[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Olga die die die



I dunno.  It once again seems so easy to use the "d" key, but if you
are really interested in tracing the culprit, a sysadmin at cs.utk.edu
can go through the smtp log (assuming it's a unix box) and try to find
the node from which this mail message was sent.  It's possible to forge
this too, but it's a little less easy to do than to simply forge the
"From" field (which is truly novice hacker stuff).  Catching a less
boring forger would require a realtime trace for which few people have
the patience.

The beauty of unix is its simplicity.  Using the simplest of tools,
it's very easy to connect to a host and send a message under an assumed
name.  If someone one has mastered this, then a sysadmin would have
to be in the right place at the right time to catch the culprit.

Long mail messages or overly frequent use would expose such a person,
so don't expect such messages to happen very often.  So...use the "d"
key.

Eugene Fiume.