> Nice! Get them to cut _all_ your fingers off instead of just one.
> Just say no to amputationware.
Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.
...of course
> Gabe Neville, a spokesman for Rep. Joseph Pitts, (R-Penn.), co-chairman of
> the House Electronic Warfare Working Group, said news of the Phrack story
> about jamming indicates that GPS jamming technology is "easily available"
> and that the Pentagon needs to beef up its electronic warfare resear
On Thu, 16 Jan 2003, Peter Fairbrother wrote:
> Would the spam business _want_ email addresses from people who download
> ripped games/ movies?
>
> Or would eg RIAA be more motivated?
Good idea. However, RIAA would probably just collect IP addresses and then
go after ISPs for the users' identities
> I just got this spam, and I was wondering if it was a honey-pot. Anyone? The
> site exists, and advertises games and movies for download.
Classical porn and warez scam. The site itself is an attempt to extract
your email out of you for the purpose of spamming you. Offers you a set of
nicely look
> Does anyone have a pointer to software that will create messages
> like this? Could be a great opportunity for stego - just replace the
> # characters with random ones. Then let there be an option to either
> use a crypto RNG for the random char choice, or to load in a stealthed
> version of a
> It doesn't matter what you wear. Even if everybody would be wearing a
> flowing robe and a face mask (fat chance; right now donning this would
> invite for some deep anal probing),
Not over some critical mass. Also could pit the media against the police,
if the rate of such incidents against no
> May be the worlds air getting polluted isn't so
> bad-atleast we could put anti-pollution masks and
> protect our identity :)
In Japan, people are already wearing face masks frequently, ie. during the
flu season. If such cultural sh9ft happens here as well, we have partial
protection against t
> Isn't the obvious way to handle this to include an undeveloped
> (latent image) photograph of some obscure object, person, or place on
> the film rather than just a blank film ? ? You could then develop it
> and check for light damage and evidence of lack of authenticity. I
> suspect th
> I have a related question. I have a little server sitting in a wall
> closet. Does anyone have an easy solution (preferably low tech) for
> figuring out that the closet door has been opened?
A switch that shutdowns the server, and a passphrase on the startup.
Remote logging of the power-ups, usi
> Also, in the US, the police can request a "mail cover"
> (which means recording who all your snail mail is from)
> with much less legal formality than a search warrant,
> and if they get a warrant to open all your incoming mail,
> I don't think they're required to notify you.
Is there a way to R
> I was curious what the status of the SMS encryption project quoted in the below post
>is?
> I did some googling and saw almost nothing on the subject.
Newer GSM phones have java engines, used for ie. downloadable games.
Shouldn't it be possible to write a SMS encryption/decryption software in
J
http://www.speakfreely.org/ is a nice, open-source cross-platfor VoIP
software. Supports encryption by DES, Blowfish, and IDEA.
Had anyone knowledgeable ever looked at its code? How secure this
implementation is? Is better to use Blowfish or IDEA? Where are the
potential holes there?
201 - 212 of 212 matches
Mail list logo