Computer underground Digest Wed Sept 27, 1995 Volume 7 : Issue 77 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #7.77 (Wed, Sept 27, 1995) File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd) File 2--New Firewalls Book from O'Reilly File 3--CIX alternative to InterNIC's registration process. File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd) File 5--COMPUTERS & THE LAW CONFERENCE INFO File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 20 Sep 1995 22:59:35 -0500 (CDT) From: David Smith Subject: File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd) ---------- Forwarded message ---------- From: "Robert A. Hayden" -----BEGIN PGP SIGNED MESSAGE----- The following memo can be found at: http://www.state.mn.us/ebranch/ag/memo.txt As a resident of Minnesota, I have a great concern over how far this inturrpretation can go. The AA BBS case seems to be ripe for repeat under this, as can any other law that diffes between Minnesota and another state. This is bad, IMHO. I have deleted a small amount of white space, otherwise the memo is exact as it appears on the web page. ================ WARNING TO ALL INTERNET USERS AND PROVIDERS THIS MEMORANDUM SETS FORTH THE ENFORCEMENT POSITION OF THE MINNESOTA ATTORNEY GENERAL'S OFFICE WITH RESPECT TO CERTAIN ILLEGAL ACTIVITIES ON THE INTERNET. PERSONS OUTSIDE OF MINNESOTA WHO TRANSMIT INFORMATION VIA THE INTERNET KNOWING THAT INFORMATION WILL BE DISSEMINATED IN MINNESOTA ARE SUBJECT TO JURISDICTION IN MINNESOTA COURTS FOR VIOLATIONS OF STATE CRIMINAL AND CIVIL LAWS. The following discussion sets out the legal basis for this conclusion. Minnesota's general criminal jurisdiction statute provides as follows: A person may be convicted and sentenced under the law of this State if the person: (1) Commits an offense in whole or in part within this state; or (2) Being without the state, causes, aids or abets another to commit a crime within the state; or (3) Being without the state, intentionally causes a result within the state prohibited by the criminal laws of this state. It is not a defense that the defendant's conduct is also a criminal offense under the laws of another state or of the United States or of another country. Minnesota Statute Section 609.025 (1994). This statute has been interpreted by the Minnesota Supreme Court. In State v. Rossbach, 288 N.W.2d 714 (Minn. 1980), the defendant appealed his conviction for aggravated assault. The defendant, standing inside the border of an Indian Reservation, had fired a rifle across the boundary line at a person outside the border. The defendant claimed that Minnesota courts did not have jurisdiction because his act took place off of Minnesota lands. Applying Minnesota Statute { 609.025 and the common law, the Minnesota Supreme Court affirmed the conviction, holding that the intentional impact within Minnesota land created jurisdiction. Id. at 715-16. The Minnesota Court of Appeals reached a similar result in State v. Brown, 486 N.W.2d 816 (Minn. Ct. App. 1992). In Brown, the court implicitly found that Minnesota courts had criminal jurisdiction over individuals in Iowa who mailed unlicensed gambling equipment to Minnesota residents. Id. at 817-18. Minnesota courts have applied similar jurisdictional principles in civil cases. In State v. Red Lake DFL Committee, 303 N.W.2d 54 (Minn. 1981), the Minnesota Supreme Court held that state courts had jurisdiction over a committee of the Red Lake Indian Tribe which had purchased space for political advertisements in a newspaper circulated in the state. At issue was whether the committee had to register under state ethical practices laws. The committee argued that it had done nothing outside of the reservation, since the transaction with the newspaper took place inside the reservation, and the committee did not assist in the circulation of the newspaper. In holding that the committee was required to register under state ethical practices law, the Supreme Court responded to this argument as follows: Defendants say nothing they did occurred outside the reservation, but they choose to ignore that what they did caused something to occur beyond the reservation boundaries, namely, the dissemination of a political message, which is the activity here sought to be regulated. Id. at 56 (emphasis added). The above principles of Minnesota law apply equally to activities on the Internet. Individuals and organizations outside of Minnesota who disseminate information in Minnesota via the Internet and thereby cause a result to occur in Minnesota are subject to state criminal and civil laws. An Example Of Illegal Activity On The Internet - Gambling Gambling appears to be an especially prominent aspect of criminal activity on the Internet. There are a number of services outside of Minnesota that offer Minnesota residents the opportunity to place bets on sporting events, purchase lottery tickets, and participate in simulated casino games. These services are illegal in Minnesota. Lotteries A lottery is defined as "a plan which provides for the distribution of money, property or other reward or benefit to persons selected by chance from among participants some or all of whom have given a consideration for the chance of being selected." Minnesota Statute Section 609.75, Subdivision 1(a) (1994). Generally, it is unlawful in Minnesota to sell or transfer a chance to participate in a lottery. Minnesota Statute Section 609.755(2) (1994). It is also unlawful to disseminate information in Minnesota about a lottery, except a lottery conducted by an adjoining state, with intent to encourage -2- participation therein. Minnesota Statute Section 609.755(3). Acts in Minnesota in furtherance of a lottery conducted outside of Minnesota are included, notwithstanding its validity where conducted. Minnesota Statute Section 609.75, Subdivision 1(c) (1994). Violation of these provisions is a misdemeanor, punishable by up to 90 days in jail, or a fine of up to $700, or both. Minnesota Statute Section 609.755 (1994); 609.02, Subdivision 3 (1994). It is a gross misdemeanor under Minnesota law to conduct a lottery. Minnesota Statute Section 609.76, Subdivision 1(3) (1994). A gross misdemeanor is punishable by up to one year in jail, or a $3,000 fine, or both. Minnesota Statute Section 609.02, Subdivision 4 (1994). -3- Sports Bookmaking Sports bookmaking is defined as "the activity of intentionally receiving, recording or forwarding within any 30-day period more than five bets, or offers to bet, that total more than $2,500 on any one or more sporting events." Minnesota Statute Section 609.75, Subdivision 7 (1994). Engaging in sports bookmaking is a felony, which is punishable by more than one year imprisonment. Minnesota Statutes Sections 609.76, Subdivision 2 (1994); 609.02, Subdivision 2 (1994). Intentionally receiving, recording, or forwarding bets or offers to bet in lesser amounts is a gross misdemeanor. Minnesota Statute Section 609.76, Subdivision 1(7) (1994). Accomplice Liability Minnesota's accomplice statute provides that one who intentionally aids, advises, counsels, or conspires with another to commit a crime is equally liable for that crime. Minnesota Statute Section 609.05, Subdivision 1 (1994). Therefore, persons or organizations who knowingly assist Internet gambling organizations in any unlawful activity may themselves be held liable for that unlawful activity. Thus, for example, Internet access providers and credit card companies that continue to provide services to gambling organizations after notice that the activities of the organizations are illegal would be subject to accomplice liability. In addition to being illegal under Minnesota law, the Internet gambling organizations appear to violate several provisions of the federal law. All of the services appear to violate 18 United States Code Section 1084, which prohibits the foreign or interstate transmission of bets or wagers or information on bets or wagers by use of a wire communication. In as much as the Internet gambling organizations involve lotteries, they would also appear to violate 18 United States Code Section 1301 (prohibiting the "importing or transporting" of lottery tickets; 18 United States Code Section 1302 (prohibiting the mailing of lottery tickets); and 18 United States Code Section 1304 (prohibiting the "broadcasting" of lottery information). Sections 1084 and 1301 provide for felony-level penalties, while Sections 1302 and 1304 provide for misdemeanor penalties. Placing A Bet Through Internet Gambling Organizations Minnesota residents should be aware that it is unlawful to make a bet through Internet gambling organizations. Minnesota law makes it a misdemeanor to place a bet unless done pursuant to an exempted, state-regulated activity, such as licensed charitable gambling or the state lottery. Minnesota Statute Sections 609.75, Subdivisions 2 - 3; 609.755(1) (1994). The Internet gambling organizations are not exempted. Therefore, any person in Minnesota who places a bet through one of these organizations is committing a crime. -4- Minnesota residents should also be aware of forfeiture provisions related to unlawful gambling activity. Minnesota Statute Section 609.762, Subdivision 1 (1994) provides that the following items are subject to forfeiture: (a) Devices used or intended for use, including those defined in section 349.30, subdivision 2, as a gambling device, except as authorized in sections 349.11 to 349.23 and 349.40; (b) All moneys, materials, and other property used or intended for use as payment to participate in gambling or a prize or receipt for gambling; and (c) Books, records, and research products and materials, including formulas, microfilm, tapes, and data used or intended for use in gambling. A "gambling device" is defined as "a contrivance which for a consideration affords the player an opportunity to obtain something of value, other than free plays, automatically from the machine or otherwise, the award of which is determined principally by chance." Minnesota Statute Section 609.75, Subdivision 4 (1994). Under this definition of "gambling device", a computer that is used to play a game of chance for something of value would be subject to forfeiture. Gambling is just one example of illegal activity on the Internet. However, the same jurisdictional principles apply with equal force to any illegal activity. Please direct any inquiries regarding this notice, or report violations of Minnesota law to the Law Enforcement Section, Minnesota Attorney General's Office, Suite 1400, NCL Tower, 445 Minnesota Street, St. Paul, Minnesota 55101-2131, telephone (612) 296-7575.. ------------------------------ Date: Wed, 20 Sep 1995 11:33:36 -0700 From: Sara Winge Subject: File 2--New Firewalls Book from O'Reilly FOR IMMEDIATE RELEASE September 20, 1995 PRESS--FOR REVIEW COPIES, CONTACT: Sara Winge 707/829-0515 sara@ora.com O'REILLY PUBLISHES GUIDE TO INTERNET FIREWALLS New Book Describes Theory and Practice of Key Computer Security Technology SEBASTOPOL, CA--O'Reilly & Associates has released "Building Internet Firewalls," a practical guide to protecting computer systems from the growing threats to Internet security. Determined Internet hackers and computer criminals can wreak havoc if they break into computer systems that are connected to the Internet. Firewalls are an important security tool for responding to this threat--they keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. A hardware and/or software solution that restricts access from an internal network to the Internet (and vice versa), a firewall may also be used to separate two or more parts of a local network (for example, protecting finance from R&D). Without firewalls, network security problems can rage out of control. "Building Internet Firewalls" describes a variety of firewall approaches and architectures. It discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. In addition, the book thoroughly covers the technical aspects of firewall design and maintenance, including how to protect the bastion host in a firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Its appendices include a resource summary, a directory of how to find firewall toolkits and other security-related tools, and a detailed summary providing TCP/IP background information. More than a million computer systems are now connected to the Internet. Over 100 million email messages are exchanged each day, along with countless files, documents, and images. For businesses that are striving to be safe on the Net, "Building Internet Firewalls" offers a comprehensive guide to the theory and practice of creating effective firewalls. About the Authors D. Brent Chapman is a consultant in the San Francisco Bay Area, specializing in Internet firewalls. He has designed and built Internet firewall systems for a wide range of clients, using a variety of techniques and technologies. He is also the manager of the Firewalls Internet mailing list. Elizabeth Zwicky is a senior system administrator at Silicon Graphics and the president of SAGE (the System Administrators Guild). She has been involuntarily involved in Internet security since before the Internet worm. # # # Building Internet Firewalls" By D. Brent Chapman & Elizabeth D. Zwicky 1st Edition September 1995 544 pages, ISBN: 1-56592-124-0, $29.95 ------------------------------ From: Stanton McCandlish Date: Mon, 18 Sep 1995 19:09:29 -0400 (EDT) Subject: File 3--CIX alternative to InterNIC's registration process. CIX has put out a white paper on overhauling the domain registration & routing system of the US portion of Internet. Some of it sounds OK, most of it does not sound any better than InterNIC's announcement that it'll start charging for domain names. Some of it's downright strange, and inspires some concern in me. Particular this section: ********** Domain registration will be open to anybody but subject to several restrictions to minimize abuse, i.e., acquisition of trademarked names. Domains registration will require submittal of a taxpayer identification number followed by hard copy submittal of company letterhead and notary certification. Trademark disputes will not be settled by the CIX but between parties in the appropriate legal forum. Domain registration will require a one time fee and a yearly maintenance fee. ********** That's right. No domains for any entity that is not a corporation with a letterhead, no domain if you aren't willing to send a bunch of notarized snail mail, no domain if you are not willing to have your Social Security Number tied to your domain registration, no domain if you're not a US citizen with a Soc. Security Number in the first place. All this of course directly contradicts the opening statement that domain registration is available to "anybody". The document says the registration process is "in realtime", whatever that means. The implication is that it'll be immediate, and faster than InterNIC. Somehow I have a hard time reconciling this with the requirement for snailmailed paperwork. Fortunately, this remains just a proposal. The full text of this item is at: CIX Registry Services Strategy White Paper http://www.cix.org/Reports/registry.html ------------------------------ Date: Tue, 26 Sep 1995 22:38:50 -0500 (CDT) From: David Smith Subject: File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd) ---------- Forwarded message ---------- Update --- Cult Internet Censorship in Norway ============================================= News Release - 24th September 1995 On Thursday, 21st of September, news broke of another cult attempting to silence its critics with the closing down of a student's account at the Univeristy of Bergen, Norway. Within hours, this action had been reported worldwide and many representations made by e-mail; the staff responsible at the University have peddled various alternative stories to those concerned net.citizens who wrote in protest. To set the story straight and to record his gratitude for the enormous support he has received, the student at the center of the affair, Mr Jan Steinar Haugland, has released the following statement: In the autumn of 1993, when I was a Jehovah's Witness [JW], I met a fellow Witness at a pub. His name was Kenneth Hostland, and I was delighted to discover that he was a real Internet expert. I told him about several JW resources that I had found on the Internet, such as the "Friends" mailing list. I had an email account at NHH, the Business School in Bergen, but at the time the computing department there had closed all Internet access except email and gopher, believing this would help them avoid viruses. Kenneth said that since I was a student, I could get a less restricted account at the University of Bergen (UiB). The University and the NHH Business School are closely related. NHH uses the University's computing facilities. If you are matriculated at NHH, you can study at the University. Because of this close connection, I decided to accept Kenneth Hostland's kind offer. I dropped by his office, where he filled out a paper form. I signed it and I was apparently officially authorized to have an account. In the spring of 1995, after wrestling with many disturbing questions about JW doctrine, I came to the conclusion I could no longer be a Jehovah's Witness. I was finally disfellowshiped (excommunicated) for not believing the 90-year-old JW teaching about the significance of the year 1914. Ironically, the very teaching I disagreed with was recently rejected by the Governing Body of Jehovah's Witnesses. The doctrinal reversal was announced to the Witnesses this month (September 1995) in their official publication, the WatchTower. When you are disfellowshipped, all Jehovah's Witnesses are instructed to shun you. Their leaders say that you deserve nothing less than "complete hatred." (Watchtower, 1 Oct 1993, page 18) My interest in the Witnesses continued, however. From time to time, I posted material on the Internet that was critical of JW doctrine. I also posted quotes from old Watchtower publications which demonstrated a history of failed predictions and doctrinal "adjustments". These were no doubt embarassing to the Witnesses, who believe that the Watchtower organization is God's sole channel of information to the world. Kenneth Hostland, who was still a loyal Witness, decided to terminate the account he had set up for me. Even though I was now a student at the University, and had submitted the proper University paperwork to secure my access, Hans Morten Kind was instructed to cancel my account. When Kenneth Hostland first set up my account, I had no idea that getting an account through the University was more difficult than the studies themselves! The procedure was simpler at the NHH Business School; students automatically got an account. They didn't even have to ask. After my account was removed (September 21st, 1995), a number of concerned individuals spread the news on Usenet groups and other forums. Those who sent inquiries to the computing department were told that my objections were "pure nonsense". Mr. Kind and Mr. Hostland later claimed that this was simply a technical matter, involving the cleaning up of accounts. Later still, they appealed to rules and regulations at the University, saying that the account had been set up improperly. Their inconsistent and evasive replies to questions about this matter lead me to only one conclusion: if I had stayed a Jehovah's Witness, my account would not have been cancelled. I am certain it was removed because I was critical towards the Watchtower Society, the multi- billion dollar corporation that uses Jehovah's Witnesses to spread their gospel. Most censorship is done without actually breaking any laws. For example, a newspaper has no legal duty to let all sides of a case be heard. Yet, if they do not, they practice censorship. This practice can be dangerous to democracy and freedom of speech, even when it is technically legal. The individuals responsible can provide credible excuses for their actions; they have done nothing illegal. But it is still censorship. Fortunately, even in cases of "legal" censorship, we all have the right to protest. Thanks to the global stage of the Internet, I am able to tell the world: I was taken off the Internet because of my beliefs. I believe that what they did is offensive to the Internet community, where free speech is accorded the highest value. We all know that the next time, censorship may hit someone who can not obtain another account. When you join in the protest directed at these individuals, you demonstrate that the Internet community cares about censorship. Things like this may happen again, but perhaps next time, the malicious system administrator will remember how people rose up in protest, and decide it isn't worth the trouble. Mr. Kind is publicly calling me a liar, though it appears that he has not read a single public statement I have made. He does not cite any specifics; he simply says I am lying. Before the protest gathered steam, Mr. Kind supported Mr. Hostland. Now, however, his replies to protesters (apparently auto-mailed) claim that my account was illegal from the start. This change of position indicates that the protest is producing results. But I still do not have my original account. For justice to be done, I need your support. My sincerest thanks you to all. Jan S. Haugland jansh@telepost.no However, the efforts of this cult to silence all dissidence continues apace. Cult members themselves have been warned in an internal bulletin this September of the dangers of on-line participation; immediately following this many loyal cultists dropped out of religion forums on the major on-line services, web sites were taken off or emptied of content, and of the two main cult internet mailing lists, one ("friends-chat") was closed down, and the other ("friends-all") began strict moderation of mail. A classic cult pattern of information control. Cultists are not, alas, satisfied with self-censorship and a new campaign has begun to harass postmasters - including the Finnish anon-server administrator who has been a previous target - and SysOps of on-line services with the aim of closing down internet accounts of those who dare to utter a dissident voice in defiance of the supposed God-given authority of their ruling council in Brooklyn, NY. The postmaster of one of Norway's independent Internet providers, telepost.no, has resisted the mail-bombing by cult members in defense of his customers right to free speech - however there are reports this weekend that ex-cult members on other Internet service providers may also have had their accounts closed or suspended. These are independent individuals of limited means and influence, faced with a multi-billion dollar multinational corporation and millions of loyal followers taught to shun and hate anyone who dares impede their business or uncover what they prefer to keep covered-up. Your support is needed *now* to help protect internet freedoms of speech for *everyone* - there are many other powerful corporations and governments, ready to follow up such a trend of repression if the cults are able to do so with impudence. If the first window is left broken, all the rest will follow. TowerWatch ----------------------------------------------------------- "Give me the liberty to know, to utter, and to argue freely according to conscience, above all liberties" - John Milton ----------------------------------------------------------- CopyLeft 1995, TowerWatch ------------------------------ Date: Mon, 18 Sep 1995 14:07:38 -0400 (EDT) From: John Subject: File 5--COMPUTERS & THE LAW CONFERENCE INFO SUN USER GROUP Second Annual Technical Symposium "Computers & The Law" November 12-15, 1995 Tampa, FL As computers are utilized in more and more aspects of everyday life, the once distinct areas of technology, legislature, and law enforcement draw closer together. This unique technical conference provides a forum in which members of these three fields can meet to share experiences and ideas. The four day technical program (a day of tutorials, two days of talks, and another day of tutorials) will provide you with essential knowledge, whether your field is technical, legal, or law enforcement. More detailed information of this symposium are available via email at conference@sug.org or on the World Wide Web at http://sug.org. If you have further questions, contact the Sun User Group at (617)232-0514. +-----------------------------------------------------------------------+ | IMPORTANT DATES TO REMEMBER: | | Early-bird Savings Deadline: October 13, 1995 | | Registrations must be received at the Sun User Group offices | | by October 13, 1995 to be eligible for Early-bird savings | | | | Hotel Discount Reservation Deadline: October 21, 1995 | +-----------------------------------------------------------------------+ CONFERENCE OVERVIEW: SUNDAY, November 12, 1995 - TUTORIAL PROGRAM MONDAY, November 13, 1995 - TECHNICAL SESSIONS TUESDAY, November 14, 1995 - TECHNICAL SESSIONS WEDNESDAY, November 15, 1995 - TUTORIAL PROGRAM TUTORIALS: ---------- The SUG Tutorial Program brings experienced training professionals to you. Courses are presented by skilled teachers who are hands-on experts in their topic areas. The tutorials will cover a variety of topics relating to Sun/SPARC and x86-based machines, running any of a number of operating systems. Those who attend the tutorials will benefit from this unique opportunity to develop essential skills in a unique combination of UNIX system security, ethical, and legal topics. The tutorial program at Tampa is divided into two days, with both full- and half-day tutorials offered. Attendees may select any non-overlapping set of classes. To ensure adequate seating and to reduce crowding, we are requiring that registrants pre-register for specific classes. Please note that some prior knowledge is required for the advanced tutorials. SUG's tutorial program is always in demand, and some tutorials are almost guaranteed to sell out before registration closes. Attendance is limited, and pre-registration is strongly recommended. On-site registration is possible ONLY if space permits. Sunday, November 12, 1995 Tutorials ----------------------------------- S1 - 9:00am-5:00pm Basics of Unix Security Peter Galvin, Corporate Technologies, Inc. S2 - 9:00am-5:00pm System Administrator Liability Edward A. Cavazos Wednesday, November 15, 1995 Tutorials ----------------------------------- W1 - 9:00am-5:00pm Firewalls and Internet Security Rik Farrow, Consultant W2a - 9:00pm- 12:30pm Network Intrusions John Smith, Computer Crime Unit, Santa Clara County District Attorney's Office T2b - 1:30pm-5:00pm Ethics and Systems Administration S.Lee Henry, Johns Hopkins University KEYNOTE SPEAKERS: ----------------- The Sun User Group keynote sessions are topical and informative -- speakers you won't hear at any other conference! Ken Geide, Chief, FBI Economic Espionage Unit "Economic Espionage in the USA" Monday, November 13, 9 a.m. - 10:30 a.m. Mike Godwin, Staff Counsel, The Electronic Frontier Foundation Tuesday, November 14, 9 a.m. - 10:30 a.m. Randal L. Schwartz, Stonhenge Consulting Services "Just another convicted Perl hacker" Tuesday, Nov 14, 4:30 p.m. - 5:30 p.m. TECHNICAL SESSIONS (Monday, November 13 & Tuesday, November 14): ------------------------------------------------------------------- "Computers & The Law" features three distinct parallel tracks of talks: Technical; Legal; and Law Enforcement. The TECHNICAL track will focus on nuts and bolts of maintaining a UNIX or Sun system. These talks will cover the all of the newest developments in the changing world of technology. There are talks from the experts on: UNIX and network security; encryption; software distribution in a client/server environment; firewalls. The LEGAL track will cover up-to-date issues of privacy and morality, as well as in-depth examinations of the current and changing laws pertaining to software and hardware. Legal professionals from all over the country will examine how changing technologies will necessitate changes in the law. The LAW ENFORCEMENT track discusses computers as tools. Tools which can help in the prevention of crimes -- or in the commission of them. Join or experts in high-tech crime as the discuss the discovery, investigation, apprehension, and prosecution of crackers, software pirates, and bandits on the information on the information superhighway. SPECIAL FEATURES: "The Future of Computer Crime, A Panel" "Unix Security Tools Workshop" Peter Galvin, Corporate Technologies, Inc. The Great Debate: Round 2 "Can Existing Laws Be Applied To Cyberspace?" RECEPTION Sponsored by our friends at SunExpress! --------- You are invited to join in the fun, mingle with old and new friends, and enjoy the plentiful hors d'oeuvres and beverages. The Sun User Group Reception is Monday, November 13, from 6:00-8:00pm at the Conference hotel. The Reception is included in the technical sessions registration fee. Additional Reception tickets may be purchased for a nominal fee at the conference. THE SUN USER GROUP ------------------ The Sun User Group (SUG) brings people together to share information and ideas about using Sun/SPARC equipment. You can discover new ways to save time and money in the pages of _Readme_. You can get quick answers to important questions on our electronic mailing list. At our seminars you can learn more about the capabilities of your workstation. At our conferences, you can meet other people who are doing progressive and innovative work with their Sun/SPARC equipment. Now is a better time than ever to join the Sun User Group. We're reorganized, reinvented and growing every day. We've recently introduced exciting new services specifically for our official LUGs. Our members-only electronic mailing list has become one of the most popular routes on the information highway. Our annual conferences feature respected teachers - from Sun Microsystems as well as many other areas of the industry. REGISTRATION INFORMATION AND FEES --------------------------------- CONTACT SUG AT office@sug.org FOR A REGISTRATION FORM TODAY!!! +-------------------------------------------------------------------+ | Sun User Group members save $50.00! | +-------------------------------------------------------------------+ +-------------------------------------------------------------------+ | Earlybird Bonus! Register before October 13, 1995 and | | save $100.00 *plus* get the Sun User Group "Security" | | CD-ROM for FREE -- a $195 savings if you register by | | October 13, 1995! | +-------------------------------------------------------------------+ More detailed information of this symposium are available via email at conference@sug.org or on the World Wide Web at http://sug.org. If you have further questions, contact the Sun User Group at (617)232-0514. For more information please call (617) 232-0514. SUG Symposium 1330 Beacon Street, Suite 344 Brookline, MA 02146 USA Email: registration@sug.org Fax: (617) 232-1347 You may also register over the telephone with a Master Card or Visa. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.77 ************************************