Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Travis McGee; Poohbah
I concur with poobah's analysis. I also have "sneaking suspicion" that the method I described (with minor variations) is in use by the bad guys.

That's why the borrowed password thing is so interesting
- same guy coincidentally duped for his email account that is later beheaded by the same group 10,000 miles away? (he is either Gump, a lefty ANSWER agent, or guided by clowns in action)
-why did he go to either place, (ok or iraq)?

It seems from the earlier article that Berg's email account was 'passed around', and used as I described. (even though Pooh's method may be an improvement in security)

134 posted on 05/14/2004 9:24:46 AM PDT by Triple (All forms of socialism deny individuals the right to the fruits of their labor)
[ Post Reply | Private Reply | To 118 | View Replies ]


To: Triple; Travis McGee

Eye-opening experiment: go to a store in a mall that demos the Palm Tungsten C or Tungsten T3 (these are the Wi-Fi Palm products). Click on the Wi-Fi access icon.

There's usually 3-6 networks, and a couple of these will be unsecured, ready to access.

A lot of folks just do not understand the need to secure their computers and network access, or how to do it.


141 posted on 05/14/2004 9:41:27 AM PDT by Poohbah (Four thousand throats may be cut in a single night by a running man -- Kahless the Unforgettable)
[ Post Reply | Private Reply | To 134 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson