On Friday, June 13, 2003, 16:45:52, Travis Rabe wrote:
T> But, if you were say a "wannabe-hacker" within the company or an affiliate
T> of the company that has access to the network, that information can be used
T> for objectionable purposes.

I'd  prefer to have it recorded in the header for comparison against the
logs when there's inside e-mail abuse.

Besides, if you've got a "wannabe-cracker" within the company you should
be  more  concerned  with  port  sweeps  and other cracker tools besides
harvesting IP addresses from e-mail headers.

-- 
[EMAIL PROTECTED]     "The avalanche has already started, it is too
Rod Dorman              late for the pebbles to vote." � Ambassador Kosh


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to