1996-01-19 - Re: “cybertage”

Header Data

From: jwa@nbs.nau.edu (James W. Abendschan)
To: cypherpunks@toad.com
Message Hash: 1d346e3b56029bc439df3eb168ad00cadf04c1ffe65fca15319b76582cfc238b
Message ID: <199601191805.LAA16786@ecosys.nbs.nau.edu>
Reply To: <vznuri@netcom.com>
UTC Datetime: 1996-01-19 18:21:21 UTC
Raw Date: Sat, 20 Jan 1996 02:21:21 +0800

Raw message

From: jwa@nbs.nau.edu (James W. Abendschan)
Date: Sat, 20 Jan 1996 02:21:21 +0800
To: cypherpunks@toad.com
Subject: Re: "cybertage"
In-Reply-To: <vznuri@netcom.com>
Message-ID: <199601191805.LAA16786@ecosys.nbs.nau.edu>
MIME-Version: 1.0
Content-Type: text/plain


Way back on Jan 19,  9:22am, "Vladimir Z. Nuri" wrote:
> how about a new term for all the various enemies of cyberspatial 
> advancement? the censors, the luddites, the spooks, the politicians,
> the demagogues, the rabid media (all of which there seems to be no 
> shortage of lately):
> 
> "cyberteurs" engaging in "cybertage"

Augh!  No!  No more "cyber" anything, please!  Instead, how about
a filter (implemented at some key top-level, NSA-funded routers,
of course) that simply s/cyber//g ?

- - -

How "tight" is the encryption that ssh (secure shell) uses?  I'm
trying to push it for use across potentially insecure subnets
at our University, and would like all the ammo I can get :) 

Has anyone tried to sniff & brute force a ssh-encrypted session?

James


-- 
James W. Abendschan                                     Email: jwa@nbs.nau.edu
UNIX Systems Programmer/Administrator                   Voice: (520) 556-7466
Colorado Plateau Research Station, Flagstaff, AZ        FAX:   (520) 556-7500 





Thread