At 01:22 PM 10/18/00 -0500, Michael A. Miller wrote:
I'd like to package ImageJ: http://rsb.info.nih.gov/ij/
"ImageJ is a public domain Java image processing program
inspired by NIH Image for the Macintosh. It runs, either as an
online applet or as a downloadable application, on a
At 01:22 PM 10/18/00 -0500, Michael A. Miller wrote:
>I'd like to package ImageJ: http://rsb.info.nih.gov/ij/
>
> "ImageJ is a public domain Java image processing program
> inspired by NIH Image for the Macintosh. It runs, either as an
> online applet or as a downloadable applicatio
At 06:55 PM 8/29/00 +0100, Roger Burton West wrote:
On Tue, Aug 29, 2000 at 12:55:21AM -0400, Jeremy T. Bouse wrote:
> I'm curious to find some differeing opinions pro/con use of XML for
>configuration files...
IMHO one of the biggest advantages of Unix is that configuration files
are plai
At 06:55 PM 8/29/00 +0100, Roger Burton West wrote:
>On Tue, Aug 29, 2000 at 12:55:21AM -0400, Jeremy T. Bouse wrote:
> > I'm curious to find some differeing opinions pro/con use of XML for
> >configuration files...
>
>IMHO one of the biggest advantages of Unix is that configuration files
>a
At 12:45 PM 8/18/00 -0500, Bolan Meek wrote:
Richard Braakman wrote:
>
> On Fri, Aug 18, 2000 at 04:36:26PM +0200, Stefan Alfredsson wrote:
> > IIRC what happens is that a special signature is added to
> > your key which informs of the new expiredate,
> > and since this packet is signed by you it
At 12:45 PM 8/18/00 -0500, Bolan Meek wrote:
>Richard Braakman wrote:
> >
> > On Fri, Aug 18, 2000 at 04:36:26PM +0200, Stefan Alfredsson wrote:
> > > IIRC what happens is that a special signature is added to
> > > your key which informs of the new expiredate,
> > > and since this packet is signed
At 02:56 PM 7/28/00 +0200, Andreas Rottmann wrote:
Christoph Baumann <[EMAIL PROTECTED]> writes:
> On Thu, Jul 27, 2000 at 10:23:25AM -0800, Britton wrote:
> >
> > I now have my key, scannec copy of id, etc. all in hand, and am ready to
> > post to new-maintainer, but I am not sure how to sign m
At 02:56 PM 7/28/00 +0200, Andreas Rottmann wrote:
>Christoph Baumann <[EMAIL PROTECTED]> writes:
>
> > On Thu, Jul 27, 2000 at 10:23:25AM -0800, Britton wrote:
> > >
> > > I now have my key, scannec copy of id, etc. all in hand, and am ready to
> > > post to new-maintainer, but I am not sure how
ssert that the two keys are in fact from the
same person?
>What pain is involved in telling pgp what key to use?
>
>Adam
>
>
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROT
--On Friday, September 11, 1998, 3:59 PM +0200 "Stephane Bortzmeyer"
<[EMAIL PROTECTED]> wrote:
>
> It seems there are a lot of problems with the non-free section, for
instance
> CDROM vendors who do not bother to check every licence individually and
who
> exclude the whole non-free tree. Basi
ng run tell everyone what you have been doing,
> your doing was worthless. Edwim Schrodinger
> Manoj Srivastava <[EMAIL PROTECTED]> <http://www.datasync.com/%7Esrivasta/>
> Key C7261095 fingerprint = CB D9 F4 12 68 07 E4 05 CC 2D 27 12 1D F5 E8 6E
>
>
linux" and "oldlinux". I find this very handy when I'm
experimenting with new kernel configurations.
I think others would find it useful as well, and I'd like to make a
Debian package out of it.
Where do I start? What should I read first?
Later,
Buddha
--
Budd
12 matches
Mail list logo