Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 37

  


Computer underground Digest Sun May 19, 1996 Volume 8 : Issue 37
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.37 (Sun, May 19, 1996)

File 1--(Fwd) JAVA BLACK WIDOWS - SUN DECLARES WAR
File 2--The Internet is a library
File 3--Boardwatch Magazine -- A review
File 4--"Zen And Blarney" (Boardwatch Reprint on Kevin Kehoe)
File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 12 May 1996 19:53:03 +0000
From: David Smith <bladex@bga.com>
Subject: File 1--(Fwd) JAVA BLACK WIDOWS - SUN DECLARES WAR

"Black Widow" is a really cool name for what are essentially Java virii.

-- David Smith
-- bladex@bga.com


------- Forwarded Message Follows -------
Date-- Sat, 11 May 1996 15:48:06 -0400 (EDT)
From-- "Home Page Press, Inc." <staff@hpp.com>
Subject-- JAVA BLACK WIDOWS - SUN DECLARES WAR

JAVA BLACK WIDOWS - SUN DECLARES WAR

Sun Microsystems' has declared war on Black Widow Java
applets on the Web. This is the message from Sun in response
to an extensive Online Business Consultant (OBC/May 96)
investigation into Java security.

OBC's investigation and report was prompted after renowned
academics, scientists and hackers announced Java applets
downloaded from the WWW presented grave security risks for
users. Java Black Widow applets are hostile, malicious traps set
by cyberthugs out to snare surfing prey, using Java as their technology.
OBC received a deluge of letters asking for facts after OBC
announced a group of scientists from Princeton University, Drew
Dean, Edward Felten and Dan Wallach, published a paper declaring
"The Java system in its current form cannot easily be made secure."
The paper can be retrieved at
http://www.cs.princeton.edu/sip/pub/secure96.html.

Further probing by OBC found that innocent surfers on the Web who
download Java applets into Netscape's Navigator and Sun's
HotJava browser, risk having "hostile" applets interfere with their
computers (consuming RAM and CPU cycles). It was also discovered
applets could connect to a third party on the Internet and, without the
PC owner's knowledge, upload sensitive information from the user's
computer. Even the most sophisticated firewalls can be penetrated . . .
"because the attack is launched from behind the firewall," said the
Princeton scientists.

One reader said, "I had no idea that it was possible to stumble on
Web sites that could launch an attack on a browser." Another said,
"If this is allowed to get out of hand it will drive people away from the
Web. Sun must allay fears."

The response to the Home Page Press hostile applet survey led to the
analogy of Black Widow; that the Web was a dangerous place where
"black widows" lurked to snare innocent surfers. As a result the
Princeton group and OBC recommended users should "switch off"
Java support in their Netscape Navigator browsers. OBC felt that Sun
and Netscape had still to come clean on the security issues. But
according to Netscape's Product Manager, Platform, Steve Thomas,
"Netscape wishes to make it clear that all known security problems with
the Navigator Java and JavaScript environment are fixed in Navigator
version 2.02."

However, to date, Netscape has not answered OBC's direct questions
regarding a patch for its earlier versions of Navigator that supported
Java . . . the equivalent of a product recall in the 3D world. Netscape
admits that flaws in its browsers from version 2.00 upwards were
related to the Java security problems, but these browsers are still in use
and can be bought from stores such as CompUSA and Cosco. A floor
manager at CompUSA, who asked not to be named, said "its news to
him that we are selling defective software. The Navigator walks off our
floor at $34 a pop."

OBC advised Netscape the defective software was still selling at
software outlets around the world and asked Netscape what action was
going to be taken in this regard. Netscape has come under fire recently
for its policy of not releasing patches to software defects; but rather
forcing users to download new versions. Users report this task to be a
huge waste of time and resources because each download consists of
several Mbytes. As such defective Navigators don't get patched.

OBC also interviewed Sun's JavaSoft security guru, Ms. Marianne Mueller,
who said "we are taking security very seriously and working on it very
hard." Mueller said the tenet that Java had to be re-written from scratch or
scrapped "is an oversimplification of the challenge of running executable
content safely on the web. Security is hard and subtle, and trying to build
a secure "sandbox" [paradigm] for running untrusted downloaded applets
on the web is hard."

Ms. Mueller says Sun, together with their JavaSoft (Sun's Java division)
partners, have proposed a "sandbox model" for security in which "we
define a set of policies that restrict what applets can and cannot do---these
are the boundaries of the sandbox. We implement boundary checks---when
an applet tries to cross the boundary, we check whether or not it's allowed
to. If it's allowed to, then the applet is allowed on its way. If not, the
system throws a security exception.

"The 'deciding whether or not to allow the boundary to be crossed' is the
research area that I believe the Princeton people are working on," said
Mueller. "One way to allow applets additional flexibility is if the applet
is signed (for example, has a digital signature so that the identity of the
applet's distributor can be verified via a Certificate Authority) then allow
the applet more flexibility.

"There are two approaches: One approach is to let the signed applet
do anything. A second approach is to do something more complex and
more subtle, and only allow the applet particular specified capabilities.
Expressing and granting capabilities can be done in a variety of ways.

"Denial of service is traditionally considered one of the hardest security
problems, from a practical point of view. As [Java's creator] James
Gosling says, it's hard to tell the difference between an MPEG
decompressor and a hostile applet that consumes too many resources!
But recognizing the difficulty of the problem is not the same as 'passing
the buck.' We are working on ways to better monitor and control the
use (or abuse) of resources by Java classes. We could try to enforce
some resource limits, for example. These are things we are investigating.

"In addition, we could put mechanisms in place so that user interface
people (like people who do Web browsers) could add 'applet monitors'
so that browser users could at least see what is running in their browser,
and kill off stray applets. This kind of user interface friendliness (letting
a user kill of an applet) is only useful if the applet hasn't already grabbed
all the resources, of course."

The experts don't believe that the problem of black widows and hostile
applets is going to go away in a hurry. In fact it may get worse. The
hackers believe that when Microsoft releases Internet Explorer 3.00 with
support for Java, Visual Basic scripting and the added power of its
ActiveX technology, the security problem will become worse.

"There is opportunity for abuse, and it will become an enormous
problem," said Stephen Cobb, Director of Special Projects for the
National Computer Security Association (NCSA). "For example, OLE
technology from Microsoft [ActiveX] has even deeper access to a
computer than Java does."

JavaSoft's security guru Mueller agreed on the abuse issue: "It's going
to be a process of education for people to understand the difference
between a rude applet, and a serious security bug, and a theoretical
security bug, and an inconsequential security-related bug. In the case of
hostile applets, people will learn about nasty/rude applet pages, and
those pages won't be visited. I understand that new users of the Web
often feel they don't know where they're going when they point and click,
but people do get a good feel for how it works, pretty quickly, and I
actually think most users of the Web can deal with the knowledge that
not every page on the web is necessarily one they'd want to visit.
Security on the web in some sense isn't all that different from security
in ordinary life. At some level, common sense does come into play.

"Many people feel that Java is a good tool for building more secure
applications. I like to say that Java raises the bar for security on the
Internet. We're trying to do something that is not necessarily easy, but
that doesn't mean it isn't worth trying to do. In fact it may be worth
trying to do because it isn't easy. People are interested in seeing the
software industry evolve towards more robust software---that's the
feedback I get from folks on the Net."

# # #

The report above may be reprinted with credit provided as follows:

Home Page Press, Inc., http://www.hpp.com and Online Business ConsultantOE
Please refer to the HPP Web site for additional information about Java and OBC.
===========================================================
............Home Page Press, Inc. http://www.hpp.com home of Go.FetchOE
........Free TEXT version - Online Business Today email: obt.text@hpp.com
....Free PDF version - Online Business Today email: obt.pdf@hpp.com
OBC / Online Business Consultant, $595/year email: obc@hpp.com

------------------------------

Date: Sun, 21 Apr 96 16:07:26 PDT
From: jblumen@INTERRAMP.COM
Subject: File 2--The Internet is a library

SEX, LAWS AND CYBERSPACE BULLETIN No. 1
April 20, 1996


This is the first in an occasional series of essays from Jonathan
Wallace and Mark Mangan, the authors of Sex, Laws and Cyberspace,
(SLAC) a new book from Henry Holt on Internet censorship and the
Communications Decency Act. We will send three or four pieces of mail
a month on focused, factual topics relating to the federal
government's attempt to regulate the Net. If you wish to receive the
SLAC bulletin, please send mail to co-author Mark Mangan at
markm@bway.net.

THE INTERNET IS A LIBRARY

by Jonathan Wallace jblumen@spectacle.org

The Internet is the latest in a series of communications revolutions
that have initially baffled legislators and judges, who must select
the correct analogy to apply in writing new laws, or interpreting old
ones. To pick just one example, when the telephone was introduced,
courts struggled with the question whether it was simply a new form of
telegraph, or something else entirely. Today, policy makers are asking
what the correct analogy is for the Internet. The Communications
Decency Act (CDA), and its supporters on the religious right and
elsewhere, have a quick answer for the question: the Internet is no
different than a broadcast medium, like the radio or TV, and should be
governed in the same strict way. The language of the CDA was, in fact,
borrowed from FCC regulations pertaining to broadcast.

The correct analogy is something far different: the Internet is a
vast library, containing every type of information known to humans. We
can learn a great deal about the way that legislators and judges
should deal with the Net by examining the way that libraries function.

A constant criticism levelled at the Internet by CDA proponents is
that explicit sexual information is far more freely available to
minors there than in a bookstore or library. This sounds reasonable,
but is completely untrue. While free speech proponents have heard this
statement many times while maintaining an uncomfortable silence, a
look at the actual policies of librarians confirms that most do not
consider it their job to police what children read. Instead, the
child's parent decides whether or not the child is to have a library
card and is responsible for supervising what a child takes out from
the library.

One of the most persuasive witnesses to testify in ACLU v. Reno, the
lawsuit against the CDA currently pending in federal court in
Philadelphia, was Robert B. Croneberger, Director of Pittsburgh's
Carnegie Library. (The American Library Association, of which
Croneberger is a member, is also a plaintiff in the case.) He
testified that the library currently has 277,000 cardholders, one
third of them minors.

Croneberger said in the affidavit he filed with the court:

"It is the mission of the Carnegie Library of Pittsburgh to provide
the widest array of information to the widest possible audience--both
adults and minors. To that end, the library makes no distinctions
between patrons on the basis of age. The library does not offer
separate library cards for adults and children and the library does
not place restrictions on what minors can read, use or borrow in the
library."

He observed that the librarian is not competent to judge what children
are mature enough to read. "Age must not be a restriction imposed by
anyone except the parents of a child, who can judge the maturity of
that child." In court, responding to the government's
cross-examination, Croneberger elaborated: "If we as librarians are
put in a position of making decisions for other people's children, we
would fail miserably."

Croneberger testified that some libraries have created a separate type
of library card for juveniles, but that most have not. Within days
after his testimony in court, I spotted the following in The Brooklyn
Heights Paper, my community newspaper:

"After months of wrangling, the Brooklyn Public Library has finally
decided to give an inch in the debate over whether minors should be
allowed access to R-rated videos.

"The new policy, adopted by the BPL board earlier this month, will
allow parents to obtain restricted library cards for children younger
than 13 years of age. The card would prohibit children from borrowing
any adult material, be it movies, research material, or Shakespeare's
plays."

The contrast to the CDA is interesting. Nobody is burning any books,
or even removing them from the library shelves. Instead, the library
will continue to contain every conceivable kind of information,
including works on sex. Some libraries--like the Brooklyn Public
library--will simply not let children with the juvenile card take
these works out. Most libraries, as Croneberger testified, will let
children look at anything, once their parents have decided to allow
them to have a library card.

The CDA is a book-burning law. The prison terms and fines it provides
for are very specific, while its defenses--that an information
provider tried to use "reasonable and effective" means to prevent
children from accessing the material--are very vague. This means that
a provider feeling the chilling effect of the law is much safer
deleting information from the Internet (the equivalent of burning a
book) than relying on a vague defense.

Nevertheless, CDA proponents point to the "reasonable and effective"
measures defense as proof that the CDA, like the Brooklyn Public
Library's new rule, merely governs who can receive material, but does
not lead to its destruction. However, all prior indecency laws are
extremely specific about their "safe harbors". Television and radio
can safely broadcast indecent material after ten p.m. 900 line
providers need not fear prosecution so long as they take a credit card
from the caller. While the CDA calls for providers of commercial
information to take credit cards or set up passworded accounts,
nothing in the CDA spells out anything else a provider of free online
information can do to avoid getting in trouble.

Advocates of the CDA want to have it both ways. Even as they argue to
the Philadelphia court that the vague safe harbor makes the CDA a
"narrowly tailored" law, and therefore constitutional, they have been
loud and insistent that no form of regulation short of electronic
"book-burning" will protect minors. Senators James Exon, Dan Coats
and Charles Grassley--the CDA's three biggest Senate
advocates--repeatedly said during the Senate debate in June 1995 that
children could outwit any technical protection available. Neatly
summarizing these arguments is the following excerpt from a FAQ
distributed by Reverend Donald Wildmon's American Family Association:

"Q: Aren't there 'technical fixes' that are less intrusive than a
regulatory or criminal law approach?

"A: No. To date, only a few software programs have been released to
regulate children's access to pornography, such as SurfWatch and
NetNanny. Also, these programs can be bypassed by users
with a good knowledge of the Internet and some technical
sophistication. Even if better technical solutions become available,
this approach is inadequate in and of itself because: children can
walk down the street to another computer; parents' technical ability
often pales in comparison to their children's expertise; pornographers
aren't legally discouraged from peddling
their materials to children."

Rather than listening to what CDA proponents tell us, or tell the
court, we should listen to what they tell one another. Prosecutors
will later argue that virtually any form of control used by
information providers was not "reasonable" or "effective", thus
sending them to prison despite their extensive efforts to seek a safe
harbor.

The CDA was invented by people who believe that some books should
also be banned. The day the CDA passed, Senator Coats indiscreetly
commented that certain portions of Catcher in the Rye would (and
should) be illegal under the new law if posted online. The CDA's most
vocal proponents on the religious right have been involved in numerous
efforts to ban books from school libraries. If the Philadelphia court
fails to recognize that the Internet is a vast library, it will open
the door to radical censorship. It will also allow a preposterous
distinction to be drawn between text on paper and electronic text,
between Catcher in the Rye in your library and on the Internet.

But if the judges apply the right analogy and recognize that the
Internet is a library, they will ensure the survival of the fearless
freedom of speech into the 21st century.

Resources:

The ACLU, http://www.aclu.org

Center for Democracy and Technology,
http://www.cdt.org

Voters' Telecommunications Watch,
http://www.vtw.org

Wallace and Mangan report on ACLU v. Reno,
http://www.spectacle.org/cda/cdamn.html

Sex, Laws and Cyberspace,
http://www.spectacle.org/freespch/

-----------------------------
Jonathan Wallace
The Ethical Spectacle
http://www.spectacle.org
ACLU v. Reno plaintiff
http://www.spectacle.org/cda/cdamn.html
Co-author, Sex, Laws and Cyberspace
(Henry Holt, 1996)
http://www.spectacle.org/freespch/

Free speech absolutist--and proud to be

------------------------------

Date: Tue, 19 Mar 1996 17:25:17 -0600
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
Subject: File 3--Boardwatch Magazine -- A review

When CuD first reviewed BOARDWATCH magazine back in 1991 (CuD 3.31),
we were impressed by the content. At that time, the content focused
primarily on BBSes, and the articles focused heavily on BBS
software, reviews of hardware and BBSes, and included lists of BBS
outlets in various area codes. Although there were occasional pieces
by a variety of guest writers, Jack Rickard did much of the writing,
and coverage on non-BBS news was rather limited.

I dug out an old copy of BOARDWATCH from November, 1991 and thumbed
through it. The cover, a black-and-white picture of Jim Harrer of
Mustang Software and John Friel of Qmodem, captured what BOARDWATCH
was about: BBSes, BBS personalities, and BBS news. And, of course,
lots of ads. The layout was an improvement over earlier years, but
it had a long way to go before appealing to a broader audience.

A year later, we reviewed it again and noted the gradual expansion
of topics to include Internet issues and the addition of a few
specialists, including "Legally Online" by Lance Rose. It was movin'
on up, and Rickard was obviously committed to producing a
broad-based magazine that covered an increasingly broad, yet
detailed, news outlet for cyberspace issues.

Rickard has succeeded. In my view, Boardwatch has become an
exceptional source for Internet news.

The layout has gone from simple monotone covers to the more recent
full-color graphics, including covers that are slick and
eye-catching. Rickard has added over a dozen regular writers and
columnists, inlcuding John Dvorak, "Dr. Bob" Rankin, and Ric
Manning. Interviews, reviews, social and political critique, news
summaries, hardward and software discussions, and other features and
tidbits cover the full range of issues relevant to online interests.

The May, 1996, issue includes a cover story on Microsoft and the
Interent, 15 columns by the BOARDWATCH stable of regular
contributors, and items about Cuba on the Internet, digital
economics, and a wealth of factoids (California ranks first in the
number of .com, .net, .edu, and .org Internet domains, North Dakato
near last) that will make you rich if you ever take "the Internet
for $150, please." It remains a steal at $36 a year for 12 issues.

Why is it worth subbing to?
Here's a blurb from the BOARDWATCH homepage
(http://www.boardwatch.com) --
Check out the homepage and consider a sub -- they'd make a great
gift. (No, we're not payed to hype BOARDWATCH -- it really
is *that* good).

==========================================================

Boardwatch Magazine is a printed monthly magazine available
at over 12,000 newsstand locations around the country at a
cover price of $4.95. Each issue features over 144 pages of
the leading online editorial covering the Internet, Online
Services, and the communications industry. Boardwatch is
read by the movers and shakers in the Internet community,
including over 3200 Internet Service Providers (well there
are that many and they read Boardwatch) , thousands of
software developers and consultants - essentially anyone
involved in developing and providing online services. A with
the latest online networking news and information.

Subscriptions are just $36 per year - a savings of $24 over
the newsstand price. Additional savings with a two year
subscription at just $59 - $61 off the newstand price for
over 50% savings.

TOP TEN REASONS TO SUBSCRIBE:


1. JACK'S EDITORIALS.

Some claim he's lost in cyberspace. Certifiable. Totally
wrong on a monthly basis. Those who have been taking their
licks online over the years and surviving tend to read
closely. Like coffee, wine, and fine cigars, it's an
acquired taste.

2. JOHN C. DVORAK.

The final word in the final pages of Boardwatch.
Identified communications as the "Fourth Killer
Application" in 1983. Also picked Boardwatch as the one to
read on the topic in 1989. Joined the writing staff in
1994.

3. WINDOWS95 NETWORKING COVERAGE.

Boardwatch identified WindowsNT as the low-cost server for
Internet Applications in March, 1995. Fall of 1995 brought
Windows95 with a host of communication features and the
Boardwatch staff fell in love with it. Future issues show
you how to make the connection and take advantage of the
incredibly powerful communication features of Windows95 -
via the TCP/IP Internet.

4. LEGAL AND POLITICAL COVERAGE.

Lance Rose, Jim Warren, and others cover the legal aspects
of operating an online service in today's world,
developments you may have a CRITICAL need to know in the
future. And they show the process where laws are created
and modified - so you can influence them BEFORE they
become your most recent business nightmare.

5. TECHNICAL COVERAGE.

Reviews of Web Server software, BBS software, hardware
devices, HTML page design tricks - unabashedly technical
and decidedly NOT for the novice or the faint at heart.
Boardwatch delivers the latest technological edge to
Internet Service Providers, online content developers, and
the power players in the online community.

6. ADVERTISING

. Yep. You wouldn't think it, but most of our readership
finds as much education in the ads as in the editorial. We
intentionally nurture the small, startup developers in
hardware and software. The ones that can't afford the
larger magazines, but often have the most interesting
products for communications and online services. Knowing
what they are up to is part of staying sharp on what's
happening in the community.

7. LETTERS TO THE EDITOR.

Not a strong feature in most magazines. For some reason,
it's become the most closely read section in Boardwatch.
Find out what other professionals in the online community
have on their minds. And watch Jack gently respond with
kindness and understanding of their plight.

8. LISTS AND LISTS OF LISTS.

Boardwatch started life as a list of bulletin boards in
1987. They've never gotten over compiling lists of
things.

9. IT'S CHEAP.

On the newsstand at $4.95 and cheap at twice the price.
Subscribe for two years at $59 and get it delivered at
your home or office early at $2.46 per copy. Let's see, as
a computer professional, I can tell that this is a savings
of....$2.49 per copy. Or in UNIX terms THREE FREE PIZZAS A
YEAR!

10. YOU STILL CAN'T TAKE OUR WEB SITE TO THE BATHROOM WITH
YOU!

Current Subscription Rates are:
* for U.S., Canada, and Mexico:
1 year (12 issues): $36.00
2 years (24 issues): $59.00

* Overseas: (sent Air-Mail)
1 year (12 issues): $99.00

Or contact us voice at 800-933-6038

------------------------------

Date: Tue, 19 Mar 1996 00:33:47 -0600
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
Subject: File 4--"Zen And Blarney" (Boardwatch Reprint on Kevin Kehoe)

((MODERATOR'S NOTE: Way back in CuD's first year, circa 1990,
Brendan Kehoe contacted us and offered to put CuDs up on his system
at Widener for ftp access. At the time, this took some courage,
because although CuD was as legal and law-abiding as it is today, it
was perceived by some to be a "hackers'" 'Zine that advocated
illegal activity, and some even wondered why CuD editors (and
posters) weren't "busted" along with the rest of the "Internet
scum." Although the perception was absurdly erroneous, it refelected
the mood of the times, and it this made some sysads concerned with
their liability for making issues available. Brendan, however,
realized that providing an ftp site would make CuDs more widely
available would be a useful resource, so he set up our first ftp
site. Since then, Brendan moved on and up, CuD's ftp site moved over
to ftp.eff.org, and life goes on. Brendan (along with Stanton
McClandish) still archives CuD. Brendan also survived a near-fatal
automobile accident a few years ago.

Bob Rankin profiled Brendan in a recent issue of Boardwatch (which
is another reason we think that, like Brendan, Boardwatch is
comprised of the "good guys").

From: Boardwatch, March, 1996:
COPYRIGHT 1996 by Jack Rickard. Not to be reprinted without
permission

by Bob Rankin

Zen and Blarney

Brendan Kehoe is one of the good guys. As author of the classic Zen
and the Art of the Internet guide, developer of the Archie
file-locator client software, archivist for the Computer Underground
Digest and general doer of good online deeds, Kehoe personifies the
phrase "net citizen."

Kehoe is a soft-spoken young man with a fiery Irish spirit who seems
most content when he is doing something for others. While in college
he wrote the Zen guide to help fellow students understand what he had
learned about the Internet, and this free guide became an instant
sensation. When he's not off doing volunteer work in the community or
answering a seemingly endless stream of e-mail from fellow Internauts,
Brendan works for Cygnus Support in Mountain View, CA as manager of
the C++ Development group.

Born in Dublin, Ireland some 25 years ago, Kehoe came to America when
he was 4 years old and developed the computer habit not long
afterward. But the road that led him from Commodore to SparcStation
was not without a few bumps. In December of 1993, Kehoe sustained
severe head injuries in an automobile accident and was not expected to
recover. Miraculously, he survived the crash and emerged with a new
outlook on life and what really matters.

Recently I talked with Brendan about Zen, the accident, and his life
both on and offline. Here's what he had to say...

Doc: What was it that attracted you to the Internet?

Brendan: Just being able to find things out really quickly. In high
school I was blowing away my physics teacher by bringing in a copy of
a technical report only a day after some scientist had announced a
major discovery. It was really neat that you could find that much
stuff that quickly. Now the problem we're running into is how to
organize that massive amount of information.

Doc: You had a brush with death about two years ago. Can you tell me
what happened that day?

Brendan: I was in rural Pennsylvania, coming home from a friend's
house on New Year's Eve of 1993. Whatever we were talking about, it so
captivated us that I went right through a stop sign and was hit by a
Jeep Cherokee in the driver's side of the car. We went into a spin and
ended up being jammed about a foot into some guy's house.

Fortunately, a lady who was following us saw the whole thing and was
able to call 911 on her cellular phone. I was flown by helicopter to
the hospital at the University of Pennsylvania, where I had three
sessions of brain surgery. I was in a coma for three days and after I
came out of that I was in something called an aphasia for about three
weeks. I had an attention span of about 2 seconds - I was swearing,
talking in numbers - actually consistent numbers, my friend said. Then
one morning I just magically woke up, rang for the nurse and asked for
a newspaper to find out what day it was and why I was there.

Doc: I understand you're considering a move from software engineering
to teaching elementary school.

Brendan: One of the interesting results of the whole accident thing
was that it really pointed out the fragility of life to me, and that
you should do things that you're going to be gratified for having done
years later. Being a software engineer is fine and I can do all this
cool stuff, but I don't get much out of it. And I know that 2 or 3
years down the line everything I do will be completely changed.

So as all this fragility of life stuff was hitting me I started really
enjoying working with kids, reading things with them and things like
that. I started going into classrooms to watch teachers work, and
figure out what kind of stuff I'd be able to do and how it would feel.
I was also volunteering at a support network for battered women - I'd
keep the kids busy while the moms were in with a counselor. It was
really interesting - escaping from a C++ meeting, spending an hour so
playing with the kids and then returning to work. The difference
between the two was amazing, and I started thinking "I suppose I could
do this."

Doc: So you're changing your occupation to a vocation...

Brendan: Exactly. Everybody's telling me "Why you gonna do that -
there's no way you can get anywhere near the money you're making now."
But it's a trade-off depending on what you really want out of life. If
I can figure out a way to live off a teacher's salary and continue
writing Internet books it could work. It better!

Doc: About your book... the title is an obvious play on Zen and the
Art of Motorcycle Maintenance; is there any special significance to
the "Zen" thing for you?

Brendan: I had actually just finished reading Motorcycle Maintenance
when I was finishing the first draft of my book, and I realized that a
lot of the stuff that Robert Persig did in his book was to encourage
people to learn the basics and then go off and learn more by
themselves. This was the approach I was taking with Zen, to give
everybody the raw tools they need without deluging them in hundreds
and hundreds of pages of random stuff - instead relying on them to
take what I've given them and learn it in their own way.

Doc: You were a student when you started the book, right?

Brendan: Yup, at a place called Widener University in Pennsylvania.
While I was a student there I took on the job of becoming their UNIX
system administrator. Widener had just gotten hooked up to the Net and
nobody could figure out what in the world to do with it, so I started
trying to figure it out for myself.

I wasn't actually reading anything from anyone - just going exploring
and trying all these different commands. When people saw that I was
figuring it out I got hit with so many questions I was going nuts. So
I thought why not just write it down, and that's where the idea of the
online first edition [of "Zen"] came from.

I took about four months of writing down all the questions I was
being asked and putting it in a form that was usable. And after
making it available to students at Widener I realized that people
everywhere must have the same questions. So I figured "what the hell"
and put it out on the Net.

About two and a half weeks later I got a call from David Farber at
University of Pennsylvania saying "How would you feel about making
this a published book?" That was February of 1992, and I had the
galley copy done by mid-April.

The 4th Edition [ISBN 0-13-452914-6, Prentice Hall PTR, $23.95,
(800)382-3419] now has a chapter on the Web, a section on how to write
your own home page, and an appendix on how to safely introduce your
kids to the Net.

Doc: How many copies of the "Zen" book have sold so far?

Brendan: I actually don't know. In January of 1994, it was something
like 75,000 copies and another 20,000 or so of the 4th edition were
sold last year.

Doc: When you published "Zen" it attracted a lot of attention. What
kind of opportunities did that present, and how did it change your
life?

Brendan: It's been really surreal - it still blows me away when I go
into a bookstore and see my name on the spine of a book. It still
hasn't quite settled in. What's really nice is that having the book
out makes it so that people feel like "Oh, maybe he can answer my
question" and I get all these random questions in my e-mail asking how
to do this, that or the other thing. And I don't have any problem
answering them because I figure they don't know me, I don't know them,
but somehow we're able to help each other.

Doc: I got a kick out of the opening paragraph on your
http://www.zen.org site:

"The Zen Internet Group is a very small, covert group of highly
technical people struggling to overcome the drudgery of day-to-day
life and burrow down into the world like a spoon into a banana split,
splitting apart the atoms of closed-mindedness and tie-dyeing the very
fabric of the universe, venting our frustrations at working on
computers all day at work by coming home and working on a computer."

Doc: Is the Zen Group for real, or is it just a whimsical thing?

Brendan: I liked the idea of getting the zen.org domain so I thought
I'd make up the Zen Internet Group in the hopes that maybe someday it
will actually exist. We do get deluged with people asking us about the
Zen religion, though.

Doc: You've got a nice collection of "kids stuff" on your web site.
Tell me how that came about.

Brendan: Originally it was just interesting things that I'd found, and
I realized that they were all over but they weren't in any one place.
Even Yahoo hadn't been set up completely at that point. I realized
that people might not be seeing good uses of the Net if it's all
spread out like that, so I just put them all together and wound up
with a mention in Yahoo and several other places.

Now I'm getting lots of people sending me mail with suggestions for
additions, and there are about 2000 hits per week. It would probably
be better if I had a faster modem on my machine!

Doc: Given your interest in kids and their welfare, what's your take
on protecting them from inappropriate or indecent materials on the
Net?

Brendan: Well there are a few solutions now that make it really easy
for people to do it. There's SurfWatch and NetNanny which cause a web
browser to deny certain pages, but I always try to explain to people
that they should consider the Internet like a playground. They
wouldn't encourage their kids to just run off and play all by
themselves - and at the same time they shouldn't let them go on and
use the Internet completely unattended. Even if it is right there in
the living room, they don't know what's going to be on the screen.

There are a lot of parents that don't feel as comfortable with
computers as their kids do, but that's an opportunity to let the kids
show off how great they are and how well they can do all this stuff.
The best approach is for parents to actually do it along with their
kids, and to explain that the same rules apply for both strangers on
the street and strangers on the Net.

I'm actually working on a kids book now, as part of a series of Zen
books, which should come out around the end of this summer. It's
called Zen and the Art of the Internet - Parents & Educators Guide. It
expands on how to introduce kids to the Net and gives teachers ideas
for integrating the Internet in their classrooms.

Doc: Do you see any room for a legislative solution to the problem?

Brendan: Not really. There could be some approaches but the problem
with most of the ones that are out now, such as the Exon bill that's
causing all the controversy, is the Internet is a global medium. So
any legislation we pass here in the U.S. wouldn't mean anything
because a person could set up a site in Sweden or Finland or wherever
and jump over the law by operating outside the country.

Doc: A lot of people see you as a kind of Internet hero. Who do you
see as the people who have done the most good for the Net?

Brendan: There's a group up in Canada called Bunyip that did Archie.
Alan Emtage was one of the key guys there. The way that they set up
Archie, along with the way folks at University of Nevada-Reno did
Gopher,together helped to really spawn the growth of the Net and all
the stuff that's happening today.

There's also David Farber at U. Penn who seems to be at the forefront
of everything; and both Mitch Kapor and John Perry Barlow at EFF who I
admire for their speeches on privacy and the Internet.

Doc: How do you use the Internet on a personal basis?

Brendan: I use e-mail, probably more than I should. I use it to be
able to work from home easily. The other day my girlfriend came down
with strep throat and was wondering what to do about it. I was able to
do a Lycos search and find a list of ten key ways to deal with it
without getting a throat culture.

I also like finding information on certain musicians and writers.
There's a newsgroup for Anne Rice, so I'll look there to see if she'll
be making any appearances in the Bay area.

Doc: How do you see the Internet changing society or the way we live
by the turn of the century?

Brendan: I'm convinced that before the year 2000 we'll come up with a
way for more people to afford it - it's still too elitist. You still
need a really nice computer to be able to do it. There's a project
going on out here in Sunnyvale now where you can get an Internet
connection using just your existing cable and television [no computer
required] for $30 a month. It's an interesting sign that they're
trying to come up with ways to make it less expensive.

One thing I'm positive that's gonna happen within the next year is
that we'll solve the whole digital cash and electronic money thing.
Right now there are three or four different approaches to doing secure
transfers over the Net. Some of the projects underway now include
really big names like Sun Microsystems and Microsoft so even by the
end of this year there should be some internationally agreed upon
standard for doing secure money transfers, banking, and buying - it's
just going to go right up through the roof.

Doc: Any parting comments, oh great Zen Master of the Internet? :-)

Brendan: When people ask me, "Is the World Wide Web it for the Net?" I
have to tell them no, because it's just like if they'd asked me two
years ago if Archie and Gopher were it. It's only limited by the human
imagination and there's no way that our imaginations are going to
stall on something like the Web. And now we've got Java coming up.
There's always something new coming.

Some people have asked me if there will be a 5th or 6th edition of my
book and I tell them in all likelihood there will because this thing
[the Net] changes so quickly. Even now, "Zen" is out of date on some
things because it doesn't do heavy coverage of Java.

There's no way anybody can be exactly up to date unless they sit in
front of their computer with ten other people typing simultaneously.
I've been saying if people wanna use the Net, go in and use it now -
don't wait for it to get better. It's going to consistently get better
and you're never going to find a stalling point.

The Internet itself is going to have to change soon, because we're
running out of addresses. There is a proposed 128-bit addressing
scheme and people on the East coast are experimenting with a gigabit
connection now. So yeah, it's gonna really transform, but there will
be a lot of constants. E-mail will still be e-mail, probably very
similar to the format it is now. We'll see a growing up and a firming
up. Even if you look three years ago at the way things stood then
compared to now it's amazing.

It's funny when you hear Vint Cerf (one of the chief architects of the
TCP/IP protocol) talk now - he can't believe the way some of the
things have grown. And I'd love to know what Marc Andreessen really
thinks about what Mosaic turned into, other than the fact that he's a
billionaire now.

Connecting With The Zen Man

brendan@zen.org http://www.zen.org/~brendan

=======================================================================

Editor: Jack Rickard - Volume X: Issue 3 - ISSN:1054-2760 - March 1996
Copyright 1996 Jack Rickard - ALL RIGHTS RESERVED

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.37
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT