Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 49

  


Computer underground Digest Sun Sep 6, 1998 Volume 10 : Issue 49
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.49 (Sun, Sep 6, 1998)

File 1--Child-porn Fighters Bust Internet Ring
File 2--Paedophiles and the Police State (fwd)
File 3--REVIEW: "Watch Me", A. J. Hoyt
File 4--REVIEW: "The Jericho Iteration", Allen Steele
File 5--REVIEW: "Time Bomb 2000", Edward Yourdon/Jennifer Yourdon
File 6--REVIEW: "RISKS-FORUM Digest", Peter G. Neumann
File 7--HAIKU ERROR MESSAGES] (fwd)
File 8--Cu Digest Header Info (unchanged since 25 Apr, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sat, 5 Sep 1998 23:40:36 -0500
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 1--Child-porn Fighters Bust Internet Ring

CHILD-PORN FIGHTERS BUST INTERNET RING
SOURCE: Chicago Tribune (3 Sept '98, p. 3)
By Naftali Bendavid, Washington Bureau.

The Wonderland Club's international membership is disturbingly
exclusive.

Applicants must be sponsored by a member, be computer literate
to communicate with other club members--and must have at least
10,000 photographs of child pornography.

In what was termed the biggest child pornography bust ever, the
Customs Service announced Wednesday it was breaking up the
Wonderland Club. More than 100 warrants were issued in 12
countries the day before, including 32 in the U.S., and arrests
continued through Wednesday.

"They trade in the most vile child pornography imaginable, over
the Internet," said Customs Commissioner Raymond Kelly in
announcing the raids.

.................

Even in the abnormal world of child pornography, the Wonderland
Club stood out. It had members in 14 countries, mostly in Western
Europe, and sprawled across 22 states in the U.S., mostly in small
towns or rural areas, according to law enforcement officials.

The ring used a secret, highly restricted Internet chat room.
It was set up in an area of cyberspace known as Internet Relay
Chat, which allows discussion groups to carry on in complete
anonymity and therefore to have graphic or incriminating
discussions.

Secrecy was at a premium within the club, said customs
officials. Members used an encryption system invented by the
Soviet KGB to scramble its transmissions and make them harder to
detect.

....................

The raids occurred in Australia, Austria, Belgium, Britain,
Finland, France, Germany, Italy, Norway, Portugal, Sweden and the
United States.


Agents did not go undercover or surreptitiously join the
pornography club as part of their investigation. Rather, they used
computer sleuthing methods that are rapidly becoming vital.

By watching the Internet activity around the chat room, agents
determined the computer identities of the suspects.

Then they traced them through an electronic maze to figure out
their actual identities.

"Agents tracked these people through cyberspace as they hid
behind Internet providers, servers, and screen names," Kelly said.

.....................

------------------------------

Date: Sat, 5 Sep 1998 12:13:45 -0700 (PDT)
From: Jim Thomas <jthomas@well.com>
Subject: File 2--Paedophiles and the Police State (fwd)

SOURCE: The Well (well.com) via Bruce Sterling


eff.847: Italian Cyberspace

eff.847.14: Bruce Sterling (bruces) Sat 5 Sep 98 08:56



Kidporn Kidporn Kidporn *8-(

Date--Sun, 02 Sep 2001 14:51:08 +0200
To--nettime-l@Desk.nl
From--Luther Blissett <tom9351@iperbole.bologna.it>
Subject--<nettime> Paedophiles and the Police State

A Luther Blissett press release
Bologna, September 4th, 1998

PAEDOPHILES AND THE POLICE STATE
or: the ignominious end of liberal-democratic lies

It is difficult to speak when you're surrounded by hysteria,
superficiality and ignorance, criticisms are published in invisible
paragraphs, and District Attorneys choose psychological terrorism and
seize the computers of the suspects (often preventing these people from
doing their jobs) though they know that a back-up of the hard-discs would
be enough.

The mega-raid against the 'Internet paedophiles' is the umpteenth,
tragical farce. "Paedophilia" is a mere excuse for slandering the Internet
as a horizontal, easy-accessible medium. As Franco Carlini writes on
today's edition of *Il Manifesto* daily paper: 'The ignorance of the media
people (especially the Italian ones) magnifies anything that happens on
the Internet (mostly good things, sometimes very bad ones, just like in
real life), as though journalists stirred up a scandal because drug
dealers call each other on the phone'.

Naples' deputy DA Diego Marmo says that paedophilia is 'today's principal
emergency', parallels paedophilia to the Mob and talks about a sort of
international 'Paedophile Party'.

Well, we presume that the situation in most of the raided towns and
countries is similar to that here in Emilia-Romagna, where the 'suspects'
are: - Two 20-year-olds who visited 'dodgy' pornographic websites. Their
computers and 'dodgy' diskettes have been seized by the DA office. - A
retailer who brought some rolls of film to a photography shop. The
photographer developed the films and called the police. The police seized
some photographs of the retailer's 3-year-old daughter in the nude, and
pressed charges against the man. The local papers don't say much else. It
is more than just to be suspicious, because the investigating magistrate
is Lucia Musti.

It is absolutely normal [especially in latin countries] that parents take
photographs of their little sons and daughters playing on the beach or
taking a bath! Do you really think that child porn traffickers develop
their films at common photography shops?

These are some devastating consequences of the new, absurd act on child
pornography, whose text could not be more ambiguous. Is the innocent
photograph of a child in the nude illegal? And what about a naked adult
besides the naked child, in a chaste, non-sexual situation? And the
picture of a father carrying his naked baby in his arms?

It is a stupid emergency act that was written and passed on the wave of
moral panic. Far from solving the problem of child abuse, the act is going
to create further moral panic. It is also a liberticide law that violates
privacy. We're shooting ahead towards becoming a police state.

We expect the police to seize our computers for having written this
release. We even expect to be arrested for having written *Lasciate che i
bimbi*.

The Luther Blissett Project - Bologna

The Luther Blissett Mythopoetic On-line Guide:
http://www.geocities.com/Area51/Rampart/6812

---
# distributed via nettime-l : no commercial use without permission
# <nettime> is a closed moderated mailinglist for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: majordomo@desk.nl and "info nettime-l" in the msg body
# URL: http://www.desk.nl/~nettime/ contact: nettime-owner@desk.nl

------------------------------

Date: Mon, 17 Aug 1998 10:32:22 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: File 3--REVIEW: "Watch Me", A. J. Hoyt

BKWTCHME.RVW 980704

"Watch Me", A. J. Hoyt, 1995, 0-312-95997-4, U$6.99/C$8.99
%A A. J. Hoyt
%C 175 Fifth Ave., New York, NY 10010
%D 1995
%G 0-312-95997-4
%I St. Martin's Press
%O U$6.99/C$8.99 212-674-5151 josephrinaldi@stmartins.com
%P 370 p.
%T "Watch Me"

Everything I know about hacking and law enforcement I learned from
thriller novels.

When you want to find out who made a (direct dialled, non-800, caller
pays) call, look up the *recipients* billing information. URLs
(Uniform Resource Locators) and Usenet newsgroup names have no
particular format as long as you use lots of periods. Gopher is a
security tool. All serial killers are computer experts. Serial
killers are trusting enough to give intimate and incriminating
information to anonymous strangers, as long as they seem to like
violence. Internet MUDs (Multiple User Domains) are pretty much all
graphically based. The best way to store an online session is on a
standard VCR. A few people who work for the government can get into
pretty much any commercial computer system or network, but the rest
don't even know how to turn the machines on. Former law enforcement
agents who have advance warning that a violent killer is tracking them
take absolutely no precautions at home. Only serial killers look for
trapdoors in programs. All credit card transactions are posted
immediately. With one of the most long term and profligate serial
killers of recent memory, assign the case to a retired agent with no
status or resources on an unofficial basis. If you can break in to a
bank or other highly secured system, leave your connection live for
several days or weeks. It is easier to hack the local telephone
company system than to check smoke shops for an identifiable brand of
pipe tobacco. You can tell who owns a modem by breaking into the
local telephone company system. Computers generate faxes that can be
sent to someone via modem after they have been printed in hardcopy.

One of the venues for a short scene in the book is Vancouver, and the
trip is presented in a fashion that can only bemuse natives. Vistas
are described that can't be seen because of intervening stands of
trees, neighborhoods are misplaced, and houses are set wrong way round
on hillsides. The technical material in the book seems to be like
that as well: depicted either from a faulty memory or poorly
understood reference sources and promotional literature.

Thrillers are not noted for character development, but it is
singularly lacking in this book. While deep, dark past traumas are
hinted at, they are too oblique to make the central figure's
deterioration convincing. As we delve deeper into the lead villain's
past we find no revelations, just a vicious cipher as far back as can
be found. (In fact the book contradicts itself, implying both a loss
of memory, and remembrances that arise from beyond that point.) There
is a subtext about violence towards women by men, but it is simply
allowed to dangle as a useless appendage to the story. In the end,
gratuitous violence wins out, which sort of negates the subtext,
wouldn't you say?

copyright Robert M. Slade, 1998 BKWTCHME.RVW 980704

------------------------------

Date: Tue, 4 Aug 1998 18:18:49 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: File 4--REVIEW: "The Jericho Iteration", Allen Steele

BKJRCHIT.RVW 980519

"The Jericho Iteration", Allen Steele, 1994, 0-441-00271-4,
U$5.50/C$6.99
%A Allen Steele
%C 200 Madison Avenue, New York, NY 10016
%D 1994
%G 0-441-00271-4
%I Ace/Berkley/Boulevard/Charter/Diamond/Jove Books
%O U$5.50/C$6.99 +1-800-788-6262 online@penguin.com
%P 279 p.
%T "The Jericho Iteration"

It's rather amazing how little science there is in science fiction,
sometimes. Even in stories of the "near future," such as this one,
technology takes a very distant backseat to politics and plotting.
Which is probably as it should be, but it does make you wonder why
it's called science fiction.

Well, let's get rid of the plot first. Lone individual against the
mighty forces, conspiracy of the elite plotting to overthrow the last
bastion of democracy, and a rogue program takes over the defence
forces and uses force against the defenders. However, the rogue isn't
the bad guy.

Steele does give us some technology. I purely love his
personal/palmtop/vest pocket computer/personal digital assistant.
Given the advances in time and technology, it seems just a little bit
shy on memory and storage space, but we'll let that ride. Having both
keyboard and voice command is undoubtedly the way to go, for reasons
very similar to those in the book. Of course, the author does not
seem to realize that you can track any cell phone, as long as it is
on, to a very close area. Also, nobody seems to have done much work
on encryption over the next few years. Lastly, I don't think much of
the disk format. I suspect about 7 cm is about as small as you can
get before people start losing the disks, which would be an annoyance.
Human factors, doncha know. (And CD-ROMs are already optical disks.)

I'm glad to see that email is tagged as the way to get the word out
fast and far. However, the expert geeks involved in the story don't
seem to have fully cottoned on to the fact that you can send partial
info if you're short of time, and you can set up systems to send
automatically. The tension in the climactic scene as our intrepid
heroes are facing the end is somewhat reduced when the reader keeps on
thinking "just use chron, OK?"

But, of course, my real interest is in the iteration of the title. A
repeating, self-reproducing program. In other words, a virus. Well,
they have to be other words, if you want to be pedantic about it. The
virus in the book is p1 all over again (cf. BKADOLP1.RVW), a fairly
classic Shoch and Hupp type segmented worm program. And, like p1, the
bigger it gets, the smarter it gets, until it becomes self-aware.

Now, there are a couple of points here. This is the classically
mythical "just-wave-the-disk-near-the-computer-and-it-gets-infected"
type virus. For those of us who have been battling the "Good Times"
hoax for years, I can't be overjoyed about this idea. (Of course,
just as we have started to get people to realize that you can't get
infected just by reading email, Microsoft comes along and fixes that
bug, so I really can't argue too strenuously against it. Never
underestimate the stupidity, and cupidity, of large software vendors.)
But it avoids detection, elimination, and access control by dealing
with the "source code" of security programs. Repeat after me: once
it's compiled, it's object code. Source code doesn't matter, and
isn't kept with the executables. Of course, if it could find, and
associate, the source code with the target executable, that would give
you a leg up on disassembly.

But a virus cannot be undetectable. And, in fact, this one isn't.
Early on in the game a fairly simple file management program, with no
particular special features, is able to detect the virus, and infected
programs. So how come it is so hard to detect? Hard to eliminate I
might grant you, but it certainly seems to be easy to find.

copyright Robert M. Slade, 1998 BKJRCHIT.RVW 980519

------------------------------

Date: Wed, 12 Aug 1998 11:13:24 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: File 5--REVIEW: "Time Bomb 2000", Edward Yourdon/Jennifer Yourdon

BKTMBM2K.RVW 980531

"Time Bomb 2000", Edward Yourdon/Jennifer Yourdon, 1998,
0-13-095284-2, U$19.95/C$27.95
%A Edward Yourdon
%A Jennifer Yourdon
%C One Lake St., Upper Saddle River, NJ 07458
%D 1998
%G 0-13-095284-2
%I Prentice Hall
%O U$19.95/C$27.95 201-236-7139 fax: 201-236-7131
%P 416 p.
%T "Time Bomb 2000: What the Year 2000 Computer Crisis Means to You"

It doesn't take long to figure out which Saturday morning is being
referred to in the Preface. And one of the common failures suggested
by pundits after December 31, 1999, is that of phone service. As the
outage extends to a decade, however, one begins to wonder how
realistic this book is going to be. For one thing, loss of dial tone
is much less likely than billing errors, and the most likely errors
would be failure to bill for those calls taking place as midnight
(switch time) strikes. However, the introduction goes on to point out
that the subtitle is much more appropriate to this book: it is
addressed to the non-technical audience, rather than those charged
with fixing the problem. A bit of overstatement can therefore be
forgiven. It is odd, though, that so many of the examples used refer
to large infrastructures: what *could* the normal citizen do if faced
with a region wide water outage?

Chapter one introduces the concepts of risk management and planning,
and stresses the relative time elements to plan for. However, one of
the central statements is that we simply do not know what is going to
happen, and that makes planning rather difficult. There are some
general suggestions (for example, that most disruptions will be of
days, rather than weeks, duration), but even these are questionable.
One specific recommendation, for instance, is that stockpiling a
month's supply of food in a city apartment might be difficult, so
maybe you should go visit friends in the country for a month. I'm not
sure what assumption this is based on, but if food distribution is
interrupted, it might be more likely that emergency food provision
would be concentrated in population centres. The consequences to
employment are reviewed in chapter two, which ultimately suggests only
one course of action: have a nest egg on hand. The scenario is
alarming, but also possibly unduly optimistic, since it repeatedly
suggests planning for a year out of work. Using the book's own
figures, and fairly simple arithmetic, the average time out of work
would appear to be four years. The discussion of utility disruption,
in chapter three, is vague and offers little in the way of practical
suggestions. Interconnected failures are not emphasized (gas furnaces
fail as soon as electrical thermostats shut down) and food stockpiling
is probably not realistic (how many foods require no refrigeration for
storage and no heating for preparation?)

Given the heavy business emphasis in other areas, it is odd to note
that the concern for transportation is limited to personal travel in
chapter four. While a sudden transition to telecommuting would have a
major effect on business (and be impossible for some), the failure of
shipping is much more serious. Chapter five's assessment of the
banking industry could be responsible for a run on the banks, itself.
(The advice to keep hardcopy of all transactions in the months
preceding and following December 31, 1999 is very good.) The problems
of the advice regarding food in chapter six have already been
addressed, since the material basically repeats, in more detail, what
has already been said elsewhere. Home computer problems are really
only looked at in terms of business use of PCs in chapter seven. I am
rather interested to note that the Internet does not get a mention
either in regard to personal computers or in relation to news and
information in chapter eight. The overview of medical care, in
chapter nine, is solid, careful, and useful.

While I agree that government is one of the largest, and most tardy,
potential victims of Y2K, chapter ten is shortsighted in seeing it
only as a provider of cheques. As with much of the rest of the book,
the information in this section is US-centric, although similar
concepts apply elsewhere. Chapter eleven reviews embedded computers,
but only broadens the scope of what could happen in other areas. This
material should probably have been included earlier in the general
discussion of the problem. Education, as all too often, seems to be a
bit of an afterthought, but some important points are made in the
relatively short chapter twelve. Chapter thirteen notes that
communication is an obvious target, and so most likely to be
adequately addressed by the deadline. That is good, since the book
gives no realistic advice for fallback positions. (A cell phone will
be just as dead as a land line if all the switches are down, and is
much more likely to have problems in the handset.)

Despite the many shortcomings of the book, I do feel that it should be
read and considered by a good many people. The books and articles
currently extent concentrate on the problem and necessary solutions
from a systems and technical perspective. There is a need for some
consideration about personal actions that can be taken to ameliorate
potential problems. Hopefully this discussion can have some
rationality behind it: producing a run on the banks or dry soup mix in
December '99 will help nobody.

copyright Robert M. Slade, 1998 BKTMBM2K.RVW 980531

------------------------------

Date: Tue, 11 Aug 1998 10:31:00 -0800
To: p1@cmpnetmail.com
Subject: File 6--REVIEW: "RISKS-FORUM Digest", Peter G. Neumann

MLRISKSF.RVW 980607

"RISKS-FORUM Digest", Peter G. Neumann, 1985 - , , free
%E Peter G. Neumann risks@csl.sri.com
%D 1985 -
%O news:comp.risks http://catless.ncl.ac.uk/Risks
%P ~ 20 articles 3 times per week
%T "RISKS-FORUM Digest"

RISKS-FORUM Digest, generally referred to simply as RISKS, is not the
oldest mailing list on the net, nor even the oldest moderated list.
It is definitely long lived, extremely consistent in this most
ephemeral of worlds, and, quite simply, one of the best.

RISKS explores the hazards and failures of technology, and
specifically computer technology. However, this is no mere neo-
Luddite decrying of the dehumanization of civilization, but is often
written by the technologists themselves. While the list is open to
everyone, the names of those regularly posting to RISKS also tend to
show up in conference catalogues around the world. Computers and
software are the main topic of discussion, but the involvement of
computing in almost every area of modern life ensures that subjects
discussed range from overripe tomatoes (calling emergency services) to
rocket launches (lost because of missing punctuation).

Many discussions in RISKS deal with stories ignored in the mass media.
This is not because of any secrecy or confidentiality, but simply
because the general press does not understand the importance of the
issues involved. On the other hand, a number of items that eventually
appear in the media may do so because of discussion, and even
movements, started by postings in RISKS and other similar venues. In
other cases, RISKS deals with news that is made public, but provides
background, details, and analysis not available in newspapers (and
certainly not on TV).

While some of the credit for the status of RISKS has to go to a
relatively stable international coterie of high quality contributors,
the lion's share of the honour goes to the moderator, Peter G.
Neumann. Neumann's moderation is in large measure responsible for the
continued support of these contributors, and in a net world of spam,
junk email, and flame wars, RISKS remains an exemplar of mailing list
maintenance. Although an occasional hoax or diatribe gets past him,
Neumann is generally attentive to each posting (not least because he
is constantly on the lookout for opportunities to make pun-laden
editorial comments). Controversy and opinion are not avoided,
although if it starts to generate more heat than light the discussion
may be relegated to a "special edition."

RISKS, as any other net entity, is subject to Usenet, mail, and IP
spoofing, as well as diatribes, rants, mailbombing, and other breaches
of netiquette. Over the years it has managed to stay refreshingly
free from these abuses, overall.

The archives of the list (available at http://catless.ncl.ac.uk/Risks)
are an extensive and valuable resource. Many of the dangers in the
use of technology come not so much from specific technical details, as
from social issues of use, testing, management, and so forth.
Therefore, RISKS postings as not as subject to dating as those of
other technical mailing lists. The worth of this collection can be
seen in the compilation recently used by Neumann to produce "Computer
Related Risks" (cf. BKCMRLRS.RVW).

For those with access to Usenet news, the simplest way to get hold of
the Digest is to subscribe to the comp.risks newsgroup, which is a
mirror of the mailing list. RISKS is only available in digest format,
even on the newsgroup. Newsgroup access is also the technically
preferred means of access.

copyright Robert M. Slade, 1998 MLRISKSF.RVW 980607

------------------------------

Date: Mon, 7 Sep 1998 11:41:53 -0500 (CDT)
From: Jim Thomas <jthomas3@SUN.SOCI.NIU.EDU>
Subject: File 7--HAIKU ERROR MESSAGES] (fwd)

((CuD MODERATORS' NOTE: The following appeared in our mailbox
without an address. Apologies to the forwarded, and thanks)).

HAIKU ERROR MESSAGES (Author unknown)


Three things are certain:
Death, taxes, and lost data.
Guess which has occurred.

- - - - - - - - - - - - -

Server's poor response
Not quick enough for browser.
Timed out, plum blossom.

- - - - - - - - - - - - -

A file that big?
It might be very useful.
But now it is gone.

- - - - - - - - - - - - -

Windows NT crashed.
I am the Blue Screen of Death.
No one hears your screams.

- - - - - - - - - - - - -

Errors have occurred.
We won't tell you where or why.
Lazy programmers.

- - - - - - - - - - - - -

Seeing my great fault
Through darkening blue windows,
I begin again

- - - - - - - - - - - - -

The code was willing,
It considered your request,
But the chips were weak.

- - - - - - - - - - - - -

Printer not ready.
Could be a fatal error.
Have a pen handy?

- - - - - - - - - - - - -

Chaos reigns within.
Reflect, repent, and reboot.
Order shall return.

- - - - - - - - - - - - -

Login incorrect.
Only perfect spellers may
enter this system.

- - - - - - - - - - - - -

This site has been moved.
We'd tell you where, but then we'd
have to delete you.

- - - - - - - - - - - - -

Wind catches lily
scatt'ring petals to the wind:
segmentation fault

- - - - - - - - - - - - -

ABORTED effort:
Close all that you have.
You ask way too much.

- - - - - - - - - - - - -

First snow, then silence.
This thousand dollar screen dies
so beautifully.

- - - - - - - - - - - - -

With searching comes loss
and the presence of absence:
"My Novel" not found.

- - - - - - - - - - - - -

The Web site you seek
cannot be located but
endless others exist

- - - - - - - - - - - - -

Stay the patient course.
Of little worth is your ire.
The network is down.

- - - - - - - - - - - - -

A crash reduces
your expensive computer
to a simple stone.

- - - - - - - - - - - - -

There is a chasm
of carbon and silicon
the software can't bridge

- - - - - - - - - - - - -

Yesterday it worked.
Today it is not working.
Windows is like that.

- - - - - - - - - - - - -

You step in the stream,
but the water has moved on.
This page is not here.

- - - - - - - - - - - - -

No keyboard present,
Hit F1 to continue:
Zen engineering?

- - - - - - - - - - - - - -

Out of memory.
We wish to hold the whole sky,
But we never will.

- - - - - - - - - - - - -

Having been erased,
The document you're seeking
Must now be retyped.

- - - - - - - - - - - - -

The ten thousand things.
How long do any persist?
Netscape, too, has gone.

- - - - - - - - - - - - -

Rather than a beep
Or a rude error message,
These words: "File not found."

- - - - - - - - - - - - -

Serious error.
All shortcuts have disappeared.
Screen. Mind. Both are blank.

- - - - - - - - - - - - - -

To have no errors
Would be life without meaning.
No struggle, no joy

------------------------------

Date: Thu, 25 Apr 1998 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 25 Apr, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

CuD is readily accessible from the Net:
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.49
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos from Google Play

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT