At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked
At 01:04 PM 4/29/2001 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to
have log files that are available to you but not an
At 10:54 AM 1/10/01 -0600, Jim Burnes wrote:
On Wednesday 10 January 2001 05:29,
Ken Brown wrote:
...
The sun still doesn't set on the British Empire (not while we
have
Pitcairn!), London is still the heart of darkness, it is is still
the
place where the money is (most of the money in the
At 10:01 AM 12/31/00 -0800, Eric Cordian wrote:
Jim Choate writes:
Making people "part of the process" is one of the first things one learns
in management. How to simultaneously make sure they have zero chance of
actually altering what you have planned for them is the second thing.
They
At 03:34 PM 12/7/00 -0800, Eric Cordian wrote:
I must have been mistaken, according to the material at
http://www.fas.org/spp/military/program/asat/miracl.htm no CO2 is employed,
rather "a fuel (ethylene, C2H4) is burned with an oxidizer (nitrogen
trifluoride, NF3). Free, excited fluorine
Legislating Cookies
By John Roemer
November 28, 2000
In the absence of legislation written specifically to regulate Net
privacy, should a 14-year-old wiretapping law be applied to Internet
privacy issues?
Two federal class actions filed last week raise this question,
claiming that online ad
Title: FW: A view from the developing world
1. Imagine that we read of an election occurring
anywhere in the third world in which the self-declared winner was the son of
the former prime minister and that former prime minister was himself the
former head of that nation's secret
At 06:21 PM 11/19/00 +, Jim Dixon wrote:
On Sat, 18 Nov 2000 [EMAIL PROTECTED] wrote:
EPIC FOIA...
http://www.latimes.com/wires/20001117/tCB00V0387.html
WASHINGTON--The FBI's controversial e-mail surveillance tool,
known as Carnivore, can retrieve all communications that go
To: Article Submission Topica Newsletter [EMAIL PROTECTED]
From: "Graham Crabtree/ C.E.G. Ltd." [EMAIL PROTECTED]
Subject: $9.4 MILLION IS RECOVERED IN MEDI-CAL FRAUD / Abstracted f
=?
Date: Wed, 23 Aug 2000 03:47:35 -0700
Reply-To: [EMAIL PROTECTED]
X-Topica-Loop: 1300010620
X-Mailer:
To: Article Submission Topica Newsletter [EMAIL PROTECTED]
From: "Graham Crabtree/ C.E.G. Ltd." [EMAIL PROTECTED]
Subject: British e-mail law shelved / By Jean Eaglesham, Legal
Correspondent/ Source: Fi
Date: Fri, 25 Aug 2000 03:52:23 -0700
Reply-To: [EMAIL PROTECTED]
X-Topica-Loop: 1300010620
At 05:35 PM 8/19/00 -0700, Anonymous wrote:
Isn't it better to encrypt account data and send to a maillist or ng ?
Its been suggested for rev 0.2
steve
At 08:39 AM 8/20/00 -0700, you wrote:
Here's another protocol question though; how could the
script kiddies have *used* the keys (eg, to get money)
without creating a route through which they could be
traced? Remember ATMs all mount cameras these days,
and their locations are, of course, known.
We have another winner!
Red Hat adds Web server software with C2Net buy
By
Stephen Shankland
Staff Writer, CNET News.com
August 14, 2000, 10:20 a.m. PT
Red Hat has agreed to acquire C2Net in a stock deal worth about $44
million, expanding its domain from Linux to another major open-source
ONLINE AND UNIDENTIFIABLE?
Issue: Internet
Today researchers at ATT Labs will reveal a new technology that can help
Internet users evade censors. "It seems like more and more, technologies are
being introduced that limit the freedom of individuals--especially in
repressive administrations" around
14 matches
Mail list logo