Here is an interesting approach. Could spamd be use here?

I was suggested that may be I fight to much spamer and that I got reposted to this. Well very possible.

I got a suggested that may be trapitting the connections might help.

Hmmm. Could this be done. Obviously not want to delay connections to web server, or you loose everyone. No question there. So, regular trapit can't be use.

But what about the reverse idea of spamd.

white list everything and trapit some based on this feature here:

spamdb -T -a "<[EMAIL PROTECTED]>"

But instead of the email address use a URL like

spamdb -T -a "<http://www.mydomain.org/do_not_look_here.html>"

or better yet:

spamdb -T -a "<http://www.mydomain.org/do_not_look_here.php?ID=100>"

where the ID need to match and then you trap the source.

Now, I don't know if that's a good idea or not and I am curious to some feedback on the idea, but in this case for example, were I assume this is from a web bot operation, that would stop it some how, or slow it.

Now what I don't know if if that's from malware for example and obviously control from else where. I don't know, but I assume that may be the remote control allow to establish only one connection to a to be kill victim sort of and that malware can't do two connections to different locations at once. I don't know if that's the case really.

But if that's the case, then if it is possible to trapit the source, woudln't it be in effect stopping that web bot network somehow?

Meaning, may be it will not stop it to me, but that same web bot couldn't be use on someone else making it useless in effect and by doing so, would then force this guilty party to go else where or they loose the force of their own web bot?

So, spamd allowing all white list and trap selective web bot to specific URL makin them useless.

What do you think?

Very stupid, impossible, useless, bad idea, or is that possible and may have the effect intended here?

Best.

Daniel

Reply via email to