Aaron> Well, the files are date stamped right in the file name... Ives> I've found that you can take this a step further by tracking Ives> registry deltas...
John> What if it got hacked, then a minute later your backup ran and John> backed up the hacked registry which overwrote the previous John> backup. Perhaps what y'all are overlooking is that if someone knows they're hacking an IMail Registry, the smart thing to do is not to mangle any of the existing accounts, but to add additional accounts and/or domains to allow for mail snooping, spam relay, etc. A dumb hacker might wipe everything by accident, but a smart one could get a lot out of your server without you knowing. On the general Declude GUI note, Aaron, have you looked at the solutions we built using the IMail web server--and thus taking advantage of its built-in authentication, authorization, and tags? -Sandy ------------------------------------ Sanford Whiteman, Chief Technologist Broadleaf Systems, a division of Cypress Integrated Systems, Inc. e-mail: [EMAIL PROTECTED] ------------------------------------ To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
