Please see the attached file for details.
At 12:27 PM 9/12/2001 -0400, Sundar wrote:
>...
>Fucking troll! If anything, you have a lot more in common with those
>responsible for this atrocy than you do with any freedom loving citizen of
>the USA. Or for that matter any cypherpunk.
>
>This was an attack against our liberty. Against our f
ation on
file at all times. Dump it to usenet, Geocities, and ABCNews
simotaneously. No muss, no fuss, and the average joe would be too
busy fuming at all the ways his trusted leadership had betrayed his
ideals and morales.
But then again, we have Clinton, and nothing's ha
a battleship? No.
Just keep the boarders from walking away under thier own power. It
looks like you pretty much need someone on the inside to get in
conveniently, and anything that those weapons couldn't threaten could
probably take out the whole platform from 12 miles off anyway.
Hen
, toast the file on your hard drive. The first key can
>also be on a ZIP disk if you're concerned about physical security.
>
>
>
Told ya!
Good luck,
Sean
-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.1 for non-commercial use <http://www.pgp.com>
iQA/AwUBOWKgaZHDo
izes this format, and automatically
diverts it to /dev/null, when it gets one itself. The reason for
this last is, occassionally, someone will send a chained message, and
forget to add the last hop. The last hop, and the second to last
hop, would then play tennis with that message until one
It would also
be likely to invite the ire of the list operators, who would have to code
this. They would most definately be in the right.
In other words, the seed of an idea. Do with it as you wish, I can take
the heat.
Good luck,
Sean
message using modern techniques have a near flat distribution of all
characters used?
Good luck,
Sean Roach
At 12:30 AM 10/5/2000, Tim May wrote:
> That you would say "beautiful sentiment" to the overall article you
quoted is...scary.
Perhaps I misspoke. What I meant to get across was that the article was
compelling, but I didn't believe it was practicle.
26 megabytes is a bit much, I should have
ta. The three
methods I can see to do the latter are, stiff penalties for buying more
than allowed, ration tickets, and both.
Did the government have such limits in place?
Good luck,
Sean
d to count to 4, then your options are
tremendous.
1,2,3,4,3,4,2,4,2,3,1,2,4, 11 commands from 1 to the next 1 in this
example. from line to that same line. This would allow for a secure
monitor that didn't invite eyestrain.
Good luck,
Sean
dishonest to be considered, or too ignorant to be
>qualified. You aren't going to get what you by
>electing a politician won't even tell the truth
>about the current state of government or his
>intentions for the Presidency.
...
At this point, based on the above math, I stopped reading.
Good luck,
Sean Roach
within a
standard document format.
Below is a description of a system that satisfies some of my needs. I would
appreciate some feed back. Thanks.
--Sean Hastings
--mailto:[EMAIL PROTECTED]
--vmsg/fax:1.800.why.sean
- - -
VOXP - Value and Obligation eXchange Processing
Sectional Parameter
Hello,
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding SpyWare or AdWare to
your computer without your knowledge. "Spyware" is a common term for files that are
installed on your system without your knowledge that allow
I got the invite as well. It LOOKS like they might be adding a little of
the OLD Freedom back in. Anyone know if it's more than one proxy server,
and if ZKS is going to control it/them?
I haven't uninstalled freedom 3.0, but I haven't used Freedom at all since
they pulled the tunneling.
rposes, including some interesting ones
like "Digital Rights" and "Windows System Component Verification."
I just tried this, and it appears to be the case. (But I haven't
yet tried to see whether Windows will happily use my root for these
OS-specific purposes....)
--Sean
Actually, our group at Dartmouth has an NSF "Trusted Computing"
grant to do this, using the IBM 4758 (probably with a different
OS) as the hardware.
We've been calling the project "Marianas", since it involves a chain of
islands.
--Sean
>If only there were a
<><><><>
Hello,
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding SpyWare or AdWare to
your computer without your knowledge. "Spyware" is a common term for files that are
installed on your system without your knowledge tha
i guess it's appropriate that the world's deepest
hole is next to something labelled a "trust territory" :)
--Sean
:)
Hello,
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding SpyWare or AdWare to
your computer without your knowledge. "Spyware" is a common term for files that are
installed on your system without your knowledge that allow c
20 matches
Mail list logo