From printersw@jn3.net Mon Feb 22 09:30:24 2010 Received: from [187.75.169.50] (helo=187-75-169-50.dsl.telesp.net.br) by chain.digitalkingdom.org with esmtp (Exim 4.71) (envelope-from ) id 1Njc6g-0001pj-3V; Mon, 22 Feb 2010 09:30:23 -0800 Received: from 187.75.169.50 by mail.jn3.net; Mon, 22 Feb 2010 14:30:01 -0300 Date: Mon, 22 Feb 2010 14:30:01 -0300 From: lojban-beginners@lojban.org Subject: Make it passionately with our tabs To: Message-ID: <000d01cab3e4$a9aca5e0$6400a8c0@printersw> MIME-Version: 1.0 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Mailer: Microsoft Outlook Express 6.00.2900.2180 Content-type: text/plain; format=flowed; charset="iso-8859-2"; reply-type=original Content-transfer-encoding: 7bit X-Priority: 3 X-MSMail-priority: Normal X-Spam_score: 17.9 X-Spam_score_int: 179 X-Spam_bar: +++++++++++++++++ X-Spam_report: Spam detection software, running on the system "chain.digitalkingdom.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Something like viruses or bacteria tries to spoil your normal life? With our portal you will get rid of such problems problems easily! Click, find and buy! With our big variety of goods and reduced prices you will always be a satisfied buyer! [...] Content analysis details: (17.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 2.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 3.0 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL [187.75.169.50 listed in zen.spamhaus.org] 0.6 RCVD_IN_SORBS_WEB RBL: SORBS: sender is a abuseable web server [187.75.169.50 listed in dnsbl.sorbs.net] 3.5 BAYES_99 BODY: Bayesian spam probability is 99 to 100% [score: 0.9999] 0.0 STOX_REPLY_TYPE STOX_REPLY_TYPE 4.3 HELO_DYNAMIC_HCC Relay HELO'd using suspicious hostname (HCC) 4.4 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr 2) 0.0 FH_HELO_EQ_D_D_D_D Helo is d-d-d-d 0.1 RDNS_NONE Delivered to trusted network by a host with no rDNS Something like viruses or bacteria tries to spoil your normal life? With our portal you will get rid of such problems problems easily! Click, find and buy! With our big variety of goods and reduced prices you will always be a satisfied buyer! http://julio3kie.blogspot.com