View Single Post
  #4  
Old July 20th, 2004, 07:05 PM
*Vanguard*
external usenet poster
 
Posts: n/a
Default pop3/smtp Incoming and Outgoing Mail Servers

"Tony Gravagno"
wrote in :
and never post your real e-mail address on the internet.


Was that meant to be helpful but disconnected advice (about how to avoid
spambots since it has nothing to do with configuring e-mail accounts)?
So who revealed their e-mail address? Anonymous (yeah, great moniker)
used Microsoft's CDO web interface which doesn't include an e-mail
address. I used a bogus e-mail address in my From header.

My Reply-To header is a munged e-mail address (similar to yours in the
From header). Spambots rarely harvest the Reply-To header. My
signature tells how to unmunge my address. Spambots cannot understand
signatures and do not include them in their harvested lists. A passcode
is required in the Subject header; messages without it will get
immediately deleted by a rule at the server upon receipt. Sneakemail
has no rules to add further protection. The passcode requirement avoids
even smart spambots that may cycle through valid TLDs or parse out
invalid syntax, bogus TLDs, or common munge strings.

Requiring a passcode is easier on the sender than using C-R
(challenge-response) to eliminate spam. C-R requires more effort on the
part of the sender (to respond to a challenge), incurs delays, doesn't
use any intelligence of where to send the challenge to avoid sending
"challenge spam" to innocents never involved in the [spam] e-mail,
consumes more resources (bandwidth, disk space, and CPU cycles) for the
additional challenge and response, reduces reliability of delivery, and
is susceptible to anti-spam filtering (some ISPs are now blocking
challenges). I played with a couple of freebie C-R providers
(Mailblocks.com and BlueBottle.com) but the C-R scheme to avoiding
non-authenticated e-mails, like spam, is an irresponsible solution.

Rather than use one alias in a public forum, like newsgroups, where you
may not be able to determine who was the sender and which many senders
may use, I use Sneakemail to create a unique alias that gets revealed to
only one untrusted recipient. If that alias gets spammed or abused, I
know exactly to whom that alias was given.

Getting back to the OP's question, they didn't tell us which ISP
(Internet Service Provider) they use so we cannot look on the ISP's web
site for their mail servers which is something they could've have done
themself. Calling their ISP would've worked, too. It is likely the OP
will not return to provide a follow-up.

--
__________________________________________________
*** Post replies to newsgroup. Share with others.
(E-mail: domain = ".com", add "=NEWS=" to Subject)
__________________________________________________