search for: prosecut

Displaying 20 results from an estimated 42 matches for "prosecut".

Did you mean: prosecute
2003 Sep 21
2
Mail rejected
...message From: samba@lists.samba.org Sent to: peter@computer-facilities.com Subject: samba Digest, Vol 9, Issue 30 Sent on: Sun, 21 Sep 2003 12:00:50 +0000 (GMT) did not reach the recipient. Response from the destination host: Unsolicited junk mail (spam) is not allowed. Violators will be prosecuted. Your message has been discarded. No need to reply to this notification. All replies will be ignored. Notification generated by Apdsoft.com Mail Filter for Windows.
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running asterisk? Then it's time to move them to Canada or similar. http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t o-be-outlawed.html Regards, Dean Collins Cognation Pty Ltd dean at cognation.net <mailto:dean at cognation.net> +1-212-203-4357 Ph +61-2-9016-5642 (Sydney in-dial).
2018 Dec 17
1
ECDSA client question
...refurbished because we hate how much electronic waste is in the world. I have to admit, the tin foil hat of mine just got an alert. We know there are unexplained constants in the NIST curves including P-256 - what if NSA was partially responsible for this bug (back room deal to avoid anti-trust prosecution, similar deal with IBM was made in the 70s I believe also involving cryptography) so that Android apps that use ECDSA (beyond just the mail client, e.g. chat apps) would use P-256 for compatibility and are maybe vulnerable to MITM for the key exchange. I want Ed25519 now.
2015 Oct 06
2
authorship and citation
Adrian, Responses inline On Tue, Oct 6, 2015 at 1:58 PM, Adrian Du?a <dusa.adrian at unibuc.ro> wrote: > Hi Gabriel, > > On Tue, Oct 6, 2015 at 10:59 PM, Gabriel Becker <gmbecker at ucdavis.edu> > wrote: > >> [...] >> >> At the very least, this is seems to be a flagrant violation of the >> *spirit* of the CRAN policy, which AFAIK is intended to
1998 Jun 19
16
WARNING: Break-in attempts
...very closely. If I do not receive a formal explanation of events within the next few hours (I see root is logged in on your system now), I will be forwarding this information to CERT and to the security lists of which I am a member. If I determine that any breach of information has occured, I may prosecute. Your response is anticipated, -bp -- B. James Phillippe <bryan@terran.org> Linux Software Engineer, WGT Inc. http://earth.terran.org/~bryan
2003 Jun 17
3
ssh does not work
...t I used was correct as I can establish the connection via telnet using the same password. Any idea why this can happen?? root at kfiisdc:/sandbox/jason ssh kfiisdev Use of this system by unauthorized persons or in an unauthorized manner is strictly prohibited. Unauthorized access can and will be prosecuted to the fullest extent possible. If you log in using a shared account, you must sign in with a personal user id that is assigned only to you. Violation will result in appropriate disciplinary action, which may include termination. root at kfiisdev's password: Permission denied, please try a...
2015 Oct 06
1
authorship and citation
...question is I believe very important, for I would like to avoid > submitting a new version of the package only to be told that I did > something wrong. > > As so many other packages seem to have a lot of flexibility in compiling > the citation file, what I am inquiring is: will I be prosecuted for > submitting a new version which doesn't include all the authors in the > citation file, especially since the other author is no longer contributing? > (let's say I will provide a single author, published journal article, > referring specifically to this package). > I...
2003 May 22
0
licensing bull; RE: Ssh into Windows XP?
...ext -- store say they will beat any advertised price of another store by 10% .... until you look at the license you accepted when you entered the store -- which says that if you enter the store you agree not to compare prices to any other store or their advertised price and doing so subjects you to prosecution under tresspassing law. So you go to claim your 10% price difference and find yourself taken away in handcuffs but find that you won't be prosecuted if you will pay the store's legal fees and not disclose the price differences. Or imagine (in the way of MS .NET license and performanc...
2016 Dec 07
1
Unusual System State
...), please notify the sender immediately or please send an email to notify at sequenom.com by return e-mail, delete this e-mail with the attachments and destroy any copies. Any unauthorized review, use, disclosure or distribution is prohibited, may be illegal, and may result in civil and/or criminal prosecution to full extent permitted by law.
2005 Sep 23
1
RE: [Asterisk-Dev] Open source time card application for Asterisk
...- don't have your head in the wrong place. In any case, as has been discussed on -users before (which is where this thread should go, and thus where I'm relegating it) that spoofing caller ID, your postal mailing address, your name, your voice, or anything else is equally illegal and prosecutable if used for fraudulent purposes. JT At 10:58 AM -0700 9/23/05, Gilmore, Gerry wrote: >Hhhhmmm, I stand corrected. I'm surprised that >the carriers and regulators are allowing it, >but?..wherever a buck's to be made, I guess?.. > >Gerry > >There are 10 kinds of...
2023 Feb 24
1
How to get a server listed in the IMAP Test wiki?
...ther state, too. And that's only the latest such violent attack. In real life. People plannimg crimes and getting away with crimes in real life. Bragging about it online is always what what gets them caught in the end. And so far the thieves and robbers and assailants are apparently not being prosecuted at all for the violent crimes they are committing but they were forced to let me go since there were no charges they could file against the victim of their horrible crimes and atrocities under color of law. And City Hall is still in the bedroom & bathroom business to boot. On February 24, 20...
2014 Sep 22
8
[Bug 2280] New: openssh-6.6p1 compression throwing Segmentation fault
...a criminal offence to obtain unauthorised access to any program or information within this system and/or to make any unauthorised modifications whatsoever to the contents of this computer system. If you are not an authorised user you are violating the regulations of this system and can, and will be prosecuted to the full extent of the law. Please disconnect immediately. Password: Segmentation fault (core dumped) [soetest1 at nrpz01lx953 ~]$ Not getting any pointer to troubleshoot this error. Any help would be highly appreciated!! -- You are receiving this mail because: You are watching the assigne...
2015 Oct 06
0
authorship and citation
...am grateful for it. The question is I believe very important, for I would like to avoid submitting a new version of the package only to be told that I did something wrong. As so many other packages seem to have a lot of flexibility in compiling the citation file, what I am inquiring is: will I be prosecuted for submitting a new version which doesn't include all the authors in the citation file, especially since the other author is no longer contributing? (let's say I will provide a single author, published journal article, referring specifically to this package). The work of the other autho...
2008 Oct 30
1
Enh-Req: Mark As Read When Delivered
I'm under the impression bug-reports are supposed to go to the list, so hopefully it's okay if I put in a feature request here too (assuming it's not already implemented; but it doesn't look like it). Basically, all I would like to do is be able to sometimes deliver mail as already mail into mail boxes. Is there some way to do this? If not, could a flag perhaps be added to
2005 Feb 19
1
External yum and apt Repositories and CentOS4
Were looking to use yum 2.1's ability to store repository data in /etc/yum.repos.d/ as a means of pushing updates to our mirrors list. As an added feature, we want to host third party repository config in installable .rpm's into CentOS-Extras. So that enabling a new repository becomes as easy as "yum install <repo name>". Eg. 'yum install repo- dag'. Which would in
2003 Jun 05
0
OT: RE: Spam to the list, plus the Nigerian Scam
...turn address so that they can get a response. What you should do in these cases (if you want to do something) is simultaneously report them to the FBI and to their ISP/email provider (eg. Hotmail), at which time their account will be summarily terminated, and if you're really lucky they will be prosecuted. 419 scams aren't just spam, they are illegal. Hopefully all unsolicited email will become illegal in enough states in the US to result in a massive legal attack against spammers shortly. This, coupled with the eventual fixing of the (IMO) highly broken SMTP protocol, will be their end. &...
2012 Jan 30
1
reposurgon and the conversion
...not be able to work steadily on it for a while. -- <a href="http://www.catb.org/~esr/">Eric S. Raymond</a> [President Clinton] boasts about 186,000 people denied firearms under the Brady Law rules. The Brady Law has been in force for three years. In that time, they have prosecuted seven people and put three of them in prison. You know, the President has entertained more felons than that at fundraising coffees in the White House, for Pete's sake." -- Charlton Heston, FOX News Sunday, 18 May 1997
1997 Apr 01
0
UK Encryption ban legislation
...e otherwise correct? rOn [mod: In the "stricter" reading, "ssh" and encrypted file systems both perform key management. Remember that they probably didn''t want to prevent you from running ssh, as you are doing now, but the law is formulated so broadly that they could prosecute you for it if they think you are a bad guy. That situation lands innocent guys in jail. -- REW] -- "A computer scientist is a mechanism for turning coffee into applications." -? "There''s a hole in my Tardis! My poor baby. WHO PUT THE HOLE IN MY BABY???"-doc My doctor...
2001 Feb 17
0
Belgium police raides homes of Napster users (!!!)
...down on file swapping By The Associated Press Special to CNET News.com February 15, 2001, 3:20 p.m. PT BRUSSELS, Belgium--Acting on complaints from the music industry, police have raided the homes of people who use music-sharing Web sites, looking for evidence they infringed copyright rules, the prosecutors' office said Thursday. Police searched the home of the first suspect in late December and two more in January, Olivier Bogaert, a prosecution spokesman, told Belgian news media. He said the searches were part of an investigation of the Internet site Mp3blast.com, but added that four cases...
2005 Oct 31
1
Peerguardian + Shorewall
Hi, is there a way to use shorewall together with peerguarding? It work but when i start peerguarding ... connections are only checked against the blacklist :(. greets puchu ------------------------------------------------------- This SF.Net email is sponsored by the JBoss Inc. Get Certified Today * Register for a JBoss Training Course Free Certification Exam for All Training Attendees