You boot the computer from the CD, and it reads its config files off a floppy. I use a router/firewall computer that runs from a live cd. I think maybe like those live CD distributions of Linux, only do it with Windows so a person could have what ever Windows programs they need. Nothing can be added unless it were reburned to a new CD and the computer rebooted with that CD. If you want to run another program, it has to be loaded from another disk or a custom disk that you create with your OS and what ever programs you want to run from it. Load the OS and programs we want to use from CDs and stricktly use the hard drive for mass file storage. Maybe we all simply need to leave the OS off the hard drive. The OS was loaded off a floppy and what ever program you wanted to run was loaded off another floppy. If I get mail from a IP all I have to do is check to see if is listed in the MTA DNS record.Ī large ISP might have 5 million subscribers, but only 20 valid SMTP servers, is it really that hard for to have someone spend 15 seconds to add 20 lines to a file that everyone on the net needs to suffer for it? The solution could be to simply start adding DNS records for MTA’s in the same manner as mail exchangers are already listed.Ĭompanies could have MX records for and an MTA record for Look at this ironport link to see how many client systems match even comcasts MTA’s!ĪFAIK Yahoo’s spec, microsofts caller-id, and SPF all pretty much ignore this problem. There is too much focus on designing specs to secure the valid mail servers when the spammers are just creating their own networks of unrestricted rogue relays. Dude, the idea of “hacker” being some purist Jedi computer person has long been dead, leave it alone.īTW, the article mentions spamware, I think many people looking at technical solutions to spam underestimate just how many infected desktops are used to send spam.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |