685 lines
29 KiB
Plaintext
685 lines
29 KiB
Plaintext
|
|
Computer underground Digest Thu June 12, 1997 Volume 9 : Issue 45
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.45 (Thu, June 12, 1997)
|
|
|
|
File 1--<nettime> Attack against Decoder (english) (FWD)
|
|
File 2--Islands in the Clickstream
|
|
File 3--'Amateur Action' update
|
|
File 4--Ready, aim, fire!
|
|
File 5--Re: Mass-CuD Problem Solved (we hope)
|
|
File 6--"Java Fundamental Classes Reference" from O'Reilly
|
|
File 7--U.S. Agriculture Dept. web site closed after security breach
|
|
File 8--French Internet Suit Dismissed
|
|
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 03 Jun 17 01:57:10 -0100
|
|
From: Bruce Sterling <bruces@well.sf.ca.us>
|
|
Subject: File 1--<nettime> Attack against Decoder (english) (FWD)
|
|
|
|
|
|
From--Gomma@decoderbbs.csmtbo.mi.cnr.it (Gomma)
|
|
Date--03 Jun 17 01:57:10 -0100
|
|
To--nettime-l@Desk.nl
|
|
|
|
The following (translated) article is from "Il Mattino" of Naples. It
|
|
concerns "Decoder", one of the most relevant magazines in the Italian
|
|
antagonist landscape.
|
|
|
|
This raving article is against "Decoder" and the
|
|
alternative Italian telematics. It is the proof that all the
|
|
repressive legislation passed or under way to "regulate" the net will
|
|
become instruments against freedom of expression more broadly. For
|
|
those who didn't know it, the article mentioned concerns a strip by
|
|
the famous English artist, Graham Harwood ("Decoder", No. 8), on the
|
|
issue of violence on children. A harsh strip, ruthless, but whose
|
|
only goal was to make people reason on the origins of violence
|
|
against weaker human beings. But when power becomes blind, it hits in
|
|
any form, it becomes abuse, it becomes censorship, and it hits
|
|
everything and everyone.
|
|
|
|
If this was not so gloomy for the future prospects it envisages, we
|
|
could even laugh at it, but BEWARE, because this article -which the
|
|
journalist who attacks us and the right to stay anonymous was not
|
|
brave enough to sign- seems to anticipate a new repressive clampdown
|
|
on Italian networks and their activists.
|
|
|
|
As "Decoder" we will seek for advice from our lawyers to try and do
|
|
something -we do not accept being used to the ends of newspapers'
|
|
manipulation- and we INVITE all the comrades, brothers and sisters
|
|
from telematic communities to express solidarity, to activate on
|
|
these issues, and build a united front against repression.
|
|
|
|
-------
|
|
|
|
"Il Mattino" 28 May 1997
|
|
|
|
The cyber-race and its prophets. See under "violence"
|
|
|
|
There is also a magazine ,"Decoder", in glossy paper: it preaches the
|
|
destruction of all rules
|
|
|
|
ROME. A bunch of copies on adjunct attorney's Italo Ormanni.
|
|
Disgusting images of violence on children accompanied by a language
|
|
that is abusive in itself. It is not a porn magazine, of those some
|
|
guys get behind closed doors. It's a glossy paper, underground they
|
|
say, who claims to change the world. An organ of ideological
|
|
struggle, one may say party-like, if we can call this way a group
|
|
which is sailing on the Net preaching the destruction of all rules.
|
|
And what is more shocking, more destructive than sanctifying violence
|
|
on children?
|
|
|
|
Ormanni, the statutes in his hands, could only do one thing. He asked
|
|
to the police's telecommunication operative branch director, Maria
|
|
Cristina Ascenzi, if the requisites existed to sue someone for under-
|
|
age persons' exploitation. But it came out that those sick images
|
|
are the outcome of computer-aided elaborations. The crime disappears,
|
|
at least for current laws, but a chilling discovery is confirmed:
|
|
pedophily is not only stuff for a-social, depraved people: it is
|
|
used, if you pass this concept, as a tool of struggle, a ram's head
|
|
against the bases of society. Going through "Decoder"'s pages is like
|
|
have a walk into a frenzy: a summary of the cyberpunk's "philosophy"
|
|
is that any rule must tumble down. And that anyone do what they want,
|
|
totally unnamed.
