Computer underground Digest Sun Feb 2, 1997 Volume 9 : Issue 06 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.06 (Sun, Feb 2, 1997) File 1--USR's little booboo (fwd) File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt) File 3--InfoWarCon6 - Brussels, Belgium (fwd) File 4--Call for papers: 6CYBERCONF File 5--DC-ISOC Tidbits File 6--"DNS and BIND," and "Mastering Regular Expressions" File 7--"The Basics of Computer Security" by Bellcore File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 7 Jan 1997 00:15:18 -0500 (EST) From: "noah@enabled.com" <noah@enabled.com> Subject: File 1--USR's little booboo (fwd) From -Noah ---------- Forwarded message ---------- Date--Mon, 6 Jan 1997 18:55:35 -0600 (CST) From--Brett L. Hawn <blh@nol.net> 56-kbps modem? Not quite By Jim Davis January 2, 1997, 5:30 p.m. PT U.S. Robotics (USRX), which has been leading the push for 56-kbps modem technology, has conducted preliminary tests showing that most consumers will be able to connect at higher speeds than with current modems--but not at the full 56 kbps. The company said the maximum downstream transmission speed will be limited to 53 kbps, not the 56 kbps originally promised. Federal Communications Commission regulations "limit the signal level" that digitally connected server equipment can transmit, the firm said. U.S. Robotics' x2 technology overcomes the speed limits of current 28.8-kbps modems based on the ISP having a direct connection to telephone companies' digital switches. The company said today that tests showed that "the vast majority" of users would be able to use x2 technology, while its modems would automatically default to lower speeds if such connections weren't possible. The test results were based on over 20,000 calls in seven Bell operating company regions, the firm said. U.S. Robotics says it is in beta testing of its products and expects to start shipping initial consumer products later this month. ------------------------------ Date: Mon, 13 Jan 1997 09:29:28 -0500 (EST) From: "noah@enabled.com" <noah@enabled.com> Subject: File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt) From -Noah ---------- Forwarded message ---------- Date--Fri, 10 Jan 1997 19:01:26 -0500 From--"David M. Balenson" <balenson@tis.com> PLEASE NOTE THE EARLY REGISTRATION AND HOTEL ROOM AVAILABILITY AND SPECIAL RATES DEADLINES ARE APPROACHING!! RESERVATIONS AT THE PRINCESS RESORT MUST BE MADE NO LATER THAN JAN 13TH FOR THE GOVERNMENT RATE, AND NO LATER THAN JAN 20TH FOR THE REDUCED GROUP RATE. EARLY REGISTRATION FOR THE SYMPOSIUM MUST BE POSTMARKED NO LATER THAN JAN 22ND. -------------------------------------------------------- THE INTERNET SOCIETY 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY (NDSS '97) 10-11 FEBRUARY 1997 SAN DIEGO PRINCESS RESORT, SAN DIEGO, CALIFORNIA This fourth annual symposium will bring together researchers, implementors, and users of network and distributed system security technologies to discuss today's important security issues and challenges. It will provide a mix of technical papers and panel presentations that describe promising new approaches to security problems that are practical, and to the extent possible, have been implemented. We hope to foster the exchange of technical information and encourage the Internet community to deploy available security technologies and develop new solutions to unsolved problems. WHY YOU SHOULD ATTEND The use of the Internet is rapidly growing and expanding into all aspects of our society. Commercial organizations are coming under increasing pressure to make their services available on-line. This in turn is increasing the need for rapid and widespread deployment of usable and effective network and distributed system security technologies. High visibility attacks on the Internet underscore the vulnerabilities of the Internet and the need to solve its security problems. There is growing concern for securing the network infrastructure itself. Recent trends in software distribution (such as Java and ActiveX technologies) have made certain attacks easier to carry out. Privacy has become an important issue for the Internet. NDSS '97 will bring together researchers, implementors, and users of network and distributed system technologies to discuss today's important security issues and challenges. We have selected the technical papers and panel presentations that describe promising new approaches to security problems that are practical, and to the extent possible, have been implemented. Topics to be addressed include Internet infrastructure and routing security, security for the World Wide Web, Java and ActiveX security, cryptographic protocols, public key management, and protection of privacy. The symposium will have a positive impact on the state of Internet security. You will have the opportunity to actively participate in the dialog. Ask questions of the speakers, raise your important issues during the panel sessions, and let other participants know of your requirements, observations, and experience in this important area. We hope to encourage the wide-scale deployment of security technologies and to promote new research that can address the currently unmet security needs of the Internet community. <snip> Additional information about the symposium and San Diego, plus on-line registration, are available via the Web at: http://www.isoc.org/conferences/ndss97 SPONSORSHIP OPPORTUNITIES AVAILABLE! Contact Torryn Brazell at the Internet Society at +1-703-648-9888 or send E-mail to Ndss97reg@isoc.org. ------------------------------ Date: Mon, 13 Jan 1997 08:47:48 -0500 (EST) From: "noah@enabled.com" <noah@enabled.com> Subject: File 3--InfoWarCon6 - Brussels, Belgium (fwd) ---------- Forwarded message ---------- Date--Sun, 12 Jan 1997 23:11:16 -0500 From--"Betty G. O'Hearn" <betty@infowar.com> D I S T R I B U T E W I D E L Y CONFERENCE ANNOUNCEMENT InfoWarCon 6: "War By Other Means" Economic Espionage, CyberTerrorism and Information Assurance Brussels, Belgium May 8 - 9, 1997 Pre-Conference Tutorials: May 7, 1996 Sponsored by: National Computer Security Association / www.ncsa.com Winn Schwartau, Interpact, Inc. / www.infowar.com Open Source Solutions, Inc, / www.oss.net Honorary Chairperson: Judge Danielle Cailloux Investigating Magistrate, Member of the Committee to Control the Intelligence Services, Belgium Information Warfare is no longer just for the military or government. InfoWar is a legitimate concern for the private sector and law enforcement - everywhere. Hundreds of representatives from over thirty countries will interact at InfoWarCon 6 with world-class presenters in an open-source, unclassified forum to provide workable, real-world solutions to the commercial, legal and technical problems we face. Over two days, the three tracks and plenary sessions will focus on: 1. Military, Intelligence, Nation-States and Government Contractors. What are their special needs and concerns. Leaders from all areas will bring you current with their approaches. 2. Cyberterrorism and Crime: Law Enforcement, Domestic, National and International. Case histories and experience from those who know will provide the foundation for solutions and cooperation to a spreading problem. 3. The Private Sector and Commercial Infrastructure: Leading experts on information assurance will provide new models for security, management and infrastructure protection. Optional Pre-Conference Tutorials (May 7) > Three Pre-Conference tutorials will be offered to get the non-technical manager, law enforcement or government representative 'up to speed' on InfoWar: > >A. Open Source Intelligence. Robert Steele, ex-CIA case officer and intelligence professional, will teach you how and why the smart nation and competitive private company needs to use information gathering to his best advantage. A full day of extraordinary information and materials. > B. Information Security Basics. Dr. Mich Kabay, NCSA's Dir. of Education will take the non-technical manager on a three and one half hour tour of the fundamentals of information security. Essential knowledge for anyone involved with information warfare, cyberterrorism or defending against them. C. The Basics of Information Warfare and Cyberterrorism.Winn Schwartau, the man who wrote the books on Cyber-terrorism and Information Warfare, will teach the >non-technical participant the ins and outs in a fascinating 3 1/2 hour session. >For Registration Information > Kim Imler > Voice: (717) 241-3226 > Fax: (717) 243-8642 > Email: kimler@ncsa.com > WWW: www.Infowar.com > www.ncsa.com > >Sponsorship Opportunities - Multiple level sponsorship >opportunities and exhibit space is available. Contact: > Harry Brittain > Voice: (717) 241-3258 > Fax: (717) 243-8642 > Email: hbrittain@ncsa.com > >MARK YOUR CALENDARS: > >InfoWarCon 7, >Sept. 11-12, 1997 >Washington D.C. >Submit Abstracts and Papers to: >Betty@infowar.com DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT in the subject line. Subscribe infowar TO JOIN GROUP Unsubscribe infowar TO LEAVE GROUP Help infowar TO RECEIVE HELP TO POST A MESSAGE: E-Mail to infowar@infowar.com _____________________________________________________ Infowar.Com Interpact, Inc. Winn Schwartau winn@infowar.com http://www.infowar.com 813-393-6600 Voice 813-393-6361 FAX Sponsor Opportunities/Comments/Help Betty G. O'Hearn Assistant to Winn Schwartau http://www.infowar.com betty@infowar.com 813-367-7277 Voice 813-363-7277 FAX ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Betty G. O'Hearn Assistant to Winn Schwartau http://www.infowar.com betty@infowar.com 813-367-7277 Voice 813-363-7277 Data/FAX "Success is to be measured not so much by the position that one has reached in life as by the obstacles which he has overcome while trying to succeed. ~~~Booker T. Washington~~~ ------------------------------ Date: Thu, 30 Jan 1997 18:05:13 -0600 From: " Monique J. Lemaitre" <tc0mjl1@corn.cso.niu.edu Subject: File 4--Call for papers: 6CYBERCONF Call for Papers: 6CYBERCONF Sixth International Conference on Cyberspace June 5th to 8th, 1997. University of Oslo Website: http://televr.fou.telenor.no/cyberconf We already live part-time in cyberspace, and that time is increasing as fast as the quality of the experience is radically changing. The Sixth International Conference on Cyberspace addresses the social, political and cultural implications of cyberspace from a critical as well as practical standpoint. In the nets, there is a growing society that ranges from researchers to Silicon Valley sophisticates to neocyberpunks. 6CYBERCONF offers the opportunity for exchange within and between these confluent and diverse interests and encourages discussion between theoreticians and practitioners. Hosted for the second time in Europe, this sixth edition of CYBERCONF considers: cyborgs looking for a home, the future body, interface/interaction breakthroughs, and the importance of collaboration in virtual environments. CONFERENCE FORMAT The official opening of 6CYBERCONF is scheduled for Thursday afternoon, June 5th. The conference will take place over three and a half days. There will be 6 keynote speakers, 15 plenary sessions, electronic art installations, special events, a pre- conference workshop on immersive environment design, and a banquet dinner on Saturday June 7th. All sessions are designed to foster discussion. Presentations will be in English. The themes are: CYBERSPACE METAPHOR? The cyberspace metaphor is a means of effecting instantaneous fusion of two separate realms of experience (man/machine, good/bad, self/world) into one illuminating, iconic, encapsulating image. Is the metaphor still a way to proceed from the known to the unknown in cyberspace? Is the metaphor a critical synthesis of complex communications technologies, bio-sociality or techno-sociality? Is cyberspace a new metanarrative of progress, or a story of paradise lost? Which language for the virtual age? VIRTUAL SUBJECTS ON THE ROAD A cyborg is a double articulation in which we find both the end of the subject and a new dispersed and refracted subjectivity constructed in cyberspace. The fabric of cyberspace dresses us in the cloth of possibilities -the virtual subject as a switchboard of souls? Can we really construct and reconstruct any identities and personalities? Will not the "real" subject implode in its multiplicity? Or is it a question of mastering ones avatar puppets on a global playground? Do we need psychiatrists for avatars? Logged off, where does the will of the cyberpersonality go? HACKING THE FUTURE BODY McLuhan argued that electronic media reintegrated the senses. How are bodies represented through information technology? How can cyberspace give priority to the lower senses? How is desire constructed through virtual worlds? Are there darker domains of e-motional interference beyond the emoticons? Is there a "violence of connectivity"? What about cybersex? Are we masturbating our way into the year 2000? Will sexuality become a post- biological phenomenon? Is the future body a recombinant structure of flesh or schizoid realities? ZONES / INTER-ACTION i) INTER-FACE is the sensitive boundary zone of negotiation between human and machine, allowing seamless crossings between the worlds: Facilitating the disappearance of the difference between them - emerging new set of human/machine relations - interweaving calculation, simulation and post-modern culture. How can we design for tacit knowledge and bricolage? How can we account for differing incentive structures between designers and users? Which concealed design codes promote or dissemble functionality? How to extend the interface into social/material space, transforming it into an environmental power? Away from the daily prayer at the desktop, when technology becomes transparent and disappears, where will it take us? ii) The rapid development of Internet and WWW have limited the definition of INTER-ACTION as the click of the mouse. How can interaction become a mutual and simultaneous activity on the part of the participants (man-machine-man interaction) in art and education? If the computer adds an interference to communication, how can it be used creatively? What is interaction beyond the Web? LABORATORIES FOR COLLABORATION Many of us are today involved in group interaction through telecommunication networks. In the future the 2D interface of the web will shift to 3D interactive interfaces. How will this affect the way we perceive our collaborators and our usage of information? Will it be a preferred medium to social interaction - opening up new possibilities within a group, organisation or community? INCLUSION - EXCLUSION What about the politics of networks? Which impact will commerce have on the the internet community? How will the powerstructures of the internet affect the behaviour of netizens? What about the diversity of cyberspace cultures? What is "freedom of speech" in a global context? CALL FOR PAPER ABSTRACTS To submit an abstract for the potential inclusion of your paper in the 6CYBERCONF programme, please follow these format guidelines: =B7 Title of the paper =B7 Author(s) =B7 Institutional affiliation (if any) =B7 Chosen 6CYBERCONF theme (from the list above) =B7 Abstract, 500 words maximum =B7 Brief biography, 100 words maximum =B7 Audio-visual equipment requirements =B7 Contact information (email preferred) There are two ways to submit abstracts:=20 1) Email with the subject topic to abstracts@televr.fou.telenor.no or=20 2) mail both a printed copy and a PC or MAC diskette to: 6CYBERCONF/ Morten Soby, University of Oslo, P.O. Box 1092, Blindern, 0317 Oslo, Norway. The selection will be done by an international and a local committee made up of academics, theorists, artists and technicians in the field. Submission of an abstract indicates the submitter's intention and capability to write and present the corresponding, full length paper, if chosen.=20 Papers will be allotted a half hour for presentation in English. Please be advised that the selection committees will not consider abstracts that are not formatted as stated above nor papers that have been previously published. All abstracts and papers will be published in the proceedings (paper and Web-edition). DEADLINES Deadline for reception of abstracts: March 15, 1996 Notification of selection for presentation: April 15, 1996 Deadline for registration: May 1, 1996 FINANCIAL ASSISTANCE The registration fee will be waived for those presenting a paper in 6CYBERCONF. In addition, a limited number of grants are available to those presenters who demonstrate financial need. These grants may cover the costs of travel and accommodation. FEES & REGISTRATION The registration fee for attending 6CYBERCONF is US$ 250 (US$ 50 for students). For detailed information on how to register and information on travel and accommodation, check our Website or mailto:info@televr.fou.telenor.no LOCATION 6CYBERCONF will take place in an auditorium of the Helga Engs Building, University of Oslo. CONFIRMED KEYNOTE SPEAKERS Arthur Kroker (Canada) Marilouise Kroker (Canada) Pierre Levy (France) Allucquere Rosanne Stone (USA) Florian Roetzer (Germany) SPECIAL EVENTS =B7 Immersive Environment Workshop: The pre-conference workshop will give a limited number of participants a unique opportunity to get hands on experience on how to design and develop and use a variety of immersive systems. Both technical and social science related topics will be covered. The workshop will be tutored by scientist researchers from Telenor R&D. =B7 e~on exhibition - will focus on electronic art made in Norway, but will include international participation as far the budget allows =B7 Public panel debate (with key note speakers and special guest) =B7 "Cyberdesign -97" presentation: the award winner of Telenor Research VR design competition. The list of keynote speakers and special events is preliminary; more to be added. Please visit our Website for more information and updates on 6CYBERCONF. ORGANIZERS Cyberconf Director: Allucquere Rosanne Stone, Professor and Director of the Interactive, Multimedia Laboratory at the University of Texas at Austin http://www.actlab.utexas.edu/~sandy Conference Coordinator: Morten S=F8by, Research Fellow, Institute for Educational Research, University of Oslo Email: m.k.soby@ped.uio.no http://www.uio.no/~mortenso/ Phone: + 47 22855383 Fax: + 47 22854250 Conference Coordinator: Ola =D8deg=E5rd, Researcher, Manager of The Televirtuality Research Group at Telenor Research and Development. Phone: + 47 63848885 Fax: + 47 63810076 Email: ola.odegard@kjeller.fou.telenor.no http://televr.fou.telenor.no/~olao/olao.html Coordinator Interactive Installations: Stale Stenslie, Artist and Reseacher, Telenor R&D, Cologne/Oslo. Phone: + 47 90562963 Fax: +47 63810076 Email: stahl@rosa.nta.no http://televr.fou.telenor.no/~stahl/stahl.html FOR FURTHER INFORMATION Send e-mail to: info@televr.fou.telenor.no See the Web site for continuous updates: http://televr.fou.telenor.no/cyberconf - or contact directly Registration, Hotel booking, Flights: Project secretary 6Cyberconf: May Krosby Phone: + 47 638 48 341 =20 Fax. + 47 63 81 98 10 Email: may.krosby@kjeller.fou.telenor.no http://televr.fou.telenor.no/cyberconf/ Abstracts, Papers, Information: Conference Editor: Vibeke Kl=F8vstad Phone: + 47 22426980 / 22426892#126 Email: vibeke.klovstad@kulturkanalen.no ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Research Fellow Morten Soby Institute for Educational Research, P. O. Box 1092, Blindern, N-0317 Oslo Phone: +47 22855383 Fax: + 47 22854250 Home: + 47 22952775 GSM: 926332= 18 Homepage: http://www.uio.no/~mortenso/ Coordinator 6CYBERCONF: http://televr.fou.telenor.no/cyberconf/ ------------------------------ Date: Tue, 28 Jan 1997 09:19:26 -0400 From: Russ@NAVIGATORS.COM(Russ Haynal) Subject: File 5--DC-ISOC Tidbits Hello DC-ISOC, I hope your New Year is off to a good start. This message contains a couple of requests and a half-day conference announcement that should be of interest to many of you... Russ Haynal ========================================================================= Want to go to CommNET ??? CommNET Is a large industry conference and trade show being held NEXT WEEK in the Washington Convention Center. If you have never been able to make it to CommNET, I am happy to provide you with just the excuse/opportunity you need to attend this great show. The Internet Society (ISOC) has been given a booth for the show. ISOC will provide someone at all times to manage the booth. However, the Internet Society is seeking additional volunteers to help staff the booth. A Key responsibility would be to accept new member registrations. A Secondary responsibility would be to answer questions and hand-out literature. "Working the booth" is a great way to meet many people and share your knowledge about the Internet/ISOC. The Convention floor hours are 10-6 on February 4-6. Volunteers would only have to work one (or more) 2-4 hour shifts. Volunteers should be ISOC members, or people who will sign up as members. (It doesn't make a lot of sense to have someone in the booth talking up ISOC and not spending $35 to be a member.) Anyone interested in volunteering or finding our more details should contact Mary Burger at the Internet Society Headquarters (703-648-9888). A CommNET Booth is a great opportunity for ISOC, please help to make this a success. ================================================================================ DC-ISOC Meeting Locations... As always, the DC-ISOC would like to hear any leads you may have on (free) meeting places in the DC metro region, large enough to hold 200 people. We were able to hold our last meeting at the Marriot Hotel, thanks to the costs being absorbed by Network Solutions ( http://www.netsol.com ). If your organization is interested in covering the costs of a DC-ISOC meeting, please contact Russ Haynal (russ@navigators.com or 703-729-1757) Sponsors do receive visibility/recognition to the DC-ISOC Membership (Mailing list includes over 1500 Internet industry participants located mostly in the DC Metro area) ======================================================== Conference Announcement.... Digital Dilemmas: Defining Ethics in the Internet Age The Internet revolution has sparked a fierce debate among the business, academic, computer, and public policy communities. Today, we are grappling with complex ethical questions such as * Must society ensure that all people have equal access to the Internet? * Can we bridge the gap between network haves and have-nots? * Can the Internet remain a haven for free expression, discreet information consumption, and private transactions? * Can we strike a balance between individual interests and commercialism on the Internet? These new-age questions defy easy answers. They demand new-age solutions. Take part in the debate. Attend Marymount University's conference, Digital Dilemmas: Defining Ethics in the Internet Age. Ethics, Access, and the Internet This conference is for high-tech companies, consumer advocates, cybernauts, academicians, and policy makers who are surveying the landscape of ethical considerations in the Internet Age. Along with the changing structure of communications within our society, we are faced with ethical dilemmas of * Equal access * Free speech * Intellectual property * Privacy * Regulation * Electronic commerce Marymount has assembled an impressive cadre of speakers and panelists who are at the forefront of ethical debate in the Internet Age. Join us for this half-day conference as we explore the controversial issues of ethics, access, and the Internet. Panel One: Moving Beyond the Wire: Who Gains? Who's Left Behind? Whose Internet is it, anyway? Popular opinion holds that the Internet is the great equalizer. No one knows whether you're rich or poor, urban or rural, young or old. No one knows your gender, race, or education. The push is on to wire up our schools, homes, and businesses. But what happens to those who aren't willing or able to get connected? Will they be left out of future political and social debates? Will they miss out on economic opportunities? Is the Internet setting up exclusion criteria, information elites, electronic inequities? What is the impact of the Internet on our society and our economy? What's the role of government and the private sector in ensuring equal access? Panel Two: Uncharted Waters: Privacy, Intellectual Property, and the First Amendment With the unexpected and explosive growth of the Internet, governments, regulating agencies, and individuals in a position of public trust or public office have begun to recognize the power of this new communications medium. In the interest of "protecting" their constituencies, many powerful interests are getting involved. Recently, the issues of privacy, intellectual property, and First Amendment rights have come under intense scrutiny, but precious few legal decisions have charted our course. Are we adrift in a sea of unresolved legal and ethical quandaries? Is the Internet headed for the rocks? Will proposed "solutions" render the Internet powerless? Will free marketers and brash commercialism sail over the free sharing of information? Should technology influence culture or vice versa? Conference Planning Committee: Chair: Jack McDonnell, President and CEO, Transaction Network Services, Inc. Dan Bannister, President and CEO, DynCorp Mario Morino, Chairman, Morino Institute Stephen Allis, Director, Government Affairs, KPMG Peat Marwick, LLP Robert Sigethy, Dean, School of Business Administration, Marymount University Paul Byers, Director, Center for Ethical Concerns, Marymount University Agenda at a Glance 8:30 - 9:00 Registration 9:00 - 9:05 Welcome to Marymount 9:05 - 9:30 Keynote Speaker - Tom Bliley, Chairman, House Commerce Committee 9:30 - 10:30 Beyond the Wire: Who Gains? Who's Left Behind? Moderator: Brit Hume (Fox News, Chief Washington Correspondent and Managing Editor) Speakers:John Sidgmore, CEO, UUNet, Technologies, Inc. Bill Melton, President and CEO, CyberCash, Inc. Larry Irving, Assistant Secretary for Communications and Information, Department of Commerce (invited) 10:30 - 10:45 Coffee Break 10:45 - 11:45 Uncharted Waters: Privacy, Intellectual Property, and the First Amendment Moderator:Paul Byers (Director, Center for Ethical Concerns, Marymount University) Speakers:Don Heath, President, Internet Society Guest, Freedom Forum Harry Litman, Deputy Assistant Attorney General, Department of Justice 12:00 - 1:00 Luncheon Speaker:Tom Kalil, Senior Director to the National Economic Council Note: Schedules are subject to change. For the latest information, visit our Web site at http://www.marymount.edu Roads to Marymount University From north of Washington, D.C.: Take Interstate Rt. 95-South to 495-West to Exit 14 (George Washington Parkway-South) to Rt. 123-North (Chain Bridge Road). Follow to traffic light at end of road. Turn right onto Glebe Road (Rt. 120-South) and follow for 2.5 miles. Marymount is on the left. From south of Washington, D.C.: Take Interstate Rt. 95-North, which becomes 395 inside the Beltway. Exit Glebe Road (Rt. 120-North), marked "Marymount University." Continue on Glebe Road 6 miles. Marymount is on the right. From Rt. 66 (either direction): Exit Glebe Road (Rt. 120-North). Drive 1 mile. Marymount is on the right. If you or any of your guests require special consideration because of physical disabilities, please notify the Office of Campus Safety at (703) 284-1601 at least 48 hours prior to your visit. Sponsored by Marymount University's School of Business Administration and Center for Ethical Concerns Marymount University - Located in Arlington, Virginia, Marymount is an independent, comprehensive, Catholic university offering programs to more than 4,000 men and women at the undergraduate and graduate levels. Marymount strives to foster the intellectual, moral, spiritual, social, cultural, and physical development of each student through an education that combines the liberal arts tradition with career preparation. Center for Ethical Concerns - One of the hallmarks of Marymount University is its commitment to providing a values-based education. The Center for Ethical Concerns was founded in 1993 to provide a forum for the exchange of ideas about ethical issues and problems. Through lectures, seminars, workshops, and symposia, the Center offers students, faculty, and the public opportunities to examine ethical concerns facing society. Design by: Franek Design Associates, Inc. Printing by: Print Pro, Inc. Marketing by: Marketek Register Today Digital Dilemmas: Defining Ethics in the Internet Age March 12, 1997, 8:30 a.m. to 1:00 p.m. Marymount University, Arlington, Virginia To register, complete this coupon (please print or type) and fax it to Marymount University at (703) 284-1544. Or register via the World Wide Web at http://www.marymount.edu after January 31. o Yes, sign me up for the conference NAME TITLE ORGANIZATION ADDRESS CITY STATE ZIP PHONE FAX E-MAIL Please indicate payment method: Charge my: o Visa o MasterCard Card # Exp. date __________ Signature __________________________________________________ o Check enclosed Make checks payable to Marymount University. Send this form to: Marymount University c/o Barbara Favola Office of the President 2807 North Glebe Road Arlington, VA 22207-4299 Registration fees: o $100 o $45 - students (must show ID) Register early; seating is limited. All registrations must be received by March 5. No refunds provided for cancellations after March 1. However, your registration may be transferred to another individual if you cannot attend. ------------------------------ Date: Wed, 8 Jan 1997 15:38:35 -0800 From: Sara Winge <sara@ora.com> Subject: File 6--"DNS and BIND," and "Mastering Regular Expressions" FOR IMMEDIATE RELEASE January 8, 1997 PRESS ONLY--FOR REVIEW COPIES, CONTACT: Sara Winge 707/829-0515 sara@ora.com NEW EDITION OF O'REILLY'S CLASSIC NUTSHELL HANDBOOK "DNA AND BIND" SEBASTOPOL, CA-O'Reilly & Associates announces the publication of the second edition of "DNS and BIND," a complete guide to the Internet's Domain Name System (DNS) and the Berkeley Internet Name Domain (BIND) software, the UNIX implementation of DNS. The new edition also covers using DNS and BIND with Windows NT. It's a complete update of this classic Nutshell Handbook, which has served as *the* source of information on DNS and BIND for system administrators who manage domain or name servers. DNS is the system that translates hostnames (like "rock.ora.com") into Internet addresses (like 192.54.67.23). Until BIND was developed, name translation was based on a "host table"; if you were on the Internet, you got a table that listed all the systems connected to the Net and their addresses. As the Internet grew from hundreds to hundreds of thousands of systems, host tables became unworkable. DNS is a distributed database that solves the same problem effectively, allowing the Net to grow without constraints. Rather than having a central table that gets distributed to every system on the Net, it allows local administrators to assign their own hostnames and addresses and install these names in a local database. This database is automatically distributed to other systems as names are needed. In this new edition of "DNS and BIND," the authors describe Bind version 4.8.3, which is included in most vendor implementations today. In addition, readers will find complete coverage of Bind 4.9.4, which in all probability will be adopted as the new standard in the near future. In addition to covering the basic motivation behind DNS and how to set up the BIND software, this book covers many more advanced topics, including how to become a "parent" (i.e., "delegate" the ability to assign names to someone else); how to use DNS to set up mail forwarding correctly; debugging and troubleshooting; and programming. # # # DNS and BIND, 2nd Edition By Paul Albitz & Cricket Liu 2nd Edition December 1996 438 pages, ISBN: 1-56592-236-0, $32.95 US ========================================================================= FOR IMMEDIATE RELEASE January 10, 1997 PRESS ONLY--FOR REVIEW COPIES, CONTACT: Sara Winge 707/829-0515 sara@ora.com O'REILLY RELEASES "MASTERING REGULAR EXPRESSIONS" SEBASTOPOL, CA--Programmers who delve into O'Reilly and Associates' new book "Mastering Regular Expressions" can save themselves time and aggravation while dealing with documents, mail messages, log files--any type of text or data--by tapping the power of regular expressions. For example, regular expressions can play a vital role in constructing a World Wide Web CGI script, which can involve text and data of all sorts. Those who don't use regular expressions yet will discover a whole new world of mastery over their data in "Mastering Regular Expressions." Experienced users will appreciate the book's unprecedented detail and breadth of coverage. Regular expressions are not a tool in and of themselves, but are included as part of a larger utility. The classic example is grep. These days, regular expressions can be found everywhere, such as in: - scripting languages (including Perl, Tcl, awk, and Python) - editors (including Emacs, vi, and Nisus Writer) - programming environments (including Delphi and Visual C++) - specialized tools (including lex, Expect, and sed) While many of these tools originated on UNIX, they are now available for a wide variety of platforms, including DOS/Windows and MacOS. Additionally, many favorite programming languages (even Java) offer regular-expression libraries, so programmers can include support for them in their own programs. For years, author Jeffrey Friedl has helped people on the Net understand and use regular expressions. In "Mastering Regular Expressions" he goes beyond mechanics and initiates readers to the art of using regular expressions. Friedl shares the subtle but valuable ways to think when using regular expressions as he leads readers through the process of crafting a regular expression to get the job done. Regular expressions are not used in a vacuum. In this book, a variety of tools are examined and used in an extensive array of examples. Perl, in particular, is very well represented throughout the book, with a major chapter dedicated entirely to it alone. Perl is extremely well-endowed with rich and expressive regular expressions. Yet what is power in the hands of an expert can be fraught with peril for the unwary--"Mastering Regular Expressions" shows readers how to navigate the minefield and become true masters of the art of regular expressions. # # # Mastering Regular Expressions: Powerful Techniques for Perl and Other Tools By Jeffrey E. F. Friedl 1st Edition January 1997 368 pages, ISBN: 1-56592-257-3, $29.95 US ------------------------------ Date: Tue, 28 Jan 1997 12:08:42 EST From: "Rob Slade, doting grandpa of Ryan & Trevor" Subject: File 7--"The Basics of Computer Security" by Bellcore VDBSCMSC.RVW 961019 "The Basics of Computer Security", Bellcore, 1995, 1-57305-047-4, U$695.00 %A Bellcore %C Room 3A184, 8 Corporate Place, Piscataway, NJ 08854 %D 1995 %G 1-57305-047-4 %I Bellcore %O U$695.00 +1-800-521-CORE +1-908-699-5800 fax: +1-908-336-2559 %O llavoie@notes.cc.bellcore.com mgordon2@notes.cc.bellcore.com %P 130 minutes %T "The Basics of Computer Security" Essentially, this series of three short video tapes contains the rough equivalent of three introductory chapters of a basic security text. There is an introduction to computer security in general, an introduction to application security, and an introduction to application security review or audit. The material is presented at a level suitable to the user, or perhaps a non-technical manager. The format is the standard talking head interspersed with slides. The material on the slides is reprinted in booklets packaged with the tapes. The content is generally reliable, although sometimes the advice on minor matters is questionable. Overall organization is good, but some sections are poorly planned and repetitive. copyright Robert M. Slade, 1996 VDBSCMSC.RVW 961019 ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.06 ************************************