From owner-freebsd-questions@FreeBSD.ORG Tue Jan 22 18:26:11 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D3B0D16A421 for ; Tue, 22 Jan 2008 18:26:11 +0000 (UTC) (envelope-from a.j.werven@student.utwente.nl) Received: from filter2-tmobile.zx.nl (filter2-tmobile.zx.nl [194.187.76.139]) by mx1.freebsd.org (Postfix) with ESMTP id 9877413C4E7 for ; Tue, 22 Jan 2008 18:26:11 +0000 (UTC) (envelope-from a.j.werven@student.utwente.nl) Received: from localhost (localhost.localdomain [127.0.0.1]) by filter2-tmobile.zx.nl (Postfix) with ESMTP id 317DF1C730E for ; Tue, 22 Jan 2008 19:26:08 +0100 (CET) X-Virus-Scanned: amavisd-new at zx.nl Received: from filter2-tmobile.zx.nl ([127.0.0.1]) by localhost (filter2.zx.nl [127.0.0.1]) (amavisd-new, port 10127) with ESMTP id PABqUTsTeDjE for ; Tue, 22 Jan 2008 19:25:59 +0100 (CET) Received: from [127.0.0.1] (unknown [89.205.133.194]) by filter2-tmobile.zx.nl (Postfix) with ESMTP for ; Tue, 22 Jan 2008 19:25:35 +0100 (CET) Message-ID: <47963534.2010203@student.utwente.nl> Date: Tue, 22 Jan 2008 18:25:56 +0000 From: "Alphons \"Fonz\" van Werven" User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) MIME-Version: 1.0 To: FreeBSD Questions References: <20080122125651.V2077@wojtek.tensor.gdynia.pl> <20080122123149.05837a85@scorpio> <47962B85.50805@student.utwente.nl> <20080122130630.53b0e624@scorpio> In-Reply-To: <20080122130630.53b0e624@scorpio> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: are we CRIMINALS? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: FreeBSD Questions List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Jan 2008 18:26:11 -0000 Gerard wrote: > While that may seem slightly harsh, at least for a first offense, it > does point up the fact that people like Ritz are a blight upon the > legitimate computer users community. Agreed. But upon looking at something like this... 4. Ritz frequently accomplished his access to Sierra's computers by concealing his identity via proxies and by accessing the servers via a Unix operating system and using a shell accounts, among other methods. ...I really get the feeling that, besides (justly) convicting Ritz for what he did, they seem under the impression that UNIX as a whole is evil and good for nothing but "hacking" (as most people unfortunately call it). Alphons -- VISTA - Viruses Intruders Spyware Trojans Adware