Read Message Help
Back to Sent
    Prev | Next     Download Attachments
Date: Wed, 22 Jul 1998 08:02:21 -0700 (PDT)
From: Paul Andrew Mitchell <supremelawfirm@yahoo.com>  | Block address
Subject: COPYRIGHT VIOLATION
To: abuse@netcom.com, security@netcom.com
Add Addresses

In reply to your message below,
we refer you to Internet URL:

  http://supremelaw.com/wwwboard/messages/1200.html

If you don't understand plain English,
then get some help -- somewhere else.

Copies of "The Federal Zone" now extant on the
Internet were stolen, and then modified
WITHOUT THE AUTHOR'S PRIOR PERMISSION.

We are therefore now demanding that ALL copies,
in whole or in part, and ALL links, whether
in web pages or in search indexes, be removed
COMPLETELY AND IMMEDIATELY.

I am sure that Webster's Dictionary has most
of the above words well defined, for your
reading enjoyment.

If you don't understand the legal implications,
then hire someone who can explain it all to you.

There are criminal penalties in the federal
copyright laws, in case you are ignorant of
these laws.

Ignorance of the law is no excuse.


/s/ Paul Andrew Mitchell, B.A., M.S.

Author (under a pen name)




---Netcom Security Department <security@netcom.com> wrote:
>
> Thank you for submitting a report to ICGNetcom.  This message has
been
> automatically generated to acknowledge that your report has been
> received.  We take these issues seriously and try to follow up on all
> reports.  If additional information is needed we will contact you.
> 
> All e-mail to security@netcom.com is prioritized.  The following
Incident
> reports receive the highest priority and are considered emergencies:
> 
>         - possible life-threatening activity
>         - attacks on customer Internet infrastructure (such as root
>           name servers, domain name servers, network access points,
or
>           automated attacks against your site)
>         - root compromises
>         - child pornography
> 
> The following information is provided from the CERT Coordination
Center
> to help you address needs for other incident types and information
> resources:
> 
>   Intruder Detection Checklist
>     ftp://info.cert.org/pub/tech_tips/intruder_detection_checklist
> 
>   Steps for Recovering from a UNIX Root Compromise
>     ftp://info.cert.org/pub/tech_tips/root_compromise
> 
>   UNIX Configuration Guidelines
>     ftp://info.cert.org/pub/tech_tips/UNIX_configuration_guidelines
> 
>   List of Security Tools
>     ftp://info.cert.org/pub/tech_tips/security_tools
> 
> If you are writing regarding your Netcom account, please call
408-881-3545 for
> a prompt resolution.
> 
> We appreciate your understanding and cooperation.
> 
> 
> ICGNetcom Risk Management Group                          408-881-3545
> ---------------------------------------------------------------------
>             ICG NETCOM On-Line Communications Services, Inc.
> Account Misuse Issues:                               abuse@netcom.com
> Network Security Issues:                          security@netcom.com
> ---------------------------------------------------------------------
> 
> 
> 
> 

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com


     Prev | Next     Download Attachments
Back to Sent
Privacy Policy- Terms of Service - Guidelines
Copyright © 1994-1999 Yahoo! Inc. All rights reserved.