usefor-article-04 April 2001

[< Prev] [TOC] [ Next >]
9.2.  Attacks
[< Prev] [TOC] [ Next >]
#Diff to first older
NewerOlder
usefor-usepro February 2005
usefor-usepro December 2004
usefor-usepro September 2004
usefor-usepro August 2004
News Article Format and Transmission May 2004
News Article Format and Transmission November 2003
News Article Format June 2003
News Article Format April 2003
News Article Format February 2003
News Article Format August 2002
News Article Format May 2002
News Article Format November 2001
News Article Format July 2001
News Article Format February 2000
Son of 1036 June 1994

--- ../usefor-article-03/Attacks.out          February 2000
+++ ../usefor-article-04/Attacks.out          April 2001
@@ -1,20 +1,2 @@
-9.1.  Attacks
-
-   The two categories of attack that news is most vulnerable to are
-   Denial-of-Service and exploitations of particular implementations.
-   Many have argued that "spam", massively crossposted or reposted
-   articles constitutes a DoS attack in its own regard. This may be so.
-
-   Sending off-topic messages is a matter for individual hierarchies and
-   newsgroups to control. It is a violation of this standard to "forge"
-   an email address, that is, to use a valid email address which you are
-   not entitled to use. All invalid email addresses used in headers MUST
-   end in the ".invalid" top-level-domain. This facility is provided
-   primarily for those who wish to remain anonymous, but do not care to
-   take the additional precautions of using more sophisticated anonymity
-   measures.
-
-   It is possible that legal penalties may apply to sending unsolicited
-   commercial email and/or news articles. Check with your local legal
-   authorities.
+9.2.  Attacks
 

Documents were processed to this format by Forrest J. Cavalier III