Hashcash - was re: Spam fights

2004-06-11 Thread Patrick Maheral
It seems that most people here don't like CR systems, and I'd have to agree with that consensus. I'm just wondering what is the general feeling about using hashcash and other header signatures systems. Patrick -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe.

Re: Spammers using a non-existant address as return-path

2002-11-25 Thread Patrick Maheral
We have the same problem here. Someone has been using our domain name in their headers since January. At times, we were getting a few thousand bounces from mail to over-quota or non-existant accounts. I added the following line to my exim.conf receiver_try_verify = true This results in an

Re: Spammers using a non-existant address as return-path

2002-11-25 Thread Patrick Maheral
We have the same problem here. Someone has been using our domain name in their headers since January. At times, we were getting a few thousand bounces from mail to over-quota or non-existant accounts. I added the following line to my exim.conf receiver_try_verify = true This results in an

Attachment handling in Mutt

2002-08-08 Thread Patrick Maheral
I'm using Mutt 1.4i (2002-05-29) on a sid (debian unstable) box with a 2.4.16 kernel. Over the past several months, I have been receiving email messages that (probably) contain various forms of malware. In these messages, there are two attachments: the first is the (DOS/Win) executable, and the

Re: Attachment handling in Mutt

2002-08-08 Thread Patrick Maheral
Hi Sylvain, I should have looked a little closer at _ALL_ of the headers. I missed the alternative part. I just thought it was strange that an exe was hidden from view. I was worried that openning the attachment might open the wrong one, however, i rarely open attachments anyway. Thanks,

Re: ssh authentication configuration?

2002-05-29 Thread Patrick Maheral
Hi Joshua, There should be no problem with using PasswordAuthentication with SSH since the passwords are _NOT_ sent in the clear. Rather, the clear text password is sent over the encrypted channel. From the SSH(1) man page: The password is sent to the remote host for checking; however,

Re: ssh authentication configuration?

2002-05-29 Thread Patrick Maheral
Hi Joshua, There should be no problem with using PasswordAuthentication with SSH since the passwords are _NOT_ sent in the clear. Rather, the clear text password is sent over the encrypted channel. From the SSH(1) man page: The password is sent to the remote host for checking; however, since

Re: what is means ? + rootkits..

2002-04-19 Thread Patrick Maheral
On Fri, Apr 19, 2002 at 02:47:08PM +0200, Jan Johansson wrote: Why some people says that eg. tripwire doesn't discover it ? Then they dont know what they are saying, i would say that Tripwire / AIDE / such will be 100% efficient in detecting kits _PROVIDING_ that your database is current,

Re: what is means ? + rootkits..

2002-04-19 Thread Patrick Maheral
On Fri, Apr 19, 2002 at 02:47:08PM +0200, Jan Johansson wrote: Why some people says that eg. tripwire doesn't discover it ? Then they dont know what they are saying, i would say that Tripwire / AIDE / such will be 100% efficient in detecting kits _PROVIDING_ that your database is current,

Re: sshd port config and security

2001-04-06 Thread Patrick Maheral
On Fri, Apr 06, 2001 at 10:31:27AM -0500, Vinh Truong wrote: I have sshd set up on my machine at home. Instead of the default port 22, I uninstalled telnetd and run sshd on 23. I do this mostly because I want to ssh into my machine from work where they don't open port 22 on the firewall.

Re: MD5 sums of individual files?

2001-03-29 Thread Patrick Maheral
. Patrick Maheral

Re: I want to try something for freedom.

2000-11-01 Thread Patrick Maheral
On Wed, 1 Nov 2000, Alexander Hvostov wrote: Penguin, Because the patents and IP on your radio expired a long time ago. The ones on the algorithms haven't. :) Regards, Isn't there a provision in American (or Canadian) law that allows reverse engineering (not disassembling code) for

Re: I want to try something for freedom.

2000-11-01 Thread Patrick Maheral
On Wed, 1 Nov 2000, Alexander Hvostov wrote: Penguin, Because the patents and IP on your radio expired a long time ago. The ones on the algorithms haven't. :) Regards, Isn't there a provision in American (or Canadian) law that allows reverse engineering (not disassembling code) for