Re: WaPo on Crypto-Genie Terrorism

I occasionally get invited to teach at a local college.. some students are not US. Anyone have any suggestions on a way I can sneek some good privacy into the lesson plan.. the course is usually the Internet or networking in general. Charley
snip snip<< as things stand now, windoze folks are going to have to settle with Mcro$ofts Access to Keys...MAK or is it Bill's Access to Keys.. BAK in any case I didnt want to get into a my pulldownmenu is longer than your pulldownmenu argument.. I just want to see it get on the radar fo people who code.
You see I dont care what your favorite platform is,( if you like editing in VI fine, I personnly like TECO), BUT I am acting localy, doing my part, not just complaining about it... So if you want to help, I am still looking for folks to talk... maybe about why crypto is so important. Crypto-archarchy. or maybe some e$ stuff would be nice...
Vinnie Moscaritolo ------------------ "friends come and friends go..but enemies accumulate." http://www.vmeng.com/vinnie/ Fingerprint: 4FA3298150E404F2782501876EA2146A

Charley Sparks <sparks@bah.com> writes:
I occasionally get invited to teach at a local college.. some students are not US. Anyone have any suggestions on a way I can sneek some good privacy into the lesson plan.. the course is usually the Internet or networking in general.
Put useful stuff on a diskette, including PGP. Make as many copies of the diskette as you have students. Hand it out in class. Assign homework projects that would involve using PGP. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps

Charley Sparks wrote:
I occasionally get invited to teach at a local college.. some students are not US. Anyone have any suggestions on a way I can sneek some good privacy into the lesson plan..
How about someting sly and devious, like "Today, students, we're going to look into issues of privacy on the internet and with communications in general. We will survey the science of cryptography, using a variety of cryptographic techniques as illustrations of particular issues... "For our next meeting, please read the first several chapters of Bruce Schneier's 'Applied Cryptography' from the required reading list for the class." If you're stifled by any agency, scream at the top of your lungs. ______c_____________________________________________________________________ Mike M Nally * Tiv^H^H^H IBM * Austin TX * For the time being, m5@tivoli.com * m101@io.com * <URL:http://www.io.com/~m101> * three heads and eight arms.
participants (3)
-
Charley Sparks
-
dlv@bwalk.dm.com
-
Mike McNally