id
int32 1
11.3k
| text
stringlengths 0
74.9k
| label
int64 0
19
| Generalization
stringclasses 1
value |
---|---|---|---|
7,427 | Are 'Moody Monthly' and 'Moody' the same magazine (name change in recent
years)?
If not: Could someone post the address to 'Moody Monthly'?
:)avid
| 0 | trimmed_train |
3,506 | Re: Rubbing Compound....
You mean Meguire's* didn't work?
* THE DOD magic elixir of choice for plastic stuff
| 12 | trimmed_train |
3,677 |
So what's your local hospital's favorite curse? | 12 | trimmed_train |
9,405 | I was having the same problems compiling X11R5 on a IPC sunos 4.1.3.
If you compile with 'make -k World' it will not stop on the
ld errors. As was stated in another post the clients with the
errors still run correctly. | 16 | trimmed_train |
5,327 | Piper lived in my town (Williamsport, PA) when he killed himself. It
was in the early '60's. He had had more than a few books published by
that time, but he was down on his luck financially. Rumor was that he
was hunting urban pigeons with birdshot for food. He viewed himself as
a resourceful man, and (IMO) decided to check out gracefully if he
couldn't support himself. The worst part is that John Campbell, the
long-time editor of Astounding/Analog SF magazine had cut a check for
Piper's most recent story, and said check was in the mail. If Campbell
had known Piper's straits, I'm sure he would have phoned to say hang on.
Campbell was like that.
I wish it had happened differently. I always enjoyed Piper's stuff. | 10 | trimmed_train |
8,231 | I would be interested in hearing from anyone who knows of good software for
antenna simulation, particularly in source form suitable for Unix workstations
(though good PC software would also be of interest).
I'm aware of the numerous mininec mutations, and have been using MN for
some time now. I'm primarily interested in HF, VHF, and low UHF (< 500 MHz)
designs, mostly wire antennas, but for thick wires and mesh surfaces as well
as for your basic thin wire assumption.
Is anything interesting happening with NEC itself? I've seen a version
that was mutilated to run (sort of) under Microsoft Fortran, but I'm not
sure how many "new and improved" versions of the code might be out there
somewhere.
I'd also be interested in non-NEC derivatives. The ones I've seen have
been aimed at microwave applications, but if there is something out there
useful at the lower frequencies, I'd like to know about it.
Thanks, | 11 | trimmed_train |
11,114 | Hi
I am trying to implement a pointer feature in Xlib
I have multiple windows and all can take input and
show output simultaneously on all other displays
I want to implement a pointer feature
I would like to get the pointer to come up on all windows once
I choose pointer in the menu and every one should be able
to see it
Can you give me some hints as to how I should proceed
I am new to Xlib
replies will be greatly appreciated
Thank you | 16 | trimmed_train |
199 | I have an eprom blower made by Logical Devices and the
model name is Prompro-8, but I have lost the manual. Does anyone
have a spare manual that they would like to sell ? | 11 | trimmed_train |
3,062 |
Or little children at the market.
(Or is that the Irish? Hard to keep all you not-really-English types
straight.)
-- | 12 | trimmed_train |
2,389 | [stuff deleted]
me:
David:
This is a very, very good point. Who cares what kind of gun you've got if
you're lying on the ground dead.
[more stuff deleted. mostly mine]
Another very good point that is well taken. It seems that when lots of lead
is flying (either the cops or the gangs) someone innocent always gets caught
in the crossfire.
All points made above are well taken. I guess I am in the mindset of
"having more makes it better" which is obviously not the correct mindset
to take in this discussion. Now that I think about the situation a
little more carefully I see your point exactly David and I
wholeheartedly (sp?) agree. Like I said I'm just assuming that "more
bullets and/or bigger bullets is better". Once again though I want to
state that I am a pro-gun individual and do NOT believe that gun control
is really a viable option here in the United States regardless of the drivel
that I spout here :-) | 9 | trimmed_train |
10,193 |
May I suggest the book: "Ethics" by Dr. Norm Geisler, of Dallas Theological
Seminary. In it, he goes over all the arguments pro and con and in-between,
and comes up with a very reasonable answer. If I have time, and there is
enough interest, I may post his position.
Jon Noring
--
Charter Member --->>> INFJ Club. | 0 | trimmed_train |
3,408 | Printer model and specification:
Canon CLC 500 (Color Laser Copier)
ps-ipu unit (postscript intelligent processing unit)
Hello,
We have recently purchased a very expensive and nice color copier/printer.
We want to be able to print to it from our SGI iris network. The
copier/printer has both a parallel and SCSI interface. I have configured the
printer with the "lp" system using the parallel interface and can print
postscript files to the printer. I can also print rgb files, but these are in
turn converted to postscript by an internal filter. The Canon CLC 500 is a
publication quality printer but the quality of our postscript printouts
are less than acceptable. We create the postscript files with a variaty of
programs, such as showcase, xv, and tops. When we convert to postscript
with tops and use the -l option to specify the halftone screen density of 98
rather than the default 40 the output is better, but still much less that
acceptable. Note, that we are starting with a screen image in rgb image format
and translating the image into postscript.
We suspect that if we could use the SCSI interface we would get higher quality
pictures. We have not purchased the software that drives the printer from the
SCSI port. To my knowledge this software is $5000 and does not come with a
warranty. The management here does not want to spend this much money without
some assurance that the product will work.
Here my questions:
If anybody on the net uses this printer are you using the SCSI or
parallel port? What is the quality of the printouts?
Is there a way to create high quality postscript printouts? What is the
limiting component, the postscript language or the postscript interpretor on
the printer?
The Big question:
Where can I get some software to drive the SCSI port for this printer?
Please email directly to me, I don't not read news on a regular basis.
I will post a summary.
Thanks in advance.
| 1 | trimmed_train |
3,593 | PC Mag only got around 9-10 Winmarks when they tested the Steal 24. It sounds
like you are ok.
jamesc
| 3 | trimmed_train |
8,461 | On export.lcs.mit.edu directory contrib, and avahi.inria.fr directory pub/xpm:
xpm-3.2f-to-3.2g.patch.Z
xpm-3.2g.tar.Z
/* Copyright 1990-93 GROUPE BULL -- See license conditions in file COPYRIGHT */
/**************************************************************************\
* *
* HISTORY of user-visible changes *
* *
\**************************************************************************/
3.2g (93/04/26)
ENHANCEMENTS:
- much faster close colors
- piping from/to compressed files now handles GNU's gzip (.z) format
- added XpmColorKey attribute - ability to specify which visual's
colors to use (ie: now it's possible to read in a pixmap in a
color visual, but use the colors specified for monochrome).
- added -mono, -grey4, -grey and -color options to sxpm to demonstrate
the XpmColorKey attribute.
- Jason Patterson <[email protected]>
BUGS CORRECTED:
- fixed bug where redefining "None" as a pixel stopped mask generation
- minor SVR4 defines for <string.h>
- fixed annoying closecolor bug related to read/write color cells
- fixed minor bug in color value -> pixel overloading
- manual updated to include new red/green/blue closeness attributes
- Jason Patterson <[email protected]>
- the top Imakefile was missing the depend target
- sxpm/Imakefile fixed so that -L../lib is set before the standard
library location.
- Vivek Khera <[email protected]>
- lib/xpmP.h now defines bcopy as memcpy for VMS (required by recent
versions of VMS)
- J. Daniel Smith <[email protected]>
- the lib/Imakefile didn't work with X11R4.
| 16 | trimmed_train |
8,089 | Hello
I have a question about the demo files for amipro v3 uploaded in cica.
I downloaded it and tryied to install it. However, it didn't work.
In addition, it altered or eliminated my NWRES2.dll file so that I had
to reinstall my Norton Desktop again.
Is there anything I have to know to install it or do I eventually have
to ask Lotus to send a working model to me (I heard that they have it)?
I just want to see its look and feel before buying it.
Any pointer would be greatly appreciated.
Thank you | 18 | trimmed_train |
1,896 |
Not at all. Two weeks ago I registered a concern about some programming
that was being conducted by a student organisation here at the
University of Texas at San Antonio. As a result, I was interrogated
by the capus police, who also attempted to create a positive-identification
file (photo, fingerprints, etc.). I refused to permit this, and filed a
complaint with the University administration. The Vice-President for
Business Affairs (the 'boss' of the campus police) stated that he had no
interest in the legal/Constitutional implications of those actions.
| 7 | trimmed_train |
7,434 |
Wales Conference, Adams Division, Semifinal
I'm hoping for a Fuhr miracle, but I agree that Boston will likely win the
series. Goaltending is about equal, top offensive players are about equal
(Mogilny-LaFontaine vs. Oates-Juneau), but Buffalo has no answer to Neely
(not to imply that Neely is not a top offensive player btw, in fact he's one
of my favourites even though he's a damn Bruin :) ). And the rest of the
matchup wrt lineup favours Boston anyway. But I think it will go six.
Agreed here...but Montreal will be pushed to the limit. Is it just me, or
does everything Montreal does in the playoffs come down to Roy? Go Habs!!
Final
I can't predict a Montreal victory because I've been watching them play for
6 weeks and IMO they severly need some tougher players, especially to play
in the Garden. Last time they beat the B's 5-2 but Boston had a clear
territorial advantage; the victory was Roy's. At the same time, I can't
bring myself to predict the possibility of a loss, so I'll just say I will
not be putting money on this series. :-)
Agreed. NY doesn't have the goaltending to stop the onslaught, independent
of the trouble they have given Pittsburgh this year. Pens in five, which is
credit to NY.
Agreed here too, but I think it will go at least six. Jersey has a decent
team, and Washington has done poorly against the division this year.
I think they will use Tabaracci more after Beaupre gets shelled. I don't
think it will go six either...*maybe* five.
If Pittsburgh plays Boston, IMO they win in likely five, possibly six. They
own the Bruins. If they play Montreal, I think it will go to seven, and once
again I won't be putting money on the seventh game. I say seven because the
Habs have played Pittsburgh very tough this season.
Chicago will win, but I think in at least six. Chicago is not that good,
IMO. And remember that they take ridiculous numbers of penalties.
Very true. The Leafs have much to be proud of, but they will soon find out
why Montreal did so lousy in the playoffs. Toronto might win two or three
at MLG though. Wings in six, maybe even seven.
It _will_ be a war...possibly the most intense playoff series of them all.
And yes, I think Detroit will win. Probert will have to come up big though.
Our first disagreement. Canucks are playing like shit. They don't use their
size *at* *all*, which may explain why they get hammered 8-1 by a team
chasing them (Calgary)....Winnipeg in six.
This is also tough for me to call, because I haven't seen the Smythe enough.
I don't think Roberts will be well enough to figure in, Coffey is a
non-issue, who cares what Carson has done before, and *never* underestimate
Gretzky. LA in six.
If it is these two, Calgary will not need six games. But I think it will be
LA-Winnipeg anyway, and LA in seven, because of home ice.
Wow, must've been tough to go against your team. But let's see, I picked
LA-Detroit. Detroit will win, probably in six.
If Pittsburgh plays Detroit, it will go longer than five, and I wouldn't bet
against the Wings. They are very strong, IMO, and nobody knows *how* strong
because they've been underachieving most of the year. If forced to choose,
though, I'd have to take the Penguins.
A side note. Vlad, last week you said that Selanne was a better player than
Gilmour. NO WAY. He is a more talented pure goal scorer...but aside from
the age difference, there is no way I would take him over Gilmour on my team.
I'm not asking for flames, either, btw....I've spent more than enough time
arguing on behalf of Selanne and I still say he's a great player. But while
he and Gilmour are both dangerous offensively (give Teemu an edge),
Gilmour *does* *it* *all*. I know a lot of Gilmour-bashing goes on, esp.
from Flame fans. But IMO you guys are letting your dislike of Gilmour cloud
your judgement when it comes to his skill. He is easily one of the best
all-round players in the NHL.
| 17 | trimmed_train |
2,934 |
****************************************************************
* ////// ----------------------
* // // "Electronic Networking For / PsychNet.Com /
* ////// "Professional Psychology." /Serving Psychologists/
* // sychNet (1-800-541-2598) / World Wide /
*// -----------------------
************************************************************
It's an experiment, place a not so subliminal, slightly
cagey message in front of a viewer and see how long it takes to create a response, and what was the response...
It was the same thing with the "Blow me" message, only it had a
quicker response time...and some unexpected responses along with the
expectedly negative ones...
Anyone see how long that took?
Yours, in jest...
Tom T | 5 | trimmed_train |
9,655 |
Um, what? Eddie Murray was a superb first baseman for a *long* time.
Winfield as produced consistently for almsot 20 years, and excellently
on several occasions.
Dave Kingman's *best* year was like Darryl Strawberry's *typical*
year with the Mets.
Darrell Evans, too, did a whole lot more than just hit homers, which
*is* all that Kong did.
Whom are you talking about? Yes, Eddie Murray is marginal, but that's
because he's 38 years old. He wasn't marginal for a *long* time.
Not.
Smith has hung around for a long time AND fielded the position better
than anyone else ever has.
Yount stopped being a shortstop about a decade ago, in case you hadn't
noticed.
One of his two MVP awards was as a centerfielder.
Like whom? There are many players in the Hall who aren't anywhere near
as goos as the guys you're running down.
That's already the case, by some standards. But the *bad* players in the
Hall are all from the 20's and 30's. Recent picks have generally been
excellent.
No, but who cares? Was Stan Musial anywhere near as good as Babe Ruth?
Not really. But he obviously belongs there.
The Hall has generally had about the top 1% of major leaguers. As
more players come through the game, more will be in that top 1%.
And, yes, it's pretty easy to argue that Smith,. Yount, Evans, Winfield,
etc. are in the top 1%. Dave Kingman on the other hand, was a liability
throughout most of his career.
Of course, Garvey *hasn't* gotten a lot of HOF press, so I don't know
what you mean.
As for Ryan, is his W-L better than Morris'? That's what a lot of voters
tend to look at. And Morris *was* awfully good for a decade, and doesn't
lead MLB history in walks allowed, either. | 2 | trimmed_train |
2,629 |
Pardon me, a humble atheist, but exactly what is the difference
between holding a revealed truth with blind faith as its basis (i.e.
regardless of any evidence that you may find to the contrary) as an
absolute truth, fully expecting people to believe you and arrogance?
They sound like one and the same to me.
And nearly every time I meet a christian (or for that matter, any
other theist) who tries to convert me, I find this proven over and over
again.
I see no wisdom whatsoever in your words
Unfaithfully yours,
Pixie
p.s. If you do sincerely believe that a god exists, why do you follow
it blindly?
Do the words "Question Authority" mean anything to you? | 0 | trimmed_train |
4,565 | As the subject suggests the Flames were not impressive this afternoon,
dropping a 6-3 decision to the LA Kings. Most of the Flames neglected
to show up, especially in their own zone, as the Kings hit at least
five posts! The Flames best line was probably
Skrudland-Paslawski-Berube (which tells how bad the Flames were). Gary
Suter scored a great goal (in fact all three Flame goals were scored
by D-men - Yawney and Dahlquist getting the others), but also made
some bonehead plays. For the Kings, Pat Conacher was especially
impressive.
The games was VERY chippy, as Dan Mirouelli lost control early and
never recovered it; there were high-sticks, cross-checks, punches,
hits from behind. Fleury got a game misconduct for rubbing out Warren
Rychel from behind. Flames dominated the game physically, but failed
to take advantage due to horrendous defensive lapses (I don't think
Vernon can be blamed for any of the goals). Calgary went with 7 D-men,
as Roger Johansson played LW; he looked lost IMHO - I hope King
inserts Chris Lindbergh, Paul Kruse, or Sergei Makarov for Wednesday's
game. Gretzky left the game in the 2nd period with a charley-horse; no
idea how serious - he didn't return.
I still think the Flames should win this series, but they better
buckle down. | 17 | trimmed_train |
5,721 | 4 | trimmed_train |
|
1,833 |
Hank Greenberg would have to be the most famous, because his Jewish
faith actually affected his play. (missing late season or was it world
series games because of Yom Kippur)
| 2 | trimmed_train |
2,722 | I remember hearing a few years back about a new therapy for hyperactivity
which involved aggressively eliminating artificial coloring and flavoring
from the diet. The theory -- which was backed up by interesting anecdotal
results -- is that certain people are just way more sensitive to these
chemicals than other people. I don't remember any connection being made
with seizures, but it certainly couldn't hurt to try an all-natural diet.
| 19 | trimmed_train |
4,115 | I don't
Well, no problem! But I get pretty annoyed when they swing at non-strikes
and make outs. Especially ball four on the 3-2 counts...
Dave | 2 | trimmed_train |
9,491 | My friend brought a subaru SVX recently. I had drove it for couples times and I
think its a great car, esp on snow. However when she took it to a local Subaru
dealer for a oil change, the bill came out to be about 80 dollars. The dealer
told us it is because to change the oil filter on a SVX it is necessary to
disassemble a metal cover under the engine and that took an hour of labour.
At first, we think we are being ripped off so she phone to a dealer in Toronto
but found out the they are charging roughly the same price. So is there any
SVX owner out there that has the same problem ? And if the oil change story is
true, then the engineer of Subaru looks pretty stubid to me. By the way, the car
looks great. | 4 | trimmed_train |
9,696 | I have seen several ray-traced scenes (from MTV or was it
RayShade??) with stroked fonts appearing as objects in the image.
The fonts/chars had color, depth and even textures associated with
them. Now I was wondering, is it possible to do the same in POV??
Thanks, | 1 | trimmed_train |
894 |
The Greeks did try to invade Cyprus just before the Turkish intervention: They
failed. Just for your info. | 6 | trimmed_train |
5,003 | Somewhere in this thread, it has been said that Windows NT (tm) is a
multi-user OS, as well as multi-threading, etc. I certainly haven't
seen this to be the case. There are seperate accounts for each person,
and even seperate directories if that is desired. I don't see an
implentation of simultaneuos use though.
Scott
-- | 18 | trimmed_train |
11,090 |
Actually, what I think has become more evident, is that you are determined to
flaunt your ignorance at all cost. Jagr did not have a better season than
Francis ... to suggest otherwise is an insult to those with a modicum of
hockey knowledge. Save your almost maniacal devotion to the almighty
plus/minus ... it is the most misleading hockey stat available.
Until the NHL publishes a more useful quantifiable statistic including ice
time per game and some measure of its "quality" (i.e., is the player put out
in key situations like protecting a lead late in the game; is he matched up
against the other team's top one or two lines; short-handed, etc), I would
much rather see the +/- disappear altogether instead of having its dubious
merits trumpeted by those with little understanding of its implications.
Brad
--
------------------------------------------------------------------------------
Brad K. Gibson INTERNET: [email protected]
Dept. of Geophysics & Astronomy
#129-2219 Main Mall PHONE: (604)822-6722
University of British Columbia FAX: (604)822-6047
Vancouver, British Columbia, Canada
V6T 1Z4 | 17 | trimmed_train |
10,268 |
From where I come from in Canada, Borshevsky sounds more Canadian than
Smith! -)
Anyways, crawl back into the hole you crawled out of...the NBA doesn't
care where they get basketball players from, major league baseball
doesn't give a damn where they get baseball players from (except Cuba,
that is).
Canada is in no imminent danger of being overtaken as the primary
supplier of players...Sweden, Finland, the Czech Republic, and Slovakia
are all relatively small countries, and cannot really produce players
at a greater rate than they are already producing them, and the
potential influx from the former Soviet Union is severely blunted
because the system has been raided and is starved for finances and
will take a decade or two, to recover and become a real threat, and
the US will just maintain its slow increase. Canada should continue
to supply 60% plus of the top hockey players in the world for the
forseeable future.
Besides we need the European hockey market if hockey is to take
its rightful place besides soccer as the two predominant world
sports...and since soccer is essentially boring, unlike hockey.
Canadians are under no threat...the European numbers will soon saturate,
if they haven't already...and by the time Russia comes online again,
the NHL should be a world league, and there will be many more teams
to stock and many more jobs for Canadian hockey players. In the near
team, the percentage of Canadians will mostly decline because of
Americans, not because of Europeans.
Crawl into a hole and die...
| 17 | trimmed_train |
4,657 | You forget that Apollo was a Government program and had to start
relatively from scratch. Some people at NASA think that this could work.
One of them replied to me personally after I posted this original message
several days ago. I have heard Jerry Pournelle suggest this idea before.
| 10 | trimmed_train |
5,586 | Archive-name: typing-injury-faq/software
Version: 1.8, 7th December 1992
This FAQ is actually maintained by Richard Donkin <[email protected]>.
I post it, along with the other FAQ stuff. If you have questions, you want
to send mail to Richard, not me. -- Dan
Software Tools to help with RSI
-------------------------------
This file describes tools, primarily software, to help prevent or manage RSI.
This version now includes information on such diverse tools as calendar
programs and digital watches...
Please let me know if you know any other tools, or if you have information
or opinions on these ones, and I will update this FAQ.
I am especially interested in getting reviews of these products from people
who have evaluated them or are using them.
Richard Donkin
Internet mail: [email protected]
Tel: +44 71 814 5708 (direct)
Fax: +44 71 251 2853
Changes in this version:
Added information on StressFree, another typing management tool
for Windows.
TYPING MANAGEMENT TOOLS: these aim to help you manage your keyboard use,
by warning you to take a break every so often. The better ones also include
advice on exercises, posture and workstation setup. Some use sound hardware to
warn of a break, others use beeps or screen messages.
Often, RSI appears only after many years of typing, and the pain has
a delayed action in the short term too: frequently you can be typing
all day with little problem and the pain gets worse in the evening.
These tools act as an early warning system: by listening to their
warnings and taking breaks with exercises, you don't have to wait for your
body to give you a more serious and painful warning - that is, getting RSI.
Tool: At Your Service (commercial software)
Available from:
Bright Star
Tel: +1 (206) 451 3697
Platforms: Mac (System 6.0.4), Windows
Description:
Provides calendar, keyboard watch, email watch, and system info.
Warns when to take a break (configurable). Has a few recommendations
on posture, and exercises. Sound-oriented, will probably work best
with sound card (PC) or with microphone (Mac). Should be possible
to record your own messages to warn of break.
Tool: AudioPort (sound card and software)
Available from:
Media Vision
Tel: +1 (510) 226 2563
Platforms: PC
Description:
A sound card to plug into your PC parallel port.
Includes 'At Your Service'.
Tool: Computer Health Break (commercial software)
Available from:
Escape Ergonomics, Inc
1111 W. El Camino Real
Suite 109
Mailstop 403
Sunnyvale, CA
Tel: +1 (408) 730 8410
Platforms: DOS
Description:
Aimed at preventing RSI, this program warns you to take
breaks after a configurable interval, based on clock time, or
after a set number of keystrokes -- whichever is earlier.
It gives you 3 exercises to do each time, randomly selected from
a set of 70. Exercises are apparently tuned to the type of work
you do - data entry, word processing, information processing.
Exercises are illustrated and include quite a lot of text on
how to do the exercise and on what exactly the exercise does.
CHB includes hypertext information on RSI that you can use
to learn more about RSI and how to prevent it. Other information
on non-RSI topics can be plugged into this hypertext viewer.
A full glossary of medical terms and jargon is included.
CHB can be run in a DOS box under Windows, but does not then
warn you when to take a break; it does not therefore appear
useful when used with Windows.
Cost: $79.95; quantity discounts, site licenses.
Comments:
The keystroke-counting approach looks good: it seems better
to measure the activity that is causing you problems than to
measure clock time or even typing time. The marketing stuff
is very good and includes some summaries of research papers,
as well as lots of arguments you can use to get your company
to pay up for RSI management tools.
Tool: EyerCise (commercial software)
Available from:
RAN Enterprises
One Woodland Park Dr.
Haverhill, MA 01830, US
Tel: 800-451-4487 (US only)
Platforms: Windows (3.0/3.1), OS/2 PM (1.3/2.0) [Not DOS]
Description:
Aimed at preventing RSI and eye strain, this program warns you to take
breaks after a configurable interval (or at fixed times). Optionally
displays descriptions and pictures of exercises - pictures are
animated and program beeps you to help you do exercises at the
correct rate. Includes 19 stretches and 4 visual training
exercises, can configure which are included and how many repetitions
you do - breaks last from 3 to 7 minutes. Also includes online help
on workplace ergonomics.
Quote from their literature:
"EyerCise is a Windows program that breaks up your day with periodic
sets of stretches and visual training exercises. The stretches work
all parts of your body, relieving tension and helping to prevent
Repetitive Strain Injury. The visual training exercises will improve
your peripheral vision and help to relieve eye strain. Together these
help you to become more relaxed and productive."
"The package includes the book _Computers & Visual Stress_ by Edward C.
Godnig, O.D. and John S. Hacunda, which describes the ergonomic setup
for a computer workstation and provides procedures and exercises to
promote healthy and efficient computer use.
Cost: $69.95 including shipping and handling, quantity discounts
for resellers. Free demo ($5 outside US).
Comments:
I have a copy of this, and it works as advertised: I would say
it is better for RSI prevention than RSI management, because it
does not allow breaks at periods less than 30 minutes. Also, it
interrupts you based on clock time rather than typing time, which
is not so helpful unless you use the keyboard all day. Worked OK on
Windows 3.0 though it did occasionally crash with a UAE - not sure
why. Also refused to work with the space bar on one PC, and has
one window without window controls. Very usable though, and does not
require any sound hardware.
Tool: Lifeguard (commercial software)
Available from:
Visionary Software
P.O. Box 69447
Portland, OR 97201, US
Tel: +1 (503) 246-6200
Platforms: Mac, DOS (Windows version underway)
Description:
Aimed at preventing RSI. Warns you to take a break
with dialog box and sound. Includes a list of exercises
to do during breaks, and information on configuring your
workstation in an ergonomic manner. Price: $59;
quantity discounts and site licenses. The DOS product is
bought in from another company, apparently; not sure how
equivalent this is to the Mac version.
The Mac version got a good review in Desktop Publisher
Magazine (Feb 1991). Good marketing stuff with useful
2-page summaries of RSI problems and solutions, with
references.
Tool: StressFree (commercial software, free usable demo)
Available from:
LifeTime Software
P.O. Box 87522
Houston
Texas 77287-7522, US
Tel: 800-947-2178 (US only)
Fax: +1 (713) 474-2067
Mail: [email protected]
Demo (working program but reduced functions) available from:
Compuserve: Windows Advanced Forum, New Uploads section, or
Health and Fitness Forum, Issues At Work section.
Anon FTP: ftp.cica.indiana.edu (and mirroring sites)
Platforms: Windows (3.0/3.1) (Mac and DOS versions underway)
Description:
Aimed at preventing RSI, this program warns you to take
breaks after a configurable interval (or at fixed times).
Displays descriptions and pictures of exercises - pictures are
animated and program paces you to help you do exercises at the
correct rate. Quite a few exercises, can configure which ones
are included to some extent. Online help.
Version 2.0 is out soon, Mac and DOS versions will be based
on this.
Cost: $29.95 if support via CompuServe or Internet, otherwise $39.95.
Site license for 3 or more copies is $20.00 each.
(NOTE: prices may have gone up for V2.0).
Comments:
I have had a play with this, and it works OK. Its user interface
design is much better in 2.0, though still a bit unusual.
expensive tool around and it does the job. It is also the only
tool with a redistributable demo, so if you do get the demo, post it
on your local bulletin boards, FTP servers and Bitnet servers!
Does not include general info on RSI and ergonomics, but it does
have the ability to step backward in the exercise sequence,
which is good for repeating the most helpful exercises.
Tool: Typewatch (freeware), version 3.8 (October 1992)
Available from:
Email to [email protected]
Anonymous ftp: soda.berkeley.edu:pub/typing-injury/typewatch.shar
Platforms: UNIX (tested on SCO, SunOS, Mach; character and X Window mode)
Description:
This is a shell script that runs in the background and warns you
to stop typing, based on how long you have been continuously
typing. It does not provide exercises, but it does check
that you really do take a break, and tells you when you
can start typing again.
Typewatch now tells you how many minutes you have been typing
today, each time it warns you, which is useful so you
know how much you *really* type. It also logs information
to a file that you can analyse or simply print out.
The warning message appears on your screen (in character mode),
in a pop-up window (for X Windows), or as a Zephyr message
(for those with Athena stuff). Tim Freeman <[email protected]>
has put in a lot of bug fixes, extra features and support for
X, Zephyr and Mach.
Not formally supported, but email [email protected]
(for SCO, SunOS, character mode) or [email protected] (for Mach,
X Window mode, Zephyr) if you have problems or want to give
feedback.
Tool: Various calendar / batch queue programs
Available from:
Various sources
Platforms: Various
Description:
Any calendar/reminder program that warns you of an upcoming
appointment can be turned into an ad hoc RSI management tool.
Or, any batch queue submission program that lets you submit
a program to run at a specific time to display a message to
the screen.
Using Windows as an example: create a Calendar file, and
include this filename in your WIN.INI's 'load=' line so
you get it on every startup of Windows. Suppose you
want to have breaks every 30 minutes, starting from 9 am.
Press F7 (Special Time...) to enter an appointment, enter
9:30, hit Enter, and type some text in saying what the break
is for. Then press F5 to set an alarm on this entry, and repeat
for the next appointment.
By using Windows Recorder, you can record the keystrokes
that set up breaks throughout a day in a .REC file. Put this
file on your 'run=' line, as above, and you will then, with
a single keypress, be able to set up your daily appointments
with RSI exercises.
The above method should be adaptable to most calendar programs.
An example using batch jobs would be to submit a simple job
that runs at 9:30 am and warns you to take a break; this will
depend a lot on your operating system.
While these approaches are not ideal, they are a good way of forcing
yourself to take a break if you can't get hold of a suitable RSI
management tool. If you are techie enough you might want to
write a version of Typewatch (see above) for your operating
system, using batch jobs or whatever fits best.
Tool: Digital watches with count-down timers
Available from:
Various sources, e.g. Casio BP-100.
Description:
Many digital watches have timers that count down from a settable
number of minutes; they usually reset easily to that number, either
manually or automatically.
While these are a very basic tool, they are very useful if you
are writing, reading, driving, or doing anything away from
a computer which can still cause or aggravate RSI. The great
advantage is that they remind you to break from whatever you
are doing.
Comments:
My own experience was that cutting down a lot on my typing led to
my writing a lot more, and still reading as much as ever, which
actually aggravated the RSI in my right arm though the left
arm improved. Getting a count-down timer watch has been
very useful on some occasions where I write a lot in a day.
I have tried an old fashioned hour-glass type egg timer, but
these are not much good because they do not give an audible
warning of the end of the time period!
KEYBOARD REMAPPING TOOLS: these enable you to change your keyboard mapping
so you can type one-handedly or with a different two-handed layout.
One-handed typing tools may help, but be VERY careful about how
you use them -- if you keep the same overall typing workload you
are simply doubling your hand use for the hand that you use for typing,
and may therefore make matters worse.
Tool: hsh (public domain)
Available from:
Anonymous ftp: soda.berkeley.edu:pub/typing-injury/hsh.shar
Platforms: UNIX (don't know which ones)
Description:
Allows one-handed typing and other general keyboard remappings.
Only works through tty's (so, you can use it with a terminal or
an xterm, but not most X programs).
Tool: Dvorak keyboard tools (various)
Available from:
Anonymous ftp: soda.berkeley.edu:pub/typing-injury/xdvorak.c
Also built into Windows 3.x.
Description:
The Dvorak keyboard apparently uses a more rational layout
that involves more balanced hand use. It *may* help prevent
RSI a bit, but you can also use it if you have RSI, since
it will slow down your typing a *lot* :-)
| 19 | trimmed_train |
3,490 |
My speculation does not include or depend upon a trapdoor in RSAREF. I
do not believe that RSA would consent to such.
However, there are other limitation in the concept of RSAREF in which
NSA has an interest. It has an interest in a limited number of
implementations, i.e., targets. It has an interest in fixed key or
maximum modulus size.
It has a legitimate (literally) right to pursue such interests. Within
bounds, it probably has a right to pursue those interests by covert
means. At least it has the same right as the rest of us not to disclose
all of its motives and intentions. (Institutions are not self-aware;
they do not know their intentions in any meaningful sense.) | 7 | trimmed_train |
6,927 | Is it possible to buy a serial I/O card with the 16550 UART's built in
(rather than having to buy them separately, and socketing them in)?
My current I/O card uses 8250's (correct number? The braindead ones anyway).
It also controls two floppy drives, and two IDE hard drives.
Ideally, I'd like to get a new multi I/O card, that had 2 serial ports with
16550's and could also control another 2 IDE HD's. It would have to have
configurable addresses for both the serial ports, and the IDE controller, so
it could co-exist with my existing card.
Does such a beast exist? Now the hard part - where can I get one in Australia,
preferably Brisbane? | 3 | trimmed_train |
2,132 | I have the following items for sale:
Animation Works software for Macintosh by Gold Disk
This is a brand new shrink-wrapped copy
Microsoft Excel for Windows Ver. 4.0
Opened, but includes everything including Registration card
Video7 FastWrite VGA card. 512 video memory. 800x600 resolution.
Everex 2400b internal modem.
Video card and the modem are used items.
If you are interested make a reasonable offer. I wish to ship these
UPS COD.
Please email me at [email protected].
Thank you. | 5 | trimmed_train |
10,191 |
I need (probably) to write one or more new Motif widgets on the HP-UX
platform. Do I need the Motif private header files and source,
or can I make do with the public headers that are provided?
"Motif" includes Xt in this context.
Yes. You'll find it almost impossible without the source
at this point. It does depend on how ambitious you are and
how concerned you are about compliance with the general
interface and items like traversal.
One widget is a multi-column list (which lots of people have
already written, I am sure), and would therefore be probably be
a subclass of List rather than something simple like an Xt class.
Is this more difficult (in principle, not lines of code)?
I'm not sure what you're asking. You could create something
which is very much like a true multi-column list by placing
several lists within a geometry manager, and putting that
manager within an automatic scrolled window. This wouldn't
be good for very large lists, but you might consider this
as an alternative.
Alternatively, if anyone has a multi-column list widget they
could sell me, this might save me from having to write one!
Does it by any chance exist in Motif 1.2 already (I do not
yet have the spec)?
Motif 1.2 does not have a multi-column list in it. Have you
looked at commercial sets? There are also some PD
widget sets, one of these might have a multi-column list
you could port.
| 16 | trimmed_train |
9,442 | Hi,
I'm in the market for an internal color video adaptor for my PB 145. I
was wondering if anyone has used the PowerVision adaptor made by
Mirror. If so, can you tell me how feel about the speed and
compatability of it? I might also be interested in other boards by
Envisio etc., so if you have such a board please e-mail your opinion of
it. Thanks in advance. | 14 | trimmed_train |
4,966 | I'll contact you offline about this. | 1 | trimmed_train |
4,555 | "Bare" = case, a power supply, and a motherboard (with RAM and a coprocessor).
Everything else is yours to add as you like.
The motherboard:
- US-made Micronics 8-slot motherboard with Intel 386dx/25mhz CPU
- 64kb SRAM cache
- 4mb 80us RAM using 4x1mb simms (worth $120 alone)
- Cyrix 83D87 math coprocessor (worth $90 alone)
- Norton SI 6.0 rating of 26.1
- Latest version Phoenix BIOS
The case/power supply:
- Standard desktop case. 230watt power supply with the usual connectors.
- Room for five floppy/hard drives (three visible, two internal).
*New* Micronics CPUs often command a several-hundred dollar premium
over clone motherboards because they are US-made, use high-quality
components, and are known to be both very reliable and compatible. They
have been OEMed in systems sold by both Gateway and Zeos at various
points in the past. (Check out the ads in the back pages of Byte or PC
Magazine if you want to see this price differential for yourself.)
Price: $450 complete, $100 less if you don't want/need the case and
power supply. The board is fully guaranteed. Email for further details
or for any questions.
Thanks! | 5 | trimmed_train |
962 | Has anyone taken a look at the new ViewSonic 17? They claim 1280x1024 at 76Hz.
How does it compare with the T560i in terms of price, and quality of display?
| 3 | trimmed_train |
1,312 | I agree. It was great for the ESPN people to show the Detroit game. (My
roommate just about sh*t when they threw the octopus on the ice. (Thanks
for explaining the significance of that BTW)) The only problem I had was
when they blotted out the local commentators with the baseball ads and
music. Especially when the wings player hit the rut and went into the
boards injuring his shoulder and they blotted out the injury report. Other
then that, hats off to ESPN. Now if they'll only make a habit of this. Yeah
right! Baseball seasons started (Zzzzzz.....) =)
KOZ | 17 | trimmed_train |
1,437 |
Really!?
Methinks somethings wrong with _your_ bike.
Perhaps you meant _pull_?
Pushing the right side of my handlebars _will_ send me left.
It should.
REally.
I'm sure others will take up the slack...
| 12 | trimmed_train |
472 | Hello Hockey fans.
Bonjour tout le monde!
Well, in Salt Lake City this past Sunday, the local ABC station decided not
to televise the hockey games. La directrous de programme est la tete de merde!
Anyway, I have a satellite dish, and a few of my friends from hockey have invited themselves over to watch the games this coming Sunday (25 Apr), and I can
not find correct game times. For the Calgary at LA game I have times showing
everything from 11:00 AM MDT, to 5:00 PM MDT.
I am not even sure what games are going to be played this coming Sunday, now
that ABC has mucked up the schedule. I think I should be able to
pull in
three games (11:00 am, 2:00 pm, and 5:30 pm MDT) off the dish, but I am
not sure.
IF anybody has a schedule, pleas emial it to me. As you can see, I have to
telent to get rec.sport.hockey, and it is sometimes difficult to get a link.
Thanks in advance
Merci d'avance
P.S. Anglais ou francais d'accord.
Roland Behunin
[email protected]
[email protected] | 17 | trimmed_train |
8,517 |
So why don't ypu sue him.
---- | 6 | trimmed_train |
7,697 |
As one who was born in Quebec and worked in Montreal, I feel I must
defend the reputation of McGill University. It is a fine, old,
creditable institution of higher learning.
Thus, I can only assume that some under graduate student left his/her
terminal on-line and the janitor has been getting access to it. | 6 | trimmed_train |
4,132 |
John,
While I will not take the time to rebut you point by point, I will suggest
three current works which I think will be helpful in your quest to answer
this question. John Dominic Crossan (Professor of Religion at De Paul Univ)-
_The Cross That Spoke_ Harper and Row Pub. 1988, Also his latest work
_The Historical Jesus - The Life of A Mediterranean Jewish Peasant_ Harper
and Row Pub. 1991, Also two works of Burton Mack (Professor of New Testament
at the Claremont Graduate School) _A Myth of Innocence_ Fortress Press 1988,
And his latest book _The Lost Gospel: The Book of Q and Christian Origins_
Harper and Row, 1992. You might start with Mack's book on Q and then
examine the others afterward. However I think that once you do that you will
see that your "evidence" is not as sturdy as you'd like. Most of the tired
arguements you stated, assume eyewitness accounts, such is not the case. But
Anyway look at Mack and Crossan and then get back to us. | 0 | trimmed_train |
5,468 | Does anyone know the phone number to a place where i can get
a VGA passthrough?
I want to hook up my VGA card to my XGA card (whcih you can can).
All I need is the cable that connects them. It is the same type of
cable that you would connect from your VGA card to say a Video Blaster
or something. | 1 | trimmed_train |
1,474 |
Hey, I'm a "Macho Real Man" and I DO read it. So I can criticize
it all I want, especially since I pay for the publication. (They
accept no outside advertising, don't you know....)
Relying on Consumer Reports to pick your automobiles is like
letting Field & Stream select your living room furniture. | 4 | trimmed_train |
1,336 | Quoting [email protected] in article <[email protected]>:
| 7 | trimmed_train |
6,842 | There is a multi threaded xlib version written.
Do an archie search for mt-xlib:
Host export.lcs.mit.edu
Location: /contrib
DIRECTORY drwxr-xr-x 512 Jul 30 1992 mt-xlib
Location: /contrib/mt-xlib-1.1
FILE -rw-r--r-- 106235 Jan 21 14:02 mt-xlib-xhib92.ps.Z
FILE -rw-r--r-- 1658123 Jan 21 14:03 mt-xlib.tar.Z
Location: /contrib/mt-xlib
FILE -rw-r--r-- 106235 Jul 30 1992 mt-xlib-xhib92.ps.Z
FILE -rw-r--r-- 1925529 Jul 30 1992 mt-xlib.tar.Z | 16 | trimmed_train |
4,874 |
Mr. Salah, why are you such a homicidal racist? Do you feel this
same hatred towards Christans, or is it only Jews? Are you from
a family of racists? Did you learn this racism in your home? Or
are you a self-made bigot? How does one become such a racist? I
wonder what you think your racism will accomplish. Are you under
the impression that your racism will help bring peace in the mid-
east? I would like to know your thoughts on this.
| 6 | trimmed_train |
2,795 | I just had my 41 Chrysler painted. I was told to refrain from waxing it and
to leave it out in the sun!! Supposedly this let's the volatiles escape from
the paint over a month or so (I can smell it 15 feet away on a hot day) and
lets any slight irregularites in the surface flow out, as the paint remains
a little soft for a while.
| 4 | trimmed_train |
10,638 |
Actually, this is incorrect. French resistance may have played some
part in hindering the German war effort, however the crucial role was
supplied on D-Day.
Interesting statement. Especially when you consider that Lebanon
had claimed to have made progress in the peace talks, as well as
Israel. Of course, one of the prime obstacles to Israel's complete
withdrawal is the lack of governmental control that can be applied
to the area as well as the large presence of Syrian forces which
have not been asked to withdraw as well.
| 6 | trimmed_train |
4,352 | MLB Standings and Scores for Tuesday, April 6th, 1993
(including yesterday's games)
NATIONAL WEST Won Lost Pct. GB Last 10 Streak Home Road
Atlanta Braves 01 00 1.000 -- 1-0 Won 1 00-00 01-00
Cincinnati Reds 01 00 1.000 -- 1-0 Won 1 01-00 00-00
San Diego Padres 00 00 .000 0.5 0-0 --- 00-00 00-00
San Francisco Giants 00 00 .000 0.5 0-0 --- 00-00 00-00
Colorado Rockies 00 01 .000 1.0 0-1 Lost 1 00-00 00-01
Houston Astros 00 01 .000 1.0 0-1 Lost 1 00-01 00-00
Los Angeles Dodgers 00 01 .000 1.0 0-1 Lost 1 00-00 00-01
NATIONAL EAST
Florida Marlins 01 00 1.000 -- 1-0 Won 1 01-00 00-00
New York Mets 01 00 1.000 -- 1-0 Won 1 01-00 00-00
Philadelphia Phillies 01 00 1.000 -- 1-0 Won 1 00-00 01-00
Pittsburgh Pirates 00 00 .000 0.5 0-0 --- 00-00 00-00
St. Louis Cardinals 00 00 .000 0.5 0-0 --- 00-00 00-00
Chicago Cubs 00 01 .000 1.0 0-1 Lost 1 00-01 00-00
Montreal Expos 00 01 .000 1.0 0-1 Lost 1 00-00 00-01
AMERICAN WEST Won Lost Pct. GB Last 10 Streak Home Road
Oakland Athletics 01 00 1.000 -- 1-0 Won 1 01-00 00-00
Texas Rangers 01 00 1.000 -- 1-0 Won 1 00-00 01-00
California Angels 00 00 .000 0.5 0-0 --- 00-00 00-00
Chicago White Sox 00 00 .000 0.5 0-0 --- 00-00 00-00
Minnesota Twins 00 00 .000 0.5 0-0 --- 00-00 00-00
Seattle Mariners 00 00 .000 0.5 0-0 --- 00-00 00-00
Kansas City Royals 00 01 .000 1.0 0-1 Lost 1 00-01 00-00
AMERICAN EAST
Boston Red Sox 01 00 1.000 -- 1-0 Won 1 00-00 01-00
New York Yankees 01 00 1.000 -- 1-0 Won 1 00-00 01-00
Milwaukee Brewers 00 00 .000 0.5 0-0 --- 00-00 00-00
Toronto Blue Jays 00 00 .000 0.5 0-0 --- 00-00 00-00
Baltimore Orioles 00 01 .000 1.0 0-1 Lost 1 00-01 00-00
Cleveland Indians 00 01 .000 1.0 0-1 Lost 1 00-01 00-00
Detroit Tigers 00 01 .000 1.0 0-1 Lost 1 00-00 00-01
YESTERDAY'S SCORES
NATIONAL LEAGUE AMERICAN LEAGUE
Montreal 1 New York 9
Cincinnati 2 Cleveland 1
Atlanta 1 Texas 7
Chicago 0 Baltimore 4
Los Angeles 3 Boston 3
Florida 6 Kansas City 1
Philadelphia 3 Detroit 4
Houston 1 Oakland 9
Colorado 0 California IDLE
New York 3 Chicago IDLE
Pittsburgh IDLE Milwaukee IDLE
St. Louis IDLE Minnesota IDLE
San Diego IDLE Seattle IDLE
San FranciscoIDLE Toronto IDLE
--
-------------------------------------------------------------------------------
Joseph Hernandez | RAMS | | /.\ ******* _|_|_ / | LAKERS
[email protected] | KINGS | |__ | | DODGERS _|_|_ | | RAIDERS
[email protected] | ANGELS |____||_|_| ******* | | |___| CLIPPERS | 2 | trimmed_train |
4,682 | Archive-name: net-privacy/part2
Last-modified: 1993/3/3
Version: 2.1
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) 1993 L. Detweiler. Not for commercial use except by permission
from author, otherwise may be freely copied. Not to be altered.
Please credit if quoted.
SUMMARY
=======
Email and account privacy, anonymity, file encryption, academic
computer policies, relevant legislation and references, EFF, and
other privacy and rights issues associated with use of the Internet
and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 2
====== (this file)
Resources
---------
<4.1> What UNIX programs are related to privacy?
<4.2> How can I learn about or use cryptography?
<4.3> What is the cypherpunks mailing list?
<4.4> What are some privacy-related newsgroups? FAQs?
<4.5> What is internet Privacy Enhanced Mail (PEM)?
<4.6> What are other Request For Comments (RFCs) related to privacy?
<4.7> How can I run an anonymous remailer?
<4.8> What are references on privacy in email?
<4.9> What are some email, Usenet, and internet use policies?
<4.10> What is the MIT ``CROSSLINK'' anonymous message TV program?
Miscellaneous
-------------
<5.1> What is ``digital cash''?
<5.2> What is a ``hacker'' or ``cracker''?
<5.3> What is a ``cypherpunk''?
<5.4> What is `steganography' and anonymous pools?
<5.5> What is `security through obscurity'?
<5.6> What are `identity daemons'?
<5.7> What standards are needed to guard electronic privacy?
Issues
------
<6.1> What is the Electronic Frontier Foundation (EFF)?
<6.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<6.3> What was `Operation Sun Devil' and the Steve Jackson Game case?
<6.4> What is Integrated Services Digital Network (ISDN)?
<6.5> What is the National Research and Education Network (NREN)?
<6.6> What is the FBI's proposed Digital Telephony Act?
<6.7> What other U.S. legislation is related to privacy on networks?
<6.8> What are references on rights in cyberspace?
<6.9> What is the Computers and Academic Freedom (CAF) archive?
Footnotes
---------
<7.1> What is the background behind the Internet?
<7.2> How is Internet `anarchy' like the English language?
<7.3> Most Wanted list
<7.4> Change history
* * *
RESOURCES
=========
_____
<4.1> What UNIX programs are related to privacy?
For more information, type `man [cmd]' or `apropos [keyword]' at the
UNIX shell prompt.
passwd - change password
finger - obtain information about a remote user
chfn - change information about yourself obtainable by remote
users (sometimes `passwd -f')
chmod - change the rights associated with a file or directory
umask - (shell) change the default (on creation) file access
rights
ls - list the rights associated with files and directories
xhost - allow or disable access control of particular users to an
Xwindow server
last - list the latest user logins on the system and their
originations
who - list other users, login/idle times, originations
w - list other users and what they are running
xhost - access control list for X Window client use
xauth - control X Window server authentication
.signature - file in the home directory appended to USENET posts
.forward - file used to forward email to other accounts
.Xauthority - file used for X Window server authentication keys
$SIGNATURE - variable used for name in email and USENET postings
The 'tcpdump' packet-tracing program is loosely based on SMI's
"etherfind" although none of the etherfind code remains. It was
originally written by Van Jacobson, Lawrence Berkeley Laboratory,
as part of an ongoing research project to investigate and improve
tcp and internet gateway performance. A current version is
available via anonymous ftp from host ftp.ee.lbl.gov (currently at
address 128.3.254.68) file tcpdump.tar.Z (a compressed Unix tar
file). This program is subject to the 'standard' Berkeley network
software copyright.
_____
<4.2> How can I learn about or use cryptography?
A general introduction to mostly theoretical cryptographic issues,
especially those frequently discussed in sci.crypt, is available
in FAQ form:
> Compiled by:
> [email protected] (Carl Ellison)
> [email protected] (Doug Gwyn)
> [email protected] (Steven Bellovin)
NIST (U.S. National Institute for Standards and Technology)
publishes an introductory paper on cryptography, special
publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal
(April 1991). Available via anonymous FTP from
csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt.
Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z
in the crypto directory. Covers technical mathematical aspects
of encryption such as number theory.
More general information can be found in a FAQ by Paul Fahn of RSA
Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See
the `readme' file for information on the `tex' version. Also
available as hardcopy for $20 from RSA Laboratories, 100 Marine
Parkway, Redwood City, CA 94065. Send questions to
[email protected].
Phil Zimmerman's PGP (Pretty Good Privacy) public-domain package
for public key encryption is available at numerous sites, and is
in widespread use over the internet for general UNIX-based file
encryption (including email). Consult the archie FTP database.
Also see the newsgroup alt.security.pgp. Mailing list requests
to [email protected].
From the RIPEM FAQ by Marc VanHeyningen
<[email protected]> on news.answers:
> RIPEM is a program which performs Privacy Enhanced Mail (PEM)
> using the cryptographic techniques of RSA and DES. It allows
> your electronic mail to have the properties of authentication
> (i.e. who sent it can be confirmed) and privacy (i.e. nobody can
> read it except the intended recipient.)
>
> RIPEM was written primarily by Mark Riordan
> <[email protected]>. Most of the code is in the public domain,
> except for the RSA routines, which are a library called RSAREF
> licensed from RSA Data Security Inc.
>
> RIPEM is available via anonymous FTP to citizens and permanent
> residents in the U.S. from rsa.com; cd to rsaref/ and read the
> README file for info.
>
> RIPEM, as well as some other crypt stuff, has its `home site' on
> rpub.cl.msu.edu, which is open to non-anonymous FTP for users in
> the U.S. and Canada who are citizens or permanent residents. To
> find out how to obtain access, ftp there, cd to pub/crypt/, and
> read the file GETTING_ACCESS.
Note: cryptography is generally not well integrated into email yet
and some system proficiency is required by users to utilize it.
_____
<4.3> What is the cypherpunks mailing list?
Eric Hughes <[email protected]> runs the `cypherpunk' mailing list
dedicated to ``discussion about technological defenses for privacy
in the digital domain.'' Send email to
[email protected] to be added or subtracted from the
list. From the charter:
> The most important means to the defense of privacy is encryption.
> To encrypt is to indicate the desire for privacy. But to encrypt
> with weak cryptography is to indicate not too much desire for
> privacy. Cypherpunks hope that all people desiring privacy will
> learn how best to defend it.
_____
<4.4> What are some privacy-related newsgroups? FAQs?
Newsgroups
==========
alt.comp.acad-freedom.news
alt.comp.acad-freedom.talk
--------------------------
Moderated and unmoderated issues related to academic freedom and
privacy at universities. Documented examples of violated
privacy in e.g. email. Documented examples of `censorship' as
in e.g. limiting USENET groups local availability.
alt.cyberpunks
--------------
Virtual reality, (science) fiction by William Gibson and Bruce
Sterling, cyberpunk in the mainstream.
alt.hackers
-----------
USENET Network News Transfer Protocol (NNTP) posting mechanisms,
Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports.
alt.privacy
-----------
General privacy issues involving taxpaying, licensing, social
security numbers, etc.
alt.security
comp.security.misc
------------------
Computer related security issues. FAQ in news.answers below.
alt.security.pgp
alt.security.ripem
----------------
Dedicated to discussing public domain cryptographic software
packages: PGP, or ``Pretty Good Privacy'' Software developed by
Phil Zimmerman for public key encryption, and RIPEM by Mark
Riordan for public key and DES encryption.
comp.society.privacy
--------------------
Privacy issues associated with computer technologies. Examples:
caller identification, social security numbers, credit
applications, mailing lists, etc. Moderated.
comp.eff.news
comp.eff.talk
-------------
Moderated and unmoderated groups associated with the Electronic
Frontier Foundation started by Mitch Kapor for protecting civil
and constitutional rights in the electronic realm.
news.admin
news.admin.policy
-----------------
Concerns of news administrators. NNTP standards and mechanisms.
news.lists
----------
USENET traffic distributions. Most frequent posters, most
voluminous groups, most active sites, etc.
sci.crypt
---------
Considers scientific and social issues of cryptography.
Examples: legitimate use of PGP, public-key patents, DES,
cryptographic security, cypher breaking, etc.
FAQs
====
FAQs or ``Frequently-Asked Questions'' are available in the
newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu
[18.172.1.27] (also rtfm.mit.edu) from the directory
/pub/usenet/news.answers/[x] where [x] is the archive name. This
FAQ is archived in the file `net-privacy'. Others are:
network-info/part1
------------------
Sources of information about the Internet and how to connect to
it, through the NSF or commercial vendors.
alt-security-faq
----------------
Computer related security issues arising in alt.security and
comp.security.misc, mostly UNIX related.
ssn-privacy
-----------
Privacy issues associated with the use of the U.S. Social
Security number (SSN).
pdial
-----
Public dialup internet accounts list.
college-email/part1
-------------------
How to find email addresses for undergraduate and graduate
students, faculty and staff at various colleges and
universities.
ripem/faq
---------
Information on RIPEM, a program for public key mail encryption
officially sanctioned by Public Key Partners Inc., the company
that owns patents on public key cryptography.
unix-faq/faq/part1
------------------
Frequently-asked questions about UNIX, including information on
`finger' and terminal spying.
distributions/*
---------------
Known geographic, university, and network distributions.
_____
<4.5> What is internet Privacy Enhanced Mail (PEM)?
Internet drafts on Privacy Enhanced Mail (PEM) describe a standard
under revision for six years delineating the official protocols for
email encryption. The standard has only recently stabilized and
implementations are being developed.
- RFC-1421: ``Privacy Enhancement for Internet Electronic Mail:
Part I: Message Encryption and Authentication Procedures.'' J.
Linn <[email protected]>
- RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part
II: Certificate-Based Key Management'' S. Kent <[email protected]>
- RFC-1424: ``Privacy Enhancement for Internet Electronic Mail:
Part IV: Key Certification and Related Services'' B. Kaliski
<[email protected]>
- RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part
III: Algorithms, Modes, and Identifiers'' D. Balenson
<[email protected]>
Send email to [email protected] for more information. See ``RFCs
related to privacy'' for information on how to obtain RFCs.
_____
<4.6> What are other Requests For Comments (RFCs) related to privacy?
RFC-822: SMTP, Simple Mail Transfer Protocol
RFC-977: NNTP, Network News Transfer Protocol
RFC-1036: Standard for interchange of network news messages
RFC-1208: Glossary of Networking Terms
RFC-1207: Answers to ``experienced Internet user'' questions
RFC-1206: Answers to ``new Internet user'' questions
RFC-1355: Privacy issues in Network Information center databases
RFC-1177 is ``FYI: Answers to commonly asked ``new internet user''
questions, and includes: basic terminology on the Internet (TCP/IP,
SMTP, FTP), internet organizations such as IAB (Internet
Activities Board) and IETF (Internet Enbgineering Task Force), and
a glossary of terms. Also from ftp.eff.org:
/pub/internet-info/internet.q.
> RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname
> RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the
> number of the RFC). Login with FTP, username `anonymous' and
> password `guest'. The NIC also provides an automatic mail
> service for those sites which cannot use FTP. Address the
> request to [email protected] and in the subject field of the
> message indicate the RFC number, as in `Subject: RFC nnnn' (or
> `Subject: RFC nnnn.PS' for PostScript RFCs).
>
> RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP,
> login with username `anonymous' and password `guest'; then
> connect to the RFC directory (`cd RFC'). The file name is of the
> form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the
> RFC). The NIS also provides an automatic mail service for those
> sites which cannot use FTP. Address the request to
> [email protected] and leave the subject field of the message
> blank. The first line of the text of the message must be `SEND
> RFCnnnn.TXT-1', where nnnn is replaced by the RFC number.
_____
<4.7> How can I run an anonymous remailer?
Cypherpunk remailer source is at soda.berkeley.edu in the
/pub/cypherpunks directory. It's written in PERL, and is
relatively easy to install (no administrative rights are required).
Karl Barrus <[email protected]> has more information and
modifications. Also, most remailer operators mentioned above are
amenable to discussing features, problems, and helping new sites
become operational. Address all points in the section
``responsibities of anonymous use'' in this document prior to
advertising your service. You should be committed to the long-term
stability of the site and avoid running one surreptitiously.
_____
<4.8> What are references on privacy in email?
Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.''
Network World (Oct 29, 1990), 7.44: 2.
Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic
Business (June 11, 1990) 16 (11): 92.
``Electronic Envelopes - the uncertainty of keeping e-mail private''
Scientific American, February 1993.
ftp.eff.org
===========
/pub/eff/papers/email_privacy
---
Article on the rights of email privacy. by Ruel T. Hernandez.
/pub/academic/law/privacy.email
---
``Computer Electronic Mail and Privacy'', an edited version of a
law school seminar paper by Ruel T. Hernadez.
/pub/eff/papers/email-privacy-biblio-2
---
Compilation of bibliography on E-Mail and its privacy issues (part
2 of the work). Compiled by Stacy B. Veeder (12/91).
/pub/eff/papers/email-privacy-research
---
The author at Digital Research tried to formalize their employee
privacy policy on E-Mail. The casesightings are divided into two
groups: US Constitutional law, and California law.
/pub/eff/papers/company-email
---
Formulating a Company Policy on Access to and Disclosure of
Electronic Mail on Company Computer Systems by David R. Johnson
and John Podesta for the Electronic Mail Assocation
/pub/cud/alcor
---
Information on Alcor Co., an e-mail privacy suit.
/pub/academic/law/privacy.email
---
Email privacy search at Berkeley.
_____
<4.9> What are some email, Usenet, and internet use policies?
The Computer Policy and Critiques Archive is a collection of the
computer policies of many schools and networks, run by the
Computers and Academic Freedom group on the Electronic Frontier
Foundation FTP site. The collection also includes critiques of some
of the policies.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic/policies gopher.eff.org
>
> The archive is also accessible via anonymous ftp and email. Ftp
> to ftp.eff.org (192.88.144.4). It is in directory
> `pub/academic/policies'. For email access, send email to
> [email protected]. Include the line:
>
> send acad-freedom/policies <filenames>
>
> where <filenames> is a list of the files that you want. File
> README is a detailed description of the items in the directory.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield ([email protected]). Directory `widener'
> contains additional policies (but not critiques).
ftp.eff.org
===========
/pub/cud/networks
---
Acceptable Use Policies for various networks, including CompuServe
(file `compuserve'), NSFNET (file `nsfnet') with information on
research and commercial uses. See /pub/cud/networks/index.
/pub/cud/networks/email
---
Policies from various sysadmins about how they handle the issue of
email privacy, control, and abuse, compiled by T. Hooper
<[email protected]>.
/pub/cud/schools/
---
Computer use policies of a number of schools. See schools/Index
for a full list and description.
Commentary
==========
/pub/academic/faq/policy.best
---
Opinions on the best academic computer policies.
/pub/academic/faq/email.policies
---
Do any universities treat email and computer files as private?
/pub/academic/faq/netnews.writing
---
Policies on what users write on Usenet.
/pub/academic/faq/netnews.reading
---
Policies on what users read on Usenet: should my university remove
(or restrict) Netnews newsgroups because some people find them
offensive?
/pub/academic/faq/policy
---
What guidance is there for creating or evaluating a university's
academic computer policy?
______
<4.10> What is the MIT ``CROSSLINK'' anonymous message TV program?
> CROSSLINK is an anonymous message system run on MIT Student
> Cable TV-36. It provides an anonymous medium through which MIT
> students can say those things they might otherwise find
> difficult, inconvenient or impossible to say in person. It's
> also a way to send fun or totally random messages to your
> friends over the air. It is similar to the anonymous message
> pages found in many college newspapers, except that it's
> electronic in nature and it's free.
Messages can be posted to the service via email. For more
information send email to [email protected].
MISCELLANEOUS
=============
_____
<5.1> What is ``digital cash''?
With digital encryption and authentication technologies, the
possibility of a widespread digital cash system may someday be
realized. A system utilizing codes sent between users and banks
(similar to today's checking system except entirely digital) may
be one approach. The issues of cryptography, privacy, and
anonymity are closely associated with transfer of cash in an
economy. See the article in Scientific American by David Chaum
(~Dec.1992).
An experimental digital bank is run by Karl Barrus
<[email protected]> based on suggestions by Hal Finney on the
cypherpunks mailing list. To use the server send mail to
[email protected] message with the following text:
::
command: help
user@host
where `user@host' is your email address.
_____
<5.2> What is a ``hacker'' or ``cracker''?
These terms arouse strong feelings by many on their meaning,
especially on the internet. In the general news media in the past
a person who uses computers and networks to malicious ends (such as
breaking into systems) has been referred to as a hacker, but most
internet users prefer the term ``cracker'' for this. Instead, a
``hacker'' is perceived as a benign but intensely ambitious,
curious, and driven computer user who explores obscure areas of a
system, for example---something of a proud electronic pioneer and
patriot. This is the sense intended in this document. See also
the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'.
_____
<5.3> What is a ``cypherpunk''?
From the charter of the cypherpunk mailing list:
> Cypherpunks assume privacy is a good thing and wish there were
> more of it. Cypherpunks acknowledge that those who want privacy
> must create it for themselves and not expect governments,
> corporations, or other large, faceless organizations to grant
> them privacy out of beneficence. Cypherpunks know that people
> have been creating their own privacy for centuries with whispers,
> envelopes, closed doors, and couriers. Cypherpunks do not seek
> to prevent other people from speaking about their experiences or
> their opinions.
See information on the cypherpunk mailing list below.
See also the CryptoAnarchist Manifesto and the Cryptography Glossary
in soda.berkeley.edu:/pub/cypherpunks.
_____
<5.4> What is `steganography' and anonymous pools?
Closely associated with encryption is `steganography' or the
techniques for not only pursuing private (encrypted) communication
but concealing the very existence of the communication itself.
Many new possibilities in this area are introduced with the
proliferation of computer technology. For example, it is possible
to encode messages in the least-significant bits of images,
typically the most 'noisy'. In addition, when such an item is
posted in a public place (such as a newsgroup), virtually
untraceable communication can take place between sender and
receiver. For steganographic communications in the electronic
realm one another possibility is setting up a mailing list where
individual messages get broadcast to the entire list and individual
users decode particular messages with their unique key. An
anonymous pool has been set up by Miron Cuperman
([email protected]) for experiments. Send email to
<[email protected]> with one of the following
commands in the subject line:
subscribe
unsubscribe
help
_____
<5.5> What is `security through obscurity'?
`Security through obscurity' refers to the attempt to gain
protection from system weaknesses by hiding sensitive information
or programs relating to them. For example, a company may not make
public information on its software's encryption techniques to evade
`attacks' based on knowledge of it. Another example would be
concealing data on the existence of security holes or bugs in
operating systems. Or, some reliance may be made on the fact that
some standard or mechanism with potential problems is serious
because they are ``not widely known'' or ``not widely used.'' This
argument is occasionally applied to mechanisms for email and Usenet
posting `forgery'. `Security through obscurity' is regarded as a
very feeble technique at best and inappropriate and ineffective at
worst (also called the ``head-in-the-sand approach''). See the FAQ
for alt.security.
Some remarks of John Perry Barlow, cofounder of the Electronic
Frontier Foundation, directed to NSA agents at the First
International Symposium on National Security & National
Competitiveness held in McLean, Virginia Dec. 1, 1992:
> Digitized information is very hard to stamp classified or keep
> contained. ... This stuff is incredibly leaky and volatile. It's
> almost a life form in its ability to self-propagate. If
> something hits the Net and it's something which people on there
> find interesting it will spread like a virus of the mind. I
> believe you must simply accept the idea that we are moving into
> an environment where any information which is at all interesting
> to people is going to get out. And there will be very little
> that you can do about it. This is not a bad thing in my view,
> but you may differ...
_____
<5.6> What are `identity daemons'?
RFC-931 describes a protocol standard that allows UNIX programs to
query a remote user's login name after connection to a local
communication socket (a connection of this type is established
during FTP and TELNET sessions, for example). The standard is not
widely supported, perhaps 10% of internet sites currently implement
it but the number is increasing. The mechanism is detrimental to
anonymity. Regular users cannot disable it but system
adminstrators can circumvent it. This standard may represent a
trend toward greater authentication mechanisms.
_____
<5.7> What new standards are needed to guard electronic privacy?
Remailing/Posting
-----------------
- Stable, secure, protected, officially sanctioned and permitted,
publicly and privately operated anonymous servers and hubs.
- Official standards for encryption and anonymity in mail and USENET
postings.
- Truly anonymous protocols with source and destination information
obscured or absent and hidden routing mechanisms (chaining,
encrypted addresses, etc.)
- Standards for anonymous email addressing, embedding files, and
remailer site chaining.
General
-------
- Recognition of anonymity, cryptography, and related privacy
shields as legitimate, useful, desirable, and crucial by the
general public and their governments.
- Widespread use and implementation of these technologies
by systems designers into
hardware, software, and standards, implemented `securely,'
`seamlessly,' and `transparently'.
- General shift of use, dependence, and reliance to means other than
wiretapping and electronic surveillance by law enforcement
agencies.
- Publicity, retraction, and dissolution of laws and government
agencies opposed to privacy, replaced by structures dedicated to
strengthening and protecting it.
ISSUES
======
_____
<6.1> What is the Electronic Frontier Foundation (EFF)?
From ftp.eff.org:/pub/EFF/mission_statement:
> A new world is arising in the vast web of digital, electronic
> media which connect us. Computer-based communication media like
> electronic mail and computer conferencing are becoming the basis
> of new forms of community. These communities without a single,
> fixed geographical location comprise the first settlements on an
> electronic frontier.
>
> While well-established legal principles and cultural norms give
> structure and coherence to uses of conventional media like
> newspapers, books, and telephones, the new digital media do not
> so easily fit into existing frameworks. Conflicts come about as
> the law struggles to define its application in a context where
> fundamental notions of speech, property, and place take
> profoundly new forms. People sense both the promise and the
> threat inherent in new computer and communications technologies,
> even as they struggle to master or simply cope with them in the
> workplace and the home.
>
> The Electronic Frontier Foundation has been established to help
> civilize the electronic frontier; to make it truly useful and
> beneficial not just to a technical elite, but to everyone; and to
> do this in a way which is in keeping with our society's highest
> traditions of the free and open flow of information and
> communication.
EFF was started by the multimillionaire Mitchell Kapor, founder of
Lotus software, and John Barlow, lyricist for the Grateful Dead
rock band. A highly publicized endeavor of the organization
involved the legal defense of Steve Jackson Games after an FBI
raid and an accompanying civil suit (see section on ``Steve
Jackson Games''). The foundation publishes EFF News (EFFector
Online) electronically, send requests to [email protected].
In a letter to Mitchell Kapor from the Chairman of the Subcommittee
with primary jurisdiction over telecommunications policy dated
November 5, 1991, Representative Edward J. Markey complemented
Mitchell Kapor on his ``insights on the development of a national
public information infrastructure'' which ``were appreciated greatly
by myself and the Members of the Subcommittee'' (complete text in
ftp.eff.com:/pub/pub-infra/1991-12):
> ...we need to pursue policies that encourage the Bell companies to
> work with other sectors of the communications industry to create
> a consumer-oriented, public information network. Please let me or
> my staff know what policies you and others in the computer
> industry believe would best serve the public interest in creating
> a reasonably priced, widely available network in which
> competition is open and innovation rewarded. I also want to
> learn what lessons from the computer industry over the past ten
> to fifteen years should apply to the current debate on
> structuring the information and communications networks of the
> future....I ask your help in gaining input from the computer
> industry so that the Subcommittee can shape policies that will
> bring this spirit of innovation and entrepreneurship to the
> information services industry.
ftp.eff.org
===========
/pub/eff/about-eff
---
A file of basic information about EFF including goals, mission,
achievements, and current projects. Contains a membership form.
/pub/eff/mission-statement
---
EFF mission statement.
/pub/eff/historical/founding-announcement
---
EFF founding press release.
/pub/eff/historical/eff-history
---
John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July
10, 1990). How EFF was conceived and founded, major legal cases,
and the organizational directions.
/pub/eff/historical/legal-case-summary
---
EFF legal case summary.
_____
<6.2> Who are Computer Professionals for Social Responsibility (CPSR)?
The Computer Professionals for Social Responsibility have been
working to protect and promote electronic civil liberties issues
since ~1982. The group has three offices (Palo Alto, Cambridge,
Washington, DC) and 20 chapters. It is involved in litigation
against the FBI, The NSA, NIST, the Secret Service and other other
U.S. government agencies to declassify and provide documentation
on issues such as Operation Sundevil, the FBI wiretap proposal,
NSA's interference in crypography, the breakup of the 2600 raid in
Arlington, Va in Nov 1992. Members speak frequently in front on
Congress, state legislators and public utility commissions to
testify on privacy, information policy, computer security, and
caller identification.
CPSR has created an extensive Internet Privacy library available
via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising
the largest collection of privacy documents on the internet. For
more information, anonymous FTP cpsr.org:/cpsr/.
(Thanks to Dave Banisar <[email protected]> for contributions
here.)
_____
<6.3> What was `Operation Sundevil' and the Steve Jackson Game case?
In the early 1990's a fear spread among U.S. law enforcement agencies
on the illicit activities of `hackers' and `phreakers' involved in
such activities as credit card fraud and long-distance call thievery.
(see ftp.eff.org:/pub/SJG/General_Information/EFFector1.04):
> `Operation Sundevil,' the Phoenix-inspired crackdown of May
> 8,1990, concentrated on telephone code-fraud and credit-card
> abuse, and followed this seizure plan with some success.
> [Bulletin Board Systems] went down all over America, terrifying
> the underground and swiftly depriving them of at least some of
> their criminal instruments. It also saddled analysts with some
> 24,000 floppy disks, and confronted harried Justice Department
> prosecutors with the daunting challenge of a gigantic nationwide
> hacker show-trial involving highly technical issues in dozens of
> jurisdictions.
Massive `show-trials' never materialized, although isolated
instances of prosecution were pursued. The movement reached a
crescendo in Texas with the highly publicized case of illegal
search and seizure involving the Steve Jackson Games company of
Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST
by Bruce Sterling <[email protected]> in Fantasy and Science
Fiction Magazine:
> In an early morning raid with an unlawful and unconstitutional
> warrant, agents of the Secret Service conducted a search of the
> SJG office. When they left they took a manuscript being prepared
> for publication, private electronic mail, and several computers,
> including the hardware and software of the SJG Computer Bulletin
> Board System. Yet Jackson and his business were not only
> innocent of any crime, but never suspects in the first place.
> The raid had been staged on the unfounded suspicion that
> somewhere in Jackson's office there `might be' a document
> compromising the security of the 911 telephone system.
FBI agents involved in the seizure were named in a civil suit filed
on behalf of Steve Jackson Games by The Electronic Frontier
Foundation. See information on EFF below. From an article by Joe
Abernathy in the Houston Chronicle ~Feb 1, 1993:
> AUSTIN -- An electronic civil rights case against the Secret
> Service closed Thursday with a clear statement by federal
> District Judge Sam Sparks that the Service failed to conduct a
> proper investigation in a notorious computer crime crackdown,
> and went too far in retaining custody of seized equipment.
>
> Secret Service Special Agent Timothy Foley of Chicago, who was in
> charge of three Austin computer search-and-seizures on March 1,
> 1990, that led to the lawsuit, stoically endured Spark's rebuke
> over the Service's poor investigation and abusive computer
> seizure policies. While the Service has seized dozens of
> computers since the crackdown began in 1990, this is the first
> case to challenge the practice.
>
> Sparks grew visibly angry when it was established that the Austin
> science fiction magazine and game book publisher was never
> suspected of a crime, and that agents did not do even marginal
> research to establish a criminal connection between the firm and
> the suspected illegal activities of an employee, or to determine
> that the company was a publisher. Indeed, agents testified that
> they were not even trained in the Privacy Protection Act at the
> special Secret Service school on computer crime.
>
> "How long would it have taken you, Mr. Foley, to find out what
> Steve Jackson Games did, what it was?" asked Sparks. "An hour?
>
> "Was there any reason why, on March 2, you could not return to
> Steve Jackson Games a copy, in floppy disk form, of everything
> taken?
>
> "Did you read the article in Business Week magazine where it had
> a picture of Steve Jackson -- a law-abiding, tax-paying citizen
> -- saying he was a computer crime suspect?
>
> "Did it ever occur to you, Mr. Foley, that seizing this material
> could harm Steve Jackson economically?"
>
> Foley replied, "No, sir," but the judge offered his own answer.
>
> "You actually did, you just had no idea anybody would actually go
> out and hire a lawyer and sue you."
>
> More than $200,000 has been spent by the Electronic Frontier
> Foundation in bringing the case to trial. The EFF was founded by
> Mitchell Kapor amid a civil liberties movement sparked in large
> part by the Secret Service computer crime crackdown.
ftp.eff.org
===========
/pub/cud/papers/sundevil
---
A collection of information on Operation SunDevil by the Epic
nonprofit publishing project. Everything you wanted to know but
could never find.
/pub/cud/papers/sj-resp
---
Steve Jackson's response to the charges against him.
_____
<6.4> What is Integrated Services Digital Network (ISDN)?
ISDN is a high-speed data communications standard that utilizes
existing copper telephone lines, and is a possible inexpensive and
intermediate alternative to laying fiber optic cable for phone
networks. The speeds involved may be sufficient for audio and
video transmission applications. G. V. der Leun in the file
ftp.eff.org: /pub/pub-infra/1991-11:
> Telecommunications in the United States is at a crossroads. With
> the Regional Bell Operating Companies now free to provide
> content, the shape of the information networking is about to be
> irrevocably altered. But will that network be the open,
> accessible, affordable network that the American public needs?
> You can help decide this question.
>
> The Electronic Frontier Foundation recently presented a plan to
> Congress calling for the immediate deployment of a national
> network based on existing ISDN technology, accessible to anyone
> with a telephone connection, and priced like local voice service.
> We believe deployment of such a platform will spur the
> development of innovative new information services, and maximize
> freedom, competitiveness, and civil liberties throughout the
> nation.
>
> The EFF is testifying before Congress and the FCC; making
> presentations to public utility commisions from Massachusetts to
> California; and meeting with representatives from telephone
> companies, publishers, consumer advocates, and other stakeholders
> in the telecommunications policy debate.
>
> The EFF believes that participants on the Internet, as pioneers on
> the electronic frontier, need to have their voices heard at this
> critical moment.
To automatically receive a description of the platform and details,
send mail to [email protected], with the following line:
send documents open-platform-overview
or send mail to [email protected]. See also the Introduction to the EFF
Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02.
References
==========
``Digital Data On Demand.'' MacWorld, 2/82 (page 224).
---
56Kbps vs. ISDN services and products. See comments by J. Powers
in ftp.eff.org:pub/pub-infra/1992-02.
``Telephone Service That Rings of the Future.'' By Joshua Quittner.
Newsday, Tue, Jan 7 1992.
---
Implications of ISDN for the masses, written in popular science
style. John Perry Barlow (cofounder EFF). Regional telephone
companies (Ohio Bell). ISDN as ``Technological Rorschach Test.''
Anecdotes about McDonald's, Barbara Bush teleconferencing. See
complete text in ftp.eff.org:/pub/pub-infra/1992-01.
ftp.eff.org:/pub/pub-infra/
---
Files 1991-11 through 1992-05 containing email from the EFF public
infrastructure group organized by month. Opinions and facts on
the pros and cons of ISDN, Integrated Services Digital Network.
Uses of ISDN (phone video, audio, etc.) Japanese model.
Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical
specifications of ISDN, implementation details, cost issues,
political obstacles, (RBOC, Regional Bell Operating Companies or
`Baby Bells', e.g. NET, New England Telephone). Influencing
development of future networks (e.g. ISDN and NREN, National
Research and Education Network), encouraging competition (cable
TV systems). Press releases and news articles. Letter from Rep.
E. J. Markey to M. Kapor.
_____
<6.5> What is the National Research and Education Network (NREN)?
The Nation Research and Education Network was introduced in
legislation cosponsored by Sen. A. Gore to promote high-speed data
network infrastructure augmenting the internet with up to 50 times
faster transmission rates. The bill passed the House on November
20, 1991, the Senate on November 22, 1991, and was signed by the
President on December 9, 1991.
ftp.eff.org
===========
/pub/EFF/legislation/nren-bill-text
---
The complete text of the House-Senate compromise version of S.
272, the High-Performance Computing Act.
/pub/internet-info/gore.bill
---
102nd congress 1st Session. Text of high performance computing
bill cosponsored by Sen. A. Gore.
/pub/EFF/legislation/gore-infrastructure-bill
---
The text of S.2937, the Information Infrastructure and Technology
Act of 1992 introduced by Senator Gore to expand Federal efforts
to develop technologies for applications of high-performance
computing and high-speed networking, and to provide for a
coordinated Federal program to accelerate development and
deployment of an advanced information infrastructure.
U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK
By John Markoff, N.Y. Times (~18 Dec 91).
---
President Bush's legislation for natiowide computer data
`superhighway.' IBM-MCI venture as monopoly destructive to fair
competition and innovation? National Science Foundation NSFnet.
complete text in /pub/pub-infra/1991-12.
Commentary
==========
/pub/academic/statements/nren.privacy.cpsr
---
``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc
Rotenberg, Washington Director Computer Professionals for Social
Responsibility (CPSR).
/pub/internet-info/cisler.nren
---
The National Research and Education Network: Two meetings Steve
Cisler, Senior Scientist Apple Computer Library December 17, 1990
Summary of meetings exploring educational issues of NREN by
diverse members of academia and industry.
/pub/internet-info/privatized.nren
---
Feb. 14 1991 essay by M. Kapor advocating advantages of a private
National Public Network, and specific recommendations for open
NREN policies encouraging competition.
/pub/eff/papers/netproposition
---
An FYI about the proposed NREN setup.
_____
<6.6> What is the FBI's proposed Digital Telephony Act?
``Providers of electronic communication services and private branch
exchange operators shall provide within the United States
capability and capacity for the government to intercept wire and
electronic communications when authorized by law...''
From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by
S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22:
> In a move that worried privacy experts, software manufacturers and
> telephone companies, the FBI proposed legislation to amend the
> Communications Act of 1934 to make it easier for the Bureau to
> perform electronic wiretapping. The proposed legislation,
> entitled 'Digital Telephony,' would have required communications
> service providers and hardware manufacturers to make their
> systems 'tappable' by providing 'back doors' through which law
> enforcement officers could intercept communications. Furthermore,
> this capability would have been provided undetectably, while the
> communications was in progress, exclusive of any communications
> between other parties, regardless of the mobility of the target
> of the FBI's investigation, and without degradation of service.
>
> ...under the proposal, the Department of Justice (DOJ) can keep
> communications products off the market if it determines that
> these products do not meet the DOJ's own ... guidelines. This
> [could] result in increased costs and reduced competitiveness for
> service providers and equipment manufacturers, since they will be
> unlikely to add any features that may result in a DOJ rejection
> of their entire product. ...the FBI proposal suggests that the
> cost of this wiretapping 'service' to the Bureau would have to be
> borne by the service provider itself...
>
> The Electronic Frontier Foundation organized a broad coalition of
> public interest and industry groups, from Computer Professionals
> for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun
> Microsystems, to oppose the legislation. A white paper produced
> by the EFF and ratified by the coalition, entitled, `An Analysis
> of the FBI Digital Telephony Proposal,' was widely distributed
> throughout the Congress. ... The Justice Department lobbied hard
> in the final days to get Congress to take up the bill before
> Congress adjourned, but the bill never ... found a Congressional
> sponsor (and was therefore never officially introduced). The FBI
> [may] reintroduce "Digital Telephony" when the 103rd Congress
> convenes in January.
ftp.eff.org
===========
/pub/eff/legislation/fbi-wiretap-bill
/pub/EFF/legislation/new-fbi-wiretap-bill
---
A bill to ensure the continuing access of law enforcement to the
content of wire and electronic communications when authorized by
law and for other purposes. Version 2 of the bill after FBI
changes in response to public response.
/pub/cud/law/hr3515
---
House of Rep bill 3515, Telecommunications Law.
Commentary
==========
/pub/eff/papers/eff-fbi-analysis
---
The EFF-sponsored analysis of the FBI's Digital Telephony proposal.
/pub/eff/papers/ecpa.layman
---
The Electronic Communications Privacy Act of 1986: A Layman's View.
/pub/eff/papers/nightline-wire
---
Transcript of ABC's Nightline of May 22, 1992, on the FBI,
Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc
Rotenberg of the CPSR and William Sessions, Director of the FBI.
/pub/eff/papers/edwards_letter
---
A letter from the Director of the Secret Service to US Rep. Don
Edwards, D-California, in response to questions raised by
Edwards' Subcommittee. This copy came from Computer Professionals
for Social Responsibility in Washington, D.C.
/pub/eff/papers/fbi.systems
---
A description of how information is stored on the FBI's computer
systems.
_____
<6.7> What other U.S. legislation is related to privacy?
ftp.eff.org
===========
/pub/cud/law/<state>
---
State computer crime laws:
AL, AK, AZ, CA, CO, CT, DE, FL, GA,
HI, IA, ID, IL, IN, MD, MN, NC, NJ,
NM, NY, OR, TX, VT, VA, WA, WI, WV.
/pub/cud/law/<country>
---
Current computer crime laws for: The United States (federal
code), Canada, Ghana, and Great Britain.
/pub/cud/law/bill.s.618
---
Senate bill 618, addressing registration of encryption keys with
the government.
/pub/cud/law/improve
---
Improvement of Information Access bill.
/pub/cud/law/monitoring
---
Senate bill 516; concerning abuses of electronic monitoring in the
workplace.
/pub/cud/law/us.e-privacy
---
Title 18, relating to computer crime & email privacy.
/pub/academic/law/privacy.electronic.bill
---
The text of Simon's electronic privacy bill, S. 516. ``To prevent
potential abuses of electronic monitoring in the workplace.''
_____
<6.8> What are references on rights in cyberspace?
ftp.eff.org
===========
/pub/cud/papers/const.in.cyberspace
---
Laurence Tribe's keynote address at the first Conference on
Computers, Freedom, & Privacy. `The Constitution in Cyberspace'
/pub/cud/papers/denning
---
Paper presented to 13th Nat'l Comp Security Conf ``Concerning
Hackers Who Break into Computer Systems'' by Dorothy E Denning.
/pub/cud/papers/privacy
---
``Computer Privacy vs First and Fourth Amendment Rights'' by
Michael S. Borella
/pub/cud/papers/rights-of-expr
---
Rights of Expression in Cyberspace by R. E. Baird
/pub/academic/eff.rights
---
Bill of Rights' meaning in the Electronic Frontier.
_____
<6.9> What is the Computers and Academic Freedom (CAF) archive?
The CAF Archive is an electronic library of information about
computers and academic freedom. run by the Computers and Academic
Freedom group on the Electronic Frontier Foundation FTP site.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic gopher.eff.org
>
> It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in
> directory `pub/academic'. It is also available via email. For
> information on email access send email to [email protected].
> In the body of your note include the lines `help' and `index'.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield ([email protected]).
ftp.eff.org
===========
/pub/academic/statements/caf-statement
---
Codifies the application of academic freedom to academic
computers, reflecting seven months of on-line discussion about
computers and academic freedom. Covers free expression, due
process, privacy, and user participation.
/pub/academic/books
---
Directory of book references related to Computers and Academic
Freedom or mentioned in the CAF discussion. The file books/README
is a bibliography.
/pub/academic/faq/archive
---
List of files available on the Computers and Academic Freedom
archive.
/pub/academic/news
---
Directory of all issues of the Computers and Academic Freedom
News. A full list of abstracts is available in file `abstracts'.
The special best-of-the-month issues are named with their month,
for example, `June'.
FOOTNOTES
=========
_____
<7.1> What is the background behind the Internet?
The article ``Internet'' in Fantasy and Science Fiction by Bruce
Sterling <[email protected]> contains general and nontechnical
introductory notes on origins of the Internet, including the role
of the RAND corporation, the goal of network resilience in face of
nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.:
> ARPANET itself formally expired in 1989, a happy victim of its
> own overwhelming success. Its users scarcely noticed, for
> ARPANET's functions not only continued but steadily improved.
> The use of TCP/IP standards for computer networking is now
> global. In 1971, a mere twenty-one years ago, there were only
> four nodes in the ARPANET network. Today there are tens of
> thousands of nodes in the Internet, scattered over forty-two
> countries, with more coming on-line every day. Three million,
> possibly four million people use this gigantic
> mother-of-all-computer-networks.
>
> The Internet is especially popular among scientists, and is
> probably the most important scientific instrument of the late
> twentieth century. The powerful, sophisticated access that it
> provides to specialized data and personal communication has sped
> up the pace of scientific research enormously.
>
> The Internet's pace of growth in the early 1990s is spectacular,
> almost ferocious. It is spreading faster than cellular phones,
> faster than fax machines. Last year the Internet was growing at
> a rate of twenty percent a *month.* The number of `host'
> machines with direct connection to TCP/IP has been doubling
> every year since 1988. The Internet is moving out of its
> original base in military and research institutions, into
> elementary and high schools, as well as into public libraries
> and the commercial sector.
References
==========
Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A.
Yuan, ``Where to Start - A Bibliography of General Internetworking
Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre,
August 1990.
The Whole Internet Catalog & User's Guide by Ed Krol. (1992)
O'Reilly and Associates, Inc.
---
A clear, non-jargonized introduction to the intimidating business
of network literacy written in humorous style.
Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118),
University of Illinois Urbana, September 1989.
``The User's Directory to Computer Networks'', by Tracy LaQuey.
The Matrix: Computer Networks and Conferencing Systems Worldwide.
by John Quarterman. Digital Press: Bedford, MA. (1990)
---
Massive and highly technical compendium detailing the
mind-boggling scope and complexity of global internetworks.
``!%@:: A Directory of Electronic Mail Addressing and Networks'' by
Donnalyn Frey and Rick Adams.
The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992)
Addison Wesley.
---
``Evangelical'' etiquette guide to the Internet featuring
anecdotal tales of life-changing Internet experiences. Foreword
by Senator Al Gore.
Zen and the Art of the Internet: A Beginner's Guide by Brendan P.
Kehoe (1992) Prentice Hall.
---
Brief but useful Internet guide with plenty of good advice on
useful databases.
See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling
<[email protected]> for contributions here.)
General
=======
Cunningham, Scott and Alan L. Porter. ``Communication Networks: A
dozen ways they'll change our lives.'' The Futurist 26, 1
(January-February, 1992): 19-22.
Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York:
McGraw-Hill, 1992) ISBN# 0-390-03083-X
---
Essays on information infrastructure. Policy and design issues,
research and NREN, future visions, information markets. See
table of contents in ftp.eff.org:/pub/pub-infra/1992-03.
Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic
Networking.'' Whole Earth Review (Winter) 1990: 32-35.
Varley, Pamela. ``Electronic Democracy.'' Technology Review
(November/December, 1991): 43-51.
______
<7.2> How Internet `anarchy' like the English language?
According to Bruce Sterling <[email protected]>:
> The Internet's `anarchy' may seem strange or even unnatural, but
> it makes a certain deep and basic sense. It's rather like the
> `anarchy' of the English language. Nobody rents English, and
> nobody owns English. As an English-speaking person, it's up
> to you to learn how to speak English properly and make whatever
> use you please of it (though the government provides certain
> subsidies to help you learn to read and write a bit).
> Otherwise, everybody just sort of pitches in, and somehow the
> thing evolves on its own, and somehow turns out workable. And
> interesting. Fascinating, even. Though a lot of people earn
> their living from using and exploiting and teaching English,
> `English' as an institution is public property, a public good.
> Much the same goes for the Internet. Would English be improved
> if the `The English Language, Inc.' had a board of directors
> and a chief executive officer, or a President and a Congress?
> There'd probably be a lot fewer new words in English, and a lot
> fewer new ideas.
_____
<7.3> Most Wanted list
Hopefully you have benefitted from this creation, compilation, and
condensation of information from various sources regarding privacy,
identity, and anonymity on the internet. The author is committed
to keeping this up-to-date and strengthening it, but this can only
be effective with your feedback. In particular, the following
items are sought:
- Short summaries of RFC documents and other references listed,
esp. CPSR files.
- More data on the specific uses and penetration of RFC-931.
- Internet traffic statistics. How much is email? How much
USENET? What are the costs involved?
- Famous or obscure examples of compromised privacy
on the internet.
- FTP site for the code (NOT the code) to turn the .plan file into a
named pipe for sensing/reacting to remote `fingers'.
- Knowledge on the `promiscuous' mode of receipt or transmission
on network cards.
- Details on the infamous experiment where a scientist resubmitted
previously accepted papers to a prominent journal with new and
unknown authors that were subsequently rejected.
- X Windows, EFF, CPSR FAQhood in news.answers.
Commerical use of this document is negotiable and is a way for the
author to recoup from a significant time investment. Email feedback
to [email protected]. Please note where you saw
this (which newsgroup, etc.).
_____
<7.4> Change history
3/3/93 v2.1 (current)
CPSR pointer, new UNIX mode examples, digital telephony act,
Steve Jackson incident, additions/ reorganization to
anonymity section, part 3. Note: v2.0 post to sci.crypt,
alt.privacy, news.answers, alt.answers, sci.answers was cancelled
by J. Kamens because of incorrect subject line.
2/14/93 v2.0
Major revisions. New section for X Windows. Some email privacy
items reorganized to network security section. New sections for
email liability issues, anonymity history and responsibilities.
Split into three files. Many new sources added, particularly
from EFF and CAF in new `issues' part. `commentary' from
news.admin.policy. 21 day automated posting starts.
2/3/93 v1.0
More newsgroups & FAQs added. More `Most Wanted'. Posted to
news.answers. Future monthly posting to sci.crypt, alt.privacy.
2/1/93 v0.3
Formatted to 72 columns for quoting etc. `miscellaneous,'
`resources' sections added with cypherpunk servers and use
warnings. More UNIX examples (`ls' and `chmod'). Posted to
alt.privacy, comp.society.privacy.
1/29/93 v0.2
`Identity' and `Privacy' sections added. `Anonymity' expanded.
Remailer addresses removed due to lack of information and
instability. Posted to sci.crypt.
1/25/93 v0.1
Originally posted to the cypherpunks mailing list on 1/25/93 as a
call to organize a list of anonymous servers.
email [email protected] for earlier versions.
* * *
SEE ALSO
========
Part 1 (previous file)
------
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> Why is identification (un)stable on the internet?
<1.6> What is the future of identification on the internet?
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> How do I provide more/less information to others on my identity?
<2.10> Who is my sysadmin? What does s/he know about me?
<2.11> Why is privacy (un)stable on the internet?
<2.12> What is the future of privacy on the internet?
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
Part 3 (next file)
------
<8.1> What are some known anonymous remailing and posting sites?
<8.2> What are the responsibilities associated with anonymity?
<8.3> How do I `kill' anonymous postings?
<8.4> What is the history behind anonymous posting servers?
<8.5> What is the value of anonymity?
<8.6> Should anonymous posting to all groups be allowed?
<8.7> What should system operators do with anonymous postings?
<8.8> What is going on with anon.penet.fi maintained by J. Helsingius?
* * * | 7 | trimmed_train |
348 | Help!
How do you write to the second bank/page of memory when in VGA
320x200x256 colour mode?. ie: to perform page flipping animation
and buffering of the screen.
I have tried using the Map Mask Registers, but this does not
perform the required task (Although it does do something).
Note: It *must* be able to work on a standard VGA (ie: not
necessarily a SVGA card). | 1 | trimmed_train |
10,715 |
Checker Motors went out of business in 1982. It's hard to get
old Checkers that are worth restoring, since almost every one was
a fleet vehicle that was driven into the ground. If you can get a
body in decent shape the mechanicals should all be available _somewhere_ -
Checker used whatever parts were around. For instance, I had a Chevy
straight six and a GMC Truck radiator and a Ford rear in mine.
Actually, you want a Checker Special if you can find one. | 4 | trimmed_train |
8,732 | # -# Just curious (don't have to answer if you feel uncomfortable):
# -# how many times have YOU had sex with boys?
#
# why do you care? if a total stranger asked you how often you had sex,
# would you answer?
#
# # henry mensch / booz, allen & hamilton, inc. / <[email protected]#
This is so typical of homosexuals -- constantly making excuses for
child molesters.
| 13 | trimmed_train |
766 |
I don't personally, but Clay just posted it. Yes, we do.
Unfortunately, it shows that Lopez wasn't as good an example as Nieves would
have been, since his last year numbers were out of line with the previous
years (which I didn't have access to).
The point remains, though; knowing a guy's minor league history is as good
as knowing his major league history, if you know how to read it.
The MLE is not a *projection*, it's an *equivalence*. It's a "this is how
well he hit *last* year, in major league terms" rating. So, in essence, he
has *already* reached it. I would guess (Bob? Clay?) that essentially half
of all players surpass their previous MLEs in their rookie seasons. Maybe
more than half, since all of these players are young and improving.
Did they? Offerman may have been the difference between 4th or 5th place
and last place, but no more.
Sure; they didn't have anyone better. I suppose they might have gutted the
farm system to acquire Jay Bell or Spike Owen or somebody if they were really
in contention.
If you'd read what I wrote, you'd be less amazed. Nowhere do I claim to put
any credence in spring training. Quite the contrary; I said that Lopez hadn't
done anything that even the bozos who *do* put credence in spring training
could interpret as "failure". Just because I think spring training numbers
are meaningless doesn't mean that Bobby Cox does; it's just a case of ruling
out one possible explanation for sending Lopez down.
Keith Mitchell did very very well at AA, AAA, and the majors over a season,
then did very, very poorly for a year in AAA.
| 2 | trimmed_train |
6,356 | Jesus isn't God ? When Jesus returns some people may miss Him ? What version of
the Bible do you read Mike ?
Jesus is God incarnate (in flesh) . Jesus said, 'I and the Father are one.'
Jesus was taken up to heaven after His 40 day post-resurrection stint and the
angels who were there assured the apostles that Jesus would return the same way
and that everyone will see the coming. That's why Jesus warned that many would
come claiming to be Him but that we would know when Jesus actually returns.
These are two very large parts of my faith and you definitely hit a nerve :-) | 0 | trimmed_train |
8,664 |
And not only that, made a second clone from the same tissue sample
after that of said domineering wife, to run at the helm of the
more-pro-business party under guise of more free trade ... and
she did inhale, many times, to boot ...
(-; (-; (-;
gld | 13 | trimmed_train |
2,276 |
Candida albicans can cause severe life-threatening infections, usually
in people who are otherwise quite ill. This is not, however, the sort
of illness that you are probably discussing.
"Systemic yeast syndrome" where the body is allergic to
yeast is considered a quack diagnosis by mainstream medicine. There
is a book "The Yeast Connection" which talks about this "illness".
There is no convincing evidence that such a disease exists. | 19 | trimmed_train |
5,669 |
Yup. Unfortunately, as has been pointed out, the cost of insurance
does NOT go down with No Fault. The crappiest drivers make out like bandits
because they no longer have to bear the responsibility of paying for
insurance that they have boosted in price for themselves by being crappy
drivers. The good drivers now pay through the nose to spread the cost of
the crappy drivers' actions, and that's not fair.
Any plan that caps rates for crappy drivers is inherently a piece of
shit, because the rest of us end up paying more.
Any plan that uses speeding tickets as a basis for raising rates is
also a piece of shit as it is based upon the lie that faster drivers are
inherently less safe than slower drivers, and the NHTSA disproved that two
years ago now.
Later, | 12 | trimmed_train |
878 |
Who is the you Arabs here. Since you are replying to my article you
are assuming that I am an Arab. Well, I'm not an Arab, but I think you
are brain is full of shit if you really believe what you said. The
bombardment of civilian and none civilian areas in Lebanon by Israel is
very consistent with its policy of intimidation. That is the only
policy that has been practiced by the so called only democracy in
the middle east! | 6 | trimmed_train |
8,842 |
[...]>
[...]>
If the data isn't there when the warrant comes, you effectively have
secure crypto. If secret backups are kept...then you effectively have
no crypto. Thus, this poster is essentialy arguing no crypto is better
than secure crypto.
If the data isn't there when the warrant comes, then the government will
just have to use normal law enforcement techniques to catch crooks. Is
this so bad? BTW, bugging isn't YET a normal law enforcement technique.
With the privacy clipper, it WILL become a normal technique.
/Jim | 7 | trimmed_train |
6,090 | Thanks for the resposes as they were all good ideas and I am looking at using a
couple of the ideas. I recieved in the mail today the spec sheets on the mil.
spec version of Exar's XR-2240 timer/counter chip. It is stable down to -50 C
and sucks very little power. They show an application for a ultra-long time
delay (up to several years depending on the RC time constant). In this
application, they have two of them cascaded together. The reset and trigger
pins of both chips are tied together and the timebase of the second chip is
disabled. In this configuration, the output is high when the system is reset.
When triggered, the output goes low and stays that way for a total of 65,536 x
the timing cycle of the first chip. The total timing cycle of the two chips can
be programmed from To = 256 x R x C to 65,536 x R x C in 256 steps by selecting
any combination of the counter outputs to the timer output. The beauty of it
is, the timebase chip would only have to have a 100uF timing cap and a 391K
resistor for 39.1 seconds per timing cycle. So I can get a maximum of
2,562,457.6 seconds between timing cycles (39.1 x 65,536 or about 29 days !)
Of course, that's much more than I need (14 days). But the counter allows for
256 binary steps that can be selected for the output for the 'pellet puker'.
After the first 14 days and it trips, it would reset its self for the next 14
day timing cycle and so forth.
Power is still a problem though. A few ideas that you suggested was to bury the
electronics in a hole dug in the snow (as an insulator) and put the pellet
puker up on a tower above the estimated snow fall with a solar panel on it to
keep a charge on a lithium battery pack. I like that idea ;-) This thing has to
work for at least six weeks for three samples and the gas valves are 12 volts
to spit the pellets out onto the snow. Anyway, I ordered the XR-2240's to see
what I can do with them. Should be interesting (as long as I'm not the one that
has to go digging up the pellets in the middle of Antartica freezing my buns
off ;-)
Thanks again everyone... | 11 | trimmed_train |
3,448 | Hi. My last question for the year. I have a mail-order no-name notebook
with 4 meg ram. I never have problems with my huge ramdisk or when
running desqview, but Win3.1 and W4W2.0 constantly crash on me, most
commonly citing a "memory parity error." The only thing I can do is TURN
OFF and re-boot. My CMOS ticks off & counts all the memory every startup,
and there is never a problem with this either.
Could it be a bug in my Windows copy instead of the hardware? I remember
having some disk error problems when installing it.
Is there any change I could make to lessen the frequency or likelyhood of
this happening (I think win vs win /s produce different crashes, but both
crash frequently nonetheless) | 18 | trimmed_train |
7,212 |
What's the problem here? Back in 1958 I rode a Puch 175 from Paris to
Barcelona and back. That was a two stroke, and back then it was representative
of the size of bikes on the road. A 350 was considered a big bike, and the
superbikes of the day were 500cc or 600cc. Anything bigger was real rare.
Charlie Smith, DoD #0709, doh #0000000004, 1KSPT=22.85 | 12 | trimmed_train |
5,037 | I need help binding some value to the HOME and END keys on my keyboard. I have an
rs/6000 w/ aix3.2.3ext running X11R5pl19 mit dist. I'm using a PC running eXceed
for windows as my xterminal. The HOME and END keys do not send a value, and my
application needs them to be defined. I used this in my Xdefaults to define the
keys:
varnet*VT100.Translations: #override \
<Key>Home: string("\033[8~") \n\
<Key>End: string("\033[7~")
Then I xterm -name varnet. This works perfect, however the 7 and the 1 key on my
keypad are also defined as \033[8~ and \033[7~.
Any ideas? Help please.
Thanks.
| 16 | trimmed_train |
2,019 | I love the FAQ.
The comment about contact lenses not being an option for any remaining
correction after RK and possibly after PRK is interresting. Why is
this? Does anyone know for sure whether this applies to PRK as well?
Also, why is it possible to get a correction in PRK with involvement of
only about 5% of the corneal depth, while RK is done to a depth of up to
95%? Why such a difference? I thought the proceedures were simmilar
with the exception of a laser being the cutting tool in PRK. I must not
be understanding all of the differences.
In the FAQ, the vision was considered less clear after the surgery than
with glasses alone. If this is completly attributable to the
intentional slight undercorrection, then it can be compensated for when
necessary with glasses (or contacts, if they CAN be worn afterall!). It
is important to know if that is not the case, however, and some other
consequence of the surgery would often interfere with clear vision. The
first thing that came to my mind was a fogging of the lense, which
glasses couldn't help.
would not help.
| 19 | trimmed_train |
9,939 |
XGA or XGA-2? For the original XGA you just need something that can do
1024x768 at 45/90Hz interlaced (just tell them "8514 compatible" and they
should get the idea). For the XGA-2, get what you like. I prefer multi-
syncs like the IBM 6319, the NECs or even a fixed frequency monitor like
my home Viewsonic 6. I like the Multisyncs because it's easy to run them
in modes like 800x600x64k colors noninterlaced, or at higher modes like
1360x1024x16. | 3 | trimmed_train |
6,032 | The O's just lost to the Rangers a few minutes ago I was not too happy about
the pitching of Rick Sutcliffe (6 runs in 6 innings, 5 in the 3?) This puts
me in remembering the 1990 O's season. After '89 we didn't do much over
winter and we wound up in 5th. Now I know that Mussina, McDonald, and Rhodes
are better pitching prospects than Ballard and Milacki but are any other
Oriole fans scared out there?
Admiral Steve C. Liu | 2 | trimmed_train |
6,276 | 04 May 93, D. Andrew Byler writes to All:
DAB> I think I need to again post the Athanasian Creed, whicc pretty well
DAB> delinieates orthodox Christian belief on the Trinity, and on the
DAB> Incarnation.
DAB> It's a pretty good statement of the beliefs eventually accpeted, and the
DAB> Creed is in use by the Catholic Church, as well as the Lutheran,
DAB> Anglican, and Orthodox churches (the last minus the filioque, which they
DAB> delete from the original form of the creed).
Do you have any evidence that it is used by the Orthodox Churches?
As far as I know it is purely Western, like the "Apostles' Creed". The
Orthodox Churches use the "Symbol of Faith", commonly called "The
Nicene Creed".
Steve Hayes
Department of Missiology
University of South Africa | 0 | trimmed_train |
6,675 |
Perhaps not in Christianity, but in Islam the choice of religious
leaders is to be made by the people. So much for your superiority
argument.
Democracy is a basic element of Islam. Learn that one!
Ever notice that the so-called "fundamentalists" in Algeria
who are being repressed by the secular government won in
free and democratic elections.
| 8 | trimmed_train |
8,649 |
In pure speculation, I would guess cautions based on hazardous
pre-launch ops would qualify. Something like "Caution: SRBs
have just been armed." | 10 | trimmed_train |
97 | ..deleted...
In plain Motify using a dialog 'in-line' like this simply isn't done. You need
to set callbacks from the buttons/widgets in your dialog and let the callback routines
do the work. In the callbacks you can then carry on the flow of logic.
XView from Sun actually supports this very neatly with a 'Notify' box, which can
return a status in-line, it does actualy ease coding but goes against the event
driven style of an application.
Summary: Redesign required.
| 16 | trimmed_train |
9,258 | Hey!!! I've just upgraded my laptop to a Windows-capable one, so I
don't need my DOS word processor anymore. It's a great word
processor. Easy-to-use, undemanding on the system, and
best of all, it has a WYSIWYG EDITING mode. This is something
Word Perfect doesn't have!! And all I'm asking is $65 + shipping.
It even comes with several hundred dollars of free utilities!!!
$65 for a full-featured WYSIWYG word processor!!! Perfect for
a laptop, or a lower powered machine! | 5 | trimmed_train |
1,797 | Clipper Chip is a response to the fact that there is no business
or professional body in a position to establish a standard and
provide chipsets to implement it for analog or digial transmission
systems.
RSA might be in position to do it, if they had active cooperation of
a couple of manufacturers of cellular phones or desktop phones.
Large companies in the voice/data comm business are out, because they
all have contracts with the gov which would be used to pressure them.
If we, as professionals in crypto organizations, EFF, etc. were to
put our collective minds and interests toward establishing a
crypto standard for transmission, and getting our companies to
implement it, we might avoid government control.
Otherwise, I think it will happen to us by default. Gov isn't probably
strong enough or foolish enough to prevent strong crypt. They
are strong enough, and we may be foolish enough, to push through
the Clipper Chip.
Is RSA independt of the gov enough to spearhead this? I, for one,
would *gladly* pay royalties via purchasing secure phones.
If not this, we should provide an algorithm which can be implemented
in either SW or HW and publish it, then push to make it the defacto
standard in the way that PGP and RIPEM are becoming such.
We are opposing, charging the bunker. We should be nimble and clever.
The gov is strong, not clever.
Lew | 7 | trimmed_train |
5,495 |
Sounds about right.
If there is high demand for a product there is little incentive to
aggresively cut prices. Once the demand fall off a bit, then is the
time to start getting aggressive with pricing. Waiting too long can
really hurt your business though :-)
The PowerBooks have sold very well up to now, if they are slowing
down Apple needs to come out with some lower priced versions (the
only reason I own a PowerBook is that I could spring for a $900 PB100,
the rest of the lineup is way to pricey for me). I'd bet they'll
be coming out with more power versions too. | 14 | trimmed_train |
3,919 | Anyone who really believes that the Caps can beat
the Pens are kidding themselves. The Pens may not loose
one game in the playoffs. | 17 | trimmed_train |
5,396 |
the question is by going East or West from the misisipi. on either choice
you would loose Palestine or Broklyn, N.Y.
I thought you're gonna say fromn misisipi back to the misisipi !
Let's say : " let's establish the islamic state first" or "let's free our
occupied lands first". And then we can dream about expansion, Mr. Gideon
| 6 | trimmed_train |
9,319 |
And last year the Capitals had the Pens number up until about game 3 of the playoffs.
| 17 | trimmed_train |
52 | Hi ... can anyone tell me where I can get a copy of updated Canon BJ-200
printer driver for Windows 3.1, if any ? I have ver 1.0 which comes with
my BJ-200 printer, I just wonder if there is any newer version. | 18 | trimmed_train |
2,102 |
I do recall Watt making a comment to this effect, though it was quite a few
years back and I can't cite the specifics. I also recall that Cecil Andrus, who
was Secretary of the Interior during the Carter Administration, responded
to Watt's comments by pointing out the stewardship role that God gave
to man, as recorded in Genesis. Which makes me wonder: who are the
true conservatives? It seems to me that a *conservative* should want to
*conserve* things of value for long-term societal benefit. This form of
*conservation* should logically extend to the physical environment in
which people live, as well as the moral environment in which they relate
to one another and to God.
IMHO, Watt's stewardship status is not enhanced by the fact that he served
on the board of directors for Jim Bakker's organization, during a time in
which Bakker committed criminal acts which eventually landed Bakker
in federal prison. | 0 | trimmed_train |
10,437 | I am looking for shanghai, solitaire game with mahjongg tiles
for PC's. if you have a copy laying around, send email to:
[email protected]
thanks, | 5 | trimmed_train |
6,499 | : Sorry, I did`nt tell exactly what I need.
:
: I need a utility for automatic updating (deleting, adding, changing) of *.ini files for Windows.
: The program should run from Dos batchfile or the program run a script under Windows.
:
: I will use the utility for updating the win.ini (and other files) on meny PC`s.
:
: Do I find it on any FTP host?
:
: Svein
Well, in the latest Windows magazine, there is an advertisement for a program
that will help you uninstall windows apps from your harddisk (Uninstaller)
but it can be used to update a network, but only for deleting, not adding
or changing their *.ini files. (Uninstaller, by MicroHelp Inc. $79
1-800-922-3383)
I am also looking for an *.ini updater for my PC network, and so far without
any luck. So for the time being I have been pushing DOS and it's batch
language to its limit...look into DOS 5.0's (I am assumming that DOS 6.0
has the same command, maybe even more..or less..improved) REPLACE command.
I use this to update our users personal files with a master set in a batch
file that is run everytime they invoke Windows. This basically overwrites
their color schemes, but does what I need it to do. Not neat, but does
the job...I'm looking for a better solution though.
Mike
Just relaying what I know...a not for profit service.
| 18 | trimmed_train |
5,018 | I have a modest system of aliases/macros that enables me to download
mail from a public access UNIX system to my MS-DOS box. I read and reply
to the mail with a MS Windows 3.1 based editor.
Everything works peachey keen as long as the author of the message has
maintained his text at 80 col. max. width. Sometimes I get slightly wider
messages that run off-screen, so I have to use the cursor/slider to read
the whole thing.
I'm using NDW Deskedit mainly, but I've experienced the same prob with
all other MS WIndows editors. I've fiddled with word wrap settings in
the various editors, but to no avail. I know I'm missing something very
basic in editor setup, but what is it?
Oh yeah, MS Word for Windows converts everything flawlessly but for what
I'm looking for that's like using a tank to crack walnuts.
I'd really like to have an editor setup that would display all incoming
ASCII files in a readable format to my screen.
Thanks in advance, | 18 | trimmed_train |
3,029 |
You apparently think you are some sort of one-man judge and jury who
can declare "total" victory and then sit back and enjoy the
applause. But you've picked the wrong topic if you think a few
rigged "quotations" can sustain the legend and lie of the Deir
Yassin "massacre."
You have a lot to learn when it comes to historical methodology.
At the most basic level, you should know that there is a big
difference between weighing evidence fairly and merely finding
"quotations" that support your preset opinions.
If you have studied the history of Israel at all you must know that
many of the sources of your "quotations" have an axe to grind, and
therefore you must be very careful about whom you "quote." For
example, Meir Pa'il, whom you cite, was indeed a general, a scholar,
and a war hero. But that doesn't mean everything that comes out of
his mouth is gold. In fact (and here your lack of experience
shows), Pa'il is such a fanatic, embittered leftist that much of his
anti-Israel blathering (forget about anti-Irgun blathering) would be
considered something like treason in non-Israel contexts. But of
course you don't consider this AT ALL when you find a juicy
"quotation" that you can use to attack Israel.
Benny Morris (of Hashomer Hatzair) represents himself as a "scholar"
when he rehashes the old attacks on the Irgun. Don't be fooled.
It's just the old Zionist ideological catfight, surfacing as an
attack on the (then-) Likud government. If you will look closely at
the section on Deir Yassin in his book on the War of Independence,
you will see his "indictment" to be pure hot air. And this is the
BEST HE CAN DO after decades of digging for any sort of damning
evidence. Unfortunately for him, because his book parades itself as
"scholarly," he is forced to put footnotes. So you can clearly see
that his Deir Yassin account is based on nothing.
The Deir Yassin "massacre" never took place as the propagandists
tell it, any more than the Sabra and Shatila "massacres." Do you get
the feeling people like to blame the Jews for "massacres," even if
they have to make them up? It must sound spicy. Even some Jews
like to do it, for reasons of their own.
Please, don't confuse any of you Deir Yassin "massacre" stuff
with facts or scholarship. You should stick to Begin's version
unless you find something serious to contradict it. | 6 | trimmed_train |
7,142 |
You are correct. See today's (4/21) Washington Post. The gas the
FBI used is most certainly fatal in high concentrations. Of course,
non-toxic tear gas is an oxymoron; the whole point of tear gas is
that it is toxic, and its toxic effects cause people to seek
fresh air.
| 15 | trimmed_train |
2,615 |
Boy, Travis..
Were you LUCKY!!.. you went under the new Texas Rangers
Stealth Patrol Car! Good thing you slowed down! | 4 | trimmed_train |
7,461 | SOMEONE PLEASE BUY THESE BOOKS!!!!! I AM NOT ASKING MUCH!!!!!!
JUST MAKE ME AN OFFER AND I WILL PROBABLY TAKE IT!!!!!
* Calculus w/ Analytic Geometry by Authur B. Simon (copyright date 1982), below avg condition but still readable!
* Writing good software in Fortran, Graham Smith.
* The Holt Handbook by Kirszner & Mandell (copyright 1986) 720+ page writing guide.
* Algebra & Trigonometry, A problem Solving Approach, 3rd edition by W. Flemming and D. Varberg. Very good condition.
* General Chemistry Principles & Modern Applications, R. Petrucci, fourth
edition. Big Book! Very good condition!
* Solutions manual for Chemistry book. Paperback.
* Study guide for Chemistry book. Paperback.
Send me your offers via email at [email protected]
| 5 | trimmed_train |
5,534 | [ ... ]
This, BTW, is normal behavior for newsie's. The followup isn't "news" ... | 9 | trimmed_train |
1,829 | Has anyone had experience porting imake to DOS using a Microsoft, Watcom, or
any other DOS compiler? | 16 | trimmed_train |
5,239 | x>>
x>>>> Fake convertible roofs and vinyl roofs.
x>>>> Any gold trim.
x >
x>>> These, I will agree, are abominations, right along with the fake
x>>>continental spare-tire kit -- it's sad watching those little old ladies
x>>>try to load their groceries into the trunk with that huge tire-medallion
x>>>in the way.
x>>> Most pitiful fake convertible top: on a "Cadillac" Cimarron, with
x>>>all the chrome door trim still visible -- not fooling *anyone*.
x>>>Of course, there was that Hyundai Excel I once saw...
x>>
Least you think bad taste is something new:
Back in the early 1970s I saw a couple of cars with *flocked* paint jobs.
Thats not a typo. I think they sprayed on some kind of glue then blew
on tiny pieces of nylon. It comes out looking like felt. Can you picture
a huge Plymouth Fury III in dark blue felt? I think I can even remember
one guy who did it in red to a early 1960s Corvette. That was after he had
turned it into a station wagon.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mack Costello <[email protected]> Code 65.1 (formerly 1720.1)
David Taylor Model Basin, Carderock Division Hq. NSWC ___/-\____
Bethesda, MD 20084-5000 Phone (301) 227-2431 (__________>| | 4 | trimmed_train |
7,989 | #1
Clayton, my man...
You are a tad out of touch....
First, gay comunities all over the country are in the process of excluding NAMBLA
from parades etc.
#2
Nobody from NAMBLA is gonna get a job in a day care centre. The same liberals you are
upset about are also passing laws that make tough background checks for childcare
people.
#3
Tell me, how would you feel if your employer fired you for your antigay post on the
internet? Would you be upset ? I`ll bet you would be pissed!
To some, your posts ,ight make the company look bad.
While your posts offend me I dont think it would be right for you to get fired over
it.
I dont believe the gay comunity is asking for hiring quotas like the affirmative
action laws of the 60's did.
My understanding is that the gay community just wants the same rights the srtraights
have. I dont think people should have their leases cancelled when their landlord
finds out they are gay. I dont think that when someone sees someone walk out of
a gay business and then blabs it all over work that the gay person gets fired.
Do you REALLY think these are justified ?
#4
Clayton, I am told you are a parent a couple times over.
Have you been following the strip in the paper "For Better or For Worse" ?
I honestly want your opinion as a parent on the strip.
Do you really care about your childeren
as much as friends of mine tell me ? How much do you care about your childeren ?
How much do you care about other people's childeren? Do you care about MY childeren?
Do you care about my sister's childeren ?
If one of your kids told you he/she was gay, would you throw them out of your home
in the middle of the night?
Would you approve of your childeren driving down to San Francisco to trow bottles
at and beat up on gay people? Would you condone your childeren beating up on someone
elses childeren ?
| 13 | trimmed_train |
1,027 | Re: Space billboards
Even easier to implement than writing messages on the Moon, once upon
a time a group of space activists I belonged to in Seattle considered
a "Goodyear Blimp in orbit". The idea was to use a large structure
that could carry an array of lights like the Goodyear Blimp has.
Placed in a low Earth orbit of high inclination, it could eventually
be seen by almost everyone on Earth. Only our collective disapproval
of cluttering up space with such a thing stopped us from pursuing
it. It had quite feasible economics, which I will not post here
because I don't want to encourage the idea (if you want to do such
a thing, go figure it out for yourself).
Dani Eder
| 10 | trimmed_train |
5,661 |
Dial 511 and it sound tell you the number.
| 11 | trimmed_train |
5,887 | FOR SALE: Pen-based electronic organizer --
Brand-new Sharp Wizard OZ-9600 (with PC link software and cable)
-15 ounces, measures 7"x4"x1" (fits in most pockets)
-256k RAM, 125k available to user
-pen/touch-screen input for pointing and drawing
-keyboard big enough to touch-type on
-320x240 screen
-windows/pop-up menus
-excellent scheduler with alarms
-3 telephone directories
-3 user-configurable databases
-full word-processor with formatting
-drawing utility
-outliner
-to-do list
-calculator
-clock/calendar
-terminal emulatorw/ dialing directory
-directory/filing system
-serial port/infrared port/IC card slot
-uses 4 AAA batteries (about 3 months of daily use)
-All manuals
Organizer Link II
-software and cable for exchanging data between Wizard and a PC
$480 or best offer for both. I'll pay shipping.
Steven M Friedman
Horizon Institute for Policy Solutions | 5 | trimmed_train |
9,824 |
I feel like Winston Churchill in 1941 :( ...... but,
the privacy Clipper will, TO THE EXTENT KEY ESCROW IS LEGITIMATE, stop
most of the abuse of wiretaps by local cops, company cops, angry husbands/
wives, etc... It is going to be hard for the keystone cops, the
Proctor&Gamble cops, etc. to bypass even a product as flawed as the ClipJob.
Now I admit, I am hard pressed to find anything else good to say about it
except that, if it actually takes off, someone will certainly come up with
a REAL crypto chip (pin compatable!) that we can buy... Unless, of course,
Big Brother makes it illegal to have real crypto 'cause good honest law
abiding citizens will be HAPPY to let the government listen to their
every word.... "Me? Did I say THAT?"
"I am not a crook." - President Richard M. Nixon
^^^^^^^^^
| 7 | trimmed_train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.