Back to the main page

Mailing List Logs for ShadowRN

From: Spike <u5a77@*****.CS.KEELE.AC.UK>
Subject: Re: Hacking
Date: Sat, 12 Jul 1997 23:54:58 +0100
|Do then ends justify the means?

Sometimes, yes....

|For all the time needed and required to obtain knowledge of a mark
|system, just to infiltrate it, isn't there an easier way of obtaining
|the goods you are trying to 'borrow'?

Borrow? Implying you'll give it back some day???
LOL

|Is 'hacking' a viable means of theft?

Can be. Some systems today have howling security holes in them....
Unix for example.
Also, it's quite possibly to create a virus tagged to a peice of software
that auto-mails you the password of the poor idiot using the infected
stuff.....
--
______________________________________________________________________________
|u5a77@*****.cs.keele.ac.uk| "Are you pondering what I'm pondering Pinky?" |
|Andrew Halliwell | |
|Principal subjects in:- | "I think so brain, but this time, you control |
|Comp Sci & Electronics | the Encounter suit, and I'll do the voice..." |
------------------------------------------------------------------------------
|GCv3.1 GCS/EL>$ d---(dpu) s+/- a- C++ U N++ o+ K- w-- M+/++ PS+++ PE- Y t+ |
|5++ X+/++ R+ tv+ b+ D G e>PhD h/h+ !r! !y-|I can't say F**K either now! :( |
------------------------------------------------------------------------------

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.