Weiner said he was particularly troubled by reports that investigators
tracked the Melissa suspect with help from both America Online and a unique
identifying number attached to Microsoft software.
My understanding is that they found the guy by going to Dejanews, finding the
earliest copy of
Hearing on Viruses Becomes Debate on Privacy
By JERI CLAUSING
WASHINGTON - A congressional hearing called to explore potential solutions
to computer viruses like the fast-spreading Melissa strain on Thursday
turned into a debate about online privacy and the investigative methods
used to track
From: "Jonathan Kennedy" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Hiding cyphertext in cyphertext
Date: Sun, 18 Apr 1999 12:47:27 -
I'm a beginner when it comes to cryptography but I after reading the Isreali
Spy example in Schneier's Book, Applied Cryptography, I began thinking