Computer underground Digest Sun Aug 27, 1995 Volume 7 : Issue 70 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson CONTENTS, #7.70 (Sun, Aug 27, 1995) File 1--Church of Scientology Sues Washington Post File 2--Comments on Beverly LaHaye Live File 3--Security Mailing Lists File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 28 Aug 1995 11:13:43 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 1--Church of Scientology Sues Washington Post ((MODERATORS' NOTE: The Church of Scientology has recently been accused of intimidating critics, cancelling posts, engaging in "litigation terrorism," and other alleged actions designed to silence critics. Discussion of these issues proliferates on Usenet's alt.religion.scientology. Links to homepages providing additional details of allegations against CoS can be found on CuD's homepage (http://www.soci.niu.edu/~cudigest Careful readers will note that the wording of the following release is less objective than the style makes it seem)) Date--22 Aug 1995 14:26:09 -0700 From--milne@crl.com (Andrew Milne) Subject--WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS ============================================================= August 22, 1995 NEWS RELEASE CONTACT: LEISA GOODMAN OR EARLE COOLEY (202) 667-6404 WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS Subject--WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS Date: 22 Aug 1995 14:26:09 -0700 August 22, 1995 NEWS RELEASE CONTACT: LEISA GOODMAN OR EARLE COOLEY (202) 667-6404 WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS The Washington Post and two of its reporters were sued today in the U.S. District Court for the Eastern District of Virginia by the Religious Technology Center (RTC), holders of the intellectual property rights of the Scientology religion. According to the lawsuit, the Washington Post and its writers have engaged in "extensive, intentional copyright infringement and trade secrets misappropriattion, targeting confidential Scientology scriptures belonging to RTC." Judge Leonie Brinkema of the U.S. District Court in Alexandria, due to the urgent nature of the matter, scheduled an August 25 hearing on the temporary restraining order and impoundment application to get the Washington Post to turn over the misappropriated documents. The lawsuit is an amendment of a complaint that was filed on August 11 against an Arlington man, Arnaldo Lerma, and his Internet access provider Digital Gateway Systems, for copyright and trade secrets infringement. According to Boston lawyer Earle C. Cooley, who represents Religious Technology Center, the newspaper and their two reporters, Richard Leiby and Marc Fisher, were added to the lawsuit because they engaged in their own direct infringements of plaintiff's copyright interests and misappropriation of plaintiff's trade secrets, while at the same time aiding, supporting, encouraging, and facilitating blatant acts of infringement and misappropriation by Lerma. The day after the lawsuit was filed, on August 12, a search and seizure order by Judge Brinkema was carried out at Lerma's home by Federal Marshals and computer software, hardware and documents were confiscated. Church lawyers report that they were able to establish that Lerma lied because, contrary to his assertions that computer discs had been purged of any stolen materials, their electronic experts have already found 63 copyright items among the seized material. The new lawsuit reveals that Lerma sent the protected materials to Leiby when he was put on notice by the Church to stop violating its copyright and trade secret rights. The Church now charges that this was done in an attempt to obstruct justice by concealing the stolen copies from lawful seizure. The suit claims the existence of evidence which shows that Richard Leiby choreographed and instigated Lerma's illegal conduct for his own campaign of harassment against the Scientology religion. According to the lawsuit, Leiby's campaign dates back more than 15 years. Church spokeswoman Leisa Goodman said "The Washington Post and Mr. Leiby violated fundamental journalistic integrity by conspiring with lawless elements on the Internet to harm the religion of Scientology." Once the Church became aware that its materials were in the possession of Richard Leiby, it demanded their immediate return. Leiby and the Washington Post handed the stolen copies over to RTC's lawyers last week on August 15. However, "the return of the materials, a seeming display of good faith, was an utter ruse", the complaint states. "At the same time that the materials were being returned to the Church in Washington, Leiby, Fisher and the Post were getting copies of the same stolen records from the clerk's file in LA where litigation was pending regarding the sealing of such materials. A Post reporter persuaded the clerk's office to take the documents away from a Church employee who had checked out the file, to make copies for the Post," the complaint continues. The Church reacted with an emergency motion to the judge on the case in Los Angeles, who immediately ordered the entire case file sealed on August 15, when he was told that the Washington Post had obtained a copy of the copyrighted and trade secret materials. According to the lawsuit, the Church immediately demanded the materials back and also put the post on notice "that its actions could not remotely be deemed news gathering, but rather constituted wholesale copying of a large amount of copyrighted trade secret information in an attempt to sanitize the illicit acquisition of infringing documents which Leiby and the Post concealed on Lerma's behalf." Church spokeswoman Goodman discounted the notion that any free speech or fair-use issues were involved. "Violators of copyright and trade secret laws traditionally try to hide behind free speech or fair-use claims. The Church is a strong proponent of free speech and fair-use. It publishes its own investigative magazine and cherishes the First Amendment. However, free speech or fair-use does not mean free theft and no one, the Washington Post included, has the right to cloak themselves in the First Amendment to break the law." Despite repeated warnings from Church lawyers, last Saturday the Washington Post published a lengthy article by Marc Fisher, which included quotes from the copyrighted, trade secret materials. "Prior to publication of the article, the defendants were placed on notice that their actions would constitute a violation of plaintiff's rights," said Goodman. "The Post made a serious mistake," RTC's lawyer Earle C. Cooley contends, "in allowing themselves to be manipulated by a few maliciously motivated dissidents who want to use the Post to forward their religious hate campaign. The courts take these matters very seriously. The law is clear: If you are going to violate copyrights, you will have to answer for it in court. This applies to the Washington Post just as much as to anyone else." With this lawsuit, Religious Technology Center is asking the court to order the return of its documents by the Washington Post and grant a permanent injunction against the Post and the individual violators of its rights. It also seeks statutory damages and punitive damages. ------------------------------ Date: Fri, 25 Aug 1995 18:48:49 -0400 From: timk@CYBERCOM.NET(Tim King) Subject: File 2--Comments on Beverly LaHaye Live Not too long ago, there was posted a transcript of a particular Beverly LaHaye Live, a syndicated christian radio program. And as a conservative christian, I'd like to say, for the record, that the episode can be summed up in one word: "sensationalism." This sensationalism manifests itself thoughout in factual innaccuracies and ommissions, in misused emotionally-loaded language, and in a decidely lopsided approach. In the way of inaccuracies, Pat Truman, several times, fails to stress the legal difference between indecency and obscenity. He says that the Internet is "a highway, literally, from your computer to _every other computer in the world_." He says that if your computer isn't connected to the Internet, "your neighbor's computer probably is, your school computer is," making Net connections appear almost as common as telephones. He says that the Thomases of Amateur Action BBS were convicted of "putting pornography on the Internet," even though the Internet never came into their case. But the single pervasive element throughout was alarmism. The gist of the entire show can be interpreted: "The porn-meisters are coming. Everybody panic and lock your young ones in a closet." This, in my opinion, is simply not true. Beverly LaHaye opens by saying, "And thanks to the Information Superhighway, pornography could be invading your home without you even knowing it. The challenge for parents today is finding ways to keep their children from being exposed to these vulgar influences." I would re-word this: "The open environment of the Internet allows adult material, as well as non-adult material, to be freely circulated. Parents who want to place limits on what their children can access may find it a challenge." Phrased thusly, I would agree with the sentiment. It may be factually true that "pornography could be invading your home without you even knowing it." But the path of least resistence is still education rather than legislation. I must further disagree with the implication that the ignorance of parents is the fault of "the Information Superhighway." Is it not true that, no matter what controls are in place, it is the responsibility of parents to monitor their childrens' development? Moreover, I don't think that pornography is the only issue. The concern, broadly speaking, is that children will get ahold of adult material. But is it not the responsibility -- and the right -- of each child's parents to judge, as they see fit, what is or is not suitable for their kids? I would recommend consideration of some simple, common-sense steps. Take an interest in the email conversations your child has with others. Do you take an interest in your child's friends? Take an interest in his Internet aquaintances, too. Make sure your child understands a few rules: Don't tell anyone on the Internet your address, telephone number, or age. Don't agree to meet, in person, anyone you meet, electronically, on the Internet. And make sure to tell Mom or Dad if anyone says anything you're not comfortable with via email. And don't talk to, take candy from, or get into a car with a stranger. I would also suggest parents take a look at <http://www.crc.ricoh.com/people/steve/warn-kids.html> and <http://silver.ucs.indiana.edu/~lchampel/netadv.htm>. One suggestion Mr. Truman presents, which sounds like a good one to me, is to put the computer in the kitchen, in the den, or in the living room, where everybody can see it. Surely this will make a child think twice about actively seeking off-limits materials, and it will provide a way for the child's parents to keep an eye on him. Of course, Mr. Truman, true to form, can't leave well enough alone. He also suggests keeping the computer away from phone lines, "because this is all transacted by plugging your computer into a phone line. And every computer is equipped with that..." Even if the computer has a modem and it is plugged into the phone line, the child would have to (1) obtain and (2) install appropriate software and (3) learn how to use it. Additionally, he must (4) obtain an Internet account. It is unfathomable that a child could covertly connect to the Internet, not having previously been given all of what is needed to accomplish the task. I'm not trying to underestimate the concern this may still be for some parents, but these facts would probably have put some parents' minds at ease, had Mr. Truman cared to point them out. Pat Truman correctly points out the future for pornography is over the Internet. The future for civilization in general is over the Internet. Although I share his conviction concerning technology, however, I don't share his alarm. It is not surprising to me that extant materials and practices are being adapted to the Internet. The presence of pornography on the Internet is no more surpising than that of library card catalogs, gift baskets, and record shops. But Mr. Truman says, "I was shocked. I've been in the worst pornography shops in Manhattan, downtown New York, on investigations, and anything I saw there was available on the Internet... It's hard to believe that people would record sexual acts and put them on the Internet..." I don't know why he was shocked. Did he actually think that the Internet was a moral safe-haven, sheltered from humanity? Is he really _that_ naive? Is it really that hard to believe, knowing that people record sexual acts and put them on paper and video, that they would do the same over the Internet? I find Mr. Truman's reaction difficult to accept. Maybe he was disgusted, but not shocked. Nevertheless, far be it from me to try to second-guess his thoughts. If he says he was shocked... Well... He points to "a problem that is very much related to pornography, it's these obscene conversations that you can have - worldwide conversations, you can talk to someone... and have a _terrible_ conversation. There are no age limits. And, uh, it's all..." Uh, yeah. Uh... He never specifies to which "obscene conversations" he's referring. Nonetheless, how do "_terrible_" -- ~shiver~ -- "worldwide conversations" differentiate the Internet from the telephone? And if I want to talk dirty with my wife -- or with anyone else -- what does that have to do with pornography? For the concerns about children, see my comments above. Ms. LaHaye is concerned that the kids will "go over to Johnny's house to spend the afternoon, and Johnny's got a computer and knows how to enter all this, and here these two boys _play_ with this kind of _porn_!" And the same hypothetical Johnny probably has a Hustler magazine under his mattress. Now, my parents took care to be informed concerning my friends. They wanted to know where I was, what I was doing, and with whom I was doing it. Any parent who doesn't take the same care in raising their children has, at least partially, himself to blame for their friends' influence. Mr. Truman says, "You can buy software as a parent that will block this material... So these access providers now say, ... go buy something for 50 bucks... And my position is, ... _you_ provide the software..." This is a most naive view. Does Mr. Truman honestly think that, even if service providers were forced to provide blocking software, users would not be charged? I can just see the $50 installation fees, even for those user's that could rather go without. He says, "I had a high school librarian in Seattle, Washington call me the other day because she [used] the Internet Yellow Pages [to find the] US Government, Executive Branch, Clinton Cabinet. You dial that in, you get obscene work, after obscene work, after obscene work." Huh? Is this supposed to be some sort of a dumb political joke? But the one that took the cake, the most moving of all -- so moving, in fact, that I thought I would heave -- is the following sequence: "But the reason I criticized the Exon bill... is that he would give immunity from prosecution from the major pornography _profiteers_... The person who put [the porn] on the Internet didn't charge for it. But _Netcom_, or America OnLine, or these others, _will_ charge you... Some people spend hundreds and hundreds of dollars viewing it, and some of those people are children... the pornographer profiteers today are the people who give you access to the Internet... And they know that material's there, they know that's why thousands and thousands of people subscribe every month to their services, that is in order to get pornography. So the pornography profiteers today are the access providers, like Netcom, CompuServe, etc." Hundreds and hundreds of dollars? I think you need a new ISP. And some children spend this much? Don't their parents wonder about the bill? Thousands and thousands of people? Name six. And, by the way, since you have all of these nifty statistics at your fingertips, what percentage of all Internet users does that "thousands and thousands" represent? I most strongly contest the labelling of Internet service providers as "pornography profiteers." This is a most inaccurate description when applied to practially all, if not all, ISPs. There can be no excuse for the utterance of such ignorant and careless hogwash. ISPs charge for Internet access, not for pornography. From their perspective, if you choose to access pornography, that's your business. I don't know of any ISPs that don't charge the same rate regardless of whether one accesses Penthouse magazine or The Christian Coalition's Home Page. You guys, take a step back and stop making a mockery out of issues we -- christians, U.S. citizens, and conservatives -- hold dear. ------------------------------ Date: Thu, 24 Aug 1995 18:36:51 +1494730 (PDT) From: Christopher Klaus <cklaus@ISS.NET> Subject: File 3--Security Mailing Lists This was put together to hopefully promote greater awareness of the security lists that already exist. Most security mailing lists have been only announced once and it was only word of mouth that it would acquire new members. This list should hopefully make the membership grow for each mailing list. If you know of any mailing lists that have been skipped, please e-mail cklaus@iss.net with the info. The newest updates for this will be on http://iss.net/. This web site also contains info for the following security issues: Vendor security contacts Security Patches What to do if you are compromised Set up Anon ftp securely Sniffers attacks and solutions Security Mailing Lists The following FAQ is a comprehensive list of security mailing lists. These security mailing lists are important tools to network administrators, network security officers, security consultants, and anyone who needs to keep abreast of the most current security information available. General Security Lists * 8lgm (Eight Little Green Men) * Academic-Firewalls * Best of Security * Bugtraq * Computer Privacy Digest (CPD) * Computer Underground Digest (CuD) * Cypherpunks * Cypherpunks-Announce * Firewalls * Intruder Detection Systems * Phrack * PRIVACY Forum * Risks * Sneakers * Virus * Virus Alert Security Products * Tiger * TIS Firewallk Toolkit Vendors and Organizations * CERT * CIAC * HP * Sun ------------------------------------------------------------------------------- 8lgm (Eight Little Green Men) To join, send e-mail to majordomo@8lgm.org and, in the text of your message (not the subject line), write: subscribe 8lgm-list Group of hackers that periodically post exploit scripts for various Unix bugs. ------------------------------------------------------------------------------- Academic Firewalls To join, send e-mail to majordomo@net.tamu.edu and, in the text of your message (not the subject line), write: SUBSCRIBE Academic-Firewalls This is an unmoderated list maintained by Texas A&M University. Its purpose is to promote the discussion and use of firewalls and other security tools in an academic environment. It is complementary to the Firewalls list maintained by Brent Chapman (send subscription requests to Majordomo@GreatCircle.COM) which deals primarily with firewall issues in a commercial environment. Academic environments have different political structures, ethical issues, expectations of privacy and expectations of access. Many documented incidents of cracker intrusions have either originated at or passed through academic institutions. The security at most universities is notoriously lax or even in some cases completely absent. Most institutions don't use firewalls because they either don't care about their institution's security, they feel firewalls are not appropriate or practical, or they don't know the extent to which they are under attack from the Internet. At Texas A&M University we have been using a combination of a flexible packet filter, intrusion detection tools, and Unix security audit utilities for almost two years. We have found that simple firewalls combined with other tools are feasible in an academic environment. Hopefully the discussion on this list will begin to raise the awareness of other institutions also. ------------------------------------------------------------------------------- Best of Security To join, send e-mail to best-of-security-request@suburbia.net with the following in the body of the message: subscribe best-of-security REASONS FOR INCEPTION In order to compile the average security administrator it was found that the compiler had to parse a foreboding number of exceptionally noisy and semantically-content-free data sets. This led to exceptionally high load averages and a dramatic increase in core entropy. Further, the number, names and locations of this data appears to change on an almost daily basis; requiring tedious version control on the part of the mental maintainer. Best-of-Security is at present an un-moderated list. That may sound strange given our stated purpose of massive entropy reduction; but because best often equates with "vital" and the moderator doesn't have an MDA habit it is important that material sent to this list be delivered to its subscribers' in as minimal period of time as is (in)humanly possible. If you find *any* information from *any* source (including other mailinglists, newsgroups, conference notes, papers, etc) that fits into one of the acceptable categories described at the end of this document then you should *immediately* send it to "best-of-security@suburbia.net". Do not try and predict whether or not someone else will send the item in question to the list in the immediate future. Unless your on a time-delayed mail vector such as polled uucp or the item has already appeared on best-of-security, mail the info to the list! Even if it is a widely deployed peice of information such as a CERT advisory the proceeding argument still applies. If the information hasn't appeared on this list yet, then SEND IT. It is far better to run the risk of minor duplication in exchange for having the information out where it is needed than act conservatively about occasional doubling up on content. ------------------------------------------------------------------------------- Bugtraq To join, send e-mail to LISTSERV@NETSPACE.ORG and, in the text of your message (not the subject line), write: SUBSCRIBE BUGTRAQ This list is for *detailed* discussion of UNIX security holes: what they are, how to exploit, and what to do to fix them. This list is not intended to be about cracking systems or exploiting their vunerabilities. It is about defining, recognizing, and preventing use of security holes and risks. Please refrain from posting one-line messages or messages that do not contain any substance that can relate to this list`s charter. Please follow the below guidelines on what kind of information should be posted to the Bugtraq list: * Information on Unix related security holes/backdoors (past and present) * Exploit programs, scripts or detailed processes about the above * Patches, workarounds, fixes * Announcements, advisories or warnings * Ideas, future plans or current works dealing with Unix security * Information material regarding vendor contacts and procedures * Individual experiences in dealing with above vendors or security organizations * Incident advisories or informational reporting ------------------------------------------------------------------------------- Computer Privacy Digest To join, send e-mail to comp-privacy-request@uwm.edu and, in the text of your message (not the subject line), write: subscribe cpd The Computer PRIVACY Digest (CPD) (formerly the Telecom Privacy digest) is run by Leonard P. Levine. It is gatewayed to the USENET newsgroup comp.society.privacy. It is a relatively open (i.e., less tightly moderated) forum, and was established to provide a forum for discussion on the effect of technology on privacy. All too often technology is way ahead of the law and society as it presents us with new devices and applications. Technology can enhance and detract from privacy. ------------------------------------------------------------------------------- Computer Underground Digest To join, send e-mail to LISTSERV@VMD.CSO.UIUC.EDU and, in the text of your message (not the subject line), write: SUB CUDIGEST CuD is available as a Usenet newsgroup: comp.society.cu-digest Covers many issues of the computer underground. ------------------------------------------------------------------------------- Cypherpunks To join, send e-mail to majordomo@toad.com and, in the text of your message (not the subject line), write: SUBSCRIBE cypherpunks The cypherpunks list is a forum for discussing personal defenses for privacy in the digital domain. It is a high volume mailing list. ------------------------------------------------------------------------------- Cypherpunks Announce To join, send e-mail to majordomo@toad.com and, in the text of your message (not the subject line), write: SUBSCRIBE cypherpunks-announce There is an announcements list which is moderated and has low volume. Announcements for physical cypherpunks meetings, new software and important developments will be posted there. ------------------------------------------------------------------------------- Firewalls To join, send e-mail to majordomo@greatcircle.com and, in the text of your message (not the subject line), write: SUBSCRIBE firewalls Useful information regarding firewalls and how to implement them for security. This list is for discussions of Internet "firewall" security systems and related issues. It is an outgrowth of the Firewalls BOF session at the Third UNIX Security Symposium in Baltimore on September 15, 1992. ------------------------------------------------------------------------------- Intrusion Detection Systems To join, send e-mail to majordomo@uow.edu.au with the following in the body of the message: subscribe ids The list is a forum for discussions on topics related to development of intrusion detection systems. Possible topics include: * techniques used to detect intruders in computer systems and computer networks * audit collection/filtering * subject profiling * knowledge based expert systems * fuzzy logic systems * neural networks * methods used by intruders (known intrusion scenarios) * cert advisories * scripts and tools used by hackers * computer system policies * universal intrusion detection system ------------------------------------------------------------------------------- Phrack To join, send e-mail to phrack@well.com and, in the text of your message (not the subject line), write: SUBSCRIBE Phrack Phrack is a Hacker Magazine which deals with phreaking and hacking. ------------------------------------------------------------------------------- PRIVACY Forum To join, send e-mail to privacy-request@vortex.com and, in the text of your message (not the subject line), write: information privacy The PRIVACY Forum is run by Lauren Weinstein. He manages it as a rather selectively moderated digest, somewhat akin to RISKS; it spans the full range of both technological and non-technological privacy-related issues (with an emphasis on the former). ------------------------------------------------------------------------------- Risks To join, send e-mail to risks-request@csl.sri.com and, in the text of your message (not the subject line), write: SUBSCRIBE Risks is a digest that describes many of the technological risks that happen in today's environment. ------------------------------------------------------------------------------- Sneakers To join, send e-mail to majordomo@CS.YALE.EDU and, in the text of your message (not the subject line), write: SUBSCRIBE Sneakers The Sneakers mailing list is for discussion of LEGAL evaluations and experiments in testing various Internet "firewalls" and other TCP/IP network security products. * Vendors are welcome to post challenges to the Internet network security community * Internet users are welcome to post anecdotal experiences regarding (legally) testing the defenses of firewall and security products. * "Above board" organized and/or loosely organized wide area tiger teams (WATTs) can share information, report on their progress or eventual success here. There is a WWW page with instructions on un/subscribing as well as posting, and where notices and pointers to resources (especially if I set up an archive of this list) may be put up from time to time: http://www.cs.yale.edu/HTML/YALE/CS/HyPlans/long-morrow/sneakers.html ------------------------------------------------------------------------------- Virus To join, send e-mail to LISTSERV@lehigh.edu and, in the text of your message (not the subject line), write: SUBSCRIBE virus-l your-name It is an electronic mail discussion forum for sharing information and ideas about computer viruses, which is also distributed via the Usenet Netnews as comp.virus. Discussions should include (but not necessarily be limited to): current events (virus sightings), virus prevention (practical and theoretical), and virus related questions/answers. The list is moderated and digested. That means that any message coming in gets sent to me, the editor. I read through the messages and make sure that they adhere to the guidelines of the list (see below) and add them to the next digest. Weekly logs of digests are kept by the LISTSERV (see below for details on how to get them). For those interested in statistics, VIRUS-L is now up to about 2400 direct subscribers. Of those, approximately 10% are local redistribution accounts with an unknown number of readers. In addition, approximately 30,000-40,000 readers read comp.virus on the USENET. ------------------------------------------------------------------------------- Virus Alert To join, send e-mail to LISTSERV@lehigh.edu and, in the text of your message (not the subject line), write: SUBSCRIBE valert-l your-name What is VALERT-L? It is an electronic mail discussion forum for sharing urgent virus warnings among other computer users. Postings to VALERT-L are strictly limited to warnings about viruses (e.g., "We here at University/Company X just got hit by virus Y - what should we do?"). Followups to messages on VALERT-L should be done either by private e-mail or to VIRUS-L, a moderated, digested, virus discussion forum also available on this LISTSERV, LISTSERV@LEHIGH.EDU. Note that any message sent to VALERT-L will be cross-posted in the next VIRUS-L digest. To preserve the timely nature of such warnings and announcements, the list is moderated on demand (see posting instructions below for more information). What VALERT-L is *not*? A place to to anything other than announce virus infections or warn people about particular computer viruses (symptoms, type of machine which is vulnerable, etc.). ------------------------------------------------------------------------------- Security Products ------------------------------------------------------------------------------- Tiger To join, send e-mail to majordomo@net.tamu.edu and, in the text of your message (not the subject line), write: SUBSCRIBE tiger Discussion list for the UNIX security audit tool TIGER This is the TIGER users mailling list. It is for: 1. Update announcements 2. Reporting bugs in TIGER. 3. Discussing new features for TIGER. 4. Discussing use of TIGER. 5. Discussing anything else about TIGER. What is TIGER? TIGER is a set of shell scripts, C code and configuration files which are used to perform a security audit on UNIX systems. The goals for TIGER are to make it very robust and easy to use. TIGER was originally developed for checking hosts at Texas A&M University following a break in in the Fall of 1992. The latest version of TIGER is always available from the directory net.tamu.edu:/pub/security/TAMU. In addition, updated digital signature files for new platforms and new security patches will be maintained in the directory: net.tamu.edu:/pub/security/TAMU/tiger-sigs. ------------------------------------------------------------------------------- TIS Firewall Toolkit To join, send e-mail to fwall-users-request@tis.com and, in the text of your message (not the subject line), write: SUBSCRIBE Discussion list for the TIS firewall toolkit ------------------------------------------------------------------------------- Vendors and Organizations ------------------------------------------------------------------------------- CERT (Computer Emergency Response Team) Advisory mailing list. To join, send e-mail to cert@cert.org and, in the text of your message (not the subject line), write: I want to be on your mailing list. Past advisories and other information related to computer security are available for anonymous FTP from cert.org (192.88.209.5). ------------------------------------------------------------------------------- The CIAC (Computer Incident Advisory Capability) of DoE CIAC has several self-subscribing mailing lists for electronic publications: 1. CIAC-BULLETIN for Advisories, highest priority - time critical information and Bulletins, important computer security information; 2. CIAC-NOTES for Notes, a collection of computer security articles; 3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI) software updates, new features, distribution and availability; 4. SPI-NOTES, for discussion of problems and solutions regarding the use of SPI products. To join, send e-mail to ciac-listproc@llnl.gov and, in the text of your message (not the subject line), write any of the following examples: subscribe ciac-bulletin LastName, FirstName PhoneNumber subscribe ciac-notes LastName, FirstName PhoneNumber subscribe spi-announce LastName, FirstName PhoneNumber subscribe spi-notes LastName, FirstName PhoneNumber e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212 You will receive an acknowledgment containing address, initial PIN, and information on how to change either of them, cancel your subscription, or get help. ------------------------------------------------------------------------------- HP, Hewlett Packard To join, send e-mail to support@support.mayfield.hp.com and, in the text of your message (not the subject line), write: subscribe security_info The latest digest of new HP Security Bulletins will be distributed directly to your mailbox on a routine basis. ------------------------------------------------------------------------------- Sun Security Alert To join, send e-mail to security-alert@sun.com and, in the subject of your message write: SUBSCRIBE CWS your-email-addr The message body should contain affiliation and contact information. ------------------------------------------------------------------------------- Copyright This paper is Copyright (c) 1995 by Christopher Klaus of Internet Security Systems, Inc. Permission is hereby granted to give away free copies electronically. You may distribute, transfer, or spread this paper electronically. You may not pretend that you wrote it. This copyright notice must be maintained in any copy made. If you wish to reprint the whole or any part of this paper in any other medium excluding electronic medium, please ask the author for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Address of Author Please send suggestions, updates, and comments to: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc. <iss@iss.net> Internet Security Systems, Inc. Internet Security Systems, Inc, located in Atlanta, Ga., specializes in the developement of security scanning software tools. Its flagship product, Internet Scanner, is software that learns an organization's network and probes every device on that network for security holes. It is the most comprehensive "attack simulator" available, checking for over 100 security vulnerabilities. -- Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431 Internet Security Systems, Inc. "Internet Scanner lets you find 2000 Miller Court West, Norcross, GA 30071 your network security holes Web: http://iss.net/ Email: cklaus@iss.net before the hackers do." ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.70 ************************************