home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud1
/
cud111a.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
4KB
|
106 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.11 (May 29, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
In This Issue:
File 1: Moderators' Corner (news and notes)
File 2: Media and the (witch)hunt for the Computer Underground
File 3: BBS Stings (anonymously sent)
File 4: Comment on Sun Devil Press Release and other related
related views (numerous authors)
--------------------------------------------------------------------
***************************************************************
*** Computer Underground Digest Issue #1.11 / File 1 of 4 ***
***************************************************************
In this file:
-- Apology to The Well users
-- Archive Files Available
---------------------------------------------------------------
-------------------------------
APOLOGY TO WELL USERS
-------------------------------
In a recent issue of CuD we inadvertently reprinted the comments
of some users of The Well. Through a misunderstanding, we thought
we had obtained permission to reprint the entire file, but
the permission was limited. We apologize for any embarrassment this
might have caused.
CuD policy is to obtain permission to reproduce files that have
appeared elsewhere, and we do our best to uphold the norms of
etiquette that guide e-mail, ambiguous as they may sometimes be.
****************************************************************
------------------------
ARCHIVE FILES AVAILABLE
------------------------
We currently have the following archival material available:
NAME ISSUES APPROX SIZE
**E-mail Magazines**
---------------------
A.N.E. 1 -> 7 300 K total
ATI 1 -> 48 10-15 K each
CuD 1.00 -> 1.10 30 K each
LoD Tech. Jrnl 1 -> 4 175 K each
NARC 1 -> 7 5 K each
P/Hun 1 -> 5 160 K each
PHRACK 1 -> 30 150-300 K each
PIRATE 1 -> 5 170 K each
**Papers/articles**
-------------------
"The Social Organization of the Computer Underground"
(Master's thesis by Gordon Meyer)
"The Baudy World of the Byte Bandit" (paper by G. Meyer and J. Thomas)
"The Official Phreaker's Manual, 1.1 (1987)"
"The State of the Hack" (LoD)
--Transcriptions of documentaries
--Misc. news stories
We also have *numerous* individual files of newsletters/info sheets that
were started but never got beyond the first issue or two, or were issued as
single-file documents.
Our goal is to preserve this short period of computerist activity in its
documentary form for the benefit of students, scholars, and other
computerists. We will provide E-mail copies at no charge, but hard copies
will require a stamped, self-addressed envelope.
Archived materials can be obtained by dropping a short note to:
KRAUSER@SNYSYRV1.bitnet OR TK0JUT2@NIU.bitnet
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+