9/29/2010 6:13 PM
Hi Vili,
On 9/29/2010 Vili wrote:
>> probably compromised) SSL servers. That's why our core users value us:
>> the system administrators put The Bat! to their users and can sleep
>> well. The users won't send a message to a compromised servers. This is
>> the unique trait o
> probably compromised) SSL servers. That's why our core users value us:
> the system administrators put The Bat! to their users and can sleep
> well. The users won't send a message to a compromised servers. This is
> the unique trait of The Bat! and we don't want to loose this niche.
Before an
Hello Alto,
Wednesday, September 29, 2010, 6:32:58 PM, you wrote:
> What you describe should be achieved using a management tool like
> Windows Group Policy.
Thank you very much for the idea, we will consider implementing it.
--
Best regards,
Maximmailto:m...@ritlab
On Monday, September 27, 2010, 18:17:05, Vilius Šumskas wrote:
> Bad cert is not The Bat!'s fault. And providing an option to bypass
> that, is a security risk as explained numerious times on this list.
Yes, because you can always trust those signed certificates.
--
< Jernej Simončič ><><><>
Hi Maxim,
> That's why our core users value us: the system administrators put
> The Bat! to their users and can sleep well. The users won't send a
> message to a compromised servers. This is the unique trait of The
> Bat! and we don't want to loose this niche.
What you describe should be achieve
Hello Thomas,
You can use stunnel (www.stunnel.org) to send your message. Stunnel
ingores the errors, while you send to stunnel via regular connection.
A sophisticated user will send via stunnel without a problem. For the
user who is unaware about these matters and is unable to configure
6 matches
Mail list logo