From douglas Mon Mar 1 08:43:51 1999 From: douglas (Doug Schuler) Date: Mon, 1 Mar 1999 08:43:51 -0800 (PST) Subject: Diversity in High Tech: Organizing to Increase Access After I-200 Message-ID: <199903011643.IAA08407@scn.org> This is a follow up to Lorraine's message about SCN's earlier mission. About seven (eight?) years ago in the earliest days of SCN -- while it was still a CPSR/Seattle project and mostly just a gleam in peoples' eyes -- we developed a set of principles (appended below) which we hoped could serve as a continuing guide to SCN's development. Part of my interest in seeing that we developed this set of principles was that our mission would not get diluted or degraded over time and that we'd have something in writing that would continually serve as a reminder of the high goals that we set for ourselves. My fear was that we'd forget these principles as time went on. While I do see SCN and all of its volunteers as still at least implicitly abiding by these principles I thought it might be useful to send this out as a little reminder to all of us. I wonder if these principles are as well-known as they should be; and as part of that I wonder if there is a way that people can readily find the principles when they come in via the scn home page or if they are sent a copy when they join SCN. Athough technology and social circumstances are changing in many ways, I don't see that any of these principles are out of date nor do I foresee the day anytime soon when they are out of date. Thanks! -- Doug PS. The principles are also @ http://www.scn.org/ip/commnet/principles.html ------------------------------------------ Seattle Community Network Principles ------------------------------------------ The Seattle Community Network (SCN) is a free public-access computer network for exchanging and accessing information. Beyond that, however, it is a service conceived for community empowerment. Our principles are a series of commitments to help guide the ongoing development and management of the system for both the organizers and participating individuals and organizations. Commitment to Access - Access to the SCN will be free to all. We will provide access to all groups of people particularly those without ready access to information technology. We will provide access to people with diverse needs. This may include special-purpose interfaces. We will make the SCN accessible from public places. Commitment to Service - The SCN will offer reliable and responsive service. We will provide information that is timely and useful to the community. We will provide access to databases and other services. Commitment to Democracy - The SCN will promote participation in government and public dialogue. The community will be actively involved in the ongoing development of the SCN. We will place high value in freedom of speech and expression and in the free exchange of ideas. We will make every effort to ensure privacy of the system users. We will support democratic use of electronic technology. Commitment to the World Community - In addition to serving the local community, we will become part of the regional, national and international community. We will build a system that can serve as a model for other communities. Commitment to the Future - We will continue to evolve and improve the SCN. We will explore the use of innovative applications such as electronic town halls for community governance, or electronic encyclopedias for enhanced access to information. We will work with information providers and with groups involved in similar projects using other media. We will solicit feedback on the technology as it is used, and make it as accessible and humane as possible. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From be718 at scn.org Mon Mar 1 22:32:37 1999 From: be718 at scn.org (Rich Littleton) Date: Mon, 1 Mar 1999 22:32:37 -0800 (PST) Subject: Diversity in High Tech: Organizing to Increase Access After I-200 In-Reply-To: <199903011643.IAA08407@scn.org> Message-ID: Doug, This is a most valuable sending. Keep our feet to the fire. Any ideas about distributing these guidelines? Rich ______________________________________________________________________ ***** Unless stated otherwise, this message may be forwarded. ****** On Mon, 1 Mar 1999, Doug Schuler wrote: > This is a follow up to Lorraine's message about SCN's earlier mission. > > About seven (eight?) years ago in the earliest days of SCN -- while it was > still a CPSR/Seattle project and mostly just a gleam in peoples' > eyes -- we developed a set of principles (appended below) which we > hoped could serve as a continuing guide to SCN's development. > > Part of my interest in seeing that we developed this set of principles > was that our mission would not get diluted or degraded over time and > that we'd have something in writing that would continually serve as > a reminder of the high goals that we set for ourselves. My fear was > that we'd forget these principles as time went on. > > While I do see SCN and all of its volunteers as still at least implicitly > abiding by these principles I thought it might be useful to send this > out as a little reminder to all of us. I wonder if these principles > are as well-known as they should be; and as part of that I wonder if > there is a way that people can readily find the principles when they > come in via the scn home page or if they are sent a copy when they > join SCN. > > Athough technology and social circumstances are changing in many ways, > I don't see that any of these principles are out of date nor do I foresee > the day anytime soon when they are out of date. > > Thanks! > > -- Doug > > PS. The principles are also @ http://www.scn.org/ip/commnet/principles.html > > > ------------------------------------------ > Seattle Community Network > > Principles > ------------------------------------------ > > The Seattle Community Network (SCN) is a free public-access computer > network for exchanging and accessing information. Beyond that, > however, it is a service conceived for community empowerment. Our > principles are a series of commitments to help guide the ongoing > development and management of the system for both the organizers and > participating individuals and organizations. > > Commitment to Access - > > Access to the SCN will be free to all. > > We will provide access to all groups of people particularly > those without ready access to information technology. > We will provide access to people with diverse needs. > This may include special-purpose interfaces. > We will make the SCN accessible from public places. > > Commitment to Service - > > The SCN will offer reliable and responsive service. > > We will provide information that is timely and useful > to the community. > We will provide access to databases and other services. > > Commitment to Democracy - > > The SCN will promote participation in government and public dialogue. > > The community will be actively involved in the ongoing development > of the SCN. > We will place high value in freedom of speech and expression and in > the free exchange of ideas. > We will make every effort to ensure privacy of the system users. > We will support democratic use of electronic technology. > > Commitment to the World Community - > > In addition to serving the local community, we will become > part of the regional, national and international community. > > We will build a system that can serve as a model for other > communities. > > Commitment to the Future - > > We will continue to evolve and improve the SCN. > > We will explore the use of innovative applications such as electronic > town halls for community governance, or electronic encyclopedias > for enhanced access to information. > We will work with information providers and with groups involved in > similar projects using other media. > We will solicit feedback on the technology as it is used, and > make it as accessible and humane as possible. > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From aki at halcyon.com Tue Mar 2 08:57:16 1999 From: aki at halcyon.com (Aki Namioka) Date: Tue, 2 Mar 1999 08:57:16 -0800 (PST) Subject: Internet access plea (fwd) Message-ID: Any suggestions for this person from Malta? Thanks, Aki Helen Namioka aki at cpsr.org ---------- Forwarded message ---------- Date: Tue, 2 Mar 1999 04:48:08 -0600 From: dario azzopardi To: cpsr-activists at cpsr.org Cc: Massimo Mauro Subject: Internet access plea This message just came to the webmaster....Marsha My name is Dario and I live in MALTA, The internet in our country has been introduced around 4 years ago and from day to day all the internet service providers are increasing there fees and local phone calls are quite expensive and the internet it is very slow too, I and some friends we have in mind to born a pressure group or an organization or an union to get some rights for the internet users and our mission will be to open a club, and to educate people about what it is internet Out there for sure we can find somebody that can give us a hand or some ideas, of running an internet society, or association or union and if you know by any links of a support groups for internet users please let us now.WE WILL BE WAITING FOR A REPLY. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 2 10:18:59 1999 From: douglas (Doug Schuler) Date: Tue, 2 Mar 1999 10:18:59 -0800 (PST) Subject: Diversity in High Tech: Organizing to Increase Access After I-200 Message-ID: <199903021818.KAA05605@scn.org> Thanks, Rich, for the feedback on the principles. I do think they can serve as an important reminder of what we're trying to accomplish. I think that they can help us keep our focus when technology, etc. seems to be changing rapidly -- I don't foresee a time in the near future when the principles would be obsolete. My thoughts on distributing them? I'd like to see them fairly easily accessible from our home page. I'd like to see new SCNA members get a copy. I'd like to see board member candidates asked what ideas they had to advance SCNA's mission given our principles. We could use them in our literature and we could mentiont them in presentations. They could be on our printed newsletters also -- perhaps in the compact form - SCN has a commitment to ... -- doug > Date: Mon, 1 Mar 1999 22:32:37 -0800 (PST) > From: Rich Littleton > To: Doug Schuler > cc: Rod Clark , femme2 at scn.org, > local-computer-activists at scn.org, scn at scn.org, > Steve and Melissa Guest , scna-board at scn.org > Subject: Re: Diversity in High Tech: Organizing to Increase Access After I-200 > > > Doug, > > This is a most valuable sending. Keep our feet to the fire. Any ideas > about distributing these guidelines? > > Rich > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From ANamioka at activevoice.com Tue Mar 2 13:54:24 1999 From: ANamioka at activevoice.com (Aki Namioka) Date: Tue, 2 Mar 1999 13:54:24 -0800 Subject: FW: Job Announcement - Development Manager - MyAgent Group Message-ID: <61B452CEA1F9D11195A600A024C65C69D7DE83@exchange2.avoice.com> Please reply to the address in the message below > Job Announcement > Development Manager - MyAgent Group > > Bonus for this position is $800! > > Active Voice, a rapidly growing and dynamic telecommunications software > company, is seeking a Software Development Manager who thrives in a fast > paced, entrepreneurial high tech environment. This is a high profile > position, focused on managing product development objectives and business > development for a completely new product line. > > Responsibilities: > * Drive all software development responsibilities, including product > vision, validation, schedule and full development process. > * Manage all aspects of product development, from design, coding and > implementation through product release. > * Work with Product Manager to develop business strategy focused on > short-term and long-term objectives for new product line. > * Hire new engineers, per the budget plan, perform salary and > performance reviews, handle personnel issues, and identify appropriate > training on an individual basis. > > Requirements: > * B.S.C.S. / B.S.E.E. / B.S.C.E. or equivalent > * At least 5 years experience in software development, with proven UI > design experience > * Demonstrated software business development experience > * Technical familiarity with software development in C/C++ in a > windows environment; strong technical aptitude and decision-making ability > * Demonstrated proficiency with all aspects of the software > development process > * Demonstrated people management skills, effective time management > skills, and a strong desire to develop complete, product-oriented > solutions > * Strong communication and presentation skills > * Experience developing Client/Server applications with focus on > TCP/IP > > Active Voice produces high quality PC-based telephony systems for > peripheral, integrated, and client/server environments. We offer > competitive salary and benefits, and a stimulating and dynamic work place > with opportunities for challenge and personal growth. > > To apply, please send a letter and resume to: Active Voice, , 2901 Third > Avenue, Seattle, WA 98121, Attn: DM-200. Active Voice is an Equal > Opportunity Employer. > > e-mail: personnel at activevoice.com > www.activevoice.com > > Position Reports to: President & COO > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bb140 at scn.org Tue Mar 2 20:35:52 1999 From: bb140 at scn.org (Barb Weismann) Date: Tue, 2 Mar 1999 20:35:52 -0800 (PST) Subject: Internet access plea (fwd) In-Reply-To: Message-ID: Re: Malta plea: When "we" find someone with some answers to his question, would you please post a cc of correspondence to scn at scn.org? I want this info. I want to serve others this way. I don't think it's good enough for us to work for free access only locally. Barb Weismann * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From femme2 at scn.org Tue Mar 2 21:02:19 1999 From: femme2 at scn.org (Lorraine Pozzi) Date: Tue, 2 Mar 1999 21:02:19 -0800 (PST) Subject: Internet access plea (fwd) In-Reply-To: Message-ID: On Tue, 2 Mar 1999, Barb Weismann wrote: > Re: Malta plea: > When "we" find someone with some answers to his question, would you please > post a cc of correspondence to scn at scn.org? I want this info. I want to > serve others this way. I don't think it's good enough for us to work for > free access only locally. There's a lot of debate on a list I've subscribed to on "global knowledge" -- I'll try to find some of the digest versions and forward them to anyone who is interested. Lots of questions and possible solutions for folks in Africa, South America, India... and I used to know an engineer who did a lot of work with remote villages in the Alaskan bush. But I would hope that the focus at SCN be on access for the underserved in our own community. Lorraine femme2 at scn.org > > Barb Weismann > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Tue Mar 2 22:49:24 1999 From: steve at advocate.net (Steve) Date: Tue, 2 Mar 1999 22:49:24 -0800 Subject: Privacy Message-ID: <199903030651.WAA17361@scn.org> x-no-archive: yes A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy John Markoff NY Times 3/3/99 SAN FRANCISCO -- The Intel Corporation recently blinked in a confrontation with privacy advocates protesting the company's plans to ship its newest generation of microprocessors with an embedded serial number that could be used to identify a computer -- and by extension, its user. But those on each side of the dispute acknowledge that it was only an initial skirmish in a wider struggle. From computers to cellular phones to digital video players, everyday devices and software programs increasingly embed telltale identifying numbers that let them interact. Whether such digital fingerprints constitute an imminent privacy threat or are simply part of the foundation of advanced computer systems and networks is the subject of a growing debate between the computer industry and privacy groups. At its heart is a fundamental disagreement over the role of electronic anonymity in a democratic society. Privacy groups argue fiercely that the merger of computers and the Internet has brought the specter of a new surveillance society in which it will be difficult to find any device that cannot be traced to the user when it is used. But a growing alliance of computer industry executives, engineers, law enforcement officials and scholars contend that absolute anonymity is not only increasingly difficult to obtain technically, but is also a potential threat to democratic order because of the possibility of electronic crime and terrorism. "You already have zero privacy -- get over it," Scott McNealy, chairman and chief executive of Sun Microsystems, said at a recent news conference held to introduce the company's newest software, known as Jini, intended to interconnect virtually all types of electronic devices from computers to cameras. Privacy advocates contend that software like Jini, which assigns an identification number to each device each time it connects to a network, could be misused as networks envelop almost everyone in society in a dense web of devices that see, hear, and monitor behavior and location. "Once information becomes available for one purpose there is always pressure from other organizations to use it for their purposes," said Lauren Weinstein, editor of Privacy Forum, an online journal. This week, a programmer in Massachusetts found that identifying numbers can easily be found in word processing and spreadsheet files created with Microsoft's popular Word and Excel programs and in the Windows 95 and 98 operating systems. Moreover, unlike the Intel serial number, which the computer user can conceal, the numbers used by the Microsoft programs -- found in millions of personal computers -- cannot be controlled by the user. The programmer, Richard M. Smith, president of Phar Lap Software, a developer of computer programming tools in Cambridge, Mass., noticed that the Windows operating system contains a unique registration number stored on each personal computer in a small data base known as the Windows registry. His curiosity aroused, Smith investigated further and found that the number that uniquely identifies his computer to the network used in most office computing systems, known as the Ethernet, was routinely copied to each Microsoft Word or Excel document he created. The number is used to create a longer number, known as a globally unique identifier. It is there, he said, to enable computer users to create sophisticated documents comprising word processing, spreadsheet, presentation and data base information. Each of those components in a document needs a separate identity, and computer designers have found the Ethernet number a convenient and widely available identifier, he said. But such universal identifiers are of particular concern to privacy advocates because they could be used to compile information on individuals from many data bases. "The infrastructure relies a lot on serial numbers," Smith said. "We've let the genie out of the bottle." Jeff Ressler, a Microsoft product manager, said that if a computer did not have an Ethernet adaptor then another identifying number was generated that was likely to be unique. "We need a big number which is a unique identifier," he said. "If we didn't have, it would be impossible to make our software programs work together across networks." Indeed, an increasing range of technologies have provisions for identifying their users for either technical reasons (such as connecting to a network) or commercial ones (such as determining which ads to show to Web surfers). But engineers and network designers argue that identity information is a vital aspect of modern security design because it is necessary to authenticate an individual in a network, thereby preventing fraud or intrusion. Last month at the introduction of Intel's powerful Pentium III chip, Intel executives showed more than a dozen data security uses for the serial number contained electronically in each of the chips, ranging from limiting access to protecting documents or software against piracy. Intel, the largest chip maker, had recently backed down somewhat after it was challenged by privacy advocates over the identity feature, agreeing that at least some processors for the consumer market would be made in a way that requires the user to activate the feature. Far from scaling back its vision, however, Intel said it was planning an even wider range of features in its chips to help companies protect copyrighted materials. It also pointed to software applications that would use the embedded number to identify participants in electronic chat rooms on the Internet and thereby, for example, protect children from Internet stalkers. But in achieving those goals, it would also create a universal identifier, which could be used by software applications to track computer users wherever they surfed on the World Wide Web. And that, despite the chip maker's assertions that it is working to enhance security and privacy, has led some privacy advocates to taunt Intel and accuse it of a "Big Brother Inside" strategy. They contend that by uniquely identifying each computer it will make it possible for marketers or Government and law enforcement officials to track the activities of anyone connected to a computer network more closely. They also say that such a permanent identifier could be used in a similar fashion to the data, known as "cookies," that are placed on a computer's hard drive by Web sites to track the comings and goings of Internet users. Putting Privacy on the Defensive Intel's decision to forge ahead with identity features in its chip technology may signal a turning point in the battle over privacy in the electronic age. Until now, privacy concerns have generally put industry executives on the defensive. Now questions are being raised about whether there should be limits to privacy in an Internet era. "Judge Brandeis's definition of privacy was 'the right to be left alone,' not the right to operate in absolute secrecy," said Paul Saffo, a researcher at the Institute for the Future in Menlo Park, Calif. Some Silicon Valley engineers and executives say that the Intel critics are being naïve and have failed to understand that all devices connected to computer networks require identification features simply to function correctly. Moreover, they note that identifying numbers have for more than two decades been a requirement for any computer connected to an Ethernet network. (Although still found most widely in office settings, Ethernet connections are increasingly being used for high-speed Internet service in the home via digital telephone lines and cable modems.) All of Apple Computer's popular iMac machines come with an Ethernet connection that has a unique permanent number installed in the factory. The number is used to identify the computer to the local network. While the Ethernet number is not broadcast over the Internet at large, it could easily be discovered by a software application like a Web browser and transmitted to a remote Web site tracking the identities of its users, a number of computer engineers said. Moreover, they say that other kinds of networks require identity numbers to protect against fraud. Each cellular telephone currently has two numbers: the telephone number, which can easily be changed, and an electronic serial number, which is permanently put in place at the factory to protect against theft or fraud. The serial number is accessible to the cellular telephone network, and as cellular telephones add Internet browsing and E-mail capabilities, it will potentially have the same identity capability as the Intel processor serial number. Other examples include DIVX DVD disks, which come with a serial number that permits tracking the use of each movie by a centralized network-recording system managed by the companies that sell the disks. Fearing the Misuse of All Those Numbers Industry executives say that as the line between communications and computing becomes increasingly blurred, every electronic device will require some kind of identification to attach to the network. Making those numbers available to networks that need to pass information or to find a mobile user while at the same time denying the information to those who wish to gather information into vast data bases may be an impossible task. Privacy advocates argue that even if isolated numbers look harmless, they are actually harbingers of a trend toward ever more invasive surveillance networks. "Whatever we can do to actually minimize the collection of personal data is good," said Marc Rotenberg, director of the Electronic Privacy Information Center, one of three groups trying to organize a boycott of Intel's chips. The groups are concerned that the Government will require ever more invasive hardware modifications to keep track of individuals. Already they point to the 1994 Communications Assistance for Law Enforcement Act, which requires that telephone companies modify their network switches to make it easier for Government wiretappers. Also, the Federal Communications Commission is developing regulations that will require every cellular telephone to be able to report its precise location for "911" emergency calls. Privacy groups are worried that this feature will be used as a tracking technology by law enforcement officials. "The ultimate danger is that the Government will mandate that each chip have special logic added" to track identities in cyberspace, said Vernor Vinge, a computer scientist at San Diego State University. "We're on a slide in that direction." Vinge is the author of "True Names" (Tor Books, 1984), a widely cited science fiction novel in the early 1980's, that forecast a world in which anonymity in computer networks is illegal. Intel executives insist that their chip is being misconstrued by privacy groups. "We're going to start building security architecture into our chips, and this is the first step," said Pat Gelsinger, Intel vice president and general manager of desktop products. "The discouraging part of this is our objective is to accomplish privacy." That quandary -- that it is almost impossible to compartmentalize information for one purpose so that it cannot be misused -- lies at the heart of the argument. Moreover, providing security while at the same time offering anonymity has long been a technical and a political challenge. "We need to find ways to distinguish between security and identity," said James X. Dempsey, a privacy expert at the Center for Democracy and Technology, a Washington lobbying organization. So far the prospects are not encouraging. One technical solution developed by a cryptographer, David Chaum, made it possible for individuals to make electronic cash payments anonymously in a network. In the system Chaum designed, a user employs a different number with each organization, thereby insuring that there is no universal tracking capability. But while Chaum's solution has been widely considered ingenious, it has failed in the marketplace. Last year, his company, Digicash Inc., based in Palo Alto, Calif., filed for bankruptcy protection. "Privacy never seems to sell," said Bruce Schneier, a cryptographer and a computer industry consultant. "Those who are interested in privacy don't want to pay for it." Copyright 1999 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From be718 at scn.org Wed Mar 3 00:01:20 1999 From: be718 at scn.org (Rich Littleton) Date: Wed, 3 Mar 1999 00:01:20 -0800 (PST) Subject: Internet access plea (fwd) In-Reply-To: Message-ID: Good points, all, Lorraine. After we get our ship sailing well (with a goodly crew of well coordinated volunteers), we then might like to do an international template/outline. But for now, we have to serve the users we have and are getting. (This includes getting new applicants signed on. Our performance has dropped to 6 week turn around recently. I assume all reading this know that Lorraine single handedly had the account delivery performance for new applicants to 4 days. However, this new process is still being adjusted, so it is due to improve. Later, Rich ______________________________________________________________________ ***** Unless stated otherwise, this message may be forwarded. ****** On Tue, 2 Mar 1999, Lorraine Pozzi wrote: > On Tue, 2 Mar 1999, Barb Weismann wrote: > > > Re: Malta plea: > > When "we" find someone with some answers to his question, would you please > > post a cc of correspondence to scn at scn.org? I want this info. I want to > > serve others this way. I don't think it's good enough for us to work for > > free access only locally. > > There's a lot of debate on a list I've subscribed to on "global > knowledge" -- I'll try to find some of the digest versions and > forward them to anyone who is interested. Lots of questions > and possible solutions for folks in Africa, South America, > India... and I used to know an engineer who did a lot of > work with remote villages in the Alaskan bush. > > But I would hope that the focus at SCN be on access for the > underserved in our own community. > > Lorraine > femme2 at scn.org > > > > Barb Weismann > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > > . To unsubscribe from this list, send a message to: > > majordomo at scn.org In the body of the message, type: > > unsubscribe scn > > ==== Messages posted on this list are also available on the web at: ==== > > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Wed Mar 3 16:22:41 1999 From: douglas (Doug Schuler) Date: Wed, 3 Mar 1999 16:22:41 -0800 (PST) Subject: CPSR/Seattle lecture series -- Evelyn Messinger POSTPONED! Message-ID: <199903040022.QAA08851@scn.org> The domino effect in action... Because of the high winds, a tree in west Olympia toppled. This tree happened to land on an electrical substation causing the Evergreen State College to be without electricity. Therefore school was cancelled. Since Evelyn Messinger was going to speak there tonight we made a quick call to Evelyn, intercepting her at the Oakland airport, and suggesting that she come *next* week. We are currently planning to have Evelyn speak just one week later, March 11th, but I can't tell you exactly where at this time because the room hasn't been booked yet. I wanted to let everybody know that the event has been POSTPONED due to crummy weather. If you know anybody who was planning to come to the event on March 3rd, please let them know that it has been cancelled. Evelyn is still very excited about coming so we hope to see everbody *next* week, March 11. Thanks! -- Doug * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Thu Mar 4 23:04:26 1999 From: steve at advocate.net (Steve) Date: Thu, 4 Mar 1999 23:04:26 -0800 Subject: Code = speech Message-ID: <199903050706.XAA11123@scn.org> x-no-archive: yes Professor Argues for Free Speech in Computer Tongues Pamela Mendels NY Times 3/5/99 The instructions written by computer programmers are a form of expression as fully entitled to free-speech protection as a published article or the notes in a musical score. That was one of the chief arguments made this week as a Cleveland law school professor sought to have a federal appeals court overturn a decision upholding a law that prevents him from publishing encryption-related course materials online. The case brought by Peter D. Junger, who teaches a course in computers and the law at Case Western Reserve University in Cleveland, is one of a trio of closely watched lawsuits challenging U.S. export restrictions on strong encryption software, which scrambles data to keep it private. The restrictions apply to the software's source code, the series of commands written by the programmer that is converted or "compiled" into the machine-level code that the computer can run. Federal officials argue that the export regulations are necessary for national security, to prevent terrorists and criminals from hiding their communications. Junger, as part of his course, requires students to use a short encryption program he has written to help teach them about computing. He would like to put the source code for the program on his Web site, but believes that encryption regulations prevent this without a license from the U.S. Department of Commerce. This requirement, Junger says, is an unwarranted intrusion into his Constitutional free speech rights. In ruling against Junger last year, Judge James S. Gwin of the United States District Court for the Northern District of Ohio, said that source code was not so much speech as a function functional device, like telephone circuitry, and, therefore, outside the scope of First Amendment protection. But Junger's lawyers, in a 66-page brief filed Monday in the United States Court of Appeals for the Sixth Circuit in Cincinnati, argue that source code, which looks to an untrained eye like a combination of mathematical formulas, scattered words and punctuation marks, is really a form of expression. For one thing, they say, source code must be converted into another form, object code, before the computer can execute the instructions. Moreover, they argue, source code allows computer scientists and others to communicate precisely with each other about the details of their work. "Source code is a uniquely tailored language that speaks with tremendous precision to methodological discussion," said Raymond Vasvari, legal director of the American Civil Liberties Union of Ohio Foundation, which is representing Junger. In his decision, Judge Gwin noted that source code is generally unintelligible to anyone outside of the programming world. But Junger's lawyers say in their brief that this is irrelevant. "If there were a First Amendment requirement that is met only if the majority of people understand the speaker's message, then a speech in Navajo, the musical score of Beethoven's Ninth Symphony and the proof of Fermat's Last Theorem, all of which are understood by relatively few people, would fall beyond the protection of the First Amendment," they wrote. Lawyers for the U.S. Department of Justice have not yet reviewed the brief and therefore declined comment. Their response is expected by the end of this month, and Vasvari said there could be hearings on the matter this fall. Not everyone buys the Junger team's reasoning. Stewart A. Baker, a Washington-based lawyer and former general counsel at the National Security Agency, said that although he finds the Junger argument "plausible," he believes the government has a good response. Source code exists largely to allow for communication between people and computers, but the First Amendment exists to protect communication among people, he said. "I think in the end, the First Amendment argument is not a winner," Baker said. "I think the government is right, that source code is probably better understood as a thing that changes machine behavior." Whatever the outcome of Junger's appeal, the issues raised by the case are unlikely to be settled in the Cincinnati courtroom. A similar case, pending in federal district court in Washington, was brought by an engineer, Philip R. Karn, Jr., who objected to the requirement that he have a license to export encryption source code on a floppy disk, even though a book containing the same code faced no such restrictions. A second case, more like Junger's, was brought after Daniel J. Bernstein, now a mathematics professor, wanted to post a copy of an encryption program he had written to an Internet discussion group. Unlike Junger, Bernstein won a favorable decision in United States District Court in San Francisco. The government appealed, and both sides are now awaiting a decision from the Court of Appeals for the Ninth Circuit. Many expect the questions raised by the cases will eventually land before the Supreme Court. Copyright 1999 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Fri Mar 5 16:51:01 1999 From: douglas (Doug Schuler) Date: Fri, 5 Mar 1999 16:51:01 -0800 (PST) Subject: CPSR/Seattle Presentation - RESCHEDULED - please distribute Message-ID: <199903060051.QAA11705@scn.org> Eveyln Messinger's original presentation was postponed because of the heavy winds and rain. We APOLOGIZE for any inconvenience. We pleased to announce, exactly one week later that Evelyn will still be able to give her presentation. Please distribute this announcement to anybody who might be interested in this event. Thanks! PLEASE NOTE REVISED DATE! March 11, 1999 ----------------------------------------- ******************************* Please distribute to appropriate friends, collegues, and distribution lists. ******************************* First in the "Shaping Technology" series of free public presentations on the social implications of technology Is TV a One-Way Street? ----------------------- New Directions in Citizen to Citizen Interactive Television On March 4th, from 7-9 pm, at the University Friends Center, in Seattle's University District, the Seattle chapter of Computer Professionals for Social Responsibility (CPSR/Seattle) will launch its 1999 "Shaping Technology" series of free public presentations. Evelyn Messinger, President and Director of InterAct, San Rafael, CA, will show how truly interactive television is mobilizing democracy and authentic global citizenship. By using new media as a creative tool, InterAct has been exploring what the mainstream media has been ignoring: powerful possibilities for interactive television. % Does broadcast television discourage political engagement? % Can TV and Internet technology, broadcast and cable, help dissolve barriers between people and create opportunities for interactive dialogue in the digital age? % What can people do to help democratize the media? For more than a decade, Evelyn Messinger has worked as a documentary producer/editor for PBS, CBS News, the BBC, and French television. She served as the first Electronic Media Director for the Soros Foundation, and is a co-founder of Internews . Her work in the emerging democracies of Eastern Europe, and with independent media in Bosnia, Palestine, Israel, Russia and the former Soviet Union, has promoted tolerance and understanding across political and opposing cultural borders. To learn more about her pioneering work, and InterAct's future projects including, Community Renewal Dialogues, 2wayTV National Proposal, and Minnesota Interactive, join us for Evelyn MessingerUs first appearance in the Seattle area. Computer Professionals for Social Responsibility (CPSR) is a public interest organization based in Palo Alto, California. CPSR's members are computer professionals and other people who are concerned about the public role in the uses and abuses of computer technology in society. This presentation is first in CPSR/Seattle's "Shaping Technology" series of free public presentations on the social implications of technology. For more information about this event contact Doug Schuler, , 206.634.0752. For more information about CPSR/Seattle and this lecture series contact Karyn Quinlan, . This event is co-sponsored by the UW Department of Technical Communication. The University Friends Center is located at the corner of 40th NE and NE 9th in the University District just west of the University Bridge. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 9 08:28:47 1999 From: douglas (Doug Schuler) Date: Tue, 9 Mar 1999 08:28:47 -0800 (PST) Subject: time to write a lettter?! Message-ID: <199903091628.IAA05811@scn.org> This is from Amy Borgstrom via Laura Breeden. A chance to fund some community sites! Date: Tue, 9 Mar 1999 10:05:18 -0500 From: Amy Borgstrom To: "'Laura Breeden'" Cc: "'afcn-members at lists.colorado.edu'" , "'ctcmembers at ctcnet.org'" Subject: RE: $65 million in federal budget for community tech centers Thanks for the heads up Laura! I hope lots of people write that letter and make that call. Just a hint--I've heard that *handwritten* notes actually have more impact with congressional types than word processed, or especially e-mail. So you might want to go with that approach... Amy Borgstrom Appalachian Center for Economic Networks 94 Columbus Road Athens, Ohio 45701 (740) 592-3854 voice (740) 593-5451 fax amyb at seorf.ohiou.edu http://www.seorf.ohiou.edu/~xx001 JOIN the ASSOCIATION FOR COMMUNITY NETWORKING TODAY! http://www.afcn.net -----Original Message----- From: Laura Breeden [SMTP:lbreeden at earthlink.net] Sent: Monday, March 08, 1999 5:50 PM To: peterm at ctcnet.org Cc: bkfulton at nul.org; amyb at seorf.ohiou.edu; tonistone at igc.apc.org; gcrick at main.org; avaldez at aol.com; bartd at pluggedin.org; dvial at pacbell.net; occur at citycom.com Subject: Re: $65 million in federal budget for community tech centers Hi. I've confirmed that on Wednesday morning, March 10, there will be a subcommittee hearing on the Adult and Vocational Ed programs of the US Department of Education. The funding for community tech centers is included in that budget. Rep. Maxine Waters of LA was the original sponsor of the $10 M that is in the current budget. The Adminstration has requested $65 M for FY2000. Action steps to take now include writing a letter to any of these Congresspersons from your state, and following up with a phone call to their office. Ask to speak to the staff person in charge of appropriations, and let that person know how community technology centers are already making things better in your state. Mention that a small federal investment can leverage many local resources. In the Senate they are not having hearings at the subcommittee level. If the full Senate approps committee takes this up, I'll let you know. If you can brief me on any reactions you get, I'd appreciate it. thanks, Laura Laura Breeden & Associates, Inc. 215 Waverley Street, #4 Menlo Park, CA 94025 phone 650.853.3040 fax 650.853.3047 email lbreeden at earthlink.net * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Tue Mar 9 08:42:39 1999 From: steve at advocate.net (Steve) Date: Tue, 9 Mar 1999 08:42:39 -0800 Subject: LT Message-ID: <199903091644.IAA12202@scn.org> x-no-archive: yes Linus on Linux: Inventor Torvalds discusses the OS phenomenon PC Week 3/5/99 Linux 2.2 has arrived and it's a "big stone off my back," says creator Linus Torvalds. For IT, the open-source operating system in the last year has moved from a curiosity to a serious technology to evaluate for deployment -- a fact that pleases its inventor. Torvalds now works on a "top secret" project at a company called Transmeta Corp. in Santa Clara, Calif. Clever cloak-and-dagger marketing has everyone interested in Transmeta, which is partially funded by Paul Allen. Transmeta's windows are blacked out, its Web site contains one sentence ("This Web page is not here yet"), and speculation is rampant about just what Torvalds is up to. Most of the talk focuses on next-generation hardware and software, likely multiprocessor-based, that could take on the dominant Windows and Unix platforms. Torvalds wouldn't comment about that, but he did take time out to speak with PC Week Senior Writer Scott Berinato about the Linux phenomenon shortly after Linux 2.2 shipped. PC Week: Can you rest now that Linux 2.2 is out the door? Torvalds: Well, everyone is aware there will be minor bugs. When you make a new stable release, there are more testers and more situations come up that you couldn't have planned for. So we'll spend some time dealing with this, but yeah, sure it's a big stone, a big weight off my back. PC Week: Are you pleased with the way Linux has emerged in the past year? Torvalds: I've always been pleased with the development. Obviously the last year has been very pleasing in the sense that places that didn't use Linux for political, internal reasons now are using it. That's nice because when you're a technical guy like me, you hate to have non-technical issues in your way. In many places a year ago, they wouldn't have considered Linux. And now they are looking at it in a different light, and that's all quite independent of the technical enhancements. PC Week: Are the commercial vendors like Red Hat Software Inc. and Caldera Systems Inc. good for Linux's growth? Torvalds: The commercial vendors are good, yes. They all use the standard kernel, so technically there's not much to worry about. And they tend to position the systems around Linux differently to target different markets. I couldn't do that even if I wanted to, and I don't want to. PC Week: Give us the short history of Linux's development. Torvalds: Basically, I invented it eight years ago, almost exactly eight years ago. It started small, not even an operating system. It was just a personal project. I just was doing something fun with my new machine. It kind of evolved through luck and happenstance into an OS, simply because there was very much a void where there wasn't much choice for someone like me. I couldn't afford some of the commercial OSes and I didn't want to run DOS or Windows -- I don't even know, did Windows really exist then? About seven years ago I made the first very, very raw version of Linux available and some people wanted to look at it and play with it. PC Week: All OSes will co-exist, but much has been made of the "Linux threat" to Microsoft Corp. Are you comfortable with that? Torvalds: I'm comfortable with the "Microsoft killer" idea. It's kind of fun to see how people position it, because that wasn't the reason and still isn't the reason I developed Linux. I think Microsoft has been doing a really bad job on their OS, and obviously it's an interesting dynamic to people. PC Week: How have they done a bad job with Windows? Torvalds: Well, they've handled it well from a marketing standpoint. But from a technical standpoint, they have not done so well. Still, they are extremely successful. I just think there are a lot of people who want an alternative. PC Week: You could have copyrighted Linux and made a fortune. Why did you make it an open source code operating system, and will that model work in the future as Linux acceptance grows? Torvalds: It started out as a personal belief that, yes, open source was needed. Then, when it got large enough, I encouraged people to license their own development, their own parts. Now there are multiple owners sharing all these licenses. I did it partly because I didn't want to have the paperwork to deal with that. In another way, I tied everybody's hands behind their backs. Nobody can fundamentally change it now because they'd have to coordinate everybody who owns these pieces. That makes people trust Linux more. Take Red Hat. They're not afraid of my competing with them, because they know I can't, but I wouldn't want to. The whole open-source model has worked out extremely well. It would be stupid to try and change it. PC Week: What's next in Linux development? Torvalds: Right now we have a lot of developers with four-processor machines, some eight. With those, Linux already works fine, but if you want to scale to a larger number, to tens or even hundreds of processors, which has been discussed, there will be a need to change things there. There's a lot of stuff that people always want. Linux 2.0 to Linux 2.2 should not be a big deal. The 2.2 kernel is faster, especially on machines with more memory. It's more aggressive with caching, but frankly I don't think you should have to upgrade every year. If people are happy with 2.2, there's not that much reason to look too far forward. PC Week: Which is more important or more of a challenge to you: having Linux accepted on the desktop or the server? Torvalds: Desktop acceptance will be harder and more interesting. Server acceptance is not as big a challenge. Both are important, but I think you've seen server issues are often easier to look at and to address quickly. PC Week: With Linux 2.2 out, what are your next goals? Torvalds: My main goal has always been to be in the position that I'm not ashamed of what I've done or am doing, and that I'm doing the best I can. Copyright (c) 1999 ZDNet. All rights reserved. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From ljbeedle at scn.org Tue Mar 9 09:21:03 1999 From: ljbeedle at scn.org (Lois Beedle) Date: Tue, 9 Mar 1999 09:21:03 -0800 (PST) Subject: time to write a lettter?! In-Reply-To: <199903091628.IAA05811@scn.org> Message-ID: I have heard that email has an impact unless it is an blatent form letter type. But certainly handwritten counts high. Lois * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 9 09:52:28 1999 From: douglas (Doug Schuler) Date: Tue, 9 Mar 1999 09:52:28 -0800 (PST) Subject: Last reminder! Message-ID: <199903091752.JAA04130@scn.org> ----------------------------------------- last reminder >>>>>>>>>>>>>>>>>>>>>>>>>>>>> ----------------------------------------- ******************************* Please distribute to appropriate friends, collegues, and distribution lists. ******************************* First in the "Shaping Technology" series of free public presentations on the social implications of technology. Presented by Computer Professionals for Social Responsibility / Seattle. Is TV a One-Way Street? ---------------------------------------------> New Directions in Citizen to Citizen Interactive Television A presenation by Evelyn Messinger President and Director of InterAct When: On March 4th, from 7-9 pm Where: at the University Friends Center, in Seattle's University District The University Friends Center is located at the corner of 40th NE and NE 9th in the University District just west of the University Bridge. For more than a decade, Evelyn Messinger has worked as a documentary producer/editor for PBS, CBS News, the BBC, and French television. She served as the first Electronic Media Director for the Soros Foundation, and is a co-founder of Internews . Her work in the emerging democracies of Eastern Europe, and with independent media in Bosnia, Palestine, Israel, Russia and the former Soviet Union, has promoted tolerance and understanding across political and opposing cultural borders. To learn more about her pioneering work, and InterAct's future projects including, Community Renewal Dialogues, 2wayTV National Proposal, and Minnesota Interactive, join us for Evelyn Messinger's first appearance in the Seattle area. Computer Professionals for Social Responsibility (CPSR) is a public interest organization based in Palo Alto, California. CPSR's members are computer professionals and other people who are concerned about the public role in the uses and abuses of computer technology in society. This presentation is first in CPSR/Seattle's "Shaping Technology" series of free public presentations on the social implications of technology. For more information about this event contact Doug Schuler, , 206.634.0752. For more information about CPSR/Seattle and this lecture series contact Karyn Quinlan, . This event is co-sponsored by the UW Department of Technical Communication. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From kurt at grogatch.seaslug.org Tue Mar 9 11:11:43 1999 From: kurt at grogatch.seaslug.org (Kurt Cockrum) Date: Tue, 9 Mar 1999 11:11:43 -0800 Subject: Last reminder! Message-ID: <199903091911.LAA27142@grogatch.seaslug.org> In-Reply-To: <199903091752.JAA04130 at scn.org> Doug said: >[...] > A presenation by Evelyn Messinger > President and Director of InterAct > >When: On March 4th, from 7-9 pm >[...] You mean Mar 11, don't you? --kurt * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From kurt at grogatch.seaslug.org Tue Mar 9 10:58:23 1999 From: kurt at grogatch.seaslug.org (Kurt Cockrum) Date: Tue, 9 Mar 1999 10:58:23 -0800 Subject: time to write a lettter?! Message-ID: <199903091858.KAA27064@grogatch.seaslug.org> In-Reply-To: <199903091628.IAA05811 at scn.org> Amy Borgstrom said (via Doug Schuler): >Thanks for the heads up Laura! I hope lots of people write that letter and >make that call. Just a hint--I've heard that *handwritten* notes actually >have more impact with congressional types than word processed, or >especially e-mail. So you might want to go with that approach... I've heard pencil works real well, because it adds a genuine-seeming folksy touch, fooling the recipient into thinking we are like the rest of the proles they presumably get letters from. But don't use #3 or #4, use #1 or 2. \ e-mail | by hand, typewriter +------------------------------- Yesterday | IN | OUT -------------+------------------------------- Today | OUT | IN Sigh. What's wrong with this picture? Why can't the stupid congresscritters just *read* the damn letters without all these silly arms-race-style games? We were all sold on how wonderful e-mail was as a communication medium. Hell, we helped sell it! What the bleeping good is e-mail if you can't use it to communicate important ideas to the major players?? For crying out loud, that's what it's FOR!!! It's a really sad state of affairs when we have to dumb ourselves down temporarily (?) to have a word with the people we presumably helped to elect, just because this apparently is part of the millenial zeitgeist. Next you'll be telling us not to use big words. >Re: $65 million in federal budget for community tech centers Hand-written letters advocating community tech centers?? What kind of wierd retro-juxtaposition is this? The mind boggles. Are these the places where people are going to learn how to get in touch with their congresspeople? Some kind of place where literacy, either real or computer-mediated, is taught? Why not cut right to the chase and just start up community hand-writing centers? That would put that $65M to pretty appropriate use, it seems to me. Recapture the romance of the Palmer Method! [ chortle; in background, clattering, clunky sound of ontogeny recapitulating phylogeny ] Actually, if stylus-mediated I/O develops a la the Palm Pilot, with pressure and x/y tilt-sensing, that might actually happen! Handwriting styles could be just like fonts for the fingers. :) --kurt * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From karyn at accessone.com Tue Mar 9 13:58:00 1999 From: karyn at accessone.com (Karyn Quinlan) Date: Tue, 09 Mar 1999 13:58:00 -0800 Subject: Last reminder! In-Reply-To: <199903091911.LAA27142@grogatch.seaslug.org> Message-ID: <3.0.1.32.19990309135800.009ad5b0@mail.accessone.com> Thanks for catching that, Kurt. The event is indeed *March 11th*. See you there, Karyn At 11:11 AM 3/9/99 -0800, Kurt Cockrum wrote: >In-Reply-To: <199903091752.JAA04130 at scn.org> >Doug said: >>[...] >> A presenation by Evelyn Messinger >> President and Director of InterAct >> >>When: On March 4th, from 7-9 pm >>[...] > >You mean Mar 11, don't you? >--kurt >* * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * >. To unsubscribe from this list, send a message to: >majordomo at scn.org In the body of the message, type: >unsubscribe local-computer-activists >END > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Wed Mar 10 07:39:52 1999 From: douglas (Doug Schuler) Date: Wed, 10 Mar 1999 07:39:52 -0800 (PST) Subject: FYI -- job opening - Institute for Community Research Message-ID: <199903101539.HAA17191@scn.org> FYI... > Date: Tue, 09 Mar 1999 21:52:33 -0500 (EST) > From: JSchensu at aol.com > Subject: Positions Available-Institute for Community Research, Hartford, CT. > To: CRN-list at igc.org > > The Institute for Community Research has an immediate opening for an > Administrative Manager. The Administrative Manager is responsible for > leadership in providing institutional support and services for research grants > and contracts, budget, interagency collaboration, research infrastructure and > some personnel procedures and supervision. The Institute for Community > Research is an applied research organization employing approximately 40 > researchers, interventionists and arts managers of diverse cultural, ethnic > and educational backgrounds, based in Hartford, Connecticut, with projects and > activities in Connecticut, the Northeastern United States and elsewhere in the > country. Projects, programs and centers of the ICR are involved in research > on current health and education issues. The ICR supports the Connecticut > States Heritage Arts Program, a statewide community arts training and > promotional program (the United Artists Initiative), a community arts gallery, > the National Teen Action Research Center, research on AIDS and substance abuse > prevention and older adults and an active student intern program. Skills > required for the position include non-profit contract, budget and personnel > management, experience and interest in community based research, demonstrated > interest in interdisciplinary research, experience in multiethnic and socio- > economically diverse work settings, excellent communications and writing > skills. The ICR utilizes a team approach to management and is seeking an > administrator committed to providing service to the management team and > community constituencies. The position reports to the executive director. > Public Administration B.A./M.A. or equivalent required. Bilingual > /multilingual desired. Stable, growth oriented organization, potential for > career development, competitive salary, excellent benefits, good work > environment. Send resume to Jean J. Schensul, Ph.D., Executive Director, > Institute for Community Research, 2 Hartford Square West, Ste. 100, Hartford, > CT. 06l06 by April 15, 1999. > > The Institute for Community Research has an immediate opening for an MA/PhD. > level social science researcher with experience in conducting sensitive > community-based qualitative and survey research with older adults. The > position is situated in a two-city, four year collaborative study of exposure > to drug and HIV/AIDS risk in older adults residing in senior housing in > Hartford and Chicago. The social science researcher, as a member of the > project study team, is responsible for conducting ethnographic, survey and > network research in senior housing complexes in Hartford, with an interagency, > cross city team of researchers, outreach workers, health educators and older > adult advocates. The position requires conducting qualitative field research > with older African American, Caribbean and Latino adults on sensitive topics > including exposure to drugs and sexual risk. Qualifications include field > research with older adults of color, knowledge of health, social and cultural > challenges of older adults in urban areas, ethnographic research skills, > excellent communication and writing skills, prior experience with team > research and demonstrated commitment to the welfare of older low to moderate > income adults living in urban areas. Completed social science research M.A., > M.P.H. or Ph.D. Bilingual /multilingual desired. Stable, growth oriented > organization, potential for career development, competitive salary, excellent > benefits, good work environment. Send resume to Jean J. Schensul, Ph.D., > Executive Director, Institute for Community Research, 2 Hartford Square West, > Ste. 100, Hartford, CT. 06l06 by April 15, 1999. > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Thu Mar 11 06:08:06 1999 From: steve at advocate.net (Steve) Date: Thu, 11 Mar 1999 06:08:06 -0800 Subject: The help desk Message-ID: <199903111410.GAA14170@scn.org> x-no-archive: yes Another help desk story from the Wall Street Journal - Paul Land, an information services manager for a manufacturing company in Oregon, says one user complained that she couldn't open files attached to her e-mail. Over the phone, Mr. Land instructed her to "right mouse click" -- what he considered a simple instruction to click the right-hand side of the mouse. When the frustrated user said that it wasn't working, Mr. Land went to inspect the computer and saw the words "mouse click" written repeatedly across the screen. "You told me to write mouse click," the user explained. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From kurt Sun Mar 14 13:27:10 1999 From: kurt (Kurt Cockrum) Date: Sun, 14 Mar 1999 13:27:10 -0800 (PST) Subject: electronic voting revisited Message-ID: <199903142127.NAA00214@scn.org> This is sort of out-of-the-blue, but it touches on past unresolved topics of discussion on the scn mailing list, and maybe elsewhere, like governance, and so I thot I'd post this while it's fresh on my mind. I stumbled on this while I was browsing the CPSR mailing list archives right after I recently took over ownership of the CPSR mailing list from the long-departed Bob Mascott, incidental to majordomo cleanup on scn. [ actual file = /home0/majordom/work/lists/cpsr-seattle.arch/cpsr-seattle.9610 ] This is an excerpt (indented) from a report by Andy Oram on the 1996 CPSR annual meeting and conference "Communications Unleashed". It was posted on the cpsr-seattle mailing list in late Oct. 1996. >Return-Path: >Date: Mon, 21 Oct 1996 16:52:36 -0400 >X-Sender: andyo at ora.com >To: cpsr-activists at cpsr.org >From: Andy Oram >Subject: CPSR conference wrap-up > For those of you who couldn't attend, I just got back from a great CPSR conference in Washington, D.C., "Communications Unleashed." [...] [...] The last panel of the day was on a narrower topic than the others--but a critical one: the risks of using computers to tabulate votes. Eva Waskell, ^^^^^^^^ ^^^ Rebecca Mercuri, David Burnham, Douglas A. Kellner, and Peter G. Neumann detailed the weak points in the election process and the chances to create fraud. It is mathematically impossible, according to Professor Mercuri, to ^^^^^^^^^^^^^^ ^^^^^^^^^^ guarantee that votes are counted properly while maintaining voter anonymity. ^^^^^^^ ^^^^^^^^ ^^^^^ ^^^^^^^^^ [...] Andy In other words, *take* *your* *pick*, but you can't have both. I could also dig up lots of citations from the RISKS list if anybody cared. While electronic voting could be a useful groupware tool, I don't think it's suitable as a high-stakes decision mechanism, and all the evidence bears me out. As some of you might remember, I was adamantly against it. I hope that buries the issue :) Yes, I know I dug it up again :) --kurt * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From kv9x at scn.org Sun Mar 14 17:09:59 1999 From: kv9x at scn.org (Brian High) Date: Sun, 14 Mar 1999 17:09:59 -0800 Subject: electronic voting revisited References: <199903142127.NAA00214@scn.org> Message-ID: <36EC5DE6.289FD05B@scn.org> Kurt, Thanks for bringing this issue up again. I have been reading the O'Rielly and Associates' "PGP" book ... interesting reading. It seems that as long as a third party tabulated the *encrypted-and-digitally-signed-(and thus authenticated)-votes* then as long as that third party was observed by a fourth (auditing) party to destroy the indiviual votes after the tabulation, you could preserve privacy (except that the third party may *remember* certain votes). [Note: people would have to encrypt their votes on their own private and secure machines -- not "online" on SCN.] Of course, in my opinion, that SCNA was looking for two different kinds of e-voting -- one for committee type work (not needing privacy) and one for SCNA Board of Directors elections (needing privacy). The former (non-private/non-secure) can be open and public and has already been implemented with some success by our webmaster using CGI/HTML. The latter (private/secure) is probably not worth the administrative hassles of encryption and keeping track of public keys and training voters on the use of encryption. So, lets keep working toward e-democracy as far as committee (and community) work -- and let major elections e-democracy be ironed out by larger, more determined, and more capable institutions. As for encryption, I will be getting back to that fascinating PGP book! (By the way, I was able to get a free RSA 'certificate' from Thawte in England and use it successfully with Outlook Express with little hassle. However, now that I am thoroughly disgusted with M$'s recently discovered user-tracking mechanism -- embedding ID codes in your documents without your approval or notification ... and collecting that data with their website using cookies -- I will be trying my RSA certificate with Netscape/Linux this week (yes, I trust Linux developers more that M$ developers). Should be fun! Lastly, I will see if I can use PGP with the same degree of ease -- we'll see 'bout that one :-) --Brian Kurt Cockrum wrote: > This is sort of out-of-the-blue, but it touches on past unresolved > > fraud. It is mathematically impossible, according to Professor Mercuri, to > ^^^^^^^^^^^^^^ ^^^^^^^^^^ > guarantee that votes are counted properly while maintaining voter anonymity. > ^^^^^^^ ^^^^^^^^ ^^^^^ ^^^^^^^^^ > [...] > Andy > > In other words, *take* *your* *pick*, but you can't have both. > > I could also dig up lots of citations from the RISKS list if anybody cared. > While electronic voting could be a useful groupware tool, I don't think > it's suitable as a high-stakes decision mechanism, and all the evidence > bears me out. As some of you might remember, I was adamantly against > it. I hope that buries the issue :) Yes, I know I dug it up again :) > --kurt * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at GroupWorks.org Mon Mar 15 00:57:59 1999 From: steve at GroupWorks.org (Steve Guest) Date: Mon, 15 Mar 1999 03:57:59 -0500 (EST) Subject: electronic voting revisited In-Reply-To: <199903142127.NAA00214@scn.org> Message-ID: Kurt (This is a personal view and does not reflect either the Board's view or Governance - as yet ;-) ) Thanks for keeping your nose to the ground for this issue. I thought that e-votes were a little suspect and would always assume the worst situation in such cases. We seem not to know the abilities of our users - and I have been bitten more than once by the simple underestimation of their talents and power ;-) Steve -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- Melissa & Steve Guest (425) 882 8684 Info Provider & Mentor Coordinators 8am to 11pm PST Seattle Community Network http://www.scn.org "Supporting People and Communities with Free Internet Services" * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From ljbeedle at scn.org Tue Mar 16 07:02:42 1999 From: ljbeedle at scn.org (Lois Beedle) Date: Tue, 16 Mar 1999 07:02:42 -0800 (PST) Subject: electronic voting revisited In-Reply-To: <199903142127.NAA00214@scn.org> Message-ID: My feeling on the privacy issue concerning voting is this: If two uneffected parties are selected to receive the votes and then delete the header info and forward to two other uneffected parties to count, I don't see an issue. The orginal votes would be retained for a period of time by the first two parties of course. As well as the votes counted being retained by the second two parties. This system appears to work for other groups and should work for SCNA. We are not doing world government here after all. Lois * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 16 11:56:58 1999 From: douglas (Doug Schuler) Date: Tue, 16 Mar 1999 11:56:58 -0800 (PST) Subject: FYI -- cheap computer from Seattle ... of all places Message-ID: <199903161956.LAA20255@scn.org> Date: Tue, 16 Mar 1999 10:42:10 -0800 From: "cisler" To: ctcmembers at ctcnet.org, AFCNmembers Cc: gk97 Subject: Cheaper and cheaper Though a part of this seemingly good deal is only for the USA, I thought everyone should be aware of the decrease in pricing and bundling of services for this new offering from Seattle, Washington, based MicroWorkz. March 15, 1999 Microworks to sell PCs as cheap as TVs or stereos BY ERIC AUCHARD Reuters NEW YORK - Microworkz Computer Corp. Monday unveiled a fully equipped desktop computer priced at $299, breaking a psychological barrier that puts PC pricing in line with that of television sets, stereos and other basic consumer electronics. ... Included with the $299 machine is a year's free Internet access from EarthLink Network Inc. and a suite of Corel Corp. WordPerfect software, the Seattle-based company said. The Internet connection alone is worth $240. ... The $299 WEBzter Jr. includes a 3.2 gigabyte, or billion byte, storage drive, a rapid 56,000-bit-per-second modem for connecting to the Internet, sound and video components, a keyboard and a mouse. It carries a warranty and is upgradeable. ... http://www.sjmercury.com/premium/codes/B/docs/B650.htm Steve Cisler * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Wed Mar 17 10:17:49 1999 From: steve at advocate.net (Steve) Date: Wed, 17 Mar 1999 10:17:49 -0800 Subject: The news Message-ID: <199903171820.KAA12431@scn.org> x-no-archive: yes (I know, I know, not directly related to SCN activities...) (TheOnionNews)---A study released Monday by Princeton University found that 20 percent of all Americans are currently waiting for the next available representative. "At this moment, some 50 million of us are on hold," study head William Voss told reporters while waiting to talk to a Con Edison operator about an error in his February gas bill. "I myself have been on hold for 13 minutes now." Voss assured Americans that their calls would be answered in the order they were received. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From kv9x at scn.org Thu Mar 18 08:35:01 1999 From: kv9x at scn.org (Brian High) Date: Thu, 18 Mar 1999 08:35:01 -0800 (PST) Subject: Pretty Good Privacy Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Seattle Community Network Users, and others: I am so excited about this, I am sending this letter F.Y.I. (For Your Information). If you already know about PGP or are not interested, just ignore this. However, since you are SCN users, you are probably interested in Community Networking, free software, and privacy issues. If this is indeed the case, read on! I have been reading up on encryption ... fascinating. As far as encryption "for the masses", the most famous product is PGP (Pretty Good Privacy). It was developed by a process similar to Linux -- open source, etc., but due to patent complications, it had to be released as freeware for non-commercial use and payware for commercial use. It was written by a man who got a B.S. in Comp.Sci who was an anti-nuke activist. (Phil Zimmerman) ( http://www.nai.com/products/security/phil/phil.asp ) He started PGP, Inc. when the patent difficulties were resolved. ( http://www.pgp.com ) PGP, Inc. has merged with other companies (including McAffee) to form Network Associates. PGP is now used by human rights organizations to protect their informants, and refugee organizations in eastern Europe, among other worthy uses. ( http://www.nai.com/products/security/phil/phil-letters.asp ) PGP was written in C, initally for DOS. Now it runs on many platforms. It is based in a command-line interface and can encrypt anything, not just email. There is even an "add-on" that lets you encrypt your entire hard-drive! There is also Windows and Mac versions. ( http://www.pgpi.com/products/ ) I have been reading this book: PGP: Pretty Good Privacy, by Simson Garfinkel (O'Reilly and Assoc.) It is really interesting as the first half is the history of encryption, especially computer implementations. ( http://www.oreilly.com/catalog/pgp/ ) The main algorithms used in PGP were developed in the 70s and 80s. They were created by MIT and Stanford professors of Mathematics, among others. They have been under considerable peer review and cracking efforts. No weaknesses have been found. It is estimated that even with the most powerful computers trying an exhaustive "brute force" attack on a PGP key, the solution would take so long, the sun would explode first. One of the algorithms used is RSA, which most email and web encryption uses. For instance, Thawte "certs" use RSA and are available for free. ( http://thawte.com ) These certs work with MS Outlook Express and Netscape 4.0+ Mail. The certs are validated by an international protocol. I have used a Thawte cert with Outlook Express and it was quite easy to use. However, if you change your email server or login information (like userid) you need to get a new cert. PGP works with Eudora and Emacs, among other mail programs, but not most of the other popular ones, unfortunately. This may change as PGP becomes more popular. PGP keys are validated by your friends -- your "web of trust". You generate your own keys, whenver you want. There has also been conflicts with the US N.S.A. (National Security Agency - "Never Say Anything"). They call encryption software "munitions" and forbid export of it. However, PGP was (illegally) exported and is now used widely around the world. An international version ( http://www.pgpi.com/ ) is available outside the U.S. It is compatible with the US version of PGP. So, consider downloading it (US download only: http://web.mit.edu/network/pgp.html ) and trying it out. It is free, after all, and you might enjoy the privacy it can give you. - --Brian High PGP Key Servers (WWW) http://www.uk.pgp.net/pgpnet/www-key.html My PGP public key as found in a key server: http://blackhole.pca.dfn.de:11371/pks/lookup?op=get&search=0xD13C5EE7 -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNvEoE12bHdDRPF7nEQKK6QCePeVGusZCc1U0h/gShOhyQ+peHw8An0gI WZhvYiGvCCZS2CCBCdZShufo =SKyD -----END PGP SIGNATURE----- * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Fri Mar 19 09:00:49 1999 From: steve at advocate.net (Steve) Date: Fri, 19 Mar 1999 09:00:49 -0800 Subject: Database security Message-ID: <199903191703.JAA11498@scn.org> Bill on Protecting Databases Resurfaces in House Jeri Clausing NY Times 3/19/99 The Clinton Administration and a diverse coalition of academics, Internet companies, banking and medical groups on Thursday lined up against legislation that raises a complex but key policy issue for the digital age: how to protect databases from pirates without limiting access to information that has historically been part of the public domain. The bill, by Representative Howard Coble, a North Carolina Republican, is being sought by companies concerned that new technology allows competitors to quickly and easily copy massive collections of information that they compile, catalogue and resell. Because such collections generally consist of information in the public domain, they are not subject to copyright or other intellectual property protections. But opponents say the bill goes too far, and could ultimately result in electronic toll gates to information that is now widely available free on the Internet -- from scientific research to stock quotes, telephone and e-mail listings, even directories of Internet domain names. A similar proposal by Coble was passed twice by the House last year. But it fell victim to last minute House and Senate negotiations and was stripped from a larger bill, the Digital Millennium Copyright Act. Because database companies compile facts and lists of what generally is information in the public domain, their collections are not subject to copyright or other intellectual property protections. Coble, at the first hearing on the issue this session, told the House Judiciary Committee's subcommittee on intellectual property that his new bill tries to strike a balance between the competing interests. "The balance provides adequate protection to insure there is an incentive for companies to invest in the development of collections of information, without inhibiting members of the scientific, library and research communities from carrying on their work." And Coble, who is chairman of the subcommittee, promised to continue working to appease concerns of opponents. But the two sides are still far apart. A coalition of more than 100 companies, education institutions, nonprofit and trade associations signed a paper given to the committee that said the proposal remained too broad, and would change the basic information policy of the country -- one that has historically protected expressions, not facts. The Clinton Administration echoed those concerns. Andrew J. Pincus, general counsel for the Department of Commerce, said the Administration recognized that there were legal gaps that currently allow the piracy of databases that companies have spent a lot of time and money creating. But he said a final proposal needs to be much more narrowly crafted so everyone knows "where the lines are drawn." Charles E. Phelps, provost of the University of Rochester, said the current proposal would be a nightmare for researchers, who he said would need armies of lawyers to determine what kind of information to which they would and wouldn't have legal access. "While there may be enough attorneys to guide us through this maze, we could not afford them," he said, urging that if Congress is in doubt, it should "err on the side of access." The bill would make it illegal for someone to extract all of or substantial parts of a collection of information, if the action would "cause harm to the actual or potential market" for the owner of the database. Violators could faces fines of up to $250,000 for each offense and five years in prison. Pincus suggested that the bill be changed to limit its reach to commercial pirates. He suggested the legislation apply only to those who, without authorization "extract for commercial distribution or distributes in commerce" all or a substantial part of a database. He also suggested that the threshold of causing harm be increased to substantial harm. Pincus and others said they were also concerned that the law would allow companies to claim the market rights to certain areas of data collection. That would be a boon both to powerful companies already established in the database market and to speculators or new companies looking to enter a market. "I fear this could lead to a gold rush of sorts - people running out to stake their claims," Pincus siad. Marc A. Pearl, general counsel and vice president of government affairs for the Information Technology Association of America, compared the potential for speculative market claims to the first-come, first-serve policy that allows "cybersquatting" of potentially lucrative domain names. "Anyone could put up a Web page and claim the rights to a certain market for databases," he said. But witnesses representing database interests urged the committee not to make any more changes to the bill. "Any additional changes must be viewed with great care and cautiousness," said Marilyn Winokur, executive vice president of Micromedex, which compiles and publishes a host of medical-related database, including the Physician's Desk Reference. "We cannot so dilute the bill as to undermine its effectiveness as a tool against database piracy." Winokur, who was representing the Coalition Against Database Piracy, said database companies invest millions of dollars annually in the hardware and software needed to manage large bodies of information. The Coble bill, she said, "is about eliminating the inequity in a legal regime that allows an unscrupulous competitor to copy with impunity the contents of someone else's compilation and then destroy the first compiler's market by selling a competing less expensive product. "It is also about rectifying the injustice that takes place when a dishonest customer or a 'cyberprankster' -- without permission -- electronically copies and makes it freely available over the Internet. In sum, it is about helping restore fairness to the database marketplace." Copyright 1999 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From xx030 at scn.org Sat Mar 20 04:08:26 1999 From: xx030 at scn.org (Mentor Coordinator) Date: Sat, 20 Mar 1999 04:08:26 -0800 (PST) Subject: Initial thoughts on the SCNA Committee Restructure Message-ID: [Apologizes to everyone who receives multiple copies of this message - we are putting together a list of currently active volunteers, and will send messages like this only to that list in the near future. If you believe you are an SCN/A volunteer, make sure we know! If you have not already responded to the initial request we sent out , do contact volunteering at scn.org (xx031 at scn.org) to be added to the list. Otherwise, we will not have you listed and the important work you are doing will be unrecognized. We want you to be a part of the official volunteer force of SCN/A - if you want to be.] The main purpose of this message: RESTRUCTURING PLAN FOR SCN/A COMMITTEES Starting in April, the committees of SCN/A will be based on the activities they are focused on, with each group having its own representative at Excomm. The largest impact of this change will be the breakup of the Services committee into its separate sub-committees. We are hoping to work with existing sub-committee members to arrange initial meetings in April. Details about the planned changes are posted at http://www.scn.org/scna/new-structure/proposal.html We would welcome your feedback! Please send comments to xx030 at scn.org where they will be collected and sent (uneditted) to the current Excomm and Board members. Thanks, Steve and Mel on behalf of ALL of the SCNA Board and current Excomm -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- Melissa & Steve Guest Seattle Community Network 425 882 8684 - 8am to 11pm http://www.scn.org "Supporting People and Communities with Free Internet Services" * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From chumash at u.washington.edu Sat Mar 20 10:18:44 1999 From: chumash at u.washington.edu (Victoria L. Reyes) Date: Sat, 20 Mar 1999 10:18:44 -0800 (PST) Subject: CANCELLATION OF ACCOUNT Message-ID: I have been a subscriber in the network, but havae not used my account for many months. Please delete my account. Thank you. Rodger Webster 6519 4th Ave NE.,a #6 Seattle, WA 98115 j206.527-6354 _____________________________ Victoria L. Reyes Adminstrative Assistant Department of Landscape Architecture 348 Gould Hall Box 355734 Telephone: (206) 616-6995 Fax: (206) 685-4486 * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Mon Mar 22 13:09:44 1999 From: douglas (Doug Schuler) Date: Mon, 22 Mar 1999 13:09:44 -0800 (PST) Subject: FYI Message-ID: <199903222109.NAA10467@scn.org> Does this look like something to follow up on? -- Doug Date: Fri, 19 Mar 1999 23:07:54 -0500 (EST) From: Steve Snow To: afcn-members at lists.colorado.edu Subject: NONPROFITS, POLICY, AND TECHNOLOGY GRANTS & AWARDS (fwd) Please excuse multiple posts. This is worth reading. ;-) steve snow :: :: NONPROFITS, POLICY, AND TECHNOLOGY GRANTS & AWARDS :: :: The Nonprofits Policy and Technology Project, a project :: of OMB Watch, announces two funding opportunities for :: nonprofit organizations using technology in public policy :: activities. :: :: :: -1- :: :: 1999 NPT Innovation Awards :: :: The NPT Project has begun its second year of recognizing :: organizational technology strategies used by nonprofit :: organizations in public policy activities that demonstrate :: effectiveness, innovation, and lessons learned. :: :: Monetary awards range from $1,000 to $3,000. Guidelines and :: the 1998 list of winners may be obtained by sending a blank :: e-mail message to: :: :: . :: :: :: -2- :: :: 1999 NPT Pilot Project Grants :: :: Through these grants, the NPT Project will identify and :: assist nonprofit efforts that employ information technology :: tools and strategies to develop or bolster their public :: policy activities. Up to $65,000 will be distributed this year, :: with individual grants ranging from $5,000 to $25,000. :: :: The full 1999 Grant Guidelines and 1998 recipients list :: can be obtained by sending a blank e-mail message to: :: :: . :: :: :: Thank you and best wishes! :: -- :: Ryan Turner, Coordinator :: Nonprofits' Policy & Technology (NPT) Project :: OMB Watch :: 1742 Connecticut Ave., NW :: Washington, DC 20009-1171 :: PHONE: (202) 234-8494 :: FAX: (202) 234-8584 :: E-MAIL: turnerr at ombwatch.org :: WEB: http://www.ombwatch.org/npt/ :: :: *************************************************************** :: JOIN NPTalk, the listserv for Nonprofits' Policy and Technology :: :: TO SUBSCRIBE: Send a message to :: with the message body: subscribe nptalk Your Name :: *************************************************************** :: :: *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* :: :: To join Benton's Up For Grabs Discussion Forum (which also :: includes the daily Headlines service), send email to: :: listserv at cdinet.com :: In the body of the message, type only: :: subscribe upforgrabs-L YourFirstName YourLastName :: :: To unsubscribe, send email to: :: listserv at cdinet.com :: In the body of the message, type only: :: signoff upforgrabs-L :: :: If you have any problems with the service, please direct them to :: benton at benton.org :: -- ------------------------------------------------------------------- Stephen Snow | 119 E. Seventh St. | http://www.charweb.org Executive Director | Charlotte, NC 28202 | JOIN The Association FOR Charlotte's Web | [V] (704) 332-5778 | Community Networking: shsnow at charweb.org | [F] (704) 332-4752 | http://www.afcn.net 1996-97 National Information Infrastructure/GII Community Award Winner * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Mon Mar 22 18:42:16 1999 From: steve at advocate.net (Steve) Date: Mon, 22 Mar 1999 18:42:16 -0800 Subject: URLs Message-ID: <199903230244.SAA17075@scn.org> x-no-archive: yes Jakob Nielsen's Alertbox, 3/21/99 The URL will continue to be part of the Web user interface for several more years, so a usable site requires: ...a domain name that is easy to remember and easy to spell ...short URLs ...easy-to-type URLs ...URLs that visualize the site structure ...URLs that are "hackable" to allow users to move to higher levels of the information architecture by hacking off the end of the URL ...persistent URLs that don't change In principle, users should not need to know about URLs which are a machine-level addressing scheme. In practice, users often go to websites or individual pages through mechanisms that involve exposure to raw URLs: ...people guess the domain name of sites they have not visited before: if possible, secure the name of your company and main brands as domain names ...even when people have been to a site before, they will often try to guess or remember the site name instead of using a bookmark or history list: have memorable domain names that are easy to spell ...the social interface to the Web relies on email when users want to recommend Web pages to each other, and email is the second-most common way users get to new sites (search engines being the most common): make sure that all URLs on your site are less than 78 characters long so that they will not wrap across a line feed ...shorter URLs are better since people often type them manually ...do not use MiXeD case text in URLs since people can't remember the difference between upper-case and lower-case characters: all-lowercase URLs are usually preferred (domain names are less of a problem since they are case-insensitive - usability would increase if webservers would ignore case in resolving URLs) ...use a spelling-checking webserver to minimize the damage caused by the inevitable typos Persistent URLs Attract Links Links from other websites are the third-most common way people find sites (after search engines and email recommendations), so build your site to make it easy to attract inbound links: Linkrot equals lost business: make sure all URLs live forever and continue to point to relevant pages. Do not move pages around but keep them at the same URL: it is very annoying for authors of other sites when their links either stop working or turn into pointers to something different because the original page has been moved and replaced by something new. There can be reasons to reserve a special URL for the current edition of a column or other special content, but the article should be stored at a permanent URL from the start and this URL should be listed on the page that is accessed through the temporary or varying URL. Should Domains End in .com? The most frequently asked question on my recent lecture tour to Iceland was whether it is better to get a domain ending in .com or to use the country's own domain (.is). Unfortunately, many users have been trained to view ".com" as the standard ending for commercial websites: this is an artifact of the early American dominance on the Web and of the completion algorithm in several popular browsers which automatically add .com to any name. Because of this situation, my advice is: ...for a site that uses English and is clearly world-wide in its appeal and user base: get a .com domain ...for a site that uses any other language: use the appropriate country domain ending ...for a site that has mainly local appeal, covers mainly local issues, or sells mainly local products: use the country domain, no matter what language is used on the site I recommend use of the local domain for local sites because it is misleading to use the "international" domain ending .com for such sites. As ecommerce and other uses of the Web grow around the world, people will start to expect local domains for local sites and they will not think to type .com for local service. Since the ability to provide great local service is a major selling point, sites are better off by staying with their own country's domain name unless they deliberately want to be seen as disembodied cyberspace entities. Domain Names May Die It is likely that domain names only have 3-5 years left as a major way of finding sites on the Web. In the long term, it is not appropriate to require unique words to identify every single entity in the world. That's not how human language works. The proposals to open up new top-level domains like .shop are a poor solution from a usability perspective since there is no easy way to remember which domain ending is associated with which site. The only new TLD that's useful is .sex which would allow very simple ways of filtering content that's undesired (or desired, as the case may be). New addressing schemes are likely to be introduced with better support for ambiguity and the ability to find things without knowing the exact spelling. Search engines and directories are an early attempt, but we can surely do better. Because of the conservatism of Web users, we will have to cater to old browsers, old software, and old habits for many years, so good domain names will continue to be important for many years. The remaining useful life of a domain name may be as much as ten years. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bb268 at scn.org Tue Mar 23 09:22:04 1999 From: bb268 at scn.org (Hector Gonzalez) Date: Tue, 23 Mar 1999 09:22:04 -0800 (PST) Subject: [Donmca@aol.com: Fwd: Fw: Virus Alert] Message-ID: <199903231722.JAA20572@scn.org> ================= Begin forwarded message ================= From: Donmca at aol.com (unknown) To: Supernet1 at aol.com, clschibig at hotmail.com, Camco2 at aol.com, denzili at juno.com, DAlmqEnt at aol.com, donnamel at hotmail.com, rgross at sinclair.net, bb268 at scn.org, ockerseattle at msn.com, jim at kendaco.telebyte.com, tomk at seanet.com, VirgJill at aol.com, jirand at worldnet.att.net, aa314 at gpfn.sk.ca, karen at jeffklassenfishing.com Cc: karlh at iea.com, kwagner at silverlink.net, langel at televar.com, lisray at safeco.com, imac at infinet.net, MARCIASTAR at aol.com, marlat at safeco.com, Fergusson1 at aol.com, m_egilson at ducks.ca, mcammond at wsunix.wsu.edu, JNalley100 at aol.com, noneill at home.com, Srnandjrn at aol.com, pkelly1 at gte.net, RPpool at aol.com Subject: Fwd: Fw: Virus Alert Date: Mon, 22 Mar This is a multi-part message in MIME format. --part0_922174691_boundary Content-ID: <0_922174691 at inet_out.mail.aol.com.1> Content-type: text/plain; charset=US-ASCII > In a message dated 3/22/99 10:00:16 AM Pacific Standard Time, kscmrobin at juno. > com writes: > > > Subj: Fw: Virus Alert > > Date: 3/22/99 10:00:16 AM Pacific Standard Time > > From: kscmrobin at juno.com (Kenneth S. Robinson) > > To: B_Hardy at msn.com, camco2 at aol.com, hhawk at juno.com, jkeliher at mwmgl.org, > > cunamara at gte.net, Donmca at aol.com, jdreid at telebyte.net, greystroke at juno.com, > > > jhrco at hurricane.net, kerobin at juno.com > > > > Dear Friends, > > > > Charrison Lochaby is a close personal friend who sent me the following > > message. I trust his judgement. Hope this helps ward off problems. > > > > Ken Robinson > > > > --------- Forwarded message ---------- > > From: "Charrison Lochaby" > > Date: Mon, 22 Mar 1999 09:22:36 -0800 > > Subject: Virus Alert > > Message-ID: <000301be7488$94887e20$61355ecc at dell> > > > > Dear Friends > > > > I usually do not pay any attention to "Virus Alerts" as many of them are > > hoaxes. However I know of two people whose computers have been infected > > with the "Happy99" worm. One on the East Coast and the other a true and > > trusted friend who forwarded the following to me and I am in turn sending > it > > on to everyone that I know. > > > > Charrison Lochaby > > > > > > > > > > > > ===== A message from the 'whatnext' discussion list ===== > > > > Some time early this week or late last week a message was sent with an > > attachment called "Happy99" This is a TERRIBLE virus that has been > > making my life a living hell for the last 24 hours. It infects your > entire > > system. DO NOT OPEN IT UNDER ANY CIRCUMSTANCES!!!!!!!!!!! > > > > Below is info on how to deal with this virus. > > > > > > Hello Listowners. Please consider forwarding this message to your lists. > > The "happy99.exe" worm continues to rear it's ugly head, and we'd like to > > warn the conservation community about it. I received it today from > > someone in Turkey... > > Thanks, > > Steve Albertson (ONE/Northwest) > > > > -------------------------------------------------------- > > Reminder: Do Not Open the File Named "happy99.exe" > > An email is floating around the conservation community (and the Internet > > in general) that contains an attached file usually called "happy99.exe". > > Please be warned that this attached file *most likely* contains a "worm" > > that can harm your system. > > Please do not open the happy99.exe file, or forward it to anyone asking > > that they do so. You cannot contract this worm by simply opening the > email > > message in which the happy99.exe file is attached, but do not download or > > click on (launch) the happy99.exe file. > > A worm is like a virus in that it invades your computer system, but does > > not attach itself to a host program. If you think you might have come in > > contact with the happy99.exe file, below are the recommended steps to get > > rid of it from the Symantec AntiVirus home page. > > In general, there are three things you can do to protect yourself from > > viruses and worms: > > 1. Purchase anti-virus software to protect your machine(s). This > software can scan every new file that comes onto your computer and alert you > to the > > presence of *most* viruses, worms and other damaging files. Symantec > > (http://www.symantec.com) makes an excellent and affordable product > called > > Norton AntiVirus that you should investigate. > > 2. Never open or download files attached to email messages without first > > checking them for viruses, particularly if they come from people you don' > t > > know or trust. This is particularly true for "executable" files (files > that > > run software programs when launched), but can also apply to Word files > > which can also be infected with annoying and damaging viruses. For more > > information about viruses, see our general document at http://www.onenw. > org/toolkit/virus.html. > > 3. Before forwarding a "warning" message about viruses to your friends > and > > colleagues, confirm that the warning is for a real virus/worm and not > > another hoax. Hoax viruses are ones that don't exist but are endlessly > > described in email messages warning people about them! One place you can > > go to verify whether a warning message is about a real virus or not is > the > > Virus Myths Web page, at http://www.kumite.com/myths/ . > > > > Overall, use your judgement and common sense, and be reasonably cautious. > > * Steve Albertson (ONE/Northwest) > > > > --------------------------------------------------------- > > (From Symantec's AntiVirus web site, downloaded March 9, 1999): > > Happy99.Worm > > VirusName: Happy99.Worm > > Aliases: Trojan.Happy99, I-Worm.Happy > > Likelihood: Common > > Region Reported: US, Europe > > Characteristics: Trojan Horse, Worm > > > > Description: > > This is a worm program, NOT a virus. This program has reportedly been > > received through email spamming and USENET newsgroup posting. The file is > > usually named HAPPY99.EXE in the email or article attachment. > > When being executed, the program also opens a window entitled "Happy New > > Year 1999 !!" showing a firework display to disguise its other actions. > The > > program copies itself as SKA.EXE and extracts a DLL that it carries as > > SKA.DLL into WINDOWS\SYSTEM directory. It also modifies WSOCK32.DLL in > > WINDOWS\SYSTEM directory and copies the original WSOCK32.DLL into > > WSOCK32.SKA. > > WSOCK32.DLL handles internet-connectivity in Windows 95 and 98. The > > modification to WSOCK32.DLL allows the worm routine to be triggered when > a connect or send activity is detected. When such online activity occurs, > the > > modified code loads the worm's SKA.DLL. This SKA.DLL creates a new email > > or a new article with UUENCODED HAPPY99.EXE inserted into the email or > > article. > > It then sends this email or posts this article. > > If WSOCK32.DLL is in use when the worm tries to modify it (i.e. a user is > > online), the worm adds a registry entry: > > HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce=SKA. > > EXE > > The registry entry loads the worm the next time Windows start. > > > > Removing the worm manually: > > > > 1. delete WINDOWS\SYSTEM\SKA.EXE > > 2. delete WINDOWS\SYSTEM\SKA.DLL > > 3. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > > 5. delete the downloaded file, usually named HAPPY99.EXE > > > > Windows prevents you to do step #3 and #4 above if the machine is still > > connected to the Internet. The file "windows\system\wsock32.dll" is used > > whenever the machine is connected to Internet (i.e. through dial-up or > LAN > > connection). > > > > If you are using dial-up connection (i.e. America Online), you need to do > > the following: > > 1. terminate internet connection > > 2. delete WINDOWS\SYSTEM\SKA.EXE > > 3. delete WINDOWS\SYSTEM\SKA.DLL > > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > > 5. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > > 6. delete the downloaded file, usually named HAPPY99.EXE > > > > If you are connected to Internet through LAN (i.e. in the office or cable > > modem), you need to do the following: > > 1. From the Start menu, select shutdown-restart in MS DOS mode > > 2. type CD \windows\system when DOS prompt (C:\)appears > > 3. type RENAME WSOCK32.DLL WSOCK32.BAK > > 4. type RENAME WSOCK32.SKA WSOCK32.DLL > > 5. type DEL SKA.EXE > > 6. type DEL SKA.DLL > > > > > > Safe Computing: > > This worm and other trojan-horse type programs demonstrate the need to > > practice safe computing. One should not execute any executable-file > > attachment (EXE, SHS, MS Word or MS Excel file) that comes from an email > > or a newsgroup article from an untrusted source. > > Norton AntiVirus users can protect themselves from this virus by > > downloading the current virus definitions either through LiveUpdate or > from the > > following webpage: > > http://www.symantec.com/avcenter/download.html > > Write-up by: Raul K. Elnitiarta > > March 2, 1999 > > > > ---------------------------------------------------------- > > Steve Albertson > > ONE/Northwest > > 'Online Networking for the Environment' > > 1601 2nd Avenue, Suite 605 > > Seattle, WA 98101 > > > > Email: stevea at onenw.org > > Phone: 206-448-1008 > > Fax: 206-448-7222 > > Web: http://www.onenw.org > > > > > > > ----------------- > Forwarded Message: > Subj: Fw: Virus Alert > Date: 3/22/99 10:00:16 AM Pacific Standard Time > From: kscmrobin at juno.com (Kenneth S. Robinson) > To: B_Hardy at msn.com, camco2 at aol.com, hhawk at juno.com, jkeliher at mwmgl.org, > cunamara at gte.net, Donmca at aol.com, jdreid at telebyte.net, greystroke at juno.com, > jhrco at hurricane.net, kerobin at juno.com > > Dear Friends, > > Charrison Lochaby is a close personal friend who sent me the following > message. I trust his judgement. Hope this helps ward off problems. > > Ken Robinson > > --------- Forwarded message ---------- > From: "Charrison Lochaby" > Date: Mon, 22 Mar 1999 09:22:36 -0800 > Subject: Virus Alert > Message-ID: <000301be7488$94887e20$61355ecc at dell> > > Dear Friends > > I usually do not pay any attention to "Virus Alerts" as many of them are > hoaxes. However I know of two people whose computers have been infected > with the "Happy99" worm. One on the East Coast and the other a true and > trusted friend who forwarded the following to me and I am in turn sending > it > on to everyone that I know. > > Charrison Lochaby > > > > > > ===== A message from the 'whatnext' discussion list ===== > > Some time early this week or late last week a message was sent with an > attachment called "Happy99" This is a TERRIBLE virus that has been > making > my life a living hell for the last 24 hours. It infects your entire > system. DO NOT OPEN IT UNDER ANY CIRCUMSTANCES!!!!!!!!!!! > > Below is info on how to deal with this virus. > > > Hello Listowners. Please consider forwarding this message to your lists. > The "happy99.exe" worm continues to rear it's ugly head, and we'd like to > warn the conservation community about it. I received it today from > someone > in Turkey... > Thanks, > Steve Albertson (ONE/Northwest) > > -------------------------------------------------------- > Reminder: Do Not Open the File Named "happy99.exe" > An email is floating around the conservation community (and the Internet > in > general) that contains an attached file usually called "happy99.exe". > Please be warned that this attached file *most likely* contains a "worm" > that can harm your system. > Please do not open the happy99.exe file, or forward it to anyone asking > that > they do so. You cannot contract this worm by simply opening the email > message in which the happy99.exe file is attached, but do not download or > click on (launch) the happy99.exe file. > A worm is like a virus in that it invades your computer system, but does > not attach itself to a host program. If you think you might have come in > contact with the happy99.exe file, below are the recommended steps to get > rid of it from the Symantec AntiVirus home page. > In general, there are three things you can do to protect yourself from > viruses and worms: > 1. Purchase anti-virus software to protect your machine(s). This > software > can scan every new file that comes onto your computer and alert you to > the > presence of *most* viruses, worms and other damaging files. Symantec > (http://www.symantec.com) makes an excellent and affordable product > called > Norton AntiVirus that you should investigate. > 2. Never open or download files attached to email messages without first > checking them for viruses, particularly if they come from people you > don't > know or trust. This is particularly true for "executable" files (files > that > run software programs when launched), but can also apply to Word files > which > can also be infected with annoying and damaging viruses. For more > information about viruses, see our general document at > http://www.onenw.org/toolkit/virus.html. > 3. Before forwarding a "warning" message about viruses to your friends > and > colleagues, confirm that the warning is for a real virus/worm and not > another hoax. Hoax viruses are ones that don't exist but are endlessly > described in email messages warning people about them! One place you can > go > to verify whether a warning message is about a real virus or not is the > Virus Myths Web page, at http://www.kumite.com/myths/ . > > Overall, use your judgement and common sense, and be reasonably cautious. > * Steve Albertson (ONE/Northwest) > > --------------------------------------------------------- > (From Symantec's AntiVirus web site, downloaded March 9, 1999): > Happy99.Worm > VirusName: Happy99.Worm > Aliases: Trojan.Happy99, I-Worm.Happy > Likelihood: Common > Region Reported: US, Europe > Characteristics: Trojan Horse, Worm > > Description: > This is a worm program, NOT a virus. This program has reportedly been > received through email spamming and USENET newsgroup posting. The file is > usually named HAPPY99.EXE in the email or article attachment. > When being executed, the program also opens a window entitled "Happy New > Year 1999 !!" showing a firework display to disguise its other actions. > The > program copies itself as SKA.EXE and extracts a DLL that it carries as > SKA.DLL into WINDOWS\SYSTEM directory. It also modifies WSOCK32.DLL in > WINDOWS\SYSTEM directory and copies the original WSOCK32.DLL into > WSOCK32.SKA. > WSOCK32.DLL handles internet-connectivity in Windows 95 and 98. The > modification to WSOCK32.DLL allows the worm routine to be triggered when > a > connect or send activity is detected. When such online activity occurs, > the > modified code loads the worm's SKA.DLL. This SKA.DLL creates a new email > or > a new article with UUENCODED HAPPY99.EXE inserted into the email or > article. > It then sends this email or posts this article. > If WSOCK32.DLL is in use when the worm tries to modify it (i.e. a user is > online), the worm adds a registry entry: > HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce=SKA. > EXE > The registry entry loads the worm the next time Windows start. > > Removing the worm manually: > > 1. delete WINDOWS\SYSTEM\SKA.EXE > 2. delete WINDOWS\SYSTEM\SKA.DLL > 3. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > 5. delete the downloaded file, usually named HAPPY99.EXE > > Windows prevents you to do step #3 and #4 above if the machine is still > connected to the Internet. The file "windows\system\wsock32.dll" is used > whenever the machine is connected to Internet (i.e. through dial-up or > LAN > connection). > > If you are using dial-up connection (i.e. America Online), you need to do > the following: > 1. terminate internet connection > 2. delete WINDOWS\SYSTEM\SKA.EXE > 3. delete WINDOWS\SYSTEM\SKA.DLL > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > 5. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > 6. delete the downloaded file, usually named HAPPY99.EXE > > If you are connected to Internet through LAN (i.e. in the office or cable > modem), you need to do the following: > 1. From the Start menu, select shutdown-restart in MS DOS mode > 2. type CD \windows\system when DOS prompt (C:\)appears > 3. type RENAME WSOCK32.DLL WSOCK32.BAK > 4. type RENAME WSOCK32.SKA WSOCK32.DLL > 5. type DEL SKA.EXE > 6. type DEL SKA.DLL > > > Safe Computing: > This worm and other trojan-horse type programs demonstrate the need to > practice safe computing. One should not execute any executable-file > attachment (EXE, SHS, MS Word or MS Excel file) that comes from an email > or > a newsgroup article from an untrusted source. > Norton AntiVirus users can protect themselves from this virus by > downloading > the current virus definitions either through LiveUpdate or from the > following webpage: > http://www.symantec.com/avcenter/download.html > Write-up by: Raul K. Elnitiarta > March 2, 1999 > > ---------------------------------------------------------- > Steve Albertson > ONE/Northwest > 'Online Networking for the Environment' > 1601 2nd Avenue, Suite 605 > Seattle, WA 98101 > > Email: stevea at onenw.org > Phone: 206-448-1008 > Fax: 206-448-7222 > Web: http://www.onenw.org --part0_922174691_boundary Content-ID: <0_922174691 at inet_out.mail.aol.com.2> Content-type: message/rfc822 Content-transfer-encoding: 7bit Content-disposition: inline From: Donmca at aol.com Return-path: To: tinker at kalama.com, skogldg at cen.quik.com, jbgrobler at worldfront.com, BMHaave at aol.com, JOECARIVEY at aol.com, hairctr at ritzcom.net, jnblough at crcwnet.com, Donmca at aol.com, cmoll at windermere.com, k7ioo at televar.com, JP3712 at aol.com Cc: sschibig at wolfenet.com, marching at webtv.net, kenkay at ix.netcom.com, aluberts at earthlink.net, Bealswood at aol.com, McAmmond at aol.com, Picketb at aol.com, toydoghouse at worldnet.att.net, scottbp at worldnet.att.com, bealouchubb at msn.com, rafinnigan at earthlink.net, B_Hardy at email.msn.com Subject: Fwd: Fw: Virus Alert Date: Tue, 23 Mar 1999 02:32:39 EST Mime-Version: 1.0 Content-type: multipart/mixed; boundary="part1_922174691_boundary" --part1_922174691_boundary Content-ID: <0_922174691 at inet_out.mail.aol.com.3> Content-type: text/plain; charset=US-ASCII In a message dated 3/22/99 10:00:16 AM Pacific Standard Time, kscmrobin at juno.com writes: > Subj: Fw: Virus Alert > Date: 3/22/99 10:00:16 AM Pacific Standard Time > From: kscmrobin at juno.com (Kenneth S. Robinson) > To: B_Hardy at msn.com, camco2 at aol.com, hhawk at juno.com, jkeliher at mwmgl.org, > cunamara at gte.net, Donmca at aol.com, jdreid at telebyte.net, greystroke at juno.com, > jhrco at hurricane.net, kerobin at juno.com > > Dear Friends, > > Charrison Lochaby is a close personal friend who sent me the following > message. I trust his judgement. Hope this helps ward off problems. > > Ken Robinson > > --------- Forwarded message ---------- > From: "Charrison Lochaby" > Date: Mon, 22 Mar 1999 09:22:36 -0800 > Subject: Virus Alert > Message-ID: <000301be7488$94887e20$61355ecc at dell> > > Dear Friends > > I usually do not pay any attention to "Virus Alerts" as many of them are > hoaxes. However I know of two people whose computers have been infected > with the "Happy99" worm. One on the East Coast and the other a true and > trusted friend who forwarded the following to me and I am in turn sending it > on to everyone that I know. > > Charrison Lochaby > > > > > > ===== A message from the 'whatnext' discussion list ===== > > Some time early this week or late last week a message was sent with an > attachment called "Happy99" This is a TERRIBLE virus that has been > making my life a living hell for the last 24 hours. It infects your entire > system. DO NOT OPEN IT UNDER ANY CIRCUMSTANCES!!!!!!!!!!! > > Below is info on how to deal with this virus. > > > Hello Listowners. Please consider forwarding this message to your lists. > The "happy99.exe" worm continues to rear it's ugly head, and we'd like to > warn the conservation community about it. I received it today from > someone in Turkey... > Thanks, > Steve Albertson (ONE/Northwest) > > -------------------------------------------------------- > Reminder: Do Not Open the File Named "happy99.exe" > An email is floating around the conservation community (and the Internet > in general) that contains an attached file usually called "happy99.exe". > Please be warned that this attached file *most likely* contains a "worm" > that can harm your system. > Please do not open the happy99.exe file, or forward it to anyone asking > that they do so. You cannot contract this worm by simply opening the email > message in which the happy99.exe file is attached, but do not download or > click on (launch) the happy99.exe file. > A worm is like a virus in that it invades your computer system, but does > not attach itself to a host program. If you think you might have come in > contact with the happy99.exe file, below are the recommended steps to get > rid of it from the Symantec AntiVirus home page. > In general, there are three things you can do to protect yourself from > viruses and worms: > 1. Purchase anti-virus software to protect your machine(s). This software can scan every new file that comes onto your computer and alert you to the > presence of *most* viruses, worms and other damaging files. Symantec > (http://www.symantec.com) makes an excellent and affordable product called > Norton AntiVirus that you should investigate. > 2. Never open or download files attached to email messages without first > checking them for viruses, particularly if they come from people you don't > know or trust. This is particularly true for "executable" files (files that > run software programs when launched), but can also apply to Word files > which can also be infected with annoying and damaging viruses. For more > information about viruses, see our general document at http://www.onenw.org/toolkit/virus.html. > 3. Before forwarding a "warning" message about viruses to your friends and > colleagues, confirm that the warning is for a real virus/worm and not > another hoax. Hoax viruses are ones that don't exist but are endlessly > described in email messages warning people about them! One place you can > go to verify whether a warning message is about a real virus or not is the > Virus Myths Web page, at http://www.kumite.com/myths/ . > > Overall, use your judgement and common sense, and be reasonably cautious. > * Steve Albertson (ONE/Northwest) > > --------------------------------------------------------- > (From Symantec's AntiVirus web site, downloaded March 9, 1999): > Happy99.Worm > VirusName: Happy99.Worm > Aliases: Trojan.Happy99, I-Worm.Happy > Likelihood: Common > Region Reported: US, Europe > Characteristics: Trojan Horse, Worm > > Description: > This is a worm program, NOT a virus. This program has reportedly been > received through email spamming and USENET newsgroup posting. The file is > usually named HAPPY99.EXE in the email or article attachment. > When being executed, the program also opens a window entitled "Happy New > Year 1999 !!" showing a firework display to disguise its other actions. The > program copies itself as SKA.EXE and extracts a DLL that it carries as > SKA.DLL into WINDOWS\SYSTEM directory. It also modifies WSOCK32.DLL in > WINDOWS\SYSTEM directory and copies the original WSOCK32.DLL into > WSOCK32.SKA. > WSOCK32.DLL handles internet-connectivity in Windows 95 and 98. The > modification to WSOCK32.DLL allows the worm routine to be triggered when a connect or send activity is detected. When such online activity occurs, the > modified code loads the worm's SKA.DLL. This SKA.DLL creates a new email > or a new article with UUENCODED HAPPY99.EXE inserted into the email or > article. > It then sends this email or posts this article. > If WSOCK32.DLL is in use when the worm tries to modify it (i.e. a user is > online), the worm adds a registry entry: > HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce=SKA. > EXE > The registry entry loads the worm the next time Windows start. > > Removing the worm manually: > > 1. delete WINDOWS\SYSTEM\SKA.EXE > 2. delete WINDOWS\SYSTEM\SKA.DLL > 3. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > 5. delete the downloaded file, usually named HAPPY99.EXE > > Windows prevents you to do step #3 and #4 above if the machine is still > connected to the Internet. The file "windows\system\wsock32.dll" is used > whenever the machine is connected to Internet (i.e. through dial-up or LAN > connection). > > If you are using dial-up connection (i.e. America Online), you need to do > the following: > 1. terminate internet connection > 2. delete WINDOWS\SYSTEM\SKA.EXE > 3. delete WINDOWS\SYSTEM\SKA.DLL > 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK > 5. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL > 6. delete the downloaded file, usually named HAPPY99.EXE > > If you are connected to Internet through LAN (i.e. in the office or cable > modem), you need to do the following: > 1. From the Start menu, select shutdown-restart in MS DOS mode > 2. type CD \windows\system when DOS prompt (C:\)appears > 3. type RENAME WSOCK32.DLL WSOCK32.BAK > 4. type RENAME WSOCK32.SKA WSOCK32.DLL > 5. type DEL SKA.EXE > 6. type DEL SKA.DLL > > > Safe Computing: > This worm and other trojan-horse type programs demonstrate the need to > practice safe computing. One should not execute any executable-file > attachment (EXE, SHS, MS Word or MS Excel file) that comes from an email > or a newsgroup article from an untrusted source. > Norton AntiVirus users can protect themselves from this virus by > downloading the current virus definitions either through LiveUpdate or from the > following webpage: > http://www.symantec.com/avcenter/download.html > Write-up by: Raul K. Elnitiarta > March 2, 1999 > > ---------------------------------------------------------- > Steve Albertson > ONE/Northwest > 'Online Networking for the Environment' > 1601 2nd Avenue, Suite 605 > Seattle, WA 98101 > > Email: stevea at onenw.org > Phone: 206-448-1008 > Fax: 206-448-7222 > Web: http://www.onenw.org > > --part1_922174691_boundary Content-ID: <0_922174691 at inet_out.mail.juno.com.4> Content-type: message/rfc822 Content-transfer-encoding: 7bit Content-disposition: inline Return-Path: Received: from rly-zc03.mx.aol.com (rly-zc03.mail.aol.com [172.31.33.3]) by air-zc01.mail.aol.com (v58.13) with SMTP; Mon, 22 Mar 1999 13:00:15 -0500 Received: from m3.jersey.juno.com (m3.jersey.juno.com [209.67.33.61]) by rly-zc03.mx.aol.com (8.8.8/8.8.5/AOL-4.0.0) with ESMTP id NAA15683; Mon, 22 Mar 1999 13:00:08 -0500 (EST) Received: (from kscmrobin at juno.com) by m3.jersey.juno.com (queuemail) id D6B6E7QA; Mon, 22 Mar 1999 12:57:41 EST To: B_Hardy at msn.com, camco2 at aol.com, hhawk at juno.com, jkeliher at mwmgl.org, cunamara at gte.net, Donmca at aol.com, jdreid at telebyte.net, greystroke at juno.com, jhrco at hurricane.net, kerobin at juno.com Date: Mon, 22 Mar 1999 09:55:22 -0900 Subject: Fw: Virus Alert Message-ID: <19990322.095524.-967401.0.kscmrobin at juno.com> X-Mailer: Juno 2.0.11 X-Juno-Line-Breaks: 0-1,3-17,19-30,32-40,42-48,50-53,55-64,66,68-69,71-73,75,77,79-82,84-86,88-108,110-115,117,119,121,123-126,128-140,142-166,168-169,171-189 X-Juno-Att: 0 From: "Kenneth S. Robinson" Mime-Version: 1.0 Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7bit Dear Friends, Charrison Lochaby is a close personal friend who sent me the following message. I trust his judgement. Hope this helps ward off problems. Ken Robinson --------- Forwarded message ---------- From: "Charrison Lochaby" Date: Mon, 22 Mar 1999 09:22:36 -0800 Subject: Virus Alert Message-ID: <000301be7488$94887e20$61355ecc at dell> Dear Friends I usually do not pay any attention to "Virus Alerts" as many of them are hoaxes. However I know of two people whose computers have been infected with the "Happy99" worm. One on the East Coast and the other a true and trusted friend who forwarded the following to me and I am in turn sending it on to everyone that I know. Charrison Lochaby ===== A message from the 'whatnext' discussion list ===== Some time early this week or late last week a message was sent with an attachment called "Happy99" This is a TERRIBLE virus that has been making my life a living hell for the last 24 hours. It infects your entire system. DO NOT OPEN IT UNDER ANY CIRCUMSTANCES!!!!!!!!!!! Below is info on how to deal with this virus. Hello Listowners. Please consider forwarding this message to your lists. The "happy99.exe" worm continues to rear it's ugly head, and we'd like to warn the conservation community about it. I received it today from someone in Turkey... Thanks, Steve Albertson (ONE/Northwest) -------------------------------------------------------- Reminder: Do Not Open the File Named "happy99.exe" An email is floating around the conservation community (and the Internet in general) that contains an attached file usually called "happy99.exe". Please be warned that this attached file *most likely* contains a "worm" that can harm your system. Please do not open the happy99.exe file, or forward it to anyone asking that they do so. You cannot contract this worm by simply opening the email message in which the happy99.exe file is attached, but do not download or click on (launch) the happy99.exe file. A worm is like a virus in that it invades your computer system, but does not attach itself to a host program. If you think you might have come in contact with the happy99.exe file, below are the recommended steps to get rid of it from the Symantec AntiVirus home page. In general, there are three things you can do to protect yourself from viruses and worms: 1. Purchase anti-virus software to protect your machine(s). This software can scan every new file that comes onto your computer and alert you to the presence of *most* viruses, worms and other damaging files. Symantec (http://www.symantec.com) makes an excellent and affordable product called Norton AntiVirus that you should investigate. 2. Never open or download files attached to email messages without first checking them for viruses, particularly if they come from people you don't know or trust. This is particularly true for "executable" files (files that run software programs when launched), but can also apply to Word files which can also be infected with annoying and damaging viruses. For more information about viruses, see our general document at http://www.onenw.org/toolkit/virus.html. 3. Before forwarding a "warning" message about viruses to your friends and colleagues, confirm that the warning is for a real virus/worm and not another hoax. Hoax viruses are ones that don't exist but are endlessly described in email messages warning people about them! One place you can go to verify whether a warning message is about a real virus or not is the Virus Myths Web page, at http://www.kumite.com/myths/ . Overall, use your judgement and common sense, and be reasonably cautious. * Steve Albertson (ONE/Northwest) --------------------------------------------------------- (From Symantec's AntiVirus web site, downloaded March 9, 1999): Happy99.Worm VirusName: Happy99.Worm Aliases: Trojan.Happy99, I-Worm.Happy Likelihood: Common Region Reported: US, Europe Characteristics: Trojan Horse, Worm Description: This is a worm program, NOT a virus. This program has reportedly been received through email spamming and USENET newsgroup posting. The file is usually named HAPPY99.EXE in the email or article attachment. When being executed, the program also opens a window entitled "Happy New Year 1999 !!" showing a firework display to disguise its other actions. The program copies itself as SKA.EXE and extracts a DLL that it carries as SKA.DLL into WINDOWS\SYSTEM directory. It also modifies WSOCK32.DLL in WINDOWS\SYSTEM directory and copies the original WSOCK32.DLL into WSOCK32.SKA. WSOCK32.DLL handles internet-connectivity in Windows 95 and 98. The modification to WSOCK32.DLL allows the worm routine to be triggered when a connect or send activity is detected. When such online activity occurs, the modified code loads the worm's SKA.DLL. This SKA.DLL creates a new email or a new article with UUENCODED HAPPY99.EXE inserted into the email or article. It then sends this email or posts this article. If WSOCK32.DLL is in use when the worm tries to modify it (i.e. a user is online), the worm adds a registry entry: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce=SKA. EXE The registry entry loads the worm the next time Windows start. Removing the worm manually: 1. delete WINDOWS\SYSTEM\SKA.EXE 2. delete WINDOWS\SYSTEM\SKA.DLL 3. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL 5. delete the downloaded file, usually named HAPPY99.EXE Windows prevents you to do step #3 and #4 above if the machine is still connected to the Internet. The file "windows\system\wsock32.dll" is used whenever the machine is connected to Internet (i.e. through dial-up or LAN connection). If you are using dial-up connection (i.e. America Online), you need to do the following: 1. terminate internet connection 2. delete WINDOWS\SYSTEM\SKA.EXE 3. delete WINDOWS\SYSTEM\SKA.DLL 4. in WINDOWS\SYSTEM\ directory, rename WSOCK32.DLL to WSOCK32.BAK 5. in WINDOWS\SYSTEM\ directory, rename WSOCK32.SKA to WSOCK32.DLL 6. delete the downloaded file, usually named HAPPY99.EXE If you are connected to Internet through LAN (i.e. in the office or cable modem), you need to do the following: 1. From the Start menu, select shutdown-restart in MS DOS mode 2. type CD \windows\system when DOS prompt (C:\)appears 3. type RENAME WSOCK32.DLL WSOCK32.BAK 4. type RENAME WSOCK32.SKA WSOCK32.DLL 5. type DEL SKA.EXE 6. type DEL SKA.DLL Safe Computing: This worm and other trojan-horse type programs demonstrate the need to practice safe computing. One should not execute any executable-file attachment (EXE, SHS, MS Word or MS Excel file) that comes from an email or a newsgroup article from an untrusted source. Norton AntiVirus users can protect themselves from this virus by downloading the current virus definitions either through LiveUpdate or from the following webpage: http://www.symantec.com/avcenter/download.html Write-up by: Raul K. Elnitiarta March 2, 1999 ---------------------------------------------------------- Steve Albertson ONE/Northwest 'Online Networking for the Environment' 1601 2nd Avenue, Suite 605 Seattle, WA 98101 Email: stevea at onenw.org Phone: 206-448-1008 Fax: 206-448-7222 Web: http://www.onenw.org --part1_922174691_boundary-- --part0_922174691_boundary-- -- -Hector Gonzalez- bb268 at scn.org * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 23 12:18:34 1999 From: douglas (Doug Schuler) Date: Tue, 23 Mar 1999 12:18:34 -0800 (PST) Subject: Micro Community Radio or CORPORATE radio?!?! [ urgent!! ] Message-ID: <199903232018.MAA20630@scn.org> ---- Please forward to interested colleagues and lists --- Dear Supporters of Democratic Media: As many of you know the FCC is taking public comments on the issue legalizing low-power FM radio broadcasting in the U.S. The last date that they'll be taking comments is looming closely: April 12, 1999. Although there is a great interest in creating non-profit, community radio from all parts of the country, the FCC is apparently not interested in their original mandate to regulate radio "in the public interest, by the least restrictive means necessary." They are planning to legalize microradio but AUCTION off the licenses thus missing an excellent opportunity to develop truly democratic radio. There is at least one Seattle group who is working on this issue. Community Powered Radio: URL: http://www.gurlpages.com/activism/cpr/ (and they have lots of good links from there...) CPR's e-mail is cpr at gurlmail.com Contact the FCC -- BEFORE April 12 and tell them you want legal, non-commercial, democratic, community-based microradio! Chair William Kennard (wkennard at fcc.gov) Susan Ness (sness at fcc.gov) Harold Furchgott-Roth (hfurchtg at fcc.gov) Michael Powell (mpowell at fcc.gov) Gloria Tristani (gtristan at fcc.gov) [ It is recommended that you send a note to each commisioner individually ] Federal Communications Commission 445 12 Street, S.W. Washington, D.C. 20554 Thanks! --- Doug BTW, here is an article from a recent WSJ... BATTLE OF THE AIRWAVES Issue: Microradio What do a Hispanic pastor, an alternative musician, a New Jersey policeman, and some blind cooks have in common? They all are eager to explore the possibilities of microradio. The FCC is considering a proposal to license a new class of small, low-power radio stations. While the cost of operating a full scale radio station is prohibitively expensive for most individuals, less than $1,000 is needed to get a mircoradio station up and running. Diverse communities nationwide have exhibited interest in obtaining low-power licenses, but existing broadcasters have pledged to put a fight to prevent new stations from infringing on their turf. With help from powerful allies in Congress, the National Association of Broadcasters has managed to temporally block further FCC action to opening up the radio spectrum to community and neighborhood voices. [SOURCE: Wall Street Journal (B1), AUTHOR: Kathy Chen] * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From owner-scn Wed Mar 24 21:58:15 1999 From: owner-scn (owner-scn) Date: Wed, 24 Mar 1999 21:58:15 -0800 (PST) Subject: ADV: Wasting Dollars in Equipment Repair&Replacement?? Message-ID: <199903250558.VAA24600@scn.org> ----------------------------------------------------------------------- Note: We mail to people whom we feel are interested in what we have to offer and do not allow anyone else to use our list. Once in a while we'll notify you of web sites, products, services and promotions that could be of special interest to you. We respect your right to privacy. If you do not wish to receive these notices and prefer never to hear from us, simply click on the link provided and put REMOVE in the subject line mailto:info at target4u.com ----------------------------------------------------------------------- Has Your Spending Power Been Cooled? Is Your Air Conditioner Stealing From You? *Wasting Dollars in Energy Misuse! *Wasting Dallars in Equipment Repair! *Wasting Dollars in Equipment Replacement! KEEP THOSE DOLLARS IN YOUR POCKET! STOP HIDDEN THEFT BY CORROSION FOR ONLY $44.95 SAVE $35.00 OFF RETAIL KIT PRICE OF $79.95! CORROSION in the form of coastal salt air, sulfer water, sea water, acid rain, chlorine vapours from swimming pools and jacuzzies, along with animal urine and bird and insect fluids containing uric acid, cause severe corrosion to your copper/aluminium air conditioning coil. THE COST of corrosion is two fold. It shows up as early replacement of your air conditioning coil or compressor and lost operating efficiency or higher energy use. NOW YOU can use the same product commercial and industrial firms use to protect the coils on their new and exsiting air conditioners. They know the cost of corrosion and value of saving energy. Husky "Green Fin" Coil Protector Aerosol Kit from Bronz-Glow $44.95 Plus $5.50 S&H Buy Case Lots for $179.80 + $8.95 S&H (4 kits per case) See our kit at: http://www.bronz-glow.com/hgfk.htm Offer Expires April 30th, 1999 Florida Residents Add 6.5% Sales Tax ORDER NOW AND RECEIVE A FREE INSTRUCTIONAL VIDEO AND FREE COIL CARE MAINTENANCE BOOK, A $15.00 VALUE FREE! NOT AVAILABLE THROUGH HOME CENTERS. USE VISA OR MASTERCARD CALL...1-800-555-6385 EXT. 23 Office Hours 8:00am to 4:30pm Eastern Starndard Time Allow 4-6 weeks for delivery __________________________________________________________ This message complies with the proposed United States Federal requirements for commercial e-mail bill, Sec. 301 For additional info see: http://www.senate.gov?-murkowski/commercialemail/EmailAmendtext.html. Per section 301, Paragraph (a) (2) (C) of S. 1618, further transmissions to you by the sender of this e-mail may be stopped at no cost to you by sending a reply to this e-mail address with the word "REMOVE" in the subject line. Reply to info at target4u.com __________________________________________________________ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Fri Mar 26 08:48:54 1999 From: steve at advocate.net (Steve) Date: Fri, 26 Mar 1999 08:48:54 -0800 Subject: Privacy Message-ID: <199903261651.IAA26258@scn.org> x-no-archive: yes The Internet wants your personal info. What's in it for you? Business Week 4/5/99 Rima Berzin recently inherited a laptop computer from her husband and began an intense two-day honeymoon with the Internet. She went all the way: buying jeans at Gap, browsing for books at Barnesandnoble.com, and registering for Martha Stewart's online journal. While Berzin was shopping, something very un-Martha happened: Her spree left muddy digital footprints all over the Net. Berzin, a Manhattan mother of two, is like a lot of other Americans just stepping onto the Web. When a friend told her how much personal information she had swapped for the convenience of home shopping, she was angry at first, then confused. On Berzin's first visit to Gap, hidden files called ''cookies'' were deposited on her computer. Other software programs whirred into action to track and analyze her online behavior. Marketers didn't know her name at first, but the anonymity evaporated when Berzin made her first purchase. ''You can say no to being tracked,'' says the former strategic planning executive, ''but it takes a great deal of work, and sometimes it pays to say yes.'' No one hacked Berzin's credit card or stole her identity. Such crimes are still rare on the Net. The apprehensions that engulfed Berzin are more far-reaching than fear of theft and resonate across society. Personal details are acquiring enormous financial value. They are the new currency of the digital economy. Indeed, a $50 billion freight train called electronic commerce is bearing down on Berzin and millions of consumers now venturing forth on the Net. That train is powered by an insatiable need for personal information--details about what individuals do online that help businesses zero in on customers. This train is on a collision course with consumer sensibilities. Personal information is vulnerable to abuse. Failure to apply checks and balances today will change our lives and our notions of what belongs to us as individuals. ''The ability to establish a digital trail is unlike anything we've had so far in history,'' says Constance E. Bagley, a Stanford University lecturer in law. As companies race to collect personal data and exploit them, consumers are being confronted with urgent trade-offs and choices about how to cover their tracks in cyberspace--or whether they should. If they decide not to hide, how should they be compensated for the information they reveal? Businesses also face arduous trade-offs. Rightly, they fear a backlash over breaches of privacy. Cries for regulation have already reached Washington. If consumers like Berzin opt to conceal themselves or bolt from the Net or bind it in new laws, E-commerce could choke in its infancy. By slapping high prices on personal information, E-business adds a frightening new dimension to the privacy debate. That fear extends across society. Hospitals and schools, for example, are constructing vast national databases with everything from your child's fourth-grade report card to the unique twists and turns of your DNA. Businesses want that information, and in the online world--where virtually every piece of data is for sale--they will probably get it. ''You already have zero privacy. Get over it,'' Sun Microsystems Inc. CEO Scott G. McNealy glibly noted at a recent computer-fest. Most Americans might find that hard to swallow. Many are starting to understand that what companies discover can hurt them. First comes the nuisance: a blizzard of junk mail. Then come the real dangers: Companies on the Web that know consumers' shopping habits and history can engage in sophisticated kinds of discrimination. If a business finds out that you, for example, are not a big spender, it may leave you dangling on help lines, refuse to notify you of juicy deals and discounts, or cut you off as a customer. And you won't even know you've been a victim. ''It's very hard to show the discrimination occurred because somebody had access to personal information,'' says Deirdre Mulligan, staff counsel at the Center for Democracy & Technology in Washington. Then there's the danger that the discrimination could be based on information that is false or out of date. ''There hasn't been a data system built yet that is not fraught with inaccuracy,'' warns privacy activist Robert Ellis Smith. Even when information is correct, it may be damaging--and none of anyone's business. Digital trails that imply or prove that you have AIDS, for example, could cause employers or insurers to snub you. Suppose you're a college student accused of date rape, says Jason Catlett, a privacy advocate. ''What happens when the prosecutor finds out that you were on a porno site the night before?'' To get consumers protection, privacy advocates have been mobilizing politicians, leading to scores of federal and state privacy bills. A few are calling for tight government controls on personal information. (Europe stiffened such safeguards last fall.) E-businesses can't abide these regulations, worrying that such steps will cost them money. So they are trying to police themselves. Many popular sites post privacy policies and increasingly sport seals of approval from the Better Business Bureau and others, which purport to verify adherence. But all these efforts come up short--in part because life on the Net is so complex. Information you willingly share with one company may be sold without your knowledge to somebody else. Privacy pledges posted on Web sites have limits and may not be enforced. Your personal data can become the property of strangers through subpoenas, corporate mergers, police investigations, or hacker attacks. And the results of your latest medical exam could turn up in the hands of a potential employer. One reason simple protective measures fail is that consumers aren't sure they want them. Although they are worried that their privacy may be violated, they realize that personalized service on the Web can be very attractive. A Web site that recalls your tastes and buying habits can save you time and find bargains that suit you. What you see may depend on where you live, where you browse, what images tend to hold your eyeballs, and whether you have the loot to do more than look. As a result, consumers send confusing signals. One day, they are up in arms over Intel Corp.'s ability to track Web surfers through identifying codes on their new Pentium chips. The next, thousands race to trade their names, income levels, and hobbies in return for a Free-PC with built-in ''market to one'' advertising. E-commerce, more than conventional business, needs this personal connection for several reasons. First, despite their lofty stock valuations, Web-based businesses with little or no earnings can't afford to constantly solicit new customers. They need repeat business. At Excite Inc., for example, customers who exchange tidbits about themselves in return for a personalized experience--in the form of selected news, movie listings, local weather, etc.--return to the site roughly 20 times more often than those who don't, says Joe Kraus, Excite's co-founder and senior vice-president. Armed with loyal customers, Excite can then pile on additional services and boost its income. It can offer advertisers banner ads and ''pop-ups'' aimed only at the customers deemed most likely to respond. Sites can also earn commissions for routing customers to other locales. For example, visitors to technology review pages at CNET Inc., a news site, may click through to a computer company and purchase a PC. CNET gets a flat fee for each customer. Customers' data will become more valuable as databases from various sites are linked. That includes information from cookies, the files that many sites deposit on your hard drive when you visit. These files, which identify you when you log on, were initially designed to communicate only with the site that deposits them. Now, though, online marketing firms with names like DoubleClick, AdKnowledge, MatchLogic, and Engage may merge data from multiple cookies. That, in turn, can be collated with personal information scattered among census and motor-vehicle databases, credit reports, education and health records, and toll systems such as E-Z Pass. As they consolidate their reach across these offline databases, Web sites may also apply powerful software tools to monitor and make money from the buying and browsing habits of their visitors. For years, banks and telecom companies have been using technology called data mining to track customer trends and spot fraud. Now, the tools are getting more powerful, and they are moving onto the Web. These tools are becoming available just as massive databases are consolidating. Experian Information Solutions Inc., the giant credit-report company, has a stake in online marketer AdForce Inc. Meanwhile, an information aggregator, Acxiom Corp., is hawking data on more than 176 million individuals and 96 million households. ''They follow you more closely than the U.S. government,'' says Anthony Picardi, top software analyst at International Data Corp. Adds Thomas F. Kelly, president and CEO of Neuron Data Inc., a Silicon Valley maker of customer-tracking software: ''The privacy trade-off is the dirty little secret that everyone in the business thinks about and talks about to each other but never brings up in public.'' Consumers have caught a whiff of these secrets and don't like the smell. In a November Louis Harris & Associates Inc./Alan F. Westin survey of 1,000 adults, 82% complained they had lost all control over how their personal information is used by companies. Three out of four said businesses asked for too much information. And though millions of consumers bought gifts on the Web last Christmas, a BUSINESS WEEK/Harris poll last month showed that two-thirds of American adults are ''not willing at all'' to share personal and financial information about themselves online in return for more targeted advertising. Even when it isn't threatening, personalization on the Net can get a little crass. Imagine if people fawned over you as much offline as they do online: Say you went to a restaurant with a date, had burgers, paid with a credit card, and left. It's over. But if it were online, the next time you showed up, the waitress, searching her file of private information, would say, ''Hey Joe, how are you? Fran is over there; would you like to sit with her again?'' Never mind that you're with another date. Then you would find out they've already cooked your burger and are ready to charge your card. When it comes to this kind of personalization online, says Tara Lemmey, executive director of the Electronic Frontier Foundation, ''there's a fine line between good service and stalking.'' Web startups aren't the only ones that know how to stalk. In January, Intel came under fire for designing its Pentium III chips with serial numbers that can be identified remotely on the Web. That makes it easier for users to be tracked. Two months later, privacy buffs hammered Microsoft Corp. because its Windows 98 software, used on a network, creates identifiers that are collected during registration. The result is a vast database of personal information about Microsoft customers. Microsoft insists that the features it added were designed to improve services. But fearing a backlash, it has promised to modify the feature. It claims customers can bow out when they register for Win98, and it promises to expunge personal data it collected improperly. ''This isn't just an ethical issue. Privacy is good business,'' says Saul Klein, a Microsoft senior manager of Web services. GeoCities learned that lesson last year when the Federal Trade Commission accused the owners of this booming online community of selling personal information without members' consent. The site admitted no wrongdoing but agreed to implement tougher privacy policies. Says privacy activist Marc Rotenberg: ''It's too easy for Web pages to turn into trick mirrors. The marketer gets to see through to you, but all you get to see is your own reflection.'' When consumers see a big payoff, however, some of them are more than willing to trade their personal information. ''As long as you give people something in return, they're thrilled,'' says Bill Gross, the Pasadena (Calif.) entrepreneur who founded idealab!, an incubator for Internet startups. In February, he unveiled Free-PC Inc. on the premise that people would part with detailed personal information and put up with a constant barrage of ads in exchange for a $500 computer. Privacy advocates mocked the proposition as a loser. But within days of announcing registration, the company fielded more than 1.2 million applications. Some companies use the gold mine of consumer data to discriminate against customers who don't make the grade. You might call it ''Weblining.'' At Sanwa Bank in California, customer-service reps use Net-based programs to classify customers into A, B, and C categories. The least-valued Cs are the ones most likely to end up on hold when they call in for service. Angie Blackburn, who oversees Sanwa's phone and online banking, defends the practice. ''Obviously, if we have a customer...who has a significant amount invested, you want [him or her] to be treated extra special,'' she says. Weblining's grim implications are clear, however--and can be part of the software sales pitch. Makers of these tools say the onus lies with the company that uses them, not the creator. With data-mining software, ''people can be segmented any way a company wants to slice and dice them,'' including creed, color, and religion, says Kenneth Volpe, an executive at Boston-based Art Technology Group, which sells such programs. So far, Web marketers haven't broadened their quest for personal data to schools or hospitals. But it may be inevitable. Think of the advantages if they could hit you with ads for special foods for your diabetic aunt or Web-based tutoring for your struggling teenager. ''If you are a business, data in health records add up to one big sales opportunity,'' says Dr. Richard Epstein, a psychiatrist in Bethesda, Md. School districts from New York to Oregon have begun replacing old stand-alone computers with high-speed networks, each with the ability to profile and track students. One day, these networks will connect to a nationwide data-exchange program organized by the Education Dept. to boost school efficiency and pinpoint the sources of learning problems. The program will make student information available to other schools, universities, government agencies, and, potentially, to employers. It's not just the three Rs. Now, it can be parent income, health problems, and meetings with the school shrink. Gayle Cloud, a mother of six in Riverside, Calif., finds this alarming. ''They want to track my children from cradle to grave,'' she says. The medical parallel to this is even more disturbing. Pressed by health-maintenance organizations, hospitals are struggling to rein in costs, and they are loading up on information technology to help. As health records are linked to financial, employment, and managed-care databases, they can be hacked or transferred to outsiders when HMOs or hospitals merge or are dismembered by creditors. ''If you have a medical record, you have a medical privacy problem,'' says Senator Patrick Leahy (D-Vt.), the chief architect of a closely watched medical privacy bill. Consolidating this data in one place makes it more vulnerable to theft or abuse. Says Joe Pellegrino, manager of database administration for New York Presbyterian Hospital: ''There's no question this is leading to a national universal medical database.'' Already, hospitals exchange data on individual patients, he says. ''The next step is to take these statewide databases, containing details on your allergies, your mental health, or your sexually transmitted diseases, and make them accessible.'' There are, however, many jarring trade-offs in the medical-privacy debate. When managed right, medical data in digital form cut health-care costs, hasten and improve diagnoses, and reduce cases of prescription mix-ups. Computers also help administrators track doctors and spot unprofessional behavior. In genetics, digitized DNA repositories help scientists searching for links among genes and diseases--just as they help the FBI collaborate on manhunts across continents. Down the road, doctors will tailor drug treatments to patients' total medical profile, including their genetic makeup. Even so, many Americans are deeply concerned about medical-data abuses. Neither doctors nor patients want records to leave the doctor's office except where necessary for insurance purposes. ''Your doctor took the Hippocratic oath,'' says Robert Gellman, a privacy consultant in Washington. ''The CEO of your health plan did not.'' These concerns now have Washington's ear. Leahy's medical bill would give patients the right to limit disclosure of their medical records to those with a need to know. And in the financial arena, Senator Paul S. Sarbanes (D-Md.) and others are trying to regulate the sale of customers' records and the swapping of records in mergers. E-businesses see regulation as the wolf at the door. The Online Privacy Alliance has mobilized more than 80 companies and trade associations to fight back. About 500 companies are already displaying a ''trustmark'' seal of approval from TRUSTe. Recently, the Better Business Bureau added its own seal of approval. In addition, the Net is spawning the ''infomediary''--an information broker that protects Web users' privacy or barters it to find them bargains. The trouble is, infomediaries, like other Web businesses, must cough up their lists as soon as a cop or bankruptcy judge comes knocking. Techies are at work on solutions to protect privacy. None of these efforts seems a silver bullet. David J. Farber, Moore Professor of Telecommunications at the University of Pennsylvania, believes nothing short of Europe's privacy directive will suffice. ''Maybe you don't feel threatened in today's political climate,'' he says, ''but imagine if this type of information and the tools to tap it were in the hands of a Joe McCarthy.'' Sure enough, the secret codes, cookies, and digital trails are proliferating by the millisecond. Most of us have already surrendered more personal details than we could ever imagine. Cybernauts have one thing on Joe, though: The Net is a grand communications channel that returns a modicum of power to consumers. If you doubt it, note how quickly Microsoft and Intel backed off when a cry went out on the Web. Now comes the hard part: figuring out what we can get for the information we give. By Edward C. Baig, Marcia Stepanek, and Neil Gross in New York, with bureau reports Copyright 1999, by The McGraw-Hill Companies Inc. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Fri Mar 26 14:02:11 1999 From: steve at advocate.net (Steve) Date: Fri, 26 Mar 1999 14:02:11 -0800 Subject: Linux Message-ID: <199903262204.OAA07928@scn.org> x-no-archive: yes =========================== This story will likely resonate with many SCN users... A Labor of Linux: The exquisite torture of installing Linux as a computer novice. Eliza Truitt Slate 3/26/99 Linux may be impractical for the masses, but its rebel cachet--"The Man doesn't have me under his thumb!"--appeals to the motorcyclist in me. Walking out of a bookstore with a Linux manual under your arm is like swaggering into a restaurant carrying a motorcycle helmet: You can feel the waves of envy. Since my technical education ended with a seventh-grade "Computer Literacy" class in which we played "Lemonade Stand" on an Apple IIe for half an hour twice a week, my Linux goals for this article were modest: 1. Prove that a computer ignoramus can install the operating system on a computer that was running Windows 98. 2. Install a Linux-compatible Web browser and read Slate in it. 3. Install a few other Linux applications. Purchasing Linux in a book, I must admit, was a second resort. Originally, I intended to download the free version of the much-heralded operating system, but then I found out that it would take five hours and that the download doesn't come with instructions. Chickening out, I visited the computer section of my local bookstore and grabbed a copy of the friendly yellow Linux for Dummies. But the cashier all but refused to sell it to me. "You can't get that book," he said, obviously speaking as one of the Linux initiate. On his advice I paid $34.63 plus tax for Mastering Linux, a phone-book-sized tome, which includes a copy of Red Hat Software's 5.1 version of Linux on CD. Cracking Mastering Linux open, I was struck by its similarity to motorcycle manuals. "Remove cylinder head," says the average motorcycle manual, without explaining how you do that. "Create boot disk," commands Mastering Linux. What's a boot disk? I found myself turning to a dictionary of computer terminology on the Web to decipher every third acronym (BIOS? ATAPI? SCSI?) and figured out that in this case you create an installation boot disk by copying files from the CD to a floppy. After creating the boot disk, I was supposed to make a new partition on the hard disk of my computer, a Pentium 133 with 32 megs of memory. Partitioning a hard disk means corralling off some space, and that can be done in Windows with a program called "fips," which I copied from the Linux CD onto a floppy in Windows. I then restarted Windows in DOS mode (one of the options when you shut down Windows 98) and ran "fips.exe" from the floppy. Although I had never used DOS before, I followed the straightforward directions and made room for Linux. The next step was to run the Linux installation program from the boot disk. I shut the computer down and put the boot disk in the drive and turned the computer back on. Success! The boot disk asked me to check boxes for the language and the keyboard I'd be using, and the source from which I'd be installing Linux. I told it to go to my CD-ROM drive where the Linux CD resided--and promptly hit a brick wall. The program refused to recognize my CD-ROM drive, a fairly standard one, and rejected the 11 nonstandard options from the list. I studied Windows' device manager for clues on my CD-ROM drive. Mastering Linux suggested that if the installation program fails to detect your drive, provide very specific directions for the "IO" and "IRQ." I entered these new settings and still failed. Everyone who talks up Linux mentions how "elegant" it is. As I tinkered, rebooted, and failed, and tinkered, rebooted, and failed over and over again to get it to recognize my CD-ROM drive, all I could think was: yeah, elegant like a Judas Cradle. And this was only the installation program. So I telephoned the Microsoft Helpdesk. Even though Linux is supposed to demolish Microsoft, the Microsoft Helpdesk, which provides computer assistance to its employees, was surprisingly helpful. As I described my trouble, the Help guy replied, "You're setting up Linux?" Pause. "Um, you know we don't really support that?" Yeah, I know, but can you help me anyway? "Well, I don't know much about Linux, but talk to Clarence (not his real name). He'll help you." In 15 or so calls to the Helpdesk, I encountered only one person who sounded annoyed rather than curious (and even, dare I say, gleeful) at the fact I was firing up Linux. The Linux that came with Mastering Linux was never going to communicate with my CD-ROM drive, and I began to lose all enthusiasm for the project. Just the sight of Mastering Linux induced the stomach-churning sense of dread that my sixth-grade math textbook once gave me: "I don't get this. Other people get this. Why don't I get this? I think I'll go watch TV." Instead of watching TV, I made a fresh start by purchasing a newer version of Linux. The version of Linux that comes in Mastering Linux offers no technical assistance, but Red Hat's version 5.2, which costs $39.99, promises one month of free e-mail support. The Red Hat manual offered clearer directions, and the new version automatically partitioned my hard drive. But it still snubbed my CD-ROM drive. I e-mailed Red Hat with my problem and the company e-mailed back a one-line response: "Set your BIOS to boot off of the CD." I wrote back: "How do I do that?" Red Hat's e-mail answer was another one-liner, a URL. I clicked the link, which led to a page of more links to lots of information on BIOS, but a half-hour search yielded no information on booting from the CD-ROM drive. I e-mailed back asking for a more specific URL, and they wrote back, "Look around there. ... You also may want to check the site of whoever manufactured the motherboard." Thanks a bunch. With Microsoft Helpdesk assistance I figured out that my CD-ROM drive was probably connected to my sound card and not to the IDE port, and thus was foiling Linux. I reluctantly returned to Mastering Linux and found an alternative method for installing the operating system for people who don't have CD-ROM drives: install from the hard disk. For this you create a "supplementary disk" from the CD-ROM and use it after booting from the installation disk. The supplementary disk loaded an unfamiliar blue "Welcome to Red Hat Linux" page, but after 10 minutes of nothing happening, I figured I had worn out my welcome. I turned off the computer and went home. My next move was to hornswoggle a friend, a tech guy at the New York Times Web site, into helping me. I informed him of my CD-ROM/sound card suspicions, and he pried open my computer's metal box and started gabbing about 40-pin connections. My troubles were over. Here was someone who knew the acronyms, someone who could shine a light into the cave I was blindly fumbling in. So with the CD-ROM drive securely connected to the correct IDE port in my motherboard, we booted up again. Again, no dice. It was a new low in my Linux morale. Any IDE Port in a Storm After some chin scratching my friend suggested we look into my BIOS setting. There he discovered my IDE port was disabled. He enabled it. We booted up and victory! The CD-ROM drive started purring, and from there the installation was cake. The hard disk whirred away, occasionally asking for information. I typed it in, it whirred some more, and within an hour installation was complete. I then logged on as "root"--the master user--and loaded X Windows, Linux's graphical user interface. It looked like a pale and wan version of Microsoft Windows--with tiny, little crude buttons--even though it predates Windows. But it worked. I loaded the Netscape browser and tried to call up Slate, but Slate did not appear. Instead I got two error messages, one telling me to adjust my SOCKS environment, and another saying there was something wrong with my DNS server. So I was on the phone with the Helpdesk again, learning about my SOCKS and my DNS server. My officemate suggested that maybe all I needed to do was adjust my proxy settings in Netscape and not my SOCKS. He was right, and victory was mine. Next I wanted a word processing program. I downloaded WordPerfect 8 for Linux from Corel's Web site. I unzipped and "untarred" (de-archived) the program. I installed it. And it didn't run. I bribed my tech guy friend to come and help me again. He went back to the original download and started over, but he couldn't get it to run either. So he fiddled around with my PATH and a few other things beyond my comprehension, when a "core dump" occurred. This is some type of serious error, although I'm still not sure exactly what it is. So we started over and downloaded again. After reinstalling and receiving increasingly mournful error messages ("Unable to go on," "Floating point exception") and another core dump, we called it quits. Three and a half hours of help from a guy who makes his living working with computers and no WordPerfect to show for it. Why would a person like me want to use Linux? The first reason is price. Linux is free if you download it off the Web. With a manual and a CD it's about $40. Compare that with Windows 98: $199 for a full setup, $89 for an upgrade, or bundled for "free" as part of nearly every non-Macintosh computer. I didn't investigate running Windows software under a Linux Windows-emulator, mostly because I already have Windows on my system to run Windows software. I also didn't attach my Linux machine to the company network--because I couldn't find easy instructions in my books, and further consultations with the Helpdesk would have been cheating. I'm fairly certain that setting up a printer is easy, but I'm taking the word of Linux experts on this. Either I'm not ready for Linux, or Linux isn't ready for me. Or both. I feel guilty about having used not one but two manuals to install Linux, and worse still that I couldn't make WordPerfect work. I feel malignantly guilty about having paid cash money for a free operating system and for enlisting both the Helpdesk and a friend in my endeavor. Yes, I finished the marathon, but I did it by putting on roller skates and grabbing the suspenders of those who knew what they were doing. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Mon Mar 29 11:05:18 1999 From: douglas (Doug Schuler) Date: Mon, 29 Mar 1999 11:05:18 -0800 (PST) Subject: If you haven't heard enough about Y2K... Message-ID: <199903291905.LAA04612@scn.org> CPSR WINTER NEWSLETTER FOCUSES ON Y2K "Will my house be warm on January 1, 2000?" "Will I be able to fill my gas tank?" "Will we have an accidental war?" "Should I take all my cash out of the bank?" Those are the questions inundating CPSR members. The most obvious response CPSR can make is to dedicate an issue of the CPSR Newsletter to sating the thirst with our "take" on the issues. A BREAKTHROUGH FOR CPSR PUBLICATIONS The Special Winter 1999 Issue of the CPSR Newsletter will be our first-ever completely online. You can link to it from our home page or from: http://www.cpsr.org/publications/newsletters/issues/1999/Winter1999/. If you wish, we can email you a text version or mail you a transcript. Just let our office know at cpsr at cpsr.org. Guest editor: Marsha Woodbury. WHAT YOU'LL FIND � Arthur C. Clarke's chapter, "The Century Syndrome," from his novel, The Ghost from the Grand Banks. � "A Perspective on Y2K," by Peter Neumann, who won the Norbert Weiner Award in 1997 for his work on documenting computer risks. He views Y2K as a serious concern and also as the tip of a much larger iceberg of computer risk. � Gary Chapman, former Executive Director of CPSR, has two articles: "Now for Another Daunting Y2K Task: Educating America's Masses," and "A Moral Project for the the 21st Century: Stop Creating Better Weapons." � Tony Ralston, professor emeritus of computer science and member of the CPSR advisory board, gives his impressions of the Y2K problem in "Y2K and Social Responsibility." � Lenny Siegel's article "OOPs 2000: The Y2K Bug and the Threat of Catastrophic Chemical Releases." � Khursch Ahmed, David Parnas, Barbara Simons, and Terry Winograd express their nuclear weapons concerns � Norman Kurland and others in the CPSR Y2K Working Group wrote the "How Y2K Will Impact the New York Times." � Marsha Woodbury, Chair of CPSR, contributes the introduction, "Y2K: A Broad View." � Y2K Humorfrom the Internet and Beyond," collected by friends and members. � Chapter news, letters to the editor, a cartoon, and more. Let's use Y2K to explore computer risks and our relationship to them. Take a look at the Y2K newsletter! > -- Susan Evoy * Deputy Director http://www.cpsr.org/ Computer Professionals for Social Responsibility P.O. Box 717 * Palo Alto * CA * 94302 Phone: (650) 322-3778 * Fax: (650) 322-4748 * Email: evoy at cpsr.org Donations online: https://swww.igc.apc.org/cpsr/sec-membership-form.html * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bb156 at scn.org Mon Mar 29 14:30:24 1999 From: bb156 at scn.org (bb156 at scn.org) Date: Mon, 29 Mar 1999 14:30:24 -0800 (PST) Subject: If you haven't heard enough about Y2K... Message-ID: I couldn't resist... > Y-to-K Date Change Project Status > > Our staff has completed the 18 months of work on > time and on budget.We have gone through every line > of code in every program in every system. We have > analyzed all databases, all data files, including > backups and historic archives, and modified all data > to reflect the change. > > We are proud to report that we have completed the "Y-to-K" > date change mission, and have now implemented all changes > to all programs and all data to reflect your new standards: > > Januark, Februark, March, April, Mak, June, Julk, > August, September, October, November, December > > As well as: > > Sundak, Mondak, Tuesdak, Wednesdak > Thursdak, Fridak, Saturdak > > I trust that this is satisfactory, because to be honest, > none of this Y to K problem has made any sense to me. But > I understand it is a global problem, and our team is glad > to help in any way possible. > > And what does the year 2000 have to do with it? > > Speaking of which, what do you think we ought to do next > year when the two digit year rolls over from 99 to 00? > > We await your direction. -Andrew ,_____,_____, 6 __ _ User: bb156 T\ :. .^\,_/_\_|_ /_| _/_ _ )__/'_ _ ' _ Domain: scn.org I ^T=====;=====T /| ( |/)(// (-((/ / //(/(///)_) Seattle, WA I I _|_| _/_/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From karyn at accessone.com Mon Mar 29 20:04:03 1999 From: karyn at accessone.com (Karyn Quinlan) Date: Mon, 29 Mar 1999 20:04:03 -0800 Subject: If you haven't heard enough about Y2K... In-Reply-To: <199903291905.LAA04612@scn.org> Message-ID: <3.0.1.32.19990329200403.009b7980@mail.accessone.com> The public has indicated a strong interest in CPSR's perspectives on y2k. Personally, my interest in all things y2k is flagging. I'd like to see CPSR better articulate a coherent voice on the largely ignored, but ultimately far more important, techno-social-political issues of our times. Perhaps we will yet. It seems that we are on the brink of bigger things. That said, *if* I am going to read more about y2k (and I suppose I will). I look forward to reading about it from the minds of Peter Neumann, Terry Winograd, Gary Chapman and other CPSR notables, past and present (and seminal sci-fi writer, Arthur C. Clarke, The Sentinel [2001: A Space Odyssey] and the inventor of the synchronous satellite, no less!). Link to CPSR's first online issue at: http://www.cpsr.org/publications/newsletters/issues/1999/Winter1999/ Karyn CPSR/Seattle At 11:05 AM 3/29/99 -0800, Doug Schuler wrote: > >CPSR WINTER NEWSLETTER FOCUSES ON Y2K > >"Will my house be warm on January 1, 2000?" >"Will I be able to fill my gas tank?" >"Will we have an accidental war?" >"Should I take all my cash out of the bank?" > >Those are the questions inundating CPSR members. >The most obvious response CPSR can make is to dedicate >an issue of the CPSR Newsletter to sating the thirst with >our "take" on the issues. > >A BREAKTHROUGH FOR CPSR PUBLICATIONS >The Special Winter 1999 Issue of the CPSR Newsletter will >be our first-ever completely online. You can link to it >from our home page or from: > >http://www.cpsr.org/publications/newsletters/issues/1999/Winter1999/. > >If you wish, we can email you a text version or mail you a transcript. >Just let our office know at cpsr at cpsr.org. Guest editor: Marsha Woodbury. > >WHAT YOU'LL FIND >¥ Arthur C. Clarke's chapter, "The Century Syndrome," >from his novel, The Ghost from the Grand Banks. > >¥ "A Perspective on Y2K," by Peter Neumann, who won >the Norbert Weiner Award in 1997 for his work on >documenting computer risks. He views Y2K as a serious >concern and also as the tip of a much larger iceberg of >computer risk. > >¥ Gary Chapman, former Executive Director of CPSR, has >two articles: "Now for Another Daunting Y2K Task: >Educating America's Masses," and "A Moral Project for >the the 21st Century: Stop Creating Better Weapons." > >¥ Tony Ralston, professor emeritus of computer science >and member of the CPSR advisory board, gives his >impressions of the Y2K problem in "Y2K and Social >Responsibility." > >¥ Lenny Siegel's article "OOPs 2000: The Y2K Bug and the >Threat of Catastrophic Chemical Releases." > >¥ Khursch Ahmed, David Parnas, Barbara Simons, and >Terry Winograd express their nuclear weapons concerns > >¥ Norman Kurland and others in the CPSR Y2K Working >Group wrote the "How Y2K Will Impact the New York >Times." > >¥ Marsha Woodbury, Chair of CPSR, contributes the >introduction, "Y2K: A Broad View." > >¥ Y2K Humorfrom the Internet and Beyond," collected by >friends and members. > >¥ Chapter news, letters to the editor, a cartoon, and more. > >Let's use Y2K to explore computer risks and our >relationship to them. > >Take a look at the Y2K newsletter! > >> -- >Susan Evoy * Deputy Director >http://www.cpsr.org/ >Computer Professionals for Social Responsibility >P.O. Box 717 * Palo Alto * CA * 94302 >Phone: (650) 322-3778 * Fax: (650) 322-4748 * >Email: evoy at cpsr.org >Donations online: https://swww.igc.apc.org/cpsr/sec-membership-form.html > > > > >* * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * >. To unsubscribe from this list, send a message to: >majordomo at scn.org In the body of the message, type: >unsubscribe local-computer-activists >END > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Tue Mar 30 07:21:34 1999 From: douglas (Doug Schuler) Date: Tue, 30 Mar 1999 07:21:34 -0800 (PST) Subject: *interesting* results from filtering software Message-ID: <199903301521.HAA23296@scn.org> WOW! > Date: Tue, 23 Mar 1999 13:35:58 -0800 From: Karen Coyle To: cpsr-activists at cpsr.org Subject: Bible Censored in Utah Schools/Internet FYI. Also see: "Internet Filter Used in Schools Blocked the Bible" -- http://www.sltrib.com/03231999/nation_w/92388.htm The Censorware Project today released our report, "Censored Internet Access in Utah Schools and Libraries". The report examines the state of Utah's use of a commercial internet censoring product in all Utah public schools and some public libraries, as recorded in the log files generated by the software itself. The log files prove incriminating - they reveal that Utah students are highly unlikely to use the internet for non-scholastic purposes, and that when students or adults are banned from a site by the software, more likely than not, the site was completely innocent. Among the documents banned by Utah: the Holy Bible, the Book of Mormon, the Declaration of Independence, the United States Constitution, all of Shakespeare's plays, and The Adventures of Sherlock Holmes. The Salt Lake Tribune has a front page story on this subject today: http://www.sltrib.com/ Press release: http://censorware.org/press/press_03-23-99.html The Report: http://censorware.org/reports/utah/ ....................................................................... David L. Sobel, General Counsel * +1 202 544 9240 (tel) Electronic Privacy Information Center * +1 202 547 5482 (fax) 666 Pennsylvania Ave., SE Suite 301 * sobel at epic.org Washington, DC 20003 USA * http://www.epic.org * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From karyn at accessone.com Tue Mar 30 12:12:18 1999 From: karyn at accessone.com (Karyn Quinlan) Date: Tue, 30 Mar 1999 12:12:18 -0800 Subject: PUBLIC SPACE IN CYBERSPACE Message-ID: <3.0.1.32.19990330121218.008471b0@mail.accessone.com> FYI... >From: sevoy at quark.cpsr.org >Date: 30 Mar 1999 19:14:46 -0000 >To: cpsrus at quark.cpsr.org >Subject: PUBLIC SPACE IN CYBERSPACE > > >CPSR is a co-sponsor of the report. > > >**Please re-post where appropriate (and excuse cross postings...)** > >March 25th, 1999 > >PUBLIC SPACE IN CYBERSPACE: LIBRARY ADVOCACY IN THE INFORMATION AGE > >is NOW on the web: > >http://www.lff.org/advocacy/technology/public/ > >Public Space in Cyberspace outlines the importance of preserving a >public space in the digital world. It includes profiles of innovative >public libraries operating computer centers, community computer >networks, cable access TV centers, and satellite TV equipment. The >booklet also includes a beginner's policy primer on our legal right to >the affordable use of telephone networks, the Internet, and TV >services. It encourages all public library and information advocates to >work together in promoting a communications network for everyone. > >To order a print copy, write to Libraries for the Future, PUBLIC SPACE >Order, 121 W. 27th Street, Suite 1102, New York, NY 10001. Please >include a check or money order made out to Libraries for the Future for >$9.95 plus $3 shipping and handling. Questions? Contact Jamie >McClelland (jamiem at lff.org, 800-542-1918). > > >************* > >"The right of freedom of speech and press includes not only the right to >utter or to print, but the right to distribute, the right to receive, [and] >the right to read ... " > >Supreme Court, Grisold v. Connecticut, 1965 > >--------- > >Jamie McClelland >Access Harlem/Harlem Partnership Center >Minisink Townhouse >646 Lenox Ave., 3rd Floor >New York, NY 10030 >tel: 212-283-7477 >fax: 212-283-7149 >jamiem at lff.org > >Libraries for the Future >121 W. 27th Street, #1102 >New York, NY 10001 >tel: 212-352-2330 / 800-542-1918 >fax: 212-352-2342 >http://www.lff.org > >> -- >Susan Evoy * Deputy Director >http://www.cpsr.org/ >Computer Professionals for Social Responsibility >P.O. Box 717 * Palo Alto * CA * 94302 >Phone: (650) 322-3778 * Fax: (650) 322-4748 * >Email: evoy at cpsr.org >Donations online: https://swww.igc.apc.org/cpsr/sec-membership-form.html > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bb140 at scn.org Wed Mar 31 12:38:42 1999 From: bb140 at scn.org (Barb Weismann) Date: Wed, 31 Mar 1999 12:38:42 -0800 (PST) Subject: [Open Studio] Independent Electronic Media and the Yugoslavia Crisis (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 25 Mar 1999 12:16:58 -0800 From: Wayne Ashley To: OS Phase 2: ;, OS Phase 1: ; Subject: [Open Studio] Independent Electronic Media and the Yugoslavia Crisis Dear Open Studio Participants: As we all continue to seek ways of deploying the Internet for our own artistic and cultural endeavors, there are volatile situations all over the world where the Internet represents the last possibility for ongoing communication outside the constraints and agendas of official political institutions and intervention. Honor Harger of Australia's Radoqualia has asked me to redistribute the following information about the closure of Yugoslavia's most important independent media entity, radio station B92. Please read this information, view the site, and pass this onto others. Thank you. Wayne Ashley Open Studio >X-From_: owner-xchange at re-lab.net Thu Mar 25 11:00:10 1999 >From: honor >To: xchange at re-lab.net >Subject: (Xchange) Can Xchange help B92 ? >Date: Fri, 26 Mar 1999 04:06:43 +0930 >Sender: owner-xchange at re-lab.net >Precedence: bulk >Reply-To: XCHANGE at re-lab.net > >Dear Friends, > >As you will all know, the airstrikes on Yugoslavia have begun. One of the >outcomes of this war situation is the closure of Yugoslavia's most >important independent media entity, radio station B92. Please help us to >ensure that our friends at B92 continue to be heard during this most >difficult time, by distributing this press realase as widely as you can. > >I apologise to those who receive this message more than once. > >International support is very much needed at this time, and will be greatly >appreciated by everyone involved in this crisis. > >Best regards > >Honor Harger >r a d i o q u a l i a > > > >*** PLEASE REDISTRIBUTE AS WIDELY AS POSSIBLE *** > >Pressrelease >Amsterdam - March 24th 1999 > >Help B92 and the independent media in Yugoslavia Latest news at >http://helpB92.xs4all.nl > >On the night of 24.3.99, the transmitter of Radio B92 from Belgrade was >confiscated by the Serbian authorities. B92's editor-in-chief, Veran Matic, >was held in custody in a police station for well over 8 hours. Despite this >intimidation the station continues its independent news service. > >At De Balie in Amsterdam a support group has been founded. The group >intends to support B92 and other independent media in Yugoslavia where >possible in the continuation of these important news services. > >With the support of internetprovider XS4ALL B92 also transmits its signals >via internet since december 1996. These digital broadcasts are picked up by >the BBC Worldservice and retransmitted via satellite. Through a network of >local radio stations the programs of B92 can be heard throughout Serbia, >despite repeated attempts by the authorities to silence the station. At >this moment it is still possible to follow the broadcasts of Radio B92 in >real audio on their website, at http://www.b92.net > > In light of the current tense situation it is very likely that the >possibilities of B92 to continue its independent news service will be >limited even further. The support group therefore intends to take measures >to distribute news by and about B92 from Amsterdam. For that purpose a >special website has been opened at http://helpB92.xs4all.nl > >B92 is the backbone of the independent news service in Yugoslavia. Without >immediate financial support this last source of independent news for the >inhabitants of this region is endangered. A fundraising campaign is being >started by the support group, in order to send money and equipment to B92 >and other independent radio stations in Serbia and Kosovo as soon as >possible. > >The founders of the support group are: B92, De Balie, De Digitale Stad, >Next 5 Minutes, Press Now, radioqualia (Australia), De Waag (MONM) en >XS4ALL. > >A special B92-fund is being set up to support independent electronic media >in Yugoslavia. You can support the initiative by sending your donation: > >By international money order payable to: > >Press Now >Kleine Gartmanplantsoen >10 1017 RR Amsterdam >the Netherlands > > >Or by international bank transfer to: > >Postbank Amsterdam >Swift address: >INGBNL2A Accountnumber: 7676 >in the name of: Press Now Kleine Gartmanplantsoen >10 1017 RR Amsterdam >the Netherlands > >For more information or to send messages of support, please e-mail >helpB92 at xs4all.nl. You can also digitally support this initiative by >copying the special logo onto your website and linking to Help B92. > >http://helpB92.xs4all.nl/ > > > >r a d i o q u a l i a > > > ((o)) > >audio > -> modulation > >radioqualia at va.com.au >http://www.radioqualia.va.com.au/ > > > | | | | | | | | | | | | | | >(a) (c) (o) (u) (s) (t) (i) (c) ( ) (s) (p) (a) (c) (e) > | | | | | | | | | | | | | | >information&comunication channel | for net.broadcasters >http://xchange.re-lab.net (Xchange) net.audio network >xchange search/webarchive: http://xchange.re-lab.net/a/ > __________________________________ Wayne Ashley Tel. (206) 324-9836 washley at wolfenet.com * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * *