Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU |
> > > It's also possible (though tedious) for someone to get a reasonable > approximation of the company employee directory by hitting th email server, > unless that company uses nonsense email addresses. Such a directory could > be of great use to headhunters and those interested in industrial espionage, > especially if they're searching for prominent names in the field. Right. This is called a dictionary attack and I would hope that the email system is configured against it. Sendmail's flow-control takes care of this easily, though I believe it can also be done through the MTA directly. ~Matt -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |