Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 08 Issue 56

  


Computer underground Digest Tue Jul 30, 1996 Volume 8 : Issue 56
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.56 (Tue, Jul 30, 1996)

File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd)
File 2--Re: "Blocking Software (CuD 8.53)
File 3--Singapore officials censor U.S. newgroup posting
File 4--Net-child porn ring apprehended, details from SJMN
File 5--Net Porn: The Communism of the 1990s
File 6--U.S. Official Warns OF "
Electronic Pearl Harbor"
File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd)
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 30 Jul 1996 16:46:48 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd)

From -Noah

---------- Forwarded message ----------
Date: Tue, 30 Jul 1996 15:17:25 -0400
From: CERT Bulletin <cert-advisory@cert.org>
To--cert-advisory@cert.org
Subject--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD

=============================================================================
CERT(sm) Vendor-Initiated Bulletin VB-96.12
July 30, 1996

Topic: "
Trojan Horse" vulnerability via rz program
Source: FreeBSD, Inc.

To aid in the wide distribution of essential security information, the CERT
Coordination Center is forwarding the following information from FreeBSD, Inc.
FreeBSD, Inc. urges you to act on this information as soon as possible.
FreeBSD, Inc. contact information is included in the forwarded text below;
please contact them if you have any questions or need further information.


=======================FORWARDED TEXT STARTS HERE============================

=============================================================================
FreeBSD-SA-96:17 Security Advisory
Revised: Tue Jul 16 21:44:54 PDT 1996 FreeBSD, Inc.

Topic: "
Trojan Horse" vulnerability via rz program

Category: ports
Module: rzsz
Announced: 1996-07-16
Affects: All FreeBSD ports collections released before 2.1.5-RELEASE
Corrected: ports collection as of 1996-07-06
Source: rzsz shareware package
FreeBSD only: no

Patches: ftp://freebsd.org/pub/CERT/patches/SA-96:17/

=============================================================================

I. Background

All existing versions of the rz program (a program for receiving
files over serial lines using the Z-Modem protocol) are equipped
with a feature that allows the sender of a file to request the
execution of arbitrary commands on the receiver's side. The user
using rz does not have any control over this feature.

The workaround is to have rz never execute any command, and
always pretend a successful execution.

All FreeBSD users are encouraged to use the workaround provided.
Since the intent of the Z-Modem protocol is to provide a reliable
connection between systems of a vastly different architecture,
the execution of local commands at request of the sending side
cannot even be considered a useful feature at all.


II. Problem Description

The Z-Modem protocol specifies a mechanism which allows the
transmitter of a file to execute an arbitrary command string
as part of the file transfer. This is typically used to rename
files or eliminate temporary files. A malicious "
trusted" sender
could send down a command that could damage a user's environment.


III. Impact

The rzsz package is an optional port that made be installed on
some FreeBSD systems. This program is not installed by default.
Systems without this program are not vulnerable.

rz allows "
Trojan Horse" type attacks against unsuspecting users.
Since the rz executable does not run with special privileges,
the vulnerability is limited to changes in the operating environment
that the user could willingly perform.

This vulnerability is a fundamental flaw in the Z-Modem protocol.
Other operating systems and other implementations of the Z-Modem
protocol may also suffer similar vulnerabilities.

IV. Workaround

Disable the rz program. If it has been installed, it would
typically be found in /usr/local/bin.

# chmod 000 /usr/local/bin/rz
# ls -l /usr/local/bin/rz
---------- 1 root wheel 23203 Mar 4 23:12 /usr/local/bin/rz


V. Solution(s)

This feature is a relatively unknown part of the Z-Modem protocol.
It is not critical to file transfers in general. The safest
approach is to disable this feature in the receiving program.

Any rzsz port that is obtained from the official ports collection
after 1996-07-06 includes the following patch to disable this feature.
This patch applies to rzsz v3.42, if you have an earlier version
of the rzsz sources, please upgrade to the latest version first.

*** rz.c.orig Sat Jul 6 17:34:26 1996
--- rz.c Sat Jul 6 17:44:52 1996
***************
*** 1020,1039 ****
--- 1020,1045 ----
case ZCOMMAND:
cmdzack1flg = Rxhdr[ZF0];
if (zrdata(secbuf, 1024) == GOTCRCW) {
+ #ifdef BIG_SECURITY_HOLE
void exec2();

if (cmdzack1flg & ZCACK1)
stohdr(0L);
else
stohdr((long)sys2(secbuf));
+ #else
+ stohdr(0L);
+ #endif
purgeline(); /* dump impatient
questions */
do {
zshhdr(4,ZCOMPL, Txhdr);
}
while (++errors<20 && zgethdr(Rxhdr) !=
ZFIN);
ackbibi();
+ #ifdef BIG_SECURITY_HOLE
if (cmdzack1flg & ZCACK1)
exec2(secbuf);
+ #endif
return ZCOMPL;
}
zshhdr(4,ZNAK, Txhdr); goto again;

=============================================================================
FreeBSD, Inc.

Web Site: http://www.freebsd.org/
Confidential contacts: security-officer@freebsd.org
PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc
Security notifications: security-notifications@freebsd.org
Security public discussion: security@freebsd.org

Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=============================================================================

========================FORWARDED TEXT ENDS HERE=============================

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (FIRST).

We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact
the CERT staff for more information.

Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key


CERT Contact Information
- ------------------------
Email cert@cert.org

Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.

Fax +1 412-268-6989

Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA

CERT publications, information about FIRST representatives, and other
security-related information are available from[-1z
http://www.cert.org/
ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce

To be added to our mailing list for CERT advisories and bulletins, send your
email address to
cert-advisory-request@cert.org


CERT is a service mark of Carnegie Mellon University.

This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.12.freebsd



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMf4jb3VP+x0t4w7BAQH8OwP+LUNb+2PueYArBM8OEqXz1s/8O64pPngY
ar8A6e9aCL/GjOltw+cuVPlqqefEPqsOVa2UZZTezZlv1+AkXgdUhr47L7Tc9kEH
KARlnuiFAMvWPN3rMZqcU7zT7x5jgMsHxM4bIA48SARKStACBdVnFWpLg7h6+utm
U1o1DPizbS0=
=DcYg
-----END PGP SIGNATURE-----

------------------------------

Date: Thu, 18 Jul 96 13:54 PDT
From: Michael Gersten <michael@STB.INFO.COM>
Subject: File 2--Re: "
Blocking Software (CuD 8.53)

In regard to Vladimir Nuri's post of Jul 9th on blocking software:

Vladimir, you are correct that this is an infancy of an industry,
and that they cannot be expected to have all the answers yet.

And you are correct that people out there are willing to pay for
something that works.

And you are correct that much of the question is one of judgement
calls, which is not the problem.

The problem is when sites are blocked without indending to be blocked.
When a service decides to block site X, and blocks either every web
page from that machine, or every page that has the same first three
letters.

The problem is when a service claims to only block X type of page,
but actually blocks type Y.

The problem is that there is no ability for the market to make
any type of informed decision. Would you pay $X per month, to
be told that a cetain service was provided to you, with no
ability to even determine what service was ACTAULLY performed?

It's one thing if the services were to provide you with a list
of "Here's all the sites that were blocked by you this month".

It's something else for a service to claim, "Yes, we're valuable.
Keep sending us money. We provide no proof of quality of service"
.

And then the first investigative report shows that the actual
provided service does not agree with the claimed service.

In short, the complaint is one of truth in advertising.

------------------------------

Date: Fri, 19 Jul 1996 13:00:31 -0500
From: Declan McCullagh <declan@well.com>
Subject: File 3--Singapore officials censor U.S. newgroup posting

This move by Singapore to censor a newsgroup posting is a good
example of the overbreadth of government censorship. It's a
bait-and-switch maneuver: say you're going after porn but censor
"offensive" speech.

Of course, this gives the lie to the Singapore government's
assertion that "we are not censoring discussion groups."

Some excerpts from the recent regulations requiring the registration
of political or social groups: "Political and religious
organisations are free to conduct discussions provided they guard
against breaking the law or disrupting social harmony.

The regulations ban contents that "
tend to bring the Government into
hatred or contempt," are "pornographic," or "depict or propagate
sexual perversions such as homosexuality, lesbianism, and
paedophilia."

I have more information on the regulations at:
http://www.eff.org/pub/Global/Singapore/
http://www.cs.cmu.edu/~declan/international/

-Declan

---

Singapore Internet Regulators Take First Action, Censor Posting

July 19, 1996
AP-Dow Jones News Service

SINGAPORE -- In its first action since assuming powers this week to
police the Internet, the Singapore Broadcasting Authority has yanked
off a newsgroup's posting that criticized some lawyers, a newspaper
reported Friday.

The SBA acted on a complaint by an unidentified law firm, which said
the contents of the anonymous posting defamed some of its lawyers in
Singapore, according to a report in the Straits Times newspaper Friday.

The newspaper said the posting on the newsgroup was apparently made
by a disgruntled client who claimed he lost a case even though his
lawyers told him he could win it. The client also questioned the
ability of the lawyers who belongs to one of the oldest firms in
Singapore, the Straits Times said.

Under new SBA regulations that came into effect Monday, the
government agency has the power to ask Internet service providers to
remove material that it considers objectionable. A
government-appointed panel of prominent citizens decides what is
objectionable.

The Straits Times said the posting is believed to have been made from
the U.S., which means the SBA, in keeping with its own rules, will
not be able to take action against the offender.

The SBA says its rules are mainly directed against pornography,
anti-government or seditious views, racially motivated slurs and
articles that could inflame religious passions.

Since Monday, Internet providers, political parties that maintain Web
sites, groups and individuals who run discussion sites on politics
and religion, and on-line newspapers are deemed to have become
automatically licensed. This means refusal to follow the SBA rules
will result in fines. The amounts are yet to be determined.

------------------------------

Date: Fri, 26 Jul 1996 19:55:55 -0700 (PDT)
From: Declan McCullagh <declan@eff.org>
Subject: File 4--Net-child porn ring apprehended, details from SJMN

[Forwarded from c-r. --Declan]


// declan@eff.org // I do not represent the EFF // declan@well.com //


Sender: madavis@deliberate.com (Marilyn Davis)

Yesterday and today the front page of the SJMN ran a story about a
net-porn ring that was apprehended.

I'll type some of it for your consideration.

If it wasn't for the internet, only one child molester would have been
caught instead of 16.

Marilyn Davis


----- some of the article ----

Net-porn ring traded stories at 'pedo party'

Suspects recruited family members, papers indicate

By Brandon Bailey
Mercury News Staff Writer

It was a horrifying "
summit," authorities said: Three out-of-state men
accused of belonging to an Internet child-pronography ring got
together last April at the home of a fourth in Santa Rosa.

At the meeting the members of the so-called Orchid Club allegedly
traded stories about pre-teen girls they had molested and photographed
in sexually explicit poses, authorities say. They even showed off a
large poster mounted with photos of eight girls who appeared to be no
older than 10. Investigators called it a "
victim board."

The summit, which the host reportedly labeled a "
pedo party," is
described in court documents that shed further light on a federal
indictmend issued this week in San Jose. All told, the indictment
charges 16 men with an international conspiracy to produce and
exchange homemade child pornography over the Internet.

The documents suggest a parent's nightmare

[skipping a bunch]

But officials also said much of their case is built on old-fashioned
detective work. They interviewed victims and suspects who led them
to more suspects.

How case unfolded

It began with what Monterey County sheriff's Lt. Dave Allard called
child molestation "
in the more traditional sense." A mother in the
Monterey County town of Greenfied reported on April 5 that her
6-year-old daughter had beeen touched inappropriately during a slumber
party at the nearby home of Ronald Riva, a well-known father of four
who inadvertently became the linchpin of the federal investigation.

Sheriff's investigators interviewed Riva, 38, who once worked as a
state prison guard but more recently earned a living driving farm
trucks in the Salinas Valley. They also talked with other girls who
attended the party, which was hosted by Riva's 8-year-old daughter.
Monterey County prosecutor Edward Hazel said some of those girls led
detectives to more victims.

Local authorities arreste Rival on April 7 and eventually charged him
with molesting five girls, ages 4 to 10, some of them repeatedly over
the last five years. None of those children was his own. Officials
say the molestations occurred under circumstances they characterize as
psychological manipulation, rather than physical coercion.

[some skipped]

But the case didn't end there. According to an investigator's
affidavit, one of the girls told of a second man who helped fondle and
photograph her at Riva's house. With the consent of Riva'wife,
deputies say they searched Riva's computer files and found some of
those photos. After talking with Riva and his wife, investigators
identified the second man as Melton Lee Myers of Santa Rosa, who was
convicted on two counts of child molestation in the '70s.

April 22 arrest

Monterey County deputies arrested Myers on April 22. Just two days
before, according to the federal affidavits, Myers had hosted the
videotaped "
pedo party" for three other alleged Orchid Club members at
his home.

Federal investigators say they later learned from computer files that
Riva had chatted on the Internet about planning to attend that meeting
and about the possibility ...

[some skipped]

In Riva's computer, for example, investigators found records of
Internet chat sessions in which Riva and someone named Billyj
described ... With a subpoena to the commericial Intrnet service that
Billyj used for e-mail, agents identified him as Paul Laney, 34.

After agents found him at home in Yuba City, ... led them to other
Internet contacts.

Authorities say they moved quickly to locate other members of the
group -- in Oklahoma, Mississippi, Massachusetts, Michigan, Illinois,
Minnesota, Kansas and Washington. Officials said two suspects
cooperated ... Three other suspects haven't been identified but are
believed to live in Finland, Australia and Canada.

[rest skipped]

------------------------------

Date: Fri, 26 Jul 1996 21:13:52 -0700 (PDT)
From: Declan McCullagh <declan@well.com>
Subject: File 5--Net Porn: The Communism of the 1990s

[Bob Chatelle has an interesting essay about child pornography (below
namd as the "
Communism of the 90s") and the limits of free expression
somewhere near <http://world.std.com/~kip/>. --Declan]


---------- Forwarded message ----------
Date--Fri, 26 Jul 1996 11:00:18 -0400
From--Noah Robischon <noah@pathfinder.com>

>From this week's Village Voice

Who Opened Their E-mail?

It's the Kiddie Porn Crusaders

by ANNETTE FUENTES

Don't look now, but some FBI suits may be lurking around the chat
room or, worse, secretly surveilling your e-mail and other private
cyberspace communications. And chances are it's all in the name of
fighting child pornography.

That's what two New York City women learned recently when each
received certified mail from the U.S. Justice Department. The
letters, dated May 20, explained that "
between the dates of August
1, 1995 and August 26, 1995, electronic communications involving you
or persons using your America Online username were intercepted."

The letters listed six targeted AOL account numbers and their
respective screen names, like Cyberqueer, Yngcumlvr, and Borntocum
none of which had any connection to the women.

"
I was horrified," said Elizabeth Ewen. "At first I didn't
understand what it was all about. I didn't recognize any of the
screen names."

Ewen, a professor at SUNY Old Westbury, called the assistant U.S.
attorney who'd signed the letter, John David Kuchta, in Virginia. He
told her the rationale for the surveillance was child porn. She told
him she felt her privacy and civil rights had been violated.

"
He said, 'Don't worry, you were just caught up in the net. You
didn't do anything criminal, and you should support what we're
doing,' " Ewen recalled.

Two days after Ewen got her letter, a friend of hers got the same
thing. Margaret S. (she asked that her last name not be used), an
educator in the Queens library system, was stunned to learn that
almost a year after the fact, the FBI was disclosing that they'd
been spying on her travels through cyberspace.

"
I don't expect total privacy online the same way I know the
telephone isn't really private," she said. "But how often will the
government raise the specter of child porn to justify this? We're
just supposed to forget our civil rights in the name of it."

Margaret e-mailed AOL with a message of outrage. In return she got
a form letter from Jean Villanueva, a vice president for corporate
communications, stating that AOL had merely complied with a court
order obtained by the Justice Department when it "
monitored" the
e-mail of six AOL subscribers. It was part of Justice's campaign,
"
Innocent Images," Villanueva wrote. In closing, he referred
members to a special Justice Department hotline set up to deal with
AOL subscribers like Margaret and Ewen, innocents caught in the web.
(By deadline, AOL had not responded to several calls seeking
comment.)

Margaret called the hotline, left a message, and two weeks later got
a call back from Tonya Fox at Justice. Fox told her there were some
840 other AOL subscribers like her who'd accidentally stumbled into
the FBI's cyber wiretaps. "
She kept telling me over and over that I
was 'clean,' that I shouldn't worry," Margaret said. "She also
said if I wanted to read the file on my surveillance, I should get a
lawyer."

How Ewen and Margaret were scooped up by the FBI they can't figure
out. If one of them tripped into FBI surveillance of a suspected
pornographer, did she then lead the feds to her friend through their
e-mail correspondence? ACLU associate director Barry Steinhardt says
that while it's legal for the government armed with a warrant to
surveil the e-mail and other private cyber communications of
suspected criminals, it is not legal to extend the surveillance to
unrelated communications of innocent bystanders who chance into chat
rooms or read electronic bulletin boards while a suspect is also
present.

"
What has happened here is the most intrusive form of e-mail
interception," Steinhardt said. "The government can get a
subpoena to intercept real-time e-mail, which is the equivalent of
phone wiretapping. They can also use a variety of devices to
retrieve stored e-mail." But, adds Steinhardt, what is legal and
what should be lawful are two different things.

Mike Godwin, an attorney with the San Francisco'based Electronic
Frontier Foundation, a civil liberties organization, warns that as
government expands its reach into cyberspace, such incursions into
private lives will pose a greater threat to civil liberties than
simple phone taps. "
It was necessary for law enforcement to learn
how to narrow the scope of wiretapping, but here you have this
technology where you're always making copies, always storing
material somewhere," Godwin said. "It makes it very easy to get
even deleted files that stay around for a while. That's not true
about telephone calls."

Justin Williams, chief of the Justice Department's criminal division
in Alexandria, Virginia, could not comment on the particular
investigation that snared Ewen and Margaret. But he insisted that
what happened to them "
was not a surveillance."

"
You wouldn't say their e-mail was read," Williams said. "It
could be they were surfing the Internet and happened into a
particular room where by chance there is an [individual] under
electronic surveillance."

Williams said their hotline received 160 calls from AOL subscribers
such as Ewen and Margaret. While the statute regulating government
surveillance Title III requires Justice to notify the targets of
eavesdropping, notifying innocent bystanders is discretionary, he
said.

Williams could not say how many such online surveillances the
Justice Department is conducting. But ACLU lawyer Steinhardt says in
the past year, the government's pursuit of child porn in cyberspace
has reached a fever pitch.

"
Most online surveillance by the government is now centered on
child porn," he said. "It has people assigned to child porn
investigations who are fascinated by the use of the Internet to
distribute it. They're no longer going after the producers who
actually abuse children. They're going after consumers. It's easier,
splashier."

Splashy and messy for those who happen to be in the wrong cyber
place, if only for a nanosecond. For Ewen, the witch-hunt has begun
again.

"
Child porn will become the communism of the '90s," she said.

------------------------------

Date: Mon, 22 Jul 1996 23:49:05 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 6--U.S. Official Warns OF "
Electronic Pearl Harbor"

U.S. OFFICIAL WARNS OF "
ELECTRONIC PEARL HARBOR"
Deputy U.S. Attorney General Jamie Gorelick told a Senate
subcommittee last week that the possibility of "
an electronic Pearl
Harbor" is a very real danger for the U.S. She noted in her
testimony that the U.S. information infrastructure is a hybrid
public/private network, and warned that electronic attacks "
can
disable or disrupt the provision of services just as readily as --
if not more than -- a well-placed bomb." On July 15 the Clinton
Administration called for a President's Commission on Critical
Infrastructure Protection, with the mandate to identify the nature
of threats to U.S. infrastructure, both electronic and physical, and
to work with the private sector in devising a strategy for
protecting this infrastructure. At an earlier hearing, subcommittee
members were told that about 250,000 intrusions into Defense
Department computer systems are attempted each year, with about a
65% success rate. (BNA Daily Report for Executives 17 Jul 96 A22)

------------------------------

Date: Thu, 11 Jul 1996 18:53:58 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd)

---------- Forwarded message ----------
Date: Thu, 11 Jul 1996 17:04:20 -0400 (EDT)
From: Marvin V. Zelkowitz <mvz@cs.UMD.EDU>

(My apologies if you received several of these.)

WORKSHOP ANNOUNCEMENT - WITAT '96

Third Annual Workshop on Information Technology - Assurance and Trustworthiness
September 3-5, 1996
Columbia Hilton, Columbia, MD

Co-sponsored by Aerospace Computer Security Associates,
National Institute of Standards and Technology, and
University of Maryland Institute for Advanced Computer Studies

-- Are you sure your information is adequately protected?

-- How do you know that your privacy is being guarded?

-- Can your customers trust you?

The Workshop on Information Technology Assurance and Trustworthiness (WITAT)
investigates and promotes promising methods of gaining assurance in
information technology.

WITAT '96 is the third in a series of annual workshops addressing the
assurance and trustworthiness. The first workshop identified and analyzed
crucial issues on assurance in IT systems and provided input to the
development of policy guidance for determining the type and level of
assurance appropriate in a given environment. The participants came to the
consensus that no one technique can provide comprehensively adequate
assurance. The second workshop built upon the first by making recommendations
based on the issues and problems identified.

Building upon the results of the previous two workshops, WITAT '96 recognizes
the existence and emergence of numerous methods to obtain assurance. However,
the relative value, promise, and applicability of each is unclear for
specific systems. These will be discussed through the presentation of
alternative assurance approaches to assurance stakeholders and producers,
receiving immediate feedback from a diverse audience, reviewing reaction to
presented approaches and creating a strategy for moving ahead.

Information on WITAT '96, costs, and registration information can be found at
WWW address: http://aaron.cs.umd.edu/witat/witat96.html.

Send mail to witat-info@cs.umd.edu for a copy of the complete call for
participation, including fees, and registration form.

WORKSHOP COMMITTEE

Marshall Abrams The MITRE Corp. Diana Akers The MITRE Corp.
Maryam Alavi Univ. of Maryland Lynn Ambuel Natl. Security Agency
Karen Ferraiolo Arca Systems, Inc. Jay Kahn The MITRE Corp.
*Douglas Landoll Arca Systems, Inc. Carolyn Wichers BDM
Jeff Williams Arca Systems, Inc. Marvin Zelkowitz Univ. of Maryland
* - Workshop Chair

REGISTRATION

Costs: Tutorial (Sept. 3) $110.00 (includes lunch)
Workshop (Sept. 4-5) $120.00 (includes lunches)

Location: Columbia Hilton, 5485 Twin Knolls Road, Columbia, MD. 410-997-1060.



------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "
Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.56
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT