Collected Postings

2009- Collected Postings, 2007-2008 Collected Postings, 2005-2006 Collected Postings, 2003-2004 Collected Postings, 2001-2002 Collected Postings, 1993-2000 Collected Postings,
Misc. Topic Organization -- Internet History Postings -- Old Email

Usenet Postings by year

2005: p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2004: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2003: p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2 p1
2002: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2001: p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2000: p7, p6, p5, p4, p3, p2, p1
1999 - 1998 - 1997 - 1996 - 1995 - 1994 - 1993

Current Postings by Subject

Network related postings - (also 2007- ) - (also 2005-2006) - (also 2001-2002) - (also 1993-2000)
Mainframe related postings - (also 2007- ) - (also 2005-2006 ) - (also 2001-2002) - (also 1993-2000)
Digital Signature & Standards - (also 2007- ) - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
All postings - (also 2007- ) - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
- home

Network related postings (2003-2004)

*** New Software: UDP File Transfer Commercial Edition ***
1950s AT&T/IBM lack of collaboration?
1950s AT&T/IBM lack of collaboration?
20th anv. of 1000th node on internal network
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360/370 disk drives
3745 & NCP Withdrawl?
3745 & NCP Withdrawl?
3745 & NCP Withdrawl?
[Announce] The Vintage Computer Forum
[HTTP/1.0] Content-Type Header
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[urgent] which OSI layer is SSL located?
A challenge
A challenge
A Dark Day
A Dark Day
A few Z990 Gee-Wiz stats
A Uniform Resource Name (URN) Namespace for SWIFT Financnail Messaging
Alive and kicking?
An entirely new proprietary hardware strategy
ARP cache for multicast & broadcast packets?
ARP Caching
ARPAnet again: Bitnet again was: unix
ARPAnet again: Bitnet again was: unix
ARPAnet guest accounts, and longtime email addresses
ARPAnet guest accounts, and longtime email addresses
Big Ideas, where are they now?
Bitnet again was: unix
Calculations involing very large decimals
Carrying IP over ATM networks
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Columbia U Computing History - New stuff
COMPUTER RELATED WORLD'S RECORDS?
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
Cray to commercialize Red Storm
Cray to commercialize Red Storm
Cray to commercialize Red Storm
Cray to commercialize Red Storm
DASD Architecture of the future
Detecting when FIN has arrived
Detecting when FIN has arrived
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
DNS inventor says cure to net identity problems is right under our nose
Drivers License required for surfing?
early vnet & exploit
Easiest possible PASV experiment
Easiest possible PASV experiment
Easiest possible PASV experiment
FAST - Shame On You Caltech!!!
Fast TCP
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
Fix the shuttle or fly it unmanned
Frontiernet insists on being my firewall
FW: Is FICON good enough, or is it the only choice we get?
GOSIP
GOSIP
high speed network, cross-over from sci.crypt
History of Computer Network Industry
History of Computer Network Industry
History of Computer Network Industry
How do I know currently used RFC?
How many layers does TCP/IP architecture really have?
How many layers does TCP/IP architecture really have?
IBM 360 memory
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3725 Comms. controller - Worth saving?
IBM's Electronic Data Interchange Support
IE6 faster than O7.10?
IEN 45 and TCP checksum offload
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
instant messaging
instant messaging
instant messaging
Integer types for 128-bit addressing
Integer types for 128-bit addressing
internal network drift (was filesystem structure)
Internet turns 35, still work in progress
Internet turns 35 today
Is Fast Path headed nowhere?
Is there a way to configure your web browser to use multiple
IUCV in VM/CMS
JES2 NJE setup
JSX 328x printing (portrait)
layered approach
Lisp Machines
Listserv for TCPIP
Longest Thread Ever
Losing colonies
Mail delivery failed: returning message to sender
Mainframe Virus????
Mainframe Virus????
Mainframe Virus????
md5 algorithm
Microkernels are not "all or nothing". Re: Multics Concepts For
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft worm affecting Automatic Teller Machines
Microsoft worm affecting Automatic Teller Machines
Microsoft worm affecting Automatic Teller Machines
Mockapetris agrees w/Lynn on DNS security - (April Fool's day??)
Mockapetris agrees w/Lynn on DNS security - (April Fool's day??)
MVS 3.8
NEC drives
need a firewall
netscape firebird contraversy
network history
network history
network history
network history
network history
network history
network history
network history
network history (repeat, google may have gotten confused?)
network history
network history
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
New RFC 3514 addresses malicious network traffic
New RFC 3514 addresses malicious network traffic
New RFC 3514 addresses malicious network traffic
Omniscience Protocol Requirements
One big box vs. many little boxes
Origin of Kerberos
osi archeological reference from ietf-pkix list
osi bits
OSI not quite dead yet
OSI not quite dead yet
OSI not quite dead yet
OSI not quite dead yet
OSI protocol header
OT The First Mouse
packetloss bad for sliding window protocol?
packetloss bad for sliding window protocol?
Password / access rights check
PKI International Consortium
pop secure connection
pop secure connection
pop secure connection
Port Assignment- OT in a Small Way
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
Proposal for a new PKI model (At least I hope it's new)
Question About VM List
Question on internal/external IPs
Questions of IP
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Rewrite TCP/IP
Rewrite TCP/IP
Rewrite TCP/IP
RFC # for DCC protocol?
RFC 3092
RFC2557?
RFCs that reference MD5
RISCs too close to hardware?
Round robin IS NOT load balancing (?)
Round robin IS NOT load balancing (?)
Round robin IS NOT load balancing (?)
Security in RADIUS (RFC2865)
Security in RADIUS (RFC2865)
send/recv vs. raw RDMA
Shipwrecks
Shipwrecks
Shipwrecks
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
Spam Bomb
Spam Bomb
SR 15,15
SR 15,15
SSL & Man In the Middle Attack
tcp time out for idle sessions
Text Adventures (which computer was first?)
text character based diagrams in technical documentation
text character based diagrams in technical documentation
text character based diagrams in technical documentation
The attack of the killer mainframes
The attack of the killer mainframes
The future of security
The Vintage Computer Forum
Thoughts on Utility Computing?
tunneling TCP/IP over UDP for high-latency links?
tunneling TCP/IP over UDP for high-latency links?
unix
unix
unix
unix
US-CERT Technical Cyber Security Alert TA04-336A -- another buffer overflow
Use of SSL as a VPN
Use of SSL as a VPN
Usenet invented 30 years ago by a Swede?
Usenet invented 30 years ago by a Swede?
vm
vnet 1000th node anniversary 6/10
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
What is Meet In The Middle Attack
Whatever happened to 'University Computer Centers'?
who were the original fortran installations?
Who's afraid of Mallory Wolf?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why does Windows allow Worms?
Why doesn't Infiniband supports RDMA multicast
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Will Apple ever offer a newsreader?
Window field in TCP header goes small
Wireless security
wsmr-simtel20 shut down 10 years ago today
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
z/OS UNIX
ZeroWindow segment

back to top, network - (2001-2002), - (1993-2000), mainframe, digsig, all

Mainframe related postings (2003-2004)

