Ah, I see your point. But I have worked someplace that blocked any type of web-based email for fear a virus or worm could come into the organization that way. I also have to think that any company that is going to be watching email so closely is likely to be watching web traffic as well and going to a site that may look curious may raise the wrong kinds of questions. J.T. Shyman Column Technologies <mailto:[EMAIL PROTECTED]>
________________________________ From: Action Request System discussion list(ARSList) on behalf of Will Du Chene Sent: Fri 12/7/2007 3:23 AM To: [email protected] Subject: Re: Friday Humor (U) ** "...Will, I like your idea and it makes sense but I?ve worked places where circumventing the IT department?s security, i.e. by going through a tunnel to an outside mail server..." Hhrrmm... Argh... D'oh! That's not exactly what I meant to suggest. Circumventing departmental policy usually ends in just one way: bad. Usually after that, there is a "Mr. Yuck" stigmata that gets associated with the guilty. Sadly, I've seen it happen to people. (One would think that common sense would prevail, but Darwin does have his shining moments in IT.) In the instance I was trying to describe, the overall effect is the very same that would take place if one were to go to an online bank and see the "https" prepended to the web server name in the address bar of the browser. Essentially, it's a simple way of securing the pages that an end user might be viewing. Typically, this sort of traffic is allowable in most environments, except those that implicitly block it. Most web mail services also employ something similar to allow the credentials for the user to pass through the authentication stage before switching back to a normal, unencrypted mode of operations. From an administrivia side, using the package allows an admin to get away with one set of certs for a group of services, rather than one for the web server, one for the MTA, etc. Most companies have some form of secure webmail anyway. Just extending upon that thought a bit. __20060125_______________________This posting was submitted with HTML in it___ _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

