Improve company productivity with a Business Account.Sign Up


My Mail Inbox Being Accessed !? - Workstation E-mail & GroupWise WebAccess

Posted on 2006-10-29
Medium Priority
Last Modified: 2013-11-12
We have GroupWise WebAccess which we can logon to our webmail from any Internet enabled computers with Internet Explorer. I need some opinions urgently, please help.

Recently I suspect that someone may found my password, no matter by what means, I've changed password regularly too, it could even be my partner (trust!)!

I use my e-mail at work, and that's not webmail of GroupWise WebAccess, I use it from my workstation, and I have these questions (I am a user, not an administrator or someone in company's IT department):

- E-mail are probably read by someone (through GroupWise WebAccess) after I've opened them, if thats the case will the person that sent e-mail to me get another read receipt?

- Is there a counter to count how many times the messages (Inbox / Outbox) have been read?

- I sent out some messages (at my workstation not on webmail of course) and I suspect that they have been read after my recipient read it, anyway to find out?

Any other suggestions on how I can find out if someone read my messages without having to talk to administrator or I.T department. I suspect it could be my partner and if that's the case, things could get real ugly in the family, and also with the kids that we have.

Thank you experts!
Question by:DCreature
  • 2
LVL 34

Expert Comment

ID: 17831573
Note that EE has a carefully-hidden, GroupWise-specific TA (or Zone) -->
LVL 34

Accepted Solution

PsiCop earned 2000 total points
ID: 17831603
If you use the "save password" security hole (excuse me, I mean "feature") of Internet Exploder, then potentially someone who uses the computer after you can use the cached credentials to access your mailbox. If you don't use the SSL-secured WebAccess login, then your credentials can be intercepted. If someone has installed a keylogger or other backdoor tool on your workstation (and with IE, merely accidentally visiting the "wrong" website can result in practically any software being installed on your computer, regardless of IE's laughable "security" settings), then your credentials can be easily captured.

As to your specific queries:

1) No, a Receipt is generated when the message is first accessed. After that, it is flagged as Read and no more Receipts are generated.

2) No.

3) Not easily. The Post Office Agent would have to be set to the hightest logging level (Disagnostic, as I recall) and there would be a lot of data analysis to find that sort of event.

There's little you can do as an end-user. The ones who really need to investigate this are the system administration staff. They should be able to examine the POA and GWWA logs and determine who is accessing your account, when, and from what IP address. If they can't figger out how to do that, then they're incompetent.

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Novell released its latest version of GroupWise a few weeks ago.  The version is 2012 and it only runs on Linux (SUSE Linux Enterprise Server 10/11 is the first choice and I'm not sure about other Linux distributions, such as Red Hat, Debian, etc.) …
Regular maintenance of GroupWise Mailbox keeps it running flawlessly. Sometimes, it is also seen that mailbox maintenance is needed for resolving various issues of mailbox and other Novell GroupWise database. By using the ‘Repair Mailbox’ feature, a…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Hi, this video explains a free download that you can incorporate into your Access databases, or use stand-alone for contact management. Contacts -- Names, Addresses, Phone Numbers, eMail Addresses, Websites, Lists, Projects, Notes, Attachments…

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question