Computer underground Digest Wed Aug 30, 1995 Volume 7 : Issue 71 ISSN 1004-042X Editors: J
Computer underground Digest Wed Aug 30, 1995 Volume 7 : Issue 71
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
CONTENTS, #7.71 (Wed, Aug 30, 1995)
File 1--Symposium on Security
File 2--EFF, Mike Godwin, Cliff Stoll
File 3--WebSite Wins Dvorak Award
File 4--NIST Statement re "New" Crypto Policy
File 5--eye on Silicon Snake Oil (eye Reprint)
File 6--Russian Hackers hit Citibank (Risks-Forum Digest reprint)
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
Date: Sat, 19 Aug 1995 14:39:03 +1494730 (PDT)
From: Christopher Klaus
Subject: File 1----Symposium on Security
Network System Operating Threats from Hackers, Crackers, Sniffers
"Exploring the Hostile Cyberspace"
NASA Lewis Research Center
Information Systems Security Association
Information Systems Audit & Control Association
National Computer Security Association (NCSA)
Cleveland Airport Marriott
September 11-13, 1995
Author of "Information Warfare - Chaos on the Electronic Superhighway"
Dr. Peter Tippett
Keynote Address. President, National Computer Security Association
Author of The Internet Security Scanner will conduct a mini-penetration
and a host of public and private sector experts.
New Dimensions International
P. O. Box 897, Cardiff, CA 92007
(619) 436-5618 Fax: (619) 436-1241
MONDAY 11 SEPTEMBER - THE GLOBAL THREAT TO CONFIDENTIALITY
0800 Welcome and Opening Remarks
0830 Addressing the National Problem: The Emerging Role of the CIO
John Lynn, NASA Chief Information Officer
0900 Keynote Address - The Challenge to our National Computer Resources
Dr. Peter Tippett, President, National Computer Security Association
1020 The Researchers Dilemma: Distributed Freedom or Controls?
Deputy Director, NASA Lewis Research Center
1035 Featured Speaker - Winn Schwartau, author of "Information Warfare"
1140 Luncheon (Mr. Schwartau will autograph his book throughout the day)
1300 National Defense Perspective
Ken Van Wyck, Defense Information Systems Agency (invited)
1430 The Iceberg Paradigm - Loss of Technology
Pam Kotlenz, Lewis Research Center
1500 Trends, Analysis and Industry Technical Response
Ron Tencati, Industry Specialist
Executive Panel: "Emerging Leadership Roles in Cyberspace " (Board Room)
TUESDAY 12 SEPTEMBER - VULNERABILITIES AND TECHNO-BUSTERS
0800 Raising Awareness - Information Systems Security Association
0815 Mini-Penetration Workshop
Christopher Klaus, author of the "Internet Security Scanner"
1030 Hacker Techniques; Tracking the Intruder; A Sniffer Case Study
Brent Mead, Jet Propulsion Laboratory
1315 The National Information Infrastructure and NASA Incident Response (NASIRC)
Richard Carr, NASA Information Technology Security Manager
1600 The Impact on Industry
George Valente, Information Systems Audit & Control Association
WEDNESDAY 13 SEPTEMBER - CATCHING AND CONVICTING COMPUTER CRIMINALS
0830 Keynote Speaker "The Law Enforcement Perspective"
Scott Charney, Department of Justice
1010 National Trends and Responses to Computer Crimes
Richard Ress, FBI National Computer Crime Squad
1315 Investigating Computer Penetrations
1450 Panel Discussions moderated by Fred Villella, NDI
For reservations, call:
New Dimensions International
Symposium Registration Fee: $345.00
SYMPOSIUM REGISTRATION FORM
Please return completed form to:
New Dimensions International
P.O. Box 897, Cardiff, CA 92007.
(619) 436-5618 or fax (619) 436-1241
City: State: Zip:
Office Phone: Fax:
Hotel Requirements: YES NO Room Rate: $67/night
o This symposium draws together some of the best computer security
practitioners from the public and private sectors. Experts will
discuss the nature of the growing menace from computer penetrations,
the serious magnitude of this threat and the potential consequences.
o Actual cases will be discussed and the growing "Hacker" culture and
criminal uses of hacker techniques will be described. There are
emerging challenges to today's operational personnel and the
leadership of tomorrow. The presentations in this symposium will
provide strong justification for improved organizational response to
curb losses and potentially consequential damages to operating and
o Some of the more revealing details will describe the vulnerability
of the personal computer in the privacy of our homes. We will learn
how celebrated "Master Hackers" penetrate even home computers. We
will discover the exponential rate of new Internet subscribers in
other nations and the potential impact on our network operating
Sunnyvale, California September 19-21*
Nashua, New Hampshire October 24-26*
Palm Springs, California November 6-8*
* Speakers will vary by location. For detailed information and list of
speakers for specific locations, please contact New Dimensions International
Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431
Internet Security Systems, Inc. "Internet Scanner lets you find
2000 Miller Court West, Norcross, GA 30071 your network security holes
Web: http://iss.net/ Email: email@example.com before the hackers do."
Date: Sat, 19 Aug 1995 16:18:05 -0700
From: Andre Bacard
Subject: File 2----EFF, Mike Godwin, Cliff Stoll
*** PLEASE REDISTRIBUTE FREELY ***
Wednesday, August 16th BayFF (Bay Area Chapter of EFF) held a meeting in
San Francisco with speakers Mike Godwin and Cliff Stoll. Attached are a
few notes for those of you who missed the opportunity to attend.
See you in the future,
firstname.lastname@example.org Bacard wrote "The Computer Privacy
Stanford, California Handbook" [Intro by Mitchell Kapor].
http://www.well.com/user/abacard Published by Peachpit Press, (800)
Enjoy your privacy... 283-9444, ISBN # 1-56609-171-3.
Notes from the BayFF Semi-Underground
Wednesday, August 16, 1995, I found myself cruising through Golden Gate
Park. Suddenly I swerved into the right lane and shouted "Eureka." For
those who don't know, Eureka is the California state motto which, in the
tradition of the Gold Rush, means "I found it!" In San Francisco IT means
a parking place. Feeling euphoric about my good fortune, I started the
short walk long on memories towards the Haight-Ashbury district. It was
delightful and fogless. The salty air was cool. The smell of grass (the
type that city gardener's mow) was fresh. Passing a guitarist, I thought
of the Grateful Dead's Jerry Garcia, recently deceased. My mind flashed
back twenty-five years ago when I first visited Haight-Ashbury. Twenty-
five years ago at the dawn of the Computer Age... So many silicon chips
under the bridge... I thought of all the people in the Haight mourning
Garcia and donating to the Haight-Ashbury Free Clinic in Garcia's memory.
I flashed back upon my first meeting with John Perry Barlow, lyricist for
the Grateful Dead and co-founder of EFF. That meeting helped inspire me
to write COMPUTER PRIVACY HANDBOOK. Such were a few of the images that
danced through my mind as I entered the Cole & Page Street Public
Library... It was appropriate to be attending an EFF meeting.
John Gilmore, EFF Board Member, was the first person I saw. Gilmore
reminds me of a lean Chesire cat. He has a mischievous smile as if to
say, "You won't believe what just happened." Maybe we'll never discover
what just happened with John, since he's so much into crypto. In any
case, Gilmore introduced Mike Godwin as "The first lawyer in Cyberspace
and EFF's first employee."
Mike Godwin ("a cool guy who survived law school with his personality
intact" according to an anonymous EFF publicist) spoke for 90 minutes
about how to deal with reporters and, more specifically, about his role
in trying to correct the damage done to cyberspace by TIME's infamous
"CyberPorn" cover story. Godwin detailed many flaws in Carnegie Mellon
University undergraduate Mr. Rimm's study of cyberporn that led to the
"CyberPorn" piece. Godwin said of Rimm's paper: "It's as if you surveyed
the bookstores in Times Square in Manhattan and generalized to all
bookstores in America."
Cliff Stoll ("a wild and crazy guy with interesting hair" according to
the same anonymous EFF publicist) is the author of the best-selling book
SILICON SNAKE OIL. Stoll personifies the eccentric heritage of the San
Francisco counter-culture. With lots of humor and drama, Stoll presented
a critical view of the Internet. "The Internet is a perfect diversion
from learning" and "The Internet opens many doors that lead to empty
rooms" were two of his many memorable lines. Stoll noted that wisdom and
experience play little role in the Computer Cult (i.e., all the Hype
surrounding the Information Superhighway).
The EFF events that I've attended at WIRED's office in the San Francisco
Mission District and last night are well worth the hassle of hunting down
a parking place.
