Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 04 Issue 03

  



Computer underground Digest Fri, Jan 24, 1992 Volume 4 : Issue 03

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #4.03 ( Jan 24, 1992)
Subject: File 1--INDEX TO CuD, VOLUME 3

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 23 Jan 92 18:32:10
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--INDEX TO CuD, VOLUME 3



Volume 3, Issue #3.00 (January 6, 1991)

CuD #3.00: File 1 of 6: Moderator's corner
CuD #3.00: File 2 of 6: From the Mailbag
CuD #3.00: File 3 of 6: Gender-Neutral Language
CuD #3.00: File 4 of 6: Sexism and the CU
CuD #3.00: File 5 of 6: Security on the Net
CuD #3.00: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.01 (January 12, 1991)

SPECIAL ISSUE: RESPONSES TO CU/SEXISM ARTICLES

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.02 (January 16, 1991)

SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.03 (January 22, 1991)

CuD #3.03: File 1 of 4: Moderator's corner
CuD #3.03: File 2 of 4: From the Mailbag
CuD #3.03: File 3 of 4: CU-Related Bibliography
CuD #3.03: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.04 (January 28, 1991)

CuD #3.04, File 1 of 4: Moderator's corner
CuD #3.04, File 2 of 4: From the Mailbag
CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
CuD #3.04, File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.05 (February 9, 1991)

CuD #3.05, File 1 of 8: Moderator's corner
CuD #3.05: File 2 of 8: From the Mailbag
CuD #3.05: File 3 of 8: Arrest of Phiber Optik
CuD #3.05: File 4 of 8: The Dictator--My Thoughts
CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint)
CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops.
CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt
CuD #3.05: File 8 of 8: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.06 (February 23, 1991)


CuD #3.06, File 1 of 6: Moderator's corner
CuD #3.06: File 2 of 6: From the Mailbag
CuD #3.06: File 3 of 6: CuD Archive Server
CuD #3.06: File 4 of 6: No Felony Charges against Phiber O.
CuD #3.06: File 5 of 6: The FBI Comes Rapping.....
CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.07 (March 2, 1991)

CuD #3.07, File 1 of 6: Moderator's corner
CuD #3.07: File 2 of 6: From the Mailbag
CuD #3.07: File 3 of 6: CuD Index for Volume Two
CuD #3.07: File 4 of 6: EFF Job Announcement
CuD #3.07: File 5 of 6: Computers in the Movies
CuD #3.07: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.08 (March 12, 1991)

CuD #3.08, File 1 of 6: Moderator's corner
CuD #3.08: File 2 of 6: From the Mailbag
CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted
CuD #3.08: File 4 of 6: What the EFF's Been Doing
CuD #3.08: File 5 of 6: Book Review: Computer Ethics
CuD #3.08: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.09 (March 19, 1991)

CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype?
CuD #3.09: File 2 of 2: Computers & First Amendment

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.10 (March 28, 1991)

CuD #3.10--File 1 of 5: From the Mailbag
CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II
CuD #3.10--File 3 of 5: AP Story on Len Rose
CuD #3.10--File 4 of 5: Washington Post Story on Len Rose
CuD #3.10--File 5 of 5: Len Rose and the Washington Post

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.11 (April 4, 1991)

CuD #3.11: File 1 of 5: Moderators' Corner
CuD #3.11: File 2 of 5: From the Mailbag
CuD #3.11: File 3 of 5: Sundevil Arrest Announced
CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose
CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.12 (April 15, 1991)

CuD #3.12: File 1 of 4: From the Moderators
CuD #3.12: File 2 of 4: From the Mailbag
CuD #3.12: File 3 of 4: Responses to Business Week Article
CuD #3.12: File 4 of 4: Using the CuD mailserver

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.13 (April 21, 1991)

CuD #3.13: File 1 of 4: From the Mailbag
CuD #3.13: File 2 of 4: Response to Len Rose Article (1)
CuD #3.13: File 3 of 4: Response to Len Rose Article (2)
CuD #3.13: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.14 (April 26, 1991)

CuD #3.14: File 1 of 6: Moderators Corner
CuD #3.14: File 2 of 6: Comments on Len Rose Articles
CuD #3.14: File 3 of 6: Moving toward Common Ground?
CuD #3.14: File 4 of 6: CERT Advisory
CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker
CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.15 (May 2, 1991)

CuD #3.15: File 1 of 3: Moderators Corner
CuD #3.15: File 2 of 3: The CU in the News
CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.16 (May 9, 1991)

CuD #3.16: File 1 of 6: Moderators Corner
CuD #3.16: File 2 of 6: Is Prodigy Snooping?
CuD #3.16: File 3 of 6: Prodigy under Fire
CuD #3.16: File 4 of 6: Assorted Comments on Prodigy
CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File
CuD #3.16: File 6 of 6: A Few Observations on Prodigy

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.17 (May 17, 1991)

CuD #3.17: File 1 of 5: Moderators Corner
CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing
CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing
CuD #3.17: File 4 of 5: Exhibit A from Memorandum
CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Volume 3, Issue #3.18 (May 28, 1991)

SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.19 (June 4, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Thrifty-Tel--Victim or Victimizer?
File 4: The CU in the News
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.20 (June 10, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Bay Area Archive Site
File 4: Top Ten Fallacies about SJG Raid
File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance
File 6: EFFector Online 1.07: S.266 Loses First Round
File 7: How to get WATCH.EXE
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.21 (June 17, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Review of Gary Marx's UNDERCOVER
File 4: Review of PROTECTORS OF PRIVILEGE
File 5: Review of THE INFORMATION WEB
File 6: Hollywood Hacker Sentenced
File 7: Len Rose Sentenced (Reprint from Newsbytes)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.22 (June 21, 1991)
CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Punishment and Control: Reply to Gene Spafford
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.24 (July 3, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag (Response to "Cyberpunk" definition)
File 2: Bill Vajk, Len Rose, Gene Spafford
File 3: Comsec Security Press Release
File 4: Comments on ComSec Data Security
File 5: Police Confiscations and Police Profit
File 6: House Crime Bill (1400) and its Threat to Modemers
File 7: Law Panel Recommends Computer Search Procedures
File 8: The CU in the News (data erasing; cellular fraud)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 3, Issue #3.23 (June 27, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag (Response to Dalton; Hacker Definitions)
File 2: Warrants issued for Indiana and Michigan "Hackers"
File 3: More on Thrifty-Tel
File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Today's Contents:
Moderators' Corner
Spaf's Response to Bill Vajk
Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach)
LOD Members for Comsec Computer Security (News Reprint)
Alcor Email (ECPA) Case Settled (Keith Henson)
NIST announces public-key digital signature standard (gnu)
Secret Service Pays Hacker Call (Reprint from Newsbytes)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.26 (June 18, 1991)
File 1: Moderators' Corner
File 2: The Vajk-Spaf-Leichter dialogue continues......
File 3: The TERMINUS of Len Rose
File 4: "Computer Crime" paper by Brian Peretti available
File 5: Doc Savage Sentenced (NEWSBYTES Reprint)
File 6: CompuServe Responds to Policy and Operations Questions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.27 (July 27, 1991)
Subject: File 1-- Response to "The Terminus of Len Rose"(1)
Subject: File 2-- Response to "The Terminus of Len Rose"(2)
Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3)
Subject: File 4-- chinet review
Subject: File 5-- Comsec Data Security Article Corrections
Subject: File 6-- Crypto-conference statement
Subject: File 7-- Reasonable laws on computer crime
Subject: File 8-- re: Bill Vajk's latest comments
Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de
Subject: File 10--Late reply to Dutch Crackers article (CUD3.19)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28)
>> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE <<

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.28 (August 1, 1991)
Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE
Subject: File 2--CuD Review of _Computer Ethics_ (Reprint)
Subject: File 3--Re: Hackers - Clamp Down NOW!
Subject: File 4--Reply to Tom Forester Article

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.29 (AUGUST 9, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Say Goodbye to FOIA?
Subject: File 3--Hackers Challenged to Break In
Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson
Subject: File 5--text of chron-spacemail
Subject: File 6--Reply to Gene Spafford
Subject: File 7--Estimates on virus activity
Subject: File 8--Research Analysis
Subject: File 9--comp.patents, misc.legal.computing and misc.int-property

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

#3.30 (AUGUST 16, 1991)
File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
File 4--Mystery Lurks In The Death of INSLAW Reporter

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.31 (AUGUST 23, 1991)
File 1--Moderators' Corner: Blurbs
File 2--Request info on suggestions for a class
File 3--New BBS for CuD back issues and other services
File 4--Moderators' Corner: Blurbs
File 5--BOARDWATCH Magazine
File 6--NREN Boondoggle?
File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
File 8--Memes, Gurus, and Viruses

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-

CONTENTS, #3.32 (September 8, 1991)
File 1--CYBERPUNK Review
File 2--Review of _CYBERPUNK_
File 3--_CYBERPUNK_ Review
File 4--Newsweek review CYBERPUNK
File 5--Review of _CYBERPUNK_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.33 ( September 14, 1991)
File 1--Moderators' Corner
File 2--Clarification of "Boycott" Comment
File 3--How BellSouth Calculated $79,000
File 4--Houston Chronicle spacemail follow
File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
File 6--"Freaker's Bureau Incorporated" (FBI)
File 7--Review of Site Security Handbook (by Dark Adept)
File 8--Complain to Journalists
File 9--Spaf's Response to Reviews of _Unix Security_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.34 ( September 25, 1991)
File 1--Moderators' Corner
File 2--WANTED: TARGETS OF OPERATION SUN DEVIL
File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint)
File 4--New York Tax Law and Commentary by Tony Mack
File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint)
File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint)
File 7--Clarification of NY BBS Law
File 8--Summary of Significance of NY "BBS Download Tax" (reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.35 ( October 4, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
Subject: File 3--Computer Security Basics review
Subject: File 4--Steam age cyberpunk
Subject: File 5--Errata to "Practical Unix Security"
Subject: File 6--Living with the Law -- A view from Finland
Subject: File 7--Let's Get It Right.
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
Subject: File 9--Announcement
Subject: File 10--Cyberspace Conference in Montreal
Subject: File 11--Conference Info and Press Releases

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.36 ( October 12, 1991)
Subject: File 1-- Intro to Biblio and Resources Moderators' Corner
Subject: File 2-- General CU-Related Bibliography
Subject: File 3-- Dissertations and Theses
Subject: File 4-- General On-Line and Print Resources
Subject: File 5-- Misc. Books for Fun Reading

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

**** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****

CONTENTS, #3.37 ( October 19, 1991)
File 1: Summary of Geraldo's _Now it can be Told_
File 2: Excerpts from "Mad Hacker's Key Party"
File 3: Review_of_Now_It_Can_Be_Told_
File 4: Geraldo Rivera show on "Hacking"
File 5: The_RISKS_of_Geraldo
File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.38 ( October 27, 1991)
File 1: Geraldo's _Now it can be Told_ Revisited
File 2: Comment on the Geraldo Show
File 3: A Guest's-eye view of the Geraldo Show
File 4: Second Thoughts about the "Ingraham Massacre"
File 5: Response to CuD #3.37's "Mad Hacker" Issue
File 6: Release of Informatik #1
File 7: Second Annual XMASCON

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.39 ( November 3, 1991)
File 1: Moderator's Corner--Brendan Kehoe's FTP information
File 2: The Secret Service and Protection of Privacy
File 3: Re: Response to Bill Vajk's FOIA Piece
File 4: Letters from Prison: Installment #1
File 5: Diehard 2 And Hacking
File 6: Re: CuD - Now It Can Be Told
File 7: Is the Government creating malign hackers?

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.40 ( November 10, 1991)
File 1: Rhetoric and CuD
File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38
File 3: Response to Ingraham Criticisms
File 4: Draft of BBS warnings to Law Enforcement Agents
File 5: CU Bibliography Update
File 6: Senate Bill 516 : Electronic Privacy in the Workplace
File 7: Letter from Prison (part 2 of 2)
File 8: "Password violations helped Hill hacker"

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS, #3.41 ( November 16, 1991)

Bill Cook's opening statement in Neidorf/PHRACK trial

...and more!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.42 ( November 30, 1991)
File 1--Moderators' Corner
File 2--CPSR FOIAs Secret Service
File 3--Responses to CPSR (Reprinted from Telecom Digest)
File 4--Why Covert Surveillance is Wrong

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.43 ( Dec 8, 1991)
File 1--Moderators' Corner
File 2--You can help build the National Public Network. Here's how.
File 3--#3.41--Bill Cook's opening statement in the Neidorf trial
File 4-- Two Juveniles arrested in BBS Extortion case
File 5--Law Enforcement and Rights
File 6--Townson's reply to Neidorf (in Cu Digest, #3.42)
File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson)
File 8--Software Piracy
File 9--Hacker Convicted
File 10--"Teens Tapped Computers of U.S. Military"
File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
File 12--Here's something you might find of interest
File 13--24 Year Old Cracks NASA

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.44 ( Dec 17, 1991)
File 1: Jyrkis Posting
File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected
File 3: FBI vs Kiddie Porn
File 4: "Getting what he Deserved?" (Reprint from Effector 2.02)
File 5--A book worth adding to your CuD list ...
File 6: E-mail privacy bibliography
File 7: Second CFP Conference

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
** END CuD INDEX VOLUME 3 **
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

------------------------------

End of Computer Underground Digest #4.03
************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT