lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu) Subject: Drunkeness On Sat, 06 Dec 2003 04:39:43 GMT, Paul Farrow <pfarrow@...menetworks.co.uk> said: > consider that drunkeness would be a good excuse for taking over say, a > university network, or a government server... > although i must admit i have done neither, would drunkeness hold up in > court as a suitable excuse, or would insanity be a better line to > follow? :) Forget an insanity defense, unless the accused really *was* so far out of it that "right" and "wrong" didn't have the standard meanings. As Hinkley is now finding out, you end up in a little room until *everybody* is convinced you're harmless. Usually you end up staying locked up longer than if you had copped a plea, so it's mostly of no use unless you're trying to get out of a capital offense (have to be a *really* interesting govt server to qualify ;) Similarly, drunkenness (or being under the influence of other pharmeceuticals) wouldn't hold up unless you could show that you didn't take the stuff. "Well your honor, I was at this party and I was the designated driver, so I was just drinking Coke, and some asshole kept putting rum in when I wasn't looking..". You'll probably have to produce witnesses that place you and the asshole at the party, and finding the bottle of rum and dusting it for the asshole's prints would be a good idea too.. :) Your best bet is finding some other avenue of "wasn't me, I didn't do it" defense - the guy who alledgedly whacked the Port of Houston asserted that his machine was trojaned by the actual culprit. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 226 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031206/9622ac6e/attachment.bin
Powered by blists - more mailing lists