On Thu, 13 Nov 2003, Andrew Jorgensen wrote:

> A slightly longer google search will reveal how one guy wrote scripts to
> call back the abuser and exploit the vulnerabilities on their machine to
> shut them down and leave them a message about how to fix it all
> automagically and in real-time.

Didn't this same guy get in trouble, too, iirc?

  ~ ross

-- 

This sentence would be seven words long if it were six words shorter.


____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to