Computer underground Digest Sun May 31, 1998 Volume 10 : Issue 31 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #10.31 (Sun, May 31, 1998) File 1--Islands in the Clickstream. a wild-eyed dreamer. April 25, 1998 File 2--"computer haiku" File 3--Blitzkrieg server computer virus File 4--CONFERENCE -- New Media Arts in Advanced Technology Culture File 5--Wiretaps Increase in 1997; Only Two Computer Taps (EPIC fwd) File 6--REVIEW: "Firewalls Complete", Marcus Goncalves File 7--Cu Digest Header Info (unchanged since 25 Apr, 1998) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Mon, 27 Apr 1998 17:01:27 -0500 From: Richard Thieme Subject: File 1--Islands in the Clickstream. a wild-eyed dreamer. April 25, 1998 Islands in the Clickstream: a wild-eyed dreamer talks to himself late at night on a dark side street A: Exactly. While we know that other cultures see things differently, it's difficult not to believe that our way of constructing reality is right. And obviously superior. The same goes for the little differences between us, differences amplified in cyberspace (or contact-space) inversely in proportion to the lack of a conversational context. How can we know what we're hearing when we don't know who we're talking to? Q: Say what? A: Put it this way. Insufficient bandwidth, an absence of real earth-time context to provide recognizable cues make it difficult to understand. Add differences in background and temperament and you have the makings of a real mess. Q: What do you mean by temperament? A: Different ways of perceiving, framing things. Like the Myers-Briggs. Q: What's that? A: The Myers-Briggs Type Indicator is based on Jungian personality types. It's popular because everybody using it feels validated. Each person in a group can see how everyone else contributes. Q: Is that important to you, that everyone see that? A: Yes. The group works better that way. Q: Like Capricorns learning to live with Leos? A: Right. The MBTI is like a horoscope for intellectuals. Instead of the stars, it locates why we do things in our genetic heritage. Q: What's your temperament? A: I'm an ENFP, an extroverted intuitive feeler. I see the future more clearly than what's right in front of my face. Visions are more real to me than chemicals in a test tube. Q: And you think that's better than being, say, someone who makes things work? Someone who sees why a satellite won't work, say, if it's missing a few bolts? A: Not better, but that's how things come to me. Dilbert thinks the fact that a pager is pink is irrelevant. I think it's clever. When the chips inside are identical, packaging matters. Marketing product when we're selling perceptions. In the digital world, that's what there is. Diplomacy. How we present ourselves in symbols. Q: You like to "network" too, I imagine? A: Absolutely. Hanging out in the Web is the name of the game, even if it goes nowhere. Q: Why would someone want to go nowhere? A: Well, there isn't really nowhere to go, there's always somewhere. Like divination. The Web is a meaningful network of symbols that if nothing else displays ourselves for all the universe to see. Q: A: Anyway, I was talking about networking with a typical representative of the dominant culture here in the upper Midwest, an STJ if ever there was one. He said, "Sorry, but that sounds like a woman. "Someone asks me to lunch," he said, "if I don't know by the time we're eating what they want, I get angry. The thought of meeting just to have lunch - just to "connect" - makes me nuts." Q: Of course it does. So what's your point? A: Don't you think that's interesting? Oh. Well, it's kind of a game, see, just getting out there into the Web. Start when you want and not be behind, quit when you want and not be ahead. Q: Then how do you know who wins? A: Everybody wins. Q: Huh. Alice in Wonderland. But the Net's exploding with commerce, ways to make money. It does matter how it gets built, who gets what. A: I won't argue with that. The rewards appropriate to knowing how to do whatever are always exactly that, the appropriate rewards. Meanwhile the Web is becoming the air we breathe. To me, that's what matters. Remember the robber barons. For a generation, the men who built the railroads looked like they were going to own America. By the end of their time, though, the infrastructure had been built, most were bankrupt, and something brand new was being born. But the railroads were in place. That's what mattered to the next generations. Where is the Soviet Union now and the Space Race? Q: So what will matter to the "next generations?" A: [faraway look in his eyes] I don't have a clue. All I know is what's happening now. Q: And ? What do you see? A: I see only the obvious. Our religions, the symbol systems we worship instead of God, are cracking and about to explode. The molten flow will coalesce into different shapes of beliefs, new gods rising in the steam. The shape of the global economy itself will pull political realities into the next century after it, like civilization bootstrapping itself, and what we call nations will be tribal identities or neighborhoods. The earth is our cradle, and the contact with other life that has already happened will quicken in our consciousness when we see what's right in front of our eyes. We'll re-invent and engineer ourselves and then be able to understand a little bit more where we came from and why. Maintaining social order will matter more than anything else. In the name of security and efficiency, we'll sell our freedoms for a mess of digital images. We'll invent more sports to keep people off the streets. We'll manage the aftermath of catastrophe. Humankind will move through a zone of annihilation in which everything we thought ourselves to be - everything - is called into question. We'll think we are losing our Mind, only to emerge on the other side when we least expect it. As we come to recognize our collective Self, what we call psi will become an integrated aspect of knowing. And what we call culture, when we have encountered deeply the way the alien races think, the way they construct their millions of years of non-history, will invent itself as an image in our minds seen through their eyes the way, for example, Hawaiians imagine Hawaiian culture in the reconstructed image of the European mind. Q: Well. As you say, that's all happening now. That's nothing new. That doesn't give me any answers. A: No. It's nothing new. It's just a digital monkey chattering to itself. ********************************************************************** Islands in the Clickstream is a weekly column written by Richard Thieme exploring social and cultural dimensions of computer technology. Comments are welcome. Feel free to pass along columns for personal use, retaining this signature file. If interested in (1) publishing columns online or in print, (2) giving a free subscription as a gift, or (3) distributing Islands to employees or over a network, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@thiemeworks.com with the words "subscribe islands" in the body of the message. To unsubscribe, email with "unsubscribe islands" in the body of the message. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations. Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved. ThiemeWorks on the Web: http://www.thiemeworks.com ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321 ------------------------------ Date: Tue, 28 Apr 1998 22:29:01 -0500 From: Avi Bass Subject: File 2--"computer haiku" ((MODERATORS' NOTE: We're not certain where the following originally appeared, but it may have been part of a Net contest. If anybody knows, drop us private mail to: cudigest@sun.soci.niu.edu)) IMAGINE IF INSTEAD OF CRYPTIC, GEEKY TEXT STRINGS, YOUR COMPUTER PRODUCED ERROR MESSAGES IN HAIKU... A file that big? It might be very useful. But now it is gone. - - - - - - - - - - - - The Web site you seek cannot be located but endless others exist - - - - - - - - - - - - Chaos reigns within. Reflect, repent, and reboot. Order shall return. - - - - - - - - - - - - ABORTED effort: Close all that you have. You ask way too much. - - - - - - - - - - - - First snow, then silence. This thousand dollar screen dies so beautifully. - - - - - - - - - - - - With searching comes loss and the presence of absence: "My Novel" not found. - - - - - - - - - - - - The Tao that is seen Is not the true Tao, until You bring fresh toner. - - - - - - - - - - - - Windows NT crashed. I am the Blue Screen of Death. No one hears your screams. - - - - - - - - - - - - Stay the patient course Of little worth is your ire The network is down - - - - - - - - - - - - A crash reduces your expensive computer to a simple stone. - - - - - - - - - - - - Yesterday it worked Today it is not working Windows is like that - - - - - - - - - - - - Three things are certain: Death, taxes, and lost data. Guess which has occurred. - - - - - - - - - - - - You step in the stream, but the water has moved on. This page is not here. - - - - - - - - - - - - Out of memory. We wish to hold the whole sky, But we never will. - - - - - - - - - - - - Having been erased, The document you're seeking Must now be retyped. - - - - - - - - - - - - Rather than a beep Or a rude error message, These words: "File not found." - - - - - - - - - - - - Serious error. All shortcuts have disappeared. Screen. Mind. Both are blank. ------------------------------ Date: Fri, 29 May 1998 23:30:39 -0500 From: Rob Rosenberger Subject: File 3--Blitzkrieg server computer virus You know, every once in awhile I lean back and say "I've seen it all in the antivirus world." Then something like THIS comes along... The London Sunday Times, New Scientist magazine, Hewlett-Packard, and the Armed Forces Communications & Electronics Association published separate stories about the amazing new "Blitzkrieg server computer virus." AFCEA's president (a retired three-star general) stakes his association's reputation on this story. Here's what we know so far about Blitzkrieg creator Larry Wood and his company's new product: * The Blitzkrieg server computer virus defends networks by launching retaliatory strikes against a hacker's Internet provider and every hapless customer logged on at the same time. * Larry Wood "will simulate a computer attack that disables a defense agency by making it impossible to launch any missiles" during TechNet'98 (the Defense Department's version of COMDEX). * The Blitzkrieg server computer virus can resolve Heisenberg's uncertainty principle -- a feat which will guarantee Mr. (not Dr.) Wood a Nobel prize in physics, since it flies in the face of how we currently perceive the universe at the quantum level. * Wood says the Blitzkrieg server computer virus "assimilates all other nodes attached to the network in a process that is intentionally transparent to the host computer irrespective of any antivirus preventive or protective mechanism." [Translation: "you will be assimilated; resistance is futile."] It can move to another network without detection, too. "As the wind is to a puff of smoke [sic], no trace of the virtual machine, its dynamic problem-solving state or its historical activities remain upon transfer from a network host unless ordered by the collective," Wood declared. [His use of the term "collective" equates to the Borg collective in Star Trek. "Automacapcids" (not "drones") describe individual elements within the collective, similar to the term used in a recent episode of the X-Files.] * The Blitzkrieg server computer virus can peer into the future with astounding clarity. "After only two weeks of on-line operational testing, the Blitzkrieg server determined a high probability that a hacker attack would be targeted at specific U.S. corporations and California state government installations. The server predicted that the network attack would be from Japanese nationals with the help of U.S. collaborators affiliated with the 2600 international hacker group." * On a lesser note, the Blitzkrieg server computer virus can trace spam email to its original source and can "plant a virus" on those computers. Talk about a useful function! * AFCEA's magazine editor (originally "sworn to secrecy" about some of the details) believes CIA or NSA "will probably make it black now," meaning they'll classify the entire project to keep it from falling into the wrong hands. An unnamed CIA agent (aren't they all?) called the Blitzkrieg server computer virus "potentially more dangerous than nuclear weapons" should it fall into the wrong hands. And "the thing is [only] in a prototype form right now" according to AFCEA's magazine editor. Imagine what the final product could do! * Wood's company claims the Los Angeles Times wrote a copyrighted story about Blitzkrieg. Actually, it's word-for-word identical to a press release with a Business Wire copyright notice. The Times business desk couldn't find the story in their news archive. And why does AFCEA's magazine editor appear on the press release as the primary contact for more info? Visit http://sun.soci.niu.edu/~crypt/other/blitz.htm and http://www.kumite.com/myths/opinion/thoughts to learn more about the Nobel shoo-in who created this amazing computer virus. Rob Rosenberger, webmaster Computer Virus Myths home page http://www.kumite.com/myths ------------------------------ Date: Tue, 26 May 1998 11:32:21 -0500 From: Jon Epstein Subject: File 4--CONFERENCE -- New Media Arts in Advanced Technology Culture From--CREATIVITY@luton.ac.uk Date-- Tue, 26 May 1998 15:16:39 GMT Please forward to interested colleagues or cut and paste to discussion lists ******Call for CONFERENCE Papers***** Creativity and Consumption New Media Arts in Advanced Technology Culture International conference 29-31 March 1999 to be held at the University of Luton, UK Submission deadline: 30 September 1998 E-mail: CREATIVITY@luton.ac.uk Creativity and Consumption will explore theoretical issues around the 'content' and 'use' of digital technology in order to promote a critical understanding of new media products and the context in which they circulate. We require both PAPERS and PANELISTS and there will be an EXHIBITION. see below CALL FOR PAPERS In particular we are looking for research papers that relate to the following themes: o computers and creativity o the human-machine interface o dead media and science fiction o 'interactivity' and cultural practices o the aesthetics and politics of new media practices o implications of the 'new media age' for cultural institutions o distribution, exhibition and the audience o preservation and access o copyright, ownership and economic models Papers addressing others aspects of artistic and cultural practices and products would also be welcome. Please submit a 500 word abstract, together with author name, address, tel and fax numbers and email address, by 30 September 1998 A selection of the papers presented will be published in Convergence: The Journal of Research into New Media Technologies, published quarterly by John Libbey Media at the University of Luton Press. CALL FOR PANEL DISCUSSIONS We are also calling for proposals for specific panel discussions that aim to promote debate and offer a forum for discussion around the conference themes. The proposer should supply a list of panel participants, together with an outline of each participant's contribution and the aim of the discussion (the full proposal to be approx 500 words in total). Please submit the 500 word proposal, together with author name, address, tel and fax numbers and email address, by 30 September 1998 EXHIBITION There will be a concurrent exhibition of new media artworks located in key venues around Luton town centre. Subject to funding this will feature two new works : Simon Biggs' The Great Wall of China, as a multi-screen, multi-user gallery installation and Black Box, a compilation installation produced by the Film & Video Umbrella. Both works will be exhibited at Luton's new lottery-funded arts centre, artezium. Sponsored by JVC, Eastern Arts Board, Centre for the Book at the Library of Congress. ****** This is an academic, non-commercial mailing ***** ********************************* Caroline Smith, Research and Development Worker Julia Knight, Project Coordinator Creativity and Consumption Dept of Media Arts University of Luton, 75 Castle Street Luton. LU1 3AJ UK Tel: +44 (0)1582 489144 Fax: +44 (01582) 489014 email: CREATIVITY@luton.ac.uk ------------------------------ Date: Tue, 12 May 1998 17:34:29 -0400 From: "EPIC-News List" Subject: File 5--Wiretaps Increase in 1997; Only Two Computer Taps (EPIC fwd) EPIC Alert, 5.06 (May 12, 1998) Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org/ *** 1998 EPIC Cryptography and Privacy Conference *** http://www.epic.org/events/crypto98/ ** Last week for Early Registration ** ======================================================================= [3] Wiretaps Increase in 1997; Only Two Computer Taps ======================================================================= State and Federal wiretapping increased by three percent in 1997 according to the annual report of the Administrative Office of the U.S. Courts, released last week. The total number of wiretaps approved by state and federal judges in 1997 was 1186, up from 1149 in 1996. There was a slight decrease in federal orders and an eight percent increase in state requests, mainly from a special New York police anti-narcotics squad. Once again, no request for a wiretap order was turned down by a federal or state judge. Investigation of drug cases was again the major reason for wiretaps. Seventy-three percent of all applications listed narcotics as the primary reason, up from 71 percent the previous year. Gambling and racketeering each accounted for eight percent of the applications. Only three cases involved "arson, explosives, and weapons" cases. Wiretaps continued to be relatively inefficient as an investigative tool. In 1997, each tap intercepted an average of 2081 calls for a total of nearly 2.5 million calls intercepted. Only 20 percent of conversations intercepted were deemed "incriminating" by prosecutors. Federal taps were even less efficient -- only 16 percent were deemed "incriminating." An analysis by EPIC of the reports for 1995-1997 has found that while the FBI continues its push towards limiting cryptography used to protect the privacy of electronic communications, federal and state investigators only conducted five wiretaps that involved computer communications in that period. In 1997, two such instances were reported. The two 1997 cases were a fraud case in Ohio and an extortion case in Illinois. The Illinois order was only in force for six days and did not yield any "incriminating conversations." More information on wiretapping, including the text of the Administrative Office of the U.S. Court's 1997 Wiretap report (in PDF format) is available at: http://www.epic.org/privacy/wiretap/ ======================================================================= [5] Industry, Public Interest Groups Ask FCC to Delay Wiretap Law ======================================================================= Public interest groups, telecommunications companies and trade associations filed comments with the Federal Communications Commission on May 8 asking the FCC to delay the implementation of new technical standards required by the Communications Assistance for Law Enforcement Act (CALEA). Under the law, telecommunications companies and equipment manufacturers have until October 25, 1998, to implement new standards for digital wiretapping or face heavy fines. However, delays due to controversial FBI demands in the standard-setting process have prevented them from being adopted. Comments filed jointly by EPIC, the Electronic Frontier Foundation and the American Civil Liberties Union asked the FCC to indefinitely stay the proceeding until the controversy over the standards are resolved. The groups also urged the FCC to issue one order covering all companies, rather than process several thousand individual requests for relief from the requirements. More information on CALEA and wiretapping is available at: http://www.epic.org/privacy/wiretap/ ======================================================================= Subscription Information ======================================================================= The EPIC Alert is a free biweekly publication of the Electronic Privacy Information Center. To subscribe or unsubscribe, send email to epic-news@epic.org with the subject: "subscribe" (no quotes) or "unsubscribe". A Web-based form is available at: http://www.epic.org/alert/subscribe.html Back issues are available at: http://www.epic.org/alert/ ======================================================================= About EPIC ======================================================================= The Electronic Privacy Information Center is a public interest research center in Washington, DC. It was established in 1994 to focus public attention on emerging privacy issues such as the Clipper Chip, the Digital Telephony proposal, national ID cards, medical record privacy, and the collection and sale of personal information. EPIC is sponsored by the Fund for Constitutional Government, a non-profit organization established in 1974 to protect civil liberties and constitutional rights. EPIC publishes the EPIC Alert, pursues Freedom of Information Act litigation, and conducts policy research. For more information, e-mail info@epic.org, http://www.epic.org or write EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington, DC 20003. +1 202 544 9240 (tel), +1 202 547 5482 (fax). If you'd like to support the work of the Electronic Privacy Information Center, contributions are welcome and fully tax-deductible. Checks should be made out to "The Fund for Constitutional Government" and sent to EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington DC 20003. Individuals with First Virtual accounts can donate at http://www.epic.org/epic/support.html Your contributions will help support Freedom of Information Act and First Amendment litigation, strong and effective advocacy for the right of privacy and efforts to oppose government regulation of encryption and funding of the digital wiretap law. ------------------------------ Date: Thu, 14 May 1998 08:10:35 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 6--REVIEW: "Firewalls Complete", Marcus Goncalves BKFWCMPL.RVW 980315 "Firewalls Complete", Marcus Goncalves, 1998, 0-07-024645-9, U$54.95 %A Marcus Goncalves goncalves@process.com %C 300 Water Street, Whitby, Ontario L1N 9B6 %D 1998 %G 0-07-024645-9 %I McGraw-Hill Ryerson/Osborne %O U$54.95 800-565-5758 fax: 905-430-5020 louisea@McGrawHill.ca %P 632 p. + CD-ROM %T "Firewalls Complete" While there is a large amount of information in this book, and a particularly valuable compilation of vendor data, I am not sure that I can agree with the claim to be complete. It is difficult to point out specific gaps in the work, since the whole volume could use a thorough reorganization. Part one is described as a reference section. Chapter one, rather oddly for a security book, deals not with security, but with the TCP/IP suite of protocols. This appears to set the stage for a technical treatment of the subject. Networking details continue in chapter two with an overview of the various connection methods over the net. I am always delighted to get more information about new Kermit products, but I would sympathize with any reader who was confused about what this material may have to do with firewalls. Encryption gets a brief review in chapter three. The content gets the basics across, but is of uneven depth between topics. Chapter four does start to provide security, and specifically firewall, related information in regard to the Web. The data is good, but seems to be somewhat random and unstructured. Advanced Web security areas (including a more detailed examination of ActiveX vulnerabilities) is found in chapter five. Chapter six looks at specific programming problems with the standard net APIs (Applications Programming Interfaces) but does not address firewall responses. Firewall technologies, implementations, and limitations are discussed in part two. Chapter seven attempts to define firewalls and describe firewall technologies, but concentrates almost exclusively on packet filtering aspects. Vulnerabilities of individual Internet applications are the subject of chapter eight, but many concerns mentioned are more potential than actual (and thus difficult to defend against) while a good deal of the content (including a complete, ten page Perl script) is repeated from earlier chapters. "Setting Up a Firewall Security Policy," in chapter nine, is much broader, touching on many security topics that may have little or nothing to do with firewalls. An example is the information on viruses, which is generally trite. The overview of antiviral software betrays no knowledge of activity monitoring or change detection classes of programs. The recommended protection procedure suggests copying downloaded programs to a floppy disk rather than the hard disk, which is both useless (malicious software invoked from floppy will generally happily destroy data on your hard drive) as well as being impractical in these days of enormous packages. The more effective approach would involve a type of firewall: an isolated machine that could download software and test it before the programs were used on production machines. Chapter ten is supposed to address issues of design and implementation, but deals primarily with considerations for evaluation of specific products. The question of design is made more problematic by the fact that the second major type of firewall Goncalves proposes, an application gateway, while first mentioned in chapter seven, is not defined until chapter eleven as a more generic form of a proxy server, which is itself first mentioned in chapter five but not described until this point. Chapter twelve covers basic auditing of the firewall, while chapter thirteen promotes the TIS Internet Firewall Toolkit and offers three ludicrously short "case studies." Part three is chapter fourteen, which lists firewall vendors and products. Descriptions of the products are extensive, and sometimes technically detailed, but it is difficult to call them evaluations, since there is little analysis of strengths and weaknesses. It is also hard to make comparisons, since there is little similarity of format in the entries. Appendix A is a collection of vendor contact information. Goncalves' writing on any given section is quite readable. Explanations are clear and illustrations can even be amusing. At times it seemed that the material was moving into common traps and misconceptions, but ultimately the analysis is generally balanced and realistic. However, in some cases there is an apparent contradiction between one paragraph and the next. The incongruity disappears on more rigorous scrutiny, but the text can be startling. In addition, the structure of the book, both overall and within individual chapters, leaves something to be desired. It can be difficult to follow developing concepts, and also to use the book as a reference by going back to specific topics to pick up particular points. As an adjunct to Cheswick and Bellovin's "Firewalls and Internet Security" (cf. BKFRINSC.RVW) or Chapman and Zwicky's more practical "Building Internet Firewalls" (cf. BKBUINFI.RVW), this work does have useful information. As a reference or introduction it falls short. copyright Robert M. Slade, 1998 BKFWCMPL.RVW 980315 ------------------------------ Date: Thu, 25 Apr 1998 22:51:01 CST From: CuD Moderators Subject: File 7--Cu Digest Header Info (unchanged since 25 Apr, 1998) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #10.31 ************************************