id
int32
1
11.3k
text
stringlengths
0
74.9k
label
int64
0
19
Generalization
stringclasses
1 value
4,667
1. IBM PS/2 286; 30 meg hd; 1.44 disk drive 3.5"; extended keyboard; mouse, mouse-pad; DOS, DOSSHELL, EXCEL, WINDO S, WORD, AMIPRO, GRE StudyWare. $500 / b.o. 2. Zenith Date Systems supersport laptop computer w/ 120V AC recharger; model 150-308 60 hz. DOS 4.0 2 disc drives for 3.5" floppy carrying case, manuals. $350 / b.o. 3. 2 leather desk chairs (1) black $200. (2) brown $150. or both for $300. 4. Olivetti manual typewriter, Tropical model. Incl. characters for typing in Italian language. $100. Please reply via email or call me at my home number: (617) 277-9234. Thanks, Jason
5
trimmed_train
4,735
Not to worry. The Masons have been demonized and harrassed by almost every major Xian church there is. For centuries now. And still they stand. They wil withstand the miserable Southern Boobtists, I am sure. They may even pick up a little support as people start to listen to the Boobtists and realize that subtracting the obvious lies and claims of Satanism that the Masons sound pretty good by comparison. One thing is known. A sizable proportion of Southern Babtists are Masons! And the Masons have already fired back in their own magazines against the Boobtist Witch-hunt. Since the Consrervatives have already been a divisive element with their war on Boobtist moderates and liberals, they may now start in on their Mason/Boobtist brothers and hasten their own downfall as more and more Southern Boobtists realize their church can't stand being run by a handful of clowns looking for holy civil wars and purity tests and drop 'em out of the leadership positions they have taken over. So as far as I am concerned, the louder, ruder, and more outrageous an Anti-Masonic Crusade these old goats mount, the better. Pop some pocorn and get a center row seat. The circus is about to begin. And, Oh Look! HERE COME THE CLOWNS! Pope Charles Slack!
15
trimmed_train
8,337
[Much text deleted] : plus/minus ... it is the most misleading hockey stat available. Not necessarily the most misleading, but you are right, it definitely needs to be taken in the proper perspective. A shining example is if you look at the Penguins individual +/-, you will find very few minuses. That only makes common sense, since they didn't lose many games. : Until the NHL publishes a more useful quantifiable statistic including ice : time per game and some measure of its "quality" (i.e., is the player put out : in key situations like protecting a lead late in the game; is he matched up : against the other team's top one or two lines; short-handed, etc), I would : much rather see the +/- disappear altogether instead of having its dubious : merits trumpeted by those with little understanding of its implications. Unfortunately, you will need to keep a ridiculous number of stats to really come up with a statistic which really shows a player's value. Let's just enjoy the game and not overanalyze it. (like I'm doing now, excuse me!)
17
trimmed_train
1,903
[...] [...] So what? Justices William Brennan, Thurgood Marshall, John Paul Stevens, and Byron White are associated with a plurality Supreme Court decision that prevented the removal of "anti-American, anti-Christian, anti-Semitic, and just plain filthy" books from a public high school library [_Board of Education v. Pico_ (1982)]. Does this mean that they could no longer defend free expression and privacy? - Carl
7
trimmed_train
2,851
I am working on an X-Window based application that needs to override some of the window manager focus processing. I am using X11R4 and Motif 1.1 currently, although I will also be working with Open Look in the future. What I need to do is under certain circumstances prevent the user from switching from one window of the application to another window. Let's say, for example, that Window A is on top of Window B in the window hierarchy. Normally, if the user clicks the mouse in Window B it will be brought to the top of the window hierarchy and placed on top of Window A. Under certain circumstances if the user clicks the mouse in Window B I need to beep and prevent Window B from being raised on top of Window A. From the research and testing I've done so far, it appears that this window ordering is handled by the window manager, in this case Motif. I haven't found any way to override this default processing through standard X Window functions. I can tell when this switching occurs through focus change and mapping notify events, but I can't find any way to tell Motif not to make the switch. The temporary solution I've currently come up with is very kludgy but it partially works. When I detect such a window switch in those cases when the switch is not allowed, I manually force the formerly top window back on top with an XRaiseWindow call and beep with the XBell function. This provides the necessary functionality but looks ugly when the windows switch places twice. Does anyone know how I can tell Motif (or preferably *any* window manager) when I don't want the window order switch to actually take place? Respond either by e-mail or posting to this newsgroup. Cheers.... Randall
16
trimmed_train
4,807
But the impressive performance of the Graphite was not its Winmark, it was its Wintach result (esp. the paint performance). Judging from the Wintach tests, I can hardly imagine that there is a cheat driver for it.
18
trimmed_train
5,084
: Regardless of people's hidden motivations, the stated reasons for many : wars include religion. Of course you can always claim that the REAL : reason was economics, politics, ethnic strife, or whatever. But the : fact remains that the justification for many wars has been to conquer : the heathens. : If you want to say, for instance, that economics was the chief cause : of the Crusades, you could certainly make that point. But someone : could come along and demonstrate that it was REALLY something else, in : the same manner you show that it was REALLY not religion. You could : in this manner eliminate all possible causes for the Crusades. : Scott, I don't have to make outrageous claims about religion's affecting and effecting history, for the purpsoe of a.a, all I have to do point out that many claims made here are wrong and do nothing to validate atheism. At no time have I made any statement that religion was the sole cause of anything, what I have done is point out that those who do make that kind of claim are mistaken, usually deliberately. To credit religion with the awesome power to dominate history is to misunderstand human nature, the function of religion and of course, history. I believe that those who distort history in this way know exaclty what they're doing, and do it only for affect.
8
trimmed_train
6,107
From: [email protected] (Duane Hentrich) -BTW, I'm a WALC (white aryan lapsed catholic) - --- -d'baba Duane M. Hentrich [email protected] - I would like to go on record as objecting to Mr. Hentrich calling himself an Aryan. The word `Aryan' is of Sanskrit origin and occurs first in the Hindu scripture, the Rigveda. It seems to have been a tribal term but may have had connotations of good character. Such connotations are quite explicit in the sayings of the Buddha who called his religion the eightfold Aryan path. The word was borrowed by the German scholar Max Mueller who used it as a synonym for `indo-european', but then the Nazis proceeded to steal it and started pretending that `aryan' is synonymous with `nordic' which seems highly unlikely. The people who originally called themselves aryas, the Iranians, Noprth Indians, the Afghans and possibly the Kurds, are none of them nordic. So the use of the word by Westerners, though meant with apparent good humor in this case, is nontheless inappropriate. The only Westerners who may have some claim to call themselves Aryans (by descent) are the Celts who seem to have wor- shipped a god called Aryaman who is mentioned in the Rigveda. If you want to check what I am saying, look at Mallory's book, ``In search of the Indo-Europeans" or, just look at the Encyclopedia Britannica. The reason this usage is offensive is that most of Ancient Indian literature as well as religion is directly or inderectly due to the Aryans and for Westerners to butt in is really not nice, not to mention the horrible things done by Germans to Jews, using a word to which the Germans have no clear claim.
13
trimmed_train
9,386
I'm the keeper of the stats for a family hockey pool and I'm looking for daily/weekly email servers for playoff stats. I've connected with the servers at [email protected] and [email protected]. I'm still sorting these two out. Are there others? Email please as my site doesn't get this group. Thanks. Rick
17
trimmed_train
2,341
I aparantly mistyped the address for the ftp site which holds the images. The correct address should be: jupiter.csd.unb.ca ^^ rather than jupiter.csd.unb.edu. They are in the directory: \pub\library.info
1
trimmed_train
699
This is a good idea - so you can carry your (non-alcoholic) drinks without spilling or having someone hold on to them. Fax machines, yes. Cellular phones: Why not get a hands-free model? Seemingly unique to American luxury cars. The Big Three haven't yet realized that the 1970s are over. I agree. Just another display of Yuppie excess.
4
trimmed_train
5,261
There was a Science fiction movie sometime ago (I do not remember its name) about a planet in the same orbit of Earth but hidden behind the Sun so it could never be visible from Earth. Turns out that that planet was the exact mirror image of Earth and all its inhabitants looked like the Earthings with the difference that their organs was in the opposite side like the heart was in the right side instead in the left and they would shake hands with the left hand and so on... [email protected] [email protected]
10
trimmed_train
784
Science is the process of modeling the real world based on commonly agreed interpretations of our observations (perceptions). Values can also refer to meaning. For example in computer science the value of 1 is TRUE, and 0 is FALSE. Science is based on commonly agreed values (interpretation of observations), although science can result in a reinterpretation of these values. The values underlaying science are not objective since they have never been fully agreed, and the change with time. The values of Newtonian physic are certainly different to those of Quantum Mechanics.
8
trimmed_train
10,239
That's fine, but would you name the "industy experts" so I can try to track this down? Yup. That's why I'm kinda curious... most SCSI problems I've encountered are due to cabling. noah
14
trimmed_train
9,047
I am looking for a source of orbital element sets other than UAF/Space Command. I believe there is one on CompuServe. Please let me know what other possible sources there are and how I can reach them. Thanks much.
10
trimmed_train
1,207
I just got off the phone with Mathsoft technical service. They are now admitting a problem of unknown nature with Maple and Norton Desktop for Windows. They have no clue at this time and are collecting configuration information on the systems which exhibit the problem. Anyone having problems loading the Maple solver in MathCad 4.0 under NDW shoud call technical support at 617-577-1017. They made no schedule promices, but are actively working on the problem. In the meantime, the workaround is to provide a configuration selection in autoexec.bat to use PROGMAN (yuk, pew) whenever you plan to use the Maple solver and NDW otherwise. I am using Norton BE to place a little menu on the screen with a 5 second timeout to auto boot NDW.
18
trimmed_train
10,301
Based on the same reasons? You mean you were opposed to US intervention in Somalia because since Somalia is a European country instead of the third world, the desire to help Somalia is racist? I don't think this "same reason" applies to Somalia at all. The whole point is that Somalia _is_ a third world country, and we were more willing to send troops there than to Bosnia--exactly the _opposite_ of what the "fixation on European countries" theory would predict. (Similarly, the desire to help Muslims being fought by Christians is also exactly the opposite of what that theory predicts.) I'm referring to people who want to help at all, of course. You don't see people sending out press releases "help Bosnian Serbs with ethnic cleansing! The Muslim presence in the Balkans should be eliminated now!" (Well, except for some Serbs, but I admit that the desire of Serbs in America to help the Serbian side probably _is_ because those are people more like them.) -- "On the first day after Christmas my truelove served to me... Leftover Turkey! On the second day after Christmas my truelove served to me... Turkey Casserole that she made from Leftover Turkey. [days 3-4 deleted] ... Flaming Turkey Wings! ... -- Pizza Hut commercial (and M*tlu/A*gic bait)
6
trimmed_train
9,854
11
trimmed_train
1,217
Paul, Unfortunately, there are not too many retail outlets that'll stock just about every chip made. The stuff they will stock are the ones that'll sell, like standard DRAM's, 80386's, 68000's, etc,etc. i.e. I cna't think of any 'one-stop-shopping' store. The closest you can get is to pick up a copy of Byte magazine or the Circuit Cellar, Popular Electronics, and the like and flip through them. Distributors like Wyle Electronics, Hamilton Avnet, Pioneer Electronics, etc, etc, don't normally deal with end-users like ourselves where we only a couple of everything...they only deal with people who buy by the hundreds or more. Each distributor represents and sells a variety of different non-competing manufacturers. What do I mean by this? Suppose ABC Electronics sells Intel 80386's. It's a pretty good bet that they won't be selling any of AMD's 386's, or vice-versa. They also can obtain just about *any* chip you want from a manufacturer they represent. Who knows? You might be lucky to be able to buy from one of them. But I'd be suprised if you do. ALso bear in mind that the 1 or 2 qty prices they will charge you will be *much* greater than what a mail order outlet will charge. My advice? If you're gonna be designing anything, try to stick with off-the-shelf stuff. You're going to get stuck if you use too many esoteric parts sooner or later. good luck,
11
trimmed_train
5,256
Now this is getting interesting! I was raised Roman Catholic before becoming an atheist, so I have stated this Creed you quote nearly every Sunday until I was about 18. For some reason, I always took the 'resurrection' in this statement to mean the resurrection of the soul, but I guess resurrection does strictly mean the raising of the physical body. I have some questions on this point: 1. I always thought that Christians believe the descent into hell was pretty much immediate, and that there are people burning in hell right now. You seem to be implying that it will not occur until after the "great judgement" (which I read as meaning the proverbial Judgment Day). I was always a little confused on this point, even when I was with the church -- maybe someone can clear it up for me. Where will my "soul" (which, by the way, I don't believe in) exist until that time? 2. Will the new body I will have be created out of the same atoms that my body now is made of, or will it be built from scratch? My physical body now is susceptible to aging, etc. -- so I guess my new body will have to be radically different in order to be immortal so it can be tortured for all eternity? 3. Since I will have a physical body, I assume it will need a physical place to exist in -- where is this hell? In the center of the earth? Do you think we could find it if we dig? Mark Schnitzius [email protected] Univ. of Central Florida [There is not complete agreement on the details of the afterlife. I think the most common view is that final disposition does not occur until a final judgement, which is still in the future. In the meantime, some believe that people "sleep" until the final resurrection (or because God is above time, pass directly from death to the future time when the resurrection occurs), while others believe that souls have a disembodied, pre-resurrection existence until then. There are probably other alternatives that I'm omitting. The new body is generally conceived of being implemented in a different "technology" than the current one, one which is not mortal. (Paul talks about the mortal being raised to immortality, and Jesus' resurrected body -- which is the first example -- clearly was not subject to the same kind of limitations as ours.) It is assumed that there are enough similarities that people will recognize each other, but I don't think most people claim to know the details. I don't think I'd say it's the same atoms. I'd assume there would be some analog of a physical place, but I wouldn't expect to find it under the earth or up in the sky. I'd suspect that it's in another dimension, outside this physical world, or whatever. But again, we have little in the way of details.
0
trimmed_train
6,833
0
trimmed_train
8,994
^^^^ ^^^^^^^^ ^^^ Geez, can I type or what? -- ------------------------------------------------------------------------------- David Rex Wood -- [email protected] -- University of Colorado at Boulder
2
trimmed_train
1,860
VESA local bus motherboard, 4MB RAM, 64K cache, 1.2 & 1.44 Floppy, 130 MB Hard Drive, IDE controller (2HD&2FD) 2S/1P/1G Local Bus 1MB SVGA Video Card, 14" SVGA Monitor (.28dpi) Mini Tower, 101-key Keyboard
5
trimmed_train
4,897
Hi folks I'm planning to buy a LCIII but need advice on choosing a monitor. What do people recommend for a decent 14"/15" monitor? I'v looked at some ads and the spec for NEC 4FG/4FGe and the price is within my budget, but could LCIII be able to use the various resolutions available on 4FG (specifically the 1024x768 resolution)? Does LCIII only support one resolution? Also any recommendations for a reliable mail order place for LCIII or monitors? Does anyone have experience with the following mail-order places? SYEX EXPRESS (Houston, Tx) USA FLEX (Bloomingdale, Il) Thanks, jeff
14
trimmed_train
1,020
I am trying to put together a new PC with VESA Local Bus. I would like to get VLB cards for Video and SCSI but I have heard of a problem with bus mastering controllers on VLB. Something to the effect that they will actually slow down a system. Anyone heard of this problem? Specifically, I am interested in the Ultrastor 34F VLB SCSI controller. Before I shell out the bucks for this thing I would like to get the straight scoop from someone who knows. Does anyone have this controller? Any problems with it? --
3
trimmed_train
8,835
I'm looking for information how W-NT uses Proteced Mode. (The HW support)
18
trimmed_train
1,618
Actually, I beleive "DWI" normally means "Driving While Impaired" rather than "Intoxicated", at least it does in the states I've lived in... One can be imparied without necessarily being impaired by liquor - drugs, not enough sleep, being a total moron :-), all can impair someone etc... I'm surprised this got her off the hook... Perhaps DWI in Lousiana *is* confined to liquor? Randy Davis Email: [email protected] ZX-11 #00072 Pilot {uunet!ucsd}!megatek!randy DoD #0013
12
trimmed_train
7,646
1993 World Championships in Germany: ==================================== Group A results: SWEDEN - CANADA 1-4 (0-0,1-1,0-3) 1st: 2nd: CAN 0-1 Geoff Sanderson (Kevin Dineen) 7:24 SWE 1-1 Patrik Juhlin (Jan Larsson) 15:23 (pp) 3rd: CAN 1-2 Geoff Sanderson 5:54 (ps) CAN 1-3 Mike Gartner (Greg Johnson,Adam Graves) 10:44 CAN 1-4 Rod Brind'Amour (Shayne Corson) 19:59 Shots on goal: Penalties: Attendance: Referee: Sweden 10 15 12 - 37 4*2min 6,500 Rob Hearn (USA) Canada 10 13 6 - 29 6*2min Bill Ranford stopped 36 shots to lead Canada to a 4-1 victory in a very well played game. The first period started with a give away from a Canadian defenseman and Rundqvist came in alone on Ranford but couldn't put the puck over a sliding Ranford. Later on, Kevin Dineen had a great opportunity but Soderstrom played very well too. Stefan Nilsson had a couple of great dekes and set up Jan Larsson but again Ranford came up big. Period ended scoreless but the edge to Sweden in creating more opportunities. Second period action saw Tommy Soderstrom making a GREAT save. Mark Recchi made a backhanded cross ice pass to Lindros, Eric one timed the puck but Soderstrom was there to make a glove hand save. At the 7-minute mark, Canada started applying pressure on the Swedes. Sanderson-Dineen-Brind'Amour worked hard and kept the puck in the Swedes' zone. Dineen gave the puck to Sanderson who skated around a screened Swedish defenseman, came in on Soderstrom and made a wrist shot that went it by Soderstrom's far post, 1-0 Canada. The Swedes picked up their game after that, and Peter Forsberg had a shot that hit Ranford's post (the inside), went parallel to the goal line and out. Then Gartner got a penalty and the Swedes a power play. Jan Larsson took a shot from the slot, Ranford gave a rebound to Larsson who saw Juhlin by the far post, passed the puck and Ranford was beat, 1-1. Third period started as the other periods, Swedes having most of the pressure but the Canadians always dangerous once they were close to the Swede goal. At 5:54, Canada created some great chances and Arto Blomsten was forced to cover the puck in the Swede goal crease since Soderstrom lost sight of it. That resulted in a penalty shot, since a defenseman can't cover the puck in the goal crease. Geoff Sanderson took the penalty shot (his first ever, he explained afterwards), and he put it low on Soderstrom's stick side, close to the post. Excellent penalty shot to give Canada a go ahead goal. Canada increased the lead on a very suspect offside, Gartner volleyed a bouncing puck past Soderstrom to make it 3-1. The Swedes ran out of gas then and couldn't produce as good scoring chances as they had for 2,5 periods. The 4-1 goal came with only 1 second left, Rod Brind'Amour scoring on a rebound from Soderstrom, where the Swedish defense already had their minds in the dressing room. A very good game (the best in the WC so far?), with both goalies playing great. Soderstrom best player in Sweden, but Ranford even played better than Soderstrom, that tells you something about Ranford. Probably the best goalie in the world, were some comments after the game. Canada played a very disciplined defense, Ranford pointed out that it is easy to play well with a good defense. Lindros played A LOT and played well, Sanderson naturally game hero with two goals. The Forsberg-Naslund-Bergqvist line Sweden's best along with Larsson-Juhlin- Nilsson. Swedish defense played well, 197 cm 104 kg Peter Popovic had the task of neutralizing 192 cm 107 kg Eric Lindros, and managed this very well. Ranger defenseman Peter Andersson finally got to go to the WC, and considering that he landed in Germany just a few hours before the game, he played very well. Swedish coach Curt Lundmark was irritated after the game, partly because of the Swedes inability to score, and partly because of the linesman's mistake on the 1-3 goal. Lines information follows further below. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ITALY - SWITZERLAND 1-0 (0-0,1-0,0-0) 1st: 2nd: ITA 1-0 Orlando 15:47 3rd: Penalties: ITA 10*2min, SWI 8*2min Referee: Anton Danko, Slovakia Attendance: 3,500 ------------------------------------------------------------------------------- Group B results: CZECH REPUBLIC - GERMANY 5-0 (0-0,3-0,2-0) 1st: 2nd: CZE 1-0 Kamil Kastak 1:51 CZE 2-0 Jiri Dolezal 12:26 CZE 3-0 Petr Hrbek 19:10 3rd: CZE 4-0 Radek Toupal 8:28 CZE 5-0 Josef Beranek 17:07 Penalties: CZE 7*2min, GER 6*2min 1*5min 1*10min game penalty Referee: Darren Loraas, Canada Attendance: 10,200 The Czechs were clearly better than the Germans, and the German crowd showed their discontent by throwing in stuff on the ice after a while. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - FINLAND - USA 1-1 (0-0,1-0,0-1) 1st: 2nd: FIN 1-0 Jarkko Varvio 4:00 3rd: USA 1-1 Ed Olczyk 4:26 Penalties: FIN 7*2min, USA 6*2min Referee: Valeri Bokarev, Russia Attendance: 2,800 I hope some Finns can provide information from this game (I didn't see the whole game). The Finns took the lead on a Jarkko Varvio slap shot from the blue line, and a soft goal for an unscreened Mike Richter. As far as the play in the second period goes, the Finns seemed to have the most control, so a 1-0 lead was warranted as I saw it. ------------------------------------------------------------------------------- SWEDEN CANADA Goaltender: 30 Tommy Soderstrom 30 Bill Ranford Defense: 8 Kenneth Kennholt 5 Norm Maciver 14 Fredrik Stillman 24 Dave Manson 3 Peter Popovic 25 Geoff Smith 55 Peter Andersson 19 Brian Benning 7 Arto Blomsten 6 Terry Carkner 28 Roger Akerstrom 3 Garry Galley 4 Derek Mayer Forwards: 29 Mikael Renberg 15 Dave Gagner 9 Thomas Rundqvist 27 Adam Graves 34 Mikael Andersson 22 Mike Gartner 19 Markus Naslund 20 Paul Kariya 21 Peter Forsberg 88 Eric Lindros 18 Jonas Bergqvist 8 Mark Recchi 5 Patrik Juhlin 17 Rod Brind'Amour 20 Jan Larsson 9 Shayne Corson 4 Stefan Nilsson 11 Kevin Dineen 22 Charles Berglund 10 Geoff Sanderson 26 Michael Nylander 12 Greg Johnson (34 Andersson/18 Bergqvist) 14 Brian Savage 16 Kelly Buchberger
17
trimmed_train
3,307
[posted for a friend] Okay, I looked through the FAQs and didn't see this, but I know its come up before... XAllocColor is supposed to do the following in order: Try to find an exact match read-only color cell. (within hardware limits) Try to allocate a read-only colorcell and set it to match. and when all else fails, Return the colorcell with the best match from the read-only colors already allocated in the colormap. This sounds good in theory. It doesn't seem to work this way though. If there is no exact match already in the colormap, and no unallocated cells, then XAllocColor fails, even when it has already allocated several other cells already, and there are dozens of read-only cells already in the colormap. Is this a bug? A feature? A misunderstanding on my part? Any help appreciated,
16
trimmed_train
1,527
Hi there, Is there any utility available that will make Windows randomly select one of your windows directory's .BMP files as the wallpaper file? Nate -------------------------- Nathan C. Crowell, Dept. of Materials Science/ACRL Worcester Polytechnic Institute E-mail: [email protected] "A flower?"-Genesis "Supper's Ready"
18
trimmed_train
4,753
For a VGA card these are the correct files but you can't just copy them back and expect it to work. You have to create a new WIN.COM file. Try the command (you will have to worry about what directories each file is in since I don't know your setup): COPY /B WIN.CNF+VGALOGO.LGO+VGALOGO.RLE WIN.COM (I grabbed this from _Supercharging Windows_ by Judd Robbins--great book) This is also how you can put your own logo into the Windows startup screen. An RLE file is just a specially compressed BMP file. Hope this helps
18
trimmed_train
10,195
-- I would like to be able to detect the angular position (low accuracy) of an IR emitting source at a distance of about 100 meters (more is better) in daylight. The IR source could be emitting a signature; I'm leaning toward 30 KHz square wave with 50% duty cycle. I am considering the use of a quadrant detector from Centronic Inc. to give information to a pan/tilt head to point the sensor and thus determine the angles. For the source I am considering wazing the heck out of an IR LED(s), possibly an Optek OP290 or Motorola MLED81. Wazing would mean at least 1 Amp current pulses. At this current the duty cycle of the LED drops to 10% and I would need to cycle five of them in turn to get the 50% required. Has anyone done something like this?
11
trimmed_train
5,747
These players all are pretty good players. They are the depth that the dynasties had to win Stanley Cups. They tend to be the very good second line guys- who would be first liners on most weaker clubs in the NHL. They were all important to their clubs. Probably, several of these Stanley Cup winning teams would not have won the cups they did if it were not for the depth provided by these players. They compare to Rick Tocchet and Ron Francis of the Penguins. Very good players who can lead lesser teams (Francis-Hartford, Tocchet-Philly) who provide the depth to the team that is currently best in the NHL. As a defensive forward, there have been none better than Bob Gainey. That doesn't mean he was the best player (or even the best forward) the Canadians had at that time, but he was excellent at what he did. Gainey could dominate games with his defence. He didn't need to get goals to dominate. He shut down the opposition and was thus valuable. There has never been anyone any better at doing this. Not ever.
17
trimmed_train
3,132
How about Kirlian imaging ? I believe the FAQ for sci.skeptics (sp?) has a nice write-up on this. They would certainly be most supportive on helping you to build such a device and connect to a 120Kvolt supply so that you can take a serious look at your "aura"... :-)
19
trimmed_train
8,396
Hi Gang, I'd like to subscribe to the White Sox mailing list, if one exists. Can someone please e-mail me the address? Thanks alot, -John
2
trimmed_train
11,165
Another dodge. Oh well. I'm no match for your amazing repertoire of red herrings and smoke screens. You asked for an apology. I'm not going to apologize for pointing out that your straw-man argument was a straw-man argument. Nor for saying that your list of "bible contradictions" shows such low standards of scholarship that it should be an embarrassment to anti-inerrantists, just as Josh McDowell should be an embarrassment to the fundies. Nor for objecting various times to your taking quotes out of context. Nor for pointing out that "they do it too" is not an excuse. Nor for calling your red herrings and smoke screens what they are. I'm still not sure why you think I'm a hypocrite. It's true that I haven't responded to any of Robert Weiss' articles, which may be due in part to the fact that I almost never read his articles. But I have responded to both you and Frank DeCenso (a fundie/inerrantist.) Both you and Frank have taken quotes out of context, and I've objected to both of you doing so. I've criticized bad arguments both when they were yours and I agreed with the conclusion (that the Bible is not inerrant), and when they were Frank's and I disagreed with the conclusion. I've criticized both you and Frank for evading questions, and for trying to "explain me away" without addressing the objections I raise (you by accusing me of being hypocritical and irrational, Frank by accusing me of being motivated by a desire to attack the Bible.) I don't see that any of this is hypocritical, nor do I apologize for it. I do apologize, however, for having offended you in any other way. Happy now?
15
trimmed_train
957
Close Roger, but no banana, er avocado or is it artichoke ?!? Geracie in the Murky News said Kingston will be the new 49ers quarterback. I'm still trying to determine if he is kidding or not :). If I happen to pound down enuff pints sometime this week I'll go back and check what stooper idiot Purdy said in his column. That ought to be worth a few Leafs, I mean Laughs. If I'm really depressed I'll read the SF Comicle. mark just say
17
trimmed_train
8,325
19
trimmed_train
7,887
The two historic facts that I think the most important are these: (1) If Jesus didn't rise from the dead, then he must have done something else equally impressive, in order to create the observed amount of impact. (2) Nobody ever displayed the dead body of Jesus, even though both the Jewish and the Roman authorities would have gained a lot by doing so (it would have discredited the Christians).
0
trimmed_train
4,134
Sounds similar to something Wally Schirra said.
10
trimmed_train
5,511
Dr. willian Horatio Bates born 1860 and graduated from med school 1885. Medical career hampered by spells of total amnesia. Published in 1920, his great work "The Cure of Imperfect Eyesight by Treatment With- out Glasses", He made claims about how the eye actually works that are simply NOT TRUE. Aldous Huxley was one of the more "high profile" beleivers in his system. Mr. Huxley while giving a lecture on Bates system forgot the lecture that he was supposedely reading and had to put the paper right up to his eyes and then resorted to a magnifying glass from his pocket. book have been written debunking this technique, however they remain less read than the original fraud. cheers
19
trimmed_train
2,350
Archive-name: net-privacy/part1 Last-modified: 1993/3/3 Version: 2.1 IDENTITY, PRIVACY, and ANONYMITY on the INTERNET ================================================ (c) 1993 L. Detweiler. Not for commercial use except by permission from author, otherwise may be freely copied. Not to be altered. Please credit if quoted. SUMMARY ======= Information on email and account privacy, anonymous mailing and posting, encryption, and other privacy and rights issues associated with use of the Internet and global networks in general. (Search for <#.#> for exact section. Search for '_' (underline) for next section.) PART 1 ====== (this file) Identity -------- <1.1> What is `identity' on the internet? <1.2> Why is identity (un)important on the internet? <1.3> How does my email address (not) identify me and my background? <1.4> How can I find out more about somebody from their email address? <1.5> Why is identification (un)stable on the internet? <1.6> What is the future of identification on the internet? Privacy ------- <2.1> What is `privacy' on the internet? <2.2> Why is privacy (un)important on the internet? <2.3> How (in)secure are internet networks? <2.4> How (in)secure is my account? <2.5> How (in)secure are my files and directories? <2.6> How (in)secure is X Windows? <2.7> How (in)secure is my email? <2.8> How am I (not) liable for my email and postings? <2.9> How do I provide more/less information to others on my identity? <2.10> Who is my sysadmin? What does s/he know about me? <2.11> Why is privacy (un)stable on the internet? <2.12> What is the future of privacy on the internet? Anonymity --------- <3.1> What is `anonymity' on the internet? <3.2> Why is `anonymity' (un)important on the internet? <3.3> How can anonymity be protected on the internet? <3.4> What is `anonymous mail'? <3.5> What is `anonymous posting'? <3.6> Why is anonymity (un)stable on the internet? <3.7> What is the future of anonymity on the internet? PART 2 ====== (next file) Resources --------- <4.1> What UNIX programs are related to privacy? <4.2> How can I learn about or use cryptography? <4.3> What is the cypherpunks mailing list? <4.4> What are some privacy-related newsgroups? FAQs? <4.5> What is internet Privacy Enhanced Mail (PEM)? <4.6> What are other Request For Comments (RFCs) related to privacy? <4.7> How can I run an anonymous remailer? <4.8> What are references on privacy in email? <4.9> What are some email, Usenet, and internet use policies? <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? Miscellaneous ------------- <5.1> What is ``digital cash''? <5.2> What is a ``hacker'' or ``cracker''? <5.3> What is a ``cypherpunk''? <5.4> What is `steganography' and anonymous pools? <5.5> What is `security through obscurity'? <5.6> What are `identity daemons'? <5.7> What standards are needed to guard electronic privacy? Issues ------ <6.1> What is the Electronic Frontier Foundation (EFF)? <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? <6.3> What was `Operation Sun Devil' and the Steve Jackson Game case? <6.4> What is Integrated Services Digital Network (ISDN)? <6.5> What is the National Research and Education Network (NREN)? <6.6> What is the FBI's proposed Digital Telephony Act? <6.7> What other U.S. legislation is related to privacy on networks? <6.8> What are references on rights in cyberspace? <6.9> What is the Computers and Academic Freedom (CAF) archive? Footnotes --------- <7.1> What is the background behind the Internet? <7.2> How is Internet `anarchy' like the English language? <7.3> Most Wanted list <7.4> Change history PART 3 ====== (last file) Anonymizing ----------- <8.1> What are some known anonymous remailing and posting sites? <8.2> What are the responsibilities associated with anonymity? <8.3> How do I `kill' anonymous postings? <8.4> What is the history behind anonymous posting servers? <8.5> What is the value of anonymity? <8.6> Should anonymous posting to all groups be allowed? <8.7> What should system operators do with anonymous postings? <8.8> What is going on with anon.penet.fi maintained by J. Helsingius? * * * IDENTITY ======== _____ <1.1> What is `identity' on the internet? Generally, today people's `identity' on the internet is primarily determined by their email address in the sense that this is their most unchanging 'face' in the electronic realm. This is your login name qualified by the complete address domain information, for example ``[email protected]''. People see this address when receiving mail or reading USENET posts from you and in other situations where programs record usage. Some obsolete forms of addresses (such as BITNET) still persist. In email messages, additional information on the path that a message takes is prepended to the message received by the recipient. This information identifies the chain of hosts involved in the transmission and is a very accurate trace of its origination. This type of identify-and-forward protocol is also used in the USENET protocol to a lesser extent. Forging these fields requires corrupted mailing software at sites involved in the forwarding and is very uncommon. Not so uncommon is forging the chain at the origination point, so that all initial sites in the list are faked at the time the message is created. Tracing these messages can be difficult or impossible when the initial faked fields are names of real machines and represent real transfer routes. _____ <1.2> Why is identity (un)important on the internet? The concept of identity is closely intertwined with communication, privacy, and security, which in turn are all critical aspects of computer networks. For example, the convenience of communication afforded by email would be impossible without conventions for identification. But there are many potential abuses of identity possible that can have very severe consequences, with massive computer networks at the forefront of the issue, which can potentially either exacerbate or solve these problems. Verifying that an identity is correct is called `authentication', and one classic example of the problems associated with it is H.G.Well's ``War of the Worlds'' radio broadcast that fooled segments of the population into thinking that an alien invasion was in progress. Hoaxes of this order are not uncommon on Usenet and forged identities makes them more insidious. People and their reputations can be assaulted by forgery. However, the fluidity of identity on the internet is for some one of its most attractive features. Identity is just as useful as it is harmful. A professor might carefully explain a topic until he finds he is talking to an undergraduate. A person of a particular occupation may be able to converse with others who might normally shun him. Some prejudices are erased, but, on the other hand, many prejudices are useful! A scientist might argue he can better evaluate the findings of a paper as a reviewer if he knows more about the authors. Likewise, he may be more likely to reject it based on unfair or irrelevant criteria. On the other side of the connection, the author may find identities of reviewers useful in exerting pressure for acceptance. Identity is especially crucial in establishing and regulating `credit' (not necessarily financial) and `ownership' and `usage'. Many functions in society demand reliable and accurate techniques for identification. Heavy reliance will be placed on digital authentication as global economies become increasingly electronic. Many government functions and services are based on identification, and law enforcement frequently hinges on it. Hence, employees of many government organizations push toward stronger identification structures. But when does identification invade privacy? The growth of the internet is provoking social forces of massive proportions. Decisions made now on issues of identity will affect many future users, especially as the network becomes increasingly global, universal, widespread, and entrenched; and the positive or adverse affects of these actions, intended and inadvertent, will literally be magnified exponentially. _____ <1.3> How does my email address (not) identify me and my background? Your email address may contain information that influences people's perceptions of your background. The address may `identify' you as from a department at a particular university, an employee at a company, or a government worker. It may contain your last name, initials, or cryptic identification codes independent of both. In the US some are based on parts of social security numbers. Others are in the form 'u2338' where the number is incremented in the order that new users are added to the system. Standard internet addresses also can contain information on your broad geographical location or nationhood. However, none of this information is guaranteed to be correct or be there at all. The fields in the domain qualification of the username are based on rather arbitrary organization, such as (mostly invisible) network cabling distributions. The only point to make is that early fields in the address are more specific (such as specific computer names or local networks) and the later ones the most general (such as continental domains). Typically the first field is the name of the computer receiving mail. Gleaning information from the email address alone is sometimes an inspired art or an inconsistent and futile exercise. (For more information, see the FAQs on email addresses and known geographical distributions below.) However, UNIX utilities exist to aid in the quest (see the question on this). Common Suffixes --------------- .us United States .uk United Kingdom .ca Canada .fi Finland .au Australia .edu university or college .com commercial organization .org 'other' (e.g. nonprofit organization) .gov government .mil military site _____ <1.4> How can I find out more about somebody with a given email address? One simple way is to send email to that address, asking. Another way is to send mail to the postmaster at that address (i.e. postmaster@address), although the postmaster's job is more to help find user ID's of particular people given their real name and solve mail routing problems. The sysadmin (i.e. `root@address') may also be able to supply information. Users with related email address may have information. However, all of these methods rely on the time and patience of others so use them minimally. One of the most basic tools for determining identity over the internet is the UNIX utility 'finger'. The basic syntax is: finger [email protected] This utility uses communication protocols to query the computer named in the address for information on the user named. The response is generated completely by the receiving computer and may be in any format. Possible responses are as follows: - A message `unknown host' meaning some aspect of the address is incorrect, two lines with no information and '???'. - A message 'In real life: ???' in which case the receiving computer could not find any kind of a match on the username. The finger utility may return this response in other situations. - A listing of information associated with multiple users. Some computers will search only for matching user IDs, others will attempt to find the username you specified as a substring of all actual full names of users kept in a local database. At some sites 'finger' can be used to get a list of all users on the system with a `finger @address'. In general this is often considered weak security, however, because `attackers' know valid user ID's to `crack' passwords. More information on the fields returned by `finger' is given below. More information on `finger' and locating people's email addresses is given in the email FAQ (such as the WHOIS lookup utility). Just as you can use these means to find out about others, they can use them to find out about you. You can `finger' yourself to find out what is publicly reported by your UNIX system about you. Be careful when modifying `finger' data; virtually anyone with internet access worldwide can query this information. In one amazing case, the New York Times writer J. Markoff uncovered the identity of R. Morris, author of the Internet Worm, through the use of an anonymous tip and 'finger'. See the book Cyberspace by K. Hafner and J. Markoff. _____ <1.5> Why is identification (un)stable on the internet? Generally, identity is an amorphous and almost nonexistent concept on the Internet for a variety of reasons. One is the inherent fluidity of `cyberspace' where people emerge and submerge frequently, and absences are not readily noted in the `community'. Most people remember faces and voices, the primary means of casual identification in the 'real world'. The arbitary and cryptic sequences of letters and digits comprising most email addresses are not particularly noticeable or memorable and far from a unique identification of an individual, who may use multiple accounts on multiple machines anywhere in the world. Currently internet users do not really have any great assurances that the messages in email and USENET are from who they appear to be. A person's mailing address is far from an identification of an individual. - Anyone with access to the account, e.g. they know the password, either legitimately or otherwise, can send mail with that address in the From: line. - Email addresses for an individual tend to change frequently as they switch jobs or make moves inside their organizations. - As part of current mailing protocol standards, forging the From: line in mail messages is a fairly trivial operation for many hackers. The status and path information prepended to messages by intermediate hosts is generally unforgeable. In general, while possible, forgeries are fairly rare on most newsgroups and in email. Besides these pathological cases abve there are many basic problems with today's internet protocols affecting identification on the internet: - Internet mail standards, described in RFC-822, are still evolving rapidly and not entirely orderly. For example, standards for mail address `munging' or `parsing' tend to vary slightly between sites and frequently mean the difference between finding addresses and bouncing mail. - Domain names and computer names are frequently changed at sites, and there are delays in the propagation of this data. - Addresses cannot be resolved when certain critical computers crash, such as the receiving computer or other computers involved in resolving names into addresses called `nameservers'. - A whole slew of problems is associated with `nameservers'; if they are not updated they will not find name addresses, and even the operation of what constitutes `updating' has different interpretations at different sites. The current internet mailing and addressing protocols are slightly anachronistic in that they were created when the network was somewhat obscure and not widespread, with only a fraction of the traffic it now sees. Today a large proportion of internet traffic is email, comprising millions of messages. _____ <1.6> What is the future of identification on the internet? Some new technologies and standards are introducing facial images and voice messages into mail and these will improve the sense of community that comes from the familiarity of identification. However, they are not currently widespread, require large amounts of data transfer, standardized software, and make some compromises in privacy. Promising new cryptographic techniques may make 'digital signatures' and 'digital authentication' common (see below). Also, the trend in USENET standards is toward greater authentication of posted information. On the other hand, advances in ensuring anonymity (such as remailers) are forthcoming. See below. PRIVACY ======= _____ <2.1> What is `privacy' on the internet? Generally, while `privacy' has multiple connotations in society and perhaps even more on the internet, in cyberspace most take it to mean that you have exclusive use and access to your account and the data stored on and and directed to it (such as email), and you do not encounter arbitrary restrictions or searches. In other words, others may obtain data associated with your account, but not without your permission. These ideas are probably both fairly limiting and liberal in their scope in what most internet users consider their private domains. Some users don't expect or want any privacy, some expect and demand it. _____ <2.2> Why is privacy (un)important on the internet? This is a somewhat debatable and inflammatory topic, arousing passionate opinions. On the internet, some take privacy for granted and are rudely surprised to find it tenuous or nonexistent. Most governments have rules that protect privacy (such as the illegal search and seizure clause of the U.S. constitution, adopted by others) but have many that are antithetical to it (such as laws prohibiting secret communications or allowing wiretapping). These rules generally carry over to the internet with few specific rules governing it. However, the legal repercussions of the global internet are still largely unknown and untested (i.e. no strong legal precedents and court cases). The fact that internet traffic frequently passes past international boundaries, and is not centrally managed, significantly complicates and strongly discourages its regulation. _____ <2.3> How (in)secure are internet networks? - `Theoretically' people at any site in the chain of sites with access to hardware and network media that transmits data over the Internet could potentially monitor or archive it. However, the sheer volume and general 'noise' inherent to this data makes these scenarios highly improbable, even by government agencies with supposedly vast funding and resources. - Technologies exist to `tap' magnetic fields given off by electrical wires without detection. Less obscurely, any machine with a network connection is a potential station for traffic detection, but this scenario requires knowledge and access to very low-level hardware (the network card) to pursue, if even possible. - A company Network General Inc. is one of many that manufactures and markets sophisticated network monitoring tools that can 'filter' and read packets by arbitrary criteria for troubleshooting purposes, but the cost of this type of device is prohibitive for casual use. Known instances of the above types of security breaches at a major scale (such as at network hubs) are very rare. The greatest risks tend to emerge locally. Note that all these approaches are almost completely defused with the use of cryptography. _____ <2.4> How (in)secure is my account? By default, not very. There are a multitude of factors that may reinforce or compromise aspects of your privacy on the internet. First, your account must be secure from other users. The universal system is to use a password, but if it is `weak' (i.e. easy to guess) this security is significantly diminished. Somewhat surprisingly and frighteningly to some, certain users of the system, particularly the administrator, generally have unlimited access regardless of passwords, and may grant that access to others. This means that they may read any file in your account without detection. Furthermore, not universally known, most UNIX systems keep fairly extensive accounting records of when and where you logged in, what commands you execute, and when they are executed (in fact, login information is usually public). Most features of this `auditing' or `process accounting' information are enabled by default after the initial installation and the system administrator may customize it to strengthen or weaken it to satisfy performance or privacy aims. This information is frequently consulted for troubleshooting purposes and may otherwise be ignored. This data tracks unsuccessful login attempts and other 'suspicious' activities on the system. A traditional part of the UNIX system that tracks user commands is easily circumvented by the user with the use of symbolic links (described in 'man ln'). UNIX implementations vary widely particularly in tracking features and new sophisticated mechanisms are introduced by companies regularly. Typically system adminstrators augment the basic UNIX functionality with public-domain programs and locally-developed tools for monitoring, and use them only to isolate `suspicious' activity as it arises (e.g. remote accesses to the 'passwd' file, incorrect login attempts, remote connection attempts, etc.). Generally, you should expect little privacy on your account for various reasons: - Potentially, every keystroke you type could be intercepted by someone else. - System administrators make extensive backups that are completely invisible to users which may record the states of an account over many weeks. - Erased files can, under many operating systems, be undeleted. - Most automated services keep logs of use for troubleshooting or otherwise; for example FTP sites usually log the commands and record the domain originations of users, including anonymous ones. - Some software exacerbates these problems. See the section on ``X Windows (in)security''. Indepedent of malevolent administrators are fellow users, a much more commonly harmful threat. There are multiple ways to help ensure that your account will not be accessed by others, and compromises can often be traced to failures in these guidelines: - Choose a secure password. Change it periodically. - Make sure to logout always. - Do not leave a machine unattended for long. - Make sure no one watches you when you type your password. - Avoid password references in email. - Be conservative in the use of the .rhost file. - Use utilities like `xlock' to protect a station, but be considerate. Be wary of situations where you think you should supply your password. There are only several basic situations where UNIX prompts you for a password: when you are logging in to a system or changing your password. Situations can arise in which prompts for passwords are forged by other users, especially in cases where you are talking to them (such as Internet Relay Chat). Also, be aware that forged login screens are one method to illegitimately obtain passwords. (Thanks to Jim Mattson <[email protected]> for contributions here.) _____ <2.5> How (in)secure are my files and directories? The most important privacy considerations are related to file rights, and many lapses can be traced to their misunderstood nature or haphazard maintenance. Be aware of the rights associated with your files and directories in UNIX. If the `x' (`execute') right on your parent directory is off for users, groups, and other, these users cannot gain information on anything in your directories. Anything less may allow others to read, change, or even delete files in your home directory. The rights on a directory supersede the rights associated with files in that directory. For a directory, 'x' means that access to the files (or subdirectories) in the directory is possible -- if you know their names. To list the contents of the directory, however, requires the 'r' right. By default most accounts are accessable only to the owner, but the initial configuration varies between sites based on administrator preference. The default file mode specifies the initial rights associated with newly created files, and can be set in the shell with `umask'. The details of rights implementations tend to vary between versions of UNIX. Consult man pages on `chmod' and `ls'. Examples -------- traver.lance % ls -ld ~ drwx------ 15 ld231782 1536 Jan 31 21:22 /users/ld231782/ Here is a listing of the rights associated with a user's home directory, denoted by `~'. The columns at the left identify what rights are available. The first column identifies the entry as a directory, and the next three columns mean that read, write, and execute rights, respectively, are permitted for that user. For directories, the `x' right means that contents (file and subdirectory names) within that directory can be listed. The subsequent columns indicate that no other users have any rights to anything in the directory tree originating at that point. They can't even `see' any lower files or subdirectories; the hierarchy is completely invisible to them. traver.lance % ls -l msg -rw-r--r-- 1 ld231782 35661 Jan 29 23:13 msg traver.lance % chmod u=rw,g=,o= msg traver.lance % ls -l msg -rw------- 1 ld231782 35661 Jan 29 23:13 msg Here the modes on the file `msg' were changed to take away rights from `group' and `other'. Note that `ls -l <file>' requires both the 'r' right to get the list of files and subdirectories, and the 'x' right to access the files and subdirectories in order to get their size, etc. For example, suppose the directory `foo' has rights dr--r--r--, the following is possible: ls foo These commands would fail independent of file rights: ls -l foo ls -l foo/file cat foo/file cd foo If the directory `foo' has rights d--x--x--x, the following are possible if it is known beforehand that `foo' contains an 'r' readable file named `file': ls -l foo/file cat foo/file cd foo The following commands fail: ls foo ls -l foo (Thanks to Uwe Waldmann <[email protected]> for contributions here.) _____ <2.6> How (in)secure is X Windows? X Windows is the primary software developed by the MIT Athena project which is funded by U.S. government grants to develop applications to harness the power of networks in enhancing computational tasks, particularly the human-computer interface. The software implements a client-server interface to a computer via graphical windows. In this case the `client' is the application requesting or utilizing graphical resources (such as windows or a mouse) and the `server' is the machine that provides them. In many situations the client is an application program running on the same machine as the server. The great utility of X Windows comes from its complete dissociation of the client and server so that windows may be `broadcast' to a server at a remote location from the client. Unfortunately this dynamic power also introduces many deep, intricate, and complicated security considerations. The primary security and privacy issue associated with X Windows is that much more sensitive data may be sent over a network, and over wider regions, than in the case where the human is situated near the host computer. Currently there is no encryption of data such as screen updates and keystrokes in X Windows. Due to either intentional design decisions or unintentional design flaws, early versions of the X Window system are extremely insecure. Anyone with an account on the server machine can disrupt that display or read it electronically based on access to the device unix:0.0 by any regular user. There are no protections from this type of access in these versions. The problem arises because the security is completely based on machine addresses rather than users, such that any user at a `trusted' machine is himself trusted. Quoting from X documentation (man Xsecurity): > Any client on a host in the host access control list is allowed > access to the X server. This system can work reasonably well in > an environment where everyone trusts everyone, or when only a > single person can log into a given machine...This system does not > work well when multiple people can log in to a single machine and > mutual trust does not exist. With the access control list, the `xhost' command may prevent some naive attempts (i.e. those other than the direct-access unix:0.0 evasion); the syntax as typed on the host machine is ``xhost +[name]'' where [name] is the domain name or internet address of an authorized client machine. By default clients running nonlocal to the host are disabled. Public domain programs to disrupt a display momentarily (such as 'flip' or slowly mirror the screen image, or cause pixels to 'melt' down to the bottom) have been circulating on the internet among hackers for several years and played as pranks on unsuspecting or inexperienced users. Much more serious security breaches are conceivable from similar mechanisms exploiting this inherent weaknesses. (The minimal, easily-bypassed `trusted' security mode of `xhost' has been jokingly referred to as ``X Hanging Open, Security Terrible.''). New versions of the X Window system (X11R5 and higher) by default make server access as secure as the file system using a .Xauthority file and 'magic cookies'. Remote machines must have a code in the .Xauthority file in the home directory that matches the code allowed by the server. Many older programs and even new vendor-supplied code does not support or is incompatible with `magic cookies'. The basic magic cookie mechanism is vulnerable to monitoring techniques described earlier because no encryption of keys occurs in transmission. X11R5 also includes other sophisticated encryption mechanisms. Try `man Xsecurity' to find out what is supported at your site. Even though improved security mechanisms have been available in X Windows since ~1990, local sites often update this software infrequently because installation is extremely complex. (Thanks to Marc Vanheyningen <[email protected]>, Jim Mattson <[email protected]>, and Bill Marshall <[email protected]> for contributions here.) _____ <2.7> How (in)secure is my email? By default, not very. The characters that you are reading are almost certainly encoded in ASCII, the American Standard Code for Information Interchange that maps alphabetic and symbolic characters onto numeric codes and vice versa. Virtually every computer system uses this code, and if not, has ways of converting to and from it. When you write a mail message, by default it is being sent in ASCII, and since the standard is virtually universal, there is no intrinsic privacy. Despite milleniums worth of accumulated cryptographic knowledge, cryptographic technologies are only recently being established that afford high priority to privacy as a primary criteria in computer and network design. Some potential pitfalls in privacy are as follows: - The most serious threats are instances of immature or unscrupulous system operators reading private mail in the `spool files' at a local site (i.e. at the source or destination of the message), such as a university. - System administrators may also release files to law enforcement agencies, but conventions and protocols for warrants involving computer searches have still not been strongly established and tested legally. - Note that bounced messages go to postmasters at a given site in their entirety. This means that if you address mail with an incorrect address it has a good chance of being seen by a human other than the recipient. - Typically new user accounts are always set up such that the local mail directory is private, but this is not guaranteed and can be overridden. - Finally, be aware that some mailing lists (email addresses of everyone on a list) are actually publicly accessable via mail routing software mechanisms. This `feature' can be disabled. Most potential compromises in email privacy can be thoroughly avoided with the use of strong end-to-end cryptography, which has its own set of caveats (for example, unscrupulous administrators may still be a threat if the encryption site is shared or nonlocal). See the sections on ``email privacy'' and ``email policies.'' _____ <2.8> How am I (not) liable for my email and postings? As punishment or whatever, your system administrator can revoke certain `privileges' such as emailing, USENET posting or reading certain groups, file transferring, remote communications, or generally any subset of capabilities available from your account. This all is completely at the discretion of the local administrator and under the procedures followed at a particular site, which in many cases are haphazard and crisis-oriented. Currently there are virtually no widespread, uniform guidelines or procedures for restricting use to any internet services, and local administrators are free to make arbitrary decisions on access. Today punitive measures are regularly applied in various situations. In the typical scenario complaint(s) reach a system adminstrator regarding abuses by a user, usually but not necessarily preceded by complaints to the user in email, regarding that person's objectionable email or postings. `abusive' posters to USENET are usually first given admonitions from their system administrators as urged by others on the `net'. (The debate persists endlessly on many newsgroups whether this is also used as a questionable means of attacking or silencing `harmless crackpots' or censoring unpopular opinions.) System administrators at remote sites regularly cooperate to 'squelch' severe cases of abuse. In general, however, by tradition Usenet readers are remarkably tolerant of diverse views and uses of the system, but a colorful vocabularly of slang helps describe their alternatives when this patience is sapped: the options wielded by the individual user are to simply advance to the next message (referred to as ``hitting the `n' key''), or to `plonk' annoying posters (according to the Hacker's Dictionary, the sound a jerk makes at the end of a fall to the bottom of a kill file). In cases where punitive actions are applied, generally system administrators are least likely to restrict email. USENET postings are much more commonly restricted, either to individual users or entire groups (such as a university campus). Restrictions are most commonly associated with the following `abuses': - harassing or threatening notes, `email terrorism' - illegal uses, e.g. piracy or propagation of copyrighted material - `ad hominem' attacks, i.e. insulting the reputation of the poster instead of citing the content of the message - intentional or extreme vulgarity and offensiveness - inappropriate postings, esp. binary files in regular groups `mail-bombing': inundating mail boxes with numerous or massive files Major problems originate from lack of distinctions in private and official email or postings. Most users have internet access via accounts at businesses or universities and their activities on the internet can be construed as representative of their parent organizations. Many people put disclaimers in their `signatures' in an attempt dissociate their identity and activities from parent organizations as a precaution. A recent visible political case involves the privacy of electronic mail written by White House staff members of the Bush administration. Following are some guidelines: - Acquaint yourself with your company or university policy. - If possible, avoid use of your company email address for private communication. - Use a disclaimer. - Keep a low profile (avoid `flamewars' or simply don't post). - Avoid posting information that could be construed to be proprietary or `internal'. The following references are available from ftp.eff.com (see also the section on ``internet use policies''): /pub/academic/banned.1991 /pub/academic/banned.1992 --- Computer material that was banned/challenged in academia in 1991 and 1992 including USENET hierarchies. /pub/academic/cases --- This is an on-line collection of information about specific computers and academic freedom cases. File README is a detailed description of the items in the directory. /pub/academic/faq/netnews.liability --- Notes on university liability for Usenet. _____ <2.9> How do I provide more/less information to others on my identity? The public information of your identity and account is mostly available though the UNIX utility `finger' described above. - You have control over most of this information with the utility `chfn', the specifics vary between sites (on some systems use `passwd -f'). - You can provide unlimited information in the .plan file which is copied directly to the destination during the fingering. - A technique that works at some sites allows you to find out who is 'finger'ing you and even to vary the .plan file sent to them. - Your signature is determined by the environment variable SIGNATURE - USENET signatures are conventionally stored in the .signature file in your home directory. Providing less information on your online identity is more difficult and involved. One approach is to ask your system adminstrator to change or delete information about you (such as your full name). You may be able to obtain access on a public account or one from someone unrelated to you personally. You may be able to remotely login (via modem or otherwise) to computers that you are not physically near. These are tactics for hiding or masking your online activities but nothing is foolproof. Consult man pages on the 'chmod' command and the default file mode. Generally, files on a shared system have good safeguards within the user pool but very little protection is possible from corrupt system administrators. To mask your identity in email or on USENET you can use different accounts. More untraceable are new `anonymous posting' and remailing services that are very recently being established. See below. ______ <2.10> Who is my sysadmin? What does s/he know about me? The requirements and screening for getting a system administration job (and thereby access to all information on a system) vary widely between sites and are sometimes frighteningly lax, especially at universities. Many UNIX systems at universities are largely managed by undergraduates with a background in computing and often `hacking'. In general, commercial and industrial sites are more strict on qualifications and background, and government sites are extremely strict. The system adminstrator (root user) can monitor what commands you used and at what times. S/he may have a record (backups) of files on your account over a few weeks. S/he can monitor when you send email or post USENET messages, and potentially read either. S/he may have access to records indicating what hosts you are using, both locally and elsewhere. Administrators sometimes employ specialized programs to track `strange' or `unusual' activity, which can potentially be misused. ______ <2.11> Why is privacy (un)stable on the internet? For the numerous reasons listed above, privacy should not be an expectation with current use of the internet. Furthermore, large parts of the internet are funded by the U.S. NSF (National Science Foundation) which places certain restrictions on its use (such as prohibiting commercial use). Some high-level officials in this and other government agencies may be opposed to emerging techniques to guarantee privacy (such as encryption and anonymous services). Historically the major threats to privacy on the internet have been local. Perhaps the most common example of this are the widespread occurrences of university administrators refusing to carry some portion of USENET newsgroups labelled as `pornographic'. The `alternative' hierarchy in the USENET system, which has virtually no restrictions on propagation and new group creation, is frequently targeted (although this material may appear anywhere). From the global point of view traffic is generally completely unimpeded on the internet and only the most egregious offenders are pursued. For example, verbatim transcriptions of copyrighted material (such as newspaper or magazine articles) are posted to USENET with regularity without major consequences (some email complaints may ensue). More astonishing to some is that currently significant portions of USENET traffic, and less so internet traffic, is comprised of sexually-explicit digitized images almost entirely originating from copyrighted material (newsgroups such as `alt.sex' regularly have the highest traffic). ______ <2.12> What is the future of privacy on the internet? Some argue that the internet currently has an adequate or appropriate level of privacy. Others will argue that as a prototype for future global networks it has woefully inadequate safeguards. The internet is growing to become a completely global, international superhighway for data, and this traffic will inevitably entail data such as voice messages, postal mail, and many other items of extremely personal nature. Computer items that many people consider completely private (such as their local hard drives) will literally be inches from global network connections. Also, sensitive industrial and business information is exchanged over networks currently and this volume may conceivably merge with the internet. Most would agree that, for these basic but sensitive uses of the internet, no significant mechanisms are currently in place to ensure much privacy. New standards are calling for uniform introduction of `privacy enhanced mail' (PEM) which uses encryption technologies to ensure privacy, so that privacy protection is automatic, and may significantly improve safeguards. The same technology that can be extremely destructive to privacy (such as with surreptitious surveilance) can be overwhelmingly effective in protecting it (e.g. with encryption). Some government agencies are opposed to unlimited privacy in general, and believe that it should lawfully be forfeited in cases of criminal conduct (e.g. court-authorized wiretapping). However, powerful new technologies to protect privacy on computers are becoming increasingly popular, provoking some to say that ``the cat is out of the bag'' and the ``genie can't be put back in the bottle''. In less idiomatic terms, they believe that the spread of strong cryptography is already underway will be socially and technically unstoppable. To date, no feasible system that guarantees both secure communication and government oversight has been proposed (the two goals are largely incompatible). Proposals for ``registration'' of secret keys (by D. Denning on sci.crypt, for example) have been met with hot controversy at best and ridicule and derision at worst, mainly because of concerns for the right to privacy and objections of inherent feasibility. Electronic privacy issues, and particularly the proper roles of networks and the internet, will foreseeably become highly visible and explosive over the next few years. ANONYMITY ========= _____ <3.1> What is `anonymity' on the internet? Simply stated, anonymity is the absence of identity, the ultimate in privacy. However, there are several variations on this simple theme. A person may wish to be consistently identified by a certain pseudonym or `handle' and establish a reputation under it in some area, providing pseudo-anonymity. A person may wish to be completely untraceable for a single one-way message (a sort of `hit-and-run'). Or, a person may wish to be openly anonymous but carry on a conversation with others (with either known or anonymous identities) via an `anonymous return address'. A user may wish to appear as a `regular user' but actually be untraceable. Sometimes a user wishes to hide who he is sending mail to (in addition to the message itself). The anonymous item itself may be directed at individuals or groups. A user may wish to access some service and hide all signs of the association. All of these uses are feasible on the internet but are currently tricky to carry out in practice, because of all the tracking mechanisms inherent to operating systems and network protocols. Officials of the NSF and other government agencies may be opposed to any of these uses because of the potential for abuse. Nevertheless, the inherent facelessness of large networks will always guarantee a certain element of anonymity. _____ <3.2> Why is `anonymity' (un)important on the internet? Anonymity is another powerful tool that can be beneficial or problematic depending on its use. Arguably absence of identification is important as the presence of it. It may be the case that many strong benefits from electronic anonymity will be discovered that were unforeseen and unpredicted, because true anonymity has been historically very difficult to establish. One can use anonymity to make personal statements to a colleague that would sabotage a relationship if stated openly (such as employer/employee scenarios). One can use it to pass information and evade any threat of direct retribution. For example, `whistleblowers' reporting on government abuses (economic, social, or political) can bring issues to light without fear of stigma or retaliation. Sensitive, personal, potentially damaging information is often posted to some USENET groups, a risky situation where anonymity allows conversations to be carried on completely independent of the identities of the participants. Some police departments run phone services that allow anonymous reporting of crimes; such uses would be straightforward on the network. Unfortunately, extortion and harassment become more insidious with assurances of anonymity. _____ <3.3> How can anonymity be protected on the internet? The chief means, as alluded to above, are masking identities in email and posting. However, anonymous accounts (public accounts as accessable and anonymous as e.g. public telephones) may be effective as well, but this use is generally not officially supported and even discouraged by some system adminstrators and NSF guidelines. The nonuniformity in the requirements of obtaining accounts at different sites and institutions makes anonymous accounts generally difficult to obtain to the public at large. Many communications protocols are inherently detrimental to anonymity. Virtually every protocol in existence currently contains information on both sender and receiver in every packet. New communications protocols will likely develop that guarantee much higher degrees of secure anonymous communication. _____ <3.4> What is `anonymous mail'? One approach to `anonymizing' mail has been to set up an `anonymous server' that, when activated by email to its address, responds by allocating and supplying an `anonymous ID' that is unique to the person requesting it (based on his email address). This will vary for the same person for different machine address email originations. To send anonymous mail, the user sends email directed to the server containing the final destination. The server `anonymizes' the message by stripping of identification information and forwards the message, which appears to originate from the anonymous server only from the corresponding anonymous user id. This is the `interactive' use of anonymity or pseudonymity mentioned above. Another more `fringe' approach is to run a `cypherpunk' remailer from a regular user account (no root system privileges are required). These are currently being pioneered by Eric Hughes and Hal Finney <[email protected]>. The operator runs a process on a machine that anonymizes mail sent to him with certain characteristics that distinguish it from his regular incoming mail (typically fields in the header). One has been implemented as a PERL script running on UNIX. Several of these are in existence currently but sites and software currently are highly unstable; they may be in operation outside of system administrator knowledge. The remailers don't generally support anonymous return addresses. Mail that is incorrectly addressed is received by the operator. Generally the user of the remailer has to disavow any responsibility for the messages forwarded through his system, although actually may be held liable regardless. These approaches have several serious disadvantages and weaknesses: - The anonymous server approach requires maintaining a mapping of anonymous ID's to real addresses that must be maintained indefinitely. One alternative is to allow `deallocation' of aliases at the request of the user, but this has not been implemented yet. - Although an unlikely scenario, traffic to any of these sites could conceivably be monitored from the `outside', necessitating the use of cryptography for basic protection,. - Local administrators can shut them down either out of caprice or under pressure from local, network, or government agencies. - Unscrupulous providers of the services can monitor the traffic that goes through them. - Most remailers currently keep logs that may be inspected. - The cypherpunk approach tends to be highly unstable because these operators are basically network users who do not own the equipment and are accountable to their own system administrators, who may be unaware of the use and unsympathetic to the philosophy of anonymity when the operation is discovered, regarding it as illicit use. - In all cases, a high degree of trust is placed in the anonymous server operator by the user. Currently the most direct route to anonymity involves using SMTP protocols to submit a message directly to a server with arbitrary field information. This practice, not uncommon to hackers, and the approach used by remailers, is generally viewed with hostility by most system administrators. Information in the header routing data and logs of network port connection information may be retained that can be used to track the originating site. In practice, this is generally infeasible and rarely carried out. Some administrators on the network will contact local administrators to request a message be tracked and its writer admonished or punished more severely (such as revoking the account), all of this actually happening occasionally but infrequently. See the sections ``known anonymous mail and posting sites'' and ``responsibilities associated with anonymity''. _____ <3.5> What is `anonymous posting'? Anonymous servers have been established as well for anonymous Usenet posting with all the associated caveats above (monitored traffic, capricious or risky local circumstances, logging). Make sure to test the system at least once by e.g. anonymous posting to misc.test (however some operators don't recommend this because many sites `autorespond' to test messages, possibly causing the anonymous server to allocate anonymous IDs for those machines). See the ``responsibilties associated with anonymous posting'' before proceeding. Another direct route involves using NNTP protocols to submit a message directly to a newserver with arbitrary field information. This practice, not uncommon to hackers, is also generally viewed with hostility by most system administrators, and similar consequences can ensue. See the sections ``known anonymous mail and posting sites'' and ``responsibilities associated with anonymity''. _____ <3.6> Why is anonymity (un)stable on the internet? As noted, many factors compromise the anonymity currently available to the general internet community, and these services should be used with great caution. To summarize, the technology is in its infancy and current approaches are unrefined, unreliable, and not completely trustworthy. No standards have been established and troubling situations of loss of anonymity and bugs in the software are prevalent. Here are some encountered and potential bugs: - One anonymous remailer reallocated already allocated anonymous return addresses. - Others passed signature information embedded in messages unaltered. - Address resolution problems resulting in anonymized mail bounced to a remailer are common. - Forgeries to the anonymous server itself are a problem, possibly allowing unauthorized users to potentially glean anon ID - email address mappings in the alias file. This can be remedied with the use of passwords. - Infinite mail loops are possible with chaining remailers. Source code is being distributed, tested, and refined for these systems, but standards are progressing slowly and weakly. The field is not likely to improve considerably without official endorsement and action by network agencies. The whole idea is essentially still in its infancy and viewed with suspicion and distrust by many on the internet, seen as illegitimate or favorable to criminality. The major objection to anonymity over regular internet use is the perceived lack of accountability to system operators, i.e. invulnerability to account restrictions resulting from outside complaints. System adminstrators at some sites have threatened to filter anonymous news postings generated by the prominent servers from their redistribution flows. This may only have the effect of encouraging server operators to create less characteristically detectable headers. Probably the least problematic approach, and the most traditional to Usenet, is for individual users to deal with anonymous mail however they prefer, e.g. ignoring it or filtering it with kill files. _____ <3.7> What is the future of anonymity on the internet? New anonymous protocols effectively serve to significantly increase safeguards of anonymity. For example, the same mechanism that routes email over multiple hosts, thereby threatening its privacy, can also be used to guarantee it. In a scheme called `chaining' an anonymous message is passed through multiple anonymous servers before reaching a destination. In this way generally multiple links of the chain have to be `broken' for security to be compromised. Re-encryption at each link makes this scenario even more unlikely. Even more significantly the anonymous remailers could be spread over the internet globally so that local weaknesses (such as corrupt governments or legal wiretapping within a nation) would be more unlikely to sacrifice overall security by message tracing. However, remailers run by corrupt operators are possible. The future of anonymous services on the internet is, at this time, highly uncertain and fraught with peril. While specific groups seem to benefit significantly from anonymous posting capabilities, many feel that unlimited newsgroup scope for anonymous posting is a disruptive and dangerous idea and detracts from discussions in `serious' groups. The introduction of unlimited group anonymity may have fundamental repercussions on Usenet conventions and distribution mechanisms such as moderated and `alt' groups have had in the past. For example, as part of new group creation, the charter may specify whether `anonymous' posting is (un)welcome. Nevertheless, the widespread introduction and use of anonymity may be inevitable. Based on traffic statistics, anonymous services are in huge demand. Pervasive and readily available anonymity could carry significant and unforeseen social consequences. However, if its use is continued to be generally regarded as subversive it may be confined to the underground. The ramifications of widespread introduction of anonymity to Usenet are still largely unknown. It is unclear whether it will provoke signficant amounts of new traffic or, instead of expansion, cause a shift where a greater portion of existing traffic is anonymized. Conceivably the services could play a role in influencing future mainstream social acceptance of Usenet. * * *
7
trimmed_train
10,334
[Hint for Sun OS users: use /usr/5bin/echo instead of /bin/echo or Csh's built-in echo. Otherwise you'll have to embed literal ESC and BEL characters in the string instead of using convenient octal sequences.] Bad idea. using /usr/5bin/echo is slower than the built-in echo. This is what I do. It does execute `hostname` once per shell window, and does read in one extra file. But manipluating the titles does not require executing extra programs. Oh yes, it does execute some programs once per each system. But it stores them in a file for the next time... if ( ! $?HOSTNAME ) then setenv HOSTNAME `hostname` endif # figure how how to generate escape, bell, # and echo commands without a a line terminator # I may have done this before. If so, the variable E is set # have I executed this script before on this system? if ( $?E ) then # echo "already set the echo variables">/dev/tty else if ( -f ~/.echo.${HOSTNAME} ) then source ~/.echo.${HOSTNAME} else if ( `echo -n |wc -l` == 0 ) then # echo "built in echo is bsd" >/dev/tty # then berkeley style echo echo 'set ech = "echo -n"' >~/.echo.${HOSTNAME} echo "set E = `echo a | tr a '\033'`" >> ~/.echo.${HOSTNAME} echo "set B = `echo a | tr a '\007'`" >> ~/.echo.${HOSTNAME} echo 'set N = ""' >> ~/.echo.${HOSTNAME} source ~/.echo.${HOSTNAME} else # echo "built in echo is sysV" >/dev/tty echo 'set ech = "echo"' >~/.echo.${HOSTNAME} echo 'set E = "\033"' >> ~/.echo.${HOSTNAME} echo 'set B = "\007"' >> ~/.echo.${HOSTNAME} echo 'set N = "\c"' >> ~/.echo.${HOSTNAME} source ~/.echo.${HOSTNAME} endif # Are we using shelltool, cmdtool or xterm? # duplicate these aliases here to avoid problems if ( $term =~ sun* ) then # Sun Aliases alias Header '${ech} "${E}]l\!:1${E}\${N}"' alias IHeader '${ech} "${E}]L\!:1${E}\${N}"' else if ( $term =~ xterm ) then alias Header '${ech} "${E}]2;\!:1${B}${N}"' alias IHeader '${ech} "${E}]1;\!:1${B}${N}"' endif
16
trimmed_train
4,334
I did this. I use a relay (Radio Shack 4PDT) instead of a huge switch. This way, if the relay breaks, my drives will still work. It works fine, but you may still need to change the CMOS before the drive switch will work correctly for some programs. rp93
3
trimmed_train
7,914
The Leafs have always been kind of comical. During the second Imlach era, when Darryl Sittler was called a "cancer on the team", he tore the C off his sweater and for a while the Leafs didn't have a Captain. Sittler eventually ended up in Philly and he was promised the Philly captaincy by new GM (and Sittler's friend) Bobby Clarke. Instead, Sittler got traded to Detroit. Rick Vaive was the Leaf Captain for awhile but he slept in one day and they took the captaincy away from him. Then he was traded to Chicago. During Doug Carpenter's tenure as Leaf coach, in an attempt to kiss the ass of a sulking Gary Leeman, the Leafs took the A away from Brad Marsh to give to Leeman. Leeman wouldn't take it and when they tried to give it back to Marsh, he wouldn't take it neither. The best story I remember about a captain concerned Mel Bridgman, late of the Senators. While he was in Philadelphia, Bobby Clarke, arguably one of the great captains of all time, was bumped up to the status of playing coach and so he had to relinquish the captaincy. Bridgman be- came the new captain. A reporter asked a Flyer what Bridgman did as a captain since Clarke was still the undisputed leader amongst the players. The reporter was told that Bridgman was in charge of making sure that the soap dispensers in the showers were always full. --
17
trimmed_train
10,861
Archive-name: ripem/faq Last-update: Sun, 7 Mar 93 21:00:00 -0500 ABOUT THIS POSTING ------------------ This is a (still rather rough) listing of likely questions and information about RIPEM, a program for public key mail encryption. It (this FAQ, not RIPEM) was written and will be maintained by Marc VanHeyningen, <[email protected]>. It will be posted to a variety of newsgroups on a monthly basis; follow-up discussion specific to RIPEM is redirected to the group alt.security.ripem. This month, I have reformatted this posting in an attempt to comply with the standards for HyperText FAQ formatting to allow easy manipulation of this document over the World Wide Web. Let me know what you think. DISCLAIMER ---------- Nothing in this FAQ should be considered legal advice, or anything other than one person's opinion. If you want real legal advice, talk to a real lawyer. QUESTIONS AND ANSWERS --------------------- 1) What is RIPEM? RIPEM is a program which performs Privacy Enhanced Mail (PEM) using the cryptographic techniques of RSA and DES. It allows your electronic mail to have the properties of authentication (i.e. who sent it can be confirmed) and privacy (i.e. nobody can read it except the intended recipient.) RIPEM was written primarily by Mark Riordan <[email protected]>. Most of the code is in the public domain, except for the RSA routines, which are a library called RSAREF licensed from RSA Data Security Inc. 2) How can I get RIPEM? RIPEM contains the library of cryptographic routines RSAREF, which is considered munitions and thus is export-restricted from distribution to people who are not citizens or permanent residents of the U.S. or Canada. Therefore, the following request is quoted from the README file: #Please do not export the cryptographic code in this distribution #outside of the USA or Canada. This is a personal request from me, #the author of RIPEM, and a condition of your use of RIPEM. Note that RSAREF is not in the public domain, and a license for it is included with the distribution. You should read it before using RIPEM. The best way to get it is to ask a friend for a copy, since this will reduce the load on those sites that do carry it (not to mention the humans that run them.) Naturally this requires that you trust the friend. RIPEM is available via anonymous FTP to citizens and permanent residents in the U.S. from rsa.com; cd to rsaref/ and read the README file for info. Last I looked, this site contains only the source tree, and does not contain compiled binaries or the nice Mac version. RIPEM, as well as some other crypt stuff, has its "home site" on rpub.cl.msu.edu, which is open to non-anonymous FTP for users in the U.S. and Canada who are citizens or permanent residents. To find out how to obtain access, ftp there, cd to pub/crypt/, and read the file GETTING_ACCESS. For convenience, binaries for many architectures are available here in addition to the full source tree. 3) Will RIPEM run on my machine? Probably. It has already been ported to MS-DOS and most flavors of Unix (SunOS, NeXT, Linux, AIX, ULTRIX, Solaris, etc.) Ports to Macintosh include a standard UNIX-style port and a rather nice Mac-like port written by Raymond Lau, author of StuffIt. More ports are expected, and help of users is invited. 4) Will RIPEM work with my mailer? Probably. How easy and clean the effective interface is will depend on the sophistication and modularity of the mailer, though. The users guide, included with the distribution, discusses ways to use RIPEM with many popular mailers, including Berkeley, mush, Elm, and MH. Code is also included in elisp to allow easy use of RIPEM inside GNU Emacs. If you make a new interface for RIPEM or create an improvement on one in the distribution which you believe is convenient to use, secure, and may be useful to others, feel free to post it to alt.security.ripem. 5) What is RSA? RSA is a crypto system which is asymmetric, or public-key. This means that there are two different, related keys: one to encrypt and one to decrypt. Because one cannot (reasonably) be derived from the other, you may publish your encryption, or public key widely and keep your decryption, or private key to yourself. Anyone can use your public key to encrypt a message, but only you hold the private key needed to decrypt it. (Note that the "message" sent with RSA is normally just the DES key to the real message. (See "What is DES?") Note that the above only provides for privacy. For authentication, the fingerprint of the message (See "What is a fingerprint, like MD5?") is encrypted with the sender's private key. The recipient can use the sender's public key to decrypt it and confirm that the message must have come from the sender. RSA was named for the three men (Rivest, Shamir and Adleman) who invented it. To find out more about RSA, ftp to rsa.com and look in pub/faq/ or look in sci.crypt. 6) What is DES? DES is the Data Encryption Standard, a widely used symmetric, or secret-key, crypto system. Unlike RSA, DES uses the same key to encrypt and decrypt messages. However, DES is much faster than RSA. RIPEM uses both DES and RSA; it generates a random key and encrypts your mail with DES using that key. It then encrypts that key with the recipient's public RSA key and includes the result in the letter, allowing the recipient to recover the DES key. DES is sometimes considered weak because it is somewhat old and uses a key length considered too short by modern standards. However, it should be reasonably safe against an opponent smaller than a large corporation or government agency. It is not unlikely that future RIPEMs will strengthen the symmetric cipher, possibly by using multiple encryption with DES. 7) What is PEM, and how does RIPEM relate? PEM is Privacy Enhanced Mail, a system for allowing easy transfer of encrypted electronic mail. It is described in RFCs 1421-1424; these documents have been approved and obsolete the old RFCs 1113-1115. RIPEM is not really a complete implementation of PEM, because PEM specifies certificates for authenticating keys, which RIPEM does not handle at this time. Their addition is planned. 8) What's this about distributing and authenticating keys? For a remote user to be able to send secure mail to you, she must know your public key. For you to be able to confirm that the message received came from her, you must know her public key. It is important that this information be accurate; if a "bad guy" convinces her that his key is in fact yours, she will send messages which he can read. RIPEM allows for three methods of key management: a central server, the distributed finger servers, and a flat file. All three are described in the RIPEM users guide which is part of the distribution. None of them provide perfect security. 9) Why do all RIPEM public keys look very similar? RIPEM public keys begin with a PKCS identifier describing various characteristics about the key, so the first bunch of characters in your key may be the same as those of lots of other people's keys. This does not mean your keys are similar, but only that they are the same class of key, were generated with the same program, are of the same length, etc. 10) What is a fingerprint, like MD5? MD5 is a message digest algorithm produced by RSA Data Security Inc. It provides a 128-bit fingerprint, or cryptographically secure hash, of the plaintext. It is cryptographically secure because it is not possible (in a reasonable amount of computation) to produce a different plaintext which produces the same fingerprint. Thus, instead of signing the entire message with the sender's private key, only the MD5 of the message needs to be signed for authentication. MD5 is sometimes used for other purposes; for example, it is often used to map an input of arbitrary length to 128 bits of data, as a passphrase interpreter or cookie generator. MD5 is described in its entirety (including an implementation in C) in RFC 1321. 11) What is PGP? PGP is another cryptographic mail program called Pretty Good Privacy. PGP has been around longer than RIPEM, and works somewhat differently. PGP is not compatible with RIPEM in any way, though PGP does also use RSA. Some major differences between PGP and RIPEM: - PGP has more key management features, particularly for users without a direct network connection. - RIPEM conforms to the PEM RFCs and thus has a greater probability of working with other PEM software. PGP makes no attempt to be compatible with anything other than PGP (in fact, PGP 1.0 is not compatible with PGP 2.0.) - RIPEM uses RSAREF, a library of RSA routines from RSA Data Security Inc. RSAREF comes with a license which allows noncommercial use. PGP uses its own implementation of RSA which is not licensed; thus, PKP, the firm holding the U.S. patents on the RSA algorithm, claims that it is a infringement of that patent to make, use or sell PGP in the U.S. or Canada. In acknowledgement of this, PGP's original author, Phil Zimmermann, says in the documentation: #In fact, if you live in the USA, and you are not a Federal agency, #you shouldn't actually run PGP on your computer, because Public #Key Partners wants to forbid you from running my software. PGP is #contraband. - Both PGP and RIPEM are export-restricted, and cannot be sent outside the U.S. and Canada. However, PGP already exists on many ftp sites in Europe and other places. Whether you use PGP or RIPEM or whatever, the documentation to PGP is recommended reading to anyone interested in such issues. Note that the above facts, both regarding patent and export restrictions, are somewhat controversial; many people think it shouldn't be that way, and some people interpret various documents differently. Unfortunately, discussions of it on the net inevitably seem to produce more heat than light, and probably belong in misc.legal.computing. (See: "DISCLAIMER") 12) What about RPEM? RPEM stands for Rabin Privacy Enhanced Mail. It was similar to RIPEM, but used a public-key cipher invented by Rabin (which is not RSA) in an attempt to avoid the patent on RSA. It was written by Mark Riordan, the same author as RIPEM. Its distribution was halted when, contrary to the beliefs of many (including Rabin), Public Key Partners (PKP) claimed that their patent was broad enough to cover any public-key cipher whose strength rested in the difficulty of factoring products of large primes, not just RSA. This claim is not universally accepted by any means, but was not challenged for pragmatic reasons. RPEM is not really used anymore. It is not compatible with RIPEM or PGP. 13) What is MIME? MIME stands for Multipurpose Internet Mail Extensions, and is described in RFC 1341. You can find out about it in the newsgroup comp.mail.mime. How PEM should interact with MIME is not yet entirely clear; some people use the stopgap solution of having a MIME type application/x-ripem in order to send RIPEM messages as MIME ones. I hope some standards will emerge. Draft Internet documents exist on the matter. 14) I have this simple way to defeat the security of RIPEM...
7
trimmed_train
9,353
Cannot? Try, will not. --- "One thing that relates is among Navy men that get tatoos that say "Mom", because of the love of their mom. It makes for more virile men." Bobby Mozumder ( [email protected] ) April 4, 1993
8
trimmed_train
399
Does anyone know how to reach Micron? I am interested in getting some specifics about what types of monitors work with their Micron Xceed card for the se/30. either e-mail or phone number would be prefered. Or if you have the answers to my questions, i'd appreciate a reply. Thanks. -- ---------------------------------------------------------------- julia hsieh My opinions are not intended to reflect [email protected] those of Hughes Aircraft Company.
14
trimmed_train
2,827
Has anyone tried connecting an Apple Laserwriter II to a PC? Do I need any special controller card or software to do that? Thanks for any comments.
3
trimmed_train
6,273
:Yea, there are millions of cases where yoy *say* that firearms :'deter' criminals. Alas, this is not provable. I think that that :there are actually *few* cases where this is so. You "think" wrong. Ask the FBI. They've got the proof. Look it up. :The bulk of firarems are used against unworthy and unnesessary :opponents ... those who posessa a cool jakcet you want, those who :would argue with you about a parking space, those who would :take your woman. In short, trivial and worthless causes. You lie like a snake. The "vast majority" of the 200 MILLION firearms in this country are never used in anger. Your feelings notwithstanding. :Too much of this has ruined you cause. There is no recovery. :In the near future, federal martials will come for your arms. :No one will help you. You are more dangerous, to their thinking, :than the 'criminal'. This is your own fault. We will overcome the kind of blind, pig-headed, utterly stupid idiocy that you and others spout in a vain attempt to further your own agendas. We will make the truth be known, despite your best efforts to the contrary. :The 2nd amendment is dead. Accept this. Find another way. The Second Amendment won't be dead unless it is repealed. That won't happen. EVER. Accept this. Find another way to try and control other's lives, because we see you for what you are, and we are not fooled. Mike Ruff
9
trimmed_train
12
--
14
trimmed_train
5,035
At the Lester Patrick Awards lunch, Bill Torrey mentioned that one of his options next season is to be president of the Miami team, with Bob Clarke working for him. At the same dinner, Clarke said that his worst mistake in Philadelphia was letting Mike Keenan go -- in retrospect, almost all players came realize that Keenan knew what it took to win. Rumours are now circulating that Keenan will be back with the Flyers. Nick Polano is sick of being a scapegoat for the schedule made for the Red Wings; After all, Bryan Murray approved it. Gerry Meehan and John Muckler are worried over the Sabres' prospects; Assistant Don Lever says that the Sabres have to get their share now, because a Quebec dynasty is emerging ... The Mighty Ducks have declared that they will not throw money around loosely to buy a team. Oilers coach Ted Green remarked that "There some guys around who can fill Tie Domi's skates, but none who can fill his helmet." Senators' Andrew McBain told off a security guard at Chicago Stadium who warned him of the stairs leading down to the locker room; McBain mouthed off at him, after all being a seasoned professional ... and tumbled down the entire steep flight. gld
17
trimmed_train
1,891
no, sheesh, didn't you know 666 is the beast's apartment? 667 is across the hall from the beast, and is his neighbor along with the rest of the 6th floor. This doesn't seem discordant to you?
15
trimmed_train
8,857
I want to go from 512K to 1M VRAM on my Quadra 800. How many 512K SIMMS do I need to buy? Is the current 512K soldered on the board or do I need to take out the current VRAM before I add more? Thanks, Wesley Stuart Jones
14
trimmed_train
1,276
I need to get an Apple 40SC tape backup unit working under Sys 7.0.x, but do not have any drivers/software to access the device. Does anyone know where I can fidn the tools to access this device? Appreciate any info/comments. --curtis
14
trimmed_train
9,350
MELITTIN
19
trimmed_train
6,343
S P H E R I C A L D E S I G N I N G
1
trimmed_train
10,138
Oh no! Say it isn't so! Yes, Yl|nen is a draft choice of the Jets. (Assuming, of course, this is the same Yl|nen that played for Kiekko-Espoo in 1990-91.) He was a 5th round, 91st overall pick of the Jets in the 1991 entry draft. I noticed in the summaries that Yl|nen had really begun to play well in the playoffs.
17
trimmed_train
1,176
Any lunar satellite needs fuel to do regular orbit corrections, and when its fuel runs out it will crash within months. The orbits of the Apollo motherships changed noticeably during lunar missions lasting only a few days. It is *possible* that there are stable orbits here and there -- the Moon's gravitational field is poorly mapped -- but we know of none. Perturbations from Sun and Earth are relatively minor issues at low altitudes. The big problem is that the Moon's own gravitational field is quite lumpy due to the irregular distribution of mass within the Moon.
10
trimmed_train
2,587
All these people who send in their polls should take a closer look at NJD, they are a very deep team, with two very capable goalies, and excellent forwards and defensemen. Shooter in Richer, an all around do it all in Todd, chef Stasny-master of a thousand dishes, power play captain-Stevens. Take a look at the numbers, or play with them and see for yourselves.
17
trimmed_train
7,210
Trade your old PC for my new modem. Modem comes with coupond good for travel to/from Europe. 14.4 v.42bis modem MODEM FEATURES: MNP5 2-to-1 Compression & Error Correction V.42bis 4-to-1 Compression & Error Correction CCITT V.32bis Compatible (14.4k bps) CCITT V.32 Compatible (9.6k bps) CCITT V.22bis Compatible (2.4k bps) AT Command Set Compatible Compatible with IBM PC/XT/AT/386's and Compatibles Bundled with Communications Software PC Bus interface Two RJ11C Connectors: Phone and Line
5
trimmed_train
318
I am hoping to produce the first update of the BB DDD this week; please send info about the most significant (longest, most critical, etc.) home run that you have seen yet this season.
2
trimmed_train
6,422
Basically, there are two algorithms determining whether a point is inside, outside or on the polygon. The first one is Ray (or half line) method. In this method, you can draw any ray, if the number of the intersection point of the ray and the polygon is even, then it is outside. If the number is odd, then it is inside. Of cause, you have to deal with the special cases which may make you headache. The second method is PI algorithm. Draw the lines between the point and all the vertices on the polygon. Calculate and sum the angles of the successive lines. If the result is 2*PI, then it is inside. If PI, then it is on the polygon. Otherwise it is outside. My experience tells the second method is relible. Hope this helps.
1
trimmed_train
6,865
steps deleted {> ... {> {> It's an interesting idea, but the worst-case data patterns developed to {> test magnetic media are totally different than the patterns used to detect {> common faults in memory chips. {> I was having major memory problems a few monthes ago. getting parity error - system halted error message in windows. I ran QA/PLUS, Check It, Diagnose, as well as several shareware memory checkers. I had a total of 8 meg SIMM in my system. these store bought/ shareware memory diagnostics either ran fine without errors or found an error at some address that I couldn't place on a memory chip. Out of exahperation I came up with the (now deleted) steps to find bad memory chips. I found 2 (moral : never buy memory stamped "not for sensitive or critical applications" on the back. anyway I did filter out all the bad memory chips using combinations of 4 of the 8 meg chips and creating a RAM drive to test on. Although it dodn't alleviate my parity error problems in windows. I did manage to find bad memory chips in this manner It has NEVER failed to find a bad chip for me. and the commercial/ shareware have always faild me either not finding the error or pointing to an addreww which I have no idea on what chip it is. p.s. man my typing stinks today and I don't feel like futzing around with this line editor. -David =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
3
trimmed_train
5,855
Speaking of Psygnosis, they have licensed games to Philips Interative Media International for CD-I. The following was recently posted in a message in the CD-I section of the Multimedia Forum. "Seventh Guest has been licensed by Virgin Games to Philips Interactive Media International for worldwide CD-I rights. Were also licensed to P.I.M.I. Litil Divil from Gremlin Graphics (UK) and Microcosm from Psygnosis (UK). Those three titles will be adapted on CD-I using the full potential of the FMV cartridge, meaning, using the additional memory as well as the motion video capabilities. Those titles have been negociated in Europe but will be available worldwide. Also, Lemmings 1 & 2 have been licensed from Psygnosis, as well as Striker Soccer from Rage (UK)." I don't know when these titles will be available or when work on them even started (so don't expect your CD-I retailer to have them yet). There was also some mention of future Nintendo CD-I games in an issue of the UK magazine ERT - Mario Hotel was mentioned as having 75 levels. Mark [Although I work for Philips, I don't work on CD-I or multimedia. The above info is just provided in good faith from what I've read and does not represent any statement from Philips]
1
trimmed_train
200
I first read and consulted rec.guns in the summer of 1991. I just purchased my first firearm in early March of this year.
9
trimmed_train
2,289
We also cannot fail to note the intense suffering a devastation which has been wrecked on our world because of Christians -- who were certain they were following Christ. From Captialist who have polluted the enviorment in strict obedience to the Gensis command to subdue the earth, to Nazi's who have "justly" punished the Jews for the killing Christ (as well as the other progroms), the innocent women who were burned alive in accordance with "you shall not allow a witch to live", the Moslems who were killed in the Crusades, the god-fearing men destroyed by the inquistion. The religious wars in Spain, France, England, etc. Christianity has undoubtedly caused the most suffering and needless loss of life by individuals whose certainity that they were following the instructions therein, was unquestionable. There is much to grieve.
0
trimmed_train
5,874
oh, i see. electricity is a natural right & our wonderful government would -never- cut off the power to the people they were besieging. are you really this dumb, or just acting like it for the sake of argument? jason
9
trimmed_train
9,978
Isn't that interesting?! In the Jewish tradition you are incredibly wrong! They originate in the Torah and with Jewish ancestors, specifically the Patriarch Abraham (z"l). That knowledge was sent East to India and China when Abraham gave "gifts" (the commentators to Jewish scripture say this was the knowledge of the occult arts) to all the rest of his children when he sent them away to the East. This assured that Isaac only, who remained with Abraham, would inherit his most important spiritual gifts, what eventually became Judaism. So you see, other religions can have very parochial views too. By the Jewish view, you are very mistaken, your scripture are not scripture, your gods are not gods, your practices a jumble of errors that lead people to idol worship and away from God. That doesn't stop us from respecting you to the extent of not trying to convert you or proselytize you and being willing to dialog in a respectful manner. We're content to let you live the way you care to live as long as you leave us be. We are happy to co-exist as long as you give us the same right. But your incredible rudeness and violent nature seems to preclude that. Too bad. Is this typical of your religion? You are a most presumptuous fellow! How dare you presume that the "typical" New Ager doesn't acknowledge God and is selfish. What trite, self-righteous, ego-ful garbage! There are Buddhists, Christians, Jews, and those of many other religions here on this newsgroups for whom your words are simple slander. Of course, from the Jewish perspective you are incredibly wrong. We'd say that there is no "godhead" -- just created beings who may be enjoying a good laugh at your expense. So not only are we selfish, we are also thieves and liars! And you expect any of us to pay attention to you and your "religion?" Why not call us more name? Maybe then we'll all convert in gratefullness! You delude yourself.
15
trimmed_train
7,979
I think he is trying to mislead people. In cases where race information is sought, it is completely voluntary (the census possibly excepted).
6
trimmed_train
11,199
I am so tired about all this debate on how many gays there are! Such arguments are basically worthless, imho. Would it really matter if it were millions of people who are regularly denied access to housing, employment, and personal security or even only one? As for death threats, I happen to know from personal experience that gay people are far more likely to receive them based on political veiws or even personal philosophies related to the issue of sexual orientation than are heterosex uals. Not a week goes by that I personally or one of my friends is not physically or verbally harrassed for even appearing to be gay. Everyone is garaunteed certain unalienable rights under our current form of government in theory, yet every day gay people are victimized by their local governments, by the police force, and by (for the most part) an uninformed and ignorant public. Is this democracy? I don't think so. A society's sense of justice is judged on the basis of the treatment of the people who make up that society. All of those people. And yes, that includes gays, lesbians, and bisexuals whose "crimes" have no victims, and who are as varied and diverse as the society of wich they are a part.
13
trimmed_train
8,976
Well, when you crosspost to talk.origins, what do you expect?
15
trimmed_train
4,113
What?! White, yes. Well off, definitely not. Hockey season ticket owners have the lowest average income of any of the four major North American sports. And think of where the majority of hockey players come from. From a farm out in Boondock, Saskatchewan or Weedville, Alberta. The inner city isn't the only place that is poor. I think the biggest barrier to hockey in the inner city is... no ICE to play on. Stace
17
trimmed_train
8,111
Hello all. I am thinking about buying an external monitor for my SE/30 and was wondering if anyone out in netland has any advice for me. I am mostly thinking about a 14" color monitor and an 8 bit card that can switch between 640*480 and something higher (like 800*600). I read an old report on a card from Lapis that could do this, but could not use the external monitor as the main screen (with menubar) which to me is a major draw- back. Has this perhaps been fixed? Or can any other cards do this (like the Micron Xceed) ? Also which monitor should I buy? At the moment I am leaning towards the Sony 1304, 1304s or 1320 (what exactly is the difference between these?) but are there any other good cheap monitors I should know about? Doesn't the monitor have to be multisync to support cards that can switch resolutions? Please send me e-mail and I'll summarize. I would also greatly appreciate getting the e-mail addresses of any mail order companys that sell monitors or cards. Thanks in advance
14
trimmed_train
5,824
I've seen this verse used to back up this idea: "...He has also set eternity in the hearts of men..." (Ecclesiastes 3:11)
0
trimmed_train
4,872
Hello Brad! Monday April 26 1993 17:24, Brad Smalling wrote to (crosspost 1) All: BS> For a VGA card these are the correct files but you can't just copy them BS> back and expect it to work. You have to create a new WIN.COM file. Try BS> the command (you will have to worry about what directories each file is in BS> since I don't know your setup): BS> COPY /B WIN.CNF+VGALOGO.LGO+VGALOGO.RLE WIN.COM BS> (I grabbed this from _Supercharging Windows_ by Judd Robbins--great book) BS> This is also how you can put your own logo into the Windows startup BS> screen. An RLE file is just a specially compressed BMP file. Brad, What is the procedure used to 'specially' compress the BMP file? I would love to use some of my BMP files I have created as a logo screen. Thanks Chris
18
trimmed_train
6,463
Yes, I am pro-gun, and yes, I do disagree with this statement. Nuclear weapons in and of themselves are dangerous. Radioactive decay of plutonium and uranium, as well as the tritium in the weapon, tends to be somewhat dangerous to living things. (Can you say "neutron flux"?) Plus these things have no self- defense purposes. It's kinda hard to justify their use as a militia weapon when at best they are meant for battlefield use (low-yield weapons) or at worst for industrial target obliteration (translation: cities and population centers). Not to mention that for it to be used as a militia weapon and expect the user to live requires some sort of launch vehicle . . .
9
trimmed_train
2,380
To construct a Kirlian device find a copy of _Handbook of Psychic Discoveries_ by Sheila Ostrander and Lynn Schroeder 1975 Library of Congress 73-88532. It describes the necessary equipment and suppliers for the Tesla coil or alternatives, the copper plate and setup. I used a pack of SX-70 film and removed a single pack in a dark room, then made the exposure, put it back in the film pack and ran it out through the rollers of the camera forinstant developing and very high quality. It is a good way to experience what Kirlian Photography is really and what it is not. As you know all ready, it is the pattern in the bioplasmic energy fieldthat is significant. Variations caused by exposure time, distance from the plate, or pressure on the plate, or variations in the photo materials are not important.
19
trimmed_train
3,671
Could someone PLEASE give a guess as to why this simple little program causes a BadPixmap error on the FOURTH (bizarre???) call to XtRelaizeWidget()? Here is the code: int stoploop = 0; static void Callback(Widget, XtPointer, XtPointer); main() { XtToolkitInitialize(); XtAppContext app = XtCreateApplicationContext(); while (1) { int junk = 0; Display *dis = XtOpenDisplay(app, NULL, NULL, NULL, NULL, 0, &junk, NULL); Widget top = XtAppCreateShell(NULL, NULL, applicationShellWidgetClass, dis, NULL, 0); Widget box = XtVaCreateManagedWidget("x", xmPushButtonWidgetClass, top, XmNheight, 25, XmNwidth, 25, NULL); XtAddCallback(box, XmNactivateCallback, Callback, NULL); XtRealizeWidget(top); while (!stoploop) { XEvent event; XtAppNextEvent(app, &event); XtDispatchEvent(&event); } stoploop = 0; XtReleaseGC(top, XDefaultGCOfScreen(XtScreen(top))); // needed? XtDestroyWidget(top); XtCloseDisplay(dis); } } static void Callback(Widget, XtPointer, XtPointer) { stoploop = 1; } The error I get (yes, the 4TH time I try to show the box) is: X Error of failed request: BadPixmap (invalid Pixmap parameter) Major opcode of failed request: 55 (X_CreateGC) Resource id in failed request: 0xd0000d Serial number of failed request: 71 Current serial number in output stream: 85 Please respond via email. Thanks very, very much! (NOTE: I realize this program does nothing useful, its an ultra-trivialized version fo a real library routine) -- ------------------------------------------------------------------------------- David Rex Wood -- [email protected] -- University of Colorado at Boulder
16
trimmed_train
5,931
Actually, there is one condemnation of lesbian acts in the Bible, Romans 1:26. I think. In There are plenty who don't read the Bible. Or pray for that matter.
15
trimmed_train
4,733
Can someone please remind me who said a well known quotation? He was sitting atop a rocket awaiting liftoff and afterwards, in answer to the question what he had been thinking about, said (approximately) "half a million components, each has to work perfectly, each supplied by the lowest bidder....." Attribution and correction of the quote would be much appreciated.
10
trimmed_train
8,409
>This is turning into 'what's a moonbase good for', and I ought not >to post when I've a hundred some odd posts to go, but I would >think that the real reason to have a moon base is economic. > >Since someone with space industry will presumeably have a much >larger GNP than they would _without_ space industry, eventually, >they will simply be able to afford more stuff. If I read you right, you're saying in essence that, with a larger economy, nations will have more discretionary funds to *waste* on a lunar facility. That was certainly partially the case with Apollo, but real Lunar colonies will probably require a continuing military, scientific, or commercial reason for being rather than just a "we have the money, why not?" approach. Ah, but the whole point is that money spent on a lunar base is not wasted on the moon. It's not like they'd be using $1000 (1000R?) bills to fuel their moon-dozers. The money to fund a lunar base would be spent in the country to which the base belonged. It's a way of funding high-tech research, just like DARPA was a good excuse to fund various fields of research, under the pretense that it was crucial to the defense of the country, or like ESPRIT is a good excuse for the EC to fund research, under the pretense that it's good for pan-European cooperation. Now maybe you think that government-funded research is a waste of money (in fact, I'm pretty sure you do), but it does count as investment spending, which does boost the economy (and just look at the size of that multiplier :->).
10
trimmed_train
2,454
Do anyone know about any shading program based on Xlib in the public domain? I need an example about how to allocate correct colormaps for the program. Appreciate the help.
16
trimmed_train
1,693
... This is a common problem with highly complex TrueType fonts. Microsoft admits to a problem with older versions of the PostScript printer driver, but I've found it to be pretty generic. You can get around the problem by adjusting the parameter OutlineThreshold in the [TrueType] section of WIN.INI. This entry specifies the number of pels-per-em at which Windows will render TrueType fonts as outline fonts instead of as bitmap fonts. The default is 256. I've generally been able to get fonts to work by setting OutlineThreshold=160. Depending on your printer resolution and the point size you are using, you may need a different value. The Windows Resource Kit warns against going above 300. Presumably, that might cause fonts to print as square boxes or something. :-| (I'm not smiling.)
18
trimmed_train
9,903
I wrote in response to [email protected] (Darius_Lecointe): Was Paul a God too? Is an interpretation of the words of Paul of higher priority than the direct word of Jesus in Matt5:14-19? Paul begins Romans 14 with "If someone is weak in the faith ..." Do you count yourself as one who is weak in the faith? Yes, but what does the Bible have to say? What did Jesus say? Paul closes Romans 14 with, "On the other hand, the person with doubts about something who eats it anyway is guilty, because he isn't acting on his faith, and any failure to act on faith is a sin." Gaus, ISBN:0-933999-99-2 Have you read the Ten Commandments which are a portion of the Law? Have you read Jesus' word in Matt5:14-19? Is there any doubt in your mind about what is right and what is sin (Greek hamartia = missing the mark)? Whereas, the Ten Commandments and Jesus' words in Matt5:14-19 are fairly clear, are they not? Matt5:14-19 doesn't answer your question? Breaking bread - roughly synonymous with eating. How do you unite this concept of yours with the Ten Commandments and Jesus's word in Matt5:14-19? Or, they assumed that the Ten Commandments and Jesus' word in Matt5:14-19 actually stood for something? Perhaps they were "strong in the faith?" --------------------------- [No, I don't believe that Paul can overrule God. However Paul was writing for a largely Gentile audience. The Law was regarded by Jews at the time (and now) as binding on Jews, but not on Gentiles. There are rules that were binding on all human beings (the so-called Noachic laws), but they are quite minimal. The issue that the Church had to face after Jesus' death was what to do about Gentiles who wanted to follow Christ. The decision not to impose the Law on them didn't say that the Law was abolished. It simply acknowledged that fact that it didn't apply to Gentiles. Thus there is no contradiction with Mat 5. As far as I can tell, both Paul and other Jewish Christians did continue to participate in Jewish worship on the Sabbath. Thus they continued to obey the Law. The issue was (and is) with Gentile Christians, who are not covered by the Law (or at least not by the ceremonial aspects of it). Jesus dealt mostly with Jews. I think we can reasonably assume that Mat 5 was directed to a Jewish audience. He did interact with Gentiles a few times (e.g. the centurion whose slave was healed and a couple of others). The terms used to describe the centurion (see Luke 7) suggest that he was a "God-fearer", i.e. a Gentile who followed God, but had not adopted the whole Jewish Law. He was commended by Jewish elders as a worthy person, and Jesus accepted him as such. This seems to me to indicate that Jesus accepted the prevailing view that Gentiles need not accept the Law. However there's more involved if you want to compare Jesus and Paul on the Law. In order to get a full picture of the role of the Law, we have to come to grips with Paul's apparent rejection of the Law, and how that relates to Jesus' commendation of the Law. At least as I read Paul, he says that the Law serves a purpose that has been in a certain sense superceded. Again, this issue isn't one of the abolition of the Law. In the middle of his discussion, Paul notes that he might be understood this way, and assures us that that's not what he intends to say. Rather, he sees the Law as primarily being present to convict people of their sinfulness. But ultimately it's an impossible standard, and one that has been superceded by Christ. Paul's comments are not the world's clearest here, and not everyone agrees with my reading. But the interesting thing to notice is that even this radical position does not entail an abolition of the Law. It still remains as an uncompromising standard, from which not an iota or dot may be removed. For its purpose of convicting of sin, it's important that it not be relaxed. However for Christians, it's not the end -- ultimately we live in faith, not Law. While the theoretical categories they use are rather different, in the end I think Jesus and Paul come to a rather similar conclusion. The quoted passage from Mat 5 should be taken in the context of the rest of the Sermon on the Mount, where Jesus shows us how he interprets the Law. The "not an iota or dot" would suggest a rather literal reading, but in fact that's not Jesus' approach. Jesus' interpretations emphasize the intent of the Law, and stay away from the ceremonial details. Indeed he is well known for taking a rather free attitude towards the Sabbath and kosher laws. Some scholars claim that Mat 5:17-20 needs to be taken in the context of 1st Cent. Jewish discussions. Jesus accuses his opponents of caring about giving a tenth of even the most minor herbs, but neglecting the things that really matter: justice, mercy and faith, and caring about how cups and plates are cleaned, but not about the fact that inside the people who use them are full of extortion and rapacity. (Mat 23:23-25) This, and the discussion later in Mat 5, suggest that Jesus has a very specific view of the Law in mind, and that when he talks about maintaining the Law in its full strength, he is thinking of these aspects of it. Paul's conclusion is similar. While he talks about the Law being superceded, all of the specific examples he gives involve the "ceremonial law", such as circumcision and the Sabbath. He is quite concerned about maintaining moral standards. The net result of this is that when Paul talks about the Law being superceded, and Jesus talks about the Law being maintained, I believe they are talking about different aspects of the Law. Paul is embroiled in arguments about circumcision. As is natural in letters responding to specific situations, he's looking at the aspect of the Law that is currently causing trouble: the Law as specifically Jewish ceremonies. He certainly does not intend to abolish divine standards of conduct. On the other hand, when Jesus commends the Law, he seems to be talking the Law in its broadest implications for morals and human relationships, and deemphasizing those aspects that were later to give Paul so much trouble. It's unfortunate that people use the same terms in different ways, but we should be familiar with that from current conflicts. Look at the way terms like "family values" take on special meaning from the current context. Imagine some poor historian of the future trying to figure out why "family values" should be used as a code word for opposition to homosexuality in one specific period in the U.S. I think Law had taken on a similar role in the arguments Paul was involved in. Paul was clearly not rejecting all of the Jewish values that go along with the term "Law", any more than people who concerned about the "family values" movement are really opposed to family values.
0
trimmed_train
10,689
Rutin is a bioflavonoid, compounds found (among other places) in the rinds of citrus fruits. These have been popular, especially in Europe, to treat "capillary fragility", and seemingly in even more extreme cases-- a few months ago, a friend was visiting from Italy, and he said that he'd had hemorrhoids, but his pharmacist friend sold him some pills. Incredulously, I asked to look at them, and sure enough these contained rutin as the active ingredient. I probably destroyed the placebo effect from my skeptical sputtering. I have no idea how he's doing hemorrhoid-wise these days. The studies which attempted to look at the effect of these compounds in human disease and nutrition were never very well controlled, so the reports of positive results with them is mostly anecdotal. This stuff is pretty much non-toxic, and probably inexpensive, so there's little risk of trying it, but I wouldn't expect much of a result.
19
trimmed_train
4,487
Careful now folks... Also consider the 90VAC+ @20Hz that is forced on ring and tip when the phone's supposed to ring! Even with a simple zener and LED setup, you might end up with some carbon real quick. Whatever scheme you use, make sure you've got at least 200V-rated components on the frontend. Also remember that, if I'm not mistaken, the phone line is a 600ohm equivalent circuit. Any current you draw from the 48V or so gets dropped across that 600ohms. That's fine until you're down to roughly 12V, when Ma Bell considers it to be off-hook. But dropping it that far down is probably a big no-no. The easiest implementation to accomplish the above?? tip ------->|-----\/\/\/\-----+----------+ rectifier resistor | | diode | \ V / zener /---/ \ resistor | / | | | V LED | --- | | ring --------------------------+----------+ This is only a suggestion...go ahead and blow holes in it, but you get the idea. Choose a high-efficiency LED so you don't need much current to get it to light up. Choose values for the other components as required.
11
trimmed_train
6,527
Are you suggesting that we should forget the cold-blooded genocide of 2.5 million Muslim people by the Armenians between 1914 and 1920? But most people aren't aware that in 1939 Hitler said that he would pattern his elimination of the Jews based upon what the Armenians did to Turkish people in 1914. 'After all, who remembers today the extermination of the Tartars?' (Adolf Hitler, August 22, 1939: Ruth W. Rosenbaum (Durusoy), "The Turkish Holocaust - Turk Soykirimi", p. 213.) I refer to the Turks and Kurds as history's forgotten people. It does not serve our society well when most people are totally unaware of what happened in 1914 where a vicious society, run by fascist Armenians, decided to simply use the phoniest of pretexts as an excuse, for wiping out a peace-loving, industrious, and very intelligent and productive ethnic group. What we have is a demand from the fascist government of x-Soviet Armenia to redress the wrongs that were done against our people. And the only way we can do that is if we can catch hold of and not lose sight of the historical precedence in this very century. We cannot reverse the events of the past, but we can and we must strive to keep the memory of this tragedy alive on this side of the Atlantic, so as to help prevent a recurrence of the extermination of a people because of their religion or their race. Which means that I support the claims of the Turks and Kurds to return to their lands in x-Soviet Armenia, to determine their own future as a nation in their own homeland. Serdar Argic
6
trimmed_train
6,208
I had the same question for my 55lb NEC 5FG monitor. The Apple guy said that their 50lb 16" monitor is OK to put ontop of the Centris and had no coment beyond that. I was going to just put the NEC on the box but then I got to thinking - the monitor has a small tilt/swivel base so maybe the weight would be more concentrated than with Apple's (I don't know the area of the base of their tilt/swivel). Additionally, the CDROM drive is in the middle. So I cut a piece of 3/8" thick wood to about 16.25" x 12", covered it in a cream covered cloth, and used it as a buffer layer between the Centris's top and the monitor!! Mick Mueck [email protected]
14
trimmed_train
3,328
Level 5 refers to the Carnegie-Mellon Software Engineering Institute's Capability Maturity Model. This model rates software development org's from1-5. with 1 being Chaotic and 5 being Optimizing. DoD is beginning to use this rating system as a discriminator in contracts. I have more data on thifrom 1 page to 1000. I have a 20-30 page presentation that summarizes it wethat I could FAX to you if you're interested... Bret Wingert [email protected]
10
trimmed_train
6,706
Jehovah's Witnesses do not believe that Christians are required to observe the Sabbath, whether it is on Saturday or Sunday. The Sabbath was part of a Covenent between God and the Israelites and is not required for Christians.
15
trimmed_train
2,616
: : Where could I find a description of the JPG file format? Specifically : I need to know where in a JPG file I can find the height and width of : the image, and perhaps even the number of colors being used. : : Any suggestions? : : Peter Try ftp.uu.net, in /graphics/jpeg. --
1
trimmed_train
9,973
Deion Sanders hit a home run in his only AB today. Nixon was 1 for 4. Infield single. Deion's batting over .400 Nixon: around .200. Whom would YOU start? Wise up, Bobby. See y'all at the ballyard Go Braves Chop Chop Michael Mule'
2
trimmed_train
6,954
1. There is a similar idea here in ex-USSR about how many militioners it needs to place a new electric lamp. The answer is nine: one stays on a table and holds the lamp, four hold the table and turn it and yet four run around the table in opposite direction not to make the first feel bad (when being turned). Pitily, it lacks this kind of dark humour as Nick's msg does. 2. To my mind the signature should be smth like: / _ __ / . /_______/_/_______________ /________ /____/ /___ / _ / Albert
6
trimmed_train
9,407
I can't answer most of your questions, but I've seen it happen in family members who are being treated with radiation and/or chemotherapy. Jory Graham published a cookbook many years ago (in cooperation with the American Cancer Society, I think) called "Something has to taste good" (as I recall). The cookbook was just what we needed several times when favorite foods suddenly became "yech".
19
trimmed_train
1,931
Currently, he's all over. He played 2nd when Deshields was out. He was shifted to third when Delino came back. And today, he played SS for a cold Wil Cordero. His natural positions seem to be in the middle infield, but they will seemingly find a spot for himm somewhere as long as his bat is hot.
2
trimmed_train
6,968
# #Slavery makes economic sense (it NEVER makes MORAL sense) when human # #muscle power is an economically valuable asset. Agricultural slavery might # #have lasted right up to the first mechanical cotton reaper, but no # #further; reapers are cheaper than slaves, and don't have to be fed during # #the winter. # # This argument makes a several fundamental errors. First "agricultural" # slavery was not limited to production of cotton. In the American south # slave labor was used extensively to grow tobacco, sugar, and rice, all # of which remained labor intensive enterprises well into the 20th century. And of course, in states like Kentucky and Virginia, not well-suited to large-scale plantations, slave labor was used to make one of the most valuable agricultural products of all: more slaves. In some ways, this treatment of humans beings as breeding livestock is the most horrifying aspect of American slavery. # Second, although mechanization of cotton production could be expected to # reduce the demands for labor eventually, it was only in the 1940's # the mechanization of cotton production in the South largely eliminated # the labor intensive character of the operation, long after the "first # mechanical cotton reaper" was invented. This is an interesting question. Steinbeck's _Grapes of Wrath_ (published in the 1930s), uses agricultural mechanization of cotton production in Arkansas as the cause of the Joad family being evicted from the land. How many years were involved in the mechanization of cotton farming? When did this first appear? # #Ken Mitchell | The powers not delegated to the United States by the # Steve Hendricks | DOMAIN: [email protected]
13
trimmed_train
1,979
I saw a previous request for the Rules and Instructions for the USENET playoff pool but I haven't seen any responce. Does anybody have this info? If so post away or you could mail it to me. Thanks in advance.
17
trimmed_train
1,338
Yes, I remember that now. Well, in that case, the cones are indeed color sensitive, contrary to what the original respondent had claimed. -- ---------------------------------------------------------------------------- Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and [email protected] | it is shameful to surrender it too soon."
19
trimmed_train
9,057
Well, since the Oilers didn't win a heck of a lot of games, I'm not sure they deserve and MVP ("can't win without him"). However, I'd suggest Kelly Buchberger instead of Dave Manson, who has had a brutal year, his pick for the All-Star game notwithstanding. As for biggest surprise, I'd say that Buchberger had higher expectations this year due to his "breakthrough" year (for him) last year, so he didn't really raise his game. My suggestion would be Shjon Podein, one of the callups from Cape Breton during the year. He was quite far down on the depth chart in the Oilers stable of prospects, but made a big impact on the team. He has 12 goals in his 33 games and is only -1. Those are decent numbers for a third-line player who was seemingly doomed to minor-league oblivion. The Oilers coaching staff likens his style to John Tonelli. I think he'll be on the full-time roster next year. As for biggest disappointment, you could name any of the players the Oilers dumped for lousy production this year (Nicholls, Gilchrist, Tikkanen) or even Shayne Corson, but Mellanby isn't far off. -- Andrew Scott | [email protected] HP IDACOM Telecom Division | (403) 462-0666 ext. 253
17
trimmed_train