All,
As I read your replies, 1984 plays on Showtime (I kid you not!). The main character
just read a printed letter (prehistoric email) and promptly burned it in his desk side
incinerator.
Thank you for your thoughtful, candid, and emphatic responses. If I may wax
philosophic (and
doesn't get
through. As well, it puts both CPUs in the server up to 100% rejecting the
mail, slowing the server down for everyone else.
SMTP logs are filled with thousands of entries like this:
20030227 091017 127.0.0.1 SMTPD (003A0640) [217.82.173.37] RCPT TO:
[EMAIL PROTECTED]
20030227
I'll trust you on that, and apologize for the roundhouse
classification. Yet in your several dozen cases where divorces were
contemplated, employee terminations took place, even people who were
sent back to prison and kids who have been grounded examples,
clearly your
with a professional spammer-for-hire (who is also
an idiot). Those IPs are real -- they are the IPs of servers that he has
compromised. That's how he can send 20-30 messages a second.
20030227 091017 127.0.0.1 SMTPD (003A0640) [217.82.173.37] RCPT TO:
[EMAIL PROTECTED]
20030227 091017 127.0.0.1
The recurring theme I'm seeing in this thread is a concern of being
implicated in the misuse of the Declude (or similar) tools to punish someone
wrongly. That's a valid concern.
What's being left unsaid is a concern of previously established tools (such
as high speed internet access and Email)
On 02/27/03 9:32am you wrote...
I'll trust you on that, and apologize for the roundhouse
classification. Yet in your several dozen cases where divorces were
contemplated, employee terminations took place, even people who were
sent back to prison and kids who have been
The term spyware refers to software whose sole purpose is to surreptitiously gather
and transmit
information about a user. A firewall log is a neutral record of general internet
activity. Any
reasonably informed adult who uses the internet should understand their actions may be
logged, in
the
In a corporate setting a company may or may not have an
Internet/email/conduct policy. If not, it may be very dificult to fire
someone for conduct that they didn't agree to abide by and if it came to
a lawsuit they would probably loose. In fact the company could loose
twice. Once by someone who
My feelings are along this same line. It seems that this questions revolves
around what the stated company policy is regarding usage of these company
resources. As stated in several emails before, email and internet usage and
the computers they are used are are company owned assets and should be
Below is an overview of what I believe is most relevant to me (in reverse
chronological order), thank you for helping me clarify a troubling situation!:
I believe the fact that some employers may misuse information to mistreat
employees is countered by the fact that some employees abuse the
logs are filled with thousands of entries like this:
20030227 091017 127.0.0.1 SMTPD (003A0640) [217.82.173.37] RCPT TO:
[EMAIL PROTECTED]
20030227 091017 127.0.0.1 SMTPD (003A0640) [217.82.173.37] ERR
domain.com invalid user [EMAIL PROTECTED]
20030227 091017 127.0.0.1 SMTPD
11 matches
Mail list logo