From owner-freebsd-questions@FreeBSD.ORG Sun Apr 25 07:05:52 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 019AA106566B for ; Sun, 25 Apr 2010 07:05:52 +0000 (UTC) (envelope-from aiza21@comclark.com) Received: from avmxsmtp1.comclark.com (avmxsmtp1.comclark.com [202.69.191.115]) by mx1.freebsd.org (Postfix) with ESMTP id 8B9E38FC1C for ; Sun, 25 Apr 2010 07:05:51 +0000 (UTC) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AvMQAPaG00vKRa0WPGdsb2JhbAAHnDgBAQEBNbsMhQwEgzc X-IronPort-AV: E=Sophos;i="4.52,269,1270396800"; d="scan'208";a="15848423" Received: from unknown (HELO [10.0.10.3]) ([202.69.173.22]) by avmxsmtp3.comclark.com with ESMTP; 25 Apr 2010 15:05:48 +0800 Message-ID: <4BD3E9B8.2030109@comclark.com> Date: Sun, 25 Apr 2010 15:05:28 +0800 From: Aiza User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: FreeBSD Questions Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Wpoison????? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Apr 2010 07:05:52 -0000 Looking for comments on this small apache web application that fools web harvest programs into harvesting bogus email address from web page. http://www.monkeys.com/wpoison Anybody try this? Is this a self-inflicted Trojan? Since I don't have web server was thinking of creating jail for apache that only runs this wpoision perl script? My firewall been blocking inbound port 80 and gets hit 100's of times a day. Just script kiddies rolling through a block of ip address hunting. Play with them a little bit in return. Comments please?