On 17 Sep 00 12:20:57 EST, Will Baldwin wrote:

> Eko, I haven't done anything about this yet.  I am a
> member of your DOSInet webring.  I just don't understand
> why I have to sign up for anything just to be a member of
> a webring.  I am trying to avoid any spamming.  Before I
> sign up for the Yahoo ID, I'll want to examine their
> privacy statement, to make sure they don't sell my email
> addy to any spammers.

So far there's no spam related to Yahoo! (the company), yet.
Besides, you only need a Yahoo! ID if you want to change
anything in your WebRing listing (URL, site description, etc.).

Actually, privacy statements doesn't guarantee anything.
But there's a simple way to identify who's cheating...

If you have your own domain, you could use a specific email
address for each subscription.  For example, I could use either
[EMAIL PROTECTED] or [EMAIL PROTECTED] for Yahoo!.
Both addresses could be routed to my main email addy.  So if
there's any spam received from any of these specific addresses,
I know who's cheating ;-)

To stop further spamming, I could either redirect the sold
address(es) to /dev/nul or back to the spammer's email address
(the later is nasty, of course ;-).  Altough I usually doesn't.
Spams are processed by a script, which automagically do the
needed trackings, send out "postmaster" and "abuse" complaints,
submitting ORBs and MAPS RBL blacklists (in case of open relay),
logged the spammer's addresses, and also add them to our Anti
Spambot script's "spammer" database; which in turn will feeded
them to any spambots kind enough to visit SurvPC website <g>
(what you see at http://survpc.virtualave.net/spambot.html is
just a sample, the actual pages are more spambot-friendly ;-)

Don't tell any spammer I told you this, though.  They might get
freaked out, added me to their "extremist" database, and won't
send me any spams anymore ;-)

Alternatively -- if you don't have your own domain -- you could
use any free email forwarding service to create such "watchdog"
email addies.  Among these are myownemail.com, bigfoot.com, and
Yahoo!'s own mail.yahoo.com (the later commonly misused by
spammers).  If there's any cheater who sell your email address,
all you have to do to avoid further spamming is closing the
forwarding account.  This effectively adding one more hard bounce
address to the spammer's list, renders it slightly ineffective
Just slightly, usually there are millions of email addresses on
such list.

For further info about spam fighting, there are some links at:

  http://survpc.virtualave.net/spambot.html

See also alt.spam FAQ:

  http://www.mall-net.com/spamfaq.html

BTW, if you think you get spammed after joined any of SurvPC
services, please send some spam samples to <[EMAIL PROTECTED]>
(abuse at survpc.net), complete with full headers, not just
common headers like "From" or "Subject".  For example:

  -----
  Return-Path: <[EMAIL PROTECTED]>
  Received: (qmail 94640 invoked from network); 17 Sep 2000
            23:08:56 -0000
  Received: from unknown (HELO notes?s.shin-eidenki.co.jp)
            (210.255.111.59) by smtp.telkom.net with SMTP;
            17 Sep 2000 23:08:56 -0000
  Received: from davanet.com.uy ([209.138.135.139])
            by notes_s.shin-eidenki.co.jp (Lotus Domino
            Build 166.1) with SMTP id 2000091803293305:2593;
            Mon, 18 Sep 2000 03:29:33 +0900
  To: <Undisclosed Recipients>
  -----

Consult your mailer's help on how to display/copy 'n paste
these full email headers.

--Eko
http://www.survpc.net/ - Older PC and DOS Internet
http://survpc.virtualave.net/ (noframe)

To unsubscribe from SURVPC send a message to [EMAIL PROTECTED] with 
unsubscribe SURVPC in the body of the message.
Also, trim this footer from any quoted replies.
More info can be found at;
http://www.softcon.com/archives/SURVPC.html

Reply via email to