Security Basics mailing list archives

RE: readnotify.com


From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Tue, 24 Jan 2006 18:35:58 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----Original Message----
From: Joe George [mailto:j.george () conservation org]
Sent: Tuesday, 24 January, 2006 14:27
To: hfebelingjr () lycos com
Subject: RE: readnotify.com

: 
: Registrant:
:    www.ChrisDrake.com
: 
:    Registered through: GoDaddy.com
:    Domain Name: READNOTIFY.COM
: 
:    Domain servers in listed order:
:       MY.GUARDPUPPY.COM
:       COPA.GEEK.NET.AU
:       MY.MAILTRACKING.COM
: 
: 
: 
: At my organization, we can notify our Exchange Administrators to block
: this domain.  Maybe you might want to contact the registrant or registry.

Joe,

        Would one be able to use the hostfile to block 'em?  Also how do they
work?  I'm presuming that in order to do some of their "functions" that
they've gotta install some kind of software on the recipients computer,
right?

        IF so isn't that a violation of the computer use and abuse (or however
it's phrased) act?  And IF so why hasn't anyone done anything about 'em?

        I mean in order for 'em to do some of the things that they claim that they
can do, they'd have to install software on another person's computer
WITHOUT that person's knowledge, or permission.

        What steps can the average computer user do from home to block 'em?

Herman
Live Long and Prosper
 ___________________          _-_
 \==============_=_/ ____.---'---`---.____
             \_ \    \----._________.----/
               \ \   /  /    `-_-'
           __,--`.`-'..'-_
          /____          ||-
               `--.____,-'

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQ9ayIB/i52nbE9vTEQKY5wCeOfWyb8O2ApsZKfmTkAJoMzad0LAAoOCc
ZAte5sXnwlcZt6zBNXV4GQzo
=gA46
-----END PGP SIGNATURE-----


---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Tailor your education to your own professional goals with degree
customizations including Emergency Management, Business Continuity Planning,
Computer Emergency Response Teams, and Digital Investigations.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: