head	1.2;
access;
symbols
	RELEASE_8_3_0:1.2
	RELEASE_9_0_0:1.2
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1
	RELEASE_5_3_0:1.1
	RELEASE_4_10_0:1.1
	RELEASE_5_2_1:1.1
	RELEASE_5_2_0:1.1
	RELEASE_4_9_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2009.08.17.05.08.45;	author linimon;	state Exp;
branches;
next	1.1;

1.1
date	2003.06.13.10.39.44;	author erwin;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Reset paul+ports@@it.ca due to maintainer-timeouts and no response
to email.

Hat:		portmgr
@
text
@pxytest is a command line utility to test a host for open proxies
that are vulnerable to spammer abuse.  It is written in perl.

Unsecured proxies currently are the most significant conduit of
junk email. This is a particularly vexing problem, because open
proxies, unlike open mail relays, hide the origin of the spam,
making it impossible to trace. This utility tests a host to
see if it is vulnerable to such abuse.

See http://www.unicom.com/sw/pxytest for more information.

pxytest was written by Chip Rosenthal.

WWW: http://www.unicom.com/sw/pxytest
@


1.1
log
@Add pxytest 1.36, test remote system for unsecured mail proxies.

PR:		53275
Submitted by:	Paul Chvostek <paul@@it.ca>
@
text
@a13 2
- Paul Chvostek <paul+ports@@it.ca>

@

