| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Thanks a #$(.)#$ lot, Microsoft... |
From: "Paul Ranson"
The 'stuff' it's breaking really doesn't deserve any protection. If you're
going to do a job do it properly, don't bodge it.
Which doesn't mean that what MS are doing is 'right', just that you were
going to get caught sooner or later.
Paul
"Jeff Shultz" wrote in message
news:pan.2004.10.26.01.04.05.129455{at}shultzinfosystems.com...
> On Wed, 20 Oct 2004 14:21:00 -0400, Mike N. wrote:
>
>> On Wed, 20 Oct 2004 10:30:08 -0700, jeff
>> wrote:
>>
>>>Apparently this is also seen in a _lot_ of YahooGroups/Mail stuff as
>>>well. Terrific job Microsoft - you've come up with a
"feature" that is
>>>going to make it just that much harder to block executable files in
>>>e-mail.
>>
>> It's nearly impossible to reliably block executables with Regex. You
>> almost have to do a full RFC protocol decode of the mime headers.
>
> Which doesn't change the fact that MS has introduced this little wonder
> where it doesn't need to be - and it's breaking stuff.
>
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 396/45 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.