home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud2
/
cud207a.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
4KB
|
75 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.07 (October 15, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS:
File 1: Moderators' Corner
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
File 4: Electronic Frontier Foundation Hires Staff Counsel
File 5: 13th Annual National Computer Security Conference (Part 1)
File 6: 13th Annual National Computer Security Conference (Part 2)
File 7: Summary of COMPUTER ETHICS (book)
File 8: Introduction to TOXIC SHOCK
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
----------------------------------------------------------------------
********************************************************************
*** CuD #2.07, File 1 of 8: Moderator's corner ***
********************************************************************
From: Moderators
Subject: Moderators' Corner
Date: October 15, 1990
++++++++++++++++++
Miscellaneous comments
++++++++++++++++++
1. MAIL: A few people have received up to TEN copies of a single issue. We
have no idea why. On occasion, we send out duplicates if the mailer
indicates a net-block. Copies go out about 8-10 at a time, and if one batch
is returned, which happens most often on weekends, we repeat the addresses
in that batch individually, so it may happen that some people receive a
duplicate (we have no way of knowing which address caused the failure, so
we re-send all in that batch). However, there is no reason that we, or our
postmaster, can determine that would cause multiple copies to be received.
2. Most recipients on the mailing list will notice that the "TO" header
line is not to their address, but to "tk0jut1." Some people have asked how
(and why) we do this. We simply use the BCC (blind carbon copy) command.
For those asking what kind of system we use, it's an IBM Amdahl, wylbur on
the front end, and, yes, we do wish we had Unix.
3. CENSORSHIP: The article on censorship will be in issue 2.08 along with
an excellent article by Jim Warren on "Political Activity and Computers."
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+