Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU |
sounds like a valid strategy. Stripping attachments is the best thing you can do. A nice tool to do that and more (e.g. mangle html) http://mailtools.anomy.net/sanitizer.html On Sun, 2003-08-17 at 11:50, Wizard wrote: > A company that I do work for, in an effort to protect itself from it's own > lusers, is considering parsing emails so that any external HREFs inside the > email point to http://localhost. They are also going to parse out all > attachments to a central intranet location, where they will be reviewed by > admins for legitimacy before being forwarded to the addressee. Can anyone > see any problems with this strategy? (It sounds valid to me, but I wanted to > make sure I hadn't missed anything before responding) > Thanks, > Grant M. > > _______________________________________________ > Discuss mailing list > Discuss at blu.org > http://www.blu.org/mailman/listinfo/discuss -- SANS - Internet Storm Center http://isc.sans.org PGP Key: http://isc.sans.org/jullrich.txt -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part URL: <http://lists.blu.org/pipermail/discuss/attachments/20030817/62418d77/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |