home *** CD-ROM | disk | FTP | other *** search
- ------------------------------
-
- From: Gordon Meyer
- Subject: CuD Index, Volume Two (2.00 - 2.19)
- Date: 25 February, 1991
-
- ********************************************************************
- *** CuD #3.07: File 3 of 6: CuD Index for Volume Two ***
- ********************************************************************
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Index to Volume Two ***
- *** Issues 2.00 - 2.19 ***
- ****************************************************************************
-
- Volume 1, Issue #2.00 (Aug 25, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: EFF mailing #3: About the Electronic Frontier Foundation
- File 3: Len Rose's Search Warrant
- File 4: What to Read When the SS is at the Door
- File 5: CU in the News: More on the NY Raids
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.01 (Aug 31, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Proposed changees in Computer Abuse Act (S.2476)
- File 3: CPSR Seeks FBI data on Bulletin Board Monitoring
- File 4: Computers, Social Responsibility, and Political Action
- File 5: Another experience with the SS
- File 6: CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.02 (September 9, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Musing over Operation Sun Devil
- File 3: IPCO BBS Back on-Line
- File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete)
- File 5: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.03 (September 14, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose's experience with the Secret Service
- File 3: Tim Wolfson's address, cite list
- File 4: A comment on Zod's case
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.04 (September 23, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Re: Evidence (was Re: Musing on Constitutionality)
- File 3: Why the FBI should be concerned about the Secret Service
- File 4: California Computer Abuse Law revisited
- File 5: Candidate for state governor supports electronic freedom & privacy
- File 6: Review of Steven Levy's CLOAK AND DAGGER
- File 7: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.05 (September 30, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Re: The CU in the News (Mail reading)
- File 3: Anarchist Times, Inc. (ATI)--background
- File 4: The status of the electronic forum (BBS)
- File 5: Another experience with the law
- File 6: Some views on what to do if questioned by LE agents
- File 7: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.06 (October 6, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: MARS BBS Sting a Prank
- File 4: Another view of hacking
- File 5: The CU in the news
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.07 (October 15, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
- File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
- File 4: Electronic Frontier Foundation Hires Staff Counsel
- File 5: 13th Annual National Computer Security Conference (Part 1)
- File 6: 13th Annual National Computer Security Conference (Part 2)
- File 7: Summary of COMPUTER ETHICS (book)
- File 8: Introduction to TOXIC SHOCK
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.08 (October 20, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Prodigy, Problems, and Censorship
- File 4: Censorship on the Nets
- File 5: PC's & Political Action
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.09 (October 27, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose Arrest
- File 3: Mars was not "Censored"
- File 4: Response to Mars "Censoring"
- File 5: Steve Jackson Games (SJG) Update
- File 6: The Future of Hacking and the System Security Profession
- File 7: The Ultimate Interface: Hackers and the Private Sector
- File 8: CU in the News: "Hackers" and Bank Blackmail in England
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.10 (November 2, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose Funds--A Humanitarian Necessity
- File 3: EFF Seeks Executive Director (Job Announcement)
- File 4: Massachusetts Computer Crime Bill
- File 5: Re: C-u-D, #2.09 Censoring of gif's
- File 6: The Piratical Dilemma
- File 7: Obtaining Identification Cards
- File 8: Logisticon vs. Revlon
- File 9: In-House Security Problems
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
-
- Volume 2, Issue #2.11 (November 13, 1990)
-
- *** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: PhD Candidate Seeks information on the CU
- File 3: Riggs, Darden, and Grant Sentenced
- File 4: Prodigy Saga Continues
- File 5: Re: Response to Mars "Censoring"
- File 6: Response to SJG Affidavit (part 1)
- File 7: Warrants schmarrants! The SS is Crazy!
- File 8: More guidelines on what to do if busted
- File 9: CU in the News--England and Emma Nicholson; VOGON News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.13 (November 25 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: EPIC (Effective Performance in Candidates)
- File 3: The Riggs Sentencing (reprint from Newsbytes)
- File 4: First Conference on Computers, Freedom & Privacy
- File 5: Hackers Break into DEA Lines
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
-
- Volume 2, Issue #2.14 (November 30, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose Indicted
- File 3: CPSR's FOIA request from the FBI
- File 4: International Information Retrieval Guild
- File 5: A Note on Censorship
- File 6: Two Comments on Prodigy
- File 7: Don't Talk to Cops
- File 8: Response to DEA/PBX News Story
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.15 (December 5, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose Indictment in Illinois
- File 3: 2600 Magazine Response to Atlanta Sentencing
- File 4: List of Computer Underground Clippings
- File 5: Computer Crime Laws list
- File 6: Media and the CU
- File 7: The Hermetic Underground
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.16 (December 10, 1990)
-
- *> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <*
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- Volume 2, Issue #2.17 (December 16, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: EFF Response to Atlanta Sentencing Memorandum
- File 4: Some Thoughts on the Atlanta Sentencing
- File 5: Earning your Stripes
- File 6: Playgrounds of the Mind: Cyberspace
- File 7: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.18 (December 28, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Computers Under Attack
- File 4: CU Resources in Germany
- File 5: Trade Secrets; When are they Bad?
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Volume 2, Issue #2.19 (December 31, 1990)
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Telecoms Ripping off BBSs?
- File 4: Michigan Bell vs BBSs
- File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
- File 6: a.k.a. freedom of expression
- File 7: Z-modem Virus Alert
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ********************************************************************
- ****** END OF CuD VOLUME TWO - INDEX ********
- ********************************************************************
-
- ***************************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-