Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 17

  



Computer underground Digest Sun Feb 28 1993 Volume 5 : Issue 17
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Editor: Etaion Shrdlu, Seniur

CONTENTS, #5.17 (Feb 28 1993)
Subject: File 1--Police motivations re. computer crime
Subject: File 2--ACLU Interesting in Rusty & Edie's BBS?
Subject: File 3--Re: File 4--Technology & Populist Publishing (#5.15)
Subject: File 4--A Case for Electronic Publishing
Subject: File 5--Obtaining Back Issues of CuD via FTP
Subject: File 6--New Computer Viruses Run Amok (sort of) (Reprint)
Subject: File 7--Netsys Startup

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
466893; and using anonymous FTP on the Internet from ftp.eff.org
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
Back issues also may be obtained from the mail server at
mailserv@batpad.lgb.ca.us.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: 26 Feb 1993 00:22:00 -0500 (EST)
From: MFPORTER@DELPHI.COM
Subject: File 1--Police motivations re. computer crime

In the wake of every law enforcement action involving hackers,
there is speculation about the motives of the police and the
government in targeting computer-related crime. As readers of CuD well
know, this topic can lead to some very wild conclusions -- The
Government must be afraid of something! They see "hackers" as a threat
to national security! The police are pawns of multi-national
corporations!

Conclusions such as these make for exciting commentary, but in the
end they are not productive. They play sharply upon people's fears,
but they sidestep the real challenges which face the community of
computer users.

The vast majority of the "hacker crackdown" actions and the
ongoing harassment of hackers have nothing to do with perceived
threats to national security. Most of the law enforcement actions
against hackers have consisted of cops simply trying to do their job:
protecting people from crime. This job includes protecting corporate
persons such as AT&T and the RBOCs, as well as their customers. (This
may not be the best use of our society's limited police resources, but
that's a different issue, as is the question of what should be defined
as a "crime.") To the police and prosecutors, the computer criminal is
just another criminal. In this sense, at least, in most computer-crime
cases -- as in most cases in general -- law enforcement agencies have
good intentions.

Good intentions, however, do not mean that there is not a real
threat to the civil liberties of those who use computers and telephone
networks. From Operation Sun Devil to the still-murky incident at the
Pentagon City Mall, we all have cause for concern about the choices of
both targets and methods by those who seek to fight computer-related
crime, whatever their intentions. Actions which are designed to deter
crime may all too easily deter honest citizens from exercising their
constitutionally protected freedoms. As Justice Louis D. Brandeis
wrote in 1928:

Experience should teach us to be most on our guard to
protect liberty when the Government's purposes are
beneficent. Men born to freedom are naturally alert to
repel invasion of their liberty by evil-minded rulers. The
greatest dangers to liberty lurk in insidious encroachment
by men of zeal, well-meaning but without understanding.
(_Olmstead v. United States_)

It's that lack of understanding which results in most of the
problems before us. We've all heard plenty of examples of some law
enforcement agents' lack of understanding of the computer world, be it
"underground" or otherwise. Extreme conclusions about the
government's motives, jumped to by some members of the computer
underground, show the lack of understanding on the other side.

Those who rely upon computers -- that is, everyone in the
developed world -- and everyone who is interested in preserving civil
liberties must work to bridge this gap in understanding. Books such as
_The Hacker Crackdown_, with its candid and fair assessment of the
events of 1990, from both sides of the fence, are an important step in
the right direction. So is the work of the Electronic Frontier
Foundation, which uses the tools of law and government to educate
those in power and to challenge those who would threaten our freedom.
Paranoia and extremism, on either side, does little to help.

((The author is an attorney in Maryland and a former systems analyst.))

------------------------------

Date: 26 Feb 1993 05:31:19 (EST)
From: anonymous@anony.mous.edu
Subject: File 2--ACLU Interesting in Rusty & Edie's BBS?

((MODERATORS' NOTE: The following summary was sent to us from a
Clarinet reader. One source cautions that the press may have
over-stated the involvement of the ACLU at this point. Also, the rumor
that the FBI seized the house in which the R&E computers were stored
is apparently not true. Reportedly, the FBI is returning the file
cabinet in which tax documents, house title, and other records were
kept.))

BOARDMAN, Ohio (UPI) -- The American Civil Liberties
Union of Ohio says it may challenge the constitutionality of an
FBI raid that shut down a Boardman computer bulletin board
service.

The Jan. 30 raid at the home of Russell and Edwinia
Hardenburgh was conducted with a search warrant that alleged the
couple illegally distributed copyrighted software programs
without permission.

The story reports that the board was one of the largest in the
country, with 124 phone lines. According to the story, R&E's
logged 3.4 million calls since 1984 and more than 4,000 new calls
daily. R&E's had over 14,000 subscribers.

The story summarizes the equipment seized, including business
records and hardware.

The ACLU's Ohio legal director, Kevin O'Neill, said
Thursday the FBI copyright infringement allegations might have
merit, but such allegations are normally resolved in civil
lawsuits. He noted that Rusty & Edie's 14,000 subscribers are
more subscribers than many small circulation newspapers enjoy.

"Shutting down a computer bulletin board is analogous
to shutting down a newspaper printing press," O'Neill said.
"Our conception of constitutionally protected public forums
must be broadened to include new communication networks like
computer bulletin boards."

The story reports that no charges have been filed against the
Hardenburgs and quotes Mark Kindt, a Cleveland businessman and
former regional director for the Federal Trade Commission, as
comparing the FBI raid to "hunting gnats with an elephant gun,"
and he suggests that the FBI should have been more careful in its
procedures.

%%Computer bulletin boards are electronic town halls.
Even if (Rusty & Edie's) pirated the moon, the government should
have proceeded in a more careful, deliberative manner."

------------------------------

Date: Thu, 25 Feb 93 10:43:38 PST
From: kurt@tc.fluke.COM (Kurt Guntheroth)
Subject: File 3--Re: File 4--Technology & Populist Publishing (#5.15)

Sheesh. Of course book publishing is business. Why should people
bear the great expense of typesetting, printing, and distributing a
book if they don't expect to make any money out of it. Sure, you'll
say it's for the love of books or the pursuit of knowledge, but that's
bullshit. Remember, if the publisher can't sell the book, that means
NOBODY WANTS TO READ IT.

Now maybe you know of a bunch of books that nobody wants to read but
are so critical to our intellectual growth that they must be published
anyway. I don't. I see a bunch of hack authors who THINK they have
something important to say, and a bunch of cultists, and a bunch of
paranoid conspiracy theorists, who can't get their garbage published
and want to take it out on anybody but themselves.

Sure an occasional gem may get missed by an editor pressed for time
and buried under mounds of material. But remember, those guys are
paid to find all the good stuff. They're quite motivated. I don't
think they miss very often.

Does a bunch of dreck get published? Sure. Is it worse than your
dreck? Maybe but maybe not. My father has written a book about his
dog for cirssakes. He can't get it published even though he's
convinced everyone wants to learn of his dog's great spirit and almost
telepathic link to her master. What's wrong with this picture? Is it
the cruel money hungry publishing industry, or perhaps has the author
misjudged the world's need to learn about his hound?

In short, I don't blame the publishing industry. Everyone in the
universe thinks they can write the great american novel. 99% of them
are dead wrong.

------------------------------

Date: Sat, 27 Feb 1993 23:18:54 (CST)
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
Subject: File 4--A Case for Electronic Publishing

Kurt Guntheroth makes several legitimate points in criticizing the
problems of electronic publishing. Yes, there is much chaff amidst the
wheat. Yes, everybody who writes (obviously) thinks that they have
something worth reading. Yes, there is much value in the gate-keeping
processes of the publishing business. Yes, the advent of electronic
publishing could flood cyberspace with near-infinite bytes of
nonsense. But, while agreeing on those points, let's take a second
look at the implications of Phil Shapiro's post in CuD 5.15 to which
Kurt responds ("Something's not quite right," File 4).

The original poster made two main points: Conventional publishing,
whether books or peer-reviewed journal articles, is an arduous task,
far more difficult than non-writers recognize. Publishers may reject
books because of quality or because the manuscript, while worthy, does
not fall within a topical theme that many publishers, especially
academic ones, put together as a specialty for marketing purposes.
Although writers with a demonstrable track record of successful
publishing often need only provide a short prospectus and perhaps a
first chapter to entice a publisher to offer a contract, most writers
must provide more. It is expensive and time consuming to identify and
contact appropriate publishers, which dissuades many from publishing.
Rejections are generally discouraging, and only with experience (and
some previous publishing success) does an author realize that
rejection is built into the publishing game. Writing and publishing
are both psychologically and physically hard work.

Second, the original poster correctly identified the potential of
electronic media as a possible alternative that would supplement,
*not* replace, conventional publishing. I agree with the spirit of
Kurt's criticisms--the potential for expanded access to ideas and
information carries with it the risk of inundation with banal
self-indulgence. However, the value of the former considerably
outweighs the risks of the latter.

Let's compare a few features of print with electronic media.

1. Book publishing is market driven. This is not necessarily bad, but
it does mean that if an insufficient audience exists to purchase the
book, it will likely not be published.

2. Book publication is slow. The core ideas of most scholarly works
are at least two years old when a book hits the streets. For example,
a book written in 1986-87 that is submitted to the publisher in 1988
would undergo editing, minor revisions, and galley proofing, and hit
the streets in 1989.

3. Books are generally limited by a production format that conforms to
preferred length and style. This can impose arbitrary restrictions of
ideas presented in chapters, shape the organization of the ideas and
discourse, and artificially truncate the development of crucial ideas.

None of these disadvantages are prohibitive. Authors and publishers
have worked around them for centuries. But, electronic publishing
offers something more. What does it offer?

1. Electronic publishing is fairly immediate. One can "publish" as
soon as the text has been typed in (and hopefully edited and
spell-checked). For scholarly works, this dramatically updates data,
disseminates ideas and scholarship, and keeps others abreast of
research and bibliographies in a timely fashion.

2. Electronic publishing is, for the end user, nearly free.
Newsletters such as Telecom Digest, EFFector, People's Tribune,
Cu-Digest, or the E-Journal need not recoup postage, publication
costs, or salaries for the masochistic folk who put them out.

3. Electronic publishing is able to effectively and economically
target and reach a fairly specialized audience and fill a vacuum
untouched by print media. There is no hard-copy counterpart to CuD,
PHRACK, the cDc publications, Activist Times Inc., and some of the
other successful journal/newsletters.

4. Electronic publishing is effective. Readers can judge for
themselves the value of CuD, but it's undeniable that the pioneering
efforts of PHRACK, LOD/TJ, P/hun, PIRATE, and similar publications
were critical to shaping one slice of the computer culture of the
1980s. Comparable hardcopy publications would unlikely have been as
effective or as widely distributed.

That said, some critics identify potential problems. The drawbacks of
electronic publishing derive in part from its strengths. The ease of
publication reduces quality control; Some doubt that the review
process for scholarly journals would be as rigorous (although there is
certainly no reason inherent in the medium for this to be so);
Gresham's law might apply--schlock will drive out the quality works;
nobody will read it.

I have more faith in cybernauts than the critics. A few examples might
illustrate my point.

1. Most end-users possess a delete function (or, at worst,
ctl/alt/del). One isn't forced to read a 500K tome if it is dull, and
poor works will remain confined to a space in a directory corner and
eventually be copied over with something more pleasing.

2. Current forms of electronic communication provide hints for the
fate of works in which there is no interest. Electronic newsletters
come and go, Usenet and other discussion groups emerge and if they are
popular, they thrive. If they are unpopular, they languish and stay
dormant. Telecom Digest has been in existance for over a decade, and
PHRACK for almost as long. Even CuD is entering its fourth year. They
have not been driven out by the explosion of other publications, and
their readership steadily increases. If electronic publications
attempt to remain sensitive to the audience and attempt--as Pat
Townson has done with Telecom Digest--to keep on the cutting edge of
timely issues, they will continue to provide a valuable supplement to
print media.

3. Electronic publications are often ad hoc and unsupervised. For
media intending to establish credibility as scholarly outlets, this
can be a problem. Electronic publications are rarely peer reviewed,
publications generally do not count toward the tenure sheet, and
without some quality control, the "findings" of studies may lack
legitimacy. The way around this simple: Professional associations can
more aggressively sponsor electronic media in the same way that many
sponsor their journals. If, for example, the Midwest Sociology Society
began an electronic journal, it could have the same quality controls,
the same editorial guidance, and the same procedure it uses for its
hardcopy quartly (The Sociological Quarterly). The same could apply
to monographs, whether fiction or non-fiction.

4.1 If everybody who thought they could write a book actually wrote
one, the nets would be inundated. This possibility, though, is
unlikely. Not everybody who thinks they can write a book is actually
capable of doing so, and many a work lies uncompleted because the
author lost steam, ideas, or motivation to continue. Books are also
difficult to read on-line, and printing them off can be more of a
bother than it's worth. Even hypertext (or the equivalents) requires
considerable perseverance by the reader to wade through a long tome.
It is unlikely that books will flood the nets.

5) How do we respond to "trash?" Even recent partjSRAants in Usenet
newsgroups are aware of the high signal-to-noise ratio in most groups.
Delete keys and kill files work quite well. Or, in the worst cases,
one simply unsubscribes, and Voila! No more trash.

A few examples from my own experience illustrate some of the potential
of electronic publishing. In teaching criminal justice courses, I'm
often unable to find appropriate texts. It's possible to pull together
papers from journals and use Kinko's to reproduce them. This, however,
can be expensive and the problems of copyright must be overcome.
Colleagues with works-in-progress, unpublished papers, or book
chapters in draft form share the electronic versions which I print out
for a fraction of conventional publishing (or even Kinko) costs, and
they become the classroom resource. Texts are thereby tailored to a
specific course with a specific instructor's style, students save
money, and life is good. In a second example, I finished a draft
chapter for a book. The draft was several hundred pages long, and it
had to be reduced to about 35 pages. The full text, although
book-length, was a bit too narrow for a conventional book market.
Through the marvels of electronic publishing, I was able to tailor it
to a course I periodically teach, revise it each time the course is
taught, and use it in place of a text. It's quick, cheap, makes
lecturing much easier, the students are happy, the instructor is
happy, and life is good. Could this manuscript be revised into a
conventional book? Sure. But time constraints and changing interests
make it unlikely that I ever will. I'm quite content to limit it to
friends' and classroom use. Here, Kurt is again correct--this is a
work that isn't appropriate in its present form for a book. But, Phil,
too, is correct--conventional publishers have left a gap, and the
value of electronic publishing is the ability to fill it.

The publishing industry is lagging behind to the extent that it is not
developing innovative ways of plugging into the electronic age to take
advantage of the accessibility and economy of a potential market.
Especially in times of economic crunch, many of us are cutting back on
books and journals and relying more on less conventional media for
professional development. As the price of books increases, many of us
are simply priced out of the market. We are not priced out of the net.

It bears repeating that I am not arguing for a replacement for
conventional publications, but for a supplement to them. As one who
publishes extensively in conventional outlets, I fully recognize
their value. The way to publish electronically is to...is to..well,
is to publish electronically. The outlets are growing, as illustrated
by those on Arachnet, a Bitnet discussion group devoted to addressing
these issues. The E-Journal provides a model for how an electronic
medium can establish an editorial board and a peer review process.
Telecom Digest and Risks Digest are nifty examples of accurate and
up-to-date information being spread, debated, and refined. Cu-Digest
is an example of how USA Today might look if it went electronic with
an open forum (according to one observer, although I'm not sure if
that's an insult or a compliment).

In short, I agree with Kurt, but I also agree with Phil Shapiro.
Electronic publishing possesses risks, but it also possesses a
potential whose value has barely been recognized. Those who have read
to this line are on the cutting edge of it all, and the way to develop
it is to submit articles, subscribe to newsgroups, and continue to
participate in carving out a niche on the frontier.

------------------------------

Date: Sat, 27 Feb 1993 11:41:21 (CST)
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
Subject: File 5--Obtaining Back Issues of CuD via FTP

CuD Moderators are continually asked: "What's ftp and how to I use
it?"

"FTP" stands for File Transfer Protocol and is a way of obtaining
files from a remote site. You must have a computer account with ftp
capability. Universities and some public access systems are common
locations for such accounts. The system you are on must also support
ftp. If you aren't sure what this means, contact your local sysguru.
If you have access only to your favorite local BBS, you're out of
luck. You should invest a few dollars for an account on The Well,
Mindvox, Netsys, Netcom, or some of the other systems providing
ftp/telnet/IRC and other services.

Addresses for the ftp sites are listed in the header at the top of
each issue of CuD. The CuD archives and mailserver are maintained by
a bunch of hardworking guys (listed in the header, above) and through
the generosity of the systems that provide the space. If you browse
the archives, keep these points in mind as a matter of courtesy to
those providing the space:

1. USE THE FACILITIES DURING OFF-HOURS (the more off the better) TO
LIMIT CONGESTION

2. DO NOT STAY ON LONGER THAN NECESSARY

3. USE THE SITE CLOSEST TO YOU

The CuD Archmeisters have set up the sites identically. If your system
allows ftping, you can try typing this command:

ftp some.address.you.choose.edu

Then, assuming all works as it should, you will be connected and asked
for your login. At the prompt, type: anonymous

You will then be asked for your password. Type your logon id. If I were to
log into Dan Carasone's site in Australia, I would simply type:
login? anonymous
pw? tk0jut2@mp.cs.niu.edu

You move about in these systems as you would in most other Unix
systems. Use "cd" to change directories, "ls" to see what's in a
directory, and other standard stuff. Remember, commands, directory
names, and files are case-sensitive, so be sure to keep upper and
lower case letters straight. After you've logged in, change to the
cud directory by typing:
cd pub/cud

Then type
ls
and you should see the following:

150 Opening ASCII mode data connection for /bin/ls.
total 120
-rw-r--r-- 1 brendan 12 0 Apr 25 1992 .notar
-rw-r--r-- 1 brendan 149 5291 Feb 24 08:11 Added
-rw-r--r-- 1 brendan 149 11776 Feb 24 08:11 Index
drwxr-xr-x 2 brendan 149 512 May 18 14:08 alcor
drwxr-xr-x 2 brendan 149 512 May 18 14:08 ane
drwxr-xr-x 2 brendan 149 512 Jan 3 22:12 aotd
drwxr-xr-x 2 brendan 149 1024 Nov 12 22:41 ati
drwxr-xr-x 2 brendan 149 512 May 18 14:08 bootlegger
drwxr-xr-x 3 brendan 149 512 Apr 25 1992 ccc
drwxr-xr-x 2 brendan 149 3584 Jan 7 04:04 cdc
drwxr-xr-x 2 brendan 149 512 Apr 25 1992 cdugd
drwxr-xr-x 2 brendan 149 512 May 18 14:09 chalisti
drwxr-xr-x 2 brendan 149 512 Feb 24 08:10 chaos
drwxr-xr-x 2 brendan 149 512 May 18 14:09 cpi
drwxr-xr-x 2 brendan 149 3584 Feb 22 22:45 cud
drwxr-xr-x 2 brendan 149 512 Oct 17 05:28 dfp
drwxr-xr-x 2 brendan 149 512 Apr 25 1992 fbi
drwxr-xr-x 2 brendan 149 512 Nov 2 19:24 inform
drwxr-xr-x 2 brendan 149 1024 Apr 25 1992 law
drwxr-xr-x 2 brendan 149 512 May 18 14:09 lod
drwxr-xr-x 2 brendan 149 512 Feb 10 01:54 misc
drwxr-xr-x 2 brendan 149 512 May 18 14:09 narc
drwxr-xr-x 2 brendan 149 512 Apr 25 1992 networks
drwxr-xr-x 2 brendan 149 512 Apr 25 1992 nfx
drwxr-xr-x 2 brendan 149 1536 Oct 6 17:38 nia
drwxr-xr-x 2 brendan 149 512 May 18 14:09 nsa
drwxr-xr-x 2 brendan 149 1536 Dec 11 07:53 papers
drwxr-xr-x 2 brendan 149 512 Feb 10 01:54 phantasy
drwxr-xr-x 2 brendan 149 1024 Jan 7 04:08 phrack
drwxr-xr-x 2 brendan 149 512 May 18 14:09 phun
drwxr-xr-x 2 brendan 149 512 May 18 14:09 pirate
drwxr-xr-x 2 brendan 149 512 May 18 14:09 ppp
drwxr-xr-x 2 brendan 149 1024 Apr 25 1992 schools
drwxr-xr-x 2 brendan 149 512 May 18 14:09 synd
drwxr-xr-x 2 brendan 149 512 May 18 14:09 tap
drwxr-xr-x 2 brendan 149 512 Sep 18 17:58 upi
drwxr-xr-x 2 brendan 149 512 Nov 29 21:22 wview

Each of the above are subdirectories that contain papers, journals,
and other documents. "phantasy" contains back issues of Phantasy.
"lod" contains the "Legion of Doom/Technical Journals." "cud"
contains all the back issues of CuD, including indexes. To get to
these subdirectories, simply type
cd cud (or: cd tap or whatever).
To download a file, the command is get file.name (or, for multiple
files,
mget file.name1 file.name2)

A file that ends in .Z is a compressed file, which means, after
downloading to your own system, you must uncompress. If you
get a file called file.Z, to uncompress the command
uncompress file.Z should work.

If this sounds confusing, we strongly recommend purchasing Brendan
Kehoe's ZEN AND THE ART OF THE INTERNET or Ed Krol's THE WHOLE
INTERNET. Both are worth having, and both provide easy-to-follow
instructions.

PLEASE REMEMBER: AS A COURTESY TO THOSE WHO MAINTAIN THE ARCHIVES AND
ESPECIALL TO THOSE KIND ENOUGH TO PROVIDE SPACE, BE GOOD NET CITIZEN:
1) LOG IN AT OFF-HOURS (after midnight on the site's time), 2) DO NOT
BE A HOG, and 3) USE THE SITE NEAREST YOU.

If you have problems with ftp, it is best to first ask your local
gurus for advice rather than the ftp site crowd or the CuD moderators.
We don't know your system, so we're not the ones to ask.

------------------------------

Date: Sat, 27 Feb 93 11:27 CST
From: tk0kbf1@mvs.cso.niu.edu
Subject: File 6--New Computer Viruses Run Amok (sort of) (Reprint)

This came to me in e-mail today, having travelled around half the
country first. I don't know who Maggie Zarnosky is, but she deserves
a big thank you. Spread it around with pleasure!

================================================================


MAGGIE ZARNOSKY, LIBRARY, VA. POLYTECHNIC UNIV.,SENT ME THIS. ENJOY!!:

VIRUSES:

PAUL REVERE VIRUS: This revolutionary virus does not horse around.
It warns you of impending hard disk attack---once if by LAN,
twice if by C:.

POLITICALLY CORRECT VIRUS: Never calls itself a "virus," but instead
refers to itself as an "electronic microorganism."

RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of
how old it is. If you attempt to erase a file, it requires you to
first see a counselor about possible alternatives.

ROSS PEROT VIRUS: Activates every component in your system, just
before the whole thing quits.

MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB,
and then slowly expands back to 200MB.

AT&T VIRUS: Every three minutes it tells you what great service you
are getting.

THE MCI VIRUS: Every three minutes it reminds you that you're paying
too much for the AT&T virus.

TED TURNER VIRUS: Colorizes your monochrome monitor.

ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll
be back.

DAN QUAYLE VIRUS: Prevents your system from spawning any child
processes without joining into a binary network.

DAN QUAYLE VIRUS 2: Their is sumthing rong with your computer, ewe
just can't figyour out watt.

GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic
software says everything is fine.

NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of
people really mad just thinking about it.

FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of
little units, each of which does practically nothing, but all of
which claim to be the most important part of the computer.

GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent
of their data 14 percent of the time (plus or minus a 3.5 percent
margin of error).

TERRY RANDLE VIRUS: Prints "Oh no you don't" whenever you choose
"Abort" from the "Abort, Retry, Fail" message.

TEXAS VIRUS: Makes sure that it's bigger than any other file.

ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

MICHAEL JACKSON VIRUS: Hard to identify because it is constantly
altering its appearance. This virus won't harm your PC, but it will
trash your car.

CONGRESSIONAL VIRUS: The computer locks up, screen splits eratically
with a message appearing on each half blaming the other side for the
problem.

AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own
motherboard.

PBS VIRUS: Your PC stops every few minutes to ask for money.

ELVIS VIRUS: Your computer gets fat, slow, and lazy and then self
destructs, only to resurface at shopping malls and service stations
across rural America.

OLLIE NORTH VIRUS: Turns your printer into a document shredder.

NIKE VIRUS: Just Does It!

SEARS VIRUS: Your data won't appear unless you buy new cables, power
supply, and a set of shocks.

JIMMY HOFFA VIRUS: Nobody can find it.

CONGRESSIONAL VIRUS: Runs every program on the hard drive
simultaneously, but doesn't allow the user to accomplish anything.

KEVORKIAN VIRUS: Helps your computer shut down whenever it wants to.

IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up
then subtracts money from your Quicken account and spends it all on
expensive shoes it purchases through Prodigy.

STAR TREK VIRUS: Invades your system in places where no virus has gone
before.

HEALTH CARE VIRUS: Test your system for a day, finds nothing wrong, and
sends you a bill for $4,500.

GEORGE BUSH VIRUS: It starts by boldly stating, "Read my test.... no
new files!" on the screen, proceeds to fill up all the free space on
your hard drive with new files, then blames it on the Congress Virus.

CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a
286/AT.

LAPD VIRUS: It claims it feels threatened by the other files on your PC
and erases them in "self-defense."

CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last
in the reviews, but you still love it.

------------------------------

Date: Sun, 21 Feb 93 20:33:40 PST
From: Len Rose <len@NETSYS.COM>
Subject: File 7--Netsys Startup

NETSYS COMMUNICATION SERVICES Palo Alto, California

Netsys is a network of large Sun servers dedicated to providing
Internet access to individuals and corporations that need solid,
reliable Internet connectivity.

An account on Netsys will provide members with :

Electronic Mail: to/from the Internet and gatewayed networks.
(including BITNET, MILNET, and even Compuserve).

Usenet: The worldwide networked message system that generates
roughly 40-50 megabytes of information daily.

Telnet: The capability to login to any remote host in any part
of the world.

Ftp: The ability to send and receive documents/programs/data
to/from any site in the world.

Misc: Archie,Gopher, Internet Relay Chat, and WAIS search tools.

Support: 24 hour emergency response service.

Dialups: Palo Alto area, High Speed (V.32 and PEP)

Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes)

$1 per megabyte per month over 5 megabytes.

Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes)
$1 per megabyte per month over 10 megabytes.

Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
newsgroups,and including all foreign newsgroups.

SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE

Satellite Weather: Netsys has available real time satellite weather
imagery. Images are available in gif, or Sun raster
format. Contact us for NFS mirroring, and other special
arrangement. These images are directly downlinked from
the GOES bird. Contact Steve Eigsti (steve@netsys.com)

Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service

for large volume news distribution. Members of Netsys
can obtain substantial discounts for the purchase and
service costs of this revolutionary method of Usenet news
distribution.Both Unix and MS Windows software available.
Contact Kate Alexander (kate@pagesat.com) for product
information.

Paging Services: Netsys is offering Pagesat's Internet to Pager mail service.
Members of Netsys can obtain critical email to pager
services. Pagesat has the ability to gateway any critical
electronic mail to your display pager.

Leased Line Internet Connections

Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
United States. Since Pagesat is an FCC common carrier, our savings on
leased lines can be passed on to you. For further information, contact
Duane Dubay (djd@pagesat.com).

We offer other services such as creating domains, acting as MX
forwarders, and of course uucp based newsfeeds.

Netsys is now offering completely open shell access to internet users.
For accounts, or more information , send mail to netsys@netsys.com

Netsys will NEVER accept more members than our capacity to serve.

Netsys prides itself on it's excellent connectivity (including multiple T1's,
and SMDS) ,lightly loaded systems, and it's clientele.

We're not your average Internet Service Provider. And it shows.

------------------------------

End of Computer Underground Digest #5.17
************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT