Apropos to spam techniques, today's NYT had a fascinating article on how spammers are 
now using P2P techniques to manage their hijacked computers instead of controlling 
them from a central source, making it next to impossible to ever totally wipe out a 
plague:

  <http://www.nytimes.com/2003/12/08/technology/08trojan.html>

I second comment about Bill's writeup being the best thing out there I've seen, 
especially from the point of view of the innocent victims.    You should add a 
subtitle:  "or ... When bad things happen to good people".


At 10:09 AM -0500 12/8/03, Clement Ross wrote:
>On Sun, 2003-12-07 at 15:03, Bill Cole wrote:
>> I have a section in my blacklist document at
>> http://www.scconsult.com/bill/dnsblhelp.html#3-19
>
>Man! This is the most comprehensive document on SPAM fighting I have
>ever seen!
>
>Great job there.
>
>Clem.


#############################################################
This message is sent to you because you are subscribed to
  the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to  <[EMAIL PROTECTED]>

Reply via email to