>>> Philip S Tellis wrote: <<<
>
> Feedback between the dotted lines (feel free to snip and stick the above
> matter (where relevant) in to your feedback)
> .....................................................................
> Why don't we organise our own Internet Security Workshop or Seminar. We
> can have it really detailed, maybe even cover two sessions. We could
> invite cybercafe owners, office users and home users.
I like the idea, and am willing to help. We can start by setting
up a few docs in a site. My linux machine (http://linux.math.tifr.res.in)
is available. If people know about some interesting documents, or have
written something in this line, I can put it up.
> .....................................................................
Pablo.
----------------------------------------------------------------------
Pablo Ares Gastesi. School of Mathematics, TIFR, Mumbai 400 005, INDIA
[EMAIL PROTECTED] http://www.math.tifr.res.in/~pablo/
Key fingerprint = 1A 7C 0A 22 5A 75 A4 78 62 6F 64 09 C1 A0 F7 E6
----------------------------------------------------------------------
To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list
button and fill the appropriate information
and submit. For any other queries contact the ML maintener