961 lines
41 KiB
Plaintext
961 lines
41 KiB
Plaintext
|
|
Computer underground Digest Wed Nov 8, 1995 Volume 7 : Issue 88
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #7.88 (Wed, Nov 8, 1995)
|
|
|
|
File 1--CORRECTION in CuD SUB/UNSUB Policy (address change)
|
|
File 2--Computer Security Day
|
|
File 3--Call for Papers (fwd)
|
|
File 4--ART Technology to be included in Frontier's browser
|
|
File 5--Riddler is looking for home pages...
|
|
File 6--Re: Web Site Ratings (fwd)
|
|
File 7--Last Chance to register for "Computers & the Law II"
|
|
File 8--The Computer Law Report (Nov 6, 1995: #13)
|
|
File 9--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 8 Nov 1995 21:32:45 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 1--CORRECTION in CuD SUB/UNSUB Policy (address change)
|
|
|
|
In a previous message we printed the wrong address for subs
|
|
and unsubs to CuD. Here is the corrected version:
|
|
|
|
++++++++++++++
|
|
|
|
CHANGES IN CuD SUBSCRIPTION POLICY:
|
|
|
|
Sadly, the size of the CuD mailing list has become to large to
|
|
manage manually. Therefore, after November 5, we WILL NO LONGER
|
|
ACCEPT MANUAL SUBS.
|
|
So, please DO NOT SEND sub requests to the moderators. Instead:
|
|
|
|
To SUBSCRIBE to CuD, send this message:
|
|
|
|
sub cudigest firstname lastname
|
|
|
|
(where "firstname" and "lastname" is YOUR first and last name)
|
|
|
|
Send this message to: listserv@vmd.cso.uiuc.edu
|
|
|
|
We strongly encourage readers to obtain CuD from USENET as
|
|
comp.society.cu-digest. Or, obtain it from any of the CuD web or ftp
|
|
sites (the CuD homepage is:
|
|
http://www.soci.niu.edu/~cudigest
|
|
|
|
To UNSUB from CuD, send this message: unsub cudigest
|
|
to: listserv@vmd.cso.uiuc.edu
|
|
|
|
The UIUC listserv will change addresses in January, '96, so
|
|
we will notify readers when the change occurs.
|
|
|
|
We apologize for any inconvenience this causes, but we're simply
|
|
unable to keep up with the demands.
|
|
|
|
Jim and Gordon
|
|
|
|
------------------------------
|
|
|
|
From: rxm8@PO.CWRU.EDU(Ron Moritz)
|
|
Subject: File 2--Computer Security Day
|
|
Date: 30 Oct 1995 18:24:30 GMT
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Security, Electronic Commerce, and the Internet:
|
|
Impact on Industry
|
|
|
|
CWRU & ISSA North Coast Chapter
|
|
International Computer Security Day Symposium
|
|
Thursday, November 30, 1995
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
Companies can no longer overlook the role that electronic
|
|
commerce will play in their business. Those with systems on the
|
|
Internet must think about how to protect what they put up.
|
|
|
|
On Thursday, November 30, 1995, Case Western Reserve University
|
|
and the North Coast Chapter of the Information Systems Security
|
|
Association will be observing International Computer Security Day
|
|
with a unique symposium designed to help you understand the
|
|
electronic marketplace.
|
|
|
|
Whether your goals include enhancing customer service, increasing
|
|
marketing effectiveness, or promoting products and services, you
|
|
will want to join us as we explore the Internet as an emerging
|
|
force on industry.
|
|
|
|
"If you think that technology will suddenly make the world more
|
|
secure, you're wrong." (Tim Berners-Lee, Director, W3 Consortium)
|
|
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Security, Electronic Commerce, and the Internet:
|
|
Impact on Industry
|
|
|
|
CWRU & ISSA North Coast Chapter
|
|
International Computer Security Day Symposium
|
|
Thursday, November 30, 1995
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
This symposium will bring together industry leaders and technology
|
|
revolutionaries who will share their vision of the maturation of
|
|
the Internet as a tool for commerce; and it will teach you how to
|
|
participate in this revolution in a rational, professional, and
|
|
secure way. Our speakers include:
|
|
|
|
Dr. Vijay Ahuja, Product Manager, Network Security Products
|
|
IBM (Research Triangle Park, NC)
|
|
Dr. Frederick B. Cohen, Ph.D., President
|
|
Management Analytics (Hudson, OH)
|
|
Mr. John Gage, Director, Science Office
|
|
Sun Microsystems Computer Corp. (Mountain View, CA)
|
|
Dr. Erik Grimmelmann, Marketing Vice President, Gateway Services
|
|
AT&T
|
|
Mr. Leo A. McCloskey, networkMCI Consulting Group
|
|
MCI Telecommunications Corporation (Pittsburgh, PA)
|
|
Mr. Daniel E. White, Partner, IS Security Effectiveness Series
|
|
Ernst & Young LLP (Chicago, IL)
|
|
|
|
Objective: Today's Internet is a business tool that lets
|
|
information cross geographical and functional
|
|
boundaries. Everyone is talking about it, you've
|
|
read about it in the newspapers, and you've watched
|
|
it on television news programs. You want to
|
|
establish a business presence on the Internet, you
|
|
want to take advantage of this capability, and you
|
|
want to use the Internet for electronic commerce;
|
|
but you're concerned about your exposure. After
|
|
all, everyone from The New York Times to The Los
|
|
Angeles Times has told you that flaws in network
|
|
technologies threaten the security of commercial
|
|
transactions over the global Internet. What do you
|
|
do?
|
|
|
|
Who: This symposium is designed for corporate
|
|
strategists, policy makers, marketing executives,
|
|
and information technology professionals (including
|
|
technology planners, communications and network
|
|
managers, information security managers, and
|
|
technology auditors). Others interested in the
|
|
worldwide adoption of the Internet for commercial
|
|
use are also invited to attend.
|
|
|
|
When: Thursday, November 30, 1995, 8:00 a.m. - 5:00 p.m.
|
|
|
|
Where: Thwing Center, Case Western Reserve University,
|
|
11111 Euclid Avenue, Cleveland, Ohio.
|
|
|
|
Lunch: Grand Foyer, Severance Hall, 11001 Euclid Avenue,
|
|
Cleveland, Ohio.
|
|
|
|
Lunch Panel: Network Security: Do You Know Who's Breaking in
|
|
Right Now?
|
|
|
|
Polls, newspaper articles, and professionals have
|
|
all suggested that the primary concern of Internet
|
|
users world wide is the potential for unauthorized
|
|
access to their potential or proprietary
|
|
information. This issue threatens to slow or limit
|
|
the worldwide adoption of the Internet for
|
|
commercial use. The lack of security touches all
|
|
of those who are concerned about copyright,
|
|
individual privacy, and personal freedom. What
|
|
progress has been made? Is this a solvable
|
|
problem? Do Internet users have to sacrifice their
|
|
open, freewheeling culture in order to provide
|
|
necessary security for the Net? Does this
|
|
commercialization work in the current architecture
|
|
of the Internet? Do we have a choice? These are
|
|
the questions our moderator will pose to our
|
|
distinguished group of industry and technology
|
|
leaders, each of whom has a large stake in the
|
|
outcome of this debate. This should be a fiery
|
|
discussion!
|
|
|
|
Information: Ron Moritz, CWRU/ISSA CSD Symposium Chair,
|
|
rxm8@po.cwru.edu or 216.368.6643.
|
|
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Security, Electronic Commerce, and the Internet:
|
|
Impact on Industry
|
|
|
|
CWRU & ISSA North Coast Chapter
|
|
International Computer Security Day Symposium Registration Form
|
|
Thursday, November 30, 1995
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
Name: ______________________________________________________
|
|
|
|
Title: ______________________________________________________
|
|
|
|
Company: ______________________________________________________
|
|
|
|
Address: ______________________________________________________
|
|
|
|
City/State/Zip: ________________________________________________
|
|
|
|
e-mail address: ________________________________________________
|
|
|
|
Business Phone: _____________________ Fax: _____________________
|
|
|
|
======================================
|
|
THERE WILL BE NO WALK-IN REGISTRATION!
|
|
=======================================
|
|
REGISTRATION DEADLINE: NOVEMBER 27, 1995
|
|
=========================================
|
|
|
|
Pre-register before November 15, 1995, and receive a
|
|
1995 ACM Computer Security Day Poster
|
|
|
|
Seminar Fees (check all boxes that apply):
|
|
|
|
__ Seminar fee (includes facility costs, lunch, breaks,
|
|
and parking). . . . . . . . . . . . . . . . . . . . . . . . . $95.00
|
|
__ Less CWRU faculty/staff, ISSA member discount . . . . . . . ($10.00)
|
|
|
|
Amount Enclosed: $____________
|
|
|
|
==========================================================
|
|
[Make Checks Payable to: Case Western Reserve University]
|
|
==========================================================
|
|
|
|
Lunch selection (check only one box):
|
|
|
|
__ Chicken breast stuffed with apple hazelnut dressing on
|
|
a Chardonnay cream sauce
|
|
__ Vegetable lasagna with wild mushrooms and Italian
|
|
cheeses layered with roasted garlic marinara
|
|
__ Cold marinated shrimp, scallop and New Zealand mussel
|
|
salad with artichokes and mushrooms
|
|
|
|
MAIL REGISTRATION & PAYMENT TO:
|
|
|
|
Dean E. Fear, CPA
|
|
Office of Internal Audits
|
|
c/o Case Western Reserve University
|
|
10900 Euclid Avenue, Baker 120
|
|
Cleveland, OH 44106-7007
|
|
|
|
For additional information:
|
|
|
|
Ron Moritz
|
|
CWRU/ISSA CSD Symposium Chair
|
|
by telephone: (216) 368-6643
|
|
by facsimile: (216) 368-5466
|
|
by e-mail: rxm8@po.cwru.edu
|
|
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Security, Electronic Commerce, and the Internet:
|
|
Impact on Industry
|
|
|
|
CWRU & ISSA North Coast Chapter
|
|
International Computer Security Day Symposium Agenda
|
|
Thursday, November 30, 1995
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
8:00 - 8:30 Registration & Continental Breakfast (Thwing
|
|
Student Center, Ballroom)
|
|
8:30 - 8:35 Opening Welcome - Mr. Ron Moritz, CWRU/ISSA CSD
|
|
Symposium Chair
|
|
8:35 - 8:45 CWRU Welcome
|
|
8:45 - 9:00 Dr. Raymond K. Neff, Vice President for
|
|
Information Services, CWRU
|
|
9:00 - 9:45 Mr. John Gage, Director, Science Office, Sun
|
|
Microsystems Computer Corporation
|
|
9:45 - 10:30 Mr. Daniel E. White, Partner, Ernst & Young LLP
|
|
10:30 - 11:00 Stretch Break / Vendor Room Open
|
|
11:00 - 12:00 Dr. Frederick B. Cohen, Ph.D., President,
|
|
Management Analytics
|
|
12:00 - 2:00 Lunch (Sammy's Catering, Grand Foyer, Severance
|
|
Hall)
|
|
1:00 - 1:45 Lunch Panel Discussion Moderated by Mr. John Gage
|
|
(Grand Foyer, Severance Hall)
|
|
2:00 - 2:45 Dr. Vijay Ahuja, Product Manager, Network Security
|
|
Products, IBM
|
|
2:45 - 3:30 Dr. Erik Grimmelmann, Marketing Vice President,
|
|
AT&T Gateway Services
|
|
3:30 - 3:45 Stretch Break / Vendor Room Open
|
|
3:45 - 4:30 Mr. Leo A. McCloskey, networkMCI Consulting Group,
|
|
MCI Telecommunications
|
|
4:30 - 4:35 Closing Remarks - Mr. Ron Moritz, CWRU/ISSA CSD
|
|
Symposium Chair
|
|
4:35 - 5:00 Vendor Room Open
|
|
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Security, Electronic Commerce, and the Internet:
|
|
Impact on Industry
|
|
|
|
CWRU & ISSA North Coast Chapter
|
|
International Computer Security Day Symposium Speakers
|
|
Thursday, November 30, 1995
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
Dr. Vijay Ahuja, IBM
|
|
|
|
Vijay Ahuja holds Master's and Doctoral degrees in Computer Science
|
|
from the University of North Carolina. He has worked with IBM in
|
|
various positions, related to data communications, networking and
|
|
networking architecture. He is currently the Product Manager for
|
|
Network Security Products in the Network Software Division of IBM.
|
|
Dr. Ahuja has product responsibility as well as responsibilities
|
|
relating to IBM direction for security related products. He has
|
|
written several papers on networking, and has authored a text book
|
|
on Data Network published by McGraw-Hill. Dr. Ahuja has spoken on
|
|
network security, single signon, firewalls, NetSP and DCE and how
|
|
they all fit together. He will talk about Internet security and
|
|
secure commerce on the Internet. In addition, he will discuss
|
|
security issues for the Internet and describe the technologies to
|
|
address them.
|
|
|
|
|
|
Dr. Frederick B. Cohen, Ph.D., Management Analytics
|
|
|
|
Frederick B. Cohen is world renowned for his ground breaking work
|
|
on information systems and networks. He has authored over 50
|
|
scientific articles and several widely read books, and in 1989, he
|
|
won the prestigious international Information Technology Award for
|
|
his work. As a nationally recognized authority on information
|
|
infrastructure, he regularly provides consulting services for top
|
|
management. His clients include many Fortune 500 companies,
|
|
government agencies, universities, and other organizations. He has
|
|
participated in studies ranging from designing the next generation
|
|
of cable television and telephone systems, to securing global
|
|
financial institutions as they attach to the National Information
|
|
Infrastructure. Dr. Cohen will discuss the why and how of
|
|
organizational information protection by describing dependencies on
|
|
information and information systems, exploring modern risks
|
|
associated with these dependencies, discussing causes of
|
|
protection-related failures and motivation behind malicious attacks
|
|
on information technology, and suggesting ways organizations can
|
|
meet the challenges.
|
|
|
|
|
|
Mr. John Gage, Sun Microsystems Computer Corporation
|
|
|
|
John Gage works for Bill Joy, the Chief Technical Officer of Sun,
|
|
and is responsible for Sun's relationships with the world
|
|
scientific and public policy communities, international scientific
|
|
institutions and groups developing new forms of scientific research
|
|
involving computing. He is on the scientific and advisory panels
|
|
of the United States National Science Foundation, the US Congress
|
|
Office of Technology Assessment, the European Institute of
|
|
Technology and the United States National Academy of Sciences. He
|
|
has recently been appointed to the US National Research Council
|
|
Mathematical Sciences Education Board. He attended the Harvard
|
|
Business School and the Harvard Graduate School of Public Policy.
|
|
He did doctoral work in economics and mathematics at the University
|
|
of Berkeley at the same time as Bill Joy. Gage subsequently left
|
|
Berkeley with Joy to start Sun in 1982.
|
|
|
|
|
|
Dr. Erik K. Grimmelmann, AT&T Gateway Services
|
|
|
|
Erik K. Grimmelmann is Marketing Vice President, Gateway Services
|
|
with the AT&T Communications Services Group. He has product
|
|
management and marketing responsibilities both for the AT&T NetWare
|
|
Connect Service and for directory and security services for AT&T's
|
|
Internet and On-Line Services. He was one of the architects and
|
|
early implementors of the strategy of using the AT&T network as an
|
|
applications hosting environment. As part of that effort, he
|
|
helped craft the agreements with Lotus and Novell that led to the
|
|
AT&T Network Notes and AT&T NetWare Connect Services offerings.
|
|
Dr. Grimmelmann joined AT&T Bell Laboratories in 1978 as a
|
|
post-doctoral research fellow in the Environmental Chemistry
|
|
Research Department in Murray Hill. In 1979 he left the Research
|
|
Area for systems engineering where his first assignment was
|
|
performing economic analyses of the impacts of the then potential
|
|
divestiture of AT&T. Over the next nine years in Bell Labs, he had
|
|
such diverse positions as Supervisor of the Nuclear Weapons Effects
|
|
Group and Head of the Air Traffic Control Systems Department. In
|
|
1989 he joined AT&T Computer Systems where he was product manager
|
|
of the AT&T Rhapsody System, the first groupware offering that
|
|
included workflow automation. While at AT&T Computer Systems he
|
|
also had responsibility for AT&T's LAN and PC-based messaging
|
|
software. When AT&T and NCR merged in 1991, he joined AT&T
|
|
Business Communications Services, focusing on the Internet and on
|
|
developing and implementing initiatives related to creating a "new"
|
|
National Information Infrastructure (NII). He also participated in
|
|
joint government/industry efforts to develop a national industrial
|
|
policy for information infrastructure. Dr. Grimmelmann's Internet
|
|
related activities include serving as Principal Investigator for
|
|
AT&T's Cooperative Agreement with the National Science Foundation
|
|
to provide InterNIC Directory and Database Services for users of
|
|
the Internet from the research and education communities. Dr.
|
|
Grimmelmann holds a Ph.D. and M.S. from The University of Michigan
|
|
and a B.A. from Haverford College.
|
|
|
|
|
|
Mr. Leo A. McCloskey, MCI Telecommunications Corporation
|
|
|
|
Leo A. McCloskey is an Internet and electronic commerce expert for
|
|
the networkMCI Consulting Group of MCI Telecommunications
|
|
Corporation. His areas of specialization concern process and
|
|
information management as they relate to electronic media, mainly
|
|
the Internet. He has a background in International Studies as well
|
|
as publishing and data systems. His time is mainly occupied with
|
|
customer presentations and application design for networkMCI
|
|
customers.
|
|
|
|
|
|
Mr. Daniel E. White, Ernst & Young LLP
|
|
|
|
Daniel (Dan) E. White is an Ernst & Young Partner in Chicago and
|
|
National Director of the Information Security Effectiveness Series
|
|
of services. His focus of expertise is in the areas of information
|
|
security and overall system controls from both a business
|
|
application and data center perspective. Dan also focuses on
|
|
business continuity planning from both the overall corporate as
|
|
well as the computing and communications perspectives. He is a
|
|
frequent speaker on these subjects at both national and
|
|
international meetings and has an MBA and BBA from Loyola
|
|
University in Chicago. Dan will be discussing the Third Annual
|
|
Ernst & Young / InformationWeek Information Security Survey.
|
|
--
|
|
Ron Moritz, CISA, CISSP / Associate Director for Information Technology
|
|
Office of Internal Audits & Management Advisory Services
|
|
Case Western Reserve University / Cleveland, Ohio 44106-7007
|
|
e-mail: 'rxm8@po.CWRU.Edu' / (216) 368-6643 / Fax: (216) 368-5466
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 03 Nov 1995 21:23:11 -0500
|
|
From: Peter Grimes <p34d3611@jhu.edu>
|
|
Subject: File 3--Call for Papers (fwd)
|
|
|
|
--- fwd ---
|
|
|
|
Date--Fri, 3 Nov 1995 09:23:47 -0500
|
|
From--Carl H.A. Dassbach <dassbach@mtu.edu>
|
|
|
|
|
|
Theme: The Internet and Social Change
|
|
Where: 91st Annual Meeting of the American Sociological Association
|
|
New York City, August 16-20, 1996.
|
|
|
|
Papers are being solicited for a session or sessions on the theme "The
|
|
Internet and Social Change." The theme is loosely defined in order to
|
|
accommodate all types of concerns and perspectives on the Internet and its
|
|
social impact.
|
|
|
|
Papers will be reprinted in a special issue of the Electronic Journal of
|
|
Sociology and possibly an edited volume.
|
|
|
|
Send abstracts, proposals or completed papers to Carl H.A. Dassbach at the
|
|
address below.
|
|
-----------------------------------------------------------------
|
|
Carl H.A. Dassbach E-mail: DASSBACH@MTU.EDU
|
|
Dept. of Social Sciences Phone: (906)487-2115
|
|
Michigan Technological University Fax: (906)487-2468
|
|
Houghton, MI 49931 USA
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 30 Oct 1995 17:51:48 cst
|
|
Subject: File 4--ART Technology to be included in Frontier's browser
|
|
|
|
Hello!
|
|
|
|
Frontier Technologies will be releasing this information on Business
|
|
Wire first thing Monday morning, Oct.30. However, both Ann and I
|
|
wanted you to have heads-up on this information. We will be
|
|
demonstrating this new technology at Internetworld in Boston, Oct. 30 -
|
|
Nov. 1 (booth # 564). If you are interested, and you would like an
|
|
interview, feel free to contact either one of us to arrange a time.
|
|
|
|
Best regards,
|
|
Ann M. Krauss
|
|
Marketing Communications Manager
|
|
520-797-0583
|
|
Ann@Frontiertech.com
|
|
|
|
|
|
Nicole E. Rogers
|
|
Public Relations Specialist
|
|
414-241-4555 ext.293
|
|
NicoleR@Frontiertech.com
|
|
|
|
|
|
|
|
News - For Immediate Release
|
|
Contacts:
|
|
Ann M. Krauss
|
|
Nicole E. Rogers
|
|
|
|
Johnson-Grace Contacts:
|
|
Cherie Ciotti-Roco
|
|
CCiotti-Roco@jgc.com
|
|
Geoff LeBlond
|
|
LeBlond@jgc.com
|
|
714-759-0700
|
|
|
|
Frontier Technologies Leads The Pack In Supporting New Internet Graphic
|
|
& Sound Compression Technology
|
|
Johnson-Grace's High speed publishing technology to be integrated into
|
|
Frontier's Internet Browser
|
|
|
|
MEQUON, WI -- October 30, 1995 -- Frontier Technologies Corporation, an
|
|
industry leader in Internet technology, and Johnson-Grace Company
|
|
announced that Frontier Technologies' award-winning Internet browser
|
|
now supports Johnson-Grace's ART 2.0 (TM) file compression technology.
|
|
|
|
ART technology compresses graphic images and sound into one file,
|
|
allowing users to rapidly download files over even slow Internet
|
|
connections, and simultaneously display graphics and play back sound as
|
|
the file downloads. Users of Frontier's ART-enabled Internet browser
|
|
will be able to download sound and graphic files three times faster
|
|
than with ordinary browsers and will be able to simultaneously hear
|
|
broadcast-quality sound. For example, a 24KB .BMP file and a 335KB
|
|
.WAV file can compress into a 14KB .ART file.
|
|
|
|
A beta version of Frontier's new ART-enabled Internet browser is
|
|
available for immediate download from http://www.frontiertech.com.
|
|
Frontier has also set up an "ART Gallery" on its web site, including
|
|
several ART files. The ART Gallery provides links to several other
|
|
Internet sites containing ART files, including the electronic Gourmet
|
|
Guide, iGOLF, and LAN Magazine. Web page designers wishing to embed
|
|
ART files in their own HTML documents can download Johnson-Grace's ART
|
|
Press (TM) authoring tool from both the Frontier and Johnson-Grace web
|
|
sites.
|
|
|
|
Internet users wishing to experience the new ART Technology may access
|
|
several World Wide Web sites after downloading Frontier's new Internet
|
|
browser. The electronic Gourmet Guide, Inc. ("the eGG")
|
|
(http://www.2way.com/food/egg) iGOLF (http://wwwigolf.com), and LAN
|
|
Magazine (http://www.lanmag.com)are among the first World Wide Web
|
|
sites to provide ART images and sound.
|
|
|
|
Frontier and Johnson-Grace will be presenting the new ART technology in
|
|
special demonstration at Internet World on October 30 - November 1.
|
|
The demonstrations will take place at Frontier's booth (# 564).
|
|
|
|
If you would like more information, please feel free to call or email
|
|
Ann or Nicole.
|
|
|
|
|
|
|
|
****************************************************
|
|
Nicole Rogers
|
|
Frontier Technologies Corporation
|
|
10201 N. Port Washington Road
|
|
Mequon, WI 53092
|
|
E-Mail: NicoleR@FrontierTech.Com
|
|
****************************************************
|
|
|
|
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 31 Oct 1995 06:40:23 GMT
|
|
From: davet@Riddler.COM
|
|
Subject: File 5--Riddler is looking for home pages...
|
|
|
|
|
|
On Friday 8/18/95, Interactive Imaginations launched a completely
|
|
new version of Riddler. The game, now called Quibbler, is a free
|
|
contest that gives people on the Web the opportunity to win cash
|
|
prizes by solving a variety of riddles and puzzles. The game is
|
|
accessible via www.riddler.com.
|
|
|
|
We are looking for home pages to hide some of the clues that are
|
|
needed to solve the riddles, and believe your page would be ideal.
|
|
Your site will be seamlessly integrated into a specific game. For
|
|
example, if we were to hide a clue on the Stephen King home page,
|
|
contestants would get a hint leading them to that page. To facilitate
|
|
the player's search, Infoseek and Yahoo will be incorporated locally
|
|
on our site.
|
|
|
|
Upon figuring out that the page in question was the Stephen King
|
|
page, contestants would locate that page on the Web and find one of
|
|
four clues needed to solve the main riddle.
|
|
|
|
Since your participation is also free, the benefits of your
|
|
participation are tremendous. Since a link to our game can be
|
|
maintained for a duration, you will have the opportunity to promote
|
|
the subject of your page to all participants of our game. In
|
|
addition, you will have an opportunity to participate in the up and
|
|
coming Riddler Network events such as the much-anticipated Riddler's
|
|
Choice 10K race around the web. Remember, there is absolutely no cost
|
|
to you or the players.
|
|
|
|
If you are interested in participating in an upcoming game or have
|
|
questions or want more information about the game, please respond to
|
|
davet@riddler.com.
|
|
|
|
In your response e-mail please include the following information for
|
|
scheduling purposes:
|
|
|
|
**********************************************************************
|
|
|
|
URL of your Home Page to be used:
|
|
|
|
Name of page:
|
|
|
|
Contact Name:
|
|
|
|
Company Name (if any):
|
|
|
|
Work Phone #: (for scheduling /emergencies)
|
|
|
|
Home Phone #: (for scheduling /emergencies)
|
|
|
|
E-mail Address:
|
|
|
|
Your State or Country: (so I know the time zone differences)
|
|
|
|
What key words can one use to search for your site, along with the
|
|
search engine to be used. For example: Riddler Network- yahoo,
|
|
Interactive Games - Infoseek.
|
|
|
|
When is the best time to reach you? (very important)
|
|
|
|
Do you have other pages with direct links through search engines?
|
|
If so, please provide the URL's and keywords which would locate them
|
|
directly via a search engine.
|
|
|
|
**********************************************************************
|
|
|
|
Again, if you have any questions or concerns, please feel free to
|
|
contact me.
|
|
|
|
Looking forward to your participation,
|
|
|
|
David Tom
|
|
|
|
Interactive Imaginations
|
|
davet@riddler.com
|
|
212-598-9455
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 5 Nov 1995 20:21:24 -0800
|
|
From: Chris Kerchum <ckerchum@habit.com>
|
|
Subject: File 6--Re: Web Site Ratings (fwd)
|
|
|
|
Thought this article might interest you, since it seems to be an answer to
|
|
having the cybergardians breathing down ones neck. Since it's not my
|
|
article, you probably have to get permission to publish from the Internet
|
|
Filtering Systems. Well worth the trouble though.
|
|
|
|
> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
>
|
|
> FOR IMMEDIATE RELEASE
|
|
>
|
|
> Contact: Ron Warris, President, Internet Filtering Systems, Inc.
|
|
> phone: 1-403-258-5804, email: warrisr@colt.t8000.com
|
|
> Web: www.tenagra.com/ifsi
|
|
>
|
|
> DEMOCRATIC WORLD-WIDE WEB SELF-REGULATION ANNOUNCED
|
|
>
|
|
> CALGARY, ALBERTA, CANADA -- October 30, 1995 -- Internet Filtering
|
|
> Systems, Inc. (IFSI) today announced Net Shepherd, the first product
|
|
> designed to democratically rate and filter World Wide Web sites and
|
|
> selectively supervise access.
|
|
>
|
|
> Net Shepherd is the first PICS-compliant rating and filtering
|
|
> solution. Under the auspices of The World Wide Web Consortium, PICS
|
|
> (Platform for Internet Content Selection) is a cross-industry working
|
|
> group whose goal is to facilitate the development of technologies to
|
|
> give users control over the kinds of material to which they and their
|
|
> children have access.
|
|
>
|
|
> According to Ron Warris, president of IFSI, "There are a number of
|
|
> companies offering filtering solutions. What is really needed is a
|
|
> rating solution. How do you go about reviewing and rating 8.5 million
|
|
> volatile documents on the Internet? Our approach will allow the people
|
|
> who surf the Internet to be the people who rate the Internet. With Net
|
|
> Shepherd, parents, educators and other concerned organizations will be
|
|
> able to voluntarily participate in the rating process.
|
|
>
|
|
> Mr. Warris continues, "Net Shepherd will also provide parents with the
|
|
> ability to selectively filter documents viewed by their
|
|
> children. Parents can choose from a variety of rating databases that
|
|
> represent the accumulated ratings from others who hold similar views
|
|
> and philosophies. Organizations that wish to create rating databases
|
|
> for their subscribers will also be able to use Net Shepherd. You'll be
|
|
> able to subscribe to the Good Housekeeping database or the Lutheran
|
|
> Church database or the ACLU database. Take your pick.
|
|
>
|
|
> "The Internet has always been self-regulating and
|
|
> special-interest-group oriented. Now the World Wide Web can be as
|
|
> well."
|
|
>
|
|
> IFSI's mission is to become the preferred and premier provider of
|
|
> Internet rating systems and services for individual consumers,
|
|
> concerned groups and associations, as well as other filter software
|
|
> developers. A World-Wide Web site currently contains basic information
|
|
> about IFSI, and will evolve over the coming weeks into an extensive
|
|
> resource for those interested in Internet content filtering. It is
|
|
> located at URL http://www.tenagra.com/ifsi/.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 2 Nov 1995 15:00:32 -0500 (EST)
|
|
From: John <john@SUG.ORG>
|
|
Subject: File 7--Last Chance to register for "Computers & the Law II"
|
|
|
|
THE REGISTRATION DEADLINE IS FAST APPROACHING! REGISTER TODAY!
|
|
|
|
|
|
SUN USER GROUP
|
|
Second Annual Technical Symposium
|
|
"Computers & The Law"
|
|
November 12-15, 1995
|
|
Tampa, FL
|
|
|
|
|
|
|
|
As computers are utilized in more and more aspects of everyday life,
|
|
the once distinct areas of technology, legislature, and law
|
|
enforcement draw closer together. This unique technical conference
|
|
provides a forum in which members of these three fields can meet to
|
|
share experiences and ideas. The four day technical program (a day of
|
|
tutorials, two days of talks, and another day of tutorials) will
|
|
provide you with essential knowledge, whether your field is technical,
|
|
legal, or law enforcement.
|
|
|
|
Copies of this information are available via email at
|
|
conference@sug.org or on the World Wide Web at http://sug.org.
|
|
|
|
If you have further questions, contact the Sun User Group at
|
|
(617)232-0514.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 7 Nov 1995 14:31:10 -0500
|
|
From: Galkin@AOL.COM
|
|
Subject: File 8--The Computer Law Report (Nov 6, 1995: #13)
|
|
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
THE COMPUTER LAW REPORT
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
November 6, 1995 [#13]
|
|
|
|
=====================================
|
|
GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
|
|
free and is prepared by William S. Galkin, Esq. The Report is designed
|
|
specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
|
|
All information contained in The Computer Law Report is for the benefit of
|
|
the recipients, and should not be relied on or considered as legal advice.
|
|
Copyright 1995 by William S. Galkin.
|
|
=====================================
|
|
ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
|
|
Mills, Maryland (which is a suburb of Baltimore), and he is also an adjunct
|
|
professor of Computer Law at the University of Maryland School of Law. Mr.
|
|
Galkin has concentrated his private practice in the Computer Law area since
|
|
1986. He represents small startup, midsized and large companies, across the
|
|
U.S. and internationally, dealing with a wide range of legal issues
|
|
associated with computers and technology, such as developing, marketing and
|
|
protecting software, purchasing and selling complex computer systems, and
|
|
launching and operating a variety of online business ventures. He also enjoys
|
|
writing about computer law issues!
|
|
|
|
===> Mr. Galkin is available for consultation with individuals and companies,
|
|
wherever located, and can be reached as follows: E-MAIL:
|
|
galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
|
|
Circle, Suite 400, Owings Mills, Maryland 21117
|
|
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
Articles in The Report are available to be published as columns in both print
|
|
and electronic publications. Please contact Mr. Galkin for the terms of such
|
|
usage.
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
JUMPING THE GUN ON SYSOP LIABILITY
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
|
|
[This is the third of a series of articles discussing recommendations made in
|
|
the report issued September 5, 1995 by President Clinton's Information
|
|
Infrastructure Task Force. The report is entitled "Intellectual Property and
|
|
the National Information Infrastructure (NII)," and is commonly referred to
|
|
as the White Paper.]
|
|
|
|
The White Paper makes various recommendations for legislative changes which
|
|
it hopes will grease the onramps to the Information Highway. Besides these
|
|
overt recommendations, the White Paper also expends considerable effort to
|
|
analyze the current state of the law.
|
|
|
|
This analysis of the current state of the law, though presented as objective,
|
|
often represents the Administration's desired interpretation of legal issues
|
|
that are as yet unsettled in the courts. In presenting this analysis, the
|
|
Administration hopes that its interpretations will be adopted by the courts,
|
|
and affect the outcomes of some cases currently pending.
|
|
|
|
One area where the White Paper's analysis rises to the level of
|
|
"recommendation" relates to whether a sysop or online provider should be held
|
|
liable for unknowingly facilitating the distribution of materials that
|
|
infringe someone's copyright. This infringment occurs when users of the
|
|
system upload and download material without permission from the copyright
|
|
holder.
|
|
|
|
Where such infringement is occurring, the online operator, theoretically,
|
|
could be found liable for direct infringement, vicarious infringement, or
|
|
contributory infringement. Or, the online operator could also be found not
|
|
liable at all.
|
|
|
|
Direct infringement is where the defendant directly causes the infringement
|
|
to occur. The court in Playboy Enterprises Inc. v. Frena found the BBS
|
|
operator to be directly liable for the display and distribution of Playboy
|
|
photographs, which were uploaded and downloaded by subscribers, without the
|
|
knowledge of the operator. If direct infringement is found, then there is
|
|
strict liability. That means that there will be liability even where the
|
|
"infringer-operator" had no knowledge that the infringement was occurring.
|
|
|
|
Vicarious infringement would occur where someone has the "right and ability"
|
|
to supervise the infringing action of another, even though the supervisor has
|
|
no knowledge of the infringement. Accordingly, an operator could be found to
|
|
be vicariously liable if a court determines that it has the right and ability
|
|
to supervise the activities of the users.
|
|
|
|
Contributory infringement may be found when one who, with knowledge of the
|
|
infringing activity, contributes to the infringing conduct of another. An
|
|
online operator could be found to be a contributory infringer based on the
|
|
provision of online services and equipment facilitating the direct
|
|
infringement of the users.
|
|
|
|
Although the Playboy case found the operator to be directly liable for the
|
|
infringement, the type of liability, or whether there would even be
|
|
liability, is currently an unsettled and unclear issue. However, the White
|
|
Paper gives the impression that this issue is settled and that operators will
|
|
be directly infringing when subscribers upload and download copyrighted
|
|
material without their knowledge. The White Paper states affirmatively that
|
|
"[a]ltering the standards of liability for infringement [for online
|
|
operators] would be a significant departure from current copyright principles
|
|
and law and would result in a substantial derogation of the right of
|
|
copyright owners."
|
|
|
|
Taking the position that operators will be held to be direct infringers, the
|
|
White Paper dismisses the following arguments in favor holding operators to a
|
|
different standard than others: (1) the volume of material on a service
|
|
provider's system is too large to monitor or screen; (2) even if a service
|
|
provider is willing and able to monitor the material on its system, it cannot
|
|
always identify infringing material; (3) failure to shield online service
|
|
providers will impair communication and availability of information; (4)
|
|
exposure to liability for infringement will drive service providers out of
|
|
business, causing the NII to fail; and (5) the law should impose liability
|
|
only on those who assume responsibility for the activities their subscribers
|
|
engage in on their system, and not on operators who allow the system to
|
|
operate without content supervision.
|
|
|
|
The position that the White Paper promotes, that operators should be strictly
|
|
liable as direct infringers for the uploading and downloading of copyrighted
|
|
material, as mentioned, is currently unsettled. By assuming this position,
|
|
the Administration has been viewed as seeking to influence the following
|
|
currently pending cases to adopt this position. In one (Sega Enterprises
|
|
Ltd. v. MAPHIA), the court issued a preliminary injunction against a BBS for
|
|
allowing and facilitating the unauthorized uploading of Sega's copyrighted
|
|
video games. In a second case (Frank Music Corp. v. CompuServe), CompuServe
|
|
is being sued for allegedly allowing the unauthorized uploading and
|
|
downloading of musical recordings. In third case (Religious Technology Center
|
|
v. NETCOM), the Church of Scientology is suing a BBS operator and an Internet
|
|
access provide for allowing the unauthorized uploading of copyrighted
|
|
materials.
|
|
|
|
In situations where an operator is truly innocent regarding infringement
|
|
resulting from the uploading and downloading of copyrighted material, law
|
|
makers have to determine who should bear the responsibility for and loss of
|
|
this infringement: the copyright holders, the online operators or the users
|
|
committing the infringement. The position that the White Paper promotes
|
|
sides with the copyright holder in the sense that it places the burden on
|
|
those other than the copyright holder to expend time and effort to protect
|
|
the copyright holder's interests.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 5 Nov 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.88
|
|
************************************
|
|
|