or
listings of transmission information for e-mail messages?
My two cents.
Regards
Bruce Fowler
-Original Message-
From: Fields, James [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 26 February 2003 12:35 AM
To: 'pablo gietz'; [EMAIL PROTECTED]
Subject: RE: e-mail policies
Your com
Tony,
It is certainly possible to capture the IP address of the external interface
of the firewall. Something as simple as a tracert could identify this on an
open session. It would certainly be improbable that one could capture the IP
address of anything within your internal network space unless
Now there's your first mistake. She may not know how to do it, but she may
have access to someone who does. Let's get back to first principles people:
There is a world of knowledge accessible to anyone who wants to go looking
for it. NEVER assume the potential for compromise is limited to (your
as