899 lines
35 KiB
Plaintext
899 lines
35 KiB
Plaintext
|
|
|
|
Computer underground Digest Wed Sept 6, 1995 Volume 7 : Issue 72
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
|
|
CONTENTS, #7.72 (Wed, Sept 6, 1995)
|
|
|
|
File 1--SUG's Computers & the Law II Sympsium
|
|
File 2--Policial potency of the net
|
|
File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Fri, 1 Sep 1995 15:34:16 -0400 (EDT)
|
|
From: John <john@SUG.ORG>
|
|
Subject: File 1--SUG's Computers & the Law II Sympsium
|
|
|
|
SUN USER GROUP
|
|
Second Annual Technical Symposium
|
|
"Computers & The Law"
|
|
November 12-15, 1995
|
|
Tampa, FL
|
|
|
|
|
|
|
|
As computers are utilized in more and more aspects of everyday life,
|
|
the once distinct areas of technology, legislature, and law
|
|
enforcement draw closer together. This unique technical conference
|
|
provides a forum in which members of these three fields can meet to
|
|
share experiences and ideas. The four day technical program (a day of
|
|
tutorials, two days of talks, and another day of tutorials) will
|
|
provide you with essential knowledge, whether your field is technical,
|
|
legal, or law enforcement.
|
|
|
|
Copies of this information are available via email at
|
|
conference@sug.org or on the World Wide Web at http://sug.org.
|
|
|
|
If you have further questions, contact the Sun User Group at
|
|
(617)232-0514.
|
|
|
|
|
|
+-----------------------------------------------------------------------+
|
|
| IMPORTANT DATES TO REMEMBER: |
|
|
| Early-bird Savings Deadline: October 13, 1995 |
|
|
| Registrations must be received at the Sun User Group offices |
|
|
| by October 13, 1995 to be eligible for Early-bird savings |
|
|
| |
|
|
| Hotel Discount Reservation Deadline: October 21, 1995 |
|
|
+-----------------------------------------------------------------------+
|
|
|
|
|
|
|
|
CONFERENCE OVERVIEW:
|
|
|
|
SUNDAY, November 12, 1995 - TUTORIAL PROGRAM
|
|
MONDAY, November 13, 1995 - TECHNICAL SESSIONS
|
|
TUESDAY, November 14, 1995 - TECHNICAL SESSIONS
|
|
WEDNESDAY, November 15, 1995 - TUTORIAL PROGRAM
|
|
|
|
TUTORIALS:
|
|
----------
|
|
The SUG Tutorial Program brings experienced training professionals to
|
|
you. Courses are presented by skilled teachers who are hands-on
|
|
experts in their topic areas. The tutorials will cover a variety of
|
|
topics relating to Sun/SPARC and x86-based machines, running any of a
|
|
number of operating systems.
|
|
|
|
Those who attend the tutorials will benefit from this unique
|
|
opportunity to develop essential skills in a unique combination of
|
|
UNIX system security, ethical, and legal topics.
|
|
|
|
The tutorial program at Tampa is divided into two days, with both
|
|
full- and half-day tutorials offered. Attendees may select any
|
|
non-overlapping set of classes. To ensure adequate seating and to
|
|
reduce crowding, we are requiring that registrants pre-register for
|
|
specific classes. Please note that some prior knowledge is required
|
|
for the advanced tutorials.
|
|
|
|
SUG's tutorial program is always in demand, and some tutorials are
|
|
almost guaranteed to sell out before registration closes. Attendance
|
|
is limited, and pre-registration is strongly recommended. On-site
|
|
registration is possible ONLY if space permits.
|
|
|
|
Sunday, November 12, 1995 Tutorials
|
|
-----------------------------------
|
|
|
|
S1 - 9:00am-5:00pm
|
|
Basics of Unix Security
|
|
Peter Galvin, Corporate Technologies, Inc.
|
|
|
|
This course will teach you the very basics about Unix security,
|
|
including some common threats, what to monitor in the file system,
|
|
standard publicly-available tools and resources, and some common
|
|
programmed threats to Unix including how to deal with
|
|
denial-of-service attacks.
|
|
|
|
The emphasis of this class is on security basics -- the very
|
|
fundamentals to making a Unix system more secure. Thus, this course
|
|
is targetted at new Unix administrators and auditors, and those who
|
|
have not had as much background and experience with security as they
|
|
might need. The material is presented in a vendor-independent
|
|
fashion, and presupposes no prior knowledge of (or access to) source
|
|
code. Students will receive a copy of "Practical Unix Security" by
|
|
Simson Garfinkel and Gene Spafford, which will be used as the textbook
|
|
for the course.
|
|
|
|
Overview
|
|
What is security?How do we get better security?
|
|
|
|
Users & authentication
|
|
What defines a user?
|
|
Passwords and identification
|
|
Special permissions
|
|
Working in groups
|
|
Setting good passwords
|
|
|
|
Filesystem protection
|
|
File types and protection modes
|
|
Setting modes
|
|
Checking modes
|
|
Checking for changes
|
|
|
|
Programmed attacks
|
|
Viruses
|
|
Worms
|
|
Trojan Horses & boobytraps
|
|
other problems
|
|
|
|
Security tools and add-ons
|
|
COPS
|
|
Crack
|
|
TCP wrappers
|
|
SPI
|
|
other resources
|
|
|
|
Response teams & assistance
|
|
FIRST
|
|
FBI, SS, local
|
|
|
|
|
|
ABOUT THE INSTRUCTOR: Peter Galvin is the Chief Technologist for
|
|
Corporate Technologies, Inc. and was the Systems Manager for Brown
|
|
University's Computer Science Department. Mr. Galvin is on the Board
|
|
of Directors for the Sun User Group. He has used, programmed, and
|
|
managed computer systems for 15 years, including 8 years with Sun
|
|
equipment.
|
|
|
|
As a consultant and trainer, he has taught a week-long course in Sun
|
|
system administration, and given talks at SunWorld and the annual SUG
|
|
conferences, for which he has also served as Chair of the Program
|
|
Committee. He is a columnist for the "Superuser" newsletter, and
|
|
coauthor of _Operating Systems Concepts_ by Silberschatz and Galvin.
|
|
Mr. Galvin holds a Master's degree in Computing Science from the
|
|
University of Texas at Austin
|
|
|
|
|
|
S2 - 9:00am-5:00pm
|
|
System Administrator Liability
|
|
Edward A. Cavazos
|
|
|
|
Target Audience: This tutorial is designed to meet the needs of the
|
|
system administrator who is faced with the perplexing legal problems
|
|
posed by activities related to overseeing a multi-user system which is
|
|
connected to the Internet. Individuals involved in establishing,
|
|
operating and managing private, commercial, or government systems of
|
|
this type, along with those in a position to draft policies setting
|
|
the limits of system use and user expectations will benefit by
|
|
becoming aware of the underlying legal issues and the current thinking
|
|
with regards to limiting potential legal liabilities.
|
|
|
|
Topics discussed will include:
|
|
|
|
* Sysadmins, Lawyers and the Law: Sources of law (statutes, precedents
|
|
and the common law), jurisdiction, where to go for legal information
|
|
and updates, criminal vs. civil law, the nature of lawsuits and
|
|
choosing a lawyer.
|
|
|
|
* E-Mail Privacy: Understanding the Electronic Communications Privacy
|
|
Act and other statutory or common law schemes which protect e-mail and
|
|
communication privacy, exceptions to the ECPA which sysadmins need to
|
|
know, and how to define and clarify the expectations of privacy held
|
|
by users.
|
|
|
|
* Defamation Liability: Limiting liability for defamatory messages
|
|
emanating from your site, understanding current precedents with
|
|
regardto sysadmin liability for defamation originating on USENET and
|
|
similar public forums, and drawing the line between censorship and
|
|
responsible administration.
|
|
|
|
* Copyright Law for the Sysadmin: A copyright "primer," issues
|
|
involving software transmitted via anonymous FTP, steps a sysadmin can
|
|
take to avoid a copyright infringemt lawsuit, ownership of materials
|
|
"posted" to publicdiscussion groups or conferences, new problems
|
|
related to WWW and what level of knowledge might form the basis of
|
|
liability.
|
|
|
|
* Adult Materials: understanding the current legal analysis pertaining
|
|
to sexually explicit computer materials, recognizing unprotected
|
|
activity and how to limit it and novel new questions posed by morphing
|
|
and related technologies.
|
|
|
|
* Protecting Your System: user agreements, acceptable use policies,
|
|
log-in banners, employment policies and similar methods of defining
|
|
the acceptable parameters of system e.
|
|
|
|
ABOUT THE INSTRUCTOR: Edward A. Cavazos is a practicing attorney with
|
|
in the Houston office of the law firm of Andrews & Kurth, where he
|
|
represents high-tech and Internet related companies. His practice
|
|
involves rendering services involving litigation, employment law,
|
|
products liability, and general business representation. Prior to
|
|
becoming licensed, he was involved in computer consulting and hardware
|
|
and software development. He has also been a BBS sysop for almost ten
|
|
years.
