[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Olga die die die
I dunno. It once again seems so easy to use the "d" key, but if you
are really interested in tracing the culprit, a sysadmin at cs.utk.edu
can go through the smtp log (assuming it's a unix box) and try to find
the node from which this mail message was sent. It's possible to forge
this too, but it's a little less easy to do than to simply forge the
"From" field (which is truly novice hacker stuff). Catching a less
boring forger would require a realtime trace for which few people have
the patience.
The beauty of unix is its simplicity. Using the simplest of tools,
it's very easy to connect to a host and send a message under an assumed
name. If someone one has mastered this, then a sysadmin would have
to be in the right place at the right time to catch the culprit.
Long mail messages or overly frequent use would expose such a person,
so don't expect such messages to happen very often. So...use the "d"
key.
Eugene Fiume.