"360 revolution" at computer history museuam (x-post)
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"Personal Computer" Re: Why haven't the email bobmers been shut down
"Super-Cheap" Supercomputing
(fwd) News about SIGMicro
100% CPU is not always bad
1403 Printer
1950s AT&T/IBM lack of collaboration?
1960s images of IBM 360 mainframes
1960s images of IBM 360 mainframes
1GB Tables as Classes, or Tables as Types, and all that
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
20th anv. of 1000th node on internal network
303x, idals, dat, disk head settle, and other rambling folklore
303x, idals, dat, disk head settle, and other rambling folklore
3270 terminal keyboard??
360 and You Bet Your Company
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 Microde Floating Point Fix
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
3745 & NCP Withdrawl?
40th Anniversary of IBM System/360
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40yrs, science center, feb. 1964
4GHz is the glass ceiling?
[Fwd: Re: Mainframe not a good architecture for interactive w
[IBM-MAIN] HERCULES
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Meta] Marketplace argument
[OT] Microsoft aggressive search plans revealed
[REALLY OT!] Overuse of symbolic constants
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A few Z990 Gee-Wiz stats
A few Z990 Gee-Wiz stats
A Glimpse into PC Development Philosophy
a history question
a history question
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A quote from Crypto-Gram
A quote from Crypto-Gram
A quote from Crypto-Gram
Access to AMD 64 bit developer centre
Acient FAA computers???
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Alive and kicking?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
Amdahl's VM/PE information/documentation sought
Amusing acronym
An interesting "new" computer security problem
An interesting "new" computer security problem
Another light on the map going out
Another light on the map going out
Antiquity of Byte-Word addressing?
Any DEC 340 Display System Doco?
Architect Mainframe system - books/guidenance
assembler performance superiority: a given
Athlon cache question
Athlon cache question
Athlon cache question
Athlon cache question
atomic memory-operation question
Auditors and systems programmers
August 23, 1957
August 23, 1957
BASIC Language History?
BASIC Language History?
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
big buys was: Tubes in IBM 1620?
bits, bytes, half-duplex, dual-simplex, etc
Blinkenlights?
BLKSIZE question
build-robots-which-can-automate-testing dept
CA-RAMIS
CA-RAMIS
Calculating expected reliability for designed system
Calculating expected reliability for designed system
Calculations involing very large decimals
Call-gate-like mechanism
Call-gate-like mechanism
Call-gate-like mechanism
can a program be run withour main memory?
can a program be run withour main memory?
Candle support from Los Delhi
capacity planning: art, science or magic?
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
CAS and LL/SC
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CDC STAR-100
Chained I/O's
Chained I/O's
Channel busy without less I/O
cheaper low quality drives
cheaper low quality drives
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
comp.arch classic: the 10-bit byte
comp.arch classic: the 10-bit byte
comp.arch classic: the 10-bit byte
Complex Instructions
Computer folklore - forecasting Sputnik's orbit with
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
Computer-oriented license plates
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
Correction to Univac 494 description on web site
Correction to Univac 494 description on web site
Correction to Univac 494 description on web site
cost of crossing kernel/user boundary
Cost of patching "unsustainable"
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
CPU Impact of degraded I/O
CPU Impact of degraded I/O
CPUs with microcode?
creat
creat
CYLFAULT
DASD Architecture of the future
DASD Architecture of the future
DASD Architecture of the future
dasd full cylinder transfer (long post warning)
DASD history
DE-skilling was Re: ServerPak Install via QuickLoad Product
Dealing with complexity
Dealing with complexity
Dealing with complexity
Demo: Things in Hierarchies (w/o RM/SQL)
Demo: Things in Hierarchies (w/o RM/SQL)
determining memory size
determining memory size
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
Differnce between LF and NL
Disk capacity and backup solutions
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk prefetching
dissassembled code
dissassembled code
Does OTP need authentication?
Does PowerPC 970 has Tagged TLBs (Address Space Identifiers)
downsizing (euphemisms)
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
dual processors: not just for breakfast anymore?
Dyadic
Dyadic
Dyadic
Dyadic
EAL5
EAL5
EAL5
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
early vnet & exploit
earthlink ppp connection
ECC book reference, please
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
editors/termcap
effeciently resetting a block of memory
Escon vs Ficon Cost
Expanded Storage
Expanded Storage
Expanded Storage
Facilities "owned" by MVS
Facilities "owned" by MVS
Facilities "owned" by MVS
fast check for binary zeroes in memory
FBA suggestion was Re: "average" DASD Blocksize
filesystem structure, was tape format (long post)
Finites State Machine (OT?)
First single chip 32-bit microprocessor
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Flash 10208
Flex Question
foundations of relational theory? - some references for the
founder, cambridge science center
Funny Micro$oft patent
FW: Is FICON good enough, or is it the only choice we get?
FW: Looking for Disk Calc program/Exec
FW: Looking for Disk Calc program/Exec (long)
FW: Looking for Disk Calc program/Exec
FW: Looking for Disk Calc program/Exec
GNOME - viewing multiple workspaces simultaneously
Goodbye PROFS
grey-haired assembler programmers (Ritchie's C)
Hand cranking telephones
Hand cranking telephones
Happy Birthday Mainframe
Happy Birthday Mainframe
Hard disk architecture: are outer cylinders still faster than inner cylinders?
Hardware support of "new" instructions
HASP assembly: What the heck is an MVT ABEND 422?
HASP assembly: What the heck is an MVT ABEND 422?
HASP assembly: What the heck is an MVT ABEND 422?
Help! I'm trying to understand PKI - especially CA's role
HERCULES
High Level Assembler for MVS & VM & VSE
history books on the development of capacity planning (SMF and RMF)
history books on the development of capacity planning (SMF and RMF)
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of C
History of C
History of C
History of C
History of C
History of C
History of C
History of C
History of C
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
how it works, the computer, 1971
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
How much overhead is "running another MVS LPAR"?
HSM Functionality for Microsoft, using the Mainframe as the
humor in source code
humor in source code
hung/zombie users ... long boring, wandering story
hyperblock drift, was filesystem structure (long warning)
IBM 3090 : Was (and fek that) : Re: new computer kits
IBM 3090 : Was (and fek that) : Re: new computer kits
IBM 3174
IBM 360 memory
IBM 360 memory
IBM 360 Memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3725 Comms. controller - Worth saving?
IBM 7094 Emulator - An historic moment?
IBM 7094 Emulator - An historic moment?
IBM channels, was Re: Microkernels are not "all or nothing"
ibm mainframe or unix
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Open Sources Object Rexx
IBM operating systems
IBM operating systems and APL
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM Spells Out Mainframe Strategy
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM was: VAX again: unix
IBM zSeries in HPC
Ibm's disasters in the 70's
IBM's Electronic Data Interchange Support
IEFBR14 Problems
If the x86 ISA could be redone
If there had been no MS-DOS
incremental cms file backup
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
InfiniBand Group Sharply, Evenly Divided
instant messaging
instant messaging
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
inter-block gaps on DASD tracks
inter-block gaps on DASD tracks
internal network drift (was filesystem structure)
Interrupt in an IBM mainframe
invoicing with PKI
Is DOS unix?
Is Fast Path headed nowhere?
Is Fast Path headed nowhere?
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Issues in Using Virtual Address for addressing the Cache
IUCV in VM/CMS
JES2 NJE setup
June 23, 1969: IBM "unbundles" software
June 23, 1969: IBM "unbundles" software
Language semantics wrt exploits
Leaf routines
Lisp Machines
Lisp Machines
Lisp Machines
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
Low-end processors (again)
Macros and base register question
MAD Programming Language
MAD Programming Language
MAD Programming Language
mainframe
mainframe and microprocessor
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe Tape Drive Usage Metrics
Mainframe Training
Mainframe Training
Mainframe Virus????
Mainframe Virus????
Mainframe Virus????
Mainframes (etc.)
Mars Rover Not Responding
Memory Affinity
Memory Affinity
Memory Affinity
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
microsoft antitrust
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft source leak
MIDAS
MIDAS
misc. dmksnt
model 91/CRJE and IKJLEW
model 91/CRJE and IKJLEW
Monster(ous) sig (was Re: Vintage computers are better
More complex operations now a better choice?
More complex operations now a better choice?
More complex operations now a better choice?
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Most dangerous product the mainframe has ever seen
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multics Concepts For the Contemporary Computing World
Multics Concepts For the Contemporary Computing World
Multics preservation: good news
Multics preservation: good news
Multiple layers of virtual address translation
Multiple layers of virtual address translation
MUMPS & MUSIC, was: SMF Records - a side issue
MVS 3.8
Name for this early transistor package?
need a firewall
Need to understand difference between EBCDIC and EDCDIC
Need to understand difference between EBCDIC and EDCDIC
network history
network history
network history
network history (repeat, google may have gotten confused?)
Networks separation using host w/multiple network interfaces
Networks separation using host w/multiple network interfaces
New Method for Authenticated Public Key Exchange without Digital Certificates
new to mainframe asm
new to mainframe asm
No visible activity
Not A Survey Question
NSA chooses ECC
Oldest running software
Oldest running code
Oldest running code
Oldest running code
Oldest running code
Oldest running code
Oldest running code
One big box vs. many little boxes
One big box vs. many little boxes
One Processor is bad?
One Processor is bad?
Origin of "Function keys" question
origin of the UNIX dd command
origin of the UNIX dd command
OS Partitioning and security
OT The First Mouse
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT: One for the historians - 360/91
OT: One for the historians - 360/91
Overflows
Page Table - per OS/Process
Page Table - per OS/Process
Page Table - per OS/Process
Page Table - per OS/Process
Paging
Paging query - progress
passing of iverson
PCIe as a chip-to-chip interconnect
PCIe as a chip-to-chip interconnect
PDP10 and RISC
PDP10 and RISC
PDP10 and RISC
Ping: Anne & Lynn Wheeler
PL/? History
PL/? History
Playing games in mainframe
PLO instruction
pointless embedded systems
Possibly stupid question for you IBM mainframers... :-)
Possibly stupid question for you IBM mainframers... :-)
PR/SM Dynamic Time Slice calculation
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
price ov IBM virtual address box??
price ov IBM virtual address box??
price ov IBM virtual address box??
price ov IBM virtual address box??
project athena & compare and swap
PSW Sampling
PSW Sampling
Question About VM List
Qwerty vs Dvorak
racf
Rant (Re: Programmer's unpaid overtime)
Rationale for Supercomputers
Re : OT: One for the historians - 360/91
Re : OT: One for the historians - 360/91
real multi-tasking, multi-programming
real multi-tasking, multi-programming
real multi-tasking, multi-programming
recent cp67/vm370 walks down memory lane
Red Phosphor Terminal?
Resolved: There Are No Programs With >32 Bits of Text
Result of STCK instruction - GMT or local?
Reviving Multics
reviving Multics
Reviving Multics
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
Rexx vs. Batch
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RS/6000 in Sysplex Environment
S/360 Engineering Changes
S/360 Engineering Changes
S/360 IPL from 7 track tape
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
Saturation Design Point
Saturation Design Point
secure delete on 3390
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Segments, capabilities, buffer overrun attacks
self correcting systems
send/recv vs. raw RDMA
separate MMU chips
separate MMU chips
Sequence Numbbers in Location 73-80
Sequence Numbbers in Location 73-80
Shipwrecks (dynamic linking)
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
SLAC 370 Pascal compiler found
SLAC 370 Pascal compiler found
slashdot drift on 360 clone by rca
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
small bit of cp/m & cp/67 trivia from alt.folklore.computers n.g. (thread)
software pricing
some recent archeological threads in ibm-main, comp.arch, & alt.folklore.computers ... fyi
someone looking to donate IBM magazines and stuff
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Speed of APL on 360s, was Any DEC 340 Display System Doco?
Speed of APL on 360s, was Any DEC 340 Display System Doco?
spool
SPXTAPE status from REXX
SR 15,15
SR 15,15
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SSL, client certs, and MITM (was WYTM?)
Sun researchers: Computers do bad math ;)
Sun researchers: Computers do bad math ;)
Surprising discovery
SYSPROF and the 190 disk
System/360 40 years old today
System/360 40 years old today
System/360 40 years old today
System/360 40 years old today
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Tera
Tera
Tera
Text Adventures (which computer was first?)
text character based diagrams in technical documentation
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The BASIC Variations
The BASIC Variations
The figures of merit that make mainframes worth the price
The figures of merit that make mainframes worth the price
The Incredible Shrinking Legacy Workforces
The Incredible Shrinking Legacy Workforces
The invention of the real-time interrupt
The One True Language
The Pentium 4 - RIP?
The real history of comp arch: the short form
The Reincarnation of Virtual Machines
The relational model and relational algebra - why did SQL become the industry standard?
The relational model and relational algebra - why did SQL become the industry standard?
The TransRelational Model: Performance Concerns
The WIZ Processor
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Timeless Classics of Software Engineering
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Tools -vs- Utility
Tools -vs- Utility
Top Gun
tracking 64bit storage
Transactions for Industrial Strength Programming
Tru64 and the DECSYSTEM 20
TSO alternative
TSS/370 binary distribution now available
TSS/370 source archive now available
Tubes in IBM 1620?
Tubes in IBM 1620?
two pi, four phase, 370 clone
UltraSPARC-IIIi
Univac 9200, 9300: the 360 clone I never heard of!
Univac 9200, 9300: the 360 clone I never heard of!
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
UNIX on LINUX on VM/ESA or z/VM
Unused address bits
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
Usage of Hex Dump
Usenet invented 30 years ago by a Swede?
UT200 (CDC RJE) Software for TOPS-10?
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Virtual Cleaning Cartridge
Virtual Machine Concept
Virtual Machines for Security
virtual machines for security
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
vm
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
VMFPLC2 tape format
VMFPLC2 tape format
VSPC
Wanted: Weird Programming Language
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Weird new IBM created word
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
what is the difference between ALU & FPU
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is the truth?
What is the truth?
What makes a mainframe a mainframe?
What makes a mainframe a mainframe?
What makes a mainframe a mainframe?
What system Release do you use... OS390? z/os? I'm a Vendor S
Whatever happened to 'University Computer Centers'?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
which CPU for educational purposes?
Which Editor
Which Editor
Which monitor for Fujitsu Micro 16s?
Which Monitor Would You Pick??????
who invented the "popup"?
who invented the "popup"?
who invented the "popup"?
Who said DAT?
Who said "The Mainframe is dead"?
Why are there few viruses for UNIX/Linux systems?
Why did they make FORTRAN so hard to parse?
Why more than 1 hole in FW for IPSec
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Wild hardware idea
Will multicore CPUs have identical cores?
Will multicore CPUs have identical cores?
will there every be another commerically signficant new ISA?
WYTM?
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
XDS Sigma vs IBM 370 was Re: I/O Selectric on eBay: How to use?
Yakaota
z VM 4.3
z/OS UNIX
|d|i|g|i|t|a|l| questions
|d|i|g|i|t|a|l| questions

back to top, network, mainframe - (2001-2002), - (1993-2000), digsig, all

Digital Signature & Standards (2003-2004)

"Marginot Web" (SSL, payments, etc)
(federal) PKI spending hits $1b
[anonsec] Re: potential new IETF WG on anonymous IPSec
A challenge
A challenge (addenda)
A challenge
A challenge
A challenge
A challenge
A challenge
A combined EMV and ID card
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Adding Certificates
Adding Certificates
An attack on paypal
An attack on paypal
An attack on paypal
An attack on paypal
An attack on paypal
ANNOUNCE: NIST Considers Schneier Public Key Algorithm
Antwort: Re: Real-time Certificate Status Facility for OCSP - (RTCS)
Any TLS server key compromises?
application of unique signature
Are there any authentication algorithms with runtime changeable
Authenticated Public Key Exchange without Digital Certificates?
Authenticated Public Key Exchange without Digital Certificates?
Authenticated Public Key Exchange without Digital Certificates?
authentication and authorization
Authentication protocol
Authentication protocol
Authentication w/o user ids and passwords
Authentication w/o user ids and passwords
Authentication white paper dt>Authentification vs Encryption in a system to system interface
Authentification vs Encryption in a system to system interface
Bank security question (newbie question)
basic pki question
basic question: semantics of "map", "tie", etc in PKI
Basics of key authentication
Basics of key authentication
Basics of key authentication
Basics of key authentication
Biometric cards will not stop identity fraud
browser without "padlock" secure?
Can someone clarify, X509 spoofing?
Can someone clarify, X509 spoofing?
Can you use ECC to produce digital signatures? It doesn't see
Can you use ECC to produce digital signatures? It doesn't see
Certificate Policies (was Re: Trivial PKI Question)
Certificate Policies (addenda)
certificates & the alternative view
Chained I/O's
Code Sizing for Digital Signature Verification - DSS/DSA
Comments wanted on an authentication protocol
Confusing Authentication and Identiification?
Confusing Authentication and Identiification?
Confusing Authentication and Identiification? (addenda)
Confusing business process, payment, authentication and identification
Confusing business process, payment, authentication and identification
Convince me that SSL certificates are not a big scam
Cracking SSL
Crypto Standards Organizations
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Digital signature and Digital Certificate
Digital signature and Digital Certificate
Digital Signature Standards
Digital Signature Standards
Does OTP need authentication?
Dual Signature
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
Dumb anti-MITM hacks / CAPTCHA application
Dumbest optimization ever?
ECC book reference, please
ECC Encryption
eCompute ECC2-109 Project has PROBABLE solution
eCompute ECC2-109 Project has PROBABLE solution (now official)
Efficent Digital Signature Schemes
electronic-ID and key-generation
electronic-ID and key-generation
electronic-ID and key-generation
EMV cards as identity cards
EMV cards as identity cards
End of the line for Ireland's dotcom star
End of the line for Ireland's dotcom star
entity authentication with non-repudiation
example: secure computing kernel needed
FAQ: e-Signatures and Payments
FAQ: e-Signatures and Payments
FAQ: e-Signatures and Payments
FINREAD ... and as an aside
FINREAD was. Authentication white paper
FINREAD was. Authentication white paper
Four Corner model. Was: Confusing Authentication and Identiification? (addenda)
ftp authentication via smartcard
Hardware issues [Re: Floating point required exponent range?]
How can I act as a Certificate Authority (CA) with openssl??
How effective is open source crypto?
How effective is open source crypto? (addenda)
How effective is open source crypto? (bad form)
How effective is open source crypto? (aads addenda)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto?
How is a smartcard created?
How secure is 2048 bit RSA?
How secure is 2048 bit RSA?
how simple is SSL? (Re: Monoculture)
Idea for secure login
Identity (was PKI International Consortium)
In Search of Eve - the upper boundary on Mallory
In Search of Eve - the upper boundary on Mallory
In Search of Eve - the upper boundary on Mallory
InfiniBand Group Sharply, Evenly Divided
invoicing with PKI
invoicing with PKI
Is 3DES more secure than 384 bit RSA?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is it possible to devise a public-key cipher with no flaws?
Is this right? Question about SSL and PKI
Kansas kicks of satewide PKI project
Keyservers and Spam
Keyservers and Spam
log on windows xp with smartcard
Looking for pointers to get started with e-signature
Mainframes (etc.)
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Message (authentication/integrity); was: Re: CRC-32 collision
Message (authentication/integrity); was: Re: CRC-32 collision
Moving forward with pre-shared keys
Multiple ECDSA signatures with the same random nonce
New authentication protocol, was Re: Tinc's response to "Linux's answer to MS-PPTP"
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digita Certificates
Non-repudiation (was RE: The PAIN mnemonic)
NSA Buys License for Certicom's Encryption Technology
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP value proposition
Order of Encryption and Authentication
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
passwords
Payments as an answer to spam
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
PKI "not working"
PKI "not working"
PKI "not working"
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI's not working
PKINIT
privacy, authentication, identification, authorization
Privacy, personally identifiable information, identity theft
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Pub/priv key security
Pub/priv key security
Pub/priv key security
Public Encryption Key
Public key encryption
Public key encryption
Public key and the authority problem
public key confusion
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
Public key authentication defeats passwd age warning
public-key: the wrong model for email?
public-key: the wrong model for email?
public-key: the wrong model for email?
public-key: the wrong model for email?
racf
racf
racf
Re:Identity Firewall. l PKI International Consortium
REVIEW: "Biometrics for Network Security", Paul Reid
REVIEW: "Biometrics for Network Security", Paul Reid
RFC 3766 Determining Strengths For Public Keys Used For Exchanging Symmetric Keys
RFC 3833 Threat analysis of the domain name system (DNS)
RFC-2898 Appendix B
RSA factoring challenge and PKI
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
Security in RADIUS (RFC2865)
Self-Regulating SSL Certificate Authority
Setting X.509 Policy Data in IE, IIS, Outlook
should you trust CAs? (Re: dual-use digital signature vulnerability)
Simple resource protection with public keys
Simple SSL/TLS - Some Questions
Simple SSL/TLS - Some Questions
Single Identity. Was: PKI International Consortium
Single User: Password or Certificate
Single User: Password or Certificate
Smart card Authentification
Soft signatures
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL certificates
SSL certificates
SSL certificates
SSL question 128bit, 1024,2048 key lengths?
SSL questions
SSL questions
SSL, client certs, and MITM (was WYTM?)
SSL, client certs, and MITM (was WYTM?)
SSL, client certs, and MITM (was WYTM?)
SSL/TLS DHE suites and short exponents
SSL/TLS passive sniffing
SSL/TLS passive sniffing
Storing digital IDs on token for use with Outlook
Storing digital IDs on token for use with Outlook
Storing digital IDs on token for use with Outlook
Strength of RSA with known plain-text
surrogate/agent addenda (long)
The case against directories
The future of security
The Original Interlock Protocol (what is...)
The real problem that https has conspicuously failed to fix
Two-factor authentication with SSH?
Two-factor authentication with SSH?
Two-factor Authentication Options?
Two-factor Authentication Options?
UK: PKI "not working"
Use of SSL as a VPN
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
very basic quextions: public key encryption
VS: On-line signature standards
VS: On-line signature standards
VS: On-line signature standards (slight addenda)
VS: On-line signature standards
VS: On-line signature standards
VS: On-line signature standards
When rsa vs dsa
When rsa vs dsa
When using SSL, are the GET arguments (QueryString in asp) also encrypted?
Who is the most likely to use PK?
why and how VeriSign, thawte became a trusted CA?
X.500, LDAP Considered harmful Was: OCSP/LDAP
x9.59
Yahoo releases internet standard draft for using DNS as public key server
Yahoo releases internet standard draft for using DNS as public key server

back to top, network, mainframe, digsig - (2001-2002), - (1993-2000), all

Current Collected subjects (2003-2004)

"360 revolution" at computer history museuam (x-post)
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"average" DASD Blocksize
"Marginot Web" (SSL, payments, etc)
"Perfect" or "Provable" security both crypto and non-crypto?
"Perfect" or "Provable" security both crypto and non-crypto?
"Perfect" or "Provable" security both crypto and non-crypto?
"Perfect" or "Provable" security both crypto and non-crypto?
"Perfect" or "Provable" security both crypto and non-crypto?
"Personal Computer" Re: Why haven't the email bobmers been shut down
"Super-Cheap" Supercomputing
"Super-Cheap" Supercomputing
'Boyd': A military Strategist's Emphasis on Speed
'Boyd': A military Strategist's Emphasis on Speed
(federal) PKI spending hits $1b
(fwd) News about SIGMicro
*** New Software: UDP File Transfer Commercial Edition ***
/. passwords - 64 characters, changed daily?
1.7rc2 & developer's build/install
100% CPU is not always bad
1130 Games WAS Re: Any DEC 340 Display System Doco?
1403 Printer
14443 protocol information
1950s AT&T/IBM lack of collaboration?
1950s AT&T/IBM lack of collaboration?
1950s AT&T/IBM lack of collaboration?
1950s AT&T/IBM lack of collaboration?
1950s AT&T/IBM lack of collaboration?
1960s images of IBM 360 mainframes
1960s images of IBM 360 mainframes
1GB Tables as Classes, or Tables as Types, and all that
1GB Tables as Classes, or Tables as Types, and all that
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
1teraflops cell processor possible?
20th anv. of 1000th node on internal network
303x, idals, dat, disk head settle, and other rambling folklore
303x, idals, dat, disk head settle, and other rambling folklore
3270 terminal keyboard??
360 and You Bet Your Company
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 longevity, was RISCs too close to hardware?
360 Microde Floating Point Fix
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
360/370 disk drives
3745 & NCP Withdrawl?
3745 & NCP Withdrawl?
3745 & NCP Withdrawl?
40th Anniversary of IBM System/360
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40th anniversary of IBM System/360 on 7 Apr 2004
40yrs, science center, feb. 1964
4GHz is the glass ceiling?
50 years of computer payroll
64 bits vs non-coherent MPP was: Re: Itanium strikes again
65nm news from Intel
801 (was Re: Reviving Multics
801 (was Re: Reviving Multics
[Announce] The Vintage Computer Forum
[anonsec] Re: potential new IETF WG on anonymous IPSec
[Fwd: Re: Mainframe not a good architecture for interactive w
[HTTP/1.0] Content-Type Header
[IBM-MAIN] HERCULES
[IBM-MAIN] NY Times editorial on white collar jobs going
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Lit.] Buffer overruns
[Meta] Marketplace argument
[Meta] Marketplace argument
[Meta] Marketplace argument
[OT] Computer Proof of the Kepler Conjecture
[OT] Faces of terrorism
[OT] Faces of terrorism
[OT] Lockheed puts F-16 manuals online
[OT] Lockheed puts F-16 manuals online
[OT] Lockheed puts F-16 manuals online
[OT] Lockheed puts F-16 manuals online
[OT] Lockheed puts F-16 manuals online
[OT] Microsoft aggressive search plans revealed
[REALLY OT!] Overuse of symbolic constants
[urgent] which OSI layer is SSL located?
[URL] (about) passwords
A challenge
A challenge (addenda)
A challenge
A challenge
A challenge
A challenge
A challenge
A challenge
A combined EMV and ID card
A combined EMV and ID card
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A Dark Day
A few Z990 Gee-Wiz stats
A few Z990 Gee-Wiz stats
A few Z990 Gee-Wiz stats
A few Z990 Gee-Wiz stats
A Glimpse into PC Development Philosophy
a history question
a history question
A hundred subjects: 64-bit OS2/eCs, Innotek Products,
A hundred subjects: 64-bit OS2/eCs, Innotek Products,
A Look into Banking Trends for 2003
A More Anonymous Internet
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!! g
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A POX on you, Dennis Ritchie!!!
A quote from Crypto-Gram
A quote from Crypto-Gram
A quote from Crypto-Gram
A quote from Crypto-Gram
A quote from Crypto-Gram
A Speculative question
A Speculative question
A Speculative question
A Speculative question
A Speculative question
A Trial Balloon to Ban Email?
A Uniform Resource Name (URN) Namespace for SWIFT Financnail Messaging
Academics locked out by tight visa controls
Access to AMD 64 bit developer centre
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
Acient FAA computers???
Acient FAA computers???
Actual Losses To Identity Fraud Top $1 Billion
Actuarial facts
Actuarial facts
Actuarial facts
Actuarial facts
Adding Certificates
Adding Certificates
Adding reliability and trust to smartcards
Advantages of multiple cores on single chip
Adventure
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
Adventure game (was:PL/? History (was Hercules))
AES-128 good enough for medical data?
Alive and kicking?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Alpha performance, why?
Amazon/Bezos: web advertising patent
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
AMD/Linux vs Intel/Microsoft
Amdahl's VM/PE information/documentation sought
Amusing acronym
Amusing acronym
An a.f.c bibliography?
An attack on paypal
An attack on paypal
An attack on paypal
An attack on paypal (trivia addenda)
An attack on paypal
An attack on paypal
An attack on paypal
An entirely new proprietary hardware strategy
An entirely new proprietary hardware strategy
An entirely new proprietary hardware strategy
An informed populace
An informed populace
An interesting "new" computer security problem
An interesting "new" computer security problem
An Understanding Database Theory
ANNOUNCE: NIST Considers Schneier Public Key Algorithm
Another light on the map going out
Another light on the map going out
Another light on the map going out
Another light on the map going out
Antiquity of Byte-Word addressing?
Antiquity of Byte-Word addressing?
Antwort: Re: Real-time Certificate Status Facility for OCSP - (RTCS)
Any DEC 340 Display System Doco?
Any DEC 340 Display System Doco?
Any DEC 340 Display System Doco?
Any DEC 340 Display System Doco?
Any experience with "The Last One"?
Any experience with "The Last One"?
Any experience with "The Last One"?
Any TLS server key compromises?
Anyone Still Using Cards?
application of unique signature
Architect Mainframe system - books/guidenance
are debit cards safe?
Are there any authentication algorithms with runtime changeable key length?
Are there any authentication algorithms with runtime changeable
ARIDUS
Armoring websites
ARP cache for multicast & broadcast packets?
ARP Caching
ARPAnet again: Bitnet again was: unix
ARPAnet again: Bitnet again was: unix
ARPAnet guest accounts, and longtime email addresses
ARPAnet guest accounts, and longtime email addresses
Article on passwords in Wired News
Artificial intelligence (AI) has been solved
assembler performance superiority: a given
asynchronous CPUs
AT&T versus Treating customers right
AT&T versus Treating customers right
ATA drives and vibration problems in multi-drive racks
Athlon cache question
Athlon cache question
Athlon cache question
Athlon cache question
ATM Fraud, Banking Your Money
atomic memory-operation question
Auditors and systems programmers
August 23, 1957
August 23, 1957
August 23, 1957
Authenticated Public Key Exchange without Digital Certificates?
Authenticated Public Key Exchange without Digital Certificates?
Authenticated Public Key Exchange without Digital Certificates?
authentication and authorization (was: Question on the state of the security industry)
authentication and authorization ... addenda
authentication and authorization (was: Question on the state of the security industry)
authentication and authorization
Authentication protocol
Authentication protocol
Authentication protocol
Authentication w/o user ids and passwords
Authentication w/o user ids and passwords
Authentication white paper
Authentification classifications
Authentification vs Encryption in a system to system interface
Authentification vs Encryption in a system to system interface
Automating secure transactions
Bahrain Takes Swipe Into the Future With News Smart ID Cards
Bank Float May Sink
Bank Float May Sink
Bank of America ATMs Disrupted by Virus
Bank of America ATMs Disrupted by Virus
Bank of America's Trade Finance Strategy
Bank One Calls Attention to ID Theft
Bank security question (newbie question)
Bank security question (newbie question)
Bank security question (newbie question)
Bank security question (newbie question)
BASIC Language History?
BASIC Language History?
basic pki question
basic question: semantics of "map", "tie", etc in PKI
Basics of key authentication
Basics of key authentication
Basics of key authentication
Basics of key authentication
Be Prepared: Gartner Outlines Top Security Risks
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
before execution does it require whole program 2 b loaded in
Big Bertha Thing blogs
big buys was: Tubes in IBM 1620?
Big Ideas, where are they now?
Biometric cards will not stop identity fraud
Biometrics
Bitnet again was: unix
bits, bytes, half-duplex, dual-simplex, etc
Blackboard Gets Gag Order Against Smart-Card Hackers
blackhole spam => mail unreliability (Re: A Trial Balloon to Ban Email?)
blackhole spam => mail unreliability (Re: A Trial Balloon to Ban Email?)
Blinkenlights?
BLKSIZE question
Bob Bemer, Computer Pioneer,Father of ASCII, Inventor of the Esc worker at IBM, Univac and Honeywell dies
Boyd makes wikipedia
browser without "padlock" secure?
Bugwatch: Know your security onions
build-robots-which-can-automate-testing dept
Bushwah and shrubbery
C & reliability: Was "The Incredible Shrinking Legacy"
C v. Ada
c.d.theory glossary (repost)
c.d.theory glossary (repost)
c.d.theory glossary (repost)
c.d.theory glossary (repost)
CA-RAMIS
CA-RAMIS
Calculating expected reliability for designed system
Calculating expected reliability for designed system
Calculating expected reliability for designed system
Calculations involing very large decimals
Calculations involing very large decimals
Call-gate-like mechanism
Call-gate-like mechanism
Call-gate-like mechanism
can a program be run withour main memory?
can a program be run withour main memory?
Can someone clarify, X509 spoofing?
Can someone clarify, X509 spoofing?
Can you use ECC to produce digital signatures? It doesn't see
Can you use ECC to produce digital signatures? It doesn't see
can't close tab after abort 1.3/1.4a
Candle support from Los Delhi
capacity planning: art, science or magic?
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Columns
Card Technology Forecast: 2004-2009
Carnegie Mellon to host first US-based intl'l conference on electronic commerce
Carrying IP over ATM networks
CAS and LL/SC
CAS and LL/SC
CAS and LL/SC
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC (was Re: High Level Assembler for MVS & VM & VSE)
CAS and LL/SC
Cashing In With E-Payments
CC vs. NIST/TCSEC - Which do you prefer?
CCD technology
CCD technology
CCD technology
CDC STAR-100
Certificate Policies (was Re: Trivial PKI Question)
Certificate Policies (addenda)
certificates & the alternative view
chad... the unknown story
chad... the unknown story
Chained I/O's
Chained I/O's
Chained I/O's
Channel busy without less I/O
cheaper low quality drives
cheaper low quality drives
CHECKSUM CHALLENGE - (US$ 100)
chip inside smart card is firmware?
CIOs Must Be Involved In Controlling Risk In Financial Services
Citibank customers hit with e-mail scam
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
CKD Disks?
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Cluster and I/O Interconnect: Infiniband, PCI-Express, Gibat
Clustering ( was Re: Interconnect speeds )
CMS sets health care e-payment standards
CMS sets health care e-payment standards
Codd's death (x-post from a.f.c)
Code Sizing for Digital Signature Verification - DSS/DSA
Columbia U Computing History - New stuff
Columbia U Computing History - New stuff
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic
command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
Comments wanted on an authentication protocol
Committee calls for better e-banking security management
comp.arch classic: the 10-bit byte
comp.arch classic: the 10-bit byte
comp.arch classic: the 10-bit byte
Complex Instructions
Computer folklore - forecasting Sputnik's orbit with
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
computer industry scenairo before the invention of the PC?
Computer programming was all about:
COMPUTER RELATED WORLD'S RECORDS?
Computer resources, past, present, and future
Computer-oriented license plates
Computers in movies
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
COMTEN- IBM networking boxes
Concern Grows About ID Theft
Confessions of a first-time SHARE attendee
Confusing Authentication and Identiification?
Confusing Authentication and Identiification?
Confusing Authentication and Identiification?
Confusing Authentication and Identiification?
Confusing Authentication and Identiification? (addenda)
Confusing business process, payment, authentication and identification
Confusing business process, payment, authentication and identification
Confusing business process, payment, authentication and identification
Confusing business process, payment, authentication and identification
Controversial paper - Good response article on ZDNet
Convince me that SSL certificates are not a big scam
Correction to Univac 494 description on web site
Correction to Univac 494 description on web site
Correction to Univac 494 description on web site
cost of crossing kernel/user boundary
cost of crossing kernel/user boundary
cost of crossing kernel/user boundary
Cost of Message Passing?
Cost of patching "unsustainable"
Cost of patching "unsustainable"
Cost of patching "unsustainable"
Could somebody use SCSH, Sheme, or Lisp to create the "Lispm" architecture
Could somebody use SCSH, Sheme, or Lisp to create the "Lispm"
couple recent NIST drafts
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
cp/67 35th anniversary
CPU Impact of degraded I/O
CPU Impact of degraded I/O
CPUs with microcode?
Cracking SSL
Cray to commercialize Red Storm
Cray to commercialize Red Storm
Cray to commercialize Red Storm
Cray to commercialize Red Storm
Cray to commercialize Red Storm
creat
creat
creat
Credit card leaks continue at a furious pace
Criminals using high-tech methods for old-style crimes
Crypto Standards Organizations
Cryptoengines with usage accounting
CTSS source online
Cyber Security In The Financial Services Sector
CYLFAULT
Danger: Derrida at work
DASD Architecture of the future
DASD Architecture of the future
DASD Architecture of the future
dasd full cylinder transfer (long post warning)
DASD history
Data Display & Modeling
Database design and confidential data protection
Database design and confidential data protection
DE-skilling was Re: ServerPak Install via QuickLoad Product
Dealing with complexity
Dealing with complexity
Dealing with complexity
Dealing with complexity
Dealing with complexity
Dealing with complexity
Dealing with complexity
death of Edgar F. (Ted) Codd
death of Edgar F. (Ted) Codd
defination of terms: "Application Server" vs. "Transaction Server"
Definitions of "Security"?
Demo: Things in Hierarchies (w/o RM/SQL)
Demo: Things in Hierarchies (w/o RM/SQL)
Detecting when FIN has arrived
Detecting when FIN has arrived
Detergent
Determining Key Exchange Frequency?
determining memory size
determining memory size
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
diffence between itanium and alpha
Difference between TCPA-Hardware and a smart card (was: example:secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
Difference between TCPA-Hardware and a smart card (was: examp le: secure computing kernel needed)
Differnce between LF and NL
Digital signature and Digital Certificate
Digital signature and Digital Certificate
Digital Signature Standards
Digital Signature Standards
Dijkstra on "The End of Computing Science"
Disk capacity and backup solutions
Disk capacity and backup solutions
Disk capacity and backup solutions
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk drives as commodities. Was Re: Yamhill
Disk prefetching
dissassembled code
dissassembled code
DNS inventor says cure to net identity problems is right under our nose
DNS, yet again
Do Data Models Need to built on a Mathematical Concept?
Do we really need all three of these newsgroups?
DOD 5200.28-STD capable OS?
DOD prepares for credentialing pilot
DOD Prepares for biometric embedded smart card pilot
Does OTP need authentication?
Does OTP need authentication?
Does OTP need authentication?
Does PowerPC 970 has Tagged TLBs (Address Space Identifiers)
Don't-Ask-Don't-Tell E-commerce
DOS trivia question
downsizing (euphemisms)
Draft E-Authentication Policy for Federal Agencies
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Dreaming About Redesigning SQL
Drivers License required for surfing?
dual processors: not just for breakfast anymore?
Dual Signature
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
dual-use digital signature vulnerability
Dumb anti-MITM hacks / CAPTCHA application
Dumbest optimization ever?
Dumbest optimization ever?
Dumbest optimization ever?
Dyadic
Dyadic
Dyadic
Dyadic
E-Authentication gateway draws interest outside of e-gov projects
E-banking is board-level Issue, Says Basel Committee
E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
E-Commerce Standard Plans Made Public
E-merchants Turn Fraud-busters
E-merchants Turn Fraud-busters (somewhat related)
EAL5
EAL5
EAL5
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
Early attempts at console humor?
early vnet & exploit
earthlink ppp connection
Easiest possible PASV experiment
Easiest possible PASV experiment
Easiest possible PASV experiment
ECC book reference, please
ECC Encryption
eCompute ECC2-109 Project has PROBABLE solution
eCompute ECC2-109 Project has PROBABLE solution (now official)
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
ECPS:VM DISPx instructions
editors/termcap
editors/termcap
editors/termcap
effeciently resetting a block of memory
Efficent Digital Signature Schemes
EFTA to Adaopt ATM Ant-Fraud Measures
Electronic Safety and Soundness: A Four Pillar Approach; Public Policy Issues
Electronic Safety and Soundness: Securing Finance in a New Age
electronic-ID and key-generation
electronic-ID and key-generation
electronic-ID and key-generation
Eliza
employee motivation & executive compensation
employee motivation & executive compensation
employee motivation & executive compensation
employee motivation & executive compensation
employee motivation & executive compensation
EMV cards as identity cards
EMV cards as identity cards
EMV cards as identity cards
EMV cards as identity cards
Encryption of data in smart cards
Encryption of data in smart cards
End of the line for Ireland's dotcom star
End of the line for Ireland's dotcom star
entity authentication with non-repudiation
Escon vs Ficon Cost
evoluation (1.4) and ssl (FC2) update
example: secure computing kernel needed
example: secure computing kernel needed
Expanded Storage
Expanded Storage
Expanded Storage
Facilities "owned" by MVS
Facilities "owned" by MVS
Facilities "owned" by MVS
Fake Companies, real money; elaborate con wrings cash out of stolen credit cards
FAQ: e-Signatures and Payments
FAQ: e-Signatures and Payments
FAQ: e-Signatures and Payments
FAQ: e-Signatures and Payments
FAST - Shame On You Caltech!!!
fast check for binary zeroes in memory
Fast TCP
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FAST TCP makes dialup faster than broadband?
FBA suggestion was Re: "average" DASD Blocksize
FBI Probing Theft of 8 Million Credit Card Numbers
FC1 & FC2
fc2, evolution, yum, libbonobo-2.6.2-1.i386.rpm
fc2, ssh client/server, kernel 494
FC3 sound
fc3, eamcs 21.3.1 & ls incompatibility?
Federal agencies' banking system moves online
Feds Want Banks to Warn of ID Theft
Feds, industry warn of spike in ID theft scams
filesystem structure, was tape format (long post)
Filesystems
Filesystems
Filesystems
Financial identity is *dangerous*? (was re: Fake companies, real money)
Financial identity is *dangerous*? (was re: Fake companies, real money)
Financial Privacy To Take The Floor
Finites State Machine (OT?)
FINREAD ... and as an aside
FINREAD was. Authentication white paper
FINREAD was. Authentication white paper
First Data buying Concord EFS
First single chip 32-bit microprocessor
First single chip 32-bit microprocessor
First single chip 32-bit microprocessor
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Fix the shuttle or fly it unmanned
Flash 10208
Flex Question
FlexEs and IVSK instruction
Foiling Replay Attacks
Foiling Replay Attacks
foundations of relational theory? - some references for the
founder, cambridge science center
Four Corner model. Was: Confusing Authentication and Identiification? (addenda)
fraud and phishing attacks soar
Frontiernet insists on being my firewall
FTC says incidence of ID theft jumped in 2002
FTC Says ID Theft Greater Problem Than Originally Thought
ftp authentication via smartcard
FUJITSU DEVELOPS ENCRYPTION TECH THAT TAKES 20 MILLION YEARS TO BREAK
funny article
Funny Micro$oft patent
FW: Is FICON good enough, or is it the only choice we get?
FW: Looking for Disk Calc program/Exec
FW: Looking for Disk Calc program/Exec (long)
FW: Looking for Disk Calc program/Exec
FW: Looking for Disk Calc program/Exec
Gartner Office Information Systems 6/2/89
Getting old
GNOME - viewing multiple workspaces simultaneously
Gobble, gobble, gobble: 1.7 RC1 is a "turkey"!
going w/o sleep
going w/o sleep
going w/o sleep
going w/o sleep
Good news for SPARC
Good news for SPARC
Goodbye PROFS
Google loves "e"
GOSIP
GOSIP
graceful recovery when runs out of paging?
graceful recovery when runs out of paging?
grey-haired assembler programmers (Ritchie's C)
Hacker accesses 2.2 million credit cards
Hacker's compromise Navy purchase card
Hand cranking telephones
Hand cranking telephones
Happy Birthday Mainframe
Happy Birthday Mainframe
Hard disk architecture: are outer cylinders still faster than inner cylinders?
Hard disk architecture: are outer cylinders still faster than inner cylinders?
Hard disk architecture: are outer cylinders still faster than inner cylinders?
Hard disk architecture: are outer cylinders still faster than inner cylinders?
harddisk in space
Hardware issues [Re: Floating point required exponent range?]
Hardware support of "new" instructions
hardware vs software security
Has the Redhat ntp time server gone off-line?
HASP assembly: What the heck is an MVT ABEND 422?
HASP assembly: What the heck is an MVT ABEND 422?
HASP assembly: What the heck is an MVT ABEND 422?
Health care and lies
hee-hee. I can do something about this spam
Help! I'm trying to understand PKI - especially CA's role
HELP, Vulnerability in Debit PIN Encryption security, possibly
HELP, Vulnerability in Debit PIN Encryption security, possibly
HELP, Vulnerability in Debit PIN Encryption security, possibly
HERCULES
Hercules
High Level Assembler for MVS & VM & VSE
high speed network, cross-over from sci.crypt
HIPAA, privacy, identity theft
HIPAA, privacy, identity theft (addenda)
history books on the development of capacity planning (SMF and RMF)
history books on the development of capacity planning (SMF and RMF)
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of project maintenance tools -- what and when?
History of Computer Network Industry
History of Computer Network Industry
History of Computer Network Industry
History of C
History of C
History of C
History of C
History of C
History of C
History of C
History of C
History of C
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Holee shit! 30 years ago!
Homeland Security chief mulls SEC cybersecurity filings
Horror stories: high system call overhead
How can I act as a Certificate Authority (CA) with openssl??
How do I know currently used RFC?
How effective is open source crypto?
How effective is open source crypto? (addenda)
How effective is open source crypto? (bad form)
How effective is open source crypto? (aads addenda)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto? (bad form)
How effective is open source crypto?
How is a smartcard created?
How is a smartcard created?
How is a smartcard created?
how it works, the computer, 1971
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
how long does (or did) it take to boot a timesharing system?
How many layers does TCP/IP architecture really have?
How many layers does TCP/IP architecture really have?
How much overhead is "running another MVS LPAR"?
How secure is 2048 bit RSA?
How secure is 2048 bit RSA?
how simple is SSL? (Re: Monoculture)
How to cope with missing values - NULLS?
How to cope with missing values - NULLS?
How to increase the Swap drive size
How to store the car-valued bearer bond? (was Financial identity...)
HSM Functionality for Microsoft, using the Mainframe as the
Humans
humor in source code
humor in source code
hung/zombie users ... long boring, wandering story
hyperblock drift, was filesystem structure (long warning)
Hyperthreading vs. SMP
Hyperthreading vs. SMP
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain
I am an ageing techy, expert on everything. Let me explain the
I am an ageing techy, expert on everything. Let me explain
I am an ageing techy, expert on everything. Let me explain
I am an ageing techy, expert on everything. Let me explain
IBM 3090 : Was (and fek that) : Re: new computer kits
IBM 3090 : Was (and fek that) : Re: new computer kits
IBM 3174
IBM 360 memory
IBM 360 memory
IBM 360 Memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360 memory
IBM 360
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3614 and 3624 ATM's
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3705 and UC.5
IBM 3725 Comms. controller - Worth saving?
IBM 5100
IBM 5100
IBM 5100
IBM 5100
IBM 7094 Emulator - An historic moment?
IBM 7094 Emulator - An historic moment?
IBM 7094 Emulator now runs Fortran compiler
IBM advertising artefact (what is it?)
IBM channels, was Re: Microkernels are not "all or nothing"
ibm mainframe or unix
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Manuals from the 1940's and 1950's
IBM Open Sources Object Rexx
IBM operating systems
IBM operating systems and APL
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM n
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
IBM Spells Out Mainframe Strategy
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM system 370
IBM was: VAX again: unix
IBM zSeries in HPC
IBM zSeries in HPC
Ibm's disasters in the 70's
IBM's Electronic Data Interchange Support
IBMism
ID theft costs banks $1 billion a year
ID Theft Often Goes Unrecognized
Idea for secure login
Idea for concurrent transactions
Identity (was PKI International Consortium)
Identity Fraud costs Austrilia AU$1 billion a year
Identity Theft Losses Expected to Hit $2 Trillion by 2005
Identity theft rockets 80 per cent
identity, fingerprint, from comp.risks
Idiot drivers
IE6 faster than O7.10?
IEFBR14 Problems
IEN 45 and TCP checksum offload
IETF meeting (Re: editors/termcap)
If the x86 ISA could be redone
If there had been no MS-DOS
If there had been no MS-DOS
If there had been no MS-DOS
If there had been no MS-DOS
If there had been no MS-DOS
If there had been no MS-DOS
If there had been no MS-DOS
If you lived as a child in the 50's, 60's or 70's,
If you're going to bullshit, eschew moderation
If you're going to bullshit, eschew moderation
If you're going to bullshit, eschew moderation
In Search of Eve - the upper boundary on Mallory
In Search of Eve - the upper boundary on Mallory
In Search of Eve - the upper boundary on Mallory
incremental cms file backup
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
Infiniband - practicalities for small clusters
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
InfiniBand Group Sharply, Evenly Divided
instant messaging
instant messaging
instant messaging
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Integer types for 128-bit addressing
Intel 860 and 960, was iAPX 432
Intel iAPX 432
Intel iAPX 432
inter-block gaps on DASD tracks
inter-block gaps on DASD tracks
Interesting read about upcoming K9 processors
Interesting read about upcoming K9 processors
internal network drift (was filesystem structure)
Internet Consumer Fraud Continues to Rise
Internet Fraud & Attacks on the rise
Internet turns 35, still work in progress
Internet turns 35 today
Interrupt in an IBM mainframe
invoicing with PKI
invoicing with PKI
Iris recognition helps to prevent ID fraud
Is 3DES more secure than 384 bit RSA?
IS CP/M an OS?
IS CP/M an OS?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is cryptography where security took the wrong branch?
Is DOS unix?
Is Fast Path headed nowhere?
Is Fast Path headed nowhere?
Is finding security holes a good idea?
Is finding security holes a good idea?
Is it possible to devise a public-key cipher with no flaws?
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Is the solution FBA was Re: FW: Looking for Disk Calc
Is there a way to configure your web browser to use multiple
Is this right? Question about SSL and PKI
Is Time Right For Micropayments
iso 8583
iso 8583
iso 8583
Issues in Using Virtual Address for addressing the Cache
IT jobs move to India
IT jobs move to India
IT Managers Critical Front in War on Identity Theft
IT Security to be added to FAR
IUCV in VM/CMS
Japan seeks smarter ideas for smart cards
Japanese bank offers 'biosecurity' account
Jargon Files Wanted
JES2 NJE setup
JSX 328x printing (portrait)
June 23, 1969: IBM "unbundles" software
June 23, 1969: IBM "unbundles" software
Kansas kicks of satewide PKI project
Keeping old hardware alive?
Keyservers and Spam
Keyservers and Spam
Kinko's spy case: Risks of renting PC's
Know Your Enemy Automated Credit Card Fraud (automated, forwarded)
Know your security onions (or security proportional to risk)
Labour to launch ID card - and it'll cost you £25
Language semantics wrt exploits
Law aims to reduce identity theft
layered approach
Leaf routines
Linguistic Determinism
Linux gets sensitive government use approval
Lisp Machines
Lisp Machines
Lisp Machines
Lisp Machines
Lisp Machines
Lisp Machines
Lisp Machines
Lisp Machines
Listserv for TCPIP
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
Lock-free algorithms
log on windows xp with smartcard
Longest Thread Ever
Looking for pointers to get started with e-signature
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Losing colonies
Low Bar for High School Students Threatens Tech Sector
Low Bar for High School Students Threatens Tech Sector
Low-end processors (again)
Low-end processors (again)
Macros and base register question
MAD Programming Language
MAD Programming Language
MAD Programming Language
MAD Programming Language
Mail delivery failed: returning message to sender
mainframe
mainframe and microprocessor
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe Emulation Solutions
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe not a good architecture for interactive workloads
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe System Programmer/Administrator market demand?
Mainframe Tape Drive Usage Metrics
Mainframe Training
Mainframe Training
Mainframe Training
Mainframe Virus????
Mainframe Virus????
Mainframe Virus????
Mainframes (etc.)
Many engineers lack even a four-year degree
Many engineers lack even a four-year degree
Many engineers lack even a four-year degree
Mars Rover Not Responding
Mars Rover Not Responding
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
Maybe It's Snake Oil All the Way Down
md5 algorithm
Memory Affinity
Memory Affinity
Memory Affinity
Mercury News 04-20-2003 Computer pioneer, dead at 79,
merged security taxonomy & glossary
merged security taxonomy and glossary updated
Message (authentication/integrity); was: Re: CRC-32 collision
Message (authentication/integrity); was: Re: CRC-32 collision
Message To America's Students: The War, The Draft, Your Future
Methods of Authentication on a Corporate
Methods of payment
Methods of payment
Methods of payment
Methods of payment
Micro$loth Update Mail-Bomb
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microkernels are not "all or nothing". Re: Multics Concepts For
Microprocessor History Site
microsoft antitrust
Microsoft Fixes Passport to Meet EU Privacy Rules
Microsoft Identity Server Prepped For Windows Server 2003
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft Internet Patch
Microsoft source leak
Microsoft strikes again - from comp.risks
Microsoft Ties Security to Verisign
Microsoft worm affecting Automatic Teller Machines
Microsoft worm affecting Automatic Teller Machines
Microsoft worm affecting Automatic Teller Machines
Microsoft, Sterling Aid SWIFT Users
MIDAS
MIDAS
Ministers to Act on Rise in Identity Theft
misc from IETF
misc. dmksnt
misc. IETF e-commerce announcements (from IOTP working group)
MITM attacks
MITM attacks
MITM attacks
Mockapetris agrees w/Lynn on DNS security - (April Fool's day??)
Mockapetris agrees w/Lynn on DNS security - (April Fool's day??)
model 91/CRJE and IKJLEW
model 91/CRJE and IKJLEW
Modular Exponentiations on Battery-run devices
Monster(ous) sig (was Re: Vintage computers are better
More -Fake- Earthlink Inquiries
More complex operations now a better choice?
More complex operations now a better choice?
More complex operations now a better choice?
More Identity Theft ... Security Stands in Line Behind Other Priorities
More on the ID theft saga
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Moribund TSO/E
Most dangerous product the mainframe has ever seen
Motorola goes with USB On-the-Go
Moving forward with pre-shared keys
Mozzilla renamed to Firebird
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MP cost effectiveness
MS Corporate. Memory Loss is Corporrate Policy?
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multi-processor timing issue
Multics Concepts For the Contemporary Computing World - a CPU
Multics Concepts For the Contemporary Computing World
Multics Concepts For the Contemporary Computing World
Multics Concepts For the Contemporary Computing World
Multics preservation: good news
Multics preservation: good news
Multiple ECDSA signatures with the same random nonce
Multiple layers of virtual address translation
Multiple layers of virtual address translation
MUMPS & MUSIC, was: SMF Records - a side issue
MVS 3.8
Name for this early transistor package?
Natl. Crypto Museum was: reviving Multics -- Computer Museum
NCipher Takes Hardware Security To Network Level
NEC drives
need a firewall
need a firewall
Need to understand difference between EBCDIC and EDCDIC
Need to understand difference between EBCDIC and EDCDIC
Net Worm Heightens Security Concerns
netscape firebird contraversy
network history
network history
network history
network history
network history
network history
network history
network history
network history (repeat, google may have gotten confused?)
network history
network history
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Network separation using host w/multiple network interfaces
Networks separation using host w/multiple network interfaces
Networks separation using host w/multiple network interfaces
New authentication protocol, was Re: Tinc's response to "Linux's answer to MS-PPTP"
New England Winter Drivers
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digital Certificates
New Method for Authenticated Public Key Exchange without Digita Certificates
New privacy rules could mean headaches for financial services IT
New RFC 3514 addresses malicious network traffic
New RFC 3514 addresses malicious network traffic
New RFC 3514 addresses malicious network traffic
new to mainframe asm
new to mainframe asm
Next generation processor architecture?
NIST recommends dual biometrics for visas
No visible activity
Nokia, MasterCard test wireless payment
Non-repudiation (was RE: The PAIN mnemonic)
Non-repudiation (was RE: The PAIN mnemonic)
Non-repudiation (was RE: The PAIN mnemonic)
Non-repudiation (was RE: The PAIN mnemonic)
Non-repudiation (was RE: The PAIN mnemonic)
Non-repudiation (was RE: The PAIN mnemonic)
Not A Survey Question
NSA Buys License for Certicom's Encryption Technology
NSA chooses ECC
NSF interest in Multics security
NSF interest in Multics security
NULL
OASIS and RosettaNet Set Standards Alliance
Oasis Pushes Global E-procurement Standardization
Obsolete mainframes
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP and LDAP
OCSP value proposition
Of what use 64-bit "General Purpose" registers?
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT
Offshore IT ... again
ok, today's updates for FC2 test2 breaks
ok, today's updates for FC2 test2 breaks
ok, today's updates for FC2 test2 breaks
ok, today's updates for FC2 test2 breaks
ok, today's updates for FC2 test2 breaks
Oldest running software
Oldest running code
Oldest running code
Oldest running code
Oldest running code
Oldest running code
Oldest running code
Oldest system to run a web browser?
Omniscience Protocol Requirements
One big box vs. many little boxes
One big box vs. many little boxes
One big box vs. many little boxes
One Processor is bad?
One Processor is bad?
Online credit card fraud rocks Indonesia
oort compute bound since 12/6 nntp.el changes
oort compute bound since 12/6 nntp.el changes
oort compute bound since 12/6 nntp.el changes
oort compute bound since 12/6 nntp.el changes
oort compute bound since 12/6 nntp.el changes
Order of Encryption and Authentication
Organizations with two or more Managers
Organizations with two or more Managers
Origin of Kerberos
Origin of "Function keys" question
Origin of "Function keys" question
Origin of "Function keys" question
origin of the UNIX dd command
origin of the UNIX dd command
Orthographical oddities
OS Partitioning and security
osi archeological reference from ietf-pkix list
osi bits
OSI not quite dead yet
OSI not quite dead yet
OSI not quite dead yet
OSI not quite dead yet
OSI protocol header
OT Global warming
OT The First Mouse
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT What movies have taught us about Computers
OT: Attaining Perfection
OT: Columbia, MD and the social impact of Ft. Meade/NSA?
OT: One for the historians - 360/91
OT: One for the historians - 360/91
OT: One for the historians - 360/91
OT: The dynamics of the Indian IT industry
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
Overflows
packetloss bad for sliding window protocol?
packetloss bad for sliding window protocol?
Page coloring required?
Page Table - per OS/Process
Page Table - per OS/Process
Page Table - per OS/Process
Page Table - per OS/Process
Paging
Paging query - progress
paper tape input
Parallel programming again (Re: Intel announces "CT" aka
passing of iverson
Password / access rights check
Password / access rights check
passwords
passwords
Passwords multiply as users' rage rises
payment api for v1.0 internet open trading protocol ... fyi
Payment Application Programmers Interface (API) for IOTP
Payment system and security conference
Payments as an answer to spam
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
Payments as an answer to spam (addenda)
pbx security from 20 years ago
PC history, was PDP10 and RISC
PCIe as a chip-to-chip interconnect
PCIe as a chip-to-chip interconnect
PDP10 and RISC
PDP10 and RISC
PDP10 and RISC
PDP10 and RISC
perfomance vs. key size
perfomance vs. key size
perfomance vs. key size
Phillips, Visa push contactless payments in consumer devices
Phishing losses total $500 million - Nacha
Phone # layout vs Computer keypad # layout???!???!!!
Ping: Anne & Lynn Wheeler
Ping: Anne & Lynn Wheeler
PKI "not working"
PKI "not working"
PKI "not working"
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI International Consortium
PKI's not working
PKINIT
PL/? History
PL/? History
Playing games in mainframe
PLO instruction
pointless embedded systems
pointless embedded systems
pointless embedded systems
Police smash UK's biggest credit card fraud ring
Poor people's OS?
pop secure connection
pop secure connection
pop secure connection
Port Assignment- OT in a Small Way
Possibly stupid question for you IBM mainframers... :-)
Possibly stupid question for you IBM mainframers... :-)
post-doomsday computing
POWER hashes vs tree
PR/SM Dynamic Time Slice calculation
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
Pre-relational, post-relational, 1968 CODASYL "Survey of Data Base Systems"
price ov IBM virtual address box??
price ov IBM virtual address box??
price ov IBM virtual address box??
price ov IBM virtual address box??
Privacy again a hot-button issue for legistlators
privacy, authentication, identification, authorization
Privacy, personally identifiable information, identity theft
project athena & compare and swap
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
Proposal for a new PKI model (At least I hope it's new)
PSW Sampling
PSW Sampling
Pub/priv key security
Pub/priv key security
Pub/priv key security
Public Encryption Key
Public key encryption
Public key encryption
Public key and the authority problem
public key confusion
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
public key vs passwd authentication?
Public key authentication defeats passwd age warning
public-key: the wrong model for email?
public-key: the wrong model for email?
public-key: the wrong model for email?
public-key: the wrong model for email?
Question about Unix "heritage"
Question about Unix "heritage"
Question about Unix "heritage"
Question about Unix "heritage"
Question About VM List
Question on internal/external IPs
Question on the state of the security industry
Questioning risks of using the same key for authentication and encryption
Questions of IP
Quote of the Week
Qwerty vs Dvorak
racf
racf
racf
racf
Random signatures
Rant (Re: Programmer's unpaid overtime)
Rationale for Supercomputers
Re : OT: One for the historians - 360/91
Re : OT: One for the historians - 360/91
Re:Identity Firewall. l PKI International Consortium
real multi-tasking, multi-programming
real multi-tasking, multi-programming
real multi-tasking, multi-programming
recent cp67/vm370 walks down memory lane
Recent IOTP and ECML publications
Red Phosphor Terminal?
Redhat 9
related to electronic contracting (new X9C group)
Relational Model and Search Engines?
Relational Model and Search Engines?
Relational Model and Search Engines?
Relational vs network vs hierarchic databases
Relational vs network vs hierarchic databases
Relational vs network vs hierarchic databases
replay & integrity
Resolved: There Are No Programs With >32 Bits of Text
Resolved: There Are No Programs With >32 Bits of Text
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Resolving an identifier into a meaning
Result of STCK instruction - GMT or local?
Retail wireless security: a few considerations
REVIEW: "Biometrics for Network Security", Paul Reid
REVIEW: "Biometrics for Network Security", Paul Reid
Reviving Multics
reviving Multics
Reviving Multics
Reviving Multics
Reviving Multics
reviving Multics -- Computer Museum
reviving Multics -- Computer Museum
reviving Multics -- Computer Museum
reviving Multics -- Computer Museum
Rewrite TCP/IP
Rewrite TCP/IP
Rewrite TCP/IP
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
REXX still going strong after 25 years
Rexx vs. Batch
RFC # for DCC protocol?
RFC 3092
RFC 3766 Determining Strengths For Public Keys Used For Exchanging Symmetric keys
RFC 3833 Threat analysis of the domain name system (DNS)
RFC-2898 Appendix B
RFC2557?
RFCs that reference MD5
rh9/evolution/filters
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
RISCs too close to hardware?
Round robin IS NOT load balancing (?)
Round robin IS NOT load balancing (?)
Round robin IS NOT load balancing (?)
RPOW - Reusable Proofs of Work
RPOW - Reusable Proofs of Work
RS/6000 in Sysplex Environment
RS/6000 in Sysplex Environment
RS/6000 in Sysplex Environment
RSA factoring challenge and PKI
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
RSA vs AES
S/360 Engineering Changes
S/360 Engineering Changes
S/360 Engineering Changes
S/360 IPL from 7 track tape
S/360 IPL from 7 track tape
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
S/360 undocumented instructions?
Saturation Design Point
Saturation Design Point
saving country music
Scanning old manuals
SEC Tests Technology to Speed Accounting Analysis
secret hackers to aid war on internet fraud
secure delete on 3390
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure OS Thoughts
Secure web logins w random passwords
securID weakness
Security Certifications?
Security Certifications?
Security Certifications?
Security in RADIUS (RFC2865)
Security in RADIUS (RFC2865)
Security models
Security of Oyster Cards
security taxonomy and CVE
Segments, capabilities, buffer overrun attacks
Segments, capabilities, buffer overrun attacks
self correcting systems
Self-Regulating SSL Certificate Authority
send/recv vs. raw RDMA
separate MMU chips
separate MMU chips
Sequence Numbbers in Location 73-80
Sequence Numbbers in Location 73-80
Seriously long term storage
Seriously long term storage
Setting X.509 Policy Data in IE, IIS, Outlook
Seven of Nine
Seven of Nine
Seven of Nine
Seven of Nine
Seven of Nine
Share in DC: was somethin' else
Share in DC: was somethin' else
Share lunch/dinner?
Share lunch/dinner?
Shipwrecks (dynamic linking)
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
Shipwrecks
shirts
should you trust CAs? (Re: dual-use digital signature vulnerability)
Simple resource protection with public keys
Simple SSL/TLS - Some Questions
Simple SSL/TLS - Some Questions
Simple SSL/TLS - Some Questions
Single Identity. Was: PKI International Consortium
Single User: Password or Certificate
Single User: Password or Certificate
SLAC 370 Pascal compiler found
SLAC 370 Pascal compiler found
slashdot drift on 360 clone by rca
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
Slashdot: O'Reilly On The Importance Of The Mainframe Heritage
small bit of cp/m & cp/67 trivia from alt.folklore.computers n.g. (thread)
Smart card Authentification
Smartcards and devices
smp 2.4.20-13.9 ext3fs problems?
smp 2.4.20-19.9 tcp/scp problem?
socks & color
Soft signatures
software pricing
Solving the problem of micropayments
Solving the problem of micropayments
Solving the problem of micropayments
Solving the payment problem for open source and P2P file sharing
Some Laws
some recent archeological threads in ibm-main, comp.arch, & alt.folklore.computers ... fyi
some X9.59 (and little FSTC) ... from crypto mailing list ... fyi
someone looking to donate IBM magazines and stuff
someone looking to donate IBM magazines and stuff
Spam Bomb
Spam Bomb
Spam's Being Used For Identity Theft And Blackmail, Symantec Says
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Specifying all biz rules in relational data
Speed of APL on 360s, was Any DEC 340 Display System Doco?
Speed of APL on 360s, was Any DEC 340 Display System Doco?
spool
SPXTAPE status from REXX
SR 15,15
SR 15,15
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SR 15,15 was: IEFBR14 Problems
SR 15,15
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL & Man In the Middle Attack
SSL certificates
SSL certificates
SSL certificates
SSL question 128bit, 1024,2048 key lengths?
SSL questions
SSL questions
SSL, client certs, and MITM (was WYTM?)
SSL, client certs, and MITM (was WYTM?)
SSL, client certs, and MITM (was WYTM?)
SSL, client certs, and MITM (was WYTM?)
SSL/TLS DHE suites and short exponents
SSL/TLS passive sniffing
SSL/TLS passive sniffing
Star study: Identity Theft In The United States: An Update
Star Trek, time travel, and such
stop worrying about it offshoring - it's doing fine
Storing digital IDs on token for use with Outlook
Storing digital IDs on token for use with Outlook
Storing digital IDs on token for use with Outlook
Strength of RSA with known plain-text
Study: ID theft usually an inside job
Sun releases Liberty-enabled software
Sun releases Liberty-enabled software
Sun researchers: Computers do bad math ;)
Sun researchers: Computers do bad math ;)
Sun researchers: Computers do bad math ;)
Super Anti War Computers
Surprising discovery
Surprising discovery
surrogate/agent addenda (long)
switching to KDE
SYSPROF and the 190 disk
System/360 40 years old today
System/360 40 years old today
System/360 40 years old today
System/360 40 years old today
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
System/360 40th Anniversary
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Systems software versus applications software definitions
Tackling security threats from within
tankers and computers
tcp time out for idle sessions
Tech firms band together on ID theft
Technology and Crime, Criminal Intelligence Service Canada - 2003
Ted Nelson, of Project Xanadu
Tera
Tera
Tera
Text Adventures (which computer was first?)
Text Adventures (which computer was first?)
Text Adventures (which computer was first?)
text character based diagrams in technical documentation
text character based diagrams in technical documentation
text character based diagrams in technical documentation
text character based diagrams in technical documentation
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
TGV in the USA?
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The attack of the killer mainframes
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The BASIC Variations
The Best ID Plan? Wait and See
The case against directories
The case against directories
The Digital Insider: Backdoor Trojans ... fyi
The End of Not-Moore's Law?
The figures of merit that make mainframes worth the price
The figures of merit that make mainframes worth the price
The future of security
The future of security
The future of security
The IBM 5100 and John Titor
The IBM 5100 and John Titor
The Incredible Shrinking Legacy Workforces
The Incredible Shrinking Legacy Workforces
The invention of the real-time interrupt
The Network Data Model, foundation for Relational Model
The One True Language
The Original Interlock Protocol (what is...)
The PAIN mnemonic
The PDP-1 - games machine?
The PDP-1 - games machine?
The Pentium 4 - RIP?
The Pentium 4 - RIP?
The Pentium 4 - RIP?
The real history of computer architecture: the short form
The real history of comp arch: the short form
The real problem that https has conspicuously failed to fix
The real problem that https has conspicuously failed to fix
The Reincarnation of Virtual Machines
The relational model and relational algebra - why did SQL become the industry standard?
The relational model and relational algebra - why did SQL become the industry standard?
The Sling and the Stone & Certain to Win
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The SOB that helped IT jobs move to India is dead!
The Tao Of Backup: End of postings
The TransRelational Model: Performance Concerns
The Vintage Computer Forum
The WIZ Processor
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Thoughts on Utility Computing?
Threat Analysis and Threat Trees
Threat of running a web server?
Throughput vs. response time
Throughput vs. response time
Timeless Classics of Software Engineering
Timeless Classics of Software Engineering
Timeless Classics of Software Engineering
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Timesharing TOPS-10 vs. VAX/VMS "task based timesharing"
Tools -vs- Utility
Tools -vs- Utility
Top Gun
tracking 64bit storage
Transactions for Industrial Strength Programming
Transactions for Industrial Strength Programming
Transactions for Industrial Strength Programming
Tru64 and the DECSYSTEM 20
Tru64 and the DECSYSTEM 20
Tru64 and the DECSYSTEM 20
Tru64 and the DECSYSTEM 20
Tru64 and the DECSYSTEM 20
Trusting the Tools - was Re: Open Source
TSO alternative
TSS/370 binary distribution now available
TSS/370 source archive now available
Tubes in IBM 1620?
Tubes in IBM 1620?
tunneling TCP/IP over UDP for high-latency links?
tunneling TCP/IP over UDP for high-latency links?
TWIST - Commercial Payments
Two Fedora Core 2 problems
two pi, four phase, 370 clone
Two subjects: 64-bit OS2/eCs, Innotek Products
Two subjects: 64-bit OS2/eCs, Innotek Products
Two subjects: 64-bit OS2/eCs, Innotek Products
Two subjects: 64-bit OS2/eCs, Innotek Products
Two-factor authentication with SSH?
Two-factor authentication with SSH?
Two-factor Authentication Options?
Two-factor Authentication Options?
UBL proceeds for e-commerce
UK: PKI "not working"
UltraSPARC-IIIi
Univac 9200, 9300: the 360 clone I never heard of!
Univac 9200, 9300: the 360 clone I never heard of!
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
unix
UNIX on LINUX on VM/ESA or z/VM
Unused address bits
updated merged (security) taxonomy & glossary
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of
US warns banks about virus
US warns banks about virus ... another ref:
US-CERT Technical Cyber Security Alert TA04-336A -- another buffer overflow
Usage of Hex Dump
Use cash machines as little as possible
Use of SSL as a VPN
Use of SSL as a VPN
Usenet invented 30 years ago by a Swede?
Usenet invented 30 years ago by a Swede?
Usenet invented 30 years ago by a Swede?
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using crypto against Phishing, Spoofing and Spamming
Using Old OS for Security
UT200 (CDC RJE) Software for TOPS-10?
UT200 (CDC RJE) Software for TOPS-10?
value of pi
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
vax6k.openecs.org rebirth
very basic quextions: public key encryption
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Vintage computers are better than modern crap !
Virtual Cleaning Cartridge
Virtual Machine Concept
Virtual Machines for Security
virtual machines for security
virtual machines for security
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
virtual-machine theory
virus attack on banks (was attack on paypal)
visa cards violated, BofA reissuing after hack attack
Visa, Philips team to promote 'contactless' credit card
vm
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
vm/370 smp support and shared segment protection hack
VMFPLC2 tape format
VMFPLC2 tape format
vnet 1000th node anniversary 6/10
VS: On-line signature standards
VS: On-line signature standards
VS: On-line signature standards (slight addenda)
VS: On-line signature standards
VS: On-line signature standards
VS: On-line signature standards
VSPC
Wanted: Weird Programming Language
Wanted: Weird Programming Language
Wanted: Weird Programming Language
War
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Wars against bad things
Was it ever thus?
Weird new IBM created word
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
were dumb terminals actually so dumb???
What 'NSA'?
what is the difference between ALU & FPU
What is Meet In The Middle Attack
What is the best strongest encryption
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is timesharing, anyway?
What is the truth?
What is the truth?
What makes a mainframe a mainframe?
What makes a mainframe a mainframe?
What makes a mainframe a mainframe?
What system Release do you use... OS390? z/os? I'm a Vendor S
What terminology reflects the "first" computer language?
what vector systems are really faster at
Whatever happened to 'University Computer Centers'?
Whatever happened to 'University Computer Centers'?
Whatever happened to 'University Computer Centers'?
Whatever happened to 'University Computer Centers'?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
Whatever happened to IBM's VM PC software?
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When nerds were nerds
When rsa vs dsa
When rsa vs dsa
When using SSL, are the GET arguments (QueryString in asp) also encrypted?
When/why did "programming" become "software development?"
When/why did "programming" become "software development?"
When/why did "programming" become "software development?"
When/why did "programming" become "software development?"
Where the Good Jobs are Going
where to find X9.26 document?
which CPU for educational purposes?
which CPU for educational purposes?
Which Editor
Which Editor
Which monitor for Fujitsu Micro 16s?
Which Monitor Would You Pick??????
Which Monitor Would You Pick??????
who invented the "popup"?
who invented the "popup"?
who invented the "popup"?
Who is the most likely to use PK?
Who said DAT?
Who said "The Mainframe is dead"?
who were the original fortran installations?
who were the original fortran installations?
who were the original fortran installations?
who were the original fortran installations?
Who's afraid of Mallory Wolf?
Who's afraid of Mallory Wolf? (addenda)
Who's afraid of Mallory Wolf?
Who's afraid of Mallory Wolf?
Who's afraid of Mallory Wolf?
Why A.I. Is Brain-Dead
why and how VeriSign, thawte became a trusted CA?
Why are there few viruses for UNIX/Linux systems?
Why are programs so large?
Why did they make FORTRAN so hard to parse?
Why did they make FORTRAN so hard to parse?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why did TCP become popular?
Why does Windows allow Worms?
why doesn't processor reordering instructions affect most
why doesn't processor reordering instructions affect most
why doesn't processor reordering instructions affect most
Why doesn't Infiniband supports RDMA multicast
Why more than 1 hole in FW for IPSec
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why only 24 bits on S/360?
Why we don't use homebrew crypto
Wild hardware idea
Will Apple ever offer a newsreader?
Will Apple ever offer a newsreader?
Will multicore CPUs have identical cores?
Will multicore CPUs have identical cores?
Will multicore CPUs have identical cores?
Will multicore CPUs have identical cores?
Will multicore CPUs have identical cores?
Will Prescott work on Win64?
will there every be another commerically signficant new ISA?
will there every be another commerically signficant new ISA?
will there every be another commerically signficant new ISA?
Window field in TCP header goes small
Wireless security
Worst case scenario?
wsmr-simtel20 shut down 10 years ago today
WYTM?
X.500, LDAP Considered harmful Was: OCSP/LDAP
x9.59
x9.99 financial PIA standard now available from ANSI e-store
x9.99 privacy impact assessemnt (PIA) standard
x9.99 privacy note
X9/03 LB#8 - Formation of a New Subcommittee - X9C
XACML Access Control Markup Language Ratified as OASIS Open Standard
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
Xah Lee's Unixism
XDS Sigma vs IBM 370 was Re: I/O Selectric on eBay: How to use?
XML Data Model
XML: The good, the bad, and the ugly
XML: The good, the bad, and the ugly
Xquery might have some things right
Yahoo releases internet standard draft for using DNS as public key server
Yahoo releases internet standard draft for using DNS as public key server
Yakaota
YKYBHTLW
Yodlee offers standard interface to smooth the electronic bill payment process
z VM 4.3
z/OS UNIX
ZeroWindow segment
|d|i|g|i|t|a|l| questions
|d|i|g|i|t|a|l| questions

back to top, network, mainframe, digsig, all - (2009- ) - (2007-2008) - (2005-2006) - (2003-2004) - (2001-2002) - (1993-2000)