Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: IBM to offer service to bounce unwanted e-mail back to the computersthat sent them

  • From: Vicky Rode
  • Date: Tue Mar 22 14:55:59 2005

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Why even bother responding. Just imagine frontbridge (using them an
example, I have no affiliation with them) responding to each and every
spam they block..something like 7 terrabytes of data per week or so. I
guess this is one way to justify for more bandwidth :-)


regards,
/virendra

Colin Johnston wrote:
| The better idea would be fingerprint the spam to match the bot used to
match
| the exploit used to run the bot to then reverse exploit back to the
| exploited machine patching in the process.
| I managed to setup such a system a while ago with nimda traffic however I
| could not a find a software tool which exploited a nimda exploited machine
| which could then patch it and remove the virus
| (Ie a remote doctor without you knowing :)
|
| Colin Johnston
|
|
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W
KHZwd5enWFB+mTp5kkJaEyw=
=ZtDG
-----END PGP SIGNATURE-----




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.