[Info-vax] "$ SET VERIFY" obsolete

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Mon Apr 22 12:12:27 EDT 2013


In article <atl3u9FicdU1 at mid.individual.net>, bill at server1.cs.uofs.edu (Bill Gunshannon) writes:
>In article <00AD22D5.18F9CED7 at sendspamhere.org>,
>	VAXman-  @SendSpamHere.ORG writes:
>> In article <517537f6$0$75661$815e3792 at news.qwest.net>, George Cornelius <gcornelius at charter.net> writes:
>>>VAXman- @SendSpamHere.ORG wrote:
>>>
>>>> It's not so much a security thing as it is just trying to keep harvesters
>>>> from getting the URL only to bang on the site with stupid hacks that will
>>>> degrade my bandwidth even more.
>>>
>>>I guess since I don't have a website to protect I don't think about that
>>>particular kind of harvesting.
>>>
>>>When using Eisner to post to Usenet I have noticed a pattern: you
>>>get a burst of spam a short time after posting, but within a week or
>>>two it drops back down to background levels.  Not quite as bad as the
>>>old days, when Usenet was important enough that spammers could buy CD's
>>>with addresses harvested from the newsgroups.
>> 
>> It's moot now.  Besides, this dialog concerning perfidy WRT posting the URL
>> is certain to bury the signal in a cesspool of noise.  Maybe, I'd have been
>> better off announcing this debugger to the LinkedIn crowd or on the VMS-sig
>> mailing list instead of comp.os.vms.
> 
>You think LinkedIn is safer.  Hahahahahahahaha......

WHO said anything about safety.  However, when it some to S/N ratio, the
LinkedIn forums, save for then Renee hits them, have better figures than
c.o.v.  Again, the message is lost...



-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

Well I speak to machines with the voice of humanity.



More information about the Info-vax mailing list