home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Jun 30, 1996 Volume 8 : Issue 49
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.49 (Sun, Jun 30, 1996)
-
- File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)
- File 2--Response to CUD #8.48--GAO hacker report: selling wind
- File 3--Can you say "libel"?
- File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such
- File 5--Cyber Angel's response to Wired article
- File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,
- File 7--8th FIRST Conf & Workshop on Computer Security
- File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 25 Jun 96 16:53 PDT
- From: Michael Gersten <michael@STB.INFO.COM>
- Subject: File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)
-
- I disagree with one of the points that Lance Rose makes in his
- post on Civil Liberties, and the On-Line circus.
-
- Lance talks about encryption, as hiding "a message right in someone
- else's face. It is like sticking a self-incriminating note in a
- physical capsule that is uncrackably hard and strong, then lobbing
- the capsule through the window of a police station to sit in the
- middle of the floor among a bunch of cops, powerless to open it up
- and figure out how to get the perp."
-
- At the same time, he says that you can hide a message better by
- leaving it in plain text, hidden among the huge mass of other things.
-
- Except that today, searching ability is very strong, and only
- going to get better.
-
- Except that the police have shown that they will take an entire
- computer and search it for anything that they want
-
- Except that the goal is for everyone to use routine PGP encryption
- on all messages that are not for everyone, just as everyone routinly
- uses envelopes for their mail, and some people use security envolopes
- that you can't just hold up to a strong light to see what's inside.
-
- Except that it's a desire to stand out with an encrypted message,
- but to be one of the normal flow of encrypted messages.
-
- Except that any other form of hiding the data requires setting up
- some special method, that has to be kept secret. With PGP, you don't
- have to do anything special, really--the message is (at least with
- the -a option) identified as a PGP message, and when (not if) PGP
- is standard on unix and windows-96 (or -97) systems, will be just
- as easy to read as plain mail.
-
- ------------------------------
-
- Date: Mon, 24 Jun 1996 12:48:48 -0700
- From: Roland Dobbins <rdobbins@bani.com>
- Subject: File 2--Response to CUD #8.48--GAO hacker report: selling wind
-
- Response to CUD #8.48, File 1--GAO hacker report: selling wind
-
- You recently quoted something called the "Crypt Newsletter" on the
- subject of computer-related yellow journalism & governmental
- scare-mongering on the threat to national security from "hackers".
-
- While I certainly am concerned about the characterization of
- "hackers" as the lepers of the 1990s, I am very disappointed that
- CUD would publish such a blatantly partisan, left-wing rant, as
- news. Do you intend CUD to become a forum for left-wing demagogues?
- I should hope that you will continue to provide a balanced forum for
- discussing issues of interest to all of us in the Net community, and
- that you will in future at least insert a disclaimer before
- reprinting material of such material. Otherwise, CUD will cease to
- be a forum for intramural discussion of serious issues, and instead
- become merely a mirror of the moderators' apparently left-wing
- political views. What a shame, indeed.
-
- I am a conservative, and I would like to point out the your
- readership that it is a left-wing, liberal Democratic Administration
- which has foisted the entire Clipper/Capstone/EES thing on us, and
- which has consistently violated the rights of individuals and groups
- in their quest to establish the Nanny State (Waco, Ruby Ridge,
- etc.). In fact, Republicans in the House & Senate have been
- vociferous in both opposing EES and in watering down the more
- heinous provisions of Mr. Clinton's so-called "anti-terrorism"
- legislation. The very sinister Filegate incident, which is far
- beyond any "enemies list" kept by the Nixon Administration, clearly
- shows the arrogance of liberals who think that government (i.e.,
- themselves) always know best, and that their good intentions render
- them above the law.
-
- Remember, Chuck Colson went to jail for possessing one (1) FBI "raw"
- file; the Clinton White House had at least 408!
-
- >No one except an obscure lunatic named T. K. Jones in the Reagan
- administration >really thought that either U.S. generals or their Soviet
- counterparts would >call down the wrath of 10,000 nuclear warheads.
-
- Whoever wrote this must be either extremely stupid or willfully
- ignorant. Weapons are made to be used, and the strategic arsenals
- of both the U.S. & the U.S.S.R./Russia, while serving as a deterrent
- against a general conventional war, are indeed capable of being
- launched if National Command Authority so decides. All one has to
- do is look at the Cuban Missile Crisis or the Soviet's panicky
- launching of Project RYAN during the 1980s to see that there was
- (and still is, in my opinion) a real danger of unleashing
- Armageddon. That's why SDI was, and continues to be, as issue of
- vital import.
-
- In closing, I would like to compliment CUD for providing a
- (generally) balanced and informative resource on public policy
- issues such as Internet regulation. While it is very easy to
- criticize from the peanut gallery, I hope that my comments and
- suggestions are received not as churlish sniping, but as advice from
- a devoted reader who only wishes to assist in making CUD that much
- more appealing to us all.
-
- ------------------------------
-
- Date: Mon, 24 Jun 1996 12:33:56, -0500
- From: MR ROBERT E DALY <red_daly@prodigy.com>
- Subject: File 3--Can you say "libel"?
-
- What a great idea! I think I'll submit the names of all my enemies!
- Hmm, maybe I'll check with my lawyer first about slander and libel.
-
- Response to article from Computer Underground Digest which follows:
-
- Date--Sun, 16 Jun 1996 12:58:38 -0500 (CDT)
- From--David Smith <bladex@bga.com>
- Subject--Child Molester Database on the web
-
- Great World Internet Services has set up a "child molester" database
- where Internet users can add records about people who are child
- molesters. The ISP's philosophy is listed below. There is also a
- separate disclaimer that information will be purged after 120 years,
- and that Great World Internet Services does not verify any of the data.
- There is a procedure for those who wish to dispute being entered into a
- database.
-
- There are expansion plans, too : deadbeat dads, crooked cops, elected
- official crimes, known drug dealers, etc.
-
- The site can be found at http://www.greatworld.com/public
-
- >From its creator:
-
- Too many times in our twisted society, criminals are treated as
- victims and victims are treated as inhuman and ignored. When our
- President, our (In)Justice System, and our legislative bodies fail to
- provide us with proper protection, then we as citizens must unite in
- order to protect ourselves. The time for passivity has ended and the
- time for proactive intervention is upon us.
-
- Therefore, as a parent and a citizen, I have made available a
- database where child molesters can be listed. The difference between
- this database and the databases of certain states (such as California)
- are that this database is totally free. (There is no ridiculous $10
- fee.) Also, anyone can look up information. In California, the state
- feels that persons need to be able to prove a need for the information
- before the information may be released. By golly, I believe that the
- welfare of our children is right enough to know who these victimizers
- are and that this information should be made available to everyone in
- order to protect our families from joining the growing roster of
- victims.
-
- Also, this database doesn't require that those listed first be
- convicted. If you are a victim and have been abused, then it doesn't
- require a court of law to validate what you already know. The same
- applies if you are a parent or a close relative and you have first hand
- knowledge that someone committed the crime. The idea behind this
- database is to make people aware of the criminals so that we can
- protect our families before it is too late.
-
- Most states do not list cases involving incest or victimization by
- a relative or sibling. Feel free to list the victimizers here. If they
- did it once, they are likely to do it again. Once a victimizer's own
- children have grown up, they often turn to the children of others.
-
- There are advocates of these vicious heartless tyrant criminals
- who say that once a person who has served their time, they should be
- left alone. Buddy, I have one thing to say to you. Don't let the
- proverbial door slap you in the tail on your way off this page.
-
- When a criminal victimizes a child, the child is emotionally
- scarred for life. Nightmares often last throughout the person's entire
- lfetime. Many times the person is unable to function effectively in a
- relationship. No one is unable to ever take away what has been done. I
- personally believe that their should only be one sentence for child
- molestation--death. In my opinion, no child molester has EVER served
- his time as long as he still lives.
-
- This database will help to remind the people in communities
- throughout America that certain people are dangerous and should be
- watched.
- -----------------------------------------------------
-
- Message for Child Molesters: Before you molest your next victim,
- think twice. Perhaps your name will be plastered here for all of the
- world to see. Your mother, your father, your brothers and sisters,
- friends, the world--will know what kind of a living monster you really
- are.
- [Internet Link Exchange]
-
- Member of the Internet Link Exchange
-
- This site designed, managed, and hosted by Great World Internet
- Services
-
- ------------------------------
-
- From: "David Smith" <bladex@BGA.COM>
- Date: Wed, 26 Jun 1996 21:09:57 +0000
- Subject: File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such
-
-
- > DON'T SHOOT THE SENATOR
- >
-
- <snip>
-
- > Beeson and the ACLU understand these kinds of cases are far bigger
- > than just one student angry about the slaughter of mountain lions, or
- > an asshole sitting in the U.S. senate. It's about the entire structure
- > of the Internet and how quickly Internet service providers will pull
- > down their pants when the cops come calling. How ready is your own ISP
- > to just hand over access to all your email when John Law appears at
- > their door asking for "cooperation" against whatever they are
- > labelling you: terrorist/child pornographer/anarchist/drug dealer,
- > etc.?
- >
-
- When John Law has a search warrant, as in this situation, I
- recommend that such cooperation be full and complete. You had better
- have a very good reason (and lawyer) before you start willful
- disobedience of legal orders.
-
- That ISPs are willingly "pulling their pants down" for the police is
- just not true.
-
- ------------------------------
-
- Date: Wed, 26 Jun 1996 19:43:01 +0000
- From: David Smith <bladex@bga.com>
- Subject: File 5--Cyber Angel's response to Wired article
-
- Attached is an excerpt from an announcement sent to the Cyber Angels
- giving Gabriel Hatcher's response to the recent Wired article.
-
- ------- Forwarded Message Follows -------
- From-- angels@wavenet.com (CyberAngels Director --Gabriel Hatcher)
- Subject-- AOL project appeal
-
- 5) There is an article about us in Wired magazine's July issue. Don't get
- excited, it is not very complimentary. Most of the article is spent
- repeating what hostile critics have written about us, saying things like
- "they don't understand the global nature of the Internet" (like we are 1100
- members in _32_ countries and we don't understand the global nature of the
- Internet?) or "they don't realize that posts could be forged" (which was
- one of the _first_ things that happened to _us_ when we started a year
- ago!); or "they could mess up FBI investigations and be criminally liable
- themselves" (some of our members are currently _teaching_ federal agents
- how to download and decode binaries from the Usenet).
-
- When will the journalists realize that CyberAngels are _not_ people who
- have only just bought their first computer (although some of us are), but
- also include users with 15 years+ Internet experience, programmers and a
- number of professional law enforcement people.
-
- The Wired article is critical of Curtis Sliwa (co-founder with me of the
- project), since he does not use a computer. Hey guys, that's why _I_ run
- the project. Does Curtis have a right to an opinion about the Internet,
- given his lack of hands-on knowledge. Well I am not currently drilling for
- oil in the antarctic ocean, but I think I have a right to be concerned
- about the environment. Is Curtis informed? Well I keep him up to date.
-
- Wired's journalist says he doesn't understand Curtis and my different
- opinions, and questions how we can be effective since we disagree on
- things. Well watch us! Do Curtis and I agree about the solutions to
- Internet crime? No, not always. In many cases we disagree, but guess
- what? We don't have a problem living with the fact that we are not Clones
- of each other. It's called a pluralistic society guys, and it requires
- tolerance to live in. For those of you who didn't know, CyberAngels is not
- a revolutionary organization. We believe in and practice tolerance of
- diverse cultures and beliefs, and since we believe in and practice freedom
- of speech, we encourage healthy and vigorous debate and discussion, and we
- can live with disagreement (unlike many of our critics!) CyberAngels is
- going strong, despite the fact that our members wouldn't agree on
- everything. What we have in common is a shared Mission statement and an
- agreed Codes of Conduct. That's enough for me. I don't mind which side of
- your bread you all butter! ;)
-
- *********************************************************
- Gabriel Hatcher - CyberAngels Director
-
- angels@wavenet.com
-
- http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html
- mirrored at: http://www.safesurf.com/cyberangels/
-
- "All that is required for the triumph of evil is
- that good people remain silent and do nothing"
- (after Edmund Burke)
-
- ------------------------------
-
- Date: Wed, 5 Jun 1996 06:13:32 -0400 (EDT)
- From: NOAH <noah@enabled.com>
- Subject: File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,
-
- ---------- Forwarded message ----------
- Date--Thu, 16 May 1996 14:55:05 -0400 (EDT)
- From--Rick <rick@sug.org>
-
- SUN USER GROUP
- EAST COAST CONFERENCE and EXHIBITION
-
- Monday, June 24 & Tuesday, June 25, 1996
- Marriott Copley Place
- Boston, Massachusetts
-
- **********************************************************************
- ************* Register below for FREE admission to ***************
- ************* the biggest Sun Trade Show of the year. ***************
- **********************************************************************
-
- Since this year's SunWorld has been cancelled, SUG East is now the
- ONLY major Sun conference of 1996. We're expecting over 2,500
- attendees from around the country and more than 100 exhibitors, so
- this is your best opportunity of the year to discover what's new in
- the world of Sun and Java. SUG East is also the first East Coast Sun
- show in three years so expect to see a lot of new faces among the
- vendors and attendees. SUG East will feature an exhibition of the
- hottest new products for Sun and Java and a technical conference to
- keep you on top of the latest developments.
-
-
- The SUG East Technical Conference
-
-
- The SUG East Technical Conference will run both days of the show and
- will feature classes on a variety of topics. SUG was one of the
- producers of SunWorld, and our own series of technical conferences
- receive tremendous critical acclaim for their variety of interesting
- speakers. The SUG East conference include 25 talks by respected
- speakers over the both days of the show. Each day will feature two
- tracks of classes; Monday, June 24, will spotlight Java and System
- Administration, and Tuesday, June 25, will concentrate on Security and
- Internet Communication.
-
- The SUG East conference will address the important issues and
- difficulties of developing, managing, and maintaining a
- mixed-architecture environment through a variety of talks by some of
- the leading experts in the field. Featured speakers at the conference
- include Art Carty, General Manager and VP of SunExpress, North
- America; Robert Diamond, Senior Security Consultant for Sun
- Microsystems; Peter Galvin, chief scientist for Corporate
- Technologies, Security columnist for SunWorld On-line magazine, and
- author of "Operating System Concepts"; and J.A. Cross, Java consultant
- and contributing author to Que Publishing's "Special Edition: Using
- Java". Some of the currently scheduled sessions include:
-
- JAVA TRACK
- 1. Java and Application Development
- 2. Client-Server Development With Java
- 3. Is Java just C++ with a new hat?
- 4. Programming the Internet in Ada 95
- 5. Building for the Internet.
-
- SYSTEM ADMINISTRATION TRACK
- 1. Introducing Solstice Autoclient
- 2. TCP/IP Operational Troubleshooting in a UNIX Environment
- 3. Solaris Volume Management -- What It Does and Doesn't Do (and How)
-
- SECURITY TRACK
- 1. Firewalls and Network Security
- 2. Network Security Tools w/ CMIP Agents
- 3. UNIX Security Tools Workshop
- 4. Host Security Tools
- 5. Kernel Access Controls
- 6. Vendor Security Panel: featuring Sun, Cisco, Ascend
-
- INTERNET COMMUNICATION TRACK
- 1. Web Site Implementation
- 2. The Intranet and Thin Client Technologies: Testbed for the Future?
- 3. Building a Multi-Protocol Data Infrastructure
- 4. Electronic Commerce for Software over the Internet
-
- More sessions are being added regularly, contact conference@sug.org
- for the latest information. Registration for the SUG East Technical
- Conference is seperate from the FREE Exhibition registration and
- requires an additional fee. Earlybird Conference registration is $295
- until June 10th. After June 10th, conference registration is $395.
- Members of the Sun User Group or Java-SIG reveive $50 off conference
- admission. Most conferences concentrate on the hype and cost
- considerably more, sign up for the SUG East Technical Conference today
- to receive the best education at the best prices.
-
-
- The SUG East Exhibition
-
-
- The SUG East Exhibition will feature over 100 exhibitors of
- application software, backup and storage devices, client/server
- products, connectivity products, email, network security, software
- development tools, terminals, training services and other products and
- services of interest to the Sun/SPARC and Java community.
- Registration for the exhibition is FREE until June 10. Use the form
- below to send in your registration today!
-
- The Sun User Group believes that trade shows should be fun, so in
- addition to all the exhibitors at SUG East you can also experience the
- the Colossal SUG Midway where you can...
-
- ...Discover the Forbidden Secrets of Modern Science at the
- Internet Academy of Mystery!
-
- ...See the Future Today at the Theater of the Amazing!
-
- ...Talk to Exotic Peoples from Around the Globe at Professor
- Phineas Q. Abercrombie's Communications Pavilion!
-
- ...Experience Heart-Stopping Thrills at the UNIX Job Fair!
-
- ...and many more special events and surprises!
-
- The SUG East Trade Show has it all... The Internet Academy of
- Mystery will present a series of FREE introductory half-hour lectures
- from SUG's highly-skilled instructors designed to help trade show
- attendees get a taste of some of the hottest new technology. Some of
- the FREE 'mini-classes' to be taught include: Java; The Worldwide Web;
- Internet Security; and Using Information Services.
-
- The Communication Pavillion provides attendees with a way to keep in
- touch with people back home, browse the Web, and try out interesting
- new communication software.
-
- SUG's Theater of the Amazing is a Product Demo Showcase where
- attendees can gain valuable in-depth information and see special
- demonstrations on the highlighted products of this year's show.
-
- The UNIX Job Fair is a terrific opportunity for those attendess
- looking for a new position, or anyone who wants to learn more about
- the UNIX job market. Staffed by professional recruiters, attendees
- can learn about hundreds of jobs currently available and improve their
- resume and job-hunting skills.
-
- The Sug East Exhibtion can Be Yours For The Low Price Of...
- ABSOLUTELY NOTHING!!!
-
-
- -------------------------------------
-
-
- SUG East Tradeshow Registration
-
- FREE registration for the SUG East Exhibition!
-
- June 24-25, 1996
- Marriott Copley Place
- Boston, MA
-
-
- REGISTRATION FORM
-
- Mail, Email, or FAX registration to:
-
- SUG East Registration
- Sun User Group
- 1330 Beacon Street, Suite 344
- Brookline, MA 02146 USA
-
- Fax: (617) 232-1347
- Email: sugeast@sug.org
- WWW: http://www.sug.org/sug-east.html
-
- Your registration must be received before June 10, 1996 in order to
- receive your FREE pass to the SUG East Exhibition (there is a $25
- registration fee for registrations processed on-site). Registration
- for the conference is separate and requires an additional fee of $295
- ($395 after June 10th) with a $50 discount for SUG or Java-SIG
- members. All conference registrants receive free passes to the
- Exhibition.
-
- For further information, contact sugeast@sug.org, visit us on the web
- at http://www.sug.org or call Team SUG at (617) 232-0514. For
- information about advertising, sponsorships, or exhibiting at SUG
- East, contact Charles Sumner at sales@sug.org or the above phone
- number.
-
- Name: ____________________________________________
-
- Title: ___________________________________________
-
- Company: _________________________________________
-
- Address: _________________________________________
-
- _________________________________________
-
- City: ____________________________________________
-
- State: ___________________________________________
-
- Zip/Postal Code: _________________________________
-
- Country: _________________________________________
-
- Email Address: ___________________________________
-
- Phone: ___________________________________________
-
-
- ___ Please register me for the SUG East Exhibition and Trade Show
- (FREE until June 10, otherwise fill out the section below)
-
- ___ Please register me for the SUG East Technical Conference
- (fill out the section below - includes Exhibition pass)
-
-
- ------------------------+-------------------------------+-------+-------+
- ITEM | Price | Qty. | Total |
- ------------------------+-------------------------------+-------+-------+
- ------------------------+-------------------------------+-------+-------+
- ADVANCE SUG East | FREE (until June 10) | | |
- Exhibition registration | | | |
- ------------------------+-------------------------------+-------+-------+
- SUG East | $25 (after June 10) | | |
- Exhibition registration | | | |
- ------------------------+-------------------------------+-------+-------+
- ----------------------------------------------------------------+-------+
- ADVANCE SUG East | $295 (until June 10) | | |
- Conference registration | | | |
- ------------------------+-------------------------------+-------+-------+
- SUG East | $395 (after June 10) | | |
- Conference registration | | | |
- ------------------------+-------------------------------+-------+-------+
- Conference discount for | - $50.00 | |
- SUG or Java-SIG Members | membership number: ______________ | |
- ----------------------------------------------------------------+-------+
- ----------------------------------------------------------------+-------+
- TOTAL | |
- | |
- ----------------------------------------------------------------+-------+
-
- All payments must be in US dollars; Checks must be drawn on a US bank.
-
- [ ] MasterCard [ ] Visa [ ] AMEX [ ] Check
-
- Cardholder's Name:____________________________________________________
-
- Credit Card Number:___________________________________________________
-
- Expiration Date:______________________________________________________
-
- Signature of cardholder:______________________________________________
-
-
-
-
- ------------------------------
-
- Date: Tue, 18 Jun 1996 21:50:54 -0400 (EDT)
- From: NOAH <noah@enabled.com>
- Subject: File 7--8th FIRST Conf & Workshop on Computer Security
-
- Date--Tue, 18 Jun 1996 10:11:07 -0700
- From--Michael/Miguel J. Sanchez <miguel@boytoy.csd.sgi.com>
- To--Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- This is just a reminder of the upcoming FIRST Conference and
- Workshop this year. Please, forward this information onto
- your constituencies and any other interested parties. For those
- people with websites, please help advertise with a link to
- one of the conference websites listed below. And lastly, if
- it is possible to advertise the event in any advisories, bulletins
- or newsletters, please do so, as this would be most appreciated.
-
- ######### SPECIAL NOTE SPECIAL NOTE SPECIAL NOTE ########
-
- It is very important that if you have any plans to attend, please
- register and make your hotel reservations *NOW*. This is very
- important because of several factors:
-
- 1) Hotel occupancy is at all time high for this summer
- and with the Usenix conference the week before, hotels
- will be filled.
- 2) The hotel will only honor the FIRST conference rate
- of $135/night till June 27, 1996. After this date, the rate
- will only be provided on a space available basis.
- The regular non-FIRST rate is $199/night.
- 3) The price of gas has increased greatly in the California
- area and travel prices will be going up as the summer
- travel season starts. People will use hotels more and
- drive less.
- 4) Also the price of the conference does go up after July 13,
- 1996 and that date is quickly approaching.
-
-
-
- - ---------------------------------------------------------------------
-
-
- ****************************************************
- For the most up to date and complete information,
- please see the URL hostsites
-
- http://www.first.org/workshops/1996/
- - or -
- http://ciac.llnl.gov/firstconf/
- ****************************************************
-
-
- The 8th FIRST Conference and Workshop on
- Computer Security Incident Handling and Response
-
- July 28-31, 1996
- The Westin Hotel
- Santa Clara, California
- United States
-
-
- ___ _ _ ____ ____ ____ _ _ ____ ____ ____ ____ _ _ ____ ____
- | |__| |___ | | | |\ | |___ |___ |__/ |___ |\ | | |___
- | | | |___ |___ |__| | \| | |___ | \ |___ | \| |___ |___
-
-
- The annual FIRST Conference and workshop event is the only event of its
- kind. This event is focused on the field of computer security and most
- specifically incident handling and response. Past conferences have been
- held in Karlsruhe, Germany and Boston, Massachusetts, US. Each of these
- conferences were international in scope and attendance with presentations
- on the latest in vulnerability analysis, incident response, vulnerability
- prevention, and general computer security. Additionally, these conferences
- served as the foundation for the improvement of computer security worldwide
- via sharing of goals, ideas, and information.
-
- The 1996 8th Annual FIRST Conference promises to continue this ground
- breaking work. Occurring in the heart of the Silicon Valley, home of the
- microprocessor and the heartbeat of computing, this year's conference will
- continue to promote FIRST organization goals of worldwide coordination
- and cooperation.
-
-
- _ _ _ _ _ ____ _ ____ ____ _ ____ ____ ___ __.
- | | | |__| | | | [__ |___ | |__/ [__ | _]
- |_|_| | | |__| | ___] | | | \ ___] | .
-
-
- The Forum of Incident Response and Security Teams (FIRST), is an
- international organization that brings together a variety of computer
- security incident response teams. These teams include government
- agencies, commercial companies, academic organizations and computer
- vendors.
-
- World-wide, FIRST aims to foster cooperation and coordination in
- incident prevention, to prompt rapid reaction to incidents, and to
- promote information sharing among members and the global community
- at large.
-
- Further information about the FIRST organization is available at
- the FIRST WWW URL http://www.first.org/first/
-
-
- _ _ _ _ _ _ _ ____ ____ _ _ ____ __.
- | | | |__| \_/ | | | |\/| |___ _]
- |_|_| | | | |___ |__| | | |___ .
-
-
- Here are a few *extra* reasons to attend this year's FIRST Conference
-
- The week prior to the FIRST Conference, The 6th USENIX UNIX
- Security Symposium is being held in San Jose, CA. This means
- that not only could you save money on airfare by staying over
- a weekend, but you could attend two great security conferences
- back to back. <http://www.usenix.org/sec96.html>
-
- Meet other security professionals in the area of incident
- and response.
-
- Improve your security program with the ideas presented.
-
- Save time searching for tools and resources.
-
- Join in the sharing of a wide range of experience and knowledge.
-
- Be a part of the "United Nations" of computer security organizations.
-
- Bring your family and tour the Silicon Valley and San Francisco
- Bay Area.
-
-
-
- ____ ____ ____ _ _ ___ ____
- |__| | __ |___ |\ | | \ |__|
- | | |__] |___ | \| |__/ | |
-
-
- The following scheduled events are subject to change till the
- time of the conference. For the most up to date information
- please refer to the conference URL referenced at the beginning
- of this document.
-
- <650 lines snipped for brevity>
-
- For the most up to date information, please refer to the FIRST conference
- WWW page URL referenced at the top of this document.
-
- The FIRST Conference, first.org, Inc., and Conference Management Services
- want this conference event to be a rewarding event for all attendees. The
- FIRST Conference, first.org, Inc., and Conference Management Services wish
- to cooperate fully with any attendee who has a special need(s) or
- requirement(s) or request(s). For information or assistance with
- disability or special needs/services, please contact us via email,
- fax, telephone or email.
-
-
- Via postal mail: FIRST Conference
- c/o Conference Mgmt Services
- 407 Chester Street
- Menlo Park, CA 94025 U.S.A.
-
- Via fax: +01 415-324-3150
- Via email: merryb@vhdl.org
- Via phone: +01 415-329-0579
-
-
- ____ ____ ____ ____
- |__| |__/ |___ |__|
- | | | \ |___ | |
- _ _ _ ___ ____ ____ ____ ____ ___ ____
- | |\ | | |___ |__/ |___ [__ | [__
- | | \| | |___ | \ |___ ___] | ___]
-
-
- The State of California and the San Francisco Bay Area have a great
- deal of activities and sights to offer the visitor. The following
- WWW URLs are provided to those that are interested in the area and
- the multitude of things to see and experience.
-
- San Francisco Bay Area and Beyond
- http://www.hyperion.com/ba/sfbay.html
-
- << Santa Clara >>
-
- Santa Clara
- http://www.xpand.com/Santa_Clara/index.html
- Great America Theme Park
- http://www.rollercoaster.com/pga1/pga/
- Intel Museum
- http://www.intel.com/intel/intelis/museum/
- Frys
- http://frys.fry-s.com/
-
- << San Jose >>
-
- Winchester Mystery House
- http://www.netview.com/svg/tourist/winchest/
- Egyptian Museum
- http://artdirect.com/california/san.francisco/arts.univ/santa.clara/egypt
- The Tech Museum of Innovation
- http://www.thetech.org/
- San Jose Museums
- http://artdirect.com/california/san.francisco/museums/sbay/homepage
-
- <<Monterey>>
-
- Monterey Bay Aquarium
- http://sapphire.cse.ucsc.edu:80/mb/mba/
- http://www.usw.nps.navy.mil/~millercw/aq/
- Access Monterey Peninsula
- http://www.campgrounds.com/ctpa/ca/regions/cc/cceditor.htm
-
- << Mountain View >>
-
- Magic Edge
- http://www.cygnus.com/misc/magicedge.html
- NASA AMES
- http://www.arc.nasa.gov/amesinfo/visitors_center.html
-
- <<San Francisco>>
-
- 49 Mile Scenic Drive
- http://www.geninc.com/geni/USA/CA/San_Francisco/travel/49mile.html
- Alcatraz
- http://www.nps.gov/alcatraz/index.html
- Exploratorium
- http://www.exploratorium.edu/
- Golden Gate Bridge and National Recreation Area
- http://www.nps.gov/parklists/index/goga.html
- Golden Gate Park
- http://www.geninc.com/geni/USA/CA/San_Francisco/travel/ggp.html
- Water's Edge
- http://www.geninc.com/geni/USA/CA/San_Francisco/travel/wharf.html
- Neighborhoods
- http://www.geninc.com/geni/USA/CA/San_Francisco/travel/neighborhoods.html
- Marine World Africa USA
- http://www.freerun.com/napavalley/outdoor/marinewo/marinewo.html
- San Francisco Museums
- http://artdirect.com/california/san.francisco/museums/sf/homepage
-
- <<Palo Alto>>
-
- Stanford University
- http://www.stanford.edu/
- Stanford Linear Accelerator Center
- http://www.slac.stanford.edu/winters/pub/www/education/tour_slac.html
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.49
- ************************************
-
-