home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 41.8 KB | 1,022 lines |
-
- Computer underground Digest Sun Feb 2, 1997 Volume 9 : Issue 06
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.06 (Sun, Feb 2, 1997)
- File 1--USR's little booboo (fwd)
- File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
- File 3--InfoWarCon6 - Brussels, Belgium (fwd)
- File 4--Call for papers: 6CYBERCONF
- File 5--DC-ISOC Tidbits
- File 6--"DNS and BIND," and "Mastering Regular Expressions"
- File 7--"The Basics of Computer Security" by Bellcore
- File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 7 Jan 1997 00:15:18 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 1--USR's little booboo (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Mon, 6 Jan 1997 18:55:35 -0600 (CST)
- From--Brett L. Hawn <blh@nol.net>
-
- 56-kbps modem? Not quite
- By Jim Davis
- January 2, 1997, 5:30 p.m. PT
-
- U.S. Robotics (USRX), which has been leading the push for 56-kbps
- modem technology, has conducted preliminary tests showing that
- most consumers will be able to connect at higher speeds than with
- current modems--but not at the full 56 kbps.
-
- The company said the maximum downstream transmission speed will
- be limited to 53 kbps, not the 56 kbps originally promised.
- Federal Communications Commission regulations "limit the signal
- level" that digitally connected server equipment can transmit,
- the firm said.
-
- U.S. Robotics' x2 technology overcomes the speed limits of
- current 28.8-kbps modems based on the ISP having a direct
- connection to telephone companies' digital switches.
-
- The company said today that tests showed that "the vast majority"
- of users would be able to use x2 technology, while its modems
- would automatically default to lower speeds if such connections
- weren't possible. The test results were based on over 20,000
- calls in seven Bell operating company regions, the firm said.
-
- U.S. Robotics says it is in beta testing of its products and
- expects to start shipping initial consumer products later this
- month.
-
- ------------------------------
-
- Date: Mon, 13 Jan 1997 09:29:28 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Fri, 10 Jan 1997 19:01:26 -0500
- From--"David M. Balenson" <balenson@tis.com>
-
- PLEASE NOTE THE EARLY REGISTRATION AND HOTEL ROOM AVAILABILITY AND SPECIAL
- RATES DEADLINES ARE APPROACHING!! RESERVATIONS AT THE PRINCESS RESORT
- MUST BE MADE NO LATER THAN JAN 13TH FOR THE GOVERNMENT RATE, AND NO LATER
- THAN JAN 20TH FOR THE REDUCED GROUP RATE. EARLY REGISTRATION FOR THE
- SYMPOSIUM MUST BE POSTMARKED NO LATER THAN JAN 22ND.
-
- --------------------------------------------------------
-
- THE INTERNET SOCIETY 1997 SYMPOSIUM ON
- NETWORK AND DISTRIBUTED SYSTEM SECURITY
- (NDSS '97)
-
- 10-11 FEBRUARY 1997
-
- SAN DIEGO PRINCESS RESORT, SAN DIEGO, CALIFORNIA
-
-
- This fourth annual symposium will bring together researchers,
- implementors, and users of network and distributed system security
- technologies to discuss today's important security issues and
- challenges. It will provide a mix of technical papers and panel
- presentations that describe promising new approaches to security
- problems that are practical, and to the extent possible, have
- been implemented. We hope to foster the exchange of technical
- information and encourage the Internet community to deploy
- available security technologies and develop new solutions to
- unsolved problems.
-
- WHY YOU SHOULD ATTEND
-
- The use of the Internet is rapidly growing and expanding into
- all aspects of our society. Commercial organizations are coming
- under increasing pressure to make their services available on-line.
- This in turn is increasing the need for rapid and widespread
- deployment of usable and effective network and distributed system
- security technologies. High visibility attacks on the Internet
- underscore the vulnerabilities of the Internet and the need to
- solve its security problems. There is growing concern for securing
- the network infrastructure itself. Recent trends in software
- distribution (such as Java and ActiveX technologies) have made
- certain attacks easier to carry out. Privacy has become an
- important issue for the Internet.
-
- NDSS '97 will bring together researchers, implementors, and users
- of network and distributed system technologies to discuss today's
- important security issues and challenges. We have selected the
- technical papers and panel presentations that describe promising
- new approaches to security problems that are practical, and to
- the extent possible, have been implemented. Topics to be addressed
- include Internet infrastructure and routing security, security
- for the World Wide Web, Java and ActiveX security, cryptographic
- protocols, public key management, and protection of privacy.
-
- The symposium will have a positive impact on the state of Internet
- security. You will have the opportunity to actively participate
- in the dialog. Ask questions of the speakers, raise your important
- issues during the panel sessions, and let other participants know
- of your requirements, observations, and experience in this
- important area. We hope to encourage the wide-scale deployment
- of security technologies and to promote new research that can
- address the currently unmet security needs of the Internet
- community.
-
- <snip>
-
- Additional information about the symposium and San Diego, plus
- on-line registration, are available via the Web at:
-
- http://www.isoc.org/conferences/ndss97
-
- SPONSORSHIP OPPORTUNITIES AVAILABLE!
-
- Contact Torryn Brazell at the Internet Society at +1-703-648-9888
- or send E-mail to Ndss97reg@isoc.org.
-
- ------------------------------
-
- Date: Mon, 13 Jan 1997 08:47:48 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 3--InfoWarCon6 - Brussels, Belgium (fwd)
-
- ---------- Forwarded message ----------
- Date--Sun, 12 Jan 1997 23:11:16 -0500
- From--"Betty G. O'Hearn" <betty@infowar.com>
-
-
- D I S T R I B U T E W I D E L Y
-
- CONFERENCE ANNOUNCEMENT
-
- InfoWarCon 6:
- "War By Other Means"
- Economic Espionage, CyberTerrorism and Information Assurance
- Brussels, Belgium
-
- May 8 - 9, 1997
- Pre-Conference Tutorials: May 7, 1996
-
- Sponsored by:
- National Computer Security Association / www.ncsa.com
- Winn Schwartau, Interpact, Inc. / www.infowar.com
- Open Source Solutions, Inc, / www.oss.net
-
- Honorary Chairperson:
- Judge Danielle Cailloux
- Investigating Magistrate,
- Member of the Committee to Control the Intelligence Services, Belgium
-
- Information Warfare is no longer just for the military or
- government. InfoWar is a legitimate concern for the private
- sector and law enforcement - everywhere. Hundreds of
- representatives from over thirty countries will interact at
- InfoWarCon 6 with world-class presenters in an open-source,
- unclassified forum to provide workable, real-world solutions to
- the commercial, legal and technical problems we face.
-
- Over two days, the three tracks and plenary sessions will focus
- on:
-
- 1. Military, Intelligence, Nation-States and Government
- Contractors. What are their special needs and concerns. Leaders
- from all areas will bring you current with their approaches.
-
- 2. Cyberterrorism and Crime: Law Enforcement, Domestic, National
- and International. Case histories and experience from those who
- know will provide the foundation for solutions and cooperation
- to a spreading problem.
-
- 3. The Private Sector and Commercial Infrastructure: Leading
- experts on information assurance will provide new models for
- security, management and infrastructure protection.
-
-
- Optional Pre-Conference Tutorials (May 7)
-
- >
-
- Three Pre-Conference tutorials will be offered to get the non-technical manager,
- law enforcement or government representative 'up to speed' on InfoWar:
-
- >
- >A. Open Source Intelligence. Robert Steele, ex-CIA case officer and
-
- intelligence professional, will teach you how and why the smart nation and
- competitive private company needs to use information gathering to his best
- advantage.
- A full day of extraordinary information and materials.
-
- >
-
- B. Information Security Basics. Dr. Mich Kabay, NCSA's Dir. of Education will
- take the non-technical manager on a three and one half hour tour of the
- fundamentals of
- information security. Essential knowledge for anyone involved with information
- warfare, cyberterrorism or defending against them.
-
- C. The Basics of Information Warfare and Cyberterrorism.Winn Schwartau, the man
- who wrote the books on Cyber-terrorism and Information Warfare, will teach the
-
- >non-technical participant the ins and outs in a fascinating 3 1/2 hour session.
-
-
- >For Registration Information
- > Kim Imler
- > Voice: (717) 241-3226
- > Fax: (717) 243-8642
- > Email: kimler@ncsa.com
- > WWW: www.Infowar.com
- > www.ncsa.com
- >
- >Sponsorship Opportunities - Multiple level sponsorship
- >opportunities and exhibit space is available. Contact:
- > Harry Brittain
- > Voice: (717) 241-3258
- > Fax: (717) 243-8642
- > Email: hbrittain@ncsa.com
- >
- >MARK YOUR CALENDARS:
- >
- >InfoWarCon 7,
- >Sept. 11-12, 1997
- >Washington D.C.
- >Submit Abstracts and Papers to:
- >Betty@infowar.com
-
- DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT
- in the subject line.
-
- Subscribe infowar TO JOIN GROUP
- Unsubscribe infowar TO LEAVE GROUP
- Help infowar TO RECEIVE HELP
- TO POST A MESSAGE: E-Mail to infowar@infowar.com
- _____________________________________________________
- Infowar.Com
- Interpact, Inc.
- Winn Schwartau
- winn@infowar.com
- http://www.infowar.com
- 813-393-6600 Voice
- 813-393-6361 FAX
-
- Sponsor Opportunities/Comments/Help
-
- Betty G. O'Hearn
- Assistant to Winn Schwartau
- http://www.infowar.com
- betty@infowar.com
- 813-367-7277 Voice
- 813-363-7277 FAX
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Betty G. O'Hearn Assistant to Winn Schwartau
- http://www.infowar.com
- betty@infowar.com
- 813-367-7277 Voice 813-363-7277 Data/FAX
-
- "Success is to be measured not so much by the position that one has reached in
- life as by the obstacles which he has overcome while trying to succeed.
- ~~~Booker T. Washington~~~
-
- ------------------------------
-
- Date: Thu, 30 Jan 1997 18:05:13 -0600
- From: " Monique J. Lemaitre" <tc0mjl1@corn.cso.niu.edu
- Subject: File 4--Call for papers: 6CYBERCONF
-
- Call for Papers:
- 6CYBERCONF
- Sixth International Conference on Cyberspace
- June 5th to 8th, 1997. University of Oslo
-
- Website: http://televr.fou.telenor.no/cyberconf
-
- We already live part-time in cyberspace, and that time is increasing as
- fast as the quality of the experience is radically changing. The Sixth
- International Conference on Cyberspace addresses the social, political and
- cultural implications of cyberspace from a critical as well as
- practical standpoint. In the nets, there is a growing society that ranges
- from researchers to Silicon Valley sophisticates to neocyberpunks.
- 6CYBERCONF offers the opportunity for exchange within and between these
- confluent and diverse interests and encourages discussion between
- theoreticians and practitioners. Hosted for the second time in Europe, this
- sixth edition of CYBERCONF considers: cyborgs looking for a home, the
- future body, interface/interaction breakthroughs, and the importance of
- collaboration in virtual environments.
-
- CONFERENCE FORMAT
-
- The official opening of 6CYBERCONF is scheduled for Thursday afternoon,
- June 5th. The conference will take place over three and a half days. There
- will be 6 keynote speakers, 15 plenary sessions, electronic art
- installations, special events, a pre- conference workshop on immersive
- environment design, and a banquet dinner on Saturday June 7th. All
- sessions are designed to foster discussion. Presentations will be in
- English. The themes are:
-
- CYBERSPACE METAPHOR?
- The cyberspace metaphor is a means of effecting instantaneous fusion of two
- separate realms of experience (man/machine, good/bad, self/world) into one
- illuminating, iconic, encapsulating image. Is the metaphor still a way to
- proceed from the known to the unknown in cyberspace? Is the metaphor a
- critical synthesis of complex communications technologies, bio-sociality or
- techno-sociality? Is cyberspace a new metanarrative of progress, or a story
- of paradise lost? Which language for the virtual age?
-
- VIRTUAL SUBJECTS ON THE ROAD
- A cyborg is a double articulation in which we find both the end of the
- subject and a new dispersed and refracted subjectivity constructed in
- cyberspace. The fabric of cyberspace dresses us in the cloth of
- possibilities -the virtual subject as a switchboard of souls? Can we
- really construct and reconstruct any identities and personalities? Will
- not the "real" subject implode in its multiplicity? Or is it a question of
- mastering ones avatar puppets on a global playground? Do we need
- psychiatrists for avatars? Logged off, where does the will of the
- cyberpersonality go?
-
- HACKING THE FUTURE BODY
- McLuhan argued that electronic media reintegrated the senses. How are
- bodies represented through information technology? How can cyberspace give
- priority to the lower senses? How is desire constructed through virtual
- worlds? Are there darker domains of e-motional interference beyond the
- emoticons? Is there a "violence of connectivity"? What about cybersex? Are
- we masturbating our way into the year 2000? Will sexuality become a post-
- biological phenomenon? Is the future body a recombinant structure of flesh
- or schizoid realities?
-
- ZONES / INTER-ACTION
- i) INTER-FACE is the sensitive boundary zone of negotiation between human
- and machine, allowing seamless crossings between the worlds: Facilitating
- the disappearance of the difference between them - emerging new set of
- human/machine relations - interweaving calculation, simulation and
- post-modern culture. How can we design for tacit knowledge and bricolage?
- How can we account for differing incentive structures between designers and
- users? Which concealed design codes promote or dissemble functionality?
- How to extend the interface into social/material space, transforming it
- into an environmental power? Away from the daily prayer at the desktop,
- when technology becomes transparent and disappears, where will it take us?
- ii) The rapid development of Internet and WWW have limited the definition
- of INTER-ACTION as the click of the mouse. How can interaction become a
- mutual and simultaneous activity on the part of the participants
- (man-machine-man interaction) in art and education? If the computer adds
- an interference to communication, how can it be used creatively? What is
- interaction beyond the Web?
-
- LABORATORIES FOR COLLABORATION
- Many of us are today involved in group interaction through
- telecommunication networks. In the future the 2D interface of the web will
- shift to 3D interactive interfaces. How will this affect the way we
- perceive our collaborators and our usage of information? Will it be a
- preferred medium to social interaction - opening up new possibilities
- within a group, organisation or community?
-
- INCLUSION - EXCLUSION
- What about the politics of networks? Which impact will commerce have on the
- the internet community? How will the powerstructures of the internet
- affect the behaviour of netizens? What about the diversity of cyberspace
- cultures? What is "freedom of speech" in a global context?
-
- CALL FOR PAPER ABSTRACTS
-
- To submit an abstract for the potential inclusion of your paper in the
- 6CYBERCONF programme, please follow these format guidelines:
-
- =B7 Title of the paper
- =B7 Author(s)
- =B7 Institutional affiliation (if any)
- =B7 Chosen 6CYBERCONF theme (from the list above)
- =B7 Abstract, 500 words maximum
- =B7 Brief biography, 100 words maximum
- =B7 Audio-visual equipment requirements
- =B7 Contact information (email preferred)
-
- There are two ways to submit abstracts:=20
- 1) Email with the subject topic to abstracts@televr.fou.telenor.no or=20
- 2) mail both a printed copy and a PC or MAC diskette to: 6CYBERCONF/ Morten
- Soby, University of Oslo, P.O. Box 1092, Blindern, 0317 Oslo, Norway.
-
- The selection will be done by an international and a local committee made
- up of academics, theorists, artists and technicians in the field.
-
- Submission of an abstract indicates the submitter's intention and
- capability to write and present the corresponding, full length paper, if
- chosen.=20
-
- Papers will be allotted a half hour for presentation in English.
-
- Please be advised that the selection committees will not consider abstracts
- that are not formatted as stated above nor papers that have been previously
- published.
-
- All abstracts and papers will be published in the proceedings (paper and
- Web-edition).
-
- DEADLINES
-
- Deadline for reception of abstracts: March 15, 1996
- Notification of selection for presentation: April 15, 1996
- Deadline for registration: May 1, 1996
-
- FINANCIAL ASSISTANCE
-
- The registration fee will be waived for those presenting a paper in
- 6CYBERCONF. In addition, a limited number of grants are available to those
- presenters who demonstrate financial need. These grants may cover the costs
- of travel and accommodation.
-
- FEES & REGISTRATION
-
- The registration fee for attending 6CYBERCONF is US$ 250 (US$ 50 for
- students). For detailed information on how to register and information on
- travel and accommodation, check our Website or
- mailto:info@televr.fou.telenor.no
-
- LOCATION
-
- 6CYBERCONF will take place in an auditorium of the Helga Engs Building,
- University of Oslo.
-
- CONFIRMED KEYNOTE SPEAKERS
-
- Arthur Kroker (Canada)
- Marilouise Kroker (Canada)
- Pierre Levy (France)
- Allucquere Rosanne Stone (USA)
- Florian Roetzer (Germany)
-
- SPECIAL EVENTS
-
- =B7 Immersive Environment Workshop: The pre-conference workshop will give a
- limited number of participants a unique opportunity to get hands on
- experience on how to design and develop and use a variety of immersive
- systems. Both technical and social science related topics will be covered.
- The workshop will be tutored by scientist researchers from Telenor R&D.
-
- =B7 e~on exhibition - will focus on electronic art made in Norway, but will
- include international participation as far the budget allows
-
- =B7 Public panel debate (with key note speakers and special guest)
-
- =B7 "Cyberdesign -97" presentation: the award winner of Telenor Research VR
- design competition.
-
- The list of keynote speakers and special events is preliminary; more to be
- added. Please visit our Website for more information and updates on
- 6CYBERCONF.
-
- ORGANIZERS
-
- Cyberconf Director: Allucquere Rosanne Stone,
- Professor and Director of the Interactive, Multimedia Laboratory at the
- University of Texas at Austin
- http://www.actlab.utexas.edu/~sandy
-
- Conference Coordinator: Morten S=F8by,
- Research Fellow, Institute for Educational Research, University of Oslo
- Email: m.k.soby@ped.uio.no
- http://www.uio.no/~mortenso/
- Phone: + 47 22855383 Fax: + 47 22854250
-
- Conference Coordinator: Ola =D8deg=E5rd,
- Researcher, Manager of The Televirtuality Research Group at Telenor
- Research and Development.
- Phone: + 47 63848885 Fax: + 47 63810076
- Email: ola.odegard@kjeller.fou.telenor.no
- http://televr.fou.telenor.no/~olao/olao.html
-
- Coordinator Interactive Installations: Stale Stenslie,
- Artist and Reseacher, Telenor R&D, Cologne/Oslo.
- Phone: + 47 90562963 Fax: +47 63810076
- Email: stahl@rosa.nta.no
- http://televr.fou.telenor.no/~stahl/stahl.html
-
- FOR FURTHER INFORMATION
-
- Send e-mail to: info@televr.fou.telenor.no
-
- See the Web site for continuous updates:
- http://televr.fou.telenor.no/cyberconf - or contact directly
-
- Registration, Hotel booking, Flights:
- Project secretary 6Cyberconf: May Krosby
- Phone: + 47 638 48 341 =20
- Fax. + 47 63 81 98 10
- Email: may.krosby@kjeller.fou.telenor.no
- http://televr.fou.telenor.no/cyberconf/
-
- Abstracts, Papers, Information:
- Conference Editor: Vibeke Kl=F8vstad
- Phone: + 47 22426980 / 22426892#126
- Email: vibeke.klovstad@kulturkanalen.no
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Research Fellow Morten Soby
- Institute for Educational Research, P. O. Box 1092, Blindern, N-0317 Oslo
- Phone: +47 22855383 Fax: + 47 22854250 Home: + 47 22952775 GSM: 926332=
- 18
- Homepage: http://www.uio.no/~mortenso/
- Coordinator 6CYBERCONF: http://televr.fou.telenor.no/cyberconf/
-
- ------------------------------
-
- Date: Tue, 28 Jan 1997 09:19:26 -0400
- From: Russ@NAVIGATORS.COM(Russ Haynal)
- Subject: File 5--DC-ISOC Tidbits
-
- Hello DC-ISOC,
-
- I hope your New Year is off to a good start.
-
- This message contains a couple of requests and a half-day conference
- announcement that should be of interest to many of you...
-
- Russ Haynal
-
- =========================================================================
- Want to go to CommNET ???
-
- CommNET Is a large industry conference and trade show being held NEXT WEEK
- in the Washington Convention Center. If you have never been able to make
- it to CommNET, I am happy to provide you with just the excuse/opportunity
- you need to attend this great show.
-
- The Internet Society (ISOC) has been given a booth for the show. ISOC will
- provide someone at all times to manage the booth. However, the Internet
- Society is seeking additional volunteers to help staff the booth. A Key
- responsibility would be to accept new member registrations. A Secondary
- responsibility would be to answer questions and hand-out literature.
- "Working the booth" is a great way to meet many people and share your
- knowledge about the Internet/ISOC.
-
- The Convention floor hours are 10-6 on February 4-6. Volunteers would only
- have to work one (or more) 2-4 hour shifts.
-
- Volunteers should be ISOC members, or people who will sign up as
- members. (It doesn't make a lot of sense to have someone in the booth
- talking up ISOC and not spending $35 to be a member.)
-
- Anyone interested in volunteering or finding our more details should
- contact Mary Burger at the Internet Society Headquarters (703-648-9888). A
- CommNET Booth is a great opportunity for ISOC, please help to make this a
- success.
-
- ================================================================================
- DC-ISOC Meeting Locations...
-
- As always, the DC-ISOC would like to hear any leads you may have on (free)
- meeting places in the DC metro region, large enough to hold 200 people.
- We were able to hold our last meeting at the Marriot Hotel, thanks to the
- costs being absorbed by Network Solutions ( http://www.netsol.com ). If
- your organization is interested in covering the costs of a DC-ISOC meeting,
- please contact Russ Haynal (russ@navigators.com or 703-729-1757) Sponsors
- do receive visibility/recognition to the DC-ISOC Membership (Mailing list
- includes over 1500 Internet industry participants located mostly in the DC
- Metro area)
-
-
- ========================================================
- Conference Announcement....
-
-
- Digital Dilemmas: Defining Ethics in the Internet Age
-
- The Internet revolution has sparked a fierce debate among the business,
- academic, computer, and public policy communities. Today, we are grappling
- with complex ethical questions such as
- * Must society ensure that all people have equal access to the Internet?
- * Can we bridge the gap between network haves and have-nots?
- * Can the Internet remain a haven for free expression, discreet
- information consumption, and private transactions?
- * Can we strike a balance between individual interests and
- commercialism on the Internet?
-
- These new-age questions defy easy answers. They demand new-age solutions.
- Take part in the debate. Attend Marymount University's conference,
- Digital Dilemmas: Defining Ethics in the Internet Age.
-
-
- Ethics, Access, and the Internet
-
- This conference is for high-tech companies, consumer advocates, cybernauts,
- academicians, and policy makers who are surveying the landscape of ethical
- considerations in the Internet Age. Along with the changing structure of
- communications within our society, we are faced with ethical dilemmas of
- * Equal access
- * Free speech
- * Intellectual property
- * Privacy
- * Regulation
- * Electronic commerce
- Marymount has assembled an impressive cadre of speakers and panelists who
- are at the forefront of ethical debate in the Internet Age.
- Join us for this half-day conference as we explore the controversial issues
- of ethics, access, and the Internet.
-
-
- Panel One:
-
- Moving Beyond the Wire: Who Gains? Who's Left Behind?
-
- Whose Internet is it, anyway? Popular opinion holds that the Internet is
- the great equalizer. No one knows whether you're rich or poor, urban or
- rural, young or old. No one knows your gender, race, or education.
- The push is on to wire up our schools, homes, and businesses. But what
- happens to those who aren't willing or able to get connected? Will they be
- left out of future political and social debates? Will they miss out on
- economic opportunities? Is the Internet setting up exclusion criteria,
- information elites, electronic inequities? What is the impact of the
- Internet on our society and our economy? What's the role of government and
- the private sector in ensuring equal access?
-
- Panel Two:
-
- Uncharted Waters: Privacy, Intellectual Property, and the First Amendment
-
- With the unexpected and explosive growth of the Internet, governments,
- regulating agencies, and individuals in a position of public trust or
- public office have begun to recognize the power of this new communications
- medium. In the interest of "protecting" their constituencies, many powerful
- interests are getting involved. Recently, the issues of privacy,
- intellectual property, and First Amendment rights have come under intense
- scrutiny, but precious few legal decisions have charted our course.
- Are we adrift in a sea of unresolved legal and ethical quandaries? Is the
- Internet headed for the rocks? Will proposed "solutions" render the
- Internet powerless? Will free marketers and brash commercialism sail over
- the free sharing of information? Should technology influence culture or
- vice versa?
-
-
- Conference Planning Committee:
-
- Chair: Jack McDonnell, President and CEO, Transaction Network Services, Inc.
- Dan Bannister, President and CEO, DynCorp
- Mario Morino, Chairman, Morino Institute
- Stephen Allis, Director, Government Affairs, KPMG Peat Marwick, LLP
- Robert Sigethy, Dean, School of Business Administration, Marymount
- University
- Paul Byers, Director, Center for Ethical Concerns, Marymount University
-
-
- Agenda at a Glance
-
- 8:30 - 9:00 Registration
- 9:00 - 9:05 Welcome to Marymount
- 9:05 - 9:30 Keynote Speaker - Tom Bliley, Chairman, House Commerce
- Committee
- 9:30 - 10:30 Beyond the Wire: Who Gains? Who's Left Behind?
- Moderator: Brit Hume (Fox News, Chief Washington
- Correspondent and Managing Editor)
- Speakers:John Sidgmore, CEO, UUNet, Technologies, Inc.
- Bill Melton, President and CEO,
- CyberCash, Inc.
- Larry Irving, Assistant Secretary for
- Communications and Information, Department
- of Commerce (invited)
- 10:30 - 10:45 Coffee Break
- 10:45 - 11:45 Uncharted Waters: Privacy, Intellectual Property, and
- the First Amendment
- Moderator:Paul Byers (Director, Center for Ethical
- Concerns, Marymount University)
- Speakers:Don Heath, President, Internet Society
- Guest, Freedom Forum
- Harry Litman, Deputy Assistant Attorney General,
- Department of Justice
- 12:00 - 1:00 Luncheon
- Speaker:Tom Kalil, Senior Director to the National
- Economic Council
-
- Note: Schedules are subject to change. For the latest information, visit
- our Web site at http://www.marymount.edu
-
-
- Roads to Marymount University
-
- From north of Washington, D.C.:
- Take Interstate Rt. 95-South to 495-West to Exit 14 (George Washington
- Parkway-South) to Rt. 123-North (Chain Bridge Road). Follow to traffic
- light at end of road. Turn right onto Glebe Road (Rt. 120-South) and follow
- for 2.5 miles. Marymount is on the left.
- From south of Washington, D.C.:
- Take Interstate Rt. 95-North, which becomes 395 inside the Beltway. Exit
- Glebe Road (Rt. 120-North), marked "Marymount University." Continue on
- Glebe Road 6 miles. Marymount is on the right.
- From Rt. 66 (either direction):
- Exit Glebe Road (Rt. 120-North). Drive 1 mile. Marymount is on the right.
- If you or any of your guests require special consideration because of
- physical disabilities, please notify the Office of Campus Safety at (703)
- 284-1601 at least 48 hours prior to your visit.
-
-
- Sponsored by Marymount University's School of Business Administration and
- Center for Ethical Concerns
-
- Marymount University - Located in Arlington, Virginia, Marymount is an
- independent, comprehensive, Catholic university offering programs to more
- than 4,000 men and women at the undergraduate and graduate levels.
- Marymount strives to foster the intellectual, moral, spiritual, social,
- cultural, and physical development of each student through an education
- that combines the liberal arts tradition with career preparation.
-
- Center for Ethical Concerns - One of the hallmarks of Marymount University
- is its commitment to providing a values-based education. The Center for
- Ethical Concerns was founded in 1993 to provide a forum for the exchange of
- ideas about ethical issues and problems. Through lectures, seminars,
- workshops, and symposia, the Center offers students, faculty, and the
- public opportunities to examine ethical concerns facing society.
-
- Design by: Franek Design Associates, Inc.
- Printing by: Print Pro, Inc.
- Marketing by: Marketek
-
-
- Register Today
-
- Digital Dilemmas: Defining Ethics in the Internet Age
-
- March 12, 1997, 8:30 a.m. to 1:00 p.m.
- Marymount University, Arlington, Virginia
- To register, complete this coupon (please print or type) and fax it to
- Marymount University at (703) 284-1544. Or register via the World Wide Web
- at http://www.marymount.edu after January 31.
-
- o Yes, sign me up for the conference
- NAME
- TITLE
- ORGANIZATION
- ADDRESS
- CITY STATE ZIP
- PHONE
- FAX E-MAIL
- Please indicate payment method:
- Charge my: o Visa o MasterCard
- Card # Exp. date __________
- Signature __________________________________________________
-
- o Check enclosed
-
- Make checks payable to Marymount University.
- Send this form to: Marymount University
- c/o Barbara Favola
- Office of the President
- 2807 North Glebe Road
- Arlington, VA 22207-4299
-
- Registration fees: o $100 o $45 - students (must show ID)
- Register early; seating is limited. All registrations must be received by
- March 5. No refunds provided for cancellations after March 1. However, your
- registration may be transferred to another individual if you cannot attend.
-
- ------------------------------
-
- Date: Wed, 8 Jan 1997 15:38:35 -0800
- From: Sara Winge <sara@ora.com>
- Subject: File 6--"DNS and BIND," and "Mastering Regular Expressions"
-
- FOR IMMEDIATE RELEASE
- January 8, 1997
-
- PRESS ONLY--FOR REVIEW COPIES, CONTACT:
- Sara Winge
- 707/829-0515
- sara@ora.com
-
- NEW EDITION OF O'REILLY'S CLASSIC NUTSHELL HANDBOOK "DNA AND BIND"
-
- SEBASTOPOL, CA-O'Reilly & Associates announces the publication of the
- second edition of "DNS and BIND," a complete guide to the Internet's
- Domain Name System (DNS) and the Berkeley Internet Name Domain (BIND)
- software, the UNIX implementation of DNS. The new edition also covers
- using DNS and BIND with Windows NT. It's a complete update of this
- classic Nutshell Handbook, which has served as *the* source of
- information on DNS and BIND for system administrators who manage domain
- or name servers.
-
- DNS is the system that translates hostnames (like "rock.ora.com") into
- Internet addresses (like 192.54.67.23). Until BIND was developed, name
- translation was based on a "host table"; if you were on the Internet,
- you got a table that listed all the systems connected to the Net and
- their addresses. As the Internet grew from hundreds to hundreds of
- thousands of systems, host tables became unworkable. DNS is a
- distributed database that solves the same problem effectively, allowing
- the Net to grow without constraints. Rather than having a central
- table that gets distributed to every system on the Net, it allows local
- administrators to assign their own hostnames and addresses and install
- these names in a local database. This database is automatically
- distributed to other systems as names are needed.
-
- In this new edition of "DNS and BIND," the authors describe Bind
- version 4.8.3, which is included in most vendor implementations today.
- In addition, readers will find complete coverage of Bind 4.9.4, which
- in all probability will be adopted as the new standard in the near
- future.
-
- In addition to covering the basic motivation behind DNS and how to set
- up the BIND software, this book covers many more advanced topics,
- including how to become a "parent" (i.e., "delegate" the ability to
- assign names to someone else); how to use DNS to set up mail forwarding
- correctly; debugging and troubleshooting; and programming.
-
- # # #
-
- DNS and BIND, 2nd Edition
- By Paul Albitz & Cricket Liu
- 2nd Edition December 1996
- 438 pages, ISBN: 1-56592-236-0, $32.95 US
-
- =========================================================================
-
- FOR IMMEDIATE RELEASE
- January 10, 1997
-
- PRESS ONLY--FOR REVIEW COPIES, CONTACT:
- Sara Winge
- 707/829-0515
- sara@ora.com
-
- O'REILLY RELEASES "MASTERING REGULAR EXPRESSIONS"
-
- SEBASTOPOL, CA--Programmers who delve into O'Reilly and Associates'
- new book "Mastering Regular Expressions" can save themselves time and
- aggravation while dealing with documents, mail messages, log files--any
- type of text or data--by tapping the power of regular expressions. For
- example, regular expressions can play a vital role in constructing a
- World Wide Web CGI script, which can involve text and data of all
- sorts. Those who don't use regular expressions yet will discover a
- whole new world of mastery over their data in "Mastering Regular
- Expressions." Experienced users will appreciate the book's
- unprecedented detail and breadth of coverage.
-
- Regular expressions are not a tool in and of themselves, but are
- included as part of a larger utility. The classic example is grep.
- These days, regular expressions can be found everywhere, such as in:
- - scripting languages (including Perl, Tcl, awk, and Python)
- - editors (including Emacs, vi, and Nisus Writer)
- - programming environments (including Delphi and Visual C++)
- - specialized tools (including lex, Expect, and sed)
-
- While many of these tools originated on UNIX, they are now available
- for a wide variety of platforms, including DOS/Windows and MacOS.
- Additionally, many favorite programming languages (even Java) offer
- regular-expression libraries, so programmers can include support for
- them in their own programs.
-
- For years, author Jeffrey Friedl has helped people on the Net
- understand and use regular expressions. In "Mastering Regular
- Expressions" he goes beyond mechanics and initiates readers to the art
- of using regular expressions. Friedl shares the subtle but valuable
- ways to think when using regular expressions as he leads readers
- through the process of crafting a regular expression to get the job
- done.
-
- Regular expressions are not used in a vacuum. In this book, a variety
- of tools are examined and used in an extensive array of examples. Perl,
- in particular, is very well represented throughout the book, with a
- major chapter dedicated entirely to it alone. Perl is extremely
- well-endowed with rich and expressive regular expressions. Yet what is
- power in the hands of an expert can be fraught with peril for the
- unwary--"Mastering Regular Expressions" shows readers how to navigate
- the minefield and become true masters of the art of regular
- expressions.
-
- # # #
-
- Mastering Regular Expressions: Powerful Techniques for Perl and
- Other Tools
- By Jeffrey E. F. Friedl
- 1st Edition January 1997
- 368 pages, ISBN: 1-56592-257-3, $29.95 US
-
- ------------------------------
-
- Date: Tue, 28 Jan 1997 12:08:42 EST
- From: "Rob Slade, doting grandpa of Ryan & Trevor"
- Subject: File 7--"The Basics of Computer Security" by Bellcore
-
- VDBSCMSC.RVW 961019
-
- "The Basics of Computer Security", Bellcore, 1995, 1-57305-047-4, U$695.00
- %A Bellcore
- %C Room 3A184, 8 Corporate Place, Piscataway, NJ 08854
- %D 1995
- %G 1-57305-047-4
- %I Bellcore
- %O U$695.00 +1-800-521-CORE +1-908-699-5800 fax: +1-908-336-2559
- %O llavoie@notes.cc.bellcore.com mgordon2@notes.cc.bellcore.com
- %P 130 minutes
- %T "The Basics of Computer Security"
-
- Essentially, this series of three short video tapes contains the rough
- equivalent of three introductory chapters of a basic security
- text. There is an introduction to computer security in general,
- an introduction to application security, and an introduction to
- application security review or audit. The material is presented
- at a level suitable to the user, or perhaps a non-technical
- manager.
-
- The format is the standard talking head interspersed with slides.
- The material on the slides is reprinted in booklets packaged with
- the tapes. The content is generally reliable, although sometimes
- the advice on minor matters is questionable. Overall
- organization is good, but some sections are poorly planned and
- repetitive.
-
- copyright Robert M. Slade, 1996 VDBSCMSC.RVW 961019
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.06
- ************************************
-
-
-