home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud3
/
cud322a.txt
< prev
next >
Wrap
Text File
|
1992-09-19
|
5KB
|
102 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 3, Issue #3.22 (June 21, 1991) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / / Bob Kusumoto
ARCHMASTER: Brendan Kehoe
+++++ +++++ +++++ +++++ +++++
CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Punishment and Control: Reply to Gene Spafford
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CuD is available via electronic mail at no cost. Hard copies are available
through subscription or single issue requests for the costs of reproduction
and mailing.
USENET readers can currently receive CuD as alt.society.cu-digest.
Back issues of Computer Underground Digest on CompuServe can be found
in these forums:
IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
LAWSIG, DL1 (Computer Law)
TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
Back issues are also available from:
GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
(2) cudarch@chsun1.uchicago.edu;
(3) dagon.acc.stolaf.edu (130.71.192.18).
E-mail server: archive-server@chsun1.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission. It is assumed
that non-personal mail to the moderators may be reprinted unless
otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground. Articles are preferred
to short responses. Please avoid quoting previous posts unless
absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Contributors assume all
responsibility for assuring that articles submitted do not
violate copyright protections.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: Moderators
Subject: Moderators' Corner
Date: 21 June, 1991
********************************************************************
*** CuD #3.22: File 1 of 3: Moderators Corner ***
********************************************************************
+++++++++++++++++
Three LoD members form Comsec Data Security
+++++++++++++++++
Craig Neidorf sent over the following article announcing the formation
of a security company by three former members of the Legion of Doom.
The new company was not a sudden inspiration, but the result of
considerable research and groundwork prior to the announcement.
According to the partners, the Texas-based companies has already
landed several significant contracts. When asked why anybody should
hire ex-hackers, one commentator responded that security, like
hacking, is just another form of puzzle-solving, and those who can
find the holes are likely to those most-able to close them.
*****
From: TIME Magazine, June 24, 1991, page 13.
AFTER YOU'VE BEAT 'EM -- JOIN 'EM
After infiltrating some of America's most sensitive computer banks,
is there any challenge left for a digital desperado? Only to go legit,
say three former members of the notorious hacker group, the LEGION OF
DOOM, who have quit the outlaw game to start Comsec Data Security. The
Legionnaries claimed an 80% success rate in penetrating computer
networks, and now they want to teach private industry to protect itself
>from the next generation of intruders. "You can't put a price tag on the
information we know," says Scott Chasin, a Comsec partner. But they'll
try.
(This article features a color photo of the three founding members:
Erik Bloodaxe, Doc Holiday, and Malefactor.)
********************************************************************
>> END OF THIS FILE <<
***************************************************************************