If "the spammer's server logs will contain entries that can be used to verify that the address is valid and that the mail was opened"--they can be traced, right? To the spammer's server logs. So does the spammer--lurking behind hidden spaces--have a way to access those logs in the server that cannot be traced?
The general idea is "if I know a machine's been compromised, then I can watch for and catch the person responsible." If the spammer is careful that's not so easy. And once you know who it is, then you have the problem of coming up with proof "beyond a reasonable doubt." Of course, vigilante action doesn't require the same standard of proof, but it has its own drawbacks that are fairly well-known.
Mike Beede
-- The iMac List is sponsored by <http://lowendmac.com/> and...
Small Dog Electronics http://www.smalldog.com | Refurbished Drives | - Epson Stylus Color 580 Printers - new at $69 | & CDRWs on Sale! |
Support Low End Mac <http://lowendmac.com/lists/support.html>
iMac List info: <http://lowendmac.com/imac/list.shtml> --> AOL users, remove "mailto:" Send list messages to: <mailto:[EMAIL PROTECTED]> To unsubscribe, email: <mailto:[EMAIL PROTECTED]> For digest mode, email: <mailto:[EMAIL PROTECTED]> Subscription questions: <mailto:[EMAIL PROTECTED]> Archive: <http://www.mail-archive.com/imac-list%40mail.maclaunch.com/>
---------------------------------------------------------------
The Think Different Store
http://www.ThinkDifferentStore.com ---------------------------------------------------------------
