On Thu, Mar 23, 2006, Bigby Findrake wrote: > Does an attacker need network access to the machine, or does the attacker Yes. > merely need to be able to get an SMTP message to the machine? He needs to control the timeouts (AFAICT).