Alternatively, if I really want to keep a copy of the mail but make it look like it bounced, I leave the real account active and saving mail to a mailbox, but I also make it reflect the mail to either "closed" or "full". The sender gets a closed or full message - I get to keep a copy of the mail.

Someone who knows what they are doing will see fishy looking bounces from these tricks, but most idiots don't know what they are doing. ;->
Ah, but would this technique stand much of a chance of working when it comes to spammers? Although reflected back, the mail has indeed been accepted for delivery (only way it can be reflected, no?). If the spammer happens to be culling his e-mail list for "real" addresses (ha ha), does he/she not concentrate on the initial connection?

Put another way, I thought that the only way a bounce would potentially have an affect on a monitored sending server is if the connection is rejected without any acceptance at all. I'm skeptical that these mail programs we hear about with anti-spam features to "send back bounce messages" have any effect at all. As far as a spammer is concerned, the message was accepted long before any such bounce message is created, no?

For your run-of-the-mill idiots, I can indeed see how it would be fun to mess with. (I won't write the paragraph about where spammers fit in here).


Stefan Jeglinski


#############################################################
This message is sent to you because you are subscribed to
the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to <[EMAIL PROTECTED]>

Reply via email to