I'm not familiar with Domino so configuration may be different, but when
you set up your mail server, were you not prompted to enter details about
relay hosts and relay targets? - ie. specifying which IP address(es) the
mail server should receive mail from (usually ONLY your firewall) and which
Kevin
F-Secure do a product called FileCrypto which encrypts files, and may be
the kind of thing you're looking for. The link below will give you more
information:
http://www.f-secure.com/products/filecrypto/desktop.shtml
Mel
At 02:58 PM 3/19/2003 +, Kevin Wharram wrote:
All,
I
I'd like to add a few more English Universities to the list:
South Bank in London:
http://www.courses.sbu.ac.uk/postgrad/p2CourseHeaders.asp?v1=4&v2=32
Oxford Brookes:
http://www.brookes.ac.uk/courses/currentpg/directory/taught/computing_it.html
Cambridge: http://www.admin.cam.ac.uk/univ/gspro
Not that I'm aware of. CheckPoint NG can be configured for mail content
scanning but its abilities are limited, and it is intended to be used with
a dedicated content scanning product such as MailSweeper, which does comply
to all SMTP RFCs.
Please correct me if I'm wrong!
Mel
At
one, and I think you can
also get it to send a copy of the email to the administrator if the email
contains certain key words. The website is www.mimesweeper.com
Mel
At 09:50 PM 2/11/2003 -0800, laurence field wrote:
I would like to get feedback on the quality/usefulness
of email cont
et/windows/filearchive/IDScenter1.0.9.html
Mel
At 08:18 AM 1/28/2003 -0600, Mike Heitz wrote:
Chris,
Just out of curiosity I've never found Snort for the Windows
platform. Do you have a link for this?
mike heitz ** sr it manager ** UPSHOT
312-943-0900 x5190
-Original Message-
Fr
regarding this, it is still not clear to me whether the attachment actually
has to be run my the user in order for the computer to be infected.
Advice would be greatly appreciated
Thanks in advance
Mel
At 03:03 PM 1/3/2003 -0700, Dean Turner wrote:
Folks,
Earlier today I inadvertantly approved a
I think Mondo Rescue might be what you're looking or. It's a
back-up/disaster recovery tool which creates an image of either your entire
filesystem or a subset of your files, and can be found at
http://www.microwerks.net/~hugo/
At 03:42 PM 24/12/2002 +0530, [EMAIL PROTECTED] wrote:
hi all,
Hi
I'm a newcomer to the Security arena and am currently trying to get to
grips with honeypots, IDSs and firewalls for my dissertation. I'm running
NFR's Back Officer Friendly on my home computer, configured to listen for
Back Orifice, FTP, Telnet, SMTP, HTTP, POP3 and IMAP2, and something w