Connecticut Hacker Newsgroup's journal picture

Connecticut Hacker Newsgroup

followFollow
🤴
Administrator: eZine
🕒
Created 28 Apr 2019
📄
10 Articles
Connecticut Hacker Newsgroup (CHN), an I.I.R.G. affiliate


Issue 1: Time Articles on Cyberporn - 7/3/95 (3 articles)
Issue 2: LAN Viruses - Fatal Attractions
Issue 3: Phreaking Among the Gauchos
Issue 4: Fundamental Truths About High-Tech Crime
Issue 5: Planning of Telecom Security
Issue 6: Introduction to Computer Security
Issue 7: Alternative News Gathering Techniques
Issue 8: "The Dossiers They Keep On You"
show more

Attention Private Investigators "The Dossiers They Keep On You"

Connecticut Hacker Newsgroup - Issue 8

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 8 Dec 2022
by -Q- Foreword This article deals with the field of information and records, or to put it more accurately; "DOSSIERS". I do not want to get into a whole 1,000 page discussion about this, and believe me, I could. The field of records, and dossier information is enormous. They say that in the United States... Their is almost more dossier info kept on you, than in all the books and magazines in libraries across america! Rather, I'll just get to the "meat of the matter": What information they have on you? Where you can get it? What are the major database companies? What do they charge to let you access records? Who do they let access rec...

Alternative News Gathering Techniques

Connecticut Hacker Newsgroup - Issue 7

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 8 Dec 2022
Reprinted from Issue #12 (July/August 1995) of Cybertek: The Cyberpunk Technical Journal by Thomas Icom What never ceases to amaze and disgust me is with the extensive means we have in this country for the dissemination of information, I find that it is more difficult to get real news about matters regarding personal survival, than it is to find out the latest fad in Hollywierd. I don't know whether it's because the American people have sunken to the lowest common denominator, or if it's because New World Order advocates in the media are deliberately trying to keep the people ignorant to further their aims. James Madison ...

Introduction to Computer Security

Connecticut Hacker Newsgroup - Issue 6

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 7 Dec 2022
By: Ed Norris (Ed Norris is a senior security consultant for Digital Equipment Corporation. He consults on a wide range of security issues and solutions) You might expect that an article about computer security would discuss controls for passwords and file permissions, but there are many things to consider before you get to that level. This article will focus on the basic requirements to help you define a security professional's roles and responsibilities and how you can influence the effectiveness of a successful security program by gaining the support of your peers. It also will examine typical computer security mission and vision s...

Planning and implementing of telecom security

Connecticut Hacker Newsgroup - Issue 5

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 7 Dec 2022
By Paul A. Berth (Paul A. Berth is a commercial sales and marketing manager for AT&T Secure Communications Systems.) Implementing a telecommunications security plan is a major project for any corporation. The stakes are significant. It requires a high degree of cooperation among the security, telecom and information systems staffs as well as end users. It involves complex technology, much of it new and unfamiliar, as well as significant capital investment. The project also may require management and political skill for more than interdepartmental coordination. The need for telecommunications security has limited acceptance in most com...

Fundamental Truths About High-Tech Crime

Connecticut Hacker Newsgroup - Issue 4

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 7 Dec 2022
By: Ron Hale Some members of our society are greatly benefiting from new technology and are exploiting it in ways never imagined. Unfortunately, they re employing high technology to further criminal enterprises. High-technology crime was born almost simultaneously with legitimate uses Of computers, and continues to thrive as new, attractive technologies become available. And it will continue to grow as new user-empowering technologies are introduced and as more businesses and individuals have access to information systems. To understand high-technology crime, and to appreciate its significance and potential, we must understand some fundam...

Phreaking among the Gauchos

Connecticut Hacker Newsgroup - Issue 3

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 7 Dec 2022
By Viktor Arevalo <viktare@well.com> I told myself I was lucky when I returned to Argentina after ten years in Europe. I had read in Ed Krol's The Whole Internet that Argentina rated BIUF, an international connectivity rating better than Australia and much better than New Zealand. Gophering, I even discovered a couple of Argentine addresses: the Foreign Ministry and La Plata University. "Argentina equals Switzerland as to Internet capacity," I celebrated in advance. "An internaut will miss nothing down there." The only minus point listed, compared to the USA, was the absence of OSI/ISO connectivity, of no consequence whatsoe...

LAN Viruses - Fatal Attractions?

Connecticut Hacker Newsgroup - Issue 2

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 7 Dec 2022
By: Randy Bradley Viruses and networks are extremely compatible. So compatible in fact that viruses understood and took advantage of networks long before software applications did. And while viruses that can be deadly to your network operating environment are a fact of life, they are also a manageable threat. Utilizing a holistic strategy of awareness, prevention techniques, and early detection, you can effectively protect your network from debilitating, expensive, and time-consuming viruses. In a survey conducted during the summer of 1993 by Dataquest, 63% of respondents said they had battled a computer virus. They also reported that the...

How Parents Can Filter Out the Naughty Bits

Connecticut Hacker Newsgroup - Issue 1

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2019
BILL DUVALL WANTS TO FIND PORN ON the Internet, He wants to so badly that he pays Stanford University graduate students to track it down for him. Those bright-eyed bounty hunters of smut are efficient, finding between five and 10 places a day that meet Duvall's single criterion: sexual explicitness. On a typical day last week, his free-lancers Internet addresses of computers that images from Playboy, erotic bedtime !;tories and stag party-style X-rated video snippets. All of 1-hem went into a kind of address book that has well in excess 1,000 entries. But Duvall is no ordinary pornography collector. His little black book is built into...

The Marquis de Cyberspace

Connecticut Hacker Newsgroup - Issue 1

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2019
By: WENDY COLE SPRINGFIELD Four months into his three tear sentence for transmitting obscene images by computer, the man the Carnegie Mellon report calls a modern-day Marquis de Sade hardly looks like a political cause celebre. Robert Thomas spends his day like any other inmate at the U.S. Medical Center for Federal Prisoners in Springfield, Missouri: cleaning the prison kitchen and laundry room and waiting to hear whether his lawyers win get him out on appeal. Thomas's case could well end up in the Supreme Court, where it would set legal precedent for all of cyberspace. Thomas, 39, operator of the Amateur Action BBS in Milpitas, Cali...

On a Screen Near You: CYBERPORN

Connecticut Hacker Newsgroup - Issue 1

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2019
It's popular, pervasive and surprisingly perverse, according to the first survey of on-line erotica. And there's no easy way to stamp it out By: PHILIP ELMER-DEWITT SEX IS EVERYWHERE THESE DAYS-in books, magazines, films, television, music videos and bus-stop perfume ads. It is printed on dial-a-porn business cards and slipped under windshield wipers. It is acted out by balloon-breasted models and actors with unflagging erections, then rented for $4 a night at the corner video store. Most ,Americans have become so inured to the open display of eroticism-and the arguments for why it enjoys special status under the First Amendment-t...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT