Subj : Re: CrashMail
To : ACCESS DENIED
From : AVON
Date : Thu Jan 31 2019 07:20 pm
On 09/06/14, Access Denied pondered and said...
AD> My suggestion would be to only toss netmail, and leave the rest
AD> untouched in the unsecure directory. All a sysop would need to do if
AD> they wished to process that tic and file and/or echomail, would be to
AD> move them to the secure inbound directory.
I support this, it's the best way forward IMHO.
AD> to be able to process any netmail. Just recently there were instances
AD> where netmail ended up in someone's unsecure folder, and they didn't
AD> find it there for more than a week until someone mentioned sending
AD> something to that person. But like you said, if it's only that, and
This brings me to the other thing on my mind about all of this and that's
something I'd find useful. If MUTIL can be configured to produce reports that
could be auto posted to nominated message bases around these kinds of activity.
1. The following files were received today (secure files report)
2. The following files were received today (unsecure files report)
3. The following files failed to toss (.tic bad files report)
If we could link these reports to a template and then be able to customise it
and then inject the output to nominated message areas it would be cool. Then
as a sysop I could see at a glance in a s255 message area if I had an issue to
deal with... as like AD I have found .tic's in the bad dir that have failed to
toss files hatched out only by chance when looking into the dir weeks later.
`I'm not expendable, I'm not stupid, and I'm not going' - Kerr Avon, Blake's 7