Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 15

  



Computer underground Digest Sun Feb 21 1993 Volume 5 : Issue 15
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Editor: Etaion Shrdul, Senior

CONTENTS, #5.15 (Feb 21 1993)
File 1--MODERATORS' Corner (ah, sundry snippets)
File 2--Re SPA/Piracy (CuD #5.14)
File 3--TIME & Puzzlement
File 4--Technology and Populist Publishing (GEnie Reprint)
File 5--"Time Bomb" Detonated In Pennsylvania
File 6--(fwd) CICnet rural datafication / ubiquitous access

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
466893; and using anonymous FTP on the Internet from ftp.eff.org
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
Back issues also may be obtained from the mail server at
mailserv@batpad.lgb.ca.us.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Sat, 20 Feb 93 19:21:51 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--MODERATORS' Corner (ah, sundry snippets)

MISNUMBERING OF #5.14

CuD #5.14 was inadvertently numbered as #5.17. The date (Feb 17) was
used instead of the issue. Thanks to those who notified us. The type
has been corrected, so if you save CuDs, you should re-number
correctly.

UNSUBBING FROM CuD

For those who wish to unsub from CuD's mailing list, you should
INLCUDE YOUR ADDRESS in the unsub notice. Sometimes, the address in
the "From:' line doesn't correspond to anything on the mailing list.
YOU SHOULD ALSO BE SURE TO SEND THE CORRECT UNSUB ADDRESS. If your
unsub request doesn't originate from the address listed in the mailing
list, it makes it rather difficult to determine the correct one to
delete.

CuD PUBLICATION SCHEDULE

Beginning with #5.16 (next Sunday), we will try to revert back to the
once-a-week publication schedule and do twice-a-week runs as
infrequently as possible. We will also try to keep the size limits to
about 38-40K, so CuDs will be a bit shorter than previously (by about
10 percent). The mailing list has grown so large that running an issue
takes about two hours. Attempts to run 50-60 megs through the mailer
in such a short time sometimes causes the log-jams.

AMERICA ON-LINE SUBSCRIBERS

AOL subbers have had problems receiving CuD. IBMmers are allowed to
receive mail files of about 7K, and Mac folk about 28K. We tried
breaking CuDs down into smaller sizes for them, but the size limits
are simply prohibitive. We suggest they unite to ask for a more
reasonable file size of about 50K. Sorry we can't be of much help on
this problem.

FREQUENTLY ASKED QUESTIONS (FAQS)

We are now maintaining a list of FAQs that we can make available on
request. It will also be available from the ftp sites. If there is
interest, we will run it every three months or so as we add to it.

BACK ISSUES

Please read the header for back issue information. We are unable to
send out back issues from the editors' site because of the sheer
volume. Back issues (Vols 1 through 5.15) are available on the ftp
sites, most long-standing BBSes, and many public access systems.
Compressed, they require nearly four megs of disk space.

REPRINTING "OLD" ARTICLES

We are repeatedly asked why we reprint "old" news or news that seems
erroneous. We do this for several reasons, including the following.
First, especially for newcomers or those reading CuDs from a BBS, old
news is new news. Second, some "old" news is repackaged and
recirculated. We feel it's important to provide an archive of the ways
in which this happens. For example, a recent summary of a virus
article contained old news in a new format. We ran it to indicate the
recursive nature of information that is passed on without critique. We
try to indicate this in the "Subject:" line or in a "Moderators' Note"
when this occurs. Sometimes, we goof. The virus article, for those who
asked, was a GEnie reprint, and an accidental deletion removed the
context. We apologize for the confusion.

We also remind some of our critics that Cu Digest has no budget or
staff, is run from a primitive Amdahl running Wylbur as its front end,
and most articles must be reformatted before running. Our incoming
mail is fairly heavy, and we try to respond personally to each one.
Both editors have full time positions that require 60-plus hours of
investment, and sometimes things simply slip by. We ain't perfect,
but we try. So, we appreciate criticism, but we hope it is a bit more
constructive than "can't you guys get anything straight?"

------------------------------

Date: Thu, 18 Feb 93 16:20:51 EST
From: tsa@CELLAR.ORG
Subject: File 2--Re SPA/Piracy (CuD #5.14)

First, it looks like the SPA has identified a significant problem,
that of software piracy. I agree fully that piracy is wrong, and that
it should be stopped. But I totally disapprove of their methods. The
simple statement that many of those who settle out of court with the
SPA are actually innocent was the first thing that shocked me. The
American justice system is supposed to be the main way of determining
right and wrong, not something used as a bludgeon to force others to
do what you want. It seems that right and wrong have become
decreasingly less important, and what matters is whether you can pay
the lawyers. And many small companies simply can't afford a lawsuit.
So the SPA waltz's in, threatens to sue the company, and walks away
with $$$. Perhaps the SPA could consider "The end doesn't justify the
means" for a little while. They are using heavy-handed, cruel
tactics. It may be for a good cause, but that doesn't excuse it.

Their tactics have been surprisingly effective. Every single case,
settled out of court. It is not clear whether that indicates that the
companies don't want to pay for a lawsuit, know that they are going to
lose the lawsuit, or both. If the company knows that they would lose
a lawsuit, then the SPA should force some settlement, since the
company is guilty. But if the company is innocent, and can't afford a
lawsuit to prove it, then the SPA can-and does-just threaten, bluff,
and force a settlement. Then they walk away with money in their
pockets, and no one can do a thing. It makes me want to puke.

The double penalty system which the SPA imposes even upon the
companies who agree to be inspected is preposterous. The company is
forced to pay twice for each copy of the software, once to the SPA,
and once to buy the software. Why should the company have to purchase
legitimate copies of the software, just because one of their employees
decided to pirate it? I agree that the offending software should be
removed, but why should the company be forced to buy new copies?
Also, I don't see why the company should have to pay the full price
for the illegal software, and why that money should go to the SPA.
The company did not obtain the full value of the software, it was
probably used without manuals, which limits the use of a piece of
software, and they didn't get the cool box with all the neato screen
shots, pretty pastel colors, and designer logos on it. They did not
get as much from the pirated program as they would have if they had
bought it, so why should they pay the same amount? In many cases, the
program may have been used only a small amount, by one employee, which
doesn't justify charging the company the full price. And why should
the money go to the SPA? That is the most ludicrous aspect of the
entire fiasco. If the software has been stolen from the company that
released it, then the company that released it should get the money.
If that compan%chooses to donate part of it to the SPA, then fine, but
there is little reason why the SPA should get it. Sure, they can say
that they prevent piracy, that they educate people against it, so they
should get it, but the software wasn't stolen from them, so they
should not be recompensated for what they didn't lose.

I have always wondered how piracy figures are estimated. It always
seemed to be one of those statistics akin to "35% of Americans don't
answer surveys honestly.", or "21.5% of all shoplifters are never
caught." From the CuD's description of the estimate, there are a lot
of obvious sources of error. First, they use the number of Intel and
Macintosh computers sold. While the Mac figures may be accurate,
since all Macs have to go through Apple sometime, how can they know
the number of IBM computers sold? There are so many different clone
manufacturers, and all of them would have to know exactly how many
computers they sold, and report that number to the Dataquest mareting
form, for an accurate estimation to be had. I very much doubt that
all of the minor clone makers did this, so right from the start we
have an inaccurate fact #1.

The second fact looked fine at first, until I noticed the sentence
"The business applications sales are taken from the report and used to
estimate the the total u7it sales..." Business applications?
Business applications? What omniscient genius works for the SPA who
can determine the total unit sales of all software in the U. S. from
the number of business applications sold? How can you determine the
number of games, 3-D rendering programs, anti-viral utilities, and any
of the other myriad kinds of programs from the number of Business
applications sold? Say bye-bye to fact number 2!

I like the pro-Mac direction which the data in the third fact, shows,
but I simply cannot believe that 5 is the average number of
applications owned by Macintosh users. <Quick check of hard drive> I
have 24 applications that I have bought, and I don't buy software very
often. I may not be a typical Mac user (I program, run a BBS, don't
play many games), but I am not as prolific a program purchaser as many
people I know, and even if I am the exception, there would have to be
only 1 person with 24 applications for every 9.5 or so with 3
applications for the average to work. I simply can't believe that my
24 applications is that far of the norm for the Mac, certainly not far
enough to justify the 5 application/mac theory. Then when you look at
Intel-based machines, the figures look even worse. IBM has a much
wider range of most kinds of software available to its users, so one
would expect IBM users to have more software. It is true that
Macintosh's ease-of-use may promote the buying of more software, but
one would expect the high software availability for the IBM to balance
the ease-of-use factor out. I am not surprised that the figures are
so off, since part of the way in which those figures were obtained was
by counting returned registration cards. How many of us actually
return those damn things? I'm sure that there are a few conscientious
people out there thinking "Of course, I return all of them. Doesn't
everyone?", but most people aren't like that. I still have the ones
from Christmas sitting on my desk, waiting to be filled out and
mailed. So the SPA is now 0 for 3 in their basic postulates.

I would only argue slightly with the fourth fact, which calculates
average price of a piece of software. People are probably going to be
more willing to pirate software that they can't afford, so the average
price of a piece of pirated software is probably higher than that of a
bought program. But that's only an educated guess, and it's difficult
to be sure. So the SPA actually does have one fact that hasn't been
twisted into nothingness.

I don't even have to do much to debunk the final assumption. It's
obvious that a large percentage of the programs that are bought are
bought for computers that were not purchased within the past year. It
is true that with dropping computer prices, rapid expansion of the
home market, etc.,

many computers are new. But there are enough that aren't to destroy
the credibility of this assumption. So now, using 3 skewed facts, an
inaccurate assumption, and one fact that isn't too far off, the SPA
thiNks that they can obtain an accurate answer. Somehow I doubt it.
The entire process by which they obtain the answer is so far off, that
I have no credence whatsoever in the answer which they obtained. I
wouldn't be surprised if it was off by an order of magnitude or more,
in either direction. But we'll never know, simply because their is no
way to tell the total value of all pirated software.

There are many other possible reasons for error, most of which the
author of the CuD article states. It is clear that the SPA's
estimates are incredibly inaccurate, and shouldn't be trusted. Yet,
although even David Tremblay, the SPA Research Directory, admits fully
that the figures are off, the SPA still uses them, as often as
possible. They use them in their advertisements, literature, and
educational material, treating the piracy estimates as
incontrovertible fact, despite the fact that their own head of
research admits their inaccuracies.

In conclusion, the most recent issue of CuD has not left me with a
good impression of the SPA. I like their educational efforts, and the
fact that they are trying to curb the rampant piracy. But I feel that
their methods of doing so are too harsh on small businesses, and the
fact that they profit from successfully scaring the target company
makes me doubt that they can maintain a truly objective demeanor.
Since they benefit from intimidating the company subject to
investigation, they have a strong economic incentive to prosecute as
many companies as they can, without regard for innocence, and no
incentive to only attack those that they feel are transgressors,
rather than anyone they can bully.

------------------------------

Date: 20 Feb 93 00:25:50 EST
From: george c smith <70743.1711@COMPUSERVE.COM>
Subject: File 3--TIME & Puzzlement

TIME AND PUZZLEMENT - SUPERMARKET NEWS MAG
MUGS "CYBERPUNK"; ALL HACKERS LOOK LIKE R. U. SIRIUS, DANCE TO
HOUSE MUZIK, GOBBLE ECSTASY, QUOTE TIMOTHY LEARY

Buzzwords, like "cyberpunk," I've decided, are cruel pranks
sickeningly ambitious writers at glossy magazines use to make
themselves instant authorities. Media magnification always makes these
terms legitimate whether they are or not, so you know that while the
TIME article on "cyberpunk" two weeks ago was pure baffle-crap (see, I
can make my own buzzword, too), inside 4 months it will have spawned 6
like-minded articles in other supermarket magazines, taking on a
complete life of its own.

So, I'm gonna rehash some of this nonsense now, in hope that you
laugh, because if you don't, when you see it again as truth in the
coming weeks, you just might have to cry,

Didja know,
that the computer virus is "the cybernetic analogue of AIDS," a

disease which has affected millions worldwide and caused horrifying
death and human suffering? According to Phil Elmer-Dewitt of TIME,
it's so!

Didja know,
according to certified geezer Timothy Leary, "the PC is the LSD of the
'90s"? Like you, I thought this was a fatuous, self-serving
statement. But then I thought about it some more and began to feel
warm inside. Since I missed LSD when it came around the first time,
it felt good to know that I now had an unending supply of it sitting
on my desk, just in case I felt the need to be "groovy."

Didja know,
that now "cyberpunks" don't look like young men with coke-bottle thick
glasses and plastic pocket-protectors? No, they look like young, less
warty, versions of Tiny Tim (which is what R. U. Sirius looks like in
the photo in TIME magazine). It's true!

Didja know,
cyberpunks listen to "house" music, that "post-industrial," droning,
artsy stuff that bands with names like Surgical Penis Klinik and
Throbbing Gristle couldn't sell in the '80s because it was "too"
alternative, but now it's big business because computer dudes and
dudettes don't like those dead, fat guys in Lynyrd Skynyrd. Yup, it's
true! And boy am I bummed! What am I going to do with my Angry
Samoans and Mentors records?

Didja know,
"without visual cues, people communicating on-line tend to flame: to
state their views more heatedly than they would face to face?" Visual
cues-visual schmoos - here I thought they did it because there was
little chance they would get popped on the jaw for being a jerk.

Didja know,
the movie "Terminator 2" was a cult film?

Didja know,
that TIME magazine used the same virtual illustration of "virtual
reality d00d sucking the face off a virtual reality d00dette" as the
movie "The Lawnmower Man," and the magazines OMNI, COMPUTE, PC
Computing, Byte, MacWorld, Discover, Newsweek, Rolling Stone, SPIN,
Science News, Playboy, Penthouse, Gent, USA Today, Details, MONDO
2000, Dog Fancy, Cat Fancy, Harpers, The Atlantic, etc., etc., etc.?

Didja know,
that the Electronic Frontier Foundation is a group that defends
"exploratory hacking"? Well, they didn't know and they seemed pissed
in Computer underground Digest when they found out.

Didja know,
that TIME magazine is now sold with samples of cheap men's cologne,
along with ads for "Elvis not dead" books and chemicals which will
chase away your male pattern baldness? It's true!

George/Urnst, The Crypt Newsletter

------------------------------

Date: 28 Dec 92 15:12:35 EST
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 4--Technology and Populist Publishing (GEnie Reprint)

GE Mail
From--P.SHAPIRO1 Phil Shapiro
Sub--Something's Not Quite Right

Something's Not Quite Right in the Publishing World Today

Something's not quite right in the publishing world today. You'd
think that in this Information Age more people would be writing more
books than ever before, that small new publishing companies would be
springing up to bring promising new authors to market, that a new
Renaissance would be blooming in the world of books, the arts, and
culture in general. Not so.

It's as difficult as ever, today, to bring a new book to market. No
established publishing company will consider a manuscript that is
delivered "over the transom" (unsolicited). The only way to approach
a publishing company is through a book agent, and finding the right
book agent is enough to discourage all but the most intrepid new
authors.

Furthermore, even if the larger publishing houses did take time to
consider a book by a previously unpublished author, and even if they
found the ideas or story fresh and original, they'd decline to market
it unless they could sell sufficiently large quantities of the book to
make a substantial profit.

The publishing of books has become big business. Books are no longer
treated as precious vessels of ideas, but rather as any other common
commodity. Wheat. Pork. Books. Shampoo. Deodorant.

Book lovers cringe at the thought that the business of books has been
reduced to the buying and selling of a crass commodity. Books are no
mere commodity. They're one of the most precious things we own. A
well-written book is the essence of human spirit, captured in tangible
form for all the world to enjoy.

The commercialization of the book, and the sorry state of today's
publishing industry, is well-chronicled in a 1989 book titled, "Beyond
the Bestseller: A Literary Agent Takes You Inside the Book Business,"
by Richard Curtis. Written by a successful literary agent with over
25 years experience in the business, the book speaks with some candor
about the flawed process which modern publishing houses use to publish
books.

In the final chapter, "Toward Reform," Curtis crystallizes his
comments:

"The publishing industry is critically ailing, and no one, from
the creator of the written word to the consumer, is untouched.
The signs are everywhere, some statistically demonstrable, others
less tangible but manifest to anyone who has been in the business
long enough to watch it evolve. Some of the more commonly voiced
ones are:
of publishers on big-name authors.
selling of publishing companies.
current best-sellers.
royalties with authors.
their influence on editorial policies.
cheating them out of royalties.

Obviously, there is no single comprehensive explanation of what
has gone wrong, nor any all-embracing solution. Still, it is
surprising that authors, agents, publishers, booksellers, and
other book people, highly intelligent individuals all, should
continue applying patches and poultices to the symptoms when it
is clear that the dimensions of the problem call for a thorough
reevaluation of the way things are done in the publishing
industry."


