There is much interest here in the idea of blocking email carrying
ExploreZip so we don't have to rely on end-user intelligence(?!) to
prevent an infestation. I realise that sticking filters into the pipe
like this is not necessarily as good idea but nonetheless ...

Assuming I had a reliable "fingerprint" in a mail message, I could write
a quick perl script to parse for that fingerprint and `cat /dev/null`
any mail matching the print (or maybe just forward it to me or
whatever). My questions are a) has anyone inserted scripts into the pipe
like this before, b) does anyone have an example script, c) how do I go
about putting it into the pipe?

My Setup: I have and external mail gateway running qmail which forwards
legit mail to an internal mail hub running Netscape Messaging Server,
which the end-users access with IMAP.

A qmail savvy friend of mine has indicated that this is _not_ a good
idea but nonetheless I need to consider it.

-- 
___________________________________________________________________
Mark E Drummond                    Royal Military College of Canada
[EMAIL PROTECTED]                                Computing Services
Linux Uber Alles                                        perl || die

       ...there are two types of command interfaces in the world of
                    computing: good interfaces and user interfaces.
                                   - Dan Bernstein, Author of qmail

PGP Fingerprint = 503D A72D AF41 2AD1 D433 C514 98D9 9A39 B25A 2405

Reply via email to