id
int32 1
11.3k
| text
stringlengths 0
74.9k
| label
int64 0
19
| Generalization
stringclasses 1
value |
---|---|---|---|
4,667 | 1. IBM PS/2 286; 30 meg hd; 1.44 disk drive 3.5"; extended keyboard; mouse,
mouse-pad; DOS, DOSSHELL, EXCEL, WINDO S, WORD, AMIPRO, GRE StudyWare.
$500 / b.o.
2. Zenith Date Systems supersport laptop computer
w/ 120V AC recharger; model 150-308 60 hz.
DOS 4.0
2 disc drives for 3.5" floppy
carrying case, manuals.
$350 / b.o.
3. 2 leather desk chairs (1) black $200. (2) brown $150. or both for
$300.
4. Olivetti manual typewriter, Tropical model.
Incl. characters for typing in Italian language.
$100.
Please reply via email or call me at my home number: (617) 277-9234.
Thanks,
Jason | 5 | trimmed_train |
4,735 |
Not to worry. The Masons have been demonized and harrassed by almost
every major Xian church there is. For centuries now. And still they
stand. They wil withstand the miserable Southern Boobtists, I am sure.
They may even pick up a little support as people start to listen to the
Boobtists and realize that subtracting the obvious lies and claims of
Satanism that the Masons sound pretty good by comparison. One thing is
known. A sizable proportion of Southern Babtists are Masons! And the
Masons have already fired back in their own magazines against the
Boobtist Witch-hunt.
Since the Consrervatives have already been a divisive element with
their war on Boobtist moderates and liberals, they may now start in on
their Mason/Boobtist brothers and hasten their own downfall as more and
more Southern Boobtists realize their church can't stand being run by a
handful of clowns looking for holy civil wars and purity tests and drop
'em out of the leadership positions they have taken over.
So as far as I am concerned, the louder, ruder, and more outrageous
an Anti-Masonic Crusade these old goats mount, the better.
Pop some pocorn and get a center row seat. The circus is about to begin.
And, Oh Look! HERE COME THE CLOWNS!
Pope Charles Slack!
| 15 | trimmed_train |
8,337 |
[Much text deleted]
: plus/minus ... it is the most misleading hockey stat available.
Not necessarily the most misleading, but you are right, it definitely
needs to be taken in the proper perspective. A shining example is
if you look at the Penguins individual +/-, you will find very few minuses.
That only makes common sense, since they didn't lose many games.
: Until the NHL publishes a more useful quantifiable statistic including ice
: time per game and some measure of its "quality" (i.e., is the player put out
: in key situations like protecting a lead late in the game; is he matched up
: against the other team's top one or two lines; short-handed, etc), I would
: much rather see the +/- disappear altogether instead of having its dubious
: merits trumpeted by those with little understanding of its implications.
Unfortunately, you will need to keep a ridiculous number of stats to
really come up with a statistic which really shows a player's value.
Let's just enjoy the game and not overanalyze it. (like I'm doing now,
excuse me!)
| 17 | trimmed_train |
1,903 |
[...]
[...]
So what? Justices William Brennan, Thurgood Marshall, John Paul
Stevens, and Byron White are associated with a plurality Supreme Court
decision that prevented the removal of "anti-American, anti-Christian,
anti-Semitic, and just plain filthy" books from a public high school
library [_Board of Education v. Pico_ (1982)]. Does this mean that
they could no longer defend free expression and privacy?
- Carl | 7 | trimmed_train |
2,851 | I am working on an X-Window based application that needs to
override some of the window manager focus processing. I am
using X11R4 and Motif 1.1 currently, although I will also be
working with Open Look in the future.
What I need to do is under certain circumstances prevent the
user from switching from one window of the application to
another window. Let's say, for example, that Window A is on top
of Window B in the window hierarchy. Normally, if the user clicks
the mouse in Window B it will be brought to the top of the
window hierarchy and placed on top of Window A. Under certain
circumstances if the user clicks the mouse in Window B I need to
beep and prevent Window B from being raised on top of Window
A.
From the research and testing I've done so far, it appears that
this window ordering is handled by the window manager, in this
case Motif. I haven't found any way to override this default
processing through standard X Window functions. I can tell
when this switching occurs through focus change and mapping
notify events, but I can't find any way to tell Motif not to make the
switch.
The temporary solution I've currently come up with is very
kludgy but it partially works. When I detect such a window switch
in those cases when the switch is not allowed, I manually force
the formerly top window back on top with an XRaiseWindow call
and beep with the XBell function. This provides the necessary
functionality but looks ugly when the windows switch places
twice.
Does anyone know how I can tell Motif (or preferably *any*
window manager) when I don't want the window order switch to
actually take place? Respond either by e-mail or posting to this
newsgroup.
Cheers.... Randall | 16 | trimmed_train |
4,807 |
But the impressive performance of the Graphite was
not its Winmark, it was its Wintach result (esp. the paint
performance). Judging from the Wintach tests, I can hardly
imagine that there is a cheat driver for it. | 18 | trimmed_train |
5,084 |
: Regardless of people's hidden motivations, the stated reasons for many
: wars include religion. Of course you can always claim that the REAL
: reason was economics, politics, ethnic strife, or whatever. But the
: fact remains that the justification for many wars has been to conquer
: the heathens.
: If you want to say, for instance, that economics was the chief cause
: of the Crusades, you could certainly make that point. But someone
: could come along and demonstrate that it was REALLY something else, in
: the same manner you show that it was REALLY not religion. You could
: in this manner eliminate all possible causes for the Crusades.
:
Scott,
I don't have to make outrageous claims about religion's affecting and
effecting history, for the purpsoe of a.a, all I have to do point out
that many claims made here are wrong and do nothing to validate
atheism. At no time have I made any statement that religion was the
sole cause of anything, what I have done is point out that those who
do make that kind of claim are mistaken, usually deliberately.
To credit religion with the awesome power to dominate history is to
misunderstand human nature, the function of religion and of course,
history. I believe that those who distort history in this way know
exaclty what they're doing, and do it only for affect. | 8 | trimmed_train |
6,107 | From: [email protected] (Duane Hentrich)
-BTW, I'm a WALC (white aryan lapsed catholic)
-
---
-d'baba Duane M. Hentrich [email protected]
-
I would like to go on record as objecting to Mr. Hentrich calling
himself an Aryan. The word `Aryan' is of Sanskrit origin and occurs first
in the Hindu scripture, the Rigveda. It seems to have been a tribal term
but may have had connotations of good character. Such connotations
are quite explicit in the sayings of the Buddha who called his religion the
eightfold Aryan path. The word was borrowed by the German scholar
Max Mueller who used it as a synonym for `indo-european', but then the
Nazis proceeded to steal it and started pretending that `aryan' is
synonymous with `nordic' which seems highly unlikely. The people who
originally called themselves aryas, the Iranians, Noprth Indians, the Afghans
and possibly the Kurds, are none of them nordic. So the use of the word
by Westerners, though meant with apparent good humor in this case, is
nontheless inappropriate. The only Westerners who may have some claim
to call themselves Aryans (by descent) are the Celts who seem to have wor-
shipped a god called Aryaman who is mentioned in the Rigveda.
If you want to check what I am saying, look at Mallory's book, ``In
search of the Indo-Europeans" or, just look at the Encyclopedia Britannica.
The reason this usage is offensive is that most of Ancient Indian literature
as well as religion is directly or inderectly due to the Aryans and
for Westerners to butt in is really not nice, not to mention the horrible
things done by Germans to Jews, using a word to which the Germans have
no clear claim. | 13 | trimmed_train |
9,386 | I'm the keeper of the stats for a family hockey pool and I'm looking
for daily/weekly email servers for playoff stats. I've connected with
the servers at [email protected] and [email protected]. I'm
still sorting these two out.
Are there others? Email please as my site doesn't get this group.
Thanks.
Rick | 17 | trimmed_train |
2,341 | I aparantly mistyped the address for the ftp site which holds the images. The
correct address should be:
jupiter.csd.unb.ca
^^
rather than jupiter.csd.unb.edu. They are in the directory:
\pub\library.info | 1 | trimmed_train |
699 |
This is a good idea - so you can carry your (non-alcoholic) drinks without
spilling or having someone hold on to them.
Fax machines, yes. Cellular phones: Why not get a hands-free model?
Seemingly unique to American luxury cars. The Big Three haven't yet realized
that the 1970s are over.
I agree. Just another display of Yuppie excess. | 4 | trimmed_train |
5,261 |
There was a Science fiction movie sometime ago (I do not remember its
name) about a planet in the same orbit of Earth but hidden behind the
Sun so it could never be visible from Earth. Turns out that that planet
was the exact mirror image of Earth and all its inhabitants looked like
the Earthings with the difference that their organs was in the opposite
side like the heart was in the right side instead in the left and they
would shake hands with the left hand and so on...
[email protected]
[email protected] | 10 | trimmed_train |
784 |
Science is the process of modeling the real world based on commonly agreed
interpretations of our observations (perceptions).
Values can also refer to meaning. For example in computer science the
value of 1 is TRUE, and 0 is FALSE. Science is based on commonly agreed
values (interpretation of observations), although science can result in a
reinterpretation of these values.
The values underlaying science are not objective since they have never been
fully agreed, and the change with time. The values of Newtonian physic are
certainly different to those of Quantum Mechanics. | 8 | trimmed_train |
10,239 |
That's fine, but would you name the "industy experts" so I can try to track
this down?
Yup. That's why I'm kinda curious... most SCSI problems I've encountered
are due to cabling.
noah | 14 | trimmed_train |
9,047 | I am looking for a source of orbital element sets
other than UAF/Space Command. I believe there is
one on CompuServe. Please let me know what other
possible sources there are and how I can reach
them. Thanks much.
| 10 | trimmed_train |
1,207 | I just got off the phone with Mathsoft technical service. They
are now admitting a problem of unknown nature with Maple and
Norton Desktop for Windows. They have no clue at this time
and are collecting configuration information on the systems
which exhibit the problem. Anyone having problems loading the
Maple solver in MathCad 4.0 under NDW shoud call technical
support at 617-577-1017. They made no schedule promices,
but are actively working on the problem.
In the meantime, the workaround is to provide a configuration
selection in autoexec.bat to use PROGMAN (yuk, pew) whenever
you plan to use the Maple solver and NDW otherwise. I am using
Norton BE to place a little menu on the screen with a 5 second
timeout to auto boot NDW. | 18 | trimmed_train |
10,301 |
Based on the same reasons? You mean you were opposed to US intervention in
Somalia because since Somalia is a European country instead of the third world,
the desire to help Somalia is racist? I don't think this "same reason" applies
to Somalia at all.
The whole point is that Somalia _is_ a third world country, and we were more
willing to send troops there than to Bosnia--exactly the _opposite_ of what
the "fixation on European countries" theory would predict. (Similarly, the
desire to help Muslims being fought by Christians is also exactly the opposite
of what that theory predicts.)
I'm referring to people who want to help at all, of course. You don't see
people sending out press releases "help Bosnian Serbs with ethnic cleansing!
The Muslim presence in the Balkans should be eliminated now!" (Well, except
for some Serbs, but I admit that the desire of Serbs in America to help the
Serbian side probably _is_ because those are people more like them.)
--
"On the first day after Christmas my truelove served to me... Leftover Turkey!
On the second day after Christmas my truelove served to me... Turkey Casserole
that she made from Leftover Turkey.
[days 3-4 deleted] ... Flaming Turkey Wings! ...
-- Pizza Hut commercial (and M*tlu/A*gic bait) | 6 | trimmed_train |
9,854 | 11 | trimmed_train |
|
1,217 |
Paul,
Unfortunately, there are not too many retail outlets that'll stock
just about every chip made. The stuff they will stock are the ones
that'll sell, like standard DRAM's, 80386's, 68000's, etc,etc.
i.e. I cna't think of any 'one-stop-shopping' store.
The closest you can get is to pick up a copy of Byte magazine or
the Circuit Cellar, Popular Electronics, and the like and flip
through them.
Distributors like Wyle Electronics, Hamilton Avnet, Pioneer Electronics,
etc, etc, don't normally deal with end-users like ourselves where
we only a couple of everything...they only deal with people who buy
by the hundreds or more. Each distributor represents and sells a variety of
different non-competing manufacturers. What do I mean by this?
Suppose ABC Electronics sells Intel 80386's. It's a pretty good
bet that they won't be selling any of AMD's 386's, or vice-versa.
They also can obtain just about *any* chip you want from a manufacturer
they represent.
Who knows? You might be lucky to be able to buy from one of them.
But I'd be suprised if you do. ALso bear in mind that the 1 or 2
qty prices they will charge you will be *much* greater than what
a mail order outlet will charge.
My advice? If you're gonna be designing anything, try to stick
with off-the-shelf stuff. You're going to get stuck if you use
too many esoteric parts sooner or later.
good luck, | 11 | trimmed_train |
5,256 |
Now this is getting interesting!
I was raised Roman Catholic before becoming an atheist, so I have stated
this Creed you quote nearly every Sunday until I was about 18. For some
reason, I always took the 'resurrection' in this statement to mean the
resurrection of the soul, but I guess resurrection does strictly mean
the raising of the physical body. I have some questions on this point:
1. I always thought that Christians believe the descent into hell was
pretty much immediate, and that there are people burning in hell right
now. You seem to be implying that it will not occur until after the
"great judgement" (which I read as meaning the proverbial Judgment Day).
I was always a little confused on this point, even when I was with the
church -- maybe someone can clear it up for me. Where will my "soul"
(which, by the way, I don't believe in) exist until that time?
2. Will the new body I will have be created out of the same atoms
that my body now is made of, or will it be built from scratch? My
physical body now is susceptible to aging, etc. -- so I guess my
new body will have to be radically different in order to be immortal
so it can be tortured for all eternity?
3. Since I will have a physical body, I assume it will need a physical
place to exist in -- where is this hell? In the center of the earth?
Do you think we could find it if we dig?
Mark Schnitzius
[email protected]
Univ. of Central Florida
[There is not complete agreement on the details of the afterlife. I
think the most common view is that final disposition does not occur
until a final judgement, which is still in the future. In the
meantime, some believe that people "sleep" until the final
resurrection (or because God is above time, pass directly from death
to the future time when the resurrection occurs), while others believe
that souls have a disembodied, pre-resurrection existence until then.
There are probably other alternatives that I'm omitting.
The new body is generally conceived of being implemented in a
different "technology" than the current one, one which is not mortal.
(Paul talks about the mortal being raised to immortality, and Jesus'
resurrected body -- which is the first example -- clearly was not
subject to the same kind of limitations as ours.) It is assumed that
there are enough similarities that people will recognize each other,
but I don't think most people claim to know the details. I don't
think I'd say it's the same atoms. I'd assume there would be some
analog of a physical place, but I wouldn't expect to find it under the
earth or up in the sky. I'd suspect that it's in another dimension,
outside this physical world, or whatever. But again, we have little
in the way of details. | 0 | trimmed_train |
6,833 | 0 | trimmed_train |
|
8,994 | ^^^^
^^^^^^^^
^^^
Geez, can I type or what?
--
-------------------------------------------------------------------------------
David Rex Wood -- [email protected] -- University of Colorado at Boulder | 2 | trimmed_train |
1,860 | VESA local bus motherboard,
4MB RAM,
64K cache,
1.2 & 1.44 Floppy,
130 MB Hard Drive,
IDE controller (2HD&2FD)
2S/1P/1G
Local Bus 1MB SVGA Video Card,
14" SVGA Monitor (.28dpi)
Mini Tower, 101-key Keyboard | 5 | trimmed_train |
4,897 | Hi folks
I'm planning to buy a LCIII but need advice on choosing a monitor.
What do people recommend for a decent 14"/15" monitor?
I'v looked at some ads and the spec for NEC 4FG/4FGe and the price is
within my budget, but could LCIII be able to use the various resolutions
available on 4FG (specifically the 1024x768 resolution)? Does LCIII only
support one resolution?
Also any recommendations for a reliable mail order place for LCIII or
monitors? Does anyone have experience with the following mail-order places?
SYEX EXPRESS (Houston, Tx)
USA FLEX (Bloomingdale, Il)
Thanks,
jeff
| 14 | trimmed_train |
1,020 | I am trying to put together a new PC with VESA Local Bus. I would like
to get VLB cards for Video and SCSI but I have heard of a problem with
bus mastering controllers on VLB. Something to the effect that they will
actually slow down a system. Anyone heard of this problem?
Specifically, I am interested in the Ultrastor 34F VLB SCSI controller.
Before I shell out the bucks for this thing I would like to get the
straight scoop from someone who knows. Does anyone have this controller?
Any problems with it?
--
| 3 | trimmed_train |
8,835 | I'm looking for information how W-NT uses Proteced Mode. (The HW support)
| 18 | trimmed_train |
1,618 |
Actually, I beleive "DWI" normally means "Driving While Impaired" rather
than "Intoxicated", at least it does in the states I've lived in...
One can be imparied without necessarily being impaired by liquor - drugs,
not enough sleep, being a total moron :-), all can impair someone etc... I'm
surprised this got her off the hook... Perhaps DWI in Lousiana *is* confined
to liquor?
Randy Davis Email: [email protected]
ZX-11 #00072 Pilot {uunet!ucsd}!megatek!randy
DoD #0013 | 12 | trimmed_train |
7,646 | 1993 World Championships in Germany:
====================================
Group A results:
SWEDEN - CANADA 1-4 (0-0,1-1,0-3)
1st:
2nd: CAN 0-1 Geoff Sanderson (Kevin Dineen) 7:24
SWE 1-1 Patrik Juhlin (Jan Larsson) 15:23 (pp)
3rd: CAN 1-2 Geoff Sanderson 5:54 (ps)
CAN 1-3 Mike Gartner (Greg Johnson,Adam Graves) 10:44
CAN 1-4 Rod Brind'Amour (Shayne Corson) 19:59
Shots on goal: Penalties: Attendance: Referee:
Sweden 10 15 12 - 37 4*2min 6,500 Rob Hearn (USA)
Canada 10 13 6 - 29 6*2min
Bill Ranford stopped 36 shots to lead Canada to a 4-1 victory in a very well
played game.
The first period started with a give away from a Canadian defenseman and
Rundqvist came in alone on Ranford but couldn't put the puck over a sliding
Ranford. Later on, Kevin Dineen had a great opportunity but Soderstrom
played very well too. Stefan Nilsson had a couple of great dekes and set up
Jan Larsson but again Ranford came up big. Period ended scoreless but the edge
to Sweden in creating more opportunities.
Second period action saw Tommy Soderstrom making a GREAT save. Mark Recchi
made a backhanded cross ice pass to Lindros, Eric one timed the puck but
Soderstrom was there to make a glove hand save. At the 7-minute mark, Canada
started applying pressure on the Swedes. Sanderson-Dineen-Brind'Amour worked
hard and kept the puck in the Swedes' zone. Dineen gave the puck to Sanderson
who skated around a screened Swedish defenseman, came in on Soderstrom and
made a wrist shot that went it by Soderstrom's far post, 1-0 Canada.
The Swedes picked up their game after that, and Peter Forsberg had a shot
that hit Ranford's post (the inside), went parallel to the goal line and out.
Then Gartner got a penalty and the Swedes a power play. Jan Larsson took
a shot from the slot, Ranford gave a rebound to Larsson who saw Juhlin by
the far post, passed the puck and Ranford was beat, 1-1.
Third period started as the other periods, Swedes having most of the pressure
but the Canadians always dangerous once they were close to the Swede goal.
At 5:54, Canada created some great chances and Arto Blomsten was forced to
cover the puck in the Swede goal crease since Soderstrom lost sight of it.
That resulted in a penalty shot, since a defenseman can't cover the puck in
the goal crease. Geoff Sanderson took the penalty shot (his first ever, he
explained afterwards), and he put it low on Soderstrom's stick side, close
to the post. Excellent penalty shot to give Canada a go ahead goal.
Canada increased the lead on a very suspect offside, Gartner volleyed a
bouncing puck past Soderstrom to make it 3-1. The Swedes ran out of gas
then and couldn't produce as good scoring chances as they had for 2,5 periods.
The 4-1 goal came with only 1 second left, Rod Brind'Amour scoring on a
rebound from Soderstrom, where the Swedish defense already had their minds
in the dressing room.
A very good game (the best in the WC so far?), with both goalies playing
great. Soderstrom best player in Sweden, but Ranford even played better
than Soderstrom, that tells you something about Ranford. Probably the best
goalie in the world, were some comments after the game.
Canada played a very disciplined defense, Ranford pointed out that it is
easy to play well with a good defense. Lindros played A LOT and played well,
Sanderson naturally game hero with two goals.
The Forsberg-Naslund-Bergqvist line Sweden's best along with Larsson-Juhlin-
Nilsson. Swedish defense played well, 197 cm 104 kg Peter Popovic had the
task of neutralizing 192 cm 107 kg Eric Lindros, and managed this very well.
Ranger defenseman Peter Andersson finally got to go to the WC, and considering
that he landed in Germany just a few hours before the game, he played very
well. Swedish coach Curt Lundmark was irritated after the game, partly because
of the Swedes inability to score, and partly because of the linesman's mistake
on the 1-3 goal.
Lines information follows further below.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ITALY - SWITZERLAND 1-0 (0-0,1-0,0-0)
1st:
2nd: ITA 1-0 Orlando 15:47
3rd:
Penalties: ITA 10*2min, SWI 8*2min
Referee: Anton Danko, Slovakia
Attendance: 3,500
-------------------------------------------------------------------------------
Group B results:
CZECH REPUBLIC - GERMANY 5-0 (0-0,3-0,2-0)
1st:
2nd: CZE 1-0 Kamil Kastak 1:51
CZE 2-0 Jiri Dolezal 12:26
CZE 3-0 Petr Hrbek 19:10
3rd: CZE 4-0 Radek Toupal 8:28
CZE 5-0 Josef Beranek 17:07
Penalties: CZE 7*2min, GER 6*2min 1*5min 1*10min game penalty
Referee: Darren Loraas, Canada
Attendance: 10,200
The Czechs were clearly better than the Germans, and the German crowd
showed their discontent by throwing in stuff on the ice after a while.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
FINLAND - USA 1-1 (0-0,1-0,0-1)
1st:
2nd: FIN 1-0 Jarkko Varvio 4:00
3rd: USA 1-1 Ed Olczyk 4:26
Penalties: FIN 7*2min, USA 6*2min
Referee: Valeri Bokarev, Russia
Attendance: 2,800
I hope some Finns can provide information from this game (I didn't see the
whole game). The Finns took the lead on a Jarkko Varvio slap shot from the
blue line, and a soft goal for an unscreened Mike Richter.
As far as the play in the second period goes, the Finns seemed to have the
most control, so a 1-0 lead was warranted as I saw it.
-------------------------------------------------------------------------------
SWEDEN CANADA
Goaltender: 30 Tommy Soderstrom 30 Bill Ranford
Defense: 8 Kenneth Kennholt 5 Norm Maciver
14 Fredrik Stillman 24 Dave Manson
3 Peter Popovic 25 Geoff Smith
55 Peter Andersson 19 Brian Benning
7 Arto Blomsten 6 Terry Carkner
28 Roger Akerstrom 3 Garry Galley
4 Derek Mayer
Forwards: 29 Mikael Renberg 15 Dave Gagner
9 Thomas Rundqvist 27 Adam Graves
34 Mikael Andersson 22 Mike Gartner
19 Markus Naslund 20 Paul Kariya
21 Peter Forsberg 88 Eric Lindros
18 Jonas Bergqvist 8 Mark Recchi
5 Patrik Juhlin 17 Rod Brind'Amour
20 Jan Larsson 9 Shayne Corson
4 Stefan Nilsson 11 Kevin Dineen
22 Charles Berglund 10 Geoff Sanderson
26 Michael Nylander 12 Greg Johnson
(34 Andersson/18 Bergqvist) 14 Brian Savage
16 Kelly Buchberger
| 17 | trimmed_train |
3,307 | [posted for a friend]
Okay, I looked through the FAQs and didn't see this, but I know its
come up before...
XAllocColor is supposed to do the following in order:
Try to find an exact match read-only color cell. (within hardware limits)
Try to allocate a read-only colorcell and set it to match.
and when all else fails,
Return the colorcell with the best match from the read-only colors
already allocated in the colormap.
This sounds good in theory. It doesn't seem to work this way
though. If there is no exact match already in the colormap, and
no unallocated cells, then XAllocColor fails, even when it has
already allocated several other cells already, and there are dozens
of read-only cells already in the colormap.
Is this a bug? A feature? A misunderstanding on my part?
Any help appreciated, | 16 | trimmed_train |
1,527 | Hi there,
Is there any utility available that will make Windows
randomly select one of your windows directory's .BMP
files as the wallpaper file?
Nate
--------------------------
Nathan C. Crowell, Dept. of Materials Science/ACRL
Worcester Polytechnic Institute E-mail: [email protected]
"A flower?"-Genesis "Supper's Ready" | 18 | trimmed_train |
4,753 |
For a VGA card these are the correct files but you can't just copy them
back and expect it to work. You have to create a new WIN.COM file. Try
the command (you will have to worry about what directories each file is in
since I don't know your setup):
COPY /B WIN.CNF+VGALOGO.LGO+VGALOGO.RLE WIN.COM
(I grabbed this from _Supercharging Windows_ by Judd Robbins--great book)
This is also how you can put your own logo into the Windows startup screen.
An RLE file is just a specially compressed BMP file.
Hope this helps | 18 | trimmed_train |
10,195 | --
I would like to be able to detect the angular position (low accuracy) of an
IR emitting source at a distance of about 100 meters (more is better) in
daylight. The IR source could be emitting a signature; I'm leaning toward
30 KHz square wave with 50% duty cycle.
I am considering the use of a quadrant detector from Centronic Inc. to give
information to a pan/tilt head to point the sensor and thus determine the
angles. For the source I am considering wazing the heck out of an IR LED(s),
possibly an Optek OP290 or Motorola MLED81. Wazing would mean at least 1 Amp
current pulses. At this current the duty cycle of the LED drops to 10% and I
would need to cycle five of them in turn to get the 50% required.
Has anyone done something like this? | 11 | trimmed_train |
5,747 |
These players all are pretty good players. They are the depth that the
dynasties had to win Stanley Cups. They tend to be the very good second
line guys- who would be first liners on most weaker clubs in the NHL.
They were all important to their clubs. Probably, several of these
Stanley Cup winning teams would not have won the cups they did if it
were not for the depth provided by these players.
They compare to Rick Tocchet and Ron Francis of the Penguins. Very good
players who can lead lesser teams (Francis-Hartford, Tocchet-Philly) who
provide the depth to the team that is currently best in the NHL.
As a defensive forward, there have been none better than Bob Gainey. That
doesn't mean he was the best player (or even the best forward) the Canadians
had at that time, but he was excellent at what he did. Gainey could
dominate games with his defence. He didn't need to get goals to dominate.
He shut down the opposition and was thus valuable. There has never been
anyone any better at doing this. Not ever. | 17 | trimmed_train |
3,132 | How about Kirlian imaging ? I believe the FAQ for sci.skeptics (sp?)
has a nice write-up on this. They would certainly be most supportive
on helping you to build such a device and connect to a 120Kvolt
supply so that you can take a serious look at your "aura"... :-) | 19 | trimmed_train |
8,396 | Hi Gang,
I'd like to subscribe to the White Sox mailing list, if one exists.
Can someone please e-mail me the address?
Thanks alot,
-John | 2 | trimmed_train |
11,165 |
Another dodge. Oh well. I'm no match for your amazing repertoire
of red herrings and smoke screens.
You asked for an apology. I'm not going to apologize for pointing out
that your straw-man argument was a straw-man argument. Nor for saying
that your list of "bible contradictions" shows such low standards of
scholarship that it should be an embarrassment to anti-inerrantists,
just as Josh McDowell should be an embarrassment to the fundies. Nor
for objecting various times to your taking quotes out of context. Nor
for pointing out that "they do it too" is not an excuse. Nor for calling
your red herrings and smoke screens what they are.
I'm still not sure why you think I'm a hypocrite. It's true that I
haven't responded to any of Robert Weiss' articles, which may be due in
part to the fact that I almost never read his articles. But I have
responded to both you and Frank DeCenso (a fundie/inerrantist.) Both
you and Frank have taken quotes out of context, and I've objected to
both of you doing so. I've criticized bad arguments both when they
were yours and I agreed with the conclusion (that the Bible is not
inerrant), and when they were Frank's and I disagreed with the
conclusion. I've criticized both you and Frank for evading questions,
and for trying to "explain me away" without addressing the objections
I raise (you by accusing me of being hypocritical and irrational, Frank
by accusing me of being motivated by a desire to attack the Bible.) I
don't see that any of this is hypocritical, nor do I apologize for it.
I do apologize, however, for having offended you in any other way.
Happy now? | 15 | trimmed_train |
957 |
Close Roger, but no banana, er avocado or is it artichoke ?!?
Geracie in the Murky News said Kingston will be the new 49ers
quarterback. I'm still trying to determine if he is kidding
or not :). If I happen to pound down enuff pints sometime
this week I'll go back and check what stooper idiot Purdy
said in his column. That ought to be worth a few Leafs, I
mean Laughs. If I'm really depressed I'll read the SF Comicle.
mark
just say | 17 | trimmed_train |
8,325 | 19 | trimmed_train |
|
7,887 | The two historic facts that I think the most important are these:
(1) If Jesus didn't rise from the dead, then he must have done something
else equally impressive, in order to create the observed amount of impact.
(2) Nobody ever displayed the dead body of Jesus, even though both the
Jewish and the Roman authorities would have gained a lot by doing so
(it would have discredited the Christians).
| 0 | trimmed_train |
4,134 | Sounds similar to something Wally Schirra said. | 10 | trimmed_train |
5,511 | Dr. willian Horatio Bates born 1860 and graduated from med school
1885. Medical career hampered by spells of total amnesia. Published in
1920, his great work "The Cure of Imperfect Eyesight by Treatment With-
out Glasses", He made claims about how the eye actually works that are
simply NOT TRUE. Aldous Huxley was one of the more "high profile"
beleivers in his system. Mr. Huxley while giving a lecture on Bates system
forgot the lecture that he was supposedely reading and had to put the
paper right up to his eyes and then resorted to a magnifying glass from
his pocket. book have been written debunking this technique, however
they remain less read than the original fraud. cheers | 19 | trimmed_train |
2,350 | Archive-name: net-privacy/part1
Last-modified: 1993/3/3
Version: 2.1
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) 1993 L. Detweiler. Not for commercial use except by permission
from author, otherwise may be freely copied. Not to be altered.
Please credit if quoted.
SUMMARY
=======
Information on email and account privacy, anonymous mailing and
posting, encryption, and other privacy and rights issues associated
with use of the Internet and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 1
====== (this file)
Identity
--------
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> Why is identification (un)stable on the internet?
<1.6> What is the future of identification on the internet?
Privacy
-------
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> How do I provide more/less information to others on my identity?
<2.10> Who is my sysadmin? What does s/he know about me?
<2.11> Why is privacy (un)stable on the internet?
<2.12> What is the future of privacy on the internet?
Anonymity
---------
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
PART 2
====== (next file)
Resources
---------
<4.1> What UNIX programs are related to privacy?
<4.2> How can I learn about or use cryptography?
<4.3> What is the cypherpunks mailing list?
<4.4> What are some privacy-related newsgroups? FAQs?
<4.5> What is internet Privacy Enhanced Mail (PEM)?
<4.6> What are other Request For Comments (RFCs) related to privacy?
<4.7> How can I run an anonymous remailer?
<4.8> What are references on privacy in email?
<4.9> What are some email, Usenet, and internet use policies?
<4.10> What is the MIT ``CROSSLINK'' anonymous message TV program?
Miscellaneous
-------------
<5.1> What is ``digital cash''?
<5.2> What is a ``hacker'' or ``cracker''?
<5.3> What is a ``cypherpunk''?
<5.4> What is `steganography' and anonymous pools?
<5.5> What is `security through obscurity'?
<5.6> What are `identity daemons'?
<5.7> What standards are needed to guard electronic privacy?
Issues
------
<6.1> What is the Electronic Frontier Foundation (EFF)?
<6.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<6.3> What was `Operation Sun Devil' and the Steve Jackson Game case?
<6.4> What is Integrated Services Digital Network (ISDN)?
<6.5> What is the National Research and Education Network (NREN)?
<6.6> What is the FBI's proposed Digital Telephony Act?
<6.7> What other U.S. legislation is related to privacy on networks?
<6.8> What are references on rights in cyberspace?
<6.9> What is the Computers and Academic Freedom (CAF) archive?
Footnotes
---------
<7.1> What is the background behind the Internet?
<7.2> How is Internet `anarchy' like the English language?
<7.3> Most Wanted list
<7.4> Change history
PART 3
====== (last file)
Anonymizing
-----------
<8.1> What are some known anonymous remailing and posting sites?
<8.2> What are the responsibilities associated with anonymity?
<8.3> How do I `kill' anonymous postings?
<8.4> What is the history behind anonymous posting servers?
<8.5> What is the value of anonymity?
<8.6> Should anonymous posting to all groups be allowed?
<8.7> What should system operators do with anonymous postings?
<8.8> What is going on with anon.penet.fi maintained by J. Helsingius?
* * *
IDENTITY
========
_____
<1.1> What is `identity' on the internet?
Generally, today people's `identity' on the internet is primarily
determined by their email address in the sense that this is their
most unchanging 'face' in the electronic realm. This is your
login name qualified by the complete address domain information,
for example ``[email protected]''. People see
this address when receiving mail or reading USENET posts from you
and in other situations where programs record usage. Some obsolete
forms of addresses (such as BITNET) still persist.
In email messages, additional information on the path that a message
takes is prepended to the message received by the recipient. This
information identifies the chain of hosts involved in the
transmission and is a very accurate trace of its origination. This
type of identify-and-forward protocol is also used in the USENET
protocol to a lesser extent. Forging these fields requires
corrupted mailing software at sites involved in the forwarding and
is very uncommon. Not so uncommon is forging the chain at the
origination point, so that all initial sites in the list are faked
at the time the message is created. Tracing these messages can be
difficult or impossible when the initial faked fields are names of
real machines and represent real transfer routes.
_____
<1.2> Why is identity (un)important on the internet?
The concept of identity is closely intertwined with communication,
privacy, and security, which in turn are all critical aspects of
computer networks. For example, the convenience of communication
afforded by email would be impossible without conventions for
identification. But there are many potential abuses of identity
possible that can have very severe consequences, with massive
computer networks at the forefront of the issue, which can
potentially either exacerbate or solve these problems.
Verifying that an identity is correct is called `authentication',
and one classic example of the problems associated with it is
H.G.Well's ``War of the Worlds'' radio broadcast that fooled
segments of the population into thinking that an alien invasion was
in progress. Hoaxes of this order are not uncommon on Usenet and
forged identities makes them more insidious. People and their
reputations can be assaulted by forgery.
However, the fluidity of identity on the internet is for some one of
its most attractive features. Identity is just as useful as it is
harmful. A professor might carefully explain a topic until he
finds he is talking to an undergraduate. A person of a particular
occupation may be able to converse with others who might normally
shun him. Some prejudices are erased, but, on the other hand, many
prejudices are useful! A scientist might argue he can better
evaluate the findings of a paper as a reviewer if he knows more
about the authors. Likewise, he may be more likely to reject it
based on unfair or irrelevant criteria. On the other side of the
connection, the author may find identities of reviewers useful in
exerting pressure for acceptance.
Identity is especially crucial in establishing and regulating
`credit' (not necessarily financial) and `ownership' and `usage'.
Many functions in society demand reliable and accurate techniques
for identification. Heavy reliance will be placed on digital
authentication as global economies become increasingly electronic.
Many government functions and services are based on identification,
and law enforcement frequently hinges on it. Hence, employees of
many government organizations push toward stronger identification
structures. But when does identification invade privacy?
The growth of the internet is provoking social forces of massive
proportions. Decisions made now on issues of identity will affect
many future users, especially as the network becomes increasingly
global, universal, widespread, and entrenched; and the positive or
adverse affects of these actions, intended and inadvertent, will
literally be magnified exponentially.
_____
<1.3> How does my email address (not) identify me and my background?
Your email address may contain information that influences people's
perceptions of your background. The address may `identify' you as
from a department at a particular university, an employee at a
company, or a government worker. It may contain your last name,
initials, or cryptic identification codes independent of both. In
the US some are based on parts of social security numbers. Others
are in the form 'u2338' where the number is incremented in the
order that new users are added to the system.
Standard internet addresses also can contain information on your
broad geographical location or nationhood. However, none of this
information is guaranteed to be correct or be there at all. The
fields in the domain qualification of the username are based on
rather arbitrary organization, such as (mostly invisible) network
cabling distributions. The only point to make is that early fields
in the address are more specific (such as specific computer names
or local networks) and the later ones the most general (such as
continental domains). Typically the first field is the name of the
computer receiving mail.
Gleaning information from the email address alone is sometimes an
inspired art or an inconsistent and futile exercise. (For more
information, see the FAQs on email addresses and known
geographical distributions below.) However, UNIX utilities exist
to aid in the quest (see the question on this).
Common Suffixes
---------------
.us United States
.uk United Kingdom
.ca Canada
.fi Finland
.au Australia
.edu university or college
.com commercial organization
.org 'other' (e.g. nonprofit organization)
.gov government
.mil military site
_____
<1.4> How can I find out more about somebody with a given email address?
One simple way is to send email to that address, asking. Another
way is to send mail to the postmaster at that address (i.e.
postmaster@address), although the postmaster's job is more to help
find user ID's of particular people given their real name and solve
mail routing problems. The sysadmin (i.e. `root@address') may also
be able to supply information. Users with related email address
may have information. However, all of these methods rely on the
time and patience of others so use them minimally.
One of the most basic tools for determining identity over the
internet is the UNIX utility 'finger'. The basic syntax is:
finger [email protected]
This utility uses communication protocols to query the computer
named in the address for information on the user named. The
response is generated completely by the receiving computer and may
be in any format. Possible responses are as follows:
- A message `unknown host' meaning some aspect of the address is
incorrect, two lines with no information and '???'.
- A message 'In real life: ???' in which case the receiving computer
could not find any kind of a match on the username. The finger
utility may return this response in other situations.
- A listing of information associated with multiple users. Some
computers will search only for matching user IDs, others will
attempt to find the username you specified as a substring of all
actual full names of users kept in a local database.
At some sites 'finger' can be used to get a list of all users on the
system with a `finger @address'. In general this is often
considered weak security, however, because `attackers' know valid
user ID's to `crack' passwords.
More information on the fields returned by `finger' is given below.
More information on `finger' and locating people's email addresses
is given in the email FAQ (such as the WHOIS lookup utility). Just
as you can use these means to find out about others, they can use
them to find out about you. You can `finger' yourself to find out
what is publicly reported by your UNIX system about you. Be
careful when modifying `finger' data; virtually anyone with
internet access worldwide can query this information. In one
amazing case, the New York Times writer J. Markoff uncovered the
identity of R. Morris, author of the Internet Worm, through
the use of an anonymous tip and 'finger'. See the book Cyberspace
by K. Hafner and J. Markoff.
_____
<1.5> Why is identification (un)stable on the internet?
Generally, identity is an amorphous and almost nonexistent concept
on the Internet for a variety of reasons. One is the inherent
fluidity of `cyberspace' where people emerge and submerge
frequently, and absences are not readily noted in the `community'.
Most people remember faces and voices, the primary means of casual
identification in the 'real world'. The arbitary and cryptic
sequences of letters and digits comprising most email addresses are
not particularly noticeable or memorable and far from a unique
identification of an individual, who may use multiple accounts on
multiple machines anywhere in the world.
Currently internet users do not really have any great assurances
that the messages in email and USENET are from who they appear to
be. A person's mailing address is far from an identification of an
individual.
- Anyone with access to the account, e.g. they know the password,
either legitimately or otherwise, can send mail with that address
in the From: line.
- Email addresses for an individual tend to change frequently as
they switch jobs or make moves inside their organizations.
- As part of current mailing protocol standards, forging the From:
line in mail messages is a fairly trivial operation for many
hackers.
The status and path information prepended to messages by
intermediate hosts is generally unforgeable. In general, while
possible, forgeries are fairly rare on most newsgroups and in
email. Besides these pathological cases abve there are many basic
problems with today's internet protocols affecting identification
on the internet:
- Internet mail standards, described in RFC-822, are still evolving
rapidly and not entirely orderly. For example, standards for
mail address `munging' or `parsing' tend to vary slightly between
sites and frequently mean the difference between finding
addresses and bouncing mail.
- Domain names and computer names are frequently changed at sites,
and there are delays in the propagation of this data.
- Addresses cannot be resolved when certain critical computers
crash, such as the receiving computer or other computers involved
in resolving names into addresses called `nameservers'.
- A whole slew of problems is associated with `nameservers'; if
they are not updated they will not find name addresses, and even
the operation of what constitutes `updating' has different
interpretations at different sites.
The current internet mailing and addressing protocols are slightly
anachronistic in that they were created when the network was
somewhat obscure and not widespread, with only a fraction of the
traffic it now sees. Today a large proportion of internet traffic
is email, comprising millions of messages.
_____
<1.6> What is the future of identification on the internet?
Some new technologies and standards are introducing facial images
and voice messages into mail and these will improve the sense of
community that comes from the familiarity of identification.
However, they are not currently widespread, require large amounts
of data transfer, standardized software, and make some compromises
in privacy.
Promising new cryptographic techniques may make 'digital signatures'
and 'digital authentication' common (see below). Also, the trend
in USENET standards is toward greater authentication of posted
information. On the other hand, advances in ensuring anonymity
(such as remailers) are forthcoming. See below.
PRIVACY
=======
_____
<2.1> What is `privacy' on the internet?
Generally, while `privacy' has multiple connotations in society and
perhaps even more on the internet, in cyberspace most take it to
mean that you have exclusive use and access to your account and the
data stored on and and directed to it (such as email), and you do
not encounter arbitrary restrictions or searches. In other words,
others may obtain data associated with your account, but not
without your permission. These ideas are probably both fairly
limiting and liberal in their scope in what most internet users
consider their private domains. Some users don't expect or want
any privacy, some expect and demand it.
_____
<2.2> Why is privacy (un)important on the internet?
This is a somewhat debatable and inflammatory topic, arousing
passionate opinions. On the internet, some take privacy for
granted and are rudely surprised to find it tenuous or nonexistent.
Most governments have rules that protect privacy (such as the
illegal search and seizure clause of the U.S. constitution, adopted
by others) but have many that are antithetical to it (such as laws
prohibiting secret communications or allowing wiretapping). These
rules generally carry over to the internet with few specific rules
governing it. However, the legal repercussions of the global
internet are still largely unknown and untested (i.e. no strong
legal precedents and court cases). The fact that internet traffic
frequently passes past international boundaries, and is not
centrally managed, significantly complicates and strongly
discourages its regulation.
_____
<2.3> How (in)secure are internet networks?
- `Theoretically' people at any site in the chain of sites with
access to hardware and network media that transmits data over the
Internet could potentially monitor or archive it. However, the
sheer volume and general 'noise' inherent to this data makes
these scenarios highly improbable, even by government agencies
with supposedly vast funding and resources.
- Technologies exist to `tap' magnetic fields given off by
electrical wires without detection. Less obscurely, any machine
with a network connection is a potential station for traffic
detection, but this scenario requires knowledge and access to
very low-level hardware (the network card) to pursue, if even
possible.
- A company Network General Inc. is one of many that manufactures
and markets sophisticated network monitoring tools that can
'filter' and read packets by arbitrary criteria for
troubleshooting purposes, but the cost of this type of device is
prohibitive for casual use.
Known instances of the above types of security breaches at a major
scale (such as at network hubs) are very rare. The greatest risks
tend to emerge locally. Note that all these approaches are almost
completely defused with the use of cryptography.
_____
<2.4> How (in)secure is my account?
By default, not very. There are a multitude of factors that may
reinforce or compromise aspects of your privacy on the internet.
First, your account must be secure from other users. The universal
system is to use a password, but if it is `weak' (i.e. easy to
guess) this security is significantly diminished. Somewhat
surprisingly and frighteningly to some, certain users of the
system, particularly the administrator, generally have unlimited
access regardless of passwords, and may grant that access to
others. This means that they may read any file in your account
without detection.
Furthermore, not universally known, most UNIX systems keep fairly
extensive accounting records of when and where you logged in, what
commands you execute, and when they are executed (in fact, login
information is usually public). Most features of this `auditing' or
`process accounting' information are enabled by default after the
initial installation and the system administrator may customize it
to strengthen or weaken it to satisfy performance or privacy aims.
This information is frequently consulted for troubleshooting
purposes and may otherwise be ignored. This data tracks
unsuccessful login attempts and other 'suspicious' activities on
the system. A traditional part of the UNIX system that tracks user
commands is easily circumvented by the user with the use of
symbolic links (described in 'man ln').
UNIX implementations vary widely particularly in tracking features
and new sophisticated mechanisms are introduced by companies
regularly. Typically system adminstrators augment the basic UNIX
functionality with public-domain programs and locally-developed
tools for monitoring, and use them only to isolate `suspicious'
activity as it arises (e.g. remote accesses to the 'passwd' file, incorrect
login attempts, remote connection attempts, etc.).
Generally, you should expect little privacy on your account for
various reasons:
- Potentially, every keystroke you type could be intercepted by
someone else.
- System administrators make extensive backups that are completely
invisible to users which may record the states of an account over
many weeks.
- Erased files can, under many operating systems, be undeleted.
- Most automated services keep logs of use for troubleshooting or
otherwise; for example FTP sites usually log the commands and
record the domain originations of users, including anonymous
ones.
- Some software exacerbates these problems. See the section on
``X Windows (in)security''.
Indepedent of malevolent administrators are fellow users, a much
more commonly harmful threat. There are multiple ways to help
ensure that your account will not be accessed by others, and
compromises can often be traced to failures in these guidelines:
- Choose a secure password. Change it periodically.
- Make sure to logout always.
- Do not leave a machine unattended for long.
- Make sure no one watches you when you type your password.
- Avoid password references in email.
- Be conservative in the use of the .rhost file.
- Use utilities like `xlock' to protect a station, but be
considerate.
Be wary of situations where you think you should supply your
password. There are only several basic situations where UNIX
prompts you for a password: when you are logging in to a system or
changing your password. Situations can arise in which prompts for
passwords are forged by other users, especially in cases where you
are talking to them (such as Internet Relay Chat). Also, be aware
that forged login screens are one method to illegitimately obtain
passwords.
(Thanks to Jim Mattson <[email protected]> for contributions
here.)
_____
<2.5> How (in)secure are my files and directories?
The most important privacy considerations are related to file
rights, and many lapses can be traced to their misunderstood nature
or haphazard maintenance. Be aware of the rights associated with
your files and directories in UNIX. If the `x' (`execute') right on
your parent directory is off for users, groups, and other, these
users cannot gain information on anything in your directories.
Anything less may allow others to read, change, or even delete
files in your home directory. The rights on a directory supersede
the rights associated with files in that directory. For a
directory, 'x' means that access to the files (or subdirectories)
in the directory is possible -- if you know their names. To list
the contents of the directory, however, requires the 'r' right.
By default most accounts are accessable only to the owner, but the
initial configuration varies between sites based on administrator
preference. The default file mode specifies the initial rights
associated with newly created files, and can be set in the shell
with `umask'. The details of rights implementations tend to vary
between versions of UNIX. Consult man pages on `chmod' and `ls'.
Examples
--------
traver.lance % ls -ld ~
drwx------ 15 ld231782 1536 Jan 31 21:22 /users/ld231782/
Here is a listing of the rights associated with a user's home
directory, denoted by `~'. The columns at the left identify what
rights are available. The first column identifies the entry as a
directory, and the next three columns mean that read, write, and
execute rights, respectively, are permitted for that user. For
directories, the `x' right means that contents (file and
subdirectory names) within that directory can be listed. The
subsequent columns indicate that no other users have any rights to
anything in the directory tree originating at that point. They
can't even `see' any lower files or subdirectories; the hierarchy
is completely invisible to them.
traver.lance % ls -l msg
-rw-r--r-- 1 ld231782 35661 Jan 29 23:13 msg
traver.lance % chmod u=rw,g=,o= msg
traver.lance % ls -l msg
-rw------- 1 ld231782 35661 Jan 29 23:13 msg
Here the modes on the file `msg' were changed to take away rights
from `group' and `other'.
Note that `ls -l <file>' requires both the 'r' right to get the list
of files and subdirectories, and the 'x' right to access the files
and subdirectories in order to get their size, etc. For example,
suppose the directory `foo' has rights dr--r--r--, the following
is possible:
ls foo
These commands would fail independent of file rights:
ls -l foo
ls -l foo/file
cat foo/file
cd foo
If the directory `foo' has rights d--x--x--x, the following are
possible if it is known beforehand that `foo' contains an 'r'
readable file named `file':
ls -l foo/file
cat foo/file
cd foo
The following commands fail:
ls foo
ls -l foo
(Thanks to Uwe Waldmann <[email protected]> for contributions here.)
_____
<2.6> How (in)secure is X Windows?
X Windows is the primary software developed by the MIT Athena
project which is funded by U.S. government grants to develop
applications to harness the power of networks in enhancing
computational tasks, particularly the human-computer interface.
The software implements a client-server interface to a computer via
graphical windows. In this case the `client' is the application
requesting or utilizing graphical resources (such as windows or a
mouse) and the `server' is the machine that provides them. In many
situations the client is an application program running on the same
machine as the server.
The great utility of X Windows comes from its complete dissociation
of the client and server so that windows may be `broadcast' to a
server at a remote location from the client. Unfortunately this
dynamic power also introduces many deep, intricate, and complicated
security considerations. The primary security and privacy issue
associated with X Windows is that much more sensitive data may be
sent over a network, and over wider regions, than in the case where
the human is situated near the host computer. Currently there is
no encryption of data such as screen updates and keystrokes in X
Windows.
Due to either intentional design decisions or unintentional design
flaws, early versions of the X Window system are extremely
insecure. Anyone with an account on the server machine can disrupt
that display or read it electronically based on access to the
device unix:0.0 by any regular user. There are no protections
from this type of access in these versions. The problem arises
because the security is completely based on machine addresses
rather than users, such that any user at a `trusted' machine is
himself trusted. Quoting from X documentation (man Xsecurity):
> Any client on a host in the host access control list is allowed
> access to the X server. This system can work reasonably well in
> an environment where everyone trusts everyone, or when only a
> single person can log into a given machine...This system does not
> work well when multiple people can log in to a single machine and
> mutual trust does not exist.
With the access control list, the `xhost' command may prevent some
naive attempts (i.e. those other than the direct-access unix:0.0
evasion); the syntax as typed on the host machine is ``xhost
+[name]'' where [name] is the domain name or internet address of an
authorized client machine. By default clients running nonlocal to
the host are disabled. Public domain programs to disrupt a display
momentarily (such as 'flip' or slowly mirror the screen image, or
cause pixels to 'melt' down to the bottom) have been circulating on
the internet among hackers for several years and played as pranks
on unsuspecting or inexperienced users. Much more serious security
breaches are conceivable from similar mechanisms exploiting this
inherent weaknesses. (The minimal, easily-bypassed `trusted'
security mode of `xhost' has been jokingly referred to as ``X
Hanging Open, Security Terrible.'').
New versions of the X Window system (X11R5 and higher) by default
make server access as secure as the file system using a .Xauthority
file and 'magic cookies'. Remote machines must have a code in the
.Xauthority file in the home directory that matches the code
allowed by the server. Many older programs and even new
vendor-supplied code does not support or is incompatible with
`magic cookies'. The basic magic cookie mechanism is vulnerable to
monitoring techniques described earlier because no encryption of
keys occurs in transmission. X11R5 also includes other
sophisticated encryption mechanisms. Try `man Xsecurity' to find
out what is supported at your site. Even though improved security
mechanisms have been available in X Windows since ~1990, local
sites often update this software infrequently because installation
is extremely complex.
(Thanks to Marc Vanheyningen <[email protected]>,
Jim Mattson <[email protected]>, and Bill Marshall
<[email protected]> for contributions here.)
_____
<2.7> How (in)secure is my email?
By default, not very. The characters that you are reading are
almost certainly encoded in ASCII, the American Standard Code for
Information Interchange that maps alphabetic and symbolic
characters onto numeric codes and vice versa. Virtually every
computer system uses this code, and if not, has ways of converting
to and from it. When you write a mail message, by default it is
being sent in ASCII, and since the standard is virtually
universal, there is no intrinsic privacy. Despite milleniums worth
of accumulated cryptographic knowledge, cryptographic technologies
are only recently being established that afford high priority to
privacy as a primary criteria in computer and network design. Some
potential pitfalls in privacy are as follows:
- The most serious threats are instances of immature or unscrupulous
system operators reading private mail in the `spool files' at a
local site (i.e. at the source or destination of the message),
such as a university.
- System administrators may also release files to law enforcement
agencies, but conventions and protocols for warrants involving
computer searches have still not been strongly established and
tested legally.
- Note that bounced messages go to postmasters at a given site in
their entirety. This means that if you address mail with an
incorrect address it has a good chance of being seen by a human
other than the recipient.
- Typically new user accounts are always set up such that the local
mail directory is private, but this is not guaranteed and can be
overridden.
- Finally, be aware that some mailing lists (email addresses of
everyone on a list) are actually publicly accessable via mail
routing software mechanisms. This `feature' can be disabled.
Most potential compromises in email privacy can be thoroughly
avoided with the use of strong end-to-end cryptography, which has
its own set of caveats (for example, unscrupulous administrators
may still be a threat if the encryption site is shared or
nonlocal). See the sections on ``email privacy'' and ``email
policies.''
_____
<2.8> How am I (not) liable for my email and postings?
As punishment or whatever, your system administrator can revoke
certain `privileges' such as emailing, USENET posting or reading
certain groups, file transferring, remote communications, or
generally any subset of capabilities available from your account.
This all is completely at the discretion of the local administrator
and under the procedures followed at a particular site, which in
many cases are haphazard and crisis-oriented. Currently there are
virtually no widespread, uniform guidelines or procedures for
restricting use to any internet services, and local administrators
are free to make arbitrary decisions on access.
Today punitive measures are regularly applied in various situations.
In the typical scenario complaint(s) reach a system adminstrator
regarding abuses by a user, usually but not necessarily preceded by
complaints to the user in email, regarding that person's
objectionable email or postings. `abusive' posters to USENET are
usually first given admonitions from their system administrators as
urged by others on the `net'. (The debate persists endlessly on
many newsgroups whether this is also used as a questionable means
of attacking or silencing `harmless crackpots' or censoring
unpopular opinions.)
System administrators at remote sites regularly cooperate to
'squelch' severe cases of abuse. In general, however, by tradition
Usenet readers are remarkably tolerant of diverse views and uses of
the system, but a colorful vocabularly of slang helps describe
their alternatives when this patience is sapped: the options
wielded by the individual user are to simply advance to the next
message (referred to as ``hitting the `n' key''), or to `plonk'
annoying posters (according to the Hacker's Dictionary, the sound a
jerk makes at the end of a fall to the bottom of a kill file).
In cases where punitive actions are applied, generally system
administrators are least likely to restrict email. USENET postings
are much more commonly restricted, either to individual users or
entire groups (such as a university campus). Restrictions are most
commonly associated with the following `abuses':
- harassing or threatening notes, `email terrorism'
- illegal uses, e.g. piracy or propagation of copyrighted material
- `ad hominem' attacks, i.e. insulting the reputation of the
poster instead of citing the content of the message
- intentional or extreme vulgarity and offensiveness
- inappropriate postings, esp. binary files in regular groups
`mail-bombing': inundating mail boxes with numerous or massive
files
Major problems originate from lack of distinctions in private and
official email or postings. Most users have internet access via
accounts at businesses or universities and their activities on the
internet can be construed as representative of their parent
organizations. Many people put disclaimers in their `signatures' in
an attempt dissociate their identity and activities from parent
organizations as a precaution. A recent visible political case
involves the privacy of electronic mail written by White House
staff members of the Bush administration. Following are some
guidelines:
- Acquaint yourself with your company or university policy.
- If possible, avoid use of your company email address for private
communication.
- Use a disclaimer.
- Keep a low profile (avoid `flamewars' or simply don't post).
- Avoid posting information that could be construed to be
proprietary or `internal'.
The following references are available from ftp.eff.com
(see also the section on ``internet use policies''):
/pub/academic/banned.1991
/pub/academic/banned.1992
---
Computer material that was banned/challenged in academia in 1991
and 1992 including USENET hierarchies.
/pub/academic/cases
---
This is an on-line collection of information about specific
computers and academic freedom cases. File README is a detailed
description of the items in the directory.
/pub/academic/faq/netnews.liability
---
Notes on university liability for Usenet.
_____
<2.9> How do I provide more/less information to others on my identity?
The public information of your identity and account is mostly
available though the UNIX utility `finger' described above.
- You have control over most of this information with the utility
`chfn', the specifics vary between sites (on some systems use
`passwd -f').
- You can provide unlimited information in the .plan file which is
copied directly to the destination during the fingering.
- A technique that works at some sites allows you to find out who is
'finger'ing you and even to vary the .plan file sent to them.
- Your signature is determined by the environment variable SIGNATURE
- USENET signatures are conventionally stored in the .signature file
in your home directory.
Providing less information on your online identity is more difficult
and involved. One approach is to ask your system adminstrator to
change or delete information about you (such as your full name).
You may be able to obtain access on a public account or one from
someone unrelated to you personally. You may be able to remotely
login (via modem or otherwise) to computers that you are not
physically near. These are tactics for hiding or masking your
online activities but nothing is foolproof. Consult man pages on
the 'chmod' command and the default file mode. Generally, files on
a shared system have good safeguards within the user pool but very
little protection is possible from corrupt system administrators.
To mask your identity in email or on USENET you can use different
accounts. More untraceable are new `anonymous posting' and
remailing services that are very recently being established. See
below.
______
<2.10> Who is my sysadmin? What does s/he know about me?
The requirements and screening for getting a system administration
job (and thereby access to all information on a system) vary widely
between sites and are sometimes frighteningly lax, especially at
universities. Many UNIX systems at universities are largely
managed by undergraduates with a background in computing and often
`hacking'. In general, commercial and industrial sites are more
strict on qualifications and background, and government sites are
extremely strict.
The system adminstrator (root user) can monitor what commands you
used and at what times. S/he may have a record (backups) of files
on your account over a few weeks. S/he can monitor when you send
email or post USENET messages, and potentially read either. S/he
may have access to records indicating what hosts you are using,
both locally and elsewhere. Administrators sometimes employ
specialized programs to track `strange' or `unusual' activity,
which can potentially be misused.
______
<2.11> Why is privacy (un)stable on the internet?
For the numerous reasons listed above, privacy should not be an
expectation with current use of the internet. Furthermore, large
parts of the internet are funded by the U.S. NSF (National Science
Foundation) which places certain restrictions on its use (such as
prohibiting commercial use). Some high-level officials in this and
other government agencies may be opposed to emerging techniques to
guarantee privacy (such as encryption and anonymous services).
Historically the major threats to privacy on the internet have been
local. Perhaps the most common example of this are the widespread
occurrences of university administrators refusing to carry some
portion of USENET newsgroups labelled as `pornographic'. The
`alternative' hierarchy in the USENET system, which has virtually
no restrictions on propagation and new group creation, is
frequently targeted (although this material may appear anywhere).
From the global point of view traffic is generally completely
unimpeded on the internet and only the most egregious offenders
are pursued. For example, verbatim transcriptions of copyrighted
material (such as newspaper or magazine articles) are posted to
USENET with regularity without major consequences (some email
complaints may ensue). More astonishing to some is that currently
significant portions of USENET traffic, and less so internet
traffic, is comprised of sexually-explicit digitized images almost
entirely originating from copyrighted material (newsgroups such as
`alt.sex' regularly have the highest traffic).
______
<2.12> What is the future of privacy on the internet?
Some argue that the internet currently has an adequate or
appropriate level of privacy. Others will argue that as a
prototype for future global networks it has woefully inadequate
safeguards. The internet is growing to become a completely global,
international superhighway for data, and this traffic will
inevitably entail data such as voice messages, postal mail, and
many other items of extremely personal nature. Computer items that
many people consider completely private (such as their local hard
drives) will literally be inches from global network connections.
Also, sensitive industrial and business information is exchanged
over networks currently and this volume may conceivably merge with
the internet.
Most would agree that, for these basic but sensitive uses of the
internet, no significant mechanisms are currently in place to
ensure much privacy. New standards are calling for uniform
introduction of `privacy enhanced mail' (PEM) which uses encryption
technologies to ensure privacy, so that privacy protection is
automatic, and may significantly improve safeguards.
The same technology that can be extremely destructive to privacy
(such as with surreptitious surveilance) can be overwhelmingly
effective in protecting it (e.g. with encryption). Some government
agencies are opposed to unlimited privacy in general, and believe
that it should lawfully be forfeited in cases of criminal conduct
(e.g. court-authorized wiretapping). However, powerful new
technologies to protect privacy on computers are becoming
increasingly popular, provoking some to say that ``the cat is out
of the bag'' and the ``genie can't be put back in the bottle''. In
less idiomatic terms, they believe that the spread of strong
cryptography is already underway will be socially and technically
unstoppable.
To date, no feasible system that guarantees both secure
communication and government oversight has been proposed (the two
goals are largely incompatible). Proposals for ``registration'' of
secret keys (by D. Denning on sci.crypt, for example) have been met
with hot controversy at best and ridicule and derision at worst,
mainly because of concerns for the right to privacy and objections
of inherent feasibility. Electronic privacy issues, and
particularly the proper roles of networks and the internet, will
foreseeably become highly visible and explosive over the next few
years.
ANONYMITY
=========
_____
<3.1> What is `anonymity' on the internet?
Simply stated, anonymity is the absence of identity, the
ultimate in privacy. However, there are several variations on
this simple theme. A person may wish to be consistently
identified by a certain pseudonym or `handle' and establish a
reputation under it in some area, providing pseudo-anonymity.
A person may wish to be completely untraceable for a single
one-way message (a sort of `hit-and-run'). Or, a person may
wish to be openly anonymous but carry on a conversation with
others (with either known or anonymous identities) via an
`anonymous return address'. A user may wish to appear as a
`regular user' but actually be untraceable. Sometimes a user
wishes to hide who he is sending mail to (in addition to the
message itself). The anonymous item itself may be directed at
individuals or groups. A user may wish to access some
service and hide all signs of the association.
All of these uses are feasible on the internet but are currently
tricky to carry out in practice, because of all the tracking
mechanisms inherent to operating systems and network protocols.
Officials of the NSF and other government agencies may be opposed
to any of these uses because of the potential for abuse.
Nevertheless, the inherent facelessness of large networks will
always guarantee a certain element of anonymity.
_____
<3.2> Why is `anonymity' (un)important on the internet?
Anonymity is another powerful tool that can be beneficial or
problematic depending on its use. Arguably absence of
identification is important as the presence of it. It may be the
case that many strong benefits from electronic anonymity will be
discovered that were unforeseen and unpredicted, because true
anonymity has been historically very difficult to establish.
One can use anonymity to make personal statements to a colleague
that would sabotage a relationship if stated openly (such as
employer/employee scenarios). One can use it to pass information
and evade any threat of direct retribution. For example,
`whistleblowers' reporting on government abuses (economic, social,
or political) can bring issues to light without fear of stigma or
retaliation. Sensitive, personal, potentially damaging information
is often posted to some USENET groups, a risky situation where
anonymity allows conversations to be carried on completely
independent of the identities of the participants. Some police
departments run phone services that allow anonymous reporting of
crimes; such uses would be straightforward on the network.
Unfortunately, extortion and harassment become more insidious with
assurances of anonymity.
_____
<3.3> How can anonymity be protected on the internet?
The chief means, as alluded to above, are masking identities in
email and posting. However, anonymous accounts (public accounts as
accessable and anonymous as e.g. public telephones) may be
effective as well, but this use is generally not officially
supported and even discouraged by some system adminstrators and NSF
guidelines. The nonuniformity in the requirements of obtaining
accounts at different sites and institutions makes anonymous
accounts generally difficult to obtain to the public at large.
Many communications protocols are inherently detrimental to
anonymity. Virtually every protocol in existence currently
contains information on both sender and receiver in every packet.
New communications protocols will likely develop that guarantee
much higher degrees of secure anonymous communication.
_____
<3.4> What is `anonymous mail'?
One approach to `anonymizing' mail has been to set up an `anonymous
server' that, when activated by email to its address, responds by
allocating and supplying an `anonymous ID' that is unique to the
person requesting it (based on his email address). This will vary
for the same person for different machine address email
originations. To send anonymous mail, the user sends email directed
to the server containing the final destination. The server
`anonymizes' the message by stripping of identification information
and forwards the message, which appears to originate from the
anonymous server only from the corresponding anonymous user id.
This is the `interactive' use of anonymity or pseudonymity
mentioned above.
Another more `fringe' approach is to run a `cypherpunk' remailer
from a regular user account (no root system privileges are
required). These are currently being pioneered by Eric Hughes and
Hal Finney <[email protected]>. The operator runs a process on
a machine that anonymizes mail sent to him with certain
characteristics that distinguish it from his regular incoming mail
(typically fields in the header). One has been implemented as a
PERL script running on UNIX. Several of these are in existence
currently but sites and software currently are highly unstable;
they may be in operation outside of system administrator knowledge.
The remailers don't generally support anonymous return addresses.
Mail that is incorrectly addressed is received by the operator.
Generally the user of the remailer has to disavow any
responsibility for the messages forwarded through his system,
although actually may be held liable regardless.
These approaches have several serious disadvantages and weaknesses:
- The anonymous server approach requires maintaining a mapping of
anonymous ID's to real addresses that must be maintained
indefinitely. One alternative is to allow `deallocation' of
aliases at the request of the user, but this has not been
implemented yet.
- Although an unlikely scenario, traffic to any of these sites could
conceivably be monitored from the `outside', necessitating the
use of cryptography for basic protection,.
- Local administrators can shut them down either out of caprice or
under pressure from local, network, or government agencies.
- Unscrupulous providers of the services can monitor the traffic
that goes through them.
- Most remailers currently keep logs that may be inspected.
- The cypherpunk approach tends to be highly unstable because these
operators are basically network users who do not own the
equipment and are accountable to their own system
administrators, who may be unaware of the use and unsympathetic
to the philosophy of anonymity when the operation is discovered,
regarding it as illicit use.
- In all cases, a high degree of trust is placed in the anonymous
server operator by the user.
Currently the most direct route to anonymity involves using SMTP
protocols to submit a message directly to a server with arbitrary
field information. This practice, not uncommon to hackers, and the
approach used by remailers, is generally viewed with hostility by
most system administrators. Information in the header routing data
and logs of network port connection information may be retained
that can be used to track the originating site. In practice, this
is generally infeasible and rarely carried out. Some
administrators on the network will contact local administrators to
request a message be tracked and its writer admonished or punished
more severely (such as revoking the account), all of this actually
happening occasionally but infrequently.
See the sections ``known anonymous mail and posting sites'' and
``responsibilities associated with anonymity''.
_____
<3.5> What is `anonymous posting'?
Anonymous servers have been established as well for anonymous Usenet
posting with all the associated caveats above (monitored traffic,
capricious or risky local circumstances, logging). Make sure to
test the system at least once by e.g. anonymous posting to
misc.test (however some operators don't recommend this because many
sites `autorespond' to test messages, possibly causing the
anonymous server to allocate anonymous IDs for those machines).
See the ``responsibilties associated with anonymous posting''
before proceeding.
Another direct route involves using NNTP protocols to submit a
message directly to a newserver with arbitrary field information.
This practice, not uncommon to hackers, is also generally viewed
with hostility by most system administrators, and similar
consequences can ensue.
See the sections ``known anonymous mail and posting sites'' and
``responsibilities associated with anonymity''.
_____
<3.6> Why is anonymity (un)stable on the internet?
As noted, many factors compromise the anonymity currently available
to the general internet community, and these services should be
used with great caution. To summarize, the technology is in its
infancy and current approaches are unrefined, unreliable, and not
completely trustworthy. No standards have been established and
troubling situations of loss of anonymity and bugs in the software
are prevalent. Here are some encountered and potential bugs:
- One anonymous remailer reallocated already allocated anonymous
return addresses.
- Others passed signature information embedded in messages
unaltered.
- Address resolution problems resulting in anonymized mail bounced
to a remailer are common.
- Forgeries to the anonymous server itself are a problem, possibly
allowing unauthorized users to potentially glean anon ID - email
address mappings in the alias file. This can be remedied with
the use of passwords.
- Infinite mail loops are possible with chaining remailers.
Source code is being distributed, tested, and refined for these
systems, but standards are progressing slowly and weakly. The
field is not likely to improve considerably without official
endorsement and action by network agencies. The whole idea is
essentially still in its infancy and viewed with suspicion and
distrust by many on the internet, seen as illegitimate or favorable
to criminality. The major objection to anonymity over regular
internet use is the perceived lack of accountability to system
operators, i.e. invulnerability to account restrictions resulting
from outside complaints. System adminstrators at some sites have
threatened to filter anonymous news postings generated by the
prominent servers from their redistribution flows. This may only
have the effect of encouraging server operators to create less
characteristically detectable headers. Probably the least
problematic approach, and the most traditional to Usenet, is for
individual users to deal with anonymous mail however they prefer,
e.g. ignoring it or filtering it with kill files.
_____
<3.7> What is the future of anonymity on the internet?
New anonymous protocols effectively serve to significantly increase
safeguards of anonymity. For example, the same mechanism that
routes email over multiple hosts, thereby threatening its privacy,
can also be used to guarantee it. In a scheme called `chaining' an
anonymous message is passed through multiple anonymous servers
before reaching a destination. In this way generally multiple
links of the chain have to be `broken' for security to be
compromised. Re-encryption at each link makes this scenario even
more unlikely. Even more significantly the anonymous remailers
could be spread over the internet globally so that local weaknesses
(such as corrupt governments or legal wiretapping within a nation)
would be more unlikely to sacrifice overall security by message
tracing. However, remailers run by corrupt operators are possible.
The future of anonymous services on the internet is, at this time,
highly uncertain and fraught with peril. While specific groups seem
to benefit significantly from anonymous posting capabilities, many
feel that unlimited newsgroup scope for anonymous posting is a
disruptive and dangerous idea and detracts from discussions in
`serious' groups. The introduction of unlimited group anonymity
may have fundamental repercussions on Usenet conventions and
distribution mechanisms such as moderated and `alt' groups have had
in the past. For example, as part of new group creation, the
charter may specify whether `anonymous' posting is (un)welcome.
Nevertheless, the widespread introduction and use of anonymity may
be inevitable. Based on traffic statistics, anonymous services are
in huge demand. Pervasive and readily available anonymity could
carry significant and unforeseen social consequences. However, if
its use is continued to be generally regarded as subversive it may
be confined to the underground. The ramifications of widespread
introduction of anonymity to Usenet are still largely unknown. It
is unclear whether it will provoke signficant amounts of new
traffic or, instead of expansion, cause a shift where a greater
portion of existing traffic is anonymized. Conceivably the
services could play a role in influencing future mainstream social
acceptance of Usenet.
* * * | 7 | trimmed_train |
10,334 |
[Hint for Sun OS users: use /usr/5bin/echo instead of
/bin/echo or Csh's built-in echo. Otherwise you'll have
to embed literal ESC and BEL characters in the string
instead of using convenient octal sequences.]
Bad idea. using /usr/5bin/echo is slower than the built-in echo.
This is what I do. It does execute `hostname` once per shell window,
and does read in one extra file. But manipluating the titles does not
require executing extra programs.
Oh yes, it does execute some programs once per each system.
But it stores them in a file for the next time...
if ( ! $?HOSTNAME ) then
setenv HOSTNAME `hostname`
endif
# figure how how to generate escape, bell,
# and echo commands without a a line terminator
# I may have done this before. If so, the variable E is set
# have I executed this script before on this system?
if ( $?E ) then
# echo "already set the echo variables">/dev/tty
else if ( -f ~/.echo.${HOSTNAME} ) then
source ~/.echo.${HOSTNAME}
else if ( `echo -n |wc -l` == 0 ) then
# echo "built in echo is bsd" >/dev/tty
# then berkeley style echo
echo 'set ech = "echo -n"' >~/.echo.${HOSTNAME}
echo "set E = `echo a | tr a '\033'`" >> ~/.echo.${HOSTNAME}
echo "set B = `echo a | tr a '\007'`" >> ~/.echo.${HOSTNAME}
echo 'set N = ""' >> ~/.echo.${HOSTNAME}
source ~/.echo.${HOSTNAME}
else
# echo "built in echo is sysV" >/dev/tty
echo 'set ech = "echo"' >~/.echo.${HOSTNAME}
echo 'set E = "\033"' >> ~/.echo.${HOSTNAME}
echo 'set B = "\007"' >> ~/.echo.${HOSTNAME}
echo 'set N = "\c"' >> ~/.echo.${HOSTNAME}
source ~/.echo.${HOSTNAME}
endif
# Are we using shelltool, cmdtool or xterm?
# duplicate these aliases here to avoid problems
if ( $term =~ sun* ) then
# Sun Aliases
alias Header '${ech} "${E}]l\!:1${E}\${N}"'
alias IHeader '${ech} "${E}]L\!:1${E}\${N}"'
else if ( $term =~ xterm ) then
alias Header '${ech} "${E}]2;\!:1${B}${N}"'
alias IHeader '${ech} "${E}]1;\!:1${B}${N}"'
endif
| 16 | trimmed_train |
4,334 |
I did this. I use a relay (Radio Shack 4PDT) instead of a huge
switch. This way, if the relay breaks, my drives will still work.
It works fine, but you may still need to change the CMOS before the
drive switch will work correctly for some programs.
rp93 | 3 | trimmed_train |
7,914 |
The Leafs have always been kind of comical. During the second Imlach
era, when Darryl Sittler was called a "cancer on the team", he tore the
C off his sweater and for a while the Leafs didn't have a Captain.
Sittler eventually ended up in Philly and he was promised the Philly
captaincy by new GM (and Sittler's friend) Bobby Clarke. Instead,
Sittler got traded to Detroit.
Rick Vaive was the Leaf Captain for awhile but he slept in one day and
they took the captaincy away from him. Then he was traded to Chicago.
During Doug Carpenter's tenure as Leaf coach, in an attempt to kiss
the ass of a sulking Gary Leeman, the Leafs took the A away from Brad
Marsh to give to Leeman. Leeman wouldn't take it and when they tried
to give it back to Marsh, he wouldn't take it neither.
The best story I remember about a captain concerned Mel Bridgman, late
of the Senators. While he was in Philadelphia, Bobby Clarke, arguably
one of the great captains of all time, was bumped up to the status of
playing coach and so he had to relinquish the captaincy. Bridgman be-
came the new captain. A reporter asked a Flyer what Bridgman did as a
captain since Clarke was still the undisputed leader amongst the
players. The reporter was told that Bridgman was in charge of making
sure that the soap dispensers in the showers were always full.
-- | 17 | trimmed_train |
10,861 | Archive-name: ripem/faq
Last-update: Sun, 7 Mar 93 21:00:00 -0500
ABOUT THIS POSTING
------------------
This is a (still rather rough) listing of likely questions and
information about RIPEM, a program for public key mail encryption. It
(this FAQ, not RIPEM) was written and will be maintained by Marc
VanHeyningen, <[email protected]>. It will be posted to a
variety of newsgroups on a monthly basis; follow-up discussion specific
to RIPEM is redirected to the group alt.security.ripem.
This month, I have reformatted this posting in an attempt to comply
with the standards for HyperText FAQ formatting to allow easy
manipulation of this document over the World Wide Web. Let me know
what you think.
DISCLAIMER
----------
Nothing in this FAQ should be considered legal advice, or anything
other than one person's opinion. If you want real legal advice, talk
to a real lawyer.
QUESTIONS AND ANSWERS
---------------------
1) What is RIPEM?
RIPEM is a program which performs Privacy Enhanced Mail (PEM) using
the cryptographic techniques of RSA and DES. It allows your
electronic mail to have the properties of authentication (i.e. who
sent it can be confirmed) and privacy (i.e. nobody can read it except
the intended recipient.)
RIPEM was written primarily by Mark Riordan <[email protected]>.
Most of the code is in the public domain, except for the RSA routines,
which are a library called RSAREF licensed from RSA Data Security Inc.
2) How can I get RIPEM?
RIPEM contains the library of cryptographic routines RSAREF, which is
considered munitions and thus is export-restricted from distribution
to people who are not citizens or permanent residents of the U.S. or
Canada. Therefore, the following request is quoted from the README
file:
#Please do not export the cryptographic code in this distribution
#outside of the USA or Canada. This is a personal request from me,
#the author of RIPEM, and a condition of your use of RIPEM.
Note that RSAREF is not in the public domain, and a license for it is
included with the distribution. You should read it before using
RIPEM.
The best way to get it is to ask a friend for a copy, since this will
reduce the load on those sites that do carry it (not to mention the
humans that run them.) Naturally this requires that you trust the
friend.
RIPEM is available via anonymous FTP to citizens and permanent residents
in the U.S. from rsa.com; cd to rsaref/ and read the README file for
info. Last I looked, this site contains only the source tree, and
does not contain compiled binaries or the nice Mac version.
RIPEM, as well as some other crypt stuff, has its "home site" on
rpub.cl.msu.edu, which is open to non-anonymous FTP for users in the
U.S. and Canada who are citizens or permanent residents. To find out
how to obtain access, ftp there, cd to pub/crypt/, and read the file
GETTING_ACCESS. For convenience, binaries for many architectures are
available here in addition to the full source tree.
3) Will RIPEM run on my machine?
Probably. It has already been ported to MS-DOS and most flavors of
Unix (SunOS, NeXT, Linux, AIX, ULTRIX, Solaris, etc.) Ports to
Macintosh include a standard UNIX-style port and a rather nice
Mac-like port written by Raymond Lau, author of StuffIt. More ports
are expected, and help of users is invited.
4) Will RIPEM work with my mailer?
Probably. How easy and clean the effective interface is will depend
on the sophistication and modularity of the mailer, though. The users
guide, included with the distribution, discusses ways to use RIPEM
with many popular mailers, including Berkeley, mush, Elm, and MH.
Code is also included in elisp to allow easy use of RIPEM inside GNU
Emacs.
If you make a new interface for RIPEM or create an improvement on one
in the distribution which you believe is convenient to use, secure,
and may be useful to others, feel free to post it to alt.security.ripem.
5) What is RSA?
RSA is a crypto system which is asymmetric, or public-key. This means
that there are two different, related keys: one to encrypt and one to
decrypt. Because one cannot (reasonably) be derived from the other,
you may publish your encryption, or public key widely and keep your
decryption, or private key to yourself. Anyone can use your public
key to encrypt a message, but only you hold the private key needed to
decrypt it. (Note that the "message" sent with RSA is normally just
the DES key to the real message. (See "What is DES?")
Note that the above only provides for privacy. For authentication,
the fingerprint of the message (See "What is a fingerprint, like
MD5?") is encrypted with the sender's private key. The recipient can
use the sender's public key to decrypt it and confirm that the message
must have come from the sender.
RSA was named for the three men (Rivest, Shamir and Adleman) who
invented it. To find out more about RSA, ftp to rsa.com and look in
pub/faq/ or look in sci.crypt.
6) What is DES?
DES is the Data Encryption Standard, a widely used symmetric, or
secret-key, crypto system. Unlike RSA, DES uses the same key to
encrypt and decrypt messages. However, DES is much faster than RSA.
RIPEM uses both DES and RSA; it generates a random key and encrypts
your mail with DES using that key. It then encrypts that key with the
recipient's public RSA key and includes the result in the letter,
allowing the recipient to recover the DES key.
DES is sometimes considered weak because it is somewhat old and uses a
key length considered too short by modern standards. However, it
should be reasonably safe against an opponent smaller than a large
corporation or government agency. It is not unlikely that future
RIPEMs will strengthen the symmetric cipher, possibly by using
multiple encryption with DES.
7) What is PEM, and how does RIPEM relate?
PEM is Privacy Enhanced Mail, a system for allowing easy transfer of
encrypted electronic mail. It is described in RFCs 1421-1424; these
documents have been approved and obsolete the old RFCs 1113-1115.
RIPEM is not really a complete implementation of PEM, because PEM
specifies certificates for authenticating keys, which RIPEM does not
handle at this time. Their addition is planned.
8) What's this about distributing and authenticating keys?
For a remote user to be able to send secure mail to you, she must know
your public key. For you to be able to confirm that the message
received came from her, you must know her public key. It is important
that this information be accurate; if a "bad guy" convinces her that
his key is in fact yours, she will send messages which he can read.
RIPEM allows for three methods of key management: a central server,
the distributed finger servers, and a flat file. All three are
described in the RIPEM users guide which is part of the distribution.
None of them provide perfect security.
9) Why do all RIPEM public keys look very similar?
RIPEM public keys begin with a PKCS identifier describing various
characteristics about the key, so the first bunch of characters in
your key may be the same as those of lots of other people's keys.
This does not mean your keys are similar, but only that they are the
same class of key, were generated with the same program, are of the
same length, etc.
10) What is a fingerprint, like MD5?
MD5 is a message digest algorithm produced by RSA Data Security Inc.
It provides a 128-bit fingerprint, or cryptographically secure hash,
of the plaintext. It is cryptographically secure because it is not
possible (in a reasonable amount of computation) to produce a
different plaintext which produces the same fingerprint. Thus,
instead of signing the entire message with the sender's private key,
only the MD5 of the message needs to be signed for authentication.
MD5 is sometimes used for other purposes; for example, it is often
used to map an input of arbitrary length to 128 bits of data, as a
passphrase interpreter or cookie generator.
MD5 is described in its entirety (including an implementation in C) in
RFC 1321.
11) What is PGP?
PGP is another cryptographic mail program called Pretty Good Privacy.
PGP has been around longer than RIPEM, and works somewhat differently.
PGP is not compatible with RIPEM in any way, though PGP does also use RSA.
Some major differences between PGP and RIPEM:
- PGP has more key management features, particularly for users without
a direct network connection.
- RIPEM conforms to the PEM RFCs and thus has a greater probability of
working with other PEM software. PGP makes no attempt to be compatible
with anything other than PGP (in fact, PGP 1.0 is not compatible with
PGP 2.0.)
- RIPEM uses RSAREF, a library of RSA routines from RSA Data Security
Inc. RSAREF comes with a license which allows noncommercial use.
PGP uses its own implementation of RSA which is not licensed; thus,
PKP, the firm holding the U.S. patents on the RSA algorithm, claims
that it is a infringement of that patent to make, use or sell PGP in
the U.S. or Canada. In acknowledgement of this, PGP's original
author, Phil Zimmermann, says in the documentation:
#In fact, if you live in the USA, and you are not a Federal agency,
#you shouldn't actually run PGP on your computer, because Public
#Key Partners wants to forbid you from running my software. PGP is
#contraband.
- Both PGP and RIPEM are export-restricted, and cannot be sent outside
the U.S. and Canada. However, PGP already exists on many ftp sites
in Europe and other places.
Whether you use PGP or RIPEM or whatever, the documentation to PGP is
recommended reading to anyone interested in such issues.
Note that the above facts, both regarding patent and export
restrictions, are somewhat controversial; many people think it
shouldn't be that way, and some people interpret various documents
differently. Unfortunately, discussions of it on the net inevitably
seem to produce more heat than light, and probably belong in
misc.legal.computing. (See: "DISCLAIMER")
12) What about RPEM?
RPEM stands for Rabin Privacy Enhanced Mail. It was similar to RIPEM,
but used a public-key cipher invented by Rabin (which is not RSA) in
an attempt to avoid the patent on RSA. It was written by Mark
Riordan, the same author as RIPEM.
Its distribution was halted when, contrary to the beliefs of many
(including Rabin), Public Key Partners (PKP) claimed that their patent
was broad enough to cover any public-key cipher whose strength rested
in the difficulty of factoring products of large primes, not just RSA.
This claim is not universally accepted by any means, but was not
challenged for pragmatic reasons.
RPEM is not really used anymore. It is not compatible with RIPEM or PGP.
13) What is MIME?
MIME stands for Multipurpose Internet Mail Extensions, and is
described in RFC 1341. You can find out about it in the newsgroup
comp.mail.mime. How PEM should interact with MIME is not yet entirely
clear; some people use the stopgap solution of having a MIME type
application/x-ripem in order to send RIPEM messages as MIME ones. I
hope some standards will emerge. Draft Internet documents exist on
the matter.
14) I have this simple way to defeat the security of RIPEM... | 7 | trimmed_train |
9,353 |
Cannot? Try, will not.
---
"One thing that relates is among Navy men that get tatoos that
say "Mom", because of the love of their mom. It makes for more
virile men."
Bobby Mozumder ( [email protected] )
April 4, 1993 | 8 | trimmed_train |
399 | Does anyone know how to reach Micron? I am interested in getting some
specifics about what types of monitors work with their Micron Xceed
card for the se/30. either e-mail or phone number would be prefered.
Or if you have the answers to my questions, i'd appreciate a reply.
Thanks.
--
----------------------------------------------------------------
julia hsieh My opinions are not intended to reflect
[email protected] those of Hughes Aircraft Company. | 14 | trimmed_train |
2,827 | Has anyone tried connecting an Apple Laserwriter II to a PC?
Do I need any special controller card or software to do that?
Thanks for any comments.
| 3 | trimmed_train |
6,273 | :Yea, there are millions of cases where yoy *say* that firearms
:'deter' criminals. Alas, this is not provable. I think that that
:there are actually *few* cases where this is so.
You "think" wrong. Ask the FBI. They've got the proof. Look it up.
:The bulk of firarems are used against unworthy and unnesessary
:opponents ... those who posessa a cool jakcet you want, those who
:would argue with you about a parking space, those who would
:take your woman. In short, trivial and worthless causes.
You lie like a snake. The "vast majority" of the 200 MILLION firearms
in this country are never used in anger. Your feelings notwithstanding.
:Too much of this has ruined you cause. There is no recovery.
:In the near future, federal martials will come for your arms.
:No one will help you. You are more dangerous, to their thinking,
:than the 'criminal'. This is your own fault.
We will overcome the kind of blind, pig-headed, utterly stupid idiocy that
you and others spout in a vain attempt to further your own agendas. We
will make the truth be known, despite your best efforts to the contrary.
:The 2nd amendment is dead. Accept this. Find another way.
The Second Amendment won't be dead unless it is repealed. That won't happen.
EVER.
Accept this. Find another way to try and control other's lives, because we
see you for what you are, and we are not fooled.
Mike Ruff
| 9 | trimmed_train |
12 | --
| 14 | trimmed_train |
5,035 | At the Lester Patrick Awards lunch, Bill Torrey mentioned that one of his
options next season is to be president of the Miami team, with Bob Clarke
working for him. At the same dinner, Clarke said that his worst mistake
in Philadelphia was letting Mike Keenan go -- in retrospect, almost all
players came realize that Keenan knew what it took to win. Rumours are
now circulating that Keenan will be back with the Flyers.
Nick Polano is sick of being a scapegoat for the schedule made for the
Red Wings; After all, Bryan Murray approved it.
Gerry Meehan and John Muckler are worried over the Sabres' prospects;
Assistant Don Lever says that the Sabres have to get their share now,
because a Quebec dynasty is emerging ...
The Mighty Ducks have declared that they will not throw money around
loosely to buy a team.
Oilers coach Ted Green remarked that "There some guys around who can
fill Tie Domi's skates, but none who can fill his helmet."
Senators' Andrew McBain told off a security guard at Chicago Stadium
who warned him of the stairs leading down to the locker room; McBain
mouthed off at him, after all being a seasoned professional ... and
tumbled down the entire steep flight.
gld | 17 | trimmed_train |
1,891 |
no, sheesh, didn't you know 666 is the beast's apartment? 667 is across the
hall from the beast, and is his neighbor along with the rest of the 6th floor.
This doesn't seem discordant to you? | 15 | trimmed_train |
8,857 | I want to go from 512K to 1M VRAM on my Quadra 800. How many 512K SIMMS do I
need to buy? Is the current 512K soldered on the board or do I need to take
out the current VRAM before I add more?
Thanks,
Wesley Stuart Jones | 14 | trimmed_train |
1,276 | I need to get an Apple 40SC tape backup unit working under
Sys 7.0.x, but do not have any drivers/software to access
the device. Does anyone know where I can fidn the tools
to access this device?
Appreciate any info/comments.
--curtis | 14 | trimmed_train |
9,350 | MELITTIN | 19 | trimmed_train |
6,343 | S P H E R I C A L D E S I G N I N G | 1 | trimmed_train |
10,138 |
Oh no! Say it isn't so!
Yes, Yl|nen is a draft choice of the Jets. (Assuming, of course, this
is the same Yl|nen that played for Kiekko-Espoo in 1990-91.) He was a
5th round, 91st overall pick of the Jets in the 1991 entry draft.
I noticed in the summaries that Yl|nen had really begun to play well in
the playoffs. | 17 | trimmed_train |
1,176 |
Any lunar satellite needs fuel to do regular orbit corrections, and when
its fuel runs out it will crash within months. The orbits of the Apollo
motherships changed noticeably during lunar missions lasting only a few
days. It is *possible* that there are stable orbits here and there --
the Moon's gravitational field is poorly mapped -- but we know of none.
Perturbations from Sun and Earth are relatively minor issues at low
altitudes. The big problem is that the Moon's own gravitational field
is quite lumpy due to the irregular distribution of mass within the Moon. | 10 | trimmed_train |
2,587 | All these people who send in their polls should take a closer look at
NJD, they are a very deep team, with two very capable goalies, and
excellent forwards and defensemen. Shooter in Richer, an all around do
it all in Todd, chef Stasny-master of a thousand dishes, power play
captain-Stevens. Take a look at the numbers, or play with them and see
for yourselves.
| 17 | trimmed_train |
7,210 | Trade your old PC for my new modem.
Modem comes with coupond good for travel to/from Europe.
14.4 v.42bis modem
MODEM FEATURES:
MNP5 2-to-1 Compression & Error Correction
V.42bis 4-to-1 Compression & Error Correction
CCITT V.32bis Compatible (14.4k bps)
CCITT V.32 Compatible (9.6k bps)
CCITT V.22bis Compatible (2.4k bps)
AT Command Set Compatible
Compatible with IBM PC/XT/AT/386's and Compatibles
Bundled with Communications Software
PC Bus interface
Two RJ11C Connectors: Phone and Line | 5 | trimmed_train |
318 |
I am hoping to produce the first update of the BB DDD this week;
please send info about the most significant (longest, most critical,
etc.) home run that you have seen yet this season. | 2 | trimmed_train |
6,422 |
Basically, there are two algorithms determining whether a point is inside,
outside or on the polygon. The first one is Ray (or half line) method. In
this method, you can draw any ray, if the number of the intersection point
of the ray and the polygon is even, then it is outside. If the number is odd,
then it is inside. Of cause, you have to deal with the special cases which
may make you headache.
The second method is PI algorithm. Draw the lines between the point and
all the vertices on the polygon. Calculate and sum the angles of the
successive lines. If the result is 2*PI, then it is inside. If PI, then
it is on the polygon. Otherwise it is outside.
My experience tells the second method is relible.
Hope this helps. | 1 | trimmed_train |
6,865 |
steps deleted
{> ...
{>
{> It's an interesting idea, but the worst-case data patterns developed to
{> test magnetic media are totally different than the patterns used to detect
{> common faults in memory chips.
{>
I was having major memory problems a few monthes ago.
getting parity error - system halted error message in windows.
I ran QA/PLUS, Check It, Diagnose, as well as several shareware
memory checkers. I had a total of 8 meg SIMM in my system.
these store bought/ shareware memory diagnostics either ran fine
without errors or found an error at some address that I couldn't
place on a memory chip. Out of exahperation I came up with
the (now deleted) steps to find bad memory chips. I found 2
(moral : never buy memory stamped "not for sensitive or critical
applications" on the back.
anyway I did filter out all the bad memory chips using
combinations of 4 of the 8 meg chips and creating a RAM drive to
test on. Although it dodn't alleviate my parity error problems
in windows. I did manage to find bad memory chips in this manner
It has NEVER failed to find a bad chip for me. and the commercial/
shareware have always faild me either not finding the error or
pointing to an addreww which I have no idea on what chip it is.
p.s. man my typing stinks today and I don't feel like futzing around with
this line editor.
-David
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= | 3 | trimmed_train |
5,855 |
Speaking of Psygnosis, they have licensed games to Philips Interative
Media International for CD-I.
The following was recently posted in a message in the CD-I section of
the Multimedia Forum.
"Seventh Guest has been licensed by Virgin Games to Philips Interactive
Media International for worldwide CD-I rights. Were also licensed to
P.I.M.I. Litil Divil from Gremlin Graphics (UK) and Microcosm from
Psygnosis (UK). Those three titles will be adapted on CD-I using the full
potential of the FMV cartridge, meaning, using the additional memory as
well as the motion video capabilities. Those titles have been negociated
in Europe but will be available worldwide.
Also, Lemmings 1 & 2 have been licensed from Psygnosis, as well as Striker
Soccer from Rage (UK)."
I don't know when these titles will be available or when work on them even
started (so don't expect your CD-I retailer to have them yet).
There was also some mention of future Nintendo CD-I games in an issue of the
UK magazine ERT - Mario Hotel was mentioned as having 75 levels.
Mark
[Although I work for Philips, I don't work on CD-I or multimedia. The above
info is just provided in good faith from what I've read and does not
represent any statement from Philips] | 1 | trimmed_train |
200 |
I first read and consulted rec.guns in the summer of 1991. I
just purchased my first firearm in early March of this year. | 9 | trimmed_train |
2,289 |
We also cannot fail to note the intense suffering a devastation which has been
wrecked on our world because of Christians -- who were certain they were
following Christ. From Captialist who have polluted the enviorment in strict
obedience to the Gensis command to subdue the earth, to Nazi's who have
"justly"
punished the Jews for the killing Christ (as well as the other progroms), the
innocent women who were burned alive in accordance with "you shall not allow a
witch to live", the Moslems who were killed in the Crusades, the god-fearing
men destroyed by the inquistion. The religious wars in Spain, France, England,
etc. Christianity has undoubtedly caused the most suffering and needless loss
of life by individuals whose certainity that they were following the
instructions therein, was unquestionable. There is much to grieve. | 0 | trimmed_train |
5,874 |
oh, i see. electricity is a natural right & our wonderful government
would -never- cut off the power to the people they were besieging.
are you really this dumb, or just acting like it for the sake of
argument?
jason
| 9 | trimmed_train |
9,978 |
Isn't that interesting?! In the Jewish tradition you are incredibly
wrong! They originate in the Torah and with Jewish ancestors,
specifically the Patriarch Abraham (z"l). That knowledge was sent East
to India and China when Abraham gave "gifts" (the commentators to Jewish
scripture say this was the knowledge of the occult arts) to all the rest
of his children when he sent them away to the East. This assured that
Isaac only, who remained with Abraham, would inherit his most important
spiritual gifts, what eventually became Judaism.
So you see, other religions can have very parochial views too. By the
Jewish view, you are very mistaken, your scripture are not scripture,
your gods are not gods, your practices a jumble of errors that lead
people to idol worship and away from God. That doesn't stop us from
respecting you to the extent of not trying to convert you or proselytize
you and being willing to dialog in a respectful manner. We're content
to let you live the way you care to live as long as you leave us be. We
are happy to co-exist as long as you give us the same right.
But your incredible rudeness and violent nature seems to preclude that.
Too bad. Is this typical of your religion?
You are a most presumptuous fellow! How dare you presume that the
"typical" New Ager doesn't acknowledge God and is selfish. What trite,
self-righteous, ego-ful garbage! There are Buddhists, Christians, Jews,
and those of many other religions here on this newsgroups for whom your
words are simple slander.
Of course, from the Jewish perspective you are incredibly wrong. We'd
say that there is no "godhead" -- just created beings who may be
enjoying a good laugh at your expense.
So not only are we selfish, we are also thieves and liars! And you
expect any of us to pay attention to you and your "religion?" Why not
call us more name? Maybe then we'll all convert in gratefullness!
You delude yourself.
| 15 | trimmed_train |
7,979 |
I think he is trying to mislead people. In cases where race
information is sought, it is completely voluntary (the census
possibly excepted). | 6 | trimmed_train |
11,199 | I am so tired about all this debate on how many gays there
are! Such arguments are basically worthless, imho. Would it
really matter if it were millions of people who are regularly
denied access to housing, employment, and personal security or
even only one?
As for death threats, I happen to know from personal
experience that gay people are far more likely to receive
them based on political veiws or even personal philosophies
related to the issue of sexual orientation than are heterosex
uals. Not a week goes by that I personally or one of my friends
is not physically or verbally harrassed for even appearing to
be gay.
Everyone is garaunteed certain unalienable rights under
our current form of government in theory, yet every day
gay people are victimized by their local governments, by
the police force, and by (for the most part) an uninformed
and ignorant public. Is this democracy? I don't think so.
A society's sense of justice is judged on the basis of
the treatment of the people who make up that society.
All of those people. And yes, that includes gays, lesbians,
and bisexuals whose "crimes" have no victims, and who
are as varied and diverse as the society of wich they are
a part. | 13 | trimmed_train |
8,976 |
Well, when you crosspost to talk.origins, what do you expect?
| 15 | trimmed_train |
4,113 |
What?! White, yes. Well off, definitely not. Hockey season ticket owners have
the lowest average income of any of the four major North American sports.
And think of where the majority of hockey players come from. From a farm out
in Boondock, Saskatchewan or Weedville, Alberta.
The inner city isn't the only place that is poor.
I think the biggest barrier to hockey in the inner city is... no ICE to play on.
Stace
| 17 | trimmed_train |
8,111 | Hello all.
I am thinking about buying an external monitor for my SE/30 and was
wondering if anyone out in netland has any advice for me.
I am mostly thinking about a 14" color monitor and an 8 bit card that
can switch between 640*480 and something higher (like 800*600). I read an
old report on a card from Lapis that could do this, but could not use the
external monitor as the main screen (with menubar) which to me is a major draw-
back. Has this perhaps been fixed? Or can any other cards do this (like the
Micron Xceed) ?
Also which monitor should I buy? At the moment I am leaning towards
the Sony 1304, 1304s or 1320 (what exactly is the difference between these?)
but are there any other good cheap monitors I should know about? Doesn't the
monitor have to be multisync to support cards that can switch resolutions?
Please send me e-mail and I'll summarize.
I would also greatly appreciate getting the e-mail addresses of any mail order
companys that sell monitors or cards.
Thanks in advance | 14 | trimmed_train |
5,824 |
I've seen this verse used to back up this idea:
"...He has also set eternity in the hearts of men..." (Ecclesiastes 3:11) | 0 | trimmed_train |
4,872 | Hello Brad!
Monday April 26 1993 17:24, Brad Smalling wrote to (crosspost 1) All:
BS> For a VGA card these are the correct files but you can't just copy them
BS> back and expect it to work. You have to create a new WIN.COM file. Try
BS> the command (you will have to worry about what directories each file is in
BS> since I don't know your setup):
BS> COPY /B WIN.CNF+VGALOGO.LGO+VGALOGO.RLE WIN.COM
BS> (I grabbed this from _Supercharging Windows_ by Judd Robbins--great book)
BS> This is also how you can put your own logo into the Windows startup
BS> screen. An RLE file is just a specially compressed BMP file.
Brad,
What is the procedure used to 'specially' compress the BMP file? I would
love to use some of my BMP files I have created as a logo screen. Thanks
Chris
| 18 | trimmed_train |
6,463 |
Yes, I am pro-gun, and yes, I do disagree with this statement.
Nuclear weapons in and of themselves are dangerous. Radioactive
decay of plutonium and uranium, as well as the tritium in the
weapon, tends to be somewhat dangerous to living things.
(Can you say "neutron flux"?) Plus these things have no self-
defense purposes. It's kinda hard to justify their use as
a militia weapon when at best they are meant for battlefield use
(low-yield weapons) or at worst for industrial target obliteration
(translation: cities and population centers). Not to mention that
for it to be used as a militia weapon and expect the user to live
requires some sort of launch vehicle . . . | 9 | trimmed_train |
2,380 |
To construct a Kirlian device find a copy of _Handbook of Psychic
Discoveries_ by Sheila Ostrander and Lynn Schroeder 1975 Library of
Congress 73-88532. It describes the necessary equipment and
suppliers for the Tesla coil or alternatives, the copper plate and
setup. I used a pack of SX-70 film and removed a single pack in a
dark room, then made the exposure, put it back in the film pack and
ran it out through the rollers of the camera forinstant developing
and very high quality. It is a good way to experience what Kirlian
Photography is really and what it is not. As you know all ready,
it is the pattern in the bioplasmic energy fieldthat is significant.
Variations caused by exposure time, distance from the plate, or
pressure on the plate, or variations in the photo materials are not
important. | 19 | trimmed_train |
3,671 | Could someone PLEASE give a guess as to why this simple little program
causes a BadPixmap error on the FOURTH (bizarre???) call to XtRelaizeWidget()?
Here is the code:
int stoploop = 0;
static void Callback(Widget, XtPointer, XtPointer);
main()
{
XtToolkitInitialize();
XtAppContext app = XtCreateApplicationContext();
while (1)
{
int junk = 0;
Display *dis = XtOpenDisplay(app, NULL, NULL, NULL, NULL, 0,
&junk, NULL);
Widget top = XtAppCreateShell(NULL, NULL,
applicationShellWidgetClass, dis, NULL, 0);
Widget box = XtVaCreateManagedWidget("x",
xmPushButtonWidgetClass,
top,
XmNheight, 25,
XmNwidth, 25, NULL);
XtAddCallback(box, XmNactivateCallback, Callback, NULL);
XtRealizeWidget(top);
while (!stoploop)
{
XEvent event;
XtAppNextEvent(app, &event);
XtDispatchEvent(&event);
}
stoploop = 0;
XtReleaseGC(top, XDefaultGCOfScreen(XtScreen(top))); // needed?
XtDestroyWidget(top);
XtCloseDisplay(dis);
}
}
static void Callback(Widget, XtPointer, XtPointer)
{
stoploop = 1;
}
The error I get (yes, the 4TH time I try to show the box) is:
X Error of failed request: BadPixmap (invalid Pixmap parameter)
Major opcode of failed request: 55 (X_CreateGC)
Resource id in failed request: 0xd0000d
Serial number of failed request: 71
Current serial number in output stream: 85
Please respond via email. Thanks very, very much!
(NOTE: I realize this program does nothing useful, its an ultra-trivialized
version fo a real library routine)
--
-------------------------------------------------------------------------------
David Rex Wood -- [email protected] -- University of Colorado at Boulder | 16 | trimmed_train |
5,931 |
Actually, there is one condemnation of lesbian acts in the Bible, Romans
1:26.
I think. In
There are plenty who don't read the Bible.
Or pray for that matter. | 15 | trimmed_train |
4,733 | Can someone please remind me who said a well known quotation?
He was sitting atop a rocket awaiting liftoff and afterwards, in answer to
the question what he had been thinking about, said (approximately) "half a
million components, each has to work perfectly, each supplied by the lowest
bidder....."
Attribution and correction of the quote would be much appreciated. | 10 | trimmed_train |
8,409 |
>This is turning into 'what's a moonbase good for', and I ought not
>to post when I've a hundred some odd posts to go, but I would
>think that the real reason to have a moon base is economic.
>
>Since someone with space industry will presumeably have a much
>larger GNP than they would _without_ space industry, eventually,
>they will simply be able to afford more stuff.
If I read you right, you're saying in essence that, with a larger
economy, nations will have more discretionary funds to *waste* on a
lunar facility. That was certainly partially the case with Apollo,
but real Lunar colonies will probably require a continuing
military, scientific, or commercial reason for being rather than
just a "we have the money, why not?" approach.
Ah, but the whole point is that money spent on a lunar base is not
wasted on the moon. It's not like they'd be using $1000 (1000R?) bills
to fuel their moon-dozers. The money to fund a lunar base would be
spent in the country to which the base belonged. It's a way of funding
high-tech research, just like DARPA was a good excuse to fund various
fields of research, under the pretense that it was crucial to the
defense of the country, or like ESPRIT is a good excuse for the EC to
fund research, under the pretense that it's good for pan-European
cooperation.
Now maybe you think that government-funded research is a waste of
money (in fact, I'm pretty sure you do), but it does count as
investment spending, which does boost the economy (and just look at
the size of that multiplier :->). | 10 | trimmed_train |
2,454 | Do anyone know about any shading program based on Xlib in the public domain?
I need an example about how to allocate correct colormaps for the program.
Appreciate the help. | 16 | trimmed_train |
1,693 | ...
This is a common problem with highly complex TrueType fonts. Microsoft
admits to a problem with older versions of the PostScript printer driver,
but I've found it to be pretty generic.
You can get around the problem by adjusting the parameter OutlineThreshold
in the [TrueType] section of WIN.INI. This entry specifies the number of
pels-per-em at which Windows will render TrueType fonts as outline fonts
instead of as bitmap fonts. The default is 256. I've generally been able
to get fonts to work by setting OutlineThreshold=160. Depending on your
printer resolution and the point size you are using, you may need a
different value.