|
|
|
|
Being strong or weak, being the animal that eats or the one who gets
|
|
eaten, does not matter. But this is not said because anyone of these
|
|
cyberphilosophers feel, tacitly, the eating animal. One of the most
|
|
notable parts of this vision of the world supported even through
|
|
pedophily is the coming birth of a cyber-race improved by computer.
|
|
And all, which they imagine so original and part of the new times,
|
|
inequivocably smacks like a rotten carcass.
|
|
|
|
No signatures, only proclamations. The authors don't let people look
|
|
in their faces. Only battle nicknames. It's the rule, on the Net.
|
|
This in the lefty circles who are seeking on the Net for alternatives
|
|
to the old social centre (whom detectives call "antagonist"), like in
|
|
these groups defined, instead, as rightist. Among so many living
|
|
presences, curious, even provoking, then, you can also find anti-
|
|
everything propaganda, desecrating by choice. Legislation that is now
|
|
going to pass in Parliament provides for very hard penalties for
|
|
everyone produces pornographic material representing under-age
|
|
persons. Also virtual pedophily, then, might be punished, as a non-
|
|
value and an "exaltation" of a crime. Until now the police, who can
|
|
anyway point and prosecute those inciting to racial hatred, can just
|
|
wait and see.
|
|
--
|
|
| Cybernet: Gomma 65:1200/1.2
|
|
| Internet: Gomma@decoderbbs.csmtbo.mi.cnr.it
|
|
| WWW : http://www4.iol.it/decoder
|
|
|
|
|
| Standard disclaimer: >>>> Information wants to be free <<<<
|
|
| From DecoderBBS Italy +39-2-29527597 (open 14:00-08:00).
|
|
---
|
|
# distributed via nettime-l : no commercial use without permission
|
|
# <nettime> is a closed moderated mailinglist for net criticism,
|
|
# collaborative text filtering and cultural politics of the nets
|
|
# more info: majordomo@icf.de and "info nettime" in the msg body
|
|
# URL: http://www.desk.nl/~nettime/ contact: nettime-owner@icf.de
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 07 Jun 1997 21:38:18
|
|
From: Richard Thieme <rthieme@thiemeworks.com>
|
|
Subject: File 2--Islands in the Clickstream
|
|
|
|
Islands in the Clickstream:
|
|
No More Pencils, No More Books?
|
|
|
|
|
|
We are all children of our times.
|
|
We frame our worlds as they are given to us by our language
|
|
and the structures of our education. The frame is invisible until
|
|
there is a change so pervasive that we see by contrast what we
|
|
once took for granted. It's like the terminator on the moon, the
|
|
line between darkness and light where the mountain ranges are
|
|
thrown into relief.
|
|
I did not experience the education I received growing up in
|
|
America in the 1950s and 1960s as a choice. It's what education
|
|
was.
|
|
In the same way, becoming an "adolescent" was simply a fact
|
|
of growing up, a universal stage of development. But adolescence
|
|
is really a modern invention. The word was first used in 1904.
|
|
The same is true of "childhood" which was really invented by the
|
|
Victorians.
|
|
In the United States, the expectation that adults will
|
|
graduate from high school is a fairly recent development, a
|
|
twentieth-century phenomena.
|
|
"School" as we know it is a direct result of the printing
|
|
press. Collections of benches in a central building on which to
|
|
sit and read are a recent development. Learning had universally
|
|
been accomplished through apprenticeship. Young people worked
|
|
beside adults, learning by doing. Most never left the village in
|
|
which they were born.
|
|
The fact of textbooks and universal literacy made necessary
|
|
a prolonged period of time called "adolescence" that postponed
|
|
adulthood. During that time we learned the art of symbol
|
|
manipulation. We learned to internalize typographical symbols and
|
|
be "reading people." Learning to read transformed who we were and
|
|
how we understood our lives as possibilities for action.
|
|
The process was at least as important as the content.
|
|
We called that process "education."
|
|
|
|
Today the structures of education are out of joint with the
|
|
structures of adulthood. That's why so many businesses are
|
|
educating workers. More education takes place today in conference
|
|
rooms, meeting rooms in hotels, and via remote telepresence and
|
|
onsite computer-assisted learning than in classrooms. The need
|
|
for continuous lifelong education is now an unquestioned
|
|
assumption.
|
|
|
|
Apple flooded schools with computers, but didn't provide
|
|
teachers who knew what to do with them. My consulting with
|
|
schools tells me that money is often budgeted to buy computers,
|
|
but seldom budgeted for the years of training needed to re-
|
|
program teachers to use them effectively.
|
|
I know a fourth grade teacher who was supposed to teach
|
|
computers but didn't know how to turn them on. She asked her
|
|
class, "Who knows how?" Hands waved in the air. She turned the
|
|
task over to the students and hid behind her desk while they
|
|
showed each other what to do.
|
|
She called it "empowerment."
|
|
But she couldn't hide forever. So she asked her three
|
|
brightest students secretly to teach her after school how to use
|
|
computers. Then she could teach the students how to use
|
|
computers.
|
|
That teacher's situation as an officer in a command-and-
|
|
control hierarchy who does not know as much as the people she
|
|
teaches is analogous to a manager asked to supervise younger
|
|
workers who understand computer technology and its uses far
|
|
better than she does.
|
|
Older managers as well as older teachers must learn from
|
|
younger adults as well as teach them. The wisdom of experience is
|
|
relevant, but relevant in a different way. Command-and-control
|
|
behaviors do not make for good coaching.
|
|
That teacher, like many managers, learned that she still had
|
|
authority, but authority that had to be exercised in a collegial
|
|
way. Leadership is exercised in a network by implementing a
|
|
vision, not by dominating and controlling. Power is exercised in
|
|
a network by participating and contributing.
|
|
That teacher knew, at least, how to get out of the way, but
|
|
that didn't make her a coach. She needed to learn how to be
|
|
present but not controlling, available but not directive. Like
|
|
the best computer assisted learning, good coaches provide
|
|
information not at the convenience of the curriculum but when
|
|
learners are most teachable.
|
|
|
|
Naturally the fact of computer technology has been
|
|
threatening to many schools. Some responded to the challenge by
|
|
taking away all the computers and locking them up in a room. They
|
|
call it a "computer lab" and let the kids in there an hour a day.
|
|
Imagine being a teacher when pencils were invented. You pass
|
|
out pencils and watch as the children discover that pencils can
|
|
do anything because a pencil is a symbol manipulating machine.
|
|
Children can write stories, do math, reflect on history. Afraid
|
|
you're no longer needed, you collect the pencils and lock them in
|
|
a Pencil Lab, letting the children use them an hour a day. The
|
|
rest of the time they write with rocks on slabs of broken
|
|
concrete.
|
|
|
|
In preparation for a speech for a school district in
|
|
northern Illinois recently, I was told that the large
|
|
corporations in which most of their students worked gave the
|
|
district good grades in much of what they were teaching, but not
|
|
in preparing young people for cooperative learning and cross-
|
|
disciplinary teamwork. When I asked what they meant by
|
|
"cooperative learning," I realized that in *my* day it was called
|
|
... cheating.
|
|
A stand-alone human being who learns and works by themselves --
|
|
as I was taught to do -- is a brain in a bottle.
|
|
|
|
The structures of education, like the structures of work,
|
|
are moving through a sea-change. Symptoms include:
|
|
|
|
+ Rising drop-out rates. Racial minorities, the canaries in
|
|
the coal mine of society, die first. The growing irrelevance of
|
|
school to life in the real world was experienced first in
|
|
ghettos. Now blue-collar workers and middle-aged managers are
|
|
feeling the pain so it's a "crisis."
|
|
|
|
+ A growing "black market" in education. We give lip-service
|
|
to traditional structures but barter for "educational goods" on
|
|
the job and over the Internet, in the global marketplace.
|
|
|
|
+ Businesses are becoming centers of education, not because
|
|
they want to, but because they must. McDonald's teaches
|
|
politeness and civility because the traditional structures of
|
|
society no longer do the job. The budget for training in many
|
|
businesses exceeds the budgets of local school districts. Some
|
|
companies have started their own colleges and graduate studies
|
|
because schools do not generate people with the skills and
|
|
knowledge they need.
|
|
|
|
+ Conscientious teachers who can't see the forest for the
|
|
trees redouble their efforts. They become exhausted , working
|
|
harder and harder, but it's like drinking from a dribble glass.
|
|
The gears of the system don't mesh with the real world. Veterans
|
|
count the days until retirement. Burn-out abounds.
|
|
|
|
+ "Work-to-school" programs grow as apprenticeship is re-
|
|
engineered for the 21st century.
|
|
|
|
Is there hope? Of course. The solutions begin with
|
|
understanding the depths of the transformation we are
|
|
experiencing and asking questions relevant to our real lives. The
|
|
process of finding answers together will generate the security we
|
|
need to remain effective during revolutionary times.
|
|
|
|
|
|
|
|
|
|
**********************************************************************
|
|
|
|
Islands in the Clickstream is a monthly column written by
|
|
Richard Thieme exploring social and cultural dimensions
|
|
of computer technology. Comments are welcome.
|
|
|
|
Feel free to pass along columns for personal use, retaining this
|
|
signature file. If interested in (1) publishing columns
|
|
online or in print, (2) giving a free subscription as a gift, or
|
|
(3) distributing Islands to employees or over a network,
|
|
email for details.
|
|
|
|
To subscribe to Islands in the Clickstream, send email to
|
|
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
|
body of the message. To unsubscribe, email with "unsubscribe
|
|
islands" in the body of the message.
|
|
|
|
Richard Thieme is a professional speaker, consultant, and writer
|
|
focused on the impact of computer technology on individuals and
|
|
organizations.
|
|
|
|
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
|
|
|
|
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
|
*********************************************************************
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 8 Jun 1997 13:23:04 -0400
|
|
From: Michael Sims <jellicle@inch.com>
|
|
Subject: File 3--'Amateur Action' update
|
|
|
|
((MODERATORS' NOTE: A full background on the Amateur Action BBS
|
|
case, including its history and the text of relevant legal
|
|
documents, can be found in the CuD archives at:
|
|
http://www.soci.niu.edu/~aabbs/aabbs.html
|
|
|
|
==============
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
Background: Robert and Carleen Thomas ran an adult-oriented
|
|
bulletin board system from their home in California. Prosecutors in
|
|
Tennesee in 1994 downloaded allegedly obscene pictures of sexual
|
|
acts and charged them. Of course, they were applying *their*
|
|
"community standards" for obscenity to his California business.
|
|
They were found guilty and sentenced to 37 months. While that case
|
|
was on trial, Federal officials in Utah heard about and looked into
|
|
it. They downloaded pictures of "nude and semi-nude children" and
|
|
charged Thomas in Utah with distributing child pornography, although
|
|
there is no evidence any Utahan except the official had ever done
|
|
so. Thomas pled guilty to 1 of 16 charges and appealed alleging
|
|
double jeopardy.
|
|
|
|
The 10th Circuit Court of Appeals has upheld the decision of the Utah
|
|
District Court. No double jeopardy because the individual photos are
|
|
different from those which were tried in the other cases. Thomas is
|
|
serving a 26-month sentence on this count, concurrently with the
|
|
other sentence. The opinion does not appear to be on the Emory
|
|
University web site which tracks these things.
|
|
|
|
|
|
Moral: anyone who distributes content nationally continues to be
|
|
subject to prosecution in each and every locale under prevailing
|
|
community standards. If your content is objectionable to the most
|
|
small-minded folk anywhere in the US, it would be wise to refrain
|
|
from publishing it on the internet or other comparable medium.
|
|
Prosecutions continue to apply local "contemporary community
|
|
standards" to obscenity prosecutions, but in meeting the Miller test,
|
|
they are permitted to demonstrate that the material has prurient
|
|
appeal to someone else. In other words, offensive to you, sexually
|
|
appealing to anyone anywhere.
|
|
|
|
For example, if space aliens landed tomorrow and their pornography
|
|
consisted of pictures that looked like cat vomit, prosecutors could
|
|
present evidence that the material is prurient with regard to space
|
|
aliens, patently offensive to you (cat vomit, you know), and lacking
|
|
in serious literary value to you (obviously) and you would therefore
|
|
conclude that the material was obscene.
|
|
|
|
|
|
[v]enue for federal obscenity prosecutions lies "in any district
|
|
from, through, or into which" the allegedly obscene material
|
|
moves, according to 18 U.S.C. section 3237. This may result in
|
|
prosecutions of persons in a community to which they have sent
|
|
materials which is obscene under that community's standards
|
|
though the community from which it is sent would tolerate the
|
|
same material.
|
|
|
|
United States v. Peraino, 645 F.2d 548, 551 (6th Cir. 1981)
|
|
|
|
|
|
So even if you refrain from sending material to Tennesee residents,
|
|
an internet router can make that decision for you by sending data
|
|
packets through the state. What a great piece of law.
|
|
|
|
|
|
Refs:
|
|
|
|
Jonathan Wallace's consideration of the issue:
|
|
http://www.spectacle.org/795/amateur.html
|
|
http://www.spectacle.org/freespch/musm/obsne.html
|
|
http://www.spectacle.org/296/obscene.html
|
|
|
|
ACLU materials on the Tennessee case:
|
|
http://www.aclu.org/court/thomas.html
|
|
http://www.aclu.org/court/obscene.html
|
|
|
|
|
|
-- Michael Sims
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 7 Jun 1997 19:30:57 -0400
|
|
From: Michael Sims <jellicle@inch.com>
|
|
Subject: File 4--Ready, aim, fire!
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
http://www.nando.net/newsroom/ntn/info/060697/info5_16347.html
|
|
|
|
Reproduced in full, it's short. Anyone have more information?
|
|
|
|
Meeting reportedly will aim to fight obscenity on Internet
|
|
|
|
Copyright c 1997 Nando.net
|
|
Copyright c 1997 Agence France-Presse
|
|
|
|
TOKYO (June 6, 1997 11:43 a.m. EDT) - Japan, the United States and
|
|
European nations will hold an unprecedented ministerial meeting next
|
|
month to study ways to restrict obscenity on the Internet and regulate
|
|
electronic commerce, it was reported Friday.
|
|
|
|
The meeting in Bonn July 6-8 will focus on measures to crack down on
|
|
obscene and violent pictures on the Internet, Jiji Press quoted
|
|
informed sources as saying.
|
|
|
|
It will also discuss universal criteria for encoding information in
|
|
electronic commerce to protect private information, Jiji said.
|
|
|
|
Japan will be represented by the posts and telecommunications
|
|
minister, Hisao Horinouchi, the sources said.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 3 Jun 1997 06:55:40 -0400 (EDT)
|
|
From: "Bill Michaelson" <bill@COSI.COM>
|
|
Subject: File 5--Re: Mass-CuD Problem Solved (we hope)
|
|
|
|
<. . .>
|
|
|
|
But in all this furor over spam, I've been puzzled by something.
|
|
Why not as much indignation over paper mail? I told someone last
|
|
week that if I could take all the paper junk that is stuffed in
|
|
my postal mailbox (which I am required to physically sort for
|
|
recycling), and put it in my e-mailbox, I would flick it into the
|
|
ether with just as much ease as I do the electronic variety. Two
|
|
years ago, after sending written requests to about 150 paper junk
|
|
mailers, I was only successful at stopping the flow from half of
|
|
them. The others required one or more followup calls, many of
|
|
which had lame excuses for not complying with my request to stop.
|
|
And it appears that I have no legal recourse.
|
|
|
|
A handful have been so non-responsive (Honda, Godiva Chocolates
|
|
and Starbucks come to mind) that I've considered organizing
|
|
boycotts of their products by like-minded individuals. Ah, but
|
|
I've got a life. At least I know that *I* won't be buying their
|
|
products.
|
|
|
|
This isn't to say I'm unsympathetic; I've been the victim of some
|
|
idiotic spam attacks myself, and I'm still receiving junk from
|
|
email lists that accept automatic registration without any sort
|
|
of authentication - an administrative practice which borders on
|
|
negligence at this late date.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 5 Jun 1997 17:18:47 -0700
|
|
From: Sara Winge <sara@ora.com>
|
|
Subject: File 6--"Java Fundamental Classes Reference" from O'Reilly
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
June 5, 1997
|
|
|
|
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
|
|
Sara Winge
|
|
707/829-0515 x285
|
|
sara@ora.com
|
|
http://www.ora.com
|
|
|
|
O'REILLY RELEASES "JAVA FUNDAMENTAL CLASSES REFERENCE"
|
|
|
|
SEBASTOPOL, CA--"Java Fundamental Classes Reference," the latest title
|
|
in O'Reilly & Associates' Java documentation series, provides complete
|
|
reference documentation on the core Java 1.1 classes.
|
|
|
|
"Java Fundamental Classes Reference" goes beyond a standard reference
|
|
manual. In addition to detailed descriptions of classes and methods, it
|
|
offers tutorial-style explanations of the important classes in the Java
|
|
core API. The first section of the book includes chapters that describe
|
|
the ins and outs of strings and related classes, effective thread
|
|
programming, and the use of the I/O classes. These chapters also
|
|
include lots of sample code, so that readers can learn by example.
|
|
|
|
The core classes addressed in "Java Fundamental Classes Reference"
|
|
contain architecture-independent methods that serve as Java's gateway
|
|
to the real world, by providing access to resources such as the network
|
|
and the host filesystem. These classes also include utilities for
|
|
working with strings, I/O streams, mathematical functions, vectors, and
|
|
hash tables. The book covers the classes that comprise the java.lang,
|
|
java.io, java.net, java.util, java.text, java.math, java.lang.reflect,
|
|
and java.util.zip packages. These classes provide general-purpose
|
|
functionality that is fundamental to every Java application.
|
|
|
|
"Java Fundamental Classes Reference" describes Version 1.1 of the Java
|
|
Development Kit (JDK) and includes:
|
|
|
|
- Easy-to-use reference material on every core Java class
|
|
- Tutorial-style explanations of important classes and examples that
|
|
demonstrate their functionality
|
|
- Detailed coverage of all the essential classes in java.lang,
|
|
including Object, String, and Thread
|
|
- Descriptions of all the I/O classes provided in the java.io package,
|
|
including all of the new Reader, Writer, and object serialization
|
|
classes in Java 1.1
|
|
- Material on using the classes in java.util effectively
|
|
- Coverage of all the networking classes in the java.net package
|
|
|
|
"Java Fundamental Classes Reference" is meant to be used in conjunction
|
|
with the "Java AWT Reference." Together, these two reference manuals
|
|
cover all of the classes in the Java core API. "Java Language
|
|
Reference" completes O'Reilly's core Java documentation set by
|
|
providing a detailed reference of the Java programming language.
|
|
These manuals comprise the definitive set of Java 1.1
|
|
documentation--essential reference for any serious Java programmer.
|
|
|
|
O'Reilly's Java series also includes a tutorial, "Exploring Java," and
|
|
single-topic programming books that provide in-depth information on
|
|
critical topics, an approach the company has perfected in the past ten
|
|
years with their highly successful Nutshell Handbooks. "Java Virtual
|
|
Machine," "Java Threads," and "Java Network Programming" are the first
|
|
books on advanced programming topics. Upcoming Java programming books
|
|
include "Developing Java Beans" (6/97) and "Database Programming with
|
|
JDBC and Java" (7/97).
|
|
|
|
# # #
|
|
|
|
Java Fundamental Classes Reference
|
|
By Mark Grand & Jonathan Knudsen
|
|
1st Edition May 1997 (US)
|
|
1114 pages, ISBN: 1-56592-241-7, $44.95 (US)
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 11 Jun 1997 00:32:43 -0400
|
|
From: "Evian S. Sim" <evian@escape.com>
|
|
Subject: File 7--U.S. Agriculture Dept. web site closed after security breach
|
|
|
|
Copyright 1997 Reuter Information Service
|
|
|
|
WASHINGTON (June 11, 1997 00:08 a.m. EDT) - The U.S. Agriculture
|
|
Department's Foreign Agricultural Service shut down access to its
|
|
internet home page Tuesday after a major security breach was
|
|
discovered, a department aide said.
|
|
|
|
"It's a big, huge problem," Ed Desrosiers, a computer specialist
|
|
in USDA's Farm Service Agency, told Reuters. "We can't guarantee
|
|
anything's clean anymore."
|
|
|
|
Someone broke into system and began "sending out a lot of
|
|
messages" to other "machines" on the internet, Desrosiers said.
|
|
|
|
The volume of traffic was so great, "we were taking down machines"
|
|
and began receiving complaints, he said.
|
|
|
|
"It's not worth our time to try to track down" the culprit,
|
|
Desrosiers said. "Instead, we're just going to massively increase
|
|
security."
|
|
|
|
A popular feature on the FAS home page is the search function for
|
|
"attache reports," which are filed by overseas personnel and
|
|
provide assessments on crop conditions around the world. Although
|
|
not official data, the reports provide key information that goes
|
|
into USDA's monthly world supply-and-demand forecasts.
|
|
|
|
It could be next week before the page is open to outside users
|
|
again, Desrosiers said.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 10 Jun 1997 22:13:30 -0500
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
|
|
Subject: File 8--French Internet Suit Dismissed
|
|
Date: Tuesday, June 10, 1997
|
|
Source: Reuters.
|
|
Dateline: PARIS
|
|
Copyright Chicago Tribune
|
|
|
|
FRENCH INTERNET SUIT DISMISSED
|
|
ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE
|
|
|
|
The first test of whether France's disputed language law
|
|
applies to the Internet ended in a fiasco Monday when a court
|
|
threw out the case against an overseas branch of Georgia Tech on
|
|
a technicality.
|
|
|
|
Two state-approved watchdogs promoting the use of the French
|
|
language had filed a complaint against the Georgia Institute of
|
|
Technology's French campus for using English only on its Web
|
|
site.
|
|
|
|
The plaintiffs, Defense of the French Language and Future of
|
|
the French Language, accused Georgia Tech Lorraine of breaking a
|
|
1994 law requiring all advertising in France to be in French.
|
|
|
|
The Paris police court dismissed the lawsuit, saying the two
|
|
private groups should have notified a public prosecutor first.
|
|
|
|
The legislation, named after then-Culture Minister Jacques
|
|
Toubon, was part of a battle to protect the tongue of Moliere and
|
|
Racine from the growing international use of English.
|
|
|
|
<...>
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.45
|
|
************************************
|
|
|