Comment Re:Not blackmail, but libel (Score 2) 279
True, but then they'd be hit with proof: The spam that hit the spamtrap from that IP address. They keep those things!
UCEProtect isn't the first one to get sued. It won't be the last.
True, but then they'd be hit with proof: The spam that hit the spamtrap from that IP address. They keep those things!
UCEProtect isn't the first one to get sued. It won't be the last.
There is a reason you are listed:
* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.
So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.
Thus:
* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.
If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.
Simply put, do it Mythbusters/Alton Brown style. Their recent episode of Mythbusters did a full dinner that was cooked by the car's engine.
Gentoo saw the license expiring, and did a proactive thing: flipped the "fetch restriction" flag back on, forcing users to pull it manually and slap it into the right place to install/upgrade.
...soon, Team Fortress 2. This will be the next RedFort.
First, half the features in Gnome 1.x go in Gnome 2. Then the steady removal of options and features. Now they're *)!@#( with the window features that are standard on all windowing systems in the major OS's?!?
I'm glad I already moved onto KDE. I couldn't hack Gnome Option/feature Removal Syndrome (GOFRS).
The power of 4chan and Anonymous is tremendous. It must be held carefully. This is one good example of how to put this power for good instead of evil.
Sounds like you need a Drobo (from http://www.drobo.com./ The various units are expensive, and you'll probably need the Drobo FS if I read your post correctly. The upshot is, though, it's expandable to 20 TB of space. Just shove a drive in.
(Note: Not a Drobo vendor, just a fan who wants one himself)
At least they finally got it tested so it proved what it said. Isralies are picky to a fault.
But you can't ship 'em in yet. Limit's only one per person, so no gifting yet.
Seriously, reconnect. The keys used for the encryption will change, and it's multiply keyed to boot. Check the discussion on SSL (which SSH uses) on Steve Gibson's Security Now podcast. http://twit.tv/sn
Looks like Microsoft's Bing managers are on it. They'll make it worse in no-time flat.
BTW, the difference between a DDOS and a Slashdotting? You know why your site went down -- you got linked!
Simple:
1. Require all passwords to be Yubikey OTP passwords on any login prompt.
2. Refuse access, and only give them the logs manually.
3. When they shut your server down and open it up to yank the drive, hit 'em with a breach of lawsuit.
4. ????
5. PROFIT!
It is impossible to enjoy idling thoroughly unless one has plenty of work to do. -- Jerome Klapka Jerome