XKCD puts it well: http://xkcd.com/792/
How often do you reuse passwords?
What financial or other control information transits your email account?
What blackmail or other information could be gained via your email account(s)?
I've utilized this myself in legal cases for fun and profit (lawful access to data, natch).
Going through a proxy (crowded, busy, high traffic, concentrated) makes hack attacks that much more difficult. From the defense standpoint, proxies may be known (lists of know proxies are widely available), detectable (reverse operations), or identifiable via patterns (large volumes of traffic or attack from a single or narrow IP band not otherwise known).
You do highlight the point, however, that patterns of behavior are what are critical. You want to see who's coming in, from what IP ranges, whether or not they're suddendly having a great deal of trouble with their passwords, etc.
I've had more than a little success identifying sources of abuse via CIDR block or ASN using the Routeviews reverse IP-to-BGP Router Data lookup (the txt record is the CIDR block and ASN of an IP). Not just in spam, as indicated in the linked paper, but for apache logs, aggregating ranges of IPs to a single identifiable source.
Sure, someone using a widely distributed botnet across multiple ASNs isn't going to turn up in that analysis (or rather, it will be more weakly distributed), but in that case, you're going to want to find other patterns of behavior to track.
The one sticking point I've seen at any organization using Exchange (not "Outlook") is the integration between calendar and email. And yeah, you've got to use Outlook (or Entourage) to benefit from that.
Google's now attacked that with GMail + Google Calendar. One large company I know well is starting its transition this summer. And where most big IT changes are greeted with groans, this one took wild applause at an all-hands meeting. Calendars are already segregated (two different staff directories due to mergers), 150MB mailbox size limit, frequent mailbox f-ups, and the outrage and insult which is OWA.
News shows there are others making the step as well, particularly among educational institutions and younger (growth) companies. Yes, there's some back-and-forth, especially as Microsoft sweetens the pot (read: reduces its operating margins) to buy back business.
As someone who's eagerly waited for over a decade's worth of "The Year of Linux on the Desktop" articles has become mildly aware, shifting mass computing markets takes time and an overwhelmingly compelling argument. The tide for Microsoft has been going one way for over a decade, though, and as its key corporate strength -- monopoly control over the enterprise desktop suite -- is eroded, the chips will fall faster. And that strength is falling in several places: the corporation, the desktop, and the suite.
My only hope is that what replaces it will be a more diverse computing ecosystem. That might just happen.
$ grep -C4 font-family userContent.css
BODY {
padding: 8px 8px;
font-family: serif !important;
}
--
* {
font-size: 100% !important;
line-height: normal !important;
font-family: serif !important;
}
--
* color: inherit !important;
* background: inherit !important;
* font-family: inherit !important;
* font-size: inherit !important;
* }
*/
--
PRE, TT, CODE {
font-family: monospace !important;
}
--
H1, H2, H3, H4, H5, H6 {
font-weight: bold !important;
font-family: sans-serif !important;
font-weight: bold !important;
padding-bottom: 0.25em;
}
--
textarea, directory {
font-family: "Courier New", monospace !important;
font-size: 90% !important;
}
HELP!!!! I'm being held prisoner in /usr/games/lib!