Henrik K wrote:
sure there's other useful stuff you can do with spamtrap mails too.

Unfortunately it takes a lot of effort to create *good* spamtraps.

Yep.

It's just
too much trouble for a normal admin, I leave it to those who have time on
their hands. You can do the simple grep for "mistyped" non-existant
addresses from logs etc, but it's just silly botnet crud that doesn't
represent the "real" spam coming to real users (that leak their addresses in
all sort of ways).

This is exactly what I have a problem with: while lots of spam is directed at my regular users, I get very little spam caught in my spamtraps.

I have published spamtrap addresses (in "hidden" HTML of course, like "mailto:address"; in the same color as background of the page) on many company webpages, posted spamtraps to Usenet some 6 months ago and I still get very little spam caught in spamtraps.

I have a haunting suspicion that email correspondents of my users have trojans or smth in their Outlooks, which then leak the addresses to spammers. Either that, or spammers get addresses some other way. Getting my spamtrap addresses into spammers address lists has been a problem for me.

Any other ideas on how to do that?

I don't see any point Bayes-learning simple-to-block
botnet mails either, since it's completely separate thing from the sneakier
419 and phish stuff..

What's "419" stuff?

Regards,
Marcin Krol

Reply via email to