Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 03 Issue 29

  



Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.29 (AUGUST 9, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Say Goodbye to FOIA?
Subject: File 3--Hackers Challenged to Break In
Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson
Subject: File 5--text of chron-spacemail
Subject: File 6--Reply to Gene Spafford
Subject: File 7--Estimates on virus activity
Subject: File 8--Research Analysis
Subject: File 9--comp.patents, misc.legal.computing and misc.int-property

Administratia:

ARCHIVIST: BRENDAN KEHOE
RESIDENT CONVALESCENT: BOB KUSUMOTO
ULTRA-SCANMEISTER: BOB KRAUSE

CuD is available via electronic mail at no cost. Printed copies are
available by subscription. Single copies are available for the costs
of reproduction and mailing.

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu,
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: August 9, 1991
From: "The Moderators" <tk0jut2@mvs.cso.niu.edu>
Subject: Moderators' Corner

+++++++++++++
LEN ROSE ADDRESS
+++++++++++++

For those who missed the last blurb, Len Rose has begun his sojourn in
a Level-1 federal institution in North Carolina. He reports that the
hardest part of incarceration is the separation from wife and children
(it's a long way from Naperville, Ill., to Goldsboro, N.C.), and the
intense loneliness of the first few weeks. He is assigned to menial
labor, and spends his "leisure" time playing cards, writing letters,
and trying to cope with his new environment. He *does not* have a
computer or a typewriter.

Prisons should be the stop of last resort for violent predators or for
those who demonstrate pattern of career criminality. Nothing is
served by imprisoning Len or others like him. Why not drop him a
humorous postcard just to say "hi?"

Sheldon Zenner will continue to serve as as a conduit for funds send
to help Len's family. Checks made out to Len Rose or money orders
(*no cash*) may be sent to:

Sheldon T. Zenner
RE: Len Rose
Katten, Muchin, and Zavis
525 West Monroe Street (Suite 1600)
Chicago, IL 60606-3693

Len's address for those who've missed it:

Len Rose (27154-037)
FPC
Seymour Johnson AFB
Caller Box 8004
PMB 187
Goldsboro, NC 27531-5000

+++++++++++++
'Zines
+++++++++++++

The latest MONDO has been out, and from all accounts is first-rate.
Info on ordering can be obtained from RUSIRIOUS@WELL.SF.CA.US

INTERTEK (Summer, '91) also is lookin' good. Of special interest are
the pieces by EFF's John Gilmore on "Preserving Privacy in America"
and the interview with sci-fi author Bruce Sterling. The snippets of
news and reviews cover the new-hitek gamut, and where else could you
find a financial report that includes street prices of computers *and*
drugs? (The price of cocaine is down 25 pct--so much for the war on
drugs).

+++++++++
FTP SITE INFO
+++++++++

The U of Chicago ftp site address as changed:

The machine is now offically known as chsun1.spc.uchicago.edu although
chsun1.uchicago.edu is a valid alias. The ip address is 128.135.252.7
The archivist, Bob Kusumoto, will be unavailable for a few weeks while
recovering from a sports injury, so don't send email to him for
awhile. He should be able to throw the bull...uh, ball....with his
previous velocity.

A number of new files have been added, mostly 'zines, academic, and
legal papers. Bill Cook's opening statement in the Craig Neidorf trial
is also up.

------------------------------

Date: Sat, 27 Jul 91 09:56 EST
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
Subject: Say Goodbye to FOIA?

GRID News. ISSN 1054-9315. vol 2 nu 19e (Bitnet) July 26, 1991.
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
+++++++++++++++++++++
LIBRARIANS SUPPORT NREN, DECLINE TRIBE AMENDMENT;
CALLS FOR ACCESS TO INFORMATION FAIL
(c) Copyright 1991 by Michael E. Marotta

(86 lines) The White House Conference on Library and Information
Services was conceived in 1957 by Channing Bete, a library trustee
from Greenfield, Massachusetts. Lyndon Johnson created the National
Advisory Commission on Libraries in 1965. In 1974 Gerald Ford
authorized the first White House Conference on Library and Information
Systems which was convened in 1979 under Jimmy Carter. The second
WHCLIS opened on July 9, 1991.

On July 10, WHCLIS was address by three representitives from the White
House. Barbara Bush, Marilyn Quayle and George Bush said that
libraries are really very important. Support from the White House is
based on the historically pro-active nature of the 65 conferences that
have been called since 1908 when Roosevelt ordered two to discuss
Conservation and Children. The general tendency is for various
advocacy groups to arrange acceptable wording for their agendas. The
conference passes these and up to 80% are incorporated into laws.

Productivity, Literacy and Democracy defined WHCLIS when it was first
announced. In Michigan, we began meeting in 1989, to discuss
censorship, technology, special services, funding and literacy.
Michigan's library supporters gave much thought to literacy across
generations and technologies beyond books. By 1991, we drafted 15
proposals in the format recommended by the national leaders.

For instance, the issue statement for CENSORSHIP was: "A variety of
impediments censor or restrict open access to information."
Background material, questions for discussion and paths for solution
were outlined. Two specific recommendations were developed: "Federal
legislation is needed to mandate open access to public information";
and "Federal legislation is needed to mandate protection of patron
privacy." These were followed by implementation strategies and
recommended programs. Finally, the impact on LITERACY, DEMOCRACY and
PRODUCTIVITY were identified.

WHCLIS delegates (and alterates) assembled according to nine issue
areas: Access, Governance, Marketing, National Information Policy,
Networking, Personnel, Preservation, Services, Technology and
Training. These plenaries were divided into subgroups to facilitate
discussion. Within a plenary, each subgroup received the same set of
issues and recommendations. These were discussed and editorial
suggestions were forwarded. This went on for two days. Then it was
repeated in the plenary sessions. These final recommendations were
voted on by the entire conference on the last day.

These were among the recommendations which were approved by the entire
WHCLIS body: (1) "Establish an office within the US Department of
Education responsible for providing leadership to school library media
programs across the nation." (2) "Congress shall enact legislation
creating and funding the National Research and Education Network that
will serve an information super-highway and will allow educational
institutions, including libraries, to capitalize on the advantages of
technology for resource sharing and the creation and exchange of
information."

The second WHCLIS opened on July 9, 1991. In all, over 120 calls for
federal funding were approved. Of the major recommendations, only one
was defeated: "Congress and the states shall recognize the right of
the American public to access works of all authors, artists, scholars,
politicians and other public figures." Another call for open access,
farther down the list, was also defeated.


In addition to the officially sanctioned recommendations, eleven
petitions made their way to the agenda. A call for the funding of
special literacy programs targeted to African-Americans was accepted.
A similar proposal to fund Native American libraries was defeated.


On Saturday, July 13, 1991, the White House Conference on Libraries
and Information Systems (WHCLIS) gave its overwhelming support to the
Nation Research and Education Network (NREN). NREN is said to be a
multi-gigabit-per-second fiber optic network that will link 1,000
colleges and other facilities. When proposed to the WHCLIS
conference, NREN came to the floor with endorsements from over 200
delegates. Speaking against the proposal, I was hissed and the chair
reprimanded the offenders.

Later, the 27th Amendment suggested by Dr. Lawrence Tribe was moved
for acceptance by Andrew Spano of New York. Feeling that the present
Bill of Rights is adequate, the delegates rejected the proposal.

(GRID News is FREQable from FidoNet 1:159/450, the Beam Rider BBS)

------------------------------

Date: 06 Aug 91 19:29:34 EDT
From: "m.lolich%briggs.stad@mich.al"
Subject: Hackers Challenged to Break In

Company Dares Computer Intruders to Hack Away
(From The Detroit News, Sunday, Aug. 4, p. 3A).

It's a little like inviting robbers to knock over your bank.

To prove its computer programs are secure from electronic intruders,
Unix System Laboratories wants hackers to try to break in.

The company set up an unattended test computer at its headquarters in
Summit, N.J., and bets that unauthorized users can't get into its mock
payroll accounts, can't cut phony checks and can't breach private
files.

Initially, the challenge was issued to corporate security experts--and
none has been able to sneak in during the past few months, said
spokesman D. Scott Belin. Now, in a bold publicity stunt, the company
will offer a toll-free phone number to let any whiz kid or mischief
maker log onto a computer and hack away.

"There's probably 10,000 computer hackers out there," Belin said.
"We're trying to figure out a way tohandle all the phone calls once we
make the number available."

He said the company, which makes a computer operating system widely
used by phone companies, has yet to decide how to publicize the
toll-free access number.

Marilyn Partel, an operating systems manager at the company, said the
software has been redesigned so that no one--even if authorized--has
unlimited access to the system.

%Moderator's note: We called D. Scott Belin, and he informed us that
challenge is not yet open to the general public. There are three pha
to the challenge. Beta SV5 was first released to source code customers
of 4.1 ES (Enhanced Security). The second phase, currently underway,
is to all UNIX SVR4 customers. The final phase, in which it will be
to the public, is still in planning stage, and they will release the
phone number as soon as all the kinks are worked out. User restrict
are built into the operating system. There will be regular user perm
and superuser permissions.sions. No single user will have
superuser permissions.

------------------------------

Date: August 9, 1991
From: Comp.org.eff.talk (usenet)
Subject: Reciprocity in Cyberspace, by Robert Jacobson

The following paper was prepared for the "Civilizing Cyberspace"
meeting on law and cyberspace hosted by the CPSR and ACLU (with
support from the EFF, I believe), to be held in Washington, DC, on
June 26-27, 1991.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Reciprocity in Cyberspace

Robert Jacobson
June 1991

Cyberspace is the term used to express the evolving and expanding
electronic/photonic/neuronic network of computers and similar
communication devices that encircles the globe. In cyberspace, one or
many persons can exchange ideas, in many forms, with correspondents
around the world. But despite the appearance of autonomous action
that such communications, on their face, might suggest, in fact
cyberspace is a designed medium -- and the designers' criteria may
differ substantially and significantly from the expectations of those
who travel cyberspace. In this short paper, I argue that the concept
of "reciprocity," which Webster's defines as "a mutual or cooperative
exchange of favors or priviliges," must become the rallying cry of
those who hold for personal and collective freedom in cyberspace.

An analogy can be suggested by air travel. One can plan to visit
anyplace, at any time, to conduct whatever business or take whatever
pleasure one has in mind. But in fact, one's plans are literally at
the mercy of those who build aircraft and those who operate them.
What appears at first to be a tremendous freedom, the ability to jet
off to distant realms, is in fact highly constrained by the offerings
of aircraft manufacturers and airlines. These purveyors of air travel
are organized into oligopolies and the operations of the individual
firms are largely determined by the formal and informal codes of the
oligopolies. Prices for travel, selection of destinations, and modes
of transport are less at the command of the traveller than of the
sellers of travel. These factors select who can travel by air, at
what time, and to where. The permutations of these factors can appear
manifold, but in fact there are a relatively few combinations and the
air traveler must accept them, buy his or her own plane, or take a
bus.

So it may be with cyberspace. Large entities, manufacturers of
computer and communications equipment, network operators, and
information-service vendors pretty well define the possibilities for
travelers in this new ether. It doesn't always appear so -- the rogue
traveler, whom some would call a bandit, makes his or her presence
known, or is revealed, to a wide public. This is the cracker/hacker
phenomenon, aided and abetted by the forces of law and order,
including the press, in the service of those who otherwise control the
means of telecomputing. We mistake the occasional lapse in the order
as a sign of freedom. But the lapse is very infrequent and usually
gets turned around, one way or another (as law or calls for "ethics")
into a defense of the order.

The notion that "interactivity," which simply means (again according
to Webster) "the ability to act on each other," somehow equates with
freedom is nonsense. I can interact with the U.S. government, Exxon,
or more to the point, an ATM terminal standing in for my bank, but no
one believes that our dealings are in any way equal or that I am
necessarily going to get a square deal. Moreover, if I am wronged, my
chances of righting that wrong are slim to none. It is an ill-founded
idea, too freely propagated on the nets and in the press, that
interactive media are also equitable media. As Vincent Mosco has
illustrated in The Pay-Per Society (Ablex, 1989), my interaction with
the electronic machinery of domination is act of submission.

In contrast, I would like to propose that _reciprocity_ is an
essential criterion that should be incorporated into cyberspace, and
the sooner the better. Reciprocity requires that not only can I
interact with and through the network, but that I be fully apprised of
the who operates the network and how it functions Q and that I, or we
(including my correspondents), be involved in its design and be able
to alter its workings.

I know this is a tall order in a social order that values (perhaps too
greatly) the role of the entrepreneur and the entrepreneur's
inheritor, the corporate manager, in making design decisions
unilaterally. Unilateral power to design, we are taught, fosters
originality and system alternatives. Autonomous decision making,
otherwise known as democracy, gets lip service in our schools but is
seldom acted on in the real world of economic and political power.
Those who enjoy the freedom to design for others seldom give it away.
The more enlightened among the owners may make token offerings of
involvement: they have learned that there is greater power (as, for
example, the Pacific Northwest Indian chief knew) in appearing to
surrender power in a way that ultimately buys compliance. But
genuinely sharing design responsibilities? This is a real threat to
the hegemony that determines our cyberspace possibilities, and the
owners of the means know it.

Still, this principal is one that the rest of us, who do not own the
networks and the technology (machinery and organization) behind the
networks, cannot cease to invoke. It is our one way out of a
technological trap that otherwise binds us tighter and tighter to the
prerogatives of the already powerful. If we have to sing the song, at
least let us write the lyrics.

------------------------------

Date: Wed, 7 Aug 91 20:11:05 CDT
From: edtjda@MAGIC322.CHRON.COM(Joe Abernathy)
Subject: text of chron-spacemail

Electronic mail beams shuttle's message home
8/5/91, Houston Chronicle, Page 1A

By JOE ABERNATHY and MARK CARREAU Copyright 1991, Houston Chronicle

Electronic mail networks, the message medium of the information age,
made their debut in the space age Sunday aboard the shuttle Atlantis
as part of an effort to develop a communications system for a future
space station.

Details of the test were being closely guarded because of concerns
over a possible hacker incident or "public free-for-all'' on the
nation's computer networks, according to one engineer involved with
the project. Privacy and medical ethics also loom large as issues.

Astronauts Shannon Lucid and James Adamson conducted the first
experiment with the e-mail system on Sunday afternoon, exchanging a
test message with Marcia Ivins, the shuttle communicator at Johnston
Space Center.

The connection flickered out of focus after only a few minutes because
of alignment problems with one of the satellites in the communications
link, according to the flight director at JSC.

The messages follow a winding path from the shuttle, to a satellite in
NASA's Tracking Data Relay Satellite System, to the main TDRSS ground
station in White Sands, New Mexico, back up to a commercial
communications satellite, then down to Houston, where they enter one
or more computer networks.

Further tests of the system will be conducted on each remaining day of
the flight, which continues through Sunday.

The shuttle tests are part of a larger project to develop computer and
communications systems for the space station Freedom, which the agency
plans to assemble during the late 1990s.

"These are all steps toward that goal, how we work in space,'' said
Byron Han of Apple Computer, whose machines are being used for this
stage of the experiment.

Electronic mail offers a new way for astronauts to stay in touch with
their families, Mission Control, and potentially, the millions of
people who use the nation's interlinked computer networks. It could
produce far-reaching change in the way scientists and others interact
with the space program.

Currently, only the shuttle communicator is allowed to talk with the
astronauts during a flight, except for a private medical conference
each day. E-mail could change that by letting any number of people
exchange information, while scientists and engineers on the ground
could assume direct control over their experiments in space.

One drawback is the potential for NASA to impose a virtual reign of
silence regarding sensitive information without anyone realizing that
such had been done.

E-mail, which is becoming commonplace in offices, is simply the
transmission of messages via computers to one or more people, using
electronic addresses. Users linked to the right networks can send
electronic messages or other data to specific recipients nearly
anywhere in the world ^-and now to space.

Han and fellow Apple employees Michael Silver and James Beninghaus
have donated their time to the project. They are using low-cost,
commercially available products, rather than the costly custom
products often used in science.

The e-mail will play a role in controlling experiments, electronic
flight information, and transfer of experiment results to the ground,
Han said, as well as sending data up to the shuttle.

In the future, the system might be used to transmit and manipulate
information from the many medical experiments NASA conducts. But this
raises a number of problems regarding privacy and medical ethics.

For example, one experiment in this flight seeks to correct a
blood-flow problem associated with weightlessness that causes some
astronauts to faint upon their return to Earth.

But this experiment is being monitored with the same Apple computer
that is playing host to the e-mail system. Even though the results
aren't being transmitted over computer networks this time, they might
be next time ^-and computer networks are notoriously insecure.

Inquisitive computer enthusiasts -- hackers -- are in fact one of
NASA's chief concerns in regard to the use of electronic mail.

The space agency initially sought to conduct the tests without
publicity, but word quickly percolated around the nation's computer
networks -- perhaps indicating that the concerns were justified.

A chorus of calls was heard requesting the e-mail address of the
astronauts -- but that raised another problem more pressing than any
threat from malicious hacking, that of capacity.

"We have things we need to accomplish with the limited amount of time
we have, and we do have a very limited amount of data we can move
between Mission Control and the orbiter,'' said Deborah Muratore, an
engineer in the space station support office at Johnson Space Center
and the experiment manager.

In addition to voice communication, the shuttles are equipped with
Teletype and fax machines for the transmission and reception of
printed material and even photo graphs.

"Conceivably, everything they move that way could be moved from
computer to computer,'' Muratore said. "From a space station
standpoint it would be much preferable to transfer the information
electronically without paper in the loop the way we do today on the
shuttle.''

"Paper is going to be a limited resource, something that has to be
thrown away or reused on the space station,'' she said. "It becomes
trash. So the more we can eliminate on the space station the better
off we are.''

The current experiment does not represent the first time that
civilians have had a direct communications link with those in space.
Since January, the Soviet space station Mir has maintained a "mail
drop'' for ham radio operators to use in leaving messages for the
cosmonauts.

"It's very similar'' in function, said Gary Morris, a former member of
the Johnson Space Center Amateur Radio Club who now lives in San
Diego. "The packet bulletin board system on Mir allows an amateur (ham
radio operator) on the ground to leave mail messages.

"What they're doing with the Mac is different in that they're going
through the whole (electronic mail) network. It's much more
complex.''

Sidebar:

Send mail to Atlantis

Computer users who presently have an electronic mail address of their
own can send electronic mail to the crew of the shuttle Atlantis.

The address to which your comments should be sent is:

atlantis@applelink.apple.com

If you don't understand how to use this address, ask the administrator
of your online system to explain the proce dure and etiquette for
sending Internet-style mail.

Because of concerns over security, privacy and capacity, NASA has not
revealed the specifics of the Atlantis e-mail experiment, but the
information leaked out on the nation's computer networks. The e-mail
address is being provided unofficially to accommodate the resulting
flurry of inquiries. Using it sends mail to an earthbound network,
not Atlantis itself, so capacity is not a concern.

It is not known whether the astronauts will read their electronic mail
while they are in space, or wait until they return.

Atlantis is commanded by Air Force Col. John Blaha. His crew includes
pilot Mike Baker, a Navy commander; flight engineer David Low;
biochemist Shannon Lucid; and Army Col. James Adamson.

Joe Abernathy

((Moderator's note: We send a message to the listed address and
have not yet received a response))

------------------------------

Date: Sun, 4 Aug 91 23:26:21 cdt
From: sjackson@TIC.COM(Steve Jackson)
Subject: Reply to Gene Spafford

I was sorry to see Gene Spafford's comments in CuD 3.24. Can anything
be more divisive, more likely to widen the gulf between the talented
outlaw and the rest of the electronic community, than to say that the
ex-cracker will NEVER be allowed to use his skills honestly? What
happened to "paying your debt" and re-entering society? Never mind
that some of these people have never been charged with any crime, let
alone convicted!

Spafford says that "to prefer confessed crackers over honorable
professionals is quite an insult." It can't possibly be an insult
unless the so-called professionals have equal or better skills. And
perhaps they don't! Given their backgrounds, there's every reason to
think that Comsec can provide valuable advice to those who will
listen. If not, they'll soon vanish from the marketplace. But Dr.
Spafford would deny them the chance to compete. He thinks that
Comsec's attempt to use their skills honestly is an "insult,"
regardless of how great those skills might be, and anyone utilizing
them is a traitor to the legitimate establishment.

Spafford's argument can just as easily embrace the proposition that NO
ex-criminal should ever be hired for ANY job. To his credit, he
expressly denies that he'd go that far. But it follows from his logic.
Why not just brand their foreheads with a big red H, and cut off their
thumbs so they can't type?

By contrast, Gail Thackeray, who has talked on both sides of the Evil
Hacker issue, now takes a stand in the clearest possible way. I
applaud her part in the Majette sentencing. She didn't ask for
revenge; she didn't try to "make an example"; she didn't exaggerate
Majette's exploits and grab press. She calmly pointed out that he
wasn't dangerous and wasn't the criminal type outside of this
particular behavior, and asked for a rehabilitative sentence. And the
judge agreed with her. Thanks, Gail. I hope your peers notice, too.

------------------------------

From: The Moderators'
Subject: Estimates on virus activity
Date: 16 Apr 91 23:52:15 EDT

This newspaper clipping was recently submitted to CuD. Despite the
lack of source or date, it is interesting as an illustration of
"industry" estimates of virus infection rates, an activity that is
often blamed on the CU. If the estimates presented as fact in this
article are correct, we should see 104 new viruses introduced in 1991.
The assertions made in this article are not unlike those often made
by so-called "hacker experts". While we make no claim as to the
accuracy, or inaccuracy, of the information discussed in this article
it does raise some questions concerning methodology, results, and
definitions of terms when conducting research on marginal activities.

+++++++++++++++++++++++++++++++++++++++++++++++++

"Computer virus infections continue to grow, multiply"
From: _Compute-It_
Bart Ziegler
AP business writer

[This appears to be a syndicated AP column, although no date is given on
the clipping we were sent it is thought to be from Feb-April 1991.]

NEW YORK - The threat of computer viruses continues to grow as existing
viruses multiply and computer marauders introduce new varieties at the
rate of two a week, computer experts say.

The destructive invaders infect more than one-quarter of major U.S.
personal computer users each month, according to a survey released...in
conjunction with a computer virus conference.

Viruses are multiplying so rapidly that by the end of the year, nearly
every major U.S. company that is a heavy user of personal computers will
experience a virus infection once a month, predicted Peter Tippett, a
computer virus consultant.

The attacks are growing because viruses are multiplying exponentially as
they spread among computer networks and shared software, Tippett said.

In addition, he told a news conference, "There are more and more people
writing more and more viruses all the time."

[stuff omitted about viruses, bulletin boards, and the Jerusalem virus]

"People write computer viruses mainly for sport, I believe," said
Tippett, who released a survey of major personal computer users
conducted by his software company, Certus International Corp. of
Cleveland, Ohio.

The telephone survey was conducted earlier this month, aimed at computer
security and support employees at 150 companies and government agencies
with more than 400 personal computers installed.

Half the respondents said they had had a virus infection at least
once, 26 percent had an infection during January 1991, and 13 percent
said they had had at least one attack so severe it crippled at least 25
computers at once, Tippett said.

(...)

Tippett, a former biological researcher with a medical degree, said
viruses mimic the growth of their biological namesakes. He projects
that by the end of this year, most companies with 400 or more personal
computers will have a virus attack once a month.

(...)

Among preventive measures are special anti-viral programs that inoculate
computers from known viruses or alert computer users to the presence of
these invaders.

But Tippett says that does little to block the spread of new viruses,
which he says are created all the time. What is more important is
greater control over the sharing of software, he said.

International Business Machines Corp., the largest personal computer
maker, disputed Tippett's dire forecasts. ... IBM said...that using
atni-viral programs to detect known viruses is more effective than
Tippett asserts. It also said that the rate viruses spread is slower
than Tippett claims because the sharing of software is not as widespread
as Tippett assumed for his projections.

------------------------------

Date: 28 May 91 12:19:12 bst
From: P.A.Taylor <EJPA09@uk.ac.edinburgh.emas-a>
Subject: Research Analysis

Here is a selective and very rough analysis of the questionnaire you %
answered.
It is from the first 50 responses out of a total of just under 200.
A full analysis will be distributed when the target of 3-400 responses is
achieved.

Q1. Gender: 1 female respondent out of 50 (2 out of 200).

Q7. Security of respondent's computer environment:
Too strict - 0%
Adequate -62%
Lax -26%

Q9. Length of professional experience: 38% - over 10 years.

Q11. Serious interest in computing: 68% - over 10 years.

Q12. Nature of interest: mainly professional 28%
Professional and Recreational 72%

Q13. Experience of: Malicious hack/harmless browse/viral incident.
All of these 26%
None 16%

Q14. Number of times: 0-5 - 60%
6-10- 6%
10 -> 20%

Q15. What was it? : virus - 38%
worm - 16%
Trojan- 18%

Q16. How serious? : very - 6%
not very - 42%
not at all serious - 38%
combination of these -14%

Q18. Non-destructive access to data - crime?
yes - 42%
no - 20%
don't know 38%

Q19. Happy with current legislation?
yes, about right - 12%
no, it's too draconian - 38%
Not strong enough - 18%
Don't know - 32%

Q20. More professional structure to computing industry needed?
yes -30%
no -40%
don't know -30%

Q21. Greatest threat to security?
insiders -70%
outsiders -8%
about the same - 18%
don't know -4%

Q22. Viruses - potentially useful?
yes -40%
no -42%
don't know 18%

Q23. Benefits to System Breaking?
yes -60%
no -28%
don't know -12%

Q24. Knowledge of Cyberpunk?
yes -64%
no -36%

Q25. Future trends of viruses?
increase -64%
decrease -10%
stay the same -26%

A complete analysis will be coming soon.

------------------------------

Date: Sun, 04 Aug 91 12:22:57 -0400
From: emv@MSEN.COM
Subject: CFV: comp.patents, misc.legal.computing and misc.int-property

For those of who don't read news.announce.newgroups, here's a set of
proposal for some new newsgroups. Voting continues to the end of the
month.

A group for the discussion of issues related to patents and their
relationship to computer technology (hardware and software); Peter
Treloar, University of Sydney, is moderator.

A group for the discussion of the legal aspects of computers, or
places where computers or computer users bump into the law. This
charter is very broad, and the group is unmoderated.

A group for the discussion of intellectual property rights, that is to
say the field clustering around the notions of patents, copyrights,
trade secrets, or other rights and benefits retained by the original
producer of a creative work. The group is unmoderated.

To vote you may reply to this message. Using this suggested text will
let the votes be counted quickly and painlessly.

To: patents-vote@msen.com
Subject: vote

vote yes/no/abstain comp.patents
vote yes/no/abstain misc.legal.computing
vote yes/no/abstain misc.int-property
quit

Vote early and often! (But be sure to vote either yes, or no, or
abstain;
votes for "yes/no/abstain" will be sent back...) Early returns have been
generally positive.

--
Edward Vielmetti, vice president for research, MSEN Inc. emv@msen.com
MSEN Inc., 628 Brooks, Ann Arbor MI 48103 +1 313 741 1120
for more information on MSEN products and services contact info@msen.com

------------------------------

End of Computer Underground Digest #3.29
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT