home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_3
/
CUD307C.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
9KB
|
268 lines
------------------------------
From: Gordon Meyer
Subject: CuD Index, Volume Two (2.00 - 2.19)
Date: 25 February, 1991
********************************************************************
*** CuD #3.07: File 3 of 6: CuD Index for Volume Two ***
********************************************************************
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Index to Volume Two ***
*** Issues 2.00 - 2.19 ***
****************************************************************************
Volume 1, Issue #2.00 (Aug 25, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: EFF mailing #3: About the Electronic Frontier Foundation
File 3: Len Rose's Search Warrant
File 4: What to Read When the SS is at the Door
File 5: CU in the News: More on the NY Raids
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.01 (Aug 31, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Proposed changees in Computer Abuse Act (S.2476)
File 3: CPSR Seeks FBI data on Bulletin Board Monitoring
File 4: Computers, Social Responsibility, and Political Action
File 5: Another experience with the SS
File 6: CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.02 (September 9, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Musing over Operation Sun Devil
File 3: IPCO BBS Back on-Line
File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete)
File 5: The CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.03 (September 14, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose's experience with the Secret Service
File 3: Tim Wolfson's address, cite list
File 4: A comment on Zod's case
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.04 (September 23, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Re: Evidence (was Re: Musing on Constitutionality)
File 3: Why the FBI should be concerned about the Secret Service
File 4: California Computer Abuse Law revisited
File 5: Candidate for state governor supports electronic freedom & privacy
File 6: Review of Steven Levy's CLOAK AND DAGGER
File 7: The CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.05 (September 30, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Re: The CU in the News (Mail reading)
File 3: Anarchist Times, Inc. (ATI)--background
File 4: The status of the electronic forum (BBS)
File 5: Another experience with the law
File 6: Some views on what to do if questioned by LE agents
File 7: The CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.06 (October 6, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: MARS BBS Sting a Prank
File 4: Another view of hacking
File 5: The CU in the news
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.07 (October 15, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
File 4: Electronic Frontier Foundation Hires Staff Counsel
File 5: 13th Annual National Computer Security Conference (Part 1)
File 6: 13th Annual National Computer Security Conference (Part 2)
File 7: Summary of COMPUTER ETHICS (book)
File 8: Introduction to TOXIC SHOCK
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.08 (October 20, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Prodigy, Problems, and Censorship
File 4: Censorship on the Nets
File 5: PC's & Political Action
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.09 (October 27, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Arrest
File 3: Mars was not "Censored"
File 4: Response to Mars "Censoring"
File 5: Steve Jackson Games (SJG) Update
File 6: The Future of Hacking and the System Security Profession
File 7: The Ultimate Interface: Hackers and the Private Sector
File 8: CU in the News: "Hackers" and Bank Blackmail in England
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.10 (November 2, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Funds--A Humanitarian Necessity
File 3: EFF Seeks Executive Director (Job Announcement)
File 4: Massachusetts Computer Crime Bill
File 5: Re: C-u-D, #2.09 Censoring of gif's
File 6: The Piratical Dilemma
File 7: Obtaining Identification Cards
File 8: Logisticon vs. Revlon
File 9: In-House Security Problems
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.11 (November 13, 1990)
*** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts)
CONTENTS:
File 1: Moderators' Corner
File 2: PhD Candidate Seeks information on the CU
File 3: Riggs, Darden, and Grant Sentenced
File 4: Prodigy Saga Continues
File 5: Re: Response to Mars "Censoring"
File 6: Response to SJG Affidavit (part 1)
File 7: Warrants schmarrants! The SS is Crazy!
File 8: More guidelines on what to do if busted
File 9: CU in the News--England and Emma Nicholson; VOGON News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.13 (November 25 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: EPIC (Effective Performance in Candidates)
File 3: The Riggs Sentencing (reprint from Newsbytes)
File 4: First Conference on Computers, Freedom & Privacy
File 5: Hackers Break into DEA Lines
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.14 (November 30, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Indicted
File 3: CPSR's FOIA request from the FBI
File 4: International Information Retrieval Guild
File 5: A Note on Censorship
File 6: Two Comments on Prodigy
File 7: Don't Talk to Cops
File 8: Response to DEA/PBX News Story
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.15 (December 5, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Indictment in Illinois
File 3: 2600 Magazine Response to Atlanta Sentencing
File 4: List of Computer Underground Clippings
File 5: Computer Crime Laws list
File 6: Media and the CU
File 7: The Hermetic Underground
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.16 (December 10, 1990)
*> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <*
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.17 (December 16, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: EFF Response to Atlanta Sentencing Memorandum
File 4: Some Thoughts on the Atlanta Sentencing
File 5: Earning your Stripes
File 6: Playgrounds of the Mind: Cyberspace
File 7: The CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.18 (December 28, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Computers Under Attack
File 4: CU Resources in Germany
File 5: Trade Secrets; When are they Bad?
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume 2, Issue #2.19 (December 31, 1990)
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Telecoms Ripping off BBSs?
File 4: Michigan Bell vs BBSs
File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
File 6: a.k.a. freedom of expression
File 7: Z-