254 lines
7.7 KiB
Plaintext
254 lines
7.7 KiB
Plaintext
|
****************************************************************************
|
||
|
>C O M P U T E R U N D E R G R O U N D<
|
||
|
>D I G E S T<
|
||
|
*** Index to Volume Two ***
|
||
|
*** Issues 2.00 - 2.19 ***
|
||
|
****************************************************************************
|
||
|
|
||
|
Volume 1, Issue #2.00 (Aug 25, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: EFF mailing #3: About the Electronic Frontier Foundation
|
||
|
File 3: Len Rose's Search Warrant
|
||
|
File 4: What to Read When the SS is at the Door
|
||
|
File 5: CU in the News: More on the NY Raids
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.01 (Aug 31, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Proposed changees in Computer Abuse Act (S.2476)
|
||
|
File 3: CPSR Seeks FBI data on Bulletin Board Monitoring
|
||
|
File 4: Computers, Social Responsibility, and Political Action
|
||
|
File 5: Another experience with the SS
|
||
|
File 6: CU in the News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.02 (September 9, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Musing over Operation Sun Devil
|
||
|
File 3: IPCO BBS Back on-Line
|
||
|
File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete)
|
||
|
File 5: The CU in the News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.03 (September 14, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Len Rose's experience with the Secret Service
|
||
|
File 3: Tim Wolfson's address, cite list
|
||
|
File 4: A comment on Zod's case
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.04 (September 23, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Re: Evidence (was Re: Musing on Constitutionality)
|
||
|
File 3: Why the FBI should be concerned about the Secret Service
|
||
|
File 4: California Computer Abuse Law revisited
|
||
|
File 5: Candidate for state governor supports electronic freedom & privacy
|
||
|
File 6: Review of Steven Levy's CLOAK AND DAGGER
|
||
|
File 7: The CU in the News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.05 (September 30, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Re: The CU in the News (Mail reading)
|
||
|
File 3: Anarchist Times, Inc. (ATI)--background
|
||
|
File 4: The status of the electronic forum (BBS)
|
||
|
File 5: Another experience with the law
|
||
|
File 6: Some views on what to do if questioned by LE agents
|
||
|
File 7: The CU in the News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.06 (October 6, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: From the Mailbag
|
||
|
File 3: MARS BBS Sting a Prank
|
||
|
File 4: Another view of hacking
|
||
|
File 5: The CU in the news
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.07 (October 15, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
|
||
|
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
|
||
|
File 4: Electronic Frontier Foundation Hires Staff Counsel
|
||
|
File 5: 13th Annual National Computer Security Conference (Part 1)
|
||
|
File 6: 13th Annual National Computer Security Conference (Part 2)
|
||
|
File 7: Summary of COMPUTER ETHICS (book)
|
||
|
File 8: Introduction to TOXIC SHOCK
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.08 (October 20, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: From the Mailbag
|
||
|
File 3: Prodigy, Problems, and Censorship
|
||
|
File 4: Censorship on the Nets
|
||
|
File 5: PC's & Political Action
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.09 (October 27, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Len Rose Arrest
|
||
|
File 3: Mars was not "Censored"
|
||
|
File 4: Response to Mars "Censoring"
|
||
|
File 5: Steve Jackson Games (SJG) Update
|
||
|
File 6: The Future of Hacking and the System Security Profession
|
||
|
File 7: The Ultimate Interface: Hackers and the Private Sector
|
||
|
File 8: CU in the News: "Hackers" and Bank Blackmail in England
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.10 (November 2, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Len Rose Funds--A Humanitarian Necessity
|
||
|
File 3: EFF Seeks Executive Director (Job Announcement)
|
||
|
File 4: Massachusetts Computer Crime Bill
|
||
|
File 5: Re: C-u-D, #2.09 Censoring of gif's
|
||
|
File 6: The Piratical Dilemma
|
||
|
File 7: Obtaining Identification Cards
|
||
|
File 8: Logisticon vs. Revlon
|
||
|
File 9: In-House Security Problems
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
Volume 2, Issue #2.11 (November 13, 1990)
|
||
|
|
||
|
*** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: PhD Candidate Seeks information on the CU
|
||
|
File 3: Riggs, Darden, and Grant Sentenced
|
||
|
File 4: Prodigy Saga Continues
|
||
|
File 5: Re: Response to Mars "Censoring"
|
||
|
File 6: Response to SJG Affidavit (part 1)
|
||
|
File 7: Warrants schmarrants! The SS is Crazy!
|
||
|
File 8: More guidelines on what to do if busted
|
||
|
File 9: CU in the News--England and Emma Nicholson; VOGON News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.13 (November 25 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: EPIC (Effective Performance in Candidates)
|
||
|
File 3: The Riggs Sentencing (reprint from Newsbytes)
|
||
|
File 4: First Conference on Computers, Freedom & Privacy
|
||
|
File 5: Hackers Break into DEA Lines
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
Volume 2, Issue #2.14 (November 30, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Len Rose Indicted
|
||
|
File 3: CPSR's FOIA request from the FBI
|
||
|
File 4: International Information Retrieval Guild
|
||
|
File 5: A Note on Censorship
|
||
|
File 6: Two Comments on Prodigy
|
||
|
File 7: Don't Talk to Cops
|
||
|
File 8: Response to DEA/PBX News Story
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.15 (December 5, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: Len Rose Indictment in Illinois
|
||
|
File 3: 2600 Magazine Response to Atlanta Sentencing
|
||
|
File 4: List of Computer Underground Clippings
|
||
|
File 5: Computer Crime Laws list
|
||
|
File 6: Media and the CU
|
||
|
File 7: The Hermetic Underground
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.16 (December 10, 1990)
|
||
|
|
||
|
*> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <*
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
Volume 2, Issue #2.17 (December 16, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: From the Mailbag
|
||
|
File 3: EFF Response to Atlanta Sentencing Memorandum
|
||
|
File 4: Some Thoughts on the Atlanta Sentencing
|
||
|
File 5: Earning your Stripes
|
||
|
File 6: Playgrounds of the Mind: Cyberspace
|
||
|
File 7: The CU in the News
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.18 (December 28, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: From the Mailbag
|
||
|
File 3: Computers Under Attack
|
||
|
File 4: CU Resources in Germany
|
||
|
File 5: Trade Secrets; When are they Bad?
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
Volume 2, Issue #2.19 (December 31, 1990)
|
||
|
|
||
|
CONTENTS:
|
||
|
File 1: Moderators' Corner
|
||
|
File 2: From the Mailbag
|
||
|
File 3: Telecoms Ripping off BBSs?
|
||
|
File 4: Michigan Bell vs BBSs
|
||
|
File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
|
||
|
File 6: a.k.a. freedom of expression
|
||
|
File 7: Z-modem Virus Alert
|
||
|
|
||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
********************************************************************
|
||
|
****** END OF CuD VOLUME TWO - INDEX ********
|
||
|
********************************************************************
|
||
|
|