I work on a simple principle with email. If I can prove that my server has passed the message to the next hop, it's not my problem.
That may sound unhelpful but it's the reality of the situation - if you have logs that show the message left the systems under your control and you know where it went to, it becomes the owner of that systems problem. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
