On Thu, 13 Nov 2003, Andrew Jorgensen wrote: > A slightly longer google search will reveal how one guy wrote scripts to > call back the abuser and exploit the vulnerabilities on their machine to > shut them down and leave them a message about how to fix it all > automagically and in real-time.
Didn't this same guy get in trouble, too, iirc? ~ ross -- This sentence would be seven words long if it were six words shorter. ____________________ BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
