Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on webservers. Every email no matter what the recipients email address is will be caught by the default email account. It is highly recommended not to use catch-all email accounts and to discard SPAM send to non-existing email addresses. SPAM will clog up your SMTP server and consum resources like bandwidth and disk space in mailboxes. In most mail servers and web control panels (like cPanel) the user or admin can decide what will happen to emails with no existing recipient on the server. Refuse to the let emails onto the server and to let the sender's mail server deal with it (option: ":fail:") or to accept these incoming messages but then to delete them right away (option: ":blackhole:".

Our conclusion:

:fail: is the preferred option over :blackhole:.

The :blackhole: option accepts everything sent to the domain mail server and then throws away the email going to a non-existing email account. This option uses the full amount of bandwidth, and also requires that the server be reading and writing messages to disk before they are deleted... multiply this by 1,000 messages a day or so and you can imagine the impact onto your server resources. Imagine your an email address from your domain (a non-existing one) has been spoofed to send out SPAM messages that even carry a virus. Most natural many of these messages will bounce back and hit your mail server. Your web server would have to deal with thousands of attachments at a time. Performance will go down - no matter what.

:fail: stops emails send to invalid recipients from entering the mail server in the first place..Exim will reject each message during the smtp handshake conversation - therefore the actual email message will never make it to your server. It is being refected from entering your system and the sender's email server has to deal with the stuck message. This option is also the better one for legitimate emails where the sender has actually mis-spelled the recipients email address. He would get a bounce message informing him so that the error can be corrected. Depending on your hardware - a server can handle many more :fails: than it can do :blackholes:.

This article can be published by anyone as long as a live back link to http://www.webhostingresourcekit.com is provided. (this note can be removed as long as a link from the author's resource box is provided)

Christoph Puetz is a successful small business owner (Net Services USA LLC) and international author.

Guides, Tutorials, and Articles for small businesses - http://www.webhostingresourcekit.com

trusted cleaning company Bannockburn ..
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.

I Must Be The Luckiest Person Alive! Spam

I must be the luckiest person alive! My inbox is... Read More

Internet Tip of the Week: Cease and Desist

While we all admit that unsolicited commercial email is a... Read More

The Trouble With Spam Is....

Each day we all face the same challenge. Spam. It... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

Which Spam Filter Is Best For You?

With the number of spam filtering solutions increasing each week... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

I Love Spam!

What's the big deal? All you read on the internet... Read More

How To Stop Unwanted Email Spam

You can stop unwanted email spam, you can choose to... Read More

Having a Bad e MALE Day? Email, Spam, Spam and More Spam

You just sat at your desk, opened your email account... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Get Your News Releases Through the Spam Filters in 11 Easy Steps

In today's spam-filled email world, it's sometimes VERY difficult to... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

What To Do When You Get Spam

When you go to your mailbox and find pieces of... Read More

luxury cleaning services Lake Forest ..