Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 55

  


Computer underground Digest Tue Jul 23, 1996 Volume 8 : Issue 55
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.55 (Tue, Jul 23, 1996)

File 1--(fwd) lecture about internet and censorship (fwd)
File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
File 3--Online Dispute Resolution, etc. (fwd)
File 4--Re: Response to CUD re: selling wind
File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
File 7--(Fwd) $50K Hacker challenge
File 8--Access control, Censorship, and Precision
File 9--Computer Literacy Bookshops events
File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)


CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 9 Jun 1996 13:26:59 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 1--(fwd) lecture about internet and censorship (fwd)

This is a speech on internet censorship given by the managing director of
the Dutch Internet Service Provider which created the child pornography
"hotline" that I forwarded about a month ago.

---------- Forwarded message ----------
From--felipe@xs4all.nl (Felipe Rodriquez)
Date--8 Jun 1996 17:29:50 GMT

A lecture i gave at the international liberals congress:


Hello,

I am Felipe Rodriquez, Managing director of Xs4all Internet, a mayor
dutch provider, and Im also chairman of the dutch foundation of
internet providers.

I was asked to do a short lecture about Internet and censorship.

Internet is an emerging market, and at the same time an exciting new
social environment. A space of communications between people of
different nations, with different habits, traditions and legal codes.

Internet is a place without borders. Information travels from one
country to another in a split second. From here to the United States it
takes 100 milliseconds. To Japan the information travels within 300
milliseconds. Nicaragua takes 250 milliseconds and to Australia it
takes the bits and bytes 400 milliseconds. Information crosses many
borders on its path to the final destination.

This challenges the concept of regionally defined cultures. The world
becomes a global village of many cultures. Those cultures are not
necessarily confined to a certain region or location. They are on the
Net, and thus independent of location.

The environment and conditions on the Net change quickly. New
possibilities of communicating with other people emerge on an almost
daily basis. Today people can sound-talk over the Internet, play games
together, send pictures, send video transmissions, radio et cetera.
Never before have people been communicating so massively, on an
intenational scale. Every person is a medium that generates network
traffic.

This mash of global cultures, all communicating with eachother, creates
a culture shock. Every culture has its own traditions and codes, and
naturally tries to protect and nurture these values.The traditional way
of protecting ones culture and traditions has always been through
legislation and social control. It is legislation that now threatens
most of the worldwide cultures on Internet.

Legislation on Internet is a slippery road. A communication technology
on this scale is a new concept. It is difficult to legislate a global
social environment. The main problem is the fact that countries try to
legislate a global environment through their own culturally defined
moral codes.

Different things are allowed in different countries. In the US it is
allowed to make racist comments, in Holland it is not. So you see a
migration of the information that dutch neo-nazi groups put on the
Internet. Vice versa the United States has strict laws against
obsenity, that are much more tolerant in Holland. Now you see a
migration of pornographic material towards Holland. From both countries
the information is published on a world wide scale. Implementation of
law for Internet should include a harmonisation of some kind in the
area of international legislation.

The United States has implemented the Communications Decency Act. This
law defines unacceptable speech on Internet. You can be criminally
prosecuted for saying the word fuck or other indecent words, if you are
an American. Anything indecent is being supressed. This proves to be a
law that is impossible to uphold.

The United States government webservers violate the Communications
Decency Act. On the White House webserver there is a picture of a
painting that is displayed. The painting shows a family of a mother
with her two children. One of the children is nude. According to the
Decency Act it is forbidden to display this image on the Internet.
There are similar examples on other government systems in the US.

This communications decency act is now being challenged as being
unconstitutional by a group of organisations on Internet that has more
than 40.000 supporters.

Other countries like China, Vietnam and Saudi Arabia have even stricter
guidelines for Internet. No one can use the Internet without prior
government permission. These governments introduce strict control on
the gateways that connect them to the Net. These countries are afraid
that Internet will give their citizens access to information against
their government and political structure. The Internet is too
democratic for them.

Germany had ordered Compuserve to block off all groups about sex, and
Compuserve then had no other way to shut these groupsdown worldwide.
Eventually the german ambassador had to explain this action to
President Clinton. A local law was influencing cultures in other
countries.

France arrested two internet-providers a couple of weeks ago. They
where held responsible for the publication of child-pornography that
was foumd on the Net. They did not distribute it themselves, but it was
available somewhere on Internet. After global concern, the french
minister of Interior admitted the arrests where a mistake, and that the
providers could not be held liable.

Prudence is needed because experience must first be aquired. You cannot
legislate something you do not know anything about, but it happens
everywhere on Internet. Resulting in unworkable situations, and
repression of the people and the market.

Many problems on Internet can be dealt with today. One of those
problems is Child Pornography. In Holland we have started a hotline
against child pornography on Internet. If we get a report about a dutch
user that is transmitting child-pornography, then we send him a
warning. If that does not stop him, we report that user to the police.
The user gets his chance to test the legal system. The hotline does not
censor, it warns and reports. This project is a cooperation between
the foundation of dutch internetproviders, the dutch criminal
intelligence agency, a psychologist, a couple of internet users and the
national bureau against racial discrimination. The hotline is based on
existing law, and proves that no extra law is needed to fight
child-pornography on Internet. Im a firm believer of first trying all
the intruments that the existing legislation has to offer. Why bother
about new laws if existing rules are sufficient ?

One of the common concerns is the availabality of obscene and violent
information to children. This is the main argument in the United Stated
to impose strict rules for the Net. But there are already techniques
that can protect children from seeing any these materials. There is
software that is especially made for the purpose of creating a safe
Internet. There is a demand from the market to create these programs,
and thus they are created.

Protection of the children on the Net is not a government task, but an
educational task of the parents of the children. Instead of regulating
a worldwide network one could also think of imposing an age limit.

Pridence is needed to find solutions for these new problems. Business
can only thrive in a stable environment. And rushing in all kinds of
repressive measures is not a stabilising factor. It is often easier to
impose new legislation, than it is to repair old bad legislation.

Thank you !



--
Felipe Rodriquez - XS4ALL Internet - finger felipe@xs4all.nl for
http://xs4all.nl/~felipe/ - Managing Director - pub pgp-key 1024/A07C02F9

pgp Key fingerprint = 32 36 C3 D9 02 42 79 C6 D1 9F 63 EB A7 30 8B 1A

------------------------------

Date: Sun, 14 Jul 1996 18:25:52 -0700 (PDT)
From: baby-X <baby-x@zoom.com>
Subject: File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)

You've probably already seen this elsewhere, but I figured I'd send it
your way directly.


----------------------------------------------------------------------------
Christopher D. Frankonis - Rootless Cosmopolitan
cyberPOLIS - Communicate This Culture

Draft "Cyber-Rights" Platform Plank
http://www.cypher.net/cyberPOLIS/platform-plank.html


---------- Forwarded message ----------

Submissions of platform proposals to both the Democratic and Republican
Parties are due by the first week of August. The Libertarians have already
held their convention, but will receive a copy of this plank proposal
anyway, as will Perot's Reform Party if it can ever be determined who to
send it to.

Therefore, I am opening a final period of discussion on the proposed
"cyber-rights" platform plank -- beginning at the start of Sunday, July
14, and ending at the close of Wednesday, July 17.

Please try to focus the discussion in the following locations (although I
will be tracking the entire handful of lists and groups this announcement
is being posted to):

the Bonfire mailing list
(see http://www.well.com/user/jonl/bonfire.html)
the cyberPOLIS mailing list
(see http://www.cypher.net/cyberPOLIS/discussion.html)
alt.culture.internet
alt.politics.datahighway
comp.org.eff.talk

At the close of the final discussion period, the draft platform plank will
be considered to be in a fixed state; development will be over.

For the two weeks between Wednesday, July 17, and Wednesday, July 31, an
email address will be made available for collecting the names of
individuals and groups which wish to signify their support for the plank.
The collection of names will be appended to the plank proposal, and sent
along with the text of the plank to each of the four parties being
targeted. Note: Do NOT send me any of this now. When the time comes, I
will announce the appropriate address.

And so, without further explanation, here is the current version (the
2nd, in fact) of the proposed "cyber-rights" platform plank:


[ Respect for Freedom in the Information Age ]

"As the most participatory form of mass speech yet developed, the
Internet deserves the highest protection from government intrusion."

- Judge Stewart Dalzell

The [BLANK] Party takes special recognition of the unique
characteristics of computer-mediated communication. As the nation and
the world experience the Information Revolution, we must rise to the
challenge of embracing the achievements and the promise of the global
Internet.

To this end, we affirm that the new world of cyberspace calls for a
commitment to these essential values of American liberty:

* The right to speak, express oneself, and associate freely.
* The right to privacy, whether through the use of anonymity,
pseudonymity, encryption, or other means.
* The right of the individual to control both the information they
access and the information they provide.

As the people of America and those of nations around the world come
closer together through the power of computer networking, the [BLANK]
Party embraces the spirit of freedom embodied by this new medium.

------------------------------

Date: Tue, 16 Jul 1996 21:46:13 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 3--Online Dispute Resolution, etc. (fwd)

---------- Forwarded message ----------
Date-- Thu, 11 Jul 1996 13:09:43 -0400
From-- Ethan Katsh <katsh@LEGAL.UMASS.EDU>

Some members of this list may have in interest in (or know someone
who has a need for) the Online Ombuds Office, which can be found at
http://www.ombuds.org. This is a pilot project aimed at using online tools
to try to resolve disputes arising out of online activities (and even
non-online activities). There is no charge for the use of the service,
since most of our costs are covered by a grant from the National Center
for Automated Information Research.

If you belong to any listservs or newsgroups where disputes
arising out of online activities are discussed, I'd be most grateful if
you would mention the project and our URL.

We are particularly interested in disputes involving copyrights,
domain names, First Amendment, online service providers, and harassment.
Our home page even describes a little reward for the parties in the first
disputes that we settle in these areas.

!~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~!
! Ethan Katsh Internet: Katsh@Legal.umass.edu !
! Professor VOICE: 413-545-5879 !
! Department of Legal Studies FAX: 413-545-1640 !
! University of Massachusetts !
! 216 Hampshire House !
! Amherst, MA 01003 !
! Co-Director, Online Ombuds Office !
! http://www.ombuds.org !

------------------------------

Date: Tue, 9 Jul 1996 13:52:38 -0700
From: Barry Gold <bgold@platinum.com>
Subject: File 4--Re: Response to CUD re: selling wind

To: Roland Dobbins,

Seems to me that CUD is being about as balanced as usual. They
published your "right-wing rant", just as they published the
"left-wing rant" you were objecting to.

You are quite correct about the "liberal" Clinton administration
trying to foist key-escrow (like Clipper), "anti-terrorism"
legislation that uses guilt-by-association, and has violated the
rights of individuals in their quest to force various "militias" to
submit. (Although I'm not sure that the Clinton admin can really be
blamed for Ruby Ridge -- that was already planned before he took
office, and bureaucracies have a certain inertia.) In any case, if
they are to be blamed for the idiocies at Ruby Ridge and Waco, they
are equally entitled to take credit for learning from past mistakes
and working out a negotiated settlement with the "Free Men".

I'm not sure about "filegate". Maybe it's an enemies list. But it
seems just as likely to me (a computer professional) that it resulted
from somebody searching an outdated list of white-house employees.
Seems to me if Clinton wanted to keep an enemies list, he could have
picked a better list than a bunch of former white-house employees and
applicants. However, I maintain an open mind on this, as additional
evidence may turn at any time.

But I really must take issue with your bringing up SDI. Yes, weapons
are made to be used. That's one reason why we maintained and continue
to maintain our own weapons. It lets any foreign power who might think
of using such weapons on the U.S. know that the result will be the total
destruction of whatever country they are ruling.

But the SDI was, and remains, a chimera. Vaporware, impossible to
build. I just happen to have a relevant LA Times column, which I will
quote part of:

David L. Parnas(1) spent two days listening to Air Force
briefings, then in June 1985 he resigned from the advisory panel,
concluding that the fundamental computer requirements for
strategic defense could never be satisfied.

...

His basic points are simple and unalterable: By its nature,
strategic ballistic missile defense cannot be tested in its
conditions of use -- we can't fire a missile at Los Angeles
to see if our defense works. And no computer system of even
modest complexity has ever been considered reliable without
extensive testing in actual conditions of use.
...
National ballistic missile defense, of course, would require
computer software of both unimaginable(sic) complexity and
infallible trustworthiness -- and it would have to work
correctly the first time it was ever used.

...

Furthermore, the long lead time and elaborate facilities
required to build an intercontinental missile mean that the
U.S. and its allies would be able to deal with such a threat(2)
from a rogue state in others(sic) ways -- via a preemptive
strike, for example.

Above quoted from "Innovation" column, by Gary Chapman, Los Angeles
Times, Monday, July 8, 1996, page D6.

I note that Chapman ignores the many missiles left in the former
Soviet Union. These are mostly controlled by the Russian military,
regardless of where they are physically located. And Russia seems to
have other things than intercontinental war on its mind. This could
change in the future, of course. But I suspect it would be cheaper to
just buy the missiles than to build even the prototype SDI ($31-60
billion; we have spent over "$100 billion on ... research so far, without
noticeable progress."(ibid))

Also ignored by proponents of SDI is that there are other methods of
delivering weapons of mass destruction than ICBMs. If Russia _did_
become a threat again, they could use submarine-launched missiles,
which are harder to defend against because they travel tens or hundreds
of miles instead of thousands. And the smaller "rogue states" that
indulge in terrorism could get quite satisfactory results by smuggling
the weapons into the U.S. and assembling them in whichever city they
want to destroy.

It would be difficult to completely destroy the U.S. with short range
or smuggled in weapons, but you could certainly deliver a lot of
terror, just the sort of thing those dictators would enjoy. Except
for one thing -- the retaliatory strike would leave them radioactive
dust, or if they happened to have a deep enough bunker to survive it,
no army and a radioactive wasteland to "rule" over. The same thing
would happen to anyone who launched a more massive missile strike, of
course.

So, who are we to fear? Anyone who is weighing risks against gains
will see there is nothing to be gained by using such weapons against
U.S. territory. And in spite of propaganda labelling Hussein and
Kaddafi "madmen", they are quite sane, just working from goals we
don't understand. And if someone crazy does come to power (Hitler,
perhaps), SDI will not prevent him from smuggling in weapons.

In fact, assuming such a ruler (or a stateless terrorist group for
that matter) could lay hands on enough fissionables, this would be at
least as efficient a method of using them as launching missiles.
Missiles have a way of failing, their payloads refusing to go off.
Worse, after you've figured out how to build a fission bomb (not that
difficult, most of the info is now available in libraries), you
_still_ have to figure out how to build the missiles, a much more
difficult task. (Or spend a lot of money to buy them, then hope you
can maintain them in working condition until its time to use them.)

Thank you, I'd rather use the 31-60 billion to lower taxes or reduce
the national debt.


---

(1) a famous software engineer and a member of the panel charged with
looking at the computer requrirements for an SDI system.

(2) e.g., the occasional threats by the current rulers of North Korea,
Iraq, and Libya.

------------------------------

Date: Wed, 17 Jul 1996 19:59:47 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
Subject: File 5--NYT -- IRC-based child molestation ring busted (7/17/96)

The New York Times, July 17, 1996, p. A10.

16 Indicted On Charges Of Internet Pornography
Allegations of Molestation Are Also Filed

By Tim Golden

San Jose, Calif., July 16 -- [...]

Today, Federal officials said the girl in a small central
California town had led them to one of the more distant
frontiers of sexual crime.

In an indictment handed up here, a Federal grand jury
charged 16 people in the United States and abroad with
joining in a pornography ring that was effectively an
on-line pedophilia club. Its members shared homemade
pictures, recounted their sexual experiences with children
and even chatted electronically as two of the men molested
a 10-year-old girl, the authorities said.

The case appeared likely to heighten concerns about the
spread of child pornography over the Internet. Debate has
grown steadily over whether or how the government should
impose obscenity standards in cyberspace, and Republican
leaders have increasingly attacked the Clinton
Administration for being insufficiently vigorous in the
prosecution of on-line pornography cases.

[...]

In addition to 13 men arrested around the United States,
officials said the group included members in Finland,
Canada and Australia. Although arrest warrants have been
issued for those three, officials said they were still only
known by their computer aliases.

[...]

With help from Customs Service investigators in Silicon
Valley, F.B.I. agents eventually uncovered computer files
that began to trace the scope of the Orchid Club, one of
the thousands of virtual conference rooms of Internet Relay
Chat.
Officials said they did not have to conduct wire-tap
surveillance or break into encrypted files; two of the
accused conspirators collaborated with investigators, going
on-line in the presence of law-enforcement agents to help
track other members of the club.

------------------------------

Date: Mon, 8 Jul 1996 08:56:51 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)

U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM
The federal government is planning a centralized emergency response team to
respond to attacks on the U.S. information infrastructure. The Computer
Emergency Response Team at Carnegie Mellon University, which is financed
through the Defense Department, will play a major role in developing the new
interagency group, which will handle security concerns related to the
Internet, the telephone system, electronic banking systems, and the
computerized systems that operate the country's oil pipelines and electrical
power grids. (Chronicle of Higher Education 5 Jul 96 A19)

AT&T TARGETS CYBERSPACE
AT&T's recent investment in Nets Inc., through its spin-off of New Media
Services to Jim Manzi's Industry.Net, signals its plans to become a one-stop
shop for electronic communications -- from e-mail and Internet access to
cellular calling and satellite TV. The company's primary strategy is to
sign up millions of customers for its WorldNet Internet access service. The
company will also provide its corporate customers a "hosting" service called
EasyCommerce, which will create and operate corporate Web sites. At the
same time, the company has scrapped Network Notes and is looking to get rid
of its Imagination Network, an online gaming service; it's also considering
phasing out Personalink, a messaging service that uses General Magic
technology. (Business Week 8 Jul 96 p120)

------------------------------

Date: Thu, 18 Jul 1996 23:10:49 +0000
From: David Smith <bladex@bga.com>
Subject: File 7--(Fwd) $50K Hacker challenge

I saw this article in a recent edition of Online Business Today.

------- Forwarded Message Follows -------
Date-- Tue, 25 Jun 1996 09:08:17 -0400 (EDT)
From-- Home Page Press <obt@hpp.com>

<sections snipped>

**************************************************

Hackers $50K challenge to break Net security system

World Star Holdings in Winnipeg, Canada is looking for
trouble. If they find it, they're willing to pay $50,000 to the
first person who can break their security system. The
company has issued an open invitation to take the "World
Star Cybertest '96: The Ultimate Internet Security Challenge,"
in order to demonstrate the Company's Internet security
system.

Personal email challenges have been sent to high profile
names such as Bill Gates, Ken Rowe at the National Center
for Super Computing, Dr. Paul Penfield, Department of
Computer Science at the M.I.T. School of Engineering and
researchers Drew Dean and Dean Wallach of Princeton
University.

OBT's paid subscription newsletter Online Business
Consultant has recently quoted the Princeton team in several
Java security reports including "Deadly Black Widow On The
Web: Her Name is JAVA," "Java Black Widows---Sun
Declares War," Be Afraid. Be Very Afraid" and "The
Business Assassin." To read these reports go to Home Page
Press http://www.hpp.com and scroll down the front page.

Brian Greenberg, President of World Star said, "I personally
signed, sealed and emailed the invitations and am very
anxious to see some of the individuals respond to the
challenge. I am confident that our system is, at this time, the
most secure in cyberspace."

World Star Holdings, Ltd., is a provider of interactive
"transactable" Internet services and Internet security
technology which Greenberg claims has been proven
impenetrable. The Company launched its online contest
offering more than $50,000 in cash and prizes to the first
person able to break its security system.

According to the test's scenario hackers are enticed into a
virtual bank interior in search of a vault. The challenge is to
unlock it and find a list of prizes with inventory numbers and
a hidden "cyberkey" number. OBT staff used Home Page
Press's Go.Fetch (beta) personal agent software to retrieve the
World Star site and was returned only five pages.

If you're successful, call World Star at 204-943-2256. Get to
it hackers. Bust into World Star at http://205.200.247.10 to
get the cash!

**************************************************
============================
============================
ONLINE BUSINESS TODAY(TM)
NEWSLETTER: Vol 2 (#6)
MORNING FINAL
THURSDAY, JUNE 24, 1996
OBT@HPP.COM

------------------------------

Date: Mon, 15 Jul 96 07:30:34 GMT
From: "David G. Bell" <dbell@zhochaka.demon.co.uk>
Subject: File 8--Access control, Censorship, and Precision

For me, the most disturbing part of the Meeks story about control of
access to parts of the Internet was the allegation of a lack of
precision in defining controlled sites, so that sites with a similar,
but not identical, URL could be blocked.

I imagine that a smart lawyer could make a case for damages out of that
one.

Contrast it with the iSTAR story. The list of newsgroups they have
refused to handle is pretty clear, and while different countries, even
different States in the USA, have different limits, pretty well all of
the newsgroups have names which strongly suggest an illegal content in
many jurisdictions.

About the only one which I was surprised to see was the newsgroup for
pictures of cheerleaders, but on an international network of networks,
it isn't hard to find differences in age limits, which would make a
picture of a 17-year-old legal in one country, and illegal in another.

At least the censors and controllers have a reason for their actions,
and one which I believe can be defended. The danger in both the stories
is that so much is being done in secret, and these actions should be
challenged, should be publically debated, rather than imposed in secret.

Here in the UK we have what is officially a film _classification_
system, backed by law. Mostly, it seems to work pretty well. There are
stories about scenes being cut from films to get a less restrictive
classification. It has also been claimed that no film can be released
in the UK which shows the use of nunchaku, because of some decision
taken by the current head of the BBFC.

It can be argued that too many people on the Internet fail to accept
responsibility for what they make available. The scary thing about the
secrecy surrounding efforts to classify or censor material, is that it
suggests that the people taking the decisions are afraid to accept their
responsibilities.
Date: Thu, 18 Jul 1996 23:23:16 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 9--Computer Literacy Bookshops events

From -Noah

noah@enabled.com

---------- Forwarded message ----------
Date--Thu, 18 Jul 96 18:05:19 PDT
From--CLB Event Accounement <announce@clbooks.com>

AN EVENT AT COMPUTER LITERACY BOOKSHOPS

-----------------------------------------------------------
Logical Synthesis with Verilog HDL
---------------------------------------------------------

a free presentation by Samir Palnitkar

What is?
Logic Synthesis
Impact of Logic Synthesis
Synthesis Design Flow Sequential Circuit Synthesis Example

Samir Palnitkar is the president of Indus Consulting Services, Inc.
in Sunnyvale, CA; a company which offers training and consulting
services for chip design and verification.

As a member of the technical staff at Sun Microsystems, he was
involved in several successful microprocessor, ASIC and system
design projects. He's also been a consultant to chip design
companies, semiconductor houses and EDA companies. He has also
taught Verilog and Synthesis courses to engineers at various
companies. Samir has published several technical papers and is the
holder of two U.S. Patents.

Mr. Palnitkar is the author of
"Verilog HDL: A Guide to Design and Synthesis.

Date: Tuesday, July 30, 1996
Time: 6:30 p.m. to 8:30 p.m.

Location: Computer Literacy Bookshop
2590 N First St (at Trimble)
San Jose, (408) 435-1118

DID YOU KNOW THAT OUR EVENTS ARE POSTED ON OUR WEB PAGE?
http://www.clbooks.com/

Stay tuned. There are more events to come.

August 7, 1996
Tons of Practial Experience with the Shlaer-Mellor Method
with Leon Starr

August 17, 1996
Power of Ignorance (C++ Templates)
with Andrew Koenig

August 21, 1996
Web Multimedia Techniques
with Tay Vaughan

Events at our stores are always free.

------------------------------------------------------------
If you would like to receive e-mail announcements for upcoming store
events, simply write to:

events_ca-request@clbooks.com (for events held at our California stores)
events_va-request@clbooks.com (for events held at our Virginia store)
--------------------------------------------------------------

If you have signed up for email announcements but have not received any,
or wish to be removed from this list, please contact us. We add names
by request only.

****************************************************
Computer Literacy Bookshops, Inc.

Cherrie C. Chiu
eventinfo_va@clbooks.com
(408) 435-5015 x116

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.55
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT