My Mail Was Rejected By MailScanner

Why are you spamming me?

Many people see e-mails that say that MailScanner has rejected their message as it was spam, or else get reports about them having sent viruses.

That does not mean that the MailScanner development team is in any way associated with the e-mail. It simply means that your Internet Provider, or the Internet Provider of the sender, is using the MailScanner software to scan for viruses and spam.

The MailScanner development team do not send any unsolicited e-mail.

Who altered my e-mail?

Your system administrator or Internet Provider has installed MailScanner, which modified your e-mail. The MailScanner development team are not responsible for things people do with MailScanner. If you do not like the way your mail is processed, please do not complain to us. It will do no good.

Why was the e-mail altered?

Your system administrator or Internet Provider has implemented a policy defining certain unacceptable content in e-mail messages. This may include banning viruses, spam or certain filenames. Each incoming or outgoing e-mail is scanned for unacceptable content, and some of it may therefore be removed or altered.

If you have concerns about the scanning policy, please talk to your system administrator or the support staff at your Internet Provider.

I didn't send a virus -- why does your software claim I did?

Many viruses forge the "From" address. Any recent version of MailScanner knows about the viruses that do this, and does not warn the sender in these cases. If you come across a site that is sending warnings about viruses such as "Klez", please ask them to upgrade to a more recent version.

Who is MailScanner and why are you mucking with my mail?

MailScanner is a software project run by the University of Southampton. It is a popular e-mail scanner which many companies and Internet Providers use to scan mail. It is that program which sent you to this web site.

Remember, although we wrote the program, it is your system administrator who chose to use it, and we have no control over the way it is used or configured.