[SEL] Re: <snip> Spam O.T.

Bill Dickerson bill at antique-engines.com
Sat Jan 20 07:12:52 PST 2007


Paul - I respectfully disagree - pond scum actually serves a useful purpose
in the natural order of the food chain.
Your comment actually brings pond scum down to their level, it's much more
important than that.

Bill


>
Hi Jerry (and List),
They would have found those internal addresses by checking the MX 
records for your main address. They're unlikely to have hacked your 
server - you can see them with the name server lookup tool 'nslookup' - 
here is what I got for cyberserv.co.za

# nslookup
 > set type=MX
 > cyberserv.co.za
Server:         203.12.35.50
Address:        203.12.35.50#53

Non-authoritative answer:
cyberserv.co.za mail exchanger = 10 taita.cyberserv.co.za.

Authoritative answers can be found from:
cyberserv.co.za nameserver = taita.cyberserv.co.za.
cyberserv.co.za nameserver = tahiti.cyberserv.co.za.
 >
#

MX are "Mail eXchanger" - it is how email actually finds its way from 
server to server - kinda like a street directory for the postman. All 
this information is public.

Spammers do this not because they want to get you three copies of 
everything, but because there are two kinds of spammer - there are 
address harvesters and spam transmitters. The harvesters get paid for 
each valid unique address they provide to the transmitters - so they 
cheat (after all they're pond scum) and provide several valid addresses 
that all point at you.

Regards
Paul
_______________________________________________
SEL mailing list
SEL at lists.stationary-engine.com
http://www.stationary-engine.com/mailman/listinfo/sel





More information about the sel mailing list