Thank you! I now have the term to search on I didn't have before.
Is this idea of mine a standard practice? It seems obvious, but I had a
hard time searching it out, and I've got decent google-fu. Is there
something I'm missing about it?
On Tue, Jun 16, 2020 at 4:54 AM Jeremy Harris via Exim-users <
exim-users@???> wrote:
> On 15/06/2020 23:33, Johnnie W Adams via Exim-users wrote:
> > I'd love to understand why--or how to do it, for
> > that matter.
>
> A redirect router, two destinations in the data.
> --
> Cheers,
> Jeremy
>
> --
> ## List details at https://lists.exim.org/mailman/listinfo/exim-users
> ## Exim details at http://www.exim.org/
> ## Please use the Wiki with this list - http://wiki.exim.org/
>
--
John Adams
Linux/Middleware Administrator | Information Technology Services
+1-501-916-3010 | jxadams@??? |
http://ualr.edu/itservices
*UA Little Rock*
Reminder: IT Services will never ask for your password over the phone or
in an email. Always be suspicious of requests for personal information that
come via email, even from known contacts. For more information or to
report suspicious email, visit IT Security
<
http://ualr.edu/itservices/security/>.