While I've taken an aggressive approach to SPAM in the past as
well (mailbombs), I've never went as far as you claim to have
done, but I do know one thing... It was a waste of MY time to do
so. Many people said just delete them and ignore, but it is JUST
SO DAMNED HARD to do that when someone is pissing you off.
I've only done it once, and that was because I was on his list 5 times so I
kept getting 5 copies of his spam, and the fact that despite my efforts he
wouldn't take me off. He'd use different mail accounts as they were shut
down, but still keep the same contact name and number.
Human nature has a vengeful aspect with regards to stuff like
SPAM, and we need to feel like we've got our justice.
Mailbombing however can be filtered against, and it can also land
you in court after trashing an ISP's mailserver (an innocent
party). It also wastes MORE bandwidth than the spammer in the
first place...
I find that if you're on a large bandwidth connection (such as a university)
in the evening, sending copies of quake 3 test putting their e-mail address
in the cc box 6 or 7 times is good, unless they hit reply just to piss you
off.
Read RFC822 which tells how SMTP works. It describes all of the
mail headers, and their intended purpose. You can then trace the
mail to the entry point on the net (in about 10 seconds), and
then can lookup who manages those computers, and email their
abuse and postmaster accounts. You usually get back a polite
letter, or an autoresponse, but often I get back personal
response saying that they have removed the offending account.
Good advice.
Even if the ISP is lying - which I doubt, I feel much better
knowing that I might have been responsible for them getting the
boot. And, the good thing is, it usually only takes me about
30-45 seconds to do the work. ;o)
the problem is when they mail you from different accounts using the same
list. It's much more difficult if they lose all their data, and you change
the passwords of their mail accounts that have the list details on it (at
last, a use for a trojan!)
Well, I agree with that as well, it will not stop them from doing
it, and it leaves you in a potential legal situation as
well. You must be very careful doing such deeds as this so that
you don't end up caught yourself. I'll bet that your hacking
efforts do however give a great sense of personal "I got you you
son of a bitch" satisfaction though. ;o) Heheh.
Yep, but I wouldn't do it again, as it took up too much of my time, and it's
not worth wasting on these people - much :)
Since you sound like you know enough about the email system
allready, why not try the approach I just suggested? If that
isn't your cup of tea though, it sure would be interesting to see
some screen shots of joe spammers hard drive disappearing via
remote... ;o)
When I formatted his c drive, I lost the connection almost immediately, it
got to 3% though! I think I caught it during some idle cpu cycles.
Just be sure to post any such screenshots via a fake email to
cover your butt. ;o) (and not to the list)
Steve
_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list