-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Not so.

RAPE-Traq is 6-10 different email address
truly only 1-3 people

not hackers
not skilled
not a worry

>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>
>What disturbs the White One even more than hypocrisy, the confu
>sion between moderation & censorship, and the personal attacks is that a list named 
>R.A.P.E.-Traq really exists.  My Whiteness once wrote, in a point paper, that there 
>have always been idiots, thieves, vaganbonds, scoundrels, and shady characters, as 
>well as the good, the noble, the decent, and the moral.  The great benefit of the 
>Internet is that it allows these two groups to interact more completely.
>
>Tip of the day for the noble: they're out there.  Check your fi
>rewall logs, check your TCP Wrapper logs (what, you don't know TCP Wrappers--look for 
>another e-mail on the topic), check your IDS logs.  The kiddiez, the eleet, the 
>wannabees and haxx0rs are constantly port scanning your systems, looking for holes to 
>exploit.  Do not think this is a fabrication of the security industry, nor let the 
>noisy ones spread FUD about that.  The Whiteness once also wrote that a great benefit 
>of the Internet was the potential for intellectual expression, for the best and 
>brightest to converge in a common consciousness.  Unfortunately, that potential was 
>perverted by the worst and dumbest, filling the cyberworld with pr0n and spa*m and 
>proving the existence of the bell curve.  An information system connected to the 
>Internet is private property, and it contents are served as the owner sees fit, via 
>HTTP, FTP, or what have you.  It is the owner's responsibility to secure the system 
>against th
> e shadiest of uses, keeping the kidz out and keeping the more
>serious threats out as well.
>
>Take heed, whitest ones.  Do not let the kiddies distract you,
>for while you fuss over their spewage, the real criminals--thieves, competitors, 
>foreign agents, et al.--are quietly and covertly pursuing diligent attacks, patiently 
>exploiting the more obscure and subtle vulnerabilities.
>
>My nets are spun of finest fiber, my kingdom is ringed with wal
>ls of fire.  I am no one, and everyone.  My identity is not as significant as my 
>anonymity.  Know me.
>
>" . . . then explain something to me.  If all these hacker kids
> are so smart, why don't they get real jobs and make something of themselves?"
>
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: Hush 2.1
>Note: This signature can be verified at https://www.hushtools.c
>om
>
>wmEEARECACEFAj2J9zYaHG5ha2VkX3R1cmtleUBodXNobWFpbC5jb20ACgkQfy8
>s3lIQ
>s+LFCQCgg7h4rGy3PbL9qowNI0T0HeEGzbcAn1FA2udh4fRwgChv2L2Wq8V2q0g
>5
>=dNCc
>-----END PGP SIGNATURE-----
>
>
>
>
>Get your free encrypted email at https://www.hushmail.com
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
>

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlgEARECABgFAj2J+n8RHGdvYmJsZXNAaHVzaC5jb20ACgkQpmwDHEAx56uggACgsM4q
0ut1NFD5JbkvbQQT87BO0pUAni0CWZsVNwKMuzRV4gXddewK/xhI
=aI4p
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to