Tips
Tips
Lotus Notes Domino Security
-
Multiple quarantine databases
I've created multiple quarantine databases and then set up my server rules so that the rules put certain mail in different quarantine databases. Continue Reading
-
How spam-fighting technology almost cost me a client
How an overzealous approach to spam-fighting caused problems, and four tips to make sure the same thing doesn't happen to you. Continue Reading
-
Meet the Extended ACL
The dialog box for configuring it is arguably the least intuitive and most complex of any that has ever come out of Cambridge and that is really saying something. Continue Reading
-
Rich text field workarounds
Here are two Rich text field workarounds. Continue Reading
-
Domino and user authentication
This tip details method used to prevent users from being prompted to enter their name/password several times when attempting to access a database that they do not have permission. Continue Reading
-
Chapter 5: Blocking spammers with DNS blacklists
This chapter from the book The Anti-Spam Tool Kit explains what DNS blacklists are, how they work and how to implement them on a mail server. Continue Reading
-
Build an extended directory catalog
An easy way to give developers (and admins) all the customized views they want to access Domino directory data, but without adding/changing a single view to your production NAB. Continue Reading
-
Synchronizing your contacts
This Lotus Notes/Domino utility synchronizes contacts located in your Lotus Notes personal address book with the contacts located in your Domino server based mailfile. Continue Reading
-
Chapter 6: Unwilling accomplices
In this chapter, you'll learn how to protect yourself from being used as an unwilling pawn in a spammer's attack. Continue Reading
-
More protection against e-mail address harvesters
Check out these tricks for fooling spammers who visit your Web sites to harvest e-mail addresses. Continue Reading
-
Cool tricks for password recovery
Here are a few valuable tricks you can use to collect and recover passwords. Continue Reading
-
Chapter 5: Would the real sender please stand up?
This chapter from Canning Spam, by Jeremy Poteet, describes techniques attackers use to impersonate users or mask their identities, and how to detect these spoofs. Continue Reading
-
Policies and archive bug
Exercise caution when creating a Policy with Archive Setting -- it could cause a server crash. Continue Reading
-
Can't launch attachments? Check the form security
If you're experiencing problems with readers being unable to launch attachments, you might want to check the form security. Continue Reading
-
Who's sending the spam?
Regardless of how many blocks you've got for spam, some still gets through. This agent and view will let you see where it's coming from, so you can block the IPs at the server. Continue Reading