About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Correction on CuD URL - http://www.soci.niu.edu/~c


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Sun Mar 29, 1995 Volume 7 : Issue 26
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Semi-retiring Shadow Archivist: Stanton McCandlish
Intelligent Agent: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Monster Editor: Loch Nesshrdlu

CONTENTS, #7.26 (Sun, Mar 29, 1995)

File 1--Correction on CuD URL - http://www.soci.niu.edu/~cudigest
File 2--ACLU Release on USSC Justices and Computer Privacy
File 3--Nationwide Electronic Open Meeting - Call for Public Access Sites
File 4--Final Version of Public Access Site Announcement
File 5--Censorship at University of Memphis
File 6--Sacred Cows in Cyberspace
File 7--Italian BBS returned!
File 8--Cu Digest Header Info (unchanged since 19 Mar, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 2 Apr 1995 10:11:45 CDT
From: CuD Moderators <[email protected]>
Subject: File 1--Correction on CuD URL - http://www.soci.niu.edu/~cudigest

The CuD web URL was inadvertantly misprinted in the last issue.
The CORRECT URL to access back issues of CuD and other cyber-related
resources is:

http://www.soci.niu.edu/~cudigest

Thanks to those who pointed out the error. Thanks also to those
who made suggestions for things to add.

Also, the next issue of CuD will likely not be for a week or so,
because of a sociology conference this week.

------------------------------

Date: Thu, 23 Mar 1995 22:22:31 -0600
From: [email protected](Jim Thomas)
Subject: File 2--ACLU Release on USSC Justices and Computer Privacy

ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU
NEWS RELEASE * NEWS RELEASE * NEWS RELEASE * NEWS RELEASE

Supreme Court Justices Express Concern About Computer Privacy;
Opinions Suggest Mounting Interest on Nation's Highest Court

For IMMEDIATE RELEASE
March 1, 1994

A majority of the justices of the U.S. Supreme Court, ruling in a criminal
evidence case, today suggested that they had serious concerns about the
potential invasion to individual privacy raised by the nation's increasing
reliance on computer technology.

In a series of opinions in a case from Arizona about whether evidence
seized by the police because of a computer error could be used during
trial, the justices raised questions about the impact of computers,
particularly on law enforcement.

"Although we believe the Court ruled incorrectly in deciding that the
evidence could be used during trial, I think the majority opinion is quite
narrow," said Steven Shapiro, ACLU Legal Director. "The more lasting
significance of the case," he added, "may be that a majority of the Court
seems quite troubled by the risk that computer technology poses to
personal privacy.

"In particular," Shapiro said, "a majority of the Court was clearly
unwilling to create a new and broad exception to the Exclusionary Rule
whenever government officials violate the Fourth Amendment based on a
computer error."

In his majority opinion for the Court, Chief Justice Rehnquist reversed a
decision of the Arizona Supreme Court, which had ruled that the evidence
could not be used because it had been seized during what turned out to be
an arrest based on a mistaken warrant. Justices O'Connor, Scalia, Kennedy,
Souter, Thomas and Breyer joined the Chief Justice's decision.

But Justice O'Connor wrote a concurring opinion, which was joined by
Justices Souter and Breyer, that discussed the growth of technology and
its impact on law enforcement.

"In recent years, we have witnessed the advent of powerful, computer-based
recordkeeping systems that facilitate arrests in ways that have never
before been possible," O'Connor said. "The police, of course, are entitled
to enjoy the substantial advantages this technology confers. They may not,
however, rely on it blindly. With the benefits of more efficient law
enforcement mechanisms comes the burden of corresponding constitutional
responsibilities.

And in another brief concurring opinion, Justice Souter, who was joined by
Justice Breyer, wrote that" our very concept of deterrence by exclusion of
evidence should extend to the government as a whole, not merely the
police, on the ground that there would otherwise be no reasonable
expectation of keeping the number of resulting false arrests within an
acceptable minimum limit."

Justice Ginsburg, in a dissenting opinion joined by Justice Stevens, wrote
that "widespread reliance on computers to store and convey information
generates, along with manifold benefits, new possibilities of error, due
to both computer malfunctions and operator mistakes."

"Most germane to this case, computerization greatly amplifies an error's
effect, and correspondingly intensifies the need for prompt correction;
for inaccurate data can infect not only one agency, but the many agencies
that share access to the database," she wrote.

In a particularly "conspicuous example," Justice Ginsburg said that the
computerized databases of the FBI's National Crime Information Center
(NCIC) contain over 23 million records, identifying, among other things,
persons and vehicles sought by law enforcement agencies nationwide.

"Thus," she wrote, "any mistake entered into the NCIC spreads nationwide
in an instant."

###
=============================================================
ACLU Free Reading Room | A publications and information resource of the
gopher://aclu.org:6601 | American Civil Liberties Union National Office
ftp://ftp.pipeline.com /aclu
mailto:[email protected] | "Eternal vigilance is the price of liberty"

------------------------------

Date: Wed, 29 Mar 1995 13:19:32 -0500 (EST)
From: "Lewis W. Olenick" <[email protected]>
Subject: File 3--Nationwide Elec Open Meeting - Call for Public Access Sites

>From the EXECUTIVE OFFICE OF THE PRESIDENT, OFFICE OF MANAGEMENT AND BUDGET

Please repost as appropriate.

Date: Wed, 29 Mar 1995 11:35:00 -0400 (EDT)
From: "Lewis W. Oleinick" <[email protected]>
Subject: File 4--Final Version of Public Access Site Announcement

PEOPLE AND THEIR GOVERNMENTS IN THE INFORMATION AGE

NATIONAL ELECTRONIC OPEN MEETING
May 1-14, 1995

CALL FOR PUBLIC ACCESS SITES

BACKGROUND:

In recognition of the growing importance of information
technology as a means for communication and participation in
democratic government, the Office of Management and Budget (OMB),
the National Telecommunications and Information Administration
(NTIA), the National Technical Information Service's (NTIS)
FedWorld, and the National Performance Review (NPR) will be
sponsoring an electronic open meeting entitled "People and Their
Governments in the Information Age," from Monday, May 1 to
Sunday, May 14, 1995. The US Government Printing Office (GPO)
will assist by providing telephone registration for Public Access
Sites and preconference information.

The meeting will seek to garner public opinion on the use of
information technology by Federal, State, Tribal and local
governments. The electronic open meeting will encourage public
discussion about the respective roles of the Federal government,
State, Tribal, and local governments, industry, the public
interest and library communities, academia, and the general
citizenry in creating an electronic government.

One of the fundamental tenets of the Clinton Administration is
that government information is a public asset and valuable
national resource. This open meeting is an extension of earlier
efforts, such as the Government Information Locator Service
(GILS) initiative, to establish a framework for governments'
roles and activities in the information age. In early April, OMB
will publish a "Notice of Inquiry" in the Federal Register
setting forth the five topics mentioned below, referencing key
reports and other documents, and seeking comment.

Along with the traditional method of mailing in responses to a
"Notice of Inquiry," the open meeting will be conducted through
our nation's electronic networks including: the World Wide Web,
newsgroups, e-mail listservs (mailing lists), commercial on-line
providers, Public Access Sites, and dial-up bulletin board
connections.

HOW THE CONFERENCE WILL BE CONDUCTED:

FedWorld will create five e-mail discussion groups. The five
discussion groups will also be accessible through five
corresponding Internet newsgroups, the World Wide Web, and
dial-up bulletin board connection. Each discussion group will be
devoted to a specific topic relating to "People and their
Governments in the Information Age." Each topic will be hosted
by one or more experts, who will provide an introductory
statement to initiate the discussion and who will also take part
in the discussion.

Attendees will participate in the conference by replying to the
hosts' introductory statements, posting statements or comments,
and by replying to the statements and comments of other
attendees. We are seeking the broadest possible level of
participation emphasizing input from a wide spectrum of
Americans. The open meeting will focus on five topics:

Services -- from emergency help and health care to business
licenses.

Benefits -- from social security and food stamps to small
business grants.

Information -- from declassified secrets and travel aids to
satellite weather maps.

Participatory Democracy -- ensuring everyone's chance to be
heard in a democracy.

Technology -- how the technical portion of electronic
government will work.

NEED FOR PUBLIC ACCESS SITES:

A primary goal of the meeting is to enable as many Americans as
possible to participate in the dialogue. This includes people
who do not have a computer with a modem, or access to the
Internet. In order to ensure participation by the "unconnected,"
public and private organizations are needed to volunteer as
"Public Access Sites."

The following criteria will apply to institutions interested in
serving as a Public Access Site:

* Willingness and ability to make computer facilities
available, free-of-charge, to the general public on a full-
or part-time basis throughout the two-week meeting, and to
provide logistical and technical support to the public.

* Ability to access Internet e-mail, newsgroups, or
the World Wide Web. Public Access Sites should not use
Telnet to access the FedWorld bulletin board. Because the
number of access ports at FedWorld is finite, FedWorld
prefers to reserve dial-in and Telnet capacity for
individuals who seek to use the FedWorld BBS as their
primary means of participating.

* Willingness and ability to publicize your
institution's participation as a Public Access Site to the
local media and community, and answer local public and press
questions about participation.

* Willingness to be listed in a national directory
of Public Access Sites that will be made available to the
public and press, before and during the meeting.

If your institution would like to serve as a Public Access Site,
please do one of the following:

Point your World Wide Web browser to:

http://meeting.fedworld.gov

Or, send a blank e-mail message to:

[email protected]

In response to your e-mail, you will receive an automated
response detailing how to register as a Public Access Site. If
you do not presently have e-mail, newsgroup, or World Wide Web
capability but plan on having such capability by the time of the
meeting, you may register as a Public Access Site or receive
general end user information by calling the GPO Access User
Support Team at (202) 512-1530.

If you would like more information about the content and format
of the meeting, please send a blank e-mail message to
[email protected]. You will receive an automated
response providing additional detail for the electronic open
meeting.

Thank you for your interest in making this meeting more
accessible to the public!

------------------------------

Date: Thu, 30 Mar 1995 11:07:35 -0500 (CDT)
From: [email protected]
Subject: File 5--Censorship at University of Memphis

>Quick background for non-UMEM people (this is being posted several places):
>
> David Hooper posted an article to umem.personals, a local University of
> Memphis newsgroup, and the post was considered "obscene". His VAX access
> was cut off, and only recently reinstated until some firm decision is
> reached by Judicial Affairs.
>
>I talked to Dean Kathryn Story today on the phone, and we discussed the
>situation. Since I seem to have the only copies of the articles leading
>up to Hooper's allegedly "obscene" post, I'll be giving her a print out
>of those tomorrow, to show that the article should not have been taken
>at face value out of the context of the discussion. What follows in this
>post is a mixture of what we discussed, as well as some thoughts I've
>had since the conversation.
>
>----
>
>Apparently the motivation behind David Hooper's case was a thing called
>"Title IX", which requires the school to provide an environment free of
>sexual or racial hostility. I don't know whether it's a city, county, state
>or federal regulation, and I don't care, so don't bother looking it up for
>me. I agree with the spirit of the reg, just as I agree with the spirit of
>many controversial campus policies. The problems arise in the implementation
>and over-eager enforcement of such policies with broad, sweeping measures
>that tread viciously on the right to free expression.
>
>I think I can safely assume at this point that the faculty or staff members
>who complained about the post either (a) found it to be offensive and worthy
>of censure because it was a form of "harrassment", or (b) were afraid that
>some other faculty, student or staff member would interpret the post as
>"harrassment". Let me now offer my opinion that the people who complained
>were the same type of sniveling fools who endorse hate-speech codes. If
>you felt harrassed by that post, then you'd better crawl into a deep
>cave and never show your face in modern civilization ever again. Life
>is offensive. Accept it, get over it, and do something productive with
>your life, for chrissakes. Only a clueless newbie jackass takes a post
>at face value. I mean, hell, didn't you read any of the other posts, or
>did you just look for the ones by that smart-mouth kid who managed to
>push some tv station employees into a whining fit? As Mike Godwin,
>Chief Counsel for the Electronic Frontier Foundation, states in the
>recent Time Magazine in an article on the Exon amendment, "This is
>grounded in a vast ignorance of Internet communications." Newbies
>on USENET quickly learn to keep their goddamn mouths shut until they've
>listened and learned a bit. The complaining faculty and staff at this
>school could benefit from the same lesson.
>
>Harrassment by computer is a problem, and it does exist in some forms on
>campus. It seems that some complaints have found their way to Judicial
>Affairs concerning harrassing behavior in the computer labs, such as
>PHONE messages or emails to some female students. There have also been
>complaints about users viewing or printing out pornographic material in
>the labs.
>
>Now, there's not much gray area in direct person-to-person aggravation.
>Harrassment by email or PHONE or SEND (when we still had SEND) is stupid
>and can easily be punished. *HOWEVER*, viewing a Playboy .gif does not
>under any circumstances constitute harrassment by itself. This is not
>a Penthouse calendar that the user is putting up in the lab as a
>permanent decoration, this is material that he or she is viewing on his or
>her monitor for a short duration. If you don't like it, and don't want to
>see it, then KEEP YOUR EYES ON YOUR OWN FUCKING SCREEN. That's as simple
>as I can express that. Whatever the person next to you is doing is none
>of your fucking business.
>
>Such material is not obscene. How do you think Bob Guccione stays in
>business? It's not educational, but neither is Solitaire, DOOM, MUD's,
>MOO's, MUSH's, IRC, or email from your pal in Michigan.
>
>Words like "fuck", "pussy", "dick", and some others that have been seen
>on umem groups do not constitute harrassment. Take a stroll through the
>library, and read some of the more contemporary fiction. Expletives
>appear in many different works. Whaddaya wanna do, burn books, ya Nazi?
>Here's a simple equation: Offensive != (does not equal) Harrassing.
>The USENET groups should be treated like a mutant form of library with
>a quick turnover.
>
>To quote a letter in the CMU censorship WWW site:
>
> 'Complying with an order to pull controversial books would violate Article II
> of the code of ethics of the American Library Association (see
> _Intellectual Freedom Manual_, 3d ed., Chicago: American Library Association,
> 1989), which states: ``Librarians must resist all efforts by groups or
> individuals to censor library material.'' Why should material stored on our
> campus computer system be treated any differently?'
>
>To sum up...
>
>My advice to the university administration:
>
>1. Trust the students more. Issue warnings and investigate the situation
> BEFORE access is cut, not after.
>
>2. Err on the side of leniency. "Obscene" may have a legal definition, but
> it still includes a lot of room for interpretation. Remember, Memphians,
> once upon a time, Elvis' pelvic gyrations were considered obscene by
> the tv networks. Senator Exon is already the laughingstock of the
> 'Net, and he'll be a mainstream laughingstock within a decade.
>
>3. Learn the difference between "offensive" and "obscene".
>
>4. Lighten up and worry about important things. No one is going to
> successfully sue the school over a stupid post. Even the draconian
> and asinine Exon amendment no longer targets network carriers.
>
>5. Get rid of that stupid section of the conduct code. What the hell is
> wrong with a prurient interest in sex, anyway? Sex IS art, when
> performed with enthusiasm and abandon. The sexophobic attitude in
> this part of the country is laughable, hypocritical, and it makes me
> want to smack some people upside the head with a rolled-up Hustler.
>
>
>My advice to fellow students:
>
>1. Err on the side of caution. Try not to go adding gigabytes to your
> binary Hustler collection in a busy lab during working hours.
>
>2. If you have doubts about your post, add a disclaimer to the beginning
> of it. Make it funny and ridicule people who might have problems with
> your article.
>
>3. Pay some goddamn attention to situations like this and make your voice
> heard. When Carnegie Mellon removed 50 sex-related newsgroups from
> CMU's news server, they staged protests and rallies, and formed new
> student groups. This is your freedom that's being jeopardized,
> regardless of whether or not you agree with the post in question.
> You may be a Bible-thumper and want to censor "obscene" posts, but
> what if someone tried to interfere with your right to discuss the
> Bible online? Don't laugh, religious persecution has a long and
> distinguished history on this planet.
>
>4. Don't harrass people, especially in the computer labs. You know who
> you are, and you know what I'm talking about. Just fucking quit it.
> If she wouldn't give you the time of day before, she certainly won't
> want to talk to you when you're sending her suggestive messages while
> she's trying to compile a FORTRAN program. Quit being such a geek.
>
>
>Incidentally, Hooper's post and the preceding posts are available at
>
>http://www.ugcs.caltech.edu/~simon/censor.html
>
>To be continued...
>
>(posted to umem.talk, umem.general, soc.college, soc.college.grad,
> alt.censorship, comp.org.eff.talk, alt.comp.acad-freedom.talk,
> memphis.general, tn.talk)
>
>(forwarded to kstory, dbaker, and a few others)
>
>--
>Mark Dallara : I'm going to check myself out of this
>Graduate Student : bourgeois motel, push myself away from the
>Biomedical Engineering : dinner table, and say 'NO MORE JELLO FOR
>University of Memphis : ME, MA!!!!'
>* Florida '93, Memphis '95 * : - "Peggy Sue Got Married"
>http://www.mecca.org/BME/STUDENTS/mdallara.html
>--
>--
>Mark Dallara : I'm going to check myself out of this
>Graduate Student : bourgeois motel, push myself away from the
>Biomedical Engineering : dinner table, and say 'NO MORE JELLO FOR
>University of Memphis : ME, MA!!!!'
>* Florida '93, Memphis '95 * : - "Peggy Sue Got Married"
>http://www.mecca.org/BME/STUDENTS/mdallara.html
>--
--
[email protected]


------------------------------

Date: Wed, 29 Mar 1995 20:47:22 -0700
From: "L.Detweiler" <[email protected]>
Subject: File 6--Sacred Cows in Cyberspace

Editor:

In CuD #7.22, George C. Smith <70743.1711@compuserve.com> gives
a mini-review of C.Stoll's technological reactionism in the new book
"Silicon Snake Oil".

>Lasch closed his last book, "The Revolt of the
>Elites" with a biting assessment of the current mania with technology:
>
>"Those wonderful machines that science has enabled us to construct
>have not eliminated drudgery, as . . . other false prophets so
>confidently predicted, but they have made it possible to imagine
>ourselves as masters of our fate. In an age that fancies itself as
>disillusioned, this is the one illusion - the illusion of mastery that
>remains as tenacious as ever."

Cyberspace is a visceral example of how the distinction between technology
and its creators seems to be blurring increasingly. Where does the
human end and the machine begin? What parts of our lives are "artificial
technology" and what parts are "pure human interaction" or whatever
the converse is, presuming it even exists? It seems that humanity's
very best technology is seamless and invisible and in fact basic
extensions of ourselves and our senses. The phone can be thought of as an
extension of the human vocal cord, the television an extension of
our vision and sight. And cyberspace can be regarded as perhaps the
premiere, remarkable convergence of all sense-extending technologies.

Da Vinci wrote that "man is a marvelously constructed machine."
Thoreau wondered whether it was the case that machines were the slaves of
man, or vice versa. The view that we are the masters seems to be a driving
force of 20th century reality and civilization. Cyberspace in many ways
represents the pinnacle of the religion of the deification of technology.
We are now witnessing the very first reactionary ripples against the
digital onslaught, the bold new bid for supremacy by the bits over
the atoms.

Stoll's book is only an opening volley in what will become
an intensely passionate debate over the next few years. What's so
great about this cyberspace, thing, anyway? Proponents will help
strengthen their arguments by emphasizing that the "Information
Highway" is not going to bring about Utopia in the human institutions
of business, government, education, and religion, but it holds great
promise in at least surpassing the shockingly mediocre systems we find
ourselves inheriting today.

>He also has doubtless
>alienated the cypherpunks movement by essentially stating that while
>their technical accomplishments are neat, the problem they're trying
>to solve - the preservation of information privacy through the employ
>of cumbersome, almost unusable anonymous remailers and cumbersome,
>almost unusable encryption technology - looms trivial in the global
>picture. In fact, "Silicon Snake Oil" gores so many sacred cows in
>cyberspace it's guaranteed the author will be regarded like a
>dysenteric hog loose in the streets of Mecca on some parts of the net.

Speaking of the "cypherpunks movement" and "goring sacred cows",
I'm pleased to announce the establishment of a WWW dedicated to
the mad ravings of a notorious Internet crackpot, L.Detweiler, who
in many ways can be considered one of the earlier cyberspatial
reactionaries and satirists.

Just what exactly *is* the cypherpunk philosophy? What is "cryptoanarchy"?
Can cyberspace be used for negative ends such as brainwashing or
ulterior political agendas? What will be the effects of cyberspace
on government? Do governments invariably evolve toward
corruption? What's the difference between anonymity, pseudonymity,
and identification? Is free speech related to anonymity? What are
the political and social implications of "digital cash" or a
cyberspatial mafia? Is there such a thing as "morality" or "trust"
in cyberspace? If so, what does it entail? How should the internet
community deal with persistent crackpots?

These and other excruciatingly provocative questions have been given
the inimitable Detweilerian treatment at

http://www.csn.org/~ldetweil

(Detweiler is currently working on a disproof of Turing's halting problem
as well as finding environmentally safe and clean ways of disposing
used digital bits.)

------------------------------

Date: Mon, 3 Apr 1995 02:15:41 +0200 (DFT)
From: Luc Pac <[email protected]>
Subject: File 7--Italian BBS returned!

PRESS RELEASE 24/3/95

Almost a month after the police seizure of the BITS Against The Empire
BBS and raids on the homes of some members of the Clinamen
Self-Managed Social Centre of Rovereto (Trent, Italy), all the
material confiscated has finally been restored to its rightful owners.

After a check of its software and hardware, the BBS was immediately
put back on-line, resuming its linkages with the Cybernet, ECN and
Fidonet networks of which it is part. Its users once again have access
to the original document archive, and steps are currently underway to
update it thanks to back-up tapes which had been stored separately
from the BBS (in the cat's basket, to be precise). The tapes were also
to be duplicated onto a PC clone in the event that the authorities had
not returned the original BBS. This measure had been inspired less by
any bad faith on the part of the magistrates or police, and more by
their technical and social ignorance, which manifests itself every
time they come into contact with a logic different to their own:
freedom rather than control, creativity rather than conformity.
Already many sysops, in Italy as elsewhere, have had to pay the price
for what they had thought was simply a time-consuming hobby. Those
like ourselves who consider computer networking to be rather more
important than this should not be surprised by the recent experience
of BITS Against The Empire. The complete restitution of the material
seized suggests that nothing useful was found amongst it that might
confirm the charges laid out in the authorities' original warrants. In
any case, the three magistrates who ordered the raids have been unable
to find the time to meet with us over the past 23 days; similarly, the
carabinieri who actually returned the seized goods refused to answer
any questions concerning the enquiry or its future course. Good sense
suggests that the matter will close there, but at this point no one
can rule out the possibility that in the next few weeks or months the
official charge of subversion - along with any other charges that the
examination of the BBS may inspire in somebody's imagination - will
not resurface. So, a month after its forced closure, BITS Against The
Empire resumes its activities, happy to live in a democracy, but with
the back-up tapes still hidden away in the
cat's basket.
------------

BITs Against The Empire Labs CyberNet 65:1400/1 +39-464-435189
Underground Research & Documentation ECN 45:1917/2 +39-11-6507540

------------------------------

------------------------------

Date: Sun, 19 Mar 1995 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 8--Cu Digest Header Info (unchanged since 19 Mar, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB <your name>
Send it to [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.26
************************************
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS