BSD tty security, part 4: What You Can Look Forward To
Dave Hayes
dave at jato.jpl.nasa.gov
Wed May 1 08:31:29 AEST 1991
erc at Apple.COM (Ed Carp) writes:
>In article <3600:Apr2614:04:4391 at kramden.acf.nyu.edu> brnstnd at kramden.acf.nyu.edu (Dan Bernstein) writes:
>>6. I will give further details on the security holes to anyone who
>>convinces me that he has a legitimate interest. That means I want a
>>verifiable chain of people and phone numbers from the contact for a
>>major network down to whoever wants the information, plus a better
>Um, what IS this bullshit?
What indeed? Methinks it IS just that.
> Who the hell are you to set yourself up as some sort
>of net.god and tell us that you will "bless" us with all your neat little hacks
>and info only if we satisfy your little set of rules? Your pathetic excuses
>about protecting the information from "black hats" is unmitigated bullshit.
THANK YOU for saying this! I'm glad someone out there has sense.
>The only thing you are doing is concealing any valuable information that you
>may have from the people who have a genuine need for your information. The
>folks who already care about cracking into systems already know about this
>stuff anyway. Get real.
Hear, hear!
--
Dave Hayes - Network & Communications Engineering - JPL / NASA - Pasadena CA
dave at elxr.jpl.nasa.gov dave at jato.jpl.nasa.gov ames!elroy!dxh
There is a saying: "I believe it because it is impossible"
If you make any study of people in a state of what they are pleased to call
belief, you will find that you can usually best describe them by the saying:
"My belief has made me impossible."
More information about the Comp.unix.wizards
mailing list