From: Rich Graves <llurch@networking.stanford.edu>
To: cypherpunks@toad.com
Message Hash: a272d1ba0ef5c9d3cff22fa0397ee8339c7142c1923467d5cb2b1139703d1062
Message ID: <Pine.ULT.3.92.960416202041.26011B-100000@Networking.Stanford.EDU>
Reply To: N/A
UTC Datetime: 1996-04-17 13:10:42 UTC
Raw Date: Wed, 17 Apr 1996 21:10:42 +0800
From: Rich Graves <llurch@networking.stanford.edu>
Date: Wed, 17 Apr 1996 21:10:42 +0800
To: cypherpunks@toad.com
Subject: That All.net loon...
Message-ID: <Pine.ULT.3.92.960416202041.26011B-100000@Networking.Stanford.EDU>
MIME-Version: 1.0
Content-Type: text/plain
Think of this as an interesting experiment in reputation building, where
the bad guys won, and got a lot of business from the ignorant.
Remember Fred Cohen, the lunatic who had his telnet port booby-trapped to
fire off complaints to root and postmaster?
http://www.atria.com/People/dawson/tbtf/archive/04-14-96.html
http://www.dhp.com/amusement.html
http://all.net/journal/netsec/top.html
http://all.net/journal/netsec/9603.html
http://all.net/journal/netsec/9604.html
I feel so sorry for Keith. He was trolled in a big way.
I also found this AMAZING BREAKTHROUGH in preventing IP spoofing very
amusing:
http://all.net/journal/netsec/9606.html
-rich
Return to April 1996
Return to “Rich Graves <llurch@networking.stanford.edu>”
1996-04-17 (Wed, 17 Apr 1996 21:10:42 +0800) - That All.net loon… - Rich Graves <llurch@networking.stanford.edu>