lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050208184710.64204.qmail@web53501.mail.yahoo.com>
From: modperlpants at yahoo.com (J b)
Subject: Re: mailman email harvester

Take a look at the date of that report. That it's from almost TWO
YEARS ago! The spammer/anti-spammer arms race began a long time ago,
and will only get worse.

I've seen numerous harvesters with randomized User-Agent strings
crawling a mail archive of mine, even though all output is filtered
through Apache::AntiSpam. They are NOT stopped by simple, obvious
regexps. Obfuscation is trivially easy to identify and defeat.

-----Original Message-----
From: Dave Korn [davek_throwaway@...mail.com] 
Sent: Tuesday, February 08, 2005 9:53 AM
To: full-disclosure@...ts.netsys.com
Cc: mailman-developers@...hon.org; bugtraq@...urityfocus.com
Subject: [Full-Disclosure] Re: mailman email harvester

  Yes, but no spammers actually do so.  For experimental proof of
this
claim,

http://www.cdt.org/speech/spam/030319spamreport.shtml


		
__________________________________ 
Do you Yahoo!? 
Take Yahoo! Mail with you! Get it on your mobile phone. 
http://mobile.yahoo.com/maildemo 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