Solved

My Mail Inbox Being Accessed !? - Workstation E-mail & GroupWise WebAccess

Posted on 2006-10-29
3
525 Views
Last Modified: 2013-11-12
We have GroupWise WebAccess which we can logon to our webmail from any Internet enabled computers with Internet Explorer. I need some opinions urgently, please help.

Recently I suspect that someone may found my password, no matter by what means, I've changed password regularly too, it could even be my partner (trust!)!

I use my e-mail at work, and that's not webmail of GroupWise WebAccess, I use it from my workstation, and I have these questions (I am a user, not an administrator or someone in company's IT department):

- E-mail are probably read by someone (through GroupWise WebAccess) after I've opened them, if thats the case will the person that sent e-mail to me get another read receipt?

- Is there a counter to count how many times the messages (Inbox / Outbox) have been read?

- I sent out some messages (at my workstation not on webmail of course) and I suspect that they have been read after my recipient read it, anyway to find out?

Any other suggestions on how I can find out if someone read my messages without having to talk to administrator or I.T department. I suspect it could be my partner and if that's the case, things could get real ugly in the family, and also with the kids that we have.

Thank you experts!
0
Comment
Question by:DCreature
  • 2
3 Comments
 
LVL 34

Expert Comment

by:PsiCop
Comment Utility
Note that EE has a carefully-hidden, GroupWise-specific TA (or Zone) --> http://www.experts-exchange.com/Applications/Groupwise/
0
 
LVL 34

Accepted Solution

by:
PsiCop earned 500 total points
Comment Utility
If you use the "save password" security hole (excuse me, I mean "feature") of Internet Exploder, then potentially someone who uses the computer after you can use the cached credentials to access your mailbox. If you don't use the SSL-secured WebAccess login, then your credentials can be intercepted. If someone has installed a keylogger or other backdoor tool on your workstation (and with IE, merely accidentally visiting the "wrong" website can result in practically any software being installed on your computer, regardless of IE's laughable "security" settings), then your credentials can be easily captured.

As to your specific queries:

1) No, a Receipt is generated when the message is first accessed. After that, it is flagged as Read and no more Receipts are generated.

2) No.

3) Not easily. The Post Office Agent would have to be set to the hightest logging level (Disagnostic, as I recall) and there would be a lot of data analysis to find that sort of event.

There's little you can do as an end-user. The ones who really need to investigate this are the system administration staff. They should be able to examine the POA and GWWA logs and determine who is accessing your account, when, and from what IP address. If they can't figger out how to do that, then they're incompetent.
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Novell released its latest version of GroupWise a few weeks ago.  The version is 2012 and it only runs on Linux (SUSE Linux Enterprise Server 10/11 is the first choice and I'm not sure about other Linux distributions, such as Red Hat, Debian, etc.) …
Regular maintenance of GroupWise Mailbox keeps it running flawlessly. Sometimes, it is also seen that mailbox maintenance is needed for resolving various issues of mailbox and other Novell GroupWise database. By using the ‘Repair Mailbox’ feature, a…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now