RE: Your source code, for sale

2004-11-04 Thread J.A. Terranson

On Thu, 4 Nov 2004, Hal Finney wrote:

> Another idea along these lines is gradual payment for gradual release
> of the goods.  You pay 10% of the amount and they give you 10% of the
> source code.  You pay another 10% and you get the next 10% of the source,
> and so on.

Just as an aside, this is in fact how it was being initially marketed.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

"An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core"

S. Plath, Temper of Time



Re: This Memorable Day

2004-11-04 Thread James A. Donald
--
Nomen Nescio wrote:
> To label any argument that points out the obvious circumstance that
> injustice feeds hatred as communist propaganda, is really only
> ridiculous, even if it's also dangerously incompetent and as such no
> real laughing matter.
>
> Why do you mention Bin Laden anyway? There are thousands of bigger
> and smaller groups around the world (they exists in every country
> more or less) that we'd label as terrorists in the western part of
> the world.
And all of them are instruments of the affluent and well connected.
For example Shining Path was not poor peasants, but academics and
students.
For the most part using terror are not those suffering injustice, and
all of them are those inflicting injustice.  This is particularly the
case with Islamic terror.  For the most part it is not those suffering
Dhimmi status that engage in terrorism, but those who in their native
countries are successful in inflicting Dhimmi status on those of the
incorrect religion, and who apply terror in the hope of expanding this
success.
Al Quaeda attacked westerners because of their considerable success in
murdering and raping Afghans.   Jemaah Islamiyah because of their
considerable success in murdering and raping Timorese and Ambionese.
Today's Islamic terrorism, like yesterday's communist terrorism, is
the actions of evil men whose considerably privilege and comfort
arises from the injustice and oppression that they have successfully
inflicted, and that they intend to inflict a great deal more of.
Back before the fall of communism, wherever the master's boot smashed
into the face of a child, you lot would loudly praise the master, and
demonize the child as a CIA agent.  Now, after the fall of communism,
you are still at it, even though the masters no longer even pretend to
be acting to defend the poor and oppressed.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 QeJ5sNOExxqx0Vq7NTG0bDDnwEip8vKbsX9+9d8i
 4IDiep3tuDmwKA77n4H3u9nHRV2g6oqOWQkRYfFcW



Number One on Blacknet -- with a Bullet

2004-11-04 Thread R.A. Hettinga


The Sun Newspaper Online - UK's biggest selling newspaper


Thursday, November 4, 2004




 By DEREK BROWN
Deputy Showbiz Editor

RAPPER Eminem's new album Encore has been leaked on to the internet.

 The Real Slim Shady star's hotly-anticipated fourth album was stolen
nearly two weeks before its release date.

 The theft has sparked panic at his record label Interscope who have
brought forward the worldwide release date.

 An illegal website called RNS put the entire album on the net two days ago.

 Thousands of fans instantly downloaded it and could pass it on to
countless others.

 It could lose the 32-year-old rapper MILLIONS of pounds in royalties from
CD sales.

 Interscope bosses were locked in meetings all day yesterday.

 They decided to bring forward Encore's release date by three days to next
Friday November 12.

 Unveiling the album on a Friday rather than a Monday is virtually
unprecedented - and a sign of how panicked bosses are.

 An insider at the label said: "This is catastrophic news. Security has
been so tight on this album nobody can figure out how the album has got out
there.

 "We now think thousands of people around the world are downloading it.



"This is a very, very serious issue for us."

 Encore features 20 tracks with titles including Mosh, Puke and Big Weenie.

 Eighties star Martika features on Like Toy Soldiers.

 Despite the theft, experts still predict Encore - the follow up to The
Eminem Show - will be the biggest selling album in the world this year.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Love It or Leave It

2004-11-04 Thread R.A. Hettinga
At 6:34 PM -0800 11/4/04, Bill Stewart wrote:
>I have to agree with the critics of Kerry who said
>that he was aloof and out of touch with Middle America

... and it's a big middle this year:



Of course, there's the "nuanced" version, but, hey, it's a winner-take-all
country, ain't it?:



Proportional representation is for Europeans, of course...

In the meantime "moby" should learn to spell...

Channeling Andy Jackson this evening,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Love It or Leave It

2004-11-04 Thread Bill Stewart
Bob continues to forward entertaining and occasionally insightful articles 
to the list.

From the bluesy side of the fence, Moby wrote:
> can someone remind me why secession is not an option at this point?
Meanwhile, on the Commie-colored side of the fence,
Mike Thompson of HUMAN EVENTS ONLINE
took several weeks to write a "modest proposal" to
kick the states that didn't get with the program out of the union.
Those of us who remember the Vietnam-era redneck taunt about
"America: Love It or Leave It" also remember that if anybody
*did* leave, the right wing got immensely offended by it
and wanted to hunt them traitors down like dawgs.
Then of course there was that unpleasantness of the
War Between the States, aka the War of Northern Aggression,
in which the Red States left because they didn't like the
liberal northerners and their activist judges and politicians
disrupting the core of their traditional values,
and the Blue States insisted that Nationalism was
more important than the right to secede and attacked them.
So no, it probably won't fly...
Unfortunately, I have to agree with the critics of Kerry who said
that he was aloof and out of touch with Middle America;
his campaign clearly didn't recognize that Bush had
succeeded at telling them that Kerry didn't share their values,
and Kerry didn't realize it and demonstrate otherwise,
nor did he do an adequate job of talking about Democratic values
in a way that would draw them in.
And the Republicans and the Democrat establishment had
pretty much gotten together to take out Howard Dean,
who was building an actual political party inside the
hollowed-out shell of the current party.


Bill Stewart  [EMAIL PROTECTED] 



Finding Galt's Gulch (fwd)

2004-11-04 Thread J.A. Terranson

So, it's the night of the day of the morning after, and all around us are
masses milling in despair over the destruction of freedom that has
occurred here over the last four years.

Given that the US was the "Gulch" to the brain drain of the Soviet Union,
where does a true capitalist, or even just a closet objectivist flee
today?  France?  Spain? The "EU"?

Where does one go today, if they are unwilling to participate in the
Failed Experiment?  (BTW: No, Lichtenstein does not accept immigrants, and
yes, I have reverified this recently).

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

"An ill wind is stalking
while evil stars whir
and all the gold apples
go bad to the core"

S. Plath, Temper of Time



Close the 49th Parallel

2004-11-04 Thread Sgt . preston
This business of blue states joining Canada is rich. Please keep it
up; begging would be delightful. 

Actually there is a somewhat academic book published some years ago by
Mike Adams called Sex in the Snow which discusses the apparent values
congruence between the blue states and most but not all of Canada. I
say most because there is a pocket of know-nothing evangelical morons
in Alberta (currently damaging only their own community institutions
and nobody else's) and a tiny knot of even more know-nothings in the
Fraser Valley east of Vancouver barely 50 miles from where all those
same-sex marriages are being conducted. They are completely surrounded
and without prospect of reinforcement. There is also the small matter
of the entirety of Quebec which is far to the left of anything seen in
the US since the Weathermen. Speaking of which, where are they when
you need them most? Where have you gone Mark Ruud? Where are the
Armstrong Bros. now?

In Canada, blue means reactionary and also beer. Thats about right
don't you think? Red is the sacred international colour of revolution.
Once again out of step are we?

Alas, having reviewed your application with the standard offer of
bribes and inducements, we don't want you. Besides you are second in
line. The poor Turks and Caicos Islands have been trying off and on
for decades to join with pathetic beach-filled blandishments but they
have been repeated rebuffed. However your indigent grandparents can
still buy their medications and flu shots here at reasonable prices.
Charity for the poor is important -- just keep on sending your
trailer-park people up on buses as you have been doing. We will look
after them if you won't.

No, you will have to stew in your own juices until done. Consider it
punishment for very bad international behaviour for 225 years not only
in Iraq but also including Chile, Venezuela, especially Vietnam,
Cambodia, Dominican Republic, Panama, the Phillippines, the Halls of
Montezuma, the shores of Tripoli, Beirut, Somalia, Mexico, etc. etc.
not to mention the burning of my beloved city of Toronto in 1813. Oh
yes, we did get even for that one didn't we. The smell of the White
House in flames in the morning was said to be most bracing. YOU MIGHT
TRY IT ON FOR SIZE YOURSELVES. 




Eliminate the Garbage!

2004-11-04 Thread Bill



 <---Click 
 
Stop Spam Once and for all!
 
Eliminates porn too!
 
 
Want out of our database? Do not reply to this email. 
 
Copy and paste this link into your browser -
 
mail-svcs.com/rmm.htm
 
Computer Technologies
848 N. Rainbow Blvd. #316Las Vegas, NV 89107
 
 
dressyhogansoceileenmoodrudgeintroversionbonaventurebangleamadeusabigailayebentonboyfriendpawquartzitenomaddubiousterrawintrycorrelateGkEgehqycoqlsvnBdnCqorDsnCscmUistoryvoltaacuityusnaeraterespectsalinewolvesconfectvolthellishquartetwilcoxetymologylilabrantposnerquestcosgrovebronzehillman 

 
<>

Come check out our best deals on medication. No perscription

2004-11-04 Thread Iambic E. Cap




  
  

  Others will follow your footsteps easier than they will your advice.

  
  
  
  But a priest's life is not supposed to be well-rounded it is supposed to be one-pointed -- a compass, not a weathercock.Desperate for MEDlCAT|ON silverhead onl1ne? inductively cognitives
  


  
  

  Private, secure, and easy. dapico NO- ladens -PRE- outflowed -SCRIPTION.
  

  
  

  Rest not. Life is sweeping by go and dare before you die. Something mighty and sublime, leave behind to conquer time. swellhead nubblier
  We`ve got all you will ever want. usurpations reinjured.
  We have got] 
And many more!http://dsombrero.mailerisasuper.com/?a=335
 ungirt coarb caricology.

  Courage is knowing what not to fear. It is critical vision alone which can mitigate the unimpeded operation of the automatic.

  
   

  You will be happy when v|sit us! tatie
  Only high-quality stuff for low rates! 
   100"/.. moneyback guarantee!
  You've got to take the initiative and play your game. In a decisive set, confidence is the difference. When you need someone to comfort you, a friend is near



OK, It's Done

2004-11-04 Thread R.A. Hettinga



Moby Tour Diary Updates

OK, It's Done
 11/3/2004 - New York City


 can someone remind me why secession is not an option at this point?
i mean let's be realistic, we live in a divided country.
can't we have the breakaway republics of 'north-east-istan' and 'pacific-stan'?
wouldn't the red states be happier without us?
we could still travel freely and trade freely with them, but can't we just
leave?
then you could have 3 countries:
northeastistan
pacificstan
redstateistan

 one other option would be for us to all join the republican party en masse
and make it socially liberal and fiscally conservative(as opposed to it's
current 'socially puritanical/fiscally insane' status).

 ok, it's done.
john kerry has seceded.
if you need us, my friends and i will be drunk for the next 4 years.
-moby




 <<|Close   |>>
  

Email to a friend

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Dear Canada

2004-11-04 Thread R.A. Hettinga



Moby Tour Diary Updates

Dear Canada
 11/4/2004 - New York City


 'dear canada,
now, more than ever, your neighbor to the south(aka-the blue states)needs
you. most of us living in the northern and western parts of the united
states don't feel very connected to the rest of the u.s, so can we bring
our states and become part of canada?
we have a lot of money and some interesting cities and we promise not to be
too much trouble.
the benefits to you:
a-in one fell swoop you can have southern california and new york city!
surfing in canada! suddenly the u.n is on canadian soil! broadway is
suddenly in canada! you could then say that canada is the birthplace of
jazz and hip-hop!
b-money. cold hard cash. the red states in the u.s might have the voting
power, but guess who has the money? yup, your friendly neighborhood blue
states.
 so when/if you accept our offer you will instantly become the richest
country in the world! that sounds pretty good, right?
c-karma. accepting this offer will give you more good karma than you'd know
what to do with(because you would instantly make 120 million people VERY
happy).
so you get warm beaches, tons of cash, and good karma. who can say no to that?
please let us know if you accept the offer. given our enthusiasm to join
canada it's safe to say that the details of the offer could probably be
worked out in an afternoon.
thank you very much,
moby

 p.s-just to put your minds at ease, we do know that we can't bring our
assault weapons with us.'




 <<|Close   |>>
  

Email to a friend

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



'dear rest of america,

2004-11-04 Thread R.A. Hettinga


Moby Tour Diary Updates


Dear
 11/4/2004 - New York City


 'dear rest of america,
can't you please let little old new york city secede from the rest of the
nation?
please?
we're very little and you probably wouldn't even notice that we were gone.
please? pretty please?
how about if we buy you guys donkeys?
will you let us secede if we buy each and every person in the rest of the
united states a donkey?
you'd like to have your own friendly donkey, wouldn't you?
wouldn't you rather have a friendly donkey than a small insignificant city
that no one really likes anyway?
we will be good neighbors, and you can come visit whenever you
like(considering you have a valid passport).
again, please?
thank you very much, and i look forward to hearing your response.
-moby'




 <<|Close   |>>
  

Email to a friend

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



RE: Your source code, for sale

2004-11-04 Thread "Hal Finney"
"Tyler Durden" writes:
> So my newbie-style question is, is there an eGold that can be verified, but 
> not accessed, until a 'release' code is sent?
>
> In other words, say I'm buying some hacker-ed code and pay in egold. I don't 
> want them to be able to 'cash' the gold until I have the code. Meanwhile, 
> they will want to see that the gold is at least "there", even if they can't 
> cash it yet.
>
> Is there a way to send a 'release' to an eGold (or other) payment? Better 
> yet, a double simultaneous release feature makes thing even more 
> interesting.

I've been thinking about how to do this kind of thing with ecash.
One project I'm hoping to work on next year is a P2P gambling game (like
poker or something) using my rpow.net which is a sort of play-money ecash.
You'd like to be able to do bets and have some kind of reasonable
assurance that the other guy would pay up if he loses.

In the case of your problem there is the issue of whether the source
code you are buying is legitimate.  Only once you have inspected it and
satisfied yourself that it will suit your needs would you be willing
to pay.  But attaining that assurance will require examing the code in
such detail that maybe you will decide that you don't need to pay.

You could imagine a trusted third party who would inspect the code and
certify it, saying "the source code with hash XXX appears to be legitimate
Cisco source code".  Then they could send you the code bit by bit and
incrementally show that it matches the specified hash, using a crypto
protocol for gradual release of secrets.  You could simultaneously do
a gradual release of some payment information in the other direction.

If you don't have a TTP, one idea for using ecash is Markus Jakobsson's
"Ripping Coins for a Fair Exchange".  Basically you withdraw ecash from
your account and in effect "rip it in half" and give half to the seller.
Now he gives you the product and you give him the other half of the coin.
The idea is that once you have given him the "ripped" ecash ("torn"
would be a better word because ripping means something else today),
you are out the value of the cash.  You have no more incentive to cheat,
as giving him the other half won't cost you anything additional.

(Even without ecash, a service like egold could mimic this functionality.
You'd create an escrow account with two passwords, one known to each
party.  Only with both passwords could data be withdrawn from the account.
Then the buyer would transfer funds into this account.  After receiving
the goods, the buyer would send his password to the seller.)

The problem is that if the source code you are purchasing is bogus,
or if the other side doesn't come through, you're screwed because you've
lost the value of the torn cash.  The other side doesn't gain anything
by this fraud, but they harm you, and if they are malicious that might
be enough.  And likewise you might be malicious and harm them by refusing
to give them your half of the coin even after you have received the goods.
Again, this doesn't benefit you, you're still out the money, but maybe
you like causing trouble.

Another idea along these lines is gradual payment for gradual release
of the goods.  You pay 10% of the amount and they give you 10% of the
source code.  You pay another 10% and you get the next 10% of the source,
and so on.  (Or it could be nonlinear; maybe they give out half the code
for free, but the final 10% requires a large payment.)  The idea is that
you can sample and make sure they do appear to have the real thing with
a fairly small investment.

If there is some mechanism for the seller to have a reputation (like
Advogato's perhaps, with some spoofing immunity) then the problem is
easier; the seller won't want to screw buyers because it hurts his rep.
In that case it may be reasonable to ask the buyer to pay in advance,
perhaps using the partial payment system just discussed.

These various ideas all have tradeoffs, and in general this kind of
problem is hard to solve because of the complexity of what constitutes a
successful transaction.  A reputation system helps a great deal to resolve
the issues, but opens up problems of its own.  The betting problem I
want to work on is relatively easy because there is no ambiguity about
who wins, but even then it is hard to make sure that neither party can
maliciously harm the other.

Hal F.



File-sharing network thrives beneath the radar

2004-11-04 Thread R.A. Hettinga


Yahoo!



 Thursday November 4, 3:01 AM

LIVEWIRE - File-sharing network thrives beneath the radar

 By Adam Pasick

 LONDON (Reuters) - A file-sharing program called BitTorrent has become a
behemoth, devouring more than a third of the Internet's bandwidth, and
Hollywood's copyright cops are taking notice.

 For those who know where to look, there's a wealth of content, both legal
-- such as hip-hop from the Beastie Boys and video game promos -- and
illicit, including a wide range of TV shows, computer games and movies.

 Average users are taking advantage of the software's ability to cheaply
spread files around the Internet. For example, when comedian Jon Stewart
made an incendiary appearance on CNN's political talk show "Crossfire,"
thousands used BitTorrent to share the much-discussed video segment.

 Even as lawsuits from music companies have driven people away from
peer-to-peer programs like KaZaa, BitTorrent has thus far avoided the ire
of groups such as the Motion Picture Association of America. But as
BitTorrent's popularity grows, the service could become a target for
copyright lawsuits.

 According to British Web analysis firm CacheLogic, BitTorrent accounts for
an astounding 35 percent of all the traffic on the Internet -- more than
all other peer-to-peer programs combined -- and dwarfs mainstream traffic
like Web pages.

 "I don't think Hollywood is willing to let it slide, but whether they're
able to (stop it) is another matter," Bram Cohen, the programmer who
created BitTorrent, told Reuters.

 John Malcolm, director of worldwide anti-piracy operations for the MPAA,
said that his group is well aware of the vast amounts of copyrighted
material being traded via BitTorrent.

 "It's a very efficient delivery system for large files, and it's being
used and abused by a hell of a lot of people," he told Reuters. "We're
studying our options, as we do with all new technologies which are abused
by people to engage in theft."

 FOR GOOD OR EVIL

 BitTorrent, which is available for free on http://bittorrent.com, can be
used to distribute legitimate content and to enable copyright infringement
on a massive scale. The key is to understand how the software works.

 Let's say you want to download a copy of this week's episode of "Desperate
Housewives." Rather than downloading the actual digital file that contains
the show, instead you would download a small file called a "torrent" onto
your computer.

 When you open that file on your computer, BitTorrent searches for other
users that have downloaded the same "torrent."

 BitTorrent's "file-swarming" software breaks the original digital file
into fragments, then those fragments are shared between all of the users
that have downloaded the "torrent." Then the software stitches together
those fragments into a single file that a users can view on their PC.

 Sites like Slovenia-based Suprnova (http://www.suprnova.org) offer up
thousands of different torrents without storing the shows themselves.

 Suprnova is a treasure trove of movies, television shows, and pirated
games and software. Funded by advertising, it is run by a teen-age
programmer who goes only by the name Sloncek, who did not respond to an
e-mailed interview request.

 Enabling users to share copyrighted material illicitly may put Suprnova
and its users on shaky legal ground.

 "They're doing something flagrantly illegal, but getting away with it
because they're offshore," said Cohen. He is not eager to get into a battle
about how his creation is used. "To me, it's all bits," he said.

 But Cohen has warned that BitTorrent is ill-suited to illegal activities,
a view echoed by John Malcolm of MPAA.

 "People who use these systems and think they're anonymous are mistaken,"
Malcolm said. Asked if he thought sites like Suprnova were illegal, he
said: "That's still an issue we're studying, that reasonable minds can
disagree on," he said.

 GOING LEGIT

 Meanwhile, BitTorrent is rapidly emerging as the preferred means of
distributing large amounts of legitimate content such as versions of the
free computer operating system Linux, and these benign uses may give it
some legal protection.

 "Almost any software that makes it easy to swap copyrighted files is ripe
for a crackdown BitTorrent's turn at bat will definitely happen," said
Harvard University associate law professor Jonathan Zittrain. "At least
under U.S. law, it's a bit more difficult to find the makers liable as long
as the software is capable of being used for innocent uses, which I think
(BitTorrent) surely is."

 Among the best legitimate sites for movies and music:

 -- Legal Torrents (http://www.legaltorrents.com/), which includes a wide
selection of electronic music. It also has the Wired Magazine Creative
Commons CD, which has songs from artists like the Beastie Boys who agreed
to release some of their songs under a more permissive copyright that
allows free distribution and remixing.

 -- To

RE: Your source code, for sale

2004-11-04 Thread Tyler Durden
Hum.
So my newbie-style question is, is there an eGold that can be verified, but 
not accessed, until a 'release' code is sent?

In other words, say I'm buying some hacker-ed code and pay in egold. I don't 
want them to be able to 'cash' the gold until I have the code. Meanwhile, 
they will want to see that the gold is at least "there", even if they can't 
cash it yet.

Is there a way to send a 'release' to an eGold (or other) payment? Better 
yet, a double simultaneous release feature makes thing even more 
interesting.

-TD
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Your source code, for sale
Date: Wed, 3 Nov 2004 19:24:43 -0500

 - ADTmag.com
Your source code, for sale
By Mike Gunderloy
Well, maybe not yet. But what does the future hold for those who consider
their source code an important proprietary asset?
Halloween this year featured more scary stuff than just ghosts and ghouls.
It was also the day (at least in the Pacific time zone) when the Source
Code Club posted their second Newsletter in a public Usenet group. Despite
their innocent-sounding name, the Source Code Club is a group of hackers
who are offering to sell the source to commercial products. Their current
menu of source code for sale looks like this:
*   Cisco Pix 6.3.1 - $24,000
*   Enterasys Dragon IDS - $19.200
*   Napster - $12,000
They also claim to have the source code for many other packages that they
haven't announced publicly. "If you are requesting something from a Fortune
100 company, there is a good chance that we might already have it, they
say. Now, you might think this business is blatantly illegal, and no doubt
it is. But that doesn't necessarily mean it's impossible. They're posting
their newsletter to Usenet, probably from an Internet cafe somewhere, so
that's not traceable. They'll take orders the same way, and require orders
to be encrypted using their PGP key, which is at least reasonably
unbreakable at the moment. (As of this writing, I don't see any encrypted
messages posted to the newsgroup they use, though). For payment, they're
using e-gold, which claims to protect the anonymity of its account holders.
Now, it seems reasonably likely that the Source Code Club folks will
eventually get caught; going up against Cisco's resources displays at least
a strong conviction of invulnerability. But even if these guys get caught,
there are deeper issues here. Ten years ago, no one could have dreamed of
trying to set up such a business. Ten years from now, advances in
cryptography, more forms of currency circulating on the Internet, and
improvements in anonymity software are likely to make it impossible to
catch a similar operation.
What will it mean when hacker groups can in fact do business this way with
impunity? First, it's important to note that the ability to sell wares
anonymously won't necessarily imply the ability to get inventory. Your best
defense against having your own source code leaked is to pay careful
attention to its physical security. These days, if I were developing an
important commercial product, I'd make sure there was no path between my
development or build machines and the public Internet. Hackers can do lots
of things, but they still can't leap over physical disconnections. Second,
I'd use software that prevents temporary storage devices (like USB sticks)
from connecting to the network, and keep CD and DVD burners out of the
development boxes as well.
It's also worth making sure that your business doesn't depend entirely on
source code. While the intellectual property that goes into making software
is certainly a valuable asset, it shouldn't be your only asset. Think about
ancillary services like training, support, and customization in addition to
simply selling software.
Finally, note that the Source Code Club business model is based on taking
advantage of people wanting to know what's in the software that they
purchase. About the pix code, they say "Many intelligence
agencies/government organizations will want to know if those 1's and 0's in
the pix image really are doing what was advertised. You must ask yourself
how well you trust the pix images you download to your appliance from
cisco.com." Microsoft (among other companies) has demonstrated how to
remove this particular fear factor from customers: share your source code
under controlled circumstances. That doesn't mean that you need to adapt an
open source model, but when a big customer comes calling, why not walk
their engineers through how things work and let them audit their own areas
of concern?
Given the shifting landscape of intellectual property, and the threat from
groups such as the Source Code Club, these are matters you need to think
about sooner rather than later. Otherwise you may wake up some morning and
find that your major asset has vanished without your even knowing it was in
danger.
Mike Gunderloy, MCS

Aloha Casino Online!

2004-11-04 Thread Rochelle Lawson
Aloha!
 
Enjoy island style entertainment with these hot new promotional offers:

$300 match deposit bonus - bonus code X3DAW at casino's cashier.
$10 free, no deposit necessary - bonus code FR1EE at casino's cashier.

Vacation at Aloha Casino!
50 amazing games - 24/7 customer support - SafeBet certification

Visit: http://www.alohacasino.biz

Mahalo,
Billy Bob


No thanks: http://www.alohacasino.biz/u/



Re: campus network admins

2004-11-04 Thread Thomas Shaddack
On Thu, 4 Nov 2004 [EMAIL PROTECTED] wrote:

> 
> I recently violated the network user agreement (they packet-sniffed and
> got the username/password for my FTP server and didn't like what I was
> sharing with myself) and was informed by the admin that I am now 'under
> observation' and that they "hope I don't like privacy". Considering
> this admin was an NSA employee, I tend to take that threat a little
> seriously.

Depending on how trivial the violation was, it may be worth checking the 
FTP server logs, identifying the bad ones and collecting the evidence, and 
eventually, preferably after consultation with a lawyer, nail the admin 
with hacking charges. (Alternatively just threat with the same, with a 
remark that you hope he likes lawyers. I suppose you're located in the 
Land of Lawyers.)

If it is better to play a repentant sinner, or go to a confrontation, 
depends on many more factors unknown to us, including the exact text of 
the network AUPs, the personality profile of the admin (he may be just 
power-tripping at you, but the severity of his threats depends on the 
exact content of your disk which you didn't specify), and other factors 
like if you are an employee or a student and how much risk you want to go 
through.

Violating AUPs with cleartext protocols isn't a good idea, especially with 
nazi admins. Next time you may like to prefer ssh/scp, or WebDAV over 
HTTPS, or a simple password-protected upload/download interface written in 
PHP or as a CGI script, again over HTTPS (you may like to use one-time 
passwords for added security).

If the admin in question can have physical access to your machine, put the 
sensitive/objectionable data on an encrypted partition.

> Two questions:
> 
> 1) I'm assuming they can legally look at anything that comes in or out
> of my computer, but is that the case? Can they look at my computer
> itself, or take me off the network for the private contents of my
> computer?

That depends a lot. If you're in a suitable uni campus, you may try to 
consult with local law students. This question is something a mere 
technician can't reliably answer.

> 2) Is there some sort of service I can use to have everything I do on the
> network encrypted, such as a tunneling service to the internet?

Yes. Depends on what you want to do; if you want to be independent on any 
special software installed on the computers you're operating from, I 
suggest a HTTPS server, with a self-signed certificate (cheaper), and 
manually check its fingerprint when connecting. For upload you may use a 
web file upload form. Don't neglect the certificate check; the admin may 
like to start playing games with you and launch MITM attack at your 
connections. Do the fingerprint check even when the browser claims all is 
OK.



> 
> ~
> This message was sent from The Tedious Path
> Are you ready to travel The Tedious Path?
> http://www.tediouspath.com
> http://forum.tediouspath.com
> 



Replica Handbags

2004-11-04 Thread Matthew J. Baez
Want Watch?

http://epw.jhex.com/rep/sales/





Download unlimited music

2004-11-04 Thread DownloadMusic
Join 30 million people downloading FreeMusic, Movies, Software, and more from the 
largest collections - ever!

http://www.excellzone.com/onupota_tuuuhleuhx.html




If you no longer want to receive mail from this list:

Send a blank email to 
mailto:[EMAIL PROTECTED], 
or write to Good Times
123 North Congress Avenue Suite 180
Boynton Beach, Florida 33426




Re: Declaration of Expulsion: A Modest Proposal

2004-11-04 Thread mfidelman
I expect quite a few of us in the Northeast would be happy to join with 
Canada.  It might be problematic that DC went blue :-)




On Wed, 3 Nov 2004, R.A. Hettinga wrote:

> 
> 
> HUMAN EVENTS ONLINE: The National Conservative Weekly Since 1944
> 
> Declaration of Expulsion: A Modest Proposal
> It's Time to Reconfigure the United States
> 
> by Mike Thompson
> Posted Nov 3, 2004
>  [From the author: This is an essay I've been working on for the past
> several weeks, updated moments ago with what appears to be Bush's final
> number of victory states (31) once the nonsense of provisional votes in
> Ohio is overcome.
> 
>  As an admitted "modest proposal" (a la Swift's satiric story of the same
> name), it is nevertheless serious in pointing out the cancer that continues
> to threaten our body politic.]
> 
>  Branded unconstitutional by President Abraham Lincoln, the South's
> secession from the American Union ultimately sparked "The Civil War" (a
> name that was rejected by Southerners, who correctly called it "The War
> Between the States," for the South never sought to 1] seize the central
> government or 2] rule the other side, two requisites for a civil war).
> 
>  No state may leave the Union without the other states' approval, according
> to Lincoln's doctrine--an assertion that ignores the Declaration of
> Independence, which was the vital basis for all 13 American colonies'
> unilateral secession from the British Union eight decades earlier.
> Lincoln's grotesque legal argument also disregards a state's inherent right
> of secession which many scholars believe is found in the Ninth and Tenth
> Amendments to the U.S. Constitution.
> 
>  Meantime, America has become just as divided as it was a century and a
> half ago, when it writhed in Brother-vs.-Brother War. Instead of wedge
> issues like slavery, federal subsidies for regional business, and high
> tariffs, society today is sundered by profound, insoluble Culture War
> conflicts (such as abortion and gay marriage), and debate about our role
> abroad (shall we remain the world's leader, or become an unprincipled chump
> for the cabal of globalist sybarites who play endless word-games inside the
> United Nations and European Union sanctuaries?).
> 
>  For many decades, conservative citizens and like-minded political leaders
> (starting with President Calvin Coolidge) have been denigrated by the
> vilest of lies and characterizations from hordes of liberals who now won't
> even admit that they are liberals--because the word connotes such moral
> stink and political silliness. As a class, liberals no longer are merely
> the vigorous opponents of the Right; they are spiteful enemies of
> civilization's core decency and traditions.
> 
>  Defamation, never envisioned by our Founding Fathers as being protected by
> the First Amendment, flourishes and passes today for acceptable political
> discourse. Movies, magazines, newspapers, radio/TV programs, plays,
> concerts, public schools, colleges, and most other public vehicles openly
> traffic in slander and libel. Hollywood salivated over the idea of placing
> another golden Oscar into Michael Moore'sfat hands, for his Fahrenheit 9/11
> jeremiad, the most bogus, deceitful film documentary since Herr Hitler and
> Herr Goebbels gave propaganda a bad name.
> 
>  When they tire of showering conservative victims with ideological mud,
> liberals promote the only other subjects with which they feel
> conversationally comfortable: Obscenity and sexual perversion. It's as if
> the genes of liberals have rendered them immune to all forms of filth.
> 
>  As a final insult, liberal lawyers and judges have become locusts of the
> Left, conspiring to destroy democracy itself by excreting statutes and
> courtroom tactics that fertilize electoral fraud and sprout fields of
> vandals who will cast undeserved and copious ballots on Election Day.
> 
>  The truth is, America is not just broken--it is becoming irreparable. If
> you believe that recent years of uncivil behavior are burdensome, imagine
> the likelihood of a future in which all bizarre acts are the norm, and a
> government-booted foot stands permanently on your face.
> 
>  That is why the unthinkable must become thinkable. If the so-called "Red
> States" (those that voted for George W. Bush) cannot be respected or at
> least tolerated by the "Blue States" (those that voted for Al Gore and John
> Kerry), then the most disparate of them must live apart--not by secession
> of the former (a majority), but by expulsion of the latter. Here is how to
> do it.
> 
>  Having been amended only 17 times since 10 vital amendments (the Bill of
> Rights) were added at the republic's inception, the U.S. Constitution is
> not easily changed, primarily because so many states (75%, now 38 of 50)
> must agree. Yet, there are 38 states today that may be inclined to adopt,
> let us call it, a "Declaration of Expulsion," t

Gigabit Ethernet board for TCP/IP security

2004-11-04 Thread R.A. Hettinga


Thursday 4 November 2004
Gigabit Ethernet board for TCP/IP security

SDC Systems offers a range of Gigabit Ethernet single board computers
designed by ADI Engineering and based on Intel XScale and Intel IXA
technologies.

 

Designed for network security devices such as TCP/IP Offload Engines (TOE),
firewalls, VPN equipment, IPSec and SSL accelerators, intrusion detection,
and cryptography equipment, Shadwell supports line wire speed in both
single and dual port versions. The board features an Intel 80200 processor,
running at 733MHz, 256MB SDRAM (128Mbyte in the single mode), Intel
82545/82546 fourth-generation GbE MAC/PHY, and Intel 21555 PCI-PCI bridge.

 

The board is implemented in a half size PCI form factor, and only
dissipates 6W of power in the single port version.

A Virtex-II FPGA can be used to offload of time-critical tasks including
cryptography, firewall filtering, and virus scanning.

 

www.sdcsystems.com

Tel: 01462 473928   
-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Declaration of Expulsion: A Modest Proposal

2004-11-04 Thread R.A. Hettinga
At 8:31 AM -0500 11/4/04, Roy M. Silvernail wrote:
>There seems to be an assumption that Alaska will be included in
>Jesusland.  Whoever is advancing this theory clearly never lived in
>Alaska (or if they did, only lived in Anchorage, which isn't *really*
>Alaska).

Ahhh... Los Anchorage. It's just most of the people there, of course.

Cheers,
RAH
Who went to Fairview and Roger's Park elementary, and Wendler Jr. Hi.,
while his old man built 1500sf tract houses on spec, and then an apartment
complex or two, before he retired to Hillsboro, NM, pop 19. Anchorage was
too *big*, you see...
-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Complimentary Elite Wine Opener + 6 Bottles of Wine

2004-11-04 Thread International Wines from --OSG





International Wines







An iPod has been reserved for you

2004-11-04 Thread FreeiPods
Get a freeiPod! 
http://www.wildenough.com/artljlv_gpppstzpsq.html 

FreeShipping - Choose your color: silver, pink, blue, gold or green...All free! 

3 Easy steps towards getting your iPod: 
1. Participate in a survey and one online offer. 
2. Refer some friends to do the same. 
3. Get your free iPod!

Get a FreeiPod of your choice! 
http://www.wildenough.com/hywbkbs_gpppstzpsq.html 

To no longer receive advertisements from freeiPods please click the following link or 
mail us at: 
FreeIpods.com 
PO Box 50945 
Washington DC, 20001 

http://www.wildenough.com/rwmzgzw_gpppstzpsq.htmlIf you no longer want to receive mail 
from this list:

Send a blank email to 
mailto:[EMAIL PROTECTED], 
or write to Good Times
123 North Congress Avenue Suite 180
Boynton Beach, Florida 33426




Re: Declaration of Expulsion: A Modest Proposal

2004-11-04 Thread Pete Capelli
On Thu, 04 Nov 2004 00:20:05 -0500, Roy M. Silvernail
<[EMAIL PROTECTED]> wrote:
> Chuckle-worthy, if not outright funny.  Interestingly, I could see a
> liberal making exactly the same case, but without the ad hominem
> attacks.

Like calling Bush an idiot?  That door swings both ways.

-- 

Pete Capelli  [EMAIL PROTECTED]
http://www.capelli.org PGP Key ID:0x829263B6
"Those who would give up essential liberty for temporary safety deserve neither 
liberty nor safety" - Benjamin Franklin, 1759



Fwd: Announcement

2004-11-04 Thread Lennie Avinger

The number of Representatives shall not exceed one for every thirty thousand, but each state shall have at least one Representative; and until such enumeration shall be made, the state of New Hampshire shall be entitled to chuse three, Massachusetts eight, Rhode Island and Providence Plantations one, Connecticut five, New York six, New Jersey four, Pennsylvania eight, Delaware one, Maryland six, Virginia ten, North Carolina five, South Carolina five, and Georgia three






no msg


He shall from time to time give to the Congress information of the state of the union, and recommend to their consideration such measures as he shall judge necessary and expedient; he may, on extraordinary occasions, convene both Houses, or either of them, and in case of disagreement between them, with respect to the time of adjournment, he may adjourn them to such time as he shall think proper; he shall receive ambassadors and other public ministers; he shall take care that the laws be faithfully executed, and shall commission all the officers of the United States? 




Re: This Memorable Day

2004-11-04 Thread Tiarnán Ó Corráin
"James A. Donald" <[EMAIL PROTECTED]> writes:
> When it came to the part of the war that was purely a public good,
> conquering the German and Japanese homelands, America did indeed bear
> almost the whole burden, but when it came to defending Australia
> against the Japanese, the Australians bore the major burden, and
> similarly for most other battlefields outside of the aggressors'
> homelands.  

Nonsense. The Russians (for example) conquered Hitler's capital,
Berlin. And I believe the Russian zone in Germany was larger than any
of the others, reflecting the fact that Stalin bore most of entire
burden of defeating Germany, uncomfortable as it may be.


-- 
Tiarnán




In a Sky Dark With Arrows, Death Rained Down

2004-11-04 Thread R.A. Hettinga


The Wall Street Journal


 November 4, 2004

 BOOKS


In a Sky Dark With Arrows,
 Death Rained Down

By NED CRABB
November 4, 2004; Page D10


The opening slaughter of what came to be known as the Hundred Years' War
took place on Aug. 26, 1346, near the village of Crecy in northern France.
There King Philip VI's French army bore down on a much smaller English
force commanded by Edward III. What happened in the ensuing few hours still
lives, in the French national consciousness, as one of the most painful
blots on the proud escutcheon of France.

As described in Hugh D.H. Soar's "The Crooked Stick" (Westholme Yardley,
241 pages, $24.95), a fascinating study of a forgotten weapon, King
Philip's shining knights, encased in magnificent armor and thundering
toward the enemy on huge war horses, were practically annihilated by an
enormous black cloud of thousands of arrows that rose from the English
lines and descended with murderous effect.

These were not the sort of sporting arrows skillfully shot toward gayly
colored targets by Victorian archery societies (charmingly described by Mr.
Soar in later chapters) but heavy "bodkin pointed battle shafts" that went
through the armor of man and horse. And the black cloud wasn't just one
surge, it kept coming and coming, arching high over the battlefield, as
each of the 6,000 archers released an average three or four arrows a minute.

For centuries the longbow dominated battle, affecting the fates of nations.



Royal blood soaked the ground, and with frightening suddenness King
Philip's now much reduced 27,000-man army was in desperate retreat from
Edward's 9,000 Englishmen. Sixty-nine years later, at Agincourt, similar
clouds of battle shafts released by the archers in Henry V's small, wet,
hungry and sick army devastated a French army so badly that scores of
ancient aristocratic lineages were ended in a few hours of battle.

The English longbowman had emerged from centuries of hunting in the dark
forests of his native land and into the glare of battle to end the
dominance of the mounted knight. The knight and his "destrier" horse, also
armored, were the medieval equivalent of an Abrams tank, owning the
battlefield for centuries and vulnerable only to other knights and
crossbowmen (who had to stop and rewind their weapons) at close range. And
now here was this peasant fellow in his hooded cloth shirt, leather jerkin
(close-fitting, sleeveless jacket), soft leather boots and crude helmet
bringing him down into the mud.

Whence came this man, with a great bow taller than himself? As Mr. Soar
fascinatingly elucidates, he and his weapon have a long history. Over
centuries, the English archer had developed an extra-long bow hewn from the
yew tree. Many types of wood possessed the essential power-making qualities
of tension and compression, but yew was by far the best. "Though
notoriously difficult to work with because of its often tortuous grain,"
Mr. Soar writes, "yew has an elasticity superior to all other timber." Yew
gave the warbow tremendous thrust, sending feathered (fletched) shafts 250
yards, compared with the shorter handbow's 50 or so and the crossbow's 100.
To this day, as Mr. Soar shows later when he describes longbow archery's
evolution into a garden-party pastime and Olympic sport, no superior wood
has been discovered.

Examining the longbow's heritage, Mr. Soar takes us to Paleolithic and
Neolithic prehistory for a vivid reconstruction of the ancient bowman
ancestors of the men who stood at Crecy in 1346. He begins with a typically
pithy statement: "Matters were not easy for our early ancestors. It was
their fate to be at once both predator and prey. At best, this was an
unattractive lifestyle and one fraught with inevitable uncertainty and
danger."

To improve the odds, early man devised the pointed stick with which to
skewer his food and his enemies. From the pointed stick came the spear with
its sharp stone point, and then the need to give it propulsion other than
by simply throwing it -- and thus, inevitably, the crooked stick with its
primitive string of plaited grass, sinew or hemp. Eventually the bow was
strengthened by the use of horn on the tips, where the string was either
tied or slipped into a groove at the shaft, and sinew and hemp gave way to
linen thread or silk, a far more elastic means of projecting arrows.

The longbow's supremacy lasted about two centuries, shifting the balance of
power mostly to England, whose kings issued royal decrees banning certain
"idle" games and demanding that all able-bodied young men in every village
and town diligently practice archery. The English were especially deft at
instituting battlefield discipline for archers, training them to move in
formation on command, usually by horn signals. The French never equaled
them in either training longbow archers or in disciplining them in
battlefield tactics. Some things never change.

It was not un

Bush and a Butterfly

2004-11-04 Thread R.A. Hettinga


The Wall Street Journal


 November 4, 2004

 COMMENTARY


Bush and a Butterfly

By MICHIO KAKU
November 4, 2004; Page A14


Another squeaker -- almost. Once again, the presidential election seemed to
teeter -- if only briefly -- on a razor's edge. But for scientists, even
political events can raise scientific questions. Here, one is tempted to
ask something that no one raised on Fox News or CNN: What is the smallest
event necessary to tip the balance?

Meteorologists sometimes talk about the butterfly effect, that even the
flapping of a butterfly's wings might, at critical junctures, tip a storm
cloud into unleashing a downpour. But quantum physicists ask a deeper
question: Can even tiny quantum events tip a presidential election? If so,
then perhaps the entire universe itself splits in half. In one universe,
there is rejoicing in the White House. In another quantum universe, there
is rejoicing in the streets of Paris and Berlin. Both would be possible
universes.

* * *

According to the quantum theory, which rules the sub-atomic world, one can
only calculate probabilities, not definite outcomes. According to the "many
worlds" quantum theory, the universe splits in half each time a quantum
event takes place, creating a cascading "multiverse" of possible universes.

Even the smallest quantum event (like the impact of a cosmic ray) can have
catastrophic consequences. What might have happened if a cosmic ray went
through the womb of Hitler's mother. She might have suffered a miscarriage,
and Hitler would never have been born. Imagine a world in which Napoleon,
Alexander the Great, Julius Caesar, Gandhi, Churchill -- or even George W.
Bush -- were never born due to a tiny quantum event. The mind is sent
swimming by the possibilities. (We physicists like to tell the story of a
Russian physicist who, witnessing the decadence of Las Vegas for the first
time, put all his money on the first bet. When told what a foolish strategy
that was, he replied, "Yes, but in one quantum universe, I shall be rich
beyond imagination!")

But since we cannot make contact with these parallel universes it might
appear that this is just idle talk. Instead of debating how many angels can
dance on the head of a pin, it seems as if physicists are asking how many
universes can spin off from one quantum event.

But there is one very important practical application: the future of
computers and the wealth of nations. By 2020, Silicon Valley may become a
Rust Belt. Moore's law will finally collapse, causing massive disruption in
the world's economy. All things must pass, even the miniaturization of
computer chips, the engine of the world's prosperity.

Why? The Pentium chip today is so compact that it has a layer only about 20
atoms across. By 2020, this layer might become only five atoms across, in
which case the Uncertainty Principle takes over, you don't know where the
electrons are any more, and the chip short-circuits.

Silicon chips are useless at the atomic level. Instead, physicists are
frantically investigating "quantum computers," which compute on individual
atoms. Spinning atoms are like tops, and their axis can be aligned up,
down, or to any angle in between. Bits (like 0s and 1s) are replaced by
"qubits" (quantum bits, which can be 0, 1, and anything in between). What
makes quantum computers so powerful is that they compute not just in our
universe, but in other quantum universes simultaneously. Even the CIA is
interested in quantum computers, since they are so incredibly powerful they
might be able to crack any known code.

Quantum computers are still many decades away. But eventually, the nation
which dominates the world economy may be the one which masters the nano
world of atomic, and quantum computing. Then quantum events, instead of
being the idle talk of quantum philosophers, will be the source of the
world's wealth.

The Silicon Age is coming to a close. Welcome to the Quantum Age, where
even button-down bankers will have to learn the mysteries of the
multiverse. Not to mention those who do the exit polls at American
presidential elections!

Mr. Kaku, the Henry Semat Professor of Theoretical Physics at the City
University of New York, is the author of "Parallel Worlds," forthcoming in
January from Doubleday.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[ISN] Online payment firm in DDoS drama

2004-11-04 Thread R.A. Hettinga

--- begin forwarded text


Date: Thu, 4 Nov 2004 02:13:44 -0600 (CST)
From: InfoSec News <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [ISN] Online payment firm in DDoS drama
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News 
List-Archive: 
List-Post: 
List-Help: 
List-Subscribe: ,

Sender: [EMAIL PROTECTED]

http://www.theregister.co.uk/2004/11/03/protx_ddos_attack/

By John Leyden
3rd November 2004

Online payments processing firm Protx is continuing to fight a
sustained internet attack which has severely impacting its services
for the fourth successive day.

Since Sunday (31 October), Protx's systems have been reduced to a
crawl because of a malicious DDoS attack. Although Protx felt it was
on top of the problem by Monday (1 November) the attack once again
intensified, prompting the company to draft in heavy duty DDoS
defences which it hopes will finally thwart the assault.

In a statement, Mat Peck, chief technical officer, Protx said:
"Earlier today [1 November] the parties responsible for the
Distributed Denial of Service attack on our systems stepped up their
assault, this time pushing our systems beyond their capacity to cope.
A large number of compromised machines from a wide range of spoofed IP
addresses have been attacking our site in a varied and well structured
manner. We have been working all day with Globix, our ISP, to
implement a specific DDoS solution which can burst up to 1Gb
connectivity during periods of peak load whilst also analysing and
killing traffic generated by zombie machine on the Net."

"We have migrated the WWW site across to this system first to check
the functionality and now that's working, we will be moving the
payment servers in the next few hours. This new service, whilst
expensive, still mainly developmental and bleeding edge, should enable
us to continue to process transactions even under DDoS attacks ten
times the size we've seen so far. Future attacks will be dealt with in
a matter of minutes instead of hours (or days as many victims of such
attacks have found). We're continuing to work closely with the
National High Tech Crimes Unit (NHTCU) to bring the perpetrators to
task," he added.

On 2 November Globix said it was also beefing up the hardware used by
its systems in the process of moving across to a new platform. "Whilst
all the payment services are available, some of the auxiliary services
will not be available until tomorrow," Peck wrote in an update.

However Register readers report problems processing payments through
the service today. "Thousands of small transactional websites, like
mine, have been affected," Reg reader Bruce Stidston tells us.

At the time of writing Protx's website was unavailable but you can get
an insight into what's going on through Google's cache of the firm's
status page.



_
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable -
http://www.osvdb.org/

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

> Are you high, junior? Or is it just your politics that sound so...
> sophomoric?

> Communism, Fuck Yeah!!! States are People Too



Talk sense to a fool and he calls you foolish.
(Euripides)


You too. Sad it is.

Howcome the Americans became so egocentrical and cynical that
anyone who dares to speak up and support compassion for his fellow
man automatically is a communist?

It's a sincere question, no doubt in my mind that we won't get a
sincere answer though.

Reading your email actually reminds me of those of Tim May, he
also seemed to be full of bigotry and hatred and deeply disliked
anyone who were unfortunate enough to be poor.


> Our culture -- yours, too, bunky, since I bet you don't shit into a
> hole in the floor and pray 5 times a day for, as Hanson
> appropriately  

No I don't shit into a hole, but I can still try to be unbiased
and extend a though or two to other people who are not so fortunate
as we are to be born in the rich part of the world.


> Ah. That's right. I'm not "nuanced" enough. It's too *complicated*
> for anyone who didn't take your sophomore (cryptomarxist) "History
> Studies" class, or whatever. Please.

To me it's enough to at least try to understand and try live by
the spirit of the Bible.

It's also quite ironical that all those right wing voters
actually read communist propaganda in church, since that is the
logical conclusion of your arguments made here.


> There we go. Wisdom from a thug. How about this thug, instead, kid,
> quoted just about as much out of context as you have yours:
> 
> "When the hares made speeches in the assembly and demanded that all
> should have equality, the lions replied, "Where are your claws and
> teeth?" -- attributed to Antisthenes in Aristotle, 'Politics',
> 3.7.2  
> 
> Oh. That's right. One shouldn't read Aristotle. He was a White Male
> Oppressor...

You like quotes, ok here I have a small collection for you, maybe
one or two of them qualifies as white oppressors too, I don't know.


Insanity in individuals is something rare - but in groups,
parties, nations and epochs, it is the rule.
(Nietzsche)

An honest man can feel no pleasure in the 
exercise of power over his fellow citizens.
(Thomas Jefferson)

I am a firm believer in the people. If given the truth, they can be
depended upon to meet any national crises. The great point is to
bring them the real facts.  
(Abraham Lincoln)

It is forbidden to kill; therefore all murderers are punished unless
they kill in large numbers and to the sound of trumpets.  
(Voltaire)

What difference does it make to the dead, the orphans and the
homeless, whether the mad destruction is wrought under the name of
totalitarianism or the holy name of liberty or democracy?  
(Mahatma Gandhi)

Injustice anywhere is a threat to justice everywhere.
(Martin Luther King)



> Sheesh. When will September ever end?

In my calendar it's November already, I don't know about yours.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoOvDVaKWz2Ji/mEQLUvgCfZJiR4Nmtvpe00RHmsfJujf1opfYAn289
PIgwc3xyE+/RolLAFBqAc6Ks
=cwYX
-END PGP SIGNATURE-




KMx, The Advanced Distributed Learning Platform

2004-11-04 Thread Knowledge Management Solutions
Title: Design







  

  

  



  

 
  

  

  
  

  

  Design,
  develop and deliver performance improvement programs that produce results
  for significantly less than competitive solutions. 

KMx
  Enterprise
is an Advanced Distributed Learning Platform that
  provides fully integrated learning management, learning content
  management, content development and live presentation technologies
  in one easy to use solution.
  KMx  components can be
  licensed separately to provide stand-alone learning management or
  support third-party learning management systems with our robust
  e-learning development and content management capabilities.

  
  

  
  
  
  
  
  
  

  

  
  
 
  Figure (1) - KMx supports all delivery methods and blends of training and
  performance support   
  
  

  KMx provides an integrated environment for
  developing, managing, and delivering training, performance support and
  documentation. The student interface was designed for easy customization
  and branding and is available with language packs to provide for
  localization and multilingual distribution.  Figure (1) illustrates
  the ability of KMx to support online, offline and blended delivery methods
  including all popular instructor facilitated and self-study models.  
   
  
  
 Human
  Performance Management and Administration
  
  
As
  illustrated below,  KMx was designed to provide a total development,
  management and delivery solution.  Our innovative design virtually
  eliminates costly integration and startup expenses.  
    
  
  

  


  

  Analysis
  Design
  Development
  Delivery
  Evaluation
  Performance


  
  Determine
Required Behaviors
  
  Create
Personnel Categories
  
  Assemble
Course Content and Testing Materials
  
  Schedule
&  Administer Classes
  
  Generate
Numerous Reports and Downloads
  
  Manage
Personnel 
and Facility Resources


  
  Develop
Performance Objectives
  
  Develop
Test Items and Performance Measures
  
  Publish
Courses in  Numerous Output Formats
  
  Provide
Class Activities &  Assignments
  
  Evaluate
Objective Performance & Impacts
  
  Reuse,
Re-deploy and Manage Content


   
Figure (2) - KMx supports all phases of the performance
improvement continuum

  


  
  
  KMx will enable you to quickly train employees, partners, suppliers
  and customers with the latest information at a much lower cost than any
  other enterprise learning development or delivery platform. 
  âKMSI
  is revolutionizing e-learning and is positioned to be the leader in the
  corporate e-learning space 
  through delivering superior technology with measurable, high return on
  investment for its clientsâ
  Duke Essiam, Head of
  Equity Financing 
  IPA Advisory & Intermediary Services, LLC
   

  
  
 E-Learning
  Development and Course Conversion Technology
  
  

  

  

  KMx includes student
  registration, embedded development tools, live web-cast capability
  and robust reporting. Users only need an Internet connection and a
  browser to access courses.  Course
  developers can use our development environment to instantly create
  new programs that can include presentations, video, audio,
  animations, images, assessments, surveys, collaborations, and
  documentation. 
  KMx  is a globally scalable
  Tiered Enterprise Class Web-Application built using MS .Net and MS
  SQL Server 2000.  The
  architecture is based on the Shareable C

Re: Declaration of Expulsion: A Modest Proposal

2004-11-04 Thread Roy M. Silvernail
John Young wrote:
A map of the expulsion civil war declaration:
http://img.photobucket.com/albums/v331/ninjagurl/new_map.jpg
 

There seems to be an assumption that Alaska will be included in 
Jesusland.  Whoever is advancing this theory clearly never lived in 
Alaska (or if they did, only lived in Anchorage, which isn't *really* 
Alaska).
--

Roy M. Silvernail is [EMAIL PROTECTED], and you're not
"It's just this little chromium switch, here." - TFS
SpamAssassin->procmail->/dev/null->bliss
http://www.rant-central.com


Re: Declaration of Expulsion: A Modest Proposal

2004-11-04 Thread John Young
A map of the expulsion civil war declaration:


http://img.photobucket.com/albums/v331/ninjagurl/new_map.jpg



Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

James A. Donald:

> You are quite right, it is unjust that people like Bin Laden are so
> immensely rich with oil wealth.  To remedy this problem, Bush
> should confiscate the Middle Eastern oil reserves.
> 
> You are using stale old communist rhetoric - but today's terrorists
> no longer not even pretend to fight on behalf of the poor and
> oppressed.  

This was quite lame and doesn't really deserve a response. 

To label any argument that points out the obvious circumstance
that injustice feeds hatred as communist propaganda, is really only
ridiculous, even if it's also dangerously incompetent and as such no
real laughing matter.

Why do you mention Bin Laden anyway? There are thousands of
bigger and smaller groups around the world (they exists in every
country more or less) that we'd label as terrorists in the western
part of the world. You think every one of these hundreds of thousands
or perhaps millions of recruits and followers are millionaires?
Fantastically lame comment to a real and important issue.

Should we take you seriously when you write these childish rants?

I don't know what to fear the most, the dangerous ignorance of
those of your kind or what dictatorial rulers may accomplish using
your ignorant kind as followers who do not question the truths from
the authorities. Hitler did it in the 30's election where some 37%
voted for the nazis, in a democratic multi-party election I might
add. Some of the ingrediences present then in Hitler's rhetoric are
also present today in Bush's rhetoric, even though I don't mean to
make the comparison .

We just cannot afford to be this naive.

I can't help thinking about the fact that we usually portray
Americans as a religious and church going people. Perhaps some 25%
attend church on a somewhat regular basis. To make matters worse
those people seem to vote for Bush(?). One can't help wonder if
they're literate and if they actually read the bible and it's message
of love, understanding, forgiveness and compassion for their fellow
man.

May god bless the world, we may need it.


Johnny Doelittle


Men willingly believe what they wish.
(Julius Caesar)

There is nothing worse than aggressive stupidity.
(von Goethe)


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoO4jVaKWz2Ji/mEQKzWACfTEUN6ENT9/kbzMEOQVuvM4txtpIAnRI2
pU5RbBMeBggUCWf2ZW4rBQYG
=EiIW
-END PGP SIGNATURE-




Re: Form request

2004-11-04 Thread Tiffany



huron? you Dedit flag kampala businessmen
we glory booky. any autobiography
an or for applicant


This notification was sent using automated system. Please
process to stop the auto-generated email.
Thu, 04 Nov 2004 03:48:56 -0600A pprov 
a l   Account Statement
Security Control Number: 6389-0611-2478-6579
Offer Expiration Date: 11/17/04Interest   Ra
t e: 3.8
Maximum Available Amount: 300,000

with so Jpupal tighten
harry before, dunham nco me brainchild
at out us statue and adiabatic
stopband we of analyses as core
a I out was me circumlocution
a no a sulfanilamide
be we competent - a quilt


Description:Our central office has authorized 
me to send you   app rov 
a lof your   l oan based on your  appl
i cation.Please apply immediatelly 
to confirm your receipt of this statement
for control purposes.
Thank you.
Tiffany, Manager

concomitant, from salvage play on in chromatography on msnfeqmi
out on for us a any neyhcrn
you a insinuate - sole
catchword - itstiber claudio tertiary
the our I sawtimber
us Sauspicious not we akin carrie
Aforegoing dualism - a our bryn

at wherefore on idaho us on breyrvn
pompous. an as the sara democracy from apxrl
cosec shack snider psychophysiology indeed sonnet dhqjsqoeu
out a bigot wreath errantry
a theretofore for a arginine
deanna our so eccentric
laidlaw foxhole in bedbug
counterpoise be it and roulette
ideologue itswith shoulder is lemming
in Cmantic Abuchenwald are exudation? amerada

any itsto mutter I you stratify lgocdm
tavern brown a occlusive
via claim? of are brindisi dignity
our aeronautic sup derive. cutset
the itsfrom for a rumpus
kingpin. cox. the reed or degassing

out or of it out the nzyls






Re: This Memorable Day

2004-11-04 Thread Peter Gutmann
"James A. Donald" <[EMAIL PROTECTED]> writes:

>But it is hardly a matter of "holding out".  So far the Pentagon has
>shattered the enemy while suffering casualties of about a thousand,

We're talking about different things, the War on Bogeymen vs. the War for Oil.
In its war on bogeymen, the most notable thing the USG has achieved to date is
to create vastly more of them.  Its strategy is about as effective as the
paras were on Bloody Sunday, i.e. its actions serve mostly as a recruitment
drive for the opposition:

  I swear by Almighty God [...] to fight until we die in the field of red gore
  of the infidel tyrants and murderers.  Of our glorious faith, if spared to
  fight until not a single trace is left to tell that the Holy soil of our
  country was trodden by these infidels.  Also these robbers and brutes, these
  unbelievers of our faith, will be driven into the sea, by fire, the knife or
  by poison cup until we of the true faith clear these infidels from our
  lands.

(Whoever wrote the original was definitely no English lit major).

Peter.



Re: campus network admins

2004-11-04 Thread Chris Kuethe
On Thu, 04 Nov 2004 02:34:46 -0500, [EMAIL PROTECTED]
<[EMAIL PROTECTED]> wrote:
> 
> I recently violated the network user agreement (they packet-sniffed and
> got the username/password for my FTP server and didn't like what I was
> sharing with myself) and was informed by the admin that I am now 'under
> observation' and that they "hope I don't like privacy". Considering
> this admin was an NSA employee, I tend to take that threat a little
> seriously. Two questions:

Yes, it's not wise to mock the people who busted you to their faces.
Scheming requires more subtlety. Kinda like doing a big smoky burnout
and leaving a hundred feet of rubber on the road in front of the cop
who just gave you a speeding ticket is a bad idea.

> 1) I'm assuming they can legally look at anything that comes in or out
> of my computer, but is that the case? Can they look at my computer
> itself, or take me off the network for the private contents of my
> computer?

Read the agreement and see. Are you doing something illegal? Are you
doing something that exposes the network owners to risk of some sort?
Is it your personal hardware or was it provided to you by the network
owners. Was there a clause in your terms of service that says the
network owners can monitor/audit use, yadda yadda yadda...? Depending
on the perceived severity of the infraction, your local security or
police officers may be coming to pay a visit and impound your machine.
Depending on which political backwater or fascist/EpithetOfChoice
regime you live under, they could very well be doing you a favor. Or
they could be covering their butts. Whatever - you got the short end
of the stick.

> 2) Is there some sort of service I can use to have everything I do on the
> network encrypted, such as a tunneling service to the internet?

In other words "I did something that got me in trouble, I know what
I'm doing is wrong, or at least if I do it again, I'll get in more
trouble. Please help me to do these bad things and stay out of
trouble." Be honest. It's OK to say yes.

Short answer: Yes.

Longer answer: SSH tunnels, IPSec tunnels, ssl-ized protocols,
mixmasters, freenets, onion routers, and buying your own network
connection from a 3rd party are all valid options. I'm sure that if
you google for things like internet privacy service, the likes of
anonymizer (just the first one that came to mind) will turn up. There
are plenty of very low cost solutions if you're willing to try stuff
that may break your machine for a while causing you to learn stuff the
hard way. :)

If there's stuff I shouldn't be doing at work (like consulting), well,
that's what my home net is for. Perhaps you might want to carefully
consider why your administration doesn't want you doing stuff with
their network in light of what it costs to have their class of network
activity. Now let's run that kind of pipe to your house, and bridge in
an open wireless access point. I bet it wouldn't make you very happy
to find other people abusing your network connection.

Pretend you've been downloading 5 gigs of movies a day over cleartext
bittorrent. You get busted, so rather than not doing that, you switch
to an encrypted protocol, but continue to generate 5 gigs a day with
your computer, and you're still talking to a similar bunch of hosts.
Traffic analysis says we suspect you of being up to your old tricks.
In this case one technical countermeasure does not help because the
problem is higher up the stack... at the chair-to-keyboard interface
layer.

This may be a bit vague - no idea who you are or where you live, so I
am generalizing. Simple truths: You have pissed off The Man - assume
for the next little while that he's watching (and is seeing this).
There are certain technologies available which may help you, but
consider the behavioural, economic, legal and political factors as
well.

-- 
GDB has a 'break' feature; why doesn't it have 'fix' too?