nanog mailing list archives
Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them
From: Colin Johnston <colinj () mx5 org uk>
Date: Tue, 22 Mar 2005 19:22:48 +0000
The better idea would be fingerprint the spam to match the bot used to match the exploit used to run the bot to then reverse exploit back to the exploited machine patching in the process. I managed to setup such a system a while ago with nimda traffic however I could not a find a software tool which exploited a nimda exploited machine which could then patch it and remove the virus (Ie a remote doctor without you knowing :) Colin Johnston
Current thread:
- IBM to offer service to bounce unwanted e-mail back to the computers that sent them Andreas Ott (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Florian Weimer (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Colin Johnston (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Florian Weimer (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Vicky Rode (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Colin Johnston (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Rich Kulawiec (Mar 22)
- Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them Florian Weimer (Mar 22)