All the stuff on my list is either honnypot accounts or people
impersonating my domains or other trickery. So they can't get around it
by sending good messages because they get listed by who that sent the
messages too. None of those listed are processed by Spamassassin. So if
there's any good
Marc,
First, you should make a design decision up front... Are you going to allow IP
addresses of valid hotmail and yahoo DNS servers (for example) which spew out a
very high percentage of spams (especially nigeria scams) on your list, or not?
Personally, I think that it is better to NOT try
Rob McEwen (PowerView Systems) wrote:
Marc,
First, you should make a design decision up front... Are you going to allow IP
addresses of valid hotmail and yahoo DNS servers (for example) which spew out a
very high percentage of spams (especially nigeria scams) on your list, or not?
The
From: Marc Perkel [EMAIL PROTECTED]
Rob McEwen (PowerView Systems) wrote:
Marc,
First, you should make a design decision up front... Are you going to allow IP
addresses of valid hotmail and yahoo DNS servers (for example) which spew out a very
high percentage of spams (especially nigeria
jdow wrote:
From: Marc Perkel [EMAIL PROTECTED]
Rob McEwen (PowerView Systems) wrote:
Marc,
First, you should make a design decision up front... Are you going
to allow IP addresses of valid hotmail and yahoo DNS servers (for
example) which spew out a very high percentage of spams
...
Here's what I'm trying. I'm using MyDNS but added a few fields.
Basically I'm createing a white list and a black list. The while list
merely prevents an IP from getting on the black list. An IP gets on the
whitelist for 12 hours and on the blacklist for 4 hours. The idea being
to prevent
From: List Mail User [EMAIL PROTECTED]
All of this would use up 6 bits and still leave 17 for any other
purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126).
Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2
through 127.255.255.254?
{o.o}
...
From: List Mail User [EMAIL PROTECTED]
All of this would use up 6 bits and still leave 17 for any other
purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126).
Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2
through 127.255.255.254?
{o.o}
No
From: List Mail User [EMAIL PROTECTED]
...
From: List Mail User [EMAIL PROTECTED]
All of this would use up 6 bits and still leave 17 for any other
purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126).
Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2
Paul,
I've always thought of you as chief scientist among everyone on the spam
assassin list... I've seen you dissect the inner mysterious workings of a
spam like no other... uncovering the spammer's tracks like a superhero FBI
agent meticulously piecing together data from the forensics lab.
...
From: List Mail User [EMAIL PROTECTED]
...
From: List Mail User [EMAIL PROTECTED]
All of this would use up 6 bits and still leave 17 for any other
purposes you have in mind (assuming codes from 127.0.0.2 to 127.0.0.126).
Uses up 6 of the 7 bits in that range, Paul. Did you mean 127.0.0.2
...
Paul,
I've always thought of you as chief scientist among everyone on the spam
assassin list... I've seen you dissect the inner mysterious workings of a
spam like no other... uncovering the spammer's tracks like a superhero FBI
agent meticulously piecing together data from the forensics lab.
12 matches
Mail list logo