North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: IBM to offer service to bounce unwanted e-mail back to the computersthat sent them

  • From: Vicky Rode
  • Date: Tue Mar 22 14:55:59 2005

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Why even bother responding. Just imagine frontbridge (using them an
example, I have no affiliation with them) responding to each and every
spam they block..something like 7 terrabytes of data per week or so. I
guess this is one way to justify for more bandwidth :-)


regards,
/virendra

Colin Johnston wrote:
| The better idea would be fingerprint the spam to match the bot used to
match
| the exploit used to run the bot to then reverse exploit back to the
| exploited machine patching in the process.
| I managed to setup such a system a while ago with nimda traffic however I
| could not a find a software tool which exploited a nimda exploited machine
| which could then patch it and remove the virus
| (Ie a remote doctor without you knowing :)
|
| Colin Johnston
|
|
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W
KHZwd5enWFB+mTp5kkJaEyw=
=ZtDG
-----END PGP SIGNATURE-----