A system for suppressing delivery of undesirable messages through
vulnerable systems. The system includes an emulator that emulates one or
more of the vulnerable systems. A module associated with the emulator
intercepts undesirable messages, which were originally intended to be
sent through a vulnerable system. One embodiment includes plural
emulators, which include one or more servers that are part of a network
of servers. A controller communicates with one or more servers. In this
embodiment, the controller includes a database capable of storing
statistics pertaining to undesirable messages blocked by one or more of
the servers. The statistics may include information pertaining to the
sender(s) of the undesirable messages. Undesirable messages intercepted
by the network of servers include email spam.