Computer underground Digest Thu Jan 2, 1997 Volume 9 : Issue 01 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.01 (Thu, Jan 2, 1997) File 1--CLO#21-Negotiating the end of the millennium File 2--Jenott case: More gossip, so-called criminal hacker stuff File 3--Soldier Innocent of Giving Secret Code to Chinese File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd) File 5--BoS: Phrack 49 (fwd) File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 24 Dec 1996 17:22:23 +0100 From: "William S. Galkin" Subject: File 1--CLO#21-Negotiating the end of the millennium [PLEASE NOTE: All back issues can now be found at the Computer Law Observer site located at: http://www.lawcircle.com/observer] ============================================================= December, 1996 The Computer Law Observer Issue No. 21 ============================================================= The Computer Law Observer is distributed monthly for free by Challenge Communications. To subscribe, e-mail to lawobserver-request@charm.net with the word "subscribe" (leaving out the quotation marks) in the message area. To unsubscribe, do the same, inserting the word "unsubscribe". Re-posting is prohibited without permission. Copyright 1996 by Challenge Communications. See our website for back issues: http://www.lawcircle.com/observer ------------------------------------------------------------ ++++++++++++++++++++++++++++++++++++++++++++++ NEGOTIATING THE END OF THE MILLENNIUM ++++++++++++++++++++++++++++++++++++++++++++++ by William S. Galkin, Esq. (biography at end) Irony - Billions of dollars, and the world's best and brightest, have been devoted to the development of information technologies. And, now, with the meteoric rise in use of the Internet, we seem finally to be at the dawn of a new era where information resources will truly permeate our lives - dramatically altering the landscape of mankind in a manner many compare to the industrial revolution. And yet, someone discovered a flaw, a fault line that runs through much of the system. A simple programming error, that when viewed with hindsight one wonders "How could anyone have made such an obvious mistake?" This article focuses on the legal issues involved in successfully negotiating a solution to what is often referred to as the "Year 2000 Problem". Mistake - Date calculations play an essential role in most applications. Almost all applications record information regarding the year with two digits (i.e., 96 for 1996). The basic functions involving dates include calculating, comparing and sequencing. Therefore, when a program wants to calculate a person's current age, it will perform a calculation by subtracting the person's date of birth from the current year. In my case, subtract 57 (1957) from 96 (1996) and the result is 39. However, when the new millennium arrives, the year information contained in most applications will be "00". The calculation of my age (i.e., 00 minus 57) produces an erroneous result of negative 57! Magnitude - All hardware and software systems are potentially affected by the Year 2000 problem, even applications that are resident with service bureaus. Major corporations are expected to have to pay at least $40 million to rectify the problem. The worldwide cost could reach $400 billion. Federal Express was reported as having paid 5 cents per line of code to correct the problem, which resulted in a $500 million total cost. Chubb Insurance has paid $180 million and the state of Nebraska has paid $32 million. The problem is estimated to affect 95% of all U.S. companies. To date, only one third of affected companies are undergoing conversion. Some estimate that either the cost to repair or the failure to repair could result in a bankruptcy rate of 1 to 5%. The repair process is complex and involves either a data solution or a procedural solution. The data solution involves the modification of each occurrence of a date. This requires a methodical line-by-line analysis of code. With each change, the affected logic must be revisited and the modification must then be tested. Mid-sized companies will often have millions of lines of code. As many as one in every 50 lines could have a date reference. Data entry screens and output formats will have to be modified as well. A procedural solution involves changing the processing methodology so that an application will know that "18" means "2018" instead of "1918". This approach is difficult to implement as well. First steps - Every affected company needs to design its own approach to the Year 2000 problem. Usually a team will be set up to oversee the process. The team will include the appropriate internal technical personnel as well as management and outside consultants. Financial and legal advisors may also need to be included. The first step is to take a thorough inventory of all affected applications and gather all of the software license and support agreements that govern such applications to determine each party's rights and liabilities. There are a variety of provisions that might be found in these agreements, especially for custom software or where agreements went through a negotiation process. Some provisions might obligate the vendor to assist with the repairs or impose liability for damages that occur due to the Year 2000 problem. Additionally, a licensee will need to identify all confidentiality restrictions that might be found in the license agreements in order that when the repair work begins, it can proceed efficiently without violating these provisions. Many modifications will require access to the source code. Therefore, it is important to determine whether a source code escrow agreement requires delivery to rectify such a problem. Negotiating the cure - Rectifying the Year 2000 problem is complex because of both the variable times when problems might arise and because of the variety of forms the problems might take. Accordingly, when hiring outside consultants to repair the problem, a careful agreement needs to be drafted to specify what the problem is, how and when it is going to be fixed, and what happens if it is not adequately fixed. Following is a discussion of some of the important issues that need to be considered: DEFINITION OF PROBLEM: A survey of the problem is the first step. This can be performed in house, by a third party consultant or by the vendor hired to correct the problem. The results of this analysis will become an essential component of the agreement. The survey should include a catalogue of all applications reviewed and specifications as to what kind of corrections are needed for each application. There are a variety of correction methods that can be implemented - some will be appropriate for some applications, and not for others. The ideal goal is for the vendor to represent that all Year 2000 problems will be corrected, even those not listed in the survey results. However, most vendors will not agree to such a global representation. CONFIDENTIALITY: The vendor will be having intimate contact with a large portion of the information about the company. Additionally, the company itself will be under confidentiality restrictions that may prohibit the company granting access to certain applications. Accordingly, the confidentiality issues need to be settled in advance. IMPLEMENTATION SCHEDULE: It cannot be over stressed, that with Year 2000 repairs, time is of the essence. A detailed implementation schedule needs to be prepared and specific remedies and options need to be available if the schedule becomes delayed due to the actions of the consultant or the company. EVALUATING PROGRESS: Having the work completed by a certain date, well in advance of December 31, 1999, if possible, may be crucial in accomplishing an effective transition. Accordingly, the vendor should be required to keep the company regularly informed of progress and of any delays. CHANGE ORDERS: As the work begins to be performed, it is inevitable that additional tasks will be identified as needing to be performed. The agreement needs to be flexible enough to adjust for these changes in scope. TIME OF WORK AND DISRUPTION: Much of the Year 2000 repair work will have to be performed when the system or certain applications are down. This means that companies will want this work performed at night or over the weekends. Accordingly, it is important that the agreement set forth when the system will be done, and who determines the down schedule. TESTING PROCEDURES: Given the complexity of the repair methods, testing must be an essential component of the repair services. The vendor and the customer must develop and agree upon test criteria, how the tests will be performed, and when the system is considered to have passed the test. Additionally, it is important that a significant period of live use be a part of the test period. In order for this to be effectively available, the repair work must be completed well before December 31, 1999. FOLLOW-UP REPAIRS: It is likely that the testing procedures will turn up problems and errors. These errors may or may not fall within the scope of the repair services. Accordingly, the vendor should agree to be available (i.e., have personnel available) to rectify whatever problems arise. This is an important provision. As the year 2000 approaches, vendors will be stretching themselves thinner and thinner to complete the work by the deadline. Without prior assurances, there may not be personnel available to perform these follow up services. COST INCREASES; EMERGENCY SERVICES: Many service agreements are done on a time and materials basis and the vendor can increase the hourly rate after giving proper notice (e.g., 60 days' prior written notice). These provisions are workable when other vendors are available to substitute for a vendor that raises its price too much. As time goes on, it will be prohibitively expensive to find a substitute vendor, if one can be found at all. LENGTH OF WARRANTY: Not all Year 2000 glitches will be apparent at the turn of the century. It may take months or even years for some to surface. The warranty provision needs to take this issue into account. Other issues - Obviously, all new license agreements should include Year 2000 compliance requirements. This is a complex provision and should be carefully drafted. However, a discussion of this provision is beyond the scope of this article. Given the cost to repair and the potential for damage resulting from lack of compliance, due diligence for any corporate acquisition or significant loan or investment, must include a thorough evaluation of this issue. Many boards of directors have been postponing dealing with the problem because of the large expense that will appear on their financial statements. To make matters worse, the Financial Accounting Standards Board emerging issues committee has determined that money spent on the Year 2000 Problem must be charged against the current year's earnings, and cannot be amortized. However, a corporation that does not develop, in a timely manner, a complete compliance plan, will be a good target for shareholder suits against the officers and directors if failure in this regard results in a decrease in the value of the stock or company. Conclusion - Some companies are waiting for a "silver bullet" that will be developed which will simply and efficiently rectify the problem. However, the most optimistic predictions foresee the best technological developments providing at most a 30% savings in repair time and costs. The process of making systems Year 2000 compliant can be complex and fraught with unknown variables. A good agreement is necessary to successfully deal with the many issues involved. However, given that the end of the millennium is approaching fast, a prudent company will construct alternate plans if compliance is not achieved on time. ABOUT THE AUTHOR: Mr. Galkin can be reached for comments or questions about the topic discussed in this article as follows: E- MAIL: wgalkin@lawcircle.com WWW: http://www.lawcircle.com/galkin TELEPHONE: 410-356-8853/FAX:410-356-8804 MAIL: 10451 Mill Run Circle, Suite 400 Owings Mills, Maryland 21117. Mr. Galkin is an attorney in private practice. He is also the adjunct professor of Computer Law at the University of Maryland School of Law. He is a graduate of New York University School of Law and has concentrated his private practice on intellectual property, computer and technology law issues since 1986. He represents small startup, midsized and large companies, across the U.S. and internationally, dealing with a wide range of legal issues associated with computers and technology, such as developing, marketing and protecting software, purchasing and selling complex computer systems, launching and operating a variety of online business ventures, and trademark and copyright issues. ------------------------------ Date: Sat, 21 Dec 1996 18:50:46 -0600 (CST) From: Crypt Newsletter Subject: File 2--Jenott case: More gossip, so-called criminal hacker stuff The so-called criminal hacker ============================= By December 17th, the U.S. Army's prosecution of Eric Jenott, "the Ft. Bragg hacker," was in full swing. Much of the testimony appeared aimed at proving Jenott to be a criminal hacker. However, a key witness turned out to be little more than a convicted thief attempting to curry favor for himself in return for helping to convict Jenott. Other testimony appeared to be standard circumstantial hacker hearsay attributed to the Ft. Bragg soldier. Very little of the court's unclassified proceedings convincingly portrayed Jenott as a potential spy for communist China. Raymond Chen, a former Marine, testified Jenott gave "the [Internet] address for the secretary of defense computer system" to him "before Jenott joined the Army." Chen accessed the system using this information, he said. According to Chen, Jenott confided that he had been hacking into Navy, Air Force and other DoD computers since 1994. He claimed that Jenott had admitted to deleting information from a Navy system. Chen, who is also in legal trouble from this case and a convicted thief stemming from a 1991 break-in at the University of Washington in which he stole a computer, claimed he has been granted immunity from prosecution in exchange for his testimony in the Jenott case. Chen was convicted of burglary and possession of stolen property in December 1992. His sentence was 60 days in jail and 30 days of community service. Chen testified that he had negotiated immunity with Army prosecutor Emmett Wells. According to the Fayetteville Observer, Chen said in court "Wells said if I can get Jenott convicted of espionage, he will get me out of my trouble in Washington state." Wells was removed from the case when he attempted to commit suicide by slashing a wrist a few days earlier. Army prosecutor Matthew Wilkov had Chen say "he understood that Wells was an Army prosecutor and had no direct control over the charges in Washington." However, Wilkov added "he had agreed to write a letter saying Chen had cooperated in an Army case." Testimony continued from Army employees who worked the Fort Bragg bulletin board system. Janet Warden said she had been monitoring posts by Jenott and undisclosed others on the board. It was about computer hacking, she said, and included references to S-MILS, a military acronym for secure military sites. Warden said she had been instructed to observe Jenott's conversations on the system. Logs from the Ft. Bragg BBS indicated Jenott sent "several" electronic messages to Qihang Liu at Oak Ridge, Tennessee. Liu did not reply. Another military intelligence investigator, Ronald E. Davis, said that he interviewed Jenott and that "I learned he passed the password . . ." Davis was asked twice by prosecution what he learned from Jenott. The second time he said he "learned [Jenott] committed espionage." Jenott's lawyer, Tim Dunn, immediately objected and Fred Arquilla sustained it. The court was then closed again for the purposes of secrecy during the rest of Davis' presentation and testimony from John F. Deasy, a soldier from the Land Information Warfare Activity at Fort Belvoir, Virginia. When the court was re-opened, Deasy said he had been asked to look "over a file about someone from Fort Bragg hacking into [a] University British Columbia computer." Deasy also said he was told the security of a "switching station" on the Army's Mobile Subscriber Network was breached. Ray Chen testified again, claiming he had learned in a chat group with Jenott's brother, Lance, and unnamed others that Jenott had "hacked" into a university of British Columbia computer. Other prosecution witnesses said they had followed Jenott's discussions on the Ft. Bragg BBS on the use of passwords of "professors and students" to hack into computers and the utilization of laptops and payphones to avoid being traced. Izzit secret? ============= While the U.S. Army contended Eric Jenott gave a secret password for a secure cellular telephone network to Quihang Liu, the system's builder did not consider the password verboten until more than a full month after the Ft. Bragg hacker was charged with espionage. GTE developed the system and an employee, Steven Sullivan, testified at Jenott's court martial in another closed session, December 18th. The prosecution's Matthew Willkov maintained the password was classified. "If classified information is carried on the system, the password is secret" he said, according to the Fayetteville Observer. Jenott's defense disagreed. Judge Fred Arquilla said the password is classified, but only in the context of determining whether the court should be in closed session during testimony. He informed the jury that closing the court should not bear on its decision as to whether or not the password in contention was or is actually classified. Clear? Anyway, much later FBI agent Steven McFall -- who said he was suffering from a case of food poisoning -- testified that federal agents had seized an Army jacket and uniform with Jenott's name on it from the apartment of Quihang Liu. Suicide? Or not? In court gossip rules ======================================== Jenott's counsel, Tim Dunn, said on Friday that he had checked out a tip "that a former prosecutor [Emmett Wells] in the case tried to kill himself because he was being pressured to alter documents." According to the Fayetteville Observer, Dunn said he had also talked to Wells and the rumor proved unsubstantiated. "He said it was not true, it was fascinating, but he had to go," Dunn said. Wells is currently being treated at Walter Reed Army Medical Center after apparently trying to kill himself by slashing a wrist last Sunday. The Observer also reported the defense's effort to have some evidence declared inadmissible because the government has kept sloppy records on it. Judge Fred Arquilla denied Dunn's request but said he could introduce evidence pointing out the government's sloppiness. Kevin Nauer testified on computer data apparently seized from Jenott's hard disks or diskettes. It included words purported to be written by the Ft. Bragg hacker. According to Knauer and reported in the Observer, a poem credited to Jenott said "At least I'll have a tiny part in bringing this nation to its knees." According to prosecution testimony, Jenott is also claimed to have said he had "wiped out hundreds of computers at the Defense Information Systems Agency." Throughout most of the Jenott case, it has been impossible to distinguish whether much of the testimony is based on anything more substantive than weird hacker bragging, notes from the underground, hearsay or crazy gossip. Full text from the Fayetteville Observer: http://www.foto.com George Smith Crypt Newsletter http://www.soci.niu.edu/~crypt ------------------------------ Date: Tue, 31 Dec 96 12:31 CST From: Jim Thomas Subject: File 3--Soldier Innocent of Giving Secret Code to Chinese Copyright Chicago Tribune Monday, December 23, 1996 SOLDIER INNOCENT OF GIVING SECRET CODE TO CHINESE A soldier accused of passing a secret computer code to a Chinese citizen was acquitted Sunday (Dec. 23) of espionage, the most serious charge at his court martial. But Pfc. Eric Jenott, 21, was convicted of damaging government property and computer fraud after closing arguments. Jenott, of Graham, Wash., was sentenced to three years in prison and ordered to forfeit all benefits. ------------------------------ Date: Fri, 27 Dec 1996 13:20:01 -0600 (CST) From: Chip Rosenthal Subject: File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd) Just wanted to bring this news posting to your attention. The Telegraph appears to be on-line as . It might be worth checking the "Connected" section next week to see if something appears there. ------- start of forwarded message ------- From--Alec Muffett Subject--Crack5--ANNOUNCE--Daily Telegraph Article I gather (from the journalist concerned) that next week's (tuesday?) Daily Telegraph Computing Section will carry an article regarding the release of Crack5, in which "most security experts" are "highly critical" of "gifted amateurs" (!) such as myself, who "irresponsibly" release software such as Crack, SATAN, COPS, etc, onto the net. I've chatted with the fellow quite extensively, and also gather that he was unable (in the midst of the christmas break) to find any "security experts" who could find a good word to say about Crack; undeterred, I've had a go at putting a positive spin on the matter, and can only but hope that between his hands and the final print that I don't wind up looking a villan - I suspect I shan't, but you never know... Regardless, I must admit that I look forward to the almost inevitable furore with some enthusiasm. 8-) Followups set to comp.security.unix. ------------------------------ Date: Wed, 18 Dec 1996 01:54:46 -0500 (EST) From: "noah@enabled.com" Subject: File 5--BoS: Phrack 49 (fwd) From -Noah ---------- Forwarded message ---------- Date--Fri, 8 Nov 1996 19:46:47 -0800 (PST) Subject--BoS--Phrack 49 -----BEGIN PGP SIGNED MESSAGE----- The new issue of Phrack Magazine, the underground's *premier* computer security publication, is upon us all!! http://www.infonexus.com/~daemon9/phrack49.tgz ftp://ftp.infonexus.com/pub/Philes/Phrack/phrack49.tgz http://www.fc.net/~phrack or send email to the below address... An excerpt from Issue 49, P49-01: .oO Phrack 49 Oo. Volume Seven, Issue Forty-Nine 1 of 16 Issue 49 Index ____________________ P H R A C K 4 9 November 08, 1996 ____________________ Welcome to the next generation of Phrack magazine. A kinder, gentler, Phrack. A seasoned, experienced Phrack. A tawdry, naughty Phrack. A corpulent, well-fed Phrack. Phrack for the whole family. Phrack for the kids, Phrack for the adults. Even Phrack for the those enjoying their golden years. If you thought 48 was a fluke, here is 49, RIGHT ON SCHEDULE. Full speed ahead, baby. We promised timely Phrack. We promised quality Phrack. Here are both in ONE CONVENIENT PACKAGE! We trimmed the fat to bring you the lean Phrack. Chock full of the healthy information you need in your diet. All natural. No artificial ingredients. No snake oil. No placebo effect. Phrack is full of everything you want, and nothing you don't. This issue is the first *official* offering from the new editorial staff. If you missed them, our prophiles can be found in issue 48. Speaking of 48, what a tumultuous situation article 13 caused. All that wacking SYN flooding. Well, it got the job done and my point across. It got vendors and programmers working to come up with work-around solutions to this age-old problem. Until recently, SYN-flooding was a skeleton in the closet of security professionals. It was akin the crazy uncle everyone has, who thinks he is Saint Jerome. We all knew it was there, but we ignored it and kinda hoped it would go away... Anyway, after this issue, I hope it *will* just go away. I have done interviews for several magazines about the attack and talked until I was blue in the face to masses of people. I think the word is out, the job is done. Enough *is* enough. " SYN_flooding=old_hat; ". Onto bigger and better things. A few more quick points (after all, you want Phrack Warez, not babbling daemon9). I want to thank the community for supporting me (and co.) thus far. Countless people have been quite supportive of the Guild, the Infonexus, and of Phrack. Time and work do permit me to get back to all of you individually, so just a quick blurb here. Thank you all. I will be using Phrack as a tool to give back to you, so please mail me (or any of the editors with your suggestions). This is *your* magazine. I just work here. Most of all, I am stoked to be here. I am giving this my all. I'm fresh, I'm ready... I'm hyped + I'm amped (most of my heros don't appear on no stamps..). Drop us a line on what you think of 49. Comments are encouraged. Bottom line (and you *can* quote me on this): Phrack is BACK. - daemon9 [ And remember: r00t may own you, but the Guild loves you ] [ TNO, on the other hand, doesn't even fucking care you exist ] - --------------------------------------------------------------------------- Enjoy the magazine. It is for and by the hacking community. Period. Editors : daemon9, Datastream Cowboy, Voyager Mailboy : Erik Bloodaxe Elite : Nirva (*trust* me on this one) Raided : X (investigated, no charges as of yet) Hair Technique : Mycroft, Aleph1 Tired : TCP SYN flooding Wired : Not copping silly slogans from played-out, vertigo inducing magazines. Pissed off: ludichrist Pissed on: ip News : DisordeR Thanks : Alhambra, Halflife, Snocrash, Mythrandir, Nihil, jenf, xanax, kamee, t3, sirsyko, mudge. Shout Outs : Major, Cavalier, Presence, A-Flat, Colonel Mustard, Bogus Technician, Merc, Invalid, b_, oof, BioHazard, Grave45, NeTTwerk, Panzer, The Bishop, TeleMonster, Ph0n-E, loadammo, h0trod. Phrack Magazine V. 7, #49, November 08, 1996. Contents Copyright (c) 1996 Phrack Magazine. All Rights Reserved. Nothing may be reproduced in whole or in part without written permission from the editors. Phrack Magazine is made available quarterly to the public free of charge. Go nuts people. Subscription requests, articles, comments, whatever should be directed to: phrackedit@infonexus.com Submissions to the above email address may be encrypted with the following key (note this is a NEW key): - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQENAzJuWJgAAAEH/2auap+FzX1AZOsQRPWRrRSOai2ZokfVpWWJI8DRuSpX9l7w 5qWHrZdL/RweA4lgwAmcrAOD6d8+AzZfXEhkKi92G9ZNy2cjsb5g7oamkcPmC03h pdhRe5rHXDWUtXDEhHlkV0WvkLXrhFijW2VdJ2UDFyFd8q0nBSIz+JTGneNO0w4q aowCx3gZpEb4hkEU1LFoJXywZhnBg06jSxD9exbBF2WKeealqTlntlcsMmeJ3OdS 9fqnGI19BWirqkIJYtNXdzP4M2usOEvikrdhXwSbCNcDGcY6pyKco2rKbBUj5V2I 8/2L0TSGSaRBZ/YKRplwycldy63UVVTLMNGQCCUABRG0KlBocmFjayBNYWdhemlu ZSA8cGhyYWNrZWRpdEBpbmZvbmV4dXMuY29tPg== =eHJS - -----END PGP PUBLIC KEY BLOCK----- ENCRYPTED SUBSCRIPTION REQUESTS WILL BE IGNORED Phrack goes out plaintext... You certainly can subscribe in plaintext .oO Phrack 49 Oo. ------------------------------------- Table Of Contents 1. Introduction 7 K 2. Phrack loopback 6 K 3. Line Noise 65 K 4. Phrack Prophile on Mudge by Phrack Staff 8 K 5. Introduction to Telephony and PBX systems by Cavalier 100K 6. Project Loki: ICMP Tunneling by daemon9/alhambra 10 K 7. Project Hades: TCP weaknesses by daemon9 38 K 8. Introduction to CGI and CGI vulnerabilities by G. Gilliss 12 K 9. Content-Blind Cancelbot by Dr. Dimitri Vulis 40 K 10. A Steganography Improvement Proposal by cjm1 6 K 11. South Western Bell Lineman Work Codes by Icon 18 K 12. Introduction to the FedLine software system by Parmaster 19 K 13. Telephone Company Customer Applications by Voyager 38 K 14. Smashing The Stack For Fun And Profit by Aleph1 66 K 15. TCP port Stealth Scanning by Uriel 32 K 16. Phrack World News by Disorder 109K 575k ------------------------------------- "...There's MORE than maybes..." - Tom Regean (Gabriel Bryne) "Miller's Crossing" [ Obviously referring to the blatent truism that Phrack IS back ] "...Fuckin' Cops..." - Verbal Kint/Keyser Soze (Kevin Spacey) "The Usual Suspects" [ Not sure what was meant by that.. ] "Got more funky styles than my Laserjet got fonts" - 311/Grassroots "Omaha Stylee" [ That would be referring to us, of course ] EOF - -- [ route@infonexus.com ] Editor, Phrack Magazine / Member, Guild Corporation ...check out the nametag.. you're in MY world now grandma... -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMoP+pgtXkSokWGapAQFpqgQAgDEjwg7Q9TDbTQHzECneOc4FHK4QNAkb pynBsLq21gzhzzGDxLDveKv4lEJBPxqGnE1Fex3hnqdsL46oXMjRECRHkmP8Lhqx +P1N7Xa+q50NKkvuh2vZFdTN3Jgihwf5AF+5ngrlVbeV945BCJ1K9mr4GAUGccQD KoAKHrOPKIw= =deJO -----END PGP SIGNATURE----- ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.01 ************************************