Are You Success-Minded?
WANTED: We're looking for motivated, entrepreneurial individuals who would like to be their own boss and earn an executive six-figure income by this time next year. Would you enjoy earning $1,000 commissions starting this month? (And market a product with a value of over $15,000). This is a legitimate business that you can run from your home... - You make $1,000 for every sale - Market a high demand travel-related product - Total support given at all times - Excellent income is possible starting immediately Not like other businesses that drain your savings and don't work... - Not mlm or network marketing - No hard-ball selling - No need to approach your friends or relatives - No inventory to buy We have a simple turn-key system for you to plug into. We have our own leads for you to work, and a great personalized website which we provide for you. Our support team is unparalleled and you can start earning $1,000 per sale right away. If you're succes-minded and enjoy a challenge then this could be just the opportunity you've been looking for. For free and immediate info, send a blank email to the address below. mailto: [EMAIL PROTECTED] - Unsubscribe Instructions: To remove yourself from further mailings, please send a blank email to the address below. mailto: mopro9998119 7157mZnc4-516xCOV3379TWIY9-251ipFJ2297vqoJ1-733heBa4362EYQD6-173RylE5499MFnG7-140Jrl78
Unlock Your World of Possibilities...
WANTED: We're looking for motivated, entrepreneurial individuals who would like to be their own boss and earn an executive six-figure income by this time next year. Would you enjoy earning $1,000 commissions starting this month? (And market a product with a value of over $15,000). This is a legitimate business that you can run from your home... - You make $1,000 for every sale - Market a high demand travel-related product - Total support given at all times - Excellent income is possible starting immediately Not like other businesses that drain your savings and don't work... - Not mlm or network marketing - No hard-ball selling - No need to approach your friends or relatives - No inventory to buy We have a simple turn-key system for you to plug into. We have our own leads for you to work, and a great personalized website which we provide for you. Our support team is unparalleled and you can start earning $1,000 per sale right away. If you're succes-minded and enjoy a challenge then this could be just the opportunity you've been looking for. For free and immediate info, send a blank email to the address below. mailto: [EMAIL PROTECTED] - Unsubscribe Instructions: To remove yourself from further mailings, please send a blank email to the address below. mailto: mopro9998119 2742ACwP3-461jLGN8195Zcaz2-435ZPMl5109RFos1-406NjOm9146dlfH5-911igFu6237Sesp7-08l75
Would you enjoy $1,000 per sale?
WANTED: We're looking for motivated, entrepreneurial individuals who would like to be their own boss and earn an executive six-figure income by this time next year. Would you enjoy earning $1,000 commissions starting this month? (And market a product with a value of over $15,000). This is a legitimate business that you can run from your home... - You make $1,000 for every sale - Market a high demand travel-related product - Total support given at all times - Excellent income is possible starting immediately Not like other businesses that drain your savings and don't work... - Not mlm or network marketing - No hard-ball selling - No need to approach your friends or relatives - No inventory to buy We have a simple turn-key system for you to plug into. We have our own leads for you to work, and a great personalized website which we provide for you. Our support team is unparalleled and you can start earning $1,000 per sale right away. If you're succes-minded and enjoy a challenge then this could be just the opportunity you've been looking for. For free and immediate info, send a blank email to the address below. mailto: [EMAIL PROTECTED] - Unsubscribe Instructions: To remove yourself from further mailings, please send a blank email to the address below. mailto: mopro9998119 44l2
Re: BBC hijacks TiVo recorders
Last I knew, TiVo ran a customized Linux base OS, the source of most of which was publicly available. The recording app is proprietary, though, I think. modified linux kernel + some other bits for booting. Anything interesting is probably proprietary. sources available from http://www.tivo.com/linux -- J. Eric Townsend -- jet spies com buy stickers: http://www.spies.com/jet/store.html to support the artcar: http://www.spies.com/jet/artcar.html Looking for vets who served with USASSG/ACSI/MACV in Vietnam, 1967-1970.
Re: BBC hijacks TiVo recorders
At 0:24 -0700 2002/06/02, Marc wrote: To be honest, the complaints about this are excessive. The problem isn't that the TiVo recorded a promotional show, it's that it recorded a show that has some semi-adult content in it and parental controls don't restrict promotional recordings. ...and they did this at the request of the BBC who paid them to do it. yeesh. I don't think anyone came out of this looking good. UltimateTV surprisingly is less intrusive, it doesn't have to use the phone at all (except for standard DirecTV PPV calls) and uses the downstream from the dish to verify subscriptions. making it easier to bypass paying for service than it is on the TiVo, just activate the right tier and presto, UTV service. -- J. Eric Townsend -- jet spies com buy stickers: http://www.spies.com/jet/store.html to support the artcar: http://www.spies.com/jet/artcar.html Looking for vets who served with USASSG/ACSI/MACV in Vietnam, 1967-1970.
(±¤°í) ³°°í Âõ¾îÁø Èæ¹é»çÁøÀ» °íÃÄ¿ä~~~~~~
Title: Untitled Document O »çÀü Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³»°Ô µÈÁ¡ »ç°úµå¸³´Ï´Ù.O ¸ÞÀÏ ¼ö½ÅÀ» ¿øÇϽÃÁö ¾ÊÀ¸½Ã¸é ´ÙÀ½À» Ŭ¸¯ÇØ ÁÖ¼¼¿ä
Lose Inches and Look Great This Summer!
Title: Untitled Document You received this email because you signed up at one of Offer888.com's websites or you signed up with a party that has contracted with Offer888.com. To unsubscribe from our newsletter, please visit http://opt-out.offer888.net/?[EMAIL PROTECTED].
Double Your Life Insurance at NO EXTRA COST! RCDZRXT
Are you prepared to provide for your Loved Ones? Plan for your family's long-term future. Choose the right Life Insurance policy. Compare different rates from top insurance companies around the country. Compare now and save up to 75% on your Term Life Insurance! *Get your FREE instant quotes. *Compare the lowest prices. *Apply Online, Obligation-Free. GET A FREE QUOTE NOW! You can't predict the future, but you can always prepare for it. Copyright 2002 Life Insurance Quotes of America. All rights reserved.Please know that we do not want to send you information regarding our special offers if you do not wish to receive it. If you would no longer like us to contact you or feel that you have received this email in error, please click here to unsubscribe. 10431210720010222641043120647000353042
[±¤°í] ¿µÈ¸¦ º¸¸é¼ ¿µ¾î¸¦ Á¤º¹Çϼ¼¿ä.^^
Title: event_mail -. º» ¸ÞÀÏÀº Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü Á¦ 50Á¶¿¡ ÀÇ°ÅÇÑ [±¤°í] ¸ÞÀÏÀÔ´Ï´Ù. -. e-mail ÁÖ¼Ò´Â ÀÎÅͳݻ󿡼 ÃëµæÇÏ¿´À¸¸ç, ÁÖ¼ÒÀÌ¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ °¡Áö°í ÀÖÁö ¾Ê½À´Ï´Ù. ´Ô²² Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³»¼ Á˼ÛÇÕ´Ï´Ù. ÀÌ ¸ÞÀÏ·Î ÀÎÇÏ¿© ºÒÆíÀ» µå·È´Ù¸é Á¤ÁßÈ÷ »ç°úµå¸®°Ú½À´Ï´Ù.¸ÞÀϼö½ÅÀ» ¿øÄ¡ ¾ÊÀ¸½Ã¸é ¾Æ·¡ÀÇ ¼ö½Å°ÅºÎ ¾ÆÀÌÄÜÀ» ´·¯ÁÖ¼¼¿ä.
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Worm Klez.E immunity Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 05:26:18 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id EAA18848 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 04:30:09 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id EAA18839 for cypherpunks-outgoing; Mon, 3 Jun 2002 04:30:00 -0500 Received: from smtp.comcast.net (smtp.comcast.net [24.153.64.2]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id EAA18834 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 04:29:50 -0500 Received: from Wlnyupgm (pcp01812407pcs.nash01.tn.comcast.net [68.52.248.173]) by mtaout02.icomcast.net (iPlanet Messaging Server 5.1 HotFix 0.8 (built May 13 2002)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 05:25:09 -0400 (EDT) Date: Mon, 03 Jun 2002 05:25:01 -0400 (EDT) Date-warning: Date header was inserted by mtaout02.icomcast.net From: politics [EMAIL PROTECTED] Subject: CDR: Worm Klez.E immunity To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_t2LPzzLkLNfh5fRqYx3ZOQ) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Worm Klez.E immunity Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 05:28:01 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g539RoE39241 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 05:27:51 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g539RoP14940 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 05:27:50 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g539QQu14801 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 05:26:26 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g539Q0E39107 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 05:26:07 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id EAA18847 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 04:30:08 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id EAA18839 for cypherpunks-outgoing; Mon, 3 Jun 2002 04:30:00 -0500 Received: from smtp.comcast.net (smtp.comcast.net [24.153.64.2]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id EAA18834 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 04:29:50 -0500 Received: from Wlnyupgm (pcp01812407pcs.nash01.tn.comcast.net [68.52.248.173]) by mtaout02.icomcast.net (iPlanet Messaging Server 5.1 HotFix 0.8 (built May 13 2002)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 05:25:09 -0400 (EDT) Date: Mon, 03 Jun 2002 05:25:01 -0400 (EDT) Date-warning: Date header was inserted by mtaout02.icomcast.net From: politics [EMAIL PROTECTED] Old-Subject: CDR: Worm Klez.E immunity To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_t2LPzzLkLNfh5fRqYx3ZOQ) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Worm Klez.E immunity
Qualcuno ti ama in segreto
--=_NextPart_84815C5ABAF209EF376268C8 Content-type: text/plain; charset=US-ASCII --=_NextPart_84815C5ABAF209EF376268C8 Content-Type: text/html; charset=US-ASCII Content-Transfer-Encoding: quoted-printable HTMLHEADTITLEMessage/TITLE META content=3Dtext/html; charset=3Dwindows-1258 http-equiv=3DContent-T= ype META content=3DMSHTML 5=2E00=2E3315=2E2870 name=3DGENERATOR/HEAD BODY Pfont face=3DArial, Helvetica, sans-serifBR /font BLOCKQUOTE dir=3Dltr style=3DMARGIN-RIGHT: 0px=20 DIVfont face=3DArial, Helvetica, sans-serif size=3D2IMG=20 src=3Dhttp://ad=2Eit=2Edoubleclick=2Enet/ad/N2347=2Eemails=2Eitalie=2Ec= apmg/B1013634;sz=3D66x50;ord=3D[timestamp]?/font/DIV DIVfont face=3DArial, Helvetica, sans-serifnbsp;/font/DIV DIVfont face=3DArial, Helvetica, sans-serifFONT size=3D2STRONG= Qualcuno=20 ti ama in segretoBR /STRONG e ci ha incaricato di annunciartelo,/FONT/font/DIV font color=3D#ee face=3DArial, Helvetica, sans-serifFONT size= =3D2STRONGEMscopri=20 chi hai fulminato chiamandoBR il/EM/STRONGFONT=20 color=3D#00STRONGEMnbsp;SPAN class=3D671395214-14052002 /SP= AN/EM/STRONGSPAN class=3D718481609-15052002FONT=20 size=3D2EMSTRONG899 - 13 13 23/STRONG/EM/FONTFONT=20 size=3D1*/FONT/SPAN/FONT/FONT/font=20 Pfont face=3DArial, Helvetica, sans-serifnbsp;/font/P Pfont color=3D#ee face=3DArial, Helvetica, sans-serifFONT c= olor=3D#00 size=3D1SPAN=20 class=3D718481609-15052002___BR FONT=20 size=3D-5*5 =80/chiamata piu IVAbr br br /FONTfont color=3D#ee face=3DArial, Helvetica, sans-serif= font color=3D#00 size=3D1span=20 class=3D718481609-15052002font color=3D#ee face=3DArial, Helvet= ica, sans-seriffont color=3D#00 size=3D1span=20 class=3D718481609-15052002font color=3D#ee face=3DArial, Helvet= ica, sans-seriffont color=3D#00 size=3D1span=20 class=3D718481609-15052002font=20 size=3D-5img src=3Dhttp://www=2Eimp20=2Ecom/hamedia/hamediait290502=2E= gifTo=20 be removed, reply with the subject quot;STOPquot;=2E/font/span/= font/fontfont=20 size=3D-5 /font/span/font/font/span/font/fontFONT=20 size=3D-5 /FONT/SPAN/FONT/font/P /BLOCKQUOTE /BODY/HTML --=_NextPart_84815C5ABAF209EF376268C8--
URGENT ASSISTANCE NEEDED
Dear friend, I am Mrs. Sese-seko widow of late President Mobutu Sese-seko of Zaire, now known as Democratic Republic of Congo (DRC). I am moved to write you this letter. This was in confidence considering my present circumstance and situation. I escaped along with my husband and two of our sons Solomon and Basher out of Democratic Republic of Congo (DRC) to Abidjan, Cote d'ivoire where my family and I settled, while we later moved to settled in Morroco where my husband later died of cancer disease. However, due to this situation we decided to change most of my husband's billions of dollars deposited in Swiss bank and other countries into other forms of money coded for safe purpose because the new head of state of (Dr) Mr Laurent Kabila has made arrangement with the Swiss government and other European countries to freeze all my late husband's treasures deposited in some european countries. Hence, my children and I decided laying low in Africa to study the situation till when things gets better. Like now that president Kabila is dead and the son taking over (Joseph Kabila). One of my late husband's chateaux in Southern France was confiscated by the french government, and as such I had to change my identity so that my investment will not be traced and confiscated. I have deposited the sum Thirty Million United State Dollars (US$30,000,000,00.) With a security company for safe keeping. What I want you to do is to indicate your interest that you can assist us in receiving the money on our behalf, so that I can introduce you to my son (Solomon) who has the out modalities for the claim of the said funds. I want you to assist in investing this money, but I will not want my identity revealed. I will also want to acquire real/landed properties and stock in multi-national companies and to engage in other safe and non-speculative investments as advise by your good self. May I at this point emphasize the high level of confidentiality, which this upcoming project demands, and hope you will not betray the trust and confidence, which I repose in you.In conclusion, if you want to assist us, my son (Benson) shall divulge to you all briefs regarding this project, tell you where the funds are currently being maintained and also discuss remuneration for your services.For this reason kindly furnish us your contact information,that is your personal telephone and fax number for validation purpose and acknowledge receipt of this mail using the above email address. Yours sincerely, Mrs. Mariam M. Seseseko.
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Cellpadding Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 07:13:38 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53BDRE44295 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:13:27 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g53BDRF22260 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:13:27 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g53BC4u22110 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:12:04 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53BBQE44172 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:11:32 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20109 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:35 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20104 for cypherpunks-outgoing; Mon, 3 Jun 2002 06:15:32 -0500 Received: from ipop3 (ipop3.tm.net.my [202.188.0.247]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id GAA20098 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:16 -0500 Received: from Rxbszgpw (bin-21-173.tm.net.my [210.186.21.173]) by ipop3.tm.net.my (iPlanet Messaging Server 5.1 (built May 7 2001)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 19:10:32 +0800 (SGT) Date: Mon, 03 Jun 2002 19:10:11 +0800 (SGT) Date-warning: Date header was inserted by ipop3.tm.net.my From: help [EMAIL PROTECTED] Old-Subject: CDR: Cellpadding To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_9gcMP6me9AQ8l0gflnjmMw) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Cellpadding
URGENT ASSISTANCE NEEDED
Dear friend, I am Mrs. Sese-seko widow of late President Mobutu Sese-seko of Zaire, now known as Democratic Republic of Congo (DRC). I am moved to write you this letter. This was in confidence considering my present circumstance and situation. I escaped along with my husband and two of our sons Solomon and Basher out of Democratic Republic of Congo (DRC) to Abidjan, Cote d'ivoire where my family and I settled, while we later moved to settled in Morroco where my husband later died of cancer disease. However, due to this situation we decided to change most of my husband's billions of dollars deposited in Swiss bank and other countries into other forms of money coded for safe purpose because the new head of state of (Dr) Mr Laurent Kabila has made arrangement with the Swiss government and other European countries to freeze all my late husband's treasures deposited in some european countries. Hence, my children and I decided laying low in Africa to study the situation till when things gets better. Like now that president Kabila is dead and the son taking over (Joseph Kabila). One of my late husband's chateaux in Southern France was confiscated by the french government, and as such I had to change my identity so that my investment will not be traced and confiscated. I have deposited the sum Thirty Million United State Dollars (US$30,000,000,00.) With a security company for safe keeping. What I want you to do is to indicate your interest that you can assist us in receiving the money on our behalf, so that I can introduce you to my son (Solomon) who has the out modalities for the claim of the said funds. I want you to assist in investing this money, but I will not want my identity revealed. I will also want to acquire real/landed properties and stock in multi-national companies and to engage in other safe and non-speculative investments as advise by your good self. May I at this point emphasize the high level of confidentiality, which this upcoming project demands, and hope you will not betray the trust and confidence, which I repose in you.In conclusion, if you want to assist us, my son (Benson) shall divulge to you all briefs regarding this project, tell you where the funds are currently being maintained and also discuss remuneration for your services.For this reason kindly furnish us your contact information,that is your personal telephone and fax number for validation purpose and acknowledge receipt of this mail using the above email address. Yours sincerely, Mrs. Mariam M. Seseseko.
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Introduction on ADSL Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 07:13:16 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20199 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:17:05 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20191 for cypherpunks-outgoing; Mon, 3 Jun 2002 06:17:00 -0500 Received: from ipop5 (ipop5.tm.net.my [202.188.0.249]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id GAA20130 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:45 -0500 Received: from Rjxfqb (bin-21-173.tm.net.my [210.186.21.173]) by ipop5.tm.net.my (iPlanet Messaging Server 5.1 (built May 7 2001)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 19:10:55 +0800 (SGT) Date: Mon, 03 Jun 2002 19:10:34 +0800 (SGT) Date-warning: Date header was inserted by ipop5.tm.net.my From: nightops [EMAIL PROTECTED] Subject: CDR: Introduction on ADSL To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_yG2f2f4xJZ63CQUh5A9/8Q) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Cellpadding Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 07:11:39 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20110 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:35 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20104 for cypherpunks-outgoing; Mon, 3 Jun 2002 06:15:32 -0500 Received: from ipop3 (ipop3.tm.net.my [202.188.0.247]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id GAA20098 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:16 -0500 Received: from Rxbszgpw (bin-21-173.tm.net.my [210.186.21.173]) by ipop3.tm.net.my (iPlanet Messaging Server 5.1 (built May 7 2001)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 19:10:32 +0800 (SGT) Date: Mon, 03 Jun 2002 19:10:11 +0800 (SGT) Date-warning: Date header was inserted by ipop3.tm.net.my From: help [EMAIL PROTECTED] Subject: CDR: Cellpadding To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_9gcMP6me9AQ8l0gflnjmMw) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Introduction on ADSL Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 07:15:48 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53BFcE44471 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:15:38 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g53BFb322640 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:15:37 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g53BEDu22454 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:14:13 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53BCvE44256 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 07:13:05 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20198 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:17:05 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id GAA20191 for cypherpunks-outgoing; Mon, 3 Jun 2002 06:17:00 -0500 Received: from ipop5 (ipop5.tm.net.my [202.188.0.249]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id GAA20130 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 06:15:45 -0500 Received: from Rjxfqb (bin-21-173.tm.net.my [210.186.21.173]) by ipop5.tm.net.my (iPlanet Messaging Server 5.1 (built May 7 2001)) with SMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Mon, 03 Jun 2002 19:10:55 +0800 (SGT) Date: Mon, 03 Jun 2002 19:10:34 +0800 (SGT) Date-warning: Date header was inserted by ipop5.tm.net.my From: nightops [EMAIL PROTECTED] Old-Subject: CDR: Introduction on ADSL To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: multipart/alternative; boundary=Boundary_(ID_yG2f2f4xJZ63CQUh5A9/8Q) Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Introduction on ADSL
Re: FC: Hollywood wants to plug analog hole, regulate A-D
On Mon, 3 Jun 2002, Dave Emery wrote: And telling the public that they face serious jail time if they don't turn in that Creative Soundblaster from the old PC in the attic closet isn't going to fly. The sheeple may be sheep but even they aren't going to accept that kind of nonsense from Hollywood or any corrupt congress. I'd even venture to say that if this issue breaks out into the big time and the public really is faced with crippled devices that don't work and mandatory obselescence of existing expensive computer and entertainment systems with potential jail time for use of old equipment that the backlash will be so intense that raw public votes will control over Hollywood money. I think that's what boils down to the bottom line. Because there are so many units in place that can do the bypass, there will be enough time to create a backlash. There's already a backlash on protected CD's, mostly by consumers who can't play them on older CD players. It's just not gonna fly with the public, so that may be all it takes to stomp hollywood on this one. Time will tell I guess. Patience, persistence, truth, Dr. mike
RE: 2 Challenge Gun Cases, Citing Bush Policy
At 07:17 PM 6/2/02, Lucky Green wrote: In United States v. Cruikshank, 92 U.S. 542 (1876), the Supreme Court held that: ... The right to bear arms is not granted by the Constitution; neither is it in any manner dependent upon that instrument for its existence. The second amendment means no more than that it shall not be infringed by Congress, and has no other effect than to restrict the powers of the national government. the 2nd Amendment solely constrains Congress from infringing upon the right to keep and bear arms while leaving the Executive free to infringe upon this right, or deny its exercise entirely, at will. The Executive is part of the national government that Cruikshank says is restricted by the 2nd amendment, yes? Under Cruikshank, Congress may not pass a bill infringing on the right of the citizens to keep and bear arms, but a Presidential Executive Order that all private citizens are to turn in their guns tomorrow passes Constitutional muster. Then Cruikshank didn't mean to include the President as part of the national government that it found to be restricted by the 2nd amendment? ten years later in Presser v. Illinois, 116 U.S. 252 (1886). The provision in the Second Amendment to the Constitution, that 'the right of the people to keep and bear arms shall not be infringed,' is a limitation only on the power of Congress and the national government, and not of the States. Again, Presser says the 2nd amendment restricts the president from such an executive order, yes?
European Data Retention and Encryption for Dummies
Hi everyone, I've been on this list before, but didn't have time for it for a while. Now I'm back because I need some input: You probably heard that the EU is currently passing data retention laws. One part of them would require that ISPs keep logs of customer traffic. It isn't entirely clear what exactly they need to store, but the discussion goes into URL storage (i.e. what file on which virtual host) and even full data storage (i.e. copies of the IP packets). Obviously, at least the later is bullshit. However, it is absolutely possible that it's just a smokescreen and the usual compromise will be that the ISPs don't have to store the data except on request... Enter a simple idea to solve the obvious privacy problem, at least in parts. We do have the infrastructure in place to achieve end-to-end encryption for the by far most-often-used web services, all we need is to use it. I am, of course, talking about HTTPS and SMTPS. Setting up apache so that it does HTTPS instead of HTTP, and all requests to HTTP pages are redirected to a page pointing to the HTTPS equivalent and explaining why is trivial. Getting the various MTAs to use SMTPS isn't too difficult, either. The problem with both is the need of SSL certificates. So I was thinking of setting up a Joe Doe's CA. A simple webpage where you can request a certificate. It would do two check: a) check if IP you are using is identical to the IP you are requesting for, i.e. you'll have to ssh into your webserver and use lynx from there. b) the certificate will be mailed to the admin-c of the domain you requested it for (whois lookup). This is not 100% secure, but then again how much checking does Verisign really do on certificates? I believe this is good enough in that it establishes a reasonable safety that you are talking to the right site, at least much better than regular HTTP can offer. The purpose of this is to get as many sites to switch to using HTTPS and SMTPS as possible. Therefore, the required work must be kept minimal. Once considerable parts of the internet traffic are encrypted, they can pass as many data retention laws as they please. Any comments? What did I miss? Where does this idea come apart? Does it make sense at all? -- New GPG Key issued (old key expired): http://web.lemuria.org/pubkey.html pub 1024D/2D7A04F5 2002-05-16 Tom Vogt [EMAIL PROTECTED] Key fingerprint = C731 64D1 4BCF 4C20 48A4 29B2 BF01 9FA1 2D7A 04F5
Time to Stop the MLM Insanity
Title: Greetings Greetings! You are receiving this letter because you have expressed an interest in receiving information about online business opportunities. If this is erroneous then please accept my most sincere apology. This is a one-time mailing, so no removal is necessary. If you've been burned, betrayed, and back-stabbed by multi-level marketing, MLM, then please read this letter. It could be the most important one that has ever landed in your Inbox. MULTI-LEVEL MARKETING IS A HUGE MISTAKE FOR MOST PEOPLE MLM has failed to deliver on its promises for the past 50 years. The pursuit of the MLM Dream has cost hundreds of thousands of people their friends, their fortunes and their sacred honor. The fact is that MLM is fatally flawed, meaning that it CANNOT work for most people. The companies and the few who earn the big money in MLM are NOT going to tell you the real story. FINALLY, there is someone who has the courage to cut through the hype and lies and tell the TRUTH about MLM. HERE'S GOOD NEWS There IS an alternative to MLM that WORKS, and works BIG! If you haven't yet abandoned your dreams, then you need to see this. Earning the kind of income you've dreamed about is easier than you think! With your permission, I'd like to send you a brief letter that will tell you WHY MLM doesn't work for most people and will then introduce you to something so new and refreshing that you'll wonder why you haven't heard of this before. I promise that there will be NO unwanted follow up, NO sales pitch, no one will call you, and your email address will only be used to send you the information. Period. To receive this free, life-changing information, just CLICK HERE then hit the send button. I'll get the information to you within 24 hours. Just look for the words MLM WALL OF SHAME in your Inbox. Cordially, Skip P.S. Someone recently sent the letter to me and it has been the most eye-opening, financially beneficial information I have ever received. I honestly believe that you will feel the same way once you've read it. And it's FREE! wprawaahcpjinebvcuk
CEVIRI YAZILIMLARI
ÝNTERNETTE KENDÝNÝZÝ DAHA ÝYÝ HÝSSEDECEKSÝNÝZ. ÝNGÝLÝZCE WEB SAYFALARININ TÜRKÇE'YE ÇEVÝRÝ YAZILIMI,90 000 KELÝMELÝK YENÝ SÖZLÜK $ 39+KDV ÝNGÝLÝZCE'DEN TÜRKÇE'YE BÝLGÝSAYAR DESTEKLÝ METÝN ÇEVÝRÝ YAZILIMI,90 000 KELÝMELÝK YENÝ SÖZLÜK (MS-WORD ALTINDA KULLANIM, TÜM WINDOWS VERSÝYONLARI ÝLE UYUMLU) $ 69+KDV ÝKÝ YAZILIM BÝRLÝKTE $ 89+KDV Ayrýntýlý Bilgi Ýçin www.bilsag.com.tr yi týklayýn BÝLSAG Ltd. AHMET MÝTHAT EFENDÝ SOK. 22/1 ÇANKAYA 06700 / ANKARA / Tlf: 0312. 439 2850/ Fax: 0312. 439 9347 [EMAIL PROTECTED] E-posta adres listemizden çýkmak içinÇIKAR tuþuna basýnýz Bu elektronik posta: [EMAIL PROTECTED] e gönderilmiþtir
CNN.com - Workplace e-mail is not your own - June 3, 2002
http://www.cnn.com/2002/TECH/internet/06/03/e.mail.monitoring/index.html -- -- When I die, I would like to be born again as me. Hugh Hefner [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
CNN.com - Inmate released -- 2 years after judge wrote order - June 3, 2002
http://www.cnn.com/2002/LAW/06/03/delayed.release.ap/index.html -- -- When I die, I would like to be born again as me. Hugh Hefner [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
What a Discovery!! adv EtmwX-I93E-MNINyx
Title: Sexual enhancement YOU ARE ABOUT TO HEAR OF AN EXCITING BREAK THROUGH, TO A MORE, COMPLETE SEX LIFE THAN EVER BEFORE. REGARDLESS OF YOUR PRESENT SEXUAL SITUATION OR EXPERIENCES. Sexual enhancement, SEXUAL COMPLETENESS, AWAITS YOU. EXPERIENCE GREATER SEXUAL SATISFACTION (SAFELY) THAN EVER BEFORE! As a powerful aphrodisiac, HGH restores sexual potency and sexuality in men and women. Many of the women who use it also report increased libido, heightened pleasure and the equivalent of greater potency in men, which for female is multiple orgasms. It also helps alleviate menstrual and post-menopausal symptoms, and eliminates vaginal dryness. According to many physicians, who use HGH in their practice, the sexual changes are striking, effecting both men and women. Dr John Baron, at age 82, says I'm surprised myself, . I'd say my libido and sexual function is as good as it was when I was 25. SEXUAL FUNCTION IMPROVEMENT! Sexual potency/ Frequency 75% Duration of Penile Erection 62% Hot Flashes 58% Menstrual Cycle Regulation 38% CLICK HERE TO FOR MORE INFORMATION (PUT INFORMATION) IN THE SUBJECT LINE CLICK HERE OTHER BENEFITS- TO NUMEROUS TO LIST STRENGTH, EXERCISE, AND BODY FAT IMPROVEMENT SKIN AND HAIR IMPROVEMENT HEALING, FLEXIBILITY AND RESISTANCE IMPROVEMENT ENERGY, EMOTIONS AND MEMORY IMPROVEMENT The improvements reported occurred within one to three months nbsp; of the onset of therapy with a continued improvement over six months nbsp; of treatment! There are absolutely no cases of side affects reported in 25 years and it will not interact or interfere with any other medications. You will see and feel results in a few weeks. ENHANCE YOUR SEXUAL FULFILLMENT NOW!! ENJOY SEX WITH YOUR PARTNER TO THE FULLEST. FOR MORE INFORMATION CLICK HERE enhance your sex life, sexual fulfillment , NATURAL Breast enlargement, Penis Growth, Multiple Orgasms, Complete Sexual Fulfillment, WHY WAIT, WHY NOT EXPERIENCE IT YOURSELF!! OVER AND OVER AGAIN!!! BETTER THAN EVER BEFORE!! TO INQUIRE ABOUT PRICE AND ORDER INFORMATION PUT PRICE IN THE SUBJECT LINE. click here to be removed from our mailing put remove in the subject line click here Waiting to hear from you, > [svi6z5QybI-waZemmwZi25-APFnaEdppkR]
RE: 2 Challenge Gun Cases, Citing Bush Policy
And in 1908 in Twining, the USSC found that the 5th amendment was similarly a limitation upon the national government, not the state governments, i.e., the states are not required by the fifth amendment to abstain from requiring a defendant to incriminate himself in testimony. But the first 8 amendments have been progressively extended to the states by application of the 14th amendment. For example, the fifth circuit, just eight months ago, finds the invididual model prevails not only over the national government, but also the states, and it declares that Cruikshank fails to establish any principle governing any of the issues.. regarding the 14th amendment's extension of the Bill of Rights to limit the power of the states. 13. In United States v. Cruikshank, 23 L.Ed. 588 (1875), the Court held that the Second Amendment is one of the amendments that has no other effect than to restrict the powers of the National Government. Id. at 592. In Presser v. Illinois, 6 S.Ct. 580, 584 (1886), the Court, reaffirming Cruikshank and citing Barron v. Baltimore, 8 L.Ed. 672 (1833), held that the Second amendment is a limitation only upon the power of congress and the national government, and not upon that of the state. And, in Miller v. Texas, 14 S.Ct. 874 (1894), the Court held, with respect to the second and fourth amendments that the restrictions of these amendments operate only upon the federal power, and have no reference whatever to proceedings in state courts, citing Barron v. Baltimore and Cruikshank. As these holdings all came well before the Supreme Court began the process of incorporating certain provisions of the first eight amendments into the Due Process Clause of the Fourteenth Amendment, and as they ultimately rest on a rationale equally applicable to all those amendments, none of them establishes any principle governing any of the issues now before us. http://laws.lp.findlaw.com/5th/9910331cr0.html
RE: FC: Hollywood wants to plug analog hole, regulate A-D
Dave Emery[SMTP:[EMAIL PROTECTED]] wrote: On Fri, May 31, 2002 at 08:59:43PM -0500, Neil Johnson wrote: Remember it only requires ONE high-quality non-watermarked analog to digital copy to make it on the net and it's all over. And that is what this whole nonsensical scheme founders on. There are probably 300-500 million existing sound cards out there and at least millions of existing NTSC analog capture cards. Many if not most can do acceptable fidelity conversion of analog audio and video to digital formats if programmed correctly. And there are even a few tens of thousands (or more) of new generation PCI cards that capture ATSC digital video (including HDTV) direct to disk in the clear. The MPAA cannot will these out of existance. The MPAA does not have to 'will them out of existance', or even make them illegal. They plan to change the broadcast standard so they are not supported. At least, this is my interpretation: The FCC has mandated a change to all-digital formats over the next 5 years or so. After that, analog (NTSC) transmission will be phased out. There is currently a lot of work being done within the BPDG (Broadcast Protection Discussion Group) to provide watermark checking, cryptographic and physical protection of digital video and audio data all the way to the display device, and forbid 'complying devices' from having accessible unencrypted outputs or busses. There are even proposals that if a 'complying device' is found to be hackable, that there should be a backdoor to enable the manufacturer to modify or disable it remotely. Until these standards are settled one way or the other, anyone buying digital video equipment (HDTV or otherwise) runs a very substantial risk of finding themselves with a set of expensive and otherwise useless doorstops. Progress and innovation in electronics will occur only at the whim (and in the interest) of the entertainment industry. Check out the BPDG documents at http://bpdg.blogs.eff.org/archives/cat_bpdg_drafts.html Peter Trei Disclaimer: The above is my opinion only, and should not be misconstrued to represent the opinions of others.
Slashdot | Data Quality Act (Is this evil?)
http://slashdot.org/articles/02/06/03/0455210.shtml?tid=103 -- -- When I die, I would like to be born again as me. Hugh Hefner [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
More Guests Wanted?
to [EMAIL PROTECTED] Do you need German guests ? Over 30 Million Germans travel every year. We offer our new Travelworldregister-Service at: http://%32%312.184.71.242:505/country.htm to unsubscribe simply click on link below http://%32%312.184.71.242:555/emails/robinson.asp?[EMAIL PROTECTED]
Re: FC: Hollywood wants to plug analog hole, regulate A-D
- Original Message - From: Neil Johnson [EMAIL PROTECTED] To: Joseph Ashwood [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Friday, May 31, 2002 6:59 PM Subject: Re: FC: Hollywood wants to plug analog hole, regulate A-D On Sunday 02 June 2002 08:24 pm, Joseph Ashwood wrote: The MPAA has not asked that all ADCs be forced to comply, only that those in a position to be used for video/audio be controlled by a cop-chip. While the initial concept for this is certainly to bloat the ADC to include the watermark detection on chip, there are alternatives, and at least one that is much simpler to create, as well as more benficial for most involved (although not for the MPAA). Since I'm writing this in text I cannot supply a wonderful diagram, but I will attempt anyway. The idea looks somewhat like this: analog source --ADC--CopGate-digital Where the ADC is the same ADC that many of us have seen in undergrad electrical engineering, or any suitable replacement. The CopGate is the new part, and will not be normally as much of a commodity as the ADC. The purpose of the CopGate is to search for watermarks, and if found, disable the bus that the information is flowing across, this bus disabling is again something that is commonly seen in undergrad EE courses, the complexity is in the watermark detection itself. The simplest design for the copgate looks somewhat like this (again bad diagram): in|---buffergatesout CopChip-| Where the buffer gates are simply standard buffer gates. This overall design is beneficial for the manufacturer because the ADC does not require redesign, and may already include the buffergates. In the event that the buffer needs to be offchip the gate design is well understood and commodity parts are already available that are suitable. For the consumer there are two advantages to this design; 1) the device will be cheaper, 2) the CopChip can be disabled easily. In fact disabling the CopChip can be done by simply removing the chip itself, and tying the output bit to either PWR or GND. As an added bonus for manufacturing this leaves only a very small deviation in the production lines for inside and outside the US. This seems to be a reasonable way to design to fit the requirements, without allowing for software disablement (since it is purely hardware). Joe Bz! Wrong Answer ! How do you prevent some hacker/pirate (digital rights freedom fighter) from disabling the CopGate (by either removing the CopChip, finding a way to bypass it, or figure out how to make it think it's in, Government Snoop mode ) ? To quote myself the CopChip can be disabled easily, last paragraph sentence begins with For the consumer . . . as has been pointed out by numerous people, there is no solution to this. With a minimal amount of electrical engineering knowledge it is possible for individuals to easily construct a new ADC anyway. Then the watermark can be removed. Which can and should be done after conversion. Remember it only requires ONE high-quality non-watermarked analog to digital copy to make it on the net and it's all over. You seem to be of the mistaken opinion that I believe this to be a good thing, when the design I presented was designed to minimize cost, of design, manufacture, and removal. I am of the fundamental opinion that this is not a legal problem, this is a problem of the MPAA and anyone else that requires a law like this to remain profitable is advertising incorrectly. The Hollywood studios have already found the basic solution, sell advertising space _within_ the program. In fact some movies are almost completely subsidized by the ad space within the movie. By moving to that model for primary revenue it is easy to accept that a massive number of copies will be made since that improves the value of the ad space in your next movie/episode. Of course I'm not involved with any studio so they don't ask my opinion. Joe
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Let's be friends Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 18:14:07 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53MDgE74603 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 18:13:42 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g53MDg603314 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 18:13:42 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g53MDeu03300 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 18:13:40 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g53MDJE74586 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 18:13:19 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id RAA25932 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 17:17:35 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id RAA25927 for cypherpunks-outgoing; Mon, 3 Jun 2002 17:17:25 -0500 Received: from www.ilesotho.com (root@[209.212.105.193]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id RAA25919 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 17:16:18 -0500 Received: from WinProxy.anywhere (fw.lhda.org.ls [209.212.102.66] (may be forged)) by www.ilesotho.com (8.11.3/8.9.3/SuSE Linux 8.9.3-0.1) with SMTP id g53M5sQ02004 for [EMAIL PROTECTED]; Tue, 4 Jun 2002 00:05:56 +0200 X-RAV-AntiVirus: This e-mail has been scanned for viruses on host: www.ilesotho.com Date: Tue, 4 Jun 2002 00:05:56 +0200 Message-Id: [EMAIL PROTECTED] Received: from 160.124.182.10 by 160.124.182.17 (WinProxy); Mon, 3 Jun 2002 09:13:11 +0200 From: comments [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: Let's be friends MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=Q89c7swI0v78670w0pI7sA1z31cYa7AWoH4k Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Let's be friends
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Let's be friends Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 18:13:29 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id RAA25933 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 17:17:35 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id RAA25927 for cypherpunks-outgoing; Mon, 3 Jun 2002 17:17:25 -0500 Received: from www.ilesotho.com (root@[209.212.105.193]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id RAA25919 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 17:16:18 -0500 Received: from WinProxy.anywhere (fw.lhda.org.ls [209.212.102.66] (may be forged)) by www.ilesotho.com (8.11.3/8.9.3/SuSE Linux 8.9.3-0.1) with SMTP id g53M5sQ02004 for [EMAIL PROTECTED]; Tue, 4 Jun 2002 00:05:56 +0200 X-RAV-AntiVirus: This e-mail has been scanned for viruses on host: www.ilesotho.com Date: Tue, 4 Jun 2002 00:05:56 +0200 Message-Id: [EMAIL PROTECTED] Received: from 160.124.182.10 by 160.124.182.17 (WinProxy); Mon, 3 Jun 2002 09:13:11 +0200 From: comments [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: Let's be friends MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=Q89c7swI0v78670w0pI7sA1z31cYa7AWoH4k Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
I noticed your email-
Hello- I saw your email on a website I visited yesterday, and thought you might be interested in this. A few months back I joined a program and then...promptly forgot about it. You may have done this yourself sometime...you intend to work the program but then get caught in your day-to-day activities and it's soon forgotten. The program was free to join so maybe I just didn't take it very seriously. Anyway, near the end of April I received a letter from my sponsor (Vic Patalano) informing me that I had more than 2000 PAID members in my downline! As you can imagine, I was very skeptical. After all, how could I have more than 2000 paid members under me in a program that I had never promoted? I took the time to check out the site...then wrote to Vic asking for confirmation that these were paid members and not just free sign-ups...like me :) Well, it was true...I had 2365 paid members in my downline. This in a program that I had never worked! All I had to do was upgrade to a paid membership before the end of the month and I would have my position locked in and a downline of 2365 people. You can bet I wasted no time in getting my membership upgraded! I can tell you, if I had known what was happening with this program, I would have become an active paid member months ago! With this program, you will get a HUGE downline of PAID MEMBERS. My sponsor's check, which is a minimum of $5,000, arrives every month...on time. How would you like to lock your position in FREE while you check out this opportunity and watch your downline grow? To grab a FREE ID#, simply reply to: [EMAIL PROTECTED] and write this phrase: "Email me details about the club's business and consumer opportunities" Be sure to include your: 1. First name 2. Last name 3. Email address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your Free Member Number. I'll get you entered and let you know how you can keep track of your growing downline. That's all there's to it. I'll then send you info, and you can make up your own mind. Warm regards, Susan Greenwald P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This company is different--it offers value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. This is a One Time Mailing. You WILL NOT get another email" 1237aSbm5-819aYEz0385maKp4-953BGl30
Anthrax, barbed wired gags, stinkin' in Tennessee
Something stinks in Tenn, and its not the Gores this time: Among his recent cases was the death of Harvard University biologist Don Wiley, whose fall from a Memphis bridge in December fueled fears of terrorist kidnappings. The medical examiner also helped identify the body of Katherine Smith, 49, who was found burned beyond recognition in February the day before a hearing on federal charges of helping five Middle Eastern men obtain fake driver's licenses. MEMPHIS, Tenn. - Medical examiner O.C. Smith, who has worked on some of the city's most puzzling deaths, is at the center of another perplexing case: He was attacked over the weekend, bound with barbed wire and left with a bomb tied to his body. http://ap.tbo.com/ap/breaking/MGABCF4U02D.html The spooks are getting careless in Tenn. First they do the car-accident/injection thing with a anthrax-saavy microbiologist, who floats up 300 mi away, then a DMV-weenie-roast, now games with the coroner? What, was he going to tell?
