Not acceptable.
Now, let’s rewind a few days.
I was sitting on my bed, reading into the late hours of the night (or early hours of the morning, as the case my be). On the door to a self-like box I have on my wall, I have a picture of an LDS Temple (a concept render of the Draper Utah temple, in fact, which will open later this year).
As I finished my reading for the night and just as I closed my book, the picture, printed on glossy card stock and held in place with sticky-tack, happened to, at that very moment, relinquish its hold on the the surface, swing freely as it pivoted on upper-left corner, and fall on the ground. To which I thought: +10 Points: Random.
And – seeing as how I needed a new name for my blog, decided to try and see but not if that would stick.
]]>So the other day I enabled my catch-all mail account. (A catch-all account is an e-mail account that get’s all the e-mail going to non-real e-mail addresses like [email protected].)
As you would expect, I got the regular share of SPAM from the regular random spamming, but I noticed something else that was a little more interesting: mail from newsletters and sites that didn’t appear to be the regular, per se SPAM random addresses: many of them were rather specific along the lines of asdfs, sdfasdfasd, asdf, asdfahf, etc.
Which raises the question: when the spammers were setting up and testing their scripts, is it these addresses they used to test it? I can easily see someone going through and filing out a form and entering [email protected] as their e-mail address, just to fill the bo. Of course, this is in total contravention to RFC 2606, which says that if you’re gonna test something on a live server/document something, you should use the dummy domain example.com.
But hey, like like any thing else ever stopped them.
]]>