Computer underground Digest Sun 28 Mar, 1999 Volume 11 : Issue 19
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Sloppy Editor: Etaion Shrdlu, III.
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #11.19 (Sun, 28 Mar, 1999)
File 1--Warning: Free Computer Scam (Telecom Digest reprint)
File 2--Hacking Legend's Sign-Off (LA Times Excerpt)
File 3--UK ISP found liable for defamation
File 4--Worker Convicted for Violent E-mail
File 5--Internet-related bills before the Texas state legislature
File 6--61-page report on Utah school Internet censorship
File 7--Please Register for Spring ISPCON Now!!!
File 8--Cu Digest Header Info (unchanged since 10 Jan, 1999)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
TO UNSUB, SEE ADMINISTRAVIA IN CONCLUDING FILE
---------------------------------------------------------------------
Date: Fri, 26 Mar 99 13:05 CST
From: TELECOM Digest Editor
Subject: 1--Warning: Free Computer Scam (Telecom Digest reprint)
((MODERATORS' NOTE: For those not familiar with Pat Townson's
TELECOM DIGEST, it's an exceptional resource. From the header
of TcD:
"TELECOM Digest is an electronic journal devoted mostly but
not exclusively to telecommunications topics. It is
circulated anywhere there is email, in addition to various
telecom forums on a variety of public service systems and
networks including Compuserve and America On Line. It is also
gatewayed to Usenet where it appears as the moderated
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
qualified organizations and individual readers. Write and tell
us how you qualify:
* ptownson@massis.lcs.mit.edu * ======" ))
==================
Source - TELECOM Digest Thu, 25 Mar 99 Volume 19 - Issue 38
Editor - Patrick A. Townson
By now many folks have seen the latest variation on 'Make Money Fast',
the one about a free computer if you go to website xxx and 'register'.
A further variation says, 'what is better than getting a computer for
free? Owning the web site where the free computers are given out ...'
That in itself isn't news. Nothing much here suprises netizens any
longer, at least not those who have been around since before that
invention of the devil called the World Wide Web and the massive
takeover of net resources by commercial entities to the detriment of
the rest of us.
But while most spam is just intended for petty larcency, some of it
gets a bit more involved, and even sounds like it is coming from a
real company and not just some two-bit con-artist with a computer
and his own domain name set up somewhere. Today I have such a case
for your consideration. **Please post this in all newsgroups and
mailing lists where apropriate, because reasonably intelligent people
are falling for it.**
This time, the guy is not spamming; he is sending out press releases
using the legitimate company name and people who read the 'press
release' respond to him or his web site so they can get fleeced.
Meet Johnnie Collie, of Muskegan, Michigan.
Mr. Collie is using the name 'National Research, Inc'. Never mind that
there is a *legitimate* research company in Michigan known as National
Research Corporation, which is registered with the state. Mr. Collie
is neither involved with that legimate firm, nor had they ever heard
of him. He does not have a DBA ('doing business as') license registered
for National Research. But I guess it always helps to have a legitimate
company name behind you if you want to want to scam people. When I
talked to Mr. Collie today, he told me the company was registered 'in
another state' but he did not seem to know or want to say where.
In this case, the scheme goes like this: to avoid complaints of
spamming, put out press releases to the internet news services like
Yahoo and others announcing that your research company has been
employed by a national manufacturer of computer hardware to poll the
public about its uses of computers. Toss in the name 'Packard Bell' or
"Hewlitt Packard' for good measure. Let the internet news services
and the search engines do your spamming for you ... ... now
when someone sees your press release on their Yahoo ticker they click
to read the article and are given your email address for details, in
this case mailto:jccollie@aol.com ...
A letter of inquiry to that email address gets back a note saying 'go
to our web page and register for the program' ... and the web page
address is http://www.getonefreepc.com ... there we find the deal
to be thus: sign up for a totally free computer and monitor, the works.
Fill out an online questionairre about how yourself and how you plan
to use the computer. Agree to fill out a more detailed questionairre
on the same subjects a year from now.
This project is being backed by National Research, Inc, therefore it
has to be legit, right? There is just one catch: to avoid simple
curiosity seekers, people looking for something for nothing, people
who defraud the company, etc ... there is a one-time registration
fee of twenty dollars to participate. This fee, we are told, covers
all the expenses of the polling, the distribution, etc. It goes to
show that you are acting in good faith and not just a con-artist out
to get a free computer.
So fill out your form, give them your VISA number, then sit back and
wait for your computer to arrive ... and keep on waiting, and waiting
and waiting.
The address given for the 'company' was 845 Allen Avenue in Muskegon,
Michigan. I traced that back to being in a strictly residential
neighborhood, and the residence of one 'Johnny Collie'. Switchboard.com
shows it as 'A Collie' with three phone numbers given:
A Collie
845 Allen Avenue
Muskegon, MI 49442
Phones: 616-773-7878 773-7985 777-7515
The first number is answered personally; the second number goes to an
answering machine which answers 'National Research'. I asked to speak
with Johnny, and the man who answered said that was himself. I asked
him when might the free computer be expected to arrive.
"On the web I never said it would be coming right away.
We are going to wait until we have the twelve thousand
replies we wish to receive, then all computers will be
shipped at one time."
Oh, you mean no shipments until you have received twelve thousand
'processing fees' at twenty dollars each? How long might that take?
"Well we just put our notice up this week ...
Baloney. I have seen a variation on this a couple months ago that
someone else mentioned, but anyway ....
"We are having some trouble getting this totally together,
it might be several months to a year before we have all
the names accumulated."
I told Johnny I had already talked to National Research Corporation
and they knew nothing about this at all; had never even heard of
him. I told him they knew of him now, since I gave them all the data
I had on him including copies of his postings, etc. That's when he
told me they were from out of state.
Already having done a DNS lookup and other stuff on www.getonefreepc.com
I asked Johnny where he got his ISP service, and who handled his
domain name. He acted totally ignorant, claiming that all he knew how
to do was turn a computer on and off, nothing much else. I asked him
if he 'knew anything about a company called America On Line' and he
said yeah, that was where he called in when he used his computer. I
asked him who was his credit card processor; again he acted ignorant
and said it 'is some outside service, you would have to ask the
programmer who did my web page'.
I asked to speak to that person, but of course he was not around
and his name was not known.
Using the 'Sam Spade' utility for Windows, we find a DNS record
which shows as follows for getonefreepc.com:
Administrative contact: J. Collie
Technical contact: reg@wwwnexus.net
Note that the site name does NOT have a 'dot' between www and nexus
as in www.nexus -- that is incorrect. The name is wwwnexus, and
apparently no connection to the Nexus Corporation in Connecticut.
From what I could tell, wwwnexus.net is in Ohio somewhere.
Johnny gets his credit card service from pluto.safe-order.net and
he seemed very surprised that I was able to find that out. I told
him if you do a raw dump of his web page, just look and see where
the forms data sends its output,
i.e. http://pluto.safe-order.net/getonefreepc/
Whispering sweetly in the phone, I told Johnny the first thing I
wanted him to do was reverse that credit card transaction for me
which I had used in this experiment. I had already sent a note to
webmaster@pluto.safe-order.net and 'abuse' at the same site telling
them to void the transaction, and giving them the reference numbers.
I also sent a note to webmaster and abuse@wwwnexus.net asking them
to review their relationship with Johnny Collie for possible
violations of their rules. And of course, for the little good it
did I also sent a note to TOS at America On Line,
suggesting it might be worthwhile to review their subscriber's
screen name tccollie for possible violations.
I mention this today only to remind readers that some scams on the
net are far more sophisticated than others. Very few of us spend
five seconds reading or considering all the chain letters and make
money fast items we get each day. It being spam, we automatically
reject it for having no value. But when it appears in a respected
news source such as Yahoo, and carries the name of a legitimate
company -- although not actually from that company -- then we might
tend to read the item and act on it.
** DO NOT BE DECIEVED BY EMAIL OR NEWSGROUP POSTINGS OR
OTHER NEWS SOURCES SAYING THAT NATIONAL RESEARCH INC
IS GIVING A FREE COMPUTER IF YOU WILL PARTICIPATE IN
THEIR STUDY. YOU WILL GET NO COMPUTER, AND YOU WILL
LOSE TWENTY DOLLARS. NATIONAL RESEARCH CORPORATION IS
INVOLVED IN THIS IN ANY WAY. IF YOU ARE WAITING
TO GET YOUR COMPUTER OR HAVE ASKED FOR THE RETURN OF
YOUR MONEY, TRY ASKING JOHNNY COLLIE, 845 ALLEN AVE,
MUSKEGON, MI 49442 616-773-7878 773-7985 777-7515.
And consider pressuring organizations such as wwwnexus.net
and pluto.safe-order.net who accept clients such as this. All
it does is besmirch their own reputation on the net as safe
places to be.
*PLEASE DISTRIBUTE THIS TO OTHER GROUPS AS APPROPRIATE,
WITHOUT SPAMMING TO DO SO. THANK YOU.*
Patrick Townson
Editor/Publisher
Telecom Digest http://telecom-digest.org
------------------------------
Date: Sat, 20 Mar 1999 11:18:22 -0600 (CST)
From: Jim Thomas
Subject: 2--Hacking Legend's Sign-Off (LA Times Excerpt)
SOURCE: http://www.latimes.com/CNS_DAYS/990318/t000024439.html
Thursday, March 18, 1999
Hacking Legend's Sign-Off
Kevin Mitnick plagued the world of computers for two decades and led
the FBI on a two-year-long chase. Now his saga is about to end.
By GREG MILLER, Times Staff Writer
Four years after FBI agents burst into a North Carolina apartment
and captured the nation's most notorious computer hacker, the
saga of the man they hunted down--Kevin David Mitnick--seems
finally to be nearing a conclusion.
Mitnick and federal prosecutors signed a plea agreement this
week that sources said will keep the accused hacker in prison for
roughly one more year.
In addition, Mitnick will likely be barred from ever
profiting from his story, and restricted from so much as touching
a computer for at least three years after his eventual release.
The agreement, which still requires the approval of a
federal judge and comes just weeks before his trial was to begin,
brings the curtain down on an era.
More than even Mitnick seems able to comprehend, he has come
to personify both the golden age of hacking and the intense
public paranoia that accompanied the dawn of the personal
computer revolution. Mitnick's heyday as a hacker is over, but he
remains the ultimate digital boogeyman.
"The Mitnick case is the last vestige of hacker hysteria
from the late 1980s and early 1990s," said Mike Godwin, longtime
general counsel for the Electronic Frontier Foundation, an
Internet civil liberties group.
"It's not that there won't be more hackers. It's just that
cops and the media have moved on. They're more worried about
gambling and porn sites and domain name registrations. But
Mitnick was demonized in that era, and there's still a lot of
people who want to take a piece of him."
------------------------------
Date: Sun, 28 Mar 1999 12:34:40 -0600 (CST)
From: Jim Thomas
Subject: 3--UK ISP found liable for defamation
Source: http://www.cyber-rights.org/press
Cyber-Rights & Cyber-Liberties (UK) Logo
PRESS RELEASES
For Immediate Release - 26 March, 1999
CR&CL (UK) Press Release - UK ISP found liable for defamation
LEEDS - This morning Cyber-Rights & Cyber-Liberties (UK) criticised a
High Court ruling involving liability for defamatory statements made
by a third party against Demon Internet.
Demon Internet, a major UK ISP is more likely to be found liable for
defamation in a case against Dr. Laurence Godfrey, a London-based
nuclear physicist. Demon will appeal against today's pre-trial court
ruling by Mr Justice Morland in London's High Court.
According to a press release by Demon Internet, "the point of law
being decided centres around whether Demon Internet, an Internet
Service Provider, is responsible for the information that is posted to
and made available from newsgroups that are held on Demon Internet's
servers." It should also be noted that the case arises out of a
posting made by an unknown individual in the US, and not by a Demon
Internet customer.
Cyber-Rights & Cyber-Liberties (UK) believes that this decision will
have a profound effect on cyber-speech and UK ISPs will be forced to
monitor and censor third party content going through their servers.
The ruling, if not reversed on appeal would make Britain, a very
hostile place for network development in the Information Age.
Mr. Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK)
stated that:
"The decision will have a chilling effect over the Internet
communications and will force the UK ISPs to take a pro-active role in
relation to Internet content. This is most undesirable and
unacceptable. The Defamation Act does not give adequate protection to
the ISPs and unfortunately the ISPs remain as the `usual suspects'
when civil claims through defamation suits are brought against them."
"It is also totally unacceptable that an offended party should simply
notify an Internet Service Provider claiming the information to be
legally defamatory. The current state of the UK laws forces the ISPs
to be the defendant, judge, and the jury at the same time. Notice
should not be enough in such cases."
Cyber-Rights & Cyber-Liberties (UK) will support Demon's case during
the appeal process.
Contact Information:
Mr Yaman Akdeniz, Director of Cyber-Rights & Cyber-Liberties (UK)
E-mail: lawya@cyber-rights.org
CR&CL (UK) gives oral evidence at the House of Commons
09 March, 1999
LONDON, House of Commons - Today Cyber-Rights & Cyber-Liberties (UK)
told the HC Select Committee on Trade and Industry that "so far,
privacy issues in relation to the use of strong encryption systems
have never been properly reflected in the formulation of UK government
policies." This silence is especially remarkable in the light of other
governmental initiatives such as the Human Rights Act 1998 according
to the oral evidence given by the Cyber-Rights & Cyber-Liberties (UK)
representatives.
Furthermore, the Cyber-Rights & Cyber-Liberties (UK) written
submission stated that "the use of encryption should be prima facie
respected and even encouraged. By contrast, the government approach
should be criticised as being fixated on the value of encryption
solely in connection with commerce and ignoring wider political and
social uses of information technology which might legitimately require
the use of encryption."
"Without the "key recovery" capability, law enforcement agencies
contend that they would be less able to protect the safety of the
public, and this in itself would constitute an infringement of civil
liberties. However, we believe that the solution to the problems of
crime prevention and law enforcement do not lie with accessing private
encryption keys. From our own research into recorded criminal uses of
encryption, we have concluded that the use of encryption has not been
a serious problem for crime detection or prevention. There is no more
than speculation that it will be a problem in the future. In any
event, it seems fanciful to expect that criminals will use
government-mandated encryption systems with key recovery capabilities
when alternative systems of encryption remain readily available.
Government strategy would be naive if it assumed that criminals would
use encryption tools which can be decrypted by the law enforcement
bodies."
The Cyber-Rights & Cyber-Liberties (UK) representatives will also
bring a recently published Council of Europe Recommendation "for the
Protection of Privacy on the Internet," (No R (99) 5 of the Committee
of Ministers to Member States,
http://www.coe.fr/cm/ta/rec/1999/99r5.htm) to the attention of the
Trade and Select Committee. These excellent guidelines are along the
lines of CR&CL(UK)'s approach to individual privacy and drafting of a
"privacy letter" from the users perspective.
Mr Yaman Akdeniz, the Director of CR&CL(UK) stated that:
"The enactment of the Human Rights Act 1998 within the UK is a major
step towards a new era in which individual rights and liberties will
be strongly respected and taken into account while government policies
are fostered. We believe privacy is far the most important right which
needs protection in the Information Age and it should be the duty of
the government to protect such individual rights."
Mr Nicholas Bohm, E-Commerce Policy Adviser to CR&CL(UK) stated that:
"Recent Government announcements have shown that industry and privacy
lobbies are working in the same direction. But the Select Committee
has the chance to show that standing up for individual liberty and
privacy in cyberspace is just as important as supporting commerce and
industry."
Dr Brian Gladman, the Technology Policy Adviser to CR&CL(UK) stated
that:
""Law Enforcement authorities need to overcome their fear of
encryption and their desire for solutions that create more risks for
society than they remove. Instead, they need to invest in the
development of the expertise needed to remain effective in a future
environment where cryptographic information protection will be the
norm."
Professor Clive Walker, deputy director of CR&CL(UK) added:
"In a democratic society, police powers must be open, workable and
fair. These principles will not be achieved by dealings behind closed
doors between the police and Internet Service Providers nor by future
wide-ranging legal powers to access private correspondence. There is
insufficient evidence that encryption is the computer equivalent of a
sawn-off shotgun and that its users need to be potentially treated as
if they were a virtual community of masked villains."
Notes for the Editors
This press release will be available at
http://www.cyber-rights.org/press
Memorandum by Cyber-Rights & Cyber-Liberties (UK) to the House of
Commons Trade and Industry Committee on Electronic Commerce Inquiry,
March 1999 is available through http://www.cyber-rights.org/reports/
------------------------------
Date: Sun, 21 Mar 1999 20:47:29 -0500
From: Matthew Gaylor
Subject: 4--Worker Convicted for Violent E-mail
Source - fight-censorship@vorlon.mit.edu
.c The Associated Press
LAREDO, Texas (AP) -- A postal worker who told a co-worker by
e-mail he might ``go postal'' and set off a ``shootout at the OK
Corral'' has been sentenced to 15 months in prison.
``People can no longer laugh off things like this from postal
workers,'' U.S. District Judge George Kazen said when he
sentenced John Murillo on Thursday.
Murillo, 48, was convicted in December of transporting a threat
across state lines. Although the e-mail was sent to a friend in
Laredo, prosecutors said the message passed through several
states.
``They are trying everything to make me go postal,'' the message
read. ``This Mexican can only take so much. You kick a dog so
much and sooner or later that chain will snap. I have been very
patient with them but I am tired and making plans. ... Judgment
day will come. It will be a shootout at the OK Corral.''
William Espinoza, who received the message, turned it over to
postal inspectors. Espinoza testified he laughed when he read it.
Murillo and his attorney, public defender Juan R. Flores,
contended the case was about freedom of speech.
AP-NY-03-19-99 1842EST
Copyright 1999 The Associated Press.
------------------------------
From: "Bob Izenberg"
Subject: 5--Internet-related bills before the Texas state legislature
Date: Sat, 20 Mar 1999 14:50:26 -0600
SB106 looks interesting... Wonder if that beats the Washington State
penalties. The inevitable kiddie porn bill might also pique your
interest. Receive the stuff in the mail and it's a third degree felony.
Receive it on a computer, it's a second degree felony.
http://www.capitol.state.tx.us/tlo/billsrch/subject/S0130.HTM
Bob
==========================
((CuD MODERATORS' NOTE: For those without a browser, here are
just a few examples of the 46 pieces of pending legislation
currently before the Texas Legislature.
How long will it be, we wonder, before somebody recodes HB 111 as
TEXAS TAXES NET!?))
76th Legislature
Number of Bills: 46
HB 111 AUTHOR: Maxey
SPONSOR:
Relating to exempting access to the internet from the sales tax.
HB 173 AUTHOR: Garcia
SPONSOR:
03/23/99 H Scheduled for public hearing on . . . .
Relating to requiring a person in the business of
selling personal computers to provide certain software
with each personal computer
HB 944 AUTHOR: Craddick / et al. SPONSOR: 03/03/99 H
Internet access service from the sales tax.
HB 1115 AUTHOR: Hartnett SPONSOR:
Relating to taxing the sale, use, or consumption of
Internet access service.
HB 1264 AUTHOR: McClendon
SPONSOR:
03/15/99 H Left pending in committee
Relating to broadcasting public meetings over the Internet.
HB 1657 AUTHOR: Maxey
SPONSOR:
02/23/99 H Referred to State Affairs
Relating to electronic access to certain state agency
information.
HB 1773 AUTHOR: Hamric
SPONSOR:
03/01/99 H Referred to Business & Industry
Relating to unsolicited electronic mail; providing
civil penalties.
HB 2392 AUTHOR: Goolsby
SPONSOR:
03/10/99 H Referred to Elections
Relating to participation by counties in an electronic voting pilot
project for military voters.
HB 2653 AUTHOR: Elkins
SPONSOR:
03/23/99 H Scheduled for public hearing on . . . .
Relating to the law that applies to a contract made over the
Internet.
HB 2834 AUTHOR: Turner, Sylvester
SPONSOR:
03/15/99 H Referred to State Affairs
Relating to the listing of state agency Internet addresses in
telephone directories.
HB 2835 AUTHOR: Turner, Sylvester
SPONSOR:
03/15/99 H Referred to State Affairs
Relating to information that certain state agencies must post on
the Internet.
HB 2837 AUTHOR: Turner, Sylvester
SPONSOR:
03/15/99 H Referred to Ways & Means
Relating to requiring the comptroller of public
accounts to post reports on the Internet.
------------------------------
Date: Tue, 23 Mar 1999 11:57:12 -0600
From: bennett@peacefire.org
Subject: 6--61-page report on Utah school Internet censorship
The Censorware Project has published a 61-page report this morning at:
http://censorware.org/reports/utah/
exposing the claims of "SmartFilter" blocking software to be misleading,
after a several-month legal battle to obtain information about the list of
sites blocked by the program.
The report describes censorship on the Utah Education Network (which
connects Utah public schools and libraries to the Internet) since the UEN
purchased and installed SmartFilter. Michael Sims, who is also the
webmaster of Censorware.org, was the main author of the paper. (I am one
of the four other volunteer members of the Censorware Project.)
Among sites that students have been banned from accessing were the Bible,
the United States Constitution, the Koran, and the Declaration of
Independence. Even the Book of Mormon was banned -- on a school network
providing service exclusively to Utah!
The report is the culmination of a project that began several months ago,
when Michael Sims filed a request with the Utah Education Network (under
Utah's version of the Freedom of Information Act) for log files that would
show what sites students have been blocked from accessing since SmartFilter
was installed. Although the UEN shortly thereafter destroyed the records
that Sims had requested, this action caught the attention of the State
Records Committee (destroying documents requested under a freedom of
information act is illegal), and when Sims made a second request for a new
set of log files, the UEN complied. These log files were analyzed to find
out what sites were blocked by SmartFilter and how they were categorized.
SmartFilter manufacturer Secure Computing Ltd. originally claimed that
"sites are not added to our control list without first being viewed and
approved by our staff". After the report was published this morning, a
company spokeswoman at least partially retracted that claim in a statement:
"Generally, we try to review every site." Examples of banned sites were
found in the report, however, that left little doubt that SmartFilter had
misled customers. One student's home page was blocked as a "Gambling" site
because his last name was Wager. The official home page of the Offspring
home page was blocked as a "Criminal skills" site because of lyrics that
included phrases like "crack the code". The full report includes literally
hundreds of more examples. None of these errors would have been made by a
human reviewing each blocked site individually; the mistakes indicate that
a computer conducted the "review" of these pages and classified them
according to keywords that it found.
The report concluded with the question:
""When the Declaration of Independence is banned from the citizens of Saudi
Arabia, so that they won't get ideas, we call it culturally backward. When
it's banned from our own public libraries by our own government, then what
do we call it?"
The full text of the project, and links to media coverage of the events
leading up to the project's publication, are at:
http://censorware.org/reports/utah/
and the Censorware Project's press release is at:
http://censorware.org/press/press_03-23-99.html
Michael Sims can be reached at these numbers:
daytime: 212-620-3361
evening: 718-556-1002
There was also an early-morning article on the Web page of the Salt Lake
Tribune about the report:
http://www.sltrib.com/03231999/nation_w/92388.htm
------------------------------
Date: Wed, 24 Mar 1999 23:53:58 -0600
From: Robert Hoskins
Subject: 7--Please Register for Spring ISPCON Now!!!
Here's a quick reminder to sign up for the Spring ISPCON '99 press
registration as soon as possible. You only have 21 business days
left to register!! The show is being Baltimore, MD on April 26-29,
1999 at the Baltimore Convention Center. The press registration URL
is http://ispcon.internet.com/spring99/policy.html.
If you haven't signed up because you're not familiar with the
Internet Service Provider Conference (ISPCON). You can learn more
about the show, the vendors, and the technology that will be on
display by pointing your web browser to:
http://ispcon.internet.com/spring99/index.html.
To save you some time, here is a quick description:
ISPCON Spring '99 will gather thousands of Internet Service
Providers, CLECs, RBOCs, ITSPs, Cable Operators, and Web Hosting
companies for an intensely educational event focused on the
business of providing Internet services
ISPCON has gained a unique reputation for providing quality
educational sessions presented by industry leaders. These sessions
cover a wide range of topics and reflect the ever-evolving
technologies of delivering Internet access through cable, wireless,
satellite, xDSL technologies, and IP telephony.
In addition to providing the latest information on technology,
there are sessions covering business topics such as ISP exit
strategies, mergers, acquisitions, initial public offerings, and
how to value an ISP company. Please check back for session updates.
Audio tapes from the ISPCON conferences can be ordered from The
Resource Link at http://www.info@the-resource-link.com.
If you're not interested in attending, please send us a "no" so we
can delete you from our potential Internet press list.
Best Regards,
Robert Hoskins
Press Coordinator ISPCON
Phone: 817-314-0362
Email: robert.hoskins@cwix.com
------------------------------
Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators
Subject: 8--Cu Digest Header Info (unchanged since 10 Jan, 1999)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
The mailing list is automated, so no human lies at the other end.
CuD is readily accessible from the Net:
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #11.19
************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu