Whats configured into your MTA?

I was wondering the web looking at random items, when I came along an article at http://www.worldwidecreations.com titled Stopping spam before the door with SpamCop and IPTables Its a great article with a lot of information and code on how the author is able to grab the offending hosts and place them within IPTables.

I was wondering the web looking at random items, when I came along an article at http://www.worldwidecreations.com titled Stopping spam before the door with SpamCop and IPTables

Its a great article with a lot of information and code on how the author is able to grab the offending hosts and place them within IPTables.

One thing that I really can’t agree with is the use of IPTables to block mail traffic from an RBL that has in the past and present block many legitimate hosts and email. I’d rather have spam to my account marked as spam so that I can be the judge and correct any false positives. At the moment, all my mail using using Exim with sa-exim (SMTP time spamassassin scanning). This allows for messages to be bounced back at SMTP time!

What is everyone else using for an MTA and how are you filtering spam?


Did you like this article?


0 Shares:
You May Also Like

Adobe says Acrobat, Reader vulnerable to hacks

This is a disturbing as most white pages and manuals ranging from automobiles and computer motherboards are in PDF format. Even eBooks could be an easy way for a hacker to gain access to your machine, illegal books put online could be a trap for unsuspecting downloaders.
Adobe says Acrobat, Reader vulnerable to hacks - BOSTON (Reuters) - Adobe Systems Inc, whose software is used by millions of people to read documents sent over the Internet, said on Wednesday some of its programs contain yet-to-be-fixed flaws that make computers vulnerable to attack. On October 5, Adobe posted a notice on its Web site that said it had unknowingly incorporated vulnerabilities into versions of Adobe Reader and Acrobat software that could allow malicious programs to get on to a PC without the user's knowledge.
Read More

Spam: Keep your email address from spambots with Text to ASCII

Spam: Keep your email address from spambots with Text to ASCII - ASCII.png

Webapp Text to ASCII converts plain text into its ASCII equivalent - meaning it can obscure your email address or other private data from automated spambots online. This isn't a foolproof method, as spambots can be programmed to decode ASCII, however, a good majority of them aren't. Go ahead and check out Text to ASCII's capabilities -- this entire post is written in ASCII. View the source code and verify! The next time you want to leave your email address in a web form, head over to Text to ASCII, convert your email address to ASCII and you'll be good to go.

[LifeHacker]
Read More

Featured Mac Download: Monitor your Mac with iStat menus

Featured Mac Download: Monitor your Mac with iStat menus - istat-menus.png

Mac OS X only: Donationware application iStat menus integrates system statistics like CPU, RAM, HD, and Network usage into your Mac's menubar.

iStat menus is completely customizable, so you can include only those stats that you want (enabling all of the available stats would mean a lot of menubar clutter). In the past we discussed how to display your system activity in the dock, but iStat menus takes this idea to an entirely new level of system monitoring. iStat menus is donationware, Mac OS X only.

[LifeHacker]
Read More