![]() But I cannot come up with a situation in which silently dropping the mail is better than rejecting it during the SMTP transaction. ![]() In those cases it makes little difference if you reject the RCPT TO command or if you accept the mail and silently drop it. There may be cases where distribution of the email-address in the first place was so limited, that you know there couldn't be any legitimate mail send to the address. Sending bounces from your mail server is a problem, because in that case spam bounces to some innocent person's mailbox instead of back to the spammer.Silently dropping the mail is a problem, because if any legitimate mail was sent, the sender can never know that it wasn't delivered.This is a problem, because you have no proper way out. if your mail server responds with success all the way through the transaction including at the end of DATA, then it becomes the responsibility of your mail server to deliver the mail. I do however see a problem in accepting the mail. (And if that's what they wanted to do, they could have done so without even trying to deliver the mail to you in the first place.) In case of spam, it means the spammer will have to generate bounces. Your mail server took no responsibility for the mail, and the sending mail server is now responsible for bouncing it. In both cases, the end result will be the same. You can either return an error on the RCPT TO command, which is what usually happens in case of a non-existent address, or you can return success on the RCPT TO command but return an error at the end of DATA. What are the pros and cons of each approach?Īs long as you bounce the mail by refusing to receive it in the first place, then a spammer cannot use you to annoy somebody innocent with a lot of bounces. Also, I keep discovering new spam traps and adding them to my "spam black hole" list, which is a waste of time. I can just delete the item from my aliases file and the email will bounce. The benefit of bouncing them is that it is less maintenance for me. i.e.: forge the "from" line to be someone they don't like, then use me to send tons of bounce messages to that person. The benefit of sending the email to /dev/null is that a spammer can't use me to generate bounce messages (Backscatter spam). However I'm not sure what to do about the hundreds of accounts that were used for other purposes, such as throw-away accounts I used to use for websites that asked for my email address, or address that I used to list on web pages.įorward all mail to these accounts to /dev/null. If the account was used by a person, I let the email bounce so that anyone trying to contact them knows something is wrong. ![]() Many of them receive literally thousands of emails a day, all spam. Start practicing good Internet security today and teach your family and friends to do the same.I have a lot of unused (old, dead) accounts on my machine. Don’t wait until it is too late to protect your data, your PC and your loved ones' peace of mind. Be careful when downloading freeware, shareware or codecs used to view movies or videos.Ĭybercriminals are not going away too soon and with the release of free malware tools such as Zeus and BlackHole, the cybercrime family is going to only get bigger and that means more malware being released into cyberspace.Do not pirate software! (Such activity is illegal and punishable by law).Being cautions when visiting unsavory websites such as porn, illegal gaming or warez sites.Consider Internet safety before clicking on some cute picture or sensationalized hyperlink laced in germs.Verifying the source of dubious links or attachments.Sadly, many users of are slow to patch frequently used software such as Adobe Reader and Flash, and Java. Staying atop of software upgrades that patch known vulnerabilities.The best tools are ones who offer real-time definition updates. ![]() Selecting a reputable antimalware tool that combats stealth techniques such as rootkits and keeping it up to date.Tips to consider in protecting your data and PC
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |