home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Thu June 12, 1997 Volume 9 : Issue 45
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.45 (Thu, June 12, 1997)
-
- File 1--<nettime> Attack against Decoder (english) (FWD)
- File 2--Islands in the Clickstream
- File 3--'Amateur Action' update
- File 4--Ready, aim, fire!
- File 5--Re: Mass-CuD Problem Solved (we hope)
- File 6--"Java Fundamental Classes Reference" from O'Reilly
- File 7--U.S. Agriculture Dept. web site closed after security breach
- File 8--French Internet Suit Dismissed
- File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 03 Jun 17 01:57:10 -0100
- From: Bruce Sterling <bruces@well.sf.ca.us>
- Subject: File 1--<nettime> Attack against Decoder (english) (FWD)
-
-
- From--Gomma@decoderbbs.csmtbo.mi.cnr.it (Gomma)
- Date--03 Jun 17 01:57:10 -0100
- To--nettime-l@Desk.nl
-
- The following (translated) article is from "Il Mattino" of Naples. It
- concerns "Decoder", one of the most relevant magazines in the Italian
- antagonist landscape.
-
- This raving article is against "Decoder" and the
- alternative Italian telematics. It is the proof that all the
- repressive legislation passed or under way to "regulate" the net will
- become instruments against freedom of expression more broadly. For
- those who didn't know it, the article mentioned concerns a strip by
- the famous English artist, Graham Harwood ("Decoder", No. 8), on the
- issue of violence on children. A harsh strip, ruthless, but whose
- only goal was to make people reason on the origins of violence
- against weaker human beings. But when power becomes blind, it hits in
- any form, it becomes abuse, it becomes censorship, and it hits
- everything and everyone.
-
- If this was not so gloomy for the future prospects it envisages, we
- could even laugh at it, but BEWARE, because this article -which the
- journalist who attacks us and the right to stay anonymous was not
- brave enough to sign- seems to anticipate a new repressive clampdown
- on Italian networks and their activists.
-
- As "Decoder" we will seek for advice from our lawyers to try and do
- something -we do not accept being used to the ends of newspapers'
- manipulation- and we INVITE all the comrades, brothers and sisters
- from telematic communities to express solidarity, to activate on
- these issues, and build a united front against repression.
-
- -------
-
- "Il Mattino" 28 May 1997
-
- The cyber-race and its prophets. See under "violence"
-
- There is also a magazine ,"Decoder", in glossy paper: it preaches the
- destruction of all rules
-
- ROME. A bunch of copies on adjunct attorney's Italo Ormanni.
- Disgusting images of violence on children accompanied by a language
- that is abusive in itself. It is not a porn magazine, of those some
- guys get behind closed doors. It's a glossy paper, underground they
- say, who claims to change the world. An organ of ideological
- struggle, one may say party-like, if we can call this way a group
- which is sailing on the Net preaching the destruction of all rules.
- And what is more shocking, more destructive than sanctifying violence
- on children?
-
- Ormanni, the statutes in his hands, could only do one thing. He asked
- to the police's telecommunication operative branch director, Maria
- Cristina Ascenzi, if the requisites existed to sue someone for under-
- age persons' exploitation. But it came out that those sick images
- are the outcome of computer-aided elaborations. The crime disappears,
- at least for current laws, but a chilling discovery is confirmed:
- pedophily is not only stuff for a-social, depraved people: it is
- used, if you pass this concept, as a tool of struggle, a ram's head
- against the bases of society. Going through "Decoder"'s pages is like
- have a walk into a frenzy: a summary of the cyberpunk's "philosophy"
- is that any rule must tumble down. And that anyone do what they want,
- totally unnamed.
-
- Being strong or weak, being the animal that eats or the one who gets
- eaten, does not matter. But this is not said because anyone of these
- cyberphilosophers feel, tacitly, the eating animal. One of the most
- notable parts of this vision of the world supported even through
- pedophily is the coming birth of a cyber-race improved by computer.
- And all, which they imagine so original and part of the new times,
- inequivocably smacks like a rotten carcass.
-
- No signatures, only proclamations. The authors don't let people look
- in their faces. Only battle nicknames. It's the rule, on the Net.
- This in the lefty circles who are seeking on the Net for alternatives
- to the old social centre (whom detectives call "antagonist"), like in
- these groups defined, instead, as rightist. Among so many living
- presences, curious, even provoking, then, you can also find anti-
- everything propaganda, desecrating by choice. Legislation that is now
- going to pass in Parliament provides for very hard penalties for
- everyone produces pornographic material representing under-age
- persons. Also virtual pedophily, then, might be punished, as a non-
- value and an "exaltation" of a crime. Until now the police, who can
- anyway point and prosecute those inciting to racial hatred, can just
- wait and see.
- --
- | Cybernet: Gomma 65:1200/1.2
- | Internet: Gomma@decoderbbs.csmtbo.mi.cnr.it
- | WWW : http://www4.iol.it/decoder
- |
- | Standard disclaimer: >>>> Information wants to be free <<<<
- | From DecoderBBS Italy +39-2-29527597 (open 14:00-08:00).
- ---
- # distributed via nettime-l : no commercial use without permission
- # <nettime> is a closed moderated mailinglist for net criticism,
- # collaborative text filtering and cultural politics of the nets
- # more info: majordomo@icf.de and "info nettime" in the msg body
- # URL: http://www.desk.nl/~nettime/ contact: nettime-owner@icf.de
-
- ------------------------------
-
- Date: Sat, 07 Jun 1997 21:38:18
- From: Richard Thieme <rthieme@thiemeworks.com>
- Subject: File 2--Islands in the Clickstream
-
- Islands in the Clickstream:
- No More Pencils, No More Books?
-
-
- We are all children of our times.
- We frame our worlds as they are given to us by our language
- and the structures of our education. The frame is invisible until
- there is a change so pervasive that we see by contrast what we
- once took for granted. It's like the terminator on the moon, the
- line between darkness and light where the mountain ranges are
- thrown into relief.
- I did not experience the education I received growing up in
- America in the 1950s and 1960s as a choice. It's what education
- was.
- In the same way, becoming an "adolescent" was simply a fact
- of growing up, a universal stage of development. But adolescence
- is really a modern invention. The word was first used in 1904.
- The same is true of "childhood" which was really invented by the
- Victorians.
- In the United States, the expectation that adults will
- graduate from high school is a fairly recent development, a
- twentieth-century phenomena.
- "School" as we know it is a direct result of the printing
- press. Collections of benches in a central building on which to
- sit and read are a recent development. Learning had universally
- been accomplished through apprenticeship. Young people worked
- beside adults, learning by doing. Most never left the village in
- which they were born.
- The fact of textbooks and universal literacy made necessary
- a prolonged period of time called "adolescence" that postponed
- adulthood. During that time we learned the art of symbol
- manipulation. We learned to internalize typographical symbols and
- be "reading people." Learning to read transformed who we were and
- how we understood our lives as possibilities for action.
- The process was at least as important as the content.
- We called that process "education."
-
- Today the structures of education are out of joint with the
- structures of adulthood. That's why so many businesses are
- educating workers. More education takes place today in conference
- rooms, meeting rooms in hotels, and via remote telepresence and
- onsite computer-assisted learning than in classrooms. The need
- for continuous lifelong education is now an unquestioned
- assumption.
-
- Apple flooded schools with computers, but didn't provide
- teachers who knew what to do with them. My consulting with
- schools tells me that money is often budgeted to buy computers,
- but seldom budgeted for the years of training needed to re-
- program teachers to use them effectively.
- I know a fourth grade teacher who was supposed to teach
- computers but didn't know how to turn them on. She asked her
- class, "Who knows how?" Hands waved in the air. She turned the
- task over to the students and hid behind her desk while they
- showed each other what to do.
- She called it "empowerment."
- But she couldn't hide forever. So she asked her three
- brightest students secretly to teach her after school how to use
- computers. Then she could teach the students how to use
- computers.
- That teacher's situation as an officer in a command-and-
- control hierarchy who does not know as much as the people she
- teaches is analogous to a manager asked to supervise younger
- workers who understand computer technology and its uses far
- better than she does.
- Older managers as well as older teachers must learn from
- younger adults as well as teach them. The wisdom of experience is
- relevant, but relevant in a different way. Command-and-control
- behaviors do not make for good coaching.
- That teacher, like many managers, learned that she still had
- authority, but authority that had to be exercised in a collegial
- way. Leadership is exercised in a network by implementing a
- vision, not by dominating and controlling. Power is exercised in
- a network by participating and contributing.
- That teacher knew, at least, how to get out of the way, but
- that didn't make her a coach. She needed to learn how to be
- present but not controlling, available but not directive. Like
- the best computer assisted learning, good coaches provide
- information not at the convenience of the curriculum but when
- learners are most teachable.
-
- Naturally the fact of computer technology has been
- threatening to many schools. Some responded to the challenge by
- taking away all the computers and locking them up in a room. They
- call it a "computer lab" and let the kids in there an hour a day.
- Imagine being a teacher when pencils were invented. You pass
- out pencils and watch as the children discover that pencils can
- do anything because a pencil is a symbol manipulating machine.
- Children can write stories, do math, reflect on history. Afraid
- you're no longer needed, you collect the pencils and lock them in
- a Pencil Lab, letting the children use them an hour a day. The
- rest of the time they write with rocks on slabs of broken
- concrete.
-
- In preparation for a speech for a school district in
- northern Illinois recently, I was told that the large
- corporations in which most of their students worked gave the
- district good grades in much of what they were teaching, but not
- in preparing young people for cooperative learning and cross-
- disciplinary teamwork. When I asked what they meant by
- "cooperative learning," I realized that in *my* day it was called
- ... cheating.
- A stand-alone human being who learns and works by themselves --
- as I was taught to do -- is a brain in a bottle.
-
- The structures of education, like the structures of work,
- are moving through a sea-change. Symptoms include:
-
- + Rising drop-out rates. Racial minorities, the canaries in
- the coal mine of society, die first. The growing irrelevance of
- school to life in the real world was experienced first in
- ghettos. Now blue-collar workers and middle-aged managers are
- feeling the pain so it's a "crisis."
-
- + A growing "black market" in education. We give lip-service
- to traditional structures but barter for "educational goods" on
- the job and over the Internet, in the global marketplace.
-
- + Businesses are becoming centers of education, not because
- they want to, but because they must. McDonald's teaches
- politeness and civility because the traditional structures of
- society no longer do the job. The budget for training in many
- businesses exceeds the budgets of local school districts. Some
- companies have started their own colleges and graduate studies
- because schools do not generate people with the skills and
- knowledge they need.
-
- + Conscientious teachers who can't see the forest for the
- trees redouble their efforts. They become exhausted , working
- harder and harder, but it's like drinking from a dribble glass.
- The gears of the system don't mesh with the real world. Veterans
- count the days until retirement. Burn-out abounds.
-
- + "Work-to-school" programs grow as apprenticeship is re-
- engineered for the 21st century.
-
- Is there hope? Of course. The solutions begin with
- understanding the depths of the transformation we are
- experiencing and asking questions relevant to our real lives. The
- process of finding answers together will generate the security we
- need to remain effective during revolutionary times.
-
-
-
-
- **********************************************************************
-
- Islands in the Clickstream is a monthly column written by
- Richard Thieme exploring social and cultural dimensions
- of computer technology. Comments are welcome.
-
- Feel free to pass along columns for personal use, retaining this
- signature file. If interested in (1) publishing columns
- online or in print, (2) giving a free subscription as a gift, or
- (3) distributing Islands to employees or over a network,
- email for details.
-
- To subscribe to Islands in the Clickstream, send email to
- rthieme@thiemeworks.com with the words "subscribe islands" in the
- body of the message. To unsubscribe, email with "unsubscribe
- islands" in the body of the message.
-
- Richard Thieme is a professional speaker, consultant, and writer
- focused on the impact of computer technology on individuals and
- organizations.
-
- Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
-
- ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
- *********************************************************************
-
- ------------------------------
-
- Date: Sun, 8 Jun 1997 13:23:04 -0400
- From: Michael Sims <jellicle@inch.com>
- Subject: File 3--'Amateur Action' update
-
- ((MODERATORS' NOTE: A full background on the Amateur Action BBS
- case, including its history and the text of relevant legal
- documents, can be found in the CuD archives at:
- http://www.soci.niu.edu/~aabbs/aabbs.html
-
- ==============
-
- Source - fight-censorship@vorlon.mit.edu
-
- Background: Robert and Carleen Thomas ran an adult-oriented
- bulletin board system from their home in California. Prosecutors in
- Tennesee in 1994 downloaded allegedly obscene pictures of sexual
- acts and charged them. Of course, they were applying *their*
- "community standards" for obscenity to his California business.
- They were found guilty and sentenced to 37 months. While that case
- was on trial, Federal officials in Utah heard about and looked into
- it. They downloaded pictures of "nude and semi-nude children" and
- charged Thomas in Utah with distributing child pornography, although
- there is no evidence any Utahan except the official had ever done
- so. Thomas pled guilty to 1 of 16 charges and appealed alleging
- double jeopardy.
-
- The 10th Circuit Court of Appeals has upheld the decision of the Utah
- District Court. No double jeopardy because the individual photos are
- different from those which were tried in the other cases. Thomas is
- serving a 26-month sentence on this count, concurrently with the
- other sentence. The opinion does not appear to be on the Emory
- University web site which tracks these things.
-
-
- Moral: anyone who distributes content nationally continues to be
- subject to prosecution in each and every locale under prevailing
- community standards. If your content is objectionable to the most
- small-minded folk anywhere in the US, it would be wise to refrain
- from publishing it on the internet or other comparable medium.
- Prosecutions continue to apply local "contemporary community
- standards" to obscenity prosecutions, but in meeting the Miller test,
- they are permitted to demonstrate that the material has prurient
- appeal to someone else. In other words, offensive to you, sexually
- appealing to anyone anywhere.
-
- For example, if space aliens landed tomorrow and their pornography
- consisted of pictures that looked like cat vomit, prosecutors could
- present evidence that the material is prurient with regard to space
- aliens, patently offensive to you (cat vomit, you know), and lacking
- in serious literary value to you (obviously) and you would therefore
- conclude that the material was obscene.
-
-
- [v]enue for federal obscenity prosecutions lies "in any district
- from, through, or into which" the allegedly obscene material
- moves, according to 18 U.S.C. section 3237. This may result in
- prosecutions of persons in a community to which they have sent
- materials which is obscene under that community's standards
- though the community from which it is sent would tolerate the
- same material.
-
- United States v. Peraino, 645 F.2d 548, 551 (6th Cir. 1981)
-
-
- So even if you refrain from sending material to Tennesee residents,
- an internet router can make that decision for you by sending data
- packets through the state. What a great piece of law.
-
-
- Refs:
-
- Jonathan Wallace's consideration of the issue:
- http://www.spectacle.org/795/amateur.html
- http://www.spectacle.org/freespch/musm/obsne.html
- http://www.spectacle.org/296/obscene.html
-
- ACLU materials on the Tennessee case:
- http://www.aclu.org/court/thomas.html
- http://www.aclu.org/court/obscene.html
-
-
- -- Michael Sims
-
- ------------------------------
-
- Date: Sat, 7 Jun 1997 19:30:57 -0400
- From: Michael Sims <jellicle@inch.com>
- Subject: File 4--Ready, aim, fire!
-
- Source - fight-censorship@vorlon.mit.edu
-
- http://www.nando.net/newsroom/ntn/info/060697/info5_16347.html
-
- Reproduced in full, it's short. Anyone have more information?
-
- Meeting reportedly will aim to fight obscenity on Internet
-
- Copyright c 1997 Nando.net
- Copyright c 1997 Agence France-Presse
-
- TOKYO (June 6, 1997 11:43 a.m. EDT) - Japan, the United States and
- European nations will hold an unprecedented ministerial meeting next
- month to study ways to restrict obscenity on the Internet and regulate
- electronic commerce, it was reported Friday.
-
- The meeting in Bonn July 6-8 will focus on measures to crack down on
- obscene and violent pictures on the Internet, Jiji Press quoted
- informed sources as saying.
-
- It will also discuss universal criteria for encoding information in
- electronic commerce to protect private information, Jiji said.
-
- Japan will be represented by the posts and telecommunications
- minister, Hisao Horinouchi, the sources said.
-
- ------------------------------
-
- Date: Tue, 3 Jun 1997 06:55:40 -0400 (EDT)
- From: "Bill Michaelson" <bill@COSI.COM>
- Subject: File 5--Re: Mass-CuD Problem Solved (we hope)
-
- <. . .>
-
- But in all this furor over spam, I've been puzzled by something.
- Why not as much indignation over paper mail? I told someone last
- week that if I could take all the paper junk that is stuffed in
- my postal mailbox (which I am required to physically sort for
- recycling), and put it in my e-mailbox, I would flick it into the
- ether with just as much ease as I do the electronic variety. Two
- years ago, after sending written requests to about 150 paper junk
- mailers, I was only successful at stopping the flow from half of
- them. The others required one or more followup calls, many of
- which had lame excuses for not complying with my request to stop.
- And it appears that I have no legal recourse.
-
- A handful have been so non-responsive (Honda, Godiva Chocolates
- and Starbucks come to mind) that I've considered organizing
- boycotts of their products by like-minded individuals. Ah, but
- I've got a life. At least I know that *I* won't be buying their
- products.
-
- This isn't to say I'm unsympathetic; I've been the victim of some
- idiotic spam attacks myself, and I'm still receiving junk from
- email lists that accept automatic registration without any sort
- of authentication - an administrative practice which borders on
- negligence at this late date.
-
- ------------------------------
-
- Date: Thu, 5 Jun 1997 17:18:47 -0700
- From: Sara Winge <sara@ora.com>
- Subject: File 6--"Java Fundamental Classes Reference" from O'Reilly
-
- FOR IMMEDIATE RELEASE
- June 5, 1997
-
- PRESS ONLY--FOR REVIEW COPIES, CONTACT:
- Sara Winge
- 707/829-0515 x285
- sara@ora.com
- http://www.ora.com
-
- O'REILLY RELEASES "JAVA FUNDAMENTAL CLASSES REFERENCE"
-
- SEBASTOPOL, CA--"Java Fundamental Classes Reference," the latest title
- in O'Reilly & Associates' Java documentation series, provides complete
- reference documentation on the core Java 1.1 classes.
-
- "Java Fundamental Classes Reference" goes beyond a standard reference
- manual. In addition to detailed descriptions of classes and methods, it
- offers tutorial-style explanations of the important classes in the Java
- core API. The first section of the book includes chapters that describe
- the ins and outs of strings and related classes, effective thread
- programming, and the use of the I/O classes. These chapters also
- include lots of sample code, so that readers can learn by example.
-
- The core classes addressed in "Java Fundamental Classes Reference"
- contain architecture-independent methods that serve as Java's gateway
- to the real world, by providing access to resources such as the network
- and the host filesystem. These classes also include utilities for
- working with strings, I/O streams, mathematical functions, vectors, and
- hash tables. The book covers the classes that comprise the java.lang,
- java.io, java.net, java.util, java.text, java.math, java.lang.reflect,
- and java.util.zip packages. These classes provide general-purpose
- functionality that is fundamental to every Java application.
-
- "Java Fundamental Classes Reference" describes Version 1.1 of the Java
- Development Kit (JDK) and includes:
-
- - Easy-to-use reference material on every core Java class
- - Tutorial-style explanations of important classes and examples that
- demonstrate their functionality
- - Detailed coverage of all the essential classes in java.lang,
- including Object, String, and Thread
- - Descriptions of all the I/O classes provided in the java.io package,
- including all of the new Reader, Writer, and object serialization
- classes in Java 1.1
- - Material on using the classes in java.util effectively
- - Coverage of all the networking classes in the java.net package
-
- "Java Fundamental Classes Reference" is meant to be used in conjunction
- with the "Java AWT Reference." Together, these two reference manuals
- cover all of the classes in the Java core API. "Java Language
- Reference" completes O'Reilly's core Java documentation set by
- providing a detailed reference of the Java programming language.
- These manuals comprise the definitive set of Java 1.1
- documentation--essential reference for any serious Java programmer.
-
- O'Reilly's Java series also includes a tutorial, "Exploring Java," and
- single-topic programming books that provide in-depth information on
- critical topics, an approach the company has perfected in the past ten
- years with their highly successful Nutshell Handbooks. "Java Virtual
- Machine," "Java Threads," and "Java Network Programming" are the first
- books on advanced programming topics. Upcoming Java programming books
- include "Developing Java Beans" (6/97) and "Database Programming with
- JDBC and Java" (7/97).
-
- # # #
-
- Java Fundamental Classes Reference
- By Mark Grand & Jonathan Knudsen
- 1st Edition May 1997 (US)
- 1114 pages, ISBN: 1-56592-241-7, $44.95 (US)
-
- ------------------------------
-
- Date: Wed, 11 Jun 1997 00:32:43 -0400
- From: "Evian S. Sim" <evian@escape.com>
- Subject: File 7--U.S. Agriculture Dept. web site closed after security breach
-
- Copyright 1997 Reuter Information Service
-
- WASHINGTON (June 11, 1997 00:08 a.m. EDT) - The U.S. Agriculture
- Department's Foreign Agricultural Service shut down access to its
- internet home page Tuesday after a major security breach was
- discovered, a department aide said.
-
- "It's a big, huge problem," Ed Desrosiers, a computer specialist
- in USDA's Farm Service Agency, told Reuters. "We can't guarantee
- anything's clean anymore."
-
- Someone broke into system and began "sending out a lot of
- messages" to other "machines" on the internet, Desrosiers said.
-
- The volume of traffic was so great, "we were taking down machines"
- and began receiving complaints, he said.
-
- "It's not worth our time to try to track down" the culprit,
- Desrosiers said. "Instead, we're just going to massively increase
- security."
-
- A popular feature on the FAS home page is the search function for
- "attache reports," which are filed by overseas personnel and
- provide assessments on crop conditions around the world. Although
- not official data, the reports provide key information that goes
- into USDA's monthly world supply-and-demand forecasts.
-
- It could be next week before the page is open to outside users
- again, Desrosiers said.
-
- ------------------------------
-
- Date: Tue, 10 Jun 1997 22:13:30 -0500
- From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
-
- Subject: File 8--French Internet Suit Dismissed
- Date: Tuesday, June 10, 1997
- Source: Reuters.
- Dateline: PARIS
- Copyright Chicago Tribune
-
- FRENCH INTERNET SUIT DISMISSED
- ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE
-
- The first test of whether France's disputed language law
- applies to the Internet ended in a fiasco Monday when a court
- threw out the case against an overseas branch of Georgia Tech on
- a technicality.
-
- Two state-approved watchdogs promoting the use of the French
- language had filed a complaint against the Georgia Institute of
- Technology's French campus for using English only on its Web
- site.
-
- The plaintiffs, Defense of the French Language and Future of
- the French Language, accused Georgia Tech Lorraine of breaking a
- 1994 law requiring all advertising in France to be in French.
-
- The Paris police court dismissed the lawsuit, saying the two
- private groups should have notified a public prosecutor first.
-
- The legislation, named after then-Culture Minister Jacques
- Toubon, was part of a battle to protect the tongue of Moliere and
- Racine from the growing international use of English.
-
- <...>
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.45
- ************************************
-
-
-