505 lines
19 KiB
Plaintext
505 lines
19 KiB
Plaintext
Volume 3, Issue #3.00 (January 6, 1991)
|
|
|
|
CuD #3.00: File 1 of 6: Moderator's corner
|
|
CuD #3.00: File 2 of 6: From the Mailbag
|
|
CuD #3.00: File 3 of 6: Gender-Neutral Language
|
|
CuD #3.00: File 4 of 6: Sexism and the CU
|
|
CuD #3.00: File 5 of 6: Security on the Net
|
|
CuD #3.00: File 6 of 6: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.01 (January 12, 1991)
|
|
|
|
SPECIAL ISSUE: RESPONSES TO CU/SEXISM ARTICLES
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.02 (January 16, 1991)
|
|
|
|
SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.03 (January 22, 1991)
|
|
|
|
CuD #3.03: File 1 of 4: Moderator's corner
|
|
CuD #3.03: File 2 of 4: From the Mailbag
|
|
CuD #3.03: File 3 of 4: CU-Related Bibliography
|
|
CuD #3.03: File 4 of 4: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.04 (January 28, 1991)
|
|
|
|
CuD #3.04, File 1 of 4: Moderator's corner
|
|
CuD #3.04, File 2 of 4: From the Mailbag
|
|
CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
|
|
CuD #3.04, File 4 of 4: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.05 (February 9, 1991)
|
|
|
|
CuD #3.05, File 1 of 8: Moderator's corner
|
|
CuD #3.05: File 2 of 8: From the Mailbag
|
|
CuD #3.05: File 3 of 8: Arrest of Phiber Optik
|
|
CuD #3.05: File 4 of 8: The Dictator--My Thoughts
|
|
CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint)
|
|
CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops.
|
|
CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt
|
|
CuD #3.05: File 8 of 8: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.06 (February 23, 1991)
|
|
|
|
|
|
CuD #3.06, File 1 of 6: Moderator's corner
|
|
CuD #3.06: File 2 of 6: From the Mailbag
|
|
CuD #3.06: File 3 of 6: CuD Archive Server
|
|
CuD #3.06: File 4 of 6: No Felony Charges against Phiber O.
|
|
CuD #3.06: File 5 of 6: The FBI Comes Rapping.....
|
|
CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.07 (March 2, 1991)
|
|
|
|
CuD #3.07, File 1 of 6: Moderator's corner
|
|
CuD #3.07: File 2 of 6: From the Mailbag
|
|
CuD #3.07: File 3 of 6: CuD Index for Volume Two
|
|
CuD #3.07: File 4 of 6: EFF Job Announcement
|
|
CuD #3.07: File 5 of 6: Computers in the Movies
|
|
CuD #3.07: File 6 of 6: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.08 (March 12, 1991)
|
|
|
|
CuD #3.08, File 1 of 6: Moderator's corner
|
|
CuD #3.08: File 2 of 6: From the Mailbag
|
|
CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted
|
|
CuD #3.08: File 4 of 6: What the EFF's Been Doing
|
|
CuD #3.08: File 5 of 6: Book Review: Computer Ethics
|
|
CuD #3.08: File 6 of 6: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.09 (March 19, 1991)
|
|
|
|
CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype?
|
|
CuD #3.09: File 2 of 2: Computers & First Amendment
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.10 (March 28, 1991)
|
|
|
|
CuD #3.10--File 1 of 5: From the Mailbag
|
|
CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II
|
|
CuD #3.10--File 3 of 5: AP Story on Len Rose
|
|
CuD #3.10--File 4 of 5: Washington Post Story on Len Rose
|
|
CuD #3.10--File 5 of 5: Len Rose and the Washington Post
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.11 (April 4, 1991)
|
|
|
|
CuD #3.11: File 1 of 5: Moderators' Corner
|
|
CuD #3.11: File 2 of 5: From the Mailbag
|
|
CuD #3.11: File 3 of 5: Sundevil Arrest Announced
|
|
CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose
|
|
CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.12 (April 15, 1991)
|
|
|
|
CuD #3.12: File 1 of 4: From the Moderators
|
|
CuD #3.12: File 2 of 4: From the Mailbag
|
|
CuD #3.12: File 3 of 4: Responses to Business Week Article
|
|
CuD #3.12: File 4 of 4: Using the CuD mailserver
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.13 (April 21, 1991)
|
|
|
|
CuD #3.13: File 1 of 4: From the Mailbag
|
|
CuD #3.13: File 2 of 4: Response to Len Rose Article (1)
|
|
CuD #3.13: File 3 of 4: Response to Len Rose Article (2)
|
|
CuD #3.13: File 4 of 4: The CU in the News
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.14 (April 26, 1991)
|
|
|
|
CuD #3.14: File 1 of 6: Moderators Corner
|
|
CuD #3.14: File 2 of 6: Comments on Len Rose Articles
|
|
CuD #3.14: File 3 of 6: Moving toward Common Ground?
|
|
CuD #3.14: File 4 of 6: CERT Advisory
|
|
CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker
|
|
CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine!
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.15 (May 2, 1991)
|
|
|
|
CuD #3.15: File 1 of 3: Moderators Corner
|
|
CuD #3.15: File 2 of 3: The CU in the News
|
|
CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL.
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.16 (May 9, 1991)
|
|
|
|
CuD #3.16: File 1 of 6: Moderators Corner
|
|
CuD #3.16: File 2 of 6: Is Prodigy Snooping?
|
|
CuD #3.16: File 3 of 6: Prodigy under Fire
|
|
CuD #3.16: File 4 of 6: Assorted Comments on Prodigy
|
|
CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File
|
|
CuD #3.16: File 6 of 6: A Few Observations on Prodigy
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.17 (May 17, 1991)
|
|
|
|
CuD #3.17: File 1 of 5: Moderators Corner
|
|
CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing
|
|
CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing
|
|
CuD #3.17: File 4 of 5: Exhibit A from Memorandum
|
|
CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Volume 3, Issue #3.18 (May 28, 1991)
|
|
|
|
SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.19 (June 4, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: Moderator's Corner
|
|
File 2: From the Mailbag
|
|
File 3: Thrifty-Tel--Victim or Victimizer?
|
|
File 4: The CU in the News
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.20 (June 10, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: Moderator's Corner
|
|
File 2: From the Mailbag
|
|
File 3: Bay Area Archive Site
|
|
File 4: Top Ten Fallacies about SJG Raid
|
|
File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance
|
|
File 6: EFFector Online 1.07: S.266 Loses First Round
|
|
File 7: How to get WATCH.EXE
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.21 (June 17, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: Moderator's Corner
|
|
File 2: From the Mailbag
|
|
File 3: Review of Gary Marx's UNDERCOVER
|
|
File 4: Review of PROTECTORS OF PRIVILEGE
|
|
File 5: Review of THE INFORMATION WEB
|
|
File 6: Hollywood Hacker Sentenced
|
|
File 7: Len Rose Sentenced (Reprint from Newsbytes)
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.22 (June 21, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: Moderators' Corner
|
|
File 2: From the Mailbag
|
|
File 3: Punishment and Control: Reply to Gene Spafford
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.24 (July 3, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: From the Mailbag (Response to "Cyberpunk" definition)
|
|
File 2: Bill Vajk, Len Rose, Gene Spafford
|
|
File 3: Comsec Security Press Release
|
|
File 4: Comments on ComSec Data Security
|
|
File 5: Police Confiscations and Police Profit
|
|
File 6: House Crime Bill (1400) and its Threat to Modemers
|
|
File 7: Law Panel Recommends Computer Search Procedures
|
|
File 8: The CU in the News (data erasing; cellular fraud)
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Volume 3, Issue #3.23 (June 27, 1991)
|
|
CONTENTS THIS ISSUE:
|
|
File 1: From the Mailbag (Response to Dalton; Hacker Definitions)
|
|
File 2: Warrants issued for Indiana and Michigan "Hackers"
|
|
File 3: More on Thrifty-Tel
|
|
File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy)
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
Today's Contents:
|
|
Moderators' Corner
|
|
Spaf's Response to Bill Vajk
|
|
Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach)
|
|
LOD Members for Comsec Computer Security (News Reprint)
|
|
Alcor Email (ECPA) Case Settled (Keith Henson)
|
|
NIST announces public-key digital signature standard (gnu)
|
|
Secret Service Pays Hacker Call (Reprint from Newsbytes)
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
Contents, #3.26 (June 18, 1991)
|
|
File 1: Moderators' Corner
|
|
File 2: The Vajk-Spaf-Leichter dialogue continues......
|
|
File 3: The TERMINUS of Len Rose
|
|
File 4: "Computer Crime" paper by Brian Peretti available
|
|
File 5: Doc Savage Sentenced (NEWSBYTES Reprint)
|
|
File 6: CompuServe Responds to Policy and Operations Questions
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
Contents, #3.27 (July 27, 1991)
|
|
Subject: File 1-- Response to "The Terminus of Len Rose"(1)
|
|
Subject: File 2-- Response to "The Terminus of Len Rose"(2)
|
|
Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3)
|
|
Subject: File 4-- chinet review
|
|
Subject: File 5-- Comsec Data Security Article Corrections
|
|
Subject: File 6-- Crypto-conference statement
|
|
Subject: File 7-- Reasonable laws on computer crime
|
|
Subject: File 8-- re: Bill Vajk's latest comments
|
|
Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de
|
|
Subject: File 10--Late reply to Dutch Crackers article (CUD3.19)
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28)
|
|
>> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE <<
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
Contents, #3.28 (August 1, 1991)
|
|
Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE
|
|
Subject: File 2--CuD Review of _Computer Ethics_ (Reprint)
|
|
Subject: File 3--Re: Hackers - Clamp Down NOW!
|
|
Subject: File 4--Reply to Tom Forester Article
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.29 (AUGUST 9, 1991)
|
|
Subject: File 1--Moderators' Corner
|
|
Subject: File 2--Say Goodbye to FOIA?
|
|
Subject: File 3--Hackers Challenged to Break In
|
|
Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson
|
|
Subject: File 5--text of chron-spacemail
|
|
Subject: File 6--Reply to Gene Spafford
|
|
Subject: File 7--Estimates on virus activity
|
|
Subject: File 8--Research Analysis
|
|
Subject: File 9--comp.patents, misc.legal.computing and misc.int-property
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
#3.30 (AUGUST 16, 1991)
|
|
File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
|
|
File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
|
|
File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
|
|
File 4--Mystery Lurks In The Death of INSLAW Reporter
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.31 (AUGUST 23, 1991)
|
|
File 1--Moderators' Corner: Blurbs
|
|
File 2--Request info on suggestions for a class
|
|
File 3--New BBS for CuD back issues and other services
|
|
File 4--Moderators' Corner: Blurbs
|
|
File 5--BOARDWATCH Magazine
|
|
File 6--NREN Boondoggle?
|
|
File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
|
|
File 8--Memes, Gurus, and Viruses
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
-> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-
|
|
|
|
CONTENTS, #3.32 (September 8, 1991)
|
|
File 1--CYBERPUNK Review
|
|
File 2--Review of _CYBERPUNK_
|
|
File 3--_CYBERPUNK_ Review
|
|
File 4--Newsweek review CYBERPUNK
|
|
File 5--Review of _CYBERPUNK_
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.33 ( September 14, 1991)
|
|
File 1--Moderators' Corner
|
|
File 2--Clarification of "Boycott" Comment
|
|
File 3--How BellSouth Calculated $79,000
|
|
File 4--Houston Chronicle spacemail follow
|
|
File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
|
|
File 6--"Freaker's Bureau Incorporated" (FBI)
|
|
File 7--Review of Site Security Handbook (by Dark Adept)
|
|
File 8--Complain to Journalists
|
|
File 9--Spaf's Response to Reviews of _Unix Security_
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.34 ( September 25, 1991)
|
|
File 1--Moderators' Corner
|
|
File 2--WANTED: TARGETS OF OPERATION SUN DEVIL
|
|
File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint)
|
|
File 4--New York Tax Law and Commentary by Tony Mack
|
|
File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint)
|
|
File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint)
|
|
File 7--Clarification of NY BBS Law
|
|
File 8--Summary of Significance of NY "BBS Download Tax" (reprint)
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.35 ( October 4, 1991)
|
|
Subject: File 1--Moderators' Corner
|
|
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
|
|
Subject: File 3--Computer Security Basics review
|
|
Subject: File 4--Steam age cyberpunk
|
|
Subject: File 5--Errata to "Practical Unix Security"
|
|
Subject: File 6--Living with the Law -- A view from Finland
|
|
Subject: File 7--Let's Get It Right.
|
|
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
|
|
Subject: File 9--Announcement
|
|
Subject: File 10--Cyberspace Conference in Montreal
|
|
Subject: File 11--Conference Info and Press Releases
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.36 ( October 12, 1991)
|
|
Subject: File 1-- Intro to Biblio and Resources Moderators' Corner
|
|
Subject: File 2-- General CU-Related Bibliography
|
|
Subject: File 3-- Dissertations and Theses
|
|
Subject: File 4-- General On-Line and Print Resources
|
|
Subject: File 5-- Misc. Books for Fun Reading
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
**** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****
|
|
|
|
CONTENTS, #3.37 ( October 19, 1991)
|
|
File 1: Summary of Geraldo's _Now it can be Told_
|
|
File 2: Excerpts from "Mad Hacker's Key Party"
|
|
File 3: Review_of_Now_It_Can_Be_Told_
|
|
File 4: Geraldo Rivera show on "Hacking"
|
|
File 5: The_RISKS_of_Geraldo
|
|
File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38
|
|
|
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
|
|
CONTENTS, #3.38 ( October 27, 1991)
|
|
File 1: Geraldo's _Now it can be Told_ Revisited
|
|
File 2: Comment on the Geraldo Show
|
|
File 3: A Guest's-eye view of the Geraldo Show
|
|
File 4: Second Thoughts about the "Ingraham Massacre"
|
|
File 5: Response to CuD #3.37's "Mad Hacker" Issue
|
|
File 6: Release of Informatik #1
|
|
File 7: Second Annual XMASCON
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS, #3.39 ( November 3, 1991)
|
|
File 1: Moderator's Corner--Brendan Kehoe's FTP information
|
|
File 2: The Secret Service and Protection of Privacy
|
|
File 3: Re: Response to Bill Vajk's FOIA Piece
|
|
File 4: Letters from Prison: Installment #1
|
|
File 5: Diehard 2 And Hacking
|
|
File 6: Re: CuD - Now It Can Be Told
|
|
File 7: Is the Government creating malign hackers?
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS, #3.40 ( November 10, 1991)
|
|
File 1: Rhetoric and CuD
|
|
File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38
|
|
File 3: Response to Ingraham Criticisms
|
|
File 4: Draft of BBS warnings to Law Enforcement Agents
|
|
File 5: CU Bibliography Update
|
|
File 6: Senate Bill 516 : Electronic Privacy in the Workplace
|
|
File 7: Letter from Prison (part 2 of 2)
|
|
File 8: "Password violations helped Hill hacker"
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
CONTENTS, #3.41 ( November 16, 1991)
|
|
|
|
Bill Cook's opening statement in Neidorf/PHRACK trial
|
|
|
|
...and more!
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS, #3.42 ( November 30, 1991)
|
|
File 1--Moderators' Corner
|
|
File 2--CPSR FOIAs Secret Service
|
|
File 3--Responses to CPSR (Reprinted from Telecom Digest)
|
|
File 4--Why Covert Surveillance is Wrong
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS, #3.43 ( Dec 8, 1991)
|
|
File 1--Moderators' Corner
|
|
File 2--You can help build the National Public Network. Here's how.
|
|
File 3--#3.41--Bill Cook's opening statement in the Neidorf trial
|
|
File 4-- Two Juveniles arrested in BBS Extortion case
|
|
File 5--Law Enforcement and Rights
|
|
File 6--Townson's reply to Neidorf (in Cu Digest, #3.42)
|
|
File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson)
|
|
File 8--Software Piracy
|
|
File 9--Hacker Convicted
|
|
File 10--"Teens Tapped Computers of U.S. Military"
|
|
File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
|
|
File 12--Here's something you might find of interest
|
|
File 13--24 Year Old Cracks NASA
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS, #3.44 ( Dec 17, 1991)
|
|
File 1: Jyrkis Posting
|
|
File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected
|
|
File 3: FBI vs Kiddie Porn
|
|
File 4: "Getting what he Deserved?" (Reprint from Effector 2.02)
|
|
File 5--A book worth adding to your CuD list ...
|
|
File 6: E-mail privacy bibliography
|
|
File 7: Second CFP Conference
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
** END CuD INDEX VOLUME 3 **
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|