783 lines
32 KiB
Plaintext
783 lines
32 KiB
Plaintext
Date: Fri, 9 Jul 93 19:28:15 PDT
|
|
Reply-To: <surfpunk@osc.versant.com>
|
|
Return-Path: <cocot@osc.versant.com>
|
|
Message-ID: <surfpunk-0090@SURFPUNK.Technical.Journal>
|
|
Mime-Version: 1.0
|
|
Content-Type: text/plain
|
|
From: surfpunk@osc.versant.com (k^a + l^a = m^a)
|
|
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
|
|
Subject: [surfpunk-0090] DIGEST: Fermat's Last, PW, Hermes, Cyborganics, Incidents
|
|
|
|
INSIDE SURFPUNK-0090:
|
|
[stjude] The Chicago Tribune on Fermat's Last Theorem
|
|
[Webb] _Future_ issuse of PW
|
|
[Webb] Emerald Tablets of Hermes
|
|
[Webb] Cyborganics
|
|
[spaf] Incident Response Workshop info
|
|
[strick] thanks for the U S Government Subscription
|
|
catalogs and brochures
|
|
|
|
This should be it for a while. Seeya in August --strick
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
From: Judith Milhon <stjude@well.sf.ca.us>
|
|
To: cypherpunks@toad.com
|
|
Subject: fwd of Chi.Trib article...
|
|
Date: Tue, 6 Jul 1993 18:42:20 -0700
|
|
|
|
...for you maths hooligans and crypto thugs...
|
|
From: SPOETZ
|
|
Subj: The Chicago Tribune on Fermat's Last Theorem
|
|
To: DELTORTO, SaintJude
|
|
|
|
|
|
------- Forwarded Message
|
|
Subject: The Chicago Tribune on Fermat's Last Theorem
|
|
From: David Notkin <notkin@whistler.cs.washington.edu>
|
|
|
|
|
|
The following column appeared in the Chicago Tribune / DuPage County edition
|
|
Tuesday June 29 1993 page 2-1.
|
|
|
|
MATH RIOTS PROVE FUN INCALCULABLE
|
|
/by/ Eric Zorn
|
|
|
|
/begin italics/
|
|
News Item (June 23) -- Mathematicians worldwide were excited and
|
|
pleased today by the announcement that Princeton University professor
|
|
Andrew Wiles had finally proved Fermat's Last Theorem, a 365-year-old
|
|
problem said to be the most famous in the field.
|
|
/end italics/
|
|
|
|
Yes, admittedly, there was rioting and vandalism last week during the
|
|
celebration. A few bookstores had windows smashed and shelves stripped,
|
|
and vacant lots glowed with burning piles of old dissertations. But
|
|
overall we can feel relief that it was nothing -- nothing -- compared
|
|
to the outbreak of exuberant thuggery that occurred in 1984 after
|
|
Louis DeBranges finally proved the Bieberbach Conjecture.
|
|
|
|
"Math hooligans are the worst," said a Chicago Police Department
|
|
spokesman. "But the city learned from the Bieberbach riots. We were
|
|
ready for them this time."
|
|
|
|
When word hit Wednesday that Fermat's Last Theorem had fallen, a
|
|
massive show of force from law enforcement at universities all around
|
|
the country headed off a repeat of the festive looting sprees that have
|
|
become the traditional accompaniment to triumphant breakthroughs in
|
|
higher mathematics.
|
|
|
|
Mounted police throughout Hyde Park kept crowds of delirious wizards at
|
|
the University of Chicago from tipping over cars on the midway as they
|
|
first did in 1976 when Wolfgang Haken and Kenneth Appel cracked the
|
|
long-vexing Four-Color Problem. Incidents of textbook-throwing and
|
|
citizens being pulled from their cars and humiliated with difficult
|
|
story problems last week were described by the university's math
|
|
department chairman Bob Zimmer as "isolated."
|
|
|
|
Zimmer said, "Most of the celebrations were orderly and peaceful. But
|
|
there will always be a few -- usually graduate students -- who use any
|
|
excuse to cause trouble and steal. These are not true fans of Andrew
|
|
Wiles."
|
|
|
|
Wiles himself pleaded for calm even as he offered up the proof that
|
|
there is no solution to the equation x^n + y^n = z^n when n is a
|
|
whole number greater than two, as Pierre de Fermat first proposed in
|
|
the 17th Century. "Party hard but party safe," he said, echoing the
|
|
phrase he had repeated often in interviews with scholarly journals as
|
|
he came closer and closer to completing his proof.
|
|
|
|
Some authorities tried to blame the disorder on the provocative
|
|
taunting of Japanese mathematician Yoichi Miyaoka. Miyaoka thought he
|
|
had proved Fermat's Last Theorem in 1988, but his claims did not bear
|
|
up under the scrutiny of professional referees, leading some to
|
|
suspect that the fix was in. And ever since, as Wiles chipped away
|
|
steadily at the Fermat problem, Miyaoka scoffed that there would be no
|
|
reason to board up windows near universities any time soon; that God
|
|
wanted Miyaoka to prove it.
|
|
|
|
In a peculiar sidelight, Miyaoka recently took the trouble to secure a
|
|
U.S. trademark on the equation "x^n + y^n = z^n " as well as the
|
|
now-ubiquitous expression "Take that, Fermat!" Ironically, in defeat,
|
|
he stands to make a good deal of money on cap and T-shirt sales.
|
|
|
|
This was no walk-in-the-park proof for Wiles. He was dogged, in the
|
|
early going, by sniping publicity that claimed he was seen puttering
|
|
late one night doing set theory in a New Jersey library when he either
|
|
should have been sleeping, critics said, or focusing on arithmetic
|
|
algebraic geometry for the proving work ahead.
|
|
|
|
"Set theory is my hobby, it helps me relax," was his angry explanation.
|
|
The next night, he channeled his fury and came up with five critical
|
|
steps in his proof. Not a record, but close.
|
|
|
|
There was talk that he thought he could do it all by himself,
|
|
especially when he candidly referred to University of California
|
|
mathematician Kenneth Ribet as part of his "supporting cast," when most
|
|
people in the field knew that without Ribet's 1986 proof definitively
|
|
linking the Taniyama Conjecture to Fermat's Last Theorem, Wiles would
|
|
be just another frustrated guy in a tweed jacket teaching calculus to
|
|
freshmen.
|
|
|
|
His travails made the ultimate victory that much more explosive for
|
|
math buffs. When the news arrived, many were already wired from
|
|
caffeine consumed at daily colloquial teas, and the took to the streets
|
|
en masse shouting, "Obvious! Yessss! It was obvious!"
|
|
|
|
The law cannot hope to stop such enthusiasm, only to control it. Still,
|
|
one
|
|
has to wonder what the connection is between wanton pillaging and a
|
|
mathematical proof, no matter how long-awaited and subtle.
|
|
|
|
The Victory Over Fermat rally, held on a cloudless day in front of a
|
|
crowd of 30,000 (police estimate: 150,000) was pleasantly peaceful.
|
|
Signs unfurled in the audience proclaimed Wiles the greatest
|
|
mathematician of all time, though partisans of Euclid, Descartes,
|
|
Newton, and C.F. Gauss and others argued the point vehemently.
|
|
|
|
A warmup act, The Supertheorists, delighted the crowd with a ragged
|
|
song, "It Was Never Less Than Probable, My Friend," which included such
|
|
gloating, barbed verses as --- "I had a proof all ready / But then I
|
|
did a choke-a / Made liberal assumptions / Hi! I'm Yoichi Miyaoka."
|
|
|
|
In the speeches from the stage, there was talk of a dynasty,
|
|
specifically that next year Wiles will crack the great unproven Riemann
|
|
Hypothesis ("Rie-peat! Rie-peat!" the crowd cried), and that after the
|
|
Prime-Pair Problem, the Goldbach Conjecture ("Minimum Goldbach," said
|
|
one T-shirt) and so on.
|
|
|
|
They couldn't just let him enjoy his proof. Not even for one day. Math
|
|
people. Go figure 'em.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
St.Jude the Oblique
|
|
|
|
|
|
|
|
________________________________________________________________________
|
|
|
|
Date: Wed, 23 Jun 93 14:24 GMT
|
|
From: Don Webb <0004200716@mcimail.com>
|
|
To: surfpunk <surfpunk@versant.com>
|
|
To: Fringeware <fringeware@wixer.cactus.org>
|
|
Subject: _Future_ issuse of PW
|
|
|
|
|
|
Dear Folk,
|
|
|
|
_Processed World_ Magazine, supported by BACAT (The Bay Area
|
|
Center for Arts and Technology) is in the process of putting
|
|
together it's Utopian Future issue. So you might wish to contact
|
|
them for writer's guidelines. Their phone number is
|
|
415-626-2979, their email is pwmag@well.sf.ca.us and their
|
|
address is 41 Sutter St. #1829/ San Francisco, CA 94104. They
|
|
pay nothing, but got one hell of a distribution. Leftist office
|
|
workers with good graphics . . .
|
|
|
|
|
|
Don Webb
|
|
0004200716@mcimail.com
|
|
The Secret of magic is to transform the magician.
|
|
|
|
|
|
________________________________________________________________________
|
|
|
|
Date: Mon, 28 Jun 93 14:02 GMT
|
|
From: Don Webb <0004200716@mcimail.com>
|
|
To: Fringeware <fringeware@wixer.cactus.org>
|
|
To: surfpunk <surfpunk@versant.com>
|
|
Subject: Emerald Tablets of Hermes
|
|
|
|
|
|
Dear Folk,
|
|
|
|
|
|
I am involved on a research project concerning the magical papyri
|
|
recently. I was struck this weekend, while a friend helped learn
|
|
how to use UUDCODE (which he had downloaded from Northern
|
|
Lights), how similar the technologies of the magician writing
|
|
magical papyri in the first four centuries of the common era and
|
|
the current computer technology is. Magic in the Roman Empire
|
|
was a crime against the state, so the magical books utilized
|
|
means of compression and encoding -- the development of compact
|
|
meaningful utterance -- loaded with meaning for the Initiate --
|
|
and meaningless for the non-Initiate. This is an interesting
|
|
remanifestation. The early use hid valuable information in an
|
|
information dry age -- today as we are drowning in information
|
|
codes become more and more important to present the useful
|
|
information as a pure stream among the filth.
|
|
|
|
I was playing around with the Emerald Tablets of Hermes with a
|
|
view for toward a semiotic theory of magic, and came up with what
|
|
is below. Feel free to share this with anyone, who you feel
|
|
might be interested.
|
|
|
|
The Precepts of Hermes Trismegistus
|
|
(Authentically Translated from an Unknown Tongue)
|
|
|
|
I. What I say is not fictitious but reliable and true.
|
|
|
|
II. What is below is like what is above, and what is above is
|
|
like what is below. They work to accomplish the wonders of the
|
|
One Thing.
|
|
|
|
III. As all things were created by the One Word of the Mind, so
|
|
all things were created by the One Thing by adaptation.
|
|
|
|
IV. I Hermes-Toth am the teacher of magic and did create words
|
|
for magic is a process of inter-reality communication.
|
|
|
|
V. Magic is the process by which that which is below is able to
|
|
communicate its will to that which is above,and change the subtle
|
|
paradigms of that which is above. If this is done that which is
|
|
below shall receive a message in the form of a modification of
|
|
the environment below.
|
|
|
|
VII. That this should be so is not subject to objective
|
|
experimentation. It is a divine event, a legacy from the Mind to
|
|
the Children of Sophia, whose honeyed lips drip with wisdom.
|
|
These last born Children are the most mutable of all beings,and
|
|
must remember to separate the subtle from the coarse, and to be
|
|
prudent and circumspect as they do so.
|
|
|
|
VIII. Magical communication does not take place as the speech of
|
|
men and women in the marketplace, which I Hermes-Toth also rule,
|
|
but it does follow the same Archetype, which I myself created in
|
|
order that I might see the worlds.
|
|
|
|
IX. This has more virtue than Virtue, herself, because it
|
|
controls every subtle thing and it penetrates every subtle thing.
|
|
|
|
X. This is the way the world is created and re-created.
|
|
|
|
XI. This is the origin of the wonders that are performed here.
|
|
|
|
XII. This is why I am called "Thrice Greatest Hermes" for hold
|
|
the Mysteries of the Sender, the Receiver, and the Message.
|
|
|
|
XIII. What I had to say here about the Process of Transformation
|
|
is finished.
|
|
|
|
|
|
Don Webb
|
|
0004200716@mcimail.com
|
|
The Secret of magic is to transform the magician.
|
|
|
|
________________________________________________________________________
|
|
|
|
|
|
|
|
From: Don Webb <0004200716@mcimail.com>
|
|
To: Arachnet <Arachnet%UOTTAWA.BITNET@pucc.princeton.edu>
|
|
To: surfpunk <surfpunk@versant.com>
|
|
To: "fringeware@wixer.bga.com" <fringeware@wixer.bga.com>
|
|
Subject: FringeWare, Inc.
|
|
|
|
Dear Folk,
|
|
|
|
The following is an article I am doing for _Tech-Connect_
|
|
on FringeWare Inc. whihc I thought might be of interest.
|
|
It is Copyright (c) 1993 Don Webb
|
|
|
|
Don Webb
|
|
0004200716@mcimail.com
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cyborganics
|
|
|
|
by
|
|
Don Webb
|
|
|
|
|
|
|
|
My favorite haunts have always been the places where I can trade
|
|
ideas and dreams, and occasionally do a little business. In
|
|
short I seek out the hidden temples of Hermes, god of
|
|
communication, commerce, and magic. The best temple I've found
|
|
in quite sometime is Fringeware, whose fathers are Paco Xander
|
|
Nathan and Jon Lebkowsky and whose mother is the Internet. I
|
|
interviewed Paco Nathan Xander after his recent trip to Europe --
|
|
Fringeware is far more than an Austin based BBS and mail order
|
|
catalog service -- it does business in Europe, Japan an Latin
|
|
America (as well as extensive sales in the US and Canada). The
|
|
big idea that Fringeware promotes is Cyborganics, which Paco
|
|
defined for me, "Cyborganics - a community, alive, growing around
|
|
a marketplace based on people and machines merged into an ecology
|
|
of activities. It may sound like science fiction, but it's real,
|
|
day to day biz for us."
|
|
|
|
Fringeware sells books,magazines, Do-It-Yourself electronics, DIY
|
|
Brain reprogrammers, and independently developed software. It
|
|
gives away ideas and dreams. Fringeware exists as an electronic
|
|
list, that is to say whenever Jon or Paco or any member of the list
|
|
mails things to Fringeware, it shows up in everybody's'
|
|
electronic mailboxes. So not only are there product annocemnets
|
|
from Jon and Paco, but filmmaker David Blair discussing his film Wax,
|
|
or virtual reality art show announcements, or information on
|
|
the cypherpunk movement, or open ended discussion on Buddhist
|
|
economics. The best trades here are those of ideas and
|
|
Principles.
|
|
|
|
The best selling physical items are: Bestsellers: two categories
|
|
seem to run in the lead.. electronic publications and brain
|
|
machines. So we have titles like Beyond Cyberpunk, Electronic
|
|
Hollywood and all the Voyager Expanded Book series. Then on the
|
|
brain side, we've got Day Dreamer (nonelectronic - REALLY great)
|
|
and the cool, low-cost, post-newage Synetics line (electronic).
|
|
Funny thing, but our ebook titles are all for the Mac - people
|
|
always come to us demanding DOS titles and it's a joke.. Apple
|
|
plowed a whole lot of cash under-writing the grassroots
|
|
multimedia revolution while Microsoft was busy undermining small
|
|
developers in the same arena - so now the fallout is that nobody
|
|
wants to write DOS multimedia w/o a ridiculously top-heavy
|
|
business plan.. Actually, the Platform Wars really strike a sour
|
|
spot in me - I stay away FAR from people who get dogmatic about
|
|
machines, . wanting to run multimedia on DOS or spreadsheets on
|
|
Unix - wrong tool for the wrong purpose - being a software
|
|
developer on Mac, DOS, Windows, Unix, etc., I could go on at
|
|
length about this particular form of human perversity."
|
|
Fringeware has a typically value added catalog including great
|
|
fiction, art, and ideas plus the product line. Paco said of the
|
|
catalog, "A person can make initial contact by neocranially
|
|
fondling a copy of Fringe Ware Review off the newsstand and
|
|
finding where to proceed from there. That was carefully crafted
|
|
as an intro to our biz: good roadmap, pretty easy to parse. We're
|
|
looking for people to buy the magazines, always looking for good
|
|
writers and artists, people to buy products, vendors selling
|
|
products, interesting people to interview/grok, cyborganic events
|
|
to help sponsor, people to participate in the online email list,
|
|
etc., so there's plenty of avenues for approach. My favorite is
|
|
when somebody sends a check in the mail with a note saying "12
|
|
widgets to the following address" but of course most of our mail
|
|
is much stranger and more wonderfully diverse."
|
|
|
|
If you want to contact Fringeware directly (to obtain a catalog,
|
|
or join their Email service, which I can not recommend too highly):
|
|
|
|
FringeWare Inc.
|
|
PO Box 49921
|
|
Austin, TX 78765 USA
|
|
fringeware@wixer.bga.com
|
|
|
|
Jon and Paco both came from solid business backgrounds, they
|
|
decided to play the game on their own terms, and for rewards
|
|
beyond, but including the buck. Paco's words on the subject are
|
|
worth considering," Jon and I are both writers, with diverse
|
|
histories of other talents, but we could surmise our common
|
|
goal/focus under a single heading: cyborganics. I really dare
|
|
just about anybody to go get a really good education, then get
|
|
involved in high-tech megacorp biz for several years, then jump
|
|
out on their own and consider how to make a living in the midst
|
|
of a burgeoning Info Economy. I mean, take a hard look at what
|
|
the monicker "Info Economy" really implies in terms of which
|
|
markets will live and which will die. My own resume reads: West
|
|
Point, Stanford, IBM, NASA, Bell Labs, etc., so I'm not just
|
|
musing here.."
|
|
|
|
|
|
________________________________________________________________________
|
|
|
|
|
|
To: surfpunk@versant.com
|
|
Subject: Incident Response Workshop info
|
|
Organization: COAST, Department of Computer Sciences, Purdue Univ.
|
|
Date: Thu, 08 Jul 93 20:16:18 -0500
|
|
From: Gene Spafford <spaf@cs.purdue.edu>
|
|
|
|
[Please forward this to other lists and to interested parties.]
|
|
|
|
** NOTE: July 10 is the deadline for discounted registration!! **
|
|
|
|
PRELIMINARY AGENDA
|
|
5th Computer Security Incident Handling Workshop
|
|
Sponsored by the Forum of Incident Response and Security Teams (FIRST)
|
|
|
|
August 10-13, 1993
|
|
St. Louis, MO
|
|
|
|
|
|
TUESDAY, August 10, 1993 Full-day Tutorials
|
|
|
|
1. Creating a Security Policy
|
|
presented by Charles Cresson Wood:
|
|
|
|
[no abstract available at time of posting]
|
|
|
|
2. Vulnerabilities of the IBM PC Architecture: Virus, Worms, Trojan
|
|
Horses, and Things That Go Bump In The Night
|
|
presented by A. Padgett Peterson:
|
|
|
|
An intensive look into the architecture of the IBM-PC and MS/PC-DOS --
|
|
What it is and why it was designed that way. An understanding of
|
|
assembly language and the interrupt structure of the Intel 80x86
|
|
processor is helpful.
|
|
|
|
The day will begin with the BIOS and what makes the PC a fully
|
|
functional computer before any higher operating system is introduced.
|
|
Next will be a discussion of the various operating systems, what they
|
|
add and what is masked. Finally, the role and effects of the PC and
|
|
various LAN configurations (peer-peer and client server) will be
|
|
examined with emphasis on the potential protection afforded by login
|
|
scripting and RIGHTS.
|
|
|
|
At each step, vulnerabilities will be examined and demonstrations made
|
|
of how malicious software exploits them. Demonstrations may include
|
|
STONED, MICHELANGELO, AZUSA, FORM, JERUSALEM, SUNDAY, 4096, and EXEBUG
|
|
viruses depending on time and equipment available.
|
|
|
|
On completion attendees will understand the vulnerabilities and how to
|
|
detect attempted exploitation using simple tools included with DOS
|
|
such as DEBUG and MEM.
|
|
|
|
3. Unix Security
|
|
presented by Matt Bishop:
|
|
|
|
Unix can be a secure operating system if the appropriate controls and
|
|
tools are used. However, it is difficult for even experienced system
|
|
administrators to know all the appropriate controls to use. This
|
|
tutorial covers the most important aspects of Unix security
|
|
administration, including internal and external controls, useful
|
|
tools, and administration techniques to develop better security.
|
|
|
|
Upon completion, Unix system administrators will have a better understanding
|
|
of vulnerabilities in Unix, and of methods to protect their systems.
|
|
|
|
WEDNESDAY, August 11, 1993
|
|
|
|
8:30 - 8:45 Opening Remarks - Rich Pethia (CERT/CC)
|
|
|
|
8:45 - 9:30 Keynote Speaker - Dr. Vinton Cerf (XXXX)
|
|
|
|
9:30 - 10:00 Break
|
|
|
|
10:00 - 12:00 International Issues - Computer networks and communication lines
|
|
span national borders. This session will focus on how computer
|
|
incidents may be handled in an international context, and on
|
|
some ways investigators can coordinate their efforts.
|
|
SPEAKERS:
|
|
Harry Onderwater (Dutch Federal Police)
|
|
John Austien (New Scotland Yard)
|
|
other speakers pending
|
|
|
|
12:00 - 1:30 Lunch with Presentations by various Response Teams
|
|
|
|
1:30 - 3:00 Professional Certification & Qualification - how do you know if
|
|
the people you hire for security work are qualified for the
|
|
job? How can we even know what the appropriate qualifications
|
|
are? The speakers in this session will discuss some approaches
|
|
to the problem for some segments of industry and government.
|
|
SPEAKERS:
|
|
Sally Meglathery ((ISC)2)
|
|
Lynn McNulty (NIST)
|
|
Genevieve Burns (ISSA)
|
|
|
|
3:00 - 3:30 Break
|
|
|
|
3:30 - 6:00 Incident Aftermath and Press Relations - What happens after an
|
|
incident has been discovered? What are some of the
|
|
consequences of dealing with law enforcement and the press?
|
|
This session will feature presentations on these issues, and
|
|
include a panel to answer audience questions.
|
|
SPEAKERS:
|
|
Laurie Sefton (Apple Computer)
|
|
Jeffrey Sebring (MITRE)
|
|
Terry McGillen (Software Engineering Institute)
|
|
John Markoff (NY Times)
|
|
Mike Alexander (InfoSecurity News)
|
|
|
|
7:00 - 9:00 Reception
|
|
|
|
THURSDAY August 12
|
|
|
|
8:30 - 10:00 Preserving Rights During an Investigation - During an
|
|
investigation, sometimes more damage is done by the
|
|
investigators than from the original incident. This session
|
|
reinforces the importance of respecting the rights of victims,
|
|
bystanders, and suspects while also gathering evidence that may
|
|
be used in legal or administrative actions.
|
|
SPEAKERS:
|
|
Mike Godwin (Electronic Frontiers Foundation)
|
|
Scott Charney (Department of Justice)
|
|
other speaker pending
|
|
|
|
10:00 - 10:30 Break
|
|
|
|
10:30 - 12:00 Coordinating an Investigation - What are the steps in an
|
|
investigation? When should law enforcement be called in? How
|
|
should evidence be preserved? Veteran investigators discuss
|
|
these questions. A panel will answer questions, time permitting.
|
|
SPEAKER:
|
|
Jim Settle (FBI)
|
|
other speakers pending
|
|
|
|
12:00 - 1:30 Special Interest Lunch
|
|
|
|
1:30 - 3:00 Liabilities and Insurance - You organize security measures but
|
|
a loss occurs. Can you somehow recover the cost of damages?
|
|
You investigate an incident, only to cause some incidental
|
|
damage. Can you be sued? This session examines these and
|
|
related questions.
|
|
SPEAKERS:
|
|
Mark Rasch (Arent Fox)
|
|
Bill Cook (Willian, Brinks, Olds, Hoffer, & Gibson)
|
|
Marr Haack (USF&G Insurance Companies)
|
|
|
|
3:00 - 3:15 Break
|
|
|
|
3:15 - 5:30 Incident Role Playing -- An exercise by the attendees
|
|
to develop new insights into the process of
|
|
investigating a computer security incident.
|
|
Organized by Dr. Tom Longstaff of the CERT/CC.
|
|
|
|
7:30 - ? Birds of a Feather and Poster Sessions
|
|
|
|
|
|
FRIDAY August 13
|
|
|
|
8:30 - 10:00 Virus Incidents - How do you organize a sussessful virus
|
|
analysis and response group? The speakers in this session have
|
|
considerable experience ans success in doing exactly this. In
|
|
their talks, and subsequent panel, they will explain how to
|
|
organize computer virus response.
|
|
SPEAKERS:
|
|
Werner Uhrig (Macintosh Anti-virus Expert)
|
|
David Grisham (University of New Mexico)
|
|
Christoph Fischer (CARO)
|
|
Karen Picharczyk (LLNL/DoE CIAC)
|
|
Ken van Wyk (DISA/Virus-L)
|
|
|
|
10:00 - 10:15 Break
|
|
|
|
10:15 - 11:15 Databases - How do you store incident, suspect, and
|
|
vulnerability information safely, but still allow the
|
|
information to be used effectively? The speakers in this
|
|
session will share some of their insights and methods on this
|
|
topic.
|
|
SPEAKERS:
|
|
John Carr (CCTA)
|
|
Michael Higgins (DISA)
|
|
speaker pending
|
|
|
|
11:15 - 12:15 Threats - Part of incidence response is to anticipate riska and
|
|
threats. This session will focus on some likely trends and
|
|
possible new problems to be faced in computer security.
|
|
SPEAKERS:
|
|
Karl A. Seeger
|
|
speakers pending
|
|
|
|
|
|
12:15 - 12:30 Closing Remarks - Dennis Steinauer (NIST/FIRST)
|
|
|
|
12:30 - 2:00 Lunch
|
|
|
|
2:00 - 3:00 FIRST General Meeting and the Steering Committee Elections
|
|
|
|
3:00 - 4:00 FIRST Steering Committee Meeting
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^Registration Information/Form Follows^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
INQUIRES:
|
|
|
|
Direct questions concerning registration and payment to: Events at 412-268-6531
|
|
|
|
Direct general questions concerning the workshop to: Mary Alice "Sam" Toocheck
|
|
at 214-268-6933
|
|
|
|
Return to: Helen E. Joyce
|
|
Software Engineering Institute
|
|
Carnegie Mellon University
|
|
Pittsburgh, PA 15213-3890
|
|
Facsimile: 412-268-7401
|
|
TERMS:
|
|
|
|
Please make checks or purchase orders payable to SEI/CMU. Credit cards are not
|
|
accepted. No refunds will be issued, substitutions are encouraged.
|
|
|
|
The registrations fee includes materials, continential breakfast, lunches (not
|
|
included on August 13), morning and afternoon breaks and an evening reception
|
|
on August 11. Completed registration materials must be received by the SEI no
|
|
later than July 10, 1993.
|
|
|
|
A minimum of 7 attendees are needed for each tutorial and there will be limit of
|
|
50 attendees. You MUST indicate which tutorial you would like to attend and an
|
|
alternate if your first choice is full.
|
|
|
|
GOVERNMENT TERMS:
|
|
|
|
If your organization has not made prior arrangements for reimbursement of
|
|
workshop expenses, please provide authorization (1556) from your agency at the
|
|
time of registration.
|
|
|
|
GENERAL REGISTRATION INFORMATION:
|
|
|
|
Workshop................................. ..............$300.00
|
|
|
|
|
|
|
|
All registrations received after July 10, 1993..........$350.00
|
|
|
|
Tutorials (Must be registered by July, 10, 1993)........$190.00
|
|
|
|
NAME:
|
|
|
|
TITLE:
|
|
COMPANY:
|
|
|
|
DIVISION:
|
|
|
|
ADDRESS:
|
|
|
|
CITY:
|
|
|
|
STATE:
|
|
|
|
ZIP:
|
|
|
|
BUSINESS PHONE:
|
|
|
|
EMERGENCY PHONE:
|
|
|
|
FACSIMILE NUMBER:
|
|
|
|
E-MAIL ADDRESS:
|
|
DIETARY/ACCESS REQUIREMENTS:
|
|
|
|
CITIZENSHIP: Are you a U.S. Citizen? YES/NO
|
|
|
|
Identify country where citizenship is held if not the U.S.:
|
|
|
|
(Note: there will be no classified information disclosed at this
|
|
workshop. There is no attendance restriction based on citizenship or
|
|
other criteria.)
|
|
|
|
GENERAL HOTEL INFORMATION:
|
|
|
|
RATES: A block of rooms has been reserved at the Hyatt Regency at Union
|
|
Station, One St. Louis Union Station, St. Louis, Missouri 63103. The hotel will
|
|
hold these rooms until July 10, 1993. Hotel arrangements should be made
|
|
directly with the Hyatt, 314-231-1234. To receive the special rate of $65.00
|
|
per night, please mention the Fifth Computer Security Incident Handling Workshop
|
|
when making your hotel arrangements.
|
|
|
|
ACCOMMODATIONS: Six-story hotel featuring 540 guest rooms, including 20 suites.
|
|
All rooms have individual climate control, direct-dial telephone with message
|
|
alert, color TV with cable and optional pay movies. Suites available with wet
|
|
bar. Hotel offers three floors of Regency accomodations, along with a Hyatt
|
|
Good Passport floor, and a special floor for women travelers.
|
|
|
|
LOCATION/TRANSPORTATION FACTS: Downtown hotel located in historic Union Station
|
|
one mile from Cervantes Convention Center and St. Louis Convention Center and
|
|
St. Louis Arch. Fifteen miles (30 minutes) from St. Louis Zoo.
|
|
|
|
DINING/ENTERTAINMENT: Italian Cuisine is features at Aldo's, the hotel's
|
|
full-service restaurant. Enjoy afternnon cocktails in the Grand Hall, an
|
|
open-air, six-story area featuring filigree work, fresco and stained glass
|
|
windows. The station Grille offers a chop house and seafood menu.
|
|
|
|
RECREATIONAL/AMUSEMENT FACILITIES: Seasonal outdoor swimming pool. Full health
|
|
club; suana in both men's and women's locker rooms. Jogging maps are available
|
|
at the hotel front desk.
|
|
|
|
SERVICES/FACILITIES/SHOPS: Over 100 specialty shops throughout the hotel,
|
|
including men's and women's boutiques, children's toy shops and train stores.
|
|
|
|
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
The SURFPUNK Technical Journal is a dangerous multinational hacker zine
|
|
originating near BARRNET in the fashionable western arm of the northern
|
|
California matrix. Quantum Californians appear in one of two states,
|
|
spin surf or spin punk. Undetected, we are both, or might be neither.
|
|
________________________________________________________________________
|
|
|
|
Send postings to <surfpunk@osc.versant.com>, subscription requests
|
|
to <surfpunk-request@osc.versant.com>. Math hooligans are the worst.
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
To: subgenius@mc.lcs.mit.edu
|
|
From: menya zavoot cmpuk <strick@versant.com>
|
|
Subject: thanks for the U S Government Subscription
|
|
catalogs and brochures
|
|
Date: Thu, 08 Jul 93 13:50:19 -0700
|
|
|
|
Someone ordered me an U S Government Subscription catalog
|
|
and one of each Subject Bibliography brochure (except for
|
|
subject bibliographies number 23 and 69, of which they
|
|
ordered ten of each.) This amounts to an 8" stack of
|
|
material.
|
|
|
|
anyway, given the choice of which brochures multiple copies
|
|
were ordered, I have a feeling that the requesting agent
|
|
reads this list.
|
|
|
|
And I wanna say THANKS! WAY COOL SHIT!
|
|
|
|
menya zavoot cmpuk
|
|
strick@versant.com
|
|
|
|
Here's a sampling:
|
|
|
|
Practical Spanish Grammar for Border Patrol Officers.
|
|
|
|
Deals with situations that are of special interest
|
|
to patrol inspectors. Includes a comprehensive
|
|
list of idiomatic and other useful expressions
|
|
with particular attention to those used along the
|
|
Mexican border. 1988: 231 p. revised ed.
|
|
|
|
S/N 027-002-00362-4 $8.00
|
|
|
|
|
|
ATF Arson Investigative Guide.
|
|
|
|
A practical guide for arson investigators to use
|
|
during the investigative stages that follow the
|
|
identification of the cause and origin of a fire.
|
|
1988: 158 p., 7 dividers. 0-16-004721-8
|
|
T 70.8:Ar 7/988
|
|
|
|
S/N 048-012-00089-2 $5.50
|
|
|
|
|
|
Poultry Slauter (Monthly); Agricultural Statistics
|
|
Board Reports.
|
|
|
|
Contains information on numbers of various kinds
|
|
of poultry slaughtered.
|
|
|
|
|
|
$20 a year. File code 2B. List ID POULS.
|
|
0-16-009397-X. A 92.9/5:
|
|
|
|
s/n 701-041-00000-3
|
|
|
|
|
|
|
|
|
|
Mail order to:
|
|
Superintendent of Documents
|
|
P O Box 371954
|
|
Pittsburgh PA 15250-7954
|
|
|
|
|
|
Also, for free catalog, mail to
|
|
Free Catalog
|
|
P O Box 37000
|
|
Washington D 20013
|
|
|
|
|
|
|
|
|
|
|