Anybody use this service or know of others similar that you recommend?
http://www.findnot.com/index.html
Curious about these anonymizer sites....
Search found 306 matches
- Tue Apr 26, 2005 10:53 am
- Forum: Network Security
- Topic: anonymizers
- Replies: 1
- Views: 889
- Fri Apr 16, 2004 6:58 pm
- Forum: Network Security
- Topic: PCs riddled with spyware - duh :p
- Replies: 1
- Views: 525
- Wed Feb 18, 2004 3:49 pm
- Forum: Network Security
- Topic: Tag! You're it
- Replies: 1
- Views: 734
- Thu Oct 30, 2003 4:24 pm
- Forum: Network Security
- Topic: gator changing name... :(
- Replies: 3
- Views: 948
- Wed Oct 29, 2003 12:36 pm
- Forum: Network Security
- Topic: came across this trojan this morning
- Replies: 2
- Views: 1086
- Sat Oct 25, 2003 10:56 am
- Forum: Network Security
- Topic: came across this trojan this morning
- Replies: 2
- Views: 1086
came across this trojan this morning
http://www.esecurityplanet.com/alerts/a ... hp/3093611
found this item on my machine today after doing a virus scan.....may want to read up on it and check your machine as well....and update your virus scanner before scanning, while you're at it....
still don't know where I got it from....
found this item on my machine today after doing a virus scan.....may want to read up on it and check your machine as well....and update your virus scanner before scanning, while you're at it....
still don't know where I got it from....
- Mon Oct 13, 2003 6:19 pm
- Forum: Network Security
- Topic: snoop software gains power
- Replies: 0
- Views: 1497
snoop software gains power
http://www.nytimes.com/2003/10/10/technology/10SPY.html
Snoop Software Gains Power and Raises Privacy Concerns
By JOHN SCHWARTZ
arlier this year, Rick Eaton did something unusual in the world of high technology: he made his product weaker.
Mr. Eaton is the founder of TrueActive, which makes a computer program that buyers can install on a target computer and monitor everything that the machine's user does on the PC.
Spying with software has been around for several years but Mr. Eaton decided that one new feature in his program crossed a line between monitoring and snooping.
That feature is called "silent deploy," which allows the buyer to place the program on someone else's computer secretly via e-mail, without having physical access to the machine. To Mr. Eaton, that constituted an invitation to install unethical and even illegal wiretaps. He made the change, he said, "so we could live with ourselves."
Such principles seem almost quaint in a market where the products seem to grow more powerful and intrusive all the time. Other makers of "snoopware" Eas opposed to the software known as "spyware" that many businesses use to monitor the activities of Web site visitors and to send them pop-up ads Eenthusiastically pitch their products' ability to be installed remotely. They typically skirt the ethical and legal issues with fig-leaf disclaimers and check-off boxes where buyers promise not to violate the law.
Privacy experts are not buying such arguments. Marc Rotenberg, who heads the Electronic Privacy Information Center in Washington, contended that selling software that can tap people's communications without their knowledge violated the Electronic Communications Privacy Act. "I don't think there's any question that they are violating the federal law," he said. The disclaimers, he said, "fail the straight-face test."
Law enforcement officials seem to agree. According to Chris Johnson, a federal prosecutor in Los Angeles, the F.B.I. recently began an investigation in California into the maker of one program, LoverSpy, that advertises heavily via junk e-mail, or spam.
LoverSpy promises to let buyers "Spy on anyone by sending them an e-mail greeting card!" Federal officials note that federal laws on wiretapping make it illegal even to advertise illegal wiretap products Eand a little-noted change to the law last year expanded its scope explicitly to include advertising on the Internet.
There are more than a dozen snooping programs on the market, and their makers say they are used legally by employers to monitor workers' Internet use, by parents to follow their children's online wanderings, and by husbands and wives to catch cheating mates.
Mr. Eaton's program has even been used by the F.B.I., with approval of the courts, to capture hackers. The programs include "key loggers" that capture keystrokes, and can record what's onscreen, even turn on a computer's Webcam so that the user can sneak a peek at the target Eand get the information and images back via the Internet.
"You don't have to be an F.B.I. agent or a computer genius to use this stuff," said Richard Smith, a privacy and security expert who is concerned about the rise of the products. "You just point and click."
And so a new market has emerged: criminals are using such programs on public computer terminals at copy shops and libraries to harvest credit card numbers, computer passwords and personal financial information. A New York man, Juju Jiang, recently pleaded guilty to planting monitoring software on computers at branches of Kinko's.
In a case filed yesterday, federal prosecutors in Boston accused a 19-year-old college student, Van Dinh, of using a keystroke-logging program to capture the investment account password of a man in Westboro, Mass. Prosecutors say Mr. Dinh then used the victim's account to unload stock options that Mr. Dinh owned and that would otherwise have caused him a large loss.
Last year the Secret Service warned colleges and universities that key-logger systems had been found on public computers in schools in Arizona, Texas, Florida and California. And earlier this year a former Boston College student, Douglas Boudreau, pleaded guilty to charges that he had installed key-loggers on machines at the school to create student ID and debit cards that allowed him to steal about $2,000 worth of goods and services.
"Anybody who routinely uses a computer that isn't their own ought to be thinking, `who's looking over my shoulder?' " said Ross Stapleton-Gray, a computer consultant who has worked for the University of California system.
Jerry Brady, the chief technical officer of Guardent, a computer security firm, said, "You can assume that most hotel and airport lounge computers have had keystroke loggers installed at one time or another," whether because of commercial snoopware or key-loggers installed by viruses and worms.
Little wonder, then, that a mini-industry has grown up to detect and defuse the programs. Software with names like TrapWare and NetCop are designed specifically to combat monitoring programs, but the most recent versions of more traditional computer security products like Norton Antivirus from Symantec and McAfee VirusScan from Network Associates have been upgraded to search for digital snoops as well. Finding snoopware is "a logical extension to what antivirus software is already doing," said Tom Powledge of Symantec.
The companies that say they make products for legitimate uses bristle at the suggestion that their products are used illegally, except in a few exceptional cases.
Doug Fowler, the president of Spectorsoft, makes three snooping programs, including eBlaster, which can be installed remotely. He said the product was used legitimately by parents whose children were away at school, and by companies with far-flung field offices. The product can be used for nefarious purposes, he admits, but he added: "A car can run somebody over. That doesn't mean you design a car to run over somebody."
He says he has no respect for the company that puts out LoverSpy and advertises its remote-spying abilities online. "Lines have to be drawn somewhere in this world," he said.
The creators and marketers of LoverSpy, who were traced through Internet registries and comments they have made in online discussions, did not respond to over a dozen phone calls and e-mail messages.
Mr. Eaton, the TrueActive founder, said that while he had worked closely with law enforcement, the decision to hamstring his program, which is called WinWhatWhere, was not based on worries about possible liability. "It was an ethical problem," he said. Mr. Eaton also noted that the feature demanded a disproportionate amount of attention from his technical support staff.
His company, he said, will "actively help anyone that thinks or has found our software illegally installed." Besides, he added, "this kind of program has a bad enough reputation without this kind of stuff."
One executive of a computer security company said that the situation was getting worse. "We're definitely seeing quite the ramp-up in the number, and the sophistication, and the malicious intent of monitoring software in recent months," said Bryson Gordon, the senior product manager for the McAfee consumer security division and the company's chief spam prevention officer.
But at least one program, he said, may not pose a real threat Eof spying, at least. Mr. Gordon said that his company's security researchers, working with the Justice Department, were unable to find any actual working software that could be downloaded from the LoverSpy site after paying the fee.
He seemed less than stunned by the notion that a product advertised via spam might not be all that it was claimed to be. "You can't be all that surprised," he said.
Snoop Software Gains Power and Raises Privacy Concerns
By JOHN SCHWARTZ
arlier this year, Rick Eaton did something unusual in the world of high technology: he made his product weaker.
Mr. Eaton is the founder of TrueActive, which makes a computer program that buyers can install on a target computer and monitor everything that the machine's user does on the PC.
Spying with software has been around for several years but Mr. Eaton decided that one new feature in his program crossed a line between monitoring and snooping.
That feature is called "silent deploy," which allows the buyer to place the program on someone else's computer secretly via e-mail, without having physical access to the machine. To Mr. Eaton, that constituted an invitation to install unethical and even illegal wiretaps. He made the change, he said, "so we could live with ourselves."
Such principles seem almost quaint in a market where the products seem to grow more powerful and intrusive all the time. Other makers of "snoopware" Eas opposed to the software known as "spyware" that many businesses use to monitor the activities of Web site visitors and to send them pop-up ads Eenthusiastically pitch their products' ability to be installed remotely. They typically skirt the ethical and legal issues with fig-leaf disclaimers and check-off boxes where buyers promise not to violate the law.
Privacy experts are not buying such arguments. Marc Rotenberg, who heads the Electronic Privacy Information Center in Washington, contended that selling software that can tap people's communications without their knowledge violated the Electronic Communications Privacy Act. "I don't think there's any question that they are violating the federal law," he said. The disclaimers, he said, "fail the straight-face test."
Law enforcement officials seem to agree. According to Chris Johnson, a federal prosecutor in Los Angeles, the F.B.I. recently began an investigation in California into the maker of one program, LoverSpy, that advertises heavily via junk e-mail, or spam.
LoverSpy promises to let buyers "Spy on anyone by sending them an e-mail greeting card!" Federal officials note that federal laws on wiretapping make it illegal even to advertise illegal wiretap products Eand a little-noted change to the law last year expanded its scope explicitly to include advertising on the Internet.
There are more than a dozen snooping programs on the market, and their makers say they are used legally by employers to monitor workers' Internet use, by parents to follow their children's online wanderings, and by husbands and wives to catch cheating mates.
Mr. Eaton's program has even been used by the F.B.I., with approval of the courts, to capture hackers. The programs include "key loggers" that capture keystrokes, and can record what's onscreen, even turn on a computer's Webcam so that the user can sneak a peek at the target Eand get the information and images back via the Internet.
"You don't have to be an F.B.I. agent or a computer genius to use this stuff," said Richard Smith, a privacy and security expert who is concerned about the rise of the products. "You just point and click."
And so a new market has emerged: criminals are using such programs on public computer terminals at copy shops and libraries to harvest credit card numbers, computer passwords and personal financial information. A New York man, Juju Jiang, recently pleaded guilty to planting monitoring software on computers at branches of Kinko's.
In a case filed yesterday, federal prosecutors in Boston accused a 19-year-old college student, Van Dinh, of using a keystroke-logging program to capture the investment account password of a man in Westboro, Mass. Prosecutors say Mr. Dinh then used the victim's account to unload stock options that Mr. Dinh owned and that would otherwise have caused him a large loss.
Last year the Secret Service warned colleges and universities that key-logger systems had been found on public computers in schools in Arizona, Texas, Florida and California. And earlier this year a former Boston College student, Douglas Boudreau, pleaded guilty to charges that he had installed key-loggers on machines at the school to create student ID and debit cards that allowed him to steal about $2,000 worth of goods and services.
"Anybody who routinely uses a computer that isn't their own ought to be thinking, `who's looking over my shoulder?' " said Ross Stapleton-Gray, a computer consultant who has worked for the University of California system.
Jerry Brady, the chief technical officer of Guardent, a computer security firm, said, "You can assume that most hotel and airport lounge computers have had keystroke loggers installed at one time or another," whether because of commercial snoopware or key-loggers installed by viruses and worms.
Little wonder, then, that a mini-industry has grown up to detect and defuse the programs. Software with names like TrapWare and NetCop are designed specifically to combat monitoring programs, but the most recent versions of more traditional computer security products like Norton Antivirus from Symantec and McAfee VirusScan from Network Associates have been upgraded to search for digital snoops as well. Finding snoopware is "a logical extension to what antivirus software is already doing," said Tom Powledge of Symantec.
The companies that say they make products for legitimate uses bristle at the suggestion that their products are used illegally, except in a few exceptional cases.
Doug Fowler, the president of Spectorsoft, makes three snooping programs, including eBlaster, which can be installed remotely. He said the product was used legitimately by parents whose children were away at school, and by companies with far-flung field offices. The product can be used for nefarious purposes, he admits, but he added: "A car can run somebody over. That doesn't mean you design a car to run over somebody."
He says he has no respect for the company that puts out LoverSpy and advertises its remote-spying abilities online. "Lines have to be drawn somewhere in this world," he said.
The creators and marketers of LoverSpy, who were traced through Internet registries and comments they have made in online discussions, did not respond to over a dozen phone calls and e-mail messages.
Mr. Eaton, the TrueActive founder, said that while he had worked closely with law enforcement, the decision to hamstring his program, which is called WinWhatWhere, was not based on worries about possible liability. "It was an ethical problem," he said. Mr. Eaton also noted that the feature demanded a disproportionate amount of attention from his technical support staff.
His company, he said, will "actively help anyone that thinks or has found our software illegally installed." Besides, he added, "this kind of program has a bad enough reputation without this kind of stuff."
One executive of a computer security company said that the situation was getting worse. "We're definitely seeing quite the ramp-up in the number, and the sophistication, and the malicious intent of monitoring software in recent months," said Bryson Gordon, the senior product manager for the McAfee consumer security division and the company's chief spam prevention officer.
But at least one program, he said, may not pose a real threat Eof spying, at least. Mr. Gordon said that his company's security researchers, working with the Justice Department, were unable to find any actual working software that could be downloaded from the LoverSpy site after paying the fee.
He seemed less than stunned by the notion that a product advertised via spam might not be all that it was claimed to be. "You can't be all that surprised," he said.
- Sat Oct 04, 2003 1:05 pm
- Forum: Network Security
- Topic: Cisco warns wlan can be cracked
- Replies: 1
- Views: 881
Cisco warns wlan can be cracked
old link
- Fri Oct 03, 2003 12:53 pm
- Forum: Network Security
- Topic: earthstation5 p2p contains evil code
- Replies: 0
- Views: 818
- Fri Oct 03, 2003 12:52 pm
- Forum: Network Security
- Topic: 2 flaws found
- Replies: 2
- Views: 1061
actually got laid off from the mushroom forest and pondering when I'll be able to get back into a steady job again...other than that, shoveling soil out of a section of basement I've been clearing out for the past month, with 6 trailer loads of soil dumped, and now proceeding to put gravel into the ...
- Thu Oct 02, 2003 12:19 pm
- Forum: Network Security
- Topic: 2 flaws found
- Replies: 2
- Views: 1061
2 flaws found
saw this news this morning:
taken from:
http://searchsecurity.techtarget.com/newsItem/0,289139,sid14_gci930365,00.html
Two Major Databases Spring Security Leaks
By Lisa Vaas
October 1, 2003
Two major databases have sprung security leaks.
The security firm Application Security Inc. reported ...
taken from:
http://searchsecurity.techtarget.com/newsItem/0,289139,sid14_gci930365,00.html
Two Major Databases Spring Security Leaks
By Lisa Vaas
October 1, 2003
Two major databases have sprung security leaks.
The security firm Application Security Inc. reported ...
- Mon Aug 11, 2003 11:55 pm
- Forum: Network Security
- Topic: wow it's been a long time
- Replies: 14
- Views: 1574
- Fri Jul 25, 2003 7:53 pm
- Forum: Network Security
- Topic: IT Security
- Replies: 8
- Views: 1307
linux security?
Thinking about putting mandrake 9.1 on a spare machine...yeah, haven't been around for a while...been laid off, back to work, then laid off again...so.... :P
anybody have a quick checklist info on what to lock down, what firewalls/antivirus/spyware apps available for linux/mandrake?
den2 :O
anybody have a quick checklist info on what to lock down, what firewalls/antivirus/spyware apps available for linux/mandrake?
den2 :O
- Wed May 07, 2003 2:27 pm
- Forum: Network Security
- Topic: cloaking device
- Replies: 4
- Views: 986
- Wed May 07, 2003 2:15 pm
- Forum: Network Security
- Topic: icq in the news again
- Replies: 1
- Views: 811
- Fri Mar 21, 2003 12:07 pm
- Forum: Network Security
- Topic: conducent
- Replies: 0
- Views: 722
- Thu Mar 20, 2003 12:25 pm
- Forum: Network Security
- Topic: SpyBot 1.2 Updates ?
- Replies: 9
- Views: 1468
???
is there a way to update spybot other than using their interface? seems like perhaps the firewall at werk stops the app dead and fails to connect to the updater... 
never mind..just saw the post on the bugs site...
den2
never mind..just saw the post on the bugs site...
den2
- Thu Jan 30, 2003 11:28 am
- Forum: Network Security
- Topic: Xupiter in the news
- Replies: 4
- Views: 1145
Xupiter in the news
http://www.wired.com/news/infostructure ... 67,00.html
http://www.spywareinfo.com/yabbse/index ... eadid=1066
this thing sounds evil....like Gator...
den2
http://www.spywareinfo.com/yabbse/index ... eadid=1066
this thing sounds evil....like Gator...
den2
- Thu Jan 23, 2003 3:46 pm
- Forum: Network Security
- Topic: winmx trojan
- Replies: 1
- Views: 950
winmx trojan
just came across this info...anybody else hear or have any more info?
http://www.spywareinfo.com/yabbse/index ... eadid=3102
den2
http://www.spywareinfo.com/yabbse/index ... eadid=3102
den2
- Thu Jan 16, 2003 3:23 pm
- Forum: Network Security
- Topic: Real Evil
- Replies: 0
- Views: 816
Real Evil
After a bit o' hiatus from flu....here's my newest find from slashdot... 
http://research.yale.edu/lawmeme/module ... =0&thold=0
http://research.yale.edu/lawmeme/module ... =0&thold=0
- Mon Dec 23, 2002 1:38 pm
- Forum: Network Security
- Topic: slide over ads coming....
- Replies: 0
- Views: 1036
slide over ads coming....
taken from lockergnome... :O
Once Pop-Up Ads, Now Slide Over Ads
http://news.com.com/2100-1023-978616.html?tag=lh
Before, when a pop-up ad was was displayed on a computer screen, it could simply be closed by hitting the "X" (if you use Windows, that is). Now, advertisers are experimenting with ...
Once Pop-Up Ads, Now Slide Over Ads
http://news.com.com/2100-1023-978616.html?tag=lh
Before, when a pop-up ad was was displayed on a computer screen, it could simply be closed by hitting the "X" (if you use Windows, that is). Now, advertisers are experimenting with ...
- Wed Dec 11, 2002 5:36 pm
- Forum: Network Security
- Topic: question: email filters?
- Replies: 1
- Views: 896
question: email filters?
What are some good ones?
are they reliable these days?
are they reliable these days?
- Wed Dec 04, 2002 10:54 am
- Forum: Network Security
- Topic: Fatwallet challenges Wal Mart in DMCA
- Replies: 0
- Views: 996
Fatwallet challenges Wal Mart in DMCA
I guess things have to be challenged in court these days before people resort to old fashioned common sense? 
http://www.fatwallet.com/forums/message ... did=129657

http://www.fatwallet.com/forums/message ... did=129657
- Tue Nov 26, 2002 10:12 am
- Forum: Network Security
- Topic: Ie
- Replies: 2
- Views: 1064
sorry for sounding like a dummy
but how do you extract just the IE off them CDs? I don't see anywhere with the versions we have at work that suggests the folder that separates it....from the actual install...of the OS...have to look deeper, I guess..... 
den2

den2
- Mon Nov 25, 2002 12:31 pm
- Forum: Network Security
- Topic: Ie
- Replies: 2
- Views: 1064
Ie
Is there a place to get a version of IE 5.5 or 6 that is complete, without having to much around with the setup.exe files from MS?
den2 :O
need it for testing, but the puter isn't on the network for internet, so no access to download from the setup.exe.....arrghghghahe
den2 :O
need it for testing, but the puter isn't on the network for internet, so no access to download from the setup.exe.....arrghghghahe
- Mon Nov 11, 2002 3:46 pm
- Forum: Network Security
- Topic: privacy digest
- Replies: 2
- Views: 1158
yes
current trends do tend to have proprietary agendas that are not always necessarily good for the common people.....

- Mon Nov 11, 2002 3:39 pm
- Forum: Network Security
- Topic: parasites
- Replies: 0
- Views: 990
parasites
taken from infoworld:
SITES AGAINST PARASITES
Posted November 8, 2002 01:01 PM Pacific Time
LAST WEEK, I wrote that millions of Windows users
unwittingly installed "parasites" when setting up
music-sharing programs or other free marketing
gimmicks. Some parasite programs harvest fake sales ...
SITES AGAINST PARASITES
Posted November 8, 2002 01:01 PM Pacific Time
LAST WEEK, I wrote that millions of Windows users
unwittingly installed "parasites" when setting up
music-sharing programs or other free marketing
gimmicks. Some parasite programs harvest fake sales ...
- Mon Nov 11, 2002 10:39 am
- Forum: Network Security
- Topic: privacy digest
- Replies: 2
- Views: 1158
- Thu Nov 07, 2002 1:27 pm
- Forum: Network Security
- Topic: cd protection is useless
- Replies: 4
- Views: 1288
cd protection is useless
http://www.newscientist.com/news/news.jsp?id=ns99993020
resistance is useless.....
lower priced CDs or continued piracy, it seems....I guess the RIAA will have to make a choice when they wake up....
resistance is useless.....
lower priced CDs or continued piracy, it seems....I guess the RIAA will have to make a choice when they wake up....
- Thu Nov 07, 2002 1:25 pm
- Forum: Network Security
- Topic: linksys vulnerability
- Replies: 1
- Views: 1152
- Wed Nov 06, 2002 12:32 pm
- Forum: Network Security
- Topic: Norton email deletions
- Replies: 1
- Views: 947
- Mon Nov 04, 2002 3:14 pm
- Forum: Network Security
- Topic: this is scary
- Replies: 0
- Views: 998
this is scary
again, may not be a security issue, or it may be...depending on your perspective.....taken from slashdot....
http://slashdot.org/articles/02/11/04/1 ... ml?tid=137
http://slashdot.org/articles/02/11/04/1 ... ml?tid=137
- Mon Nov 04, 2002 1:08 pm
- Forum: Network Security
- Topic: 3 topics
- Replies: 0
- Views: 1020
3 topics
one may not be quite security related, but.....fyi....
Mississippi Leads Nation In Software Piracy
http://www.theregister.co.uk/content/4/27891.html
Blogged by Kevin @ 12:23PM / Linkback / Comments (0)
"Mississippi flouts software licensing regulations more than any other state in the Union ...
Mississippi Leads Nation In Software Piracy
http://www.theregister.co.uk/content/4/27891.html
Blogged by Kevin @ 12:23PM / Linkback / Comments (0)
"Mississippi flouts software licensing regulations more than any other state in the Union ...
- Mon Oct 28, 2002 3:42 pm
- Forum: Network Security
- Topic: saddam and crippled cds
- Replies: 0
- Views: 953
saddam and crippled cds
http://www.wired.com/news/conflict/0,2100,55967,00.html
consumers shun crippled cds....well duh..
http://www.pcworld.com/news/article/0,a ... 02X,00.asp
consumers shun crippled cds....well duh..
http://www.pcworld.com/news/article/0,a ... 02X,00.asp
- Mon Oct 28, 2002 3:26 pm
- Forum: Network Security
- Topic: guess I'm paranoid....but....
- Replies: 4
- Views: 1188
hmmm
ok, I guess we're all in trouble....forgot all about that, so didn't know it, so put in the info....so, yeah, time to start panicking.....the chickens are falling, cried sky-little.....alll chaos reigns.....Former Chief Inspector Dreyfuss is running around the mushroom forest trying to kill his ...
- Fri Oct 25, 2002 12:48 pm
- Forum: Network Security
- Topic: guess I'm paranoid....but....
- Replies: 4
- Views: 1188
guess I'm paranoid....but....
is this site legit?
got this site from a friend for sponsorship of the military, but blank forms that say nothing make me a bit worried... :D
Here is your oportunity to thank the troops who defend our great nation! If you are so inclined, visit the Department of Defense web page below and add
your ...
got this site from a friend for sponsorship of the military, but blank forms that say nothing make me a bit worried... :D
Here is your oportunity to thank the troops who defend our great nation! If you are so inclined, visit the Department of Defense web page below and add
your ...
- Thu Oct 24, 2002 4:19 pm
- Forum: Network Security
- Topic: p2p bill halted for the moment.....
- Replies: 0
- Views: 1019
p2p bill halted for the moment.....
at least until it gets rewritten.... ;O
P2P hacking bill may be rewritten
By Declan McCullagh
Special to ZDNet News
October 24, 2002, 5:36 AM PT
URL: http://zdnet.com.com/2100-1105-963162.html
WASHINGTON--A proposal to let copyright owners hack into and disrupt peer-to-peer networks will be ...
P2P hacking bill may be rewritten
By Declan McCullagh
Special to ZDNet News
October 24, 2002, 5:36 AM PT
URL: http://zdnet.com.com/2100-1105-963162.html
WASHINGTON--A proposal to let copyright owners hack into and disrupt peer-to-peer networks will be ...
- Wed Oct 23, 2002 1:32 am
- Forum: Network Security
- Topic: Lavasoft Warning!!!!
- Replies: 8
- Views: 1234
misfits from another world?
heh heh heh....
sad that the hair dresser and tired car salesman on TV had out evolved the Neanderthal....
too bad that now we spend much of our time in meetings, held by committees who haven't even discovered fire yet...
and even if they did, they probably have a hard time trying to get the imagery ...
sad that the hair dresser and tired car salesman on TV had out evolved the Neanderthal....
too bad that now we spend much of our time in meetings, held by committees who haven't even discovered fire yet...
and even if they did, they probably have a hard time trying to get the imagery ...
- Mon Oct 21, 2002 5:23 pm
- Forum: Network Security
- Topic: sort of security stuff
- Replies: 0
- Views: 678
sort of security stuff
http://www.telegraph.co.uk/connected/main.jhtml; $sessionid$3PNUV3ILKICTDQFIQMFCFFOAVCBQYIV0?xml=/connected/2002/10/09/ecnxray06.xml&sSheet=/connected/2002/10/10/ixconn.html
and this one taken from lockergnome...
Red Hat Jabs at DMCA
http://www.internetnews.com/dev-news/article.php/1482751 ...
and this one taken from lockergnome...
Red Hat Jabs at DMCA
http://www.internetnews.com/dev-news/article.php/1482751 ...
- Mon Oct 21, 2002 3:11 pm
- Forum: Network Security
- Topic: Lavasoft Warning!!!!
- Replies: 8
- Views: 1234
hmmm
guess I need to come up with another story... 
not many others have gotten into the action, it seems....
not many others have gotten into the action, it seems....