================================================ Subject: Re: Was - Another one for Win2K and NT users.. Now - Virus != Hacker From: "]\\[][G}{T§TÖ®]v[" To: Date: Tue 7 Aug 2001 16:45:10 -0400 ================================================ What the hell are you talking about??? Whatever drugs they have you on, I suggest you request a lower dose from them, cause it's affecting your thought pattern. I never once said that, or anything close. I said that you don't see near as many virii designed for Linux and you do for Windows... you brought up hackers not needing a virus to access a system, and I agreed. I suggest that in the future, if you wish to start an argument, you read further into what someone says first to make sure that there really is a conflict of interest. ¤]\[][G}{T§TÖ®]v[¤ http://NightStorm.isyourgod.com/ NightStorm_Draco_@hotmail.com NightStorm_Draco@creedlist.com NightStorm@isyourgod.com I've seen the wicked fruit of your vine, Destroy the man who lacks a strong mind Human pride sings a vengeful song Inspired by the times you've been walked on My stage is shared by many millions, Who lift their hands up high because they feel this We are one We are strong, The more you hold us down the more we press on What if you did? What if you lied? What if I avenge? What if eye for an eye? ----- Original Message ----- From: Kevin L. Brown To: Sent: Tuesday, August 07, 2001 4:40 PM Subject: Re: Was - Another one for Win2K and NT users.. Now - Virus != Hacker > So basically your defense of Linux is that it makes it easy for real > hackers? > > That's an interesting defense. > > ----- Original Message ----- > From: "]\[][G}{T§TÖ®]v[" > To: > Sent: Tuesday, August 07, 2001 12:13 PM > Subject: Was - Another one for Win2K and NT users.. Now - Virus != Hacker > > > You think I don't know that? It's not a hacker that uses a virus to > > compromise computer security and gain access to systems... that's a > "lamer". > > A "hacker" that uses a backdoor isn't a hacker... in fact, he's a laughing > > stock among real hackers. Of course, real hackers don't go around just to > > destroy computers. > > The small write-up is borrowed from a friend's website, and explains a > > slight difference between a hacker, and a "hacker" that uses virii and > > backdoors to access systems... > > To unsubscribe or change your preferences for the Creed-Discuss list, visit: http://www.winduplist.com/ls/discuss/form.asp