The Windows Resource Kit warns against going above 300. Presumably, that
might cause fonts to print as square boxes or something. :-| (I'm not
smiling.)
| 18 | trimmed_train |
9,903 | I wrote in response to [email protected] (Darius_Lecointe):
Was Paul a God too? Is an interpretation of the words of Paul of higher
priority than the direct word of Jesus in Matt5:14-19? Paul begins
Romans 14 with "If someone is weak in the faith ..." Do you count
yourself as one who is weak in the faith?
Yes, but what does the Bible have to say? What did Jesus say? Paul
closes Romans 14 with, "On the other hand, the person with doubts about
something who eats it anyway is guilty, because he isn't acting on his
faith, and any failure to act on faith is a sin." Gaus, ISBN:0-933999-99-2
Have you read the Ten Commandments which are a portion of the Law? Have
you read Jesus' word in Matt5:14-19? Is there any doubt in your mind
about what is right and what is sin (Greek hamartia = missing the mark)?
Whereas, the Ten Commandments and Jesus' words in Matt5:14-19 are fairly
clear, are they not?
Matt5:14-19 doesn't answer your question?
Breaking bread - roughly synonymous with eating.
How do you unite this concept of yours with the Ten Commandments and
Jesus's word in Matt5:14-19?
Or, they assumed that the Ten Commandments and Jesus' word in
Matt5:14-19 actually stood for something? Perhaps they were "strong in
the faith?"
---------------------------
[No, I don't believe that Paul can overrule God. However Paul was
writing for a largely Gentile audience. The Law was regarded by Jews
at the time (and now) as binding on Jews, but not on Gentiles. There
are rules that were binding on all human beings (the so-called Noachic
laws), but they are quite minimal. The issue that the Church had to
face after Jesus' death was what to do about Gentiles who wanted to
follow Christ. The decision not to impose the Law on them didn't say
that the Law was abolished. It simply acknowledged that fact that it
didn't apply to Gentiles. Thus there is no contradiction with Mat 5.
As far as I can tell, both Paul and other Jewish Christians did
continue to participate in Jewish worship on the Sabbath. Thus they
continued to obey the Law. The issue was (and is) with Gentile
Christians, who are not covered by the Law (or at least not by the
ceremonial aspects of it).
Jesus dealt mostly with Jews. I think we can reasonably assume that
Mat 5 was directed to a Jewish audience. He did interact with
Gentiles a few times (e.g. the centurion whose slave was healed and a
couple of others). The terms used to describe the centurion (see Luke
7) suggest that he was a "God-fearer", i.e. a Gentile who followed
God, but had not adopted the whole Jewish Law. He was commended by
Jewish elders as a worthy person, and Jesus accepted him as such.
This seems to me to indicate that Jesus accepted the prevailing view
that Gentiles need not accept the Law.
However there's more involved if you want to compare Jesus and Paul on
the Law. In order to get a full picture of the role of the Law, we
have to come to grips with Paul's apparent rejection of the Law, and
how that relates to Jesus' commendation of the Law. At least as I
read Paul, he says that the Law serves a purpose that has been in a
certain sense superceded. Again, this issue isn't one of the
abolition of the Law. In the middle of his discussion, Paul notes
that he might be understood this way, and assures us that that's not
what he intends to say. Rather, he sees the Law as primarily being
present to convict people of their sinfulness. But ultimately it's an
impossible standard, and one that has been superceded by Christ.
Paul's comments are not the world's clearest here, and not everyone
agrees with my reading. But the interesting thing to notice is that
even this radical position does not entail an abolition of the Law.
It still remains as an uncompromising standard, from which not an iota
or dot may be removed. For its purpose of convicting of sin, it's
important that it not be relaxed. However for Christians, it's not
the end -- ultimately we live in faith, not Law.
While the theoretical categories they use are rather different, in the
end I think Jesus and Paul come to a rather similar conclusion. The
quoted passage from Mat 5 should be taken in the context of the rest
of the Sermon on the Mount, where Jesus shows us how he interprets the
Law. The "not an iota or dot" would suggest a rather literal reading,
but in fact that's not Jesus' approach. Jesus' interpretations
emphasize the intent of the Law, and stay away from the ceremonial
details. Indeed he is well known for taking a rather free attitude
towards the Sabbath and kosher laws. Some scholars claim that Mat
5:17-20 needs to be taken in the context of 1st Cent. Jewish
discussions. Jesus accuses his opponents of caring about giving a
tenth of even the most minor herbs, but neglecting the things that
really matter: justice, mercy and faith, and caring about how cups and
plates are cleaned, but not about the fact that inside the people who
use them are full of extortion and rapacity. (Mat 23:23-25) This, and
the discussion later in Mat 5, suggest that Jesus has a very specific
view of the Law in mind, and that when he talks about maintaining the
Law in its full strength, he is thinking of these aspects of it.
Paul's conclusion is similar. While he talks about the Law being
superceded, all of the specific examples he gives involve the
"ceremonial law", such as circumcision and the Sabbath. He is quite
concerned about maintaining moral standards.
The net result of this is that when Paul talks about the Law being
superceded, and Jesus talks about the Law being maintained, I believe
they are talking about different aspects of the Law. Paul is
embroiled in arguments about circumcision. As is natural in letters
responding to specific situations, he's looking at the aspect of the
Law that is currently causing trouble: the Law as specifically Jewish
ceremonies. He certainly does not intend to abolish divine standards
of conduct. On the other hand, when Jesus commends the Law, he seems
to be talking the Law in its broadest implications for morals and
human relationships, and deemphasizing those aspects that were later
to give Paul so much trouble.
It's unfortunate that people use the same terms in different ways, but
we should be familiar with that from current conflicts. Look at the
way terms like "family values" take on special meaning from the
current context. Imagine some poor historian of the future trying to
figure out why "family values" should be used as a code word for
opposition to homosexuality in one specific period in the U.S. I
think Law had taken on a similar role in the arguments Paul was
involved in. Paul was clearly not rejecting all of the Jewish values
that go along with the term "Law", any more than people who concerned
about the "family values" movement are really opposed to family
values. | 0 | trimmed_train |
10,689 |
Rutin is a bioflavonoid, compounds found (among other places) in the
rinds of citrus fruits. These have been popular, especially in Europe,
to treat "capillary fragility", and seemingly in even more extreme cases--
a few months ago, a friend was visiting from Italy, and he said that he'd
had hemorrhoids, but his pharmacist friend sold him some pills. Incredulously,
I asked to look at them, and sure enough these contained rutin as the active
ingredient. I probably destroyed the placebo effect from my skeptical
sputtering. I have no idea how he's doing hemorrhoid-wise these days.
The studies which attempted to look at the effect of these compounds in
human disease and nutrition were never very well controlled, so the
reports of positive results with them is mostly anecdotal.
This stuff is pretty much non-toxic, and probably inexpensive, so there's
little risk of trying it, but I wouldn't expect much of a result.
| 19 | trimmed_train |
4,487 |
Careful now folks... Also consider the 90VAC+ @20Hz that is forced on ring
and tip when the phone's supposed to ring! Even with a simple zener
and LED setup, you might end up with some carbon real quick. Whatever
scheme you use, make sure you've got at least 200V-rated components on
the frontend.
Also remember that, if I'm not mistaken, the phone line is a 600ohm
equivalent circuit. Any current you draw from the 48V or so gets
dropped across that 600ohms. That's fine until you're down to roughly
12V, when Ma Bell considers it to be off-hook. But dropping it that
far down is probably a big no-no.
The easiest implementation to accomplish the above??
tip ------->|-----\/\/\/\-----+----------+
rectifier resistor | |
diode | \
V /
zener /---/ \ resistor
| /
| |
| V LED
| ---
| |
ring --------------------------+----------+
This is only a suggestion...go ahead and blow holes in it, but you
get the idea. Choose a high-efficiency LED so you don't need much
current to get it to light up. Choose values for the other components
as required. | 11 | trimmed_train |
6,527 |
Are you suggesting that we should forget the cold-blooded genocide of
2.5 million Muslim people by the Armenians between 1914 and 1920? But
most people aren't aware that in 1939 Hitler said that he would pattern
his elimination of the Jews based upon what the Armenians did to Turkish
people in 1914.
'After all, who remembers today the extermination of the Tartars?'
(Adolf Hitler, August 22, 1939: Ruth W. Rosenbaum (Durusoy),
"The Turkish Holocaust - Turk Soykirimi", p. 213.)
I refer to the Turks and Kurds as history's forgotten people. It does
not serve our society well when most people are totally unaware of
what happened in 1914 where a vicious society, run by fascist Armenians,
decided to simply use the phoniest of pretexts as an excuse, for wiping
out a peace-loving, industrious, and very intelligent and productive
ethnic group. What we have is a demand from the fascist government of
x-Soviet Armenia to redress the wrongs that were done against our
people. And the only way we can do that is if we can catch hold of and
not lose sight of the historical precedence in this very century. We
cannot reverse the events of the past, but we can and we must strive to
keep the memory of this tragedy alive on this side of the Atlantic, so as
to help prevent a recurrence of the extermination of a people because
of their religion or their race. Which means that I support the claims
of the Turks and Kurds to return to their lands in x-Soviet Armenia,
to determine their own future as a nation in their own homeland.
Serdar Argic | 6 | trimmed_train |
6,208 | I had the same question for my 55lb NEC 5FG monitor. The Apple guy said that
their 50lb 16" monitor is OK to put ontop of the Centris and had no coment
beyond that. I was going to just put the NEC on the box but then I got to
thinking - the monitor has a small tilt/swivel base so maybe the weight
would be more concentrated than with Apple's (I don't know the area of the
base of their tilt/swivel). Additionally, the CDROM drive is in the middle.
So I cut a piece of 3/8" thick wood to about 16.25" x 12", covered it in a
cream covered cloth, and used it as a buffer layer between the Centris's top
and the monitor!!
Mick Mueck [email protected] | 14 | trimmed_train |
3,328 |
Level 5 refers to the Carnegie-Mellon Software Engineering Institute's
Capability Maturity Model. This model rates software development
org's from1-5. with 1 being Chaotic and 5 being Optimizing. DoD is
beginning to use this rating system as a discriminator in contracts. I
have more data on thifrom 1 page to 1000. I have a 20-30 page
presentation that summarizes it wethat I could FAX to you if you're
interested...
Bret Wingert
[email protected] | 10 | trimmed_train |
6,706 |
Jehovah's Witnesses do not believe that Christians are required to observe
the Sabbath, whether it is on Saturday or Sunday. The Sabbath was part
of a Covenent between God and the Israelites and is not required for
Christians. | 15 | trimmed_train |
2,616 | :
: Where could I find a description of the JPG file format? Specifically
: I need to know where in a JPG file I can find the height and width of
: the image, and perhaps even the number of colors being used.
:
: Any suggestions?
:
: Peter
Try ftp.uu.net, in /graphics/jpeg.
-- | 1 | trimmed_train |
9,973 | Deion Sanders hit a home run in his only AB today. Nixon was 1 for 4. Infield
single. Deion's batting over .400 Nixon: around .200. Whom would YOU start?
Wise up, Bobby.
See y'all at the ballyard
Go Braves
Chop Chop
Michael Mule'
| 2 | trimmed_train |
6,954 |
1. There is a similar idea here in ex-USSR about how many militioners it needs
to place a new electric lamp. The answer is nine: one stays on a table and
holds the lamp, four hold the table and turn it and yet four run around the
table in opposite direction not to make the first feel bad (when being
turned). Pitily, it lacks this kind of dark humour as Nick's msg does.
2. To my mind the signature should be smth like:
/ _ __ / .
/_______/_/_______________ /________ /____/
/___ / _ /
Albert
| 6 | trimmed_train |
9,407 |
I can't answer most of your questions, but I've seen it happen in
family members who are being treated with radiation and/or chemotherapy.
Jory Graham published a cookbook many years ago (in cooperation with
the American Cancer Society, I think) called "Something has to taste
good" (as I recall).
The cookbook was just what we needed several times when favorite foods
suddenly became "yech". | 19 | trimmed_train |
1,931 |
Currently, he's all over. He played 2nd when Deshields was out. He was
shifted to third when Delino came back. And today, he played SS for a cold
Wil Cordero.
His natural positions seem to be in the middle infield, but they will seemingly
find a spot for himm somewhere as long as his bat is hot. | 2 | trimmed_train |
6,968 | # #Slavery makes economic sense (it NEVER makes MORAL sense) when human
# #muscle power is an economically valuable asset. Agricultural slavery might
# #have lasted right up to the first mechanical cotton reaper, but no
# #further; reapers are cheaper than slaves, and don't have to be fed during
# #the winter.
#
# This argument makes a several fundamental errors. First "agricultural"
# slavery was not limited to production of cotton. In the American south
# slave labor was used extensively to grow tobacco, sugar, and rice, all
# of which remained labor intensive enterprises well into the 20th century.
And of course, in states like Kentucky and Virginia, not well-suited to
large-scale plantations, slave labor was used to make one of the most
valuable agricultural products of all: more slaves. In some ways, this
treatment of humans beings as breeding livestock is the most horrifying
aspect of American slavery.
# Second, although mechanization of cotton production could be expected to
# reduce the demands for labor eventually, it was only in the 1940's
# the mechanization of cotton production in the South largely eliminated
# the labor intensive character of the operation, long after the "first
# mechanical cotton reaper" was invented.
This is an interesting question. Steinbeck's _Grapes of Wrath_
(published in the 1930s), uses agricultural mechanization of cotton
production in Arkansas as the cause of the Joad family being evicted
from the land. How many years were involved in the mechanization of
cotton farming? When did this first appear?
# #Ken Mitchell | The powers not delegated to the United States by the
# Steve Hendricks | DOMAIN: [email protected] | 13 | trimmed_train |
1,979 | I saw a previous request for the Rules and Instructions for the USENET
playoff pool but I haven't seen any responce. Does anybody have this info?
If so post away or you could mail it to me. Thanks in advance.
| 17 | trimmed_train |
1,338 |
Yes, I remember that now. Well, in that case, the cones are indeed
color sensitive, contrary to what the original respondent had claimed.
--
----------------------------------------------------------------------------
Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and
[email protected] | it is shameful to surrender it too soon." | 19 | trimmed_train |
9,057 |
Well, since the Oilers didn't win a heck of a lot of games, I'm not sure
they deserve and MVP ("can't win without him"). However, I'd suggest Kelly
Buchberger instead of Dave Manson, who has had a brutal year, his pick for
the All-Star game notwithstanding.
As for biggest surprise, I'd say that Buchberger had higher expectations
this year due to his "breakthrough" year (for him) last year, so he didn't
really raise his game. My suggestion would be Shjon Podein, one of the
callups from Cape Breton during the year. He was quite far down on the
depth chart in the Oilers stable of prospects, but made a big impact on
the team. He has 12 goals in his 33 games and is only -1. Those are decent
numbers for a third-line player who was seemingly doomed to minor-league
oblivion. The Oilers coaching staff likens his style to John Tonelli.
I think he'll be on the full-time roster next year.
As for biggest disappointment, you could name any of the players the Oilers
dumped for lousy production this year (Nicholls, Gilchrist, Tikkanen) or
even Shayne Corson, but Mellanby isn't far off.
--
Andrew Scott | [email protected]
HP IDACOM Telecom Division | (403) 462-0666 ext. 253 | 17 | trimmed_train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.