My search is not directly related to cryptography, except perhaps, as
part of the stegonograph y threads:
Does anyone know of a source package that can discriminate
vocal/ambient noise sources from musical/instrumental sources? Ie,
instruments vs voice? I'm aware of various canned bandpass
I download all of alt.anonymous.messages from the same news
server that large numbers of people post and download child
porn on.
It might be that child porn posted to these lists is the most
attractive vehicle as it is illegal everywhere, it will not be
downloaded at random, those who do
From: [EMAIL PROTECTED]
Date: Sat, 29 Dec 2001 23:44:08 -0500
My search is not directly related to cryptography, except perhaps, as
part of the stegonograph y threads:
Does anyone know of a source package that can discriminate
vocal/ambient noise sources from musical/instrumental
You might have some luck with ProSoniq's sonicWORX Studio, which I'm
pretty certain can do this.
-- Ben
-Original Message-
From: [EMAIL PROTECTED] [mailto:owner-
[EMAIL PROTECTED]] On Behalf Of [EMAIL PROTECTED]
Sent: Saturday, December 29, 2001 11:44 PM
To: [EMAIL PROTECTED]
Oops -- sorry, I forgot to send the link; they are at www.prosoniq.de.
-- Ben
-Original Message-
From: [EMAIL PROTECTED] [mailto:owner-
[EMAIL PROTECTED]] On Behalf Of Ben Cox
Sent: Sunday, December 30, 2001 2:07 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Source
generally, imagine you are a consultant to some nefarious
organization and think about what it would take to convince them that
the method you propose is safe, capable of being taught to their
covert agents, and tolerant of the inevitable slip ups in the field
(and remember their
another aspect that overlaps PKIs and quality is the difference between
application code and service code turning an application into a
service can be hard possibly writing 4-10 times as much code as in the
base application infrastructure and very high-quality code
dealing
somewhat as an aside the gift cards (and other flavors) that you see
at large percentage of retail check-out counters in the US are effectively
digital cash ... although the current incarnation results in a different
card at every retailer. however, they are online, magstripe-based digital
Arnold G. Reinhold [EMAIL PROTECTED] writes:
The EWR monorail had been shut down for the better part of a year to correct a
pesky track corrosion problem (it's hard to get all the bugs out of a system
that is not widely used).
Thus making it a perfect analogy for PKI [0].
Peter.
[0] Before
At 02:59 PM 12/30/01 -0800, John Gilmore wrote:
Along these lines I can't help but recommend reading one of the best
crypto books of the last few years:
Between Silk and Cyanide
Leo Marks, 1999
This wonderful, funny, serious, and readable book was written by the
chief
10 matches
Mail list logo