From: Chris Hunter Area: Public Key Encryption To: Kristopher Yates 24 Jul 94 12:57:20 Subject: Re: !!PGPBWAVE!! On 22 Jul 94 23:20:03, Kristopher Yates spewed the following on All: KY> Please help. I am using PGP 2.3a and DOS 3.2. I'm looking for a working KY> pgp/bwave .bat file. I've received several from here with no luck. I use KY> SLED as my editor. ANY help would be great. Thanks. Are you talking about PGPBlue? It is quite easy to set up. If your not using it I suggest you try it out. Chris Blackhawk@Rochgte.fidonet.org 201434369420143436942014343694201434369420143436942014343694718 From: Jerry Boggs Area: Public Key Encryption To: Dave Munhollon 27 Jul 94 06:22:18 Subject: OS/2 version? Monday July 25 1994 13:49, Dave Munhollon wrote to All: DM> Hello All! DM> DM> Does anyone have an OS/2 version of PGP v2.6 available for Freq, or know DM> where I can locate one? I have the ui version for freq 23hrs a day. Use the magic name PGPOS2UI.\s Jerry Boggs 1024/F7983445 Key fingerprint = D1 A1 41 39 04 66 AA 2E 8D 88 C5 26 06 46 38 CB Fidonet-1:265/5456|SYN NET-151:703/14|PODSnet-93:9800/5|Contnet 83:7031/0 ALTNET-370:3530/0|Medieval Net-180:234/9|Mysticnet-101:508/0 ...Clinton's Cabinet: Family Values Advisor, Woody Allen. 201434369420143436942014343694201434369420143436942014343694718 From: Reed Darsey Area: Public Key Encryption To: All 28 Jul 94 05:32:00 Subject: 2.3a vs 2.6 keys Since our 2.3a key can be read into 2.6 and re-extracted to look like a 2.6 key, why do people revoke their 2.3a keys and start over? I know that the USA keyservers won't accept 2.3a keys, but if they look like 2.6 keys how will they know? Will they actually check the "version byte"? (I've seen messages suggesting that all the key revoking and reissuing is wasted effort.) 201434369420143436942014343694201434369420143436942014343694718 From: Jason Levine Area: Public Key Encryption To: Christopher Baker 27 Jul 94 03:48:00 Subject: Re: Re: CPD hatches into CB>JL> Intriguing...can I get on the mailing list? CB>sure. send direct Netmail with session and Tick passwords and which CB>areas you want. Um...okay. Netmail to whom? What are session/Tick passwords? What areas do they have? :-) *** OLX 2.1 TD Too many people confuse free speech with loose talk. 201434369420143436942014343694201434369420143436942014343694718 From: Jason Levine Area: Public Key Encryption To: Lee Dohm 27 Jul 94 03:51:00 Subject: On this subject... LD>Well, the kid got shocked, and he jumped, and fell into the hole. He LD>got trapped in the electrified fence and was unable to pull himself back LD>out. Because the system had a low amount of amps (or is it volts?) LD>running through it, it was several hours before the kid actually died... Ouch. Yeah, high voltage, low amps, DC power will usually hold a person in place while they fry. Not a pleasant way to go. LD>There was another story that happened here in Sacramento, where a guy LD>set up a shotgun to shoot anyone coming through the front door. An 8 LD>year old kid was running away from some thugs, and he pounded on the LD>door, screaming for help. The door fell open and blew the kid's head LD>off... Ended his problems, though... (Yes, I have a rather macabre sense of humor). I think this is enough to definitely prove why a deathtrap is ALWAYS going too far when it comes to protecting yourself or your property... *** OLX 2.1 TD Fine: A tax for doing wrong, Tax: A fine for doing well 201434369420143436942014343694201434369420143436942014343694718 From: Jerome Greene Area: Public Key Encryption To: Kristopher Yates 27 Jul 94 17:10:02 Subject: !!PGPBWAVE!! -----BEGIN PGP SIGNED MESSAGE----- - -=> Kristopher Yates wrote in a message to All<=- Hello Kristopher, KY> Please help. I am using PGP 2.3a and DOS 3.2. I'm looking KY> for a working pgp/bwave .bat file. I've received several KY> from here with no luck. I use SLED as my editor. ANY help KY> would be great. Thanks. Have you tried EZ-PGP ver 1.07? Works well with BW and install quite painlessly. Jerome ... 69% of those polled felt polls ask trivial questions. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjbbnXF52VfebiBFAQHs0QP/dC+jV6Bj778jE5yWK6nSUnpK03DjVbdP R/jz1qYAaeWXazFztunJmWgmcc7Z79A6dQdcPDBoE3KfJrQmUXviqS3qvymFPZuS HL0tWSgr2+vGHLIiRjZ9iRqdyhFX8URdmvWYMUuCMqjPoXCcHI0y61/xWwaM4Qg9 FH4SDA4T6G8= =NSqO -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Tim Bradley Area: Public Key Encryption To: Scott Mills 28 Jul 94 09:33:02 Subject: Amiga PGP Questions -> Try -sta +clearsig filename -> -> The +clearsig turns on the clearsigning. YES! It works! (Thanks *VERY* much!) -- Tim Bradley 201434369420143436942014343694201434369420143436942014343694718 From: Tim Bradley Area: Public Key Encryption To: Alan Pugh 28 Jul 94 09:33:02 Subject: Re: Amiga PGP Questions -> did you try using the '+clearsig=on' switch on the command line? No, I hadn't -- and it works! Thanks very much! -> i have a program called 'pgpshell' that seems to work pretty good for -> this type of thing. it is small and somewhat primitive, but since that -> is pretty much what i need, it suffices for me. Is this an Amiga program? Or perhaps a peecee program that includes source code so I can maybe port it? (I refuse to even TOUCH Mac Code :<) Later Daze! -- Tim Bradley 201434369420143436942014343694201434369420143436942014343694718 From: Tim Bradley Area: Public Key Encryption To: Christopher Baker 28 Jul 94 09:33:26 Subject: Re: Re: CPD hatches into its own File Area -> here is 1:374/14. send direct Netmail with session and Tick passwords -> and which areas you want linked. Hm, I guess this is my month to feel terribly ignorant -- how does one discover session and Tick passwords? (synchronicity strikes: My Sysop just mentioned Direct Netmail to me today as well -- and here all I'd heard of before were Crash and Routed netmail). For that matter, what ARE session & tick passwords, how much space & cash will linking the areas take, etc? It MAY not be relevent, since I know he got at least one of the E'zines in question (CUD, I think), so my sysop probably already has this down, but a} one of these days I want to go to pointhood, so I need to know anyway, and b} I've found sysops are MUCH more likely to do you favors if YOU do the "legwork" for them . TIA, and sorry to be such a pest ... Later Daze, -- Tim Bradley 201434369420143436942014343694201434369420143436942014343694718 From: Jack Kern Area: Public Key Encryption To: Kristopher Yates 25 Jul 94 21:39:00 Subject: !!Pgpbwave!! KY> Please help. I am using PGP 2.3a and DOS 3.2. I'm looking for a working KY> pgp/bwave .bat file. I've received several from here with no luck. I use KY> SLED as my editor. ANY help would be great. Thanks. Try this: EZ-PGP Version 1.00 by John Schofield Contents Introduction The Philosophy Behind EZ-PGP Contacting John Schofield My Lawyer Made Me Do It Installing EZ-PGP In BlueWave V2.12 Configuring EZ-PGP (Spell Checker) Configuring EZ-PGP (Advanced) Things to Come Introduction EZ-PGP is a simple, yet fully configurable shell program that integrates PGP with various off-line mail-readers. Features include: * Simple to use functions to: Sign Sign and encrypt ASCII armor Post Keys * Completely configurable--modify PGP command-lines to suit your needs. * Wipe utility is configurable--use PGP or your own program for complete security. * Error messages are in English (not nerdish). They don't just tell you what the problem is, they tell you how to fix it. * Designed from the beginning for off-line mail-readers. Does not include lots of bells and whistles you don't need, but includes everything you do. FYI. PS I use SLED also. Great program! Mon 25-Jul-94 21:39 // jack.kern@hillside.com // 1:221/804 --- * RoseReader 2.52* P004540 Entered at [HILLSIDE] 201434369420143436942014343694201434369420143436942014343694718 From: Bud Marks Area: Public Key Encryption To: All 27 Jul 94 23:20:00 Subject: PGP Shell for OS/2 ??? I'm looking for a good OS/2 shell for PGP. I love PGPSHELL, but it's DOS only (I can use it, but it wastes a lot of OS/2 features I'd like to have access to.) Help appreciated. 201434369420143436942014343694201434369420143436942014343694718 From: Rob Buckman Area: Public Key Encryption To: All 26 Jul 94 22:33:00 Subject: NIST -----BEGIN PGP SIGNED MESSAGE----- The NIST will buy rights to use key escrow technology in Clipper chip. By Kevin Power, Government Computer News Staff, July 18,1994. The avoid a court battle, the National Institute of Standards and Technology plans to buy the patent rights for the key escrowing procedures set in the Escrowed Encryption Standard. NIST said in a statement last week that it has reached a licensing agreement in principle with Silvio Micali, a scientist at the Massachusetts Institute of Technology, to satisfy his con cerns about potential patent infringement. A NIST spokesman declined to say how much NIST would pay Micali, saying that the details of the agreement were not final. Dealing with patent disputes is becoming second nature for the agency. NIST continues to hold discussions with Public Key Partners of Sunnyvale, Calif., which claims that the government's Digital Signature Standard will in fringe on its public-key encryption patents. The mandatory DSS, which Commerce Secretary Ron Brown approved in May, establishes an electronic signature standard for federal rulers. It takes effect Dec. 1. As for key escrow, NIST is using it in the voluntary Escrowed Encryption Standard, which is implemented in the Clipper chip for safeguarding telephone and low-speed data communications. The agreement will give government non-exclusive icenses to Micali's pat ented inventions for existing and future key escrow applications, NIST officials said. Micali developed the escrowing process to spilt a digital key into separate components, store the components with escrow agents and recombine them to decode encrypted communications. Under NIST's scheme, the two components of encryption keys are kept in databases managed by NIST and Treasury. Access is limited to law enforcement officials with court orders for wire tapping. Industry groups have fought the standard. A number of groups have asked that the administration repeal it and reopen discussion on a national cryptography policy. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjXVa0zOyumG9rYtAQGFRwP+PL5A37IId7GKsB9mrSlbEP/J8kqKGRQO bGBGcgZi+fcqjgI3Lo8ccIzdAO6pZWuFDJDgMEi8+9ypIHuORdpc6zGeTBjqDls0 TDJkEFAlejEChgN+03toD1fdkiUtVhz5nj+pUymGK1OXAyjeXjCAtjUq7ARcK/IP vTV+XvpPNcw= =D1lP -----END PGP SIGNATURE----- **EZ-PGP v1.07 ... I love animals...they taste great! 201434369420143436942014343694201434369420143436942014343694718 From: Rob Buckman Area: Public Key Encryption To: All 26 Jul 94 22:34:00 Subject: IRS, DSS and RSA Throwing in the towel, IRS will use 2 signature schemes. IRS digital signature scheme calls for both DSS and RSA verification. By Tim Minahan, Government Computer News, July 18, 1994 The Internal Revenue Service likely will use a mix of government mandated and industry-endorsed digital signature verification schemes to do business electronically. Although IRS is not expected to issue and official decision on electronic signatures until next year, Jerry Ormaner, manager of the technical development section of the service's Security and Communica tions Systems Project, said IRS is leaning toward using both the Digital Signature Standard and commercial software from RSA Data Security, Inc. "We already know which direction we feel we will be going in," Ormaner said. "We basically have decided that for internal government information we will be using DSS. But we are looking for non- government individuals and entities to use both RSA and DSS." DSS was adopted in May as a Federal Information Processing Standard. Effective Dec. 1, agencies needing to verify an on-line document's content and the legitimacy of electronic signatures must use DSS. The National Institute of Standards and Technology developed it using public-key encryption techniques. The programs developed by RSA of Redwood City, Calif., have become industry's de-facto standard for signature verification. RSA and a related company, Public Key Partners of Sunnyvale, Calif., have been threatening to sue companies that use DSS, claiming it infringes on their patents. Untapped potential. The proposed digital signature blend would be the linchpin for IRS' electronic filing plans. The agency hopes to receive 81 million tax returns electronically by 2001, but there still is a long way to go before the full potential of electronic filing is tapped, according to IRS officials. Of the approximately 200 million returns the service received this year, the IRS estimated that only 14.6 million were sent electronically. Also, the current electronic filing program requires tax[payers to follow-up their on-line transactions with paper documen tation and signatures. In March, IRS Chief Information Officer Henry Philcox, a member of the National Computer Systems Security and Privacy Advisory Board, said at a board meeting that IRS must decide on an electronic signature verification scheme soon to keep the Tax Systems Modernization effort moving forward [GCN, April 4, Page 1]. At that time, he hinted that the agency was looking closely at the use of RSA products. Central element IRS is one of several agencies working with NIST to develop pilot programs to test the Digital Signature Algorithm, the central element of DSS. The agency will participate in two pilots, testing both the DSS and RSA algorithms. Ormaner said the tests might begin as early as next month and will last about a year. In one pilot, a still-to-be-chosen external trading partner will transmit electronic data to one of IRS' 10 service centers using both RSA and DSS signature schemes. The other pilot will concentrate on data exchanges within IRS. Ormaner said the agency will secure one of its local area networks for the pilot using DSS for identification and authentication purposes. The program also will test the use of the Defense Department's Tessera card for encryption. On the market Ormaner said IRS will release a request for information by the end of August to learn more about electronic signatures products on the market. The agency will select a few products for testing, he said. But transforming the DSS-RSA signature scheme from theory into practice may not be easy. If IRS decides to move forward with its plans to use RSA or anything other than DSS, it probably will need a special waiver from the Commerce Department. "We may have to get a waiver," Ormaner said. "We have the same problem that other agencies have. RSA already is established in the industry, and we want to minimize the cost involved with doing business with our trading partners. We want to be as flexible as possible with our partners and accept their existing schemes." ... Take a bite out of crime. Just say, "NO!" to casinos in Florida! 201434369420143436942014343694201434369420143436942014343694718 From: Rob Buckman Area: Public Key Encryption To: All 26 Jul 94 22:39:00 Subject: Congressional eMail Addresses UNITED STATES HOUSE OF REPRESENTATIVES CONSTITUENT ELECTRONIC MAIL SYSTEM We welcome your inquiry to the House of Representatives Constituent Electronic Mail System. Currently, thirtyeight Members of the U.S. House of Representatives have been assigned public electronic mailboxes that may be accessed by their constituents. The nature and character of the incoming electronic mail has demonstrated that this capability will be an invaluable source of information on constituent opinion. We are now in the process of expanding the project to other Members of Congress, as technical, budgetary and staffing constraints allow. A number of House committees have also been assigned public electronic mailboxes. The names and electronic mailbox addresses of these committees are listed below after the information about participating Representatives. Please review the list of participating Representatives below, and if the Congressional District in which you reside is listed, follow the instructions below to begin communicating by electronic mail with your Representative. If your Representative is not yet on-line, please be patient. INSTRUCTIONS FOR CONSTITUENTS The list above includes the electronic mail addresses of members who are participating in the program. However, if your Representative is taking part in the project, we request that you send a letter or postcard by U.S. Mail to that Representative at the address listed above with your name and internet address, followed by your postal (geographical) address. The primary goal of this program is to allow Members to better serve their CONSTITUENTS, and this postal contact is the only sure method currently available of verifying that a user is a resident of a particular congressional district. In addition, constituents who communicate with their Representative by electronic mail should be aware that Members will sometimes respond to their messages by way of the U.S. Postal Service. This method of reply will help to ensure confidentiality, a concern that is of upmost importance to the House of Representatives. U.S. REPRESENTATIVES PARTICIPATING IN THE CONSTITUENT ELECTRONIC MAIL SYSTEM. Hon. Thomas E. Andrews 1st Congressional District, Maine Rm. 1530 Longworth House Office Building Washington, DC 20515 TANDREWS@HR.HOUSE.GOV Hon. Joe Barton 6th Congressional District, Texas Rm. 1514 Longworth House Office Building Washington, DC 20515 BARTON06@HR.HOUSE.GOV Hon. Sherwood Boehlert 23rd Congressional District, New York Rm. 1127 Longworth House Office Building Washington, DC 20515 BOEHLERT@HR.HOUSE.GOV Hon. Dave Camp 4th Congressional District, Michigan Rm. 137 Cannon House Office Building Washington, DC 20515 DAVECAMP@HR.HOUSE.GOV Hon. Maria Cantwell 1st Congressional District, Washington Rm. 1520 Longworth House Office Building Washington, DC 20515 CANTWELL@HR.HOUSE.GOV Hon. John Conyers, Jr. 14th Congressional District, Michigan Rm. 2426 Rayburn House Office Building Washington, DC 20515 JCONYERS@HR.HOUSE.GOV Hon. Sam Coppersmith 1st Congressional District, Arizona 1607 Longworth House Office Building Washington, DC 20515 SAMAZ01@HR.HOUSE.GOV Hon. Peter Deutsch 20th Congressional District, Florida Rm. 425 Cannon House Office Building Washington, DC 20515 PDEUTSCH@HR.HOUSE.GOV Hon. Jay Dickey 4th Congressional District, Arkansas Rm. 1338 Longworth House Office Building Washington, DC 20515 JDICKEY@HR.HOUSE.GOV Hon. Vernon Ehlers 3rd Congressional District, Michigan Rm. 1526 Longworth House Office Building Washington, DC 20515 CONGEHLR@HR.HOUSE.GOV Hon. Anna Eshoo 14th Congressional District, California Rm. 1505 Longworth House Office Building Washington, DC 20515 ANNAGRAM@HR.HOUSE.GOV Hon. Elizabeth Furse 1st Congressional District, Oregon Rm. 316 Cannon House Office Building Washington, DC 20515 FURSEOR1@HR.HOUSE.GOV Hon. Sam Gejdenson 2nd Congressional District, Connecticut Rm. 2416 Rayburn House Office Building Washington, DC 20515 BOZRAH@HR.HOUSE.GOV Hon. Newton Gingrich 6th Congressional District, Georgia Rm. 2428 Rayburn House Office Building Washington, DC 20515 GEORGIA6@HR.HOUSE.GOV Hon. Bob Goodlatte 6th Congressional District, Virginia Rm. 214 Cannon House Office Building Washington, DC 20515 TALK2BOB@HR.HOUSE.GOV Hon. Rod Grams 6th Congressional District, Minnesota Rm. 1713 Longworth House Office Building Washington, DC 20515 RODGRAMS@HR.HOUSE.GOV Hon. Dan Hamburg 1st Congressional District, California Rm. 114 Cannon House Office Building Washington, DC 20515 HAMBURG@HR.HOUSE.GOV Hon. Dennis Hastert 14th Congressional District, Illinois Rm. 2453 Rayburn House Office Building Washington, DC 20515 DHASTERT@HR.HOUSE.GOV Hon. Martin Hoke 2nd Congressional District, Ohio Rm. 212 Cannon House Office Building Washington, DC 20515 HOKEMAIL@HR.HOUSE.GOV Hon. Ernest J. Istook, Jr. 5th Congressional District, Oklahoma Rm. 1116 Longworth House Office Building Washington, DC 20515 ISTOOK@HR.HOUSE.GOV Hon. Sam Johnson 3rd Congressional District, Texas Rm. 1030 Longworth House Office Building Washington, DC 20515 SAMTX03@HR.HOUSE.GOV Hon. Mike Kreidler 9th Congressional District, Washington Rm. 1535 Longworth House Office Building Washington, DC 20515 KREIDLER@HR.HOUSE.GOV Hon. Thomas Manton 7th Congressional District, New York Rm. 203 Cannon House Office Building Washington, DC 20515 TMANTON@HR.HOUSE.GOV Hon. George Miller 7th Congressional District, California Rm. 2205 Rayburn House Office Building Washington, DC 20515 GEORGEM@HR.HOUSE.GOV Hon. Ed Pastor 2nd Congressional District, Arizona Rm. 408 Cannon House Office Building Washington, DC 20515 EDPASTOR@HR.HOUSE.GOV Hon. Earl Pomeroy North Dakota, At Large Rm. 318 Cannon House Office Building Washington, DC 20515 EPOMEROY@HR.HOUSE.GOV Hon. Jim Ramstad 3rd Congressional District, Minnesota Rm. 322 Cannon House Office Building Washington, DC 20515 MN03@HR.HOUSE.GOV Hon. Pat Roberts 1st Congressional District, Kansas Rm. 1126 Longworth House Office Building Washington, DC 20515 EMAILPAT@HR.HOUSE.GOV Hon. Charlie Rose 7th Congressional District, North Carolina Rm. 2230 Rayburn House Office Building Washington, DC 20515 CROSE@HR.HOUSE.GOV Hon. Christopher Shays 4th Congressional District, Connecticut Room 1034, Longworth House Office Building Washington, DC 20515 CSHAYS@HR.HOUSE.GOV Hon. Karen Shepherd 2nd Congressional District, Utah Rm. 414 Cannon House Office Building Washington, DC 20515 SHEPHERD@HR.HOUSE.GOV Hon. David Skaggs 2nd Congressional District, Colorado Rm. 1124 Longworth House Office Building Washington, DC 20515 SKAGGS@HR.HOUSE.GOV Hon. 'Pete' Stark 13th Congressional District, California Rm. 239 Cannon House Office Building Washington, DC 20515 PETEMAIL@HR.HOUSE.GOV Hon. Cliff Stearns 6th Congressional District, Florida Rm. 332 Cannon House Office Building Washington, DC 20515 CSTEARNS@HR.HOUSE.GOV Hon. Charles Taylor 11th Congressional District, North Carolina Rm. 516 Cannon House Office Building Washington, DC 20515 CHTAYLOR@HR.HOUSE.GOV Hon. Robert Walker 16th Congressional District, Pennsylvania Rm. 2369 Rayburn House Office Building Washington, DC 20515 PA16@HR.HOUSE.GOV Hon. Mel Watt 12th Congressional District, North Carolina Rm. 1232 Longworth House Office Building Washington, DC 20515 MELMAIL@HR.HOUSE.GOV Hon. Dick Zimmer 12th Congressional District, New Jersey Rm. 228 Cannon House Office Building Washington, DC 20515 DZIMMER@HR.HOUSE.GOV COMMITTEES OF THE U.S. HOUSE OF REPRESENTATIVES PARTICIPATING IN THE ELECTRONIC MAIL SYSTEM. Subcommittee on Labor-Management Relations Committee on Education and Labor Rm. 320 Cannon House Office Building Washington, DC 20515 SLABMGNT@HR.HOUSE.GOV Committee on Natural Resources 1324 Longworth House Office Building Washington, DC 20515 NATRES@HR.HOUSE.GOV Committee on Science, Space, and Technology 2320 Rayburn House Office Building Washington, DC 20515 HOUSESST@HR.HOUSE.GOV COMMENTS AND SUGGESTIONS You can send comments about our service to the Constituent Electronic Mail System Comment mailbox, at COMMENTS@HR.HOUSE.GOV We will make every effort to integrate suggestions into forthcoming updates of our system. Please note, that the intended purpose of this mailbox is to support public inquiry about the House Constituent Electronic Mail System. Messages intended for Members of Congress should be sent directly to the appropriate Member of Congress at their electronic mail or postal address. UPDATES AND ADDITIONAL INFORMATION From time to time, you may want to send another e-mail message to CONGRESS@HR.HOUSE.GOV to see the most recent version of the list of Members and Committees using Constituent Electronic Mail. The information is also available on the U.S. House of Representatives' Gopher server at GOPHER.HOUSE.GOV in the folder Congressional Information. To learn more about information available electronically from the House, send an e-mail message to HOUSEHLP@HR.HOUSE.GOV Thank you again for contacting the House of Representatives' Constituent Electronic Mail System. We are excited about the possibilities that e-mail has to offer, and will be working hard to bring more Members on-line and to expand our services. This message will be updated as necessary. Honorable Charlie Rose (D-NC) Chairman Committee on House Administration ... In politics, nothing happens by accident. 201434369420143436942014343694201434369420143436942014343694718 From: Ron Pritchett Area: Public Key Encryption To: All 26 Jul 94 12:40:30 Subject: New Files -----BEGIN PGP SIGNED MESSAGE----- I grabbed some more keys off the internet today. The keyserver I get these from uses PGP v2.6. Pretty Good Privacy Data Encryption Available: 14 files (4274 KB) Newest: 06250725.ZIP 7-26-94 (avail: 7-26-94) - --------------------------------------------------------------------- Filename Size Date Description - ------------ ----- --------- ---------------------------------------- 06250725.ZIP 209K 7-26-94* Keyring Update: 94/06/25 thru 94/07/25 INETKRNG.ZIP 1569K 6-25-94 Complete Internet Keyring as of 94/06/25 Available 23hrs/day @ 21.6 USR DS Speeds -----BEGIN PGP SIGNATURE----- Version: 2.6 iQBVAgUBLjU9Da5NX2w997N9AQF5RgH8C774qxItd325tNJQOqFijUqruUSLe65L 25Z1nYP1llKIE2WjQMU9G4jFzakz8VbRi5s81mS8ZNgSXrLQeAZk6w== =aqWA -----END PGP SIGNATURE----- Ron Pritchett - 512/3DF7B37D Team OS/2 FingerPrint = D6 29 03 7A 26 3E 98 42 E7 5E CB F2 D6 7B BE 79 201434369420143436942014343694201434369420143436942014343694718 From: Mike Laster Area: Public Key Encryption To: All 28 Jul 94 10:31:22 Subject: PGPBlue? Hello All: Is there an OS/2 version of PGP-Blue? Mike 201434369420143436942014343694201434369420143436942014343694718 From: forthcoming updates of our system. Area: Public Key Encryption To: We will make every effort t 29 Jul 94 15:00:54 Subject: House Constituent Electronic Mail System. Messages intended for Members of Congress should be sent directly to the appropriate Member of Congress at their electronic mail or postal address. UPDATES AND ADDITIONAL INFORMATION From time to time, you may want to send another e-mail message to CONGRESS@HR.HOUSE.GOV to see the most recent version of the list of Members and Committees using Constituent Electronic Mail. The information is also available on the U.S. House of Representatives' Gopher server at GOPHER.HOUSE.GOV in the folder Congressional Information. To learn more about information available electronically from the House, send an e-mail message to HOUSEHLP@HR.HOUSE.GOV Thank you again for contacting the House of Represenn 201434369420143436942014343694201434369420143436942014343694718 From: bring more Members on-line and to e Area: Public Key Encryption To: possibilities that e-mail has to of 29 Jul 94 15:01:04 Subject: This message will be updated as necessary. Honorable Charlie Rose (D-NC) Chairman Committee on House Administration ... In politics, nothing happens by accident. 201434369420143436942014343694201434369420143436942014343694718 From: Ryan Shaw Area: Public Key Encryption To: All 27 Jul 94 20:41:00 Subject: New to PGP -----BEGIN PGP SIGNED MESSAGE----- Hello! Just testing out my new configuration of PGP with timEd and QEdit. Looks like it worked. To make this message more on-topic. Since the recent "Steve Winter Episode" what does everyone think about making PGP signatures the norm in Fight-o-Net? Also, what is the view on the use of PGP signatures in Fight-o-Net echos? Thanks in advance for any answers to the universe. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjbGHC1KW281ijC9AQHZpQQApJVhr6aMv/kxQDDRLxdRgApWKVRUj5lv BTfgUYxGB/UPWoa0Gj90lE0qhzdNrcvTckIv58+19QZaJDUnrMwh9sIWr4aNDQaA rDcgp8pi4Sj+fvvjK6k8zaw7GyjVFI2jg3r2+r2OEw98g6lmn8/BQfxJW6F/Pjy9 XUILn9WuAhM= =uNxe -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Ryan Shaw Area: Public Key Encryption To: Christopher Baker 27 Jul 94 20:42:00 Subject: Re: My public key Christopher Baker spewed forth the following text to Robert Dixon: CB> please put your keys in the PKEY_DROP Echo. Would that echo be available via the Fight-o-Net backbone and/or Planet Connect? 201434369420143436942014343694201434369420143436942014343694718 From: Wes Perkhiser Area: Public Key Encryption To: Bud Marks 29 Jul 94 20:18:34 Subject: PGP Shell for OS/2 ??? In a message of , Bud Marks (1:280/323@fidonet.org) writes: BM>I'm looking for a good OS/2 shell for PGP. I love PGPSHELL, but I don't know about OS/2, but there is a Windows shell available by the name of PGP WinFront (file name is pwf???.zip, or whatever format it will be saved in on the computer you are getting it from.) It works pretty well, and since OS/2 can run Windoze programs, it may work on your machine. I think this program was hatched into the SDN distribution, so I'm sure someone close to you will have it. Wes P.S. Now, if I could just find a decent Windows version of a *.msg reader... 201434369420143436942014343694201434369420143436942014343694718 From: Jess Williams Area: Public Key Encryption To: All 27 Jul 94 15:56:00 Subject: PGP VOICE Hello All, Whatever happened to that PGP Voice Idea? I heard that Phil wanted to work on a project that would turn your ordinary telephone into a secure telephone. I think you would need some hardware. An AD converter and a DA converter and some way for the software to do the encryption It could all be sent over the Modem. I know for a fact that it can be done as slow as 9600 bps with intelligible voice. Any Comments? Jess Williams jess.williams@hol.com ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Tim Bradley 29 Jul 94 13:25:30 Subject: Re: Re: Re: CPD hatches into its own File Area -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 28 Jul 94, Tim Bradley was quoted as saying: TB> Hm, I guess this is my month to feel terribly ignorant -- how TB> does one discover session and Tick passwords? (synchronicity one makes them up randomly. TB> My Sysop just mentioned Direct Netmail to me today as well -- and ah. if you are not the Sysop then you cannot establish session and Tick passwords for the file distribution. your Sysop may do so but you'll have to convince him/her first. [grin] TB> what ARE session & tick passwords, how much space & cash will a session password is a password that prevents unauthorized sending or receiving between two systems that have a mutual password set. anyone who attempted to call as either passworded system without the proper password would be rejected by either system as bogus. a Tick password is a password contained in the file distribution description file that makes sure any files you receive came from the source you have the password with. TB> favors if YOU do the "legwork" for them . TIA, and sorry to be TB> such a pest ... no problem. you can log on and download them from here if you wish. 407-383-1372. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLjk7fcsQPBL4miT5AQGtRQP+PMHmRJ1Wbdd6OX3T9WYl2IscvHCjQUPw yfMtY8mEIkOLIolS1wSYAe756XS53GKviJ7YnSt9RU0W+TyFqdjK8cgoF6acwrNN fFVriMb6o2WgEKGBXPr04Bt5Br+hJPbemCJiQE78fiDdpAVX5/YM6cfaXWI1a/P/ tyxYHfxCxWI= =lfvI -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Jason Levine 29 Jul 94 13:26:44 Subject: Re: Re: Re: CPD hatches into -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 27 Jul 94, Jason Levine was quoted as saying: JL> Um...okay. Netmail to whom? What are session/Tick passwords? What JL> areas do they have? :-) see previous to Tim Bradley. if you're not a Sysop, you can't use this info. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLjk7yMsQPBL4miT5AQH2/gQArY2AjekbpK/WF8lSs8eCqhjD4vg8DUU9 8BlqfsWipKDEZkIIluKQpNDtpu4JGwSk/VbmIT08ahD9oV5ax5pJ3MEoMYTSKK7G KQHuhzPJJZagJI1MtZLiHIq3CqMDkXEGwp0fg+6xI82sQT25aBQP+M8+bd5T0rh+ OYAed+l6smU= =RE38 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Mike Laster 29 Jul 94 15:37:18 Subject: Re: PGPBlue? -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 28 Jul 94, Mike Laster was quoted as saying: ML> Is there an OS/2 version of PGP-Blue? yes. PGPBLOS2.ZIP is version 2.5 here and at the author. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLjlaY8sQPBL4miT5AQE+fgQAnxIQ1qmfjucjQa0EusWp3uYFulh2AIoO rOkjnznklvWRk9MUJocM3i9X54zetar05e4ClqSDnmQZbKfTzDvmHIE5WPBpfEjT 8q0xEZwgeCFN84RX3aqs0/x86jJIG0d1do5jG0n5JzxDUK59w5XuePniioq8Gpse x3HPAzguIz8= =Vhm0 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: LEE DOHM Area: Public Key Encryption To: SCOTT MILLER 25 Jul 94 02:14:00 Subject: net 124 securenet hub? -----BEGIN PGP SIGNED MESSAGE----- SCOTT MILLER once spoke rather vociferously about net 124 securenet hub?...thusly... SM> If I am not mistaken, if he is a net hub, then it would be just SMH, as my SM> node is. Technically, a SecureMail Net hub is supposed to fly the NSMH, or UNSMH, flag if they can get their local coordinators to put it in for them. A SecureMail Net hub agrees to forward (hopefully) and receive mail for their entire net. An SMH, a SecureMail participating node, doesn't agree to do that. Lee Dohm N203 SMH -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjMf99Q0j9nv98BJAQGBXwP/RmcepaRcWuu3bwBI6684TwxO3VU9F4xN XZxOPhovLfIu327AHsfdPPjcDuaqHHhR5yegvJTFuRO6uaJcyiwZYoqolCkiKyUw UgT4aKrhtKCtDiaUXYwgJiAQSGRzSkC4aSXhL+VK2pVhncpErye7tPdQd6Kefcbk vC9MQKP7Z90= =QfJO -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: LEE DOHM Area: Public Key Encryption To: SHAWN MCMAHON 25 Jul 94 02:17:00 Subject: net 124 securenet hub? -----BEGIN PGP SIGNED MESSAGE----- SHAWN MCMAHON once spoke rather vociferously about net 124 securenet hub?...thusly... SM> Well, he ought to. I'll be interested to hear why he doesn't. Dollars to SM> donuts it has to do with other discussions going on regarding nodelist flag SM> in this region. Well, just in case you're interested in hearing why I don't fly it, it's because of apathy on the part of my uplinks... My first hub had little time to maintain his BBS, and if it couldn't be handled automatically, it normally wouldn't be handled. I have a new uplink now, and we'll see how he does... Lee Dohm N203 SMH -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLjMgw9Q0j9nv98BJAQHs1wP+ITfjAmAzfJZpHEOLwORSy4SnjSXzalJq 7v1LWoXyGOYoNavdJ7HwoUP1gglnXbjYKLXbcuzmjyvWKEnvh+ZXltsD4QxSzgCl ztkYlWKt8DTgtsj+lhjgOO+fDESgMNrv62qmUO5PQ16zk3r9WC9V7NIl+tBCZIci PfRVTcYqn8w= =iO6I -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: LEE DOHM Area: Public Key Encryption To: NOLAN LEE 28 Jul 94 21:47:12 Subject: On this subject... -> LD> unable to pull himself back out. Because the system had a -> LD> low amount of amps (or is it volts?) running through it, it -> LD> was several hours before the kid actually died... -> -> Hopefully, the thief was able to think long and -> hard about his wrongful ways before he died. :-) Well, whether or not the kid thought about anything other than a way to possibly get himself out of there, the guy who set the trap has had a couple years already to think about *his* wrongful ways... :) It could've just as easily been a fireman that got injured or even killed because of the merchant's trap. That's the thing, you don't know *who* it's going to kill. It could be a criminal, or it could be a total innocent, or even an 8 year old kid. Lee Dohm 201434369420143436942014343694201434369420143436942014343694718