[EMAIL PROTECTED] wrote:
If port 25 were blocked from consumers and they were forced to talk to servers on port 587, even without authentication, then a server could distinguish consumers from other servers. I think this kind of configuration could be used to help isolate virus infected computers from spamming and spreading.
What would prevent virus infected computers from using the port 587 of that would be the common usage?