[51352] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Controlling RIAA's "hired guns"

daemon@ATHENA.MIT.EDU (Scott Granados)
Fri Aug 23 23:51:18 2002

Date: Fri, 23 Aug 2002 20:50:33 -0700 (PDT)
From: Scott Granados <scott@graphidelix.net>
To: Nigel Clarke <nigel@forever-networks.com>
Cc: <nanog@merit.edu>
In-Reply-To: <HGEEKCPKMCLEIOHFGKCNKEPKCBAA.nigel@forever-networks.com>
Errors-To: owner-nanog-outgoing@merit.edu


Problem is, many many end users won't know their computer has been 
hacked necessarily.  They might now its broken:) it won't connect, 
what's invalid media type:), or where did my winders go!

But many people have no idea anything has happened.  Look at how much 
code red type activity is still happening.

On Wed, 21 Aug 
2002, Nigel Clarke wrote:

> 
> 
> I know that this has somewhat thoroughly discussed here as of late, but when
> has it ever been acceptable to allow hackers to
> break into a customer's computer? I thought that abuse and security teams
> were designed to stop this type of thing.
> 
> 
> 
> --
> Nigel Clarke
> Network Security Engineer
> Forever Networks
> 
> 


home help back first fref pref prev next nref lref last post