Neil Clifford (
Thu, 31 Aug 1995 09:39:00 +0100 (BST)

Jeffrey C. Hunt scribbles:

|>     If someone else has a better understanding
|>of the OIG process please butt in, NOW!  There has to be other
|>users on this list out there (or are they too busy changing their

I should point out that it is not difficult to sniff passwords passing
between any two machines on the net. Thus even if there is no log of
host/user/password on oig it would not be difficult to collect victims.

The only solution at the moment (short term until OIG mend their ways)
is for persons to change their passwords and proceed to retrieve data
with a screen capture method (eg 'script' on a Unix box).

I could contrive some scheme for those who wish to retrieve the actual
files on there (as oppose to browse the tle database).