Oh come now,
All this "ethical" talk clearly contradicts the basic altruistics of
qualities demonstrated by current and potential "Bastard Operators From
Hell." (tm)
Given that no relationship is actually worth the time spent to do
something such as this, the fact remains that you are able to do it and
haven't yet done it, regardless of the causes, effects, and morality of
the situation.
So it's immoral to download music that isn't yours and burn it to a
disc. Instead of buying it. I saw several messages to the thread of
"Gnapster" just this week. But no moral discussion about it. Why is this
different?
I say, hell, let the end user worry about whether what he does is right,
moral, just, criminal, whatever. If you can help this guy, hell, just tell
him how and then add a disclaimer if you're worried about implication in a
criminal aspect, so you're not an accessory.
I say let people worry about themselves. Screw seatbelt laws. :)
On Fri, 2 Feb 2001, Michael R. Jinks wrote:
> Date: Fri, 02 Feb 2001 09:50:02 -0600
> From: Michael R. Jinks <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Subject: Re: How to Setup Tcpdump to nail x-girlfriend?
>
> I may have read wrong, but I think he's trying to intercept mail --
> like, for reading, not for sending to the bit bucket.
>
> If that's the case, then that is most definitely not playing fair.
> Network managers, legal departments, and HR managers all take an
> exceedingly dim view of such things, not to mention the general ethics
> of systems administrators. It's just wrong, no matter what somebody may
> have done, to intercept their private conversations. It is even more
> wrong if you happen to be root somewhere on the network; root users are
> vested with an extra responsibility, even if nobody has ever told you
> so, to play extra-cautiously around the network.
>
> The things that PHD wants to do are exceedingly easy for a root user
> given the right kind of network; knowing how, and even sharing the
> information on how, is something that I believe all should be free to
> do; but actually doing so is the highest of crimes in the networked
> world, where privacy is rapidly being eroded from all sides as it is.
>
>
>
> Calamity wrote:
> >
> > PHD wrote:
> > >
> > > For some reason, I cannot find any information on
> > > setting up a Tcpdump file to scan for keywords.
> > >
> > > Also, x-girlfriend is a cetified witch and I would
> > > like to figure out how to intercept her email.
> > >
> > > Will Tcpdump work, or is there something better?
> >
> > I dunno about tcppdump, but wouldn't a plain ol' mail filter work?
> > That's what I use to reject email from my X. <grin> It works wonders
> > for me!
> > Marie
> > --
> > Marie Bennington
> > Customer Service Representative
> > [EMAIL PROTECTED]
> > ICQ# 4983764
> > Computers are like air conditioners:
> > they stop working properly when you open windows
> >
> > _______________________________________________
> > Redhat-list mailing list
> > [EMAIL PROTECTED]
> > https://listman.redhat.com/mailman/listinfo/redhat-list
>
>
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list