800 lines
39 KiB
Plaintext
800 lines
39 KiB
Plaintext
|
|
Computer underground Digest Sun Nov 17, 1996 Volume 8 : Issue 81
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.81 (Sun, Nov 17, 1996)
|
|
|
|
File 1--Review of Charles Platt's ANARCHY ONLINE
|
|
File 2--Some Excerpts from ANARCHY ONLINE
|
|
File 3--"NetLaw: Your Rights in the Online World" by Lance Rose
|
|
File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly
|
|
File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd)
|
|
File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996)
|
|
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sat, 16 Nov 96 15:53 CST
|
|
From: Cu Digest <cudigest@sun.soci.niu.edu>
|
|
Subject: File 1--Review of Charles Platt's ANARCHY ONLINE
|
|
|
|
ANARCHY ONLINE. By Charles Platt. New York: Black Sheep Books.
|
|
368 pp. $24.95 (cloth).
|
|
|
|
Those wishing to understand the history, development, and
|
|
background of the "computer underground" generally refer to Cliff
|
|
Stoll's THE CUCKOO'S EGG, Katie Hafner and John Markoff's
|
|
CYBERPUNK, and Bruce Sterling's HACKER CRACKDOWN as among the
|
|
most useful. Now, Platt's ANARCHY ONLINE joins this select set.
|
|
|
|
Unlike the other volumes, which use the story of legal
|
|
entanglements to organize the information in chronological
|
|
sequence, Platt provides a smorgasbord of narratives covering
|
|
topics (piracy, net porn), politics (legislative battles), law
|
|
(suits and prosecutions), personalities (pick your favorite),
|
|
events, movements, and history.
|
|
|
|
Dividing his material into two sections, "Netcrime" and
|
|
"NetSpeech," Platt offers the reader nearly 100 narratives mixed
|
|
with rich description, occasional political commentary, and a
|
|
dose of social critique as way of describing salient issues in
|
|
Cyberspace.
|
|
|
|
His introductory chapter of "A typical hacker bust" describes in
|
|
a few pages the apprehension of the "dreaded Hollywood Hacker,"
|
|
whose home was raided in 1990 by law enforcement agents, guns
|
|
drawn with a television crew in tow, for the heinous crime of
|
|
"borrowing" an acquaintance's password and logging into a
|
|
computer account without authorization. Although the "Hollywood
|
|
Hacker's" offense was trivial, the incident illustrates the
|
|
abysmal lack of familiarity of computer technology and "hacking"
|
|
by law enforcement agents. It also provides Platt with an
|
|
effective entry point into the emergence of the "computer
|
|
underground."
|
|
|
|
With Platt as our tour guide, our journey through the underground
|
|
includes a panorama of "hacker BBSes, some we see from afar, some
|
|
from the inside. Occasionally, we stop long enough to meet former
|
|
"hackers" ("Dark Phiber," "Lord Digital," "Dead Lord," "Seth")
|
|
and "hacker"-chasing agents (Scott Charney); Security wizards
|
|
(Crypto-guru Phil Zimmermann, Dan Farmer, Robert Steele, the
|
|
original "agent Steele" of CIA, not "hacking," fame, as federal
|
|
agents learned to their confused embarrassment at a CFP
|
|
conference several years ago); and an array of Net personalities.
|
|
|
|
Platt provides information from Kevin Mitnick's some-time
|
|
partner "Roscoe," who suggests that much of the personal
|
|
information in CYBERPUNK was a spoof concocted by Mitnick and
|
|
"Roscoe." He examines how state laws have curtailed Net
|
|
liberties. He brings back names from the past, including Lorne
|
|
Shantz, Bob Emerson, and Jake Baker. Martin Rimm returns in a
|
|
scathing section that describes his "Netporn study" and Mike
|
|
Godwin's perseverance in destroying the credibility of both the
|
|
study and the author.
|
|
|
|
Particularly interesting are the dozens of photographs of
|
|
previously faceless Net personalities. Hackers, law enforcement
|
|
agents, and others ranging from Cyberporn protagonists Philip
|
|
Elmer-Dewitt/Martin Rimm and Godwin/Donna Hoffman; Anti-indecency
|
|
warrior Cyberangel Colin (Gabriel) Hatcher and free-speech
|
|
advocate Declan McCullagh; Joel Furr (sans t-shirt); and many,
|
|
many others.
|
|
|
|
Given Platt's literary and extensive writing background, it's not
|
|
surprising that ANARCHY ONLINE is exceptionally well written, and
|
|
while he on occasion seems tempted to move into political
|
|
polemics, he is generally successful in pulling back. Given the
|
|
magnitude of detail he presents, his accuracy is impressive,
|
|
perhaps because he took pains to contact many of his subjects
|
|
before publication to review his commentary.
|
|
|
|
Readers who prefer extended symphonies to short riffs and three
|
|
minute air-play routines might find the staccato style of brief
|
|
tastes and images frustrating (Platt, I should mention, never
|
|
mixes metaphors). But, the breadth and detail of this volume
|
|
makes it well worth reading, and it will prove an invaluable
|
|
reference source. And, it's currently reasonably priced.
|
|
|
|
The is one problem with obtaining the book. ANARCHY ONLINE's
|
|
hardcover edition is available by mail order only.
|
|
|
|
FOR *CREDIT CARD ORDERS ONLY* DIAL 1-800-879-4214.
|
|
|
|
Cover price is $24.95. BUT netizens get almost a 50 percent
|
|
discount! If you say "I heard about it through the Internet" you
|
|
pay only $12.95 (plus shipping).
|
|
|
|
Extracts from the book are freely available for inspection at
|
|
http://charlesplatt.com
|
|
|
|
The paperback will be out next March from HarperCollins and will
|
|
be distributed through regular bookstores. (But it will probably
|
|
cost more than $12.95).
|
|
It would make a great Christmas present or, better, a
|
|
supplemental text for the classroom.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 16 Nov 96 15:43 CST
|
|
From: Cu Digest <cudigest@sun.soci.niu.edu>
|
|
Subject: File 2--Some Excerpts from ANARCHY ONLINE
|
|
|
|
+-----------------------------------------------------+
|
|
|
|
Maverick Security Expert Advocates
|
|
Government Intervention to Secure the Internet
|
|
|
|
Robert Steele spent most of his working life in various
|
|
sections of the government bureaucracy until, at the age of
|
|
forty-two, he finally decided to go it alone. "I was deputy
|
|
director at the Marine Corps Intelligence Center," he says,
|
|
relaxing on the couch in the comfortable, traditionally
|
|
furnished living room of his home, which is nestled in wooded
|
|
country in Oakton, Virginia. With nicely bound books, a
|
|
couple of antique clocks, and elegant furniture, it's a
|
|
peaceful refuge within easy reach of his former employers at
|
|
the CIA, and no more than an hour's drive from the center of
|
|
Washington, D.C. But there is nothing peaceful or genteel
|
|
about Steele himself.
|
|
"I had spent eighteen years as a professional
|
|
intelligence officer," he says, "and discovered that a whole
|
|
lot of classified data wasn't really there. We just had a
|
|
whole bunch of facts about Soviet missile silos. Nothing on
|
|
the Third World, for instance. At the Marine Corps
|
|
Intelligence Center we were spending $3 million a year on a
|
|
system for accessing classified data from the CIA, NSA
|
|
[National Security Agency], and DIA [Defense Intelligence
|
|
Agency]--and I found that for $25,000 a year I could get
|
|
better data from open sources."
|
|
By "open sources" he means academic studies, published
|
|
papers, books, and databases accessible by private citizens
|
|
via the Internet, with no security clearance necessary.
|
|
"In 1992," Steele continues in an abrasive, rapid-fire
|
|
style, "I had made open sources a policy issue at
|
|
congressional level by working with Hill staffers who then
|
|
forced Bob Gates, director of Central Intelligence [DCI], to
|
|
set up an open-sources task force to review how he did things
|
|
and come up with recommendations for improving them."
|
|
Disgusted by the report that resulted, Stele quit and
|
|
decided to go it alone. He started sponsoring his own
|
|
conferences, the first of which was hugely successful.
|
|
Among the speakers were the chief of staff of the
|
|
Defense Intelligence Agency, a former science advisor to the
|
|
President, and the deputy director of the CIA. Attendees
|
|
included people from the intelligence community, John Perry
|
|
Barlow (cofounder of the Electronic Frontier Foundation), and
|
|
an assortment of hackers. The event gave Steele instant
|
|
notoriety. "I became a public figure," he says.
|
|
Encouraged by his successes, he became more ambitious.
|
|
"My vision expanded," he says. "I wanted to help the American
|
|
economy make better use of open sources. I became concerned
|
|
with information security. Finally it seemed to me that the
|
|
only answer was to devise and implement a national
|
|
information strategy. I'm hoping that Gingrich or Gore is
|
|
going to use that phrase--"national information strategy"--in
|
|
a speech within the next two months, because I'm working with
|
|
various staffers on the Hill and in the administration whom I
|
|
really respect. My ideas are bipartisan."
|
|
Even though Steele became personally disillusioned with
|
|
his area of government, he still sees government policy as
|
|
the only way of taming anarchy online and safeguarding
|
|
systems from intruders.
|
|
"The role of government is to inform the citizenry about
|
|
security problems that exist," he says. "Then it can
|
|
establish standards to which the computer industry can rise."
|
|
But why is a government policy needed? Why can't this
|
|
problem be tackled by private industry?
|
|
"The communications and computing industries have been
|
|
criminally negligent, have not been held to any standards of
|
|
adequate engineering. If we don't have a national information
|
|
strategy that provides standards and due diligence law, we
|
|
will never be able to protect ourselves. The first
|
|
fundamental step is that our nation as a whole must be
|
|
committed to communications security."
|
|
I'm beginning to feel stuck in government-speak. What
|
|
exactly does he mean by due diligence?
|
|
"Due diligence is defined by regulation. Right now there
|
|
is no due diligence requirement for communications and
|
|
computing security. Stockholders are being screwed. They
|
|
don't realize it, but they're paying a price for corporate
|
|
management not protecting proprietary information properly.
|
|
There's no law, no regulations, and no public perception." He
|
|
pauses for emphasis. "This, I think, is the most fundamental
|
|
single weakness in this nation."
|
|
There's not a hint of doubt in Steele, and not a lot of
|
|
false modesty, either. In 1994 he wrote a bill that was
|
|
introduced in the Senate to establish his national
|
|
information strategy, which would be managed by a chief
|
|
information officer to be appointed by the Vice President.
|
|
Steele would have liked Paul Strassman to hold that position.
|
|
For himself he thought that a suitable title might be
|
|
director of national intelligence, with a subordinate
|
|
director of classified intelligence and a subordinate
|
|
coordinator for public information who would also be director
|
|
of a national information foundation that would encourage the
|
|
free flow and accessibility of data through the nation. The
|
|
whole package was supposed to cost half a billion dollars in
|
|
the first year, rising to two billion in the fourth year and
|
|
maintaining that level thereafter.
|
|
The bill, of course, was never signed into law, and
|
|
Steele admits that it had "zero impact." I suggest to him
|
|
that the cost of it alone made it impractical, but he waves
|
|
aside that objection. "If you're not talking in billions, no
|
|
one takes you seriously. When you have trillion-dollar
|
|
federal budgets, a program worth less than a billion is not
|
|
significant because it's not going to have an impact on the
|
|
nation as a whole.
|
|
"The typical computer network," he goes on, "isn't like a
|
|
house with windows, doors, and locks. It's more like a gauze
|
|
tent encircled by a band of drunk teenagers with lit
|
|
matches."
|
|
At the same time, though, he still insists that hackers
|
|
are not a cause for concern. "It is clear that eighty percent
|
|
of bad things happening to computers are being done by
|
|
authorized users doing unauthorized things. This was the
|
|
conclusion reached by the Department of Defense during a one-
|
|
year study. Hackers are just our warning signal, the sneeze
|
|
that tells you you have a cold. Hackers are not a threat.
|
|
Ignorance is the greatest threat. The individual, the
|
|
organization, the nation that doesn't understand its
|
|
electronic vulnerabilities is essentially placing itself at
|
|
risk."
|
|
Once again he stresses the need for a national policy to
|
|
establish security standards. In the meantime, while we're
|
|
waiting for government to implement his vision, he's scathing
|
|
about institutions that don't take proper steps to protect
|
|
|
|
[Sorry, but to view the rest of this text
|
|
you'll have to read the book!]
|
|
|
|
+------------------------------------------------------+
|
|
|
|
Pirate Boards: A Vanishing Species
|
|
|
|
Only a few pirates still deal in warez--just for the fun
|
|
of it. In the following case history, the pirate's real name
|
|
has been changed at his request.
|
|
"My handle was Axeman," says Mike Wollenski. "I used to
|
|
run a BBS called the GrindStone. I started it when I was
|
|
fifteen. It was a good ol' boys board, meaning that it only
|
|
served people I knew by reputation, or personally. I had one
|
|
phone lineand eighty megs of storage."
|
|
According to Mike, he never charged anyone for
|
|
membership or downloads. The operation was just a hobby.
|
|
"Making money off stolen software is a fantastic way to have
|
|
the feds come gunning after your ass," he says.
|
|
The board ran without trouble for three years, serving a
|
|
maximum of 150 users. In 1994 Mike went to college and set up
|
|
a new version of his BBS from there. Still there were no
|
|
problems, even though he was now dealing more heavily in
|
|
stolen software. "I got back into the pirate scene big time,"
|
|
he says. "I loved getting uploads, especially uploads that
|
|
were less than three days old. I used to have a contact at
|
|
IBM who would be able to get us the latest OS/2 beta source
|
|
codes for device drivers and utilities. He'd send it up and
|
|
some guys would download it and it would spread from there."
|
|
At Christmas break, Mike moved the BBS back home again
|
|
and took things one notch farther. "Right around this time,"
|
|
he recalls, "in my AC [area code], 914, an interest in
|
|
H/P/V/C/A started." H/P/V/C/A stands for Hacking, Phreaking,
|
|
Viruses, Cracking (or Carding, depending on who you ask), and
|
|
Anarchy. "Me, being the information hound that I was, decided
|
|
to join a mail network called MOBNet."
|
|
This was an informal store-and-forward message system.
|
|
Mike would accumulate a bunch of BBS messages or other data,
|
|
reduce their size with a file compression utility such as
|
|
PKZip, then pass them to another BBS. He received material on
|
|
the same basis.
|
|
"On a good day," says Mike, "I would get in a couple
|
|
hundred mes-sages, all dealing with hacking into systems, how
|
|
to crack password files on Unix hosts, how and where to find
|
|
credit card numbers, and, more importantly, how to protect
|
|
yourself from these things happening to you. So here I was, a
|
|
pirate board in 914--rather successful, as far as this area
|
|
code goes--getting pretty new files, and a ton of information
|
|
daily about the `darker sciences.'"
|
|
On Christmas Eve Mike received a warning. "I get a call
|
|
from a friend of mine, telling me, `Dude, shut it down! Kill
|
|
it! Nuke everything, and close everything up! Some kid just
|
|
got popped for credit card fraud, and he's telling the cops
|
|
that he got it from you.' Needless to say, I freaked. I
|
|
immediately took it down."
|
|
Foolishly, though, after a couple of days he put
|
|
everything back online. A couple more days after that, he was
|
|
raided.
|
|
"I'd been to the movies with my younger brother and a
|
|
friend of ours from school. I think it was at ten-thirty or
|
|
so. On our way back to my house, the car phone rings.
|
|
Understand, it was my parents' car; I had to raid the change
|
|
bin for the money to see the movie. My bro picks it up, says,
|
|
`Yeah? Uh-huh. Hmmm. Uh . . . okay. Bye.' He turns to me and
|
|
says, rather loudly, `You're going to jail! The cops came
|
|
over to the house with a search warrant and took your
|
|
computer and stuff. Mom and Dad are pissed!'"
|
|
When Mike got home he found that state police had taken
|
|
his 486SX/33 IBM-compatible computer, the monitor, keyboard,
|
|
modem, mouse, and all his software--"including the stuff I
|
|
had bought!" he says with a tone of wounded disbelief. "They
|
|
also took most of my parents' software. They tried to take my
|
|
mom's computer as well; I gather yelling ensued, and that
|
|
computer never left the house."
|
|
Mike was only a few days over eighteen. The police
|
|
promised that if he cooperated, he'd be charged as a
|
|
juvenile, there would be no felony charges, and his identity
|
|
would be kept secret. This sounded like a good deal, so he
|
|
supplied the password to unlock his system.
|
|
According to Mike, the cops then proceeded to betray
|
|
him. In February 1995 a local newspaper ran a two-part
|
|
article on hacking in which Mike was the only person
|
|
identified under his real name. A few months later, when Mike
|
|
came home from the spring college semester, he found himself
|
|
charged as an adult, with two class-E felonies carrying more
|
|
than ten years of potential jail time. He was horrified. "In
|
|
the end," he says, "my lawyer talked them down to a
|
|
violation--disorderly conduct--with a $250 fine and twenty-
|
|
five hours community service. But I had been so worried about
|
|
the case, I couldn't finish my semester at school. The cops
|
|
had lied to me outright in front of me and my lawyer, so I
|
|
had no idea what they were going to do next, and I basically
|
|
panicked."
|
|
He regrets now that he cooperated. "I should have told
|
|
them to go fuck themselves silly. But I gave them access to
|
|
my files, and because of that, a good friend of mine also got
|
|
busted. For all I know he went to jail; I don't really want
|
|
to know."
|
|
The main reason for police action against Mike's board
|
|
was not the software but the file containing credit card
|
|
numbers. "Most of them I got from a friend," he says, "but
|
|
some of them came from carbon copies in trash bins outside
|
|
the mall. It's easy to get them; you just go down there at
|
|
two A.M. when all the rent-a-cops are enjoying their
|
|
doughnuts."
|
|
He insists, however, he had no interest in the numbers.
|
|
"Once I had them--okay, great, now what? I never used any of
|
|
'em, because I have parents. They are better than any credit
|
|
card I know of. I don't have to pay interest, I don't have a
|
|
spending limit--hell, I don't even have to pay them back! So
|
|
did I sell card numbers? No. Did I give them to people? No.
|
|
Were they available if people left a message on my board?
|
|
Yes. Just like they are available anywhere else in life. What
|
|
it comes down to is that I was busted because I let people do
|
|
what they wished with my hard-drive space. I think that what
|
|
people did with my board was their own business. The police
|
|
came in and violated that right."
|
|
Mike's parents imposed some limits for a while: no modem
|
|
usage, and he had to ask permission to make phone calls.
|
|
Eventually he got his computer system back from the police--
|
|
everything except the hard drive--and computers are still his
|
|
main interest. He's hoping to make a career out of them as a
|
|
network technician.
|
|
Meanwhile, he says, pirate boards are scarcer than ever.
|
|
"After I was busted, all the local boards disappeared. As far
|
|
as I know, there's only one board left in 914. There are
|
|
still boards in other areas with a couple thousand people on
|
|
'em, but most are in the Midwest, where people are naturally
|
|
|
|
[Sorry, but to view the rest of this text
|
|
you'll have to read the book!]
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 06 Nov 1996 14:00:37 EST
|
|
From: "Rob Slade, doting grandpa of Ryan & Trevor"
|
|
Subject: File 3--"NetLaw: Your Rights in the Online World" by Lance Rose
|
|
|
|
BKNETLAW.RVW 950406
|
|
|
|
"NetLaw: Your Rights in the Online World", Lance Rose, 1995, 0-07-882077-4,
|
|
U$19.95
|
|
%A Lance Rose
|
|
%C 2600 Tenth St., Berkeley, CA 94710
|
|
%D 1995
|
|
%G 0-07-882077-4
|
|
%I McGraw-Hill
|
|
%O U$19.95 510-548-2805 800-227-0900 lkissing@osborne.mhs.compuserve.com
|
|
%O pmon@osborne.mhs.compuserve.com
|
|
%P 372
|
|
%T "NetLaw: Your Rights in the Online World"
|
|
|
|
Very similar to his earlier "Syslaw" (cf. BKSYSLAW.RVW), this is
|
|
a general guide to various legal aspects of life online. The
|
|
major changes are the broadening of the scope from BBS level
|
|
systems to include online services and the Internet, and very
|
|
handy (and interesting) sidebars, which give a thumbnail sketch
|
|
version of the topic under discussion. These usually include a
|
|
reference to some specific case.
|
|
|
|
Chapters address the issues of censorship, contracts, commerce,
|
|
and copyright. Chapter four, which deals with the responsibility
|
|
of the system operator in light of online dangers, does touch on
|
|
the topic of malicious software. I was disappointed that this is
|
|
limited to a not terribly accurate defining of terms, and almost
|
|
no discussion of the admittedly confused legal situation.
|
|
Further chapters cover privacy, crime, search and seizure, and a
|
|
rather disappointing chapter on obscenity. Appendices include
|
|
some very useful sample contracts, and various US laws.
|
|
|
|
Given recent developments which have strongly indicated the
|
|
international nature of the net and international legal
|
|
ramifications, it is discouraging to see that Rose still presents
|
|
only a limited and US-centric view. However, the general
|
|
principles he describes are held in common law, and this book
|
|
should at least provide guidance for the broader online world.
|
|
|
|
copyright Robert M. Slade, 1995 BKNETLAW.RVW 950406
|
|
|
|
==============
|
|
Vancouver ROBERTS@decus.ca | "Daughters of feminists love to wear
|
|
Institute for Robert_Slade@sfu.ca | pink and white short frilly dresses
|
|
Research into rslade@cyberstore.ca| and talk of successes with boys/
|
|
User rslade@sfu.ca | It annoys/
|
|
Security Canada V7K 2G6 | Their Mums ..." - Nancy White
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 30 Oct 1996 16:14:58 -0800
|
|
From: Sara Winge <sara@ora.com>
|
|
Subject: File 4-- Three New WEBMASTER/WEB-DEVELOPERS Books & stuff from O'Reilly
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
October 30, 1996
|
|
|
|
PRESS ONLY--FOR REVIEW COPIES, CONTACT:
|
|
Sara Winge
|
|
707/829-0515
|
|
sara@ora.com
|
|
|
|
O'REILLY PUBLISHES "WEBMASTER IN A NUTSHELL"
|
|
Quick Reference Guide Covers HTML, CGI, Server Configuration, and More
|
|
|
|
SEBASTOPOL, CA--The latest addition to O'Reilly's best-selling "in a
|
|
Nutshell" quick reference series is "WebMaster in a Nutshell." This new
|
|
book takes all the essential reference information for the Web and
|
|
pulls it together into one slim volume. With a clean layout featuring
|
|
easy-to-browse entries and a lay-flat binding, this book is a vital
|
|
desktop reference for anyone who does work on the Web--content
|
|
providers, programmers, and administrators alike.
|
|
|
|
"WebMaster in a Nutshell" covers:
|
|
> HTML 3.2, the markup language for Web documents
|
|
> CGI, for creating interactive content on the Web
|
|
> JavaScript, a scripting language that can be embedded directly
|
|
into HTML
|
|
> HTML extensions by Netscape Navigator 3.0 and Microsoft Internet
|
|
Explorer 3.0
|
|
> Examples and descriptions of the HTML tags for creating frames,
|
|
tables, and fill-in forms
|
|
> HTTP 1.1, the underlying protocol that drives the Web
|
|
> Configuration for the Apache, NCSA, CERN, Netscape, and
|
|
WebSite servers
|
|
> Perl 5, the programming language used most often for CGI
|
|
> WinCGI, the CGI interface for Windows-based programming languages
|
|
> Cookies, for maintaining state between multiple instances of CGI,
|
|
Java and JavaScript programs
|
|
> Server Side Includes, for embedding dynamic data into Web pages
|
|
|
|
"WebMaster in a Nutshell" breaks up these topics into concise, distinct
|
|
chapters, designed to make it easy to find the information you want at
|
|
a moment's notice. This is a book that anyone working seriously on the
|
|
Web will find indispensable.
|
|
|
|
###
|
|
|
|
WebMaster in a Nutshell: A Desktop Quick Reference
|
|
By Stephen Spainhour & Valerie Quercia
|
|
1st Edition October 1996
|
|
378 pages, ISBN: 1-56592-229-8, $19.95
|
|
|
|
============================
|
|
|
|
For Review Copies
|
|
Contact Kathleen Quirk
|
|
(508)287-1882
|
|
kquirk@powersoft.com
|
|
|
|
O'REILLY PARTNERS WITH SYBASE TO REACH WEB DEVELOPERS
|
|
WebSite 1.1 Included in Internet Developer Toolkit for PowerBuilder 5.0
|
|
|
|
Sebastopol, CA, October 28, 1996 - O'Reilly & Associates, a leading
|
|
Internet software developer and book publisher, has announced that it
|
|
is partnering with Sybase to provide developers with tools for creating
|
|
Internet and intranet business applications. O'Reilly's award-winning
|
|
WebSite 1.1(TM), heralded for its features, ease of use and
|
|
documentation, is now included in the Internet Developer Toolkit, a new
|
|
product of Sybase's Powersoft development tools division.
|
|
|
|
Internet Developer Toolkit, a companion product for PowerBuilder 5.0
|
|
for Windows, enables developers to quickly extend their current
|
|
applications to the Web, as well as to build a new class of dynamic
|
|
server-based applications.
|
|
|
|
WebSite 1.1, winner of the Dvorak Award for Outstanding Server
|
|
Software, is a 32-bit multithreaded Web server for Windows NT 3.51 or
|
|
higher and Windows 95 platforms, which lets users maintain a set of Web
|
|
documents, control access to a site, index desktop directories, and use
|
|
a CGI program to display data from applications such as Excel, Access,
|
|
and SQL Anywhere. WebSite 1.1 includes WebView(TM), a powerful Web
|
|
management tool that provides a graphical display of all documents and
|
|
links on the server. WebSite features a graphical interface for
|
|
creating virtual servers, server side includes (SSI), and a framework
|
|
which significantly improves the speed and efficiency of working with
|
|
spreadsheets, databases, and other programs in environments such as
|
|
PowerBuilder.
|
|
|
|
Powersoft's Internet Developer Toolkit is currently available for the
|
|
North American retail list price of $99. The product is available
|
|
directly from Sybase, Inc. and its worldwide network of resellers and
|
|
distributors. To locate the nearest reseller, interested individuals
|
|
can call 1-800-395-3525.
|
|
|
|
In addition to WebSite 1.1, Internet Developer tool kit includes
|
|
Web.PB, based on the PowerBuilder development environment; the
|
|
PowerBuilder Window Plug-in for running PowerBuilder applications in a
|
|
Web browser; the DataWindow Plug-in, for manipulating and presenting
|
|
database information; and Internet Class Libraries, enabling developers
|
|
to maintain session or state information across HTML pages.
|
|
|
|
ABOUT O'REILLY & ASSOCIATES, INC.
|
|
Founded in 1978, O'Reilly & Associates is recognized worldwide for its
|
|
definitive books on the Internet and UNIX, and for its development of
|
|
online content and software. O'Reilly developed the Global Network
|
|
Navigator (GNN), a pioneering web-based publication which it sold to
|
|
America Online in June, 1995. In addition to WebSite 1.1, the company's
|
|
other software products include second-generation server WebSite
|
|
Professional(TM), WebBoard(TM), a web-based multi-threaded conferencing
|
|
system, and PolyForm(TM), a web forms construction kit.
|
|
Statisphere(TM), a Web traffic analyzer, will be the company's newest
|
|
software product when it is released this Winter. O'Reilly &
|
|
Associates' affiliate companies include Songline Studios, an innovative
|
|
content developer for online audiences, and Travelers Tales, an
|
|
award-winning travel book publisher. The company's Internet addresses
|
|
are http://www.ora.com/ and http://software.ora.com/.
|
|
|
|
ABOUT SYBASE, INC.
|
|
Headquartered in Emeryville, CA, Sybase, Inc., is a worldwide leader in
|
|
distributed computing solutions, with record revenues in 1995 of $957
|
|
million. The company provides customers and partners with software and
|
|
services to create information management solutions, integrate
|
|
information assets across heterogeneous systems, and communicate
|
|
information throughout and beyond the enterprise. The company's product
|
|
groups design and develop databases, middleware, application
|
|
development tools and languages to reduce the cost and complexity of
|
|
distributed computing, to create business applications for the Internet
|
|
and intranets, and to build distributed data marts and warehouses. The
|
|
company's Internet addresses are http://www.sybase.com/ and
|
|
http://www.powersoft.com/.
|
|
|
|
WebSite, WebSite Professional, WebBoard, Polyform and Statisphere are
|
|
trademarks of O'Reilly & Associates, Inc. All other names may be
|
|
registered trademarks or trademarks of their respective companies.
|
|
|
|
======================================
|
|
|
|
"BUILDING AN INDUSTRIAL STRENGTH WEB" IS FOCUS OF
|
|
ISSUE 4 OF THE "WORLD WIDE WEB JOURNAL"
|
|
|
|
SEBASTOPOL, CA--The World Wide Web Consortium (W3C) and O'Reilly &
|
|
Associates announce the publication of Issue 4 of the "World Wide Web
|
|
Journal." This issue focuses on the infrastructure needed to create and
|
|
maintain an "Industrial Strength Web," from network protocols to
|
|
application design. Over a year ago, the http protocol on the Web
|
|
surpassed the file transfer protocol as the largest application load on
|
|
the Internet. As a result, Internet performance is crumbling in many
|
|
locations, network addresses are being consumed at a prodigious rate,
|
|
and the extraordinary popularity of a handful of pages is crowding out
|
|
the rest of the Web. This issue takes a detailed look at the
|
|
technology--present and future--that's required to scale the Web to
|
|
work for millions of hosts, tens of millions of users, and billions of
|
|
pages.
|
|
|
|
The papers in this issue shed light on these challenges, and offer
|
|
state-of-the-art remedies. The "W3C Reports" section features papers
|
|
from two workshops: the Joint W3C/OMG Workshop on Distributed Objects
|
|
and Mobile Code and the Meeting on Distributed Authoring. The
|
|
"Technical Papers" section heralds the release of HTTP/1.1 with several
|
|
papers in addition to the HTTP/1.1 spec, including Future Directions
|
|
for HTTP, What's New in HTTP/1.1: Design Enhancements on the Road to
|
|
HTTP-NG, and Using Cookies with CGI: Maintaining State on the Web.
|
|
|
|
The "World Wide Web Journal" provides readers with a direct connection
|
|
to the work of the W3C. Every quarter, the "Journal" provides timely,
|
|
in-depth coverage of the W3C's activities as well as independently
|
|
refereed papers from around the world.
|
|
|
|
WORLD WIDE WEB CONSORTIUM
|
|
|
|
The World Wide Web Consortium [W3C] was created to develop common
|
|
standards for the evolution of the World Wide Web. It is an industry
|
|
consortium jointly run by the MIT Laboratory for Computer Science (LCS)
|
|
in the USA; the National Institute for Research in Computer Science and
|
|
Automation (INRIA) in France responsible for Europe; and Keio
|
|
University in Japan responsible for Asia. Services provided by the
|
|
Consortium include: a repository of information about the World Wide
|
|
Web for developers and users; reference code implementations to embody
|
|
and promote standards; and various prototype and sample applications to
|
|
demonstrate use of new technology. To date over 150 organizations are
|
|
Members of the Consortium.
|
|
|
|
|
|
O'REILLY & ASSOCIATES
|
|
|
|
O'Reilly & Associates is recognized worldwide for its definitive books
|
|
on the Internet and UNIX. In the past three years, the company has
|
|
expanded into other Internet-related endeavors, developing online
|
|
content and software and conducting market research on the online
|
|
services market.
|
|
|
|
In 1993, O'Reilly developed the Global Network Navigator (GNN), a
|
|
pioneering web-based publication which it sold to America Online in
|
|
June 1995. The company is a major developer of Win32 software for the
|
|
Internet, with software products including WebSite (Web server software
|
|
for Windows 95 and Windows NT), WebBoard (Web conferencing system), and
|
|
PolyForm (Web site form-building software). The Online Research Group,
|
|
O'Reilly's newest division, was created to survey and profile the
|
|
online services market.
|
|
|
|
# # #
|
|
|
|
World Wide Web Journal: Volume 1, Issue 4: Building an Industrial
|
|
Strength Web
|
|
A publication of O'Reilly & Associates and the World Wide Web
|
|
Consortium (W3C)
|
|
Fall 1996
|
|
250 pages (est.), ISBN: 1-56592-211-5, $24.95
|
|
|
|
------------------------------
|
|
|
|
From: Noah <noah@enabled.com>
|
|
Date: Thu, 31 Oct 1996 23:45:11 -0600 (CST)
|
|
Subject: File 5--USENIX Annual Conference & USELINUX, January 6-10, 1997 (fwd)
|
|
|
|
From -Noah
|
|
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Thu, 31 Oct 1996 12:05:54 -0500 (EST)
|
|
From--The Professor <professr@netaxs.com>
|
|
|
|
January 6-10, 1997
|
|
USENIX 1997 TECHNICAL CONFERENCE
|
|
Anaheim, California, Marriott Hotel
|
|
|
|
USELINUX
|
|
Linux Applications Development & Deployment Conference
|
|
Co-located with USENIX 1997 Technical Conference
|
|
Co-sponsored by Linux International
|
|
|
|
Attendees may pay one fee and attend both conferences.
|
|
|
|
There are 20 day-long tutorials offered on January 6-7.
|
|
Topics include:
|
|
IPv6 Kerberos Approach to Network Security
|
|
Secure Java Programming Introduction to Java
|
|
Windows NT and Windows 95 UNIX Network Programming
|
|
How Networks Work Topics in System Administration
|
|
Web Security System and Network Performance Tuning
|
|
Inside the Linux 2.0 Kernel Java Applets and the AWT
|
|
UNIX Security Tools CGI and WWW Programming in Perl
|
|
Administering a Web Server Device Drivers under Linux
|
|
Solaris System Administration Beginning Perl Programming
|
|
Writing Secure Code Creating Effective User Interfaces
|
|
|
|
Java, the Web, Intranets, Security, Windows NT are among the topics of the
|
|
Technical Program which takes place January 8-10. It begins with a keynote
|
|
address by James Gosling, a creator of Java. 23 refereed papers present
|
|
up-to-the-minute research. A second track of invited talks cover cryptography,
|
|
Inktomi and AltaVista Search Engines, IPv6, benchmarks, and a new networked
|
|
operating system from Bell Labs that offers unprecedented portability for
|
|
applications and services.
|
|
|
|
Linux Torvalds speaking on the future of Linux, is one of the highlights at the
|
|
Linux Applications Development and Deployment Conference. USELINUX will offer
|
|
tutorials and technical presentations for developers. Concurrently, those
|
|
interested in the Linux marketplace may attend case studies and expert
|
|
presentations on how to create a Linux-based business.
|
|
|
|
An Exhibition on January 8-9 offers presentations of the latest hardware,
|
|
software, and networking products from 55 vendors.
|
|
ADMISSION TO THE EXHIBITION IS FREE. If you cannot make it to the conference
|
|
but would like to visit the exhibition, please contact Cynthia Deno at 408 335
|
|
9445 or cynthia@usenix.org.
|
|
|
|
For more program and registration information:
|
|
|
|
Access our Resource Center on the World Wide Web--http://www.usenix.org
|
|
|
|
Email to: info@usenix.org. In the body of your message state "send usenix97
|
|
conference"
|
|
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 17 Nov, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.81
|
|
************************************
|
|
|