1.
http://www.foxite.com/archives/0000052074.htm 2.
http://www.foxite.com/archives/0000052081.htm 3.
http://www.foxite.com/archives/0000052093.htm On February 5, 2004, she does ask how to get on an outside site. If you follow that thread you will see that her friends have a lot of questions as to why she wants to do that. She tends to be cryptic such talking about R's and D's. It is really weird and why is locating records?
http://www.foxite.com/archives/0000034923.htm Subject: "Admin" VFP Program to run 2 other VFP Programs
>From: Cheryl Bellucci
>Category: Projects & Design Xenia, United States
>Version: Visual FoxPro 6 Date: April 28, 2004
>
>Is it possible to have a VFP program that "runs" 2 other VFP
>programs and monitors a stat log file to generate log messages
>at the same time?
>
>That is, I have 2 VFP processes that are currently running. I
>do not want to merge them into one program because the entire
>process runs faster if these two programs run concurrently. I
>would like a third program that would display the forms from
>the 2 processes along with a status window that would display
>messages from the other two programs. (That part is not a
>problem, it would just have to monitor a status table.)
>
>As an alternative, is there a way to "attach" the forms of the
>3 programs so that it looks like one program? If this can't be
>done, not a big problem... I would just like to be able to
>start up one program that administrates the other two so that
>users don't have to worry about different screens.
>
>Thanks!
>Cheryl A Bellucci
>TRIAD GOVERNMENTAL SYSTEMS, INC
What it sounds like to be is she is trying to ask if you can combine 3 programs or 2 others into 1 program. Hence making it look as though it's just one program.
Saltman: An important procedure to assure system intergrity is to isolate vote tallying and support software from infulences over which the election admin (who ever has those rights on the pc) has no control.
After all software to be used together has been certified(they require all software be checked and certifed by state law, mainly make sure it tallies "correctly") It should be maintained separatley under the control of the election admin and not used togeter with uncertified software. It is strongly recommended that certified vote-tallying software NOT be allowed to run on a multiprogrammed general purpose computer (say the dell 486) on which uncertified support software or applications are also being run.
Subject: How does LOCK() work? From: Cheryl Bellucci
Category: General Xenia, United States
Version: Visual FoxPro 6 Date: October 30, 2003
How does LOCK() work if one application uses LOCK(), but another application (using the same tables) does not use LOCK()? I've got a problem where I'm storing a number that needs to be unique in one table. Once someone needs the "next" number, it looks up the current, adds 1 to it, then replaces it. The ADD function in my software actually LOCKS() the table, gets the number, updates the table, then UNLOCKs the table.
I'm getting duplicate numbers, and we're thinking it is the DELETE function in the application. If the number to be deleted matches the current number in the master list, it will decrement that number to be picked up by the next ADD. I've not added any LOCK functions in this part.
If one part of the application uses LOCK, but the other doesn't... yet there are multiple users bombarding (adding/updating/deleting) the tables at the same time, could this be where my duplicates are coming from?
Cheryl A Bellucci
TRIAD GOVERNMENTAL SYSTEMS, INC
>
http://www.democraticunderground.com/discuss/duboard.ph... Thanks! I agree with most of the points made in this post, though a few of them don't go far enough. If, for example, the tabulator is running MSDOS, it is almost certain that it wasn't attached to an eithernet or the internet. MSDOS TCP/IP stacks are a #%@! to get or keep working. I know of some people at Novell who did it, and there was a university that lasted less than a semester IIRC, but I've never heard of anyone who had it working in a production environment, nor anyone who got it set up with a guru to DOS box ratio less than one. To put it in further perspective: it is my understanding that Microsoft (the people who _wrote_ MSDOS) was never able to get a TCP/IP stack working under DOS.
As a consequence, I think it's unlikely that the FoxPro program for accessing the Access database was run on the machine in question, which makes me further question its significance.
The points about "un-rigging" are also sound. They also point the way to our best hope of getting to the bottom of this. If there was machine hacking, the traces of it should still be there; impounding _all_ the machines and getting someone with forensic experience (or even better, lots of someones) going over them with fine tooth combs should show us what's up. If anything is found, evidence such as the questions on web forums may well help prove _who_ did it.
But I fear there are too many posibilities for them to lead us to the what.