This paper describes an approach to securing complex mail application using a common firewall technology, application proxies. The advantage of this approach is that it does not require replacing the mail applications. Application proxies simply provide a simple, secure front-end to the insecure...