To learn more about future monthly BayFF meetings, send this e-mail:
See you at future events,
P.S. I'm the guy with the fedora hat who people mistake for Indiana
Date: Mon, 21 Aug 1995 15:55:12 -0700
From: Ellen Elias
Subject: File 3----WebSite Wins Dvorak Award
O'REILLY & ASSOCIATES WINS PRESTIGIOUS DVORAK AWARD FOR EXCELLENCE
Sebastopol, CA, August 21, 1995 -- O'Reilly & Associates' WebSite (TM)
has received the prestigious 1995 John C. Dvorak Award for Excellence
in PC Telecommunications, it was announced at ONE BBSCON's annual
conference in Tampa, Florida on Saturday, August 19.
WebSite won the award for Outstanding Web Server Software, a new
category this year. More than 40,000 nominations for this year's
fourteen award categories were received by internationally known
writer John Dvorak and his committee. WebSite is a 32-bit World Wide
Web server software package for Windows 95 and Windows NT which offers
an easy-to-use, completely graphical interface, from setup through
administration and Web building.
WebSite was developed collaboratively by O'Reilly & Associates,
independent developer Bob Denny, and a team at Enterprise Integration
Technologies (EIT) headed up by Jay Weber.
Tim O'Reilly, President of O'Reilly & Associates, expressed his pride
in receiving the award. "In many ways, this is an award to the
Internet's open systems philosophy. The driving idea behind WebSite
was that the Internet has always been a peer-to-peer network. For the
Web to continue that tradition, everyone who has a Web browser ought
to have access to a Web server. That belief set the standards for
price, availability and ease of use. What's more, the net brought
together the people who developed the product, connected them during
the development process, and provided the network of thousands of beta
testers who validated the product."
O'Reilly & Associates joins respected organizations and individuals
such as NCSA Mosaic, San Jose Mercury News, Delphi, America Online,
and Dennis Hayes (Hayes Microcomputer Products) which have received
Dvorak awards during the past four years. Historically, these awards
are presented to the individual and corporate pioneers in the
telecommunications industry whose vision and commitment have most
significantly contributed to the advancement of PC telecommunications
over the preceding twelve months.
Accepting the award for WebSite were Gina Blaber, Director of O'Reilly
& Associates' Software Products Group, Robert Denny, WebSite
developer, and Atul Arora, member of EIT development team. O'Reilly &
Associates is recognized worldwide for its definitive books on the
Internet and UNIX, and more recently for its development of online
content and software. Bob Denny created Win httpd, the 16-bit server
for Windows 3.1 which has been available on the net and widely praised
since early 1994. EIT, long-time developer of software tools for Web
server administration, also founded TERISA Systems, the leader in Web
security technology, and the CommerceNet Consortium, driving
deployment of Internet electronic commerce.
Date: Fri, 18 Aug 1995 09:52:06 -0500
From: sobel@EPIC.ORG(David L. Sobel)
Subject: File 4----NIST Statement re "New" Crypto Policy
EMBARGOED FOR RELEASE: NIST 95-24
3 p.m. EDT, Thursday, Aug. 17, 1995
Contact: Anne Enright Shepherd COMMERCE'S NIST ANNOUNCES
(301) 975-4858 PROCESS FOR DIALOGUE ON
KEY ESCROW ISSUES
Furthering the Administration's commitment to defining a
workable key escrow encryption strategy that would satisfy
government and be acceptable to business and private users of
cryptography, the Commerce Department's National Institute of
Standards and Technology announced today renewed dialogue on key
A Sept. 6-7 workshop will convene industry and government
officials to discuss key escrow issues, including proposed
liberalization of export control procedures for key escrow
software products with key lengths up to 64 bits, which would
benefit software manufacturers interested in building secure
encryption products that can be used both domestically and
Key escrow encryption is part of the Administration's
initiative to promote the use of strong techniques to protect the
privacy of data and voice transmissions by companies, government
agencies and others without compromising the government's ability
to carry out lawful wiretaps.
In a July 1994 letter to former Rep. Maria Cantwell, Vice
President Gore said that the government would work on developing
exportable key escrow encryption systems that would allow escrow
agents outside the government, not rely on classified algorithms,
be implementable in hardware or software, and meet the needs of
industry as well as law enforcement and national security. Since
that time, discussions with industry have provided valuable
guidance to the Administration in the development of this policy.
For example, many companies are interested in using a corporate
key escrow system to ensure reliable back-up access to encrypted
information, and the renewed commitment should foster the
development of such services.
Consideration of additional implementations of key escrow
comes in response to concerns expressed by software industry
representatives that the Administration's key escrow policies did
not provide for a software implementation of key escrow and in
light of the needs of federal agencies for commercial encryption
products in hardware and software to protect unclassified
information on computer and data networks.
Officials also announced a second workshop at which industry
is invited to help develop additional Federal Information
Processing Standards for key escrow encryption, specifically to
include software implementations. This standards activity would
provide federal government agencies with wider choices among
approved key escrow encryption products using either hardware or
software. Federal Information Processing Standards provide
guidance to agencies of the federal government in their
procurement and use of computer systems and equipment.
Industry representatives and others interested in joining
this standards-development effort are invited to a key escrow
standards exploratory workshop on Sept. 15 in Gaithersburg, Md.
This workshop is an outgrowth of last year's meetings in which
government and industry officials discussed possible technical
approaches to software key escrow encryption.
The Escrowed Encryption Standard, a Federal Information
Processing Standard for use by federal agencies and available for
use by others, specifies use of a Key Escrow chip (once referred
to as "Clipper chip") to provide strong encryption protection for
sensitive but unclassified voice, fax and modem communications
over telephone lines. Currently, this hardware-based standard is
the only FIPS-approved key escrow technique. NIST officials
anticipate proposing a revision to the Escrowed Encryption
Standard to allow it to cover electronic data transmitted over
computer networks. Under this revised federal standard, the
Capstone chip and other hardware-based key escrow techniques
developed for use in protecting such electronic data also will be
approved for use by federal agencies.
As a non-regulatory agency of the Commerce Department's
Technology Administration, NIST promotes U.S. economic growth by
working with industry to develop and apply technology,
measurements and standards.
Date: Wed, 09 Aug 1995 19:25:49 -0400
From: kkc@INTERLOG.COM(K.K. Campbell)
Subject: File 5----eye on Silicon Snake Oil (eye Reprint)
eye WEEKLY July 20 1995
Toronto's arts newspaper .....free every Thursday
Ya read 15 megs, and whaddaya get?
Another day older and deeper in debt.
St Peter dontchya call me, coz I can't go...
Just got 10 megs more from a bunch of assholes.
-- lyrics copyright 1995
Howling (In The Wires) Wolf
aka K.K. Burnett
Last week, I penetrated the Eglinton Rd. event horizon and spent six
days on Georgian Bay. Among many astonishing adventures, I found our
dog -- a puppy we got from the River St. Humane Society in '87 -- is
actually a German shepherd-otter crossbreed.
What the FAQ has this to do with the net?
Well, not only were there no computers up there, there weren't even
phones. Even if I'd had a laptop, I couldn't have jacked into the net.
I purposely only took one slim book.
Cold Turkey from email and netnews...
And it was glorious.
Which brings us to Cliff Stoll's new book, _Silicon Snake Oil: Second
Thoughts On The Information Highway_ (Doubleday, $29.95 cloth). It's a
reaction to the Info Shock phenomenon typical among netters. A call to
unplug, if only for a while, for a fresher perspective. Cliff lights a
match to the Star-Spangled Info Highway rhetoric about democracy and
"giving the homeless laptops."
You might recall Stoll as author of the (now classic) non-fiction
computer-espionage thriller _The Cuckoo's Egg_ -- buy it, consume it.
In that '89 book, Stoll writes about snaring an unknown intruder who
slid into his UNIX network at California's Lawrence Livermore research
labs. A Hanover hacker netted from a University of Bremen computer to a
German Datex-P network, then via satellite link to a defence contractor
computer in McClean, Va., where he used a Tymnet switching system to
enter Stoll's Berkeley machine, which was on the Arpanet/Milnet (U.S.
military nets). He then hit maybe 400 military computers. The book
pisses all over _WarGames_, that homage to the Disney-esque hacker.
So after a literary hiatus -- and scads of convention appearances --
Cliff's back. And he's cranky, dammit.
Stoll's out to broadside anything that twitches in cyberspace. He's
collected all the hype and rebuts it relentlessly. But don't be fooled.
Stoll's not really trashing cyberspace. Behind the pages of
(well-deserved) jibes at (what passes for) overt net.culture, Cliff
remains right on-board. Wouldn't surprise me to see him flogging IBM
wares as a "net.spokesperson" in a year or three.
He's never been your "typical" anything. He's sort of a leftover
hippie, without the anti-tech hard-on -- an astronomer by education,
hacker by inclination. His ideal weekend: staring at stars, consuming
homemade cookies and shakes and sleeping beside his UNIX system. He's
kinda what you'd get if Scotty were fucked up on Saurian Brandy (that
blue swill) and beamed Albert Einstein, Pauly Shore and Phiber Optik
aboard as a single person.
In _Silicon Snake Oil_, Stoll remains unpretentiously charming. It's
far more meandering and anecdotal. Travel with teenage Cliff as he
spelunks. Follow an acquaintance who scoots around abandoned tracks in
a little hand-built railcar.
The result: a book as readable as the first, but far less important.
It's more like Uncle Cliffy rocking on the cottage porch, sharing some
homespun phee-los-oh-phee, whilst drawing on his pipe and scanning the
lake. Not surprisingly you end up with some simplistic social theory --
like suggesting a kid's use of the net is what alienates him from his
family: "Kids that interact with computers rather than their parents
miss out on the most important part of growing: being close to their
He's rather confusing cause and effect.
But it's enjoyable. I finished it over a weekend.
During lunch the following Tuesday I speed-scanned the tube. The remote
came to a screeching stop. I asked myself: "Did I just see some
zany-haired guy who looked like Cliff Stoll playing with a yo-yo on
TV?" I threw the remote into reverse and crawled back maybe 10
I answered myself: "Yes. Yes, you did. You did see some zany-haired guy
who looks like Cliff Stoll playing with a yo-yo on TV."
It _was_ Cliff. On CITY-TV's _LunchTelevision_. Book promo tour. The
host held the book. Cliff held a yo-yo. And he was trying to make that
"Shit, Cliff," I muttered, fumbling for volume. "Are you suggesting to
these yahoos that yo-yos are one of the lost pleasures human beings
would rediscover if they disconnected?"
Yo-yos and antics like hiding behind TV monitors aside, Cliff did make
one solid point about keeping citizens docile in an Info Society:
"The way to control people's thoughts is not to lock them out of
information, but feed them a steady diet of dross."
It's a tactic familiar to journalists: government and business bury
critical data in a sea of sludge. As info is becoming "cheaper" all the
time, the general public can now share the same wonderous experience by
reading Usenet newsgroups -- especially unmoderated, ill-defined
"The quality of information drops yearly -- the quantity goes up,"
He's hardly the first to notice this. As one netter wrote me in email:
"Every so often I feel this compulsion to bail on all the local
newsgroups [like tor.* and ont.*] due to their somewhat soap-opera-ish
nature.... However, if I did, I'd be depriving myself of a nightly
chuckle. Do ya think all the local groups all over the world are as
resplendant with idiots as tor.general and ont.general are? You could
just subscribe to *.general, and probably have a bigger laugh than any
of the alt.* groups."
So listen to Uncle Cliff. Unsubscribe from wanker.general! Put down
that 2,700-page _Holy Precepts of UNIX Technobabble Revealed, 3rd
Get out yer yo-yos!
Date: Thu, 22 Aug 1995 22:51:01 EDT
From: CuD Moderators
Subject: File 6----Russian Hackers hit Citibank (Risks-Forum Digest reprint)
Date--Mon, 21 Aug 95 7:51:22 PDT
From--"Peter G. Neumann"
>From - Risks-Forum Digest Monday 21 August 1995 Volume 17 : Issue 28
Court documents were unsealed on 18 Aug 1995 that implicated Russian
computer hackers in about 40 transfers totalling more than $10 million
from the Citibank electronic funds transfer system, between June and
October, 1994. The hackers were caught as they were trying to move
$2.8M. The bank indicated only $400,000 was actually transferred --
which at first reading would seem to contradict the $10 million
figure, except for the fact that Citibank noted that none of its
clients lost any money, and that all of the transfers were either
blocked or reversed. Six people have been arrested. 24-year-old
Vladimir Levin (who worked for AOSaturn, a Russian software house, and
who is currently under arrest in London) apparently had figured out
how to get around or through the Citibank security system. [Source:
An Associated Press item in the San Francisco Chronicle, 19 Aug 1995,
D1.] Sounds like another case of reusable (fixed) passwords biting the
[Christopher Klaus added the following info,
based on a report of Voice of America correspondent Breck
The other five include two people in the U.S., two in The
Netherlands, and one in Israel. PGN]
Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators
Subject: File 7----Cu Digest Header Info (unchanged since 19 Apr, 1995)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:email@example.com
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (126.96.36.199) in /pub/CuD/
ftp.eff.org (188.8.131.52) in /pub/Publications/CuD/
aql.gatech.edu (184.108.40.206) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
End of Computer Underground Digest #7.71
E-Mail Fredric L. Rice / The Skeptic Tank