Am 09.07.2012 07:36, schrieb KHP: > Am 08.07.2012 22:01, schrieb Julien Vehent: >> On 2012-06-23 2:28, KHP wrote: >>> just for training as spam/ham - you can do that already, just open >>> a >>> specific url with the part after !DSPAM, the username (has to be >>> configured) and login+password like that: >>> >>> >>> http://<username>:<password>@<dspamserver>/dspam.cgi?user=<username>&retrain=spam&signatureID=<the >>> >>> mentioned part> for training spam >>> >>> that was the way i did it for 2003 and older and it worked fine >> username and password on HTTP GET requests means that you're leaking >> credentials into your webserver logs. >> >> Gotta be careful with that... > since our dspam-server is intranet only (and the admin sets the > passwords for the user-accounts too - independent from every other > login), it's sort of ok i think. if you can't trust your admin, who > else?
Batman? > > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions > will include endpoint security, mobile security and the latest in > malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Dspam-user mailing list > Dspam-user@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/dspam-user ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Dspam-user mailing list Dspam-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/dspam-user