ADV: Lowest life insurance rates available! ypayr

2002-08-14 Thread betternow54i

Lowest rates available for term life insurance! Take a moment and fill out our online 
form to see the low rate you qualify for. Save up to 70% from regular rates! Smokers 
accepted! http://www.takemetothesavings.com/termlife/ 
   
 Representing quality nationwide carriers. Act now!
  
  
  
  
  
 ---
 To unsubscribe, go to: 
 http://www.takemetothesavings.com/stopthemailplease/
 Please allow 48-72 hours for removal.




Overcoming the potential downside of TCPA

2002-08-14 Thread Joseph Ashwood

Lately on both of these lists there has been quite some discussion about
TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :)
However there is something that is very much worth noting, at least about
TCPA.

There is nothing stopping a virtualized version being created.

There is nothing that stops say VMWare from synthesizing a system view that
includes a virtual TCPA component. This makes it possible to (if desired)
remove all cryptographic protection.

Of course such a software would need to be sold as a development tool but
we all know what would happen. Tools like VMWare have been developed by
others, and as I recall didn't take all that long to do. As such they can be
anonymously distributed, and can almost certainly be stored entirely on a
boot CD, using the floppy drive to store the keys (although floppy drives
are no longer a cool thing to have in a system), boot from the CD, it runs
a small kernel that virtualizes and allows debugging of the TPM/TSS which
allows the viewing, copying and replacement of private keys on demand.

Of course this is likely to quickly become illegal, or may already, but that
doesn't stop the possibility of creating such a system. For details on how
to create this virtualized TCPA please refer to the TCPA spec.
Joe




[±¤°í]Á¶È­À¯ÀÇ ÀÌ°ÍÀÌ ¹Ì±¹¿µ¾î´Ù

2002-08-14 Thread jwy
Title: Untitled Document







Á¶È­À¯ÀÇ
¹Ì±¹¿µ¾î
ÃÊ*Ư*°¡*ÀÌ*º¥*Æ®




½Ç»ýÈ°¿¡ °¡Àå °¡±õ°Ô ¹Ì±¹ ÇöÁö¿µ¾î¸¦
¹è¿ï ¼ö ÀÖ´Â
Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î¸¦ º¸´Ù Àú·ÅÇÑ °¡°ÝÀ¸·Î
Á¦°øÇϸç
Àü ±¸¸Å°í°´²² ¹«ºñÀ×±Û¸®½¬¸¦ »çÀºÇ°À¸·Î µå¸³´Ï´Ù.


Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î¡»´Â 100¸¸ºÎ ÀÌ»óÀÇ º£½ºÆ®¼¿·¯ÀÎ
¡¸ÀÌ°ÍÀÌ ¹Ì±¹¿µ¾î´Ù¡¹ÀÇ ÀúÀÚ Á¶È­À¯ ¹Ú»ç°¡ ¹Ì±¹¿¡¼­ 25³â ÀÌ»ó °ÅÁÖÇϸç üÇèÇÑ ÇöÁö ¿µ¾î¸¦ ¾Ë±â ½±°Ô Çؼ³ÇÏ°í ÀÖ´Â ±³ÀçÀÔ´Ï´Ù.


¡ºÁ¶È­À¯ÀÇ ¹Ì±¹¿µ¾î¡»¿¡¼­´Â Çѱ¹ÀÎÀÌ ¿ø¾î¹Î°ú ´ëÈ­¸¦ ¿øÈ°ÇÏ°Ô ³ª´©Áö ¸øÇÏ´Â ¿øÀÎÀ» Áø´ÜÇÏ°í, ½Ç»ýÈ°¿¡¼­ ÈçÈ÷ ³ªÅ¸³ª´Â ¹®Á¦Á¡µéÀ»
¸ð¾Æ ÀÌÇØÇϱ⠽±°Ô ¿¡¼¼À̽ÄÀ¸·Î Ç®¾î³ª°¨À¸·Î½á ½Ç·ÂÇâ»ó¿¡ µµ¿òÀÌ µÇ´Â È¿°úÀûÀÎ ÇнÀ¹æ¹ýÀ» Á¦½ÃÇÏ¿© µå¸³´Ï´Ù. 
*Á¶È­À¯ÀÇ
¹Ì±¹¿µ¾î(CD 10Àå) : Á¤°¡ 120,000¿ø--- ÆǸŰ¡ 99,000¿ø

 
* Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î CD 3Àå(Ã¥10±ÇºÐ·®)
º» ÇÁ·Î±×·¥Àº ÃÑ 550°³ÀÇ ´Ü¿øÀ¸·Î °¢ ´Ü¿ø¿¡´Â ¿µ¹® ´ÙÀ̾ó·Î±×, ÇÑ±Û ´ÙÀ̾ó·Î±×,
¿µ¾îµè±â·Î ÀÌ·ç¾îÁ® ÀÖÀ¸¸ç ½Ç»ýÈ°¿¡¼­ ÈçÈ÷ ¹üÇÏ´Â Äá±Û¸®½¬, ½Ç¼ö´ã, È¥µ¿Çϱ⠽¬¿î
´Ü¾îµé ±×¸®°í ½Ç»ýÈ°¿¡ À¯¿ëÇÑ Ç¥ÇöµéÀ» ¸ð¾Æ ¿¡¼¼À̽ÄÀ¸·Î Çؼ³ÇÏ°í ÀÖ´Â ±³ÀçÀÔ´Ï
´Ù. 
* Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î VOD CD 3Àå(Å×ÀÙ12°³ºÐ·®)
º» ÇÁ·Î±×·¥Àº ÃÑ 81°³ÀÇ ´Ü¿øÀ¸·Î °¢ ´Ü¿ø¿¡´Â ºñµð¿À, ¿µ¹® ´ÙÀ̾ó·Î±×, ÇÑ±Û ´ÙÀÌ
¾ó ·Î±×·Î ÀÌ·ç¾îÁ® ÀÖ½À´Ï´Ù. º» ÇÁ·Î±×·¥Àº MBC¹®È­¹æ¼ÛÀÇ TV¿Í RadioÀÇ »ýÈ°¿µ¾î ÇÁ·Î±×·¥ ±³Àç·Î
äÅõǾî 4³â°£¿¡ °ÉÃÄ ¹æ¼ÛµÇ¾ú´ø ºñµð¿À ÀÚ·á Áß Áß¿äÇÑ ºÎºÐµé¸¸À» µû·Î ÆíÁýÇÏ¿© Á¦ÀÛÇÏ¿´½À´Ï´Ù. 
* Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î MP3 CD 4Àå(Å×ÀÙ80°³ºÐ·®)
Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î AUDIO CD·ÒÀº ÃÑ 550°³ÀÇ ´Ü¿øÀ¸·Î ±¸¼ºµÈ Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾îÀÇ
Àüü³»¿ëÀ» MP3ÆÄÀÏ ¹æ½ÄÀ¸·Î ³ìÀ½ÇÏ¿© ¾ðÁ¦ ¾îµð¼­³ª ¹Ýº¹ ûÃëÇÒ ¼ö ÀÖµµ·Ï Á¦ÀÛ
ÇÏ¿´½À´Ï´Ù. 

*¹«·áÁõÁ¤
: ¹«ºñÀ×±Û¸®½¬(A or BÁß ÅÃ1 )--½ÃÁß°¡
48,000¿ø 
* CCFE¹«ºñÀ×±Û¸®½¬ ¿µÈ­´Â? 
* ¼¼°èÃÖ°íÀÇ °ÉÀÛ ¸íÈ­¸¸À» ¾ö¼±ÇÏ¿© ¼ÒÀå°¡Ä¡°¡ ³ô½À´Ï´Ù

* ÃÖ°íÀÇ È­Áú°ú À½ÇâÀ¸·Î »ý»ýÇÑÀå¸éÀ» ¿¬ÃâÇÕ´Ï´Ù 
* ÃÖ÷´Ü ±â¼úÀ» ÀÌ¿ëÇÏ¿© ¾îÇпëÀ¸·Î Ưº°È÷ Á¦À۵Ǿú½À´Ï´Ù 
* »èÁ¦³ª ÆíÁý¾øÀÌ ¿À¸®Áö³¯ Çʸ² ±×´ë·Î ´ã¾Ò½À´Ï´Ù 
* ¿©·¯±³À°±â°ü ¹× Á¤ºÎ·ÎºÎÅÍ ÀÎÁ¤¹ÞÀº ÃÖ»óÀÇ ¿µ¾î±³ÀçÀÔ´Ï´Ù 
* CCFE MOVIE ENGLISH ÇÁ·Î±×·¥ ¼ö»ó ³»¿ª 
¨ç¸ÖƼ ¹Ìµð¾î ±â¼ú ´ë»ó ÀÀ¿ë S/WºÎºÐ ÃÖ¿ì¼ö»ó 
¨èÁ¤º¸Åë½ÅºÎ µðÁöÅÐ ÄÁÅÙÃ÷ 2001³â 1/4ºÐ±â ´ë»ó 
¨é½Å¼ÒÇÁÆ®¿þ¾î »óÇ°´ë»ó ±³À° ºÎºÐ»ó 
¨êÇѱ¹ »ê¾÷ ±â¼ú Çõ½Å´ë»ó 
¨ëÇÏÀÌÅ×Å© ¾î¿öµå ±â¼ú ´ë»ó 
¨ìAsia Pacific ICT Awards 2001 Merit ¼ö»ó 
¨í¸Å°æ µðÁöÅÐ ÄÁÅÙÃ÷ ºÎ¹® ´ë»ó:¹®È­°ü±¤ºÎÀå°ü»ó 
¨î½ºÆ÷Ã÷ Åõµ¥ÀÌ ¼±Á¤ ¼ÒºñÀÚ Àαâ´ë»ó 
¨ïÇѱ¹±³À°ÇмúÁ¤º¸¿ø ¿ì¼ö±³À°¿ë ¼ÒÇÁÆ®¿þ¾î ÀÎÁõ 

A set : 26CD 
[º¥Çã][¸¶Áö¸· ȲÁ¦] [Å͹̳×ÀÌÅÍII] [Ŭ¸®ÇÁ Çà¾î][»çÀÌ´õ ÇϿ콺] 
[·ÎºóÈÊ] [ÄÚµå³×ÀÓ Äܵ¹] [¶÷º¸II] [¶ó½ºÆ® ¸ðÇÏÄ­][·Î½ºÆ® ÀÎ ½ºÆäÀ̽º] 

B set : 25CD 
[´Á´ë¿Í ÇÔ²² ÃãÀ»] [Áö¿ÁÀÇ ¹¬½Ã·Ï] [¹Ù¶÷°ú ÇÔ²² »ç¶óÁö´Ù] [·Î¹Ì¿À¿Í ÁÙ¸®¿§]
[·¹¿Ë] [ÅäÅ»¸®ÄÝ][ÇÏÀÌ·»´õ] [·ÕÅ°½º ±Â³ªÀÕ] [¿øÃÊÀû º»´É] [µð¾î ÇåÅÍ] 
¡Ù ¹«ºñÀ×±Û¸®½¬´Â ¾¾³×ÆÄÅ©¿ÍÀÇ Á¦ÈÞ·Î Á¶È­À¯ÀÇ
¹Ì±¹¿µ¾î¸¦ ±¸ÀÔÇϽô ºÐ¿¡°Ô ¹«·á·Î Á¦°øµË´Ï´Ù ¡Ù
(Ãßõº¸³Ê½º)
Á¦Ç°±¸ÀÔ ÈÄ ´Ù¸¥ºÐ¿¡°Ô ÃßõÇÏ½Ã¸é ¼ÒÁ¤ÀÇ »çÀºÇ°À» µå¸³´Ï´Ù.
* º» ¸ÞÀÏÀº Á¤º¸Åë½ÅºÎ ±Ç°í»çÇ׿¡ ÀÇ°Å
(±¤°í)ÀÓÀ» ¹àÀÔ´Ï´Ù. Çã¶ô¾øÀÌ È«º¸¸ÞÀÏÀ» º¸³»µå·Á ÁË¼Û ÇÕ´Ï´Ù.
±ÍÇÏÀÇ E-MAILÀº °Ô½ÃÆÇ µî ÀÎÅÍ³Ý »ó¿¡¼­ ¾Ë°Ô µÇ¾úÀ¸¸ç, E-mailÀ» Á¦¿ÜÇÑ ¾î¶°ÇÑ Á¤º¸µµ ¾ËÁö ¸øÇÔÀ» ¹àÈü´Ï´Ù. ÇÊ¿ä¾ø´Â
¸ÞÀÏÀÏ °æ¿ì, ºÒÆíÇϽôõ¶óµµ ¹Ý¼ÛÇÏ¿© ÁÖ½Ã¸é ´õ ÀÌ»ó ¹ß¼ÛµÇÁö ¾Êµµ·Ï ÇÏ°Ú½À´Ï´Ù. 
This mail is designed for a Commercial use to inform a special sales event.
If you don't want this type of information, Press button below and press
left button on next screen will erase your email address from our email
system. Thank you
[¼ö½Å°ÅºÎ]






±¹Á¦±³À°Á¤º¸¼¾ÅÍ
(ÓÛ) ¢Ï 02)678-0150
 www.jwy.co.kr
 








Cleanse and purify your body.

2002-08-14 Thread 5613u31

Dear Natural Health Advocate,

A lifestyle that includes taking medications of any kind, eating too much
cooked food, processed/refined food, meat, dairy, and poultry causes
your body to become congested with mucus. This in turn weakens the function
of your digestive system, elimination organs such as the colon, liver and
kidneys. Changing your diet to include foods which help cleanse your body and
using herbal preparations to speed up the process, create dramatic
improvement in your state of health very quickly.

.I came off the Cleanse today and I am SO IMPRESSED! I could not believe 
the filth and slime that came out! And so MUCH of it! Where does it all come 
from? Amazing! S. Ward, Tucson, Arizona 
_

I went on a colon cleanse a couple of times. And I got just goop out of me that 
no one can believe that is inside a person. Everyday, a gallon of goop. Rope-like 
stuff and intestine-like stuff. I was amazed and I would tell my husband and he
would be amazed. I wouldn't tell anyone else or they'd of thought me mad! 
He was working and couldn't spend the time doing what I was doing. I was 
enjoying it, seeing what the body holds back, holds inside itself. D.L. Lafayette, 
LA.
___

I did both the colon cleanse and the liver-gallbladder cleanse. To my horror I did 
in fact have worms! After they were gone (that took about a month) I did the liver 
thing. I had gall stones... huge things!! This program really works. The pain is gone 
in my arm and back, and I am sleeping through the night. Don't trust MD's. If 
someone is going to practice on me - IT WILL BE ME. Thank you for this site. J.R.
___
I just finished doing the 2 week Complete Colon Cleanse Program. I lost 14 pounds 
and 1 - 1/2 off of my stomach. I feel great! I would like to follow that up now by 
doing the Liver and Kidney cleanses. A.R. Honesdale, PA.
___

Disease is an unnatural condition...

. . . but it's increasing at an alarming rate! 

Due to poor eating habits, it has become increasingly clear that almost 
every person in this country over six years old is developing serious 
problems in the intestinal tract, which in later years may contribute to 
the development of various acute, chronic and degenerative diseases. 
Such diseases include cancer, heart trouble and diabetes; as well as lack 
of energy, premature aging, poor eyesight, memory loss, a poor complexion, 
constipation and wrinkles. It is estimated that over 98% of disease can be 
contributed directly or indirectly to a compromised digestive tract. As Dr. 
Bernard Jensen says, It is the bowel that invariably has to be cared for first 
before any effective healing can take place. 

Low energy level?

People suffer from malnutrition and autointoxication (self-poisoning), 
which result in disease, parasites and filth, all because of a gradual buildup 
of many pockets of waste that has not been eliminated. The healthy colon weighs 
about four pounds, an unhealthy one can weigh more than twice as much. 
Few people realize that the same unhealthy substances found in the colon 
can also abound in the stomach, duodenum and small intestine. 

A polluted intestinal tract...
. . . means dirty blood, poor digestion and low energy. 

When the intestines have too much waste matter, parasites, fungus and 
harmful bacteria, there results a serious interference with the digestive 
process. Even if a person's intestinal tract were polluted with just a mild 
amount of this undesirable filth, he or she could have sluggish peristaltic 
action, which causes constipation. How does the body adjust to cooked food, 
processed food and refined food - dead foods? Victoria Boutenko in her 
book, 12 Steps to Raw Food, explains it this way: The body creates 
mucus and uses this mucus as a filter. All the surfaces of the digestive 
tract that are designed to absorb the nutrients from food become 
covered with mucus film that protects blood from toxins. The mucus film 
begins at the tongue and continues all the way through the intestines. 
Many people can see this mucus on their tongue. People who have a thick 
mucus coating on their intestines usually have white tongues as if they 
just ate sour cream. The body creates a little mucus, to begin with, to 
filter out the toxins from the dead food. The more dead food we consume, 
the more mucus the body produces as a protection. The more harmful 
the food substances are to the body, the more this mucous film builds up. 
As the years go by it becomes thicker and harder. Portions of this thick 
mucus get pushed into pockets called diverticuli as we cram through 
more and more dead food into the digestive tract in an effort to squeeze 
some nutritional value out of it. 

You may ask: What is the mucus made of? The human body, brilliant as 
always, creates the mucus from the dead food itself! This mucus covers our 
entire 

µçÄÔÅä¼þ¹©Ó¦

2002-08-14 Thread [EMAIL PROTECTED]

̨ÖÐÊ¢´ï¼¯ÍÅ´ó½°ìÊ´¦ 
ÎÒ¹«Ë¾³¤ÆÚ¾­ÓªÔ­×°½ø¿Ú²úÆ·.ÏÖÓеçÄÔÅä¼þ.±Ê¼Ç±¾.±Ê¼Ç±¾Åä¼þ.ÊýÂëÏà»ú.ÉãÏñ»ú.ͶӰÉè
±¸. ͶӰ¸½¼þ.Æû³µ.ÊÖ»ú.¼ÒÓõçÆ÷.²Êµç.¿Õµ÷..ÓÐÒâÔÚ¸÷µØ³ÏÕ÷´úÀíÖ±ÏúÉÌ. Ϊ±£Ö¤ÐÅÓþ
ʵÐлõµ½¸¶¿î.
 
Ò²ÐíÄú¶ÔÎÒÃǵļ۸ñÖ®µÍ±íʾ»³ÒÉ,µ«ÄúÊÇ·ñÖªµÀÎÒÃÇ´ÓµçÄÔÊг¡»òÉ̵êÂò»ØÀ´µÄ²úÆ·ÊǾ­
¹ý¸÷¼¶´úÀí²ã²ã¼Ó¼ÛµÄ½á¹û.Ó볧¼Ò³ö³§µÄ¼Û¸ñÓÐ×ÅÌìÈÀÖ®±ð.¶øÎÒÃǹ«Ë¾Í¨¹ýÌØÊâµÄ½ø»õÇþµÀ
ͨ¹ýÍøÂçÖ±ÏúÄÜ°ÑÖмä´úÀí·ÑÓÃÈ«²¿Ìê³ý,ʵÏÖÕæÕýµÄ¿Í»§Ó빫˾˫Ӯ½á¹û.

¿¼Âǵ½ÍøÂçµÄÐÅÓÃÎÊÌâ,ÎÒÃÇËù³öÊ۵IJúÆ·¾ùʵÐлõµ½¸¶¿îµÄÔ­Ôò.ÕâÖÖ·½Ê½Ëä»áÔö¼ÓÎÒÃǵÄ
ÔËÓª³É±¾,µ«ÎÒÃÇÏ£ÍûÒÔ³ÏÐŵķþÎñ°Ñ×Ô¼º×ö´ó×öÇ¿.ÓëÄúÁªÏµºÏ×÷ÊÂÒê.
 ( ÇëÎðÖ±½Ó»Ø¸´£¬ÓÐÒâÇëÀ´µçÁªÏµ.ÁªÏµÈË:ºú¿Ë ÁªÏµµç»°: 0138-59709838) 

 µçÄÔÅä¼þ(RMB.Ôª): 
A:Ö÷°å:
΢ÐÇ 845Pro2-LE(Socket,i845,SDRAM,AC97Éù¿¨) 380Ôª
845Pro (Socket,i845,SDRAM,AC97Éù¿¨) 430Ôª
850Pro5 (Socket,i850,8738Éù¿¨) 520Ôª
645UITRA (Socket478,SiS645оƬ 3DDR AC97) 330Ԫ
K7T266Pro (SocketA,KT266,3DDR,AC97) 310Ôª
K7T266Pro2-LE(SocketA,AC97,ATA100) 270Ôª
K7t266Pro2(SocketA,Ö§³ÖXP,3DDR,AC97) 310Ôª
815EPT Pro-NL(Socket370,i815EP,Ö§³ÖÐÂPIII,AC97,ATA100) 270Ôª
815EP Pro-R (Socket370,i850EP,IDE RAID) 280Ôª
815EP-NL (Socket370,i815EP,AC97) 250Ôª 
815ET Pro (Socket370,i815E,ÐÂPIII,i752,AC97) 340Ôª
694D Pro2-IR (Socket370,VIA694X/686B,RAID) 320Ôª
6309NL100 (Socket370,VIA694X/686B,AC97) 160Ôª
6309NL/-A (Socket370,VIA694X/686B,AC97,´´ÐÂ5880 190Ôª
ÃÀ´ï KT133B (SocketA,KT133/686B,ATA100,AC97) 180Ôª
6VA694XB (Socket370,VIA694x/686B,AC97,ATA100) 135Ôª
°º´ï VP266+128M DDR 295Ôª
VP266 (Socket370,VIA/APOLLO/PRO266/AC97) 200Ôª
VK266 (SocketA,KT133A/686B/AC97/ATA100) 190Ôª
VT-133PLUS(SocketA,KT133/686B/AC97/ATA100) 190Ôª
ID815E (Socket370,i815E/i752/AC97/ATA100) 195Ôª
ID815EP (Socket370,i815EP/AC97/ATA100) 190Ôª
ID810 (Socket370,i810/ATA66/i752ÏÔ¿¨/AC97Éù¿¨) 140Ôª
VP4-133PLUS(Socket370,VIA694x/686B/AC97/ATA100) 160Ôª
Vp4-133/M (Socket370,VIA694/596B/CMI8738Éù¿¨/ATA66) 140Ôª
VP-133 (Socket370,VIA693A/596B/CMI8738Éù¿¨/ATA66) 150Ôª
SIS730S (SocketA,SiS300/AC97/10/100MÍø¿¨) 155Ôª
SIS630E (Socket370,SIS630E/SiS300ÏÔ¿¨/AC97) 175Ôª
B:Ó²ÅÌ
Maxtor(ÂõÍØ)
40GB£¨ Plus 60/É¢£©7200ת\»º´æ:2MB 180Ôª 
40.9GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 160Ôª 
160GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 530Ôª 
120GB£¨D540X/É¢£©5400ת\»º´æ:2MB 350Ôª 
20GB£¨ Plus 60/É¢£© 7200ת\»º´æ:2MB 140Ôª
30GB£¨ Plus 60/É¢£©7200ת\»º´æ:2MB 170Ôª 
81.9GB£¨ 80/É¢£©5400ת\»º´æ:2MB 250Ôª 
20GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 170Ôª 
40GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 180Ôª 
20GB£¨ 541DX/É¢£©5400ת\»º´æ:2MB 160Ôª 
60GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 200Ôª 
20GB£¨ 541DX/ºÐ£©5400ת\»º´æ:2MB 150Ôª 
60GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 220Ôª
80GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 300Ôª 
40GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 160Ôª
20.4GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 140Ôª
40GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 200Ôª 
60GB£¨Plus D740X/ºÐ£©7200ת\»º´æ:2MB 230Ôª
80GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 350Ôª 
40GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 185Ôª 
80GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 280Ôª 
20GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 160Ôª 
40GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 190Ôª 
80GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 280Ôª
60GB£¨ Plus 60/ºÐ£©7200ת\»º´æ:2MB 250Ôª
120GB£¨D540X/ºÐ£©5400ת\»º´æ:2MB 400Ôª 
81.9GB£¨ 80/ºÐ£©5400ת\»º´æ:2MB 270Ôª
60GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 230Ôª 
100GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 800Ôª 
60GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 270Ôª 
160GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 900Ôª 
30.7GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 210Ôª
61.4GB£¨ 80/É¢£©5400ת\»º´æ:2MB 270Ôª
40GB£¨ 536DX/É¢£©5400ת\»º´æ:2MB 170Ôª
15GB£¨531DX/É¢£©5400ת\»º´æ:2MB 160Ôª 
20GB£¨Plus 60/ºÐ£©7200ת\»º´æ:2MB 180Ôª
Ï£½Ý
40.8GB£¨U Series 6£©5400ת\»º´æ:2MB 250Ôª 
40GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 170Ôª 
60GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 200Ôª 
20.4GB£¨U Series 6£©5400ת\»º´æ:512KB 140Ôª 
80GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 250Ôª 
20GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 160Ôª
30GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 170Ôª 
20GB£¨U Series 5£©5400ת\»º´æ:512KB 130Ôª
40GB£¨U Series 5£©5400ת\»º´æ:512KB 160Ôª
20GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 160Ôª 
40GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 170Ôª 
10.2GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 135Ôª 
10GB£¨U Series 5£©5400ת\»º´æ:512KB 100Ôª 
15.3GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 165Ôª
30GB£¨U Series 5£©5400ת\»º´æ:512KB 200Ôª
15.3GB£¨U Series 5£©5400ת\»º´æ:512KB 180Ôª 
ST39236/LW 1ת\»º´æ:2MB\ÈÝÁ¿:9.2GB 350Ôª
ST39236/LCV 7200ת\»º´æ:4MB\ÈÝÁ¿:9.2GB 400Ôª 
IBM
60GB£¨Deskstar 60GXP£©7200ת\»º´æ:2MB 190Ôª 
10GB£¨Travelstar 20GN£©4200ת\»º´æ:512KB 140Ôª
40GB£¨Deskstar 60GXP£©7200ת\»º´æ:2MB 170Ôª
40GB£¨Deskstar 120GXP£©7200ת\»º´æ:2MB 170Ôª 
80GB£¨Deskstar 120GXP£©7200ת\»º´æ:2MB 230Ôª
30GB£¨Travelstar 20GN£©
±Ê¼Ç±¾Ó²ÅÌ\תËÙ:4200ת\»º´æ:512KB 320Ôª
40GB£¨Travelstar 20GN£©
±Ê¼Ç±¾Ó²ÅÌ\תËÙ:4200ת\»º´æ:512KB 400Ôª
120GB£¨Deskstar 120GXP£©
̨ʽ»úÓ²ÅÌ\תËÙ:7200ת\»º´æ:2MB 430Ôª 
18.3GB£¨Ultrastar 36LZX/68£©
·þÎñÆ÷Ó²ÅÌ\תËÙ:1ת\»º´æ:4MB 420Ôª 
18.3GB£¨Ultrastar 36LZX/80£©

Copy all your DVD's

2002-08-14 Thread sonja
Title: Copy DVD Movies Easily!






  






You do not need to
spend hundreds on a DVD burner to copy DVDs! We will show you how to use
your CD-R Writer to create backups of your DVDs that will play in your home
DVD player.

All you need in your computer is a DVD drive that plays DVDs and a CD-R
Writer. You can burn movies on CD-R or CD-RW discs.. 
  
  




Learn the secrets the
DVD companies don't want you to know! You will NEVER have to buy another DVD
again! Trade movies with friends, copy rentals and much more!

Copy only 2 DVD movies and this program has paid for itself! This program is
BANNED from many download web sites because of the secrets we teach you. Get
your copy today! 
  
  


Download It Instantly Here!
  













Click here to
be get off the list











(±¤°í)(°­Ãßõ)Global Web Page

2002-08-14 Thread À±¸íÁØ
Title: Untitled Document





º»¸ÞÀÏÀº ÀÚµ¿¼ö½Å°ÅºÎÀåÄ¡¸¦ 
  ¸¶·ÃÇÏ¿´À¸¹Ç·Î ¼ö½ÅÀ» ¿øÄ¡ ¾ÊÀ¸½Ã¸é ÇÏ´ÜÀÇ ¼ö½Å°ÅºÎ ¹öÆ°À» Ŭ¸¯ÇÏ¿© ÁֽʽÿÀ.  


  
   
´õ ÀÌ»ó, ¼îÇθô  
¿î¿µ¿¡ 
µ·°ú ½Ã°£°ú ¿¡³ÊÁö¸¦ ¼Ò¸ðÇÏÁö ¸¶½Ê½Ã¿À! ¼îÇθô(ÀüÀÚ»ó°Å·¡)»ç¾÷? ÀÌÁ¨ GWP·Î ½ÃÀÛÇϽʽÿÀ! 


¾È³çÇϼ¼¿ä, ¿¹±âÄ¡ ¾ÊÀº ¸ÞÀÏÀ» º¸³»°Ô µÇ¾î Á¤¸» Á˼ÛÇÕ´Ï´Ù. 
±×·¯³ª À̹ø ¸ÞÀÏÀÌ ´Ô¿¡°Ô ¼ÒÁßÇÑ ±âȸ°¡ µÉ°ÍÀÔ´Ï´Ù. 
´ç½Å¿¡°Ô GWP ±Û·Î¹ú 
e-businessÀÇ Á¤º¸¸¦ ¾Ë·Áµå¸®°íÀÚ ÇÕ´Ï´Ù.  
¿ì¼±, Á¦ ¸ÞÀÏÀ» ¹ÞÀ¸¼Ì´Ù¸é, ´ç½ÅÀº ´ÙÀ½ ÇÑ°¡Áö ÁßÀÇ ¹ÝÀÀÀ» º¸ÀÌ½Ç °Å¶ó »ý°¢µË´Ï´Ù. 
1)È£±â½É¿¡ Á» Àо°í, Ä«Æä¿Í ȨÆäÀÌÁö¸¦ µé·¯º¸½Ã°Å³ª 
2)Á¦¸ñ¸¸ º¸°í, "Á¨Àå ¶Ç ½ºÆÔÀ̾ß" ¸¦ ¿¬¹ßÇϽðųª, 
3)"¾ß! ÀÌ ¹ÌÄ£³Ñ¾Æ! ÀÌ·±¸ÞÀÏ º¸³»Áö¸¶! ½Å°íÇϱâ Àü¿¡"¶ó°í ´äÀå±îÁö º¸³»Áֽðųª, 
4)¹Ù·Î ÈÞÁöÅëÀ¸·Î Á÷ÇàÇÑ´Ù 
ÁßÀÇ ÇϳªÀÏ °ÍÀÔ´Ï´Ù. ÀÌ°ÍÀº ´ç¿¬ÇÑ °ÍÀÌ°í, ±×·± »ç¶÷µéÀ» °áÄÚ ³ª»Ú°Ô º¸Áö´Â ¾Ê½À´Ï´Ù. ¿ÀÈ÷·Á Á¦°¡ ¸ÕÀú ½Ç·Ê¸¦ ¹üÇÑ °ÍÀ̴ϱî¿ä.. 
ÇÏÁö¸¸, ÇÑ°¡Áö È®½ÇÇÑ °ÍÀº, Àú´Â ¹ÌÄ¡Áö ¾Ê¾Ò´Ù´Â »ç½ÇÀÌ°í, ÃÖ°íÀÇ »ç¾÷ÀÌ ¾Æ´Ï¾ú´Ù¸é, ½ÃÀÛµµ ÇÏÁö ¾Ê¾ÒÀ» °ÍÀ̸ç, ¶ÇÇÑ ¸ÓÁö¾Ê¾Æ GWP°¡ 
Àü±¹À» ÈÛ¾µ°ÍÀ̶ó´Â »ç½ÇÀÔ´Ï´Ù. 
ÇѹøÂëÀº µé¾îº»½ÅÀûÀÌ ÀÖÀ» ¼öµµ ÀÖ°Ú½À´Ï´Ù¸¸, ±×¶§ Ȥ½Ã, ¹«½ÃÇÏ°í Áö³ªÃĹö¸®¼Ì´Ù¸é, ´Ù½Ã Çѹø ¾Ë¾Æº¸½Ê½Ã¿À..ÃæºÐÈ÷ ±×·²¸¸ÇÑ °¡Ä¡°¡ ÀÖ±â 
¶§¹®ÀÔ´Ï´Ù. ¼³»ç, Áö±Ý ¶Ç ¹«½ÃÇØ ¹ö¸®½Å´ÙÇصµ, ¸ÓÁö¾Ê¾Æ GWP¸¦ ´Ù½Ã Á¢ÇÏ°Ô µÇ½Ç°Ì´Ï´Ù. 
¡¡ 
¿ì¼±, ±¹³»ÀÇ ¿Â¶óÀÎ ÀÎÅÍ³Ý ¼îÇθôÀº ´ë·« 2166 ¿©°³ °¡·® µË´Ï´Ù. ÀÌÁß¿¡¼­, ¿ì¸®µéÀÌ 
¶°¿Ã¸± ¼ö ÀÖ´Â ¼îÇθôÀº °ú¿¬ ¸î °³³ª µË´Ï±î? 
ƯÈ÷³ª, °³ÀεéÀÌ ¼îÇθôÀ» ½ÃÀÛÇÏ¿© ÀüÀÚ»ó°Å·¡ »ç¾÷À» ½ÃÀÛÇÑ´Ù´Â °ÍÀº, ¾àÀ°°­½ÄÀÇ ½ÃÀå¿¡¼­ 5³â,6³â ÀÌ»ó »ýÁ¸Çϱâ¶õ ³Ê¹«³ª ¾î·Æ½À´Ï´Ù. 
¶ÇÇÑ, ¼îÇθô »ç¾÷¿¡ ÀÖ¾î °¡Àå Áß¿äÇÑ °ÍÀº(¼º°øÀ̳Ä,½ÇÆÐ³Ä ¹®Á¦), 
*Á¦Ç°ÀÇ Áú 
*Á¦Ç°ÀÇ °¡Áö ¼ö(Á¾·ù) 
*Á¦Ç°ÀÇ °¡°Ý °æÀï·Â 
*ºü¸¥ ½Ã½ºÅÛÀÇ ±¸Ãà°ú °ü¸®/¿î¿µ 
*(°¡°Ý °æÀï·Â¿¡¼­ µµ»êÇØ ¹ö¸®Áö ¾Ê°í ³¡±îÁö »ì¾Æ³²À» ¸¸Å­ÀÇ)¾ÈÁ¤ÀûÀÎ ÀÚº»±Ý. 
*È«º¸(¸¶ÄÉÆà ´É·Â) 
µîµéÀ» µé ¼ö ÀÖ½À´Ï´Ù. º¸ÅëÀÇ °³ÀεéÀÌ ¿î¿µÇÏ´Â ¼îÇθôµéÀº ÀÌ ¸ðµÎ¸¦ ÃæÁ·½Ãų ¼ö 
¾ø½À´Ï´Ù. ±ÍÇÏ »Ó¸¸ ¾Æ´Ï¶ó, ÀÌ Ä«Æä ȸ¿ø´Ôµé Áß¿¡ ÀÌ·¯ÇÑ °³ÀÎ ¼îÇθô ¿î¿µÇϽô ºÐµé¿¡°Ô´Â ÇÑ°èÀÏ ¼ö ¹Û¿¡ ¾ø½À´Ï´Ù. ¾î¼¸é ´ç¿¬ÇÑ 
ÀÏÀÔ´Ï´Ù. 
»Ó¸¸ ¾Æ´Ï¶ó, .com±â¾÷µéÀÌ ¹«¼öÈ÷ ¸¹ÀÌ »ý°Ü³ª°í Àִµ¥, ±× ÃÖÁ¾ »ýÁ¸À²Àº 0.3%ÀÔ´Ï´Ù.  
±× ¿øÀÎÀº, 1)°­·ÂÇÑ ¿ÀÇÁ¶óÀÎÀÇ ºÎÀç 2)°í°´Ã漺µµÀÇ Ãë¾à 3)Áö³ªÄ£ 
±¤°íºñ ÅõÀÚ 4) ¸íÈ®ÇÑ ¼öÀ͸𵨠ºÎÀç µîÀ» µé ¼ö ÀÖ½À´Ï´Ù. ±×¸®°í,  
IT»ç¾÷À» ÇÏ·Á¸é, 
* Æò±Õ »ç¹«½Ç º¸Áõ±Ý 1¾ï 
* ¼­¹ö »ç¿ë·á ÃÖ¼Ò ¿ù 50¸¸¿ø 
* ÀΰǺñ ÃÖ¼Ò 300-5000¸¸¿ø/¿ù 
* ±âŸ ¿î¿µÀÚ±Ý, ÀÓ´ë·á µî °¢Á¾°æºñ, ±ÝÀ¶ºñµî 
* Åë½Å/Çù·Â¾÷ü ¼ö¼ö·á(¸ÅÃâÀÇ 15%/¿ù) 
* ÃÖ¼Ò ¿ù °íÁ¤ºñ 2000¸¸¿ø/¿ù 
* ±×¸®°í, »ýÁ¸À² 0.3%.! 
---¿Í °°Àº »ç½ÇÀº °ü·ÃºÐ¾ß¿¡¼­ ÀÏÇغ¸½Å ºÐµéÀ̶ó¸é ÃæºÐÈ÷ ³³µæÇÏ½Ç °Ì´Ï´Ù. ÀÌó·³ Áß,¼Ò±Ô¸ð·Î ¾Æ¹«¸® À¯´ÉÇÑ 
ÇÁ·Î±×·¡¸ÓµéÀ» °í¿ëÇؼ­ ½Ã½ºÅÛÀ» ¿î¿µÇØ ³ª°£´Ù Çصµ, (5A1ÀÇ)°ø·æ±â¾÷µé°úÀÇ °æÀï¿¡¼­´Â µµÀúÈ÷ »ó´ë°¡ µÇÁö ¾Ê½À´Ï´Ù. ±×¾ß¸»·Î ¹ÙÀ§¿¡ 
°è¶õÄ¡±â³ª ´Ù¸§ ¾ø½À´Ï´Ù.  
¿ì¼± ¸»¾¸ µå¸®¸é, ¿ì¸®µéÀÇ »ç¾÷Àº ÀÌ¿Í °°Àº °ø·æ±â¾÷ÀÇ ½Ã½ºÅÛ¿¡ Æí½ÂÇÏ¿©, »ç¾÷À» ÇÏ½Å´Ù°í º¸¸é µË´Ï´Ù. 
±×·¯³ª, °³ÀÎÀÌ ¼¼°è¿¡¼­ °¡Àå Å«(¾ÆÁ÷±îÁö) ¼îÇθôÀ» ºÐ¾ç ¹Þ¾Æ À§ Á¶°ÇµéÀ» ¸ðµÎ ÃæÁ·ÇÏ´Â »ç¾÷À» ÇÏ½Ç ¼ö ÀÖ´Â ±âȸ°¡ ÀÖ½À´Ï´Ù.(¹°·Ð, 
GWPÀÇ ¼îÇθô»ç¾÷Àº ÀÌ »ç¾÷ÀÇ ÀüºÎ°¡ ¾Æ´Ñ, ¸¹Àº ¾ÆÀÌÅÛµé ÁßÀÇ ÇϳªÀÏ »ÓÀÔ´Ï´Ù) 
¡Ú¡Ú¡Ú GWP ±Û·Î¹ú e-business ÇÙ½ÉÀÚ·á(¾Æ·¡ 
±×¸²µéÀ» Ŭ¸¯ÇϽøé, °ü·ÃȨÆäÀÌÁö ¶Ç´Â Ä¿¹Â´ÏƼ·Î À̵¿ÇÏ½Ã¾î ´õ ÀÚ¼¼ÇÑ Á¤º¸¸¦ Á¢ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.) 
   
  
  
  
  
   
 
  
   
 
 
 
 
 
 
 

 
 
 
¹Ù·Î ºòÇ÷¡´ÖÀÇ GWP»ç¾÷ÀÔ´Ï´Ù. ±ÍÇÏÀÇ ÀλýÀ» ¹Ù²Ü ¼ö 
ÀÖ´ÂÀýÈ£ÀÇ ¼º°ø ºñÁî´Ï½º ±âȸÀÔ´Ï´Ù. 
ÀÌ¹Ì ´ç½Å¿¡°Ô Çà¿îÀÇ ÆĶû»õ´Â ³¯¾Æ °¬½À´Ï´Ù. ±× »õ¸¦ Àâ¾Æ¼­ ´ç½ÅÀÇ »õÀå¿¡ ³Öµç°¡, 
¾Æ´Ï¸é ¹Ù¶ó¸¸ º¸°í ÀÖ´Ù°¡ ´Ù¸¥ µ¥·Î ³¯¾Æ°¡¹ö¸®°Ô Çϵ簡´Â ´ç½ÅÀÇ ¼±ÅÃÀÔ´Ï´Ù.  

´õ ÀÚ¼¼È÷ ¾Ë¾Æº¸½Ã±â À§Çؼ­ ¾Æ·¡ÀÇ È¨ÆäÀÌÁö ¶Ç´Â Ä«Æ並 °ËÅäÇغ¸½Ã°í ¸ÞÀÏ·Î »çÀå´ÔÀÇ ¼ºÇÔ°ú ¿¬¶ôó¸¦ ³²°Ü ÁֽøéÀº  
Áï½Ã Á¦°¡ ¿¬¶ôµå¸®°í ¾È³» ÀڷḦ º¸³»µå¸®°Ú½À´Ï´Ù.  

GWPŬ·´ÀÌ ´ç½ÅÀÌ ¼º°øÀ» ÇÏ´Â ±×³¯±îÁö ÇÔ²² ÇÒ°ÍÀÔ´Ï´Ù.  
   
ÀÚ·áÁ¦°ø:  http://cafe.daum.net/iwgwp 
 Home:  www.newgwp.com.ne.kr 
GWPŬ·´ ½ºÆù¼­ À±¸íÁØ phone: 0505-835-0648 e-mail: [EMAIL PROTECTED]  
¡¡ 
  
¡¡ 
¡¡ 

 









Best FREE Adult Content Web Sites FREE !! FREE !! FREE !! FREE !!

2002-08-14 Thread HUGH ROD
Title: This site contains adult material of an offensive nature









This
site contains adult material of an offensive nature. If you are under 21
years
of age or if it is illegal to view adult material in your community, please
leave now. We can't be held responsible for your actions. Continuing
further means that you understand and accept responsibility for your own
actions, thus releasing the creators of this webpage and our service
provider
from all liability. All models are over 18 at the time of
photography.







Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Ben Laurie

Joseph Ashwood wrote:
 Lately on both of these lists there has been quite some discussion about
 TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :)
 However there is something that is very much worth noting, at least about
 TCPA.
 
 There is nothing stopping a virtualized version being created.
 
 There is nothing that stops say VMWare from synthesizing a system view that
 includes a virtual TCPA component. This makes it possible to (if desired)
 remove all cryptographic protection.
 
 Of course such a software would need to be sold as a development tool but
 we all know what would happen. Tools like VMWare have been developed by
 others, and as I recall didn't take all that long to do. As such they can be
 anonymously distributed, and can almost certainly be stored entirely on a
 boot CD, using the floppy drive to store the keys (although floppy drives
 are no longer a cool thing to have in a system), boot from the CD, it runs
 a small kernel that virtualizes and allows debugging of the TPM/TSS which
 allows the viewing, copying and replacement of private keys on demand.
 
 Of course this is likely to quickly become illegal, or may already, but that
 doesn't stop the possibility of creating such a system. For details on how
 to create this virtualized TCPA please refer to the TCPA spec.

What prevents this from being useful is the lack of an appropriate 
certificate for the private key in the TPM.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Carl Ellison

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 10:58 PM 8/13/2002 -0700, Joseph Ashwood wrote:
Lately on both of these lists there has been quite some discussion
about TCPA and Palladium, the good, the bad, the ugly, and the
anonymous. :) However there is something that is very much worth
noting, at least about TCPA.

There is nothing stopping a virtualized version being created.

The only thing to stop that is the certificate on the TCPA's built-in
key.  You would have to shave one TCPA chip and use its key in the
virtualized version.  If you distributed that shaved key publicly or
just to too many people, then its compromise would likely be detected
and its power to attest to S/W configuration would be revoked.

However, if you kept the key yourself and used it only at the same
frequency you normally would (for the normal set of actions), then
the compromise could not be detected and you should be able to run
virtualized very happily.

That's one of the main problems with TCPA, IMHO, as a security
mechanism: that its security depends on hardware tamper resistance --
but at the same time, the TPM needs to be a cheap part, so it can't
be very tamper resistant.

 - Carl

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.8

iQA/AwUBPVpb2XPxfjyW5ytxEQIaAgCgh72smP3W6qclzgRbNiWt5prdpk4AmwWw
aKNdDfQbHWxRVJ3yQ02FxtJb
=eEI+
-END PGP SIGNATURE-


+--+
|Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme |
|PGP: 75C5 1814 C3E3 AAA7 3F31  47B9 73F1 7E3C 96E7 2B71   |
+---Officer, arrest that man. He's whistling a copyrighted song.---+




Re: Spam blocklists?

2002-08-14 Thread Marcel Popescu

From: James A. Donald [EMAIL PROTECTED]

 Solution is obvious and has been known for a long time
 Integrate payment with email.  If anyone not on your approved
 list wants to send you mail, they have to pay you x, where x is
 a trivial sum, say a cent or two.

 Spammers wind up sending huge amounts of mail to unmonitored
 mailboxes, which will make spamming unprofitable.

There is also Wei Dai's idea of b-money, I think, which requires every
incoming mail to solve a problem about hashes. This could be included in the
SMTP protocol, so that the server can generate the challenge dinamically (to
prevent replays). This would limit the amount of spam without requiring any
real money.

Mark




RE: Polio, DES Crack, and Proofs of Concept

2002-08-14 Thread Trei, Peter

 Khoder bin Hakkin[SMTP:[EMAIL PROTECTED]] wrote:
 
 In the most recent _Science_ some biologists gripe that the scientists
 who synthesized infectious
 poliovirus from its description were not doing anything novel, just a
 prank.  Any biologist
 would have known that, since you could concatenate nucleotide strings,
 and since polio needs nothing
 besides DNA (eg no enzymes) to be infectious, obviously you can synth
 polio.
 
 This is *remarkably* similar to cognescenti reactions to the DES Crack
 project.  Yes, it was
 obvious it would work, and it was largely unnecessary (from a
 security-planning perspective)
 to actually do it.  But it was proof-of-concept.  Like synthesizing
 polio.
 
Yes, it was obvious to any technically educated person. 

Nevertheless, until it was done, there were USG officials claiming 
that it was impossible; that any real DES cracker would melt down,
and we ought to be happy with 56 bit DES. Politicians and government 
employees lie, and they usually get away with it. 

Of course, the very statement that '56 bit DES is uncrackable, so there
is no need for you to export anything better' is inherently 
self-contradictory - if it's really uncrackable, then there is not rational
reason not to allow export of 128 or 512 bit symmetrical encryption
as well - uncrackable is uncrackable, after all.

I started the DES crack project after the USG had magnaminiously 
proposed raising the limit for exportable key lengths from 40 to 
56 bits. I got RSA to put up the money, and worked with RSA Labs
on the format of the challenges.  They succeeded in every way I
could have wanted.

In the real world, one conclusive demo is worth a thousand 
theoretical papers.

Peter Trei




Re: Spam blocklists?

2002-08-14 Thread Sunder

None of those things work.  Most spammers don't give a shit if you don't
receive email.  I can attest to this by the slew of spam going to
hostmaster, webmaster, and the like on many networks.  What they're really
selling is ten million addresses and spam software.  Even if 9 million
of those are bullshit, they couldn't care less.  The more things with @
signs in'em the more money they make off clueless businesses.

--Kaos-Keraunos-Kybernetos---
 + ^ + :NSA got $20Bill/year|Passwords are like underwear. You don't /|\
  \|/  :and didn't stop 9-11|share them, you don't hang them on your/\|/\
--*--:Instead of rewarding|monitor, or under your keyboard, you   \/|\/
  /|\  :their failures, we  |don't email them, or put them on a web  \|/
 + v + :should get refunds! |site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net 

On Wed, 14 Aug 2002, Marcel Popescu wrote:

 From: James A. Donald [EMAIL PROTECTED]
 
  Solution is obvious and has been known for a long time
  Integrate payment with email.  If anyone not on your approved
  list wants to send you mail, they have to pay you x, where x is
  a trivial sum, say a cent or two.
 
  Spammers wind up sending huge amounts of mail to unmonitored
  mailboxes, which will make spamming unprofitable.
 
 There is also Wei Dai's idea of b-money, I think, which requires every
 incoming mail to solve a problem about hashes. This could be included in the
 SMTP protocol, so that the server can generate the challenge dinamically (to
 prevent replays). This would limit the amount of spam without requiring any
 real money.
 
 Mark




Re: [WLG]: Regarding HAARP Technologies

2002-08-14 Thread gfgs pedo

hi,

The HAARP,project is in Alaska and they claim,that
their experiments are precise and can ionise the
particluar region of interest unlike russian ones
which ionise in bulk and is not a hazard.
I am not very sure,i follow ur mail.

Regards Data.

--- Wilfred L. Guerin [EMAIL PROTECTED] wrote:
 [Repost Openly.]
 
 Though my knowledge of various technologies that are
 sometimes called
 HAARP type weapons or technologies associated
 thereto due to
 technological similarities is vast, some recent
 events should be thoroughly
 examined and publicised in order to prevent
 large-scale mass-destruction
 issues or stimulators of global conflict.
 
 Let us start with an examination of fact:
 
 Pull up NOAA Weather maps for the weeks around the
 1st of August, 2002.
 
 Notice a large Tropical storm in the northern Gulf
 Coast (South-eastern
 USA), one that does not move for over a week.
 
 Notice, in this storm development, that regardless
 of strong jetstream,
 altitude winds to the east/etc in significant force
 for cloud motion in all
 other regions in parallel fashion, this storm
 cluster did NOT move or
 change physical arrangement for almost a whole week.
  Do you see windward trailing ripples in the
satilite
 and weather imagry?
 
 ---
 
 Now, granted I publicly started referencing these
 issues 
=== message truncated ===


__
Do You Yahoo!?
HotJobs - Search Thousands of New Jobs
http://www.hotjobs.com



Recall,Recall,Recall.

2002-08-14 Thread Matthew X

protecting content from metaphor shear
Authentica NetRecall
by Charlie Cho
March 2002 
Creators and users of digital documents often suffer what author Neal
Stephenson dubbed metaphor shear, the realization that an
established metaphor is unsuitable for the concept to which it refers.
Stephenson cites his experiences with word processors as a prime example:
When the power goes out, any unsaved text in a digital document is lost.
Traditional documents written with pen and paper have no such
problems.
Similarly, anyone who has bookmarked a Web page only to find the site
offline upon return, is a victim of metaphor shear. This sort of
impermanence is at odds with the traditional notion of a document as
something persistent, perhaps even intended for posterity. 
A close comparison of digital documents with their analog counterparts
reveals numerous inconsistencies like this one. 
For instance, while analog documents require some effort to duplicate
(even with a Xerox machine), digitized documents are copied constantly in
the course of normal use. Outdated copies can linger for an extremely
long time on backup tapes.
Metaphor shear becomes an even more extreme problem in situations when
digital documents replace physical ones in established rights management
procedures. Typically, these procedures involve sensitive or valuable
information, especially when the information's circulation must be
limited. For example, a company might require executives to stamp
indications like draft or confidential on certain papers, and those
papers must be shredded after use to preserve plausible deniability. In
addition, copyright and fair use laws were conceived and fine-tuned
during the paper age. It's for this reason, that digital rights
management has become so complex and expensive.More,(ad for
windows,rsa,crud.)
http://www.newarchitectmag.com/documents/s%3D2457/new1011397127626/



Greeneland

2002-08-14 Thread Matthew X

http://www.theregister.co.uk/content/6/26675.html
Fastest way to freshmeat? Follow a vulture.
Internet pioneer David Reed recently pointed out that in the early years, 
efforts to incorporate end-to-end encryption into the base standards of the 
Net were reportedly discouraged for reasons of national security.
But weak encryption is no longer a reasonable excuse for insecure 
systems. It's clear by now that real security comes not just from strong 
crypto, but from recognizing and embracing human strengths, frailties and 
common behaviors in building, managing and using complex systems. People 
are always the weakest link.MORE from the mighty OZ...
http://news.com.com/2010-1071-949678.html?tag=fd_nc_1






SS tawdry and sometimes illegal. GET OUT!

2002-08-14 Thread Matthew X

http://www.washingtonpost.com/wp-dyn/articles/A14617-2002Aug13.html
Since July 1998, the number of special agents has grown by 705, for a total 
of 2,939 -- a 32 percent increase. The service's budget has exploded since 
1999, growing 75 percent to a proposed $1.05 billion next year.
Drawbacks?
Jacksons games? In June, U.S. News  World Report catalogued tawdry and 
sometimes illegal activities by Secret Service agents over 25 years, 
involving sex, drugs, theft, brawling, inebriation and corruption. Four 
agents assigned to Vice President Cheney fought in a San Diego bar, and 
agents on assignment at the Salt Lake City Olympics came under 
investigation about a possible sexual assault on a minor in February. Last 
month, an agent was suspended after he scrawled Islam is evil, Christ is 
king on a Muslim prayer calendar during a search of a Michigan suspect's 
home. Fergeddaboudit!




Al-Jazeera considered harmful.

2002-08-14 Thread Matthew X

http://www.arabnews.com/Article.asp?ID=17751Misusing
freedom of expression
Abdullah Farraj Al-Sharif/Al-Madinah
Freedom of expression has long been absent in the Arab world. While all Arab intellectuals emphasize the need for it, they do not accept the wild lies and prevarications dished out regularly by the Qatar-based Al-Jazeera on a round-the-clock basis. The station chooses guests with dubious qualifications to participate in what is arguably the worst kind of talk show.
Guests rant and rave, reminding viewers of a brawl. The participants are never concerned with the authenticity of evidence used to support their arguments. Such shows, which are not often broadcast by other stations in other parts of the world, spew hatred and hostility all around.
Viewers wonder at the apparent contradiction in the way the station presents programs and in what its goals really are. Its motto is ‘Opinion and the Other Opinion’ but the station’s performance has proved that the ‘other opinion’ has no place in its broadcasts. When a topic is discussed — Iraq, for example — the discussion rambles on interminably. Viewers who may or may not know anything about the topic participate by telephone. The moderator puts questions to them but they are not allowed to express a dissenting opinion. Questions are phrased in such a way that the desired answer is implied and it is thus clear what the participants are expected to say. The trick usually works as unsuspecting participants initially agree with the moderator and later when the trap has become obvious, the participant protests that he or she has not been allowed to state his views. At this point the moderator jumps in to say angrily, “We are discussing the likelihood of America’s attacking Iraq and not the station’s style of presentation.”
The station’s objective becomes quite clear to those who watches it for some time. It aims at the total surrender of all Arab interests to American policies. The station seems to follow a skillfully-devised scheme, which is much worse than either covert or overt Zionist schemes, to deprive Arabs of all their legitimate rights. The viewers, who see through the station’s evil designs, are at a loss to explain why a Gulf country continues to finance a station which has ruined good relations with a number of Arab countries because of its baseless criticisms and allegations. If the station is impartial in its treatment, one wonders why it never discusses the state of affairs in Qatar. Is Qatar an ideal and infallible state while all other Arab states and governments and countries deserve to be condemned?
Though I have been frank in my opinions about the way the station operates, I want to stress my keenness to maintain our close family and cultural ties with our brothers in Qatar despite the efforts of the TV station to ruin them.
14 August 2002
http://www.cursor.org/aljazeera.htm


2 Pak shaker.Get it India.

2002-08-14 Thread Matthew X

http://www.expressindia.com/fullstory.php?newsid=13796
RAW, India's equivalent of CIA, is
involved in acts of terrorism ... 
indianterrorism.mybravenet.com/RAWFacts.htm
- 3k - Cached -
Similar pages 
... intelligence agencies continue, Harrison said. The
CIA still has close
links with the ISI (Pakistan's Inter-Services
Intelligence).. ... 
rawa.fancymarketing.net/cia-talib.htm - 7k -
Cached -
Similar pages 
Muzi.com | LatelineNews : CIA says China
helped Pakistan's ... 
... Muzi.com : Muzi (English) : News : CIA says
China
helped Pakistan's missile program GB Big5. ... 
latelinenews.com/ll/english/81839.shtml - 19k -
Cached -
Similar pages 
How the CIA created Osama bin Laden
... MAK was a front for Pakistan's CIA,
the Inter-Service Intelligence
Directorate. The ISI was the first recipient of the vast bulk ...

www.greenleft.org.au/back/2001/465/465p15.htm
- 16k - Cached - Similar pages 
CRG -- Cover-up or Complicity of the Bush Administration? The ... 
... Also bear in mind that Pakistan's ISI remained throughout the entire post Cold
War era until the present, the launch pad for CIA covert operations in the ... 
www.globalresearch.ca/articles/CHO111A.html - 33k - Cached - Similar pages 
2/19/96 INT/ASIA: PAKISTAN'S BOMB VS. TRADE
... destruction. The CIA says China has secretly shipped 5,000 ring magnets
to Pakistan's nuclear laboratory at Kahuta. The magnets ... 
pathfinder.com/time/international/ 1996/960219/china.trade.html - 7k - Cached - Similar pages 
...Critics of the ISI say that it has become a state within a state, answerable neither to the leadership of the army, nor to the President or the Prime Minister. The result is there has been no real supervision of the ISI, and corruption, narcotics, and big money have all come into play, further complicating the political scenario. Drug money was used by ISI to finance not only the Afghanistan war, but also the ongoing proxy war against India in Kashmir and Northeast India. 
The Joint Chiefs of Staff Committee deals with all problems bearing on the military aspects of state security and is charged with integrating and coordinating the three services. Affiliated with the committee are the offices of the engineer in chief, the director general of medical service, the Director of Inter-Services Public Relations, and the Director of Inter-Services Intelligence. 
Staffed by hundreds of civilian and military officers, and thousands of other workers, the agency's headquarters is located in Islamabad. The ISI reportedly has a total of about 10,000 officers and staff members, a number which does not include informants and assets. It is reportedly organized into between six and eight divisions: 
FROM
http://www.fas.org/irp/world/pakistan/isi/
Elsewhere in India, the ISI offers monetary rewards , sex, and other attractions to cultivate agents.
http://www.ipcs.org/issues/articles/191-ip-krishna.htm
Espionage, euphemistically called the second oldest profession of the world finds a mention in the Indian Vedas, one of the most - if not the most - ancient of the human texts. 
http://www.defencejournal.com/feb-mar99/raw-at-war.htm
RAW hijacking trauma.
Indian lies about IC 814 hijack exposed!
... statement added. Pakistan News Service/Information Times, December 28,
1999. Is Indian RAW Agent SBS Tomar Behind the Hijacking Drama? ... 
indianterrorism.mybravenet.com/Nepal3.htm - 14k - Cached - Similar pages 
India's shadowy policies against Nepal should be condemned by the ... 
... 2000 RAW official on hijacked flight IC 814: Asiaweek BY OUR POLITICAL CORRESPONDENT
A stunning new bit of information on the Indian Airlines airbus hijacking ... 
indianterrorism.mybravenet.com/Nepal1.htm - 13k - Cached - Similar pages
[ More results from indianterrorism.mybravenet.com ] 
Arrested ISI agent played key role in hijacking of IA plane
Arrested ISI agent played key role in hijacking of IA plane. DH News
Service Deccan Heral April 27, 2000: Previous message: The Marxist ... 
www.hvk.org/articles/0400/61.html - 8k - Cached - Similar pages 
Pak diplomat was involved in the hijacking of IA plane
... Sources told 'The Times of India' that intelligence agencies had a opened dossiers
on suspected ISI agents and their activities long before the hijacking of ... 
www.hvk.org/articles/0401/59.html - 8k - Cached - Similar pages
[ More results from www.hvk.org
While CIA's have been known to start wars,a 'bay of pigs' is considered unlikely.Northwoods maybe,not bay of pigs.


godsucks.com

2002-08-14 Thread Matthew X

http://www.freedomforum.org/templates/document.asp?documentID=16732
Florida pledge flap,why do they bother when taxpayer funded madrasses's
are underway?
Education-FaithbasedLinks
... Many faith-based organizations,
denominations, coalitions and local congregations
actively work ... specific task forces to address the issue
through education, ... 
www.webofcreation.org/education/faithbasedlinks.htm
- 40k - Cached - Similar pages 



Police special unit to watch for army coup.

2002-08-14 Thread Matthew X

Fiji Times - First Newspaper To Be Published In The World Today -they are
actually being so close to the International date line.
The fiji village.
Police Forces sets up special unit to monitor
Military
The police force will soon set up a special unit to monitor
the military to avoid the chance of another coup.
more
http://www.fijivillage.com/
RR.
Every country should have one of these units,if they have to have a
police force.


Bnet interactive -Click here to rate all films by Robert Hansen.

2002-08-14 Thread Matthew X

Try not to set off automatic NSA search and locate scanning
software.
http://www.foreignfilms.com/person.asp?person_id=49748
Kaerlighed Ved Forste Hik (1999) 
Add to my
favorites •
Email this page to
a friend 
Also known as:
Love At First Hiccup (USA)
Starring: Robert
Hansen,
Sofie
Lassen-Kahlke 
Genre:
Comedy (add) 
Set in: Small town, Denmark (add) 
Keywords: heart warming, sex (add) 
Runtime: 80 minutes
Country: Denmark
Language: 
Color: Color

This film was added by: thenextwhitlam 





Toners and inkjet cartridges for less.... IH

2002-08-14 Thread Danielle




  
Tremendous Savings
on Toners,

Inkjets, FAX, and Thermal Replenishables!!
Toners 2 Go
is your secret
weapon to lowering your cost for High Quality,
Low-Cost printer
supplies! We have been in the printer
replenishables business since 1992,
and pride ourselves on rapid response and outstanding
customer service.
What we sell are 100% compatible replacements for
Epson, Canon, Hewlett Packard,
Xerox, Okidata, Brother, and Lexmark; products that
meet and often exceed
original manufacturer's specifications.
Check out these
prices!
  Epson Stylus
Color inkjet cartridge
(SO20108): Epson's Price:
$27.99 
Toners2Go price: $9.95!
HP
LaserJet 4 Toner Cartridge
(92298A):
HP's
Price:
$88.99
Toners2Go
  price: $41.75!

Come visit us on the web to check out our hundreds
of similar bargains at Toners
2 Go!




  request to be removed by clicking HERE



jmc






Re: TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)

2002-08-14 Thread Ben Laurie

Adam Back wrote:
 The remote attesation is the feature which is in the interests of
 third parties.
 
 I think if this feature were removed the worst of the issues the
 complaints are around would go away because the remaining features
 would be under the control of the user, and there would be no way for
 third parties to discriminate against users who did not use them, or
 configured them in given ways.
 
 The remaining features of note being sealing, and integrity metric
 based security boot-strapping.
 
 However the remote attestation is clearly the feature that TCPA, and
 Microsoft place most value on (it being the main feature allowing DRM,
 and allowing remote influence and control to be exerted on users
 configuration and software choices).
 
 So the remote attesation feature is useful for _servers_ that want to
 convince clients of their trust-worthiness (that they won't look at
 content, tamper with the algorithm, or anonymity or privacy properties
 etc).  So you could imagine that feature being a part of server
 machines, but not part of client machines -- there already exists some
 distinctions between client and server platforms -- for example high
 end Intel chips with larger cache etc intended for server market by
 their pricing.  You could imagine the TCPA/Palladium support being
 available at extra cost for this market.
 
 But the remaining problem is that the remote attesation is kind of
 dual-use (of utility to both user desktop machines and servers).  This
 is because with peer-to-peer applications, user desktop machines are
 also servers.
 
 So the issue has become entangled.
 
 It would be useful for individual liberties for remote-attestation
 features to be widely deployed on desktop class machines to build
 peer-to-peer systems and anonymity and privacy enhancing systems.
 
 However the remote-attestation feature is also against the users
 interests because it's wide-spread deployment is the main DRM enabling
 feature and general tool for remote control descrimination against
 user software and configuration choices.
 
 I don't see any way to have the benefits without the negatives, unless
 anyone has any bright ideas.  The remaining questions are:
 
 - do the negatives out-weigh the positives (lose ability to
 reverse-engineer and virtualize applications, and trade
 software-hacking based BORA for hardware-hacking based ROCA);
 
 - are there ways to make remote-attestation not useful for DRM,
 eg. limited deployment, other;
 
 - would the user-positive aspects of remote-attestation still be
 largely available with only limited-deployment -- eg could interesting
 peer-to-peer and privacy systems be built with a mixture of
 remote-attestation able and non-remote-attestation able nodes.

A wild thought that occurs to me is that some mileage could be had by 
using remotely attested servers to verify _signatures_ of untrusted 
peer-to-peer stuff. So, you get most of the benefits of peer-to-peer and 
the servers only have to do cheap, low-bandwidth stuff.

I admit I haven't worked out any details of this at all!

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




Homeland security-Imagine it done.

2002-08-14 Thread Matthew X

The Transportation Security Administration has awarded the first two work 
orders for its information technology infrastructure.
TSA tapped Unisys Corp. for the agency's billion-dollar Information 
Technology Managed Services (ITMS) program Aug. 2 but postponed making an 
official award until meeting with an investment review board.
A group led by the Office of Management and Budget and the Office of 
Homeland Security is assessing all projects valued at more than $500,000 at 
agencies, including TSA, slated to go into the proposed Homeland Security 
Department.
http://www.fcw.com/fcw/articles/2002/0812/web-tsa-08-14-02.asp




Dr livingstone I presume...

2002-08-14 Thread Matthew X

Hi there...http://www.asial.com.au/
...The Brookings Institution, a Washington
think tank has estimated that the overall cost of the September 11
attacks to the U.S. economy was between $100-$125 billion, or one percent
of the nation’s GDP. Over the next decade government and the private
sector combined will spend somewhere between $500 billion and $1 trillion
dollars on homeland security. This figure could be even significantly
higher if the U.S. experiences additional major terrorist attacks in the
coming months and years. 
Among the areas projected to enjoy the greatest growth potential in the
security sector are biometric systems, business continuity systems and
services, aviation security, chem-bio defence, and new technologies for
non-invasive inspection of containers and other cargo. Construction
security is also booming. 
Dr. Livingstone (pictured
right) Chairman  CEO of
GlobalOptions, author and world-renowned crisis management expert
will be presenting at the Security 2002 conference. 
More info on Security 2002
conference More info on Dr. Livingstone 



Elephants graveyard.

2002-08-14 Thread Matthew X

White House
Writers Group 
White House Writers Group
consists of former White House speechwriters who provide a range of
communication services including speech writing; drafting and placing
opinion-editorials; writing and staging presentations; and planning and
strategy.
http://www.globalops.com/alliances.html
Globalops?
GlobalOptions Inc., headquartered in Washington, D.C., is a
multi-disciplinary, international, risk management and business
intelligence company. Our staff of professionals includes former
intelligence and law enforcement officers, veterans of America's elite
military units, and legal and crisis communications specialists.
We provide a broad spectrum of unique services and innovative solutions
to commercial, government, and individual clients. Never before have all
these services been assembled under a single umbrella to provide a
comprehensive approach to solving difficult business and government
problems.
Recent assignments include the protection of fissile material in Russia,
corporate crisis management, the recovery of assets, due diligence in
major merger and acquisition (MA) cases, undercover investigations
of NAFTA violations, and coordination of all legal defense efforts
associated with the largest civil RICO action in U.S. history.
GlobalOptions' Advisory Board is chaired by former Chairman of the Joint
Chiefs of Staff, Admiral William Crowe, and is comprised of many
distinguished individuals, including a former CIA Director, a former
British Trade Minister, and a number of retired ambassadors and military
leaders.
http://www.globalops.com/index.htm


Hello cyou812 , 100% FREE TEEN ACTION!

2002-08-14 Thread tara8866783
Dear cyou812 ,



100% FREE ADULT HARDCORE!


CLICK HERE






You have received this advertisement because you have opted in to receive 
free adult internet offers and 

specials through our affiliated websites. If you do not wish to receive 
further emails or have received the 

email in error you may opt-out of our database by clicking here: 
CLICK HERE
Please allow 24hours for removal.
This e-mail is sent in compliance with the Information Exchange Promotion and
Privacy Protection Act. 

section 50 marked as 'Advertisement' with valid 'removal' instruction.



 [E^3247(^(PO1:KJ)_8J7BJK9^":}H&*TG0BK5NKIYs5]




[±¤°í]¼Õ¹ß(Åé) ¹«Á» ±»Àº»ì °¡·Á¿ò ¶¡ ¼Ò¼öÆ÷¼º ¹°Áú ÀÌÁ¨ ¾È³ç!

2002-08-14 Thread tami814
Title: Áö°Ü¿î ¹«Á»¿¡¼­ Å»ÃâÇϱâ




















































¿À·¡µÈ ¼Õ¹ß(Åé)¹«Á»ÀÌ ÀÖÀ¸½ÅºÐ.





20³âÀÌ»óµÈ ¹«Á»À¸·Î, ¹«Á»ÇؼҸ¦ Æ÷±âÇϽźÐ.





º¸¼Ûº¸¼ÛÇÏ°í ¸Å²ô·¯¿î ¹ßÀ» µÇã°í ½ÍÀº ¸ðµçºÐ.





¹ßÀÌ ½ÉÇÏ°Ô °¡·Á¿ì½ÅºÐ.





¹°ÁýÀÌ ÀÚ²Ù ÀâÈ÷½Ã´ÂºÐ.





°¢ÁúÀÌ ¸¹ÀÌ ÀϾ¼­ ½ºÅ¸Å· ½ÅÀ¸¸é ¿ÃÀÌ Ç®¸®½Ã°Å³ª ¿Ü°ü»ó 
µÞ²ÞÄ¡°¡ ÈäÇѺÐ.





¹ß¿¡ ¶¡ÀÌ ¸¹À̳ª°í, ¹ß³¿»õ°¡ ½ÉÇѺÐ.





¹«Á»È¯°æÀ¸·Î ÀÎÇØ Á¤½ÅÁýÁßÀÌ ¾ÈµÇ½Ã´ÂºÐ.














* º» Á¦Ç°Àº ÀǾàÇ°ÀÌ ¾Æ´Õ´Ï´Ù.















ȸ»ç¸í : »þÇÁ·Ð(saffron) ¼ö¿ø½Ã ±Ç¼±±¸ ±Ç¼±µ¿
941-8(2Ãþ) 
Tel : 031-236-1114



»ç¾÷ÀÚµî·Ï¹øÈ£ : 124-17-96663
Åë½ÅÆǸŽŰí Á¦1668È£















-Á¤ÅëºÎ ±Ç°í»çÇ׿¡ ÀÇÇÑ ±¤°í¸ÞÀÏ- 
±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼ÒÀÌ¿Ü¿¡ ¾î¶°ÇÑ Á¤º¸µµ °¡Áö°í ÀÖÁö ¾Ê½À´Ï´Ù. 
Ȥ¿© ºÒÆíÇϼ̴ٸé Á¤ÁßÈ÷ ¸Ó¸®¼÷¿© »ç°ú µå¸®¿À¸ç ¼ö½ÅÀ» ¿øÇÏÁö ¾ÊÀ¸½Å ºÐÀº ȸ½ÅÇÏÁö ¸¶½Ã°í ²À!



 ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.


















Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Joseph Ashwood

- Original Message -
From: Ben Laurie [EMAIL PROTECTED]
 Joseph Ashwood wrote:
  There is nothing stopping a virtualized version being created.

 What prevents this from being useful is the lack of an appropriate
 certificate for the private key in the TPM.

Actually that does nothing to stop it. Because of the construction of TCPA,
the private keys are registered _after_ the owner receives the computer,
this is the window of opportunity against that as well. The worst case for
cost of this is to purchase an additional motherboard (IIRC Fry's has them
as low as $50), giving the ability to present a purchase. The
virtual-private key is then created, and registered using the credentials
borrowed from the second motherboard. Since TCPA doesn't allow for direct
remote queries against the hardware, the virtual system will actually have
first shot at the incoming data. That's the worst case. The expected case;
you pay a small registration fee claiming that you accidentally wiped your
TCPA. The best case, you claim you accidentally wiped your TCPA, they
charge you nothing to remove the record of your old TCPA, and replace it
with your new (virtualized) TCPA. So at worst this will cost $50. Once
you've got a virtual setup, that virtual setup (with all its associated
purchased rights) can be replicated across an unlimited number of computers.

The important part for this, is that TCPA has no key until it has an owner,
and the owner can wipe the TCPA at any time. From what I can tell this was
designed for resale of components, but is perfectly suitable as a point of
attack.
Joe




Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Ben Laurie

Joseph Ashwood wrote:
 - Original Message -
 From: Ben Laurie [EMAIL PROTECTED]
 
Joseph Ashwood wrote:

There is nothing stopping a virtualized version being created.

 
What prevents this from being useful is the lack of an appropriate
certificate for the private key in the TPM.
 
 
 Actually that does nothing to stop it. Because of the construction of TCPA,
 the private keys are registered _after_ the owner receives the computer,
 this is the window of opportunity against that as well. The worst case for
 cost of this is to purchase an additional motherboard (IIRC Fry's has them
 as low as $50), giving the ability to present a purchase. The
 virtual-private key is then created, and registered using the credentials
 borrowed from the second motherboard. Since TCPA doesn't allow for direct
 remote queries against the hardware, the virtual system will actually have
 first shot at the incoming data. That's the worst case. The expected case;
 you pay a small registration fee claiming that you accidentally wiped your
 TCPA. The best case, you claim you accidentally wiped your TCPA, they
 charge you nothing to remove the record of your old TCPA, and replace it
 with your new (virtualized) TCPA. So at worst this will cost $50. Once
 you've got a virtual setup, that virtual setup (with all its associated
 purchased rights) can be replicated across an unlimited number of computers.
 
 The important part for this, is that TCPA has no key until it has an owner,
 and the owner can wipe the TCPA at any time. From what I can tell this was
 designed for resale of components, but is perfectly suitable as a point of
 attack.

If this is true, I'm really happy about it, and I agree it would allow 
virtualisation. I'm pretty sure it won't be for Palladium, but I don't 
know about TCPA - certainly it fits the bill for what TCPA is supposed 
to do.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




We believe...

2002-08-14 Thread Matthew X

...The issue of how the governments of the world will wish to
address the proliferation of encryption in the post September 11 era is a
far more complex, but equally important question. Although the United
States intelligence community has sounded the alarm on this topic for
several years, commercial and privacy interests have prevented many of
the steps proposed to permit governments access to encrypted
communications where the national security required such access. We
believe those earlier decisions will now be revisited...
Globalops hotshits mouthing off.1 was an FBI flack around WACO massacre
time and the other is ..guess who.
The president?
Following are some of the attorneys or
judges who have been reported to have been disciplined by the District of
Columbia for unethical conduct, who may be a resident of the District of
Columbia and who were disciplined in another jurisdiction, sued for
malpractice, incarcerated, whom we understand have been charged with
unethical conduct, who have have engaged in conduct which tends to defeat
the administration of justice or to bring the courts and the legal
business into disrepute, etc. 
Same name mistake? Identity theft? Whatever.
Judicial  Attorney Misconduct in the
District of Columbia
... MICHAEL CHARLES MOGIL, BERNARD M. MURCHISON-SMITH,
BRETT E. MURPHY, JUDGE TIM NEILL,
DENIS M. NERENBERG, ROY NIELSEN JR, KENNETH EDWARD ONDECK,
THOMAS P. OAK ... 
www.clr.org/dc.html
- 6k - Cached - Similar pages 
Theres a million Thomas P Ondecks out there,right?
D-2094 IN THE MATTER OF DISBARMENT OF THOMAS P. ONDECK
Thomas P. Ondeck, of Washington, D.C., having been suspended from the practice of law in this Court by order of August 2, 1999; and a rule having been issued and served upon him requiring him to show cause why he should not be disbarred; and the time to file a response having expired; It is ordered that Thomas P. Ondeck is disbarred from the practice of law in this Court.
Probably his evil twin...what did gumshoes do before they invented Google?
Original grab at...
http://www.waaf.ru/24.html
Scroll for it. 



Anarchists in Japan.

2002-08-14 Thread Matthew X

A - I N F O S N E W S S E R V I C E
http://www.ainfos.ca/
http://ainfos.ca/index24.html  Visit http://mypage.naver.co.jp/aca/ ***  ** The A-Infos News Service ** News about and of interest to anarchists ** COMMANDS: [EMAIL PROTECTED] REPLIES: [EMAIL PROTECTED] HELP: [EMAIL PROTECTED] WWW: http://www.ainfos.ca/ INFO: http://www.ainfos.ca/org 
Bonsai.


CDR: RE: A faster way to factor prime numbers found?

2002-08-14 Thread Matthew X

 AFICT, the proposed algorithm is for a test for primality and does not 
represent an algorithm to factor composites.
Lucky
 Yes, the paper is quite readable. The futuristic conjecture is that 
primes can be proved in O(log^3(n)) time, but the algorithm as presented is 
O(log^12(n)) time. The authors admit that present probabalistic algorithms 
are faster. However, it presents a new way to think about the problem, so 
it opens the door for a lot of new research. Time will tell if that leads 
to new factoring algorithms. Is Pollard still interested? Maybe somebody 
should drop off the paper and a new computer at his house :-) 
Dr Mike.
Writings on the wall ptrei.Even without idquantique,the most trusted name 
in security
  




[¼ºÀα¤°í] ¾îÁ¦ ÀüÈ­Çߴµ¥ ¿Ö ¾È¹Þ¾Ò¾î¿ä? 19¼¼¹Ì¸¸ Ŭ¸¯±ÝÁö!

2002-08-14 Thread ½Â¹Ì



¿À´Ã µû¶ó °©°©ÇÏ°í µÇ°Ô Èûµå³×¿ä.¿©±â¸¦ ´­·¯ÁÖ¼¼¿ä...! ¿À´Ã
±×»ç¶÷ÇÏ°í µ¥ÀÌÆ® ÇÏ´Â ³¯Àε¥...¿©±â¸¦ ´­·¯ÁÖ¼¼¿ä...!
ºñ°¡ ÀÌ·¸°Ô ¿À´Ï ±âºÐµµ ¿ì¿ïÇÏ°í..¿©±â¸¦ ´­·¯ÁÖ¼¼¿ä...! Çغ¯ÀÇ ÇÞºµÀÌ ±×¸³´Ù..¿©±â¸¦ ´­·¯ÁÖ¼¼¿ä...!



 ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.(If you don£§t want to receive this mail anymore, click here [Deny])À̸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼­ ¾Ë°ÔµÇ¾úÀ½À» ¾Ë¸³´Ï´Ù.




FREE Shipping on orders of $40 or more!!!

2002-08-14 Thread Special Deals
  
  
Clickfor Fantastic Savings on Laser & Inkjet
Cartridges!   
Save up to
80%   



 


 
   
   
 
 
 Highest Quality Inkjets Available,
Guaranteed
  100% Money Back Guarantee  
  Lowest Prices on the Web   
 Free Shipping on all Orders Over
$40   
   Corporate and School Discounts 

    

  FREE   
  SHIPPING  We offer free shipping for all US 
orders $40 & over. 

  
  
 
 

  
OUR
 GUARANTEE   
  No Risk Guarantee! We back all of our 
products 100%.
   

   
    
   
Clickfor Fantastic Savings on Laser & Inkjet
Cartridges!   
Save up to
80%
 


 
 
 
   You have
signed up with one of our network partners to receive email providing you
with special offers that may appeal to you. If you do not wish to receive
these offers in the future, reply to this email with "unsubscribe" in the
subject or simply click on the following link: Unsubscribe
 
 





This is what I have been talking about!

2002-08-14 Thread freecdsoftware
Title: Free Software
















































Click 
here to start 
getting your free software now.















Free

  



Milton

  Bradley Classic board Games

  Chess,

  Checkers, Connect Four, Dominoes, Parcheesi, Pente and 
Backgammon... All your

  favorites. Save games

  in progress, play against a wide variety of opponents online or 
off, and have a

  great time. The Milton Bradley collection of Classic Board Games 
captures the

  spirit of the original gameplay, mixes in rich graphics and animation, and

  offers great family fun for everyone.

More

Details...

























Get more free 
software:









3D Home and

GardenMore

Details...

Webster's

Millennium 2002

 Encyclopedia 

More

Details...

Writing

TutorMore

Details...



























Greeting Card

MagicMore

Details...

Print

  Shop

  Photo ProMore

Details...

Multimedia

  SpanishMore

Details...

































   

 

   You are receiving this email

   as a subscriber to our mailing list. To remove yourself

   from this and related email lists click here:

   UNSUBSCRIBE MY EMAIL

   

   

 

   












Crystal Clear Conference Calls

2002-08-14 Thread US Telecenter
Title: Lowest Rate Services





  
  
Conferencing Made Easy
Only 18 Cents Per Minute!
(Including Long Distance!)


  
  

  No setup fees
  No contracts or monthly fees
  Call anytime, from anywhere, to anywhere
  Connects up to 100 Participants
  Simplicity in set up and administration
  Operator Help available 24/7 


  
  
The Highest Quality Service For The Lowest Rate In The Industry!


  
  
Fill out the form below to find out how you can lower your phone bill every month.
Required Input Field*


  
  

  
  


  Name*
  

  Web
Address
  

  Company
Name*
  

  
State*
  

  Business
Phone*
  

  Home
Phone
  

  Email
Address*
  

  Type of
Business
  
  



  
  
To be removed from our distribution lists, please
  Click
  here.




Re: Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Joseph Ashwood

- Original Message -
From: Ben Laurie [EMAIL PROTECTED]
  The important part for this, is that TCPA has no key until it has an
owner,
  and the owner can wipe the TCPA at any time. From what I can tell this
was
  designed for resale of components, but is perfectly suitable as a point
of
  attack.

 If this is true, I'm really happy about it, and I agree it would allow
 virtualisation. I'm pretty sure it won't be for Palladium, but I don't
 know about TCPA - certainly it fits the bill for what TCPA is supposed
 to do.

I certainly don't believe many people to believe me simply because I say it
is so. Instead I'll supply a link to the authority of TCPA, the 1.1b
specification, it is available at
http://www.trustedcomputing.org/docs/main%20v1_1b.pdf . There are other
documents, unfortunately the main spec gives substantial leeway, and I
haven't had time to read the others (I haven't fully digested the main spec
yet either). From that spec, all 332 pages of it, I encourage everyone that
wants to decide for themselves to read the spec. If you reach different
conclusions than I have, feel free to comment, I'm sure there are many
people on these lists that would be interested in justification for either
position.

Personally, I believe I've processed enough of the spec to state that TCPA
is a tool, and like any tool it has both positive and negative aspects.
Provided the requirement to be able to turn it off (and for my preference
they should add a requirement that the motherboard continue functioning even
under the condition that the TCPA module(s) is/are physically removed from
the board). The current spec though does seem to have a bend towards being
as advertised, being primarily a tool for the user. Whether this will remain
in the version 2.0 that is in the works, I cannot say as I have no access to
it, although if someone is listening with an NDA nearby, I'd be more than
happy to review it.
Joe




AFP PROMIS

2002-08-14 Thread Matthew X

What should I do if my FOI request comes back with PROMIS-person and
location details,on it?
I was just wondering in light of the history of that in
SA,guatamala,occupied Palistine,etc.
First they came for the hackers. But I never did anything illegal
with my computer, so I didn't speak up. Then they came for the
pornographers. But I thought there was too much smut on the Internet
anyway, so I didn't speak up. Then they came for the anonymous remailers.
But a lot of nasty stuff gets sent from anon.penet.fi, so I didn't speak
up. Then they came for the encryption users. But I could never figure out
how to work pgp5 anyway, so I didn't speak up. Then they came for me. And
by that time there was no one left to speak up. ~Alara Rogers
(Aleph Press) n


Is Uribe on a PROMIS?

2002-08-14 Thread Matthew X

Ex-intellegence agent exposes the
truth behind the Government Agencies 
THE MEN WHO SOLD THE WORLD... AND THE MAN WHO TOLD THE
STORY. 
His book is the book the Israelis tried to stop, written by the man
they said didn't exist - the book that George Bush and the CIA tried to
sabotage. 
For more than ten helter-skelter, hair-raising years, Ari Ben-Menashe was
the golden-haired boy of Israel's deadly spy service. 
After a year in a US jail on trumped-up charges, Ari Ben-Menashe is ready
to tell his story. 

Ari Ben-Menashe is a man without a home, a country, or many friends in
the cut-throat world of international intelligence. In his recently
released book entitled Profits of War, the sensational story of the
world-wide arms conspiracy, Ben-Menashe details the unbelievable story of
an international cabal of well-connected intelligence community and
corporate arms dealers who, as the title of the book suggests, wage war
to covertly gain power, influence and personal wealth. Ben-Menashe is the
man responsible for leaking the information that eventually led to the
Iran-contra investigations and the demise (or sacrifice) of Oliver North
who, it turns out, was only a small player in a much much bigger game

.After serving in the external relations department of Israeli Military
Intelligence and acting as personal national security advisor to Yitzhak
Shamir (former President of Israel) for a total of twelve years,
Ben-Menashe has written what must arguably rate as one of the most
important political and intelligence exposes ever. 
I met with Ari Ben-Menashe twice during 1991 to discuss various issues,
including the theft by the US justice department of the most
sophisticated data-collecting computer program ever developed, which is
known as 'the Inslaw affair', and the subsequent modification and
international sale of that program to various countries around the world,
including Australia, by a CIA front-company and an Israeli Intelligence
front-company owned and run by Robert Maxwell. 
The Dossier Society 
The computer program we are talking about is called Promis, and its use
presents the biggest threat to individual rights by any computer
technology in use today. Not only that, it has given US Intelligence
agencies access to extremely sensitive information stored in the
databases of possibly as many as eighty-eight countries around the globe.

Ben-Menashe devotes an entire chapter of his book detailing the joint
American-Israeli initiative to sell Promis to intelligence and
law-enforcement agencies world-wide, and gives several examples of how
the program has been used to interfere with the political process of
various countries and to keep track of citizens. 
Since obtaining an illegal copy of the program over a decade ago, the
Central Intelligence Agency has, in conjunction with Israeli
Intelligence, embarked on a highly successful world-wide initiative to
install bugged copies of the software in computer systems run
by intelligence and law-enforcement agencies, (as well as other
government organisations), to which they now covertly have unlimited
access. 
One of the earliest leaks regarding this covert computer
double-dealing came out in an article entitled Spy vs. Spy,
(written by Zuhair Kashmeri for the Toronto Globe and Mail), which was
published on Saturday 20 April 1991. Devoted entirely to the Promis
initiative, the article quotes one of Kashmeri's Canadian Intelligence
sources: Some of our Allies, such as Australia, are furious after
they found out from the revelations of the Inslaw Case that they were
sucked into buying Promis. Kashmeri confirmed to one of my
colleagues that he has had a twelve year relationship with the two
intelligence sources who supplied the information for the article, and
that they had always proved reliable in the past. 
At the time I interviewed Ben-Menashe, it proved very hard to
authenticate all his claims. Although Israeli Intelligence denied all
knowledge of him for some time, I was informed by a helpful contact
within the Australian Democrats that he had indeed worked there for them,
and, was given copies of various personal references that supported the
claim. After later interviewing Bill Hamilton, the Director of Inslaw
Inc., the company that wrote the program, and other individuals familiar
with the case, I felt quite confident that Ari Ben-Menashe knew exactly
what he was talking about. 
On 1 September 1992, an investigative committee of the US Congress
released an investigative report on the Inslaw case, which outlines the
controversial history of the Promis software. It took three years of
investigation to complete the report, due in part to the withholding of
evidence by government agencies connected with the theft, modification
and distribution of the program, as well as the intimidation of important
witnesses. In order to slow down and mislead the investigation there have
been arrests, on false charges, of individuals informing the judicial
committee, as well 

for the SEC wont let me be,they try to shut me down on we CP.

2002-08-14 Thread Matthew X

Well if you want Shady, this is what I'll give ya
A little bit of weed mixed with some hard liquor
Pretie shady eminem...
http://www.corporate-ir.net/ireye/ir_site.zhtml?ticker=rsasscript=1901
gross profit? Don't ask.Mergers and Acquisitions will kill
me,literally.Trei this...
I know that you got a job Ms. Cheney
but your husband's heart problem's complicating
So the FCC won't let me be
or let me be me, so let me see
They try to shut me down on MTV
But it feels so empty, without me
So, come on and dip, rum on your lips
Fuck that, cum on your lips, and some on your tits
And get ready, cause this shit's about to get heavy
I just settled all my lawsuits, FUCK YOU DEBBIE!
There,there pete shady,pigs ears in vaseline don' taste THAT
bad.



Chicago Bnet.

2002-08-14 Thread Matthew X

I will pay 2$ to have ANY Person Impersonating a Govt. servant stabbed in 
the back.
Run over.Shot.Drowned.Burnt,hell whatever,JUST DO IT! This could be the 
break APster needs.Time to make a stand.Scatter my ashes at Waldheim.

Who wants to participate to help form what will be the LAST revolution on 
earth, the one that'll take down ALL the governments? James Dalton Bell.






Re: Spam blocklists?

2002-08-14 Thread Peter Fairbrother

 Greg Broiles wrote:
[...]
 Osirusoft seems to be a spam blocker, but blocking legitimate mail is going
 too far. I'd rather have the spam. And I object strongly to third (or
 fourth) parties deciding what to do with my mail.
 
 It's the recipient, or someone acting on their behalf, who's deciding what
 to do with
 *their* mail, at least from the recipient's perspective.

One of the ISP's I use (only until the contract ends!!) now forces me to
employ spam blocking, I have no choice.

Quote It is necessary for Freezone Internet to put such measures in place
in order to ensure that other mail servers on the Internet do not block
traffic originating from Freezone Internet's mail servers. If Freezone
Internet were to be blocked, eventually over 90% of your email potentially
may not be received or delivered to its recipients.

IMO this is just plain wrong.



Spam is a problem, no doubt, but it's not evil or anything, and I object to
people stopping my email, for whatever reason (DoS attacks are another
matter).

There used to be an offence of interfering with the Royal Mail (in the UK,
with horrendous penalties). While the per-message cost of email is so low
that that concept is no longer viable for email, there must be better ways
to limit spam.

For instance, limiting the number of recipients of an email (the cryptogeek
system I'm working on [m-o-o-t] just allows one), or limiting the number of
emails one IP can send per day (adjusted for number of users).


There was an EU proposal to force spammers (who are not always unwanted) to
put [ADV] in the Subject: line, with appropriate penalties if they failed
to, but it didn't happen (and we got long-term traffic data retention
instead).


I don't know offhand how to do it, but having unelected and unaccountable
people (making the conditions for) stopping my email is unacceptable. If
somehow there was a limit to the number of people an email could be sent to
without a willing passing on by a human, that could limit the damage spam
could do, and be a better way to do it than involving stopping real (false
positive) emails.

A slightly drunk (you don't see me here very drunk that often, lucky
someone ,

-- Peter Fairbrother




Re: Spam blocklists?

2002-08-14 Thread James A. Donald

--
On 14 Aug 2002 at 4:36, Peter Fairbrother wrote:
 For instance, limiting the number of recipients of an email
 (the cryptogeek system I'm working on [m-o-o-t] just allows
 one), or limiting the number of emails one IP can send per
 day (adjusted for number of users).
 
 There was an EU proposal to force spammers (who are not
 always unwanted) to put [ADV] in the Subject: line, with
 appropriate penalties if they failed to, but it didn't happen
 (and we got long-term traffic data retention instead).
 
 I don't know offhand how to do it, but having unelected and 
 unaccountable people (making the conditions for) stopping my
 email is unacceptable.

Solution is obvious and has been known for a long time
Integrate payment with email.  If anyone not on your approved
list wants to send you mail, they have to pay you x, where x is
a trivial sum, say a cent or two.

Spammers wind up sending huge amounts of mail to unmonitored
mailboxes, which will make spamming unprofitable.


--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 DIY+MmmrLQhijrJvvUennc4PKuW3ydzF1s8Phfvc
 2thHL52WvLYLBuy1gMvfbs8U1toNuUIIWvvhnySCw




Overcoming the potential downside of TCPA

2002-08-14 Thread Joseph Ashwood

Lately on both of these lists there has been quite some discussion about
TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :)
However there is something that is very much worth noting, at least about
TCPA.

There is nothing stopping a virtualized version being created.

There is nothing that stops say VMWare from synthesizing a system view that
includes a virtual TCPA component. This makes it possible to (if desired)
remove all cryptographic protection.

Of course such a software would need to be sold as a development tool but
we all know what would happen. Tools like VMWare have been developed by
others, and as I recall didn't take all that long to do. As such they can be
anonymously distributed, and can almost certainly be stored entirely on a
boot CD, using the floppy drive to store the keys (although floppy drives
are no longer a cool thing to have in a system), boot from the CD, it runs
a small kernel that virtualizes and allows debugging of the TPM/TSS which
allows the viewing, copying and replacement of private keys on demand.

Of course this is likely to quickly become illegal, or may already, but that
doesn't stop the possibility of creating such a system. For details on how
to create this virtualized TCPA please refer to the TCPA spec.
Joe




Re: Spam blocklists?

2002-08-14 Thread Marcel Popescu

From: James A. Donald [EMAIL PROTECTED]

 Solution is obvious and has been known for a long time
 Integrate payment with email.  If anyone not on your approved
 list wants to send you mail, they have to pay you x, where x is
 a trivial sum, say a cent or two.

 Spammers wind up sending huge amounts of mail to unmonitored
 mailboxes, which will make spamming unprofitable.

There is also Wei Dai's idea of b-money, I think, which requires every
incoming mail to solve a problem about hashes. This could be included in the
SMTP protocol, so that the server can generate the challenge dinamically (to
prevent replays). This would limit the amount of spam without requiring any
real money.

Mark




Re: Spam blocklists?

2002-08-14 Thread Sunder

None of those things work.  Most spammers don't give a shit if you don't
receive email.  I can attest to this by the slew of spam going to
hostmaster, webmaster, and the like on many networks.  What they're really
selling is ten million addresses and spam software.  Even if 9 million
of those are bullshit, they couldn't care less.  The more things with @
signs in'em the more money they make off clueless businesses.

--Kaos-Keraunos-Kybernetos---
 + ^ + :NSA got $20Bill/year|Passwords are like underwear. You don't /|\
  \|/  :and didn't stop 9-11|share them, you don't hang them on your/\|/\
--*--:Instead of rewarding|monitor, or under your keyboard, you   \/|\/
  /|\  :their failures, we  |don't email them, or put them on a web  \|/
 + v + :should get refunds! |site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net 

On Wed, 14 Aug 2002, Marcel Popescu wrote:

 From: James A. Donald [EMAIL PROTECTED]
 
  Solution is obvious and has been known for a long time
  Integrate payment with email.  If anyone not on your approved
  list wants to send you mail, they have to pay you x, where x is
  a trivial sum, say a cent or two.
 
  Spammers wind up sending huge amounts of mail to unmonitored
  mailboxes, which will make spamming unprofitable.
 
 There is also Wei Dai's idea of b-money, I think, which requires every
 incoming mail to solve a problem about hashes. This could be included in the
 SMTP protocol, so that the server can generate the challenge dinamically (to
 prevent replays). This would limit the amount of spam without requiring any
 real money.
 
 Mark




Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Carl Ellison

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 10:58 PM 8/13/2002 -0700, Joseph Ashwood wrote:
Lately on both of these lists there has been quite some discussion
about TCPA and Palladium, the good, the bad, the ugly, and the
anonymous. :) However there is something that is very much worth
noting, at least about TCPA.

There is nothing stopping a virtualized version being created.

The only thing to stop that is the certificate on the TCPA's built-in
key.  You would have to shave one TCPA chip and use its key in the
virtualized version.  If you distributed that shaved key publicly or
just to too many people, then its compromise would likely be detected
and its power to attest to S/W configuration would be revoked.

However, if you kept the key yourself and used it only at the same
frequency you normally would (for the normal set of actions), then
the compromise could not be detected and you should be able to run
virtualized very happily.

That's one of the main problems with TCPA, IMHO, as a security
mechanism: that its security depends on hardware tamper resistance --
but at the same time, the TPM needs to be a cheap part, so it can't
be very tamper resistant.

 - Carl

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.8

iQA/AwUBPVpb2XPxfjyW5ytxEQIaAgCgh72smP3W6qclzgRbNiWt5prdpk4AmwWw
aKNdDfQbHWxRVJ3yQ02FxtJb
=eEI+
-END PGP SIGNATURE-


+--+
|Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme |
|PGP: 75C5 1814 C3E3 AAA7 3F31  47B9 73F1 7E3C 96E7 2B71   |
+---Officer, arrest that man. He's whistling a copyrighted song.---+




MS on Palladium, DRM and copy-protection (via job ad)

2002-08-14 Thread Adam Back

It seems from this article that perhaps MS already had worked out how
to do copy protection with Palladium, or at least thinks it possible
contrary to what was said at USENIX security:

http://www.theregister.co.uk/content/4/26651.html

 [Palladium related job advert...] Our technology allows content
 providers, enterprises and consumers to control what others can do
 with their digital information, such as documents, music, video,
 ebooks, and software.  Become a key leader, providing vision and
 industry leadership in developing DRM, Palladium and Software
 Licensing products and Trust Infrastructure Services.

control what others can do with [...] software.  [...] develop DRM
[...] and Software Licensing products.

Also again shows that Palladium is quite centrally a DRM platform,
which is kind of obvious from the design, and anyway from the naming
of the associated patent DRM-OS.

Adam

- Forwarded message from R. A. Hettinga [EMAIL PROTECTED] -

Date: Wed, 14 Aug 2002 08:13:48 -0400
To: Digital Bearer Settlement List [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Subject: MS recruits for Palladium microkernel and/or DRM platform

http://www.theregister.co.uk/content/4/26651.html

MS recruits for Palladium microkernel and/or DRM platform
By John Lettice
Posted: 13/08/2002 at 10:23 GMT

Microsoft's efforts to disassociate Palladium from DRM seem to have hit
their first speed bump. Some voices within the company (and we currently
believe these voices to be right and sensible) hold the view that Palladium
has to be about users' security if it's to stand any chance of winning
hearts and minds, and that associating it with protecting the music
business' IP will be the kiss of death. So they'll probably not be best
pleased by the Microsoft job ad that seeks a group program manager
interested in being part of Microsoft's effort to build the Digital Rights
Management (DRM) and trusted platforms of the future (Palladium).

[...]

- End forwarded message -




RE: Polio, DES Crack, and Proofs of Concept

2002-08-14 Thread Trei, Peter

 Khoder bin Hakkin[SMTP:[EMAIL PROTECTED]] wrote:
 
 In the most recent _Science_ some biologists gripe that the scientists
 who synthesized infectious
 poliovirus from its description were not doing anything novel, just a
 prank.  Any biologist
 would have known that, since you could concatenate nucleotide strings,
 and since polio needs nothing
 besides DNA (eg no enzymes) to be infectious, obviously you can synth
 polio.
 
 This is *remarkably* similar to cognescenti reactions to the DES Crack
 project.  Yes, it was
 obvious it would work, and it was largely unnecessary (from a
 security-planning perspective)
 to actually do it.  But it was proof-of-concept.  Like synthesizing
 polio.
 
Yes, it was obvious to any technically educated person. 

Nevertheless, until it was done, there were USG officials claiming 
that it was impossible; that any real DES cracker would melt down,
and we ought to be happy with 56 bit DES. Politicians and government 
employees lie, and they usually get away with it. 

Of course, the very statement that '56 bit DES is uncrackable, so there
is no need for you to export anything better' is inherently 
self-contradictory - if it's really uncrackable, then there is not rational
reason not to allow export of 128 or 512 bit symmetrical encryption
as well - uncrackable is uncrackable, after all.

I started the DES crack project after the USG had magnaminiously 
proposed raising the limit for exportable key lengths from 40 to 
56 bits. I got RSA to put up the money, and worked with RSA Labs
on the format of the challenges.  They succeeded in every way I
could have wanted.

In the real world, one conclusive demo is worth a thousand 
theoretical papers.

Peter Trei




Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Ben Laurie

Joseph Ashwood wrote:
 Lately on both of these lists there has been quite some discussion about
 TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :)
 However there is something that is very much worth noting, at least about
 TCPA.
 
 There is nothing stopping a virtualized version being created.
 
 There is nothing that stops say VMWare from synthesizing a system view that
 includes a virtual TCPA component. This makes it possible to (if desired)
 remove all cryptographic protection.
 
 Of course such a software would need to be sold as a development tool but
 we all know what would happen. Tools like VMWare have been developed by
 others, and as I recall didn't take all that long to do. As such they can be
 anonymously distributed, and can almost certainly be stored entirely on a
 boot CD, using the floppy drive to store the keys (although floppy drives
 are no longer a cool thing to have in a system), boot from the CD, it runs
 a small kernel that virtualizes and allows debugging of the TPM/TSS which
 allows the viewing, copying and replacement of private keys on demand.
 
 Of course this is likely to quickly become illegal, or may already, but that
 doesn't stop the possibility of creating such a system. For details on how
 to create this virtualized TCPA please refer to the TCPA spec.

What prevents this from being useful is the lack of an appropriate 
certificate for the private key in the TPM.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)

2002-08-14 Thread Adam Back

The remote attesation is the feature which is in the interests of
third parties.

I think if this feature were removed the worst of the issues the
complaints are around would go away because the remaining features
would be under the control of the user, and there would be no way for
third parties to discriminate against users who did not use them, or
configured them in given ways.

The remaining features of note being sealing, and integrity metric
based security boot-strapping.

However the remote attestation is clearly the feature that TCPA, and
Microsoft place most value on (it being the main feature allowing DRM,
and allowing remote influence and control to be exerted on users
configuration and software choices).

So the remote attesation feature is useful for _servers_ that want to
convince clients of their trust-worthiness (that they won't look at
content, tamper with the algorithm, or anonymity or privacy properties
etc).  So you could imagine that feature being a part of server
machines, but not part of client machines -- there already exists some
distinctions between client and server platforms -- for example high
end Intel chips with larger cache etc intended for server market by
their pricing.  You could imagine the TCPA/Palladium support being
available at extra cost for this market.

But the remaining problem is that the remote attesation is kind of
dual-use (of utility to both user desktop machines and servers).  This
is because with peer-to-peer applications, user desktop machines are
also servers.

So the issue has become entangled.

It would be useful for individual liberties for remote-attestation
features to be widely deployed on desktop class machines to build
peer-to-peer systems and anonymity and privacy enhancing systems.

However the remote-attestation feature is also against the users
interests because it's wide-spread deployment is the main DRM enabling
feature and general tool for remote control descrimination against
user software and configuration choices.

I don't see any way to have the benefits without the negatives, unless
anyone has any bright ideas.  The remaining questions are:

- do the negatives out-weigh the positives (lose ability to
reverse-engineer and virtualize applications, and trade
software-hacking based BORA for hardware-hacking based ROCA);

- are there ways to make remote-attestation not useful for DRM,
eg. limited deployment, other;

- would the user-positive aspects of remote-attestation still be
largely available with only limited-deployment -- eg could interesting
peer-to-peer and privacy systems be built with a mixture of
remote-attestation able and non-remote-attestation able nodes.

Adam
--
http://www.cypherspace.org/adam/

On Sat, Aug 10, 2002 at 04:02:36AM -0700, John Gilmore wrote:
 One of the things I told them years ago was that they should draw
 clean lines between things that are designed to protect YOU, the
 computer owner, from third parties; versus things that are designed to
 protect THIRD PARTIES from you, the computer owner.  This is so
 consumers can accept the first category and reject the second, which,
 if well-informed, they will do.  If it's all a mishmash, then
 consumers will have to reject all of it, and Intel can't even improve
 the security of their machines FOR THE OWNER, because of their history
 of security projects that work against the buyer's interest, such as
 the Pentium serial number and HDCP.
 [...]




Re: TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)

2002-08-14 Thread Ben Laurie

Adam Back wrote:
 The remote attesation is the feature which is in the interests of
 third parties.
 
 I think if this feature were removed the worst of the issues the
 complaints are around would go away because the remaining features
 would be under the control of the user, and there would be no way for
 third parties to discriminate against users who did not use them, or
 configured them in given ways.
 
 The remaining features of note being sealing, and integrity metric
 based security boot-strapping.
 
 However the remote attestation is clearly the feature that TCPA, and
 Microsoft place most value on (it being the main feature allowing DRM,
 and allowing remote influence and control to be exerted on users
 configuration and software choices).
 
 So the remote attesation feature is useful for _servers_ that want to
 convince clients of their trust-worthiness (that they won't look at
 content, tamper with the algorithm, or anonymity or privacy properties
 etc).  So you could imagine that feature being a part of server
 machines, but not part of client machines -- there already exists some
 distinctions between client and server platforms -- for example high
 end Intel chips with larger cache etc intended for server market by
 their pricing.  You could imagine the TCPA/Palladium support being
 available at extra cost for this market.
 
 But the remaining problem is that the remote attesation is kind of
 dual-use (of utility to both user desktop machines and servers).  This
 is because with peer-to-peer applications, user desktop machines are
 also servers.
 
 So the issue has become entangled.
 
 It would be useful for individual liberties for remote-attestation
 features to be widely deployed on desktop class machines to build
 peer-to-peer systems and anonymity and privacy enhancing systems.
 
 However the remote-attestation feature is also against the users
 interests because it's wide-spread deployment is the main DRM enabling
 feature and general tool for remote control descrimination against
 user software and configuration choices.
 
 I don't see any way to have the benefits without the negatives, unless
 anyone has any bright ideas.  The remaining questions are:
 
 - do the negatives out-weigh the positives (lose ability to
 reverse-engineer and virtualize applications, and trade
 software-hacking based BORA for hardware-hacking based ROCA);
 
 - are there ways to make remote-attestation not useful for DRM,
 eg. limited deployment, other;
 
 - would the user-positive aspects of remote-attestation still be
 largely available with only limited-deployment -- eg could interesting
 peer-to-peer and privacy systems be built with a mixture of
 remote-attestation able and non-remote-attestation able nodes.

A wild thought that occurs to me is that some mileage could be had by 
using remotely attested servers to verify _signatures_ of untrusted 
peer-to-peer stuff. So, you get most of the benefits of peer-to-peer and 
the servers only have to do cheap, low-bandwidth stuff.

I admit I haven't worked out any details of this at all!

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff