home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud3
/
cud314a.txt
< prev
next >
Wrap
Text File
|
1992-09-10
|
7KB
|
157 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 3, Issue #3.14 (April 26, 1991) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
GAELIC GURU: Brendan Kehoe
+++++ +++++ +++++ +++++ +++++
CONTENTS THIS ISSUE:
File 1; Moderators' Corner
File 2; Comments on your comments on Len Rose
File 3; Moving toward Common Ground? Reply to Gene Spafford
File 4; CERT Advisory - Social Engineering
File 5; And Fox is after the Hollywood Hacker?
File 6; MONDO -- GREAT NEW 'ZINE!
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
USENET readers can currently receive CuD as alt.society.cu-digest.
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
(2) cudarch@chsun1.uchicago.edu;
(3) dagon.acc.stolaf.edu (130.71.192.18).
E-mail server: archive-server@chsun1.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission. It is assumed
that non-personal mail to the moderators may be reprinted unless
otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground. Articles are preferred
to short responses. Please avoid quoting previous posts unless
absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Contributors assume all
responsibility for assuring that articles submitted do not
violate copyright protections.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: Moderators
Subject: Moderators' Corner
Date: 26 April, 1991
********************************************************************
*** CuD #3.14: File 1 of 6: Moderators Corner ***
********************************************************************
++++++++++++++++++++
Mail and Corrupted Issues
++++++++++++++++++++
We received a number of notes asking about the resend of CuD 3.13.
Our system is an IBM clone, and the mailer is patched in. When we have
mail problems, we are not able to determine the status of any mail we
send out because of the limited capabilities of the patch. On
occasion, especially during net-jams, this leads to some readers
receiving duplicate files. If a number of files are corrupted, as
sometimes happens when the nets are jammed or a gateway is not
operating properly, it is sometimes necessary to resend a file or, in
the case 3.13, the entire list. Optimal size is about 40K, and the
last issue ran well over that. To facilitate mailing, we deleted the
single file that brought us to the 40 K file size and re-sent. If
people are experiencing problems receiving CuD, drop us a note.
We have also received on 23 April a horde of email posts dated between
30 March-2 April. The bulk of it seemed to originate from the west and
southwest. We generally reply to posts on the same day they are
received, so if you do not receive a reply, let us know.
++++++++++++
LET US KNOW IF YOUR ACCOUNT EXPIRES
++++++++++++
If your account is about to expire, please drop a note simply saying
"unsub," and be sure to include at the bottom your account number.
++++++++++++++++
Information on subversive software wanted
++++++++++++++++
Gordon is in the beginning stages of research for a technical paper on
'subversive' software. The article will discuss software that has
been written for unusual purposes and circumstances, not all of which
may be legal. Examples in this "genre" would be 'Fuckin' Hacker',
'Code Thief', and 'Receipt Writer'.
It would be helpful to gather as many examples as possible, from many
different computer platforms. He is *not* seeking executable copies,
but just the name and description of the program. Any additional
historical information, such as author name, date, innovative
features, etc would be a bonus. If you can recall having seen, used,
or heard of any unusual software that you feel fits in this category
He would appreciate it if you'd drop me a line. The article has not,
as of yet, been slated for publication, but he will supply a finished
copy to anyone who responds or requests one. The finished work may
also appear in a future issue of CuD.
Thanks for your time and assistance! Gordon Meyer
72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at
tk0jut2@niu.bitnet
+++++++++++++++++++++
PhD Seeks info on Computer Security
+++++++++++++++++++++
Paul Taylor, a PhD candidate in England, sent the following note
along. He is doing some interesting research, and is trying to
obtain additional data.
+++++++
From: P.A.Taylor@EDINBURGH.AC.UK
Subject: PhD Seeks Info on Computer Security
Date: 18 Apr 91 14:17:16 bst
I'm into the second year of a PhD looking at the rise of the computer
security industry and the concomitant rise of cracking/browsing and
viruses, here at the University of Edinburgh.
Part of my research involves e-mail interviews and questionnaires. If
you would be willing to take part in it, then please get in touch.
I'll send you a yes/no type questionnaire and after that if you are
willing, a set of questions designed more to start a dialogue about
some of the issues surrounding computer security, which could form the
basis of an on-going e-mail interview to be acknowledged or kept
anonymous in my final thesis, depending on the wishes of the
respondent.
ALL MY WORK IS FOR PURELY ACADEMIC PURPOSES AND TOTAL CONFIDENTIALITY
IS GUARANTEED.
IF IN DOUBT AS TO MY ACADEMIC STATUS PLEASE CONTACT ME AND INDEPENDENT
VERIFICATION CAN BE SUPPLIED.
Thank you in advance,
Paul A. Taylor,
Depts of Economics and Politics,
Edinburgh University.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************