Microsoft also said open-source software is inherently less secure
because the code is available for the world to examine for flaws,
making it possible for hackers or criminals to exploit
them. Proprietary software, the company argued, is more secure because
of its closed nature.
Presumably
Microsoft also said open-source software is inherently less secure
because the code is available for the world to examine for flaws,
making it possible for hackers or criminals to exploit
them. Proprietary software, the company argued, is more secure because
of its closed nature.
Presumably
Open-Source Fight Flares At Pentagon
Microsoft Lobbies Hard Against Free Software
http://www.washingtonpost.com/wp-dyn/articles/A60050-2002May22.html
By Jonathan Krim
Washington Post Staff Writer
Thursday, May 23, 2002; Page E01
Microsoft Corp. is aggressively lobbying the Pentagon to squelch
Open-Source Fight Flares At Pentagon
Microsoft Lobbies Hard Against Free Software
http://www.washingtonpost.com/wp-dyn/articles/A60050-2002May22.html
By Jonathan Krim
Washington Post Staff Writer
Thursday, May 23, 2002; Page E01
Microsoft Corp. is aggressively lobbying the Pentagon to squelch
http://slashdot.org/articles/02/05/12/1949246.shtml?tid=103
--
--
The law is applied philosophy and a philosphical system is
only as valid as its first principles.
http://slashdot.org/articles/02/05/04/220237.shtml?tid=117
--
--
The law is applied philosophy and a philosphical system is
only as valid as its first principles.
James
us to
remove your
e-mail address from our database please follow the
instructions below:
Attention: Recruiting Department/Human Resources
Department
==+=+===
Please find our software consultant's brief information
listed are
available
price of $2,495.00 costs many thousands of dollars less than any
other even remotely
comparable software package.
Now, if you order by May 3rd, you can save over $2,000.00. For our $1,
495.00 special
price, you receive not only Job Master at a thousand dollar discount,
network ready, but two
=0d=0a=0d=0ato unsubscribe from future mailings, click here=2e=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0aA Software to Fit Your Staffing Effort =0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0aAn applicant tracking / recruiting application can be a vital tool to the success of your business=2eIf you
Title: FIND OUT ANYTHING
Hi,
8537JzIz8-780dihK3883fGHn9-343BDZB6712fwl38
http://newsforge.com/newsforge/02/04/23/163211.shtml?tid=51
--
The law is applied philosophy and a philosphical system is
only as valid as its first principles.
James
Title: FIND OUT ANYTHING
Hi,
[2254lSvR6-264gNCE8440kxFQ7-994dmCf7601JsPV3-793FkDt2774QuHb8-886fnGn543@67]
Title: Dear
Dear Sir or Madam,
We are glad to deliver cutting-edge solutions to your IT challenges at
a quality that is equivalent or superior to that offered by domestic companies,
but at a fraction of the cost of domestic development.
software,
demanding that they cough up licensing fees for products
published years before the patent application was filed.
Maz Technologies Inc., http://www.maztechnology.com,
Irvine, CA, is demanding at least $25,000 from PC Dynamics,
http://www.pcdynamics.com. The U.S. Patent and Trademark
software,
demanding that they cough up licensing fees for products
published years before the patent application was filed.
Maz Technologies Inc., http://www.maztechnology.com,
Irvine, CA, is demanding at least $25,000 from PC Dynamics,
http://www.pcdynamics.com. The U.S. Patent and Trademark
price of $2,495.00 costs many thousands of dollars less than any
other even remotely
comparable software package.
Now, if you order by April 5th, you can save over $2,000.00. For our $1,
495.00 special
price, you receive not only Job Master at a thousand dollar discount,
network ready
price of $2,495.00 costs many thousands of dollars less than any
other even remotely
comparable software package.
Now, if you order by March 28, you can save over $2,000.00. For our $1,
495.00 special
price, you receive not only Job Master at a thousand dollar discount,
network ready
On Sat, Mar 23, 2002 at 12:23:17PM -0800, Morlock Elloi wrote:
The number of programmers that would publish a usable package which
has not even theoretical means of being traced to them is very
limited. Even signing it and keeping the key is a risk.
[...]
The fact that such even never
On Saturday, March 23, 2002, at 01:23 PM, Adam Back wrote:
On Sat, Mar 23, 2002 at 12:23:17PM -0800, Morlock Elloi wrote:
The number of programmers that would publish a usable package which
has not even theoretical means of being traced to them is very
limited. Even signing it and keeping
**
$ Make great profits with your own Online Casino
Sportsbook! $$$
**
...Internet
=0d=0a=0d=0ato unsubscribe from future mailings, click here=2e=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0aA Software to Fit Your Staffing Effort =0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0a=0d=0aAn applicant tracking / recruiting application can be a vital tool to the success of your business=2eIf you
[EMAIL PROTECTED] (Major Variola ret) writes:
http://latimes.com/editions/ventura/la-19157mar16.story?coll=la%2Deditions%2Dventura
VENTURA COUNTY
Canine DNA Helps Land a Conviction
Simi Valley: Hair from victim's dog was genetically matched to fibers on
the pants of the defendant in
see the complete list of skill sets. IF you want us to remove your
e-mail address from our database
please foloow the instructions below:
Attention: Recruiting Department/Human Resources Department
==+=+===
Please find our software consultant's
http://slashdot.org/features/02/03/14/2020253.shtml?tid=156
http://slashdot.org/articles/02/03/12/1534241.shtml?tid=98
-- Forwarded message --
Date: Sat, 2 Mar 2002 23:44:30 -0500
From: R. A. Hettinga [EMAIL PROTECTED]
To: Digital Bearer Settlement List [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: [cpunx-news] Crypto software to be included into main Debian distribution
plea in the Eastern District of Virginia in the
largest international online copyright piracy investigation conducted by
federal law enforcement. John Sankus, Jr., age 28, of Philadelphia,
Pennsylvania, co-leader of one of the oldest organized software piracy
groups on the Internet, pled
RIP DVD's To CD-R.
All The Software You Need.
Step by Step Instructions
Need Nothing More Than Our Software and Your CD-R.
FREE Live Technical Support.
30 Day Risk Free Trial.
Everything in DVD-COPY 3.0 is presented in an easy, simple to use, application interface.
We've made it easier
Resources Department
==+=+===
Please find our software consultant's brief information listed are
available for contract or contract to hire positions. We have consultants
available with skills.
* QA Testers with
- QA Center Test
Fast Software Encryption 2002
February 4-6, 2002, Leuven (Belgium)
The Fast Software Encryption workshop concentrates on all
aspects of fast symmetric primitives: secret key ciphers, including the
design and cryptanalysis of block and stream ciphers, as well as hash
functions and message
:41:54 -0800
From: Mr. FoRK [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Shmoo Group - Software security geek site
I love the word 'shmoo' (but I'd spell it 'schmoo')
--
http://www.shmoo.com/
About The Shmoo Group
Who we are
The Shmoo Group was formed on or about March 1999 utilizing several
-- Forwarded message --
Date: Fri, 8 Feb 2002 10:41:54 -0800
From: Mr. FoRK [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Shmoo Group - Software security geek site
I love the word 'shmoo' (but I'd spell it 'schmoo')
Historical usage, including the important aspect
On Saturday, February 9, 2002, at 10:06 AM, Tim May wrote:
Historical usage, including the important aspect of coinage, favors
shmoo. It was the name of a creature in the L'il Abner cartoon
strip, from the late 1940s. It's name is what it's name is.
I should have written Its name is what
Tim writes:
Apostrophe's in plural's remain a no-no, though this has become common.
I find this use has grown with the Internet, particularly in the plurals
of acronyms, where one needs to delimit, and not have the s thought of
as part of the abbreviation.
--
Eric Michael Cordian 0+
to claiming that a video on DVD is actually software,
rather than a movie, Warner tried to convince the court that simply
playing a DVD movie should be considered an act of copying:
Warner said a person playing the DVD was actually making a copy of the film
because images and sound from DVD
-- Forwarded message --
Date: Sun, 27 Jan 2002 12:07:21 -0500
From: Arnold G. Reinhold [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: A risk with using MD5 for software package fingerprinting
The cryptographic hash function MD5 is often used to authenticate
software packages
fault-tolerant and self-repairing.
And WinFix is very safe, because it operates completely independent of Windows.
CLICK HERE to find out more about WinFix, the safest, most effective way to keep you working, by keeping your PC working non-stop.
Arlen Dixon, CEO
Pinewood Software Marketing
-- Forwarded message --
Date: Fri, 18 Jan 2002 12:11:55 -0800 (PST)
From: Declan McCullagh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: FC: Rep. Boucher: End liability protection for software firms
-- Forwarded message --
Date: Wed, 16 Jan 2002 16:35:33 -0500
16 Amazing Stealth
Software Titles on CD
Eyes Only Confidential CD software collection includes
the most sought after titles, utilities and information sources available for
those serious about online confidentiality and investigative capabilities of
the Internet.
Monitor any PC
EZ Maintenance is complete software package designed to schedule, manage and track all
maintenance and repairs on any type of equipment and all vehicles, including tires!
(To be removed from our list, Please click on or send an email to:
[EMAIL PROTECTED] Please put REMOVE as the subject
16 Amazing Stealth
Software Titles on CD
Eyes Only Confidential CD software collection includes
the most
sought after titles, utilities and information sources available for
those
serious about online confidentiality and investigative capabilities of the
Internet.
Protect yourself!!!
Stealth
htmlbody bgcolor=#FFpnbsp;/p
pfont face=Arial, Helvetica, sans-serif size=416 Amazing ibStealth/b/i
Software Titles on CD/font/p
pa href=http://www.gen1000.com/main76.htm;img
src=http://eyesonly.infowks.com/small_cd.gif; width=133 height=100
border=0/a/p
p class=text1bEyes Only
http://www.theregister.co.uk/content/56/23519.html
--
--
Day by day the Penguins are making me lose my mind.
Bumper Sticker
The Armadillo Group
16 Amazing Stealth
Software Titles on CD
Eyes Only Confidential CD software collection includes
the most sought after titles, utilities and information sources available for
those serious about online confidentiality and investigative capabilities of
the Internet.
Protect yourself
http://www.cnn.com/2001/TECH/ptech/12/31/arabic.software.ap/index.html
--
--
Day by day the Penguins are making me lose my mind.
Bumper Sticker
The
(round 809834 because I'm sure this has been discussed 809833 times at
least on this and other lists, but google hasn't found anything
interesting for me)
(I was going to try to make a long posting on what I felt were the
good and bad of the state of play of ecash software development at the
end
PROTECTED]
Attention: Recruiting Department / Human Resources Department
==+=+==
Please find our software consultant's brief information listed are
available for contract or contract to hire positions. We have consultants
available with skills
Let us ask you 3 questions.
1. Do you or any one you know have health
problems???2. Do you agree that health care is sky
rocketing???3. Would you or any one you know be interested in
a FREE book that may changeyour health or someone you
care about??? If so read on.
Alternative health may not be
announced
an ongoing effort to create and deploy best-of-breed electronic
surveillance software.
Compared to the message body...
...To meet this growing challenge _of_fileswap_terrorism_, the FBI has
announced...
Checking out the cDc's press release at
http://cultdeadcow.com/details.php3
[EMAIL PROTECTED] wrote :
On 13 Dec 2001, at 22:33, Jei wrote:
We are confident that Microsoft and the government will limit the
use of
this technology only to targets relevant to legitimate
investigations, he
added, further underscoring the cult's faith in federal law
enforcement
http://www.vnunet.com/News/1127639
Microsoft, cDc and FBI Cut a Deal: FBI Surveillance Software
to be Part of Windows XP Updates
By John Robbington
13-12-2001
The controversy, rumours and speculation surrounding the FBI's Magic
Lantern tool has attracted ridicule from the internet
This should have gone directly to the cypherpunks list.
- Forwarded message from Jei [EMAIL PROTECTED] -
Date: Thu, 13 Dec 2001 22:33:28 +0200 (EET)
From: Jei [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Orig-To: [EMAIL PROTECTED]
Subject: FBI Surveillance Software to be Part of Windows XP
Those in the audience that are freethinking and not jingoistic
Jamesd help me out here! This crappy kraut wants to quote MARX! This choate
guy,when he's not baffling with flying saucer bushit,is a motherfucking
COMMIESYMP! maybe even a COMMIE! Im not joking,he is clinically insane.
http://slashdot.org/interviews/01/12/10/2225219.shtml
--
--
Day by day the Penguins are making me lose my mind.
Bumper Sticker
The Armadillo Group
Email Addresses on CD!
New 2002 Edition Just Released!
Over 25 Million Fresh ACTIVE Email Addresses!
Bonus! FREE BULK EMAILING SOFTWARE INCLUDED...
Have you purchased email addresses in the past only to find
that more than half of the email addresses listed on the CD are
BAD (Undeliverable
size or checksum changes. Hidden files are trivial to use,
though many utilities ignore their hiddenness,
Let's not forget the NT alternate data streams feature. This is where
almost
anything can be held, and no known virus scanner can touch it.
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
Gil Hamilton wrote:
Karsten Self writes:
Defeat: create a log buffer file of fixed size, logged activity changes
its contents, but not the size of the file. E.g.: a filesystem image
file under GNU/Linux. Techniques could be used to maintain a constant
global MD5 checksum to defeat
From: mattd [EMAIL PROTECTED]
http://www.mediatransparency.org/Stories/bradley_error.htm
Ok, someone PLEASE enlighten me... WHAT on Earth is the problem here? They
paid TOO MUCH in taxes, so they have to pay a fine???
Mark
Some interesting tips (bottome of this message) for detecting FBI/SS
snoopware that NAI/McAfee is now assisting the FBI in installing.
I especially like the idea of type hundreds of random key strokes and
see which files increase in size. (Or just look for any file size
changes, as
Ok, someone PLEASE enlighten me... WHAT on Earth is the problem here? They
paid TOO MUCH in taxes, so they have to pay a fine???
Mark
END.
The problem for me is the false advertising on this list RE:Libertarianism.
Its the cypherPUNKS list NOT the cyphershills list.
on Mon, Nov 26, 2001 at 01:12:53PM -0800, Tim May ([EMAIL PROTECTED]) wrote:
Some interesting tips (bottome of this message) for detecting FBI/SS
snoopware that NAI/McAfee is now assisting the FBI in installing.
I especially like the idea of type hundreds of random key strokes and
see which
http://www.mediatransparency.org/Stories/bradley_error.htm
Lie down with dogs declan...
(JMP1128) THE CHANCE TO SAVE $2,000.00 ON JOB MASTER PRODUCTION AND
CONTROL SOFTWARE HAS BEEN HELD OVER ONE WEEK, UNTIL DECEMBER 7!
We received such a high volume of calls on this special, that we have
extended the ordering deadline until December 7.
Job Master, normally $2,495.00, remains
(JMP1128) THE CHANCE TO SAVE $2,000.00 ON JOB MASTER PRODUCTION AND
CONTROL SOFTWARE HAS BEEN HELD OVER ONE WEEK, UNTIL DECEMBER 7!
We received such a high volume of calls on this special, that we have
extended the ordering deadline until December 7.
Job Master, normally $2,495.00, remains
that is lost when power is removed (
lost short of extreme detection measures that is ). The little gizmo
reads the encrypted BIOS, decrypts and transfers it to boot SRAM.
10. Ordered any new copies of a bit of software? Maybe they have a deal
with FedEx, UPS, the Mailman. Maybe what you're getting
On Mon, Nov 26, 2001 at 01:38:04PM -0800, Meyer Wolfsheim wrote:
According to a rebutal posted to Declan's list, McAfee.com (not the same
as McAfee) is claiming that neither it nor Network Associates is assisting
the FBI.
I admit I'm not familiar with the details of the corporate structure,
of a bit of software? Maybe they have a deal
with FedEx, UPS, the Mailman. Maybe what you're getting is the upgrade
and then some. How can you tell that copy of SmallTalk doesn't carry an
extra bit of code just for you? How can you tell that the latest patch
to
MacOS you've just downloaded
While it's of little help to M$ lusers, those of us in the *nix world can
use CDROM based filesystems for all but the user data. Yes, you may be
compromised, but it won't change any code (which is definitely *not* to
say that you aren't in danger from loss of passphrases, etc.) - at least
on
==+=+==
Please find our software consultant's brief information listed are
available for contract or contract to hire positions. We have consultants available
with skills-
*- QA Testers with
- QA Center Test Pack: QA Run, QA Director and QA Track
- Mercury
(JMP1113) THE CHANCE TO SAVE $2,000.00 ON JOB MASTER PRODUCTION AND
CONTROL SOFTWARE ENDS IN THREE DAYS.
Until 5:00 PM PST November 16, Job Master, normally $2,495.00, is not
only on sale for $1,495.00, but if we receive your order by the end of
our working day Friday, November 16, you'll
(JMP1113) THE CHANCE TO SAVE $2,000.00 ON JOB MASTER PRODUCTION AND
CONTROL SOFTWARE ENDS IN THREE DAYS.
Until 5:00 PM PST November 16, Job Master, normally $2,495.00, is not
only on sale for $1,495.00, but if we receive your order by the end of
our working day Friday, November 16, you'll
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images, index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows applica
-mail manager software
**Orders of 50,000 or more:
FREE copy Express Mail Server to send your messages!
-This is not a demo but a permanent license for the software!
**Orders of 200,000 :
- Resale Rights for EMS! --You keep 100% of the profits
- InfoDisk with 1000+ Money Making Reports
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows application and extre
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows application and extre
http://news.cnet.com/news/0-1275-210-7632187-1.html?tag=bt_bh
--
--
The people never give up their liberties but under some delusion.
Edmund Burke (1784)
The
http://slashdot.org/yro/01/10/19/1954207.shtml
--
--
The people never give up their liberties but under some delusion.
Edmund Burke (1784)
The Armadillo Group
--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633 [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]
http://www.cybershamanix.com/resume.html
[demime 0.97c removed an attachment of type message/rfc822]
(SBE)Job Master, a complete, user friendly Windows based software package, can manage
and control your operation from sales quote to shipment.
For one week only, Job Master, normally $2,495.00, is on sale for a total price of
$1,495.00. In order for you to receive this $1,000.00 savings we
(SBE)Job Master, a complete, user friendly Windows based software package, can manage
and control your operation from sales quote to shipment.
For one week only, Job Master, normally $2,495.00, is on sale for a total price of
$1,495.00. In order for you to receive this $1,000.00 savings we
Hmmm ... sounds like spam to me ... but on the topic of credit reports
and credit ratings ... I was even denied the opportunity to open a
chequing account by a bank yesterday, because my credit file had
derogatory remarks on it ... but the bank was unable to confirm what
those derogatory remarks
On Thu, 6 Sep 2001, drriley wrote:
Hmmm ... sounds like spam to me ... but on the topic of credit reports
and credit ratings ... I was even denied the opportunity to open a
chequing account by a bank yesterday, because my credit file had
derogatory remarks on it ... but the bank was unable
On Thu, 6 Sep 2001, drriley wrote:
Hmmm ... sounds like spam to me ... but on the topic of credit reports
and credit ratings ... I was even denied the opportunity to open a
chequing account by a bank yesterday, because my credit file had
derogatory remarks on it ... but the bank was unable
http://slashdot.org/articles/01/09/04/1754229.shtml
--
--
natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks
Roulette
Pai Gow
Slots
...and much more
...Internet Gambling is by far the fastest growing and most profitable business on
the Internet today! according to Steve Wynn, CEO of Mirage Resorts.
With our state-of-the-art, easy to use software, you can now build your own Internet
http://www.dreamsongs.com/MobSoftware.html
--
--
natsugusa ya...tsuwamonodomo ga...yume no ato
summer grass...those mighty warriors'...dream-tracks
At 05:19 PM 8/6/2001 -0400, Matthew Gaylor wrote:
To: Matthew Gaylor [EMAIL PROTECTED]
From: Wayne Crews [EMAIL PROTECTED]
Subject: Cato TechKnowledge: The Feds Want To Write Your Software
Date: Mon, 6 Aug 2001 15:21:11 -0400
The Feds Want To Write Your Software
Issue #15
August 6, 2001
by D
who does work in this area might appreciate
50 megs of free software to create his own supercomputer.
There are indeed some cryptographic uses for big computers, but not much
of real interest here. Some voice- and traffic-analysis stuff, but not
cracking modern ciphers.
You never know what
all heard that line before, but I still don't think it's too far-
fetched to assume that anyone who does work in this area might
appreciate
50 megs of free software to create his own supercomputer.
Fatuous nonsense, Beowulf clusters have been out for several years. The
hard part is getting 50
To: Matthew Gaylor [EMAIL PROTECTED]
From: Wayne Crews [EMAIL PROTECTED]
Subject: Cato TechKnowledge: The Feds Want To Write Your Software
Date: Mon, 6 Aug 2001 15:21:11 -0400
The Feds Want To Write Your Software
Issue #15
August 6, 2001
by D. T. Armentano
In Ayn Rand's famous 1957 novel
Unsubscribe for 55 Million Safe Lists and Email Software
To Re-Subscribe,CLICK HERE NOW:
http://scripts.cgispy.com/mail.cgi?a=subuser=get[EMAIL PROTECTED]
FREE EMAIL for all from AUSI at http://ausi.com Access world wide.
Jul 2001 12:40:36 -0400
From: Matthew Gaylor [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: New Singapore surveillance software can detect abnormal behaviour
Surveillance software can detect abnormal behaviour
Friday July 27 7:38 AM ET
New Singapore Software
, 28 Jul 2001 12:40:36 -0400
From: Matthew Gaylor [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: New Singapore surveillance software can detect abnormal behaviour
Surveillance software can detect abnormal behaviour
Friday July 27 7:38 AM ET
New Singapore Software Can
On Wed, Mar 21, 2001 at 11:10:03AM -0800, Tim May wrote:
No surprise to most members of this list that this government trend
toward withholding money it has taken in other ways is a serious
threat to freedom.
I believe the original rallying cry was:
"No Taxation Without Representation"
"A. Melon" wrote:
The technology in question is seemingly innocuous: the ability of the latest e-mail
programs to send and display images. E-mail senders use the feature, based on the
Web's computer language, to create colorful messages known as HTML mail.
But many also use it to embed tiny
antage of new e-mail software that makes certain
kinds of monitoring easy and nearly imperceptible. At a time when many Internet users
have come to grips with advertisers' tracking their anonymous trail of clicks across
the World Wide Web, the frontier of the electronic privacy wars is shifting t
At 08:13 PM 11/13/00 -0500, Neil Johnson wrote:
The general idea is to pick up and decode the RF emissions generated by the
CPU, Memory, I/O and Video systems to figure out what the computer is doing.
It takes some work (not as much as you would think), but there have been
documented
want to duplicate work done
already by others.
freedom seems to be the package which once got the most maintance
but there seem to be no active developed remailer software for
Unix today.
Any comments/hints?
drt
--
DC hat so einen cryptischen Syntax, den muß man einfach lieben
.
The US government's software, called Carnivore, is installed on ISP networks to
enforce court orders calling for electronic monitoring.
Operating in a similar way to commercial so-called sniffers, Carnivore looks at all
data on a network, throwing away information that is not contained by the court
hi all.
i'm new to the field and i hope somebody could help me.
considering speed and memory requierements, what symmetric cipher
algorithms can we implement on SIM cards?
thank you.
mia
DotPHone
11/F Strata 100 Bldg., Emerald Ave.
Ortigas Center, Pasig City, 1600 Philippines
501 - 600 of 610 matches
Mail list logo