Resources on how to track spammers
These are two address I thought might be useful. This is a guide on tracking down real addresses in usenet faked posts. Once you find the real addresses or at least have a couple good guesses on what provider they use reply to their message and cc: it to the postmaster and technicle contact of all the ISP's you think it might be. They can use message ID's and logs to check where the message originated from. http://newdata.box.sk/neworder/harmless/GTMHH1-4.TXT this is the same for forged e-mail. http://newdata.box.sk/neworder/harmless/GTMHH1-5.TXT The reason I'm sending this is because of the fact that I almost never get spam. When I do I respond quickly and appropriately and the spam dies out. When I joined and then posted to this list I was flooded with mail. Personally I this has to be one of the stupided lists to spam. How many technical peopl that are interested in crypto are really gaing to respond to some of these stupid ads
How does a hardware encryption device work? Does it need human intervention to convert a plaintext to ciphertext or do we still give the instructions? Correct me if I'm wrong, the key escrow is a hardware encryption device. That's all for now, thanks. Bernie =============================================================================== You give the words you have spoken, it is not lended and are not taken back. It is like what The Corrs sung "...you're forgiven not forgotten...."
I tried to access the document but I only got an error message. Is it still online? The file.... GTMHH1-4.html is it 1 or l(letter). Thanks!! Bernie =============================================================================== You give the words you have spoken, it is not lended and are not taken back. It is like what The Corrs sung "...you're forgiven not forgotten...." bbt@mudspring.uplb.edu.ph bbt@peak-two.uplb.edu.ph metaphone@altavista.net
At 05:18 PM 03 08 98 +0800, Bernardo B. Terrado wrote:
I tried to access the document but I only got an error message.
Is it still online?
The file.... GTMHH1-4.html is it 1 or l(letter).
Is WHAT 1 or l(letter)? You didn't provide a Utterly Rancid Location that a trouble shooter could use to trouble shoot your difficulty. You must be a,,,,,, a,,,,,,, a,,,,,, a CypherPunk. Reeza!
participants (3)
-
Anonymous
-
Bernardo B. Terrado
-
Reeza!