Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 81

  


Computer underground Digest Sun Nov 17, 1996 Volume 8 : Issue 81
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.81 (Sun, Nov 17, 1996)

File 1--Review of Charles Platt's ANARCHY ONLINE
File 2--Some Excerpts from ANARCHY ONLINE
File 3--"NetLaw: Your Rights in the Online World" by Lance Rose
File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly
File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd)
File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996)


CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sat, 16 Nov 96 15:53 CST
From: Cu Digest <cudigest@sun.soci.niu.edu>
Subject: File 1--Review of Charles Platt's ANARCHY ONLINE

ANARCHY ONLINE. By Charles Platt. New York: Black Sheep Books.
368 pp. $24.95 (cloth).

Those wishing to understand the history, development, and
background of the "computer underground" generally refer to Cliff
Stoll's THE CUCKOO'S EGG, Katie Hafner and John Markoff's
CYBERPUNK, and Bruce Sterling's HACKER CRACKDOWN as among the
most useful. Now, Platt's ANARCHY ONLINE joins this select set.

Unlike the other volumes, which use the story of legal
entanglements to organize the information in chronological
sequence, Platt provides a smorgasbord of narratives covering
topics (piracy, net porn), politics (legislative battles), law
(suits and prosecutions), personalities (pick your favorite),
events, movements, and history.

Dividing his material into two sections, "Netcrime" and
"NetSpeech," Platt offers the reader nearly 100 narratives mixed
with rich description, occasional political commentary, and a
dose of social critique as way of describing salient issues in
Cyberspace.

His introductory chapter of "A typical hacker bust" describes in
a few pages the apprehension of the "dreaded Hollywood Hacker,"
whose home was raided in 1990 by law enforcement agents, guns
drawn with a television crew in tow, for the heinous crime of
"borrowing" an acquaintance's password and logging into a
computer account without authorization. Although the "Hollywood
Hacker's" offense was trivial, the incident illustrates the
abysmal lack of familiarity of computer technology and "hacking"
by law enforcement agents. It also provides Platt with an
effective entry point into the emergence of the "computer
underground."

With Platt as our tour guide, our journey through the underground
includes a panorama of "hacker BBSes, some we see from afar, some
from the inside. Occasionally, we stop long enough to meet former
"hackers" ("Dark Phiber," "Lord Digital," "Dead Lord," "Seth")
and "hacker"-chasing agents (Scott Charney); Security wizards
(Crypto-guru Phil Zimmermann, Dan Farmer, Robert Steele, the
original "agent Steele" of CIA, not "hacking," fame, as federal
agents learned to their confused embarrassment at a CFP
conference several years ago); and an array of Net personalities.

Platt provides information from Kevin Mitnick's some-time
partner "Roscoe," who suggests that much of the personal
information in CYBERPUNK was a spoof concocted by Mitnick and
"Roscoe." He examines how state laws have curtailed Net
liberties. He brings back names from the past, including Lorne
Shantz, Bob Emerson, and Jake Baker. Martin Rimm returns in a
scathing section that describes his "Netporn study" and Mike
Godwin's perseverance in destroying the credibility of both the
study and the author.

Particularly interesting are the dozens of photographs of
previously faceless Net personalities. Hackers, law enforcement
agents, and others ranging from Cyberporn protagonists Philip
Elmer-Dewitt/Martin Rimm and Godwin/Donna Hoffman; Anti-indecency
warrior Cyberangel Colin (Gabriel) Hatcher and free-speech
advocate Declan McCullagh; Joel Furr (sans t-shirt); and many,
many others.

Given Platt's literary and extensive writing background, it's not
surprising that ANARCHY ONLINE is exceptionally well written, and
while he on occasion seems tempted to move into political
polemics, he is generally successful in pulling back. Given the
magnitude of detail he presents, his accuracy is impressive,
perhaps because he took pains to contact many of his subjects
before publication to review his commentary.

Readers who prefer extended symphonies to short riffs and three
minute air-play routines might find the staccato style of brief
tastes and images frustrating (Platt, I should mention, never
mixes metaphors). But, the breadth and detail of this volume
makes it well worth reading, and it will prove an invaluable
reference source. And, it's currently reasonably priced.

The is one problem with obtaining the book. ANARCHY ONLINE's
hardcover edition is available by mail order only.

FOR *CREDIT CARD ORDERS ONLY* DIAL 1-800-879-4214.

Cover price is $24.95. BUT netizens get almost a 50 percent
discount! If you say "I heard about it through the Internet" you
pay only $12.95 (plus shipping).

Extracts from the book are freely available for inspection at
http://charlesplatt.com

The paperback will be out next March from HarperCollins and will
be distributed through regular bookstores. (But it will probably
cost more than $12.95).
It would make a great Christmas present or, better, a
supplemental text for the classroom.

------------------------------

Date: Sat, 16 Nov 96 15:43 CST
From: Cu Digest <cudigest@sun.soci.niu.edu>
Subject: File 2--Some Excerpts from ANARCHY ONLINE

+-----------------------------------------------------+

Maverick Security Expert Advocates
Government Intervention to Secure the Internet

Robert Steele spent most of his working life in various
sections of the government bureaucracy until, at the age of
forty-two, he finally decided to go it alone. "I was deputy
director at the Marine Corps Intelligence Center," he says,
relaxing on the couch in the comfortable, traditionally
furnished living room of his home, which is nestled in wooded
country in Oakton, Virginia. With nicely bound books, a
couple of antique clocks, and elegant furniture, it's a
peaceful refuge within easy reach of his former employers at
the CIA, and no more than an hour's drive from the center of
Washington, D.C. But there is nothing peaceful or genteel
about Steele himself.
"I had spent eighteen years as a professional
intelligence officer," he says, "and discovered that a whole
lot of classified data wasn't really there. We just had a
whole bunch of facts about Soviet missile silos. Nothing on
the Third World, for instance. At the Marine Corps
Intelligence Center we were spending $3 million a year on a
system for accessing classified data from the CIA, NSA
[National Security Agency], and DIA [Defense Intelligence
Agency]--and I found that for $25,000 a year I could get
better data from open sources."
By "open sources" he means academic studies, published
papers, books, and databases accessible by private citizens
via the Internet, with no security clearance necessary.
"In 1992," Steele continues in an abrasive, rapid-fire
style, "I had made open sources a policy issue at
congressional level by working with Hill staffers who then
forced Bob Gates, director of Central Intelligence [DCI], to
set up an open-sources task force to review how he did things
and come up with recommendations for improving them."
Disgusted by the report that resulted, Stele quit and
decided to go it alone. He started sponsoring his own
conferences, the first of which was hugely successful.
Among the speakers were the chief of staff of the
Defense Intelligence Agency, a former science advisor to the
President, and the deputy director of the CIA. Attendees
included people from the intelligence community, John Perry
Barlow (cofounder of the Electronic Frontier Foundation), and
an assortment of hackers. The event gave Steele instant
notoriety. "I became a public figure," he says.
Encouraged by his successes, he became more ambitious.
"My vision expanded," he says. "I wanted to help the American
economy make better use of open sources. I became concerned
with information security. Finally it seemed to me that the
only answer was to devise and implement a national
information strategy. I'm hoping that Gingrich or Gore is
going to use that phrase--"national information strategy"--in
a speech within the next two months, because I'm working with
various staffers on the Hill and in the administration whom I
really respect. My ideas are bipartisan."
Even though Steele became personally disillusioned with
his area of government, he still sees government policy as
the only way of taming anarchy online and safeguarding
systems from intruders.
"The role of government is to inform the citizenry about
security problems that exist," he says. "Then it can
establish standards to which the computer industry can rise."
But why is a government policy needed? Why can't this
problem be tackled by private industry?
"The communications and computing industries have been
criminally negligent, have not been held to any standards of
adequate engineering. If we don't have a national information
strategy that provides standards and due diligence law, we
will never be able to protect ourselves. The first
fundamental step is that our nation as a whole must be
committed to communications security."
I'm beginning to feel stuck in government-speak. What
exactly does he mean by due diligence?
"Due diligence is defined by regulation. Right now there
is no due diligence requirement for communications and
computing security. Stockholders are being screwed. They
don't realize it, but they're paying a price for corporate
management not protecting proprietary information properly.
There's no law, no regulations, and no public perception." He
pauses for emphasis. "This, I think, is the most fundamental
single weakness in this nation."
There's not a hint of doubt in Steele, and not a lot of
false modesty, either. In 1994 he wrote a bill that was
introduced in the Senate to establish his national
information strategy, which would be managed by a chief
information officer to be appointed by the Vice President.
Steele would have liked Paul Strassman to hold that position.
For himself he thought that a suitable title might be
director of national intelligence, with a subordinate
director of classified intelligence and a subordinate
coordinator for public information who would also be director
of a national information foundation that would encourage the
free flow and accessibility of data through the nation. The
whole package was supposed to cost half a billion dollars in
the first year, rising to two billion in the fourth year and
maintaining that level thereafter.
The bill, of course, was never signed into law, and
Steele admits that it had "zero impact." I suggest to him
that the cost of it alone made it impractical, but he waves
aside that objection. "If you're not talking in billions, no
one takes you seriously. When you have trillion-dollar
federal budgets, a program worth less than a billion is not
significant because it's not going to have an impact on the
nation as a whole.
"The typical computer network," he goes on, "isn't like a
house with windows, doors, and locks. It's more like a gauze
tent encircled by a band of drunk teenagers with lit
matches."
At the same time, though, he still insists that hackers
are not a cause for concern. "It is clear that eighty percent
of bad things happening to computers are being done by
authorized users doing unauthorized things. This was the
conclusion reached by the Department of Defense during a one-
year study. Hackers are just our warning signal, the sneeze
that tells you you have a cold. Hackers are not a threat.
Ignorance is the greatest threat. The individual, the
organization, the nation that doesn't understand its
electronic vulnerabilities is essentially placing itself at
risk."
Once again he stresses the need for a national policy to
establish security standards. In the meantime, while we're
waiting for government to implement his vision, he's scathing
about institutions that don't take proper steps to protect

[Sorry, but to view the rest of this text
you'll have to read the book!]

+------------------------------------------------------+

Pirate Boards: A Vanishing Species

Only a few pirates still deal in warez--just for the fun
of it. In the following case history, the pirate's real name
has been changed at his request.
"My handle was Axeman," says Mike Wollenski. "I used to
run a BBS called the GrindStone. I started it when I was
fifteen. It was a good ol' boys board, meaning that it only
served people I knew by reputation, or personally. I had one
phone lineand eighty megs of storage."
According to Mike, he never charged anyone for
membership or downloads. The operation was just a hobby.
"Making money off stolen software is a fantastic way to have
the feds come gunning after your ass," he says.
The board ran without trouble for three years, serving a
maximum of 150 users. In 1994 Mike went to college and set up
a new version of his BBS from there. Still there were no
problems, even though he was now dealing more heavily in
stolen software. "I got back into the pirate scene big time,"
he says. "I loved getting uploads, especially uploads that
were less than three days old. I used to have a contact at
IBM who would be able to get us the latest OS/2 beta source
codes for device drivers and utilities. He'd send it up and
some guys would download it and it would spread from there."
At Christmas break, Mike moved the BBS back home again
and took things one notch farther. "Right around this time,"
he recalls, "in my AC [area code], 914, an interest in
H/P/V/C/A started." H/P/V/C/A stands for Hacking, Phreaking,
Viruses, Cracking (or Carding, depending on who you ask), and
Anarchy. "Me, being the information hound that I was, decided
to join a mail network called MOBNet."
This was an informal store-and-forward message system.
Mike would accumulate a bunch of BBS messages or other data,
reduce their size with a file compression utility such as
PKZip, then pass them to another BBS. He received material on
the same basis.
"On a good day," says Mike, "I would get in a couple
hundred mes-sages, all dealing with hacking into systems, how
to crack password files on Unix hosts, how and where to find
credit card numbers, and, more importantly, how to protect
yourself from these things happening to you. So here I was, a
pirate board in 914--rather successful, as far as this area
code goes--getting pretty new files, and a ton of information
daily about the `darker sciences.'"
On Christmas Eve Mike received a warning. "I get a call
from a friend of mine, telling me, `Dude, shut it down! Kill
it! Nuke everything, and close everything up! Some kid just
got popped for credit card fraud, and he's telling the cops
that he got it from you.' Needless to say, I freaked. I
immediately took it down."
Foolishly, though, after a couple of days he put
everything back online. A couple more days after that, he was
raided.
"I'd been to the movies with my younger brother and a
friend of ours from school. I think it was at ten-thirty or
so. On our way back to my house, the car phone rings.
Understand, it was my parents' car; I had to raid the change
bin for the money to see the movie. My bro picks it up, says,
`Yeah? Uh-huh. Hmmm. Uh . . . okay. Bye.' He turns to me and
says, rather loudly, `You're going to jail! The cops came
over to the house with a search warrant and took your
computer and stuff. Mom and Dad are pissed!'"
When Mike got home he found that state police had taken
his 486SX/33 IBM-compatible computer, the monitor, keyboard,
modem, mouse, and all his software--"including the stuff I
had bought!" he says with a tone of wounded disbelief. "They
also took most of my parents' software. They tried to take my
mom's computer as well; I gather yelling ensued, and that
computer never left the house."
Mike was only a few days over eighteen. The police
promised that if he cooperated, he'd be charged as a
juvenile, there would be no felony charges, and his identity
would be kept secret. This sounded like a good deal, so he
supplied the password to unlock his system.
According to Mike, the cops then proceeded to betray
him. In February 1995 a local newspaper ran a two-part
article on hacking in which Mike was the only person
identified under his real name. A few months later, when Mike
came home from the spring college semester, he found himself
charged as an adult, with two class-E felonies carrying more
than ten years of potential jail time. He was horrified. "In
the end," he says, "my lawyer talked them down to a
violation--disorderly conduct--with a $250 fine and twenty-
five hours community service. But I had been so worried about
the case, I couldn't finish my semester at school. The cops
had lied to me outright in front of me and my lawyer, so I
had no idea what they were going to do next, and I basically
panicked."
He regrets now that he cooperated. "I should have told
them to go fuck themselves silly. But I gave them access to
my files, and because of that, a good friend of mine also got
busted. For all I know he went to jail; I don't really want
to know."
The main reason for police action against Mike's board
was not the software but the file containing credit card
numbers. "Most of them I got from a friend," he says, "but
some of them came from carbon copies in trash bins outside
the mall. It's easy to get them; you just go down there at
two A.M. when all the rent-a-cops are enjoying their
doughnuts."
He insists, however, he had no interest in the numbers.
"Once I had them--okay, great, now what? I never used any of
'em, because I have parents. They are better than any credit
card I know of. I don't have to pay interest, I don't have a
spending limit--hell, I don't even have to pay them back! So
did I sell card numbers? No. Did I give them to people? No.
Were they available if people left a message on my board?
Yes. Just like they are available anywhere else in life. What
it comes down to is that I was busted because I let people do
what they wished with my hard-drive space. I think that what
people did with my board was their own business. The police
came in and violated that right."
Mike's parents imposed some limits for a while: no modem
usage, and he had to ask permission to make phone calls.
Eventually he got his computer system back from the police--
everything except the hard drive--and computers are still his
main interest. He's hoping to make a career out of them as a
network technician.
Meanwhile, he says, pirate boards are scarcer than ever.
"After I was busted, all the local boards disappeared. As far
as I know, there's only one board left in 914. There are
still boards in other areas with a couple thousand people on
'em, but most are in the Midwest, where people are naturally

[Sorry, but to view the rest of this text
you'll have to read the book!]

------------------------------

Date: Wed, 06 Nov 1996 14:00:37 EST
From: "Rob Slade, doting grandpa of Ryan & Trevor"
Subject: File 3--"NetLaw: Your Rights in the Online World" by Lance Rose

BKNETLAW.RVW 950406

"NetLaw: Your Rights in the Online World", Lance Rose, 1995, 0-07-882077-4,
U$19.95
%A Lance Rose
%C 2600 Tenth St., Berkeley, CA 94710
%D 1995
%G 0-07-882077-4
%I McGraw-Hill
%O U$19.95 510-548-2805 800-227-0900 lkissing@osborne.mhs.compuserve.com
%O pmon@osborne.mhs.compuserve.com
%P 372
%T "NetLaw: Your Rights in the Online World"

Very similar to his earlier "Syslaw" (cf. BKSYSLAW.RVW), this is
a general guide to various legal aspects of life online. The
major changes are the broadening of the scope from BBS level
systems to include online services and the Internet, and very
handy (and interesting) sidebars, which give a thumbnail sketch
version of the topic under discussion. These usually include a
reference to some specific case.

Chapters address the issues of censorship, contracts, commerce,
and copyright. Chapter four, which deals with the responsibility
of the system operator in light of online dangers, does touch on
the topic of malicious software. I was disappointed that this is
limited to a not terribly accurate defining of terms, and almost
no discussion of the admittedly confused legal situation.
Further chapters cover privacy, crime, search and seizure, and a
rather disappointing chapter on obscenity. Appendices include
some very useful sample contracts, and various US laws.

Given recent developments which have strongly indicated the
international nature of the net and international legal
ramifications, it is discouraging to see that Rose still presents
only a limited and US-centric view. However, the general
principles he describes are held in common law, and this book
should at least provide guidance for the broader online world.

copyright Robert M. Slade, 1995 BKNETLAW.RVW 950406

==============
Vancouver ROBERTS@decus.ca | "Daughters of feminists love to wear
Institute for Robert_Slade@sfu.ca | pink and white short frilly dresses
Research into rslade@cyberstore.ca| and talk of successes with boys/
User rslade@sfu.ca | It annoys/
Security Canada V7K 2G6 | Their Mums ..." - Nancy White

------------------------------

Date: Wed, 30 Oct 1996 16:14:58 -0800
From: Sara Winge <sara@ora.com>
Subject: File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly

FOR IMMEDIATE RELEASE
October 30, 1996

PRESS ONLY--FOR REVIEW COPIES, CONTACT:
Sara Winge
707/829-0515
sara@ora.com

O'REILLY PUBLISHES "WEBMASTER IN A NUTSHELL"
Quick Reference Guide Covers HTML, CGI, Server Configuration, and More

SEBASTOPOL, CA--The latest addition to O'Reilly's best-selling "in a
Nutshell" quick reference series is "WebMaster in a Nutshell." This new
book takes all the essential reference information for the Web and
pulls it together into one slim volume. With a clean layout featuring
easy-to-browse entries and a lay-flat binding, this book is a vital
desktop reference for anyone who does work on the Web--content
providers, programmers, and administrators alike.

"WebMaster in a Nutshell" covers:
> HTML 3.2, the markup language for Web documents
> CGI, for creating interactive content on the Web
> JavaScript, a scripting language that can be embedded directly
into HTML
> HTML extensions by Netscape Navigator 3.0 and Microsoft Internet
Explorer 3.0
> Examples and descriptions of the HTML tags for creating frames,
tables, and fill-in forms
> HTTP 1.1, the underlying protocol that drives the Web
> Configuration for the Apache, NCSA, CERN, Netscape, and
WebSite servers
> Perl 5, the programming language used most often for CGI
> WinCGI, the CGI interface for Windows-based programming languages
> Cookies, for maintaining state between multiple instances of CGI,
Java and JavaScript programs
> Server Side Includes, for embedding dynamic data into Web pages

"WebMaster in a Nutshell" breaks up these topics into concise, distinct
chapters, designed to make it easy to find the information you want at
a moment's notice. This is a book that anyone working seriously on the
Web will find indispensable.

###

WebMaster in a Nutshell: A Desktop Quick Reference
By Stephen Spainhour & Valerie Quercia
1st Edition October 1996
378 pages, ISBN: 1-56592-229-8, $19.95

============================

For Review Copies
Contact Kathleen Quirk
(508)287-1882
kquirk@powersoft.com

O'REILLY PARTNERS WITH SYBASE TO REACH WEB DEVELOPERS
WebSite 1.1 Included in Internet Developer Toolkit for PowerBuilder 5.0

Sebastopol, CA, October 28, 1996 - O'Reilly & Associates, a leading
Internet software developer and book publisher, has announced that it
is partnering with Sybase to provide developers with tools for creating
Internet and intranet business applications. O'Reilly's award-winning
WebSite 1.1(TM), heralded for its features, ease of use and
documentation, is now included in the Internet Developer Toolkit, a new
product of Sybase's Powersoft development tools division.

Internet Developer Toolkit, a companion product for PowerBuilder 5.0
for Windows, enables developers to quickly extend their current
applications to the Web, as well as to build a new class of dynamic
server-based applications.

WebSite 1.1, winner of the Dvorak Award for Outstanding Server
Software, is a 32-bit multithreaded Web server for Windows NT 3.51 or
higher and Windows 95 platforms, which lets users maintain a set of Web
documents, control access to a site, index desktop directories, and use
a CGI program to display data from applications such as Excel, Access,
and SQL Anywhere. WebSite 1.1 includes WebView(TM), a powerful Web
management tool that provides a graphical display of all documents and
links on the server. WebSite features a graphical interface for
creating virtual servers, server side includes (SSI), and a framework
which significantly improves the speed and efficiency of working with
spreadsheets, databases, and other programs in environments such as
PowerBuilder.

Powersoft's Internet Developer Toolkit is currently available for the
North American retail list price of $99. The product is available
directly from Sybase, Inc. and its worldwide network of resellers and
distributors. To locate the nearest reseller, interested individuals
can call 1-800-395-3525.

In addition to WebSite 1.1, Internet Developer tool kit includes
Web.PB, based on the PowerBuilder development environment; the
PowerBuilder Window Plug-in for running PowerBuilder applications in a
Web browser; the DataWindow Plug-in, for manipulating and presenting
database information; and Internet Class Libraries, enabling developers
to maintain session or state information across HTML pages.

ABOUT O'REILLY & ASSOCIATES, INC.
Founded in 1978, O'Reilly & Associates is recognized worldwide for its
definitive books on the Internet and UNIX, and for its development of
online content and software. O'Reilly developed the Global Network
Navigator (GNN), a pioneering web-based publication which it sold to
America Online in June, 1995. In addition to WebSite 1.1, the company's
other software products include second-generation server WebSite
Professional(TM), WebBoard(TM), a web-based multi-threaded conferencing
system, and PolyForm(TM), a web forms construction kit.
Statisphere(TM), a Web traffic analyzer, will be the company's newest
software product when it is released this Winter. O'Reilly &
Associates' affiliate companies include Songline Studios, an innovative
content developer for online audiences, and Travelers Tales, an
award-winning travel book publisher. The company's Internet addresses
are http://www.ora.com/ and http://software.ora.com/.

ABOUT SYBASE, INC.
Headquartered in Emeryville, CA, Sybase, Inc., is a worldwide leader in
distributed computing solutions, with record revenues in 1995 of $957
million. The company provides customers and partners with software and
services to create information management solutions, integrate
information assets across heterogeneous systems, and communicate
information throughout and beyond the enterprise. The company's product
groups design and develop databases, middleware, application
development tools and languages to reduce the cost and complexity of
distributed computing, to create business applications for the Internet
and intranets, and to build distributed data marts and warehouses. The
company's Internet addresses are http://www.sybase.com/ and
http://www.powersoft.com/.

WebSite, WebSite Professional, WebBoard, Polyform and Statisphere are
trademarks of O'Reilly & Associates, Inc. All other names may be
registered trademarks or trademarks of their respective companies.

======================================

"BUILDING AN INDUSTRIAL STRENGTH WEB" IS FOCUS OF
ISSUE 4 OF THE "WORLD WIDE WEB JOURNAL"

SEBASTOPOL, CA--The World Wide Web Consortium (W3C) and O'Reilly &
Associates announce the publication of Issue 4 of the "World Wide Web
Journal." This issue focuses on the infrastructure needed to create and
maintain an "Industrial Strength Web," from network protocols to
application design. Over a year ago, the http protocol on the Web
surpassed the file transfer protocol as the largest application load on
the Internet. As a result, Internet performance is crumbling in many
locations, network addresses are being consumed at a prodigious rate,
and the extraordinary popularity of a handful of pages is crowding out
the rest of the Web. This issue takes a detailed look at the
technology--present and future--that's required to scale the Web to
work for millions of hosts, tens of millions of users, and billions of
pages.

The papers in this issue shed light on these challenges, and offer
state-of-the-art remedies. The "W3C Reports" section features papers
from two workshops: the Joint W3C/OMG Workshop on Distributed Objects
and Mobile Code and the Meeting on Distributed Authoring. The
"Technical Papers" section heralds the release of HTTP/1.1 with several
papers in addition to the HTTP/1.1 spec, including Future Directions
for HTTP, What's New in HTTP/1.1: Design Enhancements on the Road to
HTTP-NG, and Using Cookies with CGI: Maintaining State on the Web.

The "World Wide Web Journal" provides readers with a direct connection
to the work of the W3C. Every quarter, the "Journal" provides timely,
in-depth coverage of the W3C's activities as well as independently
refereed papers from around the world.

WORLD WIDE WEB CONSORTIUM

The World Wide Web Consortium [W3C] was created to develop common
standards for the evolution of the World Wide Web. It is an industry
consortium jointly run by the MIT Laboratory for Computer Science (LCS)
in the USA; the National Institute for Research in Computer Science and
Automation (INRIA) in France responsible for Europe; and Keio
University in Japan responsible for Asia. Services provided by the
Consortium include: a repository of information about the World Wide
Web for developers and users; reference code implementations to embody
and promote standards; and various prototype and sample applications to
demonstrate use of new technology. To date over 150 organizations are
Members of the Consortium.


O'REILLY & ASSOCIATES

O'Reilly & Associates is recognized worldwide for its definitive books
on the Internet and UNIX. In the past three years, the company has
expanded into other Internet-related endeavors, developing online
content and software and conducting market research on the online
services market.

In 1993, O'Reilly developed the Global Network Navigator (GNN), a
pioneering web-based publication which it sold to America Online in
June 1995. The company is a major developer of Win32 software for the
Internet, with software products including WebSite (Web server software
for Windows 95 and Windows NT), WebBoard (Web conferencing system), and
PolyForm (Web site form-building software). The Online Research Group,
O'Reilly's newest division, was created to survey and profile the
online services market.

# # #

World Wide Web Journal: Volume 1, Issue 4: Building an Industrial
Strength Web
A publication of O'Reilly & Associates and the World Wide Web
Consortium (W3C)
Fall 1996
250 pages (est.), ISBN: 1-56592-211-5, $24.95

------------------------------

From: Noah <noah@enabled.com>
Date: Thu, 31 Oct 1996 23:45:11 -0600 (CST)
Subject: File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd)

From -Noah


---------- Forwarded message ----------
Date--Thu, 31 Oct 1996 12:05:54 -0500 (EST)
From--The Professor <professr@netaxs.com>

January 6-10, 1997
USENIX 1997 TECHNICAL CONFERENCE
Anaheim, California, Marriott Hotel

USELINUX
Linux Applications Development & Deployment Conference
Co-located with USENIX 1997 Technical Conference
Co-sponsored by Linux International

Attendees may pay one fee and attend both conferences.

There are 20 day-long tutorials offered on January 6-7.
Topics include:
IPv6 Kerberos Approach to Network Security
Secure Java Programming Introduction to Java
Windows NT and Windows 95 UNIX Network Programming
How Networks Work Topics in System Administration
Web Security System and Network Performance Tuning
Inside the Linux 2.0 Kernel Java Applets and the AWT
UNIX Security Tools CGI and WWW Programming in Perl
Administering a Web Server Device Drivers under Linux
Solaris System Administration Beginning Perl Programming
Writing Secure Code Creating Effective User Interfaces

Java, the Web, Intranets, Security, Windows NT are among the topics of the
Technical Program which takes place January 8-10. It begins with a keynote
address by James Gosling, a creator of Java. 23 refereed papers present
up-to-the-minute research. A second track of invited talks cover cryptography,
Inktomi and AltaVista Search Engines, IPv6, benchmarks, and a new networked
operating system from Bell Labs that offers unprecedented portability for
applications and services.

Linux Torvalds speaking on the future of Linux, is one of the highlights at the
Linux Applications Development and Deployment Conference. USELINUX will offer
tutorials and technical presentations for developers. Concurrently, those
interested in the Linux marketplace may attend case studies and expert
presentations on how to create a Linux-based business.

An Exhibition on January 8-9 offers presentations of the latest hardware,
software, and networking products from 55 vendors.
ADMISSION TO THE EXHIBITION IS FREE. If you cannot make it to the conference
but would like to visit the exhibition, please contact Cynthia Deno at 408 335
9445 or cynthia@usenix.org.

For more program and registration information:

Access our Resource Center on the World Wide Web--http://www.usenix.org

Email to: info@usenix.org. In the body of your message state "send usenix97
conference"




------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.81
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT