X-Virus-Scanned: clean according to Sophos on Logan.com From: "Bobby J. Hughes" Received: from [207.91.159.28] (HELO barracuda.qnsi.net) by logan.com (CommuniGate Pro SMTP 6.2c1) with ESMTP id 9596227 for flyrotary@lancaironline.net; Wed, 22 Mar 2017 09:38:06 -0400 Received-SPF: pass receiver=logan.com; client-ip=207.91.159.28; envelope-from=btv1==254547efaf4==bhughes@qnsi.net X-ASG-Debug-ID: 1490189846-02764567d501b70001-fw4j19 Received: from mail.qnsi.net ([10.0.0.5]) by barracuda.qnsi.net with ESMTP id 10lsA3CVTDv3pswu for ; Wed, 22 Mar 2017 08:37:26 -0500 (CDT) X-Barracuda-Envelope-From: bhughes@qnsi.net Received: from 10.0.0.5 ([10.0.0.5]) by qnsi-mail.qnsi.net ([10.0.0.5]) with Microsoft Exchange Server HTTP-DAV ; Wed, 22 Mar 2017 13:37:26 +0000 Content-Type: multipart/alternative; boundary="Apple-Mail-F247ECBE-84A7-407C-B420-EBC9524C94CC"; charset="iso-8859-1" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 (1.0) thread-topic: [FlyRotary] Re: fuel system peer review thread-index: AdKjEXHJWUf4G6QNTnqRwvwlQw+6Tg== Subject: Re: [FlyRotary] Re: fuel system peer review Message-ID: <57FE1046-1842-4025-8047-8B95186C4C3B@qnsi.net> X-ASG-Orig-Subj: Re: [FlyRotary] Re: fuel system peer review Date: Wed, 22 Mar 2017 08:37:25 -0500 References: To: "Rotary motors in aircraft" In-Reply-To: X-Barracuda-Connect: UNKNOWN[10.0.0.5] X-Barracuda-Start-Time: 1490189846 X-Barracuda-URL: http://10.0.0.4:8000/cgi-mod/mark.cgi X-Barracuda-BRTS-Status: 1 X-Virus-Scanned: by bsmtpd at qnsi.net X-Barracuda-Spam-Score: 1.02 X-Barracuda-Spam-Status: No, SCORE=1.02 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=1000.0 tests=HTML_MESSAGE, MIME_BASE64_TEXT, WEIRD_PORT X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.37411 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.50 WEIRD_PORT URI: Uses non-standard port number for HTTP 0.00 HTML_MESSAGE BODY: HTML included in message 0.52 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding