**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.07 (October 15, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: Re: IBM mainframe trojan repost File 3: CPSR Annual Meeting (Oct. 20-21, 1990) File 4: Electronic Frontier Foundation Hires Staff Counsel File 5: 13th Annual National Computer Security Conference (Part 1) File 6: 13th Annual National Computer Security Conference (Part 2) File 7: Summary of COMPUTER ETHICS (book) File 8: Introduction to TOXIC SHOCK ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.07, File 1 of 8: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: October 15, 1990 ++++++++++++++++++ Miscellaneous comments ++++++++++++++++++ 1. MAIL: A few people have received up to TEN copies of a single issue. We have no idea why. On occasion, we send out duplicates if the mailer indicates a net-block. Copies go out about 8-10 at a time, and if one batch is returned, which happens most often on weekends, we repeat the addresses in that batch individually, so it may happen that some people receive a duplicate (we have no way of knowing which address caused the failure, so we re-send all in that batch). However, there is no reason that we, or our postmaster, can determine that would cause multiple copies to be received. 2. Most recipients on the mailing list will notice that the "TO" header line is not to their address, but to "tk0jut1." Some people have asked how (and why) we do this. We simply use the BCC (blind carbon copy) command. For those asking what kind of system we use, it's an IBM Amdahl, wylbur on the front end, and, yes, we do wish we had Unix. 3. CENSORSHIP: The article on censorship will be in issue 2.08 along with an excellent article by Jim Warren on "Political Activity and Computers." ******************************************************************** >> END OF THIS FILE << *************************************************************************** Downloaded From P-80 International Information Systems 304-744-2253 12yrs+