Mercury 3.32 with Pop3 and SMTP Relay Clients mounted on Win 2K server.
Pegasus V4.01 mounted on individual local network machines.
Mercury server used to poll 3 remote pop3 boxes and SMTP relay on single remote host. Mail from 2 boxes distributed to dedicated local boxes, Mail from 3rd box...
my humble $00.02
It seems as the entire discussion above is re: Outlook.
As it is open to (severe) exploit in its default configuration, why is it being used so much ?
1. Like Everest, because it's there?
2. Lack of knowledge of other email clients?
3. Because it is well written and works...
Not logging off the server is a security risk as well as a risk the machine can be shut down (thereby killing your critical proccess) by anyone with physical access.
Better to run the process as a service using srvany.exe or possibly the free version of " Fire Daemon " if you do not...
Two suggestions....VPN via the net, or direct dialin RRAS connection. Either situation will allow your users to log on to the network as local users.
As for info on setting up, there are a number of Remote Access
forums on tek-tips, and www.labmice.net is a good source of info for win2k...
If your first post had included the info in the second, you might have gotten a better answer.
Try this link, it will return over 100 whois scripts both free
and shareware, written in php, perl, asp, java, etc.
http://www.hotscripts.com/search/?query=whois&category=all
You will have to...
Each time a file is requested (html, graphic, php, etc) the server will typicaly log the request identifing the requestor.
In the case of a graphic file, this will probably be the webpage (html file) utlizing the graphic. If an html file is requested, (eg: index.html) the requestor is either the...
Requesting review of http://www.islandswestrealestate.com
at your leisure.
Site was designed with cross browser use in mind, so particularly interested in problems found with non-standard browsers eg: opera, etc.
Have tried to check as many different scenarios as possible as to browser...
Thanks for the update David....
Another example of why one cannot just "fire and forget" on any network. Anti Virus programs are by definition, after the fact. No substitute for watching the actions of your own network, and following up on unusual traffic.
Good Job!
Thanks for starting this thread Pansophic. We will be downloading and starting evaluation on at least Smoothwall and Astaro installed on a surplus box within 3 weeks. Look forward to other users comments on these and/or other systems.
Presently using software based firewall on primary NAT...
shirleyowl
sensitive data = anything you can not recreate. eg:
email files, graphics files, database contents, mailing lists,
word processing docs, etc.
Reason not to save program dll files and executable files of any type: These are the files that are overwritten/modified/added during a...
Drastic Measures.....
Open ME.
Save all sensitve data to second drive. Do not save executable files, or config data.
Reformat (low level) boot drive.
Reinstall ME (Personaly I would have stuck to 98 to begin with)
Reinstall all software.
Restore data from 2nd drive.
Remember, its easier to...
Have not seen a discussion of this posted, so thought I would pass it along.
As of January 22, 2003 MS has posted an alert and patch for the MS Locator service running on 2K servers (also NT4). Security level is critical for domain controlers where Locator Service is run by default. Buffer...
Have not seen a discussion of this posted, so thought I would pass it along.
As of January 22, 2003 MS has posted an alert and patch for the MS Locator service running on 2K servers (also NT4). Security level is critical for domain controlers where Locator Service is run by default. Buffer...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.