1996-04-28 - Re: www.WhoWhere.com selling access to my employer’s passwd file

Header Data

From: Roger Williams <roger@coelacanth.com>
To: cypherpunks@toad.com
Message Hash: 81d2f4b9d6be76ad28d3cbf0738b4cc326f80e7c81cc3a3e12b71a21e693f390
Message ID: <9604280504.AA0285@sturgeon.coelacanth.com>
Reply To: <Pine.GUL.3.93.960427163753.9454D-100000@Networking.Stanford.EDU>
UTC Datetime: 1996-04-28 10:06:28 UTC
Raw Date: Sun, 28 Apr 1996 18:06:28 +0800

Raw message

From: Roger Williams <roger@coelacanth.com>
Date: Sun, 28 Apr 1996 18:06:28 +0800
To: cypherpunks@toad.com
Subject: Re: www.WhoWhere.com selling access to my employer's passwd file
In-Reply-To: <Pine.GUL.3.93.960427163753.9454D-100000@Networking.Stanford.EDU>
Message-ID: <9604280504.AA0285@sturgeon.coelacanth.com>
MIME-Version: 1.0
Content-Type: text/plain


>>>>> Rich Graves <llurch@networking.stanford.edu> writes:

  > What whowhere.com did (whoswhere was a typo, yes -- it was late,
  > and I was rather pissed off) was grab the password file...

Pretty apparent, when you discover that they have 167 matches for
"daemon", >>500 matches for "admin", etc., which don't return any
valid user email addresses...

-- 
Roger Williams                         finger me for my PGP public key
Coelacanth Engineering        consulting & turnkey product development
Middleborough, MA           wireless * DSP-based instrumentation * ATE
tel +1 508 947-8049 * fax +1 508 947-9118 * http://www.coelacanth.com/






Thread