TIP: Click on subject to list as thread! ANSI
echo: binkd
to: Fermin Sanchez
from: Oli
date: 2021-05-10 12:37:00
subject: Incoming Netmail from non

Fermin wrote (2021-05-10):
 FS> Noob question, probably - how do others deal with mail
 FS> arricing in the "inbound-nonsecure" folder? Just copy them manually into
 FS> the normal inbound to be processed? Have there been malicious attacks
 FS> with manipulated .pkt files that would warrant such a distinction between
 FS> normal and non-secure inbound mail?

Have a look in the example binkd.cfg:

#
# Run an external program.
# The "*S" macro in command line substed with S.R.I.F., see !SRIF.TXT
# The "!" before program pathname means immediate program execution
#   after receiving the file.
# *** win32 only:
# The "@" before program pathname means execute program in separate console
# The "@@" before program pathname means execute program in hidden console
# ***
# Macros: *F - complete name of received file,
#         *A0..*A9 - first 10 AKA of remote system,
#         *A*, *A@ - list of all remote AKA separated by spaces
#         *P - password protected [0|1],
#         *L - listed system [0|1]
#         *H - remote hostname or IP,
#         *N - short file name (win32 only).
#

something like:

exec "mv *F /ftn/inbound/secure" /ftn/inbound/non-secure/*.[pP][kK][tT]

(on unix)

---
                                                  
* Origin: . (2:280/464.47)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.