[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000f01c25f45$1b0b4220$3602a8c0@securitytimes.com>
From: nfernandes at securitytimes.com (Nuno Fernandes)
Subject: Re: what's to come chapter 1.
Hey guy you sound like you need a lesson on writing.
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
gobbles@...h.com
Sent: Wednesday, September 18, 2002 1:16 PM
To: zan@...rgeek.com
Cc: R.A.P.E.-Traq@...ica.com; full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Re: what's to come chapter 1.
>i've not called for anything *yet*
You call to action. You call for hacker change. You not hacker so how
you call?
How can heard follow not own?
> ..explain?
Breaking system illegally not make you hacker. Make you criminal with
good intention. Liberate information not make you hacker - make you
famous hero.
Hacker learn
hacker create information
hacker is information
>i do not speak for them. i assumed you were making the assumpti
>on that
>they sold out.
That assumption is made. If not speak for PHC why spread PHC FUD?
>why?
intentions not always what they seem.
Get your free encrypted email at https://www.hushmail.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists