home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun June 1, 1997 Volume 9 : Issue 42
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.42 (Sun, June 1, 1997)
-
- File 1--Color CuD Spam!
- File 2--Germany "cybercops" battle offensive speech, violent games
- File 3--article on WEB TV and the stupidification of computers
- File 4--Survey says "Censor!"
- File 5--(CwD-Meeks) -Jacking in from "Media Elite Eat To the Beat" Port
- File 6--Review of: SENDMAIL (Second Edition)
- File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 03 Jun 97 14:23 CDT
- From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
- Subject: File 1--Color CuD Spam!
-
- CuD readers on the mailing list had the good fortune to receive
- up to a dozen copies of last week's CuDs at no extra cost. We're
- told that some readers were able to sell the extra copies on the
- street for large sums, some readers even retiring because of
- their good fortune.
-
- For those not on the mailing list (most people receive CuD from
- comp.society.cu-digest and a few other large distribution
- points), the problem began with a double mail loop on an
- east-coast system, the result of an attempted "work-around" that
- went awry. This sent bounces from that system looping back to the
- mailing list. Because CuD has no control over the mailing list
- and no way of editing or modifying it, we were helpless. We do,
- however, receive all bounces to the list. In this case, we
- received thousands. CuDs are not sent out on a Unix system, so
- writing a small filtering script was not possible. So, the
- weekend was divided between deleting thousands of bounces and
- trying to respond to CuD readers.
-
- And, not surprisingly, the CuD readership was its usual classy
- self. With the exception of 4-6 impertinent comments, posters
- were astonishingly sympathetic and helpful. I talked to the
- fellow who accidentally began the loop, and he was also quite
- impressed with the civility of CuD readers, even the upset ones.
- He apologized profusely, and it was just one of those errors that
- slip by us all on occasion. This was one of the few (perhaps
- only) times when the mailing list software at weber.ucsd.edu did
- not filter out "noise."
-
- Thanks to the hundreds of CuD readers who expressed sympathy.
- Given the flurry of deleting, the many, many humorous stories and
- jokes were deleted, and I wished I'd saved them for a special
- issue.
-
- And, of course, thanks to Bruce Jones who runs weber.ucsd.edu
- where the mailing list lives, who spent more time than is natural
- trying to settle things down on his end. He's done a wonderful
- job with the automated mailing list.
-
- So, we resume our regularly scheduled publication.....albeit a
- day or two late.
-
- jt
-
- ------------------------------
-
- Date: Wed, 28 May 1997 17:18:16 -0400
- From: Declan McCullagh <declan@well.com>
- Subject: File 2--Germany "cybercops" battle offensive speech, violent games
-
- Source - fight-censorship@vorlon.mit.edu
-
- ****************
-
- Date--Wed, 28 May 1997 10:25:39 -0700
- From--Gurney Halleck <gurneyh@ix.netcom.com>
-
- I guess now any jerkwater police department can become an International
- Cyberspace Policing Unit.
-
- While they can do what ever they want in their country (I still don't
- like it), I don't see how they get off "policing" the world Internet.
- Do they plan to extradite "criminals" to Germany to face charges there?
- Seems that this police department is over stepping its jurisdiction
- (unless German police is nationalized and has authority to prosecute
- national/international crime a la US FBI, DOJ...)
-
- I believe that "Nazi" material is criminal in Germany but the tossing
- off of "right- and left-wing extremism" has ominous undertones.
-
- Once again this makes me ask, what is the real value to the citizens?
- (of Munich in this case) Here we have two full time cops surfing for
- kiddy porn and hanging out in sleazy chat rooms. Even if they find
- something they probably can't prosecute (definitely not, if it is out of
- country). They haven't even had *one* conviction locally. Are the
- streets of Munich so safe that they don't need cops on the beat? Is
- there so little crime that they've got spare resources, cops with
- nothing to do? How do the people of Munich feel about funding an
- International Cyberporn Squad in lieu of personal safety?
-
- ----
-
- Tuesday May 27 7:13 PM EDT
-
- FEATURE: Germany's Cybercops Search For Internet Crime
-
- By Andrew Gray
-
- MUNICH, Germany (Reuter) - Two young men in jeans and sweatshirts surf
- the Internet, looking for anything they can
- find in the way of child pornography.
-
- They are not perverts or criminals. They are officers from a German
- police department dedicated to fighting Internet crime.
-
- Dozens of confiscated monitors, hard disks and printers are piled up in
- a storeroom next door to the Munich office where
- the unit, under the command of Commissioner Karlheinz Moewes, patrols
- the worldwide computer network.
-
- The equipment was seized in raids prompted by research on the Internet
- from Moewes and his five-member team. It
- provides the officers with their other main task -- trawling through the
- bits and bytes for illegal material to secure
- convictions.
-
- "We had 110 cases of suspected child pornography in 1996," said Moewes,
- a burly, bearded Bavarian whose unit is on
- the lookout for Internet crime of all sorts.
-
- "We find evidence of fraud, banned gambling, right- and left-wing
- extremism, pornography -- sadly, child pornography and
- even child pornography with animals," he said.
-
- Bavaria, traditionally Germany's most conservative regional state but
- also a center for hi-tech industry, has been at the
- forefront of efforts to clean up the Internet.
-
- Munich prosecutors last month indicted the head of the German unit of
- U.S. online service CompuServe, accusing him of
- allowing users access to pornography, neo-Nazi material and games which
- glorify violence.
-
- GLOBAL NETWORK POSES LEGAL PROBLEMS
-
- The Bavarian police set up a working group on hi-tech crime under Moewes
- in 1995, and the group was upgraded to a
- department in its own right at the beginning of this year.
-
- While other German police forces have officers who search the Net for
- crime when time allows, the Munich unit is the only
- one which is devoted full-time to the task.
-
- But the global nature of the Internet often makes it difficult for
- Munich's cyberpolice to act on what they find.
-
- Differing national laws on what constitutes pornography, on when a young
- person is no longer classed as a child, and on
- who is legally responsible for what is on the Internet all mean that
- securing convictions is no easy task for Moewes and his
- team.
-
- "When it comes to hardcore pornography, the difficulty for us is that
- much of what's illegal here in Germany is legal and
- normal in Scandinavia," Moewes said.
-
- Although they pass on their research to the relevant authorities if the
- trail leads them abroad, the Munich police have had
- no word back on any resulting convictions.
-
- "We've had reports from America where searches have taken place, but we
- have no information on any concrete results,"
- said Else Diesing, head of the police department which carries out raids
- on suspects pinpointed by Moewes and his team.
-
- Even in Germany, the law moves slowly. No convictions have yet been
- secured from last year's child pornography cases,
- although Moewes is hopeful he will soon have a few to show for his
- efforts.
-
- UNDERCOVER ON THE INTERNET
-
- The unit's job also is influenced by the normal constraints on how
- undercover police officers are allowed to operate.
-
- The cyberpolice can hang around electronic "chat rooms" where computer
- users trade information and swap material, for
- example, but they cannot incite anyone to commit a crime. They must hope
- the users offer illegal material of their own
- accord.
-
- "To take one example, we got to know someone via the Internet who
- offered us child pornography," Moewes recalled.
- The unit agreed on a rendezvous to pick up the material, then called in
- the undercover officers from Diesing's department.
-
- "Our colleagues went to the meeting point, where floppy disks with child
- pornography were handed over. They briefly
- viewed the disks, then searched the suspect's apartment and seized his
- computer," Moewes said.
-
- In addition to "virtual stake-outs" of chat rooms, the team also uses
- keyword searches of the Internet to try to track down
- web sites containing illegal material.
-
- During one such search, the team came across a web page which hit two of
- their main areas of investigation at once -- a
- site plastered with swastikas and pornographic pictures.
-
- END TO INTERNET ANONYMITY?
-
- Moewes has little time for the argument that his officers should not be
- snooping around cyberspace and that their
- investigations into the likes of child pornography infringe the basic
- right to freedom of expression.
-
- "In each one of our cases, a child has been abused," he said. "No one
- talks about the rights of the children."
-
- Moewes would also like to see an end to the anonymity which rules in
- large parts of the Internet, allowing people to post
- items on electronic bulletin boards or web sites and trade information
- without revealing their identity.
-
- He declined to talk about the CompuServe case in particular, but
- disputes the claims by online services that they only
- provide a gateway to cyberspace and cannot influence what people do once
- they have passed through it.
-
- He maintains the companies are already choosing not to allow customers
- access to certain areas of Usenet -- the part of
- the Internet where forums and newsgroups are found.
-
- "They're already exerting influence, whether they say so or not," he
- said.
-
- Reuters/Variety
-
- ------------------------------
-
- Date: 27 May 97 23:17:53 EDT
- From: Tom Truex <72100.407@CompuServe.COM>
- Subject: File 3--article on WEB TV and the stupidification of computers
-
- SOURCE: oNline Christian eMagazine...
- 1. REQUEST TO BE PUT ON THE MAILING LIST by sending
- eMail to sleddog@k-line.org. .
- 3. World Wide Web: http://www.k-line.org/~sleddog
- 4. FidoNet (1:369/158), FREQ, using the magic word, "EMAG."
-
- ===============================================================
- EDITORIAL: WEB TV and the stupidification of computers
- ===============================================================
-
- [DISCLAIMER: In our home, the word, "stupid", is considered a
- bad word. So I use that term very reluctantly in this
- editorial. I also don't mean to come off sounding like an
- elitist or know-it-all. Ask anyone who knows me--I'm no rocket
- scientist myself. :-) So please do not take anything that I
- say here personally--whether you are stupid, or know someone who
- is stupid, or you are just looking out for other people who may
- be considered stupid. END DISCLAIMER]
-
- Have you seen the news about the coming of WEB-TV? Supposedly
- computers have gotten too complicated for the average consumer,
- so Bill Gates and friends have come up with the great idea of
- merging the Internet with Television. Hmmm... I have a nagging
- feeling from deep inside my gut that there is something
- desperately wrong with this picture.
-
- First of all, what about the premise that computers have gotten
- too complicated for the average consumer? I'll have to admit
- that my first hand acquaintance with computers only goes back to
- about 1982. Roughly about the same time that the IBM PC stormed
- on the market.{2} The original IBM PC and its clones were
- pretty crude by today's standards. But they also assumed, to
- some extent, that the people who used them would develop some
- minimal level of familiarity with the workings of the
- contraption. As I recall, they gave you a couple of loose-leaf
- manuals crammed with helpful pointers on the inner workings of
- the computer and its software. Those machines even booted up
- with a simplified version of BASIC when you flipped up the ON
- switch. And from the beginning of the PC, up until the
- introduction of Windows 95, you always got a version of the
- BASIC programming language packaged with the operating system.
- Even through the choir of complaints about Windows 95 when it
- first came out, I never heard anyone else mention the absence of
- BASIC. If you bought a computer recently, did YOU notice that
- BASIC was missing? OK, so what's the point? The point is that
- the folks who make and market computers used to expect that
- computer users would want to do some rudimentary programing. It
- was pretty much required just to install a program. Now, the
- folks selling computers don't expect users to want to do any
- programming. AND they are correct. I know that they are
- correct, because nobody complained when they stopped packaging a
- programming language with the base computer system.
-
- I suspect that a good percentage of computer users today do not
- do ANY installation of hardware or software. If they do install
- any hardware nowadays, its mainly done with the "plug and
- play." And if they do install any software, its mainly done by
- the "installation wizard." When the installation works, it's a
- pretty simple affair.{3} The programs of today are generally
- much easier to use. Point and click on a pretty picture and you
- are in business. In most cases, you can sit down and use a mass
- appeal consumer program with little or no training. Which, by
- the way, can be good. It means that we get more out of our
- computers without spending a lot of time on the learning curve.
-
- Meanwhile, the hardware required to run software keeps getting
- more sophisticated. The hardware has to be better to keep up
- with glitzier, and smarter programs. For a while, it was
- fashionable to call "smarter" programs "user friendly".
- Perhaps "user friendly" is a gentler term than "user stupid",
- but for sake of clarity, let me say that they mean the same
- thing. New computers must be smarter (i.e. friendlier) because
- they assume a stupider end user. I'm hard pressed to argue
- against the marketing strategy behind this trend. Namely, that
- to sell the most copies of a product, one must aim the product
- to attract the greatest number of potential customers. Or to
- simplify my point{4}, computers have to be marketed so that
- sufficiently stupid people can use them. Although only smart
- people can use unfriendly computers, both smart people AND
- stupid people can use friendly computers. The simpler the
- computer interface, the stupider the potential customer can be.
-
- All of which brings us to the World Wide Web. More commonly
- known as "W-W-W dot-something-dot-COM."{5} I've been reading
- recently that the internet is NOT the same thing as the World
- Wide Web. Which indeed it is not. But the World Wide Web does
- seem to get noticed the most. Everybody and everything has a
- web page, including this eMagazine. So, depending on where you
- gather your reading material, it's not uncommon to hear a great
- deal of wailing and gnashing of teeth about how the WWW has both
- ruined the internet and devastated some other formerly important
- means of computer communication. Pretty pictures and neat
- tricks have a premium over content. Indeed, the POINT of the
- WWW is sometimes not the content at all. The point is sometimes
- the medium that delivers the pseudo content. The result is,
- IMHO, a much more "stupid" product. As Forrest Gump
- demonstrated, stupid is not all bad. Stupid is just not...
- well.. "smart", like you used to have to be in order to use a
- computer. Meanwhile most computer users have stampeded away
- from computer Bulletin Board Systems (BBS) and things like
- FidoNet, which traditionally placed a premium on content, even
- if the medium was pretty crude.
-
- And now we have the specter of Web-TV. Here I admit to speaking
- from the wonderful vantage point of ignorance. Which is always
- easier and often more fun than learning the facts. That is, I
- know very little about web-tv. What I do know, I gleaned from
- bits and pieces thrown out by the mainstream media.{6} But for
- those who lament the stupidification of computing in general, I
- submit that we ain't seen nothin' yet. Just take a minute and
- compile a short list of consumer appliances that have
- contributed to a decline in the national intelligence level.
- Surely the the television will be on everyone's top 10 list. In
- fact, the TV is a virtual icon for stupidity. And TV is the
- model that we are using for the future of computing. Computers
- have a great potential to educate and inform. To communicate
- ideas. To persuade. To convert. To stir the human spirit. I
- suppose that television also had the same potential at one
- time. A long time ago, that is.
-
- FOOTNOTES
- ------------------------
-
- {2}Before that I had a computer science class in college in
- which we used a mainframe computer. You fed it with cards
- that had holes punched in them. A very primitive arrangement.
- One card for one instruction. I'd like to have exclusive
- rights on selling those cards if that's how you still had to
- load Windows 95 <g>. The programing language for that thing
- was ALGOL. But I digress. Which is why this remark is buried
- in a footnote.
- {3}When it DOESN'T work, you're really in trouble though. Don't
- count on having very much at all in the way of a manual or tips
- for troubleshooting.
- {4}To suit the tastes of today's users of computers <g>. Just
- kidding--if you are reading this eMag, I know that you are a
- step above the average computer user.
- {5}Or more recently, "-dot NET" or "-dot ORG"
- {6}Not always the most reliable means to gather one's information,
- especially relating to computers.
-
- ------------------------------
-
- Date: Thu, 15 May 1997 14:16:47 -0700 (PDT)
- From: "Brock N. Meeks" <brock@well.com>
- Subject: File 4--Survey says "Censor!"
-
- RADNOR, Pa., May 13 /PRNewswire/ -- Despite the fact that 29 percent,
- or nearly one-third, of all Americans access the Internet, 4 of 5 say
- they are concerned about what can be found, and who might find it,
- while cruising the Information Superhighway.
-
- In a recent nationwide telephone survey of a random sample of
- Americans ages 18 and older conducted by Chilton Research Services, 80
- percent of respondents answered "Yes" when asked, "Do you think that
- the government should take steps to control access to pornographic or
- sexually explicit material on the Internet to protect children and
- teens under 18 years of age?"
-
- A significantly higher percentage of women than men favored government
- intervention. More than 88 percent of women invite censorship or some
- other action, while 71 percent of men feel such steps are warranted.
-
- Respondents were similarly divided by economic and education levels.
- In all demographic categories a resounding majority wants to limit
- youngsters' access to sexually explicit material on the Internet, but
- some groups feel more strongly than others. For instance, among
- households with incomes below $35,000 annually, 85 percent want Uncle
- Sam to step in. Among respondents with household incomes above
- $50,000 the percentage drops to 71 percent. Similarly, 9 in 10
- respondents with a high school diploma or less said the government
- should control access, while 7 in 10 who had at least attended college
- want such action taken.
-
- In addition to worrying what their children might see on the Internet,
- Americans worry about what others might be able to learn about their
- private lives. Better than 5 of every 6 respondents (84 percent) said
- they are concerned about unauthorized or illegal access to personal
- and financial information through the Internet. A solid majority (65
- percent) of all respondents said they were "very concerned," while
- another 19 percent admitted to being "somewhat concerned."
-
- Fewer than 10 percent of respondents were "not at all concerned."
- Those with less than a high school education and those over 65 years
- of age expressed less concern, possibly because these groups are not
- as likely as others to use the Internet.
-
- The Chilton EXPRESS telephone omnibus survey was conducted among a
- sample of 1,000 American men and women ages 18 and older, between
- April 16 and April 20, 1997. The margin of error is +/- 3 percent.
-
- Chilton Research Services, an ABC-owned company, was established in
- 1957. The company offers full research and consulting services to
- consumer products companies, business and industry, telecommunications
- and media, non-profit organizations and government agencies.
-
- SOURCE Chilton Research Services
-
- CO: Chilton Research Services
- ST: Pennsylvania
- IN: PUB CPR MLM
- SU:
- 05/13/97 13:57 EDT http://www.prnewswire.com
-
- This list is public. To join fight-censorship-announce, send
- "subscribe fight-censorship-announce" to majordomo@vorlon.mit.edu.
- More information is at http://www.eff.org/~declan/fc/
-
-
- ------------------------------
-
- Date: Thu, 15 May 1997 14:16:47 -0700 (PDT)
- From: "Brock N. Meeks" <brock@well.com>
- Subject: File 5--(CwD-Meeks) -Jacking in from "Media Elite Eat To the Beat" Port
-
-
- CyberWire Dispatch // Copyright (c) 1997 // May 23, 1997
-
- Jacking in from the "Media Elite Eat To the Beat" Port:
-
- Washington--Howard Fineman, Newsweek's chief political correspondent goes to
- Washington (state) and comes away... well, with a few tired and shop worn
- anecdotes in an article published in last Sunday's Washington Post Outlook
- section.
-
- The piece, "Gates Crasher: I Infiltrated (the other) Washington" (catchy,
- no?? I doubt it was Fineman's original...) starts with a stale tale about
- how he is able to woo his way into the smooze-fest that Microsoft Mogul Bill
- Gates held in Seattle a couple of weeks ago in which he invited a select
- group of some 100 CEO's voted "the most likely to spend another billion or
- so on my software" to come and try not to be sleepless in Seattle.
-
- Now, I don't want to get off on a tangent here, but I've been to Seattle and
- fercrissake... it's no wonder they drink so much fucking caffeine out there:
- the place is proverbial "sleepy little town" with a gland problem.
-
- Back to Fineman and Seattle. Why a good journalist like Fineman would want
- to be anywhere near this billionaire's dog and pony show is beyond me.
- Maybe the "news hook" for Fineman was that Vice President Al Gore was going
- to be making a cameo appearance and since Fineman covers politics, well,
- hell, it was a stretch but the plane fare would probably pass muster with
- the Newsweek bean counters. And if nothing else, it gave Fineman a chance
- to chat up that most famous East Coast media elite refugee, Michael Kinsley,
- who now runs _Slate_ magazine.
-
- Small aside: Fineman and Kinsley did hang together. In fact, Kinsley
- treated Fineman to a real Seattle pilgrimage: A tour of the first
- "Starbucks" coffee shop. However, Fineman damn near caused a riot when he
- eschewed the half-cafi, double decaf, whole milk, medium foam Cappuccino
- that Kinsley ordered and asked for "Sanka."
-
- Now any hack journalist could have told Fineman the Gates-fest would be
- nothing more than a corporate blow job in which "vision" was a thinly veiled
- Microsoft infomerical where "smooze and snooze" were the complete faire of
- the day. I mean, if you've heard one Gates speech you have, literally,
- heard them all. And if you've heard one Gore speech on technology, well,
- you've heard nothing at all and only learned that his speech writer is
- competent enough to string buzzwords together in the right order.
-
- You see, the great untold truth of Washington (the right-coast Washington)
- is that Gore is a techno-midget, except for the policy end of things and
- even then, he can give you only about 17.3 seconds of really hard core
- discussion before he lapses into rhetoric... ah, but I digress...
-
- So, Fineman tells us in his article that "what I saw on my tour is simply
- put: Their Washington is as crucial to the future of government as ours,
- and each place has to learn the folkways of the other."
-
- This is the "kindler, gentler" approach to "the Internet will ruin
- Democracy" blather pushed onto the scene by Cokie and Steve Roberts a month
- or so ago.
-
- "The info-tech buccaneers are accumulating vast power, and not just in pure
- cash terms," Fineman writes. "Their business could put the capital out of
- its misery by facilitating the rise of a wired 'direct democracy' that makes
- the political class redundant," he writes.
-
- Oh, please... here were go again. An inside the beltway political
- journalist discovers the potential of the Net and starts predicting the
- downfall of democracy and Washington and... well, it'll be on Newsweek's
- cover in a just a few issues, I'm sure...
-
- "I say, 'Godspeed' to a force that can rattle the ossified power structures
- of Washington, including the media one that I belong to," Fineman writes.
- You see, it's Ever So Hip to take potshots at yourself and your own class...
- I know, I've been doing this for years myself, so my skills are well-honed
- and I can spot this clever journalistic chicanery in a nanosecond.
-
- The story, Fineman says, "for want of a better term is DDD: digital direct
- democracy. Even now, voters with modems (and the time to use them) have
- access to most of the information that representatives do." WRONG, but
- hell, thanks for playing Mr. Fineman, don't let the 33.6 bps modem slap you
- on the ass as you slide into the bitstream.
-
- The truth, of course, is that Washington (the "real" Washington) is all-too-
- adept at keeping information under lock and key, printed on paper,
- distributed only to those that are deemed to hold the power.. and this
- includes lobbyists and the assorted foreign Chinese national, but it sure as
- hell doesn't mean "voters with modems."
-
- Fineman continues in breathless prose about how "soon enough they'll be able
- to voice their verdicts on issues of the day, in real time." He's talking
- here about how DDD can lead to the citizenry taking control of the
- legislative process by raining in their "votes" on issues, presumably
- changing the course of a vote in the House or Senate... hell, maybe DDD can
- even weigh in and break one of those infamous Senate filibusters. "It could
- be a popular idea," deadpans Fineman, noting there could be a "powerful
- lobby for DDD."
-
- Except for one, small CRUCIAL "dddetail": people with modems, who
- participate online, are as likely to think with one mind and speak with one
- voice and the new so-called government of Zaire's Laurent Kabila.
-
- Fineman eventually gets around to writing what he knows. "You can't
- reinvent the politics out of government, and the Beltway Bureaucracy is the
- most durable human edifice since the Ming dynasty." Amen, brother... hear
- the thunder roll...
-
- But all too quickly, Fineman lapses into babble and surprisingly unfounded
- babble. Gates has "given chunks of money, hard and soft, to both parties."
- I suppose Fineman wasn't talking about the last election cycle. Because
- according to the FEC, as sliced and diced at the excellent "show me the
- money" site maintained by Tony Raymond <http://www.tray.com/fecinfo> Gates
- personally gave only $5,400 to candidates and another $10,000 to his
- company's own Political Action Committee. Now my pencil may not be as sharp
- as Fineman's, but I figure that $15,400 in donations from the Richest Man in
- the World equates to the crumbs left in his dog's dish, but not "chunks" of
- money.
-
- Gates gave NO soft money of his own; however, Microsoft the company gave a
- total of $77,000, which it spread between Dems and the GOP. That's
- peanuts. Especially when you consider that Steve Jobs ponied up $150,000 of
- his own money (which he gave to the Dems.)
-
- Fineman relates how Gates introduces Gore to the 100 CEOs in attendance:
- "He's one of the first policy makers to understand technology and
- information. I have drawn on his wisdom often." Now, Gates is really much
- more hip than I thought, because if he made this statement--with a straight
- face--the man had to be high; or Gates is cracking under all the pressure of
- being the world's richest man. Taking advise and wisdom on technology from
- Gore is to take navigation lessons from the skipper of the Titanic.
-
- Fineman notes that if Gore has any wisdom to offer his buddy these days, "it
- should be this: Loosen up. The way NOT to make friends in Washington is to
- be aloof, mysterious, inaccessible. Also, don't move too quickly. The speed
- of change might frighten the natives."
-
- Indeed, it does. Fineman then notes the laughable column that Cokie and
- Steve Roberts co-authored... you remember, the one about how the Net is all
- things dangerous and will, if left unabated, surely bring down
- "representative democracy" we know it.
-
- Fineman goes on to say that the Roberts' rant "produced more flames than an
- oil field in Abu Dhabi." And then he quotes from my MSNBC Column
- <http://www.msnbc.com/news/wwwashington.asp> on the Roberts' article: "The
- hysterical tone of the column is astounding," wrote cyberpundit Brock N.
- Meeks. "This sort of journalistic tripe is poison and yet, at the same
- time, grist for the mill among the twisted jackals who make up Congress and
- who, it seems, have no qualms about using the Internet as a personal
- whipping post whenever it suits their fancy." (Odd, but I could have sworn
- I wrote: "twisted craven jackels...")
-
- Then Fineman wraps up: "Let the record reflect that Meeks works for MSNBC,
- one of whose owners is--you guessed it--a man named Gates, from the other
- Washington."
-
- The inference, of course, is that I've been turned into a fuck chimp for
- Bill Gates. That I'm suddenly Gate's personal attack dog in D.C. Small
- Problem, Howie: I don't work for Gates, never met him and don't particular
- care to. Yes, at MSNBC we take Microsoft's money... and then curse the
- software they make us use to produce the news.
-
- If Fineman really thinks Gates has me on a short leash, then my worst fears
- have been realized: He's fallen of the wagon and has resumed that nasty
- Lucky Charms binge/purge routine. Oh the horror of it all... not a pretty
- sight.
-
- Fineman is probably, at this minute, writhing in pain, coughing up blood and
- having nostalgic thoughts about his college frat parties.
-
- I'm very concerned...
-
- I'll call the authorities... any minute now. Honest.
-
- Meeks out...
-
- ------------------------------
-
- Date: Mon, 19 May 1997 21:54:29 -0500 (CDT)
- From: Eric Behr <behr@math.niu.edu>
- Subject: File 6--Review of: SENDMAIL (Second Edition)
-
- SENDMAIL (Second edition). By Bryan Costales, with Eric Allman.
- 1996. Sebastopol (Calif): O'Reilly and Associates. 1050 pp.
- $39.95 (paper).
-
- (Reviewed by Eric Behr, Dept. of Mathematics, Northern Illinois
- University).
-
- Even though many people these days spend hours using Web browsers, good
- old e-mail remains by far the most _important_ Internet application. We
- have come to rely on it just like our grandparents learned to depend on
- the telephone. And just like we don't pay much attention to the
- goings-on at the local phone exchange, we rarely think about the "under
- the hood" side of e-mail. Until we put our system managers' hats on our
- heads, that is.
-
- Unix computers are preferred as Internet service hubs. Other systems can
- offer easier configuration or higher cost-effectiveness, but Unix still
- reigns because of its flexibility, power and the abundance of skilled
- and experienced administrators. And the most common and mature Unix mail
- handling software is sendmail(8), whose history spans almost 20 years.
-
- Administrators have a love-hate relationship with it. I'm afraid that
- the "love" column is quite short: sendmail does an essential job very
- well, provided that it is properly configured and installed. The "hate"
- side of the ledger spans a few pages: it is probably the biggest
- potential security hole on your system, because it must assume the
- superuser's identity in much of its work, even when invoked by regular
- users; it's a relatively "open" program (source code for most versions
- is readily available), and hence it attracts swarms of hackers; it uses
- a complex configuration file written using obscure syntax; it cannot be
- fully tested until it's actually in place, which means that you will
- likely be tearing some of your hair out before you arrive at a workable
- setup; and so on, and so on.
-
- I am not a sendmail guru; I have edited a few sendmail.cf files in my
- life, and I spent several hours studying rewriting rules, but I cannot
- say that I could configure sendmail for a complex site in my sleep. This
- review is thus written from the point of view of a moderately advanced
- system manager who has once or twice dabbled in this subject. I was
- asked to write it at a very opportune moment - the time when I decided
- to switch from a vendor's implementation to the public domain version
- maintained by the original author, Eric Allman. I can use my experiences
- "from the trenches". My experiences have been mixed, but I recommend
- that you look at "sendmail"
- despite my grievances.
-
- The book under review is to some extent damned by its own notoriety.
- It's one of the legendary titles from O'Reilly. We've come to expect
- everything from it, and when it fails to deliver 100% we are
- disappointed. But let's not forget that the behavior of a very complex
- program such as _sendmail_ can't be adequately described in a static
- book in all its minutiae. It is natural that "sendmail" has its flaws,
- ranging from simple typos (surprising, frankly, for a second edition
- from a well-known publisher) to being unrealistic in places, and a
- little negligent of typical cases.
-
- The "Bat Book" is invaluable as a reference and as a confidence booster.
- Its mere physical size indicates the magnitude of the problem you are
- about to tackle. The comprehensive lists of options, m4 commands,
- rewriting rules, debugging switches and the like are a great help for
- anyone facing the unpleasant task of changing the configuration.
-
- Still, it isn't a cookbook. You will have to figure out for yourself
- which flavors and seasonings to add where, and which recipe works best
- in your situation. There are few concrete scenarios applicable to real
- life cases. The book falls short in offering quick and easy solutions,
- and perhaps this is as it should be - for you are the only person who
- knows exactly what is required at your installation.
-
- I encountered several frustrating problems which the book glossed over,
- or mentioned them somewhere on page 467, or didn't mention them at all.
- I would expect this had I used an obscure CPU and/or flavor of Unix --
- but the book claims to be oriented towards precisely my situation! I
- expected a higher batting average. On top of this, the index is not
- always as helpful as it could be. This is dangerous, and not just for
- the poor soul who might lose his job if he doesn't upgrade sendmail the
- right way. We live in a world in which half of the Internet is in the
- hands of inexperienced administrators, and one-third of it is
- misconfigured, which affects everybody. I would hate to see the third
- edition come out (in response to my gripes) in the well-known "... for
- Dummies" series, but I think that parts of it can be easily made more
- helpful for a relative novice running one of the proliferating systems
- such as Linux.
-
- I don't want to be accused of taking pot shots, so let me list just a
- few concrete complaints:
- - the most common reasons why sendmail relinquishes its root provileges
- (and hence stops working as advertised) are not listed in an easy to
- use, clear form
- - the "pitfalls" section which follows each chapter is a very good idea,
- but the most likely ones should be prominently grouped in a separate
- place for easy reference
- - the $=w class is not documented well enough; the book uses examples
- in which $=w hostnames are partially qualified (they can't be!) and
- never mentions that the domain name must be added to the list if the
- hub is an MX host for that domain (which is almost always so!)
- - the m4 processor has certain quirks which should be mentioned (or at
- least mentioned more forcefully)
-
- I fell into many traps when switching from a vendor's sendmail to
- Allman's
- latest version. At times seeing the familiar SYSERR message in the logs
- and not knowing what is happening was infuriating. Even after the book
- became quite dog-eared and (I thought) worn down into submission, it
- still didn't relinquish its secrets easily. As you can see by now, I've
- developed a love-hate relationship with it similar to the one with
- sendmail itself. I found it very useful, because it _does_ have most of
- the answers in it, and I prefer to leaf through a book than to browse a
- dozen README files, FAQs, and archives of Web and newsgroup material.
- Still, I had to consult the FAQs and READMEs more than I expected.
-
- Internet mail is becoming more homogeneous; Bitnet relays and
- intricacies of UUCP have a much smaller role to play now than when
- sendmail was first conceived. Perhaps a new edition will be better
- organized and focused more sharply on the few categories of sites and
- scenarios that are likely to be encountered these days.
-
- To summarize - if you have $40 lying around and if you have a major
- sendmail revamping project in your future, then by all means, get it!
- But if you are expecting a set of painlessly implemented recipes, forget
- it. Save the money for a skilled consultant instead.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.42
- ************************************
-
-
-