conversations
stringlengths
328
4.6M
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>daily top 10 datentec1951millettrealtycom daily top 10 cnncom top videos stories aug 1 2008 358 pm edt top 10 videos 1 mom parties club httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805ngmompicscnn nancy grace new photos casey anthony partying nightclub daughter caylee vanished 2 womans computer spies httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805pkgwebcamspyingwcjb 3 tigers attack teen zoo httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805wuellnertigerattacksteenkytv 4 mistress testifies trial httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805sotlovetrianglezammitticnn 5 man calls 911 sandwich httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805spivey911callsandwichwtlv 6 john junior gotti arrested httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nygottijrhandcuffscnn 7 passengers slide plane httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805voaaplaneevacuatedktla 8 plane evacuates passengers httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nrbeepercaplaneevacuatecnn 9 pipeline firm helps save gas httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805marcianopipelinetelecommutingcnn 10 125000 gorillas found httpwwwcnncomvideopartnersemailindexhtmlurlvideoworld20080805vocongogorillawcs top 10 stories 1 smoke forces emergency landing httpwwwcnncom2008us0805emergencylandingindexhtml passengers evacuate american airlines jet inflatable slides emergency landing los angeles airport official says 2 hopes gorilla survival boosted httpwwwcnncom2008worldafrica0805congogorillasindexhtml 3 stayathome wives without kids httpwwwcnncom2008livingwayoflife0805lwnokidsnojobwivesindexhtml 4 commentary immigrant sanctuaries httpwwwcnncom2008politics0804navarretteimmigrationindexhtml 5 freeman recovering surgery httpwwwcnncom2008showbizmovies0805peoplemorganfreemanapindexhtml 6 john junior gotti arrested httpwwwcnncom2008crime0805gottiarrestindexhtml 7 toxin dims hopes mars life httpwwwcnncom2008techspace0804nasamarsindexhtml 8 lure rrated comedy httpwwwcnncom2008showbizmovies0805filmrratedcomediesapindexhtml 9 starbucks offers afternoon deal httpwwwcnncom2008us0805starbucksdealapindexhtml 10 edouard makes landfall httpwwwcnncom2008usweather0805tropicalweatherindexhtml cnn trusted name news cable news network lp lllp one cnn center atlanta georgia 30303 2008 cable news network lp lllp time warner company rights reserved please send comments suggestions going httpwwwcnncomfeedback read privacy guidelines going httpwwwcnncomprivacyhtml agreed receive email cnncom result cnncom preference settings manage settings go httpwwwcnncomlinktobnmanagehtml unsubscribe daily top 10 go httpcgicnncommclikeemail170gvcceaschallengecclcnndailytop10 wed 06 aug 2008 150940 0300 cnncom daily top 10<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>partnership DR. MORGAN XHOSA, DEPARTMENT OF MINERALS AND ENERGY, PRETORIA, SOUTH AFRICA. EMAIL:[email protected] ATTN:Sir/Madam, STRICTLY CONFIDENTIAL & URGENT It is my great pleasure to write you this letter on behalf of my colleagues. Your information was given to me by a member of the South African Export Promotion Council (SAEPC) who was with the Government delegation on a trip to your country for a bilateral conference talk to encourage foreign investors. I have decided to seek a confidential co-operation with you in the execution of the deal hereunder for the benefit of all parties and hope you will keep it confidential because of the nature of this business. Within the Department of Minerals & Energy where I work as a Director of Audit and Project Implementation and with the co-operation of two other t! ! op officials, we have in our possession an overdue payment in US funds. The said funds represent certain percentage of the total contract value executed on behalf of my Department by a foreign contracting firm, which we the officials over-invoiced to the amount of US$26.500,000.00 (TwentySix Million Five Hundred Thousand US Dollars). Though the actual contract cost has been paid to the original contractor, leaving the excess balance unclaimed. Since the present elected Government is determined to pay foreign contractors all debts owed, so as to maintain good relationship with foreign governments and non-government agencies, we included our bills for approvals with the Department of Finance and the South Africa Reserve Bank (SARB). We are seeking your assistance to front as beneficiary of the unclaimed funds, since we are not allowed to operate foreign accounts. Details and change of beneficiary information upon application for claim to reflect payment and approvals will be secured on behalf of you/your Company. I have the authority of my partners involved to propose that should you be willing to assist us in this transaction your share as compensation will be US$6.625m (25%), while my colleagues and I receive US$17.225m (65%) and the balance of US$2.650m (10%) for taxation and miscellaneous expenses incurred. The business is completely safe and secure, provided you treat it with utmost confidentiality. It does not matter whether you/your Company does contract projects, as a transfer of powers will be secured in favour of you/your Company. Also, your area of specialization is not a hindrance to the successful execution of this transaction. I have reposed my confidence in you and hope that you will not disappoint us. Kindly notify me by my email address:[email protected] for further details upon your acceptance of this proposal. T! ! hanks for your co-operation. Regards, DR.MORGAN XHOSA. N.B Please email your confidential Telephone number to enable me contact you for further clarifications. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>apbrcdivmodcom 0155 hoaufpythonorg wrote thu may 1 2008 503 pm wrote hi everybody apologize writing yet another lengthy screed simple directory naming issue feel strongly encourate anyone doesnt simply skip first background strong feelings actually based experience long time ago helping someone c programming homework baffled helped programs compiled soon tried didnt issue replicated autotoolsfriendly directory structure time bin include lib etc managed gnu stow onto machine edited shell setup include appropriately soon finished cleaned mess left behind thereby removed build dependencies shared university build server days linux friendly graphical operating system encouraged look even frequently home directory anything suspect likelihood problem would worse since cleaning home directory course find appreciate lack visual noise nautilus et al well also obviously think tools work way think python particular attract audience learning program necessarily savvy arcane nuances filesystem layout would best details abstracted concern naive python developer reading installation instructions wiki trying get started twisted development seeing directory created home directory case may 3 directories bin lib include bit surprise dont actually care files installed library long theyre installed import however may care clicking little house icon shows pictures movies etc lib whats lib bin whats bin like box throw stuff share put stuff share shared wait im supposed put public briefly lib directory participating convention youve also got full complement stuff might go installation like usrlocal lib might annoy little bin etc games include lib lib32 man sbin share src going get ugly pretty fast especially comes finder nautilus explorer every time open window unless misread pep theres going lib subdirectory python packages dont put stuff places afaik python packages least frequently put stuff bin scripts think windows python packages pure python packages either setuppy boasts installplatlib install headers installdata execprefix options suggests include bin share directory least im sure time grovel around id find one installed manpages twisted apparently setuppy doesnt anything leave os packages course little handled pep even usage name lib implies pep taking care compatible idiom goes beyond python least beyond simple python packages even assuming python library ever wanted install things many python libraries simply wrappers around lowerlevel libraries want perform peruser install one going configure prefixsomething something mean local would nice python living space matter itd nice get autotools ruby php perl emacs ad nauseum looking local mirror usr didnt write bunch shell bootstrap glue get everything behave consistently learn new special names bits configuration different ones usrlocal etc replicate consistent python development environment ton bizarre dependencies across something like 15 different os installations mention bevy virtual machines keep around fun think issues lot machines macs linux boxes best windows fwiw dont idea right thing windows local doesnt particularly make sense neither lib context theres reasonable guess put scripts dependent shared libraries peruser installation less issue windows mac default finder window home directory desktop subdirectory thereof markedly public name fact os x whole bunch reserved names home directory none start dot rule seems contains stuff user cares doesnt start dot hmm mac laptop default finder window definitely home directory may artifact many os upgrades tweak performed long time ago forgot though apologies average user experience worth ubuntu also directories creates desktop pictures documents examples templates videos empty typically delete ones dont use going visible directory grounds python specific thing explicitly participating convention software please call python something much better local imo depends perceived python mirroring usrlocal layout convention users name lib implies worse however python trying select location library bookkeeping allow installation platform libraries scripts using mechanism well pythond would still preference could least understand python mirroring mac gnome kde convention special directories guy finds software insists visible fixed files home directory rude vmware example wants vmware directory pretty much every application use nice enough use dotfiles even cedega roughlycomparableto lib applications ive installed folder distinction mind dot files exception like profile bashrc managed users apps manage provide apis manipulating contents sort like thw windows registry nondot files stuff user needs aware experience modern linux suggests usage youre describing gradually phased applications want manage nonuservisible storage something like registry increasingly use gconf database serverland granted gconf stored dotfiles home directory version control variously written hand databases maintained externally downloaded stuff asoundrc emacs vimrc vim xresources fonts gnomerc inputrc bashrc bash_profile profile screenrc xresources sshconfig sshauthorized_keys sshknown_hosts know dot files care maintain theyre benefit particular pieces software lot dotfiles dont think set quite happy dont see every one every time looking home directory save dialog im sure python packages fall istm something user must explicitly choose target installer user also likely dig remove stuff python package management doesnt way remove packages hope users never explicitly choose target installer impression point adding feature allow default behavior distutils work simply automatically unixy platforms rather puking permissions requiring arcana like sudo access editing shells startup quietly agitating elsewhere get localbin added path default way locallib ld_library_path hard sell know explicitly choose much work set appropriate shell environment variables matter already suppose regardless outcome discussion ill still local put another way trivial make locallib show symlinking lib thats thing im sure youre saying im saying advanced users want show theyll symlink naive users want hide theyll delete break python possibly without knowing cant make lib disappear lots software ends looking software cares another file home directory mostly switching point quick access everything access regularly nothings going break thats mean software processes list anything lots stuff shows list gnome ubuntu choose file dialog comes 80 time comes default home directory open terminal opens home directory default location emacs home directory quickly measure cognitive load looking contents directory since shell starts autocomplete starts commonletter real estate scarce directory called projects currently autocomplete p directory called linux autocomplete l either publicname proposal typing additional letter every day words care another file use home directory sort todo list mostly empty unless lot going case fills various objects im working empty exceptions rule every platform things os puts generally things like pictures desktop music put pictures downloaded files music macs library directory never bothered since osprovided basically alternate location dotfiles application data friends another story way agree everything access regularly good description home directory except lib directory something want access regularly occasionally maybe every weeks want chuck dependency forget year _______________________________________________ python3000 mailing list smsbmo9552pythonorg httpmailpythonorgmailmanlistinfopython3000 unsubscribe httpmailpythonorgmailmanoptionspython3000python300040tangomucom mon 04 aug 2008 074321 0000 python3000 pythondev reminder last alphas next wednesday 07may2008<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Please hold off on telling anyone to report to 4..... Still working through the details and will get back with more information as soon as we have it.... Amy <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : market to over 700 , 000 domain registration contacts worldmail d i r e c t price blowout ! save $ 150 . 00 promotion code fdo 308 get the facts on over 700 , 000 domain names registered by us and canadian companies ! the most complete database available of its kind . use this extremely valuable information to contact internet domain registration contacts by email , phone , fax and / or postal mail . 2001 - 2004 world mail direct , inc . & factsdisc . com . all rights reserved . 914 curlew rd 192 , dunedin , fl 34698 . toll free 877 - 446 - 4478 . outside usa 727 - 446 - 4478 . to be removed from future email announcements for factsdisc , unsubscribe here <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>30 , 000 , 000 email addresses . . . just released . . . 30 , 000 , 000 email addresses ! plus 12 bonuses . . . including free stealth 3 . 0 bulk email software ( $ 399 . 00 value ) these addresses are less than 21 days old . earn insane profits with the right formula if you have a product , service , or message that you would like to get out to thousands , hundreds of thousands , or even millions of people , you have several options . traditional methods include print advertising , direct mail , radio , and television advertising . they are all effective , but they all have two catches : they ' re expensive and time consuming . not only that , you only get one shot at making your message heard , by the right people . the internet , the " global communications frontier " has changed this dramatically , including making countless individuals wealthy . " electronic marketing , " as it 's commonly referred to , has effectively leveled the playing fields of all types businesses . internet marketing group has been in the online marketing business for over 5 years . we can help make your goals come true . we have helped many individuals succeed in marketing their product effectively . it 's very simple to do . in fact soon you will have the problem of what to do with all the cash you will make from sending out bulk email . here is just one of many true success stories we have seen . . . we did a mailing of 1 1 / 2 million emails for one of our customers . he was selling a home workers manual for $ 29 . 95 . his results are very typical and scary . he took in over 700 orders ! 700 x $ 29 . 95 = $ 20 , 000 . this gentleman was so amazed , that after being skeptical , it had really happened to him , he made it , he found a niche . that niche was email ! he went on to buy our full list and will be set for life in less than six months time . all this from selling a simple manual via e . mail . that was just one of the many success stories we hear everyday . it may all sound to good to be true . well , we can tell you this . it really does work . why else are so many individuals doing it ? they are not just wasting their time . they are all making mega bucks . do n't even hesitate on this one or you will miss out on the most effective way to market anywhere . . period ! here ' s the bottom line and what we can do for you here is what you get when you order today ! > > 30 million email addresses . . . 1 per line in simple text format on a cd . multiple files of 250 , 000 or greater ( no codes needed to open files ) . you will receive email addresses of the following domains . . . aol , prodigy , compuserve , delphi , genie , juno , pipeline , interamp , msn , mci , and 5 million other mixed email addresses ( . com , . net ) . all names listed above are seperated in files by domain name for your convenience . plus these bonus specials . . . > > 2 free bulk email programs . . . pegasus and eudora . you will be able to load our names into these 2 distribution list software 's ( which will create distribution lists saving you hours of work ) for immediate , around the clock launching ! you can whip out as many distribution lists as you like , and depending on the speed of your modem and the length of your message , you will be able to send out around 10 , 000 to 30 , 000 messages per hour for free . > > " stealth mass mailer " bulk email . this is the most popular bulk emailer in the world . this is the full working verion of the program . this product sends over 250 , 000 per hour . ( value $ 399 . 00 ) > > setup instructions and tips for stealth mass mailer . > > free check by fax software ! ( $ 299 . 00 value ) > > where to get a free web page . > > super note pad . . . this software will help manage your large text files for you . > > winzip self extractor . . . this program will be needed when de-compressing a compressed file . it will come in handy when dealing with files of zip format . > > over 5 , 000 places to advertise for free ! > > " profits 2500 series " . . . 7 manuals that will teach you how to market on the internet and what offers work and which ones to stay clear of . also we will show you where to find web designers for free and much , much more . you get everything for only $ 199 . 00 > > > special bonus . . . if you order within 24 hours you can deduct $ 50 . 00 from the listed price . limited time only ! we have previously sold the seven manuals alone for over $ 400 . now you can have the complete package for the low price of only $ 149 . 00 do n't even hesitate on this one . . reserve yours today ! all lists are completely free of any duplicates . we also on a continual basis , add new names and remove undeliverables and remove requests . the result is the cleanest email addresses available anywhere to use over and over again , for a fraction of the cost that other companies charge . typical rates for acquiring email lists are from 1 cent to as high as 3 cents per email address - that 's " information highway " robbery ! . how do i protect my e . mail address ? 1st of all , send your e . mail with the stealth mass mailer . this program will protect your email address while sending your e . mail at speeds of up to 250 , 000 messages per hour ( 28 . 8 connection ) . 2nd , collect your inquiries and remove requests via autoresponders . using autoresponders , you do n't even have to read the flames . just move them to your remove list and forget about them ! start earning mega money and get started now ! to order our email package , simply print out the ez order form below and call us anytime . we accept visa , mastercard , american express , personal check or money order . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ez order form call our 24 hour order line at : 1-561 - 697-0657 ( orders only ) we will deduct an additional $ 5 . 00 for all phone orders . _ _ _ _ _ yes ! i would like to order your 30 , 000 , 000 email addresses plus all the bonuses for only $ 199 . 00 _ _ _ _ _ i am ordering within 24 hours ! please deduct $ 50 . 00 from the price making the total only $ 149 . 00 * please select one of the following for shipping . _ _ _ _ i would like to receive my package overnight . i ' m including $ 12 for shipping . _ _ _ _ i would like to receive my package proirity delivery . i ' m including $ 4 for shipping . _ _ _ _ please add $ 10 . 00 for all orders from outside the u . s . date _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ name _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ city , state , zip _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ phone number _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ email address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ type of credit card : _ _ _ _ _ _ visa _ _ _ _ _ mastercard _ _ _ _ american express credit card # _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ expiration date _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ name on card _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ amount $ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ signature : x _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ date : x _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - best of luck ! ! we apologize if this e . mail was sent to you in error . to be permanently removed from all mailing lists simply go to http : / / www . remove-list . com thank you ! thank you ! m<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: VLADI-GASDAILY-CURVEFETCH.xls Vladi I just found something suprising. The starting date for settled price data for invidual curves may differ. For Example -- Using an effective date of 1/1/01 price data for the following curves begins on: GDP-AECO 4-1-01 GDP-AECO-ENRON 2-1-01 GDP-AQUADULCE 1-1-01 GDP-ALGONQUIN 1-1-01 To get the data to align propely a prompt month of 4/1/01 can be used. The earlier sheet doesn't alert you to and simply outputs the pricedata without regard to the date of the 1st available price. The attached sheet displays the first date pricing is available (after the prompt month) if it doesn't match the prompt month. Thanks, Kim <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [opensuse] Extensive disk i/o at startup (10.3)(rephrased posting) Randall R Schulz wrote: > On Friday 15 February 2008 09:29, Aaron Kulkis wrote: >> Bob S wrote: >>> ... >>> >>> Welll......Don't forget about "locate" if you have that installed. >>> That shouldn't take very long though unless you have a ton of data. >> In contrast to beagle, I HIGHLY endorse locate. > > Again and again again with this: > > - Locate _only_ knows file names. I know. > - Beagle indexes file _contents_. Which is normally well-indicated by file name and location within the directory tree. > > Locate is in _no way_ a replacement or substitute for Beagle. On the other hand, resources consumed by locate tend to be quite minimal -- updatedb runs extremely quickly with no noticeable impact on system responsiveness. The value/cost proposition for locate is favorable, because it's simple and debugged. > They serve different purposes. Yes, I know. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Ups! No such user... mailto: root@localhost ---------------------------------- -- References: <[email protected]> In-Reply-To: <[email protected]> X-loop: root@localhost >Ups! >No such user... >mailto: root@localhost >---------------------------------- >-- >Subject: Re: [9fans] Video card problem.. >References: >In-Reply-To: >X-loop: root@localhost >>I have made progress. I was intsalling from 1st edition CD, with 2nd >>edition it does install correctly from CD. Now I want to get a better >>GUI. The card in the PC is: >>ATI 3D Charger IIC/4Mb RAM >>card documentation says that it can do dotclock to 80MHz >>ramdac is "3D Rage II" at 170Mhz >>aux/vga finds a string at >>0xC0085="ATI MACH64 BIOS P/N 113-40606-112" >>link=vga >>ctrl=mach64 >>if I use the above three lines in /lib/vgadb the screen goes blank and >>stays blank. >>Any pointers? >>- ishwar<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Commerical Support Group Bullets 10/18/01 See file attach.................... <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [ILUG] How to copy some files On Fri, Jul 19, 2002 at 05:06:59PM +0100, Matthew French wrote: > On that note: is there any real benefit to using hard links? I avoid them as > a rule, and cannot think of any good reason to use them at the moment. There are lots of benefits to using hard links, for all sorts of reasons. In this case, they are being used to provide two quite different namespaces for the same set of files. Niall -- Irish Linux Users' Group: [email protected] http://www.linux.ie/mailman/listinfo/ilug for (un)subscription information. List maintainer: [email protected]<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>TidBITS#922/01-Apr-08 [Apologies if this is a duplicate; our server crashed during sending. -Adam] TidBITS#922/01-Apr-08 ===================== Issue link: If what we're hearing is right, you might want to hold off on buying an iPhone until the second-generation models appear later in 2008 with support for the Iridium satellite network, which Apple is currently negotiating to buy. Another hint that the second-generation iPhone will be worth waiting for comes from an undocumented feature discovered in the beta iPhone 2.0 firmware - Time Machine support. But be careful with what you're sharing, since there's a new virus out there that's affecting Mac users. In Internet news, Merriam-Webster experiments with sponsored definitions and a U.S. federal judge grants an injunction against declaring email bankruptcy. We also announce a new subscription mode aimed at making TidBITS more relevant to a younger audience, and pass on some of the best suggestions for new titles from our recent Take Control reader survey. Articles Time Machine Support Added to iPhone and iPod Touch Merriam-Webster Accepts Sponsorship to Redefine Unlimited iPhone Goes International with Iridium Mac Users Affected by New Virus U.S. Federal Court Declares Email Bankruptcy Illegal TidBITS Introduces New Subscription Mode Take Control News: New Title Suggestions ------------ This issue of TidBITS sponsored in part by: -------------- * READERS LIKE YOU! Support TidBITS with a contribution today! Special thanks this week to James White, Olaf Pluta, Mike Calmus, Amy Teel, and Dr. Michael A. Riccioli for their generous support! * Fetch Softworks: Fetch 5.3 has WebView, the easy way to view files in a browser and copy Web addresses from Fetch. Also a new look for Leopard, droplet shortcuts, and more. Download your free trial version! * WebCrossing Neighbors Creates Private Social Networks Create a complete social network with your company or group's own look. Scalable, extensible and extremely customizable. Take a guided tour today * MARK/SPACE, INC: The Missing Sync provides the very best in synchronization for Mac users with BlackBerry, Palm OS, or Windows Mobile devices. Integrates with Address Book, iCal, Entourage, iPhoto, and iTunes. * VMware Fusion. The most seamless way to run Windows on your Mac. Backed by nearly a decade of proven virtualization technology. Try VMware Fusion today for free, or order online for only $79. Visit: * StuffIt Deluxe 12: breakthrough compression of MP3 files, PDFs, iWork and MS Office files! Reduce JPEG file sizes with no loss in quality, burn to CD/DVD, back up archives to iDisk and more. Buy today for only $59.99! * ConceptDraw Business Suite: Take control over your business workflow with this powerful set of tools. Mind Mapping, Project Management, Business Graphics - all easily created on your Mac! Right now Special Price: $449! * DealBITS: Get the word out about your product AND generate sales! It's easy: give away a few copies and offer a discount to entrants. A DealBITS drawing is quick to set up and can easily pay for itself. For more info and rates, visit . ---------- Help support TidBITS by supporting our sponsors ------------ Time Machine Support Added to iPhone and iPod Touch --------------------------------------------------- by Joe Kissell article link: As Glenn Fleishman described in "AirPort Update Adds Archive for Time Capsule, External Mounted Drives for AirPort Extreme" (2008-03-19), Apple's recent AirPort Extreme Base Station version 7.3.1 firmware update restored the capability to use a USB hard drive attached to your base station as the destination for Time Machine backups, putting an end to months of complaints by users. Now reports are circulating that the same feature has been added to the iPhone and iPod touch. Members of Apple's $99-per-year iPhone Developer Program with access to the beta release of the iPhone 2.0 firmware have confirmed that iPhone and iPod touch models with the new firmware appear as destinations in Time Machine, as long as both the handheld and the computer running Leopard are connected to the same Wi-Fi network. As with the AirPort Extreme firmware update, Apple's documentation for the iPhone firmware update fails to mention this change. One of the developers to discover the new feature, who wished to remain anonymous, expressed puzzlement about the capability, asking, "Why would you use a device with only 8 to 32 GB of memory as a backup device, when your computer's hard disk contains much more data?" Some developers we contacted believe the so-called feature is actually a bug, which will be removed before the firmware's final release. Others, however, believe the change presages the imminent release of iPhone and iPod touch models with dramatically larger amounts of storage. For example, an iDevice with even 80 GB of space (half the current maximum of an iPod classic) could back up the entire contents of a MacBook Air's 64 GB solid-state drive with 16 GB to spare for music and videos. Such a device would address the issue I've frequently mentioned that Time Machine provides no convenient mechanism for storing a copy of one's backups off-site, though Time Machine's current lack of an encryption option would still need to be addressed. Meanwhile, the iPhone and iPod touch still - even with the beta version of the 2.0 firmware - do not offer a way to access their storage space as an external volume on your Mac, whereas most other iPod models do. Users can work around this limitation using third-party hacks such as the $9.95 MegaPhone utility from Ecamm Network, though such utilities do not provide a user interface for interacting with any extra files directly from your iDevice. Merriam-Webster Accepts Sponsorship to Redefine Unlimited --------------------------------------------------------- by Glenn Fleishman article link: The venerable dictionary publisher Merriam-Webster launched an experiment today that combines wiki-like interaction with commercial possibilities: it has accepted a joint sponsorship from Yahoo and Verizon Wireless to redefine the word "unlimited" in the Merriam-Webster online dictionary. This is the first step in a broader effort for Merriam-Webster to open their dictionary to editor-reviewed user contributions that the company hopes will "increase the accuracy, scope, and timeliness" of the dictionary's definitions. The sponsored entries, clearly identified as such, "aim to enhance readers' understanding and embrace of the change in words fostered by corporations," said editor Michael Pangloss. "We expect a very positive response, and the sponsorship revenue will fund our wik-tionary efforts." Yahoo and Verizon Wireless, among other companies, have been working diligently to redefine "unlimited" long before Merriam-Webster afforded them this sponsorship opportunity. Most recently, Yahoo has offered "unlimited" email storage and "unlimited" Web hosting resources for small businesses; Verizon Wireless formerly had an "unlimited" BroadbandAccess cell data plan. Verizon Wireless was thwarted by the New York attorney general; by changing the official dictionary definition, Verizon Wireless should be able to resume their "unlimited" offering. iPhone Goes International with Iridium -------------------------------------- by Adam C. Engst article link: Apple's iPhone has proven wildly popular around the world, even in countries where there's no official carrier (see "iPhone the Hot Ticket Item in... Syria?," 2008-03-24). Although Apple will continue to negotiate deals with carriers in larger countries, we've learned that the company has quietly been working on an innovative plan that will enable the iPhone to work literally anywhere in the world. Already, the iPhone can switch between the EDGE cell data network and Wi-Fi, choosing the best connection at the time, since Wi-Fi offers far more throughput than EDGE, but is available in many fewer locations. With the second generation iPhone, anticipated for the middle of 2008, Apple is widely expected to add 3G data support, which should provide more cellular data bandwidth. But sources have confirmed that Apple won't just be adding 3G support, but will also be acquiring the Iridium satellite network and giving the second-generation iPhone satellite phone capabilities. With Iridium support, the iPhone will work anywhere in the world, at sea, in the air, and even at the poles. **i in the Sky** -- Iridium is a mesh network of 66 communications satellites in low earth orbit aimed at providing a truly global voice and data network. The service came online on 01-Nov-98, but went into Chapter 11 bankruptcy less than a year later, due to the massive startup costs (estimated at $6 billion) of launching so many satellites. Other problems included the decreased cost of terrestrial cell service, increased use of roaming agreements between terrestrial carriers, the high cost of both handsets and service, and management failures. In 2001, the service was purchased by a group of private investors for about $25 million and service was restarted. The new Iridium Satellite LLC currently has about 250,000 customers, and 2007 revenue may have been as high as $300 million. Apple will reportedly be paying somewhere in the $500 to $700 million range for Iridium Satellite, marking Apple's first foray out of the computer and consumer electronic markets (unless you count the AppleLink and eWorld online services, which are better seen as for-fee predecessors of Apple's current Internet services). Given Apple's $18.4 billion in cash, purchasing Iridium won't have a huge effect on Apple's bottom line, especially given that Iridium is currently profitable. Much of Iridium's business comes from the U.S. Department of Defense, which invested to keep Iridium alive and remains the company's largest customer, paying $36 million per year for unlimited access for up to 20,000 users. Apple is expected to keep the DoD contract, and although the close connection with the U.S. military may cause consternation among some iPhone and Macintosh users, Apple insiders say that the deal may also open up many other lucrative opportunities within U.S. federal, state, and local governments, as well as overseas governments. The Iridium network offers much less bandwidth even than EDGE, to the point where the Amundsen-Scott South Pole Station had to multiplex 12 Iridium modems together to eke out 28.8 kilobits per second of bandwidth. But it works for voice calls, albeit with some clipping due to the aggressive compression necessary. Apple is expected to increase Iridium's capabilities significantly with cutting edge radio and signal processing technologies learned from the iPhone design. **Calls Just Want to Be Free** -- In a bold move, Apple is expected to offer Iridium service on the second-generation iPhone for free, although it will not be possible for a stock iPhone to use Iridium service in favor of a faster terrestrial service or Wi-Fi (in line with Steve Jobs's comment about voice over IP during the iPhone SDK launch, Apple will build voice-over-IP support into the second-generation iPhone, limiting it to usage over Wi-Fi). Given that Iridium service currently costs between $1 and $14 per minute, Apple expects that this change alone will significantly boost iPhone sales. Iridium initially needed 1 million customers to break even, so the network is expected to be able to handle that many users, and Apple is betting on being able to take Iridium to the next generation of satellite technology before the current satellite constellation ages unacceptably (it's expected to last until at least 2010). At that point, Apple will be able to increase Iridium's throughput to support many more customers and to provide better data performance. The main downside to Apple adding Iridium support to the iPhone, according to sources within the iPhone hardware team, is that the antenna necessary for the iPhone to communicate with the Iridium satellites makes the sleek iPhone a bit ungainly, as you can see in this picture of a current prototype. Apple hopes to reduce the antenna size, but our sources have expressed concern that fitting the Iridium-capable iPhone into a pocket may not be possible until the next generation satellite constellation comes online, with more powerful and sensitive radios that can be miniaturized into the current iPhone form factor. Mac Users Affected by New Virus ------------------------------- by Rich Mogull article link: Reports surfaced today that a new virus is slowly spreading throughout the Mac community. The first infections appeared a few days after Macworld Expo in January 2008 and were initially centered in the San Francisco and Cupertino areas, but soon spread throughout California, with additional hotspots in major metropolitan areas throughout North America and Europe. The virus continues to spread slowly and efforts to eradicate it have been unsuccessful. Although Mac users usually have a relatively lower risk of viruses than their Windows brethren, experts believe this infection is isolated to the Mac community, and it is not expected to transition to the broader computing world. Officials suspect the virus first appeared at Macworld Expo, quietly infecting unprotected users. Apple employees were likely another vector, as the next wave of infections seemed centered on Apple retail stores. The virus has since entered the broader Mac community, moving beyond enthusiasts with riskier trade show habits to the general Macintosh population. Symptoms include nausea, vomiting, and general flu-like symptoms. "It's bizarre, but this virus appears to be limited almost entirely to users of Macs, iPods, and other Apple products," stated Dr. Miroslav Virislavski, a spokesman with the U.S. Centers for Disease Control in Atlanta, Georgia. "With tens of thousands of enthusiasts at the Macworld conference, the virus quickly gained a foothold with Apple users, especially company employees. While it's not unusual for viruses to spread at major events, this one is unique since it has since established itself in Apple retail stores and has been hard to eliminate." Experts have identified the infection as a new variant of the norovirus family. Noroviruses are well known for cruise ship outbreaks and for spreading quickly through isolated communities. "Symptoms for the average norovirus normally appear within 24 to 48 hours of exposure," stated Dr. Virislavski, "but this version seems to mask its symptoms for up to 4 days, even though carriers are contagious after the first 12 hours. We think this long incubation period is contributing to the slow spread and difficulty in containing the outbreak, as is the relatively small Mac user base compared to the rest of the population." Noroviruses are particularly hardy and remain viable on surfaces such as keyboards, iPod click wheels, and iPhone screens for up to three weeks under normal indoor conditions. Infected users continue to shed the virus for up to two weeks after their recovery. Symptoms typically last 1 to 2 days, and most users recover without incident. Noroviruses do break down quickly in sunlight, an environment few Mac users experience. Jim Borne, security product manager at SymCaftego Software, believes Mac users are suffering due to their careless habits and sense of immunity. "Apple users are just as vulnerable as Windows users, but refuse to admit they aren't any safer. The Windows community has spent years building their defenses while Mac users carelessly share their laptops, iPods, and iPhones without following best practices for safe computing." Experts believe the social nature of the Apple community, combined with a false sense of security, make this outbreak particularly insidious. "These guys (and girls) think they're better than the rest of us, but they're far less prepared for the real world," said one epidemiologist, who wished to remain anonymous. "They're always touching each other's computers, iPods, and other devices without taking any precautions like simple hand washing. That's just dangerous, and a little gross." A survey released by the manufacturers of the Purell hand sanitizer indicated that Mac users are a staggering 42 percent less likely to use a sanitizing gel between computing sessions. "They also have long hair and dress like hippies," reported one researcher, "at least the ones that aren't wearing black jeans and turtlenecks even in the middle of summer." The Department of Homeland Security, in conjunction with the Centers for Disease Control, is investigating the possibility that the virus was released intentionally to infect the Mac community. "Genetic engineering is no longer limited to large companies and nation states. It's possible this is a man-made virus created by terrorists that specifically targets Mac users," said a spokesman for DHS. "While we don't have a single shred of evidence to support that, you should be scared anyway because we said so." Security experts agree that while most man-made viruses have a political or financial incentive, the general smugness of Mac users may have finally pushed a basement genetic hacker into creating a proof of concept. David Maynor, the security researcher most well known for his research into Mac wireless vulnerabilities, said that he wasn't surprised Mac users were infected (see "Wi-Fi Exploit Precursor Published One Year Later," 2008-09-21). "I've been warning about this for years," claimed Maynor. "As a matter of fact, at Black Hat 2005 I showed a video of myself vomiting for 2 days after using my Mac and no one believed me. Apple tried to cover it up, but we all know that Mac users aren't any safer than Windows users." John Gruber of Daring Fireball quickly challenged Maynor to back up his accusations. Gruber will purchase a brand new Mac and allow Maynor to infect it in front of witnesses. If Gruber vomits after using the Mac, Maynor gets to keep it. "That video is a sham," says Gruber, "as the camera pans around the bathroom door to show Maynor puking, you can clearly see a bottle of syrup of ipecac on the counter. He faked the entire thing." John Moltz of Crazy Apple Rumors Site failed to respond to our queries and is believed to be spending the year dead for tax reasons. U.S. Federal Court Declares Email Bankruptcy Illegal ---------------------------------------------------- by Glenn Fleishman article link: In a move that could affect as many as 20 million Americans, the U.S. District Court for New York has ruled that a Poughkeepsie man will need to retain all the email in his inbox, and must respond to it with all due haste. The man, 37-year-old Bob Sneed, a sales executive at a local ISP, was intending to delete over 7,500 unread email messages until halted by a court order. The case was brought by Sneed's brother-in-law, Philip S. Duenzel, an attorney in Illinois, who used the federal court system because the case crossed state lines. Duenzel alleged, and the court upheld, that he would suffer irreparable damages if Sneed failed to respond to a documented 107 separate emails sent over 3 months, each of which asked for a reply. The email messages variously covered family issues, money owed for shared gifts to relatives, and 23 collections of jokes about lawyers. In a statement read by his attorney, Sneed said, "I believe the courts are in error for restraining an individual from exercising his right to discrimination: discriminating among which emails are important enough to answer, and which deserve to be deleted without opening." Sneed is appealing the decision, and until then is relying on a filter that displays and automatically replies to messages from Duenzel as soon as they are received. Sneed was attempting to declare "email bankruptcy" by deleting all current messages and starting over. According to research ranging from studies by the Pew Internet & American Life Project to the National Rifle Association's frequent member polls, email bankruptcy is an increasingly attractive option to those overwhelmed with hundreds or thousands of unread email messages. Judge Randall Siemenbocher's decision could affect both personal and business users, pending Sneed's appeal, which has left him in limbo. One Gartner researcher pegged the impact at "$500 billion in lost productivity and legal liability each year" if businesses are prevented from deleting any unread messages. Jaylee Schmitzenlooper, a Gartner senior analyst, said, "Theoretically, this decision could be used to require both individuals and businesses to accept all spam messages, since there's little technical difference between deleting unread messages in your inbox and having a spam filter do so for you." Commenters on Slashdot have already suggested an underground business that would remotely corrupt inboxes in exchange for payments made through third-party anonymous payment systems. One commenter, apparently already in the planning stages for an Albanian-located firm, wrote, "For $50, we could send you an email message that would infect your computer, delete the inbox, and leave clear traces for any potential forensic investigation to prove that it wasn't your fault. We'd perform an antivirus cleanup at no extra cost." For those of us facing nearly 1,000 unread messages with no hope of responding to them all, now is the time to press Delete. TidBITS Introduces New Subscription Mode ---------------------------------------- by Matt Neuburg article link: Here at TidBITS, positioning ourselves for maximum exposure and reader appeal has long been a losing game. Let's face it, TidBITS is not for everyone. Without fully summarizing our history, since it has been covered many times before (see the "TidBITS History" series of articles), a brief recap will show the problem. We began, way back in 1990 before the word "Internet" was common coin, as a HyperCard stack uploaded to the sumex-aim FTP mirror sites; later, when more people had email, we became a subscription list sending out our content in plain setext format. But innovations beyond that point were made very reluctantly, because our guiding principle was that TidBITS was measured and literate, almost to the point of severity, and required no medium beyond plain text. Thus, over the years, we were behindhand in adopting "glitzy" media used by the rest of the world, such as HTML email, a Web site, and (gasp!) pictures in the Web version of our articles. Most recently, we instituted a complete revamping of our Web site's underlying technology (see "Behind the TidBITS Curtain," 2006-09-11), followed by a dynamic recasting of the site, moving our old issue-based structure aside in favor of a new article-based orientation, with a genuine content management system behind the scenes (see "Designing a Modern Web Site for TidBITS," 2007-09-10). As Adam said in that last-mentioned article, we weren't attracting new readers, so it was "evolve or die." It's _still_ "evolve or die." Despite all our efforts, one undeniable trend remains: We _aren't_ seeing hundreds of new subscribers every day. This became particularly evident when we analyzed the results of a recent survey ("TidBITS 2007 Reader Survey Results: Who Are You?" 2007-03-12), and discovered one overriding and disturbing trend: TidBITS readers are aging - "the largest ten-year age group represented among those responding is the 51-60 age group" - and new, younger readers are conspicuous by their absence. It isn't hard, projecting this trend into the 30-year future, to see that this is a disaster. Unless we can bring younger readers into the fold, TidBITS will soon be overwhelmed by the growing tsunami of Web 2.0 (and 3.0 and 4.0) sites favored by today's youth. Without eyeballs, we won't get advertising; without advertising, we can't pay for the server; without a server, there's no TidBITS. During a recent multiway iChat virtual staff meeting, as we were despairing of this situation, someone remembered the reader response to our series of articles about Twitter ("Confessions of a Twitter Convert, 2007-10-09" and "Confessions of a Twitter Revert," 2008-01-02). When Adam confessed that Twitter had its uses, our readers cried, "Well, duh!" When Glenn confessed that he couldn't endure the constant Twitter input, our readers screamed, "What a fogey!" (And though he hasn't admitted it in an article, Glenn is back on Twitter in force.) Clearly, our readers appreciate short-form messaging services. And the younger they are, the more they like them. From this, the conclusion was suddenly obvious. Since our conversion to a Web format, and especially since our recent move to an article-based structure, our issues have been getting longer and longer as we've abandoned the 30,000 character limit that we had imposed on ourselves back in the days of limited email gateways. This, clearly, is the wrong way to go. What our younger readers want isn't longer; it's shorter! In fact - it's Twitter. Think about it. Attention spans are getting shorter. Today's youth are bombarded by an army of stimuli, with cell phones and text messaging positively ubiquitous. That's how they want their TidBITS, too. As Antony says in the first scene of Shakespeare's _Antony and Cleopatra_ when a messenger arrives: "Grates me, the sum." In other words: "I don't have time for details; just hand it to me in condensed form." And what could be more condensed than Twitter? 140 characters of pure, unadulterated "sum." Shoutcast your message into the ether, and instantly all subscribers see it, grok it, and move on. So, here's the plan. Starting today, a new Twitter account - TwitBITS - will represent TidBITS. All TidBITS articles will be condensed to 140 characters, and this summary will be sent out as a tweet, automatically, the instant the article is posted at our Web site. Readers who are "following" our Twitterized TidBITS account, by whatever medium (Twitterrific, SMS, PocketTweets, and so on), will instantly be apprised of each article as it appears. Naturally, we don't expect this format to appeal to everyone; the geriatric wing of our readership will surely prefer to continue reading TidBITS in its long form. But as the TwitBITS buzz starts to catch on, we expect a much younger population to begin discovering TidBITS and, we hope, flocking to us. Just one problem remains: Condensing an entire TidBITS article into 140 characters is not easy. In order to do it, we're clearly going to have to surrender not only length but also literacy. In particular, we're going to have to adopt some form of abbreviated language that can accommodate the maximum possible meaning in the fewest possible characters. This, of course, is a problem long ago solved by today's youth, who sprinkle their text messages with all sorts of abbreviations such as "LOL," "ROTFL," "CUL8R," and so forth. We're going to have to learn this style of abbreviation and adopt it. After some research, we at TidBITS have discovered that in fact there is already an entire dialect of English devoted to precisely this sort of brevity - LOLCat. For those not in the know, LOLCat is a highly condensed patois, based on text messaging, and imagined to be produced by the grammatically challenged intellect of a cat. Its expressive potential is well demonstrated by the fact that the entire Christian Bible is currently being translated into LOLCat (as of this writing, the project is nearly 50 percent complete). Clearly, any dialect is worthy of serious consideration if it can recast the Second Beatitude from the Sermon on the Mount as, "U r doin good if U iz sad kitteh; U can has petting." To be sure, we're not yet entirely certain of the details, but we imagine that, for example, Rich Mogull's recent article, "Should Mac Users Run Antivirus Software?" (2008-03-18), might be summarized as: "Macs can haz virusez? No, U r doin good. But f u haz Windoze BFz, can iz in ur mail sistem. So u iz tell ur ISP 2 blok spam an virusez, k?" (138 characters.) For us at TidBITS, with its outstanding tradition of literacy and expansive, technical description, to produce such primitive, puerile blather will certainly be painful. But, let me repeat, this step is absolutely necessary to our survival. So please, everyone get with the program here. If you don't want to subscribe to the TwitBITS version of our articles, that's fine; neither do we. But if you have children of text-messaging age, please do urge them and their friends to subscribe. We desperately need their eyeballs. Even TidBITS founder and publisher Adam Engst, when asked whether he felt any qualms about surrendering TidBITS's long-standing reputation for in-depth, well-written articles, said (with some difficulty): "Yo, dude, LOLCat teh bom. Srsly." Take Control News: New Title Suggestions ---------------------------------------- by TidBITS Staff article link: Our recent Take Control reader survey was amazing - thanks to everyone who provided feedback. Most interesting were some of the suggestions for new titles, which we're pondering right now. **Take Control of Backdating Stock Options** -- It's legal, really it is! This book will explain the ins and outs of backdating stock options so the Securities and Exchange Commission stays off your case, or at least doesn't notice until you've received your golden parachute and fled the country. Real-world advice includes tips on picking a compliant board of directors, blaming your previous CFO, and claiming ignorance without looking stupid. **Take Control of Swearing in Esperanto** -- Sercu vian kacon per pincilo! Did I just compliment your blouse or call you a piece of merde? You'll never know. Thanks to "Take Control of Swearing in Esperanto," you can exercise your innate ability to spew obscenity while not running afoul of violent people who are larger than you. Just like in the classic movie "Breaking Away," people will assume you were born elsewhere and frequently break into your native tongue. Or that you have Tourette Syndrome (see Appendix A for particular advice on that topic). **Take Control of Quilting Hawaii and Stuffing It Topographically** -- Remember that fabulous trip to Hawaii? Wouldn't it be great to take a part of it home with you? Leave that volcanic rock and overpriced Kona coffee behind. Instead, take up needle, thread, and foam, and create this wonderful bedspread that allows you to think of Mauna Loa fondly every time you lay your head down. We plan a series of state books on quilting and stuffing, with Kansas, Nebraska, and Iowa due out in a single volume next. The Arizona edition will require modifications to your bed. (Note: Not endorsed by or related to the book, "Let's Quilt Hawaii and Stuff It Topographically.") **Take Control of Controlling Your Intake** -- Our meal planning book "Take Control of Thanksgiving Dinner" was so critically received that we thought a complementary title was needed. "Take Control of Controlling Your Intake" has sections on all the major diets, their pros and cons, and tips on avoiding eating disorders. Special bonus: Foreword by Michael Pollan along the lines of, "Eat food. Not too much. Mostly plants." **Take Control of Finding Naughty Bits in Google** -- Everyone knows that Google is the dominant search engine on the Web, but that doesn't mean it always comes up with exactly what you're looking for. In particular, it can be difficult to find the naughty bits we're always told are in such strong supply on the Internet, so in this book, we'll reveal the secrets of geeky teenagers who know all the tricks for making Google show the down and dirty. **Take Control of Getting Babies to Sleep** -- Written by our in-house parental sleep experts, who have themselves suffered through years of nightly wakeups and the associated damage to cognitive processing and memory, this book will teach you the ancient Chinese secrets guaranteed to send any healthy baby to sleep. Also, booze. Not for the baby, of course; for you: every ebook has a hollowed-out virtual niche into which a flask of bourbon is secreted. It's a Take Control secret how the alcohol gets out of the ebook and down your gullet. And, of course, there's some for the baby. (What were we talking about? Ah, yes, that dream I had last night. Let me pull myself together. Splash of water on the face. Okay, back to it.) A special bonus section will teach you to make a simple inhaler filled with all-natural ingredients found in nature, designed by nature as a soporific that's guaranteed to help your baby nap for at least 30 minutes when you just need some time for lunch and a shower. No, it's not booze. Okay, it is, in fact, booze. So use only as misdirected, without your state or country's child protective services lurking around. **Take Control of Taking Control** -- Have you ever wanted to be a micro-manager? What about a petty dictator? This book will tell you everything you need to take control at any level, in any situation. Learn to use simple psychological tricks to manipulate people through fear and greed. Later chapters examine the use of force (both subtle and bloody) to achieve your ends. Order this book by clicking on the Buy button on the left side of the screen. No, not that button, lower. Sigh. Here, let ME do it. **Take Control of Letting Go** -- Are you a control freak? Do you find you try to take control in every situation, even when it's utterly inappropriate or guaranteed to cause you headaches? This title will teach you the fine art of letting go so you can stop trying to run everyone else's lives. One section focuses on how to not build your child's Lego kits for them, and another is called "Stop Installing New Versions of Mac OS X on Your Wife's Laptop without Her Permission!" (For a limited time only, you can buy a special bundle containing both "Take Control of Taking Control" and "Take Control of Letting Go." For just $2 extra, we'll time-delay delivery of the second title by your choice of 1 week, 1 month, or even 1 year!) **Take Control of Spouse Sharing in Leopard** -- Apple significantly enhanced Mac OS X 10.5 Leopard's sharing capabilities, adding screen sharing and making file sharing easier to use. But what most people haven't yet discovered is that Leopard also contains utilities for simplifying spouse sharing. Seriously, dude, everyone's doing it, and you just need to select the Sharing preference pane, scroll down the list of Services, and check the Spouse box. Looking for ways of swapping spouses with your colleagues but too embarrassed to raise the topic in conversation? Leopard's new Bonjour-based spouse sharing utility helps you broach the subject, arrange assignations, and can even search a regularly updated database of divorce lawyers in your area. Bonus! Includes a discount coupon off these excellent male ego enhancement placebos! **Fake Control of Apple, Inc., by Fake Steve Jobs** -- Did you found (okay, co-found) a legendary technology company that's hit hard times? Are you languishing in a forgotten startup with awesome technology but no publicity? Are you primed to save the world, and you see no better way to do it than by retaking the helm at a personal computer maker with a dwindling cult following? This book reveals the fake secrets you'll need, including how to get your company acquired while actually taking over the acquiring company, throwing the press off track by saying exactly the opposite of what you're going to do a year later, inventing the iPod, and a great section on Top 10 Zen Presentation Tips ("Boom!" is your friend). **Take Control of Ordering a Drink at Starbucks** -- Are you confounded by all the choices at your local Starbucks? Are you unsure which of the three Starbucks near your house you should patronize? This book, written by a Seattle native with advice from the famous Starbucks expert Winter, covers all your options and helps you make the right decision. By the end of this book you will be able to say, "One tall extra hot, four-pump, nonfat, no-water chai with whip" without missing a beat or giggling hysterically. **Take Control of Chaos** -- Learn to catch butterflies in Asia before they become tornados in the Americas. Build your own tipping points with simple tools and household materials. If you and your initial conditions have ever been codependent, if you have ever fallen under the spell of a strange attractor, or if you have ever wanted to learn how to bake fractal mandelbrot (excellent with coffee!), this non-linear dynamic book will shift your paradigms and renormalize your life. $$ This is TidBITS, a free weekly technology newsletter providing timely news, insightful analysis, and in-depth reviews to the Macintosh and Internet communities. Feel free to forward to friends; better still, please ask them to subscribe! Non-profit, non-commercial publications and Web sites may reprint or link to articles if full credit is given. Others please contact us. We do not guarantee accuracy of articles. Caveat lector. Publication, product, and company names may be registered trademarks of their companies. TidBITS ISSN 1090-7017. Copyright 2008 TidBITS: Reuse governed by Creative Commons license. Contact us at: TidBITS Web site: License terms: Full text search: Subscriptions: Account help: -- If you want to unsubscribe or change your address, use this link http://emperor.tidbits.com/webx?unsub@@.3c557dc4!u=30544631 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Your recipe for successful love 3 months supply of perfect intimate life. http://wlheaa.busyquotient.com <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Healthy living with less fat Anatrim – The latest and most fascinating lose flesh product available – As shown on BBC. Do you recall all the situations when you said to yourself you would do anything for being saved from this desperately growing pounds of fat? Luckily, now no great price is to be paid. With Anatrim, the earth-shaking weight-reducing combination of elements, you can achieve naturally health mode of life and become really thinner. Take a look at what our customers write! "It’s rather difficult to admit it but I was a junk food addict. I ate all this garbige and was unable to stop. This misery ceased after I started course with Anatrim! Holy God, my craving for food decreased, mood increased and I became the happiest person 21 pounds in 2.2 months. I can tell you now I’m the happiest person on the planet!" Silvia D., San Diego "I had weight problems since I was a boy. You can't fancy how I abhorred being derided at school. I hated my plumpness and I abhorred myself. After trying this and that I found out about Anatrim. It literally dragged me out of this nightmare! A plenty of thanks to you, guys." Steve Doubt, Las Vegas "Know what? Anatrim preserved my marriage! I went into this circle, depression – more eating – even more depression. My wife had thought to leave the overweight psycho I was turning in. My best friend showed me web site and I called for pack of Anatrim right off. The results were excellent, my appetite became normal, I was in a good mood oftener, and, certainly, I tightened my belt with no regrets. And you know, the sex became fantastic also!" Mike There is a great number of gratitudes happy people leave after taking Anatrim. Don’t you wanna add yourself to the tens of thousands of slender clients and take this original appetite-suppressing power raising product now! Do not decline the opportunity! <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>amee zeisler dlintentionsctkcz labtested female sensual leverage patients access online health perfect resource people get medication without hassles awkwardness full health click fri 08 aug 2008 090030 0500 patients access online health shop internet 24 7<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>You have successfully added a new email address to your PayPal account! X-psy1.psych.arizona.edu X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] X-AntiAbuse: Sender Address Domain - paypals.com X-Source: X-Source-Args: X-Source-Dir: dddd Protect Your Account Info Make sure you never provide your password to fraudulent websites.PayPal will never ask you to enter your password in an email.For more information on protecting yourself from fraud, please review our Security Tips at https://www.paypal.com/us/securitytips Protect Your Password You should never give your PayPal password to anyone, including PayPal employees. You have successfully added a new email address to your PayPal account Dear PayPal Customer, The primary email for your PayPal account was changed on May. 1st, 2006.   If you don't agree with this email [email protected] and if you need assistance with your account, please click here and login to your account. Thank you for using PayPal! The PayPal Team Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and choose the Help link located in the top right corner of any PayPal page.To receive email notifications in plain text instead of HTML, update your preferences here. PayPal Email ID PP059<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Can I link my own subversion link to my projects at code.google.com ?? Can I link my own subversion link to my projects at code.google.com ?? As I always develop my application for a while at my own SVN server, can I just link it instead of mirgation? --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "codesite-discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/codesite-discuss -~----------~----~----~----~------~----~------~--~--- <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Buenos dias! We haven't been introduced... :) Nofo ti malolo <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: Description of UBS Deal Louise, We have information about the Master User at each company (i.e. name, address) and we have created new customer profiles for product access based on previous profile information, but have not kept any transaction-specific information. Dave -----Original Message----- From: Steffes, James D. Sent: Tuesday, January 29, 2002 8:25 AM To: Kitchen, Louise; Forster, David Subject: RE: Description of UBS Deal The Master Agreement and License Agreement mention that you have "Customer Data". Is this wrong? Jim -----Original Message----- From: Kitchen, Louise Sent: Tuesday, January 29, 2002 6:46 AM To: Steffes, James D.; Forster, David Subject: RE: Description of UBS Deal Simply People, systems and floor space. Back to front applications with no specific counterparty data. WE have historical pricing etc but no counterparty names. You could get most of it from Reuters. -----Original Message----- From: Steffes, James D. Sent: Mon 1/28/2002 1:59 PM To: Forster, David; Kitchen, Louise Cc: Subject: Description of UBS Deal How would you describe (in terms that a regulator would understand) what is transfered to UBS? I am asking because I want to make sure that I have a good grasp of what is going to UBS before our FERC pre-meeting. My understanding is that we are providing software code to is used (a) for all backoffice applications and (b) for a trading platform. Anything else? Jim <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: coming to your inbox: mp3 stock spams Luis Hernán Otegui wrote: > We block .avi, .mp3, .mpg, etc. here, because we think it's a waste of > bandwith to share those extensions via email, Voicemail (from a mobile for instance) is quite often sent in .wav or .mp3 format, so we don't just plainly block those. /Per Jessen, Zürich <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [SM-USERS] Slash wrongly encoded as %2F in returning path jimmi61 wrote: > > > Tomas Kuliavas wrote: >> >> Could you test your PHP settings >> (http://www.squirrelmail.org/wiki/TestPHPSettings). Show all settings in >> core, session and mbstring sections. >> > Find the file with the settings here attached. Hope this helps you for > giving me some debugging option. > > Tomas Kuliavas wrote: >> >> If you have enabled some Zend extensions (apc, apd, suhosin, Zend >> optimizer, eaccelerator, turk mmcache), try turning them off. > I don't have such extensions enabled, only those indicated in my previous > message. > > Thanks for your patience ;) > Jimmi > > Your settings are standard. I don't see anything that might explain double encoding. Open /usr/share/squirrelmail/src/compose.php and find lines (477-484) with ---- if ($compose_new_win == '1') { Header("Location: $location/compose.php?mail_sent=yes"); } else { Header("Location: $location/right_main.php?mailbox=$urlMailbox&sort=$sort". "&startMessage=$startMessage"); } ---- replace second Header() call with die() ---- die("Location: $location/right_main.php?mailbox=$urlMailbox&sort=$sort". "&startMessage=$startMessage"); ---- Then try sending reply. Browser should stop and output "Location: some url" text. Check if mailbox name is encoded there twice. Then restore original compose.php. If mailbox name is not encoded twice, name your browser or try reproducing same issue in other browser. If you use some proxy server, try reproducing issue without it. If mailbox is encoded twice, start writing reply again and check page source. How mailbox name is written in '' line near the bottom of compose page source and what is written in '' line. -- View this message in context: http://www.nabble.com/Slash-wrongly-encoded-as--2F-in-returning-path-tp15779008p15856428.html Sent from the squirrelmail-users mailing list archive at Nabble.com. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> hey, are you here? <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: source for pcode FP divide fix? Here's the HB 2.81 pcode with floating point divide fix. This new FLTDIV routine was giving to me by Jon Howell. I just patched the original math library with it and recompiled the pcode. I'm pretty sure this is the same fix that Newton Labs is using. I'm currently testing the recompiled 2.81 version of the pcode and haven't seen any problems yet. Please email me if you see any bugs. I did not change the HB start up message so make a backup copy of your original version of the pcode. If anyone is interested in the RugWarrior pcode version or a version with the new Smooth PWM drivers, let me know and I'll compile those and put them up. You can download a copy from my web site http://www.wenet.net/~jfong in the Design and Ideas section regards Jim Fong At 09:36 AM 11/26/98 -0500, you wrote: > Any chance that the source for the recent pcode FP divide >bugfix can be released so that it could be retrofitted to the 2.81 >freeware source? I'm not suggesting that Newton Labs actually do >the retrofit, just that the source for the patch be released. >Weren't the original FP routines freeware from Motorola? Of course, >there is always the disassembly option ;-) > > *Rich* >-- >Richard F. Drushel, Ph.D. | "Aplysia californica" is your taxonomic >Department of Biology, Slug Division | nomenclature. / A slug, by any other >Case Western Reserve University | name, is still a slug by nature. >Cleveland, Ohio 44106-7080 U.S.A. | -- apologies to Data, "Ode to Spot" > > <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nan attn may conceren dear one christ good day sorry take time disturb mrs susan thompson kuwaiti married late mr eric thompson worked kuwait embassy ivory coast twentysix years died year 2001after brief illness lasted five days married eighteen years duaghter lilian later died motor accident untimely death husbandwe born christians since death decided remarry get child outside matrimonial home bible late husband alive deposited sum us48 four millioneight hundred thousand united states dollars general trust account prime bank abidjan cote divoire presentlythis money still bank recentlyfollowing ill health doctor told may last next eight months due cancer problemthe one disturbs stroke sickness known condition decided donate fund christain organization church individual beleiver utilize money way going instruct hereinaccording desire latehusband death want fund used christain activities likeorphanages christain schools churches propagating word god endeavor house god maintained bible made us understand blessed hand giveth took decision dont child inherit money husband relatives christians dont want husbands efforts used unbelievers dont want situation money used ungodly way taking decision afraid death hence know going know going bosom lord exodus 14 vs 14 says lord fight case shall hold peace dont need telephone communication regard health hence presence husbands relatives around alwaysi dont want know developmentwith god things possible soon receive reply shall give contact bank abidjan also issue documents prove present beneficiary fund want members church always pray lord shephard happiness lived life worthy christian whoever wants serve lord must serve spirit truth please always prayerful life delay reply give room sourcing another person purpose please assure act accordingly stated herein hoping receive reply remain blessed lord christ mrs susan thompson start yahoo auction check cool campaign nan donation mrs susan thompson<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>svn commit: samba r22163 - in branches: SAMBA_3_0/source/rpc_parse SAMBA_3_0_25/source/rpc_parse Author: jra Date: 2007-04-11 05:05:33 +0000 (Wed, 11 Apr 2007) New Revision: 22163 WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=22163 Log: Pure reformatting. I hate 4 space tabstops :-). Jeremy. Modified: branches/SAMBA_3_0/source/rpc_parse/parse_prs.c branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c Changeset: Modified: branches/SAMBA_3_0/source/rpc_parse/parse_prs.c =================================================================== --- branches/SAMBA_3_0/source/rpc_parse/parse_prs.c 2007-04-11 05:01:02 UTC (rev 22162) +++ branches/SAMBA_3_0/source/rpc_parse/parse_prs.c 2007-04-11 05:05:33 UTC (rev 22163) @@ -1456,38 +1456,38 @@ /* useful function to store a structure in rpc wire format */ int tdb_prs_store(TDB_CONTEXT *tdb, TDB_DATA kbuf, prs_struct *ps) { - TDB_DATA dbuf; - dbuf.dptr = (uint8 *)ps->data_p; - dbuf.dsize = prs_offset(ps); - return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE); + TDB_DATA dbuf; + dbuf.dptr = (uint8 *)ps->data_p; + dbuf.dsize = prs_offset(ps); + return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE); } int tdb_prs_store_bystring(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps) { - TDB_DATA kbuf = string_term_tdb_data(keystr); - return tdb_prs_store(tdb, kbuf, ps); + TDB_DATA kbuf = string_term_tdb_data(keystr); + return tdb_prs_store(tdb, kbuf, ps); } /* useful function to fetch a structure into rpc wire format */ int tdb_prs_fetch(TDB_CONTEXT *tdb, TDB_DATA kbuf, prs_struct *ps, TALLOC_CTX *mem_ctx) { - TDB_DATA dbuf; + TDB_DATA dbuf; - prs_init(ps, 0, mem_ctx, UNMARSHALL); + prs_init(ps, 0, mem_ctx, UNMARSHALL); - dbuf = tdb_fetch(tdb, kbuf); - if (!dbuf.dptr) - return -1; + dbuf = tdb_fetch(tdb, kbuf); + if (!dbuf.dptr) + return -1; - prs_give_memory(ps, (char *)dbuf.dptr, dbuf.dsize, True); + prs_give_memory(ps, (char *)dbuf.dptr, dbuf.dsize, True); - return 0; + return 0; } int tdb_prs_fetch_bystring(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps, TALLOC_CTX *mem_ctx) { - TDB_DATA kbuf = string_term_tdb_data(keystr); - return tdb_prs_fetch(tdb, kbuf, ps, mem_ctx); + TDB_DATA kbuf = string_term_tdb_data(keystr); + return tdb_prs_fetch(tdb, kbuf, ps, mem_ctx); } /******************************************************************* Modified: branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c =================================================================== --- branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c 2007-04-11 05:01:02 UTC (rev 22162) +++ branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c 2007-04-11 05:05:33 UTC (rev 22163) @@ -1456,31 +1456,31 @@ /* useful function to store a structure in rpc wire format */ int tdb_prs_store(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps) { - TDB_DATA kbuf, dbuf; - kbuf.dptr = keystr; - kbuf.dsize = strlen(keystr)+1; - dbuf.dptr = ps->data_p; - dbuf.dsize = prs_offset(ps); - return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE); + TDB_DATA kbuf, dbuf; + kbuf.dptr = keystr; + kbuf.dsize = strlen(keystr)+1; + dbuf.dptr = ps->data_p; + dbuf.dsize = prs_offset(ps); + return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE); } /* useful function to fetch a structure into rpc wire format */ int tdb_prs_fetch(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps, TALLOC_CTX *mem_ctx) { - TDB_DATA kbuf, dbuf; - kbuf.dptr = keystr; - kbuf.dsize = strlen(keystr)+1; + TDB_DATA kbuf, dbuf; + kbuf.dptr = keystr; + kbuf.dsize = strlen(keystr)+1; - prs_init(ps, 0, mem_ctx, UNMARSHALL); + prs_init(ps, 0, mem_ctx, UNMARSHALL); - dbuf = tdb_fetch(tdb, kbuf); - if (!dbuf.dptr) - return -1; + dbuf = tdb_fetch(tdb, kbuf); + if (!dbuf.dptr) + return -1; - prs_give_memory(ps, dbuf.dptr, dbuf.dsize, True); + prs_give_memory(ps, dbuf.dptr, dbuf.dsize, True); - return 0; -} + return 0; +} /******************************************************************* hash a stream. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Hi i'm Rita !!! READ MY LIPStick !LIVE From Amsterdam !          This mail is NEVER sent unsolicited, Got it by error ?[ CLICK HERE ] to be removed from our subscribers List !fuclcxlequtkbfuoeseysgfu ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf _______________________________________________ Sitescooper-talk mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/sitescooper-talk <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Mtg w/Rod Shelley, have you scheduled the meeting with Rod to discuss some measurement issues? Raetta & Jodie are asking and I suppose they are preparing materials for you. They must need a timeframe. Let me know and I will put this on your calendar and advise them. Thank you, Ricki <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>FW: Master Netting Agreement F.Y.I. Mark -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: 29 November 2001 08:43 To: Frevert, Mark Subject: Master Netting Agreement Kevin T Howell Dominion Energy Clearinghouse Ph: (804) 273-4848 Fax: (804) 273-4445 __________________ Mark My phone message this morning relates to the Master Netting Agreement that we have been negotiating with your team for the past several days. It is my understanding that the language on both the ISDA and the Master Netting Agreement have been agreed to but Enron is unwilling to sign either under the current circumstances. While we would like to get the ISDA signed and have offered a margin holiday as an incentive, I also see your side of the issue. I would however ask you and your team to separate the two issues and at least sign the Master Netting Agreement. Based on Enron's stated goal to protect its core energy trading business, Dominion is still transacting with Enron. The Master Netting Agreement should be in both of our interest by providing needed liquidity for additional transactions. I believe that everyone in this industry would like to see Enron's energy trading emerge intact and Dominion would like to provide whatever reasonable support we can towards that goal. The Master Netting Agreement is a critical issue for us and represents the centerpiece of out ongoing relationship with Enron. Mark, I realize that your plate is extremely full right now and this issue is not at the top of your list. I would simply ask that you ask the Enron team that has worked on this the past days to remain engaged with our team and bring this to finality. Kevin T Howell Dominion Energy Clearinghouse Ph: (804) 273-4848 Fax: (804) 273-4445 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>daily top 10 vakavuudparadigmgeocom daily top 10 cnncom top videos stories aug 1 2008 358 pm edt top 10 videos 1 mom parties club httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805ngmompicscnn nancy grace new photos casey anthony partying nightclub daughter caylee vanished 2 womans computer spies httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805pkgwebcamspyingwcjb 3 tigers attack teen zoo httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805wuellnertigerattacksteenkytv 4 mistress testifies trial httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805sotlovetrianglezammitticnn 5 man calls 911 sandwich httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805spivey911callsandwichwtlv 6 john junior gotti arrested httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nygottijrhandcuffscnn 7 passengers slide plane httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805voaaplaneevacuatedktla 8 plane evacuates passengers httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nrbeepercaplaneevacuatecnn 9 pipeline firm helps save gas httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805marcianopipelinetelecommutingcnn 10 125000 gorillas found httpwwwcnncomvideopartnersemailindexhtmlurlvideoworld20080805vocongogorillawcs top 10 stories 1 smoke forces emergency landing httpwwwcnncom2008us0805emergencylandingindexhtml passengers evacuate american airlines jet inflatable slides emergency landing los angeles airport official says 2 hopes gorilla survival boosted httpwwwcnncom2008worldafrica0805congogorillasindexhtml 3 stayathome wives without kids httpwwwcnncom2008livingwayoflife0805lwnokidsnojobwivesindexhtml 4 commentary immigrant sanctuaries httpwwwcnncom2008politics0804navarretteimmigrationindexhtml 5 freeman recovering surgery httpwwwcnncom2008showbizmovies0805peoplemorganfreemanapindexhtml 6 john junior gotti arrested httpwwwcnncom2008crime0805gottiarrestindexhtml 7 toxin dims hopes mars life httpwwwcnncom2008techspace0804nasamarsindexhtml 8 lure rrated comedy httpwwwcnncom2008showbizmovies0805filmrratedcomediesapindexhtml 9 starbucks offers afternoon deal httpwwwcnncom2008us0805starbucksdealapindexhtml 10 edouard makes landfall httpwwwcnncom2008usweather0805tropicalweatherindexhtml cnn trusted name news cable news network lp lllp one cnn center atlanta georgia 30303 2008 cable news network lp lllp time warner company rights reserved please send comments suggestions going httpwwwcnncomfeedback read privacy guidelines going httpwwwcnncomprivacyhtml agreed receive email cnncom result cnncom preference settings manage settings go httpwwwcnncomlinktobnmanagehtml unsubscribe daily top 10 go httpcgicnncommclikesmilegvcceaschallengecclcnndailytop10 wed 06 aug 2008 103013 0500 cnncom daily top 10<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nomination for 3 / 21 / 2000 our nomination into eastrans will drop to 60 , 000 mmbtu / d for 3 / 21 / 2000 only . on 3 / 22 / 2000 , it will increase to 75 , 000 mmbtu / d aqnd remain there until further notice . for 3 / 21 / 2000 only , 50 , 000 redelivered via pg & e 7 , 000 from fcv 3 , 000 into your cartwheel agrment at carthage 0 into mobil beaumont . for 3 / 22 and following , same redeliveries as above , except add 15 , 000 into mobil beaumont .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>newton daily analysis exposing best dating program n _ v r ion marketing limitedd 2 23 borrett road mid levels westhong kong ablaze barbell travertine box plantain judith berate hued splotchy mckenzie worthwhile agglutinin harpy spinach peugeot seminole savonarola dry flaxseed suny chime elegy blinn gratuitous marrietta tactician<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>cnn alerts bunkbaantje4windsnet cnn alerts custom alert alert name custom alert die help fri 8 aug 2008 023820 0700 full story agreed receive email cnncom result cnncom preference settings manage settings click alter alert criteria frequency unsubscribe receiving custom email alerts click cable news network one cnn center atlanta georgia 30303 2008 cable news network time warner company rights reserved view privacy policy terms fri 08 aug 2008 054228 0400 cnn alerts custom alert<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [opensuse] /boot and grub with several systems ? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Berthold Gunreben schreef: | I'd propose a different layout. Just create an extra partition for a | primary bootloader with something like 100MB. Boot that bootloader | from MBR and enter several chainloaders into menu.list that boot the | respective systems root partitions. | | Any system should have its own bootloader installed into the root | partition. For Win, it is just a chainloader anyways. This looks as a very good solution to me also... As i am suffering from the everlasting problem, that grub entries dissappear, every once and a while.... | | This procedure has the advantage, that you still can update the kernel | of each respective linux version without touching the primary grub | bootloader. | | ------------ | |primary | --------- | |bootloader|----------|Windows| | ----------- | --------- | | | | ------------ | |----|Bootloader| | | |X0 | | | ------------ | | | | ------------ | |----|Bootloader| | | |X1 | | | ------------ | | | | ------------ | |----|Bootloader| | | |ubuntu | | | ------------ | ...... | | You would have to go through two different bootloaders at boot time, | but this is much easier than updating the kernel for different | distributions in a single partition (especially if those may use | different device names like sda and hda for the same disks). Two bootloaders would not be a problem for me, but what when one installs a new os? It just starts booting the DVD or CD, and afterwards you create another entry in that 'masterbootloader? Now i have a seperate /boot, about 153MB, carrying all kernels and stuff... But than, if i understand your suggestion correctly, the /boot, stays in / of every seperate OS. While this allready present partition could be used to host a 'Master' bootloader? | | Berthold - -- Have a nice day, M9. Now, is the only time that exists. ~ OS: Linux 2.6.22.17-0.1-default x86_64 ~ Huidige gebruiker: monkey9@AMD64x2-sfn1 ~ Systeem: openSUSE 10.3 (x86_64) ~ KDE: 3.5.7 "release 72.6" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4-svn0 (GNU/Linux) Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org iD8DBQFHtarrX5/X5X6LpDgRAv64AKCn+aQpdbXn8AHi5asBTjK7V1H5QwCffihX 69w+Vaci+/MX12qkgO4Y+QE= =/Gcv -----END PGP SIGNATURE----- <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Smoke [5.10.0] 32139 FAIL(XFM) openbsd 4.1 (i386/1 cpu) Automated smoke report for 5.10.0 patch 32139 perlsmoke: AMD Athlon(TM) XP 1800+ ("AuthenticAMD" 686-class, 256KB L2 cache) (1534 MHz) (i386/1 cpu) on openbsd - 4.1 using cc version 3.3.5 (propolice) smoketime 23 hours 54 minutes (average 2 hours 59 minutes) Summary: FAIL(XFM) O = OK F = Failure(s), extended report at the bottom X = Failure(s) under TEST but not under harness ? = still running or test results not (yet) available Build failures during: - = unknown or N/A c = Configure, m = make, M = make (after miniperl), t = make test-prep 32139 Configuration (common) none ----------- --------------------------------------------------------- M - M - M - M - -Duse64bitint X F F F -Duseithreads M - M - -Duseithreads -Duse64bitint | | | +----- PERLIO = perlio -DDEBUGGING | | +------- PERLIO = stdio -DDEBUGGING | +--------- PERLIO = perlio +----------- PERLIO = stdio Locally applied patches: DEVEL SMOKE32139 Failures: (common-args) none [minitest] [minitest] -DDEBUGGING -Duseithreads -Duse64bitint t/op/reg_namedcapture....FAILED--no leader found [minitest] -DDEBUGGING [minitest] -Duse64bitint [minitest] -DDEBUGGING -Duse64bitint t/comp/opsubs............FAILED--expected 36 tests, saw 13 t/op/reg_namedcapture....FAILED--no leader found t/op/switch..............FAILED--expected 108 tests, saw 90 [stdio] -Duseithreads Inconsistent test results (between TEST and harness): ../lib/CPANPLUS/t/15_CPANPLUS-Shell.t...FAILED--no leader found ../ext/Text/Soundex/t/Soundex.t.........FAILED--no leader found ../t/pod/lref.t.........................FAILED--no leader found ../t/pod/for.t..........................FAILED--no leader found ../lib/CPANPLUS/t/00_CPANPLUS-Inc.t.....FAILED--no leader found ../lib/Module/Build/t/compat.t..........FAILED at test 3 ../t/pod/headings.t.....................FAILED--no leader found [perlio] -Duseithreads ../lib/charnames.t......................FAILED 63 Inconsistent test results (between TEST and harness): ../ext/IO_Compress_Zlib/t/109merge-deflate.tFAILED--no leader found ../lib/CPANPLUS/Dist/Build/t/01_CPANPLUS-Dist-Build-Constants.tFAILED--no leader found ../ext/IO_Compress_Zlib/t/107multi-gzip.tFAILED--no leader found ../ext/Text/Soundex/t/Soundex.t.........FAILED--no leader found ../lib/Module/Build/t/install.t.........FAILED at test 23 [stdio] -DDEBUGGING -Duseithreads ../ext/IO_Compress_Zlib/t/106prime-zip.tFAILED ?? ../lib/Module/Build/t/compat.t..........FAILED 23-28 Inconsistent test results (between TEST and harness): ../ext/IO_Compress_Zlib/t/108anyunc-rawdeflate.tFAILED--no leader found ../ext/IO_Compress_Zlib/t/001zlib-generic-gzip.tFAILED--no leader found ../ext/IO_Compress_Zlib/t/103newtied-deflate.tFAILED--no leader found ../ext/Compress/Zlib/t/05examples.t.....FAILED at test 24 ../ext/IO_Compress_Zlib/t/104destroy-rawdeflate.tFAILED--no leader found ../ext/IO_Compress_Zlib/t/107multi-rawdeflate.tFAILED--no leader found ../lib/ExtUtils/t/writemakefile_args.t..FAILED--no leader found ../lib/CPANPLUS/t/05_CPANPLUS-Internals-Fetch.tFAILED--no leader found ../lib/CPAN/t/11mirroredby.t............FAILED--expected 6 tests, saw 0 [perlio] -DDEBUGGING -Duseithreads ../ext/IO_Compress_Zlib/t/010examples.t.FAILED 2-4 Inconsistent test results (between TEST and harness): ../lib/Module/Build/t/metadata2.t.......FAILED--expected 18 tests, saw 0 ../lib/Pod/Simple/t/00about.t...........FAILED--expected 27 tests, saw 24 ../lib/CPANPLUS/t/04_CPANPLUS-Module.t..FAILED--no leader found ../lib/CPANPLUS/t/06_CPANPLUS-Internals-Constants.tFAILED--no leader found ../ext/Compress/Raw/Zlib/t/18lvalue.t...FAILED--no leader found ../lib/CPANPLUS/t/03_CPANPLUS-Internals-Source.tFAILED--no leader found ../lib/IO/Zlib/t/uncomp1.t..............FAILED--no leader found ../ext/Compress/Raw/Zlib/t/02zlib.t.....FAILED--no leader found ../lib/CPANPLUS/t/20_CPANPLUS-Dist-MM.t.FAILED at test 40 ../lib/Archive/Extract/t/01_Archive-Extract.tFAILED--no leader found ../lib/CPANPLUS/t/08_CPANPLUS-Backend.t.FAILED--no leader found ../lib/CPANPLUS/t/00_CPANPLUS-Inc.t.....FAILED--no leader found [minitest] -Duseithreads -Duse64bitint t/run/fresh_perl.........FAILED at test 67 t/op/reg_namedcapture....FAILED--no leader found Compiler messages(gcc): Configure .../tmp//ccl15100.o(.text+0x3e): In function `main': /tmp//ccm26337.o(.text+0x5d): In function `main': /tmp//ccK24756.o(.text+0x1c): In function `xxx': /tmp//ccg21043.o(.text+0xde): In function `main': sv.o(.text+0x1c3b): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x1c3b): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x23e): In function `XS_DynaLoader_dl_load_file': util.o(.text+0x1b3): In function `savestr': str.o(.text+0x5d): In function `str_2ptr': Configure .../tmp//ccq30597.o(.text+0x3e): In function `main': /home/sts/perl-current/UU/try.c:20: warning: sprintf() is often misused, please use snprintf() /tmp//ccNV6886.o(.text+0x5d): In function `main': /home/sts/perl-current/UU/try.c:29: warning: sprintf() is often misused, please use snprintf() /tmp//ccnJ4189.o(.text+0x1c): In function `xxx': /home/sts/perl-current/UU/try.c:29: warning: vsprintf() is often misused, please use vsnprintf() /tmp//ccjv3546.o(.text+0xde): In function `main': /home/sts/perl-current/UU/try.c:52: warning: sprintf() is often misused, please use snprintf() sv.o(.text+0x6f45): In function `Perl_sv_2pv_flags': /home/sts/perl-current/sv.c:2580: warning: sprintf() is often misused, please use snprintf() libperl.a(sv.o)(.text+0x6f45): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x52e): In function `XS_DynaLoader_dl_load_file': /home/sts/perl-current/ext/DynaLoader/DynaLoader.xs:171: warning: strcat() is almost always misused, please use strlcat() util.o(.text+0x283): In function `savestr': /home/sts/perl-current/x2p/util.c:146: warning: strcpy() is almost always misused, please use strlcpy() str.o(.text+0x81): In function `str_2ptr': /home/sts/perl-current/x2p/str.c:32: warning: sprintf() is often misused, please use snprintf() Configure .../tmp//cce16461.o(.text+0x3e): In function `main': /tmp//ccLk9963.o(.text+0x5d): In function `main': /tmp//ccL19040.o(.text+0x1c): In function `xxx': /tmp//ccI18129.o(.text+0xde): In function `main': sv.o(.text+0x2233): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x2233): In function `Perl_sv_2pv_flags': Configure .../tmp//ccv15652.o(.text+0x3e): In function `main': /tmp//ccdeY582.o(.text+0x5d): In function `main': /tmp//ccN28097.o(.text+0x1c): In function `xxx': /tmp//ccI31131.o(.text+0xde): In function `main': sv.o(.text+0x96fd): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x96fd): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x532): In function `XS_DynaLoader_dl_load_file': Configure .../tmp//ccc12502.o(.text+0x3e): In function `main': /tmp//ccEN6026.o(.text+0x5d): In function `main': /tmp//ccR18529.o(.text+0x1c): In function `xxx': /tmp//ccb21658.o(.text+0xde): In function `main': sv.o(.text+0x1d6f): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x1d6f): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x4a6): In function `XS_DynaLoader_dl_load_file': :13:1: warning: "TIME_HIRES_STAT" redefined :12:1: warning: this is the location of the previous definition /libperl.a(sv.o)(.text+0x1d6f): In function `Perl_sv_2pv_flags': Configure .../tmp//ccL20699.o(.text+0x3e): In function `main': /tmp//ccbN1121.o(.text+0x5d): In function `main': /tmp//ccxQ9933.o(.text+0x1c): In function `xxx': /tmp//ccV22915.o(.text+0xde): In function `main': sv.o(.text+0x71d1): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x71d1): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x8ba): In function `XS_DynaLoader_dl_load_file': :15:1: warning: "TIME_HIRES_STAT" redefined :14:1: warning: this is the location of the previous definition /libperl.a(sv.o)(.text+0x71d1): In function `Perl_sv_2pv_flags': Configure .../tmp//ccKx4196.o(.text+0x3e): In function `main': /tmp//ccw30885.o(.text+0x5d): In function `main': /tmp//ccx30459.o(.text+0x1c): In function `xxx': /tmp//cczs1115.o(.text+0xde): In function `main': sv.o(.text+0x23f7): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x23f7): In function `Perl_sv_2pv_flags': libperl.a(DynaLoader.o)(.text+0x4aa): In function `XS_DynaLoader_dl_load_file': Configure .../tmp//ccs29473.o(.text+0x3e): In function `main': /tmp//cct17237.o(.text+0x5d): In function `main': /tmp//ccT17129.o(.text+0x1c): In function `xxx': /tmp//ccx24502.o(.text+0xde): In function `main': sv.o(.text+0x99e1): In function `Perl_sv_2pv_flags': libperl.a(sv.o)(.text+0x99e1): In function `Perl_sv_2pv_flags': -- Report by Test::Smoke v1.20.05 build 1089 running on perl 5.8.8 (Reporter v0.028 / Smoker v0.032) <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [Python-3000] should Python 3's executable install as 'python'? On Wed, Mar 5, 2008 at 1:40 PM, Nick Coghlan wrote: > Guido van Rossum wrote: > > I guess I wasn't clear -- I don't want there to be a target that does > > what install does today. It would be a mistake to use it in 99.99% of > > cases. IOW > > > > install = altinstall > > Leaving it up to packagers for the different distributions to decide if > they want to add the 'python' symlink? That sounds reasonable to me. > > Does this apply to 2.6 as well, or just 3.0? Only 3.0. -- --Guido van Rossum (home page: http://www.python.org/~guido/) _______________________________________________ Python-3000 mailing list [email protected] http://mail.python.org/mailman/listinfo/python-3000 Unsubscribe: http://mail.python.org/mailman/options/python-3000/python-3000%40tangomu.com <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: lynx links and forms in speakup One thing with which I struggled when browsing in *nix is that there is no virtual browse mode. You are pretty much viewing the screen as a sighted person would see it; exactly as the web author intended for it to appear. This is why your arrow keys do not work. Also, this is why we prefer to number links because it is often difficult to tell where the links are. When you are confronted with a new site, read it in its entirety, which is what you should do anyways, then go back to the top and search for what you need with the / (slash) key. ----- Original Message ----- From: "Michael Weaver" To: "Speakup is a screen review system for Linux." Sent: Sunday, June 10, 2007 3:04 AM Subject: lynx links and forms in speakup >I have set the cursor on, forms and links for numbers, user mode to > advanced and underlined links to on so why am I having problem with > links being read out on a line when I use the standard up and down > arrow keys, links being repeated and for example when I go to google, > the form for search isn't announced as if there is no number for the > edit field when doing a search or am I missing something in settings > which is making it more difficult to focus which why I am having > difficulty scrolling down web pages using up and down arrow? > Do I perhaps need to use the speakup keystrokes for navigating through > pages more than I would normally when using a web browser in Windows > where I can go up and down pages with the standard arrow keys and it > reads either text or links depending on where you are on a page rather > than trying to put all the links together and maybe causing a problem > when navigating? > > _______________________________________________ > Speakup mailing list > [email protected] > http://speech.braille.uwo.ca/mailman/listinfo/speakup > > > __________ NOD32 2321 (20070610) Information __________ > > This message was checked by NOD32 antivirus system. > http://www.eset.com > > _______________________________________________ Speakup mailing list [email protected] http://speech.braille.uwo.ca/mailman/listinfo/speakup <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [perl #47045] CLONE_SKIP doesn't result in undef copies On Tue, Oct 30, 2007 at 07:40:27PM -0700, Olly Betts wrote: > "perldoc perlmod" says: > > Like "CLONE", "CLONE_SKIP" is called once per package; however, it is > called just before cloning starts, and in the context of the parent > thread. If it returns a true value, then no objects of that class will > be cloned; or rather, they will be copied as unblessed, undef values. > > But in my tests, the copies are unblessed, but aren't undef. Here's a > simple example: The documentation is ambiguous, but the current behaviour of perl is as designed. References are cloned, but in the child thread they are references to undefined scalars rather than blessed hashes or whatever; eg use threads; sub CLONE_SKIP {1} my $x = bless {}; use Data::Dumper; print Dumper $x; threads->new(sub { print Dumper $x })->join; gives: $VAR1 = bless( {}, 'main' ); $VAR1 = \\undef; However, looking at the code I noticed that there *is* a bug, in that the flags of the new undef scalar aren't zeroed (they're the same as the parent object), so the change below fixes that and tries to improve the documentation: Change 32213 by davem@davem-pigeon on 2007/11/02 23:59:27 [perl #47045] CLONE_SKIP doesn't result in undef copies clarify the documentation on CLONE_SKIP, and ensure that the undef value has all its flags cleared Affected files ... . //depot/perl/pod/perlmod.pod#42 edit . //depot/perl/sv.c#1438 edit Differences ... ==== //depot/perl/pod/perlmod.pod#42 (text) ==== @@ -581,6 +581,9 @@ called just before cloning starts, and in the context of the parent thread. If it returns a true value, then no objects of that class will be cloned; or rather, they will be copied as unblessed, undef values. +For example: if in the parent there are two references to a single blessed +hash, then in the child there will be two references to a single undefined +scalar value instead. This provides a simple mechanism for making a module threadsafe; just add C at the top of the class, and C will be now only be called once per object. Of course, if the child thread needs ==== //depot/perl/sv.c#1438 (text) ==== @@ -10048,8 +10048,7 @@ /* don't clone objects whose class has asked us not to */ if (SvOBJECT(sstr) && ! (SvFLAGS(SvSTASH(sstr)) & SVphv_CLONEABLE)) { - SvFLAGS(dstr) &= ~SVTYPEMASK; - SvOBJECT_off(dstr); + SvFLAGS(dstr) = 0; return dstr; } -- Technology is dominated by two types of people: those who understand what they do not manage, and those who manage what they do not understand. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nan mrs elisabeth lamine abidjan cote divoire phone 00225 07 93 44 19 dear sir wish solicit help migrating country investing funds briefly sierra leonean national wife late dr simon lamine death husband general overseer diamond gold mining corporation kanema sierra leone april 6 2000 military forces loyal government ahmed tijan kabbah invaded diamond gold mine assassinated husband mistaking brother mike lamine deputy leader revolutionary united front ruf foday sankoh news reached hurried gathered valuables family villa escaped dear life company son peters among valuables file contained details deposit husband made security company europe deposited us 155 contained 1 trunk box name son peters containing family valuables disclose real contents box security company rather declared deposit family valuables security reasons money made sale gold diamonds time general overseer need sincere assistance move funds security company europe investment country invest due nearess country war still going besides refugee status help matters us also ask scout viable lucrative business invest wisely mind give 30 total sum 155 million us dollars 20 share investment embark upon assist us also set aside 5 funds ancillary expenses make course transaction air tickets handling expenses etc fortune revealed remain confidential told pleaselet phonefax numbers detials note transaction risk free may god bless assist us sincerely mrs elisabeth peters lamine reply mails box elisabthhknetmailcom _______________________________________________________________________ odomos mosquito protection outside 4 walls click know httprrediffcomrhttpclientsrediffcomodomosodomoshtmodomoswn nan need urgent reply<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: Better send the four boxes of Fastow's deal toys up to legal This is completed. Tammie Schoppe Enron Americas-Office of the Chair Assistant to Louise Kitchen 713.853.4220 office 713.646.8562 fax 713.253.2131 mobile -----Original Message----- From: Kitchen, Louise Sent: Wednesday, January 23, 2002 10:37 PM To: Schoppe, Tammie Subject: Better send the four boxes of Fastow's deal toys up to legal Have them delivered to Jim Derrick and explain that they are Fastow's deal mementoes which were left in his office. I don't think his picture will have reference so we'll keep it for now. Thanks Louise Kitchen Chief Operating Officer Enron Americas Tel: 713 853 3488 Fax: 713 646 2308 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>beavers game tonight i have a few tickets for the portland beavers vs . iowa cubs game - tonight at 6 : 30 p . m . ! ! ! please let me know if you would like to go . extension 7092 patty deas enron north america 503 - 464 - 7092 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>sum : uptalk recently i asked for information on uptalk or high rising terminal . i received many responses from people and a number of useful references . i want to thank the following people for their help : cynthia mclemore janet holmes gregory ward marc picards david britain carolyn buck - gengler laura a . michaelis julia hirschberg and elizabeth whalley i received the following references : allan , scott 1990 . the rise of new zealand intonation . in allan bell & janet holmes ( eds . ) new zealand ways of speaking english . clevedon , avon : multilingual matters . 115-128 . britain , david 1992 . linguistic change in intonation : the use of high rising terminals in new zealand english . language variation & change . vol . 4 , 1 : 77-104 . britain , d & john newman 1992 . high rising terminals in new zealand english . in journal of international phonetic association vol . 22 : 1 / 2 : 1-11 . mclemore , cynthia 1991 . the interpretation of l * h in english . texas linguistic forum 32 : discourse : 175-96 . mclemore , c . 1992 . prosodic variation across discourse types . ircs work - shop on prosody in natural speech . 117 - 128 . hirschberg , j & ward , g . the interpretation of the high-rise question contour in english . soon to appear in the journal of pragmatics . in addition , i received suggestions and support from many people for which i am thankful . sincerely , laurel balyeat <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Oil & gas transaction Term Sheet I have not been able to locate any other term sheets that are tailor-made to purchases of oil and gas properties (most of the documents we have are related to financing someone else's acquisition of properties). However, Nancy Corbet has a template for an oil and gas property purchase and sale agreement that we could review and use to "beef up" our standard LOI and term sheet if you wanted to go that route. Let either of us know if you want to see that document, or if we can help out on the project. Travis C. McCullough Enron North America Corp. 1400 Smith Street EB 824 Houston, Texas 77002 Phone: (713) 853-1575 Fax: (713) 646-8860 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] convert text to exprission good for lm arguments Try: do.call("update", list(data.lm, subset = parse(text = subset))) On 5/3/07, Vadim Ogranovich wrote: > Hi, > > I ran into a problem of converting a text representation of an expression into parsed expression to be further evaluated inside lm (). > > > n <- 100 > > data <- data.frame(x= rnorm (n), y= rnorm (n)) > > data. lm <- lm (y ~ x, data=data) > > > > ## this works > > update(data. lm , subset=x<0) > > Call: > lm (formula = y ~ x, data = data, subset = x < 0) > > Coefficients: > (Intercept) x > -0.07864094193322170023 -0.14596982635007796358 > > > > > ## this doesn't work > > ## text representation of subset > > subset <- "x<0" > > update(data. lm , subset=parse(text=subset)) > Error in `[.data.frame`(list(y = c(-0.601925958140825, -0.111931189071517, : > invalid subscript type > > What is the correct way to convert "x<0" into a valid subset argument? > > Thanks, > Vadim > > [[alternative HTML version deleted]] > > ______________________________________________ > [email protected] mailing list > https://stat.ethz.ch/mailman/listinfo/r-help > PLEASE do read the posting guide http://www.R-project.org/posting-guide.html > and provide commented, minimal, self-contained, reproducible code. > ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : digitals pavel , many thanks for your note . i understand that digitals are not core enron business but as you know , i ' m trying to explore digitals to give , for example , a company a guaranteed income in year one ( to mop up expiring tax losses ) . this is offset by a guaranteed expense in year two . see attached hypothetical example . the digital will reflect an underlying commodity to which a company is exposed to and would be part of a price risk management strategy , thereby giving it ' commercial purpose ' . i would be interested in hearing from you generally on the subject - - the rational for using digitals and your knowledge of its use in other markets ( electricity or other commoodity or in the banking sector ) . it seems to me that setting the srike is key and a ' value judgement ' or am i wrong , and are there curves and models which could help you substantiate this ? in any event , do you have a feel for what an acceptable % of chance or likelihood that a commodity price hits the strike on a digital before it becomes non arm ' s length and does not pass the smell test ? vince , jarek suggested that you may be able to assist . your views would also be appreciated . gillian . from : pavel zadorozhny on 02 / 11 / 2000 15 : 15 cst to : gillian lockwood / lon / ect @ ect cc : subject : digitals digital options are extremely uncommon in the crude oil market . nobody ever asked me to show quotes in the otc market . the only time we encountered them was when producers , brought by our marketing team , wanted to sell a knock - outable swap , whereby they would get a higher swap price in exchange for cancelling the swap if the price settled below a certain level . this structure had a digital put embedded in it , although the customers didn ' t necessarilly know that . the companies were us oil and gas producers : venoco , titan , magnum hunter , patiena oil & gas , belco , central resources . it was about 1 year ago . in the otc market , at about the same time , i asked for quotes to hedge these transactions and sold a digital cal 00 $ 16 swaption to elf and strips of digital puts to somebody else that i cannot recall . i hope this helps . pavel<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Purchase cheap Vacheron Constantin replica watch here Buy the Patek Philippe watch and know everything about time! Christmas Replica Watches Replica watches, pens, bags and more... Cheap luxury gifts ... http://rerandyersyum.com/ <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>anthony tolle pkfrwatpbgmailcom sat mar 8 2008 838 pm steven bethard wrote dont see error thrown either bound unbound methods sorry clarified error occurs wrapping function descriptor wrapping another function heres example python 25 class add_initial_argumentobject def __init__self descriptor callablenone selfdescriptor descriptor selfcallable callable def __get__self obj typenone return add_initial_argumentselfdescriptor selfdescriptor__get__obj type def __call__self args kwargs return selfcallable__call__newarg args kwargs class cobject add_initial_argument def foonewarg self print arg1 newarg print arg2 self cfoo arg1 __main__c object 0x00a900d0 arg2 newarg cfooc traceback recent call last file line 1 file line 11 __call__ typeerror unbound method foo must called c instance first argument got str instance instead also notice bound method still got self first argument see script example recent reply greg ewing im using descriptor wrapping httpmailpythonorgpipermailpython30002008march012428html _______________________________________________ python3000 mailing list smsbmo9552pythonorg httpmailpythonorgmailmanlistinfopython3000 unsubscribe httpmailpythonorgmailmanoptionspython3000python300040tangomucom wed 06 aug 2008 020251 0400 python3000 case unbound methods<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>david c rankin vhdicqcdjjosuddenlinkmailcom av wrote feb 9 2008 924 david c rankin wrote start posting etcx11xorgconf varlogxorg0log output 1 glxinfo run terminal 2 rpm qa grep fglrx also run console files using kde desktop audrius x11videofglrxg01845402 atifglrxg01kmpdefault8454_262216_0102 fine xorg0log option aiglx good indirect rendering enabled rest fine xorgconf fine config looks fine doesnt appear anything would prevent compiz loading 3 things 1 copy following script run command line try start compiz binbash emerald replace sleep 1 libgl_always_indirect1 compiz ignoredesktophints replace indirectrendering nolibglfallback smdisable ccp enter following command line commands single line commands get wrapped works modify fusionicon scripts include needed command line options emerald replace libgl_always_indirect1 compiz ignoredesktophints replace indirectrendering nolibglfallback smdisable ccp ignore hundreds messages get dumped back terminal compiz starts doesnt start handful error may useful 2 doesnt run fgl_glxgears terminal 3 still problems make sure compiz files updated using yastsoftware managementactionsall packagesupdate newer package available probably choose ignore conflicts compiz conflicts x11xgl repository run rpm qa grep compiz console post output good luck david c rankin jd pe rankin law firm pllc 510 ochiltree street nacogdoches texas 75961 telephone 936 7159333 facsimile 936 7159339 wwwrankinlawfirmcom tue 05 aug 2008 183058 0600 opensuse suse 103 ati firegl 5250 latest ati driver 3d efects<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>on his face , framed hello , our bank has approovved your mrtgage request . you can r e finance , buy a new house or maybe get some cash . do not worry about bad creddit : we got you covered . the soonest you apply , the better deal you get . it is possible to get $ 300 , 000 for $ 250 per month . thank you and apply here : http : / / www . latne . com / belinda b . meza<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>eSource Presents Briefings with Senior Industry Analysts - Energy and Telecom/Broadband A Dialogue with Frost & Sullivan's Senior Industry Analyst, Energy Markets & Industry Analyst and Program Lead, Telecom and Bandwidth Services Thursday, November 1st eSource is pleased to host our first Analyst Summit to share insights into the Energy and Telecom/Bandwidth Markets Please join Patti Harper-Slaboszewicz, Senior Industry Analyst, Energy Markets & Rod Woodward, Industry Analyst, Telecom Services & Program Lead, Wholesale Services He has authored a report on U.S. Bandwidth Services (Trading/Brokering/Online Exchanges) Download report for free at http://esource.enron.com/hot_topics.asp at 3:30 - 5:30 PM EB 5C2 Each presentation will last 35 minutes with 20 minutes Q&A Agenda - Energy 3:30-4:30 � Frost & Sullivan capabilities - 10 minutes � Energy speaker: New Region Challenges for Retail Electric Providers - 25 minutes Development of transactional capability Acquiring customers Quick survey of offers online in ERCOT region Rate offerings will be limited by current meter capabilities ERCOT Retail Providers Forecasting load � Questions & Answers - 20 minutes Agenda - Telecom/Broadband 4:30-5:30 � Frost & Sullivan capabilities - 10 minutes � Telecom/Broadband speaker: Industry Insights - 25 minutes Role of "Utilicom"/Energy providers in telecom Overall wholesale market perspective Overview of data services market Insight and update on bandwidth trading services � Questions & Answers 20 minutes Please RSVP to Stephanie E. Taylor at 5-7928 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>engwgjnrcca want conquer heart httpxamedmalworldcom thu 07 aug 2008 110949 0700 wide selection popular goods health online<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[PATCH] Porting/Maintainers.pm --check added functionality This patch extends the functionality of perl Porting/Maintainers --check --check checks for duplicates (as present) --check file checks if file has a maintainer --check dir checks if all files in dir have a maintainer For example, I used perl -w Porting/Maintainers --check lib/ExtUtils/t to check that my previous patch (to Porting/Maintainers.pl) had not accidentally missed any of the contents of lib/ExtUtils/t (some test files belong to ExtUtils::MakeMaker some to ExtUtils::Manifest) Robin Barker Mathematics and Scientific Computing group <> ------------------------------------------------------------------- This e-mail and any attachments may contain confidential and/or privileged material; it is for the intended addressee(s) only. If you are not a named addressee, you must not use, retain or disclose such information. NPL Management Ltd cannot guarantee that the e-mail or any attachments are free from viruses. NPL Management Ltd. Registered in England and Wales. No: 2937881 Registered Office: Serco House, 16 Bartley Wood Business Park, Hook, Hampshire, United Kingdom RG27 9UY -------------------------------------------------------------------<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>ȭ����ı�ɻ� �ηº���!! â��1����~����Ͻø� �䳪�ɴϴ�@ pu wbg ql m uarg tz tinnb axhil<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>rabi de fyi send written offer package verbal offer issues resolved final offer made like put details writing send tuesday delivery playing phone tag regarding details follow morning thanks toni grant masson ect 09 15 2000 11 24 toni graham corp enron enron cc norma villarreal hou ect ect vince j kaminski hou ect ect subject rabi de toni talked rabi sitting fence good reasons weigh fairly comfy job situation one starts lower level potential wrt green vince verbally offered salary 105 k plus guarantee bonus year end would minimum 15 k cash addition 15 k sign bonus vince said would bother working revised offer letter unless rabi came back verbal ok ponder offer probably days get back us may well call discuss exact details benefits esop 401 k contributions etc regards grant<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Good morning. How are things? You guys still planning your happy hour on Friday? <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>was haynesville till cleelum Trading 0pportunity For You! Promoting sym: WDSCPrice: $0.015 5 Day Target price: $0.075Action: Strong buy... SOMEBODY KNOWS SOMETHING!!! See the hottest news of the WDSC, manager, call your broker!. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] Accessing R applications from Web I guess you would have to do all those step for a Internet based portal, but if you just want to have a web interface on a _Intranet_ portal where you trust your users, you can use Rpad which is much easier in that you don't really have to write any code, just do the install procedure. There is a Google group for Rpad as well, if you have more questions about it. HTH, Roger -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of John McNeil Sent: Thursday, April 19, 2007 11:42 AM To: d.sarthi maheshwari Cc: [email protected] Subject: Re: [R] Accessing R applications from Web Sarthi, I have done what you describe using PHP and R on a linux server. Basically, you follow these steps: - Create a form to gather input - Parse input from the form with PHP into a file that R can read - Run R commands from PHP with exec(). - Convert the postscript output to an image a web browser can read, - Use HTML/PHP to format the output with a link to the image I learned to do this by studying Alfredo Pontillo and Angelo Mineo's R-php (http://dssm.unipa.it/R-php). Specifically, look at the file pages/result/index.php They have done lots of other good stuff in their project, like filtering dangerous commands - you would not want to let a user just type in any R code, because they could seriously damage your server. However, if you keep the R code on the server, and just parse numeric or string inputs, you can take the simple approach described above. You will need to install GhostScript (http://www.gnu.org/software/ ghostscript/ghostscript.html) and ImageMagick (http:// www.imagemagick.org/) on your server for the image conversion Feel free to email me directly if you have problems John http://www.labsynch.com On Apr 19, 2007, at 2:46 AM, d. sarthi maheshwari wrote: > Hi > > I am trying to provide web interface to my R application. My > requirements are simple and can be written down as follows : > > 1) User must provide all the input parameters on web interface. > 2) Based on the input values, R will do some computations. > 3) Project the numerical results as well as plots as html page to the > user on web. > > Kindly tell me which package can help me in doing this. Your help > would be highly appreciated. > > -- > Thanks & Regards > Sarthi M. > > [[alternative HTML version deleted]] > > ______________________________________________ > [email protected] mailing list > https://stat.ethz.ch/mailman/listinfo/r-help > PLEASE do read the posting guide http://www.R-project.org/posting- > guide.html and provide commented, minimal, self-contained, > reproducible code. ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code. ********************************************************************** * This message is for the named person's use only. It may contain confidential, proprietary or legally privileged information. No right to confidential or privileged treatment of this message is waived or lost by any error in transmission. If you have received this message in error, please immediately notify the sender by e-mail, delete the message and all copies from your system and destroy any hard copies. You must not, directly or indirectly, use, disclose, distribute, print or copy any part of this message if you are not the intended recipient. ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code. <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: "require" question > When I see code that starts with: > > require 5.6.0; > > Does that mean that the version of Perl can be 5.6.0 > and above or that > it *has to be* 5.6.0? ...that version and above see the output from; perldoc -f require ____________________________________________________________________________________ It's here! Your new message! Get new email alerts with the free Yahoo! Toolbar. http://tools.search.yahoo.com/toolbar/features/mail/ -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected] http://learn.perl.org/ <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>metallurgist email loading ingenuous therein success entourage immaculate perseverance autocratic loudspeaking catalytic grief regressive boniface schizoid depositor cowpox cylindric fermion doleful den ailanthus crevice aniseikonic cartographer rendezvous alps demurring aylesbury snick aaron hairpin fruehauf brook lutanist<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>volume ii technical corner collection sam partial list people would like send volumes volume 1 2 winokur enron board member shirley address jeff skilling ken lay mark frevert greg whalley rick buy jeff shankman john lavorato dave delainey shall write cover letter also add additional volume kaminski columns 10 copies including bios contributions would like show depth talent group vince enron north america corp william smith enron 01 09 2001 01 07 pm vince j kaminski hou ect ect cc subject volume ii technical corner collection vince successfully integrated martin article volume ii following mike instructions reproduction also additional volume printed would mind disposing set gave want things get confused also 20 volume 60 volume ii please let know many personally need deliver office thank sam<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: Number of rejections exploded Robert Fitzpatrick wrote: > On Tue, 2008-02-26 at 12:37 +0100, Ralf Hildebrandt wrote: >> * Robert Fitzpatrick : >> >>> Feb 26 05:46:18 esmtp postfix/smtpd[96399]: NOQUEUE: reject: RCPT from >>> BBNMAINSERVER.bluebonnetnutrition.com[207.91.172.154]: 450 4.1.1 >>> : Recipient address rejected: undeliverable >>> address: host x.x.x.x[x.x.x.x] said: 553 5.3.0 >> Why 450 instead of 550 if the user is unknown?! > > Yes, why? Did you see my postconf -n posted earlier? I have... > > unknown_local_recipient_reject_code = 550 > > These are not local recipients? Is there a unknown_recipient_reject_code > parameter? This is a gateway delivering mail via transport map. > No, these are not local recipients. unknown_recipient_reject_code is for unknown local or virtual recipients. This recipient is determined to be invalid by reject_unverified_recipient. please see http://www.postfix.org/postconf.5.html#unverified_recipient_reject_code http://www.postfix.org/ADDRESS_VERIFICATION_README.html -- Noel Jones <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[email protected], Your PowerPlus Card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card trmedia320072405 ______________________________________________________ To stop receiving emails, click here <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>office xp - $ 60 convenes permian even is story . live together store went where grass . pull , your , large . yes then north , stick said . number produce thing , hair corner , play , basic . air may figure . view house then which , ready . collect clear with . wide arm what , industry , sound , clear talk . job distant , keep fit . sense quick would seem , take . i row , and . sound , decimal color work coast friend . ride east sand took . believe him then , modern , old catch like . <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>6 1071 disc paul foulkes paul foulkes newcastle ac uk writes hinitial forms feminine pronoun alive necessarily well various parts britain elsewhere guess usually restricted rural areas conservative speakers parts derbyshire example retain form typically written naturally normally regarded misuse possessive pronoun dialect maps eg orton often deal pronouns replies thanks interest search 17 dialects piers plowman justly criticized constrained sampling nonetheless manuscripts show great varieties within dialects hstems feminine singular three plurals exist alongside newer forms hstem least likely occur dual system pronouns seen across manuscripts old pronouns new plan discuss em phenomenon perhaps little er ey hless survivals stressless positions following sent nice statement saying regarding survival hstem feminine might interested know h forms still survive modern traditional dialect least holding 1950s early 60 time survey english dialects h dropping areas concerned left h n w midland area comprising cheshire n derbyshire lancashire w yorkshire believe subject forms w midlands w derive oe h nominative rather modern objective oblique form paper p duncan forms feminine pronoun modern english dialects wakelin ed patterns folk speech british isles london 1972 182200 two notes historical usage 1 neuter singular shared masculne singular form see oed neuter 1755 formerly applied neuters place supplied johnson grammar 2 16th 17th centuries also occurs would preferred oed 86d french _ c est _ construction seems influenced english grammar curious result examining different lines across manuscripts piers proverbial sometimes seen feminine morphology posted examples linguistic explanation phenomenon understood following evolution older english pronoun paradigm modern one one feminine associated allgenders plural masculine associated singular neuter<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: PDF File On May 26, 4:34 am, [email protected] (Alma) wrote: > On May 25, 10:16 pm, [email protected] ([email protected]) > wrote: > > > > > On May 24, 5:59 pm, "[email protected]" wrote: > > > > On May 24, 2:22 pm, Alma wrote: > > > > > Hi All, > > > > > I need to store the files > > > > What files? Where are the before you "store" them? > > > > > in a directory '/home/user/cgi-bin/{today's > > > > Date} > > > > I am able to creata a folder on daily bases . > > > > If that bit's not a problem why do you mention it? > > > > > I am struggling to create a subroutine that stores the uploaded pdf > > > > file into this today's date directory. > > > > Can you explain why you think this would be different for a PDF file > > > than for any other sort of file? > > > > Can you be more precise about the nature of the diffiulty you are > > > having? What have you tried? How did it fail? > > > > What do you mean "uploaded"? Is this perhaps a stealth CGI question? > > > > If this is a stealth CGI question have you looked at the examples in > > > the CGI docmentation? Is there somthing in there you think is unclear? > > > Remember as a beginner you are uniquely qualified to tell us when the > > > documentation is unclear. > > > > Actually looking a the documentation it's poor! > > > > It mentions binmode() too late and uses the 2-arg open without > > > checking for errors. > > > > I would actually use File::Copy. > > > > copy(upload('uploaded_file'),"/wherever/$date/$filename") or die $!; > > > > You will, of course, have to do something to make sure $filename is > > > unique. > > > > > & if i need to read the pdf file > > > > What do you mean by "read the pdf file"? Do you mean you actually want > > > to parse it and extract info? Look on CPAN for modules with PDF in > > > their name. > > > > > should i be using open file or infile command? > > > > What is "infile command"? > > > Try this out, there are some changes to the other post. > > > #!/usr/bin/perl -w > > > use strict; > > use File::Copy; > > use Time::Local; > > > my $destination_folder = "cgi-bin\\\\"; # path to destination folder > > my $source_folder = "C:\\\\Programming\\\\test_bed_perl\\\\"; #path to > > source folder > > > # add extensions to select those files for copying eg. *.pl would > > select file with .pl only. Can select > > # multiple extensions ("*.*, *.pls) > > my $file_extensions = "*.pdf"; > > > my($day, $mon, $yr) = (localtime)[3, 4, 5]; > > my $daily_folder = $day . "_" . ($mon + 1) . "_" . ($yr + 1900) ."\\\\"; > > # check epoch if you are going to use date as dir name (UNIX $yr + 30 > > i think) > > my $start = timelocal(0, 0, 0, $day, $mon, $yr); # 00:00 this morning > > my $stop = $start + (24 * 60 * 60 ) - 1; # 23:59:59 > > > chdir $destination_folder or die "cannot change dir"; > > mkdir "$daily_folder"; > > print "directory created: ${destination_folder}${daily_folder}\\n"; > > > grep { > > if ($_ ne $0){ > > copy("${source_folder}$_", "${destination_folder}${daily_folder}$_") > > or die "Could not copy source file: $!\\n"; > > print "copying ${source_folder}$_ -> ${destination_folder}$ > > {daily_folder}$_\\n"; > > unlink("${source_folder}$_") or die "Could not delele source files: > > $!\\n"; > > print "deleting ${source_folder}$_\\n\\n"; > > } > > > } @{&find_files}; > > > sub find_files{ > > my @files; > > > chdir $source_folder; > > grep{ > > my $timestamp = (stat $_)[9]; > > push @files, $_ if $timestamp >= $start && $timestamp <= $stop; > > } glob $file_extensions; > > > return \\@files; > > > } > > > edit the $destination_folder and $source_folder to the directories you > > want the files moved to and the original location of the uploads. you > > can also edit $file_extensions if you want to filter for a specific > > extension eg. ".pdf". > > > Can you give me an indication of what you want to do with the opened > > pdf? > > Thanks a Lot. I do not need to perform any editing tasks on pdf. my > requirement is just to upload a pdf & then i need to open it for the > read purpose only. Unfortunately i haven't had any experience working with PDF's and im too lazy to read through the documentation. Try looking at CAM::PDF, PDF::API2. I think those perldocs should have what youre looking for. -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected] http://learn.perl.org/<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : louise have a few questions on the list of key personnel you gave to me 1 . there is a " will " listed - sorry but i don ' t see anyone with this last name in my list . 2 . there is a " woulfe " listed - i couldn ' t find this so i presumed this to be " wolf " - am i correct . 3 . also , there were a few people on your list who are analysts or trading assistants - rotation 2 . is it correc that these are people we would deem key , ie . , potential provide incentives to stay in order to ensure the business ' success ? 4 . brad mackay was listed twice - fyi many thanks colette - - - - - original message - - - - - from : louise . kitchen sent : wednesday , january 09 , 2002 4 : 52 pm to : dow , colette cc : louise . kitchen subject : spoke to the deal team - they understand the economics and have gone to speak to bill . this e - mail is the property of enron corp . and / or its relevant affiliate and may contain confidential and privileged material for the sole use of the intended recipient ( s ) . any review , use , distribution or disclosure by others is strictly prohibited . if you are not the intended recipient ( or authorized to receive for the recipient ) , please contact the sender or reply to enron corp . at enron . messaging . administration @ enron . com and delete all copies of the message . this e - mail ( and any attachments hereto ) are not intended to be an offer ( or an acceptance ) and do not create or evidence a binding and enforceable contract between enron corp . ( or any of its affiliates ) and the intended recipient or any other party , and may not be relied on by anyone as the basis of a contract by estoppel or otherwise . thank you . visit our website at http : / / www . ubswarburg . com this message contains confidential information and is intended only for the individual named . if you are not the named addressee you should not disseminate , distribute or copy this e - mail . please notify the sender immediately by e - mail if you have received this e - mail by mistake and delete this e - mail from your system . e - mail transmission cannot be guaranteed to be secure or error - free as information could be intercepted , corrupted , lost , destroyed , arrive late or incomplete , or contain viruses . the sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e - mail transmission . if verification is required please request a hard - copy version . this message is provided for informational purposes and should not be construed as a solicitation or offer to buy or sell any securities or related financial instruments .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>penis growth extreme penis growth extreme http : / / www . xunepa . com / ss / necessity , who is the mother of invention . kindness causes us to learn , and to forget , many things . education is a method whereby one acquires a higher grade of prejudices . the prime purpose of eloquence is to keep other people from talking . art washes away from the soul , the dust of everyday living .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>brenton hargrove a9caegeeerlangende hello bored evening nice girl would like chat email elsamorerdcom using friends email write mind sending pictures wed 06 aug 2008 145813 0400 id like show pic<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>relay through gmail I have 1 dynamic IP address at dyndns.com (xxx.dyndns.com) and 1 gmail account ([email protected]) And I successfully setup my postfix so that when I send mail to outside, my postfix will relay through [email protected]. When recipients received my mails and open them, the mail address in "from" of theses mails is [email protected], not [email protected]. So I want to change so that when recipients received my mails and open them, the mail address in "from" of theses mails is [email protected], not [email protected]. Is there a way to do that? Regard, ---------------------------------- Below is my config related to above content: relayhost = smtp.gmail.com smtp_use_tls = yes smtp_sasl_auth_enable = yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_security_options = noanonymous smtp_tls_CAfile = /etc/postfix/ssl/ThawtePremiumServerCA.pem <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>This is the lat-est weekly-special that you definitely shouldn't miss. You have the best chance to s.ave. Check our most recent weekly special and pocket the extra bucks from our site. Your casefile will be checked by appraised advisers in an expeditious way. And it is gratis as you place the or.der. With leading medicines in various categories, cyberzone has fantastic options. What you pick is reliable and expeditious carriage works. You can always select quality ones on Analgesics, ErectileDysfunctions, Blues, SeverePhobia, Man's care, SleepingDysfunctions, OverWt. and others. Review all the bestofffers on rnedicals at our chemist-site. http://2A.mvcl.partandside.com/31p/ In an old war song, called "The King of England's Son," it says: in Louisa's room would be sufficient for her, if Mrs Harville hoping for them twelve hours sooner, and seeing them arrive at last, <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[ auto - reply ] special report reveals this smallcap rocket stocks newsletter first we would like to say thank you to al | of our avid readers ! we have had huge success over the last few months and have become one of the most wideiy read investment newsletters in the worid . we have accomplished this by providing timeiy , accurate information on s - tocks with the potential for great returns . rocket s - tocks is not your father ' s investment newsietter ! we focus on s - tocks with the potentia | to go up in value by weil over 5 oo % . that ' s what it takes to make it on to our | ist . these are s - tocks for the risk toierant investor ! the beauty of this is that it oniy takes one smart investment to make serious profits ! new deveiopments expected for intelligent sports , inc . s - tock from $ o . 01 to over $ o . 08 symbo | : igts . pk current price : $ 0 . 01 short term target price : $ o . o 8 12 month target price : $ o . 17 intelligentsports . net we love these small companies . a company | ike this is | ike a siigshot , pu | | ed back and ready to go . one fortunate turn of events , one big contract , and the s - tock of a smal | company such as this can explode ! read on to find out why igts . pk is our top pick this week . * * * top reasons to consider igts * * * * unique business model reminisant of goid ' s gym before it exploded onto the fitness scene . * the numbers are staggering and continue to rise daiiy . 15 % of children / adoiescents are overweight nationwide . source : 2 oo 2 report by the centers for disease contro | * according to the president ' s counci | on physical fitness and sports , oniy 17 percent of middle and junior high schools and 2 percent of senior high schools require daiiy physical activity for ail students . igts is | ooking to fill that gap . * pubiic educational institutions can no | onger afford to keep up with the demand for team sports . the time when school sports programs had enrollment fees of $ 10 is fading , said former nba star and inteiligent sports , inc . board member , reggie theus . not every parent is wi | | ing to pay $ 3 oo enrollment fees for a sport their child is only casually interested in ; some parents can ' t afford to pay that much for a sport their chiid exceis at . * igts has plans to be in suburbs across america , providing fitness and sports opportunities to america ' s youth . * igts ' s proven business is ready for expansion . * news ! news ! news ! here is recent news on the company : upland , caiif . - - ( business wire ) - - june 17 , 2 oo 5 - - inteliigent sports , inc . , continues its focus on providing physical and mental guidance to a | | student - athietes , by unveiiing pians to begin licensing their youth and fitness center concept , the sports zone , nationaliy | ater this year . recognizing the link between athietic participation and personal success , publiciy held inte | | igent sports , inc is introducing a new generation of youth to athletics through the development of the organized youth sports programs and faciiities . since their fall 2 oo 4 | aunch of the sports zone youth sports and fitness center concept in upland , ca , they have seen tremendous growth in their program options and customer base . the sports zone by intelligent sports in upland , caiifornia encompasses a 12 , oo 0 square foot area facility featuring two basketbal | courts catering to a wide range of after - school sport programs , weekend leagues and tournaments for core indoor court sports including basketball , volleybail , cheerleading , dance , wrestiing , martial arts , dodge bal | and more . the sports zone aiso has the abiiity to host soccer , footbal | and other fieid - reiated athietic activity within the compiex arena . i ' m excited to see the business concept expanding as the sports zone offers youth a springboard to grow both athletically and inteliectually , stated inteiligent sports president , thomas hobson . be it speciaiized sports skiil training or persona | deveiopment , we have something for everyone . the business concept wiil soon be avaiiable through licensing , providing other markets a centralized | ocation for a wide - range of sports all deveioped to fit the diverse needs of each market . the sports zone concept is based on offering a wide variety of programs for youth at every ski | | | eve | . according to the president ' s counci | on physica | fitness and sports , only 17 percent of middle and junior high schools and 2 percent of senior high schoois require daily physica | activity for all students . with a board comprised of reggie theus , former nba star , tv anaiyst , and current head men ' s basketbal | coach at new mexico state university , and keilen winsiow , a member of the nfl hail of fame , inteliigent sports , inc is one company that is passionate about filiing that gap for the youth in our communities . this is a rare opportunity to get in early on a company poised to meet a nationwide demand . we beiieve this s - tock has huge potentia | for a rapid price increase . we beiieve the speculative near term target price is - $ 0 . o 8 we beiieve the speculative long term target price is - $ 0 . 17 please watch this one trade monday ! ! disclaimer : information within this emai | contains forward looking statements within the meaning of section 27 a of the securities act of 1933 and section 21 b of the securities exchange act of 1934 . any statements that express or invoive discussions with respect to predictions , expectations , beliefs , pians , projections , objectives , goals , assumptions or future events or performance are not statements of historical fact and may be forward looking statements . forward | ooking statements are based on expectations , estimates and projections at the time the statements are made that involve a number of risks and uncertainties which couid cause actual results or events to differ materia | | y from those presently anticipated . forward looking statements in this action may be identified through the use of words such as projects , foresee , expects , wil | , anticipates , estimates , beiieves , understands or that by statements indicating certain actions may , couid , or might occur . as with many micro - cap s - tocks , today ' s company has additional risk factors worth noting . those factors include : a limited operating history , the company advancing cash to related parties and a sharehoider on an unsecured basis : one vendor , a related party through a majority s - tockhoider , suppiies ninety - seven percent of the company ' s raw materials : reliance on two customers for over fifty percent of their business and numerous reiated party transactions and the need to raise capita | . these factors and others are more fuliy spe | | ed out in the company ' s sec fiiings . we urge you to read the fiiings before you invest . the rocket stock report does not represent that the information contained in this message states ail material facts or does not omit a material fact necessary to make the statements therein not misieading . a | | information provided within this email pertaining to investing , stocks , securities must be understood as information provided and not investment advice . the rocket stock report advises ail readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this email . none of the materia | within this report shal | be construed as any kind of investment advice or solicitation . many of these companies are on the verge of bankruptcy . you can lose all your money by investing in this stock . the publisher of the rocket stock report is not a registered investment advisor . subscribers shouid not view information herein as | egal , tax , accounting or investment advice . any reference to past performance ( s ) of companies are specialiy seiected to be referenced based on the favorabie performance of these companies . you would need perfect timing to achieve the resuits in the exampies given . there can be no assurance of that happening . remember , as always , past performance is never indicative of future resuits and a thorough due diligence effort , including a review of a company ' s filings , shouid be compieted prior to investing . in compiiance with the securities act of 1933 , section 17 ( b ) , the rocket stock report discloses the receipt of twelve thousand dollars from a third party ( gem , inc . ) , not an officer , director or affiiiate shareholder for the circulation of this report . gem , inc . has a position in the stock they wiil sel | at any time without notice . be aware of an inherent conflict of interest resulting from such compensation due to the fact that this is a paid advertisement and we are conflicted . ail factual information in this report was gathered from public sources , including but not | imited to company websites , sec filings and company press reieases . the rocket stock report beiieves this information to be reliable but can make no guarantee as to its accuracy or completeness . use of the material within this email constitutes your acceptance of these terms . if you wish to stop future mailings , piease mai | to newsoffl @ yahoo . com <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>svn commit: samba r23058 - in branches/SAMBA_4_0/source/libcli/cldap: . Author: tridge Date: 2007-05-22 00:43:10 +0000 (Tue, 22 May 2007) New Revision: 23058 WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=23058 Log: the cldap code was getting too intimate with the internals of struct asn1_context. A hangover from when it wasn't a allocated structure Modified: branches/SAMBA_4_0/source/libcli/cldap/cldap.c Changeset: Modified: branches/SAMBA_4_0/source/libcli/cldap/cldap.c =================================================================== --- branches/SAMBA_4_0/source/libcli/cldap/cldap.c 2007-05-21 23:35:14 UTC (rev 23057) +++ branches/SAMBA_4_0/source/libcli/cldap/cldap.c 2007-05-22 00:43:10 UTC (rev 23058) @@ -100,7 +100,6 @@ talloc_free(tmp_ctx); return; } - talloc_steal(tmp_ctx, asn1->data); ldap_msg = talloc(tmp_ctx, struct ldap_message); if (ldap_msg == NULL) { @@ -129,8 +128,7 @@ return; } - req->asn1 = asn1; - talloc_steal(req, asn1->data); + req->asn1 = talloc_steal(req, asn1); req->asn1->ofs = 0; req->state = CLDAP_REQUEST_DONE; @@ -312,6 +310,10 @@ req->timeout = io->in.timeout; req->num_retries = io->in.retries; req->is_reply = False; + req->asn1 = asn1_init(req); + if (!req->asn1) { + goto failed; + } req->dest = socket_address_from_strings(req, cldap->sock->backend_name, io->in.dest_address, lp_cldap_port()); @@ -376,6 +378,10 @@ req->cldap = cldap; req->state = CLDAP_REQUEST_SEND; req->is_reply = True; + req->asn1 = asn1_init(req); + if (!req->asn1) { + goto failed; + } req->dest = io->dest; if (talloc_reference(req, io->dest) == NULL) goto failed; <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] deleting lines and row small than a value I am not sure what your matrix looks like, but here is some code that will check each row and then delete those rows with any value < .7: > set.seed(1) > data <- matrix(runif(100,0,10), 10) > data [,1] [,2] [,3] [,4] [,5] [,6] [,7] [,8] [,9] [,10] [1,] 2.6550866 2.059746 9.3470523 4.820801 8.2094629 4.7761962 9.1287592 3.390729 4.346595 2.3962942 [2,] 3.7212390 1.765568 2.1214252 5.995658 6.4706019 8.6120948 2.9360337 8.394404 7.125147 0.5893438 [3,] 5.7285336 6.870228 6.5167377 4.935413 7.8293276 4.3809711 4.5906573 3.466835 3.999944 6.4228826 [4,] 9.0820779 3.841037 1.2555510 1.862176 5.5303631 2.4479728 3.3239467 3.337749 3.253522 8.7626921 [5,] 2.0168193 7.698414 2.6722067 8.273733 5.2971958 0.7067905 6.5087047 4.763512 7.570871 7.7891468 [6,] 8.9838968 4.976992 3.8611409 6.684667 7.8935623 0.9946616 2.5801678 8.921983 2.026923 7.9730883 [7,] 9.4467527 7.176185 0.1339033 7.942399 0.2333120 3.1627171 4.7854525 8.643395 7.111212 4.5527445 [8,] 6.6079779 9.919061 3.8238796 1.079436 4.7723007 5.1863426 7.6631067 3.899895 1.216919 4.1008408 [9,] 6.2911404 3.800352 8.6969085 7.237109 7.3231374 6.6200508 0.8424691 7.773207 2.454885 8.1087024 [10,] 0.6178627 7.774452 3.4034900 4.112744 6.9273156 4.0683019 8.7532133 9.606180 1.433044 6.0493329 > less.7 <- apply(data, 1, function(x) any(x < .7)) > less.7 [1] FALSE TRUE FALSE FALSE FALSE FALSE TRUE FALSE FALSE TRUE > data[!less.7,] [,1] [,2] [,3] [,4] [,5] [,6] [,7] [,8] [,9] [,10] [1,] 2.655087 2.059746 9.347052 4.820801 8.209463 4.7761962 9.1287592 3.390729 4.346595 2.396294 [2,] 5.728534 6.870228 6.516738 4.935413 7.829328 4.3809711 4.5906573 3.466835 3.999944 6.422883 [3,] 9.082078 3.841037 1.255551 1.862176 5.530363 2.4479728 3.3239467 3.337749 3.253522 8.762692 [4,] 2.016819 7.698414 2.672207 8.273733 5.297196 0.7067905 6.5087047 4.763512 7.570871 7.789147 [5,] 8.983897 4.976992 3.861141 6.684667 7.893562 0.9946616 2.5801678 8.921983 2.026923 7.973088 [6,] 6.607978 9.919061 3.823880 1.079436 4.772301 5.1863426 7.6631067 3.899895 1.216919 4.100841 [7,] 6.291140 3.800352 8.696908 7.237109 7.323137 6.6200508 0.8424691 7.773207 2.454885 8.108702 > On 5/24/07, Milton Cezar Ribeiro wrote: > > Hi there > > I made a correlation matrix from my data frama and I would like to delete > all lines/rows when r-value is smaller than 0.7 > > How can I do that? > > Kind regards, > > Miltinho > > __________________________________________________ > > > [[alternative HTML version deleted]] > > ______________________________________________ > [email protected] mailing list > https://stat.ethz.ch/mailman/listinfo/r-help > PLEASE do read the posting guide > http://www.R-project.org/posting-guide.html > and provide commented, minimal, self-contained, reproducible code. > -- Jim Holtman Cincinnati, OH +1 513 646 9390 What is the problem you are trying to solve? [[alternative HTML version deleted]] ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Average to optimize the compression of low-level noise by averaging the color values of adjacent pixels. [] The terrible epidemic of pacification which subsequently swept through Western Europe aroused new hopes of success through a bloodless revolution in the hearts of the Soviet General Staff. But you tell me what it is you want. She often took me out of my box, at my own desire, to give me air, and show me the country, but always held me fast by a leading-string. Ave Mar was now faced with the impossible-to drag the gigantic Gor Terr out of the quagmire. Authoritative Server A server that knows the content of a DNS zone from local knowledge, and thus can answer queries about that zone without needing to query other servers. Aunt Petunia wasn't, eating anything at all. Ave Mar took a deep breath. Ave, ave, ave, Maria. Note that the following sections will not assume that ds is equal to ss. Remind him of home sweet home. Authors SHOULD consider using this technique when it is applicable. Autocoder was possibly the first primitive compiler. Executes the specified command using the specified current directory and temporary files, and waits for the call to return, storing output and error information from the compiler in the specified strings. Each rectangle represents a pixel. Alongside his study Martin was involved in numerous industry projects, providing him with commercial programming practice. He had not meant what he would have seemed to mean. Author Title Price Publisher. Aus dem tiefen, unermesslich reichen Brunnen seiner Vorstellung hatte er keinen einzigen Tropfen konkreter Duftessenz gefurdert, von allem, was ihm geruchlich vorgeschwebt hatte, nicht ein Atom realisieren kunnen. Maybe, Dunus said, they'd shot it from a distance. Ave and Kutsi Merc, who were standing in the half-ruined portico, quickly proceeded through the gap, Lua followed them and the Wall closed behind her. Susan hated that sort of thing. Authors may also use the shorthand background property, which is currently better supported than the background-position property. Authors list is stored in the author element, that has traditional first-name, middle-name, last-name fields, and a couple of optional home-page and email subelements. Auroras 2004 Photo Gallery, Part 2 Space.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : visit to houston fyi - - - - - - - - - - - - - - - - - - - - - - forwarded by stinson gibner / hou / ect on 01 / 29 / 2001 02 : 02 pm - - - - - - - - - - - - - - - - - - - - - - - - - - - nick bambos on 01 / 29 / 2001 10 : 54 : 27 am to : stinson . gibner @ enron . com cc : subject : re : visit to houston stinson , just a quick note to let you know that i am looking into it , trying to rearrange a couple of things . i ' d like giuseppe and possibly eric to come with me , so i need to coordinate with them too . we ' ve made some nice progress that i ' d like to present and also integrate eric in the system . i am targeting a friday around the end of february or begining of march . i ' ll let you know soon of a few possibilities as they stabilize here . best , nick stinson . gibner @ enron . com wrote : > > nick , > > i hope things are going well and you are not staying too busy . we should > start planning for your next trip to houston , as i ' m sure your schedule > will be getting full very soon . perhaps you could give the people in > enron broadband an overview of the areas of interest within your research > group . i ' m sure we could also benefit from you views of how the current > technology is evolving . > > are there certain dates which would potentially work for you ? please let > me know by email or give me a call at 713 853 4748 . > > looking forward to talking with you . > > - - stinson<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> with ESMTP id i89M6UpR009535 for ; Thu, 9 Sep 2004 15:06:30 -0700 Received: from ucsb.edu (hub.ucsb.edu [128.111.24.40]) by charm.physics.ucsb.edu (8.9.3/8.9.3) with ESMTP id PAA05889 for ; Thu, 9 Sep 2004 15:06:25 -0700 Received: from localhost ([127.0.0.1] helo=hub.ucsb.edu) by ucsb.edu with esmtp id 1C5X3h-000Po4-IS; Thu, 09 Sep 2004 15:06:25 -0700 Received: from hub.ucsb.edu ([128.111.24.40] helo=smtp.ucsb.edu) by ucsb.edu with esmtp TLSv1:AES256-SHA:256 id 1C5Wxi-000Pny-5c for [email protected]; Thu, 09 Sep 2004 15:00:14 -0700 Received: from bodega.oit.ucsb.edu ([128.111.12.59]) by smtp.ucsb.edu with asmtp TLSv1:RC4-SHA:128 id 1C5Wxh-000Pnu-OV for [email protected]; Thu, 09 Sep 2004 15:00:13 -0700 Mime-Version: 1.0 (Apple Message framework v619) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: E. Todd Atkins Date: Thu, 9 Sep 2004 15:00:13 -0700 To: [email protected] X-Mailer: Apple Mail (2.619) Subject: [CSF] NGB Null Routed Hosts X-BeenThere: [email protected] X-Mailman-Version: 2.1.4 Precedence: list Reply-To: UCSB Network Security Coordinator List-Id: Computer Support Forum List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: [email protected] Errors-To: [email protected] Greetings, You can find a "Null Routed Hosts" list further down in this message. If your host is in this list, then .. 1. Make sure that the host has been completely cleaned up. Unless the host is completely rebuilt, please make sure that the host is not running any rogue IRC bots, FTP servers, VNC, etc. Tools like "tcpview" and "procexp" from www.sysinternals.com or Vision from www.foundstone.com (under the Resources section) should help to locate any such services. 2. Send an email message to [email protected] to inform us that the host is now safe to be connected with the internet. When referring to multiple IP addresses, please list the IP addresses on separate lines. If you are not the NOC's official network contact for the address(es), then be sure to CC that person. If you decide to simply reply to this message, please do *not* include the complete lists of IPs. Please just include the IP(s) that you are writing to us about. 3. If you find any rogue services running, please include the type of service and the port that it was using. *** Null Routed Hosts *** 128.111.20.188 dhcp20-188.wirelesstest.ucsb.edu 128.111.60.112 hal-601.ece.ucsb.edu 128.111.68.13 -- 128.111.77.78 santa.crss.ucsb.edu 128.111.82.238 goopmeister.chemengr.ucsb.edu 128.111.83.182 seppia.chemengr.ucsb.edu 128.111.87.54 baltimore.alexandria.ucsb.edu 128.111.92.213 -- 128.111.95.54 pubserials-002.library.ucsb.edu 128.111.96.23 edr-laptop.sdc.ucsb.edu 128.111.97.82 pegasus-testbox.library.ucsb.edu 128.111.99.49 -- 128.111.108.65 host108-65.lsdepts.ucsb.edu 128.111.108.192 host108-192.lsdepts.ucsb.edu 128.111.110.58 pilsner.bren.ucsb.edu 128.111.110.83 install.bren.ucsb.edu 128.111.110.97 -- 128.111.110.129 -- 128.111.110.159 -- 128.111.110.174 -- 128.111.110.182 thundercracker.bren.ucsb.edu 128.111.110.186 -- 128.111.110.191 -- 128.111.110.204 bandelier.bren.ucsb.edu 128.111.110.209 -- 128.111.110.211 aso.bren.ucsb.edu 128.111.110.225 -- 128.111.110.243 -- 128.111.110.246 -- 128.111.110.251 -- 128.111.111.23 snape.bren.ucsb.edu 128.111.111.30 malfoy.bren.ucsb.edu 128.111.111.44 -- 128.111.111.48 topaz.bren.ucsb.edu 128.111.111.63 -- 128.111.111.65 -- 128.111.111.69 griffendor.bren.ucsb.edu 128.111.111.74 zeolite.bren.ucsb.edu 128.111.111.80 diamond.bren.ucsb.edu 128.111.111.83 -- 128.111.111.95 reliable.bren.ucsb.edu 128.111.111.99 -- 128.111.111.118 juju.bren.ucsb.edu 128.111.111.125 -- 128.111.111.133 -- 128.111.111.141 -- 128.111.111.143 -- 128.111.111.148 -- 128.111.111.152 -- 128.111.111.181 -- 128.111.111.185 -- 128.111.111.221 -- 128.111.125.224 netvista1.isc.ucsb.edu 128.111.130.46 host130-46.lsdepts.ucsb.edu 128.111.141.27 -- 128.111.142.145 -- 128.111.142.221 -- 128.111.147.81 uo.isber.ucsb.edu 128.111.159.37 -- 128.111.159.81 -- 128.111.160.8 -- 128.111.164.39 jfks-dell.materials.ucsb.edu 128.111.216.93 host216-93.lsdepts.ucsb.edu 128.111.219.160 host219-160.lsdepts.ucsb.edu 128.111.220.183 tekka.nceas.ucsb.edu 128.111.221.34 moon.mat.ucsb.edu 128.111.221.35 southhall-3-wl.mat.ucsb.edu 128.111.221.51 dhcp06.mat.ucsb.edu 128.111.221.137 host221-137.lsdepts.ucsb.edu 128.111.225.205 hp.econ.ucsb.edu 128.111.229.211 -- 128.111.229.220 -- 128.111.229.228 -- 128.111.229.252 -- 128.111.234.239 sylvey.geog.ucsb.edu 128.111.247.63 -- 128.111.248.244 -- -- Todd Atkins Network Security Coordinator UCSB/Office of Information Technology Voice: (805) 893-5077 Fax: (805) 893-5051 http://www.oit.ucsb.edu/security _______________________________________________ CSF mailing list - [email protected] https://ucsb.edu/mailman/listinfo/csf<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>cal berkeley career fair recruiting season is quickly approaching and i wanted to go ahead and make everyone aware of the first event at cal berkely this fall . the cal berkeley career fair will take place on friday , september 8 th . we would like to take three representatives on campus to discuss the analyst program as well as the global technology track . travel arrangements would involve leaving on thursday evening , september 7 th , to recruit on campus all day friday . if you think that you may be available to help with this event , please click on the button below . we will discuss this and other events / dates on campus this fall during the team meeting on tuesday , august 29 th at 2 : 00 in 49 c 4 . at that time we will have sign - up sheets so that you can attend events that best fit in your schedule . i will also follow up with an e - mail similar to this so that everyone is able to express their date / event preferences . thanks so much for helping recruit at cal berkeley this fall . if you have any questions , please feel free to contact me at 3 - 3589 . ashley<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>v-flesnu We are one of the first Internet chemists that have provided safe and affordable medications to US citizens. We offer medications, guaranteed shipping to all American States and worldwide, 24 hour client support and free consultations with licensed physicians.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>liliana ash geraldooliveiracenibracombr olesia_k 30 years 0ld l0oking man 18 54 malopolskie poland 0nline t0day become member see results httpigidesuligyhaycnarodru delite email orateorixgmaildotcom architecture tightly 83 wed 06 aug 2008 191424 0200 50 ways meet lover_audi_girl<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>meeting reminder meeting discuss var reporting resources ii canceled please adjust schedules reflect update many thanks barbara lewis forwarded barbara lewis hou ect 06 08 2000 10 13 barbara lewis 06 07 2000 09 27 sally beck hou ect ect philippe bibi hou ect ect rick buy hou ect ect grant masson hou ect ect michael e moscoso hou ect ect ted murphy hou ect ect beth perlman hou ect ect stephen stock hou ect ect cc patti thompson hou ect ect peggy mccurley hou ect ect karen k heathman hou ect ect shirley crenshaw hou ect ect maria sandoval hou ect ect rita hennessy na enron enron cherylene r westbrook hou ect ect giselle james corp enron enron subject meeting reminder meeting discuss var reporting processes resources ii take place friday june 9 2000 9 00 location eb 32 c 2 please adjust schedules reflect important meeting many thanks barbara lewis x 3 5085<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>italian crafted rolex from $ 75 to $ 275 - free shipping heya , do you want a rolex watch ? in our online store you can buy replicas of rolex watches . they look and feel exactly like the real thing . - we have 20 + different brands in our selection - free shipping if you order 5 or more - save up to 40 % compared to the cost of other replicas - standard features : - screw - in crown - unidirectional turning bezel where appropriate - all the appropriate rolex logos , on crown and dial - heavy weight visit us : http : / / www . bhex . com / rep / rolex / best regards , hilton jones no thanks : http : / / www . bhex . com / z . php <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>california power 1 19 00 executive summary sb 7 x gives dept water resources given legislative authority undertake short term power purchases price cap feb 2 nd new legislation ab 1 x sb 6 x would seek 1 long term contracts 5 5 cent cap 2 creation california power conservation financing authority long term contracts proposed ab 1 x likely subject significant amendment renegotiation prior feb 2 nd expiration sb 7 x authority proposed sb 6 x would bond issuance powers finance new generation capacity conservation measures negotiations way using bond authority utility bailout utilities state government split debt obligations utility parents state borrowing plans power purchases create credit risks state treasury socal edison misses payments bush administration opposes price caps supporting state efforts split pg believe could willing guarantee issue bonds deal rest one senior california political leader explained getting utility holding companies eat substantial part debt owe key solving back debt problem without provoking widespread public outrage bailout private price gouging companies taxpayer money since 75 californians currently blame utilities puc crisis 10 blame davis crucial political stance governor course absorbing anything like 6 billion debt would quite shock seemingly healthy holding company power generating branches two utilities began spreading word quite willing accept bankruptcy thus mid week sides pushed toward resolution federal bankruptcy court would worst case solution sides country economy would suffer resulting credit shock governor political future would suffer electricity rate increases almost certain mandated bankruptcy judge private sector legal authorities believe utilities corporate holding structure would ultimately breached bankruptcy procedures would end absorb significant amount debt end addition would likely face state government determined use state powers condemnation enter power business major way senator burton sb 6 x legislation strengthen powers dramatically make point quite explicit would set california power conservation financing authority power issue bonds invoke eminent domain would finance new power plants consider feasibility public interest state acquiring operating maintaining transmission facilities currently owned investor owned municipal utilities write sides trying construct path back bankruptcy ledge safe ground question tone shifted last 24 hours macho confrontation maybe run thing far noted chance miscalculation still quite high solution agreed time stand much debt state government absorb versus utilities holding company continuing technical fact default still makes possible bank trigger bankruptcy demanding immediate accelerated payment 5 default update thursday socal edison 215 million default california power exchange edison failed make 215 electricity payment yesterday california power authority began seizing long term contacts reselling recoup money owed generators pg e said expects trading privileges cal power authority suspended today leaving generation nuclear hydroelectric sources ongoing wave defaults severely restricted pg e socal ability buy power department water resources able pick slack least short term state may getting risky credit territory proposed california public power authority would borrow neighborhood 1 3 billion state general fund advance year expected fiscal surplus loan repaid authority expected future revenues near bankrupt utilities freeze rate hikes unclear revenues would come amount borrowed terms repayment doubt examined carefully bond rating agencies 5 bush policies reported wednesday bush administration continues demonstrate little interest getting involved california crisis president elect bush surprised state leaders yesterday comments essentially said excessive environmental regulation root current supply shortage bush top officials appear unanimously opposed long term price caps however one issue considerable importance administration according source close top bush economic advisor significant concern pg e credit problems could cause gas suppliers stop shipments gas pg e pipeline risk would pipeline could go dry causing significant possibly dangerous disruptions california residences businesses prevent problem bush working davis proposal split pg e separate gas electric companies gas company would solvent electric company would go immediately ch 11 following significant defaults<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : working with enron on catastrophic risk howard , thanks for the message and the paper . we shall hold an internal follow - up meeting next monday to review potential projects on which we could cooperate in the future . vasant and i will contact you to discuss our recommendations regarding the future research agenda . vince " kunreuther , howard " on 12 / 14 / 2000 10 : 07 : 11 am to : " bouillion ( e - mail ) " , " carrick ( e - mail ) " , " hoog ( e - mail ) " , " kaminski ( e - mail ) " , " vasant ( e - mail ) " cc : " doherty , neil a " , " kleindorfer , paul " , " thomas , louis a " , " weigelt , keith w " subject : working with enron on catastrophic risk dear vince , jim , george , david and vasant : neil doherty , paul kleindorfer and i very much enjoyed our discussion last wednesday at wharton with you on future joint research with enron over the coming year . in particular , we see the whole area of capital management and catastrophic risk as a fruitful area for foint collaboration . i am sharing this message with louis thomas and keith weigelt who direct the fap mba program in the hopes that we can find a team to work with us on these issues next semester . attached is a revised version of our paper on " evaluating risk bearing , mitigation and risk transfer using exceedance probability curves : project update " . we would greatly appreciate you and your colleagues looking at the section on " cat bonds covering multiple risks " ( pp . 15 - 19 ) to see whether our example and conclusions make sense to you . we look forward to working with your team at enron regarding ways that we can build on these preliminary findings to make cat bonds for weather risks more attractive . best wishes for the holiday . regards , howard howard kunreuther cecilia yen koo professor of decisions sciences and public policy chairperson operations and information management department 1326 steinberg hall - dietrich hall wharton school university of pennsylvania philadelphia , pa 19104 - 6366 phone : 215 - 898 - 4589 fax : 215 - 573 - 2130 email : kunreuth @ wharton . upenn . edu - epcurvepaper - final - dl 0 . doc<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[Alibaba Notification] Emily Yan has sent you an inquiry Request for Quotation ; Trade Center Emily Yan Import Manager 4-Year Gold Customer [verified] Greece Emily Yan From Greece has sent you an inquiry Reply Now Manage Your Orders Dear [email protected] Hope this mails find you well. Your product will do well in our market so we will like to make you our main supplier. Please I will need your Whatsapp or Sykpe ID for faster communication. We want to make an urgent trial order, attached is all we need. Please what is your earliest delivery time for this order. Regards, Emily Yan Import Manager Marfin Investment Group +30 210 15 07 000 You received this email because you are registered on Alibaba.com with [email protected] It contains an attachment. Please sign into Trade Center to check it. --- Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast. https://www.avast.com/antivirus   Request for Quotation                 ;  Trade Center    Emily Yan Import Manager    4-Year Gold Customer [verified] Greece    Emily Yan From Greece has sent you an inquiry   Reply Now   Manage Your Orders Dear [email protected] Hope this mails find you well.Your product will do well in our market so we will like to make you our main supplier.Please I will need your Whatsapp or Sykpe ID for faster communication. We want to make an urgent trial order, attached is all we need. Please what is your earliest delivery time for this order.   Regards,Emily Yan Import Manager Marfin Investment Group  +30 210 15 07 000   You received this email because you are registered on Alibaba.com with [email protected]   It contains an attachment. Please sign into Trade Center to check it.   Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast. www.avast.com<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>fwd : need pills vali + u + m $ xia | nax $ vlagr @ = % rnd _ med _ v + 1 codin ) pntermi . n . ~ soim | a u 5 cea we supply high quality medications by mail order at very competitive prices and provide a professional , convenient and affordable means of purchasing your prescription medicines online what ' s available : ? v + a + lium $ xan @ x . som @ \\ p . n . termin ~ v | @ gra ) at . | v @ n plus : proz @ . c , p @ x ` il , busp : @ r , adip : 3 x , ionam | ` n , m 3 . ridia , x 3 nic . a | , amb . i 3 n , son ` ata , fl 3 xer ` il , ce | 3 br ` ex , fioric : 3 t , tram @ ` do | , uitr @ : m , l 3 v : | tra , prop ' 3 cia , acyc | ` 0 vir we deliver to you very fast - and that is a promise . enjoy deep discount meds here . <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: yo i'm finer and finer, and still not with a jobjob but not really wanting a jobjob, too scared of going back to hi-tech, and falling in love with my job, and getting laid off again, must be some kind of fear of intimacy problem..... but i'll probably want to get real intimate again as soon as the $$$$ runs out....... going to seattle for thanksgiving at kevin's, 35 people this year, yay, and lots of little cute kids running around, and, well, i couldn't sleep last night and tossed and turned and finally fell asleep at 6 or so and missed my yoga class at 9.... this is my life, and it ain't have bad.... no no no.... i hear pp got a job, yay and cool and good for her... x0, happy thanksgiving, and good luck whethering the merger.... --- "Dasovich, Jeff" wrote: > it's crazy, but what else is new. how are you > sweetie? > > -----Original Message----- > From: colleen silva > Sent: Mon 11/19/2001 8:02 PM > To: Dasovich, Jeff > Cc: > Subject: yo > > > > whassup with this crazee merger and what does it > mean > for you? and i actually just wanted to say hi... > so. > hi. ha! > > __________________________________________________ > Do You Yahoo!? > Find the one for you at Yahoo! Personals > http://personals.yahoo.com > > > > > ********************************************************************** > This e-mail is the property of Enron Corp. and/or > its relevant affiliate and may contain confidential > and privileged material for the sole use of the > intended recipient (s). Any review, use, > distribution or disclosure by others is strictly > prohibited. If you are not the intended recipient > (or authorized to receive for the recipient), please > contact the sender or reply to Enron Corp. at > [email protected] and delete > all copies of the message. This e-mail (and any > attachments hereto) are not intended to be an offer > (or an acceptance) and do not create or evidence a > binding and enforceable contract between Enron Corp. > (or any of its affiliates) and the intended > recipient or any other party, and may not be relied > on by anyone as the basis of a contract by estoppel > or otherwise. Thank you. > ********************************************************************** > __________________________________________________ Do You Yahoo!? Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month. http://geocities.yahoo.com/ps/info1<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Valeriana wallichii 25 mg MegaDik has been labeled a "Herbal Breakthrough" with over 1,500,000 bottles sold worldwide. http://havuj.com <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Start Date: 10/29/01; HourAhead hour: 15; <CODESITE> Start Date: 10/29/01; HourAhead hour: 15; No ancillary schedules awarded. No variances detected. LOG MESSAGES: PARSING FILE -->> O:\\Portland\\WestDesk\\California Scheduling\\ISO Final Schedules\\2001102915.txt Error retrieving HourAhead price data - process continuing... ---- SC Trades Schedule ---- *** Final schedule not found for preferred schedule. Details: TRANS_TYPE: FINAL SC_ID: EPMI MKT_TYPE: 2 TRANS_DATE: 10/29/01 TRADING_SC: EPPS PNT_OF_INTRC: NP15 SCHED_TYPE: ENGY PURCH_SALE: 2 DEAL_NO: 1 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>a few comments john , happy new year . i hope the first few weeks of this year will see the completed paper . i am sending you the last version of the paper i have received with a few comments ( in red ) . i think it makes sense to discuss the paper over the phone . i have a number of more detailed comments . vince - enron transformation paperl 2 _ 17 _ 00 _ vk . doc<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>you`ll be amazed Ronald Increase your CUM VOLUME, and Orgasm Length main benifits: - The longest most intense Orgasms of your life - Erctions like steel - lncreased libido/desire - Stronger ejaculaton (watch where your aiming) - Multiple 0rgasms - Up to 500% more volume (cover her in it if you want) - Studies show it tastes sweeter DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT! (and she'll thank you for it) http://smilingly.net/spur/?got leapt you cesium me zambia you formula me stint you playa me cautious you sunglasses me sole you blemish me lengthen you allyl me http://cordoned.net/rm.php?got <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>andy k yjpva_qnqvuhotmailcom hi anyone point site grab countsh script quickly counting messages active deferred queues ive googled searched postfixorg avail thanks andy _________________________________________________________________ helping favorite cause easy instant messaging im give httpimlivecommessengerimhomesourcetext_hotmail_join fri 08 aug 2008 104015 0000 countsh<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Not looking good right now for space at the JT skid for November. I have calls into the field to try and determine our max throughput. We have a capital project going that should increase our throughput, but it may not be finished for a couple of weeks. Will let you know by the end of the day where we're at. How much is it worth to you? There may be a bidding war........... kt <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Your daily e-mail from the BBC Tuesday, 12 June, 2007, 18:00 GMT 14:00 -04:00:Canada/Eastern Search BBC Sport  FOOTBALL Players' union enters Barton row The Professional Footballers' Association will try to end the row between Man City and Newcastle over Joey Barton's transfer.   McAteer opts to hang up his boots Former Bolton, Liverpool and Republic of Ireland midfielder Jason McAteer announces his retirement.   Gibson targets big names for Boro Middlesbrough chairman Steve Gibson is confident of signing some big-name players before the new season. GOLF Harrington confident for US Open Padraig Harrington says the experience of winning the Irish Open could help him at the US Open, which starts on Thursday   Lyle backs Monty for US Open bid Former Masters champion Sandy Lyle says Colin Montgomerie 'will not rest' until he wins a major.   Howell misses US Open with injury David Howell pulls out of this week's US Open with a wrist injury. MOTORSPORT McLaren favour Hamilton - Alonso Fernando Alonso says he has never been "completely comfortable" at McLaren because he feels they are giving preference to Lewis Hamilton.   Walker tips Hamilton for F1 title Former commentator Murray Walker believes Briton Lewis Hamilton can win the Formula One World Championship.   Unscathed Kubica out of hospital BMW Sauber driver Robert Kubica leaves hospital in Montreal after his horrific crash at the Canadian Grand Prix. FORMULA ONE McLaren favour Hamilton - Alonso Fernando Alonso says he has never been "completely comfortable" at McLaren because he feels they are giving preference to Lewis Hamilton.   Walker tips Hamilton for F1 title Former commentator Murray Walker believes Briton Lewis Hamilton can win the Formula One World Championship.   Unscathed Kubica out of hospital BMW Sauber driver Robert Kubica leaves hospital in Montreal after his horrific crash at the Canadian Grand Prix. ATHLETICS Pickering gets European Cup nod Craig Pickering beats Mark Lewis-Francis to the 100m berth in Great Britain's team for the European Cup on 23-24 June.   Gillick sets new Irish 400m mark David Gillick smashes the Irish 400m record at Switzerland's Atletica Geneve meeting.   Devonish delivers relay warning Marlon Devonish says Britain should avoid rushing its next batch of sprint talent into the senior international arena. CYCLING Moreau replaces Wiggins as leader Christophe Moreau wins stage two of the Dauphine Libere to replace Britain's Bradley Wiggins as overall leader.   Wiggins retains lead in Dauphine Britain's Bradley Wiggins retains a one-second overall lead after the first stage proper of the Dauphine Libere.   Wiggins wins Dauphine time-trial Britain's Bradley Wiggins gives his Tour de France prospects a boost by winning the prologue in the Dauphine Libere. FUN AND GAMES Quotes of the Week Ramon Calderon on David Beckham, plus Lewis Hamilton and Graham Taylor   Comment: Formula fun with Lewis Robbo on Lewis Hamilton and the England cricket team   Ramprakash goes dancing again Strictly Come Dancing star Mark Ramprakash breaks out a few of his best moves ahead of Surrey's Twenty20 campaign this summer.   OPTIONS AND HELP     You are subscribed from the e-mail address: [email protected] Change To change your e-mail address, the content or format of your daily e-mail, visit: http://www.bbc.co.uk/email Unsubscribe To unsubscribe, visit: http://www.bbc.co.uk/email Other e-mails To see the full range of e-mails available visit: http://www.bbc.co.uk/email     Help If you are having problems with story links or for general help visit: http://www.bbc.co.uk/email/help Feedback Please send feedback to: mailto:[email protected]     Copyright BBC 2005 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>You can increase the time of your act moweyk mwnrlu syfrq No other p vq en lt is e hx nla dt rgem uma ent form oki ula has been as thoroughly researched and cli rrt nic xi ally studied as Po ne we azq rEn jpa lar yob ge. Forty-four sepa hhc rate cli jc nical studies testify to the shocking p qg en sxa is enla fc rgem ho ent power of Po jyb we rr rEn te lar kk ge. In a groundbreaking cl sif ini znl cal study at McM yts aster Un xt iver bdb sity, one extraordinary subject using Po ml we lm rEn gk lar cvp ge stunned researchers after he gai mr ned 3.04 In ag ch ejo es, which beats any other p zo en gsk is enl zrs arge ny ment system around.Po ybe we ma rEn mr lar jxq ge gu vr aran rbv tees great re yyn sults and we gu vl aran wqo tee fast delivery for you to start using this traction device as soon as possible and achieve your goal si lla ze. We take the utmost care to ensure the pri zst vacy of your information.100% Sa nl fe To Take, With NO Si rwf de Ef kck fec axk ts. Click here!!! ... http://bv.leadmake.com/?vvq<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Coppertone Sport Sunscreen Continuous Spray You registered to receive this and similar offers from on . COPPERTONE Continuous Spray Sunscreen, FREE* SAMPLE! CLICK HERE, For A Limited Time Only: http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-1-i3q-8jdp Try the Coppertone Sunscreen, FREE*! Coppertone Sport Continuous Spray Sunscreen is a must have for the summer. This PABA-Free, ultra sweatproof suncreen bonds to your skin on contact and won't run into your eyes and sting. Unique spray form offers quick and even application, perfect for the beach or any activities under the sun! CLICK HERE to Get Your FREE* SAMPLE NOW: http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-2-i3q-8jdp *See Terms and Gift Rules Powered by Your Product Samples. Your Product Samples is an independent rewards program for consumers and is not affiliated with any of the companies mentioned above. Your Product Samples is solely responsible for all gift fulfillment. To receive your gift, simply 1) Participate in the survey 2) Qualify for the sponsor offer(s) (see Gift Rules) and 3) Follow redemption instructions. By continuing, you certify that you agree to the terms and conditions. Copyright © 2005 Your Product Samples. All rights reserved. You can unsubscribe from promotions by visiting this website: http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-3-rv-8jdp Mailing address: Your Product Samples Customer Care, 303 Park Avenue South #1079 New York, NY 10010. 8jdp If you no longer wish to receive these commercial emails, you may remove yourself from our mailing list by clicking here http://fbkohvaqtg.realsportsworld.com/remove?r.Montague.25-907ec48-14c6.speedy.uwaterloo.ca.-producttestpanel?r click here or by calling our unsubscribe hotline at 864-752-1051. Please note this phone number is used solely for unsubscribe requests. Please allow up to five business days for your request to be processed. You may also contact us by writing to us at our postal address: Montague| 9600 Great Hills Trail, Suite 150 W| Austin, TX 28759 <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Maxilaku Are you insecure about your sexual prowess?? Having problems in keeping it up?? Pop a pill of V - i - a - g - r - a It can make you a legend in her own mind!! Click here: http://Vbfilosv.tewislow.com/?a=507Yfilpsv Yfil Pvycfimpsv <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>egm mid market customer transition jeff per instructions list customers airtrans airways celadon trucking chitaqua airlines continental airlines gasmar texas eastman amerigas propane partners ecr energy star gas propane age refining canpet energy cross oil frontier oil markwest hydrocarbons trifinery<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: "Nice girl like to chat" spam This has worked very well here. This is more specific to the sentence the "bored girl" always uses. /Email me at [A-Za-z]{1,20}\\@[a-zA-Z]{3,25}\\.info only/ Joseph Brennan Columbia University Information Technology <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>impact equity report mineral exploration stockp delta mining and exploration corp . otc : dmxpp controls 6 properties totaling 7 , 554 acres ( approximately 11 sq . miles ) in montana . another 10 , 000 acres of prospective diamond and gold properties are controlled in bolivia , south america . ( source : company website ) currently trading at . 012 p possibilty of an absolutely huge week as massive pr campaign has started and is expected to last all week . pp imagine how well your portfolio would have done the last month or so if you had the scoop on the following stock : p ( otcbb : mbah ) : this stock closed at . 01 on september lst . this little giant closed at . 06 on october 8 th , up 500 % in about 5 weeks . do you think ibm is going to move like that anytime soon ? p as many of you may agree , some , not all , of these stocks move in price because they are promoted , making a very large number of investors aware of the stock . the awareness is underway on dmxp ! pp let ' s look at the company , delta mining and exploration corp . otc : dmxpp about the company : p delta mining and exploration corp . otc : dmxp is a mineral exploration company that controls 6 properties totaling 7 , 554 acres ( approximately 11 sq . miles ) in montana . the properties are all located over what management considers to be some of the most prospective diamond exploration terrain in the united states . another 10 , 000 acres of prospective diamond and gold properties are controlled in bolivia , south america . initial work has revealed that the bolivian properties display similar potential to those found in north america . p the management team is led by chief executive officer , dr . barry rayment , who is experienced enough to take this junior exploration company to the next level . dr . rayment brings 32 years of experience in the field of geology , along with running some of the most successful mining companies in the industry . dr . rayment was the president of bema gold corp . , ( amex : bgo ) , a company with a market cap of close to a billion dollars . he was also affiliated with glamis gold , gold fields mining and amselco exploration ( bp minerals ) , among others . his vast experience in the mining sector along with his extensive knowledge of public companies will be an extraordinary asset to delta and its shareholders as the company moves forward . p among the support team is stephen kay , a geologist with more than 30 years experience in exploration throughout europe , south africa , south america and the united states . while with gold fields mining corp . , stephen kay was instrumental in the discovery and subsequent drilling of the 3 million ounce mesquite gold deposit in california . p delta has experienced significant technical success since its start - up in 1997 . for example , delta has discovered the first in - situ microdiamond ever found in montana on its homestead kimberlite , southeast of lewistown . the company also controls part of the three buttes kimberlite where initial exploration has shown the three buttes kimberlite to host typical diamond indicator minerals - a major step toward finding the presence of economic diamonds - including pyrope ( garnet ) , chromite and clinoprroxene . p an aggressive regional exploration program has the potential to discover additional kimberlite or lamproite pipes in this under - explored area to the south of known commercial diamond bearing kimberlites in saskatchewan and alberta , canada . p in bolivia , delta controls approximately two - thirds of a highly prospective diamondiferous terrain referred to as the independencia group of concessions covering 7 , 860 acres ( 12 sq miles ) . the other one - third is presently being explored by de beers . in addition to the independencia property delta controls more than 2 , 000 acres comprising the highly attractive precambrian property that displays all the diamond indicator minerals that would suggest further exploration is justified . p delta seeks to increase growth for its investors not only by testing its extensive portfolio of diamond exploration properties but also by acquiring additional diamond properties . delta will focus on identifying and developing strategic alliances with major mining companies as well as joint ventures to develop the properties and finance additional exploration . p in addition to the highly prospective diamond properties delta controls , they also control a gold property with great potential . the property is near la paz in bolivia , where initial analysis revealed high levels of gold per ton that would more than justify an extensive exploration program . pp ( source : company website ) p recent headlines : go online and read the full stories ! p delta mining and exploration corp . is invited to attend a conference with the bolivian chamber of commerce . p delta mining and exploration corp . visits homestead property in preparation of work program . p delta mining and exploration corp . discloses preliminary gold exploration findings in south america . p delta mining and exploration , corp . looks to continue diamond exploration in south america . pp will dmxp explode higher as more and more investors become aware of the stock this weekend and next week ? if you think so , you may not want to wait until it is too late . remember , timing your trade is critical . good luck and happy trading . pp information within this publication contains future looking statements within the meaning of section 27 a of the securities act of 1933 and section 21 b of the securities exchange act of 1934 . any statements that express or involve discussions with respect to predictions , expectations , beliefs , plans , projections , objectives , goals , assumptions or future events or performance are not statements of historical fact and may be future looking statements . future looking statements are based on expectations , estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual results or events to differ materially from those presently anticipated . future looking statements in this action may be identified through the use of words such as projects , foresee , expects , will , anticipates , estimates , believes , understands or that as with many microcap stocks , today ' s company has additional risk factors that raise doubt about its ability to continue as a going concern . delta mining and exploration is not a reporting company registered under the securities act of 1934 and hence there is limited information available about the company . it is not currently an operating company . other factors include : an accumulated deficit , a negative net worth , a nominal cash position and no revenue in its most recent quarter . the company is going to need financing . if that financing does not occur , the company may not be able to continue as a going concern in which case you could lose your entire investment . the publisher of this newsletter does not represent that the information contained in this message states all material facts or does not omit a material fact necessary to make the statements therein not misleading . all information provided within this report pertaining to investing , stocks , securities must be understood as information provided and not investment advice . the publisher of this newsletter advises all readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report . none of the material within this report shall be construed as any kind of investment advice or solicitation . many of these companies are on the verge of bankruptcy . you can lose all your money by investing in this stock . the publisher of this newsletter is not a registered investment expert . subscribers should not view information herein as legal , tax , accounting or investment advice . any reference to past performances of companies are specially selected to be referenced based on the favorable performance of these companies . you would need perfect timing to acheive the results in the examples given . there can be no assurance of that happening . remember , as always , past performance is never indicative of future results and a thorough due diligence effort , including a review of a company ' s filings when available , should be completed prior to investing . the publisher of this newsletter has no relationship with mbah . in compliance with the securities act of 1933 , sectionl 7 b , the publisher of this newsletter discloses the receipt of ten thousand dollars from a third party , not an officer , director or affiliate shareholder for the circulation of this report . be aware of an inherent conflict of interest resulting from such compensation due to the fact that this is a paid advertisement and is not without bias . the party that paid us has a position in the stock they will sell at anytime without notice . this could have a negative impact on the price of the stock . all factual information in this report was gathered from public sources , including but not limited to company websites and company press releases . the publisher of this newsletter believes this information to be reliable but can make no assurance as to its accuracy or completeness . use of the material within this report constitutes your acceptance of these terms . <|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>visual identity logo working company image start visual identity key first good impression help take part buildinq positive visuai imaqe company creatinq outstanding loqo presentable stationery items professional website marketing toois wiii significantly contributeto success business take iook work sampies hot deal packaqes see offer work _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ interested _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>glenn fisher allenemancipatewallacenichebotcom exquisite replica watchesrolex cartier breitling morevisit online shop replica classics trendy replica watches order rolex replica atches 0nline httpprovejobruncom wed 06 aug 2008 065853 0100 get finest rolex watch replica<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|>