On Tue, 13 Jun 2006, L. Jason Godsey wrote:
>
> It is trivial to block all outbound traffic destined for mail ports,
> then allow for certain local accounts.
They have to authenticate somehow, and if the machine is hacked then the
hacker can authenticate in the same way.
Tony.
--
<fanf@???> <dot@???>
http://dotat.at/ ${sg{\N${sg{\
N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\
\N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}