home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Aug 11, 1996 Volume 8 : Issue 58
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.58 (Sun, Aug 11, 1996)
-
- File 1--Some Great Web-oriented Books from O'Reilly
- File 2--InfoWarCon in Washington, DC (Conference)
- File 3--News from Noah - Time/Warner Merger; "Orchid Club/Porno"; Intel/MS
- File 4--Microsoft sues IRS; AOL goes AWOL (news from Noah)
- File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 1 Aug 1996 13:26:30 -0700
- From: Sara Winge <sara@ora.com>
- Subject: File 1--Some Great Web-oriented Books from O'Reilly
-
- ((MODERATORS' NOTE: In our view, O'Reilly publishes some of the
- most useful books on Unix and Net/Web-related material. Here are
- a few recent titles))
-
- CGI Programming on the World Wide Web
- By Shishir Gundavaram
- 1st Edition March 1996
- 450 pages, ISBN: 1-56592-168-2, $29.95
-
- This book offers a comprehensive explanation of CGI and related techniques
- for people who hold on to the dream of providing their own information
- servers on the Web. It starts at the beginning, explaining the value of
- CGI and how it works, then moves swiftly into the subtle details of
- programming.
-
- ----------------------------------------------------------------
- Getting Connected: The Internet at 56K and Up
- By Kein Dowd
- 1st Edition June 1996
- 424 pages, ISBN: 1-56592-154-2, $29.95
-
- A complete guide for businesses, schools, and other organizations
- who want to connect their computers to the Internet. This book
- covers everything you need to know to make informed decisions, from
- helping you figure out which services you really need to providing
- down-to-earth explanations of telecommunication options, such as frame
- relay, ISDN, and leased lines. Once you're online, it shows you
- how to set up basic Internet services, such as a World Wide Web server.
- Tackles issues for PC, Macintosh, and UNIX platforms.
-
- ----------------------------------------------------------------
- World Wide Web Journal: Volume 1, Issue 1
- Fourth International WWW Conference Proceedings
- A publication of O'Reilly & Associates and the World Wide Web Consortium (W3C)
- Winter 1995/96
- 748 pages, ISBN: 1-56592-169-0; ISSN 1085-2301, $39.95
-
- The World Wide Web Journal is a quarterly publication that provides
- timely, in-depth coverage of research developments on the World Wide Web.
- This issue contains the Conference Proceeding papers that were chosen
- for the 4th International World Wide Web Conference.
-
- ----------------------------------------------------------------
- World Wide Web Journal: Volume 1, Issue 2
- Key Specifications of the World Wide Web
- A publication of O'Reilly & Associates and the World Wide Web Consortium (W3C)
- Spring 1996
- 356 pages, ISBN: 1-56592-190-9, $24.95
-
- This issue of the World Wide Web Journal collects in a single
- volume the key specifications that describe the architecture of the
- World Wide Web and how it works. It includes the specifications
- for HTML, HTTP, and URLs, plus the emerging standards for PNG, PICS,
- PEP, and CSS. A valuable reference for Webmasters, application
- programmers, and technical managers.
-
- ----------------------------------------------------------------
- World Wide Web Journal: Volume 1, Issue 3
- The Web After Five Years
- A publication of O'Reilly & Associates and the World Wide Web Consortium (W3C)
- Summer 1996
- 226 pages, ISBN: 1-56592-210-7, $24.95
-
- This issue reflects The Web After Five Years through an interview with
- Tim Berners-Lee, selections from the MIT/W3C Workshop on Web Demographics
- and Internet Survey Methodology, and papers from the Fifth International
- World Wide Web Conference. Also includes technical proposals from the W3C,
- lively debates on the size of the Web, the impact of advertising on caching,
- and ethical guidelines for using such data.
-
-
- --
- Sara Winge sara@ora.com
- O'Reilly & Associates
- 103A Morris St., Sebastopol, CA 95472
- 707/829-0515, Fax 707/829-0104, http://www.ora.com/
-
- ------------------------------
-
- Date: Tue, 9 Jul 1996 14:48:19 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 2--InfoWarCon in Washington, DC (Conference)
-
- From -Noah
-
- noah@enabled.com
-
- * * * * * * * P L E A S E D I S T R I B U T E W I D E L Y * * * * * * *
-
- InfoWarCon 5, 1996
- Electronic Civil Defense for the 21st. Century
- The Convergence of the Commercial and the Military Sectors:
- Vulnerabilities, Capabilities and Solutions
- September 5-6, 1996
- Washington, DC
-
- Sponsored by:
-
- Winn Schwartau, Interpact, Inc./Infowar.Com
- National Computer Security Association/NCSA.Com
- Robert Steele, OPEN SOURCE SOLUTIONS, Inc./OSS.Net
-
- Sponsoring Organizations:
- Command Software Systems
- Digital Equipment Corporation
- Norman Data Defense
- IBM
- Phillips Publications
- Jane's Information Group
-
- Historically, civil defense has meant to protect citizenry against hostile
- military actions. Today, with the specter of Information Warfare representing
- new challenges to late-industrial and information age nation-states, the rules
- have radically changed. Societies are rapidly migrating to increased dependance
- upon four critical interrelated infrastructures and adequate methods of
- protection must be developed:
-
- - The Power grid is the basis of most of modern society. With it gone,
- not much else happens. If you think this is just a matter of building more
- generators, think again--what happens if the factories that *make* the
- generators are taken down, too?
-
- - The Communications infrastructure: land, sea, air and satellite. 95%
- of
- military communications go over the public networks, and 100% of all financial
- and industrial communications. Is it worth protecting?
-
- - The Global Financial structure depends upon the first two
- infrastructures, and is perhaps the most vulnerable to theft and denial of
- service attack. 99+% of all "wealth" is digital--what happens if it vaporizes?
-
- - Transportation systems rely upon the other three. The air traffic
- systems require both power and communications to manage the thousands of
- airplanes in the sky. What happens to the thousands of airplanes in the air
- if air traffic control across an entire country goes down?
-
- Without all of these infrastructures properly and reliably functioning, the
- private sector and the national security community cannot function. No heat, no
- air conditioning, no food distribution, no light, no radio or TV, no Internet.
- Are we prepared? Do we have a a crisis response for the day money as we know
- it vanishes?
-
- Electronic Civil Defense will soon become a critical component of any nation's
- well being while the needs of both the private sector and government converge.
- The convergence of military and civilian interests that Mr. Schwartau predicted
- two years ago is happening before our eyes. Defensive and commercial postures
- have so intertwined as to make them indistinguishable.
-
- This Fifth International Conference on Information Warfare is an unclassified,
- open source forum, and will examine the myriad questions of Electronic Civil
- Defense from the US, International and multi-cultural perspectives.
-
- Our seasoned experts will work with InfoWarCon5 delegates to outline a
- framework for the vulnerabilities, threats, risks and solutions for Electronic
- Civil Defense. From this conference participants will be able to draw critical
- insights which will improve their own legislative, regulatory, financial, and
- operational readiness and security. Last year's Washington InfoWarCon brought
- together over 600 people and was covered by CNN among other major media
- organizations. This year key world players in information warfare from the
- economic, military, and law enforcement communities of over 30 countries are
- expected to participate. Be prepared for highly interactive sessions with
- plenty of audience participation. Please bring your opinions and be ready to
- discuss them with us all!
-
- PRELIMINARY SCHEDULE
-
- September 4, 1996
-
- 16:00 - 20:00 Registration Begins
-
- 18:00 - 20:00 Sponsored Reception for attendees, speakers, sponsors and the
- press. Light food fare and liquid refreshments. Meet Mr.Schwartau, Mr. Steele,
- Dr. Kabay and many of our other world-class speakers.
-
- September 5, 1996
-
- 6:30 - 7:50 Registration
-
- 7:50 - 8:00 Welcoming Comments and Administration:
- Dr. Peter Tippett, NCSA
- Winn Schwartau, Interpact, Inc.
-
- 8:00 - 8:30 Keynote Presentation: "National Security in
- the Information Age" Senator William Cohen (R-Maine) *
-
- 8:30 - 9:00 "A Commander in Chief's View of Rear-Area, Home-Front
- Vulnerabilities and Support Options."
-
- General John J. Sheehan, U.S. Supreme Allied Commander,
- Atlantic, Commander-in-Chief Atlantic Command
-
- 9:00 - 9:30 "Global Finance: Protection in the Age of Electronic Conflict"
- Colin Cook, V.P. Information Security, Citibank *
-
- 9:30 - 10:00 "We Can't Do It Without the Private Sector"
- Ken Minihan, Director, NSA *
-
- 10:00-10:30 Break
-
- 10:30-11:45 National Policy Reviews of Electronic Civil Defense Programs
- Ms. Sally Katzen, Administrator for Information and
- Regulatory
- Affairs, Office of Management and Budget, USA
- Dr. Anders Eriksson and Peter Wallstroem,
- National Defence Research Establishment,
- Dept. of Defence Analysis: Sweden
- Dr. Leroy Pearce, Canada,
-
- What is the current thinking in Electronic Civil Defense?
- How do plan on protecting our citizens against invisible
- unnamed assailants? What are the top policy makers
- planning for? International experts will present their
- views as well.
-
- 11:45 - 13:15 Sponsored Lunch
-
- 12:30 - 13:00 Luncheon Address
-
- 13:15 - 14: 30 Breakout Sessions A1 - A4
-
- A1 A Military Briefing: The Electronic Projection of Power in a C4I
- World
- Moderated by General Jim McCarthy, USAF (Ret)
- Barry Horton, Principle Deputy Assistant
- Secretary of Defense for C3I *
- Captain Patrick Tyrrell, Assistant Director,
- Information Warfare Policy, Ministry of
- Defence, United Kingdom
-
- A2 Protecting the Global Financial and Communications
- Infrastructures: Weaknesses at the Transport Layer
- Ron Eward, Martech, Inc.
-
- One scary session. Forget about HERF Guns and hackers. Mr. Eward
- will tell us how to wreak disaster with a few well placed pick-
- axes, from New York to Palermo to Taipei. An incredible research
- effort with global on the generally forgotten physical
- underpinnings of Cyberspace. Do not miss his tremendously
- important findings. Messrs. Eward and Schwartau upcoming book on
- this overlooked topic will shake the financial global community.
-
- A3 Media Manipulation, Perception Management and PsyOps
- Moderated by Dr. Mich Kabay, NCSA
- Mark Bender, ABC News *
- Jim Roberts, SOLIC
- Neil Munro, Washington Technology
-
- How can a nation-state use the media to bend the will of an
- adversary, or leverage its own position prior to, in or after a
- conflict? Who is really using who?
-
- A4 National Defense University Session
- Moderator - Dr. Dan Kuehl, Professor, NDU
-
- Top students from the School of Information Warfare and
- Strategy, the Nation's top-level school for potential flag
- officers in the IW arena, will discuss their findings and
- concerns.
-
- 14:30 - 15:00 Break
-
- 15:00 - 16:15 Breakout Sessions B1-B4
-
- B1 - Emergency/Disaster Planning for the Effects of Information Warfare:
- Moderator: Mark Aldrich, Chief Infosec Engineer, GRC
- International, Inc.
- Michael Logan, Federal Planning Associate,
- American Red Cross
- William W. Donovan, CISSP, FEMA
- Ken Barksdale, Association of Contingency
- Planners
-
- Assume the worst happens, and an infowar assault takes down major
- life sustaining portions of the infrastructure. What do we do
- about it? How do we minimize the damage and protect the victims
- and citizens? These esteemed experts will tell you what they think
- and then invite your comments.
-
- B2 Legal Liabilities and Responsibilities in Information Warfare
- Danielle Cailloux, Judge, Committee on
- Intelligence, Belgium
- Charles Dunlap, Judge Advocate, USAF
- Kenneth Bass III, Cyber-Attorney, Washington
-
- If a company is attacked and it loses significant assets, what
- are the recourses of the stakeholders? How do we measure and
- evaluate the losses and responsibility? On the military side, what
- constitutes an Act of War and what steps are necessary to formulate
- a response?
-
- B3 The Forensics of Information Wafare for Law Enforcement
- Moderated by Michael Anderson, New Technologies
- Investigation Division
- Howard Schmidt, Director, AF Office of Special
- Investigations
- Ken Rosenblat, Santa Clara County Prosecutor, Author
- "High-Technology Crime: Investigating
- Cases Involving Computers"
-
- How can you tell you are under attack? Once you determine you are,
- how do you make a case which will stand up in court? How do you
- collect evidence? How do you involve law enforcement without
- compromising your efforts? Experts share years of experience with you.
-
- B4 Naval Postgraduate School Session
- Moderator: Dr. Fred Levien, NPS
-
- Top field grade students from the Naval Postgraduate School in
- Monterey, California will present InfoWar papers and concepts.
-
- 16:15 - 16:45 Break
-
- 16:45 - 18:00 The Hacker/Underground and Social Engineering
-
- Moderated by: Nic Chantler, Australian Intelligence (Ret)
- Andy Mueller-Maguhn, CHAOS Computer Club, Germany
- Chris Goggans, co-founder, Legion of Doom, USA
- John Gilmore, Electronic Frontier Foundation
-
- If you've ever wanted to know how hackers think; what
- makes them tick and how they became the first Information
- Warriors, here are the people who can answer your
- questions. These sessions are among the most popular at
- every InfoWarCon. Gilmore will present his unique concepts
- for Defensive Information Warfare.
-
- 18::00 - 20:30 Sponsored Reception/"Live Hackers" Off-Line
-
- September 6, 1996
-
- 6:30 - 7:50 Continental Breakfast
-
- 7:50 - 8:00 Opening Remarks and Administration
-
- 8:00 - 8:30 "Domestic Law Enforcement and Electronic Civil Defense"
- Louis Freeh, Director, FBI *
-
- 8:30 - 9:00 "The Convergence of Military and Civilian Defense"
- General Jim McCarthy, USAF (Ret)
-
- 9:00 - 9:30 "What is National Security?"
- Michael R. Nelson, Ph.D.
- Special Assistant for Information Technology
- White House Office of Science and Technology Policy
-
- 9:30 - 10:00 "Building a Society from the Net Up"
- Pedrag Pale, Chairman of the InfoTech Coordinating
- Committee, Ministry of Science,
- Technology and Informatics, Croatia
-
- 10:00-10:30 Break
-
- 10:30-11:45 The Russians are Coming
- Moderated by: Greg Treverton, Director of National
- Security Program, Rand Corporation
-
- From academia to the military to their business community,
- the Russians have been thinking long and had about
- Information Warfare. Here's what they have to say. Get
- front row seats and be ready to ask your questions.
-
- Dr. Victor I. Solntsev, Assoc. Prof. Moscow State Tech. Univ.
- "Information Warfare and Human-Operator Security"
- Dr. Dmitry Chereshkin Russian Academy of Sciences;
- Editorial Board, "Information Infrastructure and Policy."
- Dr. Georgy Smolian Russian Academy of Sciences and Scientific Council
- "Democratization of Russia and Information Security."
-
- 11:45 - 13:15 Sponsored Lunch
-
- 12:30 - 13:00 Luncheon Address
-
- 13:00 - 14: 15 Breakout Sessions C1-C4
-
- C1 Corporate Civil Defense:
- Moderated by Don Sortor, Director Security Prgms,
- Corp. InfoSec., Motorola, Inc.
-
- A team of cross-industry experts from the primary infrastructures,
- will examine how industry and government can and should interact
- in the event of an Electronic Pearl Harbor. What is the role of
- the company and its management? What policies should be put into
- place to prepare for the malicious Acts of Man? How should the
- government work with the private sector to mitigate damages?
- These experts will set you on the right track.
-
-
- C2 Denial of Service in the Private Sector:
- The Nuclear Weapons of the Information Age:
- Magnetic Weapons from the Military to
- Electronic Pipe Bombs
- Carlo Copp, Defense Analyst, Australia
- Kelly Goen, Penetration and Security Engineer
-
- Get Seats Early! Magnetic weapons; directed energy weapons; HPM;
- HERF Guns; electromagnetic pulse cannons and EMP.
- Learn about the latest in high energy weapons systems and how they
- can be used to attack and destroy critical electronically based
- infrastructures. Then find out what the terrorist can do with
- home-brew electronic pipe bombs.
-
- C3 The Net Under Attack
- Dr. Dorothy Denning, Chair, Computer Science
- Dept., Georgetown Univ.
- Jim Christy, Permanent Subcommittee Investigations
- U.S. Senate (And USAF OSI)
-
- What makes an attack on the Internet and what do we do about it?
- Ms. Denning is an internationally recognized expert who will guide
- us and her panel of experts through the maze of possibilities.
- Incredibly valuable for security professionals.
-
- C4 USAF School of Advanced Airpower Studies
- Moderated by Col. Richard Szafranski, USAF, Air War
- College National Military Strategy
-
- Col. Szafranski and his top students will discuss their views,
- opinions on Information Warfare. The USAF SAAS has produced some of the
- most revolutionary papers in IW, including the now globally recognized papers
- on taking down telecommunications and national power systems.
-
- 14:30 - 15:00 Break
-
- 15:00 - 16:15 Breakout Sessions D1-D4
-
- D1 Anonymous Global Banking: Pitfalls and Solutions
- Moderated by Bruce Schneier
- Kelly Goen, Security Engineer
- Eric Hughes, Cypherpunks
- Phil Zimmermann *
-
- How does anonymous international banking work? Is it merely a
- front for Criminal Central? Or is there a true value? How do
- conventional banking institutions view it? What about
- cryptographic solutions? Are your funds "naked. on the
- Net today? Come see for yourself!
-
- D2 The Ethics of Information Warfare
- Moderated by Winn Schwartau
- Col. Phil Johnson, Judge Avocate, USAF
- Dr. Dan Kuehl, NDU
-
- While CNN is looking over your shoulder, as a
- military commander, here is your choice: either use a precision
- smart bomb which will immediately kill 20 civilians for the world
- to see. Or, use a non-lethal IW weapon, no immediate TV deaths,
- but a predicted 200 civilian collateral fatalities within 30 days.
- What do you do? The Ethical conundra of Information Warfare will
- be examined from all perspectives. Or: you have been attacked
- anonymously--you suspect one party, without proof--another
- attack is coming. What now? Should we develop new intelligence
- capabilities to permit precision detection and response in
- cyberwar?
-
- D3 National Information Assurance: Cooperation is the Key
- to Safeguarding Communications, Power and Transportation
-
- Moderated by: Major Brad Bigelow, Office of the Manager,
- National Communications System
- Jeff Sheldon, General Counsel,
- Utilities Telecommunications Council
- Steve Fabes, Director of Electronic Delivery
- Services,
- BankAmerica
- Carl Ripa, VP National Security/Emergency
- Preparedness, Bellcore
-
- Experts from the major civilian infrastructures will discuss how
- past cooperation between industry and government has echoed
- economic realities. The bulk of the nations information
- infrastructure is not under the economic or regulatory control of the
- Federal government. So, how do we maintain a healthy balance
- between private initiative and legislative and regulatory
- actions? Today there is no "due diligence" standard which
- requires that communications and computing services be guaranteed
- in terms of security and data integrity. Our panel will provoke
- an active discussion of remedial cooperative measures.
-
- D4 "Understanding and Defending Against Industrial Espionage and
- Information Terrorism."
- Tom Fedorek, Managing Director, Kroll Associates New
- York*
- Matt DeVost TITLE COMING
- Charlies Swett, Acting Deputy Director for
- Low-Intenstity
- Conflict Policy, Office of the Assistant Secretary of
- Defense
- for Special Operations and Low-Intensity Conflict
-
- A look at how modern espionage and information is conducted, why it's
- done and
- who's doing it. How much can it cost your company and how can you
- tell if you're targeted? Do not miss this fascinating session
- which is expected to feature the Kroll Managing Directors
- from Paris, London, and New York.
-
- 16:15 - 16:30 Break
-
- 16:30 - 17:00 Wrap Up: "What is War?"
- Moderated by Dr. Mich Kabay, NCSA
- General Jim McCarthy, USAF (Ret)
- John Petersen, President, The Arlington
- Institute
- You - The Audience
-
- An exciting 'don't miss' interactive audience session. What a closing!
-
- (* Speakers with an * have been invited but have not confirmed as of June 28,
- 1996.)
-
- HOTEL INFORMATION:
-
- Crystal Gateway Marriott
- 1700 Jefferson Davis Highway
- Arlington, VA 22202
-
- The Crystal Gateway Marriott is offereing a special conference rate of
- $129 single/$139 double occupancy. This rate is good until August 14,
- 1996.
-
- 703-920-3230 (Voice)
- 703-271-5212 (Fax)
-
-
- CANCELLATION POLICY
-
- After August 9th, any cancellation will incur a $100.00 processing fee. If the
- reservation is not cancelled and no one attends, the full registration price
- will be charged. Substitute attendees are welcome.
-
-
- InfoWarCon '96 Registration Form:
-
-
- Name: ___________________________________________________________
-
- Title: ___________________________________________________________
-
- Org: ___________________________________________________________
-
- Address: ___________________________________________________________
-
- Address: ___________________________________________________________
-
- City: ___________________________________________________________
-
- State: _______________________________ Zip: _____________________
-
- Country: __________________________ Email: ________________________
-
- Phone: __________________________ Fax: _________________________
-
-
- FEES:
-
- Payment made BEFORE August 9, 1996:
-
- ( ) 595.00 NCSA Members/OSS '96 Attendees
- ( ) 645.00 All others
-
- Payment made AFTER August 9, 1996:
-
- ( ) 645.00 NCSA Members/OSS '96 Attendees
- ( ) 695.00 All others
-
-
- Make checks payable to NCSA, or
-
- Charge to: ( ) VISA ( ) MasterCard AMEX ( )
-
- Number: ___________________________________________
-
- Exp date: ___________________________
-
- Signature: ___________________________________________
-
-
- MAIL OR FAX OR EMAIL REGISTRATION TO:
-
- National Computer Security Association
- 10 South Courthouse Avenue
- Carlisle, PA 17013
- Phone 717-258-1816 or FAX 717-243-8642
- EMAIL: conference@ncsa.com
-
-
- For more information about NCSA:
-
- WWW: http://www.ncsa.com
- CompuServe: GO NCSA
- EMail: info@ncsa.com
-
- Version: 1.10
-
-
-
- Peace
- Winn
-
- Winn Schwartau - Interpact, Inc.
- Information Warfare and InfoSec
- V: 813.393.6600 / F: 813.393.6361
- Winn@InfoWar.Com
-
- ------------------------------
-
- Date: Mon, 29 Jul 1996 21:34:54 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 3--Time/Warner Merger; "Orchid Club/Porno"; Intel/MS (Noah/news)
-
- FTC OKAYS TIME WARNER MERGER WITH TURNER
- The Federal Trade Commission has indicated it will approve Time
- Warner's $7.5 billion purchase of the Turner Broadcasting System,
- which will create the world's largest media and entertainment
- conglomerate. The final settlement apparently will limit the
- financial interest that John Malone's Tele-Communications Inc.
- (TCI) can take in Time Warner, severely reduce various
- concessions that would have been made to TCI, and would forbid
- Time Warner from discriminating against competitors in the cable
- industry. (Washington Post 18 Jul 96)
-
- "ORCHID CLUB" INDICTMENTS FOR PORNOGRAPHY ON INTERNET
- A federal grand jury in San Jose, California, has indicted 16 people
- from the U.S. and abroad for their participation in a child
- pornography ring called the "Orchid Club," whose members used the
- Internet to share sexual pictures and conduct online chat during a
- child molestation. A U.S. attorney says there are no free speech
- issues involved: "The thing that ups the ante in this case is that
- allegations of distribution of pornography are coupled with serious
- allegations of child molestation. It's an issue relating to the
- protection of children, not to the First Amendment." (New York
- Times 17 Jul 96 A8)
-
- INTEL, MICROSOFT CROSS-LICENSE AGREEMENT
- Intel Corp. and Microsoft Corp. have agreed to cross-license their
- Internet communications technology in an effort to pursue
- Internet-based telephone and videoconferencing business
- opportunities. The alliance, which will exploit Intel's Proshare
- videoconferencing technology and Microsoft's NetMeeting and ActiveX
- software, will also develop technology to allow users to find other
- people to talk with on the Internet via a User Location Service.
- (Investor's Business Daily 18 Jul 96 A9)
-
- ------------------------------
-
- Date: Thu, 8 Aug 1996 20:53:07 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 4--Microsoft sues IRS; AOL goes AWOL (news from Noah)
-
- MICROSOFT SUES IRS FOR EXPORT TAX BENEFITS
- Microsoft has filed a lawsuit against the Internal Revenue
- Service, in an effort to recoup about $19 million paid as part of
- the company's 1990 and 1991 tax returns. The legal action ups
- the ante in the software industry's bid for favorable treatment
- under a 1984 law that allows businesses to set up foreign sales
- corporations, thereby exempting 15% of their export income from
- U.S. taxes. Similar industries, including exporters of films,
- tapes and records, have benefited from the 1984 provision. The
- software industry has said it would save about $200 million over
- five years if it were allowed the same protections. (Wall Street
- Journal 8 Aug 96 B4)
-
- AOL GOES AWOL
- America Online went off-line yesterday, stranding more than 6
- million subscribers in the real world of snail mail and
- "sneakernet," as one consultant who depends on e-mail described
- it. The AOL computers were shut down at 4:00 a.m. for routine
- maintenance, and then were unable to resume function at the
- scheduled 7:00 a.m. power-up. While some people took the outage
- with a dose of philosophy, others predicted this event was the
- harbinger of more trouble in cyberspace. "Clearly the
- longer-term goal has to be for the Internet to become more like
- the phone system is today," in terms of reliability, says a
- director for AT&T's WorldNet service. "The likely scenario is
- increasingly calamitous breakdowns," predicts an industry
- columnist. Meanwhile, AOL CEO Steve Case expressed his regret
- over the inconvenience via conventional news release.
- (Washington Post 8 Aug 96 A1)
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.58
- ************************************
-
-
-