On 17 Sep 00 12:20:57 EST, Will Baldwin wrote: > Eko, I haven't done anything about this yet. I am a > member of your DOSInet webring. I just don't understand > why I have to sign up for anything just to be a member of > a webring. I am trying to avoid any spamming. Before I > sign up for the Yahoo ID, I'll want to examine their > privacy statement, to make sure they don't sell my email > addy to any spammers. So far there's no spam related to Yahoo! (the company), yet. Besides, you only need a Yahoo! ID if you want to change anything in your WebRing listing (URL, site description, etc.). Actually, privacy statements doesn't guarantee anything. But there's a simple way to identify who's cheating... If you have your own domain, you could use a specific email address for each subscription. For example, I could use either [EMAIL PROTECTED] or [EMAIL PROTECTED] for Yahoo!. Both addresses could be routed to my main email addy. So if there's any spam received from any of these specific addresses, I know who's cheating ;-) To stop further spamming, I could either redirect the sold address(es) to /dev/nul or back to the spammer's email address (the later is nasty, of course ;-). Altough I usually doesn't. Spams are processed by a script, which automagically do the needed trackings, send out "postmaster" and "abuse" complaints, submitting ORBs and MAPS RBL blacklists (in case of open relay), logged the spammer's addresses, and also add them to our Anti Spambot script's "spammer" database; which in turn will feeded them to any spambots kind enough to visit SurvPC website <g> (what you see at http://survpc.virtualave.net/spambot.html is just a sample, the actual pages are more spambot-friendly ;-) Don't tell any spammer I told you this, though. They might get freaked out, added me to their "extremist" database, and won't send me any spams anymore ;-) Alternatively -- if you don't have your own domain -- you could use any free email forwarding service to create such "watchdog" email addies. Among these are myownemail.com, bigfoot.com, and Yahoo!'s own mail.yahoo.com (the later commonly misused by spammers). If there's any cheater who sell your email address, all you have to do to avoid further spamming is closing the forwarding account. This effectively adding one more hard bounce address to the spammer's list, renders it slightly ineffective Just slightly, usually there are millions of email addresses on such list. For further info about spam fighting, there are some links at: http://survpc.virtualave.net/spambot.html See also alt.spam FAQ: http://www.mall-net.com/spamfaq.html BTW, if you think you get spammed after joined any of SurvPC services, please send some spam samples to <[EMAIL PROTECTED]> (abuse at survpc.net), complete with full headers, not just common headers like "From" or "Subject". For example: ----- Return-Path: <[EMAIL PROTECTED]> Received: (qmail 94640 invoked from network); 17 Sep 2000 23:08:56 -0000 Received: from unknown (HELO notes?s.shin-eidenki.co.jp) (210.255.111.59) by smtp.telkom.net with SMTP; 17 Sep 2000 23:08:56 -0000 Received: from davanet.com.uy ([209.138.135.139]) by notes_s.shin-eidenki.co.jp (Lotus Domino Build 166.1) with SMTP id 2000091803293305:2593; Mon, 18 Sep 2000 03:29:33 +0900 To: <Undisclosed Recipients> ----- Consult your mailer's help on how to display/copy 'n paste these full email headers. --Eko http://www.survpc.net/ - Older PC and DOS Internet http://survpc.virtualave.net/ (noframe) To unsubscribe from SURVPC send a message to [EMAIL PROTECTED] with unsubscribe SURVPC in the body of the message. Also, trim this footer from any quoted replies. More info can be found at; http://www.softcon.com/archives/SURVPC.html