-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Why even bother responding. Just imagine frontbridge (using them an example, I have no affiliation with them) responding to each and every spam they block..something like 7 terrabytes of data per week or so. I guess this is one way to justify for more bandwidth :-) regards, /virendra Colin Johnston wrote: | The better idea would be fingerprint the spam to match the bot used to match | the exploit used to run the bot to then reverse exploit back to the | exploited machine patching in the process. | I managed to setup such a system a while ago with nimda traffic however I | could not a find a software tool which exploited a nimda exploited machine | which could then patch it and remove the virus | (Ie a remote doctor without you knowing :) | | Colin Johnston | | -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W KHZwd5enWFB+mTp5kkJaEyw= =ZtDG -----END PGP SIGNATURE-----