From: hippyman <hippyman@alltel.net>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: f5b48af0f87f63325579974df447628ee722039e25600ba7a4321a3f7a6d7ef9
Message ID: <199806181847.NAA29802@client.alltel.net>
Reply To: N/A
UTC Datetime: 1998-06-18 18:47:30 UTC
Raw Date: Thu, 18 Jun 1998 11:47:30 -0700 (PDT)
From: hippyman <hippyman@alltel.net>
Date: Thu, 18 Jun 1998 11:47:30 -0700 (PDT)
To: cypherpunks <cypherpunks@toad.com>
Subject: Re: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806181847.NAA29802@client.alltel.net>
MIME-Version: 1.0
Content-Type: text/plain
At 07:50 AM 6/18/98 , you wrote:
>I have come across a webpage at
>
>http://www.thecodex.com/dirt.html
>
>that describes a so-called D.I.R.T. (Data Interception by Remote
>Transmission) software enabling the attacker (be it a criminal or
>police or govt.) to remotely keep a close eye on everything that't
>going on on the target PC. I can pretty much imagine how it works once
>it's installed but what I'd like to know is *how* it gets installed on
>the target computer?
>I would also appreciate any info about the product from people with
>first hand experience, since I intend to do an in-depth research for
>one of the European Governments.
Why don't you contact the owner and ask him how it works? Posting to
cypherpunks and asking questions about it seems a bit unusual. Smells like
a spam.
You're name wouldn't be Spyking, would it?
hippyman
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A
Return to June 1998
Return to “hippyman <hippyman@alltel.net>”
1998-06-18 (Thu, 18 Jun 1998 11:47:30 -0700 (PDT)) - Re: TheCodex’s D.I.R.T. surveillance software - hippyman <hippyman@alltel.net>