North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Clueless anti-virus products/vendors (was Re: Sober)
- From: Suresh Ramasubramanian
- Date: Sat Dec 03 03:28:18 2005
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=oA8Qoi2gbI/AuSA4MhnD4NGMOZyqj6n13ia6tNbtAKweaFZ5+hxSeIau7Oqi1OwTr75OqHvLUGVaxTlpdNHsnKBdAnzibaPmuxLNKbh4QHyP24GncK49z5KTjar//z2OTTfi6lh26A+8xHgEfL8h+TtorfETVbd7zWGMCFHD+ao=
On 12/3/05, Daniel Senie <email@example.com> wrote:
> Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
> This means you, Barricuda Networks, more than anyone else, but we
> also see this annoyance from Symantec devices, and from some AOL
> systems as well.
The worst offenders that I see -
Symantec devices, as you say
Comparatively little from Barracudas.
And some large carriers / ISPs who send bounces / virus notifications
back with (for example) notexist@[isp] as the return path instead of