id
int32
1
11.3k
text
stringlengths
0
74.9k
label
int64
0
19
Generalization
stringclasses
1 value
7,427
Are 'Moody Monthly' and 'Moody' the same magazine (name change in recent years)? If not: Could someone post the address to 'Moody Monthly'? :)avid
0
trimmed_train
3,506
Re: Rubbing Compound.... You mean Meguire's* didn't work? * THE DOD magic elixir of choice for plastic stuff
12
trimmed_train
3,677
So what's your local hospital's favorite curse?
12
trimmed_train
9,405
I was having the same problems compiling X11R5 on a IPC sunos 4.1.3. If you compile with 'make -k World' it will not stop on the ld errors. As was stated in another post the clients with the errors still run correctly.
16
trimmed_train
5,327
Piper lived in my town (Williamsport, PA) when he killed himself. It was in the early '60's. He had had more than a few books published by that time, but he was down on his luck financially. Rumor was that he was hunting urban pigeons with birdshot for food. He viewed himself as a resourceful man, and (IMO) decided to check out gracefully if he couldn't support himself. The worst part is that John Campbell, the long-time editor of Astounding/Analog SF magazine had cut a check for Piper's most recent story, and said check was in the mail. If Campbell had known Piper's straits, I'm sure he would have phoned to say hang on. Campbell was like that. I wish it had happened differently. I always enjoyed Piper's stuff.
10
trimmed_train
8,231
I would be interested in hearing from anyone who knows of good software for antenna simulation, particularly in source form suitable for Unix workstations (though good PC software would also be of interest). I'm aware of the numerous mininec mutations, and have been using MN for some time now. I'm primarily interested in HF, VHF, and low UHF (< 500 MHz) designs, mostly wire antennas, but for thick wires and mesh surfaces as well as for your basic thin wire assumption. Is anything interesting happening with NEC itself? I've seen a version that was mutilated to run (sort of) under Microsoft Fortran, but I'm not sure how many "new and improved" versions of the code might be out there somewhere. I'd also be interested in non-NEC derivatives. The ones I've seen have been aimed at microwave applications, but if there is something out there useful at the lower frequencies, I'd like to know about it. Thanks,
11
trimmed_train
11,114
Hi I am trying to implement a pointer feature in Xlib I have multiple windows and all can take input and show output simultaneously on all other displays I want to implement a pointer feature I would like to get the pointer to come up on all windows once I choose pointer in the menu and every one should be able to see it Can you give me some hints as to how I should proceed I am new to Xlib replies will be greatly appreciated Thank you
16
trimmed_train
199
I have an eprom blower made by Logical Devices and the model name is Prompro-8, but I have lost the manual. Does anyone have a spare manual that they would like to sell ?
11
trimmed_train
3,062
Or little children at the market. (Or is that the Irish? Hard to keep all you not-really-English types straight.) --
12
trimmed_train
2,389
[stuff deleted] me: David: This is a very, very good point. Who cares what kind of gun you've got if you're lying on the ground dead. [more stuff deleted. mostly mine] Another very good point that is well taken. It seems that when lots of lead is flying (either the cops or the gangs) someone innocent always gets caught in the crossfire. All points made above are well taken. I guess I am in the mindset of "having more makes it better" which is obviously not the correct mindset to take in this discussion. Now that I think about the situation a little more carefully I see your point exactly David and I wholeheartedly (sp?) agree. Like I said I'm just assuming that "more bullets and/or bigger bullets is better". Once again though I want to state that I am a pro-gun individual and do NOT believe that gun control is really a viable option here in the United States regardless of the drivel that I spout here :-)
9
trimmed_train
10,193
May I suggest the book: "Ethics" by Dr. Norm Geisler, of Dallas Theological Seminary. In it, he goes over all the arguments pro and con and in-between, and comes up with a very reasonable answer. If I have time, and there is enough interest, I may post his position. Jon Noring -- Charter Member --->>> INFJ Club.
0
trimmed_train
3,408
Printer model and specification: Canon CLC 500 (Color Laser Copier) ps-ipu unit (postscript intelligent processing unit) Hello, We have recently purchased a very expensive and nice color copier/printer. We want to be able to print to it from our SGI iris network. The copier/printer has both a parallel and SCSI interface. I have configured the printer with the "lp" system using the parallel interface and can print postscript files to the printer. I can also print rgb files, but these are in turn converted to postscript by an internal filter. The Canon CLC 500 is a publication quality printer but the quality of our postscript printouts are less than acceptable. We create the postscript files with a variaty of programs, such as showcase, xv, and tops. When we convert to postscript with tops and use the -l option to specify the halftone screen density of 98 rather than the default 40 the output is better, but still much less that acceptable. Note, that we are starting with a screen image in rgb image format and translating the image into postscript. We suspect that if we could use the SCSI interface we would get higher quality pictures. We have not purchased the software that drives the printer from the SCSI port. To my knowledge this software is $5000 and does not come with a warranty. The management here does not want to spend this much money without some assurance that the product will work. Here my questions: If anybody on the net uses this printer are you using the SCSI or parallel port? What is the quality of the printouts? Is there a way to create high quality postscript printouts? What is the limiting component, the postscript language or the postscript interpretor on the printer? The Big question: Where can I get some software to drive the SCSI port for this printer? Please email directly to me, I don't not read news on a regular basis. I will post a summary. Thanks in advance.
1
trimmed_train
3,593
PC Mag only got around 9-10 Winmarks when they tested the Steal 24. It sounds like you are ok. jamesc
3
trimmed_train
8,461
On export.lcs.mit.edu directory contrib, and avahi.inria.fr directory pub/xpm: xpm-3.2f-to-3.2g.patch.Z xpm-3.2g.tar.Z /* Copyright 1990-93 GROUPE BULL -- See license conditions in file COPYRIGHT */ /**************************************************************************\ * * * HISTORY of user-visible changes * * * \**************************************************************************/ 3.2g (93/04/26) ENHANCEMENTS: - much faster close colors - piping from/to compressed files now handles GNU's gzip (.z) format - added XpmColorKey attribute - ability to specify which visual's colors to use (ie: now it's possible to read in a pixmap in a color visual, but use the colors specified for monochrome). - added -mono, -grey4, -grey and -color options to sxpm to demonstrate the XpmColorKey attribute. - Jason Patterson <[email protected]> BUGS CORRECTED: - fixed bug where redefining "None" as a pixel stopped mask generation - minor SVR4 defines for <string.h> - fixed annoying closecolor bug related to read/write color cells - fixed minor bug in color value -> pixel overloading - manual updated to include new red/green/blue closeness attributes - Jason Patterson <[email protected]> - the top Imakefile was missing the depend target - sxpm/Imakefile fixed so that -L../lib is set before the standard library location. - Vivek Khera <[email protected]> - lib/xpmP.h now defines bcopy as memcpy for VMS (required by recent versions of VMS) - J. Daniel Smith <[email protected]> - the lib/Imakefile didn't work with X11R4.
16
trimmed_train
8,089
Hello I have a question about the demo files for amipro v3 uploaded in cica. I downloaded it and tryied to install it. However, it didn't work. In addition, it altered or eliminated my NWRES2.dll file so that I had to reinstall my Norton Desktop again. Is there anything I have to know to install it or do I eventually have to ask Lotus to send a working model to me (I heard that they have it)? I just want to see its look and feel before buying it. Any pointer would be greatly appreciated. Thank you
18
trimmed_train
1,896
Not at all. Two weeks ago I registered a concern about some programming that was being conducted by a student organisation here at the University of Texas at San Antonio. As a result, I was interrogated by the capus police, who also attempted to create a positive-identification file (photo, fingerprints, etc.). I refused to permit this, and filed a complaint with the University administration. The Vice-President for Business Affairs (the 'boss' of the campus police) stated that he had no interest in the legal/Constitutional implications of those actions.
7
trimmed_train
7,434
Wales Conference, Adams Division, Semifinal I'm hoping for a Fuhr miracle, but I agree that Boston will likely win the series. Goaltending is about equal, top offensive players are about equal (Mogilny-LaFontaine vs. Oates-Juneau), but Buffalo has no answer to Neely (not to imply that Neely is not a top offensive player btw, in fact he's one of my favourites even though he's a damn Bruin :) ). And the rest of the matchup wrt lineup favours Boston anyway. But I think it will go six. Agreed here...but Montreal will be pushed to the limit. Is it just me, or does everything Montreal does in the playoffs come down to Roy? Go Habs!! Final I can't predict a Montreal victory because I've been watching them play for 6 weeks and IMO they severly need some tougher players, especially to play in the Garden. Last time they beat the B's 5-2 but Boston had a clear territorial advantage; the victory was Roy's. At the same time, I can't bring myself to predict the possibility of a loss, so I'll just say I will not be putting money on this series. :-) Agreed. NY doesn't have the goaltending to stop the onslaught, independent of the trouble they have given Pittsburgh this year. Pens in five, which is credit to NY. Agreed here too, but I think it will go at least six. Jersey has a decent team, and Washington has done poorly against the division this year. I think they will use Tabaracci more after Beaupre gets shelled. I don't think it will go six either...*maybe* five. If Pittsburgh plays Boston, IMO they win in likely five, possibly six. They own the Bruins. If they play Montreal, I think it will go to seven, and once again I won't be putting money on the seventh game. I say seven because the Habs have played Pittsburgh very tough this season. Chicago will win, but I think in at least six. Chicago is not that good, IMO. And remember that they take ridiculous numbers of penalties. Very true. The Leafs have much to be proud of, but they will soon find out why Montreal did so lousy in the playoffs. Toronto might win two or three at MLG though. Wings in six, maybe even seven. It _will_ be a war...possibly the most intense playoff series of them all. And yes, I think Detroit will win. Probert will have to come up big though. Our first disagreement. Canucks are playing like shit. They don't use their size *at* *all*, which may explain why they get hammered 8-1 by a team chasing them (Calgary)....Winnipeg in six. This is also tough for me to call, because I haven't seen the Smythe enough. I don't think Roberts will be well enough to figure in, Coffey is a non-issue, who cares what Carson has done before, and *never* underestimate Gretzky. LA in six. If it is these two, Calgary will not need six games. But I think it will be LA-Winnipeg anyway, and LA in seven, because of home ice. Wow, must've been tough to go against your team. But let's see, I picked LA-Detroit. Detroit will win, probably in six. If Pittsburgh plays Detroit, it will go longer than five, and I wouldn't bet against the Wings. They are very strong, IMO, and nobody knows *how* strong because they've been underachieving most of the year. If forced to choose, though, I'd have to take the Penguins. A side note. Vlad, last week you said that Selanne was a better player than Gilmour. NO WAY. He is a more talented pure goal scorer...but aside from the age difference, there is no way I would take him over Gilmour on my team. I'm not asking for flames, either, btw....I've spent more than enough time arguing on behalf of Selanne and I still say he's a great player. But while he and Gilmour are both dangerous offensively (give Teemu an edge), Gilmour *does* *it* *all*. I know a lot of Gilmour-bashing goes on, esp. from Flame fans. But IMO you guys are letting your dislike of Gilmour cloud your judgement when it comes to his skill. He is easily one of the best all-round players in the NHL.
17
trimmed_train
2,934
**************************************************************** * ////// ---------------------- * // // "Electronic Networking For / PsychNet.Com / * ////// "Professional Psychology." /Serving Psychologists/ * // sychNet (1-800-541-2598) / World Wide / *// ----------------------- ************************************************************ It's an experiment, place a not so subliminal, slightly cagey message in front of a viewer and see how long it takes to create a response, and what was the response... It was the same thing with the "Blow me" message, only it had a quicker response time...and some unexpected responses along with the expectedly negative ones... Anyone see how long that took? Yours, in jest... Tom T
5
trimmed_train
9,655
Um, what? Eddie Murray was a superb first baseman for a *long* time. Winfield as produced consistently for almsot 20 years, and excellently on several occasions. Dave Kingman's *best* year was like Darryl Strawberry's *typical* year with the Mets. Darrell Evans, too, did a whole lot more than just hit homers, which *is* all that Kong did. Whom are you talking about? Yes, Eddie Murray is marginal, but that's because he's 38 years old. He wasn't marginal for a *long* time. Not. Smith has hung around for a long time AND fielded the position better than anyone else ever has. Yount stopped being a shortstop about a decade ago, in case you hadn't noticed. One of his two MVP awards was as a centerfielder. Like whom? There are many players in the Hall who aren't anywhere near as goos as the guys you're running down. That's already the case, by some standards. But the *bad* players in the Hall are all from the 20's and 30's. Recent picks have generally been excellent. No, but who cares? Was Stan Musial anywhere near as good as Babe Ruth? Not really. But he obviously belongs there. The Hall has generally had about the top 1% of major leaguers. As more players come through the game, more will be in that top 1%. And, yes, it's pretty easy to argue that Smith,. Yount, Evans, Winfield, etc. are in the top 1%. Dave Kingman on the other hand, was a liability throughout most of his career. Of course, Garvey *hasn't* gotten a lot of HOF press, so I don't know what you mean. As for Ryan, is his W-L better than Morris'? That's what a lot of voters tend to look at. And Morris *was* awfully good for a decade, and doesn't lead MLB history in walks allowed, either.
2
trimmed_train
2,629
Pardon me, a humble atheist, but exactly what is the difference between holding a revealed truth with blind faith as its basis (i.e. regardless of any evidence that you may find to the contrary) as an absolute truth, fully expecting people to believe you and arrogance? They sound like one and the same to me. And nearly every time I meet a christian (or for that matter, any other theist) who tries to convert me, I find this proven over and over again. I see no wisdom whatsoever in your words Unfaithfully yours, Pixie p.s. If you do sincerely believe that a god exists, why do you follow it blindly? Do the words "Question Authority" mean anything to you?
0
trimmed_train
4,565
As the subject suggests the Flames were not impressive this afternoon, dropping a 6-3 decision to the LA Kings. Most of the Flames neglected to show up, especially in their own zone, as the Kings hit at least five posts! The Flames best line was probably Skrudland-Paslawski-Berube (which tells how bad the Flames were). Gary Suter scored a great goal (in fact all three Flame goals were scored by D-men - Yawney and Dahlquist getting the others), but also made some bonehead plays. For the Kings, Pat Conacher was especially impressive. The games was VERY chippy, as Dan Mirouelli lost control early and never recovered it; there were high-sticks, cross-checks, punches, hits from behind. Fleury got a game misconduct for rubbing out Warren Rychel from behind. Flames dominated the game physically, but failed to take advantage due to horrendous defensive lapses (I don't think Vernon can be blamed for any of the goals). Calgary went with 7 D-men, as Roger Johansson played LW; he looked lost IMHO - I hope King inserts Chris Lindbergh, Paul Kruse, or Sergei Makarov for Wednesday's game. Gretzky left the game in the 2nd period with a charley-horse; no idea how serious - he didn't return. I still think the Flames should win this series, but they better buckle down.
17
trimmed_train
5,721
4
trimmed_train
1,833
Hank Greenberg would have to be the most famous, because his Jewish faith actually affected his play. (missing late season or was it world series games because of Yom Kippur)
2
trimmed_train
2,722
I remember hearing a few years back about a new therapy for hyperactivity which involved aggressively eliminating artificial coloring and flavoring from the diet. The theory -- which was backed up by interesting anecdotal results -- is that certain people are just way more sensitive to these chemicals than other people. I don't remember any connection being made with seizures, but it certainly couldn't hurt to try an all-natural diet.
19
trimmed_train
4,115
I don't Well, no problem! But I get pretty annoyed when they swing at non-strikes and make outs. Especially ball four on the 3-2 counts... Dave
2
trimmed_train
9,491
My friend brought a subaru SVX recently. I had drove it for couples times and I think its a great car, esp on snow. However when she took it to a local Subaru dealer for a oil change, the bill came out to be about 80 dollars. The dealer told us it is because to change the oil filter on a SVX it is necessary to disassemble a metal cover under the engine and that took an hour of labour. At first, we think we are being ripped off so she phone to a dealer in Toronto but found out the they are charging roughly the same price. So is there any SVX owner out there that has the same problem ? And if the oil change story is true, then the engineer of Subaru looks pretty stubid to me. By the way, the car looks great.
4
trimmed_train
9,696
I have seen several ray-traced scenes (from MTV or was it RayShade??) with stroked fonts appearing as objects in the image. The fonts/chars had color, depth and even textures associated with them. Now I was wondering, is it possible to do the same in POV?? Thanks,
1
trimmed_train
894
The Greeks did try to invade Cyprus just before the Turkish intervention: They failed. Just for your info.
6
trimmed_train
5,003
Somewhere in this thread, it has been said that Windows NT (tm) is a multi-user OS, as well as multi-threading, etc. I certainly haven't seen this to be the case. There are seperate accounts for each person, and even seperate directories if that is desired. I don't see an implentation of simultaneuos use though. Scott --
18
trimmed_train
11,090
Actually, what I think has become more evident, is that you are determined to flaunt your ignorance at all cost. Jagr did not have a better season than Francis ... to suggest otherwise is an insult to those with a modicum of hockey knowledge. Save your almost maniacal devotion to the almighty plus/minus ... it is the most misleading hockey stat available. Until the NHL publishes a more useful quantifiable statistic including ice time per game and some measure of its "quality" (i.e., is the player put out in key situations like protecting a lead late in the game; is he matched up against the other team's top one or two lines; short-handed, etc), I would much rather see the +/- disappear altogether instead of having its dubious merits trumpeted by those with little understanding of its implications. Brad -- ------------------------------------------------------------------------------ Brad K. Gibson INTERNET: [email protected] Dept. of Geophysics & Astronomy #129-2219 Main Mall PHONE: (604)822-6722 University of British Columbia FAX: (604)822-6047 Vancouver, British Columbia, Canada V6T 1Z4
17
trimmed_train
10,268
From where I come from in Canada, Borshevsky sounds more Canadian than Smith! -) Anyways, crawl back into the hole you crawled out of...the NBA doesn't care where they get basketball players from, major league baseball doesn't give a damn where they get baseball players from (except Cuba, that is). Canada is in no imminent danger of being overtaken as the primary supplier of players...Sweden, Finland, the Czech Republic, and Slovakia are all relatively small countries, and cannot really produce players at a greater rate than they are already producing them, and the potential influx from the former Soviet Union is severely blunted because the system has been raided and is starved for finances and will take a decade or two, to recover and become a real threat, and the US will just maintain its slow increase. Canada should continue to supply 60% plus of the top hockey players in the world for the forseeable future. Besides we need the European hockey market if hockey is to take its rightful place besides soccer as the two predominant world sports...and since soccer is essentially boring, unlike hockey. Canadians are under no threat...the European numbers will soon saturate, if they haven't already...and by the time Russia comes online again, the NHL should be a world league, and there will be many more teams to stock and many more jobs for Canadian hockey players. In the near team, the percentage of Canadians will mostly decline because of Americans, not because of Europeans. Crawl into a hole and die...
17
trimmed_train
4,657
You forget that Apollo was a Government program and had to start relatively from scratch. Some people at NASA think that this could work. One of them replied to me personally after I posted this original message several days ago. I have heard Jerry Pournelle suggest this idea before.
10
trimmed_train
5,586
Archive-name: typing-injury-faq/software Version: 1.8, 7th December 1992 This FAQ is actually maintained by Richard Donkin <[email protected]>. I post it, along with the other FAQ stuff. If you have questions, you want to send mail to Richard, not me. -- Dan Software Tools to help with RSI ------------------------------- This file describes tools, primarily software, to help prevent or manage RSI. This version now includes information on such diverse tools as calendar programs and digital watches... Please let me know if you know any other tools, or if you have information or opinions on these ones, and I will update this FAQ. I am especially interested in getting reviews of these products from people who have evaluated them or are using them. Richard Donkin Internet mail: [email protected] Tel: +44 71 814 5708 (direct) Fax: +44 71 251 2853 Changes in this version: Added information on StressFree, another typing management tool for Windows. TYPING MANAGEMENT TOOLS: these aim to help you manage your keyboard use, by warning you to take a break every so often. The better ones also include advice on exercises, posture and workstation setup. Some use sound hardware to warn of a break, others use beeps or screen messages. Often, RSI appears only after many years of typing, and the pain has a delayed action in the short term too: frequently you can be typing all day with little problem and the pain gets worse in the evening. These tools act as an early warning system: by listening to their warnings and taking breaks with exercises, you don't have to wait for your body to give you a more serious and painful warning - that is, getting RSI. Tool: At Your Service (commercial software) Available from: Bright Star Tel: +1 (206) 451 3697 Platforms: Mac (System 6.0.4), Windows Description: Provides calendar, keyboard watch, email watch, and system info. Warns when to take a break (configurable). Has a few recommendations on posture, and exercises. Sound-oriented, will probably work best with sound card (PC) or with microphone (Mac). Should be possible to record your own messages to warn of break. Tool: AudioPort (sound card and software) Available from: Media Vision Tel: +1 (510) 226 2563 Platforms: PC Description: A sound card to plug into your PC parallel port. Includes 'At Your Service'. Tool: Computer Health Break (commercial software) Available from: Escape Ergonomics, Inc 1111 W. El Camino Real Suite 109 Mailstop 403 Sunnyvale, CA Tel: +1 (408) 730 8410 Platforms: DOS Description: Aimed at preventing RSI, this program warns you to take breaks after a configurable interval, based on clock time, or after a set number of keystrokes -- whichever is earlier. It gives you 3 exercises to do each time, randomly selected from a set of 70. Exercises are apparently tuned to the type of work you do - data entry, word processing, information processing. Exercises are illustrated and include quite a lot of text on how to do the exercise and on what exactly the exercise does. CHB includes hypertext information on RSI that you can use to learn more about RSI and how to prevent it. Other information on non-RSI topics can be plugged into this hypertext viewer. A full glossary of medical terms and jargon is included. CHB can be run in a DOS box under Windows, but does not then warn you when to take a break; it does not therefore appear useful when used with Windows. Cost: $79.95; quantity discounts, site licenses. Comments: The keystroke-counting approach looks good: it seems better to measure the activity that is causing you problems than to measure clock time or even typing time. The marketing stuff is very good and includes some summaries of research papers, as well as lots of arguments you can use to get your company to pay up for RSI management tools. Tool: EyerCise (commercial software) Available from: RAN Enterprises One Woodland Park Dr. Haverhill, MA 01830, US Tel: 800-451-4487 (US only) Platforms: Windows (3.0/3.1), OS/2 PM (1.3/2.0) [Not DOS] Description: Aimed at preventing RSI and eye strain, this program warns you to take breaks after a configurable interval (or at fixed times). Optionally displays descriptions and pictures of exercises - pictures are animated and program beeps you to help you do exercises at the correct rate. Includes 19 stretches and 4 visual training exercises, can configure which are included and how many repetitions you do - breaks last from 3 to 7 minutes. Also includes online help on workplace ergonomics. Quote from their literature: "EyerCise is a Windows program that breaks up your day with periodic sets of stretches and visual training exercises. The stretches work all parts of your body, relieving tension and helping to prevent Repetitive Strain Injury. The visual training exercises will improve your peripheral vision and help to relieve eye strain. Together these help you to become more relaxed and productive." "The package includes the book _Computers & Visual Stress_ by Edward C. Godnig, O.D. and John S. Hacunda, which describes the ergonomic setup for a computer workstation and provides procedures and exercises to promote healthy and efficient computer use. Cost: $69.95 including shipping and handling, quantity discounts for resellers. Free demo ($5 outside US). Comments: I have a copy of this, and it works as advertised: I would say it is better for RSI prevention than RSI management, because it does not allow breaks at periods less than 30 minutes. Also, it interrupts you based on clock time rather than typing time, which is not so helpful unless you use the keyboard all day. Worked OK on Windows 3.0 though it did occasionally crash with a UAE - not sure why. Also refused to work with the space bar on one PC, and has one window without window controls. Very usable though, and does not require any sound hardware. Tool: Lifeguard (commercial software) Available from: Visionary Software P.O. Box 69447 Portland, OR 97201, US Tel: +1 (503) 246-6200 Platforms: Mac, DOS (Windows version underway) Description: Aimed at preventing RSI. Warns you to take a break with dialog box and sound. Includes a list of exercises to do during breaks, and information on configuring your workstation in an ergonomic manner. Price: $59; quantity discounts and site licenses. The DOS product is bought in from another company, apparently; not sure how equivalent this is to the Mac version. The Mac version got a good review in Desktop Publisher Magazine (Feb 1991). Good marketing stuff with useful 2-page summaries of RSI problems and solutions, with references. Tool: StressFree (commercial software, free usable demo) Available from: LifeTime Software P.O. Box 87522 Houston Texas 77287-7522, US Tel: 800-947-2178 (US only) Fax: +1 (713) 474-2067 Mail: [email protected] Demo (working program but reduced functions) available from: Compuserve: Windows Advanced Forum, New Uploads section, or Health and Fitness Forum, Issues At Work section. Anon FTP: ftp.cica.indiana.edu (and mirroring sites) Platforms: Windows (3.0/3.1) (Mac and DOS versions underway) Description: Aimed at preventing RSI, this program warns you to take breaks after a configurable interval (or at fixed times). Displays descriptions and pictures of exercises - pictures are animated and program paces you to help you do exercises at the correct rate. Quite a few exercises, can configure which ones are included to some extent. Online help. Version 2.0 is out soon, Mac and DOS versions will be based on this. Cost: $29.95 if support via CompuServe or Internet, otherwise $39.95. Site license for 3 or more copies is $20.00 each. (NOTE: prices may have gone up for V2.0). Comments: I have had a play with this, and it works OK. Its user interface design is much better in 2.0, though still a bit unusual. expensive tool around and it does the job. It is also the only tool with a redistributable demo, so if you do get the demo, post it on your local bulletin boards, FTP servers and Bitnet servers! Does not include general info on RSI and ergonomics, but it does have the ability to step backward in the exercise sequence, which is good for repeating the most helpful exercises. Tool: Typewatch (freeware), version 3.8 (October 1992) Available from: Email to [email protected] Anonymous ftp: soda.berkeley.edu:pub/typing-injury/typewatch.shar Platforms: UNIX (tested on SCO, SunOS, Mach; character and X Window mode) Description: This is a shell script that runs in the background and warns you to stop typing, based on how long you have been continuously typing. It does not provide exercises, but it does check that you really do take a break, and tells you when you can start typing again. Typewatch now tells you how many minutes you have been typing today, each time it warns you, which is useful so you know how much you *really* type. It also logs information to a file that you can analyse or simply print out. The warning message appears on your screen (in character mode), in a pop-up window (for X Windows), or as a Zephyr message (for those with Athena stuff). Tim Freeman <[email protected]> has put in a lot of bug fixes, extra features and support for X, Zephyr and Mach. Not formally supported, but email [email protected] (for SCO, SunOS, character mode) or [email protected] (for Mach, X Window mode, Zephyr) if you have problems or want to give feedback. Tool: Various calendar / batch queue programs Available from: Various sources Platforms: Various Description: Any calendar/reminder program that warns you of an upcoming appointment can be turned into an ad hoc RSI management tool. Or, any batch queue submission program that lets you submit a program to run at a specific time to display a message to the screen. Using Windows as an example: create a Calendar file, and include this filename in your WIN.INI's 'load=' line so you get it on every startup of Windows. Suppose you want to have breaks every 30 minutes, starting from 9 am. Press F7 (Special Time...) to enter an appointment, enter 9:30, hit Enter, and type some text in saying what the break is for. Then press F5 to set an alarm on this entry, and repeat for the next appointment. By using Windows Recorder, you can record the keystrokes that set up breaks throughout a day in a .REC file. Put this file on your 'run=' line, as above, and you will then, with a single keypress, be able to set up your daily appointments with RSI exercises. The above method should be adaptable to most calendar programs. An example using batch jobs would be to submit a simple job that runs at 9:30 am and warns you to take a break; this will depend a lot on your operating system. While these approaches are not ideal, they are a good way of forcing yourself to take a break if you can't get hold of a suitable RSI management tool. If you are techie enough you might want to write a version of Typewatch (see above) for your operating system, using batch jobs or whatever fits best. Tool: Digital watches with count-down timers Available from: Various sources, e.g. Casio BP-100. Description: Many digital watches have timers that count down from a settable number of minutes; they usually reset easily to that number, either manually or automatically. While these are a very basic tool, they are very useful if you are writing, reading, driving, or doing anything away from a computer which can still cause or aggravate RSI. The great advantage is that they remind you to break from whatever you are doing. Comments: My own experience was that cutting down a lot on my typing led to my writing a lot more, and still reading as much as ever, which actually aggravated the RSI in my right arm though the left arm improved. Getting a count-down timer watch has been very useful on some occasions where I write a lot in a day. I have tried an old fashioned hour-glass type egg timer, but these are not much good because they do not give an audible warning of the end of the time period! KEYBOARD REMAPPING TOOLS: these enable you to change your keyboard mapping so you can type one-handedly or with a different two-handed layout. One-handed typing tools may help, but be VERY careful about how you use them -- if you keep the same overall typing workload you are simply doubling your hand use for the hand that you use for typing, and may therefore make matters worse. Tool: hsh (public domain) Available from: Anonymous ftp: soda.berkeley.edu:pub/typing-injury/hsh.shar Platforms: UNIX (don't know which ones) Description: Allows one-handed typing and other general keyboard remappings. Only works through tty's (so, you can use it with a terminal or an xterm, but not most X programs). Tool: Dvorak keyboard tools (various) Available from: Anonymous ftp: soda.berkeley.edu:pub/typing-injury/xdvorak.c Also built into Windows 3.x. Description: The Dvorak keyboard apparently uses a more rational layout that involves more balanced hand use. It *may* help prevent RSI a bit, but you can also use it if you have RSI, since it will slow down your typing a *lot* :-)
19
trimmed_train
3,490
My speculation does not include or depend upon a trapdoor in RSAREF. I do not believe that RSA would consent to such. However, there are other limitation in the concept of RSAREF in which NSA has an interest. It has an interest in a limited number of implementations, i.e., targets. It has an interest in fixed key or maximum modulus size. It has a legitimate (literally) right to pursue such interests. Within bounds, it probably has a right to pursue those interests by covert means. At least it has the same right as the rest of us not to disclose all of its motives and intentions. (Institutions are not self-aware; they do not know their intentions in any meaningful sense.)
7
trimmed_train
6,927
Is it possible to buy a serial I/O card with the 16550 UART's built in (rather than having to buy them separately, and socketing them in)? My current I/O card uses 8250's (correct number? The braindead ones anyway). It also controls two floppy drives, and two IDE hard drives. Ideally, I'd like to get a new multi I/O card, that had 2 serial ports with 16550's and could also control another 2 IDE HD's. It would have to have configurable addresses for both the serial ports, and the IDE controller, so it could co-exist with my existing card. Does such a beast exist? Now the hard part - where can I get one in Australia, preferably Brisbane?
3
trimmed_train
2,132
I have the following items for sale: Animation Works software for Macintosh by Gold Disk This is a brand new shrink-wrapped copy Microsoft Excel for Windows Ver. 4.0 Opened, but includes everything including Registration card Video7 FastWrite VGA card. 512 video memory. 800x600 resolution. Everex 2400b internal modem. Video card and the modem are used items. If you are interested make a reasonable offer. I wish to ship these UPS COD. Please email me at [email protected]. Thank you.
5
trimmed_train
10,191
I need (probably) to write one or more new Motif widgets on the HP-UX platform. Do I need the Motif private header files and source, or can I make do with the public headers that are provided? "Motif" includes Xt in this context. Yes. You'll find it almost impossible without the source at this point. It does depend on how ambitious you are and how concerned you are about compliance with the general interface and items like traversal. One widget is a multi-column list (which lots of people have already written, I am sure), and would therefore be probably be a subclass of List rather than something simple like an Xt class. Is this more difficult (in principle, not lines of code)? I'm not sure what you're asking. You could create something which is very much like a true multi-column list by placing several lists within a geometry manager, and putting that manager within an automatic scrolled window. This wouldn't be good for very large lists, but you might consider this as an alternative. Alternatively, if anyone has a multi-column list widget they could sell me, this might save me from having to write one! Does it by any chance exist in Motif 1.2 already (I do not yet have the spec)? Motif 1.2 does not have a multi-column list in it. Have you looked at commercial sets? There are also some PD widget sets, one of these might have a multi-column list you could port.
16
trimmed_train
9,442
Hi, I'm in the market for an internal color video adaptor for my PB 145. I was wondering if anyone has used the PowerVision adaptor made by Mirror. If so, can you tell me how feel about the speed and compatability of it? I might also be interested in other boards by Envisio etc., so if you have such a board please e-mail your opinion of it. Thanks in advance.
14
trimmed_train
4,966
I'll contact you offline about this.
1
trimmed_train
4,555
"Bare" = case, a power supply, and a motherboard (with RAM and a coprocessor). Everything else is yours to add as you like. The motherboard: - US-made Micronics 8-slot motherboard with Intel 386dx/25mhz CPU - 64kb SRAM cache - 4mb 80us RAM using 4x1mb simms (worth $120 alone) - Cyrix 83D87 math coprocessor (worth $90 alone) - Norton SI 6.0 rating of 26.1 - Latest version Phoenix BIOS The case/power supply: - Standard desktop case. 230watt power supply with the usual connectors. - Room for five floppy/hard drives (three visible, two internal). *New* Micronics CPUs often command a several-hundred dollar premium over clone motherboards because they are US-made, use high-quality components, and are known to be both very reliable and compatible. They have been OEMed in systems sold by both Gateway and Zeos at various points in the past. (Check out the ads in the back pages of Byte or PC Magazine if you want to see this price differential for yourself.) Price: $450 complete, $100 less if you don't want/need the case and power supply. The board is fully guaranteed. Email for further details or for any questions. Thanks!
5
trimmed_train
962
Has anyone taken a look at the new ViewSonic 17? They claim 1280x1024 at 76Hz. How does it compare with the T560i in terms of price, and quality of display?
3
trimmed_train
1,312
I agree. It was great for the ESPN people to show the Detroit game. (My roommate just about sh*t when they threw the octopus on the ice. (Thanks for explaining the significance of that BTW)) The only problem I had was when they blotted out the local commentators with the baseball ads and music. Especially when the wings player hit the rut and went into the boards injuring his shoulder and they blotted out the injury report. Other then that, hats off to ESPN. Now if they'll only make a habit of this. Yeah right! Baseball seasons started (Zzzzzz.....) =) KOZ
17
trimmed_train
1,437
Really!? Methinks somethings wrong with _your_ bike. Perhaps you meant _pull_? Pushing the right side of my handlebars _will_ send me left. It should. REally. I'm sure others will take up the slack...
12
trimmed_train
472
Hello Hockey fans. Bonjour tout le monde! Well, in Salt Lake City this past Sunday, the local ABC station decided not to televise the hockey games. La directrous de programme est la tete de merde! Anyway, I have a satellite dish, and a few of my friends from hockey have invited themselves over to watch the games this coming Sunday (25 Apr), and I can not find correct game times. For the Calgary at LA game I have times showing everything from 11:00 AM MDT, to 5:00 PM MDT. I am not even sure what games are going to be played this coming Sunday, now that ABC has mucked up the schedule. I think I should be able to pull in three games (11:00 am, 2:00 pm, and 5:30 pm MDT) off the dish, but I am not sure. IF anybody has a schedule, pleas emial it to me. As you can see, I have to telent to get rec.sport.hockey, and it is sometimes difficult to get a link. Thanks in advance Merci d'avance P.S. Anglais ou francais d'accord. Roland Behunin [email protected] [email protected]
17
trimmed_train
8,517
So why don't ypu sue him. ----
6
trimmed_train
7,697
As one who was born in Quebec and worked in Montreal, I feel I must defend the reputation of McGill University. It is a fine, old, creditable institution of higher learning. Thus, I can only assume that some under graduate student left his/her terminal on-line and the janitor has been getting access to it.
6
trimmed_train
4,132
John, While I will not take the time to rebut you point by point, I will suggest three current works which I think will be helpful in your quest to answer this question. John Dominic Crossan (Professor of Religion at De Paul Univ)- _The Cross That Spoke_ Harper and Row Pub. 1988, Also his latest work _The Historical Jesus - The Life of A Mediterranean Jewish Peasant_ Harper and Row Pub. 1991, Also two works of Burton Mack (Professor of New Testament at the Claremont Graduate School) _A Myth of Innocence_ Fortress Press 1988, And his latest book _The Lost Gospel: The Book of Q and Christian Origins_ Harper and Row, 1992. You might start with Mack's book on Q and then examine the others afterward. However I think that once you do that you will see that your "evidence" is not as sturdy as you'd like. Most of the tired arguements you stated, assume eyewitness accounts, such is not the case. But Anyway look at Mack and Crossan and then get back to us.
0
trimmed_train
5,468
Does anyone know the phone number to a place where i can get a VGA passthrough? I want to hook up my VGA card to my XGA card (whcih you can can). All I need is the cable that connects them. It is the same type of cable that you would connect from your VGA card to say a Video Blaster or something.
1
trimmed_train
1,474
Hey, I'm a "Macho Real Man" and I DO read it. So I can criticize it all I want, especially since I pay for the publication. (They accept no outside advertising, don't you know....) Relying on Consumer Reports to pick your automobiles is like letting Field & Stream select your living room furniture.
4
trimmed_train
1,336
Quoting [email protected] in article <[email protected]>:
7
trimmed_train
6,842
There is a multi threaded xlib version written. Do an archie search for mt-xlib: Host export.lcs.mit.edu Location: /contrib DIRECTORY drwxr-xr-x 512 Jul 30 1992 mt-xlib Location: /contrib/mt-xlib-1.1 FILE -rw-r--r-- 106235 Jan 21 14:02 mt-xlib-xhib92.ps.Z FILE -rw-r--r-- 1658123 Jan 21 14:03 mt-xlib.tar.Z Location: /contrib/mt-xlib FILE -rw-r--r-- 106235 Jul 30 1992 mt-xlib-xhib92.ps.Z FILE -rw-r--r-- 1925529 Jul 30 1992 mt-xlib.tar.Z
16
trimmed_train
4,874
Mr. Salah, why are you such a homicidal racist? Do you feel this same hatred towards Christans, or is it only Jews? Are you from a family of racists? Did you learn this racism in your home? Or are you a self-made bigot? How does one become such a racist? I wonder what you think your racism will accomplish. Are you under the impression that your racism will help bring peace in the mid- east? I would like to know your thoughts on this.
6
trimmed_train
2,795
I just had my 41 Chrysler painted. I was told to refrain from waxing it and to leave it out in the sun!! Supposedly this let's the volatiles escape from the paint over a month or so (I can smell it 15 feet away on a hot day) and lets any slight irregularites in the surface flow out, as the paint remains a little soft for a while.
4
trimmed_train
10,638
Actually, this is incorrect. French resistance may have played some part in hindering the German war effort, however the crucial role was supplied on D-Day. Interesting statement. Especially when you consider that Lebanon had claimed to have made progress in the peace talks, as well as Israel. Of course, one of the prime obstacles to Israel's complete withdrawal is the lack of governmental control that can be applied to the area as well as the large presence of Syrian forces which have not been asked to withdraw as well.
6
trimmed_train
4,352
MLB Standings and Scores for Tuesday, April 6th, 1993 (including yesterday's games) NATIONAL WEST Won Lost Pct. GB Last 10 Streak Home Road Atlanta Braves 01 00 1.000 -- 1-0 Won 1 00-00 01-00 Cincinnati Reds 01 00 1.000 -- 1-0 Won 1 01-00 00-00 San Diego Padres 00 00 .000 0.5 0-0 --- 00-00 00-00 San Francisco Giants 00 00 .000 0.5 0-0 --- 00-00 00-00 Colorado Rockies 00 01 .000 1.0 0-1 Lost 1 00-00 00-01 Houston Astros 00 01 .000 1.0 0-1 Lost 1 00-01 00-00 Los Angeles Dodgers 00 01 .000 1.0 0-1 Lost 1 00-00 00-01 NATIONAL EAST Florida Marlins 01 00 1.000 -- 1-0 Won 1 01-00 00-00 New York Mets 01 00 1.000 -- 1-0 Won 1 01-00 00-00 Philadelphia Phillies 01 00 1.000 -- 1-0 Won 1 00-00 01-00 Pittsburgh Pirates 00 00 .000 0.5 0-0 --- 00-00 00-00 St. Louis Cardinals 00 00 .000 0.5 0-0 --- 00-00 00-00 Chicago Cubs 00 01 .000 1.0 0-1 Lost 1 00-01 00-00 Montreal Expos 00 01 .000 1.0 0-1 Lost 1 00-00 00-01 AMERICAN WEST Won Lost Pct. GB Last 10 Streak Home Road Oakland Athletics 01 00 1.000 -- 1-0 Won 1 01-00 00-00 Texas Rangers 01 00 1.000 -- 1-0 Won 1 00-00 01-00 California Angels 00 00 .000 0.5 0-0 --- 00-00 00-00 Chicago White Sox 00 00 .000 0.5 0-0 --- 00-00 00-00 Minnesota Twins 00 00 .000 0.5 0-0 --- 00-00 00-00 Seattle Mariners 00 00 .000 0.5 0-0 --- 00-00 00-00 Kansas City Royals 00 01 .000 1.0 0-1 Lost 1 00-01 00-00 AMERICAN EAST Boston Red Sox 01 00 1.000 -- 1-0 Won 1 00-00 01-00 New York Yankees 01 00 1.000 -- 1-0 Won 1 00-00 01-00 Milwaukee Brewers 00 00 .000 0.5 0-0 --- 00-00 00-00 Toronto Blue Jays 00 00 .000 0.5 0-0 --- 00-00 00-00 Baltimore Orioles 00 01 .000 1.0 0-1 Lost 1 00-01 00-00 Cleveland Indians 00 01 .000 1.0 0-1 Lost 1 00-01 00-00 Detroit Tigers 00 01 .000 1.0 0-1 Lost 1 00-00 00-01 YESTERDAY'S SCORES NATIONAL LEAGUE AMERICAN LEAGUE Montreal 1 New York 9 Cincinnati 2 Cleveland 1 Atlanta 1 Texas 7 Chicago 0 Baltimore 4 Los Angeles 3 Boston 3 Florida 6 Kansas City 1 Philadelphia 3 Detroit 4 Houston 1 Oakland 9 Colorado 0 California IDLE New York 3 Chicago IDLE Pittsburgh IDLE Milwaukee IDLE St. Louis IDLE Minnesota IDLE San Diego IDLE Seattle IDLE San FranciscoIDLE Toronto IDLE -- ------------------------------------------------------------------------------- Joseph Hernandez | RAMS | | /.\ ******* _|_|_ / | LAKERS [email protected] | KINGS | |__ | | DODGERS _|_|_ | | RAIDERS [email protected] | ANGELS |____||_|_| ******* | | |___| CLIPPERS
2
trimmed_train
4,682
Archive-name: net-privacy/part2 Last-modified: 1993/3/3 Version: 2.1 IDENTITY, PRIVACY, and ANONYMITY on the INTERNET ================================================ (c) 1993 L. Detweiler. Not for commercial use except by permission from author, otherwise may be freely copied. Not to be altered. Please credit if quoted. SUMMARY ======= Email and account privacy, anonymity, file encryption, academic computer policies, relevant legislation and references, EFF, and other privacy and rights issues associated with use of the Internet and global networks in general. (Search for <#.#> for exact section. Search for '_' (underline) for next section.) PART 2 ====== (this file) Resources --------- <4.1> What UNIX programs are related to privacy? <4.2> How can I learn about or use cryptography? <4.3> What is the cypherpunks mailing list? <4.4> What are some privacy-related newsgroups? FAQs? <4.5> What is internet Privacy Enhanced Mail (PEM)? <4.6> What are other Request For Comments (RFCs) related to privacy? <4.7> How can I run an anonymous remailer? <4.8> What are references on privacy in email? <4.9> What are some email, Usenet, and internet use policies? <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? Miscellaneous ------------- <5.1> What is ``digital cash''? <5.2> What is a ``hacker'' or ``cracker''? <5.3> What is a ``cypherpunk''? <5.4> What is `steganography' and anonymous pools? <5.5> What is `security through obscurity'? <5.6> What are `identity daemons'? <5.7> What standards are needed to guard electronic privacy? Issues ------ <6.1> What is the Electronic Frontier Foundation (EFF)? <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? <6.3> What was `Operation Sun Devil' and the Steve Jackson Game case? <6.4> What is Integrated Services Digital Network (ISDN)? <6.5> What is the National Research and Education Network (NREN)? <6.6> What is the FBI's proposed Digital Telephony Act? <6.7> What other U.S. legislation is related to privacy on networks? <6.8> What are references on rights in cyberspace? <6.9> What is the Computers and Academic Freedom (CAF) archive? Footnotes --------- <7.1> What is the background behind the Internet? <7.2> How is Internet `anarchy' like the English language? <7.3> Most Wanted list <7.4> Change history * * * RESOURCES ========= _____ <4.1> What UNIX programs are related to privacy? For more information, type `man [cmd]' or `apropos [keyword]' at the UNIX shell prompt. passwd - change password finger - obtain information about a remote user chfn - change information about yourself obtainable by remote users (sometimes `passwd -f') chmod - change the rights associated with a file or directory umask - (shell) change the default (on creation) file access rights ls - list the rights associated with files and directories xhost - allow or disable access control of particular users to an Xwindow server last - list the latest user logins on the system and their originations who - list other users, login/idle times, originations w - list other users and what they are running xhost - access control list for X Window client use xauth - control X Window server authentication .signature - file in the home directory appended to USENET posts .forward - file used to forward email to other accounts .Xauthority - file used for X Window server authentication keys $SIGNATURE - variable used for name in email and USENET postings The 'tcpdump' packet-tracing program is loosely based on SMI's "etherfind" although none of the etherfind code remains. It was originally written by Van Jacobson, Lawrence Berkeley Laboratory, as part of an ongoing research project to investigate and improve tcp and internet gateway performance. A current version is available via anonymous ftp from host ftp.ee.lbl.gov (currently at address 128.3.254.68) file tcpdump.tar.Z (a compressed Unix tar file). This program is subject to the 'standard' Berkeley network software copyright. _____ <4.2> How can I learn about or use cryptography? A general introduction to mostly theoretical cryptographic issues, especially those frequently discussed in sci.crypt, is available in FAQ form: > Compiled by: > [email protected] (Carl Ellison) > [email protected] (Doug Gwyn) > [email protected] (Steven Bellovin) NIST (U.S. National Institute for Standards and Technology) publishes an introductory paper on cryptography, special publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal (April 1991). Available via anonymous FTP from csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt. Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z in the crypto directory. Covers technical mathematical aspects of encryption such as number theory. More general information can be found in a FAQ by Paul Fahn of RSA Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See the `readme' file for information on the `tex' version. Also available as hardcopy for $20 from RSA Laboratories, 100 Marine Parkway, Redwood City, CA 94065. Send questions to [email protected]. Phil Zimmerman's PGP (Pretty Good Privacy) public-domain package for public key encryption is available at numerous sites, and is in widespread use over the internet for general UNIX-based file encryption (including email). Consult the archie FTP database. Also see the newsgroup alt.security.pgp. Mailing list requests to [email protected]. From the RIPEM FAQ by Marc VanHeyningen <[email protected]> on news.answers: > RIPEM is a program which performs Privacy Enhanced Mail (PEM) > using the cryptographic techniques of RSA and DES. It allows > your electronic mail to have the properties of authentication > (i.e. who sent it can be confirmed) and privacy (i.e. nobody can > read it except the intended recipient.) > > RIPEM was written primarily by Mark Riordan > <[email protected]>. Most of the code is in the public domain, > except for the RSA routines, which are a library called RSAREF > licensed from RSA Data Security Inc. > > RIPEM is available via anonymous FTP to citizens and permanent > residents in the U.S. from rsa.com; cd to rsaref/ and read the > README file for info. > > RIPEM, as well as some other crypt stuff, has its `home site' on > rpub.cl.msu.edu, which is open to non-anonymous FTP for users in > the U.S. and Canada who are citizens or permanent residents. To > find out how to obtain access, ftp there, cd to pub/crypt/, and > read the file GETTING_ACCESS. Note: cryptography is generally not well integrated into email yet and some system proficiency is required by users to utilize it. _____ <4.3> What is the cypherpunks mailing list? Eric Hughes <[email protected]> runs the `cypherpunk' mailing list dedicated to ``discussion about technological defenses for privacy in the digital domain.'' Send email to [email protected] to be added or subtracted from the list. From the charter: > The most important means to the defense of privacy is encryption. > To encrypt is to indicate the desire for privacy. But to encrypt > with weak cryptography is to indicate not too much desire for > privacy. Cypherpunks hope that all people desiring privacy will > learn how best to defend it. _____ <4.4> What are some privacy-related newsgroups? FAQs? Newsgroups ========== alt.comp.acad-freedom.news alt.comp.acad-freedom.talk -------------------------- Moderated and unmoderated issues related to academic freedom and privacy at universities. Documented examples of violated privacy in e.g. email. Documented examples of `censorship' as in e.g. limiting USENET groups local availability. alt.cyberpunks -------------- Virtual reality, (science) fiction by William Gibson and Bruce Sterling, cyberpunk in the mainstream. alt.hackers ----------- USENET Network News Transfer Protocol (NNTP) posting mechanisms, Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports. alt.privacy ----------- General privacy issues involving taxpaying, licensing, social security numbers, etc. alt.security comp.security.misc ------------------ Computer related security issues. FAQ in news.answers below. alt.security.pgp alt.security.ripem ---------------- Dedicated to discussing public domain cryptographic software packages: PGP, or ``Pretty Good Privacy'' Software developed by Phil Zimmerman for public key encryption, and RIPEM by Mark Riordan for public key and DES encryption. comp.society.privacy -------------------- Privacy issues associated with computer technologies. Examples: caller identification, social security numbers, credit applications, mailing lists, etc. Moderated. comp.eff.news comp.eff.talk ------------- Moderated and unmoderated groups associated with the Electronic Frontier Foundation started by Mitch Kapor for protecting civil and constitutional rights in the electronic realm. news.admin news.admin.policy ----------------- Concerns of news administrators. NNTP standards and mechanisms. news.lists ---------- USENET traffic distributions. Most frequent posters, most voluminous groups, most active sites, etc. sci.crypt --------- Considers scientific and social issues of cryptography. Examples: legitimate use of PGP, public-key patents, DES, cryptographic security, cypher breaking, etc. FAQs ==== FAQs or ``Frequently-Asked Questions'' are available in the newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu [18.172.1.27] (also rtfm.mit.edu) from the directory /pub/usenet/news.answers/[x] where [x] is the archive name. This FAQ is archived in the file `net-privacy'. Others are: network-info/part1 ------------------ Sources of information about the Internet and how to connect to it, through the NSF or commercial vendors. alt-security-faq ---------------- Computer related security issues arising in alt.security and comp.security.misc, mostly UNIX related. ssn-privacy ----------- Privacy issues associated with the use of the U.S. Social Security number (SSN). pdial ----- Public dialup internet accounts list. college-email/part1 ------------------- How to find email addresses for undergraduate and graduate students, faculty and staff at various colleges and universities. ripem/faq --------- Information on RIPEM, a program for public key mail encryption officially sanctioned by Public Key Partners Inc., the company that owns patents on public key cryptography. unix-faq/faq/part1 ------------------ Frequently-asked questions about UNIX, including information on `finger' and terminal spying. distributions/* --------------- Known geographic, university, and network distributions. _____ <4.5> What is internet Privacy Enhanced Mail (PEM)? Internet drafts on Privacy Enhanced Mail (PEM) describe a standard under revision for six years delineating the official protocols for email encryption. The standard has only recently stabilized and implementations are being developed. - RFC-1421: ``Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures.'' J. Linn <[email protected]> - RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management'' S. Kent <[email protected]> - RFC-1424: ``Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services'' B. Kaliski <[email protected]> - RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers'' D. Balenson <[email protected]> Send email to [email protected] for more information. See ``RFCs related to privacy'' for information on how to obtain RFCs. _____ <4.6> What are other Requests For Comments (RFCs) related to privacy? RFC-822: SMTP, Simple Mail Transfer Protocol RFC-977: NNTP, Network News Transfer Protocol RFC-1036: Standard for interchange of network news messages RFC-1208: Glossary of Networking Terms RFC-1207: Answers to ``experienced Internet user'' questions RFC-1206: Answers to ``new Internet user'' questions RFC-1355: Privacy issues in Network Information center databases RFC-1177 is ``FYI: Answers to commonly asked ``new internet user'' questions, and includes: basic terminology on the Internet (TCP/IP, SMTP, FTP), internet organizations such as IAB (Internet Activities Board) and IETF (Internet Enbgineering Task Force), and a glossary of terms. Also from ftp.eff.org: /pub/internet-info/internet.q. > RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname > RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the > number of the RFC). Login with FTP, username `anonymous' and > password `guest'. The NIC also provides an automatic mail > service for those sites which cannot use FTP. Address the > request to [email protected] and in the subject field of the > message indicate the RFC number, as in `Subject: RFC nnnn' (or > `Subject: RFC nnnn.PS' for PostScript RFCs). > > RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP, > login with username `anonymous' and password `guest'; then > connect to the RFC directory (`cd RFC'). The file name is of the > form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the > RFC). The NIS also provides an automatic mail service for those > sites which cannot use FTP. Address the request to > [email protected] and leave the subject field of the message > blank. The first line of the text of the message must be `SEND > RFCnnnn.TXT-1', where nnnn is replaced by the RFC number. _____ <4.7> How can I run an anonymous remailer? Cypherpunk remailer source is at soda.berkeley.edu in the /pub/cypherpunks directory. It's written in PERL, and is relatively easy to install (no administrative rights are required). Karl Barrus <[email protected]> has more information and modifications. Also, most remailer operators mentioned above are amenable to discussing features, problems, and helping new sites become operational. Address all points in the section ``responsibities of anonymous use'' in this document prior to advertising your service. You should be committed to the long-term stability of the site and avoid running one surreptitiously. _____ <4.8> What are references on privacy in email? Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.'' Network World (Oct 29, 1990), 7.44: 2. Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic Business (June 11, 1990) 16 (11): 92. ``Electronic Envelopes - the uncertainty of keeping e-mail private'' Scientific American, February 1993. ftp.eff.org =========== /pub/eff/papers/email_privacy --- Article on the rights of email privacy. by Ruel T. Hernandez. /pub/academic/law/privacy.email --- ``Computer Electronic Mail and Privacy'', an edited version of a law school seminar paper by Ruel T. Hernadez. /pub/eff/papers/email-privacy-biblio-2 --- Compilation of bibliography on E-Mail and its privacy issues (part 2 of the work). Compiled by Stacy B. Veeder (12/91). /pub/eff/papers/email-privacy-research --- The author at Digital Research tried to formalize their employee privacy policy on E-Mail. The casesightings are divided into two groups: US Constitutional law, and California law. /pub/eff/papers/company-email --- Formulating a Company Policy on Access to and Disclosure of Electronic Mail on Company Computer Systems by David R. Johnson and John Podesta for the Electronic Mail Assocation /pub/cud/alcor --- Information on Alcor Co., an e-mail privacy suit. /pub/academic/law/privacy.email --- Email privacy search at Berkeley. _____ <4.9> What are some email, Usenet, and internet use policies? The Computer Policy and Critiques Archive is a collection of the computer policies of many schools and networks, run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. The collection also includes critiques of some of the policies. > If you have gopher, the archive is browsable with the command: > gopher -p academic/policies gopher.eff.org > > The archive is also accessible via anonymous ftp and email. Ftp > to ftp.eff.org (192.88.144.4). It is in directory > `pub/academic/policies'. For email access, send email to > [email protected]. Include the line: > > send acad-freedom/policies <filenames> > > where <filenames> is a list of the files that you want. File > README is a detailed description of the items in the directory. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield ([email protected]). Directory `widener' > contains additional policies (but not critiques). ftp.eff.org =========== /pub/cud/networks --- Acceptable Use Policies for various networks, including CompuServe (file `compuserve'), NSFNET (file `nsfnet') with information on research and commercial uses. See /pub/cud/networks/index. /pub/cud/networks/email --- Policies from various sysadmins about how they handle the issue of email privacy, control, and abuse, compiled by T. Hooper <[email protected]>. /pub/cud/schools/ --- Computer use policies of a number of schools. See schools/Index for a full list and description. Commentary ========== /pub/academic/faq/policy.best --- Opinions on the best academic computer policies. /pub/academic/faq/email.policies --- Do any universities treat email and computer files as private? /pub/academic/faq/netnews.writing --- Policies on what users write on Usenet. /pub/academic/faq/netnews.reading --- Policies on what users read on Usenet: should my university remove (or restrict) Netnews newsgroups because some people find them offensive? /pub/academic/faq/policy --- What guidance is there for creating or evaluating a university's academic computer policy? ______ <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? > CROSSLINK is an anonymous message system run on MIT Student > Cable TV-36. It provides an anonymous medium through which MIT > students can say those things they might otherwise find > difficult, inconvenient or impossible to say in person. It's > also a way to send fun or totally random messages to your > friends over the air. It is similar to the anonymous message > pages found in many college newspapers, except that it's > electronic in nature and it's free. Messages can be posted to the service via email. For more information send email to [email protected]. MISCELLANEOUS ============= _____ <5.1> What is ``digital cash''? With digital encryption and authentication technologies, the possibility of a widespread digital cash system may someday be realized. A system utilizing codes sent between users and banks (similar to today's checking system except entirely digital) may be one approach. The issues of cryptography, privacy, and anonymity are closely associated with transfer of cash in an economy. See the article in Scientific American by David Chaum (~Dec.1992). An experimental digital bank is run by Karl Barrus <[email protected]> based on suggestions by Hal Finney on the cypherpunks mailing list. To use the server send mail to [email protected] message with the following text: :: command: help user@host where `user@host' is your email address. _____ <5.2> What is a ``hacker'' or ``cracker''? These terms arouse strong feelings by many on their meaning, especially on the internet. In the general news media in the past a person who uses computers and networks to malicious ends (such as breaking into systems) has been referred to as a hacker, but most internet users prefer the term ``cracker'' for this. Instead, a ``hacker'' is perceived as a benign but intensely ambitious, curious, and driven computer user who explores obscure areas of a system, for example---something of a proud electronic pioneer and patriot. This is the sense intended in this document. See also the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'. _____ <5.3> What is a ``cypherpunk''? From the charter of the cypherpunk mailing list: > Cypherpunks assume privacy is a good thing and wish there were > more of it. Cypherpunks acknowledge that those who want privacy > must create it for themselves and not expect governments, > corporations, or other large, faceless organizations to grant > them privacy out of beneficence. Cypherpunks know that people > have been creating their own privacy for centuries with whispers, > envelopes, closed doors, and couriers. Cypherpunks do not seek > to prevent other people from speaking about their experiences or > their opinions. See information on the cypherpunk mailing list below. See also the CryptoAnarchist Manifesto and the Cryptography Glossary in soda.berkeley.edu:/pub/cypherpunks. _____ <5.4> What is `steganography' and anonymous pools? Closely associated with encryption is `steganography' or the techniques for not only pursuing private (encrypted) communication but concealing the very existence of the communication itself. Many new possibilities in this area are introduced with the proliferation of computer technology. For example, it is possible to encode messages in the least-significant bits of images, typically the most 'noisy'. In addition, when such an item is posted in a public place (such as a newsgroup), virtually untraceable communication can take place between sender and receiver. For steganographic communications in the electronic realm one another possibility is setting up a mailing list where individual messages get broadcast to the entire list and individual users decode particular messages with their unique key. An anonymous pool has been set up by Miron Cuperman ([email protected]) for experiments. Send email to <[email protected]> with one of the following commands in the subject line: subscribe unsubscribe help _____ <5.5> What is `security through obscurity'? `Security through obscurity' refers to the attempt to gain protection from system weaknesses by hiding sensitive information or programs relating to them. For example, a company may not make public information on its software's encryption techniques to evade `attacks' based on knowledge of it. Another example would be concealing data on the existence of security holes or bugs in operating systems. Or, some reliance may be made on the fact that some standard or mechanism with potential problems is serious because they are ``not widely known'' or ``not widely used.'' This argument is occasionally applied to mechanisms for email and Usenet posting `forgery'. `Security through obscurity' is regarded as a very feeble technique at best and inappropriate and ineffective at worst (also called the ``head-in-the-sand approach''). See the FAQ for alt.security. Some remarks of John Perry Barlow, cofounder of the Electronic Frontier Foundation, directed to NSA agents at the First International Symposium on National Security & National Competitiveness held in McLean, Virginia Dec. 1, 1992: > Digitized information is very hard to stamp classified or keep > contained. ... This stuff is incredibly leaky and volatile. It's > almost a life form in its ability to self-propagate. If > something hits the Net and it's something which people on there > find interesting it will spread like a virus of the mind. I > believe you must simply accept the idea that we are moving into > an environment where any information which is at all interesting > to people is going to get out. And there will be very little > that you can do about it. This is not a bad thing in my view, > but you may differ... _____ <5.6> What are `identity daemons'? RFC-931 describes a protocol standard that allows UNIX programs to query a remote user's login name after connection to a local communication socket (a connection of this type is established during FTP and TELNET sessions, for example). The standard is not widely supported, perhaps 10% of internet sites currently implement it but the number is increasing. The mechanism is detrimental to anonymity. Regular users cannot disable it but system adminstrators can circumvent it. This standard may represent a trend toward greater authentication mechanisms. _____ <5.7> What new standards are needed to guard electronic privacy? Remailing/Posting ----------------- - Stable, secure, protected, officially sanctioned and permitted, publicly and privately operated anonymous servers and hubs. - Official standards for encryption and anonymity in mail and USENET postings. - Truly anonymous protocols with source and destination information obscured or absent and hidden routing mechanisms (chaining, encrypted addresses, etc.) - Standards for anonymous email addressing, embedding files, and remailer site chaining. General ------- - Recognition of anonymity, cryptography, and related privacy shields as legitimate, useful, desirable, and crucial by the general public and their governments. - Widespread use and implementation of these technologies by systems designers into hardware, software, and standards, implemented `securely,' `seamlessly,' and `transparently'. - General shift of use, dependence, and reliance to means other than wiretapping and electronic surveillance by law enforcement agencies. - Publicity, retraction, and dissolution of laws and government agencies opposed to privacy, replaced by structures dedicated to strengthening and protecting it. ISSUES ====== _____ <6.1> What is the Electronic Frontier Foundation (EFF)? From ftp.eff.org:/pub/EFF/mission_statement: > A new world is arising in the vast web of digital, electronic > media which connect us. Computer-based communication media like > electronic mail and computer conferencing are becoming the basis > of new forms of community. These communities without a single, > fixed geographical location comprise the first settlements on an > electronic frontier. > > While well-established legal principles and cultural norms give > structure and coherence to uses of conventional media like > newspapers, books, and telephones, the new digital media do not > so easily fit into existing frameworks. Conflicts come about as > the law struggles to define its application in a context where > fundamental notions of speech, property, and place take > profoundly new forms. People sense both the promise and the > threat inherent in new computer and communications technologies, > even as they struggle to master or simply cope with them in the > workplace and the home. > > The Electronic Frontier Foundation has been established to help > civilize the electronic frontier; to make it truly useful and > beneficial not just to a technical elite, but to everyone; and to > do this in a way which is in keeping with our society's highest > traditions of the free and open flow of information and > communication. EFF was started by the multimillionaire Mitchell Kapor, founder of Lotus software, and John Barlow, lyricist for the Grateful Dead rock band. A highly publicized endeavor of the organization involved the legal defense of Steve Jackson Games after an FBI raid and an accompanying civil suit (see section on ``Steve Jackson Games''). The foundation publishes EFF News (EFFector Online) electronically, send requests to [email protected]. In a letter to Mitchell Kapor from the Chairman of the Subcommittee with primary jurisdiction over telecommunications policy dated November 5, 1991, Representative Edward J. Markey complemented Mitchell Kapor on his ``insights on the development of a national public information infrastructure'' which ``were appreciated greatly by myself and the Members of the Subcommittee'' (complete text in ftp.eff.com:/pub/pub-infra/1991-12): > ...we need to pursue policies that encourage the Bell companies to > work with other sectors of the communications industry to create > a consumer-oriented, public information network. Please let me or > my staff know what policies you and others in the computer > industry believe would best serve the public interest in creating > a reasonably priced, widely available network in which > competition is open and innovation rewarded. I also want to > learn what lessons from the computer industry over the past ten > to fifteen years should apply to the current debate on > structuring the information and communications networks of the > future....I ask your help in gaining input from the computer > industry so that the Subcommittee can shape policies that will > bring this spirit of innovation and entrepreneurship to the > information services industry. ftp.eff.org =========== /pub/eff/about-eff --- A file of basic information about EFF including goals, mission, achievements, and current projects. Contains a membership form. /pub/eff/mission-statement --- EFF mission statement. /pub/eff/historical/founding-announcement --- EFF founding press release. /pub/eff/historical/eff-history --- John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July 10, 1990). How EFF was conceived and founded, major legal cases, and the organizational directions. /pub/eff/historical/legal-case-summary --- EFF legal case summary. _____ <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? The Computer Professionals for Social Responsibility have been working to protect and promote electronic civil liberties issues since ~1982. The group has three offices (Palo Alto, Cambridge, Washington, DC) and 20 chapters. It is involved in litigation against the FBI, The NSA, NIST, the Secret Service and other other U.S. government agencies to declassify and provide documentation on issues such as Operation Sundevil, the FBI wiretap proposal, NSA's interference in crypography, the breakup of the 2600 raid in Arlington, Va in Nov 1992. Members speak frequently in front on Congress, state legislators and public utility commissions to testify on privacy, information policy, computer security, and caller identification. CPSR has created an extensive Internet Privacy library available via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising the largest collection of privacy documents on the internet. For more information, anonymous FTP cpsr.org:/cpsr/. (Thanks to Dave Banisar <[email protected]> for contributions here.) _____ <6.3> What was `Operation Sundevil' and the Steve Jackson Game case? In the early 1990's a fear spread among U.S. law enforcement agencies on the illicit activities of `hackers' and `phreakers' involved in such activities as credit card fraud and long-distance call thievery. (see ftp.eff.org:/pub/SJG/General_Information/EFFector1.04): > `Operation Sundevil,' the Phoenix-inspired crackdown of May > 8,1990, concentrated on telephone code-fraud and credit-card > abuse, and followed this seizure plan with some success. > [Bulletin Board Systems] went down all over America, terrifying > the underground and swiftly depriving them of at least some of > their criminal instruments. It also saddled analysts with some > 24,000 floppy disks, and confronted harried Justice Department > prosecutors with the daunting challenge of a gigantic nationwide > hacker show-trial involving highly technical issues in dozens of > jurisdictions. Massive `show-trials' never materialized, although isolated instances of prosecution were pursued. The movement reached a crescendo in Texas with the highly publicized case of illegal search and seizure involving the Steve Jackson Games company of Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST by Bruce Sterling <[email protected]> in Fantasy and Science Fiction Magazine: > In an early morning raid with an unlawful and unconstitutional > warrant, agents of the Secret Service conducted a search of the > SJG office. When they left they took a manuscript being prepared > for publication, private electronic mail, and several computers, > including the hardware and software of the SJG Computer Bulletin > Board System. Yet Jackson and his business were not only > innocent of any crime, but never suspects in the first place. > The raid had been staged on the unfounded suspicion that > somewhere in Jackson's office there `might be' a document > compromising the security of the 911 telephone system. FBI agents involved in the seizure were named in a civil suit filed on behalf of Steve Jackson Games by The Electronic Frontier Foundation. See information on EFF below. From an article by Joe Abernathy in the Houston Chronicle ~Feb 1, 1993: > AUSTIN -- An electronic civil rights case against the Secret > Service closed Thursday with a clear statement by federal > District Judge Sam Sparks that the Service failed to conduct a > proper investigation in a notorious computer crime crackdown, > and went too far in retaining custody of seized equipment. > > Secret Service Special Agent Timothy Foley of Chicago, who was in > charge of three Austin computer search-and-seizures on March 1, > 1990, that led to the lawsuit, stoically endured Spark's rebuke > over the Service's poor investigation and abusive computer > seizure policies. While the Service has seized dozens of > computers since the crackdown began in 1990, this is the first > case to challenge the practice. > > Sparks grew visibly angry when it was established that the Austin > science fiction magazine and game book publisher was never > suspected of a crime, and that agents did not do even marginal > research to establish a criminal connection between the firm and > the suspected illegal activities of an employee, or to determine > that the company was a publisher. Indeed, agents testified that > they were not even trained in the Privacy Protection Act at the > special Secret Service school on computer crime. > > "How long would it have taken you, Mr. Foley, to find out what > Steve Jackson Games did, what it was?" asked Sparks. "An hour? > > "Was there any reason why, on March 2, you could not return to > Steve Jackson Games a copy, in floppy disk form, of everything > taken? > > "Did you read the article in Business Week magazine where it had > a picture of Steve Jackson -- a law-abiding, tax-paying citizen > -- saying he was a computer crime suspect? > > "Did it ever occur to you, Mr. Foley, that seizing this material > could harm Steve Jackson economically?" > > Foley replied, "No, sir," but the judge offered his own answer. > > "You actually did, you just had no idea anybody would actually go > out and hire a lawyer and sue you." > > More than $200,000 has been spent by the Electronic Frontier > Foundation in bringing the case to trial. The EFF was founded by > Mitchell Kapor amid a civil liberties movement sparked in large > part by the Secret Service computer crime crackdown. ftp.eff.org =========== /pub/cud/papers/sundevil --- A collection of information on Operation SunDevil by the Epic nonprofit publishing project. Everything you wanted to know but could never find. /pub/cud/papers/sj-resp --- Steve Jackson's response to the charges against him. _____ <6.4> What is Integrated Services Digital Network (ISDN)? ISDN is a high-speed data communications standard that utilizes existing copper telephone lines, and is a possible inexpensive and intermediate alternative to laying fiber optic cable for phone networks. The speeds involved may be sufficient for audio and video transmission applications. G. V. der Leun in the file ftp.eff.org: /pub/pub-infra/1991-11: > Telecommunications in the United States is at a crossroads. With > the Regional Bell Operating Companies now free to provide > content, the shape of the information networking is about to be > irrevocably altered. But will that network be the open, > accessible, affordable network that the American public needs? > You can help decide this question. > > The Electronic Frontier Foundation recently presented a plan to > Congress calling for the immediate deployment of a national > network based on existing ISDN technology, accessible to anyone > with a telephone connection, and priced like local voice service. > We believe deployment of such a platform will spur the > development of innovative new information services, and maximize > freedom, competitiveness, and civil liberties throughout the > nation. > > The EFF is testifying before Congress and the FCC; making > presentations to public utility commisions from Massachusetts to > California; and meeting with representatives from telephone > companies, publishers, consumer advocates, and other stakeholders > in the telecommunications policy debate. > > The EFF believes that participants on the Internet, as pioneers on > the electronic frontier, need to have their voices heard at this > critical moment. To automatically receive a description of the platform and details, send mail to [email protected], with the following line: send documents open-platform-overview or send mail to [email protected]. See also the Introduction to the EFF Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02. References ========== ``Digital Data On Demand.'' MacWorld, 2/82 (page 224). --- 56Kbps vs. ISDN services and products. See comments by J. Powers in ftp.eff.org:pub/pub-infra/1992-02. ``Telephone Service That Rings of the Future.'' By Joshua Quittner. Newsday, Tue, Jan 7 1992. --- Implications of ISDN for the masses, written in popular science style. John Perry Barlow (cofounder EFF). Regional telephone companies (Ohio Bell). ISDN as ``Technological Rorschach Test.'' Anecdotes about McDonald's, Barbara Bush teleconferencing. See complete text in ftp.eff.org:/pub/pub-infra/1992-01. ftp.eff.org:/pub/pub-infra/ --- Files 1991-11 through 1992-05 containing email from the EFF public infrastructure group organized by month. Opinions and facts on the pros and cons of ISDN, Integrated Services Digital Network. Uses of ISDN (phone video, audio, etc.) Japanese model. Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical specifications of ISDN, implementation details, cost issues, political obstacles, (RBOC, Regional Bell Operating Companies or `Baby Bells', e.g. NET, New England Telephone). Influencing development of future networks (e.g. ISDN and NREN, National Research and Education Network), encouraging competition (cable TV systems). Press releases and news articles. Letter from Rep. E. J. Markey to M. Kapor. _____ <6.5> What is the National Research and Education Network (NREN)? The Nation Research and Education Network was introduced in legislation cosponsored by Sen. A. Gore to promote high-speed data network infrastructure augmenting the internet with up to 50 times faster transmission rates. The bill passed the House on November 20, 1991, the Senate on November 22, 1991, and was signed by the President on December 9, 1991. ftp.eff.org =========== /pub/EFF/legislation/nren-bill-text --- The complete text of the House-Senate compromise version of S. 272, the High-Performance Computing Act. /pub/internet-info/gore.bill --- 102nd congress 1st Session. Text of high performance computing bill cosponsored by Sen. A. Gore. /pub/EFF/legislation/gore-infrastructure-bill --- The text of S.2937, the Information Infrastructure and Technology Act of 1992 introduced by Senator Gore to expand Federal efforts to develop technologies for applications of high-performance computing and high-speed networking, and to provide for a coordinated Federal program to accelerate development and deployment of an advanced information infrastructure. U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK By John Markoff, N.Y. Times (~18 Dec 91). --- President Bush's legislation for natiowide computer data `superhighway.' IBM-MCI venture as monopoly destructive to fair competition and innovation? National Science Foundation NSFnet. complete text in /pub/pub-infra/1991-12. Commentary ========== /pub/academic/statements/nren.privacy.cpsr --- ``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc Rotenberg, Washington Director Computer Professionals for Social Responsibility (CPSR). /pub/internet-info/cisler.nren --- The National Research and Education Network: Two meetings Steve Cisler, Senior Scientist Apple Computer Library December 17, 1990 Summary of meetings exploring educational issues of NREN by diverse members of academia and industry. /pub/internet-info/privatized.nren --- Feb. 14 1991 essay by M. Kapor advocating advantages of a private National Public Network, and specific recommendations for open NREN policies encouraging competition. /pub/eff/papers/netproposition --- An FYI about the proposed NREN setup. _____ <6.6> What is the FBI's proposed Digital Telephony Act? ``Providers of electronic communication services and private branch exchange operators shall provide within the United States capability and capacity for the government to intercept wire and electronic communications when authorized by law...'' From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22: > In a move that worried privacy experts, software manufacturers and > telephone companies, the FBI proposed legislation to amend the > Communications Act of 1934 to make it easier for the Bureau to > perform electronic wiretapping. The proposed legislation, > entitled 'Digital Telephony,' would have required communications > service providers and hardware manufacturers to make their > systems 'tappable' by providing 'back doors' through which law > enforcement officers could intercept communications. Furthermore, > this capability would have been provided undetectably, while the > communications was in progress, exclusive of any communications > between other parties, regardless of the mobility of the target > of the FBI's investigation, and without degradation of service. > > ...under the proposal, the Department of Justice (DOJ) can keep > communications products off the market if it determines that > these products do not meet the DOJ's own ... guidelines. This > [could] result in increased costs and reduced competitiveness for > service providers and equipment manufacturers, since they will be > unlikely to add any features that may result in a DOJ rejection > of their entire product. ...the FBI proposal suggests that the > cost of this wiretapping 'service' to the Bureau would have to be > borne by the service provider itself... > > The Electronic Frontier Foundation organized a broad coalition of > public interest and industry groups, from Computer Professionals > for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun > Microsystems, to oppose the legislation. A white paper produced > by the EFF and ratified by the coalition, entitled, `An Analysis > of the FBI Digital Telephony Proposal,' was widely distributed > throughout the Congress. ... The Justice Department lobbied hard > in the final days to get Congress to take up the bill before > Congress adjourned, but the bill never ... found a Congressional > sponsor (and was therefore never officially introduced). The FBI > [may] reintroduce "Digital Telephony" when the 103rd Congress > convenes in January. ftp.eff.org =========== /pub/eff/legislation/fbi-wiretap-bill /pub/EFF/legislation/new-fbi-wiretap-bill --- A bill to ensure the continuing access of law enforcement to the content of wire and electronic communications when authorized by law and for other purposes. Version 2 of the bill after FBI changes in response to public response. /pub/cud/law/hr3515 --- House of Rep bill 3515, Telecommunications Law. Commentary ========== /pub/eff/papers/eff-fbi-analysis --- The EFF-sponsored analysis of the FBI's Digital Telephony proposal. /pub/eff/papers/ecpa.layman --- The Electronic Communications Privacy Act of 1986: A Layman's View. /pub/eff/papers/nightline-wire --- Transcript of ABC's Nightline of May 22, 1992, on the FBI, Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc Rotenberg of the CPSR and William Sessions, Director of the FBI. /pub/eff/papers/edwards_letter --- A letter from the Director of the Secret Service to US Rep. Don Edwards, D-California, in response to questions raised by Edwards' Subcommittee. This copy came from Computer Professionals for Social Responsibility in Washington, D.C. /pub/eff/papers/fbi.systems --- A description of how information is stored on the FBI's computer systems. _____ <6.7> What other U.S. legislation is related to privacy? ftp.eff.org =========== /pub/cud/law/<state> --- State computer crime laws: AL, AK, AZ, CA, CO, CT, DE, FL, GA, HI, IA, ID, IL, IN, MD, MN, NC, NJ, NM, NY, OR, TX, VT, VA, WA, WI, WV. /pub/cud/law/<country> --- Current computer crime laws for: The United States (federal code), Canada, Ghana, and Great Britain. /pub/cud/law/bill.s.618 --- Senate bill 618, addressing registration of encryption keys with the government. /pub/cud/law/improve --- Improvement of Information Access bill. /pub/cud/law/monitoring --- Senate bill 516; concerning abuses of electronic monitoring in the workplace. /pub/cud/law/us.e-privacy --- Title 18, relating to computer crime & email privacy. /pub/academic/law/privacy.electronic.bill --- The text of Simon's electronic privacy bill, S. 516. ``To prevent potential abuses of electronic monitoring in the workplace.'' _____ <6.8> What are references on rights in cyberspace? ftp.eff.org =========== /pub/cud/papers/const.in.cyberspace --- Laurence Tribe's keynote address at the first Conference on Computers, Freedom, & Privacy. `The Constitution in Cyberspace' /pub/cud/papers/denning --- Paper presented to 13th Nat'l Comp Security Conf ``Concerning Hackers Who Break into Computer Systems'' by Dorothy E Denning. /pub/cud/papers/privacy --- ``Computer Privacy vs First and Fourth Amendment Rights'' by Michael S. Borella /pub/cud/papers/rights-of-expr --- Rights of Expression in Cyberspace by R. E. Baird /pub/academic/eff.rights --- Bill of Rights' meaning in the Electronic Frontier. _____ <6.9> What is the Computers and Academic Freedom (CAF) archive? The CAF Archive is an electronic library of information about computers and academic freedom. run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. > If you have gopher, the archive is browsable with the command: > gopher -p academic gopher.eff.org > > It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in > directory `pub/academic'. It is also available via email. For > information on email access send email to [email protected]. > In the body of your note include the lines `help' and `index'. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield ([email protected]). ftp.eff.org =========== /pub/academic/statements/caf-statement --- Codifies the application of academic freedom to academic computers, reflecting seven months of on-line discussion about computers and academic freedom. Covers free expression, due process, privacy, and user participation. /pub/academic/books --- Directory of book references related to Computers and Academic Freedom or mentioned in the CAF discussion. The file books/README is a bibliography. /pub/academic/faq/archive --- List of files available on the Computers and Academic Freedom archive. /pub/academic/news --- Directory of all issues of the Computers and Academic Freedom News. A full list of abstracts is available in file `abstracts'. The special best-of-the-month issues are named with their month, for example, `June'. FOOTNOTES ========= _____ <7.1> What is the background behind the Internet? The article ``Internet'' in Fantasy and Science Fiction by Bruce Sterling <[email protected]> contains general and nontechnical introductory notes on origins of the Internet, including the role of the RAND corporation, the goal of network resilience in face of nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.: > ARPANET itself formally expired in 1989, a happy victim of its > own overwhelming success. Its users scarcely noticed, for > ARPANET's functions not only continued but steadily improved. > The use of TCP/IP standards for computer networking is now > global. In 1971, a mere twenty-one years ago, there were only > four nodes in the ARPANET network. Today there are tens of > thousands of nodes in the Internet, scattered over forty-two > countries, with more coming on-line every day. Three million, > possibly four million people use this gigantic > mother-of-all-computer-networks. > > The Internet is especially popular among scientists, and is > probably the most important scientific instrument of the late > twentieth century. The powerful, sophisticated access that it > provides to specialized data and personal communication has sped > up the pace of scientific research enormously. > > The Internet's pace of growth in the early 1990s is spectacular, > almost ferocious. It is spreading faster than cellular phones, > faster than fax machines. Last year the Internet was growing at > a rate of twenty percent a *month.* The number of `host' > machines with direct connection to TCP/IP has been doubling > every year since 1988. The Internet is moving out of its > original base in military and research institutions, into > elementary and high schools, as well as into public libraries > and the commercial sector. References ========== Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A. Yuan, ``Where to Start - A Bibliography of General Internetworking Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre, August 1990. The Whole Internet Catalog & User's Guide by Ed Krol. (1992) O'Reilly and Associates, Inc. --- A clear, non-jargonized introduction to the intimidating business of network literacy written in humorous style. Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118), University of Illinois Urbana, September 1989. ``The User's Directory to Computer Networks'', by Tracy LaQuey. The Matrix: Computer Networks and Conferencing Systems Worldwide. by John Quarterman. Digital Press: Bedford, MA. (1990) --- Massive and highly technical compendium detailing the mind-boggling scope and complexity of global internetworks. ``!%@:: A Directory of Electronic Mail Addressing and Networks'' by Donnalyn Frey and Rick Adams. The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992) Addison Wesley. --- ``Evangelical'' etiquette guide to the Internet featuring anecdotal tales of life-changing Internet experiences. Foreword by Senator Al Gore. Zen and the Art of the Internet: A Beginner's Guide by Brendan P. Kehoe (1992) Prentice Hall. --- Brief but useful Internet guide with plenty of good advice on useful databases. See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling <[email protected]> for contributions here.) General ======= Cunningham, Scott and Alan L. Porter. ``Communication Networks: A dozen ways they'll change our lives.'' The Futurist 26, 1 (January-February, 1992): 19-22. Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York: McGraw-Hill, 1992) ISBN# 0-390-03083-X --- Essays on information infrastructure. Policy and design issues, research and NREN, future visions, information markets. See table of contents in ftp.eff.org:/pub/pub-infra/1992-03. Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic Networking.'' Whole Earth Review (Winter) 1990: 32-35. Varley, Pamela. ``Electronic Democracy.'' Technology Review (November/December, 1991): 43-51. ______ <7.2> How Internet `anarchy' like the English language? According to Bruce Sterling <[email protected]>: > The Internet's `anarchy' may seem strange or even unnatural, but > it makes a certain deep and basic sense. It's rather like the > `anarchy' of the English language. Nobody rents English, and > nobody owns English. As an English-speaking person, it's up > to you to learn how to speak English properly and make whatever > use you please of it (though the government provides certain > subsidies to help you learn to read and write a bit). > Otherwise, everybody just sort of pitches in, and somehow the > thing evolves on its own, and somehow turns out workable. And > interesting. Fascinating, even. Though a lot of people earn > their living from using and exploiting and teaching English, > `English' as an institution is public property, a public good. > Much the same goes for the Internet. Would English be improved > if the `The English Language, Inc.' had a board of directors > and a chief executive officer, or a President and a Congress? > There'd probably be a lot fewer new words in English, and a lot > fewer new ideas. _____ <7.3> Most Wanted list Hopefully you have benefitted from this creation, compilation, and condensation of information from various sources regarding privacy, identity, and anonymity on the internet. The author is committed to keeping this up-to-date and strengthening it, but this can only be effective with your feedback. In particular, the following items are sought: - Short summaries of RFC documents and other references listed, esp. CPSR files. - More data on the specific uses and penetration of RFC-931. - Internet traffic statistics. How much is email? How much USENET? What are the costs involved? - Famous or obscure examples of compromised privacy on the internet. - FTP site for the code (NOT the code) to turn the .plan file into a named pipe for sensing/reacting to remote `fingers'. - Knowledge on the `promiscuous' mode of receipt or transmission on network cards. - Details on the infamous experiment where a scientist resubmitted previously accepted papers to a prominent journal with new and unknown authors that were subsequently rejected. - X Windows, EFF, CPSR FAQhood in news.answers. Commerical use of this document is negotiable and is a way for the author to recoup from a significant time investment. Email feedback to [email protected]. Please note where you saw this (which newsgroup, etc.). _____ <7.4> Change history 3/3/93 v2.1 (current) CPSR pointer, new UNIX mode examples, digital telephony act, Steve Jackson incident, additions/ reorganization to anonymity section, part 3. Note: v2.0 post to sci.crypt, alt.privacy, news.answers, alt.answers, sci.answers was cancelled by J. Kamens because of incorrect subject line. 2/14/93 v2.0 Major revisions. New section for X Windows. Some email privacy items reorganized to network security section. New sections for email liability issues, anonymity history and responsibilities. Split into three files. Many new sources added, particularly from EFF and CAF in new `issues' part. `commentary' from news.admin.policy. 21 day automated posting starts. 2/3/93 v1.0 More newsgroups & FAQs added. More `Most Wanted'. Posted to news.answers. Future monthly posting to sci.crypt, alt.privacy. 2/1/93 v0.3 Formatted to 72 columns for quoting etc. `miscellaneous,' `resources' sections added with cypherpunk servers and use warnings. More UNIX examples (`ls' and `chmod'). Posted to alt.privacy, comp.society.privacy. 1/29/93 v0.2 `Identity' and `Privacy' sections added. `Anonymity' expanded. Remailer addresses removed due to lack of information and instability. Posted to sci.crypt. 1/25/93 v0.1 Originally posted to the cypherpunks mailing list on 1/25/93 as a call to organize a list of anonymous servers. email [email protected] for earlier versions. * * * SEE ALSO ======== Part 1 (previous file) ------ <1.1> What is `identity' on the internet? <1.2> Why is identity (un)important on the internet? <1.3> How does my email address (not) identify me and my background? <1.4> How can I find out more about somebody from their email address? <1.5> Why is identification (un)stable on the internet? <1.6> What is the future of identification on the internet? <2.1> What is `privacy' on the internet? <2.2> Why is privacy (un)important on the internet? <2.3> How (in)secure are internet networks? <2.4> How (in)secure is my account? <2.5> How (in)secure are my files and directories? <2.6> How (in)secure is X Windows? <2.7> How (in)secure is my email? <2.8> How am I (not) liable for my email and postings? <2.9> How do I provide more/less information to others on my identity? <2.10> Who is my sysadmin? What does s/he know about me? <2.11> Why is privacy (un)stable on the internet? <2.12> What is the future of privacy on the internet? <3.1> What is `anonymity' on the internet? <3.2> Why is `anonymity' (un)important on the internet? <3.3> How can anonymity be protected on the internet? <3.4> What is `anonymous mail'? <3.5> What is `anonymous posting'? <3.6> Why is anonymity (un)stable on the internet? <3.7> What is the future of anonymity on the internet? Part 3 (next file) ------ <8.1> What are some known anonymous remailing and posting sites? <8.2> What are the responsibilities associated with anonymity? <8.3> How do I `kill' anonymous postings? <8.4> What is the history behind anonymous posting servers? <8.5> What is the value of anonymity? <8.6> Should anonymous posting to all groups be allowed? <8.7> What should system operators do with anonymous postings? <8.8> What is going on with anon.penet.fi maintained by J. Helsingius? * * *
7
trimmed_train
348
Help! How do you write to the second bank/page of memory when in VGA 320x200x256 colour mode?. ie: to perform page flipping animation and buffering of the screen. I have tried using the Map Mask Registers, but this does not perform the required task (Although it does do something). Note: It *must* be able to work on a standard VGA (ie: not necessarily a SVGA card).
1
trimmed_train
10,715
Checker Motors went out of business in 1982. It's hard to get old Checkers that are worth restoring, since almost every one was a fleet vehicle that was driven into the ground. If you can get a body in decent shape the mechanicals should all be available _somewhere_ - Checker used whatever parts were around. For instance, I had a Chevy straight six and a GMC Truck radiator and a Ford rear in mine. Actually, you want a Checker Special if you can find one.
4
trimmed_train
8,732
# -# Just curious (don't have to answer if you feel uncomfortable): # -# how many times have YOU had sex with boys? # # why do you care? if a total stranger asked you how often you had sex, # would you answer? # # # henry mensch / booz, allen & hamilton, inc. / <[email protected]# This is so typical of homosexuals -- constantly making excuses for child molesters.
13
trimmed_train
766
I don't personally, but Clay just posted it. Yes, we do. Unfortunately, it shows that Lopez wasn't as good an example as Nieves would have been, since his last year numbers were out of line with the previous years (which I didn't have access to). The point remains, though; knowing a guy's minor league history is as good as knowing his major league history, if you know how to read it. The MLE is not a *projection*, it's an *equivalence*. It's a "this is how well he hit *last* year, in major league terms" rating. So, in essence, he has *already* reached it. I would guess (Bob? Clay?) that essentially half of all players surpass their previous MLEs in their rookie seasons. Maybe more than half, since all of these players are young and improving. Did they? Offerman may have been the difference between 4th or 5th place and last place, but no more. Sure; they didn't have anyone better. I suppose they might have gutted the farm system to acquire Jay Bell or Spike Owen or somebody if they were really in contention. If you'd read what I wrote, you'd be less amazed. Nowhere do I claim to put any credence in spring training. Quite the contrary; I said that Lopez hadn't done anything that even the bozos who *do* put credence in spring training could interpret as "failure". Just because I think spring training numbers are meaningless doesn't mean that Bobby Cox does; it's just a case of ruling out one possible explanation for sending Lopez down. Keith Mitchell did very very well at AA, AAA, and the majors over a season, then did very, very poorly for a year in AAA.
2
trimmed_train
6,356
Jesus isn't God ? When Jesus returns some people may miss Him ? What version of the Bible do you read Mike ? Jesus is God incarnate (in flesh) . Jesus said, 'I and the Father are one.' Jesus was taken up to heaven after His 40 day post-resurrection stint and the angels who were there assured the apostles that Jesus would return the same way and that everyone will see the coming. That's why Jesus warned that many would come claiming to be Him but that we would know when Jesus actually returns. These are two very large parts of my faith and you definitely hit a nerve :-)
0
trimmed_train
8,664
And not only that, made a second clone from the same tissue sample after that of said domineering wife, to run at the helm of the more-pro-business party under guise of more free trade ... and she did inhale, many times, to boot ... (-; (-; (-; gld
13
trimmed_train
2,276
Candida albicans can cause severe life-threatening infections, usually in people who are otherwise quite ill. This is not, however, the sort of illness that you are probably discussing. "Systemic yeast syndrome" where the body is allergic to yeast is considered a quack diagnosis by mainstream medicine. There is a book "The Yeast Connection" which talks about this "illness". There is no convincing evidence that such a disease exists.
19
trimmed_train
5,669
Yup. Unfortunately, as has been pointed out, the cost of insurance does NOT go down with No Fault. The crappiest drivers make out like bandits because they no longer have to bear the responsibility of paying for insurance that they have boosted in price for themselves by being crappy drivers. The good drivers now pay through the nose to spread the cost of the crappy drivers' actions, and that's not fair. Any plan that caps rates for crappy drivers is inherently a piece of shit, because the rest of us end up paying more. Any plan that uses speeding tickets as a basis for raising rates is also a piece of shit as it is based upon the lie that faster drivers are inherently less safe than slower drivers, and the NHTSA disproved that two years ago now. Later,
12
trimmed_train
878
Who is the you Arabs here. Since you are replying to my article you are assuming that I am an Arab. Well, I'm not an Arab, but I think you are brain is full of shit if you really believe what you said. The bombardment of civilian and none civilian areas in Lebanon by Israel is very consistent with its policy of intimidation. That is the only policy that has been practiced by the so called only democracy in the middle east!
6
trimmed_train
8,842
[...]> [...]> If the data isn't there when the warrant comes, you effectively have secure crypto. If secret backups are kept...then you effectively have no crypto. Thus, this poster is essentialy arguing no crypto is better than secure crypto. If the data isn't there when the warrant comes, then the government will just have to use normal law enforcement techniques to catch crooks. Is this so bad? BTW, bugging isn't YET a normal law enforcement technique. With the privacy clipper, it WILL become a normal technique. /Jim
7
trimmed_train
6,090
Thanks for the resposes as they were all good ideas and I am looking at using a couple of the ideas. I recieved in the mail today the spec sheets on the mil. spec version of Exar's XR-2240 timer/counter chip. It is stable down to -50 C and sucks very little power. They show an application for a ultra-long time delay (up to several years depending on the RC time constant). In this application, they have two of them cascaded together. The reset and trigger pins of both chips are tied together and the timebase of the second chip is disabled. In this configuration, the output is high when the system is reset. When triggered, the output goes low and stays that way for a total of 65,536 x the timing cycle of the first chip. The total timing cycle of the two chips can be programmed from To = 256 x R x C to 65,536 x R x C in 256 steps by selecting any combination of the counter outputs to the timer output. The beauty of it is, the timebase chip would only have to have a 100uF timing cap and a 391K resistor for 39.1 seconds per timing cycle. So I can get a maximum of 2,562,457.6 seconds between timing cycles (39.1 x 65,536 or about 29 days !) Of course, that's much more than I need (14 days). But the counter allows for 256 binary steps that can be selected for the output for the 'pellet puker'. After the first 14 days and it trips, it would reset its self for the next 14 day timing cycle and so forth. Power is still a problem though. A few ideas that you suggested was to bury the electronics in a hole dug in the snow (as an insulator) and put the pellet puker up on a tower above the estimated snow fall with a solar panel on it to keep a charge on a lithium battery pack. I like that idea ;-) This thing has to work for at least six weeks for three samples and the gas valves are 12 volts to spit the pellets out onto the snow. Anyway, I ordered the XR-2240's to see what I can do with them. Should be interesting (as long as I'm not the one that has to go digging up the pellets in the middle of Antartica freezing my buns off ;-) Thanks again everyone...
11
trimmed_train
3,448
Hi. My last question for the year. I have a mail-order no-name notebook with 4 meg ram. I never have problems with my huge ramdisk or when running desqview, but Win3.1 and W4W2.0 constantly crash on me, most commonly citing a "memory parity error." The only thing I can do is TURN OFF and re-boot. My CMOS ticks off & counts all the memory every startup, and there is never a problem with this either. Could it be a bug in my Windows copy instead of the hardware? I remember having some disk error problems when installing it. Is there any change I could make to lessen the frequency or likelyhood of this happening (I think win vs win /s produce different crashes, but both crash frequently nonetheless)
18
trimmed_train
7,212
What's the problem here? Back in 1958 I rode a Puch 175 from Paris to Barcelona and back. That was a two stroke, and back then it was representative of the size of bikes on the road. A 350 was considered a big bike, and the superbikes of the day were 500cc or 600cc. Anything bigger was real rare. Charlie Smith, DoD #0709, doh #0000000004, 1KSPT=22.85
12
trimmed_train
5,037
I need help binding some value to the HOME and END keys on my keyboard. I have an rs/6000 w/ aix3.2.3ext running X11R5pl19 mit dist. I'm using a PC running eXceed for windows as my xterminal. The HOME and END keys do not send a value, and my application needs them to be defined. I used this in my Xdefaults to define the keys: varnet*VT100.Translations: #override \ <Key>Home: string("\033[8~") \n\ <Key>End: string("\033[7~") Then I xterm -name varnet. This works perfect, however the 7 and the 1 key on my keypad are also defined as \033[8~ and \033[7~. Any ideas? Help please. Thanks.
16
trimmed_train
2,019
I love the FAQ. The comment about contact lenses not being an option for any remaining correction after RK and possibly after PRK is interresting. Why is this? Does anyone know for sure whether this applies to PRK as well? Also, why is it possible to get a correction in PRK with involvement of only about 5% of the corneal depth, while RK is done to a depth of up to 95%? Why such a difference? I thought the proceedures were simmilar with the exception of a laser being the cutting tool in PRK. I must not be understanding all of the differences. In the FAQ, the vision was considered less clear after the surgery than with glasses alone. If this is completly attributable to the intentional slight undercorrection, then it can be compensated for when necessary with glasses (or contacts, if they CAN be worn afterall!). It is important to know if that is not the case, however, and some other consequence of the surgery would often interfere with clear vision. The first thing that came to my mind was a fogging of the lense, which glasses couldn't help. would not help.
19
trimmed_train
9,939
XGA or XGA-2? For the original XGA you just need something that can do 1024x768 at 45/90Hz interlaced (just tell them "8514 compatible" and they should get the idea). For the XGA-2, get what you like. I prefer multi- syncs like the IBM 6319, the NECs or even a fixed frequency monitor like my home Viewsonic 6. I like the Multisyncs because it's easy to run them in modes like 800x600x64k colors noninterlaced, or at higher modes like 1360x1024x16.
3
trimmed_train
6,032
The O's just lost to the Rangers a few minutes ago I was not too happy about the pitching of Rick Sutcliffe (6 runs in 6 innings, 5 in the 3?) This puts me in remembering the 1990 O's season. After '89 we didn't do much over winter and we wound up in 5th. Now I know that Mussina, McDonald, and Rhodes are better pitching prospects than Ballard and Milacki but are any other Oriole fans scared out there? Admiral Steve C. Liu
2
trimmed_train
6,276
04 May 93, D. Andrew Byler writes to All: DAB> I think I need to again post the Athanasian Creed, whicc pretty well DAB> delinieates orthodox Christian belief on the Trinity, and on the DAB> Incarnation. DAB> It's a pretty good statement of the beliefs eventually accpeted, and the DAB> Creed is in use by the Catholic Church, as well as the Lutheran, DAB> Anglican, and Orthodox churches (the last minus the filioque, which they DAB> delete from the original form of the creed). Do you have any evidence that it is used by the Orthodox Churches? As far as I know it is purely Western, like the "Apostles' Creed". The Orthodox Churches use the "Symbol of Faith", commonly called "The Nicene Creed". Steve Hayes Department of Missiology University of South Africa
0
trimmed_train
6,675
Perhaps not in Christianity, but in Islam the choice of religious leaders is to be made by the people. So much for your superiority argument. Democracy is a basic element of Islam. Learn that one! Ever notice that the so-called "fundamentalists" in Algeria who are being repressed by the secular government won in free and democratic elections.
8
trimmed_train
8,649
In pure speculation, I would guess cautions based on hazardous pre-launch ops would qualify. Something like "Caution: SRBs have just been armed."
10
trimmed_train
97
..deleted... In plain Motify using a dialog 'in-line' like this simply isn't done. You need to set callbacks from the buttons/widgets in your dialog and let the callback routines do the work. In the callbacks you can then carry on the flow of logic. XView from Sun actually supports this very neatly with a 'Notify' box, which can return a status in-line, it does actualy ease coding but goes against the event driven style of an application. Summary: Redesign required.
16
trimmed_train
9,258
Hey!!! I've just upgraded my laptop to a Windows-capable one, so I don't need my DOS word processor anymore. It's a great word processor. Easy-to-use, undemanding on the system, and best of all, it has a WYSIWYG EDITING mode. This is something Word Perfect doesn't have!! And all I'm asking is $65 + shipping. It even comes with several hundred dollars of free utilities!!! $65 for a full-featured WYSIWYG word processor!!! Perfect for a laptop, or a lower powered machine!
5
trimmed_train
1,797
Clipper Chip is a response to the fact that there is no business or professional body in a position to establish a standard and provide chipsets to implement it for analog or digial transmission systems. RSA might be in position to do it, if they had active cooperation of a couple of manufacturers of cellular phones or desktop phones. Large companies in the voice/data comm business are out, because they all have contracts with the gov which would be used to pressure them. If we, as professionals in crypto organizations, EFF, etc. were to put our collective minds and interests toward establishing a crypto standard for transmission, and getting our companies to implement it, we might avoid government control. Otherwise, I think it will happen to us by default. Gov isn't probably strong enough or foolish enough to prevent strong crypt. They are strong enough, and we may be foolish enough, to push through the Clipper Chip. Is RSA independt of the gov enough to spearhead this? I, for one, would *gladly* pay royalties via purchasing secure phones. If not this, we should provide an algorithm which can be implemented in either SW or HW and publish it, then push to make it the defacto standard in the way that PGP and RIPEM are becoming such. We are opposing, charging the bunker. We should be nimble and clever. The gov is strong, not clever. Lew
7
trimmed_train
5,495
Sounds about right. If there is high demand for a product there is little incentive to aggresively cut prices. Once the demand fall off a bit, then is the time to start getting aggressive with pricing. Waiting too long can really hurt your business though :-) The PowerBooks have sold very well up to now, if they are slowing down Apple needs to come out with some lower priced versions (the only reason I own a PowerBook is that I could spring for a $900 PB100, the rest of the lineup is way to pricey for me). I'd bet they'll be coming out with more power versions too.
14
trimmed_train
3,919
Anyone who really believes that the Caps can beat the Pens are kidding themselves. The Pens may not loose one game in the playoffs.
17
trimmed_train
5,396
the question is by going East or West from the misisipi. on either choice you would loose Palestine or Broklyn, N.Y. I thought you're gonna say fromn misisipi back to the misisipi ! Let's say : " let's establish the islamic state first" or "let's free our occupied lands first". And then we can dream about expansion, Mr. Gideon
6
trimmed_train
9,319
And last year the Capitals had the Pens number up until about game 3 of the playoffs.
17
trimmed_train
52
Hi ... can anyone tell me where I can get a copy of updated Canon BJ-200 printer driver for Windows 3.1, if any ? I have ver 1.0 which comes with my BJ-200 printer, I just wonder if there is any newer version.
18
trimmed_train
2,102
I do recall Watt making a comment to this effect, though it was quite a few years back and I can't cite the specifics. I also recall that Cecil Andrus, who was Secretary of the Interior during the Carter Administration, responded to Watt's comments by pointing out the stewardship role that God gave to man, as recorded in Genesis. Which makes me wonder: who are the true conservatives? It seems to me that a *conservative* should want to *conserve* things of value for long-term societal benefit. This form of *conservation* should logically extend to the physical environment in which people live, as well as the moral environment in which they relate to one another and to God. IMHO, Watt's stewardship status is not enhanced by the fact that he served on the board of directors for Jim Bakker's organization, during a time in which Bakker committed criminal acts which eventually landed Bakker in federal prison.
0
trimmed_train
10,437
I am looking for shanghai, solitaire game with mahjongg tiles for PC's. if you have a copy laying around, send email to: [email protected] thanks,
5
trimmed_train
6,499
: Sorry, I did`nt tell exactly what I need. : : I need a utility for automatic updating (deleting, adding, changing) of *.ini files for Windows. : The program should run from Dos batchfile or the program run a script under Windows. : : I will use the utility for updating the win.ini (and other files) on meny PC`s. : : Do I find it on any FTP host? : : Svein Well, in the latest Windows magazine, there is an advertisement for a program that will help you uninstall windows apps from your harddisk (Uninstaller) but it can be used to update a network, but only for deleting, not adding or changing their *.ini files. (Uninstaller, by MicroHelp Inc. $79 1-800-922-3383) I am also looking for an *.ini updater for my PC network, and so far without any luck. So for the time being I have been pushing DOS and it's batch language to its limit...look into DOS 5.0's (I am assumming that DOS 6.0 has the same command, maybe even more..or less..improved) REPLACE command. I use this to update our users personal files with a master set in a batch file that is run everytime they invoke Windows. This basically overwrites their color schemes, but does what I need it to do. Not neat, but does the job...I'm looking for a better solution though. Mike Just relaying what I know...a not for profit service.
18
trimmed_train
5,018
I have a modest system of aliases/macros that enables me to download mail from a public access UNIX system to my MS-DOS box. I read and reply to the mail with a MS Windows 3.1 based editor. Everything works peachey keen as long as the author of the message has maintained his text at 80 col. max. width. Sometimes I get slightly wider messages that run off-screen, so I have to use the cursor/slider to read the whole thing. I'm using NDW Deskedit mainly, but I've experienced the same prob with all other MS WIndows editors. I've fiddled with word wrap settings in the various editors, but to no avail. I know I'm missing something very basic in editor setup, but what is it? Oh yeah, MS Word for Windows converts everything flawlessly but for what I'm looking for that's like using a tank to crack walnuts. I'd really like to have an editor setup that would display all incoming ASCII files in a readable format to my screen. Thanks in advance,
18
trimmed_train
3,029
You apparently think you are some sort of one-man judge and jury who can declare "total" victory and then sit back and enjoy the applause. But you've picked the wrong topic if you think a few rigged "quotations" can sustain the legend and lie of the Deir Yassin "massacre." You have a lot to learn when it comes to historical methodology. At the most basic level, you should know that there is a big difference between weighing evidence fairly and merely finding "quotations" that support your preset opinions. If you have studied the history of Israel at all you must know that many of the sources of your "quotations" have an axe to grind, and therefore you must be very careful about whom you "quote." For example, Meir Pa'il, whom you cite, was indeed a general, a scholar, and a war hero. But that doesn't mean everything that comes out of his mouth is gold. In fact (and here your lack of experience shows), Pa'il is such a fanatic, embittered leftist that much of his anti-Israel blathering (forget about anti-Irgun blathering) would be considered something like treason in non-Israel contexts. But of course you don't consider this AT ALL when you find a juicy "quotation" that you can use to attack Israel. Benny Morris (of Hashomer Hatzair) represents himself as a "scholar" when he rehashes the old attacks on the Irgun. Don't be fooled. It's just the old Zionist ideological catfight, surfacing as an attack on the (then-) Likud government. If you will look closely at the section on Deir Yassin in his book on the War of Independence, you will see his "indictment" to be pure hot air. And this is the BEST HE CAN DO after decades of digging for any sort of damning evidence. Unfortunately for him, because his book parades itself as "scholarly," he is forced to put footnotes. So you can clearly see that his Deir Yassin account is based on nothing. The Deir Yassin "massacre" never took place as the propagandists tell it, any more than the Sabra and Shatila "massacres." Do you get the feeling people like to blame the Jews for "massacres," even if they have to make them up? It must sound spicy. Even some Jews like to do it, for reasons of their own. Please, don't confuse any of you Deir Yassin "massacre" stuff with facts or scholarship. You should stick to Begin's version unless you find something serious to contradict it.
6
trimmed_train
7,142
You are correct. See today's (4/21) Washington Post. The gas the FBI used is most certainly fatal in high concentrations. Of course, non-toxic tear gas is an oxymoron; the whole point of tear gas is that it is toxic, and its toxic effects cause people to seek fresh air.
15
trimmed_train
2,615
Boy, Travis.. Were you LUCKY!!.. you went under the new Texas Rangers Stealth Patrol Car! Good thing you slowed down!
4
trimmed_train
7,461
SOMEONE PLEASE BUY THESE BOOKS!!!!! I AM NOT ASKING MUCH!!!!!! JUST MAKE ME AN OFFER AND I WILL PROBABLY TAKE IT!!!!! * Calculus w/ Analytic Geometry by Authur B. Simon (copyright date 1982), below avg condition but still readable! * Writing good software in Fortran, Graham Smith. * The Holt Handbook by Kirszner & Mandell (copyright 1986) 720+ page writing guide. * Algebra & Trigonometry, A problem Solving Approach, 3rd edition by W. Flemming and D. Varberg. Very good condition. * General Chemistry Principles & Modern Applications, R. Petrucci, fourth edition. Big Book! Very good condition! * Solutions manual for Chemistry book. Paperback. * Study guide for Chemistry book. Paperback. Send me your offers via email at [email protected]
5
trimmed_train
5,534
[ ... ] This, BTW, is normal behavior for newsie's. The followup isn't "news" ...
9
trimmed_train
1,829
Has anyone had experience porting imake to DOS using a Microsoft, Watcom, or any other DOS compiler?
16
trimmed_train
5,239
x>> x>>>> Fake convertible roofs and vinyl roofs. x>>>> Any gold trim. x > x>>> These, I will agree, are abominations, right along with the fake x>>>continental spare-tire kit -- it's sad watching those little old ladies x>>>try to load their groceries into the trunk with that huge tire-medallion x>>>in the way. x>>> Most pitiful fake convertible top: on a "Cadillac" Cimarron, with x>>>all the chrome door trim still visible -- not fooling *anyone*. x>>>Of course, there was that Hyundai Excel I once saw... x>> Least you think bad taste is something new: Back in the early 1970s I saw a couple of cars with *flocked* paint jobs. Thats not a typo. I think they sprayed on some kind of glue then blew on tiny pieces of nylon. It comes out looking like felt. Can you picture a huge Plymouth Fury III in dark blue felt? I think I can even remember one guy who did it in red to a early 1960s Corvette. That was after he had turned it into a station wagon. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mack Costello <[email protected]> Code 65.1 (formerly 1720.1) David Taylor Model Basin, Carderock Division Hq. NSWC ___/-\____ Bethesda, MD 20084-5000 Phone (301) 227-2431 (__________>|
4
trimmed_train
7,989
#1 Clayton, my man... You are a tad out of touch.... First, gay comunities all over the country are in the process of excluding NAMBLA from parades etc. #2 Nobody from NAMBLA is gonna get a job in a day care centre. The same liberals you are upset about are also passing laws that make tough background checks for childcare people. #3 Tell me, how would you feel if your employer fired you for your antigay post on the internet? Would you be upset ? I`ll bet you would be pissed! To some, your posts ,ight make the company look bad. While your posts offend me I dont think it would be right for you to get fired over it. I dont believe the gay comunity is asking for hiring quotas like the affirmative action laws of the 60's did. My understanding is that the gay community just wants the same rights the srtraights have. I dont think people should have their leases cancelled when their landlord finds out they are gay. I dont think that when someone sees someone walk out of a gay business and then blabs it all over work that the gay person gets fired. Do you REALLY think these are justified ? #4 Clayton, I am told you are a parent a couple times over. Have you been following the strip in the paper "For Better or For Worse" ? I honestly want your opinion as a parent on the strip. Do you really care about your childeren as much as friends of mine tell me ? How much do you care about your childeren ? How much do you care about other people's childeren? Do you care about MY childeren? Do you care about my sister's childeren ? If one of your kids told you he/she was gay, would you throw them out of your home in the middle of the night? Would you approve of your childeren driving down to San Francisco to trow bottles at and beat up on gay people? Would you condone your childeren beating up on someone elses childeren ?
13
trimmed_train
1,027
Re: Space billboards Even easier to implement than writing messages on the Moon, once upon a time a group of space activists I belonged to in Seattle considered a "Goodyear Blimp in orbit". The idea was to use a large structure that could carry an array of lights like the Goodyear Blimp has. Placed in a low Earth orbit of high inclination, it could eventually be seen by almost everyone on Earth. Only our collective disapproval of cluttering up space with such a thing stopped us from pursuing it. It had quite feasible economics, which I will not post here because I don't want to encourage the idea (if you want to do such a thing, go figure it out for yourself). Dani Eder
10
trimmed_train
5,661
Dial 511 and it sound tell you the number.
11
trimmed_train
5,887
FOR SALE: Pen-based electronic organizer -- Brand-new Sharp Wizard OZ-9600 (with PC link software and cable) -15 ounces, measures 7"x4"x1" (fits in most pockets) -256k RAM, 125k available to user -pen/touch-screen input for pointing and drawing -keyboard big enough to touch-type on -320x240 screen -windows/pop-up menus -excellent scheduler with alarms -3 telephone directories -3 user-configurable databases -full word-processor with formatting -drawing utility -outliner -to-do list -calculator -clock/calendar -terminal emulatorw/ dialing directory -directory/filing system -serial port/infrared port/IC card slot -uses 4 AAA batteries (about 3 months of daily use) -All manuals Organizer Link II -software and cable for exchanging data between Wizard and a PC $480 or best offer for both. I'll pay shipping. Steven M Friedman Horizon Institute for Policy Solutions
5
trimmed_train
9,824
I feel like Winston Churchill in 1941 :( ...... but, the privacy Clipper will, TO THE EXTENT KEY ESCROW IS LEGITIMATE, stop most of the abuse of wiretaps by local cops, company cops, angry husbands/ wives, etc... It is going to be hard for the keystone cops, the Proctor&Gamble cops, etc. to bypass even a product as flawed as the ClipJob. Now I admit, I am hard pressed to find anything else good to say about it except that, if it actually takes off, someone will certainly come up with a REAL crypto chip (pin compatable!) that we can buy... Unless, of course, Big Brother makes it illegal to have real crypto 'cause good honest law abiding citizens will be HAPPY to let the government listen to their every word.... "Me? Did I say THAT?" "I am not a crook." - President Richard M. Nixon ^^^^^^^^^
7
trimmed_train