From what I've seen come into my box, it's too bad we can't use
spamcop-like tools to identify the source provider of the web sites in
emails.
Sina.com has been one of the main hosters of spam sites (in China) -
Since I'm in the US, and the bulk of the legitimate mail that comes into
my box is
[EMAIL PROTECTED] wrote: -
>If you have SMTP AUTH patched in your qmail, verify it's configured
>correctly. Try to connect using an invalid username/password
>combination and see if you can relay.
>I had a problem a year ago with a server I hadn't configured smtp
>auth properly and couldn
If you have SMTP AUTH patched in your qmail, verify it's configured
correctly. Try to connect using an invalid username/password
combination and see if you can relay.
I had a problem a year ago with a server I hadn't configured smtp auth
properly and couldn't explain why some guy in brazil was
Leonard Tulipan wrote:
Hi!
I just stumbled upon a peculiar problem. Most of the Worms are
silently rejected thanks to that code-portion, but...
We block most (if not all) executable attachements. So the Perl
Scanner part get's triggered, even before it's checked with the virus
scanner.
That way
Hi!
I just stumbled upon a peculiar problem. Most of the Worms are silently
rejected thanks to that code-portion, but...
We block most (if not all) executable attachements. So the Perl Scanner
part get's triggered, even before it's checked with the virus scanner.
That way people get notices, tha
Hi,
I am running a setup as suggested byJason's last paragraph, but using mysql
instead of ldap
QS only checks for viruses.
Once a mail made it past that point, the database is consulted for local
delivery instructions.
For normal users, this will be scripted delivery via SA into an imap mailbox