logo

New Response

« Return to the blog entry

You are replying to:

    • avatar
    • Jake Howlett
    • Posted on Thu 1 Dec 2011 10:09 AM

    Indeed. And then filter out any compromised addresses using GMail filters (sending straight to trash?)

Your Comments

Name:
E-mail:
(optional)
Website:
(optional)
Comment: