About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Fwd: study of women hackers, Governance in Cybersp


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Sun Nov 9, 1997 Volume 9 : Issue 82
ISSN 1004-042X

Editor: Jim Thomas ([email protected])
News Editor: Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.82 (Sun, Nov 9, 1997)

File 1--Fwd: study of women hackers
File 2--Re: Governance in Cyberspace
File 3--Re: CuD, #9.77, - Digital Copyright Controversy
File 4--The Internet as scab
File 5--Police forsee 'scary' electronic crimes
File 6--Invitation to try cyberjournal list
File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?
File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 4 Nov 97 17:45:59 -0800
From: "Gordon R. Meyer" <[email protected]>
Subject: File 1--Fwd: study of women hackers

---------------- Begin Forwarded Message ----------------
Date-- 10/31 5:47 PM
Received-- 11/04 11:33 AM
From-- Phil Agre, [email protected]

[Paul Edwards is an interesting and nice guy who wrote a good book on
the early history of AI entitled "The Closed World". His new project
concerns women hackers, and he's looking for relevant information and
potential interviewees. I'd much appreciate if you could forward this
to anyone who might be able to help him.]

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News Service (RRE).
Send any replies to the original author, listed in the From: field below.
You are welcome to send the message along to others but please do not use
the "redirect" command. For information on RRE, including instructions
for (un)subscribing, send an empty message to [email protected]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Date--Fri, 31 Oct 1997 12:38:37 -0500
From--"Paul N. Edwards" <[email protected]>
Subject--Pre-1985 Women Hackers?

I'm a historian of technology. Most of my work concerns the political,
social, and cultural history of computers and their uses. Members of this
list may know my book The Closed World: Computers and the Politics of
Discourse in Cold War America (Cambridge, MA: MIT Press, 1996). More
information about me is available on WWW at the URL below.

I'm now working on a historical article about women hackers, based largely
on email and telephone interviews. The purpose of the article is to
investigate myths and realities surrounding the role of women in
computing,
especially during the 1960s and 1970s, when most authors have argued that
hacking was more or less exclusively male. As I've met more and more women
recently who describe themselves as hackers, I've become interested in the
particular experiences of the small minority of hackers who were female.
(NB: I am purposely leaving the definition of the term up to respondents.)

I'd like to hear from women who fit any of the following categories:

1) self-identified hackers;
2) women who have had extensive involvement with hacker communities in
some
way, while not necessarily identifying as hackers; and
3) women computer professionals who have done serious thinking about the
gender roles of hackers.

I'm especially (but not exclusively) interested in women whose experience
dates from the period prior to 1985. I would like to interview as many of
you as possible, either by telephone, or by email. I've prepared a short
(but broad) questionnaire that can be the basis for either oral or written
responses. Interviews can be confidential, if desired.

I'm also looking for:

4) documents relating to women hackers. These might include, for example,
old email, other correspondence, newsgroup postings, or published
literature. Again, I'm primarily but not exclusively interested in the
period before 1985.

Hope you'll be interested. I will be happy to send you a copy of the
questionnaire or to interview you by phone. It would also be helpful to
have names/emails of other women who might be willing to participate.

Paul

---------------------------------------------------------
Paul N. Edwards
Senior Research Scholar and Lecturer
Program in Science, Technology, and Society, Stanford University
http://www.stanford.edu/group/STS/edwards.html
Director, Information Technology & Society Project
http://www.stanford.edu/group/itsp/

------------------------------

Date: Wed, 05 Nov 1997 11:08:40 +0100
From: Felipe Rodriquez <[email protected]>
Subject: File 2--Re: Governance in Cyberspace

Governance in Cyberspace (or what the EU calls the Information Society)
does not adapt to traditional power structures. These structures,
that we usually refer to as authorities, are in essence almost
always regionally bound; their authority and influence stops at
the regions- or countries border. One of the unique, and
unchangeable, properties of Cyberspace is that it moves over those
borders, and thus in many ways rejects the concept of local
authority.

Information in Cyberspace is distributed, and thus power is
distributed. There is no single entity that can change the way
things work on the Internet. But if there's a consensus about
something, change happens.

An example; The technical fundament of the Internet, the Request
For Comment (RFC) series, that form the underlying structure of
protocol standards, have been created mostly in a consensus
process. The people that created these standards where mostly
volunteers and scientists, although initially some where
commissioned by the US Advanced Research Projects Agency (ARPA).
These's RFC's today are basically created by Internet Engineering
Task force working groups, which are made up by people interested
in the topic; anyone can join an IETF working-group and
participate in the creation of a new Internet standard. There is
some loose coordination of these developments by the Internet
Architecture Board, connected to the Internet Society, but no-one
can pretend to control the course of events; in other words no-one
can pretend to govern the Internet. It is governed by broad
consensus.

Restriction of information in Cyberspace has proved to be
impossible, and assuming that power and information are
interconnected we could say that restriction of power in
Cyberspace to a government is impossible.

There's numerous examples that show how information flows in
unrestricted ways; the German government wants to prevent the
circulation of a certain document, called Radikal. The document is
published on a web site in the Netherlands, where it is not
considered to be illegal. The German Prosecutor General ordered
German providers to block this page. Immediately afterwards the
banned document is copied to 50 places on the Internet, all over
the world. A year after the German attempt to censor the document,
Germans can still easily access it on the Internet unrestricted by
censorship. This example demonstrates the limits that are imposed
on the power of the German government; they could not prevent
their citizens from accessing a document the government did not
want them to read. The power in this case was distributed, at the
expense of the power of government; it was given to the German
citizens who can now decide themselves if they want to access and
read this document or not.

Another example; the government in Singapore is very anxious to
control the information it's citizens access on the Internet. To
obtain a level of control they've installed several gateways that
are under the influence of the government. There's also a number
of mandatory proxies that filter certain addresses. People inside
Singapore have demonstrated that despite the attempt to control
access to certain information, this information is easy to obtain;
it proves to be impossible for the Singapore government to control
al the content on the Internet. There's now an estimated 1 billion
pages on the World Wide Web. It impossible to know the content of
all these pages and selectively filter them at the national proxy.
Even if this level of control would be possible for Singapore,
there's a famous phrase used by many on the Net; Internet routes
around censorship. If Singapore would accomplish a 'total-control'
system, it would still be possible to route around the
control-mechanisms by using second-level proxy servers outside
Singapore, or so-called anonimizers. Not to mention remailers and
other technology. The Singapore example shows a government that
tries to maintain power in the traditional way; by restricting
information. And reality shows that it does not work, only the
illusion of control is maintained.

The last example of free flow of information concerns PGP. PGP
stands for Pretty Good Privacy, this is encryption software one
can use to protect email and other documents. The encryption used
in this program is so strong, that it cannot be exported from the
USA to other countries (export of strong crypto is illegal in the
US). But since the first version of PGP, version 1.0, it has been
available all over the world. People simply downloaded the
software from the US, and distributed it around the world.
Version 2.0 was created in Europe to avoid US export restrictions;
this version has also been distributed around the world. The
latest version of PGP, version 5.0, was created in the US by the
company PGP Inc. In a matter of days after publication of this
software it was available in Europe, despite US export
restrictions. Later on people scanned in the source-code, to
create a legal' copy of the program (export of source code is not
illegal in the US, it is considered free-speech). Just a few days
ago version 5.5 of PGP was published in the US, and it is already
available outside the US. PGP has demonstrated that export
restrictions of data and software are impossible to maintain. Even
the US government cannot control the free flow of information, and
the distribution of power that is a consequence of this free flow.

Governments are easily tempted to create systems of control on the
Internet, or to try and sanction policy. These attempts are taking
place in various shapes and forms, like self-regulation by the
market, and content-labelling initiatives.

In the EU a lot of effort is invested in self-regulation by the
market. The market, and the companies in the marketplace, are
easier to control than the chaotic mess of individuals, because
economic instruments can be used to force the players in the
market into a certain direction. By self regulation the
authorities shift part of power to the marketplace in an attempt
to maintain order and stability in Cyberspace. When self
regulation is closely watched one sees that it comes down to
companies governing their customers. Self regulation in practice
means that an internetprovider has to prevent the questionable
expressions of his customers. Self regulation could also be called
the privatization of authority. The concept of self regulation of
Internet by the marketplace shows the decline of state-authority,
and may, in an extreme situation, lead to its downfall. Self
regulation is dangerous; the market will always try to avoid
obvious risks. A customer that expresses dubious statements is a
risk; a company prefers to 'selfregulate' and prevent the
expression of this customer, rather than risk a legal procedure.
The company may be held liable in some way, and liability costs
precious money. Self regulation can easily lead to restriction of
established rights, like the right on freedom of expression. This
may sound extreme, but it is not. Reality proves this argument;
when the German providers where asked to prevent the publication
of 1 document originating in the Netherlands, they did not have
the technical means to single out this document. Thus they
obstructed an entire web server, with more than 10.000 other
resources on-line. They did this because they where afraid of
prosecution; that would harm their image and cost a lot of money
in legal fees. Thus it was preferred to 'self-regulate' and
prevent the document, and 10.000 other resources, to be accessed
by German citizens. Not only did this act of 'self-regulation'
infringe the right of free-expression, it also obstructed the free
flow of goods and information within the European Union. Similar
examples exist all over the world; providers prefer to disconnect
their customers before allowing them their right of free
expression. Freedom of expression is in many cases regarded as
risk instead of a universal right.

Another attempt to establish more control on the Internet is the
technology of labelling and filtering. Content labelling and
filtering techniques are propagated to protect children, and to
achieve 'downstream' filtering of content (filtering by the user).
Many question if such technology would achieve a safer Internet
for children; the Internet is basically an adult zone, and very
difficult to turn into a safe haven for children. But if labelling
and filtering technology is implemented, it could easily be used
for 'upstream' filtering; by the provider, government or other
organizations. A country like Singapore would of course consider
such technology to be a gift from heaven, because it allows better
control of what information the citizen accesses. It establishes
the traditional way of government control; restriction of
information, and is thus an attempt to keep things the way they
where in the industrial era. Earlier in this message I stated
that on the Internet things are achieved by consensus, and not by
authority; thus content-labelling and filtering technology will
not be implemented. Only a fraction of people want this
technology, most people do not. Most likely labelling will not
happen because the consensus is absent.

Traditional structures of authority increasingly lose their value
in a worldwide networked environment, no single regional authority
can establish total control in Cyberspace. Control is distributed
to its citizens. In many ways this is beneficial for the citizen.
In some ways it may not be. But at this moment it is not clear
where problems may arise, and where action should be taken to
avoid these problems. We are in a transition phase, where only few
things are clear. Only time can tell where this development will
bring us, but it will profoundly change the way governance works.

------------------------------

Date: Sat, 1 Nov 1997 19:10:00 -0800 (PST)
From: "Bruce J. Bell" <[email protected]>
Subject: File 3--Re: CuD, #9.77, - Digital Copyright Controversy

I'm sure this CuD has stirred up a lot of controversy; here I am to
add my $.02 to the fray....

Permission granted to edit for size and publish in CuD.

>Date--Sun, 26 Oct 1997 13:46:48 -0600 (CST)
>From--Wade Riddick <[email protected]>
>Subject--Telerights II - Current Digital Copyright Controversy
>
> Open Letter to Chairman Tauzin Concerning
> the Current Digital Copyright Controversy
>
> © 1997 By Wade Riddick
> All rights reserved
> Circulate freely without alteration

[from the introductory section of the letter]

> My research goal has been to discover and then advocate such
>methods in the hopes that we can return to more of an open market in
>intellectual property. I believe that if someone buys a book in
>hardback, they ought tobe able to buy, 'own' and resell its digital
>'copy' in exactly the same fashion they can with the physical
>document. Decisions like 'renting' software are most efficiently
>left to free enterprise and not mandated in the law. Once
>intellectual property is open to rental, lease, outright purchase
>and even bundling like financial options-just as any other form of
>property-then its market will expand as fruitfully as other capital
>markets have in the last decade. The more flexible the law is in
>rewarding entrepreneurs, the more complex, developed and profitable
>the marketplace will become.

First off, this doesn't sound like a "research goal" per se. It
sounds like Mr. Riddick has an idea what he would *like* to be true,
whether or not research actually indicates it to be feasible. This
is reflected in the content of his letter, where he consistently ignores
the question of whether the prerequisites necessary for his proposals
can (or should) be met.

Since this prerequisite is, effectively, "design all computers to
refuse to duplicate data with a copyright notice", one might
reasonably ask how this will be accomplished.

As wonderful as Mr. Riddick's vision for the future of
intellectual property may be, I expect that even if it were
possible, the negative consequences of enforcing this requirement
would dwarf the possible positive consequences of the resulting
commerce.

The idea of adding a "copyright chip" to all computers, and all
its ancillary requirements of implementation and enforcement is by
no means new. I can't think of any specific references, but the
idea is certainly old-hat to me; the reason it isn't discussed
much is mainly that it's such a dumb idea on its face. It sounds
like an exerpt from the paranoid speculations of Richard Stallman,
though if it is ever implemented, it would of course mean that
those speculations were in fact justified...

Certainly, it's much more invasive than the "Clipper Chip"
proposal was, so it fails for the same reason that initiative did:
why would anybody buy crippled computers when un-crippled ones are
available? And how can you possibly reduce the availability of
un-crippled computers without banning their sale and manufacture?

Although I'm sure this kind of proposal is a wet-dream to people
in the recording industry, the movie industry, and the FBI, I
doubt it will receive any kind of welcome from the computer
industry, or from ISP's, or from the lowly consumer. I
particularly note the implication that "liability" be used as a
stick to drive consumers into cooperation with this scheme, as
well as ISP's, and (presumably) the computer industry in general.

At the consumer level, aside from questions of overall
desirability, the proposal that digital signatures and watermarks
be used to track down and punish the owner of the "original copy"
of a work that is distributed outside this proposed copyright
system seems doubtful.

Consider that deliberate "pirates" could take the simple expedient
of finding multiple copies of the original work. Any elements in
the plaintext that are identical between all instances could not
be used to identify the original purchaser; while elements that
differ are those that may contain purchaser information, and can
be scrambled, deleted, or even ignored if the "pirates" themselves
are untracable.

Digital watermarking is an interesting concept, and it may be
useful for some things, but it is not useful as a copy-protection
scheme.

Aside from this, the proposal relies on the copy-protected data
being distributed in digitally-signed encrypted form, and somehow
deleted after being viewed. Consider that any software for
displaying or manipulating such copyrighted data in an "approved"
manner will necessarily have to deal with the data in a plaintext
format.

No matter what auxiliary "tamper-resistant" hardware is installed
on the computer, once the data is in a form suitible for display
and manipulation by the software, there is no practical way this
hardware can keep the software from saving the plaintext data.

Unless, that is, all software permitted to run on computers must
be pre-approved by some agency as secure in this respect, and
digitally signed so that the computer will recognize and execute
it. Note that for practical purposes, this will prohibit private
individuals from writing and executing their own programs to run
on the computer. Note also the difficulty of producing programs
that are bug-free, much less "secure"...

Another possibility is that an entirely new, highly secure OS be
designed that prevents programs permitted access to copyrighted
information from storing any data in a generally-accessible
format. Again, assuming such an OS is designed with no bugs or
security holes, all other OS's must necessarily be forbidden, and
no modified, unapproved versions can be tolerated. It will also
be inconvenient to use, since many possible features of programs
will be prohibited. (e.g., copyright-enabled programs will be
unable to store anything...)

A question that Mr. Riddick asks, but does not effectively answer,
is: who will pay for developing this software? He suggests that
"It can be bundled into the general expense of developing the
'information superhighway.'" The above problems suggest that that
this cost is enormously greater than he has considered.

Also, there is no "information superhighway" general expense
account. (the mere fact that Mr. Riddick would mention such a
cockeyed concept as a putative source of funding is astounding)
The question of who would pay the costs for such a program is not
trivial. I submit that no software developer would accept the
requirements and limitations necessary for this proposal, even if
they could sell it in a market where software without these
limitations is available. Perhaps they, too, must be made liable
for all users of their product...

------------------------------

Date: Tue, 28 Oct 1997 13:58:51 -0500
From: Andy Oram <[email protected]>
Subject: File 4--The Internet as scab

An interesting article appeared in the October 28 Boston Globe about
striking teachers in the province of Ottawa. The strike is over
typical work rules ("class size, length of the school day, and number
of hours of teaching time"). But one paragraph in particular caught my
eye:

If the strike continues, provincial authorities said,
they will urge parents to educate their children at home
using assignments and learning aids provided on the
Internet.

-----------------------------------------------------------
Andy Oram O'Reilly & Associates, Inc. email: [email protected]

------------------------------

Date: Mon, 3 Nov 1997 23:51:17 -0500 (EST)
From: Stunt Pope <markjr@shmooze.net>
Subject: File 5--Police forsee 'scary' electronic crimes

In the Nov/3/97 Toronto Star, staff writer Cal Millar penned an
article headlined "Police forsee 'scary' electronic crimes". This
sentiment came out of the International Association of Chiefs of
Police conference last week where the chiefs of the 50 largest
cities in North America were given "confidential briefings".
Toronto police chief David Boothby said in an interview "Expect to
find frauds we never imagined". Alas, he could not reveal "details
of confidential meetings", but he further elucidated the situation
as "pretty scary".

Boothby went on to say that organized criminals will be able to
electronically steal from accounts and use scrambled
communications to plan crimes.

Mission accomplished in convincing my town's top cop of the evils
of secure crypto, from the sounds of it. The rest of the attendees
seem to concur, as they asked the telecommunications industry "to
provide technology to let police intercept scrambled communication
from criminals who use high-tech cellular and other transmission
systems to thwart law enforcement efforts and avoid detection."

All this makes perfect sense from the point of view of federal law
enforcement officials, politicians and lobbyists who oppose secure
crypto and are slugging it out to have it banned: get all the
chiefs together in a room, scare them sh*tless with tales of child
porn rings and a-bomb schematics being transmitted heavily
encrypted all over the place and then send them home to spread the
word.

------------------------------

Date: Wed, 5 Nov 1997 11:32:36 GMT
From: "Richard K. Moore" <[email protected]>
Subject: File 6--Invitation to try cyberjournal list

I'd like to an extend an invitation to join the cyberjournal list, at least
on a trial basis - the traffic is not heavy. Cj was featured as TipWorld's
Mailing List of the Day for 10/23/97. They described the list as follows:

CYBERJOURNAL
CJ for short, this is one of many lists sponsored by the Computer
Professionals for Social Responsibility. A moderated forum to talk
about anything you want, recent posts include juicy conspiracy
theories about Princess Diana's death, the increasing emergence
of global monopolies, and international corruption. Perspectives
from around the world, specially written articles, quotes, and
cross-postings of other newsletters are common.

In fact cj is more like a "journal" than a "talk forum", and the focus is
on globalization, the changing architecture of world systems, political
realism, propaganda and mind control, democracy, and the opportunities and
challenges for progressive activism.

Coming up on cj will be a new series of articles/essays which will make up
the first-draft of a book aimed at comprehensively exposing the true nature
of globalization: "Globalization and the New World Order - democracy at a
crossroads". Interspersed with this series will be items of special
interest and responses/contributions from subscribers.

To join cyberjournal, simply send:
[email protected]
Subject--(ignored)
---
sub cyberjournal John Doe <-- your name there

------------------------------

Date: Thu, 6 Nov 1997 14:00:36 -0700 (MST)
From: Ken Arromdee <[email protected]
Subject: File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?

> ROPER: So now you'd give the Devil benefit of law!
>
> MORE: Yes. What would you do? Cut a great road through the law
> to get after the Devil?
>
> ROPER: I'd cut down every law in England to do that!
>
> MORE: Oh? And when the last law was down, and the Devil turned
> round on you--where would you hide, Roper, the laws all being flat?
> This country's planted thick with laws from coast to coast--man's
> laws, not God's--and if you cut them down--and you're just the man to
> do it--d'you really think you could stand upright in the winds that
> would blow then? Yes, I'd give the Devil benefit of law, for my own
> safety's sake.
>
> --Robert Bolt "A Man For All Seasons"

The above quote that tallpall used to head his message is rather
ironic in context. Fascism is certainly a devil. And yes, I'd
give the devil benefit of law, for my own sake. This quote
expresses _exactly_ why fascists should be allowed free speech,
and should not be forced off the net in any shape or form. It's
not because I particularly like fascists, it's because if you
restrict free speech in order to get rid of the fascists, you
pave the road towards restricting free speech for anyone.

And contrary to his claim that people who arguing for the rights
of fascists are not potential victims, I am Jewish.

It's also interesting to actually check out the list of FBI cases
and compare to how he describes it--the cemetery defacement case
was at the top of the page, but nothing suggests that the cases
on the page are listed in order from most to least important.

------------------------------

Date: Mon, 03 Nov 97 05:36:19 EST
From: [email protected]
Subject: File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
Computer Privacy Digest Mon, 03 Nov 97 Volume 11 : Issue: 017
<snip>

Council Vice-President Chuck Busse offered an alternative to filtering:
making the names of people who access porn via city libraries public.
According to an article in the Detroit News: "under Busse's proposal,
which was not acted on, pornography viewers' names could be published
in newspapers, on the city Web site or made available to anyone who
files a Freedom of Information request through the city attorney's
office. The names would be gathered from city computer records and made
available to the public. Only people who call up sex sites on library
screens would be identified." I guess then the mob would know where to
gather and whose house to burn down. A couple of (other) problems come
to mind. One is that a login system would have to be set up so that
files accessed could could be matched to the patron viewing them. Woe
to the person who forgets to log off! Especially if the next person to
use the terminal is one of the city's porn addicts or a neo-nazi. I
hear the city has plenty of both. Of course all the sites accessed
would show up in a log file, not just the porn sites (as if it would be
easy to tell which were which), thus creating some of the biggest
privacy violations in the history of the United States.

Well, Warren city attorneys are used to being on the losing side of
costly litigation. Was this a serious suggestion? Did he think a lot
about this before hand or did he just blurt it out in haste so that
Gloria Sankuer would not be the only one to get credit for saving our
culture from decay? It looks as if Busse knows even less about the
internet and libraries than Sankuer. That's probably why he wasn't one
of the two council members appointed to work with the library board in
search of an internet filter. That honor went to St. Pierre, and the
council's internet expert Sankuer.

http://members.aol.com/neofrant/index.html

http://www.detnews.com/1997/macomb/9710/15/10150169.htm

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #9.82
************************************
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

 

TSHIRT HELL T-SHIRTS