Here's something else - today's sophisticated cracker would (or at 
least I would) crack into a computer that is physically located in a 
country that has little or no system for dealing with computer crimes. 
 That way, even if you are caught, there is likely little that will 
happen to you.  Hmmm . . . sounds like it might be time to do some 
legal research.  Good to know where the attacks may come from.

-- 
Ty Mixon
e-mail: [EMAIL PROTECTED]
ICQ:    26147713

>>>>>>>>>>>>>>>>>> Original Message <<<<<<<<<<<<<<<<<<

On 10/8/99, 5:22:01 PM, "Ken Wilson" <[EMAIL PROTECTED]> wrote 
regarding RE: [newbie] How do I turn in a hacker?:


> Or it's possibly an university student testing all the things he's
> learning about tcp/ip, sockets and ports and it's really quite 
harmless.
> From what I saw in the log report did not really demonstrate anything 
I
> would be inclined to call a serious attempt at hacking.

> Ken Wilson
> First Law of Optimisation: The speed of a non-working program is
> irrelevant
> (Steve Heller, 'Efficient C/C++ Programming')

> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of John Aldrich
> Sent: Friday, October 08, 1999 10:01 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [newbie] How do I turn in a hacker?


> On Fri, 08 Oct 1999, you wrote:
> > Here You Go My Friend...  I queried him for you.... all the info i
> have
> > found is below, i suggest emailing the following person with your
> complaint:
> > [EMAIL PROTECTED] (the admin from which he subscribes "ripe.net")
> >
> Actually, the person you need to email is
> "[EMAIL PROTECTED]"
> This is a university computer, so it sounds like someone
> has hacked their mainframe and is using it to find "open"
> redhat boxes. :-)
>       John


Reply via email to