== A spectacular web spammer failure In the spirit of earlier [[heroic failures StupidSpammerTricks]], I just saw someone attempt to put an entire _POST_ form in the actual HTTP request. No, really. The incoming request looked something like this: > login=%5Burl%3Dhttp%3A%2F%2Fwww.nextlevelnews.com%2F [.. elided > ..] %2F70.html%0D%0A+&view=login&page=blog%2Flinks%2FBestToolPOST > /~cks/space/.login HTTP/1.1 This is perhaps the most abject spammer failure I've seen. (It also confirms that web spammers are targeting my login form as well as the 'post a new comment' form; I have a theory on that, which doesn't fit in this margin.) Unsurprisingly, the request came from a charter.com cablemodem that is currently in _bl.spamcop.net_ and the CBL, among other places.