https://issues.apache.org/bugzilla/show_bug.cgi?id=51873
--- Comment #2 from Jeremy <[email protected]> 2011-09-22 18:39:19 UTC --- Can you please supply the format to use to run the POIFSLister? I found it mentioned on the website but no specification about how to fire it off from the commandline. I'm also going to try some hacks to the current build to see if I can get a work-around that can be supplied as a patch. This issue seems to be specific to the version and method of Outlook used to generate these files. Any modification and re-saving of them fixes the issue. I'm not sure how the hex editor may work as a good percentage of these files also have image attachments that also contain sensitive information. Unless you have any tips for using the editor to also yank out binary attachements without corrupting the original msg? -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
