1141 lines
51 KiB
Plaintext
1141 lines
51 KiB
Plaintext
Volume 8, Number 2 14 January 1991
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| /|oo \ |
|
||
| - FidoNews - (_| /_) |
|
||
| _`@/_ \ _ |
|
||
| FidoNet (r) | | \ \\ |
|
||
| International BBS Network | (*) | \ )) |
|
||
| Newsletter ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief: Vince Perriello
|
||
Editors Emeritii: Thom Henderson, Dale Lovell
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
|
||
Copyright 1991, Fido Software. All rights reserved. Duplication
|
||
and/or distribution permitted for noncommercial purposes only.
|
||
For use in other circumstances, please contact Fido Software.
|
||
|
||
FidoNews is published weekly by and for the Members of the
|
||
FidoNet (r) International Amateur Electronic Mail System. It is
|
||
a compilation of individual articles contributed by their authors
|
||
or authorized agents of the authors. The contribution of articles
|
||
to this compilation does not diminish the rights of the authors.
|
||
|
||
You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission standards are contained in the file
|
||
ARTSPEC.DOC, available from node 1:1/1. 1:1/1 is a Continuous
|
||
Mail system, available for network mail 24 hours a day.
|
||
|
||
Fido and FidoNet are registered trademarks of Tom Jennings of
|
||
Fido Software, Box 77731, San Francisco CA 94107, USA and are
|
||
used with permission.
|
||
|
||
Opinions expressed in FidoNews articles are those of the authors
|
||
and are not necessarily those of the Editor or of Fido Software.
|
||
Most articles are unsolicited. Our policy is to publish every
|
||
responsible submission received.
|
||
|
||
|
||
Table of Contents
|
||
1. EDITORIAL ................................................ 1
|
||
As we rush towards war ................................... 1
|
||
2. ARTICLES ................................................. 4
|
||
THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY ..... 4
|
||
Is there interest in a FORTRAN Echo? ..................... 15
|
||
3. LATEST VERSIONS .......................................... 16
|
||
Latest Software Versions ................................. 16
|
||
4. NOTICES .................................................. 21
|
||
SEEKING HEALTHCARE BBS/ECHO INFORMATION .................. 21
|
||
The Interrupt Stack ...................................... 21
|
||
FidoNews 8-02 Page 1 14 Jan 1991
|
||
|
||
|
||
=================================================================
|
||
EDITORIAL
|
||
=================================================================
|
||
|
||
Vince Perriello
|
||
1:132/491@fidonet or Vince_Perriello@f491.n132.z1.fidonet.org
|
||
|
||
[After I wrote this, I called a close friend and read it to him.
|
||
He suggested to me that printing this would most likely cause a
|
||
flood of articles that have nothing to do with FidoNet to appear
|
||
on my doorstep. Perhaps. But frankly, my dear, I don't give a
|
||
Saddam. I feel that something needs to be said. NOW.]
|
||
|
||
I was just barely young enough to avoid Vietnam. In fact, I was
|
||
part of the last crop of young men to even face a draft lottery
|
||
in the United States. My number was 361. Fairly lucky, by the
|
||
standards of the day.
|
||
|
||
Today, I am just barely too old to even enlist in the American
|
||
armed services. Not that I am in such a hurry to do so. I am
|
||
overweight, lazy and overpaid -- and in no mood for a 180 degree
|
||
change in my lifestyle.
|
||
|
||
Yup, I'm your prototypical worthless, self-centered American.
|
||
Many non-Americans seem to think that all Americans are just
|
||
like me. And that our excessive zeal to protect every individual
|
||
from harm and to go the extra mile to avoid bloodshed is proof
|
||
that Americans are too soft and weak to face tough decisions.
|
||
|
||
The problem with these characterizations is, as usual, a matter
|
||
of lack of understanding.
|
||
|
||
You see, I am a product of a culture that encourages people to do
|
||
whatever they do best because at the end of the day, everything
|
||
will get done --- and done better --- that way. This system has
|
||
made the United States a great power in this world, more so than
|
||
nations with greater landmass and/or population. So there. The
|
||
fact that I don't want to be a soldier, and that this is
|
||
considered an acceptable attitude, isn't a weakness in our
|
||
system, it represents its greatest strength.
|
||
|
||
Perhaps Americans are too careful to avoid bloodshed. But why
|
||
should anyone be careless with the lives of others? The cavalier
|
||
attitude of many people towards their own compatriots is not a
|
||
sign of strength, it is one of stupidity. Just as our attitude
|
||
is not a sign of weakness. There are more than sufficient cases
|
||
in the history of the United States, both recent and past, to
|
||
suggest otherwise.
|
||
|
||
All of that having been said -- I don't understand a few things.
|
||
|
||
FidoNews 8-02 Page 2 14 Jan 1991
|
||
|
||
|
||
I don't understand why the leadership of Israel is unable to walk
|
||
a mile in the shoes of Palestinians, recognize the parallels to
|
||
their own experience, and find a way to address their legitimate
|
||
security concerns while also finally putting that issue to rest.
|
||
|
||
I don't understand why the entire international community was so
|
||
willing to look the other way for so long while Saddam Hussein
|
||
was running his number against Iranians and Kurds. Why they sold
|
||
him everything he needed to build these awful weapons they now
|
||
decry. Why the United States ambassador in effect told him it
|
||
was OK with us if he violated the Kuwaiti borders. Why it
|
||
suddenly became a new Holocaust once Kuwait was conquered and
|
||
the Iraqis behaved in the same cruel and inhuman manner that had
|
||
characterized their handling of their internal Kurd rebellion
|
||
and the Iran-Iraq war.
|
||
|
||
I don't understand why Saddam Hussein wants to rule the entire
|
||
Arab world. Besides controlling the price of over half the
|
||
proven oil reserves worldwide, I can't think of a reason why.
|
||
Unless he likes big sandboxes and has an affinity for camels. (I
|
||
DO think I understand why he invaded Kuwait. What a neat way to
|
||
cancel your debts!)
|
||
|
||
I don't understand why the United States is committing so many
|
||
resources to stopping this man while many nations with much
|
||
better cash flow situations, and arguably a higher stake in
|
||
seeing him stopped, are sitting it out. Japan bought MCA with
|
||
the amount of money the United States is spending every six
|
||
weeks just protecting THEIR oil supply. But the amount of money
|
||
they have promised in support of the embargo is a very small
|
||
percentage of that figure, and almost none of THAT money has yet
|
||
to leave the coffers of our great ally. Germany has been real
|
||
forthcoming too. I think that "Fahrvergnugen" must mean
|
||
something like "let the other guy get knocked on the head, I'm
|
||
outta here." Will the U.S. ultimately sell Paramount to Japan in
|
||
order to be able to afford to protect Japanese interests? Will
|
||
we sell AT&T to Germany so we have the wherewithal to ensure
|
||
sufficient gasoline for their no-speed-limit Autobahns? Are we
|
||
out of our ever-loving MINDS?
|
||
|
||
I don't understand why President Bush decided to make war so
|
||
close to inevitable. I think his November 8 move to increase the
|
||
American presence in Saudi Arabia was exactly the wrong move.
|
||
That a policy of increasing the percentage of non American
|
||
personnel, particularly Arabs, while keeping the total strength
|
||
at a level sufficient to deter aggression against Saudi Arabia,
|
||
could have ultimately led to some kind of solution. There are
|
||
lots of little Arabs who have access to Saddam and could have
|
||
made themselves slightly bigger Arabs by leading us to a
|
||
solution. Now it's probably too late. I wish the American
|
||
soldiers all the best. I hope that they are able to accomplish
|
||
whatever mission they are finally given without too many losses
|
||
on either side.
|
||
|
||
FidoNews 8-02 Page 3 14 Jan 1991
|
||
|
||
|
||
I don't understand why Gorbachev is recreating Hungary '56 and
|
||
Czechoslovakia '68 in Lithuania. Is this the guy whose government
|
||
has been saying such bad things about Stalin and Brezhnev? The
|
||
winner of the Nobel Peace Prize? I shudder to think who might
|
||
have come in second (nahhh! Not Saddam!)
|
||
|
||
I don't understand Communist China. Period.
|
||
|
||
I don't understand why so many people must die to end war. Is
|
||
it possible that all people must die to end war? I sure hope not.
|
||
|
||
That way lies madness.
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 8-02 Page 4 14 Jan 1991
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
|
||
(submitted by Tom Jennings, fidonet 1:125/111
|
||
uucp ...hoptoad!kumr!anomaly!tom.jennings)
|
||
|
||
Pursuing Policies for the Information Age in the
|
||
Bicentennial Year of the Bill of Rights
|
||
|
||
Tutorials & Invitational Conference, Limited to 600 Participants
|
||
|
||
Monday-Thursday, March 25-28, 1991
|
||
|
||
Airport SFO Marriott Hotel, Burlingame, California (San Francisco
|
||
Peninsula)
|
||
|
||
Co-sponsors & cooperating organizations include
|
||
Institute of Electrical and Electronics Engineers-USA
|
||
Association for Computing Machinery
|
||
Electronic Networking Association
|
||
Electronic Frontier Foundation
|
||
Videotex Industry Association
|
||
Cato Institute
|
||
American Civil Liberties Union
|
||
ACM Special Interest Group on Software
|
||
IEEE-USA Intellectual Property Committee
|
||
ACM Special Interest Group on Computers and Society
|
||
ACM Committee on Scientific Freedom and Human Rights
|
||
IEEE-USA Committee on Communications and Information Policy
|
||
Autodesk, Inc.
|
||
The WELL
|
||
Portal Communications
|
||
|
||
Sponsored by the Computer Professionals for Social Responsibility
|
||
A nonprofit educational corporation
|
||
(415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814
|
||
|
||
|
||
ABOUT COMPUTERS, FREEDOM & PRIVACY
|
||
----------------------------------
|
||
|
||
We are at a crossroads as individuals, organizations and
|
||
governments depend more and more on computers and computer
|
||
networks. Within ten years, most global information will be
|
||
collected and utilized electronically. The 1990's are the pivotal
|
||
decade in which statutes, policies and judicial precedents will
|
||
be developed for controlling access, use -- and abuse -- of
|
||
computerized information and electronic mail.
|
||
|
||
FidoNews 8-02 Page 5 14 Jan 1991
|
||
|
||
|
||
Current government and private-sector policies are an
|
||
uncoordinated jumble, created as each group evolves ways to
|
||
collect, manipulate, extract, share and protect computerized and
|
||
networked information and services.
|
||
|
||
Data on individuals and groups is being computerized by numerous
|
||
agencies, organizations and special interests, often without the
|
||
knowledge or approval of those it concerns, and with varying
|
||
degrees of accuracy.
|
||
|
||
Computers can greatly assist individuals, organizations and
|
||
government in making sound decisions based on efficient access to
|
||
adequate information -- for personal benefit, business
|
||
improvement and national well-being.
|
||
|
||
Or, inappropriate use and regulation can seriously threaten
|
||
fundamental freedoms, personal privacy, and the democratic
|
||
processes that are at the very foundation of this nation and of
|
||
any free society.
|
||
|
||
ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
|
||
-----------------------------------------------------------------
|
||
|
||
PLENARY SPEAKERS:
|
||
|
||
* Laurence H. Tribe, Professor of Constitutional Law, Harvard Law
|
||
School, offering major policy proposals in the opening Conference
|
||
session, "The Constitution in Cyberspace: Law & Liberty Beyond
|
||
the Electronic Frontier".
|
||
|
||
* Eli M. Noam, Director of the Center for Telecommunications and
|
||
Information Studies, Columbia University, and a recognized leader
|
||
in telecommunications regulation, international communications
|
||
policies and economics, will discuss, "Network Environments of
|
||
the Future: Reconciling Free Speech and Freedom of Association."
|
||
|
||
* William A. Bayse, Assistant Director, FBI Technical Services
|
||
Division, Washington DC, providing perspectives on "Balancing
|
||
Computer Security Capabilities with Privacy and Integrity" at the
|
||
Wednesday evening banquet.
|
||
|
||
|
||
THE CONFERENCE SESSIONS offer diverse speakers & panel
|
||
discussions:
|
||
|
||
Trends in Computers & Networks.
|
||
Overview and prognosis of computing capabilities and networking
|
||
as they impact personal privacy, confidentiality, security,
|
||
one-to-one & many-to-one communications, and access to
|
||
information about government, business and
|
||
society.
|
||
|
||
FidoNews 8-02 Page 6 14 Jan 1991
|
||
|
||
|
||
International Perspectives & Impacts.
|
||
Other nationsU models for protecting personal information and
|
||
communications, and granting access to government information;
|
||
existing and developing laws; requirements for trans-national
|
||
dataflow and their implications; impacts on personal expression;
|
||
accountability.
|
||
|
||
Personal Information & Privacy.
|
||
Government and private collection, sharing, marketing,
|
||
verification, use, protection of, access to and responsibility
|
||
for personal data, including buying patterns, viewing habits,
|
||
lifestyle, work, health, school, census, voter, tax, financial
|
||
and consumer information.
|
||
|
||
Law Enforcement Practices & Problems.
|
||
Issues relating to investigation, prosecution, due process and
|
||
deterring computer crimes, now and in the future; use of
|
||
computers to aid law enforcement.
|
||
|
||
Law Enforcement & Civil Liberties.
|
||
Interaction of computer crime, law enforcement and civil
|
||
liberties; issues of search, seizure and sanctions, especially as
|
||
applied to shared or networked information, software and
|
||
equipment.
|
||
|
||
Legislation & Regulation.
|
||
Legislative and regulatory roles in protecting privacy and
|
||
insuring access; legal problems posed by computing and computer
|
||
networks; approaches to improving related government processes.
|
||
|
||
Computer-based Surveillance of Individuals.
|
||
Monitoring electronic-mail, public & private teleconferences,
|
||
electronic bulletin boards, publications and subscribers;
|
||
monitoring individuals, work performance, buying habits and
|
||
lifestyles.
|
||
|
||
Electronic Speech, Press & Assembly.
|
||
Freedoms and responsibilities regarding electronic speech,
|
||
public and private electronic assembly, electronic publishing,
|
||
prior restraint and chilling effects of monitoring.
|
||
|
||
Access to Government Information.
|
||
Implementing individual and corporate access to federal, state &
|
||
local information about communities, corporations, legislation,
|
||
administration, the courts and public figures; allowing access
|
||
while protecting confidentiality.
|
||
|
||
Ethics & Education.
|
||
Ethical principles for individuals, system administrators,
|
||
organizations, corporations and government; copying of data,
|
||
copying of software, distributing confidential information;
|
||
relations to computer education and computer law.
|
||
|
||
FidoNews 8-02 Page 7 14 Jan 1991
|
||
|
||
|
||
Where Do We Go From Here? [closing session]
|
||
Perspectives, recommendations and commitments of participants
|
||
from the major interest groups, proposed next steps to protect
|
||
personal privacy, protect fundamental freedoms and encourage
|
||
responsible policies and action.
|
||
|
||
Also:
|
||
Tuesday and Wednesday will include structured opportunities for
|
||
attendees to identify groups with whom they want to establish
|
||
contact and, if they wish, announce topics they would like to
|
||
discuss, one on one.
|
||
|
||
|
||
ABOUT THIS PREMIER EVENT
|
||
------------------------
|
||
|
||
This is an intensive, multi-disciplinary survey Conference for
|
||
those concerned with computing, teleconferencing, electronic
|
||
mail, computerized personal information, direct marketing
|
||
information, government data, etc. -- and those concerned with
|
||
computer-related legislation, regulation, computer security, law
|
||
enforcement and national and international policies that impact
|
||
civil liberties, responsible exercise of freedom and equitable
|
||
protection of privacy in this global Information Age.
|
||
|
||
For the first time, this four-day invitational event will bring
|
||
together representatives from all of these groups and more, all
|
||
in one place, all at one time.
|
||
|
||
Many of the recognized leaders and strongest advocates
|
||
representing the various groups having an interest in the issues
|
||
of the conference will discuss their concerns and proposals.
|
||
|
||
A maximum of 600 applicants will be invited to attend. Balanced
|
||
representation from the diverse groups interested in these issues
|
||
is being encouraged. Please see the enclosed Invitation
|
||
Application for details.
|
||
|
||
To inform participants about topics beyond their specialties,
|
||
half-day seminars are scheduled for the first day (Monday, March
|
||
25th). These parallel tutorials will explore relevant issues in
|
||
computing, networking, civil liberties, regulation, the law and
|
||
law enforcement. Each tutorial is designed for those who are
|
||
experienced in one area, but are less knowledgeable in the
|
||
subject of that tutorial.
|
||
|
||
To explore the interactions and ramifications of the issues,
|
||
conference talks and panel discussions are scheduled for the
|
||
remaining three days (Tuesday-Thursday, March 26th-28th). These
|
||
will emphasize balanced representation of all major views,
|
||
especially including probing questions and discussion.
|
||
|
||
FidoNews 8-02 Page 8 14 Jan 1991
|
||
|
||
|
||
Explicit Conference events to foster communication across
|
||
disciplines are planned. Working luncheons, major breaks and two
|
||
evening banquets will further encourage individual and small
|
||
group discussions.
|
||
|
||
|
||
ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
|
||
---------------------------------------------------------
|
||
|
||
Ken Allen, Senior Vice President for Governmental Relations,
|
||
Information Industries Association (IIA).
|
||
|
||
Sharon Beckman, civil rights and criminal defense attorney and
|
||
Electronic Frontier Foundation litigation counsel, Silverglate &
|
||
Good.
|
||
|
||
Jerry Berman, Director of the ACLU's Project on Information
|
||
Technology and Communications Policy Fellow, Benton Foundation.
|
||
|
||
Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.
|
||
Legal Info. Network administrator; LawMUG BBS sysop; edits on
|
||
line lawyers' newsletter.
|
||
|
||
Sally Bowman, promotes responsible computing practices through
|
||
school teaching units; Director, Computer Learning Foundation.
|
||
|
||
David Burnham, author, *Rise of the Computer State*; former *New
|
||
York Times* investigative reporter; specialist in IRS & Freedom
|
||
of Information Act.
|
||
|
||
Mary Culnan, co-authored major credit reporting policies
|
||
presented to Congress; School of Business Administration,
|
||
Georgetown University.
|
||
|
||
Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,
|
||
ACM; founding Director, RIACS; editor, *Communications of the
|
||
ACM*.
|
||
|
||
Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer
|
||
in Computer Security award; author, *Cryptography & Data
|
||
Security*.
|
||
|
||
Dave Farber, co-founder, CSNET; member, National Research
|
||
Council's Computer Science & Telecommunications Board; University
|
||
of Pennsylvania.
|
||
|
||
Cliff Figallo, Chief Executive Officer and Director of the WELL
|
||
(the Whole Earth 'Lectronic Link).
|
||
|
||
David Flaherty, Canadian surveillance expert, Professor of
|
||
History & Law at the University of Western Ontario.
|
||
|
||
FidoNews 8-02 Page 9 14 Jan 1991
|
||
|
||
|
||
John Ford, Public Relations Director for Equifax, one of the
|
||
nation's largest maintainers of information on individuals.
|
||
|
||
Bob Gellman, Chief Counsel, U.S. House of Representatives
|
||
Governmental Information Subcommittee.
|
||
|
||
Janlori Goldman, Director, ACLU Project on Privacy & Technology,
|
||
Washington, DC.
|
||
|
||
Harry Hammit, Editor, *Access Reports*, focusing on access to
|
||
information.
|
||
|
||
Martin Hellman, identified potential hazards in federal DES
|
||
national encryption standard; co-invented public-key encryption;
|
||
Stanford University.
|
||
|
||
Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.
|
||
|
||
Lance Hoffman, public policy researcher and Professor of
|
||
Electrical Engineering & Computer Science at George Washington
|
||
University.
|
||
|
||
Don Ingraham, wrote the first-ever search warrant for magnetic
|
||
media, computer crime prosecutor; Asst. District Attorney,
|
||
Alameda County.
|
||
|
||
Bob Jacobson, former Principal Consultant, Calif. State Assembly
|
||
Utilities and Commerce Committee; drafted landmark comp.
|
||
communications legislation.
|
||
|
||
Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,
|
||
Lotus Corp.; received DPMA's 1990 Distinguished Information
|
||
Science Award.
|
||
|
||
Tom Mandel, Director of the Leading Edge Values & Lifestyles
|
||
Program at SRI International.
|
||
|
||
John McMullen, well-known on-line journalist; co-authors
|
||
"Newsbytes" column on GEnie and Online America.
|
||
|
||
Peter Neumann, member, National Research Council's 1990
|
||
*Computers at Risk* committee; Chair, ACM Comm.on Computers &
|
||
Public Policy; hosts RISKS Forum.
|
||
|
||
Donn Parker, perhaps the best-known international consultant and
|
||
author on information security and computer crime, SRI
|
||
International.
|
||
|
||
Ron Plesser, former majority party congressional committee
|
||
counsel; privacy expert; attorney, Piper & Marbury.
|
||
|
||
FidoNews 8-02 Page 10 14 Jan 1991
|
||
|
||
|
||
John Quarterman, author, Digital Press' definitive *The Matrix:
|
||
Computer Networks and Conferencing Systems Worldwide*; networking
|
||
consultant.
|
||
|
||
Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best
|
||
news source about computer bulletin boards; Online Information
|
||
Service.
|
||
|
||
Tom Riley, Canadian specialist in international computing and
|
||
privacy issues; Riley & Associates.
|
||
|
||
Lance Rose, co-author of *Syslaw*, about the law applied to
|
||
on-line situations; attorney, Wallace & Rose.
|
||
|
||
Marc Rotenberg, expert in federal computer and privacy law;
|
||
Computer Professionals for Social Responsibility, Washington
|
||
office Director.
|
||
|
||
Noel Shipman, attorney for plaintiffs in electronic-mail privacy
|
||
landmark 1990 litigation against Epson America.
|
||
|
||
Harvey Silverglate, Electronic Frontier Foundation litigation
|
||
counsel, specialist in criminal defense and civil rights,
|
||
Silverglate & Good.
|
||
|
||
Gail Thackeray, computer crime prosecutor; involved in Secret
|
||
Service's 1990 "Operation Sun Devil", Arizona Asst. State
|
||
Attorney General.
|
||
|
||
Robert Veeder, Acting Chief, Information Policy Branch, Office of
|
||
Information Regulatory Affairs, OMB (Office of Management &
|
||
Budget).
|
||
|
||
Willis Ware, computer security expert; Fellow, RAND Corporation.
|
||
|
||
Sheldon Zenner, former federal prosecutor in Chicago; defended
|
||
*Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &
|
||
Zavis.
|
||
|
||
|
||
ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
|
||
-------------------------------------------------
|
||
|
||
Seminars on the first day offer introductions to the different
|
||
disciplines that intersect in this conference. These are surveys
|
||
for individuals not already expert in the topics presented.
|
||
These half-day tutorials are scheduled in four parallel tracks:
|
||
|
||
Global Communications & the Worldwide Computer Matrix.
|
||
[morning*]
|
||
Survey of electronic-mail & teleconferencing services, global
|
||
information access, remote services and the matrix of networks.
|
||
|
||
FidoNews 8-02 Page 11 14 Jan 1991
|
||
|
||
|
||
Low-Cost Computer Networking & Computer Bulletin Board Systems.
|
||
[afternoon*]
|
||
Reviews e-mail, bulletin board and teleconferencing alternatives
|
||
on personal computers; outlines low-cost PC-based networks and
|
||
their gateways to the global matrix. -- Mark Graham*, co-founder
|
||
of Institute for Global Communications, PeaceNet and EcoNet;
|
||
Pandora Systems
|
||
|
||
Current & Proposed International Policies. [morning*]
|
||
Law and regulation that will or may impact trans-border
|
||
data-flow and computer communications, impacting U.S. information
|
||
practices and international business.
|
||
|
||
Federal Legislation Impacting Computer Use. [afternoon*]
|
||
Detailed review of landmark federal statutes impacting access to
|
||
information, privacy of information, computer security and
|
||
computer crime. -- Marc Rotenberg*, former congressional counsel
|
||
and expert on federal legislation, CPSR, Washington DC.
|
||
|
||
How Computer Crackers Crack! [morning*]
|
||
Suggested by a deputy district attorney specializing in
|
||
high-tech crime, this is for law enforcement officials,
|
||
prosecutors, systems administrators and Bulletin Board System
|
||
(BBS) sysops. -- Russell Brand*, computer security specialist;
|
||
programmer with Reasoning Systems, Palo Alto CA.
|
||
|
||
How Computer Crime is Investigated.
|
||
[afternoon*] This reviews investigation, search, seizure and
|
||
evidence requirements for pursuing computer crime. It is for
|
||
computer users, computer owners, BBS sysops and investigators
|
||
unfamiliar with computer crime practices.
|
||
|
||
Information Security. [afternoon*]
|
||
Survey for systems managers of internal and external threats,
|
||
security measures, alternatives and other computer and data
|
||
security issues. -- Donn Parker*, a leading consultant in
|
||
information security and computer crime, SRI International.
|
||
|
||
* - Lecturers, descriptions and times were confirmed as of
|
||
1/8/91, but may be subject to change.
|
||
|
||
|
||
CONFERENCE CHAIR
|
||
Jim Warren, Autodesk, Inc. & *MicroTimes*
|
||
415-851-7075, jwarren@well.sf.ca.us / e-mail
|
||
|
||
PROGRAM COMMITTEE
|
||
Dorothy Denning, Digital Equipment Corporation
|
||
Peter Denning, Research Institute for Advanced Computer Science
|
||
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
|
||
Elliot Fabric, Attorney at Law
|
||
Mark Graham, Pandora Systems
|
||
Don Ingraham, Alameda County District AttorneyUs Office
|
||
Bruce Koball, Motion West
|
||
Marc Rotenberg, Computer Professionals for Social Responsibility
|
||
Glenn Tenney, Fantasia Systems & Hacker's Conference
|
||
FidoNews 8-02 Page 12 14 Jan 1991
|
||
|
||
|
||
ADVISORS
|
||
Ron Anderson, ACM SIGCAS & University of Minnesota
|
||
John Perry Barlow, Electronic Frontier Foundation
|
||
Jerry Berman, ACLU & Benton Foundation
|
||
Dave Caulkins, USSR GlasNet
|
||
Vint Cerf, Corporation for National Research Initiatives
|
||
Margaret Chambers, Electronic Networking Association
|
||
Steve Cisler, Apple Computer, Inc.
|
||
Whit Diffie, Northern Telecom
|
||
Mary Eisenhart, *MicroTimes*
|
||
Dave Farber, University of Pennsylvania
|
||
Cliff Figallo, The WELL
|
||
John Gilmore, Cygnus Support
|
||
Adele Goldberg, ParcPlace Systems
|
||
Terry Gross, Rabinowitz, Boudin, Standard, et al
|
||
Keith Henson, consultant & Alcor
|
||
Lance Hoffman, George Washington University
|
||
Dave Hughes, Chariot Communications
|
||
Bob Jacobson, Human Interface Technology Laboratory
|
||
Mitch Kapor, Electronic Frontier Foundation
|
||
Roger Karraker, Santa Rosa College
|
||
Tom Mandel, SRI International
|
||
John McMullen, NewsBytes
|
||
Peter Neumann, SRI International
|
||
Dave Redell, Digital Equipment Corporation
|
||
Ken Rosenblattt, Santa Clara County District Attorney's Office
|
||
Paul Saffo, Institute for the Future
|
||
Gail Thackeray, Arizona Attorney GeneralUs Office
|
||
Jay Thorwaldson, Palo Alto Medical Foundation
|
||
Terry Winograd, CPSR & Stanford University
|
||
Sheldon Zenner, Katten, Muchin, & Zavis
|
||
|
||
Affiliations listed only for identification
|
||
|
||
============================
|
||
= Request for Invitation =
|
||
============================
|
||
First Conference on Computers, Freedom & Privacy
|
||
March 25-28, 1991
|
||
Monday: Tutorials, Tuesday-Thursday: Conference Sessions
|
||
SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
|
||
For hotel reservations at Conference rates, call: (800)228-9290
|
||
#3
|
||
|
||
** Invitational Conference, limted to 600 participants. ** To
|
||
facilitate useful dialogue and balanced participation by
|
||
representatives from all of the diverse groups interested in
|
||
these issues, attendance is limited. (The capacity of the
|
||
Conference facility is similarly limited).
|
||
|
||
All interested individuals are encouraged to request an
|
||
invitation. Invitations will be primarily issued on a first-come,
|
||
first-served basis within each major interest group.
|
||
|
||
FidoNews 8-02 Page 13 14 Jan 1991
|
||
|
||
|
||
Fees if payment is received by: Jan.31 -Mar.15 after Mar.15
|
||
Tutorials (full day) $ 95 $ 145 $ 195
|
||
Conference (3 days) $ 295 $ 350 $ 400
|
||
|
||
Conference Registration fee includes three luncheons, two banquet
|
||
meetings and selected handouts. Please make checks payable to
|
||
"Computers, Freedom & Privacy/CPSR". Please don't send cash.
|
||
Invitations will be promptly issued, or the uncashed check will
|
||
be voided and promptly returned.
|
||
|
||
Please type or print. Thank ye, kindly.
|
||
name:
|
||
title:
|
||
organization:
|
||
mailing address:
|
||
city, state ZIP:
|
||
phone(s):
|
||
fax:
|
||
e-mail:
|
||
|
||
Comments to assist in evaluating this request:
|
||
|
||
|
||
|
||
To aid in balancing participation among groups,
|
||
please check all significantly applicable items.
|
||
[ ] user of computers or computer networking
|
||
[ ] user of electronic-mail services
|
||
[ ] user of teleconferencing services
|
||
[ ] user of direct marketing services
|
||
[ ] user of computerized personal information
|
||
[ ] user of government information
|
||
[ ] computer professional
|
||
[ ] BBS sysop (bulletin board system operator)
|
||
[ ] systems administrator / infosystems manager
|
||
[ ] network administrator
|
||
[ ] computer / communications security specialist
|
||
[ ] provider of data communications services
|
||
[ ] provider of electronic-mail services
|
||
[ ] provider of teleconferencing services
|
||
[ ] provider of direct marketing services
|
||
[ ] provider of computerized personal information
|
||
[ ] provider of government information
|
||
[ ] legislative official [ ] federal [ ] state
|
||
[ ] regulatory official or staff [ ] federal [ ] state
|
||
[ ] law enforcement offi [ ] federal [ ] state [ ] local
|
||
[ ] prosecutor [ ] federal [ ] state [ ] local
|
||
[ ] judicial representat [ ] federal [ ] state [ ] local
|
||
[ ] criminal defense attorney
|
||
[ ] corporate or litigation attorney
|
||
[ ] civil liberties specialist
|
||
[ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other
|
||
[ ] other:
|
||
[ ] other:
|
||
<<1/7/91>>
|
||
|
||
FidoNews 8-02 Page 14 14 Jan 1991
|
||
|
||
|
||
Please mail form and payment to:
|
||
CFP Conference, 345 Swett Road, Woodside CA 94062
|
||
|
||
Privacy Notice: This information will not be sold, rented,
|
||
loaned, exchanged or used for any purpose other than official
|
||
CPSR activity. CPSR may elect to send information about other
|
||
activities, but such mailings will always originate with CPSR.
|
||
|
||
Sponsor: Computer Professionals for Social Responsibility,
|
||
(415)322-3778 A nonprofit, educational corporation [ Internal
|
||
Revenue Code 501(c)(3) ]
|
||
e-mail: cfp@well.sf.ca.us; fax: (415)851-2814
|
||
Chair: Jim Warren, (415)851-7075
|
||
|
||
Please copy, post & circulate!
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 8-02 Page 15 14 Jan 1991
|
||
|
||
|
||
Fred Niemczenia
|
||
FidoNet 1:371/7
|
||
|
||
|
||
Is There Interest in a FORTRAN Echo?
|
||
|
||
For the past year I've browsing through the various Programming
|
||
Echos to learn the gimmicks of the various languages we use.
|
||
I've found echos for C, PASCAL, and BASIC, just to name a few.
|
||
What appears to be missing is the grandaddy of them all; I
|
||
haven't found a single echo for FORTRAN.
|
||
|
||
Consider this a sort of lonely hearts' club search. What I'm
|
||
asking you to do, is ask YOUR users if there is an interest in
|
||
starting a national FORTRAN echo.
|
||
|
||
Please don't think that I'm trying to sell you the Fortran
|
||
language. What I am pushing for is a echo for programmers to
|
||
communicate. In the late 1940's and early 1950's, a need arose
|
||
for a high level language which would allow scientists and
|
||
engineers to code mathematical procedures. Prior to this point,
|
||
one had to learn assembly to access that new-fangled contraption
|
||
(the electronic digital computer). What caught on was Fortran.
|
||
|
||
Current estimates indicate that some 60 percent of scientific
|
||
software is still in Fortran. I'm talking major mainframes. The
|
||
software has to maintained, and periodically ported over to new
|
||
machines. There are four major companies that produce compilers
|
||
for the PC family of computers right now. I think there is a
|
||
need for a meeting place.
|
||
|
||
Please ask your users if they're interested. I'd sure prefer
|
||
visiting my favorite BBS for a Fortran question, than paying $$$
|
||
to visit the Microsoft Forum on CompuServe.
|
||
|
||
Please address all replies to Fred Niemczenia at 1:371/7 via
|
||
Netmail, or EMAIL at CompuServe 76606,2060.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 8-02 Page 16 14 Jan 1991
|
||
|
||
|
||
=================================================================
|
||
LATEST VERSIONS
|
||
=================================================================
|
||
|
||
Latest Software Versions
|
||
|
||
MS-DOS Systems
|
||
--------------
|
||
|
||
Bulletin Board Software
|
||
Name Version Name Version Name Version
|
||
|
||
DMG 2.93 Phoenix 1.3 TAG 2.5g
|
||
Fido 12s+ QuickBBS 2.66 TBBS 2.1
|
||
GSBBS 3.01 RBBS 17.3A TComm/TCommNet 3.4
|
||
Lynx 1.30 RBBSmail 17.3B Telegard 2.5
|
||
Kitten 2.16 RemoteAccess 0.04a TPBoard 6.1
|
||
Maximus 1.02 SLBBS 1.77A Wildcat! 2.55
|
||
Opus 1.14+ Socrates 1.10 WWIV 4.12
|
||
PCBoard 14.5 XBBS 1.15
|
||
|
||
Network Node List Other
|
||
Mailers Version Utilities Version Utilities Version
|
||
|
||
BinkleyTerm 2.40 EditNL 4.00 ARC 7.0
|
||
D'Bridge 1.30 MakeNL 2.31 ARCAsim 2.30
|
||
Dutchie 2.90C ParseList 1.30 ARCmail 2.07
|
||
FrontDoor 1.99c Prune 1.40 ConfMail 4.00
|
||
PRENM 1.47 SysNL 3.14 Crossnet v1.5
|
||
SEAdog 4.51b XlatList 2.90 DOMAIN 1.42
|
||
TIMS 1.0(Mod8) XlaxDiff 2.35 EMM 2.02
|
||
XlaxNode 2.35 4Dog/4DMatrix 1.18
|
||
Gmail 2.05
|
||
GROUP 2.16
|
||
GUS 1.30
|
||
HeadEdit 1.15
|
||
InterPCB 1.31
|
||
LHARC 1.13
|
||
MSG 4.1
|
||
MSGED 2.06
|
||
MSGTOSS 1.3
|
||
Oliver 1.0a
|
||
PK[UN]ZIP 1.10
|
||
QM 1.0
|
||
QSORT 4.03
|
||
Sirius 1.0x
|
||
SLMAIL 1.36
|
||
StarLink 1.01
|
||
TagMail 2.41
|
||
TCOMMail 2.2
|
||
Telemail 1.27
|
||
FidoNews 8-02 Page 17 14 Jan 1991
|
||
|
||
|
||
TMail 1.15
|
||
TPBNetEd 3.2
|
||
TosScan 1.00
|
||
UFGATE 1.03
|
||
XRS 4.00*
|
||
XST 2.2
|
||
ZmailH 1.14
|
||
|
||
|
||
OS/2 Systems
|
||
------------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Maximus-CBCS 1.02 BinkleyTerm 2.40 Parselst 1.32
|
||
ConfMail 4.00
|
||
EchoStat 6.0
|
||
oMMM 1.52
|
||
Omail 3.1
|
||
MsgEd 2.06
|
||
MsgLink 1.0C
|
||
MsgNum 4.14
|
||
LH2 0.50
|
||
PK[UN]ZIP 1.02
|
||
ARC2 6.00
|
||
PolyXARC 2.00
|
||
Qsort 2.1
|
||
Raid 1.0
|
||
Remapper 1.2
|
||
Tick 2.0
|
||
VPurge 2.07
|
||
|
||
|
||
Xenix/Unix
|
||
----------
|
||
|
||
BBS Software Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
|
||
BinkleyTerm 2.30b Unzip 3.10
|
||
ARC 5.21
|
||
ParseLst 1.30b
|
||
ConfMail 3.31b
|
||
Ommm 1.40b
|
||
Msged 1.99b
|
||
Zoo 2.01
|
||
C-Lharc 1.00
|
||
Omail 1.00b
|
||
|
||
FidoNews 8-02 Page 18 14 Jan 1991
|
||
|
||
|
||
Apple CP/M
|
||
----------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37
|
||
MsgUtil 2.5
|
||
PackUser v4
|
||
Filer v2-D
|
||
UNARC.COM 1.20
|
||
|
||
|
||
Macintosh
|
||
---------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Red Ryder Host 2.1 Tabby 2.2 MacArc 0.04
|
||
Mansion 7.15 Copernicus 1.0 ArcMac 1.3
|
||
WWIV (Mac) 3.0 LHArc 0.33
|
||
Hermes 1.01 StuffIt Classic 1.6
|
||
FBBS 0.91 Compactor 1.21
|
||
TImport 1.92
|
||
TExport 1.92
|
||
Timestamp 1.6
|
||
Tset 1.3
|
||
Import 3.2
|
||
Export 3.21
|
||
Sundial 3.2
|
||
PreStamp 3.2
|
||
OriginatorII 2.0
|
||
AreaFix 1.6
|
||
Mantissa 3.21
|
||
Zenith 1.5
|
||
Eventmeister 1.0
|
||
TSort 1.0
|
||
Mehitable 2.0
|
||
UNZIP 1.02c
|
||
|
||
Amiga
|
||
-----
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Paragon 2.082+ BinkleyTerm 1.00 AmigArc 0.23
|
||
TransAmiga 1.05 TrapDoor 1.50 AReceipt 1.5
|
||
FidoNews 8-02 Page 19 14 Jan 1991
|
||
|
||
|
||
WelMat 0.42 booz 1.01
|
||
ConfMail 1.10
|
||
ChameleonEdit 0.10
|
||
ElectricHerald1.66
|
||
Lharc 1.30
|
||
MessageFilter 1.52
|
||
oMMM 1.49b
|
||
ParseLst 1.30
|
||
PkAX 1.00
|
||
PK[UN]ZIP 1.01
|
||
PolyxAmy 2.02
|
||
RMB 1.30
|
||
RoboWriter 1.02
|
||
Skyparse 2.30
|
||
TrapList 1.12
|
||
Yuck! 1.61
|
||
Zippy (Unzip) 1.25
|
||
Zoo 2.01
|
||
|
||
|
||
|
||
Atari ST
|
||
--------
|
||
|
||
Bulletin Board Network Node List
|
||
Software Version Mailer Version Utilities Version
|
||
|
||
FIDOdoor/ST 2.10* BinkleyTerm 2.40jt* ParseList 1.30
|
||
QuickBBS/ST 1.02 The BOX 1.20 Xlist 1.12
|
||
Pandora BBS 2.41c EchoFix 1.20
|
||
GS Point 0.61
|
||
LED ST 1.00
|
||
MSGED 1.96S
|
||
|
||
Archiver Msg Format Other
|
||
Utilities Version Converters Version Utilities Version
|
||
|
||
LHARC 0.60 TB2BINK 1.00 ConfMail 4.02
|
||
ARC 6.02 BINK2TB 1.00 ComScan 1.02
|
||
PKUNZIP 1.10 FiFo 2.01b Import 1.14
|
||
OMMM 1.40
|
||
Pack 1.00
|
||
FastPack 1.20
|
||
FDsysgen 2.15*
|
||
FDrenum 2.10*
|
||
Trenum 0.10
|
||
|
||
|
||
|
||
Archimedes
|
||
----------
|
||
|
||
FidoNews 8-02 Page 20 14 Jan 1991
|
||
|
||
|
||
BBS Software Mailers Utilities
|
||
Name Version Name Version Name Version
|
||
|
||
ARCbbs 1.44 BinkleyTerm 2.03 Unzip 2.1TH
|
||
ARC 1.03
|
||
!Spark 2.00d
|
||
|
||
ParseLst 1.30
|
||
BatchPacker 1.00
|
||
|
||
|
||
+ Netmail capable (does not require additional mailer software)
|
||
* Recently changed
|
||
|
||
Utility authors: Please help keep this list up to date by
|
||
reporting new versions to 1:1/1. It is not our intent to list
|
||
all utilities here, only those which verge on necessity.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 8-02 Page 21 14 Jan 1991
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
asuvax.eas.asu.edu!CompuServe.COM!73230.3514 (Jerry McCarthy)
|
||
|
||
SEEKING HEALTHCARE BBS/ECHO INFORMATION
|
||
|
||
The PC Physician Medical Computing Resource Guide, a disk-based
|
||
electronic publication, is seeking information about healthcare-
|
||
oriented BBS, echos, news groups, discussion groups, and other
|
||
electronic publications for its second edition, scheduled for
|
||
release in March of this year. For more information, contact:
|
||
|
||
Jerry McCarthy
|
||
Editor
|
||
PC Physician MCRG
|
||
3300 Mitchell Lane
|
||
Suite 390
|
||
Boulder, CO 80303
|
||
|
||
303-443-8085 (voice)
|
||
303-443-7653 (FAX)
|
||
|
||
CIS: 73230,3514
|
||
BITNET: MCCARTHY_J@UCOLMCC
|
||
|
||
The MCRG is inexpensive commercial software ($15 postpaid) which
|
||
is not copy protected, but which is produced under a license to
|
||
a software company which does not currently allow distribution as
|
||
a BBS file. The information MCRG compiles about BBS/echos/news
|
||
groups/discussions/publications will, however, be distributed as
|
||
a text file as well as part of the MCRG second edition. Interested
|
||
individuals should contact Jerry McCarthy for a complementary copy
|
||
of MCRG.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
15 Jan 1991
|
||
Deadline for George Bush and Saddam Hussein to find some less
|
||
bloody way to assert their manhood. Please pray that Kuwait
|
||
may be liberated (and, for that matter, the Palestinian homeland
|
||
issue settled at last) without any additional loss of life.
|
||
|
||
16 Feb 1991
|
||
Fifth anniversary of the introduction of Echomail, by Jeff Rush.
|
||
|
||
30 Mar 1991
|
||
FidoNews 8-02 Page 22 14 Jan 1991
|
||
|
||
|
||
Jim Grubs (W8GRT) was issued his first ham radio license forty
|
||
years ago today. His first station was made from an ARC-5
|
||
"Command Set" removed from a B-17 bomber.
|
||
|
||
12 May 1991
|
||
Fourth anniversary of FidoNet operations in Latin America and
|
||
second anniversary of the creation of Zone-4.
|
||
|
||
8 Sep 1991
|
||
25th anniversary of first airing of Star Trek on NBC!
|
||
|
||
7 Oct 1991
|
||
Area code 415 fragments. Alameda and Contra Costa Counties
|
||
will begin using area code 510. This includes Oakland,
|
||
Concord, Berkeley and Hayward. San Francisco, San Mateo,
|
||
Marin, parts of Santa Clara County, and the San Francisco Bay
|
||
Islands will retain area code 415.
|
||
|
||
1 Feb 1992
|
||
Area code 213 fragments. Western, coastal, southern and
|
||
eastern portions of Los Angeles County will begin using area
|
||
code 310. This includes Los Angeles International Airport,
|
||
West Los Angeles, San Pedro and Whittier. Downtown Los
|
||
Angeles and surrounding communities (such as Hollywood and
|
||
Montebello) will retain area code 213.
|
||
|
||
1 Dec 1993
|
||
Tenth anniversary of Fido Version 1 release.
|
||
|
||
5 Jun 1997
|
||
David Dodell's 40th Birthday
|
||
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1:1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|