[Catalyst] Catalyst benchmark 5.7 VS 5.8

Toby Corkindale toby.corkindale at strategicdata.com.au
Mon Sep 28 12:39:25 GMT 2009


Spam detection software, running on the system "mail.somewhere.com", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
the administrator of that system for details.

Content preview:  (Apologies for top-posting.. have momentarily lost the op=
tion
   to change quoting styles it seems..) Fayland, I was looking at the bench=
marks
   that you linked, and was just wondering which version of Perl you're run=
ning
   against? [...] =


Content analysis details:   (5.1 points, 5.0 required)

 pts rule name              description
---- ---------------------- -----------------------------------------------=
---
 3.2 RCVD_ILLEGAL_IP        Received: contains illegal IP address
 0.4 SPF_HELO_FAIL          SPF: HELO does not match SPF record (fail)
[SPF failed: Please see http://www.openspf.org/Why?s=3Dhelo&id=3Dmx.message=
fire.com&ip=3D65.61.166.80&r=3Dmail.somewhere.com]
 1.5 WEIRD_PORT             URI: Uses non-standard port number for HTTP


-------------- next part --------------
An embedded message was scrubbed...
From: Toby Corkindale <toby.corkindale at strategicdata.com.au>
Subject: Re: [Catalyst] Catalyst benchmark 5.7 VS 5.8
Date: Mon, 28 Sep 2009 22:39:25 +1000 (EST)
Size: 5537
Url: http://lists.scsys.co.uk/pipermail/catalyst/attachments/20090928/734d1=
12c/attachment.eml


More information about the Catalyst mailing list