[73028] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Research - Valid Data Gathering vs. Annoying Other

daemon@ATHENA.MIT.EDU (Tony Rall)
Fri Aug 6 16:28:41 2004

In-Reply-To: <200408062005.i76K5wtq000971@host122.r-bonomi.com>
To: nanog@merit.edu
From: Tony Rall <trall@almaden.ibm.com>
Date: Fri, 6 Aug 2004 13:28:03 -0700
Errors-To: owner-nanog-outgoing@merit.edu


On Friday, 2004-08-06 at 15:05 EST, Robert Bonomi 
<bonomi@mail.r-bonomi.com> wrote:
> Executive summary:
> Method of choice:       "Get Permission. *FIRST*."
> If that fails, try:     "Buy Access."
> If =that= fails, then   "Don't Do it!"

So, I have to get permission before trying to communicate with any host on 
the Internet?  Shouldn't this be extended to all forms of communication? 
You must have permission before mailing, phoning, or talking to anyone?

I wonder how to even go about that, because to get their permission I 
likely would need to communicate with them.

I guess that's one way to squelch the usefulness and rampant growth of the 
network.

Tony Rall

home help back first fref pref prev next nref lref last post