Computer underground Digest Tue Jul 30, 1996 Volume 8 : Issue 56 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.56 (Tue, Jul 30, 1996) File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd) File 2--Re: "Blocking Software (CuD 8.53) File 3--Singapore officials censor U.S. newgroup posting File 4--Net-child porn ring apprehended, details from SJMN File 5--Net Porn: The Communism of the 1990s File 6--U.S. Official Warns OF "Electronic Pearl Harbor" File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd) File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 30 Jul 1996 16:46:48 -0400 (EDT) From: Noah Subject: File 1--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD (fwd) From -Noah ---------- Forwarded message ---------- Date: Tue, 30 Jul 1996 15:17:25 -0400 From: CERT Bulletin To--cert-advisory@cert.org Subject--CERT Vendor-Initiated Bulletin VB-96.12 - FreeBSD ============================================================================= CERT(sm) Vendor-Initiated Bulletin VB-96.12 July 30, 1996 Topic: "Trojan Horse" vulnerability via rz program Source: FreeBSD, Inc. To aid in the wide distribution of essential security information, the CERT Coordination Center is forwarding the following information from FreeBSD, Inc. FreeBSD, Inc. urges you to act on this information as soon as possible. FreeBSD, Inc. contact information is included in the forwarded text below; please contact them if you have any questions or need further information. =======================FORWARDED TEXT STARTS HERE============================ ============================================================================= FreeBSD-SA-96:17 Security Advisory Revised: Tue Jul 16 21:44:54 PDT 1996 FreeBSD, Inc. Topic: "Trojan Horse" vulnerability via rz program Category: ports Module: rzsz Announced: 1996-07-16 Affects: All FreeBSD ports collections released before 2.1.5-RELEASE Corrected: ports collection as of 1996-07-06 Source: rzsz shareware package FreeBSD only: no Patches: ftp://freebsd.org/pub/CERT/patches/SA-96:17/ ============================================================================= I. Background All existing versions of the rz program (a program for receiving files over serial lines using the Z-Modem protocol) are equipped with a feature that allows the sender of a file to request the execution of arbitrary commands on the receiver's side. The user using rz does not have any control over this feature. The workaround is to have rz never execute any command, and always pretend a successful execution. All FreeBSD users are encouraged to use the workaround provided. Since the intent of the Z-Modem protocol is to provide a reliable connection between systems of a vastly different architecture, the execution of local commands at request of the sending side cannot even be considered a useful feature at all. II. Problem Description The Z-Modem protocol specifies a mechanism which allows the transmitter of a file to execute an arbitrary command string as part of the file transfer. This is typically used to rename files or eliminate temporary files. A malicious "trusted" sender could send down a command that could damage a user's environment. III. Impact The rzsz package is an optional port that made be installed on some FreeBSD systems. This program is not installed by default. Systems without this program are not vulnerable. rz allows "Trojan Horse" type attacks against unsuspecting users. Since the rz executable does not run with special privileges, the vulnerability is limited to changes in the operating environment that the user could willingly perform. This vulnerability is a fundamental flaw in the Z-Modem protocol. Other operating systems and other implementations of the Z-Modem protocol may also suffer similar vulnerabilities. IV. Workaround Disable the rz program. If it has been installed, it would typically be found in /usr/local/bin. # chmod 000 /usr/local/bin/rz # ls -l /usr/local/bin/rz ---------- 1 root wheel 23203 Mar 4 23:12 /usr/local/bin/rz V. Solution(s) This feature is a relatively unknown part of the Z-Modem protocol. It is not critical to file transfers in general. The safest approach is to disable this feature in the receiving program. Any rzsz port that is obtained from the official ports collection after 1996-07-06 includes the following patch to disable this feature. This patch applies to rzsz v3.42, if you have an earlier version of the rzsz sources, please upgrade to the latest version first. *** rz.c.orig Sat Jul 6 17:34:26 1996 --- rz.c Sat Jul 6 17:44:52 1996 *************** *** 1020,1039 **** --- 1020,1045 ---- case ZCOMMAND: cmdzack1flg = Rxhdr[ZF0]; if (zrdata(secbuf, 1024) == GOTCRCW) { + #ifdef BIG_SECURITY_HOLE void exec2(); if (cmdzack1flg & ZCACK1) stohdr(0L); else stohdr((long)sys2(secbuf)); + #else + stohdr(0L); + #endif purgeline(); /* dump impatient questions */ do { zshhdr(4,ZCOMPL, Txhdr); } while (++errors<20 && zgethdr(Rxhdr) != ZFIN); ackbibi(); + #ifdef BIG_SECURITY_HOLE if (cmdzack1flg & ZCACK1) exec2(secbuf); + #endif return ZCOMPL; } zshhdr(4,ZNAK, Txhdr); goto again; ============================================================================= FreeBSD, Inc. Web Site: http://www.freebsd.org/ Confidential contacts: security-officer@freebsd.org PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc Security notifications: security-notifications@freebsd.org Security public discussion: security@freebsd.org Notice: Any patches in this document may not apply cleanly due to modifications caused by digital signature or mailer software. Please reference the URL listed at the top of this document for original copies of all patches if necessary. ============================================================================= ========================FORWARDED TEXT ENDS HERE============================= If you believe that your system has been compromised, contact the CERT Coordination Center or your representative in the Forum of Incident Response and Security Teams (FIRST). We strongly urge you to encrypt any sensitive information you send by email. The CERT Coordination Center can support a shared DES key and PGP. Contact the CERT staff for more information. Location of CERT PGP key ftp://info.cert.org/pub/CERT_PGP.key CERT Contact Information - ------------------------ Email cert@cert.org Phone +1 412-268-7090 (24-hour hotline) CERT personnel answer 8:30-5:00 p.m. EST (GMT-5)/EDT(GMT-4), and are on call for emergencies during other hours. Fax +1 412-268-6989 Postal address CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 USA CERT publications, information about FIRST representatives, and other security-related information are available from[-1z http://www.cert.org/ ftp://info.cert.org/pub/ CERT advisories and bulletins are also posted on the USENET newsgroup comp.security.announce To be added to our mailing list for CERT advisories and bulletins, send your email address to cert-advisory-request@cert.org CERT is a service mark of Carnegie Mellon University. This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.12.freebsd -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMf4jb3VP+x0t4w7BAQH8OwP+LUNb+2PueYArBM8OEqXz1s/8O64pPngY ar8A6e9aCL/GjOltw+cuVPlqqefEPqsOVa2UZZTezZlv1+AkXgdUhr47L7Tc9kEH KARlnuiFAMvWPN3rMZqcU7zT7x5jgMsHxM4bIA48SARKStACBdVnFWpLg7h6+utm U1o1DPizbS0= =DcYg -----END PGP SIGNATURE----- ------------------------------ Date: Thu, 18 Jul 96 13:54 PDT From: Michael Gersten Subject: File 2--Re: "Blocking Software (CuD 8.53) In regard to Vladimir Nuri's post of Jul 9th on blocking software: Vladimir, you are correct that this is an infancy of an industry, and that they cannot be expected to have all the answers yet. And you are correct that people out there are willing to pay for something that works. And you are correct that much of the question is one of judgement calls, which is not the problem. The problem is when sites are blocked without indending to be blocked. When a service decides to block site X, and blocks either every web page from that machine, or every page that has the same first three letters. The problem is when a service claims to only block X type of page, but actually blocks type Y. The problem is that there is no ability for the market to make any type of informed decision. Would you pay $X per month, to be told that a cetain service was provided to you, with no ability to even determine what service was ACTAULLY performed? It's one thing if the services were to provide you with a list of "Here's all the sites that were blocked by you this month". It's something else for a service to claim, "Yes, we're valuable. Keep sending us money. We provide no proof of quality of service". And then the first investigative report shows that the actual provided service does not agree with the claimed service. In short, the complaint is one of truth in advertising. ------------------------------ Date: Fri, 19 Jul 1996 13:00:31 -0500 From: Declan McCullagh Subject: File 3--Singapore officials censor U.S. newgroup posting This move by Singapore to censor a newsgroup posting is a good example of the overbreadth of government censorship. It's a bait-and-switch maneuver: say you're going after porn but censor "offensive" speech. Of course, this gives the lie to the Singapore government's assertion that "we are not censoring discussion groups." Some excerpts from the recent regulations requiring the registration of political or social groups: "Political and religious organisations are free to conduct discussions provided they guard against breaking the law or disrupting social harmony. The regulations ban contents that "tend to bring the Government into hatred or contempt," are "pornographic," or "depict or propagate sexual perversions such as homosexuality, lesbianism, and paedophilia." I have more information on the regulations at: http://www.eff.org/pub/Global/Singapore/ http://www.cs.cmu.edu/~declan/international/ -Declan --- Singapore Internet Regulators Take First Action, Censor Posting July 19, 1996 AP-Dow Jones News Service SINGAPORE -- In its first action since assuming powers this week to police the Internet, the Singapore Broadcasting Authority has yanked off a newsgroup's posting that criticized some lawyers, a newspaper reported Friday. The SBA acted on a complaint by an unidentified law firm, which said the contents of the anonymous posting defamed some of its lawyers in Singapore, according to a report in the Straits Times newspaper Friday. The newspaper said the posting on the newsgroup was apparently made by a disgruntled client who claimed he lost a case even though his lawyers told him he could win it. The client also questioned the ability of the lawyers who belongs to one of the oldest firms in Singapore, the Straits Times said. Under new SBA regulations that came into effect Monday, the government agency has the power to ask Internet service providers to remove material that it considers objectionable. A government-appointed panel of prominent citizens decides what is objectionable. The Straits Times said the posting is believed to have been made from the U.S., which means the SBA, in keeping with its own rules, will not be able to take action against the offender. The SBA says its rules are mainly directed against pornography, anti-government or seditious views, racially motivated slurs and articles that could inflame religious passions. Since Monday, Internet providers, political parties that maintain Web sites, groups and individuals who run discussion sites on politics and religion, and on-line newspapers are deemed to have become automatically licensed. This means refusal to follow the SBA rules will result in fines. The amounts are yet to be determined. ------------------------------ Date: Fri, 26 Jul 1996 19:55:55 -0700 (PDT) From: Declan McCullagh Subject: File 4--Net-child porn ring apprehended, details from SJMN [Forwarded from c-r. --Declan] // declan@eff.org // I do not represent the EFF // declan@well.com // Sender: madavis@deliberate.com (Marilyn Davis) Yesterday and today the front page of the SJMN ran a story about a net-porn ring that was apprehended. I'll type some of it for your consideration. If it wasn't for the internet, only one child molester would have been caught instead of 16. Marilyn Davis ----- some of the article ---- Net-porn ring traded stories at 'pedo party' Suspects recruited family members, papers indicate By Brandon Bailey Mercury News Staff Writer It was a horrifying "summit," authorities said: Three out-of-state men accused of belonging to an Internet child-pronography ring got together last April at the home of a fourth in Santa Rosa. At the meeting the members of the so-called Orchid Club allegedly traded stories about pre-teen girls they had molested and photographed in sexually explicit poses, authorities say. They even showed off a large poster mounted with photos of eight girls who appeared to be no older than 10. Investigators called it a "victim board." The summit, which the host reportedly labeled a "pedo party," is described in court documents that shed further light on a federal indictmend issued this week in San Jose. All told, the indictment charges 16 men with an international conspiracy to produce and exchange homemade child pornography over the Internet. The documents suggest a parent's nightmare [skipping a bunch] But officials also said much of their case is built on old-fashioned detective work. They interviewed victims and suspects who led them to more suspects. How case unfolded It began with what Monterey County sheriff's Lt. Dave Allard called child molestation "in the more traditional sense." A mother in the Monterey County town of Greenfied reported on April 5 that her 6-year-old daughter had beeen touched inappropriately during a slumber party at the nearby home of Ronald Riva, a well-known father of four who inadvertently became the linchpin of the federal investigation. Sheriff's investigators interviewed Riva, 38, who once worked as a state prison guard but more recently earned a living driving farm trucks in the Salinas Valley. They also talked with other girls who attended the party, which was hosted by Riva's 8-year-old daughter. Monterey County prosecutor Edward Hazel said some of those girls led detectives to more victims. Local authorities arreste Rival on April 7 and eventually charged him with molesting five girls, ages 4 to 10, some of them repeatedly over the last five years. None of those children was his own. Officials say the molestations occurred under circumstances they characterize as psychological manipulation, rather than physical coercion. [some skipped] But the case didn't end there. According to an investigator's affidavit, one of the girls told of a second man who helped fondle and photograph her at Riva's house. With the consent of Riva'wife, deputies say they searched Riva's computer files and found some of those photos. After talking with Riva and his wife, investigators identified the second man as Melton Lee Myers of Santa Rosa, who was convicted on two counts of child molestation in the '70s. April 22 arrest Monterey County deputies arrested Myers on April 22. Just two days before, according to the federal affidavits, Myers had hosted the videotaped "pedo party" for three other alleged Orchid Club members at his home. Federal investigators say they later learned from computer files that Riva had chatted on the Internet about planning to attend that meeting and about the possibility ... [some skipped] In Riva's computer, for example, investigators found records of Internet chat sessions in which Riva and someone named Billyj described ... With a subpoena to the commericial Intrnet service that Billyj used for e-mail, agents identified him as Paul Laney, 34. After agents found him at home in Yuba City, ... led them to other Internet contacts. Authorities say they moved quickly to locate other members of the group -- in Oklahoma, Mississippi, Massachusetts, Michigan, Illinois, Minnesota, Kansas and Washington. Officials said two suspects cooperated ... Three other suspects haven't been identified but are believed to live in Finland, Australia and Canada. [rest skipped] ------------------------------ Date: Fri, 26 Jul 1996 21:13:52 -0700 (PDT) From: Declan McCullagh Subject: File 5--Net Porn: The Communism of the 1990s [Bob Chatelle has an interesting essay about child pornography (below namd as the "Communism of the 90s") and the limits of free expression somewhere near . --Declan] ---------- Forwarded message ---------- Date--Fri, 26 Jul 1996 11:00:18 -0400 From--Noah Robischon >From this week's Village Voice Who Opened Their E-mail? It's the Kiddie Porn Crusaders by ANNETTE FUENTES Don't look now, but some FBI suits may be lurking around the chat room or, worse, secretly surveilling your e-mail and other private cyberspace communications. And chances are it's all in the name of fighting child pornography. That's what two New York City women learned recently when each received certified mail from the U.S. Justice Department. The letters, dated May 20, explained that "between the dates of August 1, 1995 and August 26, 1995, electronic communications involving you or persons using your America Online username were intercepted." The letters listed six targeted AOL account numbers and their respective screen names, like Cyberqueer, Yngcumlvr, and Borntocum none of which had any connection to the women. "I was horrified," said Elizabeth Ewen. "At first I didn't understand what it was all about. I didn't recognize any of the screen names." Ewen, a professor at SUNY Old Westbury, called the assistant U.S. attorney who'd signed the letter, John David Kuchta, in Virginia. He told her the rationale for the surveillance was child porn. She told him she felt her privacy and civil rights had been violated. "He said, 'Don't worry, you were just caught up in the net. You didn't do anything criminal, and you should support what we're doing,' " Ewen recalled. Two days after Ewen got her letter, a friend of hers got the same thing. Margaret S. (she asked that her last name not be used), an educator in the Queens library system, was stunned to learn that almost a year after the fact, the FBI was disclosing that they'd been spying on her travels through cyberspace. "I don't expect total privacy online the same way I know the telephone isn't really private," she said. "But how often will the government raise the specter of child porn to justify this? We're just supposed to forget our civil rights in the name of it." Margaret e-mailed AOL with a message of outrage. In return she got a form letter from Jean Villanueva, a vice president for corporate communications, stating that AOL had merely complied with a court order obtained by the Justice Department when it "monitored" the e-mail of six AOL subscribers. It was part of Justice's campaign, "Innocent Images," Villanueva wrote. In closing, he referred members to a special Justice Department hotline set up to deal with AOL subscribers like Margaret and Ewen, innocents caught in the web. (By deadline, AOL had not responded to several calls seeking comment.) Margaret called the hotline, left a message, and two weeks later got a call back from Tonya Fox at Justice. Fox told her there were some 840 other AOL subscribers like her who'd accidentally stumbled into the FBI's cyber wiretaps. "She kept telling me over and over that I was 'clean,' that I shouldn't worry," Margaret said. "She also said if I wanted to read the file on my surveillance, I should get a lawyer." How Ewen and Margaret were scooped up by the FBI they can't figure out. If one of them tripped into FBI surveillance of a suspected pornographer, did she then lead the feds to her friend through their e-mail correspondence? ACLU associate director Barry Steinhardt says that while it's legal for the government armed with a warrant to surveil the e-mail and other private cyber communications of suspected criminals, it is not legal to extend the surveillance to unrelated communications of innocent bystanders who chance into chat rooms or read electronic bulletin boards while a suspect is also present. "What has happened here is the most intrusive form of e-mail interception," Steinhardt said. "The government can get a subpoena to intercept real-time e-mail, which is the equivalent of phone wiretapping. They can also use a variety of devices to retrieve stored e-mail." But, adds Steinhardt, what is legal and what should be lawful are two different things. Mike Godwin, an attorney with the San Francisco'based Electronic Frontier Foundation, a civil liberties organization, warns that as government expands its reach into cyberspace, such incursions into private lives will pose a greater threat to civil liberties than simple phone taps. "It was necessary for law enforcement to learn how to narrow the scope of wiretapping, but here you have this technology where you're always making copies, always storing material somewhere," Godwin said. "It makes it very easy to get even deleted files that stay around for a while. That's not true about telephone calls." Justin Williams, chief of the Justice Department's criminal division in Alexandria, Virginia, could not comment on the particular investigation that snared Ewen and Margaret. But he insisted that what happened to them "was not a surveillance." "You wouldn't say their e-mail was read," Williams said. "It could be they were surfing the Internet and happened into a particular room where by chance there is an [individual] under electronic surveillance." Williams said their hotline received 160 calls from AOL subscribers such as Ewen and Margaret. While the statute regulating government surveillance Title III requires Justice to notify the targets of eavesdropping, notifying innocent bystanders is discretionary, he said. Williams could not say how many such online surveillances the Justice Department is conducting. But ACLU lawyer Steinhardt says in the past year, the government's pursuit of child porn in cyberspace has reached a fever pitch. "Most online surveillance by the government is now centered on child porn," he said. "It has people assigned to child porn investigations who are fascinated by the use of the Internet to distribute it. They're no longer going after the producers who actually abuse children. They're going after consumers. It's easier, splashier." Splashy and messy for those who happen to be in the wrong cyber place, if only for a nanosecond. For Ewen, the witch-hunt has begun again. "Child porn will become the communism of the '90s," she said. ------------------------------ Date: Mon, 22 Jul 1996 23:49:05 -0400 (EDT) From: Noah Subject: File 6--U.S. Official Warns OF "Electronic Pearl Harbor" U.S. OFFICIAL WARNS OF "ELECTRONIC PEARL HARBOR" Deputy U.S. Attorney General Jamie Gorelick told a Senate subcommittee last week that the possibility of "an electronic Pearl Harbor" is a very real danger for the U.S. She noted in her testimony that the U.S. information infrastructure is a hybrid public/private network, and warned that electronic attacks "can disable or disrupt the provision of services just as readily as -- if not more than -- a well-placed bomb." On July 15 the Clinton Administration called for a President's Commission on Critical Infrastructure Protection, with the mandate to identify the nature of threats to U.S. infrastructure, both electronic and physical, and to work with the private sector in devising a strategy for protecting this infrastructure. At an earlier hearing, subcommittee members were told that about 250,000 intrusions into Defense Department computer systems are attempted each year, with about a 65% success rate. (BNA Daily Report for Executives 17 Jul 96 A22) ------------------------------ Date: Thu, 11 Jul 1996 18:53:58 -0400 (EDT) From: Noah Subject: File 7--BoS: WITAT 96 (Info-Tech Conference) (fwd) ---------- Forwarded message ---------- Date: Thu, 11 Jul 1996 17:04:20 -0400 (EDT) From: Marvin V. Zelkowitz (My apologies if you received several of these.) WORKSHOP ANNOUNCEMENT - WITAT '96 Third Annual Workshop on Information Technology - Assurance and Trustworthiness September 3-5, 1996 Columbia Hilton, Columbia, MD Co-sponsored by Aerospace Computer Security Associates, National Institute of Standards and Technology, and University of Maryland Institute for Advanced Computer Studies -- Are you sure your information is adequately protected? -- How do you know that your privacy is being guarded? -- Can your customers trust you? The Workshop on Information Technology Assurance and Trustworthiness (WITAT) investigates and promotes promising methods of gaining assurance in information technology. WITAT '96 is the third in a series of annual workshops addressing the assurance and trustworthiness. The first workshop identified and analyzed crucial issues on assurance in IT systems and provided input to the development of policy guidance for determining the type and level of assurance appropriate in a given environment. The participants came to the consensus that no one technique can provide comprehensively adequate assurance. The second workshop built upon the first by making recommendations based on the issues and problems identified. Building upon the results of the previous two workshops, WITAT '96 recognizes the existence and emergence of numerous methods to obtain assurance. However, the relative value, promise, and applicability of each is unclear for specific systems. These will be discussed through the presentation of alternative assurance approaches to assurance stakeholders and producers, receiving immediate feedback from a diverse audience, reviewing reaction to presented approaches and creating a strategy for moving ahead. Information on WITAT '96, costs, and registration information can be found at WWW address: http://aaron.cs.umd.edu/witat/witat96.html. Send mail to witat-info@cs.umd.edu for a copy of the complete call for participation, including fees, and registration form. WORKSHOP COMMITTEE Marshall Abrams The MITRE Corp. Diana Akers The MITRE Corp. Maryam Alavi Univ. of Maryland Lynn Ambuel Natl. Security Agency Karen Ferraiolo Arca Systems, Inc. Jay Kahn The MITRE Corp. *Douglas Landoll Arca Systems, Inc. Carolyn Wichers BDM Jeff Williams Arca Systems, Inc. Marvin Zelkowitz Univ. of Maryland * - Workshop Chair REGISTRATION Costs: Tutorial (Sept. 3) $110.00 (includes lunch) Workshop (Sept. 4-5) $120.00 (includes lunches) Location: Columbia Hilton, 5485 Twin Knolls Road, Columbia, MD. 410-997-1060. ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.56 ************************************