On Fri, 25 Feb 2005 12:56:50 EST, [EMAIL PROTECTED] said:

> Sorry, I misread that.  But I still fail to see how 587 changes that.
> Trojans, viruses, etc. etc. etc. can still exploit the authentication
> system regardless of what port it operates on.  Different port, same old
> problems.

It changes it only in that it becomes a *lot* easier for you to track down
which of your users has a compromised machine. (It's a lot easier to just look
at the Received: headers than have to take the hostname, chase it back through
your logs, and all that - especially if the user is roaming and just caught
something over their Aunt Tilly's unsecured wireless access point....)

Attachment: pgpwzhVZRBWZ6.pgp
Description: PGP signature

Reply via email to