On Tue, 2009-03-03 at 15:16 -0800, John Hardin wrote:
> On Tue, 3 Mar 2009, Luis Daniel Lucio Quiroz wrote:
> 
> > I'm focusing into mail attachment, those nothing-better-to-do users that 
> > sends images to his friends using their corporate email.
> 
> Ah, corporate policy enforcement.
> 
> I wouldn't worry so much about trying to intelligently identify images to 
> filter out porn. If you have a user who is abusing the system that way 
> they should be easy to identify through other means.

Yeah, agreed. Moreover, SA typically is best run on the receiving end.
The abusive user is the sender...


-- 
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to