Re: Cybercrime and HowFrom: x y (firstname.lastname@example.org)
- Next message: Trueblood: "Re: Using arrays recursively?"
- Previous message: x y: "Re: password expiration"
- In reply to: Lance Delacroix: "Re: Cybercrime and How"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: "x y" <email@example.com> Date: Sat, 18 May 2002 08:23:12 -0400
I love the Osborne/Foundstone books such as Hacking Exposed vol 3, Hacking
Windows 2000, Incident Response and Hacker's Challenge.
"Lance Delacroix" <firstname.lastname@example.org> wrote in message
> On 17 May 2002 03:49:30 -0700, email@example.com (Gill) wrote:
> >i need to write an legal issue n i will be doing on Cybercrime and How
> >to Combat it. can anyone just give me some idea what should i be
> >doing...n where can i look for some information regarding it.
> You should investigate Micro$oft and the sneakware, spyware, and
> snitchware they sold you with your OS.