Archived posting to the Leica Users Group, 1996/06/24

[Author Prev] [Author Next] [Thread Prev] [Thread Next] [Author Index] [Topic Index] [Home] [Search]

To: leica-users@mejac.palo-alto.ca.us, leica-users@mejac.palo-alto.ca.us
Subject: Re: what to about intrusions
From: gang@mtdcr.mt.lucent.com
Date: Mon, 24 Jun 1996 14:11:06 -0400
Original-From: Gang Huang <gang@mtdcr.mt.lucent.com>

At 10:57 AM 6/24/96 -0600, Arthur Wouk wrote:
>how to defend our mail list. fight back by protesting to the
>appropriate sources.
>
One possibility is for the mailing list to check the address of the the
sender before it broadcasts the message. If the address of the sender does
not belong to the list, it simply discard or returns the message. Most
mailing list software provides this feature. 

------------------------------------
Gang Huang
Advanced Communications Technologies
Bell Laboratories
200 Laurel Ave. 3B-216
Middletown, NJ 07748
U.S.A.
(908) 957-3524
gang@mtdcr.mt.lucent.com
------------------------------------