Can this be an Indexed Annuity?
Title: Can this be an Indexed Annuity? Call or e-mail Rex Huffman Associates today! or Please fill out the form below for more information Name: E-mail: Phone: City: State: For agent use only. IDEAL Index 100 Annuity issued by Allianz Life Insurance Company of North America. Product availability and benefits may vary by state. The IDEAL Index 100 Annuity is not approved in: NJ, NY, ND, OR, SC and WA. FLA217-02 We don't want anyone to receive our mailings who does not wish to. This is professional communication sent to insurance professionals. To be removed from this mailing list, DO NOT REPLY to this message. Instead, go here: http://www.Insurancemail.net Legal Notice
RE: European Data Retention and Encryption for Dummies
Tom wrote: The problem with both is the need of SSL certificates. So I was thinking of setting up a Joe Doe's CA. A simple webpage where you can request a certificate. It would do two check: a) check if IP you are using is identical to the IP you are requesting for, i.e. you'll have to ssh into your webserver and use lynx from there. b) the certificate will be mailed to the admin-c of the domain you requested it for (whois lookup). I have been meaning to set up a similar CA for years now, but never found the time. While you are at it, you might want to configure your CA to offer S/MIME certs subject to an email ping. (Which is what exactly what Thawte (a.k.a. VeriSign) is using to authenticate their free S/MIME certs). Make sure that your CA will only sign sufficient size keys, responding with a meaningful error message if a smaller key is submitted. There is a commercial SSL cert provider with roots in the browsers that uses just authentication method b) that you propose. However, for your CA, I would recommend doing away with b) since that will limit even legitimate (whatever that would mean in this context) users of your CA. Do a whois on cypherpunks.to to see why b) won't work for everybody. If you don't care about serving users of some CCTLD's, you can leave b) in. Your CA, your CSP. YMMV, --Lucky
RE: 2 Challenge Gun Cases, Citing Bush Policy
Ed wrote: At 07:17 PM 6/2/02, Lucky Green wrote: In United States v. Cruikshank, 92 U.S. 542 (1876), the Supreme Court held that: ... The right to bear arms is not granted by the Constitution; neither is it in any manner dependent upon that instrument for its existence. The second amendment means no more than that it shall not be infringed by Congress, and has no other effect than to restrict the powers of the national government. the 2nd Amendment solely constrains Congress from infringing upon the right to keep and bear arms while leaving the Executive free to infringe upon this right, or deny its exercise entirely, at will. The Executive is part of the national government that Cruikshank says is restricted by the 2nd amendment, yes? One might read the decision this way, if the Supreme Court had not specifically written that The second amendment means no more than that it shall not be infringed by Congress. The national government is simply mentioned in the decision because the question at bar was if the 2nd applied to the States via the 14th. Under Cruikshank, the Supreme Court ruled that it does not. The Court held that the 2nd only constrained the national government, not the States, and of the national government, only Congress. [...] ten years later in Presser v. Illinois, 116 U.S. 252 (1886). The provision in the Second Amendment to the Constitution, that 'the right of the people to keep and bear arms shall not be infringed,' is a limitation only on the power of Congress and the national government, and not of the States. Again, Presser says the 2nd amendment restricts the president from such an executive order, yes? Under Presser, such an executive order by the President would likely be considered unconstitutional. FYI, the Supreme Court has since revisited, and overturned itself, in just about every aspect of Cruikshank, *except* that the 14th does not extend the 2nd to the States. Which was the issue that Steve Schear inquired about and to which I responded with my post. --Lucky
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Over 100 games online, get tips, join Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 22:19:48 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id VAA29245 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:22:41 -0500 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id VAA29226 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:22:18 -0500 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g542HrE85266 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:17:53 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g542Hq619471 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:17:52 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g542Hou19460 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:17:50 -0400 Received: from mail.bootheel.net (mail.bootheel.net [208.188.244.8]) by locust.minder.net (8.11.6/8.11.6) with SMTP id g542HjE85257 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:17:46 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Date: Mon, 3 Jun 2002 22:17:46 -0400 (EDT) Message-Id: [EMAIL PROTECTED] Received: (qmail 31713 invoked from network); 4 Jun 2002 02:14:30 - Received: from unknown (HELO Vtard) (66.137.221.43) by mail.bootheel.net with SMTP; 4 Jun 2002 02:14:30 - From: webmaster [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Over 100 games online, get tips, join MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=WQ1N418808
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Spice girls' vocal concert Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 22:20:59 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id VAA29397 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:24:32 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id VAA29379 for cypherpunks-outgoing; Mon, 3 Jun 2002 21:24:26 -0500 Received: from mail.bootheel.net (mail.bootheel.net [208.188.244.8]) by einstein.ssz.com (8.8.8/8.8.8) with SMTP id VAA29337 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:23:48 -0500 Date: Mon, 3 Jun 2002 21:23:48 -0500 Message-Id: [EMAIL PROTECTED] Received: (qmail 374 invoked from network); 4 Jun 2002 02:17:59 - Received: from unknown (HELO Cbcgd) (66.137.221.43) by mail.bootheel.net with SMTP; 4 Jun 2002 02:17:59 - From: feedback [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: Spice girls' vocal concert MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=D57Z84gND32cS9tB0oOmOj7lUI6o Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Spice girls' vocal concert Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 22:21:35 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g542L1E85473 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:21:01 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g542L0c19898 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:21:00 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g542Kxu19880 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:20:59 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g542KJE85445 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:20:19 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id VAA29395 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:24:32 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id VAA29379 for cypherpunks-outgoing; Mon, 3 Jun 2002 21:24:26 -0500 Received: from mail.bootheel.net (mail.bootheel.net [208.188.244.8]) by einstein.ssz.com (8.8.8/8.8.8) with SMTP id VAA29337 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 21:23:48 -0500 Date: Mon, 3 Jun 2002 21:23:48 -0500 Message-Id: [EMAIL PROTECTED] Received: (qmail 374 invoked from network); 4 Jun 2002 02:17:59 - Received: from unknown (HELO Cbcgd) (66.137.221.43) by mail.bootheel.net with SMTP; 4 Jun 2002 02:17:59 - From: feedback [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: Spice girls' vocal concert MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=D57Z84gND32cS9tB0oOmOj7lUI6o Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Spice girls' vocal concert
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Language Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 23:25:04 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA30473 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:27:40 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA30456 for cypherpunks-outgoing; Mon, 3 Jun 2002 22:26:07 -0500 Received: from helicon.net (vulcan.charterpa.net [24.197.48.2]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA30426 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:24:36 -0500 Received: from Amrfwe (pa-gbg-ts-07-024-197-056-169.charterpa.net [24.197.56.169]) by helicon.net (8.9.3/8.9.3) with SMTP id XAA31431 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:19:44 -0400 Date: Mon, 3 Jun 2002 23:19:44 -0400 Message-Id: [EMAIL PROTECTED] From: OnlineFriend OnlineFriend@guarant To: [EMAIL PROTECTED] Subject: CDR: Language MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=M54594K9zSHd4H3277 Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to Reliable Antivirus (RAV) v8.3.1 available from http://www.ravantivirus.com/ This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Language Virus : HTML/IFrame_Exploit* Virus : Win32/Klez.H@mm Original headers: From: [EMAIL PROTECTED] Mon Jun 3 23:25:28 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g543PBE88188 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:25:11 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g543P9f24184 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:25:09 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g543P7u24170 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:25:07 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g543NLE88133 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:23:21 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA30472 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:27:39 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA30456 for cypherpunks-outgoing; Mon, 3 Jun 2002 22:26:07 -0500 Received: from helicon.net (vulcan.charterpa.net [24.197.48.2]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA30426 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 22:24:36 -0500 Received: from Amrfwe (pa-gbg-ts-07-024-197-056-169.charterpa.net [24.197.56.169]) by helicon.net (8.9.3/8.9.3) with SMTP id XAA31431 for [EMAIL PROTECTED]; Mon, 3 Jun 2002 23:19:44 -0400 Date: Mon, 3 Jun 2002 23:19:44 -0400 Message-Id: [EMAIL PROTECTED] From: OnlineFriend OnlineFriend@guarant To: [EMAIL PROTECTED] Old-Subject: CDR: Language MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=M54594K9zSHd4H3277 Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Language
ÑûÇ뺯 Time:12:12:36
Title: Ñû Çë º¯ ×𾴵ĺÏ×÷»ï°é Ñû Çë º¯ ×𾴵ĸ÷λÓû§£º ÄãÃǺã¡ ÎÒÃdzÏÖ¿µØÑûÇëÄú²Î¼Ó¡°ÆóÒµÐÅÏ¢»¯¼°ÈËÁ¦×ÊÔ´£¨HR£©Õ½ÂÔ¡±2002Äê´óÐÍÑÐÌֻᣬÓëÄú¹²Ïíeʱ´úµÄÇ°Ñؼ¼ÊõºÍ¹ÜÀí¾Ñé¡£ ½ìʱ£¬ÎÒÃǽ«ÑûÇëIT²úÒµµÄ·çÔÆÈËÎÏêϸ·ÖÎöµ±Ç°ÆóÒµÐÅÏ¢»¯½¨ÉèËùÃæÁÙµÄÖ÷ÒªÎÊÌâ¡¢²ûÊö¹úÄÚÍâÐÅÏ¢²úÒµµÄ·¢Õ¹·½Ïò¡¢²¢Ìṩµç×ÓÉÌÎñ¡¢ÍøÂ簲ȫ¼°HRÕ½ÂԵĽâ¾ö·½°¸¡£ È˲ÅÓë¼¼ÊõÊÇÇý¶¯ÆóÒµ·¢Õ¹ÖÁ¹ØÖØÒªµÄÁ½¸ö³µÂÖ£¬ÈçºÎ·¢ÏÖ²¢ÁôסÈ˲ţ¿ÈçºÎ³ä·Ö·¢»ÓÈ˲ŵÄ×÷Ó㿺£Ìì±¾´ÎÄê»á£¬ÓÐÐÒÇëµ½ÁË΢Èí£¨Öйú£©ÓÐÏÞ¹«Ë¾µÈ¹ú¼ÊÖøÃûÆóÒµ¼°¸ßµÈԺУµÄר¼ÒѧÕߣ¬Ê¡ÊÐÐÅÏ¢²úÒµÖ÷¹Ü²¿ÃŵÄÖØÒªÁìµ¼£¬¾ÍÆóÒµÈçºÎ½â¾öÈ˲ÅØÑ·¦£¬Ìá¸ßÆóÒµ¼¼ÊõˮƽµÈÎÊÌâ×öרҵÐԵĽ¨ÒéºÍÖ¸µ¼¡£ ÏëÁ˽â¹ú¼Ò×îеÄÐÅÏ¢²úÒµÕþ²ß¡¢ÏëµÃµ½Ç¿ÓÐÁ¦µÄ¼¼ÊõÖ§³Ö¡¢ÏëÓµÓзḻµÄÈËÁ¦×ÊÔ´¹ÜÀí¾ÑéµÄIT¾ÀíÃÇ£¬º£ÌìÍøÂç½ÌÓýÖÐÐÄÕâÀïÓм¼Êõ¡¢ÓоÑé¡¢ÓÐ×ÊÔ´£¬Ö»ÒªÄúÌá³öÄúµÄÐèÇó£¬ÎÒÃǽ«¸øÓè×îÂúÒâµÄ´ð¸´ºÍÍêÕûµÄ½â¾ö·½°¸¡£ ͨ¹ý±¾´ÎÑÐÌֻᣬÄú»¹½«ÁìÂÔµ½ÖÚ¶àIT¼¼Êõר¼Ò´øÀ´µÄ×îм¼Êõ½²×ù¡£²¢¿É¸ù¾ÝÄúµ¥Î»Ä¿Ç°µÄÐÅÏ¢»¯×´¿ö£¬ÌṩÓÐЧµÄ¼¼Êõ½¨Òé¡£ »áÒéÖ÷Ì⣺ÆóÒµÐÅÏ¢»¯½¨Éè¼°ÈËÁ¦×ÊÔ´£¨HR£©Õ½ÂÔ »áÒ鸱Ì⣺2002¡ª¡ªº£ÌìÓëÄúЯÊÖͬÐУ¡ ²Î¿¼ÒéÌ⣺ 1¡¢ ±æÎöWTO¶Ô¹úÄÚÆóÒµµÄÓ°Ï죬µ÷ÕûÆóÒµ·¢Õ¹Õ½ÂÔ£¬ÇÀÕ¼ÐÅÏ¢»¯½¨ÉèÏÈ»ú¡£ 2¡¢ ÕýÈ·Öƶ¨ÃæÏòÆóÒµµÄÍøÂ簲ȫ·½°¸¼°ITϵͳÅàѵ½â¾ö·½°¸¡£ 3¡¢ ¹úÄÚÍâ³É¹¦ÆóÒµµÄÈ˲ż¤Àø»úÖÆ£¬½áºÏÆóÒµ×ÔÉíÌص㣬ÕýÈ·ÓÐЧµØʵʩÈ˲ÅÕ½ÂÔ¡£ Ö÷°ìµ¥Î»£ºÉ½¶«º£Ìì¿Æ¼¼·¢Õ¹ÓÐÏÞ¹«Ë¾ ɽ¶«º£ÌìÍøÂç½ÌÓýÖÐÐÄ Ð°ìµ¥Î»£ºº£ÌìÈí¼þ£¨¿Ø¹É£©ÓÐÏÞ¹«Ë¾ ɽ¶«Èí¼þ¹¤³ÌʦÅàÑø»ùµØ ÌرðÖ§³Öµ¥Î»£ºÉ½¶«Ê¡ÐÅÏ¢²úÒµÌü¡¢¼ÃÄÏÊÐÐÅÏ¢»¯Áìµ¼°ì¹«ÊÒ ÌرðÖ§³ÖýÌ壺´óÖÚµçÄÔ±¨¡¢µçÄÔÉÌÇ鱨¡¢µçÄÔ±¨ »áÒéʱ¼ä£º2002Äê4ÔÂ19ÈÕÉÏÎ磺9:00¡ª12:00 ÏÂÎ磺13£º30¡ª17£º30 »áÒéµØµã£º¼ÃÄÏÊÐãøÔ´´ó½Ö6ºÅɽ¶«ÐÂÎÅ´óÏà ÐÂÎÅ´ó»áÌà ÌØÑû¼Î±ö£º ΢Èí£¨Öйú£©ÓÐÏÞ¹«Ë¾ ±±·½Çø×ܼà ËïÓмª °²ÊÏ»¥ÁªÍø°²È«ÏµÍ³£¨Öйú£©ÓÐÏÞ¹«Ë¾ ¸±×ܲà ³Â¿¡ÇÅ ÃÀ¹úProsoft Training¹«Ë¾ ÑÇÌ«Çø×ܲà Benjamin Fink ·¶²©ÎÄ ÖйúÇø×ܾÀí Cindy Zheng Ö£ ÐÀ ÉñÖÝ»ª²ÊÍøÂçÈí¼þÓÐÏÞ¹«Ë¾ Êг¡×Ü¼à »ÆÎIJ® Prometric£¨Öйú£©ÓÐÏÞ¹«Ë¾ ±±·½ÇøÇþµÀ¾Àí Îâ âý »áÒéÈճ̣º 8£º30¡ª9£º00 »áÒéÇ©µ½ 9£º00¡ª9£º15 ɽ¶«º£Ìì¿Æ¼¼·¢Õ¹ÓÐÏÞ¹«Ë¾ ɽ¶«º£ÌìÍøÂç½ÌÓýÖÐÐÄ ×ܾÀí ÂíÁ¢Ð Ö»¶Ó´Ê 9£º15¡ª9£º30 ɽ¶«Ê¡ÐÅÏ¢²úÒµÌü¸±Ìü³¤ ÑîÉÙ¾ü ÖÂ´Ê 9£º30¡ª9£º40 ¼ÃÄÏÊи±Êг¤ ÍõÌìÒå ÖÂ´Ê 9£º40¡ª9£º50 º£ÌìÈí¼þ£¨¿Ø¹É£©ÓÐÏÞ¹«Ë¾ ¶Ê³¤ ×ÞÏþ¶« ÖÂ´Ê 9£º50¡ª11£º00 º£Ìì¿Æ¼¼·¢Õ¹ÓÐÏÞ¹«Ë¾ ¹¤³Ìʦ רÌâ ¼¼ÊõÑݽ² ¡¶ÍøÂçÓ¦ÓÃ×îз¢Õ¹ÓëÍøÂ簲ȫʵÎñ¡· 11£º00¡ª11£º20 ÃÀ¹úProsoft Training¹«Ë¾ ÑÇÌ«Çø×ܲà ·¶²©ÎÄ ÖÂ´Ê 11£º20¡ª11£º45 °²ÊÏ»¥ÁªÍø°²È«ÏµÍ³£¨Öйú£©ÓÐÏÞ¹«Ë¾ ¸±×ܲà ³Â¿¡ÇÅ ÖÂ´Ê 11£º45¡ª12£º00 ÃÀ¹úPrometric¹«Ë¾ ±±·½ÇøÇþµÀ¾Àí Îââý ÖÂ´Ê ½²×ù£¨¼¼ÊõÓëÈËÁ¦×ÊÔ´£©£º 1£º30¡ª2£º30 ɽ¶«º£Ìì¿Æ¼¼·¢Õ¹ÓÐÏÞ¹«Ë¾ ɽ¶«º£ÌìÍøÂç½ÌÓýÖÐÐÄ ¼¼Êõ×ܼà Áõ´óÓ 2£º30¡ª3£º20 ɽ¶«Èí¼þ¹¤³ÌʦÅàÑø»ùµØ ¼¼ÊõÖ§³Ö¾Àí ÁõËÕÇ¿ 3£º30¡ª4£º30 °²ÊÏ»¥ÁªÍø°²È«ÏµÍ³£¨Öйú£©ÓÐÏÞ¹«Ë¾ ¼¼Êõ¹¤³Ìʦ 4£º30¡ª5£º30 ɽ¶«´óѧ¹ÜÀíѧԺ Íõ»³Ã÷²©Ê¿ ɽ¶«º£Ìì¿Æ¼¼·¢Õ¹ÓÐÏÞ¹«Ë¾ ×ܾÀí ÂíÁ¢Ð 4/15/2002 - ±¨ Ãû »Ø Ö´ ±í µ¥Î»£º µØÖ·£º ÐÕÃû£º Ö°Îñ: µç»°: ´«Õæ: E-MAIL: ÈËÊý: ·²Æ¾ÑûÇ뺯²Î¼Ó»áÒéµÄµ¥Î»»ò¸öÈ˾ùÓо«ÃÀÀñÆ·ÔùËÍ£¬²¢Ãâ·Ñ³ÉΪº£Ìì¾ãÀÖ²¿»áÔ±¡£ ×Éѯµç»°£º0531£8925480 8925840 ÁªÏµÈË£ºÎºÐ¡½ã
Fax-On-Demand
Reach hundreds of thousands of potential customers with YOUR OWN EXCLUSIVE FAX-ON-DEMAND Reap giant benefits from Global Fax WITHOUT the need to own your own fax machine - it can't get any easier than that! WHY DO YOU NEED A FAX-ON-DEMAND SYSTEM? For 3 Very Simple Reasons: To reach CURRENT and FUTURE: Customers Clients Members Distributors Partners Employees Contractors Vendors To MAKE and SAVE MORE MONEY while SPENDING LESS for Advertising and Marketing! To BUILD YOUR BUSINESS worldwide at low cost! Have an Unlimited Number of People Receiving Your Information, 24/7 ! Exactly what is Fax-On-Demand? Fax-On-Demand (FOD) allows a caller from ANYWHERE in the world, to dial a telephone number from the handset of ANY fax machine, then following the voice prompts they hear, enters a 3 digit Document number they want (YOUR Document number) and, within seconds of them pressing Enter or Start on the fax machine, out comes between 1-11 pages of whatever information you want them to have! Now, here's the BEST part: Your prospects, clients, customers, employees, ANYONE, will get the information whenever THEY want it! Anytime! 24 hours per day - 365 days a year! NO more re-printing costs! NO more mailing costs! Think of all the money YOU save! You do not pay any telephone costs - you use our telephone lines and equipment. You don't even have to own a fax machine! Make Money While You Sleep! Time zones and geography don't matter! When your prospect wants your info - they want it NOW! So, give them the chance to do business with you. Remember, prospects who receive info when THEY want it, make for very happy customers! You Are ABSOLUTELY GUARANTEED The Following Benefits: Save Money on Printing and Re-Printing, Postage and Employee Time! No need to keep re-printing information and spending money on postage and long distance costs to fax your material! You print your information ONCE, we load it into YOUR Fax-On-Demand and you're done. Save Time and Labor Costs! Simply give your prospects, customers or employees your phone number with your own document number and, at their convenience, they will access YOUR material immediately! NO more extra mailings! NO more lost money! Reduce the size of your ads by simply including your Fax-On-Demand (FOD) number in your ad with a simple, "For complete information by FAX, please call from any fax machine, XXX-XXX- and enter Doc. # XXX!" Save Energy in managing large volumes of requests and responses! Increase Profits and Keep Customers Happy! Do NOT lose an interested prospect again! With your own Fax-On-Demand (FOD), they receive all the information you want them to have, When They Want It! Worldwide Access to Your Information with No Limit to the Calls You Receive! NO hidden fees! NO set-up fees! NO invisible fees! You pay NO long distance charges or paper charges! More Sales! Fewer Interruptions! Less Work! Some have extra charges, such as whenever you want to change your information stored in your Fax-On-Demand Document box. Well, we haven't forgotten that our customers are important to us and we want to earn your trust! We charge NO fee to change your information - ever! NO application fee! NO set-up fee! Our customers are the BEST and we value YOU! We give our customers the BEST customer service in the industry - BAR NONE! For the complete details and pricing Click Here NOW! To opt out, Click Here
don't Pay another monthly Bill until you read thisXFMZCLBQPEIA
Let lenders compete for your business!Enter Here For Free InfoCash back refinancesNo Equity 2nd Trust DeedsDebt ConsolidationNo Income VerificationThe most competitive interest rates!Enter Here To Save Today!There is NEVER any fee to consumers for using this service.If you no longer wish to receive any of our informitive productsyou may be permanently disconnected by Going Here.
ANNOUNCEMENT: Mortgage Rates at All Time Low!
Mortgage Lenders Brokers Are Ready to compete for your business. Whether a new home loan is what you seek or to refinance your current home loan at a lower interest rate, we can help! Mortgage rates haven't been this low in years take action now! Refinance your home with us and include all of those pesky credit card bills or use the extra cash for that pool you've always wanted... Where others say NO, we say YES!!! Even if you have been turned down elsewhere, we can help! Easy terms! Our mortgage referral service combines the highest quality loans with the most economical rates and the easiest qualifications! Take just 2 minutes to complete the following form. There is no obligation, all information is kept strictly confidential, and you must be at least 18 years of age. Service is available within the United States only. This service is fast and free. Free information request form: PLEASE VISIT http://builtit4unow.com/pos Since you have received this message you have either responded to one of our offers in the past or your address has been registered with us. If you wish to OPT_OUT please visit: http://builtit4unow.com/pos
6 Figures from home!
Title: JUST THE FACTS JUST THE FACTS! $$ Make $1000 Plus Per Day $$ We're Making $3000 to $5000 per Fax Blast! "COMMISSIONS" PAID DAILY! Start YOUR own Business with NO MONEY DOWN! Personalized Replicating Website! NO Monthly Product Purchase! Our Sponsor Made $29,000 last week! Our first 3 DAYS, we made $12,000! 7 Live Conference Calls DAILY! Free Dell Computer Free Satellite Dish 34 FREE Vacations Free Hotel Accommodations Free 35 MM Camera Free..200 Rolls of Film And much, much more! Turn Key System-Earn $3k to $5k your 1st week! For Immediate insider information to be removed from our subscriber lists click here 19
pearl white teeth in 1 week19929
Quick White is the 15-minute home bleaching kit that's easy and effective: No measuring, no mixing, no mess! Comfortable disposable trays that fit all mouth sizes! Just 15 minutes a day for 5 days! 100% money back guarantee (less shipping charges) Limited time offer: Order now for ONLY $49.95! Consider improving one of your most important features with the Quick White complete tooth bleaching system. Quick White tooth bleaching system is a 15-minute a day home tooth whitening kit that combines convenience with comfort. Quick White tooth bleaching system is approved by the American Dental Association and is the same tooth whitener found in 3000 dental offices nationwide only it's 300% cheaper! Go Here to save $100 on Quick White. Hurry! This incredible offer ends soon. Discontinue your membership to savings alerts: Extract Here
Re: FC: Hollywood wants to plug analog hole, regulate A-D
On Mon, 3 Jun 2002, Dave Emery wrote: And telling the public that they face serious jail time if they don't turn in that Creative Soundblaster from the old PC in the attic closet isn't going to fly. The sheeple may be sheep but even they aren't going to accept that kind of nonsense from Hollywood or any corrupt congress. I'd even venture to say that if this issue breaks out into the big time and the public really is faced with crippled devices that don't work and mandatory obselescence of existing expensive computer and entertainment systems with potential jail time for use of old equipment that the backlash will be so intense that raw public votes will control over Hollywood money. I think that's what boils down to the bottom line. Because there are so many units in place that can do the bypass, there will be enough time to create a backlash. There's already a backlash on protected CD's, mostly by consumers who can't play them on older CD players. It's just not gonna fly with the public, so that may be all it takes to stomp hollywood on this one. Time will tell I guess. Patience, persistence, truth, Dr. mike
RE: 2 Challenge Gun Cases, Citing Bush Policy
At 07:17 PM 6/2/02, Lucky Green wrote: In United States v. Cruikshank, 92 U.S. 542 (1876), the Supreme Court held that: ... The right to bear arms is not granted by the Constitution; neither is it in any manner dependent upon that instrument for its existence. The second amendment means no more than that it shall not be infringed by Congress, and has no other effect than to restrict the powers of the national government. the 2nd Amendment solely constrains Congress from infringing upon the right to keep and bear arms while leaving the Executive free to infringe upon this right, or deny its exercise entirely, at will. The Executive is part of the national government that Cruikshank says is restricted by the 2nd amendment, yes? Under Cruikshank, Congress may not pass a bill infringing on the right of the citizens to keep and bear arms, but a Presidential Executive Order that all private citizens are to turn in their guns tomorrow passes Constitutional muster. Then Cruikshank didn't mean to include the President as part of the national government that it found to be restricted by the 2nd amendment? ten years later in Presser v. Illinois, 116 U.S. 252 (1886). The provision in the Second Amendment to the Constitution, that 'the right of the people to keep and bear arms shall not be infringed,' is a limitation only on the power of Congress and the national government, and not of the States. Again, Presser says the 2nd amendment restricts the president from such an executive order, yes?
Re: BBC hijacks TiVo recorders
At 0:24 -0700 2002/06/02, Marc wrote: To be honest, the complaints about this are excessive. The problem isn't that the TiVo recorded a promotional show, it's that it recorded a show that has some semi-adult content in it and parental controls don't restrict promotional recordings. ...and they did this at the request of the BBC who paid them to do it. yeesh. I don't think anyone came out of this looking good. UltimateTV surprisingly is less intrusive, it doesn't have to use the phone at all (except for standard DirecTV PPV calls) and uses the downstream from the dish to verify subscriptions. making it easier to bypass paying for service than it is on the TiVo, just activate the right tier and presto, UTV service. -- J. Eric Townsend -- jet spies com buy stickers: http://www.spies.com/jet/store.html to support the artcar: http://www.spies.com/jet/artcar.html Looking for vets who served with USASSG/ACSI/MACV in Vietnam, 1967-1970.
Re: FC: Hollywood wants to plug analog hole, regulate A-D
On Fri, May 31, 2002 at 08:59:43PM -0500, Neil Johnson wrote: Remember it only requires ONE high-quality non-watermarked analog to digital copy to make it on the net and it's all over. And that is what this whole nonsensical scheme founders on. There are probably 300-500 million existing sound cards out there and at least millions of existing NTSC analog capture cards. Many if not most can do acceptable fidelity conversion of analog audio and video to digital formats if programmed correctly. And there are even a few tens of thousands (or more) of new generation PCI cards that capture ATSC digital video (including HDTV) direct to disk in the clear. The MPAA cannot will these out of existance. Sure some are obselete ISA based designs, but there are certainly enough reasonably current boards around so that it will be a long long while before the population of working systems capable of performing analog to digital conversion of either watermarked audio or video reaches insignificance. And without that point being reached, anything else seems pretty ineffective as per your point above. And telling the public that they face serious jail time if they don't turn in that Creative Soundblaster from the old PC in the attic closet isn't going to fly. The sheeple may be sheep but even they aren't going to accept that kind of nonsense from Hollywood or any corrupt congress. I'd even venture to say that if this issue breaks out into the big time and the public really is faced with crippled devices that don't work and mandatory obselescence of existing expensive computer and entertainment systems with potential jail time for use of old equipment that the backlash will be so intense that raw public votes will control over Hollywood money. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
European Data Retention and Encryption for Dummies
Hi everyone, I've been on this list before, but didn't have time for it for a while. Now I'm back because I need some input: You probably heard that the EU is currently passing data retention laws. One part of them would require that ISPs keep logs of customer traffic. It isn't entirely clear what exactly they need to store, but the discussion goes into URL storage (i.e. what file on which virtual host) and even full data storage (i.e. copies of the IP packets). Obviously, at least the later is bullshit. However, it is absolutely possible that it's just a smokescreen and the usual compromise will be that the ISPs don't have to store the data except on request... Enter a simple idea to solve the obvious privacy problem, at least in parts. We do have the infrastructure in place to achieve end-to-end encryption for the by far most-often-used web services, all we need is to use it. I am, of course, talking about HTTPS and SMTPS. Setting up apache so that it does HTTPS instead of HTTP, and all requests to HTTP pages are redirected to a page pointing to the HTTPS equivalent and explaining why is trivial. Getting the various MTAs to use SMTPS isn't too difficult, either. The problem with both is the need of SSL certificates. So I was thinking of setting up a Joe Doe's CA. A simple webpage where you can request a certificate. It would do two check: a) check if IP you are using is identical to the IP you are requesting for, i.e. you'll have to ssh into your webserver and use lynx from there. b) the certificate will be mailed to the admin-c of the domain you requested it for (whois lookup). This is not 100% secure, but then again how much checking does Verisign really do on certificates? I believe this is good enough in that it establishes a reasonable safety that you are talking to the right site, at least much better than regular HTTP can offer. The purpose of this is to get as many sites to switch to using HTTPS and SMTPS as possible. Therefore, the required work must be kept minimal. Once considerable parts of the internet traffic are encrypted, they can pass as many data retention laws as they please. Any comments? What did I miss? Where does this idea come apart? Does it make sense at all? -- New GPG Key issued (old key expired): http://web.lemuria.org/pubkey.html pub 1024D/2D7A04F5 2002-05-16 Tom Vogt [EMAIL PROTECTED] Key fingerprint = C731 64D1 4BCF 4C20 48A4 29B2 BF01 9FA1 2D7A 04F5
RE: 2 Challenge Gun Cases, Citing Bush Policy
And in 1908 in Twining, the USSC found that the 5th amendment was similarly a limitation upon the national government, not the state governments, i.e., the states are not required by the fifth amendment to abstain from requiring a defendant to incriminate himself in testimony. But the first 8 amendments have been progressively extended to the states by application of the 14th amendment. For example, the fifth circuit, just eight months ago, finds the invididual model prevails not only over the national government, but also the states, and it declares that Cruikshank fails to establish any principle governing any of the issues.. regarding the 14th amendment's extension of the Bill of Rights to limit the power of the states. 13. In United States v. Cruikshank, 23 L.Ed. 588 (1875), the Court held that the Second Amendment is one of the amendments that has no other effect than to restrict the powers of the National Government. Id. at 592. In Presser v. Illinois, 6 S.Ct. 580, 584 (1886), the Court, reaffirming Cruikshank and citing Barron v. Baltimore, 8 L.Ed. 672 (1833), held that the Second amendment is a limitation only upon the power of congress and the national government, and not upon that of the state. And, in Miller v. Texas, 14 S.Ct. 874 (1894), the Court held, with respect to the second and fourth amendments that the restrictions of these amendments operate only upon the federal power, and have no reference whatever to proceedings in state courts, citing Barron v. Baltimore and Cruikshank. As these holdings all came well before the Supreme Court began the process of incorporating certain provisions of the first eight amendments into the Due Process Clause of the Fourteenth Amendment, and as they ultimately rest on a rationale equally applicable to all those amendments, none of them establishes any principle governing any of the issues now before us. http://laws.lp.findlaw.com/5th/9910331cr0.html
Re: FC: Hollywood wants to plug analog hole, regulate A-D
Mike Rosing wrote: On Mon, 3 Jun 2002, Dave Emery wrote: And telling the public that they face serious jail time if they don't turn in that Creative Soundblaster from the old PC in the attic closet isn't going to fly. The sheeple may be sheep but even they aren't going to accept that kind of nonsense from Hollywood or any corrupt congress. I'd even venture to say that if this issue breaks out into the big time and the public really is faced with crippled devices that don't work and mandatory obselescence of existing expensive computer and entertainment systems with potential jail time for use of old equipment that the backlash will be so intense that raw public votes will control over Hollywood money. I think that's what boils down to the bottom line. Because there are so many units in place that can do the bypass, there will be enough time to create a backlash. There's already a backlash on protected CD's, mostly by consumers who can't play them on older CD players. It's just And/or indeed, on newer players. In the UK at least (http://uk.eurorights.org/issues/cd/docs/celdion.shtml) the new generation of anti-theft CDs have been reported to be useless on modern DVD players/car stereos, by design. Some older players either lack the feature or are less sensitive, I assume, so can be ok. It's just a case of matching a technology with the right player... So not content with limiting public demand for new hardware (a minor issue), the extra precautions actively encourage consumers to not buy legal content. Woo. Better to get illegal content that you can do what you want with. With regards to the analog[ue]/digital stop-gapping, r o f l m a o. This would be just as effective as, ooh, copy-protecting CDs? Oh, humm... Chasing down peer-to-peer outfits? Uhh... Trying to ban videos? Oh, wait... Firstly, in order to prevent widespread ripping of analog signals through disabling mass consumer device, there needs to /be/ mass consumer ripping. How many people do you know who actually go to the trouble of transferring their taped episodes/films onto their PC? It's not as simple as grabbing mp3s. As with other such distribution in its relevant infancy, the hard work's carried out by a much smaller number of people - millions of films may be downloaded every month, but there's generally only 2 or 3 versions of each film, from different sources, max. Believing that crippling the populace will fill this tiny leak is... well, amusing. Secondly, how much work is going to go into protecting a fading technology? This is from both the MPAA's and the consumers' points of view. For the former, analog avoidance is only of any use if the content is not readily available in digital format already. Most of the analog content that I guess the MPAA want to stop conversion of is either people in cinemas with cameras, or people with tapes of episodes at home. The former is hard to stop through watermarking (I'm unsure of the technicalities, but I'd have thought preserving it between screen and camera would be tricky? Even without people geting uo and walking past the view...), and even then it's only one source of films. The latter is, I suspect, more the target of the MPAA's volley. If this doesn't move towards digital origins, i.e. through PVRs or cable-streams obtained via PC (which are subject to a different smother), then the abundance of existing technology, and probable (anonymous) circumvention of new ones anyway renders all actions proposed useless. The question then is how much investment do you want to throw away? Outside the US, I suspect that the circumvention may go the same way as DVD region control. Looking at players recently, it was quite hard (after checking around, as most people would) to actually _avoid_ region-locked DVD players. The only real factor that really keeps regions in place is their localised supply to meatspace shops, or the boundaries of international postage packing. Foolishness, foolishness, and yet more foolishness. Perhaps if we just ignore them, then they'll go away eventually :) .g
Anthrax, barbed wired gags, stinkin' in Tennessee
Something stinks in Tenn, and its not the Gores this time: Among his recent cases was the death of Harvard University biologist Don Wiley, whose fall from a Memphis bridge in December fueled fears of terrorist kidnappings. The medical examiner also helped identify the body of Katherine Smith, 49, who was found burned beyond recognition in February the day before a hearing on federal charges of helping five Middle Eastern men obtain fake driver's licenses. MEMPHIS, Tenn. - Medical examiner O.C. Smith, who has worked on some of the city's most puzzling deaths, is at the center of another perplexing case: He was attacked over the weekend, bound with barbed wire and left with a bomb tied to his body. http://ap.tbo.com/ap/breaking/MGABCF4U02D.html The spooks are getting careless in Tenn. First they do the car-accident/injection thing with a anthrax-saavy microbiologist, who floats up 300 mi away, then a DMV-weenie-roast, now games with the coroner? What, was he going to tell?
Re: FC: Hollywood wants to plug analog hole, regulate A-D
- Original Message - From: Neil Johnson [EMAIL PROTECTED] To: Joseph Ashwood [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Friday, May 31, 2002 6:59 PM Subject: Re: FC: Hollywood wants to plug analog hole, regulate A-D On Sunday 02 June 2002 08:24 pm, Joseph Ashwood wrote: The MPAA has not asked that all ADCs be forced to comply, only that those in a position to be used for video/audio be controlled by a cop-chip. While the initial concept for this is certainly to bloat the ADC to include the watermark detection on chip, there are alternatives, and at least one that is much simpler to create, as well as more benficial for most involved (although not for the MPAA). Since I'm writing this in text I cannot supply a wonderful diagram, but I will attempt anyway. The idea looks somewhat like this: analog source --ADC--CopGate-digital Where the ADC is the same ADC that many of us have seen in undergrad electrical engineering, or any suitable replacement. The CopGate is the new part, and will not be normally as much of a commodity as the ADC. The purpose of the CopGate is to search for watermarks, and if found, disable the bus that the information is flowing across, this bus disabling is again something that is commonly seen in undergrad EE courses, the complexity is in the watermark detection itself. The simplest design for the copgate looks somewhat like this (again bad diagram): in|---buffergatesout CopChip-| Where the buffer gates are simply standard buffer gates. This overall design is beneficial for the manufacturer because the ADC does not require redesign, and may already include the buffergates. In the event that the buffer needs to be offchip the gate design is well understood and commodity parts are already available that are suitable. For the consumer there are two advantages to this design; 1) the device will be cheaper, 2) the CopChip can be disabled easily. In fact disabling the CopChip can be done by simply removing the chip itself, and tying the output bit to either PWR or GND. As an added bonus for manufacturing this leaves only a very small deviation in the production lines for inside and outside the US. This seems to be a reasonable way to design to fit the requirements, without allowing for software disablement (since it is purely hardware). Joe Bz! Wrong Answer ! How do you prevent some hacker/pirate (digital rights freedom fighter) from disabling the CopGate (by either removing the CopChip, finding a way to bypass it, or figure out how to make it think it's in, Government Snoop mode ) ? To quote myself the CopChip can be disabled easily, last paragraph sentence begins with For the consumer . . . as has been pointed out by numerous people, there is no solution to this. With a minimal amount of electrical engineering knowledge it is possible for individuals to easily construct a new ADC anyway. Then the watermark can be removed. Which can and should be done after conversion. Remember it only requires ONE high-quality non-watermarked analog to digital copy to make it on the net and it's all over. You seem to be of the mistaken opinion that I believe this to be a good thing, when the design I presented was designed to minimize cost, of design, manufacture, and removal. I am of the fundamental opinion that this is not a legal problem, this is a problem of the MPAA and anyone else that requires a law like this to remain profitable is advertising incorrectly. The Hollywood studios have already found the basic solution, sell advertising space _within_ the program. In fact some movies are almost completely subsidized by the ad space within the movie. By moving to that model for primary revenue it is easy to accept that a massive number of copies will be made since that improves the value of the ad space in your next movie/episode. Of course I'm not involved with any studio so they don't ask my opinion. Joe
RE: 2 Challenge Gun Cases, Citing Bush Policy
Ed wrote: At 07:17 PM 6/2/02, Lucky Green wrote: In United States v. Cruikshank, 92 U.S. 542 (1876), the Supreme Court held that: ... The right to bear arms is not granted by the Constitution; neither is it in any manner dependent upon that instrument for its existence. The second amendment means no more than that it shall not be infringed by Congress, and has no other effect than to restrict the powers of the national government. the 2nd Amendment solely constrains Congress from infringing upon the right to keep and bear arms while leaving the Executive free to infringe upon this right, or deny its exercise entirely, at will. The Executive is part of the national government that Cruikshank says is restricted by the 2nd amendment, yes? One might read the decision this way, if the Supreme Court had not specifically written that The second amendment means no more than that it shall not be infringed by Congress. The national government is simply mentioned in the decision because the question at bar was if the 2nd applied to the States via the 14th. Under Cruikshank, the Supreme Court ruled that it does not. The Court held that the 2nd only constrained the national government, not the States, and of the national government, only Congress. [...] ten years later in Presser v. Illinois, 116 U.S. 252 (1886). The provision in the Second Amendment to the Constitution, that 'the right of the people to keep and bear arms shall not be infringed,' is a limitation only on the power of Congress and the national government, and not of the States. Again, Presser says the 2nd amendment restricts the president from such an executive order, yes? Under Presser, such an executive order by the President would likely be considered unconstitutional. FYI, the Supreme Court has since revisited, and overturned itself, in just about every aspect of Cruikshank, *except* that the 14th does not extend the 2nd to the States. Which was the issue that Steve Schear inquired about and to which I responded with my post. --Lucky