Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /home/ift/mails/30/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //home/ift/mails/30/1524160666.zrspam.308426_2018_04_19

From 1105-1944-175132-292-christian.gabriel=ift-informatik.de@mail.enjyy.bid  Thu Apr 19 19:57:46 2018
Return-Path: <1105-1944-175132-292-christian.gabriel=ift-informatik.de@mail.enjyy.bid>
X-Original-To: cgabriel@ift-informatik.de
Delivered-To: cgabriel@ift-informatik.de
Received: by ift-informatik.de (Postfix, from userid 5555)
	id 73A5A3D200036; Thu, 19 Apr 2018 19:57:46 +0200 (CEST)
Received: from localhost by h2486555.stratoserver.net
	with SpamAssassin (version 3.4.0);
	Thu, 19 Apr 2018 19:57:46 +0200
From: "EZ Battery Reconditioning" <Contact@enjyy.bid>
To: <christian.gabriel@ift-informatik.de>
Subject: *****SPAM***** Don't buy 1 new battery in 2018 - do this instead..
Date: Thu, 19 Apr 2018 19:13:26 +0200
Message-Id: <18ehu0uoe4q6qq4b-mpnkellb71vijm8x-798-2ac1c@enjyy.bid>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	h2486555.stratoserver.net
X-Spam-Flag: YES
X-Spam-Level: *****
X-Spam-Status: Yes, score=5.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	HTML_FONT_LOW_CONTRAST,HTML_MESSAGE,RAZOR2_CF_RANGE_51_100,
	RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,RCVD_IN_PSBL,RDNS_NONE,T_DKIM_INVALID
	autolearn=no autolearn_force=no version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_5AD8D89A.8160FE99"

This is a multi-part message in MIME format.

------------=_5AD8D89A.8160FE99
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit

Spam detection software, running on the system "h2486555.stratoserver.net",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
@@CONTACT_ADDRESS@@ for details.

Content preview:  Don't buy 1 new battery in 2018 - do this instead.. http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300
   http://enjyy.bid/GAIHB-ANvXkHekM3bHplbKL9F3NN1wgT_v1nw3PXBaD6vD_r_175132_798_56a4eaf3_0300
   [...] 

Content analysis details:   (5.0 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                            [195.110.8.29 listed in psbl.surriel.com]
 0.0 HTML_MESSAGE           BODY: HTML included in message
 0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to
                            background
-1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                            [score: 0.0000]
 0.9 RAZOR2_CHECK           Listed in Razor2 (http://razor.sf.net/)
 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
                            [cf: 100]
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
                            above 50%
                            [cf: 100]
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS
 0.0 T_DKIM_INVALID         DKIM-Signature header exists but is not valid

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.


------------=_5AD8D89A.8160FE99
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 8bit

Received: from bend.enjyy.bid (unknown [195.110.8.29])
	by ift-informatik.de (Postfix) with ESMTP id 49A7A3D200035
	for <christian.gabriel@ift-informatik.de>; Thu, 19 Apr 2018 19:57:44 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=enjyy.bid;
 h=Mime-Version:Content-Type:Date:From:Reply-To:Subject:To:Message-ID; i=Contact@enjyy.bid;
 bh=U6yp1ZnuCPNyzKMOa96UAd+PS/A=;
 b=OrFkudP4WAypYPfQXkDaILIj0pgpM6suGNvkZakXkVfqXmx047M7CAtny4embwjYfej4NLg3VRp2
   RaZGe5tyOInaEeJlMjrz7V4+jKos7vC/K80QXlYu0+ry7ylkZDR6Fx6CsMhJ6qCJpFXzm5d2uwrp
   U9hn4iEn+lGS5oSzus4=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=enjyy.bid;
 b=SwVxD+NAcUjKZMTl7JkCcMwm3QZbBXraoMQ1lRolvkrZZFF9dzSKh/T94vfLO5vfmjtDbhj3EsaJ
   i56pre266nBN+M7W8IsUula4m3CrXjFjA4pspbTjTPjuz9Km6nxo7Kkmf0WFeNzL01v9HlXx0kDQ
   +QJg8uMhsesZnECDgfI=;
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="9914743b3058de981cc219667e1bc9fa_798_2ac1c"
Date: Thu, 19 Apr 2018 19:13:26 +0200
From: "EZ Battery Reconditioning" <Contact@enjyy.bid>
Reply-To: "Dead Batteries Back To Life" <Info@enjyy.bid>
Subject: Don't buy 1 new battery in 2018 - do this instead..
To: <christian.gabriel@ift-informatik.de>
Message-ID: <18ehu0uoe4q6qq4b-mpnkellb71vijm8x-798-2ac1c@enjyy.bid>

--9914743b3058de981cc219667e1bc9fa_798_2ac1c
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit

Don't buy 1 new battery in 2018 - do this instead..
http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300

http://enjyy.bid/GAIHB-ANvXkHekM3bHplbKL9F3NN1wgT_v1nw3PXBaD6vD_r_175132_798_56a4eaf3_0300

Electronic design automation (EDA), also referred to as electronic computer-aided design (ECAD), is a category of software tools for designing electronic systems such as integrated circuits and printed circuit boards. The tools work together in a design flowThe next era began about the time of the publication of "Introduction to VLSI Systems" by Carver Mead and Lynn Conway in 1980. This ground breaking text advocated chip design with programming languages that compiled to silicon. The immediate result was a considerable increase in the complexity of the chips that could be designed, with improved access to design verification tools that used logic simulation. Often the chips were easier to lay out and more likely to function correctly, since their designs could be simulated more thoroughly prior to construction. Although the languages and tools have evolved, this general approach of specifying the desired behavior in a textual programming language and letting the tools derive the detailed physical1981 marks the beginning of EDA as an industry. For many years, the larger electronic companies, such as Hewlett Packard, Tektronix, and Intel, had pursued EDA internally. In 1981, managers and developers spun out of these companies to concentrate on EDA as a business. Daisy Systems, Mentor Graphics, and Valid Logic Systems were all founded around this time, and collectively referred to as DMV. Within a few years there were many companies specializing in EDA, each with a slightly different emphasis. The first trade show for EDA was held at the Desn 1981, the U.S. Department of Defense began funding of VHDL as a hardware description language. In 1986, Verilog, another popular high-level design language, was first introduced as a hardware description language by Gateway Design Automation. Simulators quickly followed these introductions, permitting direct simulation of chip designs: executable specifications. In a few mor

--9914743b3058de981cc219667e1bc9fa_798_2ac1c
Content-Type: text/html;
Content-Transfer-Encoding: 8bit

<html>
<head>
	<title></title>
</head>
<body><a href="http://enjyy.bid/1NxsxKFuOxENtgDGz7Kiz5lVpYdvz137NdDp-hBqPkpLVvI_175132_798_60a90e2f_0300"><img src="http://enjyy.bid/55eb6a042a8e0426f0.jpg" /><img height="1" src="http://www.enjyy.bid/EXUodPqx6VkEeTjmOnkJSilzVndP0a_eQk9JUKv_It8ojIBM_175132_798_b3541778_0300" width="1" /></a><br />
&nbsp;
<center>
<table style="width:550px;">
	<tbody>
		<tr>
			<td>&nbsp;
			<hr />
			<p style="margin-left:; font-size:16px; text-align:justify"><b>Hi there, </b><br />
			<br />
			99% of people will waste money on new batteries in 2018..<br />
			&nbsp;</p>

			<center><span style="font-family:trebuchet ms,helvetica,sans-serif;"><a align="center" href="http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300" style="color:#E60000;font-size:17px;"><b>&gt;&gt; But you don&#39;t have to be one of them... &lt;&lt; </b></a></span><br />
			&nbsp;</center>

			<center><a align="center" href="http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300" style="color:#E60000;font-size:17px;"><img src="http://enjyy.bid/4d3f47f509c6c0933e.jpg" /></a></center>
			<br />
			Instead, you can save a lot of money and bring your old batteries back to life and re-use them (instead of buying new overpriced batteries) with a simple new method.<br />
			<br />
			<a align="center" href="http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300" style="color:#E60000;font-size:17px;"><b>&nbsp;&nbsp;&nbsp; Click Here To Learn How To Bring Any Battery Back To Life Again </b></a><br />
			<br />
			This easy <strong><a href="http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300">method</a></strong> works for nearly all kinds of old/dead batteries too...

