Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 10
Computer underground Digest Sun Feb 8, 1998 Volume 10 : Issue 10
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.10 (Sun, Feb 8, 1998)
File 1--fwd: CYBERsitter caught mail-bombing critics
File 2--The letter to Milbourn/Cybersitter
File 3--Write a Complaint, Get a Mailbomb (Wired excerpt)
File 4--Islands in the Clickstream - January 24, 1998
File 5--"Secure Computing: Threats and Safeguards", Rita C. Summers
File 6--At least someone has a sense of humor......
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sat, 07 Feb 1998 00:50:21 -0600 (CST)
From: Bennett Haselton <bennett@peacefire.org>
Subject: File 1--fwd: CYBERsitter caught mail-bombing critics
CYBERsitter has been caught in the act of mail-bombing someone who
wrote a letter to Brian Milburn, the CEO of CYBERsitter,
complaining about their product. Spefically, a lady names Sarah
Salls sent the following letter to Brian Milburn at
bmilburn@solidoak.com:
http://peacefire.org/archives/SOS.letters/asherah.2.bm.2.4.98.txt
She was writing to CYBERsitter regarding their harassment of
Peacefire and their blocking of anti-censorship sites, which is
described in more detail at:
http://www.peacefire.org/censorware/CYBERsitter/
CYBERsitter replied by flooding her account with over 446 junk
messages. While the attack was in progress, Ms. Salls had her
ISP's postmaster monitor the incoming attack and shut it off.
Naturally, her ISP, Valinet.com, kept copies of the mail logs for
that day and has passed them on as evidence to their lawyers. A
complaint was also forwarded to MCI's security department, which
handles network abuse and illegal denial-of-service attacks that
are perpetrated by their customers, which include lower-end
network users like CYBERsitter:
http://peacefire.org/archives/SOS.letters/valinet.2.mci.2.5.98.txt
C-Net's NEWS.com picked up on the story and interviewed Sarah
Salls, her ISP, me, and Brian Milburn from Solid Oak Software.
Their story is at:
http://www.news.com/News/Item/0,4,18937,00.html
(Note that the C-Net article compares the act of mail flooding
with conventional spam, and says that a bill is being considered
in Congress that would outlaw what CYBERsitter did. This is not
quite true; flooding a person's account with 500 junk messages is
a denial-of-service attack, which is already illegal, and it
usually gets you in a lot more trouble than spamming would.)
Far from denying the accusations, Brian Milburn gave C-Net the
following quote: "Certain people aren't going to get the hint.
Maybe if they get the email 500 times, they'll get it through
their heads... If they send it to my private email account,
they're going to get what they get." No kidding, Brian!
-Bennett
bennett@peacefire.org (615) 421 6284 http://www.peacefire.org
------------------------------
Date: Sun, 8 Feb 1998 15:34:49 -0600
From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas)
Subject: File 2--The letter to Milbourn/Cybersitter
((MODERATORS' NOTE: Here is the letter that precipitated the
alleged Spam from Cybersitter and the account of the poster who
sent it. When CuD attempted to contact Milbourn/Cybersitter about
a year ago to obtain information on a story circulating the net,
we received emphatic demands that we never contact him. The
demands were veiled in threats of repercussions should we try, so
others can contact Cybersitter for themselves to confirm or refute
the latest allegations)).
==================
Source - http://www.thewitches.com/censor/
In surfing the Peacefire website, I came across information relating
to Cybersitter's policies. I decided to download the software, and see
how it worked for myself. Everything the Peacefire site had pointed
out about Cybersitter was true. Before downloading the software and
installing it, however, I visited the sites that were on the blocked
list. I couldn't find anything on these sites that would fit
Cybersitter's criteria for blocking.
While I was on the Peacefire site, I also read through correspondence
between Cybersitter's C.E.O. and various people. In numerous letters,
representatives of Cybersitter bashed Peacefire for its involvement
with the issues surrounding their software, citing that the software
was designed for use by parents and that the "kids" at Peacefire had
no right to even be involved in this issue.
Those letters compelled me to write my own letter, after all, I AM a
parent. Here is a copy of the letter I wrote to the C.E.O. of Solid
Oak Software, Brian Milburn.
Mr.Milburn,
You have stated over and over again that your
software is for use by parents. And that individuals other than
parents, should not be involving themselves in the fight against your
just above legal censoring techniques.
I, myself am a parent. I have two children who love to surf the
Internet, and while I seek to protect them from inappropriate
material, I certainly would not want someone else making the
decisions on what my children should or should not view for me.
Which is exactly what your software does. It does not allow the
parents to make the choices about what their children access, that
list is already predefined within the software and to top it all off,
you encrypt the list so that the parents cannot even view it. This I
find completely preposterous. That would be like the video clerk
telling me I could only rent G rated movies, because I have children
under the age of thirteen in my household. Therefore, I am not
entitled to rent a PG-13 movie or above. The PG stands for parental
guidance. Which means, that if I determine that my child is mature
enough to view the movie, he may. It does not mean that anyone under
the age of thirteen is banned from seeing it.
In essence, this is what you have done with your software. You have
taken the "parental guidance" out of it. A parent is not allowed to
determine which sites on your list are or are not appropriate as they
are not allowed to view the list that your software operates from.
I, for one, am not opposed to my children learning about diversity,
yet you have blocked The National Organization for Women, who's key
issues include Racial and Ethnic Diversity as well as issues
concerning Violence Against Women, which unfortunately in their
younger days my children had to deal with firsthand. If it were not
for Organizations like N.O.W. many women would not be able to find
the resources the need to escape abusive relationships, thus allowing
the children to suffer further.
You have also banned The Human Awareness Institute which teaches
individuals to prosper in healthier, happier, more emotionally
balanced relationships. This is something I WANT my children to
learn. After all, what is the alternative? For them to learn to
wither in unhealthy, unhappy, emotionally leeching, abusive
relationships?
We live in an area that is extremely diverse and has a large gay
population. Although, some homophobia still exists in the community,
it is starting to be dispelled by the amount of information available
in cyberspace about the gay/lesbian community. Not so if you are
using CYBERsitter however. I think that based upon the
extraordinarily large number of gay/lesbian sites that you have
banned, we can see where the main homophobia exists. (Looked in a
mirror lately, Mr. Millburn?)
Until recently, you had also blocked a large number of wiccan/pagan
sites as well because they obviously did not subscribe to your own
Christian values not because they were in violation in any way of
your list of criteria for blocked sites. By doing this, if I were
using your software, you would have infringed upon my right as a
parent to teach my children about their religion, as I would not have
been able to access many valuable wiccan/pagan sites.
I truly think that you need to re-evaluate your motives in
distributing this product. If the product is not based upon your own
agendas but merely to help parents in protecting their children, then
you need to revamp your product so that it allows parents to decide
what is appropriate for the children. By decoding your banned lists
and making your product more "parent-friendly".
It is not groups like Peacefire that are causing you to lose revenue.
It is your own product. Organizations like Peacefire and many other
individuals and organizations are merely bringing attention to faults
which already exist within your product. Faults that the consumer
would discover for themselves once they purchased it. If I were you,
I would take the complaints you get to heart and use them to make
your product better, rather than trying to shut down every single
site that airs a complaint about your company's software.
I, for one fully intend to make it known how your software operates. I
have many friends on many domains who are willing to help me inform
consumers about your product. If you feel it necessary to track us
down, and block each and every one of us, then I wish you luck in
your endeavors. But it might make it necessary to add the word
CYBERsitter to your list of banned words, and just what would that do
to your business?
Sincerely,
( My name witheld here, I did include it in the original letter along
with my title and e-mail address)
I sent that first letter to the CEO's e-mail address, which is posted
publicly on Solid Oak's Website (that address bmilburn@solidoak.com )
Well, that letter was returned to me along with a message stating that
it was unwanted e-mail to a private e-mail address. So, I decided that
perhaps the CEO wanted his privacy, even though he had posted his
e-mail address on Solid Oak's website for the world to see. Or that he
might have been offended by the header of my message, which read
TheWitches.Com. I could understand that. I sent the message again,
this time using my Z-Bear account and addressing the message to
support@solidoak.com . The same thing happened again. My letter was
returned with a message stating that it was unwanted e-mail sent to a
private e-mail address. Okay, so perhaps they didn't want me
cluttering up their support mailbox (which again was publicly
displayed on their website) with feedback. That was the solution!!!
Feedback!! I sent the message again, this time using the
feed.back@solidoak.com Yet again, the message was returned to me
with the same message: unwanted e-mail to a private e-mail address.
Since when is a feedback address private? I copied and pasted the
message right into an e-mail on their website, using the address
located just below where it states, "We welcome your feedback"
I returned to the Peacefire website and noticed something I had missed
before. A section stating not to include the word Peacefire in any
e-mail sent to Solid Oak, as they were screening the message bodies
for this and if it was discovered the message would be rejected. I
went back into my e-mail and took out all mention of Peacefire. Again,
I sent the message to feed.back@solidoak.com. Rejected. Again.
Well now that Solid Oak has been contacted, I can now tell the rest of
the story about what happened. Here is a copy of the fourth e-mail I
received from Solid Oak Software:
-----Original Message-----
From: Technical Support <support@solidoak.com>
To: postmaster@zbear.com <postmaster@zbear.com>
Date: Thursday, February 05, 1998 10:54 AM
Subject--Unwanted e-mail [Re:]
Fourth request.
We have asked for your assistance regarding repeated unwanted e-mail
from
this account. You have seen fit however to ignore our requests. Since
you
will not do anything, we will.
So, I had to wonder, what were they going to do? Report me to my ISP?
They had already done that and my ISP responded to them that they
didn't feel there was anything innappropriate about my e-mail.
Approximately five minutes later, when my Outlook Express
automatically logged on to check my mail, I found out. I couldn't
believe my eyes. Hundreds of e-mails were being downloaded into my
account. Solid Oak was mailbombing me! I immediately called my ISP and
got one of the heads on the phone. I explained what was happening. He
logged into my account and was witness to the mailbombing. He
immediately took steps to shut off Solid Oaks mail to my account as
well as to the rest of Valinet, my ISP. 300+ messages had already
downloaded into my account by the time he stopped it with another 500+
remaining on the server. He was livid and so was I. What right did
they have to do this. Especially since I had simply written a letter
to give feedback on their product. This is not the kind of behavior
one would expect from a company that states it is in business to help
parents. I am a parent and this company attacked me and my ISP by
mailbombing me. The person at my ISP is also a parent, his children
and mine attend school together. And up until yesterday, my ISP was
distributing Cybersitter as their filtering software. Solid Oak
actually attacked a business that was selling their product! They
certainly didn't teach me that in business school. That is a
completely new tactic.
I guess the only feedback they want is positive feedback. Anything
negative or contrary will be rejected apparently and the person who
gives the negative feedback will be childishly attacked. I would
encourage you to write to Solid Oak Software to express your opinions
about both their software and their business practices but I would
warn you to do so at your own risk. They don't appear to take
criticism well.
If you would like more information on the filtering processes of
Cybersitter or any of the other major filtering software, or if you
would like to find out what you can do to help fight internet
censorship, please visit the Peacefire website.
Bright Blessings,
<name deleted - CuD>
------------------------------
Date: Sat, 7 Feb 1998 21:32:06 -0600
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 3--Write a Complaint, Get a Mailbomb (Wired excerpt)
Source - lynx http://www.wired.com/news/news/politics/story/10141.html
Wired News has been nominated for a Webby Award. You can vote for it
at http://www.webbies.com/.
Write a Complaint, Get a Mailbomb
Janelle Brown
7:05pm 6.Feb.98.PST
Solid Oak, the maker of Cybersitter Web filtering software, is under
fire from a woman who says the company launched an email attack
against her after she sent the firm a critical letter. A company
spokesman offered a semi-denial of the accusation.
Sarah Salls, a Web designer and mother of two, sent an email to Solid
Oak on Wednesday that accused the company of carrying out censorship
in its filtering software.
After the email was rejected by four Solid Oak email accounts
(including support, feedback, and the CEO's personal account), Salls
says, she was mailbombed on Thursday. Her account received over 800
emails from support@solidoak.com, quoting her letter with the subject
line "re: your crap" and a message "Do not send us any more e-mail!"
Solid Oak denied Salls' allegation. But not flatly.
"We know absolutely nothing about this - I can't imagine that this
would happen," spokesman Marc Kanter said Friday.
He conceded, however, that something might have happened - by
accident. He said the company has a new automatic response email
filtering system that Solid Oak is beta-testing and that it "could
have made a mistake."
<snip>
------------------------------
Date: Mon, 26 Jan 1998 13:00:26
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 4--Islands in the Clickstream - January 24, 1998
Islands in the Clickstream:
Why the Soft Stuff is Hard
I am currently consulting with a large diverse organization about
technology and communication. Listening to the people on the
front lines, I discovered once again that the collective wisdom
of the work force is immense, but building structures to enable
that wisdom to flow freely isn't easy.
Every introduction of new technology in the organization created
problems. The "efficiency" of voice mail left people dangling.
They didn't know if messages had been heard, action was being
taken, or what. Email has solved some of those problems, but
created others. You get a response, one said, but people often
hide behind email, staying out of reach. They use words to duck
for cover, not communicate.
My mantra -- "Mutuality - Feedback - Accountability" -- holds
true here too. Unless all three are maintained, an organization
skews in predictable ways. Technology creates mutuality and
feedback only if the leader holds people accountable to how it's
used.
This particular business spent lots of money on hardware, less on
software, and almost nothing on training people to use email
effectively -- not how to use email programs, but how to use
words in a high-context medium.
When we need to communicate, we can walk down a hallway and speak
face-to-face, or pick up a telephone, or send email. Each medium
creates a different context. When building a virtual group, it
works best to have plenty of face-time up front, then use email
to sustain -- not replace -- those relationships.
Something that works when said face-to-face can feel like a
boxing-glove coming out of a closet when an email pops up on the
monitor and delivers the same words.
Computer networks are only half the solution. Computer networks
are fused to people networks. We humans beings animate the
network, making it alive. Otherwise it's a monster that over-
controls us. How we manage, not the computer network, but the
integrated human-computer system determines how knowledge is
leveraged in an enterprise.
Because "soft skills" are harder to teach and supervise than
tasks, we often spend more time buying chips and switches or
choosing software programs than wrestling with the real struggles
of the folks on the front lines.
We can use emoticons like smiley faces all we want -- adding
:-) or '-) or :-0 -- but emoticons don't convey subtleties or
innuendoes. Besides, different cultures use them differently.
The best carrier of meaning in the digital world is text. Using
speech -- including virtual speech -- and text effectively is
seldom taught. Yet "soft skills" are more important than ever in
a work place that relies more and more on computer technology.
The CEO of a large utility company told me he used to spend 85%
of his time on the generation and distribution of power, only 15%
on process issues. Now, he said, those percentages are reversed.
He agreed that 85% of the effectiveness of anyone at any job is
the "soft stuff" -- attitude, working well with others,
communication.
That CEO is not a touchy-feely kind of guy who can't wait to get
to the office to get his hugs. He's a left-brain executive more
comfortable with power grids than personnel. But managing people
during times of change requires that we pay attention to how
human beings link to one another, how energy and information
moves through the human as well as the electronic system. That
determines the real distribution of power.
The latest books addressing this issue call it management of
intellectual capital. When so many books on a single subject show
up on best-seller lists, it's best to treat the event as a
symptom rather than a solution. The symptoms show up for good
reasons, signalling a real need, but seldom provide the whole
answer.
Re-engineering, for example. Re-engineering was invented (duh!)
by engineers. They understood systems as if they were mechanical
and taught a process that restructured businesses through brute
force, a process better suited for rearranging marbles in boxes
than human beings in cubicles. In a recent interview in the Wall
Street Journal, Michael Hammer, one of the original re-
engineering gurus, acknowledged that he added two days to his
three-day seminar because he had not anticipated difficulty with
people. When asked what to do with people who could not adapt
easily to change. he had always replied, "Shoot them." He is
learning that the people are the system, and the coupling of
networked people and networked computers creates a single beast.
Ignoring how that hybrid learns, grows, and produces value
wreaked havoc in organizations that thought they were taking the
easy way out.
The recent emphasis on the proper use of intellectual capital is
one antidote to the excesses of re-engineering, a way to say that
knowledge and wisdom have to be managed, not ignored.
Of course, good leaders always knew that the engine of any
enterprise is the people who make it up, how they have learned to
work together, how they train and sustain one another -- in
short, the culture of the organization. They know too that how a
culture works is not always measurable. Their intuitive
understanding of creativity is a butterfly that can't be caught
with a calibrated net. So beware of books that reduce complex
human processes to simple grids.
Any integration of human beings and their technologies requires
that humans learn how to those technologies effectively to
minimize friction, generate and sustain energy, and keep tacking
back and forth across a straight line to our goal or vision. That
journey is a long-distance run, not a sprint, and a long-distance
run requires a different kind of training and a different kind of
discipline.
There are plenty of smart people in the work place, but sometimes
we need perspective rather than a quick fix. Perspective, Alan
Kay said, is worth 50 points of IQ. Wisdom may be scarcer than
intelligence, but it's nuclear fuel that burns clean and burns a
lot longer.
**********************************************************************
Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.
Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.
To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.
Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
ThiemeWorks on the Web: http://www.thiemeworks.com
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
------------------------------
Date: Wed, 4 Feb 1998 12:43:52 -0800
From: <rslade@sprint.ca>
Subject: File 5--"Secure Computing: Threats and Safeguards", Rita C. Summers
BKSCCMTS.RVW 971109
"Secure Computing: Threats and Safeguards", Rita C. Summers, 1997,
0-07-069419-2, C$87.95
%A Rita C. Summers
%C 300 Water Street, Whitby, Ontario L1N 9B6
%D 1997
%G 0-07-069419-2
%I McGraw-Hill Ryerson/Osborne
%O C$87.95 905-430-5000 +1-800-565-5758 +1-905-430-5134
%O fax: 905-430-5020 louisea@McGrawHill.ca lisah@McGrawHill.ca
%P 688 p.
%T "Secure Computing: Threats and Safeguards"
This work is intended as a general, and mostly complete, coverage of
all computer security topics. The author wishes to avoid the problem
of a number of specialized works that address only isolated subjects
within the field of security. The work is also intended for all
audiences: developers, purchasers, security experts, managers,
students, computer professionals, and even users. Just about
everyone, it seems, except the non computer-using public at large.
The book does provide a broad overview, looking at a general
introduction to concepts, the context for security, threats, policies,
models, cryptography, secure design and implementation, architecture
and operating systems, security services, database security, network
security, distributed systems, management, and analysis. Within those
topics are included such diverse elements as ethics and physical
security.
The content is said to cover the topics to a "moderate depth." This
depends upon what topic is being addressed. Theoretical areas are
dealt with in mathematical detail. More practical subjects get rather
short shrift. There is a very definite "large system" bias in the
work: the author's tenure at IBM will surprise nobody.
The book, while not completely disorganized, feels rather confused.
This may be because, while the first four chapters are collectively
referred to as "Foundations," in many ways the entire book is one long
backgrounder. Chapter four is entitled "Policies and Models" but
chapter twelve, on management, is much more appropriate as a guide to
what a security policy has to deal with and take account of.
(Ironically, the one place in the book that does suggest that the
question is better dealt with in a later section of the book is in the
section on viruses, which says that chapters eight and twelve provide
more detailed information on antiviral safeguards. Chapters eight and
twelve have nothing significant to say about the topic.)
References are listed at the end of each chapter, both as a collection
of works in bibliographic format, and in a section by section
annotation of suggested further readings. While a large number of the
citations are to magazine and periodical articles, a very healthy
selection of superior books are included as well.
There are a series of exercises at the end of each chapter.
Commendably few of these questions are simply tests of whether you
have read the material and can find the right page to copy the answer.
Most of them pose problems or questions for discussion and reflection.
However, in some cases I noted queries that were very open-ended, or
that admitted a large variety of answers depending upon your
interpretation of the question. In some other cases the material
presented in the chapter was not sufficient to properly deal with the
exercise.
Although Summers seems to be quite proud of producing what she
considers to be a very readable text, the writing is quite dry.
Perhaps in an attempt to "write down" to non-experts, the author
sometimes includes statements that are profoundly trivial, such as the
assertion in chapter four that a "computer security policy is
expressed in a language such as Spanish or English or Japanese."
While the point that natural language is not as precise as mathematics
might be valid, even in English it could be written better than that.
The section on computer viruses is quite weak. An old definition is
used that excludes boot sector infectors and macro viruses, but these
infectors are discussed within pages without note of the disparity.
Most of the research done in this area seems to be quite dated: a
virus prevalence survey from 1992 is cited that gives rates orders of
magnitude lower than currently seen. "Free software" and bulletin
boards are cited as possible sources (as usual), although surrounding
sentences note that any sharing of disks and even commercial software
can be viral vectors. Although not as pronounced, similar weaknesses
can be found in other technical sections. The chapter on cryptography
is "by the book" and while it does provide algorithms for many
encryption methods it doesn't address real issues of relative strength
and weakness in different methods.
Overall, the book provides a broad, but pedestrian, overview of data
and system security. It might best be recommended to students in
university and college courses on the topic.
copyright Robert M. Slade, 1997 BKSCCMTS.RVW 971109
------------------------------
Date: Thu, 5 Feb 1998 00:00:40 +0000
From: David Smith <bladex@bga.com>
Subject: File 6--At least someone has a sense of humor......
Source - fight-censorship@vorlon.mit.edu
http://www.techserver.com/newsroom/ntn/info/020498/info13_26321_noframes
.html
Congressmen says he worried about e-mail pregnancy
Copyright c 1998 Nando.net
Copyright c 1998 Reuters News Service
WASHINGTON (February 4, 1998 8:49 p.m. EST http://www.nando.net) -
Citing the case of a woman who claims she got pregnant from e-mail, an
Ohio Democrat called Wednesday for a "chastity chip" for the Internet.
Rep. James Traficant, known for his flamboyant rhetoric, gave a brief
floor speech about a woman named Frances who claimed to have gotten
pregnant through an e-mail exchange with a paramour 1,500 miles away.
"That's right -- pregnant," he proclaimed, warning of the dangers of
"immaculate reception."
He called on Congress to go beyond "v-chips" that would protect kids
from sexual content on the Internet, saying: "Its time for Congress to
act. The computers do not need a v-chip. The Internet needs a chastity
chip."
Although Traficant did not say whether he believed the woman's account,
he did say it was "enough to crash your hard drive."
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.10
************************************