(Fwd) news spoke

John Young jya at pipeline.com
Wed Nov 23 06:42:14 PST 1994



Forwarding Design-L mail by: <carr0023 at GOLD.TC.UMN.EDU> () on 
Nov 23    
-------------------

   This message revealed itself yesterday on my shell account.  
This could
   be some arbitrary law going down in the present, even worse 
than the
   McCarthy era witchunt.  So much silence, even for academic 
concerns,
   and system administrators decide whom to prosecute for 
relevance.  
_________________________________________________________________
___________  UNIX(r) System V Release 4.0 (gold.tc.umn.edu)

This system is for the use of authorized account holders only.

Individuals using this computer system without authority, or in 
excess  of their authority, are subject to having all of their 
activities on  this system monitored and recorded by system 
personnel.

In the course of monitoring individuals improperly using this 
system,  or in the course of routine system maintenance, the 
activities of  authorized account holders may also be 
monitored.

Anyone using this system expressly consents to such monitoring 
and is  advised that if such monitoring reveals possible 
evidence of criminal  activity, system personnel may provide 
the evidence gathered to law  enforcement officials.







More information about the cypherpunks-legacy mailing list