From: Information Security <guy@panix.com>
To: cypherpunks@cyberpass.net
Message Hash: d66c31b768c918d05ea40968466e62c5531f4f3e87237937391246c0e5f2aa7b
Message ID: <199810250511.BAA00406@panix7.panix.com>
Reply To: N/A
UTC Datetime: 1998-10-25 23:02:51 UTC
Raw Date: Mon, 26 Oct 1998 07:02:51 +0800
From: Information Security <guy@panix.com>
Date: Mon, 26 Oct 1998 07:02:51 +0800
To: cypherpunks@cyberpass.net
Subject: Regarding Mitnick: not.
Message-ID: <199810250511.BAA00406@panix7.panix.com>
MIME-Version: 1.0
Content-Type: text/plain
ZDnet just sent out a newsletter promoting a series of stories,
including this one:
# IS YOUR KID A HACKER?
# Is your teen hacking the Pentagon instead of doing homework?
# How to tell -- and how to handle it. Convicted hacker Kevin
# Mitnick gives his views.
#
# http://chkpt.zdnet.com/chkpt/zdnu98102501/www.zdnet.com/familypc/content/9810/columns/parental.html
No mention of Mitnick.
They apparently meant to name the article author 'Kevin Poulsen'.
# It happened to my family 15 years ago, in one of the first hacker raids in the
# country. At that time, I was the teenage miscreant who was illegally accessing
# federal computers. Now, in my early thirties, I've begun to wonder how I would
# protect a kid of my own from becoming a poster child for computer crime. I believe
# the best approach is to stay informed and to communicate with your potential
# cyberpunks.
That reminds me. For those who haven't seen it, there is a commercial
showing a little girl (about 8?) walking into an airport, dizzied by
all the destination choices. The narrative turns to ~"and the Internet
too has many destinations, not all of which she is ready for. Travel
together..."
All things considered, better than the Federales approach.
---guy
When your only tool is a hammer...all brains look like Gallagher's watermelons.
Return to October 1998
Return to “Information Security <guy@panix.com>”
1998-10-25 (Mon, 26 Oct 1998 07:02:51 +0800) - Regarding Mitnick: not. - Information Security <guy@panix.com>