Computer underground Digest Sun Jun 30, 1996 Volume 8 : Issue 49 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.49 (Sun, Jun 30, 1996) File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose) File 2--Response to CUD #8.48--GAO hacker report: selling wind File 3--Can you say "libel"? File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such File 5--Cyber Angel's response to Wired article File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE, File 7--8th FIRST Conf & Workshop on Computer Security File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 25 Jun 96 16:53 PDT From: Michael Gersten Subject: File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose) I disagree with one of the points that Lance Rose makes in his post on Civil Liberties, and the On-Line circus. Lance talks about encryption, as hiding "a message right in someone else's face. It is like sticking a self-incriminating note in a physical capsule that is uncrackably hard and strong, then lobbing the capsule through the window of a police station to sit in the middle of the floor among a bunch of cops, powerless to open it up and figure out how to get the perp." At the same time, he says that you can hide a message better by leaving it in plain text, hidden among the huge mass of other things. Except that today, searching ability is very strong, and only going to get better. Except that the police have shown that they will take an entire computer and search it for anything that they want Except that the goal is for everyone to use routine PGP encryption on all messages that are not for everyone, just as everyone routinly uses envelopes for their mail, and some people use security envolopes that you can't just hold up to a strong light to see what's inside. Except that it's a desire to stand out with an encrypted message, but to be one of the normal flow of encrypted messages. Except that any other form of hiding the data requires setting up some special method, that has to be kept secret. With PGP, you don't have to do anything special, really--the message is (at least with the -a option) identified as a PGP message, and when (not if) PGP is standard on unix and windows-96 (or -97) systems, will be just as easy to read as plain mail. ------------------------------ Date: Mon, 24 Jun 1996 12:48:48 -0700 From: Roland Dobbins Subject: File 2--Response to CUD #8.48--GAO hacker report: selling wind Response to CUD #8.48, File 1--GAO hacker report: selling wind You recently quoted something called the "Crypt Newsletter" on the subject of computer-related yellow journalism & governmental scare-mongering on the threat to national security from "hackers". While I certainly am concerned about the characterization of "hackers" as the lepers of the 1990s, I am very disappointed that CUD would publish such a blatantly partisan, left-wing rant, as news. Do you intend CUD to become a forum for left-wing demagogues? I should hope that you will continue to provide a balanced forum for discussing issues of interest to all of us in the Net community, and that you will in future at least insert a disclaimer before reprinting material of such material. Otherwise, CUD will cease to be a forum for intramural discussion of serious issues, and instead become merely a mirror of the moderators' apparently left-wing political views. What a shame, indeed. I am a conservative, and I would like to point out the your readership that it is a left-wing, liberal Democratic Administration which has foisted the entire Clipper/Capstone/EES thing on us, and which has consistently violated the rights of individuals and groups in their quest to establish the Nanny State (Waco, Ruby Ridge, etc.). In fact, Republicans in the House & Senate have been vociferous in both opposing EES and in watering down the more heinous provisions of Mr. Clinton's so-called "anti-terrorism" legislation. The very sinister Filegate incident, which is far beyond any "enemies list" kept by the Nixon Administration, clearly shows the arrogance of liberals who think that government (i.e., themselves) always know best, and that their good intentions render them above the law. Remember, Chuck Colson went to jail for possessing one (1) FBI "raw" file; the Clinton White House had at least 408! >No one except an obscure lunatic named T. K. Jones in the Reagan administration >really thought that either U.S. generals or their Soviet counterparts would >call down the wrath of 10,000 nuclear warheads. Whoever wrote this must be either extremely stupid or willfully ignorant. Weapons are made to be used, and the strategic arsenals of both the U.S. & the U.S.S.R./Russia, while serving as a deterrent against a general conventional war, are indeed capable of being launched if National Command Authority so decides. All one has to do is look at the Cuban Missile Crisis or the Soviet's panicky launching of Project RYAN during the 1980s to see that there was (and still is, in my opinion) a real danger of unleashing Armageddon. That's why SDI was, and continues to be, as issue of vital import. In closing, I would like to compliment CUD for providing a (generally) balanced and informative resource on public policy issues such as Internet regulation. While