>>> Philip S Tellis wrote: <<<

> 
> Feedback between the dotted lines (feel free to snip and stick the above
> matter (where relevant) in to your feedback)
> .....................................................................
> Why don't we organise our own Internet Security Workshop or Seminar.  We
> can have it really detailed, maybe even cover two sessions.  We could
> invite cybercafe owners, office users and home users.

        I like the idea, and am willing to help. We can start by setting
up a few docs in a site. My linux machine (http://linux.math.tifr.res.in)
is available. If people know about some interesting documents, or have
written something in this line, I can put it up.
> .....................................................................

Pablo.
---------------------------------------------------------------------- 
Pablo Ares Gastesi. School of Mathematics, TIFR, Mumbai 400 005, INDIA
[EMAIL PROTECTED]  http://www.math.tifr.res.in/~pablo/
Key fingerprint =  1A 7C 0A 22 5A 75 A4 78  62 6F 64 09 C1 A0 F7 E6
---------------------------------------------------------------------- 

To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list 
button and fill the appropriate information 
and submit. For any other queries contact the ML maintener

Reply via email to