From strick@osc.versant.com Mon Aug 16 18:08:23 1993
.id AA20921; Mon, 16 Aug 93 18:08:01 -0700
.id AA06852; Mon, 16 Aug 93 18:20:19 PDT
Date: Fri, 9 Jul 93 19:28:15 PDT
Subject: [surfpunk-0090] DIGEST: Fermat's Last, PW, Hermes, Cyborganics, Incidents
X-Status: 

INSIDE SURFPUNK-0090:
.[stjude] The Chicago Tribune on Fermat's Last Theorem
.[Webb] _Future_ issuse of PW
.[Webb] Emerald Tablets of Hermes
.[Webb] Cyborganics 
.[spaf].Incident Response Workshop info
        [strick]  thanks for the U S Government Subscription 
                                        catalogs and brochures

This should be it for a while.  Seeya in August      --strick
________________________________________________________________________
________________________________________________________________________

From: Judith Milhon <stjude@well.sf.ca.us>
To: cypherpunks@toad.com
Subject: fwd of Chi.Trib article...
Date:   Tue, 6 Jul 1993 18:42:20 -0700

...for you maths hooligans and crypto thugs...
From:  SPOETZ
Subj:    The Chicago Tribune on Fermat's Last Theorem
To:       DELTORTO, SaintJude


------- Forwarded Message
Subject: The Chicago Tribune on Fermat's Last Theorem
From: David Notkin <notkin@whistler.cs.washington.edu>


The following column appeared in the Chicago Tribune / DuPage County edition
Tuesday June 29 1993 page 2-1.

MATH RIOTS PROVE FUN INCALCULABLE
/by/ Eric Zorn

/begin italics/
News Item (June 23) -- Mathematicians worldwide were excited and
pleased today by the announcement that Princeton University professor
Andrew Wiles had finally proved Fermat's Last Theorem, a 365-year-old
problem said to be the most famous in the field.
/end italics/

Yes, admittedly, there was rioting and vandalism last week during the
celebration. A few bookstores had windows smashed and shelves stripped,
and vacant lots glowed with burning piles of old dissertations. But
overall we can feel relief that it was nothing -- nothing -- compared
to the outbreak of exuberant thuggery that occurred in 1984 after
Louis DeBranges finally proved the Bieberbach Conjecture.

"Math hooligans are the worst," said a Chicago Police Department
spokesman. "But the city learned from the Bieberbach riots. We were
ready for them this time."

When word hit Wednesday that Fermat's Last Theorem had fallen, a
massive show of force from law enforcement at universities all around
the country headed off a repeat of the festive looting sprees that have
become the traditional accompaniment to triumphant breakthroughs in
higher mathematics.

Mounted police throughout Hyde Park kept crowds of delirious wizards at
the University of Chicago from tipping over cars on the midway as they
first did in 1976 when Wolfgang Haken and Kenneth Appel cracked the
long-vexing Four-Color Problem. Incidents of textbook-throwing and
citizens being pulled from their cars and humiliated with difficult
story problems last week were described by the university's math
department chairman Bob Zimmer as "isolated."

Zimmer said, "Most of the celebrations were orderly and peaceful. But
there will always be a few -- usually graduate students -- who use any
excuse to cause trouble and steal. These are not true fans of Andrew
Wiles."

Wiles himself pleaded for calm even as he offered up the proof that
there is no solution to the equation  x^n + y^n = z^n  when  n  is a
whole number greater than two, as Pierre de Fermat first proposed in
the 17th Century. "Party hard but party safe," he said, echoing the
phrase he had repeated often in interviews with scholarly journals as
he came closer and closer to completing his proof.

Some authorities tried to blame the disorder on the provocative
taunting of Japanese mathematician Yoichi Miyaoka. Miyaoka thought he
had proved Fermat's Last Theorem in 1988, but his claims did not bear
up under the scrutiny of professional referees, leading some to
suspect that the fix was in. And ever since, as Wiles chipped away
steadily at the Fermat problem, Miyaoka scoffed that there would be no
reason to board up windows near universities any time soon; that God
wanted Miyaoka to prove it.

In a peculiar sidelight, Miyaoka recently took the trouble to secure a
U.S. trademark on the equation "x^n + y^n = z^n " as well as the
now-ubiquitous expression "Take that, Fermat!" Ironically, in defeat,
he stands to make a good deal of money on cap and T-shirt sales.

This was no walk-in-the-park proof for Wiles. He was dogged, in the
early going, by sniping publicity that claimed he was seen puttering
late one night doing set theory in a New Jersey library when he either
should have been sleeping, critics said, or focusing on arithmetic
algebraic geometry for the proving work ahead.

"Set theory is my hobby, it helps me relax," was his angry explanation.
The next night, he channeled his fury and came up with five critical
steps in his proof. Not a record, but close.

There was talk that he thought he could do it all by himself,
especially when he candidly referred to University of California
mathematician Kenneth Ribet as part of his "supporting cast," when most
people in the field knew that without Ribet's 1986 proof definitively
linking the Taniyama Conjecture to Fermat's Last Theorem, Wiles would
be just another frustrated guy in a tweed jacket teaching calculus to
freshmen.

His travails made the ultimate victory that much more explosive for
math buffs. When the news arrived, many were already wired from
caffeine consumed at daily colloquial teas, and the took to the streets
en masse shouting, "Obvious! Yessss! It was obvious!"

The law cannot hope to stop such enthusiasm, only to control it.  Still,
one
has to wonder what the connection is between wanton pillaging and a
mathematical proof, no matter how long-awaited and subtle.

The Victory Over Fermat rally, held on a cloudless day in front of a
crowd of 30,000 (police estimate: 150,000) was pleasantly peaceful.
Signs unfurled in the audience proclaimed Wiles the greatest
mathematician of all time, though partisans of Euclid, Descartes,
Newton, and C.F. Gauss and others argued the point vehemently.

A warmup act, The Supertheorists, delighted the crowd with a ragged
song, "It Was Never Less Than Probable, My Friend," which included such
gloating, barbed verses as --- "I had a proof all ready / But then I
did a choke-a / Made liberal assumptions / Hi! I'm Yoichi Miyaoka."

In the speeches from the stage, there was talk of a dynasty,
specifically that next year Wiles will crack the great unproven Riemann
Hypothesis ("Rie-peat! Rie-peat!" the crowd cried), and that after the
Prime-Pair Problem, the Goldbach Conjecture ("Minimum Goldbach," said
one T-shirt) and so on.

They couldn't just let him enjoy his proof. Not even for one day. Math
people. Go figure 'em.

----------------------------------------------------------------------

St.Jude the Oblique



________________________________________________________________________

Date: Wed, 23 Jun 93 14:24 GMT
From: Don Webb <0004200716@mcimail.com>
To: surfpunk <surfpunk@versant.com>
To: Fringeware <fringeware@wixer.cactus.org>
Subject: _Future_ issuse of PW


Dear Folk,

_Processed World_ Magazine, supported by BACAT (The Bay Area
Center for Arts and Technology) is in the process of putting
together it's Utopian Future issue.  So you might wish to contact
them for writer's guidelines.  Their phone number is
415-626-2979, their email is pwmag@well.sf.ca.us and their
address is 41 Sutter St. #1829/ San Francisco, CA 94104.  They
pay nothing, but got one hell of a distribution.  Leftist office
workers with good graphics . . .


Don Webb
0004200716@mcimail.com
The Secret of magic is to transform the magician.


________________________________________________________________________

Date: Mon, 28 Jun 93 14:02 GMT
From: Don Webb <0004200716@mcimail.com>
To: Fringeware <fringeware@wixer.cactus.org>
To: surfpunk <surfpunk@versant.com>
Subject: Emerald Tablets of Hermes


Dear Folk,


I am involved on a research project concerning the magical papyri
recently.  I was struck this weekend, while a friend helped learn
how to use UUDCODE (which he had downloaded from Northern
Lights), how similar the technologies of the magician writing
magical papyri in the first four centuries of the common era and
the current  computer technology is.  Magic in the Roman Empire
was a crime against the state, so the magical books utilized
means of compression and encoding -- the development of compact
meaningful utterance -- loaded with meaning for the Initiate --
and meaningless for the non-Initiate.  This is an interesting
remanifestation.  The early use hid valuable information in an
information dry age -- today as we are drowning in information
codes become more and more important to present the useful
information as a pure stream among the filth.

I was playing around with the Emerald Tablets of Hermes with a
view for toward a semiotic theory of magic, and came up with what
is below.  Feel free to share this with anyone, who you feel
might be interested.

        The Precepts of Hermes Trismegistus
        (Authentically Translated from an Unknown Tongue)

I.  What I say is not fictitious but reliable and true.

II.  What is below is like what is above, and what is above is
like what is below.  They work to accomplish the wonders of the
One Thing.

III.  As all things were created by the One Word of the Mind, so
all things were created by the One Thing by adaptation.

IV.  I Hermes-Toth am the teacher of magic and did create words
for magic is a process of inter-reality communication.

V.  Magic is the process by which that which is below is able to
communicate its will to that which is above,and change the subtle
paradigms of that which is above.  If this is done that which is
below shall receive a message in the form of a modification of
the environment below.

VII.  That this should be so is not subject to objective
experimentation.  It is a divine event, a legacy from the Mind to
the Children of Sophia, whose honeyed lips drip with wisdom.
These last born Children are the most mutable of all beings,and
must remember to separate the subtle from the coarse, and to be
prudent and circumspect as they do so.

VIII.  Magical communication does not take place as the speech of
men and women in the marketplace, which I Hermes-Toth also rule,
but it does follow the same Archetype, which I myself created in
order that I might see the worlds.

IX. This has more virtue than Virtue, herself, because it
controls every subtle thing and it penetrates every subtle thing.

X.  This is the way the world is created and re-created.

XI.  This is the origin of the wonders that are performed here.

XII.  This is why I am called "Thrice Greatest Hermes" for hold
the Mysteries of the Sender, the Receiver, and the Message.

XIII. What I had to say here about the Process of Transformation
is finished.


Don Webb
0004200716@mcimail.com
The Secret of magic is to transform the magician.

________________________________________________________________________



From: Don Webb <0004200716@mcimail.com>
To: Arachnet <Arachnet%UOTTAWA.BITNET@pucc.princeton.edu>
To: surfpunk <surfpunk@versant.com>
To: "fringeware@wixer.bga.com" <fringeware@wixer.bga.com>
Subject: FringeWare, Inc.

Dear Folk,
 
The following is an article I am doing for _Tech-Connect_
on FringeWare Inc.  whihc I thought might be of interest.
It is Copyright (c) 1993 Don Webb
 
Don Webb
0004200716@mcimail.com
 
 
 
 
 
 
Cyborganics 

by
Don Webb



My favorite haunts have always been the places where I can trade
ideas and dreams, and occasionally do a little business.  In
short I seek out the hidden temples of Hermes, god of
communication, commerce, and magic.  The best temple I've found
in quite sometime is Fringeware, whose fathers are Paco Xander
Nathan and Jon Lebkowsky and whose mother is the Internet. I
interviewed Paco Nathan Xander after his recent trip to Europe --
Fringeware is far more than an Austin based BBS and mail order
catalog service -- it does business in Europe, Japan an Latin
America (as well as extensive sales in the US and Canada).  The
big idea that Fringeware promotes is Cyborganics, which Paco
defined for me, "Cyborganics - a community, alive, growing around
a marketplace based on people and machines merged into an ecology
of activities.  It may sound like science fiction, but it's real,
day to day biz for us."
 
Fringeware sells books,magazines, Do-It-Yourself electronics, DIY
Brain reprogrammers, and independently developed software.  It
gives away ideas and dreams.  Fringeware exists as an electronic
list, that is to say whenever Jon or Paco or any member of the list
mails things to Fringeware, it shows up in everybody's'
electronic mailboxes.  So not only are there product annocemnets
from Jon and Paco, but filmmaker David Blair discussing his film Wax, 
or virtual reality art show announcements, or information on
the cypherpunk movement, or open ended discussion on Buddhist
economics.  The best trades here are those of ideas and
Principles.
 
The best selling physical items are: Bestsellers: two categories
seem to run in the lead.. electronic publications and brain
machines.  So we have titles like Beyond Cyberpunk, Electronic
Hollywood and all the Voyager Expanded Book series.  Then on the
brain side, we've got Day Dreamer (nonelectronic - REALLY great)
and the cool, low-cost, post-newage Synetics line (electronic). 
Funny thing, but our ebook titles are all for the Mac - people
always come to us demanding DOS titles and it's a joke..  Apple
plowed a whole lot of cash under-writing the grassroots
multimedia revolution while Microsoft was busy undermining small
developers in the same arena - so now the fallout is that nobody
wants to write DOS multimedia w/o a ridiculously top-heavy
business plan.. Actually, the Platform Wars really strike a sour
spot in me - I stay away FAR from people who get dogmatic about
machines,  . wanting to run multimedia on DOS or spreadsheets on
Unix - wrong tool for the wrong purpose - being a software
developer on Mac, DOS, Windows, Unix, etc., I could go on at
length about this particular form of human perversity."  
Fringeware has a typically value added catalog including great
fiction, art, and ideas plus the product line.  Paco said of the
catalog, "A person can make initial contact by neocranially
fondling a copy of Fringe Ware Review off the newsstand and
finding where to proceed from there. That was carefully crafted
as an intro to our biz: good roadmap, pretty easy to parse. We're
looking for people to buy the magazines, always looking for good
writers and artists, people to buy products, vendors selling
products, interesting people to interview/grok, cyborganic events
to help sponsor, people to participate in the online email list,
etc., so there's plenty of avenues for approach. My favorite is
when somebody sends a check in the mail with a note saying "12
widgets to the following address" but of course most of our mail
is much stranger and more wonderfully diverse."
 
If you want to contact Fringeware directly (to obtain a catalog,
or join their Email service, which I can not recommend too highly):

  FringeWare Inc.
  PO Box 49921
  Austin, TX 78765 USA
  fringeware@wixer.bga.com
 
 Jon and Paco both came from solid business backgrounds, they
decided to play the game on their own terms, and for rewards
beyond, but including the buck.  Paco's words on the subject are
worth considering,"  Jon and I are both writers, with diverse
histories of other talents, but we could surmise our common
goal/focus under a single heading: cyborganics.  I really dare
just about anybody to go get a really good education, then get
involved in high-tech megacorp biz for several years, then jump
out on their own and consider how to make a living in the midst
of a burgeoning Info Economy.  I mean, take a hard look at what
the monicker "Info Economy" really implies in terms of which
markets will live and which will die.  My own resume reads: West
Point, Stanford, IBM, NASA, Bell Labs, etc., so I'm not just
musing here.."
 
 
________________________________________________________________________


To: surfpunk@versant.com
Subject: Incident Response Workshop info
Organization: COAST, Department of Computer Sciences, Purdue Univ.
Date: Thu, 08 Jul 93 20:16:18 -0500
From: Gene Spafford <spaf@cs.purdue.edu>

[Please forward this to other lists and to interested parties.]

  ** NOTE: July 10 is the deadline for discounted registration!! **

                          PRELIMINARY AGENDA
           5th Computer Security Incident Handling Workshop
Sponsored by the Forum of Incident Response and Security Teams (FIRST)

                          August 10-13, 1993
                            St. Louis, MO


TUESDAY, August 10, 1993  Full-day Tutorials

1.  Creating a Security Policy
    presented by Charles Cresson Wood:

      [no abstract available at time of posting]

2.  Vulnerabilities of the IBM PC Architecture: Virus, Worms, Trojan
      Horses, and Things That Go Bump In The Night
    presented by A. Padgett Peterson:

  An intensive look into the architecture of the IBM-PC and MS/PC-DOS --
  What it is and why it was designed that way. An understanding of
  assembly language and the interrupt structure of the Intel 80x86
  processor is helpful.

  The day will begin with the BIOS and what makes the PC a fully
  functional computer before any higher operating system is introduced.
  Next will be a discussion of the various operating systems, what they
  add and what is masked. Finally, the role and effects of the PC and
  various LAN configurations (peer-peer and client server) will be
  examined with emphasis on the potential protection afforded by login
  scripting and RIGHTS.

  At each step, vulnerabilities will be examined and demonstrations made
  of how malicious software exploits them. Demonstrations may include
  STONED, MICHELANGELO, AZUSA, FORM, JERUSALEM, SUNDAY, 4096, and EXEBUG
  viruses depending on time and equipment available.

  On completion attendees will understand the vulnerabilities and how to
  detect attempted exploitation using simple tools included with DOS
  such as DEBUG and MEM.

3.  Unix Security
    presented by Matt Bishop:

  Unix can be a secure operating system if the appropriate controls and
  tools are used.  However, it is difficult for even experienced system
  administrators to know all the appropriate controls to use.  This
  tutorial covers the most important aspects of Unix security
  administration, including internal and external controls, useful
  tools, and administration techniques to develop better security.

  Upon completion, Unix system administrators will have a better understanding
  of vulnerabilities in Unix, and of methods to protect their systems.

WEDNESDAY, August 11, 1993

 8:30 -  8:45  Opening Remarks - Rich Pethia (CERT/CC)

 8:45 -  9:30  Keynote Speaker - Dr. Vinton Cerf (XXXX)

 9:30 - 10:00  Break

10:00 - 12:00  International Issues - Computer networks and communication lines
               span national borders.  This session will focus on how computer
               incidents may be handled in an international context, and on
               some ways investigators can coordinate their efforts.
               SPEAKERS:  
                 Harry Onderwater (Dutch Federal Police)
                 John Austien (New Scotland Yard)
                 other speakers pending 

12:00 -  1:30  Lunch with Presentations by various Response Teams

 1:30 -  3:00  Professional Certification & Qualification - how do you know if
               the people you hire for security work are qualified for the
               job?  How can we even know what the appropriate qualifications
               are?  The speakers in this session will discuss some approaches
               to the problem for some segments of industry and government.
               SPEAKERS:  
                 Sally Meglathery ((ISC)2)
                 Lynn McNulty (NIST)
                 Genevieve Burns (ISSA)

 3:00 -  3:30  Break

 3:30 -  6:00  Incident Aftermath and Press Relations - What happens after an
               incident has been discovered?  What are some of the
               consequences of dealing with law enforcement and the press?
               This session will feature presentations on these issues, and
               include a panel to answer audience questions.
               SPEAKERS:  
                 Laurie Sefton (Apple Computer)
                 Jeffrey Sebring (MITRE)
                 Terry McGillen (Software Engineering Institute)
                 John Markoff (NY Times)
                 Mike Alexander (InfoSecurity News)

 7:00 -  9:00  Reception

THURSDAY  August 12

 8:30 - 10:00  Preserving Rights During an Investigation - During an
               investigation, sometimes more damage is done by the
               investigators than from the original incident.  This session
               reinforces the importance of respecting the rights of victims,
               bystanders, and suspects while also gathering evidence that may
               be used in legal or administrative actions.
               SPEAKERS:  
                 Mike Godwin (Electronic Frontiers Foundation)
                 Scott Charney (Department of Justice)
                 other speaker pending           

10:00 - 10:30  Break

10:30 - 12:00  Coordinating an Investigation - What are the steps in an
               investigation?  When should law enforcement be called in?  How
               should evidence be preserved?  Veteran investigators discuss
               these questions.  A panel will answer questions, time permitting.
               SPEAKER:  
                 Jim Settle (FBI)
                 other speakers pending 

12:00 -  1:30  Special Interest Lunch

 1:30 -  3:00  Liabilities and Insurance - You organize security measures but
               a loss occurs.  Can you somehow recover the cost of damages? 
               You investigate an incident, only to cause some incidental
               damage.  Can you be sued?  This session examines these and
               related questions.
               SPEAKERS:  
                 Mark Rasch (Arent Fox)
                 Bill Cook (Willian, Brinks, Olds, Hoffer, & Gibson) 
                 Marr Haack (USF&G Insurance Companies)

 3:00 -  3:15  Break

 3:15 -  5:30  Incident Role Playing -- An exercise by the attendees
               to develop new insights into the process of
               investigating a computer security incident.
               Organized by Dr. Tom Longstaff of the CERT/CC.

 7:30 -  ?     Birds of a Feather and Poster Sessions


FRIDAY  August 13

 8:30 - 10:00  Virus Incidents - How do you organize a sussessful virus
               analysis and response group?  The speakers in this session have
               considerable experience ans success in doing exactly this.  In
               their talks, and subsequent panel, they will explain how to
               organize computer virus response.
               SPEAKERS:  
                 Werner Uhrig (Macintosh Anti-virus Expert)
                 David Grisham (University of New Mexico)
                 Christoph Fischer (CARO)
                 Karen Picharczyk (LLNL/DoE CIAC)
                 Ken van Wyk (DISA/Virus-L)

10:00 - 10:15  Break

10:15 - 11:15  Databases - How do you store incident, suspect, and
               vulnerability information safely, but still allow the 
               information to be used effectively?  The speakers in this
               session will share some of their insights and methods on this 
               topic.
               SPEAKERS:  
                 John Carr (CCTA)
                 Michael Higgins (DISA)
                 speaker pending 

11:15 - 12:15  Threats - Part of incidence response is to anticipate riska and
               threats.  This session will focus on some likely trends and
               possible new problems to be faced in computer security.
               SPEAKERS:  
                 Karl A. Seeger
                 speakers pending 


12:15 - 12:30  Closing Remarks - Dennis Steinauer (NIST/FIRST)

12:30 -  2:00  Lunch

 2:00 -  3:00  FIRST General Meeting and the Steering Committee Elections
 
 3:00 -  4:00  FIRST Steering Committee Meeting

^^^^^^^^^^^^^^^^^^^^^Registration Information/Form Follows^^^^^^^^^^^^^^^^^^^^^

INQUIRES:

Direct questions concerning registration and payment to:  Events at 412-268-6531

Direct general questions concerning the workshop to:  Mary Alice "Sam" Toocheck
                                                      at 214-268-6933

Return to:   Helen E. Joyce
             Software Engineering Institute
             Carnegie Mellon University
             Pittsburgh, PA  15213-3890
             Facsimile:  412-268-7401
TERMS:

Please make checks or purchase orders payable to SEI/CMU.  Credit cards are not
accepted.  No refunds will be issued, substitutions are encouraged.

The registrations fee includes materials, continential breakfast, lunches (not
included on August 13), morning and afternoon breaks and an evening reception
on August 11.  Completed registration materials must be received by the SEI no
later than July 10, 1993.

A minimum of 7 attendees are needed for each tutorial and there will be limit of
50 attendees. You MUST indicate which tutorial you would like to attend and an 
alternate if your first choice is full.

GOVERNMENT TERMS:

If your organization has not made prior arrangements for reimbursement of 
workshop expenses, please provide authorization (1556) from your agency at the 
time of registration.
                                                 
GENERAL REGISTRATION INFORMATION:

Workshop................................. ..............$300.00



All registrations received after July 10, 1993..........$350.00

Tutorials (Must be registered by July, 10, 1993)........$190.00

NAME:

TITLE:
COMPANY:

DIVISION:

ADDRESS:

CITY:

STATE:

ZIP:

BUSINESS PHONE:

EMERGENCY PHONE:

FACSIMILE NUMBER:

E-MAIL ADDRESS:
DIETARY/ACCESS REQUIREMENTS:

CITIZENSHIP:  Are you a U.S. Citizen?    YES/NO

Identify country where citizenship is held if not the U.S.:

(Note: there will be no classified information disclosed at this
 workshop.  There is no attendance restriction based on citizenship or
 other criteria.)

GENERAL HOTEL INFORMATION:

RATES:  A block of rooms has been reserved at the Hyatt Regency at Union
Station, One St. Louis Union Station, St. Louis, Missouri 63103.  The hotel will
hold these rooms until July 10, 1993.  Hotel arrangements should be made 
directly with the Hyatt, 314-231-1234.  To receive the special rate of $65.00
per night, please mention the Fifth Computer Security Incident Handling Workshop
when making your hotel arrangements.

ACCOMMODATIONS:  Six-story hotel featuring 540 guest rooms, including 20 suites.
All rooms have individual climate control, direct-dial telephone with message 
alert, color TV with cable and optional pay movies.  Suites available with wet
bar.  Hotel offers three floors of Regency accomodations, along with a Hyatt 
Good Passport floor, and a special floor for women travelers.

LOCATION/TRANSPORTATION FACTS:  Downtown hotel located in historic Union Station
one mile from Cervantes Convention Center and St. Louis Convention Center and 
St. Louis Arch.  Fifteen miles (30 minutes) from St. Louis Zoo.

DINING/ENTERTAINMENT:  Italian Cuisine is features at Aldo's, the hotel's 
full-service restaurant.  Enjoy afternnon cocktails in the Grand Hall, an 
open-air, six-story area featuring filigree work, fresco and stained glass 
windows.  The station Grille offers a chop house and seafood menu.

RECREATIONAL/AMUSEMENT FACILITIES:  Seasonal outdoor swimming pool.  Full health
club; suana in both men's and women's locker rooms.  Jogging maps are available
at the hotel front desk.

SERVICES/FACILITIES/SHOPS:  Over 100 specialty shops throughout the hotel,
including men's and women's boutiques, children's toy shops and train stores.


________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix.  Quantum Californians appear in one of two states,
spin surf or spin punk.  Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@osc.versant.com>, subscription requests 
to <surfpunk-request@osc.versant.com>.   Math hooligans are the worst.
________________________________________________________________________
________________________________________________________________________





                To: subgenius@mc.lcs.mit.edu
                From: menya zavoot cmpuk <strick@versant.com>
                Subject: thanks for the U S Government Subscription 
                                        catalogs and brochures
                Date: Thu, 08 Jul 93 13:50:19 -0700
                 
                Someone ordered me an U S Government Subscription catalog
                and one of each Subject Bibliography brochure (except for
                subject bibliographies number 23 and 69, of which they
                ordered ten of each.) This amounts to an 8" stack of
                material.

                anyway, given the choice of which brochures multiple copies
                were ordered, I have a feeling that the requesting agent
                reads this list.

                And I wanna say THANKS!  WAY COOL SHIT!  

                                                         menya zavoot cmpuk
                                                         strick@versant.com

                 Here's a sampling:

                         Practical Spanish Grammar for Border Patrol Officers.

                            Deals with situations that are of special interest
                            to patrol inspectors.  Includes a comprehensive
                            list of idiomatic and other useful expressions
                            with particular attention to those used along the
                            Mexican border.  1988: 231 p.  revised ed.

                            S/N 027-002-00362-4        $8.00


                         ATF  Arson Investigative Guide.  
                 
                            A practical guide for arson investigators to use
                            during the investigative stages that follow the 
                            identification of the cause and origin of a fire.
                            1988: 158 p., 7 dividers.   0-16-004721-8
                            T 70.8:Ar 7/988
                 
                            S/N 048-012-00089-2     $5.50
                 
                         
                         Poultry Slauter (Monthly);  Agricultural Statistics 
                                                     Board Reports.  
                 
                            Contains information on numbers of various kinds
                            of poultry slaughtered.
                                 
            
                            $20 a year.  File code 2B.  List ID POULS.
                            0-16-009397-X.   A 92.9/5:
            
                            s/n 701-041-00000-3
            
            
                 
                 
                 Mail order to:  
                         Superintendent of Documents
                         P O Box 371954
                         Pittsburgh PA  15250-7954
                 
                 
                 Also, for free catalog,  mail to
                         Free Catalog
                         P O Box 37000
                         Washington D 20013
                 





From strick@osc.versant.com Mon Aug 16 18:08:05 1993
Received: from osc.versant.com by mail.netcom.com (5.65/SMI-4.1/Netcom)
.id AA20911; Mon, 16 Aug 93 18:07:57 -0700
Received: by osc.versant.com (TAZmail-0.0)
.id AA06848; Mon, 16 Aug 93 18:20:17 PDT
Date: Fri, 9 Jul 93 19:07:40 PDT
Reply-To: <surfpunk@osc.versant.com>
Return-Path: <cocot@osc.versant.com>
Message-Id: <surfpunk-0089@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@osc.versant.com (menya zavoot cmpuk)
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0089] PROJECTS:  MIMEPNQ forming?
X-Status: 
Status: O

/          //   From: Bruce Sterling <bruces@well.sf.ca.us>
           //   To: surfpunk@versant.com
           //
           //   Nice to see your list back in operation, d00d.  
           //   I missed it.

Thx, bruce.   It's been sporadic lately.  That summer thing.  
Is it better to have a life than a zine?

I don't know how you authors do it.  I started to write a book (on C++
and object databases) but I never wanted to work on it, so I told the
publisher I would have to cancel it.  Maybe someday.

I didn't finish my latest C++ Report article this week, (I do a 3x/yr
column on Object Databases) so I'm gonna be carrying the PowerBook to
Munich with me next week...

           \\   From: gt0269b@prism.gatech.edu (David D. Clark)
           \\   Subject: Smurfpunk?
           \\   To: strick@versant.com (Strick)
           \\ 
           \\   I know, I know.  But you probably should put one 
           \\   out before you leave.

Yeah, I'm going to be traveling now for a month, so after this,
no Smurfpunk until August.  Maybe I'll find a telnet port in Budapest.  
Maybe I won't try.  When the article's done, I'm gonna stash the 
PowerBook somewhere in Bavaria.

           **   From: (a punk in .ch)
           **  
           **   I tried the code on surf86.
           **   Took me an hour to debug the 'un-hex-dump' I wrote
           **   especially for the occasion (bug was '<' instead of '<=' )
           **   to find out the stuff needs another phrase.
           **   I tried to guess, to search back issues,
           **   even to finger you. Nothing.
           **   Since I did 50% of the job. Could you tell me
           **   your secret?

That C code at the end of the article produced the mumbojumbo, 
but unfortunately it won't unproduce it.

The program takes a bunch of filenames as arguments,
reads in the first 9999 characters of them, XORs all the
files together, as "xor pads", and spits out the result.

You could use it to implement a "one time pad" -- it will
xor a file with a "one time pad" file.  If the pad is generated
purely randomly, and is kept secret, you have a perfect encryption.

The way I used it, I xored a whole directory full of junk
together.  I have no way of decoding it.  However if you look at
the mumbojumbo with cryptanalytic tools, histograms and bigraph
frequencies, etc., you will surely find corralations, which
would be a real tease.   But I doubt much anything is recoverable from it.

Compile the program and name it "xor".

Pick a source file text.txt.
Pick a random file random.jnk

If these files are less than M=9999 bytes,

        xor text.txt random.jnk > text.xor
        xor text.xor random.jnk > text.rec

By XORING twice with the same file, you recover "text.rec",
which will be the same as "text.txt" ( except that it is exactly
9999 characters long, and has been padded with NUL characters (char 0). )




The point of it is, sometime soon, I could be arrested for sending
that, if encryption is outlawed.  Since I sent a garbled message, and
couldn't possibly give anyone the key to unencrypt it, obviously I'm
up to no good and should be in jail ...

See also ... Tim May's joke in surfpunk-0088.

See also ... "Use a random number, go to jail", by Dundee Friedman,
Mondo 2000 #10, p42.



That you expected to find a message in there, and spent time trying
to decode it, that says something.  For a moment I thought I should
have put something there for you to find.  But that would miss the point.
If I had encrypted something, or if Tim May had posted a Mapplethorpe
to a.b.p.e.c, it would not be nearly so interesting...


           !!   WIRED, JulAug93, p88
           !!
           !!   Supergroup U2 has been using
           !!   interactive media technology in its
           !!   live performances, where giant
           !!   screens depict synthetic drummers,
           !!   replicas of band member Bono, and
           !!   another band thousands of miles 
           !!   away.  

and I've personally answered over 500 email messages.


  ##  Date:    Fri, 25 Jun 93 01:38:48 CDT
  ##  To:      surfpunk@versant.com
  ##  From:    Jason Asbahr <Asbahr@UH.EDU>
  ##  Subject: Bathtub Computing
  ##  
  ##  Greets, surfpunks and striq...
  ##  
  ##  I'm back, computing from the bathtub, how else?  There are plenty of
  ##  oranges and Calistoga (which is not an easy water to find in Houston,
  ##  btw)...  Unfortunately, I am stuck using some random kludge of
  ##  a terminal program "Pop-Modem", which was all I could scrape up from 
  ##  the collection of dusty PC 3.5s...  I recently nuked my laptop
  ##  hardrive with the base distribution of Linux, but never bothered to
  ##  put anything on the five megs grudgingly left for MSDOG...  The
  ##  result?  No decent term emulation, but I do get to practice emacs
  ##  line-editing commands...  :-)  Now I need to install the REST of
  ##  linux...

I still haven't revived my sun3.  If it doesn't revive, I'll have to
figure out linux, I reckon.    I totally like the idea of having the
entire source code for our UNIX, like we did in the old days...

Who is unix a trademark of, these days?

  ##  Enough rambling, at least on that thread.  I have NeXTSTEP running
  ##  on one of the psych lab's clone 486s...  The 486/33s are  s l o w
  ##  anyway, but cramming NeXTSTEP into 8megs of PC ram does nothing to
  ##  speed it up...  When not swapping, the speed is tolerable, good
  ##  for a single user, perhaps a slow secretary, or a process control
  ##  app that doesn't control much...  :-)  It's much nicer over in 
  ##  engineering, with Gateway 486/66 machines with 16megs of ram and
  ##  local bus video (16bit color, with nice Postscript dithering)...
  ##  No fear, psychology is ordering a truckload (quite literally) of
  ##  new, fast, heavily stacked PCs...   
  ##
  ##  "Desert Solitaire" soothes on the CD player...
  ##  
  ##  I made the mistake of wandering into a Bookstop today...  Escaped
  ##  after purchasing only $20 worth of "must have" magazines...  Perhaps
  ##  I'm a bit slow, but I only just now picked up the latest Mondo...
  ##  The Crunch article is cute, with him in his favorite sweater...  

you know it took me several weeks to happen across the new mondo.
somehow it escaped me.

  ##  Oh, damn...  :-)  He's talking about me!  I should have read this
  ##  sooner...  "There's something I'm working on with a student at the
  ##  University of Houston.  What we want to do is a virtual cyberspace.
  ##  Where you have a machine on the Internet called a "virtual world
  ##  server".  If you enter the server, you select which of the virtual
  ##  worlds you want to go into.  After selecting one, you enter that
  ##  virtual world and you have other people or entities in there you
  ##  can play around with.  Your digital identity could be a knight
  ##  in shining armor -- you render that with an artist.  It has
  ##  a certain size and weight, certain characteristics." ...
  ##  
  ##  Cute...

yeah, I think Crunch is on a roll.   I saw him at the 
Survival Research Labs show on Howard St a few weeks go; 
he had cut his hair.  We're going to see him everywhere...

  ##  It's true, but it's on the backburner...  Too many other things 
  ##  running at the same time...like setting up a corporation (unrelated),
  ##  writing the object stuff at JSC (related), doing the laser show 
  ##  (unrelated), and writing a "toy" VR using a NeXT, QuickRenderman,
  ##  multiple kludges, and a $600,000 Evans and Sutherland Digistar
  ##  high-rez (8000x8000 addressable points), ultra-bright fisheye lens
  ##  planetarium dome vector graphics projection system...  :)
  ##  
  ##  Related.
  ##  
  ##  Think Mondo would be interested in the specs of the completed gizmo?
  ##  It would be better than the silly "Slacker Factor" articles...

Get some good pictures.  Tell a good story.

  ##  If anyone wants to talk about "InterWorld" protocols, please speak
  ##  up...  (Techwood viewers, this is your cue...:)

I've got my latest Kudzu Protocols running, in a TCL interpreter I
ported to the Macintosh under Think C ansi emulation, but I'm afraid 
before I get a chance to email them to anyone,  I'm gonna be gone...

  ##  What is it about design magazines that is so difficult to resist?
  ##  Even if they cost outrageous amounts?  Check out "Design World",
  ##  only $8.00 US, there is a nice non-vector non-monochrome Evans &
  ##  Sutherland ad along with a good article on Computer Aided Industrial
  ##  Design...  CAID is the true promise of CAD, if that makes sense at
  ##  this hour...  
  ##  
  ##  Yay!  "Processed World 31" is here...  I always have a hard time
  ##  believing in the American Way after reading my favorite anti-work
  ##  mag...  Time to watch TV again, I guess...

Don Webb writes about an upcoming Utopian Future issue of Processed
World.  I'll nando it below...

  ##  I think I'll put the "No Life" sign (pg 11) on my office door...  
  ##  
  ##  Finally, "MIT Tech Review", always enough interesting articles to 
  ##  make it worth buying....  Great article by Seymour Papert on
  ##  Kids and Computers...heretical!
  ##  
  ##  The UH Architecture profs want to get into VR.  Any advice?  
  ##  
  ##  Striq, when are you coming to visit?  It's looking like I may be
  ##  going to Kansas soon, to check on the farm/harvest/legal weirdness.
  ##  Maybe July-ish...  If something really strange happens, like I'm
  ##  buried in an avalanche of money (or $100 courier opportunities pop up),
  ##  I may be going with John to Amsterdam in August...unlikely, though...

Get pictures of any strange circles you find in the crops...

  ##  I was up last night designing business cards.  I'll fax you one,
  ##  as soon as the details are settled, and I buy a fax modem for the
  ##  NeXT.  :)  A month, tops, hopefully...
  ##  
  ##  
  ##  Ok, enough rambling on all threads...  Time to sleep, or at least to
  ##  dry off...
  ##  
  ##  Till later,
  ##  
  ##  
  ##  Jason Asbahr                           116 E. Edgebrook #603
  ##  asbahr@uh.edu                          Houston, Texas  77034
  ##  asbahr@tree.egr.uh.edu (NeXTmail)      (713) 941-8294  voice
  ##  asbahr@gothamcity.jsc.nasa.gov         UH NeXT Consultant

Don't say sleep.  I'm gonna be up all night packing.  Especially
if I don't finish this surfpunk.   7am flight from SFO tomorrow morning.

 



Date:    Tue, 06 Jul 93 12:10:09 PDT
To:      Justin Mason <jmason@iona.ie>
cc:      menya zavoot cmpuk <strick@versant.com>,
. zzzen@pax.eunet.ch (Nimrod S. Kerrett), ian <iansmith@cc.gatech.edu>,
. keith <keith@cc.gatech.edu>, jason <asbahr@uh.edu>,
. joe germuska <j-germuska@nwu.edu>
From:    menya zavoot cmpuk <strick@versant.com>
Subject: MIMEPNQ forming......................................................!

LIKE zzzen@pax.eunet.ch (Nimrod S. Kerrett) ONCE SAID:
@ Funny papers:
@ I was thinking of doing a MultiMedia comic-strip for
@ an E-Mag (e.g. SurfPunk).

LIKE Justin Mason <jmason@iona.ie> WRITES:
# 
# >If you'd like to help with it, I could probably find some other
# >collaborators as well.  
# 
# Yeah, sign me up, definitely!

I'm going off to Europe (Bavaria and eastward) this weekend, 
and will be incommunicado for three weeks, till like 3 AUG.

What I think I'll do is ask on SURFPUNK for people interested, 
and create a temporary non-list of people, simply a CC:  chain of people 
who would be interested, to let you be chatting while I'm gone.

When I get back, I'd like to start a MIMEPNQ list for real.  
SURFPUNK has already found a niche and a lot of readers (>300).
We need a new list if we seriously go high-bandwith MIME now.
We can experiment among ourselves at first, to get a "format" down, 
then launch globally.

[ If you're interested in this project, send a message with MIMEPNQ 
  in the subject line, to <strick@versant.com>, and a human-readable
  comment about what/why you're interested in doing.  Don't expect
  a reply until the first week of August.  ]

# >Actually I need to survey what's happening in the alt.binaries
# >newsgroups, what others are doing; I don't like to start things
# >in a vacuum.  Do you have these groups?  any other multimedia lists?
# 
# Yep, I do. They have so many non-hacker users that they're stuck with
# the usual uuencode/split sort of file transmission technique, at least
# until MIME becomes properly accepted and supported at the newsreader
# level. newsreader development seems to be moving very slowly; very few
# readers support MIME, and those that do only support the metamail
# toolkit implementation, which has a pretty lousy user interface, and
# isn't likely to be used much, if there's a choice. MIME tool
# development is proceeding quite slowly too, but hopefully something
# useful should be out soon enough.
# 
# The MHN tutorial paper is the one to read; mhn(1) really puts MIME to
# work.

Because MIME readers are not yet ubiquitous, what would be useful in
the next month is to gather lists of resources, MIME freeware for unix,
mac, pc, and create a prototype FAQ of sorts, for MIMEPNQ readers.
Also collect in advance some material for use in the publication, to
experiment with.

Perhaps even someone fluent with macintosh and PC could at least build
some "filters" from the MIME sources, such as the base64
encoder/decoder, using ANSI/UNIX/POSIX support libraries -- just to get
something up and running where there is currently nothing.

I've been told that all the major vendors will be coming out with MIME
products this year, so we'll have real support before too long...
but by that time we should be using new media that they've never even
heard of!(!)!

BTW: joe germuska <j-germuska@nwu.edu> has some kind of magazine BLINK
which I think uses multimedia.  Joe, can you give a status report?
(subscribe me, too) I don't see BLINK in the WWW server 
at "http://antioch.acns.nwu.edu/".



                                               menya zavoot cmpuk
                                               strick@versant.com


LIKE germuska@antioch.acns.nwu.edu (Joe Germuska) WRITES:
# menya zavoot cmpuk wrote:
# It's true, we're there... (although http://www.acns.nwu.edu/ is the
# preferred URL)  We're only a little bit Multimedia -- we have one GIF, a

The Vatican exibit you can get to from the home page "http://www.acns.nwu.edu/"
is REALLY cool.  Gifs of latin, aramaic, and other linguistic erotica.

thx, joe!


# but I'm always interested in doing more, and glad to be on this mailing
# list, even if I don't know what the PNQ part of the MIMEPNQ acronym means!

Just prounounce it "mime pnq", a pun on surfpunk.
That's just a temporary name.  I'm open to suggestions...



  @@  Date:    Tue, 06 Jul 93 21:53:52 +0200
  @@  From:    zzzen@pax.eunet.ch (Nimrod S. Kerrett)
  @@  
  @@  > and will be incommunicado for three weeks, till like 3 AUG.
  @@  You're back from Europe one day before the hacktic.nl HEU
  @@  convention/rave starts? What a shame. Try to find an excuse
  @@  to stay in Europe another week.
  @@  
  @@  > (subscribe me, too) I don't see BLINK in the WWW server
  @@  Got #1 via ftp. Joe sez it might take a long time before
  @@  #2's out since lots of staff graduated/turned-busy.
  @@  BTW. He offered to put my CommX on FTP/WWW. Maybe he did.
  @@  Currently I don't have time to check.
  
 
  @@  I'm sure that when I'm old I'll roam the Matrix via NeuroJack
  @@  and find pleasures beyond our current imagination-capacity tagged
  @@  with 8-letter names for DOS compatibility.
  @@  
  @@  Come to think of it, 8-letter words replaced 4-letter words.
  @@  THAT'S progress.


  %%  Date:    Thu, 08 Jul 93 10:12:06 EDT
  %%  From:    keith@cc.gatech.edu (Keith Edwards)
  %%  Subject: Re: MIMEPNQ forming..........................................
  %%   
  %%  
  %%  Hey Strick,
  %%  Just FYI about MIME.  For people on Suns running Solaris, there is
  %%  already a supported MIME-compliant mail reader that comes on the
  %%  system for free.  The Sun mailtool, as of OpenWindows 3.2 (the
  %%  version that ships with Solaris 2.2), does MIME.
  %%  
  %%  It's probably the only MIME mailer available for OPEN LOOK junkies,
  %%  and probably the only one that's actually supported by the hardware
  %%  vendor.
  %%  
  %%  I never got Montage to speak MIME (wouldn't have been hard, just
  %%  never found the time...sigh...)
  %%  
  %%  -keith
  %%  
  %%  
  %%  PS - I've been running Solaris 2.2 for a while now and I'm *very*
  %%  impressed.  It's snappy, very featureful, and pretty bug free (once I
  %%  installed the 34 patches that are out :-)  And *most* of my SunOS
  %%  4.1.x binaries just run on it (even big stuff, like my window manager
  %%  and FrameMaker).  I can't wait for 2.3...



  {}  Newsgroups: comp.mail.mime,comp.sys.mac.comm,comp.mail.multi-media,
  {}..comp.protocols.appletalk
  {}  From: Alberto Steindler <Steindle@gnbts.univ.trieste.it>
  {}  Date: Tue Jun 22 11:02:55 PDT 1993
  {}  Organization: DEEI - Universita' di Trieste
  {}  
  {}  Iride, an implementation of a MIME user agent for the Macintosh is
  {}  now available via anonymous FTP from:
  {}  
  {}  GNBTS.Univ.Trieste.IT
  {}  
  {}  in the directory:
  {}  
  {}  /mime
  {}  
  {}  This is a beta version implementing a subset of  MIME (RFC1341).
  {}  
  {}  Comments and bug reports will be really appreciated!!
  {}  
  {}  This application was originally developed in a project of Gruppo
  {}  Nazionale Bioingegneria of the Consiglio Nazionale delle Ricerche for
  {}  the integration of multimedia messaging systems in the medical
  {}  environment, in particular for the distribution of bioimages.
  {}  
  {}  For any comment and information please contact:
  {}  
  {}  Alberto Steindler
  {}  Steindle@GNBTS.Univ.Trieste.IT
  {}  
  {}  

________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix.  Quantum Californians appear in one of two states,
spin surf or spin punk.  Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@osc.versant.com>, subscription requests 
to <surfpunk-request@osc.versant.com>.  My fingers are too wired into vi.
________________________________________________________________________
________________________________________________________________________





.Mani Varadarajan <mani@hpclbis.cup.hp.com> might own these words:
.! 
.! 4. After lunch on Wednesday I went to the main technical session for
.! a bit (there was a talk from a Legato person on a file-motel-like
.! tertiary storage system) but after a bit I switched to the alternate
.! track, where there was a sort of panel discussion to compare various
.! text editors.  Jim Blandy was arguing for emacs, Tom Christiansen
.! for vi, and Rob Pike for a mouse-based editor he wrote called "sam".
.! Rob of course had the most humorous insults, and Tom displayed an
.! amazing ability to make vi do things I'd never have guessed it could
.! do (I can't even understand half of the tricks he put up on his
.! slides).  The most interesting part was when they asked for a show
.! of hands to see who was using each editor.  About 55% were using
.! vi (!!!), 40% emacs, and 5% other.  I was *very* surprised how many
.! people were using vi.  My conclusion from the talks is that all 3
.! editors are really obsolete these days.  It seems to me that there's
.! an opportunity for someone to write a really good mouse-based code
.! editor (not a word processor) for the 1990's.  I'm not sure what
.! research there would be in such an activity, or even whether there's
.! fortune to be had, but maybe there's at least fame to be had.  It
.! sure seems like it's time for something new.  A few people tried the
.! lame excuse "I'll never be able to change because my fingers are
.! too wired into vi", but not many people bought it.
.! 


