Re: Populated screenshots

Subject: Re: Populated screenshots
From: Sandy Harris <sandy -at- storm -dot- ca>
To: "TECHWR-L" <techwr-l -at- lists -dot- raycomm -dot- com>
Date: Wed, 04 Apr 2001 14:46:16 -0400

Marguerite Krupp wrote:
>
> Legal issues aside, you quickly run into translation and cultural issues if
> you use recognizable names.
>
> MUST you use people's names? Can you substitute business-oriented aliases?
> If names are a requirement, I'd suggest androgynous ones like "Lee" or
> "Chris". ...

The standard names for cryptographers, coding theorists etc. are Alice, Bob,
Carol, Dave, ... = A, B, C, D, ...

Schneier's Applied Cryptography introduces a bunch more. Eve the eavesdropper,
Mallory the malicious attacker, Victor the verifier, Trent(?) the trusted
intermediary, ...

There's a howlingly funny (at least to cryptographers) biography of Alice
and Bob at:

http://hubble.physik.uni-konstanz.de/jkrueger/html/alicebob.html

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

*** Deva(tm) Tools for Dreamweaver and Deva(tm) Search ***
Build Contents, Indexes, and Search for Web Sites and Help Systems
Available 4/30/01 at http://www.devahelp.com or info -at- devahelp -dot- com

Sponsored by DigiPub Solutions Corp, producers of PDF 2001 Conference East,
June 4-6, Baltimore, MD. Now covering Acrobat 5. Early registration deadline
April 27. http://www.pdfconference.com.

---
You are currently subscribed to techwr-l as: archive -at- raycomm -dot- com
To unsubscribe send a blank email to leave-techwr-l-obscured -at- lists -dot- raycomm -dot- com
Send administrative questions to ejray -at- raycomm -dot- com -dot- Visit
http://www.raycomm.com/techwhirl/ for more resources and info.


Previous by Author: Subscriber change
Next by Author: Re: Document Indexing Reference (Long)
Previous by Thread: RE: Populated screenshots
Next by Thread: RE: Populated screenshots


What this post helpful? Share it with friends and colleagues:


Sponsored Ads