[203] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Using ROOT for applications...

daemon@ATHENA.MIT.EDU (MICHAEL S. HINES)
Tue May 16 13:08:30 1995

From: "MICHAEL S. HINES" <MSHINES@freh-02.adpc.purdue.edu>
To: ids@uow.edu.au
Date:          Tue, 16 May 1995 08:01:49 EST
Reply-To: ids@uow.edu.au


And why is ROOT being used for e-mail? 

/s/  <Sr Information Systems Auditor>

> From:          System Admin <root@sentinet.demon.co.uk>
> To:            ids@uow.edu.au
> Subject:       Re: printing violation? 
> Date:          Mon, 15 May 95 22:58:33 +0100
> Reply-to:      ids@uow.edu.au

> On May 15, 10:33am, Troy Yeazel wrote:
> > Subject: printing violation?


... irrelevant stuff deleteed...> >

> 
> Why is this personal conversation sent to ids list?
> 
> Lyndon
> 

----------------------------------------------------------------------
Internet:  mshines@ia.purdue.edu      |  Michael S. Hines
Purdue WIZARD Mail: MSHINES           |  Sr. Information Systems Auditor
GTE Net Voice: (317) 494-5845         |  Purdue University
GTE Net FAX:   (317) 496-1814         |  1065 Freehafer Hall
#include <sys/disclaimer.std>         |  West Lafayette, IN 47907-1065


home help back first fref pref prev next nref lref last post