home *** CD-ROM | disk | FTP | other *** search
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.22 (June 21, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / / Bob Kusumoto
- ARCHMASTER: Brendan Kehoe
-
- +++++ +++++ +++++ +++++ +++++
-
- CONTENTS THIS ISSUE:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Punishment and Control: Reply to Gene Spafford
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- CuD is available via electronic mail at no cost. Hard copies are available
- through subscription or single issue requests for the costs of reproduction
- and mailing.
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues of Computer Underground Digest on CompuServe can be found
- in these forums:
- IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
- LAWSIG, DL1 (Computer Law)
- TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
- Back issues are also available from:
- GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
- (2) cudarch@chsun1.uchicago.edu;
- (3) dagon.acc.stolaf.edu (130.71.192.18).
- E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Moderators' Corner
- Date: 21 June, 1991
-
- ********************************************************************
- *** CuD #3.22: File 1 of 3: Moderators Corner ***
- ********************************************************************
-
- +++++++++++++++++
- Three LoD members form Comsec Data Security
- +++++++++++++++++
-
- Craig Neidorf sent over the following article announcing the formation
- of a security company by three former members of the Legion of Doom.
- The new company was not a sudden inspiration, but the result of
- considerable research and groundwork prior to the announcement.
- According to the partners, the Texas-based companies has already
- landed several significant contracts. When asked why anybody should
- hire ex-hackers, one commentator responded that security, like
- hacking, is just another form of puzzle-solving, and those who can
- find the holes are likely to those most-able to close them.
-
- *****
-
- From: TIME Magazine, June 24, 1991, page 13.
-
- AFTER YOU'VE BEAT 'EM -- JOIN 'EM
-
- After infiltrating some of America's most sensitive computer banks,
- is there any challenge left for a digital desperado? Only to go legit,
- say three former members of the notorious hacker group, the LEGION OF
- DOOM, who have quit the outlaw game to start Comsec Data Security. The
- Legionnaries claimed an 80% success rate in penetrating computer
- networks, and now they want to teach private industry to protect itself
- >from the next generation of intruders. "You can't put a price tag on the
- information we know," says Scott Chasin, a Comsec partner. But they'll
- try.
-
- (This article features a color photo of the three founding members:
- Erik Bloodaxe, Doc Holiday, and Malefactor.)
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
-