|
|
|
|
He is the author of several articles relating to on-line legal issues
|
|
and system administrator liability questions, and is the co- author of
|
|
Cyberspace and the Law: Your Rights and Duties in the On-Line World
|
|
(MIT Press). Mr. Cavazos is also a frequent lecturer on the legal
|
|
issues posed by computer communications. When not writing or speaking,
|
|
he serves on the Board of Directors of Electronic Frontiers Houston.
|
|
|
|
|
|
|
|
|
|
Wednesday, November 15, 1995 Tutorials
|
|
-----------------------------------
|
|
|
|
W1 - 9:00am-5:00pm
|
|
Firewalls and Internet Security
|
|
Rik Farrow, Consultant
|
|
|
|
A connection to the Internet can lead to probes and attacks from
|
|
sites around the world. This one day course examines probing
|
|
tools, some TCP/IP basics, routers configured for packet screening,
|
|
and full fledged firewalls. You will leave this course with
|
|
enough information to make decisions about the security of your
|
|
Internet connection, and how to choose the appropriate technology
|
|
to control and audit your connection to the Internet.
|
|
|
|
* Probing sites--how hackers find sites, and how to probe your own
|
|
site.
|
|
|
|
* TCP/IP basics--understand the basic protocols involved in Internet
|
|
attacks and firewall design.
|
|
|
|
* Routers and their uses in firewall design.
|
|
|
|
* Proxy servers on bastion hosts--essential element for a complete
|
|
firewall design.
|
|
|
|
* Choosing a firewall product or public domain software.
|
|
|
|
ABOUT THE INSTRUCTOR: Rik Farrow has worked with the UNIX system since
|
|
1982, and has written two books, UNIX Administration Guide to System V
|
|
(Prentice Hall, 1989), and UNIX System Security (Addison-Wesley,
|
|
1991). Since 1986, he has taught courses on UNIX security and system
|
|
administration for conferences, user groups, and businesses, in the US
|
|
and Europe. He was the Technical Editor of UNIX World magazine for
|
|
four years (as a contractor), and still writes for several magazines.
|
|
He has been self-employed for 15 years, enjoys mountain biking, living
|
|
in the high desert and flying small planes.
|
|
|
|
|
|
W3a - 9:00pm- 12:30pm
|
|
Network Intrusions
|
|
John Smith, Computer Crime Unit, Santa Clara County District
|
|
Attorney's Office
|
|
|
|
An intruder has gained access to your computer system. How do you
|
|
explain what was stolen and how to a police detective who thinks
|
|
you're speaking a foreign language? How can you, the system
|
|
administrator, help the detectives write the report or explain to them
|
|
that they might have to do the examination of any recovered evidence
|
|
such as a copied account?
|
|
|
|
Actual cases of computer crimes in Silicon Valley are used as
|
|
examples. Students will follow what has to be done in an
|
|
investigation, step by step, including the initial reports that would
|
|
be the basis of any search warrants or restraining orders. Students
|
|
will learn how to speed up an investigation by learning to prepare
|
|
reports and diagrams that can be part of a request for a search
|
|
warrant.
|
|
|
|
The Santa Clara County District Attorney's Officer Hi Tech/Computer
|
|
Crime Team has had years of experience investigating and prosecuting
|
|
trade secret thefts, network intrusions, chip thefts, and other types
|
|
of high tech thefts in Silicon Valley. This experience is interesting
|
|
and can serve as a means of educating computer administrators how to
|
|
protect their computers and systems, how to prepare an investigation,
|
|
how to get the appropriate law enforcement support, and how to prepare
|
|
to testify in court if necessary.
|
|
|
|
Topics covered include:
|
|
|
|
COMMON INTRUSION METHODS:
|
|
|
|
* POOR PASSWORDS: don't set youself up to be cracked!
|
|
* CRACKER PROGRAMS: the most vicious ones in the cracker toolkit
|
|
- TFTP and TCP/IP
|
|
- Trojan Horses
|
|
- Backdoor Programs
|
|
- TIGER and other tools
|
|
* SOCIAL ENGINEERING: People can be cracked too, you know.
|
|
* PHYSICAL SECURITY: do you know who your modem is talking to?
|
|
* GUEST OR ANONYMOUS ACCOUNTS: sure you'll let your sister date him,
|
|
but would you give him an account on your machine?
|
|
|
|
COMMON ERRORS:
|
|
|
|
* BUGS and common Security holes
|
|
* IP ADDRESSING: what all those numbers & names mean
|
|
* MISCONFIGURED SYSTEMS: Some inital configurations come with holes
|
|
that vendors expect system admins to fix.
|
|
* TRUSTED HOST: don't leave your system wide open
|
|
|
|
PLUS...
|
|
|
|
* PACKET BREAKING: Header and other information can be read.
|
|
* CHECKSUMS: Comparison of present value with the last known secure value.
|
|
* SNIFFER OR LANALYZER: Used to grab packets so they can be analyzed.
|
|
* UNIX PROMISCOUS MODE
|
|
* TIE INTO ETHERNET
|
|
* TELNET TO A CUTOUT
|
|
* FIREWALLS
|
|
* ENCRYPTION - PGP
|
|
|
|
|
|
BEGINNING INVESTIGATIONS
|
|
|
|
* Talk with a systems operator who can explain.
|
|
* The vital "S"-list: SPEED; STEALTH; SYSTEM SECURITY; SECURE EVIDENCE;
|
|
SUSPICIOUS/SCREWY EMPLOYEES; SHOW & EXPLAIN - REPORTING; SEARCH
|
|
|
|
ABOUT THE INSTRUCTOR: John C. Smith is an investigator with the
|
|
Computer/High Tech Crime Unit of the Santa Clara County District
|
|
Attorney's Office. He is a frequent guest and lecturer at Sun User
|
|
Group meetings and was the Chair for the law enforcement track.
|
|
|
|
T3b - 1:30pm-5:00pm
|
|
Ethics and Systems Administration
|
|
S.Lee Henry, Johns Hopkins University
|
|
|
|
Sysadmins find themselves increasingly involved in ethical dilemmas
|
|
that pit security against privacy, and threaten to disrupt the
|
|
delicate balance between personal and commercial interests.
|
|
|
|
When, if ever, should you overlook the personal use of business
|
|
computers? How should you handle matters involving the potentially
|
|
illegal use of your systems? How do you protect your users' privacy
|
|
while not making yourself liable for their activities? Can you
|
|
effectively curb the spread of pirated software? What are the safest
|
|
and most defensible policies to adhere to in light of current laws and
|
|
legal precedents? Can you enforce policies that guard against abuse
|
|
while not handcuffing the people whose commitment and creativity your
|
|
organization most needs? What should you do if the abuser is your
|
|
boss?
|
|
|
|
This highly interactive, fast-paced tutorial will challenge sysadmins
|
|
to come to grips with some difficult ethical dilemmas.
|
|
|
|
ABOUT THE INSTRUCTOR: S. Lee Henry is a columnist for SunExpert
|
|
magazine and has been managing Sun net works for about ten years. She
|
|
currently manages networking and systems for the Physics and Astronomy
|
|
Department at Johns Hopkins University. Prior to this, she spent ten
|
|
years doing similar work for "the U.S. Government", also known at the
|
|
CIA. Slee has been serving on the Board of Directors of the Sun User
|
|
Group for the past four years.
|
|
|
|
|
|
KEYNOTE SPEAKERS:
|
|
-----------------
|
|
|
|
The Sun User Group keynote sessions are topical and informative --
|
|
speakers you won't hear at any other conference!
|
|
|
|
Ken Geide, Chief, FBI Economic Espionage Unit
|
|
"Economic Espionage in the USA"
|
|
Monday, November 13, 9 a.m. - 10:30 a.m.
|
|
|
|
|
|
TECHNICAL SESSIONS (Monday, November 13 & Tuesday, November 14):
|
|
-------------------------------------------------------------------
|
|
|
|
"Computers & The Law" features three distinct parallel tracks of talks:
|
|
Technical; Legal; and Law Enforcement.
|
|
|
|
The TECHNICAL track will focus on nuts and bolts of
|
|
maintaining a UNIX or Sun system. These talks will cover the
|
|
all of the newest developments in the changing world
|
|
of technology. There are talks from the experts on: UNIX and
|
|
network security; encryption; software distribution in a
|
|
client/server environment; firewalls.
|
|
|
|
The LEGAL track will cover up-to-date issues of privacy and
|
|
morality, as well as in-depth examinations of the current and
|
|
changing laws pertaining to software and hardware. Legal
|
|
professionals from all over the country will examine how
|
|
changing technologies will necessitate changes in the law.
|
|
|
|
The LAW ENFORCEMENT track discusses computers as tools. Tools
|
|
which can help in the prevention of crimes -- or in the
|
|
commission of them. Join or experts in high-tech crime as the
|
|
discuss the discovery, investigation, apprehension, and
|
|
prosecution of crackers, software pirates, and bandits on the
|
|
information on the information superhighway.
|
|
|
|
SPECIAL FEATURES:
|
|
|
|
"The Future of Computer Crime"
|
|
|
|
Join our panel of experts from both sides of the law discuss
|
|
and predict the uses and abuses of computers into the next
|
|
century.
|
|
|
|
"Unix Security Tools Workshop"
|
|
Peter Galvin, Corporate Technologies, Inc.
|
|
|
|
With so many tools available to help detect and prevent
|
|
security problems, you practically need a guide to what's
|
|
available, where to get it, what it does, and why you'd want
|
|
to use it. This workshop is that guide. We'll look at
|
|
scanning tools, detection tools, prevention tools, firewall
|
|
tools, and tools to help during the course of a break-in. Note
|
|
that this is a workshop, not just a talk: If you have favorite
|
|
tools, please be ready to talk about them!
|
|
|
|
The Great Debate: Round 2
|
|
"Can Existing Laws Be Applied To Cyberspace?"
|
|
|
|
"Cyberspace is the new frontier, and is like nothing we've
|
|
seen or experiened before. In order to keep order in this new
|
|
wilderness, we need new legislation. Current laws, fine for
|
|
lower technologies, can't possible keep up with the rapidly
|
|
changing face of cyberspace."
|
|
|
|
-- OR --
|
|
|
|
"Cyberspace isn't "space" at all. It's not a place, it's a
|
|
tool, like a FAX machine or a telephone. We don't need
|
|
special 'electronic' laws, because all of the issues that come
|
|
up on The Internet have all come up before."
|
|
|
|
Which is it? Come hear constitutional law expert Michael
|
|
Froomkin (University of Miami Law School) and former New
|
|
Jersey Securities commissioner Jared Silverman (Hannoch
|
|
Weisman) in the debate which will could change the shape of
|
|
Cyberspace - or your view of it.
|
|
|
|
|
|
|
|
Scheduled Papers:
|
|
-----------------
|
|
|
|
"Information Commerce - Launching Content into Cyberspace"
|
|
David Bernstein, Electronic Publishing Resources
|
|
|
|
"Approaching the Horizon: The Evolving Landscape of Content Regulation
|
|
Online, 1995"
|
|
Marshall K. Dyer, Attorney-at-law
|
|
|
|
"System Administration - Creating A High-Availability Computing Environment"
|
|
Chip Downing, Director of Technical Services, Qualix Group, Inc.
|
|
|
|
"The Problem with Passwords: Zero Knowledge Authentication as a
|
|
Replacement for Conventional Passphrase Schemes"
|
|
Ben Samman, Yale University Law School
|
|
|
|
"Issues in Software License Management"
|
|
Dr. Ganapathy Krishnan, Intelligent Software Solutions
|
|
|
|
"XNet License - A multi-platform flexible license manager"
|
|
Dr. Ganapathy Krishnan, Intelligent Software Solutions
|
|
|
|
"Sidewinder: Enhanced Security for UNIX Firewalls"
|
|
Dan Thomsen, Secure Computing Corporation
|
|
|
|
"Secret Service Computer Investigations"
|
|
Bob Friel, U S Secret Service, Electronic Crimes Branch,
|
|
|
|
"FBI Computer Crime Team's Mission"
|
|
Richard Ress, Supervising Special Agent, FBI Computer Crime Squad
|
|
|
|
"Victim's Perspective - Ramification of Criminal or Civil Filing"
|
|
Kathryn J (Kate) Fritz, Attorney at Law, Fenwick & West
|
|
|
|
"Prosecution of Computer Crime - State Level"
|
|
Lee Hollander, Florida State's Attorney
|
|
|
|
"Computer Related Pornography"
|
|
Doug Rehman, Florida Dept of Law Enforcement
|
|
|
|
"Industrial Espionage in Silicon Valley"
|
|
John C. Smith, Investigator, Santa Clara County District
|
|
Attorney's Office
|
|
|
|
|
|
BIRDS-OF-A-FEATHER SESSIONS
|
|
---------------------------
|
|
Birds-of-a-Feather Sessions (BOFs) allow attendees to meet and discuss
|
|
topics of interest to them. BOF Sessions are intended to be highly
|
|
interactive and much less formal than the Technical Sessions.
|
|
Birds-of-a-Feather Sessions will be held Tuesday evening at the
|
|
Conference hotel. We would particularly like to encourage
|
|
Birds-of-a-Feather Sessions on topics which would not normally be
|
|
discussed during typical technical presentations (for instance,
|
|
discussions on professional and technical issues, non-professional
|
|
interests common to Systems Administrators, etc.) To schedule a BOF
|
|
Session, or to request more information, direct your e-mail to
|
|
office@sug.org. BOFs may also be scheduled on-site.
|
|
|
|
RECEPTION Sponsored by our friends at SunExpress!
|
|
---------
|
|
You are invited to join in the fun, mingle with old and new friends,
|
|
and enjoy the plentiful hors d'oeuvres and beverages. The Sun User
|
|
Group Reception is Monday, November 13, from 6:00-8:00pm at the
|
|
Conference hotel. The Reception is included in the technical sessions
|
|
registration fee. Additional Reception tickets may be purchased for a
|
|
nominal fee at the conference.
|
|
|
|
CONFERENCE PUBLICATIONS
|
|
-----------------------
|
|
One copy of the Conference Proceedings, which contains all refereed
|
|
papers, and one copy of the Invited Talks Submitted Notes may be
|
|
picked up at the conference by all technical sessions registrants.
|
|
Additional copies may be purchased at the conference.
|
|
|
|
THE SUN USER GROUP
|
|
------------------
|
|
The Sun User Group (SUG) brings people together to share information
|
|
and ideas about using Sun/SPARC equipment. You can discover new ways
|
|
to save time and money in the pages of _Readme_. You can get quick
|
|
answers to important questions on our electronic mailing list. At our
|
|
seminars you can learn more about the capabilities of your
|
|
workstation. At our conferences, you can meet other people who are
|
|
doing progressive and innovative work with their Sun/SPARC equipment.
|
|
|
|
Now is a better time than ever to join the Sun User Group. We're
|
|
reorganized, reinvented and growing every day. We've recently
|
|
introduced exciting new services specifically for our official LUGs.
|
|
Our members-only electronic mailing list has become one of the most
|
|
popular routes on the information highway. Our annual conferences
|
|
feature respected teachers - from Sun Microsystems as well as many
|
|
other areas of the industry.
|
|
|
|
|
|
HOTEL INFORMATION
|
|
-----------------
|
|
|
|
Crowne Plaza, Sabal Park
|
|
Computers & The Law II Symposium Headquarters
|
|
10221 Princess Palm Avenue
|
|
Tampa, FL 33610
|
|
|
|
|
|
voice (813) 623-6363
|
|
FAX (813) 246-7113
|
|
|
|
(800) 866-7666 reservations within the USA
|
|
|
|
|
|
The Crowne Plaza is an elegant five-story, full service hotel
|
|
conveniently located at the intersection of Interstates 4 and 75, only
|
|
20 minutes from Tampa International Airport. The hotel operates a
|
|
complimentary airport shuttle and is only minutes from Busch Gardens,
|
|
the new Florida Aquarium, as well as many other popular attractions.
|
|
|
|
The Sun User Group has a special negotiated rate of $85.00/night for
|
|
attendees of the Computers & The Law symposium. Please be sure to
|
|
mention that you are attending the Sun User Group conference and
|
|
reserve your room before October 21, 1995.
|
|
|
|
REGISTRATION INFORMATION AND FEES
|
|
---------------------------------
|
|
+-------------------------------------------------------------------+
|
|
| Sun User Group members save $50.00! |
|
|
+-------------------------------------------------------------------+
|
|
+-------------------------------------------------------------------+
|
|
| Earlybird Bonus! Register before October 6, 1995 and |
|
|
| save $100.00 *plus* get the Sun User Group "Security" |
|
|
| CD-ROM for FREE -- a $195 savings if you register by |
|
|
| October 13, 1995! |
|
|
+-------------------------------------------------------------------+
|
|
|
|
|
|
For more information please call (617) 232-0514.
|
|
|
|
Mail, Email, or FAX registration to:
|
|
|
|
SUG Symposium
|
|
1330 Beacon Street, Suite 344
|
|
Brookline, MA 02146
|
|
USA
|
|
|
|
Email: registration@sug.org Fax: (617) 232-1347
|
|
|
|
You may also register over the telephone with a Master Card or Visa.
|
|
|
|
Please print or type the information required.
|
|
|
|
To join or renew your membership to Sun User Group when registering
|
|
for the conference technical sessions, pay the full registration fee
|
|
and check the appropriate box below. A portion of your registration
|
|
fee will be designated as dues in full for a one year individual Sun
|
|
User Group membership.
|
|
|
|
|
|
Sun User Group Membership Status
|
|
* * PLEASE CHECK ONLY ONE * *
|
|
|
|
[ ] I am a current Sun User Group member.
|
|
SUG ID#__________________ Exp. Date__________
|
|
|
|
Both SUG ID# and exp. date MUST be filled in to be
|
|
eligible for the "Current SUG member" discount below.
|
|
If you do not know your SUG ID# or expiration date,
|
|
please call (617)232-0514 or contact SUG at
|
|
office@sug.org.
|
|
|
|
[ ] I am not a current Sun User Group member and would like SUG to
|
|
apply a portion of my registration fee to a one-year SUG
|
|
membership.
|
|
|
|
[ ] I am not a current Sun User Group member but do not wish to
|
|
join at this time.
|
|
|
|
+---------------------------------------+---------------+
|
|
|[ ] Sessions, one-day only | $200 |
|
|
| Please indicate day: | |
|
|
| [ ] Monday, November 13, 1995 | |
|
|
| [ ] Tuesday, November 14, 1995 | |
|
|
+---------------------------------------+---------------+
|
|
|[ ] Sessions, both days | $350 |
|
|
+---------------------------------------+---------------+
|
|
|[ ] One Tutorial only | $350 |
|
|
| Please indicate choice below | |
|
|
+---------------------------------------+---------------+
|
|
|[ ] One Tutorial and Sessions | $650 |
|
|
| Please indicate choice below | |
|
|
+---------------------------------------+---------------+
|
|
|[ ] Full Conference | $900 |
|
|
| Full Conference includes two | |
|
|
| days of tutorials, plus two days| |
|
|
| of sessions. A savings of $200!| |
|
|
| Please indicate choices below | |
|
|
+---------------------------------------+---------------+
|
|
|
|
DISCOUNTS:
|
|
+---------------------------------------+---------------+
|
|
|[ ] Current SUG Member Discount | |
|
|
| You *must* provide your SUG ID | |
|
|
| number to get this discount. | -$ 50 |
|
|
|---------------------------------------+---------------+
|
|
|[ ] Early-bird! Register before | -$100 |
|
|
| October 13, 1995 and save $100 | |
|
|
| dollars PLUS get the new SUG | |
|
|
| Security CD FREE!! | |
|
|
+---------------------------------------+---------------+
|
|
|
|
+---------------------------------------+---------------+
|
|
|Total Payment Enclosed | |
|
|
--------------------------------------------------------+
|
|
|
|
** NOTE: November 1, 1995 is the last day for advance
|
|
registration. A $100 on-site fee will be applied to all
|
|
registrations received after November 1, 1995. **
|
|
|
|
|
|
TUTORIAL SELECTION:
|
|
-------------------
|
|
|
|
You can select either one full-day tutorial or two half day tutorials
|
|
(Half-day tutorial registration fees are not available).
|
|
|
|
Please indicate tutorial(s) below:
|
|
|
|
Sunday, November 12, 1995
|
|
[ ] S1 - Basics of Unix Security
|
|
[ ] S2 - System Administrator Liability
|
|
|
|
Wednesday, November 15, 1995
|
|
[ ] W1 - Network Security: The Kerberos Approach
|
|
[ ] W2a - Network Intrusions
|
|
and W2b - Ethics and Systems Administration
|
|
|
|
|
|
|
|
- All payments must be in US dollars;
|
|
- Checks must be drawn on a US bank.
|
|
- Purchase Orders must be paid in full before your registration will
|
|
be released. Purchase Orders must be paid in full before October
|
|
13th to qualify for earlybird discount. POs unpaid before November
|
|
1st may result in cancellation of registration.
|
|
- The Sun User Group does not accept American Express
|
|
|
|
[ ] Check [ ] Purchase Order [ ] MasterCard [ ] Visa
|
|
|
|
|
|
Credit Card Number:___________________________________________________
|
|
|
|
Expiration Date:______________________________________________________
|
|
|
|
Signature of cardholder:______________________________________________
|
|
|
|
|
|
|
|
Name:_________________________________________________________________
|
|
|
|
Title:________________________________________________________________
|
|
|
|
Company Name:_________________________________________________________
|
|
|
|
Department:___________________________________________________________
|
|
|
|
Mail Stop/Suite:______________________________________________________
|
|
|
|
Street Address:_______________________________________________________
|
|
|
|
City:_________________________________________________________________
|
|
|
|
State:________________________________________________________________
|
|
|
|
Zip/Postal Code:______________________________________________________
|
|
|
|
Country:______________________________________________________________
|
|
|
|
Email Address:________________________________________________________
|
|
|
|
Phone:________________________________________________________________
|
|
|
|
|
|
REFUND CANCELLATION POLICY
|
|
If you must cancel, all refund requests must be in writing and
|
|
postmarked no later than October 6, 1995. Direct your letter to the
|
|
Sun User Group office. You may telephone to substitute another in
|
|
your place.
|
|
|
|
FOR FURTHER CONFERENCE INFORMATION, PLEASE CONTACT:
|
|
|
|
Sun User Group
|
|
1330 Beacon Street
|
|
Suite 344
|
|
Brookline, MA 02146
|
|
|
|
Telephone: (617) 232-0514 Fax: (617) 232-1347
|
|
Electronic Mail Address: conference@sug.org
|
|
World Wide Web: http://sug.org
|
|
|
|
You may FAX your registration form if paying by credit card or
|
|
purchase order to (617) 232-1347. If you FAX registration, to avoid
|
|
duplicate billing, do not mail additional copy. You may telephone our
|
|
office to confirm receipt of your fax.
|
|
|
|
*********************************************************************
|
|
PAYMENT MUST ACCOMPANY REGISTRATION FORM.
|
|
REGISTRATION VIA EMAIL IS ACCEPTABLE WITH A CREDIT CARD
|
|
*********************************************************************
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 2 Sep 1995 11:08:38 -0400
|
|
From: Dick Mills <dmills@albany.net>
|
|
Subject: File 2--Policial potency of the net
|
|
|
|
andrewm@interport.net(Andrew Mark) wrote an excellent article [CUD #7.69]
|
|
on "File 4 - Heroes and Villains." It provided a splash of cold reality
|
|
of the kind we don't hear often on the net.
|
|
|
|
Good work Mark. Your article amply illustrates that democratic doesn't
|
|
mean effective. In real life, endless rants, raves, and flames are
|
|
likely to have the opposite effect intended. You're right; but I think
|
|
your implied admonishment to Netters to BE RESPONSIBLE, are as
|
|
ineffective as that you decry. Here's why.
|
|
|
|
What do you expect? The net is anarchistic. Anarchists have the same
|
|
fundamental problem taking control of politics as celibates do in taking
|
|
over the gene pool.
|
|
|
|
Why admonish us to get our act together? What can we do within the
|
|
constraints of the medium as it works today? Everyone says
|
|
his own thing. You did it and now I'm doing it. There is no leader,
|
|
and no copy editor. True, there are newsletters like CUD, but there is
|
|
no effective way to edit or filter the general babble.
|
|
|
|
An alternative medium that recently achieved politically potency
|
|
is talk radio. I think the reason why it succeeded is clear. Rush.
|
|
Rush provides a focal point and leadership for like minded people to
|
|
rally behind. This gives their views coherency and thus potency. I
|
|
suppose, the combination of the Christian Right and Christian TV is an
|
|
analogous success story.
|
|
|
|
ALTERNATIVE MEDIUM + A FOCAL POINT = NEWFOUND POTENCY.
|
|
|
|
*Will* the net ever find its focal point? Who knows? It would be nice,
|
|
but there is no guarantee that it will ever happen.
|
|
|
|
*Should* the net find its focal point? There I have two opinions.
|
|
|
|
1) The net has potential for improving our democracy quite a bit. The
|
|
improvement would come from breaking the monopoly of mainstream media
|
|
and their control of the flow of information.
|
|
|
|
2) As an old fart, I'm attracted to the net precisely because it gives
|
|
me the opportunity to act juvenilely and irresponsibly. That
|
|
includes political irresponsibility, i.e. flaming. It's a
|
|
great release from the pressures of real life. If it weren't for my
|
|
gray hair and wrinkles, I'd do it at the bar scene. Behind the
|
|
anonymity of my modem, nobody knows who I *really* am.
|
|
|
|
I sincerely hope that if and when the net finds itself, that we will
|
|
leave a corner remaining for juvenile wannabes.
|
|
|
|
;)
|
|
|
|
No. On second thought, :|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.72
|
|
************************************
|
|
|