I may have read wrong, but I think he's trying to intercept mail --
like, for reading, not for sending to the bit bucket.
If that's the case, then that is most definitely not playing fair.
Network managers, legal departments, and HR managers all take an
exceedingly dim view of such things, not to mention the general ethics
of systems administrators. It's just wrong, no matter what somebody may
have done, to intercept their private conversations. It is even more
wrong if you happen to be root somewhere on the network; root users are
vested with an extra responsibility, even if nobody has ever told you
so, to play extra-cautiously around the network.
The things that PHD wants to do are exceedingly easy for a root user
given the right kind of network; knowing how, and even sharing the
information on how, is something that I believe all should be free to
do; but actually doing so is the highest of crimes in the networked
world, where privacy is rapidly being eroded from all sides as it is.
Calamity wrote:
>
> PHD wrote:
> >
> > For some reason, I cannot find any information on
> > setting up a Tcpdump file to scan for keywords.
> >
> > Also, x-girlfriend is a cetified witch and I would
> > like to figure out how to intercept her email.
> >
> > Will Tcpdump work, or is there something better?
>
> I dunno about tcppdump, but wouldn't a plain ol' mail filter work?
> That's what I use to reject email from my X. <grin> It works wonders
> for me!
> Marie
> --
> Marie Bennington
> Customer Service Representative
> [EMAIL PROTECTED]
> ICQ# 4983764
> Computers are like air conditioners:
> they stop working properly when you open windows
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
--
Michael Jinks, IB // Technical Entity // Saecos Corporation
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list