On Sat, 2004-02-14 at 02:51, Hylton Conacher (ZR1HPC) wrote:
Regardless of whether it is illegal or not to evaluate the employees via a stealth connection, we the SLE users are not the judge, jury and executioner in being able to decide whether the Romanian should be offered help or not. It is the job of the authorities in that country to enforce their own rules, and asides just because something is illegal in the USA and Spain (sorry Carlos) does not mean that it is illegal in Romania.
The basic question I do not think has yet been answered and I think with all the 'fluff' on it being illegal to help someone has departed from the subject.
If you feel you can help the poster, then do so. If you are against offering help for whatever reason then there is always the delete key or email filters.
I personally would help the Romanian as it shows the true spirit of open source if I knew how. As I do not, I am hoping that someone else will and therefore help me learn something as they would be helping the Romanian learn as well.
Lighten up everybody. This is a list that provides help not that acts as the judge ,jury and executioner.
I think you have missed the point that several others have tried to
express. While this is a user supported help list there are certain
topics that, as another poster correctly pointed out, are unethical.
If a user asks a direct question on how to hack a system they should
simply be told that such information will not be provided in this forum
since this is not a hackers forum.
In this case if the company wishes to monitor their users they can.
There should be no need to do this covertly. Even here in the U.S. a
company may monitor anything a user does on company systems or on
company networks. Some companies do this some don't. In most cases the
company will have published policy stating that they may be doing this.
For many companies it is standard practice to include a MOTD or message
when ones logs into a system stating that the system is for company use
only and that the user may be monitored. I personally assume that
anything done on company time and equipment is subject to being
monitored.
As such there is no need to do such monitoring covertly. If it is
company policy then having the vnc icon present is a requirement for
working there. The question that started this was asking for a hacking
tool which could be loaded covertly and as such, IMHO, should not be
answered on this list. This should get the same response as some one
asking for buffer overflow code that permits one to gain root access to
a remote system. A polite no.
--
Scot L. Harris