Hi Karl:
It sounds as if you are looking for a way to read messages items in your
Outlook folders. You can accomplish this relatively easily by writing a
small Visual Basic for Appliations Outlook Macro. If you move the suspect
messages (at least temporarily) into some work subfolder in Outlook,
Andy,
I may take you up on that. I'll fire up my .NET environment tonight and
poke around a bit.
I wonder if it would be easier to attack if I dropped it all to a PST
file and rummaged around there, rather then pull through Outlook itself
? I could go straight at the file instead of having to
If I have a Weight 20 test in my global config, but no action for Weight 20
in my domain.junkmail file, will the weight 20 test just be ignored for that
domain?
Been awhile since I had to configure this, I can't remember how this works.
Thanks,
Sharyn
---
This E-mail came from the
Hi Karl:
Sure, I think you could use the CDO interface to open the .pst file (or
access the Exchange message base directly).
I believe the class model for the actual looping of folders and accessing
message item properties may be the same. I think the opening/closing logic
is probably somewhat
---
This E-mail came from the Declude.JunkMail mailing list. To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type unsubscribe Declude.JunkMail. The archives can be found
at http://www.mail-archive.com.
BODY15 PCRE(http://.{3,60}(\.com\.).{3,60}?(\.[a-z]{2,4}/))
This is a regular expression. This is a little more complicated than a
straight filter but essentially I am looking for any URL that has a .com in
the middle and then ends with a different domain extension. It will match on
Without my so much as glancing at the potential false positives, this is
a treasure trove or actual phishing URLs:
http://www.phishtank.com/phish_archive.php
A glance at which tells me that another useful PCRE would be to (pseudo
code follows):
IPADDRESS then (/ character) then stuff including