Computer underground Digest Wed 10 March, 1999 Volume 11 : Issue 16 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Commie Radiator: Etaion Shrdlu, Mssr. Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #11.16 (Wed, 10 Mar, 1999) File 1--How to UNSUB from CuD File 2--Islands in the Clickstream. Two Ways of Looking at a Network. File 3--Cracking Tools Get Smarter (Telecom Digest Reprint) File 4--EPIC Alert 6.04 - Intel ID Plan & upcoming legislation File 5--"Hackers" Hack British Satellite?? Nah--- File 6--eBay Says It Is Under Investigation by U.S. (Excerpt) File 7--1999 Privacy Intl Big Brother Awards USA Nominations File 8--Y2K Watch File 9--Microsoft Admits TO Hidden Software Code File 10--Journalist Sentenced for Child Porn File 11--Cu Digest Header Info (unchanged since 10 Jan, 1999) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 10 Mar 99 17:15 CST From: Cu DigestSubject: File 1--How to UNSUB from CuD About once every few weeks, CuD editors receive demands from a reader to be removed immediately, "or else!" Readers sub themselves to an automated mailing list run as a courtesy by a long-time reader. Subs are not done manually. Because CuD editors do not run the list, have nothing to do with the list, or otherwise sub or unsub people, there's nothing we can do other than provide the unsubbing information. To UNSUB, send the message: UNSUB CU-DIGEST to: cu-digest-request@weber.ucsd.edu TO CHANGE AN ADDRESS, unsub from CuD and then Resub. IF FOR SOME REASON YOU HAVE TROUBLE UNSUBBING, DROP A NOTE to: bjones@weber.ucsd.edu ------------------------------ Date: Thu, 04 Mar 1999 16:06:18 -0600 From: Richard Thieme Subject: File 2--Islands in the Clickstream. Two Ways of Looking at a Network. February 27, 1999 Islands in the Clickstream: Two Ways of Looking at a Network There are more than two, of course, but let's start with two. A computer network can look like a collection of stand-alone machines, just as humans in community can look like a collection of individuals benefiting from economies of scale. It all depends on the POV from which you describe the system, whether you notice the individual or the network. Without the individual, nothing happens, but without the network, nothing persists. The network organizes and stores information so it lasts a little longer than the span of our short lives. In all high-level systems, from religious systems to business systems, symbols are stored and transmitted. Some are preserved through rituals, some through records or narratives, some through one-on-one teaching. We preserve them so they can be there like fruit ripening on trees so we can eat them when we're hungry. Symbol systems are like complex intertwining stairways in an Escher etching. Even symbols that have become stale or flat through habitual use are time bombs that can suddenly explode and shock us with visions of possibility beyond anything we had imagined. Religious systems do not collect people who are virtuous or good. Religious systems collect individual people who need a training program to become more fully human beings. Seen as individuals, we always start with self-interest. I learned growing up in Chicago that we're all in it for ourselves. No other presupposition seemed to work. The most exalted moral position dissolved when someone's ox was gored. I learned that no one has the high moral ground, that we all enter the arena of life, as Saul Alinksy said, with blood on our hands. But who, as the caterpillar said to Alice, are we? Who is "us?" I was talking with Steve Straus, a personal performance coach (Steve@StrausUSA.com) at a workshop sponsored by the National Speakers Association. It was one of those hallway conversations that are the real reason we go to those meetings. We were talking about "giving it away," as this newsletter is sent to anyone who wants it. But we were talking about more than turning a commodity into a loss leader. We were talking about how things work. "It reminds me of the saying," I said, "give and it will be given to you. The more you participate or contribute, the more you experience a feedback loop of incredible value." Now, here are some of the presuppositions of my statement: that there is something to give, that I have it, that I have, that I am an "I" and "I" can own whatever it is that is given away. As if what we give when we contribute to others is a "thing" we can possess. That's the way the world looks when we think "we" are collections of individuals, bounded by parameters, when what we see when we look into a mirror is an edge, a boundary, a separateness. "It's deeper than that," Steve said. I don't remember his exact words, because as soon as I grasped what he meant, my construction of reality dissolved into something else. But although he used only a few words, I think he meant something like this: When we participate in something larger than ourselves, we experience a more complex truth about ourselves ... that the network really is the computer, that humans are cells in a single body. That as Marvin Minsky said, a person alone like a desktop computer unplugged from the network is nearly useless, a brain in a bottle. A person who isn't connected to how information and power flows in the network is like an abandoned infant raised by wolves in a cave, unable to speak the dialect of the tribe. Power in a network is not exercised by dominating or controlling. Power in a network is exercised by contributing and participating. So this is about more than managers morphing into coaches or organizational structures flattening into branches on tall fractal trees. It's as if we are staring at our image in that mirror, when suddenly the doorways of perception are cleansed, and instead of seeing a hard-edge shape created by eyes and minds designed to delimit a mass against a background, we see that we are energy and information exchanged in a self-similar system. Our edges blur, we see that the center is everywhere, the merely local focus of everything that exists. We see that the monitor through which you read these words is the stem of the leaf that you are on a single tree. When we know this and live out of that knowledge, we become so integrated with the flow of all things that we experience ourselves as part of it. We are transformed then into what we always were. The desire to align ourselves with what we know in those moments is not virtue, it is merely self-interest, the only way we can be our real selves. When we lose ourselves, we do find ourselves, we discover a deeper identity as a dimension of something inexplicable, an "it" we can never master, although we can master our willingness to be part of "it." Then feedback loops load energy into the system until it ramps up into something entirely else and transforms. Networks manage packets of meaning. But the boundaries of those packets are hackable, made up of arbitrary meanings themselves, meanings that flow. So this is not about religion. Even religion is not about religion. True, religions will evolve in cyberspace that are interactive, modular, and fluid, but the essence of those digital religious systems will be what it always was: to find appropriate forms for symbol-manipulating systems with which we symbol-manipulating sentient beings can interact, so that when we least expect it, the meaning of those symbols can ignite in our lives. I think that's what Steve Straus meant when he said, "It's more than that." But I'll never know. To grasp the meaning of those moments is to squeeze a handful of water that drips away in the effort to keep it. As we, ourselves like bright drops of water, slip into an ocean beyond our capacity to fathom. ********************************************************************** Islands in the Clickstream is a weekly column written by Richard Thieme exploring social and cultural dimensions of computer technology. Comments are welcome. Feel free to pass along columns for personal use, retaining this signature file. If interested in (1) publishing columns online or in print, (2) giving a free subscription as a gift, or (3) distributing Islands to employees or over a network, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@thiemeworks.com with the words "subscribe islands" in the body of the message. To unsubscribe, email with "unsubscribe islands" in the body of the message. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations. Islands in the Clickstream (c) Richard Thieme, 1999. All rights reserved. ThiemeWorks on the Web: http://www.thiemeworks.com ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321 ------------------------------ Date: Fri, 5 Mar 1999 14:13:44 -0500 (EST) From: editor@TELECOM-DIGEST.ORG Subject: File 3--Cracking Tools Get Smarter (Telecom Digest Reprint) Source: TELECOM Digest Fri, 5 Mar 99 Volume 19 : Issue 29 ((MODERATORS' NOTE: For those not familiar with Pat Townson's TELECOM DIGEST, it's an exceptional resource. From the header of TcD: "TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of public service systems and networks including Compuserve and America On Line. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. Subscriptions are available to qualified organizations and individual readers. Write and tell us how you qualify: * ptownson@massis.lcs.mit.edu * ======" )) ================== Date--Thu, 4 Mar 1999 23:44:47 -0500 From--Monty Solomon Subject--Cracking Tools Get Smarter http://www.wired.com/news/news/technology/story/18219.html Cracking Tools Get Smarter by Chris Oakes 3:00 a.m. 3.Mar.99.PST The cracker's screwdriver has become more of a Swiss Army knife, his F-16 more of a stealth bomber. With awe and alarm, security analysts have observed the capabilities of Nmap, a network-scanning program that crackers are now using to plot increasingly cunning attacks. "Just before Christmas, we detected a new [network] scanning pattern we'd never seen before," said John Green, a security expert on the "Shadow" intrusion-detection team at the US Navy's Naval Surface Warfare Center. "Other sites have seen the same activity. The problem was, no one knew what was causing it." Green made the remarks Tuesday in an online briefing hosted by the SANS Institute, a nonprofit network-security research and education organization. The group held the briefing to alert network administrators of the alarming increase in the strategies of network attacks. The culprit software prowling outside the doors of networks participating in the study is Nmap, an existing software utility used by administrators to analyze networks. In the hands of intruders, security analysts discovered, Nmap is a potent tool for sniffing out holes and network services that are ripe for attack. The analysts didn't look for actual damage that was carried out. Instead, they silently watched as various networks were scanned by untraceable Nmap users. "The intelligence that can be garnered using Nmap is extensive," Green said. "Everything that the wily hacker needs to know about your system is there." Rather than feel in the dark to penetrate network "ports" at random, Nmap allows intruders to perform much more precise assaults. The implications are a bit unnerving for the network community. The tool makes planning network intrusions more effective, while simultaneously bringing this sophistication to a wider audience of crackers. "It takes a lot of the brute force out of hacking," said Green. "It allows [intruders] to map hosts and target systems that might be vulnerable." And that should result in a higher success rate for attempted intrusions. "I think we're going to see more coordinated attacks. You can slowly map an entire network, while not setting off your detection system," said software developer H. D. Moore, who debriefed network analysts at the conference. But Moore is part of the solution. He authored Nlog, software that automatically logs activity at a network's ports and parlays it to a database. Weekly checks of the database enable the user to tell if someone is performing an Nmap analysis. Nlog serves as a companion tool to Nmap. Just like intruders, administrators can use Nmap to detect their own network weaknesses, then plug the holes. Prevention is the only defense, Green and Moore said. There is no other known way to combat an Nmap-planned network attack. "Right now it's basically a suffer-along scenario," Green said. But, at least, Nmap lets administrators "know what the hackers know about you." Copyright 1994-99 Wired Digital Inc. All rights reserved. ------------------------------ Date: Thu, 4 Mar 1999 16:13:44 -0500 From: "EPIC-News List" Subject: File 4--EPIC Alert 6.04 - Intel ID Plan & upcoming legislation Source: Volume 6.04 March 4, 1999 -------------------------------------------------------------- Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org ======================================================================= [1] Intel ID Plan Under Fire: Competitors Critical, Advocates Protest ======================================================================= Even in the face of continued public opposition and government investigations, Intel announced plans to move forward with the controversial Processor Serial Number at the Intel Developers Forum last week. According to ZDNN, Michael Glancy, general manager of Intel's platform security division, told developers to expect the chip ID in all the company's products soon including Internet appliances and portable devices based on Intel's StrongARM processor. Intel is also working with several Australian content providers on developing web sites that can only be accessed if the user releases the PSN. Meanwhile, other chip manufacturers have declined to adopt the PSN. Wired News reported that Brian Halla, CEO of National Semiconductor was also dismissive of the PSN, "We personally think security belongs in your wallet. It's personal, not a CPU-centric thing. It doesn't make any sense to have an ID in information appliances." Advanced Micro Designs (AMD), the major competitor of Intel has also not introduced a PSN. Privacy groups wrote to the heads of socially responsible mutual funds on February 26 asking that they divest Intel from their portfolios. Amy Domini, president of the Domini Social Equity Fund, issued a prepared statement: "We take the situation very seriously. Privacy on the Internet is more than simply an issue of personal choice. Without privacy our every political view, personal interest, contact of an old friend or checking on the weather becomes trackable for uses ranging from selling soap to monitoring segments of the population We have begun our evaluation, and will include communication with Intel and will make a decision once it is complete." Meanwhile, a European Union recommendation, adopted in late February and announced by EU Internal Market Commission Mario Monti indicates that EU privacy officials will be looking more closely at Internet- based identity schemes. The recommendation cites problems with Web browsers and programming technologies, as well as 'cookies.' More information on the PSN controversy is available at: http://www.bigbrotherinside.com/ ======================================================================= [7] EPIC Bill-Track: New Bills in Congress ======================================================================= EPIC Bill Track: Tracking Privacy, Speech, and Cyber-Liberties Bills in the 106th Congress http://www.epic.org/privacy/bill_track.html * Approved * H.R. 438. Wireless Communications and Public Safety Act of 1999. Mandates location information for cellular phones for 911. Limits use of information. Sponsor Rep Shimkus, John (R-IL). Referred to the House Committee on Commerce on 2/2/99. Subcommittee Hearings Held on 2/3/99. Ordered to be Reported (Amended) by Voice Vote on 2/11/99. Measure passed House, roll call #24 (415-2) on 2/24/99. H.R. 514. Wireless Privacy Enhancement Act of 1999. Prohibits interception of wireless communications, scanners. Sponsor Rep Wilson, Heather. Referred to the Committee on Commerce. Referred to the House Committee on Commerce on 2/2/99. Subcommittee Hearings Held on 2/3/99. Ordered to be Reported (Amended) by Voice Vote on 2/11/99. Measure passed House, roll call #28 (403-3) on 2/25/99. * New House Bills * H.R. 850. Security And Freedom through Encryption (SAFE) Act. Relaxes export controls on encryption, prohibits mandatory key escrow, creates criminal penalty for using crypto in a crime. Sponsor Rep Goodlatte, Bob (R-VA) 204 co-sponsors. Referred to the Committee on the Judiciary, and in addition to the Committee on International Relations. H.R. 852. Freedom to E-File Act. require the Department of Agriculture to establish an electronic filing and retrieval system to enable the public to file all required paperwork electronically with the Department and to have access to public information on farm programs, quarterly trade, economic, and production reports, and other similar information. Sponsor Rep LaHood, Ray. Referred to the House Committee on Agriculture. H.R. 896. Childrens' Internet Protection Act. Require the installation and use by schools and libraries of a technology for filtering or blocking material on the Internet on computers with Internet access to be eligible to receive or retain universal service assistance. Sponsor Rep Franks, Bob (R-NJ). Referred to the House Committee on Commerce. * New Senate Bills * S. 411. Clone Pager Authorization Act of 1999. Expands legal authority to authorize broader use of clone pagers. Sponsor Sen DeWine, Michael (R-OH). Referred to the Committee on Judiciary. S. 466. American Financial Institutions Privacy Act of 1999. Prohibits implementation of "Know your Customer" rules unless approved by Act of Congress, requires study on privacy issues. Sponsor Jeffords, James (R-VT). Referred to the Committee on Banking, Housing, and Urban Affairs. ======================================================================= [8] Upcoming Conferences and Events ======================================================================= Access to Information: Strategies and Solutions. March 16, 1998. Arlington, VA. Sponsored by the Freedom Forum and American Library Association. http://www.freedomforum.org/first/1999/2/ombudevents.asp CYBERSPACE 1999: Crime, Criminal Justice and the Internet. March 29 & 30, 1999. York, UK. Sponsored by the British and Irish Legal Education Technology Association (BILETA). http://www.bileta.ac.uk/ "Computers, Freedom and Privacy: The Global Internet," April 6-8, 1999. Washington, DC. Sponsored by ACM. Early registration deadline: March 15. Online registration: http://www.cfp99.org/ Encryption Controls Workshop. May 13, 1999. Raleigh, NC. Sponsored by the U.S. Dep't of Commerce. Contact: (202) 482-6031 Cryptography & International Protection of Human Rights (CIPHR'99). August 9-13, 1999. Lake Balaton, Hungary. Contact: http://www.cryptorights.org/ ------------------------------ Date: Mon, 08 Mar 99 15:02 CST From: Cu Digest (tk0jut2@mvs.cso.niu.edu) Subject: File 5--"Hackers" Hack British Satellite?? Nah--- The Chicago Tribune (1 March, 1999 p. 10) reported ia story from the Sunday Business newspaper that "hackers" took control of "one of Britain's military communications satellites and issued blackmail threats." "The paper, quoting security sources, said the intruders altered the course of one of Britai's four satellites, which are used by defense planners and military sources around the world. The sources said the satellite's course was changed just over two weeks ago. The hackers then issued a blackmail threat, demanding money to stop interfering with the satellite." A Tribune follow-up story (4 March, 1999 p. 7) reported that Britain's Defense Ministry dismissed the story as untrue: "There is no basis to the story whatsoever," said a Defense Ministry spokesman. "It's not true." ------------------------------ Date: Sun, 7 Mar 1999 11:34:21 -0600 (CST) From: Computer underground Digest Subject: File 6--eBay Says It Is Under Investigation by U.S. (Excerpt) eBay Says It Is Under Investigation by U.S. Associate Press: Tuesday, March 2, 1999 By LISA NAPOLI The online auction site eBay, which has already gained the attention of New York City consumer affairs officials, has said that it is under federal investigation for "possible illegal transactions." On Monday, a spokesman for the Palo Alto, Calif., company refused to offer details on the company's terse release about the inquiry, which was issued on Friday. The eBay release said the company was "fully cooperating with the inquiry." The spokesman, Kevin Pursglove, said on Monday that he could not say if it would be a "day, a week, a month, a year, or six years" until more information could be released on the investigation. Two weeks ago, eBay announced that it would ban the sale of firearms on the site, effective this coming Friday. That move came in response to a report that weapon sales, governed in the offline world by a complex set of rules which differ from state to state, were impossible to monitor in the geographically boundless online community. Another online auction site, Auction Universe, said it had not been contacted by federal authorities. The site is a division of Classified Ventures, which is jointly owned by The New York Times and seven other newspaper groups. In an interview on Monday, Larry Schwartz, president and general manager of Auction Universe, drew parallels between newspaper classifieds and online advertising. ------------------------------ Date: Sun, 7 Mar 1999 16:56:37 -0500 From: Privacy International Subject: File 7--1999 Privacy Intl Big Brother Awards USA Nominations ********* CALL FOR NOMINATIONS ********* PRIVACY INTERNATIONAL 1999 US BIG BROTHER AWARDS On April 6, 1999, the human rights group Privacy International will present the first annual US "Big Brother" awards to the government and private sector organizations which have done the most to invade personal privacy in the United States. The awards will be bestowed at an event during the 9th Computers, Freedom and Privacy Conference in the Ballroom of the Omni Shoreham Hotel in Washington, DC. "Big Brother" awards will be presented to the government agencies, companies, individuals and initiatives which have done most to invade personal privacy. A "lifetime achievement" award will also be presented. The judging panel, consisting of lawyers, academics, consultants, journalists and civil liberties activists, are inviting nominations from members of the public. Awards will also be given to individuals and organizations that have made an outstanding contribution to the protection of privacy. The event will be the first of its kind in the United States. Privacy International previously held a ceremony in the United Kingdom in October 1998. Awards were given in the UK to the NSA's spybase in northern England, the Department of Trade and Industry's Key Escrow plan, the township of Newham for its camera system with facial recognition, Harlequin Corp for its WatCall software system to track phone calls, and to Procurement Services International for exporting surveillance equipment to such military regimes as Indonesia and Nigeria. Privacy International (PI) was formed in 1990 as a non-government watchdog on surveillance and privacy invasion. The organization has campaigned throughout the world on dozens of issues ranging from identity cards and encryption policy, to workplace surveillance and military intelligence. PI's membership includes IT specialists, lawyers, judges and journalists from forty countries. More information on PI can be found at: http://www.privacyinternational.org/ The awards page can be found at: http://www.bigbrotherawards.org/ Nominations can be made directly from this site. More information on CFP 99 can be located at: http://www.cfp99.org/ ------------------------------ Date: Fri, 5 Mar 1999 09:08:53 -0600 From: Frosty Subject: File 8--Y2K Watch We've put up a site to watch other Internet sites and networks as the year 2000 rolls around. Connect anytime from the end of December 1999 to the beginning of January 2000 and find out which sites have dropped off the face of the Earth due to the Y2K issue. This is an interactive site and new sites are added as they get submitted. If you feel your site is a good representation of your country then feel free to set yourself up to join. We also accept mirror sites in each time zone. http://www.sotmesc.org/y2k/ ------------------------------ Date: Mon, 8 Mar 1999 18:27:50 EST From: anonymous3xx@aol.com Subject: File 9--Microsoft Admits TO Hidden Software Code MICROSOFT ADMITS TO HIDDEN SOFTWARE CODE >From Chicago Tribune News Services. WASHINGTON, D.C. Microsoft Corp., whose software runs most of the world's personal computers, admitted Sunday that its latest version of Windows generates a unique serial number that partly is planted within electronic documents and could be used to trace the authors' identities. In a disclosure with enormous privacy implications, Microsoft also said it is investigating whether it is collecting the serial numbers from customers even if they explicitly indicate they didn't want them disclosed. A programmer, Richard M. Smith of Brookline, Mass., noticed last week that documents Smith created using Microsoft's popular Word and Excel programs in tandem with the Windows 98 operating system included within their hidden software code a number unique to his computer. The 32-digit Windows number also appears in a log of information transmitted to Microsoft when customers register their copies of Windows 98, even if they say they don't want details about their computers sent to the company. ------------------------------ Date: Mon, 8 Mar 1999 18:24:45 EST From: jthomas@well.com Subject: File 10--Journalist Sentenced for Child Porn Journalist Sentenced for Child Porn .c The Associated Press March 8, 1999 By JAMES FRANKLIN GREENBELT, Md. (AP) -- A journalist got 18 months in prison Monday for distributing child pornography online, despite his claim that he was doing research for a story on child molesters. Larry Matthews, a National Public Radio producer who said he was working on a free-lance magazine article, had pleaded guilty. ``I believe Mr. Matthews crossed the line,'' said U.S. District Judge Alexander Williams Jr. ``I also believe that it was immoral.'' Matthews is the first journalist prosecuted for accessing child porn, according to the Reporters Committee for Freedom of the Press. Even before sentencing, Matthews' lawyers said they will appeal. ------------------------------ Date: Sun, 10 Jan 1999 22:51:01 CST From: CuD Moderators Subject: File 11--Cu Digest Header Info (unchanged since 10 Jan, 1999) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #11.16 ************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu