Fw: Attack of the Killer RIAA FUD App (Was Re: know people i…

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Christopher Bardin
Date:  
Subject: Fw: Attack of the Killer RIAA FUD App (Was Re: know people in .ut.us?)
This is a multi-part message in MIME format.

------=_NextPart_000_000B_01C335EB.A0B29270
Content-Type: text/plain;
    charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


If Hatch's senile fantasy of attack software is actually carried =
through, it will be a gift to the internet vandals who presently have to =
make do with homemade viruses and worms. Imagine what they would do =
with professionally developed malware; it would be like handing an Uzi =
to a toddler.

Once the attack program(s) were released into the wild, as it were, to =
do their dirty work, it would only be natural for hackers (as opposed to =
crackers) to reverse engineer them out of professional curiosity. And =
soon enough vandals would get hold of them and pandemonium would ensue =
on the internet. Imagine the lawsuits that the RIAA and others who =
developed the software would have to defend themselves against then. =
Talk about being hoist with one's own petard!

Obviously the best defense for existing computers is to invest in =
software which periodically makes full backups that can quickly restore =
your hard drive to a known good earlier state. And, of course, to =
support the development and use of alternative desktop operating systems =
such as Linux, and other software such as the Mozilla browser, because =
the attack software would most likely be developed with Windows in mind. =
The more diversity the attack software has to deal with, the less =
likely it would be to succeed in every case. If the RIAA has anything =
to say about it, future computers will be designed with a self-destruct =
which could be activated by software. Wouldn't that be fun.

On Wednesday, "Robert Bushman" commented that:

"Perhaps we should also start extending the "justifiable"
laws. He jaywalked in front of my car, so I ran
him over. Justifiable assault - he was breaking the
law and obstructing my lawful progress down the
motorway."

It's already been done; in Phoenix last week some guy used his Hummer as =
a weapon to run down and destroy a car with 3 people in it whom he =
claimed had robbed him. He probably won't be charged with anything even =
though he chased the car down, because the prosecutor knows he couldn't =
get a conviction.

-Christopher Bardin

------=_NextPart_000_000B_01C335EB.A0B29270
Content-Type: text/html;
    charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1170" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<P dir=3Dltr>If Hatch's senile fantasy of attack software is actually =
carried=20
through, it will be a gift to the internet vandals who presently have to =
make do=20
with homemade viruses and worms.&nbsp; Imagine what they would do with=20
professionally developed malware;&nbsp;it would be like handing an Uzi =
to a=20
toddler.</P>
<P dir=3Dltr>Once the attack program(s) were released into the wild, as =
it were,=20
to do their dirty work, it would only be natural for hackers (as opposed =
to=20
crackers) to reverse engineer them out of professional =
curiosity.&nbsp;&nbsp;And=20
soon enough vandals would&nbsp;get hold of them and&nbsp;pandemonium=20
would&nbsp;ensue on the internet.&nbsp; Imagine the lawsuits that the =
RIAA and=20
others who developed the software would have to defend themselves =
against=20
then.&nbsp; Talk about being hoist with one's own petard!</P>
<P dir=3Dltr>Obviously the best defense&nbsp;for existing computers is =
to invest=20
in software which periodically makes full backups that can =
quickly&nbsp;restore=20
your hard drive to a known good earlier state.&nbsp; And, of course, to =
support=20
the development and use of alternative desktop operating systems such as =

Linux,&nbsp;and other software such as the Mozilla browser, because the =
attack=20
software would most likely be developed&nbsp;with&nbsp;Windows in =
mind.&nbsp;=20
The more diversity the attack software has to deal with, the less likely =
it=20
would be to succeed in every case.&nbsp; If the RIAA has anything to say =
about=20
it, future computers will be designed with a self-destruct which could =
be=20
activated by software.&nbsp; Wouldn't that be fun.</P>
<P dir=3Dltr>On Wednesday, <FONT face=3DVerdana size=3D2><FONT=20
face=3D"Comic Sans MS">"Robert Bushman"</FONT> <FONT=20
face=3D"Comic Sans MS">comm</FONT></FONT>ented that:</P>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
<P dir=3Dltr><FONT size=3D4>"Perhaps we should also start extending =
the=20
"justifiable"<BR>laws.&nbsp; He jaywalked in front of my car, so I =
ran<BR>him=20
over.&nbsp; Justifiable assault - he was breaking the<BR>law and =
obstructing=20
my lawful progress down the<BR>motorway."</P></BLOCKQUOTE></FONT>
<P dir=3Dltr><FONT size=3D4>It's already been done; in Phoenix last week =
some guy=20
used his Hummer as a weapon to run down and destroy a car with 3 people =
in it=20
whom he claimed had robbed him.&nbsp; He probably won't be charged with =
anything=20
even though he chased the car down, because the prosecutor knows he =
couldn't get=20
a conviction.</FONT></P>
<P dir=3Dltr><FONT size=3D4>-Christopher Bardin</P></FONT></BODY></HTML>

------=_NextPart_000_000B_01C335EB.A0B29270--