I'm not trolling/spamming -- I really need assistance. Please.

  • Thread starter Thread starter GreenXenon
  • Start date Start date
G

GreenXenon

Hi:

My super-secure dream netbook has following characteristics:

1. All IDs -- such as the MAC addresses [including that of the
wireless adapter] -- are totally dynamic. When the netbook is offed,
these IDs disappear without leaving a trace. When the netbook is
switched on, new IDs are generated. In addition, this netbook uses the
least amount of IDs and timestamps required to operate itself and
access the internet.

2. The only ROM is mask-programmed ROM

3. The only RAM is a hypothetical form of volatile RAM chips in which
all info is completely lost in 100th-of-a-second-or-less after the
netbook is turned-off. Even theoretically there is no way to recover
this data unless one completely re-powers before 100th-of-a-second
after power-off.

4. The OS is installed on ROM chips

5. Chips of the hypothetical RAM listed in #3 substitute for the HDD

6. The radio transmission [used for the wireless internet access] is
unidirectional and can beam the radio signal toward the wi-fi access
point without transmitting in any other direction. This maximum
strength of this transmission is the maximum allowed by law.

7. The clock skew of my system varies such that clock-skew-
fingerprinting would be a totally-useless technique to those trying to
identify my computer.

8. All parts of the netbook -- excluding the radio transmitter,
receiver, and antennas -- are tempest-shielded.

9. There is no malware [e.g. rootkits] installed in any of the ROM
chips.

10. These wireless internet access is enhanced using ADF so that it is
easier to locate access points and receive clearer signals from them.

11. The 802.11 nickname is dynamic so that my level of anonymity
increases

Quote from http://billstclair.com/matrix/ar01s03.html :

"The 802.11 Nickname field is a little-known feature of the wireless
spec that sends your hostname to the AP. This is obviously bad."

12. The radio reception is the most sensitive that is physically-
possible for a given size of a receiver, it's antenna, and other
relevant devices.

13. There is absolutely no hint of:
A. ActiveX
B. Internet Explorer
C. Java
D. JavaScript
E. Audio software/hardware
F. Software/hardware for images, graphics, animation, or movies
G. Webcam capability
H. Flash
J. Shockwave
I. HTML
K. DHTML
L. Any type of scripting/scripts
M. Any type of mark-up/modeling language.

IOW, this netbook is for word processing only and for
telecommunicating -- through text only -- via the internet. The only
media in this netbook is text. The word processor is similar to Office
XP, except it is word-only.

14. Automatically latches onto wireless internet access points that
are password-free while completely-ignoring the APs that require
passwords for access. This is for the sake of convenience and
anonymity.

15. The browser [which is built into a ROM chip] is text-only and
designed to allow me to communicate to the rest of the cyberworld via
chat rooms that are fully-compatible with the list A to M on #13

16. The wireless adapter is fully-compatible with all the modulations,
standards, channels, protocols, and other specs associated with
wireless internet access.

17. The chat software [which is built into a ROM chip] is fully
compatible with everything in #13. In addition, this chat protocol has
the following characteristics:
A. Does not have any IM/PM capability [when I post my message, I want
everyone in the chat room to see it. In addition, I just hate it when
other chatters PM/IM me.]
B. Is real-time - i.e. I post my message and those in the room can
immediately reply to me.
C. Transmits/receives small amounts of text rapidly - unlike Usenet
which transmits/receives large amounts of text slowly.
D. Uses the least amount of bandwidth, memory, and CPU power.
E. Does not require that I have an email address
F. Does not allow long messages that take up the whole screen.
G. Allows me to copy and paste text into the chat room
H. Others in the chat room can see the text I post even if it is
copied and pasted from somewhere else

What would be the most cost-efficient manner for me to get this
netbook? How much would the cost be?

Now you folks might ask why I want this netbook.

The answer can be found in the following thread:
http://groups.google.com/group/sci.electronics.design/browse_frm/thread/234474c056a79315?hl=en#

Also, for even more information, see the following threads:

http://groups.google.com/group/sci....f0e224ba6f/e2429079a3b6893b?#e2429079a3b6893b

http://groups.google.com/group/sci....028799a045/631b0f8a6dfc3834?#631b0f8a6dfc3834


Thanks,

Green Xenon
 
Stan said:
Dude -- you are a freak.

Go get yourself a ****ing Etch-a-Sketch
{ Wait that may be too techie for him... }

Sidewalk chalk. You know, the really *fat* sticks.
I think it even comes in GREEN!!
 
GreenXenon said:
Hi:

My super-secure dream netbook has following characteristics:

1. All IDs -- such as the MAC addresses [including that of the
wireless adapter] -- are totally dynamic. When the netbook is offed,
these IDs disappear without leaving a trace. When the netbook is
switched on, new IDs are generated. In addition, this netbook uses the
least amount of IDs and timestamps required to operate itself and
access the internet.

2. The only ROM is mask-programmed ROM

3. The only RAM is a hypothetical form of volatile RAM chips in which
all info is completely lost in 100th-of-a-second-or-less after the
netbook is turned-off. Even theoretically there is no way to recover
this data unless one completely re-powers before 100th-of-a-second
after power-off.

4. The OS is installed on ROM chips

5. Chips of the hypothetical RAM listed in #3 substitute for the HDD

6. The radio transmission [used for the wireless internet access] is
unidirectional and can beam the radio signal toward the wi-fi access
point without transmitting in any other direction. This maximum
strength of this transmission is the maximum allowed by law.

7. The clock skew of my system varies such that clock-skew-
fingerprinting would be a totally-useless technique to those trying to
identify my computer.

8. All parts of the netbook -- excluding the radio transmitter,
receiver, and antennas -- are tempest-shielded.

9. There is no malware [e.g. rootkits] installed in any of the ROM
chips.

10. These wireless internet access is enhanced using ADF so that it is
easier to locate access points and receive clearer signals from them.

11. The 802.11 nickname is dynamic so that my level of anonymity
increases

Quote from http://billstclair.com/matrix/ar01s03.html :

"The 802.11 Nickname field is a little-known feature of the wireless
spec that sends your hostname to the AP. This is obviously bad."

12. The radio reception is the most sensitive that is physically-
possible for a given size of a receiver, it's antenna, and other
relevant devices.

13. There is absolutely no hint of:
A. ActiveX
B. Internet Explorer
C. Java
D. JavaScript
E. Audio software/hardware
F. Software/hardware for images, graphics, animation, or movies
G. Webcam capability
H. Flash
J. Shockwave
I. HTML
K. DHTML
L. Any type of scripting/scripts
M. Any type of mark-up/modeling language.

IOW, this netbook is for word processing only and for
telecommunicating -- through text only -- via the internet. The only
media in this netbook is text. The word processor is similar to Office
XP, except it is word-only.

14. Automatically latches onto wireless internet access points that
are password-free while completely-ignoring the APs that require
passwords for access. This is for the sake of convenience and
anonymity.

15. The browser [which is built into a ROM chip] is text-only and
designed to allow me to communicate to the rest of the cyberworld via
chat rooms that are fully-compatible with the list A to M on #13

16. The wireless adapter is fully-compatible with all the modulations,
standards, channels, protocols, and other specs associated with
wireless internet access.

17. The chat software [which is built into a ROM chip] is fully
compatible with everything in #13. In addition, this chat protocol has
the following characteristics:
A. Does not have any IM/PM capability [when I post my message, I want
everyone in the chat room to see it. In addition, I just hate it when
other chatters PM/IM me.]
B. Is real-time - i.e. I post my message and those in the room can
immediately reply to me.
C. Transmits/receives small amounts of text rapidly - unlike Usenet
which transmits/receives large amounts of text slowly.
D. Uses the least amount of bandwidth, memory, and CPU power.
E. Does not require that I have an email address
F. Does not allow long messages that take up the whole screen.
G. Allows me to copy and paste text into the chat room
H. Others in the chat room can see the text I post even if it is
copied and pasted from somewhere else

What would be the most cost-efficient manner for me to get this
netbook? How much would the cost be?

Now you folks might ask why I want this netbook.

The answer can be found in the following thread:
http://groups.google.com/group/sci.electronics.design/browse_frm/thread/234474c056a79315?hl=en#

Also, for even more information, see the following threads:

http://groups.google.com/group/sci....f0e224ba6f/e2429079a3b6893b?#e2429079a3b6893b

http://groups.google.com/group/sci....028799a045/631b0f8a6dfc3834?#631b0f8a6dfc3834


Thanks,

Green Xenon

Sorry, I don't know WHAT you're talking about.

He wants a way to look at child pornography in safety.

Sylvia.
 
Meanwhile, at the alt.internet.wireless Job Justification Hearings,
GreenXenon chose the tried and tested strategy of:
Hi:

My super-secure dream netbook has following characteristics:

<snip>

This might fulfill some of the requirements: http://dee.su/liberte
However I think you're on your own when it comes to the hardware.
 
Sylvia said:
Hi:

My super-secure dream netbook has following characteristics:

1. All IDs -- such as the MAC addresses [including that of the
wireless adapter] -- are totally dynamic. When the netbook is offed,
these IDs disappear without leaving a trace. When the netbook is
switched on, new IDs are generated. In addition, this netbook uses the
least amount of IDs and timestamps required to operate itself and
access the internet.

2. The only ROM is mask-programmed ROM

3. The only RAM is a hypothetical form of volatile RAM chips in which
all info is completely lost in 100th-of-a-second-or-less after the
netbook is turned-off. Even theoretically there is no way to recover
this data unless one completely re-powers before 100th-of-a-second
after power-off.

4. The OS is installed on ROM chips

5. Chips of the hypothetical RAM listed in #3 substitute for the HDD

6. The radio transmission [used for the wireless internet access] is
unidirectional and can beam the radio signal toward the wi-fi access
point without transmitting in any other direction. This maximum
strength of this transmission is the maximum allowed by law.

7. The clock skew of my system varies such that clock-skew-
fingerprinting would be a totally-useless technique to those trying to
identify my computer.

8. All parts of the netbook -- excluding the radio transmitter,
receiver, and antennas -- are tempest-shielded.

9. There is no malware [e.g. rootkits] installed in any of the ROM
chips.

10. These wireless internet access is enhanced using ADF so that it is
easier to locate access points and receive clearer signals from them.

11. The 802.11 nickname is dynamic so that my level of anonymity
increases

Quote from http://billstclair.com/matrix/ar01s03.html :

"The 802.11 Nickname field is a little-known feature of the wireless
spec that sends your hostname to the AP. This is obviously bad."

12. The radio reception is the most sensitive that is physically-
possible for a given size of a receiver, it's antenna, and other
relevant devices.

13. There is absolutely no hint of:
A. ActiveX
B. Internet Explorer
C. Java
D. JavaScript
E. Audio software/hardware
F. Software/hardware for images, graphics, animation, or movies
G. Webcam capability
H. Flash
J. Shockwave
I. HTML
K. DHTML
L. Any type of scripting/scripts
M. Any type of mark-up/modeling language.

IOW, this netbook is for word processing only and for
telecommunicating -- through text only -- via the internet. The only
media in this netbook is text. The word processor is similar to Office
XP, except it is word-only.

14. Automatically latches onto wireless internet access points that
are password-free while completely-ignoring the APs that require
passwords for access. This is for the sake of convenience and
anonymity.

15. The browser [which is built into a ROM chip] is text-only and
designed to allow me to communicate to the rest of the cyberworld via
chat rooms that are fully-compatible with the list A to M on #13

16. The wireless adapter is fully-compatible with all the modulations,
standards, channels, protocols, and other specs associated with
wireless internet access.

17. The chat software [which is built into a ROM chip] is fully
compatible with everything in #13. In addition, this chat protocol has
the following characteristics:
A. Does not have any IM/PM capability [when I post my message, I want
everyone in the chat room to see it. In addition, I just hate it when
other chatters PM/IM me.]
B. Is real-time - i.e. I post my message and those in the room can
immediately reply to me.
C. Transmits/receives small amounts of text rapidly - unlike Usenet
which transmits/receives large amounts of text slowly.
D. Uses the least amount of bandwidth, memory, and CPU power.
E. Does not require that I have an email address
F. Does not allow long messages that take up the whole screen.
G. Allows me to copy and paste text into the chat room
H. Others in the chat room can see the text I post even if it is
copied and pasted from somewhere else

What would be the most cost-efficient manner for me to get this
netbook? How much would the cost be?

Now you folks might ask why I want this netbook.

The answer can be found in the following thread:
http://groups.google.com/group/sci.electronics.design/browse_frm/thread/234474c056a79315?hl=en#


Also, for even more information, see the following threads:

http://groups.google.com/group/sci....f0e224ba6f/e2429079a3b6893b?#e2429079a3b6893b


http://groups.google.com/group/sci....028799a045/631b0f8a6dfc3834?#631b0f8a6dfc3834



Thanks,

Green Xenon

Sorry, I don't know WHAT you're talking about.

He wants a way to look at child pornography in safety.

Sylvia.
Pornography in text..1D or 2D?
1D might be like using - and o ... where an adult - would be the _ and
the adult o would be the O.
Gives me the hot flashes...

In Australia, which is where I'm posting from (I have no idea about the
OP's location), a mere textual description of a sexual act involving a
child can constitute child pornography, and earn the creator or
possessor some time in the slammer.

Sylvia.
 
Pornography in text..1D or 2D?
1D might be like using - and o ... where an adult - would be the _
and the adult o would be the O.
Gives me the hot flashes...

You idiots that continually full quote the retard's entire post are
almost as bad as he is. DOH!
 
You idiots that continually full quote the retard's entire post are
almost as bad as he is. DOH!

Why? What harm is done? No one forces you to read it, and unless you
open the posting, the data content is not sent to you (assuming you're
using a moderately sensible reader).

Oh, and I've quoted the entirety of your posting.

Sylvia.
 
Why? What harm is done?


You are obviously as clueless about Usenet as you are about other
things, and you are obviously going to forgo the years established
convention as well, because of your stubborn "what harm does it do"
attitude. You are just like the Senator that thinks it is OK to break
laws because he is a Senator.

You think it is OK, because YOU reasoned it to be free of harm.

What it really indicates is that YOU interloped yourself into this
forum without ANY investigation as to its conventions for posting or
anything else that would indicate a modicum of civility.

You are one of those brainless clickety-click twits that hops around
making responses, not even knowing what the base level forum is that you
are in.

That is what WE get for allowing this Usenet forum to be accessed from
the web, where complete idiots like you can lolly gag around doing
whatever the **** you want, and then declaring "what is the harm".

You are WORSE than the pants on the ground gang boy retard mentality
younger generations out there. You are likely one of them for that
matter. Although the school marm in you crawls out occasionally, so you
are probably more likely an old hag.

Well, hag... learn about Usenet, and then learn about its posting
conventions, and THEN come back and post.

Do NOT simply interlope (YES THAT IS WHAT YOU ARE DOING) you way into a
group within a forum that you obviously know nothing about, and slop,
plop and flop your way around like a loose whore in a speak easy.

You do not manipulate the forum conventions, you FOLLOW them, or people
like me come out of the woodwork to tell you that it is YOU that is
****ing it all up.

NOT me, you dippy bitch.

The postings in this forum are NOT for "messages to someone", idiot.
 
TheQuickBrownFox said:
You are obviously as clueless about Usenet as you are about other
things, and you are obviously going to forgo the years established
convention as well, because of your stubborn "what harm does it do"
attitude. You are just like the Senator that thinks it is OK to break
laws because he is a Senator.

You think it is OK, because YOU reasoned it to be free of harm.

What it really indicates is that YOU interloped yourself into this
forum without ANY investigation as to its conventions for posting or
anything else that would indicate a modicum of civility.

You are one of those brainless clickety-click twits that hops around
making responses, not even knowing what the base level forum is that you
are in.

That is what WE get for allowing this Usenet forum to be accessed from
the web, where complete idiots like you can lolly gag around doing
whatever the **** you want, and then declaring "what is the harm".

You are WORSE than the pants on the ground gang boy retard mentality
younger generations out there. You are likely one of them for that
matter. Although the school marm in you crawls out occasionally, so you
are probably more likely an old hag.

Well, hag... learn about Usenet, and then learn about its posting
conventions, and THEN come back and post.

Do NOT simply interlope (YES THAT IS WHAT YOU ARE DOING) you way into a
group within a forum that you obviously know nothing about, and slop,
plop and flop your way around like a loose whore in a speak easy.

You do not manipulate the forum conventions, you FOLLOW them, or people
like me come out of the woodwork to tell you that it is YOU that is
****ing it all up.

NOT me, you dippy bitch.

The postings in this forum are NOT for "messages to someone", idiot.

Me too.
 
Sylvia said:
On 4/12/2010 4:20 PM, WeReo_BoY wrote:

Hi:
My super-secure dream netbook has following characteristics:
1. All IDs -- such as the MAC addresses [including that of the
wireless adapter] -- are totally dynamic. When the netbook is offed,
these IDs disappear without leaving a trace. When the netbook is
switched on, new IDs are generated. In addition, this netbook uses the
least amount of IDs and timestamps required to operate itself and
access the internet.
2. The only ROM is mask-programmed ROM
3. The only RAM is a hypothetical form of volatile RAM chips in which
all info is completely lost in 100th-of-a-second-or-less after the
netbook is turned-off. Even theoretically there is no way to recover
this data unless one completely re-powers before 100th-of-a-second
after power-off.
4. The OS is installed on ROM chips
5. Chips of the hypothetical RAM listed in #3 substitute for the HDD
6. The radio transmission [used for the wireless internet access] is
unidirectional and can beam the radio signal toward the wi-fi access
point without transmitting in any other direction. This maximum
strength of this transmission is the maximum allowed by law.
7. The clock skew of my system varies such that clock-skew-
fingerprinting would be a totally-useless technique to those trying to
identify my computer.
8. All parts of the netbook -- excluding the radio transmitter,
receiver, and antennas -- are tempest-shielded.
9. There is no malware [e.g. rootkits] installed in any of the ROM
chips.
10. These wireless internet access is enhanced using ADF so that it is
easier to locate access points and receive clearer signals from them..
11. The 802.11 nickname is dynamic so that my level of anonymity
increases
Quote fromhttp://billstclair.com/matrix/ar01s03.html:
"The 802.11 Nickname field is a little-known feature of the wireless
spec that sends your hostname to the AP. This is obviously bad."
12. The radio reception is the most sensitive that is physically-
possible for a given size of a receiver, it's antenna, and other
relevant devices.
13. There is absolutely no hint of:
A. ActiveX
B. Internet Explorer
C. Java
D. JavaScript
E. Audio software/hardware
F. Software/hardware for images, graphics, animation, or movies
G. Webcam capability
H. Flash
J. Shockwave
I. HTML
K. DHTML
L. Any type of scripting/scripts
M. Any type of mark-up/modeling language.
IOW, this netbook is for word processing only and for
telecommunicating -- through text only -- via the internet. The only
media in this netbook is text. The word processor is similar to Office
XP, except it is word-only.
14. Automatically latches onto wireless internet access points that
are password-free while completely-ignoring the APs that require
passwords for access. This is for the sake of convenience and
anonymity.
15. The browser [which is built into a ROM chip] is text-only and
designed to allow me to communicate to the rest of the cyberworld via
chat rooms that are fully-compatible with the list A to M on #13
16. The wireless adapter is fully-compatible with all the modulations,
standards, channels, protocols, and other specs associated with
wireless internet access.
17. The chat software [which is built into a ROM chip] is fully
compatible with everything in #13. In addition, this chat protocol has
the following characteristics:
A. Does not have any IM/PM capability [when I post my message, I want
everyone in the chat room to see it. In addition, I just hate it when
other chatters PM/IM me.]
B. Is real-time - i.e. I post my message and those in the room can
immediately reply to me.
C. Transmits/receives small amounts of text rapidly - unlike Usenet
which transmits/receives large amounts of text slowly.
D. Uses the least amount of bandwidth, memory, and CPU power.
E. Does not require that I have an email address
F. Does not allow long messages that take up the whole screen.
G. Allows me to copy and paste text into the chat room
H. Others in the chat room can see the text I post even if it is
copied and pasted from somewhere else
What would be the most cost-efficient manner for me to get this
netbook? How much would the cost be?
Now you folks might ask why I want this netbook.
The answer can be found in the following thread:
http://groups.google.com/group/sci.electronics.design/browse_frm/thre....
Also, for even more information, see the following threads:
http://groups.google.com/group/sci.electronics.design/browse_frm/thre....
http://groups.google.com/group/sci.electronics.design/browse_frm/thre....
Thanks,
Green Xenon
Sorry, I don't know WHAT you're talking about.
He wants a way to look at child pornography in safety.
Sylvia.
Pornography in text..1D or 2D?
1D might be like using - and o ... where an adult - would be the _ and
the adult o would be the O.
Gives me the hot flashes...

In Australia, which is where I'm posting from (I have no idea about the
OP's location), a mere textual description of a sexual act involving a
child can constitute child pornography, and earn the creator or
possessor some time in the slammer.

Sylvia.

---> O

Does that qualify as porn?

If
 
On 4/12/2010 9:09 PM, Robert Baer wrote:
Sylvia Else wrote:
On 4/12/2010 4:20 PM, WeReo_BoY wrote:

Hi:
My super-secure dream netbook has following characteristics:
1. All IDs -- such as the MAC addresses [including that of the
wireless adapter] -- are totally dynamic. When the netbook is offed,
these IDs disappear without leaving a trace. When the netbook is
switched on, new IDs are generated. In addition, this netbook usesthe
least amount of IDs and timestamps required to operate itself and
access the internet.
2. The only ROM is mask-programmed ROM
3. The only RAM is a hypothetical form of volatile RAM chips in which
all info is completely lost in 100th-of-a-second-or-less after the
netbook is turned-off. Even theoretically there is no way to recover
this data unless one completely re-powers before 100th-of-a-second
after power-off.
4. The OS is installed on ROM chips
5. Chips of the hypothetical RAM listed in #3 substitute for the HDD
6. The radio transmission [used for the wireless internet access] is
unidirectional and can beam the radio signal toward the wi-fi access
point without transmitting in any other direction. This maximum
strength of this transmission is the maximum allowed by law.
7. The clock skew of my system varies such that clock-skew-
fingerprinting would be a totally-useless technique to those trying to
identify my computer.
8. All parts of the netbook -- excluding the radio transmitter,
receiver, and antennas -- are tempest-shielded.
9. There is no malware [e.g. rootkits] installed in any of the ROM
chips.
10. These wireless internet access is enhanced using ADF so that it is
easier to locate access points and receive clearer signals from them.
11. The 802.11 nickname is dynamic so that my level of anonymity
increases
Quote fromhttp://billstclair.com/matrix/ar01s03.html:
"The 802.11 Nickname field is a little-known feature of the wireless
spec that sends your hostname to the AP. This is obviously bad."
12. The radio reception is the most sensitive that is physically-
possible for a given size of a receiver, it's antenna, and other
relevant devices.
13. There is absolutely no hint of:
A. ActiveX
B. Internet Explorer
C. Java
D. JavaScript
E. Audio software/hardware
F. Software/hardware for images, graphics, animation, or movies
G. Webcam capability
H. Flash
J. Shockwave
I. HTML
K. DHTML
L. Any type of scripting/scripts
M. Any type of mark-up/modeling language.
IOW, this netbook is for word processing only and for
telecommunicating -- through text only -- via the internet. The only
media in this netbook is text. The word processor is similar to Office
XP, except it is word-only.
14. Automatically latches onto wireless internet access points that
are password-free while completely-ignoring the APs that require
passwords for access. This is for the sake of convenience and
anonymity.
15. The browser [which is built into a ROM chip] is text-only and
designed to allow me to communicate to the rest of the cyberworld via
chat rooms that are fully-compatible with the list A to M on #13
16. The wireless adapter is fully-compatible with all the modulations,
standards, channels, protocols, and other specs associated with
wireless internet access.
17. The chat software [which is built into a ROM chip] is fully
compatible with everything in #13. In addition, this chat protocolhas
the following characteristics:
A. Does not have any IM/PM capability [when I post my message, I want
everyone in the chat room to see it. In addition, I just hate it when
other chatters PM/IM me.]
B. Is real-time - i.e. I post my message and those in the room can
immediately reply to me.
C. Transmits/receives small amounts of text rapidly - unlike Usenet
which transmits/receives large amounts of text slowly.
D. Uses the least amount of bandwidth, memory, and CPU power.
E. Does not require that I have an email address
F. Does not allow long messages that take up the whole screen.
G. Allows me to copy and paste text into the chat room
H. Others in the chat room can see the text I post even if it is
copied and pasted from somewhere else
What would be the most cost-efficient manner for me to get this
netbook? How much would the cost be?
Now you folks might ask why I want this netbook.
The answer can be found in the following thread:
http://groups.google.com/group/sci.electronics.design/browse_frm/thre...
Also, for even more information, see the following threads:
http://groups.google.com/group/sci.electronics.design/browse_frm/thre...
http://groups.google.com/group/sci.electronics.design/browse_frm/thre...
Thanks,
Green Xenon
Sorry, I don't know WHAT you're talking about.
He wants a way to look at child pornography in safety.
Sylvia.
Pornography in text..1D or 2D?
1D might be like using - and o ... where an adult - would be the _ and
the adult o would be the O.
Gives me the hot flashes...
In Australia, which is where I'm posting from (I have no idea about the
OP's location), a mere textual description of a sexual act involving a
child can constitute child pornography, and earn the creator or
possessor some time in the slammer.

--->   O

Does that qualify as porn?

If

If not, how about this?

---O->
 
WeReo_BoY said:
Sorry, I don't know WHAT you're talking about.
GX dreams about non-existing hardware of impossible specifications.
Those dreams re-occur regularly.
 
The classic ascii porn is

(.)(.)

John

John, another fool quote retard.

..======================================================================
.. .'''''''''-- /
.. .--.' '.. /
.. .' '. '.. /
.. .' .)__.----. '. /
.. ' . '. '. /
.. / . '. '. /
.. / . '. . /
.. /. / .-''''. . ./
.. / | _____ /.'''''') . /
../ | .''.....) . ( \\ . ./
.. | /.' \ \ \____-\. . / .
.. | / \ '. """"" \ . / .
.. | ' ..~ \ \ . ./ //
.. | / .;;\\' . \. . ) / //
.. | (__O' \/' ./ _ / \/ . .
.. . ...--.. . _/ / . || \/
.. | .' ..... \ _... / _ / \ || |
.. |\ | / .' '\/ '~'' \ \/ ) |
.. ( \ \ e / ' P U D // \ \ /----''
.. \ \ o g M _-- .'( \ ... \
.. \ = \ o & S '....-'' \ /\ / \ )
.. '..___. p I \ // \.\._./
.. \ \\ S J /\ ./' ./ '___\
.. \ \ \ ..' \'--'' ---/ ( /'
.. . \ ''.____________.-'' \ / / .-------
.. . . / '''...__. ..'' (..''
.. . \ / ''..''
.. . (\ /
.. | \ /
.. | \ /
.. | \ /
.. | \ /
.. | \ /
.. )
.._________________|____________________________________________________


Bwuahahahahahahahaha!
 
GX dreams about non-existing hardware of impossible specifications.
Those dreams re-occur regularly.


I am still waiting for my flying car and robot slave.
 
No.


If not, how about this?

---O->

No.

It's really a case of you'll know it when you see it. It would be
possible to construct a text based graphic that consituted child
pornography in Australia. It would then be possible to replace some of
the characters by spaces such that the result was not child pornography.
In principle, it would seem that you can end up with a position where
something would be child pornography, but replacing a single character
by a space would give something that was not child pornography. Such is
the law.

Sylvia.
 
I really need to SEE and example PLEASE?

Since I'm in Australia, I cannot publish something on Usenet that would
constitute child pornography here.

Sylvia.
 
Back
Top