What is wrong with the attached message below this courier 
error, or more likely, why does courier misparse this msg?

--
Dave Johnson
[EMAIL PROTECTED]

-----Original Message-----
From: vnunet.com Bug Watch [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, December 18, 2002 11:23 AM
To: [EMAIL PROTECTED]
Subject: Bugwatch newsletter - The dangers of Russian Roulette


                              CORRUPTED MESSAGE

This is the Courier Mail Server 0.40 on imap. 

I received the following message for delivery to your address.
Unfortunately, 
the sender's mail software did not properly format the following message

according to Internet mail formatting protocols, and I can only deliver
mail 
which has been properly formatted according to Internet standards.
Instead 
of returning the following message as undeliverable, it is saved, in its

original form, in the following attachment, which you can open with any 
editor or word processor. 

Please notify the original sender that their message was not properly 
formatted by their mail software.  The specific mail protocol error in
the 
original message is as follows: 

------------------------------------------------------------------------
-----
The following message contains 8-bit content, but does not have the
required 
MIME headers for 8-bit data transport. 

See <URL:ftp://ftp.isi.edu/in-notes/rfc2045.txt> for more information.
------------------------------------------------------------------------
-----


--- Original Message ---

Received: from smtp.wangtrading.com (smtp.wangtrading.com
[::ffff:192.168.11.11])
  by imap with esmtp; Wed, 18 Dec 2002 11:28:31 -0500
Received: from out2smtp2.edc.dartmail.net (Not Verified[216.73.94.42])
by smtp.wangtrading.com with MailMarshal (v5,0,3,85)
        id <B0000000f8>; Wed, 18 Dec 2002 11:27:27 -0500
Received: from CORE1PUMP2 (unknown [10.50.11.70])
        by out2smtp2.edc.dartmail.net (Postfix) with SMTP id F38EA543E1D
        for <[EMAIL PROTECTED]>; Wed, 18 Dec 2002 16:22:59 +0000 (GMT)
Message-Id: <[EMAIL PROTECTED]>
From: "vnunet.com Bug Watch" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Bugwatch newsletter - The dangers of Russian Roulette
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Date: Wed, 18 Dec 2002 16:22:59 +0000 (GMT)

Dear Subscriber

Welcome to the Bugwatch newsletter from vnunet.com


*************************** ADVERTISEMENT ***************************

Download your free Teleworking report from Colt

Click here now:

http://mail.vnunet.com/cgi-bin1/flo?y=eFEe0CB1jW0EjN0B1Mz0A8

*********************************************************************


Security spending is on the rise but Christine Greenhalgh of BT
Ignite, the telco's business services and solutions division, argues
that, without an integrated approach to information risk assessment,
much of this money could be wasted.

European businesses are expected to spend 5.75bn euros (�3.68bn) on
security in 2005, compared to 1.85bn euros (�1.18bn) in 2001,
according to analyst IDC. But how much of this will actually prove
effective in securing business?

For information risk, all too often it is impossible to say because
companies fail to carry out an assessment prior to their IT security
implementation.

As a result, businesses have no real way of knowing where their
vulnerabilities lie, or where their investment should be focused, or
indeed how to calculate the return on investment.

Without ongoing information risk assessment, organisations are playing
Russian Roulette with their own assets, and those of their customers
and stakeholders.

People can no longer afford either to bury their heads in the sand and
ignore the threats, or to throw money at the problem without balancing
the risk and return.

Attitudes are changing as directors become more accountable for the
risk to their information and corporate data, arguably a company's
most valuable assets.

It is important to take an holistic approach to information risk
assessment. Start with looking at your key business processes and
information assets.

These can take a variety of forms, such as records of financial
transactions, current or potential customer details, and management
information.

The operational impact of an information security breach is often an
area overlooked by organisations, perhaps because of the difficulty of
auditing and mapping the complex set of dependencies.

There is a shortage of skilled people who can understand the issues of
protecting an organisation's information assets and deploy appropriate
cost-effective counter-measures.

The next step is to think about the potential threats. When it comes
to information security it is not enough simply to examine previous
problems that you or others have encountered, and assess the threat
based on how likely they are to happen again.

Information risk can come from a number of different sources. Research
by KPMG shows that, while hackers account for 52 per cent of security
threats to e-commerce, poor policies account for 47 per cent, lack of
awareness 38 per cent and weak products 30 per cent.

In this era of online collaboration, as enterprises expose their
perimeters to customers and business partners, it is also important to
consider the threat of sharing information and connections with
another organisation's network.

Such close links can result in security collaboration and reduced
risk, but may, on the other hand, increase the probability of a breach
of security.

So, both internal and external threats need to be assessed and even
the most extreme and unexpected events considered.

A couple of years ago few organisations would have included the risk
posed by terrorists in an information risk assessment. Now it has to
be considered. In fact, IDC predicts that there will be a major
cyber-terrorism event in 2003.

So, how do you decide how much to invest in protecting different
information assets? Consider the effect of losing your central
database of customer information.

How long could you cope without it? How much time and effort and money
do you spend in mitigating this risk? How much should you invest in
contingency planning, incident response and handling the longer-term
consequences?

When you are clear about where to invest and how to respond, you can
save time by running secure business operations based on a thorough
security policy.

Business decisions and the deployment of new networks or applications
are streamlined as the organisation is not continually reinventing the
wheel.

And there is no point in spending twice as much as the data is
actually worth to your business on protecting it.

Risk assessment is work that is never finished. It is a dynamic
process that depends on the regular assessment of the threat posed by
new risks, and those introduced by new systems, organisations or
business processes.

All this can seem rather daunting, and certainly the ongoing
management of information security requires highly diverse skills
which may not be present in all businesses.

As a result, companies are increasingly using trusted third parties to
help with many aspects of information security, including risk
assessment.

An objective perspective, combined with a collaborative approach, can
supplement existing skills and experience and simplify the process.

By reducing an organisation's exposure to risk, such assessments play
a vital part in safeguarding against the ultimate threat of business
failure.

***************************************

Security on vnunet.com:
For the best news, features and products that might affect or enhance
your business, visit:
http://www.vnunet.com/Security

For more stories plus an in-depth look behind the headlines, radio
programmes, downloads and more, visit our website at:
http://www.vnunet.com

To comment on one of these stories, email us at:
mailto:[EMAIL PROTECTED]

Forums
Post your comments online at the Security Forum here:
http://www.vnunet.com/forums/forum.jsp?forum=5

Change your profile on vnunet.com:
To change the number or nature of the newsletters you receive, or if
you wish to unsubscribe, you can do so easily at:
http://www.vnunet.com/Registration/login.jsp

As this is the last Bugwatch of 2002, vnunet.com would like to take
this opportunity of wishing all our subscribers a merry Christmas and
a happy and prosperous new year.

#########################################################
Note:
This message is for the named person's use only.  It may 
contain confidential, proprietary or legally privileged 
information.  No confidentiality or privilege is waived 
or lost by any mistransmission.  If you receive this 
message in error, please immediately delete it and all 
copies of it from your system, destroy any hard copies 
of it and notify the sender.  You must not, directly or 
indirectly, use, disclose, distribute, print, or copy 
any part of this message if you are not the intended 
recipient. Wang Trading LLC and any of its subsidiaries 
each reserve the right to monitor all e-mail 
communications through its networks.

Any views expressed in this message are those of the 
individual sender, except where the message states 
otherwise and the sender is authorized to state them 
to be the views of any such entity.
#######################################################


-------------------------------------------------------
This SF.NET email is sponsored by: Order your Holiday Geek Presents Now!
Green Lasers, Hip Geek T-Shirts, Remote Control Tanks, Caffeinated Soap,
MP3 Players,  XBox Games,  Flying Saucers,  WebCams,  Smart Putty.
T H I N K G E E K . C O M       http://www.thinkgeek.com/sf/
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to