>
> You see, if the "terrorist" is smart enough, there is no way to detect
> his identity. If the attacker will use a chain of proxies and will
> combine the letter via Telnet-session, even the log-files of mail
> server will not help you in any way.
Yes, this is true... in which case, no, there r
I would be extremely surprised if any self-respecting ISP will tell you
who it is... and they shouldn't... they can't give out user info simply
because you provide them with headers privacy people! If someone
sends you an email you don't like and the ISP gives you their info, what
is to stop y
window so that potentially affected users know that maintenance will be
done and a short outage is possible...
Shawn Duffy, CCNA CCSE
email: pakkit at codepiranha dot org
web: http://codepiranha.org/~pakkit
gpg key: http://codepiranha.org/~pakkit/pakkit.asc
gpg fpr: 8988 6FB6 3CFE FE6D 548E 98FB
US, there still may ne nothing they can do. Though Yahoo will close the
account. Either way, you will never know the identity of the real sender,
at least from this... the law enforcement agency won't tell you who it is
once they have the records, nor should they, and neither will Yahoo.
Sh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hping
can't remember the link though...
shawn p. duffy
http://codepiranha.org/~pakkit
email: [EMAIL PROTECTED]
pgp key: [EMAIL PROTECTED]
pgp: 8988 6FB6 3CFE FE6D 548E 98FB CCE9 6CA9 98FC 665A
On Mon, 1 Jul 2002, Adrian Horton wrote:
> My compan
As others have said, the security of a system is more a function of the
admin running it than anything else... A great admin running Windows
2000 is by far better off than a complete moron running OpenBSD... Also,
don't put too much weight into the Orange Book rating of a system as it
does not tak
It would be worth notifying Yahoo of the suspected mischief, but I
wouldn't necessarily count on getting a real reply from them... imagine
how many people email them saying that someone is using their email...
plus if it is someone who sniffed or guessed your password, that really
isn't their resp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://www.nessus.org
shawn p. duffy
http://codepiranha.org/~pakkit
email: [EMAIL PROTECTED]
pgp key: [EMAIL PROTECTED]
pgp: 8988 6FB6 3CFE FE6D 548E 98FB CCE9 6CA9 98FC 665A
On 23 Apr 2002, Dan Williamson wrote:
>
>
> I would like to be able to
You can only use windump or any paket sniffer for that matter to catch
traffic that passes by your network interface... so if you try and sniff
traffic against a machine that is not on your network, you won't be able
to.. if you are on a network that is joined by a hub for example, you
may be able
Yeah, there are scripts that do that already... which might be fine if
you are running an ftp server for your friends but it is impractical to
run a site that gets any kind of traffic like that...
you can also get a dynamic hostname... dyndns.org for example will give
you a hostname and scripts t
10 matches
Mail list logo