conversations
stringlengths 328
4.6M
|
---|
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>daily top 10 datentec1951millettrealtycom daily top 10 cnncom top videos stories aug 1 2008 358 pm edt top 10 videos 1 mom parties club httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805ngmompicscnn nancy grace new photos casey anthony partying nightclub daughter caylee vanished 2 womans computer spies httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805pkgwebcamspyingwcjb 3 tigers attack teen zoo httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805wuellnertigerattacksteenkytv 4 mistress testifies trial httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805sotlovetrianglezammitticnn 5 man calls 911 sandwich httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805spivey911callsandwichwtlv 6 john junior gotti arrested httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nygottijrhandcuffscnn 7 passengers slide plane httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805voaaplaneevacuatedktla 8 plane evacuates passengers httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nrbeepercaplaneevacuatecnn 9 pipeline firm helps save gas httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805marcianopipelinetelecommutingcnn 10 125000 gorillas found httpwwwcnncomvideopartnersemailindexhtmlurlvideoworld20080805vocongogorillawcs top 10 stories 1 smoke forces emergency landing httpwwwcnncom2008us0805emergencylandingindexhtml passengers evacuate american airlines jet inflatable slides emergency landing los angeles airport official says 2 hopes gorilla survival boosted httpwwwcnncom2008worldafrica0805congogorillasindexhtml 3 stayathome wives without kids httpwwwcnncom2008livingwayoflife0805lwnokidsnojobwivesindexhtml 4 commentary immigrant sanctuaries httpwwwcnncom2008politics0804navarretteimmigrationindexhtml 5 freeman recovering surgery httpwwwcnncom2008showbizmovies0805peoplemorganfreemanapindexhtml 6 john junior gotti arrested httpwwwcnncom2008crime0805gottiarrestindexhtml 7 toxin dims hopes mars life httpwwwcnncom2008techspace0804nasamarsindexhtml 8 lure rrated comedy httpwwwcnncom2008showbizmovies0805filmrratedcomediesapindexhtml 9 starbucks offers afternoon deal httpwwwcnncom2008us0805starbucksdealapindexhtml 10 edouard makes landfall httpwwwcnncom2008usweather0805tropicalweatherindexhtml cnn trusted name news cable news network lp lllp one cnn center atlanta georgia 30303 2008 cable news network lp lllp time warner company rights reserved please send comments suggestions going httpwwwcnncomfeedback read privacy guidelines going httpwwwcnncomprivacyhtml agreed receive email cnncom result cnncom preference settings manage settings go httpwwwcnncomlinktobnmanagehtml unsubscribe daily top 10 go httpcgicnncommclikeemail170gvcceaschallengecclcnndailytop10 wed 06 aug 2008 150940 0300 cnncom daily top 10<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>partnership DR. MORGAN XHOSA,
DEPARTMENT OF MINERALS AND ENERGY,
PRETORIA, SOUTH AFRICA.
EMAIL:[email protected]
ATTN:Sir/Madam,
STRICTLY CONFIDENTIAL & URGENT
It is my great pleasure to write you this letter on behalf of my
colleagues. Your information was given to me by a member of the South African
Export Promotion Council (SAEPC) who was with the Government delegation
on a trip to your country for a bilateral conference talk to encourage
foreign investors. I have decided to seek a confidential co-operation
with you in the execution of the deal hereunder for the benefit of all
parties and hope you will keep it confidential because of the nature of
this business.
Within the Department of Minerals & Energy where I work as a Director
of Audit and Project Implementation and with the co-operation of two
other t! ! op officials, we have in our possession an overdue payment in US
funds.
The said funds represent certain percentage of the total contract value
executed on behalf of my Department by a foreign contracting firm,
which we the officials over-invoiced to the amount of US$26.500,000.00
(TwentySix Million Five Hundred Thousand US Dollars). Though the actual
contract cost has been paid to the original contractor, leaving the excess
balance unclaimed.
Since the present elected Government is determined to pay foreign
contractors all debts owed, so as to maintain good relationship with foreign
governments and non-government agencies, we included our bills for
approvals with the Department of Finance and the South Africa Reserve Bank
(SARB). We are seeking your assistance to front as beneficiary of the
unclaimed funds, since we are not allowed to operate foreign accounts.
Details and change of beneficiary information upon application for claim
to reflect payment and approvals will be secured on behalf of you/your
Company.
I have the authority of my partners involved to propose that should you
be willing to assist us in this transaction your share as compensation
will be US$6.625m (25%), while my colleagues and I receive US$17.225m
(65%) and the balance of US$2.650m (10%) for taxation and miscellaneous
expenses incurred.
The business is completely safe and secure, provided you treat it with
utmost confidentiality. It does not matter whether you/your Company
does contract projects, as a transfer of powers will be secured in favour
of you/your Company. Also, your area of specialization is not a
hindrance to the successful execution of this transaction. I have reposed my
confidence in you and hope that you will not disappoint us.
Kindly notify me by my email
address:[email protected]
for further details upon your acceptance of this proposal.
T! ! hanks for your co-operation.
Regards,
DR.MORGAN XHOSA.
N.B Please email your confidential Telephone number to enable me contact you
for further clarifications.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>apbrcdivmodcom 0155 hoaufpythonorg wrote thu may 1 2008 503 pm wrote hi everybody apologize writing yet another lengthy screed simple directory naming issue feel strongly encourate anyone doesnt simply skip first background strong feelings actually based experience long time ago helping someone c programming homework baffled helped programs compiled soon tried didnt issue replicated autotoolsfriendly directory structure time bin include lib etc managed gnu stow onto machine edited shell setup include appropriately soon finished cleaned mess left behind thereby removed build dependencies shared university build server days linux friendly graphical operating system encouraged look even frequently home directory anything suspect likelihood problem would worse since cleaning home directory course find appreciate lack visual noise nautilus et al well also obviously think tools work way think python particular attract audience learning program necessarily savvy arcane nuances filesystem layout would best details abstracted concern naive python developer reading installation instructions wiki trying get started twisted development seeing directory created home directory case may 3 directories bin lib include bit surprise dont actually care files installed library long theyre installed import however may care clicking little house icon shows pictures movies etc lib whats lib bin whats bin like box throw stuff share put stuff share shared wait im supposed put public briefly lib directory participating convention youve also got full complement stuff might go installation like usrlocal lib might annoy little bin etc games include lib lib32 man sbin share src going get ugly pretty fast especially comes finder nautilus explorer every time open window unless misread pep theres going lib subdirectory python packages dont put stuff places afaik python packages least frequently put stuff bin scripts think windows python packages pure python packages either setuppy boasts installplatlib install headers installdata execprefix options suggests include bin share directory least im sure time grovel around id find one installed manpages twisted apparently setuppy doesnt anything leave os packages course little handled pep even usage name lib implies pep taking care compatible idiom goes beyond python least beyond simple python packages even assuming python library ever wanted install things many python libraries simply wrappers around lowerlevel libraries want perform peruser install one going configure prefixsomething something mean local would nice python living space matter itd nice get autotools ruby php perl emacs ad nauseum looking local mirror usr didnt write bunch shell bootstrap glue get everything behave consistently learn new special names bits configuration different ones usrlocal etc replicate consistent python development environment ton bizarre dependencies across something like 15 different os installations mention bevy virtual machines keep around fun think issues lot machines macs linux boxes best windows fwiw dont idea right thing windows local doesnt particularly make sense neither lib context theres reasonable guess put scripts dependent shared libraries peruser installation less issue windows mac default finder window home directory desktop subdirectory thereof markedly public name fact os x whole bunch reserved names home directory none start dot rule seems contains stuff user cares doesnt start dot hmm mac laptop default finder window definitely home directory may artifact many os upgrades tweak performed long time ago forgot though apologies average user experience worth ubuntu also directories creates desktop pictures documents examples templates videos empty typically delete ones dont use going visible directory grounds python specific thing explicitly participating convention software please call python something much better local imo depends perceived python mirroring usrlocal layout convention users name lib implies worse however python trying select location library bookkeeping allow installation platform libraries scripts using mechanism well pythond would still preference could least understand python mirroring mac gnome kde convention special directories guy finds software insists visible fixed files home directory rude vmware example wants vmware directory pretty much every application use nice enough use dotfiles even cedega roughlycomparableto lib applications ive installed folder distinction mind dot files exception like profile bashrc managed users apps manage provide apis manipulating contents sort like thw windows registry nondot files stuff user needs aware experience modern linux suggests usage youre describing gradually phased applications want manage nonuservisible storage something like registry increasingly use gconf database serverland granted gconf stored dotfiles home directory version control variously written hand databases maintained externally downloaded stuff asoundrc emacs vimrc vim xresources fonts gnomerc inputrc bashrc bash_profile profile screenrc xresources sshconfig sshauthorized_keys sshknown_hosts know dot files care maintain theyre benefit particular pieces software lot dotfiles dont think set quite happy dont see every one every time looking home directory save dialog im sure python packages fall istm something user must explicitly choose target installer user also likely dig remove stuff python package management doesnt way remove packages hope users never explicitly choose target installer impression point adding feature allow default behavior distutils work simply automatically unixy platforms rather puking permissions requiring arcana like sudo access editing shells startup quietly agitating elsewhere get localbin added path default way locallib ld_library_path hard sell know explicitly choose much work set appropriate shell environment variables matter already suppose regardless outcome discussion ill still local put another way trivial make locallib show symlinking lib thats thing im sure youre saying im saying advanced users want show theyll symlink naive users want hide theyll delete break python possibly without knowing cant make lib disappear lots software ends looking software cares another file home directory mostly switching point quick access everything access regularly nothings going break thats mean software processes list anything lots stuff shows list gnome ubuntu choose file dialog comes 80 time comes default home directory open terminal opens home directory default location emacs home directory quickly measure cognitive load looking contents directory since shell starts autocomplete starts commonletter real estate scarce directory called projects currently autocomplete p directory called linux autocomplete l either publicname proposal typing additional letter every day words care another file use home directory sort todo list mostly empty unless lot going case fills various objects im working empty exceptions rule every platform things os puts generally things like pictures desktop music put pictures downloaded files music macs library directory never bothered since osprovided basically alternate location dotfiles application data friends another story way agree everything access regularly good description home directory except lib directory something want access regularly occasionally maybe every weeks want chuck dependency forget year _______________________________________________ python3000 mailing list smsbmo9552pythonorg httpmailpythonorgmailmanlistinfopython3000 unsubscribe httpmailpythonorgmailmanoptionspython3000python300040tangomucom mon 04 aug 2008 074321 0000 python3000 pythondev reminder last alphas next wednesday 07may2008<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Please hold off on telling anyone to report to 4..... Still working through the details and will get back with more information as soon as we have it....
Amy
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : market to over 700 , 000 domain registration contacts worldmail
d i r e c t
price blowout ! save $ 150 . 00 promotion code fdo 308
get the facts on over 700 , 000 domain names registered by us and canadian companies !
the most complete database available of its kind . use this extremely valuable information
to contact internet domain registration contacts by email , phone , fax and / or postal mail .
2001 - 2004 world mail direct , inc . & factsdisc . com . all rights reserved .
914 curlew rd 192 , dunedin , fl 34698 . toll free 877 - 446 - 4478 . outside usa 727 - 446 - 4478 .
to be removed from future email announcements for factsdisc ,
unsubscribe here
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>30 , 000 , 000 email addresses . . . just released . . . 30 , 000 , 000 email addresses ! plus 12 bonuses . . . including free stealth 3 . 0 bulk email software ( $ 399 . 00 value ) these addresses are less than 21 days old . earn insane profits with the right formula if you have a product , service , or message that you would like to get out to thousands , hundreds of thousands , or even millions of people , you have several options . traditional methods include print advertising , direct mail , radio , and television advertising . they are all effective , but they all have two catches : they ' re expensive and time consuming . not only that , you only get one shot at making your message heard , by the right people . the internet , the " global communications frontier " has changed this dramatically , including making countless individuals wealthy . " electronic marketing , " as it 's commonly referred to , has effectively leveled the playing fields of all types businesses . internet marketing group has been in the online marketing business for over 5 years . we can help make your goals come true . we have helped many individuals succeed in marketing their product effectively . it 's very simple to do . in fact soon you will have the problem of what to do with all the cash you will make from sending out bulk email . here is just one of many true success stories we have seen . . . we did a mailing of 1 1 / 2 million emails for one of our customers . he was selling a home workers manual for $ 29 . 95 . his results are very typical and scary . he took in over 700 orders ! 700 x $ 29 . 95 = $ 20 , 000 . this gentleman was so amazed , that after being skeptical , it had really happened to him , he made it , he found a niche . that niche was email ! he went on to buy our full list and will be set for life in less than six months time . all this from selling a simple manual via e . mail . that was just one of the many success stories we hear everyday . it may all sound to good to be true . well , we can tell you this . it really does work . why else are so many individuals doing it ? they are not just wasting their time . they are all making mega bucks . do n't even hesitate on this one or you will miss out on the most effective way to market anywhere . . period ! here ' s the bottom line and what we can do for you here is what you get when you order today ! > > 30 million email addresses . . . 1 per line in simple text format on a cd . multiple files of 250 , 000 or greater ( no codes needed to open files ) . you will receive email addresses of the following domains . . . aol , prodigy , compuserve , delphi , genie , juno , pipeline , interamp , msn , mci , and 5 million other mixed email addresses ( . com , . net ) . all names listed above are seperated in files by domain name for your convenience . plus these bonus specials . . . > > 2 free bulk email programs . . . pegasus and eudora . you will be able to load our names into these 2 distribution list software 's ( which will create distribution lists saving you hours of work ) for immediate , around the clock launching ! you can whip out as many distribution lists as you like , and depending on the speed of your modem and the length of your message , you will be able to send out around 10 , 000 to 30 , 000 messages per hour for free . > > " stealth mass mailer " bulk email . this is the most popular bulk emailer in the world . this is the full working verion of the program . this product sends over 250 , 000 per hour . ( value $ 399 . 00 ) > > setup instructions and tips for stealth mass mailer . > > free check by fax software ! ( $ 299 . 00 value ) > > where to get a free web page . > > super note pad . . . this software will help manage your large text files for you . > > winzip self extractor . . . this program will be needed when de-compressing a compressed file . it will come in handy when dealing with files of zip format . > > over 5 , 000 places to advertise for free ! > > " profits 2500 series " . . . 7 manuals that will teach you how to market on the internet and what offers work and which ones to stay clear of . also we will show you where to find web designers for free and much , much more . you get everything for only $ 199 . 00 > > > special bonus . . . if you order within 24 hours you can deduct $ 50 . 00 from the listed price . limited time only ! we have previously sold the seven manuals alone for over $ 400 . now you can have the complete package for the low price of only $ 149 . 00 do n't even hesitate on this one . . reserve yours today ! all lists are completely free of any duplicates . we also on a continual basis , add new names and remove undeliverables and remove requests . the result is the cleanest email addresses available anywhere to use over and over again , for a fraction of the cost that other companies charge . typical rates for acquiring email lists are from 1 cent to as high as 3 cents per email address - that 's " information highway " robbery ! . how do i protect my e . mail address ? 1st of all , send your e . mail with the stealth mass mailer . this program will protect your email address while sending your e . mail at speeds of up to 250 , 000 messages per hour ( 28 . 8 connection ) . 2nd , collect your inquiries and remove requests via autoresponders . using autoresponders , you do n't even have to read the flames . just move them to your remove list and forget about them ! start earning mega money and get started now ! to order our email package , simply print out the ez order form below and call us anytime . we accept visa , mastercard , american express , personal check or money order . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ez order form call our 24 hour order line at : 1-561 - 697-0657 ( orders only ) we will deduct an additional $ 5 . 00 for all phone orders . _ _ _ _ _ yes ! i would like to order your 30 , 000 , 000 email addresses plus all the bonuses for only $ 199 . 00 _ _ _ _ _ i am ordering within 24 hours ! please deduct $ 50 . 00 from the price making the total only $ 149 . 00 * please select one of the following for shipping . _ _ _ _ i would like to receive my package overnight . i ' m including $ 12 for shipping . _ _ _ _ i would like to receive my package proirity delivery . i ' m including $ 4 for shipping . _ _ _ _ please add $ 10 . 00 for all orders from outside the u . s . date _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ name _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ city , state , zip _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ phone number _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ email address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ type of credit card : _ _ _ _ _ _ visa _ _ _ _ _ mastercard _ _ _ _ american express credit card # _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ expiration date _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ name on card _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ amount $ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ signature : x _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ date : x _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - best of luck ! ! we apologize if this e . mail was sent to you in error . to be permanently removed from all mailing lists simply go to http : / / www . remove-list . com thank you ! thank you ! m<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: VLADI-GASDAILY-CURVEFETCH.xls Vladi
I just found something suprising.
The starting date for settled price data for invidual curves may differ.
For Example -- Using an effective date of 1/1/01 price data for the following curves begins on:
GDP-AECO 4-1-01
GDP-AECO-ENRON 2-1-01
GDP-AQUADULCE 1-1-01
GDP-ALGONQUIN 1-1-01
To get the data to align propely a prompt month of 4/1/01 can be used.
The earlier sheet doesn't alert you to and simply outputs the pricedata without regard to the date of the 1st available price. The attached sheet displays the first date pricing is available (after the prompt month) if it doesn't match the prompt month.
Thanks,
Kim
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [opensuse] Extensive disk i/o at startup (10.3)(rephrased posting) Randall R Schulz wrote:
> On Friday 15 February 2008 09:29, Aaron Kulkis wrote:
>> Bob S wrote:
>>> ...
>>>
>>> Welll......Don't forget about "locate" if you have that installed.
>>> That shouldn't take very long though unless you have a ton of data.
>> In contrast to beagle, I HIGHLY endorse locate.
>
> Again and again again with this:
>
> - Locate _only_ knows file names.
I know.
> - Beagle indexes file _contents_.
Which is normally well-indicated by file name and
location within the directory tree.
>
> Locate is in _no way_ a replacement or substitute for Beagle.
On the other hand, resources consumed by locate tend to
be quite minimal -- updatedb runs extremely quickly
with no noticeable impact on system responsiveness.
The value/cost proposition for locate is favorable,
because it's simple and debugged.
> They serve different purposes.
Yes, I know.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Ups! No such user... mailto: root@localhost ---------------------------------- -- References: <[email protected]> In-Reply-To: <[email protected]> X-loop: root@localhost >Ups! >No such user... >mailto: root@localhost >---------------------------------- >-- >Subject: Re: [9fans] Video card problem.. >References: >In-Reply-To: >X-loop: root@localhost >>I have made progress. I was intsalling from 1st edition CD, with 2nd >>edition it does install correctly from CD. Now I want to get a better >>GUI. The card in the PC is: >>ATI 3D Charger IIC/4Mb RAM >>card documentation says that it can do dotclock to 80MHz >>ramdac is "3D Rage II" at 170Mhz >>aux/vga finds a string at >>0xC0085="ATI MACH64 BIOS P/N 113-40606-112" >>link=vga >>ctrl=mach64 >>if I use the above three lines in /lib/vgadb the screen goes blank and >>stays blank. >>Any pointers? >>- ishwar<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Commerical Support Group Bullets 10/18/01 See file attach....................
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [ILUG] How to copy some files On Fri, Jul 19, 2002 at 05:06:59PM +0100, Matthew French wrote:
> On that note: is there any real benefit to using hard links? I avoid them as
> a rule, and cannot think of any good reason to use them at the moment.
There are lots of benefits to using hard links, for all sorts of reasons. In
this case, they are being used to provide two quite different namespaces
for the same set of files.
Niall
--
Irish Linux Users' Group: [email protected]
http://www.linux.ie/mailman/listinfo/ilug for (un)subscription information.
List maintainer: [email protected]<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>TidBITS#922/01-Apr-08 [Apologies if this is a duplicate; our server crashed during sending. -Adam]
TidBITS#922/01-Apr-08
=====================
Issue link:
If what we're hearing is right, you might want to hold off on buying
an iPhone until the second-generation models appear later in 2008
with support for the Iridium satellite network, which Apple is
currently negotiating to buy. Another hint that the
second-generation iPhone will be worth waiting for comes from an
undocumented feature discovered in the beta iPhone 2.0 firmware -
Time Machine support. But be careful with what you're sharing, since
there's a new virus out there that's affecting Mac users. In
Internet news, Merriam-Webster experiments with sponsored
definitions and a U.S. federal judge grants an injunction against
declaring email bankruptcy. We also announce a new subscription mode
aimed at making TidBITS more relevant to a younger audience, and
pass on some of the best suggestions for new titles from our recent
Take Control reader survey.
Articles
Time Machine Support Added to iPhone and iPod Touch
Merriam-Webster Accepts Sponsorship to Redefine Unlimited
iPhone Goes International with Iridium
Mac Users Affected by New Virus
U.S. Federal Court Declares Email Bankruptcy Illegal
TidBITS Introduces New Subscription Mode
Take Control News: New Title Suggestions
------------ This issue of TidBITS sponsored in part by: --------------
* READERS LIKE YOU! Support TidBITS with a contribution today!
Special thanks this week to James White, Olaf Pluta, Mike Calmus,
Amy Teel, and Dr. Michael A. Riccioli for their generous support!
* Fetch Softworks: Fetch 5.3 has WebView, the easy way
to view files in a browser and copy Web addresses from Fetch.
Also a new look for Leopard, droplet shortcuts, and more.
Download your free trial version!
* WebCrossing Neighbors Creates Private Social Networks
Create a complete social network with your company or group's
own look. Scalable, extensible and extremely customizable.
Take a guided tour today
* MARK/SPACE, INC: The Missing Sync provides the very best in
synchronization for Mac users with BlackBerry, Palm OS, or
Windows Mobile devices. Integrates with Address Book, iCal,
Entourage, iPhoto, and iTunes.
* VMware Fusion. The most seamless way to run Windows on your Mac.
Backed by nearly a decade of proven virtualization technology.
Try VMware Fusion today for free, or order online for only $79.
Visit:
* StuffIt Deluxe 12: breakthrough compression of MP3 files, PDFs,
iWork and MS Office files! Reduce JPEG file sizes with no loss in
quality, burn to CD/DVD, back up archives to iDisk and more. Buy
today for only $59.99!
* ConceptDraw Business Suite: Take control over your business
workflow with this powerful set of tools. Mind Mapping, Project
Management, Business Graphics - all easily created on your Mac!
Right now Special Price: $449!
* DealBITS: Get the word out about your product AND generate sales!
It's easy: give away a few copies and offer a discount to entrants.
A DealBITS drawing is quick to set up and can easily pay for itself.
For more info and rates, visit .
---------- Help support TidBITS by supporting our sponsors ------------
Time Machine Support Added to iPhone and iPod Touch
---------------------------------------------------
by Joe Kissell
article link:
As Glenn Fleishman described in "AirPort Update Adds Archive for
Time Capsule, External Mounted Drives for AirPort Extreme"
(2008-03-19), Apple's recent AirPort Extreme Base Station version
7.3.1 firmware update restored the capability to use a USB hard
drive attached to your base station as the destination for Time
Machine backups, putting an end to months of complaints by users.
Now reports are circulating that the same feature has been added to
the iPhone and iPod touch.
Members of Apple's $99-per-year iPhone Developer Program with access
to the beta release of the iPhone 2.0 firmware have confirmed that
iPhone and iPod touch models with the new firmware appear as
destinations in Time Machine, as long as both the handheld and the
computer running Leopard are connected to the same Wi-Fi network. As
with the AirPort Extreme firmware update, Apple's documentation for
the iPhone firmware update fails to mention this change.
One of the developers to discover the new feature, who wished to
remain anonymous, expressed puzzlement about the capability, asking,
"Why would you use a device with only 8 to 32 GB of memory as a
backup device, when your computer's hard disk contains much more
data?" Some developers we contacted believe the so-called feature is
actually a bug, which will be removed before the firmware's final
release. Others, however, believe the change presages the imminent
release of iPhone and iPod touch models with dramatically larger
amounts of storage. For example, an iDevice with even 80 GB of space
(half the current maximum of an iPod classic) could back up the
entire contents of a MacBook Air's 64 GB solid-state drive with 16
GB to spare for music and videos. Such a device would address the
issue I've frequently mentioned that Time Machine provides no
convenient mechanism for storing a copy of one's backups off-site,
though Time Machine's current lack of an encryption option would
still need to be addressed.
Meanwhile, the iPhone and iPod touch still - even with the beta
version of the 2.0 firmware - do not offer a way to access their
storage space as an external volume on your Mac, whereas most other
iPod models do. Users can work around this limitation using
third-party hacks such as the $9.95 MegaPhone utility from Ecamm
Network, though such utilities do not provide a user interface for
interacting with any extra files directly from your iDevice.
Merriam-Webster Accepts Sponsorship to Redefine Unlimited
---------------------------------------------------------
by Glenn Fleishman
article link:
The venerable dictionary publisher Merriam-Webster launched an
experiment today that combines wiki-like interaction with commercial
possibilities: it has accepted a joint sponsorship from Yahoo and
Verizon Wireless to redefine the word "unlimited" in the
Merriam-Webster online dictionary.
This is the first step in a broader effort for Merriam-Webster to
open their dictionary to editor-reviewed user contributions that the
company hopes will "increase the accuracy, scope, and timeliness" of
the dictionary's definitions. The sponsored entries, clearly
identified as such, "aim to enhance readers' understanding and
embrace of the change in words fostered by corporations," said
editor Michael Pangloss. "We expect a very positive response, and
the sponsorship revenue will fund our wik-tionary efforts."
Yahoo and Verizon Wireless, among other companies, have been working
diligently to redefine "unlimited" long before Merriam-Webster
afforded them this sponsorship opportunity. Most recently, Yahoo has
offered "unlimited" email storage and "unlimited" Web hosting
resources for small businesses; Verizon Wireless formerly had an
"unlimited" BroadbandAccess cell data plan. Verizon Wireless was
thwarted by the New York attorney general; by changing the official
dictionary definition, Verizon Wireless should be able to resume
their "unlimited" offering.
iPhone Goes International with Iridium
--------------------------------------
by Adam C. Engst
article link:
Apple's iPhone has proven wildly popular around the world, even in
countries where there's no official carrier (see "iPhone the Hot
Ticket Item in... Syria?," 2008-03-24). Although Apple will continue
to negotiate deals with carriers in larger countries, we've learned
that the company has quietly been working on an innovative plan that
will enable the iPhone to work literally anywhere in the world.
Already, the iPhone can switch between the EDGE cell data network
and Wi-Fi, choosing the best connection at the time, since Wi-Fi
offers far more throughput than EDGE, but is available in many fewer
locations. With the second generation iPhone, anticipated for the
middle of 2008, Apple is widely expected to add 3G data support,
which should provide more cellular data bandwidth. But sources have
confirmed that Apple won't just be adding 3G support, but will also
be acquiring the Iridium satellite network and giving the
second-generation iPhone satellite phone capabilities. With Iridium
support, the iPhone will work anywhere in the world, at sea, in the
air, and even at the poles.
**i in the Sky** -- Iridium is a mesh network of 66 communications
satellites in low earth orbit aimed at providing a truly global
voice and data network. The service came online on 01-Nov-98, but
went into Chapter 11 bankruptcy less than a year later, due to the
massive startup costs (estimated at $6 billion) of launching so many
satellites. Other problems included the decreased cost of
terrestrial cell service, increased use of roaming agreements
between terrestrial carriers, the high cost of both handsets and
service, and management failures. In 2001, the service was purchased
by a group of private investors for about $25 million and service
was restarted. The new Iridium Satellite LLC currently has about
250,000 customers, and 2007 revenue may have been as high as $300
million.
Apple will reportedly be paying somewhere in the $500 to $700
million range for Iridium Satellite, marking Apple's first foray out
of the computer and consumer electronic markets (unless you count
the AppleLink and eWorld online services, which are better seen as
for-fee predecessors of Apple's current Internet services). Given
Apple's $18.4 billion in cash, purchasing Iridium won't have a huge
effect on Apple's bottom line, especially given that Iridium is
currently profitable.
Much of Iridium's business comes from the U.S. Department of
Defense, which invested to keep Iridium alive and remains the
company's largest customer, paying $36 million per year for
unlimited access for up to 20,000 users. Apple is expected to keep
the DoD contract, and although the close connection with the U.S.
military may cause consternation among some iPhone and Macintosh
users, Apple insiders say that the deal may also open up many other
lucrative opportunities within U.S. federal, state, and local
governments, as well as overseas governments.
The Iridium network offers much less bandwidth even than EDGE, to
the point where the Amundsen-Scott South Pole Station had to
multiplex 12 Iridium modems together to eke out 28.8 kilobits per
second of bandwidth. But it works for voice calls, albeit with some
clipping due to the aggressive compression necessary. Apple is
expected to increase Iridium's capabilities significantly with
cutting edge radio and signal processing technologies learned from
the iPhone design.
**Calls Just Want to Be Free** -- In a bold move, Apple is expected to
offer Iridium service on the second-generation iPhone for free,
although it will not be possible for a stock iPhone to use Iridium
service in favor of a faster terrestrial service or Wi-Fi (in line
with Steve Jobs's comment about voice over IP during the iPhone SDK
launch, Apple will build voice-over-IP support into the
second-generation iPhone, limiting it to usage over Wi-Fi). Given
that Iridium service currently costs between $1 and $14 per minute,
Apple expects that this change alone will significantly boost iPhone
sales.
Iridium initially needed 1 million customers to break even, so the
network is expected to be able to handle that many users, and Apple
is betting on being able to take Iridium to the next generation of
satellite technology before the current satellite constellation ages
unacceptably (it's expected to last until at least 2010). At that
point, Apple will be able to increase Iridium's throughput to
support many more customers and to provide better data performance.
The main downside to Apple adding Iridium support to the iPhone,
according to sources within the iPhone hardware team, is that the
antenna necessary for the iPhone to communicate with the Iridium
satellites makes the sleek iPhone a bit ungainly, as you can see in
this picture of a current prototype. Apple hopes to reduce the
antenna size, but our sources have expressed concern that fitting
the Iridium-capable iPhone into a pocket may not be possible until
the next generation satellite constellation comes online, with more
powerful and sensitive radios that can be miniaturized into the
current iPhone form factor.
Mac Users Affected by New Virus
-------------------------------
by Rich Mogull
article link:
Reports surfaced today that a new virus is slowly spreading
throughout the Mac community. The first infections appeared a few
days after Macworld Expo in January 2008 and were initially centered
in the San Francisco and Cupertino areas, but soon spread throughout
California, with additional hotspots in major metropolitan areas
throughout North America and Europe. The virus continues to spread
slowly and efforts to eradicate it have been unsuccessful. Although
Mac users usually have a relatively lower risk of viruses than their
Windows brethren, experts believe this infection is isolated to the
Mac community, and it is not expected to transition to the broader
computing world.
Officials suspect the virus first appeared at Macworld Expo, quietly
infecting unprotected users. Apple employees were likely another
vector, as the next wave of infections seemed centered on Apple
retail stores. The virus has since entered the broader Mac
community, moving beyond enthusiasts with riskier trade show habits
to the general Macintosh population. Symptoms include nausea,
vomiting, and general flu-like symptoms.
"It's bizarre, but this virus appears to be limited almost entirely
to users of Macs, iPods, and other Apple products," stated Dr.
Miroslav Virislavski, a spokesman with the U.S. Centers for Disease
Control in Atlanta, Georgia. "With tens of thousands of enthusiasts
at the Macworld conference, the virus quickly gained a foothold with
Apple users, especially company employees. While it's not unusual
for viruses to spread at major events, this one is unique since it
has since established itself in Apple retail stores and has been
hard to eliminate."
Experts have identified the infection as a new variant of the
norovirus family. Noroviruses are well known for cruise ship
outbreaks and for spreading quickly through isolated communities.
"Symptoms for the average norovirus normally appear within 24 to 48
hours of exposure," stated Dr. Virislavski, "but this version seems
to mask its symptoms for up to 4 days, even though carriers are
contagious after the first 12 hours. We think this long incubation
period is contributing to the slow spread and difficulty in
containing the outbreak, as is the relatively small Mac user base
compared to the rest of the population."
Noroviruses are particularly hardy and remain viable on surfaces
such as keyboards, iPod click wheels, and iPhone screens for up to
three weeks under normal indoor conditions. Infected users continue
to shed the virus for up to two weeks after their recovery. Symptoms
typically last 1 to 2 days, and most users recover without incident.
Noroviruses do break down quickly in sunlight, an environment few
Mac users experience.
Jim Borne, security product manager at SymCaftego Software, believes
Mac users are suffering due to their careless habits and sense of
immunity. "Apple users are just as vulnerable as Windows users, but
refuse to admit they aren't any safer. The Windows community has
spent years building their defenses while Mac users carelessly share
their laptops, iPods, and iPhones without following best practices
for safe computing."
Experts believe the social nature of the Apple community, combined
with a false sense of security, make this outbreak particularly
insidious. "These guys (and girls) think they're better than the
rest of us, but they're far less prepared for the real world," said
one epidemiologist, who wished to remain anonymous. "They're always
touching each other's computers, iPods, and other devices without
taking any precautions like simple hand washing. That's just
dangerous, and a little gross."
A survey released by the manufacturers of the Purell hand sanitizer
indicated that Mac users are a staggering 42 percent less likely to
use a sanitizing gel between computing sessions. "They also have
long hair and dress like hippies," reported one researcher, "at
least the ones that aren't wearing black jeans and turtlenecks even
in the middle of summer."
The Department of Homeland Security, in conjunction with the Centers
for Disease Control, is investigating the possibility that the virus
was released intentionally to infect the Mac community. "Genetic
engineering is no longer limited to large companies and nation
states. It's possible this is a man-made virus created by terrorists
that specifically targets Mac users," said a spokesman for DHS.
"While we don't have a single shred of evidence to support that, you
should be scared anyway because we said so."
Security experts agree that while most man-made viruses have a
political or financial incentive, the general smugness of Mac users
may have finally pushed a basement genetic hacker into creating a
proof of concept. David Maynor, the security researcher most well
known for his research into Mac wireless vulnerabilities, said that
he wasn't surprised Mac users were infected (see "Wi-Fi Exploit
Precursor Published One Year Later," 2008-09-21). "I've been warning
about this for years," claimed Maynor. "As a matter of fact, at
Black Hat 2005 I showed a video of myself vomiting for 2 days after
using my Mac and no one believed me. Apple tried to cover it up, but
we all know that Mac users aren't any safer than Windows users."
John Gruber of Daring Fireball quickly challenged Maynor to back up
his accusations. Gruber will purchase a brand new Mac and allow
Maynor to infect it in front of witnesses. If Gruber vomits after
using the Mac, Maynor gets to keep it. "That video is a sham," says
Gruber, "as the camera pans around the bathroom door to show Maynor
puking, you can clearly see a bottle of syrup of ipecac on the
counter. He faked the entire thing."
John Moltz of Crazy Apple Rumors Site failed to respond to our
queries and is believed to be spending the year dead for tax
reasons.
U.S. Federal Court Declares Email Bankruptcy Illegal
----------------------------------------------------
by Glenn Fleishman
article link:
In a move that could affect as many as 20 million Americans, the
U.S. District Court for New York has ruled that a Poughkeepsie man
will need to retain all the email in his inbox, and must respond to
it with all due haste. The man, 37-year-old Bob Sneed, a sales
executive at a local ISP, was intending to delete over 7,500 unread
email messages until halted by a court order.
The case was brought by Sneed's brother-in-law, Philip S. Duenzel,
an attorney in Illinois, who used the federal court system because
the case crossed state lines. Duenzel alleged, and the court upheld,
that he would suffer irreparable damages if Sneed failed to respond
to a documented 107 separate emails sent over 3 months, each of
which asked for a reply. The email messages variously covered family
issues, money owed for shared gifts to relatives, and 23 collections
of jokes about lawyers.
In a statement read by his attorney, Sneed said, "I believe the
courts are in error for restraining an individual from exercising
his right to discrimination: discriminating among which emails are
important enough to answer, and which deserve to be deleted without
opening." Sneed is appealing the decision, and until then is relying
on a filter that displays and automatically replies to messages from
Duenzel as soon as they are received.
Sneed was attempting to declare "email bankruptcy" by deleting all
current messages and starting over. According to research ranging
from studies by the Pew Internet & American Life Project to the
National Rifle Association's frequent member polls, email bankruptcy
is an increasingly attractive option to those overwhelmed with
hundreds or thousands of unread email messages.
Judge Randall Siemenbocher's decision could affect both personal and
business users, pending Sneed's appeal, which has left him in limbo.
One Gartner researcher pegged the impact at "$500 billion in lost
productivity and legal liability each year" if businesses are
prevented from deleting any unread messages. Jaylee Schmitzenlooper,
a Gartner senior analyst, said, "Theoretically, this decision could
be used to require both individuals and businesses to accept all
spam messages, since there's little technical difference between
deleting unread messages in your inbox and having a spam filter do
so for you."
Commenters on Slashdot have already suggested an underground
business that would remotely corrupt inboxes in exchange for
payments made through third-party anonymous payment systems. One
commenter, apparently already in the planning stages for an
Albanian-located firm, wrote, "For $50, we could send you an email
message that would infect your computer, delete the inbox, and leave
clear traces for any potential forensic investigation to prove that
it wasn't your fault. We'd perform an antivirus cleanup at no extra
cost."
For those of us facing nearly 1,000 unread messages with no hope of
responding to them all, now is the time to press Delete.
TidBITS Introduces New Subscription Mode
----------------------------------------
by Matt Neuburg
article link:
Here at TidBITS, positioning ourselves for maximum exposure and
reader appeal has long been a losing game. Let's face it, TidBITS is
not for everyone. Without fully summarizing our history, since it
has been covered many times before (see the "TidBITS History" series
of articles), a brief recap will show the problem. We began, way
back in 1990 before the word "Internet" was common coin, as a
HyperCard stack uploaded to the sumex-aim FTP mirror sites; later,
when more people had email, we became a subscription list sending
out our content in plain setext format. But innovations beyond that
point were made very reluctantly, because our guiding principle was
that TidBITS was measured and literate, almost to the point of
severity, and required no medium beyond plain text.
Thus, over the years, we were behindhand in adopting "glitzy" media
used by the rest of the world, such as HTML email, a Web site, and
(gasp!) pictures in the Web version of our articles. Most recently,
we instituted a complete revamping of our Web site's underlying
technology (see "Behind the TidBITS Curtain," 2006-09-11), followed
by a dynamic recasting of the site, moving our old issue-based
structure aside in favor of a new article-based orientation, with a
genuine content management system behind the scenes (see "Designing
a Modern Web Site for TidBITS," 2007-09-10). As Adam said in that
last-mentioned article, we weren't attracting new readers, so it was
"evolve or die."
It's _still_ "evolve or die." Despite all our efforts, one
undeniable trend remains: We _aren't_ seeing hundreds of new
subscribers every day. This became particularly evident when we
analyzed the results of a recent survey ("TidBITS 2007 Reader Survey
Results: Who Are You?" 2007-03-12), and discovered one overriding
and disturbing trend: TidBITS readers are aging - "the largest
ten-year age group represented among those responding is the 51-60
age group" - and new, younger readers are conspicuous by their
absence. It isn't hard, projecting this trend into the 30-year
future, to see that this is a disaster. Unless we can bring younger
readers into the fold, TidBITS will soon be overwhelmed by the
growing tsunami of Web 2.0 (and 3.0 and 4.0) sites favored by
today's youth. Without eyeballs, we won't get advertising; without
advertising, we can't pay for the server; without a server, there's
no TidBITS.
During a recent multiway iChat virtual staff meeting, as we were
despairing of this situation, someone remembered the reader response
to our series of articles about Twitter ("Confessions of a Twitter
Convert, 2007-10-09" and "Confessions of a Twitter Revert,"
2008-01-02). When Adam confessed that Twitter had its uses, our
readers cried, "Well, duh!" When Glenn confessed that he couldn't
endure the constant Twitter input, our readers screamed, "What a
fogey!" (And though he hasn't admitted it in an article, Glenn is
back on Twitter in force.) Clearly, our readers appreciate
short-form messaging services. And the younger they are, the more
they like them.
From this, the conclusion was suddenly obvious. Since our conversion
to a Web format, and especially since our recent move to an
article-based structure, our issues have been getting longer and
longer as we've abandoned the 30,000 character limit that we had
imposed on ourselves back in the days of limited email gateways.
This, clearly, is the wrong way to go. What our younger readers want
isn't longer; it's shorter! In fact - it's Twitter. Think about it.
Attention spans are getting shorter. Today's youth are bombarded by
an army of stimuli, with cell phones and text messaging positively
ubiquitous. That's how they want their TidBITS, too. As Antony says
in the first scene of Shakespeare's _Antony and Cleopatra_ when a
messenger arrives: "Grates me, the sum." In other words: "I don't
have time for details; just hand it to me in condensed form." And
what could be more condensed than Twitter? 140 characters of pure,
unadulterated "sum." Shoutcast your message into the ether, and
instantly all subscribers see it, grok it, and move on.
So, here's the plan. Starting today, a new Twitter account -
TwitBITS - will represent TidBITS. All TidBITS articles will be
condensed to 140 characters, and this summary will be sent out as a
tweet, automatically, the instant the article is posted at our Web
site. Readers who are "following" our Twitterized TidBITS account,
by whatever medium (Twitterrific, SMS, PocketTweets, and so on),
will instantly be apprised of each article as it appears. Naturally,
we don't expect this format to appeal to everyone; the geriatric
wing of our readership will surely prefer to continue reading
TidBITS in its long form. But as the TwitBITS buzz starts to catch
on, we expect a much younger population to begin discovering TidBITS
and, we hope, flocking to us.
Just one problem remains: Condensing an entire TidBITS article into
140 characters is not easy. In order to do it, we're clearly going
to have to surrender not only length but also literacy. In
particular, we're going to have to adopt some form of abbreviated
language that can accommodate the maximum possible meaning in the
fewest possible characters. This, of course, is a problem long ago
solved by today's youth, who sprinkle their text messages with all
sorts of abbreviations such as "LOL," "ROTFL," "CUL8R," and so
forth. We're going to have to learn this style of abbreviation and
adopt it. After some research, we at TidBITS have discovered that in
fact there is already an entire dialect of English devoted to
precisely this sort of brevity - LOLCat.
For those not in the know, LOLCat is a highly condensed patois,
based on text messaging, and imagined to be produced by the
grammatically challenged intellect of a cat. Its expressive
potential is well demonstrated by the fact that the entire Christian
Bible is currently being translated into LOLCat (as of this writing,
the project is nearly 50 percent complete). Clearly, any dialect is
worthy of serious consideration if it can recast the Second
Beatitude from the Sermon on the Mount as, "U r doin good if U iz
sad kitteh; U can has petting."
To be sure, we're not yet entirely certain of the details, but we
imagine that, for example, Rich Mogull's recent article, "Should Mac
Users Run Antivirus Software?" (2008-03-18), might be summarized as:
"Macs can haz virusez? No, U r doin good. But f u haz Windoze BFz,
can iz in ur mail sistem. So u iz tell ur ISP 2 blok spam an
virusez, k?" (138 characters.)
For us at TidBITS, with its outstanding tradition of literacy and
expansive, technical description, to produce such primitive, puerile
blather will certainly be painful. But, let me repeat, this step is
absolutely necessary to our survival. So please, everyone get with
the program here. If you don't want to subscribe to the TwitBITS
version of our articles, that's fine; neither do we. But if you have
children of text-messaging age, please do urge them and their
friends to subscribe. We desperately need their eyeballs. Even
TidBITS founder and publisher Adam Engst, when asked whether he felt
any qualms about surrendering TidBITS's long-standing reputation for
in-depth, well-written articles, said (with some difficulty): "Yo,
dude, LOLCat teh bom. Srsly."
Take Control News: New Title Suggestions
----------------------------------------
by TidBITS Staff
article link:
Our recent Take Control reader survey was amazing - thanks to
everyone who provided feedback. Most interesting were some of the
suggestions for new titles, which we're pondering right now.
**Take Control of Backdating Stock Options** -- It's legal, really it
is! This book will explain the ins and outs of backdating stock
options so the Securities and Exchange Commission stays off your
case, or at least doesn't notice until you've received your golden
parachute and fled the country. Real-world advice includes tips on
picking a compliant board of directors, blaming your previous CFO,
and claiming ignorance without looking stupid.
**Take Control of Swearing in Esperanto** -- Sercu vian kacon per
pincilo! Did I just compliment your blouse or call you a piece of
merde? You'll never know. Thanks to "Take Control of Swearing in
Esperanto," you can exercise your innate ability to spew obscenity
while not running afoul of violent people who are larger than you.
Just like in the classic movie "Breaking Away," people will assume
you were born elsewhere and frequently break into your native
tongue. Or that you have Tourette Syndrome (see Appendix A for
particular advice on that topic).
**Take Control of Quilting Hawaii and Stuffing It Topographically** --
Remember that fabulous trip to Hawaii? Wouldn't it be great to take
a part of it home with you? Leave that volcanic rock and overpriced
Kona coffee behind. Instead, take up needle, thread, and foam, and
create this wonderful bedspread that allows you to think of Mauna
Loa fondly every time you lay your head down. We plan a series of
state books on quilting and stuffing, with Kansas, Nebraska, and
Iowa due out in a single volume next. The Arizona edition will
require modifications to your bed. (Note: Not endorsed by or related
to the book, "Let's Quilt Hawaii and Stuff It Topographically.")
**Take Control of Controlling Your Intake** -- Our meal planning book
"Take Control of Thanksgiving Dinner" was so critically received
that we thought a complementary title was needed. "Take Control of
Controlling Your Intake" has sections on all the major diets, their
pros and cons, and tips on avoiding eating disorders. Special bonus:
Foreword by Michael Pollan along the lines of, "Eat food. Not too
much. Mostly plants."
**Take Control of Finding Naughty Bits in Google** -- Everyone knows
that Google is the dominant search engine on the Web, but that
doesn't mean it always comes up with exactly what you're looking
for. In particular, it can be difficult to find the naughty bits
we're always told are in such strong supply on the Internet, so in
this book, we'll reveal the secrets of geeky teenagers who know all
the tricks for making Google show the down and dirty.
**Take Control of Getting Babies to Sleep** -- Written by our in-house
parental sleep experts, who have themselves suffered through years
of nightly wakeups and the associated damage to cognitive processing
and memory, this book will teach you the ancient Chinese secrets
guaranteed to send any healthy baby to sleep. Also, booze. Not for
the baby, of course; for you: every ebook has a hollowed-out virtual
niche into which a flask of bourbon is secreted. It's a Take Control
secret how the alcohol gets out of the ebook and down your gullet.
And, of course, there's some for the baby. (What were we talking
about? Ah, yes, that dream I had last night. Let me pull myself
together. Splash of water on the face. Okay, back to it.) A special
bonus section will teach you to make a simple inhaler filled with
all-natural ingredients found in nature, designed by nature as a
soporific that's guaranteed to help your baby nap for at least 30
minutes when you just need some time for lunch and a shower. No,
it's not booze. Okay, it is, in fact, booze. So use only as
misdirected, without your state or country's child protective
services lurking around.
**Take Control of Taking Control** -- Have you ever wanted to be a
micro-manager? What about a petty dictator? This book will tell you
everything you need to take control at any level, in any situation.
Learn to use simple psychological tricks to manipulate people
through fear and greed. Later chapters examine the use of force
(both subtle and bloody) to achieve your ends. Order this book by
clicking on the Buy button on the left side of the screen. No, not
that button, lower. Sigh. Here, let ME do it.
**Take Control of Letting Go** -- Are you a control freak? Do you find
you try to take control in every situation, even when it's utterly
inappropriate or guaranteed to cause you headaches? This title will
teach you the fine art of letting go so you can stop trying to run
everyone else's lives. One section focuses on how to not build your
child's Lego kits for them, and another is called "Stop Installing
New Versions of Mac OS X on Your Wife's Laptop without Her
Permission!"
(For a limited time only, you can buy a special bundle containing
both "Take Control of Taking Control" and "Take Control of Letting
Go." For just $2 extra, we'll time-delay delivery of the second
title by your choice of 1 week, 1 month, or even 1 year!)
**Take Control of Spouse Sharing in Leopard** -- Apple significantly
enhanced Mac OS X 10.5 Leopard's sharing capabilities, adding screen
sharing and making file sharing easier to use. But what most people
haven't yet discovered is that Leopard also contains utilities for
simplifying spouse sharing. Seriously, dude, everyone's doing it,
and you just need to select the Sharing preference pane, scroll down
the list of Services, and check the Spouse box. Looking for ways of
swapping spouses with your colleagues but too embarrassed to raise
the topic in conversation? Leopard's new Bonjour-based spouse
sharing utility helps you broach the subject, arrange assignations,
and can even search a regularly updated database of divorce lawyers
in your area. Bonus! Includes a discount coupon off these excellent
male ego enhancement placebos!
**Fake Control of Apple, Inc., by Fake Steve Jobs** -- Did you found
(okay, co-found) a legendary technology company that's hit hard
times? Are you languishing in a forgotten startup with awesome
technology but no publicity? Are you primed to save the world, and
you see no better way to do it than by retaking the helm at a
personal computer maker with a dwindling cult following? This book
reveals the fake secrets you'll need, including how to get your
company acquired while actually taking over the acquiring company,
throwing the press off track by saying exactly the opposite of what
you're going to do a year later, inventing the iPod, and a great
section on Top 10 Zen Presentation Tips ("Boom!" is your friend).
**Take Control of Ordering a Drink at Starbucks** -- Are you
confounded by all the choices at your local Starbucks? Are you
unsure which of the three Starbucks near your house you should
patronize? This book, written by a Seattle native with advice from
the famous Starbucks expert Winter, covers all your options and
helps you make the right decision. By the end of this book you will
be able to say, "One tall extra hot, four-pump, nonfat, no-water
chai with whip" without missing a beat or giggling hysterically.
**Take Control of Chaos** -- Learn to catch butterflies in Asia before
they become tornados in the Americas. Build your own tipping points
with simple tools and household materials. If you and your initial
conditions have ever been codependent, if you have ever fallen under
the spell of a strange attractor, or if you have ever wanted to
learn how to bake fractal mandelbrot (excellent with coffee!), this
non-linear dynamic book will shift your paradigms and renormalize
your life.
$$
This is TidBITS, a free weekly technology newsletter providing timely
news, insightful analysis, and in-depth reviews to the Macintosh and
Internet communities. Feel free to forward to friends; better still,
please ask them to subscribe!
Non-profit, non-commercial publications and Web sites may reprint or
link to articles if full credit is given. Others please contact us. We
do not guarantee accuracy of articles. Caveat lector. Publication,
product, and company names may be registered trademarks of their
companies. TidBITS ISSN 1090-7017.
Copyright 2008 TidBITS: Reuse governed by Creative Commons license.
Contact us at:
TidBITS Web site:
License terms:
Full text search:
Subscriptions:
Account help:
--
If you want to unsubscribe or change your address, use this link
http://emperor.tidbits.com/webx?unsub@@.3c557dc4!u=30544631
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Your recipe for successful love
3 months supply of perfect intimate life. http://wlheaa.busyquotient.com
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Healthy living with less fat
Anatrim â The latest and most fascinating lose flesh product available â As shown on BBC.
Do you recall all the situations when you said to yourself you would do anything for being saved from this desperately growing pounds of fat? Luckily, now no great price is to be paid. With Anatrim, the earth-shaking weight-reducing combination of elements, you can achieve naturally health mode of life and become really thinner. Take a look at what our customers write!
"Itâs rather difficult to admit it but I was a junk food addict.
I ate all this garbige
and was unable to stop.
This misery ceased after I started course with Anatrim!
Holy God,
my craving for food decreased,
mood increased and I became the happiest person 21 pounds in 2.2 months.
I can tell you now Iâm the happiest person on the planet!"
Silvia D., San Diego
"I had weight problems since I was a boy.
You can't fancy how I abhorred being derided at school.
I hated my plumpness and I abhorred myself.
After trying this and that I found out about Anatrim.
It literally dragged me out of this nightmare! A plenty of thanks to you, guys."
Steve Doubt, Las Vegas
"Know what? Anatrim preserved my marriage! I went into this circle, depression â more eating â even more depression. My wife had thought to leave the overweight psycho I was turning in.
My best friend showed me web site and I called for pack of Anatrim right off.
The results were excellent, my appetite became normal, I was in a good mood oftener, and, certainly, I tightened my belt with no regrets. And you know, the sex became fantastic also!"
Mike
There is a great number of gratitudes happy people leave after taking Anatrim. Donât you wanna add yourself to the tens of thousands of slender clients and take this original appetite-suppressing power raising product now!
Do not decline the opportunity!
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>amee zeisler dlintentionsctkcz labtested female sensual leverage patients access online health perfect resource people get medication without hassles awkwardness full health click fri 08 aug 2008 090030 0500 patients access online health shop internet 24 7<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>You have successfully added a new email address to your PayPal account! X-psy1.psych.arizona.edu X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12] X-AntiAbuse: Sender Address Domain - paypals.com X-Source: X-Source-Args: X-Source-Dir: dddd Protect Your Account Info Make sure you never provide your password to fraudulent websites.PayPal will never ask you to enter your password in an email.For more information on protecting yourself from fraud, please review our Security Tips at https://www.paypal.com/us/securitytips Protect Your Password You should never give your PayPal password to anyone, including PayPal employees. You have successfully added a new email address to your PayPal account Dear PayPal Customer, The primary email for your PayPal account was changed on May. 1st, 2006. Â If you don't agree with this email [email protected] and if you need assistance with your account, please click here and login to your account. Thank you for using PayPal! The PayPal Team Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and choose the Help link located in the top right corner of any PayPal page.To receive email notifications in plain text instead of HTML, update your preferences here. PayPal Email ID PP059<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Can I link my own subversion link to my projects at code.google.com ??
Can I link my own subversion link to my projects at code.google.com ??
As I always develop my application for a while at my own SVN server,
can I just link it instead of mirgation?
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "codesite-discuss" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/codesite-discuss
-~----------~----~----~----~------~----~------~--~---
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Buenos dias! We haven't been introduced... :)
Nofo ti malolo
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: Description of UBS Deal Louise,
We have information about the Master User at each company (i.e. name, address) and we have created new customer profiles for product access based on previous profile information, but have not kept any transaction-specific information.
Dave
-----Original Message-----
From: Steffes, James D.
Sent: Tuesday, January 29, 2002 8:25 AM
To: Kitchen, Louise; Forster, David
Subject: RE: Description of UBS Deal
The Master Agreement and License Agreement mention that you have "Customer Data". Is this wrong?
Jim
-----Original Message-----
From: Kitchen, Louise
Sent: Tuesday, January 29, 2002 6:46 AM
To: Steffes, James D.; Forster, David
Subject: RE: Description of UBS Deal
Simply
People, systems and floor space.
Back to front applications with no specific counterparty data. WE have historical pricing etc but no counterparty names. You could get most of it from Reuters.
-----Original Message-----
From: Steffes, James D.
Sent: Mon 1/28/2002 1:59 PM
To: Forster, David; Kitchen, Louise
Cc:
Subject: Description of UBS Deal
How would you describe (in terms that a regulator would understand) what is transfered to UBS? I am asking because I want to make sure that I have a good grasp of what is going to UBS before our FERC pre-meeting.
My understanding is that we are providing software code to is used (a) for all backoffice applications and (b) for a trading platform. Anything else?
Jim
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: coming to your inbox: mp3 stock spams Luis Hernán Otegui wrote:
> We block .avi, .mp3, .mpg, etc. here, because we think it's a waste of
> bandwith to share those extensions via email,
Voicemail (from a mobile for instance) is quite often sent in .wav
or .mp3 format, so we don't just plainly block those.
/Per Jessen, Zürich
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [SM-USERS] Slash wrongly encoded as %2F in returning path
jimmi61 wrote:
>
>
> Tomas Kuliavas wrote:
>>
>> Could you test your PHP settings
>> (http://www.squirrelmail.org/wiki/TestPHPSettings). Show all settings in
>> core, session and mbstring sections.
>>
> Find the file with the settings here attached. Hope this helps you for
> giving me some debugging option.
>
> Tomas Kuliavas wrote:
>>
>> If you have enabled some Zend extensions (apc, apd, suhosin, Zend
>> optimizer, eaccelerator, turk mmcache), try turning them off.
> I don't have such extensions enabled, only those indicated in my previous
> message.
>
> Thanks for your patience ;)
> Jimmi
>
>
Your settings are standard. I don't see anything that might explain double
encoding.
Open /usr/share/squirrelmail/src/compose.php and find lines (477-484) with
----
if ($compose_new_win == '1') {
Header("Location: $location/compose.php?mail_sent=yes");
}
else {
Header("Location:
$location/right_main.php?mailbox=$urlMailbox&sort=$sort".
"&startMessage=$startMessage");
}
----
replace second Header() call with die()
----
die("Location: $location/right_main.php?mailbox=$urlMailbox&sort=$sort".
"&startMessage=$startMessage");
----
Then try sending reply. Browser should stop and output "Location: some url"
text. Check if mailbox name is encoded there twice. Then restore original
compose.php.
If mailbox name is not encoded twice, name your browser or try reproducing
same issue in other browser. If you use some proxy server, try reproducing
issue without it.
If mailbox is encoded twice, start writing reply again and check page
source. How mailbox name is written in '' line near the bottom of compose page source and what is
written in ''
line.
--
View this message in context: http://www.nabble.com/Slash-wrongly-encoded-as--2F-in-returning-path-tp15779008p15856428.html
Sent from the squirrelmail-users mailing list archive at Nabble.com.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> hey, are you here?
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: source for pcode FP divide fix? Here's the HB 2.81 pcode with floating point divide fix. This new FLTDIV
routine was giving to me by Jon Howell. I just patched the original math
library with it and recompiled the pcode. I'm pretty sure this is the same
fix that Newton Labs is using. I'm currently testing the recompiled 2.81
version of the pcode and haven't seen any problems yet. Please email me
if you see any bugs. I did not change the HB start up message so make a
backup copy of your original version of the pcode.
If anyone is interested in the RugWarrior pcode version or a version with
the new Smooth PWM drivers, let me know and I'll compile those and put them
up.
You can download a copy from my web site
http://www.wenet.net/~jfong
in the Design and Ideas section
regards
Jim Fong
At 09:36 AM 11/26/98 -0500, you wrote:
> Any chance that the source for the recent pcode FP divide
>bugfix can be released so that it could be retrofitted to the 2.81
>freeware source? I'm not suggesting that Newton Labs actually do
>the retrofit, just that the source for the patch be released.
>Weren't the original FP routines freeware from Motorola? Of course,
>there is always the disassembly option ;-)
>
> *Rich*
>--
>Richard F. Drushel, Ph.D. | "Aplysia californica" is your
taxonomic
>Department of Biology, Slug Division | nomenclature. / A slug, by any other
>Case Western Reserve University | name, is still a slug by nature.
>Cleveland, Ohio 44106-7080 U.S.A. | -- apologies to Data, "Ode to
Spot"
>
>
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nan attn may conceren dear one christ good day sorry take time disturb mrs susan thompson kuwaiti married late mr eric thompson worked kuwait embassy ivory coast twentysix years died year 2001after brief illness lasted five days married eighteen years duaghter lilian later died motor accident untimely death husbandwe born christians since death decided remarry get child outside matrimonial home bible late husband alive deposited sum us48 four millioneight hundred thousand united states dollars general trust account prime bank abidjan cote divoire presentlythis money still bank recentlyfollowing ill health doctor told may last next eight months due cancer problemthe one disturbs stroke sickness known condition decided donate fund christain organization church individual beleiver utilize money way going instruct hereinaccording desire latehusband death want fund used christain activities likeorphanages christain schools churches propagating word god endeavor house god maintained bible made us understand blessed hand giveth took decision dont child inherit money husband relatives christians dont want husbands efforts used unbelievers dont want situation money used ungodly way taking decision afraid death hence know going know going bosom lord exodus 14 vs 14 says lord fight case shall hold peace dont need telephone communication regard health hence presence husbands relatives around alwaysi dont want know developmentwith god things possible soon receive reply shall give contact bank abidjan also issue documents prove present beneficiary fund want members church always pray lord shephard happiness lived life worthy christian whoever wants serve lord must serve spirit truth please always prayerful life delay reply give room sourcing another person purpose please assure act accordingly stated herein hoping receive reply remain blessed lord christ mrs susan thompson start yahoo auction check cool campaign nan donation mrs susan thompson<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>svn commit: samba r22163 - in branches: SAMBA_3_0/source/rpc_parse SAMBA_3_0_25/source/rpc_parse Author: jra
Date: 2007-04-11 05:05:33 +0000 (Wed, 11 Apr 2007)
New Revision: 22163
WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=22163
Log:
Pure reformatting. I hate 4 space tabstops :-).
Jeremy.
Modified:
branches/SAMBA_3_0/source/rpc_parse/parse_prs.c
branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c
Changeset:
Modified: branches/SAMBA_3_0/source/rpc_parse/parse_prs.c
===================================================================
--- branches/SAMBA_3_0/source/rpc_parse/parse_prs.c 2007-04-11 05:01:02 UTC (rev 22162)
+++ branches/SAMBA_3_0/source/rpc_parse/parse_prs.c 2007-04-11 05:05:33 UTC (rev 22163)
@@ -1456,38 +1456,38 @@
/* useful function to store a structure in rpc wire format */
int tdb_prs_store(TDB_CONTEXT *tdb, TDB_DATA kbuf, prs_struct *ps)
{
- TDB_DATA dbuf;
- dbuf.dptr = (uint8 *)ps->data_p;
- dbuf.dsize = prs_offset(ps);
- return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE);
+ TDB_DATA dbuf;
+ dbuf.dptr = (uint8 *)ps->data_p;
+ dbuf.dsize = prs_offset(ps);
+ return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE);
}
int tdb_prs_store_bystring(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps)
{
- TDB_DATA kbuf = string_term_tdb_data(keystr);
- return tdb_prs_store(tdb, kbuf, ps);
+ TDB_DATA kbuf = string_term_tdb_data(keystr);
+ return tdb_prs_store(tdb, kbuf, ps);
}
/* useful function to fetch a structure into rpc wire format */
int tdb_prs_fetch(TDB_CONTEXT *tdb, TDB_DATA kbuf, prs_struct *ps, TALLOC_CTX *mem_ctx)
{
- TDB_DATA dbuf;
+ TDB_DATA dbuf;
- prs_init(ps, 0, mem_ctx, UNMARSHALL);
+ prs_init(ps, 0, mem_ctx, UNMARSHALL);
- dbuf = tdb_fetch(tdb, kbuf);
- if (!dbuf.dptr)
- return -1;
+ dbuf = tdb_fetch(tdb, kbuf);
+ if (!dbuf.dptr)
+ return -1;
- prs_give_memory(ps, (char *)dbuf.dptr, dbuf.dsize, True);
+ prs_give_memory(ps, (char *)dbuf.dptr, dbuf.dsize, True);
- return 0;
+ return 0;
}
int tdb_prs_fetch_bystring(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps, TALLOC_CTX *mem_ctx)
{
- TDB_DATA kbuf = string_term_tdb_data(keystr);
- return tdb_prs_fetch(tdb, kbuf, ps, mem_ctx);
+ TDB_DATA kbuf = string_term_tdb_data(keystr);
+ return tdb_prs_fetch(tdb, kbuf, ps, mem_ctx);
}
/*******************************************************************
Modified: branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c
===================================================================
--- branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c 2007-04-11 05:01:02 UTC (rev 22162)
+++ branches/SAMBA_3_0_25/source/rpc_parse/parse_prs.c 2007-04-11 05:05:33 UTC (rev 22163)
@@ -1456,31 +1456,31 @@
/* useful function to store a structure in rpc wire format */
int tdb_prs_store(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps)
{
- TDB_DATA kbuf, dbuf;
- kbuf.dptr = keystr;
- kbuf.dsize = strlen(keystr)+1;
- dbuf.dptr = ps->data_p;
- dbuf.dsize = prs_offset(ps);
- return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE);
+ TDB_DATA kbuf, dbuf;
+ kbuf.dptr = keystr;
+ kbuf.dsize = strlen(keystr)+1;
+ dbuf.dptr = ps->data_p;
+ dbuf.dsize = prs_offset(ps);
+ return tdb_trans_store(tdb, kbuf, dbuf, TDB_REPLACE);
}
/* useful function to fetch a structure into rpc wire format */
int tdb_prs_fetch(TDB_CONTEXT *tdb, char *keystr, prs_struct *ps, TALLOC_CTX *mem_ctx)
{
- TDB_DATA kbuf, dbuf;
- kbuf.dptr = keystr;
- kbuf.dsize = strlen(keystr)+1;
+ TDB_DATA kbuf, dbuf;
+ kbuf.dptr = keystr;
+ kbuf.dsize = strlen(keystr)+1;
- prs_init(ps, 0, mem_ctx, UNMARSHALL);
+ prs_init(ps, 0, mem_ctx, UNMARSHALL);
- dbuf = tdb_fetch(tdb, kbuf);
- if (!dbuf.dptr)
- return -1;
+ dbuf = tdb_fetch(tdb, kbuf);
+ if (!dbuf.dptr)
+ return -1;
- prs_give_memory(ps, dbuf.dptr, dbuf.dsize, True);
+ prs_give_memory(ps, dbuf.dptr, dbuf.dsize, True);
- return 0;
-}
+ return 0;
+}
/*******************************************************************
hash a stream.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Hi i'm Rita !!!
READ
MY
LIPStick
!LIVE
From
Amsterdam
!Â
Â
Â
Â
Â
This mail is NEVER sent unsolicited, Got it by
error ?[ CLICK HERE ] to be removed from our
subscribers List !fuclcxlequtkbfuoeseysgfu
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Sitescooper-talk mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/sitescooper-talk
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Mtg w/Rod Shelley, have you scheduled the meeting with Rod to discuss some measurement issues? Raetta & Jodie are asking and I suppose they are preparing materials for you. They must need a timeframe. Let me know and I will put this on your calendar and advise them.
Thank you, Ricki
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>FW: Master Netting Agreement F.Y.I. Mark
-----Original Message-----
From: [email protected] [mailto:[email protected]]
Sent: 29 November 2001 08:43
To: Frevert, Mark
Subject: Master Netting Agreement
Kevin T Howell
Dominion Energy Clearinghouse
Ph: (804) 273-4848
Fax: (804) 273-4445
__________________
Mark
My phone message this morning relates to the Master Netting Agreement that
we have been negotiating with your team for the past several days. It is
my understanding that the language on both the ISDA and the Master Netting
Agreement have been agreed to but Enron is unwilling to sign either under
the current circumstances. While we would like to get the ISDA signed and
have offered a margin holiday as an incentive, I also see your side of the
issue. I would however ask you and your team to separate the two issues
and at least sign the Master Netting Agreement.
Based on Enron's stated goal to protect its core energy trading business,
Dominion is still transacting with Enron. The Master Netting Agreement
should be in both of our interest by providing needed liquidity for
additional transactions. I believe that everyone in this industry would
like to see Enron's energy trading emerge intact and Dominion would like to
provide whatever reasonable support we can towards that goal. The Master
Netting Agreement is a critical issue for us and represents the centerpiece
of out ongoing relationship with Enron.
Mark, I realize that your plate is extremely full right now and this issue
is not at the top of your list. I would simply ask that you ask the Enron
team that has worked on this the past days to remain engaged with our team
and bring this to finality.
Kevin T Howell
Dominion Energy Clearinghouse
Ph: (804) 273-4848
Fax: (804) 273-4445
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>daily top 10 vakavuudparadigmgeocom daily top 10 cnncom top videos stories aug 1 2008 358 pm edt top 10 videos 1 mom parties club httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805ngmompicscnn nancy grace new photos casey anthony partying nightclub daughter caylee vanished 2 womans computer spies httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805pkgwebcamspyingwcjb 3 tigers attack teen zoo httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805wuellnertigerattacksteenkytv 4 mistress testifies trial httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805sotlovetrianglezammitticnn 5 man calls 911 sandwich httpwwwcnncomvideopartnersemailindexhtmlurlvideocrime20080805spivey911callsandwichwtlv 6 john junior gotti arrested httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nygottijrhandcuffscnn 7 passengers slide plane httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805voaaplaneevacuatedktla 8 plane evacuates passengers httpwwwcnncomvideopartnersemailindexhtmlurlvideous20080805nrbeepercaplaneevacuatecnn 9 pipeline firm helps save gas httpwwwcnncomvideopartnersemailindexhtmlurlvideotech20080805marcianopipelinetelecommutingcnn 10 125000 gorillas found httpwwwcnncomvideopartnersemailindexhtmlurlvideoworld20080805vocongogorillawcs top 10 stories 1 smoke forces emergency landing httpwwwcnncom2008us0805emergencylandingindexhtml passengers evacuate american airlines jet inflatable slides emergency landing los angeles airport official says 2 hopes gorilla survival boosted httpwwwcnncom2008worldafrica0805congogorillasindexhtml 3 stayathome wives without kids httpwwwcnncom2008livingwayoflife0805lwnokidsnojobwivesindexhtml 4 commentary immigrant sanctuaries httpwwwcnncom2008politics0804navarretteimmigrationindexhtml 5 freeman recovering surgery httpwwwcnncom2008showbizmovies0805peoplemorganfreemanapindexhtml 6 john junior gotti arrested httpwwwcnncom2008crime0805gottiarrestindexhtml 7 toxin dims hopes mars life httpwwwcnncom2008techspace0804nasamarsindexhtml 8 lure rrated comedy httpwwwcnncom2008showbizmovies0805filmrratedcomediesapindexhtml 9 starbucks offers afternoon deal httpwwwcnncom2008us0805starbucksdealapindexhtml 10 edouard makes landfall httpwwwcnncom2008usweather0805tropicalweatherindexhtml cnn trusted name news cable news network lp lllp one cnn center atlanta georgia 30303 2008 cable news network lp lllp time warner company rights reserved please send comments suggestions going httpwwwcnncomfeedback read privacy guidelines going httpwwwcnncomprivacyhtml agreed receive email cnncom result cnncom preference settings manage settings go httpwwwcnncomlinktobnmanagehtml unsubscribe daily top 10 go httpcgicnncommclikesmilegvcceaschallengecclcnndailytop10 wed 06 aug 2008 103013 0500 cnncom daily top 10<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nomination for 3 / 21 / 2000 our nomination into eastrans will drop to 60 , 000 mmbtu / d for 3 / 21 / 2000 only .
on 3 / 22 / 2000 , it will increase to 75 , 000 mmbtu / d aqnd remain there until
further
notice .
for 3 / 21 / 2000 only ,
50 , 000 redelivered via pg & e
7 , 000 from fcv
3 , 000 into your cartwheel agrment at carthage
0 into mobil beaumont .
for 3 / 22 and following , same redeliveries as above ,
except add 15 , 000 into mobil beaumont .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>newton daily analysis exposing best dating program n _ v r ion marketing limitedd 2 23 borrett road mid levels westhong kong ablaze barbell travertine box plantain judith berate hued splotchy mckenzie worthwhile agglutinin harpy spinach peugeot seminole savonarola dry flaxseed suny chime elegy blinn gratuitous marrietta tactician<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>cnn alerts bunkbaantje4windsnet cnn alerts custom alert alert name custom alert die help fri 8 aug 2008 023820 0700 full story agreed receive email cnncom result cnncom preference settings manage settings click alter alert criteria frequency unsubscribe receiving custom email alerts click cable news network one cnn center atlanta georgia 30303 2008 cable news network time warner company rights reserved view privacy policy terms fri 08 aug 2008 054228 0400 cnn alerts custom alert<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [opensuse] /boot and grub with several systems ? -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Berthold Gunreben schreef:
| I'd propose a different layout. Just create an extra partition for a
| primary bootloader with something like 100MB. Boot that bootloader
| from MBR and enter several chainloaders into menu.list that boot the
| respective systems root partitions.
|
| Any system should have its own bootloader installed into the root
| partition. For Win, it is just a chainloader anyways.
This looks as a very good solution to me also...
As i am suffering from the everlasting problem, that grub entries
dissappear, every once and a while....
|
| This procedure has the advantage, that you still can update the kernel
| of each respective linux version without touching the primary grub
| bootloader.
|
| ------------
| |primary | ---------
| |bootloader|----------|Windows|
| ----------- | ---------
| |
| | ------------
| |----|Bootloader|
| | |X0 |
| | ------------
| |
| | ------------
| |----|Bootloader|
| | |X1 |
| | ------------
| |
| | ------------
| |----|Bootloader|
| | |ubuntu |
| | ------------
| ......
|
| You would have to go through two different bootloaders at boot time,
| but this is much easier than updating the kernel for different
| distributions in a single partition (especially if those may use
| different device names like sda and hda for the same disks).
Two bootloaders would not be a problem for me, but what when one
installs a new os?
It just starts booting the DVD or CD, and afterwards you create another
entry in that 'masterbootloader?
Now i have a seperate /boot, about 153MB, carrying all kernels and stuff...
But than, if i understand your suggestion correctly, the /boot, stays in
/ of every seperate OS.
While this allready present partition could be used to host a 'Master'
bootloader?
|
| Berthold
- --
Have a nice day,
M9. Now, is the only time that exists.
~ OS: Linux 2.6.22.17-0.1-default x86_64
~ Huidige gebruiker: monkey9@AMD64x2-sfn1
~ Systeem: openSUSE 10.3 (x86_64)
~ KDE: 3.5.7 "release 72.6"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org
iD8DBQFHtarrX5/X5X6LpDgRAv64AKCn+aQpdbXn8AHi5asBTjK7V1H5QwCffihX
69w+Vaci+/MX12qkgO4Y+QE=
=/Gcv
-----END PGP SIGNATURE-----
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Smoke [5.10.0] 32139 FAIL(XFM) openbsd 4.1 (i386/1 cpu) Automated smoke report for 5.10.0 patch 32139
perlsmoke: AMD Athlon(TM) XP 1800+ ("AuthenticAMD" 686-class, 256KB L2 cache) (1534 MHz) (i386/1 cpu)
on openbsd - 4.1
using cc version 3.3.5 (propolice)
smoketime 23 hours 54 minutes (average 2 hours 59 minutes)
Summary: FAIL(XFM)
O = OK F = Failure(s), extended report at the bottom
X = Failure(s) under TEST but not under harness
? = still running or test results not (yet) available
Build failures during: - = unknown or N/A
c = Configure, m = make, M = make (after miniperl), t = make test-prep
32139 Configuration (common) none
----------- ---------------------------------------------------------
M - M -
M - M - -Duse64bitint
X F F F -Duseithreads
M - M - -Duseithreads -Duse64bitint
| | | +----- PERLIO = perlio -DDEBUGGING
| | +------- PERLIO = stdio -DDEBUGGING
| +--------- PERLIO = perlio
+----------- PERLIO = stdio
Locally applied patches:
DEVEL
SMOKE32139
Failures: (common-args) none
[minitest]
[minitest] -DDEBUGGING -Duseithreads -Duse64bitint
t/op/reg_namedcapture....FAILED--no leader found
[minitest] -DDEBUGGING
[minitest] -Duse64bitint
[minitest] -DDEBUGGING -Duse64bitint
t/comp/opsubs............FAILED--expected 36 tests, saw 13
t/op/reg_namedcapture....FAILED--no leader found
t/op/switch..............FAILED--expected 108 tests, saw 90
[stdio] -Duseithreads
Inconsistent test results (between TEST and harness):
../lib/CPANPLUS/t/15_CPANPLUS-Shell.t...FAILED--no leader found
../ext/Text/Soundex/t/Soundex.t.........FAILED--no leader found
../t/pod/lref.t.........................FAILED--no leader found
../t/pod/for.t..........................FAILED--no leader found
../lib/CPANPLUS/t/00_CPANPLUS-Inc.t.....FAILED--no leader found
../lib/Module/Build/t/compat.t..........FAILED at test 3
../t/pod/headings.t.....................FAILED--no leader found
[perlio] -Duseithreads
../lib/charnames.t......................FAILED 63
Inconsistent test results (between TEST and harness):
../ext/IO_Compress_Zlib/t/109merge-deflate.tFAILED--no leader found
../lib/CPANPLUS/Dist/Build/t/01_CPANPLUS-Dist-Build-Constants.tFAILED--no leader found
../ext/IO_Compress_Zlib/t/107multi-gzip.tFAILED--no leader found
../ext/Text/Soundex/t/Soundex.t.........FAILED--no leader found
../lib/Module/Build/t/install.t.........FAILED at test 23
[stdio] -DDEBUGGING -Duseithreads
../ext/IO_Compress_Zlib/t/106prime-zip.tFAILED ??
../lib/Module/Build/t/compat.t..........FAILED 23-28
Inconsistent test results (between TEST and harness):
../ext/IO_Compress_Zlib/t/108anyunc-rawdeflate.tFAILED--no leader found
../ext/IO_Compress_Zlib/t/001zlib-generic-gzip.tFAILED--no leader found
../ext/IO_Compress_Zlib/t/103newtied-deflate.tFAILED--no leader found
../ext/Compress/Zlib/t/05examples.t.....FAILED at test 24
../ext/IO_Compress_Zlib/t/104destroy-rawdeflate.tFAILED--no leader found
../ext/IO_Compress_Zlib/t/107multi-rawdeflate.tFAILED--no leader found
../lib/ExtUtils/t/writemakefile_args.t..FAILED--no leader found
../lib/CPANPLUS/t/05_CPANPLUS-Internals-Fetch.tFAILED--no leader found
../lib/CPAN/t/11mirroredby.t............FAILED--expected 6 tests, saw 0
[perlio] -DDEBUGGING -Duseithreads
../ext/IO_Compress_Zlib/t/010examples.t.FAILED 2-4
Inconsistent test results (between TEST and harness):
../lib/Module/Build/t/metadata2.t.......FAILED--expected 18 tests, saw 0
../lib/Pod/Simple/t/00about.t...........FAILED--expected 27 tests, saw 24
../lib/CPANPLUS/t/04_CPANPLUS-Module.t..FAILED--no leader found
../lib/CPANPLUS/t/06_CPANPLUS-Internals-Constants.tFAILED--no leader found
../ext/Compress/Raw/Zlib/t/18lvalue.t...FAILED--no leader found
../lib/CPANPLUS/t/03_CPANPLUS-Internals-Source.tFAILED--no leader found
../lib/IO/Zlib/t/uncomp1.t..............FAILED--no leader found
../ext/Compress/Raw/Zlib/t/02zlib.t.....FAILED--no leader found
../lib/CPANPLUS/t/20_CPANPLUS-Dist-MM.t.FAILED at test 40
../lib/Archive/Extract/t/01_Archive-Extract.tFAILED--no leader found
../lib/CPANPLUS/t/08_CPANPLUS-Backend.t.FAILED--no leader found
../lib/CPANPLUS/t/00_CPANPLUS-Inc.t.....FAILED--no leader found
[minitest] -Duseithreads -Duse64bitint
t/run/fresh_perl.........FAILED at test 67
t/op/reg_namedcapture....FAILED--no leader found
Compiler messages(gcc):
Configure .../tmp//ccl15100.o(.text+0x3e): In function `main':
/tmp//ccm26337.o(.text+0x5d): In function `main':
/tmp//ccK24756.o(.text+0x1c): In function `xxx':
/tmp//ccg21043.o(.text+0xde): In function `main':
sv.o(.text+0x1c3b): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x1c3b): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x23e): In function `XS_DynaLoader_dl_load_file':
util.o(.text+0x1b3): In function `savestr':
str.o(.text+0x5d): In function `str_2ptr':
Configure .../tmp//ccq30597.o(.text+0x3e): In function `main':
/home/sts/perl-current/UU/try.c:20: warning: sprintf() is often misused, please use snprintf()
/tmp//ccNV6886.o(.text+0x5d): In function `main':
/home/sts/perl-current/UU/try.c:29: warning: sprintf() is often misused, please use snprintf()
/tmp//ccnJ4189.o(.text+0x1c): In function `xxx':
/home/sts/perl-current/UU/try.c:29: warning: vsprintf() is often misused, please use vsnprintf()
/tmp//ccjv3546.o(.text+0xde): In function `main':
/home/sts/perl-current/UU/try.c:52: warning: sprintf() is often misused, please use snprintf()
sv.o(.text+0x6f45): In function `Perl_sv_2pv_flags':
/home/sts/perl-current/sv.c:2580: warning: sprintf() is often misused, please use snprintf()
libperl.a(sv.o)(.text+0x6f45): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x52e): In function `XS_DynaLoader_dl_load_file':
/home/sts/perl-current/ext/DynaLoader/DynaLoader.xs:171: warning: strcat() is almost always misused, please use strlcat()
util.o(.text+0x283): In function `savestr':
/home/sts/perl-current/x2p/util.c:146: warning: strcpy() is almost always misused, please use strlcpy()
str.o(.text+0x81): In function `str_2ptr':
/home/sts/perl-current/x2p/str.c:32: warning: sprintf() is often misused, please use snprintf()
Configure .../tmp//cce16461.o(.text+0x3e): In function `main':
/tmp//ccLk9963.o(.text+0x5d): In function `main':
/tmp//ccL19040.o(.text+0x1c): In function `xxx':
/tmp//ccI18129.o(.text+0xde): In function `main':
sv.o(.text+0x2233): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x2233): In function `Perl_sv_2pv_flags':
Configure .../tmp//ccv15652.o(.text+0x3e): In function `main':
/tmp//ccdeY582.o(.text+0x5d): In function `main':
/tmp//ccN28097.o(.text+0x1c): In function `xxx':
/tmp//ccI31131.o(.text+0xde): In function `main':
sv.o(.text+0x96fd): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x96fd): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x532): In function `XS_DynaLoader_dl_load_file':
Configure .../tmp//ccc12502.o(.text+0x3e): In function `main':
/tmp//ccEN6026.o(.text+0x5d): In function `main':
/tmp//ccR18529.o(.text+0x1c): In function `xxx':
/tmp//ccb21658.o(.text+0xde): In function `main':
sv.o(.text+0x1d6f): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x1d6f): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x4a6): In function `XS_DynaLoader_dl_load_file':
:13:1: warning: "TIME_HIRES_STAT" redefined
:12:1: warning: this is the location of the previous definition
/libperl.a(sv.o)(.text+0x1d6f): In function `Perl_sv_2pv_flags':
Configure .../tmp//ccL20699.o(.text+0x3e): In function `main':
/tmp//ccbN1121.o(.text+0x5d): In function `main':
/tmp//ccxQ9933.o(.text+0x1c): In function `xxx':
/tmp//ccV22915.o(.text+0xde): In function `main':
sv.o(.text+0x71d1): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x71d1): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x8ba): In function `XS_DynaLoader_dl_load_file':
:15:1: warning: "TIME_HIRES_STAT" redefined
:14:1: warning: this is the location of the previous definition
/libperl.a(sv.o)(.text+0x71d1): In function `Perl_sv_2pv_flags':
Configure .../tmp//ccKx4196.o(.text+0x3e): In function `main':
/tmp//ccw30885.o(.text+0x5d): In function `main':
/tmp//ccx30459.o(.text+0x1c): In function `xxx':
/tmp//cczs1115.o(.text+0xde): In function `main':
sv.o(.text+0x23f7): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x23f7): In function `Perl_sv_2pv_flags':
libperl.a(DynaLoader.o)(.text+0x4aa): In function `XS_DynaLoader_dl_load_file':
Configure .../tmp//ccs29473.o(.text+0x3e): In function `main':
/tmp//cct17237.o(.text+0x5d): In function `main':
/tmp//ccT17129.o(.text+0x1c): In function `xxx':
/tmp//ccx24502.o(.text+0xde): In function `main':
sv.o(.text+0x99e1): In function `Perl_sv_2pv_flags':
libperl.a(sv.o)(.text+0x99e1): In function `Perl_sv_2pv_flags':
--
Report by Test::Smoke v1.20.05 build 1089 running on perl 5.8.8
(Reporter v0.028 / Smoker v0.032)
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [Python-3000] should Python 3's executable install as 'python'? On Wed, Mar 5, 2008 at 1:40 PM, Nick Coghlan wrote:
> Guido van Rossum wrote:
> > I guess I wasn't clear -- I don't want there to be a target that does
> > what install does today. It would be a mistake to use it in 99.99% of
> > cases. IOW
> >
> > install = altinstall
>
> Leaving it up to packagers for the different distributions to decide if
> they want to add the 'python' symlink? That sounds reasonable to me.
>
> Does this apply to 2.6 as well, or just 3.0?
Only 3.0.
--
--Guido van Rossum (home page: http://www.python.org/~guido/)
_______________________________________________
Python-3000 mailing list
[email protected]
http://mail.python.org/mailman/listinfo/python-3000
Unsubscribe: http://mail.python.org/mailman/options/python-3000/python-3000%40tangomu.com
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: lynx links and forms in speakup One thing with which I struggled when browsing in *nix is that there is no
virtual browse mode. You are pretty much viewing the screen as a sighted
person would see it; exactly as the web author intended for it to appear.
This is why your arrow keys do not work. Also, this is why we prefer to
number links because it is often difficult to tell where the links are.
When you are confronted with a new site, read it in its entirety, which is
what you should do anyways, then go back to the top and search for what you
need with the / (slash) key.
----- Original Message -----
From: "Michael Weaver"
To: "Speakup is a screen review system for Linux."
Sent: Sunday, June 10, 2007 3:04 AM
Subject: lynx links and forms in speakup
>I have set the cursor on, forms and links for numbers, user mode to
> advanced and underlined links to on so why am I having problem with
> links being read out on a line when I use the standard up and down
> arrow keys, links being repeated and for example when I go to google,
> the form for search isn't announced as if there is no number for the
> edit field when doing a search or am I missing something in settings
> which is making it more difficult to focus which why I am having
> difficulty scrolling down web pages using up and down arrow?
> Do I perhaps need to use the speakup keystrokes for navigating through
> pages more than I would normally when using a web browser in Windows
> where I can go up and down pages with the standard arrow keys and it
> reads either text or links depending on where you are on a page rather
> than trying to put all the links together and maybe causing a problem
> when navigating?
>
> _______________________________________________
> Speakup mailing list
> [email protected]
> http://speech.braille.uwo.ca/mailman/listinfo/speakup
>
>
> __________ NOD32 2321 (20070610) Information __________
>
> This message was checked by NOD32 antivirus system.
> http://www.eset.com
>
>
_______________________________________________
Speakup mailing list
[email protected]
http://speech.braille.uwo.ca/mailman/listinfo/speakup
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [perl #47045] CLONE_SKIP doesn't result in undef copies On Tue, Oct 30, 2007 at 07:40:27PM -0700, Olly Betts wrote:
> "perldoc perlmod" says:
>
> Like "CLONE", "CLONE_SKIP" is called once per package; however, it is
> called just before cloning starts, and in the context of the parent
> thread. If it returns a true value, then no objects of that class will
> be cloned; or rather, they will be copied as unblessed, undef values.
>
> But in my tests, the copies are unblessed, but aren't undef. Here's a
> simple example:
The documentation is ambiguous, but the current behaviour of perl is as
designed. References are cloned, but in the child thread they are
references to undefined scalars rather than blessed hashes or whatever; eg
use threads;
sub CLONE_SKIP {1}
my $x = bless {};
use Data::Dumper;
print Dumper $x;
threads->new(sub { print Dumper $x })->join;
gives:
$VAR1 = bless( {}, 'main' );
$VAR1 = \\undef;
However, looking at the code I noticed that there *is* a bug, in that the
flags of the new undef scalar aren't zeroed (they're the same as the
parent object), so the change below fixes that and tries to improve the
documentation:
Change 32213 by davem@davem-pigeon on 2007/11/02 23:59:27
[perl #47045] CLONE_SKIP doesn't result in undef copies
clarify the documentation on CLONE_SKIP, and ensure that the
undef value has all its flags cleared
Affected files ...
. //depot/perl/pod/perlmod.pod#42 edit
. //depot/perl/sv.c#1438 edit
Differences ...
==== //depot/perl/pod/perlmod.pod#42 (text) ====
@@ -581,6 +581,9 @@
called just before cloning starts, and in the context of the parent
thread. If it returns a true value, then no objects of that class will
be cloned; or rather, they will be copied as unblessed, undef values.
+For example: if in the parent there are two references to a single blessed
+hash, then in the child there will be two references to a single undefined
+scalar value instead.
This provides a simple mechanism for making a module threadsafe; just add
C at the top of the class, and C will be
now only be called once per object. Of course, if the child thread needs
==== //depot/perl/sv.c#1438 (text) ====
@@ -10048,8 +10048,7 @@
/* don't clone objects whose class has asked us not to */
if (SvOBJECT(sstr) && ! (SvFLAGS(SvSTASH(sstr)) & SVphv_CLONEABLE)) {
- SvFLAGS(dstr) &= ~SVTYPEMASK;
- SvOBJECT_off(dstr);
+ SvFLAGS(dstr) = 0;
return dstr;
}
--
Technology is dominated by two types of people: those who understand what
they do not manage, and those who manage what they do not understand.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>nan mrs elisabeth lamine abidjan cote divoire phone 00225 07 93 44 19 dear sir wish solicit help migrating country investing funds briefly sierra leonean national wife late dr simon lamine death husband general overseer diamond gold mining corporation kanema sierra leone april 6 2000 military forces loyal government ahmed tijan kabbah invaded diamond gold mine assassinated husband mistaking brother mike lamine deputy leader revolutionary united front ruf foday sankoh news reached hurried gathered valuables family villa escaped dear life company son peters among valuables file contained details deposit husband made security company europe deposited us 155 contained 1 trunk box name son peters containing family valuables disclose real contents box security company rather declared deposit family valuables security reasons money made sale gold diamonds time general overseer need sincere assistance move funds security company europe investment country invest due nearess country war still going besides refugee status help matters us also ask scout viable lucrative business invest wisely mind give 30 total sum 155 million us dollars 20 share investment embark upon assist us also set aside 5 funds ancillary expenses make course transaction air tickets handling expenses etc fortune revealed remain confidential told pleaselet phonefax numbers detials note transaction risk free may god bless assist us sincerely mrs elisabeth peters lamine reply mails box elisabthhknetmailcom _______________________________________________________________________ odomos mosquito protection outside 4 walls click know httprrediffcomrhttpclientsrediffcomodomosodomoshtmodomoswn nan need urgent reply<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: Better send the four boxes of Fastow's deal toys up to legal This is completed.
Tammie Schoppe
Enron Americas-Office of the Chair
Assistant to Louise Kitchen
713.853.4220 office
713.646.8562 fax
713.253.2131 mobile
-----Original Message-----
From: Kitchen, Louise
Sent: Wednesday, January 23, 2002 10:37 PM
To: Schoppe, Tammie
Subject: Better send the four boxes of Fastow's deal toys up to legal
Have them delivered to Jim Derrick and explain that they are Fastow's deal mementoes which were left in his office.
I don't think his picture will have reference so we'll keep it for now.
Thanks
Louise Kitchen
Chief Operating Officer
Enron Americas
Tel: 713 853 3488
Fax: 713 646 2308
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>beavers game tonight i have a few tickets for the
portland beavers vs . iowa cubs
game - tonight at 6 : 30 p . m . ! ! !
please let me know if you would like to go .
extension 7092
patty deas
enron north america
503 - 464 - 7092
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>sum : uptalk recently i asked for information on uptalk or high rising terminal . i received many responses from people and a number of useful references . i want to thank the following people for their help : cynthia mclemore janet holmes gregory ward marc picards david britain carolyn buck - gengler laura a . michaelis julia hirschberg and elizabeth whalley i received the following references : allan , scott 1990 . the rise of new zealand intonation . in allan bell & janet holmes ( eds . ) new zealand ways of speaking english . clevedon , avon : multilingual matters . 115-128 . britain , david 1992 . linguistic change in intonation : the use of high rising terminals in new zealand english . language variation & change . vol . 4 , 1 : 77-104 . britain , d & john newman 1992 . high rising terminals in new zealand english . in journal of international phonetic association vol . 22 : 1 / 2 : 1-11 . mclemore , cynthia 1991 . the interpretation of l * h in english . texas linguistic forum 32 : discourse : 175-96 . mclemore , c . 1992 . prosodic variation across discourse types . ircs work - shop on prosody in natural speech . 117 - 128 . hirschberg , j & ward , g . the interpretation of the high-rise question contour in english . soon to appear in the journal of pragmatics . in addition , i received suggestions and support from many people for which i am thankful . sincerely , laurel balyeat
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Oil & gas transaction Term Sheet I have not been able to locate any other term sheets that are tailor-made to purchases of oil and gas properties (most of the documents we have are related to financing someone else's acquisition of properties). However, Nancy Corbet has a template for an oil and gas property purchase and sale agreement that we could review and use to "beef up" our standard LOI and term sheet if you wanted to go that route. Let either of us know if you want to see that document, or if we can help out on the project.
Travis C. McCullough
Enron North America Corp.
1400 Smith Street EB 824
Houston, Texas 77002
Phone: (713) 853-1575
Fax: (713) 646-8860
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] convert text to exprission good for lm arguments Try: do.call("update", list(data.lm, subset = parse(text = subset))) On 5/3/07, Vadim Ogranovich wrote: > Hi, > > I ran into a problem of converting a text representation of an expression into parsed expression to be further evaluated inside lm (). > > > n <- 100 > > data <- data.frame(x= rnorm (n), y= rnorm (n)) > > data. lm <- lm (y ~ x, data=data) > > > > ## this works > > update(data. lm , subset=x<0) > > Call: > lm (formula = y ~ x, data = data, subset = x < 0) > > Coefficients: > (Intercept) x > -0.07864094193322170023 -0.14596982635007796358 > > > > > ## this doesn't work > > ## text representation of subset > > subset <- "x<0" > > update(data. lm , subset=parse(text=subset)) > Error in `[.data.frame`(list(y = c(-0.601925958140825, -0.111931189071517, : > invalid subscript type > > What is the correct way to convert "x<0" into a valid subset argument? > > Thanks, > Vadim > > [[alternative HTML version deleted]] > > ______________________________________________ > [email protected] mailing list > https://stat.ethz.ch/mailman/listinfo/r-help > PLEASE do read the posting guide http://www.R-project.org/posting-guide.html > and provide commented, minimal, self-contained, reproducible code. > ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : digitals pavel , many thanks for your note .
i understand that digitals are not core enron business but as you know , i ' m
trying to explore digitals to give , for example , a company a guaranteed
income in year one ( to mop up expiring tax losses ) . this is offset by a
guaranteed expense in year two . see attached hypothetical example . the
digital will reflect an underlying commodity to which a company is exposed to
and would be part of a price risk management strategy , thereby giving it
' commercial purpose ' .
i would be interested in hearing from you generally on the subject - - the
rational for using digitals and your knowledge of its use in other markets
( electricity or other commoodity or in the banking sector ) .
it seems to me that setting the srike is key and a ' value judgement ' or am i
wrong , and are there curves and models which could help you substantiate
this ? in any event , do you have a feel for what an acceptable % of chance or
likelihood that a commodity price hits the strike on a digital before it
becomes non arm ' s length and does not pass the smell test ?
vince , jarek suggested that you may be able to assist . your views would also
be appreciated .
gillian .
from : pavel zadorozhny on 02 / 11 / 2000 15 : 15 cst
to : gillian lockwood / lon / ect @ ect
cc :
subject : digitals
digital options are extremely uncommon in the crude oil market . nobody ever
asked me to show quotes in the otc market . the only time we encountered them
was when producers , brought by our marketing team , wanted to sell a
knock - outable swap , whereby they would get a higher swap price in exchange
for cancelling the swap if the price settled below a certain level . this
structure had a digital put embedded in it , although the customers didn ' t
necessarilly know that . the companies were us oil and gas producers : venoco ,
titan , magnum hunter , patiena oil & gas , belco , central resources . it was
about 1 year ago . in the otc market , at about the same time , i asked for
quotes to hedge these transactions and sold a digital cal 00 $ 16 swaption to
elf and strips of digital puts to somebody else that i cannot recall .
i hope this helps .
pavel<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Purchase cheap Vacheron Constantin replica watch here
Buy the Patek Philippe watch and know everything about time!
Christmas Replica Watches
Replica watches, pens, bags and more... Cheap luxury gifts ...
http://rerandyersyum.com/
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>anthony tolle pkfrwatpbgmailcom sat mar 8 2008 838 pm steven bethard wrote dont see error thrown either bound unbound methods sorry clarified error occurs wrapping function descriptor wrapping another function heres example python 25 class add_initial_argumentobject def __init__self descriptor callablenone selfdescriptor descriptor selfcallable callable def __get__self obj typenone return add_initial_argumentselfdescriptor selfdescriptor__get__obj type def __call__self args kwargs return selfcallable__call__newarg args kwargs class cobject add_initial_argument def foonewarg self print arg1 newarg print arg2 self cfoo arg1 __main__c object 0x00a900d0 arg2 newarg cfooc traceback recent call last file line 1 file line 11 __call__ typeerror unbound method foo must called c instance first argument got str instance instead also notice bound method still got self first argument see script example recent reply greg ewing im using descriptor wrapping httpmailpythonorgpipermailpython30002008march012428html _______________________________________________ python3000 mailing list smsbmo9552pythonorg httpmailpythonorgmailmanlistinfopython3000 unsubscribe httpmailpythonorgmailmanoptionspython3000python300040tangomucom wed 06 aug 2008 020251 0400 python3000 case unbound methods<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>david c rankin vhdicqcdjjosuddenlinkmailcom av wrote feb 9 2008 924 david c rankin wrote start posting etcx11xorgconf varlogxorg0log output 1 glxinfo run terminal 2 rpm qa grep fglrx also run console files using kde desktop audrius x11videofglrxg01845402 atifglrxg01kmpdefault8454_262216_0102 fine xorg0log option aiglx good indirect rendering enabled rest fine xorgconf fine config looks fine doesnt appear anything would prevent compiz loading 3 things 1 copy following script run command line try start compiz binbash emerald replace sleep 1 libgl_always_indirect1 compiz ignoredesktophints replace indirectrendering nolibglfallback smdisable ccp enter following command line commands single line commands get wrapped works modify fusionicon scripts include needed command line options emerald replace libgl_always_indirect1 compiz ignoredesktophints replace indirectrendering nolibglfallback smdisable ccp ignore hundreds messages get dumped back terminal compiz starts doesnt start handful error may useful 2 doesnt run fgl_glxgears terminal 3 still problems make sure compiz files updated using yastsoftware managementactionsall packagesupdate newer package available probably choose ignore conflicts compiz conflicts x11xgl repository run rpm qa grep compiz console post output good luck david c rankin jd pe rankin law firm pllc 510 ochiltree street nacogdoches texas 75961 telephone 936 7159333 facsimile 936 7159339 wwwrankinlawfirmcom tue 05 aug 2008 183058 0600 opensuse suse 103 ati firegl 5250 latest ati driver 3d efects<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>on his face , framed hello ,
our bank has approovved your mrtgage request . you can
r e finance , buy a new house or maybe get some cash .
do not worry about bad creddit : we got you covered .
the soonest you apply , the better deal you get . it is
possible to get $ 300 , 000 for $ 250 per month .
thank you and apply here :
http : / / www . latne . com /
belinda b . meza<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>eSource Presents Briefings with Senior Industry Analysts - Energy and Telecom/Broadband
A Dialogue with Frost & Sullivan's Senior Industry Analyst, Energy Markets
&
Industry Analyst and Program Lead, Telecom and Bandwidth Services
Thursday, November 1st
eSource is pleased to host our first Analyst Summit to share insights into the Energy and Telecom/Bandwidth Markets
Please join
Patti Harper-Slaboszewicz, Senior Industry Analyst, Energy Markets
&
Rod Woodward, Industry Analyst, Telecom Services & Program Lead, Wholesale Services
He has authored a report on U.S. Bandwidth Services (Trading/Brokering/Online Exchanges)
Download report for free at http://esource.enron.com/hot_topics.asp
at 3:30 - 5:30 PM EB 5C2
Each presentation will last 35 minutes with 20 minutes Q&A
Agenda - Energy 3:30-4:30
� Frost & Sullivan capabilities - 10 minutes
� Energy speaker: New Region Challenges for Retail Electric Providers - 25 minutes
Development of transactional capability
Acquiring customers
Quick survey of offers online in ERCOT region
Rate offerings will be limited by current meter capabilities
ERCOT Retail Providers
Forecasting load
� Questions & Answers - 20 minutes
Agenda - Telecom/Broadband 4:30-5:30
� Frost & Sullivan capabilities - 10 minutes
� Telecom/Broadband speaker: Industry Insights - 25 minutes
Role of "Utilicom"/Energy providers in telecom
Overall wholesale market perspective
Overview of data services market
Insight and update on bandwidth trading services
� Questions & Answers 20 minutes
Please RSVP to Stephanie E. Taylor at 5-7928
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>engwgjnrcca want conquer heart httpxamedmalworldcom thu 07 aug 2008 110949 0700 wide selection popular goods health online<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[PATCH] Porting/Maintainers.pm --check added functionality This patch extends the functionality of perl Porting/Maintainers --check
--check checks for duplicates (as present)
--check file checks if file has a maintainer
--check dir checks if all files in dir have a maintainer
For example, I used
perl -w Porting/Maintainers --check lib/ExtUtils/t
to check that my previous patch (to Porting/Maintainers.pl)
had not accidentally missed any of the contents of lib/ExtUtils/t
(some test files belong to ExtUtils::MakeMaker some to ExtUtils::Manifest)
Robin Barker
Mathematics and Scientific Computing group
<>
-------------------------------------------------------------------
This e-mail and any attachments may contain confidential and/or
privileged material; it is for the intended addressee(s) only.
If you are not a named addressee, you must not use, retain or
disclose such information.
NPL Management Ltd cannot guarantee that the e-mail or any
attachments are free from viruses.
NPL Management Ltd. Registered in England and Wales. No: 2937881
Registered Office: Serco House, 16 Bartley Wood Business Park,
Hook, Hampshire, United Kingdom RG27 9UY
-------------------------------------------------------------------<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>È����ı�ɻ� �ηº���!! �1����~����Ͻø� �䳪�ɴϴ�@ pu wbg ql m uarg tz tinnb axhil<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>rabi de fyi send written offer package verbal offer issues resolved final offer made like put details writing send tuesday delivery playing phone tag regarding details follow morning thanks toni grant masson ect 09 15 2000 11 24 toni graham corp enron enron cc norma villarreal hou ect ect vince j kaminski hou ect ect subject rabi de toni talked rabi sitting fence good reasons weigh fairly comfy job situation one starts lower level potential wrt green vince verbally offered salary 105 k plus guarantee bonus year end would minimum 15 k cash addition 15 k sign bonus vince said would bother working revised offer letter unless rabi came back verbal ok ponder offer probably days get back us may well call discuss exact details benefits esop 401 k contributions etc regards grant<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Good morning. How are things? You guys still planning your happy hour on Friday?
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>was haynesville till cleelum
Trading 0pportunity For You!
Promoting sym: WDSCPrice: $0.015 5 Day Target price: $0.075Action: Strong buy...
SOMEBODY KNOWS SOMETHING!!!
See the hottest news of the WDSC, manager, call your broker!.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] Accessing R applications from Web I guess you would have to do all those step for a Internet based portal,
but if you just want to have a web interface on a _Intranet_ portal
where you trust your users, you can use Rpad which is much easier in
that you don't really have to write any code, just do the install
procedure. There is a Google group for Rpad as well, if you have more
questions about it.
HTH,
Roger
-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of John McNeil
Sent: Thursday, April 19, 2007 11:42 AM
To: d.sarthi maheshwari
Cc: [email protected]
Subject: Re: [R] Accessing R applications from Web
Sarthi,
I have done what you describe using PHP and R on a linux server.
Basically, you follow these steps:
- Create a form to gather input
- Parse input from the form with PHP into a file that R can read
- Run R commands from PHP with exec().
- Convert the postscript output to an image a web browser can read,
- Use HTML/PHP to format the output with a link to the image
I learned to do this by studying Alfredo Pontillo and Angelo Mineo's
R-php (http://dssm.unipa.it/R-php). Specifically, look at the file
pages/result/index.php They have done lots of other good stuff in their
project, like filtering dangerous commands - you would not want to let a
user just type in any R code, because they could seriously damage your
server. However, if you keep the R code on the server, and just parse
numeric or string inputs, you can take the simple approach described
above.
You will need to install GhostScript (http://www.gnu.org/software/
ghostscript/ghostscript.html) and ImageMagick (http://
www.imagemagick.org/) on your server for the image conversion
Feel free to email me directly if you have problems
John
http://www.labsynch.com
On Apr 19, 2007, at 2:46 AM, d. sarthi maheshwari wrote:
> Hi
>
> I am trying to provide web interface to my R application. My
> requirements are simple and can be written down as follows :
>
> 1) User must provide all the input parameters on web interface.
> 2) Based on the input values, R will do some computations.
> 3) Project the numerical results as well as plots as html page to the
> user on web.
>
> Kindly tell me which package can help me in doing this. Your help
> would be highly appreciated.
>
> --
> Thanks & Regards
> Sarthi M.
>
> [[alternative HTML version deleted]]
>
> ______________________________________________
> [email protected] mailing list
> https://stat.ethz.ch/mailman/listinfo/r-help
> PLEASE do read the posting guide http://www.R-project.org/posting-
> guide.html and provide commented, minimal, self-contained,
> reproducible code.
______________________________________________
[email protected] mailing list
https://stat.ethz.ch/mailman/listinfo/r-help
PLEASE do read the posting guide
http://www.R-project.org/posting-guide.html
and provide commented, minimal, self-contained, reproducible code.
********************************************************************** *
This message is for the named person's use only. It may
contain confidential, proprietary or legally privileged
information. No right to confidential or privileged treatment
of this message is waived or lost by any error in
transmission. If you have received this message in error,
please immediately notify the sender by e-mail,
delete the message and all copies from your system and destroy
any hard copies. You must not, directly or indirectly, use,
disclose, distribute, print or copy any part of this message
if you are not the intended recipient.
______________________________________________
[email protected] mailing list
https://stat.ethz.ch/mailman/listinfo/r-help
PLEASE do read the posting guide http://www.R-project.org/posting-guide.html
and provide commented, minimal, self-contained, reproducible code.
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: "require" question > When I see code that starts with:
>
> require 5.6.0;
>
> Does that mean that the version of Perl can be 5.6.0
> and above or that
> it *has to be* 5.6.0?
...that version and above
see the output from;
perldoc -f require
____________________________________________________________________________________
It's here! Your new message!
Get new email alerts with the free Yahoo! Toolbar.
http://tools.search.yahoo.com/toolbar/features/mail/
--
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
http://learn.perl.org/
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>metallurgist email loading ingenuous therein success entourage immaculate perseverance autocratic loudspeaking catalytic grief regressive boniface schizoid depositor cowpox cylindric fermion doleful den ailanthus crevice aniseikonic cartographer rendezvous alps demurring aylesbury snick aaron hairpin fruehauf brook lutanist<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>volume ii technical corner collection sam partial list people would like send volumes volume 1 2 winokur enron board member shirley address jeff skilling ken lay mark frevert greg whalley rick buy jeff shankman john lavorato dave delainey shall write cover letter also add additional volume kaminski columns 10 copies including bios contributions would like show depth talent group vince enron north america corp william smith enron 01 09 2001 01 07 pm vince j kaminski hou ect ect cc subject volume ii technical corner collection vince successfully integrated martin article volume ii following mike instructions reproduction also additional volume printed would mind disposing set gave want things get confused also 20 volume 60 volume ii please let know many personally need deliver office thank sam<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: Number of rejections exploded Robert Fitzpatrick wrote:
> On Tue, 2008-02-26 at 12:37 +0100, Ralf Hildebrandt wrote:
>> * Robert Fitzpatrick :
>>
>>> Feb 26 05:46:18 esmtp postfix/smtpd[96399]: NOQUEUE: reject: RCPT from
>>> BBNMAINSERVER.bluebonnetnutrition.com[207.91.172.154]: 450 4.1.1
>>> : Recipient address rejected: undeliverable
>>> address: host x.x.x.x[x.x.x.x] said: 553 5.3.0
>> Why 450 instead of 550 if the user is unknown?!
>
> Yes, why? Did you see my postconf -n posted earlier? I have...
>
> unknown_local_recipient_reject_code = 550
>
> These are not local recipients? Is there a unknown_recipient_reject_code
> parameter? This is a gateway delivering mail via transport map.
>
No, these are not local recipients.
unknown_recipient_reject_code is for unknown local or virtual
recipients. This recipient is determined to be invalid by
reject_unverified_recipient.
please see
http://www.postfix.org/postconf.5.html#unverified_recipient_reject_code
http://www.postfix.org/ADDRESS_VERIFICATION_README.html
--
Noel Jones
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[email protected], Your PowerPlus Card
Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card Opportunity to get our Guaranteed Stored Value card
trmedia320072405
______________________________________________________
To stop receiving emails, click here
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>office xp - $ 60 convenes permian even is story . live together store went where grass . pull , your ,
large . yes then north , stick said . number produce thing , hair
corner , play , basic . air may figure . view house then which ,
ready . collect clear with . wide arm what , industry , sound , clear
talk . job distant , keep fit . sense quick would seem , take . i
row , and . sound , decimal color work coast friend . ride east sand
took . believe him then , modern , old catch like .
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>6 1071 disc paul foulkes paul foulkes newcastle ac uk writes hinitial forms feminine pronoun alive necessarily well various parts britain elsewhere guess usually restricted rural areas conservative speakers parts derbyshire example retain form typically written naturally normally regarded misuse possessive pronoun dialect maps eg orton often deal pronouns replies thanks interest search 17 dialects piers plowman justly criticized constrained sampling nonetheless manuscripts show great varieties within dialects hstems feminine singular three plurals exist alongside newer forms hstem least likely occur dual system pronouns seen across manuscripts old pronouns new plan discuss em phenomenon perhaps little er ey hless survivals stressless positions following sent nice statement saying regarding survival hstem feminine might interested know h forms still survive modern traditional dialect least holding 1950s early 60 time survey english dialects h dropping areas concerned left h n w midland area comprising cheshire n derbyshire lancashire w yorkshire believe subject forms w midlands w derive oe h nominative rather modern objective oblique form paper p duncan forms feminine pronoun modern english dialects wakelin ed patterns folk speech british isles london 1972 182200 two notes historical usage 1 neuter singular shared masculne singular form see oed neuter 1755 formerly applied neuters place supplied johnson grammar 2 16th 17th centuries also occurs would preferred oed 86d french _ c est _ construction seems influenced english grammar curious result examining different lines across manuscripts piers proverbial sometimes seen feminine morphology posted examples linguistic explanation phenomenon understood following evolution older english pronoun paradigm modern one one feminine associated allgenders plural masculine associated singular neuter<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: PDF File On May 26, 4:34 am, [email protected] (Alma) wrote: > On May 25, 10:16 pm, [email protected] ([email protected]) > wrote: > > > > > On May 24, 5:59 pm, "[email protected]" wrote: > > > > On May 24, 2:22 pm, Alma wrote: > > > > > Hi All, > > > > > I need to store the files > > > > What files? Where are the before you "store" them? > > > > > in a directory '/home/user/cgi-bin/{today's > > > > Date} > > > > I am able to creata a folder on daily bases . > > > > If that bit's not a problem why do you mention it? > > > > > I am struggling to create a subroutine that stores the uploaded pdf > > > > file into this today's date directory. > > > > Can you explain why you think this would be different for a PDF file > > > than for any other sort of file? > > > > Can you be more precise about the nature of the diffiulty you are > > > having? What have you tried? How did it fail? > > > > What do you mean "uploaded"? Is this perhaps a stealth CGI question? > > > > If this is a stealth CGI question have you looked at the examples in > > > the CGI docmentation? Is there somthing in there you think is unclear? > > > Remember as a beginner you are uniquely qualified to tell us when the > > > documentation is unclear. > > > > Actually looking a the documentation it's poor! > > > > It mentions binmode() too late and uses the 2-arg open without > > > checking for errors. > > > > I would actually use File::Copy. > > > > copy(upload('uploaded_file'),"/wherever/$date/$filename") or die $!; > > > > You will, of course, have to do something to make sure $filename is > > > unique. > > > > > & if i need to read the pdf file > > > > What do you mean by "read the pdf file"? Do you mean you actually want > > > to parse it and extract info? Look on CPAN for modules with PDF in > > > their name. > > > > > should i be using open file or infile command? > > > > What is "infile command"? > > > Try this out, there are some changes to the other post. > > > #!/usr/bin/perl -w > > > use strict; > > use File::Copy; > > use Time::Local; > > > my $destination_folder = "cgi-bin\\\\"; # path to destination folder > > my $source_folder = "C:\\\\Programming\\\\test_bed_perl\\\\"; #path to > > source folder > > > # add extensions to select those files for copying eg. *.pl would > > select file with .pl only. Can select > > # multiple extensions ("*.*, *.pls) > > my $file_extensions = "*.pdf"; > > > my($day, $mon, $yr) = (localtime)[3, 4, 5]; > > my $daily_folder = $day . "_" . ($mon + 1) . "_" . ($yr + 1900) ."\\\\"; > > # check epoch if you are going to use date as dir name (UNIX $yr + 30 > > i think) > > my $start = timelocal(0, 0, 0, $day, $mon, $yr); # 00:00 this morning > > my $stop = $start + (24 * 60 * 60 ) - 1; # 23:59:59 > > > chdir $destination_folder or die "cannot change dir"; > > mkdir "$daily_folder"; > > print "directory created: ${destination_folder}${daily_folder}\\n"; > > > grep { > > if ($_ ne $0){ > > copy("${source_folder}$_", "${destination_folder}${daily_folder}$_") > > or die "Could not copy source file: $!\\n"; > > print "copying ${source_folder}$_ -> ${destination_folder}$ > > {daily_folder}$_\\n"; > > unlink("${source_folder}$_") or die "Could not delele source files: > > $!\\n"; > > print "deleting ${source_folder}$_\\n\\n"; > > } > > > } @{&find_files}; > > > sub find_files{ > > my @files; > > > chdir $source_folder; > > grep{ > > my $timestamp = (stat $_)[9]; > > push @files, $_ if $timestamp >= $start && $timestamp <= $stop; > > } glob $file_extensions; > > > return \\@files; > > > } > > > edit the $destination_folder and $source_folder to the directories you > > want the files moved to and the original location of the uploads. you > > can also edit $file_extensions if you want to filter for a specific > > extension eg. ".pdf". > > > Can you give me an indication of what you want to do with the opened > > pdf? > > Thanks a Lot. I do not need to perform any editing tasks on pdf. my > requirement is just to upload a pdf & then i need to open it for the > read purpose only. Unfortunately i haven't had any experience working with PDF's and im too lazy to read through the documentation. Try looking at CAM::PDF, PDF::API2. I think those perldocs should have what youre looking for. -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected] http://learn.perl.org/<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : louise have a few questions on the list of key personnel you gave to me 1 . there is a " will " listed - sorry but i don ' t see anyone with this last name in my list . 2 . there is a " woulfe " listed - i couldn ' t find this so i presumed this to be " wolf " - am i correct . 3 . also , there were a few people on your list who are analysts or trading assistants - rotation 2 . is it correc that these are people we would deem key , ie . , potential provide incentives to stay in order to ensure the business ' success ? 4 . brad mackay was listed twice - fyi many thanks colette - - - - - original message - - - - - from : louise . kitchen sent : wednesday , january 09 , 2002 4 : 52 pm to : dow , colette cc : louise . kitchen subject : spoke to the deal team - they understand the economics and have gone to speak to bill . this e - mail is the property of enron corp . and / or its relevant affiliate and may contain confidential and privileged material for the sole use of the intended recipient ( s ) . any review , use , distribution or disclosure by others is strictly prohibited . if you are not the intended recipient ( or authorized to receive for the recipient ) , please contact the sender or reply to enron corp . at enron . messaging . administration @ enron . com and delete all copies of the message . this e - mail ( and any attachments hereto ) are not intended to be an offer ( or an acceptance ) and do not create or evidence a binding and enforceable contract between enron corp . ( or any of its affiliates ) and the intended recipient or any other party , and may not be relied on by anyone as the basis of a contract by estoppel or otherwise . thank you . visit our website at http : / / www . ubswarburg . com this message contains confidential information and is intended only for the individual named . if you are not the named addressee you should not disseminate , distribute or copy this e - mail . please notify the sender immediately by e - mail if you have received this e - mail by mistake and delete this e - mail from your system . e - mail transmission cannot be guaranteed to be secure or error - free as information could be intercepted , corrupted , lost , destroyed , arrive late or incomplete , or contain viruses . the sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e - mail transmission . if verification is required please request a hard - copy version . this message is provided for informational purposes and should not be construed as a solicitation or offer to buy or sell any securities or related financial instruments .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>penis growth extreme penis growth extreme
http : / / www . xunepa . com / ss /
necessity , who is the mother of invention .
kindness causes us to learn , and to forget , many things .
education is a method whereby one acquires a higher grade of prejudices .
the prime purpose of eloquence is to keep other people from talking .
art washes away from the soul , the dust of everyday living .<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>brenton hargrove a9caegeeerlangende hello bored evening nice girl would like chat email elsamorerdcom using friends email write mind sending pictures wed 06 aug 2008 145813 0400 id like show pic<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>relay through gmail I have 1 dynamic IP address at dyndns.com (xxx.dyndns.com)
and 1 gmail account ([email protected])
And I successfully setup my postfix so that when
I send mail to outside, my postfix will relay through [email protected].
When recipients received my mails and open them, the mail address
in "from" of theses mails is [email protected], not
[email protected].
So I want to change so that when recipients received my mails and
open them, the mail address in "from" of theses mails is
[email protected], not [email protected].
Is there a way to do that?
Regard,
----------------------------------
Below is my config related to above content:
relayhost = smtp.gmail.com
smtp_use_tls = yes
smtp_sasl_auth_enable = yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd
smtp_sasl_security_options = noanonymous
smtp_tls_CAfile = /etc/postfix/ssl/ThawtePremiumServerCA.pem
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>This is the lat-est weekly-special that you definitely shouldn't miss. You have the best chance to s.ave. Check our most recent weekly special and
pocket the extra bucks from our site.
Your casefile will be checked by appraised advisers in an expeditious way.
And it is gratis as you place the or.der.
With leading medicines in various categories, cyberzone has fantastic
options.
What you pick is reliable and expeditious carriage works.
You can always select quality ones on Analgesics, ErectileDysfunctions,
Blues, SeverePhobia, Man's care, SleepingDysfunctions, OverWt. and others.
Review all the bestofffers on rnedicals at our chemist-site.
http://2A.mvcl.partandside.com/31p/
In an old war song, called "The King of England's Son," it says:
in Louisa's room would be sufficient for her, if Mrs Harville
hoping for them twelve hours sooner, and seeing them arrive at last,
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[ auto - reply ] special report reveals this smallcap rocket stocks newsletter
first we would like to say thank you to al | of our avid readers ! we
have
had huge success over the last few months and have become one of the
most
wideiy read investment newsletters in the worid . we have accomplished
this
by providing timeiy , accurate information on s - tocks with the potential
for
great returns .
rocket s - tocks is not your father ' s investment newsietter ! we focus on
s - tocks with the potentia | to go up in value by weil over 5 oo % . that ' s
what
it takes to make it on to our | ist . these are s - tocks for the risk
toierant
investor ! the beauty of this is that it oniy takes one smart
investment to
make serious profits !
new deveiopments expected for intelligent sports , inc . s - tock
from $ o . 01 to over $ o . 08
symbo | : igts . pk
current price : $ 0 . 01
short term target price : $ o . o 8
12 month target price : $ o . 17
intelligentsports . net
we love these small companies . a company | ike this is | ike a siigshot ,
pu | | ed back and ready to go . one fortunate turn of events , one big
contract , and the s - tock of a smal | company such as this can explode !
read on to find out why igts . pk is our top pick this week .
* * * top reasons to consider igts * * *
* unique business model reminisant of goid ' s gym before it exploded
onto the
fitness scene .
* the numbers are staggering and continue to rise daiiy . 15 % of
children / adoiescents are overweight nationwide . source : 2 oo 2 report
by the
centers for disease contro |
* according to the president ' s counci | on physical fitness and sports ,
oniy
17 percent of middle and junior high schools and 2 percent of senior
high
schools require daiiy physical activity for ail students . igts is
| ooking
to fill that gap .
* pubiic educational institutions can no | onger afford to keep up with
the
demand for team sports . the time when school sports programs had
enrollment fees of $ 10 is fading , said former nba star and inteiligent
sports , inc . board member , reggie theus . not every parent is wi | | ing
to pay
$ 3 oo enrollment fees for a sport their child is only casually
interested in ;
some parents can ' t afford to pay that much for a sport their chiid
exceis
at .
* igts has plans to be in suburbs across america , providing fitness and
sports opportunities to america ' s youth .
* igts ' s proven business is ready for expansion .
* news ! news ! news !
here is recent news on the company :
upland , caiif . - - ( business wire ) - - june 17 , 2 oo 5 - - inteliigent sports ,
inc . ,
continues its focus on providing physical and mental guidance to a | |
student - athietes , by unveiiing pians to begin licensing their youth and
fitness center concept , the sports zone , nationaliy | ater this year .
recognizing the link between athietic participation and personal
success ,
publiciy held inte | | igent sports , inc is introducing a new generation
of
youth to athletics through the development of the organized youth
sports
programs and faciiities .
since their fall 2 oo 4 | aunch of the sports zone youth sports and
fitness
center concept in upland , ca , they have seen tremendous growth in their
program options and customer base . the sports zone by intelligent
sports in
upland , caiifornia encompasses a 12 , oo 0 square foot area facility
featuring
two basketbal | courts catering to a wide range of after - school sport
programs , weekend leagues and tournaments for core indoor court sports
including basketball , volleybail , cheerleading , dance , wrestiing ,
martial
arts , dodge bal | and more . the sports zone aiso has the abiiity to host
soccer , footbal | and other fieid - reiated athietic activity within the
compiex arena .
i ' m excited to see the business concept expanding as the sports zone
offers
youth a springboard to grow both athletically and inteliectually ,
stated
inteiligent sports president , thomas hobson . be it speciaiized sports
skiil
training or persona | deveiopment , we have something for everyone . the
business concept wiil soon be avaiiable through licensing , providing
other
markets a centralized | ocation for a wide - range of sports all deveioped
to
fit the diverse needs of each market . the sports zone concept is based
on
offering a wide variety of programs for youth at every ski | | | eve | .
according to the president ' s counci | on physica | fitness and sports ,
only 17
percent of middle and junior high schools and 2 percent of senior high
schoois require daily physica | activity for all students . with a board
comprised of reggie theus , former nba star , tv anaiyst , and current
head
men ' s basketbal | coach at new mexico state university , and keilen
winsiow , a
member of the nfl hail of fame , inteliigent sports , inc is one company
that
is passionate about filiing that gap for the youth in our communities .
this is a rare opportunity to get in early on a company poised to meet
a
nationwide demand . we beiieve this s - tock has huge potentia | for a
rapid
price increase .
we beiieve the speculative near term target price is - $ 0 . o 8
we beiieve the speculative long term target price is - $ 0 . 17
please watch this one trade monday ! !
disclaimer :
information within this emai | contains forward looking statements
within the meaning of section 27 a of the securities act of 1933 and
section 21 b of the securities exchange act of 1934 . any statements that
express or invoive discussions with respect to predictions ,
expectations , beliefs , pians , projections , objectives , goals ,
assumptions or
future
events or performance are not statements of historical fact and may be
forward looking statements . forward | ooking statements are based on
expectations , estimates and projections at the time the statements are
made that involve a number of risks and uncertainties which couid cause
actual results or events to differ materia | | y from those presently
anticipated . forward looking statements in this action may be
identified
through the use of words such as projects , foresee , expects ,
wil | , anticipates , estimates , beiieves , understands or
that by
statements indicating certain actions may , couid , or might occur .
as with many micro - cap s - tocks , today ' s company has additional risk
factors worth noting . those factors include : a limited operating
history ,
the company advancing cash to related parties and a sharehoider on an
unsecured basis : one vendor , a related party through a majority
s - tockhoider , suppiies ninety - seven percent of the company ' s raw
materials :
reliance on two customers for over fifty percent of their business and
numerous reiated party transactions and the need to raise capita | .
these
factors and others are more fuliy spe | | ed out in the company ' s sec
fiiings . we urge you to read the fiiings before you invest . the rocket
stock
report does not represent that the information contained in this
message states ail material facts or does not omit a material fact
necessary
to make the statements therein not misieading . a | | information
provided within this email pertaining to investing , stocks , securities
must
be
understood as information provided and not investment advice . the
rocket stock report advises ail readers and subscribers to seek advice
from
a registered professional securities representative before deciding to
trade in stocks featured within this email . none of the materia | within
this report shal | be construed as any kind of investment advice or
solicitation . many of these companies are on the verge of bankruptcy .
you
can lose all your money by investing in this stock . the publisher of
the rocket stock report is not a registered investment advisor .
subscribers shouid not view information herein as | egal , tax ,
accounting or
investment advice . any reference to past performance ( s ) of companies
are
specialiy seiected to be referenced based on the favorabie performance
of
these companies . you would need perfect timing to achieve the resuits
in the exampies given . there can be no assurance of that happening .
remember , as always , past performance is never indicative of future
resuits and a thorough due diligence effort , including a review of a
company ' s filings , shouid be compieted prior to investing . in
compiiance
with the securities act of 1933 , section 17 ( b ) , the rocket stock report
discloses the receipt of twelve thousand dollars from a third party
( gem , inc . ) , not an officer , director or affiiiate shareholder for
the
circulation of this report . gem , inc . has a position in the stock
they
wiil sel | at any time without notice . be aware of an inherent conflict
of interest resulting from such compensation due to the fact that this
is a paid advertisement and we are conflicted . ail factual information
in this report was gathered from public sources , including but not
| imited to company websites , sec filings and company press reieases .
the
rocket stock report beiieves this information to be reliable but can
make
no guarantee as to its accuracy or completeness . use of the material
within this email constitutes your acceptance of these terms .
if you wish to stop future mailings , piease mai | to newsoffl @ yahoo . com
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>svn commit: samba r23058 - in branches/SAMBA_4_0/source/libcli/cldap: . Author: tridge
Date: 2007-05-22 00:43:10 +0000 (Tue, 22 May 2007)
New Revision: 23058
WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=23058
Log:
the cldap code was getting too intimate with the internals of struct
asn1_context. A hangover from when it wasn't a allocated structure
Modified:
branches/SAMBA_4_0/source/libcli/cldap/cldap.c
Changeset:
Modified: branches/SAMBA_4_0/source/libcli/cldap/cldap.c
===================================================================
--- branches/SAMBA_4_0/source/libcli/cldap/cldap.c 2007-05-21 23:35:14 UTC (rev 23057)
+++ branches/SAMBA_4_0/source/libcli/cldap/cldap.c 2007-05-22 00:43:10 UTC (rev 23058)
@@ -100,7 +100,6 @@
talloc_free(tmp_ctx);
return;
}
- talloc_steal(tmp_ctx, asn1->data);
ldap_msg = talloc(tmp_ctx, struct ldap_message);
if (ldap_msg == NULL) {
@@ -129,8 +128,7 @@
return;
}
- req->asn1 = asn1;
- talloc_steal(req, asn1->data);
+ req->asn1 = talloc_steal(req, asn1);
req->asn1->ofs = 0;
req->state = CLDAP_REQUEST_DONE;
@@ -312,6 +310,10 @@
req->timeout = io->in.timeout;
req->num_retries = io->in.retries;
req->is_reply = False;
+ req->asn1 = asn1_init(req);
+ if (!req->asn1) {
+ goto failed;
+ }
req->dest = socket_address_from_strings(req, cldap->sock->backend_name,
io->in.dest_address, lp_cldap_port());
@@ -376,6 +378,10 @@
req->cldap = cldap;
req->state = CLDAP_REQUEST_SEND;
req->is_reply = True;
+ req->asn1 = asn1_init(req);
+ if (!req->asn1) {
+ goto failed;
+ }
req->dest = io->dest;
if (talloc_reference(req, io->dest) == NULL) goto failed;
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: [R] deleting lines and row small than a value I am not sure what your matrix looks like, but here is some code that will check each row and then delete those rows with any value < .7: > set.seed(1) > data <- matrix(runif(100,0,10), 10) > data [,1] [,2] [,3] [,4] [,5] [,6] [,7] [,8] [,9] [,10] [1,] 2.6550866 2.059746 9.3470523 4.820801 8.2094629 4.7761962 9.1287592 3.390729 4.346595 2.3962942 [2,] 3.7212390 1.765568 2.1214252 5.995658 6.4706019 8.6120948 2.9360337 8.394404 7.125147 0.5893438 [3,] 5.7285336 6.870228 6.5167377 4.935413 7.8293276 4.3809711 4.5906573 3.466835 3.999944 6.4228826 [4,] 9.0820779 3.841037 1.2555510 1.862176 5.5303631 2.4479728 3.3239467 3.337749 3.253522 8.7626921 [5,] 2.0168193 7.698414 2.6722067 8.273733 5.2971958 0.7067905 6.5087047 4.763512 7.570871 7.7891468 [6,] 8.9838968 4.976992 3.8611409 6.684667 7.8935623 0.9946616 2.5801678 8.921983 2.026923 7.9730883 [7,] 9.4467527 7.176185 0.1339033 7.942399 0.2333120 3.1627171 4.7854525 8.643395 7.111212 4.5527445 [8,] 6.6079779 9.919061 3.8238796 1.079436 4.7723007 5.1863426 7.6631067 3.899895 1.216919 4.1008408 [9,] 6.2911404 3.800352 8.6969085 7.237109 7.3231374 6.6200508 0.8424691 7.773207 2.454885 8.1087024 [10,] 0.6178627 7.774452 3.4034900 4.112744 6.9273156 4.0683019 8.7532133 9.606180 1.433044 6.0493329 > less.7 <- apply(data, 1, function(x) any(x < .7)) > less.7 [1] FALSE TRUE FALSE FALSE FALSE FALSE TRUE FALSE FALSE TRUE > data[!less.7,] [,1] [,2] [,3] [,4] [,5] [,6] [,7] [,8] [,9] [,10] [1,] 2.655087 2.059746 9.347052 4.820801 8.209463 4.7761962 9.1287592 3.390729 4.346595 2.396294 [2,] 5.728534 6.870228 6.516738 4.935413 7.829328 4.3809711 4.5906573 3.466835 3.999944 6.422883 [3,] 9.082078 3.841037 1.255551 1.862176 5.530363 2.4479728 3.3239467 3.337749 3.253522 8.762692 [4,] 2.016819 7.698414 2.672207 8.273733 5.297196 0.7067905 6.5087047 4.763512 7.570871 7.789147 [5,] 8.983897 4.976992 3.861141 6.684667 7.893562 0.9946616 2.5801678 8.921983 2.026923 7.973088 [6,] 6.607978 9.919061 3.823880 1.079436 4.772301 5.1863426 7.6631067 3.899895 1.216919 4.100841 [7,] 6.291140 3.800352 8.696908 7.237109 7.323137 6.6200508 0.8424691 7.773207 2.454885 8.108702 > On 5/24/07, Milton Cezar Ribeiro wrote: > > Hi there > > I made a correlation matrix from my data frama and I would like to delete > all lines/rows when r-value is smaller than 0.7 > > How can I do that? > > Kind regards, > > Miltinho > > __________________________________________________ > > > [[alternative HTML version deleted]] > > ______________________________________________ > [email protected] mailing list > https://stat.ethz.ch/mailman/listinfo/r-help > PLEASE do read the posting guide > http://www.R-project.org/posting-guide.html > and provide commented, minimal, self-contained, reproducible code. > -- Jim Holtman Cincinnati, OH +1 513 646 9390 What is the problem you are trying to solve? [[alternative HTML version deleted]] ______________________________________________ [email protected] mailing list https://stat.ethz.ch/mailman/listinfo/r-help PLEASE do read the posting guide http://www.R-project.org/posting-guide.html and provide commented, minimal, self-contained, reproducible code.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Average to optimize the compression of low-level noise by averaging the color values of adjacent pixels.
[]
The terrible epidemic of pacification which subsequently swept
through Western Europe aroused new hopes of success through a
bloodless revolution in the hearts of the Soviet General Staff. But
you tell me what it is you want.
She often took me out of my box, at my own desire, to give me air,
and show me the country, but always held me fast by a leading-string.
Ave Mar was now faced with the impossible-to drag the gigantic Gor
Terr out of the quagmire.
Authoritative Server A server that knows the content of a DNS zone
from local knowledge, and thus can answer queries about that zone
without needing to query other servers. Aunt Petunia wasn't, eating
anything at all.
Ave Mar took a deep breath. Ave, ave, ave, Maria.
Note that the following sections will not assume that ds is equal to
ss. Remind him of home sweet home.
Authors SHOULD consider using this technique when it is applicable.
Autocoder was possibly the first primitive compiler.
Executes the specified command using the specified current directory
and temporary files, and waits for the call to return, storing output
and error information from the compiler in the specified strings.
Each rectangle represents a pixel.
Alongside his study Martin was involved in numerous industry
projects, providing him with commercial programming practice. He had
not meant what he would have seemed to mean.
Author Title Price Publisher. Aus dem tiefen, unermesslich reichen
Brunnen seiner Vorstellung hatte er keinen einzigen Tropfen konkreter
Duftessenz gefurdert, von allem, was ihm geruchlich vorgeschwebt
hatte, nicht ein Atom realisieren kunnen.
Maybe, Dunus said, they'd shot it from a distance. Ave and Kutsi
Merc, who were standing in the half-ruined portico, quickly proceeded
through the gap, Lua followed them and the Wall closed behind her.
Susan hated that sort of thing. Authors may also use the shorthand
background property, which is currently better supported than the
background-position property.
Authors list is stored in the author element, that has traditional
first-name, middle-name, last-name fields, and a couple of optional
home-page and email subelements. Auroras 2004 Photo Gallery, Part 2
Space.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : visit to houston fyi
- - - - - - - - - - - - - - - - - - - - - - forwarded by stinson gibner / hou / ect on 01 / 29 / 2001
02 : 02 pm - - - - - - - - - - - - - - - - - - - - - - - - - - -
nick bambos on 01 / 29 / 2001 10 : 54 : 27 am
to : stinson . gibner @ enron . com
cc :
subject : re : visit to houston
stinson ,
just a quick note to let you know that i am looking into it ,
trying to rearrange a couple of things . i ' d like giuseppe and
possibly eric to come with me , so i need to coordinate with
them too . we ' ve made some nice progress that i ' d like to present
and also integrate eric in the system .
i am targeting a friday around the end of february or begining
of march . i ' ll let you know soon of a few possibilities as they
stabilize here .
best ,
nick
stinson . gibner @ enron . com wrote :
>
> nick ,
>
> i hope things are going well and you are not staying too busy . we should
> start planning for your next trip to houston , as i ' m sure your schedule
> will be getting full very soon . perhaps you could give the people in
> enron broadband an overview of the areas of interest within your research
> group . i ' m sure we could also benefit from you views of how the current
> technology is evolving .
>
> are there certain dates which would potentially work for you ? please let
> me know by email or give me a call at 713 853 4748 .
>
> looking forward to talking with you .
>
> - - stinson<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> with ESMTP id i89M6UpR009535 for ; Thu, 9 Sep 2004 15:06:30 -0700 Received: from ucsb.edu (hub.ucsb.edu [128.111.24.40]) by charm.physics.ucsb.edu (8.9.3/8.9.3) with ESMTP id PAA05889 for ; Thu, 9 Sep 2004 15:06:25 -0700 Received: from localhost ([127.0.0.1] helo=hub.ucsb.edu) by ucsb.edu with esmtp id 1C5X3h-000Po4-IS; Thu, 09 Sep 2004 15:06:25 -0700 Received: from hub.ucsb.edu ([128.111.24.40] helo=smtp.ucsb.edu) by ucsb.edu with esmtp TLSv1:AES256-SHA:256 id 1C5Wxi-000Pny-5c for [email protected]; Thu, 09 Sep 2004 15:00:14 -0700 Received: from bodega.oit.ucsb.edu ([128.111.12.59]) by smtp.ucsb.edu with asmtp TLSv1:RC4-SHA:128 id 1C5Wxh-000Pnu-OV for [email protected]; Thu, 09 Sep 2004 15:00:13 -0700 Mime-Version: 1.0 (Apple Message framework v619) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: E. Todd Atkins Date: Thu, 9 Sep 2004 15:00:13 -0700 To: [email protected] X-Mailer: Apple Mail (2.619) Subject: [CSF] NGB Null Routed Hosts X-BeenThere: [email protected] X-Mailman-Version: 2.1.4 Precedence: list Reply-To: UCSB Network Security Coordinator List-Id: Computer Support Forum List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: [email protected] Errors-To: [email protected] Greetings, You can find a "Null Routed Hosts" list further down in this message. If your host is in this list, then .. 1. Make sure that the host has been completely cleaned up. Unless the host is completely rebuilt, please make sure that the host is not running any rogue IRC bots, FTP servers, VNC, etc. Tools like "tcpview" and "procexp" from www.sysinternals.com or Vision from www.foundstone.com (under the Resources section) should help to locate any such services. 2. Send an email message to [email protected] to inform us that the host is now safe to be connected with the internet. When referring to multiple IP addresses, please list the IP addresses on separate lines. If you are not the NOC's official network contact for the address(es), then be sure to CC that person. If you decide to simply reply to this message, please do *not* include the complete lists of IPs. Please just include the IP(s) that you are writing to us about. 3. If you find any rogue services running, please include the type of service and the port that it was using. *** Null Routed Hosts *** 128.111.20.188 dhcp20-188.wirelesstest.ucsb.edu 128.111.60.112 hal-601.ece.ucsb.edu 128.111.68.13 -- 128.111.77.78 santa.crss.ucsb.edu 128.111.82.238 goopmeister.chemengr.ucsb.edu 128.111.83.182 seppia.chemengr.ucsb.edu 128.111.87.54 baltimore.alexandria.ucsb.edu 128.111.92.213 -- 128.111.95.54 pubserials-002.library.ucsb.edu 128.111.96.23 edr-laptop.sdc.ucsb.edu 128.111.97.82 pegasus-testbox.library.ucsb.edu 128.111.99.49 -- 128.111.108.65 host108-65.lsdepts.ucsb.edu 128.111.108.192 host108-192.lsdepts.ucsb.edu 128.111.110.58 pilsner.bren.ucsb.edu 128.111.110.83 install.bren.ucsb.edu 128.111.110.97 -- 128.111.110.129 -- 128.111.110.159 -- 128.111.110.174 -- 128.111.110.182 thundercracker.bren.ucsb.edu 128.111.110.186 -- 128.111.110.191 -- 128.111.110.204 bandelier.bren.ucsb.edu 128.111.110.209 -- 128.111.110.211 aso.bren.ucsb.edu 128.111.110.225 -- 128.111.110.243 -- 128.111.110.246 -- 128.111.110.251 -- 128.111.111.23 snape.bren.ucsb.edu 128.111.111.30 malfoy.bren.ucsb.edu 128.111.111.44 -- 128.111.111.48 topaz.bren.ucsb.edu 128.111.111.63 -- 128.111.111.65 -- 128.111.111.69 griffendor.bren.ucsb.edu 128.111.111.74 zeolite.bren.ucsb.edu 128.111.111.80 diamond.bren.ucsb.edu 128.111.111.83 -- 128.111.111.95 reliable.bren.ucsb.edu 128.111.111.99 -- 128.111.111.118 juju.bren.ucsb.edu 128.111.111.125 -- 128.111.111.133 -- 128.111.111.141 -- 128.111.111.143 -- 128.111.111.148 -- 128.111.111.152 -- 128.111.111.181 -- 128.111.111.185 -- 128.111.111.221 -- 128.111.125.224 netvista1.isc.ucsb.edu 128.111.130.46 host130-46.lsdepts.ucsb.edu 128.111.141.27 -- 128.111.142.145 -- 128.111.142.221 -- 128.111.147.81 uo.isber.ucsb.edu 128.111.159.37 -- 128.111.159.81 -- 128.111.160.8 -- 128.111.164.39 jfks-dell.materials.ucsb.edu 128.111.216.93 host216-93.lsdepts.ucsb.edu 128.111.219.160 host219-160.lsdepts.ucsb.edu 128.111.220.183 tekka.nceas.ucsb.edu 128.111.221.34 moon.mat.ucsb.edu 128.111.221.35 southhall-3-wl.mat.ucsb.edu 128.111.221.51 dhcp06.mat.ucsb.edu 128.111.221.137 host221-137.lsdepts.ucsb.edu 128.111.225.205 hp.econ.ucsb.edu 128.111.229.211 -- 128.111.229.220 -- 128.111.229.228 -- 128.111.229.252 -- 128.111.234.239 sylvey.geog.ucsb.edu 128.111.247.63 -- 128.111.248.244 -- -- Todd Atkins Network Security Coordinator UCSB/Office of Information Technology Voice: (805) 893-5077 Fax: (805) 893-5051 http://www.oit.ucsb.edu/security _______________________________________________ CSF mailing list - [email protected] https://ucsb.edu/mailman/listinfo/csf<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>cal berkeley career fair recruiting season is quickly approaching and i wanted to go ahead and make
everyone aware of the first event at cal berkely this fall . the cal berkeley
career fair will take place on friday , september 8 th . we would like to take
three representatives on campus to discuss the analyst program as well as the
global technology track . travel arrangements would involve leaving on
thursday evening , september 7 th , to recruit on campus all day friday . if you
think that you may be available to help with this event , please click on the
button below .
we will discuss this and other events / dates on campus this fall during the
team meeting on tuesday , august 29 th at 2 : 00 in 49 c 4 . at that time we will
have sign - up sheets so that you can attend events that best fit in your
schedule . i will also follow up with an e - mail similar to this so that
everyone is able to express their date / event preferences .
thanks so much for helping recruit at cal berkeley this fall . if you have
any questions , please feel free to contact me at 3 - 3589 .
ashley<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>v-flesnu We are one of the first Internet chemists that have provided safe and affordable medications to US citizens.
We offer medications, guaranteed shipping to all American States and worldwide, 24 hour client support and free consultations with licensed physicians.<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>liliana ash geraldooliveiracenibracombr olesia_k 30 years 0ld l0oking man 18 54 malopolskie poland 0nline t0day become member see results httpigidesuligyhaycnarodru delite email orateorixgmaildotcom architecture tightly 83 wed 06 aug 2008 191424 0200 50 ways meet lover_audi_girl<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>meeting reminder meeting discuss var reporting resources ii canceled please adjust schedules reflect update many thanks barbara lewis forwarded barbara lewis hou ect 06 08 2000 10 13 barbara lewis 06 07 2000 09 27 sally beck hou ect ect philippe bibi hou ect ect rick buy hou ect ect grant masson hou ect ect michael e moscoso hou ect ect ted murphy hou ect ect beth perlman hou ect ect stephen stock hou ect ect cc patti thompson hou ect ect peggy mccurley hou ect ect karen k heathman hou ect ect shirley crenshaw hou ect ect maria sandoval hou ect ect rita hennessy na enron enron cherylene r westbrook hou ect ect giselle james corp enron enron subject meeting reminder meeting discuss var reporting processes resources ii take place friday june 9 2000 9 00 location eb 32 c 2 please adjust schedules reflect important meeting many thanks barbara lewis x 3 5085<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>italian crafted rolex from $ 75 to $ 275 - free shipping heya ,
do you want a rolex watch ?
in our online store you can buy replicas of rolex watches . they look
and feel exactly like the real thing .
- we have 20 + different brands in our selection
- free shipping if you order 5 or more
- save up to 40 % compared to the cost of other replicas
- standard features :
- screw - in crown
- unidirectional turning bezel where appropriate
- all the appropriate rolex logos , on crown and dial
- heavy weight
visit us : http : / / www . bhex . com / rep / rolex /
best regards ,
hilton jones
no thanks : http : / / www . bhex . com / z . php
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>california power 1 19 00 executive summary sb 7 x gives dept water resources given legislative authority undertake short term power purchases price cap feb 2 nd new legislation ab 1 x sb 6 x would seek 1 long term contracts 5 5 cent cap 2 creation california power conservation financing authority long term contracts proposed ab 1 x likely subject significant amendment renegotiation prior feb 2 nd expiration sb 7 x authority proposed sb 6 x would bond issuance powers finance new generation capacity conservation measures negotiations way using bond authority utility bailout utilities state government split debt obligations utility parents state borrowing plans power purchases create credit risks state treasury socal edison misses payments bush administration opposes price caps supporting state efforts split pg believe could willing guarantee issue bonds deal rest one senior california political leader explained getting utility holding companies eat substantial part debt owe key solving back debt problem without provoking widespread public outrage bailout private price gouging companies taxpayer money since 75 californians currently blame utilities puc crisis 10 blame davis crucial political stance governor course absorbing anything like 6 billion debt would quite shock seemingly healthy holding company power generating branches two utilities began spreading word quite willing accept bankruptcy thus mid week sides pushed toward resolution federal bankruptcy court would worst case solution sides country economy would suffer resulting credit shock governor political future would suffer electricity rate increases almost certain mandated bankruptcy judge private sector legal authorities believe utilities corporate holding structure would ultimately breached bankruptcy procedures would end absorb significant amount debt end addition would likely face state government determined use state powers condemnation enter power business major way senator burton sb 6 x legislation strengthen powers dramatically make point quite explicit would set california power conservation financing authority power issue bonds invoke eminent domain would finance new power plants consider feasibility public interest state acquiring operating maintaining transmission facilities currently owned investor owned municipal utilities write sides trying construct path back bankruptcy ledge safe ground question tone shifted last 24 hours macho confrontation maybe run thing far noted chance miscalculation still quite high solution agreed time stand much debt state government absorb versus utilities holding company continuing technical fact default still makes possible bank trigger bankruptcy demanding immediate accelerated payment 5 default update thursday socal edison 215 million default california power exchange edison failed make 215 electricity payment yesterday california power authority began seizing long term contacts reselling recoup money owed generators pg e said expects trading privileges cal power authority suspended today leaving generation nuclear hydroelectric sources ongoing wave defaults severely restricted pg e socal ability buy power department water resources able pick slack least short term state may getting risky credit territory proposed california public power authority would borrow neighborhood 1 3 billion state general fund advance year expected fiscal surplus loan repaid authority expected future revenues near bankrupt utilities freeze rate hikes unclear revenues would come amount borrowed terms repayment doubt examined carefully bond rating agencies 5 bush policies reported wednesday bush administration continues demonstrate little interest getting involved california crisis president elect bush surprised state leaders yesterday comments essentially said excessive environmental regulation root current supply shortage bush top officials appear unanimously opposed long term price caps however one issue considerable importance administration according source close top bush economic advisor significant concern pg e credit problems could cause gas suppliers stop shipments gas pg e pipeline risk would pipeline could go dry causing significant possibly dangerous disruptions california residences businesses prevent problem bush working davis proposal split pg e separate gas electric companies gas company would solvent electric company would go immediately ch 11 following significant defaults<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>re : working with enron on catastrophic risk howard ,
thanks for the message and the paper .
we shall hold an internal follow - up meeting next monday to
review potential projects on which we could cooperate in
the future .
vasant and i will contact you to discuss our recommendations
regarding the future research agenda .
vince
" kunreuther , howard " on 12 / 14 / 2000 10 : 07 : 11 am
to : " bouillion ( e - mail ) " , " carrick ( e - mail ) "
, " hoog ( e - mail ) " , " kaminski
( e - mail ) " , " vasant ( e - mail ) "
cc : " doherty , neil a " , " kleindorfer , paul "
, " thomas , louis a "
, " weigelt , keith w "
subject : working with enron on catastrophic risk
dear vince , jim , george , david and vasant :
neil doherty , paul kleindorfer and i very much enjoyed our discussion last
wednesday at wharton with you on future joint research with enron over the
coming year . in particular , we see the whole area of capital management and
catastrophic risk as a fruitful area for foint collaboration . i am sharing
this message with louis thomas and keith weigelt who direct the fap mba
program in the hopes that we can find a team to work with us on these issues
next semester .
attached is a revised version of our paper on " evaluating risk bearing ,
mitigation and risk transfer using exceedance probability curves : project
update " . we would greatly appreciate you and your colleagues looking at the
section on " cat bonds covering multiple risks " ( pp . 15 - 19 ) to see whether our
example and conclusions make sense to you . we look forward to working with
your team at enron regarding ways that we can build on these preliminary
findings to make cat bonds for weather risks more attractive .
best wishes for the holiday .
regards ,
howard
howard kunreuther
cecilia yen koo professor of decisions sciences and public policy
chairperson operations and information management department
1326 steinberg hall - dietrich hall
wharton school
university of pennsylvania
philadelphia , pa 19104 - 6366
phone : 215 - 898 - 4589
fax : 215 - 573 - 2130
email : kunreuth @ wharton . upenn . edu
- epcurvepaper - final - dl 0 . doc<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>[Alibaba Notification] Emily Yan has sent you an inquiry Request for Quotation ; Trade Center Emily Yan Import Manager 4-Year Gold Customer [verified] Greece Emily Yan From Greece has sent you an inquiry Reply Now Manage Your Orders Dear [email protected] Hope this mails find you well. Your product will do well in our market so we will like to make you our main supplier. Please I will need your Whatsapp or Sykpe ID for faster communication. We want to make an urgent trial order, attached is all we need. Please what is your earliest delivery time for this order. Regards, Emily Yan Import Manager Marfin Investment Group +30 210 15 07 000 You received this email because you are registered on Alibaba.com with [email protected] It contains an attachment. Please sign into Trade Center to check it. --- Ta wiadomoÅÄ zostaÅa sprawdzona na obecnoÅÄ wirusów przez oprogramowanie antywirusowe Avast. https://www.avast.com/antivirus   Request for Quotation                ;  Trade Center   Emily Yan Import Manager    4-Year Gold Customer [verified] Greece   Emily Yan From Greece has sent you an inquiry  Reply Now  Manage Your Orders Dear [email protected] Hope this mails find you well.Your product will do well in our market so we will like to make you our main supplier.Please I will need your Whatsapp or Sykpe ID for faster communication. We want to make an urgent trial order, attached is all we need. Please what is your earliest delivery time for this order.  Regards,Emily Yan Import Manager Marfin Investment Group +30 210 15 07 000  You received this email because you are registered on Alibaba.com with [email protected]  It contains an attachment. Please sign into Trade Center to check it.  Ta wiadomoÅÄ zostaÅa sprawdzona na obecnoÅÄ wirusów przez oprogramowanie antywirusowe Avast. www.avast.com<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>fwd : need pills vali + u + m $ xia | nax $ vlagr @ = % rnd _ med _ v + 1 codin ) pntermi . n . ~ soim | a u 5 cea we supply high quality medications by mail order at very competitive prices and provide a professional , convenient and affordable means of purchasing your prescription medicines online
what ' s available : ? v + a + lium $ xan @ x . som @ \\ p . n . termin ~ v | @ gra ) at . | v @ n
plus : proz @ . c , p @ x ` il , busp : @ r , adip : 3 x , ionam | ` n , m 3 . ridia , x 3 nic . a | , amb . i 3 n , son ` ata , fl 3 xer ` il , ce | 3 br ` ex , fioric : 3 t , tram @ ` do | , uitr @ : m , l 3 v : | tra , prop ' 3 cia , acyc | ` 0 vir
we deliver to you very fast - and that is a promise .
enjoy deep discount meds here .
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>RE: yo i'm finer and finer, and still not with a jobjob but not really wanting a jobjob, too scared of going back to hi-tech, and falling in love with my job, and getting laid off again, must be some kind of fear of intimacy problem..... but i'll probably want to get real intimate again as soon as the $$$$ runs out....... going to seattle for thanksgiving at kevin's, 35 people this year, yay, and lots of little cute kids running around, and, well, i couldn't sleep last night and tossed and turned and finally fell asleep at 6 or so and missed my yoga class at 9.... this is my life, and it ain't have bad.... no no no.... i hear pp got a job, yay and cool and good for her... x0, happy thanksgiving, and good luck whethering the merger.... --- "Dasovich, Jeff" wrote: > it's crazy, but what else is new. how are you > sweetie? > > -----Original Message----- > From: colleen silva > Sent: Mon 11/19/2001 8:02 PM > To: Dasovich, Jeff > Cc: > Subject: yo > > > > whassup with this crazee merger and what does it > mean > for you? and i actually just wanted to say hi... > so. > hi. ha! > > __________________________________________________ > Do You Yahoo!? > Find the one for you at Yahoo! Personals > http://personals.yahoo.com > > > > > ********************************************************************** > This e-mail is the property of Enron Corp. and/or > its relevant affiliate and may contain confidential > and privileged material for the sole use of the > intended recipient (s). Any review, use, > distribution or disclosure by others is strictly > prohibited. If you are not the intended recipient > (or authorized to receive for the recipient), please > contact the sender or reply to Enron Corp. at > [email protected] and delete > all copies of the message. This e-mail (and any > attachments hereto) are not intended to be an offer > (or an acceptance) and do not create or evidence a > binding and enforceable contract between Enron Corp. > (or any of its affiliates) and the intended > recipient or any other party, and may not be relied > on by anyone as the basis of a contract by estoppel > or otherwise. Thank you. > ********************************************************************** > __________________________________________________ Do You Yahoo!? Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month. http://geocities.yahoo.com/ps/info1<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Valeriana wallichii 25 mg MegaDik has been labeled a "Herbal Breakthrough" with over 1,500,000 bottles sold worldwide.
http://havuj.com
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Start Date: 10/29/01; HourAhead hour: 15; <CODESITE>
Start Date: 10/29/01; HourAhead hour: 15; No ancillary schedules awarded. No variances detected.
LOG MESSAGES:
PARSING FILE -->> O:\\Portland\\WestDesk\\California Scheduling\\ISO Final Schedules\\2001102915.txt
Error retrieving HourAhead price data - process continuing...
---- SC Trades Schedule ----
*** Final schedule not found for preferred schedule.
Details:
TRANS_TYPE: FINAL
SC_ID: EPMI
MKT_TYPE: 2
TRANS_DATE: 10/29/01
TRADING_SC: EPPS
PNT_OF_INTRC: NP15
SCHED_TYPE: ENGY
PURCH_SALE: 2
DEAL_NO: 1
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>a few comments john ,
happy new year . i hope the first few weeks of this year will see the
completed paper .
i am sending you the last version of the paper i have received with a few
comments ( in red ) . i think it makes sense to discuss the paper over the
phone . i have a number of more detailed comments .
vince
- enron transformation paperl 2 _ 17 _ 00 _ vk . doc<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>you`ll be amazed Ronald Increase your CUM VOLUME, and Orgasm Length
main benifits:
- The longest most intense Orgasms of your life
- Erctions like steel
- lncreased libido/desire
- Stronger ejaculaton (watch where your aiming)
- Multiple 0rgasms
- Up to 500% more volume (cover her in it if you want)
- Studies show it tastes sweeter
DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT!
(and she'll thank you for it)
http://smilingly.net/spur/?got
leapt you cesium me zambia you formula me
stint you playa me cautious you sunglasses me sole you blemish me lengthen you allyl me
http://cordoned.net/rm.php?got
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>andy k yjpva_qnqvuhotmailcom hi anyone point site grab countsh script quickly counting messages active deferred queues ive googled searched postfixorg avail thanks andy _________________________________________________________________ helping favorite cause easy instant messaging im give httpimlivecommessengerimhomesourcetext_hotmail_join fri 08 aug 2008 104015 0000 countsh<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|> Not looking good right now for space at the JT skid for November. I have
calls into the field to try and determine our max throughput. We have a
capital project going that should increase our throughput, but it may not
be finished for a couple of weeks. Will let you know by the end of the day
where we're at. How much is it worth to you? There may be a bidding
war...........
kt
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Your daily e-mail from the BBC
Tuesday, 12 June, 2007, 18:00 GMT 14:00 -04:00:Canada/Eastern
Search BBC SportÂ
FOOTBALL
Players' union enters Barton row
The Professional Footballers' Association will try to end the row between Man City and Newcastle over Joey Barton's transfer.
Â
McAteer opts to hang up his boots
Former Bolton, Liverpool and Republic of Ireland midfielder Jason McAteer announces his retirement.
Â
Gibson targets big names for Boro
Middlesbrough chairman Steve Gibson is confident of signing some big-name players before the new season.
GOLF
Harrington confident for US Open
Padraig Harrington says the experience of winning the Irish Open could help him at the US Open, which starts on Thursday
Â
Lyle backs Monty for US Open bid
Former Masters champion Sandy Lyle says Colin Montgomerie 'will not rest' until he wins a major.
Â
Howell misses US Open with injury
David Howell pulls out of this week's US Open with a wrist injury.
MOTORSPORT
McLaren favour Hamilton - Alonso
Fernando Alonso says he has never been "completely comfortable" at McLaren because he feels they are giving preference to Lewis Hamilton.
Â
Walker tips Hamilton for F1 title
Former commentator Murray Walker believes Briton Lewis Hamilton can win the Formula One World Championship.
Â
Unscathed Kubica out of hospital
BMW Sauber driver Robert Kubica leaves hospital in Montreal after his horrific crash at the Canadian Grand Prix.
FORMULA ONE
McLaren favour Hamilton - Alonso
Fernando Alonso says he has never been "completely comfortable" at McLaren because he feels they are giving preference to Lewis Hamilton.
Â
Walker tips Hamilton for F1 title
Former commentator Murray Walker believes Briton Lewis Hamilton can win the Formula One World Championship.
Â
Unscathed Kubica out of hospital
BMW Sauber driver Robert Kubica leaves hospital in Montreal after his horrific crash at the Canadian Grand Prix.
ATHLETICS
Pickering gets European Cup nod
Craig Pickering beats Mark Lewis-Francis to the 100m berth in Great Britain's team for the European Cup on 23-24 June.
Â
Gillick sets new Irish 400m mark
David Gillick smashes the Irish 400m record at Switzerland's Atletica Geneve meeting.
Â
Devonish delivers relay warning
Marlon Devonish says Britain should avoid rushing its next batch of sprint talent into the senior international arena.
CYCLING
Moreau replaces Wiggins as leader
Christophe Moreau wins stage two of the Dauphine Libere to replace Britain's Bradley Wiggins as overall leader.
Â
Wiggins retains lead in Dauphine
Britain's Bradley Wiggins retains a one-second overall lead after the first stage proper of the Dauphine Libere.
Â
Wiggins wins Dauphine time-trial
Britain's Bradley Wiggins gives his Tour de France prospects a boost by winning the prologue in the Dauphine Libere.
FUN AND GAMES
Quotes of the Week
Ramon Calderon on David Beckham, plus Lewis Hamilton and Graham Taylor
Â
Comment: Formula fun with Lewis
Robbo on Lewis Hamilton and the England cricket team
Â
Ramprakash goes dancing again
Strictly Come Dancing star Mark Ramprakash breaks out a few of his best moves ahead of Surrey's Twenty20 campaign this summer.
Â
OPTIONS AND HELP
Â
Â
You are subscribed from the e-mail address:
[email protected]
Change
To change your e-mail address, the content or format of your daily e-mail, visit:
http://www.bbc.co.uk/email
Unsubscribe
To unsubscribe, visit:
http://www.bbc.co.uk/email
Other e-mails
To see the full range of e-mails available visit:
http://www.bbc.co.uk/email
Â
Â
Help
If you are having problems with story links or for general help visit:
http://www.bbc.co.uk/email/help
Feedback
Please send feedback to:
mailto:[email protected]
Â
Â
Copyright BBC 2005
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>You can increase the time of your act moweyk mwnrlu syfrq No other p vq en lt is e hx nla dt rgem uma ent form oki ula has been as thoroughly researched and cli rrt nic xi ally studied as Po ne we azq rEn jpa lar yob ge. Forty-four sepa hhc rate cli jc nical studies testify to the shocking p qg en sxa is enla fc rgem ho ent power of Po jyb we rr rEn te lar kk ge. In a groundbreaking cl sif ini znl cal study at McM yts aster Un xt iver bdb sity, one extraordinary subject using Po ml we lm rEn gk lar cvp ge stunned researchers after he gai mr ned 3.04 In ag ch ejo es, which beats any other p zo en gsk is enl zrs arge ny ment system around.Po ybe we ma rEn mr lar jxq ge gu vr aran rbv tees great re yyn sults and we gu vl aran wqo tee fast delivery for you to start using this traction device as soon as possible and achieve your goal si lla ze. We take the utmost care to ensure the pri zst vacy of your information.100% Sa nl fe To Take, With NO Si rwf de Ef kck fec axk ts. Click here!!! ... http://bv.leadmake.com/?vvq<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Coppertone Sport Sunscreen Continuous Spray You registered to receive this and similar offers from on .
COPPERTONE Continuous Spray Sunscreen, FREE* SAMPLE!
CLICK HERE, For A Limited Time Only:
http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-1-i3q-8jdp
Try the Coppertone Sunscreen, FREE*!
Coppertone Sport Continuous Spray Sunscreen is a
must have for the summer. This PABA-Free, ultra
sweatproof suncreen bonds to your skin on contact
and won't run into your eyes and sting.
Unique spray form offers quick and even application,
perfect for the beach or any activities under the sun!
CLICK HERE to Get Your FREE* SAMPLE NOW:
http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-2-i3q-8jdp
*See Terms and Gift Rules
Powered by Your Product Samples.
Your Product Samples is an independent rewards program for consumers and
is not affiliated with any of the companies mentioned above.
Your Product Samples is solely responsible for all gift fulfillment. To
receive your gift, simply 1) Participate in the survey
2) Qualify for the sponsor offer(s) (see Gift Rules) and 3) Follow
redemption instructions.
By continuing, you certify that you agree to the terms and conditions.
Copyright © 2005 Your Product Samples. All rights reserved.
You can unsubscribe from promotions by visiting this website:
http://fbkohvaqtg.realsportsworld.com/t/l?g4-mhd-3-rv-8jdp
Mailing address: Your Product Samples Customer Care, 303 Park Avenue
South #1079 New York, NY 10010. 8jdp
If you no longer wish to receive these commercial emails, you may remove yourself from our mailing list by clicking here http://fbkohvaqtg.realsportsworld.com/remove?r.Montague.25-907ec48-14c6.speedy.uwaterloo.ca.-producttestpanel?r click here or by calling our unsubscribe hotline at 864-752-1051. Please note this phone number is used solely for unsubscribe requests. Please allow up to five business days for your request to be processed.
You may also contact us by writing to us at our postal address: Montague| 9600 Great Hills Trail, Suite 150 W| Austin, TX 28759
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Maxilaku Are you insecure about your sexual prowess??
Having problems in keeping it up??
Pop a pill of V - i - a - g - r - a
It can make you a legend in her own mind!!
Click here: http://Vbfilosv.tewislow.com/?a=507Yfilpsv
Yfil
Pvycfimpsv
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>egm mid market customer transition jeff per instructions list customers airtrans airways celadon trucking chitaqua airlines continental airlines gasmar texas eastman amerigas propane partners ecr energy star gas propane age refining canpet energy cross oil frontier oil markwest hydrocarbons trifinery<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>Re: "Nice girl like to chat" spam This has worked very well here. This is more specific to the
sentence the "bored girl" always uses.
/Email me at [A-Za-z]{1,20}\\@[a-zA-Z]{3,25}\\.info only/
Joseph Brennan
Columbia University Information Technology
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": legitimate}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>impact equity report mineral exploration stockp
delta mining and exploration corp . otc : dmxpp
controls 6 properties totaling 7 , 554 acres ( approximately 11 sq .
miles ) in montana . another 10 , 000 acres of prospective diamond and
gold properties are controlled in bolivia , south america . ( source :
company website ) currently trading at . 012 p
possibilty of an absolutely huge week as massive pr campaign has
started and is expected to last all week . pp
imagine how well your portfolio would have done the last month or so
if you had the scoop on the following stock : p
( otcbb : mbah ) : this stock closed at . 01 on september lst . this
little giant closed at . 06 on october 8 th , up 500 % in about 5
weeks . do you think ibm is going to move like that anytime soon ? p
as many of you may agree , some , not all , of these stocks move in
price because they are promoted , making a very large number of
investors aware of the stock . the awareness is underway on dmxp ! pp
let ' s look at the company , delta mining and exploration corp .
otc : dmxpp
about the company : p
delta mining and exploration corp . otc : dmxp is a mineral exploration
company that controls 6 properties totaling 7 , 554 acres
( approximately 11 sq . miles ) in montana . the properties are all
located over what management considers to be some of the most
prospective diamond exploration terrain in the united states .
another 10 , 000 acres of prospective diamond and gold properties are
controlled in bolivia , south america . initial work has revealed
that the bolivian properties display similar potential to those
found in north america . p
the management team is led by chief executive officer , dr . barry
rayment , who is experienced enough to take this junior exploration
company to the next level . dr . rayment brings 32 years of
experience in the field of geology , along with running some of the
most successful mining companies in the industry . dr . rayment was
the president of bema gold corp . , ( amex : bgo ) , a company with a
market cap of close to a billion dollars . he was also affiliated
with glamis gold , gold fields mining and amselco exploration ( bp
minerals ) , among others . his vast experience in the mining sector
along with his extensive knowledge of public companies will be an
extraordinary asset to delta and its shareholders as the company
moves forward . p
among the support team is stephen kay , a geologist with more than 30
years experience in exploration throughout europe , south africa ,
south america and the united states . while with gold fields mining
corp . , stephen kay was instrumental in the discovery and subsequent
drilling of the 3 million ounce mesquite gold deposit in california . p
delta has experienced significant technical success since its
start - up in 1997 . for example , delta has discovered the first
in - situ microdiamond ever found in montana on its homestead
kimberlite , southeast of lewistown . the company also controls part
of the three buttes kimberlite where initial exploration has shown
the three buttes kimberlite to host typical diamond indicator
minerals - a major step toward finding the presence of economic
diamonds - including pyrope ( garnet ) , chromite and clinoprroxene . p
an aggressive regional exploration program has the potential to
discover additional kimberlite or lamproite pipes in this
under - explored area to the south of known commercial diamond bearing
kimberlites in saskatchewan and alberta , canada . p
in bolivia , delta controls approximately two - thirds of a highly
prospective diamondiferous terrain referred to as the independencia
group of concessions covering 7 , 860 acres ( 12 sq miles ) . the other
one - third is presently being explored by de beers . in addition to
the independencia property delta controls more than 2 , 000 acres
comprising the highly attractive precambrian property that displays
all the diamond indicator minerals that would suggest further
exploration is justified . p
delta seeks to increase growth for its investors not only by testing
its extensive portfolio of diamond exploration properties but also
by acquiring additional diamond properties . delta will focus on
identifying and developing strategic alliances with major mining
companies as well as joint ventures to develop the properties and
finance additional exploration . p
in addition to the highly prospective diamond properties delta
controls , they also control a gold property with great potential .
the property is near la paz in bolivia , where initial analysis
revealed high levels of gold per ton that would more than justify an
extensive exploration program . pp
( source : company website ) p
recent headlines : go online and read the full stories ! p
delta mining and exploration corp . is invited to attend a
conference with the bolivian chamber of commerce . p
delta mining and exploration corp . visits homestead property in
preparation of work program . p
delta mining and exploration corp . discloses preliminary gold
exploration findings in south america . p
delta mining and exploration , corp . looks to continue diamond
exploration in south america . pp
will dmxp explode higher as more and more investors become aware of
the stock this weekend and next week ? if you think so , you may not
want to wait until it is too late . remember , timing your trade is
critical . good luck and happy trading . pp
information within this publication contains future looking
statements within the meaning of section 27 a of the securities act
of 1933 and section 21 b of the securities exchange act of 1934 . any
statements that express or involve discussions with respect to
predictions , expectations , beliefs , plans , projections , objectives ,
goals , assumptions or future events or performance are not
statements of historical fact and may be future looking statements .
future looking statements are based on expectations , estimates and
projections at the time the statements are made that involve a
number of risks and uncertainties which could cause actual results
or events to differ materially from those presently anticipated .
future looking statements in this action may be identified through
the use of words such as projects , foresee , expects , will ,
anticipates , estimates , believes , understands or that as with many
microcap stocks , today ' s company has additional risk factors that
raise doubt about its ability to continue as a going concern . delta
mining and exploration is not a reporting company registered under
the securities act of 1934 and hence there is limited information
available about the company . it is not currently an operating
company . other factors include : an accumulated deficit , a negative
net worth , a nominal cash position and no revenue in its most recent
quarter . the company is going to need financing . if that financing
does not occur , the company may not be able to continue as a going
concern in which case you could lose your entire investment . the
publisher of this newsletter does not represent that the information
contained in this message states all material facts or does not omit
a material fact necessary to make the statements therein not
misleading . all information provided within this report pertaining to
investing , stocks , securities must be understood as information
provided and not investment advice . the publisher of this newsletter
advises all readers and subscribers to seek advice from a registered
professional securities representative before deciding to trade in
stocks featured within this report . none of the material within this
report shall be construed as any kind of investment advice or
solicitation . many of these companies are on the verge of bankruptcy .
you can lose all your money by investing in this stock . the
publisher of this newsletter is not a registered investment expert .
subscribers should not view information herein as legal , tax ,
accounting or investment advice . any reference to past
performances of companies are specially selected to be referenced
based on the favorable performance of these companies . you would
need perfect timing to acheive the results in the examples given .
there can be no assurance of that happening . remember , as always ,
past performance is never indicative of future results and a
thorough due diligence effort , including a review of a company ' s
filings when available , should be completed prior to investing . the
publisher of this newsletter has no relationship with mbah . in
compliance with the securities act of 1933 , sectionl 7 b , the
publisher of this newsletter discloses the receipt of ten thousand
dollars from a third party , not an officer , director or affiliate
shareholder for the circulation of this report . be aware of an
inherent conflict of interest resulting from such compensation due
to the fact that this is a paid advertisement and is not without
bias . the party that paid us has a position in the stock they will
sell at anytime without notice . this could have a negative impact on
the price of the stock . all factual information in this report was
gathered from public sources , including but not limited to company
websites and company press releases . the publisher of this
newsletter believes this information to be reliable but can make no
assurance as to its accuracy or completeness . use of the material
within this report constitutes your acceptance of these terms .
<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>visual identity logo working company image start visual identity key first good impression help take part buildinq positive visuai imaqe company creatinq outstanding loqo presentable stationery items professional website marketing toois wiii significantly contributeto success business take iook work sampies hot deal packaqes see offer work _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ interested _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Classify the email message as either "phishing" or "legitimate", Only answer in JSON with this schema:{"classification": str}<|eot_id|><|start_header_id|>user<|end_header_id|>glenn fisher allenemancipatewallacenichebotcom exquisite replica watchesrolex cartier breitling morevisit online shop replica classics trendy replica watches order rolex replica atches 0nline httpprovejobruncom wed 06 aug 2008 065853 0100 get finest rolex watch replica<|eot_id|><|start_header_id|>assistant<|end_header_id|>{"classification": phishing}<|eot_id|> |