John Andersen wrote:
> On Wednesday 13 April 2005 09:57 am, Eugene Kurmanin wrote:
>> 5. Copy SPAM to the defined mailbox;
>> 6. Reject SPAM at the DATA stage,
>>    if SPAM score is greater than defined value;
>> 7. Log all activities to syslog.
> 
> Well if you are going to reject, why also accept
> and copy to mailbox.

I can think of situations where you would reject (in order to not assume 
responsibility for the final delivery of the mail) but still want a copy of 
what you rejected for forensic purposes.  Most of them have to do with 
espionage :)

Matthew.van.Eerde (at) hbinc.com                 805.964.4554 x902
Hispanic Business Inc./HireDiversity.com         Software Engineer
perl -e"map{y/a-z/l-za-k/;print}shift" "Jjhi pcdiwtg Ptga wprztg,"

Reply via email to