But while the publishing world looks more dismal than ever, there is
hope on the horizon. It's entirely possible that new technologies
will arise that will undermine the monopoly the big New York City
publishing houses have on the distribution of books. Such
technologies could take one of two forms: print and non-print.

If you're talking non-print publishing, you're talking about the
electronic book. A device the size and shape of a regular book, with
a sharp monochrome screen. Reading material would be distributed on
some sort of magnetic or optical medium. Cartridges, it would seem,
would be the favored distribution form.

You plug the cartridge into the device, choose the font size you'd
like to read in (and perhaps the typeface as well). The device would
then display the text at a user-controllable rate of display,
automatically clearing the screen once the text reached the bottom of
the display. The rate of display would be controlled by a rotatable
dial that would serve as a sort of "gas pedal" for the device.

Some devices might have hypertext capability built in. Other devices
might have audio capability built in, where word pronunciation would
be available at the touch of keystroke. Such extra features would be
available at a premium cost, though. The basic electronic book would
be manufactured at the lowest possible cost for the largest possible
distribution.

New print publishing technologies are likely to continue along the
lines of the desktop publishing revolution. What's needed is a
dedicated "bookmaker" device that would accept a high density 3.5 inch
floppy, and churn out a bound book in the output tray. Using text
compression routines, over two megabtyes of text can be squeezed onto
a high density 3.5 inch floppy. Two megabytes worth of text is
equivalent to about 250,000 words. (One page of typed text, 250
words, is equivalent to about 2K of memory.)

So most normal length books could quite comfortably fit onto one high
density 3.5 inch floppy (using the text compression routines.) The
dedicated bookmaker device could then churn out a book on demand.

The advantages offered by a dedicated bookmaker are enormous.
Out-of-print books could be easily retrieved and distributed to those
interested in reading them. Books could be sent inexpensively across
country by air mail. (Or, a book could be transferred via modem to
anyone interested in reading it.) A large part of publishing costs is
the printing and physical distribution of the book. With the
bookmaker device, the cost of distributing the book would plummet
ten-fold.

The consumer could then decide whether to print the book out in hard
copy, or to read the book on the electronic book device. Those
without a personal bookmaker device in their homes would have access
to such a device at a public library. (Such a device would be
coin-operated, much like a photocopying machine.)

But most exciting would be the rise of energetic new book publishers
who could take advantage of the economies of the new technology to
distribute works by promising new authors, non-mainstream thinkers,
and others who are currently excluded from the publishing enterprise.

Anyone with access to a disk drive could open up a publishing company.
The resulting flood of new books would most certainly contain a lot of
low quality material. But the advantages of the bookmaker and
electronic book far outweigh the disadvantages of having to put up
with reams of lower quality prose. The lower quality prose can simply
be sifted through by book reviewers, who'd erect signposts pointing
towards the truly worthy reading.

In terms of the bookmaker device, it would be best to have the device
be constructed from the lowest cost electronic components that could
still yield high quality print. So a low-cost printer along the lines
of the Apple StyleWriter, with 360 dots per inch output, and very slow
printing, would serve the purpose of a bookmaker device very well.
The actual bookmaker would be a dedicated device, about the size of a
current 3.5 inch drive, that would plug into a printer like the Apple
StyleWriter. For the printing of longer books, you would just leave
the device on overnight.

Eventually newspaper and magazines would offer "bookmaker
subscriptions" at a reduced rate than their regular "hard copy"
subscriptions. These monthly or daily publications would be delivered
either on disk, or via modem. After all, it doesn't make sense to
print a newspaper across town, and physically deliver it to your front
doorstep, when for the same trouble they could deliver the information
across town, and you could print it (or read it on screen) in your own
home.

In some sense, the sorry state of today's publishing industry is a
welcome impetus for the rise of a new industry based on the
magneto-optic distribution of text. The primary beneficiary of such a
new industry will be the book consumer, who'll have a far greater
selection of books to read, at a far lower cost. A populist
revolution in publishing is just around the corner. And just as
surely as in Gutenberg's day, a new Renaissance will flourish amid all
the creative and expressive arts.


Phil Shapiro
[The author takes an interest in the social dimensions of communications
technology. He can be reached by electronic mail on GEnie at: P.Shapiro1;
America Online at: pshapiro; Internet: pshapiro@pro-novapple.cts.com]
This text is in the public domain.

------------------------------

Date: Sat, 20 Feb 93 16:38:00 EDT
From: d.mccauley1@GENIE.GEIS.COM
Subject: File 5--"Time Bomb" Detonated In Pennsylvania

Time Bomb Detonated In Pennsylvania
by Dennis McCauley
copyright, 1993

A Pennsylvania meat packing company has filed a civil action
in Bucks County Court against its former systems consultant, charging
that the consultant inserted a software "time bomb" into the client's
RealWorld financial accounting system.

According to the suit filed on behalf of John Lustig Meats,
Inc., the consulting firm, Sparrow Systems, Inc. of Lansdale, PA, had
provided hardware and software support to Lustig for a number of
years. On May 3rd, 1991, Lustig engaged Sparrow to upgrade the
company's RealWorld system to the new version 6.0. The contract
specified customized programming services in addition to software and
installation charges. Lustig paid Sparrow in excess of $20,000 for
installation of the upgrade.

On September 15, 1991, Lustig's RealWorld system suddenly
crashed. It would no longer accept orders, nor would it generate
customer information, invoices, or receipts. As a result, the suit
claims, Lustig was forced to handle orders manually, and suffered lost
profits and goodwill, as well as additional personnel costs, and
"investigation and analysis" expenses.

The "investigation and analysis expenses" refer to Lustig's
hiring of a second consultant, who rather quickly found and disarmed
the time bomb, which was date-sensitive, and had been triggered by the
system clock.

A brief filed on behalf of Sparrow Systems specifically denied
that a time bomb was installed on Lustig's system. It is interesting
to note, however, that in a short article which appeared in a local
newspaper the day after the suit was filed, Sparrow's president,
William Mann, was quoted as saying, "We don't have any comment about
whether we did or did not install a time bomb." Representatives of
Sparrow Systems have refused comment on the case during preparation of
this report.

Several uninvolved system consultants indicated that
installation of time bombs, while not standard practice, was not
unheard of as a hedge against clients who failed to pay for services.
A counterclaim filed on behalf of Sparrow Systems alleging that Lustig
owes the consulting firm $2,700 seems to support this theory.

The case raises serious issues about such practices, including
the ethical considerations involved in placing a potentially damaging
software device in anyone's system, much less that of a client.

While Lustig v. Sparrow is a civil matter, it remains unclear
as to whether criminal action might be an option in similar cases.
Noted computer crime prosecutor Ken Citarella, of the Westchester
County District Attorney's Office, indicated that the critical
question in determining whether a criminal prosecution was warranted
would be ownership of the software in question. In this case, it
appears that Lustig purchased the RealWorld upgrade through Sparrow
Systems, authorizing Sparrow to make certain agreed-upon custom
modifications, none of which was the inclusion of a crippling time
bomb. As of this writing, Sparrow still retains the source code,
pending the outcome of the litigation.

------------------------------

Date: 17 Feb 93 11:18:52
From: Chiwatcher@DRKTOWR.CHI.IL.US
Subject: File 6--(fwd) CICnet rural datafication / ubiquitous access

This promises to be a good gathering - it's the first time as far as I
know that there's been a major effort to organize folks toward the
goal of wide spread low cost access to the Internet as a goal separate
from the usual push towards high speed networking for elites.

Apologies if you've seen this multiple times, I'm trying to get it out
to some places where it might stir up discussion on how the local,
regional, or national efforts fit in.

Edward Vielmetti, vice president for research, Msen Inc. emv@Msen.com
Msen Inc., 628 Brooks, Ann Arbor MI 48103 +1 313 998 4562 (fax: 998
4563)

From--KIDSNET Mailing List <KIDSNET@vms.cis.pitt.edu>

Date--Fri, 12 Feb 93 10:35:33 -0500
From--Kimberly Shaffer <shaffer@cic.NET>
Subject--Rural Datafication Conference Announcement

Preliminary Program Announcement

Rural Datafication:
Achieving the goal of Ubiquitous Access to the Internet

May 14, 1993
Chicago, IL

A joint conference focused on extending the services of the Internet to
difficult-to-reach and typically under-served user communities.

Jointly sponsored by CICNet and the following state networks

Illinois: netILLINOIS
Indiana: INDnet
Iowa: IREN
Michigan: MichNet
Minnesota: MRNet
New York: NYSERNet
Wisconsin: WiscNet

Conference focus and theme:
+++++++++++++++++++++++++++

CICNet is pleased to announce Rural Datafication as a major
cooperative initiative among nine networking organizations committed to
the creation of ubiquitous data networking services throughout their
region and, indeed, throughout the nation. As part of this
initiative, these organizations have agreed to co-sponsor a conference
which builds on an already successful collaboration between CICNet and
the above networks and which will focus on two primary areas:

1. Ways to most effectively respond to user communities which desire
Internet services but which are currently unable to obtain
Internet access.

2. Ways to best enhance existing services to those populations which
which make use of non-dedicated connections: i.e., users whose
access to the Internet is via dial-up modem rather than
high speed dedicated lines. The focus includes users who use
SLIP and PPP to get direct connections to the Internet, and users
who use Internet facilities via dial-up terminal emulation.

Come, join, and assist us as we plan for increased access for
such communities. Examples include elementary and high schools,
public libraries, small businesses, organizations located in remote
geographic areas, and the rapidly evolving community of users who need
Internet access from their homes. Help us develop ideas for new
programs and services both useful and interesting. Meet other people
who are committed to expanding the network's usefulness.

Intended Audience:
++++++++++++++++++

We invite you to meet with us to share information and successes you
may have, to learn from the information and successes of others, to
talk with people interested in developing the potential of networks,
and to discuss ways to develop the rural datafication theme as a major
initiative focused on meeting the needs of the user communities
discussed throughout this announcement. This conference is
specifically intended for three key communities:

1. Providers of networked information, whether they be network
organizations or not, who are committed to assisting us as we
pursue our rural datafication strategy.

2. Users of networked information: teachers, researchers, librarians,
scientists, lawyers, bankers -- in short, those who are interested
in contributing to and gaining from the growing electronically-
connected community. We are particularly interested in attracting
users interested in the rural datafication concept.

3. Perhaps of most importance, potential users of networked
information who which to either learn about the network or advise
us on how best to construct a truly pervasive and ubiquitous data
network.

Agenda, dates and times:
+++++++++++++++++++++++

Friday, May 14th:

Opening remarks begin at 9:15 am
Closing remarks will conclude at 4:30 PM

An optional early registration and opening Reception will be held on
Thursday, May 13th from 5 - 7pm.

Location and fees:
+++++++++++++++++

McCormick Center Hotel
Lake Shore Drive at 23rd Street
Chicago, IL 60616
+1.312.791.1900
Conference room rates: Single $85; Double $95

Conference fee: $69 -- includes Friday lunch, morning and afternoon
breaks, and Thursday's registration reception

For Additional Information:
+++++++++++++++++++++++++++

To be placed on the list to receive additional information, please
email, mail, or fax your request for additional information to:

email: may14@cic.net
fax: +1.313.998.6105
mail: Rural Datafication
CICNet
2901 Hubbard
Ann Arbor, MI 48105

We will need either your e-mail or postal address with the request for
additional information. We would like you to list a particular area
of interest that you have, relevant to the theme of the conference.

Queries may also be directed to Julie-Elise Burroughs at
+1.313.998.6103 or to Glee Cady at +1.313.998.6419

Registration:
+++++++++++++

If you wish to register for the conference now, please enclose a check
or money order for $69 made payable to CICNet, Inc, and mail it, along
with the registration information below, to:

Rural Datafication
CICNet
2901 Hubbard
Ann Arbor, MI 48105

REGISTRATION FORM
Rural Datafication Conference
May 14, 1993
McCormick Center Hotel
Chicago, IL

Please print or type the following information:

Name:

Title:

Organization:

Address:

City:

State/Province:

Postal Code:

Telephone:

Fax:

Email:

List a particular interest you have which is relevant to the
theme of the conference:

Cancellations:
Full refunds will be made for cancellations received by April 26th.
There will be no partial refunds.

Hotel Reservations:
Please make your reservations directly with the McCormick Center Hotel.
When you speak with the reservations desk, mention the date and name
CICNet to receive the special conference rates.

The $69 fee includes Friday lunch, morning and afternoon breaks, and
Thursday's registration reception

Please mail this form along with a check for $69 made out to CICNet:

Rural Datafication
CICNet
2901 Hubbard
Ann Arbor, MI 48105

For additional information or assistance, you may send email to
may14@cic.net; for assistance by telephone, call Julie-Elise Burroughs at
+1.313.998.6103 or Glee Cady at +1.313.998.6419.

------------------------------

End of Computer Underground Digest #5.15
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT