Der Weltanschauung (The WorldView) Origin: HOUSTON, TEXAS USA %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % Editor: The Desert Fox * FTP: chsun1.spc.uchicago.edu % % Co-Editor: Cyndre The Grey * pub/cud/worldview % % % % T H E W O R L D V I E W M A G A Z I N E % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% March 6, 1992 Volume 2, Issue 1 Distributed In O'er 90 Countries (*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*) Material Written By Computer And Telecommunications Hobbyists World Wide Promoting the publication of Features, Editorials, and Anything Else.... To submit material, or to subscribe to the magazine contact one of the following net addresses... "Let us arise, let us arise against the oppressors of humanity; all kings, emperors, presidents of republics, priests of all religions are the true enemies of the people; let us destroy along with them all juridical, political, civil and religious institutions." -Manifesto of anarchists in the Romagna, 1878 @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@- ==-@-==-@ The World View Staff: InterNet Address: The Desert Fox [Editor] dfox@taronga.com Cyndre The Grey [CoEditor] cyndre@taronga.com Rev. Scott Free scotfree@taronga.com Bryan O' Blivion blivion@taronga.com Modok Tarleton rperkins@taronga.com The Sorcerer (REV) sorcerer@taronga.com Brain On A Stick brain@taronga.com WORLD VIEW NEWSGROUP: wv@taronga.com FTP Site: chsun1.spc.uchicago.edu directory: /pub/cud/worldview @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ TABLE OF CONTENTS 1) Notices/Updates/News/Etc.............................Editors 2) Teen Curfews [Part 2 of 3]...........................Harvard Law Review 3) PSI - Global Dialup Services.... .....................John Eldredge 4) Who Pays For FTP (Reprint From EFF110)...............Dan Kenny 5) Michelangelo Virus...................................NasaMail 6) Special Internet Connections.........................Scott Yanoff 7) Eniac................................................Unknown 8) The Challenger Transcript............................Freelance Journalist 9) Dutch Police Arrest Hackers..........................Hac-Tic Magazine @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==- @-==-@-==-@-==-@-==-@-==-@-==-@ Notices/Updates/News/Etc... Thanks to all the people who are requesting all back issues of our publication! Due to the numerous requests, we are no longer fulfilling back issue requests...except in certain cases. From now on, all issues will be available via ANON. FTP from: CHSUN1.SPC.UCHICAGO.EDU The directory that the Worldview is in will be: PUB/CUD/WORLDVIEW If you do not have access to FTP, let us know. We will try to help. I'v e had some complaints about the linefeeds in our mag. I am sorry. It is not us! The ones who are having the problem are a select few. I hope the problem ceases soon. We have no control. Ed... @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ [Part 2 of 3] This is the second part of a three part series on teen curfews. By: The Harvard Law Review B. The Proper Level of Scrutiny for Children's Rights Under traditional constitutional analysis, a statute that infringes fundamental rights can survive judicial scrutiny only if the government can show that the statute is both necessary and narrowly drawn to serve a compelling state interest (33). Given that children are persons under the Constitution, logic would seem to demand such strict scrutiny for infringements not only of adults' rights, but of children's rights as well. Yet courts, pointing to the unique developmental traits of childre n, have afforded minors' rights a level of protection lower than that secured by traditional strict scrutiny (34). Thus, in one relatively recent case, the Supreme Court suggested that an infringement of minors' fundamental rights need only serve a "significant state interest... not present in the case of an adult" (35). Although the Court has declined to apply consistently either this standard or any other, the Court's decisions reflect both a persistent unwillingness to engage in traditional st rict scrutiny analysis and a continuing recognition that children's rights deserve considerably more protection than that offered by the rational relation test applied in Bykofsky. The lack of any developed framework for analyzing children's rights was highlighted in the recent case of H.L. v. Matheson (36), in which the Court, addressing the constitutionality of a statute requiring that parents be notified of a minor's decision to undergo an abortion, divided on the issue of the proper leve l of scrutiny in challenges to differential state treatment of children and adults. Chief Justice Burger, writing for the majority, upheld the statute on the ground that it served "important state interests" and was "narrowly drawn to protect only those interests" (37). Justice Stevens concurred in the judgment on the basis of his characterization of the state interests as "fundamental and substantial" (38). Although dissenting from the Court's judgment, Justice Marshall implicitly expressed sup port for some variant of a significant-state-interest test and noted that validating a statute under such a test indicated not that minors' rights are less fundamental than adults' but only that special state interests justify infringement of those rights (39). The Court's confusion over the proper formulation of the standard of review results from the tension caused by the recognition that, while children are persons for constitutional purposes, they are simultaneously the subject of speci al state concern. Yet in many cases this tension may be illusory: a careful analysis of the state's alleged special interests in infringing minors' rights may reveal that such interests are not at stake in a particular situation or will not be furthered by a specific restriction. In such cases, there is no justification for affording less protection to the rights of minor citizens than to the rights of adults. This conclusion is implicit in the wording of the "significant state interest not prese nt in the case of an adult" standard. Because the state must present an interest that pertains uniquely to children before treating them differently from adults, it follows that, absent a significant difference between children and adults, the state must treat the two groups identically (40). But a lower standard of review, if applied in all cases involving infringement of children's fundamental rights, would lead courts automatically to afford less protection to those rights even in cases in whi ch there was no justification for doing so. Thus, children's fundamental rights should be presumptively equal to those of adults, and violations of such rights should merit strict scrutiny (41). Only if courts respect this initial presumption can they properly protect the fundamental rights of children when there is no basis for treating those rights differently (42). Statements that children possess fundamental rights but may be more restricted than adults in the exercise of those rights r epresent a belief that, although children's abstract rights are identical to those of adults, their concrete rights are not. Because a person's status as a child is not always relevant to her competence to exercise her rights, however, children's concrete rights should also be presumed equal to those of adults. The state should be able to rebut this presumption by demonstrating the relevance of childhood in a particular case. Under the proposed approach, however, courts would not merely apply st rict scrutiny to infringements of the rights of children while recognizing special state interests regarding children, for such a procedure, according to traditional strict scrutiny analysis, would be self-contradictory. The principle of strict scrutiny for infringements of fundamental rights presupposes a universe of citizens equal under the Constitution; what qualifies as a compelling state interest does not ordinarily vary depending on which citizens are affected (43). Singling out a gro up of adult citizens and affording less protection to their fundamental rights solely because of their membership in the group would cut at the very heart of the equal protection principle. Thus, to recognize special interests surrounding one unique class of citizens -- children -- is to recognize the need for a unique form of strict scrutiny. Such a form of review would acknowledge compelling state interests that pertain only to children. Interests that the courts deem compelling under traditio nal strict scrutiny analysis would, of course, also suffice to justify infringements of children's fundamental rights; such interests would constitute a subset of the acceptable state interests recognized by this new analysis. The only additional compelling interests that the proposed form of strict scrutiny would recognize would be those based on the unique developmental traits of children -- interests that might be called "compelling for children" (44). Under such a test, the rights of childre n would not be coextensive with those of adults, for the universe of state interests sufficient to justify the infringement of children's rights would be broader. When a law affecting children -- for example, a curfew ordinance -- would not, if applied to adults, survive traditional strict scrutiny, the only possible justification would be a "compelling for children" interest. Courts should therefore require the state to demonstrate that, because of the unique developmental traits of minors , unrestricted exercise of a particular right in the situation in question would create significant (to merely possible or imaginable) dangers of physical or emotional harm to the minors or to others. Thus, the state's power to act in furtherance of its special interests regarding children would not be plenary; rather, the state would have to show not simply that a restriction affected only children, but also that concerns unique to children and relevant to the specific situation in question legit imated the restriction. If such a "compelling for children" interest were present, the statute would be upheld, provided that it was narrowly drawn to protect that interest. If it did not serve an interest "compelling for children," a statute that differentially affected the fundamental rights of children and those of adults would be struck down. C. What Constitutes a "Compelling for Children" Interest As noted above, the assumption that children are particularly vulnerable to c ertain forms of emotional trauma and are unable to exercise their rights in an informed, rational, and safe manner forms the basis for finding a "compelling for children" interest in legislation restricting children's rights (45). The Supreme Court seemed to be operating under such an assumption in Bellotti v. Baird (46), which struck down a statute that placed various restrictions on the ability of minors to obtain abortions. In Bellotti, a four-Justice plurality set forth three factors that are generally found to justify differential treatment of the constitutional rights of minors. These factors, each of which reflects a different aspect of the assumption that children are not fully competent to exercise their rights, are (1) the peculiar vulnerability of children, (2) the inability of children to make critical decisions in an informed, mature manner, and (3) the need to ensure that parents are able to play a central role in their children's upbringing (47). Although Justice Po well's opinion for the Court was joined by only a plurality of the Justices, those who wrote separately did not dispute the preliminary section of the opinion, which articulated the factors relevant to an inquiry into differential treatment of children's rights. The three factors thus provide a framework within which the unique traits of children may be analyzed in accordance with Supreme Court precedent. These three factors form a useful framework for assessing government interests served by a giv en restriction on the rights of minors (48). Under the proposed analysis, a restriction serves an interest "compelling for children" only if the restriction is narrowly drawn and only if one of the three factors justifies it. In the following Part, each factor is examined more fully in connection with its application to the question of the validity of juvenile curfew ordinances. @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ PSI - Global D ialup Services By: John Eldredge CONTACT: John T. Eldredge Performance Systems International, Inc. 11800 Sunrise Valley Drive Suite 1100 Reston, VA 22091 Phone: 1 800.82PSI82 +1 703.620.6651 Fax: +1 703.620.4586 Email: info@psi.com PSI introduces Global Dialup Service (GDS) to provide individuals inexpensive telnet/rlogin access to Internet host computers around the clock through local dialups availab le on a national basis. Reston, Virginia - September 4, 1991 - John T. Eldredge, Director of Sales and Marketing, Performance Systems International, Inc. (PSI) today announced a new, simple means to access tens of thousands of Internet host computers called Global Dialup Service (GDS). GDS provides a commonly-available way for individuals to access their accounts on Internet host computers, at any hour of the day or night, through the popular telnet or rlogin protocols. This service only require s a personal computer or terminal, basic communications software and a modem set at 300, 1200, or 2400 baud. Dialup points are available locally in major cities throughout the continental US, as well as internationally, through locally available X.25 PADS. Eldredge commented, "The demand for simple access to the thousands of Internet hosts for traveling professionals and remote organizational offices, independent of local times, continues to grow. GDS inexpensively meets this basic need for tho usands of individuals." The PSI Global Dialup Service is currently served in over 20 cities across the country, with additional cities being added each month. GDS is available seven days per week, 24 hours per day, and costs just $39 per month. There is a one-time registration fee of $39. PSI, headquartered in Reston, Virginia, is a value-added internetworking services provider with a wide spectrum of services for the individual and corporate user of electronic information. Services range fr om electronic mail products to turnkey integration of local area networks into the PSINet wide area network system and the Internet. Through the Commercial Internet Exchange (CIX), which PSI co-founded, all commercial US internetworking service providers are interconnected, providing commercial companies on PSINet with no government restrictions on usage to other commercial companies participating in CIX-connected network service providers. Personal internetworking made simple for individuals with PSI's newest turnkey software and service: PSILink(SM) Reston, Virginia - September 24, 1991 - Performance Systems International, Inc. (PSI) today unveiled PSILink(SM) to make personal Internet access and electronic correspondence simple and inexpensive. PSILink(SM) is a turnkey service package which enables the individual in business, academia, government, and even home enterprise to communicate with the world through electronic mail and other services. Its ease of use makes it attractive to thousands of professionals, teachers and students previously reluctant to harness the complexities of valuable Internet access. "It has never been easier to communicate electronically," said William L. Schrader, PSI's President and Chief Executive Officer. "The Internet community is estimated at over 30 million users. PSILink(SM) uses software developed by PSI for the common PC that is easy to install, easy to set up and easy to use." Local dialup points are available in major cities thr oughout the continental United States for the PSILink(SM) service. PSILink(SM) will be demonstrated at Interop '91, in San Jose, October 9-11. PSI, along with additional companies, will be announcing service and software enhancements of the technology at a press conference during Interop at 8:00 A.M. PST on Tuesday, October 8. Additional on-line information about PSILink(SM) is available by sending e-mail to psilink-info@psi.com; an automatic computer generated information response will be re turned to your mailbox. PSI, headquartered in Reston, Virginia, is a value-added internetworking services provider with a wide spectrum of services for the individual and corporate user of electronic information. Services range from electronic mail products to turnkey integration of local area networks into the PSINet(R) wide area network system and the Internet. PSILink - Personal Networking for Internet Access Internet access is an important facet of all higher education institutions, an d most corporations throughout the US, Western Europe and the Pacific Basin. It is also important for small organizations and individuals, yet both the cost and usability have been barriers. The PSILink service is designed to remove these barriers. PSI provides local dialups throughout the US to provide PSILink service and provide access to the 25+ million people available through the Internet and electronic mail networks. The PSILink service today provides unlimited electronic messaging at a flat monthly cost: $35 one time $19/month billed on a monthly basis to your MasterCard/Visa, or quarterly by check. Soon to be released under PSILink will be USENET/NEWS and anonymous FTP access. PSI provides the necessary software for MSDOS based PC's to use this service at no additional cost. Even the smallest PC with a Hayes compatible modem can use PSILink. This software is available via anonymous ftp on ftp.psi.com in the "psilink" directory and is available when you register on a 3.5" 1.44Mbyte floppy. Additional information can be had from our on-line brochure and user's guide which is available by sending email to psilink-guide@psi.com A PostScript document will be automatically mailed to you. This document should be printable on any PostScript printer; however, it must be printed on legal size paper. If you want to register for this service send email to psilink-registration@psi.com A PostScript registration information will be automatically mailed to y ou. If you can't print these PostScript documents sene complete contact information including postal address, name, and phone number to: psilink-order@psi.com You will receive materials via the Postal system. Copyright 1991 Performance Systems International Inc. All rights reserved. @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ Who Pays for FTP? From: netspec@zeus.unomaha.edu (Dan Kenny, Network Specialist/ U of N-Omaha) In a previous article, tld@cosmos.bae.bellcore.com (Terry Davidson) writes: "One question: I've asked this before, and have received no response. Who pays for ftp? Some uploads/downloads can take a *VERY* large amount of time; and this has to cost someone some hard cash - but who? Is the login used to send bills to the company from where the call originated (some ftp may be anonymous, but modern UNIX systems darned well get the info anyway, including the actual line/port/phone of the originati ng machine). I'd like answers to these questions, simply because (1) I have approximately 5 MB of shareware (DOS) utilities to upload to an ftp site for propagation, and (2) there are some GIF files out on the ftp sites I would like to ftp in. Whether or not I actually do this depends on how ftp is billed. Terry, FTP (the file transfer protocol), NNTP (the protocol for the news service you are reading), TELNET (the remote login protocol), SMTP (the mail protocol you receive Internet mail through), and other protocol services in the TCP/IP specification are made available to you courtesy of the educational system in America. Individual colleges, military sites, organizations and commercial sites wire up their machines as a campus network. These networks join a consortium of regional networks (like MIDnet for the Midwest colleges, MILnet for the military, etc) for a fee and if they are an educational institution, also receive subsidization on the cost of connecting their campus ne tworks to the regional network through the National Science Foundation. Additionally, the NSF foots the bill for the long-haul national network connecting the regional networks in one giant internetwork. This long-haul network is built upon the work of the military's Defense Advanced Research Projects Agency (ARPAnet) in the 1970's and 1980's. These resources are provided to the average Internet user virtually for free, and are done so in the spirit of research and cooperation. Not everyone in t he world ascribes to the philosophy of the "bottom-line" business mentality, and they recognize the value of open access to educational resources in the quest for enhancing communication between educators, researchers, students, businesses, organizations, and the community. So to answer your question, we all pay - just like we all pay for open and public access to the nation's highways, the open and public access to community libraries, the open and public access to secondary schools, and the op en and public access to the state universities. Individual sites on the Internet make services and resources available (like disk space for anonymous FTP or the ARCHIE database service) out of the spirit of this cooperation and belief that the greater benefit of increased communication outweighs the per-unit-cost of a megabyte of disk storage or a packet of network bandwidth. Usenet news feeds are traditionally provided as a courtesy between educational institutions in this spirit also. If you believe your 5 megs of utilities have educational value, by all means upload them to an appropriate FTP site. If you believe that files you find on an anonymous FTP will enhance your education, download them. Realize that the mere act of communicating with someone on the Internet and exploring available services has educational value. Speaking as a student majoring in one of those science/technical and engineering fields (Computer Science) that people keep worrying about due to growing lack of i nterest from our youth, I can assure you that the educational benefit I have received through the cooperation of the Internet community has been tremendous. Innovation is not dead in America, at least not yet. We just need to properly recognize the value of long-term investment and commitment to cooperation (whether that be in basic research & development, educating ourselves, or in laying fiber to every household like Japan is doing), regardless of short-term cost (or lack of profit). Remember the technological fallout from the Apollo Moon program? We -all- foot the bill for it, and we -all- (consumers, industry, education, military, and our general competitiveness in the world) benefited from the cooperation and technology-sharing of that national project. Think of the Internet in the same fashion. I do. Just my opinions, Dan Kenny, Network Specialist : University of Nebraska-Omaha netspec@zeus.unomaha.edu @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ The following messages were received from NASA Mail From: ADMIN/NASA To: NASA Subj: Virus Early Warning This is a Product Assurance and Security Office (PASO) Virus Early Warning. The PC (not MAC) virus "Michelangelo" has started spreading in the U.S. very fast. This virus has a "trigger" date of March 6 where it will attempt to overwrite vital areas on the PC hard disk. Please make sure that you have a current copy of Virusafe 4.5 installed in your computer. Virusafe is able to detect and remove the mentioned virus. Some other antiviral programs may detect "Michelangelo" but not be able to remove it. If you don't have Virusafe installed, contact your Code AIS representative or call the PASO Virus Prevention Team at XXX-XXXX. Attached is the Virus-L (Internet) message received from A. Padgett Peterson. Subject: WARNING - Michelangelo Virus (PC) THIS VIRUS IS SCHEDULED TO EXECUTE ON MARCH 6, 1992 >From all reports this destructive virus is spreading world-wide very rap idly. Unlike the DataCrime "fizzle" in 1989 which contained similar destructive capability but never spread, the Michelangelo appears to have become "common" in just ten months following detection. I have encountered three cases locally in just the last few weeks. Three factors make this virus particularly dangerous: 1) The virus uses similar techniques as the "STONED" virus which while first identifies in early 1988 remains the most common virus currently reported. Since the virus infect s only the Master Boot Record on hard disks and the boot record of floppy disks, viral detection techniques that rely on alteration of DOS executable files will not detect the virus. Similarly, techniques that monitor the status of the MBR may only provide users with a single warning that, if execution is permitted to continue, may not be repeated. 2) Michelangelo was first discovered in Europe in mid-1991 consequently many virus scanners in use today will not pick up the virus unless more recent updates have been obtained. 3) Unlike the Stoned and Jerusalem (the most common viruses in the past) which are more annoying than dangerous, the Michelangelo virus will, on its trigger date of March 6th, attempt to overwrite vital areas of the hard disk rendering it unreadable by DOS. Further, since the FATs (file allocation tables) may be damaged, unless backups are available recovery will be very difficult and require someone who is able to rebuild a corrupt FAT (also a very time-consuming process). Fortunately, the Michelangelo virus is also very easy to detect: when resident in a PC, the CHKDSK (included with MS-DOS (Microsoft), PC-DOS (IBM), and DR-DOS (Digital Research) {all names are registered by their owners}) program will return a "total bytes memory" value 2048 bytes lower than normal. This means that a 640k PC which normally returns 655,360 "total bytes memory" will report 653,312. While a low value will not necessarily m ean that Michelangelo or any other virus is present, the PC should be examined by someone familiar with viral activity to determine the reason. If the Michelangelo virus is found, the PC should be turned off until disinfected properly. All floppy disks and other machines in the area should then also be examined since the Michelangelo virus is spread i2n the boot record (executable area found on all floppy disks including data-only disks). Padge tt Peterson Internet: padgett%tccslr.dnet@mmc.com Note: the opinions expressed are my own and not necessarily those of my employer. Comments refer only to the specific example of the virus that I have examined. Other strains may exist. @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ Special Internet Connections By: Scott Yanoff * SPECIAL INTERNET CONNECTIONS: Last Update: 10/13/91 * * Compiled By: Scott Yanoff - yanoff@csd4.csd.uwm.edu * * A + by an entry designates new entries to the list (since last update). * +Archie telnet quiche.cs.mcgill.ca or 132.206.2.3 (Can./USA) telnet nic.funet.fi or 128.214.6.100 (Finland) telnet rana.cc.deakin.oz.au or 128.184.1.4 (Aussie/NZ) offers: Internet anonymous FTP database. (Login: archie) -CARL telnet pac.carl.org or 192.54.81.128 offers: Online database, book reviews, magazine fax delivery service. -Cleveland Freenet telnet freenet-in-a.cwru.edu or 129.22.8.82 offers: USA Today Headline News, Sports, etc... +C64 Archive Server mail twtick@corral.uwyo.edu Subject: Mail-Archive-Request Body-of-letter: help (hit return) end -Dante Project telnet eleazar.dartmouth.edu or 129.170.16.2 offers: Divine Comedy and reviews. (Login: ddpfrnet password: freenet) -Distance Educat. Data telnet sun.nsf.ac.uk or telnet 128.86.8.7 (Login: janet Hostname: uk.ac.ope n.acs.vax Username: icdl) +FTP Mail ftpmail@decwrl.dec.com Subject: (hit return) Body-of-letter: help (return) quit Offers: ftp via email -Geographic Name Server telnet martini.eecs.umich.edu 3000 or 141.212.100.9 offers: Info by city or area code (Population, Lat./Long., Elevation, etc). -Gopher telnet consultant.micro.umn.edu or 128.101.95.23 Access to: UPI News, weather forecasts, interet games, library (Login:gohper) -Ham Radio Callbook telnet marvin.cs.buffalo.edu 2000 or 128.205.32.4 offers: National ham radio call-sign callbook. -Internet Resrce Guide ftp nnsc.nsf.net offers: compressed/tar'd list of net resources in /resource-guide.txt.tar.Z -IRC Telnet Client telnet bradenville.andrew.cmu.edu or 128.2.54.2 offers: Internet Relay Chat access. -Library of Congress telnet dra.com or 192.65.218.43 offers: COPY of Library of Congress (Assumes terminal is emulating a vt100). -List of Lists ftp ftp.nisc.sri.com or ftp 192.33.33.22 offers: List of interest groups/email lists in /netinfo/interest-groups. -Lyric Server ftp vacs.uwp.edu offers: Lyrics in text file format for anonymous ftp downloading. -Mail Server/Usr Lookup mail mail-server@pit-manager.mit.edu usage: in body of mail message: send usenet-addresses/[name searching for] -NASA SpaceLink telnet spacelink.msfc.nasa.gov or 128.158.13.250 offers: Latest NASA news, including shuttle launches and satellite updates. -NED telnet ip ac.caltech.edu or telnet 131.215.139.35 offers: NASA Extragalactic Database. (Login: ned) -Oceanic Info. Center telnet delocn.udel.edu or telnet 128.175.24.1 (Login: info) -Oracle mail oracle@iuvax.cs.indiana.edu offers: The Usenet Oracle! Mail with subject as "help" for more info. -PENpages telnet psupen.psu.edu or telnet 128.118.36.5 offers: Agricultural info (livestock reports, etc.) (Login: PNOTPA) -SDDAS telnet espsun.space.swri.edu 540 offers: SW Research Dat a Display & Analysis Center. Or telnet 129.162.150.99 -STIS telnet stis.nsf.gov or 128.150.195.40 offers: Science & Technology Information System. (Login: public) -Usenet News MailServer mail [newsgroup]@ucbvax.berkeley.edu Allows you to post to a Usenet newsgroup via email. Useful if you have read- only access to Usenet news. Note: .'s become -'s Ex. alt.test -> alt-test -UNC BBS telnet samba.acs.unc.edu or 128.109.157.30 offers: Access to Library of Congress and nationwide libraries (Login: bbs) -WAIStation telnet hub.nnsc.nsf.net SWAIS telnet quake.think.com (different than hub... above) offers: Wide Area Info. Service. (Login: wais) FTP think.com for more info. -Weather Service telnet madlab.sprl.umich.edu 3000 or 141.212.196.79 offers: Forecast for any city, current weather for any state, etc. -Webster (Temp. down?) telnet decoy.cc.uoregon.edu 2627 offers: Dictionary, Thesaurus, Spelling checker. Type 'HELP' when online! (May no t support non-UNIX machines?) * NOTE: NO LOGIN NAMES OR PASSWORDS ARE REQUIRED UNLESS STATED OTHERWISE! * If it prompts you for a login name, you did something wrong, or are not running on a machine that the system you telnetted to supports! * PLEASE email me if you have any additional info/corrections/comments! * @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ ENIAC By: Unknown In the beginning there was ENI AC. And the ENIAC was without language or form. And so was created Machine Code. And it was Good. On the second day, Hex was created. And it was good. On the third day, Assembly Language was created. And it was good. On the fourth day, Fortran was created and it was good. On the fifth day, man programmed in Fortran. And it was very good. And it was spoken: "Though may program in any of these, but the tree of COBOL thou shall not partake for thou shalt surely pay for thine transgresssions." But, there was a hacker in the woods who took the form of a mini and spake to the man and said "Thou shalt not pay for thine transgressions, for he knoweth that if thou partakest, thou shall have power to program large and wonderful things that shall be readable by others!" So, the man partook of COBOL. And it was spoken: "Thou hast partaken of the tree of COBOL: Thou art doomed to write hundred thousand line programs, be enslaved by IBM, and not have other good programming options for years ." And it was so. Many years passed. IBM dominated. Programs grew larger and larger. BASIC, Pascal, SNOBOL, PLI, Ada and many others came and went. IBM dominated. And COBOL programs grew. Then, as implied, a program came out of the telephone. It spread to the universities who took it on and made it grow. IBM tried to kill it many times, but after the PC was introduced, it was inevitable. First, A. Written in Assembly, not COBOL. Then B which was better that A. Then finally C took full form and shape. With UNIX, it launched into the market seemingly impervious to COBOL's domination. IBM tried again to kill it. Through security holes, and portability, and unreadability IBM tried. But C could not be quashed. The implied savior of programming everywhere had come! And the great COBOL could finally start to be removed. Open systems and high capacity graphic's aided and spurred C on until there was C for DOS, C++, and finally, C for the IBM series 3090. And it was very good. ( to be continued ... maybe) @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ For Those Who Haven't Heard: The Challenger Transcript DISCLAIMER: This info was submitted by an unknown freelance journalist. The World View Magazine And It's Editors Claim No Responsibility For The Creation Of This Document. We Have No Ties To NASA, Or Any Other Government Organization. The Transcript Follows The Audio Tape Which Was Released To The Public By NASA. As Journali sts, We Chose To Publish The Document, Because We Feel The American People Have A Right To Hear All Opinions Regarding This Issue. The World View Does Not Condone Nor Do We Necessarily Agree With The "Cover-Up" Theory Related To This Incident. As Far As We Know, This Information Is Public Domain. --==(*)==-- A secret NASA tape reveals that the crew of the shuttle Challenger not only survived the explosion that ripped the vessel apart; they screamed, cried, curse d and prayed for three hellish minutes before they slammed into the Atlantic and perished on January 28, 1986. The tape is said to begin with a startled crewman screaming,"What happened? What happened? Oh God - No!" Screams and curses are heard- several crewmen begin to weep- and then others bid their families farewell. Two minutes forty-five seconds later the tape ends. That's when the shuttles crew compartment, which remained intact after the vessel exploded over the Atlantic, hit the oc ean at over 2,000 miles per hour, instantly killing the crew. " Cover up? Of course there was a coverup, " declared Robert Hotz, a member of the Presidential commission that investigated the disaster. " NASA can't face the fact that they put these astronauts in a situation where they didn't have adequate equipment to survive. NASA doesn't give a damn about anything but covering it's ass, " he said. The official account released by NASA ends with shuttle pilot Michael Smith saying, " Uh-oh! " Some NASA employees have evidently heard more-much more. And they provided the rest of the account based on what they've discussed within NASA in the last five years. The astronauts had time and realized something was happening after the shuttle broke up. " All shuttle astronauts carry personal recorders and the tape in question apparently came from Christa's (McAuliffe), which was recovered after the shuttle disaster, " said Hotz. Jarvis was sitting beside her, and when he figured out what wa s happening he said, " Give me your hand. " " NASA insists there's nothing like that on tape but they're talking about the mission tape, not Christa's. So they're not lying, but they're not telling the truth, either. " A journalist with close ties to NASA was even more emphatic, " There are persistent rumors, dating back to the disaster, that this tape is absolutely bone-chilling. " The following transcript begins two seconds after NASA's official version ends, with pilot Michael Smit h saying, " Uh-oh! " Times from the moment of takeoff are shown in minutes and seconds and are approximate. The sex of the speaker is indicated by M or F. T+1:15 (M) What happened? What happened? Oh God, no - no! T+1:17 (F) Oh dear God. T+1:18 (M) Turn on your air pack! Turn on your air... T+1:20 (M) Can't breathe... choking... T+1:21 (M) Lift up your visor! T+1:22 (M/F) (Screams.) It's hot. (Sobs.) I can't. Don't tell me... God! Do it...now... T+1:24 (M) I told them... I told them... Dammit! Resnik don't... T+1:27 (M) Take it easy! Move (unintelligible)... T+1:28 (F) Don't let me die like this. Not now. Not here... T+1:31 (M) Your arm... no... I (extended garble, static) T+1:36 (F) I'm... passing... out... T+1:37 (M) We're not dead yet. T+1:40 (M) If you ever wanted (unintelligible) me a miracle... (unintelligible)... (screams) T+1:41 (M) She's... she's... (garble) ... damn! T+1:50 (M) Can 't breathe... T+1:51 (M/F) (screams) Jesus Christ! No! T+1:54 (M) She's out. T+1:55 (M) Lucky... (unintelligible). T+1:56 (M) God. The water... we're dead! (screams) T+2:00 (F) Goodbye (sobs)... I love you, I love you... T+2:03 (M) Loosen up... loosen up... T+2:07 (M) It'll just be like a ditch landing... T+2:09 (M) That's right, think positive. T+2:11 (M) Ditch procedure... T+2:14 (M) No way! T+2:17 (M) Give me your hand... T+2:19 (M ) You awake in there? I... I... T+2:29 (M) Our Father... (unintelligible)... T+2:42 (M) ...hallowed be Thy name... (unintelligible). T+2:57 (M) You...over there? T+2:58 (M) The Lord is my shepherd, I shall...not want. He maketh me to lie down in green pastures... though I walk through the valley of the shadow of death, I will fear no evil... I will dwell in the house... T+3:15 to end. None. Static, silence. Serpentin e Light Chicago Helvetica r det slut @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ DUTCH POLICE ARRESTS HACKERS The facts: At 10.30 Monday morning, 27 January 1992, Dutch police searched the homes of two hackers. In the city of Roermond, the parental home of the 21-year old student H.W. was searched and in Nuenen the same happened to the parental home of R.N., a Computer Science engineer, age 25. Both were arrested and taken into custody . At both sites, members of the Amsterdam Police Pilot Team for computer crime were present, alongside local police officers and representatives of the national organization CRI (Criminal Investigations Agency). Both suspects were transported to Amsterdam. The brother of one of the suspects was told the suspects could receive no visits or mail. All of this has happened more than one week ago and the two are still in jail as we write this. The charges: A break-in supposedly occurred at the bro nto.geo.vu.nl site at the VU University in Amsterdam. This UNIX system running on a SUN station (IP 130.37.64.3) has been taken off the net at least for the duration of the investigation. What happened to the actual hardware is unknown at this time. The formal charges are: forgery, racketeering and vandalism. The police justify the forgery part by claiming that files on the system have been changed. The vandalism charge is valid because the system had to be taken off the net for a period of time to investigate the extent of the damage. By pretending to be regular users or even system management the hackers committed racketeering, the police says. Both suspects, according to the Dutch police, have made a full statement. According to a police spokesman the motive was "fanatical hobbyism". Spokesperson Slort for the CRI speaks of the "kick of seeing how far you can get". Damages: According to J. Renkema, head of the geo-physics faculty at the VU, the university is considering fili ng a civil lawsuit against the suspects. "The system was contaminated because of their doing and had to be cleaned out. This cost months of labour and 50.000 guilders (about US$ 30,000). Registered users pay for access to the system and these hackers did not. Result: tens of thousands of guilders in damages." Renkema also speaks of a 'moral disadvantage': The university lost trust from other sites on the network. Renkema claims the university runs the risk of being expelled from some networks. Renkema also claims the hackers were discovered almost immediately after the break-in and were monitored at all times. This means all the damages had occurred under the watchful eyes of the supervisors. All this time, no action was taken to kick the hackers off the system. According to Renkema all systems at the VU were protected according to guidelines as laid down by CERT and SurfNet BV (SurfNet is the company that runs most of the inter-university data-traffic in The Netherlands). What real ly happened? The charge of 'adapting system-software' could mean that the hackers installed back-doors to secure access to the system or to the root level, even if passwords were changed. New versions of telnet, ftp, rlogin and other programs could have been compiled to log access to the networks. What really happened is anybody's guess. One point is that even the CRI acknowledges that there were no 'bad' intentions on the part of the hackers. They were there to look around and play with the networks. About hacking in general: In the past we have warned that new laws against computer crime can only be used against hackers which are harmless. Against the real computer criminals a law is useless because they will probably remain untraceable. The CRI regularly goes on the record to say that hackers are not the top priority in computer crime investigation. It seems that hackers are an easy target when 'something has to be done'. And 'something had to be done': The pressure from esp ecially the U.S. to do something about the 'hacking problem' was so huge that it would have been almost humiliating for the Dutch not to respond. It seems as if the arrests are mainly meant to ease the American fear of the overseas hacker-paradise. A closer look at the charges and damages: The VU has launched the idea that system security on their system was only needed because of these two hackers. All costs made in relation to system security are billed to the two people that just happened t o get in. For people that like to see hacking in terms of analogies: It is like walking into a building full of students, fooling around and then getting the bill for the new alarm-system that they had to install just for you. Systems security is a normal part of the daily task of every system- adminstrator. Not just because the system has to be protected from break-ins from the outside, but also because the users themselves need to be protected from each other. The 'bronto' management has negle cted some of their duties, and now they still have to secure their system. This is not damages done, it's work long overdue. If restoring back-ups costs tens of thousands of guilders, something is terribly wrong at the VU. Every system manager that uses a legal copy of the operating system has a distribution version within easy reach. 'Month of tedious labour following the hackers around in the system'. It would have been much easier and cheaper to deny the hackers access to the system direct ly after they had been discovered. 'Moral damages' by break-ins in other systems would have been small. The VU chose to call the police and trace the hackers. The costs of such an operation cannot be billed to the hackers. Using forgery and racketeering makes one wonder if the OvJ (the District Attorney here) can come up with a better motive than 'they did it for kicks'. If there is no monetary or material gain involved, it is questionable at best if these allegations will stand up in court. As far as the vandalism goes: there have been numerous cases of system management overreacting in a case like this. A well trained system-manager can protect a system without making it inaccessible to normal users. Again: the hackers have to pay for the apparent incompetence of system management. This does not mean that having hackers on your system can not be a pain. The Internet is a public network and if you cannot protect a system, you should not be on it. This is not just our statement, it is the written policy of many networking organizations. One more metaphor: It's like installing a new phone-switch that allows direct dial to all employees. If you get such a system, you will need to tell your employees not to be overly loose-lipped to strangers. It is not the callers fault if some people can be 'hacked'. If you tie a cord to the lock and hang it out the mail-slot, people will pull it. If these people do damages, you should prosecute them, but not for the costs of walking after them and doing your security right. Consequences of a conviction: If these suspects are convicted, the VU makes a good chance of winning the civil case. Furthermore, this case is of interest to all other hackers in Holland. Their hobby is suddenly a crime and many hackers will cease to hack. Others will go 'underground', which is not beneficial to the positive interaction between hackers and system management or the relative openness in the Dutch computer security world. Public systems: If you are not a student at some big university or work for a large corporation, there is no real way for you to get on the Internet. As long as there is no way for some people to connect to the net, there will be people that hack their way in. Whether this is good or bad is besides the point. If there is no freedom to explore, some hackers will become the criminals that government wants them to be. "Our system is perfectly secure !" (and if you prove it's not, we'll ha ve you put in jail) Felipe Rodriquez (felipe@hacktic.nl) & Rop Gonggrijp (rop@hacktic.nl) Rop Gonggrijp (rop@hacktic.nl), editor of | fax: +31 20 6900968 Hack-Tic Magazine (only on paper, only in Dutch) | VMB: +31 20 6001480 the best magazine for staying in touch with the | snail: Postbus 22953, the Techno-Underground. Mail to info@hacktic.nl | 1100 DL Amsterdam @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@