<HTML><BODY style="word-wrap: break-word; -khtml-nbsp-mode: space; -khtml-line-break: after-white-space; ">Huh? I sent this message days ago. Why is it just now showing up? <DIV><BR><DIV><DIV>On May 1, 2006, at 11:15 AM, Samantha Atkins wrote:</DIV><BR class="Apple-interchange-newline"><BLOCKQUOTE type="cite"><BR><DIV><DIV>On Apr 26, 2006, at 3:12 PM, Anne-Marie Taylor wrote:</DIV><BR class="Apple-interchange-newline"><BLOCKQUOTE type="cite"><DIV><B>Natasha Vita-More</B> <A href="mailto:extropy-chat%40lists.extropy.org?Subject=%5Bextropy-chat%5D%20The%20Business%20of%20Protecting%20Your%20Own%20Finances&In-Reply-To=444E846C.5050605%40foresight.org" title="[extropy-chat] The Business of Protecting Your Own Finances">natasha at natasha.cc </A> wrote:</DIV></BLOCKQUOTE><BR><BLOCKQUOTE type="cite"> <DIV> </DIV> <DIV><EM>I'm really sorry to hear that Natasha. I hope they catch the person </EM></DIV> <DIV><EM>that did it. That's just wrong. I still can't understand what makes people</EM></DIV> <DIV><EM>malicious.</EM></DIV> <DIV><EM></EM> </DIV> <DIV><EM>I was actually wondering recently what I should do regarding my</EM></DIV> <DIV><EM>computer. I'm buying a new one and can't decide if I should put it on</EM></DIV> <DIV><EM>the internet. I want to work on video and music programs and I'm </EM></DIV> <DIV><EM>thinking it's saffer to just keep my old computer for the net. I was </EM></DIV> <DIV><EM>wondering what everybody else thought. </EM></DIV> <DIV> </DIV> </BLOCKQUOTE><BR></DIV><DIV>Well if you really don't need anything from the internet for that work that might be doable. But I think you will find plenty of things relevant to video and music on the internet that you would like to have. If you are going to move stuff between the machines then you would also be open to anything that may have infiltrated the old computer. </DIV><DIV><BR class="khtml-block-placeholder"></DIV><DIV>I tend to keep my riskier OS machines (windows boxes generally) on a separate subnet physically and logically from main machines in my house. An attack on the former cannot get to the latter in any privileged way. The main machines are running less vulnerable OS and configuration and are truly internet facing. </DIV><DIV><BR class="khtml-block-placeholder"></DIV><DIV>-s</DIV><BR class="khtml-block-placeholder"><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">_______________________________________________</DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">extropy-chat mailing list</DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><A href="mailto:extropy-chat@lists.extropy.org">extropy-chat@lists.extropy.org</A></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><A href="http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat">http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat</A></DIV> </BLOCKQUOTE></DIV><BR></DIV></BODY></HTML>