text
stringlengths
1
160k
label
class label
20 classes
In <1993Apr16.091202.15500@waikato.ac.nz> ldo@waikato.ac.nz (Lawrence D'Oliveiro, Waikato University) writes: >I have heard of no such warnings from anybody at Apple. Just to be sure, I >asked a couple of our technicians, one of whom has been servicing Macs for >years. There is *no* danger of damaging logic boards by plugging and unplugging >ADB devices with the power on. The problem is that the pins in the ADB connector are close to each other, and if you happen to bend the cable a little while inserting it, you short the ADB port. If you take it to an Apple Repair Centre, that means a new motherboard (though a component replace IS physically possible) Same goes for serial ports (LocalTalk as well) Cheers, / h+ -- -- Jon W{tte, h+@nada.kth.se, Mac Hacker Deluxe -- This article printed on 100% recycled electrons.
4comp.sys.mac.hardware
In <1qsk6u$d8l@usenet.INS.CWRU.Edu> rcs8@po.CWRU.Edu (Robert C. Sprecher) writes: >Is it possible, ie via creative cable splicing or whatever, to >hook a Syquest 44MB removable drive to a Mac? >Is there any difference with the guts of the drive or is it >just cable differences? >Thanks. Their should be no difference in the drive itself between IBM-PC and Mac. The two main differences are the formatting of the disk itself (but with the correct software each can read the others) and maybe the cable (depends on your SCSI board on IBM-PC). If you get some Mac softawre to allow mounting of ANY IBM-formatted disk and the correct cable you should br able to mount and read your IBM-PC syquest. good luck, --Paul -- +-------------------------------------------------------------------------+ | Paul Hardwick | Technical Consulting | InterNet: hardwick@panix.com | | P.O. Box 1482 | for MVS (SP/XA/ESA) | Voice: (212) 535-0998 | | NY, NY 10274 | and 3rd party addons | Fax: (212) Pending | +-------------------------------------------------------------------------+ -- +-------------------------------------------------------------------------+ | Paul Hardwick | Technical Consulting | InterNet: hardwick@panix.com | | P.O. Box 1482 | for MVS (SP/XA/ESA) | Voice: (212) 535-0998 | | NY, NY 10274 | and 3rd party addons | Fax: (212) Pending |
4comp.sys.mac.hardware
heath@athena.cs.uga.edu (Terrance Heath) writes: > I realize I'm entering this discussion rather late, but I do > have one question. Wasn't it a Reagan appointee, James Watt, a > pentacostal christian (I think) who was the secretary of the > interior who saw no problem with deforestation since we were > "living in the last days" and ours would be the last generation > to see the redwoods anyway? For the Record: On February 5, 1981, at a House of Representatives Interior Committee Meeting, Rep. James Weaver (D, Ore), asked Watt whether "you agree that we should save some of our scenic resources for our children, not just gobble them up all at once?" Watt's answer was: < Absolutely. That is the delicate balance the Secretary of the < Interior must have -- to be steward for the natural resources < for this generation as well as future generations. I do not < know how many future generations we can count on before the < Lord returns. Whatever it is, we have to manage with a skill < to have the resources needed for future generations. My source is a column by Rowland Evans and Robert Novak on the op-ed page of the WASHINGTON POST for Friday 21 August 1981. Yours, James Kiefer
15soc.religion.christian
We have heard many bad things about the ATI Ultra Plus card (mainly having to do with its buggy Windows drivers). I would like to replace by ATI Graphics Ultra with a true-colour accelerated card. I was about to buy the ATI Ultra Plus (EISA) but it has had so much bad press that I am reconsidering. I would like an accelerated card a card that does 24bit true colour at 800x600 at least a card that does 1024x758 at 256 colours (or more) a card that has fast polygon fills a card that has fast bit blits a card that has a robust windows driver a card that has high speed non-interlaced refresh Any suggestions? My app requires lots of 3d poly grahics and complexing true colour imaging. I would sure like a faster solution that what I have now. Thanks, Al -- Alan Walford Eos Systems Inc., Vancouver,B.C., Canada Tel: 604-734-8655 aew@eosvcr.wimsey.bc.ca OR ...uunet!wimsey.bc.ca!eosvcr!aew
1comp.graphics
In article <strnlghtC602KA.IFD@netcom.com>, strnlght@netcom.com (David Sternlight) writes: > > Brad Yearwood posts a long response to the issue of registering a > phone-clipper relationship. > > It doesn't wash. > > Recall that law enforcement gets a court order to tap a suspect's phone > calls. They do what they do now--figure out which lines to tap. They then > record the stuff. If it's Clipper, they read the law enforcement block, > extract the serial number, and get the keys using the court order. > > No new difficulties (such as using someone else's phone instrument or phone > line) are introduced that wouldn't have existed absent clipper. If the > crooks were going to use a pay phone (say), they could have done so without > clipper. If the government figures out they're so doing, they listen in, and > if it's a clipper conversation they get the serial number and then the keys. > > If the crooks use an innocent person's clipper phone on the tapped line > there's no problem. The Feds don't care whose phone instrument is used, just > that the conversation is by the suspect on the tapped line. They get the > serial number, get the keys, and they are in business. > > No clipper chip to person association is ever needed. > > David > -- > David Sternlight Great care has been taken to ensure the accuracy of > our information, errors and omissions excepted. > >
11sci.crypt
In article <C5JD1J.I5s@dutiws.twi.tudelft.nl>, winfrvk@dutiws.twi.tudelft.nl (R. v.Kampen) writes: >In article <1993Apr9.101944.3200@ucbeh.san.uc.edu> hoffmamc@ucbeh.san.uc.edu wr ites: >>A hard drive with XT-type controller can be added, but I recommend not trying a >>full -height 5 1/4" hard drive, as I have run into trouble with the 63.5w >>supply not having the oomph to spool up those big heavy platters. >> >one way to get the system going with one floppy drive and one hard >disk on a 63 watt power supply is to first disconnect the power from >the floppy drive than turn on the pc, you will notice the hard drive >having a real difficult time getting up to speed, but it manages. >when booting is finished, plug in your floppy drive, now it will work. > >(ok I know this is not very user friendly, maybe you are better off >buying a 486-66 with 300 watt power supply or something like that) > >willem > The newer the drive, the less problem you will have. The old ten and fifteen meg full heights were power hogs, but I have over twenty units that I set up running flawlessly with half height drives and/or hard cards. -- DAo4@NS1.CC.LEHIGH.EDU (Don)
3comp.sys.ibm.pc.hardware
Mac Classic 2 4/40 for sale 1 year old, excellent condition Includes dustcovers, freeware/shareware (including many fonts ) $800.00 email or call 510/947-6987 (SF Bay Area) -- ******************************************************************** forman@ide.com * ``Things that are Real are given and received * !sun!ide!forman * in Silence'' M.B. * ********************************************************************
6misc.forsale
In article <1993Apr21.183307.18345@rosevax.rosemount.com>, grante@aquarius.rosemount.com (Grant Edwards) writes: |> mlee@post.RoyalRoads.ca (Malcolm Lee) writes: |> |> : God allows people to choose who and what they want to worship. |> : Worship of money is one of the greatest religions in this country. |> |> At least I can prove that money exists. Can you say the same for your |> god? |> I have evidence that you will not accept that proves to me that God exists. I have my personal experiences that have proven to me time and again that God does exist. My life has not been a bed of roses and He has been there for me when no one else was around and pulled me through those times. Of course, I know this means nothing to you because it didn't happen to you. I can't prove to you that God exists anymore than you can prove that He doesn't. It ultimately boils down to faith. Whether or not you believe in God is a matter strictly between you and Him. I am just the messenger. I don't judge and I don't condemn you for not accepting God. That is not my place. You are not my enemy. Satan is our common enemy. And the only way we can defeat Satan is through Jesus Christ. |> : |> Maybe David Koresh really was Jesus Christ (sure sounds like a neat |> : |> opening epic for a new major religion to me). -- |> : |> : NOT! He was an egomaniac who had the attention of the entire world |> : for a brief moment in time. |> |> I see. And what was that guy two thousand years ago who thought he |> was god? Sounds like an egomanic to me. How do you know that Koresh |> wasn't who he claimed? |> He fulfilled the prophesies told about Him. He performed miracles. You know, healing the sick and ressurrecting the dead. Jesus died and rose from the dead just as He said He would. He preached that we should love God and love one another as we do ourselves. Jesus put into practice that which He preached. And He rose from the dead! His spirit now lives in me. He changed the world not through the use of a sword that cleaves the flesh but the Word of God that cleaves us from sin. Compare this to DK who made promises of surrendering and then balked when his deluded predictions didn't come to pass. In the end, he chose to kill himself and everyone with him to hide the shame of being a false Messiah. |> : Rather than live with the shame of being taken captive by the FBI, |> : Koresh chose to kill himself and his followers. Sick and . . . sad. |> |> Jesus allowed himself to be killed. Many of his followers have killed |> and died for _thier_ beliefs. Sorry, I don't see the difference. |> Jesus allowed himself to be killed in order to fulfill prophecy. As you may recall on the Mount of Olives, Jesus prayed to God that if this fate could have been avoided He would have taken it. But instead, out of love for mankind, Jesus chose to accept the agonizing sentence placed upon Him and thus redeem all mankind. Jesus died to save everyone, even those who crucifed Him. He's already gone to Hell and back for you and for me. All He asks is your love. Which followers do you refer to? There have been many who have used His name to further their own gains. They would have done the same even if there was no Jesus in the first place. For example, Bush claimed that God was on their side when they attacked Iraq and Saddam claimed to have God on his side when he invaded Kuwait. IMO, God would have nothing to do with either side. They were fighting over oil, plain and simple. God be with you, Malcolm Lee :) |> |> -- |> Grant Edwards |Yow! Where do your SOCKS go |> Rosemount Inc. |when you lose them in th' |> |WASHER? |> grante@aquarius.rosemount.com |
18talk.politics.misc
In article <93088.130924PXF3@psuvm.psu.edu> PXF3@psuvm.psu.edu (Paula Ford) writes: >we know ours is not HIV+ and people need it. I think my husband should give >blood, especially, because his is O+, and I understand that's a very useful >blood type. > It's O- that is especially useful. Still, he isn't punishing the Red Cross but some O+ person that needed his blood and couldn't get it. You are right, nagging probably won't help. -- ---------------------------------------------------------------------------- Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and geb@cadre.dsl.pitt.edu | it is shameful to surrender it too soon." ----------------------------------------------------------------------------
13sci.med
In article <C6BDGM.90r@zoo.toronto.edu> henry@zoo.toronto.edu (Henry Spencer) writes: |In article <1rrgu7$9lp@access.digex.net> prb@access.digex.net (Pat) writes: |>>No, the thing is designed to be retrievable, in a pinch. Indeed, this |>>dictated a rather odd design for the solar arrays, since they had to be |>>retractable as well as extendable... |> |>Why not design the solar arrays to be detachable. if the shuttle is going |>to retunr the HST, what bother are some arrays... | |They can be detached in an emergency. But expensive hardware is not thrown |away casually (bearing in mind that nobody knew the design was defective). |If the deployment crew had found some nasty flaw -- the lid failing to open, |for example -- it would have been a bit embarrassing to have to throw the |solar arrays away to get the thing back in the payload bay. I guess it's kind of an aesthetics argument. I can see the solar arrays being expensive, and there could be contingencies where you would be throwing away brand new solar cells, but it seems so cheap compared toa shuttle mission, i wouldn't think they would bother. pat
14sci.space
In article <1993Apr5.140934.876@colorado.edu>, ajteel@dendrite.cs.Colorado.EDU (A.J. Teel) writes... > The [McDonald] case was dismissed in the interests of Justice On whose authority do you have this and on what grounds was it dismissed? Daniel Reitman HOW NOT TO WRITE A DEED One case involved the construction of a conveyance to grantees "jointly, as tenants in common, with equal rights and interest in said land, and to the survivor thereof, in fee simple. . . . To Have and to Hold the same unto the said parties hereto, equally, jointly, as tenants in common, with equal rights and interest for the period or term of their lives, and to the survivor thereof at the death of the other." The court held that the survivorship provision indicated an intent to create a joint tenancy. Germain v. Delaine, 294 Ala. 443, 318 So.2d 681 (1975).
18talk.politics.misc
I have been hearing bad thing about amalgam dental fillings. Some say the lead/ mercury leeches into your system and this is bad. And I have recently heard that there is some suspicion that the mercury is a breeding ground for bacteria that will be resistant to antibiotics. My dentist wants to use an amalgam filling for me in a place where I have two cavaties in one tooth and wants to use one filling to cover both. He says that composite filling don't hold up well when they are large. So, I would like to know if there are any other choices besides amalgam and composite. And, should I really even be worried about amalgam? I heard that some scandanavian country does not even use them any more- is this true. Any information you can give me will be greatly appreciated. Thanks! Dave Childs
13sci.med
From article <1993Apr5.200048.23421@ucsu.Colorado.EDU>, by lorenzo@rintintin.Colorado.EDU (Eric Lorenzo): > What is the difference between the LS300, ES300 and GS300? Seems > Lexus can't stop popping out new models. --Let me put it like this. The only similarity between the three models is the "300", or 3-liter engine displacement. Actually, the SC300 (the coupe) and the GS300 (the funky-looking new sedan) share the same 3.0 liter inline-six, and the ES300 (popular small sedan) uses 3.0 V6 shared with the Camry. The SC300 is a luxury/sports coupe, the GS300 is the new luxury sedan, and the ES300 is the base executive sedan. All three look completely different. --Aamir Qazi -- Aamir Qazi qazi@csd4.csd.uwm.edu --Why should I care? I'd rather watch drying paint.
7rec.autos
In article <C5t2IC.DC@news.udel.edu>, roby@chopin.udel.edu (Scott W Roby) writes: > >>Please tell me what you think would have happened had the people > >>come out with their hands up several weeks ago. > Now will you answer my question up top? A suggestion: cameras panning over planted automatic weapons, followed by a show trial and medals all around for the valiant forces of Lawn Order? -- cdt@rocket.sw.stratus.com --If you believe that I speak for my company, OR cdt@vos.stratus.com write today for my special Investors' Packet...
16talk.politics.guns
Archive-name: net-privacy/part2 Last-modified: 1993/3/3 Version: 2.1 IDENTITY, PRIVACY, and ANONYMITY on the INTERNET ================================================ (c) 1993 L. Detweiler. Not for commercial use except by permission from author, otherwise may be freely copied. Not to be altered. Please credit if quoted. SUMMARY ======= Email and account privacy, anonymity, file encryption, academic computer policies, relevant legislation and references, EFF, and other privacy and rights issues associated with use of the Internet and global networks in general. (Search for <#.#> for exact section. Search for '_' (underline) for next section.) PART 2 ====== (this file) Resources --------- <4.1> What UNIX programs are related to privacy? <4.2> How can I learn about or use cryptography? <4.3> What is the cypherpunks mailing list? <4.4> What are some privacy-related newsgroups? FAQs? <4.5> What is internet Privacy Enhanced Mail (PEM)? <4.6> What are other Request For Comments (RFCs) related to privacy? <4.7> How can I run an anonymous remailer? <4.8> What are references on privacy in email? <4.9> What are some email, Usenet, and internet use policies? <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? Miscellaneous ------------- <5.1> What is ``digital cash''? <5.2> What is a ``hacker'' or ``cracker''? <5.3> What is a ``cypherpunk''? <5.4> What is `steganography' and anonymous pools? <5.5> What is `security through obscurity'? <5.6> What are `identity daemons'? <5.7> What standards are needed to guard electronic privacy? Issues ------ <6.1> What is the Electronic Frontier Foundation (EFF)? <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? <6.3> What was `Operation Sun Devil' and the Steve Jackson Game case? <6.4> What is Integrated Services Digital Network (ISDN)? <6.5> What is the National Research and Education Network (NREN)? <6.6> What is the FBI's proposed Digital Telephony Act? <6.7> What other U.S. legislation is related to privacy on networks? <6.8> What are references on rights in cyberspace? <6.9> What is the Computers and Academic Freedom (CAF) archive? Footnotes --------- <7.1> What is the background behind the Internet? <7.2> How is Internet `anarchy' like the English language? <7.3> Most Wanted list <7.4> Change history * * * RESOURCES ========= _____ <4.1> What UNIX programs are related to privacy? For more information, type `man [cmd]' or `apropos [keyword]' at the UNIX shell prompt. passwd - change password finger - obtain information about a remote user chfn - change information about yourself obtainable by remote users (sometimes `passwd -f') chmod - change the rights associated with a file or directory umask - (shell) change the default (on creation) file access rights ls - list the rights associated with files and directories xhost - allow or disable access control of particular users to an Xwindow server last - list the latest user logins on the system and their originations who - list other users, login/idle times, originations w - list other users and what they are running xhost - access control list for X Window client use xauth - control X Window server authentication .signature - file in the home directory appended to USENET posts .forward - file used to forward email to other accounts .Xauthority - file used for X Window server authentication keys $SIGNATURE - variable used for name in email and USENET postings The 'tcpdump' packet-tracing program is loosely based on SMI's "etherfind" although none of the etherfind code remains. It was originally written by Van Jacobson, Lawrence Berkeley Laboratory, as part of an ongoing research project to investigate and improve tcp and internet gateway performance. A current version is available via anonymous ftp from host ftp.ee.lbl.gov (currently at address 128.3.254.68) file tcpdump.tar.Z (a compressed Unix tar file). This program is subject to the 'standard' Berkeley network software copyright. _____ <4.2> How can I learn about or use cryptography? A general introduction to mostly theoretical cryptographic issues, especially those frequently discussed in sci.crypt, is available in FAQ form: > Compiled by: > cme@ellisun.sw.stratus.com (Carl Ellison) > Gwyn@BRL.MIL (Doug Gwyn) > smb@ulysses.att.com (Steven Bellovin) NIST (U.S. National Institute for Standards and Technology) publishes an introductory paper on cryptography, special publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal (April 1991). Available via anonymous FTP from csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt. Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z in the crypto directory. Covers technical mathematical aspects of encryption such as number theory. More general information can be found in a FAQ by Paul Fahn of RSA Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See the `readme' file for information on the `tex' version. Also available as hardcopy for $20 from RSA Laboratories, 100 Marine Parkway, Redwood City, CA 94065. Send questions to faq-editor@rsa.com. Phil Zimmerman's PGP (Pretty Good Privacy) public-domain package for public key encryption is available at numerous sites, and is in widespread use over the internet for general UNIX-based file encryption (including email). Consult the archie FTP database. Also see the newsgroup alt.security.pgp. Mailing list requests to info-pgp-request@lucpul.it.luc.edu. From the RIPEM FAQ by Marc VanHeyningen <mvanheyn@whale.cs.indiana.edu> on news.answers: > RIPEM is a program which performs Privacy Enhanced Mail (PEM) > using the cryptographic techniques of RSA and DES. It allows > your electronic mail to have the properties of authentication > (i.e. who sent it can be confirmed) and privacy (i.e. nobody can > read it except the intended recipient.) > > RIPEM was written primarily by Mark Riordan > <mrr@scss3.cl.msu.edu>. Most of the code is in the public domain, > except for the RSA routines, which are a library called RSAREF > licensed from RSA Data Security Inc. > > RIPEM is available via anonymous FTP to citizens and permanent > residents in the U.S. from rsa.com; cd to rsaref/ and read the > README file for info. > > RIPEM, as well as some other crypt stuff, has its `home site' on > rpub.cl.msu.edu, which is open to non-anonymous FTP for users in > the U.S. and Canada who are citizens or permanent residents. To > find out how to obtain access, ftp there, cd to pub/crypt/, and > read the file GETTING_ACCESS. Note: cryptography is generally not well integrated into email yet and some system proficiency is required by users to utilize it. _____ <4.3> What is the cypherpunks mailing list? Eric Hughes <hughes@toad.com> runs the `cypherpunk' mailing list dedicated to ``discussion about technological defenses for privacy in the digital domain.'' Send email to cypherpunks-request@toad.com to be added or subtracted from the list. From the charter: > The most important means to the defense of privacy is encryption. > To encrypt is to indicate the desire for privacy. But to encrypt > with weak cryptography is to indicate not too much desire for > privacy. Cypherpunks hope that all people desiring privacy will > learn how best to defend it. _____ <4.4> What are some privacy-related newsgroups? FAQs? Newsgroups ========== alt.comp.acad-freedom.news alt.comp.acad-freedom.talk -------------------------- Moderated and unmoderated issues related to academic freedom and privacy at universities. Documented examples of violated privacy in e.g. email. Documented examples of `censorship' as in e.g. limiting USENET groups local availability. alt.cyberpunks -------------- Virtual reality, (science) fiction by William Gibson and Bruce Sterling, cyberpunk in the mainstream. alt.hackers ----------- USENET Network News Transfer Protocol (NNTP) posting mechanisms, Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports. alt.privacy ----------- General privacy issues involving taxpaying, licensing, social security numbers, etc. alt.security comp.security.misc ------------------ Computer related security issues. FAQ in news.answers below. alt.security.pgp alt.security.ripem ---------------- Dedicated to discussing public domain cryptographic software packages: PGP, or ``Pretty Good Privacy'' Software developed by Phil Zimmerman for public key encryption, and RIPEM by Mark Riordan for public key and DES encryption. comp.society.privacy -------------------- Privacy issues associated with computer technologies. Examples: caller identification, social security numbers, credit applications, mailing lists, etc. Moderated. comp.eff.news comp.eff.talk ------------- Moderated and unmoderated groups associated with the Electronic Frontier Foundation started by Mitch Kapor for protecting civil and constitutional rights in the electronic realm. news.admin news.admin.policy ----------------- Concerns of news administrators. NNTP standards and mechanisms. news.lists ---------- USENET traffic distributions. Most frequent posters, most voluminous groups, most active sites, etc. sci.crypt --------- Considers scientific and social issues of cryptography. Examples: legitimate use of PGP, public-key patents, DES, cryptographic security, cypher breaking, etc. FAQs ==== FAQs or ``Frequently-Asked Questions'' are available in the newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu [18.172.1.27] (also rtfm.mit.edu) from the directory /pub/usenet/news.answers/[x] where [x] is the archive name. This FAQ is archived in the file `net-privacy'. Others are: network-info/part1 ------------------ Sources of information about the Internet and how to connect to it, through the NSF or commercial vendors. alt-security-faq ---------------- Computer related security issues arising in alt.security and comp.security.misc, mostly UNIX related. ssn-privacy ----------- Privacy issues associated with the use of the U.S. Social Security number (SSN). pdial ----- Public dialup internet accounts list. college-email/part1 ------------------- How to find email addresses for undergraduate and graduate students, faculty and staff at various colleges and universities. ripem/faq --------- Information on RIPEM, a program for public key mail encryption officially sanctioned by Public Key Partners Inc., the company that owns patents on public key cryptography. unix-faq/faq/part1 ------------------ Frequently-asked questions about UNIX, including information on `finger' and terminal spying. distributions/* --------------- Known geographic, university, and network distributions. _____ <4.5> What is internet Privacy Enhanced Mail (PEM)? Internet drafts on Privacy Enhanced Mail (PEM) describe a standard under revision for six years delineating the official protocols for email encryption. The standard has only recently stabilized and implementations are being developed. - RFC-1421: ``Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures.'' J. Linn <104-8456@mcimail.com> - RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management'' S. Kent <Kent@BBN.com> - RFC-1424: ``Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services'' B. Kaliski <burt@rsa.com> - RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers'' D. Balenson <belenson@tis.com> Send email to pem-info@tis.com for more information. See ``RFCs related to privacy'' for information on how to obtain RFCs. _____ <4.6> What are other Requests For Comments (RFCs) related to privacy? RFC-822: SMTP, Simple Mail Transfer Protocol RFC-977: NNTP, Network News Transfer Protocol RFC-1036: Standard for interchange of network news messages RFC-1208: Glossary of Networking Terms RFC-1207: Answers to ``experienced Internet user'' questions RFC-1206: Answers to ``new Internet user'' questions RFC-1355: Privacy issues in Network Information center databases RFC-1177 is ``FYI: Answers to commonly asked ``new internet user'' questions, and includes: basic terminology on the Internet (TCP/IP, SMTP, FTP), internet organizations such as IAB (Internet Activities Board) and IETF (Internet Enbgineering Task Force), and a glossary of terms. Also from ftp.eff.org: /pub/internet-info/internet.q. > RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname > RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the > number of the RFC). Login with FTP, username `anonymous' and > password `guest'. The NIC also provides an automatic mail > service for those sites which cannot use FTP. Address the > request to SERVICE@NIC.DDN.MIL and in the subject field of the > message indicate the RFC number, as in `Subject: RFC nnnn' (or > `Subject: RFC nnnn.PS' for PostScript RFCs). > > RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP, > login with username `anonymous' and password `guest'; then > connect to the RFC directory (`cd RFC'). The file name is of the > form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the > RFC). The NIS also provides an automatic mail service for those > sites which cannot use FTP. Address the request to > NIS-INFO@NIS.NSF.NET and leave the subject field of the message > blank. The first line of the text of the message must be `SEND > RFCnnnn.TXT-1', where nnnn is replaced by the RFC number. _____ <4.7> How can I run an anonymous remailer? Cypherpunk remailer source is at soda.berkeley.edu in the /pub/cypherpunks directory. It's written in PERL, and is relatively easy to install (no administrative rights are required). Karl Barrus <elee9sf@menudo.uh.edu> has more information and modifications. Also, most remailer operators mentioned above are amenable to discussing features, problems, and helping new sites become operational. Address all points in the section ``responsibities of anonymous use'' in this document prior to advertising your service. You should be committed to the long-term stability of the site and avoid running one surreptitiously. _____ <4.8> What are references on privacy in email? Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.'' Network World (Oct 29, 1990), 7.44: 2. Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic Business (June 11, 1990) 16 (11): 92. ``Electronic Envelopes - the uncertainty of keeping e-mail private'' Scientific American, February 1993. ftp.eff.org =========== /pub/eff/papers/email_privacy --- Article on the rights of email privacy. by Ruel T. Hernandez. /pub/academic/law/privacy.email --- ``Computer Electronic Mail and Privacy'', an edited version of a law school seminar paper by Ruel T. Hernadez. /pub/eff/papers/email-privacy-biblio-2 --- Compilation of bibliography on E-Mail and its privacy issues (part 2 of the work). Compiled by Stacy B. Veeder (12/91). /pub/eff/papers/email-privacy-research --- The author at Digital Research tried to formalize their employee privacy policy on E-Mail. The casesightings are divided into two groups: US Constitutional law, and California law. /pub/eff/papers/company-email --- Formulating a Company Policy on Access to and Disclosure of Electronic Mail on Company Computer Systems by David R. Johnson and John Podesta for the Electronic Mail Assocation /pub/cud/alcor --- Information on Alcor Co., an e-mail privacy suit. /pub/academic/law/privacy.email --- Email privacy search at Berkeley. _____ <4.9> What are some email, Usenet, and internet use policies? The Computer Policy and Critiques Archive is a collection of the computer policies of many schools and networks, run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. The collection also includes critiques of some of the policies. > If you have gopher, the archive is browsable with the command: > gopher -p academic/policies gopher.eff.org > > The archive is also accessible via anonymous ftp and email. Ftp > to ftp.eff.org (192.88.144.4). It is in directory > `pub/academic/policies'. For email access, send email to > archive-server@eff.org. Include the line: > > send acad-freedom/policies <filenames> > > where <filenames> is a list of the files that you want. File > README is a detailed description of the items in the directory. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield (greeny@eff.org). Directory `widener' > contains additional policies (but not critiques). ftp.eff.org =========== /pub/cud/networks --- Acceptable Use Policies for various networks, including CompuServe (file `compuserve'), NSFNET (file `nsfnet') with information on research and commercial uses. See /pub/cud/networks/index. /pub/cud/networks/email --- Policies from various sysadmins about how they handle the issue of email privacy, control, and abuse, compiled by T. Hooper <hooper_ta@cc.curtin.edu.au>. /pub/cud/schools/ --- Computer use policies of a number of schools. See schools/Index for a full list and description. Commentary ========== /pub/academic/faq/policy.best --- Opinions on the best academic computer policies. /pub/academic/faq/email.policies --- Do any universities treat email and computer files as private? /pub/academic/faq/netnews.writing --- Policies on what users write on Usenet. /pub/academic/faq/netnews.reading --- Policies on what users read on Usenet: should my university remove (or restrict) Netnews newsgroups because some people find them offensive? /pub/academic/faq/policy --- What guidance is there for creating or evaluating a university's academic computer policy? ______ <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? > CROSSLINK is an anonymous message system run on MIT Student > Cable TV-36. It provides an anonymous medium through which MIT > students can say those things they might otherwise find > difficult, inconvenient or impossible to say in person. It's > also a way to send fun or totally random messages to your > friends over the air. It is similar to the anonymous message > pages found in many college newspapers, except that it's > electronic in nature and it's free. Messages can be posted to the service via email. For more information send email to crosslink@athena.mit.edu. MISCELLANEOUS ============= _____ <5.1> What is ``digital cash''? With digital encryption and authentication technologies, the possibility of a widespread digital cash system may someday be realized. A system utilizing codes sent between users and banks (similar to today's checking system except entirely digital) may be one approach. The issues of cryptography, privacy, and anonymity are closely associated with transfer of cash in an economy. See the article in Scientific American by David Chaum (~Dec.1992). An experimental digital bank is run by Karl Barrus <elee9sf@Menudo.UH.EDU> based on suggestions by Hal Finney on the cypherpunks mailing list. To use the server send mail to elee7h5@rosebud.ee.uh.edu message with the following text: :: command: help user@host where `user@host' is your email address. _____ <5.2> What is a ``hacker'' or ``cracker''? These terms arouse strong feelings by many on their meaning, especially on the internet. In the general news media in the past a person who uses computers and networks to malicious ends (such as breaking into systems) has been referred to as a hacker, but most internet users prefer the term ``cracker'' for this. Instead, a ``hacker'' is perceived as a benign but intensely ambitious, curious, and driven computer user who explores obscure areas of a system, for example---something of a proud electronic pioneer and patriot. This is the sense intended in this document. See also the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'. _____ <5.3> What is a ``cypherpunk''? From the charter of the cypherpunk mailing list: > Cypherpunks assume privacy is a good thing and wish there were > more of it. Cypherpunks acknowledge that those who want privacy > must create it for themselves and not expect governments, > corporations, or other large, faceless organizations to grant > them privacy out of beneficence. Cypherpunks know that people > have been creating their own privacy for centuries with whispers, > envelopes, closed doors, and couriers. Cypherpunks do not seek > to prevent other people from speaking about their experiences or > their opinions. See information on the cypherpunk mailing list below. See also the CryptoAnarchist Manifesto and the Cryptography Glossary in soda.berkeley.edu:/pub/cypherpunks. _____ <5.4> What is `steganography' and anonymous pools? Closely associated with encryption is `steganography' or the techniques for not only pursuing private (encrypted) communication but concealing the very existence of the communication itself. Many new possibilities in this area are introduced with the proliferation of computer technology. For example, it is possible to encode messages in the least-significant bits of images, typically the most 'noisy'. In addition, when such an item is posted in a public place (such as a newsgroup), virtually untraceable communication can take place between sender and receiver. For steganographic communications in the electronic realm one another possibility is setting up a mailing list where individual messages get broadcast to the entire list and individual users decode particular messages with their unique key. An anonymous pool has been set up by Miron Cuperman (miron@extropia.wimsey.com) for experiments. Send email to <pool0-request@extropia.wimsey.com> with one of the following commands in the subject line: subscribe unsubscribe help _____ <5.5> What is `security through obscurity'? `Security through obscurity' refers to the attempt to gain protection from system weaknesses by hiding sensitive information or programs relating to them. For example, a company may not make public information on its software's encryption techniques to evade `attacks' based on knowledge of it. Another example would be concealing data on the existence of security holes or bugs in operating systems. Or, some reliance may be made on the fact that some standard or mechanism with potential problems is serious because they are ``not widely known'' or ``not widely used.'' This argument is occasionally applied to mechanisms for email and Usenet posting `forgery'. `Security through obscurity' is regarded as a very feeble technique at best and inappropriate and ineffective at worst (also called the ``head-in-the-sand approach''). See the FAQ for alt.security. Some remarks of John Perry Barlow, cofounder of the Electronic Frontier Foundation, directed to NSA agents at the First International Symposium on National Security & National Competitiveness held in McLean, Virginia Dec. 1, 1992: > Digitized information is very hard to stamp classified or keep > contained. ... This stuff is incredibly leaky and volatile. It's > almost a life form in its ability to self-propagate. If > something hits the Net and it's something which people on there > find interesting it will spread like a virus of the mind. I > believe you must simply accept the idea that we are moving into > an environment where any information which is at all interesting > to people is going to get out. And there will be very little > that you can do about it. This is not a bad thing in my view, > but you may differ... _____ <5.6> What are `identity daemons'? RFC-931 describes a protocol standard that allows UNIX programs to query a remote user's login name after connection to a local communication socket (a connection of this type is established during FTP and TELNET sessions, for example). The standard is not widely supported, perhaps 10% of internet sites currently implement it but the number is increasing. The mechanism is detrimental to anonymity. Regular users cannot disable it but system adminstrators can circumvent it. This standard may represent a trend toward greater authentication mechanisms. _____ <5.7> What new standards are needed to guard electronic privacy? Remailing/Posting ----------------- - Stable, secure, protected, officially sanctioned and permitted, publicly and privately operated anonymous servers and hubs. - Official standards for encryption and anonymity in mail and USENET postings. - Truly anonymous protocols with source and destination information obscured or absent and hidden routing mechanisms (chaining, encrypted addresses, etc.) - Standards for anonymous email addressing, embedding files, and remailer site chaining. General ------- - Recognition of anonymity, cryptography, and related privacy shields as legitimate, useful, desirable, and crucial by the general public and their governments. - Widespread use and implementation of these technologies by systems designers into hardware, software, and standards, implemented `securely,' `seamlessly,' and `transparently'. - General shift of use, dependence, and reliance to means other than wiretapping and electronic surveillance by law enforcement agencies. - Publicity, retraction, and dissolution of laws and government agencies opposed to privacy, replaced by structures dedicated to strengthening and protecting it. ISSUES ====== _____ <6.1> What is the Electronic Frontier Foundation (EFF)? From ftp.eff.org:/pub/EFF/mission_statement: > A new world is arising in the vast web of digital, electronic > media which connect us. Computer-based communication media like > electronic mail and computer conferencing are becoming the basis > of new forms of community. These communities without a single, > fixed geographical location comprise the first settlements on an > electronic frontier. > > While well-established legal principles and cultural norms give > structure and coherence to uses of conventional media like > newspapers, books, and telephones, the new digital media do not > so easily fit into existing frameworks. Conflicts come about as > the law struggles to define its application in a context where > fundamental notions of speech, property, and place take > profoundly new forms. People sense both the promise and the > threat inherent in new computer and communications technologies, > even as they struggle to master or simply cope with them in the > workplace and the home. > > The Electronic Frontier Foundation has been established to help > civilize the electronic frontier; to make it truly useful and > beneficial not just to a technical elite, but to everyone; and to > do this in a way which is in keeping with our society's highest > traditions of the free and open flow of information and > communication. EFF was started by the multimillionaire Mitchell Kapor, founder of Lotus software, and John Barlow, lyricist for the Grateful Dead rock band. A highly publicized endeavor of the organization involved the legal defense of Steve Jackson Games after an FBI raid and an accompanying civil suit (see section on ``Steve Jackson Games''). The foundation publishes EFF News (EFFector Online) electronically, send requests to effnews-request@eff.org. In a letter to Mitchell Kapor from the Chairman of the Subcommittee with primary jurisdiction over telecommunications policy dated November 5, 1991, Representative Edward J. Markey complemented Mitchell Kapor on his ``insights on the development of a national public information infrastructure'' which ``were appreciated greatly by myself and the Members of the Subcommittee'' (complete text in ftp.eff.com:/pub/pub-infra/1991-12): > ...we need to pursue policies that encourage the Bell companies to > work with other sectors of the communications industry to create > a consumer-oriented, public information network. Please let me or > my staff know what policies you and others in the computer > industry believe would best serve the public interest in creating > a reasonably priced, widely available network in which > competition is open and innovation rewarded. I also want to > learn what lessons from the computer industry over the past ten > to fifteen years should apply to the current debate on > structuring the information and communications networks of the > future....I ask your help in gaining input from the computer > industry so that the Subcommittee can shape policies that will > bring this spirit of innovation and entrepreneurship to the > information services industry. ftp.eff.org =========== /pub/eff/about-eff --- A file of basic information about EFF including goals, mission, achievements, and current projects. Contains a membership form. /pub/eff/mission-statement --- EFF mission statement. /pub/eff/historical/founding-announcement --- EFF founding press release. /pub/eff/historical/eff-history --- John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July 10, 1990). How EFF was conceived and founded, major legal cases, and the organizational directions. /pub/eff/historical/legal-case-summary --- EFF legal case summary. _____ <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? The Computer Professionals for Social Responsibility have been working to protect and promote electronic civil liberties issues since ~1982. The group has three offices (Palo Alto, Cambridge, Washington, DC) and 20 chapters. It is involved in litigation against the FBI, The NSA, NIST, the Secret Service and other other U.S. government agencies to declassify and provide documentation on issues such as Operation Sundevil, the FBI wiretap proposal, NSA's interference in crypography, the breakup of the 2600 raid in Arlington, Va in Nov 1992. Members speak frequently in front on Congress, state legislators and public utility commissions to testify on privacy, information policy, computer security, and caller identification. CPSR has created an extensive Internet Privacy library available via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising the largest collection of privacy documents on the internet. For more information, anonymous FTP cpsr.org:/cpsr/. (Thanks to Dave Banisar <banisar@washofc.cpsr.org> for contributions here.) _____ <6.3> What was `Operation Sundevil' and the Steve Jackson Game case? In the early 1990's a fear spread among U.S. law enforcement agencies on the illicit activities of `hackers' and `phreakers' involved in such activities as credit card fraud and long-distance call thievery. (see ftp.eff.org:/pub/SJG/General_Information/EFFector1.04): > `Operation Sundevil,' the Phoenix-inspired crackdown of May > 8,1990, concentrated on telephone code-fraud and credit-card > abuse, and followed this seizure plan with some success. > [Bulletin Board Systems] went down all over America, terrifying > the underground and swiftly depriving them of at least some of > their criminal instruments. It also saddled analysts with some > 24,000 floppy disks, and confronted harried Justice Department > prosecutors with the daunting challenge of a gigantic nationwide > hacker show-trial involving highly technical issues in dozens of > jurisdictions. Massive `show-trials' never materialized, although isolated instances of prosecution were pursued. The movement reached a crescendo in Texas with the highly publicized case of illegal search and seizure involving the Steve Jackson Games company of Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST by Bruce Sterling <bruces@well.sf.ca.us> in Fantasy and Science Fiction Magazine: > In an early morning raid with an unlawful and unconstitutional > warrant, agents of the Secret Service conducted a search of the > SJG office. When they left they took a manuscript being prepared > for publication, private electronic mail, and several computers, > including the hardware and software of the SJG Computer Bulletin > Board System. Yet Jackson and his business were not only > innocent of any crime, but never suspects in the first place. > The raid had been staged on the unfounded suspicion that > somewhere in Jackson's office there `might be' a document > compromising the security of the 911 telephone system. FBI agents involved in the seizure were named in a civil suit filed on behalf of Steve Jackson Games by The Electronic Frontier Foundation. See information on EFF below. From an article by Joe Abernathy in the Houston Chronicle ~Feb 1, 1993: > AUSTIN -- An electronic civil rights case against the Secret > Service closed Thursday with a clear statement by federal > District Judge Sam Sparks that the Service failed to conduct a > proper investigation in a notorious computer crime crackdown, > and went too far in retaining custody of seized equipment. > > Secret Service Special Agent Timothy Foley of Chicago, who was in > charge of three Austin computer search-and-seizures on March 1, > 1990, that led to the lawsuit, stoically endured Spark's rebuke > over the Service's poor investigation and abusive computer > seizure policies. While the Service has seized dozens of > computers since the crackdown began in 1990, this is the first > case to challenge the practice. > > Sparks grew visibly angry when it was established that the Austin > science fiction magazine and game book publisher was never > suspected of a crime, and that agents did not do even marginal > research to establish a criminal connection between the firm and > the suspected illegal activities of an employee, or to determine > that the company was a publisher. Indeed, agents testified that > they were not even trained in the Privacy Protection Act at the > special Secret Service school on computer crime. > > "How long would it have taken you, Mr. Foley, to find out what > Steve Jackson Games did, what it was?" asked Sparks. "An hour? > > "Was there any reason why, on March 2, you could not return to > Steve Jackson Games a copy, in floppy disk form, of everything > taken? > > "Did you read the article in Business Week magazine where it had > a picture of Steve Jackson -- a law-abiding, tax-paying citizen > -- saying he was a computer crime suspect? > > "Did it ever occur to you, Mr. Foley, that seizing this material > could harm Steve Jackson economically?" > > Foley replied, "No, sir," but the judge offered his own answer. > > "You actually did, you just had no idea anybody would actually go > out and hire a lawyer and sue you." > > More than $200,000 has been spent by the Electronic Frontier > Foundation in bringing the case to trial. The EFF was founded by > Mitchell Kapor amid a civil liberties movement sparked in large > part by the Secret Service computer crime crackdown. ftp.eff.org =========== /pub/cud/papers/sundevil --- A collection of information on Operation SunDevil by the Epic nonprofit publishing project. Everything you wanted to know but could never find. /pub/cud/papers/sj-resp --- Steve Jackson's response to the charges against him. _____ <6.4> What is Integrated Services Digital Network (ISDN)? ISDN is a high-speed data communications standard that utilizes existing copper telephone lines, and is a possible inexpensive and intermediate alternative to laying fiber optic cable for phone networks. The speeds involved may be sufficient for audio and video transmission applications. G. V. der Leun in the file ftp.eff.org: /pub/pub-infra/1991-11: > Telecommunications in the United States is at a crossroads. With > the Regional Bell Operating Companies now free to provide > content, the shape of the information networking is about to be > irrevocably altered. But will that network be the open, > accessible, affordable network that the American public needs? > You can help decide this question. > > The Electronic Frontier Foundation recently presented a plan to > Congress calling for the immediate deployment of a national > network based on existing ISDN technology, accessible to anyone > with a telephone connection, and priced like local voice service. > We believe deployment of such a platform will spur the > development of innovative new information services, and maximize > freedom, competitiveness, and civil liberties throughout the > nation. > > The EFF is testifying before Congress and the FCC; making > presentations to public utility commisions from Massachusetts to > California; and meeting with representatives from telephone > companies, publishers, consumer advocates, and other stakeholders > in the telecommunications policy debate. > > The EFF believes that participants on the Internet, as pioneers on > the electronic frontier, need to have their voices heard at this > critical moment. To automatically receive a description of the platform and details, send mail to archive-server@eff.org, with the following line: send documents open-platform-overview or send mail to eff@eff.org. See also the Introduction to the EFF Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02. References ========== ``Digital Data On Demand.'' MacWorld, 2/82 (page 224). --- 56Kbps vs. ISDN services and products. See comments by J. Powers in ftp.eff.org:pub/pub-infra/1992-02. ``Telephone Service That Rings of the Future.'' By Joshua Quittner. Newsday, Tue, Jan 7 1992. --- Implications of ISDN for the masses, written in popular science style. John Perry Barlow (cofounder EFF). Regional telephone companies (Ohio Bell). ISDN as ``Technological Rorschach Test.'' Anecdotes about McDonald's, Barbara Bush teleconferencing. See complete text in ftp.eff.org:/pub/pub-infra/1992-01. ftp.eff.org:/pub/pub-infra/ --- Files 1991-11 through 1992-05 containing email from the EFF public infrastructure group organized by month. Opinions and facts on the pros and cons of ISDN, Integrated Services Digital Network. Uses of ISDN (phone video, audio, etc.) Japanese model. Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical specifications of ISDN, implementation details, cost issues, political obstacles, (RBOC, Regional Bell Operating Companies or `Baby Bells', e.g. NET, New England Telephone). Influencing development of future networks (e.g. ISDN and NREN, National Research and Education Network), encouraging competition (cable TV systems). Press releases and news articles. Letter from Rep. E. J. Markey to M. Kapor. _____ <6.5> What is the National Research and Education Network (NREN)? The Nation Research and Education Network was introduced in legislation cosponsored by Sen. A. Gore to promote high-speed data network infrastructure augmenting the internet with up to 50 times faster transmission rates. The bill passed the House on November 20, 1991, the Senate on November 22, 1991, and was signed by the President on December 9, 1991. ftp.eff.org =========== /pub/EFF/legislation/nren-bill-text --- The complete text of the House-Senate compromise version of S. 272, the High-Performance Computing Act. /pub/internet-info/gore.bill --- 102nd congress 1st Session. Text of high performance computing bill cosponsored by Sen. A. Gore. /pub/EFF/legislation/gore-infrastructure-bill --- The text of S.2937, the Information Infrastructure and Technology Act of 1992 introduced by Senator Gore to expand Federal efforts to develop technologies for applications of high-performance computing and high-speed networking, and to provide for a coordinated Federal program to accelerate development and deployment of an advanced information infrastructure. U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK By John Markoff, N.Y. Times (~18 Dec 91). --- President Bush's legislation for natiowide computer data `superhighway.' IBM-MCI venture as monopoly destructive to fair competition and innovation? National Science Foundation NSFnet. complete text in /pub/pub-infra/1991-12. Commentary ========== /pub/academic/statements/nren.privacy.cpsr --- ``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc Rotenberg, Washington Director Computer Professionals for Social Responsibility (CPSR). /pub/internet-info/cisler.nren --- The National Research and Education Network: Two meetings Steve Cisler, Senior Scientist Apple Computer Library December 17, 1990 Summary of meetings exploring educational issues of NREN by diverse members of academia and industry. /pub/internet-info/privatized.nren --- Feb. 14 1991 essay by M. Kapor advocating advantages of a private National Public Network, and specific recommendations for open NREN policies encouraging competition. /pub/eff/papers/netproposition --- An FYI about the proposed NREN setup. _____ <6.6> What is the FBI's proposed Digital Telephony Act? ``Providers of electronic communication services and private branch exchange operators shall provide within the United States capability and capacity for the government to intercept wire and electronic communications when authorized by law...'' From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22: > In a move that worried privacy experts, software manufacturers and > telephone companies, the FBI proposed legislation to amend the > Communications Act of 1934 to make it easier for the Bureau to > perform electronic wiretapping. The proposed legislation, > entitled 'Digital Telephony,' would have required communications > service providers and hardware manufacturers to make their > systems 'tappable' by providing 'back doors' through which law > enforcement officers could intercept communications. Furthermore, > this capability would have been provided undetectably, while the > communications was in progress, exclusive of any communications > between other parties, regardless of the mobility of the target > of the FBI's investigation, and without degradation of service. > > ...under the proposal, the Department of Justice (DOJ) can keep > communications products off the market if it determines that > these products do not meet the DOJ's own ... guidelines. This > [could] result in increased costs and reduced competitiveness for > service providers and equipment manufacturers, since they will be > unlikely to add any features that may result in a DOJ rejection > of their entire product. ...the FBI proposal suggests that the > cost of this wiretapping 'service' to the Bureau would have to be > borne by the service provider itself... > > The Electronic Frontier Foundation organized a broad coalition of > public interest and industry groups, from Computer Professionals > for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun > Microsystems, to oppose the legislation. A white paper produced > by the EFF and ratified by the coalition, entitled, `An Analysis > of the FBI Digital Telephony Proposal,' was widely distributed > throughout the Congress. ... The Justice Department lobbied hard > in the final days to get Congress to take up the bill before > Congress adjourned, but the bill never ... found a Congressional > sponsor (and was therefore never officially introduced). The FBI > [may] reintroduce "Digital Telephony" when the 103rd Congress > convenes in January. ftp.eff.org =========== /pub/eff/legislation/fbi-wiretap-bill /pub/EFF/legislation/new-fbi-wiretap-bill --- A bill to ensure the continuing access of law enforcement to the content of wire and electronic communications when authorized by law and for other purposes. Version 2 of the bill after FBI changes in response to public response. /pub/cud/law/hr3515 --- House of Rep bill 3515, Telecommunications Law. Commentary ========== /pub/eff/papers/eff-fbi-analysis --- The EFF-sponsored analysis of the FBI's Digital Telephony proposal. /pub/eff/papers/ecpa.layman --- The Electronic Communications Privacy Act of 1986: A Layman's View. /pub/eff/papers/nightline-wire --- Transcript of ABC's Nightline of May 22, 1992, on the FBI, Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc Rotenberg of the CPSR and William Sessions, Director of the FBI. /pub/eff/papers/edwards_letter --- A letter from the Director of the Secret Service to US Rep. Don Edwards, D-California, in response to questions raised by Edwards' Subcommittee. This copy came from Computer Professionals for Social Responsibility in Washington, D.C. /pub/eff/papers/fbi.systems --- A description of how information is stored on the FBI's computer systems. _____ <6.7> What other U.S. legislation is related to privacy? ftp.eff.org =========== /pub/cud/law/<state> --- State computer crime laws: AL, AK, AZ, CA, CO, CT, DE, FL, GA, HI, IA, ID, IL, IN, MD, MN, NC, NJ, NM, NY, OR, TX, VT, VA, WA, WI, WV. /pub/cud/law/<country> --- Current computer crime laws for: The United States (federal code), Canada, Ghana, and Great Britain. /pub/cud/law/bill.s.618 --- Senate bill 618, addressing registration of encryption keys with the government. /pub/cud/law/improve --- Improvement of Information Access bill. /pub/cud/law/monitoring --- Senate bill 516; concerning abuses of electronic monitoring in the workplace. /pub/cud/law/us.e-privacy --- Title 18, relating to computer crime & email privacy. /pub/academic/law/privacy.electronic.bill --- The text of Simon's electronic privacy bill, S. 516. ``To prevent potential abuses of electronic monitoring in the workplace.'' _____ <6.8> What are references on rights in cyberspace? ftp.eff.org =========== /pub/cud/papers/const.in.cyberspace --- Laurence Tribe's keynote address at the first Conference on Computers, Freedom, & Privacy. `The Constitution in Cyberspace' /pub/cud/papers/denning --- Paper presented to 13th Nat'l Comp Security Conf ``Concerning Hackers Who Break into Computer Systems'' by Dorothy E Denning. /pub/cud/papers/privacy --- ``Computer Privacy vs First and Fourth Amendment Rights'' by Michael S. Borella /pub/cud/papers/rights-of-expr --- Rights of Expression in Cyberspace by R. E. Baird /pub/academic/eff.rights --- Bill of Rights' meaning in the Electronic Frontier. _____ <6.9> What is the Computers and Academic Freedom (CAF) archive? The CAF Archive is an electronic library of information about computers and academic freedom. run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. > If you have gopher, the archive is browsable with the command: > gopher -p academic gopher.eff.org > > It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in > directory `pub/academic'. It is also available via email. For > information on email access send email to archive-server@eff.org. > In the body of your note include the lines `help' and `index'. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield (greeny@eff.org). ftp.eff.org =========== /pub/academic/statements/caf-statement --- Codifies the application of academic freedom to academic computers, reflecting seven months of on-line discussion about computers and academic freedom. Covers free expression, due process, privacy, and user participation. /pub/academic/books --- Directory of book references related to Computers and Academic Freedom or mentioned in the CAF discussion. The file books/README is a bibliography. /pub/academic/faq/archive --- List of files available on the Computers and Academic Freedom archive. /pub/academic/news --- Directory of all issues of the Computers and Academic Freedom News. A full list of abstracts is available in file `abstracts'. The special best-of-the-month issues are named with their month, for example, `June'. FOOTNOTES ========= _____ <7.1> What is the background behind the Internet? The article ``Internet'' in Fantasy and Science Fiction by Bruce Sterling <bruces@well.sf.ca.us> contains general and nontechnical introductory notes on origins of the Internet, including the role of the RAND corporation, the goal of network resilience in face of nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.: > ARPANET itself formally expired in 1989, a happy victim of its > own overwhelming success. Its users scarcely noticed, for > ARPANET's functions not only continued but steadily improved. > The use of TCP/IP standards for computer networking is now > global. In 1971, a mere twenty-one years ago, there were only > four nodes in the ARPANET network. Today there are tens of > thousands of nodes in the Internet, scattered over forty-two > countries, with more coming on-line every day. Three million, > possibly four million people use this gigantic > mother-of-all-computer-networks. > > The Internet is especially popular among scientists, and is > probably the most important scientific instrument of the late > twentieth century. The powerful, sophisticated access that it > provides to specialized data and personal communication has sped > up the pace of scientific research enormously. > > The Internet's pace of growth in the early 1990s is spectacular, > almost ferocious. It is spreading faster than cellular phones, > faster than fax machines. Last year the Internet was growing at > a rate of twenty percent a *month.* The number of `host' > machines with direct connection to TCP/IP has been doubling > every year since 1988. The Internet is moving out of its > original base in military and research institutions, into > elementary and high schools, as well as into public libraries > and the commercial sector. References ========== Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A. Yuan, ``Where to Start - A Bibliography of General Internetworking Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre, August 1990. The Whole Internet Catalog & User's Guide by Ed Krol. (1992) O'Reilly and Associates, Inc. --- A clear, non-jargonized introduction to the intimidating business of network literacy written in humorous style. Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118), University of Illinois Urbana, September 1989. ``The User's Directory to Computer Networks'', by Tracy LaQuey. The Matrix: Computer Networks and Conferencing Systems Worldwide. by John Quarterman. Digital Press: Bedford, MA. (1990) --- Massive and highly technical compendium detailing the mind-boggling scope and complexity of global internetworks. ``!%@:: A Directory of Electronic Mail Addressing and Networks'' by Donnalyn Frey and Rick Adams. The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992) Addison Wesley. --- ``Evangelical'' etiquette guide to the Internet featuring anecdotal tales of life-changing Internet experiences. Foreword by Senator Al Gore. Zen and the Art of the Internet: A Beginner's Guide by Brendan P. Kehoe (1992) Prentice Hall. --- Brief but useful Internet guide with plenty of good advice on useful databases. See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling <bruces@well.sf.ca.us> for contributions here.) General ======= Cunningham, Scott and Alan L. Porter. ``Communication Networks: A dozen ways they'll change our lives.'' The Futurist 26, 1 (January-February, 1992): 19-22. Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York: McGraw-Hill, 1992) ISBN# 0-390-03083-X --- Essays on information infrastructure. Policy and design issues, research and NREN, future visions, information markets. See table of contents in ftp.eff.org:/pub/pub-infra/1992-03. Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic Networking.'' Whole Earth Review (Winter) 1990: 32-35. Varley, Pamela. ``Electronic Democracy.'' Technology Review (November/December, 1991): 43-51. ______ <7.2> How Internet `anarchy' like the English language? According to Bruce Sterling <bruces@well.sf.ca.us>: > The Internet's `anarchy' may seem strange or even unnatural, but > it makes a certain deep and basic sense. It's rather like the > `anarchy' of the English language. Nobody rents English, and > nobody owns English. As an English-speaking person, it's up > to you to learn how to speak English properly and make whatever > use you please of it (though the government provides certain > subsidies to help you learn to read and write a bit). > Otherwise, everybody just sort of pitches in, and somehow the > thing evolves on its own, and somehow turns out workable. And > interesting. Fascinating, even. Though a lot of people earn > their living from using and exploiting and teaching English, > `English' as an institution is public property, a public good. > Much the same goes for the Internet. Would English be improved > if the `The English Language, Inc.' had a board of directors > and a chief executive officer, or a President and a Congress? > There'd probably be a lot fewer new words in English, and a lot > fewer new ideas. _____ <7.3> Most Wanted list Hopefully you have benefitted from this creation, compilation, and condensation of information from various sources regarding privacy, identity, and anonymity on the internet. The author is committed to keeping this up-to-date and strengthening it, but this can only be effective with your feedback. In particular, the following items are sought: - Short summaries of RFC documents and other references listed, esp. CPSR files. - More data on the specific uses and penetration of RFC-931. - Internet traffic statistics. How much is email? How much USENET? What are the costs involved? - Famous or obscure examples of compromised privacy on the internet. - FTP site for the code (NOT the code) to turn the .plan file into a named pipe for sensing/reacting to remote `fingers'. - Knowledge on the `promiscuous' mode of receipt or transmission on network cards. - Details on the infamous experiment where a scientist resubmitted previously accepted papers to a prominent journal with new and unknown authors that were subsequently rejected. - X Windows, EFF, CPSR FAQhood in news.answers. Commerical use of this document is negotiable and is a way for the author to recoup from a significant time investment. Email feedback to ld231782@longs.lance.colostate.edu. Please note where you saw this (which newsgroup, etc.). _____ <7.4> Change history 3/3/93 v2.1 (current) CPSR pointer, new UNIX mode examples, digital telephony act, Steve Jackson incident, additions/ reorganization to anonymity section, part 3. Note: v2.0 post to sci.crypt, alt.privacy, news.answers, alt.answers, sci.answers was cancelled by J. Kamens because of incorrect subject line. 2/14/93 v2.0 Major revisions. New section for X Windows. Some email privacy items reorganized to network security section. New sections for email liability issues, anonymity history and responsibilities. Split into three files. Many new sources added, particularly from EFF and CAF in new `issues' part. `commentary' from news.admin.policy. 21 day automated posting starts. 2/3/93 v1.0 More newsgroups & FAQs added. More `Most Wanted'. Posted to news.answers. Future monthly posting to sci.crypt, alt.privacy. 2/1/93 v0.3 Formatted to 72 columns for quoting etc. `miscellaneous,' `resources' sections added with cypherpunk servers and use warnings. More UNIX examples (`ls' and `chmod'). Posted to alt.privacy, comp.society.privacy. 1/29/93 v0.2 `Identity' and `Privacy' sections added. `Anonymity' expanded. Remailer addresses removed due to lack of information and instability. Posted to sci.crypt. 1/25/93 v0.1 Originally posted to the cypherpunks mailing list on 1/25/93 as a call to organize a list of anonymous servers. email ld231782@longs.lance.colostate.edu for earlier versions. * * * SEE ALSO ======== Part 1 (previous file) ------ <1.1> What is `identity' on the internet? <1.2> Why is identity (un)important on the internet? <1.3> How does my email address (not) identify me and my background? <1.4> How can I find out more about somebody from their email address? <1.5> Why is identification (un)stable on the internet? <1.6> What is the future of identification on the internet? <2.1> What is `privacy' on the internet? <2.2> Why is privacy (un)important on the internet? <2.3> How (in)secure are internet networks? <2.4> How (in)secure is my account? <2.5> How (in)secure are my files and directories? <2.6> How (in)secure is X Windows? <2.7> How (in)secure is my email? <2.8> How am I (not) liable for my email and postings? <2.9> How do I provide more/less information to others on my identity? <2.10> Who is my sysadmin? What does s/he know about me? <2.11> Why is privacy (un)stable on the internet? <2.12> What is the future of privacy on the internet? <3.1> What is `anonymity' on the internet? <3.2> Why is `anonymity' (un)important on the internet? <3.3> How can anonymity be protected on the internet? <3.4> What is `anonymous mail'? <3.5> What is `anonymous posting'? <3.6> Why is anonymity (un)stable on the internet? <3.7> What is the future of anonymity on the internet? Part 3 (next file) ------ <8.1> What are some known anonymous remailing and posting sites? <8.2> What are the responsibilities associated with anonymity? <8.3> How do I `kill' anonymous postings? <8.4> What is the history behind anonymous posting servers? <8.5> What is the value of anonymity? <8.6> Should anonymous posting to all groups be allowed? <8.7> What should system operators do with anonymous postings? <8.8> What is going on with anon.penet.fi maintained by J. Helsingius? * * * This is Part 2 of the Privacy & Anonymity FAQ, obtained via anonymous FTP to pit-manager@mit.edu:/pub/usenet/news.answers/net-privacy/ or newsgroups news.answers, sci.answers, alt.answers every 21 days. Written by L. Detweiler <ld231782@longs.lance.colostate.edu>. All rights reserved.
11sci.crypt
In article <1993Apr16.225910.16670@bnr.ca> zbib@bnr.ca writes: >Adam Shostack writes: >> Sam Zbib writes > >>I'm surprised that you don't consider the acquisition of land by > >>the Jews from arabs, for the purpose of establishing an exclusive > >>state, as a hostile action leading to war. > >> It was for the purpose of establishing a state, not an >> exclusive state. If the state was to be exclusive, it would not have >> 400 000 arab citizens. > >Could you please tell me what was the ethnic composition of >Israel right after it was formed. > > >> And no, I do not consider the purchase of land a hostile >> action. When someone wants to buy land, and someone else is willing >> to sell it, at a mutually agreeable price, then that is commerce. It >> is not a hostile action leading to war. > >No one in his right mind would sell his freedom and dignity. >Palestinians are no exception. Perhaps you heard about >anti-trust in the business world. > >Since we are debating the legality of a commercial >transaction, we must use the laws governing the guidelines >and ethics of such transactions. Basic ANTI-TRUST law says >that, while you can purchase IBM stocks for the purpose of >investing, you can not acquire a large number of those >shares with the intent or controlling IBM. You can do so >only if you make your intentions CLEAR apriori . Clearly, >the Jews who purchased properties from palastenians had some >designs, they were not buying a dwelling or a real estate. >They were establishing a bridgehead for the European Jews. > >The palastenians sold their properties to the Jews in the >old tradition of arab hospitality. Being a multi-ethnic / >multi-religious society, accepting the jews as neighbours >was no different, just another religion. Plus they paid fair >market value, etc... They did not know they were victims of >an international conspiracy. (I'm not a conspiracy theorist >myself, but this one is hard to dismiss). > Right now, I'm just going to address this point. When the Jewish National Fund bought most of its land, It didn't buy it from the Palestinians themselves, because, for the most part, they were tenant farmers (fallahin), living on land owned by wealthy Arabs in Syria and Lebanon. The JNF offered a premium deal, so the owners took advantage of it. It's called commerce. The owners, however, made no provisions for those who had worked for them, basically shafting them by selling the land right out from under them. They are to blame, not the Jews. > >> Adam Shostack adam@das.harvard.edu > >-- >Sam Zbib Bell-Northern Research >------------------------------------------------------------------------ >Bitnet/Internet: zbib@bnr.ca VOICE: (613) 763-5889 > FAX: (613) 763-2626 >Surface Mail: Stop 162, P.O.Box 3511, Station C, Ottawa, Canada, K1Y 4H7 >------------------------------------------------------------------------ > My opinions are my own and no one else's Amir
17talk.politics.mideast
In article <C5Iz7n.Kyv@cs.dal.ca>, hayes@ug.cs.dal.ca (Kevin B. Hayes) writes: >>you can find retail that is within the price of a keyboard of educational >>prices. I would be very wary of retail outlets selling as cheap as educational prices! I went for a retailer, actually mail order (CDA computers), because its price was better thant the campus computer store. I found out why later on when I tried to get a repair done at an Apple registered repair center - the CPU was a resale. The serial number had been removed and replaced with a non-standard number (probably from CDA computers). Consequently, the Apple repair man could not do ANY warrenty repairs. So I ended up with just a 90day warrenty from CDA over the Apple 12month warrenty. Boy, was I pi**ed! Moral of the story, CAVEAT EMPTOR. However, if you go with a reliable, trustworthy mail order firm (if they exist - maybe someone could enlighten us with their experiences), you will probably get a better price than your local educational outlet simply because mail order out of state does not REQUIRE sales tax yet. Though for how much longer remains to be seen. The addition in sales tax on a CPU purchase will probably wipe out an educational discount. Again CAVEAT EMPTOR, some mail order companies DO include sales tax on purchases even if they are out of state, so check! Richard. \\\\/ Richard J Appleyard f0975893@jaguar.csc.wsu.edu /o o\ Washington State University ( ) ) Voice (509) 335-7728 Fax (509) 335-9688 \_o_/ "To err is human, but to really screw things up takes a computer!"
4comp.sys.mac.hardware
In article <stevethC5Js6F.Fn5@netcom.com>, steveth@netcom.com (Steve Thomas) writes: > In article <1993Apr15.193603.14228@magnus.acs.ohio-state.edu> rscharfy@magnus.acs.ohio-state.edu (Ryan C Scharfy) writes: > >In article <stevethC5JGCr.1Ht@netcom.com> steveth@netcom.com (Steve Thomas) wri > >tes: > > > >> > >>Just _TRY_ to justify the War On Drugs, I _DARE_ you! > >> > > > >A friend of mine who smoke pot every day and last Tuesday took 5 hits of acid > >is still having trouble "aiming" for the bowl when he takes a dump. Don't as > >me how, I just have seen the results. > > > >Boy, I really wish we we cut the drug war and have more people screwed up in > >the head. > > > > I'll answer you're sarcasm with more sarcasm: > > Boy, it looks like the WOD is WORKING REALLY GOOD to stop people from > being screwed up in the head, given that example! > > (Issue: your friend _got_ his drugs--legal or not legal, he'll continue to > get them. Issue #2: why should _I_, as somebody who does NOT use illegal > drugs and who IS NOT "screwed up" have to PAY for this idiot's problems? He's > not doing anybody any harm except himself. The WOD, on the other hand, is an > immediate THREAT to MY life and livelyhood. Tell me why I should sacrafice > THIS to THAT!). And not only that, but if the drugs were legal we could have pharmacists instead of pushers selling them, and the pharmacists could be obligated to not only inform the purchasers of the dangers of drug use, but also show them how to use the drugs in relatively safe ways. And the dangers of impurities (responsible for much of the suffering that drugs cause) would be all but eliminated. - Dave Borden borden@m5.harvard.edu
18talk.politics.misc
Tonight in Boston, the Buffalo Sabres blanked the Boston Bruins 4-0 tonight in Boston. Looks like Boston can hang this season up, because Buffalo's home record is awesome!!!! This is great.. Buffalo fans might get to see revenge for last year!!!!! :) -- delarocq@eos.ncsu.edu --------------------------------------------------------------------------- 1988,1989,1990,1991 AFC East Division Champions 1991,1992, AND 1993 AFC Conference Champions!!!!!!!! :) Squished the Fish ............... Monday Night Football, November 16, 1992.. SQUISHED THE TRASH TALKING FISH.. AFC CHAMPIONSHIP, JANUARY 17, 1992.. If you are a Buffalo Bills fan, email me at delarocq@eos.ncsu.edu so we can talk all about the games, insight, etc. If you are a Packers fan, let me know. I am interested in any news out of Green Bay...
10rec.sport.hockey
mike@boulder.snsc.unr.edu (Mike McCormick) writes: > Not honoring our wives can cause our prayers to be hindered: > > You husbands likewise, live with your wives in > an understanding way, as with a weaker vessel, > since she is a woman; and grant her honor as > a fellow heir of the grace of life, so that your > prayers may not be hindered. I Peter 3:7 One interpretation I've heard of this verse is that it refers to the sin of physically abusing one's wife. The husband is usually physically stronger than his wife but is not permitted to use this to dominate her. He must honor her as his sister in Christ. This would therefore be an example of a specific sin that blocks prayer. This verse also makes me think of the kind of husband who decides what is God's will for his family without consulting his wife. God reveals His will to both the husband and the wife. There needs to be some degree of mutuality in decision making. Even those whose understanding of the Bible leads to a belief in an authoritarian headship of the husband need to incorporate this in order to have a functional family. One way to look at it is that God speaks to the wife through the husband and to the husband through the wife. Jayne Kulikauskas/ jayne@mmalt.guild.org
15soc.religion.christian
In article <C5rIwA.2or@world.std.com> CGKarras@world.std.com (Christopher G Karras) writes: > >After reading the service manual for my bike (Suzuki GS500E--1990) I have >a couple of questions I hope you can answer: > >When checking the oil level with the dip stick built into the oil fill >cap, does one check it with the cap screwed in or not? Most bikes I've seen that use a dipstick rather than a sight glass are designed to check it without screwing it in. In the manual for my CBR900RR, they specifically state it should be done this way. Michael -- +-------------------------------------------------------------+ | Michael Nelson 1993 CBR900RR | | Internet: nelson@seahunt.imat.com Dod #0735 | +-------------------------------------------------------------+
8rec.motorcycles
Monday, April 12, 1993 Kamloops 4 @ Spokane 1 (Kamloops wins 3-0) *** Western Final Matchup Kamloops @ Portland *** Tuesday, April 13, 1993 No games necessary. Wednesday, April 14, 1993 No games necessary. Thursday, April 15, 1993 No games scheduled. Friday, April 16, 1993 Regina 2 @ Swift Current 7 (Series: 0-1) Kamloops 3 @ Portland 6 (Series: 0-1) Saturday, April 17, 1993 Kamloops 4 @ Portland 8 (Series: 0-2) Sunday, April 18, 1993 Swift Current 5 @ Regina 2 (Series: 2-0) WHL Playoff Scoring Leaders April 18, 1993 Player GP G A Pts ------------------------------------------------------- Jamie Black, Tacoma 7 7 15 22 Andy Schneider, Swift Current 8 7 13 20 Valeri Bure, Spokane 9 6 11 17 Allan Egeland, Tacoma 7 9 7 16 Dean McAmmond, Swift Current 8 9 6 15 Jason Krywulak, Swift Current 8 6 9 15 Cam Danyluk, Medicine Hat 10 9 5 14 Todd Holt, Swift Current 8 5 9 14 Tyler Wright, Swift Current 8 5 9 14 Mike Mathers, Kamloops 10 5 9 14 Jeff Friesen, Regina 11 5 9 14 Rick Girard, Swift Current 8 3 11 14 WHL Playoff Leading Goaltenders April 18, 1993 (minimum 60 minutes) Player MP GA SO GAA ------------------------------------------------------- Scott Langkow, Portland 295 12 0 2.44 Milan Hnilicka, Swift Current 497 21 1 2.54 Trevor Robins, Brandon 258 11 0 2.56 Steve Passmore, Kamloops 341 16 1 2.82 Mark Dawkins, Red Deer 269 13 0 2.90 -- Randy A. Coulman, M.Sc. | ARIES Laboratory Research Assistant | Department of Computational Science | University of Saskatchewan coulman@cs.Usask.ca | Saskatoon, SK S7N 0W0
10rec.sport.hockey
In <1r4b59$7hg@aurora.engr.LaTech.edu> ray@engr.LaTech.edu (Bill Ray) writes: >If I make a statement, "That God exists, loves me, etc." but in no way >insist that you believe it, does that place a burden of proof upon me. >If you insist that God doesn't exist, does that place a burden of proof >upon you? I give no proofs, I only give testimony to my beliefs. I will >respond to proofs that you attempt to disprove my beliefs. What is your reaction to people who claim they were abducted by space aliens? Some of these people say, "I was abducted, experimented on, etc." If we insist that these aliens don't exist is the burden of proof placed on us. These people can give no hard facts but can give a lot of testimony to back up their beliefs. Replace <space aliens> with <elvis>, <big foot>, <blue unicorns>, and we have a larger percentage of the population than I like to think about. Sometimes I wonder if reality really is a different experience for everone.
0alt.atheism
In article <1993Apr21.165206.13060@ac.dal.ca>, arishem@ac.dal.ca writes: > > Well, thanks to Matthew Wall, the Major League baseball logos which I've been > posting over the past number of weeks now have a home at the Internet > Baseball Archive. > To get them, FTP to eucalyptus.cc.swarthmore.edu, login anonymously as per > usual, and cd to the baseball/misc/graphics directory. Both the GIF files > and the uuencoded versions are available. > > Darren > > Darren Reiniger reiniger@ug.cs.dal.ca || arishem@ac.dal.ca > Centre For Marine Geology, Dalhousie University, Halifax, N.S., Canada > | People who wonder where this generation is going should remind themselves | > | where it came from in the first place. | I have successfully copied all of the uuencoded versions of these logos to my local directory, but when I tried the GIF files, it said "Permission denied". Could you explain why, and also how to execute the uuencoded files? Thanks, Ken ================================================================================ % KEN CRUZ | 1993 NFL CHAMPS: DALLAS COWBOYS % % JOHNS HOPKINS UNIVERSITY | 1993 MLB CHAMPS: BALTIMORE ORIOLES % % BALTIMORE, MARYLAND | 1993 ALL-STAR GAME @ ORIOLE PARK at CAMDEN YARDS% ================================================================================
9rec.sport.baseball
In article <1993Apr14.153137.1@ulkyvx.louisville.edu> pjtier01@ulkyvx.louisville.edu writes: > >If the Braves >continue to average 3 runs a game, then 3 is where they will finish. > P. Tierney So, if the Braves run production falls to 1 per game, which is certainly where it's headed (if they're lucky), does that mean they'll finish first? -- @econ.duke.edu fls@econ.duke.edu fls@econ.duke.edu fls@econ.duke. s To my correspondents: My email has been changed. e l My new address is: fls@econ.duke.edu d f If mail bounces, try fls@raphael.acpub.duke.edu u
9rec.sport.baseball
David Reeve Sward <sward+@CMU.EDU> writes: > We don't know this, do we? The algorithm is classified. I speculate, from the MykoTronx data sheet on the MYK-78, that the algorithm is a classified cryptosystem, similar in application to DES but cleared by the NSA for classified traffic, that has been in use for a number of years. Myktotronx refers to it as "Government Type II encryption", which matches the designation of one of the types of encryption available on STU-III phones, and may be the same as a cryptosystem I have heard called "CIPHER2". This would make sense, since this is evidently a field-proven cryptosystem which can act as a "pin-compatible" substitute for DES. Combined with a tappable key exchange protocol, this would offer exactly what is claimed for Clipper: secure encryption with access via a key escrow. If this is fact the case, it would make me quite confident of the encipherment algorithm itself. Now, I do not know if these are in fact the same cryptosystem; my knowledge of classified cryptography isn't even fuzzy :), it's nonexistent. However, it would certainly have been the least-effort approach on the part of the government: take an old military cipher that people can drop in place of DES (and which is at least as secure), set up a key escrow scheme for law enforcement, and promote it for public use. This also fits with Mykotronx, who's been around but almost invisible for years. Has anyone else made this sort of connection, or am I just hallucinating pink elephants here? :). My curiousity has been piqued... Amanda Walker InterCon Systems Corporation
11sci.crypt
Hay all: Has anyone out there heard of any performance stats on the fabled p24t. I was wondering what it's performance compared to the 486/66 and/or pentium would be. Any info would be helpful. Later BoB -- Robert Novitskey | rrn@po.cwru.edu | (216)754-2134 | CWRU Cleve. Ohio ---------------------------------------------------------------------- COMPUTER ENGINEER AND C PROGRAMMER | NOW SEEKING SUMMER JOBS ----------------------------------------------------------------------
3comp.sys.ibm.pc.hardware
In article <1rm2bn$kps@transfer.stratus.com> Randy_Faneuf@vos.stratus.com writes: > > Someone please help me. I am searching to find out (as many others may) >an absolute 'cure' to removing all detectable traces of marijuana from >a persons body. Is there a chemical or natural substance that can be >ingested or added to urine to make it undetectable in urine analysis. >If so where can these substances be found. You could do what I do: never go near the stuff! :) -- :- Michael A. Covington, Associate Research Scientist : ***** :- Artificial Intelligence Programs mcovingt@ai.uga.edu : ********* :- The University of Georgia phone 706 542-0358 : * * * :- Athens, Georgia 30602-7415 U.S.A. amateur radio N4TMI : ** *** ** <><
13sci.med
In article <1993Apr6.233805.29755@freenet.carleton.ca> aa649@Freenet.carleton.ca (Ralph Timmerman) writes: >From: aa649@Freenet.carleton.ca (Ralph Timmerman) >Subject: Re: YANKKES 1 GAME CLOSER >Date: Tue, 6 Apr 1993 23:38:05 GMT >In a previous article, 002251w@axe.acadiau.ca (JASON WALTER WORKS) says: >> The N.Y.Yankees, are now one game closer to the A.L.East pennant. They >>clobbered Cleveland, 9-1, on a fine pitching performance by Key, and two >>homeruns by Tartabull(first M.L.baseball to go out this season), and a three >>run homer by Nokes. For all of you who didn't pick Boggs in your pools, >>tough break, he had a couple hits, and drove in a couple runs(with many more >>to follow). The Yanks beat an up and coming team of youngsters in the >>Indians. The Yankees only need to win 95 more games to get the division. >> GO YANKS., Mattingly for g.glove, and MVP, and Abbot for Cy Young. >> >> ---> jason. >> >Does that mean we have to read this drivel another 95 times this season? >Please spare us... And check you facts before you post! >-- >Ralph Timmerman "There is no life after baseball" >aa649@freenet.carleton.ca No one says you have to read any of it Ralph.. Go play in traffic.., or take a nap... They work for me.. ========================================================================= | Kevin Kerr kkerr@mkcase1.dseg.ti.com | # | President North Texas 'C' Programmers Users Group | | BBS-(214) 442-0223 | | GO YANKEES !!! GO DOLPHINS !!! | | | | "Strolling through cyberspace, sniffing the electric wind...." | =========================================================================
9rec.sport.baseball
In article <1qvmk2$csk@morrow.stanford.edu> salem@pangea.Stanford.EDU (Bruce Salem) writes: > (Wouldn't it be nice if Subject: lines had something to do >with nessage bodies!) Yes. > I wonder if the Universe would look like a Black Hole >from "outside"? How could we posit an "Outside", whether called >DeSitter space, hyperspace, parallel universes, whatever? I don't think that the universe would look like a black hole from the outside, because that would imply that similar to a black hole we would see stuff coming in from the "outside." > Suppose that such a space existed, and that our universe >looked like a Black Hole in it. Then our Universe could be open >to it through Hawking radiation, the same way Black Holes are >within our Universe. Note this is all the purist speculation >and noone knows what laws govern QM beyond the event horizon >of our universe. Can laws change at such boundaries of space-time? I am personally convinced that what we call our "universe" is only a small part of a larger system. Further, I think that it is logically necessary for the laws of our universe be confined to this universe itself. Why do I believe this? It is simple; I believe that the odds against there being only one universe and that universe having the right conditions to support us are infinate. I believe that to explain our existance in this universe it is necessary to either consider multiple universes (an infinate number of them) or intelligent design. Since the only intelligence that we know of is of a higher order than simple matter (the brain is made of matter) by Ockham's razor I go for the first choice. What's more, there are a couple of books out dealing with popular science that use parallel universes and holographic universes (which is another way of saying parallel) to explain the behavior of particals at the quantum level. One is called Parallel Universes, and I think it is by Wolf, the other The Holographic Universe. BTW, the parallel universe approach implys an element of mind in the very physical reality of the universe. >Bruce Salem > eric
19talk.religion.misc
I believe it goes or will go: 680060 powerPC Pentium 680040 486 680030 386 680020 286=680000 In a resent article in one of the macMags I think a 50mHz 030 accelerator was slightly slower than a 25mHz 040 accel. But, this is using a system designed for the 030. So, It stands to reason that a system designed for an 040 ie quadra) would do better. So overall I'd figure 040 = 030 * 2.5 or so. Along the same lines the new POwerPC stuff is supposed to run the system at the level of a fast quadra, but system 8 or whatever will allow 3 times the speed of a 040 in the powerPC based systems. and wait for the 680060. I think it laps the pentium. pro-life pro-women -- =*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*= Michael Ameres - Internet: Michael.Ameres@f204.n2603.z1.fidonet.org
4comp.sys.mac.hardware
> >No. reverse lights are to warn others that you are backing up. They >aren't bright enough to (typically) see by without the brake and tail >lights. > > >Craig Perhaps instead of this silly argument about what backup lights are for, couldn't we agree that they serve the dual purpose of letting people behind your car know that you have it in reverse and that they can also light up the area behind your car while you're backing up so you can see? Backup lamps on current models are much brighter than they used to be on older cars. Those on my Taurus Wagon are quite bright enough to illuminate a good area behind the car, and they're MUCH brighter than those on my earlier cars from the 60s and 70s. Insofar as Vettes having side backup lights, look at a '92 or '93 model (or perhaps a year or two earlier too) and you'll see red side marker lamps and white side marker lamps both near the car's hindquarters. Those aren't just white reflectors. Harv
7rec.autos
I downloaded an image of the earth re-constructed from elevation data taken at 1/2 degree increments. The author (not me) wrote some c-code (included) that read in the data file and generated b&w and pseudo color images. They work very well and are not incumbered by copyright. They are at an aminet site near you called earth.lha in the amiga/pix/misc area... I refer you to the included docs for the details on how the author (sorry, I forget his name) created these images. The raw data is not included. -- David David M. Ingebretsen Evans & Sutherland Computer Corp. dingebre@thunder.sim.es.com Disclaimer: The content of this message in no way reflects the opinions of my employer, nor are my actions encouraged, supported, or acknowledged by my employer.
1comp.graphics
Caps/Isles Fans, Anyone interested in catching the games from Nassau Coliseum (hopefully there will be another) can catch the game at North Carolina's Original Sports Bar in Chapel Hill. I'm pretty sure they carry HTS as well. They had all three games on at the same time last night. This is the only place I know to catch all of the Stanley Cup action. Frank Salvatore fmsalvat@eos.ncsu.edu
10rec.sport.hockey
In article <1993Apr15.051746.29848@news.duc.auburn.edu> snydefj@eng.auburn.edu writes: > >I am looking for any information concerning projects involving Solar > Sails I was at an interesting seminar at work (UK's R.A.L. Space Science Dept.) on this subject, specifically on a small-scale Solar Sail proposed as a student space project. The guy giving the talk was keen to generate interest in the project. I'll typein the handout he gave out at the meeting. Here goes : The Microlight Solar Sail ------------------------- 1. Introduction The solar sail is a well-established concept. Harnessing the pressure of sunlight, a spacecraft would have unlimited range. In principle, such a vehicle could explore the whole Solar System with zero fuel consumption. However it is more difficult to design a practical solar sail than most people realize. The pressure of sunlight is only about one kilogram per square kilometer. Deploying and controlling the large area of aluminized fabric which would be necessary to transport a 'conventional' type spacecraft is a daunting task. This is why, despite the potential of hte idea, no such craft has actually been launched to date. 2.Design Recent advances in microelectronics make possible a different concept: a tiny sail just a few metres in diameter which could be controlled purely be electronics, with no mechanical parts. Several attitude control methods are feasible: for example the pressure sunlight exerts on a panel of solar cells varies according to whether power is being drawn. The key components of the craft will be a minute CCD camera developed at Edinburgh University which can act as both attitude sensor and data gathering device; solar cells providing ~1 watt power for control and communication; and a directional radio antenna etched onto the surface of the sail itself. Launched as a piggyback payload, the total cost of the mission can be limited to a few tens of thousands of dollars. 3.Missions The craft would be capable of some ambitious missions. For example: a) It could rendezvous with a nearby asteroid from the Apollo or Amor groups. Closeup pictures could be transmitted back to Earth at a low bit rate. b) It could be steered into a lunar polar orbit. Previously unobserved areas around the lunar poles could be viewed. By angling the sail to reflect sunlight downwards, polar craters whose bases never receive sunlight could be imaged. Bright reflections would confirm that volatiles such as water ice have become trapped in these locations.[Immensely valuable information for setting up a manned lunar base, BTW] c) It could be sent to rendezvous with a small asteroid or comet nucleus. Impacting at low speed, a thin wire probe attached to the craft causes it to rebound while capturing a tiny sample is a sharp-edged tube, like performing a biopsy. Returning to Earth, the sail acts as an ideal re-entry parachute: load per unit area 20 gm/m2 ensures that heat is reradiated so efectively that the sail temperature cannot exceed ~300 deg C. The material sample is recovered, enclosed in a small insulating container. Contact: Colin Jack Tel. 0865-200447 Oxford Mathematical Designs, 131 High Street, Oxford OX1 4DH, England -------------------------------- This guy would love to hear from anyone interested in this project or seeking details or anything, and would be most happy to send you more information. Andy -- ----------------------------------- Andy Jonathan J. Broderick, | "I have come that they might have | Rutherford Lab., UK | life, and have it to the full" | Mail : ajjb@adam2.bnsc.rl.ac.uk | - Jesus Christ |
14sci.space
In article <15427@optilink.COM> cramer@optilink.COM (Clayton Cramer) writes: ## Don't forget that 25% had 20 or more partners.... # #Not surprising. Remember, that study includes homosexuals as well. Err, earth to Clayton, you posted this to show that 2% were homosexual. So if we assume EVERY homosexual was promiscious, that leads us to conclude that 23 percent of heterosexuals are promiscious. And that first assumtion is a bad one. Clayton, it *IS* suprising from the claims you are making. -- -Greg Hennessy, University of Virginia USPS Mail: Astronomy Department, Charlottesville, VA 22903-2475 USA Internet: gsh7w@virginia.edu UUCP: ...!uunet!virginia!gsh7w
18talk.politics.misc
I'm starting an informal poll on goalie masks. I'd like to know who's mask you think looks the best. I've always like Curtis Joseph's of the Blues the best. Anyway, send your nominations to me, or post your vote here on r.s.h. My e-mail adress is: gtd597a@prism.gatech.edu Thanks for your time. -- GO SKINS! ||"Now for the next question... Does emotional music have quite GO BRAVES! || an effect on you?" - Mike Patton, Faith No More GO HORNETS! || GO CAPITALS! ||Mike Friedman (Hrivnak fan!) Internet: gtd597a@prism.gatech.edu
10rec.sport.hockey
In article <1993Apr28.100131.157926@zeus.calpoly.edu> dfield@flute.calpoly.edu (InfoSpunj (Dan Field)) writes: >The term "stat" is used not only in medicine, but is a commonly used >indicator that something is urgent. > >Does anyone know where it came from? My dictionary was not helpful. > >-- From the word 'statim' (Latin, I think), meaning immediately. ========================= Howard Doyle doyle+@pitt.edu
13sci.med
In article <1993Apr12.220600.10691@nrao.edu> rgooch@rp.CSIRO.AU (Richard Gooch) writes: >In article <1993Apr12.155820.82@aedc-vax.af.mil>, bonds@aedc-vax.af.mil writes: >> I am reposting this because I am not sure my first post ever made it out. >> I have built and installed X11R5 on my SPARCstation 2. My aim is to run >> the MIT X server but retain the OpenLook Window Manager. I am sure this >> is not uncommon, but I just want to make sure that I change and/or delete >> everything that I need to. For instance, I can start xdm in rc.local, but >> how do I get rid of Xnews? >> > > The OpenLook window manager source is available on the MIT contrib tapes > or from export.lcs.mit.edu .I would suggest building this too, rather than > using the version from OpenWindows. It is olwm v3. > I would suggest skipping olwm and getting olvwm instead. This version of the olwm window manager implements a virtual desktop that I find really handy even on large monitors. This version is also available at export.lcs.mit.edu:/contrib/olvwm3.tar.Z. The README file also suggest getting the files in /contrib/xview3. In my case, I built the X Server first, Xview second, then olvwm. All of these were installed into /usr/X5. Once I verified the server worked correctly, I happily issued "rm -rf /usr/openwin/*". Using gcc 2.3.3 to build all of the above resulted in a windowing system that is, for all intents and purposes, identical to OpenWindows 3.0 and that is incredibly faster. There is a bit of tweaking you will have to do if you want things to work _exactly_ like OpenWindows, but not much. -- Paul Bash Techware Design bash@tware.com Boulder, CO U.S.A.
5comp.windows.x
Hello, I just got some SIMMs, at least one of which does not work. I don't know if there is a software that can test SIMMs thoroughly or I could just rely on the RAM test performed by my computer during the start up. When I installed a dead SIMM into an LC or an LC II, there would be a strange music and no display on the screen. Why? I need your help! Thanks in advance Yih-Tyng ytwu@magnus.acs.ohio-state.edu
4comp.sys.mac.hardware
cdt@sw.stratus.com (C. D. Tavares) writes: >In article <1993Apr15.171601.25930@dg-rtp.dg.com>, meyers@leonardo.rtp.dg.com (Bill Meyers) writes: >> A BILL >> >> To establish the right to obtain firearms for security, and >> to use firearms in defense of self, family, or home, and >> to provide for the enforcement of such right. >Maybe I'm too "religious," but when I see a bill to "establish a right," >I wince. Keep in mind, what the law giveth, the law can taketh away. >-- >cdt@rocket.sw.stratus.com --If you believe that I speak for my company, >OR cdt@vos.stratus.com write today for my special Investors' Packet... I don't think your objection is beyond the bounds of rationality. The right mentioned in the bill is already established under the Second Amendment; the bill should be reworded to reaffirm the Second Amendment RKBA, and then establish the procedures for redress through the federal court system. The right already exists and is already embodied in our Constitution. aaron arc@cco.caltech.edu
16talk.politics.guns
In article <WHALEY.93Apr19171228@sigma.kpc.com> whaley@sigma.kpc.com (Ken Whaley) writes: > As per your question: why not have the button handler add the object, and > then call the "window_redraw()" (or whatever) directly? Although, depending This design will work but I don't think it can take easily take advantage of expose event redraw optimization; that is, the whole window will be redrawn, not just the area with the new item. P.S. I'm replying here because my/your mailer didn't agree with the return address whaley@sigma.kpc.com.
5comp.windows.x
I am looking for one of those color LCD screens you place on an overhead projector and control the presentation with a Mac. Can you recommend me a particular brand? What price are we talking about? Thanks, -- Jan Vandenbrande jan@ug.eds.com (New address) jan@lipari.usc.edu (school address, forwards) UUCP: {uunet, uupsi}!ug!jan
4comp.sys.mac.hardware
paul@csd4.csd.uwm.edu (Paul R Krueger) writes: >In article <1993Apr23.151050.8995@sctc.com> macomber@sctc.com (Chuck Macomber) writes: >> >>Wednesday's game marked the first opposing left-handed starting pitcher for the >>Twins this year (Rickey Bones). > Nice post Chuck, but you made just one mistake. Bones is a right-handed > pitcher. However, Hrbek's grand slam came off Graehme Lloyd, a lefty. > --salty My mistake. -- Chuck
9rec.sport.baseball
Accounts of Anti-Armenian Human Right Violations in Azerbaijan #010 Prelude to Current Events in Nagorno-Karabakh +-------------------------------------------------------+ | | | On the way the driver says, "In fact there aren't any | | Armenians left. 'They burned them all, beat them all, | | and stabbed them." | | | +-------------------------------------------------------+ DEPOSITION OF VANYA BAGRATOVICH BAZIAN Born 1940 Foreman Baku Spetsmontazh Administration (UMSMR-1) Resident at Building 36/7, Apartment 9 Block 14 Sumgait [Azerbaijan] During the first days of the events, the 27th and the 28th [of February], I was away on a business trip. On the 10th I had got my crew, done the paper- work, and left for the Zhdanov District. That's in Azerbaijan, near the Nagorno Karabagh region. After the 14th, rumors started to the effect that in Karabagh, specifically in Stepanakert, an uprising had taken place. They said "uprising" in Azerbaijani, but I don't think it was really an uprising, just a demonstration. After that the unrest started. Several Armenians living in the Zhdanov District were injured. How were they injured? They were beaten, even women; it was said that they were at the demonstrations, but they live here, and went from here to Karabagh to demonstrate. After that I felt uneasy. There were some conversations about Armenians among the local population: the Armenians had done this, the Armenians had done that. Right there at the site. I was attacked a couple of times by kids. Well true, the guys from my crew wouldn't let them come at me with cables and knives. After that I felt really bad. I didn't know where to go. I up and called home. And my children tell me, "There's unrest everywhere, be careful." Well I had a project going on. I told the Second Secretary of the District Party Committee what had been going on and said I wanted to take my crew off the site. They wouldn't allow it, they said, "Nothing's going to happen to you, we've entrusted the matter to the police, we've warned everyone in the district, nothing will happen to you." Well, in fact they did especially detail us a policeman to look after me, he knows all the local people and would protect me if something happened. This man didn't leave me alone for five minutes: he was at work the whole time and afterward he spent the night with us, too. I sense some disquiet and call home; my wife also tells me, "The situation is very tense, be careful." We finished the job at the site, and I left for Sumgait first thing on the morning of the 29th. When we left the guys warned me, they told me that I shouldn't tell anyone on the way that I was an Armenian. I took someone else's business travel documents, in the name of Zardali, and hid my own. I hid it and my passport in my socks. We set out for Baku. Our guys were on the bus, they sat behind, and I sat up front. In Baku they had come to me and said that they had to collect all of our travel documents just in case. As it turns out they knew what was happening in Sumgait. I arrive at the bus station and there they tell me that the city of Sumgait is closed, there is no way to get there. That the city is closed off and the buses aren't running. Buses normally leave Baku for Sumgait almost every two minutes. And suddenly--no buses. Well, we tried to get there via private drivers. One man, an Azerbaijani, said, "Let's go find some other way to get there." They found a light transport vehicle and arranged for the driver to take us to Sumgait. He took us there. But the others had said, "I wouldn't go if you gave me a thousand rubles." "Why?" "Because they're burning the city and killing the Armenians. There isn't an Armenian left." Well I got hold of myself so I could still stand up. So we squared it away, the four of us got in the car, and we set off for Sumgait. On the way the driver says, "In fact there aren't any Armenians left. 'They burned them all, beat them all, and stabbed them." Well I was silent. The whole way--20-odd miles--I was silent. The driver asks me, "How old are you, old man?" He wants to know: if I'm being that quiet, not saying anything, maybe it means I'm an Armenian. "How old are you?" he asks me. I say, "I'm 47." "I'm 47 too, but I call you 'old man'." I say, "It depends on God, each person's life in this world is different." I look much older than my years, that's why he called me old man. Well after that he was silent, too. We're approaching the city, I look and see tanks all around, and a cordon. Before we get to the Kavkaz store the driver starts to wave his hand. Well, he was waving his hand, we all start waving our hands. I'm sitting there with them, I start waving my hand, too. I realized that this was a sign that meant there were no Armenians with us. I look at the city--there is a crowd of people walking down the middle of the street, you know, and there's no traffic. Well probably I was scared. They stopped our car. People were standing on the sidewalks. They have armature shafts, and stones . . . And they stopped us . . . Along the way the driver tells us how they know who's an Armenian and who's not. The Armenians usually . . . For example, I'm an Armenian, but I speak their language very well. Well Armenians usually pronounce the Azeri word for "nut," or "little nut," as "pundukh," but "fundukh" is actually correct. The pronunciations are different. Anyone who says "pundukh," even if they're not Armenian, they immediately take out and start to slash. Another one says, "There was a car there, with five people inside it," he says. "They started hitting the side of it with an axe and lit it on fire. And they didn't let the people out," he says, "they wouldn't let them get out of the car." I only saw the car, but the driver says that he saw everything. Well he often drives from Baku to Sumgait and back . . . When they stop us we all get out of the car. I look and there's a short guy, his eyes are gleaming, he has an armature shaft in one hand and a stone in the other and asks the guys what nationality they are one by one. "We're Azerbaijani,' they tell him, 'no Armenians here." He did come up to me when we were pulling our things out and says, "Maybe you're an Armenian, old man?" But in Azerbaijani I say, "You should be ashamed of yourself!" And . . . he left. Turned and left. That was all that happened. What was I to do? I had to . . . the city was on fire, but I had to steal my children out of my own home. They stopped us at the entrance to Mir Street, that's where the Kavkaz store and three large, 12-story buildings are. That's the beginning of down-town. I saw that burned automobile there, completely burned, only metal remained. I couldn't figure out if it was a Zhiguli or a Zaporozhets. Later I was told it was a Zhiguli. And the people in there were completely incinerated. Nothing remained of them, not even any traces. That driver had told me about it, and I saw the car myself. The car was there. The skeleton, a metallic carcass. About 30 to 40 yards from the Kavkaz store. I see a military transport, an armored personnel carrier. The hatches are closed. And people are throwing armature shafts and pieces of iron at it, the crowd is. And I hear shots, not automatic fire, it's true, but pistol shots. Several shots. There were Azerbaijanis crowded around that personnel carrier. Someone in the crowd was shooting. Apparently they either wanted to kill the soldiers or get a machine gun or something. At that point there was only one armored personnel carrier. And all the tanks were outside the city, cordoning off Sumgait. I walked on. I see two Azerbaijanis going home from the plant. I can tell by their gait that they're not bandits, they're just people, walking home. I joined them so in case something happened, in case someone came up to us and asked questions, either of us would be in a position to answer, you see. But I avoided the large groups because I'm a local and might be quickly recognized. I tried to keep at a distance, and walked where there were fewer people. Well so I walked into Microdistrict 2, which is across from our block. I can't get into our block, but I walked where there were fewer people, so as to get around. Well there I see a tall guy and 25 to 30 people are walking behind him. And he's shouting into a megaphone: "Comrades, the Armenian- Azerbaijani war has begun!" The police have megaphones like that. So they're talking and walking around the second microdistrict. I see that they're coming my way, and turn off behind a building. I noticed that they walked around the outside buildings, and inside the microdistricts there were about 5 or 6 people standing on every corner, and at the middles of the buildings, and at the edges. What they were doing I can't say, because I couldn't get up close to them, I was afraid. But the most important thing was to get away from there, to get home, and at least find out if my children were alive or not . . . April 20, 1988 Yerevan - - - reference - - - [1] _The Sumgait Tragedy; Pogroms against Armenians in Soviet Azerbaijan, Volume I, Eyewitness Accounts_, edited by Samuel Shahmuradian, forward by Yelena Bonner, 1990, published by Aristide D. Caratzas, NY, pages 158-160 -- David Davidian dbd@urartu.sdpa.org | "How do we explain Turkish troops on S.D.P.A. Center for Regional Studies | the Armenian border, when we can't P.O. Box 382761 | even explain 1915?" Cambridge, MA 02238 | Turkish MP, March 1992
17talk.politics.mideast
Software that comes together with the VideoBlaster is designed to work together with the SoundBlaster (from the same manufacturer). Since I do not own a SoundBlaster: is there a possibility to use the PC Speaker driver to play audio files for the VideoBlaster (.AVI = audio video interleave files) ? I think what I should have is a device driver for the Media Player that controls the PC Speaker Driver instead of the SoundBlaster card (something like MCISPKR.DRV). Has anybody heard of such a driver? Or am I on the wrong track? Any information on this appreciated! (Please send e-mail, since I don't watch this group regularly.) _V_ | Joerg Meyer / \ | E-Mail: j_meyer@informatik.uni-kl.de |O O| | University of Kaiserslautern, Germany ooO--U--Ooo | ------- This space for rent ! -------
2comp.os.ms-windows.misc
In <1993Apr20.182038.12009@ee.eng.ohio-state.edu> butzerd@maumee.eng.ohio-state.edu (Dane C. Butzer) writes: >What are the typical sizes for keys for commercial secret key algorithms? >I know DES is 56 bits ("tripple DES" is 112 bits) and IDEA is 128 bits. Is >there anything made in the US that has 128 bit keys? Anything anywhere >that has larger keys? I've heard that RC2 can be scaled to arbitrarily >large keys, but is this actually implemented anywhere? My MDC cipher (which uses any one-way hash function as a CFB-mode stream cipher, the current implementation uses MD5) uses a key of up to 2048 bits (that is, you can use a 1-bit key if you want and copy it over the entire 2048-bit range, or you can use the entire 2048 bits). Runtime is independant of key size, the system runs slightly slower than MD5 itself. I presume RC2 and RC4 use a similar system (or possibly they just hash an arbitrary-length key down to n bits, maybe 128, using something like MD5). Peter.
11sci.crypt
Andrew Richard Conway (arc@leland.Stanford.EDU) wrote: : P.S. I can't work out why the US government doesn't want to sell : them overseas. After all, they are rather easy for US interests to decode, : so make a perfect tool for industrial/military espionage...lulling : anyone stupid enough to buy it into a false sense of security. You will : notice that there is NO mention anywhere about safety for non-Americans. Don't forget, you are in the country that wouldn't let the Russians buy Apple II's because of security concerns. -- Ben (-: bena@bruce.cs.monash.edu.au :-)
11sci.crypt
In article 1328@geneva.rutgers.edu, gt7122b@prism.gatech.edu (boundary) writes: >dleonar@andy.bgsu.edu (Pixie) writes: [deletia- sig] >> p.s. If you do sincerely believe that a god exists, why do you follow >>it blindly? >> Do the words "Question Authority" mean anything to you? >> I defy any theist to reply. > [deletia- formalities] I probably should let this pass, it's not worth the time, and it's not really intended for me. But I couldn't resist. A personal weakness of mine. Jerkius Kneeus. Tragically incurable. >The foundation for faith in God is reason, without which the existence >of God could not be proven. That His existence can be proven by reason >is indisputable (cf. my short treatise, "Traditional Proofs for the >Existence of God," and Summa Theologica). Not so; I can prove that the existance of God is disputable by showing that people dispute it; This is easy: I dispute that God exists. Simple. I missed your "Traditional Proofs" treatise, but the proofs I remember from the Summa Theologic (the 5 ways I think it was) were rather poor stuff. The Ontological argument is about a billion times better, imho. I would think you'd want non-traditional proofs, considering the general failure of the traditional proofs: at least the ones I know of. (I am thinking of the Ontological Argument, the Cosmological Argument and the Teleological argument. Those are the ones traditional enough to have funny names, anyway.) >Now, given that God exists, and that His existence can be proven by reason, >I assert that His commands must be followed blindly, although in our fallen >condition we must always have some measure of doubt about our faith. Why? This is the real question. So to discuss it, I'll assume God exists. Otherwise, there is no heavenly authority to babble about. >Because God is the First Cause of all things, the First Mover of matter, >the Independent Thing that requires nothing else for its existence, the >Measure of all that is perfect, and the essential Being who gives order >to the universe (logos). Please show this is the case. I am familiar with the First Cause argument, and I'll accept (for the sake of argument) that there is a First Cause, even though I find some of its premices questionable. The rest you'll have to show. This includes that the First Cause is God. >I next assert that God is all good. Got it. I deny that God is all good. So there. > If this is so, then that which is >contrary to the will of God is evil; i.e., the absence of the good. And, >since God can never contradict Himself, then by His promise of a Savior >as early as the Protoevangelium of Genesis 3:5, God instructs that because >a human (Adam) was first responsible for man's alienation from the Source >of all good, a man would be required to act to restore the friendship. >Thus God became incarnate in the person of the Messiah. This isn't self-consistent: if humans must renew the relationship, then God (incarnate or not) can't do it. Well, unless you think God is human. Granted, God made himself 'human', but this is nonetheless cheating: The intent of the statement is clearly that man has to fix the problem he caused. God fixing it- even by indirect means- contradicts this. >Now this Messiah claimed that He is the Truth (John 14:6). If this claim >is true, then we are bound by reason to follow Him, who is truth incarnate. Why? Also, why assume said claim is true anyway? If *I* claim to be Truth, are you bound by reason to follow me? >You next seem to have a problem with authority. Have you tried the United >States Marine Corps yet? I can tell you first-hand that it is an excellent >instructor in authority. :) Undoubtably. Do you mean to imply we should all obey the commands of the Marines without question? You seem to imply this about God, and that the Marines are similar in this respect.. If this is not what you are trying to say, they please explain what it is you are saying, as I have missed it. > If you have not yet had the privilege, I will >reply that the authority which is Truth Incarnate may never be questioned, >and thus must be followed blindly. Why? Why not question it? Even if it *is* truth, we cannot know this certainly, so why is it so irrational to question? Perhaps we will thus discover that we were wrong. You assert that God is Truth and we can't question Truth. But I assert that God is not Truth and anyway we can question Truth. How is it my assertion is less good than yours? > One may NOT deny the truth. Oh? I hereby deny 1+1=2. I hope you'll agree 1+1=2 is the truth. Granted, I look pretty damn silly saying something like that, but I needed something we'd both agree was clearly true. Now, you'll notice no stormtroopers have marched in to drag me off to the gulag. No heaven lighting bolts either. No mysterious net outages. I seem to be permited to say such things, absurd or not. > For >example, when the proverbial apple fell on Isaac Newton's head, he could >have denied that it happened, but he did not. The laws of physics must >be obeyed whether a human likes them or not. They are true. They are certainly not true. At least, the ones Newton derived are not true, and are indeed wildly inaccurate at high speeds or small distances. We do not have a set of Laws of Physics that always works in all cases. If we did, Physics would be over already. Science is all about Questioning this sort of truth. If we didn't, we'd still follow Aristotle. I'd generalize this a little more: If you want to learn anything new, you MUST question the things you Know (tm). Because you can always be wrong. >Therefore, the Authority which is Truth may not be denied. Even presupposing that Truth may not be Denied, and may not be Questioned, and that God is Truth, it only follows that God may not be Denied or Questioned. NOT that he must be obeyed! We could unquestioningly DISobey him. How annoying of us. But you have not connected denial with disobedience. --- - Dan "No Nickname" Johnson And God said "Jeeze, this is dull"... and it *WAS* dull. Genesis 0:0 These opinions probably show what I know.
15soc.religion.christian
In article <211353@mavenry.altcit.eskimo.com>, maven@mavenry.altcit.eskimo.com (Norman Hamer) writes: > > Grf. Dropped my Shoei RF-200 off the seat of my bike while trying to rock > it onto it's centerstand, chipped the heck out of the paint on it... CONGRAULATIONS !!!! Your helmet just passed the Snell Test. > So I cheerfully spent $.59 on a bottle of testor's model paint and > repainted the scratches and chips for 20 minutes. Oh well, as least it looks ok now. Still, it may not save your head as well as before you dropped it. Mike ################################################### # Mike Seales Yamaha XJ600 (same as FJ600) # # Inform Group Ltd. DoD #0793 # # Level 8 DB Tower # # 111 The Terrace Email: homer@inform.co.nz # # Wellington Phone: 64-4-4720996 # # New Zealand Fax: 64-4-4732407 # ###################################################
8rec.motorcycles
I thought that the Clipper Chip that was posted to t.p.g (sorry, I lost the original post) was a joke. I really did. I didn't believe it for a second. But on the way to work this morning, I heard about it on NPR. This scares me almost as much as the doublespeak emanating from the FBI and BATF in Waco. *** Paul Eric Stoufflet *** Columbia Presbyterian Medical Center *** internet: pes3@cunixf.cc.columbia.edu *** All opinions are my own
16talk.politics.guns
Could someone tell me what's in a Cornell-Dubilier EMI Filter FIL 3363-001? It is rated at 13A 115/250VAC 50/60HZ. Is it just MOV's and ferrite? Dave / n2mxx Stevens Institute of Technology Hoboken, New Jersey
12sci.electronics
I'm using a QIC-compatible 250MB streamer, and I really like it. But now a terrible typo in an archive description drives me mad ervery time. Is there any software which can rename, or even better, delete such archives? Any help really appreciated.
3comp.sys.ibm.pc.hardware
Bill Ray (ray@engr.LaTech.edu) wrote: : James Thomas Green (jgreen@trumpet.calpoly.edu) wrote: : : So in conclusion it can be shown that there is essentially no : : logical argument which clearly differentiates a "cult" from a : : "religion". I challenge anyone to produce a distinction which : : is clear and can't be easily knocked down. : How about this one: a religion is a cult which has stood the test : of time. Just like history is written by the `winners' and not the `losers.' From what I've seen of religions, a religion is just a cult that was so vile and corrupt it was able to exert it's doctrine using political and military measures. Perhaps if Koresh withstood the onslaught for another couple of months he would have started attracting more converts due to his `strength,' hence becoming a full religion and not just a cult. -- Carl Christensen /~~\_/~\ ,,, Dept. of Computer Science christen@astro.ocis.temple.edu | #=#==========# | Temple University "Curiouser and curiouser!" - LC \__/~\_/ ``` Philadelphia, PA USA
0alt.atheism
In article <1993Apr20.085508.5787@wvnvms.wvnet.edu>, nflynn@wvnvms.wvnet.edu writes: |> In article <1993Apr19.194025.8967@adobe.com>, |> snichols@adobe.com (Sherri Nichols) writes: |> [...] However, what is with this policy of trying to speed up the |> games. You are the first person ( non-mediot ) I have seen endorse |> this policy. I have no problem with the length of games at all and |> am tired of the ESPN crowd ( and other announcers ) bitching about |> it. I have never been in a ballpark filled with people looking |> at their watches and shouting "Hurry up!" If I cough up big bucks for a |> ticket, I don't mind a game that last more than 2:10. I really don't |> understand it. |> Major League Baseball is trying to expand its appeal to people with shorter attention spans (i.e. the football crowd). (-: Invariably, all the arguments from people who don't like to watch baseball on T.V. say the same thing: the games are too long and too boring. Baseball is trying to find a way to shorten the games for wider T.V. appeal. If you look at it, though, baseball games last around the same amount of time as football games. The difference is that there is "more action" in that duration in football games. Perhaps if there were "more action" in baseball games, you would get more of those fans to tune in. Anyway, coming up with a solution to make baseball more appealing to a bigger crowd is going to be difficult. [On soapbox] Yet another reason to get a commisioner NOW since it's obvious that ruling baseball by comittee works about as fast as a snail race in Nebraska. [Off soapbox] -Steve -- ========================================================================= Steve Conroy | conroy@terminus.saic.com | "I'm gone, man - solid gone! | Science Applications | -Baloo International Corporation | =========================================================================
9rec.sport.baseball
According to what I have read on Biblical idioms, speaking "in X's name" is a standard Aramaic/Hebrew legal idiom for what we today would call Power of Attorney. A person from Jesus' culture authorized to conduct business "in John's name" had full authority over John's financial affairs, but was held under a solemn fiduciary obligation to work only for John's benefit and consonant with John's wishes. It was not required for the steward to preface each business transaction with "in John's name"; it was sufficient to have valid power of attorney and be operating in good faith. (Note the overlap here between legal and religious definitions of "faith".) With this cultural background, praying "in Jesus' name" does not mandate a particular verbal formula; rather it requires that the petitioner be operating faithfully and consciously within an analogous "fiduciary" relationship with Jesus and for the purposes of His Kingdom. The message of "praying in Jesus' name" is thus closely aligned with the parable of the talents and other passages about God's delegation of Kingdom business to his stewards, both resources and responsibilities. This idea of praying "in Jesus' name" is not only present but prominent in the Lord's Prayer, although the verbal forumula is absent. The act of praying the words "In Jesus' Name" may be beneficial if they cause us to clarify the relationship of our requests to the advancement of God's Kingdom. For that reason, I'm not quite ready to say that the praying the formula is without meaning. Prayers to God for other purposes (desperation, anger, thanksgiving, etc.) don't seem to be in this category at all, whether uttered by Christian or non-Christian, whether B.C. or A.D. (that's B.C.E. or C.E. for you P.C. :-). I don't see anything in Christ's words to contradict the idea that God deals with all prayers according to His omniscience and grace. Van Kelly vek@research.att.com The above opinions are my own, and not those of AT&T.
15soc.religion.christian
In article 28328@athos.rutgers.edu, carlson@ab24.larc.nasa.gov (Ann Carlson) writes: >Anyone who thinks being gay and Christianity are not compatible should >check out Dignity, Integrity, More Light Presbyterian churches, Affirmation, >MCC churches, etc. Meet some gay Christians, find out who they are, pray >with them, discuss scripture with them, and only *then* form your opinion. If you were to start your own religion, this would be fine. But there is no scriptural basis for your statement, in fact it really gets to the heart of the problem. You think you know more than scripture. Your faith is driven by feel goodism and not by the Word of God. Just because they are nice people doesn't make it right. You can start all the churches you want and it won't change the fact that it is wrong. That is not to imply that gays don't deserve the same love and forgiveness that anyone else does. But to call their behavior right just because they are nice people is baseless, and it offers Satan a perfect place to work because there is no check on what he is doing. [I suspect Ann was suggesting that you look to see whether the Spirit is alive among them, not whether they are nice people, though there's something to be said for being nice too... --clh]
15soc.religion.christian
In article <1964@igd.fhg.de>, haase@igd.fhg.de (Helmut Haase (Goebel)) writes: |> I've got a problem concerning the maximum size of X pixmaps in DECwindows. |> |> I am using a DECstation 5000/200 running ULTRIX V4.2 (Rev. 96) System #2 |> and UWS V4.2 (Rev. 272) (DECwindows). Our color display has 1280x1024 |> pixels. |> |> |> On other hardware (HP, SGI) I am able to allocate much larger pixmaps. |> |> Did anyone have similar problems before or does onyone know how I can |> configre my system to allow for larger pixmaps? |> |> Any suggestins are welcome. Please send mail to " haase@igd.fhg.de ". |> DEC does this only for their PX and PXG servers, known as 3D accelerators. This boards have local offscreen memory which is limited and slow to handle, thus they set this limit. -- +-o-+--------------------------------------------------------------+-o-+ | o | \\\- Brain Inside -/// | o | | o | ^^^^^^^^^^^^^^^ | o | | o | Andre' Beck (ABPSoft) mehl: Andre_Beck@IRS.Inf.TU-Dresden.de | o | +-o-+--------------------------------------------------------------+-o-+
5comp.windows.x
Ack! Sorry for the repeat posts: I thought I was posting to the newsgroup on which this appeared. Couldn't figure out why it wasn't appearing in my newsgroup. Stupid of me. Slap my hands. Bang my head against the wall. Sorry! Bloody public anouncements...mumble mumble mumble... ============================================================================ David Matthew Deane (deane@binah.cc.brandeis.edu) When the words fold open, it means the death of doors; even casement windows sense the danger. (Amon Liner)
18talk.politics.misc
A relative of mine has recently been diagnosed with "stage 3 papillary cell ovarian cancer". We are urgently seeking the best place in the country for treatment for this. Does anyone have any suggestions? As you might suspect, time is of the essence. Thanks for your help. Bob
13sci.med
: ======================================================================== : Jo Pelkey Phone: (509)375-6947 : Battelle Pacific Northwest Labs Fax: (509)375-3641 : Mail Stop K7-22 Email: je_pelkey@pnl.gov : P.O. Box 999 : Richland, WA 99352 : ======================================================================== Hi Jo, I'm also interested in your questions, so if you get any answers via email and not via repost please let me know. Thanks, rainer. -- Rainer Hochreiter | Telephone: +43 (1) 89100 / 3961 ELIN-Energieanwendung GesmbH | Telefax : +43 (1) 89100 / 3387 Penzingerstr. 76 | A-1141 Wien, Austria/Europe | E-mail : rainer@elin.co.at
5comp.windows.x
In article <93105.215548U28037@uicvm.uic.edu> Jason Kratz <U28037@uicvm.uic.edu> writes: >>>I have been at a shooting range where >>>gang members were "practicing" shooting. >In article <1993Apr15.202811.29312@CSD-NewsHost.Stanford.EDU> andy@SAIL.Stanford.EDU (Andy Freeman) says: >>How do "we" know that they were gang members and not undercover cops >>or even law-abiding menacing minorities. BTW - Why the sneer quotes? > >"We" know because the area that the gun shop/shooting range is in is right on >the border of the west side of Chicago. That is a gang infested area. So? Kratz was there - does that mean that he's a gang member? Even in the most gang-infested areas, most of the residents ARE NOT gang-members. >that only minorities have gangs? Not so. As far as the quotes are concerned >it was totally obvious that they weren't just practicing for marksmanship. How was it obvious? Were they not trying to hit the target? Or, does Kratz confuse "marksmanship" with "trying to simulate a post"? If so, that excludes self-defense shooting, but the rest of us understand that that exclusion would be an error. (It excludes a lot of legit "gun games" as well.) >don't know about you but I have never seen anyone else practice marksmanship by >taking their gun out of their coat as fast as possible and start shooting. Sounds like practical pistol or maybe IPSC. It also sounds like how a self-defense shooter might well practice. The only things that action excludes are hunting and "like a post" shooting. Kratz should get out more often. -andy --
16talk.politics.guns
rjkoppes@news.weeg.uiowa.edu (Randy Koppes) writes: >Have you head of small claims. You may have to put money up >front for the filing fees, and then possibly having the local >sheriff of his/her city to deliver the bad news. In the end >the other party will end up paying for his/her mistake with >interest from the time of the filing to the pay date of the >defendent I think the problem with small claims court is that you have to go to the location of the person you're taking action against. It seems to me the time and money involved in travelling out there (unless this person is close to you) wouldn't be worth it for a small claim. It really depends on how much money you're out. If I am wrong about any of this, someone please correct me! ;) -- ----------------------------------------------------------------- Kenneth Simon Dept of Sociology, Indiana University Internet: KSSIMON@INDIANA.EDU Bitnet: KSSIMON@IUBACS -----------------------------------------------------------------
6misc.forsale
In article <C6BDIo.K7C@news.cso.uiuc.edu> jbh55289@uxa.cso.uiuc.edu (Josh Hopkins) writes: >rbunge@access.digex.net (Robert Bunge) writes: > >It's vandalism because many people -- power companies -- do maliciously waste light. > >"maliciously" implies evil intent. The lighting companies aren't going out >of their way to spoil the sky. They just don't care. > >>If they can sell you >>or your city or your state an unshielded light that wastes 30 to 50 percent >>of its light, they make more _money_. Never mind that your money is wasted. > >It is the responsibility of the customer to choose the most efficient hardware. >If that's what your city will buy, that's what the lighting company will sell. >Write a letter to city hall. That's fine idea, but it only works if the lighting/power company even bothers to supply good light fixtures. For instance, a power company in Virginia recently asked a state commission for permission to sell more lights of various type. Yet, all of the different fixture that they sold and wanted to sell were bad designs - one that wasted the light. Thus, you couldn't even buy a good light from them. In most places, to get a good light, you have to either order it special at high cost or call a store in Arizona. At some point, society starts to make rules. Cars have to pass safety tests. Companies have to meet pollution standards, etc.. There are two ways to achieve this: educate the public so that they demand good lighting or force code down the lighting companies backs. History seems to suggest that the latter is more likely to work. > >Please note that I'm not defending light pollution. The orignial focus of >this thread was space based light sources. > Agreed, so I won't respond again. It's important for all you spacers out there to realize that some people will object to various wild ideas that have been presented. Just like Congress, it would be best to consult the astronomers/lovers of the night sky before you try some PR stunt to boost public knowledge about space. > >-- >Josh Hopkins jbh55289@uxa.cso.uiuc.edu > "Find a way or make one." > -attributed to Hannibal Bob Bunge rbunge@access.digex.com
14sci.space
> = drm6640@tesla.njit.edu writes: >1B Career: DON MATTINGLY!!!!!!!! Lou Gehrig, IRONMAN -- +-+-+-+-+-+-+-+ | Steve Novak | |"Ban the Bomb!" "Ban the POPE!!"| +-+-+-+-+-+-+-+ steven@advtech.USWest.Com
9rec.sport.baseball
stephen@dogmatix.inmos.co.uk (Stephen Collyer) writes: >|> The same thing happens to my car (Citroen 2CV) -- damp gets under the >|> bonnet (US: "hood") and shorts the spark-plugs to earth so it won't start. >|> >|> The solution (for the car) is to clean the plug leads and spray with >|> WD-40 (moisture repellant). If damp *is* the problem, then storing the >Well, this is off-topic, but back in the days when I used to drive bangers >I never found WD-40 to do anything that wiping with a dry cloth did'nt do. >I think the effectiveness of WD-40 is a myth invented by the guy who owns >the company. Back in high school I used to work for a detailing company, and one of the services we offered was an engine cleaning (remove all that oil BEFORE you sell the car... ;-}). Unfortunately, we did not have a high pressure washer so we would use one several miles from the shop. On more than one occasion after washing the engine, it would not start as water would have gotten under the distributor (I would put a plastic bag around it to try and minimize this), around the spark plug wires, etc and it would be nearly IMPOSSIBLE to try and wipe all these areas down with a dry rag. The usual solution was to carry a can of WD-40, and when the car wouldn't start to spray all the likely areas and it would then start on the very first time. It may be a myth, but it certainly kept me from being stranded at a car wash... -- --- Rodney Radford || Computer Graphics/Imaging sasrer@unx.sas.com || SAS Institute, Inc. (919) 677-8000 x7703 || Cary, NC 27513
12sci.electronics
In article <1993Apr7.134501.4632@magnus.acs.ohio-state.edu> vsloutsk@magnus.acs.ohio-state.edu (Vladimir Sloutsky) writes: > > Apartment for rent in downtown Moscow!!! > >2- room furnished apartment in a very nice location. 5 minutes walk to >Belorusskaya subway station. Walking distance to Kremlin, major shopping >centers, theaters, restaurants, and government buildings. > Hmmm... Interesting. What do you mean by WALKING distance? I lived in Moscow for 21 years, and if I am 5 minutes walk to Belorusskaya subway station, I CANNOT be walking distance to Kremlin. Unless 1 hour of walking is what you mean. By the way, what is the price? I may plan a trip there (not sure yet, though) in late summer. Vick (victorf@seas.ucla.edu)
6misc.forsale
In article <93Apr22.205325.32751@acs.ucalgary.ca>, parr@acs.ucalgary.ca (Charles Parr) writes: |> In article <1r48c7$k35@sixgun.East.Sun.COM> egreen@east.sun.com writes: |> >In article 21311@adobe.com, cjackson@adobe.com (Curtis Jackson) writes: |> >>In article <93Apr20.193958.30419@acs.ucalgary.ca> parr@acs.ucalgary.ca (Charles Parr) writes: |> >>}Sheesh, even a trained attack dog is no match for a human, |> >>}we have *all* the advantages. |> >> |> >>I agree with this 100%. |> > |> >Me, too... for chihuahua's. The police and the military don't train |> >dobermans and shephards and use them as weapons because they are so |> >easy for the average Joe to defeat barehanded. You may have opposing |> >thumbs, but the dog has teeth so effective some of yours are named for |> >him. He has IR vision, better hearing and better smell than you do, |> >and most likely faster reflexes. |> > |> >You're on a motorcycle, he's on paws. Roll on and blow him off. He |> >doesn't even have net access. |> |> Oh bull pucky, Ed. They use dogs because a) Many people are |> scared shitless of them and b) because of the nose and the |> vision and hearing. Without their cop partner in attendance, |> the dog is so much meat in the hands of any human with |> a bad attitude and al ittle training in violent force. Oh horse puckey. Without their cop partner in attendance, they are less likely to be controllable *without* the use of force which would kill the dog. |> |> Those teeth aren't very much good with an arm shoved into the |> back |> of the animals throat and held there, and the neck is not O.k. so you've disabled the dog's mouth, and given up use of your arm to do so. How `bout them front and read paws, and the fact that to plug up that mouth you've given the dog the advantage of balance... |> espcially strong. neither are the leg joints which can be |> easily snapped, or the skull easily crushed, on even the largest |> dogs. Have you ever tried to snap leg or crush the skull of a dog without use of hardened instruments such as a baseball bat? Without the use of both arms and full cooperation of the beastie involved, it's not *that* easy. Oh, but wait, you've got your arm shoved in the dogs mouth. You lose.... |> Your advice is correct, but a dog is still no match for a trained |> human in a fight. Oh *now* you qualify you earlier statement by saying a *trained* human. |> >>}Sheesh, even a trained attack dog is no match for a human, |> >>}we have *all* the advantages. Most people here have not been trained to deal with a dog that wants to maul you. get a clue. |> |> Regards, Charles |> -- |> Within the span of the last few weeks I have heard elements of |> separate threads which, in that they have been conjoined in time, |> struck together to form a new chord within my hollow and echoing |> gourd. --Unknown net.person Steve Mansfield | I was told theres a miracle for each day that I try. I was smm@uunet.uu.net | told there's new love that born for each one that has died. 1983 Suzuki GS550E| I was told there'll be no one to call on when I feel alone DoD# 1718 | and afraid. I was told if you dream of the next world | you'll find yourself swimming in a lake of fire. Dream Theater - Metropolis-Part I "The Miracle and the Sleeper"
8rec.motorcycles
In <1pqu12$pmu@sunb.ocs.mq.edu.au> johnh@macadam.mpce.mq.edu.au (John Haddy) writes: >In article <C513wI.G5A@athena.cs.uga.edu>, mcovingt@aisun3.ai.uga.edu (Michael Covington) writes: >|> Instead, use a quartz crystal and divide its frequency by 2 40 times >|> or something like that. >... Wouldn't a crystal be affected by cold? My gut feeling is that, as a >mechanically resonating device, extreme cold is likely to affect the >compliance (?terminology?) of the quartz, and hence its resonant frequency. Yes, but in a fairly reproducible way. -40 is only a smidgen of the distance to absolute zero. And in any case you're going to have to borrow freezer space from a bio lab or someone to test/calibrate this darling anyway. Btw, you're probably going to want those big capacitors you found to fire the solenoid -- High current drain on frozen batteries can be an ugly thing. paul
12sci.electronics
In <1993Apr22.132638.19448@ringer.cs.utsa.edu> whughes@lonestar.utsa.edu (William W. Hughes) writes: >Hell, just set up a spark jammer, or some other _very_ electrically-noisy >device. Or build an active Farrady cage around the room, with a "noise" >signal piped into it. While these measures will not totally mask the >emissions of your equipment, they will provide sufficient interference to >make remote monitoring a chancy proposition, at best. There is, of course, >the consideration that these measures may (and almost cretainly will) >cause a certain amount of interference in your own systems. It's a matter >of balancing security versus convenience. The problem is that this will also cause "a certain amount of interference" in *all* systems within the range of the device. A long time ago I built a small jammer to dissuade my brother from using his radio alarm clock at something like 4am, which had just enough range to cover my room and his. However something powerful enough to mask all (or at least most) emissions from your computer equipment is also going to knock out half your neighbourhoods radio and TV reception. This isn't going to make you many friends. Incidentally, an older-model TRS80 makes a fine wideband jammer <grin> Peter. -- pgut1@cs.aukuni.ac.nz||p_gutmann@cs.aukuni.ac.nz||gutmann_p@kosmos.wcc.govt.nz peterg@kcbbs.gen.nz||peter@nacjack.gen.nz||peter@phlarnschlorpht.nacjack.gen.nz (In order of preference - one of 'em's bound to work) -- Everything was so different before it all changed --
11sci.crypt
Pascal Perret, in article <1993Apr21.125750.263@eicn.etna.ch>, wrote > > Site : omnigate.clarkson.edu > Aliases : grape.ecs.clarkson.edu > Number : 128.153.4.2 > > /pub/msdos/djgpp/pub > > it's xv221.zip (?) I think... > Certainly you read the other answer from Kevin Martin... He write about DV/X > (?). > > What is it ?????? Could Someone answer ???? Funny thing, the InterNet: I have no idea what xv221 might be - except that it might be something to do with X-windows on PCs (? If you know, and have used it, and think that it is good, email me. [ryanph@mrl.dsto.gov.au]). DV/X is a common abbreviation for QuarterDeck corporation's Desqview/X software. I have not used DV/X yet, but reading the blurbs that Quarterdeck sent me, it sounds pretty great: * allows multiple DOS machines - the way that OS/2 does, but without requiring 10 MB of RAM to get OS/2 going * pre-emptive multi-tasking * network computing - a proper X-windows client/server application - this means that DOS program can be used on other X-windows computers on your network, and that X-windows programs can be used on your DV/X computer * although it is NOT a version of Unix, it effectively has many of Unix's features, and mostly you will be able to compile unix-type programs using the djgpp or gnu c compilers They advertise regularly in all of the major computing and programming magazines. They also have InterNet support online (support@qdeck.com). > * Pascal PERRET | perret@eicn.etna.ch * Hope that this helps anyone wanting to know. Phil Ryan Melbourne, australia
1comp.graphics
In article 13542@news.duke.edu, infante@acpub.duke.edu (Andrew Infante) writes: > >Also, NC recently (last few years) decided that due to the fact there >are constantly people on the road drunk driving, they will raise >their awareness of it by making stricter laws, and as such, now I believe >NC has the toughest laws for DWI (while not necessarily increasing any >amount of awareness, or "kills" on the highways - meaning it's >only made a difference at sentencing) Automatic revocation of your license for a year. I'm not sure it's the "toughtest" law around, but NC has absolutely no sense of humor with respect to driving laws, anyway. I think they put you in jail and sell your first child into slavery for passing a school bus... A bill breezed through the NC House to lower the intoxification level from .1 to .08. It faces stiff opposition in the Senate. Recently, the Highway Patrol took a few of the opposition Senators out and gave them some shots, and when they hit .07, put them on a course dodging cones. They failed, and will probably change their votes as a result. For some bizarre reason, NC is the only state where the governer has no veto power over legislation coming out of the state Congress, so his opinion on the matter is moot. --- Ed Green, former Ninjaite |I was drinking last night with a biker, Ed.Green@East.Sun.COM |and I showed him a picture of you. I said, DoD #0111 (919)460-8302 |"Go on, get to know her, you'll like her!" (The Grateful Dead) --> |It seemed like the least I could do...
8rec.motorcycles
Dear Netters: I am looking for C source code to test if a 3D point lies within a concave polyhadra. I have read a few articles about this and know that two solutions exist: parity counting and angle sumation. Both ideas are pretty simple but coding is not. So I wonder if there exists public domain source code for this. Another 'rough' solition (don't care special cases) is ray-casting which is reported to be more or less independent of number of faces consisting the polyhedra if a special space indexing is used (M. Tamminen, et. al., 1984. "Ray-casting and block model conversion using a spatial index". Computer-Aided-Designs. 4, 1984, 60-65). But the prerequirement is that all the facets of polyhedra have their normal pointing outside of polyhedra. How this could be done in practice ? I have a set of trangles consisting the polyhedra. How could I ensure their normals pointing outside the polyhedra ? The paper mentioned above assumed this is already the case. I have also read some standard computer graphics textbook about hidden line removal. It says "if we make the rule that the normal of a facet pointing toward viewer standing far away from the polyhedra...". Again how to make sure ? Any pointers are welcome ? Yaohong Jiang Queen's University Kingston, Ont. Jiangy@qucdn.queensu.ca
1comp.graphics
Carter Ames (camter28@astro.ocis.temple.edu) wrote: : Why does a lead acid battery discharge and become dead (totally unuseable) : when stored on a concrete floor? It could be that you stored it somewhere that it could become covered by moisture or damp air, which would short out the terminals. The same thing happens to my car (Citroen 2CV) -- damp gets under the bonnet (US: "hood") and shorts the spark-plugs to earth so it won't start. The solution (for the car) is to clean the plug leads and spray with WD-40 (moisture repellant). If damp *is* the problem, then storing the battery off the ground may help. I'm not sure if spraying with WD-40 would be safe since it is very flammable (high percentage petroleum). Just a thought... Chris -- Chris Hand, Lecturer Internet mail: cph@dmu.ac.uk Dept of Computing Science, Voice: +44 533 551551 x8476 De Montfort University, The Gateway, Fax: +44 533 541891 FIDOnet: 2:440/32.50 LEICESTER, UK LE1 9BH >> Linux: *free* unix for IBM PCs! <<
12sci.electronics
In article <1993Apr15.160415.8559@magnus.acs.ohio-state.edu> ashall@magnus.acs.ohio-state.edu (Andrew S Hall) writes: >I am postive someone will correct me if I am wrong, but doesn't the Fifth >also cover not being forced to do actions that are self-incriminating? >e.g. The police couldn't demand that you silently take them to where the >body is buried or where the money is hidden. But they can make you piss in a jar, and possibly provide DNA, semen, and hair samples or to undergo tests for gunpowder residues on your hand. (BTW, that was why the chemical engineer arrested in the WTC explosion thrust his hands into a toilet filled with urine as the cops were breaking down the door -- the nitrogen in the urine would mask any residue from explosives. I found it interesting the news reported his acts, but not his reasons). Somewhere, perhaps a privacy group, they discussed the legal ramifications of using a password like I shot Jimmy Hoffa and his body is in a storage locker in Camden a while back. The impression I got was that real judges would dismiss arguments that this password is self-incrimination as first-year law school sophistry -- the fact that you use a statement for a password has no bearing on the veracity of that phrase. You are not being asked to incrimidate yourself (e.g., "where did you bury the body?"); you are being asked to provide information necessary to execute a legal search warrant. Refusing to provide the password is akin to refusing to provide a key to a storage locker... except that they could always _force_ their way into the locker. Of course, that doesn't mean you have to help them _understand_ what they find, or point out things they overlooked in their search! -- Bear Giles bear@fsl.noaa.gov
11sci.crypt
In article <1993Apr20.191255.10115@news.columbia.edu>, imj1@cunixa.cc.columbia.edu (Imad M Jureidini) writes: |> Hi! |> I recently purchased the Toshiba 3401 CDROM. I own an Adaptec 1542B |> SCSI card, and I have so far failed to get the CDROM to work under DOS. It |> works very well under OS/2, so I know that the drive is not faulty. |> In my config.sys, I have aspi3dos.sys, aspidisk.sys, aspicd.sys. In my |> autoexec.bat, I have MSCDEX, which came with DOS 6.0. MSCDEX seems to find |> and install the drive as drive F:, but when I switch to that drive and try a |> dir, I get an error message telling me the drive is not ready or something |> like that. The CDROM is locked too, and the adaptec utilities don't seem to |> recognize that I have a CDROM at that point. |> Has anyone ever had this problem? Is there something abvious that I |> am missing? And finally, I was wondering if anyone using this setup could |> kindly post his/her config.sys and autoexec.bat. |> Hi! One of the ASPI-drivers (I think it's the ASPICD) supports a /NORST paramter, which means to not reset the SCSI bus when it loads. This fixed the problem a friend of mine was having with his adaptec+tosh 3401. Regards, -Terje
3comp.sys.ibm.pc.hardware
The Apollo program cost something like $25 billion at a time when the value of a dollar was worth more than it is now. No one would take the offer. -- Bruce Watson (wats@scicom.alphaCDC.COM) Bulletin 629-49 Item 6700 Extract 75,131
14sci.space
In article <930421.120012.2o5.rusnews.w165w@mantis.co.uk> mathew <mathew@mantis.co.uk> writes: >mccullou@snake2.cs.wisc.edu (Mark McCullough) writes: >> I looked back at this, and asked some questions of various people and >> got the following information which I had claimed and you pooh-poohed. >> The US has not sold Iraq any arms. > >What about the land mines which have already been mentioned? I asked around in one of the areas you suggested yourself, and presented the information I got. No mention of US landmines was given. >> other countries (like Kuwait). Information is hard to prove. You are >> claiming that the US sold information? Prove it. [...] Information >> is hard to prove, almost certainly if the US did sell information, then that >> fact is classified, and you can't prove it. > >Oh, very neat. Dismiss everything I say unless I can prove beyond a shadow >of a doubt something which you yourself admit I can never prove to your >satisfaction. Thanks, I'll stick to squaring circles. > >mathew Okay, so you are going to blindly believe in things without reasonable evidence? I didn't realize you were a theist. I am doubting a claim presented without any evidence to support it. If you are able to present real evidence for it, then great. But unsupported claims, or even claims by such and such news agency will not be accepted. If you want to stick to the sheer impossible, instead of the merely difficult, then fine. The statement that if such a fact is classified, then you can't prove it, is a simple matter of pragmatics and the law. If you have access to classified information that you know to be classified, and you reveal it, there is a good chance that you or someone else (the person who revealed it to you), is going to jail. I never said that you couldn't prove it to my satisfaction, I merely said that it was difficult. (Who said I try and make things easy for people I am arguing with :) (Unless of course, they need the handicap). -- *************************************************************************** * mccullou@whipple.cs.wisc.edu * Never program and drink beer at the same * * M^2 * time. It doesn't work. * ***************************************************************************
0alt.atheism
Mark McCullough (mccullou@snake10.cs.wisc.edu) wrote: : I heard about the arms sale to Saudi Arabia. Now, how is it such a grave : mistake to sell Saudi Arabia weapons? Or are you claiming that we shouldn't : sell any weapons to other countries? Straightforward answer please. Saudi Arabia is an oppressive regime that has been recently interfering in the politcs of newly renunified Yemen, including assasinations and border incursions. It is entirely possible that they will soon invade. Unluckily for Yemen it is not popular in the West as they managed to put aside political differences during reunification and thus the West has effectively lost one half (North?) as a client state. Aaron Turner
0alt.atheism
Eugene Bigelow writes: >Doesn't the Bible say that God is a fair god [sic]? If this is true, how can >this possibly be fair to the infants? What do you mean fair? God is just, giving to everyone what they deserve. As all infants are in sin from the time of conception (cf Romans 5.12, Psalm 1.7), they cannot possibly merit heaven, and as purgatory is for the purging of temporal punishment and venial sins, it is impossible that origianl sin can be forgiven. Hence, the unbaptized infants are cut off from the God against whom they, with the whole of the human race except Mary, have sinned. Which is why Jesus said, "Truly, truly I say to you, no one can enter the Kingdom of God unless he is born of water and Spirit" which is the true meaning of born again (John 3.5). Thus, as infants are in sin, it is very fair for them to be cut off from God and exlcuded from heaven. As St. Augustine said, "I did not invent original sin, which the Catholic faith holds from ancient time; but you, who deny it, without a doubt are a follower of a new heresy." (De nuptiis, lib. 11.c.12) Andy Byler
15soc.religion.christian
Does anybody know about a converter from CGM to PCX or anything else more common. I've spent some time searching the archives with no luck. Could you email me your responses. Thx in advance, Mike G. d0np@jupiter.sun.csd.unb.ca
1comp.graphics
From article <C4zLJ8.Bun@queernet.org>, by rogerk@queernet.org (Roger B.A. Klorese): > In article <15148@optilink.COM> walsh@optilink.COM (Mark Walsh) writes: #>NAMBLA's presence in the SF Gay Pride Parade says quite a bit. #>It says that either the parade organizers want to show support #>for NAMBLA, or they themselves have a fundamental misunderstanding #>of their rights and responsibilities. I would really, really like #>to believe the latter, but I would need some help to do so. > There are dozens of examples of the latter; NAMBLA is an especially > glaring one, but hardly the only one. Perhaps, though the exclusion of the Gay Perotistas in the SF Gay Pride Parade would make me think that they had some clue in this regard. Dozens of examples? I don't know... -- Mark Walsh (walsh@optilink) -- UUCP: uunet!optilink!walsh Amateur Radio: KM6XU@WX3K -- AOL: BigCookie@aol.com -- USCF: L10861 "What, me worry?" - William M. Gaines, 1922-1992 "I'm gonna crush you!" - Andre the Giant, 1946-1993
18talk.politics.misc
Could someone please do one of the following: 1. Point to an init that allows me to turn off power management on my Duo 210. 1. Write an init that would allow me to turn off ALL power management on Duo 210. 2. Point me to documentation on power management so that I can write such an init. 3. Explain to me why such an init is totally or partially impossible. Ideally, of course, I would like to be able to turn in on and off on the fly. Surely such an init would be very helpful to Powerbook owners who want to do MIDI... I cannot imagine why it is not possible to do, unless it requires Apple to divluge some secret. And if that is the case, the surely APPLE could write the init. (Unless Apple brings out new models so fast these days that even THEY don't know how they work). Scott Petrack Petrack@haifasc3.vnet.ibm.com
4comp.sys.mac.hardware
Please realize that I am frequently getting in trouble for straying from orthodoxy, but here is my opinion: In article <Apr.17.01.10.58.1993.2246@geneva.rutgers.edu>, mdbs@ms.uky.edu (no name) writes: > ... Moreover the Buddha says that we are > intrinsically good (as against Christ's "we are all sinners"). I never thought of these two ideas being "against" each other. People might quibble about what "intrinsically" means but the reason we are sinners is because we do not behave as good as we are. The message of Christ is that each of us are not only good, but great, that we can approach perfection, albeit perhaps through a different technique than you claim Buddhism teaches. Because we do not realize our greatness, we sin. Peter had no problem walking on water until a little doubt crept in. Doesn't David ask in the 8th Psalm "what is man that you [God] should care for him, but you have made him just a little lower than the angels"? I probably exagerate in my mind what a scrawny little kid David was, just as I probably exagerate what a gigantic monster Goliath was, but David's power easily defeated Goliath's. Remember the rich young man who comes up to Jesus and asks what he can do to enter the Kingdom, Jesus says follow the commandments. I always picture the smug look on his face as he says he's done that his whole life, probably anticipating an "attaboy" from the Messiah. Instead Jesus gives him a harder task, sell everything and follow Him. Jesus is raising the bar. The desciples say how can anyone do this if it's so hard even for rich people. Jesus says anyone can do it, with God's help. Jesus says not only can we avoid killing people, we can avoid getting angry at people. Not only can we avoid committing adultery, we can control our own desires. I realize this was not your main point, but I wonder how other people see this. > ... > Parting Question: > Would you have become a Christian if you had not > been indoctrinated by your parents? You probably never learned about > any other religion to make a comparative study. And therefore I claim > you are brain washed. (Please forgive any generalizations I am about to make.) Your point about how "hard" other religions are is a good one, just as your "Parting Question" is a tough question. I think that Muslims worship the same God as I do, we can learn from their name "submission". Hindus and Buddhists and Taoists, etc. claim that "God" is impersonal. Is God personal or impersonal? I say yes, but if I think a little more my answer is whichever is greater. I think it is greater to be a personal entity, with an individual consciousness, but you're right that that might be a cultural bias. If I think more I must admit that God's personal nature is as far beyond my conception as His impersonal nature is beyond the Hindu's conception. If somehow Jesus could fit into Hindu cosmology then maybe I wouldn't have a problem, though that is hard to imagine. Are there any former (or present) "Eastern Religion" members here who could comment? Chris Mussack
15soc.religion.christian
>Off-shore assembly is one reason that Adcom is able to make products >that perform as well as those from people like Audio Research and Van >Alstine (and better than Hafler and Forte'), but at a much lower cost. How do you spell "tuna helper" ? I gather by off-shore assembly you mean that adcoms are built by blue-fin tuna's who are into that squid-fi sound? (I agree on that one). My Adcom 555 preamp did sound better after installing the famous "running the chips class "A" resistor mod", and replacing the metal bottom cover with plexiglass,, too bad the factory could not make em sound better,, but better sound, unfortunately, does not appear to be a priority with Adcom, else the mods would neither have been necessary, nor would they have improved what was already touted as superlative state-o-d-art le'sound. I really want to hear from all those people out there who have traded up from an sp9II (even an sp3a!) to a GFP-555/etc., or maybe from those that have dumped their forte' amps for a GFA-555/etc....
12sci.electronics
In article <C5sI9G.Hx@dscomsa.desy.de> hallam@zeus02.desy.de writes: > >The above conveniently ignores the murder of four BATF agents by the >Branch Davidians in an unprovoked ambush. > >Any government that allows tinpot dictators to set up shop and declare >a private state has drifted into anarchy. There are laws to control >the ownership of guns and the BATF had good reason to beleive that >they were being violated. They set out to obtain a legal warrant and >attempted to serve it only to be met with gunfire when they rang >the doorbell. > >The paranoid assertion that the BATF fired first in an unprovoked >assault assumes that the BATF were on a death wish. Had they >expected the B-D to be anything other than peacefull citizens who >would accept a search authorized by a court they would have turned up >in a tank and broken the door down on day one. > >The stupidity was the attempt to serve a warant on the place by >ludicrously underarmed and unprotected police. Wait a second, you're ignoring major facts here. There was NO attempt to simply serve a warrant. The BATF had a no-knock warrant. The initial firefight began when the BATF threw concussion grenades at the building. (BATF admits this!) >If anyone on the net cares to suggest a sure fire method of bringing >the murderes of four police officers to justice perhaps we could >hear it. Let's be realistic here, shall we? You're a member of a rather paranoid religious organization. Someone comes to your building, dressed in black suits, carrying firearms. They throw a concussion grenade at the place, and try to break in. What, exactly, are you going to do? I would not allow anyone to enter my home without first identifying themselves. If someone attacks my home by firing weapons or throwing explosive, I think I'd be entirely justified in defending myself. Regardless of what I think of the BDs, and regardless of whether or not they were guilty of firearms violations, this is NOT the way you treat people in a supposedly free society. <MC> -- || Mark Craig Carroll: <MC> ||"We the people are getting tired of your lies || Univ of Delaware, Dept of CIS|| We the people now believe that it's time || Grad Student/Labstaff Hacker || We're demanding our rights to the answers || carroll@udel.edu || We elect a precedent to state of mind"-Fish
18talk.politics.misc
In article <1993Apr15.003749.15710@rtsg.mot.com> svoboda@rtsg.mot.com (David Svoboda) writes: >In article <1993Apr14.220252.14731@rtsg.mot.com> declrckd@rtsg.mot.com (Dan J. Declerck) writes: >| >|The difference of opinion, and difference in motorcycling between the sport-bike >|riders and the cruiser-bike riders. > >That difference is only in the minds of certain closed-minded individuals. I >have had the very best motorcycling times with riders of "cruiser" >bikes (hi Don, Eddie!), yet I ride anything but. Continuously, on this forum, and on the street, you find quite a difference between the opinions of what motorcycling is to different individuals. Cruiser-bike riders have a different view of motorcycling than those of sport bike riders (what they like and dislike about motorcycling). This is not closed-minded. To NOT RECOGNIZE this, is in effect, close-minded. > >|A lot of it, reminded me of rec.motorcycles and the insipid flame-age thereof.. > >If you so dislike it, my occasionally leather-clad poser pal, why read it? I scan it for information, a lot of it is NOISE and pointless flame-age. (it's why I used trn, instead of rn) If you have a problem with that, I'm really sorry for you.. -- => Dan DeClerck | EMAIL: declrckd@rtsg.mot.com <= => Motorola Cellular APD | <= =>"Friends don't let friends wear neon"| Phone: (708) 632-4596 <= ----------------------------------------------------------------------------
8rec.motorcycles
In article <1r69b7INN539@lynx.unm.edu> cfaehl@vesta.unm.edu (Chris Faehl) writes: >In article <1r4b59$7hg@aurora.engr.LaTech.edu>, ray@engr.LaTech.edu (Bill Ray) writes: >********NOTE: FOLLOWUPS go to alt.atheism,talk.religion.misc,talk.origins! > >[deleted] >> If I make a statement, "That God exists, loves me, etc." but in no way >> insist that you believe it, does that place a burden of proof upon me. >> If you insist that God doesn't exist, does that place a burden of proof >> upon you? I give no proofs, I only give testimony to my beliefs. I will >> respond to proofs that you attempt to disprove my beliefs. > >If you say X statement and give it the authority of fact, I will respond >by asking you why. You aren't obligated to say anything, but if your >intent is to convince me that X statement is true, then yes, the burden >of proof is upon you. If what was being discussed could be established or disproven by experiment and observation, then I would agree with you, Chris. The burden of proof would belong to Bill. But the source document for Christianity, the Bible, simply assumes God exists and makes it clear (to us Calvinists, anyway :-)) that when a person is in fellowship with God, it is because God has taken the initiative in revealing Himself to that person. So from a Christian point of view, the burden of proof belongs to God. Bill is being consistent with what the Bible teaches in relating his own experience with God, but it would be an error on his part to assume that there is a direct, causal relationship between his testimony and someone else becoming convinced that God exists and that he needs to be reconciled to God. > >If you are merely giving testimony to your beliefs, then you are an egotist. Please excuse me if I missed an earlier part of this thread in which Bill came across like an egotist. What I saw was simply obedience to the scriptural command to "always be ready to give a reason for the joy that is in you". Bill Hamilton
19talk.religion.misc
(larryhow@austin.ibm.com) wrote: : : What are the current products available to upgrade the resolution? : Which ones support postscript? : : Any experiences with them, either good or bad? : : Is the quality difference really noticable? : : I'm planning on producing camera ready copy of homes. Will the higher : resolution be noticed for these? : If you are talking about laser jet 4 then I believe it has to be postscript. I don't see any advantage to using PCL when you have a peice of hardware plugged into the LJ4 that is doing the work and it can support any language that is suited for the job. Besides I don't think PCL is even capable of handling 1200 dpi specifications. I only have experience with the Laser Master Winjet 1200 which brings the LJ4 up to 1200 dpi and it uses postscript. It also has a fast print mode which is not postscript, and it is at a lower resolution (600dpi I think), but it is FAST!!!! This particular product uses your host processor to process the postscript, so even with a decent PC you know it's going to be slow i.e. slow compared to a high-end workstation processed PS. The quality difference is very noticable and is almost worth the wait (for the PS processing) - I'm rather impatient. We were using it for B&W camera images (RS-170). The gray scale image was accepted by MS Word and handed to the Winjet PS printer driver which converts the image into postscript and then hands it off to the Winjets postscript processor. The postscript is rendered into RAM (lots of it) and when it is done it shoots it directly to the printer. The PS processor can also accept PS files created from other sources including DOS applications, but Windows has to be running at the time of printing. The PS processor is responsible for the halftoning and I'd say it does a pretty good job. Our camera images came out very good in my opinion. (not as good as Laser Master's demo though). I don't know how many other similar products are out there but I would be surprised if there are several. Gordon Lang
3comp.sys.ibm.pc.hardware
In article merlin@lerami.lerctr.org (David Hayes) writes: >In article amolitor@nmsu.edu (Andrew Molitor) writes: >>If you can get it for a buck, 2nd hand, it must be true, eh? I'm pretty >>sure the NSA is supposed to, among many other things, provide high-quality >>cryptosystems to a variety of places. I don't recall reading anywhere >>reliable that they're supposed to: >> >> 1) Monitor my phonecalls. >> 2) Monitor usenet. >> 3) Provide only cryptosystems they can easily crack. >> 4) etc etc. >> >> This is not to say that they *don't*, they might. But you don't >>know that they do, and you have no evidence that they do, for almost >>all values of you. It follows, therefore, that for most values of 'you', >>your claims about the NSA border on paranoia. >> >> Andrew >> > >OK, Andrew, I'll provide some evidence. A friend of mine worked for an >electronics manufacturer on with a west-coast office. They routinely sold [story deleted] Let me give you another story that actually happened to ME. We sell communications boards that use a 68000. They used to be high tech. Our agent in the UK sold a system to a company in CH which packaged it in a product for CZ (London-Bern-Prague). I telexed the Brits and told them the Swiss need to pass export paperwork through the US as, at the time, you needed an export lisence for these systems. Now I knew the NSA was watching this traffic (just like they are watching THIS traffic.) And what do you know... two weeks later an agent of the US government shows up in my office to remind me if we or our agents sold systems into the Evil Empire, we had better make sure the export lisences were handled properly. He was part of a FIVE man office in COLUMBUS OHIO!! who did this stuff based on sources he could not reveal. (I assume most of the time these guys sat around the office with their thumbs up their ass as there isn't that much stuff coming out of Columbus :) Wow, the electric utility in Prague sure is a big worry for these folks :) The point is, we have created a giant bureaucracy (NSA) with a budget bigger than the CIA's who, like all bureaucracies, fill their time looking for things to do. The Evil Empire is gone. The NSA is not. They will do something to fill their time and justify their budgets. (I just wish they too would sit around with their thumbs up their ass... but that is too much to hope for... they will spy on us and do things like skipjack and subvert people like Dorothy Denning.) Sigh... -- Information farming at... For addr&phone: finger A/~~\A THE Ohio State University jebright@magnus.acs.ohio-state.edu ((0 0))____ Jim Ebright e-mail: jre+@osu.edu \ / \ Support Privacy: Support Encryption (--)\
11sci.crypt
Does anyone know of any type of acceleration sensor that has an electrical output of any sort? It would only have to sense acceleration in one direction. Thanx, Mike -- ________________________________________________________ Michael DeAddio (MTS) | Work hard, play hard, Bell Communication Research | the only problem is that deaddio@thumper.bellcore.com | playing hard makes 201-829-5024 | working harder. MRE 2Q-260 |
12sci.electronics
In article <1tasvi$5qu@lll-winken.llnl.gov>, (D. Fuess) writes: |> I for one like Windows. Prior to 3.0 I had little use for it because of early |> problems. Since 3.0 it is my preferred OPERATING SYSTEM. .... ^^^^^^^^^^^^^^^^^^ Nah .... if MS Windows 3.1 were an operating system, so would be X-windows, motif, geoworks , desqview, the shareware Win-Boss C library and that what's-it's-name text-based windowing system written in Applesoft that ran on the old-faithful Apple II ... [ note the similarity? all of the above rely on some underlying real OS .... ] IMHO, they are windowing systems, and just that. [ some are cooler than others though ... ] whay.
2comp.os.ms-windows.misc
In article <18APR199317500990@skyblu.ccit.arizona.edu>, lippard@skyblu.ccit.arizona.edu (James J. Lippard) writes: >In article <C5p660.36t@sunfish.usd.edu>, rfox@charlie.usd.edu writes... >>In article <1993Apr15.225657.17804@rambo.atlanta.dg.com>, wpr@atlanta.dg.com (Bill Rawlins) writes: some deleted >>> Since you have referred to the Messiah, I assume you are referring >>> to the New Testament. Please detail your complaints or e-mail if >>> you don't want to post. First-century Greek is well-known and >>> well-understood. Have you considered Josephus, the Jewish Historian, >>> who also wrote of Jesus? In addition, the four gospel accounts >>> are very much in harmony. >> >>Bill, I have taken the time to explain that biblical scholars consider the >>Josephus reference to be an early Christian insert. By biblical scholar I mean >>an expert who, in the course of his or her research, is willing to let the >>chips fall where they may. This excludes literalists, who may otherwise be >>defined as biblical apologists. They find what they want to find. They are >>not trustworthy by scholarly standards (and others). >> >>Why an insert? Read it - I have, a number of times. The passage is glaringly >>out of context, and Josephus, a superb writer, had no such problem elsewhere >>in his work. The passage has *nothing* to do with the subject matter in which >>it lies. It suddenly appears and then just as quickly disappears. > >I think this is a weak argument. The fact is, there are *two* references to >Jesus in _Antiquities of the Jews_, one of which has unquestionably at least >been altered by Christians. Origen wrote, in the third century, that >Josephus did not recognize Jesus as the Messiah, while the long passage >says the opposite. There is an Arabic manuscript of _Antiquities of the >Jews_ which contains a version of the passage which is much less gung-ho >for Jesus and may be authentic. > There is no question that Origen, in the third century, saw a reference >to Jesus in Josephus. There are no manuscripts of _Antiquities_ which >lack the references. > >It is possible that it was fabricated out of whole cloth and inserted, but >I don't think it's very likely--nor do I think there is a consensus in >the scholarly community that this is the case. (I know G.A. Wells takes >this position, but that's because he takes the very small minority view >that Jesus never existed. And he is a professor of German, not of >biblical history or New Testament or anything directly relevant to >the historicity of Jesus.) > >Jim Lippard Lippard@CCIT.ARIZONA.EDU Evidently Jim thinks I am arguing an `existence' issue. It should be clear from my response to Bill Rawlins above that in this thread I am objecting only to the use of Josephus to validate the messiah claim. The argument against the messiah claim is not weak (maybe mine is, but in the hands of pros it is not). There are indeed two passages. The short one *cannot be used* to validate the messiah claim, imo. That's why I refered to the long, which can be used. It flatly states Jesus "was the Christ", and mentions the crucifixion, resurrection and Christian belief in said claims. The short entry mentions Jesus in passing as James' brother - "... brother of Jesus, who *was called* the Christ, .... [emphasis mine]", and that's it. If original, Josephus has merely reported what some people say. It is nothing more than an observation, one which lacks the Christian fundamentals. The long is widely regarded as an insert for three reasons: 1) its way out of context, 2) Origen evidently knew nothing of it, and 3) its rather inconsistent with the short. There is consensus among scholars as defined on the long as insert, and I see Jim agrees. Consensus is usually reflected subtly, as in Elaine Pagel's _Gnostic Gospels_ (p. 85), "A comment *attributed* to Josephus reports ....[emphasis mine]". As for #2, I mentioned in my original post that the long is a 3rd century insert (more properly, post-Origen as Jim notes). There may not be consensus on the short. The text, which discusses James in a legal role, stands with or without it. That it does not upset context makes it difficult to argue insert. On the other hand, an in-passing insert is easily disguised in any context. Nonetheless, on historiographical grounds it is worthless for the messiah defense, and that's why I didn't mention it. I don't know about the Arabic ms. If you have a translation reference, Jim, please let me know. As for its "much less gung-ho" tone, obviously the date of this ms. is critical. If after ca. AD 700, a watered-down entry in lieu of removal can be easily explained. *<(:-) Rich Fox, Anthro, Usouthdakota
0alt.atheism
I know it's a long shot, but maybe someone went through this and will have some comments to share. The story is this: I bought a car out of state, and I'm trying to get the safety inspection in Pennsylvania. The problem is that the car has aftermarket tint on all windows except the windshield. The tint is rather weak, and you can clearly see the inside of the car through the tint. The inspection garage said that they won't pass it unless I get a waiver from the state police. So I went to the state police - the officer told me that aftermarket tint is illegal, and I can get a waiver only for a pre-84 car or for a medical reason. I asked him to show me the section of the vehicle code that says it's illegal. He showed it to me and the paraghaph said that you can't have tint, if you can't see the inside of the car because of the tint. When I told him that you can in fact see the inside very well, he shut the book and said "It's just illegal, and in fact we can have someone give you a ticket for it right now." Well, won't argue with that... Since the vehicle code says it's OK as long as you can see through the tint, I'd like to keep it (I'll re-read the vehicle code in the library). I'd also like to get some sort of paper from the police that says it's OK, so I can get the inspection, and so that I won't get in trouble for the tint later on. I also wouldn't mind registering a complaint against that officer - he really pissed me off. So does anyone have any experience getting that sort of a paper from the police, especially in Pennsylvania? Does anyone have any experience registering a complaint against an officer? I called the station later on today, but they basically said there is no place where I could register a complaint against an officer... And if I do decide to keep the tint and get a ticket anyway, how much of a chance do I stand to succesfully appeal the ticket in court? Any comments about it will be welcome! Michal
7rec.autos
Doug Holland claims Tom Clancy has provided the recipe for nuclear bombs. Clancy himself says he has omitted certain crucial steps. Further, how do we know Clancy knows, rather than repeating what he's read or been told in the unclassified domain? -- David Sternlight Great care has been taken to ensure the accuracy of our information, errors and omissions excepted.
11sci.crypt
I have many icons in IconEdit and PBIcon format and I would like to convert them to PBM, PGM or PPM format. Do you know the formats of IconEdit or PBIcon? Thank's for your help. , Rene (kiwi@iis.ethz.ch)
1comp.graphics
Hello All! I recently acquired a CD-ROM drive, a Mitsumi (mfg. Feb/93) [Hey, it was free :-) ] I'm quite pleased with the performance, but it seems to crash a lot when I use PLAYCD.EXE that came with it a DESQview 2.31 - Thoughts? This mainly happens when my BBS is running in the background and I load the program up.. If I load the program, it doesn't crash, and I start the disk, stop the program and start the BBS its OK, but otherwise I have big problems.. (IE, they can only be solved with a cold boot). If -anybody- can mail me to help me, I would be eternally grateful (unfortunately, my feed to this group is a little unreliable so I would appreciate if you could mail, but by all means, post it too because I'm sure somebody else would like to know...) Cheers, Wes --- Wes Garland, at Queen's University | Terminal Velocity Kingston Kingston, Ontario, CANADA | Fidonet 1:249/128 - Usenet Access (free) 3386838@Jeff-Lab.QueensU.CA (school) | v.32bis: 613-542-4613 300-2400bps: 6594 Wes.Garland@tvk.gtm-inc.com (home) | Send Email to set up full-access account
3comp.sys.ibm.pc.hardware
hmm - i thought francesca's predictions ALWAYS hovered at or below .500, especially in the nfl. (not counting college football bowl day). he's a nice analyst for explaining past tense, and for mapping out what plays teams might do - but for predicting the future, he only looks good whne compared to russo. - bob gaj
9rec.sport.baseball
If anyone has any information on this deficiency I would very greatly appreciate a response here or preferably by Email. All I know at this point is a deficiency can cause myoglobin to be released, and in times of stress and high ambient temperature could cause renal failure. x
13sci.med
I have been scanning and trying to read the articles in the sci.crypt area, but what do I get? SURPRISINGLY, the blurb comes upon the screen " file xxx has either been cancelled or expired. Now I ask you, If it expired, wouldn't it be out of the available file cache? I am 32 and not a paranoid, but the older I get, the greater my cynicism of both federal and state governments becomes. The censorship of this Internet (and it is no less than censorship [stupid me, it's the GOVT.]) is ridiculous. The Japanese have far outstripped our ciphertechnology, and our government is now, before your very observant eyes, trying to force the "crypto standard" onto a framefork where the "standard" is now an ancient relic in terms of modern Japanese security techniques. Now, I pose the question: Why censor folks on the net and send the warning shown above ("cancelled or expired") when it would be wiser to not let people see the post at all?? Which Article of the Constitution gives me the right of revolution if things seem to be going cockeyed?? Hmmm... -- Peter G. White, President, Synthesis 93 Inc. Milwaukee, Wisconsin, U.S.A. Peter.White@mixcom.com
11sci.crypt