Jim Choate wrote:
> > So you write it so that unencrypted e-mail simply will be bounced. Simple
> > enough to do.
> 
> Really? Provide a reference to such an algorithm? 

check back in the archives, early october last year. you'll find an
extensive discussion and several posted algorithms which - while not
perfect - should work well enough, especially in the kind of controlled,
closed environment that the original poster is working with.

Reply via email to