-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Not so. RAPE-Traq is 6-10 different email address truly only 1-3 people not hackers not skilled not a worry > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > > >What disturbs the White One even more than hypocrisy, the confu >sion between moderation & censorship, and the personal attacks is that a list named >R.A.P.E.-Traq really exists. My Whiteness once wrote, in a point paper, that there >have always been idiots, thieves, vaganbonds, scoundrels, and shady characters, as >well as the good, the noble, the decent, and the moral. The great benefit of the >Internet is that it allows these two groups to interact more completely. > >Tip of the day for the noble: they're out there. Check your fi >rewall logs, check your TCP Wrapper logs (what, you don't know TCP Wrappers--look for >another e-mail on the topic), check your IDS logs. The kiddiez, the eleet, the >wannabees and haxx0rs are constantly port scanning your systems, looking for holes to >exploit. Do not think this is a fabrication of the security industry, nor let the >noisy ones spread FUD about that. The Whiteness once also wrote that a great benefit >of the Internet was the potential for intellectual expression, for the best and >brightest to converge in a common consciousness. Unfortunately, that potential was >perverted by the worst and dumbest, filling the cyberworld with pr0n and spa*m and >proving the existence of the bell curve. An information system connected to the >Internet is private property, and it contents are served as the owner sees fit, via >HTTP, FTP, or what have you. It is the owner's responsibility to secure the system >against th > e shadiest of uses, keeping the kidz out and keeping the more >serious threats out as well. > >Take heed, whitest ones. Do not let the kiddies distract you, >for while you fuss over their spewage, the real criminals--thieves, competitors, >foreign agents, et al.--are quietly and covertly pursuing diligent attacks, patiently >exploiting the more obscure and subtle vulnerabilities. > >My nets are spun of finest fiber, my kingdom is ringed with wal >ls of fire. I am no one, and everyone. My identity is not as significant as my >anonymity. Know me. > >" . . . then explain something to me. If all these hacker kids > are so smart, why don't they get real jobs and make something of themselves?" > > > >-----BEGIN PGP SIGNATURE----- >Version: Hush 2.1 >Note: This signature can be verified at https://www.hushtools.c >om > >wmEEARECACEFAj2J9zYaHG5ha2VkX3R1cmtleUBodXNobWFpbC5jb20ACgkQfy8 >s3lIQ >s+LFCQCgg7h4rGy3PbL9qowNI0T0HeEGzbcAn1FA2udh4fRwgChv2L2Wq8V2q0g >5 >=dNCc >-----END PGP SIGNATURE----- > > > > >Get your free encrypted email at https://www.hushmail.com >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlgEARECABgFAj2J+n8RHGdvYmJsZXNAaHVzaC5jb20ACgkQpmwDHEAx56uggACgsM4q 0ut1NFD5JbkvbQQT87BO0pUAni0CWZsVNwKMuzRV4gXddewK/xhI =aI4p -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
