Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 36
Computer underground Digest Sun Jun 28, 1998 Volume 10 : Issue 36
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.36 (Sun, Jun 28, 1998)
File 1--Seized the server of Islands in the Net (Italy)
File 2--"Internet Kidnapping" case update - TELECOM Digest reprint
File 3--On-Line Guitar Archive closes to avoid lawsuit
File 4-- A Week of Free Hacking (Telecom Digest reprint)
File 5--New Mailing List - Cybercafe & Community
File 6--Protecting Judges Against Liza Minnelli
File 7--DR DOS and the Browser Wars
File 8--Imaginary Gardens. The Year 2000 Fear Bug. June 11, 1998
File 9--Cu Digest Header Info (unchanged since 25 Apr, 1998)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sat, 27 Jun 1998 18:00:39 -0700 (PDT)
From: Arturo Di Corinto <arturo@Psych.Stanford.EDU>
Subject: File 1--Seized the server of Islands in the Net (Italy)
Hi Jim,
I have a very sad news. The server of Islands in the Net has been seized
by the police and we need your help to ditribute widely these infos.
Apart of that, any comments or suggestion from you will be very
appreciated.
Please insert the message below in the bulletin.
Thank you
*** please re-distribute widely ***
Saturday, June 27th at 10:30 am the server of Islands in the Net (Isole
nella Rete, an Italian non-profit association that offers communication
spaces to social centres, free radios and collectives of the movement) has
been seized by the Postal Police in Bologna for allegedly defamatory
material posted on its system.
Starting from now, and who knows for how long, the server at
http://www.ecn.org is down, its web pages are no longer available online
and all its e-mail services that permitted in the last years the
construction of a strong solidarity network among several self-organized
collectives are shut down.
The seizure took place in the office of the Internet provider hosting the
server, ordered by the State Prosecutor of Vicenza Paolo Pecori and was
executed by officers of the Postal Police of Bologna.
It is a 'preventive' seizure, claiming the crime of 'prolonged defamation'
toward a travel agency in Milan. The reason for the seizure would be the
web publication of a message posted by an Italian collective, accurate
transcription of a printed flyer publicly distributed. This message was
first sent to a mailing list (cslist) hosted by the server of Islands in
the Net and then published on the web through the usual automatic procedure.
The flyer (and the message posted on the mailing list and on the web as
well) claimed that Turban Italia Srl, a travel agency in Milan, had strong
financial ties to former Turkish Prime Minister Tansu Ciller, then
suggesting a boycott of the agency services in solidarity with Kurdistan
people persecuted by Turkish government.
Although the seizure order still does not explicitly mention any person
formally charged with the crime of defamation, the judge that ordered this
action evidently holds Islands in the Net liable for the content of
anything hosted by its Internet server. The liability of the providers for
the contents they carry is actually a very hot topic worldwide still far
from a viable solution.
However, the main direction is that Internet providers should NOT being
hold liable for the contents they carry, at least on grounds both of
technical feasibility and commercial suitability.
The order of seizure of the server (and its entire content), furthermore,
seems exceptionally harmful because it hits a service used by hundreds of
users in Italy and abroad, completely unaware of the events that conducted
to the charge. Now those users are suddenly deprived of their communication
tool, without any notice or explanation. Their rights have been clearly
violated.
We are currently closely studying the situation in order to find the best
solutions to what seems to us an extremely serious event that will, in any
case, be known far and wide.
For now the web server at www.ecn.org, all the mailing lists and all the
e-mail addresses hosted by the server are down. We are working to set up a
backup server as soon as possible.
For more info and the latest news:
http://strano.net/news
http://geocities.com/Hollywood/Set/2184/inr.html
mailing list (in Italian) <hackmeeting@kyuzz.org>
[send mail to <majordomo@kyuzz.org> including 'subscribe hackmeeting' in
the body message]
------------------------------
Date: Wed, 27 May 1998 21:11:03 -0400 (EDT)
From: editor@TELECOM-DIGEST.ORG
Subject: File 2--"Internet Kidnapping" case update - TELECOM Digest reprint
Source - TELECOM Digest Wed, 27 May 98 Volume 18 : Issue 80
((MODERATORS' NOTE: For those not familiar with Pat Townson's
TELECOM DIGEST, it's an exceptional resource. From the header
of TcD:
"TELECOM Digest is an electronic journal devoted mostly but
not exclusively to telecommunications topics. It is
circulated anywhere there is email, in addition to various
telecom forums on a variety of public service systems and
networks including Compuserve and America On Line. It is also
gatewayed to Usenet where it appears as the moderated
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
qualified organizations and individual readers. Write and tell
us how you qualify:
* ptownson@massis.lcs.mit.edu * ======" ))
==================
This is just an update on the 'Internet Kidnapping' case which was
first reported here in the Digest on Wednesday March 20, 1996 (in
volume 16, issue 131 'Youngster Kidnapped by Internet Chat Companion')
and on Friday, April 5, 1996 (in volume 16, issue 163 'Internet Kidnap
Suspect Pleads Not Guilty').
Richard Romero, believed to be 39, a native of Brazil and resident of
Jacksonville, Florida in 1996 was a frequent user of Internet Relay
Chat, and in several sessions on line, he posed as a fifteen year old
boy named 'Kyle'. During those sessions he chatted frequently with
another fifteen year old boy in Mt. Prospect, IL, a northwestern
suburb of Chicago. He and the boy exchanged photos (he had a photo of
some child who became 'Kyle' for his purposes) and at some point in
their various conversations on line, he became himself, and began to
talk with the Chicago-area boy on a regular basis via telephone.
After several phone conversations and online chats, the boy decided to
run away from home, and go live with Romero in Florida.
At some point in their various conversations, the boy's mother found
out about the online/telephone relationship and asked her son to
break it off immediatly and have no further contact with Romero.
Romero came to Mt. Prospect on March 18, 1996 and checked into a
motel in the community where the boy met him the next day. From
there, they went to the Greyhound Bus Station in Skokie, IL where
they boarded a bus bound (eventually) for Jacksonville, FL. leaving
at 9:15 AM.
When the boy failed to appear in school that day at the regular time,
school authorities contacted his mother. His mother went immediatly
to check the boy's room, where she found he had packed many of his
clothes in a duffle bag which was missing. He had also packed his
computer into a backpack. The mother reviewed her phone bills and
other items in the boy's room and found Romero's address and telephone
number in Jacksonville. The rest was easy ...
Police were able to detirmine that a boy matching the description of
her son and Romero -- whose picture she had seen earlier when she
confronted her son about his online companion -- had been seen boarding
a bus for Florida that morning at the Greyhound Station in Chicago.
The bus would be stopping for a dinner break just a couple hours
later in Louisville, KY at about 6:00 PM. FBI agents in Louisville
met the bus when it pulled in to the station there, and placed Romero
under arrest.
On April 5, 1996, the story in the Digest reported that Romero had
chosen to remain silent in court. He appeared without an attorney and
the judge (a) appointed an attorney to represent him and (b) entered
a plea of not guilty.
Since that point, Romero has had two trials. His first trial actually
ended as a mistrial, with a jury which could not reach a decision.
His second trial, which was concluded late last year, resulted in
a finding of guilty by the jury on charges of kidnapping, and transport-
ing a minor with the intent to engage in sexual activity.
At his sentencing on Thursday, May 21, 1998, Romero was sentenced to
34 years in federal prison. US District Court Judge Charles Kocoras
in Chicago stated that, "Richard Romero's crimes represented the worst
thing anyone can imagine," and that "Romero created a nightmare for
the family, for which there is no comparable dimension in the course
of human experience."
Virginia Kendall, the assistant US attorney handling the case, said
that Romero was the nation's first convicted 'Internet kidnapper'.
(Quote marks around 'Internet kidnapper' inserted by TELECOM Digest
Editor.)
And that concludes still another chapter in the history of the net.
When this story first appeared in the Digest in March, 1996, I
received mail from a couple readers who objected to the use of the
word 'Internet' as an adjective for 'kidnapper', however, since the
very beginning of this saga, the accounts which have appeared in
the print media -- most noticably the {Chicago Sun-Times} have
routinely used the phrase when discussing Romero. I've sent written
objections to the newspaper about that description, but to no avail.
PAT
------------------------------
Date: Thu, 11 Jun 1998 11:55:15 -0500
From: cal woods <woods.232@osu.edu>
Subject: File 3--On-Line Guitar Archive closes to avoid lawsuit
The On-Line Guitar Archive (OLGA) has closed its doors to try to avoid a
lawsuit from the Harry Fox Agency, which represents various music
publishers. The issues center on the legality of the files at OLGA, which
give instruction in how to play song on the guitar, in chord and/or
tablature format. OLGA goes back to pre-web days - it was originally an ftp
archive for a newsgroup - and has remained free and community-oriented.
Many many people are severly pissed off - 4000 people have signed a
petition in two days!
I thought this might be relevant to your site and of interest to your
readers. For more info, check out the OLGA web page at
http://www.olga.net/
in particular the pages
../hfa.html
../support.html
../hfa2.html
thanks a lot
cal woods
OLGA admin
------------------------------
Date: Sun, 21 Jun 1998 23:19:28 -0400 (EDT)
From: editor@TELECOM-DIGEST.ORG
Subject: File 4-- A Week of Free Hacking (Telecom Digest reprint)
((MODERATORS' NOTE: For those not familiar with Pat Townson's
TELECOM DIGEST, it's an exceptional resource. From the header
of TcD:
"TELECOM Digest is an electronic journal devoted mostly but
not exclusively to telecommunications topics. It is
circulated anywhere there is email, in addition to various
telecom forums on a variety of public service systems and
networks including Compuserve and America On Line. It is also
gatewayed to Usenet where it appears as the moderated
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
qualified organizations and individual readers. Write and tell
us how you qualify:
* ptownson@massis.lcs.mit.edu * ======" ))
==================
Source - TELECOM Digest Sun, 21 Jun 98 Volume 18 : Issue 99
Date--Mon, 22 Jun 1998 00:41:19 +0200
From--Paul Boots <bootsch@acm.org>
Dear reader,
Over the past week Holland resembled to be the hacker's paradise
of old; initiated by the "Cracking Competition" called for by ISP
World Online. To blow of steam and steer my agressive energy towards
positive motion I have written this small fragmented evaluation.
The whole thing caused a lot of rumour. It involved the national
press (papers, radio, tv and ezines) where different parties had
a chance to throw their opinions, allegations, reality-distortions
and a lot of mud. The press itself was a party in this whole thing
as well. The image of the hacker as young innocent geek hero revisited.
In the digital age all boundaries blurr; there are really no exceptions
(personally I doubt that boundaries have ever been very clear).
After witnessing this 'event' from very close my conclusion is a sad one:
"The part of the Internet called Holland" is far from being a save and
secure public infrastructure.
It seems a lot of companies and individuals involved do not understand
their responsibilities or even worse, are ignorant of the fact that
they have certain responsiblities.
Their have been multiple claims of unsecurity of an ISP, this ISP is
still in a phase of denial. Nobody outside this ISP really knows what
really is the case: broken into or not, full of holes or not. Details?
The claims of unsecurity are not widely published in detail either.
How exactly is the ISP insecure. How were claimed breakins executed?
All questions remain unanswered. Is this ISP save or not? Have there
been breakins? What were the intentions of claimed breakins?
The fact that a major ISP is claimed to be unsecure and broken into
ultimately is not just an issue for that ISP and it's customers. It
will become an issue for any indivual or company dealing with this ISP
or it's customers! It will become an issue for the ISP suppliers as
well; hardware, software and network facilities. It will become an
issue for fellow ISP's as well as their customers.
After all the gigling, finger pointing and mud throwing where does this
leave all people not directly involved in this 'incident'?
How many steps are needed to involve you?
Hackers come in as many forms as people do. This means there are
hackers for hire. They make money, a lot of money. They are hired by
so called governments, governments agencies, multi-nationals and other
companies, organized crime, terrorist groups and probably political
activist groups as well. Basically anybody with enough money and
purpose.
Let's assume their was in fact a professional breakin at certain ISP.
This breakin happily went unnoticed due to all the fuzz around a
certain "Breakin contest" called for by same ISP. Let's assume as
well that this ISP remains unaware of the intruders after the dust
settles. Would you still feel very secure?
For the benifit of all netizens every claim of breakin (or whatever
maliscious digital act) need to be taken seriously and verified.
Every ISP should be forced to have its anwers regarding questions on
such incidents checked and verified by trusted third parties.
Of course you can only feel secure and save upto a certain level, but
I rather live in an open and free society than in one plagued by
paranoia and fear.
------------------------------
Date: Thu, 18 Jun 1998 22:45:28 -0700 (PDT)
From: President b!X <baby-x@millennium-cafe.com>
Subject: File 5--New Mailing List - Cybercafe & Community
Cybercafe & Community Mailing List
cybercafe-community@millennium-cafe.com
http://www.millennium-cafe.com/cybercafe-community/
Dedicated to discussing how cybercafes can position themselves as hubs of
community activity (and even activism), becoming not merely part of the
global communities of the net but part of the local communities where they
are located.
Matters of interest may include:
* Can cybercafes play some of the roles of the more traditional
community computer networks, especially since cybercafes provide a
physical presence for any networked community, which traditional
community networks lack?
* Are cybercafes valuable sites for local/neighborhood activism and
political activity?
* Does the identity of cybercafes as profit-making business ventures
negatively impact their ability to play an active social role in the
community which it serves?
Welcome participants include: concerned cybercafe owners, community
network specialists, community/neighborhood activists, and any other
legitimately interested individual.
To subscribe, send email to majoromo@millennium-cafe.com with no Subject
header and a body containing only the words
subscribe cybercafe-community
and then respond as required to the confirmation message you will receive.
There is not at present a digest version of this list.
Although not available at the present, a web archive for the list will be
made available at a later date.
Christopher D. Frankonis, President baby-x@millennium-cafe.com
------------------------------
Date: Tue, 23 Jun 1998 07:06:54 -0400
From: Jonathan Wallace <jw@bway.net>
Subject: File 6--Protecting Judges Against Liza Minnelli
Protecting Judges Against Liza Minnelli:
The WebSENSE Censorware at Work
By The Censorware Project
http://www.spectacle.org/cwp/
June 21, 1998
In April, the Censorware Project reported that the WebSENSE
blocking software from NetPartners Internet Solutions of San Diego
was in use in the federal courts in the Eighth, Ninth and Tenth
Circuits, covering twenty-two states and Guam. WebSENSE is also
installed in the Orange County, Florida, and Fulton County,
Indiana public libraries. (The April 22 Censorware Project report
is at http://www.spectacle.org/cwp/courtcen.html)
said: "Its an outrage....I don't do stuff like that to my
children." (Quoted in James Evans, "Blindered Justice: 9th
Circuit Judges Chafe Over Software That Restricts Access
to X-Rated Internet Sites", Los Angeles Daily Journal, April 27,
1998, p. 1.)
After publicizing the installation of censorware in the federal
court system, The Censorware Project evaluated the WebSENSE
product. We wanted to determine what kind of speech the court
administrators were seeking to keep from the judges' eyes.
The answer: our tax dollars are being spent to protect judges,
and library users, against Liza Minnelli, Jewish teens, a grocer,
a speakers' bureau, a mortgage company--and some free speech
advocates.
All of these sites are blocked by WebSENSE under the Sex1, Sex2
or Adult Entertainment categories, the settings used in the
federal courts and in libraries.
On its website at http://www.websense.com,
NetPartners brags that:
[W]e do not use key
words or wild cards when adding
sites. Instead, we rely on our team of
Internet surfers who personally check
each potential site to verify the
contents..... This
process ensures that only those
sites that actually meet the category
definitions are included in the
database.
The Censorware Project tested WebSENSE to see if this claim
could be verified. We discovered that, like any censorware
product, WebSENSE blacklists numerous sites erroneously.
We concentrated on sites blocked under WebSENSE's Adult, Sex1
and Sex2 categories, which are enabled in both the federal
court's and Orange County library's WebSENSE implementations.
The company defines Adult as "Adult Entertainment --Full or
partial nudity of individuals. This might include strip clubs,
lingerie, adult- oriented chat rooms, erotica, sex toys, light
adult humor and literature, etc." Sex1 is defined as "
(Pornography) --Heterosexual activity involving one or two
persons, hard-core adult humor and literature, etc." Sex 2 is
described as "(Sexuality/Lifestyles) --Heterosexual acts
involving more than two people; homosexual and bisexual acts,
orgies, swinging, bestiality, sadism, masochism, fetishes, etc.,
and related hard-core adult humor and literature."
The following pages are a small sample of the sites we found
inappropriately blocked by WebSENSE:
The Liza Minnelli Web Site,
http://cobweb.cc.oberlin.edu/~dfortune/lizapage.html, blocked as
Adult Entertainment 3. Includes a discography, photos of the
singer, and links to other relevant sites.
The Jewish Teens page, http://www.jewishteens.com, blocked as
Sex 2. Its current top page includes articles on "How to Talk to
Your Kids About the Holocaust" and "Jewish Female Role Models for
Our Daughters."
The Laboratory of Molecular Medicine at Michigan State,
http://www.msu.edu/user/zemkedan/ ("Sex2"). "The Canine
Molecular Genetics project, funded by the largest private grant
ever given solely for canine health, aims to use the powerful new
tools
of molecular genetics to prevent the hereditary diseases that
affect dogs."
Visionary Voices Professional Speakers Online,
http://www.visionaryvoices.com/ ("Sex2"). "Visionary Voices is a
powerful speakers bureau designed to bring dynamic, quality
speakers into organizations and ignite their team into action."
Sterling Funding, http://www.sterlingfunding.com/, a mortgage
company ("Sex2"). "Tax Deductible Loans for Home Owners!"
A. Bohrer's Inc., http://www.abohrer.com/, a grocer ("Sex2").
"Our product line now encompasses fresh produce as well as, a
full line of frozen products, fresh meats, fresh seafood, and
groceries."
The Swallows, http://165.76.244.1/yakult/swallows/, a Japanese
baseball team, rated Sex2. We found many Japanese-language
sports sites listed as porn by WebSENSE.
The Indiana Twisters, http://www.indianatwisters.com, a soccer
team ("Sex2"). "Now with our indoor team joining the Blast and
the Blaze, soccer fans in Indiana will get to follow the game
year-round, and root for the familiar players they've come to
know and love." Also blocked in the same category: the Indiana
Blast, http://www.indianablast.com/: "Promotions like 'Godzilla
Night'... make BLAST games fun!"
We found several advocacy and freedom of speech sites
inappropriately blocked as if they were porn:
A copy of http://bloodstone.globalnet.co.uk/~probon/demon1.htm,
The Demon Internet Policy on Censorship, ("Sex2"). Demon is a
British ISP.
MIT Student Association for Freedom of Expression "Censorbait"
page, http://www.mit.edu/activities/safe/notsee.html, blocked as
"Adult". "Throughout human history, attempts have been made to
suppress certain writings and pictures. This is a collection of
links to material about such suppression, or material likely to
be suppressed."
A former location of the Safer Sex Page,
http://alexander.ucsf.edu/~troyer/safesex.html ("Sex2"). This
site is dedicated to AIDS prevention; the webmaster was a
plaintiff in ACLU v. Reno, the case which invalidated the
Communications Decency Act. The blocked page was last updated
in January, 1996. "The straight dope on safer sex: what's
safer? what's risky? What's the latest on
HIV? How do I protect myself?"
Conclusion: Like all other censorware we have examined,
WebSENSE contains numerous bad blocks. Contrary to the marketing
claims, clearly no human being examined these sites before they
were added to the blacklist.
We believe that, like most censorware companies, Net Partners
uses an automated tool, called a "spider" to search the Web for
sites which meet certain criteria, including the use of keywords
such as "teens" or "sex". The company claims, as quoted above,
that every site is then examined by a human being. The grossly
inappropriate blocks listed here--Liza Minnelli, a grocer, a
speakers' bureau, a mortgage company, a teens page all blocked as
PORNOGRAPHY--belie this claim.
In the case of the blacklisted Japanese sports sites, we believe
that NetPartner's spider is picking up a common string of
Japanese characters as an English-language word on its blacklist.
Unseen by a human reviewer, these Japanese language sites then
end up being blocked as porn.
The use of WebSENSE in the court system and public libraries is
clearly a violation of First Amendment rights of court employees
and library users. In a recent decision in the first lawsuit
brought to challenge the use of censorware in libraries, Judge
Leonie Brinkema held that the Internet "more closely resembles
plaintiffs' analogy of a collection of encyclopedias from which
defendants have laboriously redacted portions deemed unfit for
library patrons." Judge Brinkema also said that "public libraries
are places of freewheeling and independent inquiry." Once having
chosen to provide access to the Internet, Judge Brinkema
concluded that "the Library Board may not thereafter selectively
restrict certain categories of Internet speech because it
disfavors their content."
Mainstream Loudoun v. Loudoun County Libraries,
http://www.venable.com/ORACLE/opinion.htm
Under the standard Judge Brinkema suggested should be applied,
censorware installed in public institutions must be "narrowly
tailored" to serve a "compelling government interest." WebSENSE
fails the "narrowly tailored" branch of the test for two related
reasons: First, the profound negligence illustrated by the
numerous bad blocks included in the product's blacklist;
secondly, the extreme vagueness of the company's standards. For
example, "Heterosexual activity involving one or two persons" as
a definition of pornography would permit the censorship of almost
every novel or movie currently available. As Judge Brinkema's
decision forecasts, censorware will fail to stand up to the
exacting standards demanded by First Amendment law. It has no
place in public libraries or in the courts. A briefing paper on
the unconstitutionality of such uses of censorware is available
at http://www.spectacle.org/cs/library.html)
It is the ultimate irony that co-workers of Judge Brinkema's in
other federal circuits cannot surf the Web without going through
WebSENSE, the product which protects them against Liza Minnelli,
Jewish teens, speakers' bureaus, and mortgage companies.
--------------------------------------
Jonathan Wallace jw@bway.net
Publisher, The Ethical Spectacle, http://www.spectacle.org
Co-author, Sex Laws and Cyberspace (Henry Holt, 1996)
http://www.spectacle.org/freespch
"We must be the change we wish to see in the world."--Gandhi
------------------------------
Date: Mon, 22 Jun 1998 11:10:11 -0700
From: Jeremy Lassen <jlassen@FREAKPRESS.COM>
Subject: File 7--DR DOS and the Browser Wars
One thing that that's been bugging me for some time that hasn't
been brought up in the context of the Microsoft anti-trust lawsuit
and the browser wars is DR DOS.
Does anybody remember DR DOS? Around the Time MS Dos 3.2 was the
standard PC OS, a competitor released a clone product (DR DOS)
that included advanced features such as a text editor, undo
commands and a host of other utilities that enhanced the operating
system. While Microsoft was putting all of its eggs into its
windows basket, someone else beat them to market with a superior
DOS product.
Just as sales of DR DOS began to take off, Microsoft released its
windows 3.1 upgrade. Windows 3.0 had taken the PC world by storm
but it still had a LOT of problems that windows 3.1 promised to
fix. Microsoft decided this was the perfect opportunity to
eliminate the DR DOS competition, by including a DOS check in
Windows 3.1. While windows 3.0 ran just fine on DR DOS, Windows
3.1 refused to run. It wasn't a technical matter, it was simply a
version check. And all the companies and individual users that
invested in DR DOS got burned, and had to buy MS DOS in order to
keep their windows running Sure, a couple months later, DR
released a patch that allowed you to run win 3.1 on DR DOS, but
the message from Microsoft to the corporate and private world was
clear -- buy only MS products, or we will screw you.
This little history lesson is important, because it demonstrates
what Microsoft is willing to do in order to gain/keep market
share. A lot of people think the browser war is unimportant --
But what if Microsoft DOES win the browser war, and Internet
Explore/Win 98 is the only way to access the web from a windows
based PC system?
Would it be possible for Microsoft to put hooks into Explorer such
that it only displayed web pages that were hosted on NT-web
servers? How about if they simply added a delaying mechanism such
that Apache, Netscape and other competing web server's web pages
were displayed significantly slower then NT based web pages? Or
what if they simply required some new piece of code to exist on
all web servers in order for Explorer to display the pages -- a
piece of code which Microsoft would be happy to license to its
competitors for a small fee?
Does this sound paranoid? Microsoft justified its windows 3.1
version check by saying "we can't garuntee that Microsoft products
will work with competitors software." This justification would be
equally applicable to Internet Explorer and competing web server
software.
In case you're wondering, DR DOS never recovered -- its innovation
and nimbleness in getting a superior product to the market place
resulted in Microsoft destroying it with a separate product. (we
had to wait until MS DOS 5.0 for all the features of DR DOS).
Now that Microsoft has even greater power in the marketplace, and
now that Microsoft has turned its full attention to the Internet,
I see no reason why they won't pursue the above strategy if they
DO control your browser. And as much as I dislike government
intervention in the computer industry, I see the anti-trust
lawsuit as the only way to prevent Microsoft from using browser
dominance as a lock that would keep companies from competing and
innovating in the web server market.
Web Servers are just ONE area where Microsoft stands to gain
leverage and market power if it controls the browser. It is easy
to imagine other areas. I'm sure Bill Gates's imagination is
running wild.
------------------------------
Date: Thu, 11 Jun 1998 13:27:39 -0500
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 8--Imaginary Gardens. The Year 2000 Fear Bug. June 11, 1998
The Year 2000 Fear Bug
by Richard Thieme
Dear Richard,
I have a dear friend whose mother is all freaked out about the computer
2000 thing. She is thinking about shutting down bank accounts,
accumulating cash, and taking other drastic actions because of
stuff she's heard on late night talk radio.
Is my friend's mom going overboard or are her fears justified?
Dear Reader:
I don't know.
I do know that people who know about the reality of the situation are
anxious.
The treasurer of a neighboring county told me this week that embedded chips
in their traffic lights and trucks will shut down and must be replaced. Is
that good news because they can fix it or bad news because it might be true
for power plants and communications systems around the world?
Will there be heat and light, food delivery, airplane flights? Will the
government continue to function? The economy has never been better, but if
we succumb to uncertainty and fear, the markets will plunge.
Are electronic deposits safe? Paper money? Where will you store your
platinum and gold? In bank vaults? Or the basement? Will you hoard food too
and guns and ammo or should we ask our cities how they plan to defend us
when the hordes invade, armed to the teeth, looking for food?
This is the Year 2000 Fear Bug, spreading like a virulent flu. Are rational
(but guilty) people secretly afraid that their undeserved prosperity will
end? Are they succumbing to the primordial fear of the end of the world? Is
this how a high-tech society comes to Armageddon?
In the absence of truth, we make it up. The earth IS a risky place, and we
have lived so long in a bubble of prolonged prosperity that we have
forgotten how difficult life can be. But it is also true that human beings
rise to the challenge. When we short-circuit our fear, we manifest our
capacity for heroic resilience. We may not be able to fix all the systems,
but we can prepare ourselves for dealing with whatever comes.
Given that we lack the x-ray vision that would enable us to see the full
truth, what should a prudent person do?
We should not locate our security in the form in which our money is stored
nor seek "truth" in tabloid journalism. We ought to fear our fear more than
the mountains we might have to climb. We are so much more than our fears.
We are a possibility for reasonable thinking, selfless collective effort,
and heroic response to adversity. Our security lies in remembering that and
acting on that when times get tough.
********************************************************************
Imaginary Gardens is a daily reflection on techno/spirituality --
the interaction between ourselves, computer technology, and the
ultimate concerns of our lives.
To subscribe to Imaginary Gardens, send email to
rthieme@thiemeworks.com with "subscribe gardens" in the body of
the message. To unsubscribe, send an email to
rthieme@thiemeworks.com with the word "unsubscribe gardens" in the body
of the message.
Imaginary Gardens and the weekly column, Islands in the
Clickstream, are archived at the ThiemeWorks web site at
http://www.thiemeworks.com.
Copyright 1998 Richard Thieme. All rights reserved.
------------------------------
Date: Thu, 25 Apr 1998 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 9--Cu Digest Header Info (unchanged since 25 Apr, 1998)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
CuD is readily accessible from the Net:
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.36
************************************