On Wed, Aug 3, 2011 at 5:07 PM, Lyle Giese lyle@lcrcomputer.net wrote:
On 08/03/11 18:54, Dave Warren wrote:
This makes sense, given the lack of attention to detail spammers put into their craft in general. Perhaps it would be worthwhile if SURBL's (and others') processes included checking pages for 400 error codes before sending (automated?) abuse reports?
Not sure if this is material to this discussion or not. This morning, we got some spam with URL's in it that pointed to fake 404 pages, which then tried to download a trojan exe from yet another site.
This was part of the Federal tax payment rejected (yes I am in the US) series that appeared overnight on my mail servers.
BTW, I routinely click on these as my normal workstation is a linux box and 99.9% of these target Windoze boxes.
It's probably safer to use a text browser like curl. Be sure to set the user-agent to something workstation like.