>
With Panther and Mail 1.3.3 (with HTML temporarily enabled): the url is 
blue and underlined but not clickable. It behaves like ordinary text.

> From reading the posts here and responses on one Mac users' website, 
> and from a fruitful conversation with the technician at my internet 
> provider, I have concluded that there is nothing wrong with the 
> hyperlinks that I am sending. ?The problem must be with the email 
> programs of certain recipients. ?But, I'm not positive.
>
> I am sending this message in HTML, and copying a formatted article and 
> a hyperlink. ?If any of you find that the hyperlink is not active or 
> the message and article are in plain text, would you please let me 
> know? ?If more than a few replies appear on the digest, I will begin 
> to think that I do have a problem ?Thanks.
>
> Oh, I'm not sure if the formatted article will be sent through the 
> list's server, but I know that hyperlinks do come to me as blue, 
> underlined and active.
>
> David Dudine
>
>
>
> http://www.nytimes.com/2004/01/31/opinion/31SAT1.html
> TODAY'S EDITORIALS
>
>
>
> How to Hack an Election
>
> Published: January 31, 2004
>
>
> Concerned citizens have been warning that new electronic voting 
> technology being rolled out nationwide can be used to steal elections. 
> Now there is proof. When the State of Maryland hired a computer 
> security firm to test its new machines, these paid hackers had little 
> trouble casting multiple votes and taking over the machines' 
> vote-recording mechanisms. The Maryland study shows convincingly that 
> more security is needed for electronic voting, starting with 
> voter-verified paper trails.
>
> When Maryland decided to buy 16,000 AccuVote-TS voting machines, there 
> was considerable opposition. Critics charged that the new touch-screen 
> machines, which do not create a paper record of votes cast, were 
> vulnerable to vote theft. The state commissioned a staged attack on 
> the machines, in which computer-security experts would try to foil the 
> safeguards and interfere with an election.
>
> They were disturbingly successful. It was an "easy matter," they 
> reported, to reprogram the access cards used by voters and vote 
> multiple times. They were able to attach a keyboard to a voting 
> terminal and change its vote count. And by exploiting a software flaw 
> and using a modem, they were able to change votes from a remote 
> location.
>
> Critics of new voting technology are often accused of being alarmist, 
> but this state-sponsored study contains vulnerabilities that seem 
> almost too bad to be true. Maryland's 16,000 machines all have 
> identical locks on two sensitive mechanisms, which can be opened by 
> any one of 32,000 keys. The security team had no trouble making 
> duplicates of the keys at local hardware stores, although that proved 
> unnecessary since one team member picked the lock in "approximately 10 
> seconds."
>
> Diebold, the machines' manufacturer, rushed to issue a 
> self-congratulatory press release with the headline "Maryland Security 
> Study Validates Diebold Election Systems Equipment for March Primary." 
> The study's authors were shocked to see their findings spun so 
> positively. Their report said that if flaws they identified were 
> fixed, the machines could be used in Maryland's March 2 primary. But 
> in the long run, they said, an extensive overhaul of the machines and 
> at least a limited paper trail are necessary.
>
> The Maryland study confirms concerns about electronic voting that are 
> rapidly accumulating from actual elections. In Boone County, Ind., 
> last fall, in a particularly colorful example of unreliability, an 
> electronic system initially recorded more than 144,000 votes in an 
> election with fewer than 19,000 registered voters, County Clerk Lisa 
> Garofolo said. Given the growing body of evidence, it is clear that 
> electronic voting machines cannot be trusted until more safeguards are 
> in place.
>
> ?
>
> Jeff Slyn, Owner
> SLYN Systems & Peripherals
> (502) 426-5469
> serving Kentuckiana clients 7 days a week since 1985!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 5196 bytes
Desc: not available
Url : 
http://www.math.louisville.edu/pipermail/macgroup/attachments/20040201/ccd1dd3e/attachment.bin
 

Reply via email to