Kevin A. McGrail wrote:
Great idea but unfeasible. In Virginia, this would be considered malicious
programming and probably computer trespass as well :-(
I used to live in Virginia and I don't miss that place. I cringe even
when I have to drive through it :)
Only place I know that you c
On Aug 27, 5:47am, [EMAIL PROTECTED] wrote:
} [EMAIL PROTECTED] wrote on 04/06/2006 10:45:39
} AM:
}
} > Not that I would necessarily condone this type of activity, but with the
} > amount of spam/spyware/adware/phishing attempts I see in a day, wouldn't
} > be a really interesting project to do
Mark Johnson wrote:
usernames and passwords to these sites. If enough people
participated, the data collected by the phishers would be so bad,
noone would ever buy it. Noone could possibly verify every entry,
either.
I think this is an excellent idea.
That would work until the phishers star
Great idea but unfeasible. In Virginia, this would be considered malicious
programming and probably computer trespass as well :-(
> > create a network of computers like SETI, where nice home users run a
> > program on their computer that will take idle cycles and put false
> > usernames and passw
Mark Johnson wrote:
> create a network of computers like SETI, where nice home users run a
> program on their computer that will take idle cycles and put false
> usernames and passwords to these sites. If enough people
> participated, the data collected by the phishers would be so bad,
> noone wou
Philip Prindeville wrote:
> Anyone else have any comments about the example or the strategy?
Very nice.
--
Matthew.van.Eerde (at) hbinc.com 805.964.4554 x902
Hispanic Business Inc./HireDiversity.com Software Engineer
___
NOTE: If t
Steffen Kaiser wrote:
>You match the TLD agains $ccpat.
>
>BTW: I don't remember where, but there is perl FAQ with entry like "how
>can I check if a value is part of an ARRAY?", the answer is like "if you
>need to ask this, you certainly have used the wrong data structure and
>should use an HAS
To answer Josephs question about localhost, I was connecting to the
machine from my laptop and the reverse DNS is where sendmail was getting
the name (not telneting from the server itself).
I have resolved the issue (one of the two changes I made has fixed it,
but I haven't isolated which yet an
Steffen Kaiser wrote:
>On Wed, 5 Apr 2006, Philip Prindeville wrote:
>
>
>
>>I added a new example to the Wiki that people can download and paste
>>in if they wish:
>>
>>http://www.mimedefang.org/kwiki/index.cgi?PhilipsWorkingFilter
>>
>>Any comments are appreciated.
>>
>>
>
>:-) You ban the
You'd probably be taking out (somewhat) innocent third parties. Most of
the phishing web sites are on legit servers that have been compromised. I
guess you could argue that they deserve it for not securing their servers,
but I doubt the owner would feel that way when their business just dies
--On Thursday, April 6, 2006 7:17 -0700 Doug Hubbard <[EMAIL PROTECTED]>
wrote:
220 ESMTP
HELO localhost
250 smtp.trackmaster.com Hello doughomelaptop.trackmaster.com [10.8.0.6]
(may be forged), pleased to meet you
MAIL FROM:
250 2.1.0 ...
Sender ok
RCPT TO:
LONG DELAY HERE
250 2.
[EMAIL PROTECTED] wrote on 04/06/2006 10:45:39
AM:
> Not that I would necessarily condone this type of activity, but with the
> amount of spam/spyware/adware/phishing attempts I see in a day, wouldn't
> be a really interesting project to do something like this? Set up a
> database somewhere
This is WY off-topic, but I was wondering what others opinions were
of this. I sat in on a security lecture given by a very reputable
speaker. Every aspect of security was touched upon, but the rising
issue of phishing really caught my attention. I could never figure out
why people would
Folks,
I need some help if you can provide it (at least pointing me in a
direction).
Here is my issue.
I have an SMTP server that is hanging up for long periods of time on
smtp transactions. The lag occurs when the server gets the RCPT TO: command
Here is an example from a telnet session
220
TITLE:
ClamAV Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA19534
VERIFY ADVISORY:
http://secunia.com/advisories/19534/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
From remote
SOFTWARE:
Clam AntiVirus (clamav) 0.x
http://secunia.com/product/2538/
DESCRIPTION:
Some vulne
On Thu, 6 Apr 2006, [EMAIL PROTECTED] wrote:
Steffen Kaiser wrote:
BTW: I don't remember where, but there is perl FAQ with entry like
"how can I check if a value is part of an ARRAY?", the answer is like
"if you need to ask this, you certainly have used the wrong data
structure and should use a
Steffen Kaiser wrote:
> BTW: I don't remember where, but there is perl FAQ with entry like
> "how can I check if a value is part of an ARRAY?", the answer is like
> "if you need to ask this, you certainly have used the wrong data
> structure and should use an HASH. Otherwise use foreach()".
> I'd s
On Wed, 5 Apr 2006, Philip Prindeville wrote:
I added a new example to the Wiki that people can download and paste
in if they wish:
http://www.mimedefang.org/kwiki/index.cgi?PhilipsWorkingFilter
Any comments are appreciated.
:-) You ban the .eu TLD (European Union) even before the registrati
18 matches
Mail list logo