At 15:57 -0500 on 11/19/02, Trei, Peter wrote:
Kevin Elliott[SMTP:[EMAIL PROTECTED]]
Correction in the interest of historical accuracy. The idea that we
succeeded in the revolutionary war by inventing a new form of
warfare. The reality is that the british were marching in formation
for
On Tuesday 19 November 2002 01:48 pm, Kevin Elliott wrote:
Well, there nuggets and the larger truth... Rifles were widely used
as sniper rifles by the Americans. They were commonly available
(though expensive) because they are a far superior hunting tool than
a smoothbore
Mike Diehl[SMTP:[EMAIL PROTECTED]] wrote:
On Tuesday 19 November 2002 01:57 pm, Trei, Peter wrote:
Kevin Elliott[SMTP:[EMAIL PROTECTED]]
Correction in the interest of historical accuracy. The idea
that we
succeeded in the revolutionary war by inventing a new form of
At 14:06 -0700 on 11/19/02, Mike Diehl wrote:
The british got VERY upset with us because of a tendency
to shoot officers which was considered very bad form. I believe it
was common practice to hang anyone found armed with a rifle for what
amounted to war crimes. But again, very poor rate
--
On 19 Nov 2002 at 15:45, Tyler Durden wrote:
Mikey: I would suggest tangling with Chomsky for a bit. Start
with...
http://zmag.org/content/showarticle.cfm?SectionID=11ItemID=2
312
Chomsky is a liar. His citations are mostly fraudulent, and he
has at one time or another defended every
On Tuesday 19 November 2002 01:57 pm, Trei, Peter wrote:
Kevin Elliott[SMTP:[EMAIL PROTECTED]]
Correction in the interest of historical accuracy. The idea that we
succeeded in the revolutionary war by inventing a new form of
warfare. The reality is that the british
A company I am involved with has been on the distribution list for the
FBI's Project Lookout watch list, the list being shared with banks,
electronics companies, consulting firms, transportation companies, and
1100 other firms.
Cross-indexing with the CP subscriber list, I find 17 names on
On Tue, 19 Nov 2002, Tyler Durden wrote:
Let's have some history here. The Muslims have not been at war against the
Israelites since Biblical times. That is completely wrong. Hell, there
haven't been any Israelites for nearly two millenia.
More to the point, there were no Muslims in
On Tuesday 19 November 2002 03:30 pm, Jim Dixon wrote:
More to the point, there were no Muslims in Biblical times. The
Muslims appeared around 600 years after Christ, centuries after the
beginning of the Jewish diaspora. The Romans drove the Jews out of
Jerusalem and
17 is clearly an error,a couple were neutralized/captured and we are now
down to 11 disciples plus Mongo.(12 if you include me:)
Still we must not be discouraged,remember Thermopylae,remember the
bridge,Horace,the Trojan horse,Achilles,the battle of Britain,lord beaver.
Its just been repeated
I believe that it is generally accepted that until quite recently, in
historical terms, the Jews fared much better under the Muslims than
the Christians.
Actually, there's no comparison. Although there have been exceptions, the
Muslims' track record is MUCH better than the Christians. Take
On Tue, 19 Nov 2002, peter zulu wrote:
here's the list as of 10-11-01:
http://www.vrwa.org/fbiwatchlist.htm
w.a.s.t.e ;)
I note that they are still looking to interview Mohammed Atta: that's pretty
funny.
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
If Governments really want us to
On Wed, 13 Nov 2002, Tyler Durden wrote:
used for useful computation will suffer from incompletenenss, so I would
assume para-consistent logic would fall under that category (is that
similar to fuzzy logic?).
Not really. Para-consistent logic is the study of logical schemas or
systems in
From the Department of Homeland Security bill...
SEC. 310. TRANSFER OF PLUM ISLAND ANIMAL DISEASE 22
CENTER, DEPARTMENT OF AGRICULTURE. 23
(a) IN GENERAL.In accordance with title XV, the 24
Secretary of Agriculture shall transfer to the Secretary of 25
Homeland Security the Plum Island Animal
In school yard politics this edge is normally a weapon
of some sort that can equalize the playing field (guns usually in the US,
try going to an inner city public school for 2 years). Saddam sees this and
that is what let him to develop those WMD, to equalize against a superior
foe / bully
A
On Tue, 19 Nov 2002, Eric Cordian wrote:
This of course is not a true tale, but an incredible simulation to make a
point.
Yeah, it was funny. Not sure what the point was...
The earth currently has a population of just slightly over six billion
people. This means that a 200 gigabyte drive
As to dangerous, I find that most of the people using violence in this
country are anti-drug, not pro.
Can't exactly agree with ya' here. Just watch COPS...most of those actually
committing stupid crimes are apparently pro-Alchohol.
Pot? We can't have THAT be legalized now, or the CIA will lose
On Tue, 19 Nov 2002, Mike Diehl wrote:
Granted. I wish we could go back to isolationism, but as the worlds only
remaining Super Power, that seems unlikely. No matter what we do, we simply
can't win.
Life isn't a football game, quite 'trying to win' and I think you'd find a
lot of issues
On Tue, 19 Nov 2002, Tyler Durden wrote:
Well, they have enough non-central leadership to all be against Israel and
the US. And to have been at war against the Israelies since Bible times...
OK, Mike, this is a good example of the kind of facts that lead to fairly
easy (though erroneous)
On Tue, 19 Nov 2002, Mike Diehl wrote:
And the middle east is the only place we meddle? I think not. But the
middle east is the only place who has overtly attacked us.
Revisionist, and incorrect, history.
Somalia isn't in the middle east.
Britian isn't in the middle east.
Mexico isn't in
Minor opinion point:
-Original Message-
From: Mike Diehl [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 19, 2002 23:34
History didn't cause Sadam
to start a
Weopon of Mass Destruction program. These are all current
events.
Going to disagree with this one. This is
On Tuesday 19 November 2002 03:06 pm, Trei, Peter wrote:
Mike Diehl[SMTP:[EMAIL PROTECTED]] wrote
You don't deny either of my surmises about your experience or lack
thereof.
I didn't find them relevent. My understanding of the facts doesn't matter.
I was LOOKING for the
Tim Spoofs:
A company I am involved with has been on the distribution list for the
FBI's Project Lookout watch list, the list being shared with banks,
electronics companies, consulting firms, transportation companies, and
1100 other firms.
Cross-indexing with the CP subscriber list, I
Well, they have enough non-central leadership to all be against Israel and
the US. And to have been at war against the Israelies since Bible times...
OK, Mike, this is a good example of the kind of facts that lead to fairly
easy (though erroneous) conclusions.
Let's have some history here.
On Wed, 13 Nov 2002, Tyler Durden wrote:
Damn what a pack of geeks! (Looks like I might end up liking this list!)
When we say complete, are we talking about completeness in the Godelian
sense? According to Godel, and formal system (except for the possibility of
the oddballs mentioned
as mentioned on the cryptography list
http://www.homeport.org/~adam/starttls.html
StartTLS for Opportunistic Email Encryption with Postfix
Lots and lots of sites use StartTLS for encrypting local email, usually so
that they can hide passwords when SMTP auth is used. But, StartTLS also
gives
On Wed, 20 Nov 2002, Vincent Penquerc'h wrote:
I just hope that Americans see this, and see that what they're
going to get from this behavior isn't world domination, but either
a genocide of half the planet, or a life in a bared wire world,
with no freedom left, in a vain attempt to protect
Sorry to be a blabbermouth folks, but this one is interesting. Delete
anything I've written in the last two days if ya' want.
Here's something I've been thinking about for various reasons. I'm assuming
this doesn't exist yet, but it's such an interesting idea I'm tempted to
brush the dust off
Quoting Tyler Durden [EMAIL PROTECTED]:
WOULDN'T IT BE NICE...If the original encrypted message actually had TWO
messages inside it, both very similar. In this example, one of the messages
is the incriminating pictures of the demonstration, the other is pictures
of Pam Anderson or
Cable News is reporting that the Onion, America's Finest News Source, has
pulled from its Web site an article on the recent siege at the Moscow
theatre by Chechen rebels.
Does anyone have a copy of the article they could post? I'd like to see
what sorts of comments about terrorism are
On Wed, 2002-11-20 at 12:01, Eric Cordian wrote:
Does anyone have a copy of the article they could post? I'd like to see
what sorts of comments about terrorism are unacceptable to publish, even
as parody.
On Wed, 13 Nov 2002, Ben Laurie wrote:
Jim Choate wrote:
What I'd like to know is does Godel's apply to all forms of
para-consistent logic as well
It applies to any sufficiently complex axiomatic system. Allegedly.
Actually it doesn't, it applied to 'complete' systems. There is -no-
Israeli tanks aren't the ONLY things that kill someone's
kids. The whole
region has been at war for 100's of years. If Israel backed
You do realize that the whole world has been at war for hundreds
of years, do you ? Israel is now the bully in the region, and is
conforted in keeping this
MD == Mike Diehl [EMAIL PROTECTED] writes:
MD And the middle east is the only place we meddle? I think not.
MD But the middle east is the only place who has overtly attacked
MD us.
A minor point about grammar and logic: places don't attack, overtly or
covertly, neither are they
released today...
http://www.gao.gov/cgi-bin/getrpt?GAO-03-50R
From what I can grok this is not what I was looking for, but it IS a
valuable tool.
What I'm talking about, I think, would be better in certain scenarios, as a
rubber-hose-holder can be made to THINK they have the real data, whereas in
reality they have a clever fake. (eg, instead of the real
Tyler Durden[SMTP:[EMAIL PROTECTED]] wrote:
In school yard politics this edge is normally a weapon
of some sort that can equalize the playing field (guns usually in the US,
try going to an inner city public school for 2 years). Saddam sees this
and
that is what let him to develop
Who should your computer take its orders from? Most people think their
computers should obey them, not obey someone else. With a plan they
call trusted computing, large media corporations (including the movie
companies and record companies), together with computer companies such
as Microsoft
On Wed, 20 Nov 2002, Tyler Durden wrote:
to have a big jpg of a hand with middle finger extended...) More than this,
they will have unknowingly destroyed the real data. (Perhaps a 3rd key is
needed that DOESN'T destroy the original data, just 'hides' it a la
Rubberhose.)
The question I've
Well, the basic idea is to co-encrypt some fake data that looks like the
real data, so that when they find it (using the key to the fake data of
course) they'll figure you gave them the real key, because they won't know
that there ever was a fake key leading to fake data. (And I suppose there's
At 02:19 PM 11/20/02 -0500, Tyler Durden wrote:
From what I can grok this is not what I was looking for, but it IS a
valuable tool.
What's missing? What part of your threat model didn't they consider?
What I'm talking about, I think, would be better in certain scenarios,
as a
rubber-hose-holder
41 matches
Mail list logo