On Sat, Jun 20, 1998 at 09:19:29AM -0400, Spencer Yost wrote: > I have band-aided the problem by having the remote system admin add the > user so it is no longer bogus... Have the remote admin forward the messages to you and you can figure out what systems the message is passing through by looking at the headers. Is there a reason you think this is a deliberate attack as opposed to a broken forwarding setup? I see one or two of these a year, usually. -- ::: Lazlo ([EMAIL PROTECTED]; http://www.swcp.com/lazlo) ::: Internet Music Wantlists: http://www.swcp.com/lazlo/Wantlists
- Pentium II Xeon Processor - Product Launch Briefing Bill Garnett
- Re: Pentium II Xeon Processor - Product Launch Br... Manar Hussain
- Re: Pentium II Xeon Processor - Product Launc... Michael C. Berch
- Re: Pentium II Xeon Processor - Product Launc... Ronald F. Guilmette
- Re: Pentium II Xeon Processor - Product L... Bill Houle
- Re: Pentium II Xeon Processor - Product Launch Br... Mike Nolan
- Re: Pentium II Xeon Processor - Product Launc... Manar Hussain
- Re: Pentium II Xeon Processor - Product Launc... Chuq Von Rospach
- Problem with annoyance attacks Spencer Yost
- Re: Problem with annoyance attacks Lazlo Nibble
- Re: Problem with annoyance attacks Ronald F. Guilmette
