Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment: Had the same issue. (Score 1) 405

by man_ls (#48381489) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?

I had the same issue and it did take quite a bit of digging to nail down. Comcast Business with 5 static IPs, same setup as yours.

1. Make sure your reverse DNS entries are correctly configured such that the domain of your reverse DNS lookup will match the domain your messages are claiming to be from. dashed-ip.sea.wa.comcast.net will generate spam warnings on many mail servers if your server claims to be mail.joecorp.com. Call Support and they will update it for you on the phone within a couple of minutes. Also make sure you're not in a residential IP block.

2. Make sure you're not actually an open relay or otherwise allowing unauthenticated senders to generate outbound messages. I was using MailEnable, and had it misconfigured such that it wasn't actually doing the authentication I had selected. This got me blacklisted quickly. A few bounce messages had links to the blacklists themselves to submit appeals; they'd dutifully take me off each time but I'd get re-added automatically. It took a few weeks of trial and error to get this one fixed. I know you say you're not...and I thought I wasn't either, having specifically taken steps to disable open relaying. But it turns out I didn't quite get it the first time, and was still relaying messages without authentication.

I'd imagine issue (1) may be a big contributor to your problems, personally.

Comment: Server (Score 1) 250

by man_ls (#48329573) Attached to: Ask Slashdot: Minimizing Oil and Gas Dependency In a Central European City?

What's the power consumption of the server? Depending on the load, you might be well-suited to pick up a small ARM-based system (or more than one) if the loads are somewhat light. Personal web server/file server/LDAP/etc. doesn't need a lot of horsepower and there's a good chance you might be burning extra electricity unnecessarily.

Comment: Re:It's risky and unlikely to succeed. (Score 1) 700

by man_ls (#48206041) Attached to: FTDI Reportedly Bricking Devices Using Competitors' Chips.

I think that'd be a pretty major undertaking; once the devices are "bricked" by setting their ID to 0, the OS can no longer communicate with that device. Seems like it'd be pretty tough to push a patch that way, unless they fix the USB stack to allow guest devices = 0.

Comment: Hahaha (Score 1) 324

by man_ls (#47948669) Attached to: Canadian Regulator Threatens To Impose New Netflix Regulation

Netflix should have laughed in their faces and told them that if they want to stop Canadians from subscribing, they'd need to get every ISP and VPN provider in the country to block access to it, then continued on happily taking credit card payments and sending traffic to Canada.

It's not Netflix fault that Canada doesn't produce any noteworthy cultural exports. Lots of other good stuff, sure, but TV and movies not so much.

Comment: Passcode Options (Score 1) 126

by man_ls (#47940955) Attached to: Next Android To Enable Local Encryption By Default Too, Says Google

Unless something has changed with a recent system update, last time I checked the local device encryption for Android disabled the Gesture and PIN input, leaving Password as the only option. I don't exactly care to enter a full-on alphanumeric password every time I take my phone out of stand-by, so the feature is of limited use.

I prefer to use TextSecure. This hooks into the SMS and MMS handlers and redirects them from the internal store, to an encrypted store with an application passphrase. Keeps my phone easy to open up, but keeps the only data I have an interest in protecting safe.

Comment: Remember, Microsoft Approves (Score 5, Interesting) 188

by man_ls (#47697525) Attached to: Microsoft's Windows 8 App Store Is Full of Scamware

Lacking evidence to the contrary, it seems Microsoft actively approves this state of things. They have a human performing certification and content compliance, which involves actually installing and verifying these applications:

"Content compliance: Our certification testers install and review your app to test it for content compliance. The amount of time this takes varies depending on how complex your app is, how much visual content it has, and how many apps have been submitted recently."

With that statement, they must be 100% complicit in these scams, because it makes them money when someone bites, and because it keeps the number of apps in the app store up.

Comment: Re:Sue them for all they're worth (Score 2) 495

by man_ls (#47357735) Attached to: Microsoft Takes Down No-IP.com Domains

Since I'm replying to an AC post I don't feel a need to include citations, but there's been at least one case where the domains in question were purchased through registrars and registered to owners both outside the United States but because the domains themselves were .com domains and Verizon is the ultimate authority for .com domains, the U.S. simply ordered Verizon to update the global master registry to reflect the seizure and there was nothing to be done about it.

They'd have to use a non-U.S. TLD as well.

MS-DOS must die!

Working...