Andrew McGlashan wrote:
> On 8/04/2015 12:08 AM, Russell Coker wrote:
>> At the meeting there was a mention of the fact that we now have a legal
>> precedent for film companies to force ISPs to divulge the names of customers
>> who might have torrented movies.
> This was bound to catch up with iiNet [and other] users....
>
>> Is there any good anonymous peer to peer software? Something that uses tor
>> hidden services for all communications?
> Much better to just keep to legal and proper downloads, don't you think?
Well of course that goes without saying !
the very idea of owning movies which I haven't paid for;
or even converting DVD's so they are playable outside of brain-dead DVD
players,
(which mostly also seem incapable of playing them);
is abhorrent to my higher moral self.!
I even believe there are some who have copies of that other OS what was
it called .....;
anyway they have not paid for it apparently.
There seems to exist a whole category of software ..shareware ?
where such behaviour is rife.
This software philosophy, what's it called 'open-source' ?;
why it's just encourages such an attitude !
Oh Andrew; how I concur with you regarding the wickedness of the world !
regards Rohan McLeod
Hey folks,
Is anyone in need of more 'vintage' computer gear?
There's a stack of stuff I've got:
* BBC + assorted parts
* 386 and up motherboards
* 486 and up CPUs
* Assorted RAM (FP/EDO and up)
* 2x APC rack mount 700VA UPSs
* Pentium, PPro, P3, P4, Cel D etc. and up computers (one even has a Video Blaster SE100 in it, with the cables)
* Many assorted IO cards (ISA, VLB)
* Labtam X term (might even be able to rustle up an AUI adapter for it)
* Assorted tower cases (AT, ATX)
* 2x Wyse60 serial terminals
* Multiple 10/100 switches (a couple may be managed) of varying sizes (16-24 port I think)
* Multiple WiFi routers with and without modems, one 3G
* Cisco SHDSL modem (dumpster dive)
* 3Com business routers (another dumpster dive)
* HP DL380 (G3 I think)
* IBM xSeries 336
* DLT IV (I think ... VS80?) drive
* Assorted 33.6 and 56K modems
* Parallel port scanner (UMAX Astra 600)
* Assorted CRT displays
* Assorted 3.5" and 5.25" drives
I'm thinking a trip to local eWaste collection point might be in order,
but before turfing stuff, like to see if it'll get another go.
A lot of it's in the "I never got around to using it", or "I haven't
used it in ages" category :)
Hi everyone,
(Very much non-Linux related)
People will know that I've had a long-standing interest (about
twenty-three years now) in the issue of asylum seekers and Australian
policy towards them. Sometimes I even organise meetings about such events.
One such meeting will be next Saturday evening, starting at 6.00pm, just
after the LUV Beginners meeting, and just down the road at the New
International Bookshop at Trades Hall. Afterwards we'll be having dinner
at #1 Lygon Street.
The speaker is Damien Kingsbury. Apart form being the professor of
international politics at Deakin University and the author or editor of
some twenty five books in the past decade on regional affairs, Damien has
also being doing some work on changing Australia's policies towards asylum
seekers, working with a number of federal MPs on the issue.
https://en.wikipedia.org/wiki/Damien_Kingsbury
I hope that some of you who have an interest in this areas may come along.
Let me know if you will, so I can organise numbers for the dinner.
All the best,
--
Lev Lafayette, BA (Hons), GradCertTerAdEd (Murdoch), GradCertPM, MBA (Tech
Mngmnt) (Chifley)
mobile: 0432 255 208
RFC 1855 Netiquette Guidelines
http://www.ietf.org/rfc/rfc1855.txt
Quoting Andrew McGlashan (andrew.mcglashan(a)affinityvision.com.au):
> With the metadata laws.... does anyone here have a good understanding on
> how we stand running our own mail servers onsite for ourselves and/or
> for our clients (domains owned by us and also by clients) ?
>
> http://blog.fastmail.com/2015/04/09/fastmail-is-not-required-to-implement-t…
Scofflaw that I am, I have stealthily secreted my Linux mail server in a
surburban house in California. Frightfully clever, aren't I?
--
Cheers, NOT ALL ELECTRONS ARE NEGATIVE, some have just been hurt
Rick Moen in the past and are looking for a reason to trust again.
rick(a)linuxmafia.com -- @SarcasticRover
McQ! (4x80)
Hello All,
I have a windows based family member who is sending out going invoices via
email, I think using a Telstra Bigbond email account.
Somehow somebody is copying my relatives outgoing emails, replacing the
contact details with their (very similar) contact details, and replacing
the bank account details with their bank account details. All the other
unique details in the invoice are the same and customized for the client.
The attacker responds to emails to the new (but almost identical) email
address that was in the email, and impersonates my relative in email
conversations.
I think (need to check) the client gets two copies of the invoice, one good
and one bad.
This results the clients paying the wrong account.
My relative has changed his email password, had a complete virus scan of
his computer; however the issue is still occurring.
It seems like a very much targeted attack. It is becoming somewhat
expensive.
Any ideas? Apart from sending invoices postal? Which may or may not work
depending on what access the attacker has? Is there anyone I could refer my
relative to in order sort out this mess?
Unfortunately, I think "use GPG" isn't an option. Even if his emails had
signatures, it is unlikely his clients would know how to check them.
Obviously this goes to show how insecure email is, however I am speculating
that the intruder doesn't have access to the network to monitor the SMTP
sessions.
Regards