home *** CD-ROM | disk | FTP | other *** search
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.14 (April 26, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- GAELIC GURU: Brendan Kehoe
-
- +++++ +++++ +++++ +++++ +++++
-
- CONTENTS THIS ISSUE:
- File 1; Moderators' Corner
- File 2; Comments on your comments on Len Rose
- File 3; Moving toward Common Ground? Reply to Gene Spafford
- File 4; CERT Advisory - Social Engineering
- File 5; And Fox is after the Hollywood Hacker?
- File 6; MONDO -- GREAT NEW 'ZINE!
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
- (2) cudarch@chsun1.uchicago.edu;
- (3) dagon.acc.stolaf.edu (130.71.192.18).
- E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Moderators' Corner
- Date: 26 April, 1991
-
- ********************************************************************
- *** CuD #3.14: File 1 of 6: Moderators Corner ***
- ********************************************************************
-
- ++++++++++++++++++++
- Mail and Corrupted Issues
- ++++++++++++++++++++
-
- We received a number of notes asking about the resend of CuD 3.13.
- Our system is an IBM clone, and the mailer is patched in. When we have
- mail problems, we are not able to determine the status of any mail we
- send out because of the limited capabilities of the patch. On
- occasion, especially during net-jams, this leads to some readers
- receiving duplicate files. If a number of files are corrupted, as
- sometimes happens when the nets are jammed or a gateway is not
- operating properly, it is sometimes necessary to resend a file or, in
- the case 3.13, the entire list. Optimal size is about 40K, and the
- last issue ran well over that. To facilitate mailing, we deleted the
- single file that brought us to the 40 K file size and re-sent. If
- people are experiencing problems receiving CuD, drop us a note.
-
- We have also received on 23 April a horde of email posts dated between
- 30 March-2 April. The bulk of it seemed to originate from the west and
- southwest. We generally reply to posts on the same day they are
- received, so if you do not receive a reply, let us know.
-
- ++++++++++++
- LET US KNOW IF YOUR ACCOUNT EXPIRES
- ++++++++++++
-
- If your account is about to expire, please drop a note simply saying
- "unsub," and be sure to include at the bottom your account number.
-
- ++++++++++++++++
- Information on subversive software wanted
- ++++++++++++++++
-
- Gordon is in the beginning stages of research for a technical paper on
- 'subversive' software. The article will discuss software that has
- been written for unusual purposes and circumstances, not all of which
- may be legal. Examples in this "genre" would be 'Fuckin' Hacker',
- 'Code Thief', and 'Receipt Writer'.
-
- It would be helpful to gather as many examples as possible, from many
- different computer platforms. He is *not* seeking executable copies,
- but just the name and description of the program. Any additional
- historical information, such as author name, date, innovative
- features, etc would be a bonus. If you can recall having seen, used,
- or heard of any unusual software that you feel fits in this category
- He would appreciate it if you'd drop me a line. The article has not,
- as of yet, been slated for publication, but he will supply a finished
- copy to anyone who responds or requests one. The finished work may
- also appear in a future issue of CuD.
-
- Thanks for your time and assistance! Gordon Meyer
- 72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at
- tk0jut2@niu.bitnet
-
- +++++++++++++++++++++
- PhD Seeks info on Computer Security
- +++++++++++++++++++++
-
- Paul Taylor, a PhD candidate in England, sent the following note
- along. He is doing some interesting research, and is trying to
- obtain additional data.
-
- +++++++
-
- From: P.A.Taylor@EDINBURGH.AC.UK
- Subject: PhD Seeks Info on Computer Security
- Date: 18 Apr 91 14:17:16 bst
-
- I'm into the second year of a PhD looking at the rise of the computer
- security industry and the concomitant rise of cracking/browsing and
- viruses, here at the University of Edinburgh.
-
- Part of my research involves e-mail interviews and questionnaires. If
- you would be willing to take part in it, then please get in touch.
- I'll send you a yes/no type questionnaire and after that if you are
- willing, a set of questions designed more to start a dialogue about
- some of the issues surrounding computer security, which could form the
- basis of an on-going e-mail interview to be acknowledged or kept
- anonymous in my final thesis, depending on the wishes of the
- respondent.
-
- ALL MY WORK IS FOR PURELY ACADEMIC PURPOSES AND TOTAL CONFIDENTIALITY
- IS GUARANTEED.
-
- IF IN DOUBT AS TO MY ACADEMIC STATUS PLEASE CONTACT ME AND INDEPENDENT
- VERIFICATION CAN BE SUPPLIED.
-
- Thank you in advance,
-
- Paul A. Taylor,
- Depts of Economics and Politics,
- Edinburgh University.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
-