902 lines
36 KiB
Plaintext
902 lines
36 KiB
Plaintext
|
|
Computer underground Digest Sun Jun 30, 1996 Volume 8 : Issue 49
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.49 (Sun, Jun 30, 1996)
|
|
|
|
File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)
|
|
File 2--Response to CUD #8.48--GAO hacker report: selling wind
|
|
File 3--Can you say "libel"?
|
|
File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such
|
|
File 5--Cyber Angel's response to Wired article
|
|
File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,
|
|
File 7--8th FIRST Conf & Workshop on Computer Security
|
|
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 25 Jun 96 16:53 PDT
|
|
From: Michael Gersten <michael@STB.INFO.COM>
|
|
Subject: File 1--Re: Cu Digest, #8.39, 27 May 96 (re Lance Rose)
|
|
|
|
I disagree with one of the points that Lance Rose makes in his
|
|
post on Civil Liberties, and the On-Line circus.
|
|
|
|
Lance talks about encryption, as hiding "a message right in someone
|
|
else's face. It is like sticking a self-incriminating note in a
|
|
physical capsule that is uncrackably hard and strong, then lobbing
|
|
the capsule through the window of a police station to sit in the
|
|
middle of the floor among a bunch of cops, powerless to open it up
|
|
and figure out how to get the perp."
|
|
|
|
At the same time, he says that you can hide a message better by
|
|
leaving it in plain text, hidden among the huge mass of other things.
|
|
|
|
Except that today, searching ability is very strong, and only
|
|
going to get better.
|
|
|
|
Except that the police have shown that they will take an entire
|
|
computer and search it for anything that they want
|
|
|
|
Except that the goal is for everyone to use routine PGP encryption
|
|
on all messages that are not for everyone, just as everyone routinly
|
|
uses envelopes for their mail, and some people use security envolopes
|
|
that you can't just hold up to a strong light to see what's inside.
|
|
|
|
Except that it's a desire to stand out with an encrypted message,
|
|
but to be one of the normal flow of encrypted messages.
|
|
|
|
Except that any other form of hiding the data requires setting up
|
|
some special method, that has to be kept secret. With PGP, you don't
|
|
have to do anything special, really--the message is (at least with
|
|
the -a option) identified as a PGP message, and when (not if) PGP
|
|
is standard on unix and windows-96 (or -97) systems, will be just
|
|
as easy to read as plain mail.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 24 Jun 1996 12:48:48 -0700
|
|
From: Roland Dobbins <rdobbins@bani.com>
|
|
Subject: File 2--Response to CUD #8.48--GAO hacker report: selling wind
|
|
|
|
Response to CUD #8.48, File 1--GAO hacker report: selling wind
|
|
|
|
You recently quoted something called the "Crypt Newsletter" on the
|
|
subject of computer-related yellow journalism & governmental
|
|
scare-mongering on the threat to national security from "hackers".
|
|
|
|
While I certainly am concerned about the characterization of
|
|
"hackers" as the lepers of the 1990s, I am very disappointed that
|
|
CUD would publish such a blatantly partisan, left-wing rant, as
|
|
news. Do you intend CUD to become a forum for left-wing demagogues?
|
|
I should hope that you will continue to provide a balanced forum for
|
|
discussing issues of interest to all of us in the Net community, and
|
|
that you will in future at least insert a disclaimer before
|
|
reprinting material of such material. Otherwise, CUD will cease to
|
|
be a forum for intramural discussion of serious issues, and instead
|
|
become merely a mirror of the moderators' apparently left-wing
|
|
political views. What a shame, indeed.
|
|
|
|
I am a conservative, and I would like to point out the your
|
|
readership that it is a left-wing, liberal Democratic Administration
|
|
which has foisted the entire Clipper/Capstone/EES thing on us, and
|
|
which has consistently violated the rights of individuals and groups
|
|
in their quest to establish the Nanny State (Waco, Ruby Ridge,
|
|
etc.). In fact, Republicans in the House & Senate have been
|
|
vociferous in both opposing EES and in watering down the more
|
|
heinous provisions of Mr. Clinton's so-called "anti-terrorism"
|
|
legislation. The very sinister Filegate incident, which is far
|
|
beyond any "enemies list" kept by the Nixon Administration, clearly
|
|
shows the arrogance of liberals who think that government (i.e.,
|
|
themselves) always know best, and that their good intentions render
|
|
them above the law.
|
|
|
|
Remember, Chuck Colson went to jail for possessing one (1) FBI "raw"
|
|
file; the Clinton White House had at least 408!
|
|
|
|
>No one except an obscure lunatic named T. K. Jones in the Reagan
|
|
administration >really thought that either U.S. generals or their Soviet
|
|
counterparts would >call down the wrath of 10,000 nuclear warheads.
|
|
|
|
Whoever wrote this must be either extremely stupid or willfully
|
|
ignorant. Weapons are made to be used, and the strategic arsenals
|
|
of both the U.S. & the U.S.S.R./Russia, while serving as a deterrent
|
|
against a general conventional war, are indeed capable of being
|
|
launched if National Command Authority so decides. All one has to
|
|
do is look at the Cuban Missile Crisis or the Soviet's panicky
|
|
launching of Project RYAN during the 1980s to see that there was
|
|
(and still is, in my opinion) a real danger of unleashing
|
|
Armageddon. That's why SDI was, and continues to be, as issue of
|
|
vital import.
|
|
|
|
In closing, I would like to compliment CUD for providing a
|
|
(generally) balanced and informative resource on public policy
|
|
issues such as Internet regulation. While it is very easy to
|
|
criticize from the peanut gallery, I hope that my comments and
|
|
suggestions are received not as churlish sniping, but as advice from
|
|
a devoted reader who only wishes to assist in making CUD that much
|
|
more appealing to us all.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 24 Jun 1996 12:33:56, -0500
|
|
From: MR ROBERT E DALY <red_daly@prodigy.com>
|
|
Subject: File 3--Can you say "libel"?
|
|
|
|
What a great idea! I think I'll submit the names of all my enemies!
|
|
Hmm, maybe I'll check with my lawyer first about slander and libel.
|
|
|
|
Response to article from Computer Underground Digest which follows:
|
|
|
|
Date--Sun, 16 Jun 1996 12:58:38 -0500 (CDT)
|
|
From--David Smith <bladex@bga.com>
|
|
Subject--Child Molester Database on the web
|
|
|
|
Great World Internet Services has set up a "child molester" database
|
|
where Internet users can add records about people who are child
|
|
molesters. The ISP's philosophy is listed below. There is also a
|
|
separate disclaimer that information will be purged after 120 years,
|
|
and that Great World Internet Services does not verify any of the data.
|
|
There is a procedure for those who wish to dispute being entered into a
|
|
database.
|
|
|
|
There are expansion plans, too : deadbeat dads, crooked cops, elected
|
|
official crimes, known drug dealers, etc.
|
|
|
|
The site can be found at http://www.greatworld.com/public
|
|
|
|
From its creator:
|
|
|
|
Too many times in our twisted society, criminals are treated as
|
|
victims and victims are treated as inhuman and ignored. When our
|
|
President, our (In)Justice System, and our legislative bodies fail to
|
|
provide us with proper protection, then we as citizens must unite in
|
|
order to protect ourselves. The time for passivity has ended and the
|
|
time for proactive intervention is upon us.
|
|
|
|
Therefore, as a parent and a citizen, I have made available a
|
|
database where child molesters can be listed. The difference between
|
|
this database and the databases of certain states (such as California)
|
|
are that this database is totally free. (There is no ridiculous $10
|
|
fee.) Also, anyone can look up information. In California, the state
|
|
feels that persons need to be able to prove a need for the information
|
|
before the information may be released. By golly, I believe that the
|
|
welfare of our children is right enough to know who these victimizers
|
|
are and that this information should be made available to everyone in
|
|
order to protect our families from joining the growing roster of
|
|
victims.
|
|
|
|
Also, this database doesn't require that those listed first be
|
|
convicted. If you are a victim and have been abused, then it doesn't
|
|
require a court of law to validate what you already know. The same
|
|
applies if you are a parent or a close relative and you have first hand
|
|
knowledge that someone committed the crime. The idea behind this
|
|
database is to make people aware of the criminals so that we can
|
|
protect our families before it is too late.
|
|
|
|
Most states do not list cases involving incest or victimization by
|
|
a relative or sibling. Feel free to list the victimizers here. If they
|
|
did it once, they are likely to do it again. Once a victimizer's own
|
|
children have grown up, they often turn to the children of others.
|
|
|
|
There are advocates of these vicious heartless tyrant criminals
|
|
who say that once a person who has served their time, they should be
|
|
left alone. Buddy, I have one thing to say to you. Don't let the
|
|
proverbial door slap you in the tail on your way off this page.
|
|
|
|
When a criminal victimizes a child, the child is emotionally
|
|
scarred for life. Nightmares often last throughout the person's entire
|
|
lfetime. Many times the person is unable to function effectively in a
|
|
relationship. No one is unable to ever take away what has been done. I
|
|
personally believe that their should only be one sentence for child
|
|
molestation--death. In my opinion, no child molester has EVER served
|
|
his time as long as he still lives.
|
|
|
|
This database will help to remind the people in communities
|
|
throughout America that certain people are dangerous and should be
|
|
watched.
|
|
-----------------------------------------------------
|
|
|
|
Message for Child Molesters: Before you molest your next victim,
|
|
think twice. Perhaps your name will be plastered here for all of the
|
|
world to see. Your mother, your father, your brothers and sisters,
|
|
friends, the world--will know what kind of a living monster you really
|
|
are.
|
|
[Internet Link Exchange]
|
|
|
|
Member of the Internet Link Exchange
|
|
|
|
This site designed, managed, and hosted by Great World Internet
|
|
Services
|
|
|
|
------------------------------
|
|
|
|
From: "David Smith" <bladex@BGA.COM>
|
|
Date: Wed, 26 Jun 1996 21:09:57 +0000
|
|
Subject: File 4--Re: Cu Digest, #8.48, 23 Jun 96 - Crimes and Such
|
|
|
|
|
|
> DON'T SHOOT THE SENATOR
|
|
>
|
|
|
|
<snip>
|
|
|
|
> Beeson and the ACLU understand these kinds of cases are far bigger
|
|
> than just one student angry about the slaughter of mountain lions, or
|
|
> an asshole sitting in the U.S. senate. It's about the entire structure
|
|
> of the Internet and how quickly Internet service providers will pull
|
|
> down their pants when the cops come calling. How ready is your own ISP
|
|
> to just hand over access to all your email when John Law appears at
|
|
> their door asking for "cooperation" against whatever they are
|
|
> labelling you: terrorist/child pornographer/anarchist/drug dealer,
|
|
> etc.?
|
|
>
|
|
|
|
When John Law has a search warrant, as in this situation, I
|
|
recommend that such cooperation be full and complete. You had better
|
|
have a very good reason (and lawyer) before you start willful
|
|
disobedience of legal orders.
|
|
|
|
That ISPs are willingly "pulling their pants down" for the police is
|
|
just not true.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 26 Jun 1996 19:43:01 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 5--Cyber Angel's response to Wired article
|
|
|
|
Attached is an excerpt from an announcement sent to the Cyber Angels
|
|
giving Gabriel Hatcher's response to the recent Wired article.
|
|
|
|
------- Forwarded Message Follows -------
|
|
From-- angels@wavenet.com (CyberAngels Director --Gabriel Hatcher)
|
|
Subject-- AOL project appeal
|
|
|
|
5) There is an article about us in Wired magazine's July issue. Don't get
|
|
excited, it is not very complimentary. Most of the article is spent
|
|
repeating what hostile critics have written about us, saying things like
|
|
"they don't understand the global nature of the Internet" (like we are 1100
|
|
members in _32_ countries and we don't understand the global nature of the
|
|
Internet?) or "they don't realize that posts could be forged" (which was
|
|
one of the _first_ things that happened to _us_ when we started a year
|
|
ago!); or "they could mess up FBI investigations and be criminally liable
|
|
themselves" (some of our members are currently _teaching_ federal agents
|
|
how to download and decode binaries from the Usenet).
|
|
|
|
When will the journalists realize that CyberAngels are _not_ people who
|
|
have only just bought their first computer (although some of us are), but
|
|
also include users with 15 years+ Internet experience, programmers and a
|
|
number of professional law enforcement people.
|
|
|
|
The Wired article is critical of Curtis Sliwa (co-founder with me of the
|
|
project), since he does not use a computer. Hey guys, that's why _I_ run
|
|
the project. Does Curtis have a right to an opinion about the Internet,
|
|
given his lack of hands-on knowledge. Well I am not currently drilling for
|
|
oil in the antarctic ocean, but I think I have a right to be concerned
|
|
about the environment. Is Curtis informed? Well I keep him up to date.
|
|
|
|
Wired's journalist says he doesn't understand Curtis and my different
|
|
opinions, and questions how we can be effective since we disagree on
|
|
things. Well watch us! Do Curtis and I agree about the solutions to
|
|
Internet crime? No, not always. In many cases we disagree, but guess
|
|
what? We don't have a problem living with the fact that we are not Clones
|
|
of each other. It's called a pluralistic society guys, and it requires
|
|
tolerance to live in. For those of you who didn't know, CyberAngels is not
|
|
a revolutionary organization. We believe in and practice tolerance of
|
|
diverse cultures and beliefs, and since we believe in and practice freedom
|
|
of speech, we encourage healthy and vigorous debate and discussion, and we
|
|
can live with disagreement (unlike many of our critics!) CyberAngels is
|
|
going strong, despite the fact that our members wouldn't agree on
|
|
everything. What we have in common is a shared Mission statement and an
|
|
agreed Codes of Conduct. That's enough for me. I don't mind which side of
|
|
your bread you all butter! ;)
|
|
|
|
*********************************************************
|
|
Gabriel Hatcher - CyberAngels Director
|
|
|
|
angels@wavenet.com
|
|
|
|
http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html
|
|
mirrored at: http://www.safesurf.com/cyberangels/
|
|
|
|
"All that is required for the triumph of evil is
|
|
that good people remain silent and do nothing"
|
|
(after Edmund Burke)
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 5 Jun 1996 06:13:32 -0400 (EDT)
|
|
From: NOAH <noah@enabled.com>
|
|
Subject: File 6--SUN USER GROUP EAST COAST CONFERENCE & EXHIBITION, JUNE,
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Thu, 16 May 1996 14:55:05 -0400 (EDT)
|
|
From--Rick <rick@sug.org>
|
|
|
|
SUN USER GROUP
|
|
EAST COAST CONFERENCE and EXHIBITION
|
|
|
|
Monday, June 24 & Tuesday, June 25, 1996
|
|
Marriott Copley Place
|
|
Boston, Massachusetts
|
|
|
|
**********************************************************************
|
|
************* Register below for FREE admission to ***************
|
|
************* the biggest Sun Trade Show of the year. ***************
|
|
**********************************************************************
|
|
|
|
Since this year's SunWorld has been cancelled, SUG East is now the
|
|
ONLY major Sun conference of 1996. We're expecting over 2,500
|
|
attendees from around the country and more than 100 exhibitors, so
|
|
this is your best opportunity of the year to discover what's new in
|
|
the world of Sun and Java. SUG East is also the first East Coast Sun
|
|
show in three years so expect to see a lot of new faces among the
|
|
vendors and attendees. SUG East will feature an exhibition of the
|
|
hottest new products for Sun and Java and a technical conference to
|
|
keep you on top of the latest developments.
|
|
|
|
|
|
The SUG East Technical Conference
|
|
|
|
|
|
The SUG East Technical Conference will run both days of the show and
|
|
will feature classes on a variety of topics. SUG was one of the
|
|
producers of SunWorld, and our own series of technical conferences
|
|
receive tremendous critical acclaim for their variety of interesting
|
|
speakers. The SUG East conference include 25 talks by respected
|
|
speakers over the both days of the show. Each day will feature two
|
|
tracks of classes; Monday, June 24, will spotlight Java and System
|
|
Administration, and Tuesday, June 25, will concentrate on Security and
|
|
Internet Communication.
|
|
|
|
The SUG East conference will address the important issues and
|
|
difficulties of developing, managing, and maintaining a
|
|
mixed-architecture environment through a variety of talks by some of
|
|
the leading experts in the field. Featured speakers at the conference
|
|
include Art Carty, General Manager and VP of SunExpress, North
|
|
America; Robert Diamond, Senior Security Consultant for Sun
|
|
Microsystems; Peter Galvin, chief scientist for Corporate
|
|
Technologies, Security columnist for SunWorld On-line magazine, and
|
|
author of "Operating System Concepts"; and J.A. Cross, Java consultant
|
|
and contributing author to Que Publishing's "Special Edition: Using
|
|
Java". Some of the currently scheduled sessions include:
|
|
|
|
JAVA TRACK
|
|
1. Java and Application Development
|
|
2. Client-Server Development With Java
|
|
3. Is Java just C++ with a new hat?
|
|
4. Programming the Internet in Ada 95
|
|
5. Building for the Internet.
|
|
|
|
SYSTEM ADMINISTRATION TRACK
|
|
1. Introducing Solstice Autoclient
|
|
2. TCP/IP Operational Troubleshooting in a UNIX Environment
|
|
3. Solaris Volume Management -- What It Does and Doesn't Do (and How)
|
|
|
|
SECURITY TRACK
|
|
1. Firewalls and Network Security
|
|
2. Network Security Tools w/ CMIP Agents
|
|
3. UNIX Security Tools Workshop
|
|
4. Host Security Tools
|
|
5. Kernel Access Controls
|
|
6. Vendor Security Panel: featuring Sun, Cisco, Ascend
|
|
|
|
INTERNET COMMUNICATION TRACK
|
|
1. Web Site Implementation
|
|
2. The Intranet and Thin Client Technologies: Testbed for the Future?
|
|
3. Building a Multi-Protocol Data Infrastructure
|
|
4. Electronic Commerce for Software over the Internet
|
|
|
|
More sessions are being added regularly, contact conference@sug.org
|
|
for the latest information. Registration for the SUG East Technical
|
|
Conference is seperate from the FREE Exhibition registration and
|
|
requires an additional fee. Earlybird Conference registration is $295
|
|
until June 10th. After June 10th, conference registration is $395.
|
|
Members of the Sun User Group or Java-SIG reveive $50 off conference
|
|
admission. Most conferences concentrate on the hype and cost
|
|
considerably more, sign up for the SUG East Technical Conference today
|
|
to receive the best education at the best prices.
|
|
|
|
|
|
The SUG East Exhibition
|
|
|
|
|
|
The SUG East Exhibition will feature over 100 exhibitors of
|
|
application software, backup and storage devices, client/server
|
|
products, connectivity products, email, network security, software
|
|
development tools, terminals, training services and other products and
|
|
services of interest to the Sun/SPARC and Java community.
|
|
Registration for the exhibition is FREE until June 10. Use the form
|
|
below to send in your registration today!
|
|
|
|
The Sun User Group believes that trade shows should be fun, so in
|
|
addition to all the exhibitors at SUG East you can also experience the
|
|
the Colossal SUG Midway where you can...
|
|
|
|
...Discover the Forbidden Secrets of Modern Science at the
|
|
Internet Academy of Mystery!
|
|
|
|
...See the Future Today at the Theater of the Amazing!
|
|
|
|
...Talk to Exotic Peoples from Around the Globe at Professor
|
|
Phineas Q. Abercrombie's Communications Pavilion!
|
|
|
|
...Experience Heart-Stopping Thrills at the UNIX Job Fair!
|
|
|
|
...and many more special events and surprises!
|
|
|
|
The SUG East Trade Show has it all... The Internet Academy of
|
|
Mystery will present a series of FREE introductory half-hour lectures
|
|
from SUG's highly-skilled instructors designed to help trade show
|
|
attendees get a taste of some of the hottest new technology. Some of
|
|
the FREE 'mini-classes' to be taught include: Java; The Worldwide Web;
|
|
Internet Security; and Using Information Services.
|
|
|
|
The Communication Pavillion provides attendees with a way to keep in
|
|
touch with people back home, browse the Web, and try out interesting
|
|
new communication software.
|
|
|
|
SUG's Theater of the Amazing is a Product Demo Showcase where
|
|
attendees can gain valuable in-depth information and see special
|
|
demonstrations on the highlighted products of this year's show.
|
|
|
|
The UNIX Job Fair is a terrific opportunity for those attendess
|
|
looking for a new position, or anyone who wants to learn more about
|
|
the UNIX job market. Staffed by professional recruiters, attendees
|
|
can learn about hundreds of jobs currently available and improve their
|
|
resume and job-hunting skills.
|
|
|
|
The Sug East Exhibtion can Be Yours For The Low Price Of...
|
|
ABSOLUTELY NOTHING!!!
|
|
|
|
|
|
-------------------------------------
|
|
|
|
|
|
SUG East Tradeshow Registration
|
|
|
|
FREE registration for the SUG East Exhibition!
|
|
|
|
June 24-25, 1996
|
|
Marriott Copley Place
|
|
Boston, MA
|
|
|
|
|
|
REGISTRATION FORM
|
|
|
|
Mail, Email, or FAX registration to:
|
|
|
|
SUG East Registration
|
|
Sun User Group
|
|
1330 Beacon Street, Suite 344
|
|
Brookline, MA 02146 USA
|
|
|
|
Fax: (617) 232-1347
|
|
Email: sugeast@sug.org
|
|
WWW: http://www.sug.org/sug-east.html
|
|
|
|
Your registration must be received before June 10, 1996 in order to
|
|
receive your FREE pass to the SUG East Exhibition (there is a $25
|
|
registration fee for registrations processed on-site). Registration
|
|
for the conference is separate and requires an additional fee of $295
|
|
($395 after June 10th) with a $50 discount for SUG or Java-SIG
|
|
members. All conference registrants receive free passes to the
|
|
Exhibition.
|
|
|
|
For further information, contact sugeast@sug.org, visit us on the web
|
|
at http://www.sug.org or call Team SUG at (617) 232-0514. For
|
|
information about advertising, sponsorships, or exhibiting at SUG
|
|
East, contact Charles Sumner at sales@sug.org or the above phone
|
|
number.
|
|
|
|
Name: ____________________________________________
|
|
|
|
Title: ___________________________________________
|
|
|
|
Company: _________________________________________
|
|
|
|
Address: _________________________________________
|
|
|
|
_________________________________________
|
|
|
|
City: ____________________________________________
|
|
|
|
State: ___________________________________________
|
|
|
|
Zip/Postal Code: _________________________________
|
|
|
|
Country: _________________________________________
|
|
|
|
Email Address: ___________________________________
|
|
|
|
Phone: ___________________________________________
|
|
|
|
|
|
___ Please register me for the SUG East Exhibition and Trade Show
|
|
(FREE until June 10, otherwise fill out the section below)
|
|
|
|
___ Please register me for the SUG East Technical Conference
|
|
(fill out the section below - includes Exhibition pass)
|
|
|
|
|
|
------------------------+-------------------------------+-------+-------+
|
|
ITEM | Price | Qty. | Total |
|
|
------------------------+-------------------------------+-------+-------+
|
|
------------------------+-------------------------------+-------+-------+
|
|
ADVANCE SUG East | FREE (until June 10) | | |
|
|
Exhibition registration | | | |
|
|
------------------------+-------------------------------+-------+-------+
|
|
SUG East | $25 (after June 10) | | |
|
|
Exhibition registration | | | |
|
|
------------------------+-------------------------------+-------+-------+
|
|
----------------------------------------------------------------+-------+
|
|
ADVANCE SUG East | $295 (until June 10) | | |
|
|
Conference registration | | | |
|
|
------------------------+-------------------------------+-------+-------+
|
|
SUG East | $395 (after June 10) | | |
|
|
Conference registration | | | |
|
|
------------------------+-------------------------------+-------+-------+
|
|
Conference discount for | - $50.00 | |
|
|
SUG or Java-SIG Members | membership number: ______________ | |
|
|
----------------------------------------------------------------+-------+
|
|
----------------------------------------------------------------+-------+
|
|
TOTAL | |
|
|
| |
|
|
----------------------------------------------------------------+-------+
|
|
|
|
All payments must be in US dollars; Checks must be drawn on a US bank.
|
|
|
|
[ ] MasterCard [ ] Visa [ ] AMEX [ ] Check
|
|
|
|
Cardholder's Name:____________________________________________________
|
|
|
|
Credit Card Number:___________________________________________________
|
|
|
|
Expiration Date:______________________________________________________
|
|
|
|
Signature of cardholder:______________________________________________
|
|
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 18 Jun 1996 21:50:54 -0400 (EDT)
|
|
From: NOAH <noah@enabled.com>
|
|
Subject: File 7--8th FIRST Conf & Workshop on Computer Security
|
|
|
|
Date--Tue, 18 Jun 1996 10:11:07 -0700
|
|
From--Michael/Miguel J. Sanchez <miguel@boytoy.csd.sgi.com>
|
|
To--Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
|
|
|
|
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
This is just a reminder of the upcoming FIRST Conference and
|
|
Workshop this year. Please, forward this information onto
|
|
your constituencies and any other interested parties. For those
|
|
people with websites, please help advertise with a link to
|
|
one of the conference websites listed below. And lastly, if
|
|
it is possible to advertise the event in any advisories, bulletins
|
|
or newsletters, please do so, as this would be most appreciated.
|
|
|
|
######### SPECIAL NOTE SPECIAL NOTE SPECIAL NOTE ########
|
|
|
|
It is very important that if you have any plans to attend, please
|
|
register and make your hotel reservations *NOW*. This is very
|
|
important because of several factors:
|
|
|
|
1) Hotel occupancy is at all time high for this summer
|
|
and with the Usenix conference the week before, hotels
|
|
will be filled.
|
|
2) The hotel will only honor the FIRST conference rate
|
|
of $135/night till June 27, 1996. After this date, the rate
|
|
will only be provided on a space available basis.
|
|
The regular non-FIRST rate is $199/night.
|
|
3) The price of gas has increased greatly in the California
|
|
area and travel prices will be going up as the summer
|
|
travel season starts. People will use hotels more and
|
|
drive less.
|
|
4) Also the price of the conference does go up after July 13,
|
|
1996 and that date is quickly approaching.
|
|
|
|
|
|
|
|
- ---------------------------------------------------------------------
|
|
|
|
|
|
****************************************************
|
|
For the most up to date and complete information,
|
|
please see the URL hostsites
|
|
|
|
http://www.first.org/workshops/1996/
|
|
- or -
|
|
http://ciac.llnl.gov/firstconf/
|
|
****************************************************
|
|
|
|
|
|
The 8th FIRST Conference and Workshop on
|
|
Computer Security Incident Handling and Response
|
|
|
|
July 28-31, 1996
|
|
The Westin Hotel
|
|
Santa Clara, California
|
|
United States
|
|
|
|
|
|
___ _ _ ____ ____ ____ _ _ ____ ____ ____ ____ _ _ ____ ____
|
|
| |__| |___ | | | |\ | |___ |___ |__/ |___ |\ | | |___
|
|
| | | |___ |___ |__| | \| | |___ | \ |___ | \| |___ |___
|
|
|
|
|
|
The annual FIRST Conference and workshop event is the only event of its
|
|
kind. This event is focused on the field of computer security and most
|
|
specifically incident handling and response. Past conferences have been
|
|
held in Karlsruhe, Germany and Boston, Massachusetts, US. Each of these
|
|
conferences were international in scope and attendance with presentations
|
|
on the latest in vulnerability analysis, incident response, vulnerability
|
|
prevention, and general computer security. Additionally, these conferences
|
|
served as the foundation for the improvement of computer security worldwide
|
|
via sharing of goals, ideas, and information.
|
|
|
|
The 1996 8th Annual FIRST Conference promises to continue this ground
|
|
breaking work. Occurring in the heart of the Silicon Valley, home of the
|
|
microprocessor and the heartbeat of computing, this year's conference will
|
|
continue to promote FIRST organization goals of worldwide coordination
|
|
and cooperation.
|
|
|
|
|
|
_ _ _ _ _ ____ _ ____ ____ _ ____ ____ ___ __.
|
|
| | | |__| | | | [__ |___ | |__/ [__ | _]
|
|
|_|_| | | |__| | ___] | | | \ ___] | .
|
|
|
|
|
|
The Forum of Incident Response and Security Teams (FIRST), is an
|
|
international organization that brings together a variety of computer
|
|
security incident response teams. These teams include government
|
|
agencies, commercial companies, academic organizations and computer
|
|
vendors.
|
|
|
|
World-wide, FIRST aims to foster cooperation and coordination in
|
|
incident prevention, to prompt rapid reaction to incidents, and to
|
|
promote information sharing among members and the global community
|
|
at large.
|
|
|
|
Further information about the FIRST organization is available at
|
|
the FIRST WWW URL http://www.first.org/first/
|
|
|
|
|
|
_ _ _ _ _ _ _ ____ ____ _ _ ____ __.
|
|
| | | |__| \_/ | | | |\/| |___ _]
|
|
|_|_| | | | |___ |__| | | |___ .
|
|
|
|
|
|
Here are a few *extra* reasons to attend this year's FIRST Conference
|
|
|
|
The week prior to the FIRST Conference, The 6th USENIX UNIX
|
|
Security Symposium is being held in San Jose, CA. This means
|
|
that not only could you save money on airfare by staying over
|
|
a weekend, but you could attend two great security conferences
|
|
back to back. <http://www.usenix.org/sec96.html>
|
|
|
|
Meet other security professionals in the area of incident
|
|
and response.
|
|
|
|
Improve your security program with the ideas presented.
|
|
|
|
Save time searching for tools and resources.
|
|
|
|
Join in the sharing of a wide range of experience and knowledge.
|
|
|
|
Be a part of the "United Nations" of computer security organizations.
|
|
|
|
Bring your family and tour the Silicon Valley and San Francisco
|
|
Bay Area.
|
|
|
|
|
|
|
|
____ ____ ____ _ _ ___ ____
|
|
|__| | __ |___ |\ | | \ |__|
|
|
| | |__] |___ | \| |__/ | |
|
|
|
|
|
|
The following scheduled events are subject to change till the
|
|
time of the conference. For the most up to date information
|
|
please refer to the conference URL referenced at the beginning
|
|
of this document.
|
|
|
|
<650 lines snipped for brevity>
|
|
|
|
For the most up to date information, please refer to the FIRST conference
|
|
WWW page URL referenced at the top of this document.
|
|
|
|
The FIRST Conference, first.org, Inc., and Conference Management Services
|
|
want this conference event to be a rewarding event for all attendees. The
|
|
FIRST Conference, first.org, Inc., and Conference Management Services wish
|
|
to cooperate fully with any attendee who has a special need(s) or
|
|
requirement(s) or request(s). For information or assistance with
|
|
disability or special needs/services, please contact us via email,
|
|
fax, telephone or email.
|
|
|
|
|
|
Via postal mail: FIRST Conference
|
|
c/o Conference Mgmt Services
|
|
407 Chester Street
|
|
Menlo Park, CA 94025 U.S.A.
|
|
|
|
Via fax: +01 415-324-3150
|
|
Via email: merryb@vhdl.org
|
|
Via phone: +01 415-329-0579
|
|
|
|
|
|
____ ____ ____ ____
|
|
|__| |__/ |___ |__|
|
|
| | | \ |___ | |
|
|
_ _ _ ___ ____ ____ ____ ____ ___ ____
|
|
| |\ | | |___ |__/ |___ [__ | [__
|
|
| | \| | |___ | \ |___ ___] | ___]
|
|
|
|
|
|
The State of California and the San Francisco Bay Area have a great
|
|
deal of activities and sights to offer the visitor. The following
|
|
WWW URLs are provided to those that are interested in the area and
|
|
the multitude of things to see and experience.
|
|
|
|
San Francisco Bay Area and Beyond
|
|
http://www.hyperion.com/ba/sfbay.html
|
|
|
|
<< Santa Clara >>
|
|
|
|
Santa Clara
|
|
http://www.xpand.com/Santa_Clara/index.html
|
|
Great America Theme Park
|
|
http://www.rollercoaster.com/pga1/pga/
|
|
Intel Museum
|
|
http://www.intel.com/intel/intelis/museum/
|
|
Frys
|
|
http://frys.fry-s.com/
|
|
|
|
<< San Jose >>
|
|
|
|
Winchester Mystery House
|
|
http://www.netview.com/svg/tourist/winchest/
|
|
Egyptian Museum
|
|
http://artdirect.com/california/san.francisco/arts.univ/santa.clara/egypt
|
|
The Tech Museum of Innovation
|
|
http://www.thetech.org/
|
|
San Jose Museums
|
|
http://artdirect.com/california/san.francisco/museums/sbay/homepage
|
|
|
|
<<Monterey>>
|
|
|
|
Monterey Bay Aquarium
|
|
http://sapphire.cse.ucsc.edu:80/mb/mba/
|
|
http://www.usw.nps.navy.mil/~millercw/aq/
|
|
Access Monterey Peninsula
|
|
http://www.campgrounds.com/ctpa/ca/regions/cc/cceditor.htm
|
|
|
|
<< Mountain View >>
|
|
|
|
Magic Edge
|
|
http://www.cygnus.com/misc/magicedge.html
|
|
NASA AMES
|
|
http://www.arc.nasa.gov/amesinfo/visitors_center.html
|
|
|
|
<<San Francisco>>
|
|
|
|
49 Mile Scenic Drive
|
|
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/49mile.html
|
|
Alcatraz
|
|
http://www.nps.gov/alcatraz/index.html
|
|
Exploratorium
|
|
http://www.exploratorium.edu/
|
|
Golden Gate Bridge and National Recreation Area
|
|
http://www.nps.gov/parklists/index/goga.html
|
|
Golden Gate Park
|
|
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/ggp.html
|
|
Water's Edge
|
|
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/wharf.html
|
|
Neighborhoods
|
|
http://www.geninc.com/geni/USA/CA/San_Francisco/travel/neighborhoods.html
|
|
Marine World Africa USA
|
|
http://www.freerun.com/napavalley/outdoor/marinewo/marinewo.html
|
|
San Francisco Museums
|
|
http://artdirect.com/california/san.francisco/museums/sf/homepage
|
|
|
|
<<Palo Alto>>
|
|
|
|
Stanford University
|
|
http://www.stanford.edu/
|
|
Stanford Linear Accelerator Center
|
|
http://www.slac.stanford.edu/winters/pub/www/education/tour_slac.html
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.49
|
|
************************************
|
|
|