In message <firstname.lastname@example.org>, you wrote:
>1. If the entire message isn't used to generate the key, rather than just
>the date and time, spammers can just subscribe to existing mailing lists
>and "steal" headers, fill in their own body, and send to their CD-ROM
>list of names.
Hummm. I guess you have a point there.
-- Ron Guilmette, Roseville, California ---------- E-Scrub Technologies, Inc.
-- Deadbolt(tm) Personal E-Mail Filter demo: http://www.e-scrub.com/deadbolt/
-- Wpoison (web harvester poisoning) - demo: http://www.e-scrub.com/wpoison/