Aaron> Well, the files are date stamped right in the file name...

Ives> I've  found  that  you  can take this a step further by tracking
Ives> registry deltas...

John> What  if  it got hacked, then a minute later your backup ran and
John> backed  up  the  hacked  registry  which  overwrote the previous
John> backup.

Perhaps  what  y'all  are overlooking is that if someone knows they're
hacking  an IMail Registry, the smart thing to do is not to mangle any
of  the  existing  accounts,  but  to  add  additional accounts and/or
domains  to  allow  for  mail snooping, spam relay, etc. A dumb hacker
might wipe everything by accident, but a smart one could get a lot out
of your server without you knowing.

On  the  general  Declude  GUI  note,  Aaron,  have  you looked at the
solutions  we  built  using  the  IMail  web  server--and  thus taking
advantage of its built-in authentication, authorization, and tags?

-Sandy


------------------------------------
Sanford Whiteman, Chief Technologist
Broadleaf Systems, a division of
Cypress Integrated Systems, Inc.
e-mail: [EMAIL PROTECTED]
------------------------------------


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to