Fuseli, Alptraum, 1871
~ Trolling lore ~

searchlores.org
         Petit image    Trolling for
information
Version March 2008
[Introduction]
(trolls, flamers, kooks and shills)
[Trolling for information]
[Trolling wars]
[Trolls and Schopenhauer]
[More about trolling]
[Anti-Trolling weapons]
[Essays]     [Trolls webbits]
See also the ad hoc sections [Usenet], [Luring Lore] & [Stalking Lore]

    "If you can't take a little bloody nose, maybe you ought to go back home and crawl under your bed. It's not safe on Usenet. It's wondrous, with treasures to satiate desires both subtle and gross. But it's not for the timid."

introduction
trolls, flamers, kooks and shills


What is a troll? What is a flamer? What is a kook? What is a shill? You'll find a detailed explanation of the various terms reading gandalf's trollfaq (always retrievable through "Archive-name: net-abuse-faq/troll-faq Posting-Frequency: monthly"). Also, in order to understand this lore, you better have already acquired an adequate knowledge of usenet.

As a matter of fact, on any virtual meeting point (usenet newsgroups, http:// messageboards, maillists) you may register "attacks" by individuals interested in disrupting the flow of messages.
There are MANY kinds of such individuals, see for instance the wondrous descriptions of usenet people at [Flame Warriors]

A troll is basically one who posts messages intended to insult and provoke per fas et nefas (see [Trolls and Schopenhauer] below).
For each person who responds, the poster (the troll as a person) will consider that person "caught". The troll (the troll as an action) is considered to have been a complete success if it disrupts beyond repair the normal traffic on a newsgroup or on a messageboard. In extreme cases, trolls are posted by groups of trollers and crossposted to unrelated newsgroups in an attempt to destroy those groups by flooding them with flames and off-topic ranting.
Variants:
1.spamming troll, one who posts -or crossposts on many newsgroups- the same, exact post, multiple times (mostly one liners: "cascade"). Some of these 'listings' with all answers and counter-answers, can grow into huge files.

2. kook: a regular poster who continually posts messages with no apparent grounding in reality. The kook trademark is paranoia and grandiosity. Kooks will often build up elaborate imaginary support structures, fake corporations and the like, and continue to act as if those things are real even after their falsity has been documented in public. While they may appear harmless, and are usually filtered out by the other regular participants in a newsgroup or mailing list, they can still cause problems because the necessity for these measures is not immediately apparent to newcomers; there are several instances, for example, of journalists writing stories with quotes from kooks who caught them unaware. See http://www.crank.net/usenet.html for more info.
Some people have dedicated their lifes to expose kooks, and they will warn you that 'It is important to note the subtle distinction between a net.kook, a net.cretin, a clueless newbie, troll, or garden-variety @$$hole. The newbie, one hopes, can acquire a clue on the installment plan even if he can't afford to buy one for cash; the cretin is merely stupid and/or irritating; the troll is purposely pulling your leg like it got caught in some heavy machinery, the @$$hole is, well, simply that. But a TRUE net.kook has a special fascination derived from his/her/its utter ineffability. Their behavior is irrational, if not downright weird, but they are seldom merely boring'
A very interesting Kookologists' Manifesto is "The way of the Kook", this makes very good reading and it is much more informative as it may seem at first.

3. A flamer is one who contributes nothing but uninformative "ad hominem" bickering. His inventivity in names-calling and "hurting tooth poking" fears no matches. Even a good troll will never win against a good flamer. Yet flaming is an art that many, many, try, few master, and nearly all think -wrongly- they are good at. So since you (reader) are most probably not a good flamer, heed the (sound) advice: never answer to a troll (not even in order to flame him, see below).

4. A shill is one who posts messages as a spokesperson or "front" for an unseen group or organization, usually at odds to the topics being discussed.

The shills have joined trolls as parasitical newsgroup fauna, destroying the balance of free discussion, degrading the level of information, feeding like preditors on newsgroup populations that contain the resource that they seek to convert to money.

Remember, shills are creatures of darkness, and their enemy is the light. Shills can only succeed as far as they fool people, a shill is by definition an agent of deception, similar to a con artist, but acting on a target market instead of individuals. Shills always act on profit, and the motive, opportunity, and promise of profit, which in direct proportion to the degree of such, will spawn shills as surely as rotten meat spawns magots.
Awareness of shills is a first defense against shills. Shills unmasked are no longer shills, no longer effective.

As you'll see in the following, searchers can use trolls in order to gather information, trolls attacks are often organized (in "waves"), trolls coordinate on usenet groups, trolls can teach us powerful rhetorical tricks and there are some weapons that you can use to nuke them (apart from killfiles plonking on usenet). Moreover stalking and luring techniques can and will be very useful when seekers have to deal with trolls (or punish them).
But, first, learn that you can troll yourself, in order to gather specific knowledge or information...
Trolling for information
System administrators answering a troll


Well... soon or later I would have had to teach you how to fish info through clever placed trolls anyway, so learn it right now... (I'm just speaking for those among you that did not know this trick already, of course :-) ...Unix-related trolls (or Linux ones) on usenet can fetch a huge amount of interesting info, if cleverly placed.

This was the troll (first relevant part, note the typical trolling style):
>> I get this feeling that your anti-MS because your an old school 
>> UNIX weenie that hates the fact of MS-NT eating your lunch with 
>> zero administration and fast setup?

This was the first answer:
"Zero Administration?" ...Service packs that fix one problem while
introducing another.  Distributed in straight binary format with no
source code and no compiler, so you can't fix bugs in the code
yourself.  Changing simple things like IP settings requires a reboot.
Changing damn near anything requires a reboot.  On what's supposed to
be an Enterprise-class server?  The people that actually have to
administer NT systems usually _hate_ them.  Their boss is the one who
bought MS's bullshit about "ease of use" and "reliability".

This was the second answer (quite interesting, I believe)
I can vouch for this somewhat, having to deal with an NT box at work, although it's actually given us little trouble. The reason for this is that we have only *one* mission-critical function running on NT: our proxy server. The only other tasks it's used for are backing up the network and file/application serving, neither of which would cripple us if the box puked tomorrow. The *real* important stuff runs on Linux or Solaris (and, as soon as Informix ports its DB tools to Linux, the Sun box will find itself on the doorstep the next day).

What slays me about Microsoft is how badly their software can coexist with other products, *including their own*. A classic example is their aforementioned proxy Server. When you set up NT with the Option Pack and Service Pack 3, it installs Internet Information Server 4.0 by default. Which is fine, except for one small detail: it *breaks* proxy Server. We had to back IIS 4.0 out of the system and install IIS 3.0, which has no trouble working with proxy Server. AFAIK, there is still no fix to get proxy Server working properly with IIS 4.0.

Now tell me: if Microsoft can't be bothered to fix glaring compatibility issues with its own products, what makes anyone think it gives two shits about making them compatible with anyone else's? Why the hell did Sun sue Microsoft over the Java issue in the first place?

Second part of the troll:
>> UNIX hit rock bottom 2 years ago when the DOD shit canned it due to 
>> it high cost. NT is cheaper and faster to use. Who in their right 
>> mind would spend $1,500 for a crude UNIX OS when NT is better and 
>> almost $ 1,300 cheaper???

First answer

Well, why would you need to spend $1500 when you can get your pick of
various *BSD and Linux OS's for either the cost of the CD, or the time
it takes to download?  NT Server costs $200?  I think it's a bit more
than that.  And you also have to buy client licenses by the seat.  The
more workstations you have being served by NT, the greater the cost.

Second answer
He may be thinking of NT Workstation, which is a very different
animal.

Point of comparison: our upgrade to NT (we qualified, having run
Netware previously) cost us just under $1500 for the server and 30
client licenses (also not $200).  But Solaris is much, much more 
expensive, especially if you run it on SPARC hardware, although 
there are no client-access restrictions.

I should add that actually both posters above realized they were answering to a troll, but, interesting enough, it worked nevertheless... and it was possible to fish out some anti-M$ info allright :-)
Trolling wars
The waves system


The following is the old alt.syntax.tactical (master trollers who make it their life's work to destroy as many groups as they can. They consider a group destroyed when more than three quarters of the threads on a group have been started by them and the group is unusable for normal traffic) foundation for the structure, strategy, and protocol of simple USENET invasions. I have decided to publish it here because it gives good insight on the complexity of a good troll attack. Many of the tactics described here can be applied, mutatis mutandis to any sort of "lone wolf" action you may want to stage on your own. Seekers should know all sort of techniques, least they may suddendly need them (or need to recognize them) in some obscure corners of the web.
* Waves of Invasion *
Flames and wars between groups are as old as Usenet. What we try to do is in many ways fundamentally different from what is or has been done in this area.
After picking a messageboard, we call for an invasion on that msgbrd. There are a number of phases to an invasion. Each person can volunteer for which wave they want to be in, but more times than not, it is a first come- first served policy. It is always important that no one jump the gun and go in before we have time to prepare and bounce ideas off each other. It's also important that people don't switch waves without letting everyone know. Flexibility is the key, as is communication.
Typically, we use between two and five Waves of attack. Waves will generally break down into this kind of structure:
a: Reconnaissance (RECON): These people will go in early and usually set up camp as "friends of the newsgroup". They will become trusted and participate by joining previous discussions or starting non- controversial ones themselves. They will also act as "double-agents" to counter-flame the other waves as the invasion progresses. They key is building a bit of credibility.
b: Wave One: Wave one will usually be what starts the flame war. Those involved in this wave can go on and each have a different flame, or go on and flame in unison. They can bring in a subject of their own or flame a previous discussion. What matters is that this initial wave will be the one that the invaded newsgroup will have their attention on. This wave calls for extreme subtlety. The quality of the flame MUST be at its highest point here.
c: Wave Two: Wave Two will consist of tactics to attack the people who were sent in as recon and attempt to start totally new flame threads. The key here is that even if we attack a group of people restrained enough to resist our flame-bait, wave two will stir things up and get others to join in.
d: Wave Three: Wave three will generally change depending on the campaign, but will generally be added to push the confusion and chaos over the top. Flame the recon, flame the first wave, flame the second wave. These guys are our balls out, rude SOB's. Mop up and clean out. Sometimes (usually with bigger groups) Wave three will simply be along the lines of a wave two. We will call for a wave four (or five) to be the balls out routine. We will sometimes add a wave or two because depending on the size and intelligence of a newsgroup.

Miscellaneous Tactics:
There are three other things that we typically use, depending on the sophistication of the invasion.
LOOSE CANNONS are people who come in and act so strange and obtuse that it makes the rest of the flames look genuine.
THE ANON SERVICE can be used to send posts anonymously. This is a good way to post and pretend to be scared of retribution. Only problem is that this is usually the first sign that a post is a flame, so it should only be used with a TREMENDOUS amount of DISCRETION.
CROSS POSTING is also a popular method of choice by other flame groups, so it is important to Cross Post with discretion. If we can cross post to bring in other newsgroups to unwittingly assist us, perfect. If we cross post to suspicious newsgroups, our intentions will be obvious.

* Victory *
Ideally, signs of victory are the following: * Notes *
Most important is the need to be SUBTLE when it is required. One misplaced post can ruin it for the rest of us. Those of you who have participated in widespread flame wars know the feeling of having a newsgroup going for a long time, then someone posts an obvious flame or something so far out of context, that everyone says to just ignore the flames, which eventually includes all of us. Blowing a flame war will occasionally happen, but if it could have been avoided with a little thinking, then it's not as excusable.
We've got to share duties. Everyone should get practice playing different roles and different waves.
It has been assumed that if you don't want to participate, fine. No one will hold it against you. What is expected is that if you don't want to participate you don't have to, but that also means that you wont go warning that newsgroup when an invasion happens. You will close your eyes and turn a blind eye. NO NEWSGROUP AND NO MESSAGEBOARD IS OFF LIMITS!!!!!!
Another thing many people seem to be talking about are SIGS AND NAMES. Try to take on appropriate names. If you are on alt.rap, D.J. Trouble is not going to stir things up...if you show up on soc.culture.physics with that name, you're caught before your first word of text. If a Sig is going to blow your cover, lose it.


Trolls and Schopenhauer


One of the most interesting knowledge you can acquire, reading and analysing trollers' postings, is the wealth of Eristic Dialectic stratagems they often use. In fact even tossing "verbal grenades" into the targeted forum in order to cause "indiscriminate damage" implies rhetorical subtility and skill, if you want them to explode at the right distance and against the right targets (and not in your hands).
Readers that will find the time to print and read Schopenhauer's masterpiece, linked below, will recognize immediately (and never fall again for) most of the rhetorical tactiques (indeed "stratagems") used by trolls on usenet newsgroups or any other messageboard or forum.
Unfortunately today's "americanocentrical" world seems to ignore Schopenhauer's beautiful teachings (no wonder, since if people would read Schopenhauer the whole advertisement industry - and most politicians relying on media appearance - would not have any chance). Few english version seem to be on the web... a -bad- translation I have found is here, another older one is here, the most famous one (T. Bailey Saunders) is here yet for those of you that can read German, here you are with "Arthur Schopenhauer: Eristische Dialektik oder Die Kunst, Recht zu behalten – in 38 Kunstgriffen dargestellt".
And for those that do prefer the joy of collating a translation with the original text, ~S~ Ritz pointed out this nice place.
Admit it: this kind of knowledge... these 38 tricks ("stratagems") translate into real power for those in the know, eh? Quite funny, come to think of it: A sharp incredible weapon against webtrollers strategies (actually, against much more), devised in 1864 and more useful and valid in these web-intensive times that ever before :-)

Here a possible searchquery: schopenhauer "per fas et nefas"

Another interesting and refreshing approach by David Barry (How to Win Arguments, As It Were - 2001)

(This is also part of the exegesis lore)



Some usenet debunking techniques are of GREAT value, because you can apply them, mutatis mutandis to your own local corrupt politician's jargon.
An interesting example could be found at the now disappeared http://www.petitmorte.net/cujo/ (Cujo's World of Usenet Kooks), where the debunking of a notorious Kook gave an hilarious, but true, debunking-cypher-muster, useful to debunk many a "round table" speech.
Here some examples (among the many other available all over usenet when dealing with trolls and kooks) that I have taken from Cujo's site before its disappearance (with some modifications)...



A short debunking dictionary for political speech
what the politician says
what he really means
Abuse: Responding to his blabbering
Aggressive: Person who doesn't agree with him
Argument: Something he dreams of someday winning
Art: Plagiarism
Articles: Screed
Best-seller: 500,000th place on Amazon
Borrow: Steal
Businesses: His scams
Data (academic): Bogus partisan research
Data (dubious): Data contradicting his statements
Defamation: Pointing out his lies and mistakes
Defeated: Declared victory by repeating screed
Do you follow me?: You are a cretin.
Do you understand?: Do you accept my argument unconditionally?
Enlightenment: Confusion
Facts: Opinions
Fan: lackey
Good/Bad: Completely subjective labels
Harassment: Replying to his accusations
Happy: Angry
Humble: Narcisstic
Insignificant: Something that he doesn't like to hear
Integrity: Null concept when applied to himself
Irrelevant: I have no answer to that
Leaving forever: I'll be back in a minute
Let's turn to something concrete: This argument annoys me.
Logical arguments: Incoherent, plagiarized screed
Marginal: I have no answer to that
Modesty: Boasting just one of my many qualities
Never lied: Have a nose longer than Pinocchio
Freak: Responding and disagreeing with him
Off-topic: Something that he doesn't like to hear
Powerful arguments: Incoherent babbling
Predicted: Postdicted
Proof: Baseless assertions
Published author: Illiterate nobody
Punk: Someone who disagrees with him
Publish: Plagiarize
Researched: Plagiarized
Referenced: Plagiarized with loads of bogus indexes
Negative attitude: Someone who disagrees with him
Success: Failure and disgrace
Theory: Babbles pulled out of his ass
Truth: Load of delusional rantings
Unaffected: Obsessing over it night and day
Undefeated: I'm in denial
Trivia: Any claims he won't back up
You are partly right: You are wrong
You are wrong: You are right, but I cannot admit it
Waste of resources: Anything not favorable for his own scam projects
Win: Proclaim victory and run away
So do not say never again that trolls and kooks are not useful...

More about trolling

(Socket puppets, moles, coordination points, flonk, meows...)


First of all: a warning...

"Do not meddle in the affairs of wizards for they are subtle and quick to anger"
gandalf (@digital.net), see http://digital.net/~gandalf/trollfaq.html

Trolls' characteristicae

1) They have a lot of free time, they are mostly lonely people.
2) They often ingratiate themselves to a person or two on the group and use them to stay in the group. They may protest with these "friends" that their right to free speech is being curtailed.
3) They sometimes use "socketpuppets", i.e. fake identities that may be used to sustain, or to inflame the troll's position or theory or attack. At times the socket puppets' names are anagrams or similar to the troll name. Thus a troll may engage in artificial conversations with himself. However impersonating multiple people is frowned upon by the more able trolls and is considered the lowest of the possible troll tactics.

Where do trolls coordinate?

Real nasty trolls operate without central coordination, and recognize themselves on the fly when attacking a newsgroup (or a http:// messageboard, or any kind of forum... once more: trolls do not operate only on usenet). On usenet the most (in)famous newsgroups for trolls (not for trolling, for coordination and experimentation) are  alt . alien . vampire . flonk . flonk . flonk,  alt . fan . karl-malden . nose (dedicated to cascades, UPA "Usenet Performance Art" and crossposting) and alt . romath (The Knights of Romath "guard Usenet from netcops").

More newsgroups (or newsfroups, see: "The way of the Kook" for some terminology): alt.hackers.malicious, alt.usenet.kooks, alt.flame



Trolls' "moles"

As you have seen above, a favorite tactic of organized troll groups is to plant a "mole" into the group - someone who looks and acts like a regular visitor / reader. Often, the mole is planted a few weeks to a month in advance of an attack wave. That way, for the newsgroup habitat it looks as though the invaders were attacking "one of us." Be wary of this tactic, as it lends to the mischief: unsuspecting do-gooders are sucked into the fray as they come to the defense of the the "attacked fellow".

Ongoing attacks

Finally, if you are interested in troll wars, be aware that, apart from the obvious trolling opportunities caused by the 11 september attack against the States ("the WTC was so ugly I'm happy it went down" kind of postings on right/conservative/"americafirst" oriented forums) there is an interesting ongoing attack on the alt.cats newsgroup. This involves at least 20 trolls. In fact there exist even a special alt.cats.declawing-debate newsgroup, that has been especially created (and animated) by trolls in order to annoy cat owners.
Recognizing shills

Shills appears most commonly on 'reviews' and 'readers opinions' scripts, not only on usenet and on messageboards.
There are some techniques for telling whether a contributor is a shill:
  • Look for other reviews/contributes on the same forum to see how they compare.
  • Look for other reviews/contributes by the same reviewer. If there aren't any, look out!
  • Look for a review/contribute made by a recognized reviewer/contributor.
  • With respect to bad reviews, look for an obvious agenda. Contributors who appear out of nowhere and use highly inflammatory or gratuitously insulting language are suspect.
  • Always check the cui prodest of the contribution. Try to understand if it could be the competition or someone else with an axe to grind.


are trolls useful? ...Yes...

Yes (as somebody wrote long ago), much like hyenaes: if a messageboard is strong and vibrant, with healthy ideas and intelligent discussion among posters, then these tend to be too interested in what is going on to pay much attention to the trolls. However, once a forum begins to show signs of decay - usually due to bickering amoung the regular visitors - then the trolls run rampant and it is only a matter of time before the forum disintegrates.
Moreover: "Trolls remind us that this is not private space. Lurkers are everywhere but it is easy to forget that. Chatting away on a thread with an old buddy it is easy to reveal personal details about one's life that you might not really want public. Trolls remind us that in a public forum anyone can read what we write."

Moreover, as we have seen in Trolls and Schopenhauer and with the debunking example above, trolls DO deliver us many useful findings about "Eristic Dialectic stratagems". Findings that we can easily apply outside the world of Usenet :-)

...and no

This said, trolls and (even more) shills are very often de facto and/or de jure just lackeys of the commercial powers that be. What all trolls have in common is that they flood newsgroups with inappropriate material in an effort to suppress discussion they don't want taking place. If it were radio, you would call it "jamming" and everybody would agree it was censorship. But on Usenet or on messageboards, the effect is more subtle and the mechanism more complex (involving user interface limitations of newsreading software) so it hasn'e been widely recognized yet. Some of the most determined destroyers are professionals trollers connected to people that stand to lose if a specific Usenet newsgroup (or any given specific messageboard) proves to be a viable alternative to the(ir) controlled channels of mass communications.
Let's see how to (try to) destroy them...
Anti-Trolling weapons
Deathpinging ~ rebuking trolls


Deathpinging

"OK, I have enough, let's screw the troller: I'll give him 200-300 ping -f -s 65000" ;-)
A+heist


What A+heist is referring to is an attack know as 'ping flood': many large size pings sent continously against your target system in order to have a buffer overrun. This kind of attacks are commonly used, for instance, during IRC channels wars.

A well known fact is that Windows 98 (and many other toy and older systems) REBOOTS after a ping -f 65000. Often only a single ping -f 65000 is enough to reboot the system. The command must be issued from a Linux Box.
For slackware 3.6 Kernel 2.0.36, the correct line is: ping -f -s 65000 Target_IP_address
If you are playing on local networks, use ping -s -l instead
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
            [-r count] [-s count] [[-j host-list] | [-k host-list]]
            [-w timeout] destination-list

Options:
    -t             Ping the specifed host until interrupted.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -l size        Send buffer size.
    -f             Set Don't Fragment flag in packet.
    -i TTL         Time To Live.
    -v TOS         Type Of Service.
    -r count       Record route for count hops.
    -s count       Timestamp for count hops.
    -j host-list   Loose source route along host-list.
    -k host-list   Strict source route along host-list.
    -w timeout     Timeout in milliseconds to wait for each reply.

In this context I would like to recall the similarly famous "ping of death" method.

For exact information see: http://www.insecure.org/sploits/ping-o-death.html.

I'll quote: billions of machines can be crashed sending IP packets that exceed the maximum 'dos' length (65535 bytes). You can send from Linux, and, also, of course you can hack your own dos in order to let it send a packet bigger than that. There are also many nukers on the web that have options to change the packetsize.
Netware, Routers, and of course toy systems like Windows NT and 9* can be locked, but early versions of Linux and Solaris can be nuked as well.
The attacker needs to know nothing about the machine other than its IP address.
Most implementations of ping won't allow an invalid packet (i.e. more than 65535 bytes) to be sent. Among the exceptions are Windows '95 and NT :-)
This exploit is by no means restricted to ping. The problem can be exploited by anything that sends an IP datagram probably the most fundamental building block of the net. An IP datagram consists of an IP header and an IP payload The IP header is of variable size, between 20 and 60 bytes, in 4-byte increments. It provides routing support, payload identification, IP header and datagram size indication, fragmentation support, and options. The IP payload is of variable size, ranging from 8 bytes (a 68-byte IP datagram with a 60-byte IP header) to 65,515 bytes (a 65,535-byte IP datagram with a 20-byte header).

Note also that not only ICMP echo, but TCP, UDP and even new style IPX can be used to hit machines where it hurts.


rebuking trolls

This said, the above methods (and other more nasty ones) are better left to professional webwizards and "older ones" (that may often be willing to help you for a worthy cause). Usually the best method when dealing with trolls is always the same: NEVER ANSWER TO THEIR POSTINGS! ("Please do not feed the troll")
The whole point of trolling is to have you react. So do not react! It's as simple as that, duh. That is something that enrages trolls (disqualify them: other lurking trolls will take note of their failure and they know - and fear - it).
By not reacting, you have completely defeated their purpose in life. In other words, the troll sees his self-worth in how much of a reaction he can inspire - ignore him: it's your best weapon.
Should you, my advices notwithstanding, answer a troll, then calm down! Do not read any of the troll's responses to you. He is just trying to draw you further into its lair. Once more: NEVER ANSWER TO THEIR POSTINGS!

Once more, 5 easy rules:

(1) Don't read posts from or about trolls;

(2) Don't read email from or about trolls;

(3) If you can't resist reading, don't respond;

(4) If you can't resist responding, do so by email, not by posting on a public forum;

(5) If you are compelled to post a response, if you just can't stop yourself, at least do the rest of the readers the favor of adding the troll's nick to the subject line, so they can avoid reading that post.


In case of a cascade attack (by spamming trolls), you may be able to help matters by posting yourself into the cascade and removing your group from the crossposting line. (Cascades are those one liners piled on top of each other that spamming trolls so love).

In the case of shills the best method is - instead - to boldly counterattack: stalk them (sometime a simple reversing of their language patterns will be enough) and debunk them. If you can individuate (or even suspect, eheh) the group/industry they have been working for, they are dead and everything they have damaged will be reversed :-)
Essays  (de re trollica)

  • May 2007: [rcrs.htm]: Reverse engineering of online customer reviews
    by slappy and sem
    A study of 'shillism'
    Part of the trolls section.
    "Take a look at the top reviewer on amazon. As of today this is harriet klausner with 13723 reviews. On first sight there is nothing that catches the eye, but doing some math raises questions. Lets suppose she has been reviewing for amazon the last 5 years...
    13723 book reviews
    2744.6 books per year
    52.78 books per week
    7.54 books per day...
    What d'you say? Would you trust her? :-)
    "

  • October 2004: Trolls punishing deviant wannabies trolls through scorching sarcasm: "USENET'S SUPREME COURT OF LAST RESORT", by Friendly Neighbourhood Vote Wrangler
    A troll will be "impeached" in this text, among other things "for displaying unmanly cowardice in the face of a Perl Script".

  • September 2004: A very interesting Kookologists' Manifesto is "The way of the Kook", this makes very good reading and it is much more informative as it may seem at first.

  • April 2002: fldigest.htm: Trollers Digest: A description of trolling techniques and tactics, by Dr. Flonkenstein, part of the trolling [section]
    'colorful usenet behaviour' explained :-)

  • February 2002: A "flamebot": A perl script that makes automatic replies to one or more usenet posters of your choice by Dr. Flonkenstein
    Dr. Flonkenstein, one of the ugliest trolls of the planet (this is, for trolls, a compliment :-) is a good friend of mine and an extremely clever (and nasty) "usenet artist".

Trolls webbits
(a webbit is a sharp arrow)


Classic unsubstantiated and erroneous claim
Non sequitur

Petit image Petit image

(c) 1952-2032: [fravia+], all rights reserved