701 lines
29 KiB
Plaintext
701 lines
29 KiB
Plaintext
|
|
Computer underground Digest Wed Aug 21, 1996 Volume 8 : Issue 61
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.61 (Wed, Aug 21, 1996)
|
|
File 1--Seeking opinions of Mankato State University email policy
|
|
File 2--Commends requested on Mankato "email" policy
|
|
File 3--DOJ homepage hacked!!!
|
|
File 4--Re: USDOJ Hacked
|
|
File 5--Microsoft Acknowledges Flaw in Internet Browser
|
|
File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
|
|
File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Mon, 19 Aug 1996 10:30:32 -0500 (CDT)
|
|
From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>
|
|
Subject: File 1--Seeking opinions of Mankato State University email policy
|
|
|
|
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
At the beginning of the year, Mankato State University adopted the
|
|
following "email policy". Being a member of the student senate, I
|
|
expressed my concerns to the student government about the policy
|
|
(particularily the prohibitions on "political" speech), but it wasn't
|
|
politically feasible to challenge the policy as the student government had
|
|
approved it prior to my election (ie, I don't really thing they knew what
|
|
it was they were signing/signing-away). When I did bring it up to the
|
|
administration of the university, it was basicly reduced to "well, the
|
|
Senate said it was ok, so stick it" (well, that's somewhat paraphrased
|
|
:-).
|
|
|
|
Anyways, I'd like some opinions about this, as, in light of the Princeton
|
|
case (and the ACLU's response), I think I would like to attack this
|
|
policy. I would just like a little better feeling about where this policy
|
|
stands than the general "yucky" feeling I get.
|
|
|
|
Thanks for your time.
|
|
|
|
Robert Hayden
|
|
|
|
- -----------------------------
|
|
|
|
|
|
Mankato State University
|
|
|
|
MANKATO STATE UNIVERSITY
|
|
ELECTRONIC MAIL TRANSMISSION REGULATION
|
|
|
|
|
|
|
|
|
|
Article I. Objective
|
|
|
|
|
|
To ensure that electronic mail transmissions between and among MSU
|
|
authorized "E-mail" users are consistent with state statutes limiting
|
|
the use of state services and equipment to state business purposes
|
|
only. This effort is consistent with existing practices governing
|
|
other forms of communication on campus including telephone calls,
|
|
bulletin board postings, the mass distribution of promotional flyers,
|
|
and the use of intra-campus mail services.
|
|
|
|
|
|
Minnesota Statutes Chapter 43A.38, Subd. 4 - Use of State Property
|
|
An employee shall not use or allow the use of state time, supplies
|
|
or state owned or leased property and equipment for the employee's
|
|
private interests or any other use not in the interest of the state,
|
|
except as provided by law.
|
|
|
|
Minnesota Statutes Chapter 43A.39, Subd. 2 - Noncompliance
|
|
Any employee who intentionally fails to comply with the provisions
|
|
of Chapter 43A shall be subject to disciplinary action and action
|
|
pursuant to Chapter 609. An appointing authority shall report in
|
|
writing to the legislative auditor when there is probable cause to
|
|
believe that a substantial violation has occurred. Any person
|
|
convicted of a crime based on violations of this chapter shall be
|
|
ineligible for appointment in the civil service for three years
|
|
following conviction.
|
|
|
|
Minnesota Statues Chapter 609.87 thru 609.8911 - Computer Crime
|
|
[Statute deals with definitions; destructive computer programs;
|
|
intentional damage to computers, computer systems, computer
|
|
networks, computer software, etc.; theft of services and equipment;
|
|
unauthorized computer access; gross misdemeanor and misdemeanor
|
|
criminal penalties; and reporting violations.]
|
|
|
|
University Facilities and Services - Restricted Use
|
|
Faculty and staff are to use University facilities and services for
|
|
University business only. [Mankato State's Employee Handbook -
|
|
General Policies Section]
|
|
|
|
Professional and Ethical Standards
|
|
University equipment shall not be used by employees for personal use
|
|
without notice to and the written consent of his/her employer . . .
|
|
. [State University System Regulations Article 2.4] Similar language
|
|
is contained in Articles 4 and 27 of the IFO Labor Agreement and
|
|
Article 20 Section C of the MSUAASF Agreement.
|
|
|
|
|
|
|
|
Students, who are not already on-campus part-time employees covered by
|
|
the above statute citations, shall adhere to all E-mail policies and
|
|
regulations contained herein. It is the intent of this E-mail
|
|
regulation to cover all E-mail users within the campus community.
