At 12:58 AM -0400 4/5/00, Phillip Hallam-Baker wrote:
>I had a bunch of folk from Newt Gingrich's office making very pointed
>references to Microsoft's 'Failure to play a social role'. I guess that they
>made similar comments to people who actually have influence in Redmond.
>
>This is not a victo
On Tue, 4 Apr 2000 [EMAIL PROTECTED] wrote:
> I stole this laptop and it has this "FOOLPROOF SECURITY SYSTEM" and I can't
> get the password. I can't do anything with this shit because it's locked,
> are there any cracks out there for this piece of shit program. If you do,
> hook a nigga up
Peter Junger's export case just won in the Appeals Court! Yee-hah!
>: > Junger v. Daley, 6th Cir. No. 98-4045
>: > http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0117p.06
>: > http://pacer.ca6.uscourts.gov/opinions.pdf/00a0117p-06.pdf
>: >"Having concluded that the First Amendment pr
ENIGMA MACHINE STOLEN FROM BLETCHLEY PARK
2 April 2000
Yesterday afternoon, an Enigma three rotor cypher machine
was stolen from the mansion at Bletchley Park [UK], home of the
world war 2 codebreakers and birthplace of the communications
revolution.
The machine, whose value is difficult to ass
espero que la persona que lea este mensaje sea un neonazi o
nazi, pero que me netienda en espanol. por que yo tambien lo soy y ademas quiero
conocer as otras personas para ver si la ideologia que traemos en nuestra mente
es la misma y si no para empezar a hacerlasolo una, pero tambien para
At 12:01 PM 04/04/2000 -0500, Jim Choate wrote:
>http://www.tachyon.net
>
>The main point of their setup is that the transceiver is at the subscriber
>end and you don't need a cell phone for outbound traffic. This means that
>you could put a complete site in a mobile environment and be up and onli
On 3 Apr 00, at 11:15, Tim May wrote:
> At 6:46 PM +0100 4/3/00, Lynne Askey wrote:
> >how do u make it then
>
> learn u to use punctuation and grammar
>
> otherwise fuck u
>
I think u both dont know how to do it
[EMAIL PROTECTED] writes:
> I stole this laptop and it has this "FOOLPROOF SECURITY SYSTEM" and I can't
> get the password. I can't do anything with this shit because it's locked,
> are there any cracks out there for this piece of shit program. If you do,
> hook a nigga up with the crack. t
Judging by the block diagram, it's a feistel network, using linear
subkeys, which is quite often a problem. Thanks but until I see the
details of the algorithm, I'm not gonna use it.
Joe
..it seems to work so far...you're not breaking into it...
On Tue, 4 Apr 2000 [EMAIL PROTECTED] wrote:
> I stole this laptop and it has this "FOOLPROOF SECURITY SYSTEM" and I can't
> get the password. I can't do anything with this shit because it's locked,
> are there any cracks out there fo
Who is this jerk - some kind of Microsoft paid flunky?
On Tue, 4 Apr 2000, Matthew Gaylor wrote:
> From: "Mises Institute News" <[EMAIL PROTECTED]>
> Subject: Reaction to Microsoft Ruling
> Date: Tue, 4 Apr 2000 09:47:56 -0500
>
> Dominick T. Armentano, Mises Institute adjunct scholar and autho
> Camellia was designed to ensure security in usage for more than 20 years
Based on Moore's Law, this means it will be secure on computers roughly
10,000 times more powerful than today's systems. How likely is that?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There was a series of articles regarding this in a recent IEEE
communications magazine. One company had an interesting way to
authenticate using multiple concurrent "prints": voice, lip movement,
and (I think) word spoken. Very interesting.
- -pete
Welcome the Premier Issue of The Telecomm
Analyst, bringing you investment ideas on
everything from satellites to wireless to
services. For questions regarding this new
publication,including subscribing, send an
e-mail to [EMAIL PROTECTED]
TODAY: DC Buzz: Senate probes AOL-TWX;
Pinnacle Inves
Welcome the Premier Issue of The Telecomm
Analyst, bringing you investment ideas on
everything from satellites to wireless to
services. For questions regarding this new
publication,including subscribing, send an
e-mail to [EMAIL PROTECTED]
TODAY: DC Buzz: Senate probes AOL-TWX;
Pinnacle Inves
At 9:16 AM -0700 on 4/3/00, NewsScan wrote:
> NEW INTERNET SECURITY SYSTEM RELIES ON HUMAN MONITORING
> A new Internet security company called Counterpane Internet Security Inc.,
> organized by well-known author and consultant Bruce Schneier, will use teams
> of analysts continuously scrutinizin
TOKYO, March 10, 2000-Nippon Telegraph and Telephone Corporation (NTT)
and Mitsubishi Electric Corporation (Mitsubishi) announced today their joint
development of "Camellia," a next-generation symmetric-key encryption
algorithm (*1).
Next-generation symmetric-key encryption algorithms with
Tim May wrote:
> >I suppose all things must pass - the net is just another in a long list.
> >It is being treated the same way people treat everything - if you can't
> >tame it, kill it. No appreciation for the finer things in life.
>
> We and other freedom fighters have been working to take the
18 matches
Mail list logo