From: siljaline on 9 Jan 2010 13:55 Han wrote: > Sure by me, but you'll have to tell me how to contact you ... > <BIG grin> I have a Blog that you could easily find via Google. There are contact options to get me via my Blog which some here have used in the past. Hope to hear from you, Han. Greetz ! Silj -- "Arguing with anonymous strangers on the Internet is a sucker's game because they almost always turn out to be -- or to be indistinguishable from -- self-righteous sixteen-year-olds possessing infinite amounts of free time." - Neil Stephenson, _Cryptonomicon_
From: Han on 9 Jan 2010 16:02 "siljaline" <spam(a)uce.gov> wrote in news:hiak14$k56$1(a)news.eternal- september.org: > Han wrote: >> Sure by me, but you'll have to tell me how to contact you ... >> <BIG grin> > > I have a Blog that you could easily find via Google. > There are contact options to get me via my Blog which some here > have used in the past. Hope to hear from you, Han. > > Greetz ! > > Silj Well, I can find your blog, Randy, but not a way to contact you, so please contact me at my yahoo address, with opahan before the at. -- Best regards Han email address is invalid
From: James Morrow on 11 Jan 2010 14:19 In article <hi68fp$a9r$1(a)news.eternal-september.org>, spam(a)uce.gov says... > James Morrow wrote: > > Thank you for pointing this out. The potential of social networking > > sites for data mining is enormous. This morning I received from a young > > distant relative of mine an email inviting me to join Facebook. I > > have no intention of taking her up on this offer. I do email, > > newsgroups and even IRC. I'm just old fashion that way. But I do not > > use Twitter or Facebook. People who do have no real understanding of > > what risks they are taking. Once information is out of your hands and > > on the Internet you no longer have control of it. I've posted under my > > own name on Usenet for over a decade now with no problem at all, but > > Facebook is a quantum leap in lost privacy. I'm not going there. > > You are most welcome, which brings to mind an old bookmark that says basically > everything about you and your Security > > > "10 Immutable Laws of Security" > <http://technet.microsoft.com/en-us/library/cc722487.aspx> > > Silj > > Your link reminds me of the key factor in any security issue, the nut behind the keyboard. All vectors of attack must in some respect pass through this weak link. -- James E. Morrow Email to: jamesemorrow(a)email.com
From: siljaline on 11 Jan 2010 23:13 James Morrow wrote: > Your link reminds me of the key factor in any security issue, the nut > behind the keyboard. All vectors of attack must in some respect pass > through this weak link. The weakest link is generally the user but it hinges also on the level of security implemented if any. Silj -- "Arguing with anonymous strangers on the Internet is a sucker's game because they almost always turn out to be -- or to be indistinguishable from -- self-righteous sixteen-year-olds possessing infinite amounts of free time." - Neil Stephenson, _Cryptonomicon_
From: Cronos on 13 Jan 2010 10:21 James Morrow wrote: >I've posted under my > own name on Usenet for over a decade now with no problem at all, I wouldn't even do that. Only places on the internet I have used my real name are for business transactions. Anywhere else it is just not needed so why use it on Usenet?
First
|
Prev
|
Next
|
Last
Pages: 1 2 3 4 Prev: Avira updates is shite once again Next: U2 frontman bitchslapped by TalkTalk |