really, which of the security products/methods you should use, depends
on who you are trying to protect yourself from.  if it's the NSA, then,
you probably shouldn't bother, it'll just get their attention.  (as i'm
sure i did by mentioning them)
-- 
Read this and endorse it:  <http://www.indefenseoffreedom.org>  read
this and understand it so we can all be more secure, and not be victims
of our own government: 
<http://www.counterpane.com/crypto-gram-0109a.html> i urge everyone to
read and pass along this REAL security information, security is tricky
and so is protecting liberties, they usually go hand in hand, they do
not oppose each other.  and these articles about what we really know: 
<http://www.janes.com/>

-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Macintosh? Get free email and more at Applelinks! 
<http://www.applelinks.com>

Reply via email to