Re: Draft of Rep. Berman's bill authorizes anti-P2P hacking

2002-07-24 Thread James Thomason



Would malicious actions on the part of copyright holders violate the
AUP of most networks?  Or are service providers more willing to tolerate
denial of service attacks by large corporations than say, spam?

If this legislation is passed, they certainly will earn Null0 on mine.

Regards, 
James Thomason


On Wed, 24 Jul 2002, Marshall Eubanks wrote:

 
 Thought this would be considered on-topic as guess who would have
 to clean up the resulting messes...
 
 Regards
 Marshall Eubanks
 
 - Forwarded message from Declan McCullagh [EMAIL PROTECTED] -
 
 From: Declan McCullagh [EMAIL PROTECTED]
 Subject: FC: Draft of Rep. Berman's bill authorizes anti-P2P hacking
 To: [EMAIL PROTECTED]
 Date: Tue, 23 Jul 2002 20:29:35 -0400
 X-URL: http://www.mccullagh.org/
 X-URL: Politech is at http://www.politechbot.com/
 
 
 
 http://news.com.com/2100-1023-945923.html?tag=politech
 
 Could Hollywood hack your PC?
 By Declan McCullagh
 July 23, 2002, 4:45 PM PT
 
 WASHINGTON--Congress is about to consider an entertainment
 industry proposal that would authorize copyright holders to disable
 PCs used for illicit file trading.
 
 A draft bill seen by CNET News.com marks the boldest political effort
 to date by record labels and movie studios to disrupt peer-to-peer
 networks that they view as an increasingly dire threat to their bottom
 line.
 
 Sponsored by Reps. Howard Berman, D-Calif., and Howard Coble, R-N.C.,
 the measure would permit copyright holders to perform nearly unchecked
 electronic hacking if they have a reasonable basis to believe that
 piracy is taking place. Berman and Coble plan to introduce the 10-page
 bill this week.
 
 The legislation would immunize groups such as the Motion Picture
 Association of America and the Recording Industry Association of
 America from all state and federal laws if they disable, block or
 otherwise impair a publicly accessible peer-to-peer network.
 
 Anyone whose computer was damaged in the process must receive the
 permission of the U.S. attorney general before filing a lawsuit, and a
 suit could be filed only if the actual monetary loss was more than
 $250.
 
 According to the draft, the attorney general must be given complete
 details about the specific technologies the copyright holder intends
 to use to impair the normal operation of the peer-to-peer network.
 Those details would remain secret and would not be divulged to the
 public.
 
 The draft bill doesn't specify what techniques, such as viruses,
 worms, denial-of-service attacks, or domain name hijacking, would be
 permissible. It does say that a copyright-hacker should not delete
 files, but it limits the right of anyone subject to an intrusion to
 sue if files are accidentally erased.
 
 [...]
 
 
 
 -
 POLITECH -- Declan McCullagh's politics and technology mailing list
 You may redistribute this message freely if you include this notice.
 To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
 This message is archived at http://www.politechbot.com/
 Declan McCullagh's photographs are at http://www.mccullagh.org/
 -
 Like Politech? Make a donation here: http://www.politechbot.com/donate/
 -
 
 
 - End forwarded message -
 
 -- 
   Regards
   Marshall Eubanks
 
 
 
 T.M. Eubanks
 Multicast Technologies, Inc
 10301 Democracy Lane, Suite 410
 Fairfax, Virginia 22030
 Phone : 703-293-9624   Fax : 703-293-9609
 e-mail : [EMAIL PROTECTED]
 http://www.multicasttech.com
 
 Test your network for multicast :
 http://www.multicasttech.com/mt/
   Status of Multicast on the Web  :
   http://www.multicasttech.com/status/index.html
 




Re: Fwd: FOUND VIRUS IN MAIL

2002-06-18 Thread James Thomason


I could not get this virus to execute on my BSD box, the binary must
be corrupt.  

Clearly this person did not study their target audience. 

Regards, 
James


On 17 Jun 2002, Larry Rosenman wrote:

 
 Fair Warning
 
 
 
 -Forwarded Message-
 
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: FOUND VIRUS IN MAIL from [EMAIL PROTECTED]
 Date: 17 Jun 2002 22:48:16 -0500
 
 A virus was found in an email from:
 
 [EMAIL PROTECTED]
 
 The message was addressed to: 
 
 - [EMAIL PROTECTED]
 
 The message has been quarantined as:
 
 /var/virusmails/virus-20020617-224816-21028
 
 Here is the output of the scanner:
 
 Scanning /var/amavis/amavis-milter-4Oa4l925/parts/*
 Scanning file /var/amavis/amavis-milter-4Oa4l925/parts/msg-21028-1.txt
 Scanning file /var/amavis/amavis-milter-4Oa4l925/parts/msg-21028-2.html
 Scanning file /var/amavis/amavis-milter-4Oa4l925/parts/msg-21028-3.exe
 /var/amavis/amavis-milter-4Oa4l925/parts/msg-21028-3.exe
 Found the DDoS-Slack trojan !!!
 
 Summary report on /var/amavis/amavis-milter-4Oa4l925/parts/*
 File(s)
 Total files: ...   3
 Clean: .   2
 Possibly Infected: .   1
 
 Here are the headers:
 
 - BEGIN HEADERS -
 Received: by trapdoor.merit.edu (Postfix)
   id 0FA7F9124E; Mon, 17 Jun 2002 23:46:02 -0400 (EDT)
 Delivered-To: [EMAIL PROTECTED]
 Received: by trapdoor.merit.edu (Postfix, from userid 56)
   id B621F9124F; Mon, 17 Jun 2002 23:46:01 -0400 (EDT)
 Delivered-To: [EMAIL PROTECTED]
 Received: from segue.merit.edu (segue.merit.edu [198.108.1.41])
   by trapdoor.merit.edu (Postfix) with ESMTP id A61099124E
   for [EMAIL PROTECTED]; Mon, 17 Jun 2002 23:45:58 -0400 (EDT)
 Received: by segue.merit.edu (Postfix)
   id 8CCEA5DE57; Mon, 17 Jun 2002 23:45:58 -0400 (EDT)
 Delivered-To: [EMAIL PROTECTED]
 Received: from web21109.mail.yahoo.com (web21109.mail.yahoo.com [216.136.227.111])
   by segue.merit.edu (Postfix) with SMTP id D92105DE52
   for [EMAIL PROTECTED]; Mon, 17 Jun 2002 23:45:57 -0400 (EDT)
 Message-ID: [EMAIL PROTECTED]
 Received: from [68.36.89.121] by web21109.mail.yahoo.com via HTTP; Mon, 17 Jun 2002 
20:45:56 PDT
 Date: Mon, 17 Jun 2002 20:45:56 -0700 (PDT)
 From: jim bruer [EMAIL PROTECTED]
 Subject: ConfigMaker Beta 
 To: [EMAIL PROTECTED]
 MIME-Version: 1.0
 Content-Type: multipart/mixed; boundary=0-340633384-1024371956=:50295
 Sender: [EMAIL PROTECTED]
 Precedence: bulk
 Errors-To: [EMAIL PROTECTED]
 X-Loop: nanog
 -- END HEADERS --
 -- 
 Larry Rosenman http://www.lerctr.org/~ler
 Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
 US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749
 





RE: Stealth p2p network in Kazaa and Morpheus?....

2002-04-03 Thread James Thomason


And I wanted to download files, but certainly did not want to unwittingly
support a CDN.  

Maybe everyone  will simply cease using the software.  It certainly
would set a nice example for other corporations implementing spyware, and
other unsavory features.  

Regards, 
James

On Wed, 3 Apr 2002, Chris Boyd wrote:

 
 
 grouch
 Maybe ISPs and carriers can file a class action suit against these guys for
 something.  I wanted to run a network, not manage someone else's distributed
 server farm.
 /grouch
 
  -Original Message-
  From:   Craig Holland [SMTP:[EMAIL PROTECTED]]
  Sent:   Tuesday, April 02, 2002 6:35 PM
  To: Nanog@Merit. Edu
  Subject:Stealth p2p network in Kazaa and Morpheus?
  
  
  This was news to me, so I'm passing it along.  Sorry if it's spam.
  Checked
  the archives, and didn't see anything to this affect.
  
  watch the wrap
  http://story.news.yahoo.com/news?tmpl=storyu=/cn/20020402/tc_cn/stealth_p
  2p
  _network_hides_inside_kazaa