Lyman Hazelton says: > Perry (and other c'punks), > > I don't think the mechanism employed by the hacker is using "who" at > all. The mechanism employed was obvious and simple -- someone subscribed an anXXX address to the list. Anyone looking at the subscription list can tell that, on their own. This technique has been used before. Perry