[203] in Intrusion Detection Systems
Using ROOT for applications...
daemon@ATHENA.MIT.EDU (MICHAEL S. HINES)
Tue May 16 13:08:30 1995
From: "MICHAEL S. HINES" <MSHINES@freh-02.adpc.purdue.edu>
To: ids@uow.edu.au
Date: Tue, 16 May 1995 08:01:49 EST
Reply-To: ids@uow.edu.au
And why is ROOT being used for e-mail?
/s/ <Sr Information Systems Auditor>
> From: System Admin <root@sentinet.demon.co.uk>
> To: ids@uow.edu.au
> Subject: Re: printing violation?
> Date: Mon, 15 May 95 22:58:33 +0100
> Reply-to: ids@uow.edu.au
> On May 15, 10:33am, Troy Yeazel wrote:
> > Subject: printing violation?
... irrelevant stuff deleteed...> >
>
> Why is this personal conversation sent to ids list?
>
> Lyndon
>
----------------------------------------------------------------------
Internet: mshines@ia.purdue.edu | Michael S. Hines
Purdue WIZARD Mail: MSHINES | Sr. Information Systems Auditor
GTE Net Voice: (317) 494-5845 | Purdue University
GTE Net FAX: (317) 496-1814 | 1065 Freehafer Hall
#include <sys/disclaimer.std> | West Lafayette, IN 47907-1065