A GOOD MANAGER KNOWS.

2002-06-21 Thread frank334

What are your employees or children doing online?

To learn more about this great new software, please visit our website.

http://www.software4udepo.com


$79.99 Download Limited Time Offer
$89.99 Domestic CD $94.99 Outside U.S.

For those of you who would feel more comfortable ordering off-line:

Please fax your Name, Address, E-mail, Credit card number and expiration date to 
309-407-7378
Be sure to use Ref# 387 in your order.

A CD-Rom will be shipped via first class mail.

To have no other suggestions sent

http://www.software4udepo.com/visit.htm




make your cell phone ring to a song 582919

2002-06-21 Thread cell_phone_fun582919




 
   
   Take yourself out of our list BY CLICKING HERE
  

 
   
BORED 
  WITH 
  YOUR CELL PHONE?
  

 
   
 
  
  
 
   
 
  • • • • • • • • 
  • • • • • • • • 
  • • • • • •
  Get 
  cool Songs & Logos to your Phone today!
  • • • • • • • • 
  • • • • • • • • 
  • • • • • •
  

  
   
  
  

 
   
  It's 
  real simple! No confusing downloads 
  or installations.Simple phone activation!
  

 
   

 
   
• 
  • • Click Here to order 
  • • • 
  

 
   
There 
  are tons of songs and graphics to choose from.
  See a sample of some of the songs to choose from below:
  

 
   

   
 
 
  
   
SONG
ARTIST
  
   
Get 
  Ur Freak On
Missy 
  Elliott
  
   
Billie 
  Jean
Michael 
  Jackson
  
   
Batman
Danny 
  Elfman
  
   
Walk 
  Like an Egyptian
Bangles
  
   
Flinstones
Barbera
  
   
4 
  Page Letter
Aaliyah
  
   
Like 
  a Virgin
Madonna
  
   
What's 
  It Gonna Be?
B.Rhymes/J.Jackson
  
   
Achy 
  Breaky Heart
Billy 
  Ray Cyrus
  
   
Star 
  Spangled Banner
John 
  Smith
  

  

 
   

 
   
When 
  you are ready to order, just
  

 
   
 
  •click here!•
  

 
   
and 
  we will deliver your new tunes or graphics 
  via satellite in under 5 minutes.
  


 
   
   Take yourself out of our list BY CLICKING HERE
  

  

582919



MY GOOD FRIEND!!

2002-06-21 Thread Col. Prince Roland (rtd)

Dear Sir/Madam,

My name is More Bring {rtd} I was the former Vice Chairman of Petroleum Trust Fund 
(P.T.F), which was dissolved by the correct Democratic President of Nigeria.

I got your through from International Business Directory with the belief that you will 
be of assistance in this promising business transaction. I acquired some money during 
my time in the office as vice chairman of the Petroleum Trust Fund (P.T.F).

The said money is amounted to the tune of US$95 (Ninty-Five Million United State 
Dollar). Which i deposited in a Security Company for safe keeping, I have been paying 
for the demurrage incurred by the money for the past 3 years, which I feif is not 
profitable for me.

I would like to invest  in your company not minding going into partnership with you or 
you introduce me to some other lucrative and profitable business in your country for 
me to invest this money.

If, we can arrive at a proper momorandum of understanding I will furnish you with more 
details regarding this transaction.

The sharing pattern would be profitable for both of us. Please your earliest reply 
will be much appreciate. My direct 
email:[EMAIL PROTECTED] 

Thank for your understanding.

Best regards

Col. Prince Roland (rtd)




Increase Sales, Accept Credit Cards [r54fa]

2002-06-21 Thread Everett Yvonne

*This message was transferred with a trial version of CommuniGate(tm) Pro*

Merchant Account






Got a business? 
Accept Credit Cards!




VISA - Master Card - American 
Express

Retail or online, big or small, we provide businesses of all types an opportunity to 
have their own no hassle Credit Card Merchant Account with NO setup fees. Good credit, 
bad credit, no credit -- not a problem! 95% approval rate!

Make your business grow by giving your customers an easy and secure method of paying 
for your products or services. With a merchant account not only will you be able to 
handle credit cards, but as well as debit cards, ATM and check guarantee services. You 
will have the ability to accept E-checks over the Internet with a secure server. To 
ensure that you won't miss a sale, you will be able to accept checks by Phone or Fax. 
We can handle ANY business and client type!

No Setup Fees - Low Monthly Cost

To learn more about this offer, please fill out the form below. There are no costs or 
obligations involved. One of our staff will contact you within 5-10 business days and 
will answer any questions you may have.












http://wwp.icq.com/whitepages/page_me/1,,,00.html"; 
method="Post">






Full Name 
  
Phone Number 
  
Time to Call 
  
E-Mail   
 


Note: All fields are required











For mailing list removal please reply with the word 'Remove' in the subject line of 
the email. We apologize for any inconveniences.










r54fasmy7m




Re: Vinnie is looking for work..

2002-06-21 Thread V Alex Brennen

At the cypherpunks meeting in SF during CodeCon, I think it was
Dave Del Torto who asked for a show of hands of punks looking
for work.  It was better than half.

With the economy starting to improve and rumors of a trickle of 
VC money, now might not be a bad time to try and launch a start
up. I know Sandy was trying to get something started down south.

I've been spending allot of time on cypherpunk type projects,
but with a day job progress has been slow and hard.  I'd be 
interested in joining a company to work on something that could 
translate into technical progress for the cypherpunk movement.

I think there's good opportunity in digital signature 
applications, PKI alternatives, and reputation systems.
Unfortunately, I don't see opportunity with electronic
currency - at least not in the US.


- VAB




Raping Animal Lovers Go To The Extreme!!!!!!!!

2002-06-21 Thread tiwwn


Rape Sex!!!

CLICK HERE to access thousands of uncensored photos and videos right now!

==
.. Wilma had a very perverted idea, that gave her butterflies in her stomach.
She wanted to suck the sex-crazed beast's huge cock.
It was a part of her favorite fantasy, and so tempting that she couldn't resist
To be continued...

CLICK HERE

==


If you wish to unsubscribe, click here!







Your Account # #6FCF

2002-06-21 Thread Samuel Kronan
Title: FREE Computer With Merchant Account Setup







COMPLETE CREDIT CARD PROCESSING SYSTEMS FOR YOUR BUSINESS. INTERNET -  HOME
BASED -  MAIL ORDER -  PHONE ORDER
Do you accept credit cards? Your competition does!
 
Everyone Approved - Credit Problems OK!
Approval in less than 24 hours!
Increase your sales by 300%
Start Accepting Credit Cards on your website!
Free Information, No Risk, 100% confidential.
Your name and information will not be sold to third parties!
Home Businesses OK!  Phone/Mail Order OK!
No Application Fee, No Setup Fee!
Close More Impulse Sales!



  

  
Everyone Approved!
 Good Credit or Bad!  To apply today, please fill out
the express form below. It
contains all the information we need to get your account approved. For area's
that do not apply to you please put "n/a" in the box.

Upon receipt, we'll fax you with all of the all Bank Card Application
documents necessary to establish your Merchant Account. Once returned we can
have your account approved within 24 hours. 

  

  


  

  Service
  Industry
Standard
  
US
  


  Site
Inspection
  $50 - $75
  FREE


  Shipping
  $50 - $75
  FREE


  Warranty
  $10 Per Month
  FREE


  Sales
Receipts
  $10 - $50 
  FREE


  Fraud
Screening
  

  $.50 - $1.00
  Per Transaction


FREE


  Amex Set
Up
  $50 - $75
  FREE


  24 Hour Help
Line
  $10 Month
  FREE


  Security
Bond
  $5000- $10,000
Or More
  NONE

  


  

  
This is a No
Obligation Qualification Form and is your first step to
accepting credit cards. By filling out this form you will "not
enter" in to any obligations or
contracts with us. We will use it to determine the best program
to offer you based on the information you provide. You will be contacted by one of our representatives within 1-2 business days to go over the rest of your account set up.
Note: 
All Information Provided To Us Will Remain 100%
Confidential
!! 

  


  

  
Apply
Free With No Risk!
  

  

  


  

  
Please fill out the
express application form completely.Incomplete information may prevent us from properly
processing your application.
  

  



  

  Your Full Email Address:
be sure to use your full address (i.e.
[EMAIL PROTECTED])
  


  Your Name:
  


  Business Name:
  


  Business Phone Number:
  


  Home Phone Number:
  


  Type of Business:
  

  

  
  Retail Business


  
  Mail Order Business


  
  Internet Based Business

  

  


  Personal Credit Rating:
  

  

  
  Excellent


  
  Good


  
  Fair


  
  Poor

  

  


  How Soon Would You Like a Merchant
Account?
  

  


  

  
  

  


  
  

  

  


  
  

  Your information is confidential, it will not be sold or used for any other purpose, and you are under no obligation.
Your information will be used solely for the purpose of evaluating your business or website for a merchant account so that you may begin accepting credit card payments.
  

  
  





List
 Removal/OPT-OUT Option
 Click
 Herem








Re: DOJ proposes US data-rentention law.

2002-06-21 Thread John Young

Data retention is being done now by programs and services
which cache data to ease loading on servers and networks.
No approval needed from  anybody, indeed, the service is
being offered as a cost saver and expeditor of net services
to ISPs and anybody else who might be eager to get around
restrictions on data retention, not because of privacy and
civil liberties concerns but because the increase in loading
and competition is driving the technology.

What will prevent an ISP from sharing its cached data retention,
-- performed to remain competitive in the market -- with officials
who just might ask for a favor through the legal department, 
knowing nobody will know what's going on, and what the hell, 
that nobody cares so long as the cost of services is kept low?
Why not give up privacy for a cheap deal?

A skeptic might wonder why all the folderole about the EuroParl
and DoJ proposals and implementatios when the really good
stuff is already accessible, no complicated procedures required
to sample the stored produce. No evidence that anybody has
taken a look, grabbed some data of the usual suspects.

A sample of above-board date retention products via caching
offerer, which brags all its products retain data in the interest
of always marketable cost savings:

  http://www.soliddata.com/solutions/telecom_appbrief.html

The URL sent by anonymous.




Home Loans - Free Quote

2002-06-21 Thread kristie
Title: Untitled Document





   
   
 
  
 
   
Home 
  Loan Network™

  

  
  
 
   
Home 
  of America's Most Liberal Lenders
  

  
  Other 
mortgage companies make you wait...They demand to interview you...
They 
intimidate you...They humiliate you...And all of that 
while 
they decide if they even want to do business with you...

   
  We turn the tables 
on 
them...
Now, you're in charge!
  Just 
fill out our simple form and our network of Top Lenders will compete 
for 
your business...
  All 
USA 
Homeowners  

easily qualify!
We 
have Special Programs for every type of Loan and Credit 
History

  CLICK 
THIS LINK FOR THE 
FORM
   
  You 
can save Thousands Of 
Dollars 
over the course of your loan with just
a 1/4 of 1% (one quarter of one percent) Drop in your interest rate!


 

  
   
 
   
We 
  have hundreds of loan programs for every situation. Get the cash 
you 
  need fast for: 


  Refinance
  Second 
Mortgage
  Home 
Improvement
  Debt 
Consolidation
  Cash for Any 
Purpose

  

 
   

 
   
The 
  following are NO problem and will not stop you from getting the 

  loan you need:

  No Income 
Verification
  Self-Employed
  Credit 
Problems 
  Recent 
Bankruptcy 
  Unconventional 
Loan

  

  

  
   
 
  There 
is NO cost for this service - and you are under NO obligation!

  CLICK 
THIS LINK FOR THE 
FORM

  

 

  

  _

Activate this link
to be taken off our mailing 
list

  

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

  

  This 
message is a commercial advertisement. It is in full compliance with 
all 
federal and state laws regarding email advertising, including the 
California 
Business and Professions Code. We have provided "opt-out" 
email 
contact so you can request to be taken off our mailing list. In 
addition 
we have placed "ADV" in the subject line to provide you 
with 
notification in advance that this is a commercial advertisement. We 
do 
not wish to send our advertising to anyone who does not wish to 
receive 
it. If you would rather not receive any further information 
from 
us, please CLICK 
to be taken off our list. In this way you can “opt-out” from the list 

your email address was obtained from, whether it was "
opt-in" 
or otherwise. Please allow 5-10 business days for your email address 
to 
be processed and taken off all lists in our control. 
Meanwhile, 
delete any duplicate emails that you may receive and rest assured 
that 
your request will be honored. If you have previously requested to be 
taken 
off this list and are still receiving this advertisement, 
 
you may call us at 1-(888) 817-9902, or write to: Abuse Control 
Center, 
7657 Winnetka Ave., Suite 245, Canoga Park, CA 
91306

  




  

  
 
  

  

  

 






943211111000000

2002-06-21 Thread profit4u943211

** 
This email message is sent in compliance with the 106th Congress E-Mail 
User Protection Act (H.R. 1910) and the Unsolicited Commercial Electronic
Mail Act of 2000 (H.R. 3113). We provide a valid vehicle for you to be
removed from our email list. To be removed from our mailing list, simply 
send an email to [EMAIL PROTECTED] with the subject "remove".  
** 
 
Free Business Opportunity Service

We find "home-based-business opportunities
for ambitious people on a 'no cost' basis.

We are paid by our client companies to seek 
ambitious people such as yourself.

We represent only the finest, most reputable
companies that offer a lucrative commission 
as well as an opportunity to obtain residual 
income so necessary build wealth.

If you've been searching and have come up
with empty promises and companies of dubious
reputation, then we need to talk.

To obtain more information and start on your
road to success and wealth email 

mailto:[EMAIL PROTECTED]
For an immediate reply leave your 
name and phone number, someone will call
you within 24 hours.

Name:  
Phone:
Best time to call:

Jimmy Powers
Development Director
Success Marketing 


REMOVAL BELOW
==
[EMAIL PROTECTED]
9432100




Executable discarded

2002-06-21 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.30, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : <[EMAIL PROTECTED]>
Recipient  : <[EMAIL PROTECTED]>
Message-Id : <[EMAIL PROTECTED]>
Subject: CDR: Tabindex
Virus  : W32/Klez.gen@MM

Original headers:

From: <[EMAIL PROTECTED]>  Fri Jun 21 17:00:52 2002
>Received: (from cpunks@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id QAA02451
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 16:06:15 -0500
>Received: (from mdom@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id QAA02439
>   for cypherpunks-outgoing; Fri, 21 Jun 2002 16:04:51 -0500
>Received: from mailout03.sul.t-online.com (mailout03.sul.t-online.com [194.25.134.81])
>   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA02434
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 16:04:20 -0500
>Received: from fwd11.sul.t-online.de 
>   by mailout03.sul.t-online.com with smtp 
>   id 17LVUH-0003ck-01; Fri, 21 Jun 2002 22:58:33 +0200
>Received: from Pehgnquf (320068034362-0001@[217.230.108.218]) by 
>fwd11.sul.t-online.com
>   with smtp id 17LVU8-1k4Dg0C; Fri, 21 Jun 2002 22:58:24 +0200
>From: [EMAIL PROTECTED] (Support5774n08)
>To: [EMAIL PROTECTED]
>Subject: CDR: Tabindex
>MIME-Version: 1.0
>Content-Type: multipart/alternative;
>   boundary=O67Y5M4277Q531Tucfo3yYUj
>Date: Fri, 21 Jun 2002 22:58:24 +0200
>Message-ID: <[EMAIL PROTECTED]>
>X-Sender: [EMAIL PROTECTED]
>Sender: [EMAIL PROTECTED]
>Precedence: bulk
>Reply-To: [EMAIL PROTECTED]
>X-Mailing-List: [EMAIL PROTECTED]
>X-Unsubscription-Info: http://einstein.ssz.com/cdr
>X-List-Admin: [EMAIL PROTECTED]
>X-Loop: ssz.com
>X-Acceptable-Languages: English, Russian, German, French, Spanish

We received a message claiming to be from you which contained an
executable attachment (batch file, script, program, etc).  In
order to protect users from malicious programs, we do not accept
these file types thru this mail server.  If you need to send the
file to it's intended recipient, you must send it in an archived
and/or compressed format.

Your email has been sent to the intended recipient without this
file included.  A message detailing why it was dropped has been
substitued in it's place.

   Postmaster


Sender : <[EMAIL PROTECTED]>
Recipient  : <[EMAIL PROTECTED]>
Message-Id : <[EMAIL PROTECTED]>
Subject: CDR: Tabindex
Mime type  : audio/x-midi
File name  : width.scr




Executable discarded

2002-06-21 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.30, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : <[EMAIL PROTECTED]>
Recipient  : <[EMAIL PROTECTED]>
Message-Id : <[EMAIL PROTECTED]>
Subject: Tabindex
Virus  : W32/Klez.gen@MM

Original headers:

From: <[EMAIL PROTECTED]>  Fri Jun 21 17:01:02 2002
>Received: from waste.minder.net (daemon@waste [66.92.53.73])
>   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0pE97111
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:51 -0400 (EDT)
>   (envelope-from [EMAIL PROTECTED])
>Received: (from cpunks@localhost)
>   by waste.minder.net (8.11.6/8.11.6) id g5LL0oB21205
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 17:00:50 -0400
>Received: from locust.minder.net (locust.minder.net [66.92.53.74])
>   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0mu21188
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:48 -0400
>Received: from einstein.ssz.com (cpunks@[207.200.56.4])
>   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0ZE97092
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:35 -0400 (EDT)
>   (envelope-from [EMAIL PROTECTED])
>Received: (from cpunks@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id QAA02450
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 16:06:15 -0500
>Received: (from mdom@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id QAA02439
>   for cypherpunks-outgoing; Fri, 21 Jun 2002 16:04:51 -0500
>Received: from mailout03.sul.t-online.com (mailout03.sul.t-online.com [194.25.134.81])
>   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA02434
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 16:04:20 -0500
>Received: from fwd11.sul.t-online.de 
>   by mailout03.sul.t-online.com with smtp 
>   id 17LVUH-0003ck-01; Fri, 21 Jun 2002 22:58:33 +0200
>Received: from Pehgnquf (320068034362-0001@[217.230.108.218]) by 
>fwd11.sul.t-online.com
>   with smtp id 17LVU8-1k4Dg0C; Fri, 21 Jun 2002 22:58:24 +0200
>From: [EMAIL PROTECTED] (Support5774n08)
>To: [EMAIL PROTECTED]
>Old-Subject: CDR: Tabindex
>MIME-Version: 1.0
>Content-Type: multipart/alternative;
>   boundary=O67Y5M4277Q531Tucfo3yYUj
>Date: Fri, 21 Jun 2002 22:58:24 +0200
>Message-ID: <[EMAIL PROTECTED]>
>X-Sender: [EMAIL PROTECTED]
>Sender: [EMAIL PROTECTED]
>Precedence: bulk
>Reply-To: [EMAIL PROTECTED]
>X-Mailing-List: [EMAIL PROTECTED]
>X-Unsubscription-Info: http://einstein.ssz.com/cdr
>X-List-Admin: [EMAIL PROTECTED]
>X-Loop: ssz.com
>X-Acceptable-Languages: English, Russian, German, French, Spanish
>Subject: Tabindex

We received a message claiming to be from you which contained an
executable attachment (batch file, script, program, etc).  In
order to protect users from malicious programs, we do not accept
these file types thru this mail server.  If you need to send the
file to it's intended recipient, you must send it in an archived
and/or compressed format.

Your email has been sent to the intended recipient without this
file included.  A message detailing why it was dropped has been
substitued in it's place.

   Postmaster


Sender : <[EMAIL PROTECTED]>
Recipient  : <[EMAIL PROTECTED]>
Message-Id : <[EMAIL PROTECTED]>
Subject: Tabindex
Mime type  : audio/x-midi
File name  : width.scr




new extensions now only $14.95

2002-06-21 Thread carla_modin

IMPORTANT INFORMATION:

The new domain names are finally available to the general public at discount prices. 
Now you can register one of the exciting new .BIZ or .INFO domain names, as well as 
the original .COM and .NET names for just $14.95. These brand new domain extensions 
were recently approved by ICANN and have the same rights as the original .COM and .NET 
domain names. The biggest benefit is of-course that the .BIZ and .INFO domain names 
are currently more available. i.e. it will be much easier to register an attractive 
and easy-to-remember domain name for the same price.  Visit: 
http://www.affordable-domains.com today for more info.
 
Register your domain name today for just $14.95 at: 
http://www.globalnicservices.com/affordable-domains/. Registration fees include full 
access to an easy-to-use control panel to manage your domain name in the future.
 
Sincerely,
 
Domain Administrator
Affordable Domains


To remove your email address from further promotional mailings from this company, 
click here:
http://www.centralremovalservice.com/cgi-bin/domain-remove.cgi
20








9032oMwY3-402evGo430l19




Brinworld: NYT on stabilized cameras (For the Spy in the Sky, New Eyes)

2002-06-21 Thread Major Variola (ret)

http://www.nytimes.com/2002/06/20/technology/circuits/20SPYY.html

For the Spy in the Sky, New Eyes

FLYING in his helicopter, Sgt. Frank Sheer of the Orange County
Sheriff's Department in Southern California can be literally miles from
the action. But that does not mean that he and his co-pilot do not know
what's going on. In fact, Sergeant Sheer says they often have a clearer
picture of a crime scene than the officers who are there.


"We'll be tracking a suspect on a hillside from the helicopter," said
Sergeant Sheer, the chief pilot in the Orange County force, "and the
deputies climbing up it will be saying to us, `There's nobody here.'
We've actually had them step on a guy who pulled up a bush for cover."

It's not just having a bird's-eye view that gives Sergeant Sheer and
many other airborne police officers, rescue workers, military personnel,
and television news and movie crews almost paranormal vision. Nor is it
simply advances in optics and cameras. Ultimately they all rely on
complex camera stabilization systems that mix mechanical and electronic
technologies to produce steady images, even at high magnification, from
inherently unsteady craft like helicopters and boats.

When officers pursued O. J. Simpson along the freeways of Los Angeles
eight years ago, a covey of police and television news helicopters
tracked him with stabilized cameras hanging at the sides in their
distinctive ball-shaped pods. But most helicopter surveillance is not
that dramatic. If the Orange County Sheriff's Department needs a car
discreetly followed, Sergeant Sheer can keep tabs on it from 3,000 feet
up and a considerable distance behind  a position that would leave most
motorists unaware there was a helicopter around, let alone watching
them.

New systems built around all-electronic motion-sensing technologies are
so stable that only the horizon and haze limit how far away observers
can be.

The use of airborne stabilized cameras to create films or follow
athletes in action attracts little controversy. Nor does anyone dispute
that the systems allow police officers to capture criminals or rescue
people. Some privacy advocates, however, are concerned that the recent
proliferation of airborne cameras and the growing capabilities of new
systems may mean that anyone who steps outside may unknowingly be a
target of an aerial eye. Outdoors, there may no longer be any place to
hide.

"Because technology affords police what amounts to superhuman vision,
that doesn't mean we lose all expectations of privacy," said Barry
Steinhardt, the director of the American Civil Liberties Union's program
on technology and liberty. "There are lots of innocent people who are
going to have their privacy invaded  observed naked in their backyard
sunbathing from far away."

There is a long history of efforts to produce steady airborne pictures.
But in the early years, the results were for the most part dismal.

Steven Poster, the president of the American Society of
Cinematographers, recalls his first attempt at photography from a
helicopter, in the late 1960's. "It was an Illinois State Fair, and the
stabilization came from a rope tied around me to the helicopter," Mr.
Poster recalled. "I quickly realized that this was not a very good
system."

While more sophisticated systems existed back then, they did not differ
much from Mr. Poster's rope. Known as side mounts, they generally relied
on bungee cords and the user's body to isolate the camera.

By the 1980's Mr. Poster was a director of photography for feature films
and television advertisements, and he had found an answer to his aerial
photography problems with a system made by Wescam, a company now based
in Burlington, Ontario.

"It's the best way to stabilize a camera," said Mr. Poster, who has used
the system in films like "Stuart Little 2," which is to be released this
summer.

The Wescam system used by Mr. Poster's film crews is remarkably similar
to the original Wescam developed in the early 1960's by a Canadian
subsidiary of Westinghouse as a battlefield surveillance tool for the
Canadian military. (Wescam is short for Westinghouse camera.)

Eliminating the vibration from the helicopter was the first step and the
easy part. The Wescam ball is attached to a helicopter or airplane
through a shock absorber that uses springs and other damping materials.
"It is tuned for the natural frequencies of helicopters," said Mark
Chamberlain, a mechanical engineer who is president and chief executive
of Wescam.

But eliminating the vibration does nothing to limit three other kinds of
movement by the camera: pitch (plunging up and down), yaw (rotating
around a vertical axis) and roll (the side-to-side rotation that creates
a moving horizon).

To deal with these kinds of movements, inventors of the original Wescam
turned to large gyroscopes, which create inertia. It is like strapping a
large boulder to the camera to stabilize it, yet without all the weight
that a boulder would add.

Inside the came

Manifesto on a New Strategy

2002-06-21 Thread Anonymous




   Global Freedom From Force


   Independence From Politics and Currency-Based Economies

 A Precursor to Digital Neo-Tech Revolutions

 For A Volitional, Anti-Force, Capitalist Civilization



Outlining the possibilities of creating freedom through new, non-traditional
financial business strategy and technology, in business- and economic details,
and specifications for technical development, this manuscript represents the
first integration of New-Technology/Internet-driven business infrastructures,
logistics, and markets of the future with core concepts of Neo-Tech and
Neo-Tech business. It outlines how the integration and evolution of three 
existing basic concepts -- 1) Wide-scope accounting strategies to protect
business assets, 2) Cyberspace/Logistics/Reputation-driven Barter Communities,
and 3) A Global Anonymized Computerized Market -- can together lead to total
economical freedom and volitional trade, on an individual and ultimately on a
world-wide scale. The practical implementation of the strategies described, and
the necessary infrastructures, while today in planning by only a small number
of businesses, is an enormous opportunity for any entrepreneur, manager or
CEO to understand, integrate with his business, contribute to and profit from.

First, what is Wide-Scope Accounting a.k.a. Golden Helmets? As a concept, it
is almost as old as human society itself, but was first explicitly identified
and named by Frank R. Wallace, author at Neo-Tech Publishing. The original
explanation of the concept of Golden Helmets, given in a courtroom speech,
can be found at: http://www.neo-tech.com/golden-helmet/chapter3.html

Wide-scope accounting is a wealth management tool, allowing a person to live
without any taxable personal income. Rather, all money is kept by one's company
and utilized to expand the company and maximize its values, while one's own
expenses necessary to live and work (food, housing, car, etc.) are company
expenses. Any individual living this way, in a 100% service environment, but
without private income or excess property, therefore, cannot be taxed. One's
own company itself focuses not on immediate profits but on building maximum
high-quality values, efficiency and new jobs. Taxable profits in a company are
minimized by re-investing, while the value-maximized work leads to high
revenues, and widens the business through additional partners and employees.


Breaking The Chains Of Today's Criminal Politics

With Neo-Tech, Frank R. Wallace also openly identified that the reason for the
modern, century-old economy-controlling/economy-draining high income taxes are
not primarily to satisfy the financial requirements of governments and
"the public", which could as well be achieved through less compulsive, more
voluntary taxation schemes. Rather, the prime reason for income taxes and
their often life-destroying enforcement by armed government hunters is to
keep control over people -- legal, bureaucratical, social and psychological --
by controlling everyone with a strong, limiting grip on his or her prosperity,
privacy, business, happiness, and ultimately, life.

Wide-scope accounting in business lets a company always pay excess taxes
indirectly, by creating jobs and boosting markets, which leads to direct and
indirect tax payments by multiplying the profits of others, while minimizing
one's own financial liability. It allows any businessman to outmaneuver
criminal politics without being an "Atlas that Shrugs" -- in contrary, it
means producing more and harder than ever, and in the long term, profiting
enormously, but at the same time withdrawing all support for the force-backed
tax system -- legally, and without making any force or resistance necessary.


Regulated Currencies Mean Regulated Values

However, despite the tool of wide-scope accounting readily available to
everyone, one must face the reality of a politically undermined/controlled
economy existing practically everywhere today. Vast economies -- valuable,
but yet, drained -- today depend on monetary systems ultimately regulated
by local and international political authorities. Thus, the task is to
sublimate traditional economical dynamics to direct value-creation/value-
exchange dynamics of an economy beyond wide-scope accounting within traditional
currency systems -- immune from external force, authorities and corruptions.

Without making a mistake about it, official currencies do represent the
material values that they are exchanged for. And, contrary to the views
propagated by dishonest media, academics, traditionalists, politicians and
activists, money is not the "root of all evil". Yet, in a way, all official
money is corrupted, since it is regulated directly and indirectly by
governments through taxation-, banking-, anti-inflation-, anti-deflation-,
public insurance-, tariff-, business- and economic regulations and laws which
affect 

Followup: [RE: DOJ proposes US data-rentention law.]

2002-06-21 Thread Trei, Peter

Two points:

1. According to Poulson, the DOJ proposal never 
discussed just what would be logged. Poulson 
compared it to the European Big Brother legislation, 
which required storage to Web browsing 
histories and email header data.

2. After I posted the same info to /.
http://slashdot.org/articles/02/06/19/1724216.shtml?tid=103
(I'm the 'Anonymous Coward' in this case), Kevin updated
his article. The new version may be found at:
http://online.securityfocus.com/news/489

The relevant portions read:

- start quote -

U.S. Denies Data Retention Plans

The Justice Department disputes claims that Internet service 
providers could be forced to spy on their customers as part 
of the U.S. strategy for securing cyberspace.
By Kevin Poulsen, Jun 19 2002 12:24PM

[...]

But a Justice Department source said Wednesday that data 
retention is mentioned in the strategy only as an industry 
concern -- ISPs and telecom companies oppose the costly idea -- 
and does not reflect any plan by the department or the White 
House to push for a U.S. law. 

[...]

- end quote -

Peter Trei


> --
> From: David G. Koontz[SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, June 20, 2002 10:57 AM
> To:   [EMAIL PROTECTED]
> Cc:   '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'
> Subject:  Re: DOJ proposes US data-rentention law.
> 
> Trei, Peter wrote:
> > - start quote -
> > 
> > Cyber Security Plan Contemplates U.S. Data Retention Law
> > http://online.securityfocus.com/news/486
> > 
> > Internet service providers may be forced into wholesale spying 
> > on their customers as part of the White House's strategy for 
> > securing cyberspace.
> > 
> > By Kevin Poulsen, Jun 18 2002 3:46PM
> > 
> > An early draft of the White House's National Strategy to Secure 
> > Cyberspace envisions the same kind of mandatory customer data 
> > collection and retention by U.S. Internet service providers as was
> > recently enacted in Europe, according to sources who have reviewed 
> > portions of the plan. 
> > 
> > In recent weeks, the administration has begun doling out bits and 
> > pieces of a draft of the strategy to technology industry members 
> > and advocacy groups. A federal data retention law is suggested
> > briefly in a section drafted in part by the U.S. Justice Department. 
> > 
> 
> If the U.S. wasn't in an undeclared 'war', this would be considered
> an unfunded mandate.  Does anyone realize the cost involved?  Think
> of all the spam that needs to be recorded for posterity.  ISPs don't
> currently record the type of information that this is talking about.
> What customer data backup is being performed by ISPs is by and large
> done by disk mirroring and is not kept permanently.
> 
> I did a bit of back of the envelope calculation and the cost in the
> U.S. approaches half a billion dollars a year in additional backup
> costs a year without any CALEA type impact to make it easy for law
> enforcment to do data mining.  The estimate could easily be low by a
> factor of 5-10.  AOL of course would be hit by 40 percent of this
> though, not to mention a nice tax on MSN.  Call it ten cents a day
> per customer in fee increases to record all that spam for review by
> big brother.  I feel safer already.
> 
> Whats next, censorship?




Acheive financial stability ZRETFI

2002-06-21 Thread Emily Hawke
Title: webCREDIT














Thank You,







Your email address was obtained from a purchased
list, Reference # 1320-15000.  If you wish to unsubscribe from this list, please
Click here and enter your
name into the remove box. If you have previously
unsubscribed and are still receiving this message, you may email our
Abuse Control Center,
or call 1-888-763-2497, or write us at: NoSpam, 6484 Coral Way,
Miami, FL, 33155".


© 2002 Web Credit Inc. All Rights Reserved.
















[±¤°í]¸ð±âÅðÄ¡ ºñ´©ÀÔ´Ï´Ù.

2002-06-21 Thread ¹ö±×¿ÀÇÁ
Title: Untitled Document









Á¤º¸Åë½ÅºÎ ±Ç°í »çÇ× ¹ý·ü Á¦ 50Á¶¿¡ ÀÇ°ÅÇÏ¿© Á¦¸ñ¿¡ [±¤°í]¶ó°í Ç¥±âÇÑ ±¤°í¸ÞÀÏÀÔ´Ï´Ù.º» ¸ÞÀÏÀº ÀÎÅÍ³Ý»ó¿¡ °ø°³µÈ ¸ÞÀÏ ÁÖ¼Ò¸¦ ±Ù°Å·Î
¹ß¼ÛÇÏ¿´À¸¸ç, 1ȸ¼º ¸ÞÀÏÀÓÀ» ¾Ë·Áµå¸³´Ï´Ù.¼ö½ÅÀ» ¿øÇÏÁö ¾ÊÀ¸½Ã¸é[¼ö½Å°ÅºÎ]¸¦
´­·¯ÁÖ¼¼¿ä.
We sincerely apologize for sending advertising e-mail to
you without your permission.We have indicated that this is advertising
mail in accordance to the Law of Information and Network Usage, and we
have installed a Spam Guard function.We obtained your e-mail address
in an open place of public access on the Internet. Please be assured
that we do not have any of your personal information other than your
e-mail address. If you do not wish to receive it, please click the
reject
bulk mail function.






Virus discarded

2002-06-21 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.30, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : <[EMAIL PROTECTED]>
Recipient  : <[EMAIL PROTECTED]>
Message-Id : <[EMAIL PROTECTED]>
Subject: Congratulations
Virus  : W32/Klez.gen@MM

Original headers:

From: <[EMAIL PROTECTED]>  Fri Jun 21 08:40:33 2002
>Received: from waste.minder.net (daemon@waste [66.92.53.73])
>   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LCeLE75346
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:21 -0400 (EDT)
>   (envelope-from [EMAIL PROTECTED])
>Received: (from cpunks@localhost)
>   by waste.minder.net (8.11.6/8.11.6) id g5LCeKa18784
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 08:40:20 -0400
>Received: from locust.minder.net (locust.minder.net [66.92.53.74])
>   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g5LCeIu18767
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:18 -0400
>Received: from einstein.ssz.com (cpunks@[207.200.56.4])
>   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LCe1E75307
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:01 -0400 (EDT)
>   (envelope-from [EMAIL PROTECTED])
>Received: (from cpunks@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id HAA31287
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 07:45:35 -0500
>Received: (from mdom@localhost)
>   by einstein.ssz.com (8.8.8/8.8.8) id HAA31254
>   for cypherpunks-outgoing; Fri, 21 Jun 2002 07:44:11 -0500
>Received: from barry.mail.mindspring.net (barry.mail.mindspring.net [207.69.200.25])
>   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id HAA31237
>   for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 07:43:45 -0500
>Received: from sdn-ar-003florlap260.dialsprint.net ([168.191.91.150] helo=Cntpy)
>   by barry.mail.mindspring.net with smtp (Exim 3.33 #1)
>   id 17LNfY-00011d-00
>   for [EMAIL PROTECTED]; Fri, 21 Jun 2002 08:37:41 -0400
>From: soccerfam9 <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Old-Subject: CDR: Congratulations
>MIME-Version: 1.0
>Content-Type: multipart/alternative;
>   boundary=Ar6E0156N833cb26EK05
>Message-Id: <[EMAIL PROTECTED]>
>Date: Fri, 21 Jun 2002 08:37:41 -0400
>Sender: [EMAIL PROTECTED]
>Precedence: bulk
>Reply-To: [EMAIL PROTECTED]
>X-Mailing-List: [EMAIL PROTECTED]
>X-Unsubscription-Info: http://einstein.ssz.com/cdr
>X-List-Admin: [EMAIL PROTECTED]
>X-Loop: ssz.com
>X-Acceptable-Languages: English, Russian, German, French, Spanish
>Subject: Congratulations