Quoting Michael Siladi (msil...@ix.netcom.com): > Hey! > > > > Open message [RM: payload URL snipped] > > > > msil...@ix.netcom.com
Imprtant note: That was _not_ from Michael Siladi, and not from his ISP Netcom, but rather a spammer forgery -- as can be seen in the SMTP headers: Received: from msa02a.plala.or.jp (msa02.plala.or.jp [58.93.240.2]) by che.dreamhost.com (Postfix) with ESMTP id 09C2310579 for <basfa@lists.basfa.org>; Thu, 24 Mar 2016 10:18:56 -0700 (PDT) BASFA's mailing list is hosted at Dreamhost, which accepted in this case incoming mail from IP address 58.93.240.2, an Internet server at plala.or.jp, which is NTT Plala, Inc., a major consumer ISP in Japan -- where the spam was probably injected into the outbound mail stream by a malware-infected customer MS-Windows desktop machine. Michael is blameless in all of this. He didn't send it, his own machine isn't malware-infected, his ISP password hasn't been stolen, and his ISP isn't involved. _______________________________________________ Basfa mailing list Basfa@lists.basfa.org http://lists.basfa.org/listinfo.cgi/basfa-basfa.org