Marian,

        For these stock scams, bayes is your friend; Parsing it locally I get

Content analysis details:   (3.2 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 0.1 MISSING_HEADERS        Missing To: header
 1.9 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                            [score: 1.0000]
 1.2 MISSING_SUBJECT        Missing Subject: header

        Which still isn't enough to trigger, but the message has the email
address of"stox0033@  yahoo.com",  which someone (I forget who) pointed out
earlier this week or last that they were seeing all stock scams with email
of the form "[EMAIL PROTECTED]".  Bayes training together with a rule for that
email pattern in the body, you should catch them -- They key for me is that
the stock scams seldom have enough header points to "autolearn" for bayes
and must be hand trained;  Still they all have so many common tokens, that
the BAYES_99 I see is quite different than the BAYES_OO you see.  Also,
quite a few people have mentioned that they have increased the score for
BAYES_99; I use the stock install myself with only a set of custom URI rules.

A good regexp for the email would probably be something like STOX_YAHOO \
[EMAIL PROTECTED] and a point count of only 1.8 or 1.9  would cause a trigger.
Note: This clearly would/should be a temporary rule as it is unlikely the
spammer would be so dumb as to continue the pattern.  Also, I think Rules du
Jour and SARE have some stock rules which I don't use that would catch these
even better. (I'm sure someone else on the this list knows better than me.)

        Good luck,

        Paul Shupak
        [EMAIL PROTECTED]

P.S.  I didn't check the validity of the email as I usually do, but if valid,
mail to Yahoo! with a copy of the spam will cause the account to be revoked,

Reply via email to