Computer underground Digest Sun 28 Mar, 1999 Volume 11 : Issue 19 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Sloppy Editor: Etaion Shrdlu, III. Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #11.19 (Sun, 28 Mar, 1999) File 1--Warning: Free Computer Scam (Telecom Digest reprint) File 2--Hacking Legend's Sign-Off (LA Times Excerpt) File 3--UK ISP found liable for defamation File 4--Worker Convicted for Violent E-mail File 5--Internet-related bills before the Texas state legislature File 6--61-page report on Utah school Internet censorship File 7--Please Register for Spring ISPCON Now!!! File 8--Cu Digest Header Info (unchanged since 10 Jan, 1999) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. TO UNSUB, SEE ADMINISTRAVIA IN CONCLUDING FILE --------------------------------------------------------------------- Date: Fri, 26 Mar 99 13:05 CST From: TELECOM Digest EditorSubject: 1--Warning: Free Computer Scam (Telecom Digest reprint) ((MODERATORS' NOTE: For those not familiar with Pat Townson's TELECOM DIGEST, it's an exceptional resource. From the header of TcD: "TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of public service systems and networks including Compuserve and America On Line. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. Subscriptions are available to qualified organizations and individual readers. Write and tell us how you qualify: * ptownson@massis.lcs.mit.edu * ======" )) ================== Source - TELECOM Digest Thu, 25 Mar 99 Volume 19 - Issue 38 Editor - Patrick A. Townson By now many folks have seen the latest variation on 'Make Money Fast', the one about a free computer if you go to website xxx and 'register'. A further variation says, 'what is better than getting a computer for free? Owning the web site where the free computers are given out ...' That in itself isn't news. Nothing much here suprises netizens any longer, at least not those who have been around since before that invention of the devil called the World Wide Web and the massive takeover of net resources by commercial entities to the detriment of the rest of us. But while most spam is just intended for petty larcency, some of it gets a bit more involved, and even sounds like it is coming from a real company and not just some two-bit con-artist with a computer and his own domain name set up somewhere. Today I have such a case for your consideration. **Please post this in all newsgroups and mailing lists where apropriate, because reasonably intelligent people are falling for it.** This time, the guy is not spamming; he is sending out press releases using the legitimate company name and people who read the 'press release' respond to him or his web site so they can get fleeced. Meet Johnnie Collie, of Muskegan, Michigan. Mr. Collie is using the name 'National Research, Inc'. Never mind that there is a *legitimate* research company in Michigan known as National Research Corporation, which is registered with the state. Mr. Collie is neither involved with that legimate firm, nor had they ever heard of him. He does not have a DBA ('doing business as') license registered for National Research. But I guess it always helps to have a legitimate company name behind you if you want to want to scam people. When I talked to Mr. Collie today, he told me the company was registered 'in another state' but he did not seem to know or want to say where. In this case, the scheme goes like this: to avoid complaints of spamming, put out press releases to the internet news services like Yahoo and others announcing that your research company has been employed by a national manufacturer of computer hardware to poll the public about its uses of computers. Toss in the name 'Packard Bell' or "Hewlitt Packard' for good measure. Let the internet news services and the search engines do your spamming for you ... ... now when someone sees your press release on their Yahoo ticker they click to read the article and are given your email address for details, in this case mailto:jccollie@aol.com ... A letter of inquiry to that email address gets back a note saying 'go to our web page and register for the program' ... and the web page address is http://www.getonefreepc.com ... there we find the deal to be thus: sign up for a totally free computer and monitor, the works. Fill out an online questionairre about how yourself and how you plan to use the computer. Agree to fill out a more detailed questionairre on the same subjects a year from now. This project is being backed by National Research, Inc, therefore it has to be legit, right? There is just one catch: to avoid simple curiosity seekers, people looking for something for nothing, people who defraud the company, etc ... there is a one-time registration fee of twenty dollars to participate. This fee, we are told, covers all the expenses of the polling, the distribution, etc. It goes to show that you are acting in good faith and not just a con-artist out to get a free computer. So fill out your form, give them your VISA number, then sit back and wait for your computer to arrive ... and keep on waiting, and waiting and waiting. The address given for the 'company' was 845 Allen Avenue in Muskegon, Michigan. I traced that back to being in a strictly residential neighborhood, and the residence of one 'Johnny Collie'. Switchboard.com shows it as 'A Collie' with three phone numbers given: A Collie 845 Allen Avenue Muskegon, MI 49442 Phones: 616-773-7878 773-7985 777-7515 The first number is answered personally; the second number goes to an answering machine which answers 'National Research'. I asked to speak with Johnny, and the man who answered said that was himself. I asked him when might the free computer be expected to arrive. "On the web I never said it would be coming right away. We are going to wait until we have the twelve thousand replies we wish to receive, then all computers will be shipped at one time." Oh, you mean no shipments until you have received twelve thousand 'processing fees' at twenty dollars each? How long might that take? "Well we just put our notice up this week ... Baloney. I have seen a variation on this a couple months ago that someone else mentioned, but anyway .... "We are having some trouble getting this totally together, it might be several months to a year before we have all the names accumulated." I told Johnny I had already talked to National Research Corporation and they knew nothing about this at all; had never even heard of him. I told him they knew of him now, since I gave them all the data I had on him including copies of his postings, etc. That's when he told me they were from out of state. Already having done a DNS lookup and other stuff on www.getonefreepc.com I asked Johnny where he got his ISP service, and who handled his domain name. He acted totally ignorant, claiming that all he knew how to do was turn a computer on and off, nothing much else. I asked him if he 'knew anything about a company called America On Line' and he said yeah, that was where he called in when he used his computer. I asked him who was his credit card processor; again he acted ignorant and said it 'is some outside service, you would have to ask the programmer who did my web page'. I asked to speak to that person, but of course he was not around and his name was not known. Using the 'Sam Spade' utility for Windows, we find a DNS record which shows as follows for getonefreepc.com: Administrative contact: J. Collie Technical contact: reg@wwwnexus.net Note that the site name does NOT have a 'dot' between www and nexus as in www.nexus -- that is incorrect. The name is wwwnexus, and apparently no connection to the Nexus Corporation in Connecticut. From what I could tell, wwwnexus.net is in Ohio somewhere. Johnny gets his credit card service from pluto.safe-order.net and he seemed very surprised that I was able to find that out. I told him if you do a raw dump of his web page, just look and see where the forms data sends its output, i.e. http://pluto.safe-order.net/getonefreepc/ Whispering sweetly in the phone, I told Johnny the first thing I wanted him to do was reverse that credit card transaction for me which I had used in this experiment. I had already sent a note to webmaster@pluto.safe-order.net and 'abuse' at the same site telling them to void the transaction, and giving them the reference numbers. I also sent a note to webmaster and abuse@wwwnexus.net asking them to review their relationship with Johnny Collie for possible violations of their rules. And of course, for the little good it did I also sent a note to TOS at America On Line, suggesting it might be worthwhile to review their subscriber's screen name tccollie for possible violations. I mention this today only to remind readers that some scams on the net are far more sophisticated than others. Very few of us spend five seconds reading or considering all the chain letters and make money fast items we get each day. It being spam, we automatically reject it for having no value. But when it appears in a respected news source such as Yahoo, and carries the name of a legitimate company -- although not actually from that company -- then we might tend to read the item and act on it. ** DO NOT BE DECIEVED BY EMAIL OR NEWSGROUP POSTINGS OR OTHER NEWS SOURCES SAYING THAT NATIONAL RESEARCH INC IS GIVING A FREE COMPUTER IF YOU WILL PARTICIPATE IN THEIR STUDY. YOU WILL GET NO COMPUTER, AND YOU WILL LOSE TWENTY DOLLARS. NATIONAL RESEARCH CORPORATION IS INVOLVED IN THIS IN ANY WAY. IF YOU ARE WAITING TO GET YOUR COMPUTER OR HAVE ASKED FOR THE RETURN OF YOUR MONEY, TRY ASKING JOHNNY COLLIE, 845 ALLEN AVE, MUSKEGON, MI 49442 616-773-7878 773-7985 777-7515. And consider pressuring organizations such as wwwnexus.net and pluto.safe-order.net who accept clients such as this. All it does is besmirch their own reputation on the net as safe places to be. *PLEASE DISTRIBUTE THIS TO OTHER GROUPS AS APPROPRIATE, WITHOUT SPAMMING TO DO SO. THANK YOU.* Patrick Townson Editor/Publisher Telecom Digest http://telecom-digest.org ------------------------------ Date: Sat, 20 Mar 1999 11:18:22 -0600 (CST) From: Jim Thomas Subject: 2--Hacking Legend's Sign-Off (LA Times Excerpt) SOURCE: http://www.latimes.com/CNS_DAYS/990318/t000024439.html Thursday, March 18, 1999 Hacking Legend's Sign-Off Kevin Mitnick plagued the world of computers for two decades and led the FBI on a two-year-long chase. Now his saga is about to end. By GREG MILLER, Times Staff Writer Four years after FBI agents burst into a North Carolina apartment and captured the nation's most notorious computer hacker, the saga of the man they hunted down--Kevin David Mitnick--seems finally to be nearing a conclusion. Mitnick and federal prosecutors signed a plea agreement this week that sources said will keep the accused hacker in prison for roughly one more year. In addition, Mitnick will likely be barred from ever profiting from his story, and restricted from so much as touching a computer for at least three years after his eventual release. The agreement, which still requires the approval of a federal judge and comes just weeks before his trial was to begin, brings the curtain down on an era. More than even Mitnick seems able to comprehend, he has come to personify both the golden age of hacking and the intense public paranoia that accompanied the dawn of the personal computer revolution. Mitnick's heyday as a hacker is over, but he remains the ultimate digital boogeyman. "The Mitnick case is the last vestige of hacker hysteria from the late 1980s and early 1990s," said Mike Godwin, longtime general counsel for the Electronic Frontier Foundation, an Internet civil liberties group. "It's not that there won't be more hackers. It's just that cops and the media have moved on. They're more worried about gambling and porn sites and domain name registrations. But Mitnick was demonized in that era, and there's still a lot of people who want to take a piece of him." ------------------------------ Date: Sun, 28 Mar 1999 12:34:40 -0600 (CST) From: Jim Thomas Subject: 3--UK ISP found liable for defamation Source: http://www.cyber-rights.org/press Cyber-Rights & Cyber-Liberties (UK) Logo PRESS RELEASES For Immediate Release - 26 March, 1999 CR&CL (UK) Press Release - UK ISP found liable for defamation LEEDS - This morning Cyber-Rights & Cyber-Liberties (UK) criticised a High Court ruling involving liability for defamatory statements made by a third party against Demon Internet. Demon Internet, a major UK ISP is more likely to be found liable for defamation in a case against Dr. Laurence Godfrey, a London-based nuclear physicist. Demon will appeal against today's pre-trial court ruling by Mr Justice Morland in London's High Court. According to a press release by Demon Internet, "the point of law being decided centres around whether Demon Internet, an Internet Service Provider, is responsible for the information that is posted to and made available from newsgroups that are held on Demon Internet's servers." It should also be noted that the case arises out of a posting made by an unknown individual in the US, and not by a Demon Internet customer. Cyber-Rights & Cyber-Liberties (UK) believes that this decision will have a profound effect on cyber-speech and UK ISPs will be forced to monitor and censor third party content going through their servers. The ruling, if not reversed on appeal would make Britain, a very hostile place for network development in the Information Age. Mr. Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK) stated that: "The decision will have a chilling effect over the Internet communications and will force the UK ISPs to take a pro-active role in relation to Internet content. This is most undesirable and unacceptable. The Defamation Act does not give adequate protection to the ISPs and unfortunately the ISPs remain as the `usual suspects' when civil claims through defamation suits are brought against them." "It is also totally unacceptable that an offended party should simply notify an Internet Service Provider claiming the information to be legally defamatory. The current state of the UK laws forces the ISPs to be the defendant, judge, and the jury at the same time. Notice should not be enough in such cases." Cyber-Rights & Cyber-Liberties (UK) will support Demon's case during the appeal process. Contact Information: Mr Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK) E-mail: lawya@cyber-rights.org CR&CL (UK) gives oral evidence at the House of Commons 09 March, 1999 LONDON, House of Commons - Today Cyber-Rights & Cyber-Liberties (UK) told the HC Select Committee on Trade and Industry that "so far, privacy issues in relation to the use of strong encryption systems have never been properly reflected in the formulation of UK government policies." This silence is especially remarkable in the light of other governmental initiatives such as the Human Rights Act 1998 according to the oral evidence given by the Cyber-Rights & Cyber-Liberties (UK) representatives. Furthermore, the Cyber-Rights & Cyber-Liberties (UK) written submission stated that "the use of encryption should be prima facie respected and even encouraged. By contrast, the government approach should be criticised as being fixated on the value of encryption solely in connection with commerce and ignoring wider political and social uses of information technology which might legitimately require the use of encryption." "Without the "key recovery" capability, law enforcement agencies contend that they would be less able to protect the safety of the public, and this in itself would constitute an infringement of civil liberties. However, we believe that the solution to the problems of crime prevention and law enforcement do not lie with accessing private encryption keys. From our own research into recorded criminal uses of encryption, we have concluded that the use of encryption has not been a serious problem for crime detection or prevention. There is no more than speculation that it will be a problem in the future. In any event, it seems fanciful to expect that criminals will use government-mandated encryption systems with key recovery capabilities when alternative systems of encryption remain readily available. Government strategy would be naive if it assumed that criminals would use encryption tools which can be decrypted by the law enforcement bodies." The Cyber-Rights & Cyber-Liberties (UK) representatives will also bring a recently published Council of Europe Recommendation "for the Protection of Privacy on the Internet," (No R (99) 5 of the Committee of Ministers to Member States, http://www.coe.fr/cm/ta/rec/1999/99r5.htm) to the attention of the Trade and Select Committee. These excellent guidelines are along the lines of CR&CL(UK)'s approach to individual privacy and drafting of a "privacy letter" from the users perspective. Mr Yaman Akdeniz, the Director of CR&CL(UK) stated that: "The enactment of the Human Rights Act 1998 within the UK is a major step towards a new era in which individual rights and liberties will be strongly respected and taken into account while government policies are fostered. We believe privacy is far the most important right which needs protection in the Information Age and it should be the duty of the government to protect such individual rights." Mr Nicholas Bohm, E-Commerce Policy Adviser to CR&CL(UK) stated that: "Recent Government announcements have shown that industry and privacy lobbies are working in the same direction. But the Select Committee has the chance to show that standing up for individual liberty and privacy in cyberspace is just as important as supporting commerce and industry." Dr Brian Gladman, the Technology Policy Adviser to CR&CL(UK) stated that: ""Law Enforcement authorities need to overcome their fear of encryption and their desire for solutions that create more risks for society than they remove. Instead, they need to invest in the development of the expertise needed to remain effective in a future environment where cryptographic information protection will be the norm." Professor Clive Walker, deputy director of CR&CL(UK) added: "In a democratic society, police powers must be open, workable and fair. These principles will not be achieved by dealings behind closed doors between the police and Internet Service Providers nor by future wide-ranging legal powers to access private correspondence. There is insufficient evidence that encryption is the computer equivalent of a sawn-off shotgun and that its users need to be potentially treated as if they were a virtual community of masked villains." Notes for the Editors This press release will be available at http://www.cyber-rights.org/press Memorandum by Cyber-Rights & Cyber-Liberties (UK) to the House of Commons Trade and Industry Committee on Electronic Commerce Inquiry, March 1999 is available through http://www.cyber-rights.org/reports/ ------------------------------ Date: Sun, 21 Mar 1999 20:47:29 -0500 From: Matthew Gaylor Subject: 4--Worker Convicted for Violent E-mail Source - fight-censorship@vorlon.mit.edu .c The Associated Press LAREDO, Texas (AP) -- A postal worker who told a co-worker by e-mail he might ``go postal'' and set off a ``shootout at the OK Corral'' has been sentenced to 15 months in prison. ``People can no longer laugh off things like this from postal workers,'' U.S. District Judge George Kazen said when he sentenced John Murillo on Thursday. Murillo, 48, was convicted in December of transporting a threat across state lines. Although the e-mail was sent to a friend in Laredo, prosecutors said the message passed through several states. ``They are trying everything to make me go postal,'' the message read. ``This Mexican can only take so much. You kick a dog so much and sooner or later that chain will snap. I have been very patient with them but I am tired and making plans. ... Judgment day will come. It will be a shootout at the OK Corral.'' William Espinoza, who received the message, turned it over to postal inspectors. Espinoza testified he laughed when he read it. Murillo and his attorney, public defender Juan R. Flores, contended the case was about freedom of speech. AP-NY-03-19-99 1842EST Copyright 1999 The Associated Press. ------------------------------ From: "Bob Izenberg" Subject: 5--Internet-related bills before the Texas state legislature Date: Sat, 20 Mar 1999 14:50:26 -0600 SB106 looks interesting... Wonder if that beats the Washington State penalties. The inevitable kiddie porn bill might also pique your interest. Receive the stuff in the mail and it's a third degree felony. Receive it on a computer, it's a second degree felony. http://www.capitol.state.tx.us/tlo/billsrch/subject/S0130.HTM Bob ========================== ((CuD MODERATORS' NOTE: For those without a browser, here are just a few examples of the 46 pieces of pending legislation currently before the Texas Legislature. How long will it be, we wonder, before somebody recodes HB 111 as TEXAS TAXES NET!?)) 76th Legislature Number of Bills: 46 HB 111 AUTHOR: Maxey SPONSOR: Relating to exempting access to the internet from the sales tax. HB 173 AUTHOR: Garcia SPONSOR: 03/23/99 H Scheduled for public hearing on . . . . Relating to requiring a person in the business of selling personal computers to provide certain software with each personal computer HB 944 AUTHOR: Craddick / et al. SPONSOR: 03/03/99 H Internet access service from the sales tax. HB 1115 AUTHOR: Hartnett SPONSOR: Relating to taxing the sale, use, or consumption of Internet access service. HB 1264 AUTHOR: McClendon SPONSOR: 03/15/99 H Left pending in committee Relating to broadcasting public meetings over the Internet. HB 1657 AUTHOR: Maxey SPONSOR: 02/23/99 H Referred to State Affairs Relating to electronic access to certain state agency information. HB 1773 AUTHOR: Hamric SPONSOR: 03/01/99 H Referred to Business & Industry Relating to unsolicited electronic mail; providing civil penalties. HB 2392 AUTHOR: Goolsby SPONSOR: 03/10/99 H Referred to Elections Relating to participation by counties in an electronic voting pilot project for military voters. HB 2653 AUTHOR: Elkins SPONSOR: 03/23/99 H Scheduled for public hearing on . . . . Relating to the law that applies to a contract made over the Internet. HB 2834 AUTHOR: Turner, Sylvester SPONSOR: 03/15/99 H Referred to State Affairs Relating to the listing of state agency Internet addresses in telephone directories. HB 2835 AUTHOR: Turner, Sylvester SPONSOR: 03/15/99 H Referred to State Affairs Relating to information that certain state agencies must post on the Internet. HB 2837 AUTHOR: Turner, Sylvester SPONSOR: 03/15/99 H Referred to Ways & Means Relating to requiring the comptroller of public accounts to post reports on the Internet. ------------------------------ Date: Tue, 23 Mar 1999 11:57:12 -0600 From: bennett@peacefire.org Subject: 6--61-page report on Utah school Internet censorship The Censorware Project has published a 61-page report this morning at: http://censorware.org/reports/utah/ exposing the claims of "SmartFilter" blocking software to be misleading, after a several-month legal battle to obtain information about the list of sites blocked by the program. The report describes censorship on the Utah Education Network (which connects Utah public schools and libraries to the Internet) since the UEN purchased and installed SmartFilter. Michael Sims, who is also the webmaster of Censorware.org, was the main author of the paper. (I am one of the four other volunteer members of the Censorware Project.) Among sites that students have been banned from accessing were the Bible, the United States Constitution, the Koran, and the Declaration of Independence. Even the Book of Mormon was banned -- on a school network providing service exclusively to Utah! The report is the culmination of a project that began several months ago, when Michael Sims filed a request with the Utah Education Network (under Utah's version of the Freedom of Information Act) for log files that would show what sites students have been blocked from accessing since SmartFilter was installed. Although the UEN shortly thereafter destroyed the records that Sims had requested, this action caught the attention of the State Records Committee (destroying documents requested under a freedom of information act is illegal), and when Sims made a second request for a new set of log files, the UEN complied. These log files were analyzed to find out what sites were blocked by SmartFilter and how they were categorized. SmartFilter manufacturer Secure Computing Ltd. originally claimed that "sites are not added to our control list without first being viewed and approved by our staff". After the report was published this morning, a company spokeswoman at least partially retracted that claim in a statement: "Generally, we try to review every site." Examples of banned sites were found in the report, however, that left little doubt that SmartFilter had misled customers. One student's home page was blocked as a "Gambling" site because his last name was Wager. The official home page of the Offspring home page was blocked as a "Criminal skills" site because of lyrics that included phrases like "crack the code". The full report includes literally hundreds of more examples. None of these errors would have been made by a human reviewing each blocked site individually; the mistakes indicate that a computer conducted the "review" of these pages and classified them according to keywords that it found. The report concluded with the question: ""When the Declaration of Independence is banned from the citizens of Saudi Arabia, so that they won't get ideas, we call it culturally backward. When it's banned from our own public libraries by our own government, then what do we call it?" The full text of the project, and links to media coverage of the events leading up to the project's publication, are at: http://censorware.org/reports/utah/ and the Censorware Project's press release is at: http://censorware.org/press/press_03-23-99.html Michael Sims can be reached at these numbers: daytime: 212-620-3361 evening: 718-556-1002 There was also an early-morning article on the Web page of the Salt Lake Tribune about the report: http://www.sltrib.com/03231999/nation_w/92388.htm ------------------------------ Date: Wed, 24 Mar 1999 23:53:58 -0600 From: Robert Hoskins Subject: 7--Please Register for Spring ISPCON Now!!! Here's a quick reminder to sign up for the Spring ISPCON '99 press registration as soon as possible. You only have 21 business days left to register!! The show is being Baltimore, MD on April 26-29, 1999 at the Baltimore Convention Center. The press registration URL is http://ispcon.internet.com/spring99/policy.html. If you haven't signed up because you're not familiar with the Internet Service Provider Conference (ISPCON). You can learn more about the show, the vendors, and the technology that will be on display by pointing your web browser to: http://ispcon.internet.com/spring99/index.html. To save you some time, here is a quick description: ISPCON Spring '99 will gather thousands of Internet Service Providers, CLECs, RBOCs, ITSPs, Cable Operators, and Web Hosting companies for an intensely educational event focused on the business of providing Internet services ISPCON has gained a unique reputation for providing quality educational sessions presented by industry leaders. These sessions cover a wide range of topics and reflect the ever-evolving technologies of delivering Internet access through cable, wireless, satellite, xDSL technologies, and IP telephony. In addition to providing the latest information on technology, there are sessions covering business topics such as ISP exit strategies, mergers, acquisitions, initial public offerings, and how to value an ISP company. Please check back for session updates. Audio tapes from the ISPCON conferences can be ordered from The Resource Link at http://www.info@the-resource-link.com. If you're not interested in attending, please send us a "no" so we can delete you from our potential Internet press list. Best Regards, Robert Hoskins Press Coordinator ISPCON Phone: 817-314-0362 Email: robert.hoskins@cwix.com ------------------------------ Date: Sun, 10 Jan 1999 22:51:01 CST From: CuD Moderators Subject: 8--Cu Digest Header Info (unchanged since 10 Jan, 1999) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) The mailing list is automated, so no human lies at the other end. CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #11.19 ************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu