Virus discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling  words
Virus  : W32/Yaha.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 12:31:28 2002
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id LAA07863
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:35:39 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id LAA07831
   for cypherpunks-outgoing; Sat, 6 Jul 2002 11:34:14 -0500
Received: from rly-ip02.mx.aol.com (rly-ip02.mx.aol.com [152.163.225.160])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id LAA07827
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:34:06 -0500
Received: from  logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by 
rly-ip02.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706122826; Sat, 06 Jul 2002 
12:28:26 -0400
Received: from EINSTEIN.ssz.com (AC9BC1DA.ipt.aol.com [172.155.193.218])
   by logs-tp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66GJem62648
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:19:40 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: Mail Delivery System[EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling  words
Date: Sat,06 Jul 2002 12:17:46 PM
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
MIME-Version: 1.0
Content-Type: multipart/mixed;
   boundary=vedsvee
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish




Undelivered Mail Returned to Sender -mark,s spelling words

2002-07-06 Thread Mail Delivery System
Content-Transfer-Encoding: quoted-printable



This message was created automatically by mail delivery software (Exim).A message that you sent could not be delivered to one or more of its recipients.This is a permanent error. The following address(es) failed:[EMAIL PROTECTED]For further assistance, please contact < [EMAIL PROTECTED] >If you do so, please include this problem report. You candelete your own text from the message returned below.Copy of your message, including all the headers is attached
---BeginMessage---


mark,s
Description: MIDI audio
---End Message---


Virus discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: Undelivered Mail Returned to Sender -mark,s spelling  words
Virus  : W32/Yaha.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 12:31:35 2002
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66GVRE08390
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:27 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g66GVQU24610
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:26 -0400
Received: from locust.minder.net (locust.minder.net [66.92.53.74])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g66GVOu24596
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:24 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66GVKE08364
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:31:20 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id LAA07862
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:35:38 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id LAA07831
   for cypherpunks-outgoing; Sat, 6 Jul 2002 11:34:14 -0500
Received: from rly-ip02.mx.aol.com (rly-ip02.mx.aol.com [152.163.225.160])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id LAA07827
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 11:34:06 -0500
Received: from  logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by 
rly-ip02.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706122826; Sat, 06 Jul 2002 
12:28:26 -0400
Received: from EINSTEIN.ssz.com (AC9BC1DA.ipt.aol.com [172.155.193.218])
   by logs-tp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66GJem62648
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 12:19:40 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: Mail Delivery System[EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: Undelivered Mail Returned to Sender -mark,s spelling  words
Date: Sat,06 Jul 2002 12:17:46 PM
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
MIME-Version: 1.0
Content-Type: multipart/mixed;
   boundary=vedsvee
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: Undelivered Mail Returned to Sender -mark,s spelling  words




Undelivered Mail Returned to Sender -mark,s spelling words

2002-07-06 Thread Mail Delivery System
Content-Transfer-Encoding: quoted-printable



This message was created automatically by mail delivery software (Exim).A message that you sent could not be delivered to one or more of its recipients.This is a permanent error. The following address(es) failed:[EMAIL PROTECTED]For further assistance, please contact < [EMAIL PROTECTED] >If you do so, please include this problem report. You candelete your own text from the message returned below.Copy of your message, including all the headers is attached
---BeginMessage---


mark,s
Description: MIDI audio
---End Message---


Executable discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: A  humour game
Virus  : W32/Klez.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 17:09:17 2002
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66L96E22539
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:06 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g66L93j11226
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:04 -0400
Received: from locust.minder.net (locust.minder.net [66.92.53.74])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g66L91u11199
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:09:01 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g66L8lE22520
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 17:08:48 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id QAA13496
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:13:07 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id QAA13458
   for cypherpunks-outgoing; Sat, 6 Jul 2002 16:11:23 -0500
Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA13449
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:10:41 -0500
Received: from  logs-mtc-tf.proxy.aol.com (logs-mtc-tf.proxy.aol.com [64.12.103.5]) 
by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN1-0706170513; Sat, 06 Jul 2002 
17:05:13 -0400
Received: from Hsjrpijwn (ACA7E679.ipt.aol.com [172.167.230.121])
   by logs-mtc-tf.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66KSXw34458
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:28:33 -0400 (EDT)
Date: Sat, 6 Jul 2002 16:28:33 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: ksmoot [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: A  humour game
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=E691QW1fyY30c3v4HfkL508
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: A  humour game

We received a message claiming to be from you which contained an
executable attachment (batch file, script, program, etc).  In
order to protect users from malicious programs, we do not accept
these file types thru this mail server.  If you need to send the
file to it's intended recipient, you must send it in an archived
and/or compressed format.

Your email has been sent to the intended recipient without this
file included.  A message detailing why it was dropped has been
substitued in it's place.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: A  humour game
Mime type  : application/octet-stream
File name  : kitty.exe




Executable discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: CDR: A  humour game
Virus  : W32/Klez.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 17:09:26 2002
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id QAA13497
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:13:08 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id QAA13458
   for cypherpunks-outgoing; Sat, 6 Jul 2002 16:11:23 -0500
Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id QAA13449
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:10:41 -0500
Received: from  logs-mtc-tf.proxy.aol.com (logs-mtc-tf.proxy.aol.com [64.12.103.5]) 
by rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN1-0706170513; Sat, 06 Jul 2002 
17:05:13 -0400
Received: from Hsjrpijwn (ACA7E679.ipt.aol.com [172.167.230.121])
   by logs-mtc-tf.proxy.aol.com (8.10.0/8.10.0) with SMTP id g66KSXw34458
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 16:28:33 -0400 (EDT)
Date: Sat, 6 Jul 2002 16:28:33 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: ksmoot [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: CDR: A  humour game
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=E691QW1fyY30c3v4HfkL508
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish

We received a message claiming to be from you which contained an
executable attachment (batch file, script, program, etc).  In
order to protect users from malicious programs, we do not accept
these file types thru this mail server.  If you need to send the
file to it's intended recipient, you must send it in an archived
and/or compressed format.

Your email has been sent to the intended recipient without this
file included.  A message detailing why it was dropped has been
substitued in it's place.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: CDR: A  humour game
Mime type  : application/octet-stream
File name  : kitty.exe




R e : W h a t y o u w a n t e d ! BQEXBAH

2002-07-06 Thread raine79
,***@***   %%%   bravo   %%%   ***@***
.Have you been receiving your child support?
Imagine how wonderful it would feel to help a large number of children in your area and making $4,000 to $12,000 per month doing it?

``-Helping needy children and parents AND at the same time supporting your own family very well financially.

Every day in your community there are single parents struggling to make ends meet and wondering where the money will come from to cover their children's basic expenses.

Most of these parents are hard working people who just need help from the person who has a legal responsibility to give it to them.

Every day a large number of parents call us for help in collecting their child support. Many more than we can possibly handle. We need the help of caring and dedicated people who would like to enter a new high paying prestigious profession.

Please join our CRUSADE to correct this terrible injustice!

The court has decided how much these parents are to receive but the caseloads are so large that the results are that there is over $32 Billion dollars worth of uncollected Child Support in the US today and this amount grows by millions every week.

If you would be interested in helping us, then we have all of the training that you will need to start a new business in this high growth profession of "Child Support Processing!"

We have the resources available to you to help you track down deadbeat parents and force them to pay what they legally owe, without ever having to come into contact with them!

We have the most extensive Computer Data Bases in the world for the processing of Child Support. Our databases allow you to track down dead beats, find their assets and then collect the child support, which is due. These powerful databases will be available to you if you choose to join us.

You can do what private investigators do, legally, and for a fraction of what it would normally cost! And you can do it from the comfort of your own home office!

One mother has told us that working with the government to find an absent parent "is like beating your head against a brick wall. The frustration and futility you feel are enormous. Agencies crawl at a snails pace, and authorities often lose files or seem to make no progress with a case." But this same mother's outlook changed after reviewing our course: "I would have given anything to have this knowledge years ago. This is the best $249.00 I have ever spent."

We have Customer -Support staff available to you from
7:00AM to 9:00PM(Central Standard Time) 7 days a week.
If you call this number, you can talk to one of our very experienced
Customer Support personnel. They can answer any questions you may have-with no obligation.

Please call us at
1-2
8 1--5 0 0--4018







++
If you wish to be "eliminated" -from our - l-i- s-t,
ple ase email [EMAIL PROTECTED]

:::+:::+:::+:::TO48 7-06 C6 P:::+:::+:::+:::



















































































H . E . L . P

*
S . H . A . R . E

*

E . A . R . N










{%RAND%}

s
s
p
l
t
m6---

Fujiko

p3-40/bjss community





Come and see my ADULT videos bjxye

2002-07-06 Thread frrcAutumn
Title: Cam Lesbos

 

 

Hi
My name is Autumn. I have just posted
my new ADULT videos to my website.
Please come and take a look.
Click Here to see
to see me naked.



If the link above doesn't work for you copy and paste this URL into your Web Browsers address bar
http://www.allyoucanwant.com/affiliates/sweet/ WARNING ADULT MATERIAL

 

 

 

 
Note: this is not a spam email. This email was
sent to you because your email was 
entered in on a website requesting to be a registered subscriber.
If you would would like to be removed from our list, CLICK
HERE 
TO CANCEL YOUR ACCOUNT and you won't receive another email from us!
 

 



gixyytlkbgyyscgpfhvwlp



nokia cell users 311510765433322

2002-07-06 Thread cell_phone_fun311510




 
   
   Take yourself out of our list BY CLICKING HERE
  

 
   
BORED 
  WITH 
  YOUR CELL PHONE?
  

 
   
 
  
  
 
   
 
  
  
   
  Get 
  cool Songs  Logos to your Phone today!
  
  
   
  

  
   
  
  

 
   
It's 
  real simple! No confusing downloads 
  or installations.Simple phone activation!
  

 
  

 
   
 
Click Here to order 
 
  

 
   
There 
  are tons of songs and graphics to choose from.
  See a sample of some of the songs to choose from below:
  

 
   

   


  
   
SONG
ARTIST
  
   
Get 
  Ur Freak On
Missy 
  Elliott
  
   
Billie 
  Jean
Michael 
  Jackson
  
   
Batman
Danny 
  Elfman
  
   
Walk 
  Like an Egyptian
Bangles
  
   
Flinstones
Barbera
  
   
4 
  Page Letter
Aaliyah
  
   
Like 
  a Virgin
Madonna
  
   
What's 
  It Gonna Be?
B.Rhymes/J.Jackson
  
   
Achy 
  Breaky Heart
Billy 
  Ray Cyrus
  
   
Star 
  Spangled Banner
John 
  Smith
  

  

 
  

 
   
When 
  you are ready to order, just
  

 
   
 
  click here!
  

 
   
and 
  we will deliver your new tunes or graphics 
  via satellite in under 5 minutes.
  


 
   
   Take yourself out of our list BY CLICKING HERE
  

  

311510765433322



RE: Revenge of the WAVEoids: Palladium Clues May Lie In AMD Motherboard Design

2002-07-06 Thread Bill Stewart

At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
An EMBASSY-like CPU security co-processor would have seriously blown the
part cost design constraint on the TPM by an order of magnitude or two.

Compared to the cost of rewriting Windows to have a infrastructure
that can support real security?  Maybe, but I'm inclined to doubt it,
especially since most of the functions that an off-CPU security
co-processor can successfully perform are low enough performance that
they could be done on a PCI or PCMCIA card, without requiring motherboard 
space.
I suppose the interesting exception might be playing video,
depending on how you separate functions.

(Obviously the extent of redesign is likely to be much smaller in the
NT-derived Windows versions than the legacy Windows3.1 derivatives that
MS keeps foisting upon consumers.  Perhaps XP Amateur is close enough to
a real operating system for the kernel to be fixable?)

I am not asserting that security solutions that require special-purpose
CPU functionality are not in the queue, they very much are, but not in
the first phase. This level of functionality has been deferred to a
second phase in which security processing functionality can be moved
into the core CPU, since a second CPU-like part is unjustifiable from a
cost perspective.




Re: Ross's TCPA paper

2002-07-06 Thread Bill Stewart

At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote:
Well, first I want to say that I don't like the way it is today.
I want things to get better. I can't read e-books on my pocket computer,
for example, which is sad since I actually would be able to enjoy e-books
if I only could load them onto my small computer that follows my everywhere.

You may not be able to read an Adobe\(tm Brand E-Book\(tm,
but that just means you'll need to buy electronic books from
publishers that don't use that data format - whether it's
raw ascii text or Palm-formatted text or PalmOS DRMware that
you can also view on your PC using an emulator in glorious 160x160-pixel 
format :-)
Of course, if your PC's home country of Nauru has Software Police
implementing some local equivalent of the DMCA, that emulator
that you need for debugging may be illegal.

...
How good is Winamp if it can't play any music recorded in 2004 or later?
Given that Windows Media Player can play all your tunes and it takes a
reboot to switch to Winamp, who wouldn't stick with WMP?




Re: Jonathan Zittrain on data retention, an awful idea

2002-07-06 Thread Bill Stewart

Sigh.  Back when the US Feds were still trying to push Key Escrow on the
National Information Infrastructure, I started research for an April 1 RFC
for the National Information Infrastructure Data Entry Escrow Protocol, 
NIIDEEP,
and proposed NIIDEEP Information Network Protocol Implementation Government
Standard, NIIDEEPINPIGS.  (Didn't get it finished by April 1 :-)

Because after all, there's no sense escrowing our crypto keys if you
don't also escrow the cyphertext - some of Eric Hughes's talks on
Message Escrow and Data Retention Policies were excellent explanations
of why those was the critical issues.

If the US Feds and Eurocrats would like us to provide them with all of our 
data,
the existing internet would need to double in size to transport all of it
to the appropriate government data storage facilities, or more than double
if separate copies need to be provided to multiple national governments,
or much more if local governments such as city trade commissions need copies.
Since this is clearly unrealistic, even with the demise of the E-Bone,
transmission will require the use of off-line data transmission technology.
Waiting for approval of new government standards would take too long, and
lose access to valuable data because of the resulting delay of several years,
but there are several existing standards for data storage that can be applies.

My long-lost research had the FIPS (US Federal Information Processing 
Standards)
references for several of them, but the current environment requires
the corresponding European standards as well, and I'll need assistance.
But there's also been progress!  RFC 1149 (Avian Carriers) has been 
implemented,
though scalable implementation and dual-source requirements may require
genetic reconstruction of the Passenger Pigeon to supplement current 
carrier species.
Modular methods uses standard data storage formats and separate transmission.
Standards widely supported in the US include Hollerith cards,
1600 bpi 9-track tapes with EBCDIC character sets and fixed block sizes and 
LRECLs,
and ASCII-format punch tape (with country-specific standards for recycled 
paper content.)
8-inch floppy disks have also been widely used, and support both
CP/M and RT11 file system formats.
Are there corresponding European standards for data storage?
Transmission methods for data storage media include International
Postal Union standards for link layer and addressing formats and pricing,
though I'm not directly familiar with standards for shipping containers
where data encapsulation is required.

 Thanks;  Bill Stewart, [EMAIL PROTECTED]


From: Jon Zittrain [EMAIL PROTECTED]
Subject: Re: FC: Data retention scheme marches forward in European 
Parliament

I've written something opposing this at 
http://www.forbes.com/forbes/2002/0708/062.html.

Consider the range of proposals for unobtrusive but sweeping Internet 
monitoring. Most of them are doable as a technical matter, and all of them 
would be unnoticeable to us as we surf. Forbes columnist Peter Huber's 
idea is perhaps the most distilled version. Call it the return of the lock 
box. He asks for massive government data vaults, routinely receiving 
copies of all Internet traffic--e-mails, Web pages, chats, mouse clicks, 
shopping, pirated music--for later retrieval should the government decide 
it needs more information to solve a heinous crime. (See the Nov. 12 
column at forbes.com/huber.)

The idea might sound innocuous because the data collected would remain 
unseen by prying eyes until a later search, commenced only after legal 
process, is thought to require it. Make no mistake, however: The idealized 
digital lock box and many sibling proposals are fundamentally terrible 
ideas. Why?


Jonathan Zittrain, Harvard law professor; codirector, Berkman Center for 
Internet  Society.




Cracking Dead People's Passwords

2002-07-06 Thread Bill Stewart

One of the usual arguments for key escrow was always
what if your employee dies and you can't get his data?
Secret Sharing techniques are of course a better approach,
or at least storing sealed envelopes in company safes
as a much better approach than pre-broken crypto.
There've been a couple of stories in the press recently
where weak passwords also solved the problem.

One was a radio piece, I think NPR, about one of the companies
in the World Trade Center who'd lost their computer administrators
in the 9/11 attacks.  The remaining employees got together and
started telling stories about their co-workers - their interests,
their family members, where they'd gone on vacation, their dogs' names, etc.
They got most of the passwords.  (It was a piece about modern management
styles, and how in older hierarchical companies there'd be fewer
people who knew the new employees well enough to do that.)

The other was about the loss of the database of the personal
library collection of one of the main linguists studying one of
the two main Norwegian dialects.   It's now been cracked...

RISKS-FORUM Digest 22.13
  http://catless.ncl.ac.uk/Risks/22.13.html

Date: Tue, 11 Jun 2002 11:37:02 -0400
From: Lillie Coney [EMAIL PROTECTED]
Subject: Norwegian history database password lost and retrieved

After the password for accessing a Norwegian history museum's database
catalog for 11,000 books and manuscripts had been lost when the database's
steward died, the museum established a competition to recover it.  Joachim
Eriksson, a Swedish game company programmer, won the race to discover the
password (ladepujd, the reverse of the name of the researcher who had
created the database).  How he arrived at it was not disclosed.  [Source:
Long-lost password discovered: Norwegian history database cracked with help
from the Web, By Robert Lemos, MSNBC, 11 Jun 2002; PGN-ed]

Lillie Coney, Public Policy Coordinator, U.S. Association for Computing
Machinery Suite 510 2120 L Street, NW Washington, D.C. 20037 1-202-478-6124





Re: Smart ID Cards Planned for Sailors to Spot Terrorists

2002-07-06 Thread Bill Stewart

Bob - This isn't really cryptography-related, and I can't post to DCSB,
but this does seem like Cypherpunks material.
What an insert several paragraphs of sailor-type language here/
outrageous proposal!   Can't sail without some government
fingerprinting you, laser-scanning your eyes, and
throwing you in a huge database?  more nautical language/.

I'd expect the ILO to be socialist - they are a big union after all -
but I wouldn't expect them to be totalitarians.
Sure, it's a way to create a harder-to-avoid union card,
and a way for their biggest customers to be forced to hire their people
by using government pressure to enforce it.  It's also a surveillance
mechanism to let management keep track of sailors they dislike,
prevent politically incorrect people from getting jobs as sailors,
give governments additional control over sailors in port,
private sailors, and refugees who can't afford to travel on airplanes,
and gives large governments an increased excuse to interfere with
high-seas traffic between other countries under the pretense of
checking whether all the sailors are documented.

 From a technology perspective, the interesting paragraph is
 The plans have drawn criticism from seafarer's groups
 concerned that port authorities may insert information in
 so-called ``smart'' identification
 documents without the cardholder's knowledge.
Sure, smart cards with non-user-viewable data can easily have
extra data in them saying the user is a Communist or union organizer
or did scab labor or is a Muslim or a Jew or a Rastafarian.
And it's easy for port authorities to send copies of sailors' photos
to their local police in case they're wandering around town.

But with the Internet reaching everywhere, either by wire or satellite,
the information doesn't need to be hidden in the card.
The card says that you're Sailor #12345678, so they can look you up
on any website they want - not just the ILO's paid their union dues
database, and Interpol's Never been caught smoking dope database,
and the shipping companies' Not a union troublemaker database,
and the originally from _this_ country even though they're now American 
database,
and Blacknet's databases on gets in Bar Fights and scab laborers.

 Bill Stewart

At 06:10 PM 07/03/2002 -0400, R. A. Hettinga wrote:
http://quote.bloomberg.com/fgcgi.cgi?ptitle=Top%20World%20Newss1=blktp=ad_topright_topworldT=markets_box.hts2=ad_right1_windexbt=ad_position1_windexbox=ad_box_alltag=worldnewsmiddle=ad_frame2_windexs=APSMyZRY2U21hcnQg

Bloomberg News

Top World News

07/03 13:20
Smart ID Cards Planned for Sailors to Spot Terrorists (Update1)
By Amy Strahan Butler

Washington, July 3 (Bloomberg) -- The identities of more than 500,000
commercial sailors worldwide would be verified through thumb or iris scans
under tough, new anti-terrorism standards backed by the U.S. and other
industrialized nations.

``The whole idea is to come up with a worldwide system for positive,
verifiable identification of seafarers,'' said Mary Covington, associate
director of the Washington office of the International Labor Organization,
a United Nations-affiliated group that's developing the standards.

The labor organization got a big boost when representatives of the Group of
Eight nations -- the U.S., Japan, Germany, the U.K., France, Canada, Italy
and Russia -- endorsed the standards during a meeting in Canada last week.

The plans have drawn criticism from seafarer's groups concerned that port
authorities may insert information in so- called ``smart'' identification
documents without the cardholder's knowledge.

Those concerns are being swept aside as the drive to close loopholes in
shipping security has gained momentum since Sept. 11 in the U.S., where
less than 2 percent of cargo entering ports is inspected by the U.S.
Customs Service.

After the terrorist attacks, the Coast Guard began requiring ships to
notify ports 96 hours prior to arrival and to submit a list of crew members.

Card-Carrying Sailors

Commercial sailors in countries that ratify the ILO standards would be
required to carry identification cards similar to driver's licenses that
also contain biometric information, such as a thumbprint or iris scan.
Under the proposal, port authorities would be able to verify the identity
of the card bearer by scanning his thumb or eye.

The credentials could be issued to more than a half-million shipping
employees as governments attempt to tighten port security to prevent
terrorist activities.

``This would help produce uniform treatment of seafarers,'' said Chris
Koch, president of the World Shipping Council, a trade association
representing more than 40 shipping companies, including Atlantic Container
Line AB and Crowley Maritime Corp. ``That's in the interest of not only
seafarers but of commerce.''

The current ILO convention for identifying shipping employees entering
foreign ports asks that countries to provide seafarers with 

Re: mount filesystem and run a program when hotplugged

2002-07-06 Thread Bill Stewart

At 05:29 PM 06/28/2002 +0200, Eugen Leitl wrote:
I've bought me a little (32 MBytes) hotpluggable USB flash stick (a
TrekStor). It mounts fine, but what I'd like to do is to automount it, and
fire up a program (I intend to put my keyring on it) if hotplugged.

The system I'm testing this on is RH 7.3.

I've been using mount -t vfat /dev/sda /mnt/usbhd to mount it manually and
put diverse entries into /etc/fstab, to no avail. Any suggestions?

I don't know how to do that, though it certainly sounds like an
invitation for viruses to migrate around on USB keyring sticks.

Is there CDROM autorun code that runs on Linux that could be adapted?




Internet Video and Conectivity Solutions

2002-07-06 Thread Enelec
Title: Módulo de Adquisición de video







  
  

  
  

  
  

  
  
  
  
  
  
  
  

  
  


  


  
  


  



  
  


e-cam Connect
up to 4 Cameras to the Internet
  
  



  
  

  

  
  
Price:
  




Monitoring and Security
over internet or intranet.


nSupport for up to
4 cameras BW or color.


nInput for movement
  detectors or other security device.
e-mail alert in case
  of events.
Download our demo: e-cam
  

  
  

More
details


File
  Size 70K
  
  

  
  



  
  

e-gateway
The simple
way to connect and share your ADSL
  
  



  
  




  
  Price:
  




  Share your ADSL connection.
  Protect your network from
Hackers.
  Run your own web server.
  More reliable, eficient and
secure than a proxy server.


  
  

More
details


File
  Size 40K
  
  

  
  



  
  


e-server
Need a small WEB SERVER ?
  
  



  
  




  

Price:
  




  e-server: HTTP embedded
web server.
  e-server/w: HTTP
embedded web server with WML support for WAP compatible
devices.
  One to Four Serials RS-232.
  RS-232 to TCP/IP Converter
  Supported protocols TCP/IP,
HTTP, UDP, SMTP.


  
  

More
details


File
  Size: 36K
  
  

  
  



  
  

IDC-2000
Data
Acquisition and Control with Internet support
  
  



  
  




  
  Price:
  




  4 Lines by 20 LCD and Keypad.
  3 optoisolated digital
inputs.
  12 digital or analog input.
  8 digital outputs with
relays.
  Programable en C, Pascal and
Basic.
  One Serial RS-232 and
one RS-485 (opctional)


  
  



More
details


File
  Size: 50K
  
  

  


  
  
 

[¼ºÀÎ] ´ç½ÅÀ» ¿À´Ã¹ã ÆÄƼ¿¡ ÃÊ´ëÇÕ´Ï´Ù~~!! ¸¸19¼¼ ÀÌ»ó¸¸ º¸¼¼¿°~~^^* !--7051--

2002-07-06 Thread °æ¾Æ



´ç½ÅÀ» ¿À´Ã¹ã ¹«¾ÆÁö°æ ÆÄƼ¿¡ ÃÊ´ëÇÕ´Ï´Ù~!!

http://sex82.com

¿Àºü »¡¸®¿Í¢½¢½

¼ºÀÎÀü¿ë ¼îÇθô  ¹«·á ¿µÈ­µÎ
ÀÖ½À´Ï´ç~~^^*

½Å¼±ÇÏ°í Áö¼ÓÀûÀÎ ¾÷µ¥ÀÌÆ® ¹× »çÀÌÆ®°ü¸®·Î ÀúÈñȸ¿ø´Ôµé¿¡°Ô
¼­ºñ½ºÇϵµ·Ï ÃÖ¼±À» ´ÙÇÏ´Â SEX82°¡ µÇ°Ú½À´Ï´Ù.°¨»çÇÕ´Ï´Ù.






¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.





Re: Closed source more secure than open source

2002-07-06 Thread Joseph Ashwood

- Original Message -
From: Anonymous [EMAIL PROTECTED]

 Ross Anderson's paper at
 http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf
 has been mostly discussed for what it says about the TCPA.  But the
 first part of the paper is equally interesting.

Ross Andseron's approximate statements:
Closed Source:
 the system's failure rate has just
 dropped by a factor of L, just as we would expect.

Open Source:
bugs remain equally easy to find.

Anonymous's Statements:
For most programs, source code will be of
 no benefit to external testers, because they don't know how to program.

 Therefore the rate at which (external) testers find bugs does not vary
 by a factor of L between the open and closed source methodologies,
 as assumed in the model.  In fact the rates will be approximately equal.

 The result is that once a product has gone into beta testing and then into
 field installations, the rate of finding bugs by authorized testers will
 be low, decreased by a factor of L, regardless of open or closed source.

I disagree, actually I agree and disagree with both, due in part to the
magnitudes involved. It is certainly true that once Beta testing (or some
semblance of it) begins there will be users that cannot make use of source
code, but what Anonymous fails to realize is that there will be beta testers
that can make use of the source code.

Additionally there are certain tendencies in the open and closed source
communities that Anonymous and Anderson have not addressed in their models.
The most important tendencies are that in closed source beta testing is
generally handed off to a separate division and the original author does
little if any testing, and in open source the authors have a much stronger
connection with the testing, with the authors' duty extending through the
entire testing cycle. These tendencies lead to two very different positions
than generally realized.

First, closed source testing, beginning in the late Alpha testing stage, is
generally done without any assistance from source code, by _anyone_, this
significantly hampers the testing. This has led to observed situations where
QA engineers sign off on products that don't even function, let alone have
close to 0 bugs. With the software engineers believing that because the code
was signed off, it must be bug-free. This is a rather substantial problem.
To address this problem one must actually correct the number of testers for
the ones that are effectively doing nothing. So while L is the extra
difficulty in finding bugs without source code, it is magnified by something
approximating (testers)/(testers not doing anything). It's worth noting that
(testers)  (testers not doing anything) causing the result K =
L*(testers)/(testers not doing anything), to tend towards infinite values.

In open source we have very much the opposite situation. The authors are
involved in all stages of testing, giving another value. This value is used
to adjust L as before, but the quantities involved are substantially
different. It must be observed, as was done by Anonymous, that there are
testers that have no concept what source code is, and certainly no idea how
to read it, call these harassers. In addition though there are also testers
who read source code, and even the authors themselves are doing testing,
call these coders. So in this case K = L*(harassers)/(harassers+coders).
Where it's worth noting that K will now tend towards 0.

It is also very much the case that different projects have different
quantities of testers. In fact as the number of beta testers grows, the
MTBD(iscovery) of a bug must not increase, and will almost certainly
decrease. In this case each project must be treated separately, since
obviously WindowsXP will have more people testing it (thanks to bug
reporting features) than QFighter3
(http://sourceforge.net/projects/qfighter3/ the lest active development on
sourceforge). This certainly leads to problems in comparison. It is also
worth noting that it is likely that actual difficulty in locating bugs is
probably related to the maximum of (K/testers) and the (testers root of K).
Meaning that WindowsXP is likely to have a higher ratio of bugs uncovered in
a given time period T than QFighter3. However due to the complexity of the
comparisons, QFighter3 is likely to have fewer bugs than WindowsXP, simply
because WindowsXP is several orders of magnitude more complex.

So while the belief that source code makes bug hunting easier on everyone,
is certainly not purely the case (Anonymous's observation), it is also not
the case that the tasks are equivalent (Anonymous's claim), with the
multiplier in closed source approaching infinite, and open source towards 0.
Additionally the quantity of testers appears to have more of an impact on
bug-finding than the discussion of open or closed source. However as always
complexity plays an enormous role in the number of bugs available to find,
anybody with a few days programming experience 

Grants up to $156,000! NEVER need to Repay!

2002-07-06 Thread akadabra



  
 


Could you use a Free Grant of $10,000 to $156,000 but, not exceeding $5,000,000? 


 The relatively new concept of giving away money is called the Free Grant Giveaway Program. 

No longer are Free Grants the domain of the privileged and choice few, but now they can be awarded to everyday people like you. 

These are genuine programs offering money to those candidates that meet their eligibility criteria.
 Everything in this announcement is perfectly legal 
and the verifiable, honest truth.

See if you QUALIFY NOW!



Limited time offer!! Ends at MIDNIGHT!



























Here is that link. 8470OaPq5-890OvSw7913ZhD-23

2002-07-06 Thread toby64346778858o03
Title: New 






The World's #1 On-line Pharmacy
Order from the convenience of your home!
No Embarrassment, Just FAST, DISCRETE 
Delivery!
Viagra
(Sexual)
Phentermine
(Weight-Loss)
Meridia
(Weight-Loss)
Retin-A
(Skin Care)
Propecia
(Hair Loss)
Zyban
(Quit Smoking)
And Much, Much More!
Click
here to enter!

Do you want EVERYONE to know your business?

ORDER
NOW!








to be removed
http://213.139.76.181/remove.php





7604BcxR5-327TlrZ4033nNHn1-718BOyP2054xsoS3-840KCwI4217RfSl55



TIME CAPSULE in a bottle?

2002-07-06 Thread bobl
Title: Grow biologically younger in 30 days or less!










“The most effective
anti-aging therapy.”
Dr. Thierry Hertoghe, President
of the European Academy
for Quality Life and Longevity
Medicine











What if you could reverse
the effects of aging?
It's not science fiction anymore!




Here is what Pro GHR will do
for you:

Look Younger

Lose Weight

Restore Hair Growth

Reduce Wrinkles

Boost Sex Drive  Energy

Rebuild Bone  Muscle Mass

Lower Blood Pressure

Reduce Cholesterol

Regenerate Heart, Liver, Kidneys,  Lungs








Many people that start this
program between 35 to 40 years of age can maintain
their appearance and current biological age for the next 10
to 20 years. Persons age 50 and over
can actually reverse the effects of aging in many cases up to 10 to 20
years over a 3 to 6 month period. Results will depend on your health,
living and eating habits and overall lifestyle.
Order
Now(Only
$39.99, lowest price ever!)





Pro GHR is recognized as the bridge to a much longer and healthier
life! Soon after you begin taking Pro GHR, you and others will start noticing
some profound changes in your appearance and overall health. Most importantly,
you'll feel terrific using Pro GHR.
After the age of twenty-one, your body slowly stops releasing an
important hormone known as HGH. Scientists have now discovered a relationship
between this decline of HGH in the body and aging. In fact, it is directly
responsible for many of the most common signs of growing old, such as wrinkling
of the skin, gray hair, decreased energy, and diminished sexual function.
Fortunately, clinical evidence proves that by elevating human growth
hormone we can significantly stop -- and even reverse -- these symptoms
of aging!
Until now, HGH therapy was a costly and even dangerous treatment,
available only to celebrities and the very wealthy. With the introduction
of Pro GHR, it is now affordable and free of any reported side-effects.
For less than a fraction of the cost, Pro GHR naturally increases HGH levels
in your body. If you are already one of our satisfied customers, congratulations!
May you live a long and healthy life with Pro GHR!
Science now recognizes aging as a disease that
can be reversed to a large degree by increasing HGH, Human Growth Hormone
to levels to where they were in your 20's.
Human Growth Hormone (HGH) is
an endocrine hormone produced by your body abundantly in your youth and
starts falling off dramatically past age 30. Other hormones that
decline with age are estrogen, progesterone, testosterone, melatonin and
DHEA. Human Growth Hormone (HGH) regulates all these other hormone
levels within the body.



HGH is produced by the pituitary gland and
is responsible for all adolescent growth peaks. Produced abundantly in
our youth, human growth hormone decreases approximately 80% from ages 21
to 61. The pituitary gland can produce as much hgh in old age as in
youth if properly stimulated. We now have a product called Pro GHR
that will do the job. By increasing hgh levels back to where they
were at age 25 you can reverse the effects of aging and actually look
and feel 10 to 20 years younger.
HGH affects
almost every cell in the body to regenerate
skin, hair, muscle, bones, heart, lungs, liver, and kidneys to their former
youthful levels. The immune system is revitalized. Osteoporosis can be
prevented, and heart attack and stroke risk factors are diminished. Aging
can be stopped...or even reversed.
Called cosmetic surgery in a bottle, HGH
helps smooth facial wrinkles, and the hydration, elasticity, thickness
and youthful contours of the skin are regained. The
majority of reorders are from people that say that Pro GHR does wonders
for their skin.
HGH is a powerful aphrodisiac that
increases libido, and sexuality/potency is restored in older persons.
As a mood elevator, most people find a youthful sense of wellness and a
zest for life restored through the use of HGH.
Healthy sleep patterns return,
providing the deepest levels of sleep for optimum well being.



Order
Now(Only
$39.99, lowest price ever!)





"The effects of six months
of human growth hormone on lean body mass and adipose-tissue were equivalent
in magnitude to the changes incurred during 10-20 years of aging." Daniel
Rudman, M.D., New England Journal of Medicine February 28, 2002












Doctor's Agree...
Pro GHR will change the way you look and feel!

“Hormone replacement therapy (Pro GHR) is the best
and most effective anti-aging medical therapy of the moment.”
- Dr. Thierry Hertoghe
“In over 40 years of practicing orthomolecular medicine,
I have never seen anything that approaches the positive results seen with
Pro GHR.”
- Dr. Don E. Johnson - President
of the American Anti- Aging Society

























What Customers
Are saying about
Pro GHR










Benefits of Pro GHR


Rejuvenate your body and mind


Feel younger


Look younger


Lose weight


Reduce wrinkles


Restore your sex drive


Revitalize your Heart, Liver, 

TPM cost constraint [was: RE: Revenge of the WAVEoid]

2002-07-06 Thread Lucky Green

Bill wrote:
 At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
 An EMBASSY-like CPU security co-processor would have seriously blown 
 the part cost design constraint on the TPM by an order of 
 magnitude or 
 two.
 
 Compared to the cost of rewriting Windows to have a 
 infrastructure that can support real security?  Maybe, but 
 I'm inclined to doubt it, especially since most of the 
 functions that an off-CPU security co-processor can 
 successfully perform are low enough performance that they 
 could be done on a PCI or PCMCIA card, without requiring motherboard 
 space.

Upon re-reading the paragraph I wrote, I can see how the text might have
been ambiguous. I was trying to express that there was a cost constraint
on the part. Adding the cost of an EMBASSY or SEE environment to the
purchase of every new PC is more than the market for bare-bones or even
mid-range PC's will bear.

--Lucky




Virus discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: CDR: MIME-Version: 1.0
Virus  : W32/Klez.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 23:23:03 2002
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id WAA18716
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:27:10 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id WAA18702
   for cypherpunks-outgoing; Sat, 6 Jul 2002 22:25:43 -0500
Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA18698
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:25:30 -0500
Received: from  logs-wp.proxy.aol.com (logs-wp.proxy.aol.com [205.188.201.135]) by 
rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706231923; Sat, 06 Jul 2002 
23:19:23 -0400
Received: from Rzqjpbsx (AC8FAB57.ipt.aol.com [172.143.171.87])
   by logs-wp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g6732Tt72199
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:02:29 -0400 (EDT)
Date: Sat, 6 Jul 2002 23:02:29 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: sales [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: CDR: MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=K1SGaBa4272i23Qf40c5T774L9T17q115696
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish




Virus discarded

2002-07-06 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.31, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please see http://www.google.com/search?q=antivirus or
http://hotbot.lycos.com/?query=antivirus

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: MIME-Version: 1.0
Virus  : W32/Klez.gen@MM

Original headers:

From: [EMAIL PROTECTED]  Sat Jul  6 23:23:21 2002
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g673N2E42047
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:23:02 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g673MxD06089
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:59 -0400
Received: from locust.minder.net (locust.minder.net [66.92.53.74])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g673Mvu06075
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:57 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g673MjE42033
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:22:45 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id WAA18715
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:27:09 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id WAA18702
   for cypherpunks-outgoing; Sat, 6 Jul 2002 22:25:43 -0500
Received: from rly-ip01.mx.aol.com (rly-ip01.mx.aol.com [205.188.156.49])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id WAA18698
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 22:25:30 -0500
Received: from  logs-wp.proxy.aol.com (logs-wp.proxy.aol.com [205.188.201.135]) by 
rly-ip01.mx.aol.com (v83.35) with ESMTP id RELAYIN3-0706231923; Sat, 06 Jul 2002 
23:19:23 -0400
Received: from Rzqjpbsx (AC8FAB57.ipt.aol.com [172.143.171.87])
   by logs-wp.proxy.aol.com (8.10.0/8.10.0) with SMTP id g6732Tt72199
   for [EMAIL PROTECTED]; Sat, 6 Jul 2002 23:02:29 -0400 (EDT)
Date: Sat, 6 Jul 2002 23:02:29 -0400 (EDT)
Message-Id: [EMAIL PROTECTED]
From: sales [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=K1SGaBa4272i23Qf40c5T774L9T17q115696
X-Apparently-From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: MIME-Version: 1.0




The manipulator's guide to the female mind!

2002-07-06 Thread abrown




  
  

  
  

  


  

  
  

The Complete Guide for Attracting and 
Seducing WomenAttracting beautiful women is EASY 
- if you know how to do it."Now, here's your chance to learn the amazing secrets 
for attracting and seducing beautiful women. The techniques revealed 
in this guide are so easy to put into place - yet so effective - 
that you won't believe 
it.With our incredible guide, 
you're about to learn:

  How to get women to pick you up
  The best ways to approach a woman
  How to create instant rapport
  The secret to becoming more than just friends
  How to get women into bed
  The art of successful flirting
  How to develop charisma and mystique
  and much more! 
The skills you'll quickly master with our program will have 
you getting more women than you ever dreamed possible!Your 
age, your looks, your income, your past 
experiences...NONE OF THAT 
MATTERS!Our program has proven 
successful for guys from all walks of life.You'll 
discover simple, no b.s. strategies and techniques for attracting 
and seducing the women you desire - quickly and 
easily.Don't waste another minute - 
CLICK HERE TO 
ORDER NOW

  

  


  


  

  
   "This is the best material I've 
read on getting girls. I've tried a ton of different books and 
techniques over the past year or so but this is the only one that 
has really worked for me. I can't thank you 
enough..."John"Man, this is incredible! It turns out 
I've been doing a lot of things wrong with the ladies for a lot of 
years. Your program has set me straight and shown me the way. You 
should charge $500 for this information - it's that 
good!"Calvin"I have to say that your guide has 
really helped me get back into the dating scene. I'm 42 and recently 
divorced, and I've never had that much luck with women. But thanks 
to you I'm back in action and having more fun (and getting more 
dates) than I did when I was 22. Thanks A.S. (Advanced 
Seduction)!"Richard


  

  
  

  
  Copyright © 2002 Quiksilver Enterprises
  Rights Reserved.You are receiving this 
  special offer because you have provided permission to receive email 
  communications regarding special online promotions or offers. If you feel 
  you have received this message in error, or wish to be removed from our 
  subscriber list,
  Click HERE and you will be removed within less than three business 
  days. Thank You and sorry for any inconvenience.
  

3630CpxM5-267OYl14



Do You Want to be a Millionaire?

2002-07-06 Thread Home Biz Forum



  
  

  To unsubscribe click here





partnership

2002-07-06 Thread idriskad

From: Dr.Idris Kadiri
E-mail:[EMAIL PROTECTED]
Phone:234 1 7758451
Fax:234 1 759 6668   
16 Kingsway Rd,
Ikoyi, Lagos. 

REQUEST FOR ASSISTANCE - STRICTLY CONFIDENTIAL 
I am Dr.Idris Kadiri an Accountant in the Nigerian National Petroleum
Corporation (NNPC) and I head a seven-man tenders committee in charge
of Foreign/Expatriate Contract Awards Review and Payment Approvals
(CRPAC).
 I came to know of your name and address in my search for a reliable and
low-key person to handle a very confidential transaction based on
unflinching trust as we have not met before.This transaction involves
the   transfer of huge sum of foreign exchange (the UnitedStates
Dollars) to a foreign account. There were a series of contracts
executed by a Consortium of Multinationals in the oil industry in
favour of NNPC among which are:
(1) The expansion and rehabilitation of the ageing pipeline network
within Nigeria for crude oil and downstream products distribution and
evacuation - US$9 Billion   
(2) Contracts for the Turn Around Maintenance (TAM) of the four
epileptic refineries in the country
(3) The construction of more storage tanks and
maintenance and servicing of old ones for Petroleum Products Storage 
(Depots) -
US$90 Million
(4) The construction of Escravos Gas Poduction
Offshore facility.  
The original value of these contracts was deliberately over-invoiced
in the sum of USD Eighteen Million, Five Hundred Thousand
($18,500,000.00) by this committee (CRPAC) during the awards of the
various contract. This sum ($18,500,000.00) has now been approved for payment
by this committee (CRPAC) and is now ready to be transfered by the
Central Bank of Nigeria to the account of any individual and or
company which the CRPAC presents as the beneficiary, since the company that actually
executed these contracts has been fully paid their fund and the
projects have been officialy  commissioned.   
 Consequently, my colleagues and I are willing totransfer the total
amount to your account for subsequent disbursement on our behalf, since we
as civil servants and we are also serving in a sensitive foreign
payment approval committee (CRPAC) are prohibited by the Code of
Conduct Bureau (Civil Service Laws) from opening or operating foreign
account and or dealing in foreign exchange in our names. Needless to
say, the trust reposed on you at this juncture is enormous. In return, we have
agreed to offer you 25% of the transferred sum, while 10% shall be
set aside for incidental expenses(internal and external) accrued
between the parties in the course of the transaction. The balance
will be used to purchase agricultural equipment and medical drugs
from your country for importation back to my country.You must however
note that this transaction is subject to the following terms and
conditions:  
a) Our conviction of your transparent
honesty and diligence
b) That you would treat this transaction with utmost secrecy and
confidentiality
c) That you have an unflincing trust in us, and our ability to
complete all
official processes with your co-operation.
(d) That the funds would be transfered to an ordinary account which
you have total control over.
Modalities have been worked out (secretly) at the highest levels of
the relevant government departments involved and the Central Bank of
Nigeria forthe immediate transfer of funds within 14 working days
subject to your satisfaction of the above stated terms. Our assurance
is that your role is risk-free. To accord this transaction the
legality it deserves and for mutual security of the fund, the whole
approval procedures will be officially and legally processed with
your name or the name of any company you may nominate as the bonafide
beneficiary, as in an ideal situation. 
 It is imperative that you bear in mind that having put in 19 years
in the service of the government, I am averse to having my image and
career dented.This matter should therefore be treated with utmost
secrecy and urgency.
Kindly expedite action by contacting me on my e-mail address,
indicating
your interest in this transaction. For swift response to your reply,
kindly indicate your fax and telephone numbers clearly so that I can
explain further, especially by fax. I am urgently waiting your reply
as payment to
foreign contractors is usually made on quarterly basis.

Yours faithfully,  
Dr.Idris Kadiri.




== (( cypherpunks Try G4m $1,000,000/ Yr, Millionaire Cash System, Change Your Life !!! )) ==

2002-07-06 Thread G4M-AMERICA

 Hello! 

=

 “G4m”  Program:
Can You Get Paid $1,000,000 in 1 yr? 

=

I have something of great value that I want to share with you!
But before I do, permit me to tell you a little about me. 

  I  manage a computer company that makes and sells laptops
and pda's in New York. I have a few other businesses
that make me money.

But the problem is that I have no time to enjoy the
money that I make.

Why?  Because I have to attend endless corporate
meetings, spend 10 hrs in an office 6 days, answering e-mails, 
talking to customers on the phone, responding to fax, 
supervising our staff,  attending to the media, and occasionally
traveling!

Sometimes I have both my regular phone and cellphone 
ringing all at the same time!

Sometimes, I may have two or more customers on the 
phone at the same time!

I work so hard, and by the end of the day, I am
so tired. All I want to do is watch TV for 
about 1 hr, take a shower and go to bed.

It is boring! 
I have no time for my family.

All my friends are unhappy because I have no time for them.

I have no social life!

I make money, and yet I am not happy! 

I thought with all the modern technological
advancement in computer, pda's, fax, 
internet, cellphone, and networks, that 
one doesn't have to work so hard like
10 hrs  a day to earn a decent salary. 

  But the opposite is the case!

What is the point in working so hard to make a lot
of money, but not having the time to enjoy it 
with your family and friends?

I don't know about you, but this is Not what I want!

So, I was overcome with joy when a friend of mine
from California, Mario, told me about a little known
internet program, (G4m) that he stumbled upon.

I never liked programs, especially these days, when it is
no longer easy to promote anything on the internet.

My friend, Mario  sent me many e-mails which I ignored.

Then one day, while I was searching for information
on the internet, I stumbled unto this “G4m“ program
myself.

I decided to pass time and read a little about it.

Holly mackerel,  donky duck! What I discovered stunned me!

The creator of this program is a self-made  multi-millionaire
with initials “JG”, from Canada. I found out that it is a fully
automated program run by computers and he is raking in
on the average, $2.4 million dollars every year!

And the best part is he didn't have to be stuck in the office
10 hrs, answering phones, responding to e-mails, 
fax and attending endless meetings like me!

“G4m” is totally programmed to be run by computers, 
and there is no hard work to do!

I was impressed. I was captivated! I decided to put it
to test by signing up immediately!

After signing up, I followed the simple guideline recommended
by “JG”. Yes, just like the program said,  in exactly 1 month, my 
checks began to come in!

The first check was for $200.

I could not believe my eyes!

Until then, I never knew that such a program is possible! 
I never knew it is possible to just sign up
in a program, and without any hard work or
large investment,  start making money!


I was so grateful to my friend, Mario, that
I promised him that I will try and help at least 1000
people!

That is why you're receiving this e-mail from me!

If you're in a similar situation like I was 2 months ago, cheer up
because I may be able to help you!

“G4m” is the Only Money-Making Program 
that pays You Commissions for 1 yr!!!

It is easy, It is fun, & it Pays! 
Just sign up, and you'll get a powerful ebook, 
“IMSS”, and 325 easy internet biz that have proven 
to make thousands of dollars on the net!!! 

 Plus, you get paid
these commissions: 



Level-1 ---> $200
Level-2 ---> $1,000
Level-3 ---> $5,000
Level-4 ---> $50,000
Level-5 ---> $1,000,000

 There is:


==> No Rambling Conference calls to listen to! 
==> No boring meetings to attend! 
==> No large investment! 
==> No hard work!  

 It is automated!!! 

Since two months ago, when my checks began to
come in, I  stopped working at my job 10 hrs  daily!

I now have the time to be with my family
and friends and enjoy my money and my life!

No more stress!  No more high blood pressure!

I am happy. I have started smiling! 
And noticing  and enjoying all the beautiful things in this life
that I had been missing!

Life is now sweet like honey!

I now have the time to help other people!

I can help you if you permit me.

Your life can change like mine!

You don't have to be stuck in your office 10 hrs daily
anymore!

“G4m” can become an automated  second source of  income 
for you, so you may have free time to be with your family 
and friends and enjoy life. 

There is no obligation.
Just respond and get the Free details right now. 

##

  (1) Send blank E-mail to: 

 [EMAIL PROTECTED]

And put these words in the subject space: 
"Send details, G4M, Code Greg"

 In about 1HR, you'll get our fast reply
on how to sign 

Tremendous Opportunity and FREE Software

2002-07-06 Thread Shane Williams

Hi, 

I joined a program at the end of last month.  I didn’t think much about it but it 
promised to generate for me a PAID down line.  I thought, “Yeah right,” but since it 
was FREE to join, I signed up.

Well, after about 12 hours my sponsor (Jim Ludes) e-mailed me and told me to take a 
look at my web page because I had PAID members in my down line.  I logged on and saw 
that I already had a down line of 40 people!  This was on the last day of the month 
and before the evening was through I had a total of 50 people under me!

My sponsor also informed me that if I had signed up at the beginning of the month, I 
would have had approx. 1800 people in my down line!

As you can imagine, I was very skeptical. After all, how could I have this many PAID 
Members under me so fast in a program I had never promoted?

I took the time to check out the site...then wrote to Jim asking for confirmation that 
these were paid members and not just free sign-ups...like me :-)

Well, it was true...I had 50 paid members in my down line. This in a program that I 
had never worked!

All I had to do was upgrade to a paid membership before the end of the month and I 
would have my position locked in and a down line of 50 people.

You can bet I wasted no time in getting my membership upgraded!

I can tell you, if I had known what was happening with this program, I would have 
become an active paid member months ago!

With this program, you will get a HUGE down line of PAID MEMBERS. My sponsor's check, 
which is a minimum of $500, arrives every month...on time and he’s only been with this 
program for 3 months!  His sponsor is making a minimum of $1500 per month.

How would you like to lock your position in FREE while you check out this opportunity 
and watch your down line grow?  This is NOT a get-rich-quick scheme.  It is a unique 
program that really works.  The figures that I gave you above are ACTUAL numbers.  
This is not a Pre-Fabricated Letter but ACTUAL figures.  I will give you the e-mail 
address of my sponsor if you wish to verify what I have said.

To grab a FREE ID#, simply reply to: [EMAIL PROTECTED] 
and write this phrase in the text page:
Email me details about the club's business and consumer opportunities
Be sure to include your:
1. First name
2. Last name
3. Email address (if different from above)

We will confirm your position and send you a special report as soon as possible, and 
also Your Free Member Number.  If you act now, I will also give you access to some 
FREE software, which will help you in any business endeavor you may be in.

I'll get you entered and let you know how you can keep track of your growing down line.

That's all there's to it.

I'll then send you info, and you can make up your own mind.

Warm regards,

Shane Williams

P.S. After having several negative experiences with network marketing companies I had 
pretty much given up on them. This company is different--it offers value, integrity, 
and a REAL opportunity to have your own home-based business... and finally make real 
money on thhe Internet.

Don't pass this up. You can sign up and test-drive the program for FREE. All you need 
to do is get your free membership.

 This 
email is sent in compliance with strict anti-abuse and NO SPAM regulations. The 
message was sent to you as a response to your ad, an opt-in opportunity, your address 
was collected as a result of you posting to one of my links, reviewing your web site, 
you answering one of my classified ads, you have sent me an E-mail, or you unknowingly 
had your e-mail added to an opt-in mailing list. You may remove your E-mail address at 
no cost to you whatsoever, simply click on Reply button and put Remove Me in the 
subject Line  
=
 



___
GO.com Mail
Get Your Free, Private E-mail at http://mail.go.com





First, get it built into all CPU chips...only _then_ make it mandatory.

2002-07-06 Thread Gary Jeffers

My fellow Cypherpunks,

   Tim May writes:

Then, perhaps after some major war or terror incident or other trigger,
major OSes will require the TCPA/DRM features to be running at all
times. Sure, maybe some little Perl or Java program Joe Sixpack writes
won't need it, but anything not on the margins will require it.

   This then brings up the question of Open Source operating systems like
the (GNU) Linux distributions and the BSD operating
systems. Is the TCPA/DRM feature code to be published or censored out? For
the source code, will the censored code
be a binary file? This could be a mess. I believe that there was a
discussion of US mandated Malice code in Open
Source operating systems on the Cypherpunks list recently, but I couldn't
find it with a Google search. Anybody got a
Cypherpunk Hyperarchive link?

   If the above happens, it would keep the coding anarchists busy for years
:-) Recompiling your operating system with
an outlaw file included would be an anarchic and patriotic act. It could
also knock down Microsoft market share.

   I suspect the the US solution would be hardware. All new hardware would
be maliced and old hardware would become
obsolete.

Yours Truly,
Gary Jeffers

Beat State!!!





Re: We have always been at war with Oceania

2002-07-06 Thread Bill Stewart

The Indianapolis Star newspaper ran the NYTimes version of this story
with the headline Drug Peddling Pilots May Get Wings Clipped.
I was assuming it would be about revoking their pilots' licenses
or confiscating their airplanes, but no, it was about
shooting them down and machine-gunning any fleeing passengers,
like they did to the Baptist missionary and her baby last year.
Under Fujimori's dictatorship in Peru, they claim to have shot down
about 25 planes, and some politician made a highly-pleased-with-himself
statement about how it's really discouraged traffickers.

There may be True Believers on the pro-terrorist side,
but cocainistas are in it for money, not ideology -
they're happy to blow up the occasional judge, but they're smart enough
not to try going toe-to-toe with the US military in a shooting war.

At 09:39 AM 07/04/2002 -0700, Major Variola (ret) wrote:
http://story.news.yahoo.com/news?tmpl=storycid=536ncid=703e=1u=/ap/20020704/ap_on_go_pr_wh/bush_drug_flights_1

President Bush ( news - web sites) is expected to allow resumption of a
program to force down or
shoot down airplanes suspected of carrying drugs in Latin America,
a senior administration official
said Thursday.

Does Mr. Bush understand tit-for-tat?
Hasn't he figured out that he can bust all the petty hawalas he wants,
but the Cartels have *cash* to spend, an excellent distribution
network, and a few submarines?
Looking for True Believers speaking spanish...

Maybe the Saudis will start taking planes out for carrying ethanol...




Re: Jonathan Zittrain on data retention, an awful idea

2002-07-06 Thread Bill Stewart

Sigh.  Back when the US Feds were still trying to push Key Escrow on the
National Information Infrastructure, I started research for an April 1 RFC
for the National Information Infrastructure Data Entry Escrow Protocol, 
NIIDEEP,
and proposed NIIDEEP Information Network Protocol Implementation Government
Standard, NIIDEEPINPIGS.  (Didn't get it finished by April 1 :-)

Because after all, there's no sense escrowing our crypto keys if you
don't also escrow the cyphertext - some of Eric Hughes's talks on
Message Escrow and Data Retention Policies were excellent explanations
of why those was the critical issues.

If the US Feds and Eurocrats would like us to provide them with all of our 
data,
the existing internet would need to double in size to transport all of it
to the appropriate government data storage facilities, or more than double
if separate copies need to be provided to multiple national governments,
or much more if local governments such as city trade commissions need copies.
Since this is clearly unrealistic, even with the demise of the E-Bone,
transmission will require the use of off-line data transmission technology.
Waiting for approval of new government standards would take too long, and
lose access to valuable data because of the resulting delay of several years,
but there are several existing standards for data storage that can be applies.

My long-lost research had the FIPS (US Federal Information Processing 
Standards)
references for several of them, but the current environment requires
the corresponding European standards as well, and I'll need assistance.
But there's also been progress!  RFC 1149 (Avian Carriers) has been 
implemented,
though scalable implementation and dual-source requirements may require
genetic reconstruction of the Passenger Pigeon to supplement current 
carrier species.
Modular methods uses standard data storage formats and separate transmission.
Standards widely supported in the US include Hollerith cards,
1600 bpi 9-track tapes with EBCDIC character sets and fixed block sizes and 
LRECLs,
and ASCII-format punch tape (with country-specific standards for recycled 
paper content.)
8-inch floppy disks have also been widely used, and support both
CP/M and RT11 file system formats.
Are there corresponding European standards for data storage?
Transmission methods for data storage media include International
Postal Union standards for link layer and addressing formats and pricing,
though I'm not directly familiar with standards for shipping containers
where data encapsulation is required.

 Thanks;  Bill Stewart, [EMAIL PROTECTED]


From: Jon Zittrain [EMAIL PROTECTED]
Subject: Re: FC: Data retention scheme marches forward in European 
Parliament

I've written something opposing this at 
http://www.forbes.com/forbes/2002/0708/062.html.

Consider the range of proposals for unobtrusive but sweeping Internet 
monitoring. Most of them are doable as a technical matter, and all of them 
would be unnoticeable to us as we surf. Forbes columnist Peter Huber's 
idea is perhaps the most distilled version. Call it the return of the lock 
box. He asks for massive government data vaults, routinely receiving 
copies of all Internet traffic--e-mails, Web pages, chats, mouse clicks, 
shopping, pirated music--for later retrieval should the government decide 
it needs more information to solve a heinous crime. (See the Nov. 12 
column at forbes.com/huber.)

The idea might sound innocuous because the data collected would remain 
unseen by prying eyes until a later search, commenced only after legal 
process, is thought to require it. Make no mistake, however: The idealized 
digital lock box and many sibling proposals are fundamentally terrible 
ideas. Why?


Jonathan Zittrain, Harvard law professor; codirector, Berkman Center for 
Internet  Society.




RE: Revenge of the WAVEoids: Palladium Clues May Lie In AMD Motherboard Design

2002-07-06 Thread Bill Stewart

At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
An EMBASSY-like CPU security co-processor would have seriously blown the
part cost design constraint on the TPM by an order of magnitude or two.

Compared to the cost of rewriting Windows to have a infrastructure
that can support real security?  Maybe, but I'm inclined to doubt it,
especially since most of the functions that an off-CPU security
co-processor can successfully perform are low enough performance that
they could be done on a PCI or PCMCIA card, without requiring motherboard 
space.
I suppose the interesting exception might be playing video,
depending on how you separate functions.

(Obviously the extent of redesign is likely to be much smaller in the
NT-derived Windows versions than the legacy Windows3.1 derivatives that
MS keeps foisting upon consumers.  Perhaps XP Amateur is close enough to
a real operating system for the kernel to be fixable?)

I am not asserting that security solutions that require special-purpose
CPU functionality are not in the queue, they very much are, but not in
the first phase. This level of functionality has been deferred to a
second phase in which security processing functionality can be moved
into the core CPU, since a second CPU-like part is unjustifiable from a
cost perspective.




Cracking Dead People's Passwords

2002-07-06 Thread Bill Stewart

One of the usual arguments for key escrow was always
what if your employee dies and you can't get his data?
Secret Sharing techniques are of course a better approach,
or at least storing sealed envelopes in company safes
as a much better approach than pre-broken crypto.
There've been a couple of stories in the press recently
where weak passwords also solved the problem.

One was a radio piece, I think NPR, about one of the companies
in the World Trade Center who'd lost their computer administrators
in the 9/11 attacks.  The remaining employees got together and
started telling stories about their co-workers - their interests,
their family members, where they'd gone on vacation, their dogs' names, etc.
They got most of the passwords.  (It was a piece about modern management
styles, and how in older hierarchical companies there'd be fewer
people who knew the new employees well enough to do that.)

The other was about the loss of the database of the personal
library collection of one of the main linguists studying one of
the two main Norwegian dialects.   It's now been cracked...

RISKS-FORUM Digest 22.13
  http://catless.ncl.ac.uk/Risks/22.13.html

Date: Tue, 11 Jun 2002 11:37:02 -0400
From: Lillie Coney [EMAIL PROTECTED]
Subject: Norwegian history database password lost and retrieved

After the password for accessing a Norwegian history museum's database
catalog for 11,000 books and manuscripts had been lost when the database's
steward died, the museum established a competition to recover it.  Joachim
Eriksson, a Swedish game company programmer, won the race to discover the
password (ladepujd, the reverse of the name of the researcher who had
created the database).  How he arrived at it was not disclosed.  [Source:
Long-lost password discovered: Norwegian history database cracked with help
from the Web, By Robert Lemos, MSNBC, 11 Jun 2002; PGN-ed]

Lillie Coney, Public Policy Coordinator, U.S. Association for Computing
Machinery Suite 510 2120 L Street, NW Washington, D.C. 20037 1-202-478-6124




Re: Ross's TCPA paper

2002-07-06 Thread Bill Stewart

At 09:43 PM 06/28/2002 +0200, Thomas Tydal wrote:
Well, first I want to say that I don't like the way it is today.
I want things to get better. I can't read e-books on my pocket computer,
for example, which is sad since I actually would be able to enjoy e-books
if I only could load them onto my small computer that follows my everywhere.

You may not be able to read an Adobe\(tm Brand E-Book\(tm,
but that just means you'll need to buy electronic books from
publishers that don't use that data format - whether it's
raw ascii text or Palm-formatted text or PalmOS DRMware that
you can also view on your PC using an emulator in glorious 160x160-pixel 
format :-)
Of course, if your PC's home country of Nauru has Software Police
implementing some local equivalent of the DMCA, that emulator
that you need for debugging may be illegal.

...
How good is Winamp if it can't play any music recorded in 2004 or later?
Given that Windows Media Player can play all your tunes and it takes a
reboot to switch to Winamp, who wouldn't stick with WMP?




Re: Closed source more secure than open source

2002-07-06 Thread Joseph Ashwood

- Original Message -
From: Anonymous [EMAIL PROTECTED]

 Ross Anderson's paper at
 http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf
 has been mostly discussed for what it says about the TCPA.  But the
 first part of the paper is equally interesting.

Ross Andseron's approximate statements:
Closed Source:
 the system's failure rate has just
 dropped by a factor of L, just as we would expect.

Open Source:
bugs remain equally easy to find.

Anonymous's Statements:
For most programs, source code will be of
 no benefit to external testers, because they don't know how to program.

 Therefore the rate at which (external) testers find bugs does not vary
 by a factor of L between the open and closed source methodologies,
 as assumed in the model.  In fact the rates will be approximately equal.

 The result is that once a product has gone into beta testing and then into
 field installations, the rate of finding bugs by authorized testers will
 be low, decreased by a factor of L, regardless of open or closed source.

I disagree, actually I agree and disagree with both, due in part to the
magnitudes involved. It is certainly true that once Beta testing (or some
semblance of it) begins there will be users that cannot make use of source
code, but what Anonymous fails to realize is that there will be beta testers
that can make use of the source code.

Additionally there are certain tendencies in the open and closed source
communities that Anonymous and Anderson have not addressed in their models.
The most important tendencies are that in closed source beta testing is
generally handed off to a separate division and the original author does
little if any testing, and in open source the authors have a much stronger
connection with the testing, with the authors' duty extending through the
entire testing cycle. These tendencies lead to two very different positions
than generally realized.

First, closed source testing, beginning in the late Alpha testing stage, is
generally done without any assistance from source code, by _anyone_, this
significantly hampers the testing. This has led to observed situations where
QA engineers sign off on products that don't even function, let alone have
close to 0 bugs. With the software engineers believing that because the code
was signed off, it must be bug-free. This is a rather substantial problem.
To address this problem one must actually correct the number of testers for
the ones that are effectively doing nothing. So while L is the extra
difficulty in finding bugs without source code, it is magnified by something
approximating (testers)/(testers not doing anything). It's worth noting that
(testers)  (testers not doing anything) causing the result K =
L*(testers)/(testers not doing anything), to tend towards infinite values.

In open source we have very much the opposite situation. The authors are
involved in all stages of testing, giving another value. This value is used
to adjust L as before, but the quantities involved are substantially
different. It must be observed, as was done by Anonymous, that there are
testers that have no concept what source code is, and certainly no idea how
to read it, call these harassers. In addition though there are also testers
who read source code, and even the authors themselves are doing testing,
call these coders. So in this case K = L*(harassers)/(harassers+coders).
Where it's worth noting that K will now tend towards 0.

It is also very much the case that different projects have different
quantities of testers. In fact as the number of beta testers grows, the
MTBD(iscovery) of a bug must not increase, and will almost certainly
decrease. In this case each project must be treated separately, since
obviously WindowsXP will have more people testing it (thanks to bug
reporting features) than QFighter3
(http://sourceforge.net/projects/qfighter3/ the lest active development on
sourceforge). This certainly leads to problems in comparison. It is also
worth noting that it is likely that actual difficulty in locating bugs is
probably related to the maximum of (K/testers) and the (testers root of K).
Meaning that WindowsXP is likely to have a higher ratio of bugs uncovered in
a given time period T than QFighter3. However due to the complexity of the
comparisons, QFighter3 is likely to have fewer bugs than WindowsXP, simply
because WindowsXP is several orders of magnitude more complex.

So while the belief that source code makes bug hunting easier on everyone,
is certainly not purely the case (Anonymous's observation), it is also not
the case that the tasks are equivalent (Anonymous's claim), with the
multiplier in closed source approaching infinite, and open source towards 0.
Additionally the quantity of testers appears to have more of an impact on
bug-finding than the discussion of open or closed source. However as always
complexity plays an enormous role in the number of bugs available to find,
anybody with a few days programming experience 

TPM cost constraint [was: RE: Revenge of the WAVEoid]

2002-07-06 Thread Lucky Green

Bill wrote:
 At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
 An EMBASSY-like CPU security co-processor would have seriously blown 
 the part cost design constraint on the TPM by an order of 
 magnitude or 
 two.
 
 Compared to the cost of rewriting Windows to have a 
 infrastructure that can support real security?  Maybe, but 
 I'm inclined to doubt it, especially since most of the 
 functions that an off-CPU security co-processor can 
 successfully perform are low enough performance that they 
 could be done on a PCI or PCMCIA card, without requiring motherboard 
 space.

Upon re-reading the paragraph I wrote, I can see how the text might have
been ambiguous. I was trying to express that there was a cost constraint
on the part. Adding the cost of an EMBASSY or SEE environment to the
purchase of every new PC is more than the market for bare-bones or even
mid-range PC's will bear.

--Lucky