At 03:13 AM 5/23/00 +0200, Jacob Palme wrote:
>That would mean that every time you execute any program, you would
>have to get an analysis of its possible harmful effects and decide
>whether to accept it. [...]
Bruce Schneier's recent Crypto-gram (15 May) newsletter (see
http://www.counterpane.c
Hi,
Fred Baker wrote:
>
> At 11:01 PM 4/20/00 +0200, Anders Feder wrote:
> >The translation system being developed for the United Nations, the Universal
> >Network Language (UNL), looks quite promising. Does the IETF have any plans
> >regarding this system?
>
> not specifically. Care to make an
On Tue, 23 May 2000, Jean-Paul Jeral wrote:
> (1)
> http://www.unl.ias.unu.edu/publications/gm/breaking/bre/brk-02.htm
> states that:
>
> `UNL represents sentences in the form of
> logical expressions, without ambiguity.
> These expressions are not for humans to
> read, but for computers.'
S
The manner in which unsanctioned anti-democratic organizations
control what amounts to the global communications network is a
crime unto itself. Citizens utilizing this infra-structure posses
no legal protections, no constitutional safeguards and no basic
rights or liberties of any variety.
Jacob Palme <[EMAIL PROTECTED]> wrote:
> But would not better logg production in routers be an aid
> in finding the villain behind computer crimes?
What type of logging do you propose? It seems that the types of logging
that are already done enable people to trace the origins of suspicious
traf
>Jacob Palme <[EMAIL PROTECTED]> wrote:
>
>> But would not better logg production in routers be an aid
>> in finding the villain behind computer crimes?
>
>What type of logging do you propose? It seems that the types
>of logging
>that are already done enable people to trace the origins of suspi
Hello Bob,
I think you are being too harsh on the IETF, ISOC, ICANN, ITU, and
"whatever other unsanctioned, informal acretion of pseudo-authorities
should arise".
As an example, a group of people decided to coordinate efforts in order
to communicate with each other. They agreed on a forma
> From: "Dawson, Peter D" <[EMAIL PROTECTED]>
> >Jacob Palme <[EMAIL PROTECTED]> wrote:
> >
> >> But would not better logg production in routers be an aid
> >> in finding the villain behind computer crimes?
> >
> >What type of logging do you propose? It seems that the types
> >of logging
> >tha
>-Original Message-
>From: Vernon Schryver [mailto:[EMAIL PROTECTED]]
>Sent: Tuesday, May 23, 2000 4:14 PM
>To: [EMAIL PROTECTED]
>Subject: RE: Should IETF do more to fight computer crime?
>
>
>> From: "Dawson, Peter D" <[EMAIL PROTECTED]>
>
>> >Jacob Palme <[EMAIL PROTECTED]> wrote:
>> >
On Tue, 23 May 2000 18:27:41 -, "Dawson, Peter D" <[EMAIL PROTECTED]>
said:
> True, but only the origin of packets are determined. What is needed is
> a code of ethics between ISPs , to share information.
> i.e once a packet leaves isp1 cloud and travels across isp2 cloud,
> very rarely woul
>On Tue, 23 May 2000 18:27:41 -, "Dawson, Peter D"
><[EMAIL PROTECTED]> said:
>> True, but only the origin of packets are determined. What is
>needed is
>> a code of ethics between ISPs , to share information.
>> i.e once a packet leaves isp1 cloud and travels across isp2 cloud,
>> very ra
When the procedures dictate that government agencies get involved at certain
points
and you notify them of the outage or problem, what other steps do you
recommend?
Operational entities are not, in most cases, law enforcement agencies.
There is a limit to
how much notification one should under
In message <[EMAIL PROTECTED]>, Valdis.Kletnieks@vt
.edu writes:
>On Tue, 23 May 2000 18:27:41 -, "Dawson, Peter D" .com> said:
>> True, but only the origin of packets are determined. What is needed is
>> a code of ethics between ISPs , to share information.
>> i.e once a packet leaves isp1 c
Steven M. Bellovin writes:
>
> Right. On the other hand, the AP reports that a French-government
> sponsored bill would bar anonymous posting to the net. For details,
> see
>http://www.techserver.com/noframes/story/0,2294,500207446-500289602-501571097-0,00.html
But should the IETF be figh
In message <[EMAIL PROTECTED]>, Danny Iacovou writes:
>Steven M. Bellovin writes:
>>
>> Right. On the other hand, the AP reports that a French-government
>> sponsored bill would bar anonymous posting to the net. For details,
>> see http://www.techserver.com/noframes/story/0,2294,500207446-500
> From: "Dawson, Peter D" <[EMAIL PROTECTED]>
> ...
> I agree on the technical reality of tbyte storage/tcpdump etc...
(really technical unreality)
> >Technical reality always trumps political blather everywhere
> >that matters.
>
> Yes, but if I were behind a DMZ and my IDS triggers... and
On Tue, 23 May 2000 21:22:11 -, "Dawson, Peter D" <[EMAIL PROTECTED]>
said:
> lets say a non-student was naughty and was attacking the vt.edu network...
> would you feel satisfied with the answer.. "we're aware of it and that
> action is being taken as per our procedures" knowing fully
Danny,
Bob can fuel this arguement this topic for years
and needs no prompting from anyone. Don't get me
wrong technically speaking he's on the ball, but
politically speaking like all technicians suck.
This arguement should be binned and not fueled.
Bob, if you got this mail then give it a rest.
18 matches
Mail list logo