Too All and dear Jim

2002-02-07 Thread jill jill
Dear Jim Woman's logic tell me I should make a deal. So I will stop useing cypherpunks for storage if proff11,jeri and you dear Jim will stop using it for storage. On Fri, 8 Feb 2002, [iso-8859-1] jill jill wrote: > Thanks Jim > Jim Choate says it is ok to use cypherpun

Your own way

2002-03-14 Thread jill jill
Bell Johnson Taylor and Choate are naughty little boys who want their own way, WHO ALL BEND OVER WHEN THE FEDS COME.like you Jim,grow up. __ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts ht

Jim Darling

2002-03-15 Thread jill jill
Jim my darling I know you think we women are stupid,but we can and do read,so you can now stop your silly posting to the list,it makes you look such a fool. Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com

Jim Darling

2002-03-16 Thread jill jill
Jim Darling Stop making such a fool of yourself every one can read the same as you,each day that goes bye that you post nothing you go into another persons garbage pail. your at the point now that if you really had somthink to say no one would listen to you. __

Jim Darling you are such a foolish little boy

2002-03-18 Thread jill jill
darling when you are in a corner you act like a silly little boy and try to lie your way out. If you was my son I put you over my knee and spank you for lies to me On Mon, 18 Mar 2002, [iso-8859-1] jill jill wrote: > Jim Darling >I see you are still mad at Tim,you know Jim Darling

Forwarding

2002-03-19 Thread jill jill
Yes the more people the loon poster had to put in his kill file,the blinder he would get untill he saw no one In the end he would be on the list on his own. WOW I like it. Guys and Gals it is up to you. CLEAN THE LIST. find the net loons we have on this list is more than I

networks and the brain you may have missed it

2002-03-24 Thread jill jill
http://www.newscientist.com/news/news.jsp?id=ns2067 __ Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts http://uk.my.yahoo.com

Put her on the list,she never will be missed

2002-03-25 Thread jill jill
> > To wit, no two people can safely tell the same lie to the same person. Choate: > Actually they can, only one (or both, if we allow 3 or more agents, only > one is required to 'know' the lie) of the people must believe it is the > truth. Well, I doan' kno' nuttin' 'bout no agents. That fact h

Girls will be girls

2002-03-26 Thread jill jill
Is this girl code. Aimee i'am looking for the sheep e: > Aimee wrote: > > > > To wit, no two people can safely tell the same lie to the same person. > > Bah. I say it depends entirely on what the lie is, who's being > lied to, and how > confident and artistic the confidence artists are. You're

JIM DARLING

2002-05-04 Thread jill jill
The problem with this list is if some one new who can contribute to the topic on this list who knows what they are talking about. They do not want a moderated list nor do they want to wade though Jims spam. Can we drop Einstein from the list? Yes I know how to filter, but why should we all have to

JIM DARLING

2002-05-04 Thread jill jill
You lie you cry you spam. You lied to me when you said you stared this list. You say this list is unmoderated yet you cry and say some one users your name.unmoderated is unmoderated. All your posts are off topic. What is this CACL you talk about is it the ones who have asked you to stop,I think

Jim Darling

2002-05-05 Thread jill jill
Do I have this right the school yard bully comes and you all run away. Jim Darling comes on your list after it has been running for three years,he starts spaming his slashdot spam to the list,opens his node up to every spammer in the world,and you all run to a moderated list. He enjoys calling y

O n Topic

2002-05-12 Thread jill jill
Vulnerability Is Discovered in Security for Smart Cards By JOHN MARKOFF AN FRANCISCO, May 12 — Two University of Cambridge computer security researchers plan to describe on Monday an ingenious and inexpensive attack that employs a $30 camera flashgun and a microscope to extract secret informatio