Computer underground Digest Sun 3 October, 1999 Volume 11 : Issue 35 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Copny Editor: Etaion Shrdlu, III Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #11.35 (Sun, 3 October, 1999) File 1--CuD Remains Alive and Well File 2--"Inventing the Internet", Janet Abbate File 3--REVIEW: "Howard Aiken: Portrait of a Computer Pioneer", I. Berna File 4--REVIEW: "Internet Security with Windows NT", Mark Joseph Edwards File 5--REVIEW: "How Electronic Things Work", Robert Goodman File 6--REVIEW: "Fundamentals of Telecommunications", Roger L. Freeman File 7--REVIEW: "Kerberos: A Network Authentication System", Brian Tung File 8--REVIEW: "The First 1-- Feet", Deborah Hurley/James H. Keller File 9--REVIEW: "The Tin Man", Dale Brown File 10--REVIEW: "CNN Headline News by Email", headlinenewsmail@CNN.COM File 11--REVIEW: "Windows NT Server 4.0 Administrator's Pocket Consultant File 12--Cu Digest Header Info (unchanged since 10 Aug, 1999) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. TO UNSUB OR CHANGE ADDRESS, SEE ADMINISTRAVIA IN CONCLUDING FILE --------------------------------------------------------------------- Date: Mon, 04 Oct 99 21:32 CDT To: Cu Digest (tk0jut2@mvs.cso.niu.edu)From: Cu Digest Subject: File 1--CuD Remains Alive and Well Contra the long hiatus, three months of it, since the last issue of CuD (#11.34) back in early August, CuD is alive and well. Massive time constraints, overwhelming at times, left little time to for peripheral obligations. While the results of the time investment have been almost undeservedly professionally rewarding, the downside has been the neglect of the little fun things in life. With this issue, we hope to begin running the most recent, and therefore timely, contributions, and work backwards to those contributions that are not yet dated. I apologize to contributors who we've slighted. This issue begins with Rob Slade's most recent reviews. ------------------------------ Date: Tue, 31 Aug 1999 10:44:08 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" To: p1@canada.com Subject: File 2--"Inventing the Internet", Janet Abbate BKINVINT.RVW 990709 "Inventing the Internet", Janet Abbate, 1999, 0-262-01172-7, U$27.50 %A Janet Abbate %C 55 Hayward Street, Cambridge, MA 02142-1399 %D 1999 %G 0-262-01172-7 %I MIT Press %O U$27.50 800-356-0343 fax: 617-625-6660 www-mitpress.mit.edu %P 264 p. %T "Inventing the Internet" Buried midway through the introduction comes the statement that the author has chosen to focus on a select group of topics in order to support her own view of the most important social and cultural factors of the Internet. The intent of the book, therefore, is complex. The text must examine a technical development, identify social hypotheses, and present arguments from the historical record to buttress those theories. Chapter one starts out by asserting that the most celebrated of the ARPANET's technical innovations was packet switching. Certainly packet switching is a core concept in all discussions of modern data communications. Unfortunately, Abbate does not display the merits of the idea with sufficient clarity, never dealing with issues of traffic differences between voice and data, only tangentially mentioning circuit switching, and clouding the deliberation with factors more properly related to routing. There is also an evident lack of familiarity with basic technical processes. In addition, the author states that the ARPANET was the proving ground for packet switching, ignoring the contribution of demonstrably much more widely used networks such as Datapac and Transpac. Furthermore, looking back to the introduction we find that the social aspect we, as readers, are supposed to note is how technologies are socially constructed. Other than the fact that technical people talk to each other, nothing significant seems to be presented along this line. Finally, the extensive citations of works in the bibliography appeared to support the scholarship of the work, until I noted that the most interesting points tended to be those referring to private interviews and materials written relatively long after the fact. The content of chapter two alternates between descriptions of political and managerial machinations of those involved in the early development of the ARPANET and mentions of layered protocol modeling. Early users and usages are discussed in chapter three, but the text swings between acknowledging and denying user development. Internetworking is introduced in chapter four, but protocol layering is not re-examined even though it is at this point that the concept becomes important. Chapter five starts with a generic debate about the need for, and interests against, standards, but then spends most of the time reviewing X.25 and the OSI (Open Systems Interconnection) model, with little relevance to the Internet. Having meandered through about ten years in the first five chapters, chapter six leapfrogs twenty, racing from the military ARPANET into the academic Internet and finally into the present commercial Internet. The trailblazing work of BITNET, Usenet, and even Fidonet is given only token mention, and the description of the World Wide Web seems to completely misunderstand how hypertext contributed to the use and popularity of the net, stressing colour images rather than integration of function. Despite the collation of a wide variety of source materials, and the presentation of a number of events not commonly cited, this book fails as both history and social commentary. Too many major occurrences are dismissed too quickly to confer a full understanding of the development of the Internet. The cultural points Abbate tries to make are either too subtle to come across to this uncultivated geek or are unremarkable and trite. (The closing statement that the net's strengths lie in adaptability and participatory design is surely not news to anyone with the slightest knowledge of Internet history.) Mostly, though, it appears that Abbate's lack of comprehension of the technical aspects of the net ensures a failure to understand significant historical and social factors as well. copyright Robert M. Slade, 1999 BKINVINT.RVW 990709 ------------------------------ Date: Mon, 6 Sep 1999 13:46:56 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 3--REVIEW: "Howard Aiken: Portrait of a Computer Pioneer", I. Berna BKHAPOCP.RVW 990724 "Howard Aiken: Portrait of a Computer Pioneer", I. Bernard Cohen, 1999, 0-262-03262-7, U$34.95 %A I. Bernard Cohen %C 55 Hayward Street, Cambridge, MA 02142-1399 %D 1999 %G 0-262-03262-7 %I MIT Press %O U$34.95 +1-800-356-0343 fax: +1-617-625-6660 www-mitpress.mit.edu %P 329 p. %T "Howard Aiken: Portrait of a Computer Pioneer" While Aiken's name is known to computer historians, Cohen is concerned that Aiken is not, perhaps, given his due as a pioneer and power in the nascent computer community. Rather than outlining technical innovations, this book concentrates on Aiken's personality, and his interesting life story. The text deals primarily with people, rather than technology, although the author demonstrates a sound grasp of all technology that is discussed. The material shows that if Aiken did not have an impact on computer architecture and design, he definitely did have an influence on computing as it is understood today. As only one example, there is the perception of Charles Babbage, rather than Pascal or some other, as the "grandfather" of the computer. Most modern popular accounts of Babbage's work derive from Aiken's presentation, and even misunderstanding, of Babbage's proposed engines. Significant space is given to the building, and operation, of the Mark I/ASCC computer, but not to the Marks II, III, and IV. A fair amount of material is also devoted to the computer science programs started at Harvard. While activities outside of the computation laboratory are mentioned, I found it disappointing that more attention was not paid to the exchanges of ideas that must have taken place between the various groups that were building computers around the world at the time. The text is readable. A great deal of the material is anecdotal, and the references as to how the information was gathered, and from whom, is worked quite naturally into the narrative without the disruption of constant endnotes and citations. The scarcity of formal references should not be seen as carelessness in research: the author notes conflicting versions of important stories, and the attempts made to determine the correct course of events. Occasionally the book does get ahead of itself and requires fairly careful reading to understand what, at first, appears to be a non-sequitur. However, this kind of problem is quite common in histories and biographies, and Cohen seems to have dealt with it more effectively than most authors. An enjoyable and informative book, illuminating a number of little known areas, and attempting to correct more than a few myths. copyright Robert M. Slade, 1999 BKHAPOCP.RVW 990724 ------------------------------ Date: Wed, 28 Jul 1999 09:50:15 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 4--REVIEW: "Internet Security with Windows NT", Mark Joseph Edwards BKINSCNT.RVW 990625 "Internet Security with Windows NT", Mark Joseph Edwards, 1998, 1-882419-62-6, U$49.95 %A Mark Joseph Edwards mark@ntshop.net mark@ntsecurity.net %C 221 E. 29th St., Loveland, CO 80538 %D 1998 %G 1-882419-62-6 %I Duke Communications/29th Street Press %O U$49.95 800-621-1544 970-663-4700 fax: 970-667-2321 %O www.29thstreetpress.com ccarmel@29thstreetpress.com %P 515 + CD-ROM %T "Internet Security with Windows NT" The introduction states that the book is intended for those with little or no NT security knowledge, but I suspect that making this the sole resource for a new system manager would be a dangerous thing, since it provides the proverbial "little knowledge." Chapter one gives the user or administrator too much and, at the same time, not enough background on TCP/IP. There is a lot of trivia that does not relate to security, while there is no discussion of, for example, dynamic re-routing, which would be important in future examinations of IP spoofing. The grab bag of mostly intrusion related information in chapter two is not terribly helpful in preparing a defence. It is not clear to me why this part is entitled "TCP/IP Essentials." Part two outlines the basics of the Microsoft Windows security model. There is little presentation of a conceptual understanding or framework of the foundation chapter three, which instead lists a number of terms and programs. The "how to" of simple security operations is more comprehensible in chapter four. Part three talks about principles of network security. Chapter five does not deal with multiprotocol networks, but again lists an assortment of security concerns. A number of security threats are described in chapter six, but not in an organized fashion. (The virus information, obtained from the Semantec [sic] Anti-virus Research Center, is basically useless.) A number of aspects that should be addressed in a security policy are listed in chapter seven. Chapter eight discusses a number of client programs for NT, but without much security relevance. A number of attacks are tersely described in chapter nine. Part four looks at firewalls. Chapter ten does a reasonable job of explaining the different types of firewalls, although it also includes some unrelated material. Some considerations for evaluation are given in chapter eleven. Part five outlines the Microsoft Proxy Server. Chapter twelve runs through dialogue boxes in the Internet Information Server. The proxy server itself is described in chapter thirteen. Design issues are discussed in chapter fourteen. Implementation is talked about in chapter fifteen, although there are a number of areas not completely covered. Some client considerations are mentioned in chapter sixteen. Seventeen looks at troubleshooting and maintenance. The book can provide some useful material, although most of the utility comes from the appendices, listing quick suggestions and resource contacts, rather than the text itself. Much of the content is unfocussed and almost disorganized. Some topics included are not immediately relevant to security work, while other areas stop short of actually helping the user or administrator. copyright Robert M. Slade, 1999 BKINSCNT.RVW 990625 ------------------------------ Date: Tue, 3 Aug 1999 09:09:29 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 5--REVIEW: "How Electronic Things Work", Robert Goodman BKHWETWK.RVW 990515 "How Electronic Things Work", Robert Goodman, 1999, 0-07-024630-0, U$24.95 %A Robert Goodman %C 300 Water Street, Whitby, Ontario L1N 9B6 %D 1999 %G 0-07-024630-0 %I McGraw-Hill Ryerson/Osborne %O U$24.95 905-430-5000 800-565-5758 fax: 905-430-5020 %P 393 p. %T "How Electronic Things Work: And What to Do When They Don't" In the preface, Goodman states that the text is intended for the general consumer with little or no electronics background. The promotion of the book emphasizes the ability to save money on maintenance and repair costs. To be blunt, I don't believe this book can be written. A biased opinion, to be sure, but one that I have formed over years of experience with all manner of things electronic. In the first place, electronic things work in an enormous variety of ways. Certainly the basic discrete components are the same, but the numbers of components can easily reach hundreds or thousands in the complex electrical devices on which the book concentrates. In addition, any number of service "technicians" do not actually know how the devices they service really do work. What they do know is that on machine A part B fails quite often, and the characteristic symptom of this failure is C. This is why it is often dangerous to allow electrical engineers near your faltering equipment: they *do* know how things work, but don't necessarily know the frequency of repair rates for part B on machine A. Another factor is that many failures in electronic objects are actually due to mechanical faults, with special needs in terms of repair. A final point is that, in an attempt to ensure that components cannot be damaged, many are now designed in such a way that they cannot be fixed, either. Chapter one does not relieve me of any of these concerns. The explanations are not simple, they are simplistic. In fact, the brief descriptions of discrete components and the like signally fail to teach what these items are and do. The illustrations and figures are appalling. I am thoroughly familiar with books that do not use figures effectively, but I don't believe I have ever come across a work which relies so heavily on pictures, uses so many, labels them so poorly, and, in the end, conveys so little useful information. The author suggests some testing tool circuits as projects, but the simple diagrams would be completely incomprehensible to those who were not already fairly heavily involved with electronic hobby work. (They make very little sense to me, and I've seen more than a few circuit diagrams in my life.) (The projects also require many items that you might not find in the usual home repair toolkit, such as an oscilloscope.) A cartoon of "Piher mini pots" is not very informative, particularly since neither "piher" nor "pots" are defined, or even mentioned, in either the text, the index, or the disjointed glossary. And so it goes. Chapter two, on radios, seems to be more of an ad for Bose than anything else. I showed the diagram of an "FM dipole antenna you can make" to a technical colleague, and his immediate reaction was "what is that?" Would anyone with "little or no electronics background" know how to check the B+ voltage on a capacitor? Or ensure that they did not arc it to ground? Or properly adjust the head penetration depth on a cassette deck (with no more instruction than that)? Would they know how to check broken flex cable trace leads on a CD player circuit board (chapter three)? Check the vertical oscillator and output transistors and/or IC stages on a TV (chapter four)? Check and replace any broken parts on the idler tire of your VCR (chapter five)? Admittedly, some of the material is not quite so arcane. Chapter six, on satellite TV dishes, only recommends those adjustments that can be made from the system menu accessible to the user. And, after telling us how to take a camcorder apart (which might be easier than getting it all together) chapter seven doesn't actually recommend any action you can't take from the outside. But chapter eight seems to think we can check (or even find) the ring detection circuit on a telephone answering machine. In comparison, chapter nine's review of computers is comically brief, with very little to suggest in the way of repair tips. Printer and fax problems and solutions, in chapter ten, focus on paper jams. There are some magazine level "explanations" of how some of the technology, such as CDs and FM radio, work. Generally speaking, these discourses fail to impart any real understanding that would lead to an ability to fix something that wasn't working. In fact, most of the material in the book simply provides vocabulary, without anything in the way of conceptual background. copyright Robert M. Slade, 1999 BKHWETWK.RVW 990515 ------------------------------ Date: Fri, 6 Aug 1999 08:54:02 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 6--REVIEW: "Fundamentals of Telecommunications", Roger L. Freeman BKFNTELC.RVW 990514 "Fundamentals of Telecommunications", Roger L. Freeman, 1999, 0-471-29699-6 %A Roger L. Freeman %C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8 %D 1999 %G 0-471-29699-6 %I John Wiley & Sons, Inc. %O 416-236-4433 fax: 416-236-4448 rlangloi@wiley.com %P 676 p. %T "Fundamentals of Telecommunications" A footnote to the first paragraph in chapter one put me somewhat at ease. If somebody knows that there is more than one "billion" in the world, it bodes very well for the technical accuracy of the following material. This book is intended as an introductory, and entry level, text on telecommunications. It covers the field, but does not require engineering level math or physics. For those with a weak background in mathematics or electricity, some material is provided in appendices. Chapter one covers introductory concepts, but jumps around a fair bit in doing so. Data signalling is dealt with in chapter two (and from the description of semaphore, we know that the author was never a Boy Scout). Quality of service, and signal, is discussed in chapter three. Chapter four looks at the network basics of transmission and switching. Transmission for voice telephony gets special consideration in chapter five. Chapter six talks about some physical level protocols, which doesn't quite explain the title of "Digital Networking." Chapter seven details network control signalling. Long haul network components are reviewed in chapter eight while the specifics of the transmission segments are in chapter nine. Data communications gets a bit of a late start in chapter ten, but the basics are all there. Chapter eleven presents local area networks as the first half of a look at enterprise networks, and continues with wide area networks in chapter twelve. The unique aspects of signalling system number 7 are outlined in chapter thirteen. Coverage of television transmission, in chapter fourteen, is quite detailed. Chapter fifteen looks at cable television systems, and also briefly at the requirements for two way transmission. Cellular, PCS (Personal Communications Services), and wireless are discussed in chapter sixteen. High bit rate optical links, in chapter seventeen, concentrate on SONET (Synchronous Optical Network) and related protocols. Chapter eighteen looks at ATM (Asynchronous Transfer Mode). The questions and exercises at the end of the chapter are not the best I've ever seen, but not the worst either. They tend to ask students to pull mere definitions from the text, but some do require a bit of analysis. References tend to be protocols or standards specifications, and there are few citations of more generally available works. With the exception of framing diagrams, the illustrations are not very illuminating, and are frequently mislabelled. The structure of the book, while not exactly disorganized, does tend to jump from topic to topic and back again. There is a heavy emphasis on telephony, and, despite the very successful limitation of prerequisite requirements, a definite engineering tone and bias. Still, the fundamentals are all here, and, in the hands of a good teacher, this work could be quite successful. copyright Robert M. Slade, 1999 BKFNTELC.RVW 990514 ------------------------------ Date: Mon, 9 Aug 1999 08:54:34 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 7--REVIEW: "Kerberos: A Network Authentication System", Brian Tung BKKRBROS.RVW 990715 "Kerberos: A Network Authentication System", Brian Tung, 1999, 0-201-37924-4, U$19.95/C$29.95 %A Brian Tung %C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8 %D 1999 %G 0-201-37924-4 %I Addison-Wesley Publishing Co. %O U$19.95/C$29.95 416-447-5101 fax: 416-443-0948 bkexpress@aw.com %P 164 p. %T "Kerberos: A Network Authentication System" Part one is a user guide to the Kerberos security tool, user being defined as both end user and administrator. Chapter one presents a rather weak justification for Kerberos (based on the insecurity of email) and some quick contact information for obtaining it. End user operations for Kerberos are described, but not always clearly, and some questions are left open. (Does the user have any control over ticket expiry times?) The administrative functions, in chapter three, are weak in regard to installation, but reasonable in terms of maintenance operations. Chapter four contains quick listings of the Kerberos API (Application Programming Interface) calls, for those who want to build Kerberized programs. Part two provides some background. Chapter five is a good tutorial on the concepts: if you are having trouble with chapters two and three, a review of five will probably help a lot. Differences in versions of Kerberos are listed in chapter six. A look at various related issues in chapter seven includes a very decent discussion of public key encryption. For quick coverage of Kerberos, this makes a neat and handy package. copyright Robert M. Slade, 1999 BKKRBROS.RVW 990715 ------------------------------ Date: Thu, 16 Sep 1999 08:30:00 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 8--REVIEW: "The First 100 Feet", Deborah Hurley/James H. Keller BKFSOHFT.RVW 990731 "The First 100 Feet", Deborah Hurley/James H. Keller, 1999, 0-262-58160-4, U$25.00 %E Deborah Hurley deborah_hurley@harvard.edu %E James H. Keller keller@lexeme.com %C 55 Hayward Street, Cambridge, MA 02142-1399 %D 1999 %G 0-262-58160-4 %I MIT Press %O U$25.00 +1-800-356-0343 fax: +1-617-625-6660 www-mitpress.mit.edu %P 209 p. %T "The First 100 Feet: Options for Internet and Broadband Access" This book suggests that one can take the problem of the "last 100 feet," the drop from the telecommunications infrastructure or physical roadside curb to the home or small business, and turn it around to see some kind of business opportunity. Certainly it is plain that there is a growing demand for higher bandwidth to the end nodes of the network, but the collection of articles here presents no new business ideas, and seems to have grasped only the tip of the technical iceberg. Part one looks at market factors for these access services. Chapter one suggests that consumers provide the drop themselves, but never really examines the idea. A number of technical and business terms related to the last mile are listed and semi-defined in chapter two, but without significant analysis. Chapter three asks, but never answers, the question of whether consumers will be willing to pay for access. Part two looks at options for consumers to provide their own last mile connections. Chapter four looks at spread spectrum radio communications, but doesn't delve into the areas of node connection or mass installation. Essentially the same material is repeated in chapter five. Chapter six tries to appear technically oriented in a review of power line data transmission, but is somewhat behind the curve. Satellite options are discussed in chapter seven, but the text does not deal with the last mile at all, and does not use any data from the Iridium system which is now finally operating. Part three opines on the chances of non-traditional service providers. Chapter eight is a meandering and unfocussed look at municipally based networks. The next two papers suggest that electrical utilities should be interested in becoming access providers, chapter nine being less convincing than eight. Chapter ten talks about one specific experience with a municipal network. Overall, the essays collected into this work seem to have been compiled by enthusiasts with limited technical knowledge who seem to think they are onto something new. While reasonably up to date, none of the proposals, if there are any beyond "we need more studies," are startlingly original. All of the business or technical models are variations on existing hierarchical patterns rather than true community paradigms that might be derived from, say, extensions of the dynamic routing model proven by the Internet married to a wireless technology. For those who have not been following the last mile activities, this book does provide an introduction to some of the topics in the field, but it paints neither a complete nor an original picture. copyright Robert M. Slade, 1999 BKFSOHFT.RVW 990731 ------------------------------ Date: Mon, 20 Sep 1999 07:57:42 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 9--REVIEW: "The Tin Man", Dale Brown BKTINMAN.RVW 990814 "The Tin Man", Dale Brown, 1998, 0-553-11106-X, U$24.95/C$29.95 %A Dale Brown readermail@megafortress.com %C 1540 Broadway, New York, NY 10036 %D 1998 %G 0-553-11106-X %I Bantam Books/Doubleday/Dell %O U$24.95/C$29.95 800-323-9872 http://www.bdd.com webmaster@bdd.com %P 367 p. %T "The Tin Man" Brown's work is frequently compared with that of Tom Clancy, and there are a number of similarities. Both authors are well versed in military technology, and the command structure of the US military. Both have a solid grasp of the complexities of global politics (although these are often simplified for story-telling purposes), and military preparedness. In both cases the main stream of books comprise a series based around a particular character. In Brown's case the character is Patrick McLanahan, US Air Force heavy bomber bombardier and advanced weapons engineer. McLanahan is a rather interesting standout in the pantheon of thriller heroes in that there is not a lot of character development in action stories. McLanahan *does* advance--but for every step forward, he takes an equal step back, either within the book or in the next. This is probably necessary, since Brown's stories, like those of Cussler and Francis, are written to a very strict formula. (McLanahan might, in fact, be said to have regressed over the course of the series. In the initial books he was something of the stereotypical ice-man. As John Gray puts it in "Billy Bishop Goes to War" (cf.THBBGTWR.RVW), "You're part of a machine, so you have to stay very calm and cold. You and your machine work together to bring the other fellow down." Nowadays McLanahan frequently loses his temper, works himself "into a screaming rage, and [goes tearing] off over the top" to do battle with the enemy.) But, once again, this isn't about characterization, it's about technology. Specifically, it's about physics. Brown is very conversant with high tech weaponry, and his descriptions, while they may be slightly beyond the edge of the current state of deployment, should be quite achievable within a few years. In this book, though, there is a departure from the battlefield milieu to that of urban policing and terrorism. The Tin Man of the title wears a new kind of body armour made of a cloth that can be electrically stiffened to resist bullets, explosions, and even anti-tank rockets. We aren't told much about how this material works, so I don't have a particular problem with the fabric itself, but I certainly have difficulties with the way it is used. The suit can keep you from getting killed if you are hit by gunfire. Fair enough: bullet proof vests can do that. It'll even save you from prolonged automatic weapons fire, and while a bullet proof vest can't do that, it is reasonable to assume that greater coverage and rigidity would fit the bill. But it also saves the wearer from explosions, high-explosive rocket warheads, hundred foot drops, and even a fall into rotating helicopter blades. In these cases it doesn't matter how rigid the envelope is, momentum and inertia will ensure that the soft human body will be flattened over the inside of the suit, with a few broken bones and some ruptured organs thrown in for good measure. Phil Nuytten and Troy Hurtubise would undoubtedly be able to point out a number of ways that the most rigid body armour could kill someone. (I understand that the Grizzly Suit, made of titanium bonded to rubber with over a mile's worth of duct tape, will allow the wearer to walk away after being hit by a speeding truck--and Hurtubise still isn't satisfied with it.) There is also a possible problem with control. From various factors in the text (not least the fact that increases in attacks seem to create a power drain) it would appear that the rigidity of the suit is applied actively "on demand." This would require some kind of sensor network in the suit that must a) sense an event, b) communicate with the power pack, c) process the event, d) switch on the power, and e) channel the power to the correct part of the suit. Granted, conventional weapons generally operate at or around the speed of sound, while the suit net would operate near the speed of light, giving the suit an edge in terms of raw speed. But the suit would have to operate in a fairly complex fashion over distances measured in meters while the weapons only need to function in a linear fashion over centimetre ranges. In fact, you'd probably have to limit that to millimeters in order to maintain the integrity of the suit itself. (Brown does note that pointed objects can penetrate this type of armour while bullets cannot, but attributes the fact to differences in velocity, rather than the fact the bullets are stopped by a special weave that distributes energy while needles can slip between fabric threads.) The wearer of the suit is also able to deliver light slaps that break bones, and to punch through armoured glass. Frankly, nothing in the book seems to be able to support this. The suit may be able to prevent the puncher from getting hurt, but there doesn't seem to be anything that multiplies force. There is also the matter of a "jump" capability in the suit. "Jet packs" have not dropped much in size in forty years since the problems of thrust and flight control are simply not very tractable. Compressed air can, of course, be used for thrust, but it requires a very large reservoir in order to function. In addition, compressed air has a greater energy density than any current battery technology could ever hope to have, and using a battery to recharge compressed air in a portable unit makes no sense at all. copyright Robert M. Slade, 1999 BKTINMAN.RVW 990814 ------------------------------ Date: Wed, 22 Sep 1999 08:02:21 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" To: p1@canada.com Subject: File 10--REVIEW: "CNN Headline News by Email", headlinenewsmail@CNN.COM MLCNNMLS.RVW 990820 "CNN Headline News by Email", headlinenewsmail@CNN.COM, 1998 - , , free %A headlinenewsmail@CNN.COM %D 1998 - %I CNN %O free, http://CNN.com/EMAIL %P ~10 p. daily, including weekends %T "CNN Headline News by Email" While a fairly obvious come-on to get you to visit the CNN Website, this is a reasonably informative, though not always entirely convenient, summary of daily news events. There are one or two top stories, and then sections with four to six articles each on world news, US news, business, sport, politics, technology, and entertainment. Each entry in the main body of the message provides a headline, a sentence or two from the lead paragraph, and the URL of the article itself. Unlike other, similar, text based mailing lists, CNN does not ensure that the URLs are on a line by themselves to facilitate cut and paste functions between mail readers and browsers. However, the message does indent the headlines with angle brackets, which means that mail readers highlighting "quoted" text in email replies will also highlight the headlines. A rather lengthy header lists the headlines from the first five sections, some standard CNN Website offerings, and URLs for a few in-depth special features. I find that I now skip the header entirely. In the main body of the message, I read the headlines of the sections that interest me, and about a tenth of the introductory paragraphs. About once a month, an article is of sufficient interest to warrant a visit to the Website for the full article. Very often stories will be duplicated in more than one section. I also find that the section of greatest interest to me, technology, tends to run duplicated stories for two or three days, which is rather annoying. (I would far rather see one or two new technology stories each day than have to re-read old material.) This does not appear to be the practice in the other sections. Management of subscriptions is apparently done only through the Website at http://CNN.com/EMAIL. This mailing list is not up to the concise quality of "The Daily Brief" (cf. BKDLYBRF.RVW), but does provide a quick way to keep up on most of the news of the day. ------------------------------ Date: Mon, 27 Sep 1999 08:03:37 -0800 From: "Rob Slade, doting grandpa of Ryan and Trevor" Subject: File 11--REVIEW: "Windows NT Server 4.0 Administrator's Pocket Consultant BKWNSAPC.RVW 990820 "Windows NT Server 4.0 Administrator's Pocket Consultant", William R. Stanek, 1999, 0-7356-0574-2, U$29.99/C$44.99/UK#27.49 %A William R. Stanek nt-consulting@tvpress.com %C 1 Microsoft Way, Redmond, WA 98052-6399 %D 1999 %G 0-7356-0574-2 %I Microsoft Press %O U$29.99/C$44.99/UK#27.49 http://www.microsoft.com/mspress %P 329 p. %T "Windows NT Server 4.0 Administrator's Pocket Consultant" I suppose that one might say that this book is a "consultant" in that one might "consult" it about which button to press on a particular screen. However, I would imagine that most people would have a slightly fuller expectation of the word "consultant," as in someone who is able to help you with something you don't already know how to do. Part one supposedly deals with administration fundamentals. Chapter one indicates the way the book means to progress by talking about tool trivia rather than basic concepts. The dialogue boxes for Server Manager are reviewed in chapter two, but not in significant detail. As only one example, the reader is purportedly told about how to set up alerts, with passing mention of the fact that the Alerter and Messenger service are required for this function. The reference given does not actually tell you anything about these services, and, in fact, neither does the rest of the book. Task Manager and Event Viewer screens are described in chapter three. Part two looks at user administration. Chapter four lists, but does not explain, Microsoft terminology and some of the default accounts. Some of the options for user or group creation are outlined in chapter five. Chapter six talks about the functions in User Manager. Disk management is the topic of part three. Chapter seven looks at Disk Administrator and some other utilities. There is a reasonable overview of volumes and RAID (Redundant Array of Inexpensive Disks) arrays in chapter eight. There is some discussion of file systems in chapter nine, but most of the space is devoted to Windows Explorer. The assigning of share permissions is described in chapter ten. Rather ironically, chapter eleven reviews a number of backup media types, but then only outlines the use of NTbackup, which is restricted to tape drives. Part four addresses network administration. Chapter twelve lists, piecemeal, various screens and dialogues to do with TCP/IP configuration. Print servers are discussed in chapter thirteen. DHCP (Dynamic Host Configuration Protocol) settings are viewed in chapter fourteen, without, of course, any indication of how to get a range of IP addresses in the first place. Chapter fifteen runs through the screens for the WINS (Windows Internet Name Service) and only then does sixteen explain what DNS (Domain Name Service) is. This book basically reproduces, with about the same level of detail, the Windows help system. At best it is a not-quite-complete desk reference to the administrative utilities in NT. Forget consulting. ------------------------------ Date: Sun, 1 Aug 1999 22:51:01 CST From: CuD Moderators Subject: File 12--Cu Digest Header Info (unchanged since 10 Aug, 1999) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) The mailing list is automated, so no human lies at the other end. CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ Readers wishing to auto-set their browsers to receive the latest issue of CuD can point to: http://www.soci.niu.edu/~cudigest/latest.html COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #11.35 ************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu