---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
On Thursday, 05 January, 2012 08:30, Marshall Eubanks said:
On Thu, Jan 5, 2012 at 4:51 AM, Keith Medcalf kmedc...@dessus.com wrote:
There is video hosting web sites on the intertubes?
Now where would those
Dave CROCKER [mailto:d...@dcrocker.net] said on Sunday, 30 October, 2011 22:41
On 10/30/2011 8:36 PM, Brian Johnson wrote:
So you support filtering end-user outbound SMTP sessions as this is a
means to prevent misuse of the Commons*. Correct?
If it is acceptable to have the receiving SMTP
no actual security benefit whatsoever. Anyone believing otherwise
is operating under a delusion.
--- Keith Medcalf
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
and
oppressive governments.
I believe the United States was the first with that idea.
--- Keith Medcalf
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
big time. After all, it is the Network Operators
who are the accusers -- not the media mafia.
Each member state creates its own law, according to the directive. In
Portugal, you have to retain the data for one year.
Best Regards,
Luís Marta.
--- Keith Medcalf
() ascii ribbon campaign
Reportedly started by someone operating under the name Flyman, RBN is
known as the mother of cybercrime among online investigators. François
Paget, senior expert for the McAfee company, says that RBN began as an
Internet provider and offered impenetrable hosting for $600 a month.
This meant
Reportedly started by someone operating under the name
Flyman, RBN is known as the mother of cybercrime among
online investigators. François Paget, senior expert for
the McAfee company, says that RBN began as an Internet
provider and offered impenetrable hosting for $600 a
month. This
Autoneg is a required part of the gig E specification so you'd only be
causing yourself trouble by turning it off. (I don't know if
it'll also break automatic MDI/MDI-X (crossover) configuration, for
an example of something that's nice to have.)
At least on 450x series enhanced linecards,
Your scholar is wrong -- or he is giving the simplified explanation for
children and others incapable of rational though and understanding, and you are
believing the summary because it is simpler for you than understanding the
underlying rational.
Notice that in both cases your presumption of
Free speech doesn't include the freedom to shout fire in a crowded theatre.
It most certainly does! There is absolutely nothing to prevent one from
shouting FIRE in a crowded theatre. In fact, any attempt to legislate a
prohibition against such behaviour would, in all civilized countries
I have tried contacting PALM through their listed contact phone numbers and by
email to their postmaster, all to no avail.
I am having problems with their SMTP servers being unable to communicate with
my domain configured SMTP server using Mxed addessing (ie, to
kmedc...@dessus.com) although
and then that's PART of the MTA. Otherwise, it's an add-on
of some sort.
Given that the point I was making was about capabilities *included* in
the MTA, and given that I *said* you could add on such functions, it's
kind of silly to try to confuse the issue in this manner.
CommuniGate Pro
... Dont know what web 2.0 is but the new portal is a web based
object management system complete
with recommended changes and inconsistency lists.
We just added prefix allocation check with backend information
from PCH (prefix checker tool).
Web 2.0 is marketroid drivel-speak for a method
Correct, you need a validating, security-aware stub resolver, or the
ISP needs to validate the records for you.
That would defeat the entire purpose of using DNSSEC. In order for DNSSEC to
actually provide any improvement in security whatsoever, the ROOT ZONE (.)
needs to be signed, and
That would defeat the entire purpose of using DNSSEC. In order for
DNSSEC to actually provide any improvement in security whatsoever,
the ROOT ZONE (.) needs to be signed, and every delegation up the
chain needs to be signed. And EVERY resolver (whether recursive or
local on host) needs
Just because YOU check the digital signature on an email
and forward that email to me (either with or without the
signature data), if I do not have the capability to verify
the signature myself, I sure as hell am not going to trust your
mere say-so that the signature is valid!
If I
On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:
You're forgetting that 587 *is authenticated, always*.
I'm not sure how that makes much of a difference since the
usual spam vector is malware that has (almost) complete
301 - 317 of 317 matches
Mail list logo