Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

GNU Carnivore With Perl Data Lookup 161

Kallahar writes: "Inspired by the FBI's DCS1000: Carnivore is a networked art project in two parts. The first part is Carnivore Server, an application which performs packet-sniffing on a specific local area network and serves the resulting data stream via the net. The second part consists of an unlimited number of client applications which tap into this data stream and interpret it in creative ways."
This discussion has been archived. No new comments can be posted.

GNU Carnivore With Perl Data Lookup

Comments Filter:
  • Chaos theory at work (Score:2, Interesting)

    by cculianu ( 183926 )
    I always love art that is based on chaotic systems. It's really cool how order can arise from chaos, and vice-versa.
    • I'm terribly afraid of this falling into the wrong hands. If the FBI got it, who knows what true character [dragonswest.com] may be revealed at the expense of rights...

      Hello, Sen. Helms, we've been monitoring traffic from your office this evening and, well, it creates a picture of a troll, over and over again...

    • The programmer will still have the creative input on how the data is interpreted - what gets rendered and what slips through. Regardless, it is an interesting project. I just hope no one takes the code and uses it for evil. :)
  • Lets Hope (Score:2, Interesting)

    by JohnHegarty ( 453016 )
    "performs packet-sniffing on a specific local area network"

    lets hope no one is look at naughty pictues... might give an effect which is less than random, and a bit more 18+
  • One of the critiques that I've seen of the FBI's Carnivore was that it required an ISP to install a "black box" on their network about which the ISP knew very little.

    Would an open source Carnivore be more palatable to the ISP community? The privacy implications remain, of course, but if the U.S. government adopted an open source program would ISPs be more willing to implement it?
    • What is on this black box? Does it use Windows as its operating system? Complete with the IIS web server?
    • check out Altivore [networkice.com].

      I wonder how many tech-saavy parents would use it to monitor their kid's activities.
    • I think so, but a better question would be is it going to acceptable to the court system? I mean, if you the ISP can change the code, how can it be insured that the software hasn't been tinkered with, to produce in-accurate results?

      Maybe I'm watching too many laywer shows on TV, but it seems to me a defense attorney would have a field day attacking the credibility of the evidence produced.
      • You've got a good point, it's easy enough to spoof network traffic outside the "black box" however. I doubt any of it would be admissible, if not easily discredited.
      • if you the ISP can change the code, how can it be insured that the software hasn't been tinkered with, to produce in-accurate results

        Certainly an interesting point. But then we can ask the question, does source equal binary? I think it's reasonable to say that any changes to the source code can be detected by differences in the binary output. In this type of situation I think the value of having open code is the ability to audit the system.
        Of I'm with the author of this thread's parent - why exactly is an OPEN-SOURCE carnivore more acceptable..??
      • I mean, if you the ISP can change the code, how can it be insured that the software hasn't been tinkered with, to produce in-accurate results?

        The FBI could take MD5 checksums of all the binaries on the system before giving it to the ISP, then it could simply check the checksums when it gets it back.

        Of course, if the ISP couldn't be trusted with the binaries, I don't think the ISP could be trusted not to tinker with the datafiles that they generate ether.

  • by JohnHegarty ( 453016 ) on Friday October 26, 2001 @05:18PM (#2485891) Homepage
    On November 17th, a draft version of a review of Carnivore, the FBI tool for monitoring Internet traffic, was made available to the public. This review was performed by members of the ITT Research Institute in Lanham, Maryland and is 127 pages long. In the Executive Summary, the review makes several recommendations for ways in which Carnivore must be improved, in order to protect individual privacy and assuage concerns about the potential for unauthorized use.....
    ....

    .....
    In other words, they found a flawed product, which can currently be easily manipulated to gather information beyond that authorized in a court order. They believe the flaws are fixable and have made recommendations as to what needs to be done, including eventually releasing the source, but not until some glaring security problems have been fixed first.............
    Read on here:
    http://www.lwn.net/2000/1207/security.php3 [lwn.net]
  • Disappointment... (Score:3, Interesting)

    by Xerithane ( 13482 ) <xerithane AT nerdfarm DOT org> on Friday October 26, 2001 @05:18PM (#2485892) Homepage Journal
    I have to say, I am severely disappointed that they don't have a Matrix-style display. To have a realistic matrix display that contains real information about network data would just rock. Warm and fuzzy all over.
    • So write one! That's the beauty of open source, innit?
    • The whole point of the project is NOT the data collection. If you had READ the site, the object of collecting the data is to use it as input to user-written clients for "artistic" visualization of chaotic data streams.

      That doesn't change the fact that I, personally, think this falls in the category of YARBI (Yet Another REALLY Bad Idea(TM)).

      • I did read the site. Why do you think I was talking about the Matrix display. It is a piece of art that is fed through real-time data.


        Of course, if you actually READ my post you would have gathered that.


        I'm just people care that you think it's a bad idea, too. Maybe you should go spend your efforts lobbying congress instead of posting stupid comments on slashdot?

  • If you are nervous about your messages being intercepted, get yourself a implementation of PGP and use it religiously. If you are really feeling paranoid, get the source code to 'Gnu Privacy Guard [gnupg.org]' and compile your own copy.

    I am part-owner of one ISP, and know personally top network administrators for at least a dozen other providers, both major and minor. None of them have 'Carnivore' or other government-mandated software or hardware on their networks.

    The Feds did make a one-time request of several major providers to scan their logs for email with a certain set of 'From' addresses, but there is no new ongoing traffic analysis at individual ISPs.

    There is absolutely no privacy left on the Net any more. None. Keep that in mind when you rant. That's what crypto is for. Ranting on Slashdot is by it's very nature, about as public as you can get.
    • If you are really feeling paranoid, get the source code to 'Gnu Privacy Guard [gnupg.org]' and compile your own copy.

      This would offcourse hardly be any safer if you'd not audit all the code before compiling it:)

      • Plus, you need to build your own compiler, starting with hand-built machine code and bootstrapping your way up (see the classic C Compiler hack [acm.org]).

        Of course, you then need to build your own processor to ensure there are no hacks in the processor too...
        • Plus, you need to build your own compiler

          No, but you do need to use a compiler that hasn't been hacked in the manner described by your link. I submit that it is possible to do this without building the compiler myself.

    • As much as I'd like to, very few, if any people I know have any idea how to decrypt PGP messages. The problem with PGP is you have to have one side to encrypt it and the other side to decrypt it, and since a lot of my friends, family members, and clients are 100% computer illiterate, it does not lend itself to being a realistic solution. I think all messages should, by default, be encrypted by all SMTP servers before they leave the network and be decrypted by the receiving SMTP servers before delivery, by using one of RSA's lovely encryption mechanisms, but that's just me.
    • There is absolutely no privacy left on the Net any more. None. Keep that in mind when you rant. That's what crypto is for.

      PGP, GnuPG, or whatever public key crypto you use, enables you to sign, verify, encrypt or decrypt documents. That's it. It's not an anonymizer. You can use them to keep your personal communications private, but they're useless for public posts on Slashdot. What good's a post on Slashdot that no one can read?

      Now a PGP based mailing list would be a very Good Thing(tm). Encrypt your messages to the list server, which then sends it out encrypted for each subscriber.
    • by DrCode ( 95839 )
      eythay illway evernay igurefay isthay outway!
    • --- BEGIN PI-GUY ENCRYPTED MESSAGE ---
      lasdkasldAlaskd;sdkHasl;djasAdakls! Casd;AsaNlk alsYlaksdfOalskdfsdfUasdflj jklRlkjaEajksAalskjDasdklj alskdjTadslkjHlasdjIalsdjSladjs?lasdj
      --- END PI-GUY ENCRYPTED MESSAGE ---
      HINT: Look at the caps...
  • by agrapa ( 122151 )
    Coudn't this count as an attempt to reverse-engineer the communication protocol of networked applications and therefore be breaking the DMCA??
  • Seems to me this is more about the programmer creatively setting up a was for a computer to place overlayed text or randomly grabbed images into a layout. I don't see the computer making many of the artistic decisions, except maybe applying the color wheel maybe?
  • by mwalker ( 66677 ) on Friday October 26, 2001 @05:33PM (#2485932) Homepage
    Carnivore Server is a set of Perl scripts running on top of tcpdump

    You know, sadly, this is probably far more sophisticated than the actual Carnivore system.

    Good grief.
    • this is probably far more sophisticated than the actual Carnivore system

      I recall hearing Larry once allude that he did some work for the "Iowa Farm Boys", before (or sometime during?) his stint at JPL.

      But that was also before Perl, at least as we know it, I guess.

      Otoh, maybe he taught 'em a few tricks. :-)

    • If it is like other government developed sofware I've seen it's written in VB with very large buttons, all bold all caps text, and a clever color scheme.
  • Here is some more information about the artwork (NYTimes login required blah blah blah blah) [nytimes.com]
  • So they release a "Art Project" that convinces people to install a box on a bunch of networks, join an IRC channel and dump packets...

    And this is a good thing because ...

    ???
  • To be useful for anything which could impose on your "liberties". Although perl never has ceased to amaze me.

    Would need to be some kind of no-hop-added router, I guess. (I know IPF can do this, but parsing packet content is a bigger job than just reading headers, especially at the major nodes)

    Like others have wisely said, if your unsure, encrypt with your own keys. Everyone sniffs around these days, run ipmon for fun!

  • "an application which performs packet-sniffing on a specific local area network"

    Imagine setting up a dual-homed, 802.11b equipped laptop near a major business, then using this art project to broadcast what you hear to the world.

    Scary!
  • Send your friends some streams of /dev/random They'll waste a few cpu-hours trying to decrypt each. If everyone did this, all monitoring of traffic would either be very expensive or very worthless.



    Start secret message:
    s^O(^S^XltkA@[1^Z;
    end secret message

    • Hell, there's so much spam and ads and flash streams on the net these days it's almost as good :)
    • Remember "The Prisoner"? In one episode they briefly mentioned "jamming" to disrupt the activities of the warders. A later episode, "Hammer into Anvil", showed awesome jamming in practice.

      "Prisoner" style jamming would be stuff like secretly passing (real) grocery lists, abruptly changing your well known hobbies, getting a post office box that you only use for two of your four magazine subscriptions, etc. Makes the warders think you're up so something so they expend effort trying to figure it out.

      So what would "Carnivore" style jamming be? It can't be just randomness, and it has to be at least semi-legitimate. Posting signed and encrypted random streams won't count, because it's not real. And it can't get you in real trouble. One idea: create a PGP key for "Anonymous Coward", and sign all of your AC posts to Slashdot with it. Another: always use a signature tag composed of 26 randomly selected letters, all lowercase.

      The key to getting jamming to work is for all the jammers to respond appopriately to other jammers. When one jammer sends you a PGP signed grocery list, send him or her your chocolate cheesecake recipe.
      • This happened to me about four years ago. I posted a message to Usenet (my first post to alt.discordia, among other groups), with a .sig containing "Filter bait: He will assassinate the president, but needs the password." followed by RC4 in 3 lines of Perl. The secret service obtained my (unlisted) home phone number, probably from my university, (probably not entirely legal, but I'm not pushing it,) and called me up at the ungodly hour of 9AM to question me about my website. They were referring to this post, which they had found using Dejanews.

        My point being, I'm a bit afraid of the run of the mill agents having access to technical anti-privacy nukes that they don't quite know how to use.

        • It occurs to me that a real terrorist would be using elaborately hidden, near-undetectable codeword systems about now. Counterstrike [counter-strike.net] players, on the other hand, will cheerfully keep talking about terrorists with AK-47s planting bombs, taking hostages and assassinating the President... I wonder how the Carnivore operators cope with that one?
      • > When one jammer sends you a PGP signed grocery list, send him or her your chocolate
        > cheesecake recipe.

        Hmm, I'm not sure. *My* chocolate cheesecake would be considered as a terrorist weapon in many countries...

  • According to the cite referenced (quoting):


    For those interested in downloading code from the NASA Classics Collection,
    you should be aware that we are currently required to charge a fee for the
    software. We are working with the people from NASA to try to "open" this
    software to enable downloads without fees, at least for private,
    non-commercial use.


    So there's no public domain software.
  • Are the algorithms used to generate the "art" one-way or reversible? I.e. is this art project a security hole of its own by allowing the original datastream to be resurrected?
  • Free spyware!! (Score:2, Interesting)

    by tuxlove ( 316502 )
    While I suppose this software could be used for legitimate security purposes, much as programs like Snort which monitor your network, the potential for abuse is great. By providing network administrators with a tool for sifting through network traffic for fun tidbits like email messages and other personal communications, the bar has been raised in the battle for privacy. Tools like this will make it that much easier for your ISP or employer to spy on you unless you take great precautions like encrypting everything. Since that's not always feasible, I guess we need to accept that there's no such thing as privacy on the net.

    Of course that was always the case, but in the past it's been similar to the "school of fish" mode of defense. By schooling, fish reduce their chance of being singled out by predators. In a group of a million fish, the chance of any particular one of them getting eaten by a shark is small. One could liken this scenario to the millions of Internet users. But now, with tools like Carnivore, you can catch all of the fish at once and devour them at your leisure.

    I think I see why it's named Carnivore.
    • I guess we need to accept that there's no such thing as privacy on the net.

      I agree completely! I've always accepted this. Nobody ever promised privacy on the net (unless you're talking about encryption, but even then, is it perfect? And who's willing to promise?). Asking for privacy on the net is like asking for privacy on an interstate highway.

      By schooling, fish reduce their chance of being singled out by predators. In a group of a million fish, the chance of any particular one of them getting eaten by a shark is small.

      Unless the shark has a really big mouth.

    • uh, this is really just based around tcpdump, which is standard / available for lots of *nix distributions. Did you even go to the website? It's an artsy fartsy project.

    • I hardly think that this enhances the spy potential of the average sysadmin. After all, it's just Perl scripts running tcpdump, and it's not like those aren't already available.

      It won't help your ISP at all--it is designed for the output from an ETHERNET packet sniffer, and your ISP is almost certainly using fiber. Your "shool of fish" defense is illusory as well. One of the things computers do really really well is filter large amounts of data, picking a fish out of a school. Even the FBI's Carnivore wasn't startling because of its tech, but because it was going to be installed in formerly open waters.

      I also doubt this will ever be usefull for "security", although network analysis certainly can be (see the Intrusion Detection Working Group of the IETF). However, it might be possible to write a client that gives you traffic analysis that could be used to make your network more effecient. Sniffing is legitimate for more than just security--network flow design and protocol debugging are actually probably more widespread.

      I'm still not sure I really like this program, though. As the artist says in his NY Times interview, he wants people to become more comfortable with the idea of survellience. I'm not sure I like that. On the other hand, it might decrease the demonization of packet sniffers, which would be a good thing. On the gripping hand, it's out there, check and see if it's running on _your_ network.
    • Comment removed based on user account deletion
    • By providing network administrators with a tool for sifting through network traffic for fun tidbits like email messages and other personal communications, the bar has been raised in the battle for privacy.

      ever heard of a packet sniffer? Like TCPdump? which is all this is, parsed by a perl script. If you had bothered to read the site you'd see that all this does is re-serve the input of a packet sniffer and is inteded as some kind of comment on the public natuire of information etc. It has not raised any privacy bar. In fact if it makes people aware of privacy issues, it has probably helped. All the functionality provided is superseeded by other tools.

    • IMHO, if you are sending personal e-mail of a sensitive nature over your employer's network, you are somewhere between an idiot and a fool on the intelligence scale. It's a well-established legal precedent that the network and ALL the data on it belong to the employer, and as a natural consequence, employees have NO right to privacy against employer snooping.

  • I searched all the web site , and couldn't find the clients :(
    Examples are cute, but where is the software ?
  • This stuff [rhizome.org] is more enjoyable to look at than most of what's on the walls at the Guggenheim!
  • Sure, you would like to think that this is going to be some kind of pretty model of chaotic systems, but it is really GNU giving their blessing to government spyware.

    Now not only do you have the Feds watching everything you do online, but you also have the approval of those who claim to fight for your "freedom". What a joke, indeed. It is time that we, the freedom-loving citizens of the Internet, teach these people that it is not ever acceptable to watch other peoples' network traffic. This is a violation of privacy pure and simple and if we need cause a great disturbance in protest against such a thing, then so be it. We will retain our right to privacy.

    • Ok... Where do you see a right to privacy on the internet in general ???
      I can not point to any protocol standard that says you have such a right.
      Your packets travel over the internet through other administrative domains that you do not control... What makes you think you have privacy there ?

      Now if you want privacy get PGP/FreeSWAN/isakmpd/etc. and make it so your packets have no meaning to any but the destination. Until then NEVER assume you have privacy...
      • The same thing that makes me think that using a phone should be private: the constitution. Last I checked, Americans had a right to privacy. How about we put a tap on your phone, broadcast the conversations, and call it art? Those are, after all, not private land lines you're using. Nor, do I imagine, do you own a private satellite, so why don't we capture your cell calls too. Whether you call it art or not, it's still eavesdropping. If this thing hadn't been GPL'd, people here would be all over it, whining about their privacy. Let's see MS release this and watch the pigs squeal. And no, I'm not trolling...

        • Unfortunately, the right to privacy is not in the Constitution.
          • Perhaps you should avail yourself of the facts [cornell.edu] before you go shooting your mouth off like that. I really hope you aren't an American, because your lack of konwledge about our constitution is appalling.

            • If you freely give something to the government, there is ZERO Constitutional protection on that information.

              The Constitution (4th) just says the government can't take information from you. Doesn't say a damn thing about what they already have.

              Kindly tell me where in the Constitution it says that they can't freely publish your tax records for example.

              The 9th and 10th are the only ones that can remotely be considered protecting privacy, but those aren't enforced worth crap.

  • Just imagine it - due to the wild success of the SETI@home and protein folding efforts, the FBI has decided that they too can distribute the loads of finding nefarious people in the world.

    And, with the MPAA and RIAA @home supplemental modules, your MP3s will be reported directly to the master FBI server...

  • Sad to say, while there were many compelling arguments for open sourcing Carnivore so that the public could see if the FBI's boxes could be trusted, there is a major downside.

    You've just given Carnivore tools to the Chinese, The Iraqis and all the other oppressive governments of the world. Even though buying a network sniffer and configuring it was within their power before, this makes it easier.

    And whatever fears I may have (and they are many) about the U.S. government and its agents abusing their powers, they are nothing compared to the fears I have about those other powers.

    What we needed was two things. One was source review of the boxes the goverment uses by a wide range of trusted people, and two was a free as in free beer tool for U.S. ISPs so they can use it as an excuse to refuse a carnovore box on their ISP in the first place.
    • In a word, BULLSHIT!

      Why do you think that espionage is still a booming practice in the world? Because it's a great way for "them" to steal "our" technology! They've already got it, my friend!

      Besides, Carnivore was never a secret from governments--just from citizens. What good purpose is there in keeping it secret from a country's own populace.
      • Because it's never a black and white, 1 and 0 matter. We like open source software because the users maintain it and keep it high quality, and we can fix the bugs in it. We can also be more confident in its security if we compile it ourselves.

        But this is one piece of software I don't want to be easier to use, and maintained at higher quality. Most of us are never going to use it ourselves.

        But I do want to be sure it's not got hidden holes, so there is a dilemma. But the right answer may be in some mix, not the pure open source model.

        And you're dreaming if you think the spooks who take and enhance this software here or elsewhere are going to contribute back their modifications, GPL or no GPL.
    • As it has been pointed out, the tools exist to sniff ALL the packets on a network segment, what makes Carnivore is that it makes it easier to meet US court requirements for evidence.

      If your are the admin of the networks system, which in totalitan regimes, you are, you have total control over the access and routing and logging of packets. You don't need carnivore, you just have the routers log all packets to from specific IPs.

      Carnivore exists because in the USA, the govt doesn't have 100% of the network.
      • That's not quite true. In many regimes the network centers are still run by private individuals and even corporations. Many totalitarian states still have private companies.

        The question is how easy do we make it. I don't know about this GNU carnivore but one thing FBI's Carnivore/DCS1000 does is track DHCP and radius traffic so that it associates IP addresses with real userids. Not something you can as easily do with a standard router.

        Instead of writing tools to make it easy to snoop, we should be writing opportunistic crypto tools to make it harder.
    • It's not to tough to create a carnivore clone or another packet sniffing unit/program if you set your mind to it. Let us not forget that a lot of good programmers come from the countries you pointed out this project gives information to. The university I attended for CS was manily middle easterners doing there Masters.
      • Of course. The question is, why make it easier for them? Half of why we want open source is to make our programs better. We don't want these privacy invading programs to be better and easier to use! That's quite different from our goals on most packages.

        We do want to be sure that they aren't snooping on us improperly, and some feel that if they are open source, that means we can check for that sort of thing. But in fact, that's possibly a big mistake.

        We can verify that the open source version is OK, but as you point out, there are people who can modify the code. And it's a lot easier to take the open source snooper and add patches to it to take out the safeguards than it is to write one without safeguards from scratch. This is really quite different from the goals of open source.

        The people who take out the safeguards won't tell you they did it, nor will they contribute their patches. Nor will they follow the GPL.

        When the FBI shows up with a DCS1000 Carnivore, they just attach a black box to your ethernet. They claim it's even wired so it can read, and not write, to your ethernet. But you don't get to inspect it, or check MD5s on the binaries to assure they were inspected to behave well.

        Now, I like the idea of a free tool for ISPs so they can install it to comply with warrants and thus refuse the police black box. But what advantage is gained by that being open source. It would be nice if it's free to the ISPs, with source available if you sign a contract, but that's about it.

        I'm also concerned that since secuity at ISPs is not super high (some run IIS for chrisakes) that it's not that hard for anybody, even a script kiddie to break in to a machine on my ISP's ethernet, and then get another script based on this open source snooper you want to snoop me. Forget the feds, these guys are worse.

        So I want to work to encrypt all my traffic but I can't yet, so I hope to not make it easier for the snoops.

        Not that it should be illegal or anything to release this package. I just want to argue that it's not a great idea. It doesn't match the reasons we like open source.
  • I always thought GNUs [gnu.org] were herbavores...learn something new every day...

    KidA
  • How to do this with sound?

    I've often thought of vocalizing my lan. Does anyone know where to start to realize tcp packets as sounds?

  • I swear, about 5 stories a week on slashdot are straight from memepool.com [memepool.com] and the submitters never credit the site.
  • ok.. everyone try to slashdot uhh slashdot.org on my mark.. 1...2...3...GO!
    ahh dident work.
  • C'mon, even my Aunt Peggy understands that gentleman don't read each other's mail.

  • by KFury ( 19522 )
    Wow, 45 days from seeing Carnivore as a horseman of the apocalypse to striving to make a more effective open source version.
  • But is it "art"? (Score:4, Interesting)

    by Jamie Zawinski ( 775 ) <jwz@jwz.org> on Friday October 26, 2001 @10:06PM (#2486433) Homepage

    I did this better in webcollage [jwz.org] years ago. But of course I didn't call myself an Artist Collective, and I didn't put out a press release, so no article in the Times for me, darn. I guess that's why webcollage is a ``hack'' rather than an ``art project.''

    I swear, one of these days I'm gonna apply for a federal grant to hack on xscreensaver [jwz.org]. I've seen people get money for worse things [sfmoma.org]. All you have to do is swallow your sanity and gag up an artist statement [catalog.com] of some kind, and the literati will take you seriously: if you cloak it in pretentiousness, the most trivial piece of eye candy can become a Serious Work, full of Insight And Meaning!

    The problem with art is artists. My goal has long been to eliminate the artist from the creative process.

  • ...adding GNU to a name just makes it silly.

    In other news, Richard Stallman is considering changing the GNU Project's name to Monty Python and hawking its software as parodies of the real stuff.
  • Will this compile on Cygwin? I don't think TCPDump will, or will it? I'll take a look later. I also own a copy of flash, mebbe I'll write something cool as a vis client..... I'll post my results later. --j0shua
  • Is it just me, or would anyone else be entirely unsurprised if the FBI discontinues development of carnivore and its successors, and swtiches to GNU carnivore? After all, now they have a similar application developed by experts all over the world, and they can review all of the code for backdoors. Hell, I can see governments all over the world picking up this program and abusing it to the detriment of humanity worldwide. I hate to say it, but this is one project that I wish had never happened, and will not miss if it dies out.
  • This isn't an "open source version of the FBI's Carnivore," and it's not a "GNU Carnivore." It's an art project inspired by the FBI's Carnivore, and it has nothing to do with monitoring internet usage or violating anyone's privacy. Basically, this Carnivore project serves up data culled from tcpdump, and then clients use the data to generate intriguing and sometimes beautiful audio or visual art. Go check it out; it's very cool.
  • Maybe this could be configured to detect virus attacks and draw a few skulls in a window to inform you...

    That might stimulate a few lax sysadmins when bosses see their boxen showing jolly rogers.. ;)

    ---
    Paul

If you think nobody cares if you're alive, try missing a couple of car payments. -- Earl Wilson

Working...