Oh... but were's the fun in that? lol  But it was more an issue
of figuring out how to do it, then rather something being implemented
is all.  Just a bit of geek fun is all.

What you mentioned below is a good idea, and the correct approach, having
worked at an ISP previously I've dealt with issues like this.  But it does
get a bit much when you spend most of your on line time writing emails to
support@<any_ISP_.com> mention Internet atrocities.  My method just makes ya
feel good! lol

:0)
tdh
--
T. Holmes
Unixtechs.org
[EMAIL PROTECTED]
www.unixtechs.org/

"Real Men use Vi."  

* Tom Brinkman <[EMAIL PROTECTED]> [010106 11:57]:
> On Saturday 06 January 2001 08:39 am, Mark Weaver wrote:
> > Tim,
> >
> > That's an interesting concept. How would one go about do just what
> > you've suggested. I'd be very interested in learning how to "bounce"
> > junkmail back to it's originator.
> 
>    I believe y'all might wanna rethink this kind of retaliation.  It'll 
> prob'ly only serve to escalate the situation, not defuse it.  It also 
> seems to me you'd be cutting off your nose to spite your face, ie, if 
> d/l'ing all that junk was a pain, why go to the time and effort to 
> re-upload it?  It's also doubles wasted bandwidth.  It also makes you 
> no better than the instigator.
> 
>     IMO, the best solution for unwanted email is the delete key. In a 
> mail bomb situation the best recourse is to filter it and find out the 
> sources ISP and report the situation to them.
> -- 
> Tom Brinkman       [EMAIL PROTECTED]     Galveston Bay

Reply via email to