[Info-vax] "$ SET VERIFY" obsolete
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Mon Apr 22 12:12:27 EDT 2013
In article <atl3u9FicdU1 at mid.individual.net>, bill at server1.cs.uofs.edu (Bill Gunshannon) writes:
>In article <00AD22D5.18F9CED7 at sendspamhere.org>,
> VAXman- @SendSpamHere.ORG writes:
>> In article <517537f6$0$75661$815e3792 at news.qwest.net>, George Cornelius <gcornelius at charter.net> writes:
>>>VAXman- @SendSpamHere.ORG wrote:
>>>
>>>> It's not so much a security thing as it is just trying to keep harvesters
>>>> from getting the URL only to bang on the site with stupid hacks that will
>>>> degrade my bandwidth even more.
>>>
>>>I guess since I don't have a website to protect I don't think about that
>>>particular kind of harvesting.
>>>
>>>When using Eisner to post to Usenet I have noticed a pattern: you
>>>get a burst of spam a short time after posting, but within a week or
>>>two it drops back down to background levels. Not quite as bad as the
>>>old days, when Usenet was important enough that spammers could buy CD's
>>>with addresses harvested from the newsgroups.
>>
>> It's moot now. Besides, this dialog concerning perfidy WRT posting the URL
>> is certain to bury the signal in a cesspool of noise. Maybe, I'd have been
>> better off announcing this debugger to the LinkedIn crowd or on the VMS-sig
>> mailing list instead of comp.os.vms.
>
>You think LinkedIn is safer. Hahahahahahahaha......
WHO said anything about safety. However, when it some to S/N ratio, the
LinkedIn forums, save for then Renee hits them, have better figures than
c.o.v. Again, the message is lost...
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
Well I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list