On Friday, June 13, 2003, 16:45:52, Travis Rabe wrote: T> But, if you were say a "wannabe-hacker" within the company or an affiliate T> of the company that has access to the network, that information can be used T> for objectionable purposes.
I'd prefer to have it recorded in the header for comparison against the logs when there's inside e-mail abuse. Besides, if you've got a "wannabe-cracker" within the company you should be more concerned with port sweeps and other cracker tools besides harvesting IP addresses from e-mail headers. -- [EMAIL PROTECTED] "The avalanche has already started, it is too Rod Dorman late for the pebbles to vote." � Ambassador Kosh To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
