ed to link the e-mail to the
campaign of the Republican incumbent.
Tracking the Metadata
It turns out there's more than meets the eye in the average
word-processing document. A typical Microsoft Word file, for example,
can include the author's name, the name of his or her company, the
nam
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 20, 2000 13:29 PM
Subject: Word.
Of course all of us knew this. The article is
good for explaining to non-technical friends.
http://interactive.wsj.com/articles/SB972002214791170991.htm
At 9:18 PM -1000 7/25/00, Reese wrote:
At 11:19 PM 25/07/00 -0700, Tim May wrote:
Get a clue.
You do know, don't you, Reeza, that neither "irony" nor "gullible"
are in any English dictionary?
And that subject line? What, am I supposed to provide a link from m-w.com
now? Get a life.
At 8:08 PM -1000 7/25/00, Reese wrote:
At 12:15 AM 25/07/00 -0700, Tim May wrote:
In my view, what I heard did far more bad than good. Witnesses were
babbling about the need to see what the Carnivore system did, so that
the rights of the unpersecuted whom the warrants did not apply to
could be
Jim Choate writes "...Fourier Analysis..." for ressurecting wiped
data.
This is interesting but a question arises: How do you interrogate the
data? That is: what INT's (pc interrupts) do you use to look at
the data? Actually, maybe I should say the sectors rather than the data. Are
these
Disk INsecurity:last word on deletes, wipes The Final Solution.
My fellow Cypherpunks,
On the matter of getting rid of dangerous info on your hard disk,
here is a very interesting quote from The GIANT BLACK BOOK of
COMPUTER VIRUSES, second edition by Dr. Mark Ludwig
American Eagle