home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 66.0 KB | 1,355 lines |
-
- Founded By: | _ _______
- Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? are
- Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
- ------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
- \ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
- +---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
- | 01DEC90 | ___ ______ ___ ___ ___ FidoNet, et al.?
- | File 67 | ___ _____ ___ ___ ___ If so please drop us a
- +---------+ ____ _ __ ___ line at
- ___ _ ___ elisem@nuchat.sccsi.com
- Other World BBS __
- Text Only _ Network Information Access
- Ignorance, There's No Excuse.
-
- Network Thought Machine [3] & SNA Networks [1]
- Guardian Of Time/Judge Dredd/BBS Community
-
- -------------------------------------------------------------------------------
-
- "SNA Networks Part I" : Enterprise Systems Journal
- Judge Dredd
-
- SNA Support For Multivendor Environment
-
- IBM firmly believes that open, fair competition is the best way to ensure that
- the full potential of information and communications technologies is realized
- for the benefit of the customers. As evidence of that belief, IBM offers:
- - An open network design that encourages SNA attachments w/published
- interfaces.
- - Long-standing support for international standards, for example X.21, X.25
- and Open Systems Interconnection (OSI).
- - Practical help to ensure that customers can achieve information network
- goals.
- People who need to connect their IBM to non-IBM computer systems require a
- common method for communicating b/w these systems. Dissimilar hardware &
- software architectures and data encoding schemes require that the transfer of
- information b/w these systems be achieved by agreed-on communications
- procedures. This intelligent exchange of information and programs via
- process-to-process communications is called 'interoperability'. The method by
- which information is transferred b/w communicating systems over physical media
- is referred to as 'connectivity'.
- The following additions to SNA, support communications in a multivendor
- enviornment:
- - OS|/Communications Subsystem (CS) and OSI File Services
- - IBM's Transmission Control Protocol/Internet Protocol (TCP/IP) for
- mainframes as well as PC's.
- - The IBM Series/1 Programmable Communications Co-Processor
- - SNA Open Communication Archetectures (OCA)
- - Open Systems Network Support (OSNS)
- - Open Systems Transport and Session Support (OTSS)
- - General Teleprocessing Monitor for OSI
- - OSI X.400 Message Transfer Facility program and the X.400 offerings for
- DISOSS and PROFS
- - The IBM Series/1 EDX family of products
- - The AIX family of products
-
- Open Communication Architectures (OCA)
-
- The announcement of OCA described the SNA architectures that extend the SNA
- benefits into mixed IBM and non-IBM networks. Major goals:
- - Interconnect communications networks
- - Attach a variety of communications products to and w/in SNA network
- - Use of public data network facilities
- - Extend SNA-based services to a wide variety of attached components
-
- OSI
-
- In 1977, the International Organization for Standardization (ISO) established
- a framework for standards development to allow communications among systems in
- a multivendor environment. The definition of these standards led to the
- creation of an OSI reference model. Implementation of the model or the OSI
- open system facilitates communications between dissimilar systems which obey a
- set of communications rules, called protocols, independent of their internal
- architecture. OSI precisely defines these communication protocols and OSI
- standards make effective communications among systems possible.
- IBM is a strong proponent of OSI and has had OSI products since 1985. Its
- OSI/CS products are designed to work with other vendors' OSI implementations
- taking into account regional differences between North America, Europe and
- Japan. IBM OSI/CS products support the OSI protocols as specified in the
- following OSI profiles: US GOSIP, UK GOSIP, CEN/CENELEC and CEPT.
- OSI products achieve interoperability through similar conformance to the OSI
- standards. Conformance testing is done to demonstrate conformity to basic
- standards or profiles. Interoperability testing is done to ensure that the
- products of one manufacturer work with the products of other manufacturers.
- Both are required. Europe is playing a key role in conformance testing
- through the ECC-sponsored European IT Conformance Testing Services. Similar
- activities are underway in the US and Japan. IBM has offered an OSI
- Interoperability Verification Services through the IBM International Network
- Services (INS) in Europe since 1986.
-
- OSI, SAA And SNA
-
- By including the OSI protocls into the SAA Common Commmunications Support,
- IBM is extending the list of SAA software interfaces, conventions and
- protocols. This builds on the strengths of IBM SNA and SAA architectures to
- provide application solutions in a mixed SNA/OSI operational environment.
- Under SAA, SNA and OSI should be viewed as complementary communications
- protocols.
- SNA is the primary architecture for IBM-to-IBM networking. However, IBM
- integrates SNA and OSI into a cohesive network offering which allows the two
- to coexist and work together. OSI provides communications capabilities to
- allow customers to build mixed networks using multiple vendors' computing
- equipment.
- The OSI products are intended primarily for communications between IBM and
- non-IBM systems.
- In supplying OSI products, IBM is committed to providing value beyond
- conformance with the OSI standards. For example, the OSI/CS for MVS and VM
- program products provides network management via NetView. The NetView network
- management product allowss a NetView operator to manage both SNA and OSI
- networks and to manage both IBM and non-IBM nodes in an OSI network. The
- OSI/CS also uses the transport and data link control functions provided by the
- SNA, VTAM and NCP products. This use allows sharing adapters and connections
- by both SNA and OSI traffic. VTAM and NCP also participate in detecting and
- forwarding network management information to NetView for OSI systems which
- they also do for SNA systems.
-
- TCP/IP
-
- TCP/IP is a set of layered communications protocoles that were defined by DOD
- (US Department Of Defense) DARPA (Department Advanced Research Project Agencies)
- and have evolved. TCP/IP provides definitions of connectivity functions for
- both local and wide area networks. The collection of TCP/IP interconnected
- networks is known as Internet. Given proper authority, a user on any of these
- standard TCP/IP networks can communicate to users on any of the other TCP/IP
- networks. TCP/IP defines higher-level communications applications such as
- terminal emulation (TELNET), File Transfer Protocol (FTP) and Simple Mail
- Transfer Protocol (SMTP).
- TCP/IP implementations may allow connectivity between different vendors'
- systems but do not provide all the communication functions that a user needs.
- Each vendor's implementation and the set of functions supported must be compared
- by the customer to ensure their requirements are met.
- IBM has a large family of TCP/IP products:
- - TCP/IP for MVS
- - TCP/IP for VM
- - TCP/IP for PC DOS
- - The AIX family of UNIX products
- - TCP/IP for OS/400
-
- TCP/IP and SNA
-
- TCP/IP and SNA networks can coexist. The ability to interconnect TCP/IP
- networks over an SNA backbone is one example of that coexistance. Also, users
- of a TCP/IP network can logon to IBM SNA hosts using the TELNET facility and
- IBM gateway host with both TCP/IP and SNA installed. Additionally, IBM also
- provides application gateway function products to facilitate PROFS to SMTP
- mail transfer. Some customers will use TCP/IP and SNA network coexistence as
- their multivendor networking solution until the transition from TCP/IP to OSI
- has occured.
-
- TCP/IP and OSI
-
- TCP/IP is a layered architecture similar to OSI. Even though there is a
- varying number of layers in the two architectures, there are three areas in
- which they have similar functions. At OSI layers one and two, both TCP/IP and
- OSI support X.25, Token-Ring and Ethernet. At OSI layers three and four, TCP
- and IP layers perform functions similar to the Transport and Network Layers in
- OSI. Likewise, the OSI application-to-application functions (OSI layer seven)
- are comparable. Electronic mail (SMTP to X.400), file transfer (FTP to FTAM)
- and terminal emulation (TELNET to OSI Virtual Terminal protocol) are
- comparable in TCP/IP and OSI. In most cases, the OSI protocols are, or will
- be, richer in function than the TCP/IP equivalent.
- IBM is committed to supporting OSI standards as they evolve. However, many
- customers require interconnection solutions today that OSI standards do not
- yet address. To satisfy those requirements, IBM provides TCP/IP products.
- TCP/IP systems will eventually migrate to OSI.
-
- ISDN - History
-
- A different approach of utilizing heterogeneous networks could be based on a
- newly developed _international_ standard - Integrated Services Digital Network
- (ISDN). It is a public digital end-to-end telecommunication network
- supporting multiple services including, but not limited to, voice and data,
- leased lijne transparent service and so on. ISDN provides digital access to
- this network, allowing full utilization of the digital transmission over the
- user access line. ISDN networks are based on a 64Kbps data rate and are
- intended to supply current voice facilities, existing data services and a
- large number of new and extended facilities.
- Requests for these facilities are made on a common and extendable set of
- signalling protocols. This set of protocols should continue to grow as new
- facilities are added. Applications requesting high bandwidth services are
- connected (via the slow speed signal protocol requests) to high bandwidth
- transparent digital channels. The types of proposed facilities, utilizing
- ISDN, are basic telephone services, teletex, videotex, facsimile, packed and
- circuit switched data, electronic mail, transaction services, energy
- management, remote meter reading, remote alarm services, extended telephone
- services and enhanced services.
- The definition of ISDN as a public network does not preclude its use in
- private network architectures. On the contrary, it has direct relevance and
- applications to the PBX environment on customer premises.
- The evolution to ISDN is a natural consequence of the evolution of the
- telephone network. Originally the telephone system was used exclusively for
- analog voice transmission, but later these analog signals came into use to
- provide communication between electronic devices such as alarm systems. The
- introduction of modems allows a variety of digital services to communicate at
- a wide range of speeds, while the addiction of new data networks has
- facilitated the availability of a variety of data processing services. Each
- of these network services has required the definition of separate interfaces,
- protocols and lines to the customers' premises.
- During this time, the telephone network evolved from an entirely analog
- system to a mixed system including analog and digital components. In
- addition, high-speed digital trunks and digital switching were introduced.
- The digitalization of the network has reached customer premises only in some
- instances.
- The use of analog signals in the local loop necessitates conversion at the
- digital exchange (by the network provider) of the analog signal into digital
- and reverse to deliver it to the other end. In the case of data transmission,
- the customer must also convert his digital signal to analog prior to placing
- the signal on the local loop and then reconvert it to digital at the receiving
- end. The major advantages of using digital technology is end-to-end, high
- speed digital communication and performance (fast connection time and better
- bit error rate).
- Digital end-to-end data communication means a modemless world. So, the
- integration of voice and data transmission is the most economical solution to
- network providers and users. Digital voice is an easier format to compact and
- store to satisfy future office requirements. THe integration of voice and
- data seems to provide the most manageable and economical solution for the
- environment of the future, both home and office.
-
- ISDN - Principles Of
-
- The main feature of the ISDN concept is the support of a wide randge of voice
- and nonvoice applications in the same network. A key element of service
- integration for an ISDN is the provision of a range of services using a
- limited set of connection types and multipurpose user-network interface
- arrangements. ISDN supports a variety of applications, including both
- switched and nonswitched connections. Switched connections in an ISDN include
- both circuit-switched and packet-switched connections and their
- concatenations.
- The major motivation for a migration to ISDN is that ISDN will offer more
- reliable and enhanced services, moxed voice and data, more bandwidth and fewer
- interfaces than existing telecommunication lines at the same price or lower.
- ISDN will maximize economy and flexibility. Working toward the goal of ISDN
- is a worldwide effor steered by the CCITT (Consultative Committe on
- International Telegraph and Telephone), which initiated the ISDN I Series
- standardization work.
-
- ISDN - Components Of
-
- The major components of an ISDN are user-to-network interface, information
- channels, signalling protocols and communications mode.
- *User-To-Netork Interfaces
- There are two user-network interfaces presently defined for ISDN applications
- -- the basic interface and the primary rate interface. The basic interface
- provides for network access by either small business or residential users.
- Its allows for one of three access arrangements: 2B plus D, B plus D or D
- channels. In each case, the D channel operates at 16Kbps transmission rate
- and the B channel at 64Kbps. The access capacty provided to end users will
- depend on subscriber loop transmission capacity. It may vary from country to
- country.
- The primary rate interface provides for network access by Private Branch
- Exchanges (PBX), LAN gateways and other user nodes such as communication
- controllers and clusters. The primary rate interface is based on existing
- multiplexing hierarchies (which are 1544Kpbs in Canada, Japan and the US and
- 2048Kbps in Europe). It can consist of B plus D channels, 23B plus D channels
- or 30B plus D channels where the total transmission rate for the primary rate
- interface should not exceed 1535Kpbs (Canada, Japan and US) or 1920Kbps
- (Europe). The D channel for this interface operates at 64Kbps.
- *Information Channels
- ISDN provides two types of channels. One is a user information transfer
- channel, which carries user information at the transmission rates of the
- channel. Several rates have already been defined for these channels, also
- called clear channels:
- -B Channel -- a 64Kbps channel
- -H0 Channel -- a 384Kbps channel
- -H1 Channel -- a 1536Kbps channel in Canada, Japan or US or 1920Kbps Europe
- The other is the user-network control channel, also called the D channel,
- carrying mostly control or signalling information between the end user and the
- network. In some access configurations, packetized user user data may be
- interleaved with signalling information. In such a case, the D channel
- becomes a user information channel.
- Additional channels, at transmission rates ranging from six to 140Mbps, are
- sometimes referred to as broadhand channels required for a broadhand ISDN.
- The are also called high bit rate services.
- *Signalling Protocols
- Signalling protocols are based on an out-band technique (separate channed) and
- message-oriented structure evolutionary from High Level Data Link Control
- (HDLC). Message-oriented signalling allows for the provision of
- additional/sophisticated functions which may reside either in the network
- domain or on the user's premises. Signalling protocols have a key
- characteristic -- they are common channel protocols. Currently, voice and
- data calls are considered to be separate entities by terminals and networks.
- Common channel signalling, in contrast, integrates voice and data shcemes.
- *Communications Modes
- There are three communications modes possible for user information transfer.
- Circuit-switched mode provide and end-to-end digital connection at the
- transmission rate of the selected channel (B or H). The channel may be either
- transparent (granted integrity of the bit sequence) or suited to a particular
- application such as telephone service where compression may occur withing the
- network.
- Packet-switched mode provides two possibilites for sending user packets: via a
- user-information channel (B or H) or via the user-to-network control channel
- channel (the D channel) interleaved with signalling messages. The last,
- semi-permanten/permanent, refers to a user-information channel (B or H) which
- uses a preset path through the ISDN network. Both network transmission and
- switching resources could be used.
-
- ISDN - Service Aspects Of
-
- ISDN networks will support a wide range of services. The purpose of the
- Consultative Committee of International Telephone and Telegraph (CCITT)
- I-Series Recommendations is to provide classifications of the methods for
- description of such services as well as to give a basis for the definition of
- the network capabilities required by ISDN. Services supported by ISDN are the
- communication capabilities made availible to customers by telecommunication
- service providers.
- ISDN provides a set of network capabilitites which are difined by
- standardized communication services to be offered to customers. A service
- provision by the network provider to a customer connected to an ISDN may cover
- all or part of the means required to fully suupport the service.
- Telecommunication services are divided into two broad catagories. Bearer
- service provides a capability for the transmission of signals between
- user-network interfaces. It offers the connection to the network and covers
- layers one to three of the OSI reference model. Telecommunication service
- provides the complete capability, including terminal equipment functions, for
- communication between users according to established protocols. It offers
- connection to the network and covers layers one to three of the OSI reference
- model and layers four to seven also.
- -JD/NIA
-
- ------------------------------------------------------------------------------
-
-
- LOTUS CDROM
- (anon)
-
- Lotus Development Corporation has a new product due out in 1991, called
- "Household Marketplace." It's a database on CDROM. It has the estimated
- income and a profile of the buying habits of 120 million US residents.
- That's a high percentage of the US population -- the odds are pretty good
- that YOU are in the Lotus database.
-
- A Lotus spokesman has said that the company is concerned about privacy
- issues, so to help prevent misuse of the data only legitimate businesses
- can get the disk. With easy access to a laser printer, a POBox, and/or a
- fax machine, however, it is hard to see how Lotus can determine the
- legitimacy of anyone, however, and I'm sure that with minor effort almost
- anyone will be able to purchase Marketplace. The cost, by the way, is
- under $1000 with quarterly updates available.
-
- The database does not contain any of the data covered by the Fair Credit
- Practices Act so Lotus is under no legal obligation to let you see what
- they are saying about you. In fact, during interviews they have said that
- there is NO WAY for an individual to review their personal data, nor are
- there any provisions to make corrections on what is recorded.
-
- Lotus will remove anyone from their database who writes to them.
- Send a letter to:
-
- Lotus Development Corp.
- Attn: Market Name Referral Service
- 55 Cambridge Parkway
- Cambridge, MA 02142
-
-
- ---
-
-
- Attention all Hackers, Journalist, and Federal Agents,
-
- A new board has been opened up to the Computer Underground Society:
-
- FACE to FACE @ 713 242 6853
- Phrack distribution!
- Home to Network Information Access
- ______________________________________________________________________________
-
- This Bulletin Board System is designed to open a new era-- the era of
- the 1990s Computer Underground. Security Agents, Journalists, and Hackers from
- all over the country are invited to call in an attempt to carry on intelligent
- conversation. It's a pure communications medium between the two sides. Access
- is guaranteed to anyone who may wish to call. As you might know, the new
- Phrack is out, and is available at F2F.
-
- --**-- News Flash:
-
- Phrack Classic 33 is scheduled to be released before
- Christmas! As of yet though, no exact date has been set in stone. However,
- Phrack is accepting submissions openly-- you may send them to any of the
- following addresses:
-
- pc@well.sf.ca.us
- phrack@nuchat.sccsi.com
- FACE to FACE BBS @ 713 242 6853
-
- [::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::]
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "MODEM BLUES : NUCLEAR GERBIL"
-
- Well, I got my modem
- Just sixteen
- 1200 baud, y'know what I mean
- I could hack into Randall's with that
- And I learned other nifty crap
- Like how to make people think I'm cool
- A five-page ANSI signoff to make you drool
- I love my modem and my ego, too
- And good warezzzz make me want to spoo!
- But, ask me to post what I'm thinking about
- I laugh at you to try and figure me out
- I'm into door games, downloads, chat lines too,
- But posting intelligently I can't do!
- 'Cause I'm a 'm0e'
- And I've got the
- 'Houston m0dem blues'...
-
- (solo)
-
-
- Thank you, thank you, fuck you all & goodnight.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- >From :Averon #59
- To :Guardian Of Time #21
- Subject :Privacy..?
- DateTime:5:31 pm Mon Nov 12, 1990
-
- Yep.. my point exactly. The government considers itself above the law,
- therefore pays only marginal lip service to procedures. If the SS can get
- away with terrorizing some folks who scare easily, then it WILL.
-
- It doesn't matter who's right and who's wrong.. if you are wrongly accused of
- criminal acts, YOU pay the price. Defense is expensive, court/jail time is a
- drain on your physical/mental energies, society NEVER forgives, even if you
- are acquitted. How can you possibly explain away all those federales pawing
- thru your stuff, the flashing blue-and-whites in your driveway, your neighbors
- being questioned? "Yeah, sure you're innocent.. what'd you REALLY do? Bet
- you plea bargained with them, eh?"
-
- Sundevil is a pre-emptive first strike against perceived criminals; the goal
- is not to round up some collosal gang of hackers, rather its sole purpose is
- to confiscate equipment, strike fear in the hearts of those who are borderline
- illegal, and grandstand for the media. Equipment is rarely returned, and when
- it is, it's often damaged and unusable. The non-computing public is willing
- to let these "hackers" suffer because they don't understand! If it was
- Nintendo games and Acura Integras being rounded up, things'd be different...
- but the publicity has been unfairly stacked.
-
- We are living in an age of "Wars": War on Drugs, War on Free Speech, War on
- Pornography, War on Hackers... what's next?
-
- See you behind the barbed wire.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- THE STATE OF NATIONAL SECURITY -- HOW MUCH WE (DON'T) KNOW
- By Sir Lawrence
- Transcribed and Edited by Lord Macduff
-
- I have been a member of the modem community for about seven years.
- During that time period, I have watched literally hundreds of bulletin boards
- go up and go down. A great majority of these systems were based on a public
- message and file exchange. But a few of these systems were dedicated to the
- exchange and distribution of information... Information that was not usually
- available on a regular basis. In my day, I have seen files on VAX/VMS, phone
- switching systems, hacking, phreaking, and anything else that one could dream
- of. But one thing that constantly has me pondering at all hours of the night
- is the state of our national defense.
- How close and how often do we come to pressing the button? Defined as
- DEFCON-1, the state of panic which is actually sub-defined as World War III,
- is something that has not been reached... yet.
- There are five levels of International Status. DEFCON-5 is what we'd
- all like to be at... unless you're a real nut case and have absolutely no hope
- for the future of mankind. DEFCON(s) 4-1 are lesser states of "panic". A dumb
- reference, yet a valid one, is the movie "Wargames". Although a liberal dose
- of fiction was mixed in as far as the actual methods of hacking and such, it
- makes one think "Just how often DO hackers break into systems like that and
- cause problems possibly leading to the destruction of the world?" [Editor's
- Note -- Not as often as certain federal agencies would like to think. Go
- catch some REAL criminals instead of picking on us modem users...]
- Another question that comes to mind is "How often do Soviet troop
- movements or something of that nature cause a defcon decrease to bring us to
- the brink of global extermination... and the public never knows about it?"
- During the Kennedy Administration, this country was brought to what is the
- equivalent of DEFCON-2 when the Soviets brought their missiles into Cuba in
- the early 1960's. From what transcripts say about the incident, we were
- seconds away from DEFCON-1... what a pisser, huh? Although that happened seven
- years before I was born, my generation would have taken it with a grain of
- salt and looked at it as a chance to get a tan. (A real good one, I might
- add...) Our country goes seconds from World War III and we never found out
- until years later. How often does this happen? Personally, I'd like to know
- when Vodka is going to replace Coca-Cola as the national beverage. I'd also
- like to know when fish eggs are going to be put on the menu at fast food
- joints.
- At this very moment [4:27 AM on Sunday, November 11, 1990 if anyone
- is curious... -Ed.] United States and Allied troops are in the Middle East
- preparing for war. The media reports that all the troops are over there just
- sitting around bored to death. [Yet another Editor's Note -- Due to a time
- control problem, I will finish this essay instead of Sir Lawrence...
- Apologies for the interruption.] It's very possible we could have another
- Vietnam on our hands. Hell, Saddam Hussain is not going to stop with the
- invasion of Kuwait... There's a very interesting parallel between Hussain and
- a short German guy who started World War II... I'm not so sure why everyone's
- worried about German Reunification -- It's the Iraquis we SHOULD be worrying
- about! Hussain insists that the American citizens that he is holding hostage
- in various hotels in Baghdad are "Guests". We might do well to round up every
- last Iraqi citizen in this country who has a visa or green card and stick 'em
- all in ONE Motel 6 somewhere in the midwest. Let Tom Bodett deal with them for
- a while... Perhaps the CIA could go blow up some of their planes or important
- buildings... Goodness knows they've done the same to us enough times to make
- the average citizen want to puke. If we hurry up and storm the place NOW,
- before Saddam figures out how to put together that mail-order nuclear bomb,
- we could take the whole place over in a matter of days. We could use that oil.
- The weapons manufacturers would make a fortune, prehaps even create new jobs.
- Our economy could USE a boost, with the gas prices what they are. [Sidenote:
- Who's to say that Exxon isn't financing Saddam Hussain?] Sell the entire
- country to Russia for them to use as parking, for that matter.
- The projected costs for Operation Desert Shield are in the billions,
- while it has accomplished virtually nothing. Truly another case of YOUR TAX
- DOLLARS AT WORK.
- But who's to say if this is for real? This may be a conspiracy by the
- oil companies (who secretly own the government) to make more money. The
- government controls the media, which is our only source if information from
- over there. Small wonder they want to supress publications like PHRACK...
- They aren't from the government-controlled media.
-
- SUPRESSION BREEDS REVOLUTION
-
-
- NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "WHEN WILL MACHINGS BECOME INTELLIGENT - MARK ROBERT THORSON"
-
- When will machines become intelligent? What will the transition be like?
- I see three possible scenarios:
-
- 1) Sudden introduction of machine consciousness technology. This could be
- a result of some essential feature of intelligence, some sort of critical
- mass, which comes into being suddenly. For example, if consciousness
- required the supernatural entity commonly known as a "soul", consciousness
- would not be demonstrated until we build the first machine which is a
- suitable vehicle for a soul. When the soul takes possession, consciousness
- suddenly results.
-
- Alternatively, consciousness might require some period of introspection
- or self-teaching. Pre-intelligent machines would be unable to enter
- this positive feedback loop. The first intelligent machine would
- puzzle its inventors by going into a meditation state for a while, then
- POW! ... "I think therefore I am!"
-
- 2) Gradual introduction of machine consciousness. In this scenario, the
- definition of intelligence is very blurred. The last people who will
- admit that machines are intelligent will be the machine-builders themselves,
- because they understand the inner workings and see the machines as
- mechanisms. There will be a gradual continuum of intelligence up to
- the most sophisticated programs, which are likely to be video games
- and management information systems. The upper range of this continuum
- will advance slowly, but will eventually reach the level of machines
- which seem obviously intelligent when viewed by the lay public.
-
- A likely side-effect will be a generational break between two generations
- of programmers. There will be a generation of old geezers who insist
- machines are not intelligent because they understand all the tricks
- machines use to fake intelligence. And there will be the younger generation
- who understand that faking intelligence is actually the same thing
- as intelligence.
-
- 3) The entry of intelligence into practical use is undiscovered until some
- point after the fact. Machines which seem "obviously machine-like" but
- which contain some elementary features of reasoning become common tools.
- It's only years later that some creative person invents definitions for
- intelligent behavior which make it clear that we've really been using
- intelligent machines all along without seeing (or at least acknowledging)
- it.
- It will be this conceptual framework which will snap us into a sudden
- awareness that intelligence has been achieved, or perhaps that
- intelligence is a certain quantity which our machines possess in a
- small degree and which our brains possess in some larger degree.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---
-
-
- "MARK ZENIER : CYBERPROBLEMS IN ALT.CYBERPUNK"
-
- In article <1990Nov20.020910.18823@ddsw1.MCS.COM>, (Sameer Parekh) writes:
- >
- > I think that some of the Chatsubo organizational materials should
- > be posted here for lack of another newsgroup. (And another one to organize
- > Chatsubo would be pointless.) If these materials were posted in
- > alt.cyberpunk.chatsubo, they would destroy the continuity of Chatsubo.
- >
- > Here we should post the framework of Chatsubo. I know that
- > Chatsubo should in itself be basically anarchic, but what would happen
- > of say, someone decided to kil someone else, yet that person did accept the
- > death. That is the reason for a basic framework.
-
- First some history for folks in alt.config.
-
- Around the start of November, a participant in alt.callahans decided
- to create a new milieau based on some of the new trends in science
- fiction. She did this in the newsgroup devoted to the discussion
- of this, alt.cyberpunk. She also invited a bunch of her friends
- to join in.
-
- Some of us existing readers of alt.cyberpunk were less than
- overjoyed that the newsgroup was being turned into a costume
- party version of soc.singles. Especially when some of these
- new people said they weren't going to leave. Fortunatly, the
- newsgroup alt.cyberpunk.chatsubo was created as a refuge for
- these poor lost souls. (Even if they are a little scorched around
- the edges.)
-
- Now, you want to hold the metadiscussions about alt.cyberpunk.chatsubo
- in alt.cyberpunk.
-
- Sorry, I'm not interested in who did what to whom, and what
- color the wallpaper should be.
-
- You have two options:
- 1. Get some discipline in your subject lines so that the metadiscussions
- can take place in alt.cyberpunk.chatsubo. (The lack of such discipline
- in the first round is the main grievance against the Chatsuboites)
- I suggest including the keyword "Metadiscussion" in the subject line.
-
- Or if that is too obtrusive:
- 1. Create a new newsgroup (alt.cyberpunk.chatsubo.backstage,
- alt.cyberpunk.chatsubo.d, ...)
-
- I don't care where you play your role-playing games, just as
- long as it isn't on top of someone elses newsgroup.
-
- markz@ssc.uucp
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "HOW TO HAVE AN INTELLIGENT COMPLAINT W/OUT RESORTING TO JUNIOR HIGH
- SCHOOL LANGUAGE : MICHAEL RASMUSSEN"
-
- >I've begun to notice that a certain fraction of postings are now these
- >long, rambling, literary creations. I don't think this is the best way
- >to discuss the literary and prognosticative matters involved with
- >cyberpunk.
- >
- >believe this to be primarily a discussion group about the literary
- >form known as cyberpunk, and topics directly related to it. Postings
- >that are "in the cyberpunk mode" are related in a superficial way
- >--
- >erich@tybalt.caltech.edu or try erich@through.caltech.edu
-
- The brown leather jacket goes along for the ride as its wearer goes up to
- the bar. He notices one of the crowd complaining about how the talk flows
- in here. "erich" seems disturbed that having crossed the threshold of an
- area labeled Interface he is mired (??) in an interface.
- "Barkeep," and Michael holds out a bill for another drink.
- "Paid for." replies the bartender.
- "Wha? well in that case give me one of whatever, whoever bought when they
- paid for mine." He starts to think about art school, and the arguments about
- critisizing work by talking about it and critisizing work by doing work which
- shows how you think it ought to be done. How it's one thing to say that
- straight or traditional photography was boring, that something new was needed;
- and quite another thing to demonstrate your belief by creating non-boring, yet
- understandable work outside of those streams.
-
- The barkeeper interrupted the thoughts by setting down a pitcher of saki with
- a traditional cup and a matching teacup. Michael's quizzical expression was
- returned with a small knowing grin. A sniff tells that the saki is excellent.
- "You have regulars with good taste I see," he says to the bartender as he lays
- own a tip.
-
- "Erich, how can postings 'in the cyberpunk mode' be 'related in a superficial
- way' to cyberpunk mode? They are examples of the mode at work, showing its
- strength and weakness in the most direct and verifiable mode available.
- You seem put off by the mehtod, I would guess that you would travel across
- Montana on the interstate, or in a plane, and miss the wonders of the great
- northern plains that using the roads that follow the Lewis & Clark trail can
- offer. Or closer to home for you, a trip to San Francisco would be on one
- of the "we take off every hour" flights, instead of up 101. Quick, to the
- point, and devoid of involvement.
-
- That's your choice. But we've been labeling our road as Interface, you don't
- have to take the exit (detour?). If you choose to join us remember that we
- are involved here, and we want to argue our points by example instead of
- abstraction.
-
- Well in any case, Some benefactor has provided me with saki and two cups.
- Would you like some?"
-
- Michael sits down, pours the warm fluid with an air of reverence and takes
- a sip from the cup he has chosen for himself. He looks at Erich and settels
- down into the overstuffing of the armchair.
-
- "Pirsig talks about quality in Zen and the Art of Motorcycle Maintenance.
- Quality as a distinct entity. Our quality is cyberpunk by example. Though
- at first glance it seems 'rambling' you may find that it is the direct route
- to discovering the limits of our tools today. Metadiscussions just don't
- seem to fit the bill, to me at least."
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "LEST WE FORGET OUR DAYS OF BOXING : LEN VISHNEVSKY"
-
-
- > I used to see plans of boxes all the time. Does anyone remember the
- > blotto box? It seems that someone had the impression the FBI used a
- > method called lock and trace, which kept the voltage on your phone
- > line at a high level, so they g-men could trace you and you couldn't
- > disconnect the line (i.e. hang up) The blotto box was designed to
- > play a radio or some other electric device to lower the voltage and
- > disconnect the line before you were traced. Does any of this seem
- > even remotely real? Obviously with ess you can be traced instantly
- > now, but what about 5-10 years ago?
-
- It was true 5-10 years ago. They would raise the voltage of your line
- to 90v or so, which made a loud noise in your ear and *kept* the phone line
- open. Try to hang up and the phone would ring again. You might not be on
- the line, but your path would stay open.
-
- The Blotto Box was simple: Connect the red/green wires to an AC outlet
- and plug your light in. This would use up all the power, supposedly. Also,
- supposedly, they tried to compensate by increasing the power, which the
- light bulb promptly ate up. In the end, the FBI computer would melt from
- generating that much power. But the phone line's fuses would blow before
- that would *really* happen, thus disconnecting your path.
-
- I think this method of trace, at the fastest, took 10 seconds. Plenty
- of time to unplug your light and put it on the line. But you've got to
- know you're being traced...
-
- So you stick a voltmeter on your line. This became kind of popular.
- Since old kludgy bugs and taps used to drain power from your line, you not
- only knew when someone was tracing, but when someone was tapping. But it
- was only a tool for the paranoid, since how many people actually got traced
- this way?
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Message # 31 of 40
- Subject: Hi etc...
- From: [MODERATED]
- To: ALL
- Sent: 11/21/90 at 7:58 pm
-
- Hi, all.
-
- Yeah, I really want to see some people from the Establishment log on. Then
- this place should start a-movin'.
-
- I dunno about Sun D II, some people in the in 415 area code - have been
- busted. The thing that bothers me the most is, as usual, the methods. If
- these boys had been ANY other type of criminal, they would have been treated
- more fairly (ok, with the possible exception of any criminal who happens to be
- black - the get treated as porrly much of the time).
-
- And if any of you all seemingly nonexistent security folk wanna refute that,
- let's talk.
-
- But I think the statement that indicates the levels that are currently being
- stooped to is that we might get our phone lines tapped (TAPPED!) for legally
- calling this completely legal BBS.
-
- But hey - just another bit of evidence that the US is discarding its original
- Constitution for one more sympathetic to, say, Nazi Germany's.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 32 of 40
- Subject: SD II
- From: [MODERATED]
- To: ALL
- Sent: 11/21/90 at 8:39 pm
-
- Uncensored was making a big thing out of 9-12 supposed busts in New York. I've
- made a few phone calls trying to find out how true it was, but no ones
- talking... CLLI Code went down at about that time though, so there might be
- some truth to it....
-
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
- Sub-Board: Operation "SunDevil"
-
- Message # 14 of 19
- Subject: naughty stuff
- From: [MODERATED]
- To: ALL
- Sent: 11/21/90 at 8:11 pm
-
- So, you think maybe people would eventually come to their senses?
-
- A judge in Oakland seems to have authorized a wiretap because person a, who had
- been convicted of illegally entering a computer and... changing a Christmas
- mailing list, had person b's name and phone number amongst his hacking notes.
-
- In fact, the police not only got the original search warrant for person a
- because ONE company had his number traced ONCE, but got a warrant for person b
- and, after failing to find anything incriminating, got the tap for person b.
-
- Sure enough, person b had a knock on his door a few days ago.. but that's not
- the point. Even gangs in San Francisco get better treatment from judges.
-
- OK. Enough ranting.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 42 of 78
- Subject: Re: Why...
- From: [MODERATED]
- To: [ Anonymous ]
- Sent: 11/23/90 at 5:58 pm
-
- I can answer that at least in part since I work for a corporation and my
- job is to stop 'hackers'. I mean this in the prevention sense rather
- than by working with the cops but I've done that also. In a sense some
- of you have created me -> by attacking computers that are necessary to
- our business, you have created fear and anger in the part of management.
- This has led to desire for punishment and revenge which is not surprising
- to any student of psychology.
-
- This has even affected me to some extent as sometimes I see myself as
- the handle implies, a wizard but sometimes I see myself as a cat,
- watching a mouse hole, looking for a nice meal of mice. After all,
- if you poke your head thru the hole, you are responsible for your own
- actions.
-
- Now, I do feel that there has to be balancing in sentencing and that
- someone convicted for serious crimes, whether white or blue collar
- ought to get much more severe sentences than tresspass-class cracking
- but system crashing and repeat offences are another matter.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 46 of 78
- Subject: General
- From: [MODERATED]
- To: ALL
- Sent: 11/23/90 at 11:38 pm
-
- After a few years of leaving the computer "underground" and heading out
- into the world of business computing, I feel that I have seen both sides of
- what is supposed to be the "law". Why do I get the funny feeling that the
- further that I delve into the "legal" side of it, the further I get away from
- what is really the truth and is more moral than the so-called legal users of
- the system.
-
- Okay, so I may seem to have some contempt for the system. About four
- years ago, I belonged to a group known simply (hah!) as "Omnipotent, Inc." We
- really didn't think of ourselves as a "hacker ring" since we were rarely
- involved in hacking outside our own little world of suburbia hidden away
- somewhere in 713. Then one day the roof came crashing down on us. Of the
- original seven members. Two were arrested three (including myself) were made
- to pay for "damages" done to school computers and business computers and
- long-distance services. The rest of the members I have not been in contact
- with since that time. The two that were arrested were given probation and the
- usual community service since the charges were not viewed as being serious.
- However, the scary fact is that the poeple that were investigating this
- so-called "hacker group" (these are direct quotes from a Southwestern Bell
- Security employee) had no idea of the extent of what was really happening. The
- investigation, if there ever was truly one, must have been a half-assed job
- that truly didn't check to see if we were behind half the things that were
- going on.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
-
- Sub-Board: FACE to FACE
-
- Message # 53 of 78
- Subject: Re: General
- From: [MODERATED]
- To: [MODERATED]
- Sent: 11/25/90 at 4:24 am
-
- first, call me sometime, i think your mind is going..
-
- about msg #51.. i seriously doubt any company is losing any appreciable amount
- to hacking. I understand that some might feel the information is too sensive
- and invest to prevent it from getting out. Of course, they could also keep on
- withe the southern bell estimates of $200K to change passwords.. boy, sure
- would like to be the person who did that.. 'bout 50K an hour..
-
- about msg #52.. in most of the cases about hackers you hear about, no damage is
- ever actually done, by normal standards. problem is what the companies
- consider damage, ie use of computer time & resources..
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 61 of 78
- Subject: Jerry Crown!
- From: [MODERATED]
- To: ALL
- Sent: 11/26/90 at 12:42 am
-
- Hey, man, what's up?
-
- So, what can we learn from your post - if, as I assume as well, it is genuine?
-
- We know of your ego; not to offend, mine is pretty immense too, but it isn't
- just anyone who'll come right out and say "I AM Big Brother and I know where
- you live!" And we have yet another bit of evidence that that is the way the
- "powers that be" think - we're mice.
-
- We know a little - not much, yet, maybe talk to us? - of what you do. You log
- on to boards under, I am assuming, false pretences, to... what? Talk to us,
- eh? I can assume you do it to catch people abusing GTE's telecomm. services
- (Sprint and the erstwhile Telenet), but then for what do you care about us?
-
- My questions to you -
- 1) What exactly is it that you do?
-
- 2) Why - both personally (does it excite you as much as it did Stoll?)
- and as a corporation (how much cash does Sprint claim it loses, how
- much does the extra electricity really cost y'all?)
-
- 3) My biggest question - what is your moral analysis of the situation?
- What is your opinion of the various crimes you investigate, from
- code fraud to cracking systems via x.25 nets?
-
- [SORRY LOST THE REST OF THIS MESSAGE -- GUARDIAN OF TIME ]
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 70 of 78
- Subject: Re: Why...
- From: [MODERATED]
- To: [ Anonymous ]
- Sent: 11/26/90 at 8:03 am
-
- The reason the pheds are cracxking down is because of a statistic I heard over
- the weekend.
- The average bank robbery net $5000.00
- The average computer crime nets $300,00
- It explains a few things. Hacking for profit is not exactly the most "ethical"
- things to do. In, fact, hacker by definition do not hack for anything other
- than knowledge and challenge.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
-
- Sub-Board: FACE to FACE
-
- Message # 73 of 78
- Subject: Re: General
- From: [MODERATED]
- To: [MODERATED]
- Sent: 11/26/90 at 1:28 pm
-
-
-
- You are quite wrong does the word Industrial Espionage ring any bells? How
- much would coca cola lose it their formula got out? They are ver very
- protective of that I even doubt they'd prosecute I assume they would call up
- Jake or Myer Lanski and kill. As to loses yes it does happen on a large
- degree but not by us. Individuals who destroy for a living are to blame, and
- wse end up as the scapegoats. As for the governments interest in hackers fear
- is what comes to mind if you don't understand something kill it or get rid of
- it. That has always been the theory, and because hackers have power to pry
- where they shouldn't we might learn of some nasty thing thier doing that we
- shouldn't know about i.e. using human beings off the street for bio and
- chemical weapons tests. Or do you think the mighty US mass produces chemical
- and biological agents without first testing them out on people to be sure they
- work? Enough of that I just prefer honesty not lies from our government. The
- old cliche "Practice what you preach" comes to mind right now. As for the
- constituition it's NOTHING, but a worthless piece of paper noone cares at all
- look at Noriega. They bugged conversations between him and his attourney,
- disallowed him to take out funds to pay for his trial, etc...
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: FACE to FACE
-
- Message # 78 of 78
- Subject: Re: Re: Sprintdude
- From: [MODERATED]
- To: [MODERATED]
- Sent: 11/26/90 at 9:53 pm
-
- I dont think anyone is trying to turn this into a rag fest.. Its just
- extremely hard to believe that someone who has supposedly been involved with
- security investigations as long as he claims to have been would be a little
- more mature in his postings.
-
- The security/law enforcement/etc field is SUPPOSED to have an unbiased opinion
- concerning matters that pertain to their work. Just like the press. That is
- how they supposedly come up with their "professional" opinions. In the case of
- our friend Mr. Jerry here, he seems to have a personality problem, or perhaps
- its just a lack of professionalism. Personally, I dont think he is involved in
- security. Someone mentioned the idea of a plant, or just some "kid" having fun
- pretending to be Mr. Big-Bad-Security-Agent. Anyone who has been involved with
- security that long should at least be professional.
-
- Well...Thats my $.02.
-
- "Little, yellow, different, better."
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Sub-Board: Operation "SunDevil"
-
- Message # 30 of 31
- Subject: Re: stuff
- From: [MODERATED]
- To: [MODERATED]
- Sent: 11/26/90 at 3:09 am
-
- Search affidavits and warrants tend to be canned "cliff notes" type of things,
- and they generally list things like books, notes, cassettes, and anything
- electronic that looks suspicious. The raiders are generally not knowledgeable
- and go a bit wild (see Len Rose, Steve Jackson, Doc Cypher, etc). In one raid
- they took a copy of Gordon Meyer's M.A. thesis. They've taken answering
- machines, telephones, and even private letters and paper unrelated to
- computers belonging to others. Educating judges and other about what's
- reasonable and what's not is one goal....next they'll be taking the
- microwave and refrigerator.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "CHATSUBO CHATSUBO WHY CAN'T WE HAVE A CHATSUBO: LEFTY"
-
- In article <1990Nov20.020910.18823@ddsw1.MCS.COM> zane@ddsw1.MCS.COM
- (Sameer Parekh) writes:
- > I think that some of the Chatsubo organizational materials should
- > be posted here for lack of another newsgroup. (And another one to organize
- > Chatsubo would be pointless.) If these materials were posted in
- > alt.cyberpunk.chatsubo, they would destroy the continuity of Chatsubo.
-
- I think you're sadly mistaken. I didn't want your Creative Writing 101
- assignments in here in the first place, I'm certainly not interested in
- the supporting material.
-
- As far as the "continuity" of alt.cyberpunk.chatsubo is concerned, that's
- _your_ worry.
- > Here we should post the framework of Chatsubo. I know that
- > Chatsubo should in itself be basically anarchic, but what would happen
- > of say, someone decided to kil someone else, yet that person did accept the
- > death. That is the reason for a basic framework.
-
- Keep it _out_ of alt.cyberpunk, please. This is _not_ what I subscribe to
- the group for.
-
- Here's a good idea. Maybe Tim and I can come in with blasters, and kill
- everybody...
-
- > One idead for the framework that I have regards the bartender.
- > I think that he/she can have an active role, but not _too_ active.
- > What I mean is that he/she can act and do things, but they mustn't be
- > very active actions. (now THAT is one COHERENT sentence) People when
- > they post should make the bartender do things, and respond, and the like,
- > but the actions shouldn't have a drastic effect.
- > (I hope this last paragraph was understood)
-
- Just about as well written as most of the other examples of this ilk I've
- seen.
-
- > Well, seeya there.
-
- Not on a dare.
-
- --
- Lefty (lefty@twg.com) | "And you may ask yourself,
- D:.O:.D:., C:.M:.C:. | 'How do I work this?'"
- End of article 4821 (of 4826)--what next? [npq]
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- "LANGUAGE THE REAL THING: MARK ROBERT THROSON"
-
- Language is first and foremost the reproduction
- mechanism for memes. A meme (as defined by Dawkins in
- _The_Selfish_Gene_) is an individual particle of
- culture, just as a gene is an individual particle of
- genetic inheritance. A meme can be an individual
- thought, such as "soup is good food" or a complex of
- thoughts, such as a religion.
-
- Language is how memes jump from person to person. On
- the transmit end, the language organ photographs a
- portion of the network of crystallized intelligence and
- encodes it for shipment. On the receive end, it decodes
- the package and temporarily installs it into the
- corresponding place in the receiver's network. The code
- is free of the context of the transmitter and receiver.
- For example, if I say "This tastes like fish." that
- would seem like a good thing to a receiver who likes
- fish, or a bad thing to one who doesn't. I.e. the
- message doesn't carry the context with it unless it is
- specifically encoded, as in "This tastes like -- yuck --
- fish.". (Voice inflection can transmit the same
- information, but that is just another form of specific
- encoding of the context.)
-
- I can tell you anything in my conscious mind, from why I
- don't eat pickles to why I don't go to church.
- Likewise, I can input almost any idea from you. I might
- not agree with the truth or falseness of what you say,
- but I can try it on for size. I can map it into my
- network and see if it fits.
-
- Somehow, the language organ is like some sort of robot
- arm, with random-access pick-and-place reach into
- arbitrary places in the network, as illustrated below.
-
- * - * * - * - * - * * - * - * * - * - *
- | | | | | | | |
- * - * - * - * * * - * - * - * - * * - *
- | | | | | |
- * - * - * - * * - * - * - * - *
- | | |
- * * - * *
-
- (*)
- -------------- /\ V
- | Language | / \ |
- | Encoder/ |_/ \|
- | Decoder |
- --------------
-
- How could an organ have such all-invasive access? It
- could selectively activate individual particles of
- crystallized intelligence using an address bus. For
- example, when the address bus for the food department of
- my brain carries the code for "pickles", an address
- decoder activates my pickle-agents including one
- connected to my "too much salt" agent. Seventy binary
- signals can address more than a billion billion
- particles, so obviously such an address bus needn't be
- unreasonably large. (It would probably be much larger
- than seventy binary signals, however, in order that a
- random address picked out by an agent would be likely to
- be globally unique, much like the system used to assign
- credit card numbers.)
-
- My guess is that the language organ has two parts: a
- centralized encode/decode part (Broca's and Wernicke's
- areas, etc.) hooked up to the hearing and vocal organs,
- and a distributed part -- the "robot arm" -- consisting
- of one or more sparsely encoded buses capable of
- interrogating all of the conscious agents and agencies
- and even placing new agents and constructing new
- agencies, although the newly-arrived memes seem to have
- weak connections, and require reinforcement from the
- existing network to become permanent. (I.e. you are
- much more likely to believe your own conclusions than
- those spoken to you or read in a book, until you've had
- time to consider them.)
-
- In an earlier posting, I claimed that thoughts are the
- experience of agents crossing the fluid vs. crystallized
- interface. Now, I'd go further and claim that dreams
- are the experience of agents and agencies spontaneously
- forming and re-dissolving while the robot arm is idle.
- We don't perceive dreams while we're awake because
- agents and agencies constructed by the arm are formed at
- a higher voltage or pressure or something. While the
- arm is active, we don't see the spontaneous activity,
- just as we don't see the stars when the sun is out. The
- higher intensity of the connections created by the arm
- is lacking in the agents and agencies formed during
- dreams, which is why dreams are forgotten so quickly.
-
- New thoughts begin in this haze of spontaneous activity
- (which is always present, even though we only perceive
- it at night). A new thought occurs when two
- crystallized agents need a connection, and a fluid agent
- jumps into the gap. If the connection is really needed,
- it gets reinforced and becomes permanent.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- Warning: Be wary of Japanese bearing microchips : KEVIN HUGHES
-
-
- _Mondo_2000_ is getting famous around the Bay Area! Within a few
- months of the number two issue, articles about the magazine and related
- interviews have appeared in the (East Bay) _Express_ and the San Francisco
- _Examiner_. Queen Mu, _Mondo_'s 'Domineditrix', was actually interviewed as
- part of a local news series on cracking, to be mentioned later. Usenet
- posters and _Mondo_ letters page writers attest to heavy perusal of _Mondo_
- in high-tech workplaces (such as Intel and Sun Microsystems). The _Examiner_
- says _Mondo_ is "_huge_ in England and Japan". Again, you can subscribe
- (getting four issues) by sending $24, check or money order, to _Mondo_2000_,
- P.O. Box 10171, Berkeley, CA, 94709. Airmail or overseas subscriptions are
- $50. Their telephone number is (415) 845-9018; their fax number is (415)
- 649-9630. The only place close to the UCB campus that you can find _Mondo_
- (and where I first found it) is at Dave's Smoke Shop on 2444 Durant Avenue -
- (415) 841-7292.
- Another publication that is computer oriented and rather metaphysical
- is _The_Node_, "For hackers with soul", based in San Francisco. It states
- that it is ". . .published quarterly by Performing Arts Social Society, Inc.,
- to foster the use of computers in improving the human condition in the 21st
- Century. It is produced with the help of Utopian Technology. You can sub-
- scribe to _The_Node_ for $12 a year. For $18 a year, you can receive _The_
- Node_ plus four copies of _RockHEAD_, a music/psychology publication 'for
- rockers with brains.' _The_Node_ actively fosters the idea of 'psychographic
- networking' linking up people around shared values and interests. . .". The
- address is _The_Node_, P.O. Box 1174, San Francisco, CA, 94101. If you live
- in or around the Bay Area, you can pick up _The_Node_ free from a newsstand.
- Some cyberarticles I've seen around include a great article on Tim
- Leary's involvement with VR and such in the S.F. _Examiner_'s _Image_ magazine,
- the 11/4/90 issue. A good article on VR written by _Omni_ magazine columnist
- Steve Ditlea appears in the 10/21/90 _This_World_ magazine, which I believe
- comes with the S.F. _Examiner_'s Sunday paper as well. That article was
- adapted from a series running in _New_York_ magazine. A decent interview
- with _Mondo_'s editor R.U. Sirius is featured in the 9/28/90 East Bay
- _Express_.
- I find that trying to get educational information from computer
- science students is like trying to find a contact lens in a sandstorm. But
- I encourage those both in and out of college to attend lectures and buy texts
- teaching subjects they're interested in but not necessarily enrolled in. A
- little information can go a long way, and you won't have to endure the stress
- of tests and grading. Here's some information to help you find more
- information using Internet:
- If you have telnet capability, you can access dozens of computer-
- based library systems in as many locations. Besides the GLADIS and MELVYL
- systems at UCB, you can look up books at the Universities of Delaware,
- Hawaii, Chicago, Illinois, Kansas, and Maine, to name a few. An updated
- list of these catalogs and databases is available - just ftp to UMD5.UMD.EDU,
- login as 'anonymous', and the list will be in the 'info-lib' directory. The
- list was last updated on 8/5/90.
- I recommend looking at CARL, the Colorado Alliance of Research
- Libraries. The database contains a list of other useful public Internet
- databases. Telnet to 192.54.81.128 (pac.carl.org). One neat place I found
- through CARL was a geographic information database with thousands of locations,
- ZIP codes, latitudes, and longitudes. Just type in a place, a ZIP, or nearly
- anything, and the server will find the matching relevant data almost
- instantly. I find it a lot of fun for quick searches and trivia. Telnet to
- martini.eecs.umich.edu, using port 3000 (type 'telnet martini.eecs.umich.edu
- 3000').
- The Cleveland Free-Net also seems worth exploring around a bit.
- Telnet to 129.22.8.(75,76,77,78 or 82). A list of anonymously ftp-able sites
- can be found on some help or Internet newsgroups, or it can be found by just
- asking around your local network. Or you can email me and I'll send you a
- copy. Newsgroups that some reading this newsgroup may find appealing are:
- alt.cyberspace, alt.cyb-sys, alt.society.cu-digest, comp.ai (.neural-nets,
- .philosophy), comp.mail.multi-media, comp.society (.futures), sci.bio.tech-
- nology, sci.environment, sci.nanotech (there's a good discussion on this
- one), sci.virtual-worlds, and no doubt a lot more. You can also find a list
- of public access UNIX/Usenet sites regularly posted and updated at least
- monthly on the newsgroup pubnet.nixpub.
- Have fun and try using the system to your advantage for once!
-
- _Addendum_
-
- In message ID 1990Nov21.055955.11358@lavaca.uh.edu, J. Eric Townsend
- (jet@karazm.math.uh.edu) types:
-
- ] Old technology is not useless -- it can be adapted to solve problems
- ] you don't have a budget for.
-
- ] That 512K Mac in your closet would be a perfect gift for a researcher
- ] in a computer-third-world country...
-
- Absolutely! But a 512K Mac, IMHO, isn't such a hot _multimedia_
- machine these days. I know of a computing center that appletalks about
- five upgraded five year old Macs, and successfully has them run Microsoft
- Word 4.0 and PageMaker 3.0. There's also a UC Berkeley Mac physics lab that
- uses a 512 exclusively for cleansing viruses. It's a great inexpensive
- approach. I think as more people learn computing, there will be a good
- amount of American and especially international third-world students who will
- learn on old technology, because it's very cheap and it still works. But by
- then I'm sure the fairly well-to-do will be expecting (and getting) cheap
- state-of-the-art technology. Today there are those who always insist on
- getting the most up-to-date computer and gadget, just as there are those who
- are comfortable using old Commodore 64's or whatever to get what they need
- done. Myself, I wouldn't mind scavenging a flea market for a Timex-Sinclair
- or even an Altair, just to use for waking me up in the morning. :^)
-
- ______ Kevin Hughes | "The problem with |
- --_\ __/_------------------------------------| the future is that it |---
- \ \ \ / Internet: kevinh@ocf.berkeley.edu | usually arrives before |
- ---\/\/\/-------------------------------------| we're ready for it." |---
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
-
- 64/65: TAP
- Name: [MODERATED]
- Date: Mon Nov 12 23:32:56 1990
-
- Well... good questions, i have answered them before during summercon 1989, but
- for those that didn't hear or know i will go over it again.
-
- TAP quit publishing in 1984 after a big FBI coverup type thing. They broke
- into the editors house, stole most of his papers and mailing lists and what
- they could not carry they set on fire and burned. In 1989 it was decided TAP
- would rise from the ashes and rumors of the past to continue into the future.
- Aristotle and I (Predat0r) obtained permission from the last two editors of
- TAP, who were TUC and Cheshire Catalyst that we could publish TAP. they said
- they would not support us, but did not care that we restarted it. So they
- turned it over to us with all legal rights. including the ISSN number for the
- magazine. under current copyright laws each issue of TAP is copywritten by the
- general definition of the copyright laws. since i am the publisher i could sue
- someone for reprinting an article and not asking for or giving credit to TAP.
- it gets complicated and is a matter for lawyers and all and i don't feel like
- posting an official TAP is this and can do this, and so forth, i take no stand
- on anything until my lawyer advises me again. and i am not wasting money
- unless something big comes out of it. like someone else trying to start a TAP
- clone.
-
-
- NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA---NIA
-
- Well, this concludes NIA issue 67. If anyone wishes (hint) to
- submit some material, please do so at the elisem@nuchat.sccsi.com
- You can get our files from f2f and soon the CuD archives. Look for
- upcoming issues soon (including HP and more DEC manuals).
- Well, its getting closer to winter so to end the file with these wise words:
- -Never eat yellow snow.
- -anon
-
- [OTHER WORLD BBS]
-
-