<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_08_1340208</id>
	<title>Microsoft COFEE Leaked</title>
	<author>Soulskill</author>
	<datestamp>1257689100000</datestamp>
	<htmltext><a href="mailto:samuelmcraven.gmail@com" rel="nofollow">54mc</a> writes <i>"Crunchgear reports that <a href="http://www.crunchgear.com/2009/11/06/siren-gif-microsoft-cofee-law-enforcement-tool-leaks-all-over-the-internet/">Microsoft's long-searched-for forensics tool, COFEE, has been leaked</a>. The tool started on a small, private tracker, but has since worked its way to The Pirate Bay. <a href="http://torrentfreak.com/cofee-forensic-tool-leaks-to-what-cd-admins-ban-it-091108/">Not all those who have gotten hold of it are enthused</a>, and reviews have ranged from 'disappointing' to 'useless.' From the article: 'You have absolutely no use for the program. It's not something like Photoshop or Final Cut Pro, an expensive application that you download for the hell of it on the off-chance you need to put Dave Meltzer's face on Brett Hart's body as part of a message board thread. No, COFEE is 100 percent useless to you.'"</i></htmltext>
<tokenext>54mc writes " Crunchgear reports that Microsoft 's long-searched-for forensics tool , COFEE , has been leaked .
The tool started on a small , private tracker , but has since worked its way to The Pirate Bay .
Not all those who have gotten hold of it are enthused , and reviews have ranged from 'disappointing ' to 'useless .
' From the article : 'You have absolutely no use for the program .
It 's not something like Photoshop or Final Cut Pro , an expensive application that you download for the hell of it on the off-chance you need to put Dave Meltzer 's face on Brett Hart 's body as part of a message board thread .
No , COFEE is 100 percent useless to you .
' "</tokentext>
<sentencetext>54mc writes "Crunchgear reports that Microsoft's long-searched-for forensics tool, COFEE, has been leaked.
The tool started on a small, private tracker, but has since worked its way to The Pirate Bay.
Not all those who have gotten hold of it are enthused, and reviews have ranged from 'disappointing' to 'useless.
' From the article: 'You have absolutely no use for the program.
It's not something like Photoshop or Final Cut Pro, an expensive application that you download for the hell of it on the off-chance you need to put Dave Meltzer's face on Brett Hart's body as part of a message board thread.
No, COFEE is 100 percent useless to you.
'"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30027190</id>
	<title>Copyright Troll?</title>
	<author>Anci3nt of Days</author>
	<datestamp>1257688500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well it is very useful for Microsoft - they can now go after the Pirate Bay for Copyright Infringement. All hail the DMCA.</p><p>I can already picture the Microsoft Lawyers - "THEY STOLE MY COFEE". It will be quoted in legal textbooks for years!</p></htmltext>
<tokenext>Well it is very useful for Microsoft - they can now go after the Pirate Bay for Copyright Infringement .
All hail the DMCA.I can already picture the Microsoft Lawyers - " THEY STOLE MY COFEE " .
It will be quoted in legal textbooks for years !</tokentext>
<sentencetext>Well it is very useful for Microsoft - they can now go after the Pirate Bay for Copyright Infringement.
All hail the DMCA.I can already picture the Microsoft Lawyers - "THEY STOLE MY COFEE".
It will be quoted in legal textbooks for years!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021502</id>
	<title>Useless?</title>
	<author>dandart</author>
	<datestamp>1257694080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>It doesn't even make you hyper, either!<br> <br>Hmm, must be decaf,</htmltext>
<tokenext>It does n't even make you hyper , either !
Hmm , must be decaf,</tokentext>
<sentencetext>It doesn't even make you hyper, either!
Hmm, must be decaf,</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021894</id>
	<title>Ummm.... well....</title>
	<author>Le Marteau</author>
	<datestamp>1257696780000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>&gt;  No, COFEE is 100 percent useless to you.'"</p><p>Yes, and the software that runs voting machines is "useless to us", too.</p><p>I think the submitter is missing the point.   This (probably) closed-source tool by Microsoft (that bears repeating... by MICROSOFT) is going to be used by law enforcement to help throw people in jail.  If for no 'practical'  use, now that COFFEE is leaked, people will be able to reverse-engineer it an see exactly what it is doing, and how.   That is a good thing.</p></htmltext>
<tokenext>&gt; No , COFEE is 100 percent useless to you .
' " Yes , and the software that runs voting machines is " useless to us " , too.I think the submitter is missing the point .
This ( probably ) closed-source tool by Microsoft ( that bears repeating... by MICROSOFT ) is going to be used by law enforcement to help throw people in jail .
If for no 'practical ' use , now that COFFEE is leaked , people will be able to reverse-engineer it an see exactly what it is doing , and how .
That is a good thing .</tokentext>
<sentencetext>&gt;  No, COFEE is 100 percent useless to you.
'"Yes, and the software that runs voting machines is "useless to us", too.I think the submitter is missing the point.
This (probably) closed-source tool by Microsoft (that bears repeating... by MICROSOFT) is going to be used by law enforcement to help throw people in jail.
If for no 'practical'  use, now that COFFEE is leaked, people will be able to reverse-engineer it an see exactly what it is doing, and how.
That is a good thing.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021770</id>
	<title>Useful</title>
	<author>Ilgaz</author>
	<datestamp>1257695940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you are redhat racing with ms , you can use his tool to prove that their platform can't be trusted. All you need is running it.</p></htmltext>
<tokenext>If you are redhat racing with ms , you can use his tool to prove that their platform ca n't be trusted .
All you need is running it .</tokentext>
<sentencetext>If you are redhat racing with ms , you can use his tool to prove that their platform can't be trusted.
All you need is running it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021502</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023048</id>
	<title>Re:The Solution? Removable Drive Bay</title>
	<author>Plekto</author>
	<datestamp>1257703800000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Anyone who is truly concerned with security knows that you take your drive with you and/or lock it up at night.  Thankfully SSDs are lightweight and easy to stick in a pocket.  I'm amazed at how many businesses don't have any physical protection plan in place, because that's how most data ends up getting into the wrong hands.</p><p><a href="http://www.startech.com/item/SAT2510U2REM-InfoSafe-35-Bay-Removable-25-SATA-Drive-Enclosure.aspx" title="startech.com">http://www.startech.com/item/SAT2510U2REM-InfoSafe-35-Bay-Removable-25-SATA-Drive-Enclosure.aspx</a> [startech.com]<br>Under $40 for this model.</p></htmltext>
<tokenext>Anyone who is truly concerned with security knows that you take your drive with you and/or lock it up at night .
Thankfully SSDs are lightweight and easy to stick in a pocket .
I 'm amazed at how many businesses do n't have any physical protection plan in place , because that 's how most data ends up getting into the wrong hands.http : //www.startech.com/item/SAT2510U2REM-InfoSafe-35-Bay-Removable-25-SATA-Drive-Enclosure.aspx [ startech.com ] Under $ 40 for this model .</tokentext>
<sentencetext>Anyone who is truly concerned with security knows that you take your drive with you and/or lock it up at night.
Thankfully SSDs are lightweight and easy to stick in a pocket.
I'm amazed at how many businesses don't have any physical protection plan in place, because that's how most data ends up getting into the wrong hands.http://www.startech.com/item/SAT2510U2REM-InfoSafe-35-Bay-Removable-25-SATA-Drive-Enclosure.aspx [startech.com]Under $40 for this model.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023410</id>
	<title>Re:on a live computer system?</title>
	<author>Anonymous</author>
	<datestamp>1257705960000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>One of the things that happened during the "Hacker Crackdown" in 1990 was that Law Enforcement were trained to quickly separate people and their computers. Then take pictures of the set-up before touching anything. IDK if that is still the case or if they do it for say any old warrent they are serving.</p></htmltext>
<tokenext>One of the things that happened during the " Hacker Crackdown " in 1990 was that Law Enforcement were trained to quickly separate people and their computers .
Then take pictures of the set-up before touching anything .
IDK if that is still the case or if they do it for say any old warrent they are serving .</tokentext>
<sentencetext>One of the things that happened during the "Hacker Crackdown" in 1990 was that Law Enforcement were trained to quickly separate people and their computers.
Then take pictures of the set-up before touching anything.
IDK if that is still the case or if they do it for say any old warrent they are serving.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022728</id>
	<title>Nice but there are more robust tools</title>
	<author>acedotcom</author>
	<datestamp>1257702000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>...i know this is a tool for n00bz, but it is seriously lacking in several areas.  First of all it even says in its dox, that it is only supported by a suspects computer supporting windows XP, which is still pretty good and better then nothing.  Secondly, if the suspects computer doesnt have autorun enabled you have to go to the USB drive and run the EXE on the suspects computer...meaning that if the computer is BIOS locked, encrypted on boot, or password protected, then the user must log in to execute the EXE.  i downloaded it and ran it, but it is ineffective against my W7 machines (password protected, encrypted).  understanding that if you dont give cops your password when they request it, they can charge you with obstruction of justice and then just move up to REAL computer forensics<br> <br>

I know its not perfect, and it isn't designed for the "1334", but it just seems useless if you are going up against someone who REALLY paranoid or very secure.  it seems like if someone has their computer as open as it needs to be to run COFEE, you wouldn't need the tool in the first place, just someone remotely proficient in computers.</htmltext>
<tokenext>...i know this is a tool for n00bz , but it is seriously lacking in several areas .
First of all it even says in its dox , that it is only supported by a suspects computer supporting windows XP , which is still pretty good and better then nothing .
Secondly , if the suspects computer doesnt have autorun enabled you have to go to the USB drive and run the EXE on the suspects computer...meaning that if the computer is BIOS locked , encrypted on boot , or password protected , then the user must log in to execute the EXE .
i downloaded it and ran it , but it is ineffective against my W7 machines ( password protected , encrypted ) .
understanding that if you dont give cops your password when they request it , they can charge you with obstruction of justice and then just move up to REAL computer forensics I know its not perfect , and it is n't designed for the " 1334 " , but it just seems useless if you are going up against someone who REALLY paranoid or very secure .
it seems like if someone has their computer as open as it needs to be to run COFEE , you would n't need the tool in the first place , just someone remotely proficient in computers .</tokentext>
<sentencetext>...i know this is a tool for n00bz, but it is seriously lacking in several areas.
First of all it even says in its dox, that it is only supported by a suspects computer supporting windows XP, which is still pretty good and better then nothing.
Secondly, if the suspects computer doesnt have autorun enabled you have to go to the USB drive and run the EXE on the suspects computer...meaning that if the computer is BIOS locked, encrypted on boot, or password protected, then the user must log in to execute the EXE.
i downloaded it and ran it, but it is ineffective against my W7 machines (password protected, encrypted).
understanding that if you dont give cops your password when they request it, they can charge you with obstruction of justice and then just move up to REAL computer forensics 

I know its not perfect, and it isn't designed for the "1334", but it just seems useless if you are going up against someone who REALLY paranoid or very secure.
it seems like if someone has their computer as open as it needs to be to run COFEE, you wouldn't need the tool in the first place, just someone remotely proficient in computers.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021696</id>
	<title>Re:I like TEA</title>
	<author>Anonymous</author>
	<datestamp>1257695340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That lady is most likely a model who was photographed by someone else, who in turn sold a photo license to microsoft.</p></htmltext>
<tokenext>That lady is most likely a model who was photographed by someone else , who in turn sold a photo license to microsoft .</tokentext>
<sentencetext>That lady is most likely a model who was photographed by someone else, who in turn sold a photo license to microsoft.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022718</id>
	<title>Re:The Solution? HURD!</title>
	<author>Anonymous</author>
	<datestamp>1257701940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Maybe the most hilariously brain-damaged troll I've ever seen. Approval!</p></htmltext>
<tokenext>Maybe the most hilariously brain-damaged troll I 've ever seen .
Approval !</tokentext>
<sentencetext>Maybe the most hilariously brain-damaged troll I've ever seen.
Approval!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021476</id>
	<title>As someone in the Security Field...</title>
	<author>Anonymous</author>
	<datestamp>1257693960000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I can tell you that Microsoft COFEE isn't remotely useful for anyone doing bona fide forensics work either.</p></htmltext>
<tokenext>I can tell you that Microsoft COFEE is n't remotely useful for anyone doing bona fide forensics work either .</tokentext>
<sentencetext>I can tell you that Microsoft COFEE isn't remotely useful for anyone doing bona fide forensics work either.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022162</id>
	<title>Yummy!</title>
	<author>ttyX</author>
	<datestamp>1257698580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Nothing beats a digital cup of coffee...</htmltext>
<tokenext>Nothing beats a digital cup of coffee.. .</tokentext>
<sentencetext>Nothing beats a digital cup of coffee...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30034380</id>
	<title>utter rubish!</title>
	<author>Anonymous</author>
	<datestamp>1257788520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is a re-packaged 'package' of all the old programs written by SysIntenals years ago. MS has had them for sometime - they were still available as such just recently. As far as I know MS vever even made any changes and if you run this program - you see sysinternals all over the place. they not even changed the app names.</p><p>The usb builder part just 'builds' what you can do in a 100k batch file. The info is very limited and it does not get passwords - as this util is well know to all virus scanners.</p><p>There are far better apps out there! I am amazed that they think this is 'forensics'!<br>This is schoolboy toys!</p></htmltext>
<tokenext>This is a re-packaged 'package ' of all the old programs written by SysIntenals years ago .
MS has had them for sometime - they were still available as such just recently .
As far as I know MS vever even made any changes and if you run this program - you see sysinternals all over the place .
they not even changed the app names.The usb builder part just 'builds ' what you can do in a 100k batch file .
The info is very limited and it does not get passwords - as this util is well know to all virus scanners.There are far better apps out there !
I am amazed that they think this is 'forensics ' ! This is schoolboy toys !</tokentext>
<sentencetext>This is a re-packaged 'package' of all the old programs written by SysIntenals years ago.
MS has had them for sometime - they were still available as such just recently.
As far as I know MS vever even made any changes and if you run this program - you see sysinternals all over the place.
they not even changed the app names.The usb builder part just 'builds' what you can do in a 100k batch file.
The info is very limited and it does not get passwords - as this util is well know to all virus scanners.There are far better apps out there!
I am amazed that they think this is 'forensics'!This is schoolboy toys!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30028496</id>
	<title>Re:The Solution? Removable Drive Bay</title>
	<author>Minwee</author>
	<datestamp>1257699180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Anyone who is truly concerned with security knows that you take your drive with you [...] that's how most data ends up getting into the wrong hands.</p></div></blockquote><p>You've got that right.  Many of the people I have worked with have excellent heads for business, graphic design, administration, or programming, but I still don't trust them to put their pants on the right way around every morning.  Why would I want them pulling their hard drives out of their computers every night?</p></div>
	</htmltext>
<tokenext>Anyone who is truly concerned with security knows that you take your drive with you [ ... ] that 's how most data ends up getting into the wrong hands.You 've got that right .
Many of the people I have worked with have excellent heads for business , graphic design , administration , or programming , but I still do n't trust them to put their pants on the right way around every morning .
Why would I want them pulling their hard drives out of their computers every night ?</tokentext>
<sentencetext>Anyone who is truly concerned with security knows that you take your drive with you [...] that's how most data ends up getting into the wrong hands.You've got that right.
Many of the people I have worked with have excellent heads for business, graphic design, administration, or programming, but I still don't trust them to put their pants on the right way around every morning.
Why would I want them pulling their hard drives out of their computers every night?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023048</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022730</id>
	<title>Grammer patrol</title>
	<author>Anonymous</author>
	<datestamp>1257702000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Please think about consulting a dictionary. "Enthused" is not an adjective. It is a verb. It is something you do, not a characteristic state of being. "Enthusiastic" is the word you are looking for.</p></htmltext>
<tokenext>Please think about consulting a dictionary .
" Enthused " is not an adjective .
It is a verb .
It is something you do , not a characteristic state of being .
" Enthusiastic " is the word you are looking for .</tokentext>
<sentencetext>Please think about consulting a dictionary.
"Enthused" is not an adjective.
It is a verb.
It is something you do, not a characteristic state of being.
"Enthusiastic" is the word you are looking for.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029432</id>
	<title>Please stop this crap, even in jest</title>
	<author>ifwm</author>
	<datestamp>1257709200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Your computer proves that you played poker online once last year, enjoy your 2+ year federal sentence</p></div></blockquote><p>It's not a Federal crime, stop perpetuating this BS.</p><p>There are some localities that have outlawed it, but there is no Federal law against it, and no, UIGEA doesn't outlaw it.</p></div>
	</htmltext>
<tokenext>Your computer proves that you played poker online once last year , enjoy your 2 + year federal sentenceIt 's not a Federal crime , stop perpetuating this BS.There are some localities that have outlawed it , but there is no Federal law against it , and no , UIGEA does n't outlaw it .</tokentext>
<sentencetext>Your computer proves that you played poker online once last year, enjoy your 2+ year federal sentenceIt's not a Federal crime, stop perpetuating this BS.There are some localities that have outlawed it, but there is no Federal law against it, and no, UIGEA doesn't outlaw it.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021622</id>
	<title>Creation of Adam... thought it was the same story</title>
	<author>jep77</author>
	<datestamp>1257694860000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>At first I thought these two stories were related.<br><a href="http://gizmodo.com/5399583/famous-paintings-reproduced-in-coffee" title="gizmodo.com" rel="nofollow">http://gizmodo.com/5399583/famous-paintings-reproduced-in-coffee</a> [gizmodo.com]<br>I was about to download the MS tool so I could create my own spectacular tasting, eye-opening, knock-off classic art.</p></htmltext>
<tokenext>At first I thought these two stories were related.http : //gizmodo.com/5399583/famous-paintings-reproduced-in-coffee [ gizmodo.com ] I was about to download the MS tool so I could create my own spectacular tasting , eye-opening , knock-off classic art .</tokentext>
<sentencetext>At first I thought these two stories were related.http://gizmodo.com/5399583/famous-paintings-reproduced-in-coffee [gizmodo.com]I was about to download the MS tool so I could create my own spectacular tasting, eye-opening, knock-off classic art.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023772</id>
	<title>Sysinternals</title>
	<author>Anonymous</author>
	<datestamp>1257708240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>It's basically a set of scripts that runs various sysinternals utilities and dumps the output to a<nobr> <wbr></nobr>.txt file when you insert an usb drive. Nothing fancy and I'm willing to bet most system admins have written something similar themselves in the past.

It's meant to be used by police officers who are not computer experts, so the experts can review the data later.</htmltext>
<tokenext>It 's basically a set of scripts that runs various sysinternals utilities and dumps the output to a .txt file when you insert an usb drive .
Nothing fancy and I 'm willing to bet most system admins have written something similar themselves in the past .
It 's meant to be used by police officers who are not computer experts , so the experts can review the data later .</tokentext>
<sentencetext>It's basically a set of scripts that runs various sysinternals utilities and dumps the output to a .txt file when you insert an usb drive.
Nothing fancy and I'm willing to bet most system admins have written something similar themselves in the past.
It's meant to be used by police officers who are not computer experts, so the experts can review the data later.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030682</id>
	<title>Re:While I don't have any use for the program</title>
	<author>craagz</author>
	<datestamp>1257766380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Maybe <a href="http://www.bernardbelanger.com/computing/NaDa/index.php" title="bernardbelanger.com" rel="nofollow">this </a> [bernardbelanger.com] will be perfect for everybody's needs.</htmltext>
<tokenext>Maybe this [ bernardbelanger.com ] will be perfect for everybody 's needs .</tokentext>
<sentencetext>Maybe this  [bernardbelanger.com] will be perfect for everybody's needs.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021312</id>
	<title>oh</title>
	<author>amnezick</author>
	<datestamp>1257692820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>more like spilled.

Pretty useless if you always turn off your computer when you leave home<nobr> <wbr></nobr>... or hear "xxPD, open the door".</htmltext>
<tokenext>more like spilled .
Pretty useless if you always turn off your computer when you leave home ... or hear " xxPD , open the door " .</tokentext>
<sentencetext>more like spilled.
Pretty useless if you always turn off your computer when you leave home ... or hear "xxPD, open the door".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402</id>
	<title>I like TEA</title>
	<author>BadAnalogyGuy</author>
	<datestamp>1257693420000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p>I like my tea green.</p><p>But I'd probably give MS Support a call just to talk to <a href="http://www.microsoft.com/industry/government/solutions/images/images\_center/SolutionsCenter\_ContactUs.jpg" title="microsoft.com" rel="nofollow">this lady</a> [microsoft.com]. I'd love to add some cream to her mug.</p></htmltext>
<tokenext>I like my tea green.But I 'd probably give MS Support a call just to talk to this lady [ microsoft.com ] .
I 'd love to add some cream to her mug .</tokentext>
<sentencetext>I like my tea green.But I'd probably give MS Support a call just to talk to this lady [microsoft.com].
I'd love to add some cream to her mug.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022694</id>
	<title>Yes, but does it run Gnu/Linux on Alpha and others</title>
	<author>Anonymous</author>
	<datestamp>1257701820000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>As having known a person who had their house raided by the Calgary Police (many times) and their computers stolen as a result of their former employer making false claims, the tool is as useful as the Calgary Police Computer Tech Team (or whatever they are called today).</p><p>I saw the photos of the damage caused by the Calgary Police, cut keyboard cables, broken doors, general damage done to the house, broken commercial (legally bought PS3 games, music, films) CD/DVD/BDs, broken case covers, cut USB cables, are just a few of the damage left in the Calgary Police wake.</p><p>The items stolen by the Calgary Police under a possible false warrant, included TVs, old laptops from the mid-90s, USB Media, most items labeled Sony, SUN Sparc systems, Compaq Alphas, PS3, Network Switches. and anything Calgary Police felt proved his innocent's.  The official list of items stolen, was never provided to him, as the Calgary Police refused to provide, even to his lawyer.</p><p>He was handcuffed, body searched, and threaten by Calgary Police with their hands on their pistols to hand over passwords.  He refused, taken physical damage.  He feels he would have been shot, if his Lawyer and Minister wasn't contacted.</p><p>When the Calgary Police found Gnu/Linux on most systems, they told him 'Only hackers use Linux'.</p><p>No charges were laid as a result of the raid.  Calgary Police had the items for more than 6 months.  When the items were returned, some were no longer working.</p></htmltext>
<tokenext>As having known a person who had their house raided by the Calgary Police ( many times ) and their computers stolen as a result of their former employer making false claims , the tool is as useful as the Calgary Police Computer Tech Team ( or whatever they are called today ) .I saw the photos of the damage caused by the Calgary Police , cut keyboard cables , broken doors , general damage done to the house , broken commercial ( legally bought PS3 games , music , films ) CD/DVD/BDs , broken case covers , cut USB cables , are just a few of the damage left in the Calgary Police wake.The items stolen by the Calgary Police under a possible false warrant , included TVs , old laptops from the mid-90s , USB Media , most items labeled Sony , SUN Sparc systems , Compaq Alphas , PS3 , Network Switches .
and anything Calgary Police felt proved his innocent 's .
The official list of items stolen , was never provided to him , as the Calgary Police refused to provide , even to his lawyer.He was handcuffed , body searched , and threaten by Calgary Police with their hands on their pistols to hand over passwords .
He refused , taken physical damage .
He feels he would have been shot , if his Lawyer and Minister was n't contacted.When the Calgary Police found Gnu/Linux on most systems , they told him 'Only hackers use Linux'.No charges were laid as a result of the raid .
Calgary Police had the items for more than 6 months .
When the items were returned , some were no longer working .</tokentext>
<sentencetext>As having known a person who had their house raided by the Calgary Police (many times) and their computers stolen as a result of their former employer making false claims, the tool is as useful as the Calgary Police Computer Tech Team (or whatever they are called today).I saw the photos of the damage caused by the Calgary Police, cut keyboard cables, broken doors, general damage done to the house, broken commercial (legally bought PS3 games, music, films) CD/DVD/BDs, broken case covers, cut USB cables, are just a few of the damage left in the Calgary Police wake.The items stolen by the Calgary Police under a possible false warrant, included TVs, old laptops from the mid-90s, USB Media, most items labeled Sony, SUN Sparc systems, Compaq Alphas, PS3, Network Switches.
and anything Calgary Police felt proved his innocent's.
The official list of items stolen, was never provided to him, as the Calgary Police refused to provide, even to his lawyer.He was handcuffed, body searched, and threaten by Calgary Police with their hands on their pistols to hand over passwords.
He refused, taken physical damage.
He feels he would have been shot, if his Lawyer and Minister wasn't contacted.When the Calgary Police found Gnu/Linux on most systems, they told him 'Only hackers use Linux'.No charges were laid as a result of the raid.
Calgary Police had the items for more than 6 months.
When the items were returned, some were no longer working.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021384</id>
	<title>Not having seen the app, but</title>
	<author>Anonymous</author>
	<datestamp>1257693360000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext>From the description on the link site, which I think was quoting MS about what does an untrained beat cop do when they find digital evidence? Step back, don't touch it, and call in the law-enforcement folks who are trained and won't destroy the evidence. It's hard enough to get a jury to understand evidence pulled off of a computer - these folks see viruses or similar on their own machines that "just magically appears" so surely the defense's argument that the kiddie porn just magically appeared on his client's machine is completely possible. Having the defense say, "Mr. Officer, you admit to having no background in computer forensics, and you admit to not knowing what the program does. You admit to clicking on the talking paperclip when it said, "I see you are trying to bust a felon. Would you like me to help you?" but have no idea what then happened? Your honor, I move that the case be dismissed because the so-called evidence has obviously not followed the proper evidentiary chain." I'm posting anon because I've gone through the proper training at places like <a href="http://www.fletc.gov/" title="fletc.gov" rel="nofollow">FLETC</a> [fletc.gov] and it's something they drill into us, time and time again. If you're not sure you're qualified to handle investigating the content on the computer, don't touch it. Get someone who is qualified.</htmltext>
<tokenext>From the description on the link site , which I think was quoting MS about what does an untrained beat cop do when they find digital evidence ?
Step back , do n't touch it , and call in the law-enforcement folks who are trained and wo n't destroy the evidence .
It 's hard enough to get a jury to understand evidence pulled off of a computer - these folks see viruses or similar on their own machines that " just magically appears " so surely the defense 's argument that the kiddie porn just magically appeared on his client 's machine is completely possible .
Having the defense say , " Mr. Officer , you admit to having no background in computer forensics , and you admit to not knowing what the program does .
You admit to clicking on the talking paperclip when it said , " I see you are trying to bust a felon .
Would you like me to help you ?
" but have no idea what then happened ?
Your honor , I move that the case be dismissed because the so-called evidence has obviously not followed the proper evidentiary chain .
" I 'm posting anon because I 've gone through the proper training at places like FLETC [ fletc.gov ] and it 's something they drill into us , time and time again .
If you 're not sure you 're qualified to handle investigating the content on the computer , do n't touch it .
Get someone who is qualified .</tokentext>
<sentencetext>From the description on the link site, which I think was quoting MS about what does an untrained beat cop do when they find digital evidence?
Step back, don't touch it, and call in the law-enforcement folks who are trained and won't destroy the evidence.
It's hard enough to get a jury to understand evidence pulled off of a computer - these folks see viruses or similar on their own machines that "just magically appears" so surely the defense's argument that the kiddie porn just magically appeared on his client's machine is completely possible.
Having the defense say, "Mr. Officer, you admit to having no background in computer forensics, and you admit to not knowing what the program does.
You admit to clicking on the talking paperclip when it said, "I see you are trying to bust a felon.
Would you like me to help you?
" but have no idea what then happened?
Your honor, I move that the case be dismissed because the so-called evidence has obviously not followed the proper evidentiary chain.
" I'm posting anon because I've gone through the proper training at places like FLETC [fletc.gov] and it's something they drill into us, time and time again.
If you're not sure you're qualified to handle investigating the content on the computer, don't touch it.
Get someone who is qualified.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024710</id>
	<title>Re:"Microsoft COFFEE Spilled"</title>
	<author>Blakey Rat</author>
	<datestamp>1257672180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Raymond Chen wrote a blog posting about this: <a href="http://blogs.msdn.com/oldnewthing/archive/2009/11/05/9917671.aspx" title="msdn.com">http://blogs.msdn.com/oldnewthing/archive/2009/11/05/9917671.aspx</a> [msdn.com]</p><p>The installers of the coffee machine didn't consider the number of visitors. I don't see what it has to do with software leaking though.</p></htmltext>
<tokenext>Raymond Chen wrote a blog posting about this : http : //blogs.msdn.com/oldnewthing/archive/2009/11/05/9917671.aspx [ msdn.com ] The installers of the coffee machine did n't consider the number of visitors .
I do n't see what it has to do with software leaking though .</tokentext>
<sentencetext>Raymond Chen wrote a blog posting about this: http://blogs.msdn.com/oldnewthing/archive/2009/11/05/9917671.aspx [msdn.com]The installers of the coffee machine didn't consider the number of visitors.
I don't see what it has to do with software leaking though.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024100</id>
	<title>Re:The Solution? HURD!</title>
	<author>Anonymous</author>
	<datestamp>1257710880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Wooooosch</p></htmltext>
<tokenext>Wooooosch</tokentext>
<sentencetext>Wooooosch</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022082</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438</id>
	<title>"Microsoft COFFEE Spilled"</title>
	<author>Anonymous</author>
	<datestamp>1257693720000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext>Come on, the setup is so obvious!</htmltext>
<tokenext>Come on , the setup is so obvious !</tokentext>
<sentencetext>Come on, the setup is so obvious!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30045246</id>
	<title>Re:"Microsoft COFFEE Spilled"</title>
	<author>AniVisual</author>
	<datestamp>1257866940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p> Read it again. It's Microsoft CO-FEE masquerading as COFFEE. </p></htmltext>
<tokenext>Read it again .
It 's Microsoft CO-FEE masquerading as COFFEE .</tokentext>
<sentencetext> Read it again.
It's Microsoft CO-FEE masquerading as COFFEE. </sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022774</id>
	<title>Cofee leak</title>
	<author>VGPowerlord</author>
	<datestamp>1257702240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>How do we know that Microsoft didn't intentionally leak this?</p><p>Maybe they did it so that they can start selling Microsoft CREAM!</p></htmltext>
<tokenext>How do we know that Microsoft did n't intentionally leak this ? Maybe they did it so that they can start selling Microsoft CREAM !</tokentext>
<sentencetext>How do we know that Microsoft didn't intentionally leak this?Maybe they did it so that they can start selling Microsoft CREAM!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024304</id>
	<title>Horay, MS is on the right track!</title>
	<author>failedlogic</author>
	<datestamp>1257712740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Couple of days from now there will be a HOT COFEE mod for Windows. So much more comprehensive than whatever was in GTA.</p></htmltext>
<tokenext>Couple of days from now there will be a HOT COFEE mod for Windows .
So much more comprehensive than whatever was in GTA .</tokentext>
<sentencetext>Couple of days from now there will be a HOT COFEE mod for Windows.
So much more comprehensive than whatever was in GTA.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021568</id>
	<title>Remember the polish ad job M$ did?</title>
	<author>Anonymous</author>
	<datestamp>1257694440000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Changing the face of the black guy to a white guy, e.g. at<br><a href="http://lh4.ggpht.com/\_EHZsoUS6SIA/SpQ93JYbf9I/AAAAAAAAEts/2HmV595XEqk/microbloodysoft.jpg" title="ggpht.com" rel="nofollow">http://lh4.ggpht.com/\_EHZsoUS6SIA/SpQ93JYbf9I/AAAAAAAAEts/2HmV595XEqk/microbloodysoft.jpg</a> [ggpht.com]</p><p>Did they use that for it? It really, really sucked ass.</p></htmltext>
<tokenext>Changing the face of the black guy to a white guy , e.g .
athttp : //lh4.ggpht.com/ \ _EHZsoUS6SIA/SpQ93JYbf9I/AAAAAAAAEts/2HmV595XEqk/microbloodysoft.jpg [ ggpht.com ] Did they use that for it ?
It really , really sucked ass .</tokentext>
<sentencetext>Changing the face of the black guy to a white guy, e.g.
athttp://lh4.ggpht.com/\_EHZsoUS6SIA/SpQ93JYbf9I/AAAAAAAAEts/2HmV595XEqk/microbloodysoft.jpg [ggpht.com]Did they use that for it?
It really, really sucked ass.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029650</id>
	<title>Re:While I don't have any use for the program</title>
	<author>ifwm</author>
	<datestamp>1257797640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"What sort of backward, third world, Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker?"</p><p>Nowhere in the US, except Washington state.</p></htmltext>
<tokenext>" What sort of backward , third world , Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker ?
" Nowhere in the US , except Washington state .</tokentext>
<sentencetext>"What sort of backward, third world, Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker?
"Nowhere in the US, except Washington state.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30026464</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025084</id>
	<title>Re:on a live computer system?</title>
	<author>buchner.johannes</author>
	<datestamp>1257674580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And watch out for <a href="http://www.schneier.com/blog/archives/2009/10/evil\_maid\_attac.html" title="schneier.com">evil maids</a> [schneier.com] <a href="http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html" title="blogspot.com">installing</a> [blogspot.com] <a href="http://www.stoned-vienna.com/" title="stoned-vienna.com">malware</a> [stoned-vienna.com] that subverts your encryption and sends/stores everything unencrypted.<br>And don't tell me that ain't easy with Linux.<br>That's right, you can never leave your computer unlocked unattended. Realistic?</p></htmltext>
<tokenext>And watch out for evil maids [ schneier.com ] installing [ blogspot.com ] malware [ stoned-vienna.com ] that subverts your encryption and sends/stores everything unencrypted.And do n't tell me that ai n't easy with Linux.That 's right , you can never leave your computer unlocked unattended .
Realistic ?</tokentext>
<sentencetext>And watch out for evil maids [schneier.com] installing [blogspot.com] malware [stoned-vienna.com] that subverts your encryption and sends/stores everything unencrypted.And don't tell me that ain't easy with Linux.That's right, you can never leave your computer unlocked unattended.
Realistic?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021834</id>
	<title>Of course it's useless...</title>
	<author>lisany</author>
	<datestamp>1257696360000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>1</modscore>
	<htmltext>I don't run windows.</htmltext>
<tokenext>I do n't run windows .</tokentext>
<sentencetext>I don't run windows.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30026464</id>
	<title>Re:While I don't have any use for the program</title>
	<author>Anonymous</author>
	<datestamp>1257684000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>Your computer proves that you played poker online once last year, enjoy your 2+ year federal sentence</p></div></blockquote><p>
What sort of backward, third world, Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker?</p></div>
	</htmltext>
<tokenext>Your computer proves that you played poker online once last year , enjoy your 2 + year federal sentence What sort of backward , third world , Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker ?</tokentext>
<sentencetext>Your computer proves that you played poker online once last year, enjoy your 2+ year federal sentence
What sort of backward, third world, Taliban-inspired place would you have to live in where you could get 2 years in jail for playing poker?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324</id>
	<title>While I don't have any use for the program</title>
	<author>Anonymous</author>
	<datestamp>1257692880000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>It's a bit short-sighted to say that nobody does. I'm sure there are lots of people out there with material on their machines that they wouldn't want a law enforcement officer to find. This tool would be perfect for their needs.</p></htmltext>
<tokenext>It 's a bit short-sighted to say that nobody does .
I 'm sure there are lots of people out there with material on their machines that they would n't want a law enforcement officer to find .
This tool would be perfect for their needs .</tokentext>
<sentencetext>It's a bit short-sighted to say that nobody does.
I'm sure there are lots of people out there with material on their machines that they wouldn't want a law enforcement officer to find.
This tool would be perfect for their needs.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021938</id>
	<title>free alternative</title>
	<author>telenut</author>
	<datestamp>1257697080000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>Ok, the tool from Microsoft is 'free' also, but here is something with way more options:
<a href="http://wiki.hak5.org/wiki/USB\_Switchblade" title="hak5.org" rel="nofollow">http://wiki.hak5.org/wiki/USB\_Switchblade</a> [hak5.org]</htmltext>
<tokenext>Ok , the tool from Microsoft is 'free ' also , but here is something with way more options : http : //wiki.hak5.org/wiki/USB \ _Switchblade [ hak5.org ]</tokentext>
<sentencetext>Ok, the tool from Microsoft is 'free' also, but here is something with way more options:
http://wiki.hak5.org/wiki/USB\_Switchblade [hak5.org]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021974</id>
	<title>Re:While I don't have any use for the program</title>
	<author>Anonymous</author>
	<datestamp>1257697320000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>I agree. Using the software may not prove useful, but studying the software to see how it works might be. It is said the software can decrypt passwords and access otherwise inaccessible files. If true, that would be a major security hole that black hats could exploit, so the public has the right to know what exactly COFEE does, how it works, and how to defend their systems from it and similar software.</p></htmltext>
<tokenext>I agree .
Using the software may not prove useful , but studying the software to see how it works might be .
It is said the software can decrypt passwords and access otherwise inaccessible files .
If true , that would be a major security hole that black hats could exploit , so the public has the right to know what exactly COFEE does , how it works , and how to defend their systems from it and similar software .</tokentext>
<sentencetext>I agree.
Using the software may not prove useful, but studying the software to see how it works might be.
It is said the software can decrypt passwords and access otherwise inaccessible files.
If true, that would be a major security hole that black hats could exploit, so the public has the right to know what exactly COFEE does, how it works, and how to defend their systems from it and similar software.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023322</id>
	<title>Re:"Microsoft COFFEE Spilled"</title>
	<author>noidentity</author>
	<datestamp>1257705480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Microsoft coffee may seem nice in the morning, but you'll always crash later in the day.</htmltext>
<tokenext>Microsoft coffee may seem nice in the morning , but you 'll always crash later in the day .</tokentext>
<sentencetext>Microsoft coffee may seem nice in the morning, but you'll always crash later in the day.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</id>
	<title>The Solution? HURD!</title>
	<author>Anonymous</author>
	<datestamp>1257694380000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Its a tool written by Microsoft, for Microsoft products. Do you have nefarious stuff you'd rather not have leaked? Warez or other secret stuff you'd rather keep hidden? The solution? Don't run Windows, run HURD! As added bonus, there's no viruses, no nasties that'll install on your system. No COFEE or other LEO programs to infect your privacy.</p><p><a href="http://en.wikipedia.org/wiki/GNU\_Hurd" title="wikipedia.org"> <b>HURD</b>...<i>The only sensible solution</i>.</a> [wikipedia.org]</p></htmltext>
<tokenext>Its a tool written by Microsoft , for Microsoft products .
Do you have nefarious stuff you 'd rather not have leaked ?
Warez or other secret stuff you 'd rather keep hidden ?
The solution ?
Do n't run Windows , run HURD !
As added bonus , there 's no viruses , no nasties that 'll install on your system .
No COFEE or other LEO programs to infect your privacy .
HURD...The only sensible solution .
[ wikipedia.org ]</tokentext>
<sentencetext>Its a tool written by Microsoft, for Microsoft products.
Do you have nefarious stuff you'd rather not have leaked?
Warez or other secret stuff you'd rather keep hidden?
The solution?
Don't run Windows, run HURD!
As added bonus, there's no viruses, no nasties that'll install on your system.
No COFEE or other LEO programs to infect your privacy.
HURD...The only sensible solution.
[wikipedia.org]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022836</id>
	<title>9FAIlZORS</title>
	<author>Anonymous</author>
	<datestamp>1257702480000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext>You join tod4y! raise 0r lower the</htmltext>
<tokenext>You join tod4y !
raise 0r lower the</tokentext>
<sentencetext>You join tod4y!
raise 0r lower the</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025148</id>
	<title>Scary thought...</title>
	<author>Anonymous</author>
	<datestamp>1257675060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This from MS' COFEE page:</p><p>"If it's vital to government, it's mission critical to Microsoft."</p></htmltext>
<tokenext>This from MS ' COFEE page : " If it 's vital to government , it 's mission critical to Microsoft .
"</tokentext>
<sentencetext>This from MS' COFEE page:"If it's vital to government, it's mission critical to Microsoft.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30032508</id>
	<title>At least 2nd degree burns to the groin</title>
	<author>Dareth</author>
	<datestamp>1257781200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I believe you must have at least 2nd degree burns to the groin region before it validates a lawsuit.</p></htmltext>
<tokenext>I believe you must have at least 2nd degree burns to the groin region before it validates a lawsuit .</tokentext>
<sentencetext>I believe you must have at least 2nd degree burns to the groin region before it validates a lawsuit.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30027996</id>
	<title>About the originating tracker</title>
	<author>tvelocity</author>
	<datestamp>1257694860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This is probably nitpicking, but the tracker the file originated from is not "a small, private tracker".</p><p>It is actually one of the most regarded private trackers, and the largest private music trackers currently operational. In terms of provided content, it is BY FAR the biggest private tracker on the Internet, past or present, with over 600k torrents.</p><p>IMHO it is one of the best places for any music lover to hang out on the Internet, with a great selection of music, awesome community, and friendly staff, and it <a href="http://whatinterviewprep.webs.com/" title="webs.com" rel="nofollow">isn't really that hard to get into either</a> [webs.com].</p><p>What is really interesting is how the upload of the original file was to fill a request with a very lucrative bounty of 1.6 TB. For one and a half year, no one really believed that the request would ever be filled, but people kept voting it up, quickly ranking it as the largest bounty on the site.</p><p>Disclaimer: I'm not affiliated with the aforementioned tracker.</p></htmltext>
<tokenext>This is probably nitpicking , but the tracker the file originated from is not " a small , private tracker " .It is actually one of the most regarded private trackers , and the largest private music trackers currently operational .
In terms of provided content , it is BY FAR the biggest private tracker on the Internet , past or present , with over 600k torrents.IMHO it is one of the best places for any music lover to hang out on the Internet , with a great selection of music , awesome community , and friendly staff , and it is n't really that hard to get into either [ webs.com ] .What is really interesting is how the upload of the original file was to fill a request with a very lucrative bounty of 1.6 TB .
For one and a half year , no one really believed that the request would ever be filled , but people kept voting it up , quickly ranking it as the largest bounty on the site.Disclaimer : I 'm not affiliated with the aforementioned tracker .</tokentext>
<sentencetext>This is probably nitpicking, but the tracker the file originated from is not "a small, private tracker".It is actually one of the most regarded private trackers, and the largest private music trackers currently operational.
In terms of provided content, it is BY FAR the biggest private tracker on the Internet, past or present, with over 600k torrents.IMHO it is one of the best places for any music lover to hang out on the Internet, with a great selection of music, awesome community, and friendly staff, and it isn't really that hard to get into either [webs.com].What is really interesting is how the upload of the original file was to fill a request with a very lucrative bounty of 1.6 TB.
For one and a half year, no one really believed that the request would ever be filled, but people kept voting it up, quickly ranking it as the largest bounty on the site.Disclaimer: I'm not affiliated with the aforementioned tracker.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022780</id>
	<title>Re:As someone in the Security Field...</title>
	<author>jcr</author>
	<datestamp>1257702240000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>So what you're saying is that it's a true Microsoft product, amirite?</p><p>-jcr</p></htmltext>
<tokenext>So what you 're saying is that it 's a true Microsoft product , amirite ? -jcr</tokentext>
<sentencetext>So what you're saying is that it's a true Microsoft product, amirite?-jcr</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021476</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024900</id>
	<title>Re:But</title>
	<author>Anonymous</author>
	<datestamp>1257673320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>I still don't understand what it does.</p></div></blockquote><p>There's a 30MB 'FIXED' version of cofee on piratebay which installs a trojan. woohoo!</p></div>
	</htmltext>
<tokenext>I still do n't understand what it does.There 's a 30MB 'FIXED ' version of cofee on piratebay which installs a trojan .
woohoo !</tokentext>
<sentencetext>I still don't understand what it does.There's a 30MB 'FIXED' version of cofee on piratebay which installs a trojan.
woohoo!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021322</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022662</id>
	<title>Re:The Solution? HURD!</title>
	<author>supersat</author>
	<datestamp>1257701700000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>There's no viruses or nasties for it because NOTHING RUNS ON IT.<nobr> <wbr></nobr>;)</htmltext>
<tokenext>There 's no viruses or nasties for it because NOTHING RUNS ON IT .
; )</tokentext>
<sentencetext>There's no viruses or nasties for it because NOTHING RUNS ON IT.
;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806</id>
	<title>Re:While I don't have any use for the program</title>
	<author>pla</author>
	<datestamp>1257696180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><i>It's a bit short-sighted to say that nobody does. I'm sure there are lots of people
out there with material on their machines that they wouldn't want a law enforcement
officer to find. This tool would be perfect for their needs.</i> <br>
<br>
As a fan of maximizing my privacy, I would find such a tool useful just for auditing the
effectiveness of my standard cleanup procedures.<br>
<br>
You don't need to break the law to have an interest in others not seeing what you do with
your computer.  Whether making sure you haven't left personal financial information unencrypted
on your machine, or have accidentally clicked "yes" to have your browser remember your
passwords, or simply your taste in porn stars... All legal, yet things you probably would
rather not leave lying around for anyone other than yourself.<br>
<br>
Now, aside from that, don't forget that police exist to help prosecute cases, not to protect us
or find the guilty party or any fluffy BS like that.  Once they have you in their sights, the less
they can dig up, the better.  "Good news - Your alibi checked out, you didn't kill that girl.  Bad
news - Your computer proves that you played poker online once last year, enjoy your 2+ year federal
sentence".<br>
<br>
And hey, who better to know where Windows leaks information than Microsoft itself?  Not
that I would trust them as my <i>sole</i> source of privacy maintenance, but as I said,
for auditing "best practices", such a tool would appear fairly useful.</htmltext>
<tokenext>It 's a bit short-sighted to say that nobody does .
I 'm sure there are lots of people out there with material on their machines that they would n't want a law enforcement officer to find .
This tool would be perfect for their needs .
As a fan of maximizing my privacy , I would find such a tool useful just for auditing the effectiveness of my standard cleanup procedures .
You do n't need to break the law to have an interest in others not seeing what you do with your computer .
Whether making sure you have n't left personal financial information unencrypted on your machine , or have accidentally clicked " yes " to have your browser remember your passwords , or simply your taste in porn stars... All legal , yet things you probably would rather not leave lying around for anyone other than yourself .
Now , aside from that , do n't forget that police exist to help prosecute cases , not to protect us or find the guilty party or any fluffy BS like that .
Once they have you in their sights , the less they can dig up , the better .
" Good news - Your alibi checked out , you did n't kill that girl .
Bad news - Your computer proves that you played poker online once last year , enjoy your 2 + year federal sentence " .
And hey , who better to know where Windows leaks information than Microsoft itself ?
Not that I would trust them as my sole source of privacy maintenance , but as I said , for auditing " best practices " , such a tool would appear fairly useful .</tokentext>
<sentencetext>It's a bit short-sighted to say that nobody does.
I'm sure there are lots of people
out there with material on their machines that they wouldn't want a law enforcement
officer to find.
This tool would be perfect for their needs.
As a fan of maximizing my privacy, I would find such a tool useful just for auditing the
effectiveness of my standard cleanup procedures.
You don't need to break the law to have an interest in others not seeing what you do with
your computer.
Whether making sure you haven't left personal financial information unencrypted
on your machine, or have accidentally clicked "yes" to have your browser remember your
passwords, or simply your taste in porn stars... All legal, yet things you probably would
rather not leave lying around for anyone other than yourself.
Now, aside from that, don't forget that police exist to help prosecute cases, not to protect us
or find the guilty party or any fluffy BS like that.
Once they have you in their sights, the less
they can dig up, the better.
"Good news - Your alibi checked out, you didn't kill that girl.
Bad
news - Your computer proves that you played poker online once last year, enjoy your 2+ year federal
sentence".
And hey, who better to know where Windows leaks information than Microsoft itself?
Not
that I would trust them as my sole source of privacy maintenance, but as I said,
for auditing "best practices", such a tool would appear fairly useful.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030280</id>
	<title>Re:on a live computer system?</title>
	<author>syncrotic</author>
	<datestamp>1257761460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Mercury tiltswitch from a thermostat + relay. Cuts the power if anyone tries to move your box. It wouldn't be hard to wire it such that it sends mains voltage to your hard drives instead, but I stopped short of that because I was just doing it for fun and didn't want an accidental kick to the tower to destroy all of my data.</p></htmltext>
<tokenext>Mercury tiltswitch from a thermostat + relay .
Cuts the power if anyone tries to move your box .
It would n't be hard to wire it such that it sends mains voltage to your hard drives instead , but I stopped short of that because I was just doing it for fun and did n't want an accidental kick to the tower to destroy all of my data .</tokentext>
<sentencetext>Mercury tiltswitch from a thermostat + relay.
Cuts the power if anyone tries to move your box.
It wouldn't be hard to wire it such that it sends mains voltage to your hard drives instead, but I stopped short of that because I was just doing it for fun and didn't want an accidental kick to the tower to destroy all of my data.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023410</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024914</id>
	<title>Not totally useless...</title>
	<author>ponraul</author>
	<datestamp>1257673380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It could be a boon for counter-forensics; it wouldn't be that hard to make a root-kit that either doesn't allow COFEE to run or returns bogus information from system calls when COFEE is running.</p></htmltext>
<tokenext>It could be a boon for counter-forensics ; it would n't be that hard to make a root-kit that either does n't allow COFEE to run or returns bogus information from system calls when COFEE is running .</tokentext>
<sentencetext>It could be a boon for counter-forensics; it wouldn't be that hard to make a root-kit that either doesn't allow COFEE to run or returns bogus information from system calls when COFEE is running.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023550</id>
	<title>Re:Not having seen the app, but</title>
	<author>Anonymous</author>
	<datestamp>1257706740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Ah. Sweet memories of beautiful downtown Clynco. Does the Mean Green Machine still train there?</p></htmltext>
<tokenext>Ah .
Sweet memories of beautiful downtown Clynco .
Does the Mean Green Machine still train there ?</tokentext>
<sentencetext>Ah.
Sweet memories of beautiful downtown Clynco.
Does the Mean Green Machine still train there?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021384</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030060</id>
	<title>Re:</title>
	<author>clint999</author>
	<datestamp>1257759000000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><b>heh heh heh butthole heh heh heh heh heh</b></htmltext>
<tokenext>heh heh heh butthole heh heh heh heh heh</tokentext>
<sentencetext>heh heh heh butthole heh heh heh heh heh</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021322</id>
	<title>But</title>
	<author>Anonymous</author>
	<datestamp>1257692880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I still don't understand what it does.</p></htmltext>
<tokenext>I still do n't understand what it does .</tokentext>
<sentencetext>I still don't understand what it does.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022082</id>
	<title>Re:The Solution? HURD!</title>
	<author>Dogtanian</author>
	<datestamp>1257698040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Do you have nefarious stuff you'd rather not have leaked? Warez or other secret stuff you'd rather keep hidden? The solution? Don't run Windows, run HURD! As added bonus, there's no viruses, no nasties that'll install on your system.</p></div><p>Are you fucking serious?! The HURD has been in development for almost 20 years, still isn't properly finished, and I've never heard of any software for it, aside (I assume) from the GNU stuff that forms the basis of any Linux distro anyway.<br> <br>
The HURD has likely missed the boat anyway, Linux drove it away years ago.</p></div>
	</htmltext>
<tokenext>Do you have nefarious stuff you 'd rather not have leaked ?
Warez or other secret stuff you 'd rather keep hidden ?
The solution ?
Do n't run Windows , run HURD !
As added bonus , there 's no viruses , no nasties that 'll install on your system.Are you fucking serious ? !
The HURD has been in development for almost 20 years , still is n't properly finished , and I 've never heard of any software for it , aside ( I assume ) from the GNU stuff that forms the basis of any Linux distro anyway .
The HURD has likely missed the boat anyway , Linux drove it away years ago .</tokentext>
<sentencetext>Do you have nefarious stuff you'd rather not have leaked?
Warez or other secret stuff you'd rather keep hidden?
The solution?
Don't run Windows, run HURD!
As added bonus, there's no viruses, no nasties that'll install on your system.Are you fucking serious?!
The HURD has been in development for almost 20 years, still isn't properly finished, and I've never heard of any software for it, aside (I assume) from the GNU stuff that forms the basis of any Linux distro anyway.
The HURD has likely missed the boat anyway, Linux drove it away years ago.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025684</id>
	<title>Re:Yes, but does it run Gnu/Linux on Alpha and oth</title>
	<author>PrimaryConsult</author>
	<datestamp>1257678900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Methinks you did not read the first line:<p><div class="quote"><p>As having known a person who had their house raided by the Calgary Police (many times) and their computers stolen <b>as a result of their former employer making false claims</b>, the tool is as useful as the Calgary Police Computer Tech Team (or whatever they are called today).</p></div><p>"Many times" probably occurred due to not finding anything, and said employer continuing to insist there was.</p></div>
	</htmltext>
<tokenext>Methinks you did not read the first line : As having known a person who had their house raided by the Calgary Police ( many times ) and their computers stolen as a result of their former employer making false claims , the tool is as useful as the Calgary Police Computer Tech Team ( or whatever they are called today ) .
" Many times " probably occurred due to not finding anything , and said employer continuing to insist there was .</tokentext>
<sentencetext>Methinks you did not read the first line:As having known a person who had their house raided by the Calgary Police (many times) and their computers stolen as a result of their former employer making false claims, the tool is as useful as the Calgary Police Computer Tech Team (or whatever they are called today).
"Many times" probably occurred due to not finding anything, and said employer continuing to insist there was.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024696</id>
	<title>Re:Yes, but does it run Gnu/Linux on Alpha and oth</title>
	<author>slamb</author>
	<datestamp>1257672120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>That this person's home was raided on several occasions is probable cause for suspicion in my mind.</p></div></blockquote><p>That's the nasty sort of positive feedback loop from which an innocent person, once trapped, can never escape. The burden of proof should grow each time, not shrink, to prevent police harassment.</p></div>
	</htmltext>
<tokenext>That this person 's home was raided on several occasions is probable cause for suspicion in my mind.That 's the nasty sort of positive feedback loop from which an innocent person , once trapped , can never escape .
The burden of proof should grow each time , not shrink , to prevent police harassment .</tokentext>
<sentencetext>That this person's home was raided on several occasions is probable cause for suspicion in my mind.That's the nasty sort of positive feedback loop from which an innocent person, once trapped, can never escape.
The burden of proof should grow each time, not shrink, to prevent police harassment.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022970</id>
	<title>What about locking your computer?</title>
	<author>Myria</author>
	<datestamp>1257703200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Would this utility be useless if you lock your computer when you get up from it?  If so, the criminally-minded among us should do that.</p><p>If it works even with the computer locked, it implies a Microsoft back door into Windows.  I doubt this.</p></htmltext>
<tokenext>Would this utility be useless if you lock your computer when you get up from it ?
If so , the criminally-minded among us should do that.If it works even with the computer locked , it implies a Microsoft back door into Windows .
I doubt this .</tokentext>
<sentencetext>Would this utility be useless if you lock your computer when you get up from it?
If so, the criminally-minded among us should do that.If it works even with the computer locked, it implies a Microsoft back door into Windows.
I doubt this.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076</id>
	<title>Re:Yes, but does it run Gnu/Linux on Alpha and oth</title>
	<author>Anonymous</author>
	<datestamp>1257703980000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><p>You Ingrish not good!</p><p>You rant on about your acquaintance's property being stolen and destroyed by evil policemen and suggest that it was for no valid reason.</p><p>Let me restate what you said in a more intelligible fashion.</p><p>Calgary police officers, who had proven sufficient probable cause to acquire a search warrant, served said warrant and confiscated various materials listed on the warrant for further investigation and evidence.</p><p>After a six month investigation, the materials were returned to the owner and no charges were filed.</p><p>So, they did not steal anything. They followed legal procedures and gave back all of the confiscated materials at the conclusion of the investigation.</p><p>There may indeed have been damage to the confiscated property but, since you already destroyed your credibility with slanderous allegations of stealing, I'm less willing to believe that there was as much damage as you stated, let alone the intentional vandalism that you asserted.</p><p>While I generally choose to believe that a person is innocent until proven guilty, I'd also like to point out that no, or dropped, charges does not prove innocence.</p><p>That this person's home was raided on several occasions is probable cause for suspicion in my mind.</p></htmltext>
<tokenext>You Ingrish not good ! You rant on about your acquaintance 's property being stolen and destroyed by evil policemen and suggest that it was for no valid reason.Let me restate what you said in a more intelligible fashion.Calgary police officers , who had proven sufficient probable cause to acquire a search warrant , served said warrant and confiscated various materials listed on the warrant for further investigation and evidence.After a six month investigation , the materials were returned to the owner and no charges were filed.So , they did not steal anything .
They followed legal procedures and gave back all of the confiscated materials at the conclusion of the investigation.There may indeed have been damage to the confiscated property but , since you already destroyed your credibility with slanderous allegations of stealing , I 'm less willing to believe that there was as much damage as you stated , let alone the intentional vandalism that you asserted.While I generally choose to believe that a person is innocent until proven guilty , I 'd also like to point out that no , or dropped , charges does not prove innocence.That this person 's home was raided on several occasions is probable cause for suspicion in my mind .</tokentext>
<sentencetext>You Ingrish not good!You rant on about your acquaintance's property being stolen and destroyed by evil policemen and suggest that it was for no valid reason.Let me restate what you said in a more intelligible fashion.Calgary police officers, who had proven sufficient probable cause to acquire a search warrant, served said warrant and confiscated various materials listed on the warrant for further investigation and evidence.After a six month investigation, the materials were returned to the owner and no charges were filed.So, they did not steal anything.
They followed legal procedures and gave back all of the confiscated materials at the conclusion of the investigation.There may indeed have been damage to the confiscated property but, since you already destroyed your credibility with slanderous allegations of stealing, I'm less willing to believe that there was as much damage as you stated, let alone the intentional vandalism that you asserted.While I generally choose to believe that a person is innocent until proven guilty, I'd also like to point out that no, or dropped, charges does not prove innocence.That this person's home was raided on several occasions is probable cause for suspicion in my mind.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022614</id>
	<title>Hmm... I wonder</title>
	<author>Sfing\_ter</author>
	<datestamp>1257701400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I wonder... does cofee have a java component?<br>Can Cofee check my Kaffeine history?</p></htmltext>
<tokenext>I wonder... does cofee have a java component ? Can Cofee check my Kaffeine history ?</tokentext>
<sentencetext>I wonder... does cofee have a java component?Can Cofee check my Kaffeine history?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021628</id>
	<title>Bloody DUH</title>
	<author>Shoten</author>
	<datestamp>1257694920000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>Well, of course it's useless to most of them...but that has nothing to do with whether or not COFEE is any good.  Let's face it; how many casual downloaders are going to need a forensics toolkit?  They already have access to all of their own files, and already know what they've been doing with their system.  And COFEE is not meant to be a "point and shoot" system; it's really meant for professionals that know what they're looking for to some degree.  So getting a copy and using it doesn't instantly give you some insight into how computer forensics work.</p></htmltext>
<tokenext>Well , of course it 's useless to most of them...but that has nothing to do with whether or not COFEE is any good .
Let 's face it ; how many casual downloaders are going to need a forensics toolkit ?
They already have access to all of their own files , and already know what they 've been doing with their system .
And COFEE is not meant to be a " point and shoot " system ; it 's really meant for professionals that know what they 're looking for to some degree .
So getting a copy and using it does n't instantly give you some insight into how computer forensics work .</tokentext>
<sentencetext>Well, of course it's useless to most of them...but that has nothing to do with whether or not COFEE is any good.
Let's face it; how many casual downloaders are going to need a forensics toolkit?
They already have access to all of their own files, and already know what they've been doing with their system.
And COFEE is not meant to be a "point and shoot" system; it's really meant for professionals that know what they're looking for to some degree.
So getting a copy and using it doesn't instantly give you some insight into how computer forensics work.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029036</id>
	<title>Re:on a live computer system?</title>
	<author>Anonymous</author>
	<datestamp>1257703740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://xkcd.com/538/" title="xkcd.com" rel="nofollow">Obligatory xkcd</a> [xkcd.com]</htmltext>
<tokenext>Obligatory xkcd [ xkcd.com ]</tokentext>
<sentencetext>Obligatory xkcd [xkcd.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022758</id>
	<title>What's the big deal?</title>
	<author>Anonymous</author>
	<datestamp>1257702180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I don't see why this is a big deal.  If this were ever used to produce evidence to be used at trial in an actual criminal case, they would have to share that info with the defense.  So I'm not sure what the big secret is.</p></htmltext>
<tokenext>I do n't see why this is a big deal .
If this were ever used to produce evidence to be used at trial in an actual criminal case , they would have to share that info with the defense .
So I 'm not sure what the big secret is .</tokentext>
<sentencetext>I don't see why this is a big deal.
If this were ever used to produce evidence to be used at trial in an actual criminal case, they would have to share that info with the defense.
So I'm not sure what the big secret is.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024256</id>
	<title>Re:The Solution? HURD!</title>
	<author>SLi</author>
	<datestamp>1257712260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Maybe. Except things like Firewire (and some USB controllers) allow a device to read all the memory, so they are practically operating system agnostic. They can just grab a live memory image of your Hurd running, which will contain the hard drive crypto key (the only really interesting piece of information I can think of, if your HDD is not encrypted, you don't have much privacy anyway).</p></htmltext>
<tokenext>Maybe .
Except things like Firewire ( and some USB controllers ) allow a device to read all the memory , so they are practically operating system agnostic .
They can just grab a live memory image of your Hurd running , which will contain the hard drive crypto key ( the only really interesting piece of information I can think of , if your HDD is not encrypted , you do n't have much privacy anyway ) .</tokentext>
<sentencetext>Maybe.
Except things like Firewire (and some USB controllers) allow a device to read all the memory, so they are practically operating system agnostic.
They can just grab a live memory image of your Hurd running, which will contain the hard drive crypto key (the only really interesting piece of information I can think of, if your HDD is not encrypted, you don't have much privacy anyway).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022734</id>
	<title>Re:While I don't have any use for the program</title>
	<author>blueg3</author>
	<datestamp>1257702000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>COFEE is a live-response tool. It's by no means sufficient to audit the effectiveness of your cleanup procedures.</p></htmltext>
<tokenext>COFEE is a live-response tool .
It 's by no means sufficient to audit the effectiveness of your cleanup procedures .</tokentext>
<sentencetext>COFEE is a live-response tool.
It's by no means sufficient to audit the effectiveness of your cleanup procedures.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021660</id>
	<title>"COFEE is 100 percent useless to you"</title>
	<author>thomasdz</author>
	<datestamp>1257695040000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>with that ringing endorsement and the spelling that looks annoying like "coffee", but not quite... I didn't even read TFA<br>I'm not even sure why I'm even commenting.<br>This is kinda like the message you occasionally see on Slashdot for idle.slashdot.org  "don't go there"</p></htmltext>
<tokenext>with that ringing endorsement and the spelling that looks annoying like " coffee " , but not quite... I did n't even read TFAI 'm not even sure why I 'm even commenting.This is kinda like the message you occasionally see on Slashdot for idle.slashdot.org " do n't go there "</tokentext>
<sentencetext>with that ringing endorsement and the spelling that looks annoying like "coffee", but not quite... I didn't even read TFAI'm not even sure why I'm even commenting.This is kinda like the message you occasionally see on Slashdot for idle.slashdot.org  "don't go there"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023808</id>
	<title>MS using Suckers^h^h^h^h Customers</title>
	<author>Anonymous</author>
	<datestamp>1257708540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Is it just me or is there something intrinsically wrong with a company that has a history of, how do I put this delicately so the fanboys don't mod me down, security "challenges" to release a free tool that has its express purpose of cracking the operating system that was purchased seemingly in good faith from said company in the first place?</p><p>

My head *aspload*</p><p>

PT Barnum must have had MS customers in mind when he made his famous quote.  Guess I'll just keep using Linux.</p></div>
	</htmltext>
<tokenext>Is it just me or is there something intrinsically wrong with a company that has a history of , how do I put this delicately so the fanboys do n't mod me down , security " challenges " to release a free tool that has its express purpose of cracking the operating system that was purchased seemingly in good faith from said company in the first place ?
My head * aspload * PT Barnum must have had MS customers in mind when he made his famous quote .
Guess I 'll just keep using Linux .</tokentext>
<sentencetext>Is it just me or is there something intrinsically wrong with a company that has a history of, how do I put this delicately so the fanboys don't mod me down, security "challenges" to release a free tool that has its express purpose of cracking the operating system that was purchased seemingly in good faith from said company in the first place?
My head *aspload*

PT Barnum must have had MS customers in mind when he made his famous quote.
Guess I'll just keep using Linux.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024594</id>
	<title>Off-chance?</title>
	<author>Anonymous</author>
	<datestamp>1257671520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>on the off-chance you need to put Dave Meltzer's face on Brett Hart's body as part of a message board thread.</p></div></blockquote><p>That happens to me ALL THE TIME!</p></div>
	</htmltext>
<tokenext>on the off-chance you need to put Dave Meltzer 's face on Brett Hart 's body as part of a message board thread.That happens to me ALL THE TIME !</tokentext>
<sentencetext>on the off-chance you need to put Dave Meltzer's face on Brett Hart's body as part of a message board thread.That happens to me ALL THE TIME!
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374</id>
	<title>on a live computer system?</title>
	<author>nurb432</author>
	<datestamp>1257693360000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>So, don't run windows, encrypt your drive with hidden partitions and turn the thing off when the cops arrive.</p></htmltext>
<tokenext>So , do n't run windows , encrypt your drive with hidden partitions and turn the thing off when the cops arrive .</tokentext>
<sentencetext>So, don't run windows, encrypt your drive with hidden partitions and turn the thing off when the cops arrive.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023720</id>
	<title>Re:I like TEA</title>
	<author>CarpetShark</author>
	<datestamp>1257708000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I don't know about talking to her or putting cream in her mug, but if you look through the comments below, you can get a pic at  12k resolution for ~&pound;700.  Once you've seen her skin magnified that much, you'll likely be cured of any interest you once had<nobr> <wbr></nobr>;)</p></htmltext>
<tokenext>I do n't know about talking to her or putting cream in her mug , but if you look through the comments below , you can get a pic at 12k resolution for ~   700 .
Once you 've seen her skin magnified that much , you 'll likely be cured of any interest you once had ; )</tokentext>
<sentencetext>I don't know about talking to her or putting cream in her mug, but if you look through the comments below, you can get a pic at  12k resolution for ~£700.
Once you've seen her skin magnified that much, you'll likely be cured of any interest you once had ;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025078</id>
	<title>You can find EnCase on TPB also</title>
	<author>Kernel Kurtz</author>
	<datestamp>1257674520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Probably a lot more law enforcement agencies use that than COFEE.</htmltext>
<tokenext>Probably a lot more law enforcement agencies use that than COFEE .</tokentext>
<sentencetext>Probably a lot more law enforcement agencies use that than COFEE.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30031842</id>
	<title>Re:While I don't have any use for the program</title>
	<author>AmiMoJo</author>
	<datestamp>1257777840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What I'd like to know is does this thing work with autorun disabled? Say your PC booted up but locked, will this thing be able to access the data on it?</p><p>It's important because if it can then is bypasses the usual autorun mechanism, which as a security precaution I leave disabled and which Vista/7 put up UAC prompts for. I already disabled by Firewire port because that can be used to access the computer's RAM via DMA without any user interaction.</p></htmltext>
<tokenext>What I 'd like to know is does this thing work with autorun disabled ?
Say your PC booted up but locked , will this thing be able to access the data on it ? It 's important because if it can then is bypasses the usual autorun mechanism , which as a security precaution I leave disabled and which Vista/7 put up UAC prompts for .
I already disabled by Firewire port because that can be used to access the computer 's RAM via DMA without any user interaction .</tokentext>
<sentencetext>What I'd like to know is does this thing work with autorun disabled?
Say your PC booted up but locked, will this thing be able to access the data on it?It's important because if it can then is bypasses the usual autorun mechanism, which as a security precaution I leave disabled and which Vista/7 put up UAC prompts for.
I already disabled by Firewire port because that can be used to access the computer's RAM via DMA without any user interaction.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022178</id>
	<title>I am betting that it includes OSS code</title>
	<author>Anonymous</author>
	<datestamp>1257698700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>More likely than not, MS has included code from one of the many OSS tools out there for doing this. I would also guess that it borrows from some virus.</htmltext>
<tokenext>More likely than not , MS has included code from one of the many OSS tools out there for doing this .
I would also guess that it borrows from some virus .</tokentext>
<sentencetext>More likely than not, MS has included code from one of the many OSS tools out there for doing this.
I would also guess that it borrows from some virus.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023186</id>
	<title>Re:While I don't have any use for the program</title>
	<author>Anonymous</author>
	<datestamp>1257704700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>TrueCrypt would be perfect for their needs.</htmltext>
<tokenext>TrueCrypt would be perfect for their needs .</tokentext>
<sentencetext>TrueCrypt would be perfect for their needs.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030712</id>
	<title>Linux!</title>
	<author>cpscotti</author>
	<datestamp>1257766680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>F.A.Q. zero: <br>
Does it work on linux?</htmltext>
<tokenext>F.A.Q .
zero : Does it work on linux ?</tokentext>
<sentencetext>F.A.Q.
zero: 
Does it work on linux?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024724</id>
	<title>Re:MS using Suckers^h^h^h^h Customers</title>
	<author>Savior\_on\_a\_Stick</author>
	<datestamp>1257672240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>You're safe - no one wastes mod points on an AC.</p></htmltext>
<tokenext>You 're safe - no one wastes mod points on an AC .</tokentext>
<sentencetext>You're safe - no one wastes mod points on an AC.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023808</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021974
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030280
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023410
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029650
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30026464
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022734
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024256
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025684
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022662
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029432
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30045246
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023322
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023550
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021384
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023720
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024710
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024696
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021770
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021502
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024724
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023808
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029036
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021696
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023186
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30028496
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023048
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30031842
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024100
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022082
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025084
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30032508
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022780
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021476
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030682
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_08_1340208_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024900
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021322
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025078
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021402
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023720
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021696
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021322
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024900
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022970
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021438
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024710
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30032508
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023322
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30045246
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023808
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024724
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021502
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021770
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021554
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024256
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023048
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30028496
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022082
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024100
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022662
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022718
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021384
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023550
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021374
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023410
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030280
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025084
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029036
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021476
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022780
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022694
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023076
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024696
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30025684
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30024914
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_08_1340208.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021324
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021806
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30026464
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029650
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30031842
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30022734
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30029432
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30023186
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30030682
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_08_1340208.30021974
</commentlist>
</conversation>
