<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="hr">
	<id>https://croatianschoolsydney.com/index.php?action=history&amp;feed=atom&amp;title=Captcha</id>
	<title>Captcha - Povijest promjena</title>
	<link rel="self" type="application/atom+xml" href="https://croatianschoolsydney.com/index.php?action=history&amp;feed=atom&amp;title=Captcha"/>
	<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;action=history"/>
	<updated>2026-05-23T21:47:52Z</updated>
	<subtitle>Povijest promjena ove stranice na wikiju</subtitle>
	<generator>MediaWiki 1.36.2</generator>
	<entry>
		<id>https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=506530&amp;oldid=prev</id>
		<title>WikiSysop: bnz</title>
		<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=506530&amp;oldid=prev"/>
		<updated>2022-05-07T08:10:49Z</updated>

		<summary type="html">&lt;p&gt;bnz&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;hr&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;←Starija inačica&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Inačica od 08:10, 7. svibnja 2022.&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Redak 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Redak 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;!--'''Captcha'''--&amp;gt;&lt;/del&gt;[[Datoteka:Captcha.jpg|mini|290px|Rane &amp;quot;CAPTCHA&amp;quot; testove kao ove, generirane uz pomoć programa EZ-Gimpy, koristio je [[Yahoo!]]. Međutim, razvijena je tehnologija za čitanje ovog tipa CAPTCHA testova&amp;lt;ref name=&amp;quot;autogenerated1&amp;quot;&amp;gt;{{Citiranje weba |first=Mori, |last=Greg |coauthors=Malik, Jitendra |url=http://www.cs.sfu.ca/~mori/research/gimpy/ |title=Breaking a Visual CAPTCHA |publisher=Simon Fraser University |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Datoteka:Captcha.jpg|mini|290px|Rane &amp;quot;CAPTCHA&amp;quot; testove kao ove, generirane uz pomoć programa EZ-Gimpy, koristio je [[Yahoo!]]. Međutim, razvijena je tehnologija za čitanje ovog tipa CAPTCHA testova&amp;lt;ref name=&amp;quot;autogenerated1&amp;quot;&amp;gt;{{Citiranje weba |first=Mori, |last=Greg |coauthors=Malik, Jitendra |url=http://www.cs.sfu.ca/~mori/research/gimpy/ |title=Breaking a Visual CAPTCHA |publisher=Simon Fraser University |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Datoteka:Modern-captcha.jpg|mini|290px|Moderni CAPTCHA ne pokušava stvoriti iskrivljenu pozadinu i zakrivljenje teksta, već se usmjerava na otežavanje [[Segmentacija (image processing)|segmentacije]] dodavanjem zakrivljenih linija]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Datoteka:Modern-captcha.jpg|mini|290px|Moderni CAPTCHA ne pokušava stvoriti iskrivljenu pozadinu i zakrivljenje teksta, već se usmjerava na otežavanje [[Segmentacija (image processing)|segmentacije]] dodavanjem zakrivljenih linija]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Datoteka:KCAPTCHA with crowded symbols.gif|mini|290px|Drugi način za otežavanje segmentacije je zgušnjavanje simbola. Ovo je oblik CAPTCHA-e  kojeg trenutno koristi Yahoo!. Ovo se može pokazati teškim za pročitati čak i nekim ljudima, pa je u ovom primjeru teško reći je li lijeva riječ &amp;quot;klopsh&amp;quot; ili &amp;quot;kbpsh&amp;quot;.]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Datoteka:KCAPTCHA with crowded symbols.gif|mini|290px|Drugi način za otežavanje segmentacije je zgušnjavanje simbola. Ovo je oblik CAPTCHA-e  kojeg trenutno koristi Yahoo!. Ovo se može pokazati teškim za pročitati čak i nekim ljudima, pa je u ovom primjeru teško reći je li lijeva riječ &amp;quot;klopsh&amp;quot; ili &amp;quot;kbpsh&amp;quot;.]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>WikiSysop</name></author>
	</entry>
	<entry>
		<id>https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=362277&amp;oldid=prev</id>
		<title>WikiSysop: Bot: Automatska zamjena teksta  (-{{cite news +{{Citiranje novina)</title>
		<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=362277&amp;oldid=prev"/>
		<updated>2021-12-02T03:17:15Z</updated>

		<summary type="html">&lt;p&gt;Bot: Automatska zamjena teksta  (-{{cite news +{{Citiranje novina)&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;hr&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;←Starija inačica&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Inačica od 03:17, 2. prosinca 2021.&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot;&gt;Redak 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Redak 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Skraćenica ''CAPTCHA'' nastala je 2000. godine, a osmislili su je [[Luis von Ahn]], [[Manuel Blum]], Nicholas J. Hopper (svi sa [[Carnegie Mellon University]]), i [[John Langford (računalni znanstvenik)|John Langford]] (tada u [[International Business Machines|IBM]]-u). Skraćenica dolazi od engleskog ''Completely Automated Public Turing test to tell Computers and Humans Apart'' (u prijevodu: potpuno automatizirani javni Turingov test za razlikovanje računala od ljudi).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Skraćenica ''CAPTCHA'' nastala je 2000. godine, a osmislili su je [[Luis von Ahn]], [[Manuel Blum]], Nicholas J. Hopper (svi sa [[Carnegie Mellon University]]), i [[John Langford (računalni znanstvenik)|John Langford]] (tada u [[International Business Machines|IBM]]-u). Skraćenica dolazi od engleskog ''Completely Automated Public Turing test to tell Computers and Humans Apart'' (u prijevodu: potpuno automatizirani javni Turingov test za razlikovanje računala od ljudi).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Carnegie Mellon University je pokušao zaštititi ovu riječ,&amp;lt;ref&amp;gt;{{&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;cite news &lt;/del&gt;|first= |last= |authorlink= |coauthors= |title=Computer Literacy Tests: Are You Human? |url=http://www.time.com/time/magazine/article/0,9171,1812084,00.html |quote=The Carnegie Mellon team came back with the CAPTCHA. (It stands for &amp;quot;completely automated public Turing test to tell computers and humans apart&amp;quot;; no, the acronym doesn't really fit.) The point of the CAPTCHA is that reading those swirly letters is something that computers aren't very good at. |publisher=[[Time (časopis)]] |date= |accessdate=2008-06-12 }}&amp;lt;/ref&amp;gt; no od zahtjeva su odustali  21. travnja 2008.&amp;lt;ref&amp;gt;{{Citiranje weba|url=http://tarr.uspto.gov/servlet/tarr?regser=serial&amp;amp;entry=78500434 |title=Latest Status of CAPTCHA Trademark Application |publisher=USPTO |date=2008-04-21 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; Trenutno, tvorci CAPTCHA-a preporučuju korištenje sustava [[reCAPTCHA]] kao službene implementacije.&amp;lt;ref&amp;gt;{{Citiranje weba |url=http://www.captcha.net/ |title=reCAPTCHA homepage |publisher=Captcha.net |date= |accessdate=2008-12-21 |archiveurl=https://web.archive.org/web/20120404215102/http://www.captcha.net/ |archivedate=4. travnja 2012. }}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Carnegie Mellon University je pokušao zaštititi ovu riječ,&amp;lt;ref&amp;gt;{{&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Citiranje novina &lt;/ins&gt;|first= |last= |authorlink= |coauthors= |title=Computer Literacy Tests: Are You Human? |url=http://www.time.com/time/magazine/article/0,9171,1812084,00.html |quote=The Carnegie Mellon team came back with the CAPTCHA. (It stands for &amp;quot;completely automated public Turing test to tell computers and humans apart&amp;quot;; no, the acronym doesn't really fit.) The point of the CAPTCHA is that reading those swirly letters is something that computers aren't very good at. |publisher=[[Time (časopis)]] |date= |accessdate=2008-06-12 }}&amp;lt;/ref&amp;gt; no od zahtjeva su odustali  21. travnja 2008.&amp;lt;ref&amp;gt;{{Citiranje weba|url=http://tarr.uspto.gov/servlet/tarr?regser=serial&amp;amp;entry=78500434 |title=Latest Status of CAPTCHA Trademark Application |publisher=USPTO |date=2008-04-21 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; Trenutno, tvorci CAPTCHA-a preporučuju korištenje sustava [[reCAPTCHA]] kao službene implementacije.&amp;lt;ref&amp;gt;{{Citiranje weba |url=http://www.captcha.net/ |title=reCAPTCHA homepage |publisher=Captcha.net |date= |accessdate=2008-12-21 |archiveurl=https://web.archive.org/web/20120404215102/http://www.captcha.net/ |archivedate=4. travnja 2012. }}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Svojstva ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Svojstva ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l74&quot;&gt;Redak 74:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Redak 74:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Several research projects have broken real world CAPTCHAs, including one of Yahoo's early CAPTCHAs called &amp;quot;EZ-Gimpy&amp;quot;&amp;lt;ref name=autogenerated1 /&amp;gt; and the CAPTCHA used by popular sites such as Paypal,&amp;lt;ref&amp;gt;{{Citiranje weba|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/05/12/breaking-the-paypalcom-captcha/ |title=Breaking the PayPal CAPTCHA |publisher=Kloover.com |date=May 12, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; LiveJournal, phpBB, and other open source solutions.&amp;lt;ref&amp;gt;{{Citiranje weba|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/02/28/breaking-the-asp-security-image-generator/ |title=Breaking ASP Security Image Generator |publisher=Kloover.com |date=February 28, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba |first=Sam |last=Hocevar |url=http://sam.zoy.org/pwntcha/ |title=PWNtcha - captcha decoder |publisher=Sam.zoy.org |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba |first=Kruglov |last=Sergei|url=http://www.captcha.ru/en/breakings/ |title=Defeating of some weak CAPTCHAs |publisher=Captcha.ru |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Several research projects have broken real world CAPTCHAs, including one of Yahoo's early CAPTCHAs called &amp;quot;EZ-Gimpy&amp;quot;&amp;lt;ref name=autogenerated1 /&amp;gt; and the CAPTCHA used by popular sites such as Paypal,&amp;lt;ref&amp;gt;{{Citiranje weba|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/05/12/breaking-the-paypalcom-captcha/ |title=Breaking the PayPal CAPTCHA |publisher=Kloover.com |date=May 12, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; LiveJournal, phpBB, and other open source solutions.&amp;lt;ref&amp;gt;{{Citiranje weba|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/02/28/breaking-the-asp-security-image-generator/ |title=Breaking ASP Security Image Generator |publisher=Kloover.com |date=February 28, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba |first=Sam |last=Hocevar |url=http://sam.zoy.org/pwntcha/ |title=PWNtcha - captcha decoder |publisher=Sam.zoy.org |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba |first=Kruglov |last=Sergei|url=http://www.captcha.ru/en/breakings/ |title=Defeating of some weak CAPTCHAs |publisher=Captcha.ru |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In January 2008 Network Security Research released their program for automated Yahoo! CAPTCHA recognition.&amp;lt;ref&amp;gt;{{Citiranje weba|url=http://network-security-research.blogspot.com/ |title=Network Security Research and AI |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; [[Windows Live Hotmail]] and [[Gmail]], the other two major free email providers, were cracked shortly after.&amp;lt;ref&amp;gt;{{&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;cite news &lt;/del&gt;| first= | last=Dawson | coauthors= | title= Windows Live Hotmail CAPTCHA Cracked, Exploited | date=2008-04-15 | publisher=[[SourceForge]] | url =http://tech.slashdot.org/article.pl?sid=08/04/15/1941236&amp;amp;from=rss | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;cite news &lt;/del&gt;| first= | last=Dawson | coauthors= | title= Gmail CAPTCHA Cracked | date=2008-02-26 | publisher=[[SourceForge]] | url =http://it.slashdot.org/article.pl?sid=08/02/27/0045242 | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In January 2008 Network Security Research released their program for automated Yahoo! CAPTCHA recognition.&amp;lt;ref&amp;gt;{{Citiranje weba|url=http://network-security-research.blogspot.com/ |title=Network Security Research and AI |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; [[Windows Live Hotmail]] and [[Gmail]], the other two major free email providers, were cracked shortly after.&amp;lt;ref&amp;gt;{{&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Citiranje novina &lt;/ins&gt;| first= | last=Dawson | coauthors= | title= Windows Live Hotmail CAPTCHA Cracked, Exploited | date=2008-04-15 | publisher=[[SourceForge]] | url =http://tech.slashdot.org/article.pl?sid=08/04/15/1941236&amp;amp;from=rss | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Citiranje novina &lt;/ins&gt;| first= | last=Dawson | coauthors= | title= Gmail CAPTCHA Cracked | date=2008-02-26 | publisher=[[SourceForge]] | url =http://it.slashdot.org/article.pl?sid=08/02/27/0045242 | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In February 2008 it was reported that spammers had achieved a success rate of 30% to 35%, using a bot, in responding to CAPTCHAs for Microsoft's Live Mail service&amp;lt;ref&amp;gt;Gregg Keizer, [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9061558 &amp;quot;Spammers' bot cracks Microsoft's CAPTCHA: Bot beats Windows Live Mail's registration test 30% to 35% of the time, says Websense&amp;quot;], ''Computerworld&amp;quot;', February 7, 2008&amp;lt;/ref&amp;gt; and a success rate of 20% against Google's Gmail CAPTCHA.&amp;lt;ref&amp;gt;{{Citiranje weba |first=Sumeet |last=Prasad |url=http://www.websense.com/securitylabs/blog/blog.php?BlogID=174 |title=Google’s CAPTCHA busted in recent spammer tactics |publisher=Websense |date=2008-02-22 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; A Newcastle University research team has defeated the segmentation part of Microsoft's CAPTCHA with a 90% success rate, and claim that this could lead to a complete crack with a greater than 60% rate.&amp;lt;ref&amp;gt;{{cite paper |author=Jeff Yan |coauthors=Ahmad Salah El Ahmad |url=http://homepages.cs.ncl.ac.uk/jeff.yan/msn_draft.pdf |title=A Low-cost Attack on a Microsoft CAPTCHA |format=PDF |publisher=School of Computing Science, Newcastle University, UK |date=April 13, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In February 2008 it was reported that spammers had achieved a success rate of 30% to 35%, using a bot, in responding to CAPTCHAs for Microsoft's Live Mail service&amp;lt;ref&amp;gt;Gregg Keizer, [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9061558 &amp;quot;Spammers' bot cracks Microsoft's CAPTCHA: Bot beats Windows Live Mail's registration test 30% to 35% of the time, says Websense&amp;quot;], ''Computerworld&amp;quot;', February 7, 2008&amp;lt;/ref&amp;gt; and a success rate of 20% against Google's Gmail CAPTCHA.&amp;lt;ref&amp;gt;{{Citiranje weba |first=Sumeet |last=Prasad |url=http://www.websense.com/securitylabs/blog/blog.php?BlogID=174 |title=Google’s CAPTCHA busted in recent spammer tactics |publisher=Websense |date=2008-02-22 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; A Newcastle University research team has defeated the segmentation part of Microsoft's CAPTCHA with a 90% success rate, and claim that this could lead to a complete crack with a greater than 60% rate.&amp;lt;ref&amp;gt;{{cite paper |author=Jeff Yan |coauthors=Ahmad Salah El Ahmad |url=http://homepages.cs.ncl.ac.uk/jeff.yan/msn_draft.pdf |title=A Low-cost Attack on a Microsoft CAPTCHA |format=PDF |publisher=School of Computing Science, Newcastle University, UK |date=April 13, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l81&quot;&gt;Redak 81:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Redak 81:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;CAPTCHA is vulnerable to a [[relay attack]] that uses humans to solve the puzzles. One approach involves relaying the puzzles to a group of human operators who can solve CAPTCHAs. In this scheme, a computer fills out a form and when it reaches a CAPTCHA, it gives the CAPTCHA to the human operator to solve.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;CAPTCHA is vulnerable to a [[relay attack]] that uses humans to solve the puzzles. One approach involves relaying the puzzles to a group of human operators who can solve CAPTCHAs. In this scheme, a computer fills out a form and when it reaches a CAPTCHA, it gives the CAPTCHA to the human operator to solve.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Another variation of this technique involves copying the CAPTCHA images and using them as CAPTCHAs for a high-traffic site owned by the attacker. With enough traffic, the attacker can get a solution to the CAPTCHA puzzle in time to relay it back to the target site.&amp;lt;ref&amp;gt;{{Citiranje weba | url = http://www.boingboing.net/2004/01/27/solving_and_creating.html | title = Solving and creating CAPTCHAs with free porn | accessdate = 2006-08-22 | last = Doctorow | first = Cory | authorlink = Cory Doctorow |date=2004-01-27 | work = Boing Boing}}&amp;lt;/ref&amp;gt; In October 2007, a piece of malware appeared [[Computer virus#History|in the wild]] which enticed users to solve CAPTCHAs in order to see progressively further into a series of striptease images.&amp;lt;ref&amp;gt;{{&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;cite news &lt;/del&gt;|url=http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archiveurl=http://web.archive.org/web/20071106170737/http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archivedate=2007-11-06 |title=Scams Use Striptease to Break Web Traps |first=Jordan |last=Robertson |date=2007-11-01 |location=San Jose, California |agancy=Associated Press}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba|last=Vaas |first=Lisa |url=http://www.pcmag.com/article2/0,2704,2210674,00.asp |title=Striptease Used to Recruit Help in Cracking Sites |publisher=PC Magazine |date=2007-11-01|accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Another variation of this technique involves copying the CAPTCHA images and using them as CAPTCHAs for a high-traffic site owned by the attacker. With enough traffic, the attacker can get a solution to the CAPTCHA puzzle in time to relay it back to the target site.&amp;lt;ref&amp;gt;{{Citiranje weba | url = http://www.boingboing.net/2004/01/27/solving_and_creating.html | title = Solving and creating CAPTCHAs with free porn | accessdate = 2006-08-22 | last = Doctorow | first = Cory | authorlink = Cory Doctorow |date=2004-01-27 | work = Boing Boing}}&amp;lt;/ref&amp;gt; In October 2007, a piece of malware appeared [[Computer virus#History|in the wild]] which enticed users to solve CAPTCHAs in order to see progressively further into a series of striptease images.&amp;lt;ref&amp;gt;{{&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Citiranje novina &lt;/ins&gt;|url=http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archiveurl=http://web.archive.org/web/20071106170737/http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archivedate=2007-11-06 |title=Scams Use Striptease to Break Web Traps |first=Jordan |last=Robertson |date=2007-11-01 |location=San Jose, California |agancy=Associated Press}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Citiranje weba|last=Vaas |first=Lisa |url=http://www.pcmag.com/article2/0,2704,2210674,00.asp |title=Striptease Used to Recruit Help in Cracking Sites |publisher=PC Magazine |date=2007-11-01|accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These methods have been used by spammers to set up thousands of accounts on free email services such as Gmail and Yahoo!.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These methods have been used by spammers to set up thousands of accounts on free email services such as Gmail and Yahoo!.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>WikiSysop</name></author>
	</entry>
	<entry>
		<id>https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=329870&amp;oldid=prev</id>
		<title>WikiSysop: Bot: Automatska zamjena teksta  (-{{cite web +{{Citiranje weba)</title>
		<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=329870&amp;oldid=prev"/>
		<updated>2021-11-16T05:12:33Z</updated>

		<summary type="html">&lt;p&gt;Bot: Automatska zamjena teksta  (-{{cite web +{{Citiranje weba)&lt;/p&gt;
&lt;a href=&quot;https://croatianschoolsydney.com/index.php?title=Captcha&amp;amp;diff=329870&amp;amp;oldid=278090&quot;&gt;Prikaži promjene&lt;/a&gt;</summary>
		<author><name>WikiSysop</name></author>
	</entry>
	<entry>
		<id>https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=278090&amp;oldid=prev</id>
		<title>WikiSysop: no summary specified</title>
		<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=278090&amp;oldid=prev"/>
		<updated>2021-11-01T16:20:52Z</updated>

		<summary type="html">&lt;p&gt;no summary specified&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;hr&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;←Starija inačica&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Inačica od 16:20, 1. studenoga 2021.&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l124&quot;&gt;Redak 124:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Redak 124:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Vanjske poveznice ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Vanjske poveznice ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{commonscat|Captcha}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*{{dmoz|Computers/Internet/Abuse/CAPTCHA}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*{{dmoz|Computers/Internet/Abuse/CAPTCHA}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Kategorija:Računarstvo]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Kategorija:Računarstvo]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>WikiSysop</name></author>
	</entry>
	<entry>
		<id>https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=113479&amp;oldid=prev</id>
		<title>WikiSysop: Bot: Automatski unos stranica</title>
		<link rel="alternate" type="text/html" href="https://croatianschoolsydney.com/index.php?title=Captcha&amp;diff=113479&amp;oldid=prev"/>
		<updated>2021-09-07T23:20:00Z</updated>

		<summary type="html">&lt;p&gt;Bot: Automatski unos stranica&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nova stranica&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;!--'''Captcha'''--&amp;gt;[[Datoteka:Captcha.jpg|mini|290px|Rane &amp;quot;CAPTCHA&amp;quot; testove kao ove, generirane uz pomoć programa EZ-Gimpy, koristio je [[Yahoo!]]. Međutim, razvijena je tehnologija za čitanje ovog tipa CAPTCHA testova&amp;lt;ref name=&amp;quot;autogenerated1&amp;quot;&amp;gt;{{cite web |first=Mori, |last=Greg |coauthors=Malik, Jitendra |url=http://www.cs.sfu.ca/~mori/research/gimpy/ |title=Breaking a Visual CAPTCHA |publisher=Simon Fraser University |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
[[Datoteka:Modern-captcha.jpg|mini|290px|Moderni CAPTCHA ne pokušava stvoriti iskrivljenu pozadinu i zakrivljenje teksta, već se usmjerava na otežavanje [[Segmentacija (image processing)|segmentacije]] dodavanjem zakrivljenih linija]]&lt;br /&gt;
[[Datoteka:KCAPTCHA with crowded symbols.gif|mini|290px|Drugi način za otežavanje segmentacije je zgušnjavanje simbola. Ovo je oblik CAPTCHA-e  kojeg trenutno koristi Yahoo!. Ovo se može pokazati teškim za pročitati čak i nekim ljudima, pa je u ovom primjeru teško reći je li lijeva riječ &amp;quot;klopsh&amp;quot; ili &amp;quot;kbpsh&amp;quot;.]]&lt;br /&gt;
&lt;br /&gt;
'''CAPTCHA''' ili '''Captcha''' ({{IPA|/ˈkæptʃə/}}) vrsta je [[autentikacija &amp;quot;izazov-odgovor&amp;quot;|autentikacije &amp;quot;izazov-odgovor&amp;quot;]] koji se koristi u [[računarstvo|računarstvu]] da bi odredilo je li korisnik čovjek ili računalo, s ciljem sprječavanja pristupa zlonamjernim računalnim programima. Proces najčešće podrazumjeva jedno [[računalo]] ([[server]]), koji traži od korisnika da odradi jednostavan test koji računalo može generirati i ocijeniti. Pretpostavka je da drugo računalo nije u stanju riješiti taj test, pa se svaki korisnik koji unese točan odgovor se smatra čovjekom. Uobičajeni CAPTCHA testovi traže od korisnika da unese nekoliko simbola (najčešće slova i/ili brojeva) koji su prikazana na slici, koja je na neki način iskrivljena. Zbog toga se ponekad naziva &amp;quot;obrnuti [[Turingov test]]&amp;quot;, jer podrazumijeva stroj koji cilja na prepoznavanje ljudi, za razliku od originalnog turingovog testa kojeg izvode ljudi da bi prepoznali računala.&lt;br /&gt;
&lt;br /&gt;
Skraćenica ''CAPTCHA'' nastala je 2000. godine, a osmislili su je [[Luis von Ahn]], [[Manuel Blum]], Nicholas J. Hopper (svi sa [[Carnegie Mellon University]]), i [[John Langford (računalni znanstvenik)|John Langford]] (tada u [[International Business Machines|IBM]]-u). Skraćenica dolazi od engleskog ''Completely Automated Public Turing test to tell Computers and Humans Apart'' (u prijevodu: potpuno automatizirani javni Turingov test za razlikovanje računala od ljudi).&lt;br /&gt;
&lt;br /&gt;
Carnegie Mellon University je pokušao zaštititi ovu riječ,&amp;lt;ref&amp;gt;{{cite news |first= |last= |authorlink= |coauthors= |title=Computer Literacy Tests: Are You Human? |url=http://www.time.com/time/magazine/article/0,9171,1812084,00.html |quote=The Carnegie Mellon team came back with the CAPTCHA. (It stands for &amp;quot;completely automated public Turing test to tell computers and humans apart&amp;quot;; no, the acronym doesn't really fit.) The point of the CAPTCHA is that reading those swirly letters is something that computers aren't very good at. |publisher=[[Time (časopis)]] |date= |accessdate=2008-06-12 }}&amp;lt;/ref&amp;gt; no od zahtjeva su odustali  21. travnja 2008.&amp;lt;ref&amp;gt;{{cite web|url=http://tarr.uspto.gov/servlet/tarr?regser=serial&amp;amp;entry=78500434 |title=Latest Status of CAPTCHA Trademark Application |publisher=USPTO |date=2008-04-21 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; Trenutno, tvorci CAPTCHA-a preporučuju korištenje sustava [[reCAPTCHA]] kao službene implementacije.&amp;lt;ref&amp;gt;{{cite web |url=http://www.captcha.net/ |title=reCAPTCHA homepage |publisher=Captcha.net |date= |accessdate=2008-12-21 |archiveurl=https://web.archive.org/web/20120404215102/http://www.captcha.net/ |archivedate=4. travnja 2012. }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Svojstva ==&lt;br /&gt;
CAPTCHA sustav je sredstvo za automatsko generiranje novih izazova koje:&lt;br /&gt;
* suvremeni softver nije u stanju točno riješiti&lt;br /&gt;
* većina ljudi može uspješno riješiti&lt;br /&gt;
* se ne oslanja na pretpostavku da je ovaj tip CAPTCHA -a novi za napadača&lt;br /&gt;
&lt;br /&gt;
Iako ''[[checkbox]]'' &amp;quot;klikni ovdje ako nisi bot&amp;quot; može poslužiti za razlikovanje ljudi od računala, to nije CAPTCHA jer se oslanja na činjenicu napadač nije potrošio nešto vremena da provali u određenu formu. Metode &amp;quot;klikni ovdje&amp;quot; su vrlo lake za probijanje.&lt;br /&gt;
&lt;br /&gt;
Uskraćivanje algoritma može povećati integritet ograničenog skupa sustava, kao u praksi [[sigurnost kroz neshvatljivost|sigurnosti kroz neshvatljivost]]. Najvažniji faktor u odlučivanju treba li algoritam biti otvoreni ili ograničen je veličina sustava.&lt;br /&gt;
&lt;br /&gt;
Iako algoritam koji izdrži testiranje stručnjaka za sigurnost može biti smatran konceptualno sigurnijim od netestiranog algoritma, netestirani algoritmi specifični za ograničen broj sustava su ujedno i manje interesantni i onima koji se upuštaju u zloporabu. Razbijanje CAPTCHA-e najčešće zahtijeva određeni trud specifičan upravo za tu CAPTCHA implementaciju, pa osoba koja planira zloporabu može zaključiti da taj CAPTCHA nije vrijedan truda.&lt;br /&gt;
&lt;br /&gt;
== Povijest ==&lt;br /&gt;
[[Moni Naor]] je prvi koji je teoretizirao o načinima provjere dolazi li zahtjev od osobe ili od [[internet bot|bota]].&lt;br /&gt;
&amp;lt;ref&amp;gt;{{cite paper | author = Moni Naor |date=July, 1996 | url = http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human.ps | format = PS | title = Verification of a human in the loop or Identification via the Turing Test | accessdate = 2008-07-06}}&amp;lt;/ref&amp;gt; Primitivni CAPTCHA test su [[1997.]] razvili [[Andrei Broder]], [[Martin Abadi]], [[Krishna Bharat]] i [[Mark Lillibridge]], da bi spriječili internet botove da dodaju [[URL]]-ove od njihovih pretraživača.&amp;lt;ref&amp;gt;[http://www.freepatentsonline.com/6195698.html] US Patent no. 6,195,698, &amp;quot;Method for selectively restricting access to computer systems&amp;quot;&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Da bi slike učinili otpornijim na [[Optičko prepoznavanje znakova|OCR]] ({{en|Optical Character Recognition}}), tim je simulirao situacije, koristili su primjere iz priručnika za skener gdje su prikazani znakovi krivo očitani uz pomoć [[Optičko prepoznavanje znakova|OCR]]-a. 2000. godine, [[Luis von Ahn]] i [[Manuel Blum]] smislili su izraz 'CAPTCHA', koji je podrazumijevao općeniti program za razlokivanje ljudi od računala. Osmislili su višestruke primjere CAPTCHA-e, uključujući prve naširoko korištene CAPTCHA-a, one koje je u početku koristio [[Yahoo!]].&lt;br /&gt;
&lt;br /&gt;
== Primjene==&lt;br /&gt;
CAPTCHA se koristi za prevenciju protiv automatskog softvera koji može poduzeti akcije s ciljem snižavanja kvalitete danog sustava, bilo zloporabom, bilo trošenjem resursa. CAPTCHA mogu štiti sustave ranjive prema [[e-mail spam]]u, kao što su [[webmail]] servisi [[Gmail]], [[Hotmail]], i [[Yahoo! Mail]].&lt;br /&gt;
&lt;br /&gt;
CAPTCHA su do sada aktivno korišteni ta sprječavanje automatskog postiranja na [[blog]]ove, [[internet forum]]e i [[wiki]]je, bez obzira radi li se o [[blog spam|komercijalne promocije]] ili [[tinternet trol|uznemiravanja i vandaliziranja (troliranja)]].&lt;br /&gt;
