lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <s0e2cb8f.042@mail.smuht.nwest.nhs.uk>
From: Marek.Isalski at smuht.nwest.nhs.uk (Marek Isalski)
Subject: Gmail and Google, and Spam (was: blah blah Gmail account)

I love the way that Google tells you who bagged that invite...

And I love the way that the web archives of Full Disclosure, some of which convert http:// urls into <a hrefs> will link to the same page.

But I find it slightly funny the way that spammers will pick up that email address.

Hope Google's spamfilters are good for "mpostle's" sake. :-(


On a side note, I went through a load of cryptographically generated email addresses (encoding date/time and IP address used to pick it up) that were hosted on a public website.  Turns out that at least one spammer got an email address from the Google Cache (the IP encoded in the address was one of the googlebots').  I was slightly surprised!


Marek

>>> Sandeep Sengupta <iamssg@...oo.com> 30/06/2004 13:14:19 >>>
http://gmail.google.com/gmail/a-970ef743f-bb7a5a0af4 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