id
int32 1
11.3k
| text
stringlengths 0
74.9k
| label
int64 0
19
| Generalization
stringclasses 1
value |
---|---|---|---|
10,685 |
You raise a valid point, but again it's a tradeoff -- how much money
do you want to spend for that kind of protection? You could buy a
Volvo, Saab, or 'Benz and get really good crash protection (and other
luxuries) but you'll pay significantly more for it. In my case it's
out of the question because *all* of those cars are beyond my budget.
Even in high-speed head-on collisions the most beneficial item you can
have is a good old 3-point seatbelt. Nowadays, at least in the US,
you get an airbag if you get a 3-point belt so (presumably) you get an
added safety benefit there as well. That's something I certainly look
for and which can be had in inexpensive cars.
My $.02, of course. | 4 | trimmed_train |
9,607 | I have a Sony 1604S 17" monitor and I don't see any lines across
the screen and am only using the non interlaced mode.
But because of the hor. lines and poping that I do see and hear
when I am usinf 800x600x256 and 1024x768x256 modes and switch back
to anything of less. I would not buy another Sony at what ever price.
Oh ya this is I guess a 15" viewing area. It don't impress me one bit! Sam | 3 | trimmed_train |
2,301 |
There was a recession, and none of the potential entrants could raise any
money. The race organizers were actually supposed to be handling part of
the fundraising, but the less said about that the better. | 10 | trimmed_train |
3,392 | A fine 26 year history came to a close tonight, as the Minnesota North Stars,
or Norm's Stars (whichever you prefer) lost to the Red Wings by a score of
5-3. The Stars goals were scored by Mike McPhee and Ulf Dahlen, who netted
two including the final one in franchise history, with less than a minute to
play.
Tonight, on the air on the Stars TV telecast, announcer Al Shaver, the voice
of the North Stars, stated basically that he will not follow the team to
Dallas. Shaver, when asked by his son (who was doing the broadcast with him),
"What will you do now?" responded, "First I'm going to get me a new pair of
slippers. Then I'm going to sit in my easy chair and watch the world go by."
Thank you North Stars, and thank you Al Shaver, for 26 years of Minnesota
memories. | 17 | trimmed_train |
5,590 | Your "lite" posting for the day, from rec.humor.funny:
-- | 9 | trimmed_train |
10,304 |
code deleted...
From the XmTextField man page (during discussion of resources):
XmNverifyBell
Specifies whether a bell will sound when an action is reversed
during a verification callback.
You are setting doit to false in the callback, and Text[Field] is beeping
as it should. To turn off this behavior, set this boolean resource to false. | 16 | trimmed_train |
9,015 |
When he came near the place where the road goes down the Mount of Olives,
the whole crowd of disciples began joyfully to praise God in loud voices for
all the miracles they had seen:
Luke 19:37
| 0 | trimmed_train |
10,665 | Here is a different viewpoint.
In practice there is little difference in quality but more care is needed
with inkjet because smudges etc. can happen.
A cheap laser printer does not manage that sort of throughput and on top of
that how long does the _first_ sheet take to print? Inkjets are faster than
you say and in both cases the computer often has trouble keeping up with the
printer. (I have a 486/33 and a lot of drivers cannot keep up with the
printer)
A sage said to me: "Do you want one copy or lots of copies?", "One",
"Inkjet".
Paper cost is the same and both can use refills. Long term the laserprinter
will need some expensive replacement parts (consumables) and on top of that
are the amortisation costs which favour the lowest purchase cost printer.
HP inkjets understand PCL so in many cases a laserjet driver will work if the
software package has no inkjet driver.
There is one wild difference between the two printers: a laserprinter is a
page printer whilst an inkjet is a line printer. This means that a
laserprinter can rotate graphic images whilst an inkjet cannot. Few drivers
actually use this facility.
(there is also the matter of downloadable fonts and so on) | 11 | trimmed_train |
10,996 | I have MANY questions for all you experts out there pertaining to apple's
built-in video.
#1, Do all macs that have built-in video have the ability to use VGA monitors?
#2, If so/if not, which macs have this capability?
#3, Can they drive SVGA as well?
#4, how big of a vga monitor can they drive?
#5, how can you tell if an unlabeled monitor is VGA? By the pinouts?
if so, what should it look like?
Particularly, i'm interested in knowing if the si or ci drive VGA, as well
as the LC's capabilities in driving VGA/SVGA | 14 | trimmed_train |
8,039 |
Are you volunteering? :)
Will NASA have "available landing sites" in the Russian Republic, now that they
are Our Friends and Comrades?
| 10 | trimmed_train |
3,082 | : >If I remember correctly, the reason that BMW's come with those expensive,
: >and relatively worthless, short lived Varda batteries, is 'cause BMW owns
: >a controling interest in that battery Manufacturer.
: What's wrong with the BMW battery? I've never had problems and I know
: numerous people that are still using the original battery in there
: 8-10 year old beemers.
THe original battery in an 8-10 year old BMW may be fine. Mine lasted many
years. The replacement 30AH battery from BMW was a disaster. The mechanic
from Comp. Acc. told me that CA would warantee replace the bad one with a
new one of the same evil bad batteries and tell the customer if they have
problems to bring it back and they'd do it again. It seems that many of
those 30AH batteries were DOA, near-DOA, and always unlikely to be going
strong by the end of the warantee period on them. THere was a big batch of
bad ones, and they replaced them with -you guessed it - more bad ones. BMW
switched to a 25AH battery that has more cold cranking amps, even if it has
less total juice.
I switched to a YUASA that has even more cold cranking amps and cost one
third fewer dollars.
| 12 | trimmed_train |
3,128 |
I wish I hadn't sold my copy of Jewish Baseball Stars. It's a Short Shelf
(i.e., the one on top of the toilet tank) Special. The writing in that
books is so astonishingly awful -- every sportswriting cliche taken to
the nth degree and then mangled -- that it's funny.
Rusinow is the author, I think. | 2 | trimmed_train |
2,897 |
i've been using an identical setup, except for the tower config,
for several months now. from previous discussions on the net,
the first thing to check for is DMA conflicts with other devices,
especically if you've got any funky ones. next off, suspect
your tape - try a fresh one. good luck ! | 3 | trimmed_train |
8,983 | I received the following two notes from Martin Hellman with details
on how Clipper will work. They are posted with his permission. The
implications of some details are fascinating.
-------
Date: Sat, 17 Apr 93 23:05:23 PDT
From: "Martin Hellman" <[email protected]>
To: (a long list of recipients)
Subject: Clipper Chip
Most of you have seen the announcement in Friday's NY Times,
etc. about NIST (National Institute of Standards & Technology)
announcing the "Clipper Chip" crypto device. Several messges
on the net have asked for more technical details, and some have
been laboring under understandable misunderstandings given
the lack of details in the news articles. So here to help out
is your friendly NSA link: me. I was somewhat surprised Friday
to get a call from the Agency which supplied many of the missing
details. I was told the info was public, so here it is (the cc of this
to Dennis Branstad at NIST is mostly as a double check on my
facts since I assume he is aware of all this; please let me know
if I have anything wrong):
The Clipper Chip will have a secret crypto algorithm embedded in
Silicon. Each chip will have two secret, 80-bit keys. One will be the
same for all chips (ie a system-wide key) and the other will be unit
specific. I don't know what NIST and NSA will call them, but I will
call them the system key SK and unit key UK in this message.
The IC will be designed to be extremely difficult to reverse so
that the system key can be kept secret. (Aside: It is clear that
they also want to keep the algorithm secret and, in my opinion,
it may be as much for that as this stated purpose.) The unit key
will be generated as the XOR of two 80-bit random numbers K1
and K2 (UK=K1+K2) which will be kept by the two escrow
authorities. Who these escrow authorities will be is still to be
decided by the Attorney General, but it was stressed to me that
they will NOT be NSA or law enforcement agencies, that they
must be parties acceptable to the users of the system as unbiased.
When a law enforcement agency gets a court order, they will
present it to these two escrow authorities and receive K1 and
K2, thereby allowing access to the unit key UK.
In addition to the system key, each user will get to choose his
or her own key and change it as often as desired. Call this key
plain old K. When a message is to be sent it will first be
encrypted under K, then K will be encrypted under the unit key UK,
and the serial number of the unit added to produce a three part
message which will then be encrypted under the system key SK
producing
E{ E[M; K], E[K; UK], serial number; SK}
When a court order obtains K1 and K2, and thence K, the law
enforcement agency will use SK to decrypt all information
flowing on the suspected link [Aside: It is my guess that
they may do this constantly on all links, with or without a
court order, since it is almost impossible to tell which links
over which a message will flow.] This gives the agency access to
E[M; K], E[K; UK], serial number
in the above message. They then check the serial number
of the unit and see if it is on the "watch list" for which they
have a court order. If so, they will decrypt E[K; UK] to obtain K,
and then decrypt E[M; K] to obtain M.
I am still in the process of assessing this scheme, so please do
not take the above as any kind of endorsement of the proposed
scheme. All I am trying to do is help all of us assess the scheme
more knowledgably. But I will say that the need for just one court
order worries me. I would feel more comfortable (though not
necessarily comfortable!) if two separate court orders were
needed, one per escrow authority. While no explanation is
needed, the following story adds some color: In researching
some ideas that Silvio Micali and I have been kicking around,
I spoke with Gerald Gunther, the constitutional law expert
here at Stanford and he related the following story: When
Edward Levi became Pres. Ford's attorney general (right
after Watergate), he was visited by an FBI agent asking
for "the wiretap authorizations." When Levy asked for
the details so he could review the cases as required by
law, the agent told him that his predecessors just turned
over 40-50 blank, signed forms every time. Levi did not
comply and changed the system, but the lesson is clear:
No single person or authority should have the power to
authorize wiretaps (or worse yet, divulging of personal
keys). Sometimes he or she will be an Edward Levi
and sometimes a John Mitchell.
Martin Hellman
----
Date: Sun, 18 Apr 93 11:41:42 PDT
From: "Martin Hellman" <[email protected]>
To: [email protected]
Subject: Re: Clipper Chip
It is fine to post my previous message to sci.crypt
if you also post this message with it in which:
1. I ask recipients to be sparse in their requesting further info
from me or asking for comments on specific questions. By
this posting I apologize for any messages I am unable to
respond to. (I already spend too much time answering too much
e-mail and am particularly overloaded this week with other
responsibilities.) | 7 | trimmed_train |
712 |
Nothing but errors and omissions here!
| 7 | trimmed_train |
2,593 |
[stuff deleted]
Ah, clarification by obfuscation.
Actually, the words "A well regulated Milita, being necessary to the
security of a free state" is a present participle, used as an
adjective to modify 'militia', which is followed by the main clause of
the sentence, the subject being 'the right', the verb 'shall'. It
asserts that the right to keep and bear arms is essential for
maintaining a milita. The sentence doesn't restrict the right, or
state or imply possession of the right by anyone or anything other
than the people. All it does is make a positive statement regarding a
right of the people. The PEOPLE, as in you and me, as in the First,
Fourth, Ninth, Tenth, as well as the Second amendment.
The existence of this right is assumed - it is not granted by the
amendment. There is no stated or implied condition relating the right
to bear arms to the necessity of a well-regulated militia to the security of
a free state.
In other words, the entire sentence says that the right to keep and
bear arms is UNCONDITIONAL.
The final word on liberties and rights should not belong "to the
many". That is why we have a Constitution. Otherwise, a tyrrany of
the majority can ensue from "popular" opinion, a concept which you
should be familiar with from the Federalist papers. | 9 | trimmed_train |
10,040 | The primary problem in human nature is a "fragmentation of being."
Humans are in a state of tension, a tension of opposites. Good and
evil are the most thought provoking polarities that come to mind.
The Bible provides us with many examples of the fragmentation of
being. The warring opposites within us are a product of man's
rebellion against God, which is described so vividly in the pages of
the Scriptures.
Man was created with the order to become a god. Those were the words
of St. Basil in the fourth century. What he was trying to say was
that God created man to be a partaker of the divine nature. In the
Eastern Orthodox Church, this is called "theosis," or "deification."
One can also say that man was created to be whole, i.e. spirit, soul,
and body operating in unison. The story of Adam and Eve is a picture
of the archetypal humans before obtaining moral consciousness. Theirs
was a harmonious relationship with each other, the world, and the
Creator. That innocent harmony was shattered when they disobeyed God,
their natural wholeness falling apart into two seemingly
irreconcilable halves. Immediately, guilt and fear was manifested in
their lives. They become bound to hardship, toil, and suffering. This
is symbolized in their exile from the paradisiac state.
The beast in the jungle does not possess moral consciousness. If it
were to receive this self-awareness, the knowledge of good and evil,
its paradisiac state would also be destroyed.
Was it the intention of the Creator to leave man in this state of
innocence all the days of his existence on earth? Or was the gaining
of self-awareness carefully staged by God, who did not desire that His
masterpiece, mankind, be a blissful idiot?
God must have known that, for mankind to achieve any kind of moral
value, he must pass through a confrontation with the opposites. There
is no other way to achieve union with God.
Jesus Christ is the answer to the problem of the warring polarities.
He was the perfectly integrated individual, reconciling the opposites,
and making it possible for us to be integrated, i.e. to become God,
not in His essence, but in His energies.
The opposites is THE Christian problem. The Apostle Paul describes it
with the utmost precision in Romans 7:15-24. And he follows with the
answer to his dilemma in vs 25. | 15 | trimmed_train |
8,927 |
The audio will simply select the CD audio when the microphone is removed.
I don't believe the button un-dims, since there's nothing to select. I
haven't tracked down a Centris to check this on though.
Yup, I made the same mistake several months ago when this issue came up
before :-)
noah | 14 | trimmed_train |
7,254 |
I don't think we need to argue about this.
Yes, but also many people who are not trying to make government recognize
Christianity as the dominant religion in this country do no think
the motto infringes upon the rights of others who do not share their
beliefs.
And actually, I think that the government already does recognize that
Christianity is the dominant religion in this country. I mean, it is.
Don't you realize/recognize this?
This isn't to say that we are supposed to believe the teachings of
Christianity, just that most people do.
If you agree with me, then what are we discussing?
No, but I hear quite a bit about Christmas, and little if anything about
Jesus. Wouldn't this figure be more prominent if the holiday were really
associated to a high degree with him? Or are you saying that the
association with Jesus is on a personal level, and that everyone thinks
about it but just never talks about it?
That is, can *you* prove that most people *do* associate Christmas
most importantly with Jesus?
I think the numbers *do* matter. It takes a majority, or at least a
majority of those in power, to discriminate. Doesn't it? | 8 | trimmed_train |
6,688 | While rummaging through a box of old PC (5150) parts, I found a half-size
board that looks like a comm port board. It was made by Forte Data Systems and
has a copyright date of 1986 on it. The board provides a male 24-pin connector
and has 3 jumpers of 3 pins each, two labelled A B C. I plugged it into my PC
and ran Advanced diagnostics several times, changing the jumper positions each
time, but the system did not recognise a comm port.
Does anyone have a clue as to what this board might be or how to configure it?
I could use another comm port if it's free. | 3 | trimmed_train |
7,111 | Sounds like the picture tube lost vacuum. This would cause the filament
to ignite and could actually turn the tube from a vacuum to a pressure
vessel, followed by an explosion when the neck assembly (mostly likely
cracked to begin with) blows off. During the whole sequence of events,
the other circuits may continue functioning, which accounts for not
losing sound.
| 11 | trimmed_train |
10,112 | I am looking for some bar code fonts especially code 3 of 9. Did anybody
know any ftp sites or BBS that I can download these types of fonts?
Please email to me if you have any info. Thanks!
| 18 | trimmed_train |
4,477 | I was just wondering if there were any law officers that read this. I have
several questions I would like to ask pertaining to motorcycles and cops.
And please don't say get a vehicle code, go to your local station, or obvious
things like that. My questions would not be found in those places nor
answered face to face with a real, live in the flesh, cop.
If your brother had a friend who had a cousin whos father was a cop, etc.
don't bother writing in. Thanks.
| 12 | trimmed_train |
10,150 | I am looking for a good used window air conditioner. A small
one is preffered. Call 495-2056 (Peter) and we'll talk about it.
Or email me. "[email protected]"
| 5 | trimmed_train |
2,954 | The stragegy of the government is interesting. The real fear comes from
them doing more than this.
This is a voluntary program, and thus harder for us to object to on
the surface.
Their strategy is a business one rather than legal one. They are
pushing to get a standard in place, a secret standard, and if they
get it as a standard then they will drive competitors out of the market.
It will be legal to sell better, untapable encryption that doesn't have
registered keys, but it will be difficult, and thus not a plan for
most phone companies.
You see, with clipper chip phones you'll be able to talk to any
cellular company, or other phones or ports because they will follow
the standard. AT&T has already announced a clipper chip encryption
product. The government has marketed hard to get major vendors to
use these chips. If they get enough market share, they will rule.
And thus there will be very little market for systems that can't be
tapped by the police. The public isn't that concerned about it now,
after all. They freely do calls that anybody with an old TV can listen
to today! They won't pay big extra bucks for proprietary phones that secure
them only from the police.
Well, some people will buy these phones, but they will only work with
other proprietary phones, so the market will be small and the phones
expensive. Unless they are made in numbers large enough to sell them
cheap, only the Mob will buy them.
And this means that the FBI will want to track the customer lists of
better encryption phones, because "the only reason a person would want
one is to evade the police."
Interesting. | 7 | trimmed_train |
9,413 | Hello, I am looking for commercial software packages for professional
fashion designers. Any recommendation and pointers are greatly appreciated.
Please e-mail me, if you may. Thanks a million. -- Ge
| 1 | trimmed_train |
96 | Here is a press release from the Reserve Officers Association.
Reserve Officers Say Demographics Ignored in Nominations to
Close Naval, Marine Reserve Centers
To: National Desk, Defense Writer
Contact: Herbert M. Hart of the Reserve Officers Association of
the United States, 202-479-2258
WASHINGTON, April 13 /U.S. Newswire/ -- The Reserve Officers
Association of the United States has alerted the Defense Base
Realignment and Closure Commission that the services failed to give
sufficient weight to demographics in recommendations made to close
56 Naval and Marine Corps Reserve centers.
In letters to the closure commission and to all 86 members of
Congress with affected locations in their constituencies, including
Sen. Sam Nunn (D-Ga.), chairman of the Senate Armed Services
Committee, ROA charged that the developers of the Navy-Marine list
ignored demographics of the civilian population, particularly prior
service personnel.
ROA's executive director, Maj. Gen. Evan L. Hultman, AUS (Ret.),
suggested "concern that the only plausible alternative is that they
are intentionally attempting to foreclose the Naval Reserve
components from maintaining even today's relatively low level of
participation in their parent service's Total Force of the future."
He asked the commission "to remove from consideration all
locations without sufficient and convincing demographic data to
warrant approval of the requested action."
"Only a few of the 56 Naval and Marine Corps Reserve
installations on this list are large enough to have a significant
impact on the community, if closed," wrote Hultman. "The major
issue is the cumulative impact of moving or closing such a large
percentage of the existing locations."
Hultman reminded the commission, "The fact that the vast
majority of the Reserve installations on this list do not come
close to meeting the minimal requirements for consideration in this
process certainly supports the thesis" that these actions are
simply an attempt to foreclose a substantial role for the Navy and
Marine Corps Reserve.
ROA also noted "that at the end of the 1960s, when the number of
Naval Reservists was approximately the same as today, there were 480
Naval Reserve facilities. If the Navy recommendations are
approved, there will be less than 200 Naval Reserve facilities."
Facilities on the list include seven Naval Air Stations ranging
from South Weymouth, Mass., to Alameda, Calif., 28 Naval
Reserve Centers in Macon, Ga., and Parkersburg, W.Va., to
Missoula and Great Falls. Mont. Naval/Marine Corps Reserve
Centers include four in San Francisco, Fort Wayne, Ind.,
Billings, Mont., and Abilene, Texas.
A major Marine Reserve Center on the list is that at El
Toro, Calif., plus six others.
-30- | 13 | trimmed_train |
3,489 | Hello. I hope somebody out here can help me. I am currently working
on a project where I am trying to communicate from an IBM 386 with
Phoenix BIOS, using C++, to a board that I made with an Intel 8085 CPU
with UART chip. The board works fine with the TRANSMIT command and
Terminal Emulation mode of Kermit, but there seems to be something wrong
with the initialization or protocol used when I try C++. I need to
access the unit I built using C, because I have a sizable chunk of C
code that I will be using to perform calculations and operations that
will be very difficult to code in assembly language for the 8085.
I have included the assembly code that I am running and the C++ code
that I am trying to use. If anyone can show me something that I
am doing blatantly incorrectly or that I am missing because of my lack
of knowledge about RS-232 serial communications, please e-mail me.
I wrote the assembly language to wait for a character to be received and
then to check it against the 0x20 character, if a 0x20 is received,
the LEDs will indicate this. Two C++ programs that I have written do
nothing, but set up COM port 2 and send the 0x20 character. One uses
the bioscom() function in bios.h the other uses the software interrupt
int86() function in dos.h. I have triple checked the baud rate ( 2400 )
the parity ( none ) the stop bits ( 1 ) the character length ( 8 bits )
and the interrupt calls for ( 0x14 ). Currently, I am at a loss as
to what may be wrong. Any hardware gurus out there want to comment?
Thanks alot,
Hubert De Jesus
[email protected]
INTEL ASM
COMMAND EQU 3000H ;Command Register on 8155
PORTA EQU 3001H ;Port A on 8155
TIMERLO EQU 3004H ;High 8 bits of 8155 Timer
TIMERHI EQU 3005H ;Low 8 bits of 8155 Timer
UARTDATA EQU E000H ;UART Data Register
UARTCMD EQU E001H ;UART Command Register
ORG 4000H ;SRAM location
MVI A,08H ;Set Low Timer Bits
STA TIMERLO
MVI A,40H ;Set High Timer Bits
STA TIMERHI
MVI A,11111101B ;Start Timer & Enable Port A
STA COMMAND
MVI A,11H ;Display 11 on 7-segment LEDs
STA PORTA
MVI A,00H ;Clear UART Command
STA UARTCMD
STA UARTCMD
STA UARTCMD
MVI A,01000000B ;Internally reset UART
STA UARTCMD
LDA UARTDATA ;Remove extraneous data
MVI A,01001111B ;Init UART for 8 data bits,
STA UARTCMD ; no parity, 1 stop bit, 64x async
MVI A,00100111B ;Enable Transmit and Receive
STA UARTCMD
INIT: LDA UARTCMD ;Read Status Register
ANI 02H ;Is RxRDY?
JZ INIT ;No, loop
LDA UARTDATA ;Read Data Character
CPI ' ' ;Is Character = 0x20?
JNZ INIT ;No, loop
MVI A,22H ;Character received,
STA PORTA ; Display 22 on 7-segment LEDs
HLT
END
C++ using BIOSCOM()
#include <stdio.h>
#include <stdlib.h>
#include <bios.h>
#define INIT 0
#define SEND 1
#define RECEIVE 2
#define STATUS 3
#define COM2 1
void
main()
{
char abyte;
abyte = 0xa3;
bioscom( INIT, abyte, COM2 );
printf( "Initialized COMM PORT 2\n" );
while( !( bioscom( STATUS, 0, COM2 ) & 0x4000 ) )
;
abyte = ' ';
bioscom( SEND, abyte, COM2 );
printf( "Sent start character\n" );
}
C++ using INT86()
#include <stdio.h>
#include <stdlib.h>
#include <dos.h>
#include <bios.h>
main()
{
union REGS registers;
registers.h.ah = 0x00;
registers.h.al = 0xa7;
registers.x.dx = 0x01;
int86( 0x14, ®isters, ®isters );
printf( "COM2 Initialized\n" ); | 3 | trimmed_train |
5,276 |
Someone else said something similar. I will not comment on the
value or lack of value of Elias's "proposal". I just want to say
that it is very distressing that at least two people here are
profoundly ignorant of Nazi racial doctrine. They were NOT
like Elias's idea, they were more like the opposite.
Nazis believed in racial purity, not racial assimilation. An
instructive example is the Nazi attitude to Gypsies. According to
Nazi theoreticians, Gypsies were an Aryan race. They were persecuted,
and in huge numbers murdered, because most European Gypies were
considered not pure Gypsies but "mongrels" formed from the pure Gypsy
race and other undesirable races. This was the key difference between
the theoretical approach to Jews and Gypsies, by the way. It is also
true that towards the end of WWII even the "purist" Gypsies were
hunted down as the theory was forgotten. | 6 | trimmed_train |
28 |
Yes.
(I am adamantly an environmentalist. I will not use styrofoam table service.
Please keep that in mind as you read this post - I do not wish to attack
environmentalism)
A half truth is at least as dangerous as a complete lie. A complete lie will
rarely be readily accepted, while a half truth (the lie subtly hidden) is more
powerfully offered by one who masquerades as an angel of light.
Satan has (for some people) loosened the grip on treating the earth as something
other than God's intricate handiwork, something other than that on which the
health of future generations is based. It is being treated with respect. You
think he's going to happily leave it at that? No. When one error is rejected,
it is his style to push people to the opposite error. Therefore the earth is
not God's intricate handiwork, not because it is rubbish, but because it is
God. Mother earth is the one you are to primarily love and serve.
