On Fri, 25 Feb 2005 12:56:50 EST, [EMAIL PROTECTED] said: > Sorry, I misread that. But I still fail to see how 587 changes that. > Trojans, viruses, etc. etc. etc. can still exploit the authentication > system regardless of what port it operates on. Different port, same old > problems.
It changes it only in that it becomes a *lot* easier for you to track down which of your users has a compromised machine. (It's a lot easier to just look at the Received: headers than have to take the hostname, chase it back through your logs, and all that - especially if the user is roaming and just caught something over their Aunt Tilly's unsecured wireless access point....)
pgpwzhVZRBWZ6.pgp
Description: PGP signature