home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Feb 28 1993 Volume 5 : Issue 17
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Seniur
-
- CONTENTS, #5.17 (Feb 28 1993)
- Subject: File 1--Police motivations re. computer crime
- Subject: File 2--ACLU Interesting in Rusty & Edie's BBS?
- Subject: File 3--Re: File 4--Technology & Populist Publishing (#5.15)
- Subject: File 4--A Case for Electronic Publishing
- Subject: File 5--Obtaining Back Issues of CuD via FTP
- Subject: File 6--New Computer Viruses Run Amok (sort of) (Reprint)
- Subject: File 7--Netsys Startup
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
- at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
- 466893; and using anonymous FTP on the Internet from ftp.eff.org
- (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
- /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
- ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 26 Feb 1993 00:22:00 -0500 (EST)
- From: MFPORTER@DELPHI.COM
- Subject: File 1--Police motivations re. computer crime
-
- In the wake of every law enforcement action involving hackers,
- there is speculation about the motives of the police and the
- government in targeting computer-related crime. As readers of CuD well
- know, this topic can lead to some very wild conclusions -- The
- Government must be afraid of something! They see "hackers" as a threat
- to national security! The police are pawns of multi-national
- corporations!
-
- Conclusions such as these make for exciting commentary, but in the
- end they are not productive. They play sharply upon people's fears,
- but they sidestep the real challenges which face the community of
- computer users.
-
- The vast majority of the "hacker crackdown" actions and the
- ongoing harassment of hackers have nothing to do with perceived
- threats to national security. Most of the law enforcement actions
- against hackers have consisted of cops simply trying to do their job:
- protecting people from crime. This job includes protecting corporate
- persons such as AT&T and the RBOCs, as well as their customers. (This
- may not be the best use of our society's limited police resources, but
- that's a different issue, as is the question of what should be defined
- as a "crime.") To the police and prosecutors, the computer criminal is
- just another criminal. In this sense, at least, in most computer-crime
- cases -- as in most cases in general -- law enforcement agencies have
- good intentions.
-
- Good intentions, however, do not mean that there is not a real
- threat to the civil liberties of those who use computers and telephone
- networks. From Operation Sun Devil to the still-murky incident at the
- Pentagon City Mall, we all have cause for concern about the choices of
- both targets and methods by those who seek to fight computer-related
- crime, whatever their intentions. Actions which are designed to deter
- crime may all too easily deter honest citizens from exercising their
- constitutionally protected freedoms. As Justice Louis D. Brandeis
- wrote in 1928:
-
- Experience should teach us to be most on our guard to
- protect liberty when the Government's purposes are
- beneficent. Men born to freedom are naturally alert to
- repel invasion of their liberty by evil-minded rulers. The
- greatest dangers to liberty lurk in insidious encroachment
- by men of zeal, well-meaning but without understanding.
- (_Olmstead v. United States_)
-
- It's that lack of understanding which results in most of the
- problems before us. We've all heard plenty of examples of some law
- enforcement agents' lack of understanding of the computer world, be it
- "underground" or otherwise. Extreme conclusions about the
- government's motives, jumped to by some members of the computer
- underground, show the lack of understanding on the other side.
-
- Those who rely upon computers -- that is, everyone in the
- developed world -- and everyone who is interested in preserving civil
- liberties must work to bridge this gap in understanding. Books such as
- _The Hacker Crackdown_, with its candid and fair assessment of the
- events of 1990, from both sides of the fence, are an important step in
- the right direction. So is the work of the Electronic Frontier
- Foundation, which uses the tools of law and government to educate
- those in power and to challenge those who would threaten our freedom.
- Paranoia and extremism, on either side, does little to help.
-
- ((The author is an attorney in Maryland and a former systems analyst.))
-
- ------------------------------
-
- Date: 26 Feb 1993 05:31:19 (EST)
- From: anonymous@anony.mous.edu
- Subject: File 2--ACLU Interesting in Rusty & Edie's BBS?
-
- ((MODERATORS' NOTE: The following summary was sent to us from a
- Clarinet reader. One source cautions that the press may have
- over-stated the involvement of the ACLU at this point. Also, the rumor
- that the FBI seized the house in which the R&E computers were stored
- is apparently not true. Reportedly, the FBI is returning the file
- cabinet in which tax documents, house title, and other records were
- kept.))
-
- BOARDMAN, Ohio (UPI) -- The American Civil Liberties
- Union of Ohio says it may challenge the constitutionality of an
- FBI raid that shut down a Boardman computer bulletin board
- service.
-
- The Jan. 30 raid at the home of Russell and Edwinia
- Hardenburgh was conducted with a search warrant that alleged the
- couple illegally distributed copyrighted software programs
- without permission.
-
- The story reports that the board was one of the largest in the
- country, with 124 phone lines. According to the story, R&E's
- logged 3.4 million calls since 1984 and more than 4,000 new calls
- daily. R&E's had over 14,000 subscribers.
-
- The story summarizes the equipment seized, including business
- records and hardware.
-
- The ACLU's Ohio legal director, Kevin O'Neill, said
- Thursday the FBI copyright infringement allegations might have
- merit, but such allegations are normally resolved in civil
- lawsuits. He noted that Rusty & Edie's 14,000 subscribers are
- more subscribers than many small circulation newspapers enjoy.
-
- "Shutting down a computer bulletin board is analogous
- to shutting down a newspaper printing press," O'Neill said.
- "Our conception of constitutionally protected public forums
- must be broadened to include new communication networks like
- computer bulletin boards."
-
- The story reports that no charges have been filed against the
- Hardenburgs and quotes Mark Kindt, a Cleveland businessman and
- former regional director for the Federal Trade Commission, as
- comparing the FBI raid to "hunting gnats with an elephant gun,"
- and he suggests that the FBI should have been more careful in its
- procedures.
-
- ``Computer bulletin boards are electronic town halls.
- Even if (Rusty & Edie's) pirated the moon, the government should
- have proceeded in a more careful, deliberative manner."
-
- ------------------------------
-
- Date: Thu, 25 Feb 93 10:43:38 PST
- From: kurt@tc.fluke.COM (Kurt Guntheroth)
- Subject: File 3--Re: File 4--Technology & Populist Publishing (#5.15)
-
- Sheesh. Of course book publishing is business. Why should people
- bear the great expense of typesetting, printing, and distributing a
- book if they don't expect to make any money out of it. Sure, you'll
- say it's for the love of books or the pursuit of knowledge, but that's
- bullshit. Remember, if the publisher can't sell the book, that means
- NOBODY WANTS TO READ IT.
-
- Now maybe you know of a bunch of books that nobody wants to read but
- are so critical to our intellectual growth that they must be published
- anyway. I don't. I see a bunch of hack authors who THINK they have
- something important to say, and a bunch of cultists, and a bunch of
- paranoid conspiracy theorists, who can't get their garbage published
- and want to take it out on anybody but themselves.
-
- Sure an occasional gem may get missed by an editor pressed for time
- and buried under mounds of material. But remember, those guys are
- paid to find all the good stuff. They're quite motivated. I don't
- think they miss very often.
-
- Does a bunch of dreck get published? Sure. Is it worse than your
- dreck? Maybe but maybe not. My father has written a book about his
- dog for cirssakes. He can't get it published even though he's
- convinced everyone wants to learn of his dog's great spirit and almost
- telepathic link to her master. What's wrong with this picture? Is it
- the cruel money hungry publishing industry, or perhaps has the author
- misjudged the world's need to learn about his hound?
-
- In short, I don't blame the publishing industry. Everyone in the
- universe thinks they can write the great american novel. 99% of them
- are dead wrong.
-
- ------------------------------
-
- Date: Sat, 27 Feb 1993 23:18:54 (CST)
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
- Subject: File 4--A Case for Electronic Publishing
-
- Kurt Guntheroth makes several legitimate points in criticizing the
- problems of electronic publishing. Yes, there is much chaff amidst the
- wheat. Yes, everybody who writes (obviously) thinks that they have
- something worth reading. Yes, there is much value in the gate-keeping
- processes of the publishing business. Yes, the advent of electronic
- publishing could flood cyberspace with near-infinite bytes of
- nonsense. But, while agreeing on those points, let's take a second
- look at the implications of Phil Shapiro's post in CuD 5.15 to which
- Kurt responds ("Something's not quite right," File 4).
-
- The original poster made two main points: Conventional publishing,
- whether books or peer-reviewed journal articles, is an arduous task,
- far more difficult than non-writers recognize. Publishers may reject
- books because of quality or because the manuscript, while worthy, does
- not fall within a topical theme that many publishers, especially
- academic ones, put together as a specialty for marketing purposes.
- Although writers with a demonstrable track record of successful
- publishing often need only provide a short prospectus and perhaps a
- first chapter to entice a publisher to offer a contract, most writers
- must provide more. It is expensive and time consuming to identify and
- contact appropriate publishers, which dissuades many from publishing.
- Rejections are generally discouraging, and only with experience (and
- some previous publishing success) does an author realize that
- rejection is built into the publishing game. Writing and publishing
- are both psychologically and physically hard work.
-
- Second, the original poster correctly identified the potential of
- electronic media as a possible alternative that would supplement,
- *not* replace, conventional publishing. I agree with the spirit of
- Kurt's criticisms--the potential for expanded access to ideas and
- information carries with it the risk of inundation with banal
- self-indulgence. However, the value of the former considerably
- outweighs the risks of the latter.
-
- Let's compare a few features of print with electronic media.
-
- 1. Book publishing is market driven. This is not necessarily bad, but
- it does mean that if an insufficient audience exists to purchase the
- book, it will likely not be published.
-
- 2. Book publication is slow. The core ideas of most scholarly works
- are at least two years old when a book hits the streets. For example,
- a book written in 1986-87 that is submitted to the publisher in 1988
- would undergo editing, minor revisions, and galley proofing, and hit
- the streets in 1989.
-
- 3. Books are generally limited by a production format that conforms to
- preferred length and style. This can impose arbitrary restrictions of
- ideas presented in chapters, shape the organization of the ideas and
- discourse, and artificially truncate the development of crucial ideas.
-
- None of these disadvantages are prohibitive. Authors and publishers
- have worked around them for centuries. But, electronic publishing
- offers something more. What does it offer?
-
- 1. Electronic publishing is fairly immediate. One can "publish" as
- soon as the text has been typed in (and hopefully edited and
- spell-checked). For scholarly works, this dramatically updates data,
- disseminates ideas and scholarship, and keeps others abreast of
- research and bibliographies in a timely fashion.
-
- 2. Electronic publishing is, for the end user, nearly free.
- Newsletters such as Telecom Digest, EFFector, People's Tribune,
- Cu-Digest, or the E-Journal need not recoup postage, publication
- costs, or salaries for the masochistic folk who put them out.
-
- 3. Electronic publishing is able to effectively and economically
- target and reach a fairly specialized audience and fill a vacuum
- untouched by print media. There is no hard-copy counterpart to CuD,
- PHRACK, the cDc publications, Activist Times Inc., and some of the
- other successful journal/newsletters.
-
- 4. Electronic publishing is effective. Readers can judge for
- themselves the value of CuD, but it's undeniable that the pioneering
- efforts of PHRACK, LOD/TJ, P/hun, PIRATE, and similar publications
- were critical to shaping one slice of the computer culture of the
- 1980s. Comparable hardcopy publications would unlikely have been as
- effective or as widely distributed.
-
- That said, some critics identify potential problems. The drawbacks of
- electronic publishing derive in part from its strengths. The ease of
- publication reduces quality control; Some doubt that the review
- process for scholarly journals would be as rigorous (although there is
- certainly no reason inherent in the medium for this to be so);
- Gresham's law might apply--schlock will drive out the quality works;
- nobody will read it.
-
- I have more faith in cybernauts than the critics. A few examples might
- illustrate my point.
-
- 1. Most end-users possess a delete function (or, at worst,
- ctl/alt/del). One isn't forced to read a 500K tome if it is dull, and
- poor works will remain confined to a space in a directory corner and
- eventually be copied over with something more pleasing.
-
- 2. Current forms of electronic communication provide hints for the
- fate of works in which there is no interest. Electronic newsletters
- come and go, Usenet and other discussion groups emerge and if they are
- popular, they thrive. If they are unpopular, they languish and stay
- dormant. Telecom Digest has been in existance for over a decade, and
- PHRACK for almost as long. Even CuD is entering its fourth year. They
- have not been driven out by the explosion of other publications, and
- their readership steadily increases. If electronic publications
- attempt to remain sensitive to the audience and attempt--as Pat
- Townson has done with Telecom Digest--to keep on the cutting edge of
- timely issues, they will continue to provide a valuable supplement to
- print media.
-
- 3. Electronic publications are often ad hoc and unsupervised. For
- media intending to establish credibility as scholarly outlets, this
- can be a problem. Electronic publications are rarely peer reviewed,
- publications generally do not count toward the tenure sheet, and
- without some quality control, the "findings" of studies may lack
- legitimacy. The way around this simple: Professional associations can
- more aggressively sponsor electronic media in the same way that many
- sponsor their journals. If, for example, the Midwest Sociology Society
- began an electronic journal, it could have the same quality controls,
- the same editorial guidance, and the same procedure it uses for its
- hardcopy quartly (The Sociological Quarterly). The same could apply
- to monographs, whether fiction or non-fiction.
-
- 4.1 If everybody who thought they could write a book actually wrote
- one, the nets would be inundated. This possibility, though, is
- unlikely. Not everybody who thinks they can write a book is actually
- capable of doing so, and many a work lies uncompleted because the
- author lost steam, ideas, or motivation to continue. Books are also
- difficult to read on-line, and printing them off can be more of a
- bother than it's worth. Even hypertext (or the equivalents) requires
- considerable perseverance by the reader to wade through a long tome.
- It is unlikely that books will flood the nets.
-
- 5) How do we respond to "trash?" Even recent participants in Usenet
- newsgroups are aware of the high signal-to-noise ratio in most groups.
- Delete keys and kill files work quite well. Or, in the worst cases,
- one simply unsubscribes, and Voila! No more trash.
-
- A few examples from my own experience illustrate some of the potential
- of electronic publishing. In teaching criminal justice courses, I'm
- often unable to find appropriate texts. It's possible to pull together
- papers from journals and use Kinko's to reproduce them. This, however,
- can be expensive and the problems of copyright must be overcome.
- Colleagues with works-in-progress, unpublished papers, or book
- chapters in draft form share the electronic versions which I print out
- for a fraction of conventional publishing (or even Kinko) costs, and
- they become the classroom resource. Texts are thereby tailored to a
- specific course with a specific instructor's style, students save
- money, and life is good. In a second example, I finished a draft
- chapter for a book. The draft was several hundred pages long, and it
- had to be reduced to about 35 pages. The full text, although
- book-length, was a bit too narrow for a conventional book market.
- Through the marvels of electronic publishing, I was able to tailor it
- to a course I periodically teach, revise it each time the course is
- taught, and use it in place of a text. It's quick, cheap, makes
- lecturing much easier, the students are happy, the instructor is
- happy, and life is good. Could this manuscript be revised into a
- conventional book? Sure. But time constraints and changing interests
- make it unlikely that I ever will. I'm quite content to limit it to
- friends' and classroom use. Here, Kurt is again correct--this is a
- work that isn't appropriate in its present form for a book. But, Phil,
- too, is correct--conventional publishers have left a gap, and the
- value of electronic publishing is the ability to fill it.
-
- The publishing industry is lagging behind to the extent that it is not
- developing innovative ways of plugging into the electronic age to take
- advantage of the accessibility and economy of a potential market.
- Especially in times of economic crunch, many of us are cutting back on
- books and journals and relying more on less conventional media for
- professional development. As the price of books increases, many of us
- are simply priced out of the market. We are not priced out of the net.
-
- It bears repeating that I am not arguing for a replacement for
- conventional publications, but for a supplement to them. As one who
- publishes extensively in conventional outlets, I fully recognize
- their value. The way to publish electronically is to...is to..well,
- is to publish electronically. The outlets are growing, as illustrated
- by those on Arachnet, a Bitnet discussion group devoted to addressing
- these issues. The E-Journal provides a model for how an electronic
- medium can establish an editorial board and a peer review process.
- Telecom Digest and Risks Digest are nifty examples of accurate and
- up-to-date information being spread, debated, and refined. Cu-Digest
- is an example of how USA Today might look if it went electronic with
- an open forum (according to one observer, although I'm not sure if
- that's an insult or a compliment).
-
- In short, I agree with Kurt, but I also agree with Phil Shapiro.
- Electronic publishing possesses risks, but it also possesses a
- potential whose value has barely been recognized. Those who have read
- to this line are on the cutting edge of it all, and the way to develop
- it is to submit articles, subscribe to newsgroups, and continue to
- participate in carving out a niche on the frontier.
-
- ------------------------------
-
- Date: Sat, 27 Feb 1993 11:41:21 (CST)
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
- Subject: File 5--Obtaining Back Issues of CuD via FTP
-
- CuD Moderators are continually asked: "What's ftp and how to I use
- it?"
-
- "FTP" stands for File Transfer Protocol and is a way of obtaining
- files from a remote site. You must have a computer account with ftp
- capability. Universities and some public access systems are common
- locations for such accounts. The system you are on must also support
- ftp. If you aren't sure what this means, contact your local sysguru.
- If you have access only to your favorite local BBS, you're out of
- luck. You should invest a few dollars for an account on The Well,
- Mindvox, Netsys, Netcom, or some of the other systems providing
- ftp/telnet/IRC and other services.
-
- Addresses for the ftp sites are listed in the header at the top of
- each issue of CuD. The CuD archives and mailserver are maintained by
- a bunch of hardworking guys (listed in the header, above) and through
- the generosity of the systems that provide the space. If you browse
- the archives, keep these points in mind as a matter of courtesy to
- those providing the space:
-
- 1. USE THE FACILITIES DURING OFF-HOURS (the more off the better) TO
- LIMIT CONGESTION
-
- 2. DO NOT STAY ON LONGER THAN NECESSARY
-
- 3. USE THE SITE CLOSEST TO YOU
-
- The CuD Archmeisters have set up the sites identically. If your system
- allows ftping, you can try typing this command:
-
- ftp some.address.you.choose.edu
-
- Then, assuming all works as it should, you will be connected and asked
- for your login. At the prompt, type: anonymous
-
- You will then be asked for your password. Type your logon id. If I were to
- log into Dan Carasone's site in Australia, I would simply type:
- login? anonymous
- pw? tk0jut2@mp.cs.niu.edu
-
- You move about in these systems as you would in most other Unix
- systems. Use "cd" to change directories, "ls" to see what's in a
- directory, and other standard stuff. Remember, commands, directory
- names, and files are case-sensitive, so be sure to keep upper and
- lower case letters straight. After you've logged in, change to the
- cud directory by typing:
- cd pub/cud
-
- Then type
- ls
- and you should see the following:
-
- 150 Opening ASCII mode data connection for /bin/ls.
- total 120
- -rw-r--r-- 1 brendan 12 0 Apr 25 1992 .notar
- -rw-r--r-- 1 brendan 149 5291 Feb 24 08:11 Added
- -rw-r--r-- 1 brendan 149 11776 Feb 24 08:11 Index
- drwxr-xr-x 2 brendan 149 512 May 18 14:08 alcor
- drwxr-xr-x 2 brendan 149 512 May 18 14:08 ane
- drwxr-xr-x 2 brendan 149 512 Jan 3 22:12 aotd
- drwxr-xr-x 2 brendan 149 1024 Nov 12 22:41 ati
- drwxr-xr-x 2 brendan 149 512 May 18 14:08 bootlegger
- drwxr-xr-x 3 brendan 149 512 Apr 25 1992 ccc
- drwxr-xr-x 2 brendan 149 3584 Jan 7 04:04 cdc
- drwxr-xr-x 2 brendan 149 512 Apr 25 1992 cdugd
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 chalisti
- drwxr-xr-x 2 brendan 149 512 Feb 24 08:10 chaos
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 cpi
- drwxr-xr-x 2 brendan 149 3584 Feb 22 22:45 cud
- drwxr-xr-x 2 brendan 149 512 Oct 17 05:28 dfp
- drwxr-xr-x 2 brendan 149 512 Apr 25 1992 fbi
- drwxr-xr-x 2 brendan 149 512 Nov 2 19:24 inform
- drwxr-xr-x 2 brendan 149 1024 Apr 25 1992 law
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 lod
- drwxr-xr-x 2 brendan 149 512 Feb 10 01:54 misc
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 narc
- drwxr-xr-x 2 brendan 149 512 Apr 25 1992 networks
- drwxr-xr-x 2 brendan 149 512 Apr 25 1992 nfx
- drwxr-xr-x 2 brendan 149 1536 Oct 6 17:38 nia
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 nsa
- drwxr-xr-x 2 brendan 149 1536 Dec 11 07:53 papers
- drwxr-xr-x 2 brendan 149 512 Feb 10 01:54 phantasy
- drwxr-xr-x 2 brendan 149 1024 Jan 7 04:08 phrack
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 phun
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 pirate
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 ppp
- drwxr-xr-x 2 brendan 149 1024 Apr 25 1992 schools
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 synd
- drwxr-xr-x 2 brendan 149 512 May 18 14:09 tap
- drwxr-xr-x 2 brendan 149 512 Sep 18 17:58 upi
- drwxr-xr-x 2 brendan 149 512 Nov 29 21:22 wview
-
- Each of the above are subdirectories that contain papers, journals,
- and other documents. "phantasy" contains back issues of Phantasy.
- "lod" contains the "Legion of Doom/Technical Journals." "cud"
- contains all the back issues of CuD, including indexes. To get to
- these subdirectories, simply type
- cd cud (or: cd tap or whatever).
- To download a file, the command is get file.name (or, for multiple
- files,
- mget file.name1 file.name2)
-
- A file that ends in .Z is a compressed file, which means, after
- downloading to your own system, you must uncompress. If you
- get a file called file.Z, to uncompress the command
- uncompress file.Z should work.
-
- If this sounds confusing, we strongly recommend purchasing Brendan
- Kehoe's ZEN AND THE ART OF THE INTERNET or Ed Krol's THE WHOLE
- INTERNET. Both are worth having, and both provide easy-to-follow
- instructions.
-
- PLEASE REMEMBER: AS A COURTESY TO THOSE WHO MAINTAIN THE ARCHIVES AND
- ESPECIALL TO THOSE KIND ENOUGH TO PROVIDE SPACE, BE GOOD NET CITIZEN:
- 1) LOG IN AT OFF-HOURS (after midnight on the site's time), 2) DO NOT
- BE A HOG, and 3) USE THE SITE NEAREST YOU.
-
- If you have problems with ftp, it is best to first ask your local
- gurus for advice rather than the ftp site crowd or the CuD moderators.
- We don't know your system, so we're not the ones to ask.
-
- ------------------------------
-
- Date: Sat, 27 Feb 93 11:27 CST
- From: tk0kbf1@mvs.cso.niu.edu
- Subject: File 6--New Computer Viruses Run Amok (sort of) (Reprint)
-
- This came to me in e-mail today, having travelled around half the
- country first. I don't know who Maggie Zarnosky is, but she deserves
- a big thank you. Spread it around with pleasure!
-
- ================================================================
-
-
- MAGGIE ZARNOSKY, LIBRARY, VA. POLYTECHNIC UNIV.,SENT ME THIS. ENJOY!!:
-
- VIRUSES:
-
- PAUL REVERE VIRUS: This revolutionary virus does not horse around.
- It warns you of impending hard disk attack---once if by LAN,
- twice if by C:.
-
- POLITICALLY CORRECT VIRUS: Never calls itself a "virus," but instead
- refers to itself as an "electronic microorganism."
-
- RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of
- how old it is. If you attempt to erase a file, it requires you to
- first see a counselor about possible alternatives.
-
- ROSS PEROT VIRUS: Activates every component in your system, just
- before the whole thing quits.
-
- MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
-
- OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB,
- and then slowly expands back to 200MB.
-
- AT&T VIRUS: Every three minutes it tells you what great service you
- are getting.
-
- THE MCI VIRUS: Every three minutes it reminds you that you're paying
- too much for the AT&T virus.
-
- TED TURNER VIRUS: Colorizes your monochrome monitor.
-
- ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll
- be back.
-
- DAN QUAYLE VIRUS: Prevents your system from spawning any child
- processes without joining into a binary network.
-
- DAN QUAYLE VIRUS 2: Their is sumthing rong with your computer, ewe
- just can't figyour out watt.
-
- GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic
- software says everything is fine.
-
- NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of
- people really mad just thinking about it.
-
- FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of
- little units, each of which does practically nothing, but all of
- which claim to be the most important part of the computer.
-
- GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent
- of their data 14 percent of the time (plus or minus a 3.5 percent
- margin of error).
-
- TERRY RANDLE VIRUS: Prints "Oh no you don't" whenever you choose
- "Abort" from the "Abort, Retry, Fail" message.
-
- TEXAS VIRUS: Makes sure that it's bigger than any other file.
-
- ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
-
- MICHAEL JACKSON VIRUS: Hard to identify because it is constantly
- altering its appearance. This virus won't harm your PC, but it will
- trash your car.
-
- CONGRESSIONAL VIRUS: The computer locks up, screen splits eratically
- with a message appearing on each half blaming the other side for the
- problem.
-
- AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
-
- FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own
- motherboard.
-
- PBS VIRUS: Your PC stops every few minutes to ask for money.
-
- ELVIS VIRUS: Your computer gets fat, slow, and lazy and then self
- destructs, only to resurface at shopping malls and service stations
- across rural America.
-
- OLLIE NORTH VIRUS: Turns your printer into a document shredder.
-
- NIKE VIRUS: Just Does It!
-
- SEARS VIRUS: Your data won't appear unless you buy new cables, power
- supply, and a set of shocks.
-
- JIMMY HOFFA VIRUS: Nobody can find it.
-
- CONGRESSIONAL VIRUS: Runs every program on the hard drive
- simultaneously, but doesn't allow the user to accomplish anything.
-
- KEVORKIAN VIRUS: Helps your computer shut down whenever it wants to.
-
- IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up
- then subtracts money from your Quicken account and spends it all on
- expensive shoes it purchases through Prodigy.
-
- STAR TREK VIRUS: Invades your system in places where no virus has gone
- before.
-
- HEALTH CARE VIRUS: Test your system for a day, finds nothing wrong, and
- sends you a bill for $4,500.
-
- GEORGE BUSH VIRUS: It starts by boldly stating, "Read my test.... no
- new files!" on the screen, proceeds to fill up all the free space on
- your hard drive with new files, then blames it on the Congress Virus.
-
- CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a
- 286/AT.
-
- LAPD VIRUS: It claims it feels threatened by the other files on your PC
- and erases them in "self-defense."
-
- CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last
- in the reviews, but you still love it.
-
- ------------------------------
-
- Date: Sun, 21 Feb 93 20:33:40 PST
- From: Len Rose <len@NETSYS.COM>
- Subject: File 7--Netsys Startup
-
- NETSYS COMMUNICATION SERVICES Palo Alto, California
-
- Netsys is a network of large Sun servers dedicated to providing
- Internet access to individuals and corporations that need solid,
- reliable Internet connectivity.
-
- An account on Netsys will provide members with :
-
- Electronic Mail: to/from the Internet and gatewayed networks.
- (including BITNET, MILNET, and even Compuserve).
-
- Usenet: The worldwide networked message system that generates
- roughly 40-50 megabytes of information daily.
-
- Telnet: The capability to login to any remote host in any part
- of the world.
-
- Ftp: The ability to send and receive documents/programs/data
- to/from any site in the world.
-
- Misc: Archie,Gopher, Internet Relay Chat, and WAIS search tools.
-
- Support: 24 hour emergency response service.
-
- Dialups: Palo Alto area, High Speed (V.32 and PEP)
-
- Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes)
-
- $1 per megabyte per month over 5 megabytes.
-
- Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes)
- $1 per megabyte per month over 10 megabytes.
-
- Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
- newsgroups,and including all foreign newsgroups.
-
- SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE
-
- Satellite Weather: Netsys has available real time satellite weather
- imagery. Images are available in gif, or Sun raster
- format. Contact us for NFS mirroring, and other special
- arrangement. These images are directly downlinked from
- the GOES bird. Contact Steve Eigsti (steve@netsys.com)
-
- Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service
-
- for large volume news distribution. Members of Netsys
- can obtain substantial discounts for the purchase and
- service costs of this revolutionary method of Usenet news
- distribution.Both Unix and MS Windows software available.
- Contact Kate Alexander (kate@pagesat.com) for product
- information.
-
- Paging Services: Netsys is offering Pagesat's Internet to Pager mail service.
- Members of Netsys can obtain critical email to pager
- services. Pagesat has the ability to gateway any critical
- electronic mail to your display pager.
-
- Leased Line Internet Connections
-
- Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
- United States. Since Pagesat is an FCC common carrier, our savings on
- leased lines can be passed on to you. For further information, contact
- Duane Dubay (djd@pagesat.com).
-
- We offer other services such as creating domains, acting as MX
- forwarders, and of course uucp based newsfeeds.
-
- Netsys is now offering completely open shell access to internet users.
- For accounts, or more information , send mail to netsys@netsys.com
-
- Netsys will NEVER accept more members than our capacity to serve.
-
- Netsys prides itself on it's excellent connectivity (including multiple T1's,
- and SMDS) ,lightly loaded systems, and it's clientele.
-
- We're not your average Internet Service Provider. And it shows.
-
- ------------------------------
-
- End of Computer Underground Digest #5.17
- ************************************
-
-