Computer underground Digest Sun June 15, 1997 Volume 9 : Issue 46 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.46 (Sun, June 15, 1997) File 1--CFP: Symposium on Network and Distributed System Security (fwd) File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?) File 3--Upcoming Computer Policy and Law Program File 4--Sequel/Internet Monitoring at NetSec File 5--SSA Privacy Forum 6.16.97 File 6--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 10 Jun 1997 11:11:25 -0500 From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas) Subject: File 1--CFP: Symposium on Network and Distributed System Security (fwd) CALL FOR PAPERS The Internet Society Symposium on Network and Distributed System Security Where: San Diego, California When: March 1998 GOAL: The symposium will foster information exchange between hardware and software developers of network and distributed system security services. The intended audience is those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. Encouraging and enabling the Internet community to apply, deploy, and advance the state of available security technology is the major focus of symposium. Symposium proceedings will be published by the Internet Society. Topics for the symposium include, but are not limited to, the following: * Architectures for large-scale, heterogeneous distributed systems * Security in malleable systems: mobile code, mobile agents, dynamic policy updates, etc. * Special problems: e.g. interplay between security goals and other goals -- efficiency, reliability, interoperability, resource sharing, and cost. * Integrating security services with system and application security facilities and with application protocols, including message handling, file transport, remote file access, directories, time synchronization, data base management, routing, voice and video multicast, network management, boot services, and mobile computing. * Fundamental services: authentication, integrity, confidentiality, authorization, non-repudiation, and availability. * Supporting mechanisms and APIs: key management and certification infrastructures, audit, and intrusion detection. * Telecommunications security, especially for emerging technologies -- very large systems like the Internet, high-speed systems like the gigabit testbeds, wireless systems, and personal communication systems. * Controls: firewalls, packet filters, application gateways * Object security and security objects * Network information resources and tools such as World Wide Web (WWW), Gopher, Archie, and WAIS. * Electronic commerce: payment services, fee-for-access, EDI, notary; endorsement, licensing, bonding, and other forms of assurance; intellectual property protections GENERAL CHAIR: David Balenson, Trusted Information Systems PROGRAM CHAIRS: Matt Bishop, University of California at Davis Steve Kent, BBN PROGRAM COMMITTEE: Steve Bellovin, AT&T Labs -- Research Doug Engert, Argonne National Laboratories Warwick Ford, VeriSign Li Gong, JavaSoft Rich Graveman, Bellcore Ari Juels, RSA Laboratories Tom Longstaff, CERT/CC Doug Maughan, National Security Agency Dan Nessett, 3Com Corporation Rich Parker, NATO Michael Roe, Cambridge University Rob Rosenthal, DARPA Wolfgang Schneider, GMD Darmstadt Christoph Schuba, Purdue University Win Treese, Open Market, Inc. Jonathan Trostle, Novell Gene Tsudik, USC/Information Sciences Institute Steve Welke, Institute for Defense Analyses LOCAL ARRANGEMENTS CHAIR: Thomas Hutton, San Diego Supercomputer Center PUBLICATIONS CHAIR: Steve Welke, Institute for Defense Analyses LOGISTICS CHAIR: Torryn Brazell, Internet Society SUBMISSIONS: The committee invites technical papers and panel proposals, for topics of technical and general interest. Technical papers should be 10-20 pages in length. Panel proposals should be two pages and should describe the topic, identify the panel chair, explain the format of the panel, and list three to four potential panelists. Technical papers will appear in the proceedings. A description of each panel will appear in the proceedings, and may at the discretion of the panel chair, include written position statements from each panelist. Each submission must contain a separate title page with the type of submission (paper or panel), the title or topic, the names of the author(s), organizational affiliation(s), telephone and FAX numbers, postal addresses, Internet electronic mail addresses, and must list a single point of contact if more than one author. The names of authors, affiliations, and other identifying information should appear only on the separate title page. Submissions must be received by 1 August 1997, and should be made via electronic mail in either PostScript or ASCII format. If the committee is unable to print a PostScript submission, it will be returned and hardcopy requested. Therefore, PostScript submissions should arrive well before 1 August. If electronic submission is difficult, submissions should be sent via postal mail. All submissions and program related correspondence (only) should be directed to the program chair: Matt Bishop, Department of Computer Science, University of California at Davis, Davis CA 95616-8562, Email: sndss98-submissions@cs.ucdavis.edu. Phone: +1 (916) 752-8060, FAX: +1 (916) 752-4767, Dates, final call for papers, advance program, and registration information will be available at the URL: http://www.isoc.org/conferences/ndss98. Each submission will be acknowledged by e-mail. If acknowledgment is not received within seven days, please contact the program chair as in- dicated above. Authors and panelists will be notified of acceptance by 1 October 1997. Instructions for preparing camera-ready copy for the proceedings will be sent at that time. The camera-ready copy must be received by 1 November 1997. ------------------------------ Date: Tue, 10 Jun 1997 00:15:54 -0400 From: Russ Haynal Subject: File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?) DC-ISOC Announces additional details of its next event... - - - - - Internet Gridlock - Fact, Fiction, or Future ? - - - - - Monday, June 16, 1997, 7-9 p.m. There has been increasing press coverage about the Internet's incredible growth, and the occasional Internet "brown-outs" or ISP outages. Is the Internet going to collapse under its own weight? Is congestion inevitable, or will access speeds improve overall? Join DC-ISOC to hear from Industry leaders how the Internet's infrastructure is growing and adapting to this exponential growth. Meeting Agenda Speaker #1: David Boyes - Internet Backbone and Interconnection Engineer Dimension Enterprises This first talk outlines what's on the other side of your favorite ISP, discusses some changes in the Internet backbone structure and interconnection policy, and outlines one network engineer's viewpoint on what current major challenges are to developing a higher-performance Internet backbone in a completely economically competitive Internet. http://www.dimension.net dboyes@dimension.net Speaker #2: Robert Cannon - Computer Telecommunications Attorney practicing in the Washington DC area. The baby bells have been lobbying for access charge reform due to the congestion that the Internet is allegedly causing on the voice phone system. Robert will give us a preview of his "Cybernauts vs. Ma Bell" Paper being presented this summer at INET '97 http://www.cais.net/cannon/ cannon@dc.net http://www.fcc.gov/isp.html (FCC Access Charge Reform Homepage) Speaker #3: Robert Hagens - Director, Internet Engineering MCI Telecommunications Corporation Presentation of MCI's strategy to keep its Internet backbone ahead of the capacity curve, or "How to avoid being run over by the Internet freight-train!" http://www.mci.com Speaker #4: TBD - Sprint Internet Services Presentation of Sprint's approach to keep up with the Internet's rapid growth. http://www.sprint.com/fornet/ Speaker #5: Charles Brownstein - Executive Director Cross-Industry Working Team, CNRI As the Internet matures into a core component of the commercial communications infrastructure, the providing industry needs mechanisms to keep it robust and reliable. IOPS.ORG is a mechanism for engineering reliability solutions in the Internet context. XIWT is an industry group devoted to advancing NII architecture, services and applications, and to industry cooperation to advance the NII marketplace in the public interest. http://www.iops.org and http://www.xiwt.org Following the speaker presentations, there will be an open Q&A session with the audience. - - - - - - - - Meeting Location - - - - - - - - - - The meeting will be held at the Sprint/Global One Building in Reston, VA (12524 Sunrise Valley Dr.) This is immediately off the Dulles Toll-road; only minutes from Tysons Corner Directions From Beltway/Tysons Corner: - Take Dulles Toll road west to exit 11 (exit sign is for Fairfax County Parkway; Rte 7100) - At end of exit ramp, make a left onto Fairfax County Parkway (South) - At first intersection light, make a right onto Sunrise Valley Drive - Make immediate right into Sprint/Global One Campus - Global One building is the first building on your left ( # 12524 Sunrise Valley Drive) - Ample parking is available on your right - Enter through front lobby - Go down the stairs to the conference center As with all of our previous events, there is no charge to attend this event. Seating will be on a first-come, first-seated basis, though we expect that there should be room for all those interested. Please plan to arrive by 6:45, so we can begin on time, at 7pm ************* T H A N K S T O O U R S P O N S O R *************** * DC-ISOC wishes to thank Sprint Internet Services * * for sponsoring this meeting. * * Sprint's Global all-fiber network makes them uniquely qualified to * * bring you innovative products and services for Internet, Intranets, * * and IP Security. Please visit, http://www.sprint.com/fornet/ * * (To Sponsor a DC-ISOC Meeting, see http://www.dcisoc.org/sponsor.htm )* ************************************************************************* Individuals who are interested in becoming members of DC-ISOC can do so by joining the Internet Society. See their web site at http://www.isoc.org for more information. The Washington DC Chapter of the Internet Society maintains its own web site at: http://www.dcisoc.org Please feel free to pass this announcement message along to other interested individuals. If this message was forwarded to you, you can join our announcement mailing list through out web site ( http://www.dcisoc.org ) ------------------------------ Date: Mon, 9 Jun 1997 19:32:13 -0500 From: "Margie W. Hodges" Subject: File 3--Upcoming Computer Policy and Law Program ************************************************************* CORNELL UNIVERSITY COMPUTER POLICY AND LAW July 9-11, 1997 Ithaca, New York ************************************************************* An Invitation ------------- To Technology Administrators, Legal Counsel, Judicial Administrators, Risk Managers, Auditors, Librarians, and Affirmative Action Officers at Colleges and Universities. In order to design appropriate computer-use policies and to plan for their effective implementation, colleges and universities must develop a new level of collaboration between technology specialists and the institution's legal counsel. At COMPUTER POLICY AND LAW, participants will examine the legal implications of extensive campus networking and explore frameworks for limiting personal and institutional exposure to liability, while at the same time preserving free speech and academic freedom. All too often computer-use policies are developed in response to crises resulting from the misuse of computer and networking resources. The Computer Policy and Law program will provide a much-needed opportunity to take stock of our institutional policies in an atmosphere of frank evaluation and informed discussion. PLEASE JOIN US as we identify the hallmarks of best practice in this area and develop the policy frameworks that will serve all of us in the critical days ahead. PROGRAM SESSIONS: Communication Technologies in Higher Education ---------------------------------------------- We'll go on-line to explore the remarkable resources available to the faculty, staff, and students of an Information Age institution and to discover how electronic communications are used for scholarship and instruction, registration and record-keeping, study and research. As we review the state of the art of electronic communications technologies, we will identify the legal issues raised by the use of e-mail, listservs, discussion groups, the World-Wide Web, and desktop videoconferencing systems, such as Cornell's CU-SeeMe. Copyright in Cyberspace ----------------------- Electronic communication technologies have dramatically increased the ease with which words and images can be copied, altered, and disseminated. On-line instructional materials, for example, often present text and graphics adapted from other sources. While copyright infringement is widespread on the Internet, it is not legal. Current case law and legislation provide mixed signals about an institution's responsibility to curb copyright infringement on its computer networks. This session will review how institutional copyright policies can navigate such uncertainty and provide accurate information about the application of copyright laws and permissions policies in cyberspace. It will also cover trademark law, including strategies for protecting institutional logos and domain names. An entire session is devoted to the future of copyright law and policy. Public Key Infrastructure ------------------------- Public-key encryption provides the technological base for secure e-mail, digitally "signed" transactions, and reliable authentication. For higher education, this technology will present new opportunites for conducting business electronically, both with outside organizations and between internal departments. Interactions among all members of the university community will likely be impacted. This session will examine the emerging public-key infrastructure in the context of existing and anticipated legislation and case law. Electronic Communications: Institutional and Individual Liability ----------------------------------------------------------------- This presentation will provide an overview of laws relating to libel, pornography, obscenity, indecency, and "negligent publication" (including the Telecommunications Act of 1996), as they pertain to colleges and universities in their roles as on-line information distributors. It will focus on the new theories of law used in recent litigation over on-line incidents, including CyberPromotions v. AOL. We will outline a number of steps that network administrators can take to minimize institutional and individual liability when responding to complaints about illegal or offensive materials. On-Line Privacy --------------- The institution may own the computers and the networks, but who owns the information on them? What on-line privacy rights do computer users have, and does the answer vary by an individual's status as a student, faculty member, or staff member? Formulating answers that will provide a basis for policy making, we will look at the details of open records laws, the Electronic Communications Privacy Act (ECPA), the Family Educational Rights and Privacy Act (FERPA), and discovery issues surrounding records retention policies. Policy Panel ------------ College and university administrators are called upon with increasing frequency to respond to complaints about misuse of computer resources, many involving such emotionally charged issues as harassment and discrimination. In this panel presentation, representatives of a variety of institutions will describe the policies they relied on -- or later implemented -- to deal with a number of highly publicized computer-abuse cases. Panelists will address how well these institutional policies served those affected by the conflict and what steps they would take in resolving similar problems today. Particular attention will be given to the ways institutional goals and administrative structures should influence policy design and implementation. Computer Crime and the Law -------------------------- This session will provide an update on recent initiatives of the US Department of Justice Computer Crime Unit, including current perspectives on the ECPA. Topics will include the scope of the computer crime problem, changes in legislation, sentencing guidelines, and efforts on domestic and international fronts to reduce computer-related crimes. Designing Computer-Use Policies You Can Live With ------------------------------------------------- Pulling it all together, this session will provide a framework for policy making on your campus. Highlighting the advantages and disadvantages of existing policies, we will address ways to decrease legal and public relations liability, to use educational programs to inform campus communities about their rights and responsibilities in cyberspace, and to draw on model policies to meet the needs and goals of individual institutions. The Cornell Legal Information Institute Post-Program Open House --------------------------------------------------------------- The Legal Information Institute at the Cornell Law School (LII) was established in July, 1992 to explore new ways of distributing legal documents and commentary in electronic form. The LII will host an Open House at the Cornell Law School on Friday, 11 July, 1997, from 2:00 to 3:30 p.m. The founding (and current) directors of the LII, Thomas R. Bruce and Peter W. Martin, the Jane M.G. Foster Professor of Law at Cornell, will be present to answer questions about the development, operation, and future initiatives of the Institute. All participants in the Computer Policy and Law Program are invited to attend. PROGRAM PRESENTERS: Dan L. Burk, Assistant Professor of Law, Seton Hall University Mark Eckenwiler, Attorney, Computer Crime Unit, Department of Justice Robert W. Hamilton, Partner, Jones, Day, Reavis & Pogue Marjorie W. Hodges, Program Director, Computer Policy and Law, and Policy Advisor, Office of Information Technologies, Cornell University Barbara L. Krause, Judicial Administrator, Cornell University Terrence P. Maher, Special Counsel, Cooley, Godward, LLP Steven J. McDonald, Associate Legal Counsel, The Ohio State University Gary M. Pavela, Director, Judicial Programs, University of Maryland - College Park David Post, Visiting Associate Professor of Law, Georgetown University Law Center, and Co-Director, Cyberspace Law Institute Brian B. Shaw, Partner, Cumpston and Shaw Steven L. Worona, Program Director, Computer Policy and Law, and Assistant to the Vice President for Information Technologies, Cornell University PROGRAM FEE: $875, which includes meals. Enrollment is limited; early registration is encouraged. FOR INFORMATION: Computer Policy and Law E-mail: sp@sce.cornell.edu Phone: (607) 255-7259 Fax: (607) 255-8942 B20 Day Hall, Cornell University, Ithaca, NY 14853-2801 http://www.sce.cornell.edu/exec/CPL.html ************************************************************* Marjorie W. Hodges Office of Informatiopn Technologies 326 CCC, Garden Avenue Cornell University Ithaca, NY 14850 email: mwh2@cornell.edu phone: (607) 255-4188 fax: (607) 254-5222 ------------------------------ Date: Tue, 10 Jun 1997 07:04:07 -0400 (EDT) From: mds@mds.prwire.com Subject: File 4--Sequel/Internet Monitoring at NetSec Sequel/Internet Monitoring at NetSec Sequel Technology Presents Net Access Manager Internet Monitoring and Reporting Software at CSI's NetSec Conference Sequel's Cornerstone Product Enhances Network Security and Complements Firewall Technology SAN FRANCISCO, June 10 /PRNewswire/ -- Sequel Technology, leading developer of the Sequel Net Access Manager(TM) Internet and intranet monitoring and reporting tool, announced today at the Computer Security Institute (CSI) NetSec conference, its plan to enhance network security by offering a tool that measures employee usage of the Internet and manages access privileges at the individual, departmental or enterprise level. "Many businesses, today, think of firewalls as a vaccine for Internet security," said Richard Villars, Director of Network Architectures and Management at IDC Research. "Once a firewall is installed, they believe that they're immune to all future security problems. Unfortunately, many companies quickly discovered that this sense of security is an illusion. Organizations need to develop Internet usage polices for their internal users and reinforcing these guidelines with software that manages the flow of traffic both into and out of the network." How Net Access Manager Adds Value to a Firewall Sequel Net Access Manager provides IS managers with a customizable toolset for reporting and managing connections from the network to the Internet. Like a firewall, it provides the highest degree of security by running from the server and working as a dual-homed gateway to accurately monitor all TCP/IP activity between network users and the Internet. Sequel Net Access Manager is Internet management software that is designed to monitor access from the inside (network users) to the outside (the Internet). Conversely, a firewall works by blocking outside intruders from entering into the network. Together, these two technologies offer a comprehensive security solution. Sequel Provides Sophisticated E-mail Security Sequel Technology will soon be joining forces with two leading security software vendors -- Integralis and SRA International -- to offer a fully integrated high-end surveillance solution to supervise, track and log all e-mail communications. Key components of the system include e-mail content management software from Integralis which opens and screens the subject, message body and all attachments for viruses or offensive language. An even more intensive screening process developed by SRA uses sophisticated natural language analysis to detect even the most subtle language patterns, such as "guaranteed money maker" and "hot little tech stock." After the messages have been cleared and delivered to the end user, the Sequel component logs all traffic and generates various types of activity reports. The three partners will be launching the financial solution in July, with plans to customize the software for other industries which require the same level of management over highly sensitive information; such as medical records, banking statements, personnel records and insurance claims. About Sequel Sequel Technology Corporation was founded in 1995 and is the worldwide leader in the development, marketing and support of powerful and practical Internet Management Software products. These products allow information systems professionals, management and end users to better understand and manage their corporate and individual investment in Internet, intranet and online usage. Sequel Technology is an international company with over eighty employees located in offices around the world including Seattle, New York, Chicago, Washington, D.C., Atlanta, London, Tokyo, Ottawa and Toronto. Sequel Technology can be reached at the corporate offices located at Suite 300, 3245 - 146th Place SE, Bellevue, WA 98007, telephone 206-556-4000 or at http://www.sequeltech.com. NOTE: Sequel Technology and Sequel Net Access Manager are trademarks of Sequel Technology. All other trademarks, trade names or service marks are the property of their respective owners. SOURCE Sequel Technology -0- 06/09/97 /CONTACT: Frances Cala, Public Relations Specialist, 206-556-4074, or fcala@sequeltech.com, or Susan McPherson, Director, Public Relations, 206-556-4057, or smcpherson@sequeltech.com, both of Sequel Technology/ ------------------------------ Date: Fri, 13 Jun 1997 18:05:37 -0400 From: Dave Banisar Subject: File 5--SSA Privacy Forum 6.16.97 Social Security Administration Forum Privacy and Customer Service in the Electronic Age Monday, June 16, 1997 Georgetown U. Law Center Moot Court Room 600 New Jersey Ave. NW Washington D.C. 20001 Agenda: WELCOME 12-12:15 pm Welcome by Marc Rotenberg, Director, Electronic Privacy Information Center and Professor, Georgetown Law University Introduction of Dr. John J. Callahan, Acting Commissioner of the Social Security Administration PANEL #1 PRIVACY EXPERTS AND CONSUMER ADVOCATES 12:15-1:15 pm Leslie Byrne, Special Assistant to the President, and Director, U.S. Office of Consumer Affairs Harry Hammitt, Editor and Publisher, Access Report Newsletter Evan Hendricks, Editor and Publisher, Privacy Times and Chairman, U.S. Privacy Council Sally Katzen, Director, Office of Information and Regulatory Affairs, Office of Management and Budget Deirdre Mulligan, Staff Counsel, Center for Democracy and Technology PANEL #2 COMPUTER TECHNOLOGY EXPERTS 1:30-2:15 pm Edward G. Amoroso, Technical Manager, AT&T Laboratories Michael Angelo, Principal Member, Technology Staff, Compaq Corporation Dorothy E. Denning, Professor of Computer Science, Georgetown University David P. Jablon, Software Engineer and Cryptographic Specialist, Integrity Sciences, Inc. George Spix, Chief Architect Consumer Platforms Division, Microsoft Corporation PANEL #3 INTERNET COMMERCE, BANKING AND FINANCIAL PLANNING EXPERTS 2:30-3:15 pm Mark Greene, Vice President, Electronic Payments and Certification, IBM Internet Division Russ Housely, Chief Scientist, Spyrus, Inc. Charles Merrill, Partner, McCarter & English Law Firm Jahan Moreh, Chief Security Architect, Open Horizon, Inc. PUBLIC COMMENT PERIOD - 3:15 pm Members of public who have registered may speak for 4 minutes. The panel may ask questions following each individual's testimony, if desired. CLOSING REMARKS - 4:30 pm For more information and directions, see: http://www.ssa.gov/forums/washingtondc.htm More information on EPIC is available at http://www.epic.org/ ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.46 ************************************