About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Cu Digest, #8.39, 27 May 96 (re Lance Rose), Respo


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Sun Jun 30, 1996 Volume 8 : Issue 49
ISSN 1004-042X

Editor: Jim Thomas ([email protected])
News Editor: Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.49 (Sun, Jun 30, 1996)

File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)
File 2--Response to CUD #8.48--GAO hacker report: selling wind
File 3--Can you say "libel"?
File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such
File 5--Cyber Angel's response to Wired article
File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,
File 7--8th FIRST Conf & Workshop on Computer Security
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 25 Jun 96 16:53 PDT
From: Michael Gersten <[email protected]>
Subject: File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)

I disagree with one of the points that Lance Rose makes in his
post on Civil Liberties, and the On-Line circus.

Lance talks about encryption, as hiding "a message right in someone
else's face. It is like sticking a self-incriminating note in a
physical capsule that is uncrackably hard and strong, then lobbing
the capsule through the window of a police station to sit in the
middle of the floor among a bunch of cops, powerless to open it up
and figure out how to get the perp."

At the same time, he says that you can hide a message better by
leaving it in plain text, hidden among the huge mass of other things.

Except that today, searching ability is very strong, and only
going to get better.

Except that the police have shown that they will take an entire
computer and search it for anything that they want

Except that the goal is for everyone to use routine PGP encryption
on all messages that are not for everyone, just as everyone routinly
uses envelopes for their mail, and some people use security envolopes
that you can't just hold up to a strong light to see what's inside.

Except that it's a desire to stand out with an encrypted message,
but to be one of the normal flow of encrypted messages.

Except that any other form of hiding the data requires setting up
some special method, that has to be kept secret. With PGP, you don't
have to do anything special, really--the message is (at least with
the -a option) identified as a PGP message, and when (not if) PGP
is standard on unix and windows-96 (or -97) systems, will be just
as easy to read as plain mail.

------------------------------

Date: Mon, 24 Jun 1996 12:48:48 -0700
From: Roland Dobbins <[email protected]>
Subject: File 2--Response to CUD #8.48--GAO hacker report: selling wind

Response to CUD #8.48, File 1--GAO hacker report: selling wind

You recently quoted something called the "Crypt Newsletter" on the
subject of computer-related yellow journalism & governmental
scare-mongering on the threat to national security from "hackers".

While I certainly am concerned about the characterization of
"hackers" as the lepers of the 1990s, I am very disappointed that
CUD would publish such a blatantly partisan, left-wing rant, as
news. Do you intend CUD to become a forum for left-wing demagogues?
I should hope that you will continue to provide a balanced forum for
discussing issues of interest to all of us in the Net community, and
that you will in future at least insert a disclaimer before
reprinting material of such material. Otherwise, CUD will cease to
be a forum for intramural discussion of serious issues, and instead
become merely a mirror of the moderators' apparently left-wing
political views. What a shame, indeed.

I am a conservative, and I would like to point out the your
readership that it is a left-wing, liberal Democratic Administration
which has foisted the entire Clipper/Capstone/EES thing on us, and
which has consistently violated the rights of individuals and groups
in their quest to establish the Nanny State (Waco, Ruby Ridge,
etc.). In fact, Republicans in the House & Senate have been
vociferous in both opposing EES and in watering down the more
heinous provisions of Mr. Clinton's so-called "anti-terrorism"
legislation. The very sinister Filegate incident, which is far
beyond any "enemies list" kept by the Nixon Administration, clearly
shows the arrogance of liberals who think that government (i.e.,
themselves) always know best, and that their good intentions render
them above the law.

Remember, Chuck Colson went to jail for possessing one (1) FBI "raw"
file; the Clinton White House had at least 408!

>No one except an obscure lunatic named T. K. Jones in the Reagan
administration >really thought that either U.S. generals or their Soviet
counterparts would >call down the wrath of 10,000 nuclear warheads.

Whoever wrote this must be either extremely stupid or willfully
ignorant. Weapons are made to be used, and the strategic arsenals
of both the U.S. & the U.S.S.R./Russia, while serving as a deterrent
against a general conventional war, are indeed capable of being
launched if National Command Authority so decides. All one has to
do is look at the Cuban Missile Crisis or the Soviet's panicky
launching of Project RYAN during the 1980s to see that there was
(and still is, in my opinion) a real danger of unleashing
Armageddon. That's why SDI was, and continues to be, as issue of
vital import.

In closing, I would like to compliment CUD for providing a
(generally) balanced and informative resource on public policy
issues such as Internet regulation. While it is very easy to
criticize from the peanut gallery, I hope that my comments and
suggestions are received not as churlish sniping, but as advice from
a devoted reader who only wishes to assist in making CUD that much
more appealing to us all.

------------------------------

Date: Mon, 24 Jun 1996 12:33:56, -0500
From: MR ROBERT E DALY <[email protected]>
Subject: File 3--Can you say "libel"?

What a great idea! I think I'll submit the names of all my enemies!
Hmm, maybe I'll check with my lawyer first about slander and libel.

Response to article from Computer Underground Digest which follows:

Date--Sun, 16 Jun 1996 12:58:38 -0500 (CDT)
From--David Smith <[email protected]>
Subject--Child Molester Database on the web

Great World Internet Services has set up a "child molester" database
where Internet users can add records about people who are child
molesters. The ISP's philosophy is listed below. There is also a
separate disclaimer that information will be purged after 120 years,
and that Great World Internet Services does not verify any of the data.
There is a procedure for those who wish to dispute being entered into a
database.

There are expansion plans, too : deadbeat dads, crooked cops, elected
official crimes, known drug dealers, etc.

The site can be found at http://www.greatworld.com/public

>From its creator:

Too many times in our twisted society, criminals are treated as
victims and victims are treated as inhuman and ignored. When our
President, our (In)Justice System, and our legislative bodies fail to
provide us with proper protection, then we as citizens must unite in
order to protect ourselves. The time for passivity has ended and the
time for proactive intervention is upon us.

Therefore, as a parent and a citizen, I have made available a
database where child molesters can be listed. The difference between
this database and the databases of certain states (such as California)
are that this database is totally free. (There is no ridiculous $10
fee.) Also, anyone can look up information. In California, the state
feels that persons need to be able to prove a need for the information
before the information may be released. By golly, I believe that the
welfare of our children is right enough to know who these victimizers
are and that this information should be made available to everyone in
order to protect our families from joining the growing roster of
victims.

Also, this database doesn't require that those listed first be
convicted. If you are a victim and have been abused, then it doesn't
require a court of law to validate what you already know. The same
applies if you are a parent or a close relative and you have first hand
knowledge that someone committed the crime. The idea behind this
database is to make people aware of the criminals so that we can
protect our families before it is too late.

Most states do not list cases involving incest or victimization by
a relative or sibling. Feel free to list the victimizers here. If they
did it once, they are likely to do it again. Once a victimizer's own
children have grown up, they often turn to the children of others.

There are advocates of these vicious heartless tyrant criminals
who say that once a person who has served their time, they should be
left alone. Buddy, I have one thing to say to you. Don't let the
proverbial door slap you in the tail on your way off this page.

When a criminal victimizes a child, the child is emotionally
scarred for life. Nightmares often last throughout the person's entire
lfetime. Many times the person is unable to function effectively in a
relationship. No one is unable to ever take away what has been done. I
personally believe that their should only be one sentence for child
molestation--death. In my opinion, no child molester has EVER served
his time as long as he still lives.

This database will help to remind the people in communities
throughout America that certain people are dangerous and should be
watched.
-----------------------------------------------------

Message for Child Molesters: Before you molest your next victim,
think twice. Perhaps your name will be plastered here for all of the
world to see. Your mother, your father, your brothers and sisters,
friends, the world--will know what kind of a living monster you really
are.
[Internet Link Exchange]

Member of the Internet Link Exchange

This site designed, managed, and hosted by Great World Internet
Services

------------------------------

From: "David Smith" <[email protected]>
Date: Wed, 26 Jun 1996 21:09:57 +0000
Subject: File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such

> DON'T SHOOT THE SENATOR
>

<snip>

> Beeson and the ACLU understand these kinds of cases are far bigger
> than just one student angry about the slaughter of mountain lions, or
> an asshole sitting in the U.S. senate. It's about the entire structure
> of the Internet and how quickly Internet service providers will pull
> down their pants when the cops come calling. How ready is your own ISP
> to just hand over access to all your email when John Law appears at
> their door asking for "cooperation" against whatever they are
> labelling you: terrorist/child pornographer/anarchist/drug dealer,
> etc.?
>

When John Law has a search warrant, as in this situation, I
recommend that such cooperation be full and complete. You had better
have a very good reason (and lawyer) before you start willful
disobedience of legal orders.

That ISPs are willingly "pulling their pants down" for the police is
just not true.

------------------------------

Date: Wed, 26 Jun 1996 19:43:01 +0000
From: David Smith <[email protected]>
Subject: File 5--Cyber Angel's response to Wired article

Attached is an excerpt from an announcement sent to the Cyber Angels
giving Gabriel Hatcher's response to the recent Wired article.

------- Forwarded Message Follows -------
From-- [email protected] (CyberAngels Director --Gabriel Hatcher)
Subject-- AOL project appeal

5) There is an article about us in Wired magazine's July issue. Don't get
excited, it is not very complimentary. Most of the article is spent
repeating what hostile critics have written about us, saying things like
"they don't understand the global nature of the Internet" (like we are 1100
members in _32_ countries and we don't understand the global nature of the
Internet?) or "they don't realize that posts could be forged" (which was
one of the _first_ things that happened to _us_ when we started a year
ago!); or "they could mess up FBI investigations and be criminally liable
themselves" (some of our members are currently _teaching_ federal agents
how to download and decode binaries from the Usenet).

When will the journalists realize that CyberAngels are _not_ people who
have only just bought their first computer (although some of us are), but
also include users with 15 years+ Internet experience, programmers and a
number of professional law enforcement people.

The Wired article is critical of Curtis Sliwa (co-founder with me of the
project), since he does not use a computer. Hey guys, that's why _I_ run
the project. Does Curtis have a right to an opinion about the Internet,
given his lack of hands-on knowledge. Well I am not currently drilling for
oil in the antarctic ocean, but I think I have a right to be concerned
about the environment. Is Curtis informed? Well I keep him up to date.

Wired's journalist says he doesn't understand Curtis and my different
opinions, and questions how we can be effective since we disagree on
things. Well watch us! Do Curtis and I agree about the solutions to
Internet crime? No, not always. In many cases we disagree, but guess
what? We don't have a problem living with the fact that we are not Clones
of each other. It's called a pluralistic society guys, and it requires
tolerance to live in. For those of you who didn't know, CyberAngels is not
a revolutionary organization. We believe in and practice tolerance of
diverse cultures and beliefs, and since we believe in and practice freedom
of speech, we encourage healthy and vigorous debate and discussion, and we
can live with disagreement (unlike many of our critics!) CyberAngels is
going strong, despite the fact that our members wouldn't agree on
everything. What we have in common is a shared Mission statement and an
agreed Codes of Conduct. That's enough for me. I don't mind which side of
your bread you all butter! ;)

*********************************************************
Gabriel Hatcher - CyberAngels Director

[email protected]

http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html
mirrored at: http://www.safesurf.com/cyberangels/

"All that is required for the triumph of evil is
that good people remain silent and do nothing"
(after Edmund Burke)

------------------------------

Date: Wed, 5 Jun 1996 06:13:32 -0400 (EDT)
From: NOAH <[email protected]>
Subject: File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,

---------- Forwarded message ----------
Date--Thu, 16 May 1996 14:55:05 -0400 (EDT)
From--Rick <[email protected]>

SUN USER GROUP
EAST COAST CONFERENCE and EXHIBITION

Monday, June 24 & Tuesday, June 25, 1996
Marriott Copley Place
Boston, Massachusetts

**********************************************************************
************* Register below for FREE admission to ***************
************* the biggest Sun Trade Show of the year. ***************
**********************************************************************

Since this year's SunWorld has been cancelled, SUG East is now the
ONLY major Sun conference of 1996. We're expecting over 2,500
attendees from around the country and more than 100 exhibitors, so
this is your best opportunity of the year to discover what's new in
the world of Sun and Java. SUG East is also the first East Coast Sun
show in three years so expect to see a lot of new faces among the
vendors and attendees. SUG East will feature an exhibition of the
hottest new products for Sun and Java and a technical conference to
keep you on top of the latest developments.

The SUG East Technical Conference

The SUG East Technical Conference will run both days of the show and
will feature classes on a variety of topics. SUG was one of the
producers of SunWorld, and our own series of technical conferences
receive tremendous critical acclaim for their variety of interesting
speakers. The SUG East conference include 25 talks by respected
speakers over the both days of the show. Each day will feature two
tracks of classes; Monday, June 24, will spotlight Java and System
Administration, and Tuesday, June 25, will concentrate on Security and
Internet Communication.

The SUG East conference will address the important issues and
difficulties of developing, managing, and maintaining a
mixed-architecture environment through a variety of talks by some of
the leading experts in the field. Featured speakers at the conference
include Art Carty, General Manager and VP of SunExpress, North
America; Robert Diamond, Senior Security Consultant for Sun
Microsystems; Peter Galvin, chief scientist for Corporate
Technologies, Security columnist for SunWorld On-line magazine, and
author of "Operating System Concepts"; and J.A. Cross, Java consultant
and contributing author to Que Publishing's "Special Edition: Using
Java". Some of the currently scheduled sessions include:

JAVA TRACK
1. Java and Application Development
2. Client-Server Development With Java
3. Is Java just C++ with a new hat?
4. Programming the Internet in Ada 95
5. Building for the Internet.

SYSTEM ADMINISTRATION TRACK
1. Introducing Solstice Autoclient
2. TCP/IP Operational Troubleshooting in a UNIX Environment
3. Solaris Volume Management -- What It Does and Doesn't Do (and How)

SECURITY TRACK
1. Firewalls and Network Security
2. Network Security Tools w/ CMIP Agents
3. UNIX Security Tools Workshop
4. Host Security Tools
5. Kernel Access Controls
6. Vendor Security Panel: featuring Sun, Cisco, Ascend

INTERNET COMMUNICATION TRACK
1. Web Site Implementation
2. The Intranet and Thin Client Technologies: Testbed for the Future?
3. Building a Multi-Protocol Data Infrastructure
4. Electronic Commerce for Software over the Internet

More sessions are being added regularly, contact [email protected]
for the latest information. Registration for the SUG East Technical
Conference is seperate from the FREE Exhibition registration and
requires an additional fee. Earlybird Conference registration is $295
until June 10th. After June 10th, conference registration is $395.
Members of the Sun User Group or Java-SIG reveive $50 off conference
admission. Most conferences concentrate on the hype and cost
considerably more, sign up for the SUG East Technical Conference today
to receive the best education at the best prices.

The SUG East Exhibition

The SUG East Exhibition will feature over 100 exhibitors of
application software, backup and storage devices, client/server
products, connectivity products, email, network security, software
development tools, terminals, training services and other products and
services of interest to the Sun/SPARC and Java community.
Registration for the exhibition is FREE until June 10. Use the form
below to send in your registration today!

The Sun User Group believes that trade shows should be fun, so in
addition to all the exhibitors at SUG East you can also experience the
the Colossal SUG Midway where you can...

...Discover the Forbidden Secrets of Modern Science at the
Internet Academy of Mystery!

...See the Future Today at the Theater of the Amazing!

...Talk to Exotic Peoples from Around the Globe at Professor
Phineas Q. Abercrombie's Communications Pavilion!

...Experience Heart-Stopping Thrills at the UNIX Job Fair!

...and many more special events and surprises!

The SUG East Trade Show has it all... The Internet Academy of
Mystery will present a series of FREE introductory half-hour lectures
from SUG's highly-skilled instructors designed to help trade show
attendees get a taste of some of the hottest new technology. Some of
the FREE 'mini-classes' to be taught include: Java; The Worldwide Web;
Internet Security; and Using Information Services.

The Communication Pavillion provides attendees with a way to keep in
touch with people back home, browse the Web, and try out interesting
new communication software.

SUG's Theater of the Amazing is a Product Demo Showcase where
attendees can gain valuable in-depth information and see special
demonstrations on the highlighted products of this year's show.

The UNIX Job Fair is a terrific opportunity for those attendess
looking for a new position, or anyone who wants to learn more about
the UNIX job market. Staffed by professional recruiters, attendees
can learn about hundreds of jobs currently available and improve their
resume and job-hunting skills.

The Sug East Exhibtion can Be Yours For The Low Price Of...
ABSOLUTELY NOTHING!!!

-------------------------------------

SUG East Tradeshow Registration

FREE registration for the SUG East Exhibition!

June 24-25, 1996
Marriott Copley Place
Boston, MA

REGISTRATION FORM

Mail, Email, or FAX registration to:

SUG East Registration
Sun User Group
1330 Beacon Street, Suite 344
Brookline, MA 02146 USA

Fax: (617) 232-1347
Email: [email protected]
WWW: http://www.sug.org/sug-east.html

Your registration must be received before June 10, 1996 in order to
receive your FREE pass to the SUG East Exhibition (there is a $25
registration fee for registrations processed on-site). Registration
for the conference is separate and requires an additional fee of $295
($395 after June 10th) with a $50 discount for SUG or Java-SIG
members. All conference registrants receive free passes to the
Exhibition.

For further information, contact [email protected], visit us on the web
at http://www.sug.org or call Team SUG at (617) 232-0514. For
information about advertising, sponsorships, or exhibiting at SUG
East, contact Charles Sumner at [email protected] or the above phone
number.

Name: ____________________________________________

Title: ___________________________________________

Company: _________________________________________

Address: _________________________________________

_________________________________________

City: ____________________________________________

State: ___________________________________________

Zip/Postal Code: _________________________________

Country: _________________________________________

Email Address: ___________________________________

Phone: ___________________________________________

___ Please register me for the SUG East Exhibition and Trade Show
(FREE until June 10, otherwise fill out the section below)

___ Please register me for the SUG East Technical Conference
(fill out the section below - includes Exhibition pass)

------------------------+-------------------------------+-------+-------+
ITEM | Price | Qty. | Total |
------------------------+-------------------------------+-------+-------+
------------------------+-------------------------------+-------+-------+
ADVANCE SUG East | FREE (until June 10) | | |
Exhibition registration | | | |
------------------------+-------------------------------+-------+-------+
SUG East | $25 (after June 10) | | |
Exhibition registration | | | |
------------------------+-------------------------------+-------+-------+
----------------------------------------------------------------+-------+
ADVANCE SUG East | $295 (until June 10) | | |
Conference registration | | | |
------------------------+-------------------------------+-------+-------+
SUG East | $395 (after June 10) | | |
Conference registration | | | |
------------------------+-------------------------------+-------+-------+
Conference discount for | - $50.00 | |
SUG or Java-SIG Members | membership number: ______________ | |
----------------------------------------------------------------+-------+
----------------------------------------------------------------+-------+
TOTAL | |
| |
----------------------------------------------------------------+-------+

All payments must be in US dollars; Checks must be drawn on a US bank.

[ ] MasterCard [ ] Visa [ ] AMEX [ ] Check

Cardholder's Name:____________________________________________________

Credit Card Number:___________________________________________________

Expiration Date:______________________________________________________

Signature of cardholder:______________________________________________



------------------------------

Date: Tue, 18 Jun 1996 21:50:54 -0400 (EDT)
From: NOAH <[email protected]>
Subject: File 7--8th FIRST Conf & Workshop on Computer Security

Date--Tue, 18 Jun 1996 10:11:07 -0700
From--Michael/Miguel J. Sanchez <[email protected]>
To--Multiple recipients of list BUGTRAQ <[email protected]>

-----BEGIN PGP SIGNED MESSAGE-----

This is just a reminder of the upcoming FIRST Conference and
Workshop this year. Please, forward this information onto
your constituencies and any other interested parties. For those
people with websites, please help advertise with a link to
one of the conference websites listed below. And lastly, if
it is possible to advertise the event in any advisories, bulletins
or newsletters, please do so, as this would be most appreciated.

######### SPECIAL NOTE SPECIAL NOTE SPECIAL NOTE ########

It is very important that if you have any plans to attend, please
register and make your hotel reservations *NOW*. This is very
important because of several factors:

1) Hotel occupancy is at all time high for this summer
and with the Usenix conference the week before, hotels
will be filled.
2) The hotel will only honor the FIRST conference rate
of $135/night till June 27, 1996. After this date, the rate
will only be provided on a space available basis.
The regular non-FIRST rate is $199/night.
3) The price of gas has increased greatly in the California
area and travel prices will be going up as the summer
travel season starts. People will use hotels more and
drive less.
4) Also the price of the conference does go up after July 13,
1996 and that date is quickly approaching.


- ---------------------------------------------------------------------

****************************************************
For the most up to date and complete information,
please see the URL hostsites

http://www.first.org/workshops/1996/
- or -
http://ciac.llnl.gov/firstconf/
****************************************************

The 8th FIRST Conference and Workshop on
Computer Security Incident Handling and Response

July 28-31, 1996
The Westin Hotel
Santa Clara, California
United States

___ _ _ ____ ____ ____ _ _ ____ ____ ____ ____ _ _ ____ ____
| |__| |___ | | | |\ | |___ |___ |__/ |___ |\ | | |___
| | | |___ |___ |__| | \| | |___ | \ |___ | \| |___ |___

The annual FIRST Conference and workshop event is the only event of its
kind. This event is focused on the field of computer security and most
specifically incident handling and response. Past conferences have been
held in Karlsruhe, Germany and Boston, Massachusetts, US. Each of these
conferences were international in scope and attendance with presentations
on the latest in vulnerability analysis, incident response, vulnerability
prevention, and general computer security. Additionally, these conferences
served as the foundation for the improvement of computer security worldwide
via sharing of goals, ideas, and information.

The 1996 8th Annual FIRST Conference promises to continue this ground
breaking work. Occurring in the heart of the Silicon Valley, home of the
microprocessor and the heartbeat of computing, this year's conference will
continue to promote FIRST organization goals of worldwide coordination
and cooperation.

_ _ _ _ _ ____ _ ____ ____ _ ____ ____ ___ __.
| | | |__| | | | [__ |___ | |__/ [__ | _]
|_|_| | | |__| | ___] | | | \ ___] | .

The Forum of Incident Response and Security Teams (FIRST), is an
international organization that brings together a variety of computer
security incident response teams. These teams include government
agencies, commercial companies, academic organizations and computer
vendors.

World-wide, FIRST aims to foster cooperation and coordination in
incident prevention, to prompt rapid reaction to incidents, and to
promote information sharing among members and the global community
at large.

Further information about the FIRST organization is available at
the FIRST WWW URL http://www.first.org/first/

_ _ _ _ _ _ _ ____ ____ _ _ ____ __.
| | | |__| \_/ | | | |\/| |___ _]
|_|_| | | | |___ |__| | | |___ .

Here are a few *extra* reasons to attend this year's FIRST Conference

The week prior to the FIRST Conference, The 6th USENIX UNIX
Security Symposium is being held in San Jose, CA. This means
that not only could you save money on airfare by staying over
a weekend, but you could attend two great security conferences
back to back. <http://www.usenix.org/sec96.html>

Meet other security professionals in the area of incident
and response.

Improve your security program with the ideas presented.

Save time searching for tools and resources.

Join in the sharing of a wide range of experience and knowledge.

Be a part of the "United Nations" of computer security organizations.

Bring your family and tour the Silicon Valley and San Francisco
Bay Area.


____ ____ ____ _ _ ___ ____
|__| | __ |___ |\ | | \ |__|
| | |__] |___ | \| |__/ | |

The following scheduled events are subject to change till the
time of the conference. For the most up to date information
please refer to the conference URL referenced at the beginning
of this document.

<650 lines snipped for brevity>

For the most up to date information, please refer to the FIRST conference
WWW page URL referenced at the top of this document.

The FIRST Conference, first.org, Inc., and Conference Management Services
want this conference event to be a rewarding event for all attendees. The
FIRST Conference, first.org, Inc., and Conference Management Services wish
to cooperate fully with any attendee who has a special need(s) or
requirement(s) or request(s). For information or assistance with
disability or special needs/services, please contact us via email,
fax, telephone or email.

Via postal mail: FIRST Conference
c/o Conference Mgmt Services
407 Chester Street
Menlo Park, CA 94025 U.S.A.

Via fax: +01 415-324-3150
Via email: [email protected]
Via phone: +01 415-329-0579

____ ____ ____ ____
|__| |__/ |___ |__|
| | | \ |___ | |
_ _ _ ___ ____ ____ ____ ____ ___ ____
| |\ | | |___ |__/ |___ [__ | [__
| | \| | |___ | \ |___ ___] | ___]

The State of California and the San Francisco Bay Area have a great
deal of activities and sights to offer the visitor. The following
WWW URLs are provided to those that are interested in the area and
the multitude of things to see and experience.

San Francisco Bay Area and Beyond
http://www.hyperion.com/ba/sfbay.html

<< Santa Clara >>

Santa Clara
http://www.xpand.com/Santa_Clara/index.html
Great America Theme Park
http://www.rollercoaster.com/pga1/pga/
Intel Museum
http://www.intel.com/intel/intelis/museum/
Frys
http://frys.fry-s.com/

<< San Jose >>

Winchester Mystery House
http://www.netview.com/svg/tourist/winchest/
Egyptian Museum
http://artdirect.com/california/san.francisco/arts.univ/santa.clara/egypt
The Tech Museum of Innovation
http://www.thetech.org/
San Jose Museums
http://artdirect.com/california/san.francisco/museums/sbay/homepage

<<Monterey>>

Monterey Bay Aquarium
http://sapphire.cse.ucsc.edu:80/mb/mba/
http://www.usw.nps.navy.mil/~millercw/aq/
Access Monterey Peninsula
http://www.campgrounds.com/ctpa/ca/regions/cc/cceditor.htm

<< Mountain View >>

Magic Edge
http://www.cygnus.com/misc/magicedge.html
NASA AMES
http://www.arc.nasa.gov/amesinfo/visitors_center.html

<<San Francisco>>

49 Mile Scenic Drive
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/49mile.html
Alcatraz
http://www.nps.gov/alcatraz/index.html
Exploratorium
http://www.exploratorium.edu/
Golden Gate Bridge and National Recreation Area
http://www.nps.gov/parklists/index/goga.html
Golden Gate Park
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/ggp.html
Water's Edge
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/wharf.html
Neighborhoods
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/neighborhoods.html
Marine World Africa USA
http://www.freerun.com/napavalley/outdoor/marinewo/marinewo.html
San Francisco Museums
http://artdirect.com/california/san.francisco/museums/sf/homepage

<<Palo Alto>>

Stanford University
http://www.stanford.edu/
Stanford Linear Accelerator Center
http://www.slac.stanford.edu/winters/pub/www/education/tour_slac.html

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #8.49
************************************


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS