Thanks for the input Wayne! I'm now setup with the ordb.org. My mail
server makes that part easy. I've started building my own blacklist too.
Paul
-----Original Message-----
From: Wayne Cox [mailto:wmc20@...]
Sent: Friday, May 17, 2002 4:25 PM
To: vantage@yahoogroups.com
Subject: Re: [Vantage] Off topic SPAM
At 01:22 PM 5/17/2002 -0500, you wrote:
Well, just about every page on your web site has an email address. The
@#$% spammers run web robots, like the search engine places, that roam
about looking for published addresses on web pages to add to their
targets.
Those are probably aliases to other accounts there? If so, change them
all
to something else! Once an address is "poisoned" there's no way [yet] to
get them to quit sending garbage to it. Many people report getting spam
sent to addresses that have been inactive for over 5 years.
You can obfuscate MailTo: links on your web page by using ASCII
encoding. This thwarts most of the spam-bots. The
syntax xx; where xxx is the ASCII value of the character you
desire can be put into HTML to represent those unusual characters you
can't
easily type from your keyboard. But it works for any other characters,
too. Move all the email addresses on your web page to one "contacts"
page,
and encode them that way. You can punch up our web page
at: www.xxiii.com [yes, it's an incredibly sucky page!] and do a "view
source" for an example. I don't know the syntax right off, but there's a
"robots.txt" or something you can stick in the directory, or embed in the
page that will prevent most spam-bots from cataloging it also.
Once you've cleaned those up, set your SMTP server to use some of the
DNS-based reject lists that are available. At a
minimum: www.ordb.org catalogs servers [generally foreign] that allow
anyone to relay garbage via them (open relays.) If you want to get a
little more aggressive, do the same with www.spamcop.net I use both
here,
and it rejects 10 - 30 emails a day for the four of us, and has yet to
block a legit email. I also have a long list of static reject domains and
IPs. It includes top-level-domains for entire countries, like .jp .cn .kr
.co etc where I know no one, and won't be doing any business, but harbor
many abusable servers and many others.
Good Luck!
[Non-text portions of this message have been removed]
Yahoo! Groups Sponsor
ADVERTISEMENT
Useful links for the Yahoo!Groups Vantage Board are: ( Note: You must
have already linked your email address to a yahoo id to enable access. )
(1) To access the Files Section of our Yahoo!Group for Report Builder and
Crystal Reports and other 'goodies', please goto:
http://groups.yahoo.com/group/vantage/files/.
(2) To search through old msg's goto:
http://groups.yahoo.com/group/vantage/messages
(3) To view links to Vendors that provide Vantage services goto:
http://groups.yahoo.com/group/vantage/links
Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
[Non-text portions of this message have been removed]
server makes that part easy. I've started building my own blacklist too.
Paul
-----Original Message-----
From: Wayne Cox [mailto:wmc20@...]
Sent: Friday, May 17, 2002 4:25 PM
To: vantage@yahoogroups.com
Subject: Re: [Vantage] Off topic SPAM
At 01:22 PM 5/17/2002 -0500, you wrote:
>I'm having a huge problem with unsolicited e-mail here at ASPI. I wasa
>wondering what other people are doing to "Make it Stop". I'm looking for
>global solution, so that every e-mail client doesn't have to police theirat
>own spam filters. I'm assuming that I will have to get something going
Well, just about every page on your web site has an email address. The
@#$% spammers run web robots, like the search engine places, that roam
about looking for published addresses on web pages to add to their
targets.
Those are probably aliases to other accounts there? If so, change them
all
to something else! Once an address is "poisoned" there's no way [yet] to
get them to quit sending garbage to it. Many people report getting spam
sent to addresses that have been inactive for over 5 years.
You can obfuscate MailTo: links on your web page by using ASCII
encoding. This thwarts most of the spam-bots. The
syntax xx; where xxx is the ASCII value of the character you
desire can be put into HTML to represent those unusual characters you
can't
easily type from your keyboard. But it works for any other characters,
too. Move all the email addresses on your web page to one "contacts"
page,
and encode them that way. You can punch up our web page
at: www.xxiii.com [yes, it's an incredibly sucky page!] and do a "view
source" for an example. I don't know the syntax right off, but there's a
"robots.txt" or something you can stick in the directory, or embed in the
page that will prevent most spam-bots from cataloging it also.
Once you've cleaned those up, set your SMTP server to use some of the
DNS-based reject lists that are available. At a
minimum: www.ordb.org catalogs servers [generally foreign] that allow
anyone to relay garbage via them (open relays.) If you want to get a
little more aggressive, do the same with www.spamcop.net I use both
here,
and it rejects 10 - 30 emails a day for the four of us, and has yet to
block a legit email. I also have a long list of static reject domains and
IPs. It includes top-level-domains for entire countries, like .jp .cn .kr
.co etc where I know no one, and won't be doing any business, but harbor
many abusable servers and many others.
Good Luck!
[Non-text portions of this message have been removed]
Yahoo! Groups Sponsor
ADVERTISEMENT
Useful links for the Yahoo!Groups Vantage Board are: ( Note: You must
have already linked your email address to a yahoo id to enable access. )
(1) To access the Files Section of our Yahoo!Group for Report Builder and
Crystal Reports and other 'goodies', please goto:
http://groups.yahoo.com/group/vantage/files/.
(2) To search through old msg's goto:
http://groups.yahoo.com/group/vantage/messages
(3) To view links to Vendors that provide Vantage services goto:
http://groups.yahoo.com/group/vantage/links
Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
[Non-text portions of this message have been removed]