[Catalyst] Catalyst benchmark 5.7 VS 5.8
Toby Corkindale
toby.corkindale at strategicdata.com.au
Mon Sep 28 12:39:25 GMT 2009
Spam detection software, running on the system "mail.somewhere.com", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: (Apologies for top-posting.. have momentarily lost the op=
tion
to change quoting styles it seems..) Fayland, I was looking at the bench=
marks
that you linked, and was just wondering which version of Perl you're run=
ning
against? [...] =
Content analysis details: (5.1 points, 5.0 required)
pts rule name description
---- ---------------------- -----------------------------------------------=
---
3.2 RCVD_ILLEGAL_IP Received: contains illegal IP address
0.4 SPF_HELO_FAIL SPF: HELO does not match SPF record (fail)
[SPF failed: Please see http://www.openspf.org/Why?s=3Dhelo&id=3Dmx.message=
fire.com&ip=3D65.61.166.80&r=3Dmail.somewhere.com]
1.5 WEIRD_PORT URI: Uses non-standard port number for HTTP
-------------- next part --------------
An embedded message was scrubbed...
From: Toby Corkindale <toby.corkindale at strategicdata.com.au>
Subject: Re: [Catalyst] Catalyst benchmark 5.7 VS 5.8
Date: Mon, 28 Sep 2009 22:39:25 +1000 (EST)
Size: 5537
Url: http://lists.scsys.co.uk/pipermail/catalyst/attachments/20090928/734d1=
12c/attachment.eml
More information about the Catalyst
mailing list