Minister Charles Simpson has the power to make you a LEGALLY ORDAINED MINISTER within
48 hours 1st22
BE ORDAINED NOW!
As a minister, you will be authorized to perform the rites and ceremonies of the
church!!
WEDDINGS
MARRY your BROTHER, SISTER, or your BEST FRIEND!!
Don't
Eliminate your credit card debt without filing bankruptcy!
Are you tired of making minimum payments and barely getting by?
Are you drowning in debt?
Are you ready for a change and some freedom?
What will buying this package do for me?
*It will terminate your credit card debt!
Fire effects MILLIONS of Americans each year.
Is YOUR family protected??
Since 1971, we have been distributing
only HIGH quality residential fire
products.
We treat each customer's safety as
our own!
Our 10 inch thick Lifesaving Testimonial
Book shows satisfied customer after
[I wonder if our more unpopular Federal agencies house their mainframes in facilities
that are shielded from this sort of attack]
Simple RF Weapon Can Fry PC Circuits
Ê
Scientists show device that could make the electromagnetic spectrum the terrorist
weapon of choice.
Reggie Beehner, Medill
We are updating our mailing list. If you do not want to remain on it, DO NOTHING
or Send a blank email to [EMAIL PROTECTED] You will automatically be deleted
and never mailed again. Thank You!
If you wish to remain on the list, please reply to [EMAIL PROTECTED]
As a way of saying thank
Title: BlackOffers.com - Newsletters for the African American
Subscribe to our free newsletters and get the latest information you need to know!
BlackOffers.com exclusive newsletters targets African Americans online looking for the latest information relating to the black
FoxNewChannel's Hannity Colmes will have Janet Reno on tonight.
(Repeated throughout the night)
Subject:
Judge Martha Vazquez summons, jury
DEMAND, and final complaint
Date:
Wed, 02 May 2001 13:03:07 -0600
From:
[EMAIL PROTECTED]
To:
[EMAIL PROTECTED]
CC:
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
From: Lars Aronsson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [BAWUG] RFC1149 implemented
List-Help: mailto:[EMAIL PROTECTED]?subject=help
BAWUG,
Some people in Bergen, Norway are betting on a different wireless
future and have made the first known implementation of the CPIP
FREE LOAN INFO
APR, Fixed rate, points, discount rates, application fees...Sound familiar?
It does if you are searching for a mortgage, refinancing, debt consolidation, etc. . Stop trying to figure it all out, they make
it confusing for a reason! Let us do all the work for you. We will search an
At 10:35 PM 4/30/01 -0400, Rich Salz wrote:
NTT and Mitsubishi will be granting royalty free licenses for strict
implementations of Camilla (128bit block cipher),
The best part about Camilla is that it demonstrates that the Japs have
a sense of humor, about the british, at least.
At 10:32 PM 4/28/01 -0700, Steve Schear wrote:
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress.
Tim May [EMAIL PROTECTED] wrote:
A profound new insight.
We still await some real insights from a real graduate student (!),
beyond her saying that we don't know as much as she says she knows.
BTW, I have removed the additional addresses (David Honig
[EMAIL PROTECTED], Declan@Well. Com [EMAIL
Hi,
Make Money Under One Straight Line Plan!!!
FREE To Join And Benefit!
This program are People Helping People Build A Reliable
Residual Income
Through Teamwork, We Will All See Our
Dreams Come True!
No RECRUITING!
No SELLING!
No PRODUCTS!
No SCAMS!
AND THE BEST PART... IT'S FREE!
We
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked
there is no requirement for maintaining log files (unless specifically
directed otherwise.) log files contain either marketing value or sysadmin
value -- in both cases specific ip addr info isn't necessary to maintain
that value (except in case of anomalous activity). one could collect info
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so,
[Note from Matthew Gaylor: Here is a prime example of the Republican
vision of doing more with less FY 2002 budget includes $1.057
billion in program increases. That's a billion more than Janet Reno
spent. What total and complete government reduction frauds the
Republicans are. Also note
On Sun, 29 Apr 2001, Declan McCullagh wrote:
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to have
log files that are available to you but not an adversary using legal process.
-Declan
If you
Will someone at lne.com finally decide that he qualifies as spam and start
filtering? That simple act would improve the signal to noise ratio dramatically.
Internet is a self-service establishment.
Full-service has too much undesirable luggage attached to it.
I haven't seen choatian posts
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But
there are some cases, albeit a fairly narrow subset, in which you'd
want to have log files that are available to you but not an
adversary using legal process.
-Declan
Which
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to have
log files that are available to you but not an adversary using legal process.
-Declan
At 01:15 AM 4/29/01 -0400, Phillip H. Zakas wrote:
there
I think Matt is a bit too quick to conclude a court will charge the
operator with contempt and that the contempt charge will stick on appeal.
Obviously judges have a lot of discretion, but it doesn't seem to me like
the question is such a clear one if a system is set up in the proper
At 01:04 PM 4/29/2001 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to
have log files that are available to you but not an
GET YOUR FREE GIFT WHEN
VISITING OUR WEB SITE!
Are you being paid what you are worth?
We are living in the most prosperous time in
history. Now is your turn to profit. Learn to
earn 6 Figures from home. It is easier than ever!
Plus, receive your FREE GIFT & FREE Info when
visiting our web
From Eurocrypt:
Abstract. We consider the question of protecting the privacy of
customers buying digital goods. More specifically, our goal is
to allow a buyer to purchase digital goods from a vendor without
letting the vendor learn what, and to the extent possible
In view of the recent gimme-the-logs-or-we-fuck-you activities
of armed men
(http://www.indymedia.org/front.php3?article_id=36912group=webcast ,
http://seattle.indymedia.org/display.php3?article_id=3013 )
what would be the legal consequence of the following:
1. A virus is designed that spreads
http://dailynews.yahoo.com/h/ap/20010427/ts/court_handgun_liability.html
Friday April 27 10:29 AM ET
Gun Ruling To Have National
Impact
By JOEL STASHENKO, Associated Press Writer
ALBANY, N.Y. (AP) - A ruling by the state's top
court that
Several months ago, I made a conscious decision not to
delete what I figured was just another junk e-mail.
That decision has changed my life. Here you have the
very same opportunity in front of you. If you take
just five minutes to read through the following
program you wont regret it. See
http://www.wired.com/news/politics/0,1283,43232,00.html
Pot Backers Call for Reeferendum
By Declan McCullagh ([EMAIL PROTECTED])
2:30 p.m. Apr. 23, 2001 PDT
WASHINGTON -- Hundreds of drug war critics gathered here this weekend
to share political tips, marijuana
Ken Brown [EMAIL PROTECTED] wrote:
You need phone numbers to buy train tickets?
For most trains around here at least, the answer is no. You get on
the train, and the conductor sells you a ticket to where you're going
for cash. Or you can pay at the ticket office at the station
beforehand, if
On Thu, 19 Apr 2001, James A. Donald wrote:
Detweiler repeatedly attempted that hack in several different newsgroups
and mailing lists, and repeatedly failed. Everyone would come to the
conclusion that he was a loon, and that anyone who agreed with him was
either a tentacle or a fellow loon.
those pussies should have used pipe bombs, thats where it's at!
-
-
Shaun Ollivierre
Dream Developments/EHI
[EMAIL PROTECTED]
www.enphourell.com
On Fri, 20 Apr 2001, Trei, Peter wrote:
It would be cruel to use live animals.
Maybe they should use stuffed shirts.
Peter
--
The Privacy President?
By WILLIAM SAFIRE
WASHINGTON Ñ In an action that left medical data-swappers sputtering with rage and the
well-heeled intrusion lobby moaning about its "operational nightmare," President Bush
struck a blow last week for the privacy of medical patients' records.
Few
Although ChoicePoint says it has records
on nearly every American with a credit card,
it doesnt always provide access to that data.
The companys Autotrack service is popular
with many
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
LUG-Fest (Linux User's Group Festival) an expo style
event for Linux users in the bay area is going to
hold a large keysigning party. If any cypherpunks
are interested in attending here is the relevant
information:
LUG Fest April 21-22, 2001 at
Certainly. Head down to the local hardware store and buy
yourself a very large axe.
Now find something you want to hack, lift the axe over your
head, and bring it down edge first. You may need to hack
three or four times before you break all the way through.
It's easy once you get the
Also, today's NYT has an article about national security
needs for more language experts.
http://interactive.wsj.com/articles/SB987356381635082061.htm
#
#April 16, 2001
#
#Asian Technology
#
#Two New Peer-to-Peer Programs Aim High, but Still Have Glitches
#
#
Four articles are excerpted below:
Wired News on government's motion to seal public court records
Sierra Times: "IRS Prosecutes Outspoken Dissident"
About.com: "Jim Bell's show trial"
Cluebot.com on how government surveillance killed the cypherpunks list
-Declan
***
NATIONAL INSTITUTE OF JUSTICE (NIJ)
Biometrics Catalog Online
NIJ has teamed with the U.S. Department of Defense's Counterdrug
Technology Development Program Office to launch the online Biometrics
Catalog. Biometrics consist of automated methods for recognizing a
person based on
Peter,
Thanks for the tip on that. I'll be looking out for it, although at
that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as
you point out.
Linux PDAs with good sound chips are just around the corner,
apparently, and it seems that it shouldn't be too big a feat to get
It's very simple.
Go to a military surplus store or your local Wall-Mart and buy a machete. If
you buy a surplus one, you may want to sharpen it and polish the rusty blade,
although this step is not essential because one may hack quite noisily and
dramatically with a rusty dull machete.
Go out
Here it is
http://www.L-3Com.com/cs-east/programs/infosec/privatel.htm
3DES, 1024 bit D-H, TEMPEST compliant. Handles both voice
and data.
--
From: Trei, Peter
Reply To: Trei, Peter
Sent: Monday, April 16, 2001 1:35 PM
To: Dr. Evil; 'Declan McCullagh'
Does anyone know if Starium is ever going to release anything? I
noticed on their News section that they have engaged an MA
specialist. That's probably not a good sign for them operating as a
stand-alone company. email to them bounces.
Something I've never bought before - "Globe" 4/17/2001 - has
compromising photos of John Walsh and another babe.
"Caught! America's most perverted host"
He's been married 29 years, but apparently his new fame (Wanted)
has led him to keep mistresses and take pictures of them when
he gets
Hello,
I was just recently introduced to this company but within 2 weeks I was cashing my
first check for over 1000 dollars! And two weeks later I received a check for even
more. Folks this company is blowing up right now! Remember Microsoft, and
Amazon.com Givin the chance to get
"ATTENTION Therapy Center Operators."
Join FREE
--
Exercise Equipment for Physical Therapy, Rehabil-
itaion Centers. Save thousands of dollars on 'Gym'
quality exercise equipment. Get photo links, specif-
ications and
There's a good smtp forwarder at 127.0.0.1
At 02:36 AM 04/13/2001 -0500, Charles wrote:
hello cyberpunks,
I want to know if yo know a good free( or low cost) bulk email program to
send massive email or a good SMTP servers to can send many emails
without problems, what you recommend me? or if
Quoting Ray Dillinger [EMAIL PROTECTED]:
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become
a
Unindictedcoconspiritors? Tentaclenet? Targetzone? Shootmeplease?
-- DS
"Y'know, if the earth were flat, all the Chinese would fall off..."
-- Firesign Theatre
Found this. Its a model jury instruction re counterfeit access
devices. Interesting
thing is that mere 'design' supposedly counts (see near bottom).
[How do you show 'fraud' when all you have is a napkin with a design?]
Ninth Circuit Model Criminal Jury Instructions
How do we expect to even find them, when they're using mixmasters to
remain anonymous? Do you know what a mixmaster is? This is exactly the
problem.
from "Can hackers help stop child porn on the Net?"
I see now, this is why ICC is enlisting cypherpunks.
---
High Commissioner of the
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become a
convenient way for the Feds to land convictions.
Hmm. Anyone know what are some extant web-to-email remailers,
and what Type I remailers exist?
-Declan
On Wed, Apr 11, 2001 at 06:43:10PM -0700, Ray Dillinger wrote:
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its
You can be sure that Tanner has learned all about the "TannerWatch"
website, and is hardly amused by it.
A public figure, on the taxpayer's dime no less, who is 'hardly amused'
by a collection of freely-obtainable documents, some of which were
written by his misguided admirers, and some by more
On Tue, 3 Apr 2001, Declan McCullagh wrote:
Obviously there are going to be some points of agreement. Seth is a liberal
and a programmer who is going to like strong crypto, free speech (only the
types the ACLU approves of, naturally), and so on. But on cases involving
free trade,
I found out that Worldtravel had moved my flight to a Tuesday departure
that would get into the city that afternoon, *after* the proceedings had
begun. That could (understandably) piss off the judge -- I'd be violating a
This is my worst nightmare.
We are ruled by infantile idiots.
Oh, the
At 08:59 PM 4/2/01 -0700, Alan Olsen wrote:
On Mon, 2 Apr 2001, David Honig wrote:
but while working
for aol i remember companies trying to sell me on the concept of
'anti-porn'
pic filtering software. it worked by looking for a high percentage of
flesh
tones in a pic.
Yeah but all
ics.com
From: "Trei, Peter" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Orig-To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]
Subject: RSA Conference Expo Free Passes
Date: Tue, 3 Apr 2001 16:39:37 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain
Approved:
Declan writes:
It's important for cypherpunks to understand why Seth Finkelstein has
(apparently) recently subscribed to the list. Seth is essentially an
anti-cypherpunk, someone who violently disagrees with free-market points of
view and has spent (a conservative estimate) hundreds of
At 05:55 PM 4/2/01 -0400, Phillip H. Zakas wrote:
ya know this does sound like an april fools joke (esp. the part about
encouraging the photographer to enter into counseling.)
Particularly if you only ran across it Monday. Got Mr. Bear, too.
There are some cute RFCs dated 1.4.x too.
but
Title: Join Shopping Investing Clubs...
This is not Junk
Mail. See our Anti-Spam Alert below...
This is an invitation for you to review the newest concepts in both Shopping and Investing. Visit our web site at SpecialtyOnlineSales.com and review these concepts to see if they fit into your
In article [EMAIL PROTECTED],
Declan McCullagh [EMAIL PROTECTED] wrote:
Pretty Good Privacy that permits digital signatures to be forged in
some situations.
Phil Zimmermann, the PGP inventor who's now the director of the
OpenPGP Consortium, said on Wednesday that he and a
A "vulnerability" that requires the opponent to have write access
to your private key in order to exploit?
Okay. What was PGP's threat model again? I'd have sworn that this
was squarely outside it.
Probably. Do you need only write access? What does that do for smart
cards - if
"...As far as I can tell, *NOBODY* offers security tools that offer real
protection in the event your opponent has physical access to the
machine... Bear"
I completely agree. Even if they didn't have access to the machine, losing
the private key is a huge problem.
I should point out a
PROMOTIONS OF AMERICA
ENTERPRISES INC.
IMPACT ADVERTISEMENT AT ITS BEST
PROMOTIONS OF AMERICA ENTERPRISES INC. OFFERS AN EXCITING NEW WAY TO ADVERTISE YOUR PRODUCTS THROUGH THE INTERNET. EXCLUSIVE E-MAIL MARKETING DIRECT TO YOUR CONSUMER BASE. CHOOSE YOUR GEOGRAPHICAL
In article 99b89r$lgd$[EMAIL PROTECTED],
Ian Goldberg [EMAIL PROTECTED] wrote:
If p is wrong, the result S' will be correct mod q but incorrect mod p.
so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p.
Therefore GCD(S' ^ e mod n, M) = q, and we're done.
I think you meant GCD((S'^e mod
In article [EMAIL PROTECTED],
Declan McCullagh [EMAIL PROTECTED] wrote:
http://www.wired.com/news/politics/0,1283,42553,00.html
Your E-Hancock Can Be Forged
by Declan McCullagh ([EMAIL PROTECTED])
10:20 a.m. Mar. 21, 2001 PST
WASHINGTON -- A Czech information security firm
SWEET
SENSATIONS ! (tm)
The #1 BEST SELLING 100% ALL
NATURAL APHRODISIAC IN AMERICA! - HARDCOPY
EPISODE- "The Story you
have been waiting for that's making men and women go wild! Men and Women
who are taking this powerful little natural pill are loving what it's doing to
their libido!"
GOT INK? Free Bonus Ink Offer for your Inkjet Printer
*ATTENTION ALL COMPUTER USERS*
Tired of paying $20, $30, $40 or even $50 for inkjet cartridges?
Tired of your printer running out of ink AGAIN?
Tired of running from store to store looking for the right cartridge?
Tired of having to wait
Title: Untitled Document
For
The Serious Investor
News Flash: Important Press Release
THIS IS A STOCK TO PURCHASE!
March 20, 2001
Symbol
LIQD (OTCBB)
Shares Outstanding
9,000,000
!!! News Flash !!!
Online CASINO at http://www.desirescasino.com is giving away FREE $ 10 in Casino CHIPS
to every signup.
Signup here and explore your chance to win $100,000 !!!
CNDC Reporter Julia Rogers reported that this casino is backed by a huge investment
company and is extremely
SUBSCRIBE
Free, encrypted, secure Web-based email at www.hushmail.com
On Sat, 17 Mar 2001, Alan Olsen wrote:
Gnu Privacy Guard is an Open Source PGP replacement.
I have not examined interoperability with older versions of PGP though.
(I will be doing that soon though.)
The short version is this: GPG will work more-or-less transparently with
PGP 5.x and 6.x,
UniBlab ran up a $500 LD bill using my calling card.
The little darling.
http://www.securityfocus.com/news/172
#
#Spam war gags Gilmore
#
#Verio cuts off EFF co-founder John Gilmore over open mail server.
#By Kevin Poulsen March 15, 2001 5:19 PM PT
#
#
On Thu, 15 Mar 2001, cory ertle wrote:
I want to see if my girl is cheating on me by hacking into her e-mail
account at school. Now i know enough about here to bypass her pass pretty
easily but i however don't know the best way to go about getting to her
account.
I would suggest social
[Note from Matthew Gaylor: loverscaughtontape.com are the producers
of the most successful selling adult titles worldwide. If you're
easily offended or are not legally able to view adult only material,
don't click on their link. Eric [EMAIL PROTECTED] who owns
loverscaughtontape.com and
John Young[SMTP:[EMAIL PROTECTED]]
Men usually got a hangup about paternity, and
many don't want to know the truth, so the 28% is
surely way low, in particular to protect the kids and
the wives and to keep the men in harness. Them's
the facts of biology and culture and healthy
workplace
On Thu, 15 Mar 2001, David Honig wrote:
The motivation for this is that the legals have decided
that supporting the children is more important than
fairness. Its that simple; some legals will even admit it.
"Fairness" is such a slippery word. Is it fair for a child
to have no support
[ This is the last email to you. After you receive this mail,
your email has been remove from our mailing list . ]
Recommend Software:
Email Spider Easy
-Targeted Email Address Extract Software.
It is likely that a principal reason for the new NSA system is
to be able to more efficiently spy on its users, as with intelink,
siprnet and niprnet -- and our own beloved Internet whose
users and hackers know not what is being logged.
Counterintelligence has become a more important function
We would be delighted to help you for our usual consulting fees.
-Declan
On Tue, Mar 13, 2001 at 07:54:18AM -0500, [EMAIL PROTECTED] wrote:
I was trying to check out the link on your "code cracking" page maybe you
could help me. I was trying to find out if this is a page containing info. on
HOUSE SELECT INTELLIGENCE COMMITTEE Terrorism Briefing Full committee
Speaker's Working Group on Terrorism holds briefing on intelligence
matters. Location: H-405 U.S. Capitol. 12;30 p.m. Contact: 202-225-4121
http://www.house.gov/select **NEW/CLOSED**
Speculation over why aliens would want to observe us:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=44116partNumber=2method=generateFrameSettotalNumber=2
CIA reports on Russian police scrambling over UFO sighting:
NSA COMPUTER UPGRADE - [The Wall Street Journal, B1.] What does it take to
send an e-mail to all 38,000 employees at the government's premier computing
center, the supersecret National Security Agency? "An act of God," says the
agency's director since 1999, Lt. Gen. Michael Hayden. The NSA, he
On Mon, 12 Mar 2001, EarnMor wrote:
Over the last couple weeks I've been telling you about a unique way to earn up to or
over $2000 a
week with minimal effort on your part. All you need to do is advertise our
toll-free number, and
our professional sales staff will take care of the
Such replicas can be bought in shops or by mail order and are frequently used
by criminals.
The minister said replicas posed a "real threat" to society.
I would have thought that they posed a "replica of a real threat" to
society.
On Mon, 12 Mar 2001, Phillip Hallam-Baker wrote:
Next thing you know, it will be considered assault to hold your finger
like a gun and say "bang". (If it is not already.)
Try it in Heathrow airport and you will get ten years.
Airports are already a "no humour zone", so that is to be
Read your article. Most of the examples involve pharm companies. I am
interested in examples that involve a prime companies that have an
outsourcing relationship. Any thoughts?
begin:vcard
n:Busch;Rebecca
tel;cell:630-816-3648
tel;fax:630-574-2755
tel;work:630-574-2756
x-mozilla-html:FALSE
Hi Becky,
Which if the several hundred subscribers to the 8+ CDR nodes and
potentialy thousands of associated webpages might you be refering to?
You seem to have a fuzzy understanding of the concept 'mailing list'.
On Sat, 10 Mar 2001, Becky wrote:
Read your article. Most of the examples
I was doing an internet search on cor esp. your article was on my hit list.
At this point I cannot recall the page. Are you the right person for the
subject?
Jim Choate wrote:
Hi Becky,
Which if the several hundred subscribers to the 8+ CDR nodes and
potentialy thousands of associated
Ok, let me say this again
You are sending a note to a distributed mailing list. It has 8 core nodes
with each node hosting their own set of independent subscribers. The total
number of subscribers is potentaily several hundred. You are acting like
you're sending a note to an individual. You
KDLADCKD.EXE
I received no postings from cyberpass from sometime Monday through
this morning. It seems to be back now.
Peter
--
From: Bill Stewart home email[SMTP:[EMAIL PROTECTED]]
As far as I can tell, I've been receiving this discussion via
cyberpass.net,
so it must be ok
From: Gordon Jeff TIGTA [EMAIL PROTECTED]
To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]
Subject: Bell trial schedule
Date: Fri, 9 Mar 2001 10:13:02 -0500
:
:
John
You will need to be present at the Tacoma Courthouse at 9:00am on Tuesday,
4/3/01. We anticipate you will testify on Tuesday, but
Attorney General Ashcroft personally approved your subpoena, and that of another
reporter who published admissions by James Dalton Bell.
The Government is not seeking any source material, notes, or other unpublished
material from you by virtue of this subpoena. The limited purpose of the
-BEGIN PGP SIGNED MESSAGE-
Wow. I thought this list was dead and gone, yet here we have an
Assistant US Attorney apologist copying the list to explain the
Subpoena of one of our own.
How interesting.
-BEGIN PGP SIGNATURE-
Version: PGP 7.0.1
With the second amended complaint, we were able to add a complaint for
vicarious infringement against AOL for the,development of the Gnutella
file transfer protocol by its Nullsoft division. Gnutella is Napster
without a central processing hub.,By setting up a sting operation, one
of our
D. (1) AGENDA ITEM. REQUEST FOR REVISION OF UNIFORM REGULATIONS TO
REQUIRE THE REMOVAL OF LEG HAIR ON FEMALE MARINES IF SUCH HAIR IS
VISIBLE.
(2) DISCUSSION. THE UNIFORM BOARD RECOMMENDED THAT THE FOLLOWING
GROOMING REGULATION POLICY BE INCLUDED IN CHAPTER 1 OF THE UNIFORM
REGS: "NO FEMALE MARINE
Keith Winstein and Marc Horowitz implemented DeCSS in perl.
http://www.cs.cmu.edu/~dst/DeCSS/Gallery/qrpff-fast.pl
There is some description of using it here:
http://www.cs.cmu.edu/~dst/DeCSS/Gallery/
Does anyone have test vectors for DeCSS. If one had a DVD player and a
1 - 100 of 2218 matches
Mail list logo