I see two facets of a response to it:
1: Care for the environment. Treat it with proper respect, both because it is
God's intricate handiwork and the health of future generation, and because
showing the facet of one who is disregardful of such things does not
constitute what the Apostle Paul called "becoming all things to all men so
that by all possible means I might save some."
Don't say "Forget the environment, I've got important things to spend my time
on." - putting your foot in your mouth in this manner will destroy your
credibility in expressing the things that _are_ more important.
2: Show that it is not the ultimate entity, that it is creature and not
creator. Show that its beauty and glory points to a greater beauty and
glory. Show that it is not the ultimate tapestry, but one of many cords
woven in the infinite tapestry. | 0 | trimmed_train |
8,502 |
I have just a couple of questions about this technique.
First, what firing order should I use? Do I start with my pointer
finger or my pinky? Left hand or right?
And secondly, I have a 12cyl and there are two cylinders unaccounted
for. Any suggestions? | 4 | trimmed_train |
9,438 |
Which, as it turns out, is just about everybody that's serious about
horses. What a bunch of weenie fashion nerds. And the helmets suck. I'm wearing
my Shoei mountain bike helmet - fuck em.>>>
Nah, I can still walk unaided.
--
Go fast. Take chances. | 12 | trimmed_train |
8,174 | The subject says it all. My 1984 Chev S10 Pickup's left turn signal does
not stop after turning. What cause this to stop automaticaly?. Is this
a mechanical problem by the steering wheel?. | 4 | trimmed_train |
8,790 | Well, the title says it all...I'm looking to buy cheap used
TG-16 Gmaes which have 2 or more player support (Simultaneous)....
Please email me all offers with a price... | 5 | trimmed_train |
5,714 | In Article <[email protected]>,
60ns 72 pin simms.
2 configs: 4mb & 8mb. In each case the memory is soldered on the board
leaving the 4 simm sockets open. 132mb is the total addressable memory for a
650.
| 14 | trimmed_train |
2,471 | My dad has always blamed the Phillies collapse in '64 on me... On Sept 21, 1964, the Phillies had something like a 9 game lead with 12 to play. I was born on Sept 21, 1964. The Phils proceeded to lose something like 10 straight while the Cards won 10 straight (does anyone know hte exact numbers?), and a pennant was blown. To this day my dad likes to remind me that it all began when I was born! | 2 | trimmed_train |
2,912 | NASA Headquarters distributed the following press
release today (4/6). I've typed it in verbatim, for you
folks to chew over. Many of the topics recently
discussed on sci.space are covered in this.
Gibbons Outlines Space Station Redesign Guidance
Dr. John H. Gibbons, Director, Office of Science and
Technology Policy, outlined to the members-designate of
the Advisory Committee on the Redesign of the Space
Station on April 3, three budget options as guidance to
the committee in their deliberations on the redesign of
the space station.
A low option of $5 billion, a mid-range option of $7
billion and a high option of $9 billion will be
considered by the committee. Each option would cover
the total expenditures for space station from fiscal
year 1994 through 1998 and would include funds for
development, operations, utilization, Shuttle
integration, facilities, research operations support,
transition cost and also must include adequate program
reserves to insure program implementation within the
available funds.
Over the next 5 years, $4 billion is reserved within
the NASA budget for the President's new technology
investment. As a result, station options above $7
billion must be accompanied by offsetting reductions in
the rest of the NASA budget. For example, a space
station option of $9 billion would require $2 billion
in offsets from the NASA budget over the next 5 years.
Gibbons presented the information at an organizational
session of the advisory committee. Generally, the
members-designate focused upon administrative topics
and used the session to get acquainted. They also
received a legal and ethics briefing and an orientation
on the process the Station Redesign Team is following
to develop options for the advisory committee to
consider.
Gibbons also announced that the United States and its
international partners -- the Europeans, Japanese, and
Canadians -- have decided, after consultation, to give
"full consideration" to use of Russian assets in the
course of the space station redesign process.
To that end, the Russians will be asked to participate
in the redesign effort on an as-needed consulting
basis, so that the redesign team can make use of their
expertise in assessing the capabilities of MIR and the
possible use of MIR and other Russian capabilities and
systems. The U.S. and international partners hope to
benefit from the expertise of the Russian participants
in assessing Russian systems and technology. The
overall goal of the redesign effort is to develop
options for reducing station costs while preserving key
research and exploration capabilities. Careful
integration of Russian assets could be a key factor in
achieving that goal.
Gibbons reiterated that, "President Clinton is
committed to the redesigned space station and to making
every effort to preserve the science, the technology
and the jobs that the space station program represents.
However, he also is committed to a space station that
is well managed and one that does not consume the
national resources which should be used to invest in
the future of this industry and this nation." | 10 | trimmed_train |
607 | It might be nice to:
1. cut out the ad hominem attacks on Prof. Denning, Mr. Sternlight,
etc. If you have something objective to say about their views, go
ahead and say it (subject to point 2.). Personal attacks reflect more
on the attacker more than on the attackee. Throw light, not heat!
2. restrict the discussion to appropriate newsgroups. I submit that
comp.org.acm and comp.org.ieee are not appropriate for this
discussion. You have now made subscribers to these newsgroups aware of
the issue. If they want to know more or participate in the discussion,
they can easily join sci.crypt, comp.security.misc, alt.security, or
comp.org.eff.talk.
-- | 7 | trimmed_train |
1,284 |
I was trying to avoid a discussion of the whether Clintons views
should be endorsed or not. All I was trying to find out was
whether the newspaper article was correct in making these
statements about the President by obtaining some information
about when and where he made these statements.
Thank you. | 6 | trimmed_train |
2,134 |
They light the highways in Texas? Funny, everywhere else I've been
they only light 'em at junctions.
I won't even get into how much road markings vary between states and
localities except to say that there are some areas where markings are
essentially nonexistant.
I suspect you have very limited experience -- US freeways vary
dramatically, particularly between states. I can name a number of
interstate highways in various parts of the country where 130 would be
very optimistic in any car.
I'm not sure what you call "quite severe" in terms of road deviations
but I suspect every single bridge junction on I84 through CT would be
considered so. They're hard to take at 85mph. That's not the only
interstate I've seen with such deviations, but it's one I drive
frequently.
Texas is pretty much an edge-case -- you can't assume that everywhere
has roads in such good condition, such flat terrain, and such
wide-open spaces. It just ain't so. | 4 | trimmed_train |
7,041 | Fascinating. Most of the content of the White House announcements was
in what was *not* said. It gives us almost nothing of value, threatens to
take away a lot, and does it with a sincere smile on its face,
and the nice friendly word "Management".
FACT SHEET
PUBLIC ENCRYPTION MANAGEMENT
The first thing it doesn't say is "We're giving you stronger encryption".
what it says is
the U. S. Government has developed a microcircuit that not only
provides privacy through encryption that is substantially more robust
than the current government standard, but also permits escrowing of
the keys needed to unlock the encryption. The system for the
escrowing of keys will allow the government to gain access to
encrypted information only with appropriate legal authorization.
But DES is strong enough that only the government can break it now,
so the major effect is to make it EASIER for government to break!
*At best* it makes it more difficult for the NSA to break, since they
need to get one of the two escrowed keys to do a brute-force search
for the other 40-bit key.
Similarly, it didn't say "We're making encryption is commercially available."
because encryption *is* already commercially available, including
forms the NSA may not be able to break, like triple-DES or IDEA.
And phone companies could offer DES-based systems *now* if they were
convinced the government would let them and they could make enough money.
The next thing it didn't say is "We're making encryption legal",
because of course encryption *has always been* legal, and the
President can't change the First Amendment merely by decree.
What it *did* say was:
In making this decision, I do not intend to prevent the
private sector from developing, or the government from approving,
other microcircuits or algorithms that are equally effective in
assuring both privacy and a secure key- escrow system.
which clearly means "We're making encryption illegal unless we get your keys.
Soon. Once business buys into this."
Another thing it didn't say is "We're going to ask Congress for money
to do *lots* more wiretapping", because of course, there's a budget crisis,
and Congress might debate the policy issues or not give them the cash.
What it *did* say was:
The Attorney General will procure and utilize encryption devices to
the extent needed to preserve the government's ability to conduct
lawful electronic surveillance and to fulfill the need for secure
law enforcement communications. Further, the Attorney General
shall utilize funds from the Department of Justice Asset Forfeiture
Super Surplus Fund to effect this purchase.
which means "We've got money Congress can't control and we're going to
buy lots of wiretapping equipment with it to detect NON-APPROVED CRYPTO
(that's what "preserve the government's ability to conduct ... surveillance"
means.) | 7 | trimmed_train |
708 | --
Hi netland,
I thought that I once read about the existance of a virtual mwm like vtwm.
On the usual ftp sites (gatakeeper.dec.com, export.lcs.mit.edu) I can't find
any trace of this program. Could anybody give me a hint where to find this
program or confirm/deny the existance of this program.
Regards, | 16 | trimmed_train |
6,660 |
PPPPP OOOOO V V Persistance Of Vision Raytracer.
P P O O V V
P P O O V V
PPPPP O O V V
P O O V V
P O O V V
P OOOOO V
Available on archie and wuarchive in graphics type directories.
PS It's freeware.
-- | 1 | trimmed_train |
5,864 |
So true. I'm not sure of the basis of the belief, but it was a widely
held belief among the laity of the RC church and their support of it
lead to it being declared to be true. Basically the teaching on infallibility
holds that the pope is infallible in matters of faith and doctrine, the
college of bishops is likewise infallible, and the laity is as well.
The pope gets most of the attention/criticism but the consensus of the
other bodies is equally infallible (according to RC teaching). | 0 | trimmed_train |
3,930 |
Greg's obviously confused. There aren't many (any) gentlemen on this
newsgroup. Well, maybe. One or two.
| 12 | trimmed_train |
919 | Accounts of Anti-Armenian Human Right Violatins in Azerbaijan #009
Prelude to Current Events in Nagorno-Karabakh
+-----------------------------------------------------------------+
| |
| There were about six burned people in there, and the small |
| corpse of a burned child. It was gruesome. I suffered a |
| tremendous shock. There were about ten people there, but the |
| doctor on duty said that because of the numbers they were being |
| taken to Baku. There was a woman's corpse there too, she had |
| been . . . well, there was part of a body there . . . a |
| hacked-off part of a woman's body. It was something terrible. |
| |
+-----------------------------------------------------------------+
DEPOSITION OF ROMAN ALEKSANDROVICH GAMBARIAN
Born 1954
Senior Engineer
Sumgait Automotive Transport Production Association
Resident at Building 17/33B, Apartment 40
Microdistrict No. 3
Sumgait [Azerbaijan]
What happened in Sumgait was a great tragedy, an awful tragedy for us, the
Armenian people, and for all of mankind. A genocide of Armenians took place
during peacetime.
And it was a great tragedy for me personally, because I lost my father in
those days. He was still young. Born in 1926.
On that day, February 28, we were at home. Of course we had heard that there
was unrest in town, my younger brother Aleksandr had told us about it. But we
didn't think . . . we thought that everything would happen outdoors, that they
wouldn't go into people's apartments. About five o'clock we saw a large crowd
near the Kosmos movie theater in our microdistrict. We were sitting at home
watching television. We go out on the balcony and see the crowd pour into Mir
Street. This is right near downtown, next to the airline ticket office, our
house is right nearby. That day there was a group of policeman with shields
there. They threw rocks at those policemen. Then they moved off in the
direction of our building. They burned a motorcycle in our courtyard and
started shouting for Armenians to come out of the building. We switched off
the light. As it turns out, their signal was just the opposite: to turn on the
light. That meant that it was an Azerbaijani home. We, of course, didn't know
and thought that if they saw lights on they would come to our apartment.
Suddenly there's pounding on the door. We go to the door, all four of us:
there were four of us in the apartment. Father, Mother, my younger brother
Aleksandr, and I. He was born in 1959. My father was a veteran of World War
II and had fought in China and in the Soviet Far East; he was a pilot.
We went to the door and they started pounding on it harder, breaking it down
with axes. We start to talk to them in Azerbaijani, "What's going on? What's
happened?" They say, "Armenians, get out of here!" We don't open the door, we
say, "If we have to leave, we'll leave, we'll leave tomorrow." They say, "No,
leave now, get out of here, Armenian dogs, get out of here!" By now they've
broken the door both on the lock and the hinge sides. We hold them off as best
we can, my father and I on one side, and my mother and brother on the other.
We had prepared ourselves: we had several hammers and an axe in the apartment,
and grabbed what we could find to defend ourselves. They broke in the door and
when the door gave way, we held it for another half-hour. No neighbors, no
police and no one from the city government came to our aid the whole time. We
held the door. They started to smash the door on the lock side, first with an
axe, and then with a crowbar.
When the door gave way--they tore it off its hinges--Sasha hit one of them
with the axe. The axe flew out of his hands. They also had axes, crowbars,
pipes, and special rods made from armature shafts. One of them hit my father
in the head. The pressure from the mob was immense. When we retreated into the
room, one of them hit my mother, too, in the left part of her face. My brother
Sasha and I fought back, of course. Sasha is quite strong and hot-tempered, he
was the judo champion of Sumgait. We had hammers in our hands, and we injured
several of the bandits--in the heads and in the eyes, all that went on. But
they, the injured ones, fell back, and others came to take their places, there
were many of them.
The door fell down at an angle. The mob tried to remove the door, so as to go
into the second room and to continue . . . to finish us off. Father brought
skewers and gave them to Sasha and me--we flew at them when we saw Father
bleeding: his face was covered with blood, he had been wounded in the head,
and his whole face was bloody. We just threw ourselves on them when we saw
that. We threw ourselves at the mob and drove back the ones in the hall, drove
them down to the third floor. We came out on the landing, but a group of the
bandits remained in one of the rooms they were smashing all the furniture in
there, having closed the door behind them. We started tearing the door off to
chase away the remaining ones or finish them. Then a man, an imposing man of
about 40, an Azerbaijani, came in. When he was coming in, Father fell down and
Mother flew to him, and started to cry out. I jumped out onto the balcony and
started calling an ambulance, but then the mob started throwing stones through
the windows of our veranda and kitchen. We live on the fourth floor. And no
one came. I went into the room. It seemed to me that this man was the leader
of the group. He was respectably dressed in a hat and a trench coat with a
fur collar. And he addressed my mother in Azerbaijani: "What's with you,
woman, why are you shouting? What happened? Why are you shouting like that?"
She says, "What do you mean, what happened? You killed somebody!" My father
was a musician, he played the clarinet, he played at many weddings, Armenian
and Azerbaijani, he played for many years. Everyone knew him. Mother says,
"The person who you killed played at thousands of Azerbaijani weddings, he
brought so much joy to people, and you killed that person." He says, "You
don't need to shout, stop shouting." And when they heard the voice of this
man, the 15 to 18 people who were in the other room opened the door and
started running out. We chased after them, but they ran away. That man left,
too. As we were later told, downstairs one of them told the others, I don't
know if it was from fright or what, told them that we had firearms, even
though we only fought with hammers and an axe. We raced to Father and started
to massage his heart, but it was already too late. We asked the neighbors to
call an ambulance. The ambulance never came, although we waited for it all
evening and all through the night.
Somewhere around midnight about 15 policemen came. They informed us they were
from Khachmas. They said, "We heard that a group was here at your place, you
have our condolences." They told us not to touch anything and left. Father lay
in the room.
So we stayed home. Each of us took a hammer and a knife. We sat at home. Well,
we say, if they descend on us again we'll defend ourselves. Somewhere around
one o'clock in the morning two people came from the Sumgait Procuracy,
investigators. They say, "Leave everything just how it is, we're coming back
here soon and will bring an expert who will record and photograph everything."
Then people came from the Republic Procuracy too, but no one helped us take
Father away. The morning came and the neighbors arrived. We wanted to take
Father away somehow. We called the Procuracy and the police a couple of times,
but no one came. We called an ambulance, and nobody came. Then one of the
neighbors said that the bandits were coming to our place again and we should
hide. We secured the door somehow or other. We left Father in the room and
went up to the neighbor's.
The excesses began again in the morning. The bandits came in several vehicles,
ZIL panel trucks, and threw themselves out of the vehicles like . . . a
landing force near the center of town. Our building was located right there. A
crowd formed. Then they started fighting with the soldiers. Then, in Buildings
19 and 20, that's next to the airline ticket office, they started breaking
into Armenian apartments, destroying property, and stealing. The Armenians
weren't at home, they had managed to flee and hide somewhere. And again they
poured in the direction of our building. They were shouting that there were
some Armenians left on the fourth floor, meaning us. "They're up there, still,
up there. Let's go kill them!" They broke up all the furniture remaining in
the two rooms, threw it outside, and burned it in large fires. We were hiding
one floor up. Something heavy fell. Sasha threw himself toward the door
shouting that it was probably Father, they had thrown Father, were defiling
the corpse, probably throwing it in the fire, going to burn it. I heard it,
and the sound was kind of hollow, and I said, "No, that's from some of the
furniture." Mother and I pounced on Sasha and stopped him somehow, and calmed
him down.
The mob left somewhere around eight o'clock. They smashed open the door and
went into the apartment of the neighbors across from us. They were also
Armenians, they had left for another city.
The father of the neighbor who was concealing us came and said, "Are you
crazy? Why are you hiding Armenians? Don't you now they're checking all the
apartments? They could kill you and them!" And to us :" . . . Come on, leave
this apartment!" We went down to the third floor, to some other neighbors'. At
first the man didn't want to let us in, but then one of his sons asked him and
he relented. We stayed there until eleven o'clock at night. We heard the sound
of motors. The neighbors said that it was armored personnel carriers. We went
downstairs. There was a light on in the room where we left Father. In the
other rooms, as we found out later, all the chandeliers had been torn down.
They left only one bulb. The bulb was burning, which probably was a signal
they had agreed on because there was a light burning in every apartment in our
Microdistrict 3 where there had been a pogrom.
With the help of the soldiers we made it to the City Party Committee and were
saved. Our salvation--my mother's, my brother's, and mine,--was purely
accidental, because, as we later found out from the neighbors, someone in the
crowd shouted that we had firearms up there. Well, we fought, but we were only
able to save Mother. We couldn't save Father. We inflicted many injuries on
the bandits, some of them serious. But others came to take their places. We
were also wounded, there was blood, and we were scratched all over--we got our
share. It was a miracle we survived. We were saved by a miracle and the
troops. And if troops hadn't come to Sumgait, the slaughter would have been
even greater: probably all the Armenians would have been victims of the
genocide.
Through an acquaintance at the City Party Committee I was able to contact the
leadership of the military unit that was brought into the city, and at their
orders we were assigned special people to accompany us, experts. We went to '
pick up Father's corpse. We took it to the morgue. This was about two o'clock
in the morning, it was already March 1, it was raining very hard and it was
quite cold, and we were wearing only our suits. When my brother and I carried
Father into the morgue we saw the burned and disfigured corpses. There were
about six burned people in there, and the small corpse of a burned child. It
was gruesome. I suffered a tremendous shock. There were about ten people
there, but the doctor on duty said that because of the numbers they were being
taken to Baku. There was a woman's corpse there too, she had been . . . well,
there was part of a body there . . . a hacked-off part of a woman's body. It
was something terrible. The morgue was guarded by the landing force . . . The
child that had been killed was only ten or twelve years old. It was impossible
to tell if it was a boy or a girl because the corpse was burned. There was a
man there, too, several men. You couldn't tell anything because their faces
were disfigured, they were in such awful condition...
Now two and a half months have passed. Every day I recall with horror what
happened in the city of Sumgait. Every day: my father, and the death of my
father, and how we fought, and the people's sorrow, and especially the morgue.
I still want to say that 70 years have passed since Soviet power was
established, and up to the very last minute we could not conceive of what
happened in Sumgait. It will go down in history.
I'm particularly surprised that the mob wasn't even afraid of the troops. They
even fought the soldiers. Many soldiers were wounded. The mob threw fuel
mixtures onto the armored personnel carriers, setting them on fire. They
weren't afraid. They were so sure of their impunity that they attacked our
troops. I saw the clashes on February 29 near the airline ticket office, right
across from our building. And that mob was fighting with the soldiers. The
inhabitants of some of the buildings, also Azerbaijanis, threw rocks at the
soldiers from windows, balconies, even cinder blocks and glass tanks. They
weren't afraid of them. I say they were sure of their impunity. When we were
at the neighbors' and when they were robbing homes near the airline ticket
office I called the police at number 3-20-02 and said that they were robbing
Armenian apartments and burning homes. And they told me that they knew that
they were being burned. During those days no one from the police department
came to anyone's aid. No one came to help us, either, to our home, even though
perhaps they could have come and saved us.
As we later found out the mob was given free vodka and drugs, near the bus
station. Rocks were distributed in all parts of town to be thrown and used in
fighting. So I think all of it was arranged in advance. They even knew in
which buildings and apartments the Armenians lived, on which floors--they had
lists, the bandits. You can tell that the "operation" was planned in advance.
Thanks, of course, to our troops, to the country's leadership, and to the
leadership of the Ministry of Defense for helping us, thanks to the Russian
people, because the majority of the troops were Russians, and the troops
suffered losses, too. I want to express this gratitude in the name of my
family and in the name of all Armenians, and in the name of all Sumgait
Armenians. For coming in time and averting terrible things: worse would
have happened if that mob had not been stopped on time.
At present an investigation is being conducted on the part of the USSR
Procuracy. I want to say that those bandits should receive the severest
possible punishment, because if they don't, the tragedy, the genocide, could
happen again. Everyone should see that the most severe punishment is meted
out for such deeds.
Very many bandits and hardened hooligans took part in the unrest, in the mass
disturbances. The mobs were huge. At present not all of them have been caught,
very few of them have been, I think, judging by the newspaper reports. There
were around 80 people near our building alone, that's how many people took
part in the pogrom of our building all in all.
They should all receive the most severe punishment so that others see that
retribution awaits those who perform such acts.
May 18, 1988
Yerevan
- - - reference - - -
[1] _The Sumgait Tragedy; Pogroms against Armenians in Soviet Azerbaijan,
Volume I, Eyewitness Accounts_, edited by Samuel Shahmuradian, forward by
Yelena Bonner, 1990, published by Aristide D. Caratzas, NY, pages 153-157
| 6 | trimmed_train |
1,170 |
No chance. If that CS ignited at all, it would have been
quite similar to a grain bin explosion. Explosion, I note. The
entire compound would have been leveled, not merely burned. As
there was no explosion, there was no CS ignition causing the fire.
Note: at five miles a decent grain elevator explosion will
knock you on your butt and your ears will ring for days. I speak
from experience here. | 9 | trimmed_train |
134 |
You'd need to launch HLVs to send up large amounts of stuff *if* you assume
no new launcher development. If you assume new launcher development, with
lower costs as a specific objective, then you probably don't want to
build something HLV-sized anyway. | 10 | trimmed_train |
1,101 | Sebastian C Sears, on the Tue, 13 Apr 1993 02:32:13 GMT wibbled:
: ... Came around a right hand sweeper (going around
: 45 mph) only to find a cager going around 30 mph, calmly driving
: along, with no other traffic around, in *my* lane. Not crossing
: the line, not swerving, fully and totally within the south-bound
: lane of 9W (one lane each direction).
And I haven't even got there yet. Must have been some other Brit...
--
Nick (the English Biker) DoD 1069 Concise Oxford Left is Right
M'Lud. | 12 | trimmed_train |
2,813 |
In the "sex ed" portion of the high school "health" course I took
in 1984, it was impressed that the only 100% positive way to *not*
get pregnant was to *not* have sex.
Other methods of contraception were discussed, in the framework of
a chart which showed both the _expected_ failure rate (theoretical,
assumes no mistakes) and the _actual_ failure rate (based on research).
Top of the chart was something like this:
Method Expected Actual
------ Failure Rate Failure Rate
Abstinence 0% 0%
And NFP (Natural Family Planning) was on the bottom. The teacher even
said, "I've had some students tell me that they can't use anything for
birth control because they're Catholic. Well, if you're not married and
you're a practicing Catholic, the *top* of the list is your slot, not
the *bottom*. Even if you're not religious, the top of the list is
safest."
Yes, this was a public school and after Dr Koop's "failing abstinence,
use a condom" statement on the prevention of AIDS.
-jen
-- | 0 | trimmed_train |
5,936 | HI All,
Can someone point me towards some articles on 'boids' or
flocking algorithms... ?
Also, articles on particle animation formulas would be nice...
________________________________________________________________________
\________________________________________________________________________\|
---
þ DeLuxeý 1.25 #8086 þ Head of Co*& XV$# Hi This is a signature virus. Co | 1 | trimmed_train |
8,734 | I attended high school in the San Jose, California area in the early 1980's,
and I remember a (smallish) outbreak of a strange illness, in which
people developed measles-like spots on their bodies. This condition
seemed to last only a few days, and I don't recall anyone reporting any other
symptoms. I seem to recall reading somewhere that this was believed to have
been viral in nature, but I don't know for sure.
However, I have been curious since then about this. | 19 | trimmed_train |
996 |
Obviously, you really don't know.
They *have* spoken out (cf Sec'y of State Christopher's recent trip to the ME),
they have provided millions in aid, and they have participated in the airlifts
to Sarajevo. They *would* supply military aid, if the UN would lift the embargo
on arms sales.
See above. (Kuwait has directly participated in the airlift of food to
Sarajevo.)
Hmm...some might say Kuwaitis are non-white. Ooops, I forgot, Kuwaitis are
"oil rich", "loaded with petro-dollars", etc so they don't count. | 6 | trimmed_train |
8,069 | I would like to find out about space engineering employment and educational
opportunities in the Tucson, Arizona area. E-mail responses appreciated.
My mail feed is intermittent, so please try one or all of these addresses. | 10 | trimmed_train |
335 | Are any readers of s.r.c. going to the Love Europe congress in Germany this
July? | 0 | trimmed_train |
3,164 |
The key word is `spilled'. If semen was spilled anywhere where there
was a chance of procreation it was OK. If it was spilt on the ground or
in to a man it was a big sin, ditto with animals. The jews said sex=pro-
creation.
Homosexuals didn't breed, there fore they are evil and should be stoned
to death.
Stoning non-breeding population was fine. Only the breeders were
considered to be worth much.
Xavier | 13 | trimmed_train |
5,218 | I understand that the new GPS boxes now have an option
known as "differential ready". Apparently land-based
beacons tranmit GPS correction information to your GPS
receiver (with differential option installed).
How does this system work? What frequency is used for
the land-based beacons?
Thanks in advance, | 11 | trimmed_train |
1,272 | Hello,
I am looking for a Xterm emulator which runs under windows 3.1.
Please reply via E-mail.
Thanks.
Chera Bekker | 18 | trimmed_train |
11,260 |
Woah...The context is about God's calling out a special people (the Jews) to
carry the "promise." To read the meaning as literal people is to miss Paul's
entire point. I'd be glad to send anyone more detailed explanations of this
passage if interested. | 0 | trimmed_train |
9,152 |
Are you comparing Cullen to Salami? I would say that that is valid. If
Winnipeg is such a lousy defensive team then why the hell does Salami
stand around the other team's blueline when the puck is in his own end?
Excuse me? Are the Jets playing .500 hockey? Let me check...yes - but just
barely. They have allowed more goals than they have scored. Sounds an
awful lot like Salami's +/- to me. Sounds like they would be just as well
off - or better - if he played the solid two-way game that our friends in
Finland claim he is capable of. But if he did that he wouldn't be chal-
lenging for the league lead in goals would he? The Bi-Planes might be
challenging for first however...
Now let's see...you have compared Timo to Anderson and Cullen. Who's
next? Mike Foligno?
Some of our Finnish friends who have watched him play claim that he
can play a solid two-way game. I would have to say that this style
of contribution would be more conducive to winning. Or don't you
think so?
I don't believe it! You did compare him to Foligno! (And I honestly hadn't
read this far).
It would help if you used a little discrimination in your thinking. Your
contributions would be more highly valued if we could see that you weren't
trying to be merely argumentative.
cordially, as always,
rm
| 17 | trimmed_train |
892 |
> most of their leaders are stupid, and/or not independent, and/or
It's not relevant whether I agree with you or not, there is some reasonable
thought in what you say here an I appreciate your point. However, I would make 2
remarks:
- you forgot about hate, and this is not only at government level.
- It's not only 'arab' governments.
Now, about taugh talk and arrogance, we are adults, aren't we ? Do you listen
to tough talk of american politicians ? or switch the channel ?
I would rather be 'intimidated' by some dummy 'talking tough' then by a
bomb ready to blow under my seat in B747.
| 6 | trimmed_train |
1,342 |
An excellent idea.
While I don't know the full scope of the activities of the EFF,
from what little I've seen I think it would be better to lobby for
strong cryptography through a distinct organization.
The EFF has been associated with efforts to prevent the banning of sex
and pictures newsgroups at various universities. Horror stories about the
contents of those groups (e.g. exploitative pictures of possibly underaged
models) have already surfaced in the press. The White House bulletin
already raised the specter of drug-dealing and terrorism, which is only one
step removed from the old "crypto-wielding child molester" argument. An
EFF lobbying effort for cryptography would be too easily derailed by the
connection to child pornography and the like.
Similarly, LPF is connected with Stallman and his Gnu project. In
light of, say, the Gnu Manifesto, this means that in a public debate it
stands to be labelled as "communist", "anarchist hackers", radical, etc.
I don't know about CPSR, but if it is an offshoot of Physicians for Social
Responsibility (best known for Helen Caldicott and her hysterical
antinuclear lobbying) then it probably also carries unwelcome political
baggage.
Perhaps for practical reasons a lobbying organization for cryptography
would best be formed under the umbrella of EFF or some other existing
group, but its charter should then be distinct, independent, and limited to
advocacy for the right to cryptography. To reiterate Dan Bernstein's
question: does any suitable organization exist? If not, what are you going
to do about it?
Having mentioned the possible dangers of unwelcome political associations,
I would be remiss not to suggest something in the opposite direction:
gathering the support of the NRA by emphasizing the RKBA side of the
issue as well as the First-Amendment side.
| 7 | trimmed_train |
1,049 |
Well, it did not take long to see how consequent some Greeks are in
requesting that Thessaloniki are not called Solun by Bulgarian netters.
So, Napoleon, why do you write about Konstantinople and not Istanbul? | 6 | trimmed_train |
9,310 |
Chris Chelios was Montreal's co-captain with Guy Carbonneau when he was traded to Chicago for Denis Savard, and Peter Stastny was captain of the Quebec Nordiques when he was traded to New-Jersey. Also Mark Messier was captain of the Edmonton Oilers when he was traded to New-York. How about Dale Hawerchuk with Winnipeg when he was traded to Buffalo, was he captain too ? I think so. I should not forget Wayne (you know who) when he was traded to L.A. he was captain. Didn't they strip Wendel Clark of his capta
incy in Toronto ?
Just some updates and thoughts.
Cheer...
-------------------------------------------------------------------------------
Daniel Piche (LMC/U/DET - Design)
Ericsson Communications Inc.
8400 Decarie Blvd, 1rd floor
Town of Mont Royal, Quebec. H4P 2N2
(514)-738-8300 ext. 2178.
E-mail: [email protected]
MEMOid: LMC.LMCDAPI
CHEERS..... | 17 | trimmed_train |
7,922 |
nice theory. too bad the MR2's never came with a four cylinder over 2.0
liters. More like 1.6. Or did they? were the nonturbo MR2II's 2.2 or
some such?
I also understand that anyone using balancing shafts on four cylinders, must
pay SAAB a royalty for using their patented design..like Porsche's 3.0 I4... | 4 | trimmed_train |
7,469 | Will there be any support for round or circular widgets in Motif's next
release?. I'd love to have a circular knob widget which could be used
instead of a slider. | 16 | trimmed_train |
9,562 | Well I am not sure if this is the right newsgroup to ask, but let me try anyway.
I am running xterm and like all UNIX users, I run man <something>. Recently,
I switched to Solaris 2.1, and their man pages are littered with ".I" directives
that are somehow translated into reverse video when displayed by man under xterm.
The resulting output (admittedly a personal taste) is very ANNOYING to look at.
Back when I was using SunOS 4.1.2, I remember their man pages have some keywords
displayed with underlining....
So my question is how do I change the xterm's behaviour under ".I" directives
for nroff man pages, to perhaps underlining, or at least disabling it. (".B"
directives are fine, I like them. And of course, I don't want to go in and edit
the man pages inputs...) Somehow, xterm allows one to specify both a normal font
and a bold font, but not an italic font??
Any pointers, suggestions are greatly appreciated.
Thanks -- John | 16 | trimmed_train |
5,793 | According to [email protected], muslims tithe 1/6 of their income.
Perhaps there are some offshoots of Islam that impose this on their
followers. But the standard tithe is 1/40 of one's net worth, once
a year.
The same writer also objects to the Bible for teaching that
> "woman was created after man, to be his helper" etc.
This is presumably a reference to Genesis 2. Suppose that that
chapter had been written with the sexes reversed. We have God
creating woman, and then saying, "It is not good that woman should
be alone. I will make a help meet for her." Feminists would be
outraged. The clear implication would be that God had started at the
bottom and worked up, making first the plants, then the fish and
birds, then the beasts, then woman, and finally His masterpiece, the
Male Chauvinist Pig. The statement that woman is not capable of
functioning by herself, that she needs a man to open doors for her,
would have been seen as a particularly gratuitous insult. The fact
that the creation of woman from the dust of the ground was given
only briefly and in general, while the creation of the Man was given
in six times the number of words, would have been cited as evidence
of the author's estimate of the relative importance of the sexes.
The verdict would have been unequivocal. "No self-respecting woman
can accept this book as a moral guide, or as anything but sexist
trash!" I suggest that Moses, fearing this reaction, altered his
original draft and described the creation with Adam first and then
Eve, so as to appease Miriam and other radical feminists of the day.
For some reason, however, it did not work. | 0 | trimmed_train |
7,366 |
I think you meant Quadra 800 ..... (but a Centris 800 probably
would be a real nice machine... :) )
But yeah, it needs 80ns not 60ns.
Joel
| 14 | trimmed_train |
2,248 |
How can you say that? I presume that you mean that talking about
restricting rights is not the same as restricting those rights. Well,
arguing for those restrictions may lead to implementation, much
the same way as assault can lead to battery (legal definitions).
Well, I can't speak for the homosexuals, but I've seen ALOT
of polite discussion on t.p.g. Please, everyone, don't take
this guy's word, or mine for that matter, on it. Read t.p.g.
for a while, and try to determine from which direction most of
the flameage originates. If you post without flamebait, you
will generally receive reasoned responses. True, there are
those who tend to lose their tempers quickly, as there are on
all newsgroups, but they really do feel their rights are in jeopardy.
Oh, and neat trick talking derisively about another newsgroup while
not crossposting to allow them to defend themselves.
Methinks you doth protest too much.
Dave Schabel
| 9 | trimmed_train |
9,098 |
Why do you think Steere is doing this? Isn't he acting in good faith?
After all, as the "discoverer" of Lyme for all intents and purposes,
the more famous Lyme gets, the more famous Steere gets. I don't
see the ulterior motive here. It is easy for me to see it the
those physicians who call everything lyme and treat everything.
There is a lot of money involved.
Well, it is tragic what has happened to you, but it doesn't
necessarily make you the most objective source of information
about it. If your whole life is focussed around this, you
may be too emotionally involved to be advising other people
who may or may not have Lyme. Certainly advocacy of more research
on Lyme would not be out of order, though, and people like you
can be very effective there.
--
----------------------------------------------------------------------------
Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and
[email protected] | it is shameful to surrender it too soon." | 19 | trimmed_train |
5,395 | Some of your article was cut off on the right margin, but I will try
and answer from what I can read.
Judaism did not father Islam. We had many of the same prophets, but
Judaism ignores prophets later prophets including Jesus Christ (who
Christians and Muslims believe in) and Mohammed. The idea of believing
in one God should unite all peoples. However, note that Christianity
and Islam reflect the fact that there are people with different views
and the rights of non-Christians and non-Muslims are stated in each
religion.
We are supposed to pay 6% of our income after all necessities are
paid. Please note that this 6% is on a personal basis - if you are
poor, there is no need to pay (quite the contrary, this money most
often goes to the poor in each in country and to the poor Muslims
around the world). Also, this money is not required in the human
sense (i.e. a Muslim never knocks at your door to ask for money
and nobody makes a list at the mosque to make sure you have paid
(and we surely don't pass money baskets around during our prayer
services)).
God's presence is certainly on Earth, but since God is everywhere,
God may show signs of existence in other places as well. We can not
say for sure where God has shown signs of his existence and where
he has not/.
The Qur'an is not a copyright of the Taurah. Muslims believe that
the Taurah, the Bible, and the Qur'an originally contained much the same
message, thus the many similiarities. However, the Taurah and the
Bible have been 'translated' into other languages which has changed
their meaning over time (a translation also reflects some of the
personal views of the translator(s). The Qur'an still exists in the
same language that it was revealed in - Arabic. Therefore, we know
that mankind has not changed its meaning. It is truly what was revealed
to Mohammed at that time. There are many scientific facts which
were not discovered by traditional scientific methods until much later
such as the development of the baby in the mother's womb.
Only God knows for sure how it will turn out. I hope it won't, but if
that happens, it was the will of God.
Please send this mail to me again so I can read the rest of what
you said. And yes, may God help us all. | 6 | trimmed_train |
2,466 | I am looking for the exact address of the Symantec Coporatoin, which
distributes Norton Desktop and other Windows software.
The information I am looking for is:
Mail address
Phone number
Fax number
E-mail address
Thanks in advance.
| 18 | trimmed_train |
1,532 |
Personally, I think Jeffy-Poo was still smarting more from the third degree
burns he suffered after April 1st last year rather than the supposed burns
that he suffered in "the joke". Granted I was one of those people that were
taken in by it and I was certainly concerned...and then pissed at him for
pulling such a thing (which I made known to him).
But then again, for an April Fool "joke" I would also go on record as saying
that it was the best orchestrated one I've ever seen and it certainly sucked
a LOT of people into believing it 8-( 8-| 8-\ 8-)...
"sick" - "twisted"??? Who in this group could ever be accused of such a thing?
I tip my twisted lid to thee Jeffy 8-).
| 12 | trimmed_train |
1,314 |
Well, I used to get mad, and either try to communicate my anger to jerks,
or to, uhm, educate them in how to improve their manners in traffic.
Now I just try to get them off my tail.
In heavy traffic I slow down a bit, mostly so I have more buffer zone in
front to balance the minimal buffer behind, but I also often find that the
jerk behind will notice traffic moving faster in other lanes, switch
into one of them, and pass me - which is fine, because then I can keep a
better eye on the jerk from behind, while looking ahead, rather than
from in front, while splitting my attention between ahead and the mirrors.
In traffic so heavy that there is no way for the jerk to pass,
I might pull over, as if to look for a street number or name,
(still ignoring the jerk) just to get the jerk off my tail.
If this all sounds, well, wimpy or un-Denizenly or pessimistic, or perhaps
(for any psych types) passive-aggressive, consider that I prefer to get
my adrenaline jollies from riding, rather than from yelling at jerks.
A ride can improve my whole day, while yelling at a jerk is likely (for
me) to ruin my ride or my day with my own anger. In the worst case,
yelling at the jerk could ruin my life - since even a tiny jerk in a
cage behind me is better armed (with the cage) than I am on a bike.
On the other hand, you might try subtly arranging to be the last
vehicle to legally cross one or more intersections, leaving the jerk
waiting for cross traffic (and thus off your tail), or crossing
illegally (hopefully in front of the waiting police).
Like almost everything here, your choices and mileage will vary.
| 12 | trimmed_train |
1,869 |
I am in the market for a 24-bit graphics card for a PC (ISA bus), and
was wondering if anyone had any comments (good? bad? otherwise?) regarding
the Diamond Stealth 24?
| 1 | trimmed_train |
9,602 | I am trying to build and use imake (X11R4) on an IBM RS/6000 running AIX V3.2.
I am having the following 2 problems.
(1) Many of my Imakefile's have contructs like
/**/#This is a makefile
at the start of lines to pass Makefile comments thru the C
preprocessor and into the Makefile. Most of the C preprocessors that
I have used will not treat such a # as appearing at the start of the
line. Thus the C preprocessor does not treat the hash symbol as the
start of a directive.
However the IBM cpp strips the comment and treats the hash symbol
as the start of a directive. The cpp fails when it determines
that "This" is not a known directive. I have temporarily hacked my
imake to handle this situation but would like to come up with a better
fix.
(2) Several Imakefiles use /**/ as a parameter to a macro when a particular
use of the macro does not need a value for the parameter. The AIX cpp
gives warnings about these situations but continues to work OK.
If you are familiar with these problems and have solutions, I would appreciate
information about on your solutions. (Perhaps, this is solved in a later
version of imake that I have not reviewed.) Also, do you know of other cpp's
that behave similarly? | 16 | trimmed_train |
8,536 | I offered to relay this information for a ham friend of mine without
Internet access:
His name is Robert (Bob) Wondolowski, N1KDA, and his car was a
1985 Brown Cutlas Sierra Sedan, Massachusetts plate 716ADL.
His HT (Yaesu FT415) and mobile antenna were also included in the car.
It was stolen from Lynn, Mass. about 10 days ago (being on April 6).
If anyone has any information about the car's whereabouts, please e-mail
me.
Thank you for taking the time to read this message.
===============================================================================
=============================================================================== | 4 | trimmed_train |
9,268 |
But you still need the pitching staff to hold the opposing team to
one run. | 2 | trimmed_train |
10,765 |
Pardon me?
"Greece Government Rail-Roads Two Turkish Ethnic Deputies"
While World Human Rights Organizations Scream, Greeks
Persistently Work on Removing the Parliamentary Immunity
of Dr. Sadik Ahmet and Mr. Ahmet Faikoglu.
Dr. Sadik Ahmet, Turkish Ethnic Member of Greek Parliament, Visits US
Washington DC, July 7- Doctor Sadik Ahmet, one of the two ethnic
Turkish members of the Greek parliament visited US on june 24 through
July 5th and held meetings with human rights organizations and
high-level US officials in Washington DC and New York.
At his press conference at the National Press Club in Washington DC,
Sadik Ahmet explained the plight of ethnic Turks in Greece and stated
six demands from Greek government.
Ahmet said "our only hope in Greece is the pressure generated from
Western capitals for insisting that Greece respects the human rights.
What we are having done to ethnic Turks in Greece is exactly the same
as South African Apartheid." He added: "What we are facing is pure
Greek hatred and racial discrimination."
Spelling out the demands of the Turkish ethnic community in Greece
he said "We want the restoration of Greek citizenship of 544 ethnic
Turks. Their citizenship was revoked by using the excuse that this
people have stayed out of Greece for too long. They are Greek citizens
and are residing in Greece, even one of them is actively serving in
the Greek army. Besides, other non-Turkish citizens of Greece are
not subject to this kind of interpretation at an extent that many of
Greek-Americans have Greek citizenship and they permanently live in
the United States."
"We want guarantee for Turkish minority's equal rights. We want Greek
government to accept the Turkish minority and grant us our civil rights.
Our people are waiting since 25 years to get driving licenses. The Greek
government is not granting building permits to Turks for renovating
our buildings or building new ones. If your name is Turkish, you are
not hired to the government offices."
"Furthermore, we want Greek government to give us equal opportunity
in business. They do not grant licenses so we can participate in the
economic life of Greece. In my case, they denied me a medical license
necessary for practicing surgery in Greek hospitals despite the fact
that I have finished a Greek medical school and followed all the
necessary steps in my career."
"We want freedom of expression for ethnic Turks. We are not allowed
to call ourselves Turks. I myself have been subject of a number of
law suits and even have been imprisoned just because I called myself
a Turk."
"We also want Greek government to provide freedom of religion."
In separate interview with The Turkish Times, Dr. Sadik Ahmet stated
that the conditions of ethnic Turks are deplorable and in the eyes of
Greek laws, ethnic Greeks are more equal than ethnic Turks. As an example,
he said there are about 20,000 telephone subscribers in Selanik (Thessaloniki)
and only about 800 of them are Turks. That is not because Turks do not
want to have telephone services at their home and businesses. He said
that Greek government changed the election law just to keep him out
of the parliament as an independent representative and they stated
this fact openly to him. While there is no minimum qualification
requirement for parties in terms of receiving at least 3% of the votes,
they imposed this requirement for the independent parties, including
the Turkish candidates.
Ahmet was born in a small village at Gumulcine (Komotini), Greece 1947.
He earned his medical degree at University of Thessaloniki in 1974.
he served in the Greek military as an infantryman.
In 1985 he got involved with community affairs for the first time
by collecting 15,000 signatures to protest the unjust implementation
of laws against ethnic Turks. In 1986, he was arrested by the police
for collecting signatures.
Serdar Argic | 6 | trimmed_train |
2,561 | Hi All COMPAQ owners
A friend of mine has COMPAQ (PORTABLE III), and he has lost all the manuals and
diskettes.
Please HELP him getting the machine's equipment definition (CMOS) memory
configuration right. The machine says that some bytes of it are still
incorrectly set up. It seems, that COMPAQ has some bytes defined not like
the 100% IBM compatible machines. If You have a COMPAQ, it
certainly has DIAGNOSTICs diskette with it. And this is needed. I can't
reach quickly any COMPAQ dealers here.
If it is possible PLEASE email documentation, or some of its configuration
software. | 3 | trimmed_train |
5,172 | Let's see. These aren't, in a strict sense, amateur rockets. That term
denotes rockets, the engines of which are constructed by the user. The
rockets you describe are called HPR, or high power rockets, to
distinguish them from (smaller) model rockets. They use factory-made
ammonium perchlorate composite propellants in phenolic plastic engines
with graphite nozzles. The engines are classified by impulse. A "D"
engine, for example, can have no more than 20 newton-seconds of impulse.
An "F" engine can have no more than 40 ns. Each letter corresponds to a
doubling of the maximum impulse. So far, engines up to size "O" are
available pretty much off the shelf. Engines of size H and above are
shipped as Class B explosives, and as such are controlled. Engines of
size F and below are shipped as Class C explosives, and are not as
controlled. Class F engines, BTW, are not HPR engines, but model rocket
engines. (Class G engines go in and out of legal limbo.)
There is an HPR Society, The Tripoli Rocket Society, I believe, which
holds events at various sites throughout the year, with all legalities
(FAA waiver included) taken care of. The National Association of
Rocketry is more concerned with engines below H, though it is involved
in HPR as well. These societies certify users of HPR rockets, and
companies will not sell to uncertified individuals.
Bottom Line: It's legit. I suggest you send for a catalog - but forget
the dynamite, will ya? | 10 | trimmed_train |
1,024 |
If it were my wife, I would insist that a radiologist be involved in the
process. Radiologist are intensively trained in the process of
interpreting diagnostic imaging data and are aware of many things that
other physicians aren't aware of. Would you want a radiologist to
deliver your baby? If you wouldn't, then why would you want a OB/GYN to
read your ultrasound study?
In my opinion the process should involve a OB/GYN and a radiologist.
| 19 | trimmed_train |
4,728 | I saw this subject and all I could think of was a parade at Wrigley Field
in Chicago.
Or maybe it's just me.
:)
--
Marc Cooper - Graphics Programmer - Sverdrup Tech.| "As a child, I WAS an
[email protected] | imaginary playmate."
NASA Lewis Research Center MS 5-11 |
21000 Brookpark Dr. | Tom Robbins
Cleveland, OH 44135 (216) 433-8898 | Even Cowgirls Get the Blues | 1 | trimmed_train |
7,913 | Hi,
would someone please email the new AVI file
format. I'm sure that many people would
like to know what it is exactly.
Thank you
Mark Gregory Lecturer [email protected] PH(03)6603243 FAX(03)6621060
Royal Melbourne Institute of Technology,
Department of Communication and Electronic Engineering,
P.O. Box 2476V, Melbourne, Victoria, 3001. AUSTRALIA. | 1 | trimmed_train |
10,731 | Dear Reader,
I'am searching for an implementation of a polygon reduction algorithm
for marching cubes surfaces. I think the best one is the reduction algorithm
from Schroeder et al., SIGGRAPH '92. So, is there any implementation of this
algorithm, it would be very nice if you could leave it to me.
Also I'am looking for a fast !!! connectivity
test for marching cubes surfaces.
Any help or hints will be very useful.
Thanks a lot
| 1 | trimmed_train |
5,306 | I have heard some impressive things about Hijakk (for Windows).
Currently, I use a shareware program called Graphics Workshop.
What kinds of things will Hijaak do that these shareware programs
will not do?
What has been your experience with Hijaak? Are there other programs
that are better? Please email me, if you can help:
Wayne Haston
[email protected] | 1 | trimmed_train |
7,820 |
And anybody who can get the keys from the escrow company. This is a
database that's going to take plenty of updating - they think they can
keep it secure? Please... and that's just primary, not secondary
sources, such as police using the key under a warrant. Would anyone
be surprised if they just "neglected" to erase the key if it turned
out they couldn't nail you on anything? | 7 | trimmed_train |
1,256 |
I haven't seen enough Royals' games to judge his tactics, so you may have
a point here. But:
IMO, the Royals don't have a chance to win the pennant even if McRae
suddenly began channeling for John McGraw. OK, they have some decent
pitchers. But when your offense consists of bums like Gagne and Lind
and McReynolds and McRae and an over-the-hill Brett, you're not going
to finish .500 unless McGraw brings Christy Mathewson back with him.
I'd say it is hard to evaluate a manager when all of his hitters suck. | 2 | trimmed_train |
3,115 |
This talk about the Phillies winning the NL East is scary. VERY
scary! Don't get me wrong, Im a Phillies fan but as late as last
year they looked helpless. The funny thing was they did have a lot
of injuries in '92 spring training that basically killed their
chances. Of course, don't forget the Dykstra wrist injury in the
first or second game?
| 2 | trimmed_train |
11,031 | OK will some one out there tell me why / how DOS 5
can read (I havn't tried writing in case it breaks something)
the Win/NT NTFS file system.
I thought NTFS was supposed to be better than the FAT system | 18 | trimmed_train |
7,117 | Archive-name: cryptography-faq/part05
Last-modified: 1993/4/15
FAQ for sci.crypt, part 5: Product ciphers
This is the fifth of ten parts of the sci.crypt FAQ. The parts are
mostly independent, but you should read the first part before the rest.
We don't have the time to send out missing parts by mail, so don't ask.
Notes such as ``[KAH67]'' refer to the reference list in the last part.
The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu
as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography
FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers
every 21 days.
Contents:
* What is a product cipher?
* What makes a product cipher secure?
* What are some group-theoretic properties of product ciphers?
* What can be proven about the security of a product cipher?
* How are block ciphers used to encrypt data longer than the block size?
* Can symmetric block ciphers be used for message authentication?
* What exactly is DES?
* What is triple DES?
* What is differential cryptanalysis?
* How was NSA involved in the design of DES?
* Is DES available in software?
* Is DES available in hardware?
* Can DES be used to protect classified information?
* What are "ECB", "CBC", "CFB", and "OFB" encryption?
* What is a product cipher?
A product cipher is a block cipher that iterates several weak
operations such as substitution, transposition, modular
addition/multiplication, and linear transformation. (A ``block
cipher'' just means a cipher that encrypts a block of data---8 bytes,
say---all at once, then goes on to the next block.) The notion of
product ciphers is due to Shannon [SHA49]. Examples of modern
product ciphers include LUCIFER [SOR84], DES [NBS77], SP-networks
[KAM78], LOKI [BRO90], FEAL [SHI84], PES [LAI90], Khufu and Khafre
[ME91a]. The so-called Feistel ciphers are a class of product
ciphers which operate on one half of the ciphertext at each round,
and then swap the ciphertext halves after each round. LUCIFER,
DES, LOKI, and FEAL are examples of Feistel ciphers.
The following table compares the main parameters of several product
ciphers:
cipher | block length | key bits | number of rounds
LUCIFER 128 128 16
DES 64 56 16
LOKI 64 64 16
FEAL 64 128 2^x, x >= 5
PES 64 128 8
* What makes a product cipher secure?
Nobody knows how to prove mathematically that a product cipher is
completely secure. So in practice one begins by demonstrating that the
cipher ``looks highly random''. For example, the cipher must be
nonlinear, and it must produce ciphertext which functionally depends
on every bit of the plaintext and the key. Meyer [MEY78] has shown
that at least 5 rounds of DES are required to guarantee such a
dependence. In this sense a product cipher should act as a ``mixing''
function which combines the plaintext, key, and ciphertext in a
complex nonlinear fashion.
The fixed per-round substitutions of the product cipher are
referred to as S-boxes. For example, LUCIFER has 2 S-boxes, and DES
has 8 S-boxes. The nonlinearity of a product cipher reduces to a
careful design of these S-boxes. A list of partial design criteria
for the S-boxes of DES, which apply to S-boxes in general, may be
found in Brown [BRO89] and Brickell et al. [BRI86].
* What are some group-theoretic properties of product ciphers?
Let E be a product cipher that maps N-bit blocks to N-bit blocks.
Let E_K(X) be the encryption of X under key K. Then, for any fixed K,
the map sending X to E_K(X) is a permutation of the set of N-bit
blocks. Denote this permutation by P_K. The set of all N-bit
permutations is called the symmetric group and is written S_{2^N}.
The collection of all these permutations P_K, where K ranges over all
possible keys, is denoted E(S_{2^N}). If E were a random mapping from
plaintexts to ciphertexts then we would expect E(S_{2^N}) to generate
a large subset of S_{2^N}.
Coppersmith and Grossman [COP74] have shown that a very simple
product cipher can generate the alternating group A_{2^N} given a
sufficient number of rounds. (The alternating group is half of the
symmetric group: it consists of all ``even'' permutations, i.e., all
permutations which can be written as an even number of swaps.)
Even and Goldreich [EVE83] were able to extend these results to show
that Feistel ciphers can generate A_{2^N}, given a sufficient number
of rounds.
The security of multiple encipherment also depends on the
group-theoretic properties of a cipher. Multiple encipherment is an
extension over single encipherment if for keys K1, K2 there does
not exist a third key K3 such that
E_K2(E_K1(X)) == E_(K3)(X) (**)
which indicates that encrypting twice with two independent keys
K1, K2 is equal to a single encryption under the third key K3. If
for every K1, K2 there exists a K3 such that eq. (**) is true then
we say that E is a group.
This question of whether DES is a group under this definition was
extensively studied by Sherman, Kaliski, and Rivest [SHE88]. In their
paper they give strong evidence for the hypothesis that DES is not a
group. In fact DES is not a group [CAM93].
* What can be proven about the security of a product cipher?
Recall from above that P_K is a permutation produced by E under
some key K. The goal of the designer of E is to ensure that P_K
appears to be a random element of S_{2^N}, the symmetric group.
Let R be an element of S_{2^N} selected randomly. We will say that P_K
and R are indistinguishable if an observer given P_K and R in some
order cannot distinguish between these two permutations in polynomial
time. That is, with time bounded resources, the observer cannot
determine which of the permutations is produced by E: the optimal
decision is no better than simply guessing.
Luby and Rackoff [LUB88] have shown that a class of Feistel ciphers
are secure in this sense when the round mapping is replaced by
random boolean functions.
* How are block ciphers used to encrypt data longer than the block size?
There are four standard "modes of operation" (and numerous non-standard
ones as well). The standard modes of operation are defined in the U.S.
Department of Commerce Federal Information Processing Standard (FIPS) 81,
published in 1980. See the question about "ECB" below for more details.
Although they are defined for the DES block cipher, the "modes of
operation" can be used with any block cipher.
* Can symmetric block ciphers be used for message authentication?
One may use a symmetric cryptosystem block cipher to prove to himself
that he did or did not generate a message, and to prove to himself
whether his message was altered or unaltered since generation. But one
cannot prove these things to another without revealing the key, and
thereafter that key cannot be used to prove anything about any messages
that were authenticated using that key.
See ANSI X3.106-1983 and FIPS 113 (1985) for a standard method of message
authentication using DES.
* What exactly is DES?
DES is the U.S. Government's Data Encryption Standard - a product
cipher that operates on 64-bit blocks of data, using a 56-bit key.
It is defined in FIPS 46-1 (1988) [which supersedes FIPS 46 (1977)].
FIPS are Federal Information Processing Standards published by NTIS.
DES is identical to the ANSI standard Data Encryption Algorithm (DEA)
defined in ANSI X3.92-1981.
* What is triple DES?
Triple DES is a product cipher which, like DES, operates on 64-bit
data blocks. There are several forms, each of which uses the DES
cipher 3 times. Some forms use two 56-bit keys, some use three.
The "DES modes of operation" may also be used with triple-DES.
Some people refer to E(K1,D(K2,E(K1,x))) as triple-DES.
This method is defined in chapter 7.2 of the ANSI standard X9.17-1985
"Financial Institution Key Management" and is intended for use in
encrypting DES keys and IVs for "Automated Key Distribution". Its
formal name is "Encryption and Decryption of a Single Key by a Key
Pair", but it is referenced in other standards documents as EDE.
That standard says (section 7.2.1): "Key encrypting keys may be a single
DEA key or a DEA key pair. Key pairs shoud be used where additional
security is needed (e.g., the data protected by the key(s) has a long
security life). A key pair shall not be encrypted or decrypted using a
single key."
Others use the term "triple-DES" for E(K1,D(K2,E(K3,x))) or
E(K1,E(K2,E(K3,x))).
One of us (Carl Ellison) keeps advocating DES triple use in the form
E(K1, TRAN( E(K2, TRAN( E(K3, COMPRESS( x )))))), where each DES instance
has its own key and IV (for CBC mode) and TRAN has been posted on
sci.crypt. (It is a large-block transposition program taking its key
from the data stream itself, so that it is not an encryption program on
its own part.)
* What is differential cryptanalysis?
Differential cryptanalysis is a statistical attack that can be
applied to any iterated mapping (ie. any mapping which is based on
a repeated round function). The method was recently popularized by
Biham and Shamir [BIH91], but Coppersmith has remarked that the
S-boxes of DES were optimized against this attack some 20 years ago.
This method has proved effective against several product ciphers,
notably FEAL [BI91a].
Differential cryptanalysis is based on observing a large number of
ciphertexts Y, Y' whose corresponding plaintexts X, X' satisfy a
known difference D = X+X', where + is componentwise XOR. In the
basic Biham-Shamir attack, 2^{47} such plaintext pairs are required
to determine the key for DES. Substantially fewer pairs are required
if DES is truncated to 6 or 8 rounds. In these cases, the actual key
can be recovered in a matter of minutes using a few thousand pairs.
For full DES this attack is impractical because it requires so many
known plaintexts.
The work of Biham and Shamir on DES revealed several startling
observations on the algorithm. Most importantly, if the key
schedule was removed from DES and a 16*48 = 768-bit key was used,
the key could be recovered in less than 2^{64} steps. Thus
independent subkeys do not add substantial security to DES.
Further, the S-boxes of DES are extremely sensitive in that
changing even single entries in these tables yields significant
improvement in the differential attack.
Adi Shamir is quoted to say (NYTimes Oct 13 1991), ``I would say
that, contrary to what some people believe, there is no evidence
of tampering with the DES so that the basic design was weakened.''
* How was NSA involved in the design of DES?
According to Kinnucan [KIN78], Tuchman, a member of the group that
developed DES at IBM is quoted as saying, ``We developed the DES
algorithm entirely within IBM using IBMers. The NSA did not
dictate a single wire!'' Tuchman and Meyer (another developer of
DES) spent a year breaking ciphers and finding weaknesses in
Lucifer. They then spent two years strengthening Lucifer. ``Their
basic approach was to look for strong substitution, permutation,
and key scheduling functions ... IBM has classified the notes
containing the selection criteria at the request of the NSA....
`The NSA told us we had inadvertently reinvented some of the deep
secrets it uses to make its own algorithms,' explains Tuchman.''
On the other hand, a document called ``Involvement of the NSA in
the development of DES: unclassified summary of the United States
Select Committee on Intelligence'', printed in the IEEE
Communications Magazine, p53-55, 1978, states: ``In the development
of DES, NSA convinced IBM that a reduced keysize was sufficient;
indirectly assisted in the development of the S-box structures; and
certified that the final DES algorithm was, to the best of their
knowledge, free from any statistical or mathematical weakness.''
Clearly the key size was reduced at the insistence of the NSA.
The article further states that the NSA did not tamper with the
algorithm itself, just the parameters, which in some sense
resolves the apparent conflict in the remarks of Meyer and Tuchman
presented above.
* Is DES available in software?
Several people have made DES code available via ftp (see part 10 for
pathnames): Stig Ostholm [FTPSO]; BSD [FTPBK]; Eric Young [FTPEY];
Dennis Furguson [FTPDF]; Mark Riordan [FTPMR]; Phil Karn [FTPPK].
A Pascal listing of DES is also given in Patterson [PAT87].
FIPS 46-1 says "The algorithm specified in this standard is to be
implemented ... using hardware (not software) technology. ...
Software implementations in general purpose computers are not in
compliance with this standard." Despite this, software
implementations abound, and are used by government agencies.
* Is DES available in hardware?
The following paragraphs are quoted from messages sent to the editors.
We don't vouch for the quality or even existence of the products.
encryption/decryption device for use on standard, digital 64Kbps PCM
telecom data streams. It is capable of processing data in real time,
e.g. one sample/frame. It is the DS2160. Their phone number is
214-450-0400. You would probably need to talk with Dewight in Telecom
marketing.''
Cryptech CRY12C102: 22.5Mbit/s according to Data Sheet, with 32 Bit
interface. We use this one, because it was the only one available when
we started the project. No problems ! 2. Pijnenburg PCC100: 20Mbit/s
according to Data Sheet. Address: PIJNENBURG B.V., Boxtelswweg 26,
NL-5261 NE Vught, The Netherlands. 3. INFOSYS DES Chip (Germany):
S-Boxes must be loaded by software. So you can modify the Algorithm.
Sorry, I don't have the data sheet handy. Please E-Mail me if you need
further information.''
DES and Proprietary Storage for 16 56-bit keys Key stream generator
Integrated hardware DES3 procedure Extended mode with 112 bit keys;
Computer Elektronik Infosys; 512-A Herndon Parkway,; Herndon, VA
22070; (800)322-3464
an AM9568 compatible DES chip that operates at 25MHz, performs a
round of encryption in 18 clocks, has a three-stage pipeline,
supports ECB, CBC, CFB-8 and >>> CFB-1 <<<<. Further it is very
reasonable priced as opposed to other high-end DES chips. Call
Newbridge Microsystems, Ottawa, (613) 592-0714. (... there are no
import/export issues with Canada and the US). If you require custom
DES or Public Key ICs then Timestep Engineering developed
Newbridge's crypto chips and ICs for other commercial and
educational establishments. They can be reached at (613) 820-0024.
* Can DES be used to protect classified information?
"This standard will be used by Federal departments and agencies for
the cryptographic protection of computer data when the following
conditions apply: 1. ... cryptographic protection is required; and
2. the data is not classified according to the National Security Act
of 1947, as amended, or the Atomic Energy Act of 1954, as amended."
* What are "ECB", "CBC", "CFB", and "OFB" encryption?
These are methods for using block ciphers, such as DES, to encrypt
messages, files, and blocks of data, known as "modes of operation."
Four "modes of operation" are defined in FIPS 81 (1980 December 2),
and also in ANSI X3.106-1983.
FIPS 81 specifies that when 7-bit ASCII data is sent in octets, the
unused most-significant bit is to be set to 1.
FIPS 81 also specifies the padding for short blocks.
The four DES modes of operation are:
Electronic Code Book (ECB),
Cipher Block Chaining (CBC),
K-bit Cipher FeedBack (CFB), and
K-bit Output FeedBack (OFB).
These methods are explained below in a c-language-like notation.
Some symbols:
P[n] The n'th block of plaintext, input to encryption, output from
decryption. Size of block determined by the mode.
C[n] The n'th block of ciphertext, output from encryption, input to
decryption. Size of block determined by the mode.
E(m) The DES encryption function, performed on 64-bit block m, using
the 16-key schedule derived from some 56-bit key.
D(m) The DES decryption function, performed on 64-bit block m, using
the same key schedule as in E(m), except that the 16 keys
in the schedule are used in the opposite order as in E(m).
IV A 64-bit "initialization vector", a secret value which, along with
the key, is shared by both encryptor and decryptor.
I[n] The n'th value of a 64-bit variable, used in some modes.
R[n] The n'th value of a 64-bit variable, used in some modes.
LSB(m,k) The k least significant (right-most) bits of m.
e.g. m & ((1 << k) - 1)
MSB(m,k) The k most significant (left-most) bits of m.
e.g. (m >> (64-k)) & ((1 << k) - 1)
= ^ << >> & operators as defined in the c langage.
Electronic Code Book (ECB):
P[n] and C[n] are each 64-bits long.
Encryption: Decryption:
C[n] = E(P[n]) P[n] = D(C[n])
Cipher Block Chaining (CBC):
P[n] and C[n] are each 64-bits long.
Encryption: Decryption:
C[0] = E(P[0]^IV) P[0] = D(C[0])^IV
(n>0) C[n] = E(P[n]^C[n-1]) P[n] = D(C[n])^C[n-1]
k-bit Cipher FeedBack (CFB):
P[n] and C[n] are each k bits long, 1 <= k <= 64.
Encryption: Decryption:
I[0] = IV I[0] = IV
(n>0) I[n] = I[n-1]<<k | C[n-1] I[n] = I[n-1]<<k | C[n-1]
(all n) R[n] = MSB(E(I[n]),k) R[n] = MSB(E(I[n]),k)
(all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n]
Note that for k==64, this reduces to:
I[0] = IV I[0] = IV
(n>0) I[n] = C[n-1] I[n] = C[n-1]
(all n) R[n] = E(I[n]) R[n] = E(I[n])
(all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n]
CFB notes: Since I[n] depends only on the plain or cipher text from the
previous operation, the E() function can be performed in parallel with
the reception of the text with which it is used.
k-bit Output FeedBack (OFB):
P[n] and C[n] are each k bits long, 1 <= k <= 64.
Encryption: Decryption:
I[0] = IV I[0] = IV
(n>0) I[n] = I[n-1]<<k | R[n-1] I[n] = I[n-1]<<k | R[n-1]
(all n) R[n] = MSB(E(I[n]),k) R[n] = MSB(E(I[n]),k)
(all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n]
Note that for k==64, this reduces to:
I[0] = IV I[0] = IV
(n>0) I[n] = R[n-1] I[n] = R[n-1]
(all n) R[n] = E(I[n]) R[n] = E(I[n])
(all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n]
OFB notes: encryption and decryption are identical. Since I[n] is
independent of P and C, the E() function can be performed in advance of
the receipt of the plain/cipher text with which it is to be used.
Additional notes on DES "modes of operation": | 7 | trimmed_train |
1,787 | [Apologies for not posting to alt.clipper, or whatever, but it seems it
may not be in the newsfeed here.]
There may be another reason (good from NSA's point of view, horrible
from everyone else's) why the algorithm/chip design might be secret.
First, note that the "experts" will only look at "details", and of just
the algorithm:
In addition, respected experts from outside the
government will be offered access to the confidential details of
the algorithm to assess its capabilities and publicly report
their findings.
Why not the chip design? Well, here's the possiblity: in addition to
encryption, the chip pre-processes voice signals to make them easier
to analyze/transcribe electronically. The chip, once widespread, might
effectively be part of a massively parallel computer for "voice-
grepping" the US phone network (or the criminal & wrong-thinking patrons
thereof).
I wouldn't put it past the NSA. Think how much easier it would make life
for them.
And if this is indeed the case, think of the possible public outcry should
it become widely known. Thus the secrecy.
It might be a good idea to have experts in DSP, voice recognition, and
AI conversation-understanding to be on that panel, and insist they be
given (authenticatable) design specs and implementation documentation. | 7 | trimmed_train |
8,386 | ...
Seen that movie already. Or one just like it.
Come to think of it, they might send someone on
a quest to get rid of the dang thing...
| 10 | trimmed_train |
10,635 | Looking for hint book for indiana jones and the last crusade
the game is for the ibm.e-mail me or call 481 3740 and ask for orion.
if you don't have the hint book but know how to answer these questions plao. | 5 | trimmed_train |
9,530 | First off: Thanks to all who have filled me in on the existence of the
68070. I assumed rashly that the particular number would be reserved for
further enhancements to the Motorola line, rather than meted out to
another company. Ah, well, I guess that's what I get when I assume the
computer industry will operate in a logical manner! ;-)
a
spot
Version 1.5 of Quicktime is, as has been stated, the current version of
the software. The older version is 1.0, and 1.6 is on the horizon in the
not too distant future.
back quite
25x by
that it
he
Quicktime does a much better job of playing back movies at size than it
does playing back resized movies. Apparently the process of expanding
each frame's image and dithering the resultant bitmap to the appropriate
bit depth is pretty processor-intensive. There are optimizers that work
pretty well for showing movies at double size, but if you drop to 1.9x
size or increase to 2.1x size, performance suffers dramatically.
(don't know
Quicktime
He lied. :-) Quicktime is very CPU dependent. He was probably confused by
the fact that QT is locked to an internal timecode, and will play in the
same amount of time on any machine. However, an LC will drop frames in
order to keep the sound and video synced up.
The Centris and Quadras have similar CPUs and will thus boast similar
performance, though the Quadras will be a bit faster due to marginally
faster clock speeds and somewhat different architecture.
having
was
I expect that the version of the Quicktime software you saw was 1.0 -- I
was using was 1.5. One of the new codecs in v1.5 allows video at nearly
twice the size and the same frame rate as what version 1.0 could handle.
The Centris 650 I saw was a plain-vanilla, with the exception of the nice
speakers that were playing the sound, and the software was Movie Player,
the QT player Apple includes with the software.
| 1 | trimmed_train |
8,077 | After setting up Windows for using my Cirrus Logic 5426 VLB GraphicsCard
It moved a normal Window from one place to another.
My Parameters where just the following : 486 DX 33 VLB
The Card is equipped with 1 MB Dram (not Vram, there are 8 sockets for Vram)
And the moving of the window just looked like it looked at a friends
386DX 25 (387DX) and an normal ISA ET4000
What I was wondering why is it not using the BITBLT Engine which
is suuposed to be on the Chip.
How are the experiences here..
Have I done something wrong ?
(I installed the MSWIN 3.1 MultiResolution drivers which where supplied
with the Card ?!)
Would be nice if somebody could tell about his experience with this card
Also if there are new(hopefully faster) drrivers around I would love to
how to get hold of them :-) (ftp or whatsoever :-) ) | 18 | trimmed_train |
6,429 | I am trying to run xwd on a Sun SPARCstation IPX
with SunOS 4.1.2 and Openwindows 3.0. I am using
the Motif window manager. I have been unsuccessful
in using xwd under Motif. I get the following when
doing xwd -out xwd.dmp
X Error of failed request: BadDrawable (invalid Pixmap or Window parameter)
Major opcode of failed request: 73 (X_GetImage)
Resource id in failed request: 0x500043
Serial number of failed request: 213
Current serial number in output stream: 213 | 16 | trimmed_train |
2,586 |
Each chip includes the following components:
the Skipjack encryption algorithm
F, an 80-bit family key that is common to all chips
N, a 30-bit serial number
U, an 80-bit secret key that unlocks all messages encrypted with the chip
Hmmm. A thirty bit serial number. And, we are told, the unit key U is
derived deterministically from this serial number. That means that
there are only one billion possible unit keys.
To generate the unit key for a serial number N, the 30-bit value N is
first padded with a fixed 34-bit block to produce a 64-bit block N1.
S1 and S2 are then used as keys to triple-encrypt N1, producing a
64-bit block R1:
R1 = E[D[E[N1; S1]; S2]; S1] .
Similarly, N is padded with two other 34-bit blocks to produce N2 and
N3, and two additional 64-bit blocks R2 and R3 are computed:
R2 = E[D[E[N2; S1]; S2]; S1]
R3 = E[D[E[N3; S1]; S2]; S1] .
R1, R2, and R3 are then concatenated together, giving 192 bits. The
first 80 bits are assigned to U1 and the second 80 bits to U2. The
rest are discarded. The unit key U is the XOR of U1 and U2. U1 and U2
are the key parts that are separately escrowed with the two escrow
agencies.
Hmmm. We must assume that generating the unit key U from the serial
number N rather than generating it from a randomly selected U1 and U2
is an intentional way of assuring a "fail safe" for the government --
U is completedly determined given S1, S2 and N. If S1 and S2 do not
change they constitute effective "master keys" (along with F), the
theft of which (or the possession of which by various authorities)
completely obviates the security of the system. However, more
interestingly, we know, for a fact that if S1 and S2 are fixed no
matter what the keyspace for U is no more than 2^30. Why not pick U1
and U2 at random? Why this interesting restriction of they key space
if it NOT to provide an additional back door?
I find it disturbing that at the very best my security is dependant on
approximately 30 bytes worth of information that could be written on
the back of a napkin.
Even if S1 and S2 change periodically, the rationale behind this
restriction in the size of the keyspace seems strange if one is
assuming that the goal is security -- and makes perfect sense if the
goal is an illusion of security.
If S1 and S2 do not change, even if they remain secret I wonder if
they can somehow be back-derived given enough unit key/serial number
pairs. We are assured that this cannot happen -- but no one
understands how Skipjack works outside of government officials and,
soon, foreign intelligence services that gain the information via
espionage. Presumably we will eventually have the information as well
-- reverse engineering gets more and more advanced every year -- but
by the time we know it may be too late.
As a sequence of values for U1, U2, and U are generated, they are
written onto three separate floppy disks. The first disk contains a
file for each serial number that contains the corresponding key part
U1. The second disk is similar but contains the U2 values. The third
disk contains the unit keys U. Agent 1 takes the first disk and agent
2 takes the second disk. The third disk is used to program the chips.
After the chips are programmed, all information is discarded from the
vault and the agents leave. The laptop may be destroyed for additional
assurance that no information is left behind.
None of this makes me feel the least bit secure. The silly notion of
"destroying the laptop" appears to be yet another bizarre distraction.
We all know that you can't read data from DRAM that has been turned
off for more than a few moments. On the other hand, what we don't know
is why there is a need to generate the unit keys from S1 and S2 in the
first place other than to weaken the system. We don't know if the
agents in question would resist a million in cash a piece for their
information -- its probably worth hundreds of million, so you can make
the bribe arbitrarily hard to resist. And to tell you the truth, doing
this in a "vault" rather than in Joe Random Tempest-shielded Room
with a laptop computer seems like melodrama designed to make
high-school dropouts from Peoria impressed -- but it does very little
for most of the rest of us.
The protocol may be changed slightly so that four people are in the
room instead of two. The first two would provide the seeds S1 and S2,
and the second two (the escrow agents) would take the disks back to
the escrow agencies.
What would this provide? Lets say the escrow agencies are the ACLU and
the NRA and their agents personally take back the disks and are always
honest. Who cares? The NSA must be laughing out loud, because they
have the algorithm to regenerate U given N and likely don't need to
steal they keys as they effectively already have them.
--
Perry Metzger [email protected] | 7 | trimmed_train |
310 | I agree totally with you! Amen! You stated it better and in less world
than I did. | 8 | trimmed_train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.