1060 lines
47 KiB
Plaintext
1060 lines
47 KiB
Plaintext
|
Der Weltanschauung (The WorldView) Origin: HOUSTON, TEXAS USA
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
% %
|
||
|
% Editor: The Desert Fox * FTP: chsun1.spc.uchicago.edu %
|
||
|
% Co-Editor: Cyndre The Grey * pub/cud/worldview %
|
||
|
% %
|
||
|
% T H E W O R L D V I E W M A G A Z I N E %
|
||
|
% %
|
||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
March 6, 1992 Volume 2, Issue 1 Distributed In O'er 90 Countries
|
||
|
(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)
|
||
|
|
||
|
Material Written By Computer And Telecommunications Hobbyists World Wide
|
||
|
Promoting the publication of Features, Editorials, and Anything Else....
|
||
|
|
||
|
To submit material, or to subscribe to the magazine contact one of the
|
||
|
following net addresses...
|
||
|
|
||
|
"Let us arise, let us arise against the oppressors of humanity; all kings,
|
||
|
emperors, presidents of republics, priests of all religions are the true
|
||
|
enemies of the people; let us destroy along with them all juridical, political,
|
||
|
civil and religious institutions."
|
||
|
|
||
|
-Manifesto of anarchists in the Romagna, 1878
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-
|
||
|
==-@-==-@
|
||
|
|
||
|
The World View Staff: InterNet Address:
|
||
|
|
||
|
The Desert Fox [Editor] dfox@taronga.com
|
||
|
Cyndre The Grey [CoEditor] cyndre@taronga.com
|
||
|
Rev. Scott Free scotfree@taronga.com
|
||
|
Bryan O' Blivion blivion@taronga.com
|
||
|
Modok Tarleton rperkins@taronga.com
|
||
|
The Sorcerer (REV) sorcerer@taronga.com
|
||
|
Brain On A Stick
|
||
|
brain@taronga.com
|
||
|
|
||
|
WORLD VIEW NEWSGROUP: wv@taronga.com
|
||
|
|
||
|
FTP Site: chsun1.spc.uchicago.edu
|
||
|
directory: /pub/cud/worldview
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
TABLE OF CONTENTS
|
||
|
|
||
|
1) Notices/Updates/News/Etc.............................Editors
|
||
|
2) Teen Curfews [Part 2 of 3]...........................Harvard Law Review
|
||
|
3) PSI - Global Dialup Services....
|
||
|
.....................John Eldredge
|
||
|
4) Who Pays For FTP (Reprint From EFF110)...............Dan Kenny
|
||
|
5) Michelangelo Virus...................................NasaMail
|
||
|
6) Special Internet Connections.........................Scott Yanoff
|
||
|
7) Eniac................................................Unknown
|
||
|
8) The Challenger Transcript............................Freelance Journalist
|
||
|
9) Dutch Police Arrest Hackers..........................Hac-Tic Magazine
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
Notices/Updates/News/Etc...
|
||
|
|
||
|
Thanks to all the people who are requesting all back issues of our
|
||
|
publication! Due to the numerous requests, we are no longer fulfilling
|
||
|
back issue requests...except in certain cases. From now on, all issues
|
||
|
will be available via ANON. FTP from: CHSUN1.SPC.UCHICAGO.EDU
|
||
|
The directory that the Worldview is in will be: PUB/CUD/WORLDVIEW
|
||
|
If you do not have access to FTP, let us know. We will try to help.
|
||
|
|
||
|
I'v
|
||
|
e had some complaints about the linefeeds in our mag. I am sorry.
|
||
|
It is not us! The ones who are having the problem are a select few.
|
||
|
I hope the problem ceases soon. We have no control.
|
||
|
|
||
|
Ed...
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
[Part 2 of 3] This is the second part of a three part series on teen
|
||
|
curfews.
|
||
|
|
||
|
By: The Harvard Law Review
|
||
|
|
||
|
B. The Proper Level of Scrutiny for Children's Rights
|
||
|
|
||
|
|
||
|
Under traditional constitutional analysis, a statute that infringes
|
||
|
fundamental rights can survive judicial scrutiny only if the government
|
||
|
can show that the statute is both necessary and narrowly drawn to serve
|
||
|
a compelling state interest (33). Given that children are persons under
|
||
|
the Constitution, logic would seem to demand such strict scrutiny for
|
||
|
infringements not only of adults' rights, but of children's rights as
|
||
|
well. Yet courts, pointing to the unique developmental traits of
|
||
|
childre
|
||
|
n, have afforded minors' rights a level of protection lower than
|
||
|
that secured by traditional strict scrutiny (34). Thus, in one
|
||
|
relatively recent case, the Supreme Court suggested that an infringement
|
||
|
of minors' fundamental rights need only serve a "significant state
|
||
|
interest... not present in the case of an adult" (35). Although the
|
||
|
Court has declined to apply consistently either this standard or any
|
||
|
other, the Court's decisions reflect both a persistent unwillingness to
|
||
|
engage in traditional st
|
||
|
rict scrutiny analysis and a continuing
|
||
|
recognition that children's rights deserve considerably more protection
|
||
|
than that offered by the rational relation test applied in Bykofsky.
|
||
|
|
||
|
The lack of any developed framework for analyzing children's rights
|
||
|
was highlighted in the recent case of H.L. v. Matheson (36), in which
|
||
|
the Court, addressing the constitutionality of a statute requiring that
|
||
|
parents be notified of a minor's decision to undergo an abortion,
|
||
|
divided on the issue of the proper leve
|
||
|
l of scrutiny in challenges to
|
||
|
differential state treatment of children and adults. Chief Justice
|
||
|
Burger, writing for the majority, upheld the statute on the ground that
|
||
|
it served "important state interests" and was "narrowly drawn to protect
|
||
|
only those interests" (37). Justice Stevens concurred in the judgment
|
||
|
on the basis of his characterization of the state interests as
|
||
|
"fundamental and substantial" (38). Although dissenting from the
|
||
|
Court's judgment, Justice Marshall implicitly expressed sup
|
||
|
port for some
|
||
|
variant of a significant-state-interest test and noted that validating a
|
||
|
statute under such a test indicated not that minors' rights are less
|
||
|
fundamental than adults' but only that special state interests justify
|
||
|
infringement of those rights (39).
|
||
|
|
||
|
The Court's confusion over the proper formulation of the standard
|
||
|
of review results from the tension caused by the recognition that, while
|
||
|
children are persons for constitutional purposes, they are
|
||
|
simultaneously the subject of speci
|
||
|
al state concern. Yet in many cases
|
||
|
this tension may be illusory: a careful analysis of the state's alleged
|
||
|
special interests in infringing minors' rights may reveal that such
|
||
|
interests are not at stake in a particular situation or will not be
|
||
|
furthered by a specific restriction. In such cases, there is no
|
||
|
justification for affording less protection to the rights of minor
|
||
|
citizens than to the rights of adults. This conclusion is implicit in
|
||
|
the wording of the "significant state interest not prese
|
||
|
nt in the case
|
||
|
of an adult" standard. Because the state must present an interest that
|
||
|
pertains uniquely to children before treating them differently from
|
||
|
adults, it follows that, absent a significant difference between
|
||
|
children and adults, the state must treat the two groups identically
|
||
|
(40). But a lower standard of review, if applied in all cases involving
|
||
|
infringement of children's fundamental rights, would lead courts
|
||
|
automatically to afford less protection to those rights even in cases in
|
||
|
whi
|
||
|
ch there was no justification for doing so. Thus, children's
|
||
|
fundamental rights should be presumptively equal to those of adults, and
|
||
|
violations of such rights should merit strict scrutiny (41). Only if
|
||
|
courts respect this initial presumption can they properly protect the
|
||
|
fundamental rights of children when there is no basis for treating those
|
||
|
rights differently (42).
|
||
|
|
||
|
Statements that children possess fundamental rights but may be more
|
||
|
restricted than adults in the exercise of those rights r
|
||
|
epresent a
|
||
|
belief that, although children's abstract rights are identical to those
|
||
|
of adults, their concrete rights are not. Because a person's status as
|
||
|
a child is not always relevant to her competence to exercise her rights,
|
||
|
however, children's concrete rights should also be presumed equal to
|
||
|
those of adults. The state should be able to rebut this presumption by
|
||
|
demonstrating the relevance of childhood in a particular case. Under
|
||
|
the proposed approach, however, courts would not merely apply st
|
||
|
rict
|
||
|
scrutiny to infringements of the rights of children while recognizing
|
||
|
special state interests regarding children, for such a procedure,
|
||
|
according to traditional strict scrutiny analysis, would be
|
||
|
self-contradictory.
|
||
|
|
||
|
The principle of strict scrutiny for infringements of fundamental
|
||
|
rights presupposes a universe of citizens equal under the Constitution;
|
||
|
what qualifies as a compelling state interest does not ordinarily vary
|
||
|
depending on which citizens are affected (43). Singling out a gro
|
||
|
up of
|
||
|
adult citizens and affording less protection to their fundamental rights
|
||
|
solely because of their membership in the group would cut at the very
|
||
|
heart of the equal protection principle. Thus, to recognize special
|
||
|
interests surrounding one unique class of citizens -- children -- is to
|
||
|
recognize the need for a unique form of strict scrutiny. Such a form of
|
||
|
review would acknowledge compelling state interests that pertain only to
|
||
|
children. Interests that the courts deem compelling under traditio
|
||
|
nal
|
||
|
strict scrutiny analysis would, of course, also suffice to justify
|
||
|
infringements of children's fundamental rights; such interests would
|
||
|
constitute a subset of the acceptable state interests recognized by this
|
||
|
new analysis. The only additional compelling interests that the
|
||
|
proposed form of strict scrutiny would recognize would be those based on
|
||
|
the unique developmental traits of children -- interests that might be
|
||
|
called "compelling for children" (44). Under such a test, the rights of
|
||
|
childre
|
||
|
n would not be coextensive with those of adults, for the universe
|
||
|
of state interests sufficient to justify the infringement of children's
|
||
|
rights would be broader. When a law affecting children -- for example,
|
||
|
a curfew ordinance -- would not, if applied to adults, survive
|
||
|
traditional strict scrutiny, the only possible justification would be a
|
||
|
"compelling for children" interest.
|
||
|
|
||
|
Courts should therefore require the state to demonstrate that,
|
||
|
because of the unique developmental traits of minors
|
||
|
, unrestricted
|
||
|
exercise of a particular right in the situation in question would create
|
||
|
significant (to merely possible or imaginable) dangers of physical or
|
||
|
emotional harm to the minors or to others. Thus, the state's power to
|
||
|
act in furtherance of its special interests regarding children would not
|
||
|
be plenary; rather, the state would have to show not simply that a
|
||
|
restriction affected only children, but also that concerns unique to
|
||
|
children and relevant to the specific situation in question legit
|
||
|
imated
|
||
|
the restriction. If such a "compelling for children" interest were
|
||
|
present, the statute would be upheld, provided that it was narrowly
|
||
|
drawn to protect that interest. If it did not serve an interest
|
||
|
"compelling for children," a statute that differentially affected the
|
||
|
fundamental rights of children and those of adults would be struck down.
|
||
|
|
||
|
C. What Constitutes a "Compelling for Children" Interest
|
||
|
|
||
|
As noted above, the assumption that children are particularly
|
||
|
vulnerable to c
|
||
|
ertain forms of emotional trauma and are unable to
|
||
|
exercise their rights in an informed, rational, and safe manner forms
|
||
|
the basis for finding a "compelling for children" interest in
|
||
|
legislation restricting children's rights (45). The Supreme Court
|
||
|
seemed to be operating under such an assumption in Bellotti v. Baird
|
||
|
(46), which struck down a statute that placed various restrictions on
|
||
|
the ability of minors to obtain abortions. In Bellotti, a four-Justice
|
||
|
plurality set forth three factors that are
|
||
|
generally found to justify
|
||
|
differential treatment of the constitutional rights of minors. These
|
||
|
factors, each of which reflects a different aspect of the assumption
|
||
|
that children are not fully competent to exercise their rights, are (1)
|
||
|
the peculiar vulnerability of children, (2) the inability of children to
|
||
|
make critical decisions in an informed, mature manner, and (3) the need
|
||
|
to ensure that parents are able to play a central role in their
|
||
|
children's upbringing (47).
|
||
|
|
||
|
Although Justice Po
|
||
|
well's opinion for the Court was joined by only
|
||
|
a plurality of the Justices, those who wrote separately did not dispute
|
||
|
the preliminary section of the opinion, which articulated the factors
|
||
|
relevant to an inquiry into differential treatment of children's rights.
|
||
|
The three factors thus provide a framework within which the unique
|
||
|
traits of children may be analyzed in accordance with Supreme Court
|
||
|
precedent. These three factors form a useful framework for assessing
|
||
|
government interests served by a giv
|
||
|
en restriction on the rights of
|
||
|
minors (48). Under the proposed analysis, a restriction serves an
|
||
|
interest "compelling for children" only if the restriction is narrowly
|
||
|
drawn and only if one of the three factors justifies it. In the
|
||
|
following Part, each factor is examined more fully in connection with
|
||
|
its application to the question of the validity of juvenile curfew
|
||
|
ordinances.
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
PSI - Global D
|
||
|
ialup Services
|
||
|
|
||
|
By: John Eldredge
|
||
|
|
||
|
CONTACT:
|
||
|
John T. Eldredge
|
||
|
Performance Systems International, Inc.
|
||
|
11800 Sunrise Valley Drive
|
||
|
Suite 1100
|
||
|
Reston, VA 22091
|
||
|
Phone: 1 800.82PSI82
|
||
|
+1 703.620.6651
|
||
|
Fax: +1 703.620.4586
|
||
|
Email: info@psi.com
|
||
|
|
||
|
PSI introduces Global Dialup Service (GDS) to provide individuals inexpensive
|
||
|
telnet/rlogin access to Internet host computers around the clock through local
|
||
|
dialups availab
|
||
|
le on a national basis.
|
||
|
|
||
|
Reston, Virginia - September 4, 1991 - John T. Eldredge, Director of Sales and
|
||
|
Marketing, Performance Systems International, Inc. (PSI) today announced a
|
||
|
new, simple means to access tens of thousands of Internet host computers
|
||
|
called Global Dialup Service (GDS). GDS provides a commonly-available way
|
||
|
for individuals to access their accounts on Internet host computers, at
|
||
|
any hour of the day or night, through the popular telnet or rlogin protocols.
|
||
|
This service only require
|
||
|
s a personal computer or terminal, basic
|
||
|
communications software and a modem set at 300, 1200, or 2400 baud. Dialup
|
||
|
points are available locally in major cities throughout the continental
|
||
|
US, as well as internationally, through locally available X.25 PADS.
|
||
|
|
||
|
Eldredge commented, "The demand for simple access to the thousands of
|
||
|
Internet hosts for traveling professionals and remote organizational
|
||
|
offices, independent of local times, continues to grow. GDS inexpensively
|
||
|
meets this basic need for tho
|
||
|
usands of individuals."
|
||
|
|
||
|
The PSI Global Dialup Service is currently served in over 20 cities across the
|
||
|
country, with additional cities being added each month. GDS is available
|
||
|
seven days per week, 24 hours per day, and costs just $39 per month. There is
|
||
|
a one-time registration fee of $39.
|
||
|
|
||
|
PSI, headquartered in Reston, Virginia, is a value-added internetworking
|
||
|
services provider with a wide spectrum of services for the individual and
|
||
|
corporate user of electronic information. Services range fr
|
||
|
om electronic mail
|
||
|
products to turnkey integration of local area networks into the PSINet wide
|
||
|
area network system and the Internet.
|
||
|
|
||
|
Through the Commercial Internet Exchange (CIX), which PSI co-founded, all
|
||
|
commercial US internetworking service providers are interconnected, providing
|
||
|
commercial companies on PSINet with no government restrictions on usage
|
||
|
to other commercial companies participating in CIX-connected network service
|
||
|
providers.
|
||
|
|
||
|
Personal internetworking made simple for individuals
|
||
|
with PSI's newest
|
||
|
turnkey software and service: PSILink(SM)
|
||
|
|
||
|
Reston, Virginia - September 24, 1991 - Performance Systems
|
||
|
International, Inc. (PSI) today unveiled PSILink(SM) to make personal
|
||
|
Internet access and electronic correspondence simple and inexpensive.
|
||
|
PSILink(SM) is a turnkey service package which enables the individual
|
||
|
in business, academia, government, and even home enterprise to
|
||
|
communicate with the world through electronic mail and other services.
|
||
|
Its ease of use makes it attractive
|
||
|
to thousands of professionals,
|
||
|
teachers and students previously reluctant to harness the complexities
|
||
|
of valuable Internet access.
|
||
|
|
||
|
"It has never been easier to communicate electronically," said William
|
||
|
L. Schrader, PSI's President and Chief Executive Officer. "The
|
||
|
Internet community is estimated at over 30 million users. PSILink(SM)
|
||
|
uses software developed by PSI for the common PC that is easy to
|
||
|
install, easy to set up and easy to use."
|
||
|
|
||
|
Local dialup points are available in major cities thr
|
||
|
oughout the
|
||
|
continental United States for the PSILink(SM) service.
|
||
|
|
||
|
PSILink(SM) will be demonstrated at Interop '91, in San Jose, October
|
||
|
9-11. PSI, along with additional companies, will be announcing
|
||
|
service and software enhancements of the technology at a press
|
||
|
conference during Interop at 8:00 A.M. PST on Tuesday, October 8.
|
||
|
|
||
|
Additional on-line information about PSILink(SM) is available by
|
||
|
sending e-mail to psilink-info@psi.com; an automatic computer
|
||
|
generated information response will be re
|
||
|
turned to your mailbox.
|
||
|
|
||
|
PSI, headquartered in Reston, Virginia, is a value-added
|
||
|
internetworking services provider with a wide spectrum of services for
|
||
|
the individual and corporate user of electronic information. Services
|
||
|
range from electronic mail products to turnkey integration of local
|
||
|
area networks into the PSINet(R) wide area network system and the
|
||
|
Internet.
|
||
|
|
||
|
PSILink - Personal Networking for Internet Access
|
||
|
|
||
|
Internet access is an important facet of all higher education institutions,
|
||
|
an
|
||
|
d most corporations throughout the US, Western Europe and the Pacific
|
||
|
Basin. It is also important for small organizations and individuals, yet
|
||
|
both the cost and usability have been barriers. The PSILink service is
|
||
|
designed to remove these barriers.
|
||
|
|
||
|
PSI provides local dialups throughout the US to provide PSILink service
|
||
|
and provide access to the 25+ million people available through the
|
||
|
Internet and electronic mail networks.
|
||
|
|
||
|
The PSILink service today provides unlimited electronic messaging at
|
||
|
|
||
|
a flat monthly cost:
|
||
|
|
||
|
$35 one time
|
||
|
$19/month
|
||
|
|
||
|
billed on a monthly basis to your MasterCard/Visa, or quarterly by check.
|
||
|
|
||
|
Soon to be released under PSILink will be USENET/NEWS and anonymous FTP
|
||
|
access.
|
||
|
|
||
|
PSI provides the necessary software for MSDOS based PC's to use this service
|
||
|
at no additional cost. Even the smallest PC with a Hayes compatible modem
|
||
|
can use PSILink. This software is available via anonymous ftp on
|
||
|
ftp.psi.com in the "psilink" directory and is available when you register
|
||
|
on
|
||
|
a 3.5" 1.44Mbyte floppy.
|
||
|
|
||
|
Additional information can be had from our on-line brochure and user's
|
||
|
guide which is available by sending email to
|
||
|
|
||
|
psilink-guide@psi.com
|
||
|
|
||
|
A PostScript document will be automatically mailed to you. This document
|
||
|
should be printable on any PostScript printer; however, it must be printed
|
||
|
on legal size paper.
|
||
|
|
||
|
If you want to register for this service send email to
|
||
|
|
||
|
psilink-registration@psi.com
|
||
|
|
||
|
A PostScript registration information will be automatically mailed to y
|
||
|
ou.
|
||
|
|
||
|
If you can't print these PostScript documents sene complete contact information
|
||
|
including postal address, name, and phone number to:
|
||
|
|
||
|
psilink-order@psi.com
|
||
|
|
||
|
You will receive materials via the Postal system.
|
||
|
|
||
|
Copyright 1991 Performance Systems International Inc. All rights reserved.
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
Who Pays for FTP?
|
||
|
|
||
|
From: netspec@zeus.unomaha.edu
|
||
|
(Dan Kenny, Network Specialist/ U of N-Omaha)
|
||
|
|
||
|
|
||
|
In a previous article, tld@cosmos.bae.bellcore.com
|
||
|
(Terry Davidson) writes:
|
||
|
|
||
|
"One question: I've asked this before, and have received no response.
|
||
|
Who pays for ftp? Some uploads/downloads can take a *VERY* large amount of
|
||
|
time; and this has to cost someone some hard cash - but who? Is the login
|
||
|
used to send bills to the company from where the call originated (some ftp
|
||
|
may be anonymous, but modern UNIX systems darned well get the info anyway,
|
||
|
including the actual line/port/phone of the originati
|
||
|
ng machine).
|
||
|
I'd like answers to these questions, simply because (1) I have
|
||
|
approximately 5 MB of shareware (DOS) utilities to upload to an ftp
|
||
|
site for propagation, and (2) there are some GIF files out on the ftp
|
||
|
sites I would like to ftp in. Whether or not I actually do this depends
|
||
|
on how ftp is billed.
|
||
|
|
||
|
Terry,
|
||
|
|
||
|
FTP (the file transfer protocol), NNTP (the protocol for the news
|
||
|
service you are reading), TELNET (the remote login protocol), SMTP
|
||
|
(the mail protocol you receive Internet mail
|
||
|
through), and other
|
||
|
protocol services in the TCP/IP specification are made available to
|
||
|
you courtesy of the educational system in America.
|
||
|
|
||
|
Individual colleges, military sites, organizations and commercial
|
||
|
sites wire up their machines as a campus network. These networks join
|
||
|
a consortium of regional networks (like MIDnet for the Midwest
|
||
|
colleges, MILnet for the military, etc) for a fee and if they are an
|
||
|
educational institution, also receive subsidization on the cost of
|
||
|
connecting their campus ne
|
||
|
tworks to the regional network through the
|
||
|
National Science Foundation. Additionally, the NSF foots the bill for
|
||
|
the long-haul national network connecting the regional networks in one
|
||
|
giant internetwork. This long-haul network is built upon the work of
|
||
|
the military's Defense Advanced Research Projects Agency (ARPAnet) in
|
||
|
the 1970's and 1980's.
|
||
|
|
||
|
These resources are provided to the average Internet user virtually
|
||
|
for free, and are done so in the spirit of research and cooperation.
|
||
|
Not everyone in t
|
||
|
he world ascribes to the philosophy of the
|
||
|
"bottom-line" business mentality, and they recognize the value of open
|
||
|
access to educational resources in the quest for enhancing
|
||
|
communication between educators, researchers, students, businesses,
|
||
|
organizations, and the community.
|
||
|
|
||
|
So to answer your question, we all pay - just like we all pay for open
|
||
|
and public access to the nation's highways, the open and public access
|
||
|
to community libraries, the open and public access to secondary
|
||
|
schools, and the op
|
||
|
en and public access to the state universities.
|
||
|
|
||
|
Individual sites on the Internet make services and resources available
|
||
|
(like disk space for anonymous FTP or the ARCHIE database service) out
|
||
|
of the spirit of this cooperation and belief that the greater benefit
|
||
|
of increased communication outweighs the per-unit-cost of a megabyte
|
||
|
of disk storage or a packet of network bandwidth. Usenet news feeds
|
||
|
are traditionally provided as a courtesy between educational
|
||
|
institutions in this spirit also.
|
||
|
|
||
|
If you
|
||
|
believe your 5 megs of utilities have educational value, by all
|
||
|
means upload them to an appropriate FTP site. If you believe that
|
||
|
files you find on an anonymous FTP will enhance your education,
|
||
|
download them. Realize that the mere act of communicating with someone
|
||
|
on the Internet and exploring available services has educational value.
|
||
|
|
||
|
Speaking as a student majoring in one of those science/technical and
|
||
|
engineering fields (Computer Science) that people keep worrying about
|
||
|
due to growing lack of i
|
||
|
nterest from our youth, I can assure you that
|
||
|
the educational benefit I have received through the cooperation of the
|
||
|
Internet community has been tremendous. Innovation is not dead in
|
||
|
America, at least not yet. We just need to properly recognize the
|
||
|
value of long-term investment and commitment to cooperation (whether
|
||
|
that be in basic research & development, educating ourselves, or in
|
||
|
laying fiber to every household like Japan is doing), regardless of
|
||
|
short-term cost (or lack of profit). Remember the
|
||
|
technological
|
||
|
fallout from the Apollo Moon program? We -all- foot the bill for it,
|
||
|
and we -all- (consumers, industry, education, military, and our
|
||
|
general competitiveness in the world) benefited from the cooperation
|
||
|
and technology-sharing of that national project.
|
||
|
|
||
|
Think of the Internet in the same fashion. I do.
|
||
|
|
||
|
Just my opinions,
|
||
|
Dan Kenny, Network Specialist : University of Nebraska-Omaha
|
||
|
netspec@zeus.unomaha.edu
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
|
||
|
The following messages were received from NASA Mail
|
||
|
|
||
|
From: ADMIN/NASA
|
||
|
To: NASA
|
||
|
Subj: Virus Early Warning
|
||
|
|
||
|
This is a Product Assurance and Security Office (PASO) Virus Early
|
||
|
Warning. The PC (not MAC) virus "Michelangelo" has started spreading in
|
||
|
the U.S. very fast. This virus has a "trigger" date of March 6 where it
|
||
|
will attempt to overwrite vital areas on the PC hard disk. Please make
|
||
|
sure that you have a current copy of Virusafe 4.5 installed in your
|
||
|
computer. Virusafe is able to
|
||
|
detect and remove the mentioned virus.
|
||
|
Some other antiviral programs may detect "Michelangelo" but not be able
|
||
|
to remove it. If you don't have Virusafe installed, contact your Code
|
||
|
AIS representative or call the PASO Virus Prevention Team at XXX-XXXX.
|
||
|
Attached is the Virus-L (Internet) message received from A. Padgett
|
||
|
Peterson.
|
||
|
|
||
|
Subject: WARNING - Michelangelo Virus (PC)
|
||
|
THIS VIRUS IS SCHEDULED TO EXECUTE ON MARCH 6, 1992
|
||
|
|
||
|
>From all reports this destructive virus is spreading world-wide very
|
||
|
rap
|
||
|
idly. Unlike the DataCrime "fizzle" in 1989 which contained similar
|
||
|
destructive capability but never spread, the Michelangelo appears to
|
||
|
have become "common" in just ten months following detection. I have
|
||
|
encountered three cases locally in just the last few weeks.
|
||
|
|
||
|
Three factors make this virus particularly dangerous:
|
||
|
|
||
|
1) The virus uses similar techniques as the "STONED" virus which
|
||
|
while first identifies in early 1988 remains the most common virus
|
||
|
currently reported. Since the virus infect
|
||
|
s only the Master Boot
|
||
|
Record on hard disks and the boot record of floppy disks, viral
|
||
|
detection techniques that rely on alteration of DOS executable files
|
||
|
will not detect the virus. Similarly, techniques that monitor the
|
||
|
status of the MBR may only provide users with a single warning that,
|
||
|
if execution is permitted to continue, may not be repeated.
|
||
|
|
||
|
2) Michelangelo was first discovered in Europe in mid-1991 consequently
|
||
|
many virus scanners in use today will not pick up the virus
|
||
|
unless
|
||
|
more recent updates have been obtained.
|
||
|
|
||
|
3) Unlike the Stoned and Jerusalem (the most common viruses in the
|
||
|
past) which are more annoying than dangerous, the Michelangelo virus
|
||
|
will, on its trigger date of March 6th, attempt to overwrite vital
|
||
|
areas of the hard disk rendering it unreadable by DOS. Further,
|
||
|
since the FATs (file allocation tables) may be damaged, unless
|
||
|
backups are available recovery will be very difficult and require
|
||
|
someone who is able to rebuild
|
||
|
a corrupt FAT (also a very
|
||
|
time-consuming process).
|
||
|
|
||
|
Fortunately, the Michelangelo virus is also very easy to detect: when
|
||
|
resident in a PC, the CHKDSK (included with MS-DOS (Microsoft), PC-DOS
|
||
|
(IBM), and DR-DOS (Digital Research) {all names are registered by their
|
||
|
owners}) program will return a "total bytes memory" value 2048 bytes
|
||
|
lower than normal. This means that a 640k PC which normally returns
|
||
|
655,360 "total bytes memory" will report 653,312. While a low value
|
||
|
will not necessarily m
|
||
|
ean that Michelangelo or any other virus is
|
||
|
present, the PC should be examined by someone familiar with viral
|
||
|
activity to determine the reason.
|
||
|
|
||
|
If the Michelangelo virus is found, the PC should be turned off until
|
||
|
disinfected properly. All floppy disks and other machines in the area
|
||
|
should then also be examined since the Michelangelo virus is spread i2n
|
||
|
the boot record (executable area found on all floppy disks including
|
||
|
data-only disks).
|
||
|
|
||
|
Padge
|
||
|
tt Peterson
|
||
|
Internet: padgett%tccslr.dnet@mmc.com
|
||
|
|
||
|
Note: the opinions expressed are my own and not necessarily those of my
|
||
|
employer. Comments refer only to the specific example of the virus that
|
||
|
I have examined. Other strains may exist.
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
Special Internet Connections
|
||
|
|
||
|
By: Scott Yanoff
|
||
|
|
||
|
* SPECIAL INTERNET CONNECTIONS: Last Update: 10/13/91 *
|
||
|
|
||
|
* Compiled By: Scott Yanoff - yanoff@csd4.csd.uwm.edu *
|
||
|
* A + by an entry designates new entries to the list (since last update). *
|
||
|
|
||
|
+Archie telnet quiche.cs.mcgill.ca or 132.206.2.3 (Can./USA)
|
||
|
telnet nic.funet.fi or 128.214.6.100 (Finland)
|
||
|
telnet rana.cc.deakin.oz.au or 128.184.1.4 (Aussie/NZ)
|
||
|
offers: Internet anonymous FTP database. (Login: archie)
|
||
|
|
||
|
-CARL telnet pac.carl.org or 192.54.81.128
|
||
|
offers: Online database, book reviews, magazine fax delivery service.
|
||
|
|
||
|
|
||
|
-Cleveland Freenet telnet freenet-in-a.cwru.edu or 129.22.8.82
|
||
|
offers: USA Today Headline News, Sports, etc...
|
||
|
|
||
|
+C64 Archive Server mail twtick@corral.uwyo.edu
|
||
|
Subject: Mail-Archive-Request Body-of-letter: help (hit return) end
|
||
|
|
||
|
-Dante Project telnet eleazar.dartmouth.edu or 129.170.16.2
|
||
|
offers: Divine Comedy and reviews. (Login: ddpfrnet password: freenet)
|
||
|
|
||
|
-Distance Educat. Data telnet sun.nsf.ac.uk or telnet 128.86.8.7
|
||
|
(Login: janet Hostname: uk.ac.ope
|
||
|
n.acs.vax Username: icdl)
|
||
|
|
||
|
+FTP Mail ftpmail@decwrl.dec.com
|
||
|
Subject: (hit return) Body-of-letter: help (return) quit Offers: ftp via email
|
||
|
|
||
|
-Geographic Name Server telnet martini.eecs.umich.edu 3000 or 141.212.100.9
|
||
|
offers: Info by city or area code (Population, Lat./Long., Elevation, etc).
|
||
|
|
||
|
-Gopher telnet consultant.micro.umn.edu or 128.101.95.23
|
||
|
Access to: UPI News, weather forecasts, interet games, library (Login:gohper)
|
||
|
|
||
|
-Ham Radio Callbook telnet marvin.cs.buffalo.edu 2000
|
||
|
or 128.205.32.4
|
||
|
offers: National ham radio call-sign callbook.
|
||
|
|
||
|
-Internet Resrce Guide ftp nnsc.nsf.net
|
||
|
offers: compressed/tar'd list of net resources in /resource-guide.txt.tar.Z
|
||
|
|
||
|
-IRC Telnet Client telnet bradenville.andrew.cmu.edu or 128.2.54.2
|
||
|
offers: Internet Relay Chat access.
|
||
|
|
||
|
-Library of Congress telnet dra.com or 192.65.218.43
|
||
|
offers: COPY of Library of Congress (Assumes terminal is emulating a vt100).
|
||
|
|
||
|
-List of Lists ftp ftp.nisc.sri.com or ftp 192.33.33.22
|
||
|
|
||
|
offers: List of interest groups/email lists in /netinfo/interest-groups.
|
||
|
|
||
|
-Lyric Server ftp vacs.uwp.edu
|
||
|
offers: Lyrics in text file format for anonymous ftp downloading.
|
||
|
|
||
|
-Mail Server/Usr Lookup mail mail-server@pit-manager.mit.edu
|
||
|
usage: in body of mail message: send usenet-addresses/[name searching for]
|
||
|
|
||
|
-NASA SpaceLink telnet spacelink.msfc.nasa.gov or 128.158.13.250
|
||
|
offers: Latest NASA news, including shuttle launches and satellite updates.
|
||
|
|
||
|
-NED telnet ip
|
||
|
ac.caltech.edu or telnet 131.215.139.35
|
||
|
offers: NASA Extragalactic Database. (Login: ned)
|
||
|
|
||
|
-Oceanic Info. Center telnet delocn.udel.edu or telnet 128.175.24.1
|
||
|
(Login: info)
|
||
|
|
||
|
-Oracle mail oracle@iuvax.cs.indiana.edu
|
||
|
offers: The Usenet Oracle! Mail with subject as "help" for more info.
|
||
|
|
||
|
-PENpages telnet psupen.psu.edu or telnet 128.118.36.5
|
||
|
offers: Agricultural info (livestock reports, etc.) (Login: PNOTPA)
|
||
|
|
||
|
-SDDAS telnet espsun.space.swri.edu 540
|
||
|
offers: SW Research Dat
|
||
|
a Display & Analysis Center. Or telnet 129.162.150.99
|
||
|
|
||
|
-STIS telnet stis.nsf.gov or 128.150.195.40
|
||
|
offers: Science & Technology Information System. (Login: public)
|
||
|
|
||
|
-Usenet News MailServer mail [newsgroup]@ucbvax.berkeley.edu
|
||
|
Allows you to post to a Usenet newsgroup via email. Useful if you have read-
|
||
|
only access to Usenet news. Note: .'s become -'s Ex. alt.test -> alt-test
|
||
|
|
||
|
-UNC BBS telnet samba.acs.unc.edu or 128.109.157.30
|
||
|
offers: Access to Library of Congress and nationwide
|
||
|
libraries (Login: bbs)
|
||
|
|
||
|
-WAIStation telnet hub.nnsc.nsf.net
|
||
|
SWAIS telnet quake.think.com (different than hub... above)
|
||
|
offers: Wide Area Info. Service. (Login: wais) FTP think.com for more info.
|
||
|
|
||
|
-Weather Service telnet madlab.sprl.umich.edu 3000 or 141.212.196.79
|
||
|
offers: Forecast for any city, current weather for any state, etc.
|
||
|
|
||
|
-Webster (Temp. down?) telnet decoy.cc.uoregon.edu 2627
|
||
|
offers: Dictionary, Thesaurus, Spelling checker. Type 'HELP' when online!
|
||
|
(May no
|
||
|
t support non-UNIX machines?)
|
||
|
|
||
|
* NOTE: NO LOGIN NAMES OR PASSWORDS ARE REQUIRED UNLESS STATED OTHERWISE! *
|
||
|
If it prompts you for a login name, you did something wrong, or are not
|
||
|
running on a machine that the system you telnetted to supports!
|
||
|
* PLEASE email me if you have any additional info/corrections/comments! *
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
ENIAC
|
||
|
By: Unknown
|
||
|
|
||
|
In the beginning there was ENI
|
||
|
AC.
|
||
|
And the ENIAC was without language or form.
|
||
|
And so was created Machine Code. And it was Good.
|
||
|
On the second day, Hex was created. And it was good.
|
||
|
On the third day, Assembly Language was created. And it was good.
|
||
|
On the fourth day, Fortran was created and it was good.
|
||
|
On the fifth day, man programmed in Fortran. And it was very good.
|
||
|
|
||
|
And it was spoken: "Though may program in any of these, but the tree of
|
||
|
COBOL thou shall not partake for thou shalt surely pay for thine
|
||
|
transgresssions."
|
||
|
|
||
|
|
||
|
But, there was a hacker in the woods who took the form of a mini and
|
||
|
spake to the man and said "Thou shalt not pay for thine transgressions,
|
||
|
for he knoweth that if thou partakest, thou shall have power to program
|
||
|
large and wonderful things that shall be readable by others!"
|
||
|
|
||
|
So, the man partook of COBOL.
|
||
|
|
||
|
And it was spoken: "Thou hast partaken of the tree of COBOL:
|
||
|
Thou art doomed to write hundred thousand line programs,
|
||
|
be enslaved by IBM, and not have other good programming options for years
|
||
|
."
|
||
|
|
||
|
And it was so. Many years passed. IBM dominated. Programs grew larger and
|
||
|
larger.
|
||
|
BASIC, Pascal, SNOBOL, PLI, Ada and many others came and went.
|
||
|
IBM dominated. And COBOL programs grew.
|
||
|
|
||
|
Then, as implied, a program came out of the telephone.
|
||
|
It spread to the universities who took it on and made it grow.
|
||
|
IBM tried to kill it many times, but after the PC was introduced,
|
||
|
it was inevitable. First, A. Written in Assembly, not COBOL.
|
||
|
Then B which was better that A.
|
||
|
Then finally C took full
|
||
|
form and shape.
|
||
|
With UNIX, it launched into the market seemingly impervious to
|
||
|
COBOL's domination.
|
||
|
IBM tried again to kill it. Through security holes, and portability, and
|
||
|
unreadability IBM tried.
|
||
|
But C could not be quashed.
|
||
|
The implied savior of programming everywhere had come!
|
||
|
And the great COBOL could finally start to be removed.
|
||
|
Open systems and high capacity graphic's aided and spurred C on until there
|
||
|
was C for DOS, C++, and finally, C for the IBM series 3090.
|
||
|
|
||
|
And it was very good.
|
||
|
|
||
|
(
|
||
|
to be continued ... maybe)
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
For Those Who Haven't Heard: The Challenger Transcript
|
||
|
|
||
|
DISCLAIMER: This info was submitted by an unknown freelance journalist.
|
||
|
The World View Magazine And It's Editors Claim No Responsibility For The
|
||
|
Creation Of This Document. We Have No Ties To NASA, Or Any Other
|
||
|
Government Organization. The Transcript Follows The Audio Tape Which
|
||
|
Was Released To The Public By NASA. As Journali
|
||
|
sts, We Chose To Publish
|
||
|
The Document, Because We Feel The American People Have A Right To Hear
|
||
|
All Opinions Regarding This Issue. The World View Does Not Condone Nor
|
||
|
Do We Necessarily Agree With The "Cover-Up" Theory Related To This
|
||
|
Incident. As Far As We Know, This Information Is Public Domain.
|
||
|
|
||
|
--==(*)==--
|
||
|
|
||
|
A secret NASA tape reveals that the crew of the shuttle Challenger not only
|
||
|
survived the explosion that ripped the vessel apart; they screamed, cried,
|
||
|
curse
|
||
|
d and prayed for three hellish minutes before they slammed into the
|
||
|
Atlantic and perished on January 28, 1986.
|
||
|
|
||
|
The tape is said to begin with a startled crewman screaming,"What happened?
|
||
|
What happened? Oh God - No!" Screams and curses are heard- several crewmen
|
||
|
begin to weep- and then others bid their families farewell.
|
||
|
|
||
|
Two minutes forty-five seconds later the tape ends. That's when the shuttles
|
||
|
crew compartment, which remained intact after the vessel exploded over the
|
||
|
Atlantic, hit the oc
|
||
|
ean at over 2,000 miles per hour, instantly killing the
|
||
|
crew.
|
||
|
|
||
|
" Cover up? Of course there was a coverup, " declared Robert Hotz, a member
|
||
|
of the Presidential commission that investigated the disaster. " NASA can't
|
||
|
face the fact that they put these astronauts in a situation where they didn't
|
||
|
have adequate equipment to survive. NASA doesn't give a damn about anything
|
||
|
but covering it's ass, " he said.
|
||
|
|
||
|
The official account released by NASA ends with shuttle pilot Michael Smith
|
||
|
saying, " Uh-oh!
|
||
|
" Some NASA employees have evidently heard more-much more.
|
||
|
And they provided the rest of the account based on what they've discussed
|
||
|
within NASA in the last five years. The astronauts had time and realized
|
||
|
something was happening after the shuttle broke up.
|
||
|
|
||
|
" All shuttle astronauts carry personal recorders and the tape in question
|
||
|
apparently came from Christa's (McAuliffe), which was recovered after the
|
||
|
shuttle disaster, " said Hotz. Jarvis was sitting beside her, and when he
|
||
|
figured out what wa
|
||
|
s happening he said, " Give me your hand. "
|
||
|
|
||
|
" NASA insists there's nothing like that on tape but they're talking about
|
||
|
the mission tape, not Christa's. So they're not lying, but they're not telling
|
||
|
the truth, either. "
|
||
|
|
||
|
A journalist with close ties to NASA was even more emphatic, " There are
|
||
|
persistent rumors, dating back to the disaster, that this tape is absolutely
|
||
|
bone-chilling. "
|
||
|
|
||
|
The following transcript begins two seconds after NASA's official version
|
||
|
ends, with pilot Michael Smit
|
||
|
h saying, " Uh-oh! " Times from the moment of
|
||
|
takeoff are shown in minutes and seconds and are approximate. The sex of the
|
||
|
speaker is indicated by M or F.
|
||
|
|
||
|
T+1:15 (M) What happened? What happened? Oh God, no - no!
|
||
|
T+1:17 (F) Oh dear God.
|
||
|
T+1:18 (M) Turn on your air pack! Turn on your air...
|
||
|
T+1:20 (M) Can't breathe... choking...
|
||
|
T+1:21 (M) Lift up your visor!
|
||
|
T+1:22 (M/F) (Screams.) It's hot. (Sobs.) I can't. Don't tell me... God!
|
||
|
Do it...now...
|
||
|
T+1:24
|
||
|
(M) I told them... I told them... Dammit! Resnik don't...
|
||
|
T+1:27 (M) Take it easy! Move (unintelligible)...
|
||
|
T+1:28 (F) Don't let me die like this. Not now. Not here...
|
||
|
T+1:31 (M) Your arm... no... I (extended garble, static)
|
||
|
T+1:36 (F) I'm... passing... out...
|
||
|
T+1:37 (M) We're not dead yet.
|
||
|
T+1:40 (M) If you ever wanted (unintelligible) me a miracle...
|
||
|
(unintelligible)... (screams)
|
||
|
T+1:41 (M) She's... she's... (garble) ... damn!
|
||
|
T+1:50 (M) Can
|
||
|
't breathe...
|
||
|
T+1:51 (M/F) (screams) Jesus Christ! No!
|
||
|
T+1:54 (M) She's out.
|
||
|
T+1:55 (M) Lucky... (unintelligible).
|
||
|
T+1:56 (M) God. The water... we're dead! (screams)
|
||
|
T+2:00 (F) Goodbye (sobs)... I love you, I love you...
|
||
|
T+2:03 (M) Loosen up... loosen up...
|
||
|
T+2:07 (M) It'll just be like a ditch landing...
|
||
|
T+2:09 (M) That's right, think positive.
|
||
|
T+2:11 (M) Ditch procedure...
|
||
|
T+2:14 (M) No way!
|
||
|
T+2:17 (M) Give me your hand...
|
||
|
T+2:19 (M
|
||
|
) You awake in there? I... I...
|
||
|
T+2:29 (M) Our Father... (unintelligible)...
|
||
|
T+2:42 (M) ...hallowed be Thy name... (unintelligible).
|
||
|
T+2:57 (M) You...over there?
|
||
|
T+2:58 (M) The Lord is my shepherd, I shall...not want. He maketh me to
|
||
|
lie down in green pastures... though I walk through the
|
||
|
valley of the shadow of death, I will fear no evil... I will
|
||
|
dwell in the house...
|
||
|
|
||
|
T+3:15 to end. None. Static, silence.
|
||
|
Serpentin
|
||
|
e Light Chicago Helvetica r det slut
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
||
|
|
||
|
DUTCH POLICE ARRESTS HACKERS
|
||
|
The facts:
|
||
|
|
||
|
At 10.30 Monday morning, 27 January 1992, Dutch police searched the
|
||
|
homes of two hackers. In the city of Roermond, the parental home of
|
||
|
the 21-year old student H.W. was searched and in Nuenen the same
|
||
|
happened to the parental home of R.N., a Computer Science engineer,
|
||
|
age 25. Both were arrested and taken into custody
|
||
|
. At both sites,
|
||
|
members of the Amsterdam Police Pilot Team for computer crime were
|
||
|
present, alongside local police officers and representatives of the
|
||
|
national organization CRI (Criminal Investigations Agency). Both
|
||
|
suspects were transported to Amsterdam. The brother of one of the
|
||
|
suspects was told the suspects could receive no visits or mail. All
|
||
|
of this has happened more than one week ago and the two are still in jail
|
||
|
as we write this.
|
||
|
|
||
|
The charges:
|
||
|
|
||
|
A break-in supposedly occurred at the bro
|
||
|
nto.geo.vu.nl site at the VU
|
||
|
University in Amsterdam. This UNIX system running on a SUN station (IP
|
||
|
130.37.64.3) has been taken off the net at least for the duration of
|
||
|
the investigation. What happened to the actual hardware is unknown at
|
||
|
this time.
|
||
|
|
||
|
The formal charges are: forgery, racketeering and vandalism. The
|
||
|
police justify the forgery part by claiming that files on the system
|
||
|
have been changed. The vandalism charge is valid because the system
|
||
|
had to be taken off the net for a period of time
|
||
|
to investigate the
|
||
|
extent of the damage. By pretending to be regular users or even
|
||
|
system management the hackers committed racketeering, the police says.
|
||
|
|
||
|
Both suspects, according to the Dutch police, have made a full
|
||
|
statement. According to a police spokesman the motive was "fanatical
|
||
|
hobbyism". Spokesperson Slort for the CRI speaks of the "kick of
|
||
|
seeing how far you can get".
|
||
|
|
||
|
Damages:
|
||
|
|
||
|
According to J. Renkema, head of the geo-physics faculty at the VU,
|
||
|
the university is considering fili
|
||
|
ng a civil lawsuit against the
|
||
|
suspects. "The system was contaminated because of their doing and had
|
||
|
to be cleaned out. This cost months of labour and 50.000 guilders
|
||
|
(about US$ 30,000). Registered users pay for access to the system and
|
||
|
these hackers did not. Result: tens of thousands of guilders in
|
||
|
damages." Renkema also speaks of a 'moral disadvantage': The
|
||
|
university lost trust from other sites on the network. Renkema claims
|
||
|
the university runs the risk of being expelled from some networks.
|
||
|
|
||
|
|
||
|
Renkema also claims the hackers were discovered almost immediately
|
||
|
after the break-in and were monitored at all times. This means all the
|
||
|
damages had occurred under the watchful eyes of the supervisors. All
|
||
|
this time, no action was taken to kick the hackers off the system.
|
||
|
According to Renkema all systems at the VU were protected according to
|
||
|
guidelines as laid down by CERT and SurfNet BV (SurfNet is the company
|
||
|
that runs most of the inter-university data-traffic in The
|
||
|
Netherlands).
|
||
|
|
||
|
What real
|
||
|
ly happened?
|
||
|
|
||
|
The charge of 'adapting system-software' could mean that the hackers
|
||
|
installed back-doors to secure access to the system or to the root
|
||
|
level, even if passwords were changed. New versions of telnet, ftp,
|
||
|
rlogin and other programs could have been compiled to log access to
|
||
|
the networks.
|
||
|
|
||
|
What really happened is anybody's guess. One point is that even the
|
||
|
CRI acknowledges that there were no 'bad' intentions on the part of
|
||
|
the hackers. They were there to look around and play with the
|
||
|
|
||
|
networks.
|
||
|
|
||
|
About hacking in general:
|
||
|
|
||
|
In the past we have warned that new laws against computer crime can
|
||
|
only be used against hackers which are harmless. Against the real
|
||
|
computer criminals a law is useless because they will probably remain
|
||
|
untraceable. The CRI regularly goes on the record to say that hackers
|
||
|
are not the top priority in computer crime investigation. It seems
|
||
|
that hackers are an easy target when 'something has to be done'.
|
||
|
|
||
|
And 'something had to be done': The pressure from esp
|
||
|
ecially the U.S.
|
||
|
to do something about the 'hacking problem' was so huge that it would
|
||
|
have been almost humiliating for the Dutch not to respond. It seems as
|
||
|
if the arrests are mainly meant to ease the American fear of the
|
||
|
overseas hacker-paradise.
|
||
|
|
||
|
A closer look at the charges and damages:
|
||
|
|
||
|
The VU has launched the idea that system security on their system was
|
||
|
only needed because of these two hackers. All costs made in relation
|
||
|
to system security are billed to the two people that just happened t
|
||
|
o
|
||
|
get in. For people that like to see hacking in terms of analogies: It
|
||
|
is like walking into a building full of students, fooling around and
|
||
|
then getting the bill for the new alarm-system that they had to
|
||
|
install just for you.
|
||
|
|
||
|
Systems security is a normal part of the daily task of every system-
|
||
|
adminstrator. Not just because the system has to be protected from
|
||
|
break-ins from the outside, but also because the users themselves need
|
||
|
to be protected from each other. The 'bronto' management has negle
|
||
|
cted
|
||
|
some of their duties, and now they still have to secure their system.
|
||
|
This is not damages done, it's work long overdue.
|
||
|
|
||
|
If restoring back-ups costs tens of thousands of guilders, something
|
||
|
is terribly wrong at the VU. Every system manager that uses a legal
|
||
|
copy of the operating system has a distribution version within easy
|
||
|
reach.
|
||
|
|
||
|
'Month of tedious labour following the hackers around in the system'.
|
||
|
It would have been much easier and cheaper to deny the hackers access
|
||
|
to the system direct
|
||
|
ly after they had been discovered. 'Moral damages'
|
||
|
by break-ins in other systems would have been small. The VU chose to
|
||
|
call the police and trace the hackers. The costs of such an operation
|
||
|
cannot be billed to the hackers.
|
||
|
|
||
|
Using forgery and racketeering makes one wonder if the OvJ (the
|
||
|
District Attorney here) can come up with a better motive than 'they
|
||
|
did it for kicks'. If there is no monetary or material gain involved,
|
||
|
it is questionable at best if these allegations will stand up in
|
||
|
court.
|
||
|
|
||
|
|
||
|
As far as the vandalism goes: there have been numerous cases of system
|
||
|
management overreacting in a case like this. A well trained
|
||
|
system-manager can protect a system without making it inaccessible to
|
||
|
normal users. Again: the hackers have to pay for the apparent
|
||
|
incompetence of system management.
|
||
|
|
||
|
This does not mean that having hackers on your system can not be a
|
||
|
pain. The Internet is a public network and if you cannot protect a
|
||
|
system, you should not be on it. This is not just our statement, it
|
||
|
is
|
||
|
the written policy of many networking organizations. One more
|
||
|
|
||
|
metaphor: It's like installing a new phone-switch that allows direct
|
||
|
dial to all employees. If you get such a system, you will need to tell
|
||
|
your employees not to be overly loose-lipped to strangers. It is not
|
||
|
the callers fault if some people can be 'hacked'. If you tie a cord to
|
||
|
the lock and hang it out the mail-slot, people will pull it. If these
|
||
|
people do damages, you should prosecute them, but not for the costs of
|
||
|
walking after
|
||
|
them and doing your security right.
|
||
|
|
||
|
Consequences of a conviction:
|
||
|
|
||
|
If these suspects are convicted, the VU makes a good chance of winning
|
||
|
the civil case. Furthermore, this case is of interest to all other
|
||
|
hackers in Holland. Their hobby is suddenly a crime and many hackers
|
||
|
will cease to hack. Others will go 'underground', which is not
|
||
|
beneficial to the positive interaction between hackers and system
|
||
|
management or the relative openness in the Dutch computer security
|
||
|
world.
|
||
|
|
||
|
Public systems:
|
||
|
|
||
|
|
||
|
If you are not a student at some big university or work for a large
|
||
|
corporation, there is no real way for you to get on the Internet. As
|
||
|
long as there is no way for some people to connect to the net, there
|
||
|
will be people that hack their way in. Whether this is good or bad is
|
||
|
besides the point. If there is no freedom to explore, some hackers
|
||
|
will become the criminals that government wants them to be.
|
||
|
|
||
|
"Our system is perfectly secure !"
|
||
|
|
||
|
(and if you prove it's not, we'll ha
|
||
|
ve you put in jail)
|
||
|
|
||
|
Felipe Rodriquez (felipe@hacktic.nl) & Rop Gonggrijp (rop@hacktic.nl)
|
||
|
Rop Gonggrijp (rop@hacktic.nl), editor of | fax: +31 20 6900968
|
||
|
Hack-Tic Magazine (only on paper, only in Dutch) | VMB: +31 20 6001480
|
||
|
the best magazine for staying in touch with the | snail: Postbus 22953,
|
||
|
the Techno-Underground. Mail to info@hacktic.nl | 1100 DL Amsterdam
|
||
|
|
||
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|