You are not logged in. Login Now
 0-24   25-49   50-74        
 
Author Message
25 new of 74 responses total.
srw
response 50 of 74: Mark Unseen   Apr 20 02:34 UTC 1995

Actually on rereading 34 I realize that I confused TS badly earlier.
I used blahblah as a substitute (perhaps I should have said foo).
I had no idea that it existed literally. When I read his 34, I 
was too busy to notice that it didn't make sense.

Much later than my initial post, another staffer decided to post the 
actual account with the problem abcdef. That was not my intention, 
but it was harmless I guess.  I also apologize to whoever owns blahblah, 
as it was a complete coincidence that I chose that name.
tsty
response 51 of 74: Mark Unseen   Apr 20 13:40 UTC 1995

oh ................................................fascinating twist.
I've been confused before - nice red herring, srw <g>.
popcorn
response 52 of 74: Mark Unseen   Apr 20 13:48 UTC 1995

Actually, the first mention of the account name in this item is in
response 33, which was entered by srw.

I, too, didn't realize there really was an account called "blahblah",
so I assumed TS was looking at "abcdef" and saying "blahblah".
popcorn
response 53 of 74: Mark Unseen   Apr 20 13:49 UTC 1995

(By the way, I think we've had an account called "foo" in the past, too.)
ajax
response 54 of 74: Mark Unseen   Apr 20 15:15 UTC 1995

  It's getting hard to come up with simple fictitious login names on
Grex...I went through about ten first names the other day for an example
before I found one that wasn't a real account. :)
scg
response 55 of 74: Mark Unseen   Apr 20 16:33 UTC 1995

Maybe we need something like the UM's bjensen account that they use for
examples.  It's a real account, or at least it has an x.500 entry
("Mythical manager, ITD Research Systems").
davel
response 56 of 74: Mark Unseen   Apr 20 19:03 UTC 1995

Do we have a johndoe account?
steve
response 57 of 74: Mark Unseen   Apr 21 01:33 UTC 1995

   As in anonymous?  No.  But then again, all accounts on Grex are
anonymous...
mdw
response 58 of 74: Mark Unseen   Apr 21 09:14 UTC 1995

If I remember right, DOS file timestamps are on 2 second intervals.
ajax
response 59 of 74: Mark Unseen   Apr 21 16:08 UTC 1995

  Yep, though few programs even show the seconds of the timestamp, I think.
lilmo
response 60 of 74: Mark Unseen   Apr 21 19:02 UTC 1995

Re #58:  Well, I'll be darned...  I just checked, and, sure enuf, all the
timestamps has even numbers of seconds !!!  Isn't that neat??  :-)
davel
response 61 of 74: Mark Unseen   Apr 21 19:49 UTC 1995

Why neat?  that just means they wanted to extend the range of representable
dates twice as far without taking any more space.
popcorn
response 62 of 74: Mark Unseen   Apr 22 13:16 UTC 1995

That's no bad thing!  I'd rather see a larger range of dates than
to-the-second precision in timestamps, if the choice were up to me.
davel
response 63 of 74: Mark Unseen   Apr 22 15:44 UTC 1995

I demand nanosecond precision!
lilmo
response 64 of 74: Mark Unseen   Apr 23 04:21 UTC 1995

Good grief, I just noticed that for the first time, and was struck by
it; I didn't complain about not having better precision !!  sheesh...
popcorn
response 65 of 74: Mark Unseen   Apr 23 12:54 UTC 1995

(You didn't; davel did.)  :)
davel
response 66 of 74: Mark Unseen   Apr 24 01:05 UTC 1995

(davel is sorry he opened his mouth)
popcorn
response 67 of 74: Mark Unseen   Apr 27 20:50 UTC 1995

On a similar note, today staff received a complaint from someone who had
never heard of Grex but found out (the hard way) that someone has created
an account here in her name and is sending out threatening e-mail with
subject lines such as "Your a dead man".  What the heck do we do with
this account?  What do we say to the person who is being impersonated?
<sigh>
rcurl
response 68 of 74: Mark Unseen   Apr 27 21:23 UTC 1995

Have you verified the complaint? You can e-mail the account and ask
for an explanation. You can intercept outgoing mail from the account
until the matter is resolved. You can trace back the source host, and
check it out there. And, there is the remote possibility that it is
all a hoax. Well, there's some things to do ;->.
ajax
response 69 of 74: Mark Unseen   Apr 28 01:04 UTC 1995

  Transmitting a death threat across state lines by wire is a more
significant crime than impersonation.  If you verify they sent such
threats, then regardless of their identity, I don't see a problem
nuking the account.  Or trying to trace its real owner, and/or passing
the info along to a law enforcement agency, for that matter.
tsty
response 70 of 74: Mark Unseen   Apr 28 09:33 UTC 1995

Right, this is no Jake Baker case. It's what the dweebs *wanted*
to stomp on Baker, just what is described in #67. This current
situation might be the *right* sort of thing (sted of Baker) for
a little "suggestion." 
 
In any event, email (a 1 to 1 situation, usually) used like a
drunk behind the wheel can be stopped at the source, once the
alert has been made.
popcorn
response 71 of 74: Mark Unseen   Apr 28 16:29 UTC 1995

At Steve Weiss's suggestion, I reset the password on the bogus account
and mailed it to the e-mail address that the bogus person gave when
running newuser, just like we would for any other account with a lost
password.  The alternate e-mail address the impostor gave happened
to be for the real person who was being impersonated, so control of
the account is now restored to her.  If she doesn't want the account,
it will be reaped, like any other account, after 3 months of inactivity.
rcurl
response 72 of 74: Mark Unseen   Apr 28 23:25 UTC 1995

Neat. I was trying to see how to handle the possibility that this was
a hoax - and this takes care of that case too.
srw
response 73 of 74: Mark Unseen   Apr 30 05:58 UTC 1995

Yes. I made that suggestion to Valerie on the phone. I haven't been 
back to this item in a few days. I come up with that solution for another
impersonation case. It was not obvious to me, though. I thought about
it for quite a while before I recognized the beauty of that approach.

It doesn't always work, though. Sometimes the alleged impersonator
leaves the account with no forwarding address or other info. to identify it.
In the case of the impersonation that started this item, that was what we
had, only a name. It's not unbelievable to have two people with the same
name, and yet there was no way to turn control of the account to the
impersonated party in that case. That's why I found it tougher.
tsty
response 74 of 74: Mark Unseen   May 1 04:35 UTC 1995

good work popcorn.
 0-24   25-49   50-74        
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss