Computer underground Digest    Sun  Feb 2, 1997   Volume 9 : Issue 06
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Field Agent Extraordinaire:   David Smith
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.06 (Sun, Feb 2, 1997)
File 1--USR's little booboo (fwd)
File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)
File 3--InfoWarCon6 - Brussels, Belgium (fwd)
File 4--Call for papers:  6CYBERCONF
File 5--DC-ISOC Tidbits
File 6--"DNS and BIND," and "Mastering Regular Expressions"
File 7--"The Basics of Computer Security" by Bellcore
File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)


CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 7 Jan 1997 00:15:18 -0500 (EST)
From: "[email protected]" <[email protected]>
Subject: File 1--USR's little booboo (fwd)

From -Noah

---------- Forwarded message ----------
Date--Mon, 6 Jan 1997 18:55:35 -0600 (CST)
From--Brett L. Hawn <[email protected]>

56-kbps modem? Not quite
By Jim Davis
January 2, 1997, 5:30 p.m. PT

U.S. Robotics (USRX), which has been leading the push for 56-kbps
modem technology, has conducted preliminary tests showing that
most consumers will be able to connect at higher speeds than with
current modems--but not at the full 56 kbps.

The company said the maximum downstream transmission speed will
be limited to 53 kbps, not the 56 kbps originally promised.
Federal Communications Commission regulations "limit the signal
level" that digitally connected server equipment can transmit,
the firm said.

U.S. Robotics' x2 technology overcomes the speed limits of
current 28.8-kbps modems based on the ISP having a direct
connection to telephone companies' digital switches.

The company said today that tests showed that "the vast majority"
of users would be able to use x2 technology, while its modems
would automatically default to lower speeds if such connections
weren't possible. The test results were based on over 20,000
calls in seven Bell operating company regions, the firm said.

U.S. Robotics says it is in beta testing of its products and
expects to start shipping initial consumer products later this
month.

------------------------------

Date: Mon, 13 Jan 1997 09:29:28 -0500 (EST)
From: "[email protected]" <[email protected]>
Subject: File 2--ISOC 97 SYMP NETWORK & DISTRIBUTED SYSTEM SEC'Y (2nd anncmnt)

From -Noah

---------- Forwarded message ----------
Date--Fri, 10 Jan 1997 19:01:26 -0500
From--"David M. Balenson" <[email protected]>

PLEASE NOTE THE EARLY REGISTRATION AND HOTEL ROOM AVAILABILITY AND SPECIAL
RATES DEADLINES ARE APPROACHING!!  RESERVATIONS AT THE PRINCESS RESORT
MUST BE MADE NO LATER THAN JAN 13TH FOR THE GOVERNMENT RATE, AND NO LATER
THAN JAN 20TH FOR THE REDUCED GROUP RATE.  EARLY REGISTRATION FOR THE
SYMPOSIUM MUST BE POSTMARKED NO LATER THAN JAN 22ND.

 --------------------------------------------------------

                THE INTERNET SOCIETY 1997 SYMPOSIUM ON
                NETWORK AND DISTRIBUTED SYSTEM SECURITY
                             (NDSS '97)

                         10-11 FEBRUARY 1997

           SAN DIEGO PRINCESS RESORT, SAN DIEGO, CALIFORNIA


 This fourth annual symposium will bring together researchers,
 implementors, and users of network and distributed system security
 technologies to discuss today's important security issues and
 challenges.  It will provide a mix of technical papers and panel
 presentations that describe promising new approaches to security
 problems that are practical, and to the extent possible, have
 been implemented.  We hope to foster the exchange of technical
 information and encourage the Internet community to deploy
 available security technologies and develop new solutions to
 unsolved problems.

WHY YOU SHOULD ATTEND

 The use of the Internet is rapidly growing and expanding into
 all aspects of our society.  Commercial organizations are coming
 under increasing pressure to make their services available on-line.
 This in turn is increasing the need for rapid and widespread
 deployment of usable and effective network and distributed system
 security technologies.  High visibility attacks on the Internet
 underscore the vulnerabilities of the Internet and the need to
 solve its security problems.  There is growing concern for securing
 the network infrastructure itself.  Recent trends in software
 distribution (such as Java and ActiveX technologies) have made
 certain attacks easier to carry out.  Privacy has become an
 important issue for the Internet.

 NDSS '97 will bring together researchers, implementors, and users
 of network and distributed system technologies to discuss today's
 important security issues and challenges.  We have selected the
 technical papers and panel presentations that describe promising
 new approaches to security problems that are practical, and to
 the extent possible, have been implemented.  Topics to be addressed
 include Internet infrastructure and routing security, security
 for the World Wide Web, Java and ActiveX security, cryptographic
 protocols, public key management, and protection of privacy.

 The symposium will have a positive impact on the state of Internet
 security.  You will have the opportunity to actively participate
 in the dialog.  Ask questions of the speakers, raise your important
 issues during the panel sessions, and let other participants know
 of your requirements, observations, and experience in this
 important area.  We hope to encourage the wide-scale deployment
 of security technologies and to promote new research that can
 address the currently unmet security needs of the Internet
 community.

<snip>

 Additional information about the symposium and San Diego, plus
 on-line registration, are available via the Web at:

           http://www.isoc.org/conferences/ndss97

SPONSORSHIP OPPORTUNITIES AVAILABLE!

 Contact Torryn Brazell at the Internet Society at +1-703-648-9888
 or send E-mail to [email protected].

------------------------------

Date: Mon, 13 Jan 1997 08:47:48 -0500 (EST)
From: "[email protected]" <[email protected]>
Subject: File 3--InfoWarCon6 - Brussels, Belgium (fwd)

---------- Forwarded message ----------
Date--Sun, 12 Jan 1997 23:11:16 -0500
From--"Betty G. O'Hearn" <[email protected]>


                               D I S T R I B U T E  W I D E L Y

                              CONFERENCE ANNOUNCEMENT

InfoWarCon 6:
"War By Other Means"
Economic Espionage, CyberTerrorism and Information Assurance
Brussels, Belgium

May 8 - 9, 1997
Pre-Conference Tutorials: May 7, 1996

Sponsored by:
National Computer Security Association /  www.ncsa.com
Winn Schwartau, Interpact, Inc. /  www.infowar.com
Open Source Solutions, Inc, / www.oss.net

Honorary Chairperson:
Judge Danielle Cailloux
Investigating Magistrate,
Member of the Committee to Control the Intelligence Services, Belgium

Information Warfare is no longer just for the military or
government. InfoWar is a legitimate concern for the private
sector and law enforcement - everywhere.  Hundreds of
representatives from over thirty countries will interact at
InfoWarCon 6 with world-class presenters in an open-source,
unclassified forum to provide workable, real-world solutions to
the commercial, legal and technical problems we face.

Over two days, the three tracks and plenary sessions will focus
on:

1. Military, Intelligence, Nation-States and Government
Contractors. What are their special needs and concerns. Leaders
from all areas will bring you current with their approaches.

2. Cyberterrorism and Crime: Law Enforcement, Domestic, National
and International. Case histories and experience from those who
know will provide the foundation for solutions and cooperation
to a spreading problem.

3. The Private Sector and Commercial Infrastructure: Leading
experts on information assurance will provide new models for
security, management and infrastructure protection.


Optional Pre-Conference Tutorials (May 7)
>
Three Pre-Conference tutorials will be offered to get the non-technical manager,
law enforcement or government representative 'up to speed' on InfoWar:
>
>A. Open Source Intelligence. Robert Steele, ex-CIA case officer and
intelligence professional, will teach you how and why the smart nation and
competitive private company needs to use information gathering to his best
advantage.
A full day of extraordinary information and materials.
>
B. Information Security Basics. Dr. Mich Kabay, NCSA's Dir. of Education will
take the non-technical manager on a three and one half hour tour of the
fundamentals of
information security. Essential knowledge for anyone involved with information
warfare, cyberterrorism or defending against them.

C. The Basics of Information Warfare and Cyberterrorism.Winn Schwartau, the man
who wrote the books on Cyber-terrorism and Information Warfare, will teach the
>non-technical participant the ins and outs in a fascinating 3 1/2 hour session.


>For Registration Information
>     Kim Imler
>     Voice:    (717) 241-3226
>     Fax:      (717) 243-8642
>     Email:    [email protected]
>     WWW:      www.Infowar.com
>               www.ncsa.com
>
>Sponsorship Opportunities - Multiple level sponsorship
>opportunities and exhibit space is available.  Contact:
>     Harry Brittain
>     Voice:    (717) 241-3258
>     Fax:              (717) 243-8642
>     Email:    [email protected]
>
>MARK YOUR CALENDARS:
>
>InfoWarCon 7,
>Sept. 11-12, 1997
>Washington D.C.
>Submit Abstracts and Papers to:
>[email protected]

DIRECT REQUESTS to:    [email protected] with one-line in the BODY, NOT
in the subject line.

Subscribe infowar        TO JOIN GROUP
Unsubscribe infowar    TO LEAVE GROUP
Help infowar               TO RECEIVE HELP
TO POST A MESSAGE:  E-Mail to   [email protected]
_____________________________________________________
Infowar.Com
Interpact, Inc.
Winn Schwartau
[email protected]
http://www.infowar.com
813-393-6600  Voice
813-393-6361  FAX

Sponsor Opportunities/Comments/Help

Betty G. O'Hearn
Assistant to Winn Schwartau
http://www.infowar.com
[email protected]
813-367-7277  Voice
813-363-7277  FAX

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Betty G. O'Hearn        Assistant to Winn Schwartau
       http://www.infowar.com
       [email protected]
813-367-7277  Voice   813-363-7277   Data/FAX

"Success is to be measured not so much by the position that one has reached in
life as by the obstacles which he has overcome while trying to succeed.
~~~Booker T. Washington~~~

------------------------------

Date: Thu, 30 Jan 1997 18:05:13 -0600
From: " Monique J. Lemaitre" <[email protected]
Subject: File 4--Call for papers:  6CYBERCONF

Call for Papers:
6CYBERCONF
Sixth International Conference on Cyberspace
June 5th to 8th, 1997. University of Oslo

Website: http://televr.fou.telenor.no/cyberconf

We already live part-time in cyberspace, and that time is increasing as
fast as the quality of the experience is radically changing.  The Sixth
International Conference on Cyberspace addresses the social, political and
cultural implications of cyberspace from a critical as well as
practical standpoint. In the nets, there is a growing society that ranges
from researchers to Silicon Valley sophisticates to neocyberpunks.
6CYBERCONF offers the opportunity for exchange within and between these
confluent and diverse interests and encourages discussion between
theoreticians and practitioners. Hosted for the second time in Europe, this
sixth edition of CYBERCONF considers: cyborgs looking for a home, the
future body, interface/interaction breakthroughs, and the importance of
collaboration in virtual environments.

CONFERENCE FORMAT

The official opening of 6CYBERCONF is scheduled for Thursday afternoon,
June 5th. The conference will take place over three and a half days. There
will be 6 keynote speakers, 15 plenary sessions, electronic art
installations, special events, a pre- conference workshop on immersive
environment design, and a banquet dinner on Saturday June 7th.  All
sessions are designed to foster discussion. Presentations will be in
English. The themes are:

CYBERSPACE METAPHOR?
The cyberspace metaphor is a means of effecting instantaneous fusion of two
separate realms of experience (man/machine, good/bad, self/world) into one
illuminating, iconic, encapsulating image. Is the metaphor still a way to
proceed from the known to the unknown in cyberspace? Is the metaphor a
critical synthesis of complex communications technologies, bio-sociality or
techno-sociality? Is cyberspace a new metanarrative of progress, or a story
of paradise lost?  Which language for the virtual age?

VIRTUAL SUBJECTS ON THE ROAD
A cyborg is a double articulation in which we find both the end of the
subject and a new dispersed and refracted subjectivity constructed in
cyberspace. The fabric of cyberspace dresses us in the cloth of
possibilities -the virtual subject as a switchboard of souls?  Can we
really construct and reconstruct any identities and personalities?  Will
not the "real" subject implode in its multiplicity?  Or is it a question of
mastering ones avatar puppets on a global playground?  Do we need
psychiatrists for avatars?  Logged off, where does the will of the
cyberpersonality go?

HACKING THE FUTURE BODY
McLuhan argued that electronic media reintegrated the senses. How are
bodies represented through information technology? How can cyberspace give
priority to the lower senses?  How is desire constructed through virtual
worlds?  Are there darker domains of e-motional interference beyond the
emoticons? Is there a "violence of connectivity"? What about cybersex?  Are
we masturbating our way into the year 2000?  Will sexuality become a post-
biological phenomenon? Is the future body a recombinant structure of flesh
or schizoid realities?

ZONES / INTER-ACTION
i) INTER-FACE is the sensitive boundary zone of negotiation between human
and machine, allowing seamless crossings between the worlds:  Facilitating
the disappearance of the difference between them - emerging new set of
human/machine relations - interweaving calculation, simulation and
post-modern culture. How can we design for tacit knowledge and bricolage?
How can we account for differing incentive structures between designers and
users?  Which concealed design codes promote or dissemble functionality?
How to extend the interface into social/material space, transforming it
into an environmental power? Away from the daily prayer at the desktop,
when technology becomes transparent and disappears, where will it take us?
ii) The rapid development of Internet and WWW have limited the definition
of INTER-ACTION as the click of the mouse.  How can interaction become a
mutual and simultaneous activity on the part of the participants
(man-machine-man interaction) in art and education?  If the computer adds
an interference to communication, how can it be used creatively?  What is
interaction beyond the Web?

LABORATORIES FOR COLLABORATION
Many of us are today involved in group interaction through
telecommunication networks.  In the future the 2D interface of the web will
shift to 3D interactive interfaces. How will this affect the way we
perceive our collaborators and our usage of information?  Will it be a
preferred medium to social interaction - opening up new possibilities
within a group, organisation or community?

INCLUSION - EXCLUSION
What about the politics of networks? Which impact will commerce have on the
the internet community?  How will the powerstructures of the internet
affect the behaviour of netizens?  What about the diversity of cyberspace
cultures?  What is "freedom of speech" in a global context?

CALL FOR PAPER ABSTRACTS

To submit an abstract for the potential inclusion of your paper in the
6CYBERCONF programme, please follow these format guidelines:

=B7 Title of the paper
=B7 Author(s)
=B7 Institutional affiliation (if any)
=B7 Chosen 6CYBERCONF theme (from the list above)
=B7 Abstract, 500 words maximum
=B7 Brief biography, 100 words maximum
=B7 Audio-visual equipment requirements
=B7 Contact information (email preferred)

There are two ways to submit abstracts:=20
1) Email with the subject topic to [email protected] or=20
2) mail both a printed copy and a PC or MAC diskette to: 6CYBERCONF/ Morten
Soby, University of Oslo, P.O. Box 1092, Blindern, 0317 Oslo, Norway.

The selection will be done by an international and a local committee made
up of academics, theorists, artists and technicians in the field.

Submission of an abstract indicates the submitter's intention and
capability to write and present the corresponding, full length paper, if
chosen.=20

Papers will be allotted a half hour for presentation in English.

Please be advised that the selection committees will not consider abstracts
that are not formatted as stated above nor papers that have been previously
published.

All abstracts and papers will be published in the proceedings (paper and
Web-edition).

DEADLINES

Deadline for reception of abstracts: March 15, 1996
Notification of selection for presentation: April 15, 1996
Deadline for registration: May 1, 1996

FINANCIAL ASSISTANCE

The registration fee will be waived for those presenting a paper in
6CYBERCONF. In addition, a limited number of grants are available to those
presenters who demonstrate financial need. These grants may cover the costs
of travel and accommodation.

FEES & REGISTRATION

The registration fee for attending 6CYBERCONF is US$ 250  (US$ 50 for
students). For detailed information on how to register and information on
travel and accommodation, check our Website or
mailto:[email protected]

LOCATION

6CYBERCONF will take place in an auditorium of the Helga Engs Building,
University of Oslo.

CONFIRMED KEYNOTE SPEAKERS

Arthur Kroker (Canada)
Marilouise Kroker (Canada)
Pierre Levy (France)
Allucquere Rosanne Stone (USA)
Florian Roetzer (Germany)

SPECIAL EVENTS

=B7 Immersive Environment Workshop: The pre-conference workshop will give a
limited number of participants a unique opportunity to get hands on
experience on how to design and develop and use a variety of immersive
systems. Both technical and social science related topics will be covered.
The workshop will be tutored by scientist researchers from Telenor R&D.

=B7 e~on exhibition - will focus on electronic art made in Norway, but will
include international participation as far the budget allows

=B7 Public panel debate (with key note speakers and special guest)

=B7 "Cyberdesign -97" presentation: the award winner of Telenor Research VR
design competition.

The list of keynote speakers and special events is preliminary; more to be
added. Please visit our Website for more information and updates on
6CYBERCONF.

ORGANIZERS

Cyberconf Director: Allucquere Rosanne Stone,
Professor and Director of the Interactive, Multimedia Laboratory at the
University of Texas at Austin
http://www.actlab.utexas.edu/~sandy

Conference Coordinator: Morten S=F8by,
Research Fellow, Institute for Educational Research, University of Oslo
Email: [email protected]
http://www.uio.no/~mortenso/
Phone: + 47 22855383  Fax: + 47 22854250

Conference Coordinator: Ola =D8deg=E5rd,
Researcher, Manager of The Televirtuality Research Group at Telenor
Research and Development.
Phone: + 47 63848885  Fax: + 47 63810076
Email: [email protected]
http://televr.fou.telenor.no/~olao/olao.html

Coordinator Interactive Installations: Stale Stenslie,
Artist and Reseacher, Telenor R&D, Cologne/Oslo.
Phone: + 47 90562963  Fax: +47 63810076
Email: [email protected]
http://televr.fou.telenor.no/~stahl/stahl.html

FOR FURTHER INFORMATION

Send e-mail to: [email protected]

See the Web site for continuous updates:
http://televr.fou.telenor.no/cyberconf - or contact directly

Registration, Hotel booking, Flights:
Project secretary 6Cyberconf: May Krosby
Phone: + 47 638 48 341 =20
Fax. + 47 63 81 98 10
Email: [email protected]
http://televr.fou.telenor.no/cyberconf/

Abstracts, Papers, Information:
Conference Editor: Vibeke Kl=F8vstad
Phone:  + 47 22426980 / 22426892#126
Email: [email protected]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Research Fellow  Morten Soby
Institute for Educational Research, P. O. Box 1092, Blindern, N-0317 Oslo
Phone: +47 22855383  Fax: + 47 22854250  Home:  + 47 22952775  GSM:  926332=
18
Homepage: http://www.uio.no/~mortenso/
Coordinator 6CYBERCONF: http://televr.fou.telenor.no/cyberconf/

------------------------------

Date: Tue, 28 Jan 1997 09:19:26 -0400
From: [email protected](Russ Haynal)
Subject: File 5--DC-ISOC Tidbits

Hello DC-ISOC,

I hope your New Year is off to a good start.

This message contains a couple of requests and a half-day conference
announcement that should be of interest to many of you...

Russ Haynal

=========================================================================
Want to go to CommNET ???

CommNET Is a large industry conference and trade show being held NEXT WEEK
in the Washington Convention Center.  If you have never been able to make
it to CommNET, I am happy to provide you with just the excuse/opportunity
you need to attend this great show.

The Internet Society (ISOC) has been given a booth for the show.  ISOC will
provide  someone at all times to manage the booth.  However, the Internet
Society is seeking additional volunteers to help staff the booth.  A Key
responsibility would be to accept new member registrations.  A Secondary
responsibility would be to answer questions and hand-out literature.
"Working the booth" is  a great way to meet many people and share your
knowledge about the Internet/ISOC.

The Convention floor hours are 10-6 on February 4-6.  Volunteers would only
have to work one (or more) 2-4 hour shifts.

Volunteers should be ISOC members, or people who will sign up as
members.  (It doesn't make a lot of sense to have someone in the booth
talking up ISOC and not spending $35 to be a member.)

Anyone interested in volunteering or finding our more details should
contact Mary Burger at the Internet Society Headquarters (703-648-9888).  A
CommNET Booth is a great opportunity for ISOC, please help to make this a
success.

================================================================================
DC-ISOC Meeting Locations...

As always, the DC-ISOC would like to hear any leads you may have on (free)
meeting places in the DC metro region, large enough to hold 200 people.
We were able to hold our last meeting at the Marriot Hotel, thanks to the
costs being absorbed by Network Solutions ( http://www.netsol.com ).  If
your organization is interested in covering the costs of a DC-ISOC meeting,
please contact Russ Haynal ([email protected] or 703-729-1757)  Sponsors
do receive visibility/recognition to the DC-ISOC Membership (Mailing list
includes over 1500 Internet industry participants located mostly in the DC
Metro area)


========================================================
Conference Announcement....


Digital Dilemmas: Defining Ethics in the Internet Age

The Internet revolution has sparked a fierce debate among the business,
academic, computer, and public policy communities. Today, we are grappling
with complex ethical questions such as
*       Must society ensure that all people have equal access to the Internet?
*       Can we bridge the gap between network haves and have-nots?
*       Can the Internet remain a haven for free expression, discreet
information consumption, and private transactions?
*       Can we strike a balance between individual interests and
commercialism on the Internet?

These new-age questions defy easy answers. They demand new-age solutions.
Take part in the debate. Attend Marymount University's conference,
Digital Dilemmas: Defining Ethics in the Internet Age.


Ethics, Access, and the Internet

This conference is for high-tech companies, consumer advocates, cybernauts,
academicians, and policy makers who are surveying the landscape of ethical
considerations in the Internet Age. Along with the changing structure of
communications within our society, we are faced with ethical dilemmas of
*       Equal access
*       Free speech
*       Intellectual property
*       Privacy
*       Regulation
*       Electronic commerce
Marymount has assembled an impressive cadre of speakers and panelists who
are at the forefront of ethical debate in the Internet Age.
Join us for this half-day conference as we explore the controversial issues
of ethics, access, and the Internet.


Panel One:

Moving Beyond the Wire: Who Gains? Who's Left Behind?

Whose Internet is it, anyway? Popular opinion holds that the Internet is
the great equalizer. No one knows whether you're rich or poor, urban or
rural, young or old. No one knows your gender, race, or education.
The push is on to wire up our schools, homes, and businesses. But what
happens to those who aren't willing or able to get connected? Will they be
left out of future political and social debates? Will they miss out on
economic opportunities? Is the Internet setting up exclusion criteria,
information elites, electronic inequities? What is the impact of the
Internet on our society and our economy? What's the role of government and
the private sector in ensuring equal access?

Panel Two:

Uncharted Waters:  Privacy, Intellectual Property, and the First Amendment

With the unexpected and explosive growth of the Internet, governments,
regulating agencies, and individuals in a position of public trust or
public office have begun to recognize the power of this new communications
medium. In the interest of "protecting" their constituencies, many powerful
interests are getting involved. Recently, the issues of privacy,
intellectual property, and First Amendment rights have come under intense
scrutiny, but precious few legal decisions have charted our course.
Are we adrift in a sea of unresolved legal and ethical quandaries? Is the
Internet headed for the rocks? Will proposed "solutions" render the
Internet powerless? Will free marketers and brash commercialism sail over
the free sharing of information? Should technology influence culture or
vice versa?


Conference Planning Committee:

Chair:  Jack McDonnell, President and CEO, Transaction Network Services, Inc.
       Dan Bannister, President and CEO, DynCorp
       Mario Morino, Chairman, Morino Institute
       Stephen Allis, Director, Government Affairs, KPMG Peat Marwick, LLP
       Robert Sigethy, Dean, School of Business Administration, Marymount
University
       Paul Byers, Director, Center for Ethical Concerns, Marymount University


Agenda at a Glance

       8:30 -  9:00    Registration
       9:00 -  9:05    Welcome to Marymount
       9:05 -  9:30    Keynote Speaker - Tom Bliley, Chairman, House Commerce
                       Committee
       9:30 -  10:30   Beyond the Wire: Who Gains? Who's Left Behind?
                       Moderator: Brit Hume (Fox News, Chief Washington
                               Correspondent and Managing Editor)
                       Speakers:John Sidgmore, CEO, UUNet, Technologies, Inc.
                               Bill Melton, President and CEO,
                               CyberCash, Inc.
                               Larry Irving, Assistant Secretary for
                               Communications and Information, Department
                               of Commerce (invited)
       10:30 - 10:45   Coffee Break
10:45 - 11:45   Uncharted Waters: Privacy, Intellectual Property, and
                       the First Amendment
                       Moderator:Paul Byers (Director, Center for Ethical
                               Concerns, Marymount University)
                       Speakers:Don Heath, President, Internet Society
                               Guest, Freedom Forum
                               Harry Litman, Deputy Assistant Attorney General,
                               Department of Justice
12:00 - 1:00    Luncheon
                       Speaker:Tom Kalil, Senior Director to the National
                               Economic Council

Note: Schedules are subject to change. For the latest information, visit
our Web site at http://www.marymount.edu


Roads to Marymount University

From north of Washington, D.C.:
Take Interstate Rt. 95-South to 495-West to Exit 14 (George Washington
Parkway-South) to Rt. 123-North (Chain Bridge Road). Follow to traffic
light at end of road. Turn right onto Glebe Road (Rt. 120-South) and follow
for 2.5 miles. Marymount is on the left.
From south of Washington, D.C.:
Take Interstate Rt. 95-North, which becomes 395 inside the Beltway. Exit
Glebe Road (Rt. 120-North), marked "Marymount University." Continue on
Glebe Road 6 miles. Marymount is on the right.
From Rt. 66 (either direction):
Exit Glebe Road (Rt. 120-North). Drive 1 mile. Marymount is on the right.
If you or any of your guests require special consideration because of
physical disabilities, please notify the Office of Campus Safety at (703)
284-1601 at least 48 hours prior to your visit.


Sponsored by Marymount University's School of Business Administration and
Center for Ethical Concerns

Marymount University - Located in Arlington, Virginia, Marymount is an
independent, comprehensive, Catholic university offering programs to more
than 4,000 men and women at the undergraduate and graduate levels.
Marymount strives to foster the intellectual, moral, spiritual, social,
cultural, and physical development of each student through an education
that combines the liberal arts tradition with career preparation.

Center for Ethical Concerns - One of the hallmarks of Marymount University
is its commitment to providing a values-based education. The Center for
Ethical Concerns was founded in 1993 to provide a forum for the exchange of
ideas about ethical issues and problems. Through lectures, seminars,
workshops, and symposia, the Center offers students, faculty, and the
public opportunities to examine ethical concerns facing society.

Design by:      Franek Design Associates, Inc.
Printing by:    Print Pro, Inc.
Marketing by:   Marketek


Register Today

Digital Dilemmas: Defining Ethics in the Internet Age

March 12, 1997, 8:30 a.m. to 1:00 p.m.
Marymount University, Arlington, Virginia
To register, complete this coupon (please print or type) and fax it to
Marymount University at (703) 284-1544. Or register via the World Wide Web
at http://www.marymount.edu after January 31.

o  Yes, sign me up for the conference
NAME
TITLE
ORGANIZATION
ADDRESS
CITY            STATE   ZIP
PHONE
FAX             E-MAIL
Please indicate payment method:
Charge my:   o Visa   o MasterCard
Card #      Exp. date __________
Signature __________________________________________________

o Check enclosed

Make checks payable to Marymount University.
Send this form to:      Marymount University
                       c/o Barbara Favola
                       Office of the President
                       2807 North Glebe Road
                       Arlington, VA  22207-4299

Registration fees:    o $100      o $45 - students (must show ID)
Register early; seating is limited. All registrations must be received by
March 5. No refunds provided for cancellations after March 1. However, your
registration may be transferred to another individual if you cannot attend.

------------------------------

Date: Wed, 8 Jan 1997 15:38:35 -0800
From: Sara Winge <[email protected]>
Subject: File 6--"DNS and BIND," and "Mastering Regular Expressions"

FOR IMMEDIATE RELEASE
January 8, 1997

PRESS ONLY--FOR REVIEW COPIES, CONTACT:
Sara Winge
707/829-0515
[email protected]

 NEW EDITION OF O'REILLY'S CLASSIC NUTSHELL HANDBOOK "DNA AND BIND"

SEBASTOPOL, CA-O'Reilly & Associates announces the publication of the
second edition of "DNS and BIND," a complete guide to the Internet's
Domain Name System (DNS) and the Berkeley Internet Name Domain (BIND)
software, the UNIX implementation of DNS. The new edition also covers
using DNS and BIND with Windows NT. It's a complete update of this
classic Nutshell Handbook, which has served as *the* source of
information on DNS and BIND for system administrators who manage domain
or name servers.

DNS is the system that translates hostnames (like "rock.ora.com") into
Internet addresses (like 192.54.67.23). Until BIND was developed, name
translation was based on a "host table"; if you were on the Internet,
you got a table that listed all the systems connected to the Net and
their addresses. As the Internet grew from hundreds to hundreds of
thousands of systems, host tables became unworkable. DNS is a
distributed database that solves the same problem effectively, allowing
the Net to grow without constraints.  Rather than having a central
table that gets distributed to every system on the Net, it allows local
administrators to assign their own hostnames and addresses and install
these names in a local database. This database is automatically
distributed to other systems as names are needed.

In this new edition of "DNS and BIND," the authors describe Bind
version 4.8.3, which is included in most vendor implementations today.
In addition, readers will find complete coverage of Bind 4.9.4, which
in all probability will be adopted as the new standard in the near
future.

In addition to covering the basic motivation behind DNS and how to set
up the BIND software, this book covers many more advanced topics,
including how to become a "parent" (i.e., "delegate" the ability to
assign names to someone else); how to use DNS to set up mail forwarding
correctly; debugging and troubleshooting; and programming.

                             # # #

DNS and BIND, 2nd Edition
By Paul Albitz & Cricket Liu
2nd Edition December 1996
438 pages, ISBN: 1-56592-236-0, $32.95 US

=========================================================================

FOR IMMEDIATE RELEASE
January 10, 1997

PRESS ONLY--FOR REVIEW COPIES, CONTACT:
Sara Winge
707/829-0515
[email protected]

         O'REILLY RELEASES "MASTERING REGULAR EXPRESSIONS"

SEBASTOPOL, CA--Programmers who delve into O'Reilly and Associates'
new book "Mastering Regular Expressions" can save themselves time and
aggravation while dealing with documents, mail messages, log files--any
type of text or data--by tapping the power of regular expressions. For
example, regular expressions can play a vital role in constructing a
World Wide Web CGI script, which can involve text and data of all
sorts. Those who don't use regular expressions yet will discover a
whole new world of mastery over their data in "Mastering Regular
Expressions." Experienced users will appreciate the book's
unprecedented detail and breadth of coverage.

Regular expressions are not a tool in and of themselves, but are
included as part of a larger utility. The classic example is grep.
These days, regular expressions can be found everywhere, such as in:
 - scripting languages (including Perl, Tcl, awk, and Python)
 - editors (including Emacs, vi, and Nisus Writer)
 - programming environments (including Delphi and Visual C++)
 - specialized tools (including lex, Expect, and sed)

While many of these tools originated on UNIX, they are now available
for a wide variety of platforms, including DOS/Windows and MacOS.
Additionally, many favorite programming languages (even Java) offer
regular-expression libraries, so programmers can include support for
them in their own programs.

For years, author Jeffrey Friedl has helped people on the Net
understand and use regular expressions. In "Mastering Regular
Expressions" he goes beyond mechanics and initiates readers to the art
of using regular expressions.  Friedl shares the subtle but valuable
ways to think when using regular expressions as he leads readers
through the process of crafting a regular expression to get the job
done.

Regular expressions are not used in a vacuum. In this book, a variety
of tools are examined and used in an extensive array of examples. Perl,
in particular, is very well represented throughout the book, with a
major chapter dedicated entirely to it alone. Perl is extremely
well-endowed with rich and expressive regular expressions. Yet what is
power in the hands of an expert can be fraught with peril for the
unwary--"Mastering Regular Expressions" shows readers how to navigate
the minefield and become true masters of the art of regular
expressions.

                            # # #

Mastering Regular Expressions: Powerful Techniques for Perl and
Other Tools
By Jeffrey E. F. Friedl
1st Edition January 1997
368 pages, ISBN: 1-56592-257-3, $29.95 US

------------------------------

Date: Tue, 28 Jan 1997 12:08:42 EST
From: "Rob Slade, doting grandpa of Ryan & Trevor"
Subject: File 7--"The Basics of Computer Security" by Bellcore

VDBSCMSC.RVW   961019

"The Basics of Computer Security", Bellcore, 1995, 1-57305-047-4, U$695.00
%A   Bellcore
%C   Room 3A184, 8 Corporate Place, Piscataway, NJ   08854
%D   1995
%G   1-57305-047-4
%I   Bellcore
%O   U$695.00 +1-800-521-CORE +1-908-699-5800 fax: +1-908-336-2559
%O   [email protected] [email protected]
%P   130 minutes
%T   "The Basics of Computer Security"

Essentially, this series of three short video tapes contains the rough
equivalent of three introductory chapters of a basic security
text.  There is an introduction to computer security in general,
an introduction to application security, and an introduction to
application security review or audit.  The material is presented
at a level suitable to the user, or perhaps a non-technical
manager.

The format is the standard talking head interspersed with slides.
The material on the slides is reprinted in booklets packaged with
the tapes.  The content is generally reliable, although sometimes
the advice on minor matters is questionable.  Overall
organization is good, but some sections are poorly planned and
repetitive.

copyright Robert M. Slade, 1996   VDBSCMSC.RVW   961019

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
        In ITALY: ZERO! BBS: +39-11-6507540
        In LUXEMBOURG: ComNet BBS:  +352-466893

 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #9.06
************************************