>>I will greatly appreciate if somebody can give me a summary of what have >>been done before I sign up to this group > >There is a very nice summary prepared by Lachlan Cranswick on >http://crystsun1.unige.ch/stxnews/riet/welcome.htm > >It contains among many other things a pointer to the mail archives set up >by Armel le Bail, and everyone would profit from book marking it. The above website really needs an update. Hope to interlink the following with Rietveld List Homepage when free time permits. There are various question and "discussion pages" - many based on using Rietveld Mailing list posts at: http://www.ccp14.ac.uk/solution/ (Plus tutorials for many Rietveld packages via: http://www.ccp14.ac.uk/tutorial/ ) e.g.: Automatic Divergence Slits (ADS) and Rietveld Analysis http://www.ccp14.ac.uk/solution/automatic_divergence_slits_rietveld.htm Calibration standards for Powder Diffraction http://www.ccp14.ac.uk/solution/calibration/index.html Combined X-ray / Neutron Rietveld Refinement http://www.ccp14.ac.uk/solution/calibration/index.html LeBail Method for Intensity Extraction http://www.ccp14.ac.uk/solution/lebail/index.html Mass absorption coefficients : Resources for estimating them. http://www.ccp14.ac.uk/solution/absorption_coefficients.htm Neutron Scattering Lengths http://www.ccp14.ac.uk/solution/neutron_scat_lenghts.html Pawley Method http://www.ccp14.ac.uk/solution/pawley/index.html PDF, High Q Powder diffraction Analysis Software http://www.ccp14.ac.uk/solution/high_q_pdf/index.html Powder Diffraction: Mounting Samples in Powder X-ray Diffraction http://www.ccp14.ac.uk/solution/powdermounts.htm Powder Diffraction Structure Solution Pathways http://www.ccp14.ac.uk/solution/powder_structure_solution_pathways/index.html Restrained Rietveld Refinement of Organics http://www.ccp14.ac.uk/solution/restrained_rietveld/index.html Rietveld and Rietveld ESD Literature http://www.ccp14.ac.uk/solution/rietveld_and_esds/index.html R and fit factors for Rietveld Analysis, Refining on R-Bragg, and Powder Calibration Standards for INEL PSD (Position Sensitive Detector) http://www.ccp14.ac.uk/solution/rietveld_r_factors/index.html Rietveld programs that have the ability to generate and view electron density Fourier Contour maps http://www.ccp14.ac.uk/solution/rietveld_fourier_maps/index.html Spray Drying and Preferred Orientation http://www.ccp14.ac.uk/solution/spraydry.htm TOF (Time of Flight) Neutron Diffraction Resources and Code http://www.ccp14.ac.uk/solution/tofneutron/index.html Zero shift vs sample offset http://www.ccp14.ac.uk/solution/zero-off.htm ---- Any corrections - additions, comments to the above discussion pages appreciated. Is easy to add them in. Lachlan. PS: Have been boring everyone and their dog about the following as it has caused known damage already: If you have a Linux PC or UNIX machines for crystallographic applications that are visible to the internet - you may like to make sure it is properly patched with security fixes - especially with the latest version of the BIND deamon - which on many Linux installations, is enabled by default (in Redhat, check as root using the Redhat "setup" program) Refer: "Lion Internet Worm" for Linux - "virtually idiot proof, fire-and-forget [hacker] tool" Automatically finds explotable UNIX server, cracks them via BIND exploit, installs itself on the server - continues on ad. infinitum. Time wasting web-references given below. Lachlan. "Lion Internet Worm" DDOS Targeting Unix Systems (includes a link to a detection program) http://www.nipc.gov/warnings/advisories/2001/01-005.htm Highly destructive Linux worm mutating: http://www.theregister.co.uk/content/8/17929.html Extracts: "This one includes a feature similar to one in the Ramen worm, which altered the Web pages of hacked HTTP servers with the message "Hackers looooooooooooove noodles," signed by the "RameN Crew." The new Lion worm sets up an HTTP server on port 27374 and erects a page bearing greetz from the Lion crew, Fearnow told us. All versions (there are three now) are virtually idiot proof, fire-and-forget tools. Each package contains a scanner which generates random class B addresses searching for an opening on port 53. It then queries the version, and if it finds it's vulnerable, runs a well-known BIND 8 transaction signature (TSIG) handling code exploit, and installs the t0rn rootkit." "We were hasty this week in our initial coverage, where we took a swipe at the FBI's National Infrastructure Protection Center (NIPC) over a Lion advisory bulletin of theirs which we deemed alarmist." "So the NIPC bulletin is a bit gaseous, but not as grossly flatulent as we'd thought." Redhat worm touts instant noodles ('Ramen' worm): http://www.theregister.co.uk/content/archive/16168.html Hacking Linux BIND servers becomes child's play: http://www.theregister.co.uk/content/8/17864.html BIND holes mean big trouble on the Net: http://www.theregister.co.uk/content/6/16454.html Lachlan M. D. Cranswick Geochemistry - Lamont-Doherty Earth Observatory, Columbia University PO Box 1000, 61 Route 9W Palisades, New York 10964-1000 USA Tel: (845) 365-8662 Fax: (845) 365-8155 E-mail: [EMAIL PROTECTED] WWW: http://www.ldeo.columbia.edu CCP14 Xtal Software Website: http://www.ccp14.ac.uk