Checking Suspected E-Mails

Matt Kettler mkettler at evi-inc.com
Tue Jun 20 19:21:19 IST 2006


Julian Field wrote:
> 
> 

> The catch is that way-back when I wrote the filename rules system, I
> wrote this rule as a demonstration of what could be done with the
> system, beyond simple \.exe$ rules and obvious stuff like that. The
> double-matching-extension rule was another example, showing how you
> could use a string found earlier in the filename, again later in the
> filename.
> 
> It never occurred to me at the time that people would actually use these
> rules, particularly not the first one. Amazingly, as I should have
> predicted, no-one would bother editing the rules I supply by default,
> and so it would be used on everyone's system. The laziness of many
> sysadmins is a virtue according to Larry Wall, so I guess it's a good
> thing :-)

Yep.. even ECS hasn't bothered to edit them...

------------
Message-Id: <200606201800.k5KI0EbS023872 at moorhen.ecs.soton.ac.uk>
From: "MailScanner" <postmaster at moorhen.ecs.soton.ac.uk>
<snip>
Our e-mail content detector has just been triggered by a message you sent:
  To: mailscanner at ecs.soton.ac.uk
<snip>
Report: Report: MailScanner: Attempt to hide real filename extension
(kettler.matt.pdf)
------------




More information about the MailScanner mailing list