1996-06-12 - Re: Anonymous return addresses

Header Data

From: Alan Horowitz <alanh@infi.net>
To: “Mark M.” <markm@voicenet.com>
Message Hash: 8669ed60311e1deaab75dfebf36588d0fb3d7838f052ed3e142279ddfb0328d0
Message ID: <Pine.SV4.3.91.960611172935.20391B-100000@larry.infi.net>
Reply To: <Pine.LNX.3.93.960608224227.128A-100000@gak>
UTC Datetime: 1996-06-12 07:42:22 UTC
Raw Date: Wed, 12 Jun 1996 15:42:22 +0800

Raw message

From: Alan Horowitz <alanh@infi.net>
Date: Wed, 12 Jun 1996 15:42:22 +0800
To: "Mark M." <markm@voicenet.com>
Subject: Re: Anonymous return addresses
In-Reply-To: <Pine.LNX.3.93.960608224227.128A-100000@gak>
Message-ID: <Pine.SV4.3.91.960611172935.20391B-100000@larry.infi.net>
MIME-Version: 1.0
Content-Type: text/plain


Can anyone "give away the Ending" of Cliff Stoll's book - and describe 
the basic methodology used to track back to the German hacker?

I don't have time to read the book. I don't need to understand all the 
little nuanced details, I just want to know the "trick".

Yours in couch potato'dom,
{your humble servant}





Thread