GoDaddy Follows Qwest With Per Spam Charges

from the how-nice dept

zanek writes “A check of six major Internet Domain Registrars accredited by ICANN turned up one registrar that actually tucks a “per spam” charge into its Terms of Service: GoDaddy. If your domain is associated with a spammer, get your wallet out. Email Battles takes you through normal contract language, then shows you what’s way out of line. Aside from this single registrar, we have found only one business this nervy… And you can bet Qwest is paying the price.” The Qwest statement obviously refers to their $5 per spam charge. You can understand why these companies put the fees in there, but it’s not realistic in a world where machines do get compromised. Shutting accounts down and demanding cleanup makes sense — but per spam fines seem to go a bit too far.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “GoDaddy Follows Qwest With Per Spam Charges”

Subscribe: RSS Leave a comment
15 Comments
Michael Vilain says:

Re: Re: Re:2 Monitor your servers...

But I’ve filed SPAMCOP complaints against spammers using GoDaddy registration. They were taken out of DNS eventually when there was sufficient evidence that this wasn’t an exploit but someone truely spamming. Network Solutions doesn’t do that and the service rep got rather huffy when I told them that on moving my domains to GoDaddy from NSI.

Cara says:

Come on , let's get real here

Honestly, even the best security experts out there cannot keep machines completely safe from hackers all the time, it happens, even to the best of us. This is extreme, especially considering a lot of wesite owners can’t possibly keep up with and prevent all current and future potential exploits. The hackers will always find new ways in. The only safe computer is unplugged and buried in the back yard.

Kevin Mesiab (user link) says:

Re: Re: Blind leading the blind

The latest round of compromises that lead to spamming happens to affect *nix machines running faulty xmlrpc interfaces. (http://www.dslreports.com/shownews/71230)

Its irritating to see linux and unix evangelists putting such blind faith into their systems. Nobody is completely secure. (http://www.insecure.org/sploits_linux.html)

Even some networked printers, copiers, routers and network apliances are subject to being hacked and misused.

Do us all a favor and hold your tongue until you know what you’re talking about.

CharlesGriswold says:

Re: Re: Re: Blind leading the blind

Its irritating to see linux and unix evangelists putting such blind faith into their systems. Nobody is completely secure. (http://www.insecure.org/sploits_linux.html)
True. *nix OS’s are, however, more secure than Windows, for a variety of reasons (not the least of which is that Windows is a large, homogenous, and very tempting target).
BSD running on a non-intel-based architecture is about as secure as you can get without paying lots of money.
If you want rock-solid security, get an AS/400 or System 390 server. Even these are not totally secure, however; social engineering can break any computer security.

Claymore says:

Re: Come on , let's get real here

“Honestly, even the best security experts out there cannot keep machines completely safe from hackers all the time, it happens, even to the best of us.”

That’s where the monitoring part comes in. If you seen a spike in traffic coming from your server you should probably investigate immediately. Has my site just become more popular or am I now a slave to a spammer?

admin (user link) says:

time to leave godaddy

Thanks for the heads up on this. Pissed that I
just registered another domain with them two days
ago.. those damn EULA are so long now its like
MSFT clickthroughs.. who really reads the whole
thing anymore. shame on me. But I did speak to
a rep there (who had no idea) just to confirm what
if anything I had to do on my end to set my account
up for easy transfer. One really wonders what prick
at these firms hatches these ‘revenue’ enhancers.
I for one will not take the chance of my umbrella
policy covering a web server (hosted by me or
elsewhere) never being compromised.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...