>How ? sitting aside and pointing them with a gun ?

no, but at least you have a trace of who logged on and used the bogus MAIL 
FROM:, a trace which you don't have if the person relays from a trusted 
relay- for address.

>Also, by the time the stoled user knows what's going on, the injuried one
>kills him, burn the house, and kidnap his daughter! And the stoler is
>watching all like BigBrother !!

Please inform you users NOT to trust any email headers, until they do a 
confirmation handshake with the sender (reply-to and then get an 
appropriate reply to their reply-to).

And tell all your users also that, for national entertainment reasons, all 
mail through your Imail server is bcc�d to the tech staff and their 
families and drinking buddies to be reveiwed for humorous and lascivious 
content.

Len


http://MenAndMice.com/DNS-training
http://BIND8NT.MEIway.com : ISC BIND 8.2.4 for NT4 & W2K
http://IMGate.MEIway.com  : Build free, hi-perf, anti-abuse mail gateways


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to