North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: Wired mag article on spammers playing traceroute games with trojaned boxes
On Thu, Oct 09, 2003 at 05:20:10PM -0700, Margie Arbon wrote: > > --On Thursday, October 09, 2003 7:54 PM -0400 Susan Harris > <[email protected]> wrote: > > > > >Folks, let's move this discussion onto one of the many lists that > >focuses on spam: > > > > http://www.claws-and-paws.com/spam-l/spam-l.html -- spam-l list > >for spam prevention and discussion > > http://www.abuse.net/spamtools.html -- spam tools list for > >software tools that detect spam > > net.admin.net-abuse.email | net.admin.net-abuse.usenet -- usenet > >lists > > > > I am curious as to why open proxies, compromised hosts, trojans and > routing games are not considered operational issues simply because > the vehicle being discussed is spam. > > With all due respect, we have a *problem*. End user machines on > broadband connections are being misconfigured and/or compromised in > frightening numbers. These machines are being used for everything > from IRC flooder to spam engines, to DNS servers to massive DDoS > infrastructure. If the ability of a teenager to launch a gb/s DDoS, > or of someone DoSing mailservers off the internet with a trojan that > contains a spam engine is not operational, perhaps it's just me > that's confused. I think that in the case of spam, it is not some teenager, but rather adult, vicious, sociopathic criminals. They are not fooling around, folks. -- -=[L]=-
|