-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Kenneth Porter writes: > Every time I see a spam story on SlashDot I think how the SlashDot effect > could be used for good by getting everyone to visit the spammer's site and > take it to its knees, while driving up the spammer's bandwidth bill. Check > out the first few posts in today's story: > > <http://it.slashdot.org/article.pl?sid=04/09/22/1355238> > > It makes me wonder if there's some way to grab a random link from SURBL to > consume a spammer's bandwidth allocation. It *could* work, in my opinion. First, you would have to establish that (a) the spammer him/herself is paying for the site's hosting (ie. that the site isn't a proxy, a compromised machine, etc.). This could be determined by working out what network it's on -- if it's a known spammer-infested hosting network, like some parts of Chinanet, you could make that assumption. Secondly, you should be sure not to hit advertising click-throughs! Thirdly, you would have to manually verify that the site is not a "false positive". Finally, I would suggest that bombarding their purchasing forms with valid-looking purchase data, might work better. - --j. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Exmh CVS iD8DBQFBUxBqQTcbUG5Y7woRApRMAKDm2+3iSoqo1B6mwM5L6po2dhraIQCghQ8L aL+X0VH7QMKpP0SiN/lHsWU= =pngp -----END PGP SIGNATURE-----