&lt;br /&gt;
CAPTCHA se također koristi i kao limitator kod pretjerane uporabe resursa, pa se kod npr. prevelikog broja akcija u jedinici vremena, pred korisnika može postaviti zahtjev da se riješi CAPTCHA test prije nastavka rada.&lt;br /&gt;
&lt;br /&gt;
== Dostupnost ==&lt;br /&gt;
S obzirom da se CAPTCHAs oslanja na vizualnu percepciju, korisnici koji ne mogu čitati CAPTCHA-u (zbog raznih ograničenja, npr. teškoća u čitanju) neće moći proći ovaj CAPTCHA-test. Stoga internet stranice koje koriste CAPTCHA-u mogu korisniku omogućiti i audio test, uz vizualni, što je i službena preporuka na CAPTCHA stranicama. Ova kombinacija predstavlja do sada najdostupniji postojeći CAPTCHA test.&lt;br /&gt;
&lt;br /&gt;
'''Pokušaji da se CAPTCHA  učini još dostupnijim'''&lt;br /&gt;
&lt;br /&gt;
No, čak i audio i vizualni CAPTCHA testovi mogu biti nedostatni za neke korisnike, koji su npr. i slijepi i gluhi. Pokušaji uključuju postavljanje jednostavnih matematičkih pitanja (&amp;quot;Koliko je 1+1?&amp;quot;) ili pitanja na koje svi znaju odgovor (&amp;quot;Koje je boje nebo za vedrog dana?&amp;quot;). No, ovi testovi ne zadovoljavaju neke osnovne zahtjeve kao što su automatsko generiranje, a i napadač s iskustvom ih lako probije. Stoga ove testove ne možemo nazivati CAPTCHA jer ne daju sigurnost koju pruža CAPTCHA.&lt;br /&gt;
&lt;br /&gt;
== Zaobilaženje CAPTCHA-e ==&lt;br /&gt;
Postoji nekoliko pristupa pri pokušajima da se zaobiđe CAPTCHA:&lt;br /&gt;
* iskorištavanje bugova koji dopuštaju napadaču da posve zaobiđe CAPTCHA test,&lt;br /&gt;
* poboljšanje softvera za prepoznavanje znakova ili &lt;br /&gt;
* korištenje jeftine radne snage za prolaženje testova ([[:en:Human-based computation]]&lt;br /&gt;
* sirova sila - višestruki uzastopni napadi&lt;br /&gt;
&lt;br /&gt;
'''Nesigurna implementacija'''&lt;br /&gt;
&lt;br /&gt;
Kao i svaki drugi sigurnosni sustav, greške u dizajnu mogu spriječiti postizanje teoretske sigurnosti u praksi. Mnoge implementacije CAPTCHA-e, posebno one koje nisu pregledali sigurnosni eksperti, ranjive su na napade.&lt;br /&gt;
&lt;br /&gt;
Neki se CAPTCHA zaštitni sustavi mogu zaobići i bez uporabe [[Optical character recognition|OCR]]-a, jednostavno uz pomoć ponovne uporabe [[session ID]]-a poznate CAPTCHA slike.&lt;br /&gt;
&lt;br /&gt;
Pravilno dizajnirana CAPTCHA ne dozvoljava višestrike pokušaje prolaska testa. Ovo sprječava ponovno korištenje ispravnih testova i pogađanje iz više pokušaja nakon neprolaska na testu.&amp;lt;ref&amp;gt;{{cite web | url = http://www.puremango.co.uk/cm_breaking_captcha_115.php | title = Breaking CAPTCHAs Without Using OCR | accessdate = 2006-08-22 | year = 2005 | work = Howard Yeend (pureMango.co.uk) | archiveurl = https://web.archive.org/web/20170625165854/http://www.puremango.co.uk/2005/11/breaking_captcha_115/ | archivedate = 25. lipnja 2017. }}&amp;lt;/ref&amp;gt;. Druge CAPTCHA implementacije koriste hash (kao što je [[MD5]] hash) rješenja kao ključ koji se šalje klijentu da validira CAPTCHA-u. Ponekad je CAPTCHA tako mali, da se njgov harh kod može probiti.&amp;lt;ref&amp;gt;{{cite web|url=http://milw0rm.com/cracker/list.php |title=Online services allow MD5 hashes to be cracked| accessdate=2007-01-04}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nadalje, hash može pomoći u pokušaju probijanja temeljam [[OCR]]-a. Sigurnija schema bi bila ona sa korištenjem [[HMAC]]-a.&lt;br /&gt;
&lt;br /&gt;
Na kraju, neke implementacije CAPTCHA-e koriste konačni (mali) broj slika. S vremenom, kada napadač prikupi dovoljno slika, CAPTCHA se može probiti jednostavnom usporedbom hash-a CAPTCHA-e sa hashom nekom od pohranjenih slika.&lt;br /&gt;
&lt;br /&gt;
'''Računalno prepoznavanje znakova'''&lt;br /&gt;
&lt;br /&gt;
Do sada je prevedeno niz istraživanja s ciljem probijanja vizualnog CAPTCHA testa, a neki od njih su bili uspješni. Programi koji su razbijali CAPTCHA se temelje na ovim funkcionalnostima:&lt;br /&gt;
# [[Redukcija šuma]] - odstranjivanje pozadinskog šuma&lt;br /&gt;
# [[Segmentacija (procesiranje slika)]] - podjela slike na regije od kojih svaka sadrži po jedan znak&lt;br /&gt;
# Klasifikacija: identificiranje znakova u svakom dijelu slike&lt;br /&gt;
&lt;br /&gt;
Koraci 1 i 3 su lak zadatak za računala&amp;lt;ref&amp;gt;{{cite paper | author = Kumar Chellapilla, Kevin Larson, Patrice Simard, Mary Czerwinski |date=2005 | url = http://www.ceas.cc/papers-2005/160.pdf | format = PDF | title = Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs) | publisher = [[Microsoft Research]] | accessdate = 2006-08-02}}&amp;lt;/ref&amp;gt;. Jedini korak gdje je čovjek i dana jači od računala je segmentacija.&lt;br /&gt;
&lt;br /&gt;
{{prijevod-eng}}&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
 If the background clutter consists of shapes similar to letter shapes, and the letters are connected by this clutter, the segmentation becomes nearly impossible with current software. Hence, an effective CAPTCHA should focus on the segmentation.&lt;br /&gt;
&lt;br /&gt;
Several research projects have broken real world CAPTCHAs, including one of Yahoo's early CAPTCHAs called &amp;quot;EZ-Gimpy&amp;quot;&amp;lt;ref name=autogenerated1 /&amp;gt; and the CAPTCHA used by popular sites such as Paypal,&amp;lt;ref&amp;gt;{{cite web|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/05/12/breaking-the-paypalcom-captcha/ |title=Breaking the PayPal CAPTCHA |publisher=Kloover.com |date=May 12, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; LiveJournal, phpBB, and other open source solutions.&amp;lt;ref&amp;gt;{{cite web|first=Kurt |last=Kluever |url=http://www.kloover.com/2008/02/28/breaking-the-asp-security-image-generator/ |title=Breaking ASP Security Image Generator |publisher=Kloover.com |date=February 28, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web |first=Sam |last=Hocevar |url=http://sam.zoy.org/pwntcha/ |title=PWNtcha - captcha decoder |publisher=Sam.zoy.org |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web |first=Kruglov |last=Sergei|url=http://www.captcha.ru/en/breakings/ |title=Defeating of some weak CAPTCHAs |publisher=Captcha.ru |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
In January 2008 Network Security Research released their program for automated Yahoo! CAPTCHA recognition.&amp;lt;ref&amp;gt;{{cite web|url=http://network-security-research.blogspot.com/ |title=Network Security Research and AI |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; [[Windows Live Hotmail]] and [[Gmail]], the other two major free email providers, were cracked shortly after.&amp;lt;ref&amp;gt;{{cite news | first= | last=Dawson | coauthors= | title= Windows Live Hotmail CAPTCHA Cracked, Exploited | date=2008-04-15 | publisher=[[SourceForge]] | url =http://tech.slashdot.org/article.pl?sid=08/04/15/1941236&amp;amp;from=rss | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite news | first= | last=Dawson | coauthors= | title= Gmail CAPTCHA Cracked | date=2008-02-26 | publisher=[[SourceForge]] | url =http://it.slashdot.org/article.pl?sid=08/02/27/0045242 | work =[[Slashdot]] | pages = | accessdate = 2008-04-16}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In February 2008 it was reported that spammers had achieved a success rate of 30% to 35%, using a bot, in responding to CAPTCHAs for Microsoft's Live Mail service&amp;lt;ref&amp;gt;Gregg Keizer, [http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9061558 &amp;quot;Spammers' bot cracks Microsoft's CAPTCHA: Bot beats Windows Live Mail's registration test 30% to 35% of the time, says Websense&amp;quot;], ''Computerworld&amp;quot;', February 7, 2008&amp;lt;/ref&amp;gt; and a success rate of 20% against Google's Gmail CAPTCHA.&amp;lt;ref&amp;gt;{{cite web |first=Sumeet |last=Prasad |url=http://www.websense.com/securitylabs/blog/blog.php?BlogID=174 |title=Google’s CAPTCHA busted in recent spammer tactics |publisher=Websense |date=2008-02-22 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; A Newcastle University research team has defeated the segmentation part of Microsoft's CAPTCHA with a 90% success rate, and claim that this could lead to a complete crack with a greater than 60% rate.&amp;lt;ref&amp;gt;{{cite paper |author=Jeff Yan |coauthors=Ahmad Salah El Ahmad |url=http://homepages.cs.ncl.ac.uk/jeff.yan/msn_draft.pdf |title=A Low-cost Attack on a Microsoft CAPTCHA |format=PDF |publisher=School of Computing Science, Newcastle University, UK |date=April 13, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Human solvers ==&lt;br /&gt;
CAPTCHA is vulnerable to a [[relay attack]] that uses humans to solve the puzzles. One approach involves relaying the puzzles to a group of human operators who can solve CAPTCHAs. In this scheme, a computer fills out a form and when it reaches a CAPTCHA, it gives the CAPTCHA to the human operator to solve.&lt;br /&gt;
&lt;br /&gt;
Another variation of this technique involves copying the CAPTCHA images and using them as CAPTCHAs for a high-traffic site owned by the attacker. With enough traffic, the attacker can get a solution to the CAPTCHA puzzle in time to relay it back to the target site.&amp;lt;ref&amp;gt;{{cite web | url = http://www.boingboing.net/2004/01/27/solving_and_creating.html | title = Solving and creating CAPTCHAs with free porn | accessdate = 2006-08-22 | last = Doctorow | first = Cory | authorlink = Cory Doctorow |date=2004-01-27 | work = Boing Boing}}&amp;lt;/ref&amp;gt; In October 2007, a piece of malware appeared [[Computer virus#History|in the wild]] which enticed users to solve CAPTCHAs in order to see progressively further into a series of striptease images.&amp;lt;ref&amp;gt;{{cite news |url=http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archiveurl=http://web.archive.org/web/20071106170737/http://ap.google.com/article/ALeqM5jnNrQKxFzt7mPu3DZcP7_UWr8UfwD8SKE6Q80 |archivedate=2007-11-06 |title=Scams Use Striptease to Break Web Traps |first=Jordan |last=Robertson |date=2007-11-01 |location=San Jose, California |agancy=Associated Press}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|last=Vaas |first=Lisa |url=http://www.pcmag.com/article2/0,2704,2210674,00.asp |title=Striptease Used to Recruit Help in Cracking Sites |publisher=PC Magazine |date=2007-11-01|accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
These methods have been used by spammers to set up thousands of accounts on free email services such as Gmail and Yahoo!.&lt;br /&gt;
&amp;lt;ref&amp;gt;{{cite web | url = http://www.theregister.co.uk/2008/04/10/web_mail_throttled/ | title = Spam filtering services throttle Gmail to fight spammers | accessdate = 2008-04-10 | authorlink = John Leyden | date=2008-04-10}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
Since Gmail and Yahoo! are unlikely to be blacklisted by anti-spam systems, spam sent through these compromised accounts is less likely to be blocked.&lt;br /&gt;
&lt;br /&gt;
== Legal concerns ==&lt;br /&gt;
The circumvention of CAPTCHAs may violate the anti-circumvention clause of the [[Digital Millennium Copyright Act]] (DMCA) in the [[United States]]. In 2007, [[Ticketmaster]] sued software maker RMG Technologies&amp;lt;ref&amp;gt;{{cite web&lt;br /&gt;
  | last =Ulanoff&lt;br /&gt;
  | first =Lance&lt;br /&gt;
  | coauthors =&lt;br /&gt;
  | title =Deep-Sixing CAPTCHA&lt;br /&gt;
  | work =PC Magazine&lt;br /&gt;
  | publisher =Ziff Davis Media&lt;br /&gt;
  | date =October 31, 2007&lt;br /&gt;
  | url =http://www.pcmag.com/article2/0,2704,2209782,00.asp&lt;br /&gt;
  | format =&lt;br /&gt;
  | doi =&lt;br /&gt;
  | accessdate = 2007-12-12}}&amp;lt;/ref&amp;gt; for its product which circumvented the ticket seller's CAPTCHAs on the basis that it violates the anti-circumvention clause of the DMCA. In October 2007, an [[injunction]] was issued stating that Ticketmaster would likely succeed in making its case.&amp;lt;ref&amp;gt;{{cite web | url = http://www.scribd.com/doc/404395/ticketmaster-v-rmg |title=TicketMaster v. RMG}}&amp;lt;/ref&amp;gt; In June 2008, Ticketmaster filed for Default Judgment against RMG. The Court granted Ticketmaster the Default and entered an $18.2M judgment in favor of Ticketmaster.&lt;br /&gt;
&lt;br /&gt;
CAPTCHA without audio may also violate the [[Americans With Disabilities Act]], according to the [[American Council of the Blind]].&amp;lt;ref&amp;gt;{{cite web | url = http://www.acb.org/board-minutes/bm070802.html | title=Minutes of the August 2, 2007 Board Teleconference Meeting - American Council of the Blind}} &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Image-recognition CAPTCHAs ==&lt;br /&gt;
Some researchers promote image recognition CAPTCHAs as a possible alternative for text-based CAPTCHAs.&lt;br /&gt;
To date, only [[rapidshare]] made use of an image based CAPTCHA. Many amateur users of the [[phpBB]] forum software (which has suffered greatly from spam) have implemented an [[open source]] image recognition CAPTCHA system in the form of an addon called KittenAuth&amp;lt;ref name=&amp;quot;kittenauth&amp;quot;&amp;gt;[http://www.thepcspy.com/articles/security/the_cutest_humantest_kittenauth The Cutest Human-Test: KittenAuth] from ThePCSpy.com &amp;lt;/ref&amp;gt; which in its default form presents a question requiring the user to select a stated type of animal from an array of thumbnail images of assorted animals. The images (and the challenge questions) can be customized, for example to present questions and images which would be easily answered by the forum's target userbase. Furthermore, for a time, [[RapidShare]] free users had to get past a CAPTCHA where you had to only enter letters attached to a cat, while others were attached to dogs.&amp;lt;ref&amp;gt;{{cite web |author=David |url=http://www.randomwire.com/2008/06/04/attached-to-a-captcha/ |title=Attached to a Captcha |publisher=randomwire.com |date=June 04, 2008 |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt; This was later removed because users had trouble entering the correct letters.&lt;br /&gt;
&lt;br /&gt;
Image recognition CAPTCHAs face many potential problems which have not been fully studied. It is difficult for a small site to acquire a large dictionary of images which an attacker does not have access to and without a means of automatically acquiring new labelled images, an image based challenge does not meet the definition of a CAPTCHA. KittenAuth, by default, only had 42 images in its database.&amp;lt;ref name=&amp;quot;kittenauth&amp;quot; /&amp;gt; Microsoft's &amp;quot;Asirra,&amp;quot; which it is providing as a free web service, attempts to address this by means of Microsoft Research's partnership with [[Petfinder.com]], which has provided it with more than three million images of cats and dogs, classified by people at thousands of US animal shelters.&amp;lt;ref&amp;gt;[http://research.microsoft.com/asirra/ Asirra] from [[Microsoft Research]] ([[Portable Document Format|PDF]])&amp;lt;/ref&amp;gt; Unfortunately for Microsoft, researchers claim to have written a program than can break the Microsoft Asirra CAPTCHA.&amp;lt;ref&amp;gt;{{cite paper|first=Philippe |last=Golle|url=http://crypto.stanford.edu/~pgolle/papers/dogcat.html |title=Machine Learning Attacks Against the Asirra CAPTCHA |publisher=Stanford Crypto |date= |accessdate=2008-12-21}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Human solvers are a potential weakness for strategies such as Asirra. If the database of cat and dog photos can be downloaded, then paying workers $0.01 to classify each photo as either a dog or a cat means that almost the entire database of photos can be deciphered for $30,000. Photos that are subsequently added to the Asirra database are then a relatively small data set that can be classified as they first appear. Causing minor changes to images each time they appear will not prevent a computer from recognizing a repeated image as there are robust image comparator functions (e.g., [[hash function|image hashes]], [[color histogram]]s) that are insensitive to many simple image distortions. Warping an image sufficiently to fool a computer will likely also be troublesome to a human.&amp;lt;ref&amp;gt;[http://research.microsoft.com/asirra/papers/CCS2007.pdf Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization] from [[Microsoft Research]] ([[Portable Document Format|PDF]])&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Collateral benefits ==&lt;br /&gt;
Some of the original inventors of the CAPTCHA system have implemented a means by which some of the effort and time spent by people who are responding to challenges can be harnessed as a distributed work system. This system, called [[reCAPTCHA]], works by including &amp;quot;solved&amp;quot; and &amp;quot;unrecognized&amp;quot; elements (images which were not successfully recognized via [[optical character recognition|OCR]]) in each challenge. The respondent thus answers both elements and roughly half of his or her effort validates the challenge while the other half is captured as work&amp;lt;ref&amp;gt;{{cite journal | author = Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum | date= 2008 | url = http://www.cs.cmu.edu/~biglou/reCAPTCHA_Science.pdf| format = PDF | title = reCAPTCHA: Human-Based Character Recognition via Web Security Measures| journal=Science | volume=321 | pages=1465–1468}}&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
*[[Image spam]], where spammers exploit the inability of computers to read text in images to avoid junkmail filtering&lt;br /&gt;
*[[One-way function]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Izvori ==&lt;br /&gt;
&amp;lt;!-- See [[Wikipedia:Footnotes]] for instructions. --&amp;gt;&lt;br /&gt;
{{izvori|2}}&lt;br /&gt;
&lt;br /&gt;
== Vanjske poveznice ==&lt;br /&gt;
{{commonscat|Captcha}}&lt;br /&gt;
*{{dmoz|Computers/Internet/Abuse/CAPTCHA}}&lt;br /&gt;
&lt;br /&gt;
[[Kategorija:Računarstvo]]&lt;/div&gt;</summary>
		<author><name>WikiSysop</name></author>
	</entry>
</feed>