[Mimedefang] Spammers who won't take no for an answer

Kevin A. McGrail kmcgrail at pccc.com
Mon Oct 20 22:53:51 EDT 2003


Just an FYI before someone actually does this, it *IS* a crime in the US.

Though in spirit, I'm with ya ;-)

See USC Title 18, Sec 1030 (Fraud and related activity in connection with
computers) or in particularly, my state, Virginia also makes it a crime in §
18.2-152.4.

And the Virginia law is definitely NOT vague:

"A. It shall be unlawful for any person to use a computer or computer
network without authority and with the intent to:

1. Temporarily or permanently remove, halt, or otherwise disable any
computer data, computer programs, or computer software from a computer or
computer network; "

Regards,
KAM



> >Is anyone seeing a new trend (maybe a new ratware package?)  I'm seeing
> >spammers repeatedly retry the same message, even after a 5xx failure
code.
> >
> >
> <snipped>
>
> Yeah I've seen the same sort of thing here.
> What would be great is if you could integrate the excellent tool
> 'smbdie' into mimedefang / canit, and blue-screen the computers of
> repeat offenders.
> You can use smbclient -L <ipaddress> to get the host name, then feed
> this, and the ip address into smbdie.
> That's what I used to do before it all became too much and we purchased
> CanIt. But a combination approach would be ideal :)
> Maybe I should get serious about learning some Perl...
>
> -- 
> Daniel Kasak
> IT Developer
> * NUS Consulting Group*
> Level 5, 77 Pacific Highway
> North Sydney, NSW, Australia 2060
> T: (+61) 2 9922-7676 / F: (+61) 2 9922 7989
> email: dkasak at nusconsulting.com.au
> website: http://www.nusconsulting.com.au
>
> _______________________________________________
> MIMEDefang mailing list
> MIMEDefang at lists.roaringpenguin.com
> http://lists.roaringpenguin.com/mailman/listinfo/mimedefang
>



More information about the MIMEDefang mailing list