TIP: Click on subject to list as thread! ANSI
echo: tech
to: MARTIN ATKINS
from: mark lewis
date: 2005-03-27 12:14:58
subject: rooted

CA>> Sure. Once you are 'rooted' the hackers can
CA>> install/modify your system to be anything they
CA>> want it to be.

 MA> So let me get this straight. First they penetrate my
 MA> fire wall then they somehow negotiate my spam filter
 MA> taking control of my computer and wreak havoc on the
 MA> internet.

your fallacy is in thinking that your firewall doesn't have some way of
being broken AND that you seem to expect everything to arrive as spam...
are you aware of the slammer worm? what about code red or nimda? are you
absolutely positive that your browser doesn't have some hole in it that
simply visiting a website might bring something in? are you aware of the
byteverify worm/virus? what about the stuff going around that uses the
jscript.encode javascript method of hiding what it actually does?

hello?

)\/(ark

* Origin: (1:3634/12)
SEEN-BY: 633/267 270
@PATH: 3634/12 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.