Re: Hearing on Melissa and Privacy, how Melissa was caught

1999-04-19 Thread John R Levine
Weiner said he was particularly troubled by reports that investigators tracked the Melissa suspect with help from both America Online and a unique identifying number attached to Microsoft software. My understanding is that they found the guy by going to Dejanews, finding the earliest copy of

Hearing on Melissa and Privacy

1999-04-19 Thread Lynne L. Harrison
Hearing on Viruses Becomes Debate on Privacy By JERI CLAUSING WASHINGTON - A congressional hearing called to explore potential solutions to computer viruses like the fast-spreading Melissa strain on Thursday turned into a debate about online privacy and the investigative methods used to track

Hiding cyphertext in cyphertext (FW)

1999-04-19 Thread Vin McLellan
From: "Jonathan Kennedy" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Hiding cyphertext in cyphertext Date: Sun, 18 Apr 1999 12:47:27 - I'm a beginner when it comes to cryptography but I after reading the Isreali Spy example in Schneier's Book, Applied Cryptography, I began thinking