So I post a jobs.perl.org
job looking for a coder in Sydney. A day later I get an email from a Mr James Radcliff
that looks fairly standardised asking about the job.
The odd thing is, my job says immediate start in Sydney and he's currently in America... weirder...
So I've emailed back telling him he's practically got the job and can we meet this week for a start on Monday, think I'll play with him if he's not genuine. I mean, he actually _does_ appear good enough, and if he's willing to fly to Australia on short notice, I'm impressed
After sending the reply, I got more suspicious he's a job spammer... so I take a quick look at the mail headers. Included in the headers are the following...
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - host24.root-name-server.net
X-AntiAbuse: Original Domain - phase-n.com
X-AntiAbuse: Originator/Caller UID/GID - [32208 32003] / [47 12]
X-AntiAbuse: Sender Address Domain - host24.root-name-server.net
X-Source-Args: /usr/bin/perl /home/fallstow/www/Projects/PerlJobs/perljobs.cgi
Wait just a second... whatever box he's using is attaching some VERY
With an accurate hostname, and an interesting looking /home/fallstow/www/
path, I can make the following...
And there it is... a slurped copy of jobs.perl.org, with dumped output from an spidering auto-emailer which scans each job for email addresses...
How interesting... but I wonder what happens if I search upwards...
Well look here, there's other stuff here as well. Not only has he been job spamming since 2003, but he also has another nitfy job tool here that analyses to find all the jobs that allow remote work.
Now I wonder what would happen if I replied to ALL his spam job posts offering him the job...