I agree that the morality of the situation is shady; for example I might
have reacted differently if the original poster had said, "How might one
intercept network traffic in toto for later perusal with text parsing
utilities?" (okay PHD, there's one hint for you.)

But here's a person standing up and saying outright, "Can somebody
please specifically advise me in my attempts to violate another
individual's privacy?"  This to me is a lot more clear-cut than the
whole Napster thing, where I don't necessarily see such an obvious moral
issue.  Possible moral issues?  Sure.  Definite ones?  Read some web,
there's an argument still going on about that and it's likely to
continue for a while yet.

Want help using tcpdump, less, grep, awk, sed, and so forth?  dsniff,
even?  Happy to help. (PHD?  you still paying attention?)  But like
Luke's mother, Honest Uncle Billy (William S. Burroughs to most of the
world) advised us to "Never interfere in a boy and girl fight," and this
is advice which I take to heart.  His advice to avoid vampires and
fuckups has also served me exceedingly well over the years.

An experienced martial artist won't teach you the killing moves, even
the easy ones, until you've had the experience of learning the more
mundane skills and being beaten up a bit yourself, and I think that's a
valuable lesson to generalize.  Inflicting my morality on others?  You
bet.  Maybe I'm an ass.  But the information is out there, and if you
need it you can get it; why should it be any easier to abuse the net
than it already is?

During the search for a defense attorney for Timothy McVeigh, I remember
one lawyer (no clue of the guy's name) saying something to the effect
that, yes he deserves an attorney, but that doesn't mean it has to be
me.

Cheers,
-m

"Joseph R. Erlewein" wrote:
> 
> Oh come now,
> All this "ethical" talk clearly contradicts the basic altruistics of
> qualities demonstrated by current and potential "Bastard Operators From
> Hell." (tm)
> Given that no relationship is actually worth the time spent to do
> something such as this, the fact remains that you are able to do it and
> haven't yet done it, regardless of the causes, effects, and morality of
> the situation.
> 
> So it's immoral to download music that isn't yours and burn it to a
> disc. Instead of buying it. I saw several messages to the thread of
> "Gnapster" just this week. But no moral discussion about it. Why is this
> different?
> 
> I say, hell, let the end user worry about whether what he does is right,
> moral, just, criminal, whatever. If you can help this guy, hell, just tell
> him how and then add a disclaimer if you're worried about implication in a
> criminal aspect, so you're not an accessory.
> 
> I say let people worry about themselves. Screw seatbelt laws. :)
> 
> On Fri, 2 Feb 2001, Michael R. Jinks wrote:
> 
> > Date: Fri, 02 Feb 2001 09:50:02 -0600
> > From: Michael R. Jinks <[EMAIL PROTECTED]>
> > Reply-To: [EMAIL PROTECTED]
> > To: [EMAIL PROTECTED]
> > Subject: Re: How to Setup Tcpdump to nail x-girlfriend?
> >
> > I may have read wrong, but I think he's trying to intercept mail --
> > like, for reading, not for sending to the bit bucket.
> >
> > If that's the case, then that is most definitely not playing fair.
> > Network managers, legal departments, and HR managers all take an
> > exceedingly dim view of such things, not to mention the general ethics
> > of systems administrators.  It's just wrong, no matter what somebody may
> > have done, to intercept their private conversations.  It is even more
> > wrong if you happen to be root somewhere on the network; root users are
> > vested with an extra responsibility, even if nobody has ever told you
> > so, to play extra-cautiously around the network.
> >
> > The things that PHD wants to do are exceedingly easy for a root user
> > given the right kind of network; knowing how, and even sharing the
> > information on how, is something that I believe all should be free to
> > do; but actually doing so is the highest of crimes in the networked
> > world, where privacy is rapidly being eroded from all sides as it is.
> >
> >
> >
> > Calamity wrote:
> > >
> > > PHD wrote:
> > > >
> > > > For some reason, I cannot find any information on
> > > > setting up a Tcpdump file to scan for keywords.
> > > >
> > > > Also, x-girlfriend is a cetified witch and I would
> > > > like to figure out how to intercept her email.
> > > >
> > > > Will Tcpdump work, or is there something better?
> > >
> > > I dunno about tcppdump, but wouldn't a plain ol' mail filter work?
> > > That's what I use to reject email from my X.  <grin> It works wonders
> > > for me!
> > > Marie
> > > --
> > > Marie Bennington
> > > Customer Service Representative
> > > [EMAIL PROTECTED]
> > > ICQ# 4983764
> > > Computers are like air conditioners:
> > >         they stop working properly when you open windows
> > >
> > > _______________________________________________
> > > Redhat-list mailing list
> > > [EMAIL PROTECTED]
> > > https://listman.redhat.com/mailman/listinfo/redhat-list
> >
> >
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list

-- 
Michael Jinks, IB // Technical Entity // Saecos Corporation



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to