Oh... but were's the fun in that? lol But it was more an issue
of figuring out how to do it, then rather something being implemented
is all. Just a bit of geek fun is all.
What you mentioned below is a good idea, and the correct approach, having
worked at an ISP previously I've dealt with issues like this. But it does
get a bit much when you spend most of your on line time writing emails to
support@<any_ISP_.com> mention Internet atrocities. My method just makes ya
feel good! lol
:0)
tdh
--
T. Holmes
Unixtechs.org
[EMAIL PROTECTED]
www.unixtechs.org/
"Real Men use Vi."
* Tom Brinkman <[EMAIL PROTECTED]> [010106 11:57]:
> On Saturday 06 January 2001 08:39 am, Mark Weaver wrote:
> > Tim,
> >
> > That's an interesting concept. How would one go about do just what
> > you've suggested. I'd be very interested in learning how to "bounce"
> > junkmail back to it's originator.
>
> I believe y'all might wanna rethink this kind of retaliation. It'll
> prob'ly only serve to escalate the situation, not defuse it. It also
> seems to me you'd be cutting off your nose to spite your face, ie, if
> d/l'ing all that junk was a pain, why go to the time and effort to
> re-upload it? It's also doubles wasted bandwidth. It also makes you
> no better than the instigator.
>
> IMO, the best solution for unwanted email is the delete key. In a
> mail bomb situation the best recourse is to filter it and find out the
> sources ISP and report the situation to them.
> --
> Tom Brinkman [EMAIL PROTECTED] Galveston Bay