Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Can Notes be attacked by Viruses?

attacked notes viruses
0
Posted

Can Notes be attacked by Viruses?

0

Here is a useful posting by [email] Christopher Feller: “…Notes is an entirely different paradigm. One of the reasons viruses and attacks on internet-based systems happen so frequently, is that the initiators are anonymous. They don’t have to worry about retribution or punishment. However, you don’t attack a Notes server anonymously like a Firewall or FTP server. You can’t even begin to touch a Notes server unless someone has created an ID for you. And as soon as an ID exists, there’s an electronic trail to follow, I don’t care what fields you delete. Someone creates an anonymous mail-bomb? Fine. I’ll just trace through all the servers listed in the RouteServers field to find where the initial mail came from. Then I’ll check the RouteTimes/PostedDate and compare that to the Notes Log to see when it was routed through that server. Then I’ll check to see who was logged in and bust them. Worried about attacks on your N&A? Don’t give anyone greater than reader access, and control the cer

0
0

Here is a useful posting by Christopher Feller: “…Notes is an entirely different paradigm. One of the reasons viruses and attacks on internet-based systems happen so frequently, is that the initiators are anonymous. They don’t have to worry about retribution or punishment. However, you don’t attack a Notes server anonymously like a Firewall or FTP server. You can’t even begin to touch a Notes server unless someone has created an ID for you. And as soon as an ID exists, there’s an electronic trail to follow, I don’t care what fields you delete. Someone creates an anonymous mail-bomb? Fine. I’ll just trace through all the servers listed in the RouteServers field to find where the initial mail came from. Then I’ll check the RouteTimes/PostedDate and compare that to the Notes Log to see when it was routed through that server. Then I’ll check to see who was logged in and bust them. Worried about attacks on your N&A? Don’t give anyone greater than reader access, and control the certifier t

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.