time
through.
The most obvious explanation, which I should've raised the first time, is
that these entries get added to the BL databases during the intervening 6-8
hours. If so, this understanding will be very helpful.
Can anyone weigh in?
Thanks again!
On Tue, Aug 14, 2012 at 12:07 AM, Ji
06 AM, Jim Schueler wrote:
Upon Kevin's recommendation, I upgraded. Big difference.
'Though there's a bit of a retuning penalty.
Woohoo, I was right! All I did was flip a coin, though ;-)
I get quite a few authorize.net notifications on behalf of
various ec
Upon Kevin's recommendation, I upgraded. Big difference. 'Though there's
a bit of a retuning penalty.
I get quite a few authorize.net notifications on behalf of various
ecommerce clients, and this morning I started seeing scam/spam similar to
the attached. All share a common marker of embedding
On Tue, Aug 14, 2012 at 12:07 AM, Jim Schueler wrote:
> The attached contains two files:
> spamtoday.msg came out of a filter in my mail stream
> spamtoday.out is spamtoday.msg piped through 'spamassassin -t'
>
> This problem occurs very intermittently. Out of 300 da
wrote
> Jim Schueler wrote on Monday, June 13, 2005 1138
>
> > I should have been more specific in my original request. The stock rule
to
> > detect HELO forgery is exactly what I'm looking for.
>
> Am new to SA so I don't know how these tests really work
I should have been more specific in my original request. The stock rule to
detect HELO forgery is exactly what I'm looking for.
-Jim
On Mon, 13 Jun 2005 13:53:40 -0400, Steven Dickenson wrote
> Jim Schueler wrote:
> > My users have been getting particularly insidious email
My users have been getting particularly insidious emails containing a
windows virus that purports to come from the system administrator.
One email header contains the following entry:
Received: from motorcityinteractive.com
(pcp09017048pcs.watrfd01.mi.comcast.net [69.244.154.112])