id
int32
1
11.3k
text
stringlengths
0
74.9k
label
int64
0
19
Generalization
stringclasses
1 value
10,685
You raise a valid point, but again it's a tradeoff -- how much money do you want to spend for that kind of protection? You could buy a Volvo, Saab, or 'Benz and get really good crash protection (and other luxuries) but you'll pay significantly more for it. In my case it's out of the question because *all* of those cars are beyond my budget. Even in high-speed head-on collisions the most beneficial item you can have is a good old 3-point seatbelt. Nowadays, at least in the US, you get an airbag if you get a 3-point belt so (presumably) you get an added safety benefit there as well. That's something I certainly look for and which can be had in inexpensive cars. My $.02, of course.
4
trimmed_train
9,607
I have a Sony 1604S 17" monitor and I don't see any lines across the screen and am only using the non interlaced mode. But because of the hor. lines and poping that I do see and hear when I am usinf 800x600x256 and 1024x768x256 modes and switch back to anything of less. I would not buy another Sony at what ever price. Oh ya this is I guess a 15" viewing area. It don't impress me one bit! Sam
3
trimmed_train
2,301
There was a recession, and none of the potential entrants could raise any money. The race organizers were actually supposed to be handling part of the fundraising, but the less said about that the better.
10
trimmed_train
3,392
A fine 26 year history came to a close tonight, as the Minnesota North Stars, or Norm's Stars (whichever you prefer) lost to the Red Wings by a score of 5-3. The Stars goals were scored by Mike McPhee and Ulf Dahlen, who netted two including the final one in franchise history, with less than a minute to play. Tonight, on the air on the Stars TV telecast, announcer Al Shaver, the voice of the North Stars, stated basically that he will not follow the team to Dallas. Shaver, when asked by his son (who was doing the broadcast with him), "What will you do now?" responded, "First I'm going to get me a new pair of slippers. Then I'm going to sit in my easy chair and watch the world go by." Thank you North Stars, and thank you Al Shaver, for 26 years of Minnesota memories.
17
trimmed_train
5,590
Your "lite" posting for the day, from rec.humor.funny: --
9
trimmed_train
10,304
code deleted... From the XmTextField man page (during discussion of resources): XmNverifyBell Specifies whether a bell will sound when an action is reversed during a verification callback. You are setting doit to false in the callback, and Text[Field] is beeping as it should. To turn off this behavior, set this boolean resource to false.
16
trimmed_train
9,015
When he came near the place where the road goes down the Mount of Olives, the whole crowd of disciples began joyfully to praise God in loud voices for all the miracles they had seen: Luke 19:37
0
trimmed_train
10,665
Here is a different viewpoint. In practice there is little difference in quality but more care is needed with inkjet because smudges etc. can happen. A cheap laser printer does not manage that sort of throughput and on top of that how long does the _first_ sheet take to print? Inkjets are faster than you say and in both cases the computer often has trouble keeping up with the printer. (I have a 486/33 and a lot of drivers cannot keep up with the printer) A sage said to me: "Do you want one copy or lots of copies?", "One", "Inkjet". Paper cost is the same and both can use refills. Long term the laserprinter will need some expensive replacement parts (consumables) and on top of that are the amortisation costs which favour the lowest purchase cost printer. HP inkjets understand PCL so in many cases a laserjet driver will work if the software package has no inkjet driver. There is one wild difference between the two printers: a laserprinter is a page printer whilst an inkjet is a line printer. This means that a laserprinter can rotate graphic images whilst an inkjet cannot. Few drivers actually use this facility. (there is also the matter of downloadable fonts and so on)
11
trimmed_train
10,996
I have MANY questions for all you experts out there pertaining to apple's built-in video. #1, Do all macs that have built-in video have the ability to use VGA monitors? #2, If so/if not, which macs have this capability? #3, Can they drive SVGA as well? #4, how big of a vga monitor can they drive? #5, how can you tell if an unlabeled monitor is VGA? By the pinouts? if so, what should it look like? Particularly, i'm interested in knowing if the si or ci drive VGA, as well as the LC's capabilities in driving VGA/SVGA
14
trimmed_train
8,039
Are you volunteering? :) Will NASA have "available landing sites" in the Russian Republic, now that they are Our Friends and Comrades?
10
trimmed_train
3,082
: >If I remember correctly, the reason that BMW's come with those expensive, : >and relatively worthless, short lived Varda batteries, is 'cause BMW owns : >a controling interest in that battery Manufacturer. : What's wrong with the BMW battery? I've never had problems and I know : numerous people that are still using the original battery in there : 8-10 year old beemers. THe original battery in an 8-10 year old BMW may be fine. Mine lasted many years. The replacement 30AH battery from BMW was a disaster. The mechanic from Comp. Acc. told me that CA would warantee replace the bad one with a new one of the same evil bad batteries and tell the customer if they have problems to bring it back and they'd do it again. It seems that many of those 30AH batteries were DOA, near-DOA, and always unlikely to be going strong by the end of the warantee period on them. THere was a big batch of bad ones, and they replaced them with -you guessed it - more bad ones. BMW switched to a 25AH battery that has more cold cranking amps, even if it has less total juice. I switched to a YUASA that has even more cold cranking amps and cost one third fewer dollars.
12
trimmed_train
3,128
I wish I hadn't sold my copy of Jewish Baseball Stars. It's a Short Shelf (i.e., the one on top of the toilet tank) Special. The writing in that books is so astonishingly awful -- every sportswriting cliche taken to the nth degree and then mangled -- that it's funny. Rusinow is the author, I think.
2
trimmed_train
2,897
i've been using an identical setup, except for the tower config, for several months now. from previous discussions on the net, the first thing to check for is DMA conflicts with other devices, especically if you've got any funky ones. next off, suspect your tape - try a fresh one. good luck !
3
trimmed_train
8,983
I received the following two notes from Martin Hellman with details on how Clipper will work. They are posted with his permission. The implications of some details are fascinating. ------- Date: Sat, 17 Apr 93 23:05:23 PDT From: "Martin Hellman" <[email protected]> To: (a long list of recipients) Subject: Clipper Chip Most of you have seen the announcement in Friday's NY Times, etc. about NIST (National Institute of Standards & Technology) announcing the "Clipper Chip" crypto device. Several messges on the net have asked for more technical details, and some have been laboring under understandable misunderstandings given the lack of details in the news articles. So here to help out is your friendly NSA link: me. I was somewhat surprised Friday to get a call from the Agency which supplied many of the missing details. I was told the info was public, so here it is (the cc of this to Dennis Branstad at NIST is mostly as a double check on my facts since I assume he is aware of all this; please let me know if I have anything wrong): The Clipper Chip will have a secret crypto algorithm embedded in Silicon. Each chip will have two secret, 80-bit keys. One will be the same for all chips (ie a system-wide key) and the other will be unit specific. I don't know what NIST and NSA will call them, but I will call them the system key SK and unit key UK in this message. The IC will be designed to be extremely difficult to reverse so that the system key can be kept secret. (Aside: It is clear that they also want to keep the algorithm secret and, in my opinion, it may be as much for that as this stated purpose.) The unit key will be generated as the XOR of two 80-bit random numbers K1 and K2 (UK=K1+K2) which will be kept by the two escrow authorities. Who these escrow authorities will be is still to be decided by the Attorney General, but it was stressed to me that they will NOT be NSA or law enforcement agencies, that they must be parties acceptable to the users of the system as unbiased. When a law enforcement agency gets a court order, they will present it to these two escrow authorities and receive K1 and K2, thereby allowing access to the unit key UK. In addition to the system key, each user will get to choose his or her own key and change it as often as desired. Call this key plain old K. When a message is to be sent it will first be encrypted under K, then K will be encrypted under the unit key UK, and the serial number of the unit added to produce a three part message which will then be encrypted under the system key SK producing E{ E[M; K], E[K; UK], serial number; SK} When a court order obtains K1 and K2, and thence K, the law enforcement agency will use SK to decrypt all information flowing on the suspected link [Aside: It is my guess that they may do this constantly on all links, with or without a court order, since it is almost impossible to tell which links over which a message will flow.] This gives the agency access to E[M; K], E[K; UK], serial number in the above message. They then check the serial number of the unit and see if it is on the "watch list" for which they have a court order. If so, they will decrypt E[K; UK] to obtain K, and then decrypt E[M; K] to obtain M. I am still in the process of assessing this scheme, so please do not take the above as any kind of endorsement of the proposed scheme. All I am trying to do is help all of us assess the scheme more knowledgably. But I will say that the need for just one court order worries me. I would feel more comfortable (though not necessarily comfortable!) if two separate court orders were needed, one per escrow authority. While no explanation is needed, the following story adds some color: In researching some ideas that Silvio Micali and I have been kicking around, I spoke with Gerald Gunther, the constitutional law expert here at Stanford and he related the following story: When Edward Levi became Pres. Ford's attorney general (right after Watergate), he was visited by an FBI agent asking for "the wiretap authorizations." When Levy asked for the details so he could review the cases as required by law, the agent told him that his predecessors just turned over 40-50 blank, signed forms every time. Levi did not comply and changed the system, but the lesson is clear: No single person or authority should have the power to authorize wiretaps (or worse yet, divulging of personal keys). Sometimes he or she will be an Edward Levi and sometimes a John Mitchell. Martin Hellman ---- Date: Sun, 18 Apr 93 11:41:42 PDT From: "Martin Hellman" <[email protected]> To: [email protected] Subject: Re: Clipper Chip It is fine to post my previous message to sci.crypt if you also post this message with it in which: 1. I ask recipients to be sparse in their requesting further info from me or asking for comments on specific questions. By this posting I apologize for any messages I am unable to respond to. (I already spend too much time answering too much e-mail and am particularly overloaded this week with other responsibilities.)
7
trimmed_train
712
Nothing but errors and omissions here!
7
trimmed_train
2,593
[stuff deleted] Ah, clarification by obfuscation. Actually, the words "A well regulated Milita, being necessary to the security of a free state" is a present participle, used as an adjective to modify 'militia', which is followed by the main clause of the sentence, the subject being 'the right', the verb 'shall'. It asserts that the right to keep and bear arms is essential for maintaining a milita. The sentence doesn't restrict the right, or state or imply possession of the right by anyone or anything other than the people. All it does is make a positive statement regarding a right of the people. The PEOPLE, as in you and me, as in the First, Fourth, Ninth, Tenth, as well as the Second amendment. The existence of this right is assumed - it is not granted by the amendment. There is no stated or implied condition relating the right to bear arms to the necessity of a well-regulated militia to the security of a free state. In other words, the entire sentence says that the right to keep and bear arms is UNCONDITIONAL. The final word on liberties and rights should not belong "to the many". That is why we have a Constitution. Otherwise, a tyrrany of the majority can ensue from "popular" opinion, a concept which you should be familiar with from the Federalist papers.
9
trimmed_train
10,040
The primary problem in human nature is a "fragmentation of being." Humans are in a state of tension, a tension of opposites. Good and evil are the most thought provoking polarities that come to mind. The Bible provides us with many examples of the fragmentation of being. The warring opposites within us are a product of man's rebellion against God, which is described so vividly in the pages of the Scriptures. Man was created with the order to become a god. Those were the words of St. Basil in the fourth century. What he was trying to say was that God created man to be a partaker of the divine nature. In the Eastern Orthodox Church, this is called "theosis," or "deification." One can also say that man was created to be whole, i.e. spirit, soul, and body operating in unison. The story of Adam and Eve is a picture of the archetypal humans before obtaining moral consciousness. Theirs was a harmonious relationship with each other, the world, and the Creator. That innocent harmony was shattered when they disobeyed God, their natural wholeness falling apart into two seemingly irreconcilable halves. Immediately, guilt and fear was manifested in their lives. They become bound to hardship, toil, and suffering. This is symbolized in their exile from the paradisiac state. The beast in the jungle does not possess moral consciousness. If it were to receive this self-awareness, the knowledge of good and evil, its paradisiac state would also be destroyed. Was it the intention of the Creator to leave man in this state of innocence all the days of his existence on earth? Or was the gaining of self-awareness carefully staged by God, who did not desire that His masterpiece, mankind, be a blissful idiot? God must have known that, for mankind to achieve any kind of moral value, he must pass through a confrontation with the opposites. There is no other way to achieve union with God. Jesus Christ is the answer to the problem of the warring polarities. He was the perfectly integrated individual, reconciling the opposites, and making it possible for us to be integrated, i.e. to become God, not in His essence, but in His energies. The opposites is THE Christian problem. The Apostle Paul describes it with the utmost precision in Romans 7:15-24. And he follows with the answer to his dilemma in vs 25.
15
trimmed_train
8,927
The audio will simply select the CD audio when the microphone is removed. I don't believe the button un-dims, since there's nothing to select. I haven't tracked down a Centris to check this on though. Yup, I made the same mistake several months ago when this issue came up before :-) noah
14
trimmed_train
7,254
I don't think we need to argue about this. Yes, but also many people who are not trying to make government recognize Christianity as the dominant religion in this country do no think the motto infringes upon the rights of others who do not share their beliefs. And actually, I think that the government already does recognize that Christianity is the dominant religion in this country. I mean, it is. Don't you realize/recognize this? This isn't to say that we are supposed to believe the teachings of Christianity, just that most people do. If you agree with me, then what are we discussing? No, but I hear quite a bit about Christmas, and little if anything about Jesus. Wouldn't this figure be more prominent if the holiday were really associated to a high degree with him? Or are you saying that the association with Jesus is on a personal level, and that everyone thinks about it but just never talks about it? That is, can *you* prove that most people *do* associate Christmas most importantly with Jesus? I think the numbers *do* matter. It takes a majority, or at least a majority of those in power, to discriminate. Doesn't it?
8
trimmed_train
6,688
While rummaging through a box of old PC (5150) parts, I found a half-size board that looks like a comm port board. It was made by Forte Data Systems and has a copyright date of 1986 on it. The board provides a male 24-pin connector and has 3 jumpers of 3 pins each, two labelled A B C. I plugged it into my PC and ran Advanced diagnostics several times, changing the jumper positions each time, but the system did not recognise a comm port. Does anyone have a clue as to what this board might be or how to configure it? I could use another comm port if it's free.
3
trimmed_train
7,111
Sounds like the picture tube lost vacuum. This would cause the filament to ignite and could actually turn the tube from a vacuum to a pressure vessel, followed by an explosion when the neck assembly (mostly likely cracked to begin with) blows off. During the whole sequence of events, the other circuits may continue functioning, which accounts for not losing sound.
11
trimmed_train
10,112
I am looking for some bar code fonts especially code 3 of 9. Did anybody know any ftp sites or BBS that I can download these types of fonts? Please email to me if you have any info. Thanks!
18
trimmed_train
4,477
I was just wondering if there were any law officers that read this. I have several questions I would like to ask pertaining to motorcycles and cops. And please don't say get a vehicle code, go to your local station, or obvious things like that. My questions would not be found in those places nor answered face to face with a real, live in the flesh, cop. If your brother had a friend who had a cousin whos father was a cop, etc. don't bother writing in. Thanks.
12
trimmed_train
10,150
I am looking for a good used window air conditioner. A small one is preffered. Call 495-2056 (Peter) and we'll talk about it. Or email me. "[email protected]"
5
trimmed_train
2,954
The stragegy of the government is interesting. The real fear comes from them doing more than this. This is a voluntary program, and thus harder for us to object to on the surface. Their strategy is a business one rather than legal one. They are pushing to get a standard in place, a secret standard, and if they get it as a standard then they will drive competitors out of the market. It will be legal to sell better, untapable encryption that doesn't have registered keys, but it will be difficult, and thus not a plan for most phone companies. You see, with clipper chip phones you'll be able to talk to any cellular company, or other phones or ports because they will follow the standard. AT&T has already announced a clipper chip encryption product. The government has marketed hard to get major vendors to use these chips. If they get enough market share, they will rule. And thus there will be very little market for systems that can't be tapped by the police. The public isn't that concerned about it now, after all. They freely do calls that anybody with an old TV can listen to today! They won't pay big extra bucks for proprietary phones that secure them only from the police. Well, some people will buy these phones, but they will only work with other proprietary phones, so the market will be small and the phones expensive. Unless they are made in numbers large enough to sell them cheap, only the Mob will buy them. And this means that the FBI will want to track the customer lists of better encryption phones, because "the only reason a person would want one is to evade the police." Interesting.
7
trimmed_train
9,413
Hello, I am looking for commercial software packages for professional fashion designers. Any recommendation and pointers are greatly appreciated. Please e-mail me, if you may. Thanks a million. -- Ge
1
trimmed_train
96
Here is a press release from the Reserve Officers Association. Reserve Officers Say Demographics Ignored in Nominations to Close Naval, Marine Reserve Centers To: National Desk, Defense Writer Contact: Herbert M. Hart of the Reserve Officers Association of the United States, 202-479-2258 WASHINGTON, April 13 /U.S. Newswire/ -- The Reserve Officers Association of the United States has alerted the Defense Base Realignment and Closure Commission that the services failed to give sufficient weight to demographics in recommendations made to close 56 Naval and Marine Corps Reserve centers. In letters to the closure commission and to all 86 members of Congress with affected locations in their constituencies, including Sen. Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, ROA charged that the developers of the Navy-Marine list ignored demographics of the civilian population, particularly prior service personnel. ROA's executive director, Maj. Gen. Evan L. Hultman, AUS (Ret.), suggested "concern that the only plausible alternative is that they are intentionally attempting to foreclose the Naval Reserve components from maintaining even today's relatively low level of participation in their parent service's Total Force of the future." He asked the commission "to remove from consideration all locations without sufficient and convincing demographic data to warrant approval of the requested action." "Only a few of the 56 Naval and Marine Corps Reserve installations on this list are large enough to have a significant impact on the community, if closed," wrote Hultman. "The major issue is the cumulative impact of moving or closing such a large percentage of the existing locations." Hultman reminded the commission, "The fact that the vast majority of the Reserve installations on this list do not come close to meeting the minimal requirements for consideration in this process certainly supports the thesis" that these actions are simply an attempt to foreclose a substantial role for the Navy and Marine Corps Reserve. ROA also noted "that at the end of the 1960s, when the number of Naval Reservists was approximately the same as today, there were 480 Naval Reserve facilities. If the Navy recommendations are approved, there will be less than 200 Naval Reserve facilities." Facilities on the list include seven Naval Air Stations ranging from South Weymouth, Mass., to Alameda, Calif., 28 Naval Reserve Centers in Macon, Ga., and Parkersburg, W.Va., to Missoula and Great Falls. Mont. Naval/Marine Corps Reserve Centers include four in San Francisco, Fort Wayne, Ind., Billings, Mont., and Abilene, Texas. A major Marine Reserve Center on the list is that at El Toro, Calif., plus six others. -30-
13
trimmed_train
3,489
Hello. I hope somebody out here can help me. I am currently working on a project where I am trying to communicate from an IBM 386 with Phoenix BIOS, using C++, to a board that I made with an Intel 8085 CPU with UART chip. The board works fine with the TRANSMIT command and Terminal Emulation mode of Kermit, but there seems to be something wrong with the initialization or protocol used when I try C++. I need to access the unit I built using C, because I have a sizable chunk of C code that I will be using to perform calculations and operations that will be very difficult to code in assembly language for the 8085. I have included the assembly code that I am running and the C++ code that I am trying to use. If anyone can show me something that I am doing blatantly incorrectly or that I am missing because of my lack of knowledge about RS-232 serial communications, please e-mail me. I wrote the assembly language to wait for a character to be received and then to check it against the 0x20 character, if a 0x20 is received, the LEDs will indicate this. Two C++ programs that I have written do nothing, but set up COM port 2 and send the 0x20 character. One uses the bioscom() function in bios.h the other uses the software interrupt int86() function in dos.h. I have triple checked the baud rate ( 2400 ) the parity ( none ) the stop bits ( 1 ) the character length ( 8 bits ) and the interrupt calls for ( 0x14 ). Currently, I am at a loss as to what may be wrong. Any hardware gurus out there want to comment? Thanks alot, Hubert De Jesus [email protected] INTEL ASM COMMAND EQU 3000H ;Command Register on 8155 PORTA EQU 3001H ;Port A on 8155 TIMERLO EQU 3004H ;High 8 bits of 8155 Timer TIMERHI EQU 3005H ;Low 8 bits of 8155 Timer UARTDATA EQU E000H ;UART Data Register UARTCMD EQU E001H ;UART Command Register ORG 4000H ;SRAM location MVI A,08H ;Set Low Timer Bits STA TIMERLO MVI A,40H ;Set High Timer Bits STA TIMERHI MVI A,11111101B ;Start Timer & Enable Port A STA COMMAND MVI A,11H ;Display 11 on 7-segment LEDs STA PORTA MVI A,00H ;Clear UART Command STA UARTCMD STA UARTCMD STA UARTCMD MVI A,01000000B ;Internally reset UART STA UARTCMD LDA UARTDATA ;Remove extraneous data MVI A,01001111B ;Init UART for 8 data bits, STA UARTCMD ; no parity, 1 stop bit, 64x async MVI A,00100111B ;Enable Transmit and Receive STA UARTCMD INIT: LDA UARTCMD ;Read Status Register ANI 02H ;Is RxRDY? JZ INIT ;No, loop LDA UARTDATA ;Read Data Character CPI ' ' ;Is Character = 0x20? JNZ INIT ;No, loop MVI A,22H ;Character received, STA PORTA ; Display 22 on 7-segment LEDs HLT END C++ using BIOSCOM() #include <stdio.h> #include <stdlib.h> #include <bios.h> #define INIT 0 #define SEND 1 #define RECEIVE 2 #define STATUS 3 #define COM2 1 void main() { char abyte; abyte = 0xa3; bioscom( INIT, abyte, COM2 ); printf( "Initialized COMM PORT 2\n" ); while( !( bioscom( STATUS, 0, COM2 ) & 0x4000 ) ) ; abyte = ' '; bioscom( SEND, abyte, COM2 ); printf( "Sent start character\n" ); } C++ using INT86() #include <stdio.h> #include <stdlib.h> #include <dos.h> #include <bios.h> main() { union REGS registers; registers.h.ah = 0x00; registers.h.al = 0xa7; registers.x.dx = 0x01; int86( 0x14, &registers, &registers ); printf( "COM2 Initialized\n" );
3
trimmed_train
5,276
Someone else said something similar. I will not comment on the value or lack of value of Elias's "proposal". I just want to say that it is very distressing that at least two people here are profoundly ignorant of Nazi racial doctrine. They were NOT like Elias's idea, they were more like the opposite. Nazis believed in racial purity, not racial assimilation. An instructive example is the Nazi attitude to Gypsies. According to Nazi theoreticians, Gypsies were an Aryan race. They were persecuted, and in huge numbers murdered, because most European Gypies were considered not pure Gypsies but "mongrels" formed from the pure Gypsy race and other undesirable races. This was the key difference between the theoretical approach to Jews and Gypsies, by the way. It is also true that towards the end of WWII even the "purist" Gypsies were hunted down as the theory was forgotten.
6
trimmed_train
28
Yes. (I am adamantly an environmentalist. I will not use styrofoam table service. Please keep that in mind as you read this post - I do not wish to attack environmentalism) A half truth is at least as dangerous as a complete lie. A complete lie will rarely be readily accepted, while a half truth (the lie subtly hidden) is more powerfully offered by one who masquerades as an angel of light. Satan has (for some people) loosened the grip on treating the earth as something other than God's intricate handiwork, something other than that on which the health of future generations is based. It is being treated with respect. You think he's going to happily leave it at that? No. When one error is rejected, it is his style to push people to the opposite error. Therefore the earth is not God's intricate handiwork, not because it is rubbish, but because it is God. Mother earth is the one you are to primarily love and serve. I see two facets of a response to it: 1: Care for the environment. Treat it with proper respect, both because it is God's intricate handiwork and the health of future generation, and because showing the facet of one who is disregardful of such things does not constitute what the Apostle Paul called "becoming all things to all men so that by all possible means I might save some." Don't say "Forget the environment, I've got important things to spend my time on." - putting your foot in your mouth in this manner will destroy your credibility in expressing the things that _are_ more important. 2: Show that it is not the ultimate entity, that it is creature and not creator. Show that its beauty and glory points to a greater beauty and glory. Show that it is not the ultimate tapestry, but one of many cords woven in the infinite tapestry.
0
trimmed_train
8,502
I have just a couple of questions about this technique. First, what firing order should I use? Do I start with my pointer finger or my pinky? Left hand or right? And secondly, I have a 12cyl and there are two cylinders unaccounted for. Any suggestions?
4
trimmed_train
9,438
Which, as it turns out, is just about everybody that's serious about horses. What a bunch of weenie fashion nerds. And the helmets suck. I'm wearing my Shoei mountain bike helmet - fuck em.>>> Nah, I can still walk unaided. -- Go fast. Take chances.
12
trimmed_train
8,174
The subject says it all. My 1984 Chev S10 Pickup's left turn signal does not stop after turning. What cause this to stop automaticaly?. Is this a mechanical problem by the steering wheel?.
4
trimmed_train
8,790
Well, the title says it all...I'm looking to buy cheap used TG-16 Gmaes which have 2 or more player support (Simultaneous).... Please email me all offers with a price...
5
trimmed_train
5,714
In Article <[email protected]>, 60ns 72 pin simms. 2 configs: 4mb & 8mb. In each case the memory is soldered on the board leaving the 4 simm sockets open. 132mb is the total addressable memory for a 650.
14
trimmed_train
2,471
My dad has always blamed the Phillies collapse in '64 on me... On Sept 21, 1964, the Phillies had something like a 9 game lead with 12 to play. I was born on Sept 21, 1964. The Phils proceeded to lose something like 10 straight while the Cards won 10 straight (does anyone know hte exact numbers?), and a pennant was blown. To this day my dad likes to remind me that it all began when I was born!
2
trimmed_train
2,912
NASA Headquarters distributed the following press release today (4/6). I've typed it in verbatim, for you folks to chew over. Many of the topics recently discussed on sci.space are covered in this. Gibbons Outlines Space Station Redesign Guidance Dr. John H. Gibbons, Director, Office of Science and Technology Policy, outlined to the members-designate of the Advisory Committee on the Redesign of the Space Station on April 3, three budget options as guidance to the committee in their deliberations on the redesign of the space station. A low option of $5 billion, a mid-range option of $7 billion and a high option of $9 billion will be considered by the committee. Each option would cover the total expenditures for space station from fiscal year 1994 through 1998 and would include funds for development, operations, utilization, Shuttle integration, facilities, research operations support, transition cost and also must include adequate program reserves to insure program implementation within the available funds. Over the next 5 years, $4 billion is reserved within the NASA budget for the President's new technology investment. As a result, station options above $7 billion must be accompanied by offsetting reductions in the rest of the NASA budget. For example, a space station option of $9 billion would require $2 billion in offsets from the NASA budget over the next 5 years. Gibbons presented the information at an organizational session of the advisory committee. Generally, the members-designate focused upon administrative topics and used the session to get acquainted. They also received a legal and ethics briefing and an orientation on the process the Station Redesign Team is following to develop options for the advisory committee to consider. Gibbons also announced that the United States and its international partners -- the Europeans, Japanese, and Canadians -- have decided, after consultation, to give "full consideration" to use of Russian assets in the course of the space station redesign process. To that end, the Russians will be asked to participate in the redesign effort on an as-needed consulting basis, so that the redesign team can make use of their expertise in assessing the capabilities of MIR and the possible use of MIR and other Russian capabilities and systems. The U.S. and international partners hope to benefit from the expertise of the Russian participants in assessing Russian systems and technology. The overall goal of the redesign effort is to develop options for reducing station costs while preserving key research and exploration capabilities. Careful integration of Russian assets could be a key factor in achieving that goal. Gibbons reiterated that, "President Clinton is committed to the redesigned space station and to making every effort to preserve the science, the technology and the jobs that the space station program represents. However, he also is committed to a space station that is well managed and one that does not consume the national resources which should be used to invest in the future of this industry and this nation."
10
trimmed_train
607
It might be nice to: 1. cut out the ad hominem attacks on Prof. Denning, Mr. Sternlight, etc. If you have something objective to say about their views, go ahead and say it (subject to point 2.). Personal attacks reflect more on the attacker more than on the attackee. Throw light, not heat! 2. restrict the discussion to appropriate newsgroups. I submit that comp.org.acm and comp.org.ieee are not appropriate for this discussion. You have now made subscribers to these newsgroups aware of the issue. If they want to know more or participate in the discussion, they can easily join sci.crypt, comp.security.misc, alt.security, or comp.org.eff.talk. --
7
trimmed_train
1,284
I was trying to avoid a discussion of the whether Clintons views should be endorsed or not. All I was trying to find out was whether the newspaper article was correct in making these statements about the President by obtaining some information about when and where he made these statements. Thank you.
6
trimmed_train
2,134
They light the highways in Texas? Funny, everywhere else I've been they only light 'em at junctions. I won't even get into how much road markings vary between states and localities except to say that there are some areas where markings are essentially nonexistant. I suspect you have very limited experience -- US freeways vary dramatically, particularly between states. I can name a number of interstate highways in various parts of the country where 130 would be very optimistic in any car. I'm not sure what you call "quite severe" in terms of road deviations but I suspect every single bridge junction on I84 through CT would be considered so. They're hard to take at 85mph. That's not the only interstate I've seen with such deviations, but it's one I drive frequently. Texas is pretty much an edge-case -- you can't assume that everywhere has roads in such good condition, such flat terrain, and such wide-open spaces. It just ain't so.
4
trimmed_train
7,041
Fascinating. Most of the content of the White House announcements was in what was *not* said. It gives us almost nothing of value, threatens to take away a lot, and does it with a sincere smile on its face, and the nice friendly word "Management". FACT SHEET PUBLIC ENCRYPTION MANAGEMENT The first thing it doesn't say is "We're giving you stronger encryption". what it says is the U. S. Government has developed a microcircuit that not only provides privacy through encryption that is substantially more robust than the current government standard, but also permits escrowing of the keys needed to unlock the encryption. The system for the escrowing of keys will allow the government to gain access to encrypted information only with appropriate legal authorization. But DES is strong enough that only the government can break it now, so the major effect is to make it EASIER for government to break! *At best* it makes it more difficult for the NSA to break, since they need to get one of the two escrowed keys to do a brute-force search for the other 40-bit key. Similarly, it didn't say "We're making encryption is commercially available." because encryption *is* already commercially available, including forms the NSA may not be able to break, like triple-DES or IDEA. And phone companies could offer DES-based systems *now* if they were convinced the government would let them and they could make enough money. The next thing it didn't say is "We're making encryption legal", because of course encryption *has always been* legal, and the President can't change the First Amendment merely by decree. What it *did* say was: In making this decision, I do not intend to prevent the private sector from developing, or the government from approving, other microcircuits or algorithms that are equally effective in assuring both privacy and a secure key- escrow system. which clearly means "We're making encryption illegal unless we get your keys. Soon. Once business buys into this." Another thing it didn't say is "We're going to ask Congress for money to do *lots* more wiretapping", because of course, there's a budget crisis, and Congress might debate the policy issues or not give them the cash. What it *did* say was: The Attorney General will procure and utilize encryption devices to the extent needed to preserve the government's ability to conduct lawful electronic surveillance and to fulfill the need for secure law enforcement communications. Further, the Attorney General shall utilize funds from the Department of Justice Asset Forfeiture Super Surplus Fund to effect this purchase. which means "We've got money Congress can't control and we're going to buy lots of wiretapping equipment with it to detect NON-APPROVED CRYPTO (that's what "preserve the government's ability to conduct ... surveillance" means.)
7
trimmed_train
708
-- Hi netland, I thought that I once read about the existance of a virtual mwm like vtwm. On the usual ftp sites (gatakeeper.dec.com, export.lcs.mit.edu) I can't find any trace of this program. Could anybody give me a hint where to find this program or confirm/deny the existance of this program. Regards,
16
trimmed_train
6,660
PPPPP OOOOO V V Persistance Of Vision Raytracer. P P O O V V P P O O V V PPPPP O O V V P O O V V P O O V V P OOOOO V Available on archie and wuarchive in graphics type directories. PS It's freeware. --
1
trimmed_train
5,864
So true. I'm not sure of the basis of the belief, but it was a widely held belief among the laity of the RC church and their support of it lead to it being declared to be true. Basically the teaching on infallibility holds that the pope is infallible in matters of faith and doctrine, the college of bishops is likewise infallible, and the laity is as well. The pope gets most of the attention/criticism but the consensus of the other bodies is equally infallible (according to RC teaching).
0
trimmed_train
3,930
Greg's obviously confused. There aren't many (any) gentlemen on this newsgroup. Well, maybe. One or two.
12
trimmed_train
919
Accounts of Anti-Armenian Human Right Violatins in Azerbaijan #009 Prelude to Current Events in Nagorno-Karabakh +-----------------------------------------------------------------+ | | | There were about six burned people in there, and the small | | corpse of a burned child. It was gruesome. I suffered a | | tremendous shock. There were about ten people there, but the | | doctor on duty said that because of the numbers they were being | | taken to Baku. There was a woman's corpse there too, she had | | been . . . well, there was part of a body there . . . a | | hacked-off part of a woman's body. It was something terrible. | | | +-----------------------------------------------------------------+ DEPOSITION OF ROMAN ALEKSANDROVICH GAMBARIAN Born 1954 Senior Engineer Sumgait Automotive Transport Production Association Resident at Building 17/33B, Apartment 40 Microdistrict No. 3 Sumgait [Azerbaijan] What happened in Sumgait was a great tragedy, an awful tragedy for us, the Armenian people, and for all of mankind. A genocide of Armenians took place during peacetime. And it was a great tragedy for me personally, because I lost my father in those days. He was still young. Born in 1926. On that day, February 28, we were at home. Of course we had heard that there was unrest in town, my younger brother Aleksandr had told us about it. But we didn't think . . . we thought that everything would happen outdoors, that they wouldn't go into people's apartments. About five o'clock we saw a large crowd near the Kosmos movie theater in our microdistrict. We were sitting at home watching television. We go out on the balcony and see the crowd pour into Mir Street. This is right near downtown, next to the airline ticket office, our house is right nearby. That day there was a group of policeman with shields there. They threw rocks at those policemen. Then they moved off in the direction of our building. They burned a motorcycle in our courtyard and started shouting for Armenians to come out of the building. We switched off the light. As it turns out, their signal was just the opposite: to turn on the light. That meant that it was an Azerbaijani home. We, of course, didn't know and thought that if they saw lights on they would come to our apartment. Suddenly there's pounding on the door. We go to the door, all four of us: there were four of us in the apartment. Father, Mother, my younger brother Aleksandr, and I. He was born in 1959. My father was a veteran of World War II and had fought in China and in the Soviet Far East; he was a pilot. We went to the door and they started pounding on it harder, breaking it down with axes. We start to talk to them in Azerbaijani, "What's going on? What's happened?" They say, "Armenians, get out of here!" We don't open the door, we say, "If we have to leave, we'll leave, we'll leave tomorrow." They say, "No, leave now, get out of here, Armenian dogs, get out of here!" By now they've broken the door both on the lock and the hinge sides. We hold them off as best we can, my father and I on one side, and my mother and brother on the other. We had prepared ourselves: we had several hammers and an axe in the apartment, and grabbed what we could find to defend ourselves. They broke in the door and when the door gave way, we held it for another half-hour. No neighbors, no police and no one from the city government came to our aid the whole time. We held the door. They started to smash the door on the lock side, first with an axe, and then with a crowbar. When the door gave way--they tore it off its hinges--Sasha hit one of them with the axe. The axe flew out of his hands. They also had axes, crowbars, pipes, and special rods made from armature shafts. One of them hit my father in the head. The pressure from the mob was immense. When we retreated into the room, one of them hit my mother, too, in the left part of her face. My brother Sasha and I fought back, of course. Sasha is quite strong and hot-tempered, he was the judo champion of Sumgait. We had hammers in our hands, and we injured several of the bandits--in the heads and in the eyes, all that went on. But they, the injured ones, fell back, and others came to take their places, there were many of them. The door fell down at an angle. The mob tried to remove the door, so as to go into the second room and to continue . . . to finish us off. Father brought skewers and gave them to Sasha and me--we flew at them when we saw Father bleeding: his face was covered with blood, he had been wounded in the head, and his whole face was bloody. We just threw ourselves on them when we saw that. We threw ourselves at the mob and drove back the ones in the hall, drove them down to the third floor. We came out on the landing, but a group of the bandits remained in one of the rooms they were smashing all the furniture in there, having closed the door behind them. We started tearing the door off to chase away the remaining ones or finish them. Then a man, an imposing man of about 40, an Azerbaijani, came in. When he was coming in, Father fell down and Mother flew to him, and started to cry out. I jumped out onto the balcony and started calling an ambulance, but then the mob started throwing stones through the windows of our veranda and kitchen. We live on the fourth floor. And no one came. I went into the room. It seemed to me that this man was the leader of the group. He was respectably dressed in a hat and a trench coat with a fur collar. And he addressed my mother in Azerbaijani: "What's with you, woman, why are you shouting? What happened? Why are you shouting like that?" She says, "What do you mean, what happened? You killed somebody!" My father was a musician, he played the clarinet, he played at many weddings, Armenian and Azerbaijani, he played for many years. Everyone knew him. Mother says, "The person who you killed played at thousands of Azerbaijani weddings, he brought so much joy to people, and you killed that person." He says, "You don't need to shout, stop shouting." And when they heard the voice of this man, the 15 to 18 people who were in the other room opened the door and started running out. We chased after them, but they ran away. That man left, too. As we were later told, downstairs one of them told the others, I don't know if it was from fright or what, told them that we had firearms, even though we only fought with hammers and an axe. We raced to Father and started to massage his heart, but it was already too late. We asked the neighbors to call an ambulance. The ambulance never came, although we waited for it all evening and all through the night. Somewhere around midnight about 15 policemen came. They informed us they were from Khachmas. They said, "We heard that a group was here at your place, you have our condolences." They told us not to touch anything and left. Father lay in the room. So we stayed home. Each of us took a hammer and a knife. We sat at home. Well, we say, if they descend on us again we'll defend ourselves. Somewhere around one o'clock in the morning two people came from the Sumgait Procuracy, investigators. They say, "Leave everything just how it is, we're coming back here soon and will bring an expert who will record and photograph everything." Then people came from the Republic Procuracy too, but no one helped us take Father away. The morning came and the neighbors arrived. We wanted to take Father away somehow. We called the Procuracy and the police a couple of times, but no one came. We called an ambulance, and nobody came. Then one of the neighbors said that the bandits were coming to our place again and we should hide. We secured the door somehow or other. We left Father in the room and went up to the neighbor's. The excesses began again in the morning. The bandits came in several vehicles, ZIL panel trucks, and threw themselves out of the vehicles like . . . a landing force near the center of town. Our building was located right there. A crowd formed. Then they started fighting with the soldiers. Then, in Buildings 19 and 20, that's next to the airline ticket office, they started breaking into Armenian apartments, destroying property, and stealing. The Armenians weren't at home, they had managed to flee and hide somewhere. And again they poured in the direction of our building. They were shouting that there were some Armenians left on the fourth floor, meaning us. "They're up there, still, up there. Let's go kill them!" They broke up all the furniture remaining in the two rooms, threw it outside, and burned it in large fires. We were hiding one floor up. Something heavy fell. Sasha threw himself toward the door shouting that it was probably Father, they had thrown Father, were defiling the corpse, probably throwing it in the fire, going to burn it. I heard it, and the sound was kind of hollow, and I said, "No, that's from some of the furniture." Mother and I pounced on Sasha and stopped him somehow, and calmed him down. The mob left somewhere around eight o'clock. They smashed open the door and went into the apartment of the neighbors across from us. They were also Armenians, they had left for another city. The father of the neighbor who was concealing us came and said, "Are you crazy? Why are you hiding Armenians? Don't you now they're checking all the apartments? They could kill you and them!" And to us :" . . . Come on, leave this apartment!" We went down to the third floor, to some other neighbors'. At first the man didn't want to let us in, but then one of his sons asked him and he relented. We stayed there until eleven o'clock at night. We heard the sound of motors. The neighbors said that it was armored personnel carriers. We went downstairs. There was a light on in the room where we left Father. In the other rooms, as we found out later, all the chandeliers had been torn down. They left only one bulb. The bulb was burning, which probably was a signal they had agreed on because there was a light burning in every apartment in our Microdistrict 3 where there had been a pogrom. With the help of the soldiers we made it to the City Party Committee and were saved. Our salvation--my mother's, my brother's, and mine,--was purely accidental, because, as we later found out from the neighbors, someone in the crowd shouted that we had firearms up there. Well, we fought, but we were only able to save Mother. We couldn't save Father. We inflicted many injuries on the bandits, some of them serious. But others came to take their places. We were also wounded, there was blood, and we were scratched all over--we got our share. It was a miracle we survived. We were saved by a miracle and the troops. And if troops hadn't come to Sumgait, the slaughter would have been even greater: probably all the Armenians would have been victims of the genocide. Through an acquaintance at the City Party Committee I was able to contact the leadership of the military unit that was brought into the city, and at their orders we were assigned special people to accompany us, experts. We went to ' pick up Father's corpse. We took it to the morgue. This was about two o'clock in the morning, it was already March 1, it was raining very hard and it was quite cold, and we were wearing only our suits. When my brother and I carried Father into the morgue we saw the burned and disfigured corpses. There were about six burned people in there, and the small corpse of a burned child. It was gruesome. I suffered a tremendous shock. There were about ten people there, but the doctor on duty said that because of the numbers they were being taken to Baku. There was a woman's corpse there too, she had been . . . well, there was part of a body there . . . a hacked-off part of a woman's body. It was something terrible. The morgue was guarded by the landing force . . . The child that had been killed was only ten or twelve years old. It was impossible to tell if it was a boy or a girl because the corpse was burned. There was a man there, too, several men. You couldn't tell anything because their faces were disfigured, they were in such awful condition... Now two and a half months have passed. Every day I recall with horror what happened in the city of Sumgait. Every day: my father, and the death of my father, and how we fought, and the people's sorrow, and especially the morgue. I still want to say that 70 years have passed since Soviet power was established, and up to the very last minute we could not conceive of what happened in Sumgait. It will go down in history. I'm particularly surprised that the mob wasn't even afraid of the troops. They even fought the soldiers. Many soldiers were wounded. The mob threw fuel mixtures onto the armored personnel carriers, setting them on fire. They weren't afraid. They were so sure of their impunity that they attacked our troops. I saw the clashes on February 29 near the airline ticket office, right across from our building. And that mob was fighting with the soldiers. The inhabitants of some of the buildings, also Azerbaijanis, threw rocks at the soldiers from windows, balconies, even cinder blocks and glass tanks. They weren't afraid of them. I say they were sure of their impunity. When we were at the neighbors' and when they were robbing homes near the airline ticket office I called the police at number 3-20-02 and said that they were robbing Armenian apartments and burning homes. And they told me that they knew that they were being burned. During those days no one from the police department came to anyone's aid. No one came to help us, either, to our home, even though perhaps they could have come and saved us. As we later found out the mob was given free vodka and drugs, near the bus station. Rocks were distributed in all parts of town to be thrown and used in fighting. So I think all of it was arranged in advance. They even knew in which buildings and apartments the Armenians lived, on which floors--they had lists, the bandits. You can tell that the "operation" was planned in advance. Thanks, of course, to our troops, to the country's leadership, and to the leadership of the Ministry of Defense for helping us, thanks to the Russian people, because the majority of the troops were Russians, and the troops suffered losses, too. I want to express this gratitude in the name of my family and in the name of all Armenians, and in the name of all Sumgait Armenians. For coming in time and averting terrible things: worse would have happened if that mob had not been stopped on time. At present an investigation is being conducted on the part of the USSR Procuracy. I want to say that those bandits should receive the severest possible punishment, because if they don't, the tragedy, the genocide, could happen again. Everyone should see that the most severe punishment is meted out for such deeds. Very many bandits and hardened hooligans took part in the unrest, in the mass disturbances. The mobs were huge. At present not all of them have been caught, very few of them have been, I think, judging by the newspaper reports. There were around 80 people near our building alone, that's how many people took part in the pogrom of our building all in all. They should all receive the most severe punishment so that others see that retribution awaits those who perform such acts. May 18, 1988 Yerevan - - - reference - - - [1] _The Sumgait Tragedy; Pogroms against Armenians in Soviet Azerbaijan, Volume I, Eyewitness Accounts_, edited by Samuel Shahmuradian, forward by Yelena Bonner, 1990, published by Aristide D. Caratzas, NY, pages 153-157
6
trimmed_train
1,170
No chance. If that CS ignited at all, it would have been quite similar to a grain bin explosion. Explosion, I note. The entire compound would have been leveled, not merely burned. As there was no explosion, there was no CS ignition causing the fire. Note: at five miles a decent grain elevator explosion will knock you on your butt and your ears will ring for days. I speak from experience here.
9
trimmed_train
134
You'd need to launch HLVs to send up large amounts of stuff *if* you assume no new launcher development. If you assume new launcher development, with lower costs as a specific objective, then you probably don't want to build something HLV-sized anyway.
10
trimmed_train
1,101
Sebastian C Sears, on the Tue, 13 Apr 1993 02:32:13 GMT wibbled: : ... Came around a right hand sweeper (going around : 45 mph) only to find a cager going around 30 mph, calmly driving : along, with no other traffic around, in *my* lane. Not crossing : the line, not swerving, fully and totally within the south-bound : lane of 9W (one lane each direction). And I haven't even got there yet. Must have been some other Brit... -- Nick (the English Biker) DoD 1069 Concise Oxford Left is Right M'Lud.
12
trimmed_train
2,813
In the "sex ed" portion of the high school "health" course I took in 1984, it was impressed that the only 100% positive way to *not* get pregnant was to *not* have sex. Other methods of contraception were discussed, in the framework of a chart which showed both the _expected_ failure rate (theoretical, assumes no mistakes) and the _actual_ failure rate (based on research). Top of the chart was something like this: Method Expected Actual ------ Failure Rate Failure Rate Abstinence 0% 0% And NFP (Natural Family Planning) was on the bottom. The teacher even said, "I've had some students tell me that they can't use anything for birth control because they're Catholic. Well, if you're not married and you're a practicing Catholic, the *top* of the list is your slot, not the *bottom*. Even if you're not religious, the top of the list is safest." Yes, this was a public school and after Dr Koop's "failing abstinence, use a condom" statement on the prevention of AIDS. -jen --
0
trimmed_train
5,936
HI All, Can someone point me towards some articles on 'boids' or flocking algorithms... ? Also, articles on particle animation formulas would be nice... ________________________________________________________________________ \________________________________________________________________________\| --- þ DeLuxeý 1.25 #8086 þ Head of Co*& XV$# Hi This is a signature virus. Co
1
trimmed_train
8,734
I attended high school in the San Jose, California area in the early 1980's, and I remember a (smallish) outbreak of a strange illness, in which people developed measles-like spots on their bodies. This condition seemed to last only a few days, and I don't recall anyone reporting any other symptoms. I seem to recall reading somewhere that this was believed to have been viral in nature, but I don't know for sure. However, I have been curious since then about this.
19
trimmed_train
996
Obviously, you really don't know. They *have* spoken out (cf Sec'y of State Christopher's recent trip to the ME), they have provided millions in aid, and they have participated in the airlifts to Sarajevo. They *would* supply military aid, if the UN would lift the embargo on arms sales. See above. (Kuwait has directly participated in the airlift of food to Sarajevo.) Hmm...some might say Kuwaitis are non-white. Ooops, I forgot, Kuwaitis are "oil rich", "loaded with petro-dollars", etc so they don't count.
6
trimmed_train
8,069
I would like to find out about space engineering employment and educational opportunities in the Tucson, Arizona area. E-mail responses appreciated. My mail feed is intermittent, so please try one or all of these addresses.
10
trimmed_train
335
Are any readers of s.r.c. going to the Love Europe congress in Germany this July?
0
trimmed_train
3,164
The key word is `spilled'. If semen was spilled anywhere where there was a chance of procreation it was OK. If it was spilt on the ground or in to a man it was a big sin, ditto with animals. The jews said sex=pro- creation. Homosexuals didn't breed, there fore they are evil and should be stoned to death. Stoning non-breeding population was fine. Only the breeders were considered to be worth much. Xavier
13
trimmed_train
5,218
I understand that the new GPS boxes now have an option known as "differential ready". Apparently land-based beacons tranmit GPS correction information to your GPS receiver (with differential option installed). How does this system work? What frequency is used for the land-based beacons? Thanks in advance,
11
trimmed_train
1,272
Hello, I am looking for a Xterm emulator which runs under windows 3.1. Please reply via E-mail. Thanks. Chera Bekker
18
trimmed_train
11,260
Woah...The context is about God's calling out a special people (the Jews) to carry the "promise." To read the meaning as literal people is to miss Paul's entire point. I'd be glad to send anyone more detailed explanations of this passage if interested.
0
trimmed_train
9,152
Are you comparing Cullen to Salami? I would say that that is valid. If Winnipeg is such a lousy defensive team then why the hell does Salami stand around the other team's blueline when the puck is in his own end? Excuse me? Are the Jets playing .500 hockey? Let me check...yes - but just barely. They have allowed more goals than they have scored. Sounds an awful lot like Salami's +/- to me. Sounds like they would be just as well off - or better - if he played the solid two-way game that our friends in Finland claim he is capable of. But if he did that he wouldn't be chal- lenging for the league lead in goals would he? The Bi-Planes might be challenging for first however... Now let's see...you have compared Timo to Anderson and Cullen. Who's next? Mike Foligno? Some of our Finnish friends who have watched him play claim that he can play a solid two-way game. I would have to say that this style of contribution would be more conducive to winning. Or don't you think so? I don't believe it! You did compare him to Foligno! (And I honestly hadn't read this far). It would help if you used a little discrimination in your thinking. Your contributions would be more highly valued if we could see that you weren't trying to be merely argumentative. cordially, as always, rm
17
trimmed_train
892
> most of their leaders are stupid, and/or not independent, and/or It's not relevant whether I agree with you or not, there is some reasonable thought in what you say here an I appreciate your point. However, I would make 2 remarks: - you forgot about hate, and this is not only at government level. - It's not only 'arab' governments. Now, about taugh talk and arrogance, we are adults, aren't we ? Do you listen to tough talk of american politicians ? or switch the channel ? I would rather be 'intimidated' by some dummy 'talking tough' then by a bomb ready to blow under my seat in B747.
6
trimmed_train
1,342
An excellent idea. While I don't know the full scope of the activities of the EFF, from what little I've seen I think it would be better to lobby for strong cryptography through a distinct organization. The EFF has been associated with efforts to prevent the banning of sex and pictures newsgroups at various universities. Horror stories about the contents of those groups (e.g. exploitative pictures of possibly underaged models) have already surfaced in the press. The White House bulletin already raised the specter of drug-dealing and terrorism, which is only one step removed from the old "crypto-wielding child molester" argument. An EFF lobbying effort for cryptography would be too easily derailed by the connection to child pornography and the like. Similarly, LPF is connected with Stallman and his Gnu project. In light of, say, the Gnu Manifesto, this means that in a public debate it stands to be labelled as "communist", "anarchist hackers", radical, etc. I don't know about CPSR, but if it is an offshoot of Physicians for Social Responsibility (best known for Helen Caldicott and her hysterical antinuclear lobbying) then it probably also carries unwelcome political baggage. Perhaps for practical reasons a lobbying organization for cryptography would best be formed under the umbrella of EFF or some other existing group, but its charter should then be distinct, independent, and limited to advocacy for the right to cryptography. To reiterate Dan Bernstein's question: does any suitable organization exist? If not, what are you going to do about it? Having mentioned the possible dangers of unwelcome political associations, I would be remiss not to suggest something in the opposite direction: gathering the support of the NRA by emphasizing the RKBA side of the issue as well as the First-Amendment side.
7
trimmed_train
1,049
Well, it did not take long to see how consequent some Greeks are in requesting that Thessaloniki are not called Solun by Bulgarian netters. So, Napoleon, why do you write about Konstantinople and not Istanbul?
6
trimmed_train
9,310
Chris Chelios was Montreal's co-captain with Guy Carbonneau when he was traded to Chicago for Denis Savard, and Peter Stastny was captain of the Quebec Nordiques when he was traded to New-Jersey. Also Mark Messier was captain of the Edmonton Oilers when he was traded to New-York. How about Dale Hawerchuk with Winnipeg when he was traded to Buffalo, was he captain too ? I think so. I should not forget Wayne (you know who) when he was traded to L.A. he was captain. Didn't they strip Wendel Clark of his capta incy in Toronto ? Just some updates and thoughts. Cheer... ------------------------------------------------------------------------------- Daniel Piche (LMC/U/DET - Design) Ericsson Communications Inc. 8400 Decarie Blvd, 1rd floor Town of Mont Royal, Quebec. H4P 2N2 (514)-738-8300 ext. 2178. E-mail: [email protected] MEMOid: LMC.LMCDAPI CHEERS.....
17
trimmed_train
7,922
nice theory. too bad the MR2's never came with a four cylinder over 2.0 liters. More like 1.6. Or did they? were the nonturbo MR2II's 2.2 or some such? I also understand that anyone using balancing shafts on four cylinders, must pay SAAB a royalty for using their patented design..like Porsche's 3.0 I4...
4
trimmed_train
7,469
Will there be any support for round or circular widgets in Motif's next release?. I'd love to have a circular knob widget which could be used instead of a slider.
16
trimmed_train
9,562
Well I am not sure if this is the right newsgroup to ask, but let me try anyway. I am running xterm and like all UNIX users, I run man <something>. Recently, I switched to Solaris 2.1, and their man pages are littered with ".I" directives that are somehow translated into reverse video when displayed by man under xterm. The resulting output (admittedly a personal taste) is very ANNOYING to look at. Back when I was using SunOS 4.1.2, I remember their man pages have some keywords displayed with underlining.... So my question is how do I change the xterm's behaviour under ".I" directives for nroff man pages, to perhaps underlining, or at least disabling it. (".B" directives are fine, I like them. And of course, I don't want to go in and edit the man pages inputs...) Somehow, xterm allows one to specify both a normal font and a bold font, but not an italic font?? Any pointers, suggestions are greatly appreciated. Thanks -- John
16
trimmed_train
5,793
According to [email protected], muslims tithe 1/6 of their income. Perhaps there are some offshoots of Islam that impose this on their followers. But the standard tithe is 1/40 of one's net worth, once a year. The same writer also objects to the Bible for teaching that > "woman was created after man, to be his helper" etc. This is presumably a reference to Genesis 2. Suppose that that chapter had been written with the sexes reversed. We have God creating woman, and then saying, "It is not good that woman should be alone. I will make a help meet for her." Feminists would be outraged. The clear implication would be that God had started at the bottom and worked up, making first the plants, then the fish and birds, then the beasts, then woman, and finally His masterpiece, the Male Chauvinist Pig. The statement that woman is not capable of functioning by herself, that she needs a man to open doors for her, would have been seen as a particularly gratuitous insult. The fact that the creation of woman from the dust of the ground was given only briefly and in general, while the creation of the Man was given in six times the number of words, would have been cited as evidence of the author's estimate of the relative importance of the sexes. The verdict would have been unequivocal. "No self-respecting woman can accept this book as a moral guide, or as anything but sexist trash!" I suggest that Moses, fearing this reaction, altered his original draft and described the creation with Adam first and then Eve, so as to appease Miriam and other radical feminists of the day. For some reason, however, it did not work.
0
trimmed_train
7,366
I think you meant Quadra 800 ..... (but a Centris 800 probably would be a real nice machine... :) ) But yeah, it needs 80ns not 60ns. Joel
14
trimmed_train
2,248
How can you say that? I presume that you mean that talking about restricting rights is not the same as restricting those rights. Well, arguing for those restrictions may lead to implementation, much the same way as assault can lead to battery (legal definitions). Well, I can't speak for the homosexuals, but I've seen ALOT of polite discussion on t.p.g. Please, everyone, don't take this guy's word, or mine for that matter, on it. Read t.p.g. for a while, and try to determine from which direction most of the flameage originates. If you post without flamebait, you will generally receive reasoned responses. True, there are those who tend to lose their tempers quickly, as there are on all newsgroups, but they really do feel their rights are in jeopardy. Oh, and neat trick talking derisively about another newsgroup while not crossposting to allow them to defend themselves. Methinks you doth protest too much. Dave Schabel
9
trimmed_train
9,098
Why do you think Steere is doing this? Isn't he acting in good faith? After all, as the "discoverer" of Lyme for all intents and purposes, the more famous Lyme gets, the more famous Steere gets. I don't see the ulterior motive here. It is easy for me to see it the those physicians who call everything lyme and treat everything. There is a lot of money involved. Well, it is tragic what has happened to you, but it doesn't necessarily make you the most objective source of information about it. If your whole life is focussed around this, you may be too emotionally involved to be advising other people who may or may not have Lyme. Certainly advocacy of more research on Lyme would not be out of order, though, and people like you can be very effective there. -- ---------------------------------------------------------------------------- Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and [email protected] | it is shameful to surrender it too soon."
19
trimmed_train
5,395
Some of your article was cut off on the right margin, but I will try and answer from what I can read. Judaism did not father Islam. We had many of the same prophets, but Judaism ignores prophets later prophets including Jesus Christ (who Christians and Muslims believe in) and Mohammed. The idea of believing in one God should unite all peoples. However, note that Christianity and Islam reflect the fact that there are people with different views and the rights of non-Christians and non-Muslims are stated in each religion. We are supposed to pay 6% of our income after all necessities are paid. Please note that this 6% is on a personal basis - if you are poor, there is no need to pay (quite the contrary, this money most often goes to the poor in each in country and to the poor Muslims around the world). Also, this money is not required in the human sense (i.e. a Muslim never knocks at your door to ask for money and nobody makes a list at the mosque to make sure you have paid (and we surely don't pass money baskets around during our prayer services)). God's presence is certainly on Earth, but since God is everywhere, God may show signs of existence in other places as well. We can not say for sure where God has shown signs of his existence and where he has not/. The Qur'an is not a copyright of the Taurah. Muslims believe that the Taurah, the Bible, and the Qur'an originally contained much the same message, thus the many similiarities. However, the Taurah and the Bible have been 'translated' into other languages which has changed their meaning over time (a translation also reflects some of the personal views of the translator(s). The Qur'an still exists in the same language that it was revealed in - Arabic. Therefore, we know that mankind has not changed its meaning. It is truly what was revealed to Mohammed at that time. There are many scientific facts which were not discovered by traditional scientific methods until much later such as the development of the baby in the mother's womb. Only God knows for sure how it will turn out. I hope it won't, but if that happens, it was the will of God. Please send this mail to me again so I can read the rest of what you said. And yes, may God help us all.
6
trimmed_train
2,466
I am looking for the exact address of the Symantec Coporatoin, which distributes Norton Desktop and other Windows software. The information I am looking for is: Mail address Phone number Fax number E-mail address Thanks in advance.
18
trimmed_train
1,532
Personally, I think Jeffy-Poo was still smarting more from the third degree burns he suffered after April 1st last year rather than the supposed burns that he suffered in "the joke". Granted I was one of those people that were taken in by it and I was certainly concerned...and then pissed at him for pulling such a thing (which I made known to him). But then again, for an April Fool "joke" I would also go on record as saying that it was the best orchestrated one I've ever seen and it certainly sucked a LOT of people into believing it 8-( 8-| 8-\ 8-)... "sick" - "twisted"??? Who in this group could ever be accused of such a thing? I tip my twisted lid to thee Jeffy 8-).
12
trimmed_train
1,314
Well, I used to get mad, and either try to communicate my anger to jerks, or to, uhm, educate them in how to improve their manners in traffic. Now I just try to get them off my tail. In heavy traffic I slow down a bit, mostly so I have more buffer zone in front to balance the minimal buffer behind, but I also often find that the jerk behind will notice traffic moving faster in other lanes, switch into one of them, and pass me - which is fine, because then I can keep a better eye on the jerk from behind, while looking ahead, rather than from in front, while splitting my attention between ahead and the mirrors. In traffic so heavy that there is no way for the jerk to pass, I might pull over, as if to look for a street number or name, (still ignoring the jerk) just to get the jerk off my tail. If this all sounds, well, wimpy or un-Denizenly or pessimistic, or perhaps (for any psych types) passive-aggressive, consider that I prefer to get my adrenaline jollies from riding, rather than from yelling at jerks. A ride can improve my whole day, while yelling at a jerk is likely (for me) to ruin my ride or my day with my own anger. In the worst case, yelling at the jerk could ruin my life - since even a tiny jerk in a cage behind me is better armed (with the cage) than I am on a bike. On the other hand, you might try subtly arranging to be the last vehicle to legally cross one or more intersections, leaving the jerk waiting for cross traffic (and thus off your tail), or crossing illegally (hopefully in front of the waiting police). Like almost everything here, your choices and mileage will vary.
12
trimmed_train
1,869
I am in the market for a 24-bit graphics card for a PC (ISA bus), and was wondering if anyone had any comments (good? bad? otherwise?) regarding the Diamond Stealth 24?
1
trimmed_train
9,602
I am trying to build and use imake (X11R4) on an IBM RS/6000 running AIX V3.2. I am having the following 2 problems. (1) Many of my Imakefile's have contructs like /**/#This is a makefile at the start of lines to pass Makefile comments thru the C preprocessor and into the Makefile. Most of the C preprocessors that I have used will not treat such a # as appearing at the start of the line. Thus the C preprocessor does not treat the hash symbol as the start of a directive. However the IBM cpp strips the comment and treats the hash symbol as the start of a directive. The cpp fails when it determines that "This" is not a known directive. I have temporarily hacked my imake to handle this situation but would like to come up with a better fix. (2) Several Imakefiles use /**/ as a parameter to a macro when a particular use of the macro does not need a value for the parameter. The AIX cpp gives warnings about these situations but continues to work OK. If you are familiar with these problems and have solutions, I would appreciate information about on your solutions. (Perhaps, this is solved in a later version of imake that I have not reviewed.) Also, do you know of other cpp's that behave similarly?
16
trimmed_train
8,536
I offered to relay this information for a ham friend of mine without Internet access: His name is Robert (Bob) Wondolowski, N1KDA, and his car was a 1985 Brown Cutlas Sierra Sedan, Massachusetts plate 716ADL. His HT (Yaesu FT415) and mobile antenna were also included in the car. It was stolen from Lynn, Mass. about 10 days ago (being on April 6). If anyone has any information about the car's whereabouts, please e-mail me. Thank you for taking the time to read this message. =============================================================================== ===============================================================================
4
trimmed_train
9,268
But you still need the pitching staff to hold the opposing team to one run.
2
trimmed_train
10,765
Pardon me? "Greece Government Rail-Roads Two Turkish Ethnic Deputies" While World Human Rights Organizations Scream, Greeks Persistently Work on Removing the Parliamentary Immunity of Dr. Sadik Ahmet and Mr. Ahmet Faikoglu. Dr. Sadik Ahmet, Turkish Ethnic Member of Greek Parliament, Visits US Washington DC, July 7- Doctor Sadik Ahmet, one of the two ethnic Turkish members of the Greek parliament visited US on june 24 through July 5th and held meetings with human rights organizations and high-level US officials in Washington DC and New York. At his press conference at the National Press Club in Washington DC, Sadik Ahmet explained the plight of ethnic Turks in Greece and stated six demands from Greek government. Ahmet said "our only hope in Greece is the pressure generated from Western capitals for insisting that Greece respects the human rights. What we are having done to ethnic Turks in Greece is exactly the same as South African Apartheid." He added: "What we are facing is pure Greek hatred and racial discrimination." Spelling out the demands of the Turkish ethnic community in Greece he said "We want the restoration of Greek citizenship of 544 ethnic Turks. Their citizenship was revoked by using the excuse that this people have stayed out of Greece for too long. They are Greek citizens and are residing in Greece, even one of them is actively serving in the Greek army. Besides, other non-Turkish citizens of Greece are not subject to this kind of interpretation at an extent that many of Greek-Americans have Greek citizenship and they permanently live in the United States." "We want guarantee for Turkish minority's equal rights. We want Greek government to accept the Turkish minority and grant us our civil rights. Our people are waiting since 25 years to get driving licenses. The Greek government is not granting building permits to Turks for renovating our buildings or building new ones. If your name is Turkish, you are not hired to the government offices." "Furthermore, we want Greek government to give us equal opportunity in business. They do not grant licenses so we can participate in the economic life of Greece. In my case, they denied me a medical license necessary for practicing surgery in Greek hospitals despite the fact that I have finished a Greek medical school and followed all the necessary steps in my career." "We want freedom of expression for ethnic Turks. We are not allowed to call ourselves Turks. I myself have been subject of a number of law suits and even have been imprisoned just because I called myself a Turk." "We also want Greek government to provide freedom of religion." In separate interview with The Turkish Times, Dr. Sadik Ahmet stated that the conditions of ethnic Turks are deplorable and in the eyes of Greek laws, ethnic Greeks are more equal than ethnic Turks. As an example, he said there are about 20,000 telephone subscribers in Selanik (Thessaloniki) and only about 800 of them are Turks. That is not because Turks do not want to have telephone services at their home and businesses. He said that Greek government changed the election law just to keep him out of the parliament as an independent representative and they stated this fact openly to him. While there is no minimum qualification requirement for parties in terms of receiving at least 3% of the votes, they imposed this requirement for the independent parties, including the Turkish candidates. Ahmet was born in a small village at Gumulcine (Komotini), Greece 1947. He earned his medical degree at University of Thessaloniki in 1974. he served in the Greek military as an infantryman. In 1985 he got involved with community affairs for the first time by collecting 15,000 signatures to protest the unjust implementation of laws against ethnic Turks. In 1986, he was arrested by the police for collecting signatures. Serdar Argic
6
trimmed_train
2,561
Hi All COMPAQ owners A friend of mine has COMPAQ (PORTABLE III), and he has lost all the manuals and diskettes. Please HELP him getting the machine's equipment definition (CMOS) memory configuration right. The machine says that some bytes of it are still incorrectly set up. It seems, that COMPAQ has some bytes defined not like the 100% IBM compatible machines. If You have a COMPAQ, it certainly has DIAGNOSTICs diskette with it. And this is needed. I can't reach quickly any COMPAQ dealers here. If it is possible PLEASE email documentation, or some of its configuration software.
3
trimmed_train
5,172
Let's see. These aren't, in a strict sense, amateur rockets. That term denotes rockets, the engines of which are constructed by the user. The rockets you describe are called HPR, or high power rockets, to distinguish them from (smaller) model rockets. They use factory-made ammonium perchlorate composite propellants in phenolic plastic engines with graphite nozzles. The engines are classified by impulse. A "D" engine, for example, can have no more than 20 newton-seconds of impulse. An "F" engine can have no more than 40 ns. Each letter corresponds to a doubling of the maximum impulse. So far, engines up to size "O" are available pretty much off the shelf. Engines of size H and above are shipped as Class B explosives, and as such are controlled. Engines of size F and below are shipped as Class C explosives, and are not as controlled. Class F engines, BTW, are not HPR engines, but model rocket engines. (Class G engines go in and out of legal limbo.) There is an HPR Society, The Tripoli Rocket Society, I believe, which holds events at various sites throughout the year, with all legalities (FAA waiver included) taken care of. The National Association of Rocketry is more concerned with engines below H, though it is involved in HPR as well. These societies certify users of HPR rockets, and companies will not sell to uncertified individuals. Bottom Line: It's legit. I suggest you send for a catalog - but forget the dynamite, will ya?
10
trimmed_train
1,024
If it were my wife, I would insist that a radiologist be involved in the process. Radiologist are intensively trained in the process of interpreting diagnostic imaging data and are aware of many things that other physicians aren't aware of. Would you want a radiologist to deliver your baby? If you wouldn't, then why would you want a OB/GYN to read your ultrasound study? In my opinion the process should involve a OB/GYN and a radiologist.
19
trimmed_train
4,728
I saw this subject and all I could think of was a parade at Wrigley Field in Chicago. Or maybe it's just me. :) -- Marc Cooper - Graphics Programmer - Sverdrup Tech.| "As a child, I WAS an [email protected] | imaginary playmate." NASA Lewis Research Center MS 5-11 | 21000 Brookpark Dr. | Tom Robbins Cleveland, OH 44135 (216) 433-8898 | Even Cowgirls Get the Blues
1
trimmed_train
7,913
Hi, would someone please email the new AVI file format. I'm sure that many people would like to know what it is exactly. Thank you Mark Gregory Lecturer [email protected] PH(03)6603243 FAX(03)6621060 Royal Melbourne Institute of Technology, Department of Communication and Electronic Engineering, P.O. Box 2476V, Melbourne, Victoria, 3001. AUSTRALIA.
1
trimmed_train
10,731
Dear Reader, I'am searching for an implementation of a polygon reduction algorithm for marching cubes surfaces. I think the best one is the reduction algorithm from Schroeder et al., SIGGRAPH '92. So, is there any implementation of this algorithm, it would be very nice if you could leave it to me. Also I'am looking for a fast !!! connectivity test for marching cubes surfaces. Any help or hints will be very useful. Thanks a lot
1
trimmed_train
5,306
I have heard some impressive things about Hijakk (for Windows). Currently, I use a shareware program called Graphics Workshop. What kinds of things will Hijaak do that these shareware programs will not do? What has been your experience with Hijaak? Are there other programs that are better? Please email me, if you can help: Wayne Haston [email protected]
1
trimmed_train
7,820
And anybody who can get the keys from the escrow company. This is a database that's going to take plenty of updating - they think they can keep it secure? Please... and that's just primary, not secondary sources, such as police using the key under a warrant. Would anyone be surprised if they just "neglected" to erase the key if it turned out they couldn't nail you on anything?
7
trimmed_train
1,256
I haven't seen enough Royals' games to judge his tactics, so you may have a point here. But: IMO, the Royals don't have a chance to win the pennant even if McRae suddenly began channeling for John McGraw. OK, they have some decent pitchers. But when your offense consists of bums like Gagne and Lind and McReynolds and McRae and an over-the-hill Brett, you're not going to finish .500 unless McGraw brings Christy Mathewson back with him. I'd say it is hard to evaluate a manager when all of his hitters suck.
2
trimmed_train
3,115
This talk about the Phillies winning the NL East is scary. VERY scary! Don't get me wrong, Im a Phillies fan but as late as last year they looked helpless. The funny thing was they did have a lot of injuries in '92 spring training that basically killed their chances. Of course, don't forget the Dykstra wrist injury in the first or second game?
2
trimmed_train
11,031
OK will some one out there tell me why / how DOS 5 can read (I havn't tried writing in case it breaks something) the Win/NT NTFS file system. I thought NTFS was supposed to be better than the FAT system
18
trimmed_train
7,117
Archive-name: cryptography-faq/part05 Last-modified: 1993/4/15 FAQ for sci.crypt, part 5: Product ciphers This is the fifth of ten parts of the sci.crypt FAQ. The parts are mostly independent, but you should read the first part before the rest. We don't have the time to send out missing parts by mail, so don't ask. Notes such as ``[KAH67]'' refer to the reference list in the last part. The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers every 21 days. Contents: * What is a product cipher? * What makes a product cipher secure? * What are some group-theoretic properties of product ciphers? * What can be proven about the security of a product cipher? * How are block ciphers used to encrypt data longer than the block size? * Can symmetric block ciphers be used for message authentication? * What exactly is DES? * What is triple DES? * What is differential cryptanalysis? * How was NSA involved in the design of DES? * Is DES available in software? * Is DES available in hardware? * Can DES be used to protect classified information? * What are "ECB", "CBC", "CFB", and "OFB" encryption? * What is a product cipher? A product cipher is a block cipher that iterates several weak operations such as substitution, transposition, modular addition/multiplication, and linear transformation. (A ``block cipher'' just means a cipher that encrypts a block of data---8 bytes, say---all at once, then goes on to the next block.) The notion of product ciphers is due to Shannon [SHA49]. Examples of modern product ciphers include LUCIFER [SOR84], DES [NBS77], SP-networks [KAM78], LOKI [BRO90], FEAL [SHI84], PES [LAI90], Khufu and Khafre [ME91a]. The so-called Feistel ciphers are a class of product ciphers which operate on one half of the ciphertext at each round, and then swap the ciphertext halves after each round. LUCIFER, DES, LOKI, and FEAL are examples of Feistel ciphers. The following table compares the main parameters of several product ciphers: cipher | block length | key bits | number of rounds LUCIFER 128 128 16 DES 64 56 16 LOKI 64 64 16 FEAL 64 128 2^x, x >= 5 PES 64 128 8 * What makes a product cipher secure? Nobody knows how to prove mathematically that a product cipher is completely secure. So in practice one begins by demonstrating that the cipher ``looks highly random''. For example, the cipher must be nonlinear, and it must produce ciphertext which functionally depends on every bit of the plaintext and the key. Meyer [MEY78] has shown that at least 5 rounds of DES are required to guarantee such a dependence. In this sense a product cipher should act as a ``mixing'' function which combines the plaintext, key, and ciphertext in a complex nonlinear fashion. The fixed per-round substitutions of the product cipher are referred to as S-boxes. For example, LUCIFER has 2 S-boxes, and DES has 8 S-boxes. The nonlinearity of a product cipher reduces to a careful design of these S-boxes. A list of partial design criteria for the S-boxes of DES, which apply to S-boxes in general, may be found in Brown [BRO89] and Brickell et al. [BRI86]. * What are some group-theoretic properties of product ciphers? Let E be a product cipher that maps N-bit blocks to N-bit blocks. Let E_K(X) be the encryption of X under key K. Then, for any fixed K, the map sending X to E_K(X) is a permutation of the set of N-bit blocks. Denote this permutation by P_K. The set of all N-bit permutations is called the symmetric group and is written S_{2^N}. The collection of all these permutations P_K, where K ranges over all possible keys, is denoted E(S_{2^N}). If E were a random mapping from plaintexts to ciphertexts then we would expect E(S_{2^N}) to generate a large subset of S_{2^N}. Coppersmith and Grossman [COP74] have shown that a very simple product cipher can generate the alternating group A_{2^N} given a sufficient number of rounds. (The alternating group is half of the symmetric group: it consists of all ``even'' permutations, i.e., all permutations which can be written as an even number of swaps.) Even and Goldreich [EVE83] were able to extend these results to show that Feistel ciphers can generate A_{2^N}, given a sufficient number of rounds. The security of multiple encipherment also depends on the group-theoretic properties of a cipher. Multiple encipherment is an extension over single encipherment if for keys K1, K2 there does not exist a third key K3 such that E_K2(E_K1(X)) == E_(K3)(X) (**) which indicates that encrypting twice with two independent keys K1, K2 is equal to a single encryption under the third key K3. If for every K1, K2 there exists a K3 such that eq. (**) is true then we say that E is a group. This question of whether DES is a group under this definition was extensively studied by Sherman, Kaliski, and Rivest [SHE88]. In their paper they give strong evidence for the hypothesis that DES is not a group. In fact DES is not a group [CAM93]. * What can be proven about the security of a product cipher? Recall from above that P_K is a permutation produced by E under some key K. The goal of the designer of E is to ensure that P_K appears to be a random element of S_{2^N}, the symmetric group. Let R be an element of S_{2^N} selected randomly. We will say that P_K and R are indistinguishable if an observer given P_K and R in some order cannot distinguish between these two permutations in polynomial time. That is, with time bounded resources, the observer cannot determine which of the permutations is produced by E: the optimal decision is no better than simply guessing. Luby and Rackoff [LUB88] have shown that a class of Feistel ciphers are secure in this sense when the round mapping is replaced by random boolean functions. * How are block ciphers used to encrypt data longer than the block size? There are four standard "modes of operation" (and numerous non-standard ones as well). The standard modes of operation are defined in the U.S. Department of Commerce Federal Information Processing Standard (FIPS) 81, published in 1980. See the question about "ECB" below for more details. Although they are defined for the DES block cipher, the "modes of operation" can be used with any block cipher. * Can symmetric block ciphers be used for message authentication? One may use a symmetric cryptosystem block cipher to prove to himself that he did or did not generate a message, and to prove to himself whether his message was altered or unaltered since generation. But one cannot prove these things to another without revealing the key, and thereafter that key cannot be used to prove anything about any messages that were authenticated using that key. See ANSI X3.106-1983 and FIPS 113 (1985) for a standard method of message authentication using DES. * What exactly is DES? DES is the U.S. Government's Data Encryption Standard - a product cipher that operates on 64-bit blocks of data, using a 56-bit key. It is defined in FIPS 46-1 (1988) [which supersedes FIPS 46 (1977)]. FIPS are Federal Information Processing Standards published by NTIS. DES is identical to the ANSI standard Data Encryption Algorithm (DEA) defined in ANSI X3.92-1981. * What is triple DES? Triple DES is a product cipher which, like DES, operates on 64-bit data blocks. There are several forms, each of which uses the DES cipher 3 times. Some forms use two 56-bit keys, some use three. The "DES modes of operation" may also be used with triple-DES. Some people refer to E(K1,D(K2,E(K1,x))) as triple-DES. This method is defined in chapter 7.2 of the ANSI standard X9.17-1985 "Financial Institution Key Management" and is intended for use in encrypting DES keys and IVs for "Automated Key Distribution". Its formal name is "Encryption and Decryption of a Single Key by a Key Pair", but it is referenced in other standards documents as EDE. That standard says (section 7.2.1): "Key encrypting keys may be a single DEA key or a DEA key pair. Key pairs shoud be used where additional security is needed (e.g., the data protected by the key(s) has a long security life). A key pair shall not be encrypted or decrypted using a single key." Others use the term "triple-DES" for E(K1,D(K2,E(K3,x))) or E(K1,E(K2,E(K3,x))). One of us (Carl Ellison) keeps advocating DES triple use in the form E(K1, TRAN( E(K2, TRAN( E(K3, COMPRESS( x )))))), where each DES instance has its own key and IV (for CBC mode) and TRAN has been posted on sci.crypt. (It is a large-block transposition program taking its key from the data stream itself, so that it is not an encryption program on its own part.) * What is differential cryptanalysis? Differential cryptanalysis is a statistical attack that can be applied to any iterated mapping (ie. any mapping which is based on a repeated round function). The method was recently popularized by Biham and Shamir [BIH91], but Coppersmith has remarked that the S-boxes of DES were optimized against this attack some 20 years ago. This method has proved effective against several product ciphers, notably FEAL [BI91a]. Differential cryptanalysis is based on observing a large number of ciphertexts Y, Y' whose corresponding plaintexts X, X' satisfy a known difference D = X+X', where + is componentwise XOR. In the basic Biham-Shamir attack, 2^{47} such plaintext pairs are required to determine the key for DES. Substantially fewer pairs are required if DES is truncated to 6 or 8 rounds. In these cases, the actual key can be recovered in a matter of minutes using a few thousand pairs. For full DES this attack is impractical because it requires so many known plaintexts. The work of Biham and Shamir on DES revealed several startling observations on the algorithm. Most importantly, if the key schedule was removed from DES and a 16*48 = 768-bit key was used, the key could be recovered in less than 2^{64} steps. Thus independent subkeys do not add substantial security to DES. Further, the S-boxes of DES are extremely sensitive in that changing even single entries in these tables yields significant improvement in the differential attack. Adi Shamir is quoted to say (NYTimes Oct 13 1991), ``I would say that, contrary to what some people believe, there is no evidence of tampering with the DES so that the basic design was weakened.'' * How was NSA involved in the design of DES? According to Kinnucan [KIN78], Tuchman, a member of the group that developed DES at IBM is quoted as saying, ``We developed the DES algorithm entirely within IBM using IBMers. The NSA did not dictate a single wire!'' Tuchman and Meyer (another developer of DES) spent a year breaking ciphers and finding weaknesses in Lucifer. They then spent two years strengthening Lucifer. ``Their basic approach was to look for strong substitution, permutation, and key scheduling functions ... IBM has classified the notes containing the selection criteria at the request of the NSA.... `The NSA told us we had inadvertently reinvented some of the deep secrets it uses to make its own algorithms,' explains Tuchman.'' On the other hand, a document called ``Involvement of the NSA in the development of DES: unclassified summary of the United States Select Committee on Intelligence'', printed in the IEEE Communications Magazine, p53-55, 1978, states: ``In the development of DES, NSA convinced IBM that a reduced keysize was sufficient; indirectly assisted in the development of the S-box structures; and certified that the final DES algorithm was, to the best of their knowledge, free from any statistical or mathematical weakness.'' Clearly the key size was reduced at the insistence of the NSA. The article further states that the NSA did not tamper with the algorithm itself, just the parameters, which in some sense resolves the apparent conflict in the remarks of Meyer and Tuchman presented above. * Is DES available in software? Several people have made DES code available via ftp (see part 10 for pathnames): Stig Ostholm [FTPSO]; BSD [FTPBK]; Eric Young [FTPEY]; Dennis Furguson [FTPDF]; Mark Riordan [FTPMR]; Phil Karn [FTPPK]. A Pascal listing of DES is also given in Patterson [PAT87]. FIPS 46-1 says "The algorithm specified in this standard is to be implemented ... using hardware (not software) technology. ... Software implementations in general purpose computers are not in compliance with this standard." Despite this, software implementations abound, and are used by government agencies. * Is DES available in hardware? The following paragraphs are quoted from messages sent to the editors. We don't vouch for the quality or even existence of the products. encryption/decryption device for use on standard, digital 64Kbps PCM telecom data streams. It is capable of processing data in real time, e.g. one sample/frame. It is the DS2160. Their phone number is 214-450-0400. You would probably need to talk with Dewight in Telecom marketing.'' Cryptech CRY12C102: 22.5Mbit/s according to Data Sheet, with 32 Bit interface. We use this one, because it was the only one available when we started the project. No problems ! 2. Pijnenburg PCC100: 20Mbit/s according to Data Sheet. Address: PIJNENBURG B.V., Boxtelswweg 26, NL-5261 NE Vught, The Netherlands. 3. INFOSYS DES Chip (Germany): S-Boxes must be loaded by software. So you can modify the Algorithm. Sorry, I don't have the data sheet handy. Please E-Mail me if you need further information.'' DES and Proprietary Storage for 16 56-bit keys Key stream generator Integrated hardware DES3 procedure Extended mode with 112 bit keys; Computer Elektronik Infosys; 512-A Herndon Parkway,; Herndon, VA 22070; (800)322-3464 an AM9568 compatible DES chip that operates at 25MHz, performs a round of encryption in 18 clocks, has a three-stage pipeline, supports ECB, CBC, CFB-8 and >>> CFB-1 <<<<. Further it is very reasonable priced as opposed to other high-end DES chips. Call Newbridge Microsystems, Ottawa, (613) 592-0714. (... there are no import/export issues with Canada and the US). If you require custom DES or Public Key ICs then Timestep Engineering developed Newbridge's crypto chips and ICs for other commercial and educational establishments. They can be reached at (613) 820-0024. * Can DES be used to protect classified information? "This standard will be used by Federal departments and agencies for the cryptographic protection of computer data when the following conditions apply: 1. ... cryptographic protection is required; and 2. the data is not classified according to the National Security Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended." * What are "ECB", "CBC", "CFB", and "OFB" encryption? These are methods for using block ciphers, such as DES, to encrypt messages, files, and blocks of data, known as "modes of operation." Four "modes of operation" are defined in FIPS 81 (1980 December 2), and also in ANSI X3.106-1983. FIPS 81 specifies that when 7-bit ASCII data is sent in octets, the unused most-significant bit is to be set to 1. FIPS 81 also specifies the padding for short blocks. The four DES modes of operation are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), K-bit Cipher FeedBack (CFB), and K-bit Output FeedBack (OFB). These methods are explained below in a c-language-like notation. Some symbols: P[n] The n'th block of plaintext, input to encryption, output from decryption. Size of block determined by the mode. C[n] The n'th block of ciphertext, output from encryption, input to decryption. Size of block determined by the mode. E(m) The DES encryption function, performed on 64-bit block m, using the 16-key schedule derived from some 56-bit key. D(m) The DES decryption function, performed on 64-bit block m, using the same key schedule as in E(m), except that the 16 keys in the schedule are used in the opposite order as in E(m). IV A 64-bit "initialization vector", a secret value which, along with the key, is shared by both encryptor and decryptor. I[n] The n'th value of a 64-bit variable, used in some modes. R[n] The n'th value of a 64-bit variable, used in some modes. LSB(m,k) The k least significant (right-most) bits of m. e.g. m & ((1 << k) - 1) MSB(m,k) The k most significant (left-most) bits of m. e.g. (m >> (64-k)) & ((1 << k) - 1) = ^ << >> & operators as defined in the c langage. Electronic Code Book (ECB): P[n] and C[n] are each 64-bits long. Encryption: Decryption: C[n] = E(P[n]) P[n] = D(C[n]) Cipher Block Chaining (CBC): P[n] and C[n] are each 64-bits long. Encryption: Decryption: C[0] = E(P[0]^IV) P[0] = D(C[0])^IV (n>0) C[n] = E(P[n]^C[n-1]) P[n] = D(C[n])^C[n-1] k-bit Cipher FeedBack (CFB): P[n] and C[n] are each k bits long, 1 <= k <= 64. Encryption: Decryption: I[0] = IV I[0] = IV (n>0) I[n] = I[n-1]<<k | C[n-1] I[n] = I[n-1]<<k | C[n-1] (all n) R[n] = MSB(E(I[n]),k) R[n] = MSB(E(I[n]),k) (all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n] Note that for k==64, this reduces to: I[0] = IV I[0] = IV (n>0) I[n] = C[n-1] I[n] = C[n-1] (all n) R[n] = E(I[n]) R[n] = E(I[n]) (all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n] CFB notes: Since I[n] depends only on the plain or cipher text from the previous operation, the E() function can be performed in parallel with the reception of the text with which it is used. k-bit Output FeedBack (OFB): P[n] and C[n] are each k bits long, 1 <= k <= 64. Encryption: Decryption: I[0] = IV I[0] = IV (n>0) I[n] = I[n-1]<<k | R[n-1] I[n] = I[n-1]<<k | R[n-1] (all n) R[n] = MSB(E(I[n]),k) R[n] = MSB(E(I[n]),k) (all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n] Note that for k==64, this reduces to: I[0] = IV I[0] = IV (n>0) I[n] = R[n-1] I[n] = R[n-1] (all n) R[n] = E(I[n]) R[n] = E(I[n]) (all n) C[n] = P[n]^R[n] P[n] = C[n]^R[n] OFB notes: encryption and decryption are identical. Since I[n] is independent of P and C, the E() function can be performed in advance of the receipt of the plain/cipher text with which it is to be used. Additional notes on DES "modes of operation":
7
trimmed_train
1,787
[Apologies for not posting to alt.clipper, or whatever, but it seems it may not be in the newsfeed here.] There may be another reason (good from NSA's point of view, horrible from everyone else's) why the algorithm/chip design might be secret. First, note that the "experts" will only look at "details", and of just the algorithm: In addition, respected experts from outside the government will be offered access to the confidential details of the algorithm to assess its capabilities and publicly report their findings. Why not the chip design? Well, here's the possiblity: in addition to encryption, the chip pre-processes voice signals to make them easier to analyze/transcribe electronically. The chip, once widespread, might effectively be part of a massively parallel computer for "voice- grepping" the US phone network (or the criminal & wrong-thinking patrons thereof). I wouldn't put it past the NSA. Think how much easier it would make life for them. And if this is indeed the case, think of the possible public outcry should it become widely known. Thus the secrecy. It might be a good idea to have experts in DSP, voice recognition, and AI conversation-understanding to be on that panel, and insist they be given (authenticatable) design specs and implementation documentation.
7
trimmed_train
8,386
... Seen that movie already. Or one just like it. Come to think of it, they might send someone on a quest to get rid of the dang thing...
10
trimmed_train
10,635
Looking for hint book for indiana jones and the last crusade the game is for the ibm.e-mail me or call 481 3740 and ask for orion. if you don't have the hint book but know how to answer these questions plao.
5
trimmed_train
9,530
First off: Thanks to all who have filled me in on the existence of the 68070. I assumed rashly that the particular number would be reserved for further enhancements to the Motorola line, rather than meted out to another company. Ah, well, I guess that's what I get when I assume the computer industry will operate in a logical manner! ;-) a spot Version 1.5 of Quicktime is, as has been stated, the current version of the software. The older version is 1.0, and 1.6 is on the horizon in the not too distant future. back quite 25x by that it he Quicktime does a much better job of playing back movies at size than it does playing back resized movies. Apparently the process of expanding each frame's image and dithering the resultant bitmap to the appropriate bit depth is pretty processor-intensive. There are optimizers that work pretty well for showing movies at double size, but if you drop to 1.9x size or increase to 2.1x size, performance suffers dramatically. (don't know Quicktime He lied. :-) Quicktime is very CPU dependent. He was probably confused by the fact that QT is locked to an internal timecode, and will play in the same amount of time on any machine. However, an LC will drop frames in order to keep the sound and video synced up. The Centris and Quadras have similar CPUs and will thus boast similar performance, though the Quadras will be a bit faster due to marginally faster clock speeds and somewhat different architecture. having was I expect that the version of the Quicktime software you saw was 1.0 -- I was using was 1.5. One of the new codecs in v1.5 allows video at nearly twice the size and the same frame rate as what version 1.0 could handle. The Centris 650 I saw was a plain-vanilla, with the exception of the nice speakers that were playing the sound, and the software was Movie Player, the QT player Apple includes with the software.
1
trimmed_train
8,077
After setting up Windows for using my Cirrus Logic 5426 VLB GraphicsCard It moved a normal Window from one place to another. My Parameters where just the following : 486 DX 33 VLB The Card is equipped with 1 MB Dram (not Vram, there are 8 sockets for Vram) And the moving of the window just looked like it looked at a friends 386DX 25 (387DX) and an normal ISA ET4000 What I was wondering why is it not using the BITBLT Engine which is suuposed to be on the Chip. How are the experiences here.. Have I done something wrong ? (I installed the MSWIN 3.1 MultiResolution drivers which where supplied with the Card ?!) Would be nice if somebody could tell about his experience with this card Also if there are new(hopefully faster) drrivers around I would love to how to get hold of them :-) (ftp or whatsoever :-) )
18
trimmed_train
6,429
I am trying to run xwd on a Sun SPARCstation IPX with SunOS 4.1.2 and Openwindows 3.0. I am using the Motif window manager. I have been unsuccessful in using xwd under Motif. I get the following when doing xwd -out xwd.dmp X Error of failed request: BadDrawable (invalid Pixmap or Window parameter) Major opcode of failed request: 73 (X_GetImage) Resource id in failed request: 0x500043 Serial number of failed request: 213 Current serial number in output stream: 213
16
trimmed_train
2,586
Each chip includes the following components: the Skipjack encryption algorithm F, an 80-bit family key that is common to all chips N, a 30-bit serial number U, an 80-bit secret key that unlocks all messages encrypted with the chip Hmmm. A thirty bit serial number. And, we are told, the unit key U is derived deterministically from this serial number. That means that there are only one billion possible unit keys. To generate the unit key for a serial number N, the 30-bit value N is first padded with a fixed 34-bit block to produce a 64-bit block N1. S1 and S2 are then used as keys to triple-encrypt N1, producing a 64-bit block R1: R1 = E[D[E[N1; S1]; S2]; S1] . Similarly, N is padded with two other 34-bit blocks to produce N2 and N3, and two additional 64-bit blocks R2 and R3 are computed: R2 = E[D[E[N2; S1]; S2]; S1] R3 = E[D[E[N3; S1]; S2]; S1] . R1, R2, and R3 are then concatenated together, giving 192 bits. The first 80 bits are assigned to U1 and the second 80 bits to U2. The rest are discarded. The unit key U is the XOR of U1 and U2. U1 and U2 are the key parts that are separately escrowed with the two escrow agencies. Hmmm. We must assume that generating the unit key U from the serial number N rather than generating it from a randomly selected U1 and U2 is an intentional way of assuring a "fail safe" for the government -- U is completedly determined given S1, S2 and N. If S1 and S2 do not change they constitute effective "master keys" (along with F), the theft of which (or the possession of which by various authorities) completely obviates the security of the system. However, more interestingly, we know, for a fact that if S1 and S2 are fixed no matter what the keyspace for U is no more than 2^30. Why not pick U1 and U2 at random? Why this interesting restriction of they key space if it NOT to provide an additional back door? I find it disturbing that at the very best my security is dependant on approximately 30 bytes worth of information that could be written on the back of a napkin. Even if S1 and S2 change periodically, the rationale behind this restriction in the size of the keyspace seems strange if one is assuming that the goal is security -- and makes perfect sense if the goal is an illusion of security. If S1 and S2 do not change, even if they remain secret I wonder if they can somehow be back-derived given enough unit key/serial number pairs. We are assured that this cannot happen -- but no one understands how Skipjack works outside of government officials and, soon, foreign intelligence services that gain the information via espionage. Presumably we will eventually have the information as well -- reverse engineering gets more and more advanced every year -- but by the time we know it may be too late. As a sequence of values for U1, U2, and U are generated, they are written onto three separate floppy disks. The first disk contains a file for each serial number that contains the corresponding key part U1. The second disk is similar but contains the U2 values. The third disk contains the unit keys U. Agent 1 takes the first disk and agent 2 takes the second disk. The third disk is used to program the chips. After the chips are programmed, all information is discarded from the vault and the agents leave. The laptop may be destroyed for additional assurance that no information is left behind. None of this makes me feel the least bit secure. The silly notion of "destroying the laptop" appears to be yet another bizarre distraction. We all know that you can't read data from DRAM that has been turned off for more than a few moments. On the other hand, what we don't know is why there is a need to generate the unit keys from S1 and S2 in the first place other than to weaken the system. We don't know if the agents in question would resist a million in cash a piece for their information -- its probably worth hundreds of million, so you can make the bribe arbitrarily hard to resist. And to tell you the truth, doing this in a "vault" rather than in Joe Random Tempest-shielded Room with a laptop computer seems like melodrama designed to make high-school dropouts from Peoria impressed -- but it does very little for most of the rest of us. The protocol may be changed slightly so that four people are in the room instead of two. The first two would provide the seeds S1 and S2, and the second two (the escrow agents) would take the disks back to the escrow agencies. What would this provide? Lets say the escrow agencies are the ACLU and the NRA and their agents personally take back the disks and are always honest. Who cares? The NSA must be laughing out loud, because they have the algorithm to regenerate U given N and likely don't need to steal they keys as they effectively already have them. -- Perry Metzger [email protected]
7
trimmed_train
310
I agree totally with you! Amen! You stated it better and in less world than I did.
8
trimmed_train