Jul. 11th, 2007

Spam...

Jul. 11th, 2007 12:23 pm
daveon: (Default)
I've recieved a complaint from my hosting service that Spam is being sent from people spoofing my domain.  This is for my atomicrazor.com website.  Does anybody know how I can figure out what is happening?  Firstly, is this kosher?  Here's the complaint:

Dear Customer,

We have received a report that spam has been sent from your account. Sending spam from our network is a violation of our terms of use. Future spam attacks could result in the suspension of your account. Please take steps to secure your account and scripts to prevent future spam attacks. Below we have provided copies of the internet headers and content of the spam that arrived to one of the destination addresses. If you have any further questions, please contact us again.

Thank you,
Abuse Department
Hostway Corporation

Microsoft Mail Internet Headers Version 2.0
Received: from p12248-ipbffx02osakakita.osaka.ocn.ne.jp ([24.73.207.6]) by medi-server.medi-healthcare.com with Microsoft SMTPSVC(5.0.2195.6713);
        Tue, 10 Jul 2007 23:37:30 -0400
Received: from kaihatu2 ([120.112.153.72]) by p12248-ipbffx02osakakita.osaka.ocn.ne.jp with Microsoft SMTPSVC(6.0.3790.1830);
       Wed, 11 Jul 2007 12:38:36 +0900
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Wed, 11 Jul 2007 12:38:18 +0900
To: rslama@medi-healthcare.com
From: "Evzen Spiker" <Evzen@atomicrazor.com>
Subject: When you are using just one data type for semantic values, yylval has that type.
Mime-Version: 1.0
Content-Type: multipart/related;
       type="multipart/alternative";
       boundary="=====================_14857750==.REL"
Return-Path: Evzen@atomicrazor.com
Message-ID:
<MEDI-SERVERIEAOeIiG00000042@medi-server.medi-healthcare.com>
X-OriginalArrivalTime: 11 Jul 2007 03:37:30.0750 (UTC) FILETIME=[CF70A9E0:01C7C36C]

--=====================_14857750==.REL
Content-Type: multipart/alternative;
       boundary="=====================_14857750==.ALT"

--=====================_14857750==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

--=====================_14857750==.ALT
Content-Type: text/html; charset="us-ascii"


--=====================_14857750==.ALT--
--=====================_14857750==.REL
Content-Type: image/jpeg; name="loved.jpg";  x-mac-type="4A504766"; x-mac-creator="4A565752"
Content-ID: <7.1.0.9.0.20070711123818.0206e618@atomicrazor.com.0>
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename="loved.jpg"


--=====================_14857750==.REL--


She would never know how each stab of pain caused courage to well up in me. Callandor, hanging hilt down in midair, waiting for no hand but that of the Dragon Reborn.
A return code's LOWORD portion is the return code itself, in hexadecimal format. We may suppose that Mr.
Callback functions are functions in your application that are called by Windows, not your application. Camedia Master Pro from Olympus.
Call that byte p1. Calibrating versus characterizing a monitor.
Caching is applied to specified URLs before a user requests the pages. Returns an iterator pointing to the beginning of the map.
Callback for NDIS BindAdapterHandler. Callback on CListCtrl Colin Angus Mackay -- colin.
Why did you break all that glass. Let us now look at the example, that now a store wants to use credit card usage, by connecting to the central data bases by X.
Arminius hpcLine, Xeon EM64T 3. Callie's imperious nose would have looked right at home on an old Roman coin.
Saladin wanted to know. Call'st thou that trimming.
Call QueryInterface on ICutListElement to determine if the element is an audio type element. Another alternative could be to minimize the sum of variances for the two new boxes.
But,I can't find any way to specify the file extension for each =3D document. Call the Customer Service number for your location.
Caching is applied to specified URLs before a user requests the pages. Call for bread and Wine, That we may cheer our stomachs with repast, To look our foes more sternly in the face.


<html>
<body>
<a href="http://sectiononce.com/">
<img src="cid:7.1.0.9.0.20070711123818.0206e618@atomicrazor.com.0"
width=384 height=316 alt="[]">
</a>
<br>
She would never know how each stab of pain caused courage to well up<br> in me. Callandor, hanging hilt down in midair, waiting for no hand<br> but that of the Dragon Reborn.<br> A return code's LOWORD portion is the return code itself, in<br> hexadecimal format. We may suppose that Mr.<br> Callback functions are functions in your application that are called<br> by Windows, not your application. Camedia Master Pro from Olympus.<br> Call that byte p1. Calibrating versus characterizing a monitor.<br> Caching is applied to specified URLs before a user requests the<br> pages. Returns an iterator pointing to the beginning of the map.<br> Callback for NDIS BindAdapterHandler. Callback on CListCtrl Colin<br> Angus Mackay -- colin.<br> Why did you break all that glass. Let us now look at the example,<br> that now a store wants to use credit card usage, by connecting to the<br> central data bases by X.<br> Arminius hpcLine, Xeon EM64T 3. Callie's imperious nose would have<br> looked r
 ight at home on an old Roman coin.<br> Saladin wanted to know. Call'st thou that trimming.<br> Call QueryInterface on ICutListElement to determine if the element is<br> an audio type element. Another alternative could be to minimize the<br> sum of variances for the two new boxes.<br> But,I can't find any way to specify the file extension for each =3D<br> document. Call the Customer Service number for your location.<br> Caching is applied to specified URLs before a user requests the<br> pages. Call for bread and Wine, That we may cheer our stomachs with<br> repast, To look our foes more sternly in the face.</body> </html>

daveon: (Default)
Regarding my other post, I'd like to check that I'm right here.

Somebody ( Asia Pacific Network Information Centre) have been sending spam via their routers.  One of the spammers has created an email address that the Spam is from (Evzen Spiker" <Evzen@atomicrazor.com>).

This email address is invalid and completely made up and is not being sent via my SMTP server.

I'm curious about why I've got a complaint (if it is one) and how you can stop people randomly selecting domains and doing this.  We have the same problem at work with people creating spoof name@daveons employer.com stuff for getting past our Spam Killer.

I'm a bit put out, but I'm also not clear on what I could possibly do.



daveon: (Default)
Hostway have confirmed to me that they based their initial threat to me on the following:

"The spam report was sent to us, and stated as connected to your domain due to the fact that the from address was:
From: "Evzen Spiker" <
Evzen@atomicrazor.com>"

So, let me get this straight.  Some dimwit sends you an email saying "one of your domain's is sending spam, here's the address - and you send an email to the administrator of the domain without checking?

It gets better:

"It is possible that your e-mail address has been forged."

It is possible that you don't know a lot about email.  Is the email valid?  No.  Was it sent via my hosting service and SMTP server with you?  No.  Hmmm...    Is this a valid email address in the hosting account.  No.  Do you need to have a valid email address to make it look like email has come from it?  No.   Did you check the actual routing? No.

Do you have a clue?  No, no, don't answer that one it was rhetorical.

Stern letter me thinks.
daveon: (Default)
Seattle, a city of chills, mists and drizzle, is currently experiencing something of a heatwave.  Despite a brisk breeze coming off Elliott Bay, it is hotter than hell outside.  Our other problem is that our upstairs windows only open a crack, which makes it near to impossible to get a breeze though.

So I've just spent 10 minutes with a screwdriver "fixing" the kitchen window, and then another 5 minutes with some string.

There is now a breeze.
daveon: (Default)
Words really really really really really fail me.

daveon: (Default)
My first week with the Jesus Phone. While revolutionary, it isn’t exactly divine.

As I work in the industry and have long been an iPhone skeptic, you'll have to put up with a few more of these from me.

In all, actually, this is a pretty balanced article.  There are some interesting comments about the battery life and a couple of the "bugs" are straight out of the Microsoft "Stinger" (*) bug list of things that engineers didn't think about because they weren't thinking about phones.

The most serious problem, as I see it, and as I mentioned in my review, is you can't use it single handed.  It needs more soft keys - at least 2.

The other item was the inability to decline a call when the UI is locked.  Technically that's a GCF(2) failure as the GCF process looks for that one (we're actually working on that for a customer at the moment on another phone platform).  I wonder if they missed it, they got a "let" or they've pretended that it isn't there.

(1) - Microsoft's first generation phone platform

(2) - GSM Certification Forum

April 2017

S M T W T F S
      1
23456 78
9101112131415
16171819202122
23242526272829
30      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 14th, 2025 11:33 am
Powered by Dreamwidth Studios