💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-7.phk captured on 2022-06-12 at 13:02:07.

View Raw

More Information

-=-=-=-=-=-=-


  =======================================================================
 
  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly
  ======================================================================
  ISSN 1074-3111         Volume One, Issue Seven        January 17, 1994
  ======================================================================

   Editor-in-Chief:             Scott Davis      (dfox@fc.net)
   Co-Editor/Technology:        Max Mednick      (kahuna@fc.net)
   Conspiracy Editor:           Gordon Fagan     (flyer@io.com)
   Information Systems:         Carl Guderian    (bjacques@usis.com)
   Legal Editor                 Steve Ryan       (blivion@sccsi.com)
   Computer Security:           George Phillips  (ice9@paranoia.com)
   Graphics/WWW Design          Mario Martinez   (digital@comland.com)

   ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC
   ** ftp site: ftp.fc.net                 /pub/tjoauc

   U.S. Mail:
   The Journal Of American Underground Computing
   or Fennec Information Systems
   10111 N. Lamar - Suite 25
   Austin, Texas 78753-3601

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 IMPORTANT ADDRESSES -
 ============================================================================
 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com
 ============================================================================

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1995 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved.
 Nothing may be reproduced in whole or in part without written permission
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available periodically to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole,
 to be sold for money or services, nor is it to be packaged with other
 computer software, including, but not limited to CD Rom disks, without
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            TABLE OF CONTENTS

 [File #1:]
 Is There A Santa Claus                               Unknown
 What Do People Think                                 Unknown
 .SIG Heil                                            K. K. Campbell
 WWW - The Junkyard Of The Internet                   Ram Samudrala
 Austin (Tx) Zeen Scene                               Josh Ronsen
 Object Technology In Cyberspace                      Chris Hand

 [File #2]
 Deadkat                                              Deadkat
 EFF Personnel Announcement                           Stanton McCandlish
 Reader Feedback                                      Our Reader(s)
 Call Security / Voice Crypto FAQ                     Neil Johnson
 There's A Body On The Internet                       Uncle Bob's NN #103

 [File #3]
 Windows And TCP/IP For Internet Access               Harry Kriz

 [File #4]
 Windows And TCP/IP For Internet Access (Cont...)     Harry Kriz

 [File #5]
 Say What? Libel And Defamation On The Internet       Eric Eden
 Jacking In From The "Back From The Dead" Port        Brock Meeks
 Announcing Slipknot                                  Felix Kramer

 [File #6]
 Telecommunications Security                          Howard Fuhs

 [File #7]
 Old Freedoms And New Technologies                    Jay Weston
 Information Superhighway: Reality                    Reid Goldsborough
 Internet Tools Summary                               John December
 LOD T-Shirts                                         Chris Goggans

 [File #8]
 Interview With Erik Bloodaxe (Chris Goggans)         Netta Gilboa
 
 [File #9]
 Review Of Slipknot 1.0                               Scott Davis
 cDc GDU #18                                          Swamp Ratte
 My Letter To Wired Magazine                          Scott Davis

 [File #10]
 Caller ID FAQ                                        Padgett Peterson
 The Pentium Bug War Ends As We Know It               James/Ted Barr
 Pentium Non-Disclosure Agreement Of Dr. Nicely       Thomas Nicely
 The Computer Nevermore [A Late Christmas Tale]       Unknown
 Twas The Night Before Star Trek [Another One]        Unknown
 Santa Claus Source Code [The Last Late X-Mas Tale]   Unkown

 [File #11]
 My Life As An International Arms Courier             Matt Blaze
 An Open Letter To Wired Magazine                     Chris Goggans
 When Bigotry Outpaces Technology                     Douglas Welch
 Letter From Steve Case: Child Porn On AOL            Steve Case

 [File #12]
 Lee Harvey Oswald Died For Your Sins                 Gordon Fagan


 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


 
 [Editor's note:  Since we did not come out with an issue anytime near
 Christmas, I am throwing all of our holiday stuff in first.  Have a
 great year]

                        IS THERE A SANTA CLAUS?

 By: Unknown

 As a result of an overwhelming lack of requests, and with research help
 from that renown scientific journal SPY magazine (January, 1990) - I am
 pleased to present the annual scientific inquiry into Santa Claus.

 1) No known species of reindeer can fly.  BUT there are 300,000
 species of living organisms yet to be classified, and while most of
 these are insects and germs, this does not COMPLETELY rule out flying
 reindeer which only Santa has ever seen.

 2) There are 2 billion children (persons under 18) in the world.  BUT
 since Santa doesn't (appear) to handle the Muslim, Hindu, Jewish and
 Buddhist children, that reduces the workload up to 15% of the total -
 378 million according to Population Reference Bureau.  At an average
 (census) rate of 3.5 children per household, that's 91.8 million
 homes.  One presumes there's at least one good child in each.

 3) Santa has 31 hours of Christmas to work with, thanks to the
 different time zones and the rotation of the earth, assuming he
 travels east to west (which seems logical).  This works out to 822.6
 visits per second.  That is to say that for each Christian household
 with good children, Santa has 1/1000th of a second to park, hop out of
 the sleigh, jump down the chimney, fill the stockings, distribute the
 remaining presents under the tree, eat whatever snacks have been left,
 get back up the chimney, get back into the sleigh and move on to the
 next house.  Assuming that each of these 91.8 million stops are evenly
 distributed around the earth (which, of course, we know to be false
 but for the purposes of our calculations we will accept), we are now
 talking about .78 miles per household, a total trip of 75-1/2 million
 miles, not counting stops to do what most of us must do at least once
 every 31 hours, plus feeding and etc.

 This means that Santa's sleigh is moving at 650 miles per second,
 3,000 times the speed of sound.  For purposes of comparison, the
 fastest man-made vehicle on earth, the Ulysses space probe, moves at
 a poky 27.4 miles per second - a conventional reindeer can run, tops,
 15 miles per hour.

 4) The payload on the sleigh adds another interesting element.
 Assuming that each child gets nothing more than a medium-sized lego
 set (2 pounds), the sleigh is carrying 321,300 tons, not counting
 Santa, who is invariably described as overweight.  On land,
 conventional reindeer can pull no more than 300 pounds.  Even granting
 that "flying reindeer" (see point #1) could pull TEN TIMES the normal
 amount, we cannot do the job with eight, or even nine.  We need
 214,200 reindeer.  This increases the payload - not even counting the
 weight of the sleigh - to 353,430 tons.  Again, for comparison - this
 is four times the weight of the Queen Elizabeth.

 5) 353,000 tons travelling at 650 miles per second creates enormous
 air resistance - this will heat the reindeer up in the same fashion as
 spacecrafts re-entering the earth's atmosphere.  The lead pair of
 reindeer will absorb 14.3 QUINTILLION joules of energy.  Per second.
 Each.  In short, they will burst into flame almost instantaneously,
 exposing the reindeer behind them, and create deafening sonic booms in
 their wake.  The entire reindeer team will be vaporized within 4.26
 thousandths of a second.  Santa, meanwhile, will be subjected to
 centrifugal forces 17,500.06 times greater than gravity.  A 250-pound
 Santa (which seems ludicrously slim) would be pinned to the back of
 his sleigh by 4,315,015 pounds of force.

 In conclusion - If Santa ever DID deliver presents on Christmas Eve,
 he's dead now.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                          WHAT DO PEOPLE THINK?

 [Editor's Note:  This was sent to us from a person who thought this
 was funny...and indeed it was.  But I was blown back by trying to
 discover how (or WHAT) this person was thinking... In order not to
 reveal any company or the stupidity of some people, I have deleted
 the name of the author, and removed the name of the computer company
 and replaced their name with [COMPUTER COMPANY].  The
 company is a Fortune 500 company in Texas.

 Subj:      [COMPUTER COMPANY] Suggestion Box
 Date:      94-11-11 18:49:05 EST
 From:      xxxxxxxxx
 To:        [COMPUTER COMPANY] Sysop
 To:        Sysop
 Sent on:   America Online (using WAOL 1.5)

 Field 3 = I would like for [COMPUTER COMPANY] to send me a free
 MultiMedia Computer, Monitor, printer, mouse, and modem.  I need the
 equipment to start my own Charter business, but I am furloughed (pilot)
 and can't afford the equipment.  I'll be happy to pay for it when I am
 able.

 Please send the equipment to:

 [name and address deleted to avoid terminally embarrassing the poor idiot]

 I thank [COMPUTER COMPANY] in advance for its generosity.

     xxxxx

     Here is their response:

     Subj:      Re: [COMPUTER COMPANY] Suggestion Box
     Date:      94-11-11 23:22:00 EST
     From:      xxxxxxxxxx
     To:        AirLnPilot
     CC:        xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     Sent on:   America Online (using WAOL 2.0)

 While [COMPUTER COMPANY] understands your situation completely,
 certain regulations delineate proper handling of requests of this nature.
 Therefore I am forwarding your message to the appropriate agency. You may
 want to  follow up with them - the address is:

     Mr. S. Claus
     North Pole, Earth

 Please direct any addition requests of this nature directly to this
 department to avoid unnecessary delays, especially here at the end of
 the fiscal year.

 Glad I was able to help,

 Sincerely,

 xxxxxxxxxxx
 [COMPUTER COMPANY]

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                               .SIG HEIL

              Holocaust revisionism goes up in flame wars

 By K.K. Campbell

 It was 56 years ago today that Germans awoke to find the Nazis had
 spent the night terrorizing Jews and destroying property in something
 called "Crystal Night." It was a trial-run pogrom for the Holocaust to
 follow.

 Once upon a time, net.news (the Internet's public discussion forums)
 was swamped with flame wars about the Holocaust. They'd be found
 anywhere -- in newsgroups like alt.conspiracy, soc.history,
 soc.culture.canada, misc.headlines, alt.individualism etc.

 One of the most persistent Nazi-apologists, Dan Gannon
 (dgannon@banished.com), wildly spammed Holocaust-denying material,
 either not understanding or not caring about netiquette -- that is, you
 post appropriate material to appropriate groups. Thousands, from dozens
 of newsgroups, complained. Gannon's posts were bad enough, but they
 always brought rebuttal and endlessly repeated arguments.

 Today, most of these debates are found in one newsgroup:
 alt.revisionism -- dedicated to discussing "Holocaust revisionism," the
 claim that the Nazi extermination of Jews and other distinct peoples is
 a "hoax" exacted upon millions of unwary non-Jews.

 Anti-racist and anti-fascist online activists continue to track Gannon
 and his pals around the 9,000-odd newsgroups. One such hunter is
 Canada's Ken McVay (kmcvay@oneb.almanac.bc.ca). McVay, 53, came to
 Canada in 1967 from the U.S. and is now a Canadian citizen (holds dual
 citizenship). He's Canada's foremost online anti-revisionist warrior.

 I've been reading his stuff for years.

                              TRUE COLORS

 "When I first got started on this, everyone was sort of out there on
 their own," McVay told eye in a phone interview from his Vancouver
 Island home. "Almost by accident, working groups started coordinating
 their efforts." McVay works closely with Danny Keren (dzk@cs.brown.edu)
 and Jamie McCarthy (k044477@hobbes.kzoo.edu), among others.

 The goal is not censorship. "I am absolutely, unequivocally opposed to
 any kind of censorship," McVay says.

 This is a real shift in McVay's thinking. I vividly recall reading
 McVay his posts from about two years ago, where he'd vehemently defend
 Canadian anti-hate speech laws.

 "I don't anymore. I think it's the biggest possible mistake." What
 changed his mind? "Dealing with these guys on a daily basis for over
  two years. Seeing how easy it is to shoot them down. And it is. The
 most intellectual among them are stupid and completely inept when it
 comes to historical research. And, of course, they are liars. That
 being the case, why on Earth would anyone want to shut them up or force
 them underground? I want to know who I'm dealing with. I want to know
 where they are. And I want to know how their minds work."

 To see their true colors, McVay and compatriots badger and prod
 revisionists until they drop the scholarly pretense by, say, calling
 McVay a "Jew-lover" or complaining Hitler unfortunately missed the
 parents of some Jewish netter. It happens regularly.

 "These online discussions are not aimed at getting Gannon and his pals
 to change their minds," McVay says. "That ain't gonna happen. It's to
 reach the rest - - such as the new users that pop up every September in
 universities and stumble on this stuff. Many don't know how Nazis
 operate. Most racists don't go around with a little patch on their
 shoulder proclaiming: `I hate Jews, or blacks, or natives.' But it's
 there. We work to bring it out in the open."

                         A.R. AS TESTING GROUND

 McVay and company are working on putting together a book, a primer on
 Holocaust-denial techniques. (He hasn't approached a publisher yet.)
 You often see the results of this ongoing research in alt.revisionism .
 McVay chuckles about having rabid anti-Semites ever at hand to help
 write it.

 "We throw out a chapter when we think it's done, content-wise. If the
 revisionists ignore it completely, then we know it's finished. If they
 respond, we say, `Ah! We missed that trick, calling a maple tree a
 Porsche.' So we add that argument in." A month later, they upload the
 chapter again.

 McVay says the "classic" revisionist tactic is misrepresentation of
 text. Outright lies.

 "They'll cite a historical text: `K.K. Campbell says on page 82 of his
 famous book that nobody died at Auschwitz.' Then you go to the Library
 of Congress and look up K.K. Campbell, page 82, and what you find he
 really said was, `It was a nice day at Dachau.' They get away with this
 because they know goddamn well most people don't have time to rush off
 to the Library of Congress. But people read that and say to themselves,
 `Who would lie about such a thing when it's so easy to prove them
 wrong? They must be telling the truth.' "

 The years of refutation have resulted in anti-revisionists transcribing
 mass amounts of death camp evidence and testimony into computer text
 files. McVay saved them. Soon netters requested the material. It began
 to take up so much time, he automated the process. You send an email
 request, the computer sends you back the file(s).

 The archive is now maybe 60 megs and may swell to over a gig in 1995.
 Write email to listserv@almanac.bc.ca with the message GET HOLOCAUST/INDEX --
 you'll be sent a huge index of Holocaust files (other files, too, on
 fascist racist-right groups). If you like the convenience of gopher,
 check out jerusalem1.datasrv.co.il .

 Revisionists often assert McVay "secretly" gets operating funds from
 Jews.

 "I don't," McVay says. "The hard-drives are spread out on a table with
 a Canadian Tire fan blowing right at them. I can't afford to replace
 things, if it breaks, it's gone. However, I'm upfront -- if I get
 support money, I'll take it, Jewish or not. The fact that a Jewish
 organization would offer several grand to help wouldn't change the
 value of the historical data." He'd like to put it all on CD-ROM.

 "The Internet has to be a revisionist's worst communications
 nightmare," McVay says. "They can't ignore it, because, as you and I
 know, in 10-15 years everyone in North America is going to read stuff
 through the Internet.

 "And that's the beauty of the Internet: once it's refuted in an honest
 and academic fashion, you can't run away from it," McVay says.

 When the latest revisionist recruit charges in with the same old
 pamphlets, it's almost effortless for anyone to request a file and
 reply: "We covered this two years ago. Here is the massive refutation
 of that so-called scholarly report."

 It's there. For everyone. Forever.

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Retransmit freely in cyberspace        Author holds standard copyright
 Full issues of eye in archive                    gopher://interlog.com
 Coupla Mailing lists available             http://www.interlog.com/eye
 eye@interlog.com      "Break the Gutenberg Lock..."       416-971-8421

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

           THE WORLD WIDE WEB - The JUNKYARD OF THE INTERNET

 By Ram Samudrala (ram@mbisgi.umd.edu)

 [Author's Note:]
 I am not completely happy with this, especially the second part,
 because when I started writing this I had a lot of ideas about it and
 now I seem to have run dry.  But I went ahead and finished it anyway,
 before I lost all interest.   Feel free to post this wherever...
 For those of you who are familiar with the workings of the web, you
 can skip to The Junkyard of the Internet.
 ------

     The World Wide Web

 About a year or so ago, there were about 500 HyperText Transfer Protocol
 (HTTP) servers on the World Wide Web (www).  Now, every other person on
 the Internet with some basic computing experience can install their own
 server and provide information (I'm using the world quite liberally here)
 to the web.  I wonder if Tim Berniers-Lee, the person who started the
 www project at CERN, really thought it would become the thing that
 revolutionized the Internet and end-user computing.

 And this issue, the ability to put yourself on a soapbox and be heard by
 the world, and the subsequent consequences, is what I will attempt to
 address here.  First, what does the www give us that we didn't have before?
 By posting on USENET news, for example, you're probably heard by a lot
 more people than having a web server.  Well, the main difference is that
 anything you posted normally was lost within in a few days, so your ideas
 didn't stay around long enough for everyone to assimilate.  On the web,
 your pages are permanent, and you can promote them as much as you want
 and people will continue increasing the accesses made.  But the www
 project would probably be doomed without the software that keeps
 everything working.  Almost every w^3 browser I've used has been of high
 quality (which is absolutely crucial), but one of them, NCSA's Mosaic,
 stands out in terms of availability and accessibility for a variety of
 problems.  Marc Andreessen wrote Mosaic for X and it spread like wildfire
 when NCSA released free versions of mosaic not just for X, but for a
 variety of other platforms, again, about a year ago (September). A friend
 of mine referred to it as "The Program of the Gods".

 I happened to get seriously addicted to the www at the beginning of this
 year, but I got over it soon.  I then realized that all one needed was an
 anonymous FTP server set up and they could serve documents to the www.
 I did this initially, and this is yet another design decision that has been
 crucial---the www incorporates several existing information retrieval
 mechanisms out on the net, primarily gopher and ftp.  I never thought
 gopher would be a big hit, and with the advent of the numerous w^3 browsers
 for almost any imaginable platform, there really is no need for gopher
 clients and why have a gopher server if you can get a http one up running
 just as easily? There is only a small (depending on how aesthetically
 pleasing you want your pages to look like---one can waste hours making
 things look pretty) overhead involved in converting plain documents to the
 HyperText Markup Language (HTML), the language that www browsers understand
 and use to format your text.

 Philosophically, the idea behind the www simply takes Unix philosophy to
 the extreme.  The whole Internet is abstracted as a gigantic file system,
 and HTML allows you to specify any object on the Internet, be it a movie
 of comet Shoemaker colliding with Jupiter, gifs of paintings by Dali, a
 song you recorded on your 4-track that you have a soundfile of, or things
 you should know before you delve into linear and non-linear programming,
 by linking the locations of these objects to an anchor of your choice.
 And like Unix, a link could be anything, including other programs, telnet
 /news/mail/ftp/gopher ports, or just another section of a document.  The
 touch of button that activates the anchor is all you need to access any
 particular link---the software figures out the rest for you---if it's a
 soundfile, it'll play it.  If it's a movie or a picture, it will bring up
 the appropriate viewer, and so on.

        The Junkyard of the Internet

 This is all very nice, but what it lets you do is also access the latest
 porn clip, let you see gifs of Kurt Cobain's shotgunned face, contact your
 favourite astrologer for a consultation on-line, and do on-line shopping.
 I'm not going to pass judgement on whether these things are "wrong", but
 as the web grows, it is clear that it is the entertainment side of the web
 that is thriving.  Megadeth is probably is one of the first groups to
 commercial go all out to advertise a release on the w^3 (the CD comes with
 a sticker saying "check out Megadeth, Arizona at through the www at
 http://bazaar.com or through FTP" (or something like that), and while
 Megadeth, Arizona is a cool place to visit, it is akin to the junk mail
 with colourful pictures that you receive in your postbox. It is propaganda.

 There are a lot of advantages to having entertainment information
 available on the net---but it also results in a lot of spam.  And this
 is evident not only on the w^3, but also in the USENET newsgroups,
 where the commercial Internet provider industry thrives as millions of
 subscribers come on line and run amok.  A few months ago, an advertisement
 on the net would've been flamed to ashes.  Now there is a weak response,
 but the people who opposed this are fighting a losing war.  Advertisers
 continue to spam the net.  Not to mention the increase in the number "job
 wanted" or "items for sale" ads in completely inappropriate newsgroups.
 The number of inane USENET groups created for local objects of worship
 (I am guilty of this) are numerous.  The ease with which computers can
 transmit hypermedia (pictures/movies/sounds) has not only furthered the
 www revolution but is pushing bandwidth to its limits (a state that we
 may perpetually exist in).  All this has contributed to an increase in
 the noise:signal ratio on the net as a whole, but particularly in USENET
 newsgroups and the www.

 As w^3 usage increases, and it becomes more flexible to incorporate
 some sort of a BBS-type system, like USENET, or USENET itself, in www
 browsers, then we will see a exodus from the traditional forms of
 Internet use to w^3 use, just as there is a movement from people typing
 stuff at the prompt to clicking buttons on the mouse to perform local
 tasks.  In fact, I predict that many people simply won't even figure out
 how to FTP or read news from the prompt, just like many people don't
 figure out how to do send mail from the prompt and instead type in a number
 or click on the mail icon for their favourite mailer, since they can do
 this at the click of a button.  Again, this isn't necessarily A Bad Thing.

 What this means, however, is that there will be a dichotomy that will
 exist on the Internet.  There will be people who can navigate the
 Internet only with help of the www and there will be those who can do
 both, i.e., use the prompt to do stuff.  The advantages that the
 people who do have access to the internal workings of the system is
 left to your imagination.  But what this is also leading to is the
 concentration of all the spam on the several networks that compose the
 Internet to the w^3, and hopefully it will leave the traditional forms
 of Internet use as it were.  Commercial advertisers are more likely to
 find the w^3 a more viable medium to display their wares than making
 ephemeral postings on USENET newsgroups, especially given the
 capability for multimedia plugs.  People, visionaries and otherwise,
 can put forth their agenda with ease.  Real information will be much
 harder to find even with tools like the Web Crawler.  All this will
 result in The Program of the Gods becoming a metal detector.

 Not everything has to be negative: the ability to reach the masses in
 an unprecedented way will also hopefully lead to an information
 revolution, where information will be made available free (this is
 evident in the www pages of the two camps of the San Francisco
 newspaper strike).  It will lead to independent reporting of events,
 and even though these will be biased, the perceiver, facing many
 alternatives, can discern the relevant bits themselves.  The www, more
 than anything else, will lead to a society where information is free.
 While I have always been for this, I just realized it comes with a
 price---lots of noise.  But this might push us to developing better
 software that will allow one to filter signal from noise in a
 efficient manner.

 And then of course, there's the issue of speed---there is nothing like
 the net for receiving the latest information on the fly.  Sure, it
 might be tainted, but when one's working and if, for example, one
 wants to check what the latest election results are (why one would
 want to do this is another issue), just get on your local newsgroup
 and post a message, if there isn't already a continuous thread going
 on.  And of course, we all know how the www let us view the pictures
 of Shoemaker/Jupiter collision almost as it happened.  This is
 probably the greatest advantage of maintaining a net-lifestyle.  No
 longer do we have to rely on one or two view points---you can select
 among several and information is made available as soon as it is
 disseminated.

 And what about the incorporation of computers and networking into our
 lifestyle?  We're holding the First Protein Folding Competition in
 Asilomar, CA, and the top priority is making sure we have access to
 the Internet.  We would be basically lost without this access, i.e.,
 without being "plugged in".  It is interesting how life has changed
 for some of us.  5 years ago, I hated computers and now I cannot go
 for a few hours without having access to one.  Visions of cyberspace
 as portrayed in the cyberpunk genre are still far away in reality, but
 a similar affect seems to have been achieved by the people who exist
 on the net.

 Disclaimers: the Internet isn't just about the USENET or the w^3.  I'm
 addressing only certain aspects of it.

 ram@elan1.carb.nist.gov    ...because you believe that science is the
                         greatest achievement so far of the human race
           and its long term best hope for survival and enlightenment.
                                                         ---John Moult

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              AUSTIN ZEEN SCENE

 By Josh Ronsen (rons@quads.uchicago.edu)

 Here are some Austin zeens I've read recently. I am somewhat surprised
 on how good so many of these are, considering the somewhat stale
 nature of Austin's music scene. I've recently posted to alt.zines the
 Austin Zine Guild's "Scratch Paper" #2, which is more of an overall
 commentary on Austin Publications rather than reviews of individual
 zeens as this is. Email me if you missed SP #2, and I will send it to
 you.

 PEEK-A-BOO #10: This marks the recovery of Peek-A-Boo from a
 flirtation with blandness in recent issues, the sex issue, the
 Halloween issue, back to the glory of it's first bunch of issues. Lots
 of personality and personalities in here. An interview with Blast Off
 Country Style, a "scene girl" report (hopefully to become a regular
 column) on cute boys at a Jon Spencer show (which I missed, damnit!),
 and a page of stuff from the women who do the wonderful zeen MTM (see
 below), including a dream featuring Joan Jett, are my faves in this
 ish. Plus cool comic and xerox artwork. P-A-B is free in Austin, so I
 guess send them a dollar at 305 W. 39th St #107, Austin, TX 78751.
 They also claim to have email at boo-key@mail.utexas.edu

 SAD #1: I just picked this up today, and I like it lots. It's kinda
 tiny and is all about (surprise) sadness: people who are sad, music
 that is sad, and three pages of the sadder entries in Kafka's diaries
 (really!). Very well done. The four music reviews, Joy Division,
 Idaho, Bedhead and Timco, are rated by how likely their members are to
 off themselves. Nice touch. Cheer up the sad publisher and send 2
 stamps to 704 W. North Loop, Austin, TX 78751

 MTM #3: Another really fine Austin zeen! What's going on here? Is it
 something in the water? I missed #'s 1 and 2, and deeply regret it. A
 number of interviews here, with 7 Year Bitch, Glorium and two guys
 from Ken's Donuts. I love the witty, irrelevant questions and answers
 in the interviews. The other stuff has some very humorous and spirited
 writing, including the two editors, Lula and Alabama, trading stories
 of weird incidents in their lives, a page of "Uppity Women" you might
 not be aware of, but should (I didn't, but now I do), and an expose on
 a local strip club. This is another freebie, so sent $1 or stamps for
 this or a future issue to 2834 Salado B, Austin, TX 78705.

 RETICENCE AND ANXIETY #3: I think #4 just came out, but this is the
 first one that I've gotten (for the somewhat slimy reason that it was
 the cheapest). Written by lesbian lovers (is that really important for
 me to mention? They refer to the two interviews in #3 as being with
 "queer men", so I can call them "lesbians", can't I? Well, I will and
 there's nothing you can do about it!) who write under the pseudonyms
 R. and A. (this *is* Texas, you know, not that there is any bigotry or
 intolerance around these parts, not here!) This is very well written,
 with moving and interesting accounts of their first days after moving
 to Austin, coming out to one's grandmother, dealing with unsympathetic
 (and downright hostile!) parents and... Having two wonderful,
 intelligent, loving parents, I am always surprised to hear how shitty
 other parents can be. Anyways, interviews with film-maker Todd Haynes
 (after reading this I really want to see his film "Poison") and David
 Wojnarowicz (whose interview I have not read yet). Some political
 articles, A.'s liking for some Heavy Metal, and a photo and commentary
 of Chris Carter of Throbbing Gristle round everything up. All in all,
 an interesting look into two people's lives. Sometimes it is difficult
 to separate writing like this from fiction (I read a lot of fiction).
 After all, what is the difference between writing from someone you do
 not know and a first-person fictional narrative? R&A makes clear this
 difference. $2 and 2 stamps to PO Box 2552, Austin, TX 78768. The
 other issues have differing prices, so just send them lots of cash,
 that's all I'm saying.

 ALCOHOL, DRUGS, AND DRIVING #1: There are more issues, but I haven't
 read any, and I'm not very thrilled with this, and not just because of
 the multi-page feature on the guy who gunned down 40 people from the
 UT Tower years and years ago. I think this is unequivocally inferior
 to my zeen, unlike everything mentioned above and probably below, and
 I have a problem with anyone who does something worse than me. I mean,
 if I can do something, surely you can do it better. Also they guy's
 address is not in the issue, so I have to look it up in Scratch Paper
 #2: oops, it's not in their either, so if you really want this, you
 have to come down to Austin and get it for yourself.

 MONK MINK PINK PUNK #2: This is my zeen, and it is not out yet despite
 rumors to the contrary. When it does come out (don't hold your
 breath), expect interviews with prolific punkers God Is My Co-Pilot,
 and story-teller Juliana Leuking. Also expect a unique and exciting
 format, which is under secret development in what is only known as
 "Josh's Bedroom" (it's worth spending a night there) (anyone who gets
 this reference I'll send you a prize). Email me for details on #1, of
 which I am quite proud of, and of which I have, well, more than a few
 copies left. I have been getting a lot of promo stuff in the mail from
 MMPP's not unfavorable Factsheet 5 review, including anti-rock
 Christian literature (wow, those arguments were really convincing; I'm
 burning my record collection tomorrow!), lollipops from Atlantic
 records to entice me to go see a Melvins show, and a few actually good
 records!

 ASIAN GIRLS ARE RAD #'s 1-10: A very amusing fetish zeen on the beauty
 and wonder of Asian chicks. Sounds disgusting and perverted? Well,
 it's actually quite cute and endearing. I always enjoy this...as an
 anthropological study into intercultural relations, not because
 I'm...you know...you're not buying this, are you? Anyways, Dave writes
 a lot about his life, cool moms, astronomy, taking classes,
 dishwashing, washing dishes with Asian girls and... Like an old
 friend, but only $1 a back issue. #7 has a Shonen Knife review, and a
 picture of them reading AGAR...wow! (When God Is My Co-Pilot read my
 zeen, they verbally harassed me for not liking Elliott Sharp, really!)
 AGAR c/o David O'Dell, 707 W. 21st St, Austin, TX 78705

 LAZY WAYS #1 (?): Marc just sent me his zeen as a trade for mine, so
 right off the bat you know he is cool, although he does not live in
 Austin. Lots of gloriously positive admiration for many indie-pop
 bands that don't seem to get mentioned very often, something which I
 really admire. One more article on Sebadoh and I will barf! Stuff here
 on Allen Clapp, Bomb Pops, Musical Chairs and many more bands I have
 never even heard of (and I read every issue of the Indie-(Music
 Mailing)-List). Hurrah! Marc really likes this stuff and his
 enthusiasm only infects me with the same, despite the fact that I've
 probably listened to too much of this kind of music already. $2 to
 Lazy Ways, PO Box 17861, Plantation, FL 33318.

 BLIND STUMBLING AFTERLIFE by Elisabeth Belile: This is not a zine and
 is not from Texas, but is so marvelously wonderful that I must rant
 and rave about it. Belile writes/produces some of the best and most
 rewarding poetry that I've read in years, if not ever. Her stuff is
 very dada/surreal, and seems to be the product of some cut-up process
 that is not explained. Not stream-of-consciousness, but cut-up. I
 would quote the entire thing if I could, but my fave (since getting
 this just today):

 "These are the politics of my dream:
 1. Crush Beauty
 2. Spit It Out!
 3. Plagiarize -- go naked for a sign!
 4. Appropriate when appropriate
 5. Follow and run on angel's clocks
 6. Command them to call you, *now*."

 The book is one long four-part poem, with a (not meaning to make it
 sound trite) a strong feminist bent to it, esp the last two parts. I
 really have not pondered on it's meaning yet, just enjoyed the
 beautifully powerful juxtapositions of words and phrases. This is
 must-read stuff. $4 -> Broad Press, 2816 Avenel St, LA, CA 90039.

 While on the subject, BSAL, good as it is, no where near approaches
 the power, the emotional malaise, the surrealness of the other book
 I've read from Belile, called "AFTER WITH HOPE", which is a chap book,
 and quite an amazing one at that. I do not have the words to describe
 how great this , so just trust me or email me for more info. $4 ->
 We Press, PO Box 1503, Santa Cruz, CA 95061

 Thanks to anyone who has read any or all of this. I wrote this not
 only because I really like most of these publications, and want to see
 them thrive and prosper, but also because I am generally too shy to
 write to these people myself to praise their efforts. I figure if I
 can turn anyone on to any of these, and they send letters of praise,
 well, that's just about the same, right?

 Peace,
 Josh Ronsen
 rons@midway.uchicago.edu
 ps: I am in Austin despite the email address...

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

              PRESS RELEASE: Object Technology in Cyberspace

 By Chris Hand (cph@dmu.ac.uk)

 FOR IMMEDIATE RELEASE

 Contact: Chris Hand, De Montfort University. Fax +44 116 254-1891.
 e-mail: cph@dmu.ac.uk

 ** A Hypertext version of this Press Release is on the World-Wide Web **
 **     at http://www.cms.dmu.ac.uk/Research/OTG/Online/pr1.html       **
 ________________________________________________________________________


 OBJECT TECHNOLOGY MOVES INTO CYBERSPACE

 Leicester, England -- 28th November 1994.

 De Montfort University's TaTTOO'95 conference to be held in January will
 feature the world's first commercial exhibition held in Cyberspace.

 A number of companies world-wide have already expressed an interest in
 sponsoring a stand in the Virtual Exhibition Hall, where anyone on the
 Internet will be able to browse on-line product information and chat in
 real time with company representatives.

 "This will be just like a `real-life' trade exhibition, but without the
 hassles of travelling long distances or struggling through the crowds",
 says Chris Hand, organizer of the Virtual Conference. "Exhibitors will
 benefit since they won't have to worry about travelling costs or time
 away from HQ. In fact, it will be possible for one exhibitor to work on
 several stands simultaneously. The potential for events of this kind is
 enormous."

 Advertising space will be available both in the Virtual Exhibition hall
 and on an integrated World-Wide Web server.  Other on-line events planned
 to run alongside the real-life conference include a Virtual Press
 Conference and Discussion to be chaired by Eric Leach of the Object
 Management Group, and tutorials on working within object-oriented
 virtual environments. Internet users will be free to mingle on-line with
 the TaTTOO'95 delegates and speakers.

 Alan O'Callaghan, conference organizer, adds: "With the recent
 investments in Object Technology by giants such as IBM, it's now more
 important than ever that we bring the message to as many people as
 possible. The Virtual Conference will allow us to do this. OT is moving
 so quickly now that if you're not on-line to it you could easily miss
 the wave."

 More details on the on-line events are available from Chris Hand
 (e-mail: cph@dmu.ac.uk) and Mark Skipper (mcs@dmu.ac.uk), fax. +44 116
 254-1891.  WWW: http://www.cms.dmu.ac.uk/Research/OTG/tattoo-online.html


 Background

 TaTTOO (Teaching and Training in The Technology of Objects) is an
   international conference which in 1995 will be held in the Queens
   Building, De Montfort University, Leicester on 4-6 January. TaTTOO'95
   follows the highly successful inaugural event in 1994 which was attended
   by 185 delegates from academia and industry in the UK, USA, Sweden,
   France, Holland and Germany.

 More information:

   e-mail: tattoo@dmu.ac.uk
      WWW: http://www.cms.dmu.ac.uk/Research/OTG/tattoo.html


 De Montfort University is recognized by the World Bank as the fastest
   growing university in Western Europe. A distributed university with
   sites in Leicester, Milton Keynes, Bedford and Lincoln, DMU is
   pioneering the use of Video-Conferencing and Internet services by staff
   and students. The School of Computing Sciences, well-known for its
   expertise in Object Technology, has been operating a World-Wide Web
   server since 1993.-----------------
 
                              DEADKAT

 [Editor's note:  This stuff here is published to humor you.  We do not
 in any way condone cruelty to any animal.  This was found when one of
 our editors randomly fingered an account.  If you've been into the
 hacking/phreaking scene for a while (at least since the 80's) like
 us (the editors) you will understand all of this...if not, just read it.]

 [GeeK-Speak mode: ON]

 (#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)
 (#)                                                                     (#)
 (#)              /|narkiztik /<nightz uv $mokeBombz                     (#)
 (#)                       -=- [ANuS] -=-                                (#)
 (#)                  */* T-PHiLE DiViSiON */*                           (#)
 (#)                          PrEsEnTs                                   (#)
 (#)                                                                     (#)
 (#)            [KAT KiLLERZ HANDBooK TO THE BLACK ARTz]                 (#)
 (#)                    [THE FeLiS-MoRTiSiKoN]                           (#)
 (#)                  bY:  D-CeLLeRaTiON TRaUMA                          (#)
 (#)                                                                     (#)
 (#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)

 PHuCK YEW !@#   EYE GOT GROUNDED TODAY FER PUTTiNG THERMiTE iN THE
 FiSH TANK AT SKEWL SEW HERE EYE AM WRiTiNG ANoTHER QUaLiTY T-PHiLE FOR
 ALL YEW @!#  OH SHiT EYE FORGOT THAT DiSKLAiMER THiNG, OK:

 DiSKLAiMER:  iF YEW GO AND KiLL KATz B-KUZ OF THiS T-PHiLE, EYE AM NOT
          RESPONSiBLE, THiS iS FOR iNPHORMATION PURPOSES ONLY #@!#
          IN FACT IM NOT RESPONSIBLE FOR ANYTHING AND BY REaDING
          THIS YER AGREEING TO NOT SUE ME AND STUFF...



                    ======================================================
            /\__/\  WELKUM TO THE FELiS-MoRTiSiKON, THE SEKRUT BLACK BOOK
 DEWMED    | x x /  OF KAT KiLLiNG, iF YEW HAVE A WEAK STOMACH OR YOU ARE
  KaT -->   \ ^ /   ONE OF THOSE GREENPEACE OR SPCA FAGGOTZ THEN PHuCK YEW
             | |    PANZIE, GO WATCH 101 DALMATIONS OR SUMTHING @!!@#
            /   \   ======================================================
           | . . |
            (" "
             )

  ONE OF MY FAVOURiTE METHODZ OF KAT EXTERMINTATION IS A PLAY ON THE
  OLD HOCKEY KARD IN THE SPOKES OF YER BICYCLE TO MAKE A KEWL SOUND
  THING, IF YEW HAVE NEVER DONE THIS BEFORE WHAT ESSENTIALLY YOU DO
  IS AFFIX A HOCKEY KARD TO YER SPOKES AND AS YOU PEDAL IT MAKES A
  KEWL KLICKING SOUND..  WELL THIS IZ FOR PANZIE FAGGOTZ #@!@  IF YER
  KEWL WHAT YEW DO IZ TAKE A LiVE KAT aND AFFIX IT TO THE SPOKES OF
  YER BIKE AND PEDAL AROUND TOWN VIGOROUSLY, NOT ONLY DOEZ IT SOUND
  KEWL BUT ALSO YOU GET SUM CHOICE LOOKZ FROM ANYONE YOU HAPPEN TO
  PASS BY !@#@!

  [NoTe: Thiz method will not work on bikes without spokes,
  ie: big wheels, if you own a big wheel: get some skipping
  rope and tie one end to the kat and the other end to the back of
  your big wheel, position yourself at the top of a big hill and
  pedal downward vigorously]

  ANOTHER FAVOURITE OF MINE REQUIREZ ACCESS TO YER SCIENCE TEACHERS
  STOREROOM OR SOMEPLACE WHERE YOU KAN AQUIRE LARGE AMOUNTS OF PURE
  POTASSIUM.  BASICALLY WHAT YOU DO IS SHOVE LARGE AMOUNTS OF PURE
  POTASSIUM DOWN THE CATS THROAT AND THEN ONCE IT IS SUFFICIENTLY
  STUFFED WHIP IT INTO THE BATHTUB WHEN YER MOTHER IS HAViNG A BATH
  OR EVEN INTO A PUBLIC SWIMMING POOL.  YOU WILL REVEL IN THE XPLOSION
  OF KAT FUR AND INTESTINES THAT WILL RESULT FROM SUCH ELEETNEZZ..
  IN KASE YOU DONT KNOW, POTASSIUM + h2o (water) kauses a minor xplosion.
  THE MORE PURE POTASSIUM YEW STUFF THE KAT WITH THE BETTER THE BOOM.

  [NoTe: Another play on this method iz to stuff the kat with the
  potassium and then remark to your mom that the kat looks like it
  needz a bath, when yer mom immerses the kat in water *B00M*.. hehe
  If you want to be elaborate, talk to your mom alot about spontaneous
  combustion, fill her head with lotz of horror stories about it then
  proceed with the plan...  it will take her weekz to recover from
  the shock when FeFe goez BooM-BooM]
  [NoTe#2: ThiZ meth0d iz loadz of fun when you employ one of th0se
  panzie 'throw in yer quarterz' publik fountainz as yer detonator]

  DEW YEW HAVE A MIKROWAVE ?!?!?  iF SO THiS NEXT MeTHOD IZ DEFINITELY
  THE THiNG TEW DEW ON THoZE RAiNY SUMMER DAZE WHEN YEW R BORED OUT OF
  YER MIND @!#@!  EYE AM SURE BY NOW YEW R BORED OF MERELY JAMMiNG YER
  FAVOURiTE FELiNE iNTO THE MiCROWAVE ON HIGH FOR 10 MiNUTES, WELL HERE
  iZ A METHOD WHICH ADDZ SUM EXCiTEMENT !@#!@ WHAT YEW WiLL NEED BESiDES
  THE OBViOUS KAT AND MiCROWAVE iZ:  a) YER MOTHERZ FAVOURiTE PEARL
  NECKLACE.  b) A SHiTLOAD OF POPKORN KERNELZ !@#!@  STRiNG THE PEARLZ
  AROUND THE KAT, THROW IT IN THE MiCROWAVE AND THEN FiLL THE MiCROWAVE
  WiTH POPKORN...  KLOSE THE DOOR, CRANK IT ON HIGH AND RUN LiKE HELL #@!#
  THiS METHoD iZ VERY MESSY #!@#  THE RESULTANT EXPLOSION WiLL B MAMMOTH
  SEW MAKE SURE NOONE IZ AROUND BuT YEW WHEN YEW DEW THiS ONE !@#@!

  THiZ ENDZ PART ONE oF THE FELiS-MoRTiSiKON #@!#  PHUCK YEW !@#@!
  WATCH FER MORE QUALiTY [ANuS] PHiLeZ KUMMING YER WAY SooN !@#
  GREETZ GOEZ OUT TEW:  SKAR-TiSSUE, MuTiLaTeD-KaT [FEaR]
  SPECIAL GREETZ GOEZ OUT TEW ALL [FEaR] MEMBERZ @!#@!
  FeLiNe Exterminatorz/Anarkistik R0dentz  0H SHiT!@#  THAT REMiNDZ
  ME, EYE FORGOT TO MENTION ANARKYKON @!# OK:

  ==========================
  =      ANARKYKON '94     =
  ==========================

  EYE ARRiVED AT THE CONVENTION CENTER AROUND 5PM JUST AS SEVERED LiMB AND
  DEMONiKiZT WERE HEADiNG OUT TO GO TRASHiNG AT SMITH AND WESSON, LUCKiLY
  THEY HAD ROOM FOR ME, SO OFF WE WENT..  THE THREE OF US SPED OFF
  TOWARDZ THE SMITH AND WESSON BUILDING IN DEMONiKiZT's VAN AT QUITE
  A FRANTiC PACE ONLY STOPPING AT A RED LiGHT ONCE TO PuLL OVER AND MaCE
  AN OLD LADY WHO WUZ STaNDiNG ON A KURB.. OK, WE ARRiVED AT SMiTH AND
  WESSON JUST AZ THEY WERE KLOSING SO WE WAiTED OUTSIDE IN THE VAN UNTIL
  THE LAST EMPLOYEE HAD LEFT, AT WHICH POINT DEMONIKiZT LEAPED OUT WiTH
  SEVERED LiMB AND EYE IN TOW, WE MADE A QUIK B LiNE TO THE DUMPSTER AND
  EYE LEAPED iN..  SEVERED LiMB LiT A SMOKE BOMB TO PROViDE US WITH SUM
  DEGREE OF COVER AND QUICKLY JOINED ME iN THE DUMPZTER @!#  WE SiFTED
  THROUGH THE MEZZ AND ALL WE GOT WERE A FEW SHELL CAZINGZ AND EYE FOUND
  SUM PRiNTOUTZ FER A LAZERSKOPE PLANS OR SUMTHiNG #@!#  OK BACK TO THA
  KONVENTION CENTER #!@#  WHEN WE ARRiVED WE WERE GiVEN OUR NAMETAGZ AND
  SHuFFLED OFF TEW A ROOM WHERE A FEW TALKZ WERE GIVEN ON TERRORIZM AND A
  FEW BORING LEKTUREZ ON SNEAKING INTO BUILDINGZ AND LOCK PICKING #!@
  EYE RAN INTO RANCiD MEAT AT THE LEKTUREZ AND HE INVITED ME UP TO HIZ
  ROOM TO LOOK AT HIZ CHEMICAL WEAPONS, WHEN WE GOT UP THERE HE SUGGEZTED
  WE TEAR GAZ THE LOBBY, WHICH WE DID... NEEDLEZZ TO SAY THE POLIZE
  SHOWED AND THA KONVENTION ENDED EaRLY @!#!@  PHUCK YEW !@#@! EYE GOTTa
  GO NOW..

                                  D-CeLLeRaTiON TRaUMA
                                  [ANuS] '94
                                  $@#!$#@$@$^M

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


                      EFF PERSONNEL ANNOUNCEMENTS

 By Stanton McCandlish (mech@eff.org)

 FOR IMMEDIATE RELEASE

 Personnel Announcements at EFF.
 Contact: EFF: Andrew Taubman <drew@eff.org>, +1 202 861 7700

 The Electronic Frontier Foundation (EFF) announced today several
 significant personnel changes. EFF is a non-profit, public interest
 organization that seeks to protect and enhance the growth of "Cyberspace"
 (the Global Information Infrastructure) as a diverse, free, responsible
 and empowering environment.

 David Johnson has been named Chair of the EFF Board of Directors and
 Senior Policy Fellow of EFF. Johnson, an EFF Board member since 1993,
 has been practicing computer law with the Washington, DC, law firm of
 Wilmer, Cutler & Pickering. He has direct experience with computer networks
 as Chairman of LEXIS Counsel Connect (an on-line system for lawyers).
 He joins Andrew Taubman, Executive Director and Chief Operating Officer,
 who began at EFF in September  of 1994.

 Esther Dyson has been named Vice-Chair and will serve on the EFF Executive
 Committee. Dyson is President of EDventure Holdings Inc., a venture
 capital firm focused on emerging  information technologies, particularly in
 Eastern Europe. Dyson is a member of the US National Information
 Infrastructure Advisory Council, has board memberships at the Global
 Business Network, Perot Systems, the Santa Fe Institute, and is a founding
 member of the Software  Publishers Association.

 Johnson and Dyson join David J. Farber and Rob Glaser on the EFF
 Executive Committee. Farber holds the Alfred Fitler Moore Professorship
 of Telecommunications at the University of Pennsylvania, is a fellow at the
 Annenberg School for Public Policy and at the Glocom Institute in Japan and
 was one of the creators of many of the parts that evolved into the modern
 Internet - such as CSNet, CREN, and NSFNet.  Glaser is President and CEO of
 Progressive Networks, an interactive media and services company and serves
 on such boards as the Foundation for National Programs and the Washington
 Public Affairs Network.

 EFF co-founders Mitchell Kapor (immediate past Chair) and John Perry Barlow
 (immediate past Vice-Chair) remain Directors and will continue to
 participate actively in the development and implementation of EFF policy
 programs.

 Also announced, Jerry Berman, who held the position of Policy Director, has
 left EFF. Janlori Goldman and Daniel Weitzner, who have worked closely
 with Mr. Berman over the years, and other policy staff members, also have
 left to establish with Mr. Berman a new organization to be called the
 Center for Democracy and Technology (CDT). EFF wishes CDT success in its
 new venture and thanks Jerry and his colleagues for their substantial
 contributions over the past three years.

 In 1995, EFF will continue to pursue its policy mission of protecting the
 health and growth of the global computer networks. The 1995 policy agenda
 includes such projects as an innovative new "State of the Net" report;
 studies of the implications of the global nature of the net for
 jurisdictional and governance questions; a study of the protection of
 intellectual property on networks; and efforts to preserve the free
 flow of information across the Global Information Infrastructure. EFF
 expects to continue to intervene actively to counter threats to
 computer-mediated communications networks, and virtual communities, such
 as limitations on the use of cryptography and intrusions into personal
 privacy, as it has in previous years.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            READER FEEDBACK

 [Editor's note:  This is a response form one of our readers in reply
 to the 'Porn On The Net' article we ran in the last issue]

 By Michael Stutz (at118@po.cwru.edu)

 Hello--

 I didn't see a Letters section in this issue [vol i, issue 6] and I really
 hadn't intended on writing one, but that article -- Paul Pihichyn's rant
 on porn -- was so stupid I had to say *something*.

 Calling it all those names ("filth," "slime," etc) made it immediately
 suspect. What are these things he's talking about?  Naked people.  People
 without their clothes on.  What's so filthy and slimy about that?  Nothing.

 His fears about exposing porn to children are silly; what children know
 how to uudecode, assemble and view an image?  None that *I* know.  Besides,
 what would happen if a child saw a picture of a naked woman?

 What would happen?

 Probably nothing much.  Maybe (s)he'd laugh, I don't know.  While I'd
 hardly recommend throwing porn into the laps of kids, we have to remember
 that it doesn't do much for them, either.  We're all naked and we all have
 sex.  That this guy suggested that we don't 'need' groups like alt.sex
 is more than ridiculous -- it tells me that there's a lot of people out
 there (like him) who need help.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

           CALL SECURITY, PUBLIC KEY VOICE CRYPTOGRAPHY FAQ

 By Neil Johnson (njj@pokey.mc.com)

 Call Security, Public Key Voice Cryptography FAQ
 ------------------------------------------------

 Call Security is a shareware program which provides public key
 cryptography for voice telephone conversations. In other words private
 phone conversations. Like as in voice scrambling. All you need is a
 modem, a sound card, PC, and someone to talk to (with the same).

 This my first version of the Call Security FAQ. Its very brief but
 should get you going if you plan to use it. If you have suggestions,
 comments, or criticism, please let the current editors know by sending
 e-mail to njj@mc.com. Things like, bugs, sound card how to, modem
 init. strings etc... are especially welcome.

 Many thanks to David Colston, Charlie Merritt the authors of Call
 Security. These guys have been sharing info with me regarding this
 program in the many months prior to its release.

 This is the very first & rough draft version of this faq. Some things
 are sure to be missing, just plain wrong, etc... Your get the
 point. Trust only what can you verify yourself. This faq is actually
 bound to create more questions than it answers. Hopefully it gets you
 to use Call Security.

 Call Security FAQ Author Neil J. Johnson, email njj@mc.com

 Table of Contents
 -----------------

 1. Overview, what is Call Security?
 2. How well does it sound?
 3. What kind of hardware do I need?
 4. Where do I Get Call Security?
 5. Quick, can you tell me how to run it step by step?
 5.1 Ok how do I stop talking now?
 6. How Does It Work?
 7. What public key algorithm does it use?
 8. Is it really secure?, You, decide!
 9. Is it safe to give them my public key when i upgrade from shareware
    (512 bit key) to the registered version (1024 bit key)?, Yes,
    its only the public key!
 10. How do I set up my sound card?
 10.1 How do I set up my Gravis Ultrasound?
 11. My modem is full duplex why isn't Call Security?
 12. Are there any bugs in the program?
 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security?

 Answers to Questions
 --------------------
 1. Overview

 Well Call Security (CS) turns your ordinary PC into a very secure
 voice telephone.  CS also works as a general purpose data
 comm. program with zmodem support, ansi/vt100 terminal, & regular
 unencrypted digital voice. Call Security is also a general purpose
 public key cryptography program for encrypting/decrypting any computer
 file (like email).

 2. How well does it sound?

 The sound quality varies depending upon how many (compressed) samples
 per second your hardware can do. Here is a little chart.

 Sample rates:
         7600  Acceptable
        10000  sounds like good CB Radio (486 with 14.4bps modem)
        16000  Real sweet

 3. What kind of hardware do I need?

 The minimum recommended system is a 386sx with a 9600bps modem & a
 sound blaster compatible sound card. A 486 system with a 14.4bps modem
 is recommended. A 28.8bps modem is still even better! You should also have
 a copy of pkunzip to uncompress the program if you get a zipped copy off
 the Call Security BBS.

 4. Where do I Get Call Security?
 Right now the only place to get it is at the following BBS phone number.
 Note I didn't see any support for kermit transfers. I recommend using zmodem
 protocol.

   Call Security BBS
   1 (501) 839 - 8579

   - Give your full name.
   - The password is "security"
   - Use the "d" command to download
   - select transfer type like "z" for zmodem (sorry no kermit support)
   - enter file name "callsec1.zip"
   - put your comm program in zmodem mode (automatic for most comm programs)

 5. Quick, can you tell me how to run it step by step?

 - DOS stuff
    >mkdir callsec1
    >pkunzip callsec1
    >pkunzip software
 - I recommend printing the documents, readme.1st, security.doc,
   svterm.doc.

 - If your in windows exit now.

 - determine which comm port your modem is on & determine the address &
   IRQ. The DOS command msd.exe (Microsoft Diagnostic) can help with this
   task. Write this down for later.

 - determine the address of your sound card. Write down for later use.

 - If you don't have a sound blaster then put you sound card in sound
   blaster emulation mode.

 - type "security" at the dos prompt.

 - Your now in the security program.  Select option A. Make My Own
   Secret & Public Keys (cursor to & hit return)

 - Now unfortunately CS makes public key exchange a hassle. You need to
   extract your public key from your key list it (& uu encode it
   optionally), and give it to the person you wish to talk to with
   CS. The first 2 steps can be done with the menu picks. The last part
   can be done with CS zmodem, if you happen to have the DSZ shareware
   program.

   Since this is a quick start guide lets skip this for now and use password
   encryption instead. If you don't want to skip the public key stuff read the
   documentation.

 - Use menu pick J. Go To Secure Voice Terminal
   You will be prompted for info on you modem set up & sound card setup.
   Just enter the info as it comes up. For sample rate select 10,000 samples
   per sec. for a 14.4 modem, 16,0000 for a 28.8, & 7,600 for a 9,600. Note:
   if you have a 386 16/SX machine don't go over 8,000 samples per second.

 - When your done setting the modem  & sound card you will be a menu for
   where to go next. Hit the return key. You will be popped into the comm.
   program/terminal emulator.

 - Now it time for one person using CS select auto answer mode & the other CS
   to dial.

 - the auto answer person/side presses function key F8

 - the caller does the following:
   press function key F6. Enter name & number of person you plan to dial.
   Note: field are separated with spaces, tab keys won't work. Now dial,
   directions are on the screen to do this (I think you just hit the return
   key).

 - The machines will now connect. Anything you type will go on their screen.
   Anything they type will go on your screen. Note, this text is not
   encrypted.

 - When your ready to talk hit alt-s on you key board. Then select
   password mode (or public key if you've done public key exchange).
   Each side now enters the same secret password (like hello).

 - On your screen it will either indicate that your listening or talking.
   to toggle listening/talking hit the space bar. To end the session hit
   the esc key. Note: it helps if you use it like a CB & say over while
   you hit the space key (when your done talking).

 5.1 Ok how do I stop talking now?
 Well If your talking you must hit the space key to become the listener.
 To end a voice session & go back to the terminal chat mode, you must hit
 the <esc> key while you are in talk mode.

 6. How Does It Work?

 In laymans terms, each person who uses CS has two keys, a matched
 pair. One is public & the other is private. The way program works is
 public key are used to encrypt voice (or computer
 files/email). Private keys are used to decrypt the voice. Hence know
 one can listen in on a conversation (or computer file/email) that was
 meant for you (encrypted with your public key).  However you still have
 to trust the person you are talking to!

 7. What public key algorithm does it use?

 No CS doesn't use the RSA [Rivest, Shamir, and Adleman] public key
 cryposystem as featured in PGP. A bonus feature of not using RSA is
 the avoidance of RSA patent restrictions.

 CS uses QPK Quick Public Keys by David Colston. This
 public key system has been reviewed by Whit Diffee, Gus Simmons
 (Sandia Labs), and posted on sci.crypt.

 On the plus side QPK is fast. On the down side the CS implementation
 of QPK does not support digital signatures. FYI, Digital signatures are
 signed with private keys & verified with public keys.

 Like virtually all public key systems CS uses QPK to encrypt a random
 (private) session key, The session key is then used to encrypt the voice
 conversation.  This is because public key systems are too slow for
 realtime voice.

 The private (session) key encryption algorithm uses a very long many
 bit linear feedback shift register LFSR pattern which is xored with
 the voice data. To greatly increase the security, only short (many
 times less than the LSFR total length) sequences of this LFSR are used
 between transmission of a new (really) random seed for the LFSR. Hence
 a random seed constantly restarts the LFSR at truly random points in
 the sequence.

 Well I'm sure I didn't do justice to the crypto stuff, but its a start.
 If you want to know more general info read the cryptography-faq. It
 can be found in news groups sci.crypt, talk.politics.crypto,
 sci.answers, news.answers, talk.answers.  Another good faq is pgp-faq
 found in news groups alt.security.pgp, alt.answers. Once you have read
 these faqs you will have to consult the authors of CS for more
 specific info on the various crypto features of CS and QPK.

 8. Is it really secure?, You, decide!

 Well the public keys system used by Call Security, QPK ( Quick Public
 Keys) by Dave Colston has survived peer review. This is good.

 Charlie Merritt did the single private key stuff. I described this
 algorithm briefly (from a phone conversation) in question 7. Maybe
 this needs further public review?

 Also we don't have the source code so its hard to check for trap doors.
 I don't know what their motivation for a trap door is however. They want
 to make money off this thing.

 Plus all the normal stuff needs to be considered, like did some one
 put a bug (transmitter) in you sound card microphone, did they break in
 and steal the private key off your harddrive/ floppy drive, etc...

 Well you decide if you think call security is secure. I think it is
 but what do I know? Only time will tell how secure CS really is.

 9. Is it safe to give them my public key when i upgrade from shareware
    (512 bit key) to the registered version (1024 bit key)?, Yes,
    its only the public key!

 Yes, the authors only want half of your public key. This public key is
 then used to create a file which enables receiving encrypted voice
 with your larger key. Note: Non-registered versions work just fine
 with registered users with large keys.

 10. How do I set up my sound card?

 Well if you have an original mono 8 bit sound blaster you do nothing.
 If you don't have a classic sound blaster then you should put you sound card
 in sound blaster (8 bit mono) emulation. Please send me email njj@mc.com on
 how you set up your sound card to work with CS. I will add the info to this
 faq.

 10.1 How do I set up my Gravis Ultrasound?

 Ultrasound cards have two sound blaster emulators. Only the SBOS emulator
 works with Call Security. Don't use MEGAEM.

 Before you run Call Security "SECURITY.EXE" Just exit windows & type
 SBOS at the DOS prompt. You should here the words SBOS installed on
 your sound card speakers, plus you will see confirmation of SBOS
 loading on your computer screen.

 If SBOS doesn't work consult your ultrasound documentation. Or read
 the gravis faq found on the news group
 comp.sys.ibm.pc.soundcard. Other sights for gravis sound card info
 include:

                      FTP Sites                     Archive Directories
                      ---------                     -------------------
 Main N.American.Site: archive.orst.edu             pub/packages/gravis
                       wuarchive.wustl.edu     systems/ibmpc/ultrasound
 Main Asian Site:      nctuccca.edu.tw                    PC/ultrasound
 Main European Site:   src.doc.ic.ac.uk            /packages/ultrasound
 Main Australian Site: ftp.mpx.com.au               /ultrasound/general
                                                     /ultrasound/submit
 South African Site: ftp.sun.ac.za              pub/packages/ultrasound
 Submissions:        archive.epas.utoronto.ca  pub/pc/ultrasound/submit
 Newly Validated Files: archive.epas.utoronto.ca      pub/pc/ultrasound

 Mirrors:               garbo.uwasa.fi                mirror/ultrasound
                        ftp.st.nepean.uws.edu.au      pc/ultrasound
                        ftp.luth.se                pub/msdos/ultrasound

                        Gopher Sites                  Menu directory
                        ------------                  --------------
 Main Site:             src.doc.ic.ac.uk            packages/ultrasound

                        WWW Pages
                        ---------
 Main Site:             http://www.cs.utah.edu/~debry/gus.html

 Main European Site:    http://src.doc.ic.ac.uk/packages/ultrasound/
 Main Australian Site:  http://ftp.mpx.com.au/archive/ultrasound/general/
                        http://ftp.mpx.com.au/archive/ultrasound/submit/
                        http://ftp.mpx.com.au/gravis.html

 Mirrors:
 http://www.st.nepean.uws.edu.au/pub/pc/ultrasound/

 11. My modem is full duplex why isn't Call Security?

 The simple answer is sound blasters (and virtually every other sound
 card known to the program authors) are not full duplex. You can't
 sample digital sound at the same time you are playing digital sound!

 But if the authors, Dave & Charlie start making money off Call Security
 maybe they will be motivated to do a version with 2 sound cards, one
 for record the other for playback.

 12. Are there any bugs in the program?

 Well one very minor bug is the wrong help file (security.doc) pops up
 when you request help in the terminal session of the program. What you
 really want to see is the svterm.doc file when trying to figure out
 how to send/receive voice messages. As I stated before print the
 documentation files svterm.doc, securty.doc, & readme.1st before
 running the program. Remember the Call Security is not windows
 compatible, so you can't have help in one window and call security in
 the other window!

 Another feature I find annoying is that public key exchange is not
 built in to the voice session. Okay maybe public key exchange is not
 something you want to do for every call (to prevent forgery) but at
 least make it a non-default menu pick! The best work around is to pull
 a copy of DSZ or GSZ off one of the shareware sights. This will allow
 Secure Voice to perform file exchange. Then use DSZ to exchange public
 keys prior to running a voice session.

 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security?

 I haven't tried personally tried DSZ or GSZ yet. But here is one FTP
 sight (the SIMTEL primary mirror sight) I downloaded DSZ from while
 writing this faq:

 FTP Location: oak.oakland.edu: /pub/msdos/zmodem
 dsz-read.me A  516    890115  Explains what DSZ program is
 dsz0920.zip B  91253  940930  X/Y/Zmodem protocol file transfer pgm
 txzm241.zip B  42734  941005  Texas Zmodem: Fast/free Zmodem prot. driver
 gsz0920.zip B  112428 940930  X/Y/ZMODEM driver with graphic file xfer

 For more info on shareware sights read the news group
 comp.archives.msdos.announce. Other SIMTEL mirror sights include:

      St. Louis, MO:  wuarchive.wustl.edu (128.252.135.4)
                          /systems/ibmpc/msdos
      Corvallis, OR:  archive.orst.edu (128.193.2.13)
                          /pub/mirrors/simtel/msdos
          Australia:  archie.au (139.130.4.6)
                          /micros/pc/oak
            England:  src.doc.ic.ac.uk (146.169.2.10)
                          /pub/packages/simtel
            Finland:  ftp.funet.fi (128.214.248.6)
                          /pub/msdos/SimTel
             France:  ftp.ibp.fr (132.227.60.2)
                          /pub/pc/SimTel/msdos
            Germany:  ftp.uni-paderborn.de (131.234.2.32)
                          /SimTel/msdos
          Hong Kong:  ftp.cs.cuhk.hk (137.189.4.57)
                          /pub/simtel/msdos
             Israel:  ftp.technion.ac.il (132.68.1.10)
                          /pub/unsupported/dos/simtel
             Poland:  ftp.cyf-kr.edu.pl (149.156.1.8)
                          /pub/mirror/msdos
       South Africa:  ftp.sun.ac.za (146.232.212.21)
                          /pub/simtel/msdos
             Sweden:  ftp.sunet.se (130.238.127.3)
                          /pub/pc/mirror/SimTel/msdos
        Switzerland:  ftp.switch.ch (130.59.1.40)
                          /mirror/msdos
             Taiwan:  NCTUCCCA.edu.tw (140.111.1.10)
                          /PC/simtel
           Thailand:  ftp.nectec.or.th (192.150.251.33)
                          /pub/mirrors/SimTel/msdos

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    THERE IS A BODY ON THE INTERNET

 From Uncle Bob's Network News #103

 There is a body on the Internet!

 At the annual meeting of the Radiological Society of America in Chicago
 on November 18, 1994, the National Library of Medicine unveiled its
 "Visible Man," a three-dimensional, computer-generated cybernetic body,
 which is now available on the Internet.  "Visible Man" is an atlas of
 the human body, assembled digitally from thousands of x-ray, magnetic,
 and photographic images of cross sections of the body of Joseph Paul
 Jernigan, who was executed in Texas for murder, and who had willed his
 body to medical science.

 Using digitalized radiological data from the cadaver, researchers at the
 Heath Science Center of the University of Colorado, under a project funded
 by the NLM, compiled a virtual human body that can be viewed on a screen
 from any angle, dissected and reassembled by anatomy students, or used as
 a model to study the growth of cancer cells, for example.

 First, the real body was photographed with CT scans, magnetic resonance
 imaging, and conventional x-rays.  Then it was embedded in gelatin,
 frozen, and sliced with a laser knife into more than 1,800 cardboard-thin
 cross-sections.  One by one, the cross-sections were removed from the
 cadaver and digitally photographed.  Thousands of pictures were entered
 into the computer.

 The main users are expected to be medical schools and researchers at large
 medical centers.  There is no charge for the access but users must sign
 a licensing agreement with the NLM.  The library has already heard from
 about 300 applicants, including brain surgeons, clothing designers, and
 traffic safety crash testers.  According to NLM director Donald A. B.
 Lindburg, "People are awestruck by how detailed and good the images are."

 Don't expect to download "Visible Man" at home: the program is so complex
 it will require up to two weeks of Internet time to download and a
 capacity on the receiving computer of 15 gigabytes--or 15,000 megabytes.

 The project, costing $1.4 million, will continue next year with phase two:
 "Visible Woman."

 (compiled from news reports in The Richmond Times-Dispatch, The
 Washington Post, and The New York Times)

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%




















 -----------------
 
                 WINDOWS AND TCP/IP FOR INTERNET ACCESS

 By Harry M. Kriz (hmkriz@vt.edu)
 University Libraries
 Virginia Polytechnic Institute & State University
 Blacksburg, VA   24061-0434
 http://learning.lib.vt.edu/authors/hmkriz.html

 In response to popular demand, I am publishing a new release of my paper
 on using Microsoft Windows to access Internet resources. Thanks to
 everyone who has e-mailed me and called me over the past year. I am
 delighted that the paper has been useful. I have been even more delighted
 to give permission for distributing copies at Internet workshops, and for
 copies to be posted on Internet servers. Perhaps this new release will
 find it's way into the hands of all those folks who are getting their
 first computers this Christmas. I hope this paper can play some small
 part in getting them over the rough spots.

 A plain text version of this complete document is available by anonymous
 ftp from:  nebula.lib.vt.edu in directory /pub/windows/winsock
 under filename wtcpip06.asc

 A hypertext version is available at:
 http://learning.lib.vt.edu/wintcpip/wintcpip.html

 --------
 ABSTRACT

 Internet, the global network of computer networks, is arousing enormous
 popular interest. In part this interest is being driven by the
 availability of free or inexpensive shareware software for Microsoft
 Windows. It is now technically simple for a personal computer to become
 a host on the Internet. The casual user can find, retrieve, and view
 information gathered from around the world without having to learn
 complicated computer commands. In this paper I describe the principal
 functions and services available via the Internet. Then I outline the
 technical background and terminology needed by the beginner who wants to
 make his PC a host on the Internet. Finally, I describe several Windows
 software packages and programs that facilitate using Internet services.
 All the software is freely available over the Internet.

 -------------------
 PUBLICATION HISTORY

 The most recent plain text (ascii) version of this paper is always
 available by anonymous FTP from nebula.lib.vt.edu in directory
 /pub/windows/winsock under the name wtcpip**.asc. For example, this
 version is available as wtcpip06.asc. A hypertext version of this paper
 that is maintained on a more regular basis is available through the
 World Wide Web at:  http://learning.lib.vt.edu/wintcpip/wintcpip.html

 The first version of this paper was released via Internet news and BITNET
 listserv on November 15, 1993. Revised and expanded versions were released
 on January 16, February 9, and March 21, 1994. A version was published
 by O'Reilly Associates in the March 14, 1994 issue of the "Global Network
 Navigator Toolkit," which was then accessible at:
 http://nearnet.gnn.com/GNN-ORA.html.

 Release 05 (June 21, 1994) was a major revision that was published by the
 Virginia Tech College of Engineering on the CD-ROM "1994-95 VT Engineering
 Tools." A print copy of Release 05 was also published by the Computing and
 Systems Technology Division of the American Institute of Chemical
 Engineers in "CAST Communications," Vol. 17, No. 2, pp. 6-14 (Summer 1994).

 ------------
 INTRODUCTION

 Internet, the world-wide network of computer networks, has captured the
 imagination of the general public. Eighteen months ago, the Internet was
 barely mentioned in the popular computing magazines. Now it is the topic
 of articles in national news magazines, local newspapers, and grocery-store
 tabloids.

 Awareness of the Internet has spread primarily by word of mouth.  Computer
 pundits were not discussing the Internet in Spring 1993 when I first began
 investigating the Internet in my work as a librarian. Indeed, most pundits
 seem to have acquired Internet access only in the Spring of 1994. Thus,
 computer magazines have not been helpful for those wishing to learn about
 the Internet.

 Now, in December 1994, there is something of a feeding frenzy of interest
 in the Internet. Bookstores are flooded with guides to the Internet.
 Software vendors are rushing to market with collections of software
 designed for navigating the resources on the Internet. It is almost as if
 the crest of the Internet wave has passed. Pundits who did not have access
 to the Internet last year are already writing negative opinions about the
 difficulties of navigating Internet resources, and about the uselessness
 of those resources.

 Complaints about the Internet are many. Certainly it can be difficult to
 find information and resources on the Internet. A great deal of
 information is unvalidated, non-authoritative, or otherwise questionable.
 Some resources should not be available to children. Some would argue that
 some of the information should not be distributed even to adults.

 It is important to remember that the Internet is not a service.  Rather,
 it is a means of gaining access to services and of retrieving information
 and other objects that can be represented electronically. In considering
 complaints about the Internet, one might draw an analogy between the
 Internet and New York City.

 New York is big, complicated, and disorganized. The city's myriad resources
 can be hard to find. Some of what happens or what is available in New York
 should not be seen by children. For those wishing to navigate the
 complexity of New York, there are guidebooks, phone directories, magazine
 articles, and individuals with expert knowledge about areas of particular
 interest. One can navigate the complexity of the city by subway, taxi,
 and bus. One can even hire a private guide to conduct a tour of the city.

 The Internet can be compared to the streets of New York City. The services
 available on the Internet have their analogies in the city's libraries,
 department stores, bookshops, art galleries, street vendors, and street-
 corner zealots passing out literature or lecturing the passing crowds. It
 is safe to assume that somewhere on the streets of the city there will be
 found information and services of interest to almost anyone. However,
 finding that information might take some time for someone who is new to
 the city and its resources. Similarly, somewhere on the Internet there
 also will be found information and services of interest to almost anyone.

 Traveling on the Internet requires only a few basic tools. First is a
 computer with a network connection to the Internet. A direct connection
 using a PC equipped with a network interface card that interfaces with a
 local area network linked to the Internet is common at universities, and
 becoming more common in businesses.  If a direct network connection is not
 available, an alternative is to connect to the Internet through the
 computer's serial port.  This involves a telephone connection to a terminal
 server that offers SLIP (Serial Line Internet Protocol) or PPP (Point
 to Point Protocol) service. Any of these connections can be used with a
 variety of commercial or shareware software to make your personal computer
 a host on the Internet and to access services and information from the
 entire earth. This paper will emphasize the use of freeware and shareware
 versions of software running under Microsoft Windows.

 -----------------
 INTERNET SERVICES

 The Internet services of interest to most people consist of four basic
 functions. These are electronic mail (e-mail), Internet news, file
 transfer between computers (FTP), and remote login to another computer
 (telnet). Access systems like Gopher and World Wide Web now supplement
 these basic Internet functions by assisting the user in searching for
 and retrieving relevant information in a user-friendly manner.

 Until recently, Internet functions were accessible primarily through
 character-based interfaces using a variety of complex command sets. Thus,
 until recently, best-selling books on the Internet contained page after
 page of screen displays or command sequences captured from UNIX-based
 systems executing basic Internet functions.

 Affordable Internet software for Windows first became available in Spring
 1993. Prior to that time, Windows users were dependent for Internet access
 on expensive, proprietary, commercial products in which each vendor's
 offerings were mutually incompatible with every other vendor's offerings.
 Publication of the Winsock applications programming interface provided a
 way for individual client software (such as a telnet or FTP client) to be
 compatible with every vendor's networking products. As a result, beginning
 in 1993 there was a blossoming of freeware, shareware, and commercial
 Internet software for Windows.

 Of special interest has been the development of Windows interfaces to the
 World Wide Web. Mosaic is the best known Web browser. Other choices
 include Cello, Netscape, and WinWeb. The Web was developed by the high
 energy physics community to distribute technical papers and other forms
 of data. WWW is now widely viewed as a means for educators, businesses,
 and hobbyists to distribute multimedia information to a world-wide
 audience.  Graphical WWW clients enable publication of data over the
 Internet in a manner which allows the user to view text, color graphics,
 sound, and video in a manner that approaches the usability, and surpasses
 the functionality, of a printed magazine. Those interested in publishing
 WWW documents may find it useful to read my paper "Teaching and
 Publishing in the World Wide Web." A plain text version is available by
 anonymous FTP from:  nebula.lib.vt.edu in directory /pub/www under the
 name websrv01.asc.   A hypertext version is available through the Web at
 http:/learning.lib.vt.edu/webserv/webserv.html.

 ******
 E-MAIL
 Electronic mail is probably the most widely used Internet function. A
 commonly used configuration requires that a user have an account on a
 POP (Post Office Protocol) mail server. The e-mail client software
 accesses the server and downloads any incoming messages to the user's
 PC. Mail composed at the user's PC is transmitted to the Internet through
 the mail server.

 *************
 INTERNET NEWS
 Internet news, also referred to as USENET news, is a conferencing system
 made up of thousands of topical conferences known as news groups. Those
 familiar with electronic bulletin board systems will compare Internet
 news to echo conferences. Others will draw an analogy to mailing lists
 such as listserv on BITNET. The user reads the news by using client
 software to subscribe to a selection of news groups. When the client
 software accesses an NNTP (Network News Transfer Protocol) server, the
 server downloads to the client a list of subjects for all unread messages
 stored on the server for the selected news group. The user can then select
 any message for reading, post a response to the message to the group, or
 reply directly to the original poster of the message. The client software
 maintains on the user's PC a list of all available groups on the server,
 along with records of which messages have been read or skipped over.
 Only the messages selected for reading are actually downloaded to the
 user's PC.

 ***
 FTP
 FTP (File Transfer Protocol) allows the transfer of files between any two
 computers of any type. Files can be transferred from PC to PC, PC to
 mainframe, PC to Mac, PC to UNIX machine, and vice versa. Any kind of
 computer file, whether it be a text file or a binary file representing
 software, graphics images, or sounds, can be transferred. Of course,
 whether the file is usable on the receiving machine depends on the nature
 of the file and the availability of software to make use of the file.

 ******
 TELNET
 Telnet enables the user of a PC to login to a host computer at another
 site on the Internet. The user's PC then acts as a dumb terminal attached
 to the remote host. Such access usually requires that the user have an
 account on the remote host. For instance, a student or faculty member at
 one university might have an account on a computer located at another
 university. An increasing number of commercial services are becoming
 available via telnet, including services such as the Dow Jones News
 Service and the Lexis/Nexis service. In addition, some services are
 available without charge. For example, hundreds of libraries in all parts
 of the world allow free remote access to their computerized catalogs and
 to some specialized databases.

 ******
 GOPHER
 Gopher is a system that enables the user to find files and other Internet
 services by navigating a system of text menus and submenus. As a corollary,
 it provides a means for information providers to publish information on
 the Internet in a discoverable manner. Prior to the development of Gopher
 at the University of Minnesota, information on the Internet was located
 by asking friends and strangers where to look.

 The first step in using a Gopher client is to "point" the client at the
 address of a known Gopher server. The client then retrieves that Gopher's
 menu of topics. Typically, many of the topics on a Gopher menu are
 pointers to yet other menu items on other Gopher servers. The fact that
 items in the sequence of selections might come from different Gopher
 servers in widely scattered parts of the world is transparent to the user.
 The Gopher client software presents the many different Gopher servers
 as if they represented a single application on a single machine.
 Navigating such menus can lead the user to skip from one Gopher server to
 another, literally retrieving information from servers scattered around
 the world in just a few minutes.

 Items on Gopher menus can be of many different data types in addition to
 menus listing choices of topics. When an item such as a text, graphics,
 or sound file is selected, the Gopher client transfers the file to the
 user's PC. Then, as an option, it may load the file into an appropriate
 "viewer" selected by the user.  A simple text file could be loaded into
 Windows Notepad. A graphics file in GIF or JPEG format might be loaded
 into LVIEW, a popular freeware graphics viewer for Windows. A binary
 program file would simply be downloaded into a designated directory for
 use at some other time. Finding relevant Gopher menu items is facilitated
 through the use of Veronica, which is a database of the text of Gopher
 menus. Most Gopher servers will include Veronica access as a menu
 selection.

 **************
 WORLD WIDE WEB
 World Wide Web (WWW) is a system that enables users to find and retrieve
 information by navigating a system of hypertext documents. In a hypertext
 document, selecting a highlighted word or phrase causes a new document to
 be retrieved and displayed.  Thus, WWW leads the user to skip from one
 document to another, retrieving information from servers scattered around
 the world.

 Viewing a WWW document with a Windows graphical client such as Cello,
 Mosaic, Netscape, or WinWeb is similar to reading a magazine. Information
 is displayed with typographic fonts and color graphics. Unlike a magazine,
 the static display can be supplemented by sound and video clips that are
 played by clicking an icon embedded in the document. Clicking on a
 highlighted word or phrase in the document may cause the reader to skip to
 another part of the displayed document, or it may cause yet another
 document to be retrieved.


 -----------------
 TECHNICAL DETAILS

 It is helpful to know some Internet terminology when working with your
 local network specialist or Internet service provider to make your PC a
 host on the Internet. The two common modes of Internet access are through a
 direct network connection or through a serial connection to a SLIP or PPP
 server.

 A direct network connection involves installing a network interface card
 (NIC) in your PC. Most likely this will be an ethernet card. This card
 in turn is connected to your organization's local area network. Wiring
 usually consists of coaxial cable (as in thin-wire ethernet) or twisted
 pair telephone wiring (as in 10Base-T ethernet). The local network in
 turn must be connected to the Internet, and it must be capable of handling
 TCP/IP data packets.

 TCP/IP (Transmission Control Protocol/Internet Protocol) is the method by
 which data on the Internet is divided into packets of bytes. Each packet
 is delimited with header information that includes the destination address
 where the packet is to be routed when it is transmitted over the Internet.
 The local network and your PC may also be using other network protocols
 simultaneously with TCP/IP. For instance, your PC may already be connected
 to a network using Novell, LANtastic, or Windows for Workgroups network
 protocols.

 ***************
 SOFTWARE LAYERS
 Several layers of software are involved in implementing a direct network
 connection. A commonly used method is to first install a piece of software
 called a packet driver that deals directly with the network interface
 card. This is loaded under DOS from the AUTOEXEC.BAT file as a TSR
 (terminate and stay resident) program.  A packet driver should be included
 with the software that comes with the card. If the manufacturer of the card
 does not supply a packet driver, free packet drivers are available in the
 Crynwr Packet Driver Collection as described at the end of this document.

 The next layer of software is the TCP/IP driver, which can be implemented
 in a variety of ways. Until recently, this was often another DOS TSR
 program loaded from the AUTOEXEC.BAT file.  Increasingly this layer of
 software is implemented as a Windows dynamic link library (DLL) or virtual
 device driver (VxD). The DLL and VxD implementations do not require any
 modification of the boot files on the PC.

 The TCP/IP driver that implements TCP/IP functionality for the system is
 referred to as the TCP/IP protocol stack. The driver may be written to work
 with a specific network card, or it may be written to interface with a
 packet driver. In the latter case, a single TCP/IP driver can be used with
 any network card for which an associated packet driver is available. Thus,
 the packet driver specification eliminates the need for software vendors
 to customize their TCP/IP protocol stack for every network card with which
 it is used. When using a packet driver with Windows applications, another
 DOS TSR referred to as a virtual packet driver may be required to
 interface between the Windows-based TCP/IP protocol stack and the
 DOS-based packet driver.

 When a direct network connection is not available, Internet TCP/IP software
 can be used over serial lines to connect to a SLIP (Serial Line Internet
 Protocol) or PPP (Point to Point Protocol) server that provides a
 connection to the Internet. SLIP and PPP do not require the software
 drivers that are necessary with a direct network connection. The Trumpet
 Winsock shareware package to be described later has all SLIP and PPP
 functions included in the TCP/IP driver, which is configured through a
 Windows dialog box.

 SLIP and PPP are less transparent to the user than a direct network
 connection. The user first obtains an account on a SLIP or PPP server.
 Connecting to the Internet involves dialing the server using normal
 serial communications software and establishing a SLIP or PPP session.
 Once the session is established, TCP/IP software running on the PC can be
 used just as if the PC was connected directly to the Internet through a
 network card. SLIP and PPP users are well advised to settle for nothing
 less than transmission at 14,400 bits per second. World Wide Web
 especially transmits a great deal of data when images or sound are
 involved. Slow modems and slow connections will discourage anyone but the
 most dedicated user from exploring the possibilities of the Internet.

 TCP/IP client applications work at the top of the layers of software so
 far described. Client software runs independently of the type of connection
 to the Internet. TCP/IP applications frequently are referred to as clients
 because they access a corresponding server (a daemon in UNIX terminology)
 on another machine. An FTP client, for instance, is the application on the
 user's machine that accesses the FTP server running on a host computer
 located elsewhere on the Internet.

 Until recently, each TCP/IP client had to be written to interface with a
 particular vendor's TCP/IP protocol stack. Clients that worked with one
 vendor's TCP/IP driver would not work with a driver from another vendor.
 This restriction was eliminated with the development of the Windows
 Sockets Application Programming Interface, otherwise known as the Winsock
 API, or more simply Winsock. Winsock works in the layer between the
 TCP/IP client and the TCP/IP protocol stack.-----------------
 
 -------
 WINSOCK

 "Winsock" is the buzzword that dominates discussion about TCP/IPand Windows.
 All of the software to be described here is based on Winsock. The
 implementation of Winsock is transparent to the user, but it is helpful
 for the end-user to know how it supports Windows applications.

 Winsock (short for Windows sockets) is a technical specification that
 defines a standard interface between a Windows TCP/IP client application
 (such as an FTP client or a Gopher client) and the underlying TCP/IP
 protocol stack. The nomenclature is based on the Sockets applications
 programming interface model used in Berkeley UNIX for communications
 between programs.

 When you launch a Winsock compliant client like WSGopher, it calls
 procedures from the WINSOCK.DLL dynamic link library. These procedures in
 turn invoke procedures in the drivers supplied with the TCP/IP protocol
 stack. As described earlier, the TCP/IP driver communicates with the
 computer's ethernet card through the packet driver.

 The WINSOCK.DLL file is not a generic file that can be used on any system.
 Each vendor of a TCP/IP protocol stack supplies a proprietary WINSOCK.DLL
 that works only with that vendor's TCP/IP stack.

 The advantage of Winsock to the developer of a client is that the
 application will work with any vendor's Winsock implementation.  Thus, the
 developer of an application such as a Gopher client has to understand the
 Winsock interface, but he does not have to know the details of each
 vendor's TCP/IP protocol stack in order to make his client application
 compatible with that stack. Winsock also eliminates the need for an
 application developer to include a custom TCP/IP protocol stack within the
 application program itself. This was a common means of implementing TCP/IP
 clients under DOS, and some early Windows TCP/IP clients also used this
 method. The use of protocol stacks internal to the client results in
 conflicts when two clients try to access the single packet driver that is
 communicating with the network card. The ability to create applications
 compatible with any vendor's Winsock compliant protocol stack resulted
 in a blossoming of Winsock compliant shareware applications beginning in
 Summer 1993.

 The Winsock standard also offers advantages to the end-user. One advantage
 is that several Winsock applications from different vendors can be used
 simultaneously. This is a marked improvement over earlier packet driver
 applications in which each application contained a built-in TCP/IP stack.
 Such applications cannot share the packet driver except through the added
 complexity of a packet multiplexer such as PKTMUX. A second advantage to
 the user is that any Winsock compliant application will run with any
 vendor's TCP/IP protocol stack and accompanying WINSOCK.DLL.

 Unfortunately, some commercial vendors of TCP/IP clients are not yet
 taking advantage of Winsock capabilities. There are still TCP/IP clients
 that require dedicated access to the packet driver, and there are clients
 that will run only with the TCP/IP protocol stack supplied by one
 particular vendor. Fortunately, the trend is for all commercial vendors
 to make their applications more usable and portable through the use of the
 Winsock standard.

 ---------------------
 SOFTWARE DESCRIPTIONS

 Once the required networking hardware is installed and an IP address is
 assigned, or once an account is obtained on a SLIP or PPP server, the user
 needs to install a TCP/IP protocol stack and a selection of TCP/IP clients.
 The remainder of this paper describes such software.

 For each application, I briefly outline the installation procedures. I do
 this primarily to illustrate the simplicity of using Windows for Internet
 access. Please be sure to read any text files included with each package
 in order to complete the configuration and to learn about all functions
 of the software.

 I have installed all the software described here for many of my colleagues
 in the Virginia Tech Libraries. With some practice I have found that I can
 install a complete suite of TCP/IP applications in about half an hour.
 Some individuals who read the previous versions of this document were up
 and running in less than an hour after obtaining the software. They
 expressed their delight at the ease of networking with Windows.

 **********************************
 DISCLAIMERS AND LIMITED WARRANTIES

 I am not an expert on anything. I am just an enthusiastic end-user of these
 products in my daily work. I have used all of the client software with a
 direct connection to an ethernet network using a Western Digital or SMC
 ethernet card with the Trumpet Winsock shareware TCP/IP protocol stack
 and WINSOCK.DLL.  In addition, I have used most of the clients with FTP
 Software's commercial package PC/TCP version 2.2. In the latter case I
 obtained the most recent version of FTP Software's WINSOCK.DLL file by
 anonymous FTP from ftp.ftp.com in directory /support/ftpsoft/winsock under
 the name winsock.exe (a self-extracting ZIP file)(November 16, 1994
 | 46,375 bytes). The Trumpet and FTP products both use a packet driver
 interface to the network card. I have also used most of the clients on a
 Windows for Workgroups network using Microsoft's add-on TCP/IP package.
 This package is available by anonymous FTP from ftp.microsoft.com in the
 directory /peropsys/windows/public/tcpip under the filename WFWT32.EXE
 (November 29, 1994 | 680,621 bytes), a self-extracting archive file.
 I also have used most of the client software through a SLIP server using
 the Trumpet Winsock. Both a dialup connection to the SLIP server and a
 modemless connection through an IBM/ROLM digital switch were used at
 various times.

 I have no experience with PPP connections.

 As discussed above, the client software described here should run with any
 TCP/IP protocol stack that offers Winsock support. If your PC is already
 using a network operating system that does not include Winsock support,
 you should check with your vendor to find out if Winsock support is
 available. If Winsock support is not available from your vendor, then it
 may be possible to install the Trumpet Winsock TCP/IP protocol stack over
 your existing network drivers using a small program known as a packet
 driver shim. Instructions for this configuration are included in the
 Trumpet Winsock documentation.

 In the following descriptions, information about version numbers, file
 sizes, and dates was verified on December 20, 1994.


 ***************
 TRUMPET WINSOCK  (TCP/IP protocol stack and basic clients, )
                  (including telnet, ping, and Archie       )

 Comment:  You need this package (or some other TCP/IP protocol stack that
 supports Winsock) before you can use any of the client software described
 later. Trumpet Winsock does not require any additional network software.
 Its TCP/IP functions can be installed over other network software such as
 Novell or Windows for Workgroups using a packet driver shim. Instructions
 for such installations are included in the ZIP file.

 Author:     Peter Tattam, Trumpet Software International
 Fee:        $25 shareware fee.
 Version:    2.0 Revision B
 File name:  twsk20b.zip    (November 3, 1994 | 179,015 bytes)
             (includes the TCP/IP protocol stack)
             winapps2.zip   (November 29, 1994 | 162,023 bytes)
             (includes basic clients)

 Available by anonymous FTP from:
 ftp.trumpet.com.au in directory /ftp/pub/winsock
 or by Gopher from
 gopher.trumpet.com.au under menu item winsock.

 The Australian hosts can be slow. An alternative gopher site is
 biochemistry.bioc.cwru.edu under the menu item CWRU Biochemistry FTP
 Archive/trumpwsk. You can also FTP to this address and access the
 directory /gopher/pub/trumpwsk.  However, only one anonymous FTP user is
 permitted weekdays during normal working hours from 9:00 AM to 5:00 PM
 local time. Note that this site may not contain the latest version of the
 files. For example, at this writing it did not contain the most recent
 winapps2.zip file.

 Installation:

   1.) Create directory C:\TRUMPWSK and unzip TWSK20B.ZIP and
       WINAPPS2.ZIP into this directory.

   2.) Install software drivers.

       Ethernet network:

       a.) Install packet driver for your ethernet card.
           The entry in my AUTOEXEC.BAT file is:
           C:\ETHERNET\8003PKDR.EXE /B:240 /R:D000 /I:10 /E:61
       b.) Install WINPKT.COM virtual packet driver included in
           TWSK20B.ZIP. The entry in my AUTOEXEC.BAT file is:
           C:\TRUMPWSK\WINPKT.COM 0x61

       SLIP or PPP:

       No special drivers are needed because SLIP and PPP support
       are built into the Trumpet Winsock TCPMAN.EXE program.

   3.) In Program Manager, create a program group named Network.
       Use File Manager to drag and drop the EXE files in
       C:\TRUMPWSK into the Network program group.

   4.) Edit the PATH statement in AUTOEXEC.BAT to include
       C:\TRUMPWSK. This enables Winsock applications to find
       WINSOCK.DLL when they are launched.

   5.) Reboot the computer and start Windows.

   6.) Launch TCPMAN from the Network program group.
       Select Setup on the menu bar. Enter your IP address,
       gateway address, and nameserver address as assigned by
       your local network administrator. (Some SLIP and PPP
       servers, as well as some direct network connections, do
       not use permanent IP addresses. Instead, the server
       assigns a temporary IP address at the start of each
       session. If the server provides a bootp service, then
       enter the text "bootp" (without the quotes) in place of
       the IP address. On some servers it may be necessary to
       enter the dummy IP address 0.0.0.0. Some servers report
       the assigned IP address during session startup, requiring
       the user to manually enter the assigned address in the
       Setup dialog box before proceeding into SLIP mode.) If you
       are using ethernet, enter the software interrupt used by
       the packet driver. If you are using SLIP or PPP, check the
       appropriate box and enter the appropriate COM port number
       in the SLIP port box. Exit from TCPMAN. The file
       TRUMPWSK.INI will be created in the C:\TRUMPWSK directory.

   7.) Launch any Winsock compliant application. TCPMAN.EXE will
       start automatically if it is not already running. (If you
       are using SLIP or PPP, you must first connect to the
       server and start a session. This can be done with the
       dialing function in TCPMAN.) Several clients are included
       with the Trumpet Winsock, including TRMPTEL.EXE version
       0.07 for telnet, WINARCH.EXE for searching Archie
       databases, and PINGW.EXE to ping another machine on the
       network. PINGW provides the simplest means of verifying
       that you have a network connection. Launch PINGW and enter
       the name of an Internet host at the prompt. For example,
       you might try to PING ftp.trumpet.com.au. If your
       connection is working, and if the host is operating, you
       will receive a response from the remote host.

 Note:  The WINSOCK.DLL file for the Trumpet Winsock remains in the
 C:\TRUMPWSK directory. Some vendors may require that their WINSOCK.DLL be
 copied to the C:\WINDOWS directory. If you have used Winsock software
 from another vendor, but now want to try the Trumpet Winsock, be sure to
 remove the other vendor's WINSOCK.DLL so that it will not interfere with
 the Trumpet Winsock implementation.

 Tip:  The WINARCH client for Archie searching that is supplied in
 WINAPPS2.ZIP defaults to searching the Archie server at archie.au. You can
 access a different Archie server by using a command line argument. For
 instance, to use the Archie server run by AT&T, use the command line
 winarch.exe -archie=ds.internic.net.

 SLIP or PPP usage:  Trumpet Winsock includes a simple dialing function.
 You can connect to your server by manually issuing the dialing commands.
 You can also write a script that will dial and start your session
 automatically.

 PITFALL:  After dialing with TCPMAN.EXE and establishing the SLIP or PPP
 session, you must press the <ESC> key to escape from dialing mode and to
 re-enable the TCP/IP mode in TCPMAN.EXE.

 You may want to dial your server automatically without writing a custom
 dialing script for TCPMAN.EXE. A utility named DIALER can be set up to
 automatically issue the commands and passwords needed to start a session
 on your server. DIALER version 2.0A is available by anonymous FTP from:

      ftp.demon.co.uk
      /pub/ibmpc/windows/utilities/dialexe.zip
      (May 27, 1994 | 31,072 bytes)


 *******
 WSGOPHER (Gopher client)

 Comment:  A fast client with a useful system for saving bookmarks
 in a subject classified arrangement and a good help system.

 Author:     Dave Brooks
 License:    Free
 Version:    1.2
 File name:  wsg-12.exe  (December 13, 1994 | 367,860 bytes)
 Available by anonymous FTP from:
    dewey.tis.inel.gov in directory /pub/wsgopher

 Installation:

   1.) Create the directory C:\WSGOPHER and copy the file
       WSG-12.EXE to this directory. This file is a self-
       extracting ZIP file.
   2.) Execute WSG-12.EXE. The files will be extracted to the
       directory.
   3.) Create a new program item in the Network program group for
       the program C:\WSGOPHER\WSGOPHER.EXE.
   4.) Launch WSGopher and read the Help file.
   5.) Select the Configuration menu and set the various
       parameters and options as desired. The WSGOPHER.INI file
       and bookmark files are kept in the C:\WSGOPHER directory.

 *******************
 TRUMPET FOR WINDOWS  (Internet news reader and POP mail client)

 Comment:  To read Internet news, you need access to an NNTP(Network News
 Transfer Protocol) server. To use the mail functions, you need an account
 on a POP (Post Office Protocol) mail server. (I have not tested the mail
 functions in this application because I prefer to use PC Eudora for mail.)

 Author:     Peter Tattam, Trumpet Software International
 Fee:        $40.00 shareware fee. TSI has extended the free
             trial period until the final release of version
             1.0B, which is in beta testing at this time.
 Version:    1.0 Revision A
 File name:  wtwsk10a.zip   (August 28, 1993 | 167,601 bytes)

 Available by anonymous FTP from:
 ftp.trumpet.com.au in directory /ftp/pub/wintrump
 or by Gopher from gopher.trumpet.com.au under menu item wintrump.

 Installation:
   1.) Create the directory C:\WINTRUMP and unzip WTWSK10A.ZIP
       into this directory.
   2.) Create a new program item in the Network program group for
       the program C:\WINTRUMP\WT_WSK.EXE.
   3.) Launch the program.
   4.) Supply the address and other information in the dialog
       boxes for the menu selections File Setup and File Network
       Setup. NEWS.PRM and other configuration files will be
       created and stored in C:\WINTRUMP.

 PITFALL:  The list of available news groups on your news server is stored
 by Trumpet in the file NEWS.GRP. At times, Trumpet fails to fully update
 this file as new groups become available from the news server. You can
 force Trumpet to create a new and complete list of available groups by
 erasing NEWS.GRP before starting Trumpet.


 ******************
 EUDORA FOR WINDOWS (full featured mail client)

 Comment:  You will need an account on a POP mail server to send and receive
 mail at your PC. QUALCOMM sells a commercial version of Eudora for both
 Windows and the Macintosh.

 Author:     Jeff Beckley, Jeff Gehlhaar, and Mark Erikson,
             QUALCOMM, Inc.
 License:    Shareware version is free. The author, Jeff Beckley,
             requests that you send him a postcard at QUALCOMM,
             Inc., 6455 Lusk Blvd., San Diego, CA  92121-2779 USA
             if you find the program useful. Information about
             the commercial version is available through
             QUALCOMM's QUEST group World Wide Web page at
             http://www.qualcomm.com/quest/QuestMain.html or from
             QUALCOMM's FTP server at ftp.qualcomm.com in
             directory /quest/eudora/windows. Questions about
             Eudora can be sent by e-mail to
             eudora-sales@qualcomm.com
 Version:    Shareware: 1.4.4
 File name:  eudor144.exe   (December 7, 1994 | 292,942 bytes)
             (self extracting archive file)

 Available by anonymous FTP from:
 ftp.qualcomm.com in directory /quest/windows/eudora/1.4

 Installation:
   1.) Copy the file EUDOR144.EXE to the directory C:\EUDORA.
   2.) Execute EUDOR144.EXE to unarchive the program files.
   3.) Create a new program item in the Network program group for
       the program C:\EUDORA\WEUDORA.EXE.
   4.) Launch the program.
   5.) Select Special Configuration from the menu bar and supply
       the required information.
   6.) Select Special Switches and set characteristics as
       desired.
   7.) Create mailboxes and nicknames to taste.
   8.) The file EUDORA.INI and other configuration files will be
       created in the C:\EDUORA directory.

 *******
 WS_FTP    (FTP client)
 WS_PING   (ping client)

 Author:     John Junod

 License:    Free to individuals for any non-commercial use and
             for any U. S. Government Organization. Others should
             contact Ipswitch, Inc., 669 Main Street, Wakefield,
             MA, 01880, (617)246-1150, info@ipswitch.com.

 Version:    94.10.18  (WS_FTP)
             94.10.20  (WS_PING)

 File names: ws_ftp.zip     (October 20, 1994 | 113,252 bytes)
             ws_ping.zip    (October 21, 1994 |  60,496 bytes)

 Available by anonymous FTP from:
   ftp.usma.edu in directory /pub/msdos/winsock.files

 Installation:
   1.) Create the directory C:\WS_.
   2.) Unzip WS_FTP.ZIP into this directory.
   3.) Unzip the file WS_PING.EXE from its ZIP file into this
       directory also. (Full source code for WS_PING is included
       in the ZIP file with the name WSPI_SRC.ZIP. Source code
       for the current version of WS_FTP is not distributed.
       However, source code for the 93-12-05 version of WS_FTP
       can be downloaded from directory /pub/msdos/winsock.files
       under the name ws_ftp_s.zip.)
   4.) Create new program items in the Network program group for
       the programs C:\WS_\WS_FTP.EXE and C:\WS_\WS_PING.EXE.
   5.) Launch the programs.
   6.) The WS_FTP.INI file remains in the C:\WS_ directory. A
       file named WINSOCK.INI is created by WS_PING in the
       C:\WINDOWS directory.


 *****
 CELLO  (World Wide Web browser)

 Comment:  Despite its age, Cello version 1.01a performs well. It continues
 to be more stable than Mosaic, and it is the best client for printing.
 It includes a useful Help system.  Configuration is done from within the
 application, not by directly editing the CELLO.INI file. Unfortunately,
 Cello does not understand forms. Users of Diamond Stealth video cards
 report problems with the mouse cursor, which virtually disappears while
 the mouse is moving. The listserv CELLO-L is busy with messages about
 CELLO development and about shareware for creating HTML documents for use
 on Web servers. Instructions for subscribing to CELLO-L are included in
 the Cello Help file. Version 2.0 is now in the hands of alpha testers.

 Author:     Thomas R. Bruce
 License:    Free
 Version:    1.01a
 File name:  cello.zip      (March 17, 1994 | 328,429 bytes)
 Available by anonymous FTP from:
   ftp.law.cornell.edu in directory /pub/LII/Cello

 Installation:
   1.) Create the directory C:\CELLO and unzip CELLO.ZIP into
       this directory.
   2.) Create a new program item in the Network program group for
       the program C:\CELLO\CELLO.EXE.
   3.) Launch the program.


 ***********
 NCSA MOSAIC for Microsoft Windows  (World Wide Web browser)

 Comment:  Users should note the alpha version designation and use caution
 about saving work in any other running applications before launching
 Mosaic. As in previous versions over the past year, simply launching and
 then exiting from Mosaic permanently reduces by some 3 percentage points
 the Windows user.exe resources on my machine. Launching Mosaic and exiting
 several times can lead to conditions that require you to restart Windows.
 However, Mosaic's previous problem of overwriting text when displaying
 large files seems to be fixed in this version.

 Mosaic is a 32-bit application that will run under Windows NT, Microsoft's
 advanced workstation operating system. Most users will be using Windows 3.1
 or Windows for Workgroups, which are 16-bit applications. To use Mosaic
 with these systems, you must first install Win32s version 1.20 with OLE or
 later. This addition to the Windows operating system enables current
 versions of Windows to run 32-bit code that is not Windows NT specific.

 NCSA recommends a 33MHz 486 with 8MB of RAM for running this version.

 Authors:    NCSA (National Center for SuperComputing
             Applications)
 License:    Free
 Version:    2.0.0a8
 File name:  mos20a8.exe (December 20, 1994 |   955,546 bytes)
             w32sole.exe (December 20, 1994 | 2,240,650 bytes)

 Available by anonymous FTP from:
 ftp.ncsa.uiuc.edu in directory /Web/Mosaic/Windows

 Installation:
   1.) Copy W32SOLE.EXE to a temporary directory and execute the
       program. This will extract the two component files
       INSTALL.BAT and WIN32DSK.EXE. The latter is another self
       extracting archive file.
   2.) Execute INSTALL.BAT.
       (This batch file issues the command
       WIN32DSK.EXE -d
       to extract the component files into the subdirectories
       DISK1, DISK2, and DISK3. These subdirectories will be
       created below the temporary directory containing
       INSTALL.BAT.)
   3.) Change to the DISK1 subdirectory and execute SETUP.EXE.
       This will install Win32s version 1.20 with OLE. Many of
       the files will be installed in the directory
       C:\WINDOWS\SYSTEM\WIN32S. If you have an older version of
       WIN32S already installed, it will be removed. You should
       allow installation of the game FreeCell in order to test
       that Win32s is properly installed on your machine. Once
       this is verified, you can erase the files and directories
       in the temporary installation directory.
   4.) Copy MOS20A8.EXE to the temporary installation directory.
       Remember to erase any files and subdirectories left in the
       temporary directory from the installation of Win32s.
   5.) Execute MOS20A8.EXE to extract the component files,
       including SETUP.EXE.
   6.) Execute SETUP.EXE to install Mosaic version 2.0 alpha 8 in
       the directory of your choice. MOSAIC.INI will be copied to
       the C:\WINDOWS directory.
   7.) Launch the program. Read the files README.WRI and
       RELNOTES.HTM to learn how to fully configure Mosaic to
       your needs.
   8.) When installation is complete, you can remove the
       temporary installation directory.

 NOTE: You can avoid the added complexity of installing Win32s and
 the substantial demands it places on your PC by using the older
 Mosaic version 2.0 alpha 2 (June 27, 1994 | 243,749 bytes).


 ********
 NETSCAPE  (World Wide Web browser)

 Comment:  Netscape Navigator is generating enormous interest at this
 writing as the logical successor to Mosaic. FTP sites designated as
 sources for Netscape frequently are inaccessible.

 Author:     Netscape Communications Corporation
 License:    Free for academic or not-for-profit use. Others,
             including government users, should contact Netscape
             Communications Corporation.
 Version:    1.0N
 File name:  ns16-100.exe   (December 17, 1994 | 706,929 bytes)

 Available by anonymous FTP from:
 ftp.mcom.com in directory /netscape/windows or
 ftp2.mcom.com in directory /netscape/windows.
 Frequently it is impossible to connect by anonymous FTP to
 servers distributing Netscape. The best mode of access is to
 use a World Wide Web browser and load the URL
 http://home.mcom.com/info/how-to-get-it.html.

 Installation:
   1.) Copy the file NW16-100.EXE to a temporary directory and
       run it. This will extract the component files, including
       SETUP.EXE.
   2.) Run the program SETUP.EXE by selecting the file in File
       Manager or by using the menu selection File Run in Program
       Manager. SETUP will install Netscape in a directory of
       your choice, and it will create a program icon in the
       group you designate.
   3.) Launch the program. Configure Options and Preferences to
       taste. The file NETSCAPE.INI is kept in the Netscape
       program directory.


 ******
 WINWEB  (World Wide Web browser)
 Comment:    A fast and easy browser from EINet.
 Author:     MCC-EINet (Microelectronics and Computer Technology
             Corporation)
 License:    Free
 Version:    1.0 Alpha 2.2
 File name:  winweb.zip     (December 19, 1994 |  598,873 bytes)

 Available by anonymous FTP from:
 ftp.einet.net in directory /einet/pc

 Installation:
   1.) Create the directory C:\WINWEB and unzip WINWEB.ZIP into
       this directory.
   2.) Move the included file VBRUN300.DLL to the windows system
       directory, usually C:\WINDOWS\SYSTEM. (This file is a
       runtime library for Microsoft Visual Basic. If you already
       have a copy installed from some other application, you can
       simply delete it from the \WINWEB directory.
   2.) Create a new program item in the Network program group for
       the program C:\WINWEB\WINWEB.EXE.
   3.) Launch the program and configure to taste. The file
       WINWEB.INI will be created in the C:\WINDOWS directory.

 *****
 WFTPD  (FTP server)

 Comment:  I had not imagined I would want or need to use my PC as an FTP
 server. However, I have found this product useful on a couple of occasions
 to transfer files from an IBM mainframe to my PC. This is far easier than
 trying to FTP to the mainframe from my PC. Note that WinQVT/Net, which is
 described later, has an FTP server function also. However, the server in
 WinQVT/Net would not work when I tried to use Fetch on my PowerMac to
 retrieve a file from my Windows machine. WFTPD had no problems serving
 files to Fetch.

 Author:     Alun Jones
 License:    $15.00. The unregistered shareware version displays
             a message to anyone accessing the server that the
             owner is unable or unwilling to pay the shareware
             fee. The shareware version is limited to five file
             transfers per session.
 Version:    1.95
 File name:  wftpd195.zip   (October 20, 1994 | 147,612 bytes)

 Available by anonymous FTP from:
 ftp.cica.indiana.edu in /pub/pc/win3/winsock
 or by gopher from:
 ftp.cica.indiana.edu under menu item PC and CICA Windows Files/
 CICA Windows Files/Winsock Compliant Apps

 Installation:
   1.) Create the directory C:\WFTPD and unzip WFTPD195.ZIP into
       this directory.
   2.) Create a new program item in the Network program group for
       the program C:\WFTPD\WFTPD.EXE.
   3.) Launch the program.
   4.) Complete the information in the Security dialog box to
       establish security control using access passwords and
       restricted home directories for those you authorize to
       access your PC. The file WFTPD.INI will be created in the
       C:\WINDOWS directory.

 ------
 TELNET

 The glaring deficiency in the Winsock pantheon of Internet clients is the
 absence of a good stand-alone telnet client. Here is a brief description
 of some alternatives I have tried.

 **********
 WinQVT/Net

 Comment:  WinQVT/Net is an integrated package that includes telnet, FTP,
 FTP server, mail, and news reader functions. These separate client and
 server functions are normally launched from a console window. The telnet
 client is probably the best shareware Winsock telnet client available.
 You can select terminal emulations and customize the keyboard. The
 resizable telnet window includes scrollback and session logging. A
 deficiency is that telnet cannot be launched independently of the console
 window. However, if WinQVT/Net is already running, then an instance of the
 telnet client can be launched from another application by invoking the
 TNSTART.EXE program that comes with WinQVT/Net. This makes it possible to
 use this telnet client as the telnet viewer or helper with Gopher or
 World wide Web clients.

 Author:     QPC Software
 License:    Shareware registration is $40 ($20 for students).
             There has been discussion in alt.winsock and other
             news groups about the difficulty of getting any
             response to e-mail and fax messages from the author
             of WinQVT/Net. Paying the license fee may be
             difficult as a result.
 Version:    3.98
 File name:  qvtws398.zip   (December 16, 1994 | 390,960 bytes)

 Available by anonymous FTP from:
 biochemistry.bioc.cwru.edu in directory /gopher/pub/qvtnet
 or by Gopher from
 biochemistry.cwru.edu under the menu selection
 CWRU Biochemistry FTP Archive/qvtnet.
 Gopher access is preferable as only one anonymous user is
 permitted weekdays during normal working hours from 9:00 AM to
 5:00 PM local time.


 **************
 TRUMPET TELNET

 Comment:  This simple client is my favorite for use as a telnet viewer or
 helper with Gopher or World Wide Web clients.  Unfortunately, it lacks
 sophisticated features needed by heavy users of telnet.

 Author:     Peter Tattam
 License:    Free beta version
 Version:    0.07
 File name:  trmptel.exe    (October 13, 1994 | 71,168 bytes)

 This file is included in the WINAPPS2.ZIP file distributed as part of the
 Trumpet Winsock package.

 ****
 EWAN

 Comment:  EWAN (Emulator Without a Good Name) is a more complete Winsock
 telnet client than Trumpet Telnet. It allows printing the screen, printing
 the scrollback buffer, and logging a session to a file. It can be used as
 a telnet viewer with Gopher or World Wide Web clients.

 Author:     Peter Zander
 License:    Free
 Version:    1.04
 File name:  ewan104.zip    (November 23, 1994 | 221,051 bytes)

 Available by anonymous FTP from:
    ftp.lysator.liu.se in directory /pub/msdos/windows

 *******
 QWS3270

 Comment:  Telnet clients usually emulate a VT100 terminal or one of its
 variations, the standard for connecting to a UNIX host.  However,
 telneting to an IBM mainframe requires emulation of an IBM 3270 terminal.
 QWS3270 provides this functionality. I was especially pleased with the
 easily-configured, four-color capability that makes it easier to
 distinguish protected, unprotected, and highlighted text on a VM screen.

 Author:     Jim Rymerson
 License:    Free
 Version:    3.2e
 File name:  qws3270.zip    (November 14, 1994 | 73,365 bytes)

 Available by anonymous FTP from:
 ftp.ccs.queensu.ca in directory /pub/msdos/tcpip


 -------------------------------------
 OTHER SOURCES FOR WINSOCK INFORMATION

 It remains true that the best guide to the Internet is the Internet itself.
 The best software for navigating the Internet is freely available on the
 Internet.

 Considerable information about the Winsock API, along with some application
 programs, is available by anonymous FTP at sunsite.unc.edu in directory
 /pub/micro/pc-stuff/ms-windows/winsock.

 The anonymous FTP sites that I list throughout this paper as sources for
 programs are the sites designated by the software authors as their home
 sites. These sites will always have the latest version of the software.

 In addition, copies of the software may usually be obtained by anonymous
 FTP from CICA (Center for Innovative Computer Applications) at
 ftp.cica.indiana.edu in directory /pub/pc/win3/winsock. Files are also
 available from this same address using a Gopher client. Gopher access is
 preferable because the CICA FTP server is the main Internet site for
 Windows applications. It is usually busy, and you may have difficulty
 establishing an FTP connection.

 It is the case that the collection at CICA will NOT always contain the
 latest version of software, even if a newer version has been uploaded to
 CICA by the author. CICA does not allow anonymous users to view or
 download program files from the uploads directory, where the newest
 version might still be in the holding pattern. Also, the versions at
 CICA may not have the same file dates as those at the home sites.

 There is a listserv that provides a daily listing of new uploads to CICA.
 Included in the mailing are the content of any text files accompanying
 those uploads and a list of files that have been moved from the uploads
 directory to the public directories so as to be available for downloading.
 You can subscribe to CICA-L by sending e-mail with no subject and the
 message sub CICA-L Your Name to listserv@ubvm.cc.buffalo.edu.

 There are several other Internet sites that provide mirror copies of the
 Windows collection at CICA. These are listed in the message displayed if
 you are denied access to CICA. The list of mirror sites also is included
 in the file README in CICA's directory /pub/pc/win3. These mirrors can be
 just as busy as CICA. As an example, the mirror at polecat.law.indiana.edu
 was recently removed due to overload on the server.

 When using CICA, it is helpful to download the file INDEX (ascii, about
 285,000 bytes) or INDEX.ZIP (about 122,000 bytes) from the directory
 /pub/pc/win3. INDEX contains one-line descriptions of each file in the
 collection.

 The news groups alt.winsock, and comp.protocols.tcp-ip.ibmpc carry
 discussions of the Winsock specification and Winsock compliant
 applications, as do the groups in the comp.os.ms-windows.networking
 hierarchy. Trumpet Winsock and related clients are discussed in several
 news groups in the trumpet hierarchy.

 Information about specific clients may be found in groups devoted to that
 class of client. For instance, WSGopher is discussed in alt.gopher and
 in comp.infosystems.gopher. Cello, Mosaic, Netscape, and WinWeb are
 discussed in the sections of the comp.infosystems.www hierarchy.

 The BITNET listserv WIN3-L@UICVM carries discussions about all topics
 relating to Windows, including Winsock applications. Some news servers
 carry this listserv under the news group name bit.listserv.win3-l.

 A comprehensive list of FTP'able Winsock applications is available from
 Larsen Consulting and Sales, Phoenix, Arizona, USA. To get a copy of the
 list, send an e-mail message to info@lcs.com with the Subject: FAQ.
 Nothing else should be in the message. The list is also available on the
 World Wide Web at http://www.lcs.com/.

 Frequently Asked Questions about TCP/IP on PC-compatible computers are
 answered in a FAQ written by Bernard D. Adoba. The text is posted monthly
 on the news group comp.protocols.tcp-ip.ibmpc. A copy of the newsgroup
 posting is available as three separate files from rtfm.mit.edu in the
 directory /pub/usenet-by-hierarchy/comp/protocols/tcp-ip/ibmpc.  The
 complete text of the files dated November 3, 1994 contains over 214,000
 bytes. The filenames are decidedly non-DOS, so you will want to assign
 filenames if you download from this source.  The FAQ is also available
 as a single ZIP file named ibmtcp.zip (79,454 bytes | October 29, 1994)
 from ftp.netcom.com in the directory /pub/mailcom/IBMTCP. Each of these
 sites can be troublesome. They frequently are busy or unresponsive to
 commands.

 Finally, the FAQ, and other publications about Internet software for the
 PC, can be accessed on the World Wide Web page maintained by Bernard Adoba.
 The page entitled "Internaut:  The PC-Internet Connection Update Page" is
 located at http://www.zilker.net/users/internaut/update.html.

 The Crynwr packet drivers collection is available by anonymous FTP in the
 well-known Simtel20 collection, as well as through a variety of other
 methods. The primary publicly available site for Simtel20 files is at
 oak.oakland.edu. The packet drivers are in directory SimTel/msdos/pktdrvr
 pktd11.zip       (November 23, 1993 | 435420 bytes)
 pktd11a.zip      (November 23, 1993 | 326152 bytes)
 pktd11b.zip      (November 23, 1993 | 344847 bytes)
 pktd11c.zip      (December 14, 1993 |  81834 bytes).


 An early version of this document (dated February 9, 1994) was published in
 the "Toolkit" section of the March 14, 1994 issue of "Global Network News."
 GNN is part of the "Global Network Navigator," a World Wide Web publication
 of O'Reilly Associates.  Articles in GNN are aimed at the reader with a
 general interest in the Internet and networked information. You can read
 GNN by pointing Mosaic or Cello at http://www.wimsey.com/gnn/gnn.html.

 The most recent plain text version of "Windows and TCP/IP for Internet
 access" is available by anonymous FTP from nebula.lib.vt.edu in the
 directory /pub/windows/winsock under the name wtcpip**.asc. For instance,
 this version has the name wtcpip06.asc. A more frequently revised hypertext
 version is available at http://learning.lib.vt.edu/wintcpip/wintcpip.html.


 ================================================================
 I thank each of you who sent me personal messages following the postings
 of earlier versions of this evolving document. I have now received e-mail
 about this document from individuals on seven continents. Thanks to AJO
 at McMurdo Station for sending me a message from Antarctica.

 I am grateful that I have been able to help many of you, and I appreciate
 the suggestions and information you have sent me. My efforts in producing
 this document can be only a small and indirect repayment of the debt I owe
 to the developers who produce this software and to the many Internet users
 who are so willing to share information and expertise.

 Please send error reports to me at hmkriz@vt.edu. I would be grateful for
 suggestions for improvements and additions to this document. Thanks again
 to everyone who replied to my beginner's questions over the past eighteen
 months. I greatly appreciate your patience, and your willingness to share
 your knowledge.

 --Harry
 =================================================================-----------------
 
            SAY WHAT?  LIBEL & DEFAMATION ON THE INTERNET

 By Eric Eden (r3eje@vm1.cc.uakron.edu)

 On the Internet, where abnormal behavior is the status quo, tempers
 can flare in the heat of debate and word wars can last for days or even
 weeks.  It's not uncommon for users to ridicule, harass or insult those
 who disagree with them.

 But if you damage someone's reputation by trying to embarrass them in
 a public forum, you could be sued for libel or defamation.  After all,
 there's no reason to assume that the messages you send through
 cyberspace are immune from lawsuits.

 "The Internet culture right now is for users to refute speech with
 speech," says Dave Marburger, the attorney who represented Brock
 Meeks in one of the first defamation lawsuits in the United States
 involving the Internet.  "But as the Internet culture gets more diverse,
 users will start refuting speech with lawsuits."

 There have only been a handful of libel and defamation lawsuits filed
 involving the Internet so far, but as the Net grows, the number of
 lawsuits will probably increase.   If the few court battles that have been
 decided involving libel and defamation on the Net are any indication of
 how the law will be applied to the Internet in the future, it's worth your
 time to learn what's libelous or defamatory on the Internet and what's
 not.

 Other users have the right to sue you for defamation if they can prove
 you damaged their reputation or good name with false information.
 You can be sued for libel if another user can prove you have distributed
 defamatory statements about them in a public area -- such as a news
 group or mailing list.

 In April of 1993 Gil Hardwick, an anthropologist in Australia, was
 ordered by the Australian Supreme Court to pay David Rindos $40,000
 in damages because he defamed Rindos on an international mailing list.

 After Rindos lost his job at the University of West Australia, Hardwick
 posted a message in a discussion group for anthropologists that suggested
 Rindos was fired because he was a bully and had sexually molested a
 local boy.

 Rindos filed a defamation lawsuit against Hardwick because he felt the
 message had hurt his chances of finding a new job.  In a letter to
 Rindos's attorney, Hardwick wrote "Let this matter be expedited and
 done with....I can do nothing to prevent it, lacking any resources
 whatsoever to defend myself."  Like most people, Hardwick didn't have
 the money to hire a lawyer or finance an expensive legal battle.

 "He (Rindos) suffered a great deal of personal hurt because of the
 message," said Supreme Court Justice David Ipp in the West
 Australian. "The damages award must compensate him and vindicate
 his reputation to the public."

 The Internet is an informal forum and people often write personal things
 about other users, but you can be held accountable in court for making
 libelous or defamatory remarks in public forums just like Hardwick was.

 "We know that as the Internet grows, there will be more and more
 lawsuits involving libel and defamation," says attorney David H.
 Donaldson, editor of Legal Bytes, an electronic magazine that
 discusses legal issues involving computers and networking.   "The only
 question is if the number of cases will grow steadily or if there will be
 an explosion of lawsuits all at once."

 Anybody can sue you for libel or defamation if they think you damaged
 their reputation, but if you can prove what you say is true, chances are
 that you won't end up in court.

 "Make it clear when you are stating your opinion," says  Donaldson,
 "Always state the facts that your opinions are based on just to be safe.
 You probably won't lose a libel or defamation lawsuit if you can back up
 what you write with solid facts."

 For example, Brock Meeks, a full-time journalist who also distributes his
 own electronic magazine, avoided losing a defamation lawsuit largely
 because he could prove an article that he sent over the Net was true.

 Meeks was sued by Suarez Corporation Industries in April of 1994 for
 writing an investigative story about the company and its services in his
 electronic newsletter -- the CyberWire Dispatch.  Meeks had no libel
 insurance, no publishing company backing him up and a lot of legal
 fees to cover.  (His lawyer charged him $200 an hour.)  The only thing
 Meeks had was his house -- and he didn't want to sell it to pay off a
 lawsuit.

 Meeks defended his article in numerous posts on the Net, "All of my
 facts were rock solid.  Although the article was delivered with a fair
 amount of attitude, I don't believe that I'm in dangerous waters," he
 wrote.

 Benjamin Suarez, owner of Suarez Corp., filed the suit because he felt
 that Meeks had damaged his reputation and hurt his business by
 saying he was "infamous for his questionable direct marketing scams,"
 and saying "he (Suarez) has a mean streak."  To back up his opinion,
 Meeks cited accusations made by the Washington state attorney
 general's office concerning Suarez's direct marketing practices.

 In August of 1994 Suarez Corp. made Meeks an offer he couldn't
 refuse.  They agreed to settle the case for $64 -- to cover
 administrative court costs.   The company refused to comment on why
 they agreed to settle the lawsuit.

 If the case had gone to trial, Meeks's lawyer thinks Meeks would have
 been able to win anyway.  "The defendants in libel or defamation suits
 involving the Internet have enhanced First Amendment rights," says
 Marburger.  "The plaintiff has to prove actual malice.  In other words,
 the plaintiff has to show that the defendant made false statements or
 was negligent."  Marburger's only regret is that they didn't get to set
 that precedent in court.

 Although the Meeks case doesn't really mean anything in the law
 books, it does show that if you're responsible and can prove what you
 write on the Net is true, people will be less likely to take you to court.
 If
 you just make something up and your sources aren't reliable, you could
 lose big like Hardwick did.

 "You have to follow the same rules that journalists do if your going to
 write and distribute controversial material about other people," says
 Donaldson.

 The increasingly common phenomenon of online forums creates the
 possibility for you to reach large audiences, but it also creates the
 ability for you to commit defamation or libel -- something that an
 ordinary citizen didn't have to worry about in the past.  before the
 growth of online communication, people who didn't work in the media
 usually didn't have to worry about libel or defamation. "Libel laws apply
 to the Internet the same way they do to newspapers and TV stations,"
 explains former Federal Communications Commissioner Nicholas
 Johnson, a professor at the Iowa University school of law. "The same
 technology that gives you the power to share your opinion with
 thousands of people also qualifies you to be a defendant in a lawsuit."

 Like a newspaper or TV station, you are responsible for making sure
 the material you distribute -- or broadcast -- over the Internet is not
 libelous or defamatory.  Lani Teshia-Miller never meant to defame
 anyone, but when she took over the distribution of a tattoo FAQ she
 almost ended up in court.  The rec.arts.bodyart FAQ she inherited
 contained a lot of generalizations based on contributions from
 unattributed sources.  Although she listed her name on the FAQ, she
 didn't edit out several defamatory statements.  One review of a San
 Francisco tattoo artist in the FAQ said, "He's getting old and having
 problems with his eyesight.  His quality is really bad and he hurts
 people."

 After the artist hired a lawyer and threatened to sue, Teshia- Miller
 changed the FAQ's wording to reflect a more factually-based and
 less-hysterical view.   The review now says, "His eyesight is not what it
 used to be."

 After the FAQ was changed and Teshia-Miller apologized, the artist
 dropped the lawsuit.  "It turned out to be a good experience for me,"
 said Teshia- Miller.  "I'm  a lot more careful about what I allow on the
 artist list, and I now have a very long disclaimer at the beginning of the
 FAQ."

 Every person you write something negative about won't sue you for
 defamation or libel, they might flame you or just try to set the record
 straight by replying to the message.  But if you post false information
 about another user and disgrace them in public, they have the right to
 take you to court -- and they could win a big settlement if they can
 prove you were negligent.

 Medphone, a Fortune 500 company that manufactures medical
 instruments, has filed a $200 million lawsuit against Prodigy user Peter
 DeNigis.  Medphone filed a "systematic program for defamation and
 trade disparagement" lawsuit against DeNigis after a stockholder
 reported that he was making several negative posts about Medphone a
 day on Prodigy's Money Talk Forum. DeNigis, a former Medphone
 stockholder, lost more than $9,000 last year by selling off his
 investment in the company. In one post DeNigis wrote, "My research
 indicated the company is really having a difficult time.  No case, no
 sales, no profits and terrible management. This company appears to be
 a fraud.  Probably will cease operations soon."

 Although the accusation that Medphone is a "fraud" is very serious --
 and potentially defamatory -- DeNigis might be able to win the lawsuit if
 he can prove what he wrote is true in court.

 "The Medphone case is a clear indication that libel and defamation is
 something for Internet users to think about," says Johnson.

 There are court cases in progress right now that will decide if access
 providers such as Prodigy, America Online and Compuserve are
 responsible for defamatory remarks broadcast over their services, but
 there is no legal ambiguity about whether individual users can be sued
 for making defamatory or libelous statements. Individual users are
 responsible for making sure the information they distribute is not
 libelous or defamatory.

 The Internet has made world wide, instantaneous communication easy.
 The average user now has the power to be heard by hundreds or even
 thousands of other users, but in terms of libel and defamation, the Net
 is not a new world of freedom. The reality is that libel and defamation
 laws are enforceable in the virtual world just like they are in the real
 world.

                          # # #

 You may distribute this article freely for non-profit purposes.  Otherwise
 contact the author (Eric Eden -- R3eje@vm1.cc.uakron.edu) for reprint
 permission.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

           JACKING IN FROM THE "BACK FROM THE DEAD" PORT

 By Brock N. Meeks (brock@well.sf.ca.us)
 CyberWire Dispatch Copyright (c) 1994

 Washington, DC -- Nothing chills -- or inflames -- the Net faster than
 when word of the dreaded "FCC Modem Tax" begins ooze through Cyberspace.

 Well... it's back.  Sort of.

 Ruth Milkman, legal advisor to Federal Communications Commission Chairman
 Reed Hundt, said during a recent question and answer session that the
 agency might again take up the issue of the so-called modem tax.

 "Some years down the road I can see access fees [for enhanced service
 providers] being considered by the FCC," Milkman said during a phone
 interview. "But only under the scenario when access charges are reformed."

 These access charges are a kind of trip wire phrase which online activists
 have dubbed a "modem tax" when applied to enhanced service providers,
 which is another catch phrase meaning services like America Online and
 CompuServe.

 Milkman said the FCC would only consider an access charge under a very
 narrow scenario which would play out only  if "enhanced service providers
 felt that by paying the access charges they weren't contributing to a
 subsidy scheme set up for (long distance phone companies)," Milkman said.

 So, what the hell is an "access charge"?  Take a deep breath. Here goes:

 Access charges are paid by long distance companies to local telephone
 companies. Every time a company such as AT&T connects a caller in Des
 Moines with Uncle Bert in New York, it has to pay Nynex, the local
 telephone company, a fee for the privilege of carrying that long distance
 call over their facilities, commonly known as the "local loop."

 Long distance companies pay up to 40% of their entire revenues to local
 telephone companies.  That's billions and billions of dollars each year
 that flow into the hands of the Baby Bells, just for completing the calls.

 The access fees are set at artificially high rates because they contain a
 mind numbing set of complex subsidies, the most obvious one is that which
 underwrites the public policy known as "Universal Service."

 Back in the days when the FCC only had rotary dial phones (circa 1987)
 someone came up with the brilliant idea that because modem use was
 increasing at such a rapid pace, that maybe services such as Sprintlink
 (then known as telenet) and CompuServe should have to pay these access
 charges, too.

 After all, the FCC wonks postured, they carry long distance (modem)
 traffic over the phone lines?  It would only be fair to have these
 "enhanced service providers" as they are known in FCC-speak, also help
 out the impoverished long distance phone companies underwrite Universal
 Service.

 Bingo.  The hue and cry that went up from the online community (it wasn't
 yet called "the Net") was enormous.  The major players -- Telenet and
 CompuServe -- quickly branded the plan as a "tax" and thus the phrase
 "modem tax" was born.

 Dire warnings went out:  If the FCC succeeded in making enhanced service
 providers chip in for access fees, it would increase the cost of each hour
 of online time by at least $6 per hour.

 And remember, this was in the days when a 2,400-bps modem was the hottest
 thing going.  Six bucks an hour would have demolished the struggling
 online industry.

 The fallout among the nascent online community was astounding. For the
 first time in history, the "net" community rose up with a single voice and
 FLOODED the FCC with protests.

 FCC official "filing kits" made the rounds, teaching people how to file
 official comments of protest.

 The ground swell of opposition worked.  The FCC was buried in responses.
 At the time, the FCC said it was the hottest item in its history, garnering
 more response than any issue in history.

 The FCC eventually backed off.  The reason:  It was persuaded that enhanced
 service providers were still entrepreneurial companies and couldn't afford
 the burden of access fees.

 The proposal was officially dropped.  It was the first major victory for
 the Net.  And it was empowering.  The online community became educated and
 enlightened almost over night to the ways of an arcane governmental agency.
 And this community was drunk with a heady kind of power:  It could
 sufficiently affect the outcome of governmental regulation.

 Small catch:  The damn "modem tax" issue wouldn't die.

 Someone with the brains of a trout began to circulate the now infamous
 "modem tax" file.  The file claims that Jim Eason, a San Francisco radio
 talk show host had aired a segment in which he claimed to have inside
 information that the FCC was about to relaunch its "modem tax" proposal.

 The message was and is a HOAX.

 But it also has never died.  It's the Net's first "urban myth" and like
 Freddie, it refuses to die, even to this day.

 Milkman, who was on-board at the FCC during the 1987 modem tax firefight,
 sighed when explaining the complex issue:  "Part of the problem is that
 nobody is exactly sure what all the subsidies are.  Most people agree that
 there are subsidies in the access charges, but you can't break out those
 subsidies exactly."

 Another factor in play:  Sometimes enhanced service providers are really
 just reselling long distance transport after having bought large blocks of
 time from a major carrier like AT&T.  Thus, to have these enhanced service
 providers also pay an access fee amounts to a kind of double-dipping,
 Milkman said.

 As it turns out, Congress might have as much to say about a future "modem
 tax" as the FCC.  This twisted scenario turns on the tenuous grasp that
 everyone from the Vice President to Commerce Department to the FCC has on
 exactly what constitutes "Universal Service," in the era of the Information
 Superhighway.

 Revamping the 60 year old Communications Act of 1934 will be up to Congress
 this year.  And they will likely do it.  But how universal service is
 defined remains a big mystery.  And who ends up paying for and maintaining
 that public policy (which isn't about to be abolished) also remains a
 mystery.

 Don't be surprised if, when the legislative smoke clears, not only do
 enhanced service providers -- America Online, CompuServe and Prodigy, et al
 -- have to pay access fees, but also your Internet provider and your cable
 company.

 And who do you think will end up catching those cost increases?? Right.
 Your wallet.

 But for now?  Rest easy, Milkman says:  "I want to make this very clear:
 There is NO docket [open] in which the Commission is proposing making
 enhanced service providers pay access charges.  And I don't anticipate it
 coming up."

 Meeks out...

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

       ANNOUNCING SLIPKNOT: Shareware dialup Web browser for Windows

 By Felix Kramer (felixk@panix.com)

 Dear Electronic Journalist

 How long will the World Wide Web be accessible to only a small fraction
 of dial-up users?

 I'm writing to tell you about a new and important application for Internet
 users that's was released last week, and that I think should be of
 interest to you (and perhaps to your readers.)

 In one sentence, it's a graphical Windows-based browser for the World
 Wide Web, for users with dial-up UNIX accounts -- but one that doesn't
 require SLIP, PPP or TCP/IP access. (You'll find a longer description
 below.)

 It's intended to expand and democratize access to the WWW to those with
 ordinary dial-up accounts -- at a time when TCP/IP access is available
 only to a small fraction of the online population.

 Until now, access to the hypermedia-based Web has been limited to those
 with SLIP, PPP or TCP/IP access, using Mosaic and similar browsers. That's
 only a small fraction of the online population--a few million at most,
 worldwide. Unless they were willing to go through considerable technical
 acrobatics, most people with dial-up UNIX accounts were locked out of the
 Web. Many of these people are accustomed to their UNIX tools for reading
 mail and news, and don't want to switch to SLIP even if their systems offer
 the option. (We may be talking about something over 20 million people
 worldwide, with service through their companies, schools, universities,
 or Internet Service providers.)

 In journalistic terms, there are several stories here:

 1) As discussed above, SlipKnot will expand the population of users who
 can use the Web.

 2) SlipKnot is pioneering in its distribution/sale policy. SlipKnot is
 restricted shareware in its first version from MicroMind, Inc. Until now,
 shareware has generally been distributed with a simple request for users to
 register; SlipKnot takes that one step further. It is restricted
 shareware.  That means it is free for evaluation but with strong
 incentives to frequent users to register. After a period of frequent
 reminders, the software eventually turns itself off for nonregistering
 users.

 3) Registration fees or on a sliding scale. For most, the cost is $29.95.
 But individuals outside Northern America, Europe and Japan will pay $20 to
 register. A portion of the receipts will go to support refugee
 organizations (Peter Brooks, the developer, came to the U.S. as a
 refugee).


 4) SlipKnot is a case study in the new technology of virtual commerce. All
 promotion, distribution, and registration is being done online. No physical
 shrink-wrapped disk or manual is produced: users download the product with
 documentation. There is no paid advertising or direct mail: potential
 purchasers learn about it through online newsgroups, user groups, mailing
 lists, and through the press. There is no printed and mailed press kit:
 the media hears about it through electronic means -- e-mailed press
 materials and announcements. Registrants send in their addresses and
 payments through fax or encrypted e-mail, and their personal codes are
 returned to them by e-mail. All this is rapid, efficient, and economical.

 Below you'll find info on where to get it. If you want to see what others
 are saying about SlipKnot, we've attached some early reactions.

 **NOTE** This press kit is incomplete. To keep down the size of this
 message, and ensure that you get the most recent information, AT ANY TIME,
 you can automatically retrieve SlipKnot's features, list of limitations,
 and technical specifications for what SlipKnot requires on the user's
 computer and at the service provider, by sending a blank e-mail message to
 our autoreplying infobot:
 slipknot@micromind.com

 I'm a consultant to institutions interested in publishing on the net, and
 author of a book on electronic publishing as a business. I'm doing
 promotion for the release of SlipKnot.

 Feel free to forward this message to other journalists, movers and shakers
 on the net.

 If possible, please let me know if you're planning to run a story; if it's
 in online form, I'd be very grateful to get an e-mail copy; if in printed
 form, I'd appreciate getting a tear sheet mailed to me at 310 Riverside
 Drive, Suite 1519, New York, NY 10025. Please contact me or Peter Brooks
 (the developer, pbrooks@micromind.com) if you have any questions. In any
 stories, please do not publish my phone number; you can give out my e-mail
 address and fax number.

 Thanks in advance--Felix Kramer

 * * * * * * * * * * * * * * * * * *
 HOW TO GET SLIPKNOT
 * * * * * * * * * * * * * * * * * *

 SlipKnot 1.0, the World Wide Web browser for Windows dial-up users from
 MicroMind,Inc., is now available (right on schedule!) for anonymous ftp
 download at:

 ftp://oak.oakland.edu/SimTel/win3/internet/slnot100.zip

 or, if it's not too busy, from:

 ftp://ftp.netcom.com/pub/pbrooks/slipknot/slnot100.zip

 oak.oakland.edu has numerous mirror sites, so if you have any trouble
 getting it directly from there, please try the mirror sites.

 One mirror site is:
 ftp.uoknor.edu/mirrors/SimTel/win3/internet/slnot100.zip

 In the U.K. try:
 src.doc.ic.ac.uk/computing/systems/ibmpc/simtel-win3/internet/slnot100.zip

 In Australia try:

 ftp.bf.rmit.edu.au  /pub/pc/www/slnot100.zip

 (If you don't get to it for a while, please look at the distribution site
 for the latest version file, that is, slnotxxx.zip -- where "xxx" indicates
 the Version of SlipKnot. So, for instance, Version 1.0 is slnot100.zip,
 and Version 1.35 will be slnot135.zip.)

 You can also get a FAQ, focusing primarily on common installation problems,
 at:  ftp://interport.net/pub/pbrooks/slipknot/sntfaq1.txt


 * * * * * * * * * * * * * * * * * * * *
 WHAT PEOPLE HAVE SAID ABOUT SLIPKNOT
 SINCE ITS RELEASE IN LATE NOVEMBER
 (INDIVIDUALS FOLLOWED BY PRESS)
 (AFFILIATIONS FOR IDENTIFICATION ONLY)
 * * * * * * * * * * * * * * * * * * * *

 * * * * * * * * * * * * * * * * * * * *
 UNSOLICITED COMMENTS FROM BETA TESTERS
 * * * * * * * * * * * * * * * * * * * *

 "SlipKnot is a godsend for those without slip."--Walter Rice, 11th grade
 student at Central High School, Philadelphia

 "I have really enjoyed SlipKnot. After trying for over a year to get
 Mosaic to work on my PC at home, I found SlipKnot easy to install and use.
 "--Mike McKee

 "This is a fun program. A LOT of magazines lately have been talking about
 Internet and the world wide web - and almost all of them say something like
 "To really delve into Internet - you'll need a SLIP or PPP connection."
 Get the word out about SlipKnot.. cause they're dead wrong. I have a shell
 account and it's got everything most people could want. I can read
 newsgroups, send/receive email, use telnet/ftp, download files, and (with
 SlipKnot) browse the World Wide Web! To be honest.. what else is
 there?"--Steve Crawford, MIS Manager for SpectraLink, Inc., Boulder,
 Colorado

 "I can use it with my dial-up and the price is certainly right--so I'm no
 longer lusting for a SLIP/PPP connection....If *I* can use this program so
 easily, anybody can....."--Kristi Olesen, author and parent

 "SlipKnot is simple to install, use and configure and wonderful in the
 sense that the wonders of the Internet are now truly available to me. As
 you can tell, I love this product. Thanks!"--Tami Duggan, Commonwealth
 Clinical Systems, Inc., Virginia

 "Keep up the good work. You've got a winner."--Steven Pitzl

 "Real slick....In general, the look and feel of SlipKnot is well-integrated
 & tight....Very cool setup....After looking at many web browsers, I must
 say y'all have a very unique browser, with a gorgeous interface,
 well-thought out and tightly integrated. And smooth. SlipKnot. I'm
 certainly telling everyone I know about it...."--Mark Garland, Civil
 Engineering Office, Santa Fe National Forest

 * * * * * * * * * * * * * * * * * * * * *
 REVIEWS FROM USENET AND MAIL TO MICROMIND
 * * * * * * * * * * * * * * * * * * * * *

 "Excellent software got it running with almost no problems.
 Congratulations."--Alan from United Kingdom

 "For a first release, Slipknot is amazing. It installed easily and worked
 first time."--Will from netcom

 "Overall, a really cool program, and quite clever."--SteveG from neosoft

 "This is exactly the program I've been searching for these past few
 months....While I loved the web browsing, I found I much preferred the
 Unix programs on my shell account. Now you've given me the best of both
 worlds.  Thank you!"--Nelia from netcom

 "Solid as a rock."--Rajesh from Temple University

 "A really neat program! Saves me time charges on my SLIP account."--Larry
 from netcom
 "--
 "Great Job Mr. Brooks ! well done !"--Amir from Bremen University, Germany

 "You've done an amazing job, without requiring the usual add-ons. I have
 spent hours with SlipKnot in many Web adventures and love the ability to
 toggle it when I want it and to use 'trn' and 'lynx' (the latter for form
 searches and for fastest text-response) and pine. So I'll get a check in
 the mail this week. Absolutely no GPF's, and your keyboard unfreeze
 resolved my one freeze in terminal."--Andrys from netcom

 ">One of the most exciting software programs I have seen lately."--Harald
 from Univ of Cincinnati

 "A major thumbs up!"--Darren from digex

 "Bravo!! What can I say? Seems to be a very stable, and actually pretty
 quick little program."--Mark from Pipeline

 "Wow! I've been spreading the word about Slipknot--I don't know when I've
 been more impressed with software in terms of the ease of use. Thanks
 again. I really think you've got a winner on your hands."--Steve from
 netcom

 "It worked! This is fantastic! I'm registering my copy ASAP. NOW I can see
 what everyone's so excited about."--Chris from tenet.edu

 "We are working on our Internet CD-ROM disc and would include your program
 as the user interface."--Stefan from Germany

 "Terrific work and a real contribution to the Internet community."--William
 from George Washington University

 "I've been using your software for the past five days and I just wanted to
 say how much I enjoy using it. BTW, I sent in my
 registration/check"--Warren from ncsc.mil

 "I think it's terrific,  especially the ability to download WWW pages and
 group in folders for future reference off-line!"--Deb from digex

 "I'm very happy with SlipKnot and am enjoying seeing for the first time
 what all the fuss is about regarding the WWW."--Phil from panix

 "I can't say whether it's better than Mozilla, TIA, etc., but it sure turns
 a shell account into a multimedia banquet!"--Daniel Dern from world.std.com

 "I want to roundly condemn you for making and distributing this program. It
 is so simple and easy to use, has so many useful functions and works so
 flawlessly that I will probably spend many more hours in front of my
 computer than I should :-). Anyway, thank you for a superb web browser.
 Give yourself a gold star."--Mark  from netcom

 "This is so cool, you could get frostbite from it."--William from Denver


 * * * * * * * * * * * * * * * * * * * *
 EARLY COMMENTS IN THE PRESS
 * * * * * * * * * * * * * * * * * * * *

 "Pure, unadulterated magic"--Daniel Dern, noted Internet analyst and
 author, "The Internet Guide For New Users" (McGraw-Hill, 1993)

 "Will SlipKnot cause a Web traffic explosion? SlipKnot is a MS-Windows Web
 browser that can be used with a dial-up shell account. Could this be the
 answer for those without a direct or Slip/PPP connection? SlipKnot is a
 very welcome addition to the Web tool box. It will make available the Web's
 graphical displays to a whole new group of Internet users.--Bob Stewart,
 The Virtual Mirror -- http://mirror.wwa.com/mirror/

 "Its chief author, Peter Brooks...plans to sell SlipKnot as shareware. That
 means you download it free from an on-line service, try it out and if you
 decide to keep it, mail the programmer a check. Brooks plans to ask for
 $29.95. It's a steal....At the touch of a button, SlipKnot turned into a
 World Wide Web browser that in some ways worked better than Mosaic. It ran
 a little slower than Mosaic, but not much. And it works without the expense
 and trouble of a PPP account....SlipKnot is going to be a strong
 competitor."--Hiawatha Bray, Detroit Free Press, DFP Forum on Compuserve

 "Spurred by a desire to share the wonders of the Web with the vast
 dial-up population, developer Peter Brooks created SlipKnot....'We have a
 small lifetime worth of work in terms of features to include in the
 product,' Brooks confided. 'We will continue to improve it as time goes
 on.' "--Dianna Husum, WEBster, the Cyberspace Surfer

 "...A major technological breakthrough. SlipKnot is, as people used to say,
 'for the manor woman on the street,' and it, and its successor software,
 will invite millions more people to the Web's vibrant new culture."--Joyce
 Lain Kennedy, LA Times Syndicate author, in Hookup/Get Hired, forthcoming
 from John Wiley & Sons in 1995

 "One of the best features of this browser is its ability to retrieve
 documents in the background. According to MicroMind, SlipKnot is more than
 just a Web browser. This program allows for complete navigation of the Net
 and promises to bring Web access to almost all Internet users."--Patrick
 McKenna, Newsbytes

 "...for those trapped with terminal-emulation access to the Internet and
 salivating at the new stuff they hear is on the Web, this product is simply
 miraculous.--Richard Seltzer, Internet-on-a-Disk

 "One advantage is that whatever Web pages it gets, it keeps them until you
 decide to delete them. Once you're offline, you can go back and review
 pages you had browsed while online. You can keep as many pages as your
 available computer memory allows. SlipKnot is amazing. When it was first
 announced on Internet, I was skeptical whether such a program could work.
 Now, I'm a beiever."--John Fisher, Bucks County Times Courier

 SlipKnot has appeared in the National Center for Supercomputing
 Applications (NCSA) "What's New Page", Computer Underground Digest, and the
 Usenet moderated newsgroups comp.newprod & comp.internet.net-happenings

 * * * * * * * * * * * * * * * * * *
 SLIPKNOT AS SHAREWARE
 * * * * * * * * * * * * * * * * * *

 SlipKnot is published as restricted shareware, free for evaluation but with
 strong incentives to frequent users to register at a cost of $29.95 to most
 people. Individuals outside Northern America, Europe and Japan will be
 asked to pay $20 to register. And 10% of the receipts will go to support
 refugee organizations.

 Our shareware evaluation policy is that users who have displayed/retrieved
 over 300 documents are no longer evaluating the software (this should take
 about 2 months of typical usage) and will be asked to register within 30
 days  -- with an additional 21-day grace period if they start the
 registration process.  We hope that few users will object to the policy,
 given the price of the software.

 * * * * * * * * * * * * * * * * * * * * * *
 NOTE FROM PETER BROOKS, SLIPKNOT DEVELOPER
 * * * * * * * * * * * * * * * * * * * * * *

 SlipKnot was created because there was, at that time, no other alternative
 to accessing the World Wide Web graphically if you did not have SLIP or PPP
 or TCP/IP access. Having analyzed Mosaic and some of its competitors, I
 concluded that all of these browsers were designed for people with very
 rapid communications channels into the Internet, not modem users. Even if
 you have SLIP access, most of these browsers do not allow you to save
 entire documents (with the included pictures), forcing you to retrieve the
 documents again whenever you wish to take a full look at them --
 eliminating the possibility of demonstrating WWW without being online.
 It takes a while to retrieve any document by modem with any browser, and
 you shouldn't have to do this more than once.

 The Web is a remarkable human construct and a truly a wondrous place.  I
 hope that SlipKnot brings you the magic of the Web, and that you become
 as astounded by it as I am.


 * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
 ABOUT MICROMIND
 * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

 MicroMind, Inc. is a New York City-based software development company with
 six major products developed and released for the international market,
 including:

 * RUN/C  -- the world's first interpreter for the C language -- sold in the
 U.S. and Japan. 20,000 copies sold at $250.

 * OL2 -- a product to duplicate the functionality of Sharp Electronics'
 Wizard Electronic Organizer on a desktop computer -- marketed by Sharp
 worldwide. Over 150,000 copies sold at $100.

 PETER BROOKS, President of MicroMind and author of SlipKnot, has over 25
 years of software development experience.

 * * * * * * * * * * * * * * * * * *
 FEEDBACK
 * * * * * * * * * * * * * * * * * *

 To facilitate communication and support, we are asking users to post
 comments and responses about SlipKnot only to the following Usenet
 newsgroup: comp.infosystems.www.users.

 At any time, for the latest SlipKnot information and a list of features,
 either point your WWW browser (lynx is fine) to:

 http://www.interport.net/slipknot/slipknot.html

 or send a blank e-mail message to:

 slipknot@micromind.com.

 Please direct any press or distribution questions to
 felixk@panix.com.
 vox: 212/866-4864. fax: 212/866-5527

 Please direct any technical questions to: slpstaff@micromind.com

 Mail to Peter Brooks can be sent to: pbrooks@micromind.com
 fax: 212/864-0436

 SlipKnot is Trademarked by MicroMind, Inc.
 This document (c) 1994 by MicroMind, Inc.

 * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
 Felix Kramer/Kramer Communications
 NYC-based electronic publishing & journalism
 Online promotion & marketing
 e-mail: felixk@panix.com or felixkramr@aol.com
 voice: 212/866-4864    fax: 212/866-5527
 * * * * * * * * * * * * * * * * * * * * * * * * * * * * *-----------------
 
                     TELECOMMUNICATION SECURITY

 By Howard Fuhs
 Copyright (C) 7/1994 by Howard Fuhs
 Howard Fuhs Elektronik
 Rheingaustr. 152
 65203 Wiesbaden - Biebrich
 Germany
 Tel: +49 611 67713
 D2:  +49 172 6164336
 Fax: +49 611 603789
 CompuServe: 100120,503
 Internet: 100120.503@compuserve.com

 The material presented is implicitly copyrighted under various national and
 international laws and is for information purposes only.

 Information in this document is subject to change without notice and does
 not represent a commitment on the part of Howard Fuhs Elektronik.

 Free public distribution is permitted with the following conditions:

 1)   No editing of any kind is permitted!
 2)   Distribute the entire document, as is, or do not distribute at all!
 3)   No fee of any kind may be charged for such copying. "Media and
      other Service Charges", such as those charged by user groups and
      commercial entities, are not allowed!
 4)  It's source and co-operative nature should be duly referenced.

 No part of this publication may be published by Magazines, Journals or any
 other professional non-profit or profit organization in any form, without
 prior written permission from Howard Fuhs.

 1. Abstract

 2. The Underground
         2.1 The Technical Equipment
                 2.1.1 Red Box, Blue Box and other boxes
                 2.1.2 War Dialer
                 2.1.3 Modem
                 2.1.4 Legal Tone Dialer
                 2.1.5 Lock Picks
                 2.1.6 Scanner

 3. Potential Targets
         3.1 Dial-In Lines with Modem
                 3.1.1 Countermeasures
         3.2 Toll Free Numbers
                 3.2.1 Toll Free Number for Marketing Purposes
                 3.2.2 Toll Free Numbers with Dial Out Lines
         3.3 Voice Mailbox Systems
         3.4 Wireless Phones
         3.5 Pager Systems
         3.6 Shoulder Surfing
         3.7 Answering Machines

 4. How/where do they get their Informations?
         4.1 Social Engineering
         4.2 Trashing
         4.3 Underground Publications
         4.4 World-wide Computer Networks
         4.5 Internal Computer Networks of Telecom Companies

 5. Conclusions



 1. ABSTRACT
 -----------
 Everybody is discussing Data Security, Computer Security and Anti-Virus
 Measures to make certain that systems and data remain clean and safe.
 Companies spend considerable amounts of money and time on data security
 experts, fail-safe plans, security hardware and software but often forget
 a major leak in their security plans: Telecommunication Security.

 Many companies argue that the local telecom company is responsible for
 telecom security, and at first sight they are right.  But the problem of
 telecom security is more complex than even the telecom companies will
 admit. Especially government operated telecom companies have a tendency to
 take telecom security somewhat lightly, and it can happen that they won't
 believe you even if you can demonstrate the weaknesses of their systems
 (this actually did happen in Germany). Their official statement is always:
 "Our system is secure and not vulnerable".

 If the lines and switching systems are vulnerable, it is the responsibility
 of the telecom company to correct this. The average telecom customer has
 little or no influence on this level of security, but what about telephone
 equipment owned and operated by other companies? This type of equipment is
 also vulnerable, in many cases more vulnerable than telecom lines and
 switching systems. In this case it is the responsibility of the company
 owning the equipment to prevent misuse of the installed system or network.
 Most companies do not even know that their telecom equipment is vulnerable.
 To close that security gap it is necessary to know which techniques to use
 and whom to deal with.


 2. THE UNDERGROUND
 ------------------
 People who try to break the security of telecom systems call themselves
 "phreaks" or "phreakers". Phreaks are usually technically very
 knowledgeable about telephone systems, and their main intention is to make
 calls around the world free of charge.  Whether an individual, the
 telephone company or some other company has to pay for their abuse does not
 concern them.

 Phone phreaks often look for companies operating dial-in lines with modems,
 toll free numbers or voice mailbox systems, because they assume that the
 telephone bill of a company of this character is so high that the abuse of
 the system will not be detected because of a slightly increased bill.

 Often phreaks are organized in loose groups and most of them are trading
 their secrets over computer networks to other interested phreaks. This
 means that if someone discovers a new and interesting or challenging
 telephone number, information about it is often spread all over Europe
 within 24 hours.

 The consequence of dissemination of this type of information is that an
 increasing number of phreaks will try to abuse the published telephone
 number or telephone system. If the misuse is only detectable through an
 increasing telephone bill, it may go undetected for several months in the
 worst cases, depending on the frequency of invoicing used by the utility
 supplier.


 2.1 THE TECHNICAL EQUIPMENT
 ---------------------------
 The computer underground, in that case better known as the phreakers, uses
 a wide variety of electronic gadgets, gizmos and devices to abuse telecom
 equipment and lines, to manipulate switching systems and to break through
 digital firewalls. Knowledge of these devices is very important for company
 security staff because they must know what to look for.


 2.1.1 RED BOX, BLUE BOX, WHITE BOX AND OTHER BOXES
 --------------------------------------------------
 All these colourfully named boxes are devices designed to cheat telecom
 equipment. Most of them are (sometimes modified) tone dialers or self-made
 electronic devices, all having several functions. To provide free calls
 from public phone booths one of the types is able to emulate the insertion
 of a coin (works only in the USA), another box can emulate the audible
 code-signals used to communicate between switching systems or to switch the
 telephone line into special modes (which differ from system to system) for
 maintenance staff, who normally has more privileges in a telecom switching
 system than ordinary users. Boxes are also available to send a false caller
 ID to telecom equipment used to display the telephone number of the caller.
 Also most private telecom equipment may be programed by means of such a
 tone-dialer or box. The consequence is that a phreaker is able to alter
 the program and thus work mode of telecom equipment in a company from a
 remote location.

 All these types of boxes are described in underground publications, and
 they are relatively easy to build or to modify.

 A serious legal problem in connection with these boxes is that their use is
 not traceable under normal circumstances. The phreaker is over 98% sure not
 to get caught. Even if he should get caught it is hard to produce legal
 evidence proving his abuse of telecom lines and equipment.  In most cases
 an expert is needed to identify a suspicious device as being in fact a box
 intended to misuse telecom lines.  Possession of such devices is only
 illegal in a few countries (USA, Canada).


 2.1.2 WAR DIALER
 -----------------
 A war dialer is a computer program used to automatically dial all
 telephone numbers within a range defined by the phreaker using it. While
 doing this the war dialer produces a log file listing for each individual
 number who or what picked up the phone (modem, human, busy, fax, not in
 use, etc.). Log files of this type, listing interesting free-call numbers,
 are regularly posted on some computer networks and thus made publicly
 available.  List keepers in nearly every country with toll free numbers
 update this type of log file at least on a monthly basis.

 In some countries (e.g. the USA) war dialers are illegal. In one case
 innocent-looking software was used to hide a war dialer. A
 password was simply needed to invoke the hidden function of the war
 dialer, and everybody who had seen the movie "War games" knew the
 password (the name of Prof. Falken's son).


 2.1.3 MODEM
 -----------
 A modem is a widespread hardware device and not primarily intended to be
 used for something illegal. In most cases, however, a modem may be used to
 war-dial numbers without a special war-dial program, and without technical
 alterations it can also emulate tones, which can be used to cheat
 switching systems. A modem is also necessary to hack computer systems etc.


 2.1.4 LEGAL TONE DIALER
 ------------------------
 A legal tone dialer is a small device, which is usually delivered together
 with an answering machine for remote control. It looks like a small pocket
 calculator and has the capability to store a lot of phone numbers together
 with the names and addresses of the people. Even these legal tone dialers
 are able to cheat a telephone system.

 For a long period of time it was possible in Germany to make phone calls
 from a public pay phone without paying for the call. You just lifted the
 handset and dialled the number using the tone dial device, and you got your
 connection. The weakness of that pay phone system was that a coin needed
 to be inserted in order to enable the keypad of the pay phone. Thus, when
 you did not need the keypad to dial the number, no coin was needed and the
 security system was circumvented in a very easy manner...

 Completely legal tone dial devices can be altered to produce the tones
 needed to cheat the switching system. A Radio Shack dialer was alterable
 in such a way, for instance. The only thing needed was to replace a crystal
 used to define the tone frequencies and it was possible to transmit the
 tones needed for communication between two switching sites.


 2.1.5 LOCK PICKS
 ----------------
 "What do lock picks have to do with telecom misuse?", you will ask. A lot,
 as will be demonstrated! It is very interesting to see that a lot of
 phreakers (especially in America) are skilled lock pickers.  Even telecom
 companies are getting wise and have begun to lock up all kinds of telecom
 cable boxes and small switching stations situated in public areas and not
 under constant surveillance.

 However, our enterprising phreaker occasionally needs access to this type
 of installation, and if he were to use a device that damages the lock,
 everybody would know at first sight that someone broke into the
 installation. Destroying the lock also means making noise, which could
 attract curious bystanders or even (worst case for the phreaker) the
 police. A lock picking set is not going to ruin your budget. It takes a lot
 of practice to use, and it opens nearly every cheap and/or simply designed
 lock.

 For organizations and companies it is mandatory to choose the best locks
 available, even if they are more expensive than simple ones. It only takes
 a few design changes to make a lock unpickable. This forces the phreaker to
 destroy the lock (thereby making the violation evident) or to give up. For
 advice or support contact a security expert or a professional locksmith.

 Once the phreaker has gained physical access to the installation he is able
 to install any kind of cheating device, call diverters, remote switches or
 even a wiretapping device or small transmitter.

 Owning lock picks is not illegal, but using lock picks to gain unauthorized
 access of course is.


 2.1.6 SCANNER
 -------------
 Radio scanners are mainly used to find and listen to different frequencies
 in use. A modern scanner not larger than a pack of cigarettes can cover a
 frequency range from a few kHz up to 5 GHz. Scanners can be used to find
 the working frequencies of cordless phones or to listen to wiretapping
 devices. Many journalists are equipped with scanners to check the
 frequencies of police and fire departments.

 According to an EU regulation, the ownership of a scanner is legal. The
 usage of scanners is regulated in laws which differ from country to
 country. It is nearly impossible to prove the misuse of a scanner in court.


 3. POTENTIAL TARGETS
 --------------------
 In this paragraph it is explained what can happen to telecom equipment and
 telecom lines and how to avoid this misuse of important and expensive
 company resources.

 To prevent phreaking it is mandatory to know what constitute the main
 targets for phreaks, which techniques they use to sneak around security
 barriers and which security holes they use.  To prevent this article from
 becoming a "Phreaker's Tutorial" the techniques used will only be described
 generally. This is no "technical in depth" article. Some technical facts
 and standards differ from country to country. This is not the case with the
 Euro-ISDN standard and GSM. If there is an urgent need for technical
 support or advice against phreakers it is strongly recommend to contact
 security experts in the field of data and telecom security.


 3.1 DIAL IN LINES WITH MODEM
 ----------------------------
 If a phreaker locates a dial-in telephone line with a modem, he will
 probably switch himself into hacker mode and attempt to hack it, trying to
 gain access to the company computer system. If he is not a skilled hacker
 he will trade his new-found information to a person with more knowledge.

 If he successfully hacks the computer system, he is often able to alter,
 copy or delete data, read confidential files, read private E-Mail, spread
 vira or even shut down the whole system. He will usually look for
 passwords, network connections or gateways to networks like the Internet or
 other world-wide networks and E-Mail services. If there are any gateways to
 other networks, he will start using them and thus increase the usage costs
 for the particular network.  It is very likely that the hacker/phreaker
 will use all features of the company computers, networks and gateways to
 international networks. The simple reason is that he does not have to pay
 for the use.

 Even though it may be evident that a hacker/phreaker has gained access to
 the corporate computer-network via a telephone line it is very difficult to
 find that person. In cases like this it is necessary to work together with
 the local police and the telephone company. The person in charge of the
 co-operation between your company and the local authorities should be your
 data security specialist. If there is no person in your company that is
 able to cope with a problem of this type, it is strongly recommended to get
 advice from a professional data security expert. He knows what to do and
 has the necessary connections to police and telecom companies.

 The telephone company has the technical equipment and can obtain permission
 to trace a telephone call, and line tracing is the most successful method
 to detect an intruder. Furthermore, it produces valuable evidence that can
 be presented in court. If it is necessary to install a wiretapping device
 this must be done by police after obtaining a warrant.

 For a company to take this type of action itself, would in most cases be a
 violation of the law and thus very risky business. Even if the company is
 able to detect the phreaker, it would not be able to present the evidence
 in court, and there would be no possibility to sue the illegal intruder.


 3.1.1 COUNTERMEASURES
 ---------------------
 First step to prevent this type of damage is to close the security gap,
 e.g. by means of a password program.  This must ask for the name of the
 user and for a password. The password should have a minimum length of six
 characters and all ASCII and/or ANSI characters should be allowed. The
 program should also look for forbidden passwords like "abcde" or "qwertz".
 After three attempt to gain access using an invalid user name or password
 the program must inform the system administrator automatically. If the user
 name is valid but the password not, the password program must cancel all
 access rights for the user who is trying to gain access with an invalid
 password.  All users should be educated about how to choose a secure
 password or how to build up his own private password selection scheme. A
 personal mnemonic scheme like that is very helpful, because it serves to
 prevent stupid and easy-to-guess passwords and valid passwords from being
 written on Post-It papers stuck to the monitor.  A password generator can
 also be helpful. This type of program generates random passwords, which are
 difficult to guess or hack (or remember).

 Next step would be to use a call-back device (integrated in many advanced
 modems). It functions by allowing users to call a particular telephone
 number and type a password to the modem, which subsequently hangs up. After
 validating the user name and password the computer will call the user,
 using a fixed telephone number either stored in modem or computer. The user
 again has to type the correct password and is then granted access. For the
 method to be secure, at least two different telephone lines must be used in
 order to place the call-back on a different line.

 Using only one line is not 100% fool-proof. Under these circumstances a
 call-back device can be circumvented by a skilled phreaker by reprogramming
 the telecom switching system. In modern digital switching systems it is
 possible to use the extended services to program a call diverter, so that
 when a particular telephone number is dialled, the call is in fact
 automatically redirected to a different subscriber. Call diverter functions
 are integrated in digital switching systems and Euro-ISDN. Many cases are
 known, in which a phreaker has used the call diverter functions to fool
 call-back devices and redirect calls to his home phone.

 One of the most secure ways to prevent intrusion is a hardware security
 protocol for caller authentication and log-in procedure.  This modem access
 control and security hardware is installed in front of the host modem.
 Callers needs a hardware key, e.g. a dongle, a chip card or a PCMCIA Card
 installed in his computer in order to gain access to the host computer.
 This type of modem access control system first verifies the presence and
 authenticity of the hardware key. Only after successful completion of this
 procedure is the user asked for his personal password. The described modem
 access control system is also available for network access control to
 verify local users during their log-in procedure to a network.

 To prevent theft of information because of wiretapping of telephone lines
 used for data communication, a good modem access security and control
 system should be able to scramble and encrypt the transmitted data.  This
 kind of encryption is most often performed by an onboard chip and not by
 software running on the computer system, although both types are known.
 This can be a factor of importance, because software en/decryption slows
 down a computer system as the number of dial-in lines is increased.

 It is recommended to use all the above described techniques in combination
 to prevent illegal intrusion by a phreaker/hacker.


 3.2 TOLL FREE NUMBERS
 ---------------------
 Toll free numbers are a very attractive target for phreakers, because it
 costs nothing to call a number like that, incoming calls being paid for by
 the company operating the toll free number.

 It doesn't even cost anything to scan all available toll free numbers to
 find out who or what picks up the phone. So it is easy to find out which
 numbers are connected to fax machines, modems, are not in use, are used in
 voice mailbox systems, etc.

 To perform the scanning, the phreaker needs about one night and a "war
 dialer" scanning program as described above.

 Toll free numbers can normally be divided into a few groups with different
 purposes.


 3.2.1 TOLL FREE NUMBER FOR MARKETING PURPOSES
 ---------------------------------------------
 This type of number is normally connected to a play-back device, which
 plays a promotion text when called. These numbers are often promoted in
 big advertisements in newsletters and journals and  normally only available
 for a couple of weeks.

 It would be totally wrong to assume a number like that to be without risk.
 The following incident happened during a large German electronics and
 computer exhibition:

 A leading software company advertised a toll-free number to call for
 information about the computer virus problem. Each caller heard a tape with
 information denouncing ownership and distribution of illegal copies of
 software, emphasizing the risk of catching a computer virus. The
 advertisements were placed in journals normally read by business people and
 not by phreakers.

 After the number had been propagated by a phreaker through
 computer-networks like the FIDO net, more and more people started to call
 it with a war-dialer.  The result was a rapidly increasing telephone bill
 for the company, because when the war-dialers called the number, the phone
 was picked up by the play-back device and the telecom company added one
 more call to the bill. The war-dialers hung up the phone a few seconds
 later and started to dial the same number again. This unexpected massive
 cost overrun forced the software company to shut down the line after a very
 short period of time.

 In a case such as this nothing can be done to prevent that kind of misuse.


 3.2.2 TOLL FREE NUMBER WITH DIAL OUT LINES
 ------------------------------------------
 A toll-free number with dial-out lines will attract phreakers like honey a
 brown bear. These systems are mainly used to limit expenses in companies,
 whose employees travel extensively. They make it possible for the employees
 to reach their company free of charge (the company pays for the call), and
 they can place (often world wide) calls by means of the dial-out function
 of the toll-free number. These calls are debited the company. Phreakers use
 the system the same way the employees do. They route all their calls
 through a toll-free system with dial-out lines, because this costs the
 phreaker nothing. The company thus targeted has to pay the expenses.

 Two things can be done to prevent misuse of this type of system.

 First of all it is mandatory to keep the toll free number with all its
 functions secret. Regular users should be informed on a need-to-know basis.
 They also should be told to keep the number secret.  Keeping the number
 secret, however, does not mean that it will not be detected by phreakers.
 Bear in mind that it costs a phreaker nothing to scan for toll-free numbers
 on a regular base (eg. each month).

 The second thing to do is to secure the system with individual access
 codes, which must be entered through the telephone key-pad.  The length of
 this individual access code must be minimum 6 digits.  Currently, most
 toll-free systems with dial out lines are not protected by access codes.
 Most companies rely on no strangers calling the toll-free number and
 attempting to invoke hidden functions by trial and error. This is a false
 sense of security. All phreakers try out things like this, because it costs
 them no money to mess around with the system for as long as they want. In
 principle they have all the time they want to look for hidden functions.
 Most of the functions like dial-out lines are invoked by pressing one
 single digit on the key-pad. A few systems use two digits. This despite the
 fact that it will only take a phreaker a few minutes to discover how to
 (mis)use a toll-free system.  In the worst of cases the toll-free system
 even features a voice menu telling callers which options are available in
 the system.  In this case it is not even necessary to use trial and error.

 If it is suspected that a phreaker misuses a toll-free system with dial-out
 lines it is best to contact the police and take legal action. The police in
 co-operation with the telecom company possesses the technical and legal
 means to trace the phreaker.


 3.3 VOICE MAILBOX SYSTEMS
 --------------------------
 For the past few years the use of voice mailbox systems in Europe has been
 increasing. Voice mailbox systems must be divided into two different types:
 Toll-free voice mailbox systems used by many types of companies, and voice
 mailbox systems from companies providing party lines, dating lines and
 other, mostly expensive, services.  Normally a  phreaker will primarily
 select the toll-free voice mailbox system.  If no toll-free voice mailbox
 is available he probably has the knowledge and the technical capability to
 call a voice mailbox of a service provider in an illegal toll-free way.
 The problem, however, is not which voice mailbox system he will call, but
 how he will use it.

 To understand how to misuse a voice mailbox system, the basic system use
 must be understood. A voice mailbox is like a house. When you enter the
 house your host welcomes you. The host in this case is a voice menu
 explaining all the functions of the system. To choose one of these
 functions you just have to press the corresponding button of the key-pad.

 Having made a selection you will leave the entrance and enter a "room".
 Each room is dedicated to a special topic. Topics can be live discussions
 with as many people as are in the room, public message areas, private
 message areas, playing a game, etc. A large voice mailbox system can have
 more than 100 different "rooms".  If the number is not toll free, the
 phreaker uses techniques to call the voice mailbox system free of charge
 anyway.

 If the voice mailbox is interesting, easy to hack and fits his needs, the
 phreaker has a lot of  uses for such a system. It has been evidenced by
 court trials that phreakers use voice mailbox systems as their
 "headquarters", to meet, to discuss, to have conferences with up to 20
 persons participating at the same time, to leave messages to other
 phreakers or to deposit and share knowledge. They waste system resources
 without paying for it. In some cases all dial-in lines were busy, so no
 paying customer was able to connect to the system.

 It is also interesting to see how the phreakers used system resources.  As
 mentioned above, a voice mailbox is like a house, a house with easy-to-pick
 or no locks in the doors. The business of the service provider requires the
 voice mailbox to be easy to use without big security installations. The
 voice mailbox must be an open house for everybody, and that makes it easy
 for the phreaker.

 First a phreaker will look for hidden functions in the voice mailbox.
 Hidden functions are normally used to reprogram the voice mailbox from a
 remote location. Commonly, hidden functions are available to increase the
 security level of certain rooms and for creating new rooms with new
 possibilities and features. With knowledge of the hidden functions of a
 system, the phreaker can create new rooms for meetings with other
 phreakers, and he is able to raise the security level of such rooms so that
 only insiders can gain access. Increasing the security level means
 assigning an access code to a room.  Without knowledge of the access code
 the room cannot be entered. Thus, he is able to create a voice mailbox
 inside  the voice mailbox for a closed user group, "Entrance for phreakers
 only".

 This voice mailbox for phreakers can be used to post calling card numbers,
 private messages for other phreakers, the newest access codes for other
 voice mailbox systems, the newest tricks on how to cheat the telephone
 system, etc.

 All owners of voice mailbox systems can do is to watch the traffic inside
 his system and look for changes such new rooms suddenly appearing. From a
 practical point of view it is very difficult to increase the security of a
 voice mailbox without causing problems for paying users. In case of misuse
 it is necessary to co-operate with a security expert and the local
 authorities to limit financial losses.


 3.4 CORDLESS PHONES
 -------------------
 It is very easy today to set up a complete telephone system in a small
 company, using only cordless telephones and that is one of the reasons for
 the sales of cordless phones rapidly increasing throughout Europe. However,
 only a few people know how dangerous it can be to use a cordless phone,
 especially for company purposes. This type of wireless phones can be
 divided into two groups. The first group employs a transmission frequency
 around 48 MHz and is mainly used in the USA. It can be used legally in some
 European countries as well.  The second group employs a frequency in the
 870 - 940 MHz range. This type is mainly used in European countries.

 The first major problem with wireless phones is that anybody with a
 suitable scanner can listen in on the conversation. A good scanner needs
 less than 30 seconds to find the correct frequency. This is a major
 weakness inherent to these systems, which can of course be fatal to a
 company.  A new standard for European cordless phones (870 - 940 MHz) has
 emerged. These phones automatically scramble the transmitted signal between
 handset and base station. With this system in place, nobody with a scanner
 can stumble over the phone conversation by accident, but this standard
 still is not foolproof. The scrambling method employed by the system can
 comparatively easily be circumvented by a knowledgeable person with only a
 minimum of extra hardware.  The American type cordless telephones (48 - 49
 MHz) are the most unsecure devices available. They can easily be scanned as
 described as mentioned above. There is no signal scrambling standard, and
 they do not even check to see the handset and the base station in use match
 each other.

 Only very few cordless phones allow signal scrambling at all. In most cases
 this is just an option, the scrambling device must be bought separately and
 this is designed in a very cheap and thoroughly unsecure manner. It is no
 problem to circumvent this quality of scrambling with a little hardware.
 99% of the American phones are without any scrambling option, they can't be
 made more secure, even if the customer wishes to do so.

 This cordless phone type opens the door to the possibility of misuse of a
 very special character because of a major system design flaw.  Handset and
 base station are communicating on a fixed frequency between 48 and 49 MHz.
 The problem is that a handset works with all base stations set to the same
 frequency as the handset. It has become very popular in the USA when making
 a call first to switch off the base station and check if there is another
 basis station in the area, which can be reached by the handset. In this
 case it is very easy to use a base station belonging to someone else. And
 this person has to pay for the phone calls made by a stranger in the same
 house or area. It has also been seen that handsets were modified in a way
 so as to work on different frequencies, thus enabling the owner of the
 handset to make phone calls through a number of different base stations in
 his area. The usual range of a cordless phone is about 300 meters.

 To prevent this kind of misuse the European cordless telephones are working
 in a slightly different way. The first difference is that the phone does
 not use a single fixed frequency. European phones are using a wide range of
 frequencies which are divided into channels. When the handset is picked up,
 it first finds out which channels are in use and which are available. The
 first available channel will be used.

 The next built-in security is a validation between handset and base
 station.  Every few seconds the handset is checking, if it is using a base
 station having a correct id-number and vice versa. If the handset or the
 base station does not receive the correct id-number the connection will be
 disconnected immediately. This feature makes it nearly impossible that a
 handset uses two or more different base stations within its range. The
 usual range of an European cordless phone is about 300 meters in an area
 free of obstructions, and about 50 meters inside buildings.


 3.5 PAGER SYSTEMS
 -----------------
 Pager systems are not directly abuseable, but if the pager in use has a
 character display so that it can receive complete messages or telephone
 numbers and not just beep, the messages are subject to easy interception by
 a person with the necessary knowledge and hardware. Telephone numbers have
 been known to be intercepted by "prankster", who later called the numbers
 and was rude to whoever answered. This has happened in the USA, but no
 European cases are known to the author.  Nothing can be done to prevent
 this kind of misuse.


 3.6 SHOULDER SURFING
  --------------------
 A phreaker is mainly interested in making telephone calls without having to
 pay, and in our modern world of plastic money it is very easy for skilled
 people to accomplish this. To achieve his goal, a phreak is always looking
 for Calling Card Codes. Major international telephone companies (like AT&T,
 MCI, SPRINT and also the German TELEKOM) are issuing calling cards to
 interested customers. Just dial the service number of the telecom company
 and give them your credit card number and you will get your calling card.
 Using a calling card is very easy. Dial the toll-free number specified by
 the calling card company and the operator will ask you for your calling
 card number and the phone number you wish to call. In some cases there is
 an automatic operator and the calling card number must be entered using the
 key-pad or tone dialer.  After verification of the calling card number
 (similar to a credit card number) you will get connected immediately.

 If a card holder uses his calling card from a public phone all the phreaker
 has to do is spotting the number on the card, watching the number being
 entered on the key-pad or simply listening, if the number has to be told to
 an operator.

 Holders of calling cards should protect these the same way he protects
 credit cards. If the calling card number is spread about in the
 underground, a few thousand Dollars of damage to the holder of the card can
 easily be the result.

 If the card holder discovers that his calling card number is misused, he
 must notify the card issuing company immediately. The calling card number
 subsequently becomes invalid and a new calling card is issued to the card
 holder. However, until the card company has been notified, the holder is
 liable for the damage.


 3.7 ANSWERING MACHINES
 ----------------------
 Answering machines are nothing special. We are routinely using them every
 day without ever reading the operating manual. This is why we know almost
 nothing about a few special features built into most answering machines to
 make our lives more comfortable.

 One of these features is the remote access function used to check who
 called and left a message, or to change the message played back when people
 call. Remote access is accomplished by means of a tone dialer and a two or
 three digit access code. This fact makes it easy for a stranger to hack the
 access number within minutes, gain access to the answering machine and
 listen to the recorded messages.  The default factory access code setting
 for most answering machines is no big secret among phreakers.  There is
 also a digit sequence for three digit access codes available, which fits
 99% of the needs. This sequence was made by a tiny little Turbo Pascal
 program, and both were published over computer networks.

 For a couple of reasons it rarely ever happens that a phreaker tries to
 hack an answering machine.  Firstly, it costs him money, because normally
 no private person owns a toll free number. Secondly, in 99% of the cases
 there are no big secrets to find on an answering machine. So, it's a waste
 of time for the phreaker.

 Another built-in feature of a modern answering machine is a monitoring
 option.  This option is normally protected by a two or three digit code and
 allows a caller to listen to the room in which the answering machine is
 installed. This is a useful option for parents, who are away from home and
 want to learn what the children are doing (sleeping or partying), and it is
 a very useful option for a curious phreaker, who wishes to invade the
 privacy of people's homes.  The problem gets even bigger when the answering
 machine is installed in a company office. In that case it is possible for
 the phreaker to obtain vital and confidential information about the company
 and its future plans.

 The only way to prevent misuse of these options and features is to buy an
 answering device without them.


 4. HOW / WHERE DO THEY GET THEIR INFORMATION?
 ---------------------------------------------
 People often wonder what makes it possible to a phreaker to get his
 knowledge.  There is nothing strange to it, however. It is a result of some
 tricky research or well-organized public libraries.

 Most of the information used by a phreaker is legally and freely accessible
 in libraries and book stores. Only in very few cases the phreaker has to
 behave like Jim Phelps in "Mission Impossible". The technical standards
 from the former telephone system standardizing organization CCITT
 constitute a very interesting source of information for a phreaker. They
 are available in every good university library and describe international
 telecom standards like tone frequencies (used to develop the coloured
 boxes).  Most telecom companies are also publishing technical journals for
 service technicians. These journals are normally available to anybody, who
 might wish to subscribe.


 4.1 SOCIAL ENGINEERING
 ----------------------
 Some phreakers specialize in getting information through social
 engineering.  Social engineering means in this case that a phreaker will
 phone up a person and pretend to be an employee of the telecom company (or
 some other important and well-known company), give an important reason for
 his call and subsequently ask for passwords, account numbers, technical
 data, specifications or whatever he is after. During his attempt to collect
 information the phreaker will appear very polite, trustworthy and adult
 even if he is just 16 years old.  This type of information pillaging is
 done mostly by phone, and they are very often successful.

 First rule of telecom security to prevent misuse of social engineering.
 Nobody (!) needs your passwords, confidential account details, calling card
 numbers or any other type of confidential information.  All requests for
 confidential information by phone should always be refused.

 People from telecom companies are able to identify themselves with special
 ID cards, and even these people do not need confidential information. If
 they need to test something they have their own service access accounts for
 telephone lines and switching systems.

 Again. Nobody has to ask for confidential information via telephone even if
 he gives very good reasons!


 4.2 TRASHING
 ------------
 In the course of court cases against prominent phreakers it has become
 evident that they went out to "trash" telecom companies or other targets,
 which had their interest. To "trash" in this connections means searching
 through trash cans for diskettes with software or papers carrying technical
 knowledge for insiders, telephone numbers, passwords, access codes, planned
 installations, etc., etc.

 The rule here is that no paper carrying information that could be important
 to outsiders should be thrown away. A good countermeasure is to install
 freely accessible paper shredders (e.g. one on each floor). Furthermore,
 the employees should be educated about paper security and advised to use
 the paper shredders.

 The important rule to apply here, and this particularly goes for old
 back-up diskettes and tapes, is: If it is not economical to guard it, it is
 economical to destroy it. In other words, any company policy regarding
 archiving must contain rules regarding destruction of old archives. Simply
 throwing these out is rarely sufficient.


 4.3 UNDERGROUND PUBLICATIONS
 ----------------------------
 Some people are publishing more or less regularly issued underground
 magazines about phreaking which are also distributed through modem
 accessible Bulletin Board Systems as computer files. Every phreaker is
 welcome to contribute articles for such an underground magazine. One of the
 foremost publications in this category is Phrack, which is so popular that
 it has received an ISSN number in the USA and is published on a regular
 basis.


 4.4 WORLD-WIDE COMPUTER NETWORKS
 --------------------------------
 There are only a few innovative phreakers in each country. These phreakers
 are developing the leading technology of phreaking.  Most of them share
 their knowledge with other people interested in phreaking via computer
 networks and bulletin board systems. It is thus no big problem to find
 information about phreaking, which means that malicious information gets
 spread rapidly to a large audience.


 4.5 INTERNAL COMPUTER NETWORKS OF TELECOM COMPANIES
 ---------------------------------------------------
 If the phreaker is also a skilled hacker he probably knows ways to access
 the internal computer network of a telecom company in search for
 informations. A famous case in the USA was the stealing and publishing of a
 document about the 911 Emergency Service from the computer network of a
 telecom company. This case ended in court.


 5. CONCLUSIONS
 --------------
 Telecom equipment is a vital resource for any company, and no company can
 permit a stranger to alter or abuse their telecom system.  As described in
 this article there are many ways to abuse telecommunication equipment, and
 to prevent abuse from occurring it is absolutely necessary to check out the
 weakness and vulnerability of existing telecom systems. If it is planned to
 invest in new telecom equipment, a security plan should be made and the
 equipment tested before being bought and installed.  Every serious
 manufacturer of telecom equipment will assist with answering the question
 of telecom security, but it is also recommended to consult a independent
 source of information, such as an information security expert.

 It is also mandatory to keep in mind that a technique which is described as
 safe today can be the most unsecure technique in the future. Therefore it
 is absolutely important to check the function of a security system once a
 year and if necessary update or replace it.-----------------
 
                  OLD FREEDOMS AND NEW TECHNOLOGIES:
                The Evolution of Community Networking

 By Jay Weston (jweston@ccs.carleton.ca)

 This paper, with only minor variations, was delivered as a talk at the
 FREE SPEECH AND PRIVACY IN THE INFORMATION AGE Symposium,
 University of Waterloo, Canada, November 26, 1994.

 ----------------------------------------------------------------------
 Copyright: This text is released to the public domain.  No copyright
            restrictions apply.  J. Weston
 ----------------------------------------------------------------------

 North American society  has had a lot to say on the distributed public
 media that we call the Internet, or simply the Net.  And, in the past
 year or so, we have started to have a lot to say about what we've been
 saying.  However, we haven't quite heard what we've been saying.  We
 haven't heard because we are inexperienced in listening to each other
 this way.  We are listening to the wrong things.   Or, as Karl Popper
 once put it, we have been "like my dog, staring at my finger when I
 point to the door."(1)  But, we can be forgiven for our misplaced
 attention to the Net.

 Since it was first observed that there just was not enough available
 bandwidth to let everybody send smoke signals or bang drums, we've
 been organizing and reorganizing to determine who would, and who would
 not, get their hands on the blankets and the drums -- and the presses,
 the microphones, and the cameras.  As we moved through a few
 millennia, successive public communication technologies either began
 as, or very quickly were made to conform to, the extreme send:receive
 imbalances that, somewhere along the line, we started calling the mass
 media, or simply the media.

 It would be pedantic in the extreme to do more than note that these
 access restrictions now define all of the social relations of modern
 societies.  Whole disciplines are organized around the understanding
 that all public and private institutions, all local and external
 spaces are bent by the constricted and compressed discourses of the
 mass media.  Whether the analyses are celebratory or critical, whether
 their mass media interdependencies are made explicit or not, all
 analyses of modern society take the access constraints of the mass
 media as immutable.  Public access to these media is simply not
 problematical.  On the one hand, there are the media and, on the
 other, there are their audiences, consumers, constituents, and
 publics.

 Until very recently, there was no reason to imagine that questions
 would ever have to be asked about societies with abundant access to
 the means of media production, exhibition, distribution, and
 reproduction of cultural offerings.  Suddenly, it is time to start
 imagining the questions.  That is what the Internet is about.

 Some usually astute observers, among them Internet Society President
 Vinton Cerf and Microsoft CEO Bill Gates, are predicting that the
 twenty million now on the Net is only the beginning.  Cerf predicts
 100 million by 1998 (2) and Gates, in a recent interview, confided
 that his big mistake so far had been in underestimating the importance
 of the Internet (3).  If they are right, if the hordes are going to
 start beating their drums in public, absolutely everything about the
 existing social order is about to be challenged.  Not simply the mass
 media institutions, but all institutions.  Everything is at stake.

 [If they are wrong, if the Internet is only the latest gizmology, then
 there is nothing to get intellectually excited about.  We've been
 there before.  For, as exciting or as terrifying as the prospect of a
 tiny 500 channel universe may be, it is just mass media business as
 usual, albeit new and unusual business.]

 Whether or not there will be 100 million or so people on the Internet
 by 1998 or so, will depend first, upon whether they want to be there
 and secondly, if they do, who will likely be trying to stop them, why
 will they be trying to stop them, and how will they be trying to stop
 them.

 As to the question of whether they will want to be, the Internet
 growth figures are familiar to us all.  Steeply up to the right and
 getting steeper.  This should be more than enough evidence that, given
 a chance, people are eager to be there.  Curiously, this inconceivable
 growth has occurred despite the equally familiar observations that the
 Internet is difficult to access, hard to use, slow to respond and,
 what is mostly to be found there is banal or otherwise offensive, and
 hopelessly disorganized.

 This apparent contradiction of millions actively embracing cyberjunk
 cannot be resolved within the vocabulary of the mass media with their
 well-organized, familiar, marvellously honed content packages, that
 are so quickly and effortlessly available.  Dismissive statements
 about the potential of the Internet that are based on the quality and
 delivery of content, cannot be resolved by debates about whether such
 statements are accurate or inaccurate.  For some, judging the Internet
 by its content, the quality of its information, and the accuracy of
 its databases, is relevant and for others it is not.

 For those for whom it is not, the Internet is less about information
 or content, and more about relations.  For the mass media, it is
 always just the opposite.  The mass media are almost pure content, the
 relationship a rigidly frozen non-transaction, that insulates the few
 content producers or information providers from their audiences. This
 is how we experience and understand the mass media.  If it were not
 so, we would not call them the mass media.  Five hundred or 5,000 more
 unswitched, asymmetrical, "smart" channels will not change that.

 It is, on the other hand, impossible to understand much about the
 Internet's appeal by analyzing its content.  The Internet is mostly
 about people finding their voice, speaking for themselves in a public
 way, and the content that carries this new relationship is of
 separate, even secondary, importance.  The Internet is about people
 saying "Here I am and there you are." Even the expression of
 disagreement and hostility, the "flames" as they are called, at least
 says "You exist.  I may disagree with you, or even dislike you, but
 you do exist."   Mass media do not confirm existence, and cannot.
 The market audience exists, but the reader, listener or viewer does
 not.(4)

 This is not to argue that the content of the Internet is irrelevant.
 The content defines the relationship.  People not only want to
 represent themselves, they ordinarily want to present themselves as
 well as they can.  It would be cynical in the extreme to devalue
 these representations, the texts, the exhibited cultural products of
 tens of millions.  It is rather to argue that the relational aspects
 of the transactions qualify and define the content in ways that need
 to be understood if the Internet it to be comprehended.

 Whatever the reason for millions speaking publicly, this condition was
 not part of the mass media problematic.  It is unreasonable to think
 that merely tinkering with paradigms grounded in technologies of
 restricted access will permit a rich interrogation of the range of
 social relations provided for by technologies of unrestricted access.

 This call for a vocabulary that directly addresses the centrality of
 distributed public media is not a suggestion that paradigms that
 centrally situate mass media are somehow of less importance than they
 once were.  If anything, their questions of access, production and
 representation are more critical, and even more challenging, than they
 were before distributed media raised the complexity of social
 relations.  However, an expanded universe of mass media discourse that
 merely attempts to overlay distributed public networks upon the
 structured relationships of a mass mediated society, will lead us to
 misunderstand a society evolving with distributed public media.

 It is well-understood that, all social institutions have their
 relative certainties made possible by the centralizing power of the
 technologies of mass communication.  The relative certainties that
 accompany attenuated access to the means of symbolic production is
 welded into the fabric of all institutional policies and practices.
 Assuming, then, that access to the means of cultural expression will
 be increasingly distributed, it follows that all of the institutions
 of modern society will be threatened or at least inconvenienced by
 this development.  While expressions like "public involvement", and
 "participative democracy", are imbedded in our rhetorical traditions,
 their unquestionable acceptability has always been conditional upon
 their equally unquestionable non-attainability.  The technologies of
 mass communication always ensured that involvement and participation
 would not be overdone.

 When the institutions that rose to power in the wake of the industrial
 revolution began to speak of the "information revolution", they only
 meant to digitize the modern industrial state.  This non-revolution
 was Phase II of the old boys' operation, another remodeling of the
 modern apparatus.  The "Information Highway" is the updated codeword
 for the modern retrofit.  This was not supposed to be about a
 technological adventure that would reconfigure social relations or
 blur the well-constructed boundaries between the public and the
 private ground.  This was supposed to be about a five hundred, not a
 one hundred million channel universe.

 The becoming Internet, this decentered polity, is an accident that
 happens to expand the locus of direct, self-mediated, daily political
 involvement.  Those who previously had to make themselves presentable
 to the agencies of mass communication technologies in order to be
 represented by the technologies, have begun to publicly represent
 themselves.  What was previously local, domestic, idiosyncratic and
 private can, for the first time, become external and public.  This is
 an abrupt  reversal of the mass media's progressive appropriation of
 the idiosyncratic and private for their own institutional purposes.

 Since this reversal was unimaginable, no contingency plans had been
 imagined for dealing with it.  But, to the extent that the expansion
 of the public ground challenges become identified for any segment of
 the established order, these challenges will be met.  It is axiomatic
 that the Internet and, by extension, public community networks can
 expect massive pressure to diminish or eliminate the identified
 destabalizing influences that these distributed media exert.  If the
 Internet, with its changed relations of production and related
 exigencies, is signaling a coming Accidental Revolution, the contests
 and the casualties will be enormous.

 This symposium is about the skirmishes, battles and wars that have
 already started.  All of these encounters are around the legitimacy of
 public self-expression, assembly, examination and privacy.  These are
 the problematic of distributed public media, not of the mass media.
 Beyond our noting that they were lamentably unimportant, the concerns
 relating to freedom of speech were not central to a mass mediated
 society.  Our familiarity with freedom of speech was almost entirely
 abstracted from the mass media accounts of their own experiences and
 the performances of their own legal departments.  The mass media
 tested the limits of those freedoms for the speechless public.

 We are now in the beginning stages of defining the legitimacy of
 self- expression for ourselves.  This represents a new set of
 concerns about the circumstance and substance of distributed media
 texts in all of their modes, the bases upon how it comes to happen
 that people 'speak' publicly, and what it is that they 'say'.  The
 idea of 'assembly' and how it will happen that groups come to
 occupy territory and how they are distributed globally and locally
 assumes original importance, as decisions get made about what
 'virtual communities' will be, and where they will situate.  The
 privacy puzzles about the availability and use of all those
 sophisticated watching, listening, storing, sifting and intrusive
 devices are a humbling reminder of just how much our reach has
 exceeded our understanding of these technologies.  How these
 matters are resolved will shape the distributed media and decide
 their social relevance.

 Community networks are contributing a broader distribution of voices
 as these puzzles begin to get worked out on the distributed media
 themselves, rather than only in the exclusive enclaves of special
 interests.  This must continue and expand or the awakening of self-
 representation will be short lived.  It would be wise to assume that
 there are not yet any 'rights', or that the old freedoms that were
 often hard won by the mass media, are now enshrined and will
 automatically transfer to distributed public media.


 Situating Community Networks


 If, as Bruce Sterling observed in the Afterward to his earlier work
 The Hacker Crackdown, "Three years in cyberspace is like thirty years
 anyplace real" (5) and, as events from thirty years past are often
 dimmed or forgotten, I hope you can forgive me for reminding
 you this morning that way back in November, 1991 the Canadian public
 had no access to the Internet.  Moreover, there were no signs that the
 public would have any access.

 The steepness, even then, of that now overly familiar Internet growth
 curve was entirely attributable to new users from within their
 formal institutional settings.  The universities, research institutes
 of the telecommunication giants, and a few government departments had
 the Internet as their private preserve and tightly controlled access
 to it, often denying entry to even their own (6).  This control
 existed, even although the administration of these institutions were
 still marvellously unaware of what was going on in their basements.
 Though unintentional, the Internet was still a well-kept secret, its
 threat to the status quo still largely unrecognized.

 The commercial online services were busily avoiding the Internet,
 still building the firewalls around their own proprietary
 networks.  Their fees were so high, and their services so meagre,
 that they were providing little incentive for the general public
 to even begin to experiment with their narrow networking
 offerings.

 The recurring telco dream of local metered service was a constant
 reminder that the Canadian public might never experience the Internet.
 Failure of poorly conceived commercial network services like Bell
 Canada's "Alex" and Australia Telecom's "Discovery" had convinced the
 telcos that not even the business community was ready for network
 services.

 The Canadian Network for the Advancement of Research, Industry and
 Education (CANARIE), as its name implied, betrayed no awareness that
 there might be people in this country.  Even by the end of 1992 when
 CANARIE released its business and marketing plans, the hundreds of
 written pages devoted to its vision made almost no reference to the
 Internet, and carefully avoided the 'public' as serious participants
 in what the partners had in mind for the country.(7)

 These are but a few isolated examples of the evidence that the
 Internet had either not yet penetrated the collective institutional
 consciousness or was enjoying a brief period of benign neglect.  For
 those who had experienced the Internet and begun to internalize even a
 small amount of what was happening, the general inattention seemed
 amazing, even eerie.

 One thing was very clear.  With no public or private restrictive
 policies in place, if there was ever a brief moment when it might be
 possible to unleash the Internet in Canada, to really unconditionally
 distribute this distributed capability to the Canadian public, it was
 1991.  (The National Capital FreeNet and the Victoria Free-Net were
 not actually unleashed until late 1992, but the idea was developing in
 the autumn of 1991.)(8)

 The full stories of how the first Canadian community networks managed
 to uncage the Internet should probably be told some day.  These
 stories need to be told to fill in the historical record, and to
 preempt any misconceptions that the development was simply blind
 luck or simply technology running its inevitable course.  For now, it
 is enough to say that the freenet initiative in Canada was understood
 and intended from the very beginning as political action.  At least,
 it was in the instance of the National Capital FreeNet, the community
 network where I live and, about which I am best able to speak.

 It was understood from the first, for instance, that the relatively
 narrow and concrete act of having electronic mail and Usenet
 newsgroups available, and at their real cost to the community, would
 ensure widespread acceptance, and that the acceptance rate would be
 stunning.  It was also understood that once these were made freely
 available, it would be difficult to take global electronic mail away,
 or to introduce it at the leisurely rate and higher tariffs that are
 customary with market driven services.

 More importantly, it was understood that the inclusionary ideals and
 vocabulary of the Freenet would both protect and sustain the
 initiative after the private sector realized that a public market for
 networked services was being created for them.

 The National Capital FreeNet was an imagined public space, a dumb
 platform where all individuals, groups and organizations could
 represent themselves, where conflict and controversy could occur
 as the manifestation of conflict and controversy already occurring
 within the community.  As a public space, no one, and certainly no
 group or institution, would be held responsible for another's
 ideology, moral standards, expectations or motivations.  On the
 other hand, each person or organization would be accountable for
 themselves.  Such a space could be constructed only by the
 community acting as a community, and not by any public or private
 organization acting on behalf of the community.  At least that was
 the idea in 1991.

 Just three years later, the Net situation has changed dramatically.
 Although still unreasonably expensive, commercial Internet access is
 fairly readily available, and very shortly community networks like the
 National Capital FreeNet will not be needed, or even wanted, as
 Internet access points.  FreeNets will have to become the vital, local
 public spaces they originally promised to be.

 Just calling the facility a community network does not make it
 one.  The label does not ensure an unconditional public terrain
 where the whole community can celebrate its commonalities and
 diversities, and work through its differences.  In 1991, there was
 not much urgency to focus on these ideals.  Access to the existing
 and emerging Internet services, and at no involuntary cost, was
 enough to ensure a community network's success.  It was not then
 understood by the community networks that this powerful Internet
 access lever would slip away so quickly.

 Community networks must now understood that they must be community
 networks.  This means that they cannot be financed or run for the
 community by one or another institution.  Although networks run by
 such organizations as universities, hospitals, telephone
 companies, or governments, often do not charge a fee, and always
 provide an array of valuable services, these are not the criteria
 by which community network can be usefully defined.

 Community networks run by other organizations are always
 conditionally invested with the values, missions, mandates,
 policies and procedures and other constraints necessarily imposed
 by the host institutions and, therefore, cannot ever provide a
 public terrain.  No institution has a primary mandate to provide a
 public space where public opinion can be under construction.  When
 freedom of expression is a secondary add-on, it is just that, and
 will be encouraged only so long as it is not in conflict with what
 the institution is primarily about.

 Today's youthful community networks, are better than they have any
 right to be this soon and are still our best hope, maybe our only
 hope, for a more participative, more self-representative democracy.
 It is too bad that they will have to mature so quickly if they are to
 reach adulthood.  While they are still critical Internet access
 points, still the bridge between the vast diversity of the Internet
 and the more homogeneous organic community, they must take that
 opportunity to learn how to celebrate the vast diversity that is
 also the local community.  The local community is where people live
 their social and political lives and that is where differences must be
 publicly worked through.  This is most important where the differences
 are the most acute and where the latitudes of tolerance are the
 narrowest.  Community networks must be up to letting everyone speak,
 as painful as this will be for some, some of the time.

 Children, and others unequipped to make safe judgments when
 encountering the most extreme clashes of values, opinions and
 advocacy, must be protected from these conflicts, but the community
 network cannot be their guardian.  The family, the school, the place
 of worship and other societal structures are their guardians.

 Finally, and most importantly, the part-time, short-term stewards of
 the community networks, usually called the 'board', must understand
 that the public terrain is not their institution, and not their moral
 preserve.  The construction of Public Sphere, Inc. is a betrayal of
 the promise community networks have for becoming a public terrain.  As
 community networks develop and mature, they are becoming more
 exclusionary, more restrictive, more like any other organization.
 They begin to see themselves as providing something for the community,
 rather than as caretakers of a space created by the community.  This
 needs to be reversed.  A commitment to defending and expanding this
 public ground will determine whether community networks will survive
 more than a few more year and, what is more, whether their survival
 will be a matter of importance.



 Endnotes

 (1) Popper made the statement at a public lecture at Michigan State
     University in the mid-sixties.  Ironically, he was arguing that
     the then popular social science translations of the electrical
     engineering 'information theory' model were misguided attempts
     to understand social communication by what he termed 'bucket
     theories', where the transactions are comprehended only as buckets
     of content, devoid of any human consideration.

 (2) Written testimony to United States House of Representatives,
     Committee on Science, Space and Technology, March 23, 1993.

     When asked what he thought about the reliability of Cerf's
     estimate of 100 million Internet users by 1998, Gerry Miller,
     Chairman of CA*net, the non-profit company that manages and
     operates the Canadian Internet backbone network, responded wryly
     "Try 100 million hosts."  While Miller might not have meant that
     literally, it was clear that he felt Cerf's earlier estimate to
     now be a significant underestimate of expected Internet growth.
     Private conversation, Ottawa, November, 1994.

 (3) PC Magazine, "Bill Gates Ponders the Internet" by Michael Miller,
     October 11, Volume 13, Number 17, 1994 p79.

 (4) An explication of framing human communication as the inevitable
     interplay of content and relational components of symbolic
     transaction was provided by Paul Watzlawick, Janet Beavin and Don
     Jackson in PRAGMATICS OF HUMAN COMMUNICATION.  This 1967 monograph
     has attracted little attention from media scholars and other
     social theorists, probably because the unidirectional
     producer/consumer relationship between the mass media and their
     audiences is fixed, thereby eliminating or greatly inhibiting the
     metacommunication interplay.

 (5) Bruce Sterling, "Afterwards: The Hacker Crackdown Three Years
     Later", January 1, 1994.  Found on the WELLgopher
     URL: gopher://gopher.well.sf.ca.us:70/11/Publications/authors/
          Sterling

 (6) For example, undergraduate students in most programs at most
     Canadian universities could not get computer accounts in 1991.
     Also, many of the first cohort of National Capital FreeNet
     subscribers were federal civil servants from departments and
     ministries where Internet access was available, but only to a
     selected few.

 (7) CANARIE Associates, "CANARIE Business Plan" and "CANARIE Marketing
     Plan", July 15, 1992.

 (8) The National Capital FreeNet was inspired by the Cleveland
     Free-Net, founded in 1986 by Tom Grundner at Case Western Reserve
     University.  "Free-Net" is a registered servicemark of the
     National Public Telecomputing Network.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    INFORMATION SUPERHIGHWAY: REALITY

 By Reid Goldsborough (reidgold@netaxs.com)

 Here's some information on the information superhighway you may find
 interesting. These are excerpts from the first chapter of a new book I've
 written, published by Macmillan Publishing/Alpha Books and titled
 "Straight Talk About the Information Superhighway." The book discusses in
 detail how this national network will affect all aspects of our lives,
 from interpersonal relationships to jobs, from health care and education
 to entertainment and shopping.

 In the book I try to present both plusses and minuses, honestly and
 without either hype or cynacism. In addition to covering the likely near-
 and medium- term future, the book also discusses the current state of
 Internet culture.

 ***

 "Information superhighway" is really just a shorthand term for many
 different networks that will be used for the delivery of information,
 communications, and entertainment. Once the kinks get worked out, it's
 expected -- or at least hoped -- that most of these networks will connect
 with one another, leading to a seamless national, or international,
 communications matrix.

 --

 When the movers and shakers talk of the information superhighway, most of
 them think in terms of one of two visions. The first is of a cerebral
 highway, where information and communications are the key commodities
 transferred. The second is of an entertainment highway -- sometimes
 disparagingly referred to as a "couch potato highway" -- where movies,
 TV shows, interactive games, and home shopping offerings are the more
 prevalent content.

 Those who see the information superhighway as an extension of the Internet
 see additional types of information being made available to personal
 computer users -- voice, music, and full-motion video. Those who favor the
 entertainment-based vision see the information superhighway as an extension
 of cable TV. Only instead of waiting for movies or programs to come on,
 you'd be able to watch just about anything you wanted anytime you wished.

 The entertainment vision is favored by those who would profit from it --
 cable TV companies and telephone companies, both of whom will be building
 the broadband pipelines and delivering the multimedia content into homes
 over the coming years. The information vision, on the other hand, is
 favored by the computer industry and particularly by the online community,
 which views the cable TV and telephone companies as threats to the low-cost
 sharing of information that exists today.

 --

 Not everybody is enamored with the idea of the information superhighway.
 The information superhighway, say critics, is a bad metaphor for a
 boondoggle that big business wants to build with your tax dollars. If it's
 ever finished, you'll pay big bucks for ten times more channels to watch
 reruns of The Lucy Show. If it ever is finished. Critics contend the
 technology won't be ready for prime time for years to come.

 --

 The uncertainty surrounding an undertaking as large as the information
 superhighway in many ways *is* frightening. "I guess the scariest part is
 that you don't know where it's going to lead," says John C. Malone,
 president and CEO of Tele-Communications Inc., the country's largest cable
 TV company and a major information superhighway player. "This is a
 technological and business structure revolution. Nobody can sit here today
 and predict where it's going and what its impact is going to be on any
 particular industry, any particular company, or any particular individual."

 Fortunately, fear of change isn't stopping our forward momentum.  As you'll
 see in the following pages, people are using communications technology
 today -- and planning to use enhanced services tomorrow -- in a host of
 fascinating ways. The changes happening now truly represent a revolution,
 a revolution that will transform jobs, education, relationships,
 entertainment, shopping, health care, and politics, a revolution in which
 you can play a part.

 ***

 If you'd like to read more, the following will help you decide if it's
 worth it to you to buy the book. Please note that I mention specifics,
 including price, so if you object to commercialism of any sort, don't read
 the rest of this message.

 In writing the book, I interviewed key industry leaders such as Bell
 Atlantic Chair and CEO Ray Smith and former Apple Chair and CEO John
 Sculley; top government officials such as FCC Chair Reed Hundt; industry
 and government watchdogs such as Ralph Nader; social commentators such as
 Dr. Joyce Brothers (on relationships and sex on the Internet today and
 information superhighway tomorrow); and people like you using today's
 online services.

 I also relied on demonstrations of emerging information superhighway
 technology; important government white papers; key speeches and
 Congressional testimony by politicians, company CEOs, and community
 leaders; and my own explorations of today's online and multimedia worlds.

 "Straight Talk About the Information Superhighway" covers topics
 relevant to online users, including:

 *  The top sources of online information and entertainment today
 *  Online shopping, advertising, and the commercialization of cyberspace
 *  Online job searching
 *  First-hand accounts of love in cyberspace and tips on how to find it
 *  Computer-enhanced sex
 *  The spiritual underpinnings of cyberspace
 *  The psychology of flamewars
 *  Computer nerd jokes
 *  Computer addiction
 *  How interactive TV will differ from today's passive offerings
 *  The combination PC/TVs of tomorrow
 *  The telephone/cable wars
 *  Privacy, access, and freedom of speech
 *  Avoiding infoglut with intelligent agents
 *  The future of multimedia and virtual reality
 *  Distance education
 *  Telemedicine
 *  Personalized news
 *  Direct democracy
 *  Grass-roots organizing over the Internet
 *  New trends in telecommuting

 "Straight Talk About the Information Superhighway" by Reid Goldsborough
 is published by Macmillan Publishing/Alpha Books (ISBN: 1-56761-513-9).
 You should be able to find a copy in your local bookstore. If not, you
 can ask them to order a copy or you can order the book directly from
 Macmillan Publishing by phoning (800) 428-5331. The cost is $19.99.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         INTERNET TOOLS SUMMARY

 By John Arthur December (decemj@jec310.its.rpi.edu)

 Hello,

 I've updated my list summarizing Internet tools for Network
 Information Retrieval (NIR) and Computer-Mediated Communication
 (CMC).  This list gives definitions and references to
 documentation and demonstrations of these tools.

 The list is available in several formats: text, 80-column text,
 compressed postscript, html, tex, or dvi.

 These files are available via anonymous ftp:

    Anonymous ftp host:  ftp.rpi.edu
    Directory:           pub/communications/
    Files:               internet-tools {.txt .ps.Z .dvi .html}

    See file: internet-tools.readme for more information.

 For Web access, see the "segmented" hypertext version at:

    http://www.rpi.edu/Internet/Guides/decemj/internet-tools.html

 FILES
 =====
    Basically,
       o internet-tools.ps looks best for reading on paper.
       o internet-tools.txt is good if you want the 80-column constraint.
       o internet-tools is great for manipulating with Unix scripts.
       o internet-tools.html is useful in a WWW browser;
         Connect to URL:
         http://www.rpi.edu/Internet/Guides/decemj/internet-tools.html

 CONTENTS:
 =========
  * Section -0- HOW TO USE THIS DOCUMENT
  * Section -1- ABOUT THIS INFORMATION
    o Notes
    o Formats
  * Section -2- NIR = NETWORK INFORMATION RETRIEVAL
    o Utilities
      - Finger
      - Netfind
      - Nslookup
      - Ping
      - Shepherd
      - TIA = The Internet Adapter (tm)
      - WHOIS
      - X.500
    o Tools
      - Alibi = Adaptive Location of Internetworked Bases of Information
      - Archie
      - Astra
      - Bitftp
      - Essence
      - FSP = File Service Protocol
      - FTP = File Transfer Protocol
      - Jughead
      - Knowbot
      - Maltshop
      - Netserv
      - Soft-Pages
      - Spiders
      - Telnet
      - Trickle
      - Veronica
    o Systems
      - Alex
      - GN
      - Gopher
      - Prospero
      - WAIS = Wide Area Information Server
      - WWW = World Wide Web
    o Interfaces
      - Lists
      - Biomix
      - Chimera
      - Cello
      - Compass
      - Emacs-WWW-browser
      - Fred
      - GINA
      - Hyper-G
      - Hytelnet
      - Internet-in-a-box
      - Minuet
      - Mosaic
      - Lynx
      - Netscape
      - Samba
      - SlipKnot
      - Viola
      - Willow
  * Section -3- CMC = COMPUTER-MEDIATED COMMUNICATION
    o Interpersonal
      - Email
      - Talk
      - ZTalk
    o Group
      - Collage
      - CU-SeeMe
      - Haven
      - Lily
      - Listproc
      - LISTSERV
      - Majordomo
      - Maven
      - MU* = Multiple-User Dialogue/Domain/Dungeon
      - Procmail
      - WIT = Web Interactive Talk
      - WW = Web World
      - Yarn
    o Mass
      - ICB = Internet Citizen's Band
      - IW = Interactive Webbing
      - IRC = Internet Relay Chat
      - ITR = Internet Talk Radio
      - Mbone
      - Usenet
    o Interfaces
      - exMOO
      - htMUD
  * Section -4- STANDARDS
    o Collections
    o Internet
    o Other
  * Section -5- REFERENCES
  * Section -6- DESCRIPTION OF ITEMS

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 LEGION OF DOOM T-SHIRTS!! Get 'em

 By Chris Goggans <phrack@well.sf.ca.us>

 After a complete sellout at HoHo Con 1993 in Austin, TX this past
 December, the official Legion of Doom t-shirts are available
 once again.  Join the net luminaries world-wide in owning one of
 these amazing shirts.  Impress members of the opposite sex, increase
 your IQ, annoy system administrators, get raided by the government and
 lose your wardrobe!

 Can a t-shirt really do all this?  Of course it can!

 "THE HACKER WAR  --  LOD vs MOD"

 This t-shirt chronicles the infamous "Hacker War" between rival
 groups The Legion of Doom and  The Masters of Destruction.  The front
 of the shirt displays a flight map of the various battle-sites
 hit by MOD and tracked by LOD.  The back of the shirt
 has a detailed timeline of the key dates in the conflict, and
 a rather ironic quote from an MOD member.

 (For a limited time, the original is back!)

 "LEGION OF DOOM  --  INTERNET WORLD TOUR"

 The front of this classic shirt displays "Legion of Doom Internet World
 Tour" as well as a sword and telephone intersecting the planet
 earth, skull-and-crossbones style.  The back displays the
 words "Hacking for Jesus" as well as a substantial list of "tour-stops"
 (internet sites) and a quote from Aleister Crowley.

 All t-shirts are sized XL, and are 100% cotton.

 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
 postage.

 Send checks or money orders.  Please, no credit cards, even if
 it's really your card.


 Name:       __________________________________________________

 Address:    __________________________________________________

 City, State, Zip:   __________________________________________


 I want ____ "Hacker War" shirt(s)

 I want ____ "Internet World Tour" shirt(s)

 Enclosed is $______ for the total cost.

 Mail to:   Chris Goggans
            603 W. 13th #1A-278
            Austin, TX 78701

 These T-shirts are sold only as a novelty items, and are in no way
 attempting to glorify computer crime.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%-----------------
 
               INTERVIEW WITH ERIK BLOODAXE

 By Netta Gilboa

 Interview with Erik Bloodaxe (GRAY AREAS REPRINT)
 The following are portions of an interview with "Erik Bloodaxe" by Netta
 Gilboa of Gray Areas Magazine.  Gray Areas is an eclectic arts and culture
 magazine that focuses on the fringes of society. It's one of the best
 sources for information on rock and alternative music, controversial
 social issues, computer culture, and other topics that aren't covered
 elsewhere. It's a steal  $18 for four issues, or $50 for three years. For
 information, write:

 Gray Areas
 PO Box 808
 Broomall, PA 19008-0808

 Or, e-mail them at grayarea@well.sf.ca.us

 For those new to computer culture, "erik bloodaxe" was a member of
 the original "Legion of Doom," a modest media celebrity, and
 more recently, the editor of Phrack)).

 ((Excerpts from interview with Chris Goggans at Pumpcon, 1993. From:
 GRAY AREAS, Fall, 1994 (Vol 3, #2): pp 27-50))

 By Netta Gilboa

 Netta Gilboa: What is Phrack magazine?

 Chris Goggans: Phrack is the longest running underground publication.
 I don't really know how to describe Phrack. Phrack just sort of is.
 Phrack is an electronic magazine that deals with topics of interest to
 the computer underground; different types of operating systems,
 weaknesses in system architectures; telephony; anything of any
 relevance to the community in which it was intended for, that being
 the computer underground. It has always tried to paint a picture of
 the social aspects of the computer underground rather than focus
 entirely on technical issues. So in that way it adds a lot of color to
 what's going on.

 GA: How did you get involved with publishing Phrack?

 CG: Well, I got involved when the person who was editing it at the
 time, Dispater, got into a motorcycle accident and as a result of
 this, had a lot of other financial hardships, so he wasn't going to be
 able to do it any longer. Its original editors, Craig Neidorf (Knight
 Lightning) and Taran King, had no interest in doing it themselves any
 longer for, at least in Craig's case, obvious personal reasons, and
 there really was no one else who could take it over.  I was of the
 mind set that Phrack had been around so long that it had almost become
 something of an institution. I, being so ridiculously nostalgic and
 sentimental, didn't want to see it just stop, even though a lot of
 people always complain about the content and say, "Oh, Phrack is lame
 and this issue didn't have enough info, or Phrack was great this
 month, but it really sucked last month." You know, that type of thing.
 Even though some people didn't always agree with it and some people
 had different viewpoints on it, I really thought someone needed to
 continue it and so I kind of volunteered for it.  And there was a
 little bit of discussion amongst some people.

 First Craig was really hesitant to say, "Yeah, well maybe you should
 take it over." A lot of this was being held up by Taran King who said,
 "Well, we just don't want your politics getting involved." Because,
 apparently, I have some hidden political agenda that differed with
 what they thought the role of Phrack should play. Eventually they
 decided that there is really no one else who could do a job well
 enough to continue it in the spirit in which it had been formed and I
 started with issue 42. And I think that one went over very well.  That
 issue was pretty hilarious because it had a lot of stuff about packet
 switching networks, and it was a big slap in the face to B.T. Tymnet.
 I had a whole lot of fun with that issue. Since then, it's gone over
 really well, at least from everyone I've talked to. Of course there'
 have always been a few dissenters that say, Oh, Phrack sucks, but
 these are the same people who won't tell you why.  They're just saying
 it to try to get a rise out of me or something, but everybody seems to
 appreciate the time and effort that goes into putting this out and
 especially since I'm getting nothing out of it.

 There's kind of a funny side to that. After I took it over, I went
 ahead and I registered it with the Library of Congress and I filed a
 DBA as Phrack magazine and for the first issue I put out a license
 agreement, sort of, at the beginning saying that any corporate,
 government or law enforcement use or possession of this magazine
 without prior registration with me was a violation of the Copyright
 Law, blah, blah, blah, this and that and Phrack was free to qualified
 subscribers; however, in order to qualify as a qualified subscriber,
 one must be an amateur computer hobbyist with no ties to such a thing.
 And this really went over like a ton of bricks with some people.  A
 lot of corporate people immediately sent back, "Please remove my name
 from the list." I had a few other people say, well, "We're going to
 pay, but don't tell anybody we're going to pay." Of course, they never
 did. There was only one person who actually did pay, so, you know, I
 used that as wonderful ammunition for the next issue saying that all
 of them are lying, cheating scums and they have no respect for our
 information so why should they think it odd that we have any respect
 for theirs.

 GA: And you actually named a few people.

 CG: Yeah, I named several people who were not only getting the
 magazine but in one case, they were spreading it around and, of
 course, none of them even contacted me for registration.  It was all,
 I had a riot with it. It was a lot of fun. And, I'm still going to
 include that in every issue because I still expect them, if they're
 going to be reading my magazine, to please have some shred of decency
 and pay the registration fee, since it's a lot less than any other
 trade publication that they'd be buying regardless, and certainly a
 lot more voluminous and contains a lot more information than they're
 going to find in any other magazine dealing with computer security.

 GA: Is the agenda for that decision to get publicity, to have grounds
 to sue people who you don't like, or to gain financially?

 CG: Well, I never expected to gain anything financially. You know, a
 lot of the people who are still in the so-called "underground" are
 also working in various fields which might put them in conflict with
 the registration agreements, and we're very liberal about that. I
 mean, if someone just because they're working at, let's say...

 GA: Gray Areas, Inc.

 CG: Yeah, Gray Areas, Inc. or the people who might be independent,
 like LAN consultants, you know, just 'cause someone's working in the
 field, I'm real flexible about that. Then if someone sends me mail,
 and I get a lot like that, which says, "Well, I'm assistant
 administrator here at the university and there's no way they'll pay
 for it." I'm like, "Don't worry about it." You know, "We'll make an
 exemption in your case." But it's the people, the Gene Stafford's of
 the world, the Ed DeHart's of the world.  Those are the people who
 have always pointed the finger at the people who this information is
 intended for and called them bad.  They're the ones who don t register
 their subscriptions and the people of their mind set and the people of
 their ilk, I guess.

 As far as publicity, it didn't gain any publicity. It wasn't any kind
 of stunt. My biggest concern in doing this was to try to protect this
 information and I didn't want to see it being resold. With the prior
 Phracks up 'til 41, there are companies out there, for example Onion
 Press who sells hard copies of Phrack, and I don't want anything that
 I'm putting time and effort into being resold. I don't want it in the
 CD-ROMs. There's are several CD-ROMs out right now with a bunch of
 text files from the computer underground.

 So, I wanted to copyright this information, put it out. It's a
 magazine, I'm doing it, it's my magazine. The DBA is in my name, I
 hold the copyright and no one's going to resell this. If it's going to
 be presented in some other format, I want to be able to control that.
 And, it's not necessarily a kind of power play. It's just I want to
 protect it.  I mean, I don't think you'd appreciate people all of a
 sudden saying, "Now I'm going to put up the electronic version of Gray
 Areas."

                        =======================

 GA: Many years ago, Phrack had a problem with a telephone company
 regarding a document that they printed, and a lot of people have said
 that if it was a paper publication as opposed to an electronic
 publication, that might never have happened.

 CG: Yeah, well, I mean, that's obvious.  You  look at magazines like
 2600 and just because they're black letters on a white page instead of
 white letters on a black screen, they get away with a lot of stuff.
 They get threatening letters from Bell Cores. They like to publish
 them in their magazine, but they haven't been taken to task for any of
 that. You don't see them in any sort of court for this and the mere
 fact that the very document that they are saying was so proprietary
 was available for $19.95 from the Bell Core order line. That sort of
 stands to prove that they were just looking for a scapegoat, a
 figurehead in the underground community to use as an example for the
 rest of the people to say, "Well, we'll take down Phrack.  That'll
 show them. That'll scare them."

 It's the same kind of thing that they tried to do with The Legion of
 Doom.  They said, "Well, we took down the Legion of Doom." I heard it
 from one person, you know, you cut off the head, the body will die.
 It's like, AT&T or somebody had somebody map out the computer
 underground, they had Phrack magazine in the middle of a hub and the
 Legion of Doom above that; arrows going and pointing out how the
 computer underground networks together, and obviously, these people
 think there's a little more structure to it than there is. They don't
 realize that it's complete anarchy. I mean, no one's controlling
 anybody else's actions. To set out one example and hope that everybody
 else is going to learn from that one example is ludicrous.

 GA: What sort of problems do you encounter publishing it?

 CG: It takes up a lot of my time, my spare time, which is growing
 incredibly smaller and, I mean, I've overextended myself on a number
 of projects and since I've definitely got a commitment to Phrack, it's
 one that I can certainly shirk if I decided to since I'm not indebted
 to anybody to do it really. I'm not going to pass it up because I
 really want to make sure it continues to be published. That's the
 biggest problem I face, time.  Then there are people who say, "Oh, I'm
 going to send you a file on this," and they don't. You know, thanks a
 lot. And I always rag on those people.  In fact, in the beginning of
 Phrack 44, I said, "Yeah, and for the people who said they're going to
 send me a file and didn't, you know who you are, and you always have
 to live with your own guilt." I mean, it's typical hacker stuff. "I'm
 going to do this." And they start it and they forget about it.

 GA: It's funny though because I've had incredible cooperation from
 those people; more than I've had from any other community that we deal
 with.  Do you think it's because I'm a girl or because it's on paper?

 CG: Well, it might be a little of both. The kind of files that go in
 Phrack, I don't think Gray Areas is going to publish. You know, how to
 use the Role 9000 CBX, or here's how to hack system 75's, or secret
 sectors and units, or publish C programs. You get a different type of
 thing.  Maybe there are people who feel a lot more comfortable writing
 cultural type pieces or special interest pieces than they would
 writing technical stuff. And to try to compensate for that.  I've put
 in a lot more stuff in the issues that I've been dealing with, to deal
 with the culture. Like I started something last issue trying to get
 people from different countries to write about what it's like in that
 country. And I had a file in from Ireland; I had a file in from
 Germany; I had a file in from Canada. This issue I've got another one
 from a different part of Canada and I've got one from Sweden and I'm
 waiting on a couple of others. Because, as the computer underground
 goes, it's, people like to have this idea that it's this closely knit
 thing of all these hackers working together, and see how they're
 trading information. But it's not. I don't know anything that's going
 on in other countries except for what the few, select people from
 those countries who hang out in the same areas that I do tell me.  But
 there's so many people and so many countries doing things.

 They've got their own little pirate wares, trading scenes, they've got
 their own little virus scenes, they've got their freaking things.
 Stuff that works on their own system, only works in their country; and
 they have their own secret ways of doing things, and their own
 networks that they like to hack, and they all hang out on certain
 deals and they have their own little lore about the busts, or super
 hackers from their country, and that's the kind of stuff that's just
 great to find out. Because, otherwise, you would never know. And it's
 really, really interesting to read what these people are up to and no
 one names names. They're just talking about what it's like to be a
 hacker in their country, and that's the kind of cool stuff that I
 want to continue to do.

                        =======================

 GA: I suppose we should get into your background and how you became
 qualified to run Phrack.

 CG: I don't know if it's a qualification to run Phrack...

 GA: Well, obviously, there are an awful lot of people who could have
 been considered but weren't.

 CG: Yeah, well, I guess so.

 GA: What sort of stages did you go through?  From the time that you
 first discovered computers and so on until today?

 CG: I kind of went through an exponential learning curve from the very
 beginning and it plateaued out for a while and it's just been a steady
 growth since then. At least I tried to maintain that because there's
 so many new developments that come out and I try to stay abreast of
 everything that's going on. I started messing around with computers a
 very long time ago. For any number of reasons, I always have problems
 trying to place the exact date.

 GA: What sort of computers were there?  That dates it a little.

 CG: Well, the very first computer I did anything on with a modem was
 an Apple II, and a micro modem II. It was a friend of mine's dad's.
 He was a lawyer. He got it so he could get on Dialogue,  because it
 was like the brand new service for lawyers. They could go on and look
 up legal briefs and it was all exciting. So, this friend of mine was
 showing it off, I guess maybe 5th grade, 6th grade, somewhere around
 there?  A long time ago. And, in order to get on Dialogue, you had to
 dial this special number. Well, we got on, followed the instructions,
 got on Dialogue, looked at it, said, "This is really cool." And we
 noticed that, "Well, gee, in order to get on Dialogue, you have to
 dial this number" which was 415 something. Well, what happens if you
 type in a different number? So we typed a different number somewhere
 else. And, that was sort of it.

 We spent the vast majority of that night trying different addresses on
 Telenet and actually got into a system. And, this was the first time I
 had ever been on a modem and, I mean, it was just natural. We were
 like, wow! We didn't have any concept of what a network was, we
 couldn't imagine what this  meant. The concept of being able to call
 one little number and connect to computers around the entire country
 was so mind boggling, so strange to us that we were sucked into it.

 As a little bit of background to this, I had already been messing
 around with telephones before this and this is a ridiculous story that
 a lot of people give me a lot of s--- about but, I mean, I don't
 really care. A friend of mine and I had stolen a dirty magazine from a
 convenience store and rifling through it, it was like a High Society
 or something like that.

 GA: Probably not. There were no such things then. They didn't start
 until 1975-76.

 CG: Well, this is back in 1980. I'm not that old. I turned 25 in May,
 so it wasn't that long ago I guess in the grand scheme of things.
 But, to me it was a hell of a long time ago. So anyway, we had stolen
 a High Society from them and in it, it said, "Call this number right
 now." It was 212-976-2626 or 212-976-2727, a brand new service.  I
 said, "We got to call that number. We can't call that number, that's a
 long distance number, we'll get in trouble." It was like, "No, we
 gotta call that." So, we went back over to his house, and his Mom
 works. She was working, it's funny, she was actually working at
 Datapoint. She was at work, it was the summer, so we got there and
 dialed it up, listened to if for, like you know, some phone sex
 recording. Wow! You're a little punk kid, of course, that's just great
 to hear some crazy recording like that.

 We hung up after it was over and were like, "Man, that's great.  We're
 going to have to call that other one.  No we can't call the other
 one.  He says, "Well, actually maybe we can, but if we're going to
 call it, we need to use this thing that my Mom's got." What thing? He
 said, "Well, it's this thing that's supposed to make her phone bill
 cheaper."  And, it was a company that started up way back then called
 LDS. It was a Watts re-seller and they had a local dial-up number, you
 call up and you gave the operator who answered the phone a code, you
 read it out to her and she connected the call. I think at that time it
 was a four or five digit code.  So we called up, gave it to her, gave
 her the number, the call went through. So, next time you call her
 back, give her someone else's number. Goes, "nah."  So we called up,
 added ten to the number we had and placed the call. It was like,
 "Well, that's really cool." And it's funny that I've done that prior
 to doing anything on the computer because shortly thereafter, after
 being on the computer and discovering networks and after that,
 discovering bulletin boards, it became readily apparent to me how the
 marriage of the two was inevitable because there was no way in hell
 I'd be able to call a bulletin board any place other than down the
 street and not get beat to death by my parents for raking up very
 large phone bills. And after that, it kind of just shot up
 exponentially like I said before. From such humble beginnings.

                        =======================

 CG:  Which connected, at the time, I think now they have limits as to
 how many people. At the time, it was basically unlimited.  You could
 take as many people as you wanted on your conference. And they had a
 lot of different features that they don't have now. Like, you could
 transfer control. And we used to do all sorts of ridiculous stuff.
 One of my favorite tricks was to call up Directory Assistance and, at
 the time, I don't think they do this any more, I haven't really
 bothered to check in about five years, but at the time, Western
 Digital who made all the automatic call distribution systems for
 Directory Assistance since they were still the Bell system; they had a
 feature in there that would send it into a test mode.  If you called
 up and just as the ACD system kicked in, it started to cue a call for
 the next available operator if you held down a D tone.  A lot of your
 readers might not know this, but on a standard touch tone phone, there
 are really four rows and four columns and not three rows and four
 columns. There's an extra column that's left out and that's A, B, C,
 and D. Well, I had a phone that had A, B, C, and D on it. There's a
 number of different ways to build a tone generator, they'll do that
 and a lot of modems will make those tones or what have you. But,
 anyway, there was a trick at one time by holding down the D tone, if
 you called Directory Assistance, it'd throw the ACD into its
 maintenance mode. And, one of the features on this was to do a test of
 a circuit by establishing basically a loop so, if someone would call,
 hold down a D, get thrown into the maintenance mode, get the 5 key,
 they'd get onto one side of the mode.  Someone else could call back
 in, hold down the D key, hit 6, get on the other side of loop, and
 then you could talk.

 Well, I used to call Directory Assistance from the conference, hold
 down the D key, hit 5, add that into the conference, the loop,
 transfer control to Directory Assistance and then call back in on the
 other side of the loop and then take control of the conference that
 way.  So, if any of the test people who were working on the software
 for Alliance and working on getting the bugs worked out of everything,
 if any of the engineers would go back to look and see why these
 circuits were active and they'd look to see who was running control of
 this conference, they'd see it was Directory Assistance and it really
 used to confuse the hell out of them.  We got a great deal of mileage
 out of that because, you know, I don't really think they knew how, but
 somehow it kept going. But anyway, on these conferences, I got hooked
 up with a group of really, really, really, really smart people and by
 sitting and talking with these people, and learning what they knew,
 because like I said before, everyone was really open and everybody
 wanted everybody to learn. If more people were working on a project,
 everybody had a better chance of learning and succeeding then if just
 one person decided to hoard it all to themselves.

 >From being on these conferences and talking about to all of these
 people and sharing information with all of these people, I was
 eventually asked to join a group that was being formed at that time
 and it ended up being called The Legion of Doom.

 GA: How did it get called Legion of Doom? Who named it?

 CG: I don't know. The person whose idea it was to start the group, his
 handle was Lex Luther and from the DC Comics, Lex Luther's infamous
 group of anti-heroes was The Legion of Doom, so it was pretty a
 natural choice.  A lot of stuff has been attributed to it lately, such
 as it being a sinister type name. Well, Lex Luther couldn't possibly
 have called his group anything other than the Legion of Doom.  Anybody
 who has every read a Super Friends comic knows that's exactly what it
 was called.

 As The Legion of Doom continued on in its growth and its endless quest
 of knowledge about different operating systems and networking
 technologies and phone systems and everything else, the reps of
 everybody involved in the group sort of kind of sky rocketed because
 everybody by us all working together, we had a better resource of
 knowledge to provide the people and by continuing to do so, everybody,
 I guess, built up a sort of respect for the group and some of it has
 even lasted to today, even though the group is no longer around. A lot
 of things that it affected still linger on in the community.

 GA: There's been a lot of debate about who was in that group. Seems
 like everybody in the world wanted to be. Ha, ha. So many of the
 hackers I meet say they were.

 CG: There are always going to be people who want to run around and
 say, "Yeah, I was in the Legion of Doom."  And I know everybody who
 was in it.  I've got a list of everybody who was in it and written
 about everybody who was in it. We all know who was in it, so it really
 does not make any difference. If some joker off the street  is going
 to come up and say, "I was in The Legion of Doom," who really cares,
 you know, what's it going to get him today? It doesn't mean anything,
 because the group is not around anymore.  Um, if they know something,
 well, their knowledge alone should speak for itself and should not
 have to relay on the name of some group that does not exist to try to
 perpetrate some sort of false image to other people, so it really
 doesn't happen that often. We see people like Ian Murphy, for
 instance. I've still got newspaper articles with him in it saying that
 he was in Legion of Doom, and in fact, he has told some people, and
 some business acquaintances of mine, I guess in some desperate attempt
 to generate revenue, that not only was he in Legion of Doom, but he
 founded it, ha, ha, so, that's nice and he can continue to delude
 himself in a lot of things.  If anybody wants to live in delusion,
 well that's their right, I suppose. It doesn't mean anything to me.

 GA: Isn't there a new Legion of Doom now?

 CG: Well, I really don't want to get into that too much. There was a
 young Canadian fellow who decided that it might be a good idea to
 start the new Legion of Doom and within like say an hour after that
 got posted to the Net, we were on the phone with him, telling him what
 a bad idea that was. It was myself and Scott Chasin who called him up
 first and he said, "Well, I think The Legion of Doom was a real
 important thing for the community and I just want to see it continue"
 and this and that. I said, "Who are you to come out of nowhere and
 think that not only do you have enough knowledge to say that you could
 have been associated with The Legion of Doom, much less to usurp the
 name? The name is dead, we put the group to rest and we want it to
 stay that way. He said, Well I'm not going to change it and as soon as
 you see the type of journal I put out, you will be really impressed."
 I said, "If your magazine is good, it will stand on its own merit and
 you don't need our name." He said, "Well you retired the name and that
 means it's fair game for anybody else." Okay, well so there is no
 talking to this guy, so I said, "Well I want to tell you this Cameron,
 Scott and I are the first to call you, there will be many others. We
 are the nicest. It's not going to be pretty for you and I just want
 you to know that."

 And let's just say there is no more New Legion of Doom. It was kind of
 an interesting experience for everybody because it did get a lot of
 the members back in contact with one another. A lot of us had gone our
 separate ways. The members grew older.  The group was founded in '84 and
 here it is almost '94, I mean that's a long time for, you know, a
 bunch of people to stay in contact, regardless of whether or not it
 was for some silly little computer group to form a net.  So it was
 nice to catch back up with a lot of people.  It's really refreshing to
 see that damn near everybody who was ever involved in the group is
 doing very well for themselves in their chosen careers or professions,
 or graduating with high graduate degrees, Ph.D.s, Master Degrees, and
 things; it's certainly not what one would expect from the world's most
 infamous hacker group, but that certainly is what happened.  But, you
 know, the whole Cameron Smith New Legion of Doom thing, it didn't
 accomplish anything for him, but it certainly did accomplish something
 for us. It got a bunch of us back together again.  I don't want to
 sound grateful to him for it, but it worked out pretty well.

 GA: How did The Legion of Doom originally break up?

 CG: Well, The Legion of Doom kind of went through three different
 waves.  You can kind of chart the history of the computer underground,
 it sort of runs parallel to the history of The Legion of Doom, because
 you can see as the new members came in, that's when all the busts
 happened.  People would either get nervous about the busts and move on
 and go to college and try to get a life, or they would be involved in
 some of the bust and some of them would leave that way. So it kind of
 went through three different membership reorganizations. You can tell
 who came in where because of what was going on.  It finally kind of
 folded. I had talked to a bunch of members somewhat recently, within
 the past three or four years and I said, "Well maybe we ought to try
 to do something, we need to get some more members in and try to work
 towards a different end." At the time, there was still the infant of
 an idea about going into consulting by building together this last
 insurgence of Legion of Doom. I talked to  several people and wanted
 to try to track down newer people, so I talked to the members who were
 still active and asked are you still interested in doing this again,
 because we've got some other things that we want to try to focus on
 and as stuff starts to progress, something might come out of it. I'm
 doing something with some other people, and we got people who are
 experts in different types of fields, and we were talking to people
 who are experts in mainframes, in telephony, in Unix, and all sorts of
 different stuff and as that started to progress, we got a bunch of
 people in the last new membership drive for the group, did a few
 things, and as that started to go on, most of my main focus started
 dealing in with a few people from the last insurgence about trying to
 form this consulting company, which ended up being Comsec.

 We finally decided that's what we were going to do and we were serious
 about it, we said okay well then maybe we should just dissolve the
 group, because if we are going to have Comsec, we don't need Legion of
 Doom, 'cause this is what we want to do. Instead of spreading the
 knowledge around the net in the form of text files free, we were going
 to spread the knowledge around the corporate world for money. It
 really was a logical progression to us, because, you are not going to
 be 35 years old and still trying to break into the systems somewhere;
 the thrill doesn't last that long and if it does, well, you need to
 get a life or a pet or something. There is no reason why someone who
 even has an inkling of maturity, not to say that I do in the least,
 should be wasting away their life gathering up how many university
 systems they broke into.

 So after we finally made the formal decision, we talked to some people
 and said well, we were just going to say goodbye to the group.
 Everybody who was still active or interested from the group was like
 look, you know, when this thing takes off, we want all of you to be
 there. When we need more consultants, you're the best, and everyone
 was all up for it. That's what happened.

 GA: Let's stick with The Legion of Doom for awhile. What was the
 relationship between The Legion of Doom Technical Journals and Phrack
 and Phun?

 CG: Well, it's kind of funny. Originally, I think this was something
 that Craig and Lex had done. Originally, there was going to be a
 Phrack issue that was going to be the Legion of Doom Phrack Issue. It
 was going to be Phrackful, nothing would follow us but Legion of Doom
 members and it went on and on and on.  I guess Lex had collected
 enough files, he was like, "I don't want to give these to Phrack."
 So, he stuck them together in the Legion of Doom Technical Journals,
 since it was all Legion of Doom stuff anyway, might as well go ahead
 and put it out ourselves. And I don't know if that was something
 personal against Craig, I really doubt it because Craig and Lex have
 always been friendly enough. I just think that is something he decided
 to do. From that there were three others published, so there was a
 total of four Tech Journals. They didn't come out in any sort of
 organized order, they just sort of came out when they wanted to come
 out.  It was like they were done when they were done and they appeared
 when we were finished and that's why there were only four for a group
 that was around for so long, but they were fairly timely when they
 were all released and I guess everybody really appreciated the kind of
 knowledge that was in them when they came out.

 Looking back, I don't know how much interest someone is going to get
 on how to hack Tops 20. I d like to find the Tops 20 right now.  It
 doesn't exist. So the knowledge that was in those things is fairly
 dated, but at the time, it was very timely and people appreciated it.

                        =======================

 GA: You were busted in 1990, right?

 CG: Nope.

 GA: How did that go down?

 CG: On March 1 1990, I was raided by the Secret Service, but I wasn't
 busted.  There is a big distinction there. Just because they came in
 my house and dug through my stuff, that doesn't mean anything
 happened.

 Let me give a little preface to that. Several months prior, I received
 notification from the University of Texas that my school records
 (specifically mentioning my computer accounts) were being subpoenaed
 by a federal district court judge in Chicago. I knew very well that
 was the district that William Cook was in, so I trotted on down to the
 Dean's office at the University of Texas and said, "Hi, I understand
 my records have been subpoenaed. I need a copy of that for my lawyer."
 So they ran me off a copy of it and sure enough there's William Cook's
 name. So, okay, I was right, and I went home and vacuumed the house
 and cleaned everything up nice and neat for them, started placing
 little notes in various places. I had little notes that said, "Nope,
 nothing in here," put that in a drawer and a little note that said,
 "Wrong, try again," put that in there and little things everyplace
 that someone might look to try to find the secret hacker notes.  I
 printed out a copy of the 911 document, nice laser printed copy, laid
 that out and fan folded it over my desk. I went down to the Federal
 Building, picked up brochures on how to became an FBI agent and a
 Secret Service Agent, set those out on my desk. I got a printout of
 several different things, laid those out all nice and neat, had some
 Phrack issues, I had some messages off of the Phoenix Project, I had
 all this stuff laid out. It looked like a little alter, a shrine to
 the FBI.

 Well, sure enough a couple months later, there they were. And I also
 put some notes on my computer account at UT. I made some really large
 files, like cordons and named them dot master, dot password, dot zip,
 just stupid names, you know that tack ID's, and left these sitting in
 my account. All this noise. And then I made this one that said,
 "Secret Info." If anybody would have bothered to read that, it was
 like a 10K file of me saying, "Anybody who would take the time to
 search through my files and try to find illegal information is a
 complete scumbag." Sure enough when they came to visit my house that
 morning, I woke up to the sound of people running up my stairs and
 their screaming, "Federal Agents - warrant," then they came in my
 room, "Out of the bed." Leading the pack is Special Agent Tim Foley,
 and he's got his service revolver out, and he's got it pointed at me.
 He's a pretty big guy and I'm me. I don't present a menacing figure to
 most and especially at 6 in the morning in boxer shorts, ha, ha.  It
 just looked like I'm going to jump right out and start ripping
 peoples' heads off, so he quickly put his gun away. Nonetheless, he
 did have it drawn. I like to point that out. Hackers are a notoriously
 violent group of people who are known for their physical prowess, so
 guns are definitely always necessary. (said sarcastically)

 So, they ordered me downstairs and held me in the kitchen. I
 immediately said, "Let me call my lawyer," and they said, "You'll get
 your chance." So, they started going through all my stuff. I heard
 them up in my room, rifling all though my drawers and about an hour or
 so later, one comes down and hands over one of the Secret Service
 Brochures that I had.  He says, "So, thinking about joining up?" I
 said, "Well, I think I could probably do better than some people."  He
 didn't like that remark.  He said, "Well, I think our requirements are
 a little more stringent than to let in the likes of you." I said,
 "Well, it shows."  He didn't like that very much either. I said, "So,
 what's your degree in?"  He said, "Well, I'm not going to tell you."
 I said "I'm just making conversation." So they continued on in the
 search of my house and when they found absolutely nothing having
 anything to do with computers, they started digging through other
 stuff. The found a bag of cable and wire and they decided they better
 take that, because I might be able to hook up my stereo, so they took
 that. I have an arcade size PacMan machine, which of course, one of
 the agents  decided was stolen, because a lot of people slip those
 into their backpacks on the way home from school. So they started
 calling up all the arcade vendors around town trying to see if this
 had indeed been stolen. The thought of me wheeling an arcade size
 PacMan machine down the street, just didn't occur to them. So,
 finally, I said "Look, I bought it, here's the guy, call him."  So
 they finally gave that up, so then they started harassing me about
 some street signs I had in my house. I had a Stop sign.  I had a No
 Dumping sign over the toilet. "You need to get rid of those, it's
 state property, if we come back here and you have those, we are taking
 you downtown." I go like, "Okay."  So then they started looking for
 drugs, and one guy is digging through a big box of, like a jumbo
 family size deal of Tide we bought at Sam's, it was about three feet
 tall and it was one of the monster size things. This guy is just
 digging through it, just scooping it out, his hands are all turning
 blue and sudsy from digging through this detergent and Foley walks
 over to him and says, "Well, I think we can safely assume that that's
 laundry detergent."

 So, Foley comes back in to where I'm sitting in the kitchen and I've
 been freezing my ass off, so they had let me get a jacket, and put on
 some jeans, and he says to me, "Well, I want to show you something."
 He whips out some business cards that I had printed up for SummerCon a
 few years ago, that said, "Erik Bloodaxe, Hacker." It had a little
 treasury logo on it and he says, "Impersonating a Federal official?"
 "Well, it doesn't say anywhere on there, 'Chris Goggans, Special
 Agent.' It says, 'Erik Bloodaxe, Hacker.' Whoever this Erik Bloodaxe
 character is. It might be me, it might not. I'm Chris Goggans and that
 says, Erik Bloodaxe, Hacker. Just because the seals there, it doesn't
 mean anything." He says, "Well, if you don't tell us everything that
 there is to know about all your higher ups, we are going to be
 pressing state, local and federal charges against you." I said, "On
 what grounds?" He goes, "We want to know everything about your higher
 ups." Which I'm thinking, gosh, I'm going to have to turn in the big
 man, which is ludicrous, because there is no such thing as a higher
 up, but apparently they thought we were a part of some big
 organization. So, I said, "Well, I'm not saying anything to you, I'm
 calling my lawyer." And I already had told my lawyer previously that I
 would be raided shortly and that I would be needing to call him. So I
 called him and said, "Hi, this is Chris and the Secret Service is here
 and I'd like you to speak to the agent in charge."  And he said that
 my client declines any sort of interviews until such a time that I can
 arrange to be there to represent him in an official capacity and I'll
 need your name and I need all the information. The agent said, "We
 will be in touch."  And that was it. They gathered the bag of wire and
 the printouts of the 911 document, how to be an FBI agent, the
 printouts of the Phoenix Project messages, and they trotted on off. As
 they were walking out the door, one of the guys kind of looks over at
 my television set and he says, "Hey, why is that video game plugged
 into the phone line?" And it was kind of like a Homer Simpson, cause
 Foley trots over and I had a 300v terminal, which is what I had been
 using to get on bulletin boards with. It was plugged into the phone.
 It was a little membrane keyboard box. All it was was a modem. So they
 bundled that up and stuck that in there, and they went on their merry
 way, and I followed them out to the car, and wished them well, and
 wrote down their license plate, and went back into the house, and got
 into my car, and went driving around calling up everybody else around
 town to see if anybody else had been raided.

 GA: Had they?

 CG: Yeah, at the same time as what was going on in my house, the house
 of Lloyd Blankenship was being raided, The Mentor, as well as the
 office place of Steve Jackson Games, where Lloyd worked, which ran
 into a huge fiasco later on down the road for these hapless agents,
 but that's an entirely different story.

                        =======================

 GA: Did you ever do any malicious hacking?

 CG: No. To be honest, there were a couple of times I actually
 considered such a thing.  At one point in time, we had access to South
 African Government computers, like South African Treasury, things like
 that and we were thinking, should we take it down? Nah, we better not
 do that, can we just change the message of the day to something like
 some anti-apartheid statement, some sort of politically correct thing.
 It was all a big joke to us, we certainly weren't thinking about that,
 we just figured it would really piss them off, but we never did it.
 When the Russian x25 network went up, we were right there on it. They
 can't bust us for hacking Russia, I mean, who would? What were they
 going to say?  It's like, "You should hack them, because they are our
 enemies, well maybe you should hack them," so, we were just going
 after the Russian network pretty hardcore.

 Malicious hacking pretty much stands against everything that I adhere
 to.  You always hear people talking about this so called hacker ethic
 and I really do believe that. I would never wipe anything out. I would
 never take a system down and delete anything off of a system. Any time
 I was ever in a system, I'd look around the system, I'd see how the
 system was architectured, see how the directory structures differed
 from different types of other operating systems, make notes about this
 command being similar to that command on a different type of system,
 so it made it easier for me to learn that operating system. Because
 back then you couldn't just walk down the street to your University
 and jump right on these different computer systems, because they
 didn't have them and if they did have them only several classes would
 allow you access to them. Given the fact that I was certainly not of
 college age, it wasn't really an option. You didn't have public access
 to systems. All you had to do was call up and ask for an account and
 you'd get one. So, the whole idea of doing anything destructive or
 malicious or anything even with malcontents using computer systems to
 track information about people or harass people, that just goes
 against the grain of anything that's me.  I find it pretty repulsive
 and disgusting. I am certainly not blind to the fact that there are
 people out there that do it, but obviously these people have a s---ty
 upbringing or they are just bad people.

                        =======================

 GA: How about books that have come out about hackers?

 CG: Well, I'll take a stab at that. The Hacker Crackdown I found to be
 a very schizophrenic piece of writing. I still to this day have not
 read it completely. I found it very hard to follow and I was there. It
 is very hard for me to read that book and follow the chronology.
 Everything is on the money and he did a very good job of making sure
 the facts were correct, but it's just hard for me to read.  Maybe
 that's just a criticism of his writing style.

 Approaching Zero, I didn't really care for that too much, more
 specifically because they just basically out and out called me a
 traitor and said I was keen on selling secrets to the Soviet Union.
 Maybe you ought to ask the IRS about all that money I got from the
 Soviet Union, because I haven't seen it, but I'm sure I'll be taxed on
 that too. But I found that rather disgusting and after that book, I
 actually had a conversation with one of the people who was writing the
 book. A guy named Brian, actually called us up at Comsec and I talked
 to him for about 30-45 minutes about things and next thing I know,
 nothing we really said ended up in the book. A bunch of people were
 misquoted, left and right. All the stuff about the American hacking
 scenes, off the mark.  People were quoted as saying stuff that they
 never said, things supposedly from bulletin boards that were not on
 bulletin boards. I don't know where this information came from, but
 it's really just off the money.  I guess if you know something so
 intimately, you are always going to be critical of anything someone
 says about it because they don't know it as well as you do, so you are
 always going to find fault in something.  So maybe I'm just being
 overly critical.

                        =======================

 GA: While on the subject of Comsec, you have said that you have gotten
 bad press. From where?

 CG: Well, I think an article saying that I have been arrested in the
 past for breaking into Bell South, or books being published saying
 myself of The Legion of Doom destroyed the 911 Network in nine states
 just to see if we could do it. Things like that which are just out and
 out lies. I'd say that was pretty bad press.

 GA: Did Comsec fold because of personality problems, or a lack of
 business?

 CG: Comsec folded for a number of reasons.  The press aspect weighed
 heavy.  We were basically blacklisted by the security community. They
 wouldn't allow me a forum to publish any of my articles. It
 essentially boiled down to, with the trade magazines, at least, they
 were told by certain members of large accounting firms that they would
 pull their advertising if they associated with us, and when you are a
 trade magazine that is where all of your revenue comes from, because
 no one is paying for subscriptions and they can't afford that loss.
 They were more interested in making money then they were in spreading
 the gospel of truth in security. But hey, it's a business, I guess you
 have to take that. I had speaking engagements pulled. A head of a very
 large security association promised me a speaking engagement and then
 decided to cancel it and didn't bother to tell me until a month before
 the conference. I talked to him and he said, "Oh, well I should have
 called you." This is like one of the largest security associations in
 the country and the second largest. So we had that kind of treatment.

 Some of these conferences, since we were not speaking at them, we
 could not really justify spending thousand of dollars to fly out there
 and attend. We were cut off from a lot of things and since we did not
 have a presence at these conferences, a lot of our competitors used
 this to target the companies that we were marketing. You would have
 these MIS directors from large oil companies out there, and you would
 have other people going up to them and saying, "You're from Houston.
 You are not dealing with those Comsec folks, are you? Well, you know
 that they are nothing but a bunch of crooks out there."  So, one very
 large oil company, we had already had all of our paperwork passed
 though all of their legal departments and it was just waiting to be
 signed; it had already been approved and money was allocated in the
 budget and we were ready to rock. This would have meant a large amount
 of money over a period of several years.  Well from going though all
 of these friendly happy negotiations and papers ready to be signed, to
 XYZ oil company does not do business with criminals, Click! Who talked
 to this guy? Who feed him this nonsense?

 Well, we got a lot of that, certainly that weighed heavy. The fear
 that came from companies like DeLloyd Touche.I will single them out
 especially because some of their larger consultants were very vocal in
 speaking out against us, in the very forums they denied us. They used
 the magazines as a place where one particular consultant said
 something like, "Can we lie down with dogs and be surprised when we
 get up with fleas?" I mean, I don't deserve that type of commentary. I
 don't think anybody does. It is certainly not a mature attitude for
 somebody who is supposed to be an upstanding ethical consultant to use
 a trade publication to vent his frustration against his competition.
 But, hey, it's a free market and if he has a forum and they gave him a
 column, well I think he can write whatever the hell he wants.

 Sure, I was in The Legion of Doom. I have been in everybody's system.
 But I have never been arrested. I have never broken anything, I have
 never done anything really, really, criminally bad. There is a
 difference in doing something illegal, you like walk across the street
 at the wrong place and you are committing a crime, but that does not
 make you a criminal, and there is a big difference between different
 types of behavior. By all these different forces saying so many
 negative things about us, we had our work cut out for us.

 To be honest, they had us beat. They had the deep pockets. They could
 wait us out. They could keep saying bad things about us forever. They
 had hundreds of millions of dollars  so that even if they weren't
 making money they could sit on it. We didn't. Eventually we could not
 do it any more. I had overextended myself. I sold off all my stock,
 all my personal stock. I had a bunch of stock in energy companies and
 things like that, that was in the past supposed to be paying for my
 college education, and I gambled it away on Comsec and I ran out of
 money.  I needed to eat, I needed to get a job, I had to move, I
 couldn't afford it anymore. And everybody was basically saying the
 same thing. Scott didn't have any money, Rob didn't have any money,
 our sales guys were getting really antsy because they were having a
 real hard time closing sales, so we just had to shut down.

                        =======================

 GA: Any thoughts on where technology is going and how hacking might
 change in the next couple of years?

 CG: Well, like I said earlier, the Internet is a very scary place with
 a very, very limited set of knowledge. One person could take down a
 majority of the network and for so much trust and need to be placed in
 a network that is so inherently unstable because of the protocol that
 drives it.  I mean you don't plan a trip across country in a 1957
 jalopy! You go out and get a new car, or you rent a good car, you
 don't put all your trust in something that ain't gonna work. And it
 works well enough for a lot of things, but for people to trust their
 entire enterprise network to stuff over the Internet, they are asking
 for trouble. And as people become more familiar with the entire
 protocol sweep, they are going to find out that there is a world of
 hurt about to happen, and in the next few years, people are going to
 be real surprised when stuff starts going down like crazy. That's
 going to be the biggest thing to happen.

 I would imagine that all the cellular problems are going to disappear
 because the advent of digital caller is going to remove all this
 problem.  A lot of things are going to change. I imagine people,
 hopefully, will once again get more and more into writing software and
 doing more productive stuff. With all the wealth of knowledge that is
 coming out of every community, even in the underground, because people
 are exposing bugs and people are changing things, so eventually people
 are going to be able to make all types of systems, robust enough to
 survive different things. So out of all this turmoil, some good is
 going to come.  And from that, once all the problems have been
 corrected, people will be able to direct their energies into a more
 positive thing, like developing applications, writing software and
 focusing their attention on doing neat, nifty tricks, rather than
 doing neat nifty stupid tricks, ha, ha.

 You are going to see some really, really cool stuff that is going to
 blow your mind and you are going to be able to carry it around in your
 hand.  You are never going to be out of touch anywhere in the world,
 so, I think that will be very cool.

                        =======================

 GA: We should certainly tell people how to subscribe to Phrack, and
 the prices on the LOD disks.

 CG: Yeah, people who want information about Phrack can mail me at:
 Phrack@well.sf.ca.us and for information about the BBS Archive Project
 mail:  LODCOM@Mindvox.Phantom.com

 GA: Thanks Chris!

 G: Thank you.-----------------
 
                         REVIEW OF SLIPKNOT 1.0

 By Scott Davis, Editor (dfox@fc.net)

 SLIPKNOT 1.00 By Peter Brooks.
 Tested version 1.00 on a Dell 466/XPS
 16 meg of RAM, Windows for Workgroups
 #9 GXE 64 Pro video card (2 Meg Vram)
 Boca 28.8 Vfast external modem

 On December 23, 1994, I contacted Felix Kramer (felix@panix.com) to let
 him know that I would be happy to run his article/promotion for the
 software called 'SlipKnot'.  At that time, he asked me to ftp the
 software and test it out, and follow up with a review of the software
 in this issue of the magazine.  So, here it is...

 The software was designed by Peter Brooks.  SlipKnot is a graphical
 World-Wide-Web browser for PC users running Windows 3.1+ or a higher level
 of Windows.  It is designed for modem  users with ordinary dial-up UNIX
 shell accounts.  It does NOT require SLIP or PPP or TCP/IP services in any
 form (no TIA or remosock, etc.  if you are familiar with these products).

 The system requirements are Windows 3.1, Windows for Workgroups or
 higher, running in 386 Enhanced Mode (SlipKnot cannot be used on 286
 processors).  Not yet tested with Windows NT. You must have at least
 4 MB of memory, recommended 8MB.  We have noticed memory deficiency
 errors at 4 MB.  Also, at least 2 MB of available hard disk space is
 required.  SlipKnot itself takes approx. 1.5 MB.  When working, SlipKnot's
 job will be to download documents for you from the Internet, and these
 may require plenty of hard disk space.  Mouse or other pointing device
 required (cannot control SlipKnot via only the keyboard).

 Your UNIX system must have either the program "lynx" (version 2.2 or
 later) or the program "www" available.  If in doubt, log in to your
 host, and try to execute either of these programs.  You will then know
 immediately whether they are available.  To find the version of lynx on
 your UNIX host, execute the UNIX command: "lynx -version".

 Your UNIX host must have a program to send files to you via either the
 Xmodem or Ymodem protocol.  The actual name of the programs that perform
 these file transfers changes from system to system, but try the commands
 "sx" (for XModem) or "sb" (for YModem).  If these fail, ask your system
 administrator or some other knowledgeable person.  Likewise, you will
 need to know the name of the UNIX program that will receive files from
 your PC using Xmodem or Ymodem.  Your UNIX system must be able to display
 individual file sizes using the "ls -l filename" command.  If "ls" has
 been renamed or works differently from normal, SlipKnot will fail.

 SlipKnot was created because, at that time, there was no other alternative
 to accessing the World Wide Web graphically if you did not have SLIP or
 PPP or TCP/IP access.  Having analyzed Mosaic and some of its competitors,
 I concluded that all of these browsers were designed for people with very
 rapid communications channels into the Internet, not modem users.  Even if
 you have SLIP access, most of these browsers do not allow you to save
 entire documents (with the included pictures),  forcing you to retrieve the
 documents again whenever you wish to take a full look at them.  It takes a
 while to retrieve any document by modem with any browser, and you shouldn't
 have to do this more than once.

 Now the good stuff:

 First of all, Slipknot is a fantastic idea.  To be able to use the World
 Wide Web and only requiring the end user to maintain a normal account
 on his/her provider is great.  This allows the user to have Web access
 without paying those occasionally high rates for a SLIP or PPP connection.

 I ftp'd the Slipknot software and installed it.  I was very happy that
 it installed without any problems.

 Configuring the software was fairly painless.  The biggest part was
 taking the time to edit the login script for my service provider...
 and that step is not even necessary since Slipknot allows you to
 conduct manual logins of you so choose.

 I was finally ready to dial out. Everything was working like a champ until
 about 10 minutes into my session when my entire system locked up.  I had
 to do a complete shutdown and start over.  No big deal, I thought.
 I attempted again, as the 10 minutes that I did use it was a great
 experience.  I had never seen an application that could do WWW over a
 normal user account.  It connected perfectly and was working fine for
 another few minutes...then it locked up again.  I began to worry.
 I noticed that both times it locked up I was accessing the Federal Bureau
 Of Investigation home page (FBI).  Maybe Slipknot was not compatible with
 sites who promote the Clipper chip...Hahahaha. Not the case, unfortunately.

 During the course of the day, it locked up at random.  I tested my
 computer hardware to see what the issue might be.  There was no hardware
 problem.  My computer has never locked up on my under any circumstances
 before.

 I am not going to give this software a bad review because it locked up
 on my system.  I polled some users on the Internet regarding their
 experiences with the software and here's what some of them said;

 SLIPKNOT version 1.0 really works without a SLIP/PPP acct. In my case it
 installed quite easily, with minimum tweaking (certainly less than to
 install TIA). It opened the WWW to me. Next versions, should have FORMS
 support. That is a must and is urgently needed, because many WWW pages
 contain forms. Other than that, SLIPKNOT is highly recommended for a
 low-budget approach to WWW.   [one@netcom.com]

 =========================================================================

 I find it to be a an incredibly clever idea, and it works quite well
 with direct dial. Some problems with images and sound via telnet/rlogin,
 but not a big problem.  The idea of being able to web-surf without SLIP
 is very attractive, especially for the dial-up user as so many of us are.
 With the "load images" turned off, it is much faster, and you can
 selectively load them. but since it uses Lynx as its engine, why not use
 Lynx for imageless surfing.

 Speed: I compared it to my SLIP account with NCSA Mosaic and Netscape.
 It loads images, etc. a bit slower than Mosaic and a lot slower than
 Netscape.

 Installation and Set up: simple, esp as compared to the fun you can have
 installing say Netscape and all the winsockets stuff, and IP/DNS
 configuring.

 Look and Feel: I'd like a larger document window, but the pulldown menus,
 etc. will make surfing easier for the newbies.

 Overall - a nice, inexpensive alternative to SLIP/PPP, especially for
 those fairly new to the net and like that point and click feel.

 NB: another alternative for an "on the cheap" approach to the Web is The
 Internet Adaptor -- I have it installed in my dial-up unix account, and it
 is slick: it emulates SLIP, and works very well. I'm getting rid of my
 SLIP account because I have TIA. If you have ever set up a SLIP, it is
 pretty easy to install and set-up. If not, you'll spend some time. Cheap
 too.   - Jill Ellsworth <ellswort@tenet.edu>

 =========================================================================

 Very nice and easy to use developmental software.  Web works well and the
 terminal mode is functional and adequate for most users.  everything
 available from your Internet provider can be accessed, just as with a
 full blown commercial package like ProCom, etc.  Some limitations on
 bells and whistles apply.

 Inability to support ftp and gopher from within the html page is a
 bother, but as development continues I hope Peter Brooks will be able to
 add that capability.

 Direct link to obtain upgrades and the automated upgrade installation
 built into Slipknot is a neat touch.

 I am currently using Version 1.00 and have sent in my registration fee
 because I want to encourage continued development.

 I really appreciated the opportunity to evaluate the fully functional
 application.  - Steve Seteroff (seteroff@kendaco.telebyte.com)

 =========================================================================

 You're a brave man to ask for opinions on the Internet!

 I got SlipKnot right after it was released.  It is a wonder.  Last night I
 got the latest version "g".  I am so pleased.  Peter Brooks and Felix
 Kramer (?) have a winner on their hands.  I had tried to install netscape,
 tia, and winsockets about two weeks before I saw the announcement, and
 failed.  The only problems I had in the installation of SlipKnot were ones
 anticipated in the help screens.  (RTFM, dummy!) Peter Brooks was on the
 newsnet answering questions almost 24 hours a day.

 1. Easy to install.
 2. Cheap.
 3. Easy to use.
 4. Fun!

 And all this praise from a DOS command line freak.  I told PBrooks in an
 email that I hate Windoze and had been threatening my son to take it off
 my computer (he uses my printer and MSWord).  I complained to PBrooks that
 now Brendan knew I wouldn't follow through on the threat.  I have an
 indispensable program that needs Windoze.

 Now some cautionary notes.  ...  Sorry I don't have any reservations.
 BTW, I am not Peter's mother, nor do I have any affiliation with anyone
 associated with MicroMind (a moronic name...like, encephalitis, dude!).
 If you have any particular questions, I would be glad to respond.  My
 guess, judging by the activity in WWW newsgroup, is that you'll have more
 response than you can handle.

 Good luck with the story.  Happy holidays.  (BTW I tipped off the LATimes
 computer technology reporter and he just responded that he'd heard about
 it.  Here mosaic applications are bringing the Web to millions and it's
 news, but a shell account enabler is ignored.  Go figure.)  Go SLIP not!

 Mike Howard (mikeh@netcom.com)

 =========================================================================

 I think Peter has a good product. It is still in Beta Version.  For
 example I can not Down Load large files (over 19,456 Bytes).  I am sure
 Peter will find a fix but for now SK is for the experienced user.

 John Hammond (jhammond@unicomp.net)

 =========================================================================

 I found it easy to install; unfortunately it crashes every time I try to
 get something off the web and I must do a hard reboot - thus Dr.Watson
 can save nothing, nor can slipknot's built-in debugger.  I haven't yet
 contacted the authors.

 Bennett Price (bjprice@itsa.ucsf.edu)

 =========================================================================

 I have used SlipKnot for about six weeks and have come to rely on it for
 an easy alternative to mistyped Unix commands. Since I work in a high
 school that does not yet have Internet access, I foresee SlipKnot as a way
 to hook the uninitiated into the 'Net. Teachers and administrators who are
 not already convinced about the utility of the Internet would probably be
 turned off by a Unix command line. Although downloading graphics through
 SlipKnot is slow even at 14.4, for the inexperienced user, this wait time
 is surely preferable to using a straight text-based Web browser.

 While I approve of Version 1.0e as far as it goes, I can certainly suggest
 a number of needed improvements:

 1. gopher support
 2. telnet support
 3. forms support
 4. better resource management (I run SlipKnot on a Pentium with 16 Mb of
    RAM and yet often run low on GDI resources)
 5. improved error handling when the 'Net is busy or a page cannot be found
 6. automatic redial in the terminal mode (Maybe this can be done with a
    script, but I could not see how.)
 7. Z-modem or Y-modem batch transfer support in terminal mode.

 Don't get me wrong. I like SlipKnot. Everything can be improved. I am sure
 at Micromind. they are already at work (at least mentally) on these
 suggestions.

 Jeff Ratliff (tratliff@whale.st.usm.edu)

 =========================================================================

 I have found Slipknot to be a very worthwhile product.  Its ease of
 set-up is a definite plus.  I downloaded Slipknot and had it installed
 and running in a very short time.  The installation instructions
 addressed the few problems I had getting it running and then I was off --
 surfing the Web.  My main dislikes of the software are the small window
 size and the ability to open only five documents at the same time.  I
 understand that these two complaints are being addressed by the next
 version.  If you don't have direct access (i.e. you connect through a
 dial-up shell) and don't have a SLIP or PPP connection, Slipknot is
 definitely worth it.

 Kenyon Jon Michael (mkenyon@jove.acs.unt.edu)

 =========================================================================

 I've been using Slipknot for a while now, and I'm very glad it's
 around. I think it's seriously necessary, because there are a huge
 number of people who get their net.access through shell accounts, and
 this allows you to get a fuller Web experience than with Lynx.

 However, the program has it's problems, and there is a lot of
 advancement that can be made in the future revisions. For example, forms
 are not supported, so your Web use only goes one way; you can't reply
 to things, write mail, make suggestions, etc., or for that matter, be
 verified for logins like on HotWired. That's a huge pain.

 Another problem is the inability to use gopher servers, something
 that's still widely implemented and integrated with the Web. And, of
 course, Slipknot is also a bit buggy; any errors, and the program quits
 rather than moving on, it displays certain dialog boxes more than once in
 a row, etc.

 IOW, it's a good idea and good start for a much-needed program, but it
 still needs work. However, with some more tweaking and advancement, it
 will be a very solid program.

 Bill Pena (billpena@genesis.nred.ma.us)

 =========================================================================

 I got (and paid) for Slipknot, and am currently running v1.0 with the
 "g" patch. My host is a "pay" unix system that I call in to
 get my mail on my "term" account. I am using the program on a
 486 cryix 40mhz system.

 The program is not perfect. It still has some bugs to work out, and
 lots of features to be developed (forms, gopher, etc do not work at
 this time).  But!!! even with though the program is still in its early
 stages of development, I find it VERY useful, and it DOES allow me
 to view http documents with the graphics.

 I get good 14400/v42bis connections via the automatic log-in script (that
 must be user customized) and acceptable download speed of the http. With
 the program running under Windows 3.1, it does take a moment to analyze
 the downloaded text to "find" the embedded graphics, then download the
 graphics, plot the series of files, then display the document.

 With the program currently costing $30, the difference in the cost of my
 term account and a slip/ppp account is a lot more than the cost of
 Slipknot.

 I use the internet for e-mail and netnews more than a place to surf just
 to look at images. As such, my primary access to the net is via term with
 a text editor for mail/news replies.  When I want to check out some
 http/url, I just hang up and call back via Slipknot. I don't use it all
 the time, so when I need it, it is there for me.

 Being shareware, it is perfect for the user to "play" with to determine
 if he/she wants to continue to use it, prior to paying for the program...
 and even with its limitations, it is still a deal at $30. and with the
 authors still working on it, it is sure to get better and better.

 Tom Stangler (stangle@infi.net)

 =========================================================================

 It works as advertised.  Last I checked, it doesn't do forms or telnet
 connection links It has trouble handling some inline images.

 Just like TIA, your provider can tell if you are using SlipKnot, and if
 they wanted to, could ban it's use as going beyond the services provided
 with your class of account.  RCI doesn't have any restrictions on TIA or
 SlipKnot...

 Kevin Kadow (kadokev@rci.ripco.com)

 =========================================================================

 (Slipknot review continued...)

 As you see, we have a wide range of comments here.  I believe that most
 people realize that it still a very young project and has not yet
 attained it's full potential.  If you will note, there was one other
 person who replied to my request for comments who is having the same
 problem I am having with system lock ups.  I mailed the author of the
 program and they are getting right on the issue.

 The bottom line is that Slipknot is a great idea and a nice software
 package.  And with end users submitting comments, complaints, and other
 information directly to the author or the press, the issues will be
 worked out.  I suggest that you keep an eye on Slipknot.  It's really
 going somewhere!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              cDc GDU #18

 By Swamp Ratte (sratte@phantom.com)
   _   _
  ((___))
  [ x x ] cDc communications
   \   /  Global Domination Update #18
   (' ')  November 1st, 1994
    (U)
 Est. 1986

 NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for November, 1994:

  _________________________________/Text
 Files\_________________________________

 281: "Official cDc Press Release Concerning President Reagan" by Reid
 Fleming. The Cult influences the international political climate of
 opinion!  We just want what we've got coming to us, mister.

 282: "Argument" by Markian Gooley.  Positivity and happy sunshine and
 neato stuff.

 283: "Possibilities" by Obscure Images.  Once again, Oi brings the
 linguistics for the nine deuce deuce.  This one's got crazy subliminal
 tapes and a hippy chick.

 284: "Sanford's Calico" by James Cazamias.  It's just like Disney's
 _That Darn Cat!_, but different.

 285: "Concise Guide to Forgetting How Much You Suck" by Jason Farnon.
 Courtesy
 of the cool _I Bleed For This?_ 'zine, here we go with a cDc edit/
 distribution.  Lots of practical advice to improve your standard of living.

 286: "The Divine Masters" by Shriek Broomstraw.  Particle physics and alien
 overlords and why you should be concerned with all this.  You should.
 Really.

 287: "Shotgun" by Swamp Ratte'.  Never mind _Where's Waldo?_, where's the
 shotgun?  Oh my.  Fills out this release's angst quota.

 288: "Rejection Letter Blues" by Jeff Swanson.  Some people just can't
 appreciate good literature.  Fun-eeEe.

 289: "Can There Be Artificial Intelligence?" by Tequila Willy.  Another
 scholarly scab for you to pick at.  That Willsie, what a smart guy.

 290: "Bob Takes a Trip" by Special Agent Finerty.  Bob's a mechanical dog
 and he's NUTS.  CRAZY.  Watch out.  Zany hi-jinx.

  __________________________________/cDc
 Gnuz\__________________________________
                                            _       _
                 |\                        /^\     /^\
                 / /                     /  @ )^ -| @ )^ - _
               / /           666        (  \/-^-^^|  /--^-^-~
              \o \                       \ o \   /  /@ )^ - _
               | o|         _  -  _        \  / o /|  /--^-^-~
              /  /      /     O    o ^ -  /  ( O |/  / /\
             | o \__ _/   O   o  O   o   ( o  \ o \ /_/@ |
              \   o  o             o          /    |__ _ \\
                \   o    O   \   O     ( o  -   o /  .  ^ \S
                   - - \   o  )        \ (    ) /(_ / /^
                        |    / - _  -  -   \   \ -_ -- -
                        |  /    \  /         \  |   \ \.
                       /  |      | \         |  \
                     /_    \    / |  \      / _   \
                        | \  -                  | \ -

 "This low-go you've received is the image of the be east.  Whatever
 you do, do not hold this image in your write hand or receive its image by
 foe-ton trance Miss-shun through your I balls into your mined full crane
 he um or you've received the mark of the bee east.  Stung, by buy bull
 revel lay shun.  Keep your clothes on and don't follow the be eastly bare
 whoreds."
                                                    -Philip Heggie

                                    --x X x--

 New things?  Yep.  There's now a Usenet newsgroup for you to discuss the
 All-Powerfulness of cDc.  It's "alt.fan.cult-dead-cow" and if your
 newsfeed isn't getting it, mail news@yersite and say, "GET WITH THE
 PROGRAM, PAL!  HUP HUP!"

 Tell me about the time you were in the 7th grade and had to do a #2 really
 bad and those blind special ed. kids were in the bathroom swinging their
 canes around and saying bad words.  You were SCARED, weren't you.  HA!

 The world is filled with WIMPS.  You go to a large public restroom, into a
 stall.  All the other people in the stalls, you can see their feet.  They
 make no noise.  They sit and wait and clutch their tiny little genitals in
 FEAR.  But I am NOT LIKE THEM.  I MAKE MY DISGUSTING NOISES AS I PLEASE.
 I clean up, I exit my stall, I wash my hands and I LEAVE.  I AM DONE.
 I AM RELIEVED. They remain, cowering, wishing they had the GUTS to CRAP
 but they do not and their bowels TREMBLE with gasses.  They are but
 INSECTS because they cannot CRAP FREELY.  LEARN FROM MY ACTIONS and you
 too can be POWERFUL.

 Lady Carolin is now running the Official cDc Internet Dumpster: ftp or
 gopher to cascade.net for all the cDc stuff, all the time.  Cascade.net
 gets 'em first and fast.  The secondary site is ftp.eff.org as usual.

 The other day I finally got The Beatles' _Abbey Road_ album and this
 "I Want You (She's So Heavy)" song is amazing.  So I'm thinking, why
 should I be concerned with this week's indie-certified alterna-wonder-
 weenie when I DON'T EVEN HAVE A GOOD COPY OF BARRY MANILLOW'S "MANDY"?
 MY 8-TRACK SUFFERS FROM EXTREME WOW AND FLUTTER.

 HOW CAN I EVEN _THINK_ ABOUT JAWBREAKER WHEN MY JACKSON 5 COLLECTION IS
 SADLY INCOMPLETE!!??

 If your writings have CLASS and STYLE, we want 'em.  Dig the address at the
 bottom of this file, daddy-o.


 "What's good for cDc is good for America." - President Calvin Coolidge

 S. Ratte'
 cDc/Editor and P|-|Ear13zz |_3@DeRrr
 "We're into t-files for the groupies and money."
 Middle finger for all.

 Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
 Internet: sratte@phantom.com.

 cDc Global Domination Update #18-by Swamp Ratte'-"Hyperbole is our
 business"  Copyright (c) 1994 cDc communications.  All Rights Reserved.

  ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New
   _   _
  ((___))
  [ x x ] cDc communications
   \   /  Global Domination Update #19
   (' ')  December 1st, 1994
    (U)
 Est. 1986

 NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1994:

  _________________________________/Text
 Files\_________________________________

 291-299: Nine Christmas/Holiday/Cold Arctic Wasteland-related stories.
 Some are funny, some are disturbing, and some will make you VERY AWARE of
 every single PORE on your NOSE.

 * cDc - DOWN HOME FOR THE HOLIDAYS (1994).  Dolly Parton, Kenny Rogers,
 Olivia Newton-John, Clint Black.  Gather 'round the tree and enjoy a
 rousing duet of Kenny and Olivia singing "Jingle Bell Rock" while Ms.
 Parton gets drunk and embarrasses herself.  Directed by Martin Scorsese.
 (Drug Use, Adult Language, Graphic Violence, Strong Sexual Content).

  __________________________________/cDc
 Gnuz\__________________________________

 "In their workshops, the elves toil under the oppressive eyes of the
 redshirts.  The Eskimos are all but extinct, and the dentists pull tooth
 after whalebone tooth from the charred skulls of their remnants.

 Oh, the twinkling blue Aryan eyes!  There is blood on his cheeks!

 He trains mighty legions in his impregnable northern fortress.  The Lapps
 have come to fear the sound of marching boots and jingling bells.

 With his newest sleigh, he can strike any European city in under twenty
 minutes.

 Good children get a switch in their stocking.  The bad ones disappear.

 LONG LIVE THE FOURTH REICH!"
                                              -Andrew Solberg

                                    - x X x -


 Conspicuous consumption of cDc products will fill the empty, gnawing
 voids you may or may not feel in your life... which become all the more
 apparent at ridiculous hours of the night as carbonated beverages
 gradually wear away your stomach lining and ulcers work their own little
 brand of magic.

 Things to look forward to in 1995:

 cDc #300 - Cow Beat #3: "Teen Idling on the Inphomashun Hi-Mom-I'm-on-TV-
 way"

 cDc FACK: "Frequently Anointed Cows are K-rad."  Or something.


 I could give you promises of Twinkies and a cool, like, Yaga t-shirt.
 Will you be happy then?  From here to eternity we will shop.  We will shop
 at The Mall and buy only the finest in fashions and Rage Against the
 Toaster will provide the aural motivation.  "Fuck you, Mom, I won't clean
 my room like you tell me."

 Go to HoHoCon and it'll be cool.  Ramada Inn South.  1212 West Ben White
 Blvd. Austin, Texas.  Friday, December 30th through Sunday the 1st.

 Shop!  Shop!  Do the booty hop!  The leather store has a sale on biker
 jackets,  Harley accessories optional and in-stock.  New tats shine with
 gleaming disinfectant.  Bright red-skinned jolly pierceings, and sparkling
 sterling silver!  On the tongue, through the lip.  Susy's got a charming
 new necklace, and Little Johnny has a delightful new nose ring!  "Come over
 here, Johnny, so Aunty Emma can see your newest hole."

 Make new holes and fill 'em up.

 As cDc stalks around, hunting the logical conclusions.  Ho.


 S. Ratte'
 cDc/Editor and P|-|Ear13zz |_3@DeRrr
 "We're into t-files for the groupies and money."
 Middle finger for all.

 Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
 Internet: sratte@phantom.com.
  _____________________________________________________________________________

 cDc Global Domination Update #19-by Swamp Ratte'-"Hyperbole is our
 business"  Copyright (c) 1994 cDc communications.  All Rights Reserved.

 ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 MY LETTER TO WIRED  RE: WWW PAGE

 [Editor's note:  I mailed this to Wired...and they said that they would
 print it in the February 1995 issue.  We'll see]

 By Scott Davis (dfox@fc.net)

 Dear Wired,

 I have taken it upon myself to do an informal poll regarding your
 new WWW page on the Internet.  I recall that not so long ago, the
 Wired WWW page was a great thing.  It was easy to use and contained
 a wealth of information.  Now, it appears that one must have some
 type of psudo-government security clearance to get into this WWW page.
 It is my guess that the purpose for having to enter one's name,
 e-mail address, special-secret-multi-digit-code, and other requested
 information is for the purpose of demographics.  No matter the reason
 behind all of this...IS IT WORTH IT?  Please allow me to explain the
 frustrations of some of the net-community.

 In announcing my informal poll, I stated my opinion on the new WWW
 page.  It was not favorable to Wired.  I asked others to mail me their
 opinions also. I will edit some of these for brevity only.  I assure
 you that I did not receive a single good comment about the new page.

 And from what I understand, it seems like that there was some debate
 regarding the creation and operation of the HotWired page.  One
 net-denizen replied to me, "Three weeks ago Jane Metcalfe came to
 UCDavis to talk about Hotwired and to give the first public demo of
 it. She told us that they had debated for quite some time about how
 to set it up--wanting a balance between looking 'friendly' and 'not
 allowing anonymous logins'. Sounds like the balance has tipped a bit
 further than she wanted, given commentary on the net.ith a cDc edit/
 distribution.  Lots of practical advice to improve your standard of living.

 286: "The Divine Masters" by Shriek Broomstraw.  Particle physics and alien
 overlords and why you should be concerned with all this.  You should.
 Really.

 287: "Shotgun" by Swamp Ratte'.  Never mind _Where's Waldo?_, where's the
 shotgun?  Oh my.  Fills out this release's angst quota.

 288: "Rejection Letter Blues" by Jeff Swanson.  Some people just can't
 appreciate good literature.  Fun-eeEe.

 289: "Can There Be Artificial Intelligence?" by Tequila Willy.  Another
 scholarly scab for you to pick at.  That Willsie, what a smart guy.

 290: "Bob Takes a Trip" by Special Agent Finerty.  Bob's a mechanical dog
 and he's NUTS.  CRAZY.  Watch out.  Zany hi-jinx.

  __________________________________/cDc
 Gnuz\__________________________________
                                            _       _
                 |\                        /^\     /^\
                 / /                     /  @ )^ -| @ )^ - _
               / /           666        (  \/-^-^^|  /--^-^-~
              \o \                       \ o \   /  /@ )^ - _
               | o|         _  -  _        \  / o /|  /--^-^-~
              /  /      /     O    o ^ -  /  ( O |/  / /\
             | o \__ _/   O   o  O   o   ( o  \ o \ /_/@ |
              \   o  o             o          /    |__ _ \\
                \   o    O   \   O     ( o  -   o /  .  ^ \S
                   - - \   o  )        \ (    ) /(_ / /^
                        |    / - _  -  -   \   \ -_ -- -
                        |  /    \  /         \  |   \ \.
                       /  |      | \         |  \
                     /_    \    / |  \      / _   \
                        | \  -                  | \ -

 "This low-go you've received is the image of the be east.  Whatever
 you do, do not hold this image in your write hand or receive its image by
 foe-ton trance Miss-shun through your I balls into your mined full crane
 he um or you've received the mark of the bee east.  Stung, by buy bull
 revel lay shun.  Keep your clothes on and don't follow the be eastly bare
 whoreds."
                                                    -Philip Heggie

                                    --x X x--

 New things?  Yep.  There's now a Usenet newsgroup for you to discuss the
 All-Powerfulness of cDc.  It's "alt.fan.cult-dead-cow" and if your
 newsfeed isn't getting it, mail news@yersite and say, "GET WITH THE
 PROGRAM, PAL!  HUP HUP!"

 Tell me about the time you were in the 7th grade and had to do a #2 really
 bad and those blind special ed. kids were in the bathroom swinging their
 canes around and saying bad words.  You were SCARED, weren't you.  HA!

 The world is filled with WIMPS.  You go to a large public restroom, into a
 stall.  All the other people in the stalls, you can see their feet.  They
 make no noise.  They sit and wait and clutch their tiny little genitals in
 FEAR.  But I am NOT LIKE THEM.  I MAKE MY DISGUSTING NOISES AS I PLEASE.
 I clean up, I exit my stall, I wash my hands and I LEAVE.  I AM DONE.
 I AM RELIEVED. They remain, cowering, wishing they had the GUTS to CRAP
 but they do not and their bowels TREMBLE with gasses.  They are but
 INSECTS because they cannot CRAP FREELY.  LEARN FROM MY ACTIONS and you
 too can be POWERFUL.

 Lady Carolin is now running the Official cDc Internet Dumpster: ftp or
 gopher to cascade.net for all the cDc stuff, all the time.  Cascade.net
 gets 'em first and fast.  The secondary site is ftp.eff.org as usual.

 The other day I finally got The Beatles' _Abbey Road_ album and this
 "I Want You (She's So Heavy)" song is amazing.  So I'm thinking, why
 should I be concerned with this week's indie-certified alterna-wonder-
 weenie when I DON'T EVEN HAVE A GOOD COPY OF BARRY MANILLOW'S "MANDY"?
 MY 8-TRACK SUFFERS FROM EXTREME WOW AND FLUTTER.

 HOW CAN I EVEN _THINK_ ABOUT JAWBREAKER WHEN MY JACKSON 5 COLLECTION IS
 SADLY INCOMPLETE!!??

 If your writings have CLASS and STYLE, we want 'em.  Dig the address at the
 bottom of this file, daddy-o.


 "What's good for cDc is good for America." - President Calvin Coolidge

 S. Ratte'
 cDc/Editor and P|-|Ear13zz |_3@DeRrr
 "We're into t-files for the groupies and money."
 Middle finger for all.

 Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
 Internet: sratte@phantom.com.

 cDc Global Domination Update #18-by Swamp Ratte'-"Hyperbole is our
 business"  Copyright (c) 1994 cDc communications.  All Rights Reserved.

  ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New
   _   _
  ((___))
  [ x x ] cDc communications
   \   /  Global Domination Update #19
   (' ')  December 1st, 1994
    (U)
 Est. 1986

 NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1994:

  _________________________________/Text
 Files\_________________________________

 291-299: Nine Christmas/Holiday/Cold Arctic Wasteland-related stories.
 Some are funny, some are disturbing, and some will make you VERY AWARE of
 every single PORE on your NOSE.

 * cDc - DOWN HOME FOR THE HOLIDAYS (1994).  Dolly Parton, Kenny Rogers,
 Olivia Newton-John, Clint Black.  Gather 'round the tree and enjoy a
 rousing duet of Kenny and Olivia singing "Jingle Bell Rock" while Ms.
 Parton gets drunk and embarrasses herself.  Directed by Martin Scorsese.
 (Drug Use, Adult Language, Graphic Violence, Strong Sexual Content).

  __________________________________/cDc
 Gnuz\__________________-----------------
 
                              CALLER ID FAQ

 By Padgett Peterson (padgett@tccslr.dnet.mmc.com)

 Frequently Asked Questions About Caller-ID v1.1 Mar. 1994

 1) What is Caller-ID ?

    First ask "What is ANI"

 2) OK, What is ANI ?

 ANI or Automatic Number Identification is a mechanism by  which the
 different telephone companies determine what account is to be charged for
 a call, This information is passed between Telcos and was originally
 for  billing  purposes and predated both SS7 (Signaling  System 7)
 and (C)LASS (Local Area Signaling  Services was the original AT&T
 designations, the "C" was added by Bellcore after divesture) services
 which make CNID or Calling  Number IDentification as Caller-ID is more
 properly known, possible.

 Since the Telcos had ANI, the decision was made to make it available
 to authorized parties such as 911 service and law enforcement agencies.
 ANI is also used to let a Telco operator know who is calling.

 More recently, ANI is used to report to 800 and 900  subscribers,
 who made the calls they have received, in the first case so that
 the  800 subscriber knows who the charge is for, and so that 900
 number subscribers know who to charge.

 Thus while ANI is similar to CALLER-ID and may provide the same
 information, they are actually two different services and ANI information
 is not necessarily the same as what will appear on a CALLER-ID display.

 3) Now (maybe) what is Caller-ID ?

 Caller-ID is a Telco offering that is a byproduct of (C)LASS services.
 In this case, only those numbers reported by participating exchanges are
 returned, exactly which are and which are not is currently (March 1994)
 at the Telco's discretion.

 The Federal Government has stated that it is their intent that nationwide
 CNID be available by mid-1995. The full text of this decision may be
 found FCC Report No. DC-2571 issued on March  8, 1994.

 The biggest effect of the ruling is to mandate transport of CPN (customer
 provided number) information between interconnecting networks eliminating
 the effective inter-LATA-only limitation that exists today in most areas.

 Currently there are two types of Caller-ID.  The first (often referred
 to as "basic" service) just returns the calling number or an error
 message and the date/time of the call.

 The second ("enhanced" Caller-ID) also may return the directory
 information about the calling number. At a minimum, the name of the
 subscriber is returned (the subscriber is not the same as the caller,
 the phone company has no way to determine who is actually on the line).

 4) How is the Caller-ID information provided ?

 As a 1200 baud, 7 data bits, 1 stop bit data stream usually transmitted
 following the first and before the second ring signal on the line. Note
 that this is not a standard Bell 212 or CCITT v22 data format so a
 standard modem will probably not be able to receive it. Further, the
 serial information exists as such only from the recipient's switch to
 the callee's location.  Between carriers the signal exists as data packets.

 The signal is provided before the circuit is complete: picking up the
 receiver before the data stream is finished will stop/corrupt the
 transmission.

 Currently there are two types of information returned: a  "short form"
 which contains the date/time (telco and not local) of the call and the
 calling number or error message. The "long form" will also contain the
 name and possibly the address (directory information) of the calling phone.

 The  "short  form"  stream  consists of a  set  of  null  values, followed
 by a two byte prefix, followed by the DATE (Month/Day), TIME (24 hour
 format), and number including area code in  ASCII, followed by a 2s
 compliment checksum.  Most modems/caller id devices will format the data
 but the raw stream looks like this :
 0412303232383134333434303735353537373737xx
 or (prefix)02281334407555777(checksum)

 A formatted output would look like this:
 Date -   Feb 28
 Time -   1:34 pm
 Number - (407)555-7777

 5) Can a Caller-ID signal be forged/altered ?

 Since the signal is provided by the local Telco switch and the calling
 party's line is not connected until after the phone is answered, generally
 the signal cannot be altered from the distant end.  Manipulation would
 have to take place either at the switch or on the called party's line.

 However, the foregoing applies only to a properly designed CNID unit.
 For instance the Motorola M145447 chip has a "power down" option that
 wakes the Chip up when the phone rings for just long enough to receive,
 process, and deliver the CNID signal after which it shuts down until the
 next call.

 Should this option be disabled, the chip will be in a "listen always"
 state and it is theoretically possible to "flood" a line making a
 vulnerable box record successive erroneous numbers.

 I have received a report of a device called "Presto Chango" that
 can transmit an extra ADSI modem tone after the call has been picked up
 that will cause a susceptible box to display the later information. It
 was also reported to me that CNID boxes marketed by US-West as their
 brand and made by CIDCO have been used to demonstrate the "Presto Chango"
 box.

 6) What is "ID Blocking" ?

 Most Telco's providing Caller-ID have been required to also provide the
 ability for a calling party to suppress the Caller-ID signal. Generally
 this is done by pressing star-six-seven before making the call. In most
 cases this will block the next call only however some Telcos have decided
 to implement this in a bewildering array of methods. The best answer is
 to contact the service provider and get an answer in writing.

 Currently this is supplied as either by-call or by-line blocking.  By-Call
 is preferred since the caller must consciously block the transmission
 on each call.  By-Line blocking as currently implemented has the
 disadvantage that the caller, without having a second caller-id equipped
 line to use for checking, has no way of knowing if the last star-six-seven
 toggled blocking on or off.

 Note that blocking is provided by a "privacy" bit that is transmitted
 along with the CNID information and so is still available to the Telco
 switch, just not to the subscriber as a CNID  signal. Consequently related
 services such as call trace, call return, & call block may still work.

 7) What happens if a call is forwarded ?

 Generally, the number reported is that of the last phone to forward the
 call. Again there are some Telco differences so use the same precaution
 as in (6). If the forwarding is done by customer owned equipment there
 is no way of telling but will probably be the last calling number.

 Note that as specified, CNID is *supposed* to return the number of the
 originating caller but this is at the mercy of all forwarding devices,
 some of which may not be compliant.

 8)  What happens if I have two phone lines and a black box to do
 the forwarding ?

 If you have two phone lines or use a PBX with outdialing features, the
 reported number will be that of the last line to dial. Currently there
 is no way to tell a black box from a  human holding two handsets together.

 9)  I called somebody from a company phone (555-1234) but their Caller-ID
 device reported 555-1000.

 Often a company with multiple trunks from the Telco and their own
 switch will report a generic number for all of the trunks.

 There is a defined protocol for PBXs to pass true CNID information on
 outgoing lines but it will be a long time before all existing COT
 (Customer Owned Telephone) equipment is upgraded to meet this standard
 unless they have a reason to do so.

 10) I  run a BBS. How can I use Caller-ID to authenticate/log callers ?

 There are two ways. The first utilizes a separate Caller-ID box
 with  a  serial  cable  or an internal card. This sends the information
 back to a PC which can then decide whether to answer the phone and what
 device should respond. Some of these are available which can handle
 multiple phone lines per card and multiple cards per PC.

 The second (and most common) is for the capability to be built in a modem
 or FAX/modem. While limited to a single line per modem, the information
 can be transmitted through the normal COM port to a program that again
 can decide whether or not  to  answer the phone and how. There is a
 FreeWare Caller-ID ASP script for Procomm Plus v2.x available for FTP
 from the Telecom archive.  Most such software packages will also log each
 call as it is received and the action taken.

 Of course for true wizards, there are chips available (one of the first
 was the Motorola MC145447) that can recognize the CNID signal and
 transform it into a proper RS-232 (serial) signal.

 11) How is security enhanced by using Caller-ID over a Call-Back
 service or one-time-passwords for dial-up access ?

 Caller-ID has one great advantage over any other mechanism for telephone
 lines. It allows the customer to decide *before* picking up the receiver,
 whether to answer the call.

 Consider hackers, crackers, and phreaks. Their goal in life is to forcibly
 penetrate electronic systems without permission (sounds like rape doesn't
 it ?). They employ demon dialers and "finger hacking" to discover
 responsive numbers, often checking every number in a 10,000 number
 exchange.

 If they get a response such as a modem tone, they have a target and
 will often spend days or weeks trying every possible combination of codes
 to get in. With Caller-ID answer selection, the  miscreant will never
 get to the modem tone in the first place, yet for an authorized number,
 the tone will appear on the second ring. Previously the best solution
 for dial-ups was to set the modem to answer on the sixth ring (ats0=6).
 Few hackers will wait that long but it can also irritate customers.

 12) What error messages will Caller-ID return ?

 a) "Out of Area" - (Telco) the call came from outside the Telco's
 service area and the Telco either has no available information or
 has chosen not to return what information it has.

 b)  "Blocked" or "Private" - (Telco) the caller either has permanent
 call blocking enabled or has dialed star-six-seven for this call. You do
 not have to answer either.

 c) "Buffer Full" - (device manufacturer) there are many Caller-ID devices
 on the market and exactly how they have chosen to implement storage is up
 to the manufacturer. This probably means that the divide has a limited
 buffer space and the device is either losing the earliest call records or
 has stopped recording new calls.

 d)  "Data  Error" or "Data Error #x" - (device  manufacturer) signal was
 received that was substandard in some way or for which the checksum did
 not match the contents.

 e)  "No  Data Sent" - (device manufacturer) Signal was received consisting
 entirely of nulls or with missing information but a proper checksum.

 13) Why are so many people against Caller-ID ?

 FUD - Fear, Uncertainty, & Doubt or 10,000,000 lemmings can't be wrong.
 There were some justifiable concerns that some people (battered wives,
 undercover policemen) might be endangered or subject to harassment
 (doctors, lawyers, celebrities) by Caller-ID.  As mentioned above there
 are several legitimate ways to either block Caller-ID or to have it return
 a different number.  It is up to the caller. The advantage is that with
 Caller-ID, for the first time, the called party has the same "right of
 refusal".

 Expect yet another Telco service (at a slight additional charge) to be
 offered to return an office number for calls made from home. Crisis
 centers could return the number of the local police station.


 Compiled by Padgett Peterson. Constructive comments to:
 padgett@tccslr.dnet.mmc.com  Brickbats >nul.

 Thanks for additional material to:

 David J. Kovan
 Robert Krten
 John Levine
 David G. Lewis
 Karl Voss

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                THE PENTIUM BUG WAR ENDS AS WE KNOW IT

 By James Baar and Theodore Baar

 The  real long-term significance of the Great Intel Pentium Flaw
 Imbroglio is the imminent demise of the current practice of public
 relations and corporate and government communications as we know them.

 Ironically caught unaware of the communications world it helped create,
 Intel suffered a public relations near-disaster.  Intel's arch competitor,
 IBM, wandered bubba-like into a public relations bog the future depths
 of which are still to be determined.

 Clearly we soon will see on the boneyard of history such communications
 artifacts as:

       --The lengthy, well-spun news release or official statement
 explaining what "really" happened or why a product "really" is a
 breakthrough for all mankind.

       --The news conference where the news is that what the media said
 yesterday or last week is "really" not the news at all.

       --The  necessity to convince rushed and often ill-informed
 journalists and beautiful and much more ill-informed TV anchors that your
 truth is "really" true.

       The Internet is doing to public relations what CSPAN,  CNN Forums
 and talk radio are doing to news coverage:  When you are there, the
 messenger is extraneous.  And, on the Internet, you are there and you are
 the messenger as well..

       The Pentium Flaw War was the first major corporate war to be fought
 primarily in cyberspace. The initial, very scattered shots were fired
 more than five months ago on the Internet; major engagements got underway
 in October; and a worldwide battle raged through November and early
 December.

      Little of this was noted particularly in the general or trade media
 until near the end.  And then it was reported as a highly technical
 problem of limited general interest.  Only when IBM found it convenient
 to drop the equivalent of a small nuclear weapon did most of the major
 national media take note that something much more than an academic,
 technically obscure brawl was underway.

 Only then did the WALL STREET JOURNAL shout from it's front page:

       Chip Shot
       Computer Giants' War
       Over Flaw in Pentium
       Jolts the PC Industry

 And, on the same day, the NEW YORK TIMES shouted from it's front page:

       I.B.M. HALTS SALES
       OF IT'S COMPUTERS
       WITH FLAWED CHIP

 Both  stories were inspired belatedly by an IBM announcement that it was
 suspending sales (sort of) of any of it's personal computers that included
 the Intel Pentium chip because the chip had a flaw.

 Well,  ho-hum:  Except for the IBM announcement, this was old news along
 the Information Highway.  And the IBM announcement was immediately
 discounted by many of the veteran cyberspace combatants of the Pentium
 War as highly suspect: something similar to Parliament coming out against
 slavery in America after Lexington and Concord.

 Most great military engagements begin quite casually if not accidentally:
 A sniper picks off a poacher stealing a chicken.  A nervous platoon leader
 calls in a little artillery fire on a bunker.  A lost company stumbles
 on a tank column.

 Back in June, Intel and some of it's customers already knew about the bug
 that was preventing the new Pentium microprocessors to divide accurately
 out to more than nine or 10 decimal places in some cases.  Intel did not
 publish the information. If any messages about the bug appeared here and
 there in various newsgroups on the Internet for the next few months,
 they initially attracted little attention.

 This was not the kind of consumer problem that causes a lot of excitement
 at your neighborhood 24-hour store.  But this bug was of interest -- and
 in some cases importance to parts of the world technical community
 engaged in major mathematical calculations: This is a community that also
 appreciates that such a flaw is not the first nor will be the last in
 the increasing complexity of computer components and software; exalts
 technical openness; recognizes quickly when it is being stonewalled; and
 has a biting specialized sense of outrage and humor.

 Prof. Thomas Nicely of Lynchburg College reports that when he began
 running into a potential flaw in the Pentium in June he started a three
 month effort to determine whether the problem was the Pentium or something
 else.  For example, his own calculations; or possibly known bugs in other
 hardware such as the Borland C Compiler.  And in Copenhagen mathematicians
 developed a T-shirt satirizing the Intel chip logo "Intel Inside" as "No
 Intelligence Inside" and published memos saying "We knew about it  early
 in June..."

 Intel managed to downplay and contain word of the bug for the most part
 through the next three months.  Any callers were told at first that a fix
 was underway and that the bug affected only very special situations.

 Then, on Oct. 30, Dr. Nicely posted a message to "whom it may concern"
 on the Internet,  reporting his findings and his frustrations with getting
 Intel to pay serious attention to him. In the succeeding weeks, the war
 between Intel and it's users exploded.  Each day there were more reports
 about the bug and Intel's truculence.

 The number of the strings of messages on the Internet increased and grew
 longer as users at universities, laboratories and corporations around the
 world reported the same bug and it's potential variations;  discussed
 their research for possibly more bugs; and reported on their
 unsatisfactory and frustrating phone calls to Intel.

      And here was where the war was really fought.

 Intel treated each caller as an individual, linear event to be dealt with
 in isolation; turned around or at least mollified.  Intel's position was
 that this was a routine bug that was being taken care of and was of no
 major importance to most of it's customers. The Intel position essentially
 remained that there was no need for a general replacement on demand; that
 the problem was relatively minor;  that if a user was engaged in the kind
 of heavy mathematics that could be affected by the bug then Intel, if
 it agreed, would replace a Pentium.

 Meantime, Intel and it's commercial allies continued to promote and sell
 Pentiums.  More than four million Pentiums were reported sold.

 The words "greedy" and  "arrogance" became popular on the Internet among
 customers describing Intel's position.  The Internet discussion was highly
 technical and  profane.  It also included useful suggestions for
 broadening the discussion.   For example, participants were provided
 with the Fax number of the New York Times.  And more and more of the
 callers to Intel shared their mostly frustrating experiences on the
 Internet with a worldwide audience of customers.   An angry mob -- slowly
 recognized as a major threat by Intel --  began to assemble in cyberspace

 Intel CEO Andrew Grove issued a statement on the Internet Nov. 27 seeking
 to quiet the mob.  Instead the roar in cyberspace increased.  Intel's
 Software Lab Technology Lab Director Richard Wirt on Dec. 8 issued a
 statement on the Internet describing Intel plans to provide a fix for the
 flaw.  The roar continued and spread and Intel's weakening protests were
 increasingly drowned out as the users reinforced each other with new data
 and complaints around the clock around the world.

 It was at this point on Dec.12 that IBM -- a reported minor player in the
 sale of Pentiums,  but the developer of a competitive chip, the PowerPC --
 decided to announce both on the Internet and to the major national media
 the halting of it's shipments of Pentium-based IBM PCs.

 The war was now spread to the major national media where the problem was
 easily confused with various consumer product recalls and the Internet
 where IBM's move was both discounted as self-serving and used
 simultaneously to pummel Intel further.

 By Dec. 20 Intel had had enough.  It agreed to a general recall and
 apologized for not doing so sooner.

    The public relations lessons are clear.

 People  --  particularly customers --  are no longer isolated waiting to
 learn sooner or later what is happening through the third party media
 screen and, in turn,  relying on  the  third  party media to screen and
 sooner or later report their reaction.  Even when the third party media
 is accurate this process can take many days.

 Through the Internet, people -- particularly customers --  can tell a
 corporation or organization exactly what they think and why and share that
 simultaneously and instantaneously with all concerned around the world.
 The Internet returns the world to the agora where everyone hears what was
 said; and everyone hears all comments and reactions;  everyone knows who
 is talking and can make credibility judgments.

 The first Intel error was not to spot the issue stirring on the Internet
 months ago when the commentary was helpful and understanding.  At that
 time and for several months later, Internet commentators could have been
 embraced and thanked for their efforts; immediate plans for a work-around
 fix could have been disclosed;  and work on a permanent fix could have
 been described:  all in cyberspace among sophisticated customers who well
 understand the complex nature of the technology.

 Intel's second error was not to recognize that because of the Internet it
 no longer could reason at least semi-privately with customers and advance
 rational technical arguments.  In pre-cyberspace days, that could be
 effective:  the customer is grudgingly mollified until the issue is
 eventually resolved.  But in this case,  as it's customers shared both
 their problems and experiences  with each other in real time, they fed
 each others frustrations; were empowered as a group to demand better
 treatment;  and built mutual strength with each day for new battles to
 come.

 Intel's third error was not to go directly on line with it's customers and
 deal with the issue interactively.  Instead, Intel pursued the classic
 static public relations mode of issuing statements and news releases.
 These were turned into blackened ruins by Internet flame messages in a
 matter of hours.

 Meantime, IBM by it's announcement, uncorked the Law of Unanticipated
 Consequences.  The Internet mob really understood the issue; the general
 public for the most part did not.  IBM, with motives already under
 suspicion, opened the bottle labeled "Doubt about Technology" to the
 overall potential future detriment of the Information Technology Industry
 in general.

 As  more people around the world join the millions already using the
 Internet for communications,  corporations and government will be forced
 if they wish to succeed to function within the new realities of cyberspace:
 information is shared and sifted by thousands of knowledgeable people;
 time is collapsed; facts are quickly checked; loss of credibility can be
 instantaneous;  second chances are rare and harder to effect;  grandstand
 plays better be perfect;  and the playing off of one audience against
 another is far more easily detected.

 Above all else, a smattering of obscure messages or even a random one or
 two can no longer be automatically disregarded as mere technical mumbling.
 For example, is anyone following up on a recent Internet potential bug
 message regarding AMD DX-80 chips or another regarding "something about a
 conditional loop" in the Pentium?

 One final cyberspace reality of note:  instant corrosive humor is abundant
 and effective.  (If they really are laughing about you, you can't be taken
 seriously anymore.)  This was ably demonstrated by the Internet author
 who wrote for the delectation of Intel customers and potential customers
 everywhere a Star Trek parody.  He called it:  "BBUUGGS IINN
 SSPPAACCEE!!".

 (This article is from a forthcoming issue of Knowledge Tools News, an
 electronic newsletter of Omegacom, Inc. James Baar (jimbar@omegacom.com)
 is president/managing consultant.  Theodore Baar (tedbar@omegacom.com.)
 is vice president/chief technologist.)

 -----------
 Copyright (c) 1994 Omegacom, Inc., all rights reserved.  This article may
 be posted to any USENET newsgroup,  on-line service, or BBS as long as it
 is posted in it's entirety and includes this copyright statement. All
 other rights reserved. This article may not be included in commercial
 collections or compilations without express permission from Omegacom,
 Inc.  jimbar@omegacom.com.  For all other uses you must seek permission
 of Omegacom, Inc.  jimbar@omegacom.com

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 NON-DISCLOSURE AGREEMENT OF DR. NICELY

 The following message was posted to the Internet by Dr. Thomas Nicely,
 discover of the Pentium Floating Point Unit Flaw. The first part deals
 with a question regarding Dr. Nicely's signing of a non-disclosure
 agreement with Intel.

 TO:     Whomever It May Concern
 FROM:   Dr. Thomas R. Nicely, Lynchburg College, Lynchburg, Virginia
         (nicely@acavax.lynchburg.edu)
 RE:     Pentium Bug and Intel NDA
 DATE:   94.11.25.1400 EST

 This is in reply to Paul Rubin's (phr@netcom.com) inquiry of 23 November.

 * I signed a temporary nondisclosure agreement with Intel on 10 November.

 * There was no coercion or threat of any kind, by either party.

 * The NDA was signed in the course of discussions to determine
   whether or not an agreement (such as a consultancy) could be reached
   which would prove beneficial in the long term to myself, to the Intel
   Corporation, and to my employer, Lynchburg College.

 * From 10 November until 22 November, I deflected all inquiries regarding
   the Pentium FPU to Intel's representatives.  This was a consequence of
   my own mistaken interpretation of the NDA; I was treating it in the
   manner of a security clearance; I once held a clearance for secret
   restricted data in X-division (nuclear weapon design and analysis)
   at Los Alamos National Laboratory, and that clearance treated most
   information concerned as "born secret," even if the information was
   acquired prior to the clearance and/or independently.  In the same
   spirit, I removed from the College's VAX anonymous FTP directory
   copies of the codes used to analyze the Pentium chip for the bug.

 * After receiving some complaints in this regard, Intel (on its own
   initiative) informed me on 22 November that I was free to discuss
   publicly the discovery and nature of the Pentium FPU bug, since this was
   my own work, accomplished prior to signing the NDA and without
   assistance from Intel; and that the primary purpose of the NDA was to
   insure confidentiality of information exchanged in the course of any
   consulting I might do for Intel in the future.

 * To this date, Intel has been most cooperative in alleviating difficulties
   caused for my own research (computational number theory; distribution of
   twin primes and other constellations, and the sums of their reciprocals)
   by the presence of the bug.  They have shipped replacement chips for the
   CPUs in the machines I am using, and I have verified that the new chips
   are free of the bug (zero errors in > 1e15 simulated random divisions).

 * I cannot speak for Intel regarding its policies on CPU replacement for
   Pentium systems having the bug; that is a management decision which
   obviously must take into account the constraints of supply, inventory,
   logistics, expense, and public relations.  To date, I believe Intel has
   handled the affair in essentially the manner that could usually be
   expected of most businesses operating in a highly competitive, low-margin
   capitalistic economy.  Any Pentium owner who feels the need for a
   replacement CPU should contact Intel Customer Service and Tech
   Support at 800-628-8686, or Intel representative John Thompson at
   408-765-1279.

 * I probably have a somewhat different perspective on the bug than most
   users.  It is my opinion that the current generation of microprocessors
   (and possibly all of them since, say, the 8080) has become so complex
   that it is no longer possible to completely debug them, or even to
   determine every bug that exists in one.  Thus, the discovery of this
   particular bug should not be any great surprise.  There have been many
   well-publicized bugs in the past (e.g., the 32-bit multiply bug in the
   early 80386s, the arctangent bug in the early 80486s, the stack-handling
   bug in the early 8088s, and the Motorola 68K revision F bug).
   Furthermore, in view of this, all mission-critical computations should
   be performed multiple times, in settings as independent as possible---
   preferably with different CPUs, operating systems, and software
   algorithms.  Where different platforms are not available, the same
   computation should be performed using algorithms as independent as
   possible; this was in fact how I pinpointed the Pentium bug---the
   sums of the reciprocals of the twin primes were being done in both
   long double floating point (64 significant bits) and in extended
   precision using arrays of integers (26 decimal digits at that time,
   53 decimal digits currently).  Dual calculations were also being run
   on 486 and Pentium systems.

 * Note that the bug can be temporarily circumvented by locking out
   the FPU.  For most DOS applications, this can be done by means of the
   DOS commands SET 87=NO (for executables created by Borland compilers)
   and SET NO87=NO87 (for executables created by Microsoft compilers).
   Of course, this is at best a performance-killing band-aid; some
   applications require an FPU, while Windows and most DOS extenders
   ignore these environmental variables.  In theory, it should be
   possible to write a fairly short (100 lines?) utility code which
   enters protected mode (ring 0), sets up a valid global descriptor table
   (and perhaps a valid interrupt descriptor table), resets the emulation
   bit in the machine status word of control register 0, and then re-enters
   real mode.  Running such a code at boot time should lock out the FPU
   even for Windows and DOS extended applications; a similar code could
   reactivate the FPU at will.  Unfortunately, I haven't had the time to
   write the code yet!

 * To date, my analysis indicates that the bug will appear in about 1 in
   31 billion random divisions and 1 in 1.26 billion random reciprocals.
   These figures are similar to the rate of 1 in 9.5 billion attributed to
   Intel.  In my own application (distribution of twin primes and the sum
   of their reciprocals) no error appeared for values < 824e9.  Most users
   will find these values reassuring; those of us doing computational
   number theory, chaos theory, or analysis of ill-conditioned matrices
   may still want a new, bug-free CPU.

 * To date, the worst-case error of which I am aware is an example
   apparently posted by Tim Coe of Vitesse Semiconductors on 14 November,
   indicating that the quotient 4195835.0/3145727.0 is returned correctly
   to only 14 significant bits (5 significant decimal digits).  I have not
   yet had a chance to verify this example.

 * Copies of some of the codes I have used to analyze the bug (updated to
   reflect later developments) will be restored to the anonymous FTP
   directory [anonymous.nicely.pentbug] of Lynchburg College's VAX server
   (machine ID acavax.lynchburg.edu) as soon as I get time to update and
   post them.

 * Feel free to transmit this communication as you wish.

 Sincerely,

 Dr. Thomas R. Nicely

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 THE COMPUTER NEVERMORE (The Raven)

 By Unknown

 Once upon a midnight dreary, fingers cramped and vision bleary,
 System manuals piled high and wasted paper on the floor
 Longing for the warmth of bedsheets,
 Still I sat there, doing spreadsheets;
 Having reached the bottom line,
 I took a floppy from the drawer.
 Typing with a steady hand, then invoked the SAVE command
 But I got a reprimand: it read 'Abort, Retry, Ignore.'

 Was this some occult illusion? Some maniacal intrusion?
 These were choices Solomon himself had never faced before.
 Carefully, I weighed my options.
 These three seemed to be the top ones.
 Clearly I must now adopt one:
 Choose 'Abort, Retry, Ignore.'

 With my fingers pale and trembling,
 Slowly toward the keyboard bending,
 Longing for a happy ending, hoping all would be restored,
 Praying for some guarantee
 Finally I pressed a key--
 But on the screen what did I see?
 Again:  'Abort, Retry, Ignore.'

 I tried to catch the chips off-guard--
 I pressed again, but twice as hard.
 Luck was just not in the cards.
 I saw what I had seen before.
 Now I typed in desperation
 Trying random combinations
 Still there came the incantation:
 Choose:  'Abort, Retry, Ignore.'

 There I sat, distraught exhausted, by my own machine accosted
 Getting up I turned away and paced across the office floor.
 And then I saw an awful sight:
 A bold and blinding flash of light--
 A lightning bolt had cut the night and shook me to my very core.
 I saw the screen collapse and die
 'Oh no--my data base,' I cried
 I thought I heard a voice reply,
 'You'll see your data Nevermore!'

 To this day I do not know
 The place to which lost data goes
 I bet it goes to heaven where the angels have it stored
 But as for productivity, well
 I fear that IT goes straight to hell
 And that Us the tale I have to tell
 Your choice:  'Abort, Retry, Ignore.'

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                  TWAS THE NIGHT BEFORE STAR TREK...

 'Twas the night before Christmas, when all through the ship
 Not a circuit was buzzing, not one microchip;
 The phasers were hung in the armory securely,
 In hope that no alien would get up that early.

 The crewmen were nestled all snug in their bunks
 (Except for the few who were partying drunks);
 And Picard in his nightshirt, and Bev in her lace,
 Had just settled down for a neat face to face...

 When out in the hall there arose such a racket,
 That we leapt from our beds, pulling on pant and jacket.
 Away to the lifts we all shot like a gun,
 Leapt into the cars and yelled loudly "Deck One!"

 The bridge red-alert lights, which flashed through the din,
 Gave a lustre of Hades to objects within.
 When, what on the viewscreen, our eyes should behold,
 But a weird kind of sleigh, and some guy who looked old.

 But the glint in his eyes was so strange and askew,
 That we knew in a moment it had to be Q.
 His sleigh grew much larger as closer he came.
 Then he zapped on the bridge and addressed us by name:

 "It's Riker, It's Data, It's Worf and Jean-Luc!
 It's Geordi, And Wesley, the genetic fluke!
 To the top of the bridge, to the top of the hall!
 Now float away! Float away! Float away all!"

 As leaves in the autumn are whisked off the street,
 So the floor of the bridge came away from our feet,
 And up to the ceiling, our bodies they flew,
 As the captain called out, "What the Hell is this, Q?!"

 The prankster just laughed and expanded his grin,
 And, snapping his fingers, he vanished again.
 As we took in our plight, and were looking around,
 The spell was removed, and we crashed to the ground.

 Then Q, dressed in fur from his head to his toe,
 Appeared once again, to continue the show.
 "That's enough!" cried the captain, "You'll stop this at once!"
 And Riker said, "Worf, take aim at this dunce!"

 "I'm deeply offended, Jean-Luc" replied Q,
 "I just wanted to celebrate Christmas with you."
 As we scoffed at his words, he produced a large sack.
 He dumped out the contents and took a step back.

 "I've brought gifts," he said, "just to show I'm sincere.
 There's something delightful for everyone here."
 He sat on the floor, and dug into his pile,
 And handed out gifts with his most charming smile:

 "For Counselor Troi, there's no need to explain.
 Here's Tylenol-Beta for all of your pain.
 For Worf I've some mints, as his breath's not too great,
 And for Geordi LaForge, an inflatable date."

 For Wesley, some hormones, and Clearasil-plus;
 For Data, a joke book, For Riker a truss.
 For Beverly Crusher, there's sleek lingerie,
 And for Jean-Luc, the thrill of just seeing her that way."

 And he sprang to his feet with that grin on his face
 And, clapping his hands, disappeared into space.
 But we heard him exclaim as he dwindled from sight,
 "Merry Christmas to all, and to all a good flight!"

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              SANTA SOURCE CODE

 By Unknown

 #bash

 better !pout !cry
 better watchout
 lpr why
 santa claus <north pole >town

 cat /etc/passwd >list
 ncheck list
 ncheck list
 cat list | grep naughty >nogiftlist
 cat list | grep nice >giftlist
 santa claus <north pole >town

 who | grep sleeping
 who | grep awake
 who | egrep 'bag|good'
 for (goodnes sake) {
         be good
         }

 better !pout !cry
 better watchout
 lpr why
 santa claus <north pole >town


 [original source unknown]

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%-----------------
 
              MY LIFE AS AN INTERNATIONAL ARMS COURIER

 By Matt Blaze (mab@research.att.com)

 Under an obscure provision of US law, devices and computer programs
 that use encryption techniques to hide information from prying eyes
 and ears are considered ``munitions'' and subject to the same rules
 that govern the international arms trade.  In particular, taking such
 items out of this country requires the approval of the State
 Department, which decides whether exporting something might endanger
 national security.  In the past, these restrictions were of little
 concern to the average citizen; encryption found most of its
 application in military and diplomatic communications equipment.
 Today, however, growing concern over electronic fraud and privacy
 means that encryption techniques are starting to find their way into
 more conventional commercial products like laptop computers and
 portable phones.

 Mostly to find out what the process was like, I recently applied for a
 temporary export license for a portable telephone encryption product
 that I wanted to take with me on a business trip to England and
 Belgium.

 The item in question is more properly called a ``telephone security
 device.''  This is a little box that scrambles telephone conversations
 to protect them against eavesdroppers; this sort of protection is
 sometimes important when discussing confidential business matters from
 faraway places.  The particular model I bought was already approved
 for export; it employs a cipher algorithm that the government has
 already decided is not a threat to national security even should it
 fall into the hands of some rogue government.  This model is aimed
 primarily, I presume, at international business travelers who want to
 communicate in a reasonably secure manner with their home offices in
 the states.  In other words, a typical user buys two of them, leaving
 one at the home office and carrying the other when traveling abroad.
 The options that came with my device included a James Bond-ish looking
 acoustic coupler and handset to facilitate its connection to the
 hardwired phones that are still common in European hotel rooms.

 It turns out that there was recently some discussion in the government
 about exempting products like my secure phone from the licensing
 paperwork requirements.  Unfortunately, however, this exemption never
 actually took effect.  So even though the device I had was already
 approved for sale abroad, I still needed to get a temporary export
 license before I could take it with me.  But I was assured that ``this
 is an easy, routine process''.  Well, sure enough, about two weeks
 before I was to leave I got back my official US State Department
 ``license for the temporary export of unclassified defense articles''.
 So far, so good.

 From what I was able to figure out by reading the license (and having
 a few conversations with an export lawyer), I'm required to leave from
 an international airport with a Customs agent present (no problem
 there, although Customs is geared to arriving, rather than departing,
 travelers).  At the airport, I'm supposed to fill out a form called a
 ``shipper's export declaration'' (SED) on which I have to declare that
 ``these commodities are authorized by the US government for export
 only to Belgium and the United Kingdom.  They may not be resold,
 transshipped, or otherwise disposed of in any country, either in their
 original form or incorporated into other end-items without the prior
 written approval of the US Department of State''.  Then I'm to present
 the SED and export license to a Customs official at the airport before
 I leave.  The Customs officer is supposed to take my SED and endorse
 my license to show what I'm actually taking out of the country.

 On the way back in, I'm supposed to ``declare'' my item at Customs
 (even though it was manufactured in the US) and show them my license,
 and they're supposed to endorse the license again as proof that I
 have, in fact, returned the ``defense article'' to the safety of the
 United States.

 The first hitch I ran into was that no one could actually tell me
 where I could get an SED form.  But when I called Customs they assured
 me that this was no big deal.  ``Just come by when you get to the
 airport and we stamp the license.  I guess you can just fill out the
 SED there,'' they said.

 I made sure to get to the airport early anyway.

 Although there was moderately heavy traffic near the airport, I made
 it to JFK two and a half hours before my 10pm flight.  I was flying
 United, which has their own terminal at JFK, so Customs has an office
 right there in the same building from which I was to depart (JFK is
 awful to get around, so I was glad for this).  I checked in for my
 flight (and got upgraded to first class, which bolstered my
 expectation that everything was going to be really easy from here on).
 Then, luggage, license and phone in hand, I made my way downstairs to
 Customs, expecting to fill out the SED form and ``just have my license
 stamped'' as they had assured me earlier on the telephone.  I
 explained my situation to the security guard who controls entry to the
 Customs area, and he led me to ``the back office'' without much
 argument or delay.  The head uniformed Customs guy in the back office
 (which I think is same office where they take the people suspected of
 being ``drug mules'' with cocaine-filled condoms in their stomaches)
 looked approachable enough.  He had a sort of kindly, grandfatherly
 manner, and he was playing a video game on a laptop computer.  I got
 the impression that most of the people he encounters are suspected
 drug smugglers, and he seemed pleased enough to be dealing with
 something a little different from the norm.  When I explained what I
 was doing he looked at me as if I had just announced that I was a
 citizen of Mars who hadn't even bothered to obtain a visa.

 He explained, carefully, that a) I really do need the SED form; b) not
 only that, I should have already filled it out, in duplicate; c) he
 doesn't have blank SED forms; d) he, like everyone else in the entire
 US government that I had spoken to, has no idea where one gets them
 from, but people must get them from somewhere; and e) it doesn't
 really matter, because I'm in the wrong place anyway.

 I asked him where the right place is.  ``The cargo building, of
 course,'' he told me, patiently.  I remembered the cargo building
 because I passed it in the taxi just as the traffic jam began, about
 half an hour before I got to the United terminal.  The airport shuttle
 bus doesn't stop there.  I'd have to call a taxi.  ``But I think
 they're closed now, and even if they were open you'd never make it
 before your flight'' he helpfully added, saving me the trip.  He also
 complemented me for going to the trouble to get the license.

 I must have looked hurt and confused.  Eventually he called in some
 fellow in a suit who I presume to have been his boss.

 ``Are you the guy who wants to export the fancy gun?'' the fellow in
 the suit asked me.

 ``It's not a gun, it's a telephone,'' I responded, with a straight
 face.

 ``Why do you have a license to export a telephone?''  Good question, I
 thought.  I explained about the export law and showed him the thing.
 He agreed that it looked pretty harmless.

 The fellow in the suit reiterated points a through e almost verbatim
 (do they rehearse for these things?) and explained that this isn't
 really their department, since my license was issued by the State
 Department, not Customs, and my situation doesn't come up very often
 because exports usually go via the cargo building.  He'd love to help
 me, but the computer in which these things get entered is over in
 Cargo.  ``That's how the records get made.  But you do have a valid
 license, which is nice.''  He also suggested that I would have had an
 easier time had I shipped the device instead of carrying it with me.

 I asked what I should do, given that my plane was scheduled to leave
 in less than an hour.  Neither was sure, but the fellow in the suit
 seemed willing leave it to the discretion of the uniformed guy.  ``How
 does this thing work, anyway?'' he asked.  I explained as best as I
 could, trying to make it sound as harmless as it is.  ``You mean like
 that Clipper chip?'' he asked.

 At this point, given that he has a computer and knows something about
 the Clipper chip, I figured that maybe there was some hope of making
 my flight.  Or maybe I was about to spend the night in jail.  In my
 mind, I put it at about a 90:10 hope:jail ratio.

 Then he asked, ``Do you know about this stuff?''

 So we chatted about computers and cryptography for a while.  Finally,
 the two of them decided that it wouldn't really hurt for them to just
 sign the form as long as I promised to call my lawyer and get the SED
 situation straightened out ASAP.  They assured me that I won't be
 arrested or have any other trouble upon my return.

 I made my flight, validated license in hand.

 An aside: Throughout my trip, I discovered an interesting thing about
 the phone and the various options I was carrying with it.  Under X-ray
 examination, it looks just like some kind of bomb.  (I suspect it was
 the coiled handset cords).  Every time I went through a security
 checkpoint, I had to dig the thing out of my luggage and show it to
 the guard.  I almost missed the new ``Eurostar'' chunnel train (3hrs
 15mins nonstop from London to Brussels, airport-style check-in and
 security) as the guards were trying to figure out whether my telephone
 was likely to explode.

 Coming back to the US was less eventful, though it did take me an
 extra hour or so to get through Customs.  Expecting a bit of a hassle
 I didn't check any luggage and made sure to be the first person from
 my flight to reach the Customs line.  The inspector was ready to
 wordlessly accept my declaration form and send me on my way when I
 opened my mouth and explained that I needed to get an export license
 stamped.  That was obviously a new one for him.  He finally decided
 that this had to be handled by something called the ``Ships Office''.
 I was sent to an unoccupied back room (a different back room from
 before) and told to wait.  I thought about the recent Customs
 experiences of Phil Zimmermann.  (Zimmermann, the author of a popular
 computer encryption program, was recently detained, questioned and
 searched by Customs officials investigating whether he violated the
 same regulations I was trying so hard to follow.)  After about half an
 hour, an officer came in and asked me what I needed.  I explained
 about my export license that had to be endorsed.  She just shrugged
 and told me that she had to ``process the flight'' first.  As best as
 I could tell, her job was to clear the airplane itself through
 Customs, that being, technically speaking, a very expensive import.
 It would take a little while.  She was pleasant enough, though, and at
 least didn't look at me as if she intended to send me to jail or have
 me strip searched.

 Finally, she finished with the plane and asked me for my form.  She
 studied it carefully, obviously never having seen one before, and
 eventually asked me what, exactly, she was supposed to do.  I
 explained that I had never actually gone through this process before
 but I understood that she's supposed to record the fact that I was
 re-importing the device and stamp my license somewhere.  She told me
 that she didn't know of any place for her to record this.  After some
 discussion, we agreed that the best thing to do was to make a Xerox
 copy of my license and arrange for it to go wherever it had to go
 later.  She stamped the back of the license and sent me on my way.  It
 was a little over an hour after I first reached the Customs desk.

 My conclusion from all this is that it just isn't possible for an
 individual traveler to follow all the rules.  Even having gone through
 the process now, I still have no idea how to obtain, let alone file,
 the proper forms, even for a device that's already been determined to
 be exportable.  The export of export-controlled items is ordinarily
 handled by cargo shipment, not by hand carrying by travelers, and the
 system is simply not geared to deal with exceptions.  Technically
 speaking, everyone with a laptop disk encryption program who travels
 abroad is in violation of the law, but since no one actually knows or
 checks, no mechanism exists to deal with those who want to follow the
 rules.  While (fortunately) everyone I dealt with was sympathetic, no
 one in the government who I spoke with was able to actually help me
 follow the rules.  I was permitted to leave and come back only because
 everyone involved eventually recognized that my telephone was pretty
 harmless, that my intentions were good, and that the best thing to do
 was be flexible.  If anyone had taken a hard line and tried to enforce
 the letter of the law, I simply wouldn't have been able to take the
 thing with me, even with my license.  Had I just put my telephone in
 my suitcase without telling anyone instead of calling attention to
 myself by trying to follow the rules, chances are no one would have
 noticed or cared.

 Unfortunately, however, these absurd rules carry the full force of
 law, and one ignores them only at the risk of being prosecuted for
 international arms trafficking.  While it may seem far-fetched to
 imagine US citizens prosecuted as arms smugglers simply for carrying
 ordinary business products in their luggage, the law as written allows
 the government to do just that.  At the same time, anyone who is aware
 of and who tries to follow the regulations is made to jump through
 pointless hoops that are so obscure that even the people charged with
 enforcing them don't know quite what to make of them.

 Copyright 1995 by Matt Blaze. All rights reserved.

 Electronic redistribution permitted provided this article is reproduced
 in its entirety.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    OPEN LETTER TO WIRED MAGAZINE

 By Chris Goggans (phrack@well.sf.ca.us)

 To Whom It May Concern:

 I am writing this under the assumption that the editorial staff at
 Wired will "forget" to print it in the upcoming issue, so I am
 also posting it on every relevant newsgroup and online discussion forum
 that I can think of.

 When I first read your piece "Gang War In Cyberspace" I nearly choked on
 my own stomach bile.  The whole tone of this piece was so far removed
 from reality that I found myself questioning what color the sky must be
 in Wired's universe.  Not that I've come to expect any better from Wired.
 Your magazine, which could have had the potential to actually do
 something, has become a parody...a politically correct art-school project
 that consistently falls short of telling the whole story or making a solid
 point.  (Just another example of Kapor-Kash that ends up letting everyone
 down.)

 I did however expect more from Josh Quittner.

 I find it interesting that so much emphasis can be placed on an issue of
 supposed racial slurs as the focus of an imaginary "gang war," especially
 so many years after the fact.

 It's also interesting to me that people keep overlooking the fact that
 one of the first few members of our own little Legion of Doom was black
 (Paul Muad'dib.)  Maybe if he had not died a few years back that wouldn't
 be so quickly forgotten.  (Not that it makes a BIT of difference what color
 a hacker is as long as he or she has a brain and a modem, or these days
 at least a modem.)

 I also find it interesting that a magazine can so easily implicate someone
 as the originator of the so-called "fighting words" that allegedly sparked
 this online-battle, without even giving a second thought as to the damage
 that this may do to the person so named.  One would think that a magazine
 would have more journalistic integrity than that (but then again, this IS
 Wired, and political correctness sells magazines and satisfies
 advertisers.)  Thankfully, I'll only have to endure one month of the
 "Gee Chris, did you know you were a racist redneck?" phone calls.

 It's further odd that someone characterized as so sensitive to insults
 allegedly uttered on a party-line could have kept the company he did.
 Strangely enough, Quittner left out all mention of the MOD member who
 called himself "SuperNigger."  Surely, John Lee must have taken umbrage to
 an upper-middle class man of Hebrew descent so shamefully mocking him and
 his entire race, wouldn't he?   Certainly he wouldn't associate in any way
 with someone like that...especially be in the same group with, hang out
 with, and work on hacking projects with, would he?

 Please, of course he would, and he did.  (And perhaps he still does...)

 The whole "racial issue" was a NON-ISSUE.  However, such things make
 exciting copy and garner many column inches so keep being rehashed.  In
 fact, several years back when the issue first came up, the statement was
 cited as being either "Hang up, you nigger," or "Hey, SuperNigger," but
 no one was sure which was actually said.  Funny how the wording changes
 to fit the slant of the "journalist" over time, isn't it?

 I wish I could say for certain which was actually spoken, but alas, I was
 not privy to such things.  Despite the hobby I supposedly so enjoyed
 according to Quittner, "doing conference bridges," I abhorred the things.
 We used to refer to them as "Multi-Loser Youps" (multi-user loops) and
 called their denizens "Bridge Bunnies."  The bridge referred to in the
 story was popularized by the callers of the 5A BBS in Houston, Texas.
 (A bulletin board, that I never even got the chance to call, as I had
 recently been raided by the Secret Service and had no computer.)  Many
 people from Texas did call the BBS, however, and subsequently used the
 bridge, but so did people from Florida, Arizona, Michigan, New York and
 Louisiana.  And as numbers do in the underground, word of a new place to
 hang out caused it to propagate rapidly.

 To make any implications that such things were strictly a New York versus
 Texas issue is ludicrous, and again simply goes to show that a "journalist"
 was looking for more points to add to his (or her) particular angle.

 This is not to say that I did not have problems with any of the people
 who were in MOD.  At the time I still harbored strong feelings towards
 Phiber Optik for the NYNEX-Infopath swindle, but that was about it.
 And that was YEARS ago.  (Even I don't harbor a grudge that long.)
 Even the dozen or so annoying phone calls I received in late 1990 and
 early 1991 did little to evoke "a declaration of war."  Like many people,
 I know how to forward my calls, or unplug the phone.  Amazing how
 technology works, isn't it?

 Those prank calls also had about as much to do with the formation of
 Comsec as bubble-gum had to do with the discovery of nuclear fission.
 (I'm sure if you really put some brain power to it, and consulted Robert
 Anton Wilson, you could find some relationships.)  At the risk of sounding
 glib, we could have cared less about hackers at Comsec.  If there were no
 hackers, or computer criminals, there would be no need for computer
 security consultants.  Besides, hackers account for so little in the real
 picture of computer crime, that their existence is more annoyance than
 something to actually fear.

 However, when those same hackers crossed the line and began tapping our
 phone lines, we were more than glad to go after them.  This is one of my
 only rules of action:  do whatever you want to anyone else, but mess with
 me and my livelihood and I will devote every ounce of my being to paying
 you back.  That is exactly what we did.

 This is not to say that we were the only people from the computer
 underground who went to various law enforcement agencies with information
 about MOD and their antics.  In fact, the number of hackers who did was
 staggering, especially when you consider the usual anarchy of the
 underground.  None of these other people ever get mentioned and those of
 us at Comsec always take the lead role as the "narks," but we were far
 from alone.  MOD managed to alienate the vast majority of the computer
 underground, and people reacted.

 All in all, both in this piece, and in the book itself, "MOD, The Gang That
 Ruled Cyberspace," Quittner has managed to paint a far too apologetic piece
 about a group of people who cared so very little about the networks they
 played in and the people who live there.  In the last 15 years that I've
 been skulking around online, people in the community have always tended
 to treat each other and the computers systems they voyeured with a great
 deal of care and respect.  MOD was one of the first true examples of a
 groupthink exercise in hacker sociopathy.  Selling long distance codes,
 selling credit card numbers, destroying systems and harassing innocent
 people is not acceptable behavior among ANY group, even the computer
 underground.

 There have always been ego flares and group rivalries in the underground,
 and there always will be.  The Legion of Doom itself was FOUNDED because of
 a spat between its founder (Lex Luthor) and members of a group called The
 Knights of Shadow.  These rivalries keep things interesting, and keep the
 community moving forward, always seeking the newest bit of information in
 a series of healthy one-upsmanship.  MOD was different.  They took things
 too far against everyone, not just against two people in Texas.

 I certainly don't condemn everyone in the group.  I don't even know
 a number of them (electronically or otherwise.)  I honestly believe
 that Mark Abene (Phiber) and Paul Stira (Scorpion) got royally screwed
 while the group's two biggest criminals, Julio Fernandez (Outlaw) and
 Allen Wilson (Wing), rolled over on everyone else and walked away free
 and clear.  This is repulsive when you find out that Wing in particular
 has gone on to be implicated in more damage to the Internet (as Posse and
 ILF) than anyone in the history of the computing.  This I find truly
 disgusting, and hope that the Secret Service are proud of themselves.

 Imagine if I wrote a piece about the terrible treatment of a poor prisoner
 in Wisconsin who was bludgeoned to death by other inmates while guards
 looked away.  Imagine if I tried to explain the fact that poor Jeff Dahmer
 was provoked to murder and cannibalism by the mocking of adolescent boys
 who teased and called him a faggot.  How would you feel if I tried to
 convince you that we should look upon him with pity and think of him as a
 misunderstood political prisoner?  You would probably feel about how I do
 about Quittner's story.

 'Hacker' can just as easily be applied to "journalists" too, and with this
 piece Quittner has joined the Hack Journalist Hall of Fame, taking his
 place right next to Richard Sandza.

 Quittner did get a few things right.  I do have a big cat named Spud, I do
 work at a computer company and I do sell fantastic t-shirts.  Buy some.

 With Love,

 Chris Goggans
 aka Erik Bloodaxe

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      WHEN BIGOTRY OUTPACES TECHNOLOGY

 By Douglas Welch dewelch@pop.com

 Previously published in the Los Angeles Times, Monday, December 19, 1994.
 Page B15

 Note: Electronic re-posting is ALLOWED but NO PAPER REPRINTS or inclusion
 in online digests without written permission from the author. All postings
 must retain this notice.

 Copyright (c) 1994 Douglas E. Welch
 dewelch@pop.com
 76625,3301

 * Communications: We need to attack the message, not the modem, to ensure
 on-line services are free from censorship.

 As each new technology marches onto the scene, there are some who instantly
 blame all the ills of society on it. Groups calling for the censorship of
 computer networks are forgetting that it is not the technology that is
 causing the problem, but the people using the technology. Instead of
 targeting the authors of hate speech on the computer networks, they are
 targeting the networks themselves. This only reinforces the immediate need
 for on-line computer services to be protected by the federal government
 as "common carriers," like telephone utilities.

 Hatemongers and bigots have always been a part of human society. Through
 ignorance and bullying, they gather their flock, but it is through open
 debate, education and reasoned discourse that they are best confronted.
 Instead, professed anti-hate groups are attacking the providers of on-line
 services in an effort to force them to remove offensive messages or prevent
 their posting. Rather than using the technology to fight back and denounce
 hate speech, they are seeking to remove the freedom of speech altogether.
 Were the situation reversed, I am sure you would hear them decrying the
 evils of censorship as loudly as they call for it now.

 Telephone companies cannot be sued when offensive or illegal calls are
 placed through their systems. On-line services deserve the same kind of
 "common carrier" status. There is no reason on-line services should have to
 be both provider and policeman. This places them in danger of being a
 censor.

 On-line users have several simpler options. They can merely ignore the
 message with the press of a key or set their "kill file" to ignore
 messages of certain content or from a certain user. Ultimately, on-line
 services provide users the chance to engage these hatemongers in a forum
 free of physical threat with hopes of liberating their narrow focus. The
 immediacy of posting a response can only be found in the on-line world.

 On-line services are no passing fad. they are rapidly gaining popularity
 on par with telephone and fax service. We need to stop treating on-line
 services like something new and ensure that they are free from censorship
 pressures.

 Censorship has always been defined as a "slipperly slope" that can easily
 lead to a repression of ideas and a lower quality of life. Whether we
 communicate via paper, phone lines or on-line computer services, our
 freedom of speech should be protected. Hate groups should be targeted for
 their messages, not how they send them.

 Douglas E. Welch is a computer consultant. He can be reached at
 dewelch@pop.com.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

             LETTER FROM STEVE CASE; RE: CHILD PORN ON AOL

 By Steve Case

 Ever since we first launched America Online we've remained committed to
 fostering an electronic community that provides a fun, enjoyable and
 enriching experience for all members.  We've asked our members to honor
 the privilege of interactivity, and we've strictly enforced our Terms of
 Service to help foster the kind of community of which we can all be proud.
 Recently, however, some material has been brought to our attention by some
 of our members which involves illegal activity -- the trading of images in
 electronic mail which appear to be child pornography.  Upon receiving the
 material, and verifying that it was a violation of our Terms of Service,
 and in all likelihood illegal, we immediately contacted the FBI and
 terminated the accounts of the senders.

 While we recognize that any community around the United States with more
 than 1.5 million citizens will have its share of illegal activity, we were
 nonetheless disheartened to find that some members are abusing the
 communications features of AOL in this way.  We simply will not tolerate
 such illegal activity on America Online.  To anyone who may be using
 America Online for illegal purposes, be advised that we will terminate the
 accounts of those participating and we will notify the proper authorities
 of any illegal activity that is brought to our attention.

 Our policy is that all private communications -- including e-mail, instant
 messages, and private chat rooms -- are strictly private.  We do not, will
 not, and legally cannot monitor any private communications.   But if we
 are alerted to a potential offense and we are sent evidence, as we were
 recently, we will vigorously pursue the matter.   In this case, electronic
 mail was forwarded to our attention by our members, and as recipients of
 the mail we were able to turn the material over to the authorities.

 We have over 250 people who help us provide assistance in the public areas
 of the service and give guidance to members who are new or who have
 questions. Of late, we've had a growing problem with member-created rooms
 whose title and discussion violate our Terms of Service.  Member-created
 rooms have always been a unique and much-valued aspect of America Online.
 Often, these rooms provide the seeds for new special interest forums that
 later emerge. But as more members abuse the privilege and establish rooms
 that suggest illegal activity, or detract from the enjoyment of others
 with offensive titles, we are faced with looking at a higher level of
 safeguards as it relates to member-created rooms.  We simply cannot keep
 up with the sheer volume of rooms created, and as a result, from time to
 time rooms that violate TOS remain open for some period of time.  We're
 looking at several alternatives to improve the situation.  We don't want
 to see our members denied the privilege of this fun and creative
 interactive environment due to the abuses of a few, but at the same time
 we do feel some action is warranted to safeguard this popular
 "neighborhood" in our community.

 Unfortunately, this is not the first time we have encountered this
 problem, nor is it unique to AOL.  In 1991, we were faced with a similar
 situation. At that time, we went to our members -- as we're doing now --
 advised them of the situation and asked for their help.  And recently,
 recognizing the potential for abuses in this emerging medium, online
 service providers banded together to sponsor a "child safety" brochure
 that gives parents tips and guidelines to foster a productive and safe
 environment for children online. A copy of this brochure can be found in
 the Parents Information Center, keyword:  Parents.  We encourage parents
 to take the time to review it.  In addition we strongly encourage parents
 to monitor their children's use of this medium, much as they would any
 other medium such as television, magazines, etc.  We've also implemented
 "parental controls" which allow parents to restrict their children's
 online access.

 Each one of us needs to respect and honor the privileges of this
 electronic community.  If you haven't reviewed our Terms of Service, take
 a few minutes now and do so.  If you observe what you believe may be
 illegal activity on AOL, bring it to our attention.  The problem is not
 widespread -- we believe only a mere fraction of this community is
 involved.  Let's work together to insure that America Online remains the
 kind of community that you want your friends and family to enjoy.

 Thanks for your continued support.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%-----------------

 
                 LEE HARVEY OSWALD DIED FOR YOUR SINS

 By Gordon Fagan, Conspiracy Editor (flyer@io.com)
 
 
 With all the hubbub over the OJ Simpson trial currently getting
 under way, I thought it would be a good idea to get people to rethink
 their conception of what justice is about in another matter.  Where there
 was no trial, not even real charges - just accusations, a bullet and 30+
 years of government approved postmortem derision as an insane killer. 
 We've all seen the movie JFK which is probably more than most of you want
 to hear on the subject in the first place, so I'll just leave each of you
 - in particular, those who have no interest in the JFK assassination
 conspiracy but can't get enough of that OJ, with the following...
 
 

 It has been said that the American people are the only jury that
 Lee Harvey Oswald will ever have.  It is our responsibility, then, to
 examine with utmost care and objectivity the evidence for and against him,
 and to reach an independent verdict - Sylvia Meagher
 
 
           
        Jim Garrison's closing statement to the jury
 
          State of Louisiana vs. Clay Shaw, 1969

    May it please the court.  Gentlemen of the jury:
  
 I know you're very tired.  You've been very patient.  This final
 day has been a long one, so I'll speak only a few minutes. 
 
 In his argument, Mr. Dymond posed one final issue which raises the
 question of what we do when the need for justice is confronted by power. 
 
 So, let me talk to you about a question of whether or not there
 was government fraud in this case.  A question Mr. Dymond seems to want us
 to answer. 
 
 A government is a great deal like a human being.  It's not
 necessarily all good, and it's not necessarily all bad.  We live in a good
 country.  I love it and you do, too.  Nevertheless, the fact remains that
 we have a government which is not perfect. 
 
 There have been since November the 22nd of 1963, and that was not
 the last, indications that there is an excessive power in some parts of
 our government.  It is plain that the people have not received all of the
 truth about some of the things which have happened, about some of the
 assassinations which have occurred, and more particularly about the
 assassination of John Kennedy. 
 
 Going back to when we were children, I think most of us, probably
 all of us in this courtroom, once thought that justice came into being of
 its own accord, that that virtue was its own regard, that good would
 triumph over evil.  In short, that justice occurred automatically.  Later,
 when we found that this wasn't quite so, most of us still felt hopeful
 that at least occurred frequently of its own accord. 
 
 Today, I think that almost all of us would have to agree that
 there is really no machinery, not on this earth at least, which causes
 justice to occur automatically.  Men still have to make it occur. 
 Individual human beings have to make it occur.  Otherwise, it doesn't come
 into existence.  This is not always easy.  As a matter of fact, it's
 always hard, because justice presents a threat to power.  In order to make
 justice come into being, you often have to fight power. 
 
 Mr. Dymond raised the question; "Why don't we say it's all a fraud
 and charge the government with fraud, if that is the case?" 
 
 Let me be explicit, then, and make myself very clar on this point. 
 The goverment's handling of the investigation of John Kennedy's murder was
 a fraud.  It was the greatest fraud in the history of our country.  It
 probably was the greatest fraud ever perpetrated in the history of
 humankind. 
 
 That doesn't mean that we have to accept the continued existence
 of the kind of government which allows this to happen.  We can do
 something about it.  We're not forced either to leave this country or
 accept the authoritarianism that has developed.  The authoritarianism that
 tells us that in the year 2039 we can see the evidence about what happened
 to John Kennedy. 
 
 Government does not consist only of secret police and domestic
 espionage operations and generals and admirals.  Government consists of
 people.  It also consists of juries.  And in the cases of murder, whether
 the poorest individual or the most distinguished citizen in the land,
 should be looked at openly in a court of law, where juries can pass on
 them and not be hidden, not be buried like the body of the victim beneath
 concrete for countless years. 
 
 You men in recent weeks have heard witnesses that no one else in
 the world has heard.  You've seen the Zapruder film.  You've seen what
 happened to your President.  I suggest to you that you know right now
 that, in that area at least, a fraud has been perpetrated. 
 
 That does not mean that our government is entirely bad - and I
 want to emphasize that.  It does mean, however that in recent years,
 through the development of excessive power because of the Cold War, forces
 have developed in our government over which there is no control and these
 forces have an authoritarian approach to justice; meaning, they will let
 you know what justice is. 
 
 Well, my reply to them is that we already know what justice is. 
 It is the decision of the people passing on the evidence.  It is the jury
 system.  In the issue which is posed by the government's conduct in
 concealing the evidence in this case, in the issue of humanity as opposed
 to power, I have chosen humanity, and I will do it again without
 hesitation.  I hope every one of you will do the same.  I do this because
 I love my country and because I want to communicate to the government that
 we will not accept unexplained assassinations with the casual information
 that if we live seventy-five years longer, we might be given more
 evidence. 
 
 In this particular case, massive power was brought to bear to
 prevent justice from ever coming into the courtroom.  The power to make
 authoritarian pronouncements, the power to manipulate the news media by
 the release of false information, the power to interfere with an honest
 inquiry and the power to provide an endless variety of experts to testify
 in behalf of that power, repeatedly was demonstrated in this case. 
 
 The American people have yet to see the Zapruder film.  Why?  The
 American people have yet to see and hear from real witnesses to the
 assassination.  Why?  Because, today in America too much emphasis is given
 to secrecy, with regard to the assassination of our President, and not
 enough emphasis is given to the question of justice and to the question of
 humanity. 
 
 These dignified deceptions will not suffice.  We have had enough
 of power without truth.  We don't have to accept power without truth or
 else leave the country.  I don't accept power without truth or else leave
 the country.  I don't accept either of these two alternatives.  I don't
 intend to leave the country and I don't intend to accept power without
 truth. 
 
 I intend to fight for the truth.  I suggest that not only is this
 not un-American, but it is the most American thing we can do, because if
 truth does not endure, then our country will not endure. 
 
 In our country the worst of all crimes occurs when the government
 murders truth.  If it can murder truth, it can murder freedom.  If it can
 murder freedom it can murder your own sons, if they should dare to fight
 for freedom, and then it can announce that they were killed in an
 industrial accident, or shot by the "enemy" or God knows what. 
 
 In this case, finally, it has been possible to bring the truth
 about the assassination into a court of law, not before a commission
 composed of important and politically astute men, but before a jury of
 citizens. 
 
 Now, I suggest to you that yours is a hard duty, because in a
 sense what you're passing on is the equivalent to a murder case.  The
 difficult thing about passing on a murder case is that the victim is out
 of your sight and buried a long distance away, and all you can see is the
 defendant.  It's very difficult to identify with someone you can't see,
 and sometimes it's hard not to identify to some extent with the defendant
 and his problems. 
 
 In that regard, every prosecutor who is at all humane is concious
 of feeling sorry for the defendant in every case he prosecutes.  But he is
 not free to forget the victim who lies buried out of sight.  I suggest to
 you that, if you do your duty, you also are not free to forget the victim
 who is buried out of sight. 
 
 Tennyson once said that "authority forgets a dying king."  This
 was never more true than in the murder of John Kennedy.  The strange and
 deceptive conduct of the government after his murder began while his body
 was still warm, and has continued for five years.  You have even seen in
 this courtroom indications of interest of part of the government power
 structure in keeping truth down, in keeping the grave closed. 
 
 We presented a number of eyewitnesses as well as an expert witness
 as well as the Zapruder film, to show that the fatal wound of the
 President came from the front.  A plane landed from Washington and out
 stepped Dr. Finck for the defense, to counter the clear and apparent
 evidence of a shot from the front.  I don't have to go into Dr. Finck's
 testimony in detail for you to show that it simply does not correspond to
 the facts.  He admitted that he did not complete the autopsy because a
 general told him to not complete the autopsy. 
 
 In this conflict between power and justice, to put it that way,
 just where do you think Dr. Finck stands?  A general who is not a
 pathologist, told him not to complete the autopsy, so he didn't complete
 it.  This is not the way I want my country to be.  When our president is
 killed he deserves the kind of autopsy that the ordinary citizens get
 every day in the state of Louisana.  And the people deserve the facts
 about it.  We can't have the government power suddenly interjecting itself
 and preventing the truth from coming to the people. 
 
 Yet, in this case, before the sun rose the next morning, power had
 moved into the situation and the truth was being concealed.  And now, five
 years later in this courtroom the power of the government in concealing
 the truth is continuing in the same way. 
 
 We presented eyewitnesses who told you of the shots coming from
 the grassy knoll.  A plane landed from Washington, and out came ballistics
 expert Frazier for the defense.  Mr. Frazier explanation of the sound of
 the shots coming frm the front, which was heard by eyewitness after
 eyewitness, was that Lee Oswald created a sonic boom in his firing.  Not
 only did Oswald break all of the world's records for marksmanship, but he
 broke the sound barrier as well. 
 
 I suggest to you, that if any of you have shot on a firing range,
 and most of you probably in the service, you were shooting rifles in which
 the bullet travelled faster than the speed of sound.  I ask you to recall
 if you ever heard a sonic boom.  If you remember when you were on the
 firing line, and they would say, "ready on the left - ready on the right -
 ready on the firing line - commence firing," you heard the shots coming
 from the firing line, to the left of you and to the right of you.  If you
 had heard as a result of Mr. Frazier's fictional sonic boom, firing coming
 at you from the pits, you would have had a reaction which you would still
 remember. 
 
 Mr. Frazier's sonic boom simply doesn't exist.  It's a part of the
 fraud, a part of the continuing government fraud. 
 
 The best way to make this country the kind of country it's
 supposed to be is to communicate to the government that no matter how
 powerful it may be, we do not accept these frauds.  We do not accept these
 false announcements.  We do not accept the concealment of evidence with
 regard to the murder of President Kennedy. 
 
 Who is the most believable?  A Richard Randolph Carr, seated here
 in a wheelchair and telling you what he saw and what he heard and how he
 was told to shut his mouth, or Mr. Frazier and his sonic booms? 
 
 Do we really have to actually reject Mr. Newman and Mrs. Newman
 and Mr. Carr and Roger Craig and the testimony of all those honest
 witnesses, reject all this and accept the fraudulent Warren Commission, or
 else leave the country? 
 
 I suggest to you that there are other alternatives.  Once of them
 has been put in practice in the last month in the State of Louisiana, and
 that is to bring out the truth in a proceeding where attorneys can
 cross-examine, where the defendant can be confronted by testimony against
 him, where the rules of evidence are applied and where a jury of citizens
 can pass on it, and where there is no government secrecy.  Above all,
 where you do not have evidence concealed for seventy-five years in the
 name of "national security." 
 
 All we have in this case are the facts.  Facts which show that the
 defendant participated in the conspiracy to kill the President and that
 the President was subsequently killed in an ambush. 
 
 The reply of the defense has been the same as the early reply of
 the government in the Warren Commission.  It has been authority,
 authority, authority.  The President's seal outside of each volume of the
 Warren Commission Report, made necessary because there is nothing inside
 these volumes.  Men of high position and prestige sitting on a board, and
 announcing the results to you, but not telling you what the evidence is,
 because the evidence has to be hidden for seventy-five years. 
 
 You heard in this courtroom in recent weeks, eyewitness after
 eyewitness after eyewitness and, above all, you saw one eyewitness which
 was indifferent to power, the Zapruder film.  The lens of the camera is
 totally indifferent to power and it tells what happened as it saw it
 happen, and that is one of the reasons 200 million Americans have not seen
 the Zapruder film.  They should have seen it many times.  They should know
 exactly what happened.  They all should know what you know now. 
 
 Why hasn't all of this come into being if there hasn't been
 government fraud?  Of course there has been fraud by the government. 
 
 But I'm telling you now that I think we can do something about it. 
 I think that there are still enough Americans left in this country to make
 it continue to be America.  I think that we can still fight
 authoritarianism, the government's insistence on secrecy, government force
 used in counterattacks against an honest inquiry, and when we do that,
 we're not being un-American, we're being American.  It isn't easy.  You're
 sticking your neck out in a rather permanent way, but it has to be done
 because truth does not come into being automatically.  Justice does not
 happen automatically.  Individual men, like the members of my staff here,
 have to work and fight to make it happen, and individual men like you have
 to make justice come into being because otherwise it doesn't happen. 
 
 What I'm trying to tell you is that there are forces in America
 today, unfortunately, which are not in favor of the truth coming out about
 John Kennedy's assassination.  As long as our government continues to be
 like this, as long as such forces can get away with such actions, then
 this is no longer the country in which we were born. 
 
 The murder of John Kennedy was probably the most terrible moment
 in the history of our country.  Yet, circumstances have placed you in the
 position where not only have you seen the hidden evidence but you are
 actually going to have the opportunity to bring justice into the picture
 for the first time. 
 
 Now, you are here sitting in judgement on Clay Shaw.  Yet you, as
 men, represent more than jurors in an ordinary case because the victims in
 this case.  You represent, in a sense, the hope of humanity against
 government power.  You represent humanity, which yet may triumph over
 excessive government power.  If you will cause it to be so, in the course
 of doing your duty in this case. 
 
 I suggest that you ask not what your country can do for you but
 what you can do for your country. 
 
 What can you do for your country?  You can cause justice to happen
 for the first time in this matter.  You can help make our country better
 by showing that this is still a government of the people.  And if you do
 that, as long as you live, nothing will ever be more important. 
 
 ---------------------------
 
  Since you read all the way through, you might be interested in
 more information.  You can check out alt.conspiracy.jfk at your favourite
 USENET site and see the still active coverup covering up.  Now including a
 phoney "Oswald did it alone" FAQ posting from a .mil address.  The
 internet equivalent to Gerald Posner's "Case Closed."  Though less well
 written, it includes about the same amount of real research.  There are
 some good people on the newsgroup as well and they have a large and
 growing body of info on display regularly.  Another excellent source is
 the web site for Fair Play magazine: http://www.kaiwan.com/~ljg/fp.html
 
 -31 and counting-



-----------------