Mercury 3.32 with Pop3 and SMTP Relay Clients mounted on Win 2K server.
Pegasus V4.01 mounted on individual local network machines.
Mercury server used to poll 3 remote pop3 boxes and SMTP relay on single remote host. Mail from 2 boxes distributed to dedicated local boxes, Mail from 3rd box...
my humble $00.02
It seems as the entire discussion above is re: Outlook.
As it is open to (severe) exploit in its default configuration, why is it being used so much ?
1. Like Everest, because it's there?
2. Lack of knowledge of other email clients?
3. Because it is well written and works...
Not logging off the server is a security risk as well as a risk the machine can be shut down (thereby killing your critical proccess) by anyone with physical access.
Better to run the process as a service using srvany.exe or possibly the free version of " Fire Daemon " if you do not...
Two suggestions....VPN via the net, or direct dialin RRAS connection. Either situation will allow your users to log on to the network as local users.
As for info on setting up, there are a number of Remote Access
forums on tek-tips, and www.labmice.net is a good source of info for win2k...
If your first post had included the info in the second, you might have gotten a better answer.
Try this link, it will return over 100 whois scripts both free
and shareware, written in php, perl, asp, java, etc.
http://www.hotscripts.com/search/?query=whois&category=all
You will have to...
Each time a file is requested (html, graphic, php, etc) the server will typicaly log the request identifing the requestor.
In the case of a graphic file, this will probably be the webpage (html file) utlizing the graphic. If an html file is requested, (eg: index.html) the requestor is either the...
Requesting review of http://www.islandswestrealestate.com
at your leisure.
Site was designed with cross browser use in mind, so particularly interested in problems found with non-standard browsers eg: opera, etc.
Have tried to check as many different scenarios as possible as to browser...
Thanks for the update David....
Another example of why one cannot just "fire and forget" on any network. Anti Virus programs are by definition, after the fact. No substitute for watching the actions of your own network, and following up on unusual traffic.
Good Job!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.