From: siljaline on
Han wrote:
> Sure by me, but you'll have to tell me how to contact you ...
> <BIG grin>

I have a Blog that you could easily find via Google.
There are contact options to get me via my Blog which some here
have used in the past. Hope to hear from you, Han.

Greetz !

Silj

--
"Arguing with anonymous strangers on the Internet is a sucker's game
because they almost always turn out to be -- or to be indistinguishable from
-- self-righteous sixteen-year-olds possessing infinite amounts of free time."
- Neil Stephenson, _Cryptonomicon_

From: Han on
"siljaline" <spam(a)uce.gov> wrote in news:hiak14$k56$1(a)news.eternal-
september.org:

> Han wrote:
>> Sure by me, but you'll have to tell me how to contact you ...
>> <BIG grin>
>
> I have a Blog that you could easily find via Google.
> There are contact options to get me via my Blog which some here
> have used in the past. Hope to hear from you, Han.
>
> Greetz !
>
> Silj

Well, I can find your blog, Randy, but not a way to contact you, so please
contact me at my yahoo address, with opahan before the at.


--
Best regards
Han
email address is invalid
From: James Morrow on
In article <hi68fp$a9r$1(a)news.eternal-september.org>, spam(a)uce.gov
says...
> James Morrow wrote:
> > Thank you for pointing this out. The potential of social networking
> > sites for data mining is enormous. This morning I received from a young
> > distant relative of mine an email inviting me to join Facebook. I
> > have no intention of taking her up on this offer. I do email,
> > newsgroups and even IRC. I'm just old fashion that way. But I do not
> > use Twitter or Facebook. People who do have no real understanding of
> > what risks they are taking. Once information is out of your hands and
> > on the Internet you no longer have control of it. I've posted under my
> > own name on Usenet for over a decade now with no problem at all, but
> > Facebook is a quantum leap in lost privacy. I'm not going there.
>
> You are most welcome, which brings to mind an old bookmark that says basically
> everything about you and your Security >
>
> "10 Immutable Laws of Security"
> <http://technet.microsoft.com/en-us/library/cc722487.aspx>
>
> Silj
>
>
Your link reminds me of the key factor in any security issue, the nut
behind the keyboard. All vectors of attack must in some respect pass
through this weak link.

--
James E. Morrow
Email to: jamesemorrow(a)email.com
From: siljaline on
James Morrow wrote:
> Your link reminds me of the key factor in any security issue, the nut
> behind the keyboard. All vectors of attack must in some respect pass
> through this weak link.

The weakest link is generally the user but it hinges also on the level of security
implemented if any.

Silj

--
"Arguing with anonymous strangers on the Internet is a sucker's game
because they almost always turn out to be -- or to be indistinguishable from
-- self-righteous sixteen-year-olds possessing infinite amounts of free time."
- Neil Stephenson, _Cryptonomicon_



From: Cronos on
James Morrow wrote:

>I've posted under my
> own name on Usenet for over a decade now with no problem at all,

I wouldn't even do that. Only places on the internet I have used my real
name are for business transactions. Anywhere else it is just not needed
so why use it on Usenet?