[olug] FUD at its worst
Jon
thechunk at home.com
Mon Jan 7 20:48:01 UTC 2002
I read the article and laughed my but off. Miss information can be so dangerouse. In this case I believe the author knows he is lying. The mis spellings and stories about real people / books make me think he just wants attention or to mislead people or something. I don't understood the email stories people forward on either. Oh well.
-Jon W
On Tue, Jan 08, 2002 at 10:03:49AM -0600, Patrick Swartz wrote:
> One of my co-workers pointed me to this web site. This is both very funny
> and very scary. To think that this guy is serious.
>
> http://www.adequacy.org/?op=displaystory;sid=2001/12/2/42056/2147
>
> I cut out a few, but there are a lot more that are just as bad.
>
> Let me repeat the following comments are NOT mine. They are from the above
> link, I just thought those on this list would get a good laugh.
> So here goes...
>
> To this end, I have decided to publish the top ten signs that your son is a
> hacker. I advise any parents to read this list carefully and if their son
> matches the profile, they should take action. A smart parent will first try
> to reason with their son, before resorting to groundings, or even spanking.
> I pride myself that I have never had to spank a child, and I hope this guide
> will help other parents to put a halt to their son's misbehaviour before a
> spanking becomes necessary.
>
> Does your child read hacking manuals? ; "Programming with Perl" by Timothy
> O'Reilly;
>
> 8. Is your son obsessed with "Lunix"?
>
> BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker
> operation system, invented by a Soviet computer hacker named Linyos
> Torovoltos, before the Russians lost the Cold War. It is based on a program
> called "xenix", which was written by Microsoft for the US government. These
> programs are used by hackers to break into other people's computer systems
> to steal credit card numbers. They may also be used to break into people's
> stereos to steal their music, using the "mp3" program. Torovoltos is a
> notorious hacker, responsible for writing many hacker programs, such as
> "telnet", which is used by hackers to connect to machines on the internet
> without using a telephone.
>
> Your son may try to install "lunix" on your hard drive. If he is careful,
> you may not notice its presence, however, lunix is a capricious beast, and
> if handled incorrectly, your son may damage your computer, and even break it
> completely by deleting Windows, at which point you will have to have your
> computer repaired by a professional.
>
> If you see the word "LILO" during your windows startup (just after you turn
> the machine on), your son has installed lunix. In order to get rid of it,
> you will have to send your computer back to the manufacturer, and have them
> fit a new hard drive. Lunix is extremely dangerous software, and cannot be
> removed without destroying part of your hard disk surface.
>
>
>
> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
>
> For help contact olug-help at bstc.net - run by ezmlm
> to unsubscribe, send mail to olug-unsubscribe at bstc.net
> or `mail olug-unsubscribe at bstc.net < /dev/null`
> (c)2001 OLUG http://www.olug.org
>
> -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
For help contact olug-help at bstc.net - run by ezmlm
to unsubscribe, send mail to olug-unsubscribe at bstc.net
or `mail olug-unsubscribe at bstc.net < /dev/null`
(c)2001 OLUG http://www.olug.org
-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
More information about the OLUG
mailing list