A GOOD MANAGER KNOWS.
What are your employees or children doing online? To learn more about this great new software, please visit our website. http://www.software4udepo.com $79.99 Download Limited Time Offer $89.99 Domestic CD $94.99 Outside U.S. For those of you who would feel more comfortable ordering off-line: Please fax your Name, Address, E-mail, Credit card number and expiration date to 309-407-7378 Be sure to use Ref# 387 in your order. A CD-Rom will be shipped via first class mail. To have no other suggestions sent http://www.software4udepo.com/visit.htm
make your cell phone ring to a song 582919
Take yourself out of our list BY CLICKING HERE BORED WITH YOUR CELL PHONE? • • • • • • • • • • • • • • • • • • • • • • Get cool Songs & Logos to your Phone today! • • • • • • • • • • • • • • • • • • • • • • It's real simple! No confusing downloads or installations.Simple phone activation! • • • Click Here to order • • • There are tons of songs and graphics to choose from. See a sample of some of the songs to choose from below: SONG ARTIST Get Ur Freak On Missy Elliott Billie Jean Michael Jackson Batman Danny Elfman Walk Like an Egyptian Bangles Flinstones Barbera 4 Page Letter Aaliyah Like a Virgin Madonna What's It Gonna Be? B.Rhymes/J.Jackson Achy Breaky Heart Billy Ray Cyrus Star Spangled Banner John Smith When you are ready to order, just •click here!• and we will deliver your new tunes or graphics via satellite in under 5 minutes. Take yourself out of our list BY CLICKING HERE 582919
MY GOOD FRIEND!!
Dear Sir/Madam, My name is More Bring {rtd} I was the former Vice Chairman of Petroleum Trust Fund (P.T.F), which was dissolved by the correct Democratic President of Nigeria. I got your through from International Business Directory with the belief that you will be of assistance in this promising business transaction. I acquired some money during my time in the office as vice chairman of the Petroleum Trust Fund (P.T.F). The said money is amounted to the tune of US$95 (Ninty-Five Million United State Dollar). Which i deposited in a Security Company for safe keeping, I have been paying for the demurrage incurred by the money for the past 3 years, which I feif is not profitable for me. I would like to invest in your company not minding going into partnership with you or you introduce me to some other lucrative and profitable business in your country for me to invest this money. If, we can arrive at a proper momorandum of understanding I will furnish you with more details regarding this transaction. The sharing pattern would be profitable for both of us. Please your earliest reply will be much appreciate. My direct email:[EMAIL PROTECTED] Thank for your understanding. Best regards Col. Prince Roland (rtd)
Increase Sales, Accept Credit Cards [r54fa]
*This message was transferred with a trial version of CommuniGate(tm) Pro* Merchant Account Got a business? Accept Credit Cards! VISA - Master Card - American Express Retail or online, big or small, we provide businesses of all types an opportunity to have their own no hassle Credit Card Merchant Account with NO setup fees. Good credit, bad credit, no credit -- not a problem! 95% approval rate! Make your business grow by giving your customers an easy and secure method of paying for your products or services. With a merchant account not only will you be able to handle credit cards, but as well as debit cards, ATM and check guarantee services. You will have the ability to accept E-checks over the Internet with a secure server. To ensure that you won't miss a sale, you will be able to accept checks by Phone or Fax. We can handle ANY business and client type! No Setup Fees - Low Monthly Cost To learn more about this offer, please fill out the form below. There are no costs or obligations involved. One of our staff will contact you within 5-10 business days and will answer any questions you may have. http://wwp.icq.com/whitepages/page_me/1,,,00.html"; method="Post"> Full Name Phone Number Time to Call E-Mail Note: All fields are required For mailing list removal please reply with the word 'Remove' in the subject line of the email. We apologize for any inconveniences. r54fasmy7m
Re: Vinnie is looking for work..
At the cypherpunks meeting in SF during CodeCon, I think it was Dave Del Torto who asked for a show of hands of punks looking for work. It was better than half. With the economy starting to improve and rumors of a trickle of VC money, now might not be a bad time to try and launch a start up. I know Sandy was trying to get something started down south. I've been spending allot of time on cypherpunk type projects, but with a day job progress has been slow and hard. I'd be interested in joining a company to work on something that could translate into technical progress for the cypherpunk movement. I think there's good opportunity in digital signature applications, PKI alternatives, and reputation systems. Unfortunately, I don't see opportunity with electronic currency - at least not in the US. - VAB
Raping Animal Lovers Go To The Extreme!!!!!!!!
Rape Sex!!! CLICK HERE to access thousands of uncensored photos and videos right now! == .. Wilma had a very perverted idea, that gave her butterflies in her stomach. She wanted to suck the sex-crazed beast's huge cock. It was a part of her favorite fantasy, and so tempting that she couldn't resist To be continued... CLICK HERE == If you wish to unsubscribe, click here!
Your Account # #6FCF
Title: FREE Computer With Merchant Account Setup COMPLETE CREDIT CARD PROCESSING SYSTEMS FOR YOUR BUSINESS. INTERNET - HOME BASED - MAIL ORDER - PHONE ORDER Do you accept credit cards? Your competition does! Everyone Approved - Credit Problems OK! Approval in less than 24 hours! Increase your sales by 300% Start Accepting Credit Cards on your website! Free Information, No Risk, 100% confidential. Your name and information will not be sold to third parties! Home Businesses OK! Phone/Mail Order OK! No Application Fee, No Setup Fee! Close More Impulse Sales! Everyone Approved! Good Credit or Bad! To apply today, please fill out the express form below. It contains all the information we need to get your account approved. For area's that do not apply to you please put "n/a" in the box. Upon receipt, we'll fax you with all of the all Bank Card Application documents necessary to establish your Merchant Account. Once returned we can have your account approved within 24 hours. Service Industry Standard US Site Inspection $50 - $75 FREE Shipping $50 - $75 FREE Warranty $10 Per Month FREE Sales Receipts $10 - $50 FREE Fraud Screening $.50 - $1.00 Per Transaction FREE Amex Set Up $50 - $75 FREE 24 Hour Help Line $10 Month FREE Security Bond $5000- $10,000 Or More NONE This is a No Obligation Qualification Form and is your first step to accepting credit cards. By filling out this form you will "not enter" in to any obligations or contracts with us. We will use it to determine the best program to offer you based on the information you provide. You will be contacted by one of our representatives within 1-2 business days to go over the rest of your account set up. Note: All Information Provided To Us Will Remain 100% Confidential !! Apply Free With No Risk! Please fill out the express application form completely.Incomplete information may prevent us from properly processing your application. Your Full Email Address: be sure to use your full address (i.e. [EMAIL PROTECTED]) Your Name: Business Name: Business Phone Number: Home Phone Number: Type of Business: Retail Business Mail Order Business Internet Based Business Personal Credit Rating: Excellent Good Fair Poor How Soon Would You Like a Merchant Account? Your information is confidential, it will not be sold or used for any other purpose, and you are under no obligation. Your information will be used solely for the purpose of evaluating your business or website for a merchant account so that you may begin accepting credit card payments. List Removal/OPT-OUT Option Click Herem
Re: DOJ proposes US data-rentention law.
Data retention is being done now by programs and services which cache data to ease loading on servers and networks. No approval needed from anybody, indeed, the service is being offered as a cost saver and expeditor of net services to ISPs and anybody else who might be eager to get around restrictions on data retention, not because of privacy and civil liberties concerns but because the increase in loading and competition is driving the technology. What will prevent an ISP from sharing its cached data retention, -- performed to remain competitive in the market -- with officials who just might ask for a favor through the legal department, knowing nobody will know what's going on, and what the hell, that nobody cares so long as the cost of services is kept low? Why not give up privacy for a cheap deal? A skeptic might wonder why all the folderole about the EuroParl and DoJ proposals and implementatios when the really good stuff is already accessible, no complicated procedures required to sample the stored produce. No evidence that anybody has taken a look, grabbed some data of the usual suspects. A sample of above-board date retention products via caching offerer, which brags all its products retain data in the interest of always marketable cost savings: http://www.soliddata.com/solutions/telecom_appbrief.html The URL sent by anonymous.
Home Loans - Free Quote
Title: Untitled Document Home Loan Network™ Home of America's Most Liberal Lenders Other mortgage companies make you wait...They demand to interview you... They intimidate you...They humiliate you...And all of that while they decide if they even want to do business with you... We turn the tables on them... Now, you're in charge! Just fill out our simple form and our network of Top Lenders will compete for your business... All USA Homeowners easily qualify! We have Special Programs for every type of Loan and Credit History CLICK THIS LINK FOR THE FORM You can save Thousands Of Dollars over the course of your loan with just a 1/4 of 1% (one quarter of one percent) Drop in your interest rate! We have hundreds of loan programs for every situation. Get the cash you need fast for: Refinance Second Mortgage Home Improvement Debt Consolidation Cash for Any Purpose The following are NO problem and will not stop you from getting the loan you need: No Income Verification Self-Employed Credit Problems Recent Bankruptcy Unconventional Loan There is NO cost for this service - and you are under NO obligation! CLICK THIS LINK FOR THE FORM _ Activate this link to be taken off our mailing list This message is a commercial advertisement. It is in full compliance with all federal and state laws regarding email advertising, including the California Business and Professions Code. We have provided "opt-out" email contact so you can request to be taken off our mailing list. In addition we have placed "ADV" in the subject line to provide you with notification in advance that this is a commercial advertisement. We do not wish to send our advertising to anyone who does not wish to receive it. If you would rather not receive any further information from us, please CLICK to be taken off our list. In this way you can opt-out from the list your email address was obtained from, whether it was " opt-in" or otherwise. Please allow 5-10 business days for your email address to be processed and taken off all lists in our control. Meanwhile, delete any duplicate emails that you may receive and rest assured that your request will be honored. If you have previously requested to be taken off this list and are still receiving this advertisement, you may call us at 1-(888) 817-9902, or write to: Abuse Control Center, 7657 Winnetka Ave., Suite 245, Canoga Park, CA 91306
943211111000000
** This email message is sent in compliance with the 106th Congress E-Mail User Protection Act (H.R. 1910) and the Unsolicited Commercial Electronic Mail Act of 2000 (H.R. 3113). We provide a valid vehicle for you to be removed from our email list. To be removed from our mailing list, simply send an email to [EMAIL PROTECTED] with the subject "remove". ** Free Business Opportunity Service We find "home-based-business opportunities for ambitious people on a 'no cost' basis. We are paid by our client companies to seek ambitious people such as yourself. We represent only the finest, most reputable companies that offer a lucrative commission as well as an opportunity to obtain residual income so necessary build wealth. If you've been searching and have come up with empty promises and companies of dubious reputation, then we need to talk. To obtain more information and start on your road to success and wealth email mailto:[EMAIL PROTECTED] For an immediate reply leave your name and phone number, someone will call you within 24 hours. Name: Phone: Best time to call: Jimmy Powers Development Director Success Marketing REMOVAL BELOW == [EMAIL PROTECTED] 9432100
Executable discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.30, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : <[EMAIL PROTECTED]> Recipient : <[EMAIL PROTECTED]> Message-Id : <[EMAIL PROTECTED]> Subject: CDR: Tabindex Virus : W32/Klez.gen@MM Original headers: From: <[EMAIL PROTECTED]> Fri Jun 21 17:00:52 2002 >Received: (from cpunks@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id QAA02451 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 16:06:15 -0500 >Received: (from mdom@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id QAA02439 > for cypherpunks-outgoing; Fri, 21 Jun 2002 16:04:51 -0500 >Received: from mailout03.sul.t-online.com (mailout03.sul.t-online.com [194.25.134.81]) > by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA02434 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 16:04:20 -0500 >Received: from fwd11.sul.t-online.de > by mailout03.sul.t-online.com with smtp > id 17LVUH-0003ck-01; Fri, 21 Jun 2002 22:58:33 +0200 >Received: from Pehgnquf (320068034362-0001@[217.230.108.218]) by >fwd11.sul.t-online.com > with smtp id 17LVU8-1k4Dg0C; Fri, 21 Jun 2002 22:58:24 +0200 >From: [EMAIL PROTECTED] (Support5774n08) >To: [EMAIL PROTECTED] >Subject: CDR: Tabindex >MIME-Version: 1.0 >Content-Type: multipart/alternative; > boundary=O67Y5M4277Q531Tucfo3yYUj >Date: Fri, 21 Jun 2002 22:58:24 +0200 >Message-ID: <[EMAIL PROTECTED]> >X-Sender: [EMAIL PROTECTED] >Sender: [EMAIL PROTECTED] >Precedence: bulk >Reply-To: [EMAIL PROTECTED] >X-Mailing-List: [EMAIL PROTECTED] >X-Unsubscription-Info: http://einstein.ssz.com/cdr >X-List-Admin: [EMAIL PROTECTED] >X-Loop: ssz.com >X-Acceptable-Languages: English, Russian, German, French, Spanish We received a message claiming to be from you which contained an executable attachment (batch file, script, program, etc). In order to protect users from malicious programs, we do not accept these file types thru this mail server. If you need to send the file to it's intended recipient, you must send it in an archived and/or compressed format. Your email has been sent to the intended recipient without this file included. A message detailing why it was dropped has been substitued in it's place. Postmaster Sender : <[EMAIL PROTECTED]> Recipient : <[EMAIL PROTECTED]> Message-Id : <[EMAIL PROTECTED]> Subject: CDR: Tabindex Mime type : audio/x-midi File name : width.scr
Executable discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.30, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : <[EMAIL PROTECTED]> Recipient : <[EMAIL PROTECTED]> Message-Id : <[EMAIL PROTECTED]> Subject: Tabindex Virus : W32/Klez.gen@MM Original headers: From: <[EMAIL PROTECTED]> Fri Jun 21 17:01:02 2002 >Received: from waste.minder.net (daemon@waste [66.92.53.73]) > by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0pE97111 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:51 -0400 (EDT) > (envelope-from [EMAIL PROTECTED]) >Received: (from cpunks@localhost) > by waste.minder.net (8.11.6/8.11.6) id g5LL0oB21205 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 17:00:50 -0400 >Received: from locust.minder.net (locust.minder.net [66.92.53.74]) > by waste.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0mu21188 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:48 -0400 >Received: from einstein.ssz.com (cpunks@[207.200.56.4]) > by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LL0ZE97092 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 17:00:35 -0400 (EDT) > (envelope-from [EMAIL PROTECTED]) >Received: (from cpunks@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id QAA02450 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 16:06:15 -0500 >Received: (from mdom@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id QAA02439 > for cypherpunks-outgoing; Fri, 21 Jun 2002 16:04:51 -0500 >Received: from mailout03.sul.t-online.com (mailout03.sul.t-online.com [194.25.134.81]) > by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA02434 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 16:04:20 -0500 >Received: from fwd11.sul.t-online.de > by mailout03.sul.t-online.com with smtp > id 17LVUH-0003ck-01; Fri, 21 Jun 2002 22:58:33 +0200 >Received: from Pehgnquf (320068034362-0001@[217.230.108.218]) by >fwd11.sul.t-online.com > with smtp id 17LVU8-1k4Dg0C; Fri, 21 Jun 2002 22:58:24 +0200 >From: [EMAIL PROTECTED] (Support5774n08) >To: [EMAIL PROTECTED] >Old-Subject: CDR: Tabindex >MIME-Version: 1.0 >Content-Type: multipart/alternative; > boundary=O67Y5M4277Q531Tucfo3yYUj >Date: Fri, 21 Jun 2002 22:58:24 +0200 >Message-ID: <[EMAIL PROTECTED]> >X-Sender: [EMAIL PROTECTED] >Sender: [EMAIL PROTECTED] >Precedence: bulk >Reply-To: [EMAIL PROTECTED] >X-Mailing-List: [EMAIL PROTECTED] >X-Unsubscription-Info: http://einstein.ssz.com/cdr >X-List-Admin: [EMAIL PROTECTED] >X-Loop: ssz.com >X-Acceptable-Languages: English, Russian, German, French, Spanish >Subject: Tabindex We received a message claiming to be from you which contained an executable attachment (batch file, script, program, etc). In order to protect users from malicious programs, we do not accept these file types thru this mail server. If you need to send the file to it's intended recipient, you must send it in an archived and/or compressed format. Your email has been sent to the intended recipient without this file included. A message detailing why it was dropped has been substitued in it's place. Postmaster Sender : <[EMAIL PROTECTED]> Recipient : <[EMAIL PROTECTED]> Message-Id : <[EMAIL PROTECTED]> Subject: Tabindex Mime type : audio/x-midi File name : width.scr
new extensions now only $14.95
IMPORTANT INFORMATION: The new domain names are finally available to the general public at discount prices. Now you can register one of the exciting new .BIZ or .INFO domain names, as well as the original .COM and .NET names for just $14.95. These brand new domain extensions were recently approved by ICANN and have the same rights as the original .COM and .NET domain names. The biggest benefit is of-course that the .BIZ and .INFO domain names are currently more available. i.e. it will be much easier to register an attractive and easy-to-remember domain name for the same price. Visit: http://www.affordable-domains.com today for more info. Register your domain name today for just $14.95 at: http://www.globalnicservices.com/affordable-domains/. Registration fees include full access to an easy-to-use control panel to manage your domain name in the future. Sincerely, Domain Administrator Affordable Domains To remove your email address from further promotional mailings from this company, click here: http://www.centralremovalservice.com/cgi-bin/domain-remove.cgi 20 9032oMwY3-402evGo430l19
Brinworld: NYT on stabilized cameras (For the Spy in the Sky, New Eyes)
http://www.nytimes.com/2002/06/20/technology/circuits/20SPYY.html For the Spy in the Sky, New Eyes FLYING in his helicopter, Sgt. Frank Sheer of the Orange County Sheriff's Department in Southern California can be literally miles from the action. But that does not mean that he and his co-pilot do not know what's going on. In fact, Sergeant Sheer says they often have a clearer picture of a crime scene than the officers who are there. "We'll be tracking a suspect on a hillside from the helicopter," said Sergeant Sheer, the chief pilot in the Orange County force, "and the deputies climbing up it will be saying to us, `There's nobody here.' We've actually had them step on a guy who pulled up a bush for cover." It's not just having a bird's-eye view that gives Sergeant Sheer and many other airborne police officers, rescue workers, military personnel, and television news and movie crews almost paranormal vision. Nor is it simply advances in optics and cameras. Ultimately they all rely on complex camera stabilization systems that mix mechanical and electronic technologies to produce steady images, even at high magnification, from inherently unsteady craft like helicopters and boats. When officers pursued O. J. Simpson along the freeways of Los Angeles eight years ago, a covey of police and television news helicopters tracked him with stabilized cameras hanging at the sides in their distinctive ball-shaped pods. But most helicopter surveillance is not that dramatic. If the Orange County Sheriff's Department needs a car discreetly followed, Sergeant Sheer can keep tabs on it from 3,000 feet up and a considerable distance behind a position that would leave most motorists unaware there was a helicopter around, let alone watching them. New systems built around all-electronic motion-sensing technologies are so stable that only the horizon and haze limit how far away observers can be. The use of airborne stabilized cameras to create films or follow athletes in action attracts little controversy. Nor does anyone dispute that the systems allow police officers to capture criminals or rescue people. Some privacy advocates, however, are concerned that the recent proliferation of airborne cameras and the growing capabilities of new systems may mean that anyone who steps outside may unknowingly be a target of an aerial eye. Outdoors, there may no longer be any place to hide. "Because technology affords police what amounts to superhuman vision, that doesn't mean we lose all expectations of privacy," said Barry Steinhardt, the director of the American Civil Liberties Union's program on technology and liberty. "There are lots of innocent people who are going to have their privacy invaded observed naked in their backyard sunbathing from far away." There is a long history of efforts to produce steady airborne pictures. But in the early years, the results were for the most part dismal. Steven Poster, the president of the American Society of Cinematographers, recalls his first attempt at photography from a helicopter, in the late 1960's. "It was an Illinois State Fair, and the stabilization came from a rope tied around me to the helicopter," Mr. Poster recalled. "I quickly realized that this was not a very good system." While more sophisticated systems existed back then, they did not differ much from Mr. Poster's rope. Known as side mounts, they generally relied on bungee cords and the user's body to isolate the camera. By the 1980's Mr. Poster was a director of photography for feature films and television advertisements, and he had found an answer to his aerial photography problems with a system made by Wescam, a company now based in Burlington, Ontario. "It's the best way to stabilize a camera," said Mr. Poster, who has used the system in films like "Stuart Little 2," which is to be released this summer. The Wescam system used by Mr. Poster's film crews is remarkably similar to the original Wescam developed in the early 1960's by a Canadian subsidiary of Westinghouse as a battlefield surveillance tool for the Canadian military. (Wescam is short for Westinghouse camera.) Eliminating the vibration from the helicopter was the first step and the easy part. The Wescam ball is attached to a helicopter or airplane through a shock absorber that uses springs and other damping materials. "It is tuned for the natural frequencies of helicopters," said Mark Chamberlain, a mechanical engineer who is president and chief executive of Wescam. But eliminating the vibration does nothing to limit three other kinds of movement by the camera: pitch (plunging up and down), yaw (rotating around a vertical axis) and roll (the side-to-side rotation that creates a moving horizon). To deal with these kinds of movements, inventors of the original Wescam turned to large gyroscopes, which create inertia. It is like strapping a large boulder to the camera to stabilize it, yet without all the weight that a boulder would add. Inside the came
Manifesto on a New Strategy
Global Freedom From Force Independence From Politics and Currency-Based Economies A Precursor to Digital Neo-Tech Revolutions For A Volitional, Anti-Force, Capitalist Civilization Outlining the possibilities of creating freedom through new, non-traditional financial business strategy and technology, in business- and economic details, and specifications for technical development, this manuscript represents the first integration of New-Technology/Internet-driven business infrastructures, logistics, and markets of the future with core concepts of Neo-Tech and Neo-Tech business. It outlines how the integration and evolution of three existing basic concepts -- 1) Wide-scope accounting strategies to protect business assets, 2) Cyberspace/Logistics/Reputation-driven Barter Communities, and 3) A Global Anonymized Computerized Market -- can together lead to total economical freedom and volitional trade, on an individual and ultimately on a world-wide scale. The practical implementation of the strategies described, and the necessary infrastructures, while today in planning by only a small number of businesses, is an enormous opportunity for any entrepreneur, manager or CEO to understand, integrate with his business, contribute to and profit from. First, what is Wide-Scope Accounting a.k.a. Golden Helmets? As a concept, it is almost as old as human society itself, but was first explicitly identified and named by Frank R. Wallace, author at Neo-Tech Publishing. The original explanation of the concept of Golden Helmets, given in a courtroom speech, can be found at: http://www.neo-tech.com/golden-helmet/chapter3.html Wide-scope accounting is a wealth management tool, allowing a person to live without any taxable personal income. Rather, all money is kept by one's company and utilized to expand the company and maximize its values, while one's own expenses necessary to live and work (food, housing, car, etc.) are company expenses. Any individual living this way, in a 100% service environment, but without private income or excess property, therefore, cannot be taxed. One's own company itself focuses not on immediate profits but on building maximum high-quality values, efficiency and new jobs. Taxable profits in a company are minimized by re-investing, while the value-maximized work leads to high revenues, and widens the business through additional partners and employees. Breaking The Chains Of Today's Criminal Politics With Neo-Tech, Frank R. Wallace also openly identified that the reason for the modern, century-old economy-controlling/economy-draining high income taxes are not primarily to satisfy the financial requirements of governments and "the public", which could as well be achieved through less compulsive, more voluntary taxation schemes. Rather, the prime reason for income taxes and their often life-destroying enforcement by armed government hunters is to keep control over people -- legal, bureaucratical, social and psychological -- by controlling everyone with a strong, limiting grip on his or her prosperity, privacy, business, happiness, and ultimately, life. Wide-scope accounting in business lets a company always pay excess taxes indirectly, by creating jobs and boosting markets, which leads to direct and indirect tax payments by multiplying the profits of others, while minimizing one's own financial liability. It allows any businessman to outmaneuver criminal politics without being an "Atlas that Shrugs" -- in contrary, it means producing more and harder than ever, and in the long term, profiting enormously, but at the same time withdrawing all support for the force-backed tax system -- legally, and without making any force or resistance necessary. Regulated Currencies Mean Regulated Values However, despite the tool of wide-scope accounting readily available to everyone, one must face the reality of a politically undermined/controlled economy existing practically everywhere today. Vast economies -- valuable, but yet, drained -- today depend on monetary systems ultimately regulated by local and international political authorities. Thus, the task is to sublimate traditional economical dynamics to direct value-creation/value- exchange dynamics of an economy beyond wide-scope accounting within traditional currency systems -- immune from external force, authorities and corruptions. Without making a mistake about it, official currencies do represent the material values that they are exchanged for. And, contrary to the views propagated by dishonest media, academics, traditionalists, politicians and activists, money is not the "root of all evil". Yet, in a way, all official money is corrupted, since it is regulated directly and indirectly by governments through taxation-, banking-, anti-inflation-, anti-deflation-, public insurance-, tariff-, business- and economic regulations and laws which affect
Followup: [RE: DOJ proposes US data-rentention law.]
Two points: 1. According to Poulson, the DOJ proposal never discussed just what would be logged. Poulson compared it to the European Big Brother legislation, which required storage to Web browsing histories and email header data. 2. After I posted the same info to /. http://slashdot.org/articles/02/06/19/1724216.shtml?tid=103 (I'm the 'Anonymous Coward' in this case), Kevin updated his article. The new version may be found at: http://online.securityfocus.com/news/489 The relevant portions read: - start quote - U.S. Denies Data Retention Plans The Justice Department disputes claims that Internet service providers could be forced to spy on their customers as part of the U.S. strategy for securing cyberspace. By Kevin Poulsen, Jun 19 2002 12:24PM [...] But a Justice Department source said Wednesday that data retention is mentioned in the strategy only as an industry concern -- ISPs and telecom companies oppose the costly idea -- and does not reflect any plan by the department or the White House to push for a U.S. law. [...] - end quote - Peter Trei > -- > From: David G. Koontz[SMTP:[EMAIL PROTECTED]] > Sent: Thursday, June 20, 2002 10:57 AM > To: [EMAIL PROTECTED] > Cc: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]' > Subject: Re: DOJ proposes US data-rentention law. > > Trei, Peter wrote: > > - start quote - > > > > Cyber Security Plan Contemplates U.S. Data Retention Law > > http://online.securityfocus.com/news/486 > > > > Internet service providers may be forced into wholesale spying > > on their customers as part of the White House's strategy for > > securing cyberspace. > > > > By Kevin Poulsen, Jun 18 2002 3:46PM > > > > An early draft of the White House's National Strategy to Secure > > Cyberspace envisions the same kind of mandatory customer data > > collection and retention by U.S. Internet service providers as was > > recently enacted in Europe, according to sources who have reviewed > > portions of the plan. > > > > In recent weeks, the administration has begun doling out bits and > > pieces of a draft of the strategy to technology industry members > > and advocacy groups. A federal data retention law is suggested > > briefly in a section drafted in part by the U.S. Justice Department. > > > > If the U.S. wasn't in an undeclared 'war', this would be considered > an unfunded mandate. Does anyone realize the cost involved? Think > of all the spam that needs to be recorded for posterity. ISPs don't > currently record the type of information that this is talking about. > What customer data backup is being performed by ISPs is by and large > done by disk mirroring and is not kept permanently. > > I did a bit of back of the envelope calculation and the cost in the > U.S. approaches half a billion dollars a year in additional backup > costs a year without any CALEA type impact to make it easy for law > enforcment to do data mining. The estimate could easily be low by a > factor of 5-10. AOL of course would be hit by 40 percent of this > though, not to mention a nice tax on MSN. Call it ten cents a day > per customer in fee increases to record all that spam for review by > big brother. I feel safer already. > > Whats next, censorship?
Acheive financial stability ZRETFI
Title: webCREDIT Thank You, Your email address was obtained from a purchased list, Reference # 1320-15000. If you wish to unsubscribe from this list, please Click here and enter your name into the remove box. If you have previously unsubscribed and are still receiving this message, you may email our Abuse Control Center, or call 1-888-763-2497, or write us at: NoSpam, 6484 Coral Way, Miami, FL, 33155". © 2002 Web Credit Inc. All Rights Reserved.
[±¤°í]¸ð±âÅðÄ¡ ºñ´©ÀÔ´Ï´Ù.
Title: Untitled Document Á¤º¸Åë½ÅºÎ ±Ç°í »çÇ× ¹ý·ü Á¦ 50Á¶¿¡ ÀÇ°ÅÇÏ¿© Á¦¸ñ¿¡ [±¤°í]¶ó°í Ç¥±âÇÑ ±¤°í¸ÞÀÏÀÔ´Ï´Ù.º» ¸ÞÀÏÀº ÀÎÅÍ³Ý»ó¿¡ °ø°³µÈ ¸ÞÀÏ ÁÖ¼Ò¸¦ ±Ù°Å·Î ¹ß¼ÛÇÏ¿´À¸¸ç, 1ȸ¼º ¸ÞÀÏÀÓÀ» ¾Ë·Áµå¸³´Ï´Ù.¼ö½ÅÀ» ¿øÇÏÁö ¾ÊÀ¸½Ã¸é[¼ö½Å°ÅºÎ]¸¦ ´·¯ÁÖ¼¼¿ä. We sincerely apologize for sending advertising e-mail to you without your permission.We have indicated that this is advertising mail in accordance to the Law of Information and Network Usage, and we have installed a Spam Guard function.We obtained your e-mail address in an open place of public access on the Internet. Please be assured that we do not have any of your personal information other than your e-mail address. If you do not wish to receive it, please click the reject bulk mail function.
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.30, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : <[EMAIL PROTECTED]> Recipient : <[EMAIL PROTECTED]> Message-Id : <[EMAIL PROTECTED]> Subject: Congratulations Virus : W32/Klez.gen@MM Original headers: From: <[EMAIL PROTECTED]> Fri Jun 21 08:40:33 2002 >Received: from waste.minder.net (daemon@waste [66.92.53.73]) > by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LCeLE75346 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:21 -0400 (EDT) > (envelope-from [EMAIL PROTECTED]) >Received: (from cpunks@localhost) > by waste.minder.net (8.11.6/8.11.6) id g5LCeKa18784 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 08:40:20 -0400 >Received: from locust.minder.net (locust.minder.net [66.92.53.74]) > by waste.minder.net (8.11.6/8.11.6) with ESMTP id g5LCeIu18767 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:18 -0400 >Received: from einstein.ssz.com (cpunks@[207.200.56.4]) > by locust.minder.net (8.11.6/8.11.6) with ESMTP id g5LCe1E75307 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 08:40:01 -0400 (EDT) > (envelope-from [EMAIL PROTECTED]) >Received: (from cpunks@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id HAA31287 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 07:45:35 -0500 >Received: (from mdom@localhost) > by einstein.ssz.com (8.8.8/8.8.8) id HAA31254 > for cypherpunks-outgoing; Fri, 21 Jun 2002 07:44:11 -0500 >Received: from barry.mail.mindspring.net (barry.mail.mindspring.net [207.69.200.25]) > by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id HAA31237 > for <[EMAIL PROTECTED]>; Fri, 21 Jun 2002 07:43:45 -0500 >Received: from sdn-ar-003florlap260.dialsprint.net ([168.191.91.150] helo=Cntpy) > by barry.mail.mindspring.net with smtp (Exim 3.33 #1) > id 17LNfY-00011d-00 > for [EMAIL PROTECTED]; Fri, 21 Jun 2002 08:37:41 -0400 >From: soccerfam9 <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Old-Subject: CDR: Congratulations >MIME-Version: 1.0 >Content-Type: multipart/alternative; > boundary=Ar6E0156N833cb26EK05 >Message-Id: <[EMAIL PROTECTED]> >Date: Fri, 21 Jun 2002 08:37:41 -0400 >Sender: [EMAIL PROTECTED] >Precedence: bulk >Reply-To: [EMAIL PROTECTED] >X-Mailing-List: [EMAIL PROTECTED] >X-Unsubscription-Info: http://einstein.ssz.com/cdr >X-List-Admin: [EMAIL PROTECTED] >X-Loop: ssz.com >X-Acceptable-Languages: English, Russian, German, French, Spanish >Subject: Congratulations