Spam spits out Linux in high volume attack

09.12.2005

This technique builds a list of acceptable incoming e-mail senders by replying automatically to all those who are not on the user's allowed list effectively blocking unauthorized e-mail.

"Since the authorization process requires human intervention, it bypasses drone machines that spew out high volumes of spam," he said.

(Additional reporting by Sandra Rossi)