Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • A fairly obvious disadvantage would be if someone sends you email who also has such an authentication scheme going on: your request that the sender authenticate himself first is going to bounce off his filter with a request that *you* authenticate yourself first, which results in your filter sending back an email... you get the point.

    How would you avoid that? You probably can't really. I think this sort of thing only works if you think you are (no offense intended now) so important that people will voluntarily jump through hoops to send you email, and will keep trying if they think their message is important enough.
    --

    -- 
    Esli epei eto cumprenan, shris soa Sfaha.
    Aettot ibrec epesecoth, spakhea scrifeteis.