it is very easy to criticize from the peanut gallery, I hope that my comments and suggestions are received not as churlish sniping, but as advice from a devoted reader who only wishes to assist in making CUD that much more appealing to us all. ------------------------------ Date: Mon, 24 Jun 1996 12:33:56, -0500 From: MR ROBERT E DALY Subject: File 3--Can you say "libel"? What a great idea! I think I'll submit the names of all my enemies! Hmm, maybe I'll check with my lawyer first about slander and libel. Response to article from Computer Underground Digest which follows: Date--Sun, 16 Jun 1996 12:58:38 -0500 (CDT) From--David Smith Subject--Child Molester Database on the web Great World Internet Services has set up a "child molester" database where Internet users can add records about people who are child molesters. The ISP's philosophy is listed below. There is also a separate disclaimer that information will be purged after 120 years, and that Great World Internet Services does not verify any of the data. There is a procedure for those who wish to dispute being entered into a database. There are expansion plans, too : deadbeat dads, crooked cops, elected official crimes, known drug dealers, etc. The site can be found at http://www.greatworld.com/public From its creator: Too many times in our twisted society, criminals are treated as victims and victims are treated as inhuman and ignored. When our President, our (In)Justice System, and our legislative bodies fail to provide us with proper protection, then we as citizens must unite in order to protect ourselves. The time for passivity has ended and the time for proactive intervention is upon us. Therefore, as a parent and a citizen, I have made available a database where child molesters can be listed. The difference between this database and the databases of certain states (such as California) are that this database is totally free. (There is no ridiculous $10 fee.) Also, anyone can look up information. In California, the state feels that persons need to be able to prove a need for the information before the information may be released. By golly, I believe that the welfare of our children is right enough to know who these victimizers are and that this information should be made available to everyone in order to protect our families from joining the growing roster of victims. Also, this database doesn't require that those listed first be convicted. If you are a victim and have been abused, then it doesn't require a court of law to validate what you already know. The same applies if you are a parent or a close relative and you have first hand knowledge that someone committed the crime. The idea behind this database is to make people aware of the criminals so that we can protect our families before it is too late. Most states do not list cases involving incest or victimization by a relative or sibling. Feel free to list the victimizers here. If they did it once, they are likely to do it again. Once a victimizer's own children have grown up, they often turn to the children of others. There are advocates of these vicious heartless tyrant criminals who say that once a person who has served their time, they should be left alone. Buddy, I have one thing to say to you. Don't let the proverbial door slap you in the tail on your way off this page. When a criminal victimizes a child, the child is emotionally scarred for life. Nightmares often last throughout the person's entire lfetime. Many times the person is unable to function effectively in a relationship. No one is unable to ever take away what has been done. I personally believe that their should only be one sentence for child molestation--death. In my opinion, no child molester has EVER served his time as long as he still lives. This database will help to remind the people in communities throughout America that certain people are dangerous and should be watched. ----------------------------------------------------- Message for Child Molesters: Before you molest your next victim, think twice. Perhaps your name will be plastered here for all of the world to see. Your mother, your father, your brothers and sisters, friends, the world--will know what kind of a living monster you really are. [Internet Link Exchange] Member of the Internet Link Exchange This site designed, managed, and hosted by Great World Internet Services ------------------------------ From: "David Smith" Date: Wed, 26 Jun 1996 21:09:57 +0000 Subject: File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such > DON'T SHOOT THE SENATOR > > Beeson and the ACLU understand these kinds of cases are far bigger > than just one student angry about the slaughter of mountain lions, or > an asshole sitting in the U.S. senate. It's about the entire structure > of the Internet and how quickly Internet service providers will pull > down their pants when the cops come calling. How ready is your own ISP > to just hand over access to all your email when John Law appears at > their door asking for "cooperation" against whatever they are > labelling you: terrorist/child pornographer/anarchist/drug dealer, > etc.? > When John Law has a search warrant, as in this situation, I recommend that such cooperation be full and complete. You had better have a very good reason (and lawyer) before you start willful disobedience of legal orders. That ISPs are willingly "pulling their pants down" for the police is just not true. ------------------------------ Date: Wed, 26 Jun 1996 19:43:01 +0000 From: David Smith Subject: File 5--Cyber Angel's response to Wired article Attached is an excerpt from an announcement sent to the Cyber Angels giving Gabriel Hatcher's response to the recent Wired article. ------- Forwarded Message Follows ------- From-- angels@wavenet.com (CyberAngels Director --Gabriel Hatcher) Subject-- AOL project appeal 5) There is an article about us in Wired magazine's July issue. Don't get excited, it is not very complimentary. Most of the article is spent repeating what hostile critics have written about us, saying things like "they don't understand the global nature of the Internet" (like we are 1100 members in _32_ countries and we don't understand the global nature of the Internet?) or "they don't realize that posts could be forged" (which was one of the _first_ things that happened to _us_ when we started a year ago!); or "they could mess up FBI investigations and be criminally liable themselves" (some of our members are currently _teaching_ federal agents how to download and decode binaries from the Usenet). When will the journalists realize that CyberAngels are _not_ people who have only just bought their first computer (although some of us are), but also include users with 15 years+ Internet experience, programmers and a number of professional law enforcement people. The Wired article is critical of Curtis Sliwa (co-founder with me of the project), since he does not use a computer. Hey guys, that's why _I_ run the project. Does Curtis have a right to an opinion about the Internet, given his lack of hands-on knowledge. Well I am not currently drilling for oil in the antarctic ocean, but I think I have a right to be concerned about the environment. Is Curtis informed? Well I keep him up to date. Wired's journalist says he doesn't understand Curtis and my different opinions, and questions how we can be effective since we disagree on things. Well watch us! Do Curtis and I agree about the solutions to Internet crime? No, not always. In many cases we disagree, but guess what? We don't have a problem living with the fact that we are not Clones of each other. It's called a pluralistic society guys, and it requires tolerance to live in. For those of you who didn't know, CyberAngels is not a revolutionary organization. We believe in and practice tolerance of diverse cultures and beliefs, and since we believe in and practice freedom of speech, we encourage healthy and vigorous debate and discussion, and we can live with disagreement (unlike many of our critics!) CyberAngels is going strong, despite the fact that our members wouldn't agree on everything. What we have in common is a shared Mission statement and an agreed Codes of Conduct. That's enough for me. I don't mind which side of your bread you all butter! ;) ********************************************************* Gabriel Hatcher - CyberAngels Director angels@wavenet.com http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html mirrored at: http://www.safesurf.com/cyberangels/ "All that is required for the triumph of evil is that good people remain silent and do nothing" (after Edmund Burke) ------------------------------ Date: Wed, 5 Jun 1996 06:13:32 -0400 (EDT) From: NOAH Subject: File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE, ---------- Forwarded message ---------- Date--Thu, 16 May 1996 14:55:05 -0400 (EDT) From--Rick SUN USER GROUP EAST COAST CONFERENCE and EXHIBITION Monday, June 24 & Tuesday, June 25, 1996 Marriott Copley Place Boston, Massachusetts ********************************************************************** ************* Register below for FREE admission to *************** ************* the biggest Sun Trade Show of the year. *************** ********************************************************************** Since this year's SunWorld has been cancelled, SUG East is now the ONLY major Sun conference of 1996. We're expecting over 2,500 attendees from around the country and more than 100 exhibitors, so this is your best opportunity of the year to discover what's new in the world of Sun and Java. SUG East is also the first East Coast Sun show in three years so expect to see a lot of new faces among the vendors and attendees. SUG East will feature an exhibition of the hottest new products for Sun and Java and a technical conference to keep you on top of the latest developments. The SUG East Technical Conference The SUG East Technical Conference will run both days of the show and will feature classes on a variety of topics. SUG was one of the producers of SunWorld, and our own series of technical conferences receive tremendous critical acclaim for their variety of interesting speakers. The SUG East conference include 25 talks by respected speakers over the both days of the show. Each day will feature two tracks of classes; Monday, June 24, will spotlight Java and System Administration, and Tuesday, June 25, will concentrate on Security and Internet Communication. The SUG East conference will address the important issues and difficulties of developing, managing, and maintaining a mixed-architecture environment through a variety of talks by some of the leading experts in the field. Featured speakers at the conference include Art Carty, General Manager and VP of SunExpress, North America; Robert Diamond, Senior Security Consultant for Sun Microsystems; Peter Galvin, chief scientist for Corporate Technologies, Security columnist for SunWorld On-line magazine, and author of "Operating System Concepts"; and J.A. Cross, Java consultant and contributing author to Que Publishing's "Special Edition: Using Java". Some of the currently scheduled sessions include: JAVA TRACK 1. Java and Application Development 2. Client-Server Development With Java 3. Is Java just C++ with a new hat? 4. Programming the Internet in Ada 95 5. Building for the Internet. SYSTEM ADMINISTRATION TRACK 1. Introducing Solstice Autoclient 2. TCP/IP Operational Troubleshooting in a UNIX Environment 3. Solaris Volume Management -- What It Does and Doesn't Do (and How) SECURITY TRACK 1. Firewalls and Network Security 2. Network Security Tools w/ CMIP Agents 3. UNIX Security Tools Workshop 4. Host Security Tools 5. Kernel Access Controls 6. Vendor Security Panel: featuring Sun, Cisco, Ascend INTERNET COMMUNICATION TRACK 1. Web Site Implementation 2. The Intranet and Thin Client Technologies: Testbed for the Future? 3. Building a Multi-Protocol Data Infrastructure 4. Electronic Commerce for Software over the Internet More sessions are being added regularly, contact conference@sug.org for the latest information. Registration for the SUG East Technical Conference is seperate from the FREE Exhibition registration and requires an additional fee. Earlybird Conference registration is $295 until June 10th. After June 10th, conference registration is $395. Members of the Sun User Group or Java-SIG reveive $50 off conference admission. Most conferences concentrate on the hype and cost considerably more, sign up for the SUG East Technical Conference today to receive the best education at the best prices. The SUG East Exhibition The SUG East Exhibition will feature over 100 exhibitors of application software, backup and storage devices, client/server products, connectivity products, email, network security, software development tools, terminals, training services and other products and services of interest to the Sun/SPARC and Java community. Registration for the exhibition is FREE until June 10. Use the form below to send in your registration today! The Sun User Group believes that trade shows should be fun, so in addition to all the exhibitors at SUG East you can also experience the the Colossal SUG Midway where you can... ...Discover the Forbidden Secrets of Modern Science at the Internet Academy of Mystery! ...See the Future Today at the Theater of the Amazing! ...Talk to Exotic Peoples from Around the Globe at Professor Phineas Q. Abercrombie's Communications Pavilion! ...Experience Heart-Stopping Thrills at the UNIX Job Fair! ...and many more special events and surprises! The SUG East Trade Show has it all... The Internet Academy of Mystery will present a series of FREE introductory half-hour lectures from SUG's highly-skilled instructors designed to help trade show attendees get a taste of some of the hottest new technology. Some of the FREE 'mini-classes' to be taught include: Java; The Worldwide Web; Internet Security; and Using Information Services. The Communication Pavillion provides attendees with a way to keep in touch with people back home, browse the Web, and try out interesting new communication software. SUG's Theater of the Amazing is a Product Demo Showcase where attendees can gain valuable in-depth information and see special demonstrations on the highlighted products of this year's show. The UNIX Job Fair is a terrific opportunity for those attendess looking for a new position, or anyone who wants to learn more about the UNIX job market. Staffed by professional recruiters, attendees can learn about hundreds of jobs currently available and improve their resume and job-hunting skills. The Sug East Exhibtion can Be Yours For The Low Price Of... ABSOLUTELY NOTHING!!! ------------------------------------- SUG East Tradeshow Registration FREE registration for the SUG East Exhibition! June 24-25, 1996 Marriott Copley Place Boston, MA REGISTRATION FORM Mail, Email, or FAX registration to: SUG East Registration Sun User Group 1330 Beacon Street, Suite 344 Brookline, MA 02146 USA Fax: (617) 232-1347 Email: sugeast@sug.org WWW: http://www.sug.org/sug-east.html Your registration must be received before June 10, 1996 in order to receive your FREE pass to the SUG East Exhibition (there is a $25 registration fee for registrations processed on-site). Registration for the conference is separate and requires an additional fee of $295 ($395 after June 10th) with a $50 discount for SUG or Java-SIG members. All conference registrants receive free passes to the Exhibition. For further information, contact sugeast@sug.org, visit us on the web at http://www.sug.org or call Team SUG at (617) 232-0514. For information about advertising, sponsorships, or exhibiting at SUG East, contact Charles Sumner at sales@sug.org or the above phone number. Name: ____________________________________________ Title: ___________________________________________ Company: _________________________________________ Address: _________________________________________ _________________________________________ City: ____________________________________________ State: ___________________________________________ Zip/Postal Code: _________________________________ Country: _________________________________________ Email Address: ___________________________________ Phone: ___________________________________________ ___ Please register me for the SUG East Exhibition and Trade Show (FREE until June 10, otherwise fill out the section below) ___ Please register me for the SUG East Technical Conference (fill out the section below - includes Exhibition pass) ------------------------+-------------------------------+-------+-------+ ITEM | Price | Qty. | Total | ------------------------+-------------------------------+-------+-------+ ------------------------+-------------------------------+-------+-------+ ADVANCE SUG East | FREE (until June 10) | | | Exhibition registration | | | | ------------------------+-------------------------------+-------+-------+ SUG East | $25 (after June 10) | | | Exhibition registration | | | | ------------------------+-------------------------------+-------+-------+ ----------------------------------------------------------------+-------+ ADVANCE SUG East | $295 (until June 10) | | | Conference registration | | | | ------------------------+-------------------------------+-------+-------+ SUG East | $395 (after June 10) | | | Conference registration | | | | ------------------------+-------------------------------+-------+-------+ Conference discount for | - $50.00 | | SUG or Java-SIG Members | membership number: ______________ | | ----------------------------------------------------------------+-------+ ----------------------------------------------------------------+-------+ TOTAL | | | | ----------------------------------------------------------------+-------+ All payments must be in US dollars; Checks must be drawn on a US bank. [ ] MasterCard [ ] Visa [ ] AMEX [ ] Check Cardholder's Name:____________________________________________________ Credit Card Number:___________________________________________________ Expiration Date:______________________________________________________ Signature of cardholder:______________________________________________ ------------------------------ Date: Tue, 18 Jun 1996 21:50:54 -0400 (EDT) From: NOAH Subject: File 7--8th FIRST Conf & Workshop on Computer Security Date--Tue, 18 Jun 1996 10:11:07 -0700 From--Michael/Miguel J. Sanchez To--Multiple recipients of list BUGTRAQ -----BEGIN PGP SIGNED MESSAGE----- This is just a reminder of the upcoming FIRST Conference and Workshop this year. Please, forward this information onto your constituencies and any other interested parties. For those people with websites, please help advertise with a link to one of the conference websites listed below. And lastly, if it is possible to advertise the event in any advisories, bulletins or newsletters, please do so, as this would be most appreciated. ######### SPECIAL NOTE SPECIAL NOTE SPECIAL NOTE ######## It is very important that if you have any plans to attend, please register and make your hotel reservations *NOW*. This is very important because of several factors: 1) Hotel occupancy is at all time high for this summer and with the Usenix conference the week before, hotels will be filled. 2) The hotel will only honor the FIRST conference rate of $135/night till June 27, 1996. After this date, the rate will only be provided on a space available basis. The regular non-FIRST rate is $199/night. 3) The price of gas has increased greatly in the California area and travel prices will be going up as the summer travel season starts. People will use hotels more and drive less. 4) Also the price of the conference does go up after July 13, 1996 and that date is quickly approaching. - --------------------------------------------------------------------- **************************************************** For the most up to date and complete information, please see the URL hostsites http://www.first.org/workshops/1996/ - or - http://ciac.llnl.gov/firstconf/ **************************************************** The 8th FIRST Conference and Workshop on Computer Security Incident Handling and Response July 28-31, 1996 The Westin Hotel Santa Clara, California United States ___ _ _ ____ ____ ____ _ _ ____ ____ ____ ____ _ _ ____ ____ | |__| |___ | | | |\ | |___ |___ |__/ |___ |\ | | |___ | | | |___ |___ |__| | \| | |___ | \ |___ | \| |___ |___ The annual FIRST Conference and workshop event is the only event of its kind. This event is focused on the field of computer security and most specifically incident handling and response. Past conferences have been held in Karlsruhe, Germany and Boston, Massachusetts, US. Each of these conferences were international in scope and attendance with presentations on the latest in vulnerability analysis, incident response, vulnerability prevention, and general computer security. Additionally, these conferences served as the foundation for the improvement of computer security worldwide via sharing of goals, ideas, and information. The 1996 8th Annual FIRST Conference promises to continue this ground breaking work. Occurring in the heart of the Silicon Valley, home of the microprocessor and the heartbeat of computing, this year's conference will continue to promote FIRST organization goals of worldwide coordination and cooperation. _ _ _ _ _ ____ _ ____ ____ _ ____ ____ ___ __. | | | |__| | | | [__ |___ | |__/ [__ | _] |_|_| | | |__| | ___] | | | \ ___] | . The Forum of Incident Response and Security Teams (FIRST), is an international organization that brings together a variety of computer security incident response teams. These teams include government agencies, commercial companies, academic organizations and computer vendors. World-wide, FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the global community at large. Further information about the FIRST organization is available at the FIRST WWW URL http://www.first.org/first/ _ _ _ _ _ _ _ ____ ____ _ _ ____ __. | | | |__| \_/ | | | |\/| |___ _] |_|_| | | | |___ |__| | | |___ . Here are a few *extra* reasons to attend this year's FIRST Conference The week prior to the FIRST Conference, The 6th USENIX UNIX Security Symposium is being held in San Jose, CA. This means that not only could you save money on airfare by staying over a weekend, but you could attend two great security conferences back to back. Meet other security professionals in the area of incident and response. Improve your security program with the ideas presented. Save time searching for tools and resources. Join in the sharing of a wide range of experience and knowledge. Be a part of the "United Nations" of computer security organizations. Bring your family and tour the Silicon Valley and San Francisco Bay Area. ____ ____ ____ _ _ ___ ____ |__| | __ |___ |\ | | \ |__| | | |__] |___ | \| |__/ | | The following scheduled events are subject to change till the time of the conference. For the most up to date information please refer to the conference URL referenced at the beginning of this document. <650 lines snipped for brevity> For the most up to date information, please refer to the FIRST conference WWW page URL referenced at the top of this document. The FIRST Conference, first.org, Inc., and Conference Management Services want this conference event to be a rewarding event for all attendees. The FIRST Conference, first.org, Inc., and Conference Management Services wish to cooperate fully with any attendee who has a special need(s) or requirement(s) or request(s). For information or assistance with disability or special needs/services, please contact us via email, fax, telephone or email. Via postal mail: FIRST Conference c/o Conference Mgmt Services 407 Chester Street Menlo Park, CA 94025 U.S.A. Via fax: +01 415-324-3150 Via email: merryb@vhdl.org Via phone: +01 415-329-0579 ____ ____ ____ ____ |__| |__/ |___ |__| | | | \ |___ | | _ _ _ ___ ____ ____ ____ ____ ___ ____ | |\ | | |___ |__/ |___ [__ | [__ | | \| | |___ | \ |___ ___] | ___] The State of California and the San Francisco Bay Area have a great deal of activities and sights to offer the visitor. The following WWW URLs are provided to those that are interested in the area and the multitude of things to see and experience. San Francisco Bay Area and Beyond http://www.hyperion.com/ba/sfbay.html << Santa Clara >> Santa Clara http://www.xpand.com/Santa_Clara/index.html Great America Theme Park http://www.rollercoaster.com/pga1/pga/ Intel Museum http://www.intel.com/intel/intelis/museum/ Frys http://frys.fry-s.com/ << San Jose >> Winchester Mystery House http://www.netview.com/svg/tourist/winchest/ Egyptian Museum http://artdirect.com/california/san.francisco/arts.univ/santa.clara/egypt The Tech Museum of Innovation http://www.thetech.org/ San Jose Museums http://artdirect.com/california/san.francisco/museums/sbay/homepage <> Monterey Bay Aquarium http://sapphire.cse.ucsc.edu:80/mb/mba/ http://www.usw.nps.navy.mil/~millercw/aq/ Access Monterey Peninsula http://www.campgrounds.com/ctpa/ca/regions/cc/cceditor.htm << Mountain View >> Magic Edge http://www.cygnus.com/misc/magicedge.html NASA AMES http://www.arc.nasa.gov/amesinfo/visitors_center.html <> 49 Mile Scenic Drive http://www.geninc.com/geni/USA/CA/San_Francisco/travel/49mile.html Alcatraz http://www.nps.gov/alcatraz/index.html Exploratorium http://www.exploratorium.edu/ Golden Gate Bridge and National Recreation Area http://www.nps.gov/parklists/index/goga.html Golden Gate Park http://www.geninc.com/geni/USA/CA/San_Francisco/travel/ggp.html Water's Edge http://www.geninc.com/geni/USA/CA/San_Francisco/travel/wharf.html Neighborhoods http://www.geninc.com/geni/USA/CA/San_Francisco/travel/neighborhoods.html Marine World Africa USA http://www.freerun.com/napavalley/outdoor/marinewo/marinewo.html San Francisco Museums http://artdirect.com/california/san.francisco/museums/sf/homepage <> Stanford University http://www.stanford.edu/ Stanford Linear Accelerator Center http://www.slac.stanford.edu/winters/pub/www/education/tour_slac.html ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.49 ************************************