At 08:33 PM 3/22/02 -0600, Aimee Farr wrote:
Tim wrote:
Don't hire a single lawyer. As soon as even a single lawyer is hired,
you're lost. Because it means you're thinking in terms of using the
legal system, of striking business deals with those whose products
you
napster, and with working
I realize that this bill basically says you can tap someone's phone for
jaywalking, and normally I would say, 'No way,' said Del. Dana Lee
Dembrow (D-Montgomery). But after what happened on September 11th, I
say screw 'em.
http://www.washingtonpost.com/wp-dyn/articles/A12099-2002Mar24.html
A federal appeals court panel has struck down a law that restricted
children's access to
violent video games, giving the software the same free-speech
protection as that for
works of art.
A panel of the 8th Circuit Court of Appeals ruled Tuesday that a St.
Louis County, Mo.,
At 07:30 AM 5/24/03 +0100, Adam Back wrote:
Colin Plumb's crypto library bnlib supports multiple word size I
believe.
On Fri, May 23, 2003 at 11:36:58AM -0700, Major Variola (ret.) wrote:
Anyone know of any open-source modexp code for 8-bit cpus?
Thank you for your response, however
At 10:34 AM 5/30/03 -0700, Bill Frantz wrote:
I think your best bet for an 8 bit CPU will be an assembly language
routine.
Likely so. For those interested, I found this article,
which does in fact use enhanced (it has a multiplier)
Z80 assembly, included in the article:
At 10:00 PM 5/30/03 -0400, Tyler Durden wrote:
You think that's bad?
I know someone who was offerred $1,000 a night to play lead trumpet for
Streisand. When he heard that a major requirement was that he was not
to
lock eyes onto Streisand (ie, look at her), he declined the offer.
Who cares?
At 02:30 PM 5/30/03 -0700, Tim May wrote:
The second irony is that just today I took my first flying lesson, in a
Diamond Katana composite/carbon single-prop plane. I took off from the
Watsonville Airport, which is, I assume, the home airport of Adelman.
Just FYI, if you read up on G (general
At 08:32 PM 5/31/03 -0400, Scott Guthery wrote:
Hello, Rich ...
When I drill down on the many pontifications made by computer
security and cryptography experts all I find is given wisdom. Maybe
the reason that folks roll their own is because as far as they can see
that's what everyone does.
At 11:18 AM 6/1/03 -0400, Ian Grigg wrote:
There is a reason that the AK47 is the weapon of
choice: it is an extraordinarily simple weapon.
Training is probably about half the requirements
of say the M16. That makes a difference, much
more so than, say, the increased accuracy of the
M16!
Got
I recall reading at least one study of learning PGP and its UI.
I have had the chance to observe half a dozen (albeit, smarter
than normal) others' (mostly engineers) learning curves.
All are using PGP 7.03 and Eudora 3.05.
We are not using public key servers.
Mistakes include:
* neglecting to
At 05:28 PM 6/3/03 -0700, Tim May wrote:
Possibly for construction
of baseline maps of existing radioisotopes in university labs,
hospitals, and private facilities. Then deviations from baseline maps
could be identified and inspected in more detail with ground-based vans
and black bag ops.
Good
t 10:23 AM 6/6/03 -0700, Tim May wrote:
I certainly never implied in any way that a simple G-M tube would be
useful for this. Implicit in my radioistope mapping comment was that a
gamma ray spectrometer would be used.
And note that this is just what can be easily bought on the open
At 04:56 PM 4/6/03 -0700, Bill Stewart wrote:
A lot of these struck me as desparate attempts by the bomb designers
to
find *something* useful to do with the damned things besides pray that
they sit in their silos, rusting, and are never, never used.
Yes, that's about right...
I think that is
article by Edward Tenner,
Technology review, June 2003 p61-64
Also an article on deceipt detector p67-69
about using IR reflectivity of your frontal lobes
to detect deceipt. Sort of a polygraph on steroids.
(sorry, only cites, not URLs this time)
Authorities said they were considering the possibility that a second
person might have been involved in the abduction, based on video from a
neighbor's surveillance camera.
http://www.cnn.com/2003/US/West/06/09/california.abduction/index.html
At 03:39 PM 6/10/03 -0700, Bill Frantz wrote:
At 5:12 PM -0700 6/8/03, Anne Lynn Wheeler wrote:
somebody (else) commented (in the thread) that anybody that currently
(still) writes code resulting in buffer overflow exploit maybe should
be
thrown in jail.
Not a very friendly bug-submission
(resent) At 11:44 AM 6/13/03 -0400, Peter Wayner wrote:
At 9:27 AM +0200 6/13/03, Thomas Shaddack wrote:
See also something about computer-generated music:
http://brainop.media.mit.edu/online/net-music/net-instrument/Thesis.html
I'm told someone is trying to encode information by ordering the
17 matches
Mail list logo