Re: sexist content in the package openclipart2-png

2016-01-01 Thread Lee Winter
On Fri, Jan 1, 2016 at 1:05 PM, Martin Read <zen75...@zen.co.uk> wrote:
> On 01/01/16 17:47, Ric Moore wrote:
>>
>> On 01/01/2016 11:23 AM, pe...@berghold.net wrote:
>>>
>>> I'm confused what specifically is meriting censorship?
>>
>>
>> I'm not seeing any full frontal nudity. Ric
>
>
> An image can feature full frontal nudity without being an exercise in sexual
> objectification, and equally can be an exercise in sexual objectification
> without featuring full frontal nudity.
>
> A reasonable person could certainly conclude that quite a few of the images
> specifically called out by the original poster in this thread
> fall into the latter category.

Actually that is incorrect.  All such conclusions rest on the
interpretation of the graphic, and interpretation is guided or even
controlled by the biases of the observer.  So objectification, like
beauty, lies in the eyes of the beholder.

So people who detect objectification in an arrangement of pixels
should be forbidden from interpreting imagery.  Such a policy is NOT
censorship -- it is more an exercise of preventive medicine.

One might as well object to the data downloaded on the basis that the
bits involved were recycled rather than fresh.  Prohibit images
composed of stale bits!  Not.

Lee Winter
Nashua, New Hampshire
United States of America



nano needs curses.h?

2015-07-23 Thread Lee Winter
The following sequence of commands leads to an error:

mkdir nano
cd nano
apt-get source nano
./configure
make
[... snip ...]
make[2]: Entering directory `/var/home/lee/Work/demos/nano/nano-2.2.6/src'
gcc -DHAVE_CONFIG_H -I. -I.. -DLOCALEDIR=\/usr/local/share/locale\
-DSYSCONFDIR=\/usr/local/etc\-g -O2 -MT browser.o -MD -MP -MF
.deps/browser.Tpo -c -o browser.o browser.c
In file included from proto.h:27:0,
 from browser.c:24:
nano.h:92:20: fatal error: curses.h: No such file or directory
compilation terminated.

Should the nano package include curses.h or is some other package a
prerequisite for nano?

Lee Winter
Nashua, New Hampshire
United States of America


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CABaAhFAZvbA7jqb4Do1XTr5==0vfw7kgsgdbtnq+qomeb0e...@mail.gmail.com



Re: Important and Confidential

2015-04-06 Thread Lee Winter
No.

If you ask again me answer will be _HELL_NO_.

Please go eat something poinsonous and die in agony.

Have a bad day.


On Mon, Apr 6, 2015 at 9:20 PM, VACCATION TOUR 
jamesmithvaccati...@gmail.com wrote:

 Hello,

 I'm sharing some private and important documents with you, kindly click
 the link
 below and Sign In with your email to view the documents shared with you
 privately.
 http://acerossatelite.com/doc/




 Important: This e-mail message may contain information which is
 confidential or privileged. If you are not the intended recipient,
 please advise the sender immediately by reply e-mail and delete this
 message and any attachments without distributing or
 retaining a copy. Thank you.




Re: Installing an Alternative Init?

2014-11-10 Thread Lee Winter
On Mon, Nov 10, 2014 at 1:26 PM, Patrick Bartek nemomm...@gmail.com wrote:

 On Mon, 10 Nov 2014, Michael Biebl wrote:

  Am 10.11.2014 um 17:26 schrieb Patrick Bartek:
   On Mon, 10 Nov 2014, Michael Biebl wrote:
 
   You can use pre-seeding and run
  
   preseed/late_command=in-target apt-get install -y sysvinit-core
  
   in the debian-installer. While that does indeed first install
   systemd-sysv, it's directly replaced again during system
   installation and doesn't require you to boot with systemd as PID 1.
   So it might be pretty close to what you're looking for.


Should I install LILO first and then replace it with GRUB? Should I install
Gnome first and then replace it with XFCE?  Hardly.

Of all the options available in the NON-expert installer, the choice of
init alternatives might not warrant a user selection option, but all of the
_consequences_ of that selection, i.e., things that get sucked in, mandate
that users be offered a choice.

Silent selection of a user-hostile init system is probably sub-optimal.
After all, what gas Debian got to hide?  In theory, nothing.  But Yogi
Berra had some insightful comments about the difference between theory and
practice.

  Thanks.  But wouldn't it be nice if as an option, you could just
   pick which init you wanted in the installer.  It would make things
   so much easier.  Too late to implement this, I suppose.  Maybe, in
   the next release?
 
  Most users simply don't care and don't want to be bothered with this.

 I agree, but enough do -- mainly server guys -- that it is a problem.

  It's not like we prompt the user whether he wants to use grub or
  isolinux. If we added an explicit switch, this would have to be in
  expert-install-mode only imo. I can't speak for the d-i people, but

 Maybe, we should for diversity of choice.  There is an option of where
 to install grub after all even though most put it on the MBR.  But I
 agree the init options should be in expert-install.  Will make everyone
 happy.  Freedom of choice is the greatest freedom.


Freedom to make such a consequential choice should not be limited to
experts.

Lee Winter
Nashua, New Hampshire
United States of America


Re: redo

2014-10-23 Thread Lee Winter
On Thu, Oct 23, 2014 at 6:45 PM, Jonathan de Boyne Pollard 
j.deboynepollard-newsgro...@ntlworld.com wrote:

 Lee Winter:

 One key component of an  effective startup process is dependency

  handling.  So why not look for one of the best as a model?  I
  suggest DJB's redo system.  It is excruciatingly simple.  But very
  effective. And it is the opposite of monolithic.

 Is practically nonexistent the opposite of monolithic, now?  (-: He
 never actually published it, you know (although a few of his other
 unfinished works that did get published contain glimpses in their build
 systems).  The task of constructing and publishing working redo toolsets
 was left to Alan Grosskurth, Avery Pennarun, and some other bloke.


There are more than three implementations of what little DJB did publish,
each with its own strengths and weaknesses.  But building software and
booting (including careful shutdown) are two quite separate goals.  I
suspect you interpreted my suggestion a bit too literally.

redo is a useful tool that can have a use in system initialization. Someone
 asked me an interesting question about /etc/rc.conf.local in FreeNAS
 recently and I came up with an interesting answer that made use of redo
 which I have to write up at some point.  But it's another tool in a good
 toolbox, not the whole of the toolbox.  Nor is it necessarily the starting
 point for everything that has the word dependency somewhere in its
 description.  I can think of three things in the various implementations of
 redo that will interact quite poorly with the notion of repeatably starting
 up daemons with controlled initial process states and dropped privileges:
 maintaining database and job control access, alternative routes, and what
 the process tree ends up looking like.  And that's skipping over the whole
 notion of shutdown.  There are ways to marry service dependencies with the
 the-filesystem-is-the-database paradigm, but one doesn't really start here
 to reach them.


DJB's design for redo is not aimed at an init tool.  It is aimed at a make
tool.  It might be possible to adapt a make tool into an init tool, but
that does not sound to me like it would be fun.  The missing concept is a
replacement for timestamp sequencing as used by make et al with a set of
events that mean approximately ready.  And initing requires a systematic
approach to determining readiness for every step of the boot process.  I
don't think timestamps will cut it.  We need a different boolean
predicate.  And I agree that it has to be bidirectional in an
edge-triggered sense.


 Maybe Alan Grosskurth, Avery Pennarun, or that other bloke have written
 some tools for system and daemon management.


It's possible.  I do not track those implementations.  I did study redo
intensively as part of a better build search about a year ago.  There were
two finalists in my search, of which redo was one.  But IMHO redo has too
much human element to be reliable for large software development projects.

But with redo it is _extremely_ easy to determine what is going on and just
as easy to customize.  Those are both properties that I also value for
system software.

Lee Winter
Nashua, New Hampshire
United States of America


Running Debian Installer without rebooting.

2014-10-21 Thread Lee Winter
It appears to me that it should be possible to run the Debian Installer
just as a program and a set of package files rather than as a bootable
image containing both.  So, given a bootable image in .ISO or .img format,
how can the image be transformed into an executable program and associated
package files that reside on a typical (HDD) file system?

As a corollary question, are the debian installer isos bootable as is, or
is it mandatory that they be burned to media (CD/DVD/USB) and the media
booted?  For example, several boot loaders allow a kind of chainload from
their own boot sector to the boot sector of an ISO or img file.  But the
booted image has to be able to find itself in order to continue the
process.  Can debian install images find themselves?

Thanks for any hints about this topic or where I might look for more
information.

Lee Winter
Nashua, New Hampshire
United States of America


Re: If Not Systemd, then What?

2014-10-20 Thread Lee Winter
On Mon, Oct 20, 2014 at 3:45 PM, Patrick Bartek nemomm...@gmail.com wrote:

 After much vitriolic gnashing of teeth from those opposed to systemd,
 I wonder...  What is a better alternative?  And it can't be sysvinit.

 Yes.  Syvinit still works, but it is after all 20 years old. It's been
 patched and bolted onto and jury-rigged to get it to do things that
 weren't even around (or dreamt of) at its inception.  It's long past
 due for a contemporary replacement.  Whatever that may be.

 So, what would you all propose?  For a server?  Or for a user desktop?
 Or something that fulfills both scenarios?  And why?

 Just wondering.


One key component of an effective startup process is dependency handling.
So why not look for one of the best as a model?  I suggest DJB's redo
system.  It is excruciatingly simple.  But very effective.  And it is the
opposite of monolithic.

But the real answer to this question will be found in the specs for the
better system.  So someone needs to go through the specs for both sysv-init
and its competitors marking features to keep and features to kill.  Then
the real discussion will begin.

Lee Winter
Nashua, New Hampshire
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-19 Thread Lee Winter
On Mon, May 19, 2014 at 5:24 AM, Richard Hector rich...@walnut.gen.nzwrote:

 On 19/05/14 17:42, Lee Winter wrote:
  On Sun, May 18, 2014 at 10:50 PM, Zenaan Harkness z...@freedbms.net
  mailto:z...@freedbms.net wrote:
 
  Are you aware that there is a useful (from the perspective of
  freedoms) distinction to be made between physical property and
  so-called 'intellectual property'?
 
 
  No.  In fact hell no.

 You may not consider the distinction useful; others do.


Too bad for those others.

But claiming there is a distinction is not the same as there being such a
distinction.  If you call a tail a leg, how many legs does a dog have?
Four. Calling a tail a leg does not make it a leg.  (Attribution to A.
Lincoln).

The only distinction I have heard of is the cost-of-copying argument. It
claims thatbecause information can now be copied inexpensively it is
somehow in a different category than ordinary, material possessions.  But
that argument is nonsense. Copying informationis not free. Injection
molding is rigiculously cheap compared to other methods of production (once
the molds have been made).  Does that mean that injection-molded property
is in a different category than machined property?  Hardly.

And as for arbitrary and capricious distinctions, I draw a distinction
between what is mine and what is not mine.  Shouldn't that distinction have
the same weight as the distinction you would like to draw between
intellectual and non-intellectual property?

Note that that question is really a trick question.  So-called
non-intellectual property _always_ has an intellectual component of its
value.  Often it it the only component with any value.  So I can argue that
there is no such thing as non-intelletual property because anything that
just happens naturally is not property.  It is only when it is removed from
or altered from its natural state that it becomes property.


  Consider if you please (or use the Socratic defense of not listening)
  the definition of property.  How does something become property?
  Materials in the wild are not property.  So how does it become
  property owned by some person(s)?
 
  I like John Locke's answer  in the labor theory of
  property/ownership/first appropriation.  Natural materials become owned
  when a person, who automatically owns their ownself and thus their own
  labor, mixes that labor with the natural materials.  So plowing a field,
  digging a well or a mine, or cutting down a tree are all ways of mixing
  one's labor with raw land, which combination is the basis for all
  property.  Even unimproved land can be characterized as property if the
  would-be owner is willing to defend it.

 It's an interesting definition; I doubt it's universal. For example, one
 might consider that 'wild' materials are owned by everybody, rather than
 nobody. So if you improve it, then both parties - everybody as well as
 you specifically - part-own it. Or if nobody owns the wild materials,
 then it could be considered that you part-own it, and nobody owns the rest.


The phrase I think you are looking for it the common heritage of all
mankind.  It was stupid when it was adopted by the United Nations,it is
stupid now, and it will always be a stupid excuse (as opposed to a reasoned
reason) for preventing people from benefiting from their own efforts.
Control freaks love it though.



  Intellectual property is the most pure form of personal property.  It
  involves skull sweat.  There may be little or no physical property or
  even no tools involved in the creation of the intellectual stuff.  But
  it is absolutely and unconditionally the fruit of human effort.  Mental
  effort.

 I agree that by your (Locke's) above definition, you own the results of
 your thinking. But remember Newton as well - If I have seen further
 than others, it is by standing upon the shoulders of giants. The
 results of your thinking are almost certainly a 'derivative work' of the
 results of many other people's thinking. I would suspect in most cases,
 most of what you (not specifically you) come up with is not original.


Those are just attributions.  They need to be made, but if you read
Newton's work product it is difficult to the point to impossibility to
avoid the conclusion that his contribution was unique in human history.



 And if you don't consider pure thought to be property, we're back to
 square one.


So, what are the arguments in support of the proposition that pure thought,
principally ideas, are not property? I have studied this question for a
long time.  I know of no such argument that holds gravel.much less sand or
water.



  And we have an unlimited supply because, while real estate is a finite
  supply, the scope of human thought is not finite.  So no limit applies.
  And there is no barrier to entry.  One cannot erect a fence to prevent
  people from thinking the way one could erect a fence to protect a field
  against trespassing.

 Not only is the scope of human

Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 10:13 AM, Gary Dale garyd...@torfree.net wrote:

A lot of people responding to this post don't seem to understand that
 freedom applies to more than just personal choice. The United States was
 not a free nation while it accepted slavery and Firefox is not free
 software while it accepts digital restrictions management.

 Just as no one forced Americans to own slaves, the fact that slavery was
 allowed was an insult to notion of freedom. Arguing that the freedom to
 choose whether to own slaves or not made Americans freer would be called
 ridiculous by any sane person, yet the same argument is being bandied about
 in this discussion as if it made any sense.

 The Free Software Foundation got this one right.


The above message contains good rhetoric and execrable reasoning.

The above dogma confuses two basic categories of freedoms freedom from
andfreedom to.  Freedom from is the ability to avoid undesirable
situations. Freedom to is the ability to pursue desirable situations.

Being a slavery is something that people tend to avoid.  So the freedom (or
lack thereof) must be assessed from the perspective of the slave).  If one
believes otherwise then, in the vein of the above statements, America_was_
free because the slave _owners_ were free to own other human beings.  Is
that the freedom you are trying to promote?

DRM is two things: a legal doctrine and a technical implementation.  While
I believe in protecting the rights of owners of intellectual property, both
the existing DRM legal doctrine and the original and  existing DRM
implementations are flawed. So badly that I will not abide by them, rely
upon them, nor tolerate their existence within my areas of control.

DRM is not about freedom of any kind.  It is about control of ones
property.  Owners of intellectual property are free (in all senses of the
term, including Stallman's) to attach such restriction on the property they
sell/lend/rent/gift..  Potential customers are free (in all senses of the
term, including Stallman's) to buy/borrow/rent/accept (or not) that
property based on its own merits or based on the fact of DRM restrictions.

The real argument is not about DRM restrictions.  Those restrictions are
irrelevant.  The real argument is whether to allow DRM-restricted property
(often called content) into one's own domain.

Anyone who proposes to restrict my ability to choose, for or against,
DRM-restricted property is making a proposition that I will _always_ res
*ist.*  After all, it is about freedom.  Mine.  Not some wacko theoretical
objection based on alleged principles, but a fully personal decision on a
care-by-case basis about the property in question.

And, for the record, I do not consider intellectual property to be morally
equivalent to a human being.  Owning property has been around for million
of years.  And I approve of that practice (see Locke).  The distinction is
that people are not and never have been property, much as some would like
to think of other people as property.

But, contrary to Stallman's arguments, intellectual property is real and
worth protecting.  Otherwise I would consider every GPL protected product
to have a BSD or an MIT license.  It is my respect for the owner's ability
to set terms of use for their property that protects GPL'd products. Not
the terms of that or any other license.

Lee Winter
Nashua, New Hampshire
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 11:26 AM, Slavko li...@slavino.sk wrote:

 Ahoj,

 Dňa Sat, 17 May 2014 21:00:48 +0900 Joel Rees joel.r...@gmail.com
 napísal:

  What Mozilla is doing is providing a framework for keeping the
  companies that want into your computer out, by providing them tools to
  get only what the law allows them and no more.

 I am not lawyer, then i will not write about laws, nor in our country
 nor international. I will write only on ethic level...

 But exactly this i consider as wrong. Or will these companies allow me
 to go into their computer(s) to i can see, that they don't break my
 right? I will consider all companies as criminal, by the same way as
 these companies consider all people as criminals (which is needed to
 persecute by inspecting of their computers).

 At least, most people here know, how are companies involved in people's
 privacy, how they know to respect personal information, etc. Nothing
 from this, only money, money and money and THEIR right. Nothing about
 our rights. And this Mozilla's decision is another step to get our
 right into second rail. And right are thing, for which the free
 software starts, not for money, not for to be best browser, only rights.

 Finally, is widely known how are these companies able to approve e.g.
 GPL and right of author's  of the GPL (or similar free) software.

 Once again, i am not a criminal. And i want to no criminals go into my
 home at all, don't depends if they will use door or computer (internet
 connection)


None of the above matters.


 . Do you want this?


Now you are getting to the heart of the matter.  Neither you, nor Mozilla,
nor Adobe, nor FSF have any say in the matter.  It is a personal matter.  I
will make the decision myself. I will also live with the consequences of
that decision.

But if you interfere with my ability to make that decision, then you are
making a bad mistake.  After all, it is about freedom.  Mine.  Not yours,
not Mozilla's, not Adobe's, and certainly not FSF's. Mine.  And when you
comprehend that then you will then understand  why all of the preceding
portions of your message just don't matter.

Lee Winter
Nashua, New Hampshire
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 12:35 PM, Gary Dale garyd...@torfree.net wrote:

So freedom from doesn't include freedom from DRM?


Of course you are free from DRM.  Just don't buy/install content that is
restricted by DRM.


 Unfortunately the DMCA and its international clones prohibit me from
 accessing DRM except by methods provided by the content owner.


Yeah.  That is _their_ freedom in action.  They are perfectly free to be as
stupid as they want.


 I am not free to use my own implementation through reverse engineering,
 etc..


Think of the DRM as part of their packaging.  You aren't free to dictate to
them (thus limiting their freedom) that they have to ship to you in
green-qualified, 100% recycled, non-climate-harming bubble- wrap either.

Don't re-implement DRM, just find the loopholes in it and use them.  Or
exercise your freedom to choose another content vendor and tell the DRM
people about it in excruciating detail.  Whining about DRM is both unsavory
and unsatisfying.

You aren't free to ignore the consequences of attempting to ignore the law
of gravity.   Whose fault is that?

Lee Winter
Nashua, New Hampshire (Live Free or Die)
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 2:15 PM, Gary Dale garyd...@torfree.net wrote:

 On 18/05/14 01:49 PM, Lee Winter wrote:

  On Sun, May 18, 2014 at 12:35 PM, Gary Dale garyd...@torfree.netmailto:
 garyd...@torfree.net wrote:

 So freedom from doesn't include freedom from DRM?


 Of course you are free from DRM.  Just don't buy/install content that is
 restricted by DRM.

 Unfortunately the DMCA and its international clones prohibit me
 from accessing DRM except by methods provided by the content owner.


 Yeah.  That is _their_ freedom in action.  They are perfectly free to be
 as stupid as they want.

 I am not free to use my own implementation through reverse
 engineering, etc..


 Think of the DRM as part of their packaging.  You aren't free to dictate
 to them (thus limiting their freedom) that they have to ship to you in
 green-qualified, 100% recycled, non-climate-harming bubble- wrap either.

 Don't re-implement DRM, just find the loopholes in it and use them.  Or
 exercise your freedom to choose another content vendor and tell the DRM
 people about it in excruciating detail.  Whining about DRM is both unsavory
 and unsatisfying.

 You aren't free to ignore the consequences of attempting to ignore the
 law of gravity.   Whose fault is that?

 Lee Winter
 Nashua, New Hampshire (Live Free or Die)
 United States of America


  If packaging prevents me from using a product for a purpose that I am
 legally entitled to use it for then I have a right to demand that the
 packaging be changed.


Correct.  Andyou can demand that all day long from the content providers
who use DRM.  But your demands are just that: requests.  Noeither you nor
anyone else has the authority to _force_ them to accept andcomply with your
demands.

More importantly, you are not legally entitled to use the product in ways
other than the provider permits.  Like Micros~1, they can require that you
hold your mouth a certain way.  Facing that requirement you are not free to
violate it.  You are free to choose a different product (despite Ballmer's
insistence otherwise).


 DRM prevents not just my use on platforms that they don't support but also
 to make fair use of the product.


It does limit the portability of the product.  That's the provider's
problem.  You are not free to solve that problem for them.

It does not limit fair use.  The term fair use has a technical definition
in copyright law that provides an exception to the requirement for
permission from the publisher.  That discussion is way beyond the scope of
this one.  And that discussion is irrelevant to this one I think.

Lee Winter
Nashua, New Hampshire (Live Free or Die)
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 4:06 PM, Gary Dale garyd...@torfree.net wrote:

 On 18/05/14 02:41 PM, Lee Winter wrote:

 On Sun, May 18, 2014 at 2:15 PM, Gary Dale garyd...@torfree.net mailto:
 garyd...@torfree.net wrote:

 On 18/05/14 01:49 PM, Lee Winter wrote:

 On Sun, May 18, 2014 at 12:35 PM, Gary Dale
 garyd...@torfree.net mailto:garyd...@torfree.net
 mailto:garyd...@torfree.net mailto:garyd...@torfree.net

 wrote:

 So freedom from doesn't include freedom from DRM?


 Of course you are free from DRM.  Just don't buy/install
 content that is restricted by DRM.

 Unfortunately the DMCA and its international clones
 prohibit me
 from accessing DRM except by methods provided by the
 content owner.


 Yeah.  That is _their_ freedom in action.  They are perfectly
 free to be as stupid as they want.

 I am not free to use my own implementation through reverse
 engineering, etc..


 Think of the DRM as part of their packaging.  You aren't free
 to dictate to them (thus limiting their freedom) that they
 have to ship to you in green-qualified, 100% recycled,
 non-climate-harming bubble- wrap either.

 Don't re-implement DRM, just find the loopholes in it and use
 them.  Or exercise your freedom to choose another content
 vendor and tell the DRM people about it in excruciating
 detail.  Whining about DRM is both unsavory and unsatisfying.

 You aren't free to ignore the consequences of attempting to
 ignore the law of gravity.   Whose fault is that?

 Lee Winter
 Nashua, New Hampshire (Live Free or Die)
 United States of America


 If packaging prevents me from using a product for a purpose that I
 am legally entitled to use it for then I have a right to demand
 that the packaging be changed.


 Correct.  Andyou can demand that all day long from the content providers
 who use DRM.  But your demands are just that: requests.  Noeither you nor
 anyone else has the authority to _force_ them to accept andcomply with your
 demands.

 More importantly, you are not legally entitled to use the product in ways
 other than the provider permits.  Like Micros~1, they can require that you
 hold your mouth a certain way.  Facing that requirement you are not free to
 violate it.  You are free to choose a different product (despite Ballmer's
 insistence otherwise).

 DRM prevents not just my use on platforms that they don't support
 but also to make fair use of the product.


 It does limit the portability of the product.  That's the provider's
 problem.  You are not free to solve that problem for them.

 It does not limit fair use.  The term fair use has a technical
 definition in copyright law that provides an exception to the requirement
 for permission from the publisher.  That discussion is way beyond the scope
 of this one.  And that discussion is irrelevant to this one I think.


 So I am free to build a fence on public property that denies my neighbour
 the right to access his house? That seems to be the crux of your argument.


No.  That is neither part of nor related to my argument.

Lee Winter
Nashua, New Hampshire (Live Free or Die)
United States of America


Re: Iceweasel and DRM

2014-05-18 Thread Lee Winter
On Sun, May 18, 2014 at 10:21 PM, Zenaan Harkness z...@freedbms.net wrote:

Those who (...whatever...) create content get to decide HOW THEY
 DISTRIBUTE or otherwise SELL that content.

 No more. No less.


Wrong.



 Once it's on my computer, on in my brain, it's mine. I can do with it
 as I choose, and within the limits of my capacity.


Wrong.

The copyright holders continue to control your ability to make copies.
That, after all, is what copyright means.

If the copyright holders say no copies period, then you do not get to make
_any_ copies.  None for backup and none for your kids.

If the copyright holders say one backup copy then that's all you can make.

If the copyright holders say no other media then you can make copies to
your heart's content, but only on the medium allowed.  That means a floppy
disk's contents cannot be copied to a CD, DVD, or to a web site.  Period.
Nor to any other medium.  Only to other floppies.

You do not buy the rights to a copyrighted work when you buy an instance of
it.  You could buy the copyright holder's interest, but that tends to be a
complex transfer.  Such rights generally do not appear on Amazon, Ebay, or
Programmer's Connection's catalog.

And once it is in your brain, anything you create yourself is called a
derived work and it may not be distributed without permission from the
original work's copyright holder.  That is what clean room development is
all about -- avoidance of derivation.

Before you rant further it might be useful to actually understand the
issues involved.  So far you have only demonstrated serious
misunderstandings.

Note that the _statutory_ penalty for a purposeful violation of copyright
law is USD$150,000.00 plus fees and legal costs.  Per violation.

Are you really going to admit in this public forum that you regularly
violate copyright law on purpose?

Lee Winter
Nashua, New Hampshire (Live Free or Die)
United States of America


Re: FSF condemns partnership between Mozilla and Adobe to support Digital Restrictions Management

2014-05-18 Thread Lee Winter
 help.  But you appear to be beyond my ability to
help.

Lee Winter
Nashua, New Hampshire (Life Free or Die)
United States of America


How to get D-I to put /boot on a flash drive?

2014-05-07 Thread Lee Winter
If I want / to be on a hard drive and /boot to be on a separate drive
or partition D-I appears to handle this request gracefully.

But if I put / on a hard drive logical partition and /boot on a
bootable flash drive partition, e.g, /dev/sdc1, it appears that there
is no boot loader (e.g,, GRUB or LiLo) that can install itself.

There are very many tutorials on how to get an install image or a live
image onto a bootable flash drive, but I've not been able to find one
that works with the boot info in /boot on a flash drive and the rest
of the system on an HDD partition.

Where should I be looking for information on this issue?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cabaahfd4pr7wm8sa2yvu5qxg1jwcvevdpfcfunnmuqwnpob...@mail.gmail.com



Re: Wiping hard drives - Re: debian-user-digest Digest V2011 #1704

2011-09-20 Thread Lee Winter
On Tue, Sep 20, 2011 at 12:21 PM, D G Teed donald.t...@gmail.com wrote:
 On Mon, Sep 19, 2011 at 11:07 PM, Scott Ferguson
 prettyfly.producti...@gmail.com wrote:
  On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:

 I think it is healthy to have a dose of skepticism with these things.

You also need to apply that attitude to what you see in the mirror.

  It has been demonstrated that a zeroed drive cannot be
 recovered at the typical data recovery service business.

No it has not.  There is no such thing as a typical data recovery
company.  Each has strengths as weaknesses.


 There is also this outstanding challenge for someone to recover
 data from a zeroed drive:

 http://hostjury.com/blog/view/195/the-great-zero-challenge-remains-unaccepted

That challenge is a crok of crap.

 Kinda like the reward put up for psychics to prove themselves.
 The only caveat which could be getting in the way is to not
 disassemble.

1.  So you think three days is enough time?  Have you ever had to read
an entire drive one sector at a time?  80 GB is 160M 512-byte sectors.
 Even on a 15K RPM drive, single-sector reads will take a long time at
one revolution per sector.  15K sectors per minute implies about 10K
minutes.  Three days is less than half of that.  Yet With induced
variations on the drive electronics one might need many such passes to
accomplish a decoding.

2.  So you think the prohibition on writing to the drive is not an
obstacle?  That eliminates a huge number of approaches based on
characterizing the write circuitry.

3.  So you think the disclosure requirement is not an obstacle?  There
is no word for that degree of naivete.

 This would get in the way of using a more
 powerful read head or other methods, but at the same time
 this does demonstrate if it is simply a personal drive you
 want to zero and sell on eBay, zeroing will cover the situation
 well enough.

No it will not.  But two passes with a TRNG will certainly do so.

 The skeptics here await links illustrating data has been
 accurately recovered from zeroed drives.

Please hold your breathe until then.

Lee Winter
Nashua, New Hampshire
United States of America (NDY)


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CABaAhFATBa2AAbVbXFw_YxMkH6+2MRhk7jxww=ki7b2pjkq...@mail.gmail.com



Re: Wiping hard drives - Re: debian-user-digest Digest V2011 #1704

2011-09-19 Thread Lee Winter
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com wrote:
 On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
 If you want to be safe, you need to overwrite the data several times,

 Have anything to back that up? If you're using drives that used the old MFM
 or RLL encoding schemes, and had massive space for bits per linear inch,
 then sure, but on today's drives, with perpindicular encoding, and the
 extremely dense bit capacity, going more than once is silly.

That conclusion is not valid.

All such analysis is sensitive to the value of the data.  If you are
going up against a serious adversary, colloquially known as National
Technical Means, then no amount of overwriting is secure.

If you are going up against an ordinary thief of the machine or drive,
then a single overwrite is sufficient.  In fact there is no need to
overwrite the entire drive when the meta-data of directories, inodes,
journals, etc. is a small fraction of the entire drive.

I perform this service for commercial recyclers.  In addition to
scrubbing techniques, some need to damage the drive by rendering it
non-functional (with a hammer or a drill).  Some need to destroy the
drive, usually by shredding.  Some need to destroy the recording
medium, for which incineration tends to be the least expensive.

For high security situations a combination of scrubbing and physical
measures are recommended.  For example, unscrubbed media that has been
finely shredded can still offer recoverable data because the high
density of the recording means that a very small shred may contain
many intact sectors of data.


 'shred' does delete data several times. We hardly are able to recover
 data that one time really was deleted at home, but CSI is able to do
 this

 [citation needed]

 and I'm not talking about the trash that is produced by Jerry
 Bruckheimer. There e.g. are real methods with lasers that make it
 possible to recover magnetic data from sledgehammer deformed HDDs and
 even a private person legally just need to pay some k of Euros to a
 company and can benefit from those methods. OTOH nobody is able to
 factorise primes, it would take 20 or 30 years to crack openPGP with a
 super computer, but if there should be delicate data on your HDDs, that
 isn't encrypted, note, it just takes some seconds to open the door of
 your flat and to get your HDD that's still in use.

 You may want to read this, as well as the references the article links to:

    http://goo.gl/5QG4U

 Claiming that you can recover data after a single pass of zeros on today's
 spinning platters is urban legend.

No.

Consider that those organizations able to recover after a single pass
with known mask pattern have a negative incentive to advertise their
abilities.

One pass scrubbing, even with a variable mask pattern driven by a TRNG
rather than a PRNG, is ineffective because the write activity hands
the adversary a complete copy of the mask pattern.  A second pass to
obscure the mask pattern is strongly recommended.

 I guess if you like wasting your time,
 go for it. I've got better things to do than do several passes on a 2TB
 SATA disk, running at 30MBps, and I can sleep at night knowing that no one
 will get access to the data.

Why do you care how long it takes?  Stick the drive in in a spare,
low-end machine and let it hum for as long as it takes.

Lee Winter
Nashua, New Hampshire
United States of America (NDY)


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cabaahfcp5mo1c4zjenrh1wsth7hhojsm-0yuz0suxocqe2z...@mail.gmail.com



Re: Wiping hard drives - Re: debian-user-digest Digest V2011 #1704

2011-09-19 Thread Lee Winter
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
 On Mon, Sep 19, 2011 at 1:21 PM, Lee Winter lee.j.i.win...@gmail.com
 wrote:

 On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com
 wrote:
  On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
  If you want to be safe, you need to overwrite the data several times,
 
  Have anything to back that up? If you're using drives that used the old
  MFM
  or RLL encoding schemes, and had massive space for bits per linear inch,
  then sure, but on today's drives, with perpindicular encoding, and the
  extremely dense bit capacity, going more than once is silly.

 I perform this service for commercial recyclers.

 Or in other words, it must be true because the service provided
 depends on this being true.

No.  And I find your comment offeisive.

 It remains an urban legend as long as there is no proof offered otherwise.
 I'm not saying it is true or not, but just that there has never been
 a demonstration made public of getting data off drives after
 a complete zeroing.

That you know of.  I suspect I read much more of this literature than you do.

  So it remains an unknown, and never demonstrated.

You also failed to consider the asymmetry between the possible
outcomes once the truth becomes known.  If one-pass overwrite is
sufficient, but one uses multiple passes, then one has lost a small
increment of time.  If one pass overwrite is not sufficient and you
use only one pass, then you have a disaster on your hands.

The way to resolve uncertainty is not to guess or flip a coin.  It is
to carefully evaluate the risk vs. cost tradeoff.  People who perform
that evaluation tend to be conservative about assessing unknown
potential risks against known, fixed, and minor costs.

Paranoia is whole 'nother story.  I suspect you use the term for
dramatic purposes rather than for the purpose of clarity.  It devalues
all of your comments.

Lee Winter
Nashua, New Hampshire
United States of America (NDY)


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cabaahfbmeqcjwhu+5n3t7hxunssxtsivfuiy-eyjxqu+3qd...@mail.gmail.com



Re: Wiping hard drives - Re: debian-user-digest Digest V2011 #1704

2011-09-19 Thread Lee Winter
On Mon, Sep 19, 2011 at 10:23 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:

 I use Dban and shred (stick them in an old machine and take as long as
 it takes) - then disable the drive (pin in the breather hole), pliers on
 the power connectors.

DBAN is definitely one of the better tools out there, but it has
weaknesses that have to be considered.  For example, it believes the
drive ID and info.  It uses that info to determine what needs to be
done (e.g., number of sectors to be written).  If the drive is working
and being replaced to increase capacity, that it not a problem.  But a
drive being replaced  due to unreliability or with intermittent errors
can deceive DBAN which will happily scrub only the number of sectors
reported by the corrupted firmware.

So when you run it, particularly when doing batches of drives, you
have to verify that the ID and drive info matches the specs on the
drive.

Lee Winter
Nashua, New Hampshire
United States of America (NDY)


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cabaahfaqs40l35xdxxfffz+v2vzmzurefh_ky-aoq_tfzl1...@mail.gmail.com



Re: file systems

2011-05-01 Thread Lee Winter
On Sun, May 1, 2011 at 8:40 AM, Eduardo M KALINOWSKI
edua...@kalinowski.com.br wrote:

 http://en.wikipedia.org/wiki/Argument_from_authority

 http://en.wikipedia.org/wiki/Appeal_to_tradition

Both wrong.  Wrong context.  Please read them again carefully.

 Bigamy is having one spouse too many.  Monogamy is the same.

Are you writing from experience?

Lee Winter
Nashua, New Hampshire
United States of America (NDY)


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/banlktimvjuxg2oxzziekqh0dgczwrbv...@mail.gmail.com



Re: Free book - GNU/Linux Advanced Administration

2010-02-04 Thread Lee Winter
On Thu, Feb 4, 2010 at 3:18 PM, Kent West we...@acu.edu wrote:

 Why, oh why, don't professionals proof-read their material?

 On the first page, in the first paragraph:
 The GNU/Linux systems have reached an important level of maturity,
 allowing to integrate them in almost any kind of work environment,
 from a desktop PC to the *sever* facilities of a big company.

A legitimate issue for publishers.  One problem is writers who think
spell checking is good enough.  Clearly their self-expectations are
set too low.

Another problem is that it is extremely difficult for a writer to read
what he actually wrote as opposed to what he intended to write.  Even
worse is the problem of what he meant by what he intended to write as
opposed to what the reader might think he meant by what he actually
wrote.  This is why proofreading is a serious, professional (and thus
expensive) skill.

Multi-platform software coders learn the basics of such parallel,
multi-path interpretation when they confront the problem of multiple
compilers all of which claim to be standard, but no two of which
interpret certain code fragments the same way.

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Sorting elements *and* knowing where each one has been put

2010-01-29 Thread Lee Winter
On Fri, Jan 29, 2010 at 6:08 PM, Merciadri Luca
luca.mercia...@student.ulg.ac.be wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Hi,

 I have some numerical values, i.e. something like

 ==
 value_1
 value_2
 .
 .
 .
 value_n
 ==

 There are many ways to sort them, but the `sort' command is clearly
 appropriate.

 The problem is that I need to know where value_i is, before, and
 after, the sorting. It can be found easily by keeping in memory where
 value_i is before the sorting (for every i, 1=i=n), and finding
 where value_i is after the sorting, by looking in the sorted numbers
 and finding value_i. However, this solution, despite being simple, is
 clearly bad on an algorithmic point of view. The best way is
 consequently to use the sorting function (which could be, e.g. a
 Heapsort, or simply the `sort' command) to know where value_i is
 displaced once it has been transformed by the sorting function.

 However, I do not know how I can do this with the `sort' function. Is
 it even possible? (I considered 1=i=n through the whole message.)

In the discussion above you persist in mixing the sort function with
the sort command.  They are not the same, so please be more careful in
your descriptions of what it is you want to accomplish.

To sort with a function, such as is found in many programming
languages, you should create a data structure containing the value to
be sorted (the key) and any audit/trance information you need about
the position of each item prior to the sort.  After sorting such data
structures with the language's sort() function you will be able to
identify where each value started and ended.

To sort with a command, such as is found in many command-line
envoronments, you should create lines of text, each containing the
value to be sorted (the key) and followed by any audit/trace
information you need about the position of each item prior to the
sort.  After sorting the text lines with the command-line
environment's text sorting utility you will be able to identify where
each value started and ended.

The above descriptions answer the question you asked.  But it appears
to me that the answer you need is related to a different question.
What do you need to do with the values after they are sorted?  If you
have both the initially ordered list and the sorted list, why do you
care where things started as long as they are where they need to be
when you are done?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Does lenny use grub2?

2010-01-29 Thread Lee Winter
On Fri, Jan 29, 2010 at 8:30 PM, Stephen Powell zlinux...@wowway.com wrote:
 On Fri, 29 Jan 2010 19:31:13 -0500 (EST), Matteo Riva wrote:
 I have a squeeze system installed and I wanted to install a debian
 lenny in another partition and I was wondering if there could be
 issues with the bootloader. Does lenny use grub2 now?
 If not, will there be conflicts with the two versions?

 Grub2 should be able to boot both Squeeze (2.6.32) and Lenny (2.6.26) kernels.
 But putting them in separate partitions is another matter.  I've never tried
 booting two completely separate Linux systems in different partitions from
 the same boot loader before.  It seems like it should be possible, but
 I've never tried it.

It is possible.  With Grub.  In fact the most bootable operating
systems (environments in the case of micros~1 window~1) ever
installed on a single PC was created exactly that way.  They got more
than 150 separate bootable partitions on (IIRC) four drives.

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: OT: Standards was Re: Does everything depend on everything?

2009-10-31 Thread Lee Winter
On Sat, Oct 31, 2009 at 4:05 PM, Johannes Wiedersich
johan...@physik.blm.tu-muenchen.de wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Dennis Wicks wrote:
 Sadly, only three nations have the good sense not to spend 10's of
 millions of their GNP converting to Yet Another Arbitrary System Of
 Measurement. Burma, Liberia, and the United States.

 FWIW, I don't think that it makes sense that different countries, etc.
 use different sets of standards. The standards [1] of the ISO [2] are
 not 'Yet Another Arbitrary System Of Measurement'. They are *the* common
 standard that exists.

I wish that were true, but it is not.  It is just ISO propoganda.

 All other systems are arbitrary (ie. different for
 different countries, different purposes, etc.).

Wrong.  The system of natural units is not arbitrary.  So it is the
One True System if you want to get religious about it.

However, the individual metrics in all possible systems, including
those based on natural units, have several equivalent forms, the
choice of which is necessarily arbitrary, but only slightly.


 Note that this very mailing list would not exist in its present form, if
 instead of a common standard there were different implementations for
 email for the different applications and/or countries.

By that reasoning the US component of this mailing list is necessarily
incompatible with the rest of the internet.  Since that conclusion is
manifestly false either your factr or your reasoning is wrong.  IMHO
both are.

 There are many
 more examples, why common standards are important.

That statement confuses common with right, which is a serious
error.  It also implicitly assumes that common standards are
intolerant of alternatives, which is also manifestly wrong.

And at one time the ISO system was uncommon, so it would have been
subject to the same criticisms that you now level against its
competitors.  That indicates that your assertions are based on the
shifting sands of history and its accidents rather than on objectively
measureable merits.  So why should anyone care about the current fads
of metricians?  After all they are certain to change. (C.F. the
shrinkage in the ISO national standards for weight as compared to the
master standard.)

Please consider these propositions:

Resolved: that the existence of standards is a Good Thing(tm).

Resolved: that the existence of standards zealotry is a Bad Thing(tm).

Since we have adequate standards we should not tolerate any kind of
standards zealotry.

-- Lee

P.S.  Astute observers will note that the Imperial/American system of
units has already been converted to an ISO basis.  That is why the
modern inch is DEFINED to be 2.54 cm.  -- L.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Floppy Net Install Stable

2009-10-29 Thread Lee Winter
On Thu, Oct 29, 2009 at 4:58 PM, Stan Hoeppner s...@hardwarefreak.com wrote:
 S. Fishpaste put forth on 10/29/2009 3:41 PM:

 Does this default to installing Etch, and does one get a choice to switch
 the distro sources list before it's written to disk during the install? I
 don't remember ...

 I'm pretty sure all the boot floppy installs point to the stable
 directories on the mirrors.  Lenny is the current stable, so you should
 end up with a Lenny system regardless of using Sarge or Etch net install
 floppies.

The lenny version of the network installer (which the badly named
netinst is not) seems to look for both lenny and stable on the
mirror.  If either is missing it complains and the web server logs
reflect the unsuccessful request.

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Could you recommend CD/DVD writer program?

2009-10-16 Thread Lee Winter
On Fri, Oct 16, 2009 at 8:12 AM, Leandro Quibem Magnabosco
leandro.magnabo...@fcdl-sc.org.br wrote:
 This thread *has* to stop!

And you are adding to it in order to shorten it?


 =(

 Every time someone replys to this thread, God kills a kitty.

Who told you that?

 It's true.

How would you know?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Could you recommend CD/DVD writer program?

2009-10-16 Thread Lee Winter
On Fri, Oct 16, 2009 at 12:03 PM, Matthew Moore
anonymous.jon...@gmail.com wrote:
 On Friday October 16 2009 9:11:05 am Lee Winter wrote:
 leandro.magnabo...@fcdl-sc.org.br wrote:
  This thread *has* to stop!

 And you are adding to it in order to shorten it?

 This thread is much like any infinite set. Adding a finite number of elements 
 to
 it does not change it's size.

Good point.  But I think there's a reasonable quibble about the
difference between unbounded and infinite (in the cantorian sense).


  Every time someone replys to this thread, God kills a kitty.

 Who told you that?

  It's true.

 How would you know?

 2 observations:

 (1) I kill a kitty every time this thread is posted to.
 (2) you cannot prove that I am not god.

(1) is a on't care.
(2) is obviously false by inspection because I am.

I think this is related to the proof of existence of actions god
cannot perform like creating a stone so heavy he cannot reflect it.
Being your probably belongs in that class.

-- Lee

P.S. for the purposes of this thread we should assume that there is no
such thing otherwise we would have to submit to his/her/its dicta re
list message length and the suitablity of Reply-To headers.  Thus the
topic is OT for this thread (as opposed to OT for this list).  -- L.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Could you recommend CD/DVD writer program?

2009-10-13 Thread Lee Winter
On Tue, Oct 13, 2009 at 12:43 PM, Chris Jones cjns1...@gmail.com wrote:
 On Tue, Oct 13, 2009 at 04:21:40AM EDT, Terence wrote:
 2009/10/13 Dave Sherohman d...@sherohman.org:

  The position I was trying to explain in my earlier message was that,
  even though 99% of replies to mailing list messages are intended to
  go to the list, directing an intended-private message to the list
  causes over 100 times more harm than a message intended for the list
  being inadvertently made private.  The Debian list policy is,
  therefore, reasonable, because it minimizes the overall total harm
  caused by misdirected messages.
 
 cut
 

 Well said. I think that about covers it.

Not quite.


 +1

 I have personally experienced the embarrassment of such situations on a
 couple of occasions, and counted my blessings that there was nothing
 sensitive in these messages.

This is an excellent example of why there should not be a globally
defined policy denying the utility of potentially useful features.

While this poster has _personal_ experience that influences his
preferences, others may have a different experiential context, and
thus have a diferent preference.

If Reply-To is available then users are able to exercise choice is
using it or not.  If Reply-To is not available due to some Ex-Cathedra
policy decision then user's choices are eliminated.

I suggest that it is not the place authors of mail readers nor of
mailing list administrators to make user's choices for them, or worse,
prohibit them from exercising choice at all.

Consider an email UI that offered the following choices:
- reply to sender (only)
- reply to list (only)
- reply to all
This would appear to make it possible for the user to establish a
default preference and selectively override it as necessary.

If such a UI were commonly available, how would that hurt the
community of  mailing list members?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Could you recommend CD/DVD writer program?

2009-10-13 Thread Lee Winter
On Tue, Oct 13, 2009 at 5:31 PM, Chris Jones cjns1...@gmail.com wrote:
 On Tue, Oct 13, 2009 at 01:09:22PM EDT, Lee Winter wrote:

 [..]

 This is an excellent example of why there should not be a globally
 defined policy denying the utility of potentially useful features.

 No global policy..? Sounds like an oxymoron to me.

Spending too much time looking in the mirror?

Almost everything you write was flat-out wrong. And couched in an
argumentative tone that appears to invite a flaming response.  You
would probably enjoy such a response because it would make you feel
superior.  Thing is, I'm a sadist, so it is my intention to deny you
that pleasure.  Please suffer my neglect of your need in silence.

The fact that some people fear inadvertent embarassment does not
justify the administrative imposition of rules to protect all users
by eliminating options they would reasonably expect to have available.

Are you going to bounce message due to bad spelling?  Or bad grammar?
They are also embarassing and far more frequent.  Just how far should
protecting the members of the community from their own errors go?
Personally, I neither need nor want such protection.  If you and
others like you want such protection you should implement it at your
end and not impose your prejudices upon the other members of the
community.

One thing you mentioned, or at least implied, is certainly worthwhile,
which is the fact the the responsibility for handling messaging lies
with the writer, not matter how stupid and short-sighted the policies
of the list admins might be and no matter how malformed the mail
reader software might be.

So I will happily comply with the policies of this list and send to
all until sanity in the form of a sensible alternative evolves.
After all, if your email software is too stupid to suppress duplicate
messages, perhaps you should upgrade to a more reader-friendly
application instead of forcing everyojne else to change their behavior
to accomodate to the defects in your mail handling app.

Duplicatively,

Lee Winter
NP Engineering
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: OT: mutt/nano spell checking

2009-10-07 Thread Lee Winter
On Wed, Oct 7, 2009 at 10:44 AM, Jon Dowland
jon+debian-u...@alcopop.org wrote:
 On Tue, Oct 06, 2009 at 04:27:56PM -0400, Chris Jones wrote:
 'p' for 'paste' does strike me as rather more intuitive
 than Ctrl-V.

 That all depends on your background. I use vi every day (I
 am a UNIX systems administrator); most of the time my vi is
 actually vim; but I wouldn't for a second recommend it to
 anyone who was not already familiar with the original vi (or
 any other modal editor: I can't name any others).

 Just about anyone who isn't an old-hand UNIX user will have
 some familiarity with a modeless editor and will have used
 an environment where CTRL+V is the key binding for 'paste',
 as it's been the default for over 10 years in GNOME, KDE,
 Mac OS, and Windows, to name but four.

 Nano is a perfectly fine, minimal-featured modeless editor.
 It was written as a F/OSS clone of 'pico', which is not DFSG
 free. It is considerably more intuitive and user friendly to
 the vast majority of people who are new to Debian or Linux
 (and thus are not already affiliated with any particular
 church or cult of $EDITOR). See
 http://www.nano-editor.org/dist/v2.1/faq.html#1.4 for more
 information.

^Z, ^X, ^C, and ^V were not chose for mnemonic value.  They were
chosen for user convenience due to their physical placement on early
keyboards with only one crtl key.  The idea was to make high-frequency
actions like undo, cut, copy, and paste very easy to type.

That mapping pre-dates the Macintosh.  I think it came from Xerox PARC
where WIMP user interfaces were fist invented and implemented.

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Suggestions for video/tv capture?

2009-10-04 Thread Lee Winter
On Sun, Oct 4, 2009 at 1:56 PM, Chris Jones cjns1...@gmail.com wrote:
 On Sun, Oct 04, 2009 at 08:32:09AM EDT, Christer Oldhoff wrote:

 [..]

 You probably mean Hauppage PVR-150.

 Actually, it's Hauppauge but you are excused, since nobody outside
 Long Island knows how to spell it, never mind pronounce it. ;-)

In a phonetic world that would be Lonn Giland, right?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Gmail again

2009-10-03 Thread Lee Winter
On Sat, Oct 3, 2009 at 12:46 PM, Brad Rogers b...@fineby.me.uk wrote:
 On Sat, 3 Oct 2009 19:19:53 +0300
 Jari Fredriksson ja...@iki.fi wrote:

 However, on at least one list I'm on, there are people that *insist* on
 only replying privately, not the list.  I'm starting to get tired from
 the constant need to redirect my reply to the list.  Even adding a
 suitable line in the email doesn't dissuade these people from replying
 privately only.

 Maybe I should just killfile them..

Nah, don't do that.  Instead send them a blunt reply stating that you
will only respond to messages submitted to the list and asking them to
resubmit their message to the list if they was to see your reply to
it.  If you want to be seriously obnoxious you can wax effusive about
how interesting their comments were but use such stilted, formulaic
phrasing that it becomes obvious they are reading a mechanical,
non-responsive response.  (C.f. Lou Dobbs' responses to email
submissions).

The sender is the problem, not the message he sent.  So make the
message handling his responsibility.

This is based on one of the fundamental principles of good
citizenship, which states that the best way to deal with a bad law is
to enforce it vigorously.  This comes with the implication that
enforcing it upon its proponets is often a useful optimization.

In the email situation the best way to deal with bad habits is to make
the person with the bad habits deal with the consequences of their
behavior.

The worst that will happen is that they will adjust their behavior
_toward_you_ alone.  Which reduces to the killfile solution excapt
they have to maintain the killing-of-self rather than you having to
maintain the entry in your file.

Good luck (I am certain you will need it ;-)

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Xfce GNU/Icecat and Gnome-programs

2009-09-21 Thread Lee Winter
On Mon, Sep 21, 2009 at 5:45 AM, ura cherka...@smila.com wrote:
 Good day!
 I have this problem: using Xfce, browser GNU/Icecat, Evolution, and
 other Gnome-programs can not open links to Internet.
 How can I fix it?

Can you you reach your ISP from the command line with ping?

-- Lee


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: OT: Re: There is no planet B

2009-09-20 Thread Lee Winter
On Sun, Sep 20, 2009 at 10:24 AM, Chris rac...@makeworld.com wrote:
 On Sat, 19 Sep 2009 18:04:40 +1200
 sam blackmore sig...@greenpeace.org.nz wrote:

 Yup this is a mail bomb - sign on with Greenpeace to help stop
 climate change. You'll win a planet!

...


 You can't stop cyclical stages (please, no more global warming or
 climate change terms when in fact it would be correct to use something
 like cyclical change or stages).

 The earth cools, goes through ice ages (as it has many, many times
 before - and will continue to do) - then heats up again (as it has many,
 many times before - and will continue to do) and ends ice ages and
 everything gets greens and happy again.

 You are  simply silly to think that mankind can do more damage than
 Mother Earth herself can do so much quicker, efficiently, and will
 continue to do all on her own at any one time...

 Visa-Vie droughts, floods, earthquakes, volcanoes, plate tectonics,
 pole shifting, etc.

 I'm waiting for these types to tell us that volcanism, plate tectonics
 and pole shifting is also brought on be mankind. When that happens,
 then I'll believe in human induced global warming...

Now let's be constructive.  Instead of blaming or punishing humans for
their faults as a way of collecting political power we should be
applying positive behavior modification to motivate constructive
action as follows:

Of course vulcanism, plate tectonics, and pole shifting are the fault
of humans.  In fact sunspots, the 3% variability in the solar output,
the frequency of asteroidal and cometary impacts, and all gamma-ray
bursts within 1K light years of the star Solaris are also the fault of
humans because so far humans failed to do anything to protect the
planet from those disasters.

 -- from an up-coming Scientific American /r/a/n/t/ article by
Tsipsis and Sachs.

The only question really worth debating is how much responsibility we
should accept for the historical destruction of the eco-sphere.  Is it
enough to simply stop the present harmful activity or do we have to
undo the past damage?  And how far back should we look?

If we want to stop the ice ages we have to restore the planet to a
time about 5.5e8 BC when the great oxygenation event destroyed the
greenhouse gasses that were stabilizing the climate.  That caused the
first ice age and contributed to the following ones.

But if we really want a complete restoration we have to go back about
2.5e9 BC to the time before early biological activity first oxygenated
the atmosphere and destroyed the iron-dominated ecology of the oceans.
 All we have left of that ecology is thousands of square miles of
banded iron formations (BIF), which /s/e/e/ google.

Clearly oxygen is the culprit.  When it appears with DHMO then watch out.

Biological activity caused all of those damaging changes.  Many people
think we should fix that.

I ain't one of 'em.

Lee Winter
NP Engineering
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: install problem

2009-09-16 Thread Lee Winter
On Wed, Sep 16, 2009 at 3:05 PM, Jan Willem Stumpel jstum...@planet.nl wrote:
 This is really an embarrassing question for an old Debian hand to
 ask, but how do I install Debian?

 I just bought a netbook which has no CDROM drive, but which can
 boot from a USB stick. I could dd an Ubuntu image to the stick and
 then boot from it. But I prefer just plain old Debian.

 I found (through the Debian home page) an image called
 debian-503-i386-netinst.iso. I dd'd it to the stick. But the
 netbook does not boot from it.

 There must be something very elementary which I did wrong. But what?

What you are looking for is labeled hd-media.  It doesn't mean high
density media (floppies).  It means USB.

Good luck,

Lee Winter
NP Engineerinr
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Defects in apt-spy and associated documentation

2009-09-13 Thread Lee Winter
2009-09-13

Defects in apt-spy and associated documentation

1.  [normal] Man apt-spy states that the default location for the -m
argument is /var/lib/apt-spy/mirrors.txt.  That statement is false.  I
found the file in /var/cache/apt-spy/mirrors.txt.

2.  [normal] Man apt-spy state that the -i option defines the location
of the input file and that the input file should be created with the
-w option.  But the description fails to mention any purpose or use of
the input file.  There appears to be no such purpose given that -f,
-m, and -u define all of the files that apt-spy is supposed to use as
inputs.

3.  [normal] When run as apt-spy -d lenny -s us it tests one single
url, that being ftp.us.debian.org despite the fact that mirrors.txt
many mirrors and lists several members of the ftp.us.debian.org pool.
And when run with -d lenny -s ca,us it tests all of the canadian
mirrors, but only ftp.us.debian.org in the United States.

4.  [important]  It only tests with ftp.  There appears to be no
method to persuate it to test with http as the man documentation
suggests it should.

5.  [normal]  None of the output files contain any of the metric
information on which a user might based decisions regarding the
contents of sources.list.

6.  [important] Some configurations, which I cannot reliably cause,
produce entries of the form (null) in
/etc/apt/sources.list.d/apt-spy.list.  There are no error or warning
messages associated with the error condition.

Submitted by
Lee Winter
NP Engineering
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Installing onto an old laptop

2009-09-12 Thread Lee Winter
On Sat, Sep 12, 2009 at 4:53 PM, AG computing.acco...@googlemail.com wrote:
 I have an old generic laptop which has Slackware 10.1 installed.  It has
 access to the Internet as well as to a small LAN.  The machine it is
 connected via a hub to is my main desktop/ workstation which runs Debian
 testing.  The CD-ROM drive in the laptop does not work.  This is a hardware
 issue, so installation via CD is not feasible.

 The laptop does have a couple of USB drive sockets, but I don't think that
 the BIOS is sufficiently modern to boot from a USB drive (the laptop was
 bought circa 2002 from a company that has since gone belly up).

 What is the best method for getting this laptop up and running in the 21st
 Century with Debian testing?

 Thanks for any ideas/ suggestions.

This worked for me:

1.  On the laptop download the netboot kernel linux and initial ram
disk initrd.gz from ftp.{countrycode}.debian.org to the root of the
first partition on the hard drive.  You do not need a .ISO file.

2.  On the laptop run grub (e.g., from a PC-DOS floppy or a linux file
system) and enter the following commands:
root (hd0,0)  # assuming the files in step 1 are on the
first parition of an IDE drive
kernel linux
initrd initrd.gz
boot

3.  Complete the installation over the internet.

Lee Winter
NP Engineering
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Inquiry:How to totally wipe out the entire hard drive

2009-09-12 Thread Lee Winter
On Sat, Sep 12, 2009 at 6:36 PM, Florian Kulzer
florian.kulzer+deb...@icfo.es wrote:

 On Fri, Sep 11, 2009 at 23:56:47 -0400, Napoleon wrote:

 It is only their opinion that it cannot be done.

 Wright et al. have empirical evidence supporting their conclusions.

No they do not.

This key to this issue is that when one consults an expert, no matter
how many credentials they have, one must consider their statements
critically.

An expert (or even a nuby/amatur) who claims I know how to do this
should get the benefit of the doubt and be believed.  Similarly, an
expert who says I do not know how to do this should also be
believed.  If they say I have tried many ways to do this and found
none that works they should be believed and probably consulted as to
how to not accomplish the goal.

But if they say I know that it is not possible for anyone to do this
then they do not deserve the benefit of the doubt.  They have to
provide a proof.  Now if they can elaborate by saying the laws of the
universe prohibit anyone from doing this and can provide a valid
proof then they should be believed.

But the authorities you quote do not have such a proof.  In fact they
do not even have any evidence.  What they have is an opinion as to the
difficulty of reaching the goal, about which they should be believed.

Please do not confuse that is hard with that is impossible.

Meditatively,

Lee Winter
NP Engineering
Nashua, New Hampshire


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



DBAN (was: Inquiry:How to totally wipe out the entire hard drive)

2009-09-06 Thread Lee Winter
-- Forwarded message --
From: Lee Winter lee.j.i.win...@gmail.com
Date: Sun, Sep 6, 2009 at 2:21 PM
Subject: Re: Inquiry:How to totally wipe out the entire hard drive
To: Andrew M.A. Cater amaca...@galactic.demon.co.uk

On Sun, Sep 6, 2009 at 6:39 AM, Andrew M.A. Cater 
amaca...@galactic.demon.co.uk wrote:

 Better, by far, is to get hold of a copy of DBAN [floppy image/CD image
 or even Windows .exe] Runs in memory, uses a Linux kernel to bootstrap a
 disk wipe program offering various options.] Using this, you can also
 securely delete hard drives before disposing of a machine / securely
 remove any pre-existing contents on any drives in a machine you acquire.


Be careful with DBAN.  It is good, but it has weaknesses.  Among other
things, it will believe the drive electronics even if the data provided is
obviously wrong.  For example, if the drive electronics tells DBAN that your
100GB disk is really a 100MB disk DBAN will happily clean the first 100 MB
and report success.

I do professional drive cleaning (e.g., 100-1000 drive batches) and DBAN is
a good tool.  But it is far from perfect.  So use it carefully.

Lee Winter
NP Engineering
Nashua, New Hampshire


Re: Inquiry:How to totally wipe out the entire hard drive

2009-09-06 Thread Lee Winter
On Sun, Sep 6, 2009 at 3:42 PM, Sven Joachim svenj...@gmx.de wrote:

 On 2009-09-06 21:12 +0200, John Hasler wrote:

  Napoleon writes:
  Overwriting with zeros (or ones) once is not at all secure.  It can
  easily be nearly 100% recovered by someone with the necessary
  equipment, even more so on a modern drive.
 
  Please provide evidence that anyone has ever done this on a modern
  drive.

 Jumping into that discussion, here is evidence that this is not possible
 with modern drives:


 http://www.h-online.com/news/Secure-deletion-a-single-overwrite-will-do-it--/112432


No, that it not evidence.  It is an opinion; possibly a very informed
opinion.  But security issues often require a skeptical perspective.  In
this case an expert's statement that he does not know how to retrieve info
from a drive is abolutely worthless in determining whether anyone else knows
how to retrieve info from a drive.



 http://www.h-online.com/news/Secure-deletion-a-single-overwrite-will-do-it--/112432

 So, anyone who wants to sell his hard disk can just use
 dd if=/dev/zero ... and be done with it.


That will work up to the value of the information being secured.  But once
the value of the information reaches an upper limit then it becomes
worthwhile for people to use more sophisticated techniques, and overwriting
with a constant pattern becomes worthless.

There is a recently revised NIST standard for securing information.  It says
very little -- propably because the US givernment has an interest in
lowering other entities security.  The previous versions of that standard
were a lot more informative and useful.

BTW, no sensible person ever said that 35 passes were necessary and/or
useful.  A well-informed and well-intentioned expert answered a silly
question and his answer boils down to the (valid) claim that it is not
possible for any drive to require more than 35 passes.  The total of 35 was
obtained by summing all of the possible overwrite techniques for all
possible drive/recording technologies.  After that many non-sensible people
claimed that 35 passes was the ne-plus-ultra in disk scribbing, which claim
is both invalid and stupid.

Lee Winter
NP Engineering
Nashua, New Hampshire


Re: Inquiry:How to totally wipe out the entire hard drive

2009-09-06 Thread Lee Winter
On Sun, Sep 6, 2009 at 5:52 PM, Christopher Walters cjw20...@comcast.netwrote:

  Lee Winter wrote:

 On Sun, Sep 6, 2009 at 3:42 PM, Sven Joachim svenj...@gmx.de wrote:

  [snip]

  Jumping into that discussion, here is evidence that this is not possible
 with modern drives:


 http://www.h-online.com/news/Secure-deletion-a-single-overwrite-will-do-it--/112432


 No, that it not evidence.  It is an opinion; possibly a very informed
 opinion.  But security issues often require a skeptical perspective.  In
 this case an expert's statement that he does not know how to retrieve info
 from a drive is abolutely worthless in determining whether anyone else knows
 how to retrieve info from a drive.

 [snip]

  That will work up to the value of the information being secured.  But
 once the value of the information reaches an upper limit then it becomes
 worthwhile for people to use more sophisticated techniques, and overwriting
 with a constant pattern becomes worthless.

 There is a recently revised NIST standard for securing information.  It
 says very little -- propably because the US givernment has an interest in
 lowering other entities security.  The previous versions of that standard
 were a lot more informative and useful.

 BTW, no sensible person ever said that 35 passes were necessary and/or
 useful.  A well-informed and well-intentioned expert answered a silly
 question and his answer boils down to the (valid) claim that it is not
 possible for any drive to require more than 35 passes.  The total of 35 was
 obtained by summing all of the possible overwrite techniques for all
 possible drive/recording technologies.  After that many non-sensible people
 claimed that 35 passes was the ne-plus-ultra in disk scribbing, which claim
 is both invalid and stupid.

 Lee Winter
 NP Engineering
 Nashua, New Hampshire


 Not a fan of Peter Guttman, I take it.


Incorrect.


   He is pretty well known in the fields of computer security and data
 deletion.  Here is a link to his paper.

 http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.htmlhttp://www.cs.auckland.ac.nz/%7Epgut001/pubs/secure_del.html


Yup, that's the one.

Please read the first paragraph of the section entitled Epilogue and
compare it to the summary I gave above in the last paragraph.  It was my
intention that they mean the same thing.

In the section entitled Further Epilogue he goes on to describe the
hopelessness of trying to recover info from a modern drive.  That section is
the target of my comments re the opinion of an expert who states he does not
know how to accomplish a certain task.  There is absolutely nothing wrong
with his statement.  There is everything wrong with the reader
mis-interpreting his statement as evidence or proof that the certain task is
infeasible.

Case in point.  A couple of years ago one of the major financial companies
(3rd I think) in NYC was concerned about reducing costs.  They run an
IT-intensive operation so they recycle machines often.  That is expensive.
But a 1-or-2-year-old HD is reasonably valuable.  So they wanted to recycle
them rather than destroy them.

But they have _extremely_ valuable information on even their desktop
drives.  Many contain customer information, so, as a fiduciary, any
preventable leakage would essentially put them out of business.  Other
drives may contain strategic information either in the form of documents or
in transaction records. And of course the data-center drives are even more
valuable.  What's all that information worth?  Many zeros.  _Many_.

As an aside, shredding is a popular method of drive destruction.  But modern
drive densities are so high that even a shred 0.01 square can hold valuable
data, so physical destruction alone is not sufficient.  That may have
something to do with the fact that _internal_ gov't standards allow only a
very few kinds of physical destruction -- i.e., complete to the level of a
minimum-sized magnetic domain of the particular recording media.  Think
acid, thermite, grinding/abrasion, etc.

Given the incredible value of the financial system data, how much is it
worth to recover it?  The modern recovery process usually has two distinct
phases, one quite capital- and skill-intensive and one quite ordinary.  The
first phase is to build a data recovery capability (lab).  That takes time,
money, and skilled labor.  The second phase is operating the recovery lab,
which is fairly cheap.  It isn't very fast though (meaning long latency, but
not meaning low throughput).

Point is that once you have such a capability many unreasonable
possibilities become quite reasonable.  And industrial espionage is a
thriving industry.  Just who owns (or more importantly controls) the
recycling company that hauls away your machines/drives?

Have you ever taken a drive apart, replaced the drive electronics and resold
it?  People do it all the time.  And if the replacement happens to be a much
more sophisticated board, you can read lots of things that the original