Backscatter? my server beeing used for spam

Hi, im pretty new too running OS X server and using the build in postfix server.
Im having trouble with spam beeing sent from my server, the mail is tagget with Undelivered Mail Returned to Sender, so they are sending it too my server in hopes of getting it returned back as spam.
I have been reading alot about this and i still dont understand what i should do. is there a way of just turning off the Undelivered Mail Returned to Sender function ?
hope someone can help a newbie.
-Andreas

You would have to look through your mail logs to determine what was really happening. The "Undelivered Mail.." flag is an old tactic of spammers to get people to open emails containing viruses and the like, so that may not really be the issue at all. It could even be an email client is set to bounce emails when the sender is unknown that is causing the problem.
Spammers will also masquerade email accounts and send spam from other servers and the bounces will come back to the legitimate (your) email address. Checking the mail logs will be the first place to look, along with looking at the full header for the emails in question.
There are also possible real causes for getting those emails, including that one of your email accounts has been compromised and spammers are using that to send emails from that account. Again, checking the logs and message headers can yield some clues.
Check your Mail Service settings, particularly your Relay settings to allow only known networks to access the mail service. Investigate implementing SPF (Sender Policy Framework) and using RBL's (Real-Time Blacklists) to secure your server from being an open relay and cut out the spam from know spammer servers.
-Doug

Similar Messages

  • If the Microsoft Forefront Protection 2010 for Exchange Server can use for exchange server 2013?

    if the Microsoft Forefront Protection 2010 for Exchange Server can use for exchange server 2013?

    thanks for your reply!
      what's protection software can use for exchange server 2013?
    Hi,
    Most (if not all) of the bigger vendors has a product that supports Exchange 2013, so look them up.
    Exchange 2013 has some Anti-Spam and Anti-Malware Protection functionality that you can read about here:
    http://technet.microsoft.com/en-us/library/jj150481(v=exchg.150).aspx
    Martina Miskovic

  • Which web server is used for openHAB2?

    I've recently set up IDE for openHAB2 and built it successfully.
    openHAB dashboard & paper UI are web application.
    But I can't find any web server settings in openHAB project.
    Which web server is used for them?
    Is it possible to add java servlet for my custom REST service?

    This is probably rather a question for the openHAB 2 mailing list. But to answer: Jetty is used in openHAB 2 as you can see here https://github.com/openhab/openhab2/blob/master/products/org.openhab.product.runtime/org.openhab.runtime.product.product#L57.
    And yes, you can certainly add custom REST endpoints. You should do this as it is done with the default REST endpoints like https://github.com/eclipse/smarthome/blob/master/bundles/io/org.eclipse.smarthome.io.rest.core/src/main/java/org/eclipse/smarthome/io/rest/core/binding/BindingResource.java.
    Regards,
    Kai

  • SMTPSendFailedException: 550 : your email program is used for spam

    I'm using javamail for quite a long time, but recently I sometimes receive this error while sending a mail.
    SMTPSendFailedException: 550 Error: You used an email program that is used almost exclusively for spam.
    If using Outlook , I have no problem sending to the same address, using the same SMTP.
    I suppose the 'javamail' in the message ID is responsible for this.
    Anyone else with same problem, any ideas on how to avoid this?

    You should talk to the administrator of your mail server and find out
    what it's matching on to determine this. If it's the message ID, you can
    change the message ID to whatever you want.
    I assume, of course, that you're not actually sending spam...

  • TREX on Portal-Server also used for search/index for SAP Records Management

    Hi all,
    can a installation of the TREX on the Portal-Server (or as separate Server) used for Portal Index/search and also in parallel for searching of Content in an SAP Records Management (means full text research of records/ dossier in the SAP RM) ? Some ideas, tips or settings to keep in mind ?
    THX
    mario

    Hi Neil,
    We have exactly the same problem. We installed a new SAP E-Commerce system on Microsoft Windws 2008 R2 with TREX Version 7.10.43.00. The TREX connection is okay. Also the catalogue replication works without any problems. The SAP support means it is a permission problem on the IIS. The problem isnu2019t solved yet and the message to the SAP support is in process.
    What is your effect with this link?
    http://localhost:<TREXNAMESERVER>/TREXHttpServer/
    Default:
    http://localhost:<30305>/TREXHttpServer/
    Kind regards,
    Roland

  • Email server - sendmail used for outgoing only?

    an earlier poster indicated that sendmail for NT is only used for outgoing emails from the Oracle email server. Is this true? If so I should be able to use the Indigo sendmail for a proof-of-concept (30 free trial). Can't find any free trial for sendmail for NT.
    However, the email server IG seems to have me changing the sendmail.cf file to point at the Oracle email system - seems to imply that inbound messages run thru sendmail and are forwarded to Oracle. In which case the Indigo send-only won't work.
    What did everyone else do? By a copy of sendmail for NT at $500, or run on unix? Other alternatives?

    Would you please confirm what email you are trying to use with iPhoto, you still have not.
    Is it an iCloud account or from some other provider?
    it would prompt me to set up an iCloud account, which I believe I already have.
    To find out if you actually have an iCloud account go to www.icloud.com and try to login.

  • Email and username used for spam??

    caution: strongs words
    i have just received a spam message, that includes my username from this forum, and sent to the registered email account i use with this forum.
    that mean there is a security breach, which i think should be dealt with severely and promptly.
    just to note:
    - there is no connection between my name and email address (for obvious reasons)
    - i am active and registered on extremely few internet sites.
    - i never connect same username and address.
    So problem comes from here. needs immediate solution. being a human being and a French, i despise spam and will not stand any attack to my privacy.
    and here is the mail (which by the way was not even filtered by email server):
    dateJan 10, 2008 5:08 AM
    subjectNew Private Message at Aximsite
    mailed-bydrysdale.simplecom.net
    DO NOT REPLY TO THIS EMAIL!
    Dear Gabi1,
    You have received a new private message at Aximsite from turing2, entitled "Re: Gabi1".
    To read the original version, respond to, or delete this message, you must log in here:
    http://www.aximsite.com/boards/private.php
    This is the message that was sent:
    Hi,
    I'm new here, how's it going?
    "Buddhism has the characteristics of what would be expected in a cosmic religion for the future: it transcends a personal God, avoids dogmas and theology; it covers both the natural & spiritual, and it is based on a religious sense aspiring from the experience of all things as a meaningful unity" - Albert Einstein
    turing2
    http://www.freewebtown.com/turing
    Again, please do not reply to this email. You must go to the following page to reply to this private message:
    http://www.aximsite.com/boards/private.php
    All the best,
    Aximsite
    ... And here's where I keep assorted lengths of wires...

    At LAVA i have same username but different adress.
    The adress i published was different for obvious reasons. i am always trying to be very carefull with this stuff. i never mix for example professional and personal emails. all servers are kept appart, and i have a 'dump' email for transfering all information. up to now this seems to have worked perfectly. The thing is that every time there is a breach from somewhere, it is the start of a new wave of spam and unsolicited messages, that i have to find ways to kill.
    In this case, i  changed a while ago the forum related email , because server has crashed (yes due to spam - btw this is the email you have of me - not reliable anymore, so pm me for another one). so i changed it to my 'dump' email, as a temporary solution. this one up to now never ever had spam. until today. and that means i have to rethink my whole policy.
    and yes - this is the only forum (or entity for that matter), that uses this email directly.
    ... And here's where I keep assorted lengths of wires...

  • Can our Course Management Server be used for iTunes U

    When I enrolled our college in iTunes,I was told by Apple that we could possibly use our Blackboard server as the "host server" for iTunesU...We would like to go that direction but we are not sure how to correctly configure the authenication process.

    Just found out "it's a rental"
    Looking at re-configuring one of our Xserves from our cluster node RenderFarm using LDAP

  • Can the same IIS web server be used for Web Enrollment and AIA and CDP?

    I'm designing a PKI for my company and will need a web server accessible from outside for doing web enrollment as well as for publishing CRLs and AIAs. Can this be the same server?
    Can anyone point me to a good article on how to set this up?
    Thank you.
    Kenny

    yes, you can use the same web server to host CRT and CRL files. And there is nothing complex to create the site. Just create a web site and point it to a folder that contains your files, or add a virtual folder to existing web site.
    My weblog: http://en-us.sysadmins.lv
    PowerShell PKI Module: http://pspki.codeplex.com
    Check out new:
    PowerShell FCIV tool.

  • Email used for spam

    Someone sent a spam email to the first 25 people in my "Sent" folder of my Verizon Webmail account.  I've changed the password, but is there some place that I need to report this.  They definitely did not get it from my home computer because I use Outlook Express, and the email addresses were from the Webmail sent folder.

    keep the below info in mind when creating a password.  
    You already knew that a longer password is more secure, but how much more? BusinessWeek says a 6 character password (just letters) can be cracked in just 10 minutes while a 9 character password complete with letters, uppercase, numbers and symbols will take 44,530 years to crack. Take a look at the image to see other comparisons, the first column describes your password, the other columns show you how long the hackers need to hack your password. [BusinessWeek via Neatorama]

  • Forgot my password,email has been recently deactivated because it was hacked and used for spam

    Hi,
    I recently had my email shut down because i was a victim of spam hacks and I just found out that I actually dont remember my password correctly. I know my secret questions answer because it sends the passord to the email succesfully,but its useless in this case.
    Is there any way i can retrieve my account details and transfer it to a different email(my new one)?
    Can i remake a new Blackberry ID?I never bought anything and dont have any credit card details on my account so I dont care if i lose it,but I was wondering if the account has anything to do with the actual phone itself.
    Thank you in advance and I hope you can help me out in some sort of way,
    Kyriacos Makris

    Yes, you can simply create a new BlackBerryID.
    www.blackberry.com/blackberryid
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • .me account being used for spam

    I have recently been recieving spam / junk mail usining my .me email address. Sent to me from me, with content that is obviously not from me. And they are being sent at times when I am no where near my computer ???

    change password on the account. if that doesn't help, dump the account and start a new one.

  • JSP/HTML: server used for java server pages

    hi...
    I want to know that which server is used for JSP.
    for example we are used ASP pages IIS bulit in windows NT...
    I read books but can not understand that which type of server is used in JSP with HTML pages. Please send me information about that matter
    Thanx in Advance
    Muhammad Bilal

    Any Web server (including Apache, Netscape, and IIS).
    I suggest you have a look at the following article:
    JavaServer Pages[tm] Technology - Comparison with ASP
    http://java.sun.com/products/jsp/jsp-asp.html

  • Which antivirus software should i use for my iMac

    Hello,
    Wondering which antivirus software is recommended by Apple for an iMac?
    Thanks,
    Lisa C.

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • What is the option client certificate for user authentication used for?

    Hi All,
    I have to work on a FTPS - XI -SAP scenario.
    I can see an option for client certificate for user authentication when security is enabled for the FTP adapter. what exactly is this option used for?
    P.S: I went through sap help but couldnt quite understand.

    Thanks a lot Mark.
    So for a FTPS -> XI -> SAP scenario the following settings are required.
    1. I have to create a certificate in Visual Admin for the XI server , send a csr to a CA and get it signed by them, and i have to add this to the ssl_service view.
    2. I have to hand over the public key to the FTPS server & this key will be used for encryption of the file
    the above 2 steps are mandatory.
    If i choose to use the client certificate option , i have to get the client certificate from the FTPS server and add it into the TrustedCAs list. This certificate is just to imply that the client is what it claims to be.
    Will this certificate be used for encryption?
    To make it clear let me put it this way. The certificate created in the XI Server is used for encryption and also for ascertaining that the its what it claims to be.
    The clients certificate option is used only to make sure that the client is what its claiming to be & this is not used for encryption?

Maybe you are looking for

  • Where would I find the amount of memory or space my machine has left?

    I just bought a used imac G3. this is my first experience with a mac. so far I love it but there are a couple things I can't figure out. First i got rid of previous user's folder and made myself the administrator etc. i set up 2 other users. how can

  • Business Explorer and Business Intelligence Roles

    Can someone answer the following questions about these 2 roles: Business Explorer pcd:portal_content/com.sap.pct/platform_add_ons/com.sap.ip.bi/Roles/com.sap.ip.bi.business_explorer_showcase Business Intelligence pcd:portal_content/com.sap.pct/platfo

  • Why do i have a lot of "other" storage?

    I just restored my iPod touch 5. It was having problems syncing doubles of all my music. I restored my iPod and re synced all my music. All my music synced properly but now I have over 11 GB of "other" storage. How do i get rid of the other storage.

  • Iterate through all documents

    Hi, We have a container which contains *1 million* documents, each of which has size 5K. Container type is wholedocument. We need to iterate through all document regualrly using container.getAllDocuments(containerTxn, DBXML_LAZY_DOCS | DBXML_NO_INDEX

  • Which R/3 function Module is used to extract material data?

    Hi, Does someone know which FM is used in R/3 to extract the material data when the replication object 'MATERIAL' is executed? Thanks, Jeroen