|
|
|
|
Article II. Regulation
|
|
|
|
|
|
The electronic mailing privilege is provided to members of the
|
|
University community to enhance their ability to quickly and
|
|
conveniently send and receive written communications and documents for
|
|
the purpose of conducting University business. Use of the privileges
|
|
for personal gain and for non-University related business is
|
|
prohibited. (The University continues to invest significant amounts of
|
|
its budget in the maintenance and improvement of electronic
|
|
transmission capability, in addition to the enormous past outlays
|
|
which have been made for computer hardware, software, and cabling.)
|
|
|
|
SECTION 1. FOR PROFIT USE PROHIBITED : NONPROFIT USE REQUIRE PRIOR APPROVAL
|
|
|
|
|
|
For profit organizations are strictly prohibited from the use of
|
|
University electronic mail services. (University contract vendors like
|
|
Wallace's University Bookstore and the ARAMARK food service shall be
|
|
provided access to the University electronic mail system only upon
|
|
agreement to pay MSU for these state provided services.) Non-profit
|
|
organizations may be allowed access only if the transmission has been
|
|
approved in advance by the University Operations Vice President (or
|
|
designee). Authorization for such access by a non-profit organization
|
|
will hinge on how closely it relates to the "state business use"
|
|
standard and the organization's traditional or direct tie to the
|
|
University (e.g., Mankato State University Foundation, United Way,
|
|
etc.).
|
|
|
|
SECTION 2. ACADEMIC FREEDOM PRINCIPLES APPLY
|
|
|
|
|
|
|
|
Commonly understood principles of academic freedom shall be applied to
|
|
the administration of information transmitted by E-mail.
|
|
|
|
SECTION 3. EXTERNAL TRANSMISSIONS TO MSU E-MAIL USERS
|
|
|
|
|
|
The ability of the University to monitor and regulate incoming
|
|
Internet transmissions is almost impossible. If unsolicited or
|
|
unwanted Internet transmissions are received, E-mail users may contact
|
|
their mail system manager so that an effort can be made to ensure that
|
|
such transmissions do not reoccur from the same source.
|
|
|
|
SECTION 4. POLITICAL USE OF E-MAIL PROHIBITED
|
|
|
|
|
|
Political transmissions are prohibited. This would include
|
|
transmissions which advocate the election of particular candidates for
|
|
public office at either the federal, state, or local level. Also
|
|
banned are those messages that advocate support of or opposition to
|
|
any particular referendum proposal that will be decided by the voters
|
|
during a general or special election affecting the public at large.
|
|
|
|
SECTION 5. COLLECTIVE BARGAINING UNITS, RECOGNIZED STUDENT GROUPS - E-MAIL
|
|
TRANSMISSIONS ALLOWED
|
|
|
|
|
|
This regulation is not to be interpreted as prohibiting transmissions
|
|
protected by existing employee collective bargaining agreement
|
|
provisions dealing with mailing privileges nor shall it be used to
|
|
deny access to recognized student organizations and related student
|
|
service departments who wish to announce upcoming events that may be
|
|
of interest to members of the University community.
|
|
|
|
SECTION 6. GENERAL STANDARDS AND GUIDELINES
|
|
1. Personal uses of E-mail which are prohibited include, but are not
|
|
limited to: chain letters; recipes; "garage sale" announcements;
|
|
solicitation or requests for contributions (e.g.needy family,
|
|
special relief efforts, etc.); commercial advertisements; and
|
|
advertisements for events or items for sale or rent that result in
|
|
personal gain or revenue for non-University departments and
|
|
programs or unapproved organizations as prohibited by provisions
|
|
in Article II, Section 1 of this policy.
|
|
2. E-mail users are asked to take care in directing their messages to
|
|
large audiences and to avoid sending repeats of the same messages
|
|
as "reminders." Concerns also exist that many messages sent to all
|
|
MSU mail users could be better targeted to smaller groups of
|
|
users.
|
|
3. E-mail transmissions shall not be used in any way which violate
|
|
Higher Education Board or University policies regarding
|
|
harassment. The University is not responsible for transmissions
|
|
which are libelous or defamatory.
|
|
4. A user's password is the key to the E-mail network and as such
|
|
users are advised that they are responsible for the security of
|
|
their respective password. There are major risks when a user's
|
|
password is known to others. Transmission made using that password
|
|
are assumed to be initiated by the password's user, though
|
|
managers of E-mail systems who investigate complaints shall not
|
|
automatically assume that the author of an offending transmission
|
|
is the password's user.
|
|
5. It is not the intent of this regulation to interfere with private
|
|
communications between individuals.
|
|
6. E-mail managers and network system administrators are expected to
|
|
treat the contents of electronic files as private and
|
|
confidential. Any inspection of electronic files, and any action
|
|
based upon such inspection, shall be governed by applicable
|
|
federal and state laws and by University policies.
|
|
|
|
Article III. Sanctions for Violations
|
|
|
|
|
|
Complaints by any user receiving electronic transmissions through Data
|
|
General, Microsoft Mail, and existing VAX services may be submitted to
|
|
any manager of a major E-mail system or directly to the University
|
|
Operations Vice President's Office. An E-mail manager will investigate
|
|
the complaint and make a determination on its validity. If a violation
|
|
did occur the E-mail manager shall inform the employee's immediate
|
|
supervisor and make a recommendation to implement one of the following
|
|
sanctions. Severity of the sanction is dependent on the nature of the
|
|
violation and history, if any, of past violations. The employee's
|
|
supervisor has five work days in which to approve, and or modify, the
|
|
E-mail system manager's recommendation. If no action occurs the E-mail
|
|
manager's recommendation is forwarded to the University Operations
|
|
Vice President for disposition.
|
|
|
|
SANCTIONS - DEPENDENT ON SEVERITY OF VIOLATION AND/OR HISTORY OF PAST
|
|
VIOLATIONS
|
|
* Verbal warning.
|
|
* Discipline pursuant to appropriate collective bargaining or other
|
|
employment regulations; discipline pursuant to appropriate student
|
|
conduct codes.
|
|
* Warning letter to the violator formally notifying of additional
|
|
sanctions if violations continue.
|
|
* Suspension of electronic mail privileges for five work days. The
|
|
user would continue to receive electronic mail but would not be
|
|
able to read it until after the suspension of privileges is lifted
|
|
and a new electronic mail password is issued by the appropriate
|
|
E-mail manager.
|
|
* Penalty consistent with federal or state law and/or employee
|
|
collective bargaining agreements. (Could involve referral of
|
|
matter to criminal authorities..)
|
|
|
|
APPEALS
|
|
|
|
|
|
Applicable appeal procedures may be implemented consistent with
|
|
employee bargaining unit contracts or student conduct codes.
|
|
|
|
Article IV. Electronic Mail Oversight Team
|
|
|
|
|
|
The "Electronic Mail Oversight Team" shall review e-mail practices,
|
|
procedures and policies and may make recommendations for improvement
|
|
to the Vice President for University Operations. The ten member
|
|
oversight team include the managers of these major e-mail systems:
|
|
* University Operations server (Microsoft Mail)
|
|
* P.E.T. server (Microsoft Mail)
|
|
* Student Develop. Prgms. & Activities server (Microsoft Mail)
|
|
* MSUS/PALS servers (Microsoft Mail)
|
|
* College of Science, Eng. & Tech. server (Microsoft Mail)
|
|
* Krypton server (Academic DEC with Unix Operating System)
|
|
* AS/400 server (Academic IBM System)
|
|
* MSMail 4,5,6,7,8, Computer Svcs., ACTS, Admin., MSU Academic, &
|
|
Memorial Library servers (Microsoft Mail)
|
|
* VAX1 server (MSU Academic VAX)
|
|
* Data General server
|
|
|
|
|
|
The team shall be convened at least twice annually and chaired by a
|
|
member elected by and from among the panel members.
|
|
|
|
Article V. Confidentiality and/or Privacy
|
|
|
|
Users are advised that the privacy of data stored or sent on the
|
|
system cannot be guaranteed; furthermore, there are a number of
|
|
circumstances in which data stored on the system will be accessed by
|
|
authorized individuals. Those circumstances include, but are not
|
|
limited, to the following:
|
|
* Performing administrative tasks, such as: identifying and pursuing
|
|
breaches of security mechanisms; maintaining the integrity or
|
|
operational state of the E-mail and related computer systems;
|
|
collecting aggregate data; etc. The individual authorizing any
|
|
search of a user's data must have reasonable grounds for
|
|
suspecting that the search will reveal evidence that the user has
|
|
violated a specific University, Higher Education Board policy,
|
|
state or federal law, or has committed work related misconduct.
|
|
The search of a user's data must be reasonably related in scope to
|
|
the suspicion which generated this search.
|
|
* Monitoring use of the E-mail and related computer systems to
|
|
determine whether the polices of the University, Higher Education
|
|
Board, and/or state or federal law have been broken.
|
|
* Monitoring use of the E-mail and related computer systems when it
|
|
is necessary so that the University can provide its services or
|
|
protect the rights or property of the University.
|
|
|
|
Meet and Confers Held
|
|
|
|
|
|
Date Proposal Submitted/Reviewed
|
|
|
|
IFO Faculty Association September 14, 1995 and October 12, 1995
|
|
MSUAASF Meet and Confer September 18, 1995 and October 16, 1995
|
|
Classified Employee Meet and Confer September 28, 1995
|
|
Student Association Meet and Confer October 12, 1995
|
|
|
|
Approved
|
|
|
|
|
|
_____________________________________________ ___________________
|
|
Mankato State University President Date
|
|
|
|
|
|
|
|
Document signed by Richard R. Rush on 1/30/1996
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 20 Aug 1996 09:18:16 -0700 (PDT)
|
|
From: "Carl M. Kadie" <kadie@eff.org>
|
|
Subject: File 2--Commends requested on Mankato "email" policy
|
|
|
|
I've never seen such a contradictory academic policy.
|
|
|
|
It says that "private" use is allowed, but that "personal" use is banned.
|
|
|
|
It says that academic freedom principles prevail, but that political
|
|
use is banned.
|
|
|
|
It says that searches must be based on "reasonable grounds for
|
|
suspecting that the search will reveal evidence that the user has
|
|
violated a specific [policy]", but also allows general suspensionless
|
|
"monitoring use of the E-mail [...] to determin whether the [polices]
|
|
have been broken.
|
|
|
|
[There must be a very interesting story about the creation of
|
|
a policy that contracts itself in alternating paragraphs.]
|
|
|
|
In any case, I believe the policy as it stands is illegal because:
|
|
It is unconstitutionally vague (and contradictory). There is no
|
|
way that a reasonable person could know if he or she was
|
|
violating the policy.
|
|
It applies employment rules to students. Students are not employees.
|
|
(As the U. of Wisconsin and U. of Michican found out in federal
|
|
court).
|
|
It bans protected political speech. As the ACLU letter to Princeton
|
|
pointed out, political speech not on behalf of the university
|
|
can not be singled out censorship.
|
|
It seems to authorize illegal searches.
|
|
|
|
Why all this trouble? I'm sure the University already has general
|
|
rules for speech via University resoures, media, forums. Don't
|
|
make email a second-class citizen, treat the same as traditional
|
|
forums.
|
|
|
|
- Carl
|
|
|
|
ANNOTATED REFERENCES
|
|
|
|
(All these documents are available on-line. Access information follows.)
|
|
|
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/political-speech">
|
|
law/political-speech
|
|
=================</a>
|
|
* Expression -- Academic - Political Speech
|
|
|
|
A letter from the ACLU to Princeton University explaining why a ban on
|
|
on-line political speech is unnecessary and perhaps illegal.
|
|
|
|
=================<a href="http://www.eff.org/CAF/faq/email.privacy.html">
|
|
faq/email.privacy
|
|
=================</a>
|
|
* Email -- Privacy
|
|
|
|
q: Can (should) my university monitor my email?
|
|
|
|
a: Ethically (and perhaps legally) email communications should have
|
|
...
|
|
|
|
=================<a href="http://www.eff.org/CAF/faq/email.policies.html">
|
|
faq/email.policies
|
|
=================</a>
|
|
* Email -- Policies
|
|
|
|
q: Do any universities treat email and computer files as private?
|
|
|
|
a: Yes, many universities treat email and computer files as private.
|
|
...
|
|
|
|
=================
|
|
=================
|
|
|
|
If you have gopher, you can browse the CAF archive with the command
|
|
gopher gopher.eff.org
|
|
|
|
These document(s) are also available by anonymous ftp (the preferred
|
|
method) and by email. To get the file(s) via ftp, do an anonymous ftp
|
|
to ftp.eff.org, and then:
|
|
|
|
cd /pub/CAF/law
|
|
get political-speech
|
|
cd /pub/CAF/faq
|
|
get email.privacy
|
|
cd /pub/CAF/faq
|
|
get email.policies
|
|
|
|
To get the file(s) by email, send email to ftpmail@decwrl.dec.com
|
|
Include the line(s):
|
|
|
|
connect ftp.eff.org
|
|
cd /pub/CAF/law
|
|
get political-speech
|
|
cd /pub/CAF/faq
|
|
get email.privacy
|
|
cd /pub/CAF/faq
|
|
get email.policies
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 19 Aug 1996 05:29:19 -0700 (PDT)
|
|
From: Declan McCullagh <declan@eff.org>
|
|
Subject: File 3--DOJ homepage hacked!!!
|
|
|
|
((MODERATORS' NOTE: To see what the DoJ page looked like during
|
|
the "hack," point your browser to:
|
|
|
|
lynx http://www.doobie.com/~baby-x/usdoj ))
|
|
|
|
---
|
|
|
|
From--"L. G. Shirley" <lgshirley@mail.worldnet.att.net>
|
|
Date--17 Aug 1996 22:47:59 GMT
|
|
|
|
About 10PM last night I clicked on my bookmark for the Federal Gov't and
|
|
then selected, by random, the Dept of Justice.
|
|
|
|
|
|
http://justice2.usdoj.gov/
|
|
|
|
|
|
SURPRISE!!!!!!!!!! Someone had made a few changes, For one it is
|
|
now called the Department of Injustice. You are immediately
|
|
greeted by the Nazi swastika all over your screen's background.
|
|
|
|
A flag w/the symbol is apparent. George Washington's picture is
|
|
captioned with his words, "Move my grave to a free country! This
|
|
rolling is making me an insomniac".
|
|
|
|
Janet Reno's portrait has been replaced by Hitler's. And a flag
|
|
now bears the Nazi symbol. She is now called Attorney General
|
|
Furher.
|
|
|
|
There is plenty of nudity and the many links will take you to
|
|
places you may never have been before. I don't think we're in
|
|
Kansas anymore Toto!
|
|
|
|
I have no clues how it was done or when. My guess is someone
|
|
changed all the links to the DOJ page to another one, the one you
|
|
see when you click on the DOJ's homepage.
|
|
|
|
I worked today and when I came home and tried to get back to the
|
|
DOJ's page, no luck. Must be a major overload <grin> of people
|
|
trying to get to the link of women clad in, well, next to nothing
|
|
and tied with rope!
|
|
|
|
I don't think the author will make any brownie points w/women. He
|
|
hacked the homepage they have w/the DOJ on violence against
|
|
women. I'm not condoning such action and violence is a very
|
|
serious issue but whoever did the hack was also very serious.
|
|
|
|
He changed a Clinton speech on affirmative action and insulted
|
|
blacks with his choice of words. There is a lot of rambling about
|
|
the internet and the Gov't taking away our rights on it.
|
|
|
|
The author has a interesting slant on things. This should be
|
|
enough of a warning if you're easily offended by racism, hate,
|
|
foul language, porn on the net, and general crudeness. Don't go
|
|
there.
|
|
|
|
I would like to know just how this was done, any ideas? Is it
|
|
that easy to hack someones homepage?
|
|
|
|
I wonder how long it'll be before this homepage link is removed
|
|
and can they find who did the evil deed? Two months on the Net
|
|
and just when I think I'd seen it all, wow.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 19 Aug 1996 04:49:58 -0700 (PDT)
|
|
From: Declan McCullagh <declan@eff.org>
|
|
Subject: File 4--Re: USDOJ Hacked
|
|
|
|
....<intro deleted -- cud>
|
|
|
|
August 18, 1996
|
|
|
|
Hacker Vandalizes Web Site
|
|
Of U.S. Justice Department
|
|
|
|
By JOHN O'NEIL
|
|
The New York Times / National News
|
|
|
|
WASHINGTON -- A computer hacker vandalized the Internet home
|
|
page of the Department of Justice on Friday night, posting
|
|
obscenities and anti-government graffiti, a department official
|
|
said Saturday.
|
|
|
|
The Justice Department's site on the World Wide Web was shut
|
|
down early Saturday after members of the public called to
|
|
report that the site had been altered, apprarently by a hacker
|
|
or hackers who posted nazi insignia, nude photographs and an
|
|
attack on the Communications Decency Act. A department
|
|
spokesman, Joe Krovisky, said that the site would remain off
|
|
line while the department's technical experts assess its
|
|
security.
|
|
|
|
Krovisky said that the system the hacker broke into was
|
|
separate from the department's internal computer system, which
|
|
contains highly sensitive information about criminal cases and
|
|
investigations. "There's no way that the internal department
|
|
information could have been affected" by a hacker who gained
|
|
access to the information presented on the web site, he said.
|
|
"That would have been impossible."
|
|
|
|
The hacker replaced information on the home page with
|
|
obscenities, graffiti and anti-government statements, he said,
|
|
but declined to give details.
|
|
|
|
The Associated Press reported that the site's title had been
|
|
changed to "United States Department of Injustice," next to a
|
|
red, black and white flag bearing a swastika. The text of the
|
|
page was written over a background of gray swastikas, and at
|
|
the top declared in red letters: "This page is in violation of
|
|
the Communications Decency Act."
|
|
|
|
The page included color pictures of George Washington, Adolf
|
|
Hitler, who is identified as the attorney general, and a
|
|
topless Jennifer Aniston, one of the stars of NBC's "Friends,"
|
|
the Associated Press said. Other sexually explicit images were
|
|
also shown.
|
|
|
|
[...]
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 18 Aug 1996 23:25:50 -0400 (EDT)
|
|
From: Noah <noah@enabled.com>
|
|
Subject: File 5--Microsoft Acknowledges Flaw in Internet Browser
|
|
|
|
From -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Sun, 18 Aug 1996 13:00:21 -0500
|
|
From--Frosty <sotmesc@datasync.com>
|
|
|
|
The Sun Herald
|
|
18 August 1996
|
|
|
|
MICROSOFT ACKNOWLEDGES FLAW IN INTERNET BROWSER
|
|
|
|
Redmond, Wash. - Microsoft Corp.'s Internet Explorer 3.0, its
|
|
much-promoted new software for browsing the Internet, has a flaw
|
|
that affects its performance on some World Wide Web sites, a company
|
|
executive says.
|
|
|
|
The new version of the browser launched Monday to compete with
|
|
Netscape Communications Corp.'s Navigator, had been downloaded for
|
|
free by more than 100,000 people by Friday, said Bill Koszewski, a
|
|
Microsoft product manager.
|
|
|
|
The flaw is a bug in the software that will slow users trying
|
|
to access certain Web sites that require their name and a password,
|
|
he said.
|
|
|
|
-Commentary: Isn't this the same standard of slipshod performance
|
|
that the world expects form Microsoft ?!?!
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 19 Aug 1996 14:47:59 +0000
|
|
From: e.tan@UCL.AC.UK(Emerson Tan)
|
|
Subject: File 6--Re: Cu Digest, #8.60--Sun, 18 Aug 96
|
|
|
|
Re: CuD 8.60 File 6--UK ISPs Restrict cyberporn
|
|
>
|
|
>U.K. INTERNET PROVIDERS PLAN TO RESTRICT CYBERPORN
|
|
>
|
|
This issue seems to have finally pointed out to the public in the UK just
|
|
how difficult it is to stamp out internet pronography. It has also pointed
|
|
out a major deficency in the legal systems of the nations that are on the
|
|
net, namely that of cross border legisaltion. Without some kind of cross
|
|
border legislation it is impossible to control this kind of crime. It is up
|
|
to the governements and judical systems of the nation where these criminals
|
|
reside to adequately prosecute those that distribute illiegal porn. The
|
|
problem is that currently those in authority still veiw this a technical
|
|
problem for which there is an easy cheap technical fix.
|
|
|
|
Indeed there is a technical fix, but it runs counter to the entire idea of
|
|
the net and can be used for all manner of control purposes. This is to put
|
|
the entire nation behind a firewall as in the case of singapore. But still
|
|
the possiblity exists that illegal comunications links could spring up
|
|
using such things as satalites and dial up modems both legitimate
|
|
comunications technologies which are hard to regulate, without being
|
|
precieved as being excessive.
|
|
|
|
In short there is no other solution but to prosecute purveors of offensive
|
|
materials 'in real life' and the burden for this task falls on the
|
|
judicaries of the world. It also calls for unprecedented co-operation of
|
|
law enforcement agencies of the world, rather than increased pressure on
|
|
the internet service providers which will only serve to put in plave
|
|
legislation which could ultimately snuff out the cosmopolitain nature of
|
|
the net, replacing it with a bland set of corporate offerings.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.61
|
|
************************************
|
|
|