Apropos to spam techniques, today's NYT had a fascinating article on how spammers are now using P2P techniques to manage their hijacked computers instead of controlling them from a central source, making it next to impossible to ever totally wipe out a plague:
<http://www.nytimes.com/2003/12/08/technology/08trojan.html> I second comment about Bill's writeup being the best thing out there I've seen, especially from the point of view of the innocent victims. You should add a subtitle: "or ... When bad things happen to good people". At 10:09 AM -0500 12/8/03, Clement Ross wrote: >On Sun, 2003-12-07 at 15:03, Bill Cole wrote: >> I have a section in my blacklist document at >> http://www.scconsult.com/bill/dnsblhelp.html#3-19 > >Man! This is the most comprehensive document on SPAM fighting I have >ever seen! > >Great job there. > >Clem. ############################################################# This message is sent to you because you are subscribed to the mailing list <[EMAIL PROTECTED]>. To unsubscribe, E-mail to: <[EMAIL PROTECTED]> To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]> To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]> Send administrative queries to <[EMAIL PROTECTED]>
