1996-04-17 - That All.net loon…

Header Data

From: Rich Graves <llurch@networking.stanford.edu>
To: cypherpunks@toad.com
Message Hash: a272d1ba0ef5c9d3cff22fa0397ee8339c7142c1923467d5cb2b1139703d1062
Message ID: <Pine.ULT.3.92.960416202041.26011B-100000@Networking.Stanford.EDU>
Reply To: N/A
UTC Datetime: 1996-04-17 13:10:42 UTC
Raw Date: Wed, 17 Apr 1996 21:10:42 +0800

Raw message

From: Rich Graves <llurch@networking.stanford.edu>
Date: Wed, 17 Apr 1996 21:10:42 +0800
To: cypherpunks@toad.com
Subject: That All.net loon...
Message-ID: <Pine.ULT.3.92.960416202041.26011B-100000@Networking.Stanford.EDU>
MIME-Version: 1.0
Content-Type: text/plain


Think of this as an interesting experiment in reputation building, where
the bad guys won, and got a lot of business from the ignorant.

Remember Fred Cohen, the lunatic who had his telnet port booby-trapped to
fire off complaints to root and postmaster?

 http://www.atria.com/People/dawson/tbtf/archive/04-14-96.html
 http://www.dhp.com/amusement.html
 http://all.net/journal/netsec/top.html
 http://all.net/journal/netsec/9603.html
 http://all.net/journal/netsec/9604.html

I feel so sorry for Keith. He was trolled in a big way.

I also found this AMAZING BREAKTHROUGH in preventing IP spoofing very
amusing:

 http://all.net/journal/netsec/9606.html

-rich






Thread