Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 06
Computer underground Digest Sun Feb 2, 1997 Volume 9 : Issue 06
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.06 (Sun, Feb 2, 1997)
File 1--USR's little booboo (fwd)
File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
File 3--InfoWarCon6 - Brussels, Belgium (fwd)
File 4--Call for papers: 6CYBERCONF
File 5--DC-ISOC Tidbits
File 6--"DNS and BIND," and "Mastering Regular Expressions"
File 7--"The Basics of Computer Security" by Bellcore
File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Tue, 7 Jan 1997 00:15:18 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: File 1--USR's little booboo (fwd)
From -Noah
---------- Forwarded message ----------
Date--Mon, 6 Jan 1997 18:55:35 -0600 (CST)
From--Brett L. Hawn <blh@nol.net>
56-kbps modem? Not quite
By Jim Davis
January 2, 1997, 5:30 p.m. PT
U.S. Robotics (USRX), which has been leading the push for 56-kbps
modem technology, has conducted preliminary tests showing that
most consumers will be able to connect at higher speeds than with
current modems--but not at the full 56 kbps.
The company said the maximum downstream transmission speed will
be limited to 53 kbps, not the 56 kbps originally promised.
Federal Communications Commission regulations "limit the signal
level" that digitally connected server equipment can transmit,
the firm said.
U.S. Robotics' x2 technology overcomes the speed limits of
current 28.8-kbps modems based on the ISP having a direct
connection to telephone companies' digital switches.
The company said today that tests showed that "the vast majority"
of users would be able to use x2 technology, while its modems
would automatically default to lower speeds if such connections
weren't possible. The test results were based on over 20,000
calls in seven Bell operating company regions, the firm said.
U.S. Robotics says it is in beta testing of its products and
expects to start shipping initial consumer products later this
month.
------------------------------
Date: Mon, 13 Jan 1997 09:29:28 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
From -Noah
---------- Forwarded message ----------
Date--Fri, 10 Jan 1997 19:01:26 -0500
From--"David M. Balenson" <balenson@tis.com>
PLEASE NOTE THE EARLY REGISTRATION AND HOTEL ROOM AVAILABILITY AND SPECIAL
RATES DEADLINES ARE APPROACHING!! RESERVATIONS AT THE PRINCESS RESORT
MUST BE MADE NO LATER THAN JAN 13TH FOR THE GOVERNMENT RATE, AND NO LATER
THAN JAN 20TH FOR THE REDUCED GROUP RATE. EARLY REGISTRATION FOR THE
SYMPOSIUM MUST BE POSTMARKED NO LATER THAN JAN 22ND.
--------------------------------------------------------
THE INTERNET SOCIETY 1997 SYMPOSIUM ON
NETWORK AND DISTRIBUTED SYSTEM SECURITY
(NDSS '97)
10-11 FEBRUARY 1997
SAN DIEGO PRINCESS RESORT, SAN DIEGO, CALIFORNIA
This fourth annual symposium will bring together researchers,
implementors, and users of network and distributed system security
technologies to discuss today's important security issues and
challenges. It will provide a mix of technical papers and panel
presentations that describe promising new approaches to security
problems that are practical, and to the extent possible, have
been implemented. We hope to foster the exchange of technical
information and encourage the Internet community to deploy
available security technologies and develop new solutions to
unsolved problems.
WHY YOU SHOULD ATTEND
The use of the Internet is rapidly growing and expanding into
all aspects of our society. Commercial organizations are coming
under increasing pressure to make their services available on-line.
This in turn is increasing the need for rapid and widespread
deployment of usable and effective network and distributed system
security technologies. High visibility attacks on the Internet
underscore the vulnerabilities of the Internet and the need to
solve its security problems. There is growing concern for securing
the network infrastructure itself. Recent trends in software
distribution (such as Java and ActiveX technologies) have made
certain attacks easier to carry out. Privacy has become an
important issue for the Internet.
NDSS '97 will bring together researchers, implementors, and users
of network and distributed system technologies to discuss today's
important security issues and challenges. We have selected the
technical papers and panel presentations that describe promising
new approaches to security problems that are practical, and to
the extent possible, have been implemented. Topics to be addressed
include Internet infrastructure and routing security, security
for the World Wide Web, Java and ActiveX security, cryptographic
protocols, public key management, and protection of privacy.
The symposium will have a positive impact on the state of Internet
security. You will have the opportunity to actively participate
in the dialog. Ask questions of the speakers, raise your important
issues during the panel sessions, and let other participants know
of your requirements, observations, and experience in this
important area. We hope to encourage the wide-scale deployment
of security technologies and to promote new research that can
address the currently unmet security needs of the Internet
community.
<snip>
Additional information about the symposium and San Diego, plus
on-line registration, are available via the Web at:
http://www.isoc.org/conferences/ndss97
SPONSORSHIP OPPORTUNITIES AVAILABLE!
Contact Torryn Brazell at the Internet Society at +1-703-648-9888
or send E-mail to Ndss97reg@isoc.org.
------------------------------
Date: Mon, 13 Jan 1997 08:47:48 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: File 3--InfoWarCon6 - Brussels, Belgium (fwd)
---------- Forwarded message ----------
Date--Sun, 12 Jan 1997 23:11:16 -0500
From--"Betty G. O'Hearn" <betty@infowar.com>
D I S T R I B U T E W I D E L Y
CONFERENCE ANNOUNCEMENT
InfoWarCon 6:
"War By Other Means"
Economic Espionage, CyberTerrorism and Information Assurance
Brussels, Belgium
May 8 - 9, 1997
Pre-Conference Tutorials: May 7, 1996
Sponsored by:
National Computer Security Association / www.ncsa.com
Winn Schwartau, Interpact, Inc. / www.infowar.com
Open Source Solutions, Inc, / www.oss.net
Honorary Chairperson:
Judge Danielle Cailloux
Investigating Magistrate,
Member of the Committee to Control the Intelligence Services, Belgium
Information Warfare is no longer just for the military or
government. InfoWar is a legitimate concern for the private
sector and law enforcement - everywhere. Hundreds of
representatives from over thirty countries will interact at
InfoWarCon 6 with world-class presenters in an open-source,
unclassified forum to provide workable, real-world solutions to
the commercial, legal and technical problems we face.
Over two days, the three tracks and plenary sessions will focus
on:
1. Military, Intelligence, Nation-States and Government
Contractors. What are their special needs and concerns. Leaders
from all areas will bring you current with their approaches.
2. Cyberterrorism and Crime: Law Enforcement, Domestic, National
and International. Case histories and experience from those who
know will provide the foundation for solutions and cooperation
to a spreading problem.
3. The Private Sector and Commercial Infrastructure: Leading
experts on information assurance will provide new models for
security, management and infrastructure protection.
Optional Pre-Conference Tutorials (May 7)
>
Three Pre-Conference tutorials will be offered to get the non-technical manager,
law enforcement or government representative 'up to speed' on InfoWar:
>
>A. Open Source Intelligence. Robert Steele, ex-CIA case officer and
intelligence professional, will teach you how and why the smart nation and
competitive private company needs to use information gathering to his best
advantage.
A full day of extraordinary information and materials.
>
B. Information Security Basics. Dr. Mich Kabay, NCSA's Dir. of Education will
take the non-technical manager on a three and one half hour tour of the
fundamentals of
information security. Essential knowledge for anyone involved with information
warfare, cyberterrorism or defending against them.
C. The Basics of Information Warfare and Cyberterrorism.Winn Schwartau, the man
who wrote the books on Cyber-terrorism and Information Warfare, will teach the
>non-technical participant the ins and outs in a fascinating 3 1/2 hour session.
>For Registration Information
> Kim Imler
> Voice: (717) 241-3226
> Fax: (717) 243-8642
> Email: kimler@ncsa.com
> WWW: www.Infowar.com
> www.ncsa.com
>
>Sponsorship Opportunities - Multiple level sponsorship
>opportunities and exhibit space is available. Contact:
> Harry Brittain
> Voice: (717) 241-3258
> Fax: (717) 243-8642
> Email: hbrittain@ncsa.com
>
>MARK YOUR CALENDARS:
>
>InfoWarCon 7,
>Sept. 11-12, 1997
>Washington D.C.
>Submit Abstracts and Papers to:
>Betty@infowar.com
DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT
in the subject line.
Subscribe infowar TO JOIN GROUP
Unsubscribe infowar TO LEAVE GROUP
Help infowar TO RECEIVE HELP
TO POST A MESSAGE: E-Mail to infowar@infowar.com
_____________________________________________________
Infowar.Com
Interpact, Inc.
Winn Schwartau
winn@infowar.com
http://www.infowar.com
813-393-6600 Voice
813-393-6361 FAX
Sponsor Opportunities/Comments/Help
Betty G. O'Hearn
Assistant to Winn Schwartau
http://www.infowar.com
betty@infowar.com
813-367-7277 Voice
813-363-7277 FAX
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Betty G. O'Hearn Assistant to Winn Schwartau
http://www.infowar.com
betty@infowar.com
813-367-7277 Voice 813-363-7277 Data/FAX
"Success is to be measured not so much by the position that one has reached in
life as by the obstacles which he has overcome while trying to succeed.
~~~Booker T. Washington~~~
------------------------------
Date: Thu, 30 Jan 1997 18:05:13 -0600
From: " Monique J. Lemaitre" <tc0mjl1@corn.cso.niu.edu
Subject: File 4--Call for papers: 6CYBERCONF
Call for Papers:
6CYBERCONF
Sixth International Conference on Cyberspace
June 5th to 8th, 1997. University of Oslo
Website: http://televr.fou.telenor.no/cyberconf
We already live part-time in cyberspace, and that time is increasing as
fast as the quality of the experience is radically changing. The Sixth
International Conference on Cyberspace addresses the social, political and
cultural implications of cyberspace from a critical as well as
practical standpoint. In the nets, there is a growing society that ranges
from researchers to Silicon Valley sophisticates to neocyberpunks.
6CYBERCONF offers the opportunity for exchange within and between these
confluent and diverse interests and encourages discussion between
theoreticians and practitioners. Hosted for the second time in Europe, this
sixth edition of CYBERCONF considers: cyborgs looking for a home, the
future body, interface/interaction breakthroughs, and the importance of
collaboration in virtual environments.
CONFERENCE FORMAT
The official opening of 6CYBERCONF is scheduled for Thursday afternoon,
June 5th. The conference will take place over three and a half days. There
will be 6 keynote speakers, 15 plenary sessions, electronic art
installations, special events, a pre- conference workshop on immersive
environment design, and a banquet dinner on Saturday June 7th. All
sessions are designed to foster discussion. Presentations will be in
English. The themes are:
CYBERSPACE METAPHOR?
The cyberspace metaphor is a means of effecting instantaneous fusion of two
separate realms of experience (man/machine, good/bad, self/world) into one
illuminating, iconic, encapsulating image. Is the metaphor still a way to
proceed from the known to the unknown in cyberspace? Is the metaphor a
critical synthesis of complex communications technologies, bio-sociality or
techno-sociality? Is cyberspace a new metanarrative of progress, or a story
of paradise lost? Which language for the virtual age?
VIRTUAL SUBJECTS ON THE ROAD
A cyborg is a double articulation in which we find both the end of the
subject and a new dispersed and refracted subjectivity constructed in
cyberspace. The fabric of cyberspace dresses us in the cloth of
possibilities -the virtual subject as a switchboard of souls? Can we
really construct and reconstruct any identities and personalities? Will
not the "real" subject implode in its multiplicity? Or is it a question of
mastering ones avatar puppets on a global playground? Do we need
psychiatrists for avatars? Logged off, where does the will of the
cyberpersonality go?
HACKING THE FUTURE BODY
McLuhan argued that electronic media reintegrated the senses. How are
bodies represented through information technology? How can cyberspace give
priority to the lower senses? How is desire constructed through virtual
worlds? Are there darker domains of e-motional interference beyond the
emoticons? Is there a "violence of connectivity"? What about cybersex? Are
we masturbating our way into the year 2000? Will sexuality become a post-
biological phenomenon? Is the future body a recombinant structure of flesh
or schizoid realities?
ZONES / INTER-ACTION
i) INTER-FACE is the sensitive boundary zone of negotiation between human
and machine, allowing seamless crossings between the worlds: Facilitating
the disappearance of the difference between them - emerging new set of
human/machine relations - interweaving calculation, simulation and
post-modern culture. How can we design for tacit knowledge and bricolage?
How can we account for differing incentive structures between designers and
users? Which concealed design codes promote or dissemble functionality?
How to extend the interface into social/material space, transforming it
into an environmental power? Away from the daily prayer at the desktop,
when technology becomes transparent and disappears, where will it take us?
ii) The rapid development of Internet and WWW have limited the definition
of INTER-ACTION as the click of the mouse. How can interaction become a
mutual and simultaneous activity on the part of the participants
(man-machine-man interaction) in art and education? If the computer adds
an interference to communication, how can it be used creatively? What is
interaction beyond the Web?
LABORATORIES FOR COLLABORATION
Many of us are today involved in group interaction through
telecommunication networks. In the future the 2D interface of the web will
shift to 3D interactive interfaces. How will this affect the way we
perceive our collaborators and our usage of information? Will it be a
preferred medium to social interaction - opening up new possibilities
within a group, organisation or community?
INCLUSION - EXCLUSION
What about the politics of networks? Which impact will commerce have on the
the internet community? How will the powerstructures of the internet
affect the behaviour of netizens? What about the diversity of cyberspace
cultures? What is "freedom of speech" in a global context?
CALL FOR PAPER ABSTRACTS
To submit an abstract for the potential inclusion of your paper in the
6CYBERCONF programme, please follow these format guidelines:
=B7 Title of the paper
=B7 Author(s)
=B7 Institutional affiliation (if any)
=B7 Chosen 6CYBERCONF theme (from the list above)
=B7 Abstract, 500 words maximum
=B7 Brief biography, 100 words maximum
=B7 Audio-visual equipment requirements
=B7 Contact information (email preferred)
There are two ways to submit abstracts:=20
1) Email with the subject topic to abstracts@televr.fou.telenor.no or=20
2) mail both a printed copy and a PC or MAC diskette to: 6CYBERCONF/ Morten
Soby, University of Oslo, P.O. Box 1092, Blindern, 0317 Oslo, Norway.
The selection will be done by an international and a local committee made
up of academics, theorists, artists and technicians in the field.
Submission of an abstract indicates the submitter's intention and
capability to write and present the corresponding, full length paper, if
chosen.=20
Papers will be allotted a half hour for presentation in English.
Please be advised that the selection committees will not consider abstracts
that are not formatted as stated above nor papers that have been previously
published.
All abstracts and papers will be published in the proceedings (paper and
Web-edition).
DEADLINES
Deadline for reception of abstracts: March 15, 1996
Notification of selection for presentation: April 15, 1996
Deadline for registration: May 1, 1996
FINANCIAL ASSISTANCE
The registration fee will be waived for those presenting a paper in
6CYBERCONF. In addition, a limited number of grants are available to those
presenters who demonstrate financial need. These grants may cover the costs
of travel and accommodation.
FEES & REGISTRATION
The registration fee for attending 6CYBERCONF is US$ 250 (US$ 50 for
students). For detailed information on how to register and information on
travel and accommodation, check our Website or
mailto:info@televr.fou.telenor.no
LOCATION
6CYBERCONF will take place in an auditorium of the Helga Engs Building,
University of Oslo.
CONFIRMED KEYNOTE SPEAKERS
Arthur Kroker (Canada)
Marilouise Kroker (Canada)
Pierre Levy (France)
Allucquere Rosanne Stone (USA)
Florian Roetzer (Germany)
SPECIAL EVENTS
=B7 Immersive Environment Workshop: The pre-conference workshop will give a
limited number of participants a unique opportunity to get hands on
experience on how to design and develop and use a variety of immersive
systems. Both technical and social science related topics will be covered.
The workshop will be tutored by scientist researchers from Telenor R&D.
=B7 e~on exhibition - will focus on electronic art made in Norway, but will
include international participation as far the budget allows
=B7 Public panel debate (with key note speakers and special guest)
=B7 "Cyberdesign -97" presentation: the award winner of Telenor Research VR
design competition.
The list of keynote speakers and special events is preliminary; more to be
added. Please visit our Website for more information and updates on
6CYBERCONF.
ORGANIZERS
Cyberconf Director: Allucquere Rosanne Stone,
Professor and Director of the Interactive, Multimedia Laboratory at the
University of Texas at Austin
http://www.actlab.utexas.edu/~sandy
Conference Coordinator: Morten S=F8by,
Research Fellow, Institute for Educational Research, University of Oslo
Email: m.k.soby@ped.uio.no
http://www.uio.no/~mortenso/
Phone: + 47 22855383 Fax: + 47 22854250
Conference Coordinator: Ola =D8deg=E5rd,
Researcher, Manager of The Televirtuality Research Group at Telenor
Research and Development.
Phone: + 47 63848885 Fax: + 47 63810076
Email: ola.odegard@kjeller.fou.telenor.no
http://televr.fou.telenor.no/~olao/olao.html
Coordinator Interactive Installations: Stale Stenslie,
Artist and Reseacher, Telenor R&D, Cologne/Oslo.
Phone: + 47 90562963 Fax: +47 63810076
Email: stahl@rosa.nta.no
http://televr.fou.telenor.no/~stahl/stahl.html
FOR FURTHER INFORMATION
Send e-mail to: info@televr.fou.telenor.no
See the Web site for continuous updates:
http://televr.fou.telenor.no/cyberconf - or contact directly
Registration, Hotel booking, Flights:
Project secretary 6Cyberconf: May Krosby
Phone: + 47 638 48 341 =20
Fax. + 47 63 81 98 10
Email: may.krosby@kjeller.fou.telenor.no
http://televr.fou.telenor.no/cyberconf/
Abstracts, Papers, Information:
Conference Editor: Vibeke Kl=F8vstad
Phone: + 47 22426980 / 22426892#126
Email: vibeke.klovstad@kulturkanalen.no
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Research Fellow Morten Soby
Institute for Educational Research, P. O. Box 1092, Blindern, N-0317 Oslo
Phone: +47 22855383 Fax: + 47 22854250 Home: + 47 22952775 GSM: 926332=
18
Homepage: http://www.uio.no/~mortenso/
Coordinator 6CYBERCONF: http://televr.fou.telenor.no/cyberconf/
------------------------------
Date: Tue, 28 Jan 1997 09:19:26 -0400
From: Russ@NAVIGATORS.COM(Russ Haynal)
Subject: File 5--DC-ISOC Tidbits
Hello DC-ISOC,
I hope your New Year is off to a good start.
This message contains a couple of requests and a half-day conference
announcement that should be of interest to many of you...
Russ Haynal
=========================================================================
Want to go to CommNET ???
CommNET Is a large industry conference and trade show being held NEXT WEEK
in the Washington Convention Center. If you have never been able to make
it to CommNET, I am happy to provide you with just the excuse/opportunity
you need to attend this great show.
The Internet Society (ISOC) has been given a booth for the show. ISOC will
provide someone at all times to manage the booth. However, the Internet
Society is seeking additional volunteers to help staff the booth. A Key
responsibility would be to accept new member registrations. A Secondary
responsibility would be to answer questions and hand-out literature.
"Working the booth" is a great way to meet many people and share your
knowledge about the Internet/ISOC.
The Convention floor hours are 10-6 on February 4-6. Volunteers would only
have to work one (or more) 2-4 hour shifts.
Volunteers should be ISOC members, or people who will sign up as
members. (It doesn't make a lot of sense to have someone in the booth
talking up ISOC and not spending $35 to be a member.)
Anyone interested in volunteering or finding our more details should
contact Mary Burger at the Internet Society Headquarters (703-648-9888). A
CommNET Booth is a great opportunity for ISOC, please help to make this a
success.
================================================================================
DC-ISOC Meeting Locations...
As always, the DC-ISOC would like to hear any leads you may have on (free)
meeting places in the DC metro region, large enough to hold 200 people.
We were able to hold our last meeting at the Marriot Hotel, thanks to the
costs being absorbed by Network Solutions ( http://www.netsol.com ). If
your organization is interested in covering the costs of a DC-ISOC meeting,
please contact Russ Haynal (russ@navigators.com or 703-729-1757) Sponsors
do receive visibility/recognition to the DC-ISOC Membership (Mailing list
includes over 1500 Internet industry participants located mostly in the DC
Metro area)
========================================================
Conference Announcement....
Digital Dilemmas: Defining Ethics in the Internet Age
The Internet revolution has sparked a fierce debate among the business,
academic, computer, and public policy communities. Today, we are grappling
with complex ethical questions such as
* Must society ensure that all people have equal access to the Internet?
* Can we bridge the gap between network haves and have-nots?
* Can the Internet remain a haven for free expression, discreet
information consumption, and private transactions?
* Can we strike a balance between individual interests and
commercialism on the Internet?
These new-age questions defy easy answers. They demand new-age solutions.
Take part in the debate. Attend Marymount University's conference,
Digital Dilemmas: Defining Ethics in the Internet Age.
Ethics, Access, and the Internet
This conference is for high-tech companies, consumer advocates, cybernauts,
academicians, and policy makers who are surveying the landscape of ethical
considerations in the Internet Age. Along with the changing structure of
communications within our society, we are faced with ethical dilemmas of
* Equal access
* Free speech
* Intellectual property
* Privacy
* Regulation
* Electronic commerce
Marymount has assembled an impressive cadre of speakers and panelists who
are at the forefront of ethical debate in the Internet Age.
Join us for this half-day conference as we explore the controversial issues
of ethics, access, and the Internet.
Panel One:
Moving Beyond the Wire: Who Gains? Who's Left Behind?
Whose Internet is it, anyway? Popular opinion holds that the Internet is
the great equalizer. No one knows whether you're rich or poor, urban or
rural, young or old. No one knows your gender, race, or education.
The push is on to wire up our schools, homes, and businesses. But what
happens to those who aren't willing or able to get connected? Will they be
left out of future political and social debates? Will they miss out on
economic opportunities? Is the Internet setting up exclusion criteria,
information elites, electronic inequities? What is the impact of the
Internet on our society and our economy? What's the role of government and
the private sector in ensuring equal access?
Panel Two:
Uncharted Waters: Privacy, Intellectual Property, and the First Amendment
With the unexpected and explosive growth of the Internet, governments,
regulating agencies, and individuals in a position of public trust or
public office have begun to recognize the power of this new communications
medium. In the interest of "protecting" their constituencies, many powerful
interests are getting involved. Recently, the issues of privacy,
intellectual property, and First Amendment rights have come under intense
scrutiny, but precious few legal decisions have charted our course.
Are we adrift in a sea of unresolved legal and ethical quandaries? Is the
Internet headed for the rocks? Will proposed "solutions" render the
Internet powerless? Will free marketers and brash commercialism sail over
the free sharing of information? Should technology influence culture or
vice versa?
Conference Planning Committee:
Chair: Jack McDonnell, President and CEO, Transaction Network Services, Inc.
Dan Bannister, President and CEO, DynCorp
Mario Morino, Chairman, Morino Institute
Stephen Allis, Director, Government Affairs, KPMG Peat Marwick, LLP
Robert Sigethy, Dean, School of Business Administration, Marymount
University
Paul Byers, Director, Center for Ethical Concerns, Marymount University
Agenda at a Glance
8:30 - 9:00 Registration
9:00 - 9:05 Welcome to Marymount
9:05 - 9:30 Keynote Speaker - Tom Bliley, Chairman, House Commerce
Committee
9:30 - 10:30 Beyond the Wire: Who Gains? Who's Left Behind?
Moderator: Brit Hume (Fox News, Chief Washington
Correspondent and Managing Editor)
Speakers:John Sidgmore, CEO, UUNet, Technologies, Inc.
Bill Melton, President and CEO,
CyberCash, Inc.
Larry Irving, Assistant Secretary for
Communications and Information, Department
of Commerce (invited)
10:30 - 10:45 Coffee Break
10:45 - 11:45 Uncharted Waters: Privacy, Intellectual Property, and
the First Amendment
Moderator:Paul Byers (Director, Center for Ethical
Concerns, Marymount University)
Speakers:Don Heath, President, Internet Society
Guest, Freedom Forum
Harry Litman, Deputy Assistant Attorney General,
Department of Justice
12:00 - 1:00 Luncheon
Speaker:Tom Kalil, Senior Director to the National
Economic Council
Note: Schedules are subject to change. For the latest information, visit
our Web site at http://www.marymount.edu
Roads to Marymount University
From north of Washington, D.C.:
Take Interstate Rt. 95-South to 495-West to Exit 14 (George Washington
Parkway-South) to Rt. 123-North (Chain Bridge Road). Follow to traffic
light at end of road. Turn right onto Glebe Road (Rt. 120-South) and follow
for 2.5 miles. Marymount is on the left.
From south of Washington, D.C.:
Take Interstate Rt. 95-North, which becomes 395 inside the Beltway. Exit
Glebe Road (Rt. 120-North), marked "Marymount University." Continue on
Glebe Road 6 miles. Marymount is on the right.
From Rt. 66 (either direction):
Exit Glebe Road (Rt. 120-North). Drive 1 mile. Marymount is on the right.
If you or any of your guests require special consideration because of
physical disabilities, please notify the Office of Campus Safety at (703)
284-1601 at least 48 hours prior to your visit.
Sponsored by Marymount University's School of Business Administration and
Center for Ethical Concerns
Marymount University - Located in Arlington, Virginia, Marymount is an
independent, comprehensive, Catholic university offering programs to more
than 4,000 men and women at the undergraduate and graduate levels.
Marymount strives to foster the intellectual, moral, spiritual, social,
cultural, and physical development of each student through an education
that combines the liberal arts tradition with career preparation.
Center for Ethical Concerns - One of the hallmarks of Marymount University
is its commitment to providing a values-based education. The Center for
Ethical Concerns was founded in 1993 to provide a forum for the exchange of
ideas about ethical issues and problems. Through lectures, seminars,
workshops, and symposia, the Center offers students, faculty, and the
public opportunities to examine ethical concerns facing society.
Design by: Franek Design Associates, Inc.
Printing by: Print Pro, Inc.
Marketing by: Marketek
Register Today
Digital Dilemmas: Defining Ethics in the Internet Age
March 12, 1997, 8:30 a.m. to 1:00 p.m.
Marymount University, Arlington, Virginia
To register, complete this coupon (please print or type) and fax it to
Marymount University at (703) 284-1544. Or register via the World Wide Web
at http://www.marymount.edu after January 31.
o Yes, sign me up for the conference
NAME
TITLE
ORGANIZATION
ADDRESS
CITY STATE ZIP
PHONE
FAX E-MAIL
Please indicate payment method:
Charge my: o Visa o MasterCard
Card # Exp. date __________
Signature __________________________________________________
o Check enclosed
Make checks payable to Marymount University.
Send this form to: Marymount University
c/o Barbara Favola
Office of the President
2807 North Glebe Road
Arlington, VA 22207-4299
Registration fees: o $100 o $45 - students (must show ID)
Register early; seating is limited. All registrations must be received by
March 5. No refunds provided for cancellations after March 1. However, your
registration may be transferred to another individual if you cannot attend.
------------------------------
Date: Wed, 8 Jan 1997 15:38:35 -0800
From: Sara Winge <sara@ora.com>
Subject: File 6--"DNS and BIND," and "Mastering Regular Expressions"
FOR IMMEDIATE RELEASE
January 8, 1997
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
Sara Winge
707/829-0515
sara@ora.com
NEW EDITION OF O'REILLY'S CLASSIC NUTSHELL HANDBOOK "DNA AND BIND"
SEBASTOPOL, CA-O'Reilly & Associates announces the publication of the
second edition of "DNS and BIND," a complete guide to the Internet's
Domain Name System (DNS) and the Berkeley Internet Name Domain (BIND)
software, the UNIX implementation of DNS. The new edition also covers
using DNS and BIND with Windows NT. It's a complete update of this
classic Nutshell Handbook, which has served as *the* source of
information on DNS and BIND for system administrators who manage domain
or name servers.
DNS is the system that translates hostnames (like "rock.ora.com") into
Internet addresses (like 192.54.67.23). Until BIND was developed, name
translation was based on a "host table"; if you were on the Internet,
you got a table that listed all the systems connected to the Net and
their addresses. As the Internet grew from hundreds to hundreds of
thousands of systems, host tables became unworkable. DNS is a
distributed database that solves the same problem effectively, allowing
the Net to grow without constraints. Rather than having a central
table that gets distributed to every system on the Net, it allows local
administrators to assign their own hostnames and addresses and install
these names in a local database. This database is automatically
distributed to other systems as names are needed.
In this new edition of "DNS and BIND," the authors describe Bind
version 4.8.3, which is included in most vendor implementations today.
In addition, readers will find complete coverage of Bind 4.9.4, which
in all probability will be adopted as the new standard in the near
future.
In addition to covering the basic motivation behind DNS and how to set
up the BIND software, this book covers many more advanced topics,
including how to become a "parent" (i.e., "delegate" the ability to
assign names to someone else); how to use DNS to set up mail forwarding
correctly; debugging and troubleshooting; and programming.
# # #
DNS and BIND, 2nd Edition
By Paul Albitz & Cricket Liu
2nd Edition December 1996
438 pages, ISBN: 1-56592-236-0, $32.95 US
=========================================================================
FOR IMMEDIATE RELEASE
January 10, 1997
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
Sara Winge
707/829-0515
sara@ora.com
O'REILLY RELEASES "MASTERING REGULAR EXPRESSIONS"
SEBASTOPOL, CA--Programmers who delve into O'Reilly and Associates'
new book "Mastering Regular Expressions" can save themselves time and
aggravation while dealing with documents, mail messages, log files--any
type of text or data--by tapping the power of regular expressions. For
example, regular expressions can play a vital role in constructing a
World Wide Web CGI script, which can involve text and data of all
sorts. Those who don't use regular expressions yet will discover a
whole new world of mastery over their data in "Mastering Regular
Expressions." Experienced users will appreciate the book's
unprecedented detail and breadth of coverage.
Regular expressions are not a tool in and of themselves, but are
included as part of a larger utility. The classic example is grep.
These days, regular expressions can be found everywhere, such as in:
- scripting languages (including Perl, Tcl, awk, and Python)
- editors (including Emacs, vi, and Nisus Writer)
- programming environments (including Delphi and Visual C++)
- specialized tools (including lex, Expect, and sed)
While many of these tools originated on UNIX, they are now available
for a wide variety of platforms, including DOS/Windows and MacOS.
Additionally, many favorite programming languages (even Java) offer
regular-expression libraries, so programmers can include support for
them in their own programs.
For years, author Jeffrey Friedl has helped people on the Net
understand and use regular expressions. In "Mastering Regular
Expressions" he goes beyond mechanics and initiates readers to the art
of using regular expressions. Friedl shares the subtle but valuable
ways to think when using regular expressions as he leads readers
through the process of crafting a regular expression to get the job
done.
Regular expressions are not used in a vacuum. In this book, a variety
of tools are examined and used in an extensive array of examples. Perl,
in particular, is very well represented throughout the book, with a
major chapter dedicated entirely to it alone. Perl is extremely
well-endowed with rich and expressive regular expressions. Yet what is
power in the hands of an expert can be fraught with peril for the
unwary--"Mastering Regular Expressions" shows readers how to navigate
the minefield and become true masters of the art of regular
expressions.
# # #
Mastering Regular Expressions: Powerful Techniques for Perl and
Other Tools
By Jeffrey E. F. Friedl
1st Edition January 1997
368 pages, ISBN: 1-56592-257-3, $29.95 US
------------------------------
Date: Tue, 28 Jan 1997 12:08:42 EST
From: "Rob Slade, doting grandpa of Ryan & Trevor"
Subject: File 7--"The Basics of Computer Security" by Bellcore
VDBSCMSC.RVW 961019
"The Basics of Computer Security", Bellcore, 1995, 1-57305-047-4, U$695.00
%A Bellcore
%C Room 3A184, 8 Corporate Place, Piscataway, NJ 08854
%D 1995
%G 1-57305-047-4
%I Bellcore
%O U$695.00 +1-800-521-CORE +1-908-699-5800 fax: +1-908-336-2559
%O llavoie@notes.cc.bellcore.com mgordon2@notes.cc.bellcore.com
%P 130 minutes
%T "The Basics of Computer Security"
Essentially, this series of three short video tapes contains the rough
equivalent of three introductory chapters of a basic security
text. There is an introduction to computer security in general,
an introduction to application security, and an introduction to
application security review or audit. The material is presented
at a level suitable to the user, or perhaps a non-technical
manager.
The format is the standard talking head interspersed with slides.
The material on the slides is reprinted in booklets packaged with
the tapes. The content is generally reliable, although sometimes
the advice on minor matters is questionable. Overall
organization is good, but some sections are poorly planned and
repetitive.
copyright Robert M. Slade, 1996 VDBSCMSC.RVW 961019
------------------------------
Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.06
************************************