Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling words Virus : W32/Yaha.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 12:31:28 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id LAA07863 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:35:39 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id LAA07831 for cypherpunks-outgoing; Sat, 6 Jul 2002 11:34:14 -0500 Received: from rly-ip02.mx.aol.com (rly-ip02.mx.aol.com [152.163.225.160]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id LAA07827 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:34:06 -0500 Received: from logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by rly-ip02.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706122826; Sat, 06 Jul 2002 12:28:26 -0400 Received: from EINSTEIN.ssz.com (AC9BC1DA.ipt.aol.com [172.155.193.218]) by logs-tp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66GJem62648 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:19:40 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: Mail Delivery System[EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling words Date: Sat,06 Jul 2002 12:17:46 PM X-Mailer: Microsoft Outlook Express 5.50.4133.2400 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=vedsvee X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Undelivered Mail Returned to Sender -mark,s spelling words
Content-Transfer-Encoding: quoted-printable This message was created automatically by mail delivery software (Exim).A message that you sent could not be delivered to one or more of its recipients.This is a permanent error. The following address(es) failed:[EMAIL PROTECTED]For further assistance, please contact < [EMAIL PROTECTED] >If you do so, please include this problem report. You candelete your own text from the message returned below.Copy of your message, including all the headers is attached ---BeginMessage--- mark,s Description: MIDI audio ---End Message---
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Undelivered Mail Returned to Sender -mark,s spelling words Virus : W32/Yaha.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 12:31:35 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66GVRE08390 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:27 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g66GVQU24610 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:26 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g66GVOu24596 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:24 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66GVKE08364 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:20 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id LAA07862 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:35:38 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id LAA07831 for cypherpunks-outgoing; Sat, 6 Jul 2002 11:34:14 -0500 Received: from rly-ip02.mx.aol.com (rly-ip02.mx.aol.com [152.163.225.160]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id LAA07827 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:34:06 -0500 Received: from logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by rly-ip02.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706122826; Sat, 06 Jul 2002 12:28:26 -0400 Received: from EINSTEIN.ssz.com (AC9BC1DA.ipt.aol.com [172.155.193.218]) by logs-tp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66GJem62648 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:19:40 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: Mail Delivery System[EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling words Date: Sat,06 Jul 2002 12:17:46 PM X-Mailer: Microsoft Outlook Express 5.50.4133.2400 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=vedsvee X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Undelivered Mail Returned to Sender -mark,s spelling words
Undelivered Mail Returned to Sender -mark,s spelling words
Content-Transfer-Encoding: quoted-printable This message was created automatically by mail delivery software (Exim).A message that you sent could not be delivered to one or more of its recipients.This is a permanent error. The following address(es) failed:[EMAIL PROTECTED]For further assistance, please contact < [EMAIL PROTECTED] >If you do so, please include this problem report. You candelete your own text from the message returned below.Copy of your message, including all the headers is attached ---BeginMessage--- mark,s Description: MIDI audio ---End Message---
Executable discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: A humour game Virus : W32/Klez.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 17:09:17 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66L96E22539 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:06 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g66L93j11226 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:04 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g66L91u11199 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:01 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66L8lE22520 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:08:48 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id QAA13496 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:13:07 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id QAA13458 for cypherpunks-outgoing; Sat, 6 Jul 2002 16:11:23 -0500 Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA13449 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:10:41 -0500 Received: from logs-mtc-tf.proxy.aol.com (logs-mtc-tf.proxy.aol.com [64.12.103.5]) by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN1-0706170513; Sat, 06 Jul 2002 17:05:13 -0400 Received: from Hsjrpijwn (ACA7E679.ipt.aol.com [172.167.230.121]) by logs-mtc-tf.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66KSXw34458 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:28:33 -0400 (EDT) Date: Sat, 6 Jul 2002 16:28:33 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: ksmoot [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: A humour game MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=E691QW1fyY30c3v4HfkL508 X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: A humour game We received a message claiming to be from you which contained an executable attachment (batch file, script, program, etc). In order to protect users from malicious programs, we do not accept these file types thru this mail server. If you need to send the file to it's intended recipient, you must send it in an archived and/or compressed format. Your email has been sent to the intended recipient without this file included. A message detailing why it was dropped has been substitued in it's place. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: A humour game Mime type : application/octet-stream File name : kitty.exe
Executable discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: A humour game Virus : W32/Klez.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 17:09:26 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id QAA13497 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:13:08 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id QAA13458 for cypherpunks-outgoing; Sat, 6 Jul 2002 16:11:23 -0500 Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA13449 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:10:41 -0500 Received: from logs-mtc-tf.proxy.aol.com (logs-mtc-tf.proxy.aol.com [64.12.103.5]) by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN1-0706170513; Sat, 06 Jul 2002 17:05:13 -0400 Received: from Hsjrpijwn (ACA7E679.ipt.aol.com [172.167.230.121]) by logs-mtc-tf.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66KSXw34458 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:28:33 -0400 (EDT) Date: Sat, 6 Jul 2002 16:28:33 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: ksmoot [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: A humour game MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=E691QW1fyY30c3v4HfkL508 X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish We received a message claiming to be from you which contained an executable attachment (batch file, script, program, etc). In order to protect users from malicious programs, we do not accept these file types thru this mail server. If you need to send the file to it's intended recipient, you must send it in an archived and/or compressed format. Your email has been sent to the intended recipient without this file included. A message detailing why it was dropped has been substitued in it's place. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: A humour game Mime type : application/octet-stream File name : kitty.exe
R e : W h a t y o u w a n t e d ! BQEXBAH
,***@*** %%% bravo %%% ***@*** .Have you been receiving your child support? Imagine how wonderful it would feel to help a large number of children in your area and making $4,000 to $12,000 per month doing it? ``-Helping needy children and parents AND at the same time supporting your own family very well financially. Every day in your community there are single parents struggling to make ends meet and wondering where the money will come from to cover their children's basic expenses. Most of these parents are hard working people who just need help from the person who has a legal responsibility to give it to them. Every day a large number of parents call us for help in collecting their child support. Many more than we can possibly handle. We need the help of caring and dedicated people who would like to enter a new high paying prestigious profession. Please join our CRUSADE to correct this terrible injustice! The court has decided how much these parents are to receive but the caseloads are so large that the results are that there is over $32 Billion dollars worth of uncollected Child Support in the US today and this amount grows by millions every week. If you would be interested in helping us, then we have all of the training that you will need to start a new business in this high growth profession of "Child Support Processing!" We have the resources available to you to help you track down deadbeat parents and force them to pay what they legally owe, without ever having to come into contact with them! We have the most extensive Computer Data Bases in the world for the processing of Child Support. Our databases allow you to track down dead beats, find their assets and then collect the child support, which is due. These powerful databases will be available to you if you choose to join us. You can do what private investigators do, legally, and for a fraction of what it would normally cost! And you can do it from the comfort of your own home office! One mother has told us that working with the government to find an absent parent "is like beating your head against a brick wall. The frustration and futility you feel are enormous. Agencies crawl at a snails pace, and authorities often lose files or seem to make no progress with a case." But this same mother's outlook changed after reviewing our course: "I would have given anything to have this knowledge years ago. This is the best $249.00 I have ever spent." We have Customer -Support staff available to you from 7:00AM to 9:00PM(Central Standard Time) 7 days a week. If you call this number, you can talk to one of our very experienced Customer Support personnel. They can answer any questions you may have-with no obligation. Please call us at 1-2 8 1--5 0 0--4018 ++ If you wish to be "eliminated" -from our - l-i- s-t, ple ase email [EMAIL PROTECTED] :::+:::+:::+:::TO48 7-06 C6 P:::+:::+:::+::: H . E . L . P * S . H . A . R . E * E . A . R . N {%RAND%} s s p l t m6--- Fujiko p3-40/bjss community
Come and see my ADULT videos bjxye
Title: Cam Lesbos Hi My name is Autumn. I have just posted my new ADULT videos to my website. Please come and take a look. Click Here to see to see me naked. If the link above doesn't work for you copy and paste this URL into your Web Browsers address bar http://www.allyoucanwant.com/affiliates/sweet/ WARNING ADULT MATERIAL Note: this is not a spam email. This email was sent to you because your email was entered in on a website requesting to be a registered subscriber. If you would would like to be removed from our list, CLICK HERE TO CANCEL YOUR ACCOUNT and you won't receive another email from us! gixyytlkbgyyscgpfhvwlp
nokia cell users 311510765433322
Take yourself out of our list BY CLICKING HERE BORED WITH YOUR CELL PHONE? Get cool Songs Logos to your Phone today! It's real simple! No confusing downloads or installations.Simple phone activation! Click Here to order There are tons of songs and graphics to choose from. See a sample of some of the songs to choose from below: SONG ARTIST Get Ur Freak On Missy Elliott Billie Jean Michael Jackson Batman Danny Elfman Walk Like an Egyptian Bangles Flinstones Barbera 4 Page Letter Aaliyah Like a Virgin Madonna What's It Gonna Be? B.Rhymes/J.Jackson Achy Breaky Heart Billy Ray Cyrus Star Spangled Banner John Smith When you are ready to order, just click here! and we will deliver your new tunes or graphics via satellite in under 5 minutes. Take yourself out of our list BY CLICKING HERE 311510765433322
RE: Revenge of the WAVEoids: Palladium Clues May Lie In AMD Motherboard Design
At 10:07 PM 06/26/2002 -0700, Lucky Green wrote: An EMBASSY-like CPU security co-processor would have seriously blown the part cost design constraint on the TPM by an order of magnitude or two. Compared to the cost of rewriting Windows to have a infrastructure that can support real security? Maybe, but I'm inclined to doubt it, especially since most of the functions that an off-CPU security co-processor can successfully perform are low enough performance that they could be done on a PCI or PCMCIA card, without requiring motherboard space. I suppose the interesting exception might be playing video, depending on how you separate functions. (Obviously the extent of redesign is likely to be much smaller in the NT-derived Windows versions than the legacy Windows3.1 derivatives that MS keeps foisting upon consumers. Perhaps XP Amateur is close enough to a real operating system for the kernel to be fixable?) I am not asserting that security solutions that require special-purpose CPU functionality are not in the queue, they very much are, but not in the first phase. This level of functionality has been deferred to a second phase in which security processing functionality can be moved into the core CPU, since a second CPU-like part is unjustifiable from a cost perspective.
Re: Ross's TCPA paper
At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote: Well, first I want to say that I don't like the way it is today. I want things to get better. I can't read e-books on my pocket computer, for example, which is sad since I actually would be able to enjoy e-books if I only could load them onto my small computer that follows my everywhere. You may not be able to read an Adobe\(tm Brand E-Book\(tm, but that just means you'll need to buy electronic books from publishers that don't use that data format - whether it's raw ascii text or Palm-formatted text or PalmOS DRMware that you can also view on your PC using an emulator in glorious 160x160-pixel format :-) Of course, if your PC's home country of Nauru has Software Police implementing some local equivalent of the DMCA, that emulator that you need for debugging may be illegal. ... How good is Winamp if it can't play any music recorded in 2004 or later? Given that Windows Media Player can play all your tunes and it takes a reboot to switch to Winamp, who wouldn't stick with WMP?
Re: Jonathan Zittrain on data retention, an awful idea
Sigh. Back when the US Feds were still trying to push Key Escrow on the National Information Infrastructure, I started research for an April 1 RFC for the National Information Infrastructure Data Entry Escrow Protocol, NIIDEEP, and proposed NIIDEEP Information Network Protocol Implementation Government Standard, NIIDEEPINPIGS. (Didn't get it finished by April 1 :-) Because after all, there's no sense escrowing our crypto keys if you don't also escrow the cyphertext - some of Eric Hughes's talks on Message Escrow and Data Retention Policies were excellent explanations of why those was the critical issues. If the US Feds and Eurocrats would like us to provide them with all of our data, the existing internet would need to double in size to transport all of it to the appropriate government data storage facilities, or more than double if separate copies need to be provided to multiple national governments, or much more if local governments such as city trade commissions need copies. Since this is clearly unrealistic, even with the demise of the E-Bone, transmission will require the use of off-line data transmission technology. Waiting for approval of new government standards would take too long, and lose access to valuable data because of the resulting delay of several years, but there are several existing standards for data storage that can be applies. My long-lost research had the FIPS (US Federal Information Processing Standards) references for several of them, but the current environment requires the corresponding European standards as well, and I'll need assistance. But there's also been progress! RFC 1149 (Avian Carriers) has been implemented, though scalable implementation and dual-source requirements may require genetic reconstruction of the Passenger Pigeon to supplement current carrier species. Modular methods uses standard data storage formats and separate transmission. Standards widely supported in the US include Hollerith cards, 1600 bpi 9-track tapes with EBCDIC character sets and fixed block sizes and LRECLs, and ASCII-format punch tape (with country-specific standards for recycled paper content.) 8-inch floppy disks have also been widely used, and support both CP/M and RT11 file system formats. Are there corresponding European standards for data storage? Transmission methods for data storage media include International Postal Union standards for link layer and addressing formats and pricing, though I'm not directly familiar with standards for shipping containers where data encapsulation is required. Thanks; Bill Stewart, [EMAIL PROTECTED] From: Jon Zittrain [EMAIL PROTECTED] Subject: Re: FC: Data retention scheme marches forward in European Parliament I've written something opposing this at http://www.forbes.com/forbes/2002/0708/062.html. Consider the range of proposals for unobtrusive but sweeping Internet monitoring. Most of them are doable as a technical matter, and all of them would be unnoticeable to us as we surf. Forbes columnist Peter Huber's idea is perhaps the most distilled version. Call it the return of the lock box. He asks for massive government data vaults, routinely receiving copies of all Internet traffic--e-mails, Web pages, chats, mouse clicks, shopping, pirated music--for later retrieval should the government decide it needs more information to solve a heinous crime. (See the Nov. 12 column at forbes.com/huber.) The idea might sound innocuous because the data collected would remain unseen by prying eyes until a later search, commenced only after legal process, is thought to require it. Make no mistake, however: The idealized digital lock box and many sibling proposals are fundamentally terrible ideas. Why? Jonathan Zittrain, Harvard law professor; codirector, Berkman Center for Internet Society.
