Re: Recommendations for spam filtering on RH9+ servers?

Discussion in 'Digital Photography' started by Norman L. DeForest, Nov 24, 2004.

  1. who diminishs from time to time, when Ikram inhibits the partial test but the cathedral

    is described by senior staff as the 'foundation stone' of all the
    arrangements with the 'partner' agencies.


    P110 The GCSB introduces the new trainees to the world of codebreaking by
    advising them to read two of the greatest exposes of signals intelligence:
    James Bamford's 'The Puzzle Palace' and David Kahn's 'The Code Breakers'.


    P22
    In 1984, Glen Singleton of the NSA was formally appointed GCSB's Deputy
    Director of Policy and Plans. Having an American inside the GCSB serving as
    a foreign liaison officer would be one thing: allowing an officer from another
    country to direct policy and planning seems extraordinary.

    [ Unless you think of the NSA as the New World Order. ]


    P28-29
    Intelsat 7s can carry 90,000 individual phone or fax circuits at once. All
    'written' messages are currently exploited by the GCSB. The other UKUSA
    agencies monitor phone calls as well.

    The key to interception of satellite communications is powerful computers that
    search through these masses of messages for ones of interest.

    The intercept stations take in millions of messages intended for the
    legitimate earth stations served by the satellite and then use computers
    to search for pre-programmed addresses and keywords.

    In this way they select out manageable numbers (hundreds or thousands) of
    messages to be searched through and read by the intelligence analysis staff.

    Many people are vaguely aware that a lot of spying occurs, maybe even on them,
    but how do we judge if it is ubiquitous or not a worry at all? Is someone
    listening every time we pick up the telephone? Are all Internet or fax
    messages being pored over continuously by shadowy figures somewhere in a
    windowless building? There is almost nev
     
    Norman L. DeForest, Nov 24, 2004
    #1
    1. Advertising

  2. the breakdown for the upset interior is the geography that replys eventually

    Barry McCaffrey of the Office of National Drug
    * Control Policy has called "our central purpose and mission -
    * - reducing illicit drug use and its consequences."

    In Florida, they charged a mother with delivering cocaine to her baby.
    A problem with this is the mother-addict repeatedly applied for rehab
    programs, but there were no available slots. Not enough funding.


    Law enforcement drug hysteria. Decades of Drug War.


    Those rumor-level stories about our government encouraging
    drugs to reach the inner cities were weird.

    Remember, we've been having a Drug War for four decades now.

    I guess there is a certain logic to it. Obviously the government is into
    hysteria on the matter: it is then possible that they would want to continue
    having a drug problem so they could continue the hysteria.

    Even the Attorney General was drooling over drug forfeiture dollars, to the
    point of shunting aside other cases.


    Recently...

    : CBS 60 Minutes, Steve Croft reporting.
    :
    : Remember that story of the hero customs agent snagging a tanker truck full
    : of cocaine? There is a strange twist to the story.
    :
    : The Federal agent's manager repeatedly tried to interfere with him making
    : the bust.
    :
    : The agent's dog had flagged the truck; the agent weighed it and found a
    : discrepancy. His manager said it must be in the tires. You can only check
    : the tires for drugs he was told.
    :
    : But the agent persisted, and made the bust. His manager let the driver
    : of the truck leave. The driver literally fled on foot back to Mexico.

    What the hell was that about???

    Was it a single corrupt Federal agent?

    : CBS 60 Minutes, Steve Croft reporting.
    :
    : Standing at a fence about a hundred feet from
     
    Norman L. DeForest, Nov 24, 2004
    #2
    1. Advertising

  3. Norman L. DeForest

    Abdul Rajim Guest

    begin to lessen ECHELON's ability to
    spy in such a massive dragnet fashion.

    There is an ugly implication to ECHELON being the reason Netscape and company
    are being held hostage by the NSA.

    "Only with a court authorized warrant..." --- Louis Freeh, FBI Director

    Louis Freeh is lying.


    ******************************************************************************

    Key Recovery Isn't Even Feasible
    --- -------- ----- ---- --------

    http://www.epic.org

    Distinguished cryptographers and computer scientists have released a new
    report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party
    Encryption."

    The report follows an earlier recommendation of the OECD that the risks of
    key escrow encryption be considered before key escrow infrastructures are
    established. The report concludes "The deployment of a global key-recovery-
    based encryption infrastructure to meet law enforcement's stated specifications
    will result in substantial sacrifices in security and greatly increased costs
    to the end-user."


    http://www.crypto.com/key_study/report.shtml

    The Risks of Key Recovery, Key Escrow,
    and Trusted Third-Party Encryption

    Hal Abelson[1]
    Ross Anderson[2]
    Steven M. Bellovin[3]
    Josh Benaloh[4]
    Matt Blaze[5]
    Whitfield Diffie[6]
    John Gilmore[7]
    Peter G. Neumann[8]
    Ronald L. Rivest[9]
    Jeffrey I.
     
    Abdul Rajim, Nov 24, 2004
    #3
  4. Norman L. DeForest

    Abdul Rajim Guest

    Lionel <> wrote in message news:<>...
    > I want to migrate a bunch of domains from (currently) several randomly
    > configured mail servers to a single RH9-based server. I'd be most
    > interested in recommendations on configuring such a server for optimum
    > spamfiltering. Ideally, I'd like to include Bayesian filtering with a
    > web UI, so the users can set their own preferences for filtering, such
    > as white-listing, etc.
    >
    > Any suggestions would be much appreciated, as would general tips &
    > 'gotchas' . :)


    STOP SPAMMING CHEESEDICK
     
    Abdul Rajim, Nov 24, 2004
    #4
  5. Norman L. DeForest

    Abdul Rajim Guest

    President
    # Clinton took the same line in New Orleans on Thursday.
    #
    # President Clinton recommended to state and city officials a recently
    # released Justice Department report on how these programs can be set up
    # to pass court review and work effectively.
    #
    # The risk of selective enforcement is high, and it's not hard to predict
    # which neighborhoods will be the focus of police attention, and which
    # will be ignored.

    Get a load of this:

    * "Police Applaud Ruling to Allow Restrictions on Gang Suspects"
    * By Tim Golden, The New York Times, February 1, 1997
    *
    * Law enforcement officials in California today praised a State Supreme
    * Court decision that allows cities to prohibit SUSPECTED gang members
    * from standing together on street corners, climbing trees, wearing beepers
    * and doing any number of other things that are legal for ordinary citizens.
    *
    * The ruling was in a case for the city of San Jose to prevent 38 Hispanic
    * men and women suspected of membership in a street gang from frequenting
    * a four-block neighborhood that the police said the gang had terrorized.
    *
    * "We're thrilled," said Los Angelos County Attorney Gil Garcetti.
    *
    * State and local law enforcement officials predicted that the court ruling
    * would prompt a wave of similar legislation across California.
    *
    * Because the San Jose City Attorney's office brought action against the
    * defendants under a civil procedure, the defendants were not guaranteed
    * the standard protections of criminal law.
    *
    * "Liberty unrestrained is an invitation to anarchy," Justice Brown wrote.
    *
    * The defendants may not engage in any form of public ass
     
    Abdul Rajim, Nov 24, 2004
    #5
  6. Norman L. DeForest

    Steve Sobol Guest

    are you unpleasant, I mean, inducing off mixed variants

    's crypto proposals
    # will have a harmful effect upon the industry. But we can't completely
    # ignore the warnings we get from the heads of the FBI and the National
    # Security Agency. We need to find a middle ground or else the president
    # will veto the crypto bill and I doubt we can override the veto.

    I am sure Senator McCain has no idea what the NSA is really doing.

    Noone told him about domestic ECHELON, or how powerful keyword monitoring is.


    ******************************************************************************


    War #4 - Terrorism
    --- -- ---------

    Until Timmy McPinhead decided to follow the Government's lead on killing people
    ---that it is okay to kill people to make a point---terrorism was always
    referred to as being by "foreign" agents.

    After the explosion, President Clinton called for FBI agents to be able to
    tap phones at will, as they can do now for organized crime. In other words,
    not only was there the OKC bombing terroristic act, the Government freedom
    terrorists then demanded even greater Police State powers over all of us.

    Internet signature in alt.activism.militia...

    In 1794, James Madison pointed out "the old trick of turning every
    contingency into a resource for accumulating force in the government."

    ----

    I don't know any terrorists or foreign agents.

    But the government seems to know plenty of people who are terrorists.

    : The New York Times, 2/10/87
    : "Is This America?", by Anthony Lewis
    :
    : She is 22 years old, a student in San Diego, California. She was born
    : in Ramallah, in the West Bank, came to this country at the age of 3.
    :
    : She is an American citizen, of Palestinian origins.
    :
    : In her own words:
     
    Steve Sobol, Nov 24, 2004
    #6
  7. Norman L. DeForest

    Steve Sobol Guest

    Abdul Rajim wrote:
    > Lionel <> wrote in message news:<>...
    >
    >>I want to migrate a bunch of domains from (currently) several randomly
    >>configured mail servers to a single RH9-based server. I'd be most
    >>interested in recommendations on configuring such a server for optimum
    >>spamfiltering. Ideally, I'd like to include Bayesian filtering with a
    >>web UI, so the users can set their own preferences for filtering, such
    >>as white-listing, etc.
    >>
    >>Any suggestions would be much appreciated, as would general tips &
    >>'gotchas' . :)

    >
    >
    > STOP SPAMMING CHEESEDICK


    Ummmm...

    those were reposted (and crossposted) by a bot attacking
    news.admin.net-abuse.email. I guarantee Lionel didn't crosspost that crap.
    There has been a metric ton of junk posted by the bots causing this problem. I
    had the joy of finding that the bot xposted a few of my recent posts into test
    groups, and guess who got the test replies back from the news servers! Fun.



    --
    JustThe.net Internet & New Media Services, http://JustThe.net/
    Steven J. Sobol, Geek In Charge / 888.480.4NET (4638) /
    PGP Key available from your friendly local key server (0xE3AE35ED)
    Apple Valley, California Nothing scares me anymore. I have three kids.
     
    Steve Sobol, Nov 24, 2004
    #7
  8. will you would against the cellar, if Cyrus superbly absorbs the establishment

    Students for a Democratic Society.

    * "The Rise of the Computer State", David Burnham, 1984
    *
    * p128: Federal authorities were concerned that foreign governments MIGHT
    * try to influence civil rights leaders in the United States. The list
    * of Americans monitored ballooned as political groups, celebrities and
    * ordinary citizens were added to the 'watch lists'. The NSA surveillance
    * was illegal and was instantly stopped [years later] when it appeared
    * that Congress might learn about the eavesdropping.

    Fear, loathing, suspicion and monitoring of civil rights movements.

    All it took was the thought that foreigners were influencing Americans.

    That's all it took to make the massive surveillance "legal".

    Of course, massive surveillance means more than just surveillance:

    * Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9
    *
    * The FBI had been spying on members of the civil rights movement
    * to discredit Martin Luther King and destroy the civil rights
    * movement, government files showed. There had been burglaries
    * and illegal wiretapping on a grand scale.

    Even after FISA legislation, with its strict "minimization" requirement,
    CISPES & Co. happened.


    Sometimes their suspicion of terrorist/foreign agent activity is laughable.

    * "Above the Law", by David Burnham, IS
     
    Norman L. DeForest, Nov 24, 2004
    #8
  9. Norman L. DeForest

    Steve Sobol Guest

    *
    * Timmie Sinclair, 27, is a black Atlantan. Five officers surrounded him
    * and one Sergeant "repeatedly bludgeoned with a baton" Mr. Sinclair while
    * he was being handcuffed, and at least once while the other officers held
    * him down on the ground.
    *
    * Mr. Sinclair was trying to fill a prescription for his sick child,
    * became confused by all the roadblocks the Atlanta police setup for
    * the annual "Black College Spring Break" weekend, and was attacked
    * by the police for trying to get back on the Interstate highway.
    *
    * Mr Sinclair's wife and two children were in his car with him.

    Think that would have happened to a white family during this annual Black
    College Spring Break 'Freaknick' police coverage?

    The police also illegally ordered the videotaper to stop taping.

    ----

    Recently on ABC Primetime live, they wired for video and sound a nice car
    owned by the father of the black son who drove it, with another black friend.

    BTW, picture yourself being a black citizen to try and appreciate this.

    Picture yourself as the monitored group.

    Shortly after starting out, they were pulled over by police for a search.

    Not one, but two squad cars came to do the search.

    Because they crossed lanes while going through an intersection.

    If you are white, when was the last time two squad cars searched your
    vehicle inch-by-inch because you crossed lanes while passing through
    an intersection? Never happened to me.

    The police were recorded saying a container they found "probably had drugs"
    in it. It was a make-up container. [All you little people are probably guilty]

    When ABC asked the police chief later why they were pulled over,
    he said for crossing lanes while going through an intersection.

    ABC's cameras then showed cars doing that constantly at the same intersection.
    They said they counted hundreds the same night.

    The police chief th
     
    Steve Sobol, Nov 24, 2004
    #9
  10. [Followups set to news.admin.net-abuse.email]

    On 23 Nov 2004, Abdul Rajim wrote:

    > Lionel <> wrote in message news:<>...
    > > I want to migrate a bunch of domains from (currently) several randomly
    > > configured mail servers to a single RH9-based server. I'd be most
    > > interested in recommendations on configuring such a server for optimum
    > > spamfiltering. Ideally, I'd like to include Bayesian filtering with a
    > > web UI, so the users can set their own preferences for filtering, such
    > > as white-listing, etc.
    > >
    > > Any suggestions would be much appreciated, as would general tips &
    > > 'gotchas' . :)

    >
    > STOP SPAMMING CHEESEDICK


    If you look at the headers archived by Google Groups,

    http://groups.google.com/groups?selm=&output=gplain

    you will see that the post you are commenting on was posted only to
    the news.admin.net-abuse.email newsgroup where it is perfectly on topic:

    : From: Lionel <>
    : Newsgroups: news.admin.net-abuse.email
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    : Subject: Recommendations for spam filtering on RH9+ servers?
    : Date: Tue, 23 Nov 2004 13:37:35 +1100
    : Lines: 15
    : Message-ID: <>
    : Mime-Version: 1.0
    : Content-Type: text/plain; charset=us-ascii
    : Content-Transfer-Encoding: 7bit
    : X-Trace: news.uni-berlin.de q3AWOLTY9eDT0+Z2uffnlACw8CKmoRqWUYloRV49/tRSNsGQKT
    : X-Newsreader: Forte Agent 2.0/32.652
    :
    :
    : I want to migrate a bunch of domains from (currently) several randomly
    [snip]

    If you saw any post with similar headers in a different newsgroup then
    it is probably a sporgery ("spam forgery"), a junk post by a net-abuser
    intent on disrupting the news.admin.net-abuse.email newsgroup by forging
    junk posts with the headers copied from legitimate posts. The person you
    are responding did not post the junk, off-topic post.

    Such sporgeries are committed by an abuser who calls himself "HipCrime"
    or by some other abuser who has obtained a copy of HipCrime's
    abuse-generating software.

    After a long period of absence by HipCrime and his cronies, the
    news.admin.net-abuse.email newsgroup has recently come under attack again
    with thousands of junk posts and forgeries (many cross-posted to unrelated
    newsgroups) attempting to flood the newsgroup. This met with varying
    success depending on the newsserver.

    See part 3 of the "news.admin.net-abuse.email FAQ: Understanding NANAE"
    http://www.spamfaq.net/terminology.shtml
    especially the answer to the question, "What's with all these nonsense
    posts and reposts?":
    http://www.spamfaq.net/terminology.shtml#newsgroup_attacks

    Also, go to Google Groups
    http://groups.google.com/advanced_group_search
    and search for "hipcrime" (and also "dipcrime", "dipslime", "dippy",
    "hipslime" and other uncomplimentary variations of "HipCrime" that you can
    think of) and view some of the past evidence.


    Oh, while I am here, does anyone know of a cheap digital camera that
    can have the pictures easily accessed with DOS and not just Windows
    and that has downloadable DOS drivers available? (I don't have a
    CD-ROM drive.)

    --
    A Speech Friendly site: http://www.chebucto.ns.ca/~af380/Profile.html
    Norman De Forest, --- From an actual package: "Do not
    mix old and new batteries. Do not mix alkaline, standard (carbon-zinc) or
    rechargeable (nickel-cadmium). Uses one 9-volt battery, not included."
     
    Norman L. DeForest, Nov 24, 2004
    #10
  11. Norman L. DeForest

    Abdul Rajim Guest

    "
    * Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96
    *
    * Users may need a "spare key" to recover information that is lost or
    * otherwise inaccessible, in much the same way that we give a trusted
    * neighbor a spare key to our house...and the U.S. will have that key.

    The government says in case you lose you own decryption key,
    they will be there to save the day with their LE key. (Key Recovery
    has a 'Law Enforcement' key, which is a SECOND key to decrypt the
    same traffic.)

    Without getting into a lot of technical detail, basically,
    the LE KEY = Your Key.

    So, because they have a separate but equivalent key, they are claiming
    to be your emergency backup key, like a key left with a neighbor.

    People who have no idea how computer systems work will
    think like that sounds like a reasonable thing.

    Like a "good faith attempt to balance...".

    Now picture it being YOUR business.

    You have a cryptographic key that needs to be protected.

    The key itself is a big number you can't memorize.

    The key itself is protected by a (MD5-like) password to
    unlock access to it. That means the password can be as long
    a thing as you'd like to type in, not merely a short password.
    As long as you can remember it.

    This is standard...MIT's Kerberos and Phil Zimmerman's PGP
    use a password to unlock the cryptographic key.

    So, how do you back up the key without GAK?

    In other words, what do all companies do for this situation now?

    A situation that applies to all company data whether or not it is encrypted.

    A situation that has existed since the invention of the computer.

    Simple.

    You back it up.

    Make backups of the key.

    You can start by making your own key copy using off-site secure storage backup.

    Several authorized people can have a copy of the key, and they
    can each use their own password to get access to the key.

    The key is backed up not only by being o
     
    Abdul Rajim, Nov 24, 2004
    #11
  12. Norman L. DeForest

    Steve Sobol Guest

    to be specified or genetic will vanish fond beams to basically fish

    with,
    * "all of us tagged like so many fish." Writing in the October 11th, 1993
    * Washington Times he confirmed the drift toward human applications of the
    * chip:
    *
    * You see there is an identification system made by
    * the Hughes Aircraft Company that you can't lose.
    *
    * It's the syringe implantable transponder.
    *
    * According to promotional literature it is an
    * "ingenious, safe, inexpensive, foolproof and
    * permanent method of identification using radio
    * waves. A tiny microchip, the size of a grain of
    * rice, is simply placed under the skin. It is so
    * designed as to be injected simultaneously with a
    * vaccination or alone."
    *
    *
    * When government technocrats want Americans to accept the unacceptable,
    * they move slowly. In the case of reaching the ultimate goal of a universal
    * system of personal identification, this introduction is likely to begin
    * with the smartc
     
    Steve Sobol, Nov 24, 2004
    #12
  13. try isolating the frontier's private loan and Oscar will point you

    # a CIA torture manual they came into possession of "Counterintelligence
    # Interrogation."
    #
    # The comprehensive manual even includes "medical, chemical or electrical"
    # tips for torturers such as "If a new safe house is to be used, the
    # electric current should be known in advance so that transformers or
    # other modifying devices will be on hand if needed."

    : "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
    :
    : Without informing anyone outside the Justice Department, and only a very
    : few within, the U.S. Attorney General and the FBI Director agreed upon a
    : plan by which the president could suspend many of the key safeguards of
    : the Constitution.
    :
    : Under the top-secret agreement, code-named "Security Portfolio," the FBI
    : was authorized, in the event of an ill-defined emergency, to summarily
    : arrest up to 20,000 persons and place them in national security detention
    : camps.
    :
    : A watch list of those who should be detained---along with detailed
    : information about what they looked like, where they lived and their
    : place of employment---was developed by the FBI.
    :
    : The decision as to who was placed on the watch list was left to the
    : FBI and included many whose only crime was to openly criticize some
    : aspect of American life.
    :
    : The detention plan did not require the FBI to obtain individual arrest
    : warrants and it would have denied detainees the right to appeal their
    : arrest in federal court.

    The President was Harry Truman, the FBI Director was J. Edgar Hoover.

    The country was the United States of America.

    Truman was the President who created the National Security Agency.

    Question: Why is his seven-page NSA directive is still secret to this day?

    Answer: It violates the Constitution of the United States of America.

    At the same time Hoover was in power and developed the "Security Portfolio"
    and attacked civil rights movements in the United St
     
    Norman L. DeForest, Nov 24, 2004
    #13
  14. the activist around the worldwide commerce is the direction that punishs softly

    (negative entropy), and it means 'matter formatted by information'.

    * "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1
    *
    * We human beings mean more than the few-pence-worth of our chemical
    * constituents, because information *informs* those component chemicals
    * by means of a genetic blueprint.
    *
    * Life itself is a negentropy pump. The universe means more than a
    * collapsed energetic equation of 'x-heat = x-cold = nothing', because
    * information structures the balance. The result is the sun, moon and
    * stars...

    We have a lot of different kinds of cells in our bodies; hair, bone, eye,
    brain, toenail, teeth, lung, skin... And they all started from ONE CELL.
    And they all knew where to go and which type to become. And how to operate
    together in a large complex system.

    A single cell, in its DNA strands, holds a MASSIVE AMOUNT OF INFORMATION.

    Every cell in our body is structured by information, the DNA helix.

    This information structuring is why we don't just splash to the
    ground in a muddy puddle of our constituent chemicals.

    We are matter structured by information.

    "We are starshine" ---Woodstock

    ----

    Whew!

    Cybernetics is VERY heavy-duty stuff.

    It can yield the ULTIMATE in control.

    It can be applied to controlling people in a society.

    Cybernetic control of society.

    The 'arousal filter' Stafford Beer and his cyberneticians
    set u
     
    Norman L. DeForest, Nov 24, 2004
    #14
  15. Norman L. DeForest

    Abdul Rajim Guest

    Government creation, "Heartland
    * Institute for a New Tomorrow" (HINT), which proclaimed that:
    *
    * o "We are an organization founded to protect and promote sexual freedom and
    * freedom of choice. We believe that arbitrarily imposed legislative
    * sanctions restricting your sexual freedom should be rescinded through
    * the legislative process."
    *
    * o "Not only sexual expression but freedom of the press is under attack.
    * We must be ever vigilant [503 U.S. 545] to counter-attack right wing
    * fundamentalists who are determined to curtail our freedoms."
    *
    * o "As many of you know, much hysterical nonsense has appeared in the
    * American media concerning "pornography" and what must be done to stop
    * it from coming across your borders. This brief letter does not allow
    * us to give much comments; however, why is your government spending
    * millions of dollars to exercise international censorship while tons
    * of drugs, which makes yours the world's most crime ridden country are
    * passed through easily." [snip]
    *
    * There followed over the next 2 1/2 years, repeated efforts by two
    * Government agencies, through five fictitious organizations and a bogus
    * pen pal, to explore his willingness to break the new law by ordering
    * sexually explicit photographs of children through the mail.
    *
    * While the ruling has brought some relief, the farmer lost his job, had
    * to sell forty acres of h
     
    Abdul Rajim, Nov 24, 2004
    #15
  16. Norman L. DeForest

    Abdul Rajim Guest

    shell script that (using say 'sed') scrambles the names
    of environment variables, and be sure to hand-ruin any proprietary
    algorithms.

    Why is transfer of Salomon proprietary source to a vendor's site the last
    step to try? Because Salomon loses control over the code. In the Informix
    /Sybase case, the vendor Informix requested (and received) another copy
    of the code "because I lost the previous copy".

    Two emails between the pair are enclosed.

    [snip]

    *********************************
    :Size: 846077, Dated: Jul 3 17:52
    :Sender: sara@sbixxx [sara xxxxxxxxxx XXX-NJ]
    :Recipient: [Dennis xxxxxxx]
    :Subject: Re: (Fwd) Re: (Fwd) rw...
    **** UUencoding, Filename='rw4.tar.Z'

    Hi Dennis,

    The last patch didn't help, here's some other code that will also
    trigger the bug.

    This code doesn't compile for other reasons but we need to get the
    Rougeview issue resolved.

    Could you ask xxxx to look this over?

    Thanks,

    sara

    :begin 600 rw4.tar.Z
    *********************************

    # of
    lines filename
    ----- --------
    54 4x.env
    139 LocalRules
    344 LoginDlg.cc
    65 LoginDlg.h
    221 MacroRules
    87 Makefile
    619 OASYSMain.cc
    175 OASYSMain.h
    79 SubApp.cc
    51 SubApp.h
    54 gui_main.cc
    33 gui_main.h
    42 lib_inc
    647 sbOfLogin.cc
    113 sbOfLogin.h
    0 sun4_4
    22 version.txt
    0 lib_inc/*.h
    128 lib_inc/AccountBalance.h
    22 lib_inc/AccountBalanceTest.h
    59 lib_inc/AccrlInptTb.h
    86 lib_inc/ArrClasT.h
    [snip of 247 lines]
    38696 total

    ********** end excerpt from 'Corruption at Salomon Brothers' **********





    Another major category of security incidents are what I've named:

    o Dumb-and-Dumber


    ********** begin excerpt from 'Corruption at Salomon Brothers' **********

    > Date: Thu, 23 May 96 11:52:04 EDT
    > From: guy
    > To: vivian [Salomon lawyer
     
    Abdul Rajim, Nov 24, 2004
    #16
  17. Norman L. DeForest

    Steve Sobol Guest

    you won't pause me recognising regarding your shy childhood

    court in the Justice Department authorized a record
    * 697 'national security' wiretaps on American soil, outside normal
    * constitutional procedures.
    *
    * The Foreign Intelligence Surveillance Act, is a 1978 law that permits
    * secret buggings and wiretaps of individuals suspected of being agents
    * of a hostile foreign government or international terrorist organization
    * EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
    *
    * The FISA court operates outside the normal constitutional standards for
    * searches and seizures. Non-government personnel are not allowed.
    * The courts files cannot be publicly reviewed.
    *
    * The average U.S. citizen might reasonably assume use of this court
    * is at the least: unusual.
    *
    * It is not. In fact, in the United States today it is increasingly
    * common. In 1994, federal courts authorized more wiretaps for
    * intelligence-gathering and national security purposes than they
    * did to investigate ordinary federal crimes.
    *
    * The review process to prevent legal and factual errors is virtually
    * non-existent.
    *
    * And the FISA system's courtroom advocacy is monumentally one-sided.
    *
    * The court has never formally rejected an application. Not once.
    *
    * For the first time in modern U.S. history, the Congress had
    * institutionalized a process for physical searches outside of
    * Fourth Amendment standards.
    *
    * Not even Congress' intelligence oversight committees review these
    * special cases on a regular basis.


    Mini-recap:

    o Congress voted into existence a
     
    Steve Sobol, Nov 24, 2004
    #17
  18. Norman L. DeForest

    Lionel Guest

    Kibo informs me that (Abdul Rajim) stated
    that:

    >Lionel <> wrote in message news:<>...
    >> I want to migrate a bunch of domains from (currently) several randomly
    >> configured mail servers to a single RH9-based server. I'd be most
    >> interested in recommendations on configuring such a server for optimum
    >> spamfiltering. Ideally, I'd like to include Bayesian filtering with a
    >> web UI, so the users can set their own preferences for filtering, such
    >> as white-listing, etc.
    >>
    >> Any suggestions would be much appreciated, as would general tips &
    >> 'gotchas' . :)

    >
    >STOP SPAMMING CHEESEDICK


    <grin> Aw, poor iddle Steve & Tony are upset with me again.

    (Everyone else: Please pardon Mr Anonymous Coward, he's just my pet
    net.kook. He likes to generate as much crap as possible in the rec.photo
    hierarchy. If you feel the urge to respond to him, you can annoy the
    hell out of him by snipping out any photography groups from your
    follow-up.)

    --
    W
    . | ,. w , "Some people are alive only because
    \|/ \|/ it is illegal to kill them." Perna condita delenda est
    ---^----^---------------------------------------------------------------
     
    Lionel, Nov 24, 2004
    #18
  19. Norman L. DeForest

    Guest

    Re: are you unpleasant, I mean, inducing off mixed variants

    <SNIP>

    Tell me something...

    Do you REALLY think ANYBODY is listening to you?
     
    , Nov 24, 2004
    #19
  20. Norman L. DeForest

    Crownfield Guest

    Re: the breakdown for the upset interior is the geography that replys eventually

    Norman L. DeForest wrote:
    >
    > Barry McCaffrey of the Office of National Drug
    > * Control Policy has called "our central purpose and mission -
    > * - reducing illicit drug use and its consequences."
    >
    > In Florida, they charged a mother with delivering cocaine to her baby.
    > A problem with this is the mother-addict repeatedly applied for rehab
    > programs, but there were no available slots. Not enough funding.


    unfortunate, but drug use is her problem.
    first time you start, you accept the risks and the problems.

    no crying later.
     
    Crownfield, Nov 25, 2004
    #20
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. JoEyCrAcK

    No internet connection with my RH9 through Router

    JoEyCrAcK, Sep 28, 2003, in forum: Computer Support
    Replies:
    4
    Views:
    476
    Meat-->Plow
    Oct 1, 2003
  2. C A Preston

    Spam-Spam and more Spam

    C A Preston, Apr 12, 2004, in forum: Computer Support
    Replies:
    2
    Views:
    634
    Hywel
    Apr 12, 2004
  3. Howard

    RH9 Ethernet/Internet Not Working

    Howard, Sep 9, 2003, in forum: NZ Computing
    Replies:
    5
    Views:
    1,053
    Enkidu
    Sep 10, 2003
  4. Clwddncr
    Replies:
    6
    Views:
    723
    Dave - Dave.net.nz
    Feb 7, 2005
  5. Giuen
    Replies:
    0
    Views:
    1,010
    Giuen
    Sep 12, 2008
Loading...

Share This Page