| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Moderators? |
08 Mar 08 14:37, Richard Webb wrote to Ward Dossche:
WD>> You have my permission to try and get listed as 2:292/854 ... and
WD>> see how much of my mail you can capture without people conspiring on
WD>> the routing.
RW> AS you said before, they would be able to produce mail, but not route
RW> it. tHIs is why we have session and packet passwording.
They can crash it. Someone has already shown how a netmail packet can be
dropped on any system that might be in a route and the netmail will be
sent to the system intended. No session or packet password required.
R\%/itt
--- Twit(t) Filter v2.1 (C) 2000
* Origin: SATX Alamo Area Net * South * Texas, USA * (1:397/22)SEEN-BY: 10/1 3 14/300 34/999 53/558 90/1 116/901 120/228 123/500 134/10 140/1 SEEN-BY: 222/2 226/0 236/150 249/303 261/20 38 100 1381 1404 1406 1418 SEEN-BY: 280/1027 320/119 396/45 633/104 260 262 267 285 712/848 800/432 SEEN-BY: 801/161 189 2222/700 2320/100 2905/0 @PATH: 397/22 123/500 261/38 633/260 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.