Free Declaration - District Court of Delaware - Delaware


File Size: 269.4 kB
Pages: 4
Date: December 31, 1969
File Format: PDF
State: Delaware
Category: District Court of Delaware
Author: unknown
Word Count: 2,402 Words, 22,406 Characters
Page Size: 622 x 792 pts
URL

https://www.findforms.com/pdf_files/ded/8551/298-19.pdf

Download Declaration - District Court of Delaware ( 269.4 kB)


Preview Declaration - District Court of Delaware
Case 1:04-cv-01199-SLR Document 298-19 Filed 06/16/2006 Page1 of 4

Case 1 :04-cv-01199-SLR Document 298-19 Filed 06/16/2006 Page 2 of 4
,_ . ·—-———·-~·--—-—”··"‘*“”" """` _ n . _ , _ · _ ,,;`
>~:-ar-» "T""' " ` ` " · · ’ i 7 Q . 1
·. · · · : A' .. ·- 1 WhyC·0 has -
ar|éyj£§D3VidSOI\···· · _ . _ SIE! goes _ _ . - ._“ _. 1, .1 _ ; 1 !
.. · . ·}•! ‘ ’ ' , ¤ •
‘· H ·> ‘ ‘ ‘ · { videbchnp as hui 1 1
T S .5tm»{ii‘ig·t0 SDHHBY - _ 1$P°\' 51°|'¤ZY .1 _ · ;
r`-` ..‘·r.H· ' . . ` · -
_ '.:,“ §1 Ig`}? _ _ .. .» ` , · · . . V * -
·..~ Ah .= Mmh 1011997 . $*‘951(C°‘Y`°d°S?’9°) 1 · . . . . A.
,1 fE ’1•Q\v;°.•{ ._ _ _ - . -· n .
.·¤*T1r-- .`:~»:·x ·r- · ‘ · • ' - 5 ·
·%-· 1-.; . E Qf f:1,$¤.¤.· . · · ` 1 ' . 1 - .
T}? !•`:1I4'°'_ ’ ' '·' _ _ .‘ _·‘ J.
i‘°'. *. ,&r··:·= , ‘ . I l,
._· *-· JE- _a- I l , I, ~i, _ L _ I I , ‘ · ·
·—¤L2i-£=:$;? ?¤= 1 ‘ ‘ J“»1:x - i- 1-
"!‘·‘!'; -· 11.C·,€· • . · { —,1· ,,3·· '· G. · . ¥
.?¤¢2F1{.;i·2€ F- ·· · .· 1 · 1*: ;,·· . , . = 1 -,¤ ·
.1,-.,z§;·· 5;*7 I ·*'¢§1;i, .· 3* S': EMI; q , . ·. . · ~
4%;. ‘ _ . .§;{._;.Y S" ` ._..*· 1 ’ ,1
.*7% i Q. >.;: } Ijh * _~ ; I ` · , . I .
is . Y -1 ‘ - -1
`QJ‘_,., $$52 = ei'; F1 ` N ‘ *‘*·" =· 1 _. . 1 . T 1_ [1
.1; — ‘ —. L·3» ,;:2 =·· 1·g .
:;;j;§‘;§;t`;;§{’ Z¥§· .§f,·.;.¤··':;5 ‘ · , ¤§~?5·’.·:.·g$ ' . 1
. ` . · 1 J} . 1 J=’i·%1. ` .. . Q f _
,,3. ‘ ..1...;....,% `”**’*’*$i:- .-;:.15 ‘ =¤‘ FFL, : - _. .1$*Ei¤-=.-=z‘S ‘ .
;‘¢E£§·:}T3:·‘§ ·` ?¢¤¢» ° 1 “:"" ·.Y€'.T”`·?·· XI. ‘ *""L7' · ·' v\f=3?§-¤ "`:,'c ·=; .·'* _.·.*:'1.?~:.Z¤’1!·Z1. .·<:·_,1·- ’”y,:; 2 ’
}=’w·i.!4 ;££~ fi . H'? · ~ “*?§* ‘=•:.. Wn; 1 ‘€-T¥"‘_.Z£*; . .—·· 1 ':> ·:Fz5;‘·"$‘·` , :,= ·. ‘
Q.{§3=Z·£`C&1.:£`}, .1 _ · ,:=.- -1: Pease? c4.1z·;»·;-1=-.1;; -4;** r _:¤_ -. .1r. _ 1 .
I . “- . "ii . §€*a=·;=¤ T-T ;·’€’!? . "· ·a€*" "'°4°·3?·’°‘°E' 1 In
·· . A ii ` ' `>'$5?£' ·‘*Y di? , ~.cs·¤£-` ` 4 . `T.
%€.;._f5‘:1}_‘;i 1 . Elwzkpl 2 J: 2:% . -r.· .5: J . . Q: §g;`_:G,·=__L`5;--,}$· hh. a . :;:71 U.
11 " · ‘· .
· . ’ y i
. - , · _“‘.·1?Q:$’f-;;`";· .` 1. . ¤ `· ‘i.*{"·;·."{§Y,·?£%‘;‘·‘Z*:;fi*E,L "?1;‘ _.':.’E;1·.F:'EE,..£:;i "1 _;.-
. 1 *;.1. 1. ‘ .. `} ""°° *1·`“{`€=.‘£-·?'-*Z`= I;.¥.=€‘T·‘.*! ·{¢§>1
_ ` M;-;.;g41;¤_ 'gwii} _. ·` _ . ;*=,·'<,¥·£Fr.‘T;Z;:€.3a$*-' $"E*°"(,E.E
E51¤*?:$T·1iE¤ =. -1 $?€£· . * =;' ;£:E5=¥§;:?’;1·is'$!'=· ' ·· · - ;.· ‘ .=' ` .· ·=’· LU ? .t*1¢&‘ ‘. ·=3
\·.;};'a2Q;~;3 ‘·`:... ’ ET., ’¢$,,;.·. :;·’{:_:;;;:¤·.1F•1¢§!,3; -‘__'Q ·. ·. . am" . - • , i *7. r. .'?-L!. L; ‘ . ` ‘..·‘.;
··—- . an »·.1- *.. ‘ ·»=··. -·'1‘.ut.·.. · . ‘ · -· . •. . · 1. · .' • <‘·r‘.¤· .:- ?·- -. ~·
```‘ "¢.. ` .1 ·' _ —.Y .': 1 `Z ‘ `· . 1 ' ‘ “¥·°- ’.·`7:`¢¥Y;‘
Lat;-[11} :.7 :·$;·;,.;•_;·.;:··v.·_.;<\—`¤;·'·· 1 · _ -· . . =,_ . - _ ·. . . · · . .· _,. _ I , 2*
n‘%~=.’s:§ss.. ‘ $1 ‘ i' .- 1 *< ·‘ "I ·< - .= ·° Z ‘1 ‘ 1 ·T",?·‘* ‘1*‘· —·‘s
* · 1 · ‘ 111- .’ ’ =. ‘ 1 · ` - ' J J- 1 1 F 7-}
· - -w-¤‘ . ,;·' ¤ ~·‘·‘ "·;··=?§f¤. ¤ . : . . ‘ ' v " . 1 · ;.? ·*.: · . fs
` ‘ J? F' 1 f 2 .1 ~‘* . ·- 1- = -h-· 1 . z °· Pe
-. 1,.;·.·h: _ _ · W _ ' · . ' . _ » * , •'·•_ · . , · . " · ·»,.;' _.‘ ·•{ ' ` ·°'·,
. J · ._=· ·· .. ,`,. ’ ·‘ · .- 1:-5- 11 _1
.=:· * · /?i·/ 11 ...·. 1 · 1 · 1 · . 2 .. · A 1211
*11 4 Ir ` `§*%§!<·E§··=~.·* " 1 · - 'ii: " . ·; ·. . . ·
.7..; ‘· - ‘ ‘ _ 1 ` . . ·° "=;{·‘ E5 —· ' =‘=. · 1 ._ ` l " ·.Z1.`:C.1.`7
1 * )E‘E(“CtS; ` ‘ ' J 1 · 1
. .1 _· .1; ’ ‘ " _ Av · · ·‘ .· ·- 31·=* 11:.:* ‘. 1*-»
A I galnst €*€€=”s_»§~ gu ‘_ · ` _ . ; c · , . j_1; .Q_ Lg-‘
L a L'u·_`1;"-· [ gi;.-~‘r -J{ E. *:1 I ’ ‘ _- ` _ · [ "._» fl
59 {IGI] . · '*·—- .-.1 ‘I 1 *` Q1 . _ _· 11 ,3;.* 313
5 · 1; . ‘¥_ - , { I yi. ‘ _§‘f_l__ -i 1 _
’ ` " '”‘}:`C·*F‘» Riff: " .€· . ` 1 ' : 1* ' * .1**} ` .. . ` ‘ :7* ` ·
E_c(}|£&gB51Wl“bEDUmB _ 1 . F _ _ .._- 1 _ ag
in - •- ’ . Egg I ti _ I ` · · _. · · . · Z- M.- !; E .·.-
¤5tQ!¤¥¥d$ ‘ 1 1 1. ‘ 1‘ F-- . - ,1 ,1 1 ·· . 1
1* arc.: CDI DIG B B ' I .' ' ` . ‘1 . *1 .· ‘
Ljcmu 1 1P ‘ * r ·*.·* · ‘ ·
· 1 ···v¤¢».;-·:,;.1.1-·=.·.1a · · .. · _ · . :.
1.. ..,...1. 1* °Q¥¤P“t°*$ - 1 · . . v . . .
!‘ - ;'_· ‘ ’ .. TY-1!·'n€¥-‘·';'· I; ,. , 11-} {_. · V
to 5;;% I ·}` "" .‘ ;g,{·i%‘{§$§§:"?f;i§ 1:-l 1 1 3; ·F ~ ‘. · ` J =‘
P d S Fchsnese clans WI , _. :..,,11-;.; ._ _ ·
‘·"‘ ’ ° =‘ - *‘ · k { 1 “ 1 ` ‘ ‘ .1 ‘. ‘;-‘1-i1: ‘ 1 g
:inE$[¤I1. 5 U vii'? A - `_' -» . • U r l, · l I U "':f,a•": S". _ I? '·. ,7;* r I · , ' °
—· ' " E "1=" ° P ‘ 1 · . ' _·1rf:`:j;;.;_ . J: l ' - '
‘¤°°" |\· ‘ n . `" ‘ ` ***1;; Y I1`. {T . ‘?` ‘ ‘ {
·'·; 1 - · [ . Z-. ·. .•. . ' ._ · ‘_: ·,.: , ,;`~ ·.·:?.»'-:, §a‘m‘•,.‘;,? ’ '- · · ' .
. Jgig ` . . . .· ‘ J `··-·.·‘.t;&_';. · _. ..1;.-;- {j_·',;;'_;:l,·· k- _ ' _ · 5
'; ’°’ 1 . . 1. ’ .1 1 ‘·‘‘ —. " 1 1
. _ _ ·' I I ~ • - I ¤ ll ' I n T _ gx • : · ` . _ , '. ‘ V
I .. ' 1 _{_·.·iQ?:" ». . ‘ §_,_¤[{`, Q *n_ · 1. }
.1.....1 .1 · ,, ‘ · 1, QW "°· . 1SS___02125900 .1 ·,
lg ¤ 639337 5 - . _,,,,_;; - ,_3 ME-·., ·_» _, ;;...;··4 .- ~ 1
. Q-! . · . . .. .. . . · "' " . »·.;1;:-¥.*1}§$‘”I. . . . i;, ?i`?€§$3F . · 1 .1 1 1 . . 7.-1-- I--Y -‘=
Q I ·'_ Gl r . . -_~ · ‘ .. . . _ ¤ ·_=;__• · · Z. . $.4, 1 . · _ ,l.. ..:...•
. ' I ~ —

,. r "Q it T TEGHNIILBGY V ‘ l V . ‘ _ - - r t
pi 1. rl · Sluftutl SIAHIUPS , · ‘ ., ·· .. " ,
· . é ` · — _ - - r
’TE-1 5 5 - · t ·· · t
; ; t t Doyou need a securnty guard to protect your data? __ ,
V Consider hrrm an ex erxeneed breakan arttst. r ,·
. nl ] " I J
-5 ‘t r r -2
l ° l Cyl)€l?¢0 S S
tl E _ " _ . J V _ p
Hi 5. ‘ t - B ztm Mouicheiber _, _ _" ‘ r ~ ’
lt ~ · Y - ‘»·:¥?·,;_§1 - ' i
· ·; Q ., t t ,V,.V,.....-..,.V..a-... .s ...,....-......-,..,... -....V....--. s
tt · » rr · V ><~r·=··¤-==·¤·~=·¤»· .t ‘ · ‘ we
i " 1 = ‘‘- a "< · ¤"·
,,,. _ _ L ;. ,_ _. _ =t____ ._ __ . _ _ .,_, .
QJ = ri _ glinrgvzay‘a:·£:··i’*a2:·:·e1·:j:·a·2·r·r?:·1·‘__ ‘»r_ j ' 4 , _ .·" vt . E
iii i· l ¥%€ ¤ li -· §§€.s¥;r=r;.l@e¤*—=··t ---· · 5 . -‘-_,*’-` V =" $*,2 `· ·` _ - " . 1
Q *- ; I: I lg I i '· ;' , ·_.: · I· ` '._ • . _ ·§` 1
Tti t t r··- ‘ - A -· L . - J st
.· v ¢ ‘..t
il ` . ' ·: I, in ' _ ‘·‘:'E;_ ti', c -·Y" E .,:· l U _ '§ g
["" ‘i I' sr ir i:· 2 ·· ‘- r ‘ " ` » —· `. · ..54
` ~ { Ei '·`_ • ":‘_4:5`:L¤;'%· ; hl.; I» '· J .,:1 , Ll-l • " -‘. I - “*._;-I I _ G-:2-. I ) . l A. V r
I *'¤ } t ?£#¥w%:?Z* ·-··‘ A ' " "?·Y"`;r f Q ‘ T · — V ’ E
{il, I 1 B .'·:·. " ' ·~ l -..‘ ·'° 2 ·:; e F h ~ ` r' l ' A-Ll , ` - . si
V j?.i;p;_t·‘=: _. i' .;_; `» _; _ . -` . ·. · g
. ,' ` *:'·!1._Ix1¤'s{sJ.¤n 3 ,' ;·· -. ` . _ V ·· _ , - _ _ · ij; ,..,
· §_s· I ; t. §%.,(g}·_.pagp:Lghts by mm ans bp·ot.n¤:: 1582, 135:*3. I _ . __ .. ~ _ - lg} {
__» , _ 2 _J.og1;¤_..;·.·:·,¤t,, · _ .. · . _ . - . _` .I 4 . . · 5, ,
_§¤ g , E_.·rq¤t€s-Qassweede Q. · . __ · - ·· _ __ . ` - _ ah. Q
.!`Z'- -¤Z i tt -’* . = l ' ·’ l l 5
'°.l ; ` "H”EnEisel0 . l
{ . `:,.,..·,T.·.·»;.-··. .... 4-- .-··- -...-a,.,.~·,. -. _. Z- ·· ,.,»· _.- . ,. .: · . - -,-.: -,.». , » .· _ , ‘·. _ ___ L sa'. , l
’¥ · ‘ $¥5*¤m5*°¤"¤‘¤* %Te???tF°%‘¢‘“?€r ‘¥‘"·.”*‘F—‘?2;“?"iF’5$‘-- · .’.. ’i ‘· J. .‘·- te -.*.r 2 r z: {sa
ly? F E'.l"iLY$`fd *5****"`·t:it?.Sss.:r;;>¢Ei¥Z*=oit .=¤` ’ :=?»‘ ¤»*-ii 7:;-Q Mar -"?-or-= is q '° €i2`Ti“‘§t??IZ§?IY" " ```"`` ` V V ‘ `" t
st: the eros- ·· ‘·‘·‘
` e.»:-: .:-....;-;. -» ..t. .- ·.-· ·-··- ··-~'·.* ··. . I .. · · ··-·* ~.. .· · .... na . _ .. · ,:.e».¤. ¥_
{Fi I _ 3,,.. _____ — · .· - —· ~·»·—·—····“‘"‘"‘ we La;
’ IN Wtmww GIBSON’s 1984 science "win internships at Lawrence Liver- Klaus enrolletf at Georgia
gg? I ' fiction bestseilcr, Nenrumuncer, more National Laboratories in Liver- Then he did a Bil! Gates, dmppirg
I3! E __ digirobbers break into the cyberspace more, Calif] There, dabbling on out in his sophomore year to start
E r maniac and steal precious data., supercomputers connected to the SOHIW2l1‘C5I'IH.I”1CWIDEC50,000li¤ sl
Q Christopher Kiaus was a nintlvgrader Internet, Klaus started to. develop of`(3 programming code.
ij Q, at Sarasota (Pia.) High School when hacker counterattack weapons. The In the novel the good guys us¤·‘ g§Yt
_. rr: he read that book. He was captivat- idea: Find the weak spots in a corpo- weaporrcailed Intrusion Counwfr
edt Wh? HCI play data cops and rob- rate or university network. Stage a measures Electronics, IGaus_ea1Iecl
gt? gt' bers for teal? - test break·in. Then educate the Erm Internet Security Systems, wail!
‘ L · In the summer of 1990 Klaus was victim about how to lu the holes in an acron m reminiscent ofthe s¤1·& —.,
__ _ P B Y r
L t one of 50 high school students to its defense. ____`_ 1cE.. Iss is no Microsoft, not y'¤§és
lr il] ` " “"""' "` ` M l - II ` .3;;
_* ' h10,1997'??
utf _ UO ]SS___D2]2590l _ Forbes I Mm rj
i , l ' .
tl ti .

Case 1 :04-cv—O1199-SLR Document 298-19 Filed 06/16/2006 Page 4 of 4

. . . , r. _. . _ , . · a·· ·_ _ . ·. .' _3‘_3' :·•· '_.{r _»’.·_Q. Z?'.··`f"·r‘~ -$.!.;Z{'¥'·¤%?l‘£:+.-v¤:. _ Tia
l SILIBHH SIHHIUPS · · · ·· ..: ‘ , *1 ml li
` I ; v€llc‘°‘ c
I v anyway, but it’s doing pretty wellfor A real hacker wouid use the mail hired Thomas Noonan, now 35 a
’ t a firm that is only three years old and server to read or delete E-mail, and Georgia Tech graduate who 4;;,5 Z *4
is run by a 23-year-o1d.. Based in even to break into other servers by working at Dun Sc Bradstreet $D&_ `
`* Atlanta, rss probably did at least S10 installing a piece ofsoltwate that cap- ware and was ready to trade in his lj}
l million in sales last year from its net- tures passwords on the network,. Brooks Brothers suits. After two
I work security auditing and monitor- The rss program sends a warning rounds of venture iinancing, the wm ` ",,_
; ing software its clients include Intel, flagt Scanning can take anywhere of them still own just over halfofrss J `“
m ]’..C,4 Penney, Merck, U.S.t Bancorp, from five minutes to a month, They made their first safes Cari l {elf
‘ the National Aeronautics 8c Space depending on the number of com- together in 1995. Nasa invited Klaus ‘ ll?
{ l Aclminisuatjon and the Pentagon. ` puters and routers {network transfer - to lecture on security. Afterward a l lil;
. I ]oe Morris, a network security poims)being tested. colonel ushered tliemintoacomput. I
-· i _; expert at BeiiAtlantic,"is‘an'tss“f:in`T’ ’ ‘ {Yost thought you were protected er rdo`¤HQHv€Pi$e”?li`e'asked to seg"; l. - ii
· j He once needed some of his col- by an Internet lite wall? You might demo of K1aus’ software,. A few min. · 5
l El leagud computer addresses when he be, you might nott “A fire wall is utcs into the demo an alarm went off · l`lj
{ il was calling from out of town. Wlhile about as intelligent as a harnmer," The scanner had broken into the cia;. Q iii
E it they were boasting about how great says Alan Witty, a senior manager in sified Iet Propulsion Laboratory mg E .§
E their security was, Morris used an Iss information security at KPMG Peat pulled a bunch ofpasswordst “’Ihey‘d ` E
i ‘ scanner to grab a coniidcntiai address Marwickr "It is dependent on the __ _'g,
apr file o{·'i`their serv,er. "It took live min- pepple who put it in place? ISS president Tum Noonan - g ,
- lla ‘ utes;1 said don t bother anymore! I We complement fire walls," says Hhs easiest sale: to n classified { {gt -
- it already have the file," says Morris. Haus. “We make sure all the win- government lab, stint the I55 f sf ‘<}¤Z‘;_’
= l ;§ His colleagues atdBell Atlantic dows are closed and the doors are scanner brake in und siulu passwords. _; " €l‘K
Q1 became uite agitate . 1 · ·‘· it
How ciiiel the scanner sneak in? _ ‘ \
at = Through a back door that, in Unix r¤r"""·"r""·"·"*··r·······"··r·· ······r·····:*—·“··“*"""·"¤·*"···········—··········r¤;;s· t
° - . . ·· ”" ""' " ' """ ""`“‘“““""“““““““ . . .· - .··-- - it- kt-
; servers, is all too often left __ .. __; _ _· ,;_) ·_ · . . ._ _. ·· ; :t—,}l_3;·et‘
l { p _ unlocked: the so-called Trivial ,:51 _ ` I -*-' ‘ ?$f‘?°‘”Y"?‘ f°`?1"Y"‘ -3
‘— - Fiic Trwsfcr Pr¤¤¤¢¤5L This pr¤- .pja—ySZ`i¢i?’ · e ;, _i;‘T;,:, T_.;.f}Q[f.QJ2.gg" ?fiY°‘·€"‘* "Q‘;·fl` Y'?} ·::"- . " `§
· Q tocoi can allow anyone on a com-- l ‘§§<·' ` “&E;§f-Eaiilié»;=j!{}i¤Q·7?£`?: I¥‘f`:¥YLj` f"`*·l‘°`“· " l ·` s
= ·· ~ ..4 . -·.· =r=i—W‘->‘a-¥ - r` . · · E iiiiaééii
l [ password. Sounds hard to beli y 1_ iii¥°""‘E*”*··'=·?$ .? "Z ' . gill §
_ l but when the procedure was writte ‘ ` _ “ A §
= ‘, in the 1970s, programmers didn’t ` l ° E F
g 1 have hackers in mindt Solution: Tum 5 .. . , :
{ ¤ y offtbis protocols _ §‘·:gS_ijf=·}:>Ej,‘;g;f;¤.‘;§.i ,a§;;¤?»§_-§;§‘{;¤_ ·‘‘‘‘ ···‘‘· M ‘·‘· '
· { ; KIM-’ =¤¤¤¤i¤s 5¤?¤W=¤= lm 200 l‘?·¥ ‘—·`é ' · iF? "¤` ' · ·- -1 .·
, other hacker tricks where this one ;§j':'g:5}i;j=;¤_‘ i§;¥;f;=.~_§=- £';i'tl‘\ T V-s·§`
_ ; ‘ tam asm. rt also has a xsbmy of — -fa;·;¥1=,, - ·· A = —*
l 25,000 words and names that are n `
=| [ likely to be used as passwords. “? *~ .- .t._.r · " ' " l` l' . “‘ ‘`‘‘ tau ° ·=5i%_?»;
5 I Thought you were being clever to * —
‘ · __ use your dog’s name as a password? . _ . ` ‘ ` "$l§a
l _ “Spot” is on the list. So are "Steel— s A
1 ? ers,” "eagerbeaver” and “Start1·ck.” l0clted." spent $1 million trying to secure their ‘
;` You’re supposed to select a string of In case th` ` se gets too stuffy, computers," says Noonan, who
L ‘ gibberish characters as your pass- you can relax the rules a bit and then grabbed his laptop to prepare a price
‘ word, ofcourscr But all it takes in a __ use Internet Security Systems? inoni- iistr Current prices: $10 to S80 per ‘ . »;
400~terrnina.l network is one climwit toting software. It acts like a camera computer for thescanner, depending
' with an easy password; and the inside a network of up to 50 com- on how many computers are on your ·'i{;il
. hacker can get in. putcrs. The administrator can thus network. The monitor costs $5,000. {
` z, One of the easiest points of entry keep a log on all transactions and The 75 employees OFISS work hard - gl
. into a network is through E.~mail. look for suspicious acdvity. to discover chinks in fire walls before Y.; ‘l
_ This is after cracking open a pass- Novell was the first to license the hackers do`, The latest: Away to
p word, erin lieu ofit. The lss scanner K1aus’ scanner, for $2E),00O—-a crack into a Windows 1-.**1* server 1
_ identifies the E-mail server and then number Klaus picked out of thin air. through port 13S.t Microsoft has I
` figures out what software it is ttm- "I didn’t even know what.a.n invoice scrambled to issue a corrective patch.
_ I l ningt Ifit’s running Unix’s Sendmail was,” he shrugs. "Thcy didn’t teach Ifyou are not sure whether your system
{ version 8.6.5, cracking open the mail me that one at Georgia Tech? But administrator remembered to install
server is almost as easy as booting up. he Ilcnew he needed a manager. He the patch, better get a scannerr H
.....M...,,....... .....··—-·—·-·»···»»-·-—·- ·"'*£rE1:i§
Q 172 ; i Porlbes I March 10, 1997
:_ · U I lSS___O2l25902 n _
A