Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on webservers. Every email no matter what the recipients email address is will be caught by the default email account. It is highly recommended not to use catch-all email accounts and to discard SPAM send to non-existing email addresses. SPAM will clog up your SMTP server and consum resources like bandwidth and disk space in mailboxes. In most mail servers and web control panels (like cPanel) the user or admin can decide what will happen to emails with no existing recipient on the server. Refuse to the let emails onto the server and to let the sender's mail server deal with it (option: ":fail:") or to accept these incoming messages but then to delete them right away (option: ":blackhole:".

Our conclusion:

:fail: is the preferred option over :blackhole:.

The :blackhole: option accepts everything sent to the domain mail server and then throws away the email going to a non-existing email account. This option uses the full amount of bandwidth, and also requires that the server be reading and writing messages to disk before they are deleted... multiply this by 1,000 messages a day or so and you can imagine the impact onto your server resources. Imagine your an email address from your domain (a non-existing one) has been spoofed to send out SPAM messages that even carry a virus. Most natural many of these messages will bounce back and hit your mail server. Your web server would have to deal with thousands of attachments at a time. Performance will go down - no matter what.

:fail: stops emails send to invalid recipients from entering the mail server in the first place..Exim will reject each message during the smtp handshake conversation - therefore the actual email message will never make it to your server. It is being refected from entering your system and the sender's email server has to deal with the stuck message. This option is also the better one for legitimate emails where the sender has actually mis-spelled the recipients email address. He would get a bounce message informing him so that the error can be corrected. Depending on your hardware - a server can handle many more :fails: than it can do :blackholes:.

This article can be published by anyone as long as a live back link to http://www.webhostingresourcekit.com is provided. (this note can be removed as long as a link from the author's resource box is provided)

Christoph Puetz is a successful small business owner (Net Services USA LLC) and international author.

Guides, Tutorials, and Articles for small businesses - http://www.webhostingresourcekit.com

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

Having a Bad e MALE Day? Email, Spam, Spam and More Spam

You just sat at your desk, opened your email account... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Stuffing the Spammers!

I'm really, truly fed up with spam. Every day when... Read More

How To Stop Spam (Especially If You?re Already a Victim)

Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

E-mail SPAM: Whats The Big Deal?

It absolutely amazes me how many people over-react to receiving... Read More

Which Spam Filter Is Best For You?

With the number of spam filtering solutions increasing each week... Read More

Internet Tip of the Week: Outsourcing

It's no secret that the US economy has slowed down,... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

reliable maid service Winnetka ..