HTML question (nbst)

2006-02-02 Thread Travis Roy
My manager is making a new contact DB for our company, and it's great. The problem is that for spaces he's using nbsp and it shows up in my firefox, but not in his IE. I'm positive it's that he's doing it wrong, but searching for it in google is hard because I get a ton of other pages that

RE: HTML question (nbst)

2006-02-02 Thread Brian
nbsp; don't forget the semicolon. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Roy Sent: Thursday, February 02, 2006 8:23 AM To: GNHLUG mailing list Subject: HTML question (nbst) My manager is making a new contact DB for our company,

Re: HTML question (nbst)

2006-02-02 Thread Christopher Schmidt
On Thu, Feb 02, 2006 at 08:23:27AM -0500, Travis Roy wrote: My manager is making a new contact DB for our company, and it's great. The problem is that for spaces he's using nbsp and it shows up in my firefox, but not in his IE. I'm positive it's that he's doing it wrong, but searching for

Re: HTML question (nbst)

2006-02-02 Thread Ben Scott
On 2/2/06, Travis Roy [EMAIL PROTECTED] wrote: The problem is that for spaces he's using nbsp and it shows up in my firefox, but not in his IE. Maybe he should switch to Firefox? ;-) Anyway, can anybody show me a proper example of using nbsp? PMy name is Bennbsp;Scott. This is a

Re: HTML question (nbst)

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 08:23:27AM -0500, Travis Roy wrote: My manager is making a new contact DB for our company, and it's great. The problem is that for spaces he's using nbsp and it shows up in my firefox, but not in his IE. Your manager is broken. Replace him with a bash script. :-)

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Tom Buskey
On 2/1/06, Bill McGonigle [EMAIL PROTECTED] wrote: On Feb 1, 2006, at 13:30, Ben Scott wrote: I didn't say you wouldn't want to use any modules, I said you don't want every module known to man to be used. But then someone has to decide which modules are appropriate and which are not.I think the

Re: init and initscripts (was: RHAT bug?)

2006-02-02 Thread Tom Buskey
On 2/1/06, Ben Scott [EMAIL PROTECTED] wrote: It's worth noting Apple has ditched the whole lot and gone with launchd ...Wasn't familiar with it.I just looked it up.Yet Another daemonmanager/init replacement.There's gotta be over a dozen out there by now.Ho hum.:)One idea I saw pitched once that

Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
I just experienced an interesting incident involving information security practices. At a client's organization I recently, and very gently, urged a DBA to stop their practice of recycling the printouts from test runs of certain reports. These test runs were huge so it's understandable that they

Re: Information security, recycling and irony

2006-02-02 Thread Christopher Chisholm
That's a pretty funny story, but on the other hand, that realy sucks for those invovled. Do you know if rather than reusing documents like that for internal use, do companies like Absolute Data Destruction (based in Goffstown) offer srecycling services? Personally I think it's insane

Re: init and initscripts (was: RHAT bug?)

2006-02-02 Thread Ben Scott
On 2/2/06, Tom Buskey [EMAIL PROTECTED] wrote: Solaris SMF soes the dependencies and watchdogging. I'm not surprised in the least that Sun came up with their very own init replacement. ;-) Instead of init 3, svcadm milestone multi-user-server. Eeesh. They taking lessons from VMS or

Re: Information security, recycling and irony

2006-02-02 Thread Fred
On Thursday 02 February 2006 09:21, Jeff Kinz wrote: ... The Lesson: Its clear that one never really knows how recycled materials are going to be used so confidential materials must always be destroyed rather than recycled. (duh) Also, if you do *test* runs, use *test* data if at all

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, Fred [EMAIL PROTECTED] wrote: In the Boston Globe case, there is an element of professionalism amiss here. Sadly, this appears to be the norm and not the exception. There have been many news reports over the past couple of years where supposedly personal and private information was

Re: Information security, recycling and irony

2006-02-02 Thread Christopher Schmidt
On Thu, Feb 02, 2006 at 10:08:08AM -0500, Fred wrote: On Thursday 02 February 2006 09:21, Jeff Kinz wrote: ... The Lesson: Its clear that one never really knows how recycled materials are going to be used so confidential materials must always be destroyed rather than recycled. (duh)

Re: Information security, recycling and irony

2006-02-02 Thread Dan Jenkins
Fred wrote: In the Boston Globe case, there is an element of professionalism amiss here. It seems to me pretty darn tacky to use test printouts for wrapping paper. It shows no one cares a hoot about their image there. The only folk who ever see toppers are the people on the loading dock

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 10:27:48AM -0500, Christopher Schmidt wrote: On Thu, Feb 02, 2006 at 10:08:08AM -0500, Fred wrote: On Thursday 02 February 2006 09:21, Jeff Kinz wrote: ... The Lesson: Its clear that one never really knows how recycled materials are going to be used so

Re: Information security, recycling and irony

2006-02-02 Thread Christopher Schmidt
On Thu, Feb 02, 2006 at 10:26:59AM -0500, Jeff Kinz wrote: Chris, yes, the toppers ordinarily don't have confidential info on them. They are usually just a delivery list, nothing wrong with having toppers. In this case, the toppers were printed on recycled paper which had the confidential

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, Christopher Schmidt [EMAIL PROTECTED] wrote: I understand that, but the problem is not in using recycled paper for toppers -- that is neither an image problem nor any other kind of issue ... I think the *point* was not the use of recycled paper for toppers, but that they were

Re: Information security, recycling and irony

2006-02-02 Thread Travis Roy
Its clear that one never really knows how recycled materials are going to be used so confidential materials must always be destroyed rather than recycled. (duh) Very true, most stuff being sent out to be recycled tends to end up in the trash anyway:

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 10:44:31AM -0500, Christopher Schmidt wrote: On Thu, Feb 02, 2006 at 10:26:59AM -0500, Jeff Kinz wrote: Chris, yes, the toppers ordinarily don't have confidential info on them. They are usually just a delivery list, nothing wrong with having toppers. In this

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, Travis Roy [EMAIL PROTECTED] wrote: Very true, most stuff being sent out to be recycled tends to end up in the trash anyway: http://www.sho.com/site/ptbs/topics.do?topic=r Ah, yes, Penn and Teller, clearly an unbiased, subject matter expert on materials engineering and reuse...

Re: http / browser help: changing url in location window

2006-02-02 Thread Ben Scott
On 2/2/06, Python [EMAIL PROTECTED] wrote: The md5 signature is probably overkill since everything we are storing originated with the client and I can not come up with any likely reason for someone to flood the server with synthetic survey results, however the signature is easy to do and I'd

Re: Information security, recycling and irony

2006-02-02 Thread Christopher Chisholm
I'm not sure I trust that site's assessment of recycling. It's true that recycling creates pollution, and that's because it uses energy, just like everything else. When you compare the total lifecycle energy cost of different materials, you find varying degrees of recycling success. Some

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 11:07:45AM -0500, Ben Scott wrote: http://www.sho.com/site/ptbs/topics.do?topic=r Ah, yes, Penn and Teller, clearly an unbiased, subject matter expert on materials engineering and reuse... ;-) I don't understand, the Penn and Teller article says exactly the same

Re: Information security, recycling and irony

2006-02-02 Thread Heather Brodeur
Travis Roy wrote: Its clear that one never really knows how recycled materials are going to be used so confidential materials must always be destroyed rather than recycled. (duh) Very true, most stuff being sent out to be recycled tends to end up in the trash anyway: This confusion

Re: Information security, recycling and irony

2006-02-02 Thread Travis Roy
It's really a good show. You should watch it. I'm not saying it's right, or wrong, but it's a different perspective and usually gives you views that you might not normally hear. Their one of environmentalism was fantastic, they got a ton of people to sign petitions to ban Dyhydrogen Monoxide

Re: Information security, recycling and irony

2006-02-02 Thread Bill McGonigle
On Feb 2, 2006, at 11:28, Christopher Chisholm wrote: totally destroy data ON-SITE If you can trust your employees to make decisions about what needs to be destroyed and what doesn't, many companies have two paper recycling bins - one for normal recycling and one To Be Shredded. There are

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, Bill McGonigle [EMAIL PROTECTED] wrote: But which mailing list is this again? Oh, right, linux. In all fairness, from what I can tell, the major objection I and others have had is to a particular set of people pushing the same political statements and arguments on this list *ad

Re: Information security, recycling and irony

2006-02-02 Thread fj1200
-- Original message -- From: Ben Scott [EMAIL PROTECTED] On 2/2/06, Travis Roy [EMAIL PROTECTED] wrote: Very true, most stuff being sent out to be recycled tends to end up in the trash anyway: http://www.sho.com/site/ptbs/topics.do?topic=r Ah, yes,

Re: Information security, recycling and irony

2006-02-02 Thread Tom Buskey
So, to bring it back to topic, how do people go about removing data from computers?I have to deal with DOD stuff and there are some approved disk scrubbers. They have to be approved so something like Darryl's Boot 'n Nuke that goes further doesn't cut it. Some it also depends on having a badblock

Re: Information security, recycling and irony

2006-02-02 Thread Ray Cote
At 9:21 AM -0500 2/2/06, Jeff Kinz wrote: Everything: Family info, age, birth date, addresses, SSN, phone #'s, emails, all contact phone #s and more. This begs the question of precisely why such a report is needed. Why do you need a printout of all your customer's info? What do you do with

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Paul Lussier
Michael ODonnell [EMAIL PROTECTED] writes: If you're doing option parsing, IMO, it's a *lot* easier to use getopt, whicn is a bash built-in than arcane and confusing bash magic like this... P.S. That's a novel way to spell which - I had to clean my eyeglasses and refresh my screen

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 12:38:05PM -0500, Ray Cote wrote: At 9:21 AM -0500 2/2/06, Jeff Kinz wrote: Everything: Family info, age, birth date, addresses, SSN, phone #'s, emails, all contact phone #s and more. This begs the question of precisely why such a report is needed. Why do you need a

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Paul Lussier
Ben Scott [EMAIL PROTECTED] writes: I think you've caught the Microsoft mentality. Features, features, features! Hey, let's embed an ANSI-compliant C compiler into our web browser, a 3D video game into our spreadsheet, and a spell checker in our backup software! (Extra points for knowing

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Paul Lussier
Bill McGonigle [EMAIL PROTECTED] writes: On Feb 1, 2006, at 13:30, Ben Scott wrote: I didn't say you wouldn't want to use any modules, I said you don't want every module known to man to be used. But then someone has to decide which modules are appropriate and which are not. I think the

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 01:04:58PM -0500, Christopher Chisholm wrote: Good points. Obviously the best way to go about things is to use as little as possible. You /do/ have to wonder why huge paper reports need to be printed these days. Especially when you can buy a 200gb HDD at

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, Tom Buskey [EMAIL PROTECTED] wrote: So, to bring it back to topic, how do people go about removing data from computers? For corporate data and internal re-use of equipment, I generally just use Delete. Regular users don't have the privilege to do anything more (and if they've

Re: Information security, recycling and irony

2006-02-02 Thread Ben Scott
On 2/2/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Penn Teller, might not be experts, but here is an interesting article to read http://www.williams.edu/HistSci/curriculum/101/garbage.html The one comment I'll make on recycling in this forum is that many of the analyses I've seen

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Steven W. Orr
On Thursday, Feb 2nd 2006 at 13:04 -0500, quoth Paul Lussier: =Ben Scott [EMAIL PROTECTED] writes: = = I think you've caught the Microsoft mentality. Features, features, = features! Hey, let's embed an ANSI-compliant C compiler into our web = browser, a 3D video game into our spreadsheet, and

Re: Information security, recycling and irony

2006-02-02 Thread Paul Lussier
Jeff Kinz [EMAIL PROTECTED] writes: I just experienced an interesting incident involving information security practices. At a client's organization I recently, and very gently, urged a DBA to stop their practice of recycling the printouts from test runs of certain reports. These test runs

Re: Information security, recycling and irony

2006-02-02 Thread Jeff Kinz
On Thu, Feb 02, 2006 at 08:12:14PM -0500, Paul Lussier wrote: Jeff Kinz [EMAIL PROTECTED] writes: I just experienced an interesting incident involving information security practices. At a client's organization I recently, and very gently, urged a DBA to stop their practice of

Re: RHAT bug? /etc/init.d/functions:daemon()

2006-02-02 Thread Paul Lussier
Steven W. Orr [EMAIL PROTECTED] writes: Wow! And I thought *I* was wasting huge amounts of brain cells with useless stuff. :^) The problem with having a brain capable of remember this type of useless stuff is that there's often little capacity left over for truly important things like

Re: Information security, recycling and irony

2006-02-02 Thread Paul Lussier
Ben Scott [EMAIL PROTECTED] writes: On 2/2/06, Fred [EMAIL PROTECTED] wrote: In the Boston Globe case, there is an element of professionalism amiss here. Sadly, this appears to be the norm and not the exception. [...] People often express concerns about the security of their personal

Re: Information security, recycling and irony

2006-02-02 Thread Paul Lussier
Jeff Kinz [EMAIL PROTECTED] writes: Sure, if one side is blank, then you've wasted one potential use. The cure for that is 4 or 8 up, duplex as the default setting on *all* Would break the premise of the test run. Has to come out same as final form. Perhaps they just need 4-up, duplex