more on anti-spammore on anti-spam
In response to my last entry about anti-spam measures and the difficulty of blocking SPAM at the SMTP protocol level I received a few responses. Brian May pointed out that[...]
In response to my last entry about anti-spam measures and the difficulty of blocking SPAM at the SMTP protocol level I received a few responses. Brian May pointed out that[...]
There are two critical things that any anti-spam system must do, it must not lose email and it must not cause damage to the rest of the net. To avoid[...]
An anti-spam measure that is used by a very small number of people is that of verifying the sender address by connecting to the sending mail server. For example when[...]
The recent news from the UK gives us an example of invasive security. Preventing passengers carrying on any hand luggage (even wallets) and frisking all of them is the type[...]
As I mentioned in my first post the amount of effort I’m prepared to invest in posting to a small group of people is limited. I don’t think that I[...]
It’s often the case with technology that serious changes occur at a particular price or performance point in development. Something has small use until it can be developed to a[...]
In a mailing list to which I subscribe there is currently a discussion on US politics with the inevitable discussion of wasted votes. As I don’t want to waste my[...]