			<p style="font-size:15px; text-align:justify">With this simple battery reconditioning method, you won&#39;t have to buy new expensive batteries in 2018 ...or 2019 ...or ever again!<br />
			&nbsp;</p>

			<center><span style="font-size:18px;"><a href="http://enjyy.bid/_yyD1fIbwbD0d5-RgflUGOA0tWOJK0V78Y7xUc0yYt5nnzjC_175132_798_37df822c_0300" style="text-decoration:none;"><span style="font-family:comic sans ms,cursive;"><u><strong><span style="font-size: 20px;">&gt;&gt; Watch the presentation here &lt;&lt;</span></strong></u></span> </a></span></center>
			&nbsp;

			<hr />
			<p>&nbsp;</p>

			<p>&nbsp;</p>
			<br />
			<br />
			<br />
			&nbsp;
			<p style="font-size:4px; color:#ffffff">Electronic design automation (EDA), also referred to as electronic computer-aided design (ECAD), is a category of software tools for designing electronic systems such as integrated circuits and printed circuit boards. The tools work together in a design flowThe next era began about the time of the publication of &quot;Introduction to VLSI Systems&quot; by Carver Mead and Lynn Conway in 1980. This ground breaking text advocated chip design with programming languages that compiled to silicon. The immediate result was a considerable increase in the complexity of the chips that could be designed, with improved access to design verification tools that used logic simulation. Often the chips were easier to lay out and more likely to function correctly, since their designs could be simulated more thoroughly prior to construction. Although the languages and tools have ev<a href="http://enjyy.bid/1NxsxKFuOxENtgDGz7Kiz5lVpYdvz137NdDp-hBqPkpLVvI_175132_798_60a90e2f_0300"><img src="http://enjyy.bid/55eb6a042a8e0426f0.jpg" /><img height="1" src="http://www.enjyy.bid/EXUodPqx6VkEeTjmOnkJSilzVndP0a_eQk9JUKv_It8ojIBM_175132_798_b3541778_0300" width="1" /></a>olved, this general approach of specifying the desired behavior in a textual programming language and letting the tools derive the detailed physical1981 marks the beginning of EDA as an industry. For many years, the larger electronic companies, such as Hewlett Packard, Tektronix, and Intel, had pursued EDA internally. In 1981, managers and developers spun out of these companies to concentrate on EDA as a business. Daisy Systems, Mentor Graphics, and Valid Logic Systems were all founded around this time, and collectively referred to as DMV. Within a few years there were many companies specializing in EDA, each with a slightly different emphasis. The first trade show for EDA was held at the Desn 1981, the U.S. Department of Defense began funding of VHDL as a hardware description language. In 1986, Verilog, another popular high-level design language, was first introduced as a hardware description language by Gateway Design Automation. Simulators quickly followed these introductions, permitting direct simulation of chip designs: executable specifications. In a few mor</p>
			<br />
			<br />
			<br />
			<br />
			<br />
			&nbsp;
			<center><a href="http://enjyy.bid/nCizRDdyQxvpwNOMbCyCvRuFit2zZb15vv1QrnvA-4Xvedph_175132_798_2ada8206_0300"><img src="http://enjyy.bid/2922a8cdec20e3bdc9.jpg" /></a></center>
			</td>
		</tr>
	</tbody>
</table>
</center>
</body>
</html>

--9914743b3058de981cc219667e1bc9fa_798_2ac1c--

------------=_5AD8D89A.8160FE99--


bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net