On Tue, 2003-06-17 at 16:47, Joseph A Nagy Jr wrote:
> Bret Hughes wrote:
> <snip>
> > It is analogous to spending 30 minutes in a security line at an airport
> > and having to check your pocket knife because of the terrorist activity
> > in our current environment.  
> > 
> > Bret
> > 
> > 
> 
> Sorry, that's BS. Had those passengers eigher A) been more ballsy or B) 
> been allowed to have weapons, some fuck heads with BOX CUTTERS wouldn't 
> have been able to hijack a fucking plane.
> 
No argument there.

> Your analogy is also not quite correct. Instead of trying to kill 
> incoming spam (almsot impossible), ISP's NEED to focus on killing 
> INTERNAL spam. Spam also needs to become LESS profitable then it is, but 
> that'll never happen 'cause it is measurably effective.
> 
I figured that I was stretching the point a little bit but the main
theme holds true I believe.  There is inconvienince for some due to the
actions of a nefarious group of jerks working on their own agenda.

I also believe that a lot of isps do try an limit the amount of spam
emerging from their servers.  If that was not the case then spammers
would not need to use dynamic accounts for launching their attacks.

Looking through my spam folder to which  procmail sends all stuff tagged
by spamassassin I see a lot of stuff from various names but niether the
the originating machine or the first server if it did not go straight to
verio (my webhosting co) have nothing to  do with yahoo bigfoot or aol
even though return email address indicates that is where the user is. 

This leads me to believe that they are either using someone else's open
relay or sending direct and that is exactly what aol is trying to stop. 
The open relays get blacklisted sooner or later :) and aol is being
proactive in stopping the direct guys.

Is this horse dead yet?

Bret





-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to