Checking Suspected E-Mails

Matt Kettler mkettler at
Tue Jun 20 19:21:19 IST 2006

Julian Field wrote:

> The catch is that way-back when I wrote the filename rules system, I
> wrote this rule as a demonstration of what could be done with the
> system, beyond simple \.exe$ rules and obvious stuff like that. The
> double-matching-extension rule was another example, showing how you
> could use a string found earlier in the filename, again later in the
> filename.
> It never occurred to me at the time that people would actually use these
> rules, particularly not the first one. Amazingly, as I should have
> predicted, no-one would bother editing the rules I supply by default,
> and so it would be used on everyone's system. The laziness of many
> sysadmins is a virtue according to Larry Wall, so I guess it's a good
> thing :-)

Yep.. even ECS hasn't bothered to edit them...

Message-Id: <200606201800.k5KI0EbS023872 at>
From: "MailScanner" <postmaster at>
Our e-mail content detector has just been triggered by a message you sent:
  To: mailscanner at
Report: Report: MailScanner: Attempt to hide real filename extension

More information about the MailScanner mailing list