Computer underground Digest Sun April 30, 1995 Volume 7 : Issue 34 ISSN 1004-042X Editors:
Computer underground Digest Sun April 30, 1995 Volume 7 : Issue 34
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Desecrator: Emo Shrdlu
CONTENTS, #7.34 (Sun, April 30, 1995)
File 1--***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
File 2--Clipper paper available for anon FTP
File 3--New Maillist battles Omnibus Terrorism Bill/Join NOW! (fwd)
File 4--Ohio Job Opening
File 5--making reality acceptable: cybercafe @ compress
File 6--Playing to Win in DC June 1-4
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
Date: Thu, 27 Apr 1995 02:14:46 -0400
From: "Robert A. Rosenberg"
Subject: File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
((MODERATORS' NOTE: We've received number of posts regarding the
so-called "Good Times" virus, and "warnings" have appeared on
many of the news groups we read. The following is unlikely to
end it until it's time to pay the modem tax)).
At 18:04 4/26/95, firstname.lastname@example.org wrote:
[Another "Good Times" Virus Warning]
Here we go again .
The "Good Times Virus" is a Urban Legend. In reality it is composed of the
mass mailing of spurious warnings like the above from those who
(admittedly) are trying to be helpful.
Here is the real story (Note that date on the warning to see how long this
BS has been going on).
Number 94-04c:December 8, 1994
Welcome to the fourth issue of CIAC Notes! This is a special edition
to clear up recent reports of a "good times" virus-hoax. Let us know
if you have topics you would like addressed or have feedback on what
is useful and what is not. Please contact the editor, Allan L. Van
Lehn, CIAC, 510-422-8193 or send E-mail to email@example.com.
Reference to any specific commercial product does not necessarily
constitute or imply its endorsement, recommendation or favoring by
CIAC, the University of California, or the United States Government.
THE "Good Times" VIRUS IS AN URBAN LEGEND
In the early part of December, CIAC started to receive information
requests about a supposed "virus" which could be contracted via
America OnLine, simply by reading a message. The following is the
message that CIAC received:
Here is some important information. Beware of a file called Goodtimes.
Happy Chanukah everyone, and be careful out there. There is a virus on America
Online being sent by E-Mail. If you get anything called "Good Times",
DON'T read it or download it. It is a virus that will erase your hard
drive. Forward this to all your friends. It may help them a lot.
THIS IS A HOAX. Upon investigation, CIAC has determined that this message
originated from both a user of America Online and a student at a university
at approximately the same time, and it was meant to be a hoax.
CIAC has also seen other variations of this hoax, the main one is that
any electronic mail message with the subject line of "xxx-1" will
infect your computer.
This rumor has been spreading very widely. This spread is due mainly
to the fact that many people have seen a message with "Good Times" in
the header. They delete the message without reading it, thus
believing that they have saved themselves from being attacked.
These first-hand reports give a false sense of credibility to the
There has been one confirmation of a person who received a message
with "xxx-1" in the header, but an empty message body. Then, (in a
panic, because he had heard the alert), he checked his PC for viruses
(the first time he checked his machine in months) and found a
pre-existing virus on his machine. He incorrectly came to the
conclusion that the E-mail message gave him the virus (this particular
virus could NOT POSSIBLY have spread via an E-mail message). This
person then spread his alert.
As of this date, there are no known viruses which can infect merely
through reading a mail message. For a virus to spread some program
must be executed. Reading a mail message does not execute the mail
message. Yes, Trojans have been found as executable attachments to
mail messages, the most notorious being the IBM VM Christmas Card
Trojan of 1987, also the TERM MODULE Worm (reference CIAC Bulletin
B-7) and the GAME2 MODULE Worm (CIAC Bulletin B-12). But this is not
the case for this particular "virus" alert.
If you encounter this message being distributed on any mailing lists,
simply ignore it or send a follow-up message stating that this is a
WHO IS CIAC?
CIAC is the U.S. Department of Energy's Computer Incident Advisory Capability.
Established in 1989, shortly after the Internet Worm, CIAC provides
various computer security services free of charge to employees and
contractors of the DOE, such as: Incident Handling consulting,
Computer Security Information, On-site Workshops, White-hat Audits.
CIAC is located at Lawrence Livermore National Laboratory and is a
part of its Computer Security Technology Center. CIAC is also a
founding member of FIRST, the Forum of Incident Response and Security
Teams, a global organization established to foster cooperation and
coordination among computer security teams worldwide.
If you require additional assistance or wish to report a
vulnerability, call CIAC at 510-422-8193, fax messages to 510-423-8002
or send E-mail to firstname.lastname@example.org.
ATTENTION: For emergencies and off-hour assistance, CIAC is available 24-hours
a day to DOE and DOE contractors via an integrated voicemail and
SKYPAGE number. To use this service, dial 1-510-422-8193 or
1-800-759-7243 (SKYPAGE). The primary SKYPAGE PIN number, 8550070 is
for the CIAC duty person. A second PIN, 8550074 is for the CIAC
Project Leader. Keep these numbers handy.
CIAC's ELECTRONIC PUBLICATIONS
Previous CIAC Bulletins and other information are available via
anonymous FTP from ciac.llnl.gov.
CIAC has several self-subscribing mailing lists for electronic publications:
1. CIAC-BULLETIN for Advisories, highest priority - time critical
information, and Bulletins, important computer security information;
2. CIAC-NOTES for Notes, a collection of computer security articles;
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
software updates, new features, distribution and availability;
4. SPI-NOTES, for discussion of problems and solutions regarding the
use of SPI products.
Our mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines. To subscribe
(add yourself) to one of our mailing lists, send requests of the
subscribe list-name LastName, FirstName PhoneNumber
as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES,
SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for
"LastName" "FirstName" and "PhoneNumber." Send to:
email@example.com (NOT to: firstname.lastname@example.org)
subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36
subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36
You will receive an acknowledgment containing address and initial PIN,
and information on how to change either of them, cancel your
subscription, or get help.
To subscribe an address which is a distribution list, first subscribe
the person responsible for your distribution list. You will receive an
acknowledgment (as described above). Change the address to the
distribution list by sending a second E-mail request. As the body of
this message, substitute valid information for "list-name," "PIN", and
"address of the distribution list" when sending
E-mail to email@example.com:
set list-name address PIN distribution_list_address
e.g., set ciac-notes address 001860 firstname.lastname@example.org
To be removed from a mailing list, send the following request via
E-mail to email@example.com:
e.g., unsubscribe ciac-notes
For more information, send the following request:
If you have any questions about this list, you may contact the list's owner:
This document was prepared as an account of work sponsored by an agency of the
United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government or
the University of California, and shall not be used for advertising or
product endorsement purposes.
End of CIAC Notes Number 94-04c 94_12_08
Date: Thu, 27 Apr 1995 15:24:59 -0400 (EDT)
From: Michael Froomkin
Subject: File 2--Clipper paper available for anon FTP
My paper, "The Metaphor is the Key: Cryptography, the Clipper Chip, and
the Constitution" is now available for anonymous FTP. It is about 180pp.
long, and contains more than 800 references.
I would welcome your feedback on this paper -- even (especially?)
contributions to the inevitable errata sheet.
(Please note this docment resides at what is officially a "temporary"
site, so that if you create a web link to it, please let me know so that
I can notify you when it moves).
Contents of FTP://acr.law.miami.edu/pub/..
clipper.wp WP 5.1/Dos
clipperwp.zip Pkzipped version of clipper.wp
clipper.ps My best effort at Postscript. YMMV. (approx. 7Mb.)
clipperps.zip Pkzipped version of clipper.ps
clipper.ps.gz Gzipped version of clipper.ps
Ports provided by nice people (please note I have not checked these)
clipper.ps.Z Unix compressed version of clipper.ps with carriage
returns removed -- courtesy of Whit Diffie
clipperMSW.sea.hqx Binhexed self-extracting Microsoft Word 5.1 for
Macintosh version of clipper.wp -- courtesy
of Ted Byfield
None of these files contains correct and final page numbers, and there are
generally trivial typos that were corrected in the printed version. The
printed version appears at 143 U.Penn.L.Rev. 709 (1995).
I intend to put up a web version presently. The .index file in the above
directory will have details when a clean copy is ready for prime time. A
link to an experimental and highly buggy HTMLized version may appear at
erratic intervals at http://acr.law.miami.edu at the very bottom of the
A.Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law |
U.Miami Law School | MFROOMKI@UMIAMI.IR.MIAMI.EDU
PO Box 248087 |
Coral Gables, FL 33146 USA | It's warm here.
Date: Fri, 28 Apr 95 13:18:13 EDT
From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
Subject: File 3--New Maillist battles Omnibus Terrorism Bill (fwd)
Obviously, CUD would be impacted by this legislation if enacted,
as would we all.
W. K. Gorman
Copyright (C) 1995 by W. K. Gorman.
With explicit reservation of all rights, exclusively and without prejudice,
per UCC 1-207. Any commercial or for-profit use of all or any part of this
message, in any form, is expressly forbidden. Opinions are my own.
Date--Fri, 28 Apr 1995 03:43:29 -0400
Fromfirstname.lastname@example.org (Howard L. Bloom)
Subject--New Maillist battles Omnibus Terrorism Bill/Join NOW!
The Omnibus Counterterrorism Bill was languishing in Congress before
The Oklahoma Bombing. It is now on the fast track and needs to be stopped
or at least changed drastically so that it does not infringe on our
rights as Citizens. A concise description of what this bill represents
follows the subscribe information to this list.
Please post information relevant to fighting or making this bill more
constitutional as this bill in both the house and senate makes a mockery
of the constituiton. This is a non-partison issue that has people on
the right, the left and the middle raising eyebrows. THIS IS NOT A
RIGHT WING ANGRY WHITE MALE ISSUE!
The listowner (me) is an Angry White Jewish Male who sees grave dangers
should it be voted on in its present state. This list is not going to be
a discussion list about whether the bill is good or bad, I think it is bad
and it is my list. So, if you think it is good, then feel free to join, but
do not inhibit or dilute the momentum of this list. I am a private
individual who pays for the list traffic on the webcom.com service.
If you would like to join you must decide whether you wish to join the
reflected list where each message sent creates a new message in your
mailbox, or the digest which lumps them all together for the day and
sends many messages in one email post.
To Join, send a message to one of the following addresses:
Tonoemail@example.com (this is the refelected list)
Tonofirstname.lastname@example.org (this is the digest)
Subject(please leave the subject blank)
in the body of the message put just one word, the word "subscribe"
You do not have to put your name or email address.
And now a description of the Terrorism Bill
Omnibus Counterterrorism Bill - S. 390 and H.R. 896
New FBI Charter To Investigate Political Groups
February 10, 1995 the Omnibus Counterterrorism Bill was
introduced as S. 390 into the Senate and as H.R. 896 in the
House. It was initiated by the FBI, and passed on by the Justice
Department and the White House. Senators Biden (D-DE) and Specter
(R-PA) initiated it in the Senate, Rep. Schumer (D-NY) and Dicks
(D-WA) in the House. It has bipartisan support and could get
* This is a general charter for the FBI and other agencies,
including the military, to investigate political groups and
causes at will. The bill is a wide-ranging federalization of
different kinds of actions applying to both citizens and
non-citizens. The range includes acts of violence (attempts,
threats and conspiracies) as well as giving funds for
humanitarian, legal activity.
* It would allow up to 10 year sentences for citizens and
deportation for permanent resident non-citizens for the "crime"
of supporting the lawful activities of an organization the
President declares to be "terrorist", as the African National
Congress, FMLN in El Salvador, IRA in Northern Ireland, and PLO
have been labelled. It broadens the definition of terrorism. The
President's determination of who is a terrorist is unappealable,
and specifically can include groups regardless of any legitimate
activity they might pursue.
* It authorizes secret trials for immigrants who are not charged
with a crime but rather who are accused of supporting lawful
activity by organizations which have also been accused of
committing illegal acts. Immigrants could be deported1) using
evidence they or their lawyers would never see; 2) in secret
proceedings; 3) with one sided appeals; 4) using illegally
* It suspends posse comitatus - allowing the use of the military
to aid the police regardless of other laws.
* It reverses the presumption of innocence - the accused is
presumed ineligible for bail and can be detained until trial.
* It loosens the rules for wiretaps. It would prohibit probation
as a punishment under the act - even for minor nonviolent
* Those who remember the McCarran Walter Act will recognize this
bill, only in some ways this is broader and potentially more
* This bill is highly politicalthe President can determine who
is a terrorist and change his/her mind at will and even for
economic reasons. The breadth of its coverage would make it
impossible for the government to prosecute all assistance to
groups around the world that have made or threatened to commit
violent acts of any sort. Necessarily its choices would be
targeted at organizations the government found currently
offensive. People to be deported would be chosen specifically
because of their political associations and beliefs.
* The new federal crimeinternational terrorism doesn't cover
anything that is not already a crime. As the Center for National
Security Studies notes"Since the new offense does not cover
anything that is not already a crime, the main purpose of the
proposal seems to be to avoid certain constitutional and
statutory protections that would otherwise apply."
* While many provisions of this bill could well be found
unconstitutional after years of litigation, in the mean time the
damage could be enormous to the First Amendment and other
constitutional rights including presumption of innocence and
right to bail.
Date: Thu, 27 Apr 1995 08:14:50 -0700
From: Peter Miller
Subject: File 4--Ohio Job Opening
Job Posting -- Please Distribute:
Ohio Community Computing Center Network Coordinator
The Ohio Community Computing Center Network (OCCCN) will be establishing
14 computer centers in low-income neighhborhoods in Cleveland, Columbus,
Dayton, Akron, Toledo, Youngstown, and Marietta. Funding for these
centers comes from the settlement of the Ameritech Alternative
Regulation case before the Ohio Public Utilities Commission. The OCCCN
seeks to hire a part-time Coordinator to assist these centers in
becoming operational and to provide ongoing support and coordination.
The OCCCN Coordinator will be based in Columbus and provide program and
technical assistance to each center, do outreach throughout the state,
and perform statewide administrative duties, under the direction of the
OCCCN Coordinating Committee, as follows:
1. Provide Ohio community computing centers with:
* assistance in becoming operational;
* assistance in making telecommunications arrangements for connecting
centers to each other and to the national information infrastructure;
* organization development assistance: planning and proposal
development, fundraising, publicity, and board development;
* program support: activities suggestions, technical support,
assistance in choosing software, hardware and consultants, and in
developing volunteer program;
* arrange for and participate in on-site visits and regional and
2. Do outreach:
* identify and establish contact with similar programs;
* develop a pool of associates for the OCCCNetwork and coordinate
involvement of those doing related work in the region;
* attend regional meetings and conferences as appropriate.
3. Perform administrative duties statewide:
* actively facilitate and participate in online conferences for the
* work with funders in developing financial support for statewide
and local coordination;
* participate in discussion of directions and goals for OCCCN and
involve involve centers in those discussions;
* review periodic financial and performance reports from each center;
summarize and report to the committee.
* provide timely reports regarding activity in the above roles.
The OCCCN Coordinators should be familiar with telecommunications and
with either Mac or IBM-compatible systems, their basic applications, and
trouble-shooting skills. The Coordinator should have community
organizing experience and orientation; educational and related community
technology experience will be particularly useful.
Please send resume and cover letter by May 12 to Ellis Jacobs, OCCCN
Coordinating Committee, Legal Aid Society of Dayton, Inc., 333 West
First St., Suite 500, Dayton, OH 45402.
Playing to Win Network Director
Education Development Center 617/969-7101 x2727
55 Chapel St. FAX: 617/ 969-4902
Newton, MA 02158 email@example.com
Date: Sun, 30 Apr 1995 19:57:07 +0000
From: heath@CYBERCAFE.ORG(heath bunting)
Subject: File 5--making reality acceptable: cybercafe @ compress
cybercafe @ compress
when the external can not be understood
we DESIRE its transformation into our internal form
if you have anything you can not cope with
please send them to cybercafe and we will restructure them
for your pleasant CONSUMPTION
this will be accomplished using the new technique of
private SUBJECTIVE compression instead of public objectivity
(compression is the process of interpretation often resulting in LOSS)
subjective compression works through SELF reference and paradox.
searching recursively for the WHOLE in smaller and smaller
sections of itself, until all you have left is YOU.
when the world is like us we will no longer desire CHANGE
send the undigestible to:
4 egmont house
116 shaftesbury ave
london wv1 7dj
or via our web form
cybercafe aims to promote/create spaces/situations in which
people can create/behave/express/experience
in ways unavailable in currently existing places
Domains of activity radio/tv/telephones/fax/
=-=-=-=-=-=-=-=-=-= uphold dignity/creativity =-=-=-=-=-=-=-=-=-=
firstname.lastname@example.org vox 44 171 437 8584
http://www.cybercafe.org/cybercafe/ mbl 44 374 823 840
flat 4, 116 shaftesbury ave bbs 44 171 439 3998
london w1v 7dj UK
Date: Thu, 27 Apr 1995 08:23:46 -0700
From: Peter Miller
Subject: File 6--Playing to Win in DC June 1-4
For Immediate Distribution:
PLAYING TO WIN COMMUNITY COMPUTING CENTER NETWORK
Hosts 4th Annual Meeting in Washington DC
Friday, June 2 - Sunday, June 4, 1995
Future Center at the Capital Children's Museum
800 Third Street NE -- near Union Station
Thursday, June 1, 7:30 pm Kick Off with
Working Group Against Information Redlining Forum on
"Disenfranchised Communities and the Information Superhighway"
Summary Program Schedule
Preliminary Program Thursday, June 1 7:30-9:30 - see below
Friday, June 2 - 9:00 am to 7:00 pm
Registration & Continental Breakfast
Issues of Access: The Best of Times, The Worst of Times --
* Mario Marino, Chairman, The Morino Institute, Reston, VA
* Laura Breeden, Director, Telecommunications and
Information Assistance Program, Washington, DC
* James Ferguson, Executive Director, National Coalition on
Black Voter Participation, Washington, DC
* Lauren-Glenn Davitian, Coordinator, Chittenden Community
Television, Burlington, VT
Keynote Speaker: Elliot Soloway, Ph.D., Associate Professor of
Electrical Engineering & Computer Science, Artificial Intelligence
Lab, University of Michigan
Concurrent Presentations & Workshops:
Starting a Community Technology Center
Technology and Literacy
Managing Community Technology Programs
The PTW Network -- IGC Training for New Users
Role of Math and Science in Community Technology Programs
Volunteers: How to Find Them/How to Keep Them
Reception sponsored by The Morino Institute
Saturday, June 3 9:00 am to 5:45 pm
Registration & Continental Breakfast
Affiliate Presentations & Workshops:
The Whys and Hows of Public Access
Integrating Technology: Video and Computers
IGC Telecommunications Training for Experienced Users
Role of Telecommunications in Community Technology Programs
Exploring Internet Resources
Tools Play: Using basic computer tools to create learning games
Math & Science Projects and Resources
Program Assessment and Evaluation
The PTW Network Agenda: 1995-96 and Beyond
Sunday, June 4 9:00 am to 1:00 pm
Regional and Steering Committee Meetings
+ + + + + + + + + + + + + + + + + + + +
Conference co-sponsors: The Capital Children's Museum, The Morino
Institute, The Legent Corporation, the National Science Foundation,
and Playing To Win, Inc.
To provide opportunities for personal networking and for exchanging
information and experiences.
To enhance community-based technology programs by providing
technical training and program development information.
To explore and understand issues related to providing equity in
technology access at the local, regional and national levels.
The Annual All-Affiliates Meeting of The Playing To Win Network
brings together Network affiliate members, potential affiliates,
associates, friends, supporters and other persons interested in
learning more about how community-based technology programs can and
do provide technology access to underserved and disenfranchised
peoples. In addition to gaining practical program development
information, participants will learn how programs throughout the PTW
Network are working and collaborating to open the doors to
technology in their communities. Panel discussions, workshops, and
training sessions will be led by affiliate members, PTW Network
project staff and consultants, as well as representatives from
public policy and public interest organizations. Opportunities for
informal socializing will include group lunches and a Friday night
reception sponsored by The Morino Institute.
Registration and Lodging:
Representatives of the PTW Network and conference presenters do not
pay a registration fee. All other participants are charged $25 to
attend the conference ($35 at the door). To register in advance for
any day of the conference, contact Ruth Rappaport at RuthR@edc.org,
or 800/225-4276 x2329, with your name, address, organization, and
phone, and note whether you would like to take advantage of any of
the reserved lodging and for what dates. A block of rooms has been
reserved at the Radison Barcelo ($100 single; $113 double) and
Carlyle Suites ($89; $99) Hotels. A detailed conference information
packet will be mailed to all registered participants in May. This
packet will include the final program, schedule, maps, and
Discounted airfare is available from US Air. Contact: Sally Kahn,
Stewart International Travel, 800-441-8666. Tell her you are attending
the PTW Network Conference in Washington DC.
DISENFRANCHISED COMMUNITIES AND THE INFORMATION SUPERHIGHWAY
THE WORKING GROUP AGAINST INFORMATION REDLINING
Thursday, June 1st, 7:30 -- 9:30 p.m.
Radison Barcelo Hotel
2121 "P" St. NW
The Working Group Against Information Redlining, a coalition of
primarily Washington-based organizations concerned with low-income
community access to the National Information Infrastructure (NII),
and the Playing to Win Network of community technology centers invite
you to join us on June 1, from 7:30 to 9:30 p.m. to exchange ideas
and information on our efforts to ensure that the gap between the
haves and have-nots is not replicated (much less widened) in the
deployment of the Information Superhighway.
At the meeting on June 1st, we will distribute information about the
proposed community telecommunication forums and resources we are both
planning. We will want to discuss with you your possible
participation and your ideas about content and community needs.
WHAT WE ARE ABOUT:
Universal access has become a major concern in building the NII.
Community-based non-profits in rural and disdvantaged areas lack
affordable access to the information superhighway as well as a voice
in the development of the content it will carry. Will the
information be relevant to community needs? Will people have the
capacities and resources to make use of it and be active
contributors? If so, how will that be determined?
There is growing interest in people speaking for and about low-income
and other disenfranchised individuals. However, there is little in
the way of these individuals speaking for themselves in order to
shape the debate and policies in ways beneficial to them. In the
long run, empowering affected populations to speak for themselves
will be essential. Resources for using the NII are limited: when and
where communities have come to understand the real opportunities this
"highway" could open up for them -- access to education and
educational resources, access to medical information and (potentially
treatment), access to needed governmental information and benefits,
training opportunities, job opportunities -- they don't have the
resources (financial, human, or technical) to take advantage of what
is already available. Capacity building will be an essential
component even if the NII is technically designed to reach all
Toward this end, the Working Group Against Information Redlining has
been meeting on a monthly basis since May 1994. The groups
participating -- OMB Watch, RTK NET (the Right-to-Know Network), the
Benton Foundation, Alliance for Public Technology, Alliance for
Community Media, the National Council of Nonprofit Associations, the
National Trust for the Development of African American Men, the
National Consumer Law Center and numerous others -- have developed a
proposal for community forums on non-profit access to and use of the
NII. The Playing to Win Network, consisting of over 50 neighborhood
community technology programs, is currently planning a program
focusing on using telecommunications to heighten participants'
interest in and involvement with local, state, and national policies
upon which their technology access rests.
These community forums and center resource projects will be discussed
at the June 1st gathering. For more information on the June 1st
program or either project, contact:
Patrice McDermott Peter Miller
OMB Watch Playing to Win Network
202/234-8494 800/225-4276 x2727
Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators
Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:email@example.com
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (184.108.40.206) in /pub/CuD/
ftp.eff.org (220.127.116.11) in /pub/Publications/CuD/
aql.gatech.edu (18.104.22.168) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
End of Computer Underground Digest #7.34
E-Mail Fredric L. Rice / The Skeptic Tank