?

2002-04-08 Thread

Hello: (If you can't read the email,please click here 
http://www.jjyx.com/serve/serve.htm)   
Thank you

×ð¾´µÄÏÈÉú/Ůʿ£º

ãyºÓÖ®ÐǏV¸æ·þ„Õ£º ×îµÍÁ®µÄÐû‚÷ÊÖ¶Î


Ò» 
V¸æà]¼þ£º¿É¸ù“þÄúµÄÐèÒª£¬ÔڇøƒÈÖƶ¨…^Óò£¬µØücºÍÐИIßMÐЏV¸æà]¼þÐÅÏ¢°lÑµÈ¡£ÆäÌØücÊÇ£º¹ ‡úV£¬
•rЧ¸ß£¬ƒr¸ñµÍ¡£10Èf·â¶¨Ïòà]¼þ°lËͲÅ200Ôª£¬1000Èfà]¼þµØÖ·³öÊۃH50Ôª¡£V¸æà]¼þԔ¼šˆóƒrՈüc“ô£º
http://www.jjyx.com/serve/advertise.htm  
ُÙI200ÔªÒÔÉÏ·þ„ÕÕ߸¶ËÍ3¿î¿‚ƒrÖµ800ÔªµÄà]¼þȺ°lܛ¼þ ÍØÒ×
ÓʼþÌؿ죨ÖøÃûà]¼þȺ°lܛ¼þ£¬Ô­ƒr200Ôª£© 
ÍØÒ×ÓʼþѲ²¶V3.54C£¨ÖøÃûà]¼þ¶¨ÏòËÑË÷ܛ¼þ£¬Ô­ƒr268Ôª£©  ÓÊ
¼þÔÚÏßУÑéÆ÷V4.1£¨40ÃÀ½ð£©¡ìÈô†ÎªšÙÙI£¬Ã¿‚€50Ôª¡ì 
Î҂ƒ“íÓа´È«‡øµØ…^£¬ÐИI·ÖµÇ§Èfà]¼þµØÖ·¼°Íê
ÉƵİlÑϵ½y£¬ëS•ržéÄãÌṩMÒâµÄ·þ„Õ¡£˜OÓöëyµÃ£¬Ús¿ìÐЄӰɣ¬×ŒÄãµÄÆó˜I£¬¹«Ë¾Á¢¼´ÕÆÎÕÉ̙C‚÷ýµÄÃü
Ã}--V¸æE-MAIL¡£

¶þ 
¾W½jÐÅÏ¢°lÑ£ºãyºÓÖ®ÐÇ¿ÉÒԌ¢ÄãµÄäNÊÛ£¬ÙÙI£¬ÕÐÉÌ»òºÏ×÷µÈÉ̘IÐÅÏ¢×ԄӰlÑµÀÊÀ½çÖªÃûµÄ3300¶à‚€ÙQ
Ò×¹«¸æ°åºÍ‡øƒÈÉÏǧ‚€BBS£¬Õ“‰¯¹«¸æµÈ¡£×î´óÏÞ¶ÈÌá•NÄãµÄÉ̘I™C•þ¡££¨³¬Öµƒr200Ôª£©

Èý ËÑË÷ÒýÇæÔ]ƒÔ  
ŽÍÄúµÇê‘È«Çò6000‚€Ó¢ÎÄËÑË÷ÒýÇæ(ÈçYAHOO£¬GOOGLEDµÈ)£¬ßM200¸öÖÐÎÄËÑË÷ÒýÇæ(ÈçÐÂÀË£¬
ÑÅ»¢£¬Ïã¸ÛÌíß_ËÑË÷µÈ)²¢Ãû´Îλ¾ÓÇ°ÁС£×ŒÄãµÄ¾WÕ¾ÏíÅcÈ«Çò¡££¨³¬Öµ·þ„Õ£¬Ìػ݃r200£©

ËÄ 
Ö÷™C×âÓã¬ÓòÃûÔ]ƒÔ£¬¾WÕ¾Ñu×÷¡£1.ÿ200Õ×WEB¿ÕégÿÄêÖ»Ðè250Ôª£¬È«Ð·þ„ÕÆ÷£¬100MŽ§Œ’£¬ÖЇøëŠÐřC
·¿Œ’Ž§½ÓÈë¡£¡£2.‡øëH픘OÓòÃûÔ]ƒÔÿÄêÖ»Ðè100Ôª¡£3.Ìṩ¸÷·N´óÖÐСÆó˜I£¬É̼ҽ¨Õ¾·½°¸¡£Ô”ÇéՈüc“ô£º
http://www.jjyx.com/serve/webdesign.htm



ãyºÓÖ®ÐÇÉ̄ՏV¸æ·þ„Õ¾WÖ·£ºhttp://www.jjyx.com/serve/advertise.htm 

´ËÐÅՈÎð»ØÍ£¬Â“‚S×ÉԃՈíÐÅ£º[EMAIL PROTECTED]   [EMAIL PROTECTED]

Õ\Ñû¸÷½çÅóÓÑÇ°íǢՄºÏ×÷¡£

   ÖÂ
¶Y

ãyºÓÖ®ÐÇ
http://www.jjyx.com



If you can't read the email,please click here http://www.jjyx.com/serve/serve.htm  
Thank you




Indymedia; important and pretty damned thrilling alternative coverage of the news

2002-04-08 Thread matthew X

http://firstmonday.org/issues/issue7_4/hyde/index.html
Contents
Introduction
A Response to Corporate Ownership of the Media
The Alternative Press Tradition and the New Media
Birth and Development of Indymedia
The Spread of Indymedia
Indymedia at Work
The Impact of the Indymedia Movement

Free thought, necessarily involving freedom of speech 
press, I may tersely define thus: no opinion a law --
no opinion a crime.
---Alexander Berkman




Re: FUCANN Fully UnCentrallized Authority for Naming and Numbers

2002-04-08 Thread Graham Lally

Frob the Builder wrote:
 The problem comes when the server a domain points to is the map
for several domains, say via Virtual Hosts or selected forwarding. Many servers
use this if they're on a dedicated web-hoster, or for subdomains.
 
 Ahah, because the 'physical' server uses the URL to map to 'virtual'
 servers.
 You're right, the Rev 1.0 plan doesn't handle that.

This only applies to HTTP requests though, AFAIK. The easiest work around, I 
figure, is a translation proxy that you run (locally) and channel all requests 
through. This proxy could look up the virtual mapping from a local domain to a 
legacy domain and vice versa. Not big on proxies myself, so not sure how 
feasible it'd be to either build a custom one, or to adapt an existing one.

Off to look through Squid...

.g
-- 
...not much (legal) material is out there that's full of graphics and in
a consumer-friendly format to create the need for DSL. - Jack Valenti

http://www.exmosis.net/Sometimes I use Google instead of pants.




TV/Uydu Yayinlarina Artik Sifre Kisitlamasi Yok! -hqbdccnh

2002-04-08 Thread ibnrgxog


Sayin Internet Kullanicisi,

Turkiye'de yayin yapanlar basta olmak uzere, Dunya'daki tum sifreli TV kanallarini 
cozen ve basit bir TV kartiyla bu yayinlari bilgisayarinizdan size izleme olanagi 
saglayan, sifre kirici programlarin kayitli oldugu,

DECODER CD (v2.0) satisa sunulmustur (40 EURO + KDV).
(Digital, Analog, d2Mac ve Nagra formatindaki tum yayinlar icindir)

Garantilidir, odemeli olarak gonderilir. 
Detayli bilgi isteyenlere elektronik tanitim brosurlerimiz gonderilecektir 

Net-Pa Internet Marketing Center Ltd. Sti.® 
A. Menderes Cad. Atagun Is Merkezi, Kat: 4 Sakarya, TR 
TEL: 0 (264) 281 38 85 (PBX)  ICQ: 572 98 144   
Abdullah Güçlü, GSM: 0 (532) 310 49 16 (09:00-17:00)   
Germany: 0049 (172) 682 01 69 - Belgium: 0032 (494) 25 02 30

CC. A: 1-830



Interest Rates are Dropping How do you Capitalize? YPHBHWA

2002-04-08 Thread VERA WEAVER

Compare Now Online + Save! Dear Homeowner,Now is the time to take advantage of falling interest rates!There is no advantage in waiting any longer.Refinance or consolidate high interest credit card debt into a low interest mortgage. Mortgage interest is tax deductible, whereas credit card interest is not.You can save thousands of dollars over the course of your loan with just a 0.25% drop in your rate!Our nationwide network of lenders have hundreds of different loan programs to fit your current situation:RefinanceSecond MortgageDebt ConsolidationHome ImprovementPurchaseLet us do the shopping for you...IT IS FREE!CLICK HEREPlease CLICK HERE to fill out a quick form. Your request will be transmitted to our network of mortgage specialists who will respond with up to three independent offers.This service is 100% free to home owners and new home buyers without any obligation.Data FlowNational AveragesProgramRate30Year Fixed6.375%15Year Fixed5.750%5Year Balloon5.250%1/1Arm4.250%5/1Arm5.625%FHA30 Year Fixed  6.500%VA 30 Year Fixed6.500%You did all the shopping for me. Thank you!-T N. Cap.Beach, CA...You helped me finance a new home and I got a very good deal.- R H. H.Beach, CA..it was easy, and quick...!-V S. N.P.Beach, WATo be removed from this list please visit : http://61.129.81.52/remove/remove.htm








LA INGENIERIA DEL EXITO

2002-04-08 Thread UNIVERSITY

Publi/Coa@ch Motivación
 LA INGENIERIA DEL EXITO PARA [EMAIL PROTECTED]
Se estan imponiendo los asesores terapeutas en Coach.
-
 
Oportunidad unica de seguir a distancia y aun precio muy asequible.
Un Curso diplomado de MOTIVACION Y COACH.N.A.C
 
LAS PRINCIPALES EMPRESAS DEL MUNDO CONTRATAN A 
EXPERTOS EN MOTIVACION Y COACH.LAS CONSULTAS DE LOS 
TERAPEUTAS COACH SON ALTAMENTE VISITADAS EN TODO EL 
MUNDO.
Algunos talleres y seminarios de Coach y Motivación superan en coste a 
muchos Masters.
Solo hay que mirar notas de prensa y anuncios de los principales 
periodicos del mundo.
Le ofrecemos en primicia:
 
CURSO INTEGRAL DIPLOMADO DE EXTENSION UNIVERSITARIA
SOBRE:
 
MOTIVACION Y COACH.NAC
---
Lo que no le enseñaran en ninguna parte puede estar seguro.
 
VIVIR MOTIVADO Y MOTIVAR A LOS DEMAS
 
Los resultados se producen provocados por una accion,PASE A LA 
ACCION.La motivación da energia y dirección .
Conoce usted la diferencia entre una persona Exitosa y una persona 
Fracasada ...?.Piense pero camine
 
Sabe que es lo que separa a los Ganadores de los Perdedores .?A las 
personas felices y a los que no lo son.?.Los resultados son la puesta en 
marcha de proyectos de diverso indole.
 
Estas simples preguntas, se las hecho alguna vez . Gracias a un grupo 
de personas, estudiosas del exito por mas de 40 años(Neuro Linguistic 
Association y Coach) ponen ahora a su disposicion, tecnicas y consejos 
que le daran un extraordinario valor a su vida y lo motivaran llevaran a 
alcanzar el exito en todos los ordenes de la vida!.TENGALO SEGURO.
 
Adquiera mayor efectividad en todas sus relaciones personales y 
profesionales, con la ayuda de nuestro Seminario digital de Coach 
Conozca las ultimas tecnicas y consejos utiles para poder proyectar su 
vida en una forma positiva y prospera. 
 
EN QUE CONSISTE EL COACHING ? 
Las personas son correlativas a como perciben una situación. Como el 
coaching se apoya en el compromiso de producir acciones sin 
precedentes, es necesario cambiar la forma de observar de las personas, 
o sea constituirlo en un observador diferente, para esto las personas 
aprenden nuevas prácticas y técnicas..
El objetivo central de la actividad del coach es desarrollar la capacidad 
de acción de la otra persona.
 
Un buen progama de coach deriva en el logro de los resultados 
deseados.
 
Este seminario e explicara todo de un modo muy sencillo.
 

CUAL ES LA RAIZ FILOSOFICA DEL COACHING ?
 
El Coaching se asienta sobre el marco teórico provisto por la Ontología 
del Lenguaje, que ofrece una nueva interpretación de lo que significa ser 
humano. 
Los postulados básicos de la Ontología del lenguaje son:
 
- Interpretar a los seres humanos como seres lingüísticos
- Interpretar al lenguaje como generativo
- Interpretar que los seres humanos se crean a sí mismos en el lenguaje y 
a
través de él 
 
Los principios generales son:
- No sabemos cómo las cosas son. Sólo sabemos cómo las interpretamos.
- No sólo actuamos de acuerdo a cómo somos, también somos de 
acuerdo a 
cómo actuamos. La acción genera ser. Uno deviene de acuerdo a lo que 
hace. 
El coaching impulsa hacia el triunfo.
 
CONTENIDO PROGAMA 
 
Modulos Didacticos
 
1.MOTIVACION Y DESARROLLO PERSONAL
 
2.AUTO COACH DESDE LA PERSPECTIVA NAC
 
3.DESARROLLO COACHING
 
4. RELACIONES HUMANAS 
 
5. TECNICAS DE MOTIVACION 
 
6. MOTIVACION DE GRUPOS DE TRABAJO 
 
7. TECNICAS PROYECTIVAS E IDEAS CREATIVAS
 
8. MODELOS DE COMPORTAMIENTO Y ACCION MOTIVADA 
 
9.RESOLUCION DE CONFLICTOS Y PROBLEMAS
 
10.ACCION DINAMICA
 
11.LIMITACION DE ESTRES
 
12.DESARROLLO DE LA INTELIGENCIA EMOCIONAL
 
13.SINTESIS PNL
 
14.PERSISTENCIA
 
15.TECNICAS DE COMUNICACION 
 
16.TECNICAS DE AUTOAYUDA
 
17.TECNICAS DE AUTOAYUDA MENTAL POWER TRAINING N.A.C
 
18.PROYECTO ALUMNO
 
Progama sobre 800.hojas de texto enviado por e-mail formato word y 
pdf.diapo micro point.
Entrega de Diploma.200.horas certificadas.Tiempo aprox.30-40.dias.
Abierto a personas mayores de 18.años.
Coste:
España,Europa,Usa:
300.EUROS.
250.A la Matricula resto(50Euros) a la entrega del diploma.
Hispanoamerica:
200.EUROS.
150.A la Matricula resto(50Euros) a la entrega del diploma.

Al acabar este curso se producira un cambio profundo en su modo de ver 
las cosas y se sentira obligado a establecer cambios positivos. 
 
  Inicio el dia 20 de Abril 
 

Envie un e-mail desde [EMAIL PROTECTED] a [EMAIL PROTECTED]  (ASUNTO 
INTERES EN CURSO-MC) y le enviaremos algunas muestras del formato 
didactico del taller,condiciones.
 
Info-Enseñanza
 
Atentamente:
 
Maria Bravo Lujan
Broker-University e Instituto Tecnologico
Alicante
[EMAIL PROTECTED]

--
Si desea ser borrado:
[EMAIL PROTECTED]




LA INGENIERIA DEL EXITO

2002-04-08 Thread UNIVERSITY

Publi/Coa@ch Motivación
 LA INGENIERIA DEL EXITO PARA [EMAIL PROTECTED]
Se estan imponiendo los asesores terapeutas en Coach.
-
 
Oportunidad unica de seguir a distancia y aun precio muy asequible.
Un Curso diplomado de MOTIVACION Y COACH.N.A.C
 
LAS PRINCIPALES EMPRESAS DEL MUNDO CONTRATAN A 
EXPERTOS EN MOTIVACION Y COACH.LAS CONSULTAS DE LOS 
TERAPEUTAS COACH SON ALTAMENTE VISITADAS EN TODO EL 
MUNDO.
Algunos talleres y seminarios de Coach y Motivación superan en coste a 
muchos Masters.
Solo hay que mirar notas de prensa y anuncios de los principales 
periodicos del mundo.
Le ofrecemos en primicia:
 
CURSO INTEGRAL DIPLOMADO DE EXTENSION UNIVERSITARIA
SOBRE:
 
MOTIVACION Y COACH.NAC
---
Lo que no le enseñaran en ninguna parte puede estar seguro.
 
VIVIR MOTIVADO Y MOTIVAR A LOS DEMAS
 
Los resultados se producen provocados por una accion,PASE A LA 
ACCION.La motivación da energia y dirección .
Conoce usted la diferencia entre una persona Exitosa y una persona 
Fracasada ...?.Piense pero camine
 
Sabe que es lo que separa a los Ganadores de los Perdedores .?A las 
personas felices y a los que no lo son.?.Los resultados son la puesta en 
marcha de proyectos de diverso indole.
 
Estas simples preguntas, se las hecho alguna vez . Gracias a un grupo 
de personas, estudiosas del exito por mas de 40 años(Neuro Linguistic 
Association y Coach) ponen ahora a su disposicion, tecnicas y consejos 
que le daran un extraordinario valor a su vida y lo motivaran llevaran a 
alcanzar el exito en todos los ordenes de la vida!.TENGALO SEGURO.
 
Adquiera mayor efectividad en todas sus relaciones personales y 
profesionales, con la ayuda de nuestro Seminario digital de Coach 
Conozca las ultimas tecnicas y consejos utiles para poder proyectar su 
vida en una forma positiva y prospera. 
 
EN QUE CONSISTE EL COACHING ? 
Las personas son correlativas a como perciben una situación. Como el 
coaching se apoya en el compromiso de producir acciones sin 
precedentes, es necesario cambiar la forma de observar de las personas, 
o sea constituirlo en un observador diferente, para esto las personas 
aprenden nuevas prácticas y técnicas..
El objetivo central de la actividad del coach es desarrollar la capacidad 
de acción de la otra persona.
 
Un buen progama de coach deriva en el logro de los resultados 
deseados.
 
Este seminario e explicara todo de un modo muy sencillo.
 

CUAL ES LA RAIZ FILOSOFICA DEL COACHING ?
 
El Coaching se asienta sobre el marco teórico provisto por la Ontología 
del Lenguaje, que ofrece una nueva interpretación de lo que significa ser 
humano. 
Los postulados básicos de la Ontología del lenguaje son:
 
- Interpretar a los seres humanos como seres lingüísticos
- Interpretar al lenguaje como generativo
- Interpretar que los seres humanos se crean a sí mismos en el lenguaje y 
a
través de él 
 
Los principios generales son:
- No sabemos cómo las cosas son. Sólo sabemos cómo las interpretamos.
- No sólo actuamos de acuerdo a cómo somos, también somos de 
acuerdo a 
cómo actuamos. La acción genera ser. Uno deviene de acuerdo a lo que 
hace. 
El coaching impulsa hacia el triunfo.
 
CONTENIDO PROGAMA 
 
Modulos Didacticos
 
1.MOTIVACION Y DESARROLLO PERSONAL
 
2.AUTO COACH DESDE LA PERSPECTIVA NAC
 
3.DESARROLLO COACHING
 
4. RELACIONES HUMANAS 
 
5. TECNICAS DE MOTIVACION 
 
6. MOTIVACION DE GRUPOS DE TRABAJO 
 
7. TECNICAS PROYECTIVAS E IDEAS CREATIVAS
 
8. MODELOS DE COMPORTAMIENTO Y ACCION MOTIVADA 
 
9.RESOLUCION DE CONFLICTOS Y PROBLEMAS
 
10.ACCION DINAMICA
 
11.LIMITACION DE ESTRES
 
12.DESARROLLO DE LA INTELIGENCIA EMOCIONAL
 
13.SINTESIS PNL
 
14.PERSISTENCIA
 
15.TECNICAS DE COMUNICACION 
 
16.TECNICAS DE AUTOAYUDA
 
17.TECNICAS DE AUTOAYUDA MENTAL POWER TRAINING N.A.C
 
18.PROYECTO ALUMNO
 
Progama sobre 800.hojas de texto enviado por e-mail formato word y 
pdf.diapo micro point.
Entrega de Diploma.200.horas certificadas.Tiempo aprox.30-40.dias.
Abierto a personas mayores de 18.años.
Coste:
España,Europa,Usa:
300.EUROS.
250.A la Matricula resto(50Euros) a la entrega del diploma.
Hispanoamerica:
200.EUROS.
150.A la Matricula resto(50Euros) a la entrega del diploma.

Al acabar este curso se producira un cambio profundo en su modo de ver 
las cosas y se sentira obligado a establecer cambios positivos. 
 
  Inicio el dia 20 de Abril 
 

Envie un e-mail desde [EMAIL PROTECTED] a [EMAIL PROTECTED]  (ASUNTO 
INTERES EN CURSO-MC) y le enviaremos algunas muestras del formato 
didactico del taller,condiciones.
 
Info-Enseñanza
 
Atentamente:
 
Maria Bravo Lujan
Broker-University e Instituto Tecnologico
Alicante
[EMAIL PROTECTED]

--
Si desea ser borrado:
[EMAIL PROTECTED]




brilliancy

2002-04-08 Thread Anonymous

Any attacker who can control 100,000 machines is a major force on the
internet, while someone with a million or more is currently unstoppable:
able to launch massively diffuse DDOS attacks, perform needle in a
hayfield searches, and commit all sorts of other mayhem. We already
understand how worms could be used to gain control of so many machines.
Yet the recent revelation that Brilliant Digital Media has bundled a
small trojan with KaZaA has underscored another means by which an
attacker could gain control of so many machines: poorly secured
automatic updaters. If an attacker can distribute his own code as an
update, he can take control of millions of machines. 

http://www.cs.berkeley.edu/~nweaver/0wn2.html

So, now, how hard would it be to use this mechanism to upload PGPNet with 
opportunistic encryption enabled to millions of hosts ?




(OTCBB: PAXM) Special Investment Alert

2002-04-08 Thread bobford
Title: Investors





  
This message has been
  sent to you as a subscriber of the "Financial Update" in compliance with
  our strict anti-abuse regulations. We will continue to bring you valuable
  offers on the products and services that interest you most. If you do not
  wish to receive further mailings, please click below and enter your email
  at the bottom of the page. You may then rest-assured that you will never
  receive another email from us again. 
  UNSUBSCRIBE ME PLEASE 

  

  STOCK
ALERT!

  
  
  
 
  
  Alert: Premier
  Axium ASP (OTCBB: PAXM) positions itself for enormous growth
  in 2002 through aggressive acquisition plan
  
  

  


  SYMBOL
PAXM
CURRENT PRICE $0.0015
52 WEEK HIGH $3.68
52 WEEK LOW $0.001


  

  
  
Investment Highlights

  
 According
  to the IDC, in 1998 the U.S. market for Human Resources outsourcing
  services was approximately $6.7 billion and is expected
  to reach $10.2 billion in 2003.
  
  
  

  PAXM president Anthony Burnham, formerly of Nestle-Carnation,
  has outlined an intense acquisition strategy for the
  company. It is projected that PAXM will achieve
  approximately $250 million in assets within the next
  year as it moves forward toward its goal of becoming the leader
  in providing complete infrastructure services.
  
  
  

  PAXM has invested millions of dollars in creating
  its unparalleled
   proprietary Integrated
  Service Branch to provide ultimate
   human capital management, strategic
  planning, and information
   technology services to sustained growth
  companies.
  
  

  
  

  
  

  Company
Background

  
  

  
  
Cutting edge, rapid growth companies
  just can't do it all. With managing their own internal
  growth and marketing strategies, many find it virtually impossible
  to deal with multiple providers of infrastructure services.
  Problem? Not for PAXM. Its client-centric Integrated
  Service Branch (ISB) is the ultimate one stop infrastructure service
  provider with a focus on sustained high-growth companies.
  
Independent research has shown that the
  high-growth company segment accounts for 95% of all net job growth
  in the U.S. These companies produce 20 times more sales
  per employee, have 5 times the market share, and 25% greater profitability.
  PAXM management realizes the enormous potential of
  this market and has developed a proprietary Integrated Service
  Branch to provide an end-to-end array of high-touch and web-based
  services to its target market, through both a physical office presence
  and an integrated web-based solution.
PAXM is able to provide top quality service
  in all areas through its extensive list of alliance partners.
  It deals with top companies in network management, business insurance,
  and disaster recovery. A few premier partners are as follows:
Alliance Partner
  Application 
Aon Corporation
  Business insurance  risk programs
Acordia, Inc.
  Health  welfare insurance program
Sungard Data Systems,
  Inc.
  Continuity and disaster recovery
Best Software
  Inc.
  Web-based HR management systems
Unisys Corporation
  Network management IS installation
Virtual CEO, Inc.
  Web-based strategic assessments
  
  

  
  

  Industry
Stats

  
  

  
  
  
  Industry data statistics show
nothing but potential for PAXM and its Integrated Service Branch
  

Insight on the News Email Edition

2002-04-08 Thread Insight on the News

INSIGHT NEWS ALERT!

A new issue of Insight on the News is now online

...

IS THE AIR FORCE GETTING (ITS WINGS) CLIPPED?

Kelly O'Meara reveals that both current and former employees of DynCorp, one of 
the federal government's largest contractors, have accused the company of taking 
a fly-by-night attitude toward maintenance of military aircraft. 

http://www.insightmag.com/news/229690.html

...

WHY CLINTON SCUTTLED THE PATRIOT MISSILE

As rogue states were upgrading their theater-missile arsenals, the Clinton team 
thwarted U.S. deployment of the next generation of Patriot antimissile 
batteries. 

http://www.insightmag.com/news/229693.html



 SUBSCRIBE TO THE INSIGHT PRINT EDITION TODAY!

 And Save 72% (Off Our Newsstand Price)

 http://www.collegepublisher.com/insightsub/subform1.cfm



HOW THE BUSH TEAM THUMBS ITS NOSE AT FOIA

Timothy Maier writes that he Bush administration has taken a hard line against 
releasing government records as required by law. Critics from the left and the 
right are responding with lawsuits. http://www.insightmag.com/news/229694.htm

...

BUSH'S N0-WIN WEEK

Try as he might to clear the air for education and domestic matters, President 
George W. Bush was unable to keep the Middle East crisis from dominating 
domestic attention.

http://www.insightmag.com/news/229797.html

...

SADDAM'S PALESTINIAN SECURITY BLANKET

Jamie Dettmer tells us that in hindsight, George H.W. Bush had it much easier 
than the current president when planning his international coalition for a U.S.-
led strike against Iraq — at least the Israeli-Palestinian dispute wasn't 
threatening to spill over into a wider regional war.

http://www.insightmag.com/news/229705.html



 SUBSCRIBE TO THE INSIGHT PRINT EDITION TODAY!

 And Save 72% (Off Our Newsstand Price)

  http://www.collegepublisher.com/insightsub/subform1.cfm




You have received this newsletter because you have a user name and password at 
Insight on the News.
To unsubscribe from this newsletter, visit 
http://www.insightmag.com/main.cfm?include=unsubscribe;. You may also log into 
Insight on the News and edit your account preferences on the Web.

If you have forgotten or don't know your user name and password, it will be 
emailed to you after visiting the following link:
http://www.insightmag.com/main.cfm?include=emailPasswordserialNumber=16oai891z5[EMAIL PROTECTED]






downl1

2002-04-08 Thread downl1 . autoresponder

Dear valued visitor of our download area
   
You can download the requested file from the following link:
www.mediacrypt.com/engl/Downloads/ideaplus.zip 
The file contains the basic IDEA reference code in C/C++ as is without detailed 
documentation. No technical support is available.

For professional implementation using object oriented programming we offer Software 
Development Kits (SDKs) for C/C++ and Java(tm) as part of the IDEA License Packs.
The SDKs offer you a set of well-proven and tested crypto tools for faster and 
optimized implementation of IDEA into security products. 
They come with full documentation, including test suites, and technical support, 
allowing the implementation of IDEA without extensive knowledge in cryptography.
Further details on the SDKs are available at: 
http://www.mediacrypt.com/engl/Downloads/SDK%20Oct%20Final.pdf
   
Best regards
   
The MediaCrypt Team
[EMAIL PROTECTED]
   
   
   
  
  
 
  

  




--SEND SAFELY To 10,000 List 50% Off Only $5.00

2002-04-08 Thread --List Central

1/2 Price Sale!
SEND SAFELY EVEN WITH FREE ISP's!

=
~Specials~
FREE Stealth Mass Mailer with orders of 50,000!
With orders of 250,000:
   -One Month FREE Subscription to 5-10 Blind
mail servers/day M-F! (never lose your ISP again!)
Completely hides your IP information!
   -FREE Demo of an e-mail program that will send 
your e-mails safely, even with FREE ISP's.  NO Risk! 
=
- FRESH 10,000 List 4-7-02!! 

For website details, click below: 
mailto:[EMAIL PROTECTED]?Subject=EmailInfo2

--Do you want to start getting REPLIES for your offer?
--Do you want those replies to be from someone who's
   actually interested in what you have to offer?

**Visit our site to get the MOST responsive e-mail leads
  available!** 

 10,000 e-mails for only $ 5 NEW
 50,000 e-mails for only $10
250,000 e-mails for only $20

For website details, click below: 
mailto:[EMAIL PROTECTED]?Subject=EmailInfo2


--
**Not an experienced direct mailer? We can send your ad for you!
SEE SITE for more details and pricing!
---


- SPECIALS! -
--
**FREE with EVERY order:
  Demo of ListMan e-mail manager software 

**Orders of 50,000 or more:
  FREE copy Stealth Mass Mailer to send your messages!  
-This is not a demo but a permanent license for the software!

**Orders of 250,000 :
- InfoDisk  with 1000+ Money Making Reports
- CheckMAN software
-One Month FREE Subscription to 5-10 Blind
  mail servers/day M-F! (never lose your ISP again!)
  Completely hides your IP information!


___

To be removed from future mailings: 
mailto:[EMAIL PROTECTED]?Subject=Remove 





I Saw Your Email -

2002-04-08 Thread mms281274

I saw your email on a website I visited yesterday, and thought you might be interested 
in this.

A few months back I joined a program and then...promptly forgot about it. You may have 
done this yourself sometime...you intend to work the program but then get caught in 
your day-to-day activities and it's soon forgotten.

The program was free to join so maybe I just didn't take it veryseriously.

Anyway, near the end of May I received a letter from my coach (Scott Johnson) 
informing me that I had more than 2000 PAID members in my downline!

As you can imagine, I was very skeptical. After all, how could I have more than 2000 
paid members under me in a program that I had never promoted?

I took the time to check out the site...then wrote to Scott asking for confirmation 
that these were paid members and not just free sign-ups...like me :)

Well, it was true...I had 2365 paid members in my downline. This in a program that I 
had never worked!

All I had to do was upgrade to a paid membership before the end of the month and I 
would have my position locked in and a downline of 2365 people.

You can bet I wasted no time in getting my membership upgraded!

I can tell you, if I had known what was happening with this program, I would have 
become an active paid member months ago!

With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, 
which is a minimum of $1,000, arrives every month...on time.  And he achieved this 
after only three months!

How would you like to lock your position in FREE while you check out this opportunity 
and watch your downline grow?

You can join FREE:

To sign up simply reply to: [EMAIL PROTECTED]
Type in Subject: Send My FREE Membership (required)
Type in Letter: Your First and Last Name (required)
Your Email Address (if different from above)

We will confirm your position and send you a special report as soon as possible, and 
also Your Free Member Number.

I'll get you entered and let you know how you can keep track of your growing downline.

That's all there's to it.

I'll then send you info, and you can make up your own mind.

Warm regards,

Malcolm Schulstad

P.S. After having several negative experiences with network marketing companies I had 
pretty much given up on them. This company is different--it offers value, integrity, 
and a REAL opportunity to have your own  home-based business... and finally make real 
money on the internet.

Don't pass this up..you can sign up and test-drive the program for FREE.  All you need 
to do is get your free membership.

9434QVBf9-012QHwb1690jCmf6-621uUPN866l35


I Saw Your Email -

2002-04-08 Thread mms281274

I saw your email on a website I visited yesterday, and thought you might be interested 
in this.

A few months back I joined a program and then...promptly forgot about it. You may have 
done this yourself sometime...you intend to work the program but then get caught in 
your day-to-day activities and it's soon forgotten.

The program was free to join so maybe I just didn't take it veryseriously.

Anyway, near the end of May I received a letter from my coach (Scott Johnson) 
informing me that I had more than 2000 PAID members in my downline!

As you can imagine, I was very skeptical. After all, how could I have more than 2000 
paid members under me in a program that I had never promoted?

I took the time to check out the site...then wrote to Scott asking for confirmation 
that these were paid members and not just free sign-ups...like me :)

Well, it was true...I had 2365 paid members in my downline. This in a program that I 
had never worked!

All I had to do was upgrade to a paid membership before the end of the month and I 
would have my position locked in and a downline of 2365 people.

You can bet I wasted no time in getting my membership upgraded!

I can tell you, if I had known what was happening with this program, I would have 
become an active paid member months ago!

With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, 
which is a minimum of $1,000, arrives every month...on time.  And he achieved this 
after only three months!

How would you like to lock your position in FREE while you check out this opportunity 
and watch your downline grow?

You can join FREE:

To sign up simply reply to: [EMAIL PROTECTED]
Type in Subject: Send My FREE Membership (required)
Type in Letter: Your First and Last Name (required)
Your Email Address (if different from above)

We will confirm your position and send you a special report as soon as possible, and 
also Your Free Member Number.

I'll get you entered and let you know how you can keep track of your growing downline.

That's all there's to it.

I'll then send you info, and you can make up your own mind.

Warm regards,

Malcolm Schulstad

P.S. After having several negative experiences with network marketing companies I had 
pretty much given up on them. This company is different--it offers value, integrity, 
and a REAL opportunity to have your own  home-based business... and finally make real 
money on the internet.

Don't pass this up..you can sign up and test-drive the program for FREE.  All you need 
to do is get your free membership.

4738gKeb1-605XUYO8358xsOg8-875Cgid6308mRMr7-007KwQZl48


I Saw Your Email -

2002-04-08 Thread mms281274

I saw your email on a website I visited yesterday, and thought you might be interested 
in this.

A few months back I joined a program and then...promptly forgot about it. You may have 
done this yourself sometime...you intend to work the program but then get caught in 
your day-to-day activities and it's soon forgotten.

The program was free to join so maybe I just didn't take it veryseriously.

Anyway, near the end of May I received a letter from my coach (Scott Johnson) 
informing me that I had more than 2000 PAID members in my downline!

As you can imagine, I was very skeptical. After all, how could I have more than 2000 
paid members under me in a program that I had never promoted?

I took the time to check out the site...then wrote to Scott asking for confirmation 
that these were paid members and not just free sign-ups...like me :)

Well, it was true...I had 2365 paid members in my downline. This in a program that I 
had never worked!

All I had to do was upgrade to a paid membership before the end of the month and I 
would have my position locked in and a downline of 2365 people.

You can bet I wasted no time in getting my membership upgraded!

I can tell you, if I had known what was happening with this program, I would have 
become an active paid member months ago!

With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, 
which is a minimum of $1,000, arrives every month...on time.  And he achieved this 
after only three months!

How would you like to lock your position in FREE while you check out this opportunity 
and watch your downline grow?

You can join FREE:

To sign up simply reply to: [EMAIL PROTECTED]
Type in Subject: Send My FREE Membership (required)
Type in Letter: Your First and Last Name (required)
Your Email Address (if different from above)

We will confirm your position and send you a special report as soon as possible, and 
also Your Free Member Number.

I'll get you entered and let you know how you can keep track of your growing downline.

That's all there's to it.

I'll then send you info, and you can make up your own mind.

Warm regards,

Malcolm Schulstad

P.S. After having several negative experiences with network marketing companies I had 
pretty much given up on them. This company is different--it offers value, integrity, 
and a REAL opportunity to have your own  home-based business... and finally make real 
money on the internet.

Don't pass this up..you can sign up and test-drive the program for FREE.  All you need 
to do is get your free membership.

1833QlRa9-652qiKe373l19


RE: mil disinfo on cryptome

2002-04-08 Thread Khoder bin Hakkin

 Oh, and I can't believe I almost forgot--I'm sure you'll be
 tickled pink to learn that ever having had anything to do with
 you can be the kiss of death as far as getting clearance is
 concerned. From the adjudication guidelines:

 http://www.dss.mil/training/adr/adjguid/adjguidF.htm

 Conditions that could raise a security concern and may be
 disqualifying include:

d. Any foreign, domestic, or international organization or person
engaged in
 analysis, discussion, or publication of material on intelligence,
defense,
 foreign affairs, or protected technology.

However Faustine neglects to include the simple solution, that you
simply
renounce playing with Johnny:

Conditions that could mitigate security concerns include:
 b. The individual terminates the employment or discontinues the
activity upon
 being notified that it is in conflict with his or her security
responsibilities.

More interestingly, s/he neglects to include this disqualifier from
State Secrets:

Allegiance to the United States

Conditions that could raise a security concern and may be disqualifying
include:

 d. Involvement in activities which unlawfully advocate or practice
the
 commission of acts of force or violence to prevent others from
exercising
 their rights under the Constitution or laws of the United States or
of any state.

How many Congressvermin, police w/ NCIS access, FBI, judges, domestic
spooks of all flavors, etc are guilty of this?




BUSINESS PROPOSAL

2002-04-08 Thread wilson Damilo

May I briefly introduce myself. I am Wilson Damilo of
the Democratic Republic of Congo (formerly Zaire) and
the former aide de camp of the Late President Laurel
Kabila of blessed memory.

I am presently living in Nigeria on asylum. In case
you are wondering how I got your contact, I got your
contact from a source at the foreign trade office of
the Nigeria Chamber of commerce, trade and industry.

The events of the past one year in my country has been
very unfortunate. The Late president Kabila
successfully toppled the very corrupt government of
the Late Dictator Mobutu Sese Seko and ruled justly
and peacefully for a few months. Unfortunately, the
Tutsi from Goma, the Northern part of the country
rebelled against his government and since then my
country has been at war.

I am very dedicated and committed to winning the war
against the rebels until recently when to my shock I
found out that Senior Army Officers and Government
officials were stealing public funds and looting
government treasury and sending them to foreign
countries. They have exploited the war situation to
bring back the lawlessness and corruption of the
Mobutu days.

After the late President Kabila was assassinated in very
questionable circumstances, I knew I was in danger of
losing from both ends. Due to this development and as
a way of survival, I have joined the train. I have in
my possession funds amounting to US$25million.  

My problem is that the financial Law of Nigeria does
not give asylum seekers any financial rights. And
because of the economic instability and religious
crisis, I have decided that it will be unwise to
attempt investing the funds here. The climate here is
very unfavorable and as a result, I have not
disclosed even to my hosts anything about this fund.

Now I am seeking foreign assistance to transfer the
funds overseas. If you can assist, I am willing to
give you 20% of the funds, that is US$5Million. You
will understand that my entire life and future depend
on this money and I shall be very grateful if you can
assist me. The major thing I demand from you is the
absolute assurance that the money will be safe and you
will not sit on it when it is transferred to your
account.

If you are ready to be of assistance, please contact
me immediately by e-mail, so that I can furnish you
with the modalities for the transaction and what is
expected of you. I shall be most grateful if you
maintain utmost confidentiality and keep this message
entirely to yourself.

Best Regards,

MR. Wilson  Damilo

TEL : 234-1-7760618
FAX : 234-1-7593311

RESPOND TO THE BELOW EMAIL ADDRESS ([EMAIL PROTECTED]) or better still respond 
through my fax number above.

ONCE AGAIN NOTE THAT FOR THE CONFIDENTIALITY OF THIS TRANSACTION, WHEN YOU CALL ME THE 
FIRST THING YOU DO IS FOR YOU TO ASK ME WHAT IS THE CODE, AND MY RESPONSE WILL BE 
(055).IF I DO NOT TELL YOU (055) THEN KNOW YOU ARE NOT TALKING TO ME. DROP THE PHONE 
IMMEDIATELY AND CALL ME BACK TILL I GIVE YOU THE CODE WORD. THIS IS DUE TO JAMMING 
TELECOMMUNICATION DEVICES IN THIS COUNTRY AS A RESULT OF THE BOMB EXPLOSION IN A LAGOS 
MILITARY BASE RECENTLY. 






RE: out of the box

2002-04-08 Thread Jonathan Wienke

ummm, you've been to Sweden, but can't even spell it right?

-Original Message-
From: Michael Roberts [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:19 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: out of the box


weird.  I was told this when I was in sweeden, as an explaination for
the basic niceness of sweedes - ie, that they recieved in school basic
emotional education which enabled them to deal with difficult people and
situations.

true/not true ?

M


On Thu, 2002-04-04 at 08:18, [EMAIL PROTECTED] wrote:
 Citerar Michael Roberts [EMAIL PROTECTED]:
  
  In Sweeden basic emotional education for all cuts social problems down
  to a minscule amount. 
 
 Sweden has a basic emotional education for all? How come they never told me 
 that? 
 
  - Sten (born and raised in Sweden)




Increase Income-tax Free Benefits - Today!

2002-04-08 Thread Senior Market Sales
Title: Increase Income-tax Free Benefits - Today!




   
 
  
 
  
 

  The Wealth Guardian's combination of financial flexibility and 
  safety providing income tax free death benefits, long 
  term care benefits, and pays 5.5% interest rate!



   
100% MONEY-BACK GUARANTEE *
  
   
11% COMMISSION
  
   
No-lapse guarantee
  
   
Non-medical underwriting limits based on net amount at risk
  
   
Issued ages 50-85
  



  
  


  
 
   
FIRST NAME


  
   
LAST NAME


  

 
   
PHONE NUMBER


  
   
EMAIL ADDRESS


  

 
   



  

  



   


*See policy for details. Policy benefits may vary by state. Policy form 3000, 
  is not yet available in all states.
We don't want anybody to receive our mailings who 
  does not wish to receive them. This is professional 
  communication sent to insurance professionals. To be removed from 
  this mailing list, DO NOT REPLY to this message. Instead, go here: 
  http://www.InsuranceIQ.com/optout
  

  

  






Earn 36% monthly through fully secured accounts receivable acquisitions

2002-04-08 Thread John





INVESTOR ALERT
 MAKE 36% FULLY SECURED 


Is 
the stock market roller coaster making you worried? 

Join 
the flight to REAL returns!
Earn 
3% monthly through fully secured accounts receivable 
acquisitions!

Discover what banks have been doing for decades. Harness the power and liquidity of fully 
secured accounts receivable acquisitions. 


IMAGINE $ 10,000.00 TODAY 

COULD BE WORTH $13,600.00 IN 12 
MONTHS!!
or $14,200.00 
COMPOUNDED!


Get in touch with us 
TODAY!
Tel: +(514) 733 
1009orFAX:+514 733 
8909
or
[EMAIL PROTECTED]

Important: 
Mention yourName,State and daytime/nightime phone number and one of our 
Account Executives will contact you within 
24hrswith all the information on receiving your personal, in depth 
information package.We will not email 
information!
Get in touch with us 
TODAY!

Serious Inquiries Only 
Minimum $10K Investment
Secure and insured 
investment
We accept foreign 
investors
SEC registered



To be removed from our lists: [EMAIL PROTECTED] with 
"remove" in the subject 
line.


Re: mil disinfo on cryptome

2002-04-08 Thread Steve Thompson


Quoting Khoder bin Hakkin ([EMAIL PROTECTED]):
[faustine]
 More interestingly, s/he neglects to include this disqualifier from
 State Secrets:
 
 Allegiance to the United States
 
 Conditions that could raise a security concern and may be disqualifying
 include:
 
  d. Involvement in activities which unlawfully advocate or practice
 the
  commission of acts of force or violence to prevent others from
 exercising
  their rights under the Constitution or laws of the United States or
 of any state.
 
 How many Congressvermin, police w/ NCIS access, FBI, judges, domestic
 spooks of all flavors, etc are guilty of this?

Here is a classic example of disinformation.  Obviously, certain rights,
activities, etc. are from time-to-time require that various rights be
temporarily curtailed so that the important machinery of law-enforcement may
work its magic.

You're just trying to divert attention from this necessary exception to the
normal rules.  Therefore, you must be a spook.


Regards,

Steve

-- 
Just fake it.


-- 
Include 35da3c9e079dcf68ec3a608e8c0a47f6 somewhere in your
message when you reply.




HGH: Treatments to reverse aging, enhance physical and mental performance, and strengthen the immune system!14163

2002-04-08 Thread phycical

As seen on NBC, CBS, CNN, and even Oprah! The health discovery that actuallyreverses 
aging while burning fat, without dieting or exercise! 
This provendiscovery has even been reported on by the New England Journal of 
Medicine.Forget aging and dieting forever! And it's Guaranteed! 

Click below to enter our web site:
http://net.zvio.net/was/

Would you like to lose weight while you sleep!
No dieting!
No hunger pains!
No Cravings!
No strenuous exercise!
Change your life forever! 

100% GUARANTEED!

1.Body Fat Loss 82% improvement.
2.Wrinkle Reduction 61% improvement.
3.Energy Level 84% improvement.
4.Muscle Strength 88% improvement.
5.Sexual Potency 75% improvement.
6.Emotional Stability 67% improvement.
7.Memory 62% improvement.

Click below to enter our web site:
http://net.zvio.net/was/


**
If you want to get removed
from our list please email at- [EMAIL PROTECTED]
(subject=remove your email)
**




kuro5hin.org || The tears of the people run together... (fwd)

2002-04-08 Thread Jim Choate


http://www.kuro5hin.org/story/2002/4/6/174649/5326


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Guardian Unlimited Observer | International | The new liberal imperialism (fwd)

2002-04-08 Thread Jim Choate


http://www.observer.co.uk/international/story/0,6903,680094,00.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





kuro5hin.org || Burning a book before it's printed (fwd)

2002-04-08 Thread Jim Choate


http://www.kuro5hin.org/story/2002/4/7/175457/5447


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Periscope - A sophisticated strain of Anthrax (fwd)

2002-04-08 Thread Jim Choate


http://www.msnbc.com/news/735231.asp?cp1=1#investigations


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - Cost of IT security breaches double - FBI (fwd)

2002-04-08 Thread Jim Choate


http://theregister.co.uk/content/6/24747.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - MS gets leaked Win2k USB 2.0 drivers pulled, cites DMCA (fwd)

2002-04-08 Thread Jim Choate


http://theregister.co.uk/content/4/24749.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





RE: crypto question - using crypto to protect financial transactions (fwd)

2002-04-08 Thread Jim Choate


-- Forwarded message --
Date: Mon, 8 Apr 2002 11:10:39 +0200
From: Amir Herzberg [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: 'McMeikan, Andrew' [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: RE: crypto question - using crypto to protect financial transactions

I understand the goal of allowing secure and anonymous financial
transactions via the Net. I'm personally very interetested in this,
although I must admit I am also a bit concerned about the social
implications if this becomes a reality (or when it does, since I believe
it eventually will). What I'm concerned about is tax avoidance, esp. by
wealthy individuals and companies. Nobody likes taxation (at least
personally :-), but it is still the basis for operation of states - and
while changes may be good, they are also risky. 

Anyway, forgetting for a moment the question of should we do it, let's
focus on the question of how we do it :-) 

I looked up Andrew's site, and actually there're not too many details
there (yet?). I think his initial focus and question was on the issue of
whether one can trust one's public key to the financial server, and his
answer seems to be, you can if you split the key between several servers
using thershold or proactive signatures (proactive schemes allow
recovery from penetrations of servers - and btw, this is an area
deserving more implmentation efforts, beyond what we did in IBM). 

I think there may be even more critical hurdles for successful financial
crypto services. A very important one is interoperability between
different financial service providers (the companies that keep your
money... E.g. banks). Most crypto-financial efforts so far focused on a
centralized model - one bank - and that's much easier to design, but
very hard to succeed. I've done some work on secure interoperability
among providers - it was actually the main feature of IBM Micro
Payments. IBM have also applied for patent for some of the ideas. 

Another important issue is the automated management of trust and
reputation, allowing customers to make (automated) trust decisions on
providers of services and goods (including both financial services and
merchants). Here I agree with Andrew that for many applications,
financial transactions should not be reversible (disputed), and hence
trust and reputation becomes the main means for consumer protection. 

Regards, Amir Herzberg
See http://amir.beesites.co.il/book.html  for lectures and
draft-chapters from book-in-progress, `secure communication and commerce
using cryptography`; feedback welcome!
 



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]




Handcuffs for your handheld (fwd)

2002-04-08 Thread Jim Choate


http://w3-3.ibm.com/technology/news/2002/0403-datasecurity.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Slashdot | Blizzard/Vivendi Files Suit Against Bnetd Project (fwd)

2002-04-08 Thread Jim Choate


http://slashdot.org/articles/02/04/08/1510201.shtml?tid=127


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





I saw your camping info. and I thought this would interest you

2002-04-08 Thread webmaster
Title: iSun Portable Solar Charger









	
		
	
	
		
		Want guaranteed power all the time for your cell phone?
Want power anywhere, anytime, for your portable electronics?
Want to replace all your power chargers with one device?
Want a charger that can work independent of wall plugs?

		
	
	
		

		
			

View TechTV's featureon the iSun™:
		56k | 100k | 250k
			
		
		
		
	
	
		This email has been sent to you because you agreed to receive information on camping products. To be removed from this list please click the link below and you will instantly get removed from our newsletter. Thank you. This message is sent in compliance with the new email bill HR 1910. Under Bill HR 1910, passed by the 106th US Congress on May 24, 1999, this message cannot be considered spam as long as we include instructions on how to be removed, per Section HR 1910.
	





If you are receiving this email in error please click here to unsubscribeThis mail has been sent to you exclusively by www.slickpower.com



Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Adam Back

Anonymous gives some comments on some deficiencies in the properties
of the transferable ecash schemes to date:

On Mon, Apr 08, 2002 at 04:15:09AM +0200, Anonymous wrote:
 [...]
 And second, because they grow, it is possible to tell exactly how
 many hands a particular coin has passed through - just count the
 transcripts of previous spends.  So coins are not all that
 anonymous.  And further, there is no re-blinding of the earlier
 transcripts.  The Alice transcript is in the clear in all following
 uses of that same coin.  Transferred coins are recognizable and
 linkable.

While it is true that the coins are by unavoidably linkable, the
linkability will only leak information where a user happens to see the
same coin twice as it gets re-spent, as he can recognize this.  As the
chain length is also visible he knows how many hands it has gone
through since he spent it.  However he has no way to identify the
intermediate payers except the last payer.

The amount of identifying information the immediate payer discloses is
up to that payer, though some identification may be relatively hard to
avoid if there is no anonymous communication link used.

So in general the shorter the intermediate chain the more revealing
about the first and last payer in the intermediate chain the
observation is.  The more people who collude, the more chance their is
that the colluding group can find samples of respent coins and so
identify or gain information about the transactions of a target payer
or payee.

The transaction information leakage from the linkability may be fairly
limited in practice -- for example by comparison how much transaction
leakage would you expect to get as an individual or small group of
coluding individuals if you write down the serial number on a bank
note and wait until you see it again -- or even if a bank were to
perform the same experiment, and they are far more likely to see it
again due to volume.  The issue will tend to be worse in small payment
communities.

Clearly it's not ideal, and it is useful to think about things you
could do to improve the situation:

- One thing that could be done to obscure this is to add a few extra
random spending hops (say 0-2) which the user can do himself by
spending to himself, though this comes at some extra space overhead.
The recipient won't be able to distinguish self-spends from
third-party spends.

- Another defense would be to use third party money-changer to
exchange coins for different coins.  Basically to shuffle coins around
a bit so that receiving a coin from someone with a short enough chain
length between current and recognised spend to normally leak some
information will no longer gain useful information.

Ideas for more robustly fixing it:

- Perhaps there is a way to encrypt the original chain with the bank's
public key with a randomizable encryption algorithm such as Elgamal
and yet retain sufficient proofs that the encrypted chain contains
coin transcripts which would identify the appropriate part if the coin
were double spent, and such that people handling the coin are assured
of it's issue value.


Also here are some comments on the conclusions:

 So it works, but broadly speaking there are two problems.  First, off-line
 coins suck, as described above.  And second, because they grow, it is
 possible to tell exactly how many hands a particular coin has passed
 through - just count the transcripts of previous spends.  So coins are
 not all that anonymous.  And further, there is no re-blinding of the
 earlier transcripts.  The Alice transcript is in the clear in all
 following uses of that same coin.  Transferred coins are recognizable
 and linkable.  Hence they suck even worse than off-line coins.

Online actions are harder to perform anonymously, therefore added
flexibility to behave more off-line is good for anonymity.  Off-line
and transferable off-line coins add several new features which are
useful to an anonymous user:

- ability to transfer rather than deposit, so better hiding payee
identity from bank for payers that want this (there are good uses for
payee privacy as well as payer privacy)

- accountless operation is better for privacy than forcing payments to
be deposited and withdrawn as it also gives a user privacy of
transaction volume; however accountless operation where you have to
connect to the bank in real time (online protocol) makes it more
difficult to remain anonymous due to the need for interactive
low-latency communication

- a money changer is much easier and more realistic to operate with
off-line transferability -- it's basically impossible for the bank to
detect with off-line transferability.  With online coins a money
changer would stand out exchanging a lot of coins through it's account
(with forced-account option), plus even with accountless online
exchange of fresh coins at the bank it's harder for the money changer
to hide it's identity due to it's necessarily high bandwidth,
low-latency interactive 

Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Mike Rosing

On Tue, 9 Apr 2002, Adam Back wrote:

 Tranferable off-line coins allow all kinds of cool anonymity features
 as described above, I also argued above that the linkability
 deficiency can somewhat defended against.
 
 And transferable off-line coins add yet more flexibility, while again
 not preventing online clearing for those that prefer it.  While some
 of the features have the linkability artifact, those features are
 optional and the user has free choice to select methods to avoid
 entirely or defend against linkability by any of the available methods
 respectively fetching fresh online coins, using money-changers to do
 the same more off-line, and self re-spending to add confusion.  Hence
 transferable off-line coins are already superior to both
 non-transferable off-line coins and online coins due to the selection
 of choice of new features and trade-offs offered to the users.  All we
 need now is a way to more robustly defeat linkability.

While I agree with goal, it's not clear to me that it's physically
possible.  What makes money useful is it's physical existance, people
have been counterfiting coins since they were invented but it's been
getting harder to do.  With off-line coins you could easily counterfit or
double spend and live off the float, especially if you do it all
anonymously.  And if you just do it once with some huge sum, you'd get
away with it (like Enron guys did :-)

Money boils down to psycology - people trust that it trades their effort
for somebody elses effort.  who's going to trust ephemeral bits?  Crossing
that barrier is going to be a lot harder than any technology.

Patience, persistence, truth,
Dr. mike





Re: brilliancy

2002-04-08 Thread Bill Stewart

At 07:59 AM 04/08/2002 -0600, Anonymous wrote:
Any attacker who can control 100,000 machines is a major force on the
internet, while someone with a million or more is currently unstoppable:
able to launch massively diffuse DDOS attacks, perform needle in a
hayfield searches, and commit all sorts of other mayhem. We already
understand how worms could be used to gain control of so many machines.
Yet the recent revelation that Brilliant Digital Media has bundled a
small trojan with KaZaA has underscored another means by which an
attacker could gain control of so many machines: poorly secured
automatic updaters. If an attacker can distribute his own code as an
update, he can take control of millions of machines. 

http://www.cs.berkeley.edu/~nweaver/0wn2.html

So, now, how hard would it be to use this mechanism to upload PGPNet
with opportunistic encryption enabled to millions of hosts ?

Do you mean How hard would it be to crack into Brilliant Digital's
servers before some other SKR1P7 K1DD13Z take it over?
Or do you mean Is that easier than cracking into Microsoft or Adobe or
M0Zilla or some other quasi-reputable company's distribution system??

Actually using it to upload PGPNet would probably be pretty hard -
it's no longer just Phil's ~200KB of badly-written MSDOS code,
it's now 5-10MB of bloatware (:-), and you can't distribute a few million
copies of a few megabytes to unsuspecting users without somebody noticing.

Also, leaving aside the opportunistic encryption issues,
which depend on having working secure inverse DNS for the FreeS/WAN flavor,
you can't depend on tunnels working through firewalls or NAT or other
arbitrary connections out there, so a lot of recipients wouldn't really
get to have it working for them, but it might break quite visibly -
especially for people who already have VPNs, and therefore usually have
corporate IT support or corporate security departments who'll notice it.

Better to just build a nice small ipsec client into a flashy MP3 player :-)




Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Anonymous

The issue with off-line cash is this: has the coin being offered already
been spent?

With on-line cash, the offered coin is immediately deposited at the bank,
hence doubly-spent coins are detected instantly.  With off-line cash
this cannot be done because by definition there is no connection to the
bank.  Hence there is no way to know, off-line, if a coin has already
been spent.

The solution is to embed the identity of the withdrawer into the coin
when it is withdrawn from the bank, in such a way that this identity
will only be revealed if the coin is double-spent.  That provides a
partial solution to the off-line scenario.

A coin is offered off-line, and the recipient again has no guarantee that
it hasn't been spent already.  He accepts the coin anyway, and later when
he gets on-line he tries to deposit it at the bank.  But he learns that
he was cheated; the coin had already been spent.  Now he has a fall-back
solution: the doubly-spent coin reveals the embedded identity of the
party who withdrew it (and who doubly-spent it).  He can call the cops
and try to track down and prosecute the cheater.

All off-line spending schemes work this way.  All they can offer is
the hope of tracking down cheaters after the fact.  They can never
offer the assurance of validity that an immediate on-line check can
provide.

With off-line coins, unlike on-line coins, the spender knows more than
he's telling.  He knows secrets about those coins which would reveal his
identity; that is, his identity is embedded in some secret information
associated with the coin.  When he spends it at a shop, he responds
to a random challenge from the shop, using his secret information.
The system is set up so that the shop, and later the bank, can validate
his response as being valid, proving that he truly owned a coin.  For the
double-spending detection, the system is further arranged that if two
different shops offer two different random challenges, then from the
responses to these two challenges, the user's secret information and
therefore his identity is revealed.

To turn this into a transferrable system, we would allow a chain of
transfers before the bank gets involved.  Alice spends the coin with Bob,
who spends it with Carol, who spends it with David, who deposits it at
the bank.  There are two problems.  First, only Alice knows the secret
information associated with the coin.  She can't give all the secrets to
Bob, or else he would know her identity.  So Bob only has a limited amount
of information about the coin.  Second, after this chain of transfers,
if there was double-spending, it might have been anyone along the chain.
The system for double-spending detection has to be able to identify
which person was the cheater.

The solution which Adam describes works as follows.  Each party
pre-withdraws a zero-value coin from the bank.  This is an off-line
coin which has their identity encoded in it, if they double-spend it.
Alice first spends her coin with Bob in the normal off-line way.  Bob ends
up with a transcript sufficient to prove that he received a presumably
valid coin from Alice (but one which might have been doubly-spent).

Now Bob wants to spend with Carol.  He does two things: he gives her
the transcript of Alice's spend with him, which implicitly identifies
the value of the coin; and also he engages in the regular off-line
coin spend with her, using his zero-value coin.

If Carol then spends the coin with David, she does the same two things:
she gives David the transcript of Bob's spend with her (which itself
included the two parts above), and also spends a zero-value coin with
him.  The resulting transcript now has three parts.

So it grows at each transfer, and in the end the transcript is deposited.
If there was a double-spend, someone spent his zero-value coin twice,
and his own identity is revealed.

There is one flaw, which is that Bob could use the same Alice transaction
with more than one zero-value coin, which he after all gets for free.
Carol can't tell that the Alice transaction she sees is the same one
someone else saw, and if Bob uses a unique zero-value coin for each spend,
then Bob's identity will not be revealed as it should be.

The fix for this is that when Bob receives the coin from Alice, knowing
that he is going to pass it on, he must link the specific zero-value coin
he will later use into the transcript he will receive of Alice's spend
with him.  This is done by including a hash of the coin information into
the random challenge he sends to Alice.  Then when he tries to pass the
coin on to Carol, she checks that the zero-value coin he is spending with
her matches the value used in the Alice transcript.  That prevents Bob
from using two different zero-value coins with a single Alice transcript.

So it works, but broadly speaking there are two problems.  First, off-line
coins suck, as described above.  And second, because they grow, it is
possible to tell exactly how many hands a particular coin has 

Re: FUCANN Fully UnCentrallized Authority for Naming and Numbers

2002-04-08 Thread Graham Lally

Frob the Builder wrote:
 The problem comes when the server a domain points to is the map
for several domains, say via Virtual Hosts or selected forwarding. Many servers
use this if they're on a dedicated web-hoster, or for subdomains.
 
 Ahah, because the 'physical' server uses the URL to map to 'virtual'
 servers.
 You're right, the Rev 1.0 plan doesn't handle that.

This only applies to HTTP requests though, AFAIK. The easiest work around, I 
figure, is a translation proxy that you run (locally) and channel all requests 
through. This proxy could look up the virtual mapping from a local domain to a 
legacy domain and vice versa. Not big on proxies myself, so not sure how 
feasible it'd be to either build a custom one, or to adapt an existing one.

Off to look through Squid...

.g
-- 
...not much (legal) material is out there that's full of graphics and in
a consumer-friendly format to create the need for DSL. - Jack Valenti

http://www.exmosis.net/Sometimes I use Google instead of pants.




Re: mil disinfo on cryptome

2002-04-08 Thread Steve Thompson


Quoting Khoder bin Hakkin ([EMAIL PROTECTED]):
[faustine]
 More interestingly, s/he neglects to include this disqualifier from
 State Secrets:
 
 Allegiance to the United States
 
 Conditions that could raise a security concern and may be disqualifying
 include:
 
  d. Involvement in activities which unlawfully advocate or practice
 the
  commission of acts of force or violence to prevent others from
 exercising
  their rights under the Constitution or laws of the United States or
 of any state.
 
 How many Congressvermin, police w/ NCIS access, FBI, judges, domestic
 spooks of all flavors, etc are guilty of this?

Here is a classic example of disinformation.  Obviously, certain rights,
activities, etc. are from time-to-time require that various rights be
temporarily curtailed so that the important machinery of law-enforcement may
work its magic.

You're just trying to divert attention from this necessary exception to the
normal rules.  Therefore, you must be a spook.


Regards,

Steve

-- 
Just fake it.


-- 
Include 35da3c9e079dcf68ec3a608e8c0a47f6 somewhere in your
message when you reply.