but due to having to rebuild everything for the openssl issues it's
currently only available as binaries:
Windows: http://netwinsite.com/ftp/misc/v1.zip     
Linux http://netwinsite.com/ftp/misc/l1.tar.gz     
Linux 64 http://netwinsite.com/ftp/misc/l64.tar.gz     
Solaris I64 http://netwinsite.com/ftp/misc/soli64.tar.gz     
 
ChrisP.
  I’ve been hunting around you FTP server and I can’t seem to find 6.6c-1
  listed in the SurgeWeb Change history. 
   
  Ted Quade 
   
  From: surgemail-support [mailto:surgemail-support@netwinsite.com] 
  Sent: 15-Apr-14 16:08 
  To: surgemail-list@netwinsite.com 
  Subject: re: Re: [SurgeMail List] Weak Password Hackers 
   
  Yep, see g_hacker_... settings in version 6.6 
   
  ChrisP. 
   
  Can we have the same happen to people trying to log into an alias? (even
  if not using a weak password) 
  We set up our "admin, helpdesk wembmaster" etc up as an alias and I see
  people trying to log into those accounts. Of course if they use a weak
  password they are automatically blocked now :-) 
  ----- Original Message ----- 
  From: surgemail-support 
  To: surgemail-list@netwinsite.com 
  Sent: Sunday, September 01, 2013 3:03 PM 
  Subject: re: [SurgeMail List] Weak Password Hackers 
  Nice idea, we will add this, the new setting to enable this will be
  g_hacker_weak "true" 
  ChrisP. 
  We are getting more and more "User ***@elkgrove.net tried to login with
  weak password." 
  I know these are from hackers because we don't allow weak passwords. So I
  have been taking the ip and blocking them manually from access to our server.
  Is there an option to have this done automatically? The first weak password
  and your IP is banned for 90 days? 
  TIA