ps: does anyone knows, how to trick amavisd to pass encrypted
(zip) archives?
Yep, there is a little bit of a dirty hack for amavisd-new.
--snip
Update your amavisd-new:
Patch: amavisd-new-20030616-p7
- do_unzip and do_unrar: retain an archive if any of its components is
password
in the last 1-2 years (which i'm using spamcop) i never had a
single complaint from a customer.
Are you really sure your customers have received all mails from GMX? They have been in
the spamcop-blacklist twice in the last year...
--
Kind regards,
Roman Hochuli
CCNP, CQS Cable
GPS-Technik
Warning: This is a very long email about DNSBLs.
On Thu, Mar 04, 2004 at 02:47:21AM +0100, Steven Glogger wrote:
hi andy
Unless you are implying too unstable FOR ME, then I disagree:
there are plenty of well-managed, sensible DNSBLs in existence.
Sorting them from the insane ones can be
bad boys :-) today in Zürichsee-Zeitung: ein fehler sprach hacker an - [...]
unglücklicherweise hat sich dabei ein fehler eingeschlichen: IP-adressen von
anwendern, die den test durchgeführt hatten, konnten eingesehen werden. unter
servicdeprovidern wurde dieses manko in der nacht auf mittwoch