17 Dec
2003
17 Dec
'03
11:17 p.m.
Lyman Hazelton says:
Perry (and other c'punks),
I don't think the mechanism employed by the hacker is using "who" at all.
The mechanism employed was obvious and simple -- someone subscribed an anXXX address to the list. Anyone looking at the subscription list can tell that, on their own. This technique has been used before. Perry