Here's something else - today's sophisticated cracker would (or at
least I would) crack into a computer that is physically located in a
country that has little or no system for dealing with computer crimes.
That way, even if you are caught, there is likely little that will
happen to you. Hmmm . . . sounds like it might be time to do some
legal research. Good to know where the attacks may come from.
--
Ty Mixon
e-mail: [EMAIL PROTECTED]
ICQ: 26147713
>>>>>>>>>>>>>>>>>> Original Message <<<<<<<<<<<<<<<<<<
On 10/8/99, 5:22:01 PM, "Ken Wilson" <[EMAIL PROTECTED]> wrote
regarding RE: [newbie] How do I turn in a hacker?:
> Or it's possibly an university student testing all the things he's
> learning about tcp/ip, sockets and ports and it's really quite
harmless.
> From what I saw in the log report did not really demonstrate anything
I
> would be inclined to call a serious attempt at hacking.
> Ken Wilson
> First Law of Optimisation: The speed of a non-working program is
> irrelevant
> (Steve Heller, 'Efficient C/C++ Programming')
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of John Aldrich
> Sent: Friday, October 08, 1999 10:01 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [newbie] How do I turn in a hacker?
> On Fri, 08 Oct 1999, you wrote:
> > Here You Go My Friend... I queried him for you.... all the info i
> have
> > found is below, i suggest emailing the following person with your
> complaint:
> > [EMAIL PROTECTED] (the admin from which he subscribes "ripe.net")
> >
> Actually, the person you need to email is
> "[EMAIL PROTECTED]"
> This is a university computer, so it sounds like someone
> has hacked their mainframe and is using it to find "open"
> redhat boxes. :-)
> John