>How ? sitting aside and pointing them with a gun ?
no, but at least you have a trace of who logged on and used the bogus MAIL
FROM:, a trace which you don't have if the person relays from a trusted
relay- for address.
>Also, by the time the stoled user knows what's going on, the injuried one
>kills him, burn the house, and kidnap his daughter! And the stoler is
>watching all like BigBrother !!
Please inform you users NOT to trust any email headers, until they do a
confirmation handshake with the sender (reply-to and then get an
appropriate reply to their reply-to).
And tell all your users also that, for national entertainment reasons, all
mail through your Imail server is bcc�d to the tech staff and their
families and drinking buddies to be reveiwed for humorous and lascivious
content.
Len
http://MenAndMice.com/DNS-training
http://BIND8NT.MEIway.com : ISC BIND 8.2.4 for NT4 & W2K
http://IMGate.MEIway.com : Build free, hi-perf, anti-abuse mail gateways
Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.
An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/