**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.06 (October 6, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: MARS BBS Sting a Prank File 4: Another view of hacking File 5: The CU in the news ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.06, File 1 of 5: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: October 6, 1990 ++++++++++ In this file: 1. CuD SURVEY 2. NATIONAL COMPUTER SECURITY CONFERENCE 3. CORRECTION / ATI +++++++++++++++ CuD Survey +++++++++++++++ We thank everybody who filled out the CuD survey and thanks to Pat Townson for printing it in Telecom Digest. The response was far, far better than expected, and Bob Krause will have the results as soon as he tabulates them. Because of the volume, it may take a few weeks. Names and all identifying references are, of course, removed. +++++++++++++++++ Computer Security Conference +++++++++++++++++ Coming Next Issue: An eyewitness report on the National Computer Security Conference held last week in Washington, D.C. CuD's coverage will be limited to a single article unless someone else contributes! If you attended the NCSC (and we know many of you did!) why not jot down a few thoughts/observations and send them in? Alternate views, reviews, comments, and summaries are all welcome. ++++++++++++++ Correction on ATI ++++++++++++++ Gremlins in the keyboard mistyped---ATI stands for ACTIVIST TIMES, INC., (*NOT* "Anarchist")-- ******************************************************************** >> END OF THIS FILE << *************************************************************************** Downloaded From P-80 International Information Systems 304-744-2253 12yrs+