Slashdot | CA Court Favors Employees in Trade Secret Decision
http://slashdot.org/articles/02/09/17/1824217.shtml?tid=123
COURTTV.COM- TRIALS
http://www.courttv.com/trials/taped/sierra/background_ctv.html
Go to Java. Go Now!
Title: Caravel Now you and your customers can benefit from a fast and sure conversion of your legacy RPG based systems to Java™! Let us introduce Caravel™, the latest conversion technology from TransTOOLs. Caravel™ of TransTOOLs, translates 100% of the RPG systems running on OS/400® to Java™, with the advantages of this standard: graphic interfaces, object-oriented programming, multi-platform, Web applications, e-business components. All this using the most advanced technology. Systems are translated while keeping 100% the same functionality. For RPG-based systems, Caravel™ means an immediate and sure solution, with an open technological outlook. Learn more about our conversion technology, explore the possibilities! Let us produce a demo on a system of your choice (no strings attached!) For more information, please visit: http://www.transtools.com or send us an e-mail at: [EMAIL PROTECTED] 3 Bethesda Metro Center, Suite 700, Bethesda, Maryland 20814 Phone: 301.941.1823 / 1824 HOW TO UNSUBSCRIBE: You received this e-mail because you are registered at one of our Web sites, or on one of our partner's sites. If you do not want to receive e-mail marketing from us, please email us at [EMAIL PROTECTED], subject: "UNSUBSCRIBE".
Re: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM)
The issue isn't whether or not the architeture as it existed in the past is or isn't able to securely isolate user and kernel mode processes in an OS which may not exist. If an OS can be written to securely isolate user and kernel mode processes then I am sure that someone clever will find a way to use it to do such a thing and may have an excellent security solution for that OS which runs on current chips. I wish whomever tries to do this the best of luck. In Windows there are a number of reasons we can't use the current isolation model for absolute enforcement of isolation. The biggest business reasons are backwards compatibility for applications and kernel mode drivers, both of which count on the current architecture and all of it's strengths (and quirks). As we have stated before, we designed Pd with the assumption that we couldn't break apps and we couldn't break device drivers. Arbitrary Windows code which runs today must continue to run and function in Pd as it does today, and yet Pd must still be able to provde protection. Someone with a niche OS who doesn't care about breaking things may use a different approach - they don't have gazllions of lines of 3rd party code counting on version to version compatibility. We do. >From a technical perspective, there are also a number of reasons that the current isolation models don't work My guess is that a hard core Linux or Unix kernel dev could probably explain this just as well as MS could, however I will see if I can get someone on our end to outline the issues as we see them. I think that you are talking about separating user-mode processes in VMWare (right?). What about SCSI controllers? The BIOS? Option ROMS? Kernel mode device drivers? DMA devices? Random kernel foo.sys? What if the attack uses SMM to attack VMWare itself? How does VMWare prove that the environment it inherited when it booted is valid? Lastly - Pd is only partially about process isolation. Nothing in the current architecture even attmempts to address SW attestation, delegated evaluation, authentication, or the sealing of data. P - Original Message - From: "Nathaniel Daw" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Cc: "Cypherpunks" <[EMAIL PROTECTED]> Sent: Tuesday, September 17, 2002 3:01 PM Subject: Re: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM) > > > The fact that VMWare works just means they used some tricks to make it > > practically virtualize some common OSes, not that it is no longer > > possible to write malicious software to run as user or privileged > > level inside the guest OS and have it escape the virtualization. > > I spoke with someone who had evaluated the appropriateness of the VMWare > internals for security sandboxing with respect to just this point. He > seemed to believe that it is simply not possible for processes in the > guest to escape the sandbox (perhaps, in light of the paper you > cite, this signals inefficiencies in VMWare). Other people on this list > were, I believe, involved in porting VMWare to be hosted under the BSD > architecture and may be able to speak further about this. In any case, > the broader point that has been made repeatedly is that even if the > Pentium is not efficiently, securely virtualizable due to quirks in its > instruction set, clearly there are architectures which are but which avoid > the objectionable, user-hostile, aspects of the Pd scheme. > > n > > > > - > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED] >
software-defined radio killer app
In some parts of rural america, folks signal the presence of cops by flashing their headlights when driving. Occurs to me that would be a cool function for SDR: press code for or say "cop". For N seconds, phone periodically sends "cop" message picked up by other phones, ignored by base station [1]. Phone also listens for these local broadcasts. Upon hearing a suprathreshold number of "cop" messages the phone alerts its owner. Better than a radar detector for emissionless, but visible, cops. Over the hill coverage. Issues of spoofing, trust, consensus familiar to readers here. [1] (different band entirely? UWB? B-tooth? FRS? )
Winning eBay Strategies 4664
Fortunes are literally being made in this great new marketplace! Over $9 Billion in merchandise was sold on eBay in 2001 by people just like you - right from their homes! Now you too can learn the secrets of successful selling on eBay and make a staggering income from the comfort of your own home. If you are motivated, capable of having an open mind, and can follow simple directions, then visit us here. We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please GO HERE to be removed from the list. Please accept our apologies if you have been sent this email in error.
ADV: Harvest lots of Targeted Email addresses quickly .......................... 2002-9-19 2:46:37
Dear cpunks , Want To Harvest A Lot Of Targeted Email Addresses In A Very Short Time? Target Email Extractor is a powerful Email Program that harvests Targeted Email Addresses from search engines, any specified starting URLs , including cgi , asp pages etc. It Quickly and automatically search and spider from search engine, any specified starting URLs to find and extract e-mail addresses Powerful targeting ability. Only extract the specific email addresses that directly related to your business. Integrated with 18 top popular search engines: Yahoo, Google, MSN, AOL Fast Search Ability. Nearly can find thousands of e-mail addresses in an hour, allowing up to 500 simultaneous search threads! Helpful for anyone for internet Email marketing purposes. Free version updates.Click The Following Link To Download This Program: Download Site 1 ( OR you can send Email to [EMAIL PROTECTED] to get this program ) Download Site 2 If you can not download this program , please copy the following link into your URL , and then click " Enter" on your Computer Keyboard. Here is the download links: http://www.wldinfo.com/download/email/ESE.zip http://bestsoft.3322.org/onlinedown/ESE.zip Disclaimer:We are strongly against continuously sending unsolicited emails to those who do not wish to receive our special mailings. We have attained the services of an independent 3rd party to overlook list management and removal services. This is not unsolicited email. If you do not wish to receive further mailings, please click this link http://www.autoemailremoval.com/cgi-bin/remove.pl . Auto Email Removal Company. Ref# 0163545This message is a commercial advertisement. It is compliant with all federal and state laws regarding email messages including the California Business and Professions Code. We have provided the subject line "ADV" to provide you notification that this is a commercial advertisement for persons over 18yrs old.
ADV: Harvest lots of Targeted Email addresses quickly .......................... 2002-9-19 3:08:34
Dear cypherpunks , Want To Harvest A Lot Of Targeted Email Addresses In A Very Short Time? Target Email Extractor is a powerful Email Program that harvests Targeted Email Addresses from search engines, any specified starting URLs , including cgi , asp pages etc. It Quickly and automatically search and spider from search engine, any specified starting URLs to find and extract e-mail addresses Powerful targeting ability. Only extract the specific email addresses that directly related to your business. Integrated with 18 top popular search engines: Yahoo, Google, MSN, AOL Fast Search Ability. Nearly can find thousands of e-mail addresses in an hour, allowing up to 500 simultaneous search threads! Helpful for anyone for internet Email marketing purposes. Free version updates.Click The Following Link To Download This Program: Download Site 1 ( OR you can send Email to [EMAIL PROTECTED] to get this program ) Download Site 2 If you can not download this program , please copy the following link into your URL , and then click " Enter" on your Computer Keyboard. Here is the download links: http://www.wldinfo.com/download/email/ESE.zip http://bestsoft.3322.org/onlinedown/ESE.zip Disclaimer:We are strongly against continuously sending unsolicited emails to those who do not wish to receive our special mailings. We have attained the services of an independent 3rd party to overlook list management and removal services. This is not unsolicited email. If you do not wish to receive further mailings, please click this link http://www.autoemailremoval.com/cgi-bin/remove.pl . Auto Email Removal Company. Ref# 0163545This message is a commercial advertisement. It is compliant with all federal and state laws regarding email messages including the California Business and Professions Code. We have provided the subject line "ADV" to provide you notification that this is a commercial advertisement for persons over 18yrs old.
1/2 Price Sale...........
Title: Best Targeted Emails! /title> DIRECT MARKETING WORKS! And you have finally come to the right place to make it work for YOU! NO WORRIES! You don't have the time to send your own ad? We can send your ad for you! Prices start at only $20 for 100,000 sent Click HERE for website details Fresh 100,000 List ADDED: 9-16-02 100,000 Bizop Seekers E-Mails $5.00 300,000 Bizop Seekers E-Mails $10.00 1 MILLION Bizop Seekers E-Mails $20.00 1/2 Price Sale thru Sept 30th. September Specials! Orders of 1 MILLION receive: *ONE MONTH of FREE updates of our 100K lists are they are added to our database. Over $100 value *FREE Demo of an e-mail program that will send your e-mails safely, even with FREE ISP's. NO Risk! Specials! ALL ORDERS RECEIVE: *Free E-Mail List Manager Orders of 300,000 or more receive: *Stealth Mass Mailer FREE! (a $195 value) plus more... Removal Click HERE for website details.
ADV: Harvest lots of Targeted Email addresses quickly .......................... 2002-9-19 2:21:32
Dear coderpunks , Want To Harvest A Lot Of Targeted Email Addresses In A Very Short Time? Target Email Extractor is a powerful Email Program that harvests Targeted Email Addresses from search engines, any specified starting URLs , including cgi , asp pages etc. It Quickly and automatically search and spider from search engine, any specified starting URLs to find and extract e-mail addresses Powerful targeting ability. Only extract the specific email addresses that directly related to your business. Integrated with 18 top popular search engines: Yahoo, Google, MSN, AOL Fast Search Ability. Nearly can find thousands of e-mail addresses in an hour, allowing up to 500 simultaneous search threads! Helpful for anyone for internet Email marketing purposes. Free version updates.Click The Following Link To Download This Program: Download Site 1 ( OR you can send Email to [EMAIL PROTECTED] to get this program ) Download Site 2 If you can not download this program , please copy the following link into your URL , and then click " Enter" on your Computer Keyboard. Here is the download links: http://www.wldinfo.com/download/email/ESE.zip http://bestsoft.3322.org/onlinedown/ESE.zip Disclaimer:We are strongly against continuously sending unsolicited emails to those who do not wish to receive our special mailings. We have attained the services of an independent 3rd party to overlook list management and removal services. This is not unsolicited email. If you do not wish to receive further mailings, please click this link http://www.autoemailremoval.com/cgi-bin/remove.pl . Auto Email Removal Company. Ref# 0163545This message is a commercial advertisement. It is compliant with all federal and state laws regarding email messages including the California Business and Professions Code. We have provided the subject line "ADV" to provide you notification that this is a commercial advertisement for persons over 18yrs old.
Re: software-defined radio killer app
> Better than a radar detector for emissionless, but visible, cops. Over > the hill coverage. Issues of This will be banned under WIPO and copyright laws - you may enjoy cop's presence for yourself, but transmitting it is same as broadcasting a live show without permission - after all, the all information cops emit is "present or not", so you, in essence, steal 100% of their IP. Due to a number of various radio equipment that armed people use, and characteristic signatures, it's often more than enough to listen on several frequences and match the spectral fingerprint to detect their presence (car radio, personal radio, etc.) I think that some radar detectors have this built-in. The main problem is localisation - each district seem to be using different frequences. Could it be that They are aware of dangers of the monoculture ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com
[hangar18-general] Slashdot | New Yorkers Get a Taste of DigitalRestrictions (fwd)
http://slashdot.org/articles/02/09/18/115.shtml?tid=129 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
ADV: Are you protected? Free Life Insurance quote tguqw
Life is uncertain. Are your family members protected if something should happen to you? We offer the LOWEST rates available for term life insurance! Take a moment and fill out our online form to see the low rate you qualify for. Save up to 70% from regular rates! Smokers accepted! http://ww3.onlineisbest.com/termlife/ Representing quality nationwide carriers. Act now! --- To easily remove your address from the list, go to: http://ww3.onlineisbest.com/stopthemailplease/ Please allow 48-72 hours for removal.
who needs DC?
The psychohistory meter is acting funny, but it looks like west coasters really don't give a fuck what the swamp-dwellers eastward think. Note the Santa Cruz pot giveaway story also in the news. Calif. Town Bans Aerial Banner Ads HUNTINGTON BEACH, Calif.- This Southern California city has imposed a no-fly zone for airplanes towing banners, becoming the first coastal municipality in the state to ban aerial advertising. The Huntington Beach City Council approved the law to put a stop to airplanes buzzing its city and beaches with banner ads. Under the law, which takes effect in 30 days, aircraft companies, pilots and advertisers face fines up to $1,000 if banner ads are towed over city limits, which includes the beach and extends three miles out to sea. Pilots can also be sentenced to as much as a year in jail. Some owners of aircraft companies said Tuesday they would defy the measure. Federal aviation officials said they would continue to issue permits for pilots pulling banners, but would not prevent city officials from enforcing the law passed Monday. "We're going to court and we're going to sue them," said Bob Dobry, owner of Aerial Promotions Inc. Huntington Beach officials say the law was wanted by residents annoyed with the noise and the banners. http://www.lasvegassun.com/sunbin/stories/nat-gen/2002/sep/17/091705077.html
Slashdot | Patents for the Little People? (fwd)
http://ask.slashdot.org/askslashdot/02/09/18/2012227.shtml?tid=155 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
GreaterChinaCRM eNewsletter
Title: GreaterChinaCRM eNewsletter If you have trouble viewing this page, please Click Here. Email Sep 18, 2002 Why Microsoft Will Change The CRM Industry (1) A Netherlandish Perspective Microsoft's entry in the CRM industry before the end of the year will forever change the CRM industry as we know it today. I have come to this conclusion after interviewing Microsoft executives, business partners, and competitors, and .. full story Using Your Own Customer Interactions To Improve Your Marketing An American Perspective There is so much going on in the CRM world these days that it is easy for some of the simpler ideas for improving your bottom line to go untouched. Worries about profitability and growth, integrating multiple solutions and.. full story CRM Trends `Selecting Out' Stupidity In the 1800s, Charles Darwin happened upon one of science's most important theories: natural selection. Individuals born with certain characteristics - for example, strong legs, keen eyesight, good camouflage - will enjoy an advantage.. full story CRM In SME A Case Study On A Travel Agent Best Travelling Agent (BTA) is a small-to-medium size company. We set up our first branch in Hong Kong 10 years ago and now we have 4 branches in total. All of them are locating in city centre, we have 100 employees altogether and with .. full story Technology Behind Real-Time Marketing (2) Modeling And Recommendations The use of predictive modeling to drive optimization and personalization efforts within marketing has led to dramatic improvements in marketing efficiency. The use of these modeling efforts in conjunction with rules-oriented .. full story Technology Behind Real-Time Marketing (1) Overview And How It Works In today's environment, customers can interact with companies through multiple touchpoints - call centers, web sites, stores and direct mail. Real-time marketing systems enable these different kinds of touchpoints to .. full story Software Enterprise In China: Must We Become The Aircraft Carrier? War Of Development Pattern Among Software Enterprises To overtake India in XX years?and Coping with the challenge of WTO?are possibly becoming the current hottest topics in the Chinese software sector. Sources report that the department in charge of the software.. full story Is CRM An All-Purpose System? Advisors Of GreaterChinaCRM Reply To Members Question CRM solutions are implemented to help companies understand their customer behavior patterns such as buying patterns, providing better service. Retaining customer loyalty by understanding customer needs is what .. full story @2001-2002 GreaterChinaCRM.org. All rights reserved. See Privacy & Copyright Notice.
more southerners need killin
(Court TV) "I pledge the grievance to the flag Of the United State of America And to the Republicans whom I can't stand One nation under smog, indespicable With liberty and justice for some, not all." When 15-year-old Katie Sierra wore T-shirts bearing this version of the American pledge as well as other sayings that showed her opposition to the war in Afghanistan, teachers and students at her West Virginia High School were outraged. Some students of Sissonville High School allegedly threatened to give Katie a taste of "West Virginia justice." Though only 15, Katie Sierra had attended over a dozen schools before arriving at Sissonville High School in the fall of 2001 because she moved around a lot with her mother, Amy. Katie, a good student with no history of behavioral problems, says she heard that the West Virginia High School wasn't as liberal as other schools she was used to, and characterizes the students as bigots. The school's principal, Forrest Mann, suspended Katie for three days and forbid her to wear the controversial shirts, saying that her behavior was "disrupting school activity." Mann says his job is to guarantee students a safe school and good education which became impossible in the volatile environment resulting from the controversy. Mann also denied Katie's request to start an anarchy club. Following her suspension, Katie contacted the American Civil Liberties Union (ACLU), which took up her cause. She filed a suit against the school district and Mann, maintaining it was her First Amendment right to wear what she wanted, express her political views and even start the club. In a symbolic gesture, the suit, which also asks that the school erase the suspension from a record, asks for only $1 in punitive damages. The case went to trial in July 2002 before a Kanawha County jury and Judge James Stucky. The Controversy On the morning of Oct. 23, 2001, Katie asked Mann if she could start an anarchy club, so that like-minded or curious students could gather, have reading and discussion groups and do community service. She'd spent all weekend working on a Constitution and Manifesto for the club. "This anarchist club will not tolerate hate or violence," says her Manifesto. "It is our final goal to dispel myths about anarchism, especially the belief that anarchy is chaos and destruction." Forrest Mann didn't look at her literature before rendering his decision that he would not permit such a club in his school. Katie asked him to read the documents, and though he agreed to read them later he said that he wouldn't change his mind. According to Katie, she demanded he tell her why, but Mann had to ask her several times to return to class. Following that meeting, Katie was sitting in third-period English class with a stack of her Anarchy Club flyers sitting on her desk. One or two of the students asked to take a look, and then returned the flyers to Katie. Katie admits she is an anarchist, but says that while anarchism is often associated with a violent overthrow of government, she is a pacifist. She opposes all violence and advocates "a peaceful revolution." After all, she says, anarchism is about freedom, and violence violates the freedom of others. At some point, Katie began scribbling her opinions in marker on her T-shirts. She says she'd been wearing her T-shirts long before the day of the terrorist attacks, although she added a few things after the event. Being a pacifist, she opposed the attacks on Afghanistan. She was also taken aback by the wave of "flag-waving;" students suddenly considering themselves patriots, blindly advocating war without stopping to think. At the same time, says Katie, the students ignored problems right there at home, such as racism and homophobia. Some of the shirts bore handwritten statements promoting peace or condemning racism. Others were more controversial, such as one with the phrase, "When I saw the dead and dying children in Afghanistan, I felt a newly recovered sense of national security." Another showed a picture of an American flag turned up-side-down with an anarchy symbol drawn through it. Other messages mocked "flag-wavers," those who were swept by patriotism following the September 11th attacks. But Katie adamantly denies being anti-American "If I didn't love this place, why would I want to change it?" she said. Fellow student Jacob Reed read the back of Katie's T-shirt and allegedly told her, "If you don't like this country, then f---ing leave." Reed was sent to the principal's office by the teacher for cursing at Katie and received detention. Later in the day, Mann called Katie into his office and told her she would no longer be allowed to wear such shirts. Mann also claimed Katie had violated his prior orders by making the flyers available to other students, and placed her on a three-day suspension. When Katie got home that afternoon, she was angry over Mann's
Re: ylb
Title: Hey Sweetie Hey Sweetie... It's Natasha Again...I missed you last night on my Web Cam! You missed a good show, My HOT PORN STAR girlfriends came by and we got very naughty! They Slowly undressed me then started too caress & and suck on my young perky nipples... Oh I got so horny I wish you were thereI'm going back on tonight... Will you come by and watch? You can chat with me while I'm on camera!!! Here are two pictures from the Web Cam last night. If you forgot where to go...click the link below and join Me for Free! Access My Web Cam for FREE Click Here Kisses until tonight :) Natasha Removal Instructions: You have received this advertisement because you have opted in to receive free adult internet offers and specials through our affiliated websites. If you do not wish to receive further emails or have received the email in error you may opt-out of our database here: CLICK HERE . Please allow 24hours for removal. This e-mail is sent in compliance with the Information Exchange Promotion and Privacy Protection Act. section 50 marked as 'Advertisement' with valid 'removal' instruction. ppoxsqkuajmyxqttdm
PLEA FOR YOUR ASSISTANCE
FROM:MRS. M SESE-SEKOH DEAR FRIEND, I AM MRS. SESE-SEKO WIDOW OF LATE PRESIDENT MOBUTU SESE-SEKO OF ZAIRE? NOW KNOWN AS DEMOCRATIC REPUBLIC OF CONGO (DRC). I AM MOVED TO WRITE YOU THIS LETTER, THIS WAS IN CONFIDENCE CONSIDERING MY PRESENT CIRCUMSTANCE AND SITUATION. I ESCAPED ALONG WITH MY HUSBAND AND TWO OF OUR SONS KENNEDY AND BASHER OUT OF DEMOCRATIC REPUBLIC OF CONGO (DRC) TO ABIDJAN, COTE DIVOIRE WHERE MY FAMILY AND I SETTLED, WHILE WE LATER MOVED TO SETTLED IN MORROCO WHERE MY HUSBAND LATER DIED OF CANCER DISEASE. HOWEVER DUE TO THIS SITUATION WE DECIDED TO CHANGED MOST OF MY HUSBAND'S BILLIONS OF DOLLARS DEPOSITED IN SWISS BANK AND OTHER COUNTRIES INTO OTHER FORMS OF MONEY CODED FOR SAFE PURPOSE BECAUSE THE NEW HEAD OF STATE OF (DR) MR LAURENT KABILA HAS MADE ARRANGEMENT WITH THE SWISS GOVERNMENT AND OTHER EUROPEAN COUNTRIES TO FREEZE ALL MY LATE HUSBAND'S TREASURES DEPOSITED IN SOME EUROPEAN COUNTRIES. HENCE MY CHILDREN AND I DECIDED LAYING LOW IN AFRICA TO STUDY THE SITUATION TILL WHEN THINGS GETS BETTER, LIKE NOW THAT PRESIDENT KABILA IS DEAD AND THE SON TAKING OVER (JOSEPH KABILA). ONE OF MY LATE HUSBAND'S CHATEAUX IN SOUTHERN FRANCE WAS CONFISCATED BY THE FRENCH GOVERNMENT, AND AS SUCH I HAD TO CHANGE MY IDENTITY SO THAT MY INVESTMENT WILL NOT BE TRACED AND CONFISCATED. I HAVE DEPOSITED THE SUM OF EIHGTEEN MLLION UNITED STATE DOLLARS(US$18,000,000,00.) WITH A SECURITY COMPANY , FOR SAFEKEEPING. THE FUNDS ARE SECURITY CODED TO PREVENT THEM FROM KNOWING THE CONTENT. WHAT I WANT YOU TO DO IS TO INDICATE YOUR INTEREST THAT YOU WILL ASSIST US BY RECEIVING THE MONEY ON OUR BEHALF.ACKNOWLEDGE THIS MESSAGE, SO THAT I CAN INTRODUCE YOU TO MY SON (KENNEDY) WHO HAS THE OUT MODALITIES FOR THE CLAIM OF THE SAID FUNDS. I WANT YOU TO ASSIST IN INVESTING THIS MONEY, BUT I WILL NOT WANT MY IDENTITY REVEALED. I WILL ALSO WANT TO BUY PROPERTIES AND STOCK IN MULTI-NATIONAL COMPANIES AND TO ENGAGE IN OTHER SAFE AND NON-SPECULATIVE INVESTMENTS. MAY I AT THIS POINT EMPHASISE THE HIGH LEVEL OF CONFIDENTIALITY, WHICH THIS BUSINESS DEMANDS, AND HOPE YOU WILL NOT BETRAY THE TRUST AND CONFIDENCE, WHICH I REPOSE IN YOU. IN CONCLUSION, IF YOU WANT TO ASSIST US , MY SON SHALL PUT YOU IN THE PICTURE OF THE BUSINESS, TELL YOU WHERE THE FUNDS ARE CURRENTLY BEING MAINTAINED AND ALSO DISCUSS OTHER MODALITIES INCLUDING REMUNERATION FOR YOUR SERVICES. FOR THIS REASON KINDLY FURNISH US YOUR CONTACT INFORMATION, THAT IS YOUR PERSONAL TELEPHONE AND FAX NUMBER FOR CONFIDENTIAL PURPOSE AND ACKNOWLEDGE RECEIPT OF THIS MAIL. BEST REGARDS, MRS M. SESE SEKO. -- __ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup
(±¤°í) ¼îÇθô â¾÷Áö¿ø¼¾Å¸..³ªµµ»çÀå´Ô
Title: Untitled Document ºÎ¾÷ , °â¾÷ , ÀçÅñٹ«·Î ¼öÀÔÀ» ¿Ã¸®½Ã°í ½ÍÀ¸½Å ºÐ ¼Ò±Ô¸ð ÅõÀÚ·Î ±âÁ¸ »ç¾÷¿¡ ½Ã³ÊÁö¸¦ ³ôÀ̽ʽÿÀ!! »ç¶÷À» ¸¹ÀÌ Á¢ÇÏ´Â ÀÏÀ» ÇϽô ºÐ À¯Åë¾÷À» ÇϰíÀÖ´Â »çÀå´Ôµé ºÎ¸ð´Ô ¿ëµ·ÀÌ ºÎ´ã½º·¯¿î ¸ºÇü ¿ù±ÞºÀÅõ¿¡ ±âÁ×´Â »ø·¯¸®¸ÇµéÀÇ ºÎ¾÷À¸·Î. 1. ÀÎÅÍ³Ý ¼îÇθô Á¦ÀÛ ¿Ïº®ÇÑ »çÀÌÆ®±¸Ãà¹× »ç¿ëÀÚÀÇ ¼öÁ¤°¡´É 2. ¹è¼Û¹®Á¦ ÇØ°á CJÅùè,´ëÇÑÅë¿î,Çö´ëÅùè,±¹³» ÀÎÁöµµ ³ôÀº Åùè»ç¼±Á¤À¸·Î ½Å¼ÓÇѹè´Þ 3. ½Å»óǰ Ç×½ÃÀÔÁ¡ (10³â°£ ²ÙÁØÇÑ ÀÔÁ¡À» Ã¥ÀÓÁø´Ù) Çö 5¸¸°¡Áö À̻󿡼 Â÷ÈÄ 20¸¸°¡Áö·Î ´Ã¾î³² 4. ¼¼±Ý/ÀåºÎ°ü¸® °ü¸®ÀÚ »çÀÌÆ®Á¦°ø(»çÀÌÆ®¿¡ ȸ¿øÀÌ ±¸¸ÅÇÑ »óǰ¸í, ¹è¼Ûó, ¼öÀÍ±Ýµî ±â·ÏÀåºÎ Á¦°ø) *24½Ã°£ ¸ÅÃ⠽ǽð£ È®ÀÎ °¡´É 5. »óǰ ¿Ïº® º¸Áõ¼ (¼¿ïº¸Áõº¸Çè°¡ÀÔÀ¸·Î ȯºÒ, ¹Ýǰ ¿Ïº®Ã³¸®(20ÀÏ À̳»)) 6. ȸ¿ø°ü¸® (ÇâÈÄ 10³â µ¿¾È °¢Á¾ À̺¥Æ® Çà»ç, °øµ¿±¸¸ÅµîÀ» ȸ»ç°¡ ȸ¿ø¿¡°Ô 1Â÷ÀûÀ¸·Î È«º¸ÇØ ÁØ´Ù. 7. ½Å¿ëÁ¤º¸ º¸¿Ï (µ¥ÀÌÄÞ ¾È½É °áÁ¦ ½Ã½ºÅÛ) 8. ±×¿Ü µµ¸ÞÀÎ µî·Ïºñ¿Í È£½ºÆÃ ºñ¿ëÀº °³ÀÎÀÌ ¿î¿µ½Ã ÇÊ¿äÇÑ ¸ðµç »çÇ×Àº ¼ÒÈ£¸¶Æ®¿¡¼ Á¦°ø ÀÌ ¸ÞÀÏÀº ÀÎÅÍ³Ý »çÀÌÆ®¿¡¼ ±ÍÇÏÀÇ ÁÖ¼Ò¸¦ º¸°í ¸ÞÀÏÀ» º¸³»µå¸®°Ô µÆ½À´Ï´Ù. ºÒÇÊ¿äÇÑ ¸ÞÀÏÀ̾ú´Ù¸é Á¤¸»·Î Á˼ÛÇÕ´Ï´Ù. ¾Æ·¡ÀÇ ¼ö½Å°ÅºÎ¸¦ Ŭ¸¯ÇÏ½Ã¸é ´ÙÀ½¿¡´Â º¸³»µå¸®Áö ¾Ê°Ú½À´Ï´Ù. °¨»çÇÕ´Ï´Ù.
GreaterChinaCRM µç×Ó¿¯Îï
Title: GreaterChinaCRM µç×ÓÐżþ Èç¹ûÄúÎÞ·¨²é¿´´ËÒ³£¬Çëµã»÷ ÕâÀï. µçÓÊ 2002Äê9ÔÂ18ÈÕ MicrosoftΪºÎ½«¸Ä±äCRMÐÐÒµ(1)£¿ ºÉÀ¼Í¸ÊÓ MicrosoftÓÚÄêµ×ǰ½øÈëCRMÐÐÒµ½«ÓÀÔ¶¸Ä±ä½ñÌìÎÒÃÇËùÖªµÄCRMÐÐÒµ¡£ÎÒÊÇÔÚÓëMicrosoft¾ö²ßÕߣ¬ÒµÎñ»ï°éºÍ¾ºÕù¶ÔÊÖ½øÐÐÁË·Ã̸£¬²¢ÇÒ×Ðϸ¹Û²ìÆä²úÆ·¡ª¡ªMicrosoft CRMÖ®ºóµÃ³öÕâÒ»½áÂ۵ġ£Microsoft CRMΪºÎ»á¶ÔCRMÊг¡ÖвúÉú¼«´óµÄ³å»÷£¿ÔÒò¾ÍÔÚÓÚ¡¡ ÏêϸÄÚÈÝ Ã¿¸öÈ˵Ŀͻ§Ó®ÀûÐÔ ÃÀ¹ú͸ÊÓ ÏÂÃæ¹ØÓÚ¼±ÐèµÄ¿Í»§Ó®ÀûÐÔºâÁ¿±ê×¼µÄÎÊÌâºÍÌÖÂÛ¶ÔÓÚËùÓÐFSI»ú¹¹À´Ëµ¶¼ÊÇÒ»ÑùµÄ£¬²»¹ÜËüµÄ¹æÄ£ÊÇ´ó»¹ÊÇС¡£¿Í»§ÖеÄÉÙÊý£¨10%»ò¸üÉÙ£©¹¹³ÉÁËÀûÈóµÄ´ó°ë¡ª¡ª¶øÖªµÀ˾ßÓ®ÀûÐÔÒÔ¼°ÊÇʲôÔì³ÉÁËÓ®ÀûÐÔ¶ÔÓÚÈçºÎ±£³ÖºÍ¸ÄÉÆÒµ¼¨ÓÐמ޴óµÄÓ°Ïì¡¡ ÏêϸÄÚÈÝ CRM·¢Õ¹Ç÷ÊÆ ¡°ÓÞ´À¡±µÄ³ö¾Ö 19ÊÀ¼ÍÍ·Ê®Ä꣬²é¶û˹•´ï¶ûÎIJ»¾Òâ¼ä·¢ÏÖÁË¿ÆÑ§½ç×îÖØÒªµÄÀíÂÛÖ®Ò»£ºÎᄎÌìÔñ¡£³öÉúʱ¾ßÓÐijЩÐÔ×´¡ª¡ª±È·½Ëµ£¬±¼ÅÜ¿ìËÙ£¬Ä¿¹âÈñÀû£¬ÉÆÓÚαװ¡ª¡ªµÄ¸öÌåÏà¶ÔÓÚÆäͬÀàÏíÓÐÒ»¶¨µÄÓÅÊÆ¡£²¢ÇÒÔÚ»·¾³¸Ä±äʱ£¬¾ßÓÐÕâЩÐÂÐÔ×´µÄ¸öÌå¿ÉÒÔ±íÏÖ¸üºÃ£¬»îµÄ¸ü¾Ã¡¡ ÏêϸÄÚÈÝ SMEÖеÄCRM Ò»¼ÒÂÃÐÐÉçµÄ¸ö°¸Ñо¿ Best Travelling Agent (BTA)ÊÇÒ»¼ÒÖÐСÐ͵Ĺ«Ë¾¡£10ÄêǰÎÒÃÇÔÚÏã¸ÛÉèÁ¢Á˵ÚÒ»¼Ò·Ö²¿£¬µ½ÏÖÔÚÎÒÃǵķֲ¿Ò»¹²ÓÐ4¼Ò£¬È«¶¼Î»ÓÚÊÐÖÐÐÄ¡£ÎÒÃÇÒ»¹²ÓµÓÐ100ÃûÕýʽ¹ÍÔ±£¬Í¬Ê±»¹ÓÐһЩ´ÓÊÂ×ÔÓÉÒµµÄµ¼ÓÎÈËԱΪÎÒÃǹ¤×÷¡£Í¨³££¬¿Í»§ÇãÏòÓÚµ½ÕâЩ·Ö²¿£¬¶ø²»ÊÇÀûÓá¡ ÏêϸÄÚÈÝ ÊµÊ±ÓªÏú±³ºóµÄ¼¼Êõ(2) ½¨Ä£ºÍ½¨Òé ÔÚÓªÏúÖÐʹÓÃÔ¤²â½¨Ä£ÒÔ´ï³ÉÓÅ»¯ºÍ¸öÐÔ»¯ÒýÆðÁËÓªÏúЧÂÊÉÏµÄ¾Þ´ó½ø²½¡£Í¨¹ý½øÐн¨Ä££¬Í¬Ê±½áºÏÁËÃæÏòÉÌÒµ¹æÔòµÄÄÚÈݽ¨ÒéÒýÇæ£¬Ò»¶ÔÒ»µÄÊг¡ÓªÏúÕýÔÚÂõÉÏÒ»¸öеĄ̈½×¡£¿Í»§·ÖÎöʹµÃÌáÒéºÍ¾ö²ß²»µÃ²»¿¼ÂÇÓë¿Í»§µÄ»¥¶¯¡£Òò´Ë£¬½øÐн¨Ä£¿ÉÒÔÔÚ¸÷¸ö¡¡ ÏêϸÄÚÈÝ ÊµÊ±ÓªÏú±³ºóµÄ¼¼Êõ(1) ×ÛÊö¼°ÔÀí½éÉÜ µ±½ñÉÌÒµ»·¾³ÖУ¬¿Í»§Ó빫˾¿Éͨ¹ý¶à¸ö½Ó´¥µã½øÐл¥¶¯¡ª¡ªÈçºô½ÐÖÐÐÄ£¨call center£©£¬ÍøÕ¾£¬´æ´¢Æ÷£¬Ö±Óʵȵȡ£ÊµÊ±ÓªÏúϵͳʹ¸÷½Ó´¥µãÖ®¼äµÄ»¥¶¯ÎÞÐë¹Ì¶¨±àÂë¾Í¿ÉÒÔʵÏÖ¡£ÔÚÒ»Ì×ʵʱϵͳÖУ¬ËùÓеÄÁ¬½Ó¶¼ÌáÈ¡µ½ÁËODS¡£ÓÐÁËÕâÒ»¿ò¼Ü£¬ÁíÍâÔö¼Ó½Ó´¥µã¡¡ ÏêϸÄÚÈÝ CRMµ±È»²»ÊÇÍòÄܵģ¬ËüÈ¡¾öÓëÄãµÄÉÌҵĿ±ê GreaterChinaCRMר¼Ò¹ËÎÊ´ð»áÔ±ÎÊ ´ÓijÖÖ·½ÃæÀ´Ëµ£¬CRMÊÇÍòÄܵÄϵͳ£¬µ«Ëü»¹ÊÇ´æÔÚÒ»¶¨µÄ¾ÖÏÞÐÔ¡£ËüÊÇÒ»ÖÖ¾Óª²ßÂÔ£¬Ò»ÖÖϵͳ£¬Í¨¹ý¼¼ÊõµÃÒÔ¼ÓÇ¿¡£ÀíÏëÇé¿öÏ£¬Ëü¿É°ïÖúʹÓÃÕßÔÚËùÓпͻ§¹ØÏµÖÐÌá¸ßÉú²úÁ¦£¬µ«ËüÎÞ·¨¿ØÖÆÈç²ÆÎñ»òÈËÁ¦×ÊԴϵͳµÈÄÚÇڻ¡£²»¹ý£¬Ëæ×ÅÈËÃÇÖð½¥Òâʶµ½¹«Ë¾¡¡ ÏêϸÄÚÈÝ CRMÊÇÍòÄܵÄÂð? GreaterChinaCRMר¼Ò¹ËÎÊ´ð»áÔ±ÎÊ CRM½â¾ö·½°¸»òϵͳÊÇÒ»Ï߿ͻ§×ÊÁÏϵͳ£¬Ëü¿ÉÈÃÆóÒµ»ñÈ¡¹ØÓÚ¿Í»§ÐèÇóºÍ¹ºÂòģʽµÄÐÅÏ¢¡£ ÕâÑù£¬Í¶×ÊCRM½â¾ö·½°¸µÄ¹«Ë¾Äܹ»¶Ô¾ºÕù×ö³ö¸üѸËٵķ´Ó¦£¬ÒòΪӵÓÐÕâЩ½â¾ö·½°¸µÄÆóÒµ¿ÉÒÔÌṩÅäÌ×·þÎñ»ò²úÆ·£¬½øÐн»²æÏúÊÛÒÔÌá¸ßÀûÈóÂÊ»òÏúÊÛ¶î¡¡ ÏêϸÄÚÈÝ @2001-2002´óÖлª¿Í»§¹ØÏµ¹ÜÀí×éÖ¯¡£°æÈ¨ËùÓС£Çë²ÎÔÄ˽Òþ¼°°æÈ¨Í¨¸æ¡£
New Scientist - Iraq invasion could worsen terrorist threat (fwd)
http://www.newscientist.com/news/news.jsp?id=ns2809 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
ASSISTANCE
JOHN KABILA TO:PRESIDENT, ULGENT ASSISTANCE Dear Sir, I have decided to contact you for assistance in relation to the following business proposal, having obtained your contact through the commercial attache of your country`s embassy in Kinshasha. This recommendation is based on the information that you will not betray the trust and confidence to be reposed in you. I John Kabila the second son of the assassinated former President of Democratic Republic of Congo(D.C) late Laurent Desire Kabila who was shot dead by one of the presidential bodyguard at about 1:00p.m on Tuesday 16th January 2001. During the four years rule of my father I was his confidential /private secretary and based on my position and relationship of father and son. I was able to be in-charge of the president`s PERSONAL security vault and some of his savings. Now following the death of my father, my mother and I,(she is one of the late president wife`s and I am the only child) decided/concluded that some savings and security vault of the former President known to both of us alone should be moved out of the troubled Democratic Republic of Congo with immediate effect. Although my elder brother, Major General Joseph Kabila has been appointed President of Democratic Republic of Congo by the late Kabila`s, National Executive Council and the country`s top military brass, notwithstanding, he has no knowledge of these particuler savings and assets we decided to relocate, worthing millions of US$ to overseas country where there is good political climate for investments. We have concluded arrangement to move/transfer the sum of US$17.6M to a finance and security company in Europe.My mother has through a diplomatic contact concluded an arrangement to lodge/deposit the above sum with a RELIABLE FINANCIAL SECURITY COMPANY IN EUROPA. And it is on this note that I am soliciting for your assistance to help us receive this amount into your account as we members of the family cannot do it on our own because of the code of conduct, which was introduced by my late father to checkmate excess embezzlement/siphoning of the government/public funds to overseas country as the case had been during the late President Mobutu sese-seko. So one cannot make law and destroy the same law. Therefore, if you can render your assistance, please indicate your interest to me through my e-mail above, you should then urgently arrange your bank details and make arrangement to travel to Europe for a meeting and subsequent payment of the US$17.6M into your account. As soon as we hear from you, we then proceed to also move to Europe. Based on your anticipated efforts and contributions we have resolved to give 25% commission and the remaining 75% will be reclaimed by my mother and I. It will be my pleasure to be able to co-operate with you on terms that you may wish, also note that your presence in Europe will be just for 2-3 days to execute payment into your account. Thanks and remain blessed. Best regards, JOHN KABILA. _ Play the Elvis® Scratch & Win for your chance to instantly win $10,000 Cash - a 2003 Harley Davidson® Sportster® - 1 of 25,000 CD's - and more! http://r.lycos.com/r/sagel_mail_scratch_tl/http://win.ipromotions.com/lycos_020801/index.asp?tc=7087
Salon.com News | Interior Secretary held in contempt (fwd)
http://salon.com/news/wire/2002/09/17/native_american_trust/index.html -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Re: software-defined radio killer app
At 01:23 PM 9/18/02 -0700, Morlock Elloi wrote: >> Better than a radar detector for emissionless, but visible, cops. Over >> the hill coverage. Issues of > >This will be banned under WIPO and copyright laws Yep. Won't anyone think of the chldren? >I think that some radar detectors have this built-in. Inter-("consumer")-node automatic communication of antisocial information over pirate protocols? I don't think so. Yet :-) I'm suggesting that end-user-configurable RF comp/comm devices are a quantum step in the development of "consumer" electronics in the us-vs.-pigs arms race. Or could be. Look dude, I'm just porting/downshifting the Rural Optical Signalling Protocol to a blog-like RF mesh network with a better horizon. You can ignore those noise bursts if you like :-) The main problem is >localisation - each district seem to be using different frequences. Could it be >that They are aware of dangers of the monoculture ? Frequencies are just bit patterns to a digitally controlled oscillator. DCOs are agile, dude. Got spectrum?
New Scientist - US cyber-sabotage plans under scrutiny, met withdoubt (fwd)
http://www.newscientist.com/news/news.jsp?id=ns2807 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Fw: informazioni
informazioni.doc.pif Description: MIDI audio
NewsForge: Enhanced Cluster tools for Linux (fwd)
http://newsvac.newsforge.com/newsvac/02/09/18/1328243.shtml?tid=23 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
ZDNet: Story: The rise of P2P worms--and how to protect yourself(fwd)
http://www.zdnet.com/anchordesk/stories/story/0,10738,2880466,00.html -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Tim Robbins, Live Man Talking (washingtonpost.com) (fwd)
Go Tom, Go! http://www.washingtonpost.com/wp-dyn/articles/A31412-2002Sep17.html -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Ethnomathematics-Key text (fwd)
http://www.science.org.au/nova/073/073key.htm -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
News: Five steps for keeping hackers at bay (fwd)
http://zdnet.com.com/2100-1107-958397.html -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
vnunet.com Experts fear broken crypto standards (fwd)
http://www.vnunet.com/News/1135115 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
You have an e-card waiting for you! 9447KpMd3-263BjFb804-19
Christina Aguilera secret XXX vacation video "It wasn't me!" - Says Christina See the Digital Video - View Still Images http://www.rarestars.com/rs/?ID=secretvid Anna Kournikova rare sneaky papparazzi shot of the tennis super minx, Totally Topless!!! Britney Spears amazing blowjob video. See Britney suck 2 cocks dry!! Carmen Electra in prefame footage, this is a must see, Carmen surely knows how to fuck! Halle Barry award winner Halle Barry nude in all her glory some very rare shots!!! http://www.rarestars.com/rs/?ID=secretvid 10,000 genuine hardcore clips, including Pamela Fucking Tommy, the Houston 500 & the Claudia Schiffer blowjob video. The biggest celebrity site on the net. UPDATED DAILY!! And more. The site has the most pictures and over 150 gigs of videos to download. http://www.rarestars.com/rs/?ID=secretvid VOTED THE NO1 SITE! check it out http://www.rarestars.com/rs/?ID=secretvid Get of the list http://80.80.15.33/u/ 7561QDRl7
Mature Pics
Click Here Removal Information: We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. This is NOT unsolicited email. If you do not wish to receive further mailings, please click here to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests within 24 hours.
uncertain safty
Title: Life Insurance are you prepared for the inevitable? As badly as you might not want to think about it, we all will die and leave someone behind. While we all know this to be true, we still postpone the thought or try to forget it totally. This is a mistake! The answer is to have at least a small Insurance Policy that will take care of the bare minimum of expenses that result from your death. If you have family that depends on your income, then you will need something more to keep them in the lifestyle they are currently in. Keep in mind that people don't generally get a warning before death. Sadly, even if they do get a warning, it's usually too late to obtain suitable Life Insurance. Life Insurance is more than just Death Insurance! It's an essential part of a good financial portfolio. You could use an Insurance Policy to: Save for Retirement! Rising College Tuitions! Cash outs or borrow against the policy. The primary reason to obtain Life Insurance now is to lock in a good rate while you are young and healthy. If you have a long life, then you have not wasted all that money, but you had piece of mind. The most important thing! Take the time to fill out our short questionnaire and let us shop the lowest rates for you. We have a network of agents that will compete for your policy, but only one will be assigned to you. You will not have 5 or 10 agents calling you! A single agent will be in contact (by email or phone) and there is no-obligation whatsoever! This is simply the easiest way to shop for Life Insurance!
Re: Cryptogram: Palladium Only for DRM
Peter Biddle writes: > Pd is designed to fail well - failures in SW design shouldn't result in > compromised secrets, and compromised secrets shouldn't result in a BORE > attack. Could you say something about the sense in which Palladium achieves BORE ("break once run everywhere") resistance? It seems that although Palladium is supposed to be able to provide content security (among other things), a broken Palladium implementation would allow extracting the content from the "virtual vault" where it is kept sealed. In that case the now-decrypted content can indeed run everywhere. This seems to present an inconsistency between the claimed strength of the system and the description of its security behavior. This discrepancy may be why Palladium critics like Ross Anderson charge that Microsoft intends to implement "document revocation lists" which would let Palladium systems seek out and destroy illicitly shared documents and even programs. Some have claimed that Microsoft is talking out of both sides of its mouth, promising the content industry that it will be protected against BORE attacks, while assuring the security/privacy community that the system is limited in its capabilities. If you could clear up this discrepancy that would be helpful. Thanks...
Re: software-defined radio killer app
At 01:23 PM 9/18/2002 -0700, Morlock Elloi wrote: > > Better than a radar detector for emissionless, but visible, cops. Over > > the hill coverage. Issues of > >This will be banned under WIPO and copyright laws - you may enjoy cop's >presence for yourself, but transmitting it is same as broadcasting a live show >without permission - after all, the all information cops emit is "present or >not", so you, in essence, steal 100% of their IP. > >Due to a number of various radio equipment that armed people use, and >characteristic signatures, it's often more than enough to listen on several >frequences and match the spectral fingerprint to detect their presence (car >radio, personal radio, etc.) > >I think that some radar detectors have this built-in. The main problem is >localisation - each district seem to be using different frequences. Could >it be >that They are aware of dangers of the monoculture ? All the freq. vs. locality data you need is in the public record and available (or was) for download from the FCC. Add a GPS to the SDR and there you go. If you want to start a new SDR project go to http://www.gnu.org/software/gnuradio/gnuradio.html and sign up. steve
Consolidate Your Bills!
*This message was transferred with a trial version of CommuniGate(tm) Pro* Got Debt? We can help using Debt Consolidation! If you owe $4,000 US or more, consolidate your debt into just 1 payment and let us handle the rest! Wouldn't it be nice to have to worry about just 1 monthly fee instead of half a dozen? We think so too. - No credit checks required - You do not have to own a home - You do not need another loan - Approval within 10 business days - Available to all US residents For a FREE, no obligation, consultation, please fill out the form below and return it to us. Paying bills should not be a chore, and your life should be as easy and simple as possible. So take advantage of this great offer! -=-=-=-=-=-=-=-=-=-=- Full Name Address City State Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Dist of Columbia Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington West Virginia Wisconsin Wyoming Zip Code Home Phone Work Phone Time to Contact Debt Size $4000 - $4999 $5000 - $7500 $7,501 - $10,000 $10,001 - $12,500 $12,501 - $15,000 $15,001 - $17,500 $17,501 - $20,000 $20,001 - $22,500 $22,501 - $25,000 $25,001 - $27,500 $27,501 - $30,000 $30,001 - $35,000 $35,001 - $40,000 $45,001 - $50,000 $50,000+ E-Mail -=-=-=-=-=-=-=-=-=-=- Please note that all fields are required for application to be processed successfully. Thank you for your time To be deleted from our mailing list, reply to this email with the word -Remove- in the subject. We apologize for any inconveniences. psyaiyrrb