Sounds like they all hit the same wall you have hit...
Could be an opportunity...
:-)
On Thu, January 19, 2006 4:55 pm, Geoff wrote:
>> It seems to me that if you looked at the raw email and found the
>> boundary, and focused on the only mime-types you care about, you'd
>> be able to hack the fi
> It seems to me that if you looked at the raw email and found the
> boundary, and focused on the only mime-types you care about, you'd
> be able to hack the file pretty easily...
I just may have to do that. One problem though is that many mails
are encoded in some way (I mean byte-encoding, lik
All them lawyerly crapola signatures outside the control of the actual
user implies that there is SOME kind of software available to do it...
It seems to me that if you looked at the raw email and found the
boundary, and focused on the only mime-types you care about, you'd be
able to hack the file
3 matches
Mail list logo