Danish]] term which originally meant a person covertly doing work outside the official guilds. It came into Danish around 1700 from [[German language|German]] |
||
In [[English language|English]] it nearly exclusively refers to the meaning described in this article. |
|||
== History == |
== History == |
||
The original fusker technology was created by Carthag Tuek,<ref>[https://web.archive.org/web/20140119014911/http://sensibleerection.com/entry.php/997 Sensible Erection] Accessed August 1, 2015</ref><ref>[https://web.archive.org/web/20030815233711/http://www.sensibleerection.com/entry.php/86 Sensible Erection] Accessed August 1, 2015</ref> who made the [[Perl]] [[Common Gateway Interface|CGI]] script as a work-alike of the UNIX/Linux [[cURL]] tool, specifically its URL-[[glob (programming)|globbing]] functionality. |
The original fusker technology was created by Carthag Tuek,<ref>[https://web.archive.org/web/20140119014911/http://sensibleerection.com/entry.php/997 Sensible Erection] Accessed August 1, 2015</ref><ref>[https://web.archive.org/web/20030815233711/http://www.sensibleerection.com/entry.php/86 Sensible Erection] Accessed August 1, 2015</ref> who made the [[Perl]] [[Common Gateway Interface|CGI]] script as a work-alike of the UNIX/Linux [[cURL]] tool, specifically its URL-[[glob (programming)|globbing]] functionality. |
||
The idea has been continued by others and ported to other scripting languages. |
The idea has been continued by others and ported to other scripting languages. |
||
== See also == |
|||
* [[Web crawler]], for software that systematically walks through websites |
|||
* [[Web scraping]], for extracting data from websites in general |
|||
== References == |
== References == |
||
{{More footnotes|date=December 2008}} |
|||
{{reflist}} |
{{reflist}} |
||
⚫ | |||
==External links== |
|||
*[http://photofucket.com/ PhotoFucket suite for fuskering & ripping media hosted by Photobucket] (Be aware that this link leads to a mostly blank page.) |
|||
*[http://safe.vusker.com/ vusker.com] (JQuery based Fusker) (This link leads to a phishing page.) |
|||
*[http://navnetapp.com/ Net.Nav Fusker Engine] (This is a dead link) |
|||
*[http://imagesurferpro.com/ Image Surfer Pro] (Web Browser Fusker) |
|||
*[http://www.soldierx.com/sxlabs/wdivulge/ SOLDIERX Perl Fusker] |
|||
⚫ |
Latest revision as of 10:03, 24 October 2024
Fusker is a type of website or utility that extracts images in bulk from a website (typically from free hosted galleries) by systematically loading and downloading images following a pattern in the website's URL scheme. Fusking or fuskering is often used to extract private and nude photos without consent of the owner.[1]
Fusker software allows users to identify a sequence of images with a single pattern, for example: http://www.example.com/images/pic[1-16].jpg
. This example would identify images pic1.jpg through pic16.jpg. When this pattern is given to a fusker website, the website would produce a page that displays all sixteen images in that range. Patterns can also contain lists of words, such as http://www.example.com/images/{small,medium,big}.jpg
, which will produce three URLs, each with one word from the bracketed list. The web page is then presented to the person who entered the fusker, and can also be saved on the fusker web server so that other people may view it.
Fusker implementations
[edit]Server-side fusker software extracts content (e.g. image or video) from its original location and displays it in a new page on the client-side (user's web browser). Content is separated from the surrounding information that the content host may have intended (e.g. links to affiliates or pay-per-click ads). However, the content is not downloaded locally to the client by the fusker server; the new page that the fusker server produces instructs the client web browser to retrieve each piece of content from the content host web server and display it in the new page. This can lead to excessive internet bandwidth usage and waste. Many server-side implementations of the Fusker technology are available on the web.
In addition, a fusker can also be implemented as client software that completely bypasses the need for a third-party fusker web site. By eliminating the need to fusker via a web site, the need to use a web browser is also eliminated. Due to not using a web browser, fusker client software will often store downloaded content locally on the client machine. This reduces Internet bandwidth usage since fusker client software, unlike a web browser, only retrieves content once (no repeat visits to web pages). Fusker client software is able to do this because it can effectively emulate a web browser; referrer and user agent headers are rewritten to an acceptable value, and more complex implementations can also emulate a web browser to the point of being able to click links and log in to accounts. However, just like server-based fuskers, client software fuskers also separate content from its original surroundings, which may have included advertisements on the content host's web site.
With the sophistication of the modern web browser it is now possible to run a client-side fusker software application fully within a web browser such as Internet Explorer. These web browser implementations are capable of reading and extracting the image information in the web pages you browse. They no longer rely on searches of domains with random search strings nor IP address spoofing by impersonating a referrer or user agent. Web browser fusker applications essentially provide a scrapbooking interface within the web browser which allows direct and customized access to the web image content. Some implementations allow you to save sets of fusker information as a collection file which can be electronically shared with other users of the fusker application without the need to store or transmit gigabytes of image data.
Criticism
[edit]Visitors to a fusker website frequently see copyrighted pornographic images that have been separated from their intended context, known as hot-linking. Fuskers have been used to obtain media from nude photos hosted on private or password-protected album in Photobucket without the consent of the media owners.[2][3] Some of these images were then uploaded to the r/photobucketplunder Reddit community, which had 8000 subscribers before it was shut down when Photobucket sent a DMCA request to the community's moderators.[4]
Companies that provide free hosted galleries strongly dislike fuskers because they have the potential to cost them a lot of money in bandwidth bills, and because the only reason the free galleries are provided is to entice the user into clicking on a more profitable link, and those links are no longer displayed when a fusker is used. [citation needed]
Some client-side fusker implementations blindly search domains for images based on common file names and directory structures. Some argue the numerous HTTP 404 file not found and HTTP 403 forbidden server errors generated constitute a denial of service attack.[5] In response, most web site administrators check the referrer and user agent headers sent by the requesting client software to prevent their images from being "fuskered", or require users to log in.[6] However, some fusker software has the ability to emulate a legitimate web browser. referrer and user agent headers are rewritten to an acceptable value, and more complex implementations can also emulate a web browser to the point of being able to click links and log into accounts.
Web browser implementations running within a legitimate browser offer a more legitimate access to the web content. Access through these applications is very similar to having saved a bookmark to the image. However, unlike a bookmark, these implementations may access thousands of images at the same time and may also overload servers not capable of servicing this amount of content.
Etymology
[edit]"Fusker" is a Danish term which originally meant a person covertly doing work outside the official guilds. It came into Danish around 1700 from German pfuscher, meaning botcher. Later it came to mean someone cheating (for example using company resources for personal benefit) or alternately doing shoddy work.[7]
History
[edit]The original fusker technology was created by Carthag Tuek,[8][9] who made the Perl CGI script as a work-alike of the UNIX/Linux cURL tool, specifically its URL-globbing functionality.
The idea has been continued by others and ported to other scripting languages.
See also
[edit]- Web crawler, for software that systematically walks through websites
- Web scraping, for extracting data from websites in general
References
[edit]- ^ "Photobucket shuts down Reddit's nude photo thieves". NBC News. 16 August 2012. Retrieved 2021-08-14.
- ^ Read, Max. "Ladies: 8,000 Creeps on Reddit Are Sharing the Nude Photos You Posted to Photobucket". Gawker Media. Archived from the original on 12 August 2012. Retrieved 16 August 2012.
- ^ Notopoulos, Katie (7 August 2012). "The Dark Art Of "Fusking"". BuzzFeed. Retrieved 16 August 2012.
- ^ Gilbert, Jason (2012-08-16). "Photo Site Cracks Down On Peeping Toms". HuffPost. Retrieved 2021-08-14.
- ^ Limmer, Eric. "What a DDoS Attack Looks Like".
- ^ "How to block Fusker". 2005-03-13.
- ^ "Fusker". Ordbog over det Danske Sprog.
- ^ Sensible Erection Accessed August 1, 2015
- ^ Sensible Erection Accessed August 1, 2015