Computer underground Digest Sun Mar 14 1999 Volume 11 : Issue 17

Computer underground Digest    Sun  14 Mar, 1999   Volume 11 : Issue 17
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Copy Erritor:   Etaion Shrdlu, Mssr.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #11.17 (Sun, 10 Mar, 1999)


File 1--REVIEW: "1999 Canadian Internet New User's Handbook", Jim Carrol
File 2--REVIEW: "Implementing Elliptic Curve Cryptography", Michael Rosi
File 3--REVIEW: "Field Guide to Microsoft Windows 95", Stephen L. Nelson
File 4--REVIEW: "Starswarm", Jerry Pournelle
File 5--REVIEW: "Poser's Guide to the Internet and World Wide Web", Jame
File 6--REVIEW: "The Race for Bandwidth", Cary Lu
File 7--REVIEW: "1999 Canadian Internet New User's Handbook", Jim Carrol
File 8--REVIEW: "How to Get a College Degree Via the Internet", Sam Atie
File 9--REVIEW: "Public Access to the Internet", Brian Kahin/James Kelle
File 10--Cu Digest Header Info (unchanged since 10 Jan, 1999)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 23 Feb 1999 08:28:58 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 1--REVIEW: "1999 Canadian Internet New User's Handbook", Jim Carrol

BKCAINUH.RVW   990123

"1999 Canadian Internet New User's Handbook", Jim Carroll/Rick
Broadhead, 1998, 0-13-974957-8, C$16.95
%A   Jim Carroll jcarroll@jimcarroll.com www.jimcarroll.com
%A   Rick Broadhead rickb@sympatico.ca www.rickbroadhead.com
%C   Scarborough, Ontario
%D   1998
%G   0-13-974957-8
%I   Prentice Hall Canada
%O   C$16.95 800-576-3800 416-293-3621 www.phcanada.com
%P   246 p.
%T   "1999 Canadian Internet New User's Handbook"

As rabidly and chauvinistically patriotic as I am, I find it difficult
to recommend this book.

Chapter one is basically a sales pitch for the net, although, at the
same time, it suggests that media hype has distorted perceptions of
the Internet.  The material does not address specific deceptions but
does mention a few minor examples of how the net can be used.  The
obligatory list of Web sites is given in chapter two.  Rather oddly,
the specific URLs (Uniform Resource Locators) are not given in the
individual writeups (and, in one case, seem to have been deliberately
expunged from screen shots) although they are collected at the end of
the chapter.  Some items that *do* have their URLs included are the
tips, but a number of those in this chapter are not Canadian.  Despite
the promise of the title, there is no real explanation of the net in
chapter three, which simply contains a few more examples of things you
can do (if you know how) as a kind of addition to chapter one.
Chapter four seems to make the same commitment, but the most telling
statement is the first of the "Understanding the Internet in 10 Easy
Steps" at the end: "You do not need to know how the Internet works
behind the scenes in order to use it."  There is a minor exposition on
the hierarchical naming convention of the Domain Name Service (DNS),
but that is about it.

Chapter five talks about getting connected to the net, but only really
says to buy the right (unspecified) hardware and the right
(unspecified) service.  The actual connection is left as an exercise
to the reader.  (There is a list of Web sites of national service
providers that can be very helpful--if you are already on the net and
don't need it.)  The Web, email, and news are introduced in chapter
six--but only barely.  I am glad to see that the issue of etiquette
gets some space in regard to email and news, although the points are
brief and relatively simple, and mailing list etiquette is not dealt
with at all.  Searching the Web is generally covered very badly in
most books: Carroll and Broadhead at least note the difference between
directories and search engines in chapter seven.  Building a Web site
is a serious undertaking, and chapter eight's coverage only scratches
the surface.  Chapter nine concludes with a quick precis of the book,
and yet another iteration of chapter one (a few more things you can do
on the net).

Even as a quick starting guide to the net, this book does not have
anywhere near the basic information of, say, "Zen and the Art of the
Internet" (cf. BKZENINT.RVW), let alone the depth of understanding
that the slightly longer "Internet Book" (cf. BKINTBOK.RVW) is able to
provide.  As for Canadian material, while there are a number of
Canadian sites listed by way of example, the CRTC might have
difficulty in allowing this as CanCon.

I did not want to mention the self-promotional tone of the book, since
to do so is to sail dangerously close to making an ad hominem attack.
However, the fact that the book opens with eight pages of advertising
for the authors, and closes with seven more, is one of the lesser
examples.  The stream of overinflated quotes of congratulatory hype
(with no apparent relation to the topic at hand) and claims to
specialist expertise seemingly solely on the basis that one is famous
is extremely annoying, and, well, not very Canadian.

copyright Robert M. Slade, 1999   BKCAINUH.RVW   990123

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Wed, 24 Feb 1999 08:34:09 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 2--REVIEW: "Implementing Elliptic Curve Cryptography", Michael Rosi

BKIMPECC.RVW   990115

"Implementing Elliptic Curve Cryptography", Michael Rosing, 1999,
1-884777-69-4, U$47.95/C$67.95
%A   Michael Rosing cryptech@mcs.com
%C   32 Lafayette Place, Greenwich, CT   06830
%D   1999
%G   1-884777-69-4
%I   Manning Publications Co.
%O   U$47.95/C$67.95 hetr@manning.com 516-887-9747
%P   313 p.
%T   "Implementing Elliptic Curve Cryptography"

Modern asymmetric (or "public") key cryptography uses mathematical
operations that are fairly easy to do in one direction, but extremely
hard to do in reverse.  The standard example used (indeed, the one
that is almost synonymous with public key encryption) is that of
factoring.  Given two large prime numbers, it is a straightforward
task to multiply them together and find the resulting multiplicand.
However, given a large number that is a product of two large prime
factors, it is extremely difficult to find those two primes.

Elliptic curves have a similar property.  A characteristic of an
elliptic curve is that any two points on the curve can be "added," and
the resulting point will also be on the curve.  However, it is
difficult, given only the final point, to find the original two that
were added.  Thus, this attribute can be used as the basis of an
asymmetric encryption system.

Rosing doesn't get around to explaining what an elliptic curve is
until chapter five, so you have to take a fair amount on faith.  In
spite of the comments in the first few pages of the book promoting the
advantages of understanding the fundamentals, it is quite easy to
believe that the text was written to explain some sample code, since
there is far more emphasis on dealing with carry bits than there is in
the background explanations.  He starts in chapter one by talking
about exponential curves (as in, a good crypto system is one where the
work done to encrypt a message grows more slowly than the work
required to crack it) and the enormous magnitude of address spaces.
Chapter two doesn't really deal with number theory until halfway
through, concentrating on coding for arithmetic with large integers,
and rushing through conceptual explanations in order to get into yet
more programming.  Polynomials are introduced in chapter three, but,
again, I couldn't say that the subject is really covered.  At one
point a new term, undefined, is introduced.  The comment, "If you
don't know what that means, just remember that it works!" is not
terribly helpful when we have no idea what it works for.  Normal basis
is given a mathematical definition, but almost no explanation, in
chapter four.  The explanation of elliptic curves, in chapter five, is
much better, but, relying as it does on some understanding of
polynomial and normal basis, still leaves a lot to be desired.

It is interesting to note, in chapter six, that the basics of
cryptology is treated every bit as cavalierly as the math.  The
explanation of public key cryptography is extremely terse, and, in
fact, contains several minor errors.  Chapter seven looks at some
practical building blocks like random number generation and
"handshaking" protocols.  The elliptic curve encryption scheme and
IEEE P1363 standard mask and hash functions are reviewed in chapter
eight.  Chapters nine and ten discuss advanced topics in key exchange
and digital signatures respectively.  Fine details for performance
enhancement in specific sections of code are covered in chapter
eleven.  A sample analysis and design is given in chapter twelve.

Now, granted, Rosing's purpose is engineering and implementation and
not math tutorials.  And, to be fair, he does provide information on a
number of points of programming not often dealt with in the more
academic texts.  However, as he points out, you cannot simply use the
sample code in the book and expect it to work in all cases and for all
purposes.  Therefore, if the programmer does not understand, to some
extent, how the system works, the eventual system may have flaws and
weaknesses.  However helpful the programming pointers handed out in
every chapter, design must be based on concepts, and these are very
poorly provided.  If, on the other hand, you learned UNIX by studying
the source code, you might do reasonably well with this book.

copyright Robert M. Slade, 1999   BKIMPECC.RVW   990115

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Tue, 9 Mar 1999 08:31:48 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 3--REVIEW: "Field Guide to Microsoft Windows 95", Stephen L. Nelson

BKFGWN95.RVW   990129

"Field Guide to Microsoft Windows 95", Stephen L. Nelson, 1995,
1-55615-675-8, U$9.95/C$12.95/UK#9.49
%A   Stephen L. Nelson
%C   1 Microsoft Way, Redmond, WA   98052-6399
%D   1995
%G   1-55615-675-8
%I   Microsoft Press
%O   U$9.95/C$12.95/UK#9.49 800-MSPRESS fax: 206-936-7329
%P   187 p.
%S   Field Guide
%T   "Field Guide to Microsoft Windows 95"

The title suggests a type of quick reference, along the lines of what
bug have we found now?  Ah, it's not a bug at all, but a Red-Faced
Coronary Inducing Feature!  However, of course, what we really want in
the computer world is fast access to straightforward directions on how
to accomplish what we need to get done.

The first of four sections in the book, called "Environment," gives a
quick introduction to Windows operations.  The graphical arrangement
of the book is quite appropriate for the Windows interface, but the
material misses a lot of areas that may be new to users, such as
clicking, dragging, and other "commands."  There are also some
misleading items, such as the statement that applications run until
stopped (some terminate by themselves).

Part two is the largest, an alphabetic listing of commands, programs,
and terms.  The "applets" of Win95, such as the calculator, backup,
and Paint, have enough explanation to get started with.  Terminology
is not always crystal clear, such as the assertion that folders have
"replaced" directories.  (It might now be evident that folders *are*
directories, by any other name.)  When looking for functions, there is
a listing for starting programs, but nothing under "stop" or "quit."
(You have to know that MS calls this "exiting.")  Also, I really don't
now that novices need to know that the technology Windows uses to cut
and paste stuff is called OLE (Object Linking and Embedding).

Part three calls itself "Troubleshooting," but most of the entries
deal with commonly used functions.  Useful, yes, but the book might
have been strengthened by including these tips in appropriate areas of
the reference in part two.  Of the listings that do deal with problem
issues, I am not sure that I would rely on them.

Part four is a reference to the menu items under the Start Menu,
Windows Explorer, and the Printer Folder.

When compared with a book like Nelson's "The Little Windows 95 Book"
(cf. BKLTLW95.RVW) this text has serious shortcomings.  However, it
can probably stand with any other of the Windows 95 introductions.

copyright Robert M. Slade, 1999   BKFGWN95.RVW   990129

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
As American as apple pie.
As Canadian as possible under the circumstances. - E. Heather Scott
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Thu, 25 Feb 1999 08:23:28 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 4--REVIEW: "Starswarm", Jerry Pournelle

BKSTRSWM.RVW    990110

"Starswarm", Jerry Pournelle, 1998, 0-312-86183-4, U$23.95/C$33.95
%A   Jerry Pournelle
%C   175 Fifth Avenue, New York, NY  10010
%D   1998
%G   0-312-86183-4
%I   Tor Books/Tom Doherty Assoc.
%O   U$23.95/C$33.95 pnh@tor.com www.tor.com
%P   349 p.
%T   "Starswarm"

"Starswarm" is a book of juvenile science fiction.  As can be
expected, the plotting is fairly simplistic, the ending abrupt, and
the characterizations pretty much glossed over.  However, in the
introduction, Pournelle notes, and attributes to Robert Heinlein, the
idea that in juvenile fiction one can do more teaching than in adult
fiction.

The book postulates an ecology based around, and run by, intelligent
entities formed of aggregate creatures.  An interesting means of
communication is proposed between individual creatures.  (It makes
sense in the case of those confined to lakes, but less so in the case
of ocean based forms of the same ... species?)  Environmentalism is a
weak subsidiary theme.  Some explanation of the complexity of
ecological interactions is given, but a number of opportunities for
fuller development are abandoned.

Most of the plot turns on the existence of an artificially intelligent
program, and on communications.  In these areas, the book is extremely
weak.

First there is data security.  The AI program has presumably been
designed by a very able computer scientist.  However, once running, it
manages to evade detection for at least ten years.  True, it is hiding
in plain sight, as it were, masquerading as a virus protection
program.  (You don't update your antiviral in more than ten years?)
Then again, having successfully hidden for ten years, the first time
anyone suspects something is wrong, the program is identified almost
instantly.  There is a backup on earth, but in ten years the program
has not managed either to penetrate security monitors (which it must
have had access to at a fairly high level originally) not copied
itself to other local machines as a backup or for greater protection
against detection.

Ultimately the detection is made because of a single transmission,
picked out of what have to be an enormous number.  While this
detection is improbable in itself, there is no recognition of
differences in bandwidth that could have allowed the transmission to
be made with almost no chance of detection at all.

Dealing with the alien entities is also problematic.  While the
entities have been under intense scrutiny for more than ten years, a
chance observation of flashing lights not only reveals their nature,
but also provides a translation of their language, all in one go.  The
aliens themselves are phenomenally intelligent, being able to dissect
an object to the molecular level, understand its purpose, and
replicate an improved version within hours.

As everyone reading this series knows, it is unrealistic to expect
technical accuracy from fictional works, let alone juvenile fiction.
However, it seems that Heinlein and Pournelle's thesis is equally
divorced from reality.

copyright Robert M. Slade, 1999   BKSTRSWM.RVW    990110

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Date: Fri, 26 Feb 1999 07:58:40 -0800
Subject: File 5--REVIEW: "Poser's Guide to the Internet and World Wide Web", Jame

BKPSRSGD.RVW   990126

"Poser's Guide to the Internet and World Wide Web", James Gaskin,
1998, 0-9665370-3-3, U$9.95/C$12.95
%A   James Gaskin author@posersguide.com
%C   3817 Yellowstone, Irving, TX   75062
%D   1998
%G   0-9665370-3-3
%I   Ruby Moon Press
%O   U$9.95/C$12.95 rubybooks@aol.com
%P   111 p.
%T   "Poser's Guide to the Internet and World Wide Web"

The computer world spawns more "instant experts" than any other field
of human endeavour with the possible exception of child-rearing, and
most such posers are intensely irritating to those who do know what's
going on.  So why do I applaud Gaskin's reference work for them?

For one thing, as the title would suggest, it's funny.  Mostly the
rolling eyes muttering "how true, how true" variety of funny, but very
funny nonetheless.

To go further, I have to explain the book.  This volume is actually a
dictionary.  A dictionary is funny?  Yes, when each definition (one to
a page) is defined, in turn, by a guru, a "cheerleader," and a cynic.
(These "experts" have been graphically personified by Randy Jones, and
I was please to see, however briefly, the return of Karl's
konsultees.)  The guru, as the front cover states, gives you the facts
that are nice, but rarely helpful.  For the cheerleader, the net and
all its works are wonderful.  But it is the cynics who tell you what
these bits of technobabble and manajargon mean.  Gaskin casts and
informed, and generally jaundiced, eye on the technical "hot buttons"
of the day.  In fact, while there is a lot of fun in the text, there
is a lot of information as well, and you *can* learn a lot very
quickly, if you want to be a poser.  In fact, I can think of a lot of
executives who I wish would spend about an hour with this volume.

copyright Robert M. Slade, 1999   BKPSRSGD.RVW   990126

------------------------------

Date: Wed, 3 Mar 1999 10:12:58 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 6--REVIEW: "The Race for Bandwidth", Cary Lu

BKRFBUDT.RVW   990131

"The Race for Bandwidth", Cary Lu, 1998, 1-57231-513-X,
U$19.99/C$26.99/UK#18.49
%A   Cary Lu
%C   1 Microsoft Way, Redmond, WA   98052-6399
%D   1998
%G   1-57231-513-X
%I   Microsoft Press
%O   U$19.99/C$26.99/UK#18.49 800-MSPRESS (6777377) fax: 206-936-7329
%P   199 p.
%T   "The Race for Bandwidth: Understanding Data Transmission"

There is no statement of purpose or audience for this book, which
makes a critique of it somewhat difficult.

Chapter one provides a somewhat-simpler-than-layman's level
explanation of bandwidth as a measure of information transmission.
There is a scanty overview of the range of bandwidth requirements for
different technologies, with a few mistakes (one comparison is off by
a factor of fifty).  However, there is also some social analysis of
what the increase in bandwidth availability means, that may be missing
from some purely technical discussions of the topic.  The history of
communications given in chapter two is simple, though probably
interesting to the neophyte.  There are still a number of minor
errors, such as the dates of the first inception of the Internet, and
the first fax transmission, that make other details sometimes suspect.
Various ways of looking at bandwidth, and the tradeoffs to be made
(with an interesting variation on "never underestimate the bandwidth
of a station wagon full of mag tapes") comprise chapter three.  There
is also a good discussion of analogue and digital information.  This
is extended in chapter four with some comparisons of analogue
bandwidths for various media, although it is unfortunate that the
comparisons are not fully carried over into the digital realm.  This
is the more untoward since chapters five and six move into specifics
of the audio and video standards for North America and Europe, and
quickly become more technical than the prior background really
supports.  (It is also unclear what the point of these two chapter
is.)  The same holds true for chapter seven, which looks at the Public
Switched Telephone Network (PSTN), cellular, and modem technologies,
as opposed to the broadcast concentrations in five and six.  Chapter
eight reviews a number of very important aspects of packet data
networks such as the Internet, although, again, some of the
significance of the discussion will be lost on some readers because of
sections missing from the background information.  An afterword closes
out the book by noting that we will continue to want more bandwidth,
more will become available, and that not every piece of information
that we want is or will be available for transmission or access.

Clearly, this book is not suitable for professionals.  Too much is
missing for those who really have to make informed decisions.  For the
amateur, wanting to start to get a handle on communications
technology, the book holds much greater promise.  It does not get
bogged down in technical details, and it does stop to look at social
and political issues along the way.  While not always completely
reliable in its presentation of the technology, it is certainly
readable and entertaining.  For those wanting to get a "feel," rather
than a working knowledge, this is worth consideration.

copyright Robert M. Slade, 1999   BKRFBUDT.RVW   990131

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Tue, 23 Feb 1999 08:28:58 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 7--REVIEW: "1999 Canadian Internet New User's Handbook", Jim Carrol

BKCAINUH.RVW   990123

"1999 Canadian Internet New User's Handbook", Jim Carroll/Rick
Broadhead, 1998, 0-13-974957-8, C$16.95
%A   Jim Carroll jcarroll@jimcarroll.com www.jimcarroll.com
%A   Rick Broadhead rickb@sympatico.ca www.rickbroadhead.com
%C   Scarborough, Ontario
%D   1998
%G   0-13-974957-8
%I   Prentice Hall Canada
%O   C$16.95 800-576-3800 416-293-3621 www.phcanada.com
%P   246 p.
%T   "1999 Canadian Internet New User's Handbook"

As rabidly and chauvinistically patriotic as I am, I find it difficult
to recommend this book.

Chapter one is basically a sales pitch for the net, although, at the
same time, it suggests that media hype has distorted perceptions of
the Internet.  The material does not address specific deceptions but
does mention a few minor examples of how the net can be used.  The
obligatory list of Web sites is given in chapter two.  Rather oddly,
the specific URLs (Uniform Resource Locators) are not given in the
individual writeups (and, in one case, seem to have been deliberately
expunged from screen shots) although they are collected at the end of
the chapter.  Some items that *do* have their URLs included are the
tips, but a number of those in this chapter are not Canadian.  Despite
the promise of the title, there is no real explanation of the net in
chapter three, which simply contains a few more examples of things you
can do (if you know how) as a kind of addition to chapter one.
Chapter four seems to make the same commitment, but the most telling
statement is the first of the "Understanding the Internet in 10 Easy
Steps" at the end: "You do not need to know how the Internet works
behind the scenes in order to use it."  There is a minor exposition on
the hierarchical naming convention of the Domain Name Service (DNS),
but that is about it.

Chapter five talks about getting connected to the net, but only really
says to buy the right (unspecified) hardware and the right
(unspecified) service.  The actual connection is left as an exercise
to the reader.  (There is a list of Web sites of national service
providers that can be very helpful--if you are already on the net and
don't need it.)  The Web, email, and news are introduced in chapter
six--but only barely.  I am glad to see that the issue of etiquette
gets some space in regard to email and news, although the points are
brief and relatively simple, and mailing list etiquette is not dealt
with at all.  Searching the Web is generally covered very badly in
most books: Carroll and Broadhead at least note the difference between
directories and search engines in chapter seven.  Building a Web site
is a serious undertaking, and chapter eight's coverage only scratches
the surface.  Chapter nine concludes with a quick precis of the book,
and yet another iteration of chapter one (a few more things you can do
on the net).

Even as a quick starting guide to the net, this book does not have
anywhere near the basic information of, say, "Zen and the Art of the
Internet" (cf. BKZENINT.RVW), let alone the depth of understanding
that the slightly longer "Internet Book" (cf. BKINTBOK.RVW) is able to
provide.  As for Canadian material, while there are a number of
Canadian sites listed by way of example, the CRTC might have
difficulty in allowing this as CanCon.

I did not want to mention the self-promotional tone of the book, since
to do so is to sail dangerously close to making an ad hominem attack.
However, the fact that the book opens with eight pages of advertising
for the authors, and closes with seven more, is one of the lesser
examples.  The stream of overinflated quotes of congratulatory hype
(with no apparent relation to the topic at hand) and claims to
specialist expertise seemingly solely on the basis that one is famous
is extremely annoying, and, well, not very Canadian.

copyright Robert M. Slade, 1999   BKCAINUH.RVW   990123

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Mon, 8 Mar 1999 08:40:23 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 8--REVIEW: "How to Get a College Degree Via the Internet", Sam Atie

BKHGCDVI.RVW   990129

"How to Get a College Degree Via the Internet", Sam Atieh, 1998,
0-7615-1370-1, U$16.00/C$21.95
%A   Sam Atieh saleh@ccp.com
%C   3875 Atherton Road, Rocklin, CA   95765-3716
%D   1998
%G   0-7615-1370-1
%I   Prima Publishing
%O   U$16.00/C$21.95 800-632-8676 916-632-4400 fax: 916-632-1232
%P   204 p.
%T   "How to Get a College Degree Via the Internet"

At about the same time that the author was looking for a distance
education program I was running a rather oddball experiment in
networked training delivery and researching what else was going on, so
I was interested to see something of how the field had developed.
This book didn't tell me much.

Part one is a set of very short, and mostly uninformative chapters.
Chapter one presents the selling points of online education: the high
direct costs of traditional education, plus the indirect costs that
are a barrier to those already engaged in life and not willing to go
back to student life.  Distance education has existed, and the
Internet exists, we are told by chapter two, and when the two meet,
something wonderful happens.  (There are a lot of generalities, and
not many details.)  A very short set of questions and answers,
intended to determine whether you are the type of person to benefit
from online education, is given in chapter three.  Not only is the
material exceedingly terse, but I began to become more distinctly
aware of a factor that had been bothering me from the beginning of the
book: there was a lot of emphasis on the career, and specifically
monetary, value of an online diploma or degree, but almost no
discussion of educational values themselves.  Chapter four runs
through a generic "what you need to get online" list, but very
quickly.  Most of the entries are sketchy in the extreme, a few are
helpful, and some, like the recommendation to have a dress code for
"class" and a few of the software suggestions, are a little odd.  The
advice for choosing a school, in chapter five, is fairly standard, but
some pointers for non-US students checking on American accreditation
is helpful.  Common application and prerequisite requirements are
listed, along with useful contacts for standard placement exams, are
mentioned in chapter six.  Chapter seven briefly looks at financial
matters such as scholarships and student loans.  A few informational
URLs (Uniform Resource Locators) are given in chapter eight.  The
advice to foreign students, in chapter nine, is basically a high speed
rehash of the prior content.  Chapter ten discusses online job
searching, mostly in terms of creating your own Web page and using
generic search engines.

Part two has most of the value of the book.  Seventy two institutions
are listed, with some brief description, online and postal contact
information, and a short description of offerings.  Most are from the
US, one from the UK, and two from Canada.  I know that the listings
are not complete, since two universities, at least one community
college, a special educational agency, and a theological school run
distance programs in my locale alone, none of which are listed.  I had
a quick look at the doctoral programs, and noted two that might merit
further research, so the pickings, as the author tacitly admits in the
introduction, are a little thin.

For those interested in getting a degree via the net, the inexpensive
price would probably repay the buyer in terms or time saved finding
programs.  (On the other hand, a decent Web search might do the same
thing, and possibly with more complete coverage.)  The initial
chapters may help some, but don't contain enough information for most
of those interested in getting online and researching the
possibilities.

copyright Robert M. Slade, 1999   BKHGCDVI.RVW   990129

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
Find virus, book info http://victoria.tc.ca/techrev/rms.htm
        Mirrored at http://sun.soci.niu.edu/~rslade/rms.htm
        Linked to bookstore at http://www97.pair.com/robslade/
Comp Sec Weekly: http://www.suite101.com/welcome.cfm/computer_security
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Thu, 11 Mar 1999 08:29:36 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" 
Subject: File 9--REVIEW: "Public Access to the Internet", Brian Kahin/James Kelle

BKPBACIN.RVW   990207

"Public Access to the Internet", Brian Kahin/James Keller, 1995,
0-262-61118-X, U$20.00
%E   Brian Kahin kahin@harvard.edu
%E   James Keller keller@ksgrsch.harvard.edu
%C   55 Hayward Street, Cambridge, MA   02142-1399
%D   1995
%G   0-262-61118-X
%I   MIT Press
%O   U$20.00 800-356-0343 fax: 617-625-6660 www-mitpress.mit.edu
%P   390 p.
%T   "Public Access to the Internet"

Perhaps not quite addressing the current discussion of "public
access," with it's heavy emphasis on subsidized access for the poor
and those in rural communities, the papers in this book were written
at a time of initial reaction to the commercialization of what had, up
until then, been primarily an academic and research network.

The first part looks at the US public access agenda of the day.  Brian
Kahin's paper starts off by noting that the National Information
Infrastructure plans misunderstood the nature of the value of the
Internet by seeing it as some kind of inexpensive carrier, when it
was, instead, the access to information that was of value, in the
model of the public library.  The tension between commercial and
public access interests is noted by Lewis Branscomb, with the poignant
metaphor of television pointing to past failures.  A number of public
access issues are raised, but not addressed in detail, by James
Keller.

Sociology and culture are unfortunately not dealt with well in part
two.  The WELL is an interesting success in online history, but Cliff
Figallo's paper does not relate closely to public access overall.  (As
only one example, the essay cites numerous cases where direct public
meetings with participants helped resolve problems.)  Sproul and Faraj
try to look at the social technology of the net but do not present any
significant findings.

Part three tries to look at the establishment of network communities.
Beverly Hunter presents a lot of educational theory, a few limited
anecdotes, and not much relation to public access.  Using Big Sky
Telegraph as an example, Frank Odasz makes a good case for low cost,
efficient, BBS based community networking models of public access, and
presents one of the high points in the book.  George Baldwin's look at
public access for Native Americans is unfocussed.  A look at the
provision of service through libraries, by Carol Henderson and
Frederick King, is anecdotal and lacks analysis.

Part four discusses new classes of users.  Richard Civille uses
statistics to show that the gap between rich and poor is widening, and
infers that the poor will be increasingly disadvantaged, but cannot
either strongly support his position or articulate remedial actions.
A list of what people "want" from Internet access is Daniel Dern's
contribution.  Miles Fidelman looks briefly at various technologies
for "local loop" access.  Although it purports to look at
architectural and policy implications of the variety of new users on
the net, Terrence McGarty and Carole Haywood produce only a confused
overview of telecommunications uses.

The final section deals with pricing and service.  Jeffrey MacKie-
Mason and Hal Varian use tables of prices and graphs and economic
formulae to support a middle of the road non-recommendation that
everyone be involved.  Scott Shenker at least provides one new factor,
quality of service, for his limited proposal.  A telephone network
model is the basis of Michael Einhorn's paper.  Hans-Werner Braun and
Kimberley Claffy call for more study and data.

What is most disappointing is to see how little progress has been made
in the past four years.

copyright Robert M. Slade, 1999   BKPBACIN.RVW   990207

======================
rslade@vcn.bc.ca  rslade@sprint.ca  robertslade@usa.net  p1@canada.com
 Freebie Mags:   http://victoria.tc.ca/techrev/magazine.htm
Robert Slade's Guide to Computer Viruses, 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators 
Subject: File 10--Cu Digest Header Info (unchanged since 10 Jan, 1999)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

CuD is readily accessible from the Net:
  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #11.17
************************************

<--">Return to the Cu Digest homepage

Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu