Computer underground Digest Sun Mar 28 1999 Volume 11 : Issue 19

Computer underground Digest    Sun  28 Mar, 1999   Volume 11 : Issue 19
                           ISSN  1004-042X

       Editor: Jim Thomas (
       News Editor: Gordon Meyer (
       Archivist: Brendan Kehoe
       Sloppy Editor:   Etaion Shrdlu, III.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage:

CONTENTS, #11.19 (Sun, 28 Mar, 1999)

File 1--Warning: Free Computer Scam (Telecom Digest reprint)
File 2--Hacking Legend's Sign-Off (LA Times Excerpt)
File 3--UK ISP found liable for defamation
File 4--Worker Convicted for Violent E-mail
File 5--Internet-related bills before the Texas state legislature
File 6--61-page report on Utah school Internet censorship
File 7--Please Register for Spring ISPCON Now!!!
File 8--Cu Digest Header Info (unchanged since 10 Jan, 1999)



Date: Fri, 26 Mar 99 13:05 CST
From: TELECOM Digest Editor 
Subject: 1--Warning: Free Computer Scam (Telecom Digest reprint)

((MODERATORS' NOTE:  For those not familiar with Pat Townson's
TELECOM DIGEST, it's an exceptional resource.  From the header
of TcD:
   "TELECOM Digest is an electronic journal devoted mostly but
   not exclusively to telecommunications topics.  It is
   circulated anywhere there is email, in addition to various
   telecom forums on a variety of public service systems and
   networks including Compuserve and America On Line. It is also
   gatewayed to Usenet where it appears as the moderated
   newsgroup 'comp.dcom.telecom'. Subscriptions are available to
   qualified organizations and individual readers. Write and tell
   us how you qualify:
                    * * ======"  ))

Source - TELECOM Digest     Thu, 25 Mar 99    Volume 19  - Issue 38
Editor - Patrick A. Townson

By now many folks have seen the latest variation on 'Make Money Fast',
the one about a free computer if you go to website xxx and 'register'.
A further variation says, 'what is better than getting a computer for
free? Owning the web site where the free computers are given out ...'

That in itself isn't news. Nothing much here suprises netizens any
longer, at least not those who have been around since before that
invention of the devil called the World Wide Web and the massive
takeover of net resources by commercial entities to the detriment of
the rest of us.

But while most spam is just intended for petty larcency, some of it
gets a bit more involved, and even sounds like it is coming from a
real company and not just some two-bit con-artist with a computer
and his own domain name set up somewhere. Today I have such a case
for your consideration. **Please post this in all newsgroups and
mailing lists where apropriate, because reasonably intelligent people
are falling for it.**

This time, the guy is not spamming; he is sending out press releases
using the legitimate company name and people who read the 'press
release' respond to him or his web site so they can get fleeced.

Meet Johnnie Collie, of Muskegan, Michigan.

Mr. Collie is using the name 'National Research, Inc'. Never mind that
there is a *legitimate* research company in Michigan known as National
Research Corporation, which is registered with the state. Mr. Collie
is neither involved with that legimate firm, nor had they ever heard
of him. He does not have a DBA ('doing business as') license registered
for National Research. But I guess it always helps to have a legitimate
company name behind you if you want to want to scam people. When I
talked to Mr. Collie today, he told me the company was registered 'in
another state' but he did not seem to know or want to say where.

In this case, the scheme goes like this: to avoid complaints of
spamming, put out press releases to the internet news services like
Yahoo and others announcing that your research company has been
employed by a national manufacturer of computer hardware to poll the
public about its uses of computers. Toss in the name 'Packard Bell' or
"Hewlitt Packard' for good measure.  Let the internet news services
and the search engines do your spamming for you ...   ... now
when someone sees your press release on their Yahoo ticker they click
to read the article and are given your email address for details, in
this case ...

A letter of inquiry to that email address gets back a note saying 'go
to our web page and register for the program' ... and the web page
address is   ... there we find the deal
to be thus: sign up for a totally free computer and monitor, the works.
Fill out an online questionairre about how yourself and how you plan
to use the computer. Agree to fill out a more detailed questionairre
on the same subjects a year from now.

This project is being backed by National Research, Inc,  therefore it
has to be legit, right?  There is just one catch: to avoid simple
curiosity seekers, people looking for something for nothing, people
who defraud the company, etc ... there is a one-time registration
fee of twenty dollars to participate. This fee, we are told, covers
all the expenses of the polling, the distribution, etc. It goes to
show that you are acting in good faith and not just a con-artist out
to get a free computer.

So fill out your form, give them your VISA number, then sit back and
wait for your computer to arrive ... and keep on waiting, and waiting
and waiting.

The address given for the 'company' was 845 Allen Avenue in Muskegon,
Michigan. I traced that back to being in a strictly residential
neighborhood, and the residence of one 'Johnny Collie'.
shows it as 'A Collie' with three phone numbers given:

            A Collie
            845 Allen Avenue
            Muskegon, MI 49442
            Phones: 616-773-7878  773-7985  777-7515

The first number is answered personally; the second number goes to an
answering machine which answers 'National Research'.  I asked to speak
with Johnny, and the man who answered said that was himself. I asked
him when might the free computer be expected to arrive.

      "On the web I never said it would be coming right away.
       We are going to wait until we have the twelve thousand
       replies we wish to receive, then all computers will be
       shipped at one time."

Oh, you mean no shipments until you have received twelve thousand
'processing fees' at twenty dollars each? How long might that take?

      "Well we just put our notice up this week ...

Baloney. I have seen a variation on this a couple months ago that
someone else mentioned, but anyway ....

      "We are having some trouble getting this totally together,
       it might be several months to a year before we have all
       the names accumulated."

I told Johnny I had already talked to National Research Corporation
and they knew nothing about this at all; had never even heard of
him. I told him they knew of him now, since I gave them all the data
I had on him including copies of his postings, etc. That's when he
told me they were from out of state.

Already having done a DNS lookup and other stuff on
I asked Johnny where he got his ISP service, and who handled his
domain name. He acted totally ignorant, claiming that all he knew how
to do was turn a computer on and off, nothing much else. I asked him
if he 'knew anything about a company called America On Line' and he
said yeah, that was where he called in when he used his computer. I
asked him who was his credit card processor; again he acted ignorant
and said it 'is some outside service, you would have to ask the
programmer who did my web page'.

I asked to speak to that person, but of course he was not around
and his name was not known.

Using the 'Sam Spade' utility for Windows, we find a DNS record
which shows as follows for

     Administrative contact: J. Collie

     Technical contact:

Note that the site name does NOT have a 'dot' between www and nexus
as in -- that is incorrect. The name is wwwnexus, and
apparently no connection to the Nexus Corporation in Connecticut.
 From what I could tell, is in Ohio somewhere.

Johnny gets his credit card service from and
he seemed very surprised that I was able to find that out. I told
him if you do a raw dump of his web page, just look and see where
the forms data sends its output,


Whispering sweetly in the phone, I told Johnny the first thing I
wanted him to do was reverse that credit card transaction for me
which I had used in this experiment. I had already sent a note to and 'abuse' at the same site telling
them to void the transaction, and giving them the reference numbers.

I also sent a note to webmaster and asking them
to review their relationship with Johnny Collie for possible
violations of their rules. And of course, for the little good it
did   I also sent a note to TOS at America On Line,
suggesting it might be worthwhile to review their subscriber's
screen name tccollie for possible violations.

I mention this today only to remind readers that some scams on the
net are far more sophisticated than others. Very few of us spend
five seconds reading or considering all the chain letters and make
money fast items we get each day. It being spam, we automatically
reject it for having no value. But when it appears in a respected
news source such as Yahoo, and carries the name of a legitimate
company -- although not actually from that company -- then we might
tend to read the item and act on it.

       MUSKEGON, MI 49442   616-773-7878  773-7985  777-7515.

And consider pressuring organizations such as
and who accept clients such as this. All
it does is besmirch their own reputation on the net as safe
places to be.


Patrick Townson
Telecom Digest


Date: Sat, 20 Mar 1999 11:18:22 -0600 (CST)
From: Jim Thomas 
Subject: 2--Hacking Legend's Sign-Off (LA Times Excerpt)


Thursday, March 18, 1999

Hacking Legend's Sign-Off
Kevin Mitnick plagued the world of computers for two decades and led
the FBI on a two-year-long chase. Now his saga is about to end.
By GREG MILLER, Times Staff Writer

Four years after FBI agents burst into a North Carolina apartment
and captured the nation's most notorious computer hacker, the
saga of the man they hunted down--Kevin David Mitnick--seems
finally to be nearing a conclusion.

     Mitnick and federal prosecutors signed a plea agreement this
week that sources said will keep the accused hacker in prison for
roughly one more year.

     In addition, Mitnick will likely be barred from ever
profiting from his story, and restricted from so much as touching
a computer for at least three years after his eventual release.

     The agreement, which still requires the approval of a
federal judge and comes just weeks before his trial was to begin,
brings the curtain down on an era.

     More than even Mitnick seems able to comprehend, he has come
to personify both the golden age of hacking and the intense
public paranoia that accompanied the dawn of the personal
computer revolution. Mitnick's heyday as a hacker is over, but he
remains the ultimate digital boogeyman.

     "The Mitnick case is the last vestige of hacker hysteria
from the late 1980s and early 1990s," said Mike Godwin, longtime
general counsel for the Electronic Frontier Foundation, an
Internet civil liberties group.

     "It's not that there won't be more hackers. It's just that
cops and the media have moved on. They're more worried about
gambling and porn sites and domain name registrations. But
Mitnick was demonized in that era, and there's still a lot of
people who want to take a piece of him."


Date: Sun, 28 Mar 1999 12:34:40 -0600 (CST)
From: Jim Thomas 
Subject: 3--UK ISP found liable for defamation


                 Cyber-Rights & Cyber-Liberties (UK) Logo

                               PRESS RELEASES

   For Immediate Release - 26 March, 1999

   CR&CL (UK) Press Release - UK ISP found liable for defamation

   LEEDS - This morning Cyber-Rights & Cyber-Liberties (UK) criticised a
   High Court ruling involving liability for defamatory statements made
   by a third party against Demon Internet.

   Demon Internet, a major UK ISP is more likely to be found liable for
   defamation in a case against Dr. Laurence Godfrey, a London-based
   nuclear physicist. Demon will appeal against today's pre-trial court
   ruling by Mr Justice Morland in London's High Court.

   According to a press release by Demon Internet, "the point of law
   being decided centres around whether Demon Internet, an Internet
   Service Provider, is responsible for the information that is posted to
   and made available from newsgroups that are held on Demon Internet's
   servers." It should also be noted that the case arises out of a
   posting made by an unknown individual in the US, and not by a Demon
   Internet customer.

   Cyber-Rights & Cyber-Liberties (UK) believes that this decision will
   have a profound effect on cyber-speech and UK ISPs will be forced to
   monitor and censor third party content going through their servers.
   The ruling, if not reversed on appeal would make Britain, a very
   hostile place for network development in the Information Age.

   Mr. Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK)
   stated that:

   "The decision will have a chilling effect over the Internet
   communications and will force the UK ISPs to take a pro-active role in
   relation to Internet content. This is most undesirable and
   unacceptable. The Defamation Act does not give adequate protection to
   the ISPs and unfortunately the ISPs remain as the `usual suspects'
   when civil claims through defamation suits are brought against them."

   "It is also totally unacceptable that an offended party should simply
   notify an Internet Service Provider claiming the information to be
   legally defamatory. The current state of the UK laws forces the ISPs
   to be the defendant, judge, and the jury at the same time. Notice
   should not be enough in such cases."

   Cyber-Rights & Cyber-Liberties (UK) will support Demon's case during
   the appeal process.

   Contact Information:

   Mr Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK)

   CR&CL (UK) gives oral evidence at the House of Commons

   09 March, 1999

   LONDON, House of Commons - Today Cyber-Rights & Cyber-Liberties (UK)
   told the HC Select Committee on Trade and Industry that "so far,
   privacy issues in relation to the use of strong encryption systems
   have never been properly reflected in the formulation of UK government
   policies." This silence is especially remarkable in the light of other
   governmental initiatives such as the Human Rights Act 1998 according
   to the oral evidence given by the Cyber-Rights & Cyber-Liberties (UK)

   Furthermore, the Cyber-Rights & Cyber-Liberties (UK) written
   submission stated that "the use of encryption should be prima facie
   respected and even encouraged. By contrast, the government approach
   should be criticised as being fixated on the value of encryption
   solely in connection with commerce and ignoring wider political and
   social uses of information technology which might legitimately require
   the use of encryption."

   "Without the "key recovery" capability, law enforcement agencies
   contend that they would be less able to protect the safety of the
   public, and this in itself would constitute an infringement of civil
   liberties. However, we believe that the solution to the problems of
   crime prevention and law enforcement do not lie with accessing private
   encryption keys. From our own research into recorded criminal uses of
   encryption, we have concluded that the use of encryption has not been
   a serious problem for crime detection or prevention. There is no more
   than speculation that it will be a problem in the future. In any
   event, it seems fanciful to expect that criminals will use
   government-mandated encryption systems with key recovery capabilities
   when alternative systems of encryption remain readily available.
   Government strategy would be naive if it assumed that criminals would
   use encryption tools which can be decrypted by the law enforcement

   The Cyber-Rights & Cyber-Liberties (UK) representatives will also
   bring a recently published Council of Europe Recommendation "for the
   Protection of Privacy on the Internet," (No R (99) 5 of the Committee
   of Ministers to Member States, to the attention of the
   Trade and Select Committee. These excellent guidelines are along the
   lines of CR&CL(UK)'s approach to individual privacy and drafting of a
   "privacy letter" from the users perspective.

   Mr Yaman Akdeniz, the Director of CR&CL(UK) stated that:

   "The enactment of the Human Rights Act 1998 within the UK is a major
   step towards a new era in which individual rights and liberties will
   be strongly respected and taken into account while government policies
   are fostered. We believe privacy is far the most important right which
   needs protection in the Information Age and it should be the duty of
   the government to protect such individual rights."

   Mr Nicholas Bohm, E-Commerce Policy Adviser to CR&CL(UK) stated that:

   "Recent Government announcements have shown that industry and privacy
   lobbies are working in the same direction. But the Select Committee
   has the chance to show that standing up for individual liberty and
   privacy in cyberspace is just as important as supporting commerce and

   Dr Brian Gladman, the Technology Policy Adviser to CR&CL(UK) stated

   ""Law Enforcement authorities need to overcome their fear of
   encryption and their desire for solutions that create more risks for
   society than they remove. Instead, they need to invest in the
   development of the expertise needed to remain effective in a future
   environment where cryptographic information protection will be the

   Professor Clive Walker, deputy director of CR&CL(UK) added:

   "In a democratic society, police powers must be open, workable and
   fair. These principles will not be achieved by dealings behind closed
   doors between the police and Internet Service Providers nor by future
   wide-ranging legal powers to access private correspondence. There is
   insufficient evidence that encryption is the computer equivalent of a
   sawn-off shotgun and that its users need to be potentially treated as
   if they were a virtual community of masked villains."

   Notes for the Editors

   This press release will be available at

   Memorandum by Cyber-Rights & Cyber-Liberties (UK) to the House of
   Commons Trade and Industry Committee on Electronic Commerce Inquiry,
   March 1999 is available through


Date: Sun, 21 Mar 1999 20:47:29 -0500
From: Matthew Gaylor 
Subject: 4--Worker Convicted for Violent E-mail

Source -

.c The Associated Press

LAREDO, Texas (AP) -- A postal worker who told a co-worker by
e-mail he might ``go postal'' and set off a ``shootout at the OK
Corral'' has been sentenced to 15 months in prison.

``People can no longer laugh off things like this from postal
workers,'' U.S. District Judge George Kazen said when he
sentenced John Murillo on Thursday.

Murillo, 48, was convicted in December of transporting a threat
across state lines. Although the e-mail was sent to a friend in
Laredo, prosecutors said the message passed through several

``They are trying everything to make me go postal,'' the message
read. ``This Mexican can only take so much. You kick a dog so
much and sooner or later that chain will snap. I have been very
patient with them but I am tired and making plans. ... Judgment
day will come. It will be a shootout at the OK Corral.''

William Espinoza, who received the message, turned it over to
postal inspectors. Espinoza testified he laughed when he read it.

Murillo and his attorney, public defender Juan R. Flores,
contended the case was about freedom of speech.

AP-NY-03-19-99 1842EST
Copyright 1999 The Associated Press.


From: "Bob Izenberg" 
Subject: 5--Internet-related bills before the Texas state legislature
Date: Sat, 20 Mar 1999 14:50:26 -0600

SB106 looks interesting...  Wonder if that beats the Washington State
penalties.  The inevitable kiddie porn bill might also pique your
interest.  Receive the stuff in the mail and it's a third degree felony.
Receive it on a computer, it's a second degree felony.



((CuD MODERATORS' NOTE: For those without a browser, here are
just a few examples of the 46 pieces of pending legislation
currently before the Texas Legislature.
How long will it be, we wonder, before somebody recodes HB 111 as

   76th Legislature
   Number of Bills: 46

HB 111    AUTHOR: Maxey
          Relating to exempting access to the internet from the sales tax.

HB 173    AUTHOR: Garcia
          03/23/99  H  Scheduled for public hearing on . . . .
          Relating to requiring a person in the business of
          selling personal computers to provide certain software
          with each personal computer

HB 944    AUTHOR: Craddick / et al.  SPONSOR:  03/03/99  H
          Internet access service from the sales tax.

HB 1115   AUTHOR: Hartnett SPONSOR:
          Relating to taxing the sale, use, or consumption of
          Internet access service.

HB 1264   AUTHOR: McClendon
          03/15/99  H  Left pending in committee
          Relating to broadcasting public meetings over the Internet.

HB 1657   AUTHOR: Maxey
          02/23/99  H  Referred to State Affairs
          Relating to electronic access to certain state agency

HB 1773   AUTHOR: Hamric
          03/01/99  H  Referred to Business & Industry
          Relating to unsolicited electronic mail; providing
          civil penalties.

HB 2392   AUTHOR: Goolsby
          03/10/99  H  Referred to Elections
          Relating to participation by counties in an electronic voting pilot
          project for military voters.

HB 2653   AUTHOR: Elkins
          03/23/99  H  Scheduled for public hearing on . . . .
          Relating to the law that applies to a contract made over the

HB 2834   AUTHOR: Turner, Sylvester
          03/15/99  H  Referred to State Affairs
          Relating to the listing of state agency Internet addresses in
          telephone directories.

HB 2835   AUTHOR: Turner, Sylvester
          03/15/99  H  Referred to State Affairs
          Relating to information that certain state agencies must post on
          the Internet.

HB 2837   AUTHOR: Turner, Sylvester
          03/15/99  H  Referred to Ways & Means
          Relating to requiring the comptroller of public
          accounts to post reports on the Internet.


Date: Tue, 23 Mar 1999 11:57:12 -0600
Subject: 6--61-page report on Utah school Internet censorship

The Censorware Project has published a 61-page report this morning at:

exposing the claims of "SmartFilter" blocking software to be misleading,
after a several-month legal battle to obtain information about the list of
sites blocked by the program.

The report describes censorship on the Utah Education Network (which
connects Utah public schools and libraries to the Internet) since the UEN
purchased and installed SmartFilter.  Michael Sims, who is also the
webmaster of, was the main author of the paper.  (I am one
of the four other volunteer members of the Censorware Project.)

Among sites that students have been banned from accessing were the Bible,
the United States Constitution, the Koran, and the Declaration of
Independence.  Even the Book of Mormon was banned -- on a school network
providing service exclusively to Utah!

The report is the culmination of a project that began several months ago,
when Michael Sims filed a request with the Utah Education Network (under
Utah's version of the Freedom of Information Act) for log files that would
show what sites students have been blocked from accessing since SmartFilter
was installed.  Although the UEN shortly thereafter destroyed the records
that Sims had requested, this action caught the attention of the State
Records Committee (destroying documents requested under a freedom of
information act is illegal), and when Sims made a second request for a new
set of log files, the UEN complied.  These log files were analyzed to find
out what sites were blocked by SmartFilter and how they were categorized.

SmartFilter manufacturer Secure Computing Ltd. originally claimed that
"sites are not added to our control list without first being viewed and
approved by our staff".  After the report was published this morning, a
company spokeswoman at least partially retracted that claim in a statement:
"Generally, we try to review every site."  Examples of banned sites were
found in the report, however, that left little doubt that SmartFilter had
misled customers.  One student's home page was blocked as a "Gambling" site
because his last name was Wager.  The official home page of the Offspring
home page was blocked as a "Criminal skills" site because of lyrics that
included phrases like "crack the code".  The full report includes literally
hundreds of more examples.  None of these errors would have been made by a
human reviewing each blocked site individually; the mistakes indicate that
a computer conducted the "review" of these pages and classified them
according to keywords that it found.

The report concluded with the question:
""When the Declaration of Independence is banned from the citizens of Saudi
Arabia, so that they won't get ideas, we call it culturally backward.  When
it's banned from our own public libraries by our own government, then what
do we call it?"

The full text of the project, and links to media coverage of the events
leading up to the project's publication, are at:
and the Censorware Project's press release is at:

Michael Sims can be reached at these numbers:
daytime: 212-620-3361
evening: 718-556-1002

There was also an early-morning article on the Web page of the Salt Lake
Tribune about the report:


Date: Wed, 24 Mar 1999 23:53:58 -0600
From: Robert Hoskins 
Subject: 7--Please Register for Spring ISPCON Now!!!

Here's a quick reminder to sign up for the Spring ISPCON '99 press
registration as soon as possible.  You only have 21 business days
left to register!! The show is being Baltimore, MD on April 26-29,
1999 at the Baltimore Convention Center. The press registration URL

If you haven't signed up because you're not familiar with the
Internet Service Provider Conference (ISPCON). You can learn more
about the show, the vendors, and the technology that will be on
display by pointing your web browser to:

To save you some time, here is a quick description:

ISPCON Spring '99 will gather thousands of Internet Service
Providers, CLECs, RBOCs, ITSPs, Cable Operators, and Web Hosting
companies for an intensely educational event focused on the
business of providing Internet services

ISPCON has gained a unique reputation for providing quality
educational sessions presented by industry leaders. These sessions
cover a wide range of topics and reflect the ever-evolving
technologies of delivering Internet access through cable, wireless,
satellite, xDSL technologies, and IP telephony.

In addition to providing the latest information on technology,
there are sessions covering business topics such as ISP exit
strategies, mergers, acquisitions, initial public offerings, and
how to value an ISP company. Please check back for session updates.

Audio tapes from the ISPCON conferences can be ordered from The
Resource Link at

If you're not interested in attending, please send us a "no" so we
can delete you from our potential Internet press list.

Best Regards,
Robert Hoskins
Press Coordinator ISPCON
Phone: 817-314-0362


Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators 
Subject: 8--Cu Digest Header Info (unchanged since 10 Jan, 1999)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup:

Or, to subscribe, send post with this in the "Subject:: line:

Send the message to:


The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
(NOTE: The address you unsub must correspond to your From: line)

The mailing list is automated, so no human lies at the other end.

CuD is readily accessible from the Net:
  UNITED STATES: ( in /pub/CuD/CuD
    Web-accessible from:
         ( in /pub/Publications/CuD/
         in /doc/EFF/Publications/CuD/
  EUROPE: in pub/cud/ (United Kingdom)

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.


End of Computer Underground Digest #11.19

<--">Return to the Cu Digest homepage

Page maintained by: Jim Thomas -