TIP: Click on subject to list as thread! ANSI
echo: fidosoft.husky
to: KAI RICHTER
from: MARK LEWIS
date: 2015-03-15 13:20:00
subject: Unpacking insecure arcmai

 On Sun, 15 Mar 2015, Kai Richter wrote to mark lewis:

 KR>> I'll always like to learn, which common tossers did/do so?

 ml> fastecho has done so over here for years... there are others which
 ml> also followed but i don't know their names any more...

 KR> Doesn't sound like other common tossers if you can't remember their
 KR> names. ;) 

old age has its benefits...

sorry to hear about the trouble but yes, that's what can easily happen when the
software being used is not configured for or even offering what used to be
commonly offered... too many "new kids" develop "new stuff" and just don't have
the knowledge of the past... in some cases, when old-timers point these things
out, they are blown off with "we don't need that any more" and then you get
what you ran into... granted, it started as an accident by that person who
enabled that setting but that should be OK if the software processed /netmail/
in the insecure inbound... imagine how many paths are truly broken for this one
simple process that should be enabled by default... no wonder folks can get
routed netmail working properly :smh: 

)\/(ark

* Origin: (1:3634/12)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.