
| Current Path : /home/ift/mails/32/ |
Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64 |
| Current File : //home/ift/mails/32/1530445065.zrspam.328655_2018_07_01 |
From 34601-30643-248207-6789-christian.gabriel=ift-informatik.de@mail.stykkmatch.bid Sun Jul 1 13:37:45 2018
Return-Path: <34601-30643-248207-6789-christian.gabriel=ift-informatik.de@mail.stykkmatch.bid>
X-Original-To: cgabriel@ift-informatik.de
Delivered-To: cgabriel@ift-informatik.de
Received: by ift-informatik.de (Postfix, from userid 5555)
id 85E023D200AA0; Sun, 1 Jul 2018 13:37:45 +0200 (CEST)
Received: from localhost by h2486555.stratoserver.net
with SpamAssassin (version 3.4.0);
Sun, 01 Jul 2018 13:37:45 +0200
From: "Seek Verify" <info@stykkmatch.bid>
To: <christian.gabriel@ift-informatik.de>
Subject: *****SPAM***** What can people find out about YOU?
Date: Sun, 1 Jul 2018 07:37:38 -0400
Message-Id: <r88507y6kg2icdrr-0cmcieap5k0jnnwj-77b3-3c98f@stykkmatch.bid>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
h2486555.stratoserver.net
X-Spam-Flag: YES
X-Spam-Level: ******
X-Spam-Status: Yes, score=6.5 required=5.0 tests=BAYES_00,DIGEST_MULTIPLE,
DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HTML_FONT_LOW_CONTRAST,HTML_MESSAGE,
PYZOR_CHECK,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,
RCVD_IN_PSBL,RDNS_NONE,T_REMOTE_IMAGE autolearn=no autolearn_force=no
version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_5B38BD09.5A5DF312"
This is a multi-part message in MIME format.
------------=_5B38BD09.5A5DF312
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Spam detection software, running on the system "h2486555.stratoserver.net",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
@@CONTACT_ADDRESS@@ for details.
Content preview: What can people find out about YOU? http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643
http://stykkmatch.bid/5uvTD3b6EiFl8t1HXC-Ldf9xtemr0A6RBe2d1gOcqNkpvdgJ_34601_30643
[...]
Content analysis details: (6.5 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
2.7 RCVD_IN_PSBL RBL: Received via a relay in PSBL
[195.110.9.88 listed in psbl.surriel.com]
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0000]
0.0 HTML_MESSAGE BODY: HTML included in message
0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to
background
1.4 PYZOR_CHECK Listed in Pyzor (http://pyzor.sf.net/)
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's
domain
0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
[cf: 100]
0.9 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/)
1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
above 50%
[cf: 100]
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.3 DIGEST_MULTIPLE Message hits more than one network digest check
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
0.0 T_REMOTE_IMAGE Message contains an external image
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
------------=_5B38BD09.5A5DF312
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 8bit
Received: from yoke.stykkmatch.bid (unknown [195.110.9.88])
by ift-informatik.de (Postfix) with ESMTP id 5F4753D200018
for <christian.gabriel@ift-informatik.de>; Sun, 1 Jul 2018 13:37:43 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=stykkmatch.bid;
h=Mime-Version:Content-Type:Date:From:Reply-To:Subject:To:Message-ID; i=info@stykkmatch.bid;
bh=f+oUl/RA0eWB2vp6jXu3aLGlXnI=;
b=Xc1LsMzCGF6q99elZsZJ6HYZEASVHEDBPUiEqvQynVKWmTzT1QcSnV/MWYJPgJH5NhZ8NqupEtaF
m+U1Oumjlr4IYOSRsFYokmXmv4G8YRfqsB8d2Yi79DZfufWnNahR/U3EoLdGTiBcHFP3e8RKCP8z
nKF35mKAuwf1/wGkJi8=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=stykkmatch.bid;
b=cMIXxw4zrwH1jkKMqhCuk4rjcc7m/KqGgR5uOP0RB66SrqCIiJqeZmC7i0hmCWLmC8494Eu6AB4Y
LJO4QiPvGeV8w74YzDz9zcVeSb0YW/H7K/4vDcdMviz0Gt8FWFOTdKAiTBnOkCymd079odBi/5oI
Z4oS3vjkEqs2HQAUJJQ=;
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="d7c12a19a8b2a311e1ed298655a125b9_77b3_3c98f"
Date: Sun, 1 Jul 2018 07:37:38 -0400
From: "Seek Verify" <info@stykkmatch.bid>
Reply-To: "Seek Verify" <info@stykkmatch.bid>
Subject: What can people find out about YOU?
To: <christian.gabriel@ift-informatik.de>
Message-ID: <r88507y6kg2icdrr-0cmcieap5k0jnnwj-77b3-3c98f@stykkmatch.bid>
--d7c12a19a8b2a311e1ed298655a125b9_77b3_3c98f
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit
What can people find out about YOU?
http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643
http://stykkmatch.bid/5uvTD3b6EiFl8t1HXC-Ldf9xtemr0A6RBe2d1gOcqNkpvdgJ_34601_30643
The notion of negotiation may arise from the learning of scial roles throughrsonal experience.negiation is a process in which a person negotiates with society at large regarding the meaning of his or her .Psychologists most commonly use the term "" to describe psonal , or the idioscratic things that make a person unique. Meanwhile, socogists often use the term to social identity, or the collection of group memberships that define the individual. However, these uses are not proprietary, and each discipline may use either concept and each discipline may combine both concepts when considering a person's identity.The description or reprntation of and group identity is a central task for psychogists, sociologists and anthropologists and those of other disciplines where "identity" needs to be mapped and defined. How should one describe the identity of another, in ways which encompass both their idiosyncratic qualities and their group memberships or identifications, both of which can shift according to circumstance? Following on from the work of Kelly, Erikson, Tajfel and others Weinreich's Identity Structure Analysis (ISA), is "a structural represetion of the indidual's existential experience, in which the relationships between self and other agents are organised in relatively stable structures over time … with the emphasis on the socio-cultural milieu in which self relates to other agents and instutions" (Weinreich and Saunderson, (eds) 2003, p1). Using constructs drawn from the salient discourses of the indivual, the group and cultural norms, the practical operationalisation of ISA provides a methodology that maps how these are used by the ividual, applied across time and milieus by the "situated self" to appraise self and other agents and institutions (for example, resulting in the individus
--d7c12a19a8b2a311e1ed298655a125b9_77b3_3c98f
Content-Type: text/html;
Content-Transfer-Encoding: 8bit
<html>
<head>
<title>Seek Verify</title>
</head>
<body><a href="http://stykkmatch.bid/IrTG1aaBp5d5I7M_h36y1e0XmIHZhHZgS6_xGHQYy31Wtg_34601_30643"><img src="http://stykkmatch.bid/e1a835338b93fca77c.jpg" /><img height="1" src="http://www.stykkmatch.bid/o-r53LKemdnImHun4hOkYRVsHSk0Kw4QEil7AyXFVhCPdBtH_34601_30643" width="1" /></a><br />
<center>
<div style="width:550px;align:center;"><span style="float:right;font-size:14px;">Are Pictures not Showing in Email?<a href="http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643">open in your browser</a> </span><br />
</div>
<div style="border:5px solid #23382d;background-color:#c0c78b;width:550px">
<div style="font-family:arial Fax;font-size:23px;width:550px;text-align:center;">
<hr /><br />
<a href="http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643" style="text-decoration:none;;color:#353c8c;padding:5px;">What can people find out about YOU?</a></div>
<center><a href="http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643"><img alt=" " src="http://stykkmatch.bid/6f121008d3846584a7.jpg" style="width: 443px; height: 83px;" /></a></center>
<p style="text-align:left;font-size:14px;padding:8px;">Hello,<br />
<br />
Anyone can run a search about you on SeekVerify They could be doing it RIGHT NOW...</p>
<a href="http://stykkmatch.bid/SCDQLqCn3ACFniQLcMFaOK76mor-YGovdH-_QdKJmmopostD_34601_30643"><img alt=" " src="http://stykkmatch.bid/bc11b8f00505de4921.jpg" /></a>
<p style="text-align:left;font-size:14px;padding:5px;">..and this is what they could see...</p>
</div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<a href="http://stykkmatch.bid/g6squJY58e_VAUBDcJf4ArY3tgV4EqBDRZXtIY0wvQhhQN4_34601_30643"><img alt="" src="http://stykkmatch.bid/444e7c86b0fe6ef351.jpg" /></a><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<a href="http://stykkmatch.bid/5uvTD3b6EiFl8t1HXC-Ldf9xtemr0A6RBe2d1gOcqNkpvdgJ_34601_30643"><img alt=" " src="http://stykkmatch.bid/a00a4e48de45ca6da3.jpg" /></a></center>
<span style="font-size:7px;color:#ffffff;">The notion of negotiation may arise from the learning of scial roles throughrsonal experience.negiation is a process in which a person negotiates with society at large regarding the meaning of his or her .Psychologists most commonly use the term "" to describe psonal , or the idioscratic things that make a person unique. Meanwhile, socogists often use the term to social identity, or the collection of group memberships that define the individual. However, these uses are not proprietary, and each discipline may use either concept and each discipline may combine both concepts when considering a person's identity.The description or reprntation of and group identity is a central task for psychogists, sociologists and anthropologists and those of other disciplines where "identity" needs to be mapped and <a href="http://stykkmatch.bid/IrTG1aaBp5d5I7M_h36y1e0XmIHZhHZgS6_xGHQYy31Wtg_34601_30643"><img src="http://stykkmatch.bid/e1a835338b93fca77c.jpg" /><img height="1" src="http://www.stykkmatch.bid/o-r53LKemdnImHun4hOkYRVsHSk0Kw4QEil7AyXFVhCPdBtH_34601_30643" width="1" /></a>defined. How should one describe the identity of another, in ways which encompass both their idiosyncratic qualities and their group memberships or identifications, both of which can shift according to circumstance? Following on from the work of Kelly, Erikson, Tajfel and others Weinreich's Identity Structure Analysis (ISA), is "a structural represetion of the indidual's existential experience, in which the relationships between self and other agents are organised in relatively stable structures over time … with the emphasis on the socio-cultural milieu in which self relates to other agents and instutions" (Weinreich and Saunderson, (eds) 2003, p1). Using constructs drawn from the salient discourses of the indivual, the group and cultural norms, the practical operationalisation of ISA provides a methodology that maps how these are used by the ividual, applied across time and milieus by the "situated self" to appraise self and other agents and institutions (for example, resulting in the individus</span><br />
<br />
<br />
<br />
<br />
</body>
</html>
--d7c12a19a8b2a311e1ed298655a125b9_77b3_3c98f--
------------=_5B38BD09.5A5DF312--