Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 09 Issue 46

  


Computer underground Digest Sun June 15, 1997 Volume 9 : Issue 46
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.46 (Sun, June 15, 1997)

File 1--CFP: Symposium on Network and Distributed System Security (fwd)
File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)
File 3--Upcoming Computer Policy and Law Program
File 4--Sequel/Internet Monitoring at NetSec
File 5--SSA Privacy Forum 6.16.97
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 10 Jun 1997 11:11:25 -0500
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 1--CFP: Symposium on Network and Distributed System Security (fwd)

CALL FOR PAPERS

The Internet Society Symposium on Network and Distributed System Security

Where: San Diego, California
When: March 1998

GOAL: The symposium will foster information exchange between hardware and
software developers of network and distributed system security services.
The intended audience is those who are interested in the practical aspects
of network and distributed system security, focusing on actual system
design and implementation, rather than theory. Encouraging and enabling
the Internet community to apply, deploy, and advance the state of available
security technology is the major focus of symposium. Symposium proceedings
will be published by the Internet Society. Topics for the symposium
include, but are not limited to, the following:

* Architectures for large-scale, heterogeneous distributed systems
* Security in malleable systems: mobile code, mobile agents, dynamic policy
updates, etc.
* Special problems: e.g. interplay between security goals and other goals --
efficiency, reliability, interoperability, resource sharing, and cost.
* Integrating security services with system and application security
facilities and with application protocols, including message handling,
file transport, remote file access, directories, time synchronization,
data base management, routing, voice and video multicast, network
management, boot services, and mobile computing.
* Fundamental services: authentication, integrity, confidentiality,
authorization, non-repudiation, and availability.
* Supporting mechanisms and APIs: key management and certification
infrastructures, audit, and intrusion detection.
* Telecommunications security, especially for emerging technologies -- very
large systems like the Internet, high-speed systems like the gigabit
testbeds, wireless systems, and personal communication systems.
* Controls: firewalls, packet filters, application gateways
* Object security and security objects
* Network information resources and tools such as World Wide Web (WWW),
Gopher, Archie, and WAIS.
* Electronic commerce: payment services, fee-for-access, EDI, notary;
endorsement, licensing, bonding, and other forms of assurance; intellectual
property protections

GENERAL CHAIR:
David Balenson, Trusted Information Systems
PROGRAM CHAIRS:
Matt Bishop, University of California at Davis
Steve Kent, BBN
PROGRAM COMMITTEE:
Steve Bellovin, AT&T Labs -- Research
Doug Engert, Argonne National Laboratories
Warwick Ford, VeriSign
Li Gong, JavaSoft
Rich Graveman, Bellcore
Ari Juels, RSA Laboratories
Tom Longstaff, CERT/CC
Doug Maughan, National Security Agency
Dan Nessett, 3Com Corporation
Rich Parker, NATO
Michael Roe, Cambridge University
Rob Rosenthal, DARPA
Wolfgang Schneider, GMD Darmstadt
Christoph Schuba, Purdue University
Win Treese, Open Market, Inc.
Jonathan Trostle, Novell
Gene Tsudik, USC/Information Sciences Institute
Steve Welke, Institute for Defense Analyses
LOCAL ARRANGEMENTS CHAIR:
Thomas Hutton, San Diego Supercomputer Center
PUBLICATIONS CHAIR:
Steve Welke, Institute for Defense Analyses
LOGISTICS CHAIR:
Torryn Brazell, Internet Society

SUBMISSIONS: The committee invites technical papers and panel
proposals, for topics of technical and general interest. Technical
papers should be 10-20 pages in length. Panel proposals should be two
pages and should describe the topic, identify the panel chair, explain
the format of the panel, and list three to four potential panelists.
Technical papers will appear in the proceedings. A description of each
panel will appear in the proceedings, and may at the discretion of the
panel chair, include written position statements from each panelist.

Each submission must contain a separate title page with the type of
submission (paper or panel), the title or topic, the names of the
author(s), organizational affiliation(s), telephone and FAX numbers,
postal addresses, Internet electronic mail addresses, and must list a
single point of contact if more than one author. The names of authors,
affiliations, and other identifying information should appear only on
the separate title page.

Submissions must be received by 1 August 1997, and should be made via
electronic mail in either PostScript or ASCII format. If the committee
is unable to print a PostScript submission, it will be returned and
hardcopy requested. Therefore, PostScript submissions should arrive
well before 1 August. If electronic submission is difficult,
submissions should be sent via postal mail.

All submissions and program related correspondence (only) should be
directed to the program chair: Matt Bishop, Department of Computer
Science, University of California at Davis, Davis CA 95616-8562,
Email: sndss98-submissions@cs.ucdavis.edu. Phone: +1 (916) 752-8060,
FAX: +1 (916) 752-4767,

Dates, final call for papers, advance program, and registration
information will be available at the URL:
http://www.isoc.org/conferences/ndss98.

Each submission will be acknowledged by e-mail. If acknowledgment is
not received within seven days, please contact the program chair as in-
dicated above. Authors and panelists will be notified of acceptance by
1 October 1997. Instructions for preparing camera-ready copy for the
proceedings will be sent at that time. The camera-ready copy must be
received by 1 November 1997.

------------------------------

Date: Tue, 10 Jun 1997 00:15:54 -0400
From: Russ Haynal <Russ@NAVIGATORS.COM>
Subject: File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)

DC-ISOC Announces additional details of its next event...

- - - - - Internet Gridlock - Fact, Fiction, or Future ? - - - - -

Monday, June 16, 1997, 7-9 p.m.

There has been increasing press coverage about the Internet's incredible
growth, and the occasional Internet "brown-outs" or ISP outages. Is the
Internet going to collapse under its own weight? Is congestion inevitable,
or will access speeds improve overall? Join DC-ISOC to hear from Industry
leaders how the Internet's infrastructure is growing and adapting to this
exponential growth.

Meeting Agenda

Speaker #1: David Boyes - Internet Backbone and Interconnection Engineer
Dimension Enterprises

This first talk outlines what's on the other side of your
favorite ISP, discusses some changes in the Internet backbone
structure and interconnection policy, and outlines one network
engineer's viewpoint on what current major challenges are to
developing a higher-performance Internet backbone in a
completely economically competitive Internet.
http://www.dimension.net dboyes@dimension.net

Speaker #2: Robert Cannon - Computer Telecommunications Attorney
practicing in the Washington DC area.

The baby bells have been lobbying for access charge reform
due to the congestion that the Internet is allegedly causing
on the voice phone system. Robert will give us a preview of
his "Cybernauts vs. Ma Bell" Paper being presented this
summer at INET '97
http://www.cais.net/cannon/ cannon@dc.net
http://www.fcc.gov/isp.html (FCC Access Charge Reform Homepage)

Speaker #3: Robert Hagens - Director, Internet Engineering
MCI Telecommunications Corporation

Presentation of MCI's strategy to keep its Internet
backbone ahead of the capacity curve, or "How to avoid
being run over by the Internet freight-train!"
http://www.mci.com

Speaker #4: TBD - Sprint Internet Services

Presentation of Sprint's approach to keep up with
the Internet's rapid growth.
http://www.sprint.com/fornet/

Speaker #5: Charles Brownstein - Executive Director
Cross-Industry Working Team, CNRI

As the Internet matures into a core component of the
commercial communications infrastructure, the providing
industry needs mechanisms to keep it robust and reliable.
IOPS.ORG is a mechanism for engineering reliability
solutions in the Internet context. XIWT is an industry
group devoted to advancing NII architecture, services and
applications, and to industry cooperation to advance the NII
marketplace in the public interest.
http://www.iops.org and http://www.xiwt.org

Following the speaker presentations, there will be an open Q&A session
with the audience.

- - - - - - - - Meeting Location - - - - - - - - - -

The meeting will be held at the Sprint/Global One Building in Reston, VA
(12524 Sunrise Valley Dr.) This is immediately off the Dulles Toll-road;
only minutes from Tysons Corner

Directions From Beltway/Tysons Corner:

- Take Dulles Toll road west to exit 11
(exit sign is for Fairfax County Parkway; Rte 7100)
- At end of exit ramp, make a left onto Fairfax County Parkway (South)
- At first intersection light, make a right onto Sunrise Valley Drive
- Make immediate right into Sprint/Global One Campus
- Global One building is the first building on your left
( # 12524 Sunrise Valley Drive)
- Ample parking is available on your right
- Enter through front lobby - Go down the stairs to the conference center

As with all of our previous events, there is no charge to attend this event.
Seating will be on a first-come, first-seated basis, though we expect that
there should be room for all those interested.

Please plan to arrive by 6:45, so we can begin on time, at 7pm

************* T H A N K S T O O U R S P O N S O R ***************
* DC-ISOC wishes to thank Sprint Internet Services *
* for sponsoring this meeting. *
* Sprint's Global all-fiber network makes them uniquely qualified to *
* bring you innovative products and services for Internet, Intranets, *
* and IP Security. Please visit, http://www.sprint.com/fornet/ *
* (To Sponsor a DC-ISOC Meeting, see http://www.dcisoc.org/sponsor.htm )*
*************************************************************************

Individuals who are interested in becoming members of DC-ISOC can do so
by joining the Internet Society. See their web site at
http://www.isoc.org for more information.

The Washington DC Chapter of the Internet Society maintains its own web
site at: http://www.dcisoc.org Please feel free to pass this announcement
message along to other interested individuals. If this message was
forwarded to you, you can join our announcement mailing list through
out web site ( http://www.dcisoc.org )

------------------------------

Date: Mon, 9 Jun 1997 19:32:13 -0500
From: "Margie W. Hodges" <mwh2@cornell.edu>
Subject: File 3--Upcoming Computer Policy and Law Program

*************************************************************
CORNELL UNIVERSITY
COMPUTER POLICY AND LAW
July 9-11, 1997
Ithaca, New York
*************************************************************

An Invitation
-------------
To Technology Administrators, Legal Counsel, Judicial Administrators,
Risk Managers, Auditors, Librarians, and Affirmative Action Officers at
Colleges and Universities.

In order to design appropriate computer-use policies and to plan for
their effective implementation, colleges and universities must develop
a new level of collaboration between technology specialists and the
institution's legal counsel. At COMPUTER POLICY AND LAW, participants
will examine the legal implications of extensive campus networking and
explore frameworks for limiting personal and institutional exposure to
liability, while at the same time preserving free speech and academic
freedom.

All too often computer-use policies are developed in response to crises
resulting from the misuse of computer and networking resources. The
Computer Policy and Law program will provide a much-needed opportunity
to take stock of our institutional policies in an atmosphere of frank
evaluation and informed discussion. PLEASE JOIN US as we identify the
hallmarks of best practice in this area and develop the policy
frameworks that will serve all of us in the critical days ahead.


PROGRAM SESSIONS:

Communication Technologies in Higher Education
----------------------------------------------
We'll go on-line to explore the remarkable resources available to the
faculty, staff, and students of an Information Age institution and to
discover how electronic communications are used for scholarship and
instruction, registration and record-keeping, study and research. As
we review the state of the art of electronic communications
technologies, we will identify the legal issues raised by the use of
e-mail, listservs, discussion groups, the World-Wide Web, and desktop
videoconferencing systems, such as Cornell's CU-SeeMe.

Copyright in Cyberspace
-----------------------
Electronic communication technologies have dramatically increased the
ease with which words and images can be copied, altered, and
disseminated. On-line instructional materials, for example, often
present text and graphics adapted from other sources. While copyright
infringement is widespread on the Internet, it is not legal. Current
case law and legislation provide mixed signals about an institution's
responsibility to curb copyright infringement on its computer
networks. This session will review how institutional copyright
policies can navigate such uncertainty and provide accurate information
about the application of copyright laws and permissions policies in
cyberspace. It will also cover trademark law, including strategies
for protecting institutional logos and domain names. An entire session
is devoted to the future of copyright law and policy.

Public Key Infrastructure
-------------------------
Public-key encryption provides the technological base for secure
e-mail, digitally "signed" transactions, and reliable authentication.
For higher education, this technology will present new opportunites for
conducting business electronically, both with outside organizations and
between internal departments. Interactions among all members of the
university community will likely be impacted. This session will
examine the emerging public-key infrastructure in the context of
existing and anticipated legislation and case law.

Electronic Communications: Institutional and Individual Liability
-----------------------------------------------------------------
This presentation will provide an overview of laws relating to libel,
pornography, obscenity, indecency, and "negligent publication"
(including the Telecommunications Act of 1996), as they pertain to
colleges and universities in their roles as on-line information
distributors. It will focus on the new theories of law used in recent
litigation over on-line incidents, including CyberPromotions v. AOL.
We will outline a number of steps that network administrators can take
to minimize institutional and individual liability when responding to
complaints about illegal or offensive materials.

On-Line Privacy
---------------
The institution may own the computers and the networks, but who owns
the information on them? What on-line privacy rights do computer users
have, and does the answer vary by an individual's status as a student,
faculty member, or staff member? Formulating answers that will provide
a basis for policy making, we will look at the details of open records
laws, the Electronic Communications Privacy Act (ECPA), the Family
Educational Rights and Privacy Act (FERPA), and discovery issues
surrounding records retention policies.

Policy Panel
------------
College and university administrators are called upon with increasing
frequency to respond to complaints about misuse of computer resources,
many involving such emotionally charged issues as harassment and
discrimination. In this panel presentation, representatives of a
variety of institutions will describe the policies they relied on -- or
later implemented -- to deal with a number of highly publicized
computer-abuse cases. Panelists will address how well these
institutional policies served those affected by the conflict and what
steps they would take in resolving similar problems today. Particular
attention will be given to the ways institutional goals and
administrative structures should influence policy design and
implementation.

Computer Crime and the Law
--------------------------
This session will provide an update on recent initiatives of the US
Department of Justice Computer Crime Unit, including current
perspectives on the ECPA. Topics will include the scope of the
computer crime problem, changes in legislation, sentencing guidelines,
and efforts on domestic and international fronts to reduce
computer-related crimes.

Designing Computer-Use Policies You Can Live With
-------------------------------------------------
Pulling it all together, this session will provide a framework for
policy making on your campus. Highlighting the advantages and
disadvantages of existing policies, we will address ways to decrease
legal and public relations liability, to use educational programs to
inform campus communities about their rights and responsibilities in
cyberspace, and to draw on model policies to meet the needs and goals
of individual institutions.

The Cornell Legal Information Institute Post-Program Open House
---------------------------------------------------------------
The Legal Information Institute at the Cornell Law School (LII) was
established in July, 1992 to explore new ways of distributing legal
documents and commentary in electronic form. The LII will host an Open
House at the Cornell Law School on Friday, 11 July, 1997, from 2:00 to
3:30 p.m. The founding (and current) directors of the LII, Thomas R.
Bruce and Peter W. Martin, the Jane M.G. Foster Professor of Law at
Cornell, will be present to answer questions about the development,
operation, and future initiatives of the Institute. All participants
in the Computer Policy and Law Program are invited to attend.

PROGRAM PRESENTERS:

Dan L. Burk, Assistant Professor of Law, Seton Hall University

Mark Eckenwiler, Attorney, Computer Crime Unit, Department of Justice

Robert W. Hamilton, Partner, Jones, Day, Reavis & Pogue

Marjorie W. Hodges, Program Director, Computer Policy and Law, and
Policy Advisor, Office of Information Technologies, Cornell University

Barbara L. Krause, Judicial Administrator, Cornell University

Terrence P. Maher, Special Counsel, Cooley, Godward, LLP

Steven J. McDonald, Associate Legal Counsel, The Ohio State University

Gary M. Pavela, Director, Judicial Programs, University of Maryland -
College Park

David Post, Visiting Associate Professor of Law, Georgetown University
Law Center, and Co-Director, Cyberspace Law Institute

Brian B. Shaw, Partner, Cumpston and Shaw

Steven L. Worona, Program Director, Computer Policy and Law, and
Assistant to the Vice President for Information Technologies, Cornell
University

PROGRAM FEE:
$875, which includes meals.
Enrollment is limited; early registration is encouraged.

FOR INFORMATION:
Computer Policy and Law
E-mail: sp@sce.cornell.edu
Phone: (607) 255-7259
Fax: (607) 255-8942
B20 Day Hall, Cornell University, Ithaca, NY 14853-2801
http://www.sce.cornell.edu/exec/CPL.html


*************************************************************

Marjorie W. Hodges
Office of Informatiopn Technologies
326 CCC, Garden Avenue
Cornell University
Ithaca, NY 14850

email: mwh2@cornell.edu
phone: (607) 255-4188
fax: (607) 254-5222

------------------------------

Date: Tue, 10 Jun 1997 07:04:07 -0400 (EDT)
From: mds@mds.prwire.com
Subject: File 4--Sequel/Internet Monitoring at NetSec

Sequel/Internet Monitoring at NetSec

Sequel Technology Presents Net Access Manager Internet Monitoring and
Reporting Software at CSI's NetSec Conference

Sequel's Cornerstone Product Enhances Network Security and Complements
Firewall Technology

SAN FRANCISCO, June 10 /PRNewswire/ -- Sequel Technology, leading
developer of the Sequel Net Access Manager(TM) Internet and intranet
monitoring and reporting tool, announced today at the Computer Security
Institute (CSI) NetSec conference, its plan to enhance network security by
offering a tool that measures employee usage of the Internet and manages
access privileges at the individual, departmental or enterprise level.
"Many businesses, today, think of firewalls as a vaccine for Internet
security," said Richard Villars, Director of Network Architectures and
Management at IDC Research. "Once a firewall is installed, they believe that
they're immune to all future security problems. Unfortunately, many companies
quickly discovered that this sense of security is an illusion. Organizations
need to develop Internet usage polices for their internal users and
reinforcing these guidelines with software that manages the flow of traffic
both into and out of the network."

How Net Access Manager Adds Value to a Firewall
Sequel Net Access Manager provides IS managers with a customizable toolset
for reporting and managing connections from the network to the Internet. Like
a firewall, it provides the highest degree of security by running from the
server and working as a dual-homed gateway to accurately monitor all TCP/IP
activity between network users and the Internet.
Sequel Net Access Manager is Internet management software that is designed
to monitor access from the inside (network users) to the outside (the
Internet). Conversely, a firewall works by blocking outside intruders from
entering into the network. Together, these two technologies offer a
comprehensive security solution.

Sequel Provides Sophisticated E-mail Security
Sequel Technology will soon be joining forces with two leading security
software vendors -- Integralis and SRA International -- to offer a fully
integrated high-end surveillance solution to supervise, track and log all
e-mail communications. Key components of the system include e-mail content
management software from Integralis which opens and screens the subject,
message body and all attachments for viruses or offensive language. An even
more intensive screening process developed by SRA uses sophisticated natural
language analysis to detect even the most subtle language patterns, such as
"guaranteed money maker" and "hot little tech stock." After the messages have
been cleared and delivered to the end user, the Sequel component logs all
traffic and generates various types of activity reports. The three partners
will be launching the financial solution in July, with plans to customize the
software for other industries which require the same level of management over
highly sensitive information; such as medical records, banking statements,
personnel records and insurance claims.

About Sequel
Sequel Technology Corporation was founded in 1995 and is the worldwide
leader in the development, marketing and support of powerful and practical
Internet Management Software products. These products allow information
systems professionals, management and end users to better understand and
manage their corporate and individual investment in Internet, intranet and
online usage. Sequel Technology is an international company with over eighty
employees located in offices around the world including Seattle, New York,
Chicago, Washington, D.C., Atlanta, London, Tokyo, Ottawa and Toronto. Sequel
Technology can be reached at the corporate offices located at Suite 300,
3245 - 146th Place SE, Bellevue, WA 98007, telephone 206-556-4000 or at
http://www.sequeltech.com.
NOTE: Sequel Technology and Sequel Net Access Manager are trademarks of
Sequel Technology. All other trademarks, trade names or service marks are the
property of their respective owners.

SOURCE Sequel Technology
-0- 06/09/97
/CONTACT: Frances Cala, Public Relations Specialist, 206-556-4074, or
fcala@sequeltech.com, or Susan McPherson, Director, Public Relations,
206-556-4057, or smcpherson@sequeltech.com, both of Sequel Technology/

------------------------------

Date: Fri, 13 Jun 1997 18:05:37 -0400
From: Dave Banisar <banisar@EPIC.ORG>
Subject: File 5--SSA Privacy Forum 6.16.97

Social Security Administration Forum
Privacy and Customer Service in the Electronic Age

Monday, June 16, 1997

Georgetown U. Law Center
Moot Court Room
600 New Jersey Ave. NW
Washington D.C. 20001


Agenda:

WELCOME

12-12:15 pm

Welcome by Marc Rotenberg, Director,
Electronic Privacy Information Center and
Professor, Georgetown Law University

Introduction of Dr. John J. Callahan,
Acting Commissioner of the Social Security Administration

PANEL #1 PRIVACY EXPERTS AND CONSUMER ADVOCATES 12:15-1:15 pm

Leslie Byrne, Special Assistant to the President, and
Director, U.S. Office of Consumer Affairs

Harry Hammitt, Editor and Publisher,
Access Report Newsletter

Evan Hendricks, Editor and Publisher,
Privacy Times and Chairman, U.S. Privacy Council

Sally Katzen, Director, Office of Information
and Regulatory Affairs, Office of Management and Budget

Deirdre Mulligan, Staff Counsel, Center for
Democracy and Technology

PANEL #2 COMPUTER TECHNOLOGY EXPERTS 1:30-2:15 pm

Edward G. Amoroso, Technical Manager, AT&T Laboratories

Michael Angelo, Principal Member, Technology Staff,
Compaq Corporation

Dorothy E. Denning, Professor of Computer Science,
Georgetown University

David P. Jablon, Software Engineer and Cryptographic
Specialist, Integrity Sciences, Inc.

George Spix, Chief Architect Consumer Platforms Division,
Microsoft Corporation

PANEL #3 INTERNET COMMERCE, BANKING AND FINANCIAL PLANNING EXPERTS

2:30-3:15 pm

Mark Greene, Vice President, Electronic Payments and
Certification, IBM Internet Division

Russ Housely, Chief Scientist, Spyrus, Inc.

Charles Merrill, Partner, McCarter & English Law Firm

Jahan Moreh, Chief Security Architect, Open Horizon, Inc.


PUBLIC COMMENT PERIOD - 3:15 pm

Members of public who have registered may
speak for 4 minutes. The panel may ask
questions following each individual's
testimony, if desired.


CLOSING REMARKS - 4:30 pm

For more information and directions, see:

http://www.ssa.gov/forums/washingtondc.htm

More information on EPIC is available at

http://www.epic.org/

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.46
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT