It is a bit difficult to see how you can authenticate through e-mail (perhaps putting the log-in and password in the body of the e-mail? But that is not secure at all as anybody who intercepts the e-mail will know your log-in and password). Simply checking for the e-mail address of the sender is of course not enough as e-mail headers are far too easily spoofed. Anyone who has taken the Spam 101-course will know how to do it.
CountZero
"If you have four groups working on a compiler, you'll get a 4-pass compiler." - Conway's Law
In reply to Re^3: What is wrong with variable?
by CountZero
in thread What is wrong with variable?
by w3b
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |