Bob
My feedback
2 results found
-
102 votes
Bob
supported this idea
·
-
95 votes
An error occurred while saving the comment
Bob
supported this idea
·
This can be vital in tracking down the source of not only an offending subscription but possibly a compromised email address or if the source is from a script, listing the file that generated the email in the first place.
It may be sufficient to log the headers rather than the actual email content... Or possibly just a truncated portion of the offending emails content? As long as the source (email address/script) is logged it should be sufficient to help track down security breaches and injected malware code...