home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Aug 21, 1996 Volume 8 : Issue 61
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.61 (Wed, Aug 21, 1996)
- File 1--Seeking opinions of Mankato State University email policy
- File 2--Commends requested on Mankato "email" policy
- File 3--DOJ homepage hacked!!!
- File 4--Re: USDOJ Hacked
- File 5--Microsoft Acknowledges Flaw in Internet Browser
- File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
- File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Mon, 19 Aug 1996 10:30:32 -0500 (CDT)
- From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>
- Subject: File 1--Seeking opinions of Mankato State University email policy
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- At the beginning of the year, Mankato State University adopted the
- following "email policy". Being a member of the student senate, I
- expressed my concerns to the student government about the policy
- (particularily the prohibitions on "political" speech), but it wasn't
- politically feasible to challenge the policy as the student government had
- approved it prior to my election (ie, I don't really thing they knew what
- it was they were signing/signing-away). When I did bring it up to the
- administration of the university, it was basicly reduced to "well, the
- Senate said it was ok, so stick it" (well, that's somewhat paraphrased
- :-).
-
- Anyways, I'd like some opinions about this, as, in light of the Princeton
- case (and the ACLU's response), I think I would like to attack this
- policy. I would just like a little better feeling about where this policy
- stands than the general "yucky" feeling I get.
-
- Thanks for your time.
-
- Robert Hayden
-
- - -----------------------------
-
-
- Mankato State University
-
- MANKATO STATE UNIVERSITY
- ELECTRONIC MAIL TRANSMISSION REGULATION
-
-
-
-
- Article I. Objective
-
-
- To ensure that electronic mail transmissions between and among MSU
- authorized "E-mail" users are consistent with state statutes limiting
- the use of state services and equipment to state business purposes
- only. This effort is consistent with existing practices governing
- other forms of communication on campus including telephone calls,
- bulletin board postings, the mass distribution of promotional flyers,
- and the use of intra-campus mail services.
-
-
- Minnesota Statutes Chapter 43A.38, Subd. 4 - Use of State Property
- An employee shall not use or allow the use of state time, supplies
- or state owned or leased property and equipment for the employee's
- private interests or any other use not in the interest of the state,
- except as provided by law.
-
- Minnesota Statutes Chapter 43A.39, Subd. 2 - Noncompliance
- Any employee who intentionally fails to comply with the provisions
- of Chapter 43A shall be subject to disciplinary action and action
- pursuant to Chapter 609. An appointing authority shall report in
- writing to the legislative auditor when there is probable cause to
- believe that a substantial violation has occurred. Any person
- convicted of a crime based on violations of this chapter shall be
- ineligible for appointment in the civil service for three years
- following conviction.
-
- Minnesota Statues Chapter 609.87 thru 609.8911 - Computer Crime
- [Statute deals with definitions; destructive computer programs;
- intentional damage to computers, computer systems, computer
- networks, computer software, etc.; theft of services and equipment;
- unauthorized computer access; gross misdemeanor and misdemeanor
- criminal penalties; and reporting violations.]
-
- University Facilities and Services - Restricted Use
- Faculty and staff are to use University facilities and services for
- University business only. [Mankato State's Employee Handbook -
- General Policies Section]
-
- Professional and Ethical Standards
- University equipment shall not be used by employees for personal use
- without notice to and the written consent of his/her employer . . .
- . [State University System Regulations Article 2.4] Similar language
- is contained in Articles 4 and 27 of the IFO Labor Agreement and
- Article 20 Section C of the MSUAASF Agreement.
-
-
-
- Students, who are not already on-campus part-time employees covered by
- the above statute citations, shall adhere to all E-mail policies and
- regulations contained herein. It is the intent of this E-mail
- regulation to cover all E-mail users within the campus community.
-
- Article II. Regulation
-
-
- The electronic mailing privilege is provided to members of the
- University community to enhance their ability to quickly and
- conveniently send and receive written communications and documents for
- the purpose of conducting University business. Use of the privileges
- for personal gain and for non-University related business is
- prohibited. (The University continues to invest significant amounts of
- its budget in the maintenance and improvement of electronic
- transmission capability, in addition to the enormous past outlays
- which have been made for computer hardware, software, and cabling.)
-
- SECTION 1. FOR PROFIT USE PROHIBITED : NONPROFIT USE REQUIRE PRIOR APPROVAL
-
-
- For profit organizations are strictly prohibited from the use of
- University electronic mail services. (University contract vendors like
- Wallace's University Bookstore and the ARAMARK food service shall be
- provided access to the University electronic mail system only upon
- agreement to pay MSU for these state provided services.) Non-profit
- organizations may be allowed access only if the transmission has been
- approved in advance by the University Operations Vice President (or
- designee). Authorization for such access by a non-profit organization
- will hinge on how closely it relates to the "state business use"
- standard and the organization's traditional or direct tie to the
- University (e.g., Mankato State University Foundation, United Way,
- etc.).
-
- SECTION 2. ACADEMIC FREEDOM PRINCIPLES APPLY
-
-
-
- Commonly understood principles of academic freedom shall be applied to
- the administration of information transmitted by E-mail.
-
- SECTION 3. EXTERNAL TRANSMISSIONS TO MSU E-MAIL USERS
-
-
- The ability of the University to monitor and regulate incoming
- Internet transmissions is almost impossible. If unsolicited or
- unwanted Internet transmissions are received, E-mail users may contact
- their mail system manager so that an effort can be made to ensure that
- such transmissions do not reoccur from the same source.
-
- SECTION 4. POLITICAL USE OF E-MAIL PROHIBITED
-
-
- Political transmissions are prohibited. This would include
- transmissions which advocate the election of particular candidates for
- public office at either the federal, state, or local level. Also
- banned are those messages that advocate support of or opposition to
- any particular referendum proposal that will be decided by the voters
- during a general or special election affecting the public at large.
-
- SECTION 5. COLLECTIVE BARGAINING UNITS, RECOGNIZED STUDENT GROUPS - E-MAIL
- TRANSMISSIONS ALLOWED
-
-
- This regulation is not to be interpreted as prohibiting transmissions
- protected by existing employee collective bargaining agreement
- provisions dealing with mailing privileges nor shall it be used to
- deny access to recognized student organizations and related student
- service departments who wish to announce upcoming events that may be
- of interest to members of the University community.
-
- SECTION 6. GENERAL STANDARDS AND GUIDELINES
- 1. Personal uses of E-mail which are prohibited include, but are not
- limited to: chain letters; recipes; "garage sale" announcements;
- solicitation or requests for contributions (e.g.needy family,
- special relief efforts, etc.); commercial advertisements; and
- advertisements for events or items for sale or rent that result in
- personal gain or revenue for non-University departments and
- programs or unapproved organizations as prohibited by provisions
- in Article II, Section 1 of this policy.
- 2. E-mail users are asked to take care in directing their messages to
- large audiences and to avoid sending repeats of the same messages
- as "reminders." Concerns also exist that many messages sent to all
- MSU mail users could be better targeted to smaller groups of
- users.
- 3. E-mail transmissions shall not be used in any way which violate
- Higher Education Board or University policies regarding
- harassment. The University is not responsible for transmissions
- which are libelous or defamatory.
- 4. A user's password is the key to the E-mail network and as such
- users are advised that they are responsible for the security of
- their respective password. There are major risks when a user's
- password is known to others. Transmission made using that password
- are assumed to be initiated by the password's user, though
- managers of E-mail systems who investigate complaints shall not
- automatically assume that the author of an offending transmission
- is the password's user.
- 5. It is not the intent of this regulation to interfere with private
- communications between individuals.
- 6. E-mail managers and network system administrators are expected to
- treat the contents of electronic files as private and
- confidential. Any inspection of electronic files, and any action
- based upon such inspection, shall be governed by applicable
- federal and state laws and by University policies.
-
- Article III. Sanctions for Violations
-
-
- Complaints by any user receiving electronic transmissions through Data
- General, Microsoft Mail, and existing VAX services may be submitted to
- any manager of a major E-mail system or directly to the University
- Operations Vice President's Office. An E-mail manager will investigate
- the complaint and make a determination on its validity. If a violation
- did occur the E-mail manager shall inform the employee's immediate
- supervisor and make a recommendation to implement one of the following
- sanctions. Severity of the sanction is dependent on the nature of the
- violation and history, if any, of past violations. The employee's
- supervisor has five work days in which to approve, and or modify, the
- E-mail system manager's recommendation. If no action occurs the E-mail
- manager's recommendation is forwarded to the University Operations
- Vice President for disposition.
-
- SANCTIONS - DEPENDENT ON SEVERITY OF VIOLATION AND/OR HISTORY OF PAST
- VIOLATIONS
- * Verbal warning.
- * Discipline pursuant to appropriate collective bargaining or other
- employment regulations; discipline pursuant to appropriate student
- conduct codes.
- * Warning letter to the violator formally notifying of additional
- sanctions if violations continue.
- * Suspension of electronic mail privileges for five work days. The
- user would continue to receive electronic mail but would not be
- able to read it until after the suspension of privileges is lifted
- and a new electronic mail password is issued by the appropriate
- E-mail manager.
- * Penalty consistent with federal or state law and/or employee
- collective bargaining agreements. (Could involve referral of
- matter to criminal authorities..)
-
- APPEALS
-
-
- Applicable appeal procedures may be implemented consistent with
- employee bargaining unit contracts or student conduct codes.
-
- Article IV. Electronic Mail Oversight Team
-
-
- The "Electronic Mail Oversight Team" shall review e-mail practices,
- procedures and policies and may make recommendations for improvement
- to the Vice President for University Operations. The ten member
- oversight team include the managers of these major e-mail systems:
- * University Operations server (Microsoft Mail)
- * P.E.T. server (Microsoft Mail)
- * Student Develop. Prgms. & Activities server (Microsoft Mail)
- * MSUS/PALS servers (Microsoft Mail)
- * College of Science, Eng. & Tech. server (Microsoft Mail)
- * Krypton server (Academic DEC with Unix Operating System)
- * AS/400 server (Academic IBM System)
- * MSMail 4,5,6,7,8, Computer Svcs., ACTS, Admin., MSU Academic, &
- Memorial Library servers (Microsoft Mail)
- * VAX1 server (MSU Academic VAX)
- * Data General server
-
-
- The team shall be convened at least twice annually and chaired by a
- member elected by and from among the panel members.
-
- Article V. Confidentiality and/or Privacy
-
- Users are advised that the privacy of data stored or sent on the
- system cannot be guaranteed; furthermore, there are a number of
- circumstances in which data stored on the system will be accessed by
- authorized individuals. Those circumstances include, but are not
- limited, to the following:
- * Performing administrative tasks, such as: identifying and pursuing
- breaches of security mechanisms; maintaining the integrity or
- operational state of the E-mail and related computer systems;
- collecting aggregate data; etc. The individual authorizing any
- search of a user's data must have reasonable grounds for
- suspecting that the search will reveal evidence that the user has
- violated a specific University, Higher Education Board policy,
- state or federal law, or has committed work related misconduct.
- The search of a user's data must be reasonably related in scope to
- the suspicion which generated this search.
- * Monitoring use of the E-mail and related computer systems to
- determine whether the polices of the University, Higher Education
- Board, and/or state or federal law have been broken.
- * Monitoring use of the E-mail and related computer systems when it
- is necessary so that the University can provide its services or
- protect the rights or property of the University.
-
- Meet and Confers Held
-
-
- Date Proposal Submitted/Reviewed
-
- IFO Faculty Association September 14, 1995 and October 12, 1995
- MSUAASF Meet and Confer September 18, 1995 and October 16, 1995
- Classified Employee Meet and Confer September 28, 1995
- Student Association Meet and Confer October 12, 1995
-
- Approved
-
-
- _____________________________________________ ___________________
- Mankato State University President Date
-
-
-
- Document signed by Richard R. Rush on 1/30/1996
-
- ------------------------------
-
- Date: Tue, 20 Aug 1996 09:18:16 -0700 (PDT)
- From: "Carl M. Kadie" <kadie@eff.org>
- Subject: File 2--Commends requested on Mankato "email" policy
-
- I've never seen such a contradictory academic policy.
-
- It says that "private" use is allowed, but that "personal" use is banned.
-
- It says that academic freedom principles prevail, but that political
- use is banned.
-
- It says that searches must be based on "reasonable grounds for
- suspecting that the search will reveal evidence that the user has
- violated a specific [policy]", but also allows general suspensionless
- "monitoring use of the E-mail [...] to determin whether the [polices]
- have been broken.
-
- [There must be a very interesting story about the creation of
- a policy that contracts itself in alternating paragraphs.]
-
- In any case, I believe the policy as it stands is illegal because:
- It is unconstitutionally vague (and contradictory). There is no
- way that a reasonable person could know if he or she was
- violating the policy.
- It applies employment rules to students. Students are not employees.
- (As the U. of Wisconsin and U. of Michican found out in federal
- court).
- It bans protected political speech. As the ACLU letter to Princeton
- pointed out, political speech not on behalf of the university
- can not be singled out censorship.
- It seems to authorize illegal searches.
-
- Why all this trouble? I'm sure the University already has general
- rules for speech via University resoures, media, forums. Don't
- make email a second-class citizen, treat the same as traditional
- forums.
-
- - Carl
-
- ANNOTATED REFERENCES
-
- (All these documents are available on-line. Access information follows.)
-
- =================<a href="ftp://ftp.eff.org/pub/CAF/law/political-speech">
- law/political-speech
- =================</a>
- * Expression -- Academic - Political Speech
-
- A letter from the ACLU to Princeton University explaining why a ban on
- on-line political speech is unnecessary and perhaps illegal.
-
- =================<a href="http://www.eff.org/CAF/faq/email.privacy.html">
- faq/email.privacy
- =================</a>
- * Email -- Privacy
-
- q: Can (should) my university monitor my email?
-
- a: Ethically (and perhaps legally) email communications should have
- ...
-
- =================<a href="http://www.eff.org/CAF/faq/email.policies.html">
- faq/email.policies
- =================</a>
- * Email -- Policies
-
- q: Do any universities treat email and computer files as private?
-
- a: Yes, many universities treat email and computer files as private.
- ...
-
- =================
- =================
-
- If you have gopher, you can browse the CAF archive with the command
- gopher gopher.eff.org
-
- These document(s) are also available by anonymous ftp (the preferred
- method) and by email. To get the file(s) via ftp, do an anonymous ftp
- to ftp.eff.org, and then:
-
- cd /pub/CAF/law
- get political-speech
- cd /pub/CAF/faq
- get email.privacy
- cd /pub/CAF/faq
- get email.policies
-
- To get the file(s) by email, send email to ftpmail@decwrl.dec.com
- Include the line(s):
-
- connect ftp.eff.org
- cd /pub/CAF/law
- get political-speech
- cd /pub/CAF/faq
- get email.privacy
- cd /pub/CAF/faq
- get email.policies
-
- ------------------------------
-
- Date: Mon, 19 Aug 1996 05:29:19 -0700 (PDT)
- From: Declan McCullagh <declan@eff.org>
- Subject: File 3--DOJ homepage hacked!!!
-
- ((MODERATORS' NOTE: To see what the DoJ page looked like during
- the "hack," point your browser to:
-
- lynx http://www.doobie.com/~baby-x/usdoj ))
-
- ---
-
- From--"L. G. Shirley" <lgshirley@mail.worldnet.att.net>
- Date--17 Aug 1996 22:47:59 GMT
-
- About 10PM last night I clicked on my bookmark for the Federal Gov't and
- then selected, by random, the Dept of Justice.
-
-
- http://justice2.usdoj.gov/
-
-
- SURPRISE!!!!!!!!!! Someone had made a few changes, For one it is
- now called the Department of Injustice. You are immediately
- greeted by the Nazi swastika all over your screen's background.
-
- A flag w/the symbol is apparent. George Washington's picture is
- captioned with his words, "Move my grave to a free country! This
- rolling is making me an insomniac".
-
- Janet Reno's portrait has been replaced by Hitler's. And a flag
- now bears the Nazi symbol. She is now called Attorney General
- Furher.
-
- There is plenty of nudity and the many links will take you to
- places you may never have been before. I don't think we're in
- Kansas anymore Toto!
-
- I have no clues how it was done or when. My guess is someone
- changed all the links to the DOJ page to another one, the one you
- see when you click on the DOJ's homepage.
-
- I worked today and when I came home and tried to get back to the
- DOJ's page, no luck. Must be a major overload <grin> of people
- trying to get to the link of women clad in, well, next to nothing
- and tied with rope!
-
- I don't think the author will make any brownie points w/women. He
- hacked the homepage they have w/the DOJ on violence against
- women. I'm not condoning such action and violence is a very
- serious issue but whoever did the hack was also very serious.
-
- He changed a Clinton speech on affirmative action and insulted
- blacks with his choice of words. There is a lot of rambling about
- the internet and the Gov't taking away our rights on it.
-
- The author has a interesting slant on things. This should be
- enough of a warning if you're easily offended by racism, hate,
- foul language, porn on the net, and general crudeness. Don't go
- there.
-
- I would like to know just how this was done, any ideas? Is it
- that easy to hack someones homepage?
-
- I wonder how long it'll be before this homepage link is removed
- and can they find who did the evil deed? Two months on the Net
- and just when I think I'd seen it all, wow.
-
- ------------------------------
-
- Date: Mon, 19 Aug 1996 04:49:58 -0700 (PDT)
- From: Declan McCullagh <declan@eff.org>
- Subject: File 4--Re: USDOJ Hacked
-
- ....<intro deleted -- cud>
-
- August 18, 1996
-
- Hacker Vandalizes Web Site
- Of U.S. Justice Department
-
- By JOHN O'NEIL
- The New York Times / National News
-
- WASHINGTON -- A computer hacker vandalized the Internet home
- page of the Department of Justice on Friday night, posting
- obscenities and anti-government graffiti, a department official
- said Saturday.
-
- The Justice Department's site on the World Wide Web was shut
- down early Saturday after members of the public called to
- report that the site had been altered, apprarently by a hacker
- or hackers who posted nazi insignia, nude photographs and an
- attack on the Communications Decency Act. A department
- spokesman, Joe Krovisky, said that the site would remain off
- line while the department's technical experts assess its
- security.
-
- Krovisky said that the system the hacker broke into was
- separate from the department's internal computer system, which
- contains highly sensitive information about criminal cases and
- investigations. "There's no way that the internal department
- information could have been affected" by a hacker who gained
- access to the information presented on the web site, he said.
- "That would have been impossible."
-
- The hacker replaced information on the home page with
- obscenities, graffiti and anti-government statements, he said,
- but declined to give details.
-
- The Associated Press reported that the site's title had been
- changed to "United States Department of Injustice," next to a
- red, black and white flag bearing a swastika. The text of the
- page was written over a background of gray swastikas, and at
- the top declared in red letters: "This page is in violation of
- the Communications Decency Act."
-
- The page included color pictures of George Washington, Adolf
- Hitler, who is identified as the attorney general, and a
- topless Jennifer Aniston, one of the stars of NBC's "Friends,"
- the Associated Press said. Other sexually explicit images were
- also shown.
-
- [...]
-
- ------------------------------
-
- Date: Sun, 18 Aug 1996 23:25:50 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 5--Microsoft Acknowledges Flaw in Internet Browser
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Sun, 18 Aug 1996 13:00:21 -0500
- From--Frosty <sotmesc@datasync.com>
-
- The Sun Herald
- 18 August 1996
-
- MICROSOFT ACKNOWLEDGES FLAW IN INTERNET BROWSER
-
- Redmond, Wash. - Microsoft Corp.'s Internet Explorer 3.0, its
- much-promoted new software for browsing the Internet, has a flaw
- that affects its performance on some World Wide Web sites, a company
- executive says.
-
- The new version of the browser launched Monday to compete with
- Netscape Communications Corp.'s Navigator, had been downloaded for
- free by more than 100,000 people by Friday, said Bill Koszewski, a
- Microsoft product manager.
-
- The flaw is a bug in the software that will slow users trying
- to access certain Web sites that require their name and a password,
- he said.
-
- -Commentary: Isn't this the same standard of slipshod performance
- that the world expects form Microsoft ?!?!
-
- ------------------------------
-
- Date: Mon, 19 Aug 1996 14:47:59 +0000
- From: e.tan@UCL.AC.UK(Emerson Tan)
- Subject: File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
-
- Re: CuD 8.60 File 6--UK ISPs Restrict cyberporn
-
- >
- >U.K. INTERNET PROVIDERS PLAN TO RESTRICT CYBERPORN
- >
-
- This issue seems to have finally pointed out to the public in the UK just
- how difficult it is to stamp out internet pronography. It has also pointed
- out a major deficency in the legal systems of the nations that are on the
- net, namely that of cross border legisaltion. Without some kind of cross
- border legislation it is impossible to control this kind of crime. It is up
- to the governements and judical systems of the nation where these criminals
- reside to adequately prosecute those that distribute illiegal porn. The
- problem is that currently those in authority still veiw this a technical
- problem for which there is an easy cheap technical fix.
-
- Indeed there is a technical fix, but it runs counter to the entire idea of
- the net and can be used for all manner of control purposes. This is to put
- the entire nation behind a firewall as in the case of singapore. But still
- the possiblity exists that illegal comunications links could spring up
- using such things as satalites and dial up modems both legitimate
- comunications technologies which are hard to regulate, without being
- precieved as being excessive.
-
- In short there is no other solution but to prosecute purveors of offensive
- materials 'in real life' and the burden for this task falls on the
- judicaries of the world. It also calls for unprecedented co-operation of
- law enforcement agencies of the world, rather than increased pressure on
- the internet service providers which will only serve to put in plave
- legislation which could ultimately snuff out the cosmopolitain nature of
- the net, replacing it with a bland set of corporate offerings.
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.61
- ************************************
-
-
-