spam and protection?


 
Thread Tools Search this Thread
Special Forums Cybersecurity spam and protection?
Prev   Next
# 1  
Old 10-31-2002
spam and protection?

Hello,

Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop.

But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown addresses they will bounce back to your email! what you will do in this case? how to protect your self.

i know you can prove its not you who spam to people from the headers and many other ways, but the question here isto protect your self from the 100s of bouncebacks !!
 
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Homework & Coursework Questions

Protection and special characters

I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me. Thanks in advance, Scopiop Input file Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies

2. Shell Programming and Scripting

Script protection against changes

Hi everyone, I´m trying to protect the scripts I have made from changes. At my office I´m the one who research improvements on daily tasks, and I´ve done many scripts, that I share with my partners.I´m tired because they take my scripts and make their owns with new features that don´t share... (4 Replies)
Discussion started by: dover07
4 Replies

3. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

4. Shell Programming and Scripting

Password protection in unix

How to create a file in UNIX which is password protected ? Thanks and Regards, Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies

5. Linux

file security/protection

Hi All I am working on a site to help newbie to learn linux for free. demo.freelinuxconsole.info there is only one file index.php its been able to rename or deleted. Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies

6. Filesystems, Disks and Memory

protection schemes

Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies

7. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies
Login or Register to Ask a Question
CLAWS-MAIL-SPAM-REPORT(1)				      General Commands Manual					 CLAWS-MAIL-SPAM-REPORT(1)

NAME
claws-mail-spam-report -- Mail notification using laptop's mail LED DESCRIPTION
This manual page documents briefly the claws-mail-spam-report This manual page was written for the Debian distribution because the original program does not have a manual page. claws-mail-spam-report is a plugin (loadable module) for the Claws Mail mailer. This plugin allows sending reports about received spam messages to online spam harvesters, in order to improve the shared databases of known spam. Support includes two sites: www.signal-spam.fr and www.spamcop.net, and also the Debian lists spam nomination system (http://lists.debian.org/archive-spam-removals/review/). USAGE
Before using a plugin you must instruct Claws Mail to load it on startup. For this you must go ``Configuration'' menu on main window toolbar, open ``Plugins...'' dialog, click on the ``Load plugin...'' button and select the plugin file, named spam_report.so, and press the ``Open'' button. SEE ALSO
claws-mail (1), claws-mail-extra-plugins (1). AUTHOR
claws-mail-spam-report was written by Colin Leroy colin@colino.net This manual page was written by Ricardo Mones mones@debian.org for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 any later version published by the Free Software Foundation. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL. CLAWS-MAIL-SPAM-REPORT(1)