Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1486  |
|  August Abolins to Daniel  |
|  another one phishing for a bite  |
|  07 Apr 20 20:14:00  |
 MSGID: 2:221/1.58@fidonet e331cf37 REPLY: 1252.fido_internet@1:340/7 22f16092 PID: OpenXP/5.0.43 (Win32) CHRS: ASCII 1 TZUTC: -0400 Hello Daniel! ** 07.04.20 - 00:03, Daniel wrote to August Abolins: D>Good job. I love doing that on the rare occasion I get an attachment. with D>xls I like to save them as zip files, then extract the components and dig D>around. It's silly simple how some of these trojans work. I think the originators deserve a reciprocation of their own medicine. I have toyed with the idea of replying to the ones that request payment, and just send back a message that says, details of payment "are ENCLOSED in the attachment. Password is the same as you provided: 1234" ..and send back the file. Many of these emails are so stupid. I despise those things. There should be a away to block them right at the ISP/server side. I would rather not have them delivered to my mailbox in the first place. Why can't ISP's block certain ip addresses right on the spot? For example, I just received another blatantly stupid email: ====[begin]==== National Publication & Community of Professionals Dear Valued Candidate, Congratulations! You have been nominated for a spot in the 2020 Professional Who's Who publication. Starting the New Year with this level of recognition, branding, and respect will help improve and accelerate your career. Please click here to update your professional profile. |
[ << oldest | < older | list | newer > | newest >> ]