home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun May 19, 1996 Volume 8 : Issue 37
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.37 (Sun, May 19, 1996)
-
- File 1--(Fwd) JAVA BLACK WIDOWS - SUN DECLARES WAR
- File 2--The Internet is a library
- File 3--Boardwatch Magazine -- A review
- File 4--"Zen And Blarney" (Boardwatch Reprint on Kevin Kehoe)
- File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sun, 12 May 1996 19:53:03 +0000
- From: David Smith <bladex@bga.com>
- Subject: File 1--(Fwd) JAVA BLACK WIDOWS - SUN DECLARES WAR
-
- "Black Widow" is a really cool name for what are essentially Java virii.
-
- -- David Smith
- -- bladex@bga.com
-
-
- ------- Forwarded Message Follows -------
- Date-- Sat, 11 May 1996 15:48:06 -0400 (EDT)
- From-- "Home Page Press, Inc." <staff@hpp.com>
- Subject-- JAVA BLACK WIDOWS - SUN DECLARES WAR
-
- JAVA BLACK WIDOWS - SUN DECLARES WAR
-
- Sun Microsystems' has declared war on Black Widow Java
- applets on the Web. This is the message from Sun in response
- to an extensive Online Business Consultant (OBC/May 96)
- investigation into Java security.
-
- OBC's investigation and report was prompted after renowned
- academics, scientists and hackers announced Java applets
- downloaded from the WWW presented grave security risks for
- users. Java Black Widow applets are hostile, malicious traps set
- by cyberthugs out to snare surfing prey, using Java as their technology.
- OBC received a deluge of letters asking for facts after OBC
- announced a group of scientists from Princeton University, Drew
- Dean, Edward Felten and Dan Wallach, published a paper declaring
- "The Java system in its current form cannot easily be made secure."
- The paper can be retrieved at
- http://www.cs.princeton.edu/sip/pub/secure96.html.
-
- Further probing by OBC found that innocent surfers on the Web who
- download Java applets into Netscape's Navigator and Sun's
- HotJava browser, risk having "hostile" applets interfere with their
- computers (consuming RAM and CPU cycles). It was also discovered
- applets could connect to a third party on the Internet and, without the
- PC owner's knowledge, upload sensitive information from the user's
- computer. Even the most sophisticated firewalls can be penetrated . . .
- "because the attack is launched from behind the firewall," said the
- Princeton scientists.
-
- One reader said, "I had no idea that it was possible to stumble on
- Web sites that could launch an attack on a browser." Another said,
- "If this is allowed to get out of hand it will drive people away from the
- Web. Sun must allay fears."
-
- The response to the Home Page Press hostile applet survey led to the
- analogy of Black Widow; that the Web was a dangerous place where
- "black widows" lurked to snare innocent surfers. As a result the
- Princeton group and OBC recommended users should "switch off"
- Java support in their Netscape Navigator browsers. OBC felt that Sun
- and Netscape had still to come clean on the security issues. But
- according to Netscape's Product Manager, Platform, Steve Thomas,
- "Netscape wishes to make it clear that all known security problems with
- the Navigator Java and JavaScript environment are fixed in Navigator
- version 2.02."
-
- However, to date, Netscape has not answered OBC's direct questions
- regarding a patch for its earlier versions of Navigator that supported
- Java . . . the equivalent of a product recall in the 3D world. Netscape
- admits that flaws in its browsers from version 2.00 upwards were
- related to the Java security problems, but these browsers are still in use
- and can be bought from stores such as CompUSA and Cosco. A floor
- manager at CompUSA, who asked not to be named, said "its news to
- him that we are selling defective software. The Navigator walks off our
- floor at $34 a pop."
-
- OBC advised Netscape the defective software was still selling at
- software outlets around the world and asked Netscape what action was
- going to be taken in this regard. Netscape has come under fire recently
- for its policy of not releasing patches to software defects; but rather
- forcing users to download new versions. Users report this task to be a
- huge waste of time and resources because each download consists of
- several Mbytes. As such defective Navigators don't get patched.
-
- OBC also interviewed Sun's JavaSoft security guru, Ms. Marianne Mueller,
- who said "we are taking security very seriously and working on it very
- hard." Mueller said the tenet that Java had to be re-written from scratch or
- scrapped "is an oversimplification of the challenge of running executable
- content safely on the web. Security is hard and subtle, and trying to build
- a secure "sandbox" [paradigm] for running untrusted downloaded applets
- on the web is hard."
-
- Ms. Mueller says Sun, together with their JavaSoft (Sun's Java division)
- partners, have proposed a "sandbox model" for security in which "we
- define a set of policies that restrict what applets can and cannot do---these
- are the boundaries of the sandbox. We implement boundary checks---when
- an applet tries to cross the boundary, we check whether or not it's allowed
- to. If it's allowed to, then the applet is allowed on its way. If not, the
- system throws a security exception.
-
- "The 'deciding whether or not to allow the boundary to be crossed' is the
- research area that I believe the Princeton people are working on," said
- Mueller. "One way to allow applets additional flexibility is if the applet
- is signed (for example, has a digital signature so that the identity of the
- applet's distributor can be verified via a Certificate Authority) then allow
- the applet more flexibility.
-
- "There are two approaches: One approach is to let the signed applet
- do anything. A second approach is to do something more complex and
- more subtle, and only allow the applet particular specified capabilities.
- Expressing and granting capabilities can be done in a variety of ways.
-
- "Denial of service is traditionally considered one of the hardest security
- problems, from a practical point of view. As [Java's creator] James
- Gosling says, it's hard to tell the difference between an MPEG
- decompressor and a hostile applet that consumes too many resources!
- But recognizing the difficulty of the problem is not the same as 'passing
- the buck.' We are working on ways to better monitor and control the
- use (or abuse) of resources by Java classes. We could try to enforce
- some resource limits, for example. These are things we are investigating.
-
- "In addition, we could put mechanisms in place so that user interface
- people (like people who do Web browsers) could add 'applet monitors'
- so that browser users could at least see what is running in their browser,
- and kill off stray applets. This kind of user interface friendliness (letting
- a user kill of an applet) is only useful if the applet hasn't already grabbed
- all the resources, of course."
-
- The experts don't believe that the problem of black widows and hostile
- applets is going to go away in a hurry. In fact it may get worse. The
- hackers believe that when Microsoft releases Internet Explorer 3.00 with
- support for Java, Visual Basic scripting and the added power of its
- ActiveX technology, the security problem will become worse.
-
- "There is opportunity for abuse, and it will become an enormous
- problem," said Stephen Cobb, Director of Special Projects for the
- National Computer Security Association (NCSA). "For example, OLE
- technology from Microsoft [ActiveX] has even deeper access to a
- computer than Java does."
-
- JavaSoft's security guru Mueller agreed on the abuse issue: "It's going
- to be a process of education for people to understand the difference
- between a rude applet, and a serious security bug, and a theoretical
- security bug, and an inconsequential security-related bug. In the case of
- hostile applets, people will learn about nasty/rude applet pages, and
- those pages won't be visited. I understand that new users of the Web
- often feel they don't know where they're going when they point and click,
- but people do get a good feel for how it works, pretty quickly, and I
- actually think most users of the Web can deal with the knowledge that
- not every page on the web is necessarily one they'd want to visit.
- Security on the web in some sense isn't all that different from security
- in ordinary life. At some level, common sense does come into play.
-
- "Many people feel that Java is a good tool for building more secure
- applications. I like to say that Java raises the bar for security on the
- Internet. We're trying to do something that is not necessarily easy, but
- that doesn't mean it isn't worth trying to do. In fact it may be worth
- trying to do because it isn't easy. People are interested in seeing the
- software industry evolve towards more robust software---that's the
- feedback I get from folks on the Net."
-
- # # #
-
- The report above may be reprinted with credit provided as follows:
-
- Home Page Press, Inc., http://www.hpp.com and Online Business ConsultantOE
- Please refer to the HPP Web site for additional information about Java and OBC.
- ===========================================================
- ............Home Page Press, Inc. http://www.hpp.com home of Go.FetchOE
- ........Free TEXT version - Online Business Today email: obt.text@hpp.com
- ....Free PDF version - Online Business Today email: obt.pdf@hpp.com
- OBC / Online Business Consultant, $595/year email: obc@hpp.com
-
- ------------------------------
-
- Date: Sun, 21 Apr 96 16:07:26 PDT
- From: jblumen@INTERRAMP.COM
- Subject: File 2--The Internet is a library
-
- SEX, LAWS AND CYBERSPACE BULLETIN No. 1
- April 20, 1996
-
-
- This is the first in an occasional series of essays from Jonathan
- Wallace and Mark Mangan, the authors of Sex, Laws and Cyberspace,
- (SLAC) a new book from Henry Holt on Internet censorship and the
- Communications Decency Act. We will send three or four pieces of mail
- a month on focused, factual topics relating to the federal
- government's attempt to regulate the Net. If you wish to receive the
- SLAC bulletin, please send mail to co-author Mark Mangan at
- markm@bway.net.
-
- THE INTERNET IS A LIBRARY
-
- by Jonathan Wallace jblumen@spectacle.org
-
- The Internet is the latest in a series of communications revolutions
- that have initially baffled legislators and judges, who must select
- the correct analogy to apply in writing new laws, or interpreting old
- ones. To pick just one example, when the telephone was introduced,
- courts struggled with the question whether it was simply a new form of
- telegraph, or something else entirely. Today, policy makers are asking
- what the correct analogy is for the Internet. The Communications
- Decency Act (CDA), and its supporters on the religious right and
- elsewhere, have a quick answer for the question: the Internet is no
- different than a broadcast medium, like the radio or TV, and should be
- governed in the same strict way. The language of the CDA was, in fact,
- borrowed from FCC regulations pertaining to broadcast.
-
- The correct analogy is something far different: the Internet is a
- vast library, containing every type of information known to humans. We
- can learn a great deal about the way that legislators and judges
- should deal with the Net by examining the way that libraries function.
-
- A constant criticism levelled at the Internet by CDA proponents is
- that explicit sexual information is far more freely available to
- minors there than in a bookstore or library. This sounds reasonable,
- but is completely untrue. While free speech proponents have heard this
- statement many times while maintaining an uncomfortable silence, a
- look at the actual policies of librarians confirms that most do not
- consider it their job to police what children read. Instead, the
- child's parent decides whether or not the child is to have a library
- card and is responsible for supervising what a child takes out from
- the library.
-
- One of the most persuasive witnesses to testify in ACLU v. Reno, the
- lawsuit against the CDA currently pending in federal court in
- Philadelphia, was Robert B. Croneberger, Director of Pittsburgh's
- Carnegie Library. (The American Library Association, of which
- Croneberger is a member, is also a plaintiff in the case.) He
- testified that the library currently has 277,000 cardholders, one
- third of them minors.
-
- Croneberger said in the affidavit he filed with the court:
-
- "It is the mission of the Carnegie Library of Pittsburgh to provide
- the widest array of information to the widest possible audience--both
- adults and minors. To that end, the library makes no distinctions
- between patrons on the basis of age. The library does not offer
- separate library cards for adults and children and the library does
- not place restrictions on what minors can read, use or borrow in the
- library."
-
- He observed that the librarian is not competent to judge what children
- are mature enough to read. "Age must not be a restriction imposed by
- anyone except the parents of a child, who can judge the maturity of
- that child." In court, responding to the government's
- cross-examination, Croneberger elaborated: "If we as librarians are
- put in a position of making decisions for other people's children, we
- would fail miserably."
-
- Croneberger testified that some libraries have created a separate type
- of library card for juveniles, but that most have not. Within days
- after his testimony in court, I spotted the following in The Brooklyn
- Heights Paper, my community newspaper:
-
- "After months of wrangling, the Brooklyn Public Library has finally
- decided to give an inch in the debate over whether minors should be
- allowed access to R-rated videos.
-
- "The new policy, adopted by the BPL board earlier this month, will
- allow parents to obtain restricted library cards for children younger
- than 13 years of age. The card would prohibit children from borrowing
- any adult material, be it movies, research material, or Shakespeare's
- plays."
-
- The contrast to the CDA is interesting. Nobody is burning any books,
- or even removing them from the library shelves. Instead, the library
- will continue to contain every conceivable kind of information,
- including works on sex. Some libraries--like the Brooklyn Public
- library--will simply not let children with the juvenile card take
- these works out. Most libraries, as Croneberger testified, will let
- children look at anything, once their parents have decided to allow
- them to have a library card.
-
- The CDA is a book-burning law. The prison terms and fines it provides
- for are very specific, while its defenses--that an information
- provider tried to use "reasonable and effective" means to prevent
- children from accessing the material--are very vague. This means that
- a provider feeling the chilling effect of the law is much safer
- deleting information from the Internet (the equivalent of burning a
- book) than relying on a vague defense.
-
- Nevertheless, CDA proponents point to the "reasonable and effective"
- measures defense as proof that the CDA, like the Brooklyn Public
- Library's new rule, merely governs who can receive material, but does
- not lead to its destruction. However, all prior indecency laws are
- extremely specific about their "safe harbors". Television and radio
- can safely broadcast indecent material after ten p.m. 900 line
- providers need not fear prosecution so long as they take a credit card
- from the caller. While the CDA calls for providers of commercial
- information to take credit cards or set up passworded accounts,
- nothing in the CDA spells out anything else a provider of free online
- information can do to avoid getting in trouble.
-
- Advocates of the CDA want to have it both ways. Even as they argue to
- the Philadelphia court that the vague safe harbor makes the CDA a
- "narrowly tailored" law, and therefore constitutional, they have been
- loud and insistent that no form of regulation short of electronic
- "book-burning" will protect minors. Senators James Exon, Dan Coats
- and Charles Grassley--the CDA's three biggest Senate
- advocates--repeatedly said during the Senate debate in June 1995 that
- children could outwit any technical protection available. Neatly
- summarizing these arguments is the following excerpt from a FAQ
- distributed by Reverend Donald Wildmon's American Family Association:
-
- "Q: Aren't there 'technical fixes' that are less intrusive than a
- regulatory or criminal law approach?
-
- "A: No. To date, only a few software programs have been released to
- regulate children's access to pornography, such as SurfWatch and
- NetNanny. Also, these programs can be bypassed by users
- with a good knowledge of the Internet and some technical
- sophistication. Even if better technical solutions become available,
- this approach is inadequate in and of itself because: children can
- walk down the street to another computer; parents' technical ability
- often pales in comparison to their children's expertise; pornographers
- aren't legally discouraged from peddling
- their materials to children."
-
- Rather than listening to what CDA proponents tell us, or tell the
- court, we should listen to what they tell one another. Prosecutors
- will later argue that virtually any form of control used by
- information providers was not "reasonable" or "effective", thus
- sending them to prison despite their extensive efforts to seek a safe
- harbor.
-
- The CDA was invented by people who believe that some books should
- also be banned. The day the CDA passed, Senator Coats indiscreetly
- commented that certain portions of Catcher in the Rye would (and
- should) be illegal under the new law if posted online. The CDA's most
- vocal proponents on the religious right have been involved in numerous
- efforts to ban books from school libraries. If the Philadelphia court
- fails to recognize that the Internet is a vast library, it will open
- the door to radical censorship. It will also allow a preposterous
- distinction to be drawn between text on paper and electronic text,
- between Catcher in the Rye in your library and on the Internet.
-
- But if the judges apply the right analogy and recognize that the
- Internet is a library, they will ensure the survival of the fearless
- freedom of speech into the 21st century.
-
- Resources:
-
- The ACLU, http://www.aclu.org
-
- Center for Democracy and Technology,
- http://www.cdt.org
-
- Voters' Telecommunications Watch,
- http://www.vtw.org
-
- Wallace and Mangan report on ACLU v. Reno,
- http://www.spectacle.org/cda/cdamn.html
-
- Sex, Laws and Cyberspace,
- http://www.spectacle.org/freespch/
-
- -----------------------------
- Jonathan Wallace
- The Ethical Spectacle
- http://www.spectacle.org
- ACLU v. Reno plaintiff
- http://www.spectacle.org/cda/cdamn.html
- Co-author, Sex, Laws and Cyberspace
- (Henry Holt, 1996)
- http://www.spectacle.org/freespch/
-
- Free speech absolutist--and proud to be
-
- ------------------------------
-
- Date: Tue, 19 Mar 1996 17:25:17 -0600
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 3--Boardwatch Magazine -- A review
-
- When CuD first reviewed BOARDWATCH magazine back in 1991 (CuD 3.31),
- we were impressed by the content. At that time, the content focused
- primarily on BBSes, and the articles focused heavily on BBS
- software, reviews of hardware and BBSes, and included lists of BBS
- outlets in various area codes. Although there were occasional pieces
- by a variety of guest writers, Jack Rickard did much of the writing,
- and coverage on non-BBS news was rather limited.
-
- I dug out an old copy of BOARDWATCH from November, 1991 and thumbed
- through it. The cover, a black-and-white picture of Jim Harrer of
- Mustang Software and John Friel of Qmodem, captured what BOARDWATCH
- was about: BBSes, BBS personalities, and BBS news. And, of course,
- lots of ads. The layout was an improvement over earlier years, but
- it had a long way to go before appealing to a broader audience.
-
- A year later, we reviewed it again and noted the gradual expansion
- of topics to include Internet issues and the addition of a few
- specialists, including "Legally Online" by Lance Rose. It was movin'
- on up, and Rickard was obviously committed to producing a
- broad-based magazine that covered an increasingly broad, yet
- detailed, news outlet for cyberspace issues.
-
- Rickard has succeeded. In my view, Boardwatch has become an
- exceptional source for Internet news.
-
- The layout has gone from simple monotone covers to the more recent
- full-color graphics, including covers that are slick and
- eye-catching. Rickard has added over a dozen regular writers and
- columnists, inlcuding John Dvorak, "Dr. Bob" Rankin, and Ric
- Manning. Interviews, reviews, social and political critique, news
- summaries, hardward and software discussions, and other features and
- tidbits cover the full range of issues relevant to online interests.
-
- The May, 1996, issue includes a cover story on Microsoft and the
- Interent, 15 columns by the BOARDWATCH stable of regular
- contributors, and items about Cuba on the Internet, digital
- economics, and a wealth of factoids (California ranks first in the
- number of .com, .net, .edu, and .org Internet domains, North Dakato
- near last) that will make you rich if you ever take "the Internet
- for $150, please." It remains a steal at $36 a year for 12 issues.
-
- Why is it worth subbing to?
- Here's a blurb from the BOARDWATCH homepage
- (http://www.boardwatch.com) --
- Check out the homepage and consider a sub -- they'd make a great
- gift. (No, we're not payed to hype BOARDWATCH -- it really
- is *that* good).
-
- ==========================================================
-
- Boardwatch Magazine is a printed monthly magazine available
- at over 12,000 newsstand locations around the country at a
- cover price of $4.95. Each issue features over 144 pages of
- the leading online editorial covering the Internet, Online
- Services, and the communications industry. Boardwatch is
- read by the movers and shakers in the Internet community,
- including over 3200 Internet Service Providers (well there
- are that many and they read Boardwatch) , thousands of
- software developers and consultants - essentially anyone
- involved in developing and providing online services. A with
- the latest online networking news and information.
-
- Subscriptions are just $36 per year - a savings of $24 over
- the newsstand price. Additional savings with a two year
- subscription at just $59 - $61 off the newstand price for
- over 50% savings.
-
- TOP TEN REASONS TO SUBSCRIBE:
-
-
- 1. JACK'S EDITORIALS.
-
- Some claim he's lost in cyberspace. Certifiable. Totally
- wrong on a monthly basis. Those who have been taking their
- licks online over the years and surviving tend to read
- closely. Like coffee, wine, and fine cigars, it's an
- acquired taste.
-
- 2. JOHN C. DVORAK.
-
- The final word in the final pages of Boardwatch.
- Identified communications as the "Fourth Killer
- Application" in 1983. Also picked Boardwatch as the one to
- read on the topic in 1989. Joined the writing staff in
- 1994.
-
- 3. WINDOWS95 NETWORKING COVERAGE.
-
- Boardwatch identified WindowsNT as the low-cost server for
- Internet Applications in March, 1995. Fall of 1995 brought
- Windows95 with a host of communication features and the
- Boardwatch staff fell in love with it. Future issues show
- you how to make the connection and take advantage of the
- incredibly powerful communication features of Windows95 -
- via the TCP/IP Internet.
-
- 4. LEGAL AND POLITICAL COVERAGE.
-
- Lance Rose, Jim Warren, and others cover the legal aspects
- of operating an online service in today's world,
- developments you may have a CRITICAL need to know in the
- future. And they show the process where laws are created
- and modified - so you can influence them BEFORE they
- become your most recent business nightmare.
-
- 5. TECHNICAL COVERAGE.
-
- Reviews of Web Server software, BBS software, hardware
- devices, HTML page design tricks - unabashedly technical
- and decidedly NOT for the novice or the faint at heart.
- Boardwatch delivers the latest technological edge to
- Internet Service Providers, online content developers, and
- the power players in the online community.
-
- 6. ADVERTISING
-
- . Yep. You wouldn't think it, but most of our readership
- finds as much education in the ads as in the editorial. We
- intentionally nurture the small, startup developers in
- hardware and software. The ones that can't afford the
- larger magazines, but often have the most interesting
- products for communications and online services. Knowing
- what they are up to is part of staying sharp on what's
- happening in the community.
-
- 7. LETTERS TO THE EDITOR.
-
- Not a strong feature in most magazines. For some reason,
- it's become the most closely read section in Boardwatch.
- Find out what other professionals in the online community
- have on their minds. And watch Jack gently respond with
- kindness and understanding of their plight.
-
- 8. LISTS AND LISTS OF LISTS.
-
- Boardwatch started life as a list of bulletin boards in
- 1987. They've never gotten over compiling lists of
- things.
-
- 9. IT'S CHEAP.
-
- On the newsstand at $4.95 and cheap at twice the price.
- Subscribe for two years at $59 and get it delivered at
- your home or office early at $2.46 per copy. Let's see, as
- a computer professional, I can tell that this is a savings
- of....$2.49 per copy. Or in UNIX terms THREE FREE PIZZAS A
- YEAR!
-
- 10. YOU STILL CAN'T TAKE OUR WEB SITE TO THE BATHROOM WITH
- YOU!
-
- Current Subscription Rates are:
- * for U.S., Canada, and Mexico:
- 1 year (12 issues): $36.00
- 2 years (24 issues): $59.00
-
- * Overseas: (sent Air-Mail)
- 1 year (12 issues): $99.00
-
- Or contact us voice at 800-933-6038
-
- ------------------------------
-
- Date: Tue, 19 Mar 1996 00:33:47 -0600
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 4--"Zen And Blarney" (Boardwatch Reprint on Kevin Kehoe)
-
- ((MODERATOR'S NOTE: Way back in CuD's first year, circa 1990,
- Brendan Kehoe contacted us and offered to put CuDs up on his system
- at Widener for ftp access. At the time, this took some courage,
- because although CuD was as legal and law-abiding as it is today, it
- was perceived by some to be a "hackers'" 'Zine that advocated
- illegal activity, and some even wondered why CuD editors (and
- posters) weren't "busted" along with the rest of the "Internet
- scum." Although the perception was absurdly erroneous, it refelected
- the mood of the times, and it this made some sysads concerned with
- their liability for making issues available. Brendan, however,
- realized that providing an ftp site would make CuDs more widely
- available would be a useful resource, so he set up our first ftp
- site. Since then, Brendan moved on and up, CuD's ftp site moved over
- to ftp.eff.org, and life goes on. Brendan (along with Stanton
- McClandish) still archives CuD. Brendan also survived a near-fatal
- automobile accident a few years ago.
-
- Bob Rankin profiled Brendan in a recent issue of Boardwatch (which
- is another reason we think that, like Brendan, Boardwatch is
- comprised of the "good guys").
-
- From: Boardwatch, March, 1996:
- COPYRIGHT 1996 by Jack Rickard. Not to be reprinted without
- permission
-
- by Bob Rankin
-
- Zen and Blarney
-
- Brendan Kehoe is one of the good guys. As author of the classic Zen
- and the Art of the Internet guide, developer of the Archie
- file-locator client software, archivist for the Computer Underground
- Digest and general doer of good online deeds, Kehoe personifies the
- phrase "net citizen."
-
- Kehoe is a soft-spoken young man with a fiery Irish spirit who seems
- most content when he is doing something for others. While in college
- he wrote the Zen guide to help fellow students understand what he had
- learned about the Internet, and this free guide became an instant
- sensation. When he's not off doing volunteer work in the community or
- answering a seemingly endless stream of e-mail from fellow Internauts,
- Brendan works for Cygnus Support in Mountain View, CA as manager of
- the C++ Development group.
-
- Born in Dublin, Ireland some 25 years ago, Kehoe came to America when
- he was 4 years old and developed the computer habit not long
- afterward. But the road that led him from Commodore to SparcStation
- was not without a few bumps. In December of 1993, Kehoe sustained
- severe head injuries in an automobile accident and was not expected to
- recover. Miraculously, he survived the crash and emerged with a new
- outlook on life and what really matters.
-
- Recently I talked with Brendan about Zen, the accident, and his life
- both on and offline. Here's what he had to say...
-
- Doc: What was it that attracted you to the Internet?
-
- Brendan: Just being able to find things out really quickly. In high
- school I was blowing away my physics teacher by bringing in a copy of
- a technical report only a day after some scientist had announced a
- major discovery. It was really neat that you could find that much
- stuff that quickly. Now the problem we're running into is how to
- organize that massive amount of information.
-
- Doc: You had a brush with death about two years ago. Can you tell me
- what happened that day?
-
- Brendan: I was in rural Pennsylvania, coming home from a friend's
- house on New Year's Eve of 1993. Whatever we were talking about, it so
- captivated us that I went right through a stop sign and was hit by a
- Jeep Cherokee in the driver's side of the car. We went into a spin and
- ended up being jammed about a foot into some guy's house.
-
- Fortunately, a lady who was following us saw the whole thing and was
- able to call 911 on her cellular phone. I was flown by helicopter to
- the hospital at the University of Pennsylvania, where I had three
- sessions of brain surgery. I was in a coma for three days and after I
- came out of that I was in something called an aphasia for about three
- weeks. I had an attention span of about 2 seconds - I was swearing,
- talking in numbers - actually consistent numbers, my friend said. Then
- one morning I just magically woke up, rang for the nurse and asked for
- a newspaper to find out what day it was and why I was there.
-
- Doc: I understand you're considering a move from software engineering
- to teaching elementary school.
-
- Brendan: One of the interesting results of the whole accident thing
- was that it really pointed out the fragility of life to me, and that
- you should do things that you're going to be gratified for having done
- years later. Being a software engineer is fine and I can do all this
- cool stuff, but I don't get much out of it. And I know that 2 or 3
- years down the line everything I do will be completely changed.
-
- So as all this fragility of life stuff was hitting me I started really
- enjoying working with kids, reading things with them and things like
- that. I started going into classrooms to watch teachers work, and
- figure out what kind of stuff I'd be able to do and how it would feel.
- I was also volunteering at a support network for battered women - I'd
- keep the kids busy while the moms were in with a counselor. It was
- really interesting - escaping from a C++ meeting, spending an hour so
- playing with the kids and then returning to work. The difference
- between the two was amazing, and I started thinking "I suppose I could
- do this."
-
- Doc: So you're changing your occupation to a vocation...
-
- Brendan: Exactly. Everybody's telling me "Why you gonna do that -
- there's no way you can get anywhere near the money you're making now."
- But it's a trade-off depending on what you really want out of life. If
- I can figure out a way to live off a teacher's salary and continue
- writing Internet books it could work. It better!
-
- Doc: About your book... the title is an obvious play on Zen and the
- Art of Motorcycle Maintenance; is there any special significance to
- the "Zen" thing for you?
-
- Brendan: I had actually just finished reading Motorcycle Maintenance
- when I was finishing the first draft of my book, and I realized that a
- lot of the stuff that Robert Persig did in his book was to encourage
- people to learn the basics and then go off and learn more by
- themselves. This was the approach I was taking with Zen, to give
- everybody the raw tools they need without deluging them in hundreds
- and hundreds of pages of random stuff - instead relying on them to
- take what I've given them and learn it in their own way.
-
- Doc: You were a student when you started the book, right?
-
- Brendan: Yup, at a place called Widener University in Pennsylvania.
- While I was a student there I took on the job of becoming their UNIX
- system administrator. Widener had just gotten hooked up to the Net and
- nobody could figure out what in the world to do with it, so I started
- trying to figure it out for myself.
-
- I wasn't actually reading anything from anyone - just going exploring
- and trying all these different commands. When people saw that I was
- figuring it out I got hit with so many questions I was going nuts. So
- I thought why not just write it down, and that's where the idea of the
- online first edition [of "Zen"] came from.
-
- I took about four months of writing down all the questions I was
- being asked and putting it in a form that was usable. And after
- making it available to students at Widener I realized that people
- everywhere must have the same questions. So I figured "what the hell"
- and put it out on the Net.
-
- About two and a half weeks later I got a call from David Farber at
- University of Pennsylvania saying "How would you feel about making
- this a published book?" That was February of 1992, and I had the
- galley copy done by mid-April.
-
- The 4th Edition [ISBN 0-13-452914-6, Prentice Hall PTR, $23.95,
- (800)382-3419] now has a chapter on the Web, a section on how to write
- your own home page, and an appendix on how to safely introduce your
- kids to the Net.
-
- Doc: How many copies of the "Zen" book have sold so far?
-
- Brendan: I actually don't know. In January of 1994, it was something
- like 75,000 copies and another 20,000 or so of the 4th edition were
- sold last year.
-
- Doc: When you published "Zen" it attracted a lot of attention. What
- kind of opportunities did that present, and how did it change your
- life?
-
- Brendan: It's been really surreal - it still blows me away when I go
- into a bookstore and see my name on the spine of a book. It still
- hasn't quite settled in. What's really nice is that having the book
- out makes it so that people feel like "Oh, maybe he can answer my
- question" and I get all these random questions in my e-mail asking how
- to do this, that or the other thing. And I don't have any problem
- answering them because I figure they don't know me, I don't know them,
- but somehow we're able to help each other.
-
- Doc: I got a kick out of the opening paragraph on your
- http://www.zen.org site:
-
- "The Zen Internet Group is a very small, covert group of highly
- technical people struggling to overcome the drudgery of day-to-day
- life and burrow down into the world like a spoon into a banana split,
- splitting apart the atoms of closed-mindedness and tie-dyeing the very
- fabric of the universe, venting our frustrations at working on
- computers all day at work by coming home and working on a computer."
-
- Doc: Is the Zen Group for real, or is it just a whimsical thing?
-
- Brendan: I liked the idea of getting the zen.org domain so I thought
- I'd make up the Zen Internet Group in the hopes that maybe someday it
- will actually exist. We do get deluged with people asking us about the
- Zen religion, though.
-
- Doc: You've got a nice collection of "kids stuff" on your web site.
- Tell me how that came about.
-
- Brendan: Originally it was just interesting things that I'd found, and
- I realized that they were all over but they weren't in any one place.
- Even Yahoo hadn't been set up completely at that point. I realized
- that people might not be seeing good uses of the Net if it's all
- spread out like that, so I just put them all together and wound up
- with a mention in Yahoo and several other places.
-
- Now I'm getting lots of people sending me mail with suggestions for
- additions, and there are about 2000 hits per week. It would probably
- be better if I had a faster modem on my machine!
-
- Doc: Given your interest in kids and their welfare, what's your take
- on protecting them from inappropriate or indecent materials on the
- Net?
-
- Brendan: Well there are a few solutions now that make it really easy
- for people to do it. There's SurfWatch and NetNanny which cause a web
- browser to deny certain pages, but I always try to explain to people
- that they should consider the Internet like a playground. They
- wouldn't encourage their kids to just run off and play all by
- themselves - and at the same time they shouldn't let them go on and
- use the Internet completely unattended. Even if it is right there in
- the living room, they don't know what's going to be on the screen.
-
- There are a lot of parents that don't feel as comfortable with
- computers as their kids do, but that's an opportunity to let the kids
- show off how great they are and how well they can do all this stuff.
- The best approach is for parents to actually do it along with their
- kids, and to explain that the same rules apply for both strangers on
- the street and strangers on the Net.
-
- I'm actually working on a kids book now, as part of a series of Zen
- books, which should come out around the end of this summer. It's
- called Zen and the Art of the Internet - Parents & Educators Guide. It
- expands on how to introduce kids to the Net and gives teachers ideas
- for integrating the Internet in their classrooms.
-
- Doc: Do you see any room for a legislative solution to the problem?
-
- Brendan: Not really. There could be some approaches but the problem
- with most of the ones that are out now, such as the Exon bill that's
- causing all the controversy, is the Internet is a global medium. So
- any legislation we pass here in the U.S. wouldn't mean anything
- because a person could set up a site in Sweden or Finland or wherever
- and jump over the law by operating outside the country.
-
- Doc: A lot of people see you as a kind of Internet hero. Who do you
- see as the people who have done the most good for the Net?
-
- Brendan: There's a group up in Canada called Bunyip that did Archie.
- Alan Emtage was one of the key guys there. The way that they set up
- Archie, along with the way folks at University of Nevada-Reno did
- Gopher,together helped to really spawn the growth of the Net and all
- the stuff that's happening today.
-
- There's also David Farber at U. Penn who seems to be at the forefront
- of everything; and both Mitch Kapor and John Perry Barlow at EFF who I
- admire for their speeches on privacy and the Internet.
-
- Doc: How do you use the Internet on a personal basis?
-
- Brendan: I use e-mail, probably more than I should. I use it to be
- able to work from home easily. The other day my girlfriend came down
- with strep throat and was wondering what to do about it. I was able to
- do a Lycos search and find a list of ten key ways to deal with it
- without getting a throat culture.
-
- I also like finding information on certain musicians and writers.
- There's a newsgroup for Anne Rice, so I'll look there to see if she'll
- be making any appearances in the Bay area.
-
- Doc: How do you see the Internet changing society or the way we live
- by the turn of the century?
-
- Brendan: I'm convinced that before the year 2000 we'll come up with a
- way for more people to afford it - it's still too elitist. You still
- need a really nice computer to be able to do it. There's a project
- going on out here in Sunnyvale now where you can get an Internet
- connection using just your existing cable and television [no computer
- required] for $30 a month. It's an interesting sign that they're
- trying to come up with ways to make it less expensive.
-
- One thing I'm positive that's gonna happen within the next year is
- that we'll solve the whole digital cash and electronic money thing.
- Right now there are three or four different approaches to doing secure
- transfers over the Net. Some of the projects underway now include
- really big names like Sun Microsystems and Microsoft so even by the
- end of this year there should be some internationally agreed upon
- standard for doing secure money transfers, banking, and buying - it's
- just going to go right up through the roof.
-
- Doc: Any parting comments, oh great Zen Master of the Internet? :-)
-
- Brendan: When people ask me, "Is the World Wide Web it for the Net?" I
- have to tell them no, because it's just like if they'd asked me two
- years ago if Archie and Gopher were it. It's only limited by the human
- imagination and there's no way that our imaginations are going to
- stall on something like the Web. And now we've got Java coming up.
- There's always something new coming.
-
- Some people have asked me if there will be a 5th or 6th edition of my
- book and I tell them in all likelihood there will because this thing
- [the Net] changes so quickly. Even now, "Zen" is out of date on some
- things because it doesn't do heavy coverage of Java.
-
- There's no way anybody can be exactly up to date unless they sit in
- front of their computer with ten other people typing simultaneously.
- I've been saying if people wanna use the Net, go in and use it now -
- don't wait for it to get better. It's going to consistently get better
- and you're never going to find a stalling point.
-
- The Internet itself is going to have to change soon, because we're
- running out of addresses. There is a proposed 128-bit addressing
- scheme and people on the East coast are experimenting with a gigabit
- connection now. So yeah, it's gonna really transform, but there will
- be a lot of constants. E-mail will still be e-mail, probably very
- similar to the format it is now. We'll see a growing up and a firming
- up. Even if you look three years ago at the way things stood then
- compared to now it's amazing.
-
- It's funny when you hear Vint Cerf (one of the chief architects of the
- TCP/IP protocol) talk now - he can't believe the way some of the
- things have grown. And I'd love to know what Marc Andreessen really
- thinks about what Mosaic turned into, other than the fact that he's a
- billionaire now.
-
- Connecting With The Zen Man
-
- brendan@zen.org http://www.zen.org/~brendan
-
- =======================================================================
-
- Editor: Jack Rickard - Volume X: Issue 3 - ISSN:1054-2760 - March 1996
- Copyright 1996 Jack Rickard - ALL RIGHTS RESERVED
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.37
- ************************************
-
-
-