Big Bertha Thing corporate

---------- Forwarded message ----------
From: Tony Lance 
Date: 31 Mar 2005, 18:27
Subject: Big Bertha Thing blogs
To: comp.std.c, comp.lang.c++

Big Bertha Thing uniform
Cosmic Ray Series
Possible Real World System Constructs.
Access page to 714K ZIP file
Astrophysics net ring Access site
Newsgroup Reviews including

Animated wire-frame Polyhedron display,
complete with duals and double precision
angles to the polygons. Also technical
program description and 75 pictures.

Just one thing, thats still outstanding.
This is a collection of PostScript files from
the Computing Science Technical Report series
of organization 1127 of AT&T Bell Laboratories
report Comp. Sci. Tech. Rep. No. 130
author Andrew Hume
title Exact Descriptions of Regular
and Semi-Regular Polyhedra and Their Duals
date November 1986
tm TM 11276-861022-09
type techreport

Just two programs ready to run.
1. kaleido.exe (MSDOS) 86KB (see Zip)
2. schwarz.exe (MSDOS) 27KB (see Zip)

Just one description of two programs,
that do just one thing, better than the next best thing.uniform.pdf (Adobe) 676KB (see Zip)

Big Bertha Thing windows

On the Windows of King's College Remaining Boarded.

Loquitur Discipulus Esuriens.

Professors, in your plan there seems
A something not quite right,
'Tis queer to cherish learning's beams,
By shutting out the light.

While thus we see your windows block'd,
If nobody complains;
Yet everybody must be shock'd,
To see you don't take pains.

And tell me why should bodily
Succumb to mental meat?
Or why should eta, beta, pi,
Be all the pie we eat?

No helluo liborum I,
No literary glutton,
Would veal with Virgil like to try,
With metaphysics, mutton.

Leave us no longer in the lurch,
With Romans, Greeks, and Hindoos;
But give us beef as well as birch,
And board us - not your windows.

From the book
The Ingoldsby Legends
by the Rev. Richard H. Barham
Published by Richard Edward King,
88 Curtain Road,
London E.C.
Barbara Death
From Aunt Emma
March 6th 1921

Thank you,
Tony Lance

Big Bertha Thing corporate

1.  What happened to the guys on the most wanted list?
2.  Corporate America opened fire with an industrial
      strength denial of service attack.
3.  It was complete with worm virus.
4.  150K mailbox postings.
5.  Daily basis.
6.  Unlimited smtp mailboxes and names.
7.  Ownership of smtp mailbox provider.
8.  This is a proprietorial interest in Usenet newsgroup
9.  Big Bertha is now on the list.
10. A sustainable defense would be nice.
11. When the guns fall silent, the battle will be over.
12. There were enough shells for 42 months, without

Big Bertha Thing binary

The defense is of course binary; the old one two.
You need two filters.
The first blocks mailbox entry and strips out the from
mailbox address, for disclosure.
It uses mailbox address or sufix to select postings.
The second uses partial strings.
Any portion of the mailbox address or subject line to
  select postings.
It flags them as deleted and moves them to the trashcan.
The trashcan auto-deletes before the mailbox fills up.
Lastly you need vacation auto-reply and a mailing list,
  with an smtp mailbox.
The replies from auto reply tell you which mailboxes are
The mailing list replies confirms which mailboxes are open.

NB There may be another case with the same protaganist:-

Big Bertha Thing spamlock

One of the filters used includes the hosts shown as listed below.
 1. These might be forgeries.
 2. These might be global players carrying out denial of service attacks,
      on newsgroup users, to further corporate aims.
 3. Each mailbox is one-way; it can send mail, but not receive it.
 4. To control the attack, some mailboxes need to be two-way.
 5. was once on the two-way list, but seems to have thought better of it.
 6. was once on the two-way list, but seems to have thought better of it.
 7. is still on the two-way list.
 8. Forgers do not ever think better of it.
 9. This list was first compiled in January 2004.
10. The attack has now stopped, after 12 months.
11. This is one month after disclosure of mailbox logs, on usenet.
12. Denial of service attacks are illegal, so what is the FBI doing about it
      beyond prevarication?
13. The number of two-way mailboxes has been reduced to three major players.
14. Two of them are mentioned above. (Possibly all three.)
15. Microsoft in their recent unsuccessfull proposal, wanted the internet to
      use their patented software for identification of mailboxes. (Anti-open source) See link:-

List is as follows;-            Major two-way mailbox player.      Major two-way mailbox player.               Major two-way mailbox player.