[Mimedefang] Spammers who won't take no for an answer
Kevin A. McGrail
kmcgrail at pccc.com
Mon Oct 20 22:53:51 EDT 2003
Just an FYI before someone actually does this, it *IS* a crime in the US.
Though in spirit, I'm with ya ;-)
See USC Title 18, Sec 1030 (Fraud and related activity in connection with
computers) or in particularly, my state, Virginia also makes it a crime in §
18.2-152.4.
And the Virginia law is definitely NOT vague:
"A. It shall be unlawful for any person to use a computer or computer
network without authority and with the intent to:
1. Temporarily or permanently remove, halt, or otherwise disable any
computer data, computer programs, or computer software from a computer or
computer network; "
Regards,
KAM
> >Is anyone seeing a new trend (maybe a new ratware package?) I'm seeing
> >spammers repeatedly retry the same message, even after a 5xx failure
code.
> >
> >
> <snipped>
>
> Yeah I've seen the same sort of thing here.
> What would be great is if you could integrate the excellent tool
> 'smbdie' into mimedefang / canit, and blue-screen the computers of
> repeat offenders.
> You can use smbclient -L <ipaddress> to get the host name, then feed
> this, and the ip address into smbdie.
> That's what I used to do before it all became too much and we purchased
> CanIt. But a combination approach would be ideal :)
> Maybe I should get serious about learning some Perl...
>
> --
> Daniel Kasak
> IT Developer
> * NUS Consulting Group*
> Level 5, 77 Pacific Highway
> North Sydney, NSW, Australia 2060
> T: (+61) 2 9922-7676 / F: (+61) 2 9922 7989
> email: dkasak at nusconsulting.com.au
> website: http://www.nusconsulting.com.au
>
> _______________________________________________
> MIMEDefang mailing list
> MIMEDefang at lists.roaringpenguin.com
> http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
>
More information about the MIMEDefang
mailing list