Re: Hardening lists against spam attacks
At 09:28 AM 12/31/96 -0800, you wrote: : :So in order to post here, I hafta install and run PGP? Well, people :were looking for the perfect formula to deny service to guys like me, :and guess what? You found it! I will *not* install and run PGP. Fill me in. Why do you choose not to install and run PGP? Cordially, Alec PGP Fingerprint: Type bits/keyID Date User ID pub 1024/41207EE5 1996/04/08 Alec McCrackin <camcc@abraxis.com> Key fingerprint = 09 13 E1 CB B3 0C 88 D9 D7 D4 10 F0 06 7D DF 31
Alec wrote:
At 09:28 AM 12/31/96 -0800, you wrote: :So in order to post here, I hafta install and run PGP? Well, people :were looking for the perfect formula to deny service to guys like me, :and guess what? You found it! I will *not* install and run PGP.
Fill me in. Why do you choose not to install and run PGP?
The only "software" I have newer than 1989 is Win95 and Netscape. I only run these on one computer, to make net and email access easier. My other computers run straight MS-DOS. I had UNIX in 1986 on a portable HP computer, but HP dropped support for it (what else is new). If I had the time to do it, and I could get a concise written spec of how to interface with whatever I need to, I'd write my own O/S and datacomm software. So I make compromises where necessary for expediency. PGP to me is not necessary (I can encrypt without it), but I do recognize its proliteriat values.
participants (2)
-
camcc@abraxis.com
-
Dale Thorn