Re: exim or postfix

2004-11-12 Thread martin f krafft
also sprach John Goerzen [EMAIL PROTECTED] [2004.11.12.0612 +0100]: And I get many legitimate e-mails with a bad HELO. In fact, I would argue that your rule here is wrong. If I send you an e-mail from my laptop, it is not going to send you an address of a server that can receive mail (or has

Re: exim or postfix

2004-11-12 Thread Adrian 'Dagurashibanipal' von Bidder
On Friday 12 November 2004 07.47, Craig Sanders wrote: On Fri, Nov 12, 2004 at 05:12:34AM +, John Goerzen wrote: 4 ETRN Weird, people are just sending ETRN commands to you? me too. One is a mail server of a respected company that is apparently misconfigured, and has been for a

Re: exim or postfix

2004-11-12 Thread Craig Sanders
On Fri, Nov 12, 2004 at 10:09:36AM +0100, Adrian 'Dagurashibanipal' von Bidder wrote: On Friday 12 November 2004 07.47, Craig Sanders wrote: On Fri, Nov 12, 2004 at 05:12:34AM +, John Goerzen wrote: 4 ETRN Weird, people are just sending ETRN commands to you? me too.

Re: exim or postfix

2004-11-12 Thread John Goerzen
On Fri, Nov 12, 2004 at 05:47:17PM +1100, Craig Sanders wrote: On Fri, Nov 12, 2004 at 05:12:34AM +, John Goerzen wrote: i like the way it works. makes it easy to model the flow of mail from component to component. On the other hand, it introduces complexity into the system. It's a lot

Looking for a network sniffer that collects a used-ports list to help preparing a portfilter firewall script

2004-11-12 Thread Christian Hammers
Hello I remember a network sniffer that could be run e.g. over a week to collects a list of all used tcp/udp ports which could then be used as base for creating a firewall script for hosts. Does anybody know the name of this tool? bye, -christian- -- To UNSUBSCRIBE, email to [EMAIL

Re: Looking for a network sniffer that collects a used-ports list to help preparing a portfilter firewall script

2004-11-12 Thread martin f krafft
also sprach Christian Hammers [EMAIL PROTECTED] [2004.11.12.1538 +0100]: I remember a network sniffer that could be run e.g. over a week to collects a list of all used tcp/udp ports which could then be used as base for creating a firewall script for hosts. What an extraordinarily bad idea. You

Re: stolen

2004-11-12 Thread webmaster
Sorry, this email address has been disabled by the KeyGhost webmaster due to an overflow of incoming spam. If you wish to contact us, please visit our website for a valid email address. Thank you, The KeyGhost Team -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe.