TIP: Click on subject to list as thread! ANSI
echo: scanners
to: BLAKE BOWERS
from: BILL CHEEK
date: 1996-08-20 09:12:00
subject: RULEMAKING: PGP SIGS

Yo! Blake:
Saturday August 17 1996 00:58, Blake Bowers wrote to Bill Cheek:
 BC>> OK, so I boot him from whatever BBS he used.  SO he logs into another
 BC>> one. And another.  After a while, the name of "Bud Jamison" just
 BC>> becomes mud, no matter which BBS and point of origin.
 BB> That is one of the reasons MOST BBS's verify users before allowing them
 BB> access to the message bases.
See my message to Bill Funk.  In truth, SysOps don't go to great lengths to 
verify their users.  Sure some do.  But most just take "reasonable" 
precautions akin to little more than a padlock on a toolbox.  Serves to keep 
honest people honest.
The slimeballs can get onto a system easy, though.  And SysOps do not go to 
superhuman efforts to prevent it.  So your observation, while true in the 
purest sense, isn't nearly as ironclad as the security we Fido SysOps impose 
on ourselves from the BBS level and up.
In a word, the users have it made in the shade, and can easily find ways to 
log as under a nomme de plume, aka, or downright fake ID.
Bill Cheek | Internet: bcheek@cts.com | Compu$erve: 74107,1176
Windows 95 Juggernaut Team | Microsoft MVP
--- Hertzian Mail+
---------------
* Origin: Hertzian Intercept-San Diego 619-578-9247 (6pm-1pm) (1:202/731)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.