904 lines
39 KiB
Plaintext
904 lines
39 KiB
Plaintext
|
||
Computer underground Digest Sun Nov 2, 1997 Volume 9 : Issue 79
|
||
ISSN 1004-042X
|
||
|
||
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Field Agent Extraordinaire: David Smith
|
||
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
||
CONTENTS, #9.79 (Sun, Nov 2, 1997)
|
||
|
||
File 1--RC5 Cracked - The unknown message is... (fwd)
|
||
File 2--Justice Dept charges Microsoft w/violating 199 order
|
||
File 3--Microsoft's reaction the the DOJ lawsuit
|
||
File 4--Small Minds Think Alike
|
||
File 5--Illinois Library Decides Not to Filter Net
|
||
File 6--Gullibility Virus Warning
|
||
File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?
|
||
File 8--Islands in the Clickstream
|
||
File 9--Kashpureff in custody. (fwd)
|
||
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: Mon, 27 Oct 1997 08:43:38 -0500
|
||
From: Albert Garrido <Albert.Garrido@nextel.com>
|
||
Subject: File 1--RC5 Cracked - The unknown message is... (fwd)
|
||
|
||
Hi, I'm sending the message below for inclusion in the next CuD issue.
|
||
|
||
---
|
||
|
||
Below is the original press release detailing RC5-56 bit encryption
|
||
being cracked by the Bovine effort at http://www.distributed.net
|
||
|
||
Please note that the Bovine effort has not stopped, and has moved onto
|
||
cracking RC5-64. See for details.
|
||
|
||
|
||
----------
|
||
From-- David McNett <nugget@slacker.com>[:]
|
||
Sent-- Wednesday, October 22, 1997 3:14 PM
|
||
Subject-- [rc5] The unknown message is...
|
||
|
||
-----BEGIN PGP SIGNED MESSAGE-----
|
||
Hash: SHA1
|
||
|
||
It is a great privilege and we are excited to announce that at 13:25
|
||
GMT on 19-Oct-1997, we found the correct solution for RSA Labs' RC5-
|
||
32/12/7 56-bit secret-key challenge. Confirmed by RSA Labs, the key
|
||
0x532B744CC20999 presented us with the plaintext message for which we
|
||
have been searching these past 250 days.
|
||
|
||
The unknown message is: It's time to move to a longer key length
|
||
|
||
In undeniably the largest distributed-computing effort ever, the
|
||
Bovine RC5 Cooperative (http://www.distributed.net/), under the
|
||
leadership of distributed.net, managed to evaluate 47% of the
|
||
keyspace, or 34 quadrillion keys, before finding the winning key. At
|
||
the close of this contest our 4000 active teams were processing over
|
||
7 billion keys each second at an aggregate computing power equivalent
|
||
to more than 26 thousand Pentium 200's or over 11 thousand PowerPC
|
||
604e/200's. Over the course of the project, we received block
|
||
submissions from over 500 thousand unique IP addresses.
|
||
|
||
The winning key was found by Peter Stuer <peter@dinf.vub.ac.be> with
|
||
an Intel Pentium Pro 200 running Windows NT Workstation, working for
|
||
the STARLab Bovine Team coordinated by Jo Hermans
|
||
<Jo.Hermans@vub.ac.be> and centered in the Computer Science
|
||
Department (DINF) of the Vrije Universiteit (VUB) in Brussels,
|
||
Belgium. (http://dinf.vub.ac.be/bovine.html/). Jo's only comments
|
||
were that "$1000 will buy a lot of beer" and that he wished that the
|
||
solution had been found by a Macintosh, the platform that represented
|
||
the largest portion of his team's cracking power. Congratulations
|
||
Peter and Jo!
|
||
|
||
Of the US$10000 prize from RSA Labs, they will receive US$1000 and
|
||
plan to host an unforgettable party in celebration of our collective
|
||
victory. If you're anywhere near Brussels, you might want to find
|
||
out when the party will be held. US$8000, of course, is being
|
||
donated to Project Gutenberg (http://www.promo.net/pg/) to assist
|
||
them in their continuing efforts in converting literature into
|
||
electronic format for the public use. The remaining US$1000 is being
|
||
retained by distributed.net to assist in funding future projects.
|
||
|
||
Equally important are the thanks, accolades, and congratulations due
|
||
to all who participated and contributed to the Bovine RC5-56 Effort!
|
||
The thousands of teams and tens of thousands of individuals who have
|
||
diligently tested key after key are the reason we are so successful.
|
||
|
||
The thrill of finding the key more than compensates for the sleep,
|
||
food, and free time that we've sacrificed!
|
||
|
||
Special thanks go to all the coders and developers, especially Tim
|
||
Charron, who has graciously given his time and expertise since the
|
||
earliest days of the Bovine effort. Thanks to all the coordinators
|
||
and keyserver operators: Chris Chiapusio, Paul Chvostek, Peter
|
||
Denitto, Peter Doubt, Mishari Muqbil, Steve Sether, and Chris
|
||
Yarnell. Thanks to Andrew Meggs, Roderick Mann, and Kevyn Shortell
|
||
for showing us the true power of the Macintosh and the strength of
|
||
its users. We'd also like to thank Dave Avery for attempting to
|
||
bridge the gap between Bovine and the other RC5 efforts.
|
||
|
||
Once again, a heartfelt clap on the back goes out to all of us who
|
||
have run the client. Celebrations are in order. I'd like to invite
|
||
any and all to join us on the EFNet IRC network channel #rc5 for
|
||
celebrations as we regroup and set our sights on the next task. Now
|
||
that we've proven the limitations of a 56-bit key length, let's go
|
||
one further and demonstrate the power of distributed computing! We
|
||
are, all of us, the future of computing. Join the excitement as the
|
||
world is forced to take notice of the power we've harnessed.
|
||
|
||
Moo and a good hearty laugh.
|
||
|
||
Adam L. Beberg - Client design and overall visionary
|
||
Jeff Lawson - keymaster/server network design and morale booster
|
||
David McNett - stats development and general busybody
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 02 Nov 97 00:08 CST
|
||
From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
|
||
Subject: File 2--Justice Dept charges Microsoft w/violating 199 order
|
||
|
||
FOR IMMEDIATE RELEASE AT
|
||
MONDAY, OCTOBER 20, 1997 (202) 616-2771
|
||
TDD (202) 514-1888
|
||
|
||
|
||
JUSTICE DEPARTMENT CHARGES MICROSOFT WITH
|
||
VIOLATING 1995 COURT ORDER
|
||
|
||
|
||
Asks Court to Impose $1 Million a Day Fine if Violation Continues
|
||
|
||
WASHINGTON, D.C. -- The Department of Justice asked a
|
||
federal court today to hold Microsoft Corporation--the world's
|
||
dominant personal computer software company--in civil contempt
|
||
for violating terms of a 1995 court order barring it from
|
||
imposing anticompetitive licensing terms on manufacturers of
|
||
personal computers.
|
||
|
||
The petition filed today by the Department's Antitrust
|
||
Division alleges that Microsoft violated the court order by
|
||
requiring PC manufacturers to license and distribute Microsoft's
|
||
Internet browser, called Internet Explorer, as a condition of
|
||
licensing Microsoft's Windows 95. Most PC makers preinstall
|
||
Windows 95--the dominant PC operating system--at the factory on
|
||
the PCs they sell.
|
||
|
||
"Microsoft is unlawfully taking advantage of its Windows
|
||
monopoly to protect and extend that monopoly and undermine
|
||
consumer choice," said Attorney General Janet Reno.
|
||
|
||
The Department brought today's action to enforce the earlier
|
||
court order, and to prevent Microsoft from being able to expand
|
||
and protect its monopoly in the PC operating system market by
|
||
anticompetitive means. The Department also wants to ensure that
|
||
PC manufacturers and consumers will be able to choose among
|
||
competing software products.
|
||
|
||
"Our main concern is that by violating the court order,
|
||
Microsoft is using an unlawful advantage to beat back an
|
||
important competitive challenge to its Windows monopoly," said
|
||
Joel I. Klein, Assistant Attorney General in charge of the
|
||
Department's Antitrust Division. "Even as we go forward with
|
||
this action today," Klein added, "we also want to make clear that
|
||
we have an ongoing and wide-ranging investigation to determine
|
||
whether Microsoft's actions are stifling innovation and consumer
|
||
choice."
|
||
|
||
Much of Microsoft's market power today results because most
|
||
applications programs for PCs--programs such as word processing,
|
||
spread sheets and money managers--are written to work with
|
||
Microsoft's Windows 95 PC operating system, the Department said.
|
||
Unfettered competition among Internet browser products could lead
|
||
to development of a computer environment in which business and
|
||
consumer applications would work regardless of which operating
|
||
system was installed on the PC. Software companies are currently
|
||
developing applications that use an Internet browser as the user
|
||
interface and work on other operating systems as well as with
|
||
Windows 95.
|
||
|
||
Microsoft's operating system is installed on more than 80
|
||
percent of the nation's PCs, and preinstallation on PCs at the
|
||
factory is Microsoft's main distribution channel.
|
||
|
||
Under the 1995 court order, Microsoft is prohibited from
|
||
forcing computer makers to license any other Microsoft product as
|
||
a condition of licensing Windows 95. Many PC manufacturers want
|
||
the ability to choose freely among competing software products
|
||
when they decide what to package with their PCs in order to offer
|
||
their customers the best mix of software products available.
|
||
|
||
The petition charges that Microsoft has conditioned licenses
|
||
to Windows 95 on manufacturers' licensing of Internet Explorer
|
||
and that it has denied manufacturers' requests not to ship
|
||
Internet Explorer on new PCs with Windows 95.
|
||
|
||
The Department stressed that it is not taking sides in the
|
||
"browser war" between Microsoft and its rival, Netscape
|
||
Communications Corporation, or in any emerging competition
|
||
between Windows and other products.
|
||
|
||
"Microsoft is not entitled to require computer manufacturers
|
||
and consumers to take Internet Explorer when they license Windows
|
||
95," said Klein. "Each of Microsoft's products should compete on
|
||
its own merits."
|
||
|
||
Klein stressed, however, that today's action in no way
|
||
prevents consumers or PC manufacturers from voluntarily choosing
|
||
to obtain Internet Explorer and Windows 95, either together or
|
||
separately, if they so wish.
|
||
|
||
In its petition, the Department asked the court:
|
||
|
||
* To stop Microsoft from requiring PC manufacturers to
|
||
accept Internet Explorer as a condition of receiving Windows 95.
|
||
|
||
* To require Microsoft to notify consumers of PCs that have
|
||
Windows 95 that they are not required to use Internet Explorer,
|
||
that they are free to use any compatible Internet browser, and to
|
||
give consumers simple instructions about how to remove the
|
||
Internet Explorer icon from their PC desktop if they choose.
|
||
|
||
* To impose large daily fines--$1 million--on Microsoft if
|
||
it continues to violate the court's order.
|
||
|
||
* To strike down broad portions of non-disclosure
|
||
agreements that Microsoft requires those with whom it does
|
||
business to sign.
|
||
|
||
The non-disclosure agreements may deter companies and
|
||
individuals from coming forward voluntarily to provide
|
||
information about Microsoft to the Department. Moreover, they
|
||
sometimes require signatories to notify Microsoft first before
|
||
complying with the Department's formal requests, or even court
|
||
orders, for such information.
|
||
|
||
Microsoft has advised the Department that it would not
|
||
insist on prior disclosure when the Department approaches
|
||
companies or individuals and assures them that it will keep
|
||
information confidential. But, this informal agreement, Klein
|
||
said, does not address the concerns of parties who wish to come
|
||
forward voluntarily.
|
||
|
||
Klein stressed the importance of full, voluntary disclosure
|
||
of information relevant to the Department's larger investigation
|
||
of Microsoft's practices. He expressed concern that the broad
|
||
non-disclosure agreements could possibly hamper its investigation
|
||
and indicated that, to remove any possible impediment, even if
|
||
unintended, the Department was seeking a court order.
|
||
|
||
"We need a court order to clear the air here so that anyone
|
||
with relevant information will feel free to come talk to the
|
||
Department without any fear of intimidation or reprisal," Klein
|
||
said. "We will not let Microsoft or anyone else burden that
|
||
fundamental right."
|
||
|
||
Today's petition was filed in U.S. District Court for the
|
||
District of Columbia, where the 1995 consent decree was entered.
|
||
|
||
Microsoft will have an opportunity to respond to the
|
||
Department's petition in writing within 11 days. At that time,
|
||
the judge will decide whether a hearing is appropriate.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 30 Oct 1997 21:54:52 -0700
|
||
From: Jack Dean <JackDean@webworldinc.com>
|
||
Subject: File 3--Microsoft's reaction the the DOJ lawsuit
|
||
|
||
Here's an interesting press release on Microsoft's reaction to the the DOJ
|
||
lawsuit:
|
||
|
||
REDMOND, Wash. - Oct. 21, 1997 -- In direct response to accusations
|
||
made by the Department of Justice, the Microsoft Corp. announced today
|
||
that it will be acquiring the federal government of the United States of
|
||
America for an undisclosed sum.
|
||
|
||
"It's actually a logical extension of our planned growth," said Microsoft
|
||
chairman Bill Gates, "It really is going to be a positive arrangement for
|
||
everyone."
|
||
|
||
Microsoft representatives held a briefing in the oval office of the White
|
||
House with U.S. President Bill Clinton, and assured members of the press
|
||
that changes will be "minimal." The United States will be managed as a
|
||
wholly owned division of Microsoft. An initial public offering is planned
|
||
for July of next year, and the federal government is expected to be
|
||
profitable by "Q4 1999 at latest," according to Microsoft president Steve
|
||
Ballmer.
|
||
|
||
In a related announcement, Bill Clinton stated that he had "willingly and
|
||
enthusiastically" accepted a position as a vice president with Microsoft,
|
||
and will continue to manage the United States government, reporting
|
||
directly to Bill Gates. When asked how it felt to give up the mantle of
|
||
executive authority to Gates, Clinton smiled and referred to it as "a
|
||
relief." He went on to say that Gates has a "proven track record", and
|
||
that U.S. citizens should offer Gates their "full support and
|
||
confidence." Clinton will
|
||
reportedly be earning several times the $200,000 annually he has earned
|
||
as U.S. president, in his new role at Microsoft.
|
||
|
||
Gates dismissed a suggestion that the U.S. Capitol be moved to Redmond as
|
||
"silly," though did say that he would make executive decisions for the U.S.
|
||
government from his existing office at Microsoft headquarters. Gates went
|
||
on to say that the House and Senate would "of course" be abolished.
|
||
"Microsoft isn't a democracy," he observed, "and look how well we're doing."
|
||
|
||
When asked if the rumored attendant acquisition of Canada was proceeding,
|
||
Gates said, "We don't deny that discussions are taking place." Microsoft
|
||
representatives closed the conference by stating that United States
|
||
citizens will be able to expect lower taxes, increases in government
|
||
services and discounts on all Microsoft products.
|
||
|
||
About Microsoft
|
||
---------------
|
||
Founded in 1975, Microsoft (NASDAQ "MSFT") is the worldwide leader in
|
||
software for personal computers, and democratic government. The company
|
||
offers a wide range of products and services for public, business and
|
||
personal use, each designed with the mission of making it easier and more
|
||
enjoyable for people to take advantage of the full power of personal
|
||
computing and free society every day.
|
||
|
||
About the United States
|
||
-----------------------
|
||
Founded in 1789, the United States of America is the most successful
|
||
nation in the history of the world, and has been a beacon of democracy and
|
||
opportunity for over 200 years. Headquartered in Washington, D.C., the
|
||
United States is a wholly owned subsidiary of Microsoft Corporation.
|
||
|
||
|
||
(from www.MacsOnly.com)
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 31 Oct 1997 13:10:47 -0800 (PST)
|
||
From: "Brock N. Meeks" <brock@well.com>
|
||
Subject: File 4--Small Minds Think Alike
|
||
|
||
Source - : fight-censorship@vorlon.mit.edu
|
||
|
||
CyberWire Dispatch Bulletin
|
||
|
||
Washington --In this boneyard of Washington, DC it doesn't take
|
||
long for big dawgs and small alike to bark. A couple of small
|
||
ones yipped it up today.
|
||
|
||
Rep. Marge (no relation to Homer) Roukema, R-N.J. and Sen. Lauch
|
||
(??) Faircloth, R-N.C. introduced a bill to amend the
|
||
Communications Act that would ban convicted sex offenders from
|
||
using the Internet.
|
||
|
||
"We must protect our children by denying convicted violent sex
|
||
offenders this form of access to their victims," Roukema said.
|
||
[Hey, you knew THAT line was coming...]
|
||
|
||
Roukema calls this a "practical, workable bill." Because known
|
||
sex offenders must register, the bill will work! she says. No,
|
||
no, no, this is NOT an infringement of the 1st Amendment. After
|
||
all, she says, if a felon can be denied the right to vote, a
|
||
violent sex offender can certainly be denied the right to
|
||
'cruise' the Internet looking for victims," she says.
|
||
|
||
[Okay. Line up HERE: to take your one free shot at this brain
|
||
dead logic.]
|
||
|
||
The bill bars interactive service providers from giving sex
|
||
offenders an account. Break that law and you get fined $5,000
|
||
for each day the perp is online.
|
||
|
||
Meeks out...
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 17 Oct 1997 18:19:13 GMT
|
||
From: owner-cyber-liberties@aclu.org
|
||
Subject: File 5--Illinois Library Decides Not to Filter Net
|
||
|
||
Cyber-liberties Update
|
||
October 17, 1997
|
||
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Illinois Library Decides Not to Filter Net, Others Consider Restricting
|
||
Policies
|
||
|
||
Deciding that parents are in the best position to decide what their
|
||
children may view on the Internet, the Des Plaines, Ill., Public Library
|
||
recently installed Internet browsers on two computers located in the
|
||
children's section of the library without installing blocking software,
|
||
reports the Freedom Forum First Amendment Center at Vanderbilt University.
|
||
<http://www.fac.org/>.
|
||
|
||
In an interview with the First Amendment Center, Library Administrator
|
||
Sandra Norlin explained that "while we make suggestions on what we think
|
||
are the best sites for children, we are not the right people to be
|
||
determining each child's maturity level and each family's system of values.
|
||
Our policy is based on high regard for the people in our community and
|
||
their ability to make wise and prudent decisions for themselves."
|
||
|
||
Library officials also cited problems with filtering software in their
|
||
decision not to install it and that the software creates a false sense of
|
||
security in parents, the First Amendment Center reports.
|
||
|
||
"We felt that filtering software was not the appropriate action to take,"
|
||
Norlin said. "It's the 'one-size-fits-all' approach. =85 Everyone has the
|
||
same restrictions placed on them. No one would have the individual
|
||
opportunity to make their own decisions."
|
||
|
||
Meanwhile, in Virginia Fairfax County officials this week proposed a policy
|
||
which would allow parents of children under age 13 to prohibit their
|
||
children from using the Internet in public libraries. Library officials
|
||
claimed that the policy may be the only solution since they cannot arrive
|
||
at a consensus on the filtering issue.
|
||
|
||
Under the policy being considered by the county's library board, a child's
|
||
parents or guardians would have the right to notify the library system that
|
||
they did not want him or her to be given access to the Internet. Children
|
||
13 and older still would have unrestricted access.
|
||
|
||
Other local libraries in the Washington, D.C. area are also considering
|
||
whether to install filtering software. However, the Loudoun County library
|
||
board, which voted in July to install screening software on all computers
|
||
is reconsidering the policy.
|
||
|
||
Last month, the San Jose, Ca., City Council overwhelmingly rejected a
|
||
proposal that would have mandated restriction of Internet access in public
|
||
libraries, however, neighboring local counties are continuing to consider
|
||
filtering proposals, Ann Brick, a staff attorney with the ACLU of No. Ca.
|
||
said.
|
||
|
||
Filtering software is particularly problematic because it often blocks a
|
||
much wider spectrum of speech than legally obscene speech, Brick said,
|
||
adding that the decision to filter runs counter to the Supreme Court
|
||
decision in Reno v. ACLU from this year.
|
||
|
||
"The Supreme Court in Reno v. ACLU held that the Internet, as much as the
|
||
books and newspapers found in our public libraries, is entitled to the very
|
||
highest level of First Amendment protection which means that Internet
|
||
censorship in the library off limits for government, including City
|
||
Councils," she said.
|
||
|
||
++++++++++++++++++++
|
||
|
||
About Cyber-Liberties Update:
|
||
|
||
ACLU Cyber-Liberties Update Editor:
|
||
Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
|
||
American Civil Liberties Union
|
||
National Office 125 Broad Street,
|
||
New York, New York 10004
|
||
|
||
To subscribe to the ACLU Cyber-Liberties Update, send a message to
|
||
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
|
||
message. To terminate your subscription, send a message to
|
||
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 30 Oct 1997 23:57:13 -0600
|
||
From: Avi Bass <te0azb1@corn.cso.niu.edu>
|
||
Subject: File 6--Gullibility Virus Warning
|
||
|
||
********************************************************************
|
||
WARNING, CAUTION, DANGER, AND BEWARE!
|
||
Gullibility Virus Spreading over the Internet!
|
||
********************************************************************
|
||
|
||
|
||
WASHINGTON, D.C.--The Institute for the Investigation of Irregular
|
||
Internet Phenomena announced today that many Internet users are becoming
|
||
infected by a new virus that causes them to believe without question every
|
||
groundless story, legend, and dire warning that shows up in their inbox or
|
||
on their browser. The Gullibility Virus, as it is called, apparently
|
||
makes people believe and forward copies of silly hoaxes relating to cookie
|
||
recipes, email viruses, taxes on modems, and get-rich-quick schemes
|
||
[perhaps conspiracy theories should be included here].
|
||
|
||
"These are not just readers of tabloids or people who buy lottery tickets
|
||
based on fortune cookie numbers," a spokesman said. "Most are otherwise
|
||
normal people, who would laugh at the samestories if told to them by a
|
||
stranger on a streetcorner." However, once these same people become
|
||
infected with the Gullibility Virus, they believe anything they read on
|
||
the Internet.
|
||
|
||
"My immunity to tall tales and bizarre claims is all gone," reported one
|
||
weeping victim. "I believe every warning message and sick child story my
|
||
friends forward to me, even though most of the messages are anonymous."
|
||
|
||
Another victim, now in remission, added, "When I first heard about Good
|
||
Times, I just accepted it without question. After all, there were dozens
|
||
of other recipients on the mail header, so I thought the virus must be
|
||
true." It was a long time, the victim said, before she could stand up at
|
||
a Hoaxees Anonymous meeting and state, "My name is Jane, and I've been
|
||
hoaxed." Now, however, she is spreading the word. "Challenge and check
|
||
whatever you read," she says.
|
||
|
||
Internet users are urged to examine themselves for symptoms of the virus,
|
||
which include the following:
|
||
|
||
* the willingness to believe improbable stories
|
||
without thinking
|
||
|
||
* the urge to forward multiple copies of such
|
||
stories to others
|
||
|
||
* a lack of desire to take three minutes to check
|
||
to see if a story is true
|
||
|
||
T. C. is an example of someone recently infected. He told one reporter, "I
|
||
read on the Net that the major ingredient in almost all shampoos makes your
|
||
hair fall out, so I've stopped using shampoo." When told about the
|
||
Gullibility Virus, T. C. said he would stop reading email, so that he would
|
||
not become infected.
|
||
|
||
Anyone with symptoms like these is urged to seek help immediately. Experts
|
||
recommend that at the first feelings of gullibility, Internet users rush to
|
||
their favorite search engine and look up the
|
||
item tempting them to thoughtless credence. Most hoaxes, legends, and tall
|
||
tales have been widely discussed and exposed by the Internet community.
|
||
|
||
Courses in critical thinking are also widely available, and there is online
|
||
help from many sources, including
|
||
|
||
* Department of Energy Computer Incident Advisory
|
||
Capability at
|
||
<http://ciac.llnl.gov/ciac/CIACHoaxes.html>
|
||
|
||
* Symantec Anti Virus Research Center at
|
||
<http://www.symantec.com/avcenter/index.html>
|
||
|
||
* McAfee Associates Virus Hoax List at
|
||
<http://www.mcafee.com/support/hoax.html>
|
||
|
||
* Dr. Solomons Hoax Page at
|
||
<http://www.drsolomons.com/vircen/hoax.html>
|
||
|
||
* The Urban Legends Web Site at
|
||
<http://www.urbanlegends.com>
|
||
|
||
* Urban Legends Reference Pages at
|
||
<http://www.snopes.com>
|
||
|
||
* Datafellows Hoax Warnings at
|
||
<http://www.Europe.Datafellows.com/news/hoax.htm>
|
||
|
||
Those people who are still symptom free can help inoculate themselves
|
||
against the Gullibility Virus by reading some good material on evaluating
|
||
sources, such as
|
||
|
||
* Evaluating Internet Research Sources at
|
||
<http://www.sccu.edu/faculty/R_Harris/evalu8it.htm>
|
||
|
||
* Evaluation of Information Sources at
|
||
<http://www.vuw.ac.nz/~agsmith/evaln/evaln.htm>
|
||
|
||
* Bibliography on Evaluating Internet Resources at
|
||
<http://refserver.lib.vt.edu/libinst/critTHINK.HTM>
|
||
|
||
Lastly, as a public service, Internet users can help stamp out the
|
||
Gullibility Virus by sending copies of this message to anyone who forwards
|
||
them a hoax.
|
||
|
||
*******************************************************************
|
||
This message is so important, we're sending it anonymously! Forward it to
|
||
all your friends right away! Don't think about it! This is not a chain
|
||
letter! This story is true! Don't check it out! This story is so timely,
|
||
there is no date on it! This story is so important, we're using lots of
|
||
exclamation points! For every message you forward to some unsuspecting
|
||
person, the Home for the Hopelessly Gullible will donate ten cents to
|
||
itself. (If you wonder how the Home will know you are forwarding these
|
||
messages all over creation, you're obviously thinking too much.)
|
||
|
||
*******************************************************************
|
||
|
||
ACT NOW! DON'T DELAY! LIMITED TIME! NOT SOLD IN ANY STORE!
|
||
|
||
*******************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 21 Oct 1997 20:36:08 -0400
|
||
From: Paul Kneisel <tallpaul@nyct.net>
|
||
Subject: File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?
|
||
|
||
The readers of CuDigest might be interested in the latest service offered
|
||
by my ISP (that I have not yet explored or signed up for.)
|
||
|
||
We read how the telco's are complaining that Internet users are eating
|
||
excessively into their bandwidth because the average net connection lasts
|
||
longer than the average "wail mail" voice phone call.
|
||
|
||
It seems that some ISPs have a different opinion in the matter. They've
|
||
started to shift their excess data bandwidth to become value-added
|
||
long-distance providers.
|
||
|
||
It makes one wonder about the "accuracy" of the telco claims.
|
||
|
||
-- tallpaul
|
||
++++++++++
|
||
|
||
Dear NYCT Customer,
|
||
|
||
NYCT is proud to announce the newest, most innovative, money saving
|
||
service:
|
||
|
||
NYCT LONG DISTANCE
|
||
|
||
It's the world's first paperless long distance service designed
|
||
exclusively for internet users. You'll use your phone the same as you
|
||
do today, but pay unbelievably low rates (better than the advertised
|
||
rates of the major carriers) and get great on-line features - never
|
||
before available. Some (but not all) of these features are:
|
||
|
||
On-line call detail and statements, in dbase or ACSCII format.
|
||
|
||
Don't recognize a number on your on-line phone bill? Click on a
|
||
number, and we'll give you the name and address of whose number it is.
|
||
|
||
View your calls from yesterday or one year ago on-line.
|
||
|
||
On-line address book, created and updated automatically every time you
|
||
made a call.
|
||
|
||
Your mom says you never call - with a click of your mouse we'll tell
|
||
you, on-line, every time you've called her and what you've spent.
|
||
|
||
Calling card: great rates, and get news, weather, sports and
|
||
entertainment.
|
||
|
||
On-line 411 directory service (110 million business and residential
|
||
listings).
|
||
|
||
24 x 7 on-line customer service (no more voicemail hell).
|
||
|
||
And much More!
|
||
|
||
To learn more and to subscribe to NYCT Long Distance, go to :
|
||
http://nyct.quadracom.com
|
||
|
||
Here you'll learn all about the available features and you can sign up
|
||
to be a NYCT Long Distance customer.
|
||
|
||
Thanks.
|
||
|
||
Andrew E. Coren
|
||
--
|
||
________________________________________________________________
|
||
: Andrew E. Coren, President TOTAL SOLUTION PROVIDERS :
|
||
: New York Connect.Net, Ltd. internet services,networks, :
|
||
: http://www.nyct.net hardware,programming,support :
|
||
: 212-293-2620 :
|
||
: " BRINGING NEW YORK THE INTERNET SERVICES IT DESERVES " :
|
||
:________________________________________________________________:
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 10 Oct 1997 06:50:15
|
||
From: Richard Thieme <rthieme@thiemeworks.com>
|
||
Subject: File 8--Islands in the Clickstream
|
||
|
||
Islands in the Clickstream:
|
||
The Voice of the Computer
|
||
|
||
|
||
I was disappointed when hour-long cartoons of Peanuts were made for
|
||
television. I had been reading the comic strip for years, and when I read
|
||
the words in balloons above the characters heads, I heard their voices
|
||
inside my head as a kind of echo -- the way you probably hear my voice
|
||
inside your head as you read these words.
|
||
|
||
That voice -- private, well-modulated, always just right -- was replaced by
|
||
a real childs voice that didnt sound right at all. It sounded like a
|
||
child, a real child, not the Charlie Brown in my head. By providing too
|
||
much information, the movie makers yanked Peanuts from the world of
|
||
imagination and turned it into one more concrete thing in the world of
|
||
sensation, a fetish stripped of its magical properties.
|
||
|
||
Computer engineers pay close attention to the world of sensation as they
|
||
struggle to develop computers that act like human beings. They more they
|
||
try, however, the more it seems they miss the mark. Artificial intelligence
|
||
and robotics experts design crabs that scuttle around their labs like
|
||
low-grade idiots. Few laypeople are excited when a robot distinguishes a
|
||
cube from a ball and lifts it off the ground.
|
||
|
||
The best robots are designed for tasks, not to look like living creatures.
|
||
Let them do their jobs, and well provide the personality.
|
||
|
||
A decade ago, Joseph Weizenbaum of MIT became upset when an employee
|
||
interacted with ELIZA, the simple interactive therapist he designed, as
|
||
if ELIZA were a real person.. His employee even asked him to leave the room
|
||
so she could have a private conversation.
|
||
|
||
Weizenbaum was alarmed at the ease with which people projected personality
|
||
and presence onto the computer. He thought it was bad, instead of just
|
||
whats so. Now two men from Stanford -- Byron Reeves and Clifford Nass --
|
||
have carried out some wonderful studies that reveal how and why we respond
|
||
to computers as if they are real people (The Media Equation: How People
|
||
Treat Computers, Television and New Media like Real People and Places -
|
||
Stanford and Cambridge: 1996).
|
||
|
||
Their studies state the obvious, but -- as usual -- it was so obvious, we
|
||
missed it. Our brains evolved to help us survive, and we react,
|
||
unconsciously and automatically, as if something that looks or acts like a
|
||
person IS a person. Our top-level program may say something else --
|
||
its only a movie, for example, when were frightened during a horror
|
||
flick -- but that wouldnt be necessary if we didnt think it was real.
|
||
|
||
Artificial intelligence and virtual reality are not necessary to make us
|
||
think a computer is smart. Less is more. Too much detail, too much
|
||
information, overwhelms our imaginations.
|
||
|
||
Computers are inherently social actors, Nass said at a Usability
|
||
Professionals Association conference. He used flattery as an example.
|
||
Were suckers for flattery, even when we know it isnt true. So computer
|
||
programs that flatter the user are consistently judged to be smarter and
|
||
better at playing games, and users enjoy using them more. And ... people
|
||
ALWAYS deny thats what theyre doing.
|
||
|
||
We act the way we act, not the way we think we act.
|
||
|
||
We need friends, we need allies, Nass explained, and when they tied blue
|
||
armbands around both users and computers and said they were a team, the
|
||
users believed their computers were friendlier, smarter, better, just as we
|
||
do about our human team-mates. Again, no one knew they were doing it.
|
||
|
||
The voices of our computers -- the ones we hear in our heads -- are always
|
||
just right. If designers simply provide the opportunity for projection and
|
||
facilitate the transaction in a seamless way, well do most of the work and
|
||
add emotional richness and content. Get in the way too much, its like that
|
||
little paperclip guy on Windows programs, always in your face. I dont know
|
||
anyone who wants that animation dancing on their screen all the time like a
|
||
fly you cant swat.
|
||
|
||
The Infocom interactive text games from the 1980s were powerfully
|
||
evocative. Games like Trinity, A Mind Forever Voyaging, and Hitchhikers
|
||
Guide to the Galaxy used clever text and poetic imagery to invite us to
|
||
co-create landscapes as magical as those I remember from childrens books.
|
||
With larger platforms and memory devices, games evolved into interactive
|
||
movies that shut down that process. When graphics dominate the interface,
|
||
theres less room for the activity of the imagination.
|
||
|
||
Children imagine so much, Eleanor Roosevelt observed, because they have so
|
||
little experience. As our experience grows, the magical landscapes of our
|
||
childhood vanish, replaced with interstate highways, convenience stores and
|
||
power lines. A little more imagination and a little less information
|
||
wouldnt hurt. It gives our souls some room to maneuver. If computers
|
||
provide just enough cues to elicit our projections, well do the rest.
|
||
Well endow distributed networks, human and non-human alike, with
|
||
personality, presence, and intentionality as the ancient Greeks saw gods in
|
||
every rock and grove and thunderstorm.
|
||
|
||
Cyberspace is space indeed, brimful of gods and goddesses, angels and
|
||
demons waiting to become flesh. Thats neither good nor bad, its just
|
||
whats so. Digital deities are emerging now in the brackish tidewaters of
|
||
cyberspace, where all life begins. If we accept responsibility for
|
||
understanding how we co-create them, how we interact with the Net and the
|
||
entire universe unconsciously and automatically, then we can cooperate with
|
||
how our brains work anyway. They make up the game whether we want them to
|
||
or not. Out there and in here are metaphors, defining preconditions of
|
||
perception as space. The grid is imaginary, and the grid is real. Thats
|
||
the playing field of our lives so we might as well learn the rules, then
|
||
work and play with gusto and be all used up when the game is done.
|
||
|
||
**********************************************************************
|
||
|
||
Islands in the Clickstream is a weekly column written by
|
||
Richard Thieme exploring social and cultural dimensions
|
||
of computer technology. Comments are welcome.
|
||
|
||
Feel free to pass along columns for personal use, retaining this
|
||
signature file. If interested in (1) publishing columns
|
||
online or in print, (2) giving a free subscription as a gift, or
|
||
(3) distributing Islands to employees or over a network,
|
||
email for details.
|
||
|
||
To subscribe to Islands in the Clickstream, send email to
|
||
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
||
body of the message. To unsubscribe, email with "unsubscribe
|
||
islands" in the body of the message.
|
||
|
||
Richard Thieme is a professional speaker, consultant, and writer
|
||
focused on the impact of computer technology on individuals and
|
||
organizations.
|
||
|
||
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
|
||
|
||
ThiemeWorks on the Web: http://www.thiemeworks.com
|
||
|
||
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 31 Oct 1997 10:40:31 -0800 (PST)
|
||
From: Sharif Torpis <storpis@CRL.COM
|
||
Subject: File 9--Kashpureff in custody. (fwd)
|
||
|
||
Forwarded message:
|
||
Date--Fri, 31 Oct 1997 10:40:20 -0500 (EST)
|
||
From--Marc Hurst <mhurst@fastlane.ca
|
||
|
||
Eugene Kashpureff, known for his redirect of the NSI web page,
|
||
was apprehended this morning in Toronto by undercover RCMP
|
||
detectives.
|
||
|
||
Pending a deportation hearing, he will be returned to New York to
|
||
face Felony Wire Fraud charges that were sworn out against him
|
||
after he had settled out of court with NSI in regard to their
|
||
civil suit.
|
||
|
||
Early in the week Eugene relinquished control of the Alternic to
|
||
an adhoc industry group and that group will be making an
|
||
announcement in the next few days.
|
||
|
||
A this time I have no further information to volunteer.
|
||
|
||
Sincerely
|
||
Marc Hurst
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 7 May 1997 22:51:01 CST
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
||
SUBSCRIBE CU-DIGEST
|
||
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
||
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
||
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
||
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
||
Web-accessible from: http://www.etext.org/CuD/CuD/
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #9.79
|
||
************************************
|
||
|
||
|