1014 lines
41 KiB
Plaintext
1014 lines
41 KiB
Plaintext
|
|
Computer underground Digest Sun Feb 2, 1997 Volume 9 : Issue 06
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.06 (Sun, Feb 2, 1997)
|
|
File 1--USR's little booboo (fwd)
|
|
File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
|
|
File 3--InfoWarCon6 - Brussels, Belgium (fwd)
|
|
File 4--Call for papers: 6CYBERCONF
|
|
File 5--DC-ISOC Tidbits
|
|
File 6--"DNS and BIND," and "Mastering Regular Expressions"
|
|
File 7--"The Basics of Computer Security" by Bellcore
|
|
File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 7 Jan 1997 00:15:18 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: File 1--USR's little booboo (fwd)
|
|
|
|
From -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 6 Jan 1997 18:55:35 -0600 (CST)
|
|
From--Brett L. Hawn <blh@nol.net>
|
|
|
|
56-kbps modem? Not quite
|
|
By Jim Davis
|
|
January 2, 1997, 5:30 p.m. PT
|
|
|
|
U.S. Robotics (USRX), which has been leading the push for 56-kbps
|
|
modem technology, has conducted preliminary tests showing that
|
|
most consumers will be able to connect at higher speeds than with
|
|
current modems--but not at the full 56 kbps.
|
|
|
|
The company said the maximum downstream transmission speed will
|
|
be limited to 53 kbps, not the 56 kbps originally promised.
|
|
Federal Communications Commission regulations "limit the signal
|
|
level" that digitally connected server equipment can transmit,
|
|
the firm said.
|
|
|
|
U.S. Robotics' x2 technology overcomes the speed limits of
|
|
current 28.8-kbps modems based on the ISP having a direct
|
|
connection to telephone companies' digital switches.
|
|
|
|
The company said today that tests showed that "the vast majority"
|
|
of users would be able to use x2 technology, while its modems
|
|
would automatically default to lower speeds if such connections
|
|
weren't possible. The test results were based on over 20,000
|
|
calls in seven Bell operating company regions, the firm said.
|
|
|
|
U.S. Robotics says it is in beta testing of its products and
|
|
expects to start shipping initial consumer products later this
|
|
month.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 13 Jan 1997 09:29:28 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
|
|
|
|
From -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Fri, 10 Jan 1997 19:01:26 -0500
|
|
From--"David M. Balenson" <balenson@tis.com>
|
|
|
|
PLEASE NOTE THE EARLY REGISTRATION AND HOTEL ROOM AVAILABILITY AND SPECIAL
|
|
RATES DEADLINES ARE APPROACHING!! RESERVATIONS AT THE PRINCESS RESORT
|
|
MUST BE MADE NO LATER THAN JAN 13TH FOR THE GOVERNMENT RATE, AND NO LATER
|
|
THAN JAN 20TH FOR THE REDUCED GROUP RATE. EARLY REGISTRATION FOR THE
|
|
SYMPOSIUM MUST BE POSTMARKED NO LATER THAN JAN 22ND.
|
|
|
|
--------------------------------------------------------
|
|
|
|
THE INTERNET SOCIETY 1997 SYMPOSIUM ON
|
|
NETWORK AND DISTRIBUTED SYSTEM SECURITY
|
|
(NDSS '97)
|
|
|
|
10-11 FEBRUARY 1997
|
|
|
|
SAN DIEGO PRINCESS RESORT, SAN DIEGO, CALIFORNIA
|
|
|
|
|
|
This fourth annual symposium will bring together researchers,
|
|
implementors, and users of network and distributed system security
|
|
technologies to discuss today's important security issues and
|
|
challenges. It will provide a mix of technical papers and panel
|
|
presentations that describe promising new approaches to security
|
|
problems that are practical, and to the extent possible, have
|
|
been implemented. We hope to foster the exchange of technical
|
|
information and encourage the Internet community to deploy
|
|
available security technologies and develop new solutions to
|
|
unsolved problems.
|
|
|
|
WHY YOU SHOULD ATTEND
|
|
|
|
The use of the Internet is rapidly growing and expanding into
|
|
all aspects of our society. Commercial organizations are coming
|
|
under increasing pressure to make their services available on-line.
|
|
This in turn is increasing the need for rapid and widespread
|
|
deployment of usable and effective network and distributed system
|
|
security technologies. High visibility attacks on the Internet
|
|
underscore the vulnerabilities of the Internet and the need to
|
|
solve its security problems. There is growing concern for securing
|
|
the network infrastructure itself. Recent trends in software
|
|
distribution (such as Java and ActiveX technologies) have made
|
|
certain attacks easier to carry out. Privacy has become an
|
|
important issue for the Internet.
|
|
|
|
NDSS '97 will bring together researchers, implementors, and users
|
|
of network and distributed system technologies to discuss today's
|
|
important security issues and challenges. We have selected the
|
|
technical papers and panel presentations that describe promising
|
|
new approaches to security problems that are practical, and to
|
|
the extent possible, have been implemented. Topics to be addressed
|
|
include Internet infrastructure and routing security, security
|
|
for the World Wide Web, Java and ActiveX security, cryptographic
|
|
protocols, public key management, and protection of privacy.
|
|
|
|
The symposium will have a positive impact on the state of Internet
|
|
security. You will have the opportunity to actively participate
|
|
in the dialog. Ask questions of the speakers, raise your important
|
|
issues during the panel sessions, and let other participants know
|
|
of your requirements, observations, and experience in this
|
|
important area. We hope to encourage the wide-scale deployment
|
|
of security technologies and to promote new research that can
|
|
address the currently unmet security needs of the Internet
|
|
community.
|
|
|
|
<snip>
|
|
|
|
Additional information about the symposium and San Diego, plus
|
|
on-line registration, are available via the Web at:
|
|
|
|
http://www.isoc.org/conferences/ndss97
|
|
|
|
SPONSORSHIP OPPORTUNITIES AVAILABLE!
|
|
|
|
Contact Torryn Brazell at the Internet Society at +1-703-648-9888
|
|
or send E-mail to Ndss97reg@isoc.org.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 13 Jan 1997 08:47:48 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: File 3--InfoWarCon6 - Brussels, Belgium (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Sun, 12 Jan 1997 23:11:16 -0500
|
|
From--"Betty G. O'Hearn" <betty@infowar.com>
|
|
|
|
|
|
D I S T R I B U T E W I D E L Y
|
|
|
|
CONFERENCE ANNOUNCEMENT
|
|
|
|
InfoWarCon 6:
|
|
"War By Other Means"
|
|
Economic Espionage, CyberTerrorism and Information Assurance
|
|
Brussels, Belgium
|
|
|
|
May 8 - 9, 1997
|
|
Pre-Conference Tutorials: May 7, 1996
|
|
|
|
Sponsored by:
|
|
National Computer Security Association / www.ncsa.com
|
|
Winn Schwartau, Interpact, Inc. / www.infowar.com
|
|
Open Source Solutions, Inc, / www.oss.net
|
|
|
|
Honorary Chairperson:
|
|
Judge Danielle Cailloux
|
|
Investigating Magistrate,
|
|
Member of the Committee to Control the Intelligence Services, Belgium
|
|
|
|
Information Warfare is no longer just for the military or
|
|
government. InfoWar is a legitimate concern for the private
|
|
sector and law enforcement - everywhere. Hundreds of
|
|
representatives from over thirty countries will interact at
|
|
InfoWarCon 6 with world-class presenters in an open-source,
|
|
unclassified forum to provide workable, real-world solutions to
|
|
the commercial, legal and technical problems we face.
|
|
|
|
Over two days, the three tracks and plenary sessions will focus
|
|
on:
|
|
|
|
1. Military, Intelligence, Nation-States and Government
|
|
Contractors. What are their special needs and concerns. Leaders
|
|
from all areas will bring you current with their approaches.
|
|
|
|
2. Cyberterrorism and Crime: Law Enforcement, Domestic, National
|
|
and International. Case histories and experience from those who
|
|
know will provide the foundation for solutions and cooperation
|
|
to a spreading problem.
|
|
|
|
3. The Private Sector and Commercial Infrastructure: Leading
|
|
experts on information assurance will provide new models for
|
|
security, management and infrastructure protection.
|
|
|
|
|
|
Optional Pre-Conference Tutorials (May 7)
|
|
>
|
|
Three Pre-Conference tutorials will be offered to get the non-technical manager,
|
|
law enforcement or government representative 'up to speed' on InfoWar:
|
|
>
|
|
>A. Open Source Intelligence. Robert Steele, ex-CIA case officer and
|
|
intelligence professional, will teach you how and why the smart nation and
|
|
competitive private company needs to use information gathering to his best
|
|
advantage.
|
|
A full day of extraordinary information and materials.
|
|
>
|
|
B. Information Security Basics. Dr. Mich Kabay, NCSA's Dir. of Education will
|
|
take the non-technical manager on a three and one half hour tour of the
|
|
fundamentals of
|
|
information security. Essential knowledge for anyone involved with information
|
|
warfare, cyberterrorism or defending against them.
|
|
|
|
C. The Basics of Information Warfare and Cyberterrorism.Winn Schwartau, the man
|
|
who wrote the books on Cyber-terrorism and Information Warfare, will teach the
|
|
>non-technical participant the ins and outs in a fascinating 3 1/2 hour session.
|
|
|
|
|
|
>For Registration Information
|
|
> Kim Imler
|
|
> Voice: (717) 241-3226
|
|
> Fax: (717) 243-8642
|
|
> Email: kimler@ncsa.com
|
|
> WWW: www.Infowar.com
|
|
> www.ncsa.com
|
|
>
|
|
>Sponsorship Opportunities - Multiple level sponsorship
|
|
>opportunities and exhibit space is available. Contact:
|
|
> Harry Brittain
|
|
> Voice: (717) 241-3258
|
|
> Fax: (717) 243-8642
|
|
> Email: hbrittain@ncsa.com
|
|
>
|
|
>MARK YOUR CALENDARS:
|
|
>
|
|
>InfoWarCon 7,
|
|
>Sept. 11-12, 1997
|
|
>Washington D.C.
|
|
>Submit Abstracts and Papers to:
|
|
>Betty@infowar.com
|
|
|
|
DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT
|
|
in the subject line.
|
|
|
|
Subscribe infowar TO JOIN GROUP
|
|
Unsubscribe infowar TO LEAVE GROUP
|
|
Help infowar TO RECEIVE HELP
|
|
TO POST A MESSAGE: E-Mail to infowar@infowar.com
|
|
_____________________________________________________
|
|
Infowar.Com
|
|
Interpact, Inc.
|
|
Winn Schwartau
|
|
winn@infowar.com
|
|
http://www.infowar.com
|
|
813-393-6600 Voice
|
|
813-393-6361 FAX
|
|
|
|
Sponsor Opportunities/Comments/Help
|
|
|
|
Betty G. O'Hearn
|
|
Assistant to Winn Schwartau
|
|
http://www.infowar.com
|
|
betty@infowar.com
|
|
813-367-7277 Voice
|
|
813-363-7277 FAX
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Betty G. O'Hearn Assistant to Winn Schwartau
|
|
http://www.infowar.com
|
|
betty@infowar.com
|
|
813-367-7277 Voice 813-363-7277 Data/FAX
|
|
|
|
"Success is to be measured not so much by the position that one has reached in
|
|
life as by the obstacles which he has overcome while trying to succeed.
|
|
~~~Booker T. Washington~~~
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 30 Jan 1997 18:05:13 -0600
|
|
From: " Monique J. Lemaitre" <tc0mjl1@corn.cso.niu.edu
|
|
Subject: File 4--Call for papers: 6CYBERCONF
|
|
|
|
Call for Papers:
|
|
6CYBERCONF
|
|
Sixth International Conference on Cyberspace
|
|
June 5th to 8th, 1997. University of Oslo
|
|
|
|
Website: http://televr.fou.telenor.no/cyberconf
|
|
|
|
We already live part-time in cyberspace, and that time is increasing as
|
|
fast as the quality of the experience is radically changing. The Sixth
|
|
International Conference on Cyberspace addresses the social, political and
|
|
cultural implications of cyberspace from a critical as well as
|
|
practical standpoint. In the nets, there is a growing society that ranges
|
|
from researchers to Silicon Valley sophisticates to neocyberpunks.
|
|
6CYBERCONF offers the opportunity for exchange within and between these
|
|
confluent and diverse interests and encourages discussion between
|
|
theoreticians and practitioners. Hosted for the second time in Europe, this
|
|
sixth edition of CYBERCONF considers: cyborgs looking for a home, the
|
|
future body, interface/interaction breakthroughs, and the importance of
|
|
collaboration in virtual environments.
|
|
|
|
CONFERENCE FORMAT
|
|
|
|
The official opening of 6CYBERCONF is scheduled for Thursday afternoon,
|
|
June 5th. The conference will take place over three and a half days. There
|
|
will be 6 keynote speakers, 15 plenary sessions, electronic art
|
|
installations, special events, a pre- conference workshop on immersive
|
|
environment design, and a banquet dinner on Saturday June 7th. All
|
|
sessions are designed to foster discussion. Presentations will be in
|
|
English. The themes are:
|
|
|
|
CYBERSPACE METAPHOR?
|
|
The cyberspace metaphor is a means of effecting instantaneous fusion of two
|
|
separate realms of experience (man/machine, good/bad, self/world) into one
|
|
illuminating, iconic, encapsulating image. Is the metaphor still a way to
|
|
proceed from the known to the unknown in cyberspace? Is the metaphor a
|
|
critical synthesis of complex communications technologies, bio-sociality or
|
|
techno-sociality? Is cyberspace a new metanarrative of progress, or a story
|
|
of paradise lost? Which language for the virtual age?
|
|
|
|
VIRTUAL SUBJECTS ON THE ROAD
|
|
A cyborg is a double articulation in which we find both the end of the
|
|
subject and a new dispersed and refracted subjectivity constructed in
|
|
cyberspace. The fabric of cyberspace dresses us in the cloth of
|
|
possibilities -the virtual subject as a switchboard of souls? Can we
|
|
really construct and reconstruct any identities and personalities? Will
|
|
not the "real" subject implode in its multiplicity? Or is it a question of
|
|
mastering ones avatar puppets on a global playground? Do we need
|
|
psychiatrists for avatars? Logged off, where does the will of the
|
|
cyberpersonality go?
|
|
|
|
HACKING THE FUTURE BODY
|
|
McLuhan argued that electronic media reintegrated the senses. How are
|
|
bodies represented through information technology? How can cyberspace give
|
|
priority to the lower senses? How is desire constructed through virtual
|
|
worlds? Are there darker domains of e-motional interference beyond the
|
|
emoticons? Is there a "violence of connectivity"? What about cybersex? Are
|
|
we masturbating our way into the year 2000? Will sexuality become a post-
|
|
biological phenomenon? Is the future body a recombinant structure of flesh
|
|
or schizoid realities?
|
|
|
|
ZONES / INTER-ACTION
|
|
i) INTER-FACE is the sensitive boundary zone of negotiation between human
|
|
and machine, allowing seamless crossings between the worlds: Facilitating
|
|
the disappearance of the difference between them - emerging new set of
|
|
human/machine relations - interweaving calculation, simulation and
|
|
post-modern culture. How can we design for tacit knowledge and bricolage?
|
|
How can we account for differing incentive structures between designers and
|
|
users? Which concealed design codes promote or dissemble functionality?
|
|
How to extend the interface into social/material space, transforming it
|
|
into an environmental power? Away from the daily prayer at the desktop,
|
|
when technology becomes transparent and disappears, where will it take us?
|
|
ii) The rapid development of Internet and WWW have limited the definition
|
|
of INTER-ACTION as the click of the mouse. How can interaction become a
|
|
mutual and simultaneous activity on the part of the participants
|
|
(man-machine-man interaction) in art and education? If the computer adds
|
|
an interference to communication, how can it be used creatively? What is
|
|
interaction beyond the Web?
|
|
|
|
LABORATORIES FOR COLLABORATION
|
|
Many of us are today involved in group interaction through
|
|
telecommunication networks. In the future the 2D interface of the web will
|
|
shift to 3D interactive interfaces. How will this affect the way we
|
|
perceive our collaborators and our usage of information? Will it be a
|
|
preferred medium to social interaction - opening up new possibilities
|
|
within a group, organisation or community?
|
|
|
|
INCLUSION - EXCLUSION
|
|
What about the politics of networks? Which impact will commerce have on the
|
|
the internet community? How will the powerstructures of the internet
|
|
affect the behaviour of netizens? What about the diversity of cyberspace
|
|
cultures? What is "freedom of speech" in a global context?
|
|
|
|
CALL FOR PAPER ABSTRACTS
|
|
|
|
To submit an abstract for the potential inclusion of your paper in the
|
|
6CYBERCONF programme, please follow these format guidelines:
|
|
|
|
=B7 Title of the paper
|
|
=B7 Author(s)
|
|
=B7 Institutional affiliation (if any)
|
|
=B7 Chosen 6CYBERCONF theme (from the list above)
|
|
=B7 Abstract, 500 words maximum
|
|
=B7 Brief biography, 100 words maximum
|
|
=B7 Audio-visual equipment requirements
|
|
=B7 Contact information (email preferred)
|
|
|
|
There are two ways to submit abstracts:=20
|
|
1) Email with the subject topic to abstracts@televr.fou.telenor.no or=20
|
|
2) mail both a printed copy and a PC or MAC diskette to: 6CYBERCONF/ Morten
|
|
Soby, University of Oslo, P.O. Box 1092, Blindern, 0317 Oslo, Norway.
|
|
|
|
The selection will be done by an international and a local committee made
|
|
up of academics, theorists, artists and technicians in the field.
|
|
|
|
Submission of an abstract indicates the submitter's intention and
|
|
capability to write and present the corresponding, full length paper, if
|
|
chosen.=20
|
|
|
|
Papers will be allotted a half hour for presentation in English.
|
|
|
|
Please be advised that the selection committees will not consider abstracts
|
|
that are not formatted as stated above nor papers that have been previously
|
|
published.
|
|
|
|
All abstracts and papers will be published in the proceedings (paper and
|
|
Web-edition).
|
|
|
|
DEADLINES
|
|
|
|
Deadline for reception of abstracts: March 15, 1996
|
|
Notification of selection for presentation: April 15, 1996
|
|
Deadline for registration: May 1, 1996
|
|
|
|
FINANCIAL ASSISTANCE
|
|
|
|
The registration fee will be waived for those presenting a paper in
|
|
6CYBERCONF. In addition, a limited number of grants are available to those
|
|
presenters who demonstrate financial need. These grants may cover the costs
|
|
of travel and accommodation.
|
|
|
|
FEES & REGISTRATION
|
|
|
|
The registration fee for attending 6CYBERCONF is US$ 250 (US$ 50 for
|
|
students). For detailed information on how to register and information on
|
|
travel and accommodation, check our Website or
|
|
mailto:info@televr.fou.telenor.no
|
|
|
|
LOCATION
|
|
|
|
6CYBERCONF will take place in an auditorium of the Helga Engs Building,
|
|
University of Oslo.
|
|
|
|
CONFIRMED KEYNOTE SPEAKERS
|
|
|
|
Arthur Kroker (Canada)
|
|
Marilouise Kroker (Canada)
|
|
Pierre Levy (France)
|
|
Allucquere Rosanne Stone (USA)
|
|
Florian Roetzer (Germany)
|
|
|
|
SPECIAL EVENTS
|
|
|
|
=B7 Immersive Environment Workshop: The pre-conference workshop will give a
|
|
limited number of participants a unique opportunity to get hands on
|
|
experience on how to design and develop and use a variety of immersive
|
|
systems. Both technical and social science related topics will be covered.
|
|
The workshop will be tutored by scientist researchers from Telenor R&D.
|
|
|
|
=B7 e~on exhibition - will focus on electronic art made in Norway, but will
|
|
include international participation as far the budget allows
|
|
|
|
=B7 Public panel debate (with key note speakers and special guest)
|
|
|
|
=B7 "Cyberdesign -97" presentation: the award winner of Telenor Research VR
|
|
design competition.
|
|
|
|
The list of keynote speakers and special events is preliminary; more to be
|
|
added. Please visit our Website for more information and updates on
|
|
6CYBERCONF.
|
|
|
|
ORGANIZERS
|
|
|
|
Cyberconf Director: Allucquere Rosanne Stone,
|
|
Professor and Director of the Interactive, Multimedia Laboratory at the
|
|
University of Texas at Austin
|
|
http://www.actlab.utexas.edu/~sandy
|
|
|
|
Conference Coordinator: Morten S=F8by,
|
|
Research Fellow, Institute for Educational Research, University of Oslo
|
|
Email: m.k.soby@ped.uio.no
|
|
http://www.uio.no/~mortenso/
|
|
Phone: + 47 22855383 Fax: + 47 22854250
|
|
|
|
Conference Coordinator: Ola =D8deg=E5rd,
|
|
Researcher, Manager of The Televirtuality Research Group at Telenor
|
|
Research and Development.
|
|
Phone: + 47 63848885 Fax: + 47 63810076
|
|
Email: ola.odegard@kjeller.fou.telenor.no
|
|
http://televr.fou.telenor.no/~olao/olao.html
|
|
|
|
Coordinator Interactive Installations: Stale Stenslie,
|
|
Artist and Reseacher, Telenor R&D, Cologne/Oslo.
|
|
Phone: + 47 90562963 Fax: +47 63810076
|
|
Email: stahl@rosa.nta.no
|
|
http://televr.fou.telenor.no/~stahl/stahl.html
|
|
|
|
FOR FURTHER INFORMATION
|
|
|
|
Send e-mail to: info@televr.fou.telenor.no
|
|
|
|
See the Web site for continuous updates:
|
|
http://televr.fou.telenor.no/cyberconf - or contact directly
|
|
|
|
Registration, Hotel booking, Flights:
|
|
Project secretary 6Cyberconf: May Krosby
|
|
Phone: + 47 638 48 341 =20
|
|
Fax. + 47 63 81 98 10
|
|
Email: may.krosby@kjeller.fou.telenor.no
|
|
http://televr.fou.telenor.no/cyberconf/
|
|
|
|
Abstracts, Papers, Information:
|
|
Conference Editor: Vibeke Kl=F8vstad
|
|
Phone: + 47 22426980 / 22426892#126
|
|
Email: vibeke.klovstad@kulturkanalen.no
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Research Fellow Morten Soby
|
|
Institute for Educational Research, P. O. Box 1092, Blindern, N-0317 Oslo
|
|
Phone: +47 22855383 Fax: + 47 22854250 Home: + 47 22952775 GSM: 926332=
|
|
18
|
|
Homepage: http://www.uio.no/~mortenso/
|
|
Coordinator 6CYBERCONF: http://televr.fou.telenor.no/cyberconf/
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 28 Jan 1997 09:19:26 -0400
|
|
From: Russ@NAVIGATORS.COM(Russ Haynal)
|
|
Subject: File 5--DC-ISOC Tidbits
|
|
|
|
Hello DC-ISOC,
|
|
|
|
I hope your New Year is off to a good start.
|
|
|
|
This message contains a couple of requests and a half-day conference
|
|
announcement that should be of interest to many of you...
|
|
|
|
Russ Haynal
|
|
|
|
=========================================================================
|
|
Want to go to CommNET ???
|
|
|
|
CommNET Is a large industry conference and trade show being held NEXT WEEK
|
|
in the Washington Convention Center. If you have never been able to make
|
|
it to CommNET, I am happy to provide you with just the excuse/opportunity
|
|
you need to attend this great show.
|
|
|
|
The Internet Society (ISOC) has been given a booth for the show. ISOC will
|
|
provide someone at all times to manage the booth. However, the Internet
|
|
Society is seeking additional volunteers to help staff the booth. A Key
|
|
responsibility would be to accept new member registrations. A Secondary
|
|
responsibility would be to answer questions and hand-out literature.
|
|
"Working the booth" is a great way to meet many people and share your
|
|
knowledge about the Internet/ISOC.
|
|
|
|
The Convention floor hours are 10-6 on February 4-6. Volunteers would only
|
|
have to work one (or more) 2-4 hour shifts.
|
|
|
|
Volunteers should be ISOC members, or people who will sign up as
|
|
members. (It doesn't make a lot of sense to have someone in the booth
|
|
talking up ISOC and not spending $35 to be a member.)
|
|
|
|
Anyone interested in volunteering or finding our more details should
|
|
contact Mary Burger at the Internet Society Headquarters (703-648-9888). A
|
|
CommNET Booth is a great opportunity for ISOC, please help to make this a
|
|
success.
|
|
|
|
================================================================================
|
|
DC-ISOC Meeting Locations...
|
|
|
|
As always, the DC-ISOC would like to hear any leads you may have on (free)
|
|
meeting places in the DC metro region, large enough to hold 200 people.
|
|
We were able to hold our last meeting at the Marriot Hotel, thanks to the
|
|
costs being absorbed by Network Solutions ( http://www.netsol.com ). If
|
|
your organization is interested in covering the costs of a DC-ISOC meeting,
|
|
please contact Russ Haynal (russ@navigators.com or 703-729-1757) Sponsors
|
|
do receive visibility/recognition to the DC-ISOC Membership (Mailing list
|
|
includes over 1500 Internet industry participants located mostly in the DC
|
|
Metro area)
|
|
|
|
|
|
========================================================
|
|
Conference Announcement....
|
|
|
|
|
|
Digital Dilemmas: Defining Ethics in the Internet Age
|
|
|
|
The Internet revolution has sparked a fierce debate among the business,
|
|
academic, computer, and public policy communities. Today, we are grappling
|
|
with complex ethical questions such as
|
|
* Must society ensure that all people have equal access to the Internet?
|
|
* Can we bridge the gap between network haves and have-nots?
|
|
* Can the Internet remain a haven for free expression, discreet
|
|
information consumption, and private transactions?
|
|
* Can we strike a balance between individual interests and
|
|
commercialism on the Internet?
|
|
|
|
These new-age questions defy easy answers. They demand new-age solutions.
|
|
Take part in the debate. Attend Marymount University's conference,
|
|
Digital Dilemmas: Defining Ethics in the Internet Age.
|
|
|
|
|
|
Ethics, Access, and the Internet
|
|
|
|
This conference is for high-tech companies, consumer advocates, cybernauts,
|
|
academicians, and policy makers who are surveying the landscape of ethical
|
|
considerations in the Internet Age. Along with the changing structure of
|
|
communications within our society, we are faced with ethical dilemmas of
|
|
* Equal access
|
|
* Free speech
|
|
* Intellectual property
|
|
* Privacy
|
|
* Regulation
|
|
* Electronic commerce
|
|
Marymount has assembled an impressive cadre of speakers and panelists who
|
|
are at the forefront of ethical debate in the Internet Age.
|
|
Join us for this half-day conference as we explore the controversial issues
|
|
of ethics, access, and the Internet.
|
|
|
|
|
|
Panel One:
|
|
|
|
Moving Beyond the Wire: Who Gains? Who's Left Behind?
|
|
|
|
Whose Internet is it, anyway? Popular opinion holds that the Internet is
|
|
the great equalizer. No one knows whether you're rich or poor, urban or
|
|
rural, young or old. No one knows your gender, race, or education.
|
|
The push is on to wire up our schools, homes, and businesses. But what
|
|
happens to those who aren't willing or able to get connected? Will they be
|
|
left out of future political and social debates? Will they miss out on
|
|
economic opportunities? Is the Internet setting up exclusion criteria,
|
|
information elites, electronic inequities? What is the impact of the
|
|
Internet on our society and our economy? What's the role of government and
|
|
the private sector in ensuring equal access?
|
|
|
|
Panel Two:
|
|
|
|
Uncharted Waters: Privacy, Intellectual Property, and the First Amendment
|
|
|
|
With the unexpected and explosive growth of the Internet, governments,
|
|
regulating agencies, and individuals in a position of public trust or
|
|
public office have begun to recognize the power of this new communications
|
|
medium. In the interest of "protecting" their constituencies, many powerful
|
|
interests are getting involved. Recently, the issues of privacy,
|
|
intellectual property, and First Amendment rights have come under intense
|
|
scrutiny, but precious few legal decisions have charted our course.
|
|
Are we adrift in a sea of unresolved legal and ethical quandaries? Is the
|
|
Internet headed for the rocks? Will proposed "solutions" render the
|
|
Internet powerless? Will free marketers and brash commercialism sail over
|
|
the free sharing of information? Should technology influence culture or
|
|
vice versa?
|
|
|
|
|
|
Conference Planning Committee:
|
|
|
|
Chair: Jack McDonnell, President and CEO, Transaction Network Services, Inc.
|
|
Dan Bannister, President and CEO, DynCorp
|
|
Mario Morino, Chairman, Morino Institute
|
|
Stephen Allis, Director, Government Affairs, KPMG Peat Marwick, LLP
|
|
Robert Sigethy, Dean, School of Business Administration, Marymount
|
|
University
|
|
Paul Byers, Director, Center for Ethical Concerns, Marymount University
|
|
|
|
|
|
Agenda at a Glance
|
|
|
|
8:30 - 9:00 Registration
|
|
9:00 - 9:05 Welcome to Marymount
|
|
9:05 - 9:30 Keynote Speaker - Tom Bliley, Chairman, House Commerce
|
|
Committee
|
|
9:30 - 10:30 Beyond the Wire: Who Gains? Who's Left Behind?
|
|
Moderator: Brit Hume (Fox News, Chief Washington
|
|
Correspondent and Managing Editor)
|
|
Speakers:John Sidgmore, CEO, UUNet, Technologies, Inc.
|
|
Bill Melton, President and CEO,
|
|
CyberCash, Inc.
|
|
Larry Irving, Assistant Secretary for
|
|
Communications and Information, Department
|
|
of Commerce (invited)
|
|
10:30 - 10:45 Coffee Break
|
|
10:45 - 11:45 Uncharted Waters: Privacy, Intellectual Property, and
|
|
the First Amendment
|
|
Moderator:Paul Byers (Director, Center for Ethical
|
|
Concerns, Marymount University)
|
|
Speakers:Don Heath, President, Internet Society
|
|
Guest, Freedom Forum
|
|
Harry Litman, Deputy Assistant Attorney General,
|
|
Department of Justice
|
|
12:00 - 1:00 Luncheon
|
|
Speaker:Tom Kalil, Senior Director to the National
|
|
Economic Council
|
|
|
|
Note: Schedules are subject to change. For the latest information, visit
|
|
our Web site at http://www.marymount.edu
|
|
|
|
|
|
Roads to Marymount University
|
|
|
|
From north of Washington, D.C.:
|
|
Take Interstate Rt. 95-South to 495-West to Exit 14 (George Washington
|
|
Parkway-South) to Rt. 123-North (Chain Bridge Road). Follow to traffic
|
|
light at end of road. Turn right onto Glebe Road (Rt. 120-South) and follow
|
|
for 2.5 miles. Marymount is on the left.
|
|
From south of Washington, D.C.:
|
|
Take Interstate Rt. 95-North, which becomes 395 inside the Beltway. Exit
|
|
Glebe Road (Rt. 120-North), marked "Marymount University." Continue on
|
|
Glebe Road 6 miles. Marymount is on the right.
|
|
From Rt. 66 (either direction):
|
|
Exit Glebe Road (Rt. 120-North). Drive 1 mile. Marymount is on the right.
|
|
If you or any of your guests require special consideration because of
|
|
physical disabilities, please notify the Office of Campus Safety at (703)
|
|
284-1601 at least 48 hours prior to your visit.
|
|
|
|
|
|
Sponsored by Marymount University's School of Business Administration and
|
|
Center for Ethical Concerns
|
|
|
|
Marymount University - Located in Arlington, Virginia, Marymount is an
|
|
independent, comprehensive, Catholic university offering programs to more
|
|
than 4,000 men and women at the undergraduate and graduate levels.
|
|
Marymount strives to foster the intellectual, moral, spiritual, social,
|
|
cultural, and physical development of each student through an education
|
|
that combines the liberal arts tradition with career preparation.
|
|
|
|
Center for Ethical Concerns - One of the hallmarks of Marymount University
|
|
is its commitment to providing a values-based education. The Center for
|
|
Ethical Concerns was founded in 1993 to provide a forum for the exchange of
|
|
ideas about ethical issues and problems. Through lectures, seminars,
|
|
workshops, and symposia, the Center offers students, faculty, and the
|
|
public opportunities to examine ethical concerns facing society.
|
|
|
|
Design by: Franek Design Associates, Inc.
|
|
Printing by: Print Pro, Inc.
|
|
Marketing by: Marketek
|
|
|
|
|
|
Register Today
|
|
|
|
Digital Dilemmas: Defining Ethics in the Internet Age
|
|
|
|
March 12, 1997, 8:30 a.m. to 1:00 p.m.
|
|
Marymount University, Arlington, Virginia
|
|
To register, complete this coupon (please print or type) and fax it to
|
|
Marymount University at (703) 284-1544. Or register via the World Wide Web
|
|
at http://www.marymount.edu after January 31.
|
|
|
|
o Yes, sign me up for the conference
|
|
NAME
|
|
TITLE
|
|
ORGANIZATION
|
|
ADDRESS
|
|
CITY STATE ZIP
|
|
PHONE
|
|
FAX E-MAIL
|
|
Please indicate payment method:
|
|
Charge my: o Visa o MasterCard
|
|
Card # Exp. date __________
|
|
Signature __________________________________________________
|
|
|
|
o Check enclosed
|
|
|
|
Make checks payable to Marymount University.
|
|
Send this form to: Marymount University
|
|
c/o Barbara Favola
|
|
Office of the President
|
|
2807 North Glebe Road
|
|
Arlington, VA 22207-4299
|
|
|
|
Registration fees: o $100 o $45 - students (must show ID)
|
|
Register early; seating is limited. All registrations must be received by
|
|
March 5. No refunds provided for cancellations after March 1. However, your
|
|
registration may be transferred to another individual if you cannot attend.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 8 Jan 1997 15:38:35 -0800
|
|
From: Sara Winge <sara@ora.com>
|
|
Subject: File 6--"DNS and BIND," and "Mastering Regular Expressions"
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
January 8, 1997
|
|
|
|
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
|
|
Sara Winge
|
|
707/829-0515
|
|
sara@ora.com
|
|
|
|
NEW EDITION OF O'REILLY'S CLASSIC NUTSHELL HANDBOOK "DNA AND BIND"
|
|
|
|
SEBASTOPOL, CA-O'Reilly & Associates announces the publication of the
|
|
second edition of "DNS and BIND," a complete guide to the Internet's
|
|
Domain Name System (DNS) and the Berkeley Internet Name Domain (BIND)
|
|
software, the UNIX implementation of DNS. The new edition also covers
|
|
using DNS and BIND with Windows NT. It's a complete update of this
|
|
classic Nutshell Handbook, which has served as *the* source of
|
|
information on DNS and BIND for system administrators who manage domain
|
|
or name servers.
|
|
|
|
DNS is the system that translates hostnames (like "rock.ora.com") into
|
|
Internet addresses (like 192.54.67.23). Until BIND was developed, name
|
|
translation was based on a "host table"; if you were on the Internet,
|
|
you got a table that listed all the systems connected to the Net and
|
|
their addresses. As the Internet grew from hundreds to hundreds of
|
|
thousands of systems, host tables became unworkable. DNS is a
|
|
distributed database that solves the same problem effectively, allowing
|
|
the Net to grow without constraints. Rather than having a central
|
|
table that gets distributed to every system on the Net, it allows local
|
|
administrators to assign their own hostnames and addresses and install
|
|
these names in a local database. This database is automatically
|
|
distributed to other systems as names are needed.
|
|
|
|
In this new edition of "DNS and BIND," the authors describe Bind
|
|
version 4.8.3, which is included in most vendor implementations today.
|
|
In addition, readers will find complete coverage of Bind 4.9.4, which
|
|
in all probability will be adopted as the new standard in the near
|
|
future.
|
|
|
|
In addition to covering the basic motivation behind DNS and how to set
|
|
up the BIND software, this book covers many more advanced topics,
|
|
including how to become a "parent" (i.e., "delegate" the ability to
|
|
assign names to someone else); how to use DNS to set up mail forwarding
|
|
correctly; debugging and troubleshooting; and programming.
|
|
|
|
# # #
|
|
|
|
DNS and BIND, 2nd Edition
|
|
By Paul Albitz & Cricket Liu
|
|
2nd Edition December 1996
|
|
438 pages, ISBN: 1-56592-236-0, $32.95 US
|
|
|
|
=========================================================================
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
January 10, 1997
|
|
|
|
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
|
|
Sara Winge
|
|
707/829-0515
|
|
sara@ora.com
|
|
|
|
O'REILLY RELEASES "MASTERING REGULAR EXPRESSIONS"
|
|
|
|
SEBASTOPOL, CA--Programmers who delve into O'Reilly and Associates'
|
|
new book "Mastering Regular Expressions" can save themselves time and
|
|
aggravation while dealing with documents, mail messages, log files--any
|
|
type of text or data--by tapping the power of regular expressions. For
|
|
example, regular expressions can play a vital role in constructing a
|
|
World Wide Web CGI script, which can involve text and data of all
|
|
sorts. Those who don't use regular expressions yet will discover a
|
|
whole new world of mastery over their data in "Mastering Regular
|
|
Expressions." Experienced users will appreciate the book's
|
|
unprecedented detail and breadth of coverage.
|
|
|
|
Regular expressions are not a tool in and of themselves, but are
|
|
included as part of a larger utility. The classic example is grep.
|
|
These days, regular expressions can be found everywhere, such as in:
|
|
- scripting languages (including Perl, Tcl, awk, and Python)
|
|
- editors (including Emacs, vi, and Nisus Writer)
|
|
- programming environments (including Delphi and Visual C++)
|
|
- specialized tools (including lex, Expect, and sed)
|
|
|
|
While many of these tools originated on UNIX, they are now available
|
|
for a wide variety of platforms, including DOS/Windows and MacOS.
|
|
Additionally, many favorite programming languages (even Java) offer
|
|
regular-expression libraries, so programmers can include support for
|
|
them in their own programs.
|
|
|
|
For years, author Jeffrey Friedl has helped people on the Net
|
|
understand and use regular expressions. In "Mastering Regular
|
|
Expressions" he goes beyond mechanics and initiates readers to the art
|
|
of using regular expressions. Friedl shares the subtle but valuable
|
|
ways to think when using regular expressions as he leads readers
|
|
through the process of crafting a regular expression to get the job
|
|
done.
|
|
|
|
Regular expressions are not used in a vacuum. In this book, a variety
|
|
of tools are examined and used in an extensive array of examples. Perl,
|
|
in particular, is very well represented throughout the book, with a
|
|
major chapter dedicated entirely to it alone. Perl is extremely
|
|
well-endowed with rich and expressive regular expressions. Yet what is
|
|
power in the hands of an expert can be fraught with peril for the
|
|
unwary--"Mastering Regular Expressions" shows readers how to navigate
|
|
the minefield and become true masters of the art of regular
|
|
expressions.
|
|
|
|
# # #
|
|
|
|
Mastering Regular Expressions: Powerful Techniques for Perl and
|
|
Other Tools
|
|
By Jeffrey E. F. Friedl
|
|
1st Edition January 1997
|
|
368 pages, ISBN: 1-56592-257-3, $29.95 US
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 28 Jan 1997 12:08:42 EST
|
|
From: "Rob Slade, doting grandpa of Ryan & Trevor"
|
|
Subject: File 7--"The Basics of Computer Security" by Bellcore
|
|
|
|
VDBSCMSC.RVW 961019
|
|
|
|
"The Basics of Computer Security", Bellcore, 1995, 1-57305-047-4, U$695.00
|
|
%A Bellcore
|
|
%C Room 3A184, 8 Corporate Place, Piscataway, NJ 08854
|
|
%D 1995
|
|
%G 1-57305-047-4
|
|
%I Bellcore
|
|
%O U$695.00 +1-800-521-CORE +1-908-699-5800 fax: +1-908-336-2559
|
|
%O llavoie@notes.cc.bellcore.com mgordon2@notes.cc.bellcore.com
|
|
%P 130 minutes
|
|
%T "The Basics of Computer Security"
|
|
|
|
Essentially, this series of three short video tapes contains the rough
|
|
equivalent of three introductory chapters of a basic security
|
|
text. There is an introduction to computer security in general,
|
|
an introduction to application security, and an introduction to
|
|
application security review or audit. The material is presented
|
|
at a level suitable to the user, or perhaps a non-technical
|
|
manager.
|
|
|
|
The format is the standard talking head interspersed with slides.
|
|
The material on the slides is reprinted in booklets packaged with
|
|
the tapes. The content is generally reliable, although sometimes
|
|
the advice on minor matters is questionable. Overall
|
|
organization is good, but some sections are poorly planned and
|
|
repetitive.
|
|
|
|
copyright Robert M. Slade, 1996 VDBSCMSC.RVW 961019
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.06
|
|
************************************
|
|
|