Eric Cordian wrote:
1. Because of the "application barrier to entry", no one can effectively
compete with Microsoft in the Intel/PC market OS, giving microsoft a
monopoly in this market.
This is bogus, because an OS designer can certainly support Microsoft's
APIs in addition to
Tom Vogt [EMAIL PROTECTED] wrote:
don't know about you over there, but over here in europe we DO tell
vendors of all sorts of products what to include. for example, certain
safety features are mandatory in all technical products. certain
ingredients are illegal in food. and there IS a regulation
PERMANENT LOW INTEREST
MAJOR CREDIT CARDS
WE HAVE 15 YEARS EXPERIENCE IN PERMANENTLY LOWERING OUR CLIENT'S
MASTERCARD AND VISA CREDIT CARD INTEREST RATES TO AS LOW AS 8.5%
ANNUAL INTEREST.
BANKS OFFERING PERMANENT LOW INTEREST RATE MASTERCARD AND
At 04:05 AM 4/5/00 -0400, Tim May wrote:
At 2:00 AM -0400 4/5/00, Lucky Green wrote:
I am currently participating in specifications working groups focused
on
next-generation digital mobile telephony. Cypherpunks will find some of
the
new features coming to a mobile phone near you interesting:
Matthew Gaylor wrote:
From a nation that censors the speech of it's citizens, and who would
like to censor everyone, why should anyone be surprised that they
have a standard for screws?
at least we don't have crypto export regulations. :)
At 11:18 AM 4/5/2000 -0400, you wrote:
it's an economical fact that few will doubt that a monopoly is bad for
the market, and thus for the economy. the state, representing (ideally)
both participant sides of the market, has the duty of ensuring that the
market continues to work well.
It is
Based on Moore's Law, this means it will be secure on computers roughly
10,000 times more powerful than today's systems. How likely is that?
Its not hard to imagine, if all we're talking about is brute force attacks.
Those are essentially the numbers I came up with as well. However (and I
CINCINNATI (AP) - Computer programs used to scramble electronic
messages are protected by the First Amendment because those codes are a
means of communication among programmers, a federal appeals court ruled
Tuesday.
Raymond Vasvari, legal director of the American Civil Liberties Union
of Ohio,
Disk INsecurity:last word on deletes, wipes The Final Solution.
My fellow Cypherpunks,
On the matter of getting rid of dangerous info on your hard disk,
here is a very interesting quote from The GIANT BLACK BOOK of
COMPUTER VIRUSES, second edition by Dr. Mark Ludwig
American Eagle
Dear Cypherpunks,
I am a Dutch artist working with digital media in the Internet cultural
space. In the summer of '97, I initiated the project the_living that
embodies a character appearing only on the Internet-a digi-persona.
One of the primary goals of the project is to create what I call 'a
On Wed, 5 Apr 2000, d.a. solomon wrote:
Dear Cypherpunks,
I am a Dutch artist working with digital media in the Internet cultural
space. In the summer of '97, I initiated the project the_living that
embodies a character appearing only on the Internet-a digi-persona.
Max Headroom?
[EMAIL
Giving credit to a US president for political change in the USSR seems a
little
far fetched. The people of the USSR and Eastern Europe were responsible for
that change.
Having actually lived in Europe during that time I cannot say that any of
the
activists I know considered Ronald Reagan a
TODAY: Stocks To Drop; PEAPOD and
DRKOOP.COM Falling Fast; IPO Updates,
Insiders Selling Big on ETOYS; and more.
Read on.
---
You are receiving this e-mail because you
have registered for Multex Investor, or
subscribed to TIA. To stop receiving this,
At 11:46 PM -0400 4/5/00, Phillip Hallam-Baker wrote:
Giving credit to a US president for political change in the USSR seems a
little
far fetched.
So the American space program was not a result of Sputnik? Nations
influence other nations all the time.
The people of the USSR and Eastern
On Wed, 5 Apr 2000, Justin Gowanlock wrote:
tell me how to make bombs
Let Joel Schumacher direct.
[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
"In the future, everything will have its 15
http://www.weeklyworldnews.com/stories/1450.html
This is a multi-part message in MIME format.
--=_NextPart_000_0005_01BF9EFF.51069C20
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
tell me how to make bombs
ARE YOU TIRED OF FREE STUFF THATS NOT ALLWAYS FREE???
IF YOU ANSWERED YES TO THAT QUESTION, THEN THIS IS FOR
YOU!!!
WE HAVE SPENT HOURS SEARCHING THE WEB FOR THE VERY
BEST OF THE
BEST FREE STUFF! FOR EXAMPLE:
FREE PC TO PHONE (NO B.S. JUST FREE)
On Wed, 5 Apr 2000, Jean-Francois Avon wrote:
==BEGIN FORWARDED MESSAGE==
'SMART GUN' KNOWS WHEN TO FIRE
An Australian firm unveiled a newly developed "smart gun" yesterday that it
claims won't fire if it falls into the wrong hands.
To fire the gun, the
Very simple
1. Go to Chi Chi's
2. Order the extra extra spicy chimi changa
3. Get extra extra extra hot sauce
4. Drink 24 bottles of a lousy stale import beer
5. Wait and let digestion do its job
---
It's all good.. -- Gotta love it
From: "Justin Gowanlock" [EMAIL PROTECTED]
To: [EMAIL
==BEGIN FORWARDED MESSAGE==
ALERT: Vicious Gun Brings Down Airliner!
"Ek! It's .. a .gu!"
"Norfolk Tower calling all flights. Be advised of the national emergency and
standby for delays in your flight pattern. Delta Express
On Wed, 5 Apr 2000, Justin Gowanlock wrote:
tell me how to make bombs
stick a fuse in a bottle of black powder, shove it up your ass, and light.
make sure all of your close friends are nearby, but that you are all away
from other people at the time.
-gore
Those are essentially the numbers I came up with as well. However (and I
admit to being fairly new to this), how many current schemes can be
broken
solely through brute force? Are any of them vulnerable to more elegant
(albeit computationally intensive) attacks?
You miss the point. Any
22 matches
Mail list logo