Cracking Dead People's Passwords
One of the usual arguments for key escrow was always what if your employee dies and you can't get his data? Secret Sharing techniques are of course a better approach, or at least storing sealed envelopes in company safes as a much better approach than pre-broken crypto. There've been a couple of stories in the press recently where weak passwords also solved the problem. One was a radio piece, I think NPR, about one of the companies in the World Trade Center who'd lost their computer administrators in the 9/11 attacks. The remaining employees got together and started telling stories about their co-workers - their interests, their family members, where they'd gone on vacation, their dogs' names, etc. They got most of the passwords. (It was a piece about modern management styles, and how in older hierarchical companies there'd be fewer people who knew the new employees well enough to do that.) The other was about the loss of the database of the personal library collection of one of the main linguists studying one of the two main Norwegian dialects. It's now been cracked... RISKS-FORUM Digest 22.13 http://catless.ncl.ac.uk/Risks/22.13.html Date: Tue, 11 Jun 2002 11:37:02 -0400 From: Lillie Coney [EMAIL PROTECTED] Subject: Norwegian history database password lost and retrieved After the password for accessing a Norwegian history museum's database catalog for 11,000 books and manuscripts had been lost when the database's steward died, the museum established a competition to recover it. Joachim Eriksson, a Swedish game company programmer, won the race to discover the password (ladepujd, the reverse of the name of the researcher who had created the database). How he arrived at it was not disclosed. [Source: Long-lost password discovered: Norwegian history database cracked with help from the Web, By Robert Lemos, MSNBC, 11 Jun 2002; PGN-ed] Lillie Coney, Public Policy Coordinator, U.S. Association for Computing Machinery Suite 510 2120 L Street, NW Washington, D.C. 20037 1-202-478-6124
Re: Smart ID Cards Planned for Sailors to Spot Terrorists
Bob - This isn't really cryptography-related, and I can't post to DCSB, but this does seem like Cypherpunks material. What an insert several paragraphs of sailor-type language here/ outrageous proposal! Can't sail without some government fingerprinting you, laser-scanning your eyes, and throwing you in a huge database? more nautical language/. I'd expect the ILO to be socialist - they are a big union after all - but I wouldn't expect them to be totalitarians. Sure, it's a way to create a harder-to-avoid union card, and a way for their biggest customers to be forced to hire their people by using government pressure to enforce it. It's also a surveillance mechanism to let management keep track of sailors they dislike, prevent politically incorrect people from getting jobs as sailors, give governments additional control over sailors in port, private sailors, and refugees who can't afford to travel on airplanes, and gives large governments an increased excuse to interfere with high-seas traffic between other countries under the pretense of checking whether all the sailors are documented. From a technology perspective, the interesting paragraph is The plans have drawn criticism from seafarer's groups concerned that port authorities may insert information in so-called ``smart'' identification documents without the cardholder's knowledge. Sure, smart cards with non-user-viewable data can easily have extra data in them saying the user is a Communist or union organizer or did scab labor or is a Muslim or a Jew or a Rastafarian. And it's easy for port authorities to send copies of sailors' photos to their local police in case they're wandering around town. But with the Internet reaching everywhere, either by wire or satellite, the information doesn't need to be hidden in the card. The card says that you're Sailor #12345678, so they can look you up on any website they want - not just the ILO's paid their union dues database, and Interpol's Never been caught smoking dope database, and the shipping companies' Not a union troublemaker database, and the originally from _this_ country even though they're now American database, and Blacknet's databases on gets in Bar Fights and scab laborers. Bill Stewart At 06:10 PM 07/03/2002 -0400, R. A. Hettinga wrote: http://quote.bloomberg.com/fgcgi.cgi?ptitle=Top%20World%20Newss1=blktp=ad_topright_topworldT=markets_box.hts2=ad_right1_windexbt=ad_position1_windexbox=ad_box_alltag=worldnewsmiddle=ad_frame2_windexs=APSMyZRY2U21hcnQg Bloomberg News Top World News 07/03 13:20 Smart ID Cards Planned for Sailors to Spot Terrorists (Update1) By Amy Strahan Butler Washington, July 3 (Bloomberg) -- The identities of more than 500,000 commercial sailors worldwide would be verified through thumb or iris scans under tough, new anti-terrorism standards backed by the U.S. and other industrialized nations. ``The whole idea is to come up with a worldwide system for positive, verifiable identification of seafarers,'' said Mary Covington, associate director of the Washington office of the International Labor Organization, a United Nations-affiliated group that's developing the standards. The labor organization got a big boost when representatives of the Group of Eight nations -- the U.S., Japan, Germany, the U.K., France, Canada, Italy and Russia -- endorsed the standards during a meeting in Canada last week. The plans have drawn criticism from seafarer's groups concerned that port authorities may insert information in so- called ``smart'' identification documents without the cardholder's knowledge. Those concerns are being swept aside as the drive to close loopholes in shipping security has gained momentum since Sept. 11 in the U.S., where less than 2 percent of cargo entering ports is inspected by the U.S. Customs Service. After the terrorist attacks, the Coast Guard began requiring ships to notify ports 96 hours prior to arrival and to submit a list of crew members. Card-Carrying Sailors Commercial sailors in countries that ratify the ILO standards would be required to carry identification cards similar to driver's licenses that also contain biometric information, such as a thumbprint or iris scan. Under the proposal, port authorities would be able to verify the identity of the card bearer by scanning his thumb or eye. The credentials could be issued to more than a half-million shipping employees as governments attempt to tighten port security to prevent terrorist activities. ``This would help produce uniform treatment of seafarers,'' said Chris Koch, president of the World Shipping Council, a trade association representing more than 40 shipping companies, including Atlantic Container Line AB and Crowley Maritime Corp. ``That's in the interest of not only seafarers but of commerce.'' The current ILO convention for identifying shipping employees entering foreign ports asks that countries to provide seafarers with
Re: mount filesystem and run a program when hotplugged
At 05:29 PM 06/28/2002 +0200, Eugen Leitl wrote: I've bought me a little (32 MBytes) hotpluggable USB flash stick (a TrekStor). It mounts fine, but what I'd like to do is to automount it, and fire up a program (I intend to put my keyring on it) if hotplugged. The system I'm testing this on is RH 7.3. I've been using mount -t vfat /dev/sda /mnt/usbhd to mount it manually and put diverse entries into /etc/fstab, to no avail. Any suggestions? I don't know how to do that, though it certainly sounds like an invitation for viruses to migrate around on USB keyring sticks. Is there CDROM autorun code that runs on Linux that could be adapted?
Internet Video and Conectivity Solutions
Title: Módulo de Adquisición de video e-cam Connect up to 4 Cameras to the Internet Price: Monitoring and Security over internet or intranet. nSupport for up to 4 cameras BW or color. nInput for movement detectors or other security device. e-mail alert in case of events. Download our demo: e-cam More details File Size 70K e-gateway The simple way to connect and share your ADSL Price: Share your ADSL connection. Protect your network from Hackers. Run your own web server. More reliable, eficient and secure than a proxy server. More details File Size 40K e-server Need a small WEB SERVER ? Price: e-server: HTTP embedded web server. e-server/w: HTTP embedded web server with WML support for WAP compatible devices. One to Four Serials RS-232. RS-232 to TCP/IP Converter Supported protocols TCP/IP, HTTP, UDP, SMTP. More details File Size: 36K IDC-2000 Data Acquisition and Control with Internet support Price: 4 Lines by 20 LCD and Keypad. 3 optoisolated digital inputs. 12 digital or analog input. 8 digital outputs with relays. Programable en C, Pascal and Basic. One Serial RS-232 and one RS-485 (opctional) More details File Size: 50K
[¼ºÀÎ] ´ç½ÅÀ» ¿À´Ã¹ã ÆÄƼ¿¡ ÃÊ´ëÇÕ´Ï´Ù~~!! ¸¸19¼¼ ÀÌ»ó¸¸ º¸¼¼¿°~~^^* !--7051--
´ç½ÅÀ» ¿À´Ã¹ã ¹«¾ÆÁö°æ ÆÄƼ¿¡ ÃÊ´ëÇÕ´Ï´Ù~!! http://sex82.com ¿Àºü »¡¸®¿Í¢½¢½ ¼ºÀÎÀü¿ë ¼îÇθô ¹«·á ¿µÈµÎ ÀÖ½À´Ï´ç~~^^* ½Å¼±ÇÏ°í Áö¼ÓÀûÀÎ ¾÷µ¥ÀÌÆ® ¹× »çÀÌÆ®°ü¸®·Î ÀúÈñȸ¿ø´Ôµé¿¡°Ô ¼ºñ½ºÇϵµ·Ï ÃÖ¼±À» ´ÙÇÏ´Â SEX82°¡ µÇ°Ú½À´Ï´Ù.°¨»çÇÕ´Ï´Ù. ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.
Re: Closed source more secure than open source
- Original Message - From: Anonymous [EMAIL PROTECTED] Ross Anderson's paper at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf has been mostly discussed for what it says about the TCPA. But the first part of the paper is equally interesting. Ross Andseron's approximate statements: Closed Source: the system's failure rate has just dropped by a factor of L, just as we would expect. Open Source: bugs remain equally easy to find. Anonymous's Statements: For most programs, source code will be of no benefit to external testers, because they don't know how to program. Therefore the rate at which (external) testers find bugs does not vary by a factor of L between the open and closed source methodologies, as assumed in the model. In fact the rates will be approximately equal. The result is that once a product has gone into beta testing and then into field installations, the rate of finding bugs by authorized testers will be low, decreased by a factor of L, regardless of open or closed source. I disagree, actually I agree and disagree with both, due in part to the magnitudes involved. It is certainly true that once Beta testing (or some semblance of it) begins there will be users that cannot make use of source code, but what Anonymous fails to realize is that there will be beta testers that can make use of the source code. Additionally there are certain tendencies in the open and closed source communities that Anonymous and Anderson have not addressed in their models. The most important tendencies are that in closed source beta testing is generally handed off to a separate division and the original author does little if any testing, and in open source the authors have a much stronger connection with the testing, with the authors' duty extending through the entire testing cycle. These tendencies lead to two very different positions than generally realized. First, closed source testing, beginning in the late Alpha testing stage, is generally done without any assistance from source code, by _anyone_, this significantly hampers the testing. This has led to observed situations where QA engineers sign off on products that don't even function, let alone have close to 0 bugs. With the software engineers believing that because the code was signed off, it must be bug-free. This is a rather substantial problem. To address this problem one must actually correct the number of testers for the ones that are effectively doing nothing. So while L is the extra difficulty in finding bugs without source code, it is magnified by something approximating (testers)/(testers not doing anything). It's worth noting that (testers) (testers not doing anything) causing the result K = L*(testers)/(testers not doing anything), to tend towards infinite values. In open source we have very much the opposite situation. The authors are involved in all stages of testing, giving another value. This value is used to adjust L as before, but the quantities involved are substantially different. It must be observed, as was done by Anonymous, that there are testers that have no concept what source code is, and certainly no idea how to read it, call these harassers. In addition though there are also testers who read source code, and even the authors themselves are doing testing, call these coders. So in this case K = L*(harassers)/(harassers+coders). Where it's worth noting that K will now tend towards 0. It is also very much the case that different projects have different quantities of testers. In fact as the number of beta testers grows, the MTBD(iscovery) of a bug must not increase, and will almost certainly decrease. In this case each project must be treated separately, since obviously WindowsXP will have more people testing it (thanks to bug reporting features) than QFighter3 (http://sourceforge.net/projects/qfighter3/ the lest active development on sourceforge). This certainly leads to problems in comparison. It is also worth noting that it is likely that actual difficulty in locating bugs is probably related to the maximum of (K/testers) and the (testers root of K). Meaning that WindowsXP is likely to have a higher ratio of bugs uncovered in a given time period T than QFighter3. However due to the complexity of the comparisons, QFighter3 is likely to have fewer bugs than WindowsXP, simply because WindowsXP is several orders of magnitude more complex. So while the belief that source code makes bug hunting easier on everyone, is certainly not purely the case (Anonymous's observation), it is also not the case that the tasks are equivalent (Anonymous's claim), with the multiplier in closed source approaching infinite, and open source towards 0. Additionally the quantity of testers appears to have more of an impact on bug-finding than the discussion of open or closed source. However as always complexity plays an enormous role in the number of bugs available to find, anybody with a few days programming experience
Grants up to $156,000! NEVER need to Repay!
Could you use a Free Grant of $10,000 to $156,000 but, not exceeding $5,000,000? The relatively new concept of giving away money is called the Free Grant Giveaway Program. No longer are Free Grants the domain of the privileged and choice few, but now they can be awarded to everyday people like you. These are genuine programs offering money to those candidates that meet their eligibility criteria. Everything in this announcement is perfectly legal and the verifiable, honest truth. See if you QUALIFY NOW! Limited time offer!! Ends at MIDNIGHT!
Here is that link. 8470OaPq5-890OvSw7913ZhD-23
Title: New The World's #1 On-line Pharmacy Order from the convenience of your home! No Embarrassment, Just FAST, DISCRETE Delivery! Viagra (Sexual) Phentermine (Weight-Loss) Meridia (Weight-Loss) Retin-A (Skin Care) Propecia (Hair Loss) Zyban (Quit Smoking) And Much, Much More! Click here to enter! Do you want EVERYONE to know your business? ORDER NOW! to be removed http://213.139.76.181/remove.php 7604BcxR5-327TlrZ4033nNHn1-718BOyP2054xsoS3-840KCwI4217RfSl55
TIME CAPSULE in a bottle?
Title: Grow biologically younger in 30 days or less! The most effective anti-aging therapy. Dr. Thierry Hertoghe, President of the European Academy for Quality Life and Longevity Medicine What if you could reverse the effects of aging? It's not science fiction anymore! Here is what Pro GHR will do for you: Look Younger Lose Weight Restore Hair Growth Reduce Wrinkles Boost Sex Drive Energy Rebuild Bone Muscle Mass Lower Blood Pressure Reduce Cholesterol Regenerate Heart, Liver, Kidneys, Lungs Many people that start this program between 35 to 40 years of age can maintain their appearance and current biological age for the next 10 to 20 years. Persons age 50 and over can actually reverse the effects of aging in many cases up to 10 to 20 years over a 3 to 6 month period. Results will depend on your health, living and eating habits and overall lifestyle. Order Now(Only $39.99, lowest price ever!) Pro GHR is recognized as the bridge to a much longer and healthier life! Soon after you begin taking Pro GHR, you and others will start noticing some profound changes in your appearance and overall health. Most importantly, you'll feel terrific using Pro GHR. After the age of twenty-one, your body slowly stops releasing an important hormone known as HGH. Scientists have now discovered a relationship between this decline of HGH in the body and aging. In fact, it is directly responsible for many of the most common signs of growing old, such as wrinkling of the skin, gray hair, decreased energy, and diminished sexual function. Fortunately, clinical evidence proves that by elevating human growth hormone we can significantly stop -- and even reverse -- these symptoms of aging! Until now, HGH therapy was a costly and even dangerous treatment, available only to celebrities and the very wealthy. With the introduction of Pro GHR, it is now affordable and free of any reported side-effects. For less than a fraction of the cost, Pro GHR naturally increases HGH levels in your body. If you are already one of our satisfied customers, congratulations! May you live a long and healthy life with Pro GHR! Science now recognizes aging as a disease that can be reversed to a large degree by increasing HGH, Human Growth Hormone to levels to where they were in your 20's. Human Growth Hormone (HGH) is an endocrine hormone produced by your body abundantly in your youth and starts falling off dramatically past age 30. Other hormones that decline with age are estrogen, progesterone, testosterone, melatonin and DHEA. Human Growth Hormone (HGH) regulates all these other hormone levels within the body. HGH is produced by the pituitary gland and is responsible for all adolescent growth peaks. Produced abundantly in our youth, human growth hormone decreases approximately 80% from ages 21 to 61. The pituitary gland can produce as much hgh in old age as in youth if properly stimulated. We now have a product called Pro GHR that will do the job. By increasing hgh levels back to where they were at age 25 you can reverse the effects of aging and actually look and feel 10 to 20 years younger. HGH affects almost every cell in the body to regenerate skin, hair, muscle, bones, heart, lungs, liver, and kidneys to their former youthful levels. The immune system is revitalized. Osteoporosis can be prevented, and heart attack and stroke risk factors are diminished. Aging can be stopped...or even reversed. Called cosmetic surgery in a bottle, HGH helps smooth facial wrinkles, and the hydration, elasticity, thickness and youthful contours of the skin are regained. The majority of reorders are from people that say that Pro GHR does wonders for their skin. HGH is a powerful aphrodisiac that increases libido, and sexuality/potency is restored in older persons. As a mood elevator, most people find a youthful sense of wellness and a zest for life restored through the use of HGH. Healthy sleep patterns return, providing the deepest levels of sleep for optimum well being. Order Now(Only $39.99, lowest price ever!) "The effects of six months of human growth hormone on lean body mass and adipose-tissue were equivalent in magnitude to the changes incurred during 10-20 years of aging." Daniel Rudman, M.D., New England Journal of Medicine February 28, 2002 Doctor's Agree... Pro GHR will change the way you look and feel! Hormone replacement therapy (Pro GHR) is the best and most effective anti-aging medical therapy of the moment. - Dr. Thierry Hertoghe In over 40 years of practicing orthomolecular medicine, I have never seen anything that approaches the positive results seen with Pro GHR. - Dr. Don E. Johnson - President of the American Anti- Aging Society What Customers Are saying about Pro GHR Benefits of Pro GHR Rejuvenate your body and mind Feel younger Look younger Lose weight Reduce wrinkles Restore your sex drive Revitalize your Heart, Liver,
TPM cost constraint [was: RE: Revenge of the WAVEoid]
Bill wrote: At 10:07 PM 06/26/2002 -0700, Lucky Green wrote: An EMBASSY-like CPU security co-processor would have seriously blown the part cost design constraint on the TPM by an order of magnitude or two. Compared to the cost of rewriting Windows to have a infrastructure that can support real security? Maybe, but I'm inclined to doubt it, especially since most of the functions that an off-CPU security co-processor can successfully perform are low enough performance that they could be done on a PCI or PCMCIA card, without requiring motherboard space. Upon re-reading the paragraph I wrote, I can see how the text might have been ambiguous. I was trying to express that there was a cost constraint on the part. Adding the cost of an EMBASSY or SEE environment to the purchase of every new PC is more than the market for bare-bones or even mid-range PC's will bear. --Lucky
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: MIME-Version: 1.0 Virus : W32/Klez.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 23:23:03 2002 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA18716 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:27:10 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA18702 for cypherpunks-outgoing; Sat, 6 Jul 2002 22:25:43 -0500 Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA18698 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:25:30 -0500 Received: from logs-wp.proxy.aol.com (logs-wp.proxy.aol.com [205.188.201.135]) by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706231923; Sat, 06 Jul 2002 23:19:23 -0400 Received: from Rzqjpbsx (AC8FAB57.ipt.aol.com [172.143.171.87]) by logs-wp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g6732Tt72199 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:02:29 -0400 (EDT) Date: Sat, 6 Jul 2002 23:02:29 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: sales [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=K1SGaBa4272i23Qf40c5T774L9T17q115696 X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.31, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please see http://www.google.com/search?q=antivirus or http://hotbot.lycos.com/?query=antivirus Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: MIME-Version: 1.0 Virus : W32/Klez.gen@MM Original headers: From: [EMAIL PROTECTED] Sat Jul 6 23:23:21 2002 Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g673N2E42047 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:23:02 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g673MxD06089 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:59 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g673Mvu06075 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:57 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g673MjE42033 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:45 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA18715 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:27:09 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id WAA18702 for cypherpunks-outgoing; Sat, 6 Jul 2002 22:25:43 -0500 Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA18698 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:25:30 -0500 Received: from logs-wp.proxy.aol.com (logs-wp.proxy.aol.com [205.188.201.135]) by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706231923; Sat, 06 Jul 2002 23:19:23 -0400 Received: from Rzqjpbsx (AC8FAB57.ipt.aol.com [172.143.171.87]) by logs-wp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g6732Tt72199 for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:02:29 -0400 (EDT) Date: Sat, 6 Jul 2002 23:02:29 -0400 (EDT) Message-Id: [EMAIL PROTECTED] From: sales [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=K1SGaBa4272i23Qf40c5T774L9T17q115696 X-Apparently-From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: MIME-Version: 1.0
The manipulator's guide to the female mind!
The Complete Guide for Attracting and Seducing WomenAttracting beautiful women is EASY - if you know how to do it."Now, here's your chance to learn the amazing secrets for attracting and seducing beautiful women. The techniques revealed in this guide are so easy to put into place - yet so effective - that you won't believe it.With our incredible guide, you're about to learn: How to get women to pick you up The best ways to approach a woman How to create instant rapport The secret to becoming more than just friends How to get women into bed The art of successful flirting How to develop charisma and mystique and much more! The skills you'll quickly master with our program will have you getting more women than you ever dreamed possible!Your age, your looks, your income, your past experiences...NONE OF THAT MATTERS!Our program has proven successful for guys from all walks of life.You'll discover simple, no b.s. strategies and techniques for attracting and seducing the women you desire - quickly and easily.Don't waste another minute - CLICK HERE TO ORDER NOW "This is the best material I've read on getting girls. I've tried a ton of different books and techniques over the past year or so but this is the only one that has really worked for me. I can't thank you enough..."John"Man, this is incredible! It turns out I've been doing a lot of things wrong with the ladies for a lot of years. Your program has set me straight and shown me the way. You should charge $500 for this information - it's that good!"Calvin"I have to say that your guide has really helped me get back into the dating scene. I'm 42 and recently divorced, and I've never had that much luck with women. But thanks to you I'm back in action and having more fun (and getting more dates) than I did when I was 22. Thanks A.S. (Advanced Seduction)!"Richard Copyright © 2002 Quiksilver Enterprises Rights Reserved.You are receiving this special offer because you have provided permission to receive email communications regarding special online promotions or offers. If you feel you have received this message in error, or wish to be removed from our subscriber list, Click HERE and you will be removed within less than three business days. Thank You and sorry for any inconvenience. 3630CpxM5-267OYl14
Do You Want to be a Millionaire?
To unsubscribe click here
partnership
From: Dr.Idris Kadiri E-mail:[EMAIL PROTECTED] Phone:234 1 7758451 Fax:234 1 759 6668 16 Kingsway Rd, Ikoyi, Lagos. REQUEST FOR ASSISTANCE - STRICTLY CONFIDENTIAL I am Dr.Idris Kadiri an Accountant in the Nigerian National Petroleum Corporation (NNPC) and I head a seven-man tenders committee in charge of Foreign/Expatriate Contract Awards Review and Payment Approvals (CRPAC). I came to know of your name and address in my search for a reliable and low-key person to handle a very confidential transaction based on unflinching trust as we have not met before.This transaction involves the transfer of huge sum of foreign exchange (the UnitedStates Dollars) to a foreign account. There were a series of contracts executed by a Consortium of Multinationals in the oil industry in favour of NNPC among which are: (1) The expansion and rehabilitation of the ageing pipeline network within Nigeria for crude oil and downstream products distribution and evacuation - US$9 Billion (2) Contracts for the Turn Around Maintenance (TAM) of the four epileptic refineries in the country (3) The construction of more storage tanks and maintenance and servicing of old ones for Petroleum Products Storage (Depots) - US$90 Million (4) The construction of Escravos Gas Poduction Offshore facility. The original value of these contracts was deliberately over-invoiced in the sum of USD Eighteen Million, Five Hundred Thousand ($18,500,000.00) by this committee (CRPAC) during the awards of the various contract. This sum ($18,500,000.00) has now been approved for payment by this committee (CRPAC) and is now ready to be transfered by the Central Bank of Nigeria to the account of any individual and or company which the CRPAC presents as the beneficiary, since the company that actually executed these contracts has been fully paid their fund and the projects have been officialy commissioned. Consequently, my colleagues and I are willing totransfer the total amount to your account for subsequent disbursement on our behalf, since we as civil servants and we are also serving in a sensitive foreign payment approval committee (CRPAC) are prohibited by the Code of Conduct Bureau (Civil Service Laws) from opening or operating foreign account and or dealing in foreign exchange in our names. Needless to say, the trust reposed on you at this juncture is enormous. In return, we have agreed to offer you 25% of the transferred sum, while 10% shall be set aside for incidental expenses(internal and external) accrued between the parties in the course of the transaction. The balance will be used to purchase agricultural equipment and medical drugs from your country for importation back to my country.You must however note that this transaction is subject to the following terms and conditions: a) Our conviction of your transparent honesty and diligence b) That you would treat this transaction with utmost secrecy and confidentiality c) That you have an unflincing trust in us, and our ability to complete all official processes with your co-operation. (d) That the funds would be transfered to an ordinary account which you have total control over. Modalities have been worked out (secretly) at the highest levels of the relevant government departments involved and the Central Bank of Nigeria forthe immediate transfer of funds within 14 working days subject to your satisfaction of the above stated terms. Our assurance is that your role is risk-free. To accord this transaction the legality it deserves and for mutual security of the fund, the whole approval procedures will be officially and legally processed with your name or the name of any company you may nominate as the bonafide beneficiary, as in an ideal situation. It is imperative that you bear in mind that having put in 19 years in the service of the government, I am averse to having my image and career dented.This matter should therefore be treated with utmost secrecy and urgency. Kindly expedite action by contacting me on my e-mail address, indicating your interest in this transaction. For swift response to your reply, kindly indicate your fax and telephone numbers clearly so that I can explain further, especially by fax. I am urgently waiting your reply as payment to foreign contractors is usually made on quarterly basis. Yours faithfully, Dr.Idris Kadiri.
== (( cypherpunks Try G4m $1,000,000/ Yr, Millionaire Cash System, Change Your Life !!! )) ==
Hello! = G4m Program: Can You Get Paid $1,000,000 in 1 yr? = I have something of great value that I want to share with you! But before I do, permit me to tell you a little about me. I manage a computer company that makes and sells laptops and pda's in New York. I have a few other businesses that make me money. But the problem is that I have no time to enjoy the money that I make. Why? Because I have to attend endless corporate meetings, spend 10 hrs in an office 6 days, answering e-mails, talking to customers on the phone, responding to fax, supervising our staff, attending to the media, and occasionally traveling! Sometimes I have both my regular phone and cellphone ringing all at the same time! Sometimes, I may have two or more customers on the phone at the same time! I work so hard, and by the end of the day, I am so tired. All I want to do is watch TV for about 1 hr, take a shower and go to bed. It is boring! I have no time for my family. All my friends are unhappy because I have no time for them. I have no social life! I make money, and yet I am not happy! I thought with all the modern technological advancement in computer, pda's, fax, internet, cellphone, and networks, that one doesn't have to work so hard like 10 hrs a day to earn a decent salary. But the opposite is the case! What is the point in working so hard to make a lot of money, but not having the time to enjoy it with your family and friends? I don't know about you, but this is Not what I want! So, I was overcome with joy when a friend of mine from California, Mario, told me about a little known internet program, (G4m) that he stumbled upon. I never liked programs, especially these days, when it is no longer easy to promote anything on the internet. My friend, Mario sent me many e-mails which I ignored. Then one day, while I was searching for information on the internet, I stumbled unto this G4m program myself. I decided to pass time and read a little about it. Holly mackerel, donky duck! What I discovered stunned me! The creator of this program is a self-made multi-millionaire with initials JG, from Canada. I found out that it is a fully automated program run by computers and he is raking in on the average, $2.4 million dollars every year! And the best part is he didn't have to be stuck in the office 10 hrs, answering phones, responding to e-mails, fax and attending endless meetings like me! G4m is totally programmed to be run by computers, and there is no hard work to do! I was impressed. I was captivated! I decided to put it to test by signing up immediately! After signing up, I followed the simple guideline recommended by JG. Yes, just like the program said, in exactly 1 month, my checks began to come in! The first check was for $200. I could not believe my eyes! Until then, I never knew that such a program is possible! I never knew it is possible to just sign up in a program, and without any hard work or large investment, start making money! I was so grateful to my friend, Mario, that I promised him that I will try and help at least 1000 people! That is why you're receiving this e-mail from me! If you're in a similar situation like I was 2 months ago, cheer up because I may be able to help you! G4m is the Only Money-Making Program that pays You Commissions for 1 yr!!! It is easy, It is fun, & it Pays! Just sign up, and you'll get a powerful ebook, IMSS, and 325 easy internet biz that have proven to make thousands of dollars on the net!!! Plus, you get paid these commissions: Level-1 ---> $200 Level-2 ---> $1,000 Level-3 ---> $5,000 Level-4 ---> $50,000 Level-5 ---> $1,000,000 There is: ==> No Rambling Conference calls to listen to! ==> No boring meetings to attend! ==> No large investment! ==> No hard work! It is automated!!! Since two months ago, when my checks began to come in, I stopped working at my job 10 hrs daily! I now have the time to be with my family and friends and enjoy my money and my life! No more stress! No more high blood pressure! I am happy. I have started smiling! And noticing and enjoying all the beautiful things in this life that I had been missing! Life is now sweet like honey! I now have the time to help other people! I can help you if you permit me. Your life can change like mine! You don't have to be stuck in your office 10 hrs daily anymore! G4m can become an automated second source of income for you, so you may have free time to be with your family and friends and enjoy life. There is no obligation. Just respond and get the Free details right now. ## (1) Send blank E-mail to: [EMAIL PROTECTED] And put these words in the subject space: "Send details, G4M, Code Greg" In about 1HR, you'll get our fast reply on how to sign
Tremendous Opportunity and FREE Software
Hi, I joined a program at the end of last month. I didnt think much about it but it promised to generate for me a PAID down line. I thought, Yeah right, but since it was FREE to join, I signed up. Well, after about 12 hours my sponsor (Jim Ludes) e-mailed me and told me to take a look at my web page because I had PAID members in my down line. I logged on and saw that I already had a down line of 40 people! This was on the last day of the month and before the evening was through I had a total of 50 people under me! My sponsor also informed me that if I had signed up at the beginning of the month, I would have had approx. 1800 people in my down line! As you can imagine, I was very skeptical. After all, how could I have this many PAID Members under me so fast in a program I had never promoted? I took the time to check out the site...then wrote to Jim asking for confirmation that these were paid members and not just free sign-ups...like me :-) Well, it was true...I had 50 paid members in my down line. This in a program that I had never worked! All I had to do was upgrade to a paid membership before the end of the month and I would have my position locked in and a down line of 50 people. You can bet I wasted no time in getting my membership upgraded! I can tell you, if I had known what was happening with this program, I would have become an active paid member months ago! With this program, you will get a HUGE down line of PAID MEMBERS. My sponsor's check, which is a minimum of $500, arrives every month...on time and hes only been with this program for 3 months! His sponsor is making a minimum of $1500 per month. How would you like to lock your position in FREE while you check out this opportunity and watch your down line grow? This is NOT a get-rich-quick scheme. It is a unique program that really works. The figures that I gave you above are ACTUAL numbers. This is not a Pre-Fabricated Letter but ACTUAL figures. I will give you the e-mail address of my sponsor if you wish to verify what I have said. To grab a FREE ID#, simply reply to: [EMAIL PROTECTED] and write this phrase in the text page: Email me details about the club's business and consumer opportunities Be sure to include your: 1. First name 2. Last name 3. Email address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your Free Member Number. If you act now, I will also give you access to some FREE software, which will help you in any business endeavor you may be in. I'll get you entered and let you know how you can keep track of your growing down line. That's all there's to it. I'll then send you info, and you can make up your own mind. Warm regards, Shane Williams P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This company is different--it offers value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on thhe Internet. Don't pass this up. You can sign up and test-drive the program for FREE. All you need to do is get your free membership. This email is sent in compliance with strict anti-abuse and NO SPAM regulations. The message was sent to you as a response to your ad, an opt-in opportunity, your address was collected as a result of you posting to one of my links, reviewing your web site, you answering one of my classified ads, you have sent me an E-mail, or you unknowingly had your e-mail added to an opt-in mailing list. You may remove your E-mail address at no cost to you whatsoever, simply click on Reply button and put Remove Me in the subject Line = ___ GO.com Mail Get Your Free, Private E-mail at http://mail.go.com
First, get it built into all CPU chips...only _then_ make it mandatory.
My fellow Cypherpunks, Tim May writes: Then, perhaps after some major war or terror incident or other trigger, major OSes will require the TCPA/DRM features to be running at all times. Sure, maybe some little Perl or Java program Joe Sixpack writes won't need it, but anything not on the margins will require it. This then brings up the question of Open Source operating systems like the (GNU) Linux distributions and the BSD operating systems. Is the TCPA/DRM feature code to be published or censored out? For the source code, will the censored code be a binary file? This could be a mess. I believe that there was a discussion of US mandated Malice code in Open Source operating systems on the Cypherpunks list recently, but I couldn't find it with a Google search. Anybody got a Cypherpunk Hyperarchive link? If the above happens, it would keep the coding anarchists busy for years :-) Recompiling your operating system with an outlaw file included would be an anarchic and patriotic act. It could also knock down Microsoft market share. I suspect the the US solution would be hardware. All new hardware would be maliced and old hardware would become obsolete. Yours Truly, Gary Jeffers Beat State!!!
Re: We have always been at war with Oceania
The Indianapolis Star newspaper ran the NYTimes version of this story with the headline Drug Peddling Pilots May Get Wings Clipped. I was assuming it would be about revoking their pilots' licenses or confiscating their airplanes, but no, it was about shooting them down and machine-gunning any fleeing passengers, like they did to the Baptist missionary and her baby last year. Under Fujimori's dictatorship in Peru, they claim to have shot down about 25 planes, and some politician made a highly-pleased-with-himself statement about how it's really discouraged traffickers. There may be True Believers on the pro-terrorist side, but cocainistas are in it for money, not ideology - they're happy to blow up the occasional judge, but they're smart enough not to try going toe-to-toe with the US military in a shooting war. At 09:39 AM 07/04/2002 -0700, Major Variola (ret) wrote: http://story.news.yahoo.com/news?tmpl=storycid=536ncid=703e=1u=/ap/20020704/ap_on_go_pr_wh/bush_drug_flights_1 President Bush ( news - web sites) is expected to allow resumption of a program to force down or shoot down airplanes suspected of carrying drugs in Latin America, a senior administration official said Thursday. Does Mr. Bush understand tit-for-tat? Hasn't he figured out that he can bust all the petty hawalas he wants, but the Cartels have *cash* to spend, an excellent distribution network, and a few submarines? Looking for True Believers speaking spanish... Maybe the Saudis will start taking planes out for carrying ethanol...
Re: Jonathan Zittrain on data retention, an awful idea
Sigh. Back when the US Feds were still trying to push Key Escrow on the National Information Infrastructure, I started research for an April 1 RFC for the National Information Infrastructure Data Entry Escrow Protocol, NIIDEEP, and proposed NIIDEEP Information Network Protocol Implementation Government Standard, NIIDEEPINPIGS. (Didn't get it finished by April 1 :-) Because after all, there's no sense escrowing our crypto keys if you don't also escrow the cyphertext - some of Eric Hughes's talks on Message Escrow and Data Retention Policies were excellent explanations of why those was the critical issues. If the US Feds and Eurocrats would like us to provide them with all of our data, the existing internet would need to double in size to transport all of it to the appropriate government data storage facilities, or more than double if separate copies need to be provided to multiple national governments, or much more if local governments such as city trade commissions need copies. Since this is clearly unrealistic, even with the demise of the E-Bone, transmission will require the use of off-line data transmission technology. Waiting for approval of new government standards would take too long, and lose access to valuable data because of the resulting delay of several years, but there are several existing standards for data storage that can be applies. My long-lost research had the FIPS (US Federal Information Processing Standards) references for several of them, but the current environment requires the corresponding European standards as well, and I'll need assistance. But there's also been progress! RFC 1149 (Avian Carriers) has been implemented, though scalable implementation and dual-source requirements may require genetic reconstruction of the Passenger Pigeon to supplement current carrier species. Modular methods uses standard data storage formats and separate transmission. Standards widely supported in the US include Hollerith cards, 1600 bpi 9-track tapes with EBCDIC character sets and fixed block sizes and LRECLs, and ASCII-format punch tape (with country-specific standards for recycled paper content.) 8-inch floppy disks have also been widely used, and support both CP/M and RT11 file system formats. Are there corresponding European standards for data storage? Transmission methods for data storage media include International Postal Union standards for link layer and addressing formats and pricing, though I'm not directly familiar with standards for shipping containers where data encapsulation is required. Thanks; Bill Stewart, [EMAIL PROTECTED] From: Jon Zittrain [EMAIL PROTECTED] Subject: Re: FC: Data retention scheme marches forward in European Parliament I've written something opposing this at http://www.forbes.com/forbes/2002/0708/062.html. Consider the range of proposals for unobtrusive but sweeping Internet monitoring. Most of them are doable as a technical matter, and all of them would be unnoticeable to us as we surf. Forbes columnist Peter Huber's idea is perhaps the most distilled version. Call it the return of the lock box. He asks for massive government data vaults, routinely receiving copies of all Internet traffic--e-mails, Web pages, chats, mouse clicks, shopping, pirated music--for later retrieval should the government decide it needs more information to solve a heinous crime. (See the Nov. 12 column at forbes.com/huber.) The idea might sound innocuous because the data collected would remain unseen by prying eyes until a later search, commenced only after legal process, is thought to require it. Make no mistake, however: The idealized digital lock box and many sibling proposals are fundamentally terrible ideas. Why? Jonathan Zittrain, Harvard law professor; codirector, Berkman Center for Internet Society.
RE: Revenge of the WAVEoids: Palladium Clues May Lie In AMD Motherboard Design
At 10:07 PM 06/26/2002 -0700, Lucky Green wrote: An EMBASSY-like CPU security co-processor would have seriously blown the part cost design constraint on the TPM by an order of magnitude or two. Compared to the cost of rewriting Windows to have a infrastructure that can support real security? Maybe, but I'm inclined to doubt it, especially since most of the functions that an off-CPU security co-processor can successfully perform are low enough performance that they could be done on a PCI or PCMCIA card, without requiring motherboard space. I suppose the interesting exception might be playing video, depending on how you separate functions. (Obviously the extent of redesign is likely to be much smaller in the NT-derived Windows versions than the legacy Windows3.1 derivatives that MS keeps foisting upon consumers. Perhaps XP Amateur is close enough to a real operating system for the kernel to be fixable?) I am not asserting that security solutions that require special-purpose CPU functionality are not in the queue, they very much are, but not in the first phase. This level of functionality has been deferred to a second phase in which security processing functionality can be moved into the core CPU, since a second CPU-like part is unjustifiable from a cost perspective.
Cracking Dead People's Passwords
One of the usual arguments for key escrow was always what if your employee dies and you can't get his data? Secret Sharing techniques are of course a better approach, or at least storing sealed envelopes in company safes as a much better approach than pre-broken crypto. There've been a couple of stories in the press recently where weak passwords also solved the problem. One was a radio piece, I think NPR, about one of the companies in the World Trade Center who'd lost their computer administrators in the 9/11 attacks. The remaining employees got together and started telling stories about their co-workers - their interests, their family members, where they'd gone on vacation, their dogs' names, etc. They got most of the passwords. (It was a piece about modern management styles, and how in older hierarchical companies there'd be fewer people who knew the new employees well enough to do that.) The other was about the loss of the database of the personal library collection of one of the main linguists studying one of the two main Norwegian dialects. It's now been cracked... RISKS-FORUM Digest 22.13 http://catless.ncl.ac.uk/Risks/22.13.html Date: Tue, 11 Jun 2002 11:37:02 -0400 From: Lillie Coney [EMAIL PROTECTED] Subject: Norwegian history database password lost and retrieved After the password for accessing a Norwegian history museum's database catalog for 11,000 books and manuscripts had been lost when the database's steward died, the museum established a competition to recover it. Joachim Eriksson, a Swedish game company programmer, won the race to discover the password (ladepujd, the reverse of the name of the researcher who had created the database). How he arrived at it was not disclosed. [Source: Long-lost password discovered: Norwegian history database cracked with help from the Web, By Robert Lemos, MSNBC, 11 Jun 2002; PGN-ed] Lillie Coney, Public Policy Coordinator, U.S. Association for Computing Machinery Suite 510 2120 L Street, NW Washington, D.C. 20037 1-202-478-6124
Re: Ross's TCPA paper
At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote: Well, first I want to say that I don't like the way it is today. I want things to get better. I can't read e-books on my pocket computer, for example, which is sad since I actually would be able to enjoy e-books if I only could load them onto my small computer that follows my everywhere. You may not be able to read an Adobe\(tm Brand E-Book\(tm, but that just means you'll need to buy electronic books from publishers that don't use that data format - whether it's raw ascii text or Palm-formatted text or PalmOS DRMware that you can also view on your PC using an emulator in glorious 160x160-pixel format :-) Of course, if your PC's home country of Nauru has Software Police implementing some local equivalent of the DMCA, that emulator that you need for debugging may be illegal. ... How good is Winamp if it can't play any music recorded in 2004 or later? Given that Windows Media Player can play all your tunes and it takes a reboot to switch to Winamp, who wouldn't stick with WMP?
Re: Closed source more secure than open source
- Original Message - From: Anonymous [EMAIL PROTECTED] Ross Anderson's paper at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf has been mostly discussed for what it says about the TCPA. But the first part of the paper is equally interesting. Ross Andseron's approximate statements: Closed Source: the system's failure rate has just dropped by a factor of L, just as we would expect. Open Source: bugs remain equally easy to find. Anonymous's Statements: For most programs, source code will be of no benefit to external testers, because they don't know how to program. Therefore the rate at which (external) testers find bugs does not vary by a factor of L between the open and closed source methodologies, as assumed in the model. In fact the rates will be approximately equal. The result is that once a product has gone into beta testing and then into field installations, the rate of finding bugs by authorized testers will be low, decreased by a factor of L, regardless of open or closed source. I disagree, actually I agree and disagree with both, due in part to the magnitudes involved. It is certainly true that once Beta testing (or some semblance of it) begins there will be users that cannot make use of source code, but what Anonymous fails to realize is that there will be beta testers that can make use of the source code. Additionally there are certain tendencies in the open and closed source communities that Anonymous and Anderson have not addressed in their models. The most important tendencies are that in closed source beta testing is generally handed off to a separate division and the original author does little if any testing, and in open source the authors have a much stronger connection with the testing, with the authors' duty extending through the entire testing cycle. These tendencies lead to two very different positions than generally realized. First, closed source testing, beginning in the late Alpha testing stage, is generally done without any assistance from source code, by _anyone_, this significantly hampers the testing. This has led to observed situations where QA engineers sign off on products that don't even function, let alone have close to 0 bugs. With the software engineers believing that because the code was signed off, it must be bug-free. This is a rather substantial problem. To address this problem one must actually correct the number of testers for the ones that are effectively doing nothing. So while L is the extra difficulty in finding bugs without source code, it is magnified by something approximating (testers)/(testers not doing anything). It's worth noting that (testers) (testers not doing anything) causing the result K = L*(testers)/(testers not doing anything), to tend towards infinite values. In open source we have very much the opposite situation. The authors are involved in all stages of testing, giving another value. This value is used to adjust L as before, but the quantities involved are substantially different. It must be observed, as was done by Anonymous, that there are testers that have no concept what source code is, and certainly no idea how to read it, call these harassers. In addition though there are also testers who read source code, and even the authors themselves are doing testing, call these coders. So in this case K = L*(harassers)/(harassers+coders). Where it's worth noting that K will now tend towards 0. It is also very much the case that different projects have different quantities of testers. In fact as the number of beta testers grows, the MTBD(iscovery) of a bug must not increase, and will almost certainly decrease. In this case each project must be treated separately, since obviously WindowsXP will have more people testing it (thanks to bug reporting features) than QFighter3 (http://sourceforge.net/projects/qfighter3/ the lest active development on sourceforge). This certainly leads to problems in comparison. It is also worth noting that it is likely that actual difficulty in locating bugs is probably related to the maximum of (K/testers) and the (testers root of K). Meaning that WindowsXP is likely to have a higher ratio of bugs uncovered in a given time period T than QFighter3. However due to the complexity of the comparisons, QFighter3 is likely to have fewer bugs than WindowsXP, simply because WindowsXP is several orders of magnitude more complex. So while the belief that source code makes bug hunting easier on everyone, is certainly not purely the case (Anonymous's observation), it is also not the case that the tasks are equivalent (Anonymous's claim), with the multiplier in closed source approaching infinite, and open source towards 0. Additionally the quantity of testers appears to have more of an impact on bug-finding than the discussion of open or closed source. However as always complexity plays an enormous role in the number of bugs available to find, anybody with a few days programming experience
TPM cost constraint [was: RE: Revenge of the WAVEoid]
Bill wrote: At 10:07 PM 06/26/2002 -0700, Lucky Green wrote: An EMBASSY-like CPU security co-processor would have seriously blown the part cost design constraint on the TPM by an order of magnitude or two. Compared to the cost of rewriting Windows to have a infrastructure that can support real security? Maybe, but I'm inclined to doubt it, especially since most of the functions that an off-CPU security co-processor can successfully perform are low enough performance that they could be done on a PCI or PCMCIA card, without requiring motherboard space. Upon re-reading the paragraph I wrote, I can see how the text might have been ambiguous. I was trying to express that there was a cost constraint on the part. Adding the cost of an EMBASSY or SEE environment to the purchase of every new PC is more than the market for bare-bones or even mid-range PC's will bear. --Lucky