really, which of the security products/methods you should use, depends on who you are trying to protect yourself from. if it's the NSA, then, you probably shouldn't bother, it'll just get their attention. (as i'm sure i did by mentioning them) -- Read this and endorse it: <http://www.indefenseoffreedom.org> read this and understand it so we can all be more secure, and not be victims of our own government: <http://www.counterpane.com/crypto-gram-0109a.html> i urge everyone to read and pass along this REAL security information, security is tricky and so is protecting liberties, they usually go hand in hand, they do not oppose each other. and these articles about what we really know: <http://www.janes.com/>
-- G-List is sponsored by <http://lowendmac.com/> and... Small Dog Electronics http://www.smalldog.com | Refurbished Drives | -- We have Apple Refurbished Monitors in stock! | & CDRWs on Sale! | Support Low End Mac <http://lowendmac.com/lists/support.html> G-List list info: <http://lowendmac.com/lists/g-list.shtml> Send list messages to: <mailto:[EMAIL PROTECTED]> To unsubscribe, email: <mailto:[EMAIL PROTECTED]> For digest mode, email: <mailto:[EMAIL PROTECTED]> Subscription questions: <mailto:[EMAIL PROTECTED]> Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/> Using a Macintosh? Get free email and more at Applelinks! <http://www.applelinks.com>
