Computer underground Digest Sun 17 Jan, 1999 Volume 11 : Issue 03 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Copy Editior: Etaion Shrdlu, Jr. Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #11.03 (Sun, 17 Jan, 1999) File 1--Microsoft Zealotry File 2--Islands in the Clickstream. Surfing the Web. Jan 2, 1999 File 3--Does Y2K Mean Prisoners Running Amok? (fwd) File 4--REVIEW: "Year 2000 in a Nutshell", Norman Shakespeare File 5--Book: Communities in Cyberspace now available File 6--Cu Digest Header Info (unchanged since 10 Jan, 1999) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Mon, 28 Dec 1998 16:03:15 -0500 (EST) From: Tim KingSubject: File 1--Microsoft Zealotry Microsoft Zealotry: Thoughts on the Debate by Tim King There are two subjects that often turn to mush when discussed in popular circles: theology and economics. No one would try to tell an engineer how to build a bridge, or a pilot how to fly an airplane. But in theology and economics, everyone's an expert. This makes open debate almost worthless to students who like me want to discover the truth. There are no mentors to clearly and constructively point out my errors, or confirm my analysis. The truth is elusive. Too often we are mere ideologues who can't agree even on established maxims. This is bad enough among professional economists and theologians. But it's even more ubiquitous among laymen. In this atmosphere, reason is trying to explain to my two-year old daughter the effects of change in the volume of money on the slope of the inflation curve. Her eyes glaze over, and the conversation quickly degenerates into "No, Daddy! You do _this_!" So I do it. What else can I do? I only hope that someday she learns to understand. I believe there is an answer to the dilemma. Objectivity. This sounds simple enough, but it's hard to find. I need to know my own limitations. To step outside of my own self-interest. To be willing to discard everything I believe in, if it means accepting reality. I need to admit that I'm basically an ignoramus. And no one likes to be an ignoramus. * * * These problems arise in Microsoft's tribulations. As you know, economists have formally defined monopoly. Its causes and effects are well understood. Why, then, is it impossible to agree whether Microsoft is a monopoly? Additionally, there are recognized ways of dealing with monopolies, and antitrust legislation isn't one of them! There are many common misunderstandings. Monopoly is harmful because it restricts productivity. In other words, it's inefficient. But a monopolist cannot charge whatever he wants. Nor even necessarily what the market will bear. His profit can only be as much as it would cost his potential competitors to enter the market. As soon as he asks for more, he'll have company. And monopoly is not always a bad thing. Monopoly is better than nothing. Copyrights and patents are limited monopolies that enable innovation. And government-owned industries, such as water and sewer, and public goods, such as defense, would not be provided adequately (we presume) if it weren't for a government monopoly. Of course, no market is purely competitive. No business is a pure monopoly. Every firm, from the largest multi-national to the smallest coffee-shop, has characteristics of both. But which one is more prevalent with regard to Windows 98 and NT? Can't we find at least part of the answer in history? Microsoft has been challenged. It has seen MacOS, OS/2, BeOS, Linux, Solaris, and a host of others. And it may see many more before it eventually retires. Windows' continued dominance should not concern us here. Competition doesn't require that a dominant firm be unseated, only that others be able to contend for the spot. Innovative competition is what we see here. And it often results in a wide disparity of market share, as one firm fights to stay ahead of the pack. I've treated the economic issues haphazardly because I'm commenting on the quality of debate, to highlight prevalent misconceptions. My goal is not to write an economic treatise. For one thing, I'm less than qualified. And so many have already been written that Gates' defenders seem to have run out of new things to talk about. The Cato Institute, for example, has a large collection of papers at www.cato.org that explore the economics. * * * I find it strangely ironic that those who condemn Microsoft for Windows vociferously demand that Sun be compensated with regard to Java. They defend a single dominant portable-language standard as necessary, but decry a single dominant OS as cruel. They want someone to enforce Sun's copyrights, and also to destroy Microsoft's. Isn't it Microsoft's right to restrict how its intellectual property can be used? Isn't this also what gives Sun the right to put conditions on Java? There seems to be a double-standard. But, it is said, this doesn't apply to Microsoft, since it has such a powerful market position. We accept that the competitor who provides us the greatest utility ought to get our business. Microsoft is attacked for shutting out competitors. But, it is pointed out, Windows has plenty of competition. The objection comes: none of the alternatives are adequate. So then why should they succeed? What exactly is wrong with triumphing over inadequate rivals? The argument begs the question. It ought to be rejected on its face. Of course, I don't expect any of the hard-core anti-Microsoft zealots to be swayed. Little of this is my own work. It repeats what came before. And they weren't persuaded by any of that, either. It merely caused them to make their protestations more clamorous. They re-repeat again the discredited stories of path dependence: QWERTY vs. Dvorak, VHS vs. Beta. They make absurd claims. ("No one can stand against Microsoft's advertising budget. Or against its team of lawyers.") They make claims that cannot be backed up by facts. ("Microsoft makes bloated, useless, overpriced software that has no value to anybody.") They think that a free market is something that can be abridged by a bigger offering, but not by violent force. They perpetuate common myths regarding predatory pricing, robber barons, and free-market monopolies. One humorous claim was that there is actually a trunk full of cash buried at One Microsoft Way. This magic money, apparently, is to be used to pay for the antitrust edicts the company must endure. Of course, I'm sure that this was meant only figuratively. That Microsoft can make up the lost productivity. But that's just the point. Every dollar that's spent satisfying the trustbusters is a dollar that can't be used elsewhere in the economy to provide good things for you and me, and all the other people without political connections. I could go on for days. I can't help but think that the impetus for these views has nothing to do with science. Nothing to do with justice. With what's right. It shows a simple hate of Microsoft and of success generally. It is revulsion. It is prejudice. It is hostility. It is the desire to see Bill Gates taken down a few notches because we don't like egotistical nerds. * * * The antitrust arguments are specious at best. I really don't understand why anyone would adopt them. Likewise, Microsoft's defense in the Sun suit is unconvincing. At least these views are self-consistent. Intellectual property is notionally similar to real property. And it needs to be protected in order for the market to exist. If there's any benefit in the market, it must avail to both Sun and Microsoft. This is not to say that I'm infallible. I expect that I've made a grievous error somewhere. But I don't know where. I can't find it. The harder I look, the more elusive it becomes. In any case, I have all but given up on the platitudes I hear from popular sources. There is little to be achieved in their emotionally-laden debates. Cries of "Is not!" and "Is too!" echoing from a distant school yard are a poor source of wisdom. It is notoriously difficult to get truth from a propagandist. As difficult as converting a true believer. If there is a truth to be learned, I don't believe it can be had by the disingenuous methods we learned in school. It won't come to light through the political process. The image is not enhanced by demagoguery. The answer demands attention to detail. It requires a clear understanding and a rational mind. It summons us to hours of devoted study. To slough off the old views that are dissonant with the new. Change is never an easy process. May we each have courage to innovate. ------------------------------ Date: Wed, 06 Jan 1999 14:38:23 -0600 From: Richard Thieme Subject: File 2--Islands in the Clickstream. Surfing the Web. Jan 2, 1999 Islands in the Clickstream: Surfing the Web No, not THAT web. The REAL web. Three times this week I awoke with a strong impression of particular people, all of them important to me, all of them distant. I hadn't heard from any of them in a long time. In each case, the sense of their presence was unmistakable, persistent. And significant email from each was waiting on the server. Now, consciousness weaves a deceptive web, and the way we interpret events in our lives is subjective. The weight of events in our histories is determined by our emotional filters. How we pattern or tell our stories always involves choices, making each of us an artist of our own lives. So I know skeptics will suggest that fleeting impressions of distant friends bob in and out of consciousness all the time like oracular readings in a magic eight ball and only the waiting email made me remember those impressions. And all one can say is, yes, I understand what you are saying, and I am saying that this was not like that at all. These were distinctively strong impressions that made me think, even before I booted up, "I wonder if ..." and the waiting email finished the sentence with relevant details. More than knowing, this is knowing in a way that we know that we know. Knowing that we know empowers us to get behind what we know and ride the slipstream. The beliefs or consensus realities of communities constrain how we think. That's why "outsiders," free from institutional and organizational constraints, can be valuable. Who we invite into our lives does make a difference. They either affirm and validate our strengths and disclose new possibilities or limit and narrow our options. Years ago, when I worked in the Episcopal Church, I offered a workshop called "The Invisible World" about the deeper dimensions of consciousness. It was intended to disclose to people who lived on land, as it were, that most of the planet was covered by water. With the right diving equipment, we could become as comfortable in the ocean as on the beach. But you had to know there was water, then something under the water, then want to see it, then learn how to dive. I asked people in small groups to disclose some of their liminal experiences. The newsprint was soon covered with instances of every kind of boundary experience imaginable. When the members of the group looked into that mirror of its collective self and realized that all their unusual experience was ordinary, they realized how they had limited themselves. Without reminders, we forget who we are and of what we are capable. When we remember, it discloses the possibility of a different kind of life, life as a game that is three dimensional, four dimensional, more dimensional than that. We develop an intuitive sense of which currents are worthy of following into the depths. That our government conducted a program for several decades in remote viewing (anomalous cognition, a kind of clairvoyance), is now well known. According to Joe McMoneagle, one of the more successful remote viewers, the process of learning to trust images that arrived so lightly in the depths of a meditative state was subtle and complex. There were plenty of misses as well as hits because the symbolic filter that interprets unconscious knowledge weaves a tapestry that is always congruent with our beliefs and keeps our egos in control. Learning how to filter that filter through a different filter altogether adds a new dimension to our understanding. The government was interested in remote viewing because of its practical value. All intelligence must be cross-correlated and understood in terms of intentions, meanings, the Bigger Picture, so results of RV alone were never trusted, any more than a single intercepted message tells the whole tale. Because competitive intelligence and counter-intelligence are necessary to compete in a global knowledge economy, some corporations are experimenting in remote viewing. Naturally, our consensus reality inhibits open discussion of even the possibility. New ideas migrate from the edge to the center. The doctor who first discussed battered child syndrome says that when he first spoke openly about it, he was greeted by silence. No one asked questions. Out in the hallway, however, a physician would say, you know, I did see symptoms like those just the other day.... Drip. Drip. Drip. Now we "all know" there's such a thing as "battered child syndrome" and we know how we know it. I have had the same experience giving talks about UFO phenomena to educated professionals. Someone often hangs back and waits to share a secret of which he acts almost ashamed, what happened one night when he and other fighter pilots were scrambled after a radar target or what someone confided in the middle of the night at some remote outpost in Viet Nam. When we enter the real web, the nodes that represent others glow according to their power in our lives. We follow vectors of energy in the medium of our collective consciousness, navigating as if in a mist irradiated intermittently by sudden sun. Symbols link to symbols which suddenly symbolize something beyond the power of symbols to say. When we see through symbols on our monitors into the consciousness manipulating pixels into luminous images, we maneuver in a web of which the Internet is merely an emblem. The nexus is unmistakable. But this is an experience into which we can allow ourselves to settle or be led, not something that can be taught. Teaching in this domain is only a way of drawing pictures that depict the edge of the ocean and invite us to wade into the surf. Once we know there is a coastline, then we can choose to dive.... and one day know what it means to sink and sit lightly on the reef, breathing in and breathing out, chasing nothing, letting everything in the sea that is wondrous and strange come to us. ********************************************************************** Islands in the Clickstream is a weekly column written by Richard Thieme exploring social and cultural dimensions of computer technology. Comments are welcome. Feel free to pass along columns for personal use, retaining this signature file. If interested in (1) publishing columns online or in print, (2) giving a free subscription as a gift, or (3) distributing Islands to employees or over a network, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@thiemeworks.com with the words "subscribe islands" in the body of the message. To unsubscribe, email with "unsubscribe islands" in the body of the message. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations. Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved. ThiemeWorks on the Web: http://www.thiemeworks.com ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321 ------------------------------ Date: Fri, 8 Jan 1999 15:06:13 +0200 From: "Abolish (Capital Punishment)" Subject: File 3--Does Y2K Mean Prisoners Running Amok? (fwd) ((MODERATORS' NOTE: Here's another of our occasional "Y2K will doom us" series. This, from another list, suggests that prisoners may run amok when prison locks won't work. Maybe somebody should show them the "any key")). ---------- Forwarded message ---------- Year2000 Prisoners Await Y2K Day by Spencer Ante 10:30 a.m. 15.Oct.98.PDT Among the more outlandish scenarios envisioned by Year 2000 doomsayers is that the millennium bug will crash prison security systems and open the razor-wire gates, setting loose untold numbers of violent and dangerous offenders. "People joke about doors flying open but it's a very distinct possibility," said Dr. Michael Harden, an information technology manager for 20 years and author of a study that examined the impact of Y2K on embedded computer systems. "If a prison is defined by its ability to control inmates and all these systems break down, a prison ceases to become a prison and it becomes a hotel." Harden's concerns are echoed by corrections officers, law enforcement officials, and security experts who gathered in Austin, Texas, on Thursday for a conference focusing on Y2K's impact on prisons. At the very least, observers say, Y2K could disrupt prison security enough to put corrections officials in jeopardy. And in the most unsettling scenario, a Y2K crash could seriously compromise a prison's perimeter security. Though it's hard to generalize about the potential impact of the millennium bug on the nation's jails, virtually all the experts agree that governments have been slow to respond to the challenge. Peter O'Farrell, a physical plant systems consultant and speaker at Thursday's Year 2000 and Embedded Systems conference, said the Massachusetts' correctional system hired a Y2K manager only two weeks ago. "The difficulty is in trying to get people to buckle down and go through their systems," said O'Farrell. Prisons: A Y2K Minefield? The computer and database-driven prison system is a potential minefield of Y2K glitches. The parole system at the California Department of Corrections, for example, is built atop three distinct databases. Then there are the inmate records, which are maintained by computers in most prisons and jails -- though conventional paper files are often kept. "[Y2K] could have an impact in terms of management's ability to maintain inmate records," said Jim Ricketts, president of Technology Systems International, a company that is developing a new generation of high-tech prisons. Ricketts said that foul-ups of that nature could result in the premature release of prisoners. But David Hall, an embedded systems expert with the Cara Corporation, scoffs at the idea. After completing Y2K risk assessments at three state prisons, Hall believes that computerized security systems are not widespread enough for the millennium bug to pose a real threat. "We're finding that there are a lot less problems than we thought there would be," he said. "Everything we've found can be fixed, providing that facilities [departments] start now." But Michael Harden said the corrections systems has an Achilles heel in the form of the thousands of embedded chips -- computer chips permanently burned with software code -- hidden throughout the facilities. "You couldn't build a modern prison today without computers.... It makes them very vulnerable [to Y2K]," said Harden. "The more modern the prison, the more likely it is to be reliant on computer chips or computer systems for control of all their security functions." In a typical office building, embedded chips hide inside badge readers, elevators, fire-detection systems and electric generators. A prison has all those systems, plus security cameras, door locks, alarm systems, and communications networks. "It's not like a school," said Hall, another speaker at Thursday's conference. "If the power goes down, you can't send the prisoners home. The stuff that happens in prisons becomes more critical." California: Bright Spot in a Dark Picture? The California Department of Corrections runs the nation's largest prison system -- the state's inmate population is nearly 50 percent larger than that of the Federal Bureau of Prisons. Furthermore, California's parole system keeps tabs on 107,693 offenders. "I'm confident that we've got a good handle on things," said Larry Wagner, chief technology officer for the state's prison system. "The comfort level is reasonably high." Wagner said California has been making progress on heading off Y2K pitfalls, largely because the state got an early jump. On 3 October 1997, Governor Pete Wilson signed an executive order declaring Y2K an official state priority. In that order, he directed every state agency to defer new computer projects until essential systems were brought into compliance. Wilson set a fix-it deadline of 31 December 1998, and ordered the Department of Information Technology to coordinate and fund the state's Y2K compliance efforts. Under the program, the California Department of Corrections received an extra $5 million specifically for Y2K. Wagner said his department's critical software applications will be fixed before Wilson's deadline. For example, the Interim Parolee Tracking System, the statewide parolee database that feeds information to federal computers at the Department of Justice, is already Y2K compliant. Wagner is developing formal Y2K contingency plans, but he expects the 15,000 desktop PCs and tens of thousands of embedded systems within the California prison system to be up to snuff by 30 June 1999. Still, it hasn't been easy. "The desktop problem has frankly shocked even me as to the degree of problems we're discovering," said Wagner. He said he found Y2K problems in computers purchased as recently as this year. Wagner said that hardware and software vendors such as Microsoft and Oracle have been reluctant to guarantee the compliance of their products. In other cases, statements made by vendors have proven false or inaccurate, though he declined to give specifics. Federal Prisons: A Mixed Bag If the California Department of Corrections is emerging as one of the handful of Y2K success stories, the jury is still out on the Federal Bureau of Prisons. As with all federal agencies, the bureau is expected to eradicate the Y2K bug by 31 March 1999. However, the Department of Justice, which oversees the federal prison system, was downgraded from a "D" to an "F" rating in a recent congressional Y2K report card. "I really don't think the bureau [of prisons] is extremely sensitive to Y2K," said Buford Goff, who runs Buford Goff and Associates, an engineering firm that specializes in the planning and construction of security systems for correctional facilities. Goff said he has designed security systems for prisons in 33 states, which translates into more than 200,000 prison cells. Edward Ayscue, head of facilities management at the Federal Bureau of Prisons, said that the bureau has completed its inventory of embedded systems. However, he declined to provide a specific completion date for fixing them all. "We'd like to be finished with repairs by the end of the calendar year," said Ayscue, "but unfortunately there are some vendors who have not verified the compliance of their equipment." Ayscue said the Federal Bureau of Prisons has hired an outside firm to test the department's scores of embedded systems. That work will begin late this year or in early 1999. Furthermore, he said the bureau is working on contingency plans -- many which are modified versions of existing prison contingency plans. Nevertheless, Ayscue admits that the bureau will not be able to test every embedded computer chip. "That's impossible," he said. "We rely on manufacturers to give us credible information." Some experts criticize what they say is a lack of testing in federal prisons. "I don't believe there has been a significant level of testing of embedded systems in prison," said Harden. "The few tests that I have seen are not reassuring." Cautious Optimism Despite the fears that the Year 2000 will wreak havoc in the correctional system, Goff and other experts believe that Y2K's impact on the prison system will be minimal if officials attack the problem seriously and quickly. Even if they do, though, Hall thinks prisons could feel the effects of external Y2K disasters resulting in local power failures and communications breakdowns. If that happened, and the worst-case scenarios did indeed materialize, one expert floated the surreal forecast that free citizens, bereft of life's necessities, could end up racing to the well-stocked coffers of their local prison. "You're probably going to end up with a mob at the prison gate," predicts O'Farrell. "You've got a year's supply of food, you've got heating, electricity, a hospital, and a gymnasium," he said. "Everything you need is there." ------------------------------ Date: Fri, 15 Jan 1999 08:18:30 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 4--REVIEW: "Year 2000 in a Nutshell", Norman Shakespeare BKY2KNSH.RVW 981030 "Year 2000 in a Nutshell", Norman Shakespeare, 1998, 1-56592-421-5, U$19.95/C$29.95 %A Norman Shakespeare %C 103 Morris Street, Suite A, Sebastopol, CA 95472 %D 1998 %G 1-56592-421-5 %I O'Reilly & Associates, Inc. %O U$19.95/C$29.95 800-998-9938 707-829-0515 nuts@ora.com %P 336 p. %T "Year 2000 in a Nutshell: A Desktop Quick Reference" *Can* the Year 2000 problem be put in a nutshell? (Please?) And isn't it just a tad late to be starting this? (On the other hand, Nutshell books *are* generally worth waiting for.) Part one is a general overview of the situation. Chapter one starts with a rather exaggerated doomsday scenario, including concerns that have already been seen, and thus have been addressed. At the same time, it ignores the "upstream" multiplier effect of supplier and infrastructure failures. However, it does go on to note needs and concerns for management of the potential failures. Management and budgeting considerations are expanded in chapter two. Legal questions are addressed in chapter three, in a somewhat generic fashion. Some standard planning models and assumptions are given in chapter four. A little technical information in chapter five may help with calculations for dates and windowing or packing solutions. Chapter six looks at the desktop PC; which is interesting in view of a very heavy COBOL and IBM mainframe and mid-range emphasis elsewhere (as well as a few PC related goofs in the doomsday scenario). Unfortunately, some of the information is missing and some is wrong in regard to the desktop. There is no mention of a "cold rollover" test for the CMOS/system date, and the statement about Excel's date interpretation is incorrect. (I have confirmed this in my own testing.) On the other hand, the warning about internally developed applications is quite important. Part two provides some forms and checklists to help organize a Year 2000 project, including triage, inventory, and a project template. There are about a hundred pages of COBOL references and tutorial in part three. Date functions get extensive listings in part four with attention to general types, COBOL, PL/1, MVS LE, Visual Basic, and C. There is a conceptual look at code scanners in chapters eighteen and nineteen. An appendix lists Web sites for Y2K vendors, tools, and other resources. Was it worth waiting for this? I'm not sure. There is little wrong with the information, but neither is this a cut and dried quick fix that you might expect from the Nutshell series. An unrealistic expectation in the case of the disaster of the century, admittedly, but there you are. Still, with the big iron emphasis, and the big project orientation, the material is this work seems to be coming later than it would have been necessary to start these kinds of projects. There is relatively little in the volume for small businesses depending upon desktop machines, and almost nothing on fallback plans for non-compliance in the supply chain. The material is fine as far as it goes, but it doesn't go as far as it needs to at this late date. On the other hand, it's no worse than any of the others. copyright Robert M. Slade, 1998 BKY2KNSH.RVW 981030 ====================== rslade@vcn.bc.ca rslade@sprint.ca robertslade@usa.net p1@canada.com Find virus, book info http://victoria.tc.ca/int-grps/techrev/rms.html Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER) ------------------------------ Date: Fri, 15 Jan 1999 17:29:24 -0800 From: Marc Smith Subject: File 5--Book: Communities in Cyberspace now available I am pleased to announce that _Communities in Cyberspace_ is now available! Published on Routledge, the volume addresses a range of issues related to online social interaction and collective organization, including identity, social control, social network structure, and collective action. The book can be found at Amazon.com at: http://www.amazon.com/exec/obidos/ASIN/0415191408/investiofsocialc Here is material from the book jacket: "I give it my highest recommendation to anyone interested in getting past the hype, both positive and negative, to read what serious social scientists have to say." -- Howard Rheingold, author of The Virtual Community "A very important and intriguing collection, well-organized and presented. What the ultimate impact of cyberspace communities will be, especially on geographical or 'traditional' communities, is still anybody's guess. This collection is a great first step in helping us to understand the new opportunities, as well as threats, of this vast new electronic space." -- Doug Schuler, author of New Community Networks: Wired for Change. "A must-read for anyone interested in the emerging social ecologies of virtual spaces. Communities in Cyberspace has some of the best work I have seen in the sociology of virtual exchanges, including race, gender, identity construction, and gift exchange." -- Kate Hayles, University of California, Los Angeles In cyberspace, communication and co-ordination is cheap, fast, and global. With powerful new tools for interacting and organizing in the hands of millions of people world-wide, what kinds of social spaces and groups are people creating? How is the Internet changing our basic concepts of identity, self-governance and community? This wide-ranging book looks at virtual communities in cyberspace and their relationship to communities in the physical world. The roles of race, gender, power, economics and ethics in cyberspace are discussed by leading experts on the subject, grouped into four main sections: * Identity * Social order and control * Community structure and dynamics * Collective action Communities in Cyberspace investigates how the idea of community is being challenged and rewritten by the widespread use of online interaction. This edited volume is an essential introduction to the landscape of social life in cyberspace. It will appeal to academics, students and professionals, and to those concerned about the changing relationship between information technology and society. Contributors: Byron Burkhalter, Judith S. Donath, Milena Gulia, Laura J. Gurak, Peter Kollock, Christopher Mele, Jodi O'Brien, Elizabeth Reid, Anna DuVal Smith, Marc A. Smith, Willard Uncapher and Barry Wellman. Marc Smith is a research sociologist at Microsoft Research. Peter Kollock is Associate Professor of Sociology at the University of California, Los Angeles. Both have lectured widely on the history and development of cyberspace. Regards, Marc Smith ====================================== Marc A. Smith Research Sociologist Microsoft Virtual Worlds Group ------------------------------ Date: Sun, 10 Jan 1999 22:51:01 CST From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 10 Jan, 1999) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #11.03 ************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu