1996-04-28 - Re: www.WhosWhere.com selling access to my employer’s passwd file

Header Data

From: Black Unicorn <unicorn@schloss.li>
To: Sentiono Leowinata <sentiono@cycor.ca>
Message Hash: ae6812e949d6cd35cf6f0b7010fe020e6036fa116ae2ee319e367543b5cabdcb
Message ID: <Pine.SUN.3.93.960427191953.24829F-100000@polaris.mindport.net>
Reply To: <Pine.OSF.3.91.960427180844.11803B-100000@bud.peinet.pe.ca>
UTC Datetime: 1996-04-28 05:09:47 UTC
Raw Date: Sun, 28 Apr 1996 13:09:47 +0800

Raw message

From: Black Unicorn <unicorn@schloss.li>
Date: Sun, 28 Apr 1996 13:09:47 +0800
To: Sentiono Leowinata <sentiono@cycor.ca>
Subject: Re: www.WhosWhere.com selling access to my employer's passwd file
In-Reply-To: <Pine.OSF.3.91.960427180844.11803B-100000@bud.peinet.pe.ca>
Message-ID: <Pine.SUN.3.93.960427191953.24829F-100000@polaris.mindport.net>
MIME-Version: 1.0
Content-Type: text/plain


On Sat, 27 Apr 1996, Sentiono Leowinata wrote:


> I wonder how they can get the e-mail address? Our finger daemon are 
> blocked. Many un-broadcast e-mail addresses (the account never send any 
> e-mails to anyone) are in the database. How?
> Furthermore, isn't it also privacy invasion? 
> Would any hackers or expert people kindly to tell me how to block 
> further threat like this?

Use a nym.

---
My preferred and soon to be permanent e-mail address:unicorn@schloss.li
"In fact, had Bancroft not existed,       potestas scientiae in usu est
Franklin might have had to invent him."    in nihilum nil posse reverti
00B9289C28DC0E55  E16D5378B81E1C96 - Finger for Current Key Information
Opp. Counsel: For all your expert testimony needs: jimbell@pacifier.com






Thread