On Wed, 2008-07-30 at 09:21 -0500, Ken A wrote:

> Yes. And also, in any war, consider resource usage.
> A simple example: Spammer at any given time may have access to a number 
> of DNSRBL listed bots, and a number of unlisted bots. With an 
> understanding of how ISP handles filtering based on a given DNSRBL, 
> spammer may choose a certain delivery pattern.

Oh, so THAT is, why botnets check RBLs and prevent sending out massive
amounts of spam from RBL listed zombies, like Spamhaus XPL and PBL.
Right, I don't get any of these...  </sarcasm>

So spammers are checking RBLs, eh? Reality seems to be more like sending
anyway, in the hope some of them get through.

  guenther


-- 
char *t="[EMAIL PROTECTED]";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to