Computer underground Digest Sun Nov 17, 1996 Volume 8 : Issue 81 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.81 (Sun, Nov 17, 1996) File 1--Review of Charles Platt's ANARCHY ONLINE File 2--Some Excerpts from ANARCHY ONLINE File 3--"NetLaw: Your Rights in the Online World" by Lance Rose File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd) File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sat, 16 Nov 96 15:53 CST From: Cu Digest Subject: File 1--Review of Charles Platt's ANARCHY ONLINE ANARCHY ONLINE. By Charles Platt. New York: Black Sheep Books. 368 pp. $24.95 (cloth). Those wishing to understand the history, development, and background of the "computer underground" generally refer to Cliff Stoll's THE CUCKOO'S EGG, Katie Hafner and John Markoff's CYBERPUNK, and Bruce Sterling's HACKER CRACKDOWN as among the most useful. Now, Platt's ANARCHY ONLINE joins this select set. Unlike the other volumes, which use the story of legal entanglements to organize the information in chronological sequence, Platt provides a smorgasbord of narratives covering topics (piracy, net porn), politics (legislative battles), law (suits and prosecutions), personalities (pick your favorite), events, movements, and history. Dividing his material into two sections, "Netcrime" and "NetSpeech," Platt offers the reader nearly 100 narratives mixed with rich description, occasional political commentary, and a dose of social critique as way of describing salient issues in Cyberspace. His introductory chapter of "A typical hacker bust" describes in a few pages the apprehension of the "dreaded Hollywood Hacker," whose home was raided in 1990 by law enforcement agents, guns drawn with a television crew in tow, for the heinous crime of "borrowing" an acquaintance's password and logging into a computer account without authorization. Although the "Hollywood Hacker's" offense was trivial, the incident illustrates the abysmal lack of familiarity of computer technology and "hacking" by law enforcement agents. It also provides Platt with an effective entry point into the emergence of the "computer underground." With Platt as our tour guide, our journey through the underground includes a panorama of "hacker BBSes, some we see from afar, some from the inside. Occasionally, we stop long enough to meet former "hackers" ("Dark Phiber," "Lord Digital," "Dead Lord," "Seth") and "hacker"-chasing agents (Scott Charney); Security wizards (Crypto-guru Phil Zimmermann, Dan Farmer, Robert Steele, the original "agent Steele" of CIA, not "hacking," fame, as federal agents learned to their confused embarrassment at a CFP conference several years ago); and an array of Net personalities. Platt provides information from Kevin Mitnick's some-time partner "Roscoe," who suggests that much of the personal information in CYBERPUNK was a spoof concocted by Mitnick and "Roscoe." He examines how state laws have curtailed Net liberties. He brings back names from the past, including Lorne Shantz, Bob Emerson, and Jake Baker. Martin Rimm returns in a scathing section that describes his "Netporn study" and Mike Godwin's perseverance in destroying the credibility of both the study and the author. Particularly interesting are the dozens of photographs of previously faceless Net personalities. Hackers, law enforcement agents, and others ranging from Cyberporn protagonists Philip Elmer-Dewitt/Martin Rimm and Godwin/Donna Hoffman; Anti-indecency warrior Cyberangel Colin (Gabriel) Hatcher and free-speech advocate Declan McCullagh; Joel Furr (sans t-shirt); and many, many others. Given Platt's literary and extensive writing background, it's not surprising that ANARCHY ONLINE is exceptionally well written, and while he on occasion seems tempted to move into political polemics, he is generally successful in pulling back. Given the magnitude of detail he presents, his accuracy is impressive, perhaps because he took pains to contact many of his subjects before publication to review his commentary. Readers who prefer extended symphonies to short riffs and three minute air-play routines might find the staccato style of brief tastes and images frustrating (Platt, I should mention, never mixes metaphors). But, the breadth and detail of this volume makes it well worth reading, and it will prove an invaluable reference source. And, it's currently reasonably priced. The is one problem with obtaining the book. ANARCHY ONLINE's hardcover edition is available by mail order only. FOR *CREDIT CARD ORDERS ONLY* DIAL 1-800-879-4214. Cover price is $24.95. BUT netizens get almost a 50 percent discount! If you say "I heard about it through the Internet" you pay only $12.95 (plus shipping). Extracts from the book are freely available for inspection at http://charlesplatt.com The paperback will be out next March from HarperCollins and will be distributed through regular bookstores. (But it will probably cost more than $12.95). It would make a great Christmas present or, better, a supplemental text for the classroom. ------------------------------ Date: Sat, 16 Nov 96 15:43 CST From: Cu Digest Subject: File 2--Some Excerpts from ANARCHY ONLINE +-----------------------------------------------------+ Maverick Security Expert Advocates Government Intervention to Secure the Internet Robert Steele spent most of his working life in various sections of the government bureaucracy until, at the age of forty-two, he finally decided to go it alone. "I was deputy director at the Marine Corps Intelligence Center," he says, relaxing on the couch in the comfortable, traditionally furnished living room of his home, which is nestled in wooded country in Oakton, Virginia. With nicely bound books, a couple of antique clocks, and elegant furniture, it's a peaceful refuge within easy reach of his former employers at the CIA, and no more than an hour's drive from the center of Washington, D.C. But there is nothing peaceful or genteel about Steele himself. "I had spent eighteen years as a professional intelligence officer," he says, "and discovered that a whole lot of classified data wasn't really there. We just had a whole bunch of facts about Soviet missile silos. Nothing on the Third World, for instance. At the Marine Corps Intelligence Center we were spending $3 million a year on a system for accessing classified data from the CIA, NSA [National Security Agency], and DIA [Defense Intelligence Agency]--and I found that for $25,000 a year I could get better data from open sources." By "open sources" he means academic studies, published papers, books, and databases accessible by private citizens via the Internet, with no security clearance necessary. "In 1992," Steele continues in an abrasive, rapid-fire style, "I had made open sources a policy issue at congressional level by working with Hill staffers who then forced Bob Gates, director of Central Intelligence [DCI], to set up an open-sources task force to review how he did things and come up with recommendations for improving them." Disgusted by the report that resulted, Stele quit and decided to go it alone. He started sponsoring his own conferences, the first of which was hugely successful. Among the speakers were the chief of staff of the Defense Intelligence Agency, a former science advisor to the President, and the deputy director of the CIA. Attendees included people from the intelligence community, John Perry Barlow (cofounder of the Electronic Frontier Foundation), and an assortment of hackers. The event gave Steele instant notoriety. "I became a public figure," he says. Encouraged by his successes, he became more ambitious. "My vision expanded," he says. "I wanted to help the American economy make better use of open sources. I became concerned with information security. Finally it seemed to me that the only answer was to devise and implement a national information strategy. I'm hoping that Gingrich or Gore is going to use that phrase--"national information strategy"--in a speech within the next two months, because I'm working with various staffers on the Hill and in the administration whom I really respect. My ideas are bipartisan." Even though Steele became personally disillusioned with his area of government, he still sees government policy as the only way of taming anarchy online and safeguarding systems from intruders. "The role of government is to inform the citizenry about security problems that exist," he says. "Then it can establish standards to which the computer industry can rise." But why is a government policy needed? Why can't this problem be tackled by private industry? "The communications and computing industries have been criminally negligent, have not been held to any standards of adequate engineering. If we don't have a national information strategy that provides standards and due diligence law, we will never be able to protect ourselves. The first fundamental step is that our nation as a whole must be committed to communications security." I'm beginning to feel stuck in government-speak. What exactly does he mean by due diligence? "Due diligence is defined by regulation. Right now there is no due diligence requirement for communications and computing security. Stockholders are being screwed. They don't realize it, but they're paying a price for corporate management not protecting proprietary information properly. There's no law, no regulations, and no public perception." He pauses for emphasis. "This, I think, is the most fundamental single weakness in this nation." There's not a hint of doubt in Steele, and not a lot of false modesty, either. In 1994 he wrote a bill that was introduced in the Senate to establish his national information strategy, which would be managed by a chief information officer to be appointed by the Vice President. Steele would have liked Paul Strassman to hold that position. For himself he thought that a suitable title might be director of national intelligence, with a subordinate director of classified intelligence and a subordinate coordinator for public information who would also be director of a national information foundation that would encourage the free flow and accessibility of data through the nation. The whole package was supposed to cost half a billion dollars in the first year, rising to two billion in the fourth year and maintaining that level thereafter. The bill, of course, was never signed into law, and Steele admits that it had "zero impact." I suggest to him that the cost of it alone made it impractical, but he waves aside that objection. "If you're not talking in billions, no one takes you seriously. When you have trillion-dollar federal budgets, a program worth less than a billion is not significant because it's not going to have an impact on the nation as a whole. "The typical computer network," he goes on, "isn't like a house with windows, doors, and locks. It's more like a gauze tent encircled by a band of drunk teenagers with lit matches." At the same time, though, he still insists that hackers are not a cause for concern. "It is clear that eighty percent of bad things happening to computers are being done by authorized users doing unauthorized things. This was the conclusion reached by the Department of Defense during a one- year study. Hackers are just our warning signal, the sneeze that tells you you have a cold. Hackers are not a threat. Ignorance is the greatest threat. The individual, the organization, the nation that doesn't understand its electronic vulnerabilities is essentially placing itself at risk." Once again he stresses the need for a national policy to establish security standards. In the meantime, while we're waiting for government to implement his vision, he's scathing about institutions that don't take proper steps to protect [Sorry, but to view the rest of this text you'll have to read the book!] +------------------------------------------------------+ Pirate Boards: A Vanishing Species Only a few pirates still deal in warez--just for the fun of it. In the following case history, the pirate's real name has been changed at his request. "My handle was Axeman," says Mike Wollenski. "I used to run a BBS called the GrindStone. I started it when I was fifteen. It was a good ol' boys board, meaning that it only served people I knew by reputation, or personally. I had one phone lineand eighty megs of storage." According to Mike, he never charged anyone for membership or downloads. The operation was just a hobby. "Making money off stolen software is a fantastic way to have the feds come gunning after your ass," he says. The board ran without trouble for three years, serving a maximum of 150 users. In 1994 Mike went to college and set up a new version of his BBS from there. Still there were no problems, even though he was now dealing more heavily in stolen software. "I got back into the pirate scene big time," he says. "I loved getting uploads, especially uploads that were less than three days old. I used to have a contact at IBM who would be able to get us the latest OS/2 beta source codes for device drivers and utilities. He'd send it up and some guys would download it and it would spread from there." At Christmas break, Mike moved the BBS back home again and took things one notch farther. "Right around this time," he recalls, "in my AC [area code], 914, an interest in H/P/V/C/A started." H/P/V/C/A stands for Hacking, Phreaking, Viruses, Cracking (or Carding, depending on who you ask), and Anarchy. "Me, being the information hound that I was, decided to join a mail network called MOBNet." This was an informal store-and-forward message system. Mike would accumulate a bunch of BBS messages or other data, reduce their size with a file compression utility such as PKZip, then pass them to another BBS. He received material on the same basis. "On a good day," says Mike, "I would get in a couple hundred mes-sages, all dealing with hacking into systems, how to crack password files on Unix hosts, how and where to find credit card numbers, and, more importantly, how to protect yourself from these things happening to you. So here I was, a pirate board in 914--rather successful, as far as this area code goes--getting pretty new files, and a ton of information daily about the `darker sciences.'" On Christmas Eve Mike received a warning. "I get a call from a friend of mine, telling me, `Dude, shut it down! Kill it! Nuke everything, and close everything up! Some kid just got popped for credit card fraud, and he's telling the cops that he got it from you.' Needless to say, I freaked. I immediately took it down." Foolishly, though, after a couple of days he put everything back online. A couple more days after that, he was raided. "I'd been to the movies with my younger brother and a friend of ours from school. I think it was at ten-thirty or so. On our way back to my house, the car phone rings. Understand, it was my parents' car; I had to raid the change bin for the money to see the movie. My bro picks it up, says, `Yeah? Uh-huh. Hmmm. Uh . . . okay. Bye.' He turns to me and says, rather loudly, `You're going to jail! The cops came over to the house with a search warrant and took your computer and stuff. Mom and Dad are pissed!'" When Mike got home he found that state police had taken his 486SX/33 IBM-compatible computer, the monitor, keyboard, modem, mouse, and all his software--"including the stuff I had bought!" he says with a tone of wounded disbelief. "They also took most of my parents' software. They tried to take my mom's computer as well; I gather yelling ensued, and that computer never left the house." Mike was only a few days over eighteen. The police promised that if he cooperated, he'd be charged as a juvenile, there would be no felony charges, and his identity would be kept secret. This sounded like a good deal, so he supplied the password to unlock his system. According to Mike, the cops then proceeded to betray him. In February 1995 a local newspaper ran a two-part article on hacking in which Mike was the only person identified under his real name. A few months later, when Mike came home from the spring college semester, he found himself charged as an adult, with two class-E felonies carrying more than ten years of potential jail time. He was horrified. "In the end," he says, "my lawyer talked them down to a violation--disorderly conduct--with a $250 fine and twenty- five hours community service. But I had been so worried about the case, I couldn't finish my semester at school. The cops had lied to me outright in front of me and my lawyer, so I had no idea what they were going to do next, and I basically panicked." He regrets now that he cooperated. "I should have told them to go fuck themselves silly. But I gave them access to my files, and because of that, a good friend of mine also got busted. For all I know he went to jail; I don't really want to know." The main reason for police action against Mike's board was not the software but the file containing credit card numbers. "Most of them I got from a friend," he says, "but some of them came from carbon copies in trash bins outside the mall. It's easy to get them; you just go down there at two A.M. when all the rent-a-cops are enjoying their doughnuts." He insists, however, he had no interest in the numbers. "Once I had them--okay, great, now what? I never used any of 'em, because I have parents. They are better than any credit card I know of. I don't have to pay interest, I don't have a spending limit--hell, I don't even have to pay them back! So did I sell card numbers? No. Did I give them to people? No. Were they available if people left a message on my board? Yes. Just like they are available anywhere else in life. What it comes down to is that I was busted because I let people do what they wished with my hard-drive space. I think that what people did with my board was their own business. The police came in and violated that right." Mike's parents imposed some limits for a while: no modem usage, and he had to ask permission to make phone calls. Eventually he got his computer system back from the police-- everything except the hard drive--and computers are still his main interest. He's hoping to make a career out of them as a network technician. Meanwhile, he says, pirate boards are scarcer than ever. "After I was busted, all the local boards disappeared. As far as I know, there's only one board left in 914. There are still boards in other areas with a couple thousand people on 'em, but most are in the Midwest, where people are naturally [Sorry, but to view the rest of this text you'll have to read the book!] ------------------------------ Date: Wed, 06 Nov 1996 14:00:37 EST From: "Rob Slade, doting grandpa of Ryan & Trevor" Subject: File 3--"NetLaw: Your Rights in the Online World" by Lance Rose BKNETLAW.RVW 950406 "NetLaw: Your Rights in the Online World", Lance Rose, 1995, 0-07-882077-4, U$19.95 %A Lance Rose %C 2600 Tenth St., Berkeley, CA 94710 %D 1995 %G 0-07-882077-4 %I McGraw-Hill %O U$19.95 510-548-2805 800-227-0900 lkissing@osborne.mhs.compuserve.com %O pmon@osborne.mhs.compuserve.com %P 372 %T "NetLaw: Your Rights in the Online World" Very similar to his earlier "Syslaw" (cf. BKSYSLAW.RVW), this is a general guide to various legal aspects of life online. The major changes are the broadening of the scope from BBS level systems to include online services and the Internet, and very handy (and interesting) sidebars, which give a thumbnail sketch version of the topic under discussion. These usually include a reference to some specific case. Chapters address the issues of censorship, contracts, commerce, and copyright. Chapter four, which deals with the responsibility of the system operator in light of online dangers, does touch on the topic of malicious software. I was disappointed that this is limited to a not terribly accurate defining of terms, and almost no discussion of the admittedly confused legal situation. Further chapters cover privacy, crime, search and seizure, and a rather disappointing chapter on obscenity. Appendices include some very useful sample contracts, and various US laws. Given recent developments which have strongly indicated the international nature of the net and international legal ramifications, it is discouraging to see that Rose still presents only a limited and US-centric view. However, the general principles he describes are held in common law, and this book should at least provide guidance for the broader online world. copyright Robert M. Slade, 1995 BKNETLAW.RVW 950406 ============== Vancouver ROBERTS@decus.ca | "Daughters of feminists love to wear Institute for Robert_Slade@sfu.ca | pink and white short frilly dresses Research into rslade@cyberstore.ca| and talk of successes with boys/ User rslade@sfu.ca | It annoys/ Security Canada V7K 2G6 | Their Mums ..." - Nancy White ------------------------------ Date: Wed, 30 Oct 1996 16:14:58 -0800 From: Sara Winge Subject: File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly FOR IMMEDIATE RELEASE October 30, 1996 PRESS ONLY--FOR REVIEW COPIES, CONTACT: Sara Winge 707/829-0515 sara@ora.com O'REILLY PUBLISHES "WEBMASTER IN A NUTSHELL" Quick Reference Guide Covers HTML, CGI, Server Configuration, and More SEBASTOPOL, CA--The latest addition to O'Reilly's best-selling "in a Nutshell" quick reference series is "WebMaster in a Nutshell." This new book takes all the essential reference information for the Web and pulls it together into one slim volume. With a clean layout featuring easy-to-browse entries and a lay-flat binding, this book is a vital desktop reference for anyone who does work on the Web--content providers, programmers, and administrators alike. "WebMaster in a Nutshell" covers: > HTML 3.2, the markup language for Web documents > CGI, for creating interactive content on the Web > JavaScript, a scripting language that can be embedded directly into HTML > HTML extensions by Netscape Navigator 3.0 and Microsoft Internet Explorer 3.0 > Examples and descriptions of the HTML tags for creating frames, tables, and fill-in forms > HTTP 1.1, the underlying protocol that drives the Web > Configuration for the Apache, NCSA, CERN, Netscape, and WebSite servers > Perl 5, the programming language used most often for CGI > WinCGI, the CGI interface for Windows-based programming languages > Cookies, for maintaining state between multiple instances of CGI, Java and JavaScript programs > Server Side Includes, for embedding dynamic data into Web pages "WebMaster in a Nutshell" breaks up these topics into concise, distinct chapters, designed to make it easy to find the information you want at a moment's notice. This is a book that anyone working seriously on the Web will find indispensable. ### WebMaster in a Nutshell: A Desktop Quick Reference By Stephen Spainhour & Valerie Quercia 1st Edition October 1996 378 pages, ISBN: 1-56592-229-8, $19.95 ============================ For Review Copies Contact Kathleen Quirk (508)287-1882 kquirk@powersoft.com O'REILLY PARTNERS WITH SYBASE TO REACH WEB DEVELOPERS WebSite 1.1 Included in Internet Developer Toolkit for PowerBuilder 5.0 Sebastopol, CA, October 28, 1996 - O'Reilly & Associates, a leading Internet software developer and book publisher, has announced that it is partnering with Sybase to provide developers with tools for creating Internet and intranet business applications. O'Reilly's award-winning WebSite 1.1(TM), heralded for its features, ease of use and documentation, is now included in the Internet Developer Toolkit, a new product of Sybase's Powersoft development tools division. Internet Developer Toolkit, a companion product for PowerBuilder 5.0 for Windows, enables developers to quickly extend their current applications to the Web, as well as to build a new class of dynamic server-based applications. WebSite 1.1, winner of the Dvorak Award for Outstanding Server Software, is a 32-bit multithreaded Web server for Windows NT 3.51 or higher and Windows 95 platforms, which lets users maintain a set of Web documents, control access to a site, index desktop directories, and use a CGI program to display data from applications such as Excel, Access, and SQL Anywhere. WebSite 1.1 includes WebView(TM), a powerful Web management tool that provides a graphical display of all documents and links on the server. WebSite features a graphical interface for creating virtual servers, server side includes (SSI), and a framework which significantly improves the speed and efficiency of working with spreadsheets, databases, and other programs in environments such as PowerBuilder. Powersoft's Internet Developer Toolkit is currently available for the North American retail list price of $99. The product is available directly from Sybase, Inc. and its worldwide network of resellers and distributors. To locate the nearest reseller, interested individuals can call 1-800-395-3525. In addition to WebSite 1.1, Internet Developer tool kit includes Web.PB, based on the PowerBuilder development environment; the PowerBuilder Window Plug-in for running PowerBuilder applications in a Web browser; the DataWindow Plug-in, for manipulating and presenting database information; and Internet Class Libraries, enabling developers to maintain session or state information across HTML pages. ABOUT O'REILLY & ASSOCIATES, INC. Founded in 1978, O'Reilly & Associates is recognized worldwide for its definitive books on the Internet and UNIX, and for its development of online content and software. O'Reilly developed the Global Network Navigator (GNN), a pioneering web-based publication which it sold to America Online in June, 1995. In addition to WebSite 1.1, the company's other software products include second-generation server WebSite Professional(TM), WebBoard(TM), a web-based multi-threaded conferencing system, and PolyForm(TM), a web forms construction kit. Statisphere(TM), a Web traffic analyzer, will be the company's newest software product when it is released this Winter. O'Reilly & Associates' affiliate companies include Songline Studios, an innovative content developer for online audiences, and Travelers Tales, an award-winning travel book publisher. The company's Internet addresses are http://www.ora.com/ and http://software.ora.com/. ABOUT SYBASE, INC. Headquartered in Emeryville, CA, Sybase, Inc., is a worldwide leader in distributed computing solutions, with record revenues in 1995 of $957 million. The company provides customers and partners with software and services to create information management solutions, integrate information assets across heterogeneous systems, and communicate information throughout and beyond the enterprise. The company's product groups design and develop databases, middleware, application development tools and languages to reduce the cost and complexity of distributed computing, to create business applications for the Internet and intranets, and to build distributed data marts and warehouses. The company's Internet addresses are http://www.sybase.com/ and http://www.powersoft.com/. WebSite, WebSite Professional, WebBoard, Polyform and Statisphere are trademarks of O'Reilly & Associates, Inc. All other names may be registered trademarks or trademarks of their respective companies. ====================================== "BUILDING AN INDUSTRIAL STRENGTH WEB" IS FOCUS OF ISSUE 4 OF THE "WORLD WIDE WEB JOURNAL" SEBASTOPOL, CA--The World Wide Web Consortium (W3C) and O'Reilly & Associates announce the publication of Issue 4 of the "World Wide Web Journal." This issue focuses on the infrastructure needed to create and maintain an "Industrial Strength Web," from network protocols to application design. Over a year ago, the http protocol on the Web surpassed the file transfer protocol as the largest application load on the Internet. As a result, Internet performance is crumbling in many locations, network addresses are being consumed at a prodigious rate, and the extraordinary popularity of a handful of pages is crowding out the rest of the Web. This issue takes a detailed look at the technology--present and future--that's required to scale the Web to work for millions of hosts, tens of millions of users, and billions of pages. The papers in this issue shed light on these challenges, and offer state-of-the-art remedies. The "W3C Reports" section features papers from two workshops: the Joint W3C/OMG Workshop on Distributed Objects and Mobile Code and the Meeting on Distributed Authoring. The "Technical Papers" section heralds the release of HTTP/1.1 with several papers in addition to the HTTP/1.1 spec, including Future Directions for HTTP, What's New in HTTP/1.1: Design Enhancements on the Road to HTTP-NG, and Using Cookies with CGI: Maintaining State on the Web. The "World Wide Web Journal" provides readers with a direct connection to the work of the W3C. Every quarter, the "Journal" provides timely, in-depth coverage of the W3C's activities as well as independently refereed papers from around the world. WORLD WIDE WEB CONSORTIUM The World Wide Web Consortium [W3C] was created to develop common standards for the evolution of the World Wide Web. It is an industry consortium jointly run by the MIT Laboratory for Computer Science (LCS) in the USA; the National Institute for Research in Computer Science and Automation (INRIA) in France responsible for Europe; and Keio University in Japan responsible for Asia. Services provided by the Consortium include: a repository of information about the World Wide Web for developers and users; reference code implementations to embody and promote standards; and various prototype and sample applications to demonstrate use of new technology. To date over 150 organizations are Members of the Consortium. O'REILLY & ASSOCIATES O'Reilly & Associates is recognized worldwide for its definitive books on the Internet and UNIX. In the past three years, the company has expanded into other Internet-related endeavors, developing online content and software and conducting market research on the online services market. In 1993, O'Reilly developed the Global Network Navigator (GNN), a pioneering web-based publication which it sold to America Online in June 1995. The company is a major developer of Win32 software for the Internet, with software products including WebSite (Web server software for Windows 95 and Windows NT), WebBoard (Web conferencing system), and PolyForm (Web site form-building software). The Online Research Group, O'Reilly's newest division, was created to survey and profile the online services market. # # # World Wide Web Journal: Volume 1, Issue 4: Building an Industrial Strength Web A publication of O'Reilly & Associates and the World Wide Web Consortium (W3C) Fall 1996 250 pages (est.), ISBN: 1-56592-211-5, $24.95 ------------------------------ From: Noah Date: Thu, 31 Oct 1996 23:45:11 -0600 (CST) Subject: File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd) From -Noah ---------- Forwarded message ---------- Date--Thu, 31 Oct 1996 12:05:54 -0500 (EST) From--The Professor January 6-10, 1997 USENIX 1997 TECHNICAL CONFERENCE Anaheim, California, Marriott Hotel USELINUX Linux Applications Development & Deployment Conference Co-located with USENIX 1997 Technical Conference Co-sponsored by Linux International Attendees may pay one fee and attend both conferences. There are 20 day-long tutorials offered on January 6-7. Topics include: IPv6 Kerberos Approach to Network Security Secure Java Programming Introduction to Java Windows NT and Windows 95 UNIX Network Programming How Networks Work Topics in System Administration Web Security System and Network Performance Tuning Inside the Linux 2.0 Kernel Java Applets and the AWT UNIX Security Tools CGI and WWW Programming in Perl Administering a Web Server Device Drivers under Linux Solaris System Administration Beginning Perl Programming Writing Secure Code Creating Effective User Interfaces Java, the Web, Intranets, Security, Windows NT are among the topics of the Technical Program which takes place January 8-10. It begins with a keynote address by James Gosling, a creator of Java. 23 refereed papers present up-to-the-minute research. A second track of invited talks cover cryptography, Inktomi and AltaVista Search Engines, IPv6, benchmarks, and a new networked operating system from Bell Labs that offers unprecedented portability for applications and services. Linux Torvalds speaking on the future of Linux, is one of the highlights at the Linux Applications Development and Deployment Conference. USELINUX will offer tutorials and technical presentations for developers. Concurrently, those interested in the Linux marketplace may attend case studies and expert presentations on how to create a Linux-based business. An Exhibition on January 8-9 offers presentations of the latest hardware, software, and networking products from 55 vendors. ADMISSION TO THE EXHIBITION IS FREE. If you cannot make it to the conference but would like to visit the exhibition, please contact Cynthia Deno at 408 335 9445 or cynthia@usenix.org. For more program and registration information: Access our Resource Center on the World Wide Web--http://www.usenix.org Email to: info@usenix.org. In the body of your message state "send usenix97 conference" ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.81 ************************************