Hello All,
Recently several of our email databases ( we run a few B2B eNewsletters ) were taken from our server by a competitor.
We know this because all of a sudden we see our competition marketing to our databases by getting emails to special seed email addy's that only we know about.
We have the http 1.1 username and want our data back and need to get the password to do this as we know the exact server ip and login that our suspect uses for his web based email deployment application.
We just can not get in. The suspect is using Lyris list manager 8.9b on a hosted server.
Not looking to do anything malicious.
I hope we are not breaking any forum rules by asking for this advice and certaily do not want to offend anybody. Any advice, or if someone is interested in being hired to do this would be greatly appciated.
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
Lyris list manager 8.9B on Unix