Hi All
How many of you would like to agree with me that 'BCC' getting deleted from
"sendmail", an MTA, is a real head-ache for Email Administrators as they have
to keep watch on Enterprise-data and its forwarding to others for
"consideration"?
Don't you think we all should request the "great people" who maintain
sendmail/procmailrc to disable this feature looking into recent times?. So much
of information flows out of an organizations and as there are no to-headers
where the information has gone, we feel helpless and buy the clues of the
sender that "it went for safe reason".
Incase any one of you have overcome this problem, I shall be grateful to you if
you passon the methods to control thru 'bcc', what we call in today's world,
"Industrial Espionage".
best regards to all.
ShashankK
----- Original Message -----
From: Dan Jacobson
To: procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
Sent: Tuesday, July 01, 2003 6:23 AM
Subject: Re: Bounce message for filtered mail via procmail?
>>>>> "P" == Professional Software Engineering
<PSE-L(_at_)mail(_dot_)professional(_dot_)org> writes:
P> Kinda, 'cept your not forwarding the stripped message to the
P> orignal recipient, but firing it off back at the person you BELIEVE
P> sent the message, which 9 out of 10 times isn't the infected user
P> that sent the message.
Are there any clues for a non-root user examining headers with
procmail or spamassassin that a suspected spam is safe to bounce too,
and not an innocent 3rd party?
I suppose if we were sure about that then should also know if it is
spam or not in the first place.
_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail
_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail