💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › vol3_ind captured on 2022-06-12 at 11:09:15.

View Raw

More Information

-=-=-=-=-=-=-

                Volume 3, Issue #3.00 (January 6, 1991)

  CuD #3.00: File 1 of 6: Moderator's corner
  CuD #3.00: File 2 of 6: From the Mailbag
  CuD #3.00: File 3 of 6: Gender-Neutral Language
  CuD #3.00: File 4 of 6: Sexism and the CU
  CuD #3.00: File 5 of 6: Security on the Net
  CuD #3.00: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.01 (January 12, 1991)

            SPECIAL ISSUE:  RESPONSES TO CU/SEXISM ARTICLES

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.02 (January 16, 1991)

       SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.03 (January 22, 1991)

  CuD #3.03: File 1 of 4: Moderator's corner
  CuD #3.03: File 2 of 4: From the Mailbag
  CuD #3.03: File 3 of 4: CU-Related Bibliography
  CuD #3.03: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.04 (January 28, 1991)

  CuD #3.04, File 1 of 4: Moderator's corner
  CuD #3.04, File 2 of 4: From the Mailbag
  CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
  CuD #3.04, File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.05 (February 9, 1991)

  CuD #3.05, File 1 of 8: Moderator's corner
  CuD #3.05: File 2 of 8: From the Mailbag
  CuD #3.05: File 3 of 8: Arrest of Phiber Optik
  CuD #3.05: File 4 of 8: The Dictator--My Thoughts
  CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint)
  CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops.
  CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt
  CuD #3.05: File 8 of 8: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.06 (February 23, 1991)


  CuD #3.06, File 1 of 6: Moderator's corner
  CuD #3.06: File 2 of 6: From the Mailbag
  CuD #3.06: File 3 of 6: CuD Archive Server
  CuD #3.06: File 4 of 6: No Felony Charges against Phiber O.
  CuD #3.06: File 5 of 6: The FBI Comes Rapping.....
  CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.07 (March 2, 1991)

  CuD #3.07, File 1 of 6: Moderator's corner
  CuD #3.07: File 2 of 6: From the Mailbag
  CuD #3.07: File 3 of 6: CuD Index for Volume Two
  CuD #3.07: File 4 of 6: EFF Job Announcement
  CuD #3.07: File 5 of 6: Computers in the Movies
  CuD #3.07: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.08 (March 12, 1991)

  CuD #3.08, File 1 of 6: Moderator's corner
  CuD #3.08: File 2 of 6: From the Mailbag
  CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted
  CuD #3.08: File 4 of 6: What the EFF's Been Doing
  CuD #3.08: File 5 of 6: Book Review: Computer Ethics
  CuD #3.08: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.09 (March 19, 1991)

  CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype?
  CuD #3.09: File 2 of 2: Computers & First Amendment

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.10 (March 28, 1991)

  CuD #3.10--File 1 of 5: From the Mailbag
  CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II
  CuD #3.10--File 3 of 5: AP Story on Len Rose
  CuD #3.10--File 4 of 5: Washington Post Story on Len Rose
  CuD #3.10--File 5 of 5: Len Rose and the Washington Post

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.11 (April 4, 1991)

  CuD #3.11: File 1 of 5: Moderators' Corner
  CuD #3.11: File 2 of 5: From the Mailbag
  CuD #3.11: File 3 of 5: Sundevil Arrest Announced
  CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose
  CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.12 (April 15, 1991)

  CuD #3.12: File 1 of 4: From the Moderators
  CuD #3.12: File 2 of 4: From the Mailbag
  CuD #3.12: File 3 of 4: Responses to Business Week Article
  CuD #3.12: File 4 of 4: Using the CuD mailserver

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.13 (April 21, 1991)

  CuD #3.13: File 1 of 4: From the Mailbag
  CuD #3.13: File 2 of 4: Response to Len Rose Article (1)
  CuD #3.13: File 3 of 4: Response to Len Rose Article (2)
  CuD #3.13: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.14 (April 26, 1991)

  CuD #3.14: File 1 of 6: Moderators Corner
  CuD #3.14: File 2 of 6: Comments on Len Rose Articles
  CuD #3.14: File 3 of 6: Moving toward Common Ground?
  CuD #3.14: File 4 of 6: CERT Advisory
  CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker
  CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.15 (May 2, 1991)

  CuD #3.15: File 1 of 3: Moderators Corner
  CuD #3.15: File 2 of 3: The CU in the News
  CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.16 (May 9, 1991)

  CuD #3.16: File 1 of 6: Moderators Corner
  CuD #3.16: File 2 of 6: Is Prodigy Snooping?
  CuD #3.16: File 3 of 6: Prodigy under Fire
  CuD #3.16: File 4 of 6: Assorted Comments on Prodigy
  CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File
  CuD #3.16: File 6 of 6: A Few Observations on Prodigy

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.17 (May 17, 1991)

  CuD #3.17: File 1 of 5: Moderators Corner
  CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing
  CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing
  CuD #3.17: File 4 of 5: Exhibit A from Memorandum
  CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.18 (May 28, 1991)

    SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                Volume 3, Issue #3.19 (June 4, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Thrifty-Tel--Victim or Victimizer?
File 4: The CU in the News
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                Volume 3, Issue #3.20 (June 10, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Bay Area Archive Site
File 4: Top Ten Fallacies about SJG Raid
File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance
File 6: EFFector Online 1.07: S.266 Loses First Round
File 7: How to get WATCH.EXE
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.21 (June 17, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Review of Gary Marx's UNDERCOVER
File 4: Review of PROTECTORS OF PRIVILEGE
File 5: Review of THE INFORMATION WEB
File 6: Hollywood Hacker Sentenced
File 7: Len Rose Sentenced (Reprint from Newsbytes)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.22 (June 21, 1991)
CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Punishment and Control: Reply to Gene Spafford
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.24 (July 3, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag  (Response to "Cyberpunk" definition)
File 2: Bill Vajk, Len Rose, Gene Spafford
File 3: Comsec Security Press Release
File 4: Comments on ComSec Data Security
File 5: Police Confiscations and Police Profit
File 6: House Crime Bill (1400) and its Threat to Modemers
File 7: Law Panel Recommends Computer Search Procedures
File 8: The CU in the News (data erasing; cellular fraud)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.23 (June 27, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag  (Response to Dalton; Hacker Definitions)
File 2: Warrants issued for Indiana and Michigan "Hackers"
File 3: More on Thrifty-Tel
File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Today's Contents:
          Moderators' Corner
          Spaf's Response to Bill Vajk
          Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach)
          LOD Members for Comsec Computer Security (News Reprint)
          Alcor Email (ECPA) Case Settled (Keith Henson)
          NIST announces public-key digital signature standard (gnu)
          Secret Service Pays Hacker Call (Reprint from Newsbytes)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.26 (June 18, 1991)
File 1:          Moderators' Corner
File 2:          The Vajk-Spaf-Leichter dialogue continues......
File 3:          The TERMINUS of Len Rose
File 4:          "Computer Crime" paper by Brian Peretti available
File 5:          Doc Savage Sentenced (NEWSBYTES Reprint)
File 6:          CompuServe Responds to Policy and Operations Questions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.27 (July 27, 1991)
Subject: File 1-- Response to "The Terminus of Len Rose"(1)
Subject: File 2-- Response to "The Terminus of Len Rose"(2)
Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3)
Subject: File 4-- chinet review
Subject: File 5-- Comsec Data Security Article Corrections
Subject: File 6-- Crypto-conference statement
Subject: File 7-- Reasonable laws on computer crime
Subject: File 8-- re: Bill Vajk's latest comments
Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de
Subject: File 10--Late reply to Dutch Crackers article (CUD3.19)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28)
             >> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE <<

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.28 (August 1, 1991)
Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE
Subject: File 2--CuD Review of _Computer Ethics_ (Reprint)
Subject: File 3--Re: Hackers - Clamp Down NOW!
Subject: File 4--Reply to Tom Forester Article

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.29 (AUGUST 9, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Say Goodbye to FOIA?
Subject: File 3--Hackers Challenged to Break In
Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson
Subject: File 5--text of chron-spacemail
Subject: File 6--Reply to Gene Spafford
Subject: File 7--Estimates on virus activity
Subject: File 8--Research Analysis
Subject: File 9--comp.patents, misc.legal.computing and misc.int-property

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

#3.30 (AUGUST 16, 1991)
File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
File 4--Mystery Lurks In The Death of INSLAW Reporter

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.31 (AUGUST 23, 1991)
File 1--Moderators' Corner: Blurbs
File 2--Request info on suggestions for a class
File 3--New BBS for CuD back issues and other services
File 4--Moderators' Corner: Blurbs
File 5--BOARDWATCH Magazine
File 6--NREN Boondoggle?
File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
File 8--Memes, Gurus, and Viruses

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
              -> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-

CONTENTS, #3.32 (September 8, 1991)
File 1--CYBERPUNK Review
File 2--Review of _CYBERPUNK_
File 3--_CYBERPUNK_ Review
File 4--Newsweek review CYBERPUNK
File 5--Review of _CYBERPUNK_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.33 ( September 14, 1991)
File 1--Moderators' Corner
File 2--Clarification of "Boycott" Comment
File 3--How BellSouth Calculated $79,000
File 4--Houston Chronicle spacemail follow
File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
File 6--"Freaker's Bureau Incorporated" (FBI)
File 7--Review of Site Security Handbook (by Dark Adept)
File 8--Complain to Journalists
File 9--Spaf's Response to Reviews of _Unix Security_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.34 ( September 25, 1991)
File 1--Moderators' Corner
File 2--WANTED: TARGETS OF OPERATION SUN DEVIL
File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint)
File 4--New York Tax Law and Commentary by Tony Mack
File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint)
File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint)
File 7--Clarification of NY BBS Law
File 8--Summary of Significance of NY "BBS Download Tax" (reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.35 ( October 4, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
Subject: File 3--Computer Security Basics review
Subject: File 4--Steam age cyberpunk
Subject: File 5--Errata to "Practical Unix Security"
Subject: File 6--Living with the Law -- A view from Finland
Subject: File 7--Let's Get It Right.
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
Subject: File 9--Announcement
Subject: File 10--Cyberspace Conference in Montreal
Subject: File 11--Conference Info and Press Releases

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.36 ( October 12, 1991)
Subject: File 1-- Intro to Biblio and Resources Moderators' Corner
Subject: File 2-- General CU-Related Bibliography
Subject: File 3-- Dissertations and Theses
Subject: File 4-- General On-Line and Print Resources
Subject: File 5-- Misc. Books for Fun Reading

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest    Sat, Oct 19, 1991   Volume 3 : Issue 37

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

  **** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****

CONTENTS, #3.37 ( October 19, 1991)
File 1:  Summary of Geraldo's _Now it can be Told_
File 2:  Excerpts from "Mad Hacker's Key Party"
File 3:  Review_of_Now_It_Can_Be_Told_
File 4:  Geraldo Rivera show on "Hacking"
File 5:  The_RISKS_of_Geraldo
File 6:  2600 Magazine Exposes Security Holes (NEWSBYTE reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest    Sun, Oct 27, 1991   Volume 3 : Issue 38

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.38 ( October 27, 1991)
File 1:  Geraldo's _Now it can be Told_ Revisited
File 2:  Comment on the Geraldo Show
File 3:  A Guest's-eye view of the Geraldo Show
File 4:  Second Thoughts about the "Ingraham Massacre"
File 5:  Response to CuD #3.37's "Mad Hacker" Issue
File 6:  Release of Informatik #1
File 7:  Second Annual XMASCON

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.39 ( November 3, 1991)
File 1: Moderator's Corner--Brendan Kehoe's FTP information
File 2: The Secret Service and Protection of Privacy
File 3: Re: Response to Bill Vajk's FOIA Piece
File 4: Letters from Prison: Installment #1
File 5: Diehard 2 And Hacking
File 6: Re: CuD - Now It Can Be Told
File 7: Is the Government creating malign hackers?

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.40 ( November 10, 1991)
File 1: Rhetoric and CuD
File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38
File 3: Response to Ingraham Criticisms
File 4: Draft of BBS warnings to Law Enforcement Agents
File 5: CU Bibliography Update
File 6: Senate Bill 516 : Electronic Privacy in the Workplace
File 7: Letter from Prison (part 2 of 2)
File 8: "Password violations helped Hill hacker"

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS, #3.41 ( November 16, 1991)

  Bill Cook's opening statement in Neidorf/PHRACK trial

  ...and more!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.42 ( November 30, 1991)
File 1--Moderators' Corner
File 2--CPSR FOIAs Secret Service
File 3--Responses to CPSR (Reprinted from Telecom Digest)
File 4--Why Covert Surveillance is Wrong

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.43 ( Dec 8, 1991)
File 1--Moderators' Corner
File 2--You can help build the National Public Network.  Here's how.
File 3--#3.41--Bill Cook's opening statement in the Neidorf trial
File 4-- Two Juveniles arrested in BBS Extortion case
File 5--Law Enforcement and Rights
File 6--Townson's reply to Neidorf (in Cu Digest, #3.42)
File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson)
File 8--Software Piracy
File 9--Hacker Convicted
File 10--"Teens Tapped Computers of U.S. Military"
File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
File 12--Here's something you might find of interest
File 13--24 Year Old Cracks NASA

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.44 ( Dec 17, 1991)
File 1: Jyrkis Posting
File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected
File 3: FBI vs Kiddie Porn
File 4: "Getting what he Deserved?" (Reprint from Effector 2.02)
File 5--A book worth adding to your CuD list ...
File 6: E-mail privacy bibliography
File 7: Second CFP Conference

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                   ** END  CuD  INDEX  VOLUME  3 **
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++