From steve at advocate.net Sun Jul 1 09:39:25 2001 From: steve at advocate.net (Steve) Date: Sun, 1 Jul 2001 09:39:25 -0700 Subject: SCN: Censorship Message-ID: <3B3EEFCD.10694.206ACBB@localhost> x-no-archive: yes ============================ (Amy Benfer, Salon)---Marjorie Heins, a First Amendment attorney and the director of the Free Expression Policy Project at the National Coalition Against Censorship, has spent most of her professional life fighting censorship. Over the years, she says, she realized that she was constantly coming up against the assumption that censorship -- from obscenity laws to book banning to V-chips to Internet filters -- could be justified if the material in question presented clear "harm to minors." "Even people in the civil liberties camp," says Heins, "were of the mind that there is a great social necessity to censor material that minors are exposed to. The debate wasn't going anywhere -- it wasn't even a debate." What, exactly, is material that causes "harm to minors"? Is it "Huckleberry Finn" or the work of Maya Angelou? Violent video games or R-rated movies? Graphic sexual content or comprehensive sex education? Actually, as Heins found out, all of the above have been suppressed in the name of protecting children, despite the fact, she says, that social science has failed to provide convincing evidence that exposure to sexual or violent content has any negative impact on minors whatsoever. Heins decided to trace the history of American obscenity laws to find the roots of the "harm to minors" argument. The result is "Not in Front of the Children: 'Indecency,' Censorship, and the Innocence of Youth," a book that chronicles the ideological and political underpinnings of censorship from Plato to the Victorians to the present day. Not only have the First Amendment rights of adults been abridged in the name of protecting the innocence of youth, Heins argues; many times, obscenity laws have actually done more harm to minors than good. Because of censorship, many children have not been equipped with the critical thinking skills necessary for living in a democratic society, she says. In some cases, minors have been denied access to information -- like comprehensive sex education -- that could literally save their lives, maintains Heins. "I would like to move the political dialogue beyond the repetitive media bashing, censorship laws, restrictions on school libraries, Internet filters," says Heins. "It's reached the point of an epidemic. It's not advancing any social purpose." In a telephone interview from her office in New York, Heins spoke about the fallacy of the "harm to minors" argument, the insidiousness of V-chips and Internet filtering and her belief in the need to replace media censorship with media literacy. You were involved in ACLU vs. Reno, the case in which the Supreme Court ruled against the 1996 Communications Decency Act. In December 2000, Congress passed a law mandating Internet filters on all library computers if a library receives federal funds. Is a law mandating filters any less censorious than one that criminalizes certain kinds of content on the Web? The Communications Decency Act was a criminal law, based on an "indecent" or "patent offensiveness" standard. We had plaintiffs from Human Rights Watch to Planned Parenthood to Stop Prison Rape to Wildcat Press, a gay and lesbian press for teens [all of whom would have had their sites blocked under the act]. The Supreme Court agreed with us that "patent offensiveness" was a standard that was much too broad. After the defeat of the CDA, Internet filtering became more and more aggressively promoted by the manufacturers of the product and political leaders. In many ways, Internet filters are more insidious than a criminal law, because criminal law looks at the context: whether or not limiting access will be a deterrent, how many people will be affected and so on. But with an Internet filter, you have direct censorship with a very broad brush. All the filters have to rely on keywords. Some of them claim to be beyond the early, primitive days when they blocked out "breast cancer" and "breast of chicken," "Anne Sexton" and "sex discrimination." But there is no way that any of these companies can screen over a billion Web sites, many of which change daily, so they have to rely on mechanical means. And no matter how sophisticated your software, you are relying on a machine that identifies words and phrases. About a year ago, a company claimed it could find pornographic images. It turned out that their filters were blocking out landscapes! Here is another example: "At least 21" and "no one under 18" are key phrases that are often found on pornographic sites, though those sites often have a barrier anyway -- usually, you have to give a credit card number. But these phrases are also found in news reports. I'm looking at my screen right now: "At least 21 people were killed in Indonesia." That site was blocked by Cybersitter. On top of these examples of unintentional blocking, you also have intended blocking. Almost all of these filters intentionally block access to sex education. Like a lot of us, they can't distinguish between pornography and sex education. In your book, you point out that the idea that children must be "protected" from sexual knowledge is a relatively new construction. When did this idea begin to take hold? Censorship did not focus on sexuality until relatively late in history. Obscenity law, which was an invention of the 19th century, grew out of a concern for youthful sexuality, specifically masturbation. You had all these appallingly cruel anti-masturbation devices and machines that were literally attached to children and adolescents at night to prevent the practice. It was made into a great taboo. Generations of children really did suffer all kinds of physical and mental harms from this repression of a natural impulse. Obscenity laws were an outgrowth of this need to control the vulnerable child. It wasn't until after an evolution of 100 years, during which all kinds of literary and artistic works were literally burned, that we began to recognize the need for a more liberal standard for adults with regard to obscenity. Do children and adolescents have the right to free speech? In theory, they do. The case in which the Supreme Court declared that most clearly was in 1969, when students were given the right to wear black armbands. But that had nothing to do with sex; it was about politics. In the last 30 years, even for nonsexual expression, the court has backed away from protecting students' right to free speech. Even back in the '60s and '70s, if the content was sexual, the courts had a different standard. The year before the black armband case, the Supreme Court upheld the conviction of a candy store owner who sold a girlie magazine to a 16-year-old under the argument that it presented "harm to minors." The Supreme Court said that even though there is no documented harm to children from exposure to a nudie magazine, it is essential that the message of disapproval be conveyed. When you get right down to it, it's more of a moral or ideological, or even symbolic, argument. And what you end up with -- whether it's the Communications Decency Act or Internet filters or the V-chip -- are standards that are indecipherable. Even in the area of pornography, which most people would probably agree is not edifying for children, there is no evidence that occasional exposure will do them any actual harm. In the book you talk a lot about the fallacy of the "harm to minors" argument. Has anyone ever proven that exposure to sexual or violent content harms minors? In the area of sexual material, there have been almost no studies on minors. The studies done in the '70s by Andrea Dworkin and others dealt with college students. But nothing has been done with respect to [younger] kids. In the area of violence, there have been about 200 studies. The psychologists who support these studies claim that it has been proven: Exposure to violence hurts children. There are many things that psychology studies can show us, but the effect of media violence is not one of them. There is no agreement on what we mean by media violence. There is no agreement about harm. Is it an answer on a response survey? Is it behavior traced over time? Is it self-reported? Is it aggression? Is it violence? Is it fear? Even if you believe that social science can tell us something about this very complicated area of human experience, when you look at the actual studies, they haven't done so. There are all sorts of problems with methodologies, and then there is shocking manipulation of statistics. You see a lot of alarming, self-serving assertions. In terms of methodology, the studies that I think are the most compelling are the ones in which researchers ask young adults what media content they remember seeing as a child -- either sexual or violent -- that had a harmful or traumatic or disturbing effect. In the category of violence, you get answers like "Little House on the Prairie" and "The Wizard of Oz." It wasn't what you would expect. With so much controversy in the social sciences as to whether exposure to violent or sexual content causes harm to minors, why is it that political leaders -- on the left and the right -- continue to assume that the link has been proven? I was on a media panel a couple of weeks ago, and one of the panelists was a representative of the American Medical Association. A couple of months ago, the AMA joined with the American Psychological Association and signed on to this very dubious statement that claimed that the link between media violence and harm to minors had been proven. This panelist was very frank: He said, "We signed on to that statement as a political decision. There were things we needed from Senator Brownback, and from Senator Lieberman, and this seemed like a reasonable trade-off." People like Lieberman and Brownback may be truly offended by some media content. But they are remarkably vague about what, exactly, it is that offends them. If you ask them about a particular movie, "Bonnie and Clyde," say, or "Saving Private Ryan," they all say, "Well, that's OK. I'm talking about bad violence." When it comes to artists like Marilyn Manson, or heavy-metal music, these things simply offend them, and they want to believe there is scientific evidence to back up the notion that these things are harmful. Are we giving children the tools that they need to live in a democracy as adults when we deprive them of access to ideas that may be controversial? Are there other ways to deal with controversial ideas and media literacy that don't involve censorship? Media literacy education is a movement that has existed in the United States for about 20 or 30 years. We need a national initiative to bring media literacy into the curriculum. It's far more advanced in other countries -- Canada, Australia, New Zealand and elsewhere. There are many different theories of how media literacy education should work. Some people who buy into the theory that media violence causes harm nevertheless advocate media literacy, as opposed to censorship, as a way to teach kids to identify what are exaggerated or clearly fantastic messages about violence and aggression or gender relations, to talk about the way cartoons are produced and how different special effects are produced and to put this in the context of their own lives. But there are other approaches to media literacy education that are less specifically based on teaching kids to be nonviolent, and more focused on teaching kids to understand how media is created, so that they can be savvy about the commercials they see and the way that the ads manipulate viewers. And some media education puts camcorders and tape recorders and cameras into the hands of kids and gets them to become journalists and artists and to confront some of these issues about how you create a media message and what it represents. This helps them to be more critical about the music they are listening to and the TV shows they are watching. If we could take some of this money that is going to pay Justice Department lawyers to defend this endless stream of child Internet protection laws, and use it to fund educational programs for actual children, I think it would be much more beneficial to our kids. Copyright 2001 Salon.com * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Sun Jul 1 23:38:09 2001 From: sharma at aa.net (Sharma) Date: Sun, 1 Jul 2001 23:38:09 -0700 (PDT) Subject: SCN: Fwd: TOP 25 CENSORED STORIES OF 2000 (fwd) Message-ID: ---------- Forwarded message ---------- Date: Sun, 1 Jul 2001 19:38:56 EDT Subject: Fwd: TOP 25 CENSORED STORIES OF 2000 -------------- next part -------------- An embedded message was scrubbed... From: Bfdority at aol.com Subject: TOP 25 CENSORED STORIES OF 2000 Date: Sun, 1 Jul 2001 19:31:34 EDT Size: 3304 URL: From m_hunter at china.com Mon Jul 2 17:29:07 2001 From: m_hunter at china.com (m_hunter at china.com) Date: Mon, 02 Jul 2001 17:29:07 -0700 Subject: SCN: Enjoy RV travels? Check this out... Message-ID: <200107030029.RAA14699@scn.org> Limited time offer: Save now on a subscription to this new RV lifestyle magazine. Now in its 2nd year of publication, RV Companion is a high quality, full color Lifestyle/Travel magazine written BY RVers, FOR RVers. Chuck Woodbury, publisher of the highly popular Out West newspaper, says this about the magazine: "RV Companion is packed with fascinating stories -- heavy on columns by veteran RV writers -- and enough advertising to suggest that the publication will be around awhile. Full-timers and avid RVers will get the most of this colorful and info-rich magazine. We like this a lot and at only $12 a year, it's a bargain." And Cathie Carr, CEO of the very successful Escapees RV Club, says this: "Escapees is known for making its recommendations carefully and cautiously. It now gives us great pleasure to add RV Companion Magazine to our list of excellent quality resources for RVers." HERE'S THE OFFER: When you join as a charter subscriber, a one-year subscription will cost you just $12. Two years will cost just $20, and a three-year subscription only $27. That's three years of this uniquely entertaining and informative magazine sent directly to you each issue for only $9 a year_50% off the cover price! MONEY-BACK GUARANTEE: If you're not absolutely pleased with the first issue you receive, your money will be refunded_no questions asked. If you are not yet familiar with RV Companion, check out our website at www.rvcompanion.com for a detailed overview of the magazine. To see current and past issues, click on "issue archives" at the bottom of the home page. Or simply click on this link: http://www.rvcompanion.com/archives.htm (Copy/paste the URL's if not displayed as live links) Three easy ways to take advantage of this offer: 1. Go to the secure subscription page on the RV Companion website: https://www.rvcompanion.com/subscribe_online.htm 2. Or, call toll-free at 1-888-763-3295 and mention this letter. 3. Or, print out the subscription form below and mail or fax it back to: RV Companion, Dept LV1 PO Box 174 Loveland, CO 80539 Fax: 970-663-3550 (Rates good through September 1, 2001. Payment must be received one month prior to the next issue date. Payments received after this date will receive the next available issue.) ************************************************** SUBSCRIPTION FORM: __Yes! Sign me up as a charter subscriber to RV Companion Magazine U.S. residents: __1 yr. (6 issues) $12 __2 yrs. (12 issues) $20 __3 yrs. (18 issues) $27...50% off cover price! __1 yr. Canada/Mexico $25 (U.S. funds) __1 yr. Foreign $40 (U.S. funds) Method of payment: (Feel free to fax credit card orders to 970-663-3550.) __Check enclosed __VISA __MasterCard Name:_____________________________________________ Address:__________________________________________ C,S,Z:____________________________________________ C.C. Account#:____________________________________ Expiration date:__________________________________ Phone:____________________________________________ Email:____________________________________________ Signature:________________________________________ ************************************************** Please help us by completing the following reader survey: What type of RV do you own? __A. Class A motorhome __B. Class C motorhome __C. Fifth Wheel __D. Travel Trailer __E. Pop-up __F. Truck Camper __G. Van Camper __H. None_considering a purchase What is the length of your RV? __A. 10-15 feet __B. 15-20 feet __C. 20-25 feet __D. 25-30 feet __E. 30-35 feet __F. 35-40 feet __G. 40-45 feet __H. Over 45 feet How long have you owned your current RV? __A. 0-2 yrs. __B. 2-5 yrs. __C. 5-10 yrs. __D. 10-15 yrs. __E. 15-20 yrs. __F. Over 20 yrs. How often do you use your RV each year? __A. 1-2 weeks __B. 2-4 weeks __C. 4-6 weeks __D. 6-8 weeks __E. 8-10 weeks __F. More than 10 weeks Do you plan to purchase a new RV within the next year? __Yes __No * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Tue Jul 3 08:36:39 2001 From: steve at advocate.net (Steve) Date: Tue, 3 Jul 2001 08:36:39 -0700 Subject: SCN: Dvorak Message-ID: <3B418417.23873.1E01B35@localhost> x-no-archive: yes ============================= (John C. Dvorak, PC Magazine, excerpts)---Here are solutions to my top pet peeves... ...Zone off the Net While the Internet 2 Project is attempting to zone the Net on some level by giving academia a separate network, it's not good enough. One Internet made some odd sense early on, but now the concept is dated. There should be separate Internets for specific purposes with different structures and gateways. There should be an e-mail Internet, a streaming-media Internet, an IP telephony Internet, a Web Internet, and yes, a porn Internet. ...Limit URL length to 60 characters If I have a million pages online and I want to go to page 781,987, my URL shouldn't have to be anything other than www.dvorak.org/781987.htm. The designers of database systems that produce ludicrous URLs consisting of various odd characters and pointers all over the place should be punished. Many of the ridiculous URLs are hundreds of characters long, and many cannot be copied. Many won't work when copied, since they must evolve from a specific page. ...Eliminate all pop-open windows A horrible recent trend in online advertising is annoying pop-up windows in the form of minibrowsers. Many of these spawn other windows if they are closed. This trend began with porn sites, and now other commercial enterprises think it's a good thing. If you want to drive business away, then keep it up. ...Kill Flash advertisements I also don't like the excessive amount of Flash advertising. Too much movement on the page makes it hard to read - like trying to read a screen with a fly crawling on it. The new advertising models simply do not work. The Flash idea came about because there was a perceived need to up the ante to get readers' attention. This approach gets negative attention. ...End forward jumps on Web sites A typical example of a forward jump is the home page that acts as a quick hello. It automatically loads a real home page. First, you get a big "Welcome to the site!" page that loads very fast, and then you jump to another page. I suppose this makes you think you're visiting a responsive site, but the problem is that you can't Back-Arrow out of the site. If I go to Google to do a search, then click on one such page, I can't get back to Google unless I do predictive clicking - clicking the Back Arrow key numerous times, hoping that I don't overshoot. ...Adopt a self-cataloging system All informational Web sites should be self-cataloging. You should be able to browse by subject the same way you can browse a library bookshelf. Current search engine technology does not allow this, despite the bogus and vague "More Pages Like This" link, which never works anyway. One key to making this work would be to allow one tag per site. You decide what your site is about and code it appropriately for cataloging. Multiple tags would not be allowed, thus preventing sites from being able to sucker someone into visiting. ...Eliminate the plug-in It would be ideal to eliminate all plug-ins. But this will never happen. In the meantime, a simple program that can show you all your plug- ins, with their associated files and DLLs, could work. And having the ability to remove them would also be nice. I have a couple of plug- ins I'd like to get rid of without digging all over for them. ...Stop the music Having a Web site load a MIDI or WAV file and play it was funny for a while, but now the feature must be viewed as a failed experiment. Nobody wants computers to begin playing music out of the blue. The feature should be eliminated permanently. ...Create a universal payment mechanism When are we going to get a truly universal payment system that will let me effortlessly buy a two-page document for a nickel or dime? Plan after plan has come and gone. Something has to give, because the current system, with competing plans, minimum credit card charges, and a lack of true security, is killing the e-commerce golden goose. Copyright 2001 Ziff Davis Media Inc. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From clariun at yahoo.com Tue Jul 3 09:00:03 2001 From: clariun at yahoo.com (patrick) Date: Tue, 3 Jul 2001 09:00:03 -0700 (PDT) Subject: SCN: Dvorak In-Reply-To: <3B418417.23873.1E01B35@localhost> Message-ID: <20010703160003.79191.qmail@web13201.mail.yahoo.com> I think Dvorak is overreacting, but when has he not? Of course, he has to take his view from the extreme to get a rise out of people. Comments on comments, below: --- Steve wrote: > x-no-archive: yes > > ============================= > > > (John C. Dvorak, PC Magazine, excerpts)---Here are solutions to my > top pet peeves... > > ...Zone off the Net > > While the Internet 2 Project is attempting to zone the Net on some > level by giving academia a separate network, it's not good enough. > One Internet made some odd sense early on, but now the concept is > dated. There should be separate Internets for specific purposes with > different structures and gateways. There should be an e-mail > Internet, a streaming-media Internet, an IP telephony Internet, a Web > Internet, and yes, a porn Internet. Hey, now that sounds like a great idea. Separate internets. > > ...Limit URL length to 60 characters > > If I have a million pages online and I want to go to page 781,987, my > URL shouldn't have to be anything other than > www.dvorak.org/781987.htm. The designers of database systems > that produce ludicrous URLs consisting of various odd characters > and pointers all over the place should be punished. Many of the > ridiculous URLs are hundreds of characters long, and many cannot > be copied. Many won't work when copied, since they must evolve > from a specific page. > Who can disagree with limits on URLs. But his numbering system would only work in a perfect world. He'd probably go with making a perfect English alphabet like I used to have in my Star Trek guide book when I was a kid. One sound for one character. No "ch", but a new character to take it's place. Perfection? His solution replaces one bad idea with another. How is anyone to remember digits. It is hard enough to remember all the passwords we keep on different systems and sites. > ...Eliminate all pop-open windows > > A horrible recent trend in online advertising is annoying pop-up > windows in the form of minibrowsers. Many of these spawn other > windows if they are closed. This trend began with porn sites, and > now other commercial enterprises think it's a good thing. If you want > to drive business away, then keep it up. Well, annoying, but we know it's not going to happen. Even the phone company is intrusive: If no one on the other line is answering, you get a voice that gives you an option, for 95 cents, to leave voice mail. Annoying. Worse than a pop-up. > > ...Kill Flash advertisements > > I also don't like the excessive amount of Flash advertising. Too > much movement on the page makes it hard to read - like trying to > read a screen with a fly crawling on it. The new advertising models > simply do not work. The Flash idea came about because there was a > perceived need to up the ante to get readers' attention. This > approach gets negative attention. Moot point. Flash has subsided in use, hasn't it? It will probably increase when more people get high-speed access. But web developers have discovered that people will leave a site rather than wait for the flash bs. to load. > > ...End forward jumps on Web sites > > A typical example of a forward jump is the home page that acts as a > quick hello. It automatically loads a real home page. First, you get a > big "Welcome to the site!" page that loads very fast, and then you > jump to another page. I suppose this makes you think you're visiting > a responsive site, but the problem is that you can't Back-Arrow out > of the site. If I go to Google to do a search, then click on one such > page, I can't get back to Google unless I do predictive clicking - > clicking the Back Arrow key numerous times, hoping that I don't > overshoot. Very annoying. But most sites do not have this. It's rare. > > ...Adopt a self-cataloging system > > All informational Web sites should be self-cataloging. You should be > able to browse by subject the same way you can browse a library > bookshelf. Current search engine technology does not allow this, > despite the bogus and vague "More Pages Like This" link, which > never works anyway. One key to making this work would be to allow > one tag per site. You decide what your site is about and code it > appropriately for cataloging. Multiple tags would not be allowed, > thus preventing sites from being able to sucker someone into > visiting. > Again, living in a perfect world. > ...Eliminate the plug-in > > It would be ideal to eliminate all plug-ins. But this will never happen. > In the meantime, a simple program that can show you all your plug- > ins, with their associated files and DLLs, could work. And having the > ability to remove them would also be nice. I have a couple of plug- > ins I'd like to get rid of without digging all over for them. > Plug-ins are rare these days, aren't they? There was an explosion of use for them, but now I don't see them in use that much. What kind of sites does John go to? I have a Mac, so I don't worry about DLLs. > ...Stop the music > > Having a Web site load a MIDI or WAV file and play it was funny for > a while, but now the feature must be viewed as a failed experiment. > Nobody wants computers to begin playing music out of the blue. The > feature should be eliminated permanently. > This is rare. Very rare. > ...Create a universal payment mechanism > > When are we going to get a truly universal payment system that will > let me effortlessly buy a two-page document for a nickel or dime? > Plan after plan has come and gone. Something has to give, because > the current system, with competing plans, minimum credit card > charges, and a lack of true security, is killing the e-commerce > golden goose. > Microsoft Passport? Isn't MS going to dominate the world with Passport? Everyone, merchants and buyers will be paying tribute to MS through fees with this service. > > Copyright 2001 Ziff Davis Media Inc. > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas at scn.org Tue Jul 3 09:06:23 2001 From: douglas at scn.org (Doug Schuler) Date: Tue, 3 Jul 2001 09:06:23 -0700 (PDT) Subject: SCN: Dvorak In-Reply-To: <3B418417.23873.1E01B35@localhost> Message-ID: As I've mentioned before this is a very intriguing idea. Without ways to *catalog* pages and other Internet resources we are all at the mercy of the [commercial] search engines. -- Doug ...Adopt a self-cataloging system All informational Web sites should be self-cataloging. You should be able to browse by subject the same way you can browse a library bookshelf. Current search engine technology does not allow this, despite the bogus and vague "More Pages Like This" link, which never works anyway. One key to making this work would be to allow one tag per site. You decide what your site is about and code it appropriately for cataloging. Multiple tags would not be allowed, thus preventing sites from being able to sucker someone into visiting. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From davidb at scn.org Tue Jul 3 16:07:21 2001 From: davidb at scn.org (David Barts) Date: Tue, 3 Jul 2001 16:07:21 -0700 Subject: SCN: Dvorak In-Reply-To: <20010703160003.79191.qmail@web13201.mail.yahoo.com>; from clariun@yahoo.com on Tue, Jul 03, 2001 at 09:00:03AM -0700 References: <3B418417.23873.1E01B35@localhost> <20010703160003.79191.qmail@web13201.mail.yahoo.com> Message-ID: <20010703160721.A7488@scn.scn.org> patrick writes: > > ...Create a universal payment mechanism > > > > When are we going to get a truly universal payment system that will > > let me effortlessly buy a two-page document for a nickel or dime? > > Plan after plan has come and gone. Something has to give, because > > the current system, with competing plans, minimum credit card > > charges, and a lack of true security, is killing the e-commerce > > golden goose. > > Microsoft Passport? Isn't MS going to dominate the world with Passport? > Everyone, merchants and buyers will be paying tribute to MS through fees with > this service. I wouldn't trust M$ to create an open, well-designed, standards-based solution to the problem, but I would welcome a payment system that doesn't have minimum charges. That way, charging pennies for something becomes feasable, and there's an alternative to the proliferation of advertising on the web. -- David W. Barts (davidb at scn.org) / http://www.scn.org/~davidb "Rats and roaches live by competition under the laws of supply and demand; it is the privilege of human beings to live under the laws of justice and mercy." -- Wendell Berry * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bn890 at scn.org Fri Jul 6 05:05:43 2001 From: bn890 at scn.org (bn890 at scn.org) Date: Fri, 6 Jul 2001 12:05:43 +0000 Subject: SCN: Re: Helllooooo Message-ID: <200107061905.MAA07476@scn4.scn.org> >Hey there Randy, I am so glad to hear that you (and Hoss) are back on track again. We were very worried about you. Keep in touch and let me know if you would like to plan further classes. Stay good, no more seizures pleeeze, not even petite ones. See ya, Irene Irene, > > I suffered a massive Grand Maul seizure on the evening of the 22nd. 0> > Until today (July 6) I was so incapacitated that I could not even do > e-mail. > > I am very sorry about the class at STAR and the wasted volunteer efforts > as a result. > > Please pass the word that I am on the mend and Dr.'s are working to help > me. > > I am back at work and so is Hoss. > > > > > Randy Hayhurst > Program Director > STAR Center of Seattle > (206) 325-4284 > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From star at scn.org Fri Jul 6 16:28:08 2001 From: star at scn.org (Special Technology Access Resources) Date: Fri, 6 Jul 2001 16:28:08 -0700 (PDT) Subject: SCN: Re: Helllooooo In-Reply-To: <200107061905.MAA07476@scn4.scn.org> Message-ID: Thanks, and yes, let's plan for the 4th Thursday in July. I already have one sign up who will want to learn on the Mac G3. Thanks for all your kind thoughts! Randy Hayhurst Program Director STAR Center of Seattle (206) 325-4284 * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From clariun at yahoo.com Fri Jul 6 16:40:31 2001 From: clariun at yahoo.com (patrick) Date: Fri, 6 Jul 2001 16:40:31 -0700 (PDT) Subject: SCN: Re: Helllooooo In-Reply-To: Message-ID: <20010706234031.67757.qmail@web13208.mail.yahoo.com> No, that person has got to have a G4. A G3 is way too slow. My grandma drives one of those. :-) Patrick- --- Special Technology Access Resources wrote: > Thanks, and yes, let's plan for the 4th Thursday in July. > > I already have one sign up who will want to learn on the Mac G3. > > Thanks for all your kind thoughts! > > > Randy Hayhurst > Program Director > STAR Center of Seattle > (206) 325-4284 > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bn890 at scn.org Sat Jul 7 21:06:39 2001 From: bn890 at scn.org (Irene Mogol) Date: Sat, 7 Jul 2001 21:06:39 -0700 (PDT) Subject: SCN: Re: Helllooooo In-Reply-To: Message-ID: OK, I think that is July 27. That would be Worthington on the MAC? Or is someone else. He was the one who told Wade and me that you were ill. See ya, Irene On Fri, 6 Jul 2001, Special Technology Access Resources wrote: > Thanks, and yes, let's plan for the 4th Thursday in July. > > I already have one sign up who will want to learn on the Mac G3. > > Thanks for all your kind thoughts! > > > Randy Hayhurst > Program Director > STAR Center of Seattle > (206) 325-4284 > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bn890 at scn.org Sat Jul 7 21:12:17 2001 From: bn890 at scn.org (Irene Mogol) Date: Sat, 7 Jul 2001 21:12:17 -0700 (PDT) Subject: SCN: Re: Helllooooo In-Reply-To: <20010706234031.67757.qmail@web13208.mail.yahoo.com> Message-ID: Hey Patrick, The G3 is what is available at the STAR lab. I don't know what the student has, someone presented it to him and I think it is an old one. Does Grandma get where she is going? On Fri, 6 Jul 2001, patrick wrote: > No, that person has got to have a G4. A G3 is way too slow. My grandma drives > one of those. > > :-) > > Patrick- > > > --- Special Technology Access Resources wrote: > > Thanks, and yes, let's plan for the 4th Thursday in July. > > > > I already have one sign up who will want to learn on the Mac G3. > > > > Thanks for all your kind thoughts! > > > > > > Randy Hayhurst > > Program Director > > STAR Center of Seattle > > (206) 325-4284 > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > > . To unsubscribe from this list, send a message to: > > majordomo at scn.org In the body of the message, type: > > unsubscribe scn > > ==== Messages posted on this list are also available on the web at: ==== > > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > > > __________________________________________________ > Do You Yahoo!? > Get personalized email addresses from Yahoo! Mail > http://personal.mail.yahoo.com/ > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Thu Jul 12 22:43:42 2001 From: steve at advocate.net (Steve) Date: Thu, 12 Jul 2001 22:43:42 -0700 Subject: SCN: Speech Message-ID: <3B4E281E.19175.2DF7FA5@localhost> x-no-archive: yes ============================== (Aaron Elstein, Wall Street Journal)---Free-speech advocates are hailing a New Jersey appellate-court decision this week that makes it harder for companies to track down and silence anonymous critics on online message boards. The opinion, issued Wednesday by the appellate division of the New Jersey Superior Court, affirmed a lower-court ruling against Dendrite International Inc. The ruling upheld that the Morristown, N.J., software company had no right to discover the identity of an online critic because it failed to show it had been harmed by his posting. The ruling is significant because many companies have been able to subpoena such Internet service providers as Yahoo! Inc. and AOL Time Warner Inc. to ferret out anonymous critics in hopes of later building cases against them. The appellate court also expanded the lower court's ruling, spelling out standards that companies must meet before they can subpoena their anonymous critics. More than 150 suits have been filed nationwide against unknown parties who posted messages on Yahoo, Raging Bull, Silicon Investor, and other stock-chat sites. In these so-called cybersmear suits, plaintiffs usually allege that anonymous parties have posted false and defamatory remarks to drive down a company's stock price. Among other things, the New Jersey court said plaintiffs must produce "sufficient evidence" supporting each element of their claim. The panel also said that even if a court concludes a company has a viable case, it "must balance the defendant's First Amendment right of anonymous free speech against the strength of the prima facie case presented." Although the appellate court's standard is binding only in New Jersey, Blake Bell, a lawyer at the New York firm of Simpson Thacher & Bartlett who tracks cybersmear suits, says the decision goes farther than any court to date in spelling out what companies must do to proceed with these suits. He says he expects Public Citizen, the American Civil Liberties Union and other activist groups who sometimes represent defendants in these suits to cite the New Jersey ruling as precedent. "I think the court was looking at the lay of the land and, realizing that this kind of litigation could come up repeatedly, decided to provide guidance that went way beyond what other courts have provided," says Mr. Bell. But other attorneys think the New Jersey court overstepped. Victor Polk, a lawyer at Bingham Dana in Boston who has brought cybersmear suits on behalf of corporations, says the appellate panel's ruling requires evidence of defamation that would be virtually impossible to produce. "What this standard does is give protection to people who are posting clearly defamatory messages on the Internet," he says. Mr. Polk says that cybersmear suits have presented courts with a tough legal challenge of trying to balance people's right to anonymous free speech against the rights of corporations to stop false and malicious statements about them. "Courts are really struggling to enunciate a standard on this issue," he says. Indeed, when the New Jersey appellate court applied its new standard to two separate cases, it reached different conclusions. The appellate court struck down the effort by Dendrite, which has sought to identify an unknown person who allegedly said on a Yahoo board that the company was cooking its books to inflate earnings, a charge Dendrite denies. The three-judge panel said that Dendrite failed to establish a "sufficient nexus" between the defendant's postings and the company's allegations of harm. Officials at Dendrite International referred questions to their outside counsel, Bob Weigel, who declined to comment. But in applying the same standard, the appellate court ruled in favor another company, Immunomedics Inc., Morris Plains, N.J. The panel affirmed a lower-court decision that allowed the company to proceed with its effort to discover an unknown online critic whom it had sued for posting a message on Yahoo. The message contained allegedly "confidential and proprietary" information about the developer of cancer treatments. Nicholas Stevens, a lawyer for Immunomedics, said the appellate court's standard is useful. "It was good to clear up what lawyers should do when preparing these cases," he said. Mr. Stevens declined to comment on Immunogenics' legal strategy going forward. Steven Stein, an attorney for the defendant, didn't return a call. Paul Alan Levy, an attorney at Public Citizen, a Washington consumer-action group that filed a friend-of-the-court brief on behalf of the defendants in both New Jersey cases, calls the appellate court's ruling in the Dendrite matter "a tremendous victory for free speech." The New Jersey appellate court's split-decision adds to a mixed bag of rulings that have favored both corporate plaintiffs and anonymous defendants. For example, an appeals court in Florida ruled last year that the former chief executive of Hvide Marine Inc., now known called Seabulk International Inc., has the right to find out who posted harsh messages about him in an online message board. That case is pending. But a federal judge in Los Angeles in February dismissed a cybersmear case brought by Global Telemedia International Inc., saying the company was fair game for public discussion about its performance because it is a publicly traded company with thousands of shareholders and a following on Internet message boards. In the meantime, cybersmear suits continue to be filed. An attorney for Yahoo told a California state judge last week that the Santa Clara, Calif., company gets "thousands" of subpoenas in these cases. The attorney, Thomas Laffey, said in an interview that he doesn't know if that's how many Yahoo gets in a year, or if the figure represents the total amount served over time. Complying with the subpoenas "keeps Yahoo's legal staff busy, that's for sure," he said. A Yahoo spokeswoman declined to comment. AOL Time Warner has said it received nearly 475 subpoenas seeking to identify its customers last year, a 40% increase over 1999. Copyright 2001 Dow Jones & Company, Inc. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Fri Jul 13 18:00:41 2001 From: douglas (Doug Schuler) Date: Fri, 13 Jul 2001 18:00:41 -0700 (PDT) Subject: SCN: CPSR offering FREE proceedings Message-ID: <200107140100.SAA10148@scn.org> 100 Proceedings are looking for new homes!! Please forward to this to appropriate people and lists. (Thanks!!) 100 Free Proceedings! Thanks to the U.S. National Science Foundation we are distributing 100 free copies of the 2001 CPSR "Shaping the Network Society" symposium proceedings to people in Africa, Asia, Latin America, Europe, Canada, the US, and elsewhere. If you feel that these proceedings would be useful to you and you feel that you or your organization can't afford them, please don't hesitate to apply for a free copy using the form at http://www.scn.org/cpsr/diac-00/proc-contents.html. Just fill in your information and tell us how you plan to use the proceedings. (If you'd like to purchase them, check out http://www.scn.org/cpsr/diac-00/proc-contents.html.) Please forward this note to anybody who might be interested in this offer. Also, on the last day of the symposium attendees developed the "Seattle Statement" calling for a "new public sphere." Please sign if you agree! The statement is at http://www.scn.org/cpsr/diac-00/seattle-statement.html. Take a look! We now have versions in English, French, Hungarian, Italian, Japanese, and Spanish and, if you're willing and able, we'd really appreciate your translation into another language. Thanks for your interest! Please don't hesitate to contact me for any reason. Doug Schuler douglas at scn.org The Public Sphere Project, http://www.scn.org/sphere Computer Professionals for Social Responsibility PS. Send me mail if you'd like to be added to the CPSR community networking / researcher - activist mailing list. We now have people from 30 countries! ----------- Proceedings Contents Research Session I: Regional Snapshots Using Cyberspace to Nurture Civil Society in Nigeria and USA: An Educational Partnership Model John Agada & Martha Hale Community Informatics in Argentina : Act II Susana Finquelievich & Alejandra Jara: Telecenters in the Second World: Knowledge Demands, Marginal Markets, Remittance Flows and Microbanks Scott Robinson Session II Foundations Holding on To The Ground Ian Beeson Shaping Communities: Empathy, Hostility, Lurking, and Participation Jenny Preece Explaining Community Infromatics Success Prospects: The Autonomy/Harmony Model Ceilia Romm & Wal Taylor Cyberspace as a Tectonic System - Implications for Design Erik Stolterman Session III Crossing Boundaries Global Communication in the Post - Industrial age Jesse Drew Place Matters, Even in Cyberspace: Exploring Online Maps as Forms of Alternative Community Media Becky Lentz Session IV Socio-Technical Open Sources and the Open Society: An Essay in Politics and Technology Kelly Parker The Turing Game - A Participatory Exploration of Identity In Online Environments Joshua Berman & Amy Bruckman The Soil of Cyber Space: Frameworks and Foundations for a Healthy Online Public Sphere David Silver Navigating Very Large-Scale Conversations Warren Sack Session V In the Community Discover the Treasure: The Value of a Learning Community G. Casapulla, et al E-Commerce and Local Economic Development: Enemy or Ally Mike Gurstein The "embedded" Telecottage Szilard Molnar Session VI Museums, Libraries and Culture Beyond The Field of Dreams: Citizenship and Internet Use at Vancouver Public Library Ellen Balka & Brian J. Peterson Electronic Environments and Public Space: The Future of the Future Museum Randy Lee Cutler Counterculture and Cyberculture: Ideologies of Cyberspace Author Helweg and Adrian Mihalache: >From Representation to Performance Responsive Public Space Sha Xin Wei & Maja Kuzmanovic Session VII Public Policy Issues On the 'Net, nobody know that you're a dog! (Well almost nobody): National Governments and the Issue of Internet Control Giampiero Giacomello Standing Before the Portal: Non-Profit Content in the Age of Commercial Gatekeepers Eszter Hargittai Local Government Policy Regarding Virtual Political Spheres Agnetta Ranerup Session VIII Public/Private Sector Tensions Welcome to 1927: The Creation of Property Rights and Internet Domain Name Policy in Historical Perspective Christian Sandvig Session IX Looking at the Community Electronic Community Networks: Women's Place, Women's Space Brian Loader & Leigh Keeble ICTs for Health Promotion in the Community: A Participative Approach Audrey Marshall An Asset-Based Approach to Community Building and Technology Nichol Turner & Randal D. Pinkett Session X New Models Can Public Policy Widen Participation in Cyberspace? Networks, Interests and Initiatives in Northwest England John Cawood & Seamus Simpson The Association for Progressive Communications and the Networking of Global Civil Society: APC at the 1992 Earth Summit Rory O'Brien & Andrew Clement Access to Cyberspace as a Human Right Bill McIver Design of Advanced Community Networks: Participation, Power, Pragmatics Murali Venkatesh Special Contribution How a Commercially Driven Internet Threatens Democratic Civil Society and What To Do About It Richard E. Sclove Workshops Deliberations in the Digital Age John B. Adams & Matt Powell What is a Technology Healthy City? Developing Community Technology Impact Indicators Emily Bancroft & David Keyes Participatory Design of Information Strategies: Lessons Learned from El Salvador Christina Courtright Creating Civic Involvement through Dynamic Networks -- A Multi-Platform Approach Gregory Curtin Current and Everging Networking Technologies Available For Use in Community Networks Dara O'Neil Telecommunications Applications Prototyping in Second-Generation Community Networks Wayne Miner & Murali Venkatesh Identifying Critical Issues in How Government Shape New Public Space John O'Looney Internation Use of PC/Internet As a Communications Tool to Facilitate Practical Friendship in an Urban Community: The Goodenough Community Bruce Perler, Todd Ransdell, Joan Valles, Jack Lanham E-mail Groups for Social Change. Carl Page Open Source Journalism - An Alternative Strategy for Using the Internet to Strengthen Democracy and Build Communities Bart Preecs Neighborhood Knowledge Los Angeles: A Political and Technical How-To Kit Neal Richman, Bill Pitkin, Yoh Kawano Civic Participation and the Internet Courtney Kakuska, Karen Lee Village Studies Around the World Lary Greene Institute for Village Studies: Broadband: Organizing for the Public Interest Dorothy Kidd Making Networks Society for all -- European and US Experiences Ilpo Koskikallio High Tech, No Tech: Moving Beyond Economics to Bridge the Digital Divide Susan Kretchmer, Rod Carveth, Nancy Kranich First Mile Broadband: Implications and Opportunities Richard Lowenberg Bridging the Wisdom Divide: Beyond the Knowledge Era Part I & II David Matteson Interactive Neighborhood Maps on a Community Web Portal: The Quality of Life In San Diego Project, and the AXIOMAP Technology Ilya Zaslavsky and David Cleveland * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Sun Jul 15 13:36:17 2001 From: steve at advocate.net (Steve) Date: Sun, 15 Jul 2001 13:36:17 -0700 Subject: SCN: Assent Message-ID: <3B519C51.4953.9366F50@localhost> x-no-archive: yes ============================= (Carl S. Kaplan, NY Times)---Finding that "the timeless issue of assent" has continuing vitality in the realm of cyberspace, a federal judge has ruled that Internet users who downloaded free software from a Web site were not bound by the terms of a software licensing agreement because they never consented to it. The ruling, which was issued on July 5th, is one of the first decisions to directly address whether a person's mere use of a Web site -- without first reading legal fine print and clicking an "I agree" button -- can constitute consent to an agreement governing the use of the site or its products. The decision, which may influence other courts, is a boon to some consumers who may have been surprised to discover that by downloading a software program or surfing through a Web site they, without knowing it, agreed to a contract. The decision also casts some doubt on a widespread Internet practice. Many Web sites state in their "Terms of Service" or "Conditions of Use" pages that a consumer's use of the Web site constitutes his acceptance of a contract. The Web sites rely on terms in those contracts to protect them. Judge Alvin K. Hellerstein of the United States District Court in Manhattan ruled in his decision that Netscape Communications Corporation, which is owned by America Online, Inc., did not form a contract with individuals who downloaded free software from Netscape's Web page. Accordingly, the court said that the users were not obliged to honor an arbitration clause in the software agreement. Judge Hellerstein ordered the parties to appear before him for a case status conference on July 26. AOL may appeal the ruling to the U.S. Court of Appeals for the Second Circuit, in Manhattan. Nicholas J. Graham, a spokesperson for AOL, said, "We disagree strongly with the decision that was handed down last week, and we are in the process of considering our options." Joshua Rubin, a lawyer representing the plaintiffs in the case and a partner at Abbey Gardy, a New York law firm, said that he thought the court's decision was well reasoned and correct. "It applies an ancient and fundamental principle in a novel context. That is, you can't be bound to that which you don't agree to," he said. In related complaints filed last year, six individuals in three cases alleged that Netscape's freely available software, SmartDownload, a service that assists in the of downloading files from the Internet, surreptitiously tracked private information about a user's file transfer activity on the Internet. The plaintiffs, who are seeking class action status, claim that by offering the software, Netscape and AOL violated two federal statutes, the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act. In previous statements to the press, AOL said that the lawsuit was without merit. In any case, the company announced last August that new editions of the software program would not contain the alleged consumer-tracking device. Earlier, Netscape argued that its licensing agreement with the plaintiffs mandated that the case be thrown out of court and referred to an arbitration panel. That set the stage for the court's ruling whether the software licensing agreement was valid in the first place. In his decision, Hellerstein repeated the age-old rule of contract law that a necessary ingredient in making a promise binding between two people is consent, a meeting of the minds. "So it was at King's Bench in common law England; so it was under the common law in the American colonies; so it was through more than two centuries of jurisprudence in this country; and so it is today," he wrote. Consent can be indicated by any number of things, including a signature or a handshake, said Judge Hellerstein. Indeed, any sign, symbol or action, or even willful inaction, can amount to consent and create a contract. But in the Netscape case, there was no required action on the part of a user that could signal his consent to a licensing agreement. In support of his view, Hellerstein observed that when the plaintiffs wished to obtain SmartDownload from Netscape's Web site, they viewed a download page that had a tinted box, or button, labeled "Download." By clicking on the box, a visitor initiated the download. The sole reference to the existence of a licensing agreement appeared in text at the bottom of the download page. That text read: "Please review and agree to the terms of the Netscape SmartDownload software license agreement before downloading and using the software." By clicking on some words in the sentence, a visitor was transported to another page that warned the user to read and agree to a licensing agreement before acquiring the software product. The warning contained a link to the licensing agreement. Among other things, the agreement stated that by installing or using SmartDownload, the user "is consenting to be bound by and is becoming a party to this agreement." Judge Hellerstein reckoned that visitors were not required to affirmatively indicate their assent to the license agreement, or even to view the license agreement, before downloading the software. "Netscape's failure to require users of SmartDownload to indicate assent to its license as a precondition to downloading and using its software is fatal to its argument that a contract has been formed," he wrote. In his opinion, Judge Hellerstein acknowledged that users could signal their consent to software licensing agreements by a minimal action or willful inaction if the user has sufficient notice of the contract. For example, in "shrink-wrap" licenses, which have been upheld by some courts, software is packaged in a container or wrapper that advises the purchaser that the use of the software is subject to the terms of a license agreement tucked inside the package. The license agreement generally states that if the purchaser does not wish to enter into a contract, he must return it for a refund, and that his failure to return within a period of time will constitute assent to the license terms. In addition, in so-called "click-wrap" or "click-thru" licenses, which also have been upheld by many courts, a user is presented with a message on his computer screen, requiring that he signify his assent to the terms of an agreement by clicking on an "I agree" button. Generally, the product or service cannot be obtained or used until the button is clicked. In contrast to those scenarios, said Judge Hellerstein, Netscape's SmartDownload allowed a user to download and use the software "without taking any action that plainly manifests assent to the terms of the associated license or indicates an understanding that a contract has been formed." Sometime after the lawsuit was filed, Netscape changed its SmartDownload page. Now, next to the download button, reads the sentence: "By downloading, I agree to the terms of the following agreement." The licensing agreement is printed in a window next to the download button. Michael H. Sproule, a lawyer who specializes in intellectual property matters at Akabas & Cohen, a New York law firm, said that Judge Hellerstein's ruling has ramifications far beyond software licensing agreements. "I think this is something that Web sites have got to consider," he said. "Almost every Web site out there has a Terms of Service page. Generally it's not very prominent. It governs the use of the Web site and typically requires users of the site to bring suit or an arbitration proceeding in a land far away. It also often contains the famous phrase: 'If you continue to use this service you are bound by these terms.' At least according to the logic of Judge Hellerstein's decision, those Terms of Service contracts are dubious," said Sproule. The upshot, he added, is that those Web sites relying on the legality of a Terms of Service Use contract and the viability of an arbitration and forum selection clause may, in fact, be subject to lawsuits in all 50 states and foreign jurisdictions. Martin H. Samson, a lawyer who specializes in Internet Law at Phillips, Nizer, Benjamin, Krim & Ballon, a New York law firm, said that he believed that Judge Hellerstein may have left open the possibility that a user could assent to a contract by merely using a site if the user had prominent notice that his use signified consent. "If I put a license agreement right in front of a user's face, and the agreement said your use of the site constitutes consent, that might be okay," said Samson. The problem, he said, is that the legal rules are not clear. "Until some judge says use-based contracts are enforceable, they are iffy," he said. Ian C. Ballon, a Palo Alto, California-based Internet lawyer and editor of the treatise, "E-Commerce and Internet Law" (Glasser LegalWorks, 2001), said it was not surprising that a judge looked at the issue of use-based Internet contracts and found them to be a problem. Other judges, however, might have reached different conclusions in light of the "widespread" custom of conditioning a person's use of a Web site to posted Terms and Conditions, he said. "The decision does underscore that it's the better practice not to take a chance," said Ballon. "It's prudent for Web sites to have click- thru agreements," he said. That way, neither the Web site company nor the consumer would be in for a legal surprise. Copyright 2001 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bb553 at scn.org Sun Jul 15 23:16:54 2001 From: bb553 at scn.org (Martin A. Totusek) Date: Sun, 15 Jul 2001 23:16:54 -0700 Subject: SCN: =?iso-8859-1?Q?=80=80=C3=C4=AC=FC=A5=D5=96=B1=2A=80?= Message-ID: <3B5286D1.D3B434C0@scn.org> -------- Original Message -------- Subject: ÛÛ̀Âü´Í?±*Û Date: Sun, 15 Jul 2001 20:07:02 -0700 (PDT) From: vi928 at hinet.ms.com To: add2-2 at scn.org --NsDmqtaXfjEvqS5OiAA Content-Type: text/html; Content-Transfer-Encoding: base64 PGh0bWw+DQoNCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1UeXBlIiBjb250 ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9YmlnNSI+DQo8bWV0YSBuYW1lPSJHRU5FUkFUT1Ii IGNvbnRlbnQ9Ik1pY3Jvc29mdCBGcm9udFBhZ2UgNC4wIj4NCjxtZXRhIG5hbWU9IlByb2dJ ZCIgY29udGVudD0iRnJvbnRQYWdlLkVkaXRvci5Eb2N1bWVudCI+DQo8dGl0bGU+t3O69K22 MjwvdGl0bGU+DQo8L2hlYWQ+DQoNCjxib2R5Pg0KDQo8ZGl2IGFsaWduPSJsZWZ0Ij4NCiAg PHRhYmxlIGJvcmRlcj0iMCIgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAxIj4NCiAgICA8dHI+ DQogICAgICA8dGQgd2lkdGg9IjE4JSIgaGVpZ2h0PSI4NyIgcm93c3Bhbj0iMyIgYWxpZ249 ImNlbnRlciIgdmFsaWduPSJ0b3AiPjxpbWcgYm9yZGVyPSIwIiBzcmM9ImZpbGU6Ly8vRDov uc+k+S+o5KVML6RIqqsvY21hbjE0Ny5naWYiIHdpZHRoPSI5MCIgaGVpZ2h0PSIxMjgiIGFs aWduPSJ0b3AiPjwvdGQ+DQogICAgICA8dGQgd2lkdGg9Ijc5JSIgaGVpZ2h0PSI0MyI+DQog ICAgICAgIDxtYXJxdWVlIFdJRFRIPSIzOTUiIEhFSUdIVD0iMzIiIFNDUk9MTERFTEFZPSIz MDAiIEJFSEFWSU9SPSJhbHRlcm5hdGUiIFNUWUxFPSJGT05ULUZBTUlMWTq12LFkrvyz+MXp VzEyKFApO0ZPTlQtU0laRToyNFBUO0NPTE9SOiM4MDQwMDAiIGFsaWduPSJtaWRkbGUiPqSk w8Stsb2kLrn9qbOn78Xcp0GqusF5PC9tYXJxdWVlPg0KICAgICAgPC90ZD4NCiAgICAgIDx0 ZCB3aWR0aD0iMTklIiBoZWlnaHQ9Ijg3IiByb3dzcGFuPSIzIiB2YWxpZ249ImJvdHRvbSI+ PGltZyBib3JkZXI9IjAiIHNyYz0iZmlsZTovLy9EOi+5z6T5L6jkpUwvpEiqqy9jbWFuMTU3 LmdpZiIgd2lkdGg9IjExOSIgaGVpZ2h0PSIxMTAiPjwvdGQ+DQogICAgPC90cj4NCiAgICA8 dHI+DQogICAgICA8dGQgd2lkdGg9Ijc5JSIgaGVpZ2h0PSIxIiB2YWxpZ249InRvcCIgYWxp Z249ImNlbnRlciI+DQogICAgICAgIDxwIEFMSUdOPSJDRU5URVIiPjxpbWcgYm9yZGVyPSIw IiBzcmM9ImZpbGU6Ly8vRDovuc+k+S+o5KVML6rhr/MvcGxhbnQyOS5naWYiIGFsaWduPSJ0 ZXh0dG9wIiB3aWR0aD0iMjciIGhlaWdodD0iMjUiPjxmb250IENPTE9SPSIjODAwMDgwIiBT SVpFPSIrMSIgRkFDRT0itdixZLFtsWHF6SI+r8KkpMPEsHSk6C6lzqprwrKz5i6uxKpHqPS2 Vi6+QaXOpfSm872nveg8YnI+DQogICAgICAgILW0tUywxqdApc48L2ZvbnQ+PGZvbnQgQ09M T1I9IiM4MDAwODAiIFNJWkU9IisxIiBGQUNFPSJBcmlhbCI+LjwvZm9udD48Zm9udCBDT0xP Uj0iIzgwMDA4MCIgU0laRT0iKzEiIEZBQ0U9IrXYsWSxbbFhxekiPqV1rW6kQKxQtMEuxf2n QafvwFm0q62xLq5lpfq32LVvPGJyPg0KICAgICAgICCwtaRArdOms6bbq0iqurp9q0fEX6ip PC9mb250PjwvdGQ+DQogICAgPC90cj4NCiAgICA8dHI+DQogICAgICA8dGQgd2lkdGg9Ijc5 JSIgaGVpZ2h0PSI0NCIgdmFsaWduPSJ0b3AiIGFsaWduPSJjZW50ZXIiPjxpbWcgYm9yZGVy PSIwIiBzcmM9ImZpbGU6Ly8vRDovuc+k+S+o5KVML6rhr/MvcGxhbnQyOS5naWYiIGFsaWdu PSJ0ZXh0dG9wIiB3aWR0aD0iMjciIGhlaWdodD0iMjUiPjxmb250IENPTE9SPSIjODAwMDQw IiBTSVpFPSIrMSIgRkFDRT0itdixZLFtsWHF6SI+xXeq76jPpc6l9KbzrPyl1a2xvaSqurp9 q0fEX6ipqNOn87SrpKTDxK2xvaQ8YnI+DQogICAgICAgIKfvxdynQbnvrPyl1bKjq362UbRO prOuxKq6xlupwC48YnI+DQogICAgICAgIDwvZm9udD48Zm9udCBDT0xPUj0iIzgwMDA4MCIg U0laRT0iKzEiIEZBQ0U9IrXYsWSxbbFhxekiPrHAvHO0wbahptw3pOups6V1u922bLjqpHWl u7ZPPC9mb250Pjxmb250IENPTE9SPSIjZmYwMDgwIiBTSVpFPSIrMiIgRkFDRT0iRmxvcmFs aWVzIj5OVDoyMDA8L2ZvbnQ+PGZvbnQgQ09MT1I9IiM4MDAwODAiIFNJWkU9IisxIiBGQUNF PSK12LFksW2xYcXpIj6kuDwvZm9udD48L3RkPg0KICAgIDwvdHI+DQogICAgPHRyPg0KICAg ICAgPHRkIHdpZHRoPSIxMTQlIiBoZWlnaHQ9IjEiIGNvbHNwYW49IjMiIHZhbGlnbj0idG9w Ij4NCiAgICAgICAgPGRpdiBJRD0iTGF5ZXI5IiBTVFlMRT0icG9zaXRpb246IGFic29sdXRl OyBsZWZ0OiAxMTY7IHRvcDogNTIzOyB3aWR0aDogNTUwOyBoZWlnaHQ6IDE3MTsgei1pbmRl eDogOSI+DQogICAgICAgICAgPGZvbnQgQ09MT1I9IiMwMDgwMDAiPjxicj4NCiAgICAgICAg ICA8L2ZvbnQ+DQogICAgICAgIDwvZGl2Pg0KICAgICAgICA8ZGl2IElEPSJMYXllcjEzIiBT VFlMRT0icG9zaXRpb246IGFic29sdXRlOyBsZWZ0OiA1MDM7IHRvcDogMzY4OyB3aWR0aDog NjQ7IGhlaWdodDogMzA7IHotaW5kZXg6IDEzIj4NCiAgICAgICAgICA8Zm9udCBDT0xPUj0i I2ZmODBjMCIgRkFDRT0iQWxmcmVkbydzIiBEYW5jZT5lLW1haWw8L2ZvbnQ+DQogICAgICAg IDwvZGl2Pg0KICAgICAgICA8cCBhbGlnbj0ibGVmdCIgc3R5bGU9Im1hcmdpbi10b3A6IDA7 IG1hcmdpbi1ib3R0b206IDAiPjxpbWcgYm9yZGVyPSIwIiBzcmM9ImZpbGU6Ly8vRDovuc+k +S+kwLlqvXUvbGluZTE5OC5naWYiIHdpZHRoPSI2NDUiIGhlaWdodD0iMTgiPjwvcD4NCiAg ICAgICAgPHAgYWxpZ249ImxlZnQiIHN0eWxlPSJtYXJnaW4tdG9wOiAwOyBtYXJnaW4tYm90 dG9tOiAwIj48Zm9udCBDT0xPUj0iIzAwNDAwMCIgU0laRT0iKzEiIEZBQ0U9IrXYsWS+paZy xekoUCkiPq1xwcqk6KahMS48L2ZvbnQ+PHNwYW4gc3R5bGU9ImJhY2tncm91bmQtY29sb3I6 ICNGRkZGQ0MiPjxmb250IHNpemU9IjQiIGNvbG9yPSIjMDAwMDgwIj6xYri5OjE5NTIxNjU3 pOGmVzq878T1rac8L2ZvbnQ+PC9zcGFuPjxmb250IENPTE9SPSIjMDA0MDAwIiBTSVpFPSIr MSIgRkFDRT0itdixZL6lpnLF6ShQKSI+PGJyPg0KICAgICAgICA8L2ZvbnQ+PGZvbnQgY29s b3I9IiMwMDgwMDAiIHNpemU9IjMiPqbctmynvbm6vLc8L2ZvbnQ+PGZvbnQgQ09MT1I9IiMw MDgwMDAiPqR1pbu2T05UOjIwMKS4sU6mrL7as3OmULDypbu46q7GOqltplcutmyxSKZhp30u wXC1uLlxuNw8YnI+DQogICAgICAgICZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwO6ZetscwMi0yNzk0MjcwNi69VLt7q+GxTrd8qLOzdLNCsnq2bLFIPC9mb250PjwvcD4N CiAgICAgICAgPHAgYWxpZ249ImxlZnQiIHN0eWxlPSJtYXJnaW4tdG9wOiAwOyBtYXJnaW4t Ym90dG9tOiAwIj48Zm9udCBDT0xPUj0iIzAwNDAwMCIgU0laRT0iKzEiIEZBQ0U9IrXYsWS+ paZyxekiPq1xwcqk6KahMi48L2ZvbnQ+PGZvbnQgQ09MT1I9IiMwMDQwMDAiIFNJWkU9Iisx IiBGQUNFPSK12LFkvqWmcsXpIj48YnI+DQogICAgICAgIDwvZm9udD48Zm9udCBDT0xPUj0i IzAwODAwMCI+sU6w8qW7uOquxi6pbaZXtmyxSKZhp30uwXC1uLlxuNy2bLjqpHWlu7ZPTlQ6 MjAwpLguqfG4batIq8q2bLFIJm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7 Jm5ic3A7Jm5ic3A7IA0KICAgICAgICA8L2ZvbnQ+PC9wPg0KICAgICAgICA8cCBhbGlnbj0i bGVmdCIgc3R5bGU9Im1hcmdpbi10b3A6IDA7IG1hcmdpbi1ib3R0b206IDAiPjxmb250IENP TE9SPSIjMDA4MDAwIj6mYad9OqVfpaukurTysM+mqKVcuPQ0rHE0MavRNLi5ObzTPC9mb250 Pjxmb250IENPTE9SPSIjMDA4MDAwIj48YnI+DQogICAgICAgIKaspfOkSDql7KipuKa+aaXN wF0mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgDQogICAgICAgIDwvZm9u dD48L3RkPg0KICA8L3RyPg0KICA8Y2VudGVyPg0KICA8dHI+DQogICAgPHRkIHdpZHRoPSIx MTQlIiBoZWlnaHQ9IjE3IiBjb2xzcGFuPSIzIj4NCiAgICAgIDxwIHN0eWxlPSJtYXJnaW4t dG9wOiAwOyBtYXJnaW4tYm90dG9tOiAwIj48Zm9udCBDT0xPUj0iIzgwMDAwMCIgU0laRT0i KzEiIEZBQ0U9IrXYsWSxbbFhxekoUCkiPr/UuN+xTb11OjwvZm9udD48Zm9udCBjb2xvcj0i IzgwMDAwMCIgc2l6ZT0iNiI+PHNwYW4gc3R5bGU9ImxldHRlci1zcGFjaW5nOiAxMCI+PGZv bnQgZmFjZT0iQmFsbFRhY2siPjAyPC9mb250Pjxmb250IGNvbG9yPSIjODAwMDAwIiBmYWNl PSJBcmlhbCBCbGFjayI+LTwvZm9udD48Zm9udCBjb2xvcj0iIzgwMDAwMCIgZmFjZT0iQmFs bFRhY2siPjI3OTQ8L2ZvbnQ+PGZvbnQgY29sb3I9IiM4MDAwMDAiIGZhY2U9IkFyaWFsIEJs YWNrIj4tPC9mb250Pjxmb250IGNvbG9yPSIjODAwMDAwIiBmYWNlPSJCYWxsVGFjayI+Mjcw NjwvZm9udD48L3NwYW4+PC9mb250PjxhIEhSRUY9Im1haWx0bzplYmV0dHlAbXlldHdlYnMu Y29tIj48aW1nIEhFSUdIVD0iNDAiIFdJRFRIPSI3NSIgc3JjPSJjaWQ6ZGtwaW5rX2hvdXNl MC5naWYiIEJPUkRFUj0iMCIgYWxpZ249ImFic21pZGRsZSI+PC9hPjwvcD4NCiAgPC9jZW50 ZXI+DQogICAgPHAgc3R5bGU9Im1hcmdpbi10b3A6IDA7IG1hcmdpbi1ib3R0b206IDAiIGFs aWduPSJsZWZ0Ij48Zm9udCBDT0xPUj0iIzAwMDBhMCIgU0laRT0iKzEiIEZBQ0U9IrXYsWSx bbFhxekiPiZuYnNwOyAgIA0KICAgIDwvZm9udD48c3BhbiBzdHlsZT0ibGV0dGVyLXNwYWNp bmc6IDUiPjxmb250IGZhY2U9IrXYsWSxbbFhxekiIGNvbG9yPSIjMDAwMEEwIiBzaXplPSI0 Ij4mbmJzcDsmbmJzcDsmbmJzcDsgICANCiAgICCwt7FkLqz8pdUuvUeorbDdw0QuxXeq76jT uXEup0u2T7jRsKOnQaq6t9C0bzwvZm9udD48L3NwYW4+PC9wPg0KICAgIDxwIHN0eWxlPSJt YXJnaW4tdG9wOiAwOyBtYXJnaW4tYm90dG9tOiAwIiBhbGlnbj0iY2VudGVyIj48c3BhbiBz dHlsZT0ibGV0dGVyLXNwYWNpbmc6IDUiPjxmb250IGZhY2U9IrXYsWSxbbFhxekiIGNvbG9y PSIjMDAwMEEwIiBzaXplPSIzIj68eKhEscC8c6RIrfu+bq7VpU6q7S6u/KS6pX64Z75QsNM8 L2ZvbnQ+PC9zcGFuPjwvcD4NCiAgPC90ZD4NCiAgPGNlbnRlcj4NCiAgPC90cj4NCiAgPC90 YWJsZT4NCiAgPC9jZW50ZXI+DQo8L2Rpdj4NCjxwPqFAPC9wPg0KPHA+oUA8L3A+DQo8cD6h QDwvcD4NCjxwPqFAPC9wPg0KDQo8L2JvZHk+DQoNCjwvaHRtbD4= --NsDmqtaXfjEvqS5OiAA-- -------------- next part -------------- An HTML attachment was scrubbed... URL: From clariun at yahoo.com Mon Jul 16 12:06:51 2001 From: clariun at yahoo.com (patrick) Date: Mon, 16 Jul 2001 12:06:51 -0700 (PDT) Subject: SCN: Assent In-Reply-To: <3B519C51.4953.9366F50@localhost> Message-ID: <20010716190651.70187.qmail@web13202.mail.yahoo.com> That's a shocking ruling. It is as if they are following the "letter of the law", rather than the spirit of the law. Patrick --- Steve wrote: > x-no-archive: yes > > ============================= > > (Carl S. Kaplan, NY Times)---Finding that "the timeless issue of > assent" has continuing vitality in the realm of cyberspace, a federal > judge has ruled that Internet users who downloaded free software > from a Web site were not bound by the terms of a software licensing > agreement because they never consented to it. > > The ruling, which was issued on July 5th, is one of the first > decisions to directly address whether a person's mere use of a Web > site -- without first reading legal fine print and clicking an "I agree" > button -- can constitute consent to an agreement governing the use > of the site or its products. > > The decision, which may influence other courts, is a boon to some > consumers who may have been surprised to discover that by > downloading a software program or surfing through a Web site they, > without knowing it, agreed to a contract. > > The decision also casts some doubt on a widespread Internet > practice. Many Web sites state in their "Terms of Service" or > "Conditions of Use" pages that a consumer's use of the Web site > constitutes his acceptance of a contract. The Web sites rely on > terms in those contracts to protect them. > > Judge Alvin K. Hellerstein of the United States District Court in > Manhattan ruled in his decision that Netscape Communications > Corporation, which is owned by America Online, Inc., did not form a > contract with individuals who downloaded free software from > Netscape's Web page. Accordingly, the court said that the users > were not obliged to honor an arbitration clause in the software > agreement. Judge Hellerstein ordered the parties to appear before > him for a case status conference on July 26. > > AOL may appeal the ruling to the U.S. Court of Appeals for the > Second Circuit, in Manhattan. Nicholas J. Graham, a spokesperson > for AOL, said, "We disagree strongly with the decision that was > handed down last week, and we are in the process of considering > our options." > > Joshua Rubin, a lawyer representing the plaintiffs in the case and a > partner at Abbey Gardy, a New York law firm, said that he thought > the court's decision was well reasoned and correct. "It applies an > ancient and fundamental principle in a novel context. That is, you > can't be bound to that which you don't agree to," he said. > > In related complaints filed last year, six individuals in three cases > alleged that Netscape's freely available software, SmartDownload, a > service that assists in the of downloading files from the Internet, > surreptitiously tracked private information about a user's file > transfer activity on the Internet. The plaintiffs, who are seeking class > action status, claim that by offering the software, Netscape and AOL > violated two federal statutes, the Electronic Communications Privacy > Act and the Computer Fraud and Abuse Act. > > In previous statements to the press, AOL said that the lawsuit was > without merit. In any case, the company announced last August that > new editions of the software program would not contain the alleged > consumer-tracking device. > > Earlier, Netscape argued that its licensing agreement with the > plaintiffs mandated that the case be thrown out of court and referred > to an arbitration panel. That set the stage for the court's ruling > whether the software licensing agreement was valid in the first > place. > > In his decision, Hellerstein repeated the age-old rule of contract law > that a necessary ingredient in making a promise binding between > two people is consent, a meeting of the minds. "So it was at King's > Bench in common law England; so it was under the common law in > the American colonies; so it was through more than two centuries of > jurisprudence in this country; and so it is today," he wrote. > > Consent can be indicated by any number of things, including a > signature or a handshake, said Judge Hellerstein. Indeed, any sign, > symbol or action, or even willful inaction, can amount to consent and > create a contract. > > But in the Netscape case, there was no required action on the part of > a user that could signal his consent to a licensing agreement. In > support of his view, Hellerstein observed that when the plaintiffs > wished to obtain SmartDownload from Netscape's Web site, they > viewed a download page that had a tinted box, or button, labeled > "Download." By clicking on the box, a visitor initiated the download. > > The sole reference to the existence of a licensing agreement > appeared in text at the bottom of the download page. That text read: > "Please review and agree to the terms of the Netscape > SmartDownload software license agreement before downloading and > using the software." By clicking on some words in the sentence, a > visitor was transported to another page that warned the user to read > and agree to a licensing agreement before acquiring the software > product. The warning contained a link to the licensing agreement. > Among other things, the agreement stated that by installing or using > SmartDownload, the user "is consenting to be bound by and is > becoming a party to this agreement." > > Judge Hellerstein reckoned that visitors were not required to > affirmatively indicate their assent to the license agreement, or even > to view the license agreement, before downloading the software. > "Netscape's failure to require users of SmartDownload to indicate > assent to its license as a precondition to downloading and using its > software is fatal to its argument that a contract has been formed," he > wrote. > > In his opinion, Judge Hellerstein acknowledged that users could > signal their consent to software licensing agreements by a minimal > action or willful inaction if the user has sufficient notice of the > contract. For example, in "shrink-wrap" licenses, which have been > upheld by some courts, software is packaged in a container or > wrapper that advises the purchaser that the use of the software is > subject to the terms of a license agreement tucked inside the > package. The license agreement generally states that if the > purchaser does not wish to enter into a contract, he must return it for > a refund, and that his failure to return within a period of time will > constitute assent to the license terms. > > In addition, in so-called "click-wrap" or "click-thru" licenses, which > also have been upheld by many courts, a user is presented with a > message on his computer screen, requiring that he signify his > assent to the terms of an agreement by clicking on an "I agree" > button. Generally, the product or service cannot be obtained or used > until the button is clicked. > > In contrast to those scenarios, said Judge Hellerstein, Netscape's > SmartDownload allowed a user to download and use the software > "without taking any action that plainly manifests assent to the terms > of the associated license or indicates an understanding that a > contract has been formed." > > Sometime after the lawsuit was filed, Netscape changed its > SmartDownload page. Now, next to the download button, reads the > sentence: "By downloading, I agree to the terms of the following > agreement." The licensing agreement is printed in a window next to > the download button. > > Michael H. Sproule, a lawyer who specializes in intellectual property > matters at Akabas & Cohen, a New York law firm, said that Judge > Hellerstein's ruling has ramifications far beyond software licensing > agreements. "I think this is something that Web sites have got to > consider," he said. "Almost every Web site out there has a Terms of > Service page. Generally it's not very prominent. It governs the use > of the Web site and typically requires users of the site to bring suit > or an arbitration proceeding in a land far away. It also often contains > the famous phrase: 'If you continue to use this service you are > bound by these terms.' At least according to the logic of Judge > Hellerstein's decision, those Terms of Service contracts are > dubious," said Sproule. > > The upshot, he added, is that those Web sites relying on the legality > of a Terms of Service Use contract and the viability of an arbitration > and forum selection clause may, in fact, be subject to lawsuits in all > 50 states and foreign jurisdictions. > > Martin H. Samson, a lawyer who specializes in Internet Law at > Phillips, Nizer, Benjamin, Krim & Ballon, a New York law firm, said > that he believed that Judge Hellerstein may have left open the > possibility that a user could assent to a contract by merely using a > site if the user had prominent notice that his use signified consent. > "If I put a license agreement right in front of a user's face, and the > agreement said your use of the site constitutes consent, that might > be okay," said Samson. The problem, he said, is that the legal rules > are not clear. "Until some judge says use-based contracts are > enforceable, they are iffy," he said. > > Ian C. Ballon, a Palo Alto, California-based Internet lawyer and editor > of the treatise, "E-Commerce and Internet Law" (Glasser > LegalWorks, 2001), said it was not surprising that a judge looked at > the issue of use-based Internet contracts and found them to be a > problem. Other judges, however, might have reached different > conclusions in light of the "widespread" custom of conditioning a > person's use of a Web site to posted Terms and Conditions, he > said. > > "The decision does underscore that it's the better practice not to > take a chance," said Ballon. "It's prudent for Web sites to have click- > thru agreements," he said. > > That way, neither the Web site company nor the consumer would be > in for a legal surprise. > > > Copyright 2001 The New York Times Company > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * __________________________________________________ Do You Yahoo!? Get personalized email addresses from Yahoo! Mail http://personal.mail.yahoo.com/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Wed Jul 18 07:43:10 2001 From: steve at advocate.net (Steve) Date: Wed, 18 Jul 2001 07:43:10 -0700 Subject: SCN: Distributed computing Message-ID: <3B553E0E.17389.19B6356@localhost> x-no-archive: yes ============================== (Janelle Brown, Salon)---When David McOwen, a computer administrator at DeKalb Technical College in Georgia, installed a screensaver from an outfit known as Distributed.net on his school's computers in June 1999, he thought he was doing something that would make the world a better place. The Distributed.net screensaver is a prominent early example of what "distributed computing" systems can do, similar to the SETI at Home program that takes advantage of unused computer downtime to look for extraterrestrial radio signals that might finally prove the existence of life beyond Earth. Distributed computing cobbles together the collective unused resources of the Net's computers to replicate the power of a supercomputer by breaking up big problems into small pieces that individual personal computers can nibble on. In the case of the Distributed.net program, however, aliens weren't the quarry. Instead, it focused on solving complicated encryption problems -- whenever DeKalb's students weren't actively using the college's computers, the screensaver would kick in, contact the Distributed.net system and start cranking away. McOwen had worked on the first versions of the pioneering Hayes modem and had also helped develop worldwide DSL (digital subscriber line) standards -- his geek credentials are beyond challenge. One definition of a true computer geek may be that he or she never wants to see a computer processor cycle go wasted, so McOwen was thrilled that the DeKalb computers could be useful even when students weren't pumping out term papers. At one point, the DeKalb network of hundreds of computers even reached No. 1 on the Distributed.net charts, meaning that he was contributing more computational power to the encryption challenge than anyone else in the world. "I saw what the technology was about, and it was a good technology - a new technology and a pioneering effort, and certainly not bad or criminal in any way," says McOwen, a soft-spoken man in his late 30s. "If Distributed.net is successful, it has worldwide implications." But while McOwen may know his way around a computer network, he appears to have been less savvy about how to negotiate with the DeKalb bureaucracy. Because DeKalb's administrators didn't agree with McOwen's assessment of the wonders of distributed computing. Six months after the Distributed.net screensaver began quietly churning away on the DeKalb computers, McOwen was pulled into an office and handed a letter that said he was going to be facing criminal charges. According to McOwen, the DeKalb administrators were equating the screensaver with a hacking tool. "I was never given a chance to just turn it off," says McOwen, who says the crackdown came from out of the blue. "I was never given an opportunity to explain what it was or how it worked ... It was just a blanket: boom, you're out of here." In February 2000, at the college's request, McOwen resigned and went to work as a consultant, thinking that the affair was over. But in late June, the Georgia attorney general's office contacted McOwen to inform him that he should expect an indictment by the end of July. According to McOwen's lawyer, David Joyner, after spending 18 months researching the case the attorney general decided to convene a grand jury to see if McOwen should be charged with breaking a criminal statute that's typically used to combat computer hacking. The penalty could be stiff: McOwen could face 15 years in prison, plus a fine of more than $415,000 -- calculated on the basis of charges for "$.59 per second" for use of 500 computers, including the cost of bandwidth, backbone, networking and frame relay. Russ Willard, spokesperson for the attorney general's office, says, "We are currently investigating an allegation of misuse of state government property; I really can't comment." "Apparently, they felt that McOwen didn't have the authority to download the program, even though it didn't adversely affect the computer system," says Joyner. The programming community that follows distributed computing developments is, not surprisingly, up in arms. In early July McOwen sent out a mass e-mail begging for legal advice; he immediately received thousands of responses, including a story on the news site OpenP2P. A group of concerned software programmers started a legal fund for McOwen that so far has collected more than $1,200; McOwen says he's heard from the chief technologist at the FCC as well as from congressional staffers. "The outpouring has just been incredible," he says, gratefully. The case may be attracting such attention because geek idealists see distributed computing as one answer to a host of intractable problems. Distributing computing systems have been aimed at problems as varied as finding cures for cancer or AIDS or predicting worldwide climate changes. If McOwen is found guilty, the negative publicity for distributed computing might discourage other universities and large institutions from lending their computer networks to the cause. Or perhaps it's simply that the restitution charges don't seem to make sense: $.59 per second? Distributed.net staffers did not respond to a request for comment (according to McOwen, they have been subpoenaed for the case), but Dan Wertheimer, who founded SETI at Home, says that distributed computing applications typically don't use much bandwidth, since the screensavers connect to the Internet for merely a second or two every few days. "The costs are minuscule," says Wertheimer. "And it doesn't use much computer time -- it's a screensaver. It's hard to imagine this would hurt the school system." There have been cases in the past of institutions that disapproved of distributed computing, but never because of the costs of the program. According to Wertheimer, some companies have expressly asked their employees not to install SETI at Home, not because it interfered with the network but "because they don't want outside code on their computers based on security concerns." But other companies, such as Sun Microsystem, have avidly embraced distributed computing and happily donate their entire networks to the cause. McOwen and his attorney hope the promised indictment will never arrive; it remains to be seen what the final charges against him will be. Meanwhile, McOwen continues to ponder what, exactly, he did wrong. He worries that the future of the entire Distributed.net project is at stake simply because he thought that DeKalb's computers might be useful for solving collective problems. "If it's so damaging to them, then it must be damaging to the rest of the world, too," he says, wryly. As Joyner puts it, "I've had a lot of criminal cases, and there's always an alleged victim in a criminal case. But where's the victim here?" Copyright 2001 Salon.com * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Thu Jul 19 01:53:35 2001 From: sharma at aa.net (Sharma) Date: Thu, 19 Jul 2001 01:53:35 -0700 (PDT) Subject: SCN: Hackers Developing Anti-Censorship Software (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 19 Jul 2001 02:12:48 EDT http://dailynews.yahoo.com/h/nm/20010716/tc/tech_censorship_dc_1.html [links] Monday July 16 7:13 PM ET Hackers Developing Anti-Censorship Software By Elinor Abreu LAS VEGAS (Reuters) - A group of hackers is finishing work on software that would enable human rights workers to access censored Web sites, in a move that ratchets up the ``arms race'' between free speech activists on the Internet and government censors in Asia and the Middle East. The software, called ``Peekabooty,'' was scheduled to be unveiled this past weekend but was pushed back to later this year to make sure it adequately protects those using it, said Oxblood Ruffin, a leader in the group. ``We believe that access to information is a basic human right guaranteed by law,'' he told Reuters following a weekend session on the project at the DefCon conference for hackers and network security advisors. ``It is going to be an arms race.'' Already there have been efforts to thwart the project. The United Arab Emirates blocked access to the Web site of hacker group Cult of the Dead Cow last year right after the group announced plans for the anti-censorship software, said Bronc Buster, another member of the group, which calls itself ''Hactivismo.'' Along with the UAE, countries that prevent their citizens from accessing certain Web sites they deem political or pornographic include Saudi Arabia, Myanmar, China and North Korea, the group said. The Peekabooty software will circumvent filters designed to block access to Web sites by going around them, using a distributed privacy network, according to a Hactivismo fact sheet. Nearly 30 volunteers are working on the project, including lawyers, programmers, students and human rights workers in the United States, China, Canada, Europe, Israel, Taiwan and South Korea, the group said. At the conference, human rights workers urged hackers to do what they could to use technology to advance human rights. Patrick Ball, deputy director of the American Association for the Advancement of Science and its Science and Human Rights Action Network, said encryption had helped his group save lives and bring human rights abusers to justice. ``Hacking is finding things out. It is knowledge, especially when things are hidden, obscure and important,'' Ball said. The Cult of the Dead Cow is known for making a splash at DefCon. In 1999, the group released Back Orifice, which can be used by malicious hackers to gain unauthorized access to PCs running Windows 95 or Windows 98. Copyright � 2001 Reuters Limited. All rights reserved. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From star at scn.org Thu Jul 19 15:04:32 2001 From: star at scn.org (Special Technology Access Resources) Date: Thu, 19 Jul 2001 15:04:32 -0700 (PDT) Subject: SCN: Re: Helllooooo In-Reply-To: Message-ID: Yes, it will be him on the G3. Date is the 26th. Tx, Randy Hayhurst Program Director STAR Center of Seattle (206) 325-4284 On Sat, 7 Jul 2001, Irene Mogol wrote: > OK, I think that is July 27. > That would be Worthington on the MAC? Or is someone else. He was the one > who told Wade and me that you were ill. > See ya, > Irene > > > On Fri, 6 Jul 2001, Special Technology Access Resources wrote: > > > Thanks, and yes, let's plan for the 4th Thursday in July. > > > > I already have one sign up who will want to learn on the Mac G3. > > > > Thanks for all your kind thoughts! > > > > > > Randy Hayhurst > > Program Director > > STAR Center of Seattle > > (206) 325-4284 > > > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Thu Jul 19 19:47:33 2001 From: steve at advocate.net (Steve) Date: Thu, 19 Jul 2001 19:47:33 -0700 Subject: SCN: Free information Message-ID: <3B573955.2526.D66B19@localhost> x-no-archive: yes ========================== Information has been free all along. It's the Internet that wants to enslave it. (Michael Kinsley, Slate)---The first great cliche of the Internet, carbon- dated back to the mid-1990s, was "information wants to be free." The notion, purged of poetry, was that no one should have to pay for "content" - words and pictures and stuff like that - and, in the friction- free world of cyberspace, no one would have to. Today, following last year's Great Internet Disillusion, people no longer care what information wants. Information can go inform itself, because information providers want to get paid. Investors are suddenly asking for some plausible theory of how and when a Web site might be expected to make money. And meanwhile, the two most popular answers to those questions - a) advertising; and b) don't bother us about that now, can't you see we're busy? - are met with increasingly impolite skepticism. "You're fired" is how many skeptics now analyze the situation. The reigning notion today is that the laws of economics are not, after all, suspended in cyberspace like the laws of gravity in outer space. Content needs to be paid for on the Web just as in any other medium. And it probably has to be paid for the same way most other things are paid for: by the people who use it. We tried charging the customers at Slate. It didn't work. Future experiments may be more successful, and we at Slate encourage others to jump in. We'll watch. But meanwhile, let's look again at this notion that in every medium except the Internet people pay for the content they consume. It's not really true. Television is the most obvious case. A few weeks ago a producer from Nightline contacted Slate while researching a possible show on the crisis of content on the Internet. He wanted to know how on earth we could ever be a going business if we gave away our content for free. I asked how many people pay to watch Nightline. Answer: none. People pay for their cable or satellite hookup, and they pay for content on HBO, but Nightline and other broadcast programs thrive without a penny directly from viewers. There are plenty of differences, of course, and the ability of Web sites to support themselves on advertising is unproved. But Nightline itself disproves the notion that giving away content is inherently suicidal. Now, consider newspapers. Customers do pay, but they're not really paying for the news: They're paying for the paper. Newsprint (which is the paper, not the ink) currently costs around $600 per metric ton. That's about 27 cents a pound. A weekday edition of the Washington Post weighs about a pound and costs 25 cents. Not every paper is as weighty as the Post. But a recent article in Presstime, the house organ of the American Association of Newspapers, reported that a typical newspaper gets about 22 percent of its revenues from readers, while spending 12 percent on paper and ink, 6 percent on running the presses, and 13 percent on delivery and distribution. That's every penny the newspaper gets from its readers plus another 9 percent of its revenue going to expenses that virtually disappear on the Web. Giving up that revenue in exchange for losing those expenses looks like a great way to make money. Once again, no one has managed to make that deal yet (though the Wall Street Journal web edition is reportedly close). But distributing the news for free on the Internet does not seem inherently more absurd than chopping down trees, hauling huge rolls of newsprint across continents, running vast presses, and dispatching a fleet of trucks at the crack of dawn in order to get 25 cents for the same words and pictures on 27 cents' worth of paper. Finally, look at magazines. And forget about the cost of paper: The money that magazine subscribers pay often doesn't even cover the cost of persuading them to subscribe. A glossy monthly will happily send out $20 of junk mail - sometimes far more - to find one subscriber who will pay $12 or $15 for a year's subscription. Why? Partly in the hope that she or he will renew again and again until these costs (plus the cost of actually producing and sending the magazine) are covered. But for many magazines - including profitable ones - the average subscriber never pays back the cost of finding, signing, and keeping him or her. The magazines need these subscribers in order to sell advertising. Most leading print magazines would happily send you their product for free if they had any way of knowing (and proving to advertisers) that you read it. Advertisers figure, reasonably, that folks who pay for a magazine are more likely to read it, and maybe see their ad, than those who don't. So magazines make you pay, even if it costs them more than they get from you. This madcap logic doesn't apply on the Internet, where advertisers only pay for ads that have definitely appeared in front of someone's "eyeballs." They can even know exactly how many people have clicked on their ads. So far, advertisers have been insufficiently grateful for this advantage. But whether they ultimately come around or not, there will never be a need on the Internet to make you pay just to prove that you're willing. So maybe the Internet's first great cliche had it exactly backward: Information has been free all along. It's the Internet that wants to enslave it. Copyright 2001 Slate.com * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From jj at scn.org Sat Jul 21 00:52:00 2001 From: jj at scn.org (J. Johnson) Date: Sat, 21 Jul 2001 00:52:00 -0700 (PDT) Subject: SCN: Warning to DSL and cable users. Message-ID: Some important information for all of you who connect to the Internet via cable, DSL, or similar "high-speed" networked connections. This is from CERT ("Computer Emergency Response Team"), the organization that monitors Internet operational problems and threats. In brief, when you connect to the Internet via DSL, cable, or similar networked connections, you are connected ("exposed") _directly_, and no longer have the protections of a buffered connection using an ISP (such as SCN). Unfortunately, nearly all consumer grade operating systems have multiple _known_ vulnerabilities, and additional measures are needed to prevent compromise. Please read on. === JJ ============================================================= ---------- Forwarded message ---------- Date: Fri, 20 Jul 2001 17:56:43 -0400 (EDT) From: CERT Advisory To: cert-advisory at cert.org Subject: CERT Advisory CA-2001-20 -----BEGIN PGP SIGNED MESSAGE----- CERT Advisory CA-2001-20 Continuing Threats to Home Users Original release date: July 20, 2001 Source: CERT/CC A complete revision history can be found at the end of this file. Need to Protect Home Systems This year, we have seen a significant increase in activity resulting in compromises of home user machines. In many cases, these machines are then used by intruders to launch attacks against other organizations. Home users have generally been the least prepared to defend against attacks. Many home users do not keep their machines up to date with security patches and workarounds, do not run current anti-virus software, and do not exercise caution when handling email attachments. Intruders know this, and we have seen a marked increase in intruders specifically targeting home users who have cable modem and DSL connections. Most of the subscribers to the CERT Advisory Mailing List and many visitors to our web site are technical staff responsible for maintaining systems and networks. But all of us know people who have home computers and need advice about how to secure them. We recently released a document on our web site providing some basic security information and references for home users. The document, "Home Network Security," is available on our web site at http://www.cert.org/tech_tips/home_networks.html We encourage the technical readers of our mailing list to reach out to your parents, children, and other relatives and friends who might not be as technically oriented, point them to this document and help them understand the basics of security, the risks, and how they can better defend themselves. We have a long road to travel in educating home users on the security risks of the Internet. But all of us working together to educate home users will improve the security of the Internet as a whole. Worms and DDoS Tools The CERT/CC is currently tracking the activity of several large-scale incidents involving new worms and distributed denial-of-service (DDoS) tools. Some of these worms include a command and control structure that allows the intruder to dynamically modify the behavior of the worm after it has infected a victim system. In some cases, the command and control structure allows the intruder to issue a single command to all the infected systems without needing to know which systems have actually been infected. This ability to change the behavior of the worm (including wholesale replacement), makes it substantially more difficult to develop "one size fits all" solutions to the problem. Additionally, many of these worms have targeted home users as victims. With these facts in mind, and the large number of hosts involved in these incidents, it is imperative for everyone to take precautions to patch the vulnerabilities involved and recover compromised systems. W32/Leaves worm The W32/Leaves worm, described in IN-2001-07 primarily affects systems that have been previously compromised by the SubSeven Trojan horse program. We have received reports that over 23,000 machines have been compromised by this worm. This worm includes functionality that allows a remote intruder to control the network of compromised machines. "Code Red" worm The "Code Red" worm, described in CA-2001-19 exploits a vulnerability in the Indexing Service on systems running Microsoft IIS. Current reports indicate that over 225,000 hosts have already been compromised by this worm. "Power" worm A worm, known by the name of "Power" is also compromising systems vulnerable to the IIS Unicode vulnerability described in CA-1999-16. It uses the Internet Relay Chat (IRC) as a control channel for coordinating compromised machines in DDoS attacks. Based on reports that we have received, over 10,000 machines have already been compromised by this worm. "Knight" distributed attack tool An attack tool known as "Knight" has been found on approximately 1,500 hosts. This tool appears to be a DDoS tool and also uses IRC as a control channel. It has been reported that the tool is commonly being installed on machines that were previously compromised by the BackOrifice Trojan horse program. So far, there has been no indication that this tool is a worm; it does not contain any logic to propagate automatically. Protective Measures For all of these problems, the deployment and maintenance of some these simple defenses are relatively effective: 1. Install and Maintain Anti-Virus Software The CERT/CC strongly recommends using anti-virus software. Most current anti-virus software products are able to detect and alert the user that an intruder is attempting to install a Trojan horse program or that one has already been installed. In order to ensure the continued effectiveness of such products, it is important to keep them up to date with current virus and attack signatures supplied by the original vendors. Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available. 2. Deploy a Firewall The CERT/CC also recommends using a firewall product, such as a network appliance or a personal firewall software package. In some situations, these products may be able to alert users to the fact that their machine has been compromised. Furthermore, they have the ability to block intruders from accessing backdoors over the network. However, no firewall can detect or stop all attacks, so it is important to continue to follow safe computing practices. For additional information about securing home systems and networks, please see the "Home Network Security" tech tip at http://www.cert.org/tech_tips/home_networks.html If these protective measures reveal that the machine has already been compromised, more drastic steps need to be taken to recover. When a computer is compromised, any installed software could have been modified, including the operating system, applications, data files, and memory. In general, the only way to ensure that a compromised computer is free from backdoors and intruder modifications is to re-install the operating system from the distribution media and install vendor-recommended security patches before connecting back to the network. Merely identifying and fixing the vulnerability that was used to initially compromise the machine may not be enough. Often, these worms rely on Trojan horses to initially compromise a system. For more information on Trojan horses, see http://www.cert.org/advisories/CA-1999-02.html Additionally, these worms often spread by exploiting vulnerabilities in systems. For information on vulnerabilities affecting popular products, please see http://www.kb.cert.org/vuls ______________________________________________________________________ Author(s): Jeff Carpenter, Chad Dougherty, Shawn Hernan ______________________________________________________________________ ______________________________________________________________________ This document is available from: http://www.cert.org/advisories/CA-2001-20.html ______________________________________________________________________ CERT/CC Contact Information Email: cert at cert.org Phone: +1 412-268-7090 (24-hour hotline) Fax: +1 412-268-6989 Postal address: CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 U.S.A. CERT personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends. Using encryption We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key If you prefer to use DES, please call the CERT hotline for more information. Getting security information CERT publications and other security information are available from our web site http://www.cert.org/ To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo at cert.org. Please include in the body of your message subscribe cert-advisory * "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office. ______________________________________________________________________ NO WARRANTY Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. _________________________________________________________________ Conditions for use, disclaimers, and sponsorship information Copyright 2001 Carnegie Mellon University. Revision History Jul 20, 2001: Initial release -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBO1inDgYcfu8gsZJZAQE1iwP7BpBJ4J2aUgjNxgTPdytNiYAeDJC7zKCU jYYumhEGPAjBQgoqVPkVi4zApStfMUMsBBSahSll+S8zBoZfbviblnzLLx1Ac/NN YAw7sq6X8RQ+RQ7kltcwUy0Ut0gJDxZCinPxgg+dyQ0Sww9dzSQesCaKT3uazY4P AkPWGUsE/Ic= =0QKl -----END PGP SIGNATURE----- * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bhigh at eskimo.com Sun Jul 22 11:16:44 2001 From: bhigh at eskimo.com (Brian High) Date: Sun, 22 Jul 2001 11:16:44 -0700 Subject: SCN: The revolution may be wireless Message-ID: <000e01c112da$79789280$c900005a@happygardening.com> http://seattleweekly.com/features/0129/tech-fleishman.shtml The revolution may be wireless Northwest networkers work toward a complete communications grid, minus the corporate interest. BY GLENN FLEISHMAN [...] Seattle finds itself with a growing group of enthusiasts led, as much as any group of this kind can be led, by Matt Westervelt under the rubric Seattle Wireless (www.seattlewireless.net). Matt and others have collected a few dozen geographically dispersed nodes in homes and places like Aurafice Cafe on Capitol Hill. They are nearing the point where they stitch these points into a sprawling, mostly seamless grid using cheap, off-the-shelf, and even homemade equipment. [...] Most volunteers' nodes have a high-speed DSL or cable modem connection to the Internet. The volunteers are engaging in anarchic enlightened self-interest: By freely sharing their bandwidth, they're increasing the value and coverage of the entire network, making it more likely for others to join and share as well. (It warms my heart, reminding me strongly of the 1994-vintage barely commercial Internet.) [...] * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Sun Jul 22 17:28:38 2001 From: sharma at aa.net (Sharma) Date: Sun, 22 Jul 2001 17:28:38 -0700 (PDT) Subject: SCN: 1st hand account - protesters in Genova brutalized (fwd) Message-ID: ---------- Forwarded message ---------- Date: Sun, 22 Jul 2001 09:52:22 -0700 From: "getmelissa at uswest.net" To: undisclosed-recipients: ; Subject: 1st hand account - protesters in Genova brutalized ENOUGH IS ENOUGH!! The entire freaking world is becoming one military state. I'm sick. -melissa -------- Original Message -------- Subject: [seagreens-talk] IMC Italy raid Date: Sat, 21 Jul 2001 23:22:28 -0700 From: "Colleen Roman" Horrific raid on GSF and IMC Genoa : Report by IMCista 6:29am Sun Jul 22 '01 (Modified on 8:05am Sun Jul 22 '01) Report from the IMC tonight. Tonight the carabineraie raided the IMC as many people already have probably seen on the newswire already. As we saw it the carabineraie started by pulling up about 2-300m up the road in initially around four to five vans. They got out and started to jog down the street in riot gear and batons. People saw them and started to enter both building - the main GSF building and the school. The school had been a safe space for people to sleep and chill for a few days. In the school there were a diverse bunch of people. As the convergence center was quite close, many people came to get information on the counter conference and the solidarity marches and also to use computers. Many people who slept in the school were participants from the marches, a group of pacifists from Zaragoza had come to the school to sleep just fifteen minutes before the arrived, (as it was the only really "safe" space to sleep) and ended up with eight hospitalised and more detained by the carabineraie. The carabineraie, having reached the school and the GSF building started to arbitrarily beat people with the batons as people scrabbled to get inside either building. The door were closed on the GSF building but they entered from, not the main door, but one which was not secured at the side - not secured as this was just not expected. I can only tell from what happened now from the IMC as I was there working. The IMC tried to calm people down as the carabineraie came in and demanded that all of us stand spread-eagle against the wall for about 30 minutes whilst the people wandered in and out of the rooms a bit listlessly, looking for anything incriminating - as if. They then moved everyone into one area and everyone had to sit down for another twenty minutes or so. What they found and took was some of the equipment like mini disks videos and disks and searched many peoples bags. They also took some salad knives from the kitchen and a couple of gas masks. Later after it was all over they said to the press that they saw quite a lot of black clothes inside the rooms, well excuse me. Apparently opposite the police took all available passports and wallets and diaries from peoples bags. The carabineraie tried to take one of the IMC people but another journalist with G8 accreditation stepped in although he was pushed back the carabineraie left the other guy alone. They finally left when a women MP who was in the building came to our floor and had powers to make to carabineraie leave - due to the fact that we were an international group and also journo/press. The police left, but we discovered that the people on the other floors of the GSF building had had freedom to roam after only being held on the floor for a short time. Also the GSF Lawyers office was ransacked and the computers destroyed, hard drives taken and the phones smashed - so much for the law. The computers conatined all of the info relating to legal aid etc over the last few days. The carabineraie obviously had their purpose here - one mission being to search the IMC floor to find something to discredit the IMC media movement. After they left people immediately checked their gear and recorded what was taken, and then the keypads started burning. Then we discovered the fucking mass beatings next door where people were already sleeping and others had been eating and talking, many IMC people stayed outside to somberly record the devastation and support those in shock and disbelief at what had just occurred. Tears and shouts of "assinos" followed the police who for another half an hour or so were still blocking off exits. Many people outside had been chanting "let them free" whilst we were up against the wall and the school was being emptied with stretcher after stretcher of young men and women being carried out. The story from across the street in the school was that when police arrived they grabbed the first people they could outside and beat them heavily - one of the first to be beaten was a uk reporter who was smashed repeatedly by a group of them - one held him by his neck while the others beat him with clubs - unconscious he was left in the street in a pool of blood (later when we were allowed out of the building the blood had been cleaned off the pavement). Their intention was clear then from the start. Inside the building when police entered many people inside raised their hands but the police just started smashing windows. One group then ran to the third floor and managed to escape out of an upper window and down scaffolding (the building is a bit of a building site under repair) - they were lucky. The others inside were beaten everywhere but from the long stream of stretchers came out of the building they were obviously trying to injure people as seriously as possible - at least five were brought out unconscious. Later after more arrests in the street the police and fleet of ambulances departed, leaving us access to the building. Inside the sight was sickening. There was thick dark blood all up the walls, over the floor and at the bottom of stairs. It looked like several people had been beaten while on the ground from the blood patters low down on the walls. The scene was horrible. Even the ambulance staff were obviously shocked. The night is long and will not end to day. This is a sad day for democracy. As to the "weapons" they found in the school, the place was as we said earlier was under repair, a small section blocked off and littered with pipes and building materials etc Like us they too had knives (and forks!) for cooking and eating. The local media and other reports have said police where there searching for weapons or drugs. No, it is obvious why they were here. The testimonies of people in both buildings, the blood on the street and inside the school and the number seriously injured in this so called search tells the true story. No doubt many things will be said about this horrific evening here at the GSF building, but whatever happens, Indymedia will continue to report the truth. http://www.indymedia.org * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe local-computer-activists END * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Sun Jul 22 17:33:38 2001 From: sharma at aa.net (Sharma) Date: Sun, 22 Jul 2001 17:33:38 -0700 (PDT) Subject: SCN: from Starhawk: "Please do Something" (fwd) Message-ID: ---------- Forwarded message ---------- Date: Sun, 22 Jul 2001 11:59:07 -0700 From: "getmelissa at uswest.net" To: "'Christine Clarridge, Seattle Times Staff Reporter'" , joelconnelly , Lori Matsukawa Subject: from Starhawk: "Please do Something" Please go to your local Italian embassy now!!!!!!! If you can't go there please at least call the Italian Embassy. -melissa -------- Original Message -------- Subject: [GP2001] Genoa 7/21 Date: Sun, 22 Jul 2001 14:20:47 -0400 (EDT) From: humanbeing at webtv.net Letters home from an excersize in political dialogue: Genoa 7/21 By Starhawk I think I'm calm, that I'm not in shock, but my fingers are trembling as I write this. We were up at the school that serves as a center for media, medical and trainings. We had just finished our meeting and were talking, making phone calls, when we heard shouts and sirens and the roar of people yelling, objects breaking. The cops had come and they were raiding the center. We couldn't get out of the building because there were two many people at the entrance. Lisa grabbed my hand and we went up, running up the five flights of stairs, up to the very top. Jeffrey joined us, people were scattering and looking for places to hide. We weren't panicking but my heart was pounding and I could hardly catch my breathe. We found an empty room, a couple of tables, grabbed some sleeping bags to cover our heads if we got beaten. And waited. Helicopters were buzzing over the building, we could hear doors being slammed and voices shouting below, then quiet. Someone came in, walked around, left. I couldn't seem to breath deep and I had an almost uncontrollable cough�but I controlled it. I lay there remembering we had lots and lots of people sending us love and protection and I was finally able to breathe. The light went on. Through a crack between the tables, I could see a helmet, a face. A big Italian cop with a huge paunch loomed over us. He told us to come out. He didn't seem in beating mode, but we stayed where we were, tried to talk to him in English and Spanish and the few Italian words I know: "paura" "fear" and "pacifisti." He took us down to the third floor, where a whole lot of people were sitting, lined up against the walls. We waited. Someone came in, demanding to know whether there was someone there from Irish Indy media. We waited. Lawyers arrived: The police left. For some arcane reason of Italian law, because it was a media place we had some right to be there, although the school across the street was also a media center and they went in there and beat people up. We watched for a long time out the windows. They began carrying people out on stretchers. One, Two, a dozen or more. A crowd had gathered and were shouting "Assessini! Assesini!" The brought out the waking wounded, arrested them and took them away. We believe they brought someone out in a body bag. The crowd below was challenging the cops and the cops were challenging the crowd and suddenly a huge circle of media gathered, bright camera lights. Monica, who is hosting us and is with the Genoa Social Forum, came up and found us. She'd been calling embassies and media and may have saved us from getting hurt once the cops finished with the first building. All the time there were helicopters thrumming and shining bright lights into the building. A few brave men were holding back the angry crowd, who seemed ready to charge the line of riot cops that was formed up in front of the school, shields up and gas masks on. "Tranquilo, tranquilo," the men were saying, holding up their hands and restraining the angry crowd from a suicidal charge. I was on the phone home, then back to the window, back to the phone. Finally, the cops went away. We went down to the first floor, outside, heard the story. They had come in to the rooms where people were sleeping. Everyone had raised up their hands, calling out "pacifisti! Pacifist!" And they beat the shit out of every person there. There's no pretty way to say it. We went into the other building: there was blood at every sleeping spot, pools of it in some places, stuff thrown around, computers and equipment trashed. We all wandered around in shock, not wanting to think about what is happening to those they arrested, to those they took to the hospital. We know that they have arrested everyone they take to the hospital, taken people to jail and tortured them. One of the young Frenchmen from our training, Vincent, had his head badly beaten on Friday in the street. In jail, they took him into a room, twisted his arms behind his back and banged his head on the table. Another man was taken into a room covered with pictures of Mussolini and pornography, and alternately slapped around and then stroked with affection in a weird psychological torture. Others were forced to shout, "Viva El Duce!" ! ! Just in case it isn't clear that this is Fascism. Italian variety, but it is coming your way. It is the lengths they will go to to defend their power. It's the lie that globalization means democracy. I can tell you, right now, tonight, this is not what democracy looks like. I've got to stop now. We should be safe if we can make our way back to where we're stayiing. Call the Italian Embassy. Go there, shame them! We may not be able to mount another demonstration tomorrow here if the situation stays this dangerous. Please, do something! * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe local-computer-activists END * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Sun Jul 22 19:20:35 2001 From: sharma at aa.net (Sharma) Date: Sun, 22 Jul 2001 19:20:35 -0700 (PDT) Subject: SCN: Coalition Protests Needed Re:Fwd:an appeal from the activists fighting in Genoa] (fwd) Message-ID: I realize that scn may not be a completely appropriate list to forward this information to, I would not do so now if there were not an apparently nationwide media blackout on what happened slightly after midnight Italian time in Genoa. I have searched CNN and other media sources on TV and the web, and there is close to nothing available. Earlier today G8 leaders apparently said they feel "traumatized" by the 100,000+ demonstrators protesting their meeting. However I imagine it must be somewhat less traumatizing to be behind the lines of the army of police protecting them than on the other side. The mainstream media consistently ignores and minimizes and confuses what these protests are about. They pretend to be baffled and annoyed by the now several hundred different groups of people protesting not "globalism", but the "profits above people and the environment" agenda of government leaders bought and paid for by multi-national corporations. I apologize if you find this forward annoying. I remain committed to freedom of information and individual rights. This is how I feel I must further those goals. Cheers, -sharma ---------- Forwarded message ---------- Date: Sun, 22 Jul 2001 17:49:59 -0700 From: "getmelissa at uswest.net" To: undisclosed-recipients: ; Subject: Coalition Protests Needed Re:Fwd:an appeal from the activists fighting in Genoa] I should add that approximately 400 people are now missing and I fear the worst for them. (from http//www.indymedia.org) -melissa -------- Original Message -------- Subject: Re: [seagreens-talk] [Fwd:an appeal from the activists fighting in Genoa Date: Sun, 22 Jul 2001 13:54:38 -0700 From: "Colleen Roman" San Francisco is the nearest consulate, which according to their website covers WA as well as most of the western US. I'll post the Embassy and Consulate contact information below. I wanted to ask about the possibility of the Greens (locally, nationally, internationally) making an official statement, given the serious nature of what's happened (a lot of details below, and in other posts from the IMC). This was an assualt on the press and the non-violent training center. There was blood everywhere, reports of at least one British journalist beaten (possibly why the BBC is seriously reporting on this while US media is not), videos people had taken of police confiscated, the lawyers office ransacked and computers destroyed. . . I'm thinking as well as the Greens, what about the coalition of groups such as labor and environmental involved in the globalization protests here and around the country and world? What about some joint protests, with representatives in the cities with consulates and the Embassy in DC taking the concerns of the rest of us with them to the Italian representatives here (with similar actions internationally)? Contact info: Embassy of Italy 3000 Whitehaven Street, NW Washington, D.C. Tel: (202) 612-4400 Fax: (202) 518-2154 http://www.italyemb.org Italian Consulate General 2590 Webster St. San Francisco, CA 94115 Tel (415) 292-9210/931-4924 main numbers Fax (415) 931-7205 e-mail: receptionist at italcons-sf.org http://www.italcons-sf.org -------- Original Message -------- Subject: [seagreens-talk] [toeslist] an appeal from the activists fighting in Genoa as we speak Date: Sun, 22 Jul 2001 14:24:02 -0400 From: "Doug Hunt" Genoa, early morning 22nd July 2001 GSF media centre phone: 0039-010-3627149 Please Distribute Widely - an appeal from the activists fighting in Genoa as we speak We write from the building of GSF and Indymedia in Genoa after witnessing the worst human rights violations in the short history of the young movement against capitalist globalisation. Two people were killed by the police on the 20th, one in Genoa and one at the border, and someone else might have been killed in the most outrageous display of fascist state brutality that all of us have seen in our lives, just a few hours ago in front of this building. This night the police broke into the school Diaz (across the road), one of the accommodation places of GSF were people were sleeping at that moment, and beat up everyone to the extent that most of the people could not walk out and had to be carried in stretchers out of the school. We don't know how many people were badly injured because we lost count of the amount of stretchers carried out of the school, but they brought about 30 ambulances for the injured people. The police also brought at least one body bag outside, maybe two, but we don't know yet whether there was a corpse inside either or both of them. Everybody was either arrested or taken to hospital. According to the testimony of one person who could escape before being arrested, people were lying on the floor saying 'no violence' when the police broke into the first floor where he was, and they battered people so badly that one of the officers had to intervene to stop the massacre. In one of the pictures taken by Indymedia (http://italy.indymedia.org) you can see a plank of wood with nails covered with blood lying next to a corner with big patches of blood on the walls. The police also broke violently into the GSF and Indymedia building at the same time, but here they only destroyed and stole materials. They did not attack anyone (although in part of the building it was difficult to breathe due to the tear gas). Italian parliamentarians were also struck by policemen while they were trying to enter the school Diaz while the police was beginning to remove the injured. On the 20th and the 21st the police terrorism in the streets was unprecedented in recent Western European history. On the 20th they murdered a young protestor from Genova, who was shot once in the forehead and once in the cheek, and drove backwards over his corpse. A young french woman was killed in the Ventemiglia border on the same day, while the police was preventing her and other people from entering the country. Police attacked and teargassed all the different groups that took part in the action. For instance, they threw tear gas from helicopters into the assembly point of the pacifist march, charged against the tutte bianche and the Network for Global Rights before they even started their actions, and injured a still unknown number of people. They deliberately mixed the different sorts of political expression, trying to create conflicts (for instance by pushing part of the black block into the pacifist assembly point). On the 21st they massively attacked part of the demonstration for absolutely no reason, teargassing the whole area (including the parking lot that served as the GSF convergence centre and a nearby beach) and some people were forced to jump into the sea just to escape from them - only to find police boats facing them in the water. Both on the 20th and the 21st there were riots all day, all over the city, which were clearly provoked by the police. The forms of provocation were diverse: the television showed images of a group of people dressed in black going out of a police van and breaking windows, and the black block was visibly infiltrated throughout these days. We respectfully ask our friends from the black block to reflect on the meaning of this fact, not just for them but for everybody else. This request is not meant to imply that they should not be present in large collective actions, but merely that we encourage them to rethink their role and choices in them. One possible way would be to play a role focused on solidarity and defense of other groups, similar to the one so successfully carried out by the black block in A16. People who are taken to the hospitals are arrested immediately after receiving first aid, unless they are in an extremely bad condition. One person, a member of a nonviolent group, who was horribly beaten up while sitting on the floor with his hands up, went through that experience. In the police station he was repeatedly tortured like everyone else there. The police was hitting the already wounded areas of his body and battering him for no reason. Another person who was arrested and released says that they were beating everybody and forcing them to scream 'viva il duce', which means long live Mussolini. The police terrorism started well before the actions. The last weeks were characterised by police searches all over Italy, followed by what everybody here considers to be a reproduction of the strategy of tension used by the Italian state in the 70s to crash social movements. Letter bombs were sent (by whom?) to policemen, the police exploded a car in the centre of Genova because it was parked in the same place for several days, and they alleged in the media that bombs had been planted in several places (including one of the accommodation spaces of the GSF) - all of these in order to create an atmosphere of paranoia, fears about demonstrators and social terror. They also arrested several people before the actions, including a particularly brutal case of a young woman who was kept in isolation for four days for having a van (which they claimed would be used to break into the red zone) where she kept a hatchet for camping purposes. The people who were arrested with her report that they were also tortured physically and psychologically, including forced exposure to a succession of three posters: a pornographic one, followed by one of Mussolini and then one of the Nazi Army in action. We know that many solidarity and denounciation actions have already taken place all over the world and that many more are being planned (see http://italy.indymedia.org). We encourage all the groups that have not planned actions yet to do so, and to prepare for sustained actions to continue until those responsible for these outrageous human rights abuses pay the full price for their actions. We suggest to these groups that their minimum demand would be the resignation of the Berlusconi government. There is a list of Italian embassies at http://www.ethoseurope.org/ethos/embassies.nsf/ (go down to the link Embassies of Italy). We think that we need to turn this situation into a serious international problem for the Berlusconi and the other G8 governements, not just due to a basic sense of justice but also because we feel that the survival of the movement and of many of us might depend on it. This brutality shows the actual panic with which the rich and powerful are reacting to the clear fact that the world is beginning to listen to us. Seeing that they can no longer write us off as a marginal, temporary phenomenon, they are now removing all masks of ostensible democracy and showing their real face - one of oppression, violence and terrorism. Por todos nuestros muertos, ni un minuto de silencio. Toda una vida de lucha. To honor our dead, not a minute of silence. A whole life of struggle. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe local-computer-activists END * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From scoth at scn.org Sun Jul 22 19:48:04 2001 From: scoth at scn.org (Scot Harkins on scn.org) Date: Sun, 22 Jul 2001 19:48:04 -0700 Subject: SCN: Re: Coalition Protests Needed Re:Fwd:an appeal from the activists fighting in Genoa] (fwd) References: Message-ID: <003c01c11321$e775f380$a28cc5ce@corp.thurman.com> I think it's a perfectly legitimate. This is one of SCN's common meeting points. NBC did cover the raid on their evening news, including interviews of a few of the senior activists from the organizations. They also showed some of the "weapons" they recovered. Sledge hammers (one of these buildings if being remodeled, right?), nails (see previous), oh, and knives, like Swiss Army Knives (with their blades opened to show how dangerous they are!!!) and steak knives. God forbid the same police raid, oh, say, a RESTAURANT where they might recover such dangerous weapons as meat cleavers and 16-inch knives. Maybe grandma's house, where they might find all sorts of sharp implements. I may not be fully settled on the issues of globalization and the G8, but I certainly don't abide this kind of senseless revenge raid. Fighting violent anarchists, yes, but just walking in and beating people, and then torturing them further... Well, welcome to the real world, I guess, since it's a rare country that actually respects the rights of detainees. sh -- Scot Harkins (KA5KDU) Greenbank, WA | Native Texan firmly planted in Western Washington scoth at bigfoot.com | SCA: Ld. Scot MacFin, Barony of Madrone, An Tir scoth at scn.org/msn.com | URL ----- Original Message ----- From: "Sharma" To: Sent: Sunday, 22 July, 2001 7:20 PM Subject: SCN: Coalition Protests Needed Re:Fwd:an appeal from the activists fighting in Genoa] (fwd) > > > I realize that scn may not be a completely appropriate list to forward > this information to, I would not do so now if there were not an apparently > nationwide media blackout on what happened slightly after midnight Italian > time in Genoa. I have searched CNN and other media sources on TV and the > web, and there is close to nothing available. Earlier today G8 leaders > apparently said they feel "traumatized" by the 100,000+ demonstrators > protesting their meeting. However I imagine it must be somewhat less > traumatizing to be behind the lines of the army of police protecting them > than on the other side. > > The mainstream media consistently ignores and minimizes and confuses what > these protests are about. They pretend to be baffled and annoyed by the > now several hundred different groups of people protesting not "globalism", > but the "profits above people and the environment" agenda of government > leaders bought and paid for by multi-national corporations. > > I apologize if you find this forward annoying. I remain committed to > freedom of information and individual rights. This is how I feel I must > further those goals. > > Cheers, > > -sharma * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Sun Jul 22 23:11:07 2001 From: steve at advocate.net (Steve) Date: Sun, 22 Jul 2001 23:11:07 -0700 Subject: SCN: Public funding Message-ID: <3B5B5D8B.6353.65CE40B@localhost> x-no-archive: yes ============================ (Wall Street Journal, excerpts)---In the midst of telecommunications megamergers, some activists argue that we ought to do more to address civic needs. Among them are a former president of the Public Broadcasting System and a former Federal Communications Commission chairman, who propose funding public uses of digital technology to the tune of $18 billion. "The potential exists to use these technologies in ways we can't imagine now," says Lawrence K. Grossman, the former PBS president whose career has included a stint running NBC News. Along with Newton N. Minow, the former FCC chief, Mr. Grossman is leading an effort to rethink the public role of interactive technologies. "It's worth investing in this," Mr. Grossman says. This debate has been mostly quiet so far, bandied by online activists and dissected on op-ed pages here and there. But the issue bears watching, especially over the next 12 to 24 months. The interactive world is in flux, as the Web, propelled by broadband technologies, proceeds on a collision course with television. Most people know about the so-called digital divide, separating the digital haves from the unwired have-nots, but things are getting more complicated than that. Here's the crux of the argument put forward by Messrs. Grossman and Minow, and others: As a society, the United States has expended substantial sums to wire schools and communities to the Internet - but practically nothing on online content. That's an effort akin to buying TV sets for everyone in the name of education, then leaving them to choose between "Big Brother 2" and "Witchblade." The Digital Promise Project (www.digitalpromise.org), the organization through which Messrs. Grossman and Minow have pursued their idea, has recommended creating something they call a Digital Opportunity Investment Trust, a federally chartered agency along the lines of the National Science Foundation or the National Institutes of Health. The trust would operate something like a venture-capital fund for educational and civic uses of digital technology. The money would come from a public resource, the airwaves. The Digital Promise team proposes taking revenue from auctions of electromagnetic spectrum, in which telecommunications companies bid for wireless licenses. Mr. Minow likens the approach to the 19th- century legislation that created land-grant colleges. "There's an opportunity to do that again," he says. The money would help build worthwhile places to visit in cyberspace. "You could have a virtual solar system, a 3-D model of a human body or a re-creation of Mark Twain's America," Mr. Grossman says. The Digital Promise group would support programs to help put library and museum collections online and fund efforts to educate teachers about how to use technology effectively in the classroom. These are noble goals, with growing support in the educational and philanthropic communities. That much was clear last week in New York City, when Messrs. Grossman and Minow received a warm reception at a Carnegie Corporation of New York forum devoted to the Digital Promise project. Many attendees embraced the idea of creating the Internet-age equivalent of public television. But there's risk, too. For one thing, laying hands on the spectrum- auction revenue won't be easy in a post-tax-cut world. The Digital Promise group hopes to advance a bipartisan legislative effort on behalf of the trust concept, but other groups will surely covet the money as well. And should content really be the top priority? There are plenty of terrific online sites already. The problem for most people is finding the best of the existing resources. Many Internet users rely heavily on online "portals" and search engines to find information. Yet more and more, the destinations recommended by portal sites are determined by who paid for top placement, not which is the best. It's true that companies such as AOL Time Warner and Yahoo have created extensive special areas online for kids, with restrictions on marketing. But truly public portals could direct users to content without any regard for commercial interests. Think of a public- television version of Yahoo. These issues grow more pressing the further we move into the broadband age. We have yet to see whether the so-called open- access agreements that regulators have struck with carriers will promote competition and diversity in high-speed access, or whether entrenched cable and telephone companies will control consumers' connections - and perhaps what they see. In an interactive world dominated by a few big gatekeepers, maybe public space isn't such a bad idea. Copyright 2001 Dow Jones & Company, Inc. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From rockybay at scn.org Mon Jul 23 12:18:23 2001 From: rockybay at scn.org (Malcolm Taran) Date: Mon, 23 Jul 2001 12:18:23 -0700 (PDT) Subject: SCN: Coalition Protests Needed Re:Fwd:an appeal from the activists fighting in Genoa (fwd) In-Reply-To: Message-ID: Sharma, Thank you. Is not your sentiment also among the very <> for SCN itself? On Sun, 22 Jul 2001, Sharma wrote: > [snip] > > I realize that scn may not be a completely appropriate list to forward > this information to, I would not do so now if there were not an apparently > nationwide media blackout on what happened slightly after midnight Italian > time in Genoa. I have searched CNN and other media sources on TV and the > web, and there is close to nothing available. Earlier today G8 leaders > [snip] > > I apologize if you find this forward annoying. I remain committed to > freedom of information and individual rights. This is how I feel I must > [snip] I would only add that our commitment includes community. Malcolm Taran * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas Mon Jul 23 14:47:39 2001 From: douglas (Doug Schuler) Date: Mon, 23 Jul 2001 14:47:39 -0700 (PDT) Subject: SCN: commercial content in web sites Message-ID: <200107232147.OAA25250@scn.org> Here is a question that one of you (hopefully) might know... A few years ago (5??) I read a survey that showed (if I remember correctly) that over 80% of all web pages were commercial. I think it was in Internet World. Any ideas anybody on what that figure might be today? I need the figure (and the cite) fairly soon... The first person with the right answer will receive 3 karma points. Thanks!!!!! -- doug * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From bn890 at scn.org Tue Jul 24 18:16:32 2001 From: bn890 at scn.org (Irene Mogol) Date: Tue, 24 Jul 2001 18:16:32 -0700 (PDT) Subject: SCN: Re: EMT: Re: Helllooooo In-Reply-To: Message-ID: Hey there Randy, How many people are signed up for this Thursday? See ya, Irene On Thu, 19 Jul 2001, Special Technology Access Resources wrote: > Yes, it will be him on the G3. > > Date is the 26th. > > Tx, > > > Randy Hayhurst > Program Director > STAR Center of Seattle > (206) 325-4284 > > > On Sat, 7 Jul 2001, Irene Mogol wrote: > > > OK, I think that is July 27. > > That would be Worthington on the MAC? Or is someone else. He was the one > > who told Wade and me that you were ill. > > See ya, > > Irene > > > > > > On Fri, 6 Jul 2001, Special Technology Access Resources wrote: > > > > > Thanks, and yes, let's plan for the 4th Thursday in July. > > > > > > I already have one sign up who will want to learn on the Mac G3. > > > > > > Thanks for all your kind thoughts! > > > > > > > > > Randy Hayhurst > > > Program Director > > > STAR Center of Seattle > > > (206) 325-4284 > > > > > > > > > > > > > > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * * > This list is for communication between SCN e-mail trainers regarding > *only* SCN E-mail Training (EMT) related topics. Please use your best > judgment in this matter. Discussion of other SCN related topics can be > done on the list . Thanks for your cooperation. > END > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Wed Jul 25 23:11:30 2001 From: sharma at aa.net (Sharma) Date: Wed, 25 Jul 2001 23:11:30 -0700 (PDT) Subject: SCN: [Fwd: FC: Australian gvt, church weigh e-tagging humans with transmitters] (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 25 Jul 2001 15:56:28 -0700 Subject: [Fwd: FC: Australian gvt, church weigh e-tagging humans with transmitters] -------------- next part -------------- An embedded message was scrubbed... From: Declan McCullagh Subject: FC: Australian gvt, church weigh e-tagging humans with transmitters Date: Mon, 23 Jul 2001 22:11:37 -0400 Size: 2891 URL: From sharma at aa.net Wed Jul 25 23:12:01 2001 From: sharma at aa.net (Sharma) Date: Wed, 25 Jul 2001 23:12:01 -0700 (PDT) Subject: SCN: [Fwd: FC: U.S. House overwhelmingly approves Carnivore review] (fwd) Message-ID: ---------- Forwarded message ---------- -------------- next part -------------- An embedded message was scrubbed... From: Declan McCullagh Subject: FC: U.S. House overwhelmingly approves Carnivore review Date: Mon, 23 Jul 2001 22:08:36 -0400 Size: 7142 URL: From sharma at aa.net Wed Jul 25 23:20:40 2001 From: sharma at aa.net (Sharma) Date: Wed, 25 Jul 2001 23:20:40 -0700 (PDT) Subject: SCN: [Fwd: FC: FBI hit with Sircam virus that distributes files on your HD] (fwd) Message-ID: ---------- Forwarded message ---------- -------------- next part -------------- An embedded message was scrubbed... From: Declan McCullagh Subject: FC: FBI hit with Sircam virus that distributes files on your HD Date: Wed, 25 Jul 2001 18:30:09 -0400 Size: 5950 URL: From jmabel at speakeasy.net Thu Jul 26 09:25:00 2001 From: jmabel at speakeasy.net (Joe Mabel) Date: Thu, 26 Jul 2001 09:25 -0700 Subject: SCN: Re: Sircam Message-ID: <200107261625.JAA24329@webmail.speakeasy.net> THe Crisis Resource Directory (heathens at scn.org) has been hit with a bunch of Spanish-language Sircam mail. I had the good sense to spot it for a virus without opening the attachment. Have other SCN'ers gotten this thing? Obviously, mostly dangerous to those who are reading their email on a Windows system. JM * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From ljhb at lycos.com Thu Jul 26 09:31:33 2001 From: ljhb at lycos.com (Lois) Date: Thu, 26 Jul 2001 09:31:33 -0700 Subject: SCN: Re: Sircam Message-ID: It was in my inbox twice this morning. Unlucky for them that I have a mac and also have my mail set to not open files. Lois --- Artificial Intelligence usually beats real stupidity. Get 250 color business cards for FREE! http://businesscards.lycos.com/vp/fastpath/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From scoth at scn.org Thu Jul 26 10:02:18 2001 From: scoth at scn.org (Scot Harkins on scn.org) Date: Thu, 26 Jul 2001 10:02:18 -0700 Subject: SCN: Re: Re: Sircam References: <200107261625.JAA24329@webmail.speakeasy.net> Message-ID: <00c701c115f4$bc2c2de0$a28cc5ce@corp.thurman.com> My wife received and opened a copy on her system. The McAfee, for some reason, wasn't loaded at the time; corrupted virus files. I loaded the latest SuperDAT (last Saturday), and McAfee then fired up and removed all the virus files but not the worst of the registry entries. I couldn't launch any program because the virus hacked the registry to require running the virus every time any application was started. I couldn't load RegEdit to fix it because RegEdit is a program, and Windows wanted to start the virus first. Oddly enough, it was removing the actual virus files that landed me in the hardest spot. I tried various tricks with copying other programs to the name of the virus file (SirC32.exe). I finally just re-hacked the key by creating a registry entry in a text file to import into the registry to replace the virus' handiwork. Thankfully, I was able to right-click the text file (with a .reg extension) and merge it into the registry. This bypassed the call for the virus. Problem fixed. I was able to locate the series of dll files in the system directory the virus used to keep track of where it sent copies of itself from us, where ours came from, and what files it listed out of our documents directory. I also hand-cleaned the rest of the registry entries, which were not dangerous in their own right. Since we got the first one I have received another copy from someone else and, today, yet another virus (W32/Magistr at MM) from someone else. Also, in that time, McAfee has released two new dat sets of virus data files. One of the tacks I had taken was using RegEdit from DOS/command mode. From there I should have been able to export the entire registry. The System registry file, however, never did export, perhaps for being too large (nearly 4MB). That's supposed to be the last resort. I'd gotten to looking for hex editors so I could get to the file. I'm an experienced admin and I spent several hours trying to fix this because the AV software didn't get the registry keys fixed (it does now I hope). This would have been a case of wipe and reload for most folks. If the AV software had been loaded it would at least have caught it when she tried to run it (I tested it, and it did). It just goes to show that it's not enough to simply load the anti-virus software. You have to watch to make sure it's loading and stays running all the time, and you need to make sure the AV data files are up to date. That's more important than anything since those files contain the info on how to spot the virus and how to clean it. Beyond that are updates to the AV software itself; new "engines" come out from time to time to adjust to new angles that viruses use and to improve virus cleaning in general. If I had still had McAfee program and data files from last year it wouldn't have caught this virus and we would still be in a pickle. Now, I'll tip my hat to the "don't open attachments" crowd. It's true to be careful. If I'm suspicious I simply try saving the attachment and then scan it. McAfee will catch it on the save step. If not, then the scan ought to catch it. This is true for any OS: Mac, Linux, and so on. sh -- Scot Harkins (KA5KDU) Greenbank, WA | Native Texan firmly planted in Western Washington scoth at bigfoot.com | SCA: Ld. Scot MacFin, Barony of Madrone, An Tir scoth at scn.org/msn.com | URL ----- Original Message ----- From: "Joe Mabel" To: "Sharma" ; Sent: Thursday, 26 July, 2001 9:25 AM Subject: SCN: Re: Sircam > THe Crisis Resource Directory (heathens at scn.org) has been hit with a bunch of Spanish-language Sircam mail. I had the good sense to spot it for a virus without opening the attachment. Have other SCN'ers gotten this thing? Obviously, mostly dangerous to those who are reading their email on a Windows system. > > JM > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Thu Jul 26 14:50:37 2001 From: sharma at aa.net (Sharma) Date: Thu, 26 Jul 2001 14:50:37 -0700 (PDT) Subject: SCN: Re: Sircam In-Reply-To: <200107261625.JAA24329@webmail.speakeasy.net> Message-ID: On Thu, 26 Jul 2001, Joe Mabel wrote: > THe Crisis Resource Directory (heathens at scn.org) has been hit with a > bunch of Spanish-language Sircam mail. I had the good sense to spot it > for a virus without opening the attachment. Have other SCN'ers gotten > this thing? Obviously, mostly dangerous to those who are reading their > email on a Windows system. > > JM I did not recognize it as a virus. I thought this was someone writing to me, as happens fairly often. While I did not open in, I am caught in a sortof loop with it however. I replied to the email and explained I do not open email attachments from people i do not know. Since then the scn mail sender has tried maybe 100 times to send it, cannot, and sends me a message that it is still trying. Anything to be done about that? I am going to WOMAD and will not be able to log on to clean these messages out of my email so my email will probably crash over the weekend. Anyway to get that daemon to stop? -sharma * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Thu Jul 26 14:53:53 2001 From: sharma at aa.net (Sharma) Date: Thu, 26 Jul 2001 14:53:53 -0700 (PDT) Subject: SCN: FYI Sircam Worm in innocuous emails: BEWARE (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 26 Jul 2001 13:24:53 EDT From: ChipnClara at aol.com Folks: I've now received quite a few messages with the Sircam worm, an example is below. These emails are coming from people I don't know, so I have no idea how they got my address. Below that is the information from Data Fellows index (F-Secure Computer Virus Information Pages: Sircam). Do be careful. This is why I never download any files. Clara Subj: nothing Date: 01-07-25 18:48:40 EDT From: lkooley at ptd.net (Lori Cooley) To: ChipnClara at aol.com File: nothing.zip.com (444107 bytes) DL Time (28800 bps): < 4 minutes Hi! How are you? I send you this file in order to have your advice See you later. Thanks [END] F-Secure Virus Descriptions NAME: Sircam ALIAS: I-Worm.Sircam, W32.Sircam, W32/SircCam Sircam is a mass mailing e-mail worm with the ability of spreading through Windows Network shares. The worm's body is 137216 bytes long but when it comes as an e-mail attachment, it larger in size due to a document that is attached to its body. When the worm runs on a clean system it copies itself to different locations with different names: 1. The worm copies itself as 'SirC32.exe' to \Recycled\ folder. The default EXE file startup Registry key: [HKCR\exefile\shell\open\command] is changed to '""[windows_drive]\recycled\SirC32.exe" "%1" %*"'. This is done to activate a worm's copy every time an EXE file is started. 2. The worm copies itself as 'SCam32.exe' in the System directory. The worm then creates a startup key for this file in the Registry to be started during all Windows sessions: [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices] "Driver32" = "\SCam32.exe" 3. The worm copies itself as 'rundll32.exe' file to Windows directory. The original 'rundll32.exe' file is renamed to 'run32.exe'. This copy exists only if a computer got infected through a network share (see below). 4. Sometimes (once out of 33 cases) the worm places its copy to Windows directory with the 'ScMx32.exe' name. In this case another copy of the worm is created in the current user's personal startup folder as 'Microsoft Internet Office.exe'. This copy will be started when a user who got infected logs into a system. When a Sircam-infected e-mail attachment is opened it shows the document it picked up from the sender machine's. The file is displayed with the appropiate program according to it's extension: '.DOC': WinWord.exe or WordPad.exe '.XLS': Excel.exe '.ZIP': winzip.exe This effectively disguises the worm's activity. While the user is checking the document the system get infected (as described above). The worm uses Windows Address Book to collect e-mail addresses ('*.wab files). The worm also tries to look for e-mail addresses in \Temporary Internet Files\ folder ('sho*', 'get*', 'hot*', '*.html'). If a user has a working e-mail account the worm reads the its setting. Otherwise the '[username]@prodigy.mx.net' is used as the default sender's address and 'prodigy.net.mx' is used for the SMTP server name. The worm has its own SMTP engine and it sends out messages using this engine. The worm collects a list of files with certain extensions ('.DOC', '.XLS', '.ZIP') into fake DLL files named 'sc*.dll'. The worm then sends itself out with one of the document files it found in a users's 'My Documents' folder. Messages sent by Sircam look like this: From: [user at address] To: [user at address] Subject: [document name without extension] Hi! How are you? 'I send you this file in order to have your advice' or 'I hope you can help me with this file that I send' or 'I hope you like the file that I sendo you' or 'This is the file with the information that you ask for' See you later. Thanks If a system's language is set to Spanish the worm sends messages in Spanish: Hola como estas ? 'Te mando este archivo para que me des tu punto de vista' or 'Espero me puedas ayudar con el archivo que te mando' or 'Espero te guste este archivo que te mando' or 'Este es el archivo con la informaci n que me pediste' Nos vemos pronto, gracias. The attached file has the name of a picked document file with a double extension like '.DOC.EXE', '.XLS.PIF'. The '.COM', '.BAT', '.PIF' and '.LNK' are used as second (executable) extensions. Since the worm can pick any of the user's personal document it migh send out confidential information. This worm also uses Windows network shares to spread. When doing this, it first enumerates all the network shares available to the infected computer. If there there is a writeable \recycled\ folder on a share, a copy of the worm is put to \\[share]\recycled\' folder as 'SirCam32.exe' file. The \\[share]\autexec.bat file is appended with an extra line: '@win \recycled\SirC32.exe', so next time when an infected computer is rebooted the worm will be started. The worm also copies itself as 'rundll32.exe' file to Windows directory of a remote system. The original 'rundll32.exe' file is copied to 'run32.exe' before that. The worm has two payloads. On 16th of October in one case out of 20 it deletes everything from the drive where Windows is installed. On any other day in one of 50 cases it fills up the drive where Windows is installed. In this case it creates a file called ':\recycled\sircam.sys' and continuosly fills it with one of below given text strings until the hard drive space is consumed. '[SirCam_2rP_Ein_NoC_Rma_CuiTzeO_MicH_MeX]' or '[SirCam Version 1.0 Copyright 2001 2rP Made in / Hecho en - Cuitzeo, Michoacan Mexico]' Removal instructions: If your system is infected with the worm first please download this REG file and install it (by double-clicking on it): ftp://ftp.europe.f-secure.com/anti-virus/tools/sirc_dis.reg This will remove the worm's reference from the EXE file startup key and the main worm's startup key in the Registry. Warning! The system might become unusable if the worm's file is deleted without modifying the EXE file startup key first. After that the system can be safely disinfected with FSAV. If for some reason the worm's file can't be deleted from Windows (locked file), then you have to exit to pure DOS and delete the worm's file manually or use a DOS-based scanner (F-Prot for DOS for example). All worm files has to be deleted or renamed. If a workstation was infected trough a network share '\windows\run32.exe' has to be renamed back to '\windows\rundll32.exe' after disinfection. The extra line in 'autoexec.bat' file that starts the worm from \recycled\ folder should be removed also. Network infection prevention: If a network is infected and it is not possible to take it down to disinfect all workstations, the following method can prevent the worm from spreading to clean workstations: In the \Recycled\ folder of a drive where Windows is installed, it is needed to create a dummy file with SIRC32.EXE name and read-only attribute. [Analysis: Gergely Erdelyi, Alexey Podrezov; F-Secure Corp.; July 18-23, 2001] * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Thu Jul 26 15:14:28 2001 From: sharma at aa.net (Sharma) Date: Thu, 26 Jul 2001 15:14:28 -0700 (PDT) Subject: SCN: Wrong Daemon Message-ID: Sorry, mistake on my part. It is not the SCN system generating my zillion emails. I looked more carefully and it is the mail-daemon at aa.net that is generating an email every few minutes to me that it cannot send the mail I requested. Supposedly this will keep up for two days. I notified aa.net so maybe it will stop soon. -sharma * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From sharma at aa.net Thu Jul 26 15:18:06 2001 From: sharma at aa.net (Sharma) Date: Thu, 26 Jul 2001 15:18:06 -0700 (PDT) Subject: SCN: Re: [swing-poly] WARNING-Don't open attachments!!!/Re: Sircam (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 26 Jul 2001 15:31:45 -0700 (PDT) From: RDB More information on this virus (well, "worm"), and how to recover from it, is available here: http://www.sarc.com/avcenter/venc/data/w32.sircam.worm at mm.html This virus takes full advantage of Microsoft's ongoing lack of regard for security, so you're immune to it if you're using anything other than Windows (e.g. Linux, so see http://www.redhat.com/ or http://www.gslug.org/ if you'd like to switch to avoid this sort of embaressment in the future). Based on an article published in Linux Today a few days ago (see http://linuxtoday.com/news_story.php3?ltsn=2001-07-24-009-20-SC-MS-SV), I've implemented the following procmail code on my workstation. Even though I can't spread this virus, the following code deletes incoming SirCam messages on sight, so I never have to see them: #Dump SirCam Shit :0 BDh *(See you later)|(Nos vemos pronto) *daeLRCQEM9KJEIN8JAwAdBmLRCQEi1QkCIkQi0QkDCtEJAiLVCQEiUIEg8QUXV9eW8NTVldV /dev/null ------------------------ Yahoo! Groups Sponsor ---------------------~--> Small business owners... Tell us what you think! http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/hWZolB/TM ---------------------------------------------------------------------~-> ******************************************************************** People meeting People with a sex-positive attitude. Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From brian at happygardening.com Thu Jul 26 18:35:24 2001 From: brian at happygardening.com (Brian High) Date: Thu, 26 Jul 2001 18:35:24 -0700 Subject: SCN: Business Wants a New, Profitable Internet Message-ID: <006301c1163c$68e8f170$0200005a@happygardening.com> Business Wants a New, Profitable Internet http://slashdot.org/yro/01/07/26/1553257.shtml "Time to drum out the "hippie anarchists" and put some real business sense into this mess! Or, if you can't adapt your business plan to the Internet, then change the Internet to facilitate you business plan." "See this article in the LA Times." http://www.latimes.com/business/la-072601netarch.story "...so some big corporations think the answer is to change the Internet's basic wiring. By adding "intelligent" switches and other devices, they believe, the system could work faster, avoid traffic jams, distinguish between high-priority data and other material that can wait, and generally live up to its promise as a worldwide communications and entertainment medium." "But doing so almost inevitably means bringing more of the network under commercial control. For consumers, the change might mean faster downloads of video clips and Webcasts. But it also might mean a raft of fees for special services and the appearance of "gatekeepers" with the power to keep certain Web sites or content from appearing on home computers, just as cable systems control which channels can be shown on their subscribers' TVs and at what price." --Brian * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From jj at scn.org Thu Jul 26 19:02:31 2001 From: jj at scn.org (J. Johnson) Date: Thu, 26 Jul 2001 19:02:31 -0700 (PDT) Subject: SCN: "WARNING-Don't open attachments!!!" (W32/Sircam virus) In-Reply-To: Message-ID: There has been much discussion recently about the W32/Sircam e-mail virus, and properly so. However, lest we create the conditions of easy credulity that leads to "Good Times" panic, let's be very careful about our sources. In particular, _always verify your information_ at an authentic source. For viruses and other Internet problems one prime authentic source is "CERT", at www.cert.org. (They also have links to other sites.) I highly recommend CERT as the first place to check regarding any virus, etc. For detailed information about W32/Sircam, see CERT Advisory 2001-22. Regarding attachments: this is primarily an issue for _Microsoft_ users. If you read your e-mail on SCN you have no problem, because SCN's mail readers (BBmail and Pine) are not so stupid as to automatically run anonymously supplied programs. However, if you connect to some other site, or download your mail, and then use Microsoft programs to read it, it is _extremely important_ that you take various precautions. Note that the use of anti-virus software is only a palliative--such an approach does not go to the heart of the problem, which is the underlying software's excessive complaisance in "executing" code found in attachments. Note also that you can NOT--indeed, you MUST NOT--place any assurance in the apparent origin of the message: the sender's name and address are likely misappropriated. Check the message: does it really sound like the sender it purports to be? Is there enough message, and do you know the sender well enough, that you can confidently rely on such informal authentication? If not: don't open that attachment! Consider it in the same way you would an anonymous brown-paper package that goes tick-tick-tick. === JJ ============================================================= * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From emailer1 at netzero.net Thu Jul 26 19:18:53 2001 From: emailer1 at netzero.net (emailer1) Date: Thu, 26 Jul 2001 19:18:53 -0700 Subject: SCN: Re: Re: Sircam References: <200107261625.JAA24329@webmail.speakeasy.net> Message-ID: <000f01c11642$7cfea3c0$7152fea9@desktop> Joe, Thanks for the alert on the virus. Can you give more detail about (1) the name and (2) the "date of birth" of the virus? It might help us to confirm that our anti-virus programs can detect the virus. Thanks. Rich ----- Original Message ----- From: Joe Mabel To: Sharma ; Sent: Thursday, July 26, 2001 9:25 AM Subject: SCN: Re: Sircam > THe Crisis Resource Directory (heathens at scn.org) has been hit with a bunch of Spanish-language Sircam mail. I had the good sense to spot it for a virus without opening the attachment. Have other SCN'ers gotten this thing? Obviously, mostly dangerous to those who are reading their email on a Windows system. > > JM > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > NetZero Platinum No Banner Ads and Unlimited Access Sign Up Today - Only $9.95 per month! http://www.netzero.net * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From davidb at scn.org Thu Jul 26 21:33:41 2001 From: davidb at scn.org (David Barts) Date: Thu, 26 Jul 2001 21:33:41 -0700 Subject: SCN: Re: Re: Sircam In-Reply-To: <00c701c115f4$bc2c2de0$a28cc5ce@corp.thurman.com>; from scoth@scn.org on Thu, Jul 26, 2001 at 10:02:18AM -0700 References: <200107261625.JAA24329@webmail.speakeasy.net> <00c701c115f4$bc2c2de0$a28cc5ce@corp.thurman.com> Message-ID: <20010726213341.B28820@scn.scn.org> I'm actually pleased with the users where I work. They've apparently taken all the "don't open strange or unexpected attachments" lectures to heart; most of the reports from them have been of the "I deleted this attachment because I thought it was a virus" or "is this a virus? I'm not going to open it unless you say it's OK?" sort. -- David W. Barts (davidb at scn.org) / http://www.scn.org/~davidb "Rats and roaches live by competition under the laws of supply and demand; it is the privilege of human beings to live under the laws of justice and mercy." -- Wendell Berry * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From davidb at scn.org Thu Jul 26 21:41:57 2001 From: davidb at scn.org (David Barts) Date: Thu, 26 Jul 2001 21:41:57 -0700 Subject: SCN: Business Wants a New, Profitable Internet In-Reply-To: <006301c1163c$68e8f170$0200005a@happygardening.com>; from brian@happygardening.com on Thu, Jul 26, 2001 at 06:35:24PM -0700 References: <006301c1163c$68e8f170$0200005a@happygardening.com> Message-ID: <20010726214157.D28820@scn.scn.org> Brian High writes: > "Time to drum out the "hippie anarchists" and put some real business sense > into this mess! Or, if you can't adapt your business plan to the Internet, > then change the Internet to facilitate you business plan." "Real business sense". Is that what they're calling all the fools who shoveled millions into firms with NEGATIVE p/e ratios and the flimsiest of business plans? (As I recall those co-workers of mine at that SF dot.com who'd dismiss my skepticism as that of a cynical, negativity-filled, leftist naysayer every time I mentioned that I wasn't investing all my savings in NASDAQ stocks.) -- David W. Barts (davidb at scn.org) / http://www.scn.org/~davidb "Rats and roaches live by competition under the laws of supply and demand; it is the privilege of human beings to live under the laws of justice and mercy." -- Wendell Berry * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From starsrus at scn.org Thu Jul 26 22:00:25 2001 From: starsrus at scn.org (Kenneth Applegate) Date: Thu, 26 Jul 2001 22:00:25 -0700 (PDT) Subject: SCN: Re: Re: Sircam In-Reply-To: <20010726213341.B28820@scn.scn.org> Message-ID: On Thu, 26 Jul 2001, David Barts wrote: > I'm actually pleased with the users where I work. They've apparently > taken all the "don't open strange or unexpected attachments" lectures > to heart; most of the reports from them have been of the "I deleted > this attachment because I thought it was a virus" or "is this a virus? > I'm not going to open it unless you say it's OK?" sort. Wow! I had begun to think that "intelligent user" was an oxymoron. I work in a lab full of highly trained post-doctoral fellows in biochemistry. They have to be constantly reminded not to open attachments to strange emails from faraway places. Of course these are also the people who keep finding new and creative ways to foul up networked printers, "lose" desktop icons, revise default settings in Word and Excel, etc. And they are also the ones who wonder why I won't let them download the latest version Internet Express Napster XP just because it would be cool to have on the machine. Ken A. > > -- > David W. Barts (davidb at scn.org) / http://www.scn.org/~davidb > "Rats and roaches live by competition under the laws of supply and > demand; it is the privilege of human beings to live under the laws of > justice and mercy." -- Wendell Berry > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * > . To unsubscribe from this list, send a message to: > majordomo at scn.org In the body of the message, type: > unsubscribe scn > ==== Messages posted on this list are also available on the web at: ==== > * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * > Ken Applegate How do you identify astronomers from Seattle? By the windshield wipers on their telescopes! * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Thu Jul 26 22:28:45 2001 From: steve at advocate.net (Steve) Date: Thu, 26 Jul 2001 22:28:45 -0700 Subject: SCN: Privacy Message-ID: <3B60999D.9031.6A34FBB@localhost> x-no-archive: yes ========================= (Carl S. Kaplan, NY Times)---If you use a computer at work to send e- mail or surf the Internet, you may be aware of a legal principle that seems to have sprung up overnight: You have no right of privacy in on-the-job online communications. If you haven't heard about this new legal rule of thumb, chances are your employer has. A number of courts in recent years have given the rule their blessing. One respected judge and writer on Internet topics, however, begs to disagree. According to Judge James M. Rosenbaum, chief judge of the United States District Court for the District of Minnesota, in Minneapolis, the new "legal principle" of carte blanche employer searches of worker computers ought to be further examined. In a provocative and mercifully brief essay recently published in The Green Bag, a literate and entertaining law review, Judge Rosenbaum expressed uneasiness with the widely-accepted proposition that employees have no rights in the face of what he termed "an electronic rummage through their lives." "The present concept permits - and even encourages - 'Big Brother' searches," wrote Judge Rosenbaum. "Most employers are not governmental entities, so constitutional search and seizure issues are not directly implicated. But just as an employee does not surrender all privacy rights on the company's premises, so they should not be automatically surrendered on the company's computers." The new legal rule in Judge Rosenbaum's cross hairs seems to flow from the idea that a company that owns a computer also owns what's in it. The theory has an important consequence. It entitles employers to search employees' hard drives and other corporate computer records for any reason without restriction. That's good news for companies that wish to detect and stop productivity losses, guard against potential hostile workplace lawsuits or limit the risk of the transfer of trade secrets. But what about the right of an average, imperfect employee? Must he live in fear that someday his boss, without notice, will search his computer and find evidence of some minor wrongdoing -- repeated visits to L.L. Bean -- or an unpopular notion written in e-mail. "I have, happily, never sneaked around in the other computers in my building," wrote Judge Rosenbaum. "But if the others are anything like mine each hard drive contains at least a bit of idle stuff. And if this is so, each employee stands subject to a search which goes, without restriction, far beyond any legitimate business interest." Companies seem to be exercising their "right" to snoop. According to a report distributed earlier this month by the Privacy Foundation, a privacy watchdog based in Denver, up to 14 million U.S. workers are subject to continuous surveillance of their e-mail and Internet use. That means roughly one of every three of the 40 million employees using e-mail or the Internet on the job are monitored systematically, the group said in a statement accompanying the report. In addition, a study released in the spring by the American Management Association, a New York-based management development and training non-profit, concluded that more than three- quarters of major U.S. firms now spot-check their employees' phone calls, e-mails, Internet activities and computer files. The figure has doubled since 1997, driven principally by employer concerns about liability for workplace harassment, said Eric Rolfe Greenberg, the group's director of management studies. In his article, "In Defense of the Hard Drive," Judge Rosenbaum cited an example of what he thought to be an overly broad search -- a 1999 probe by The New York Times Company of employee computer records at its office in Norfolk, Virginia, that handles most of the company's personal records, accounting and payroll operations. Following its investigation, 23 workers at the Norfolk office were dismissed for sending what were considered obscene messages. Judge Rosenbaum noted in his essay that the "nettlesome" sexual messages were "unearthed" as a result of a separate investigation concerning another employee matter. Kathy Park, a spokeswoman for The Times Company, said that the company stands by its 1999 actions, which were in keeping with its e-mail policy that, in part, bans the creation, forwarding or display of offensive or disruptive messages. She added that the company does not conduct random searches of employees' computer files but only searches if a complaint has a reasonable basis. Of course, many other companies or government organizations have fired people for what is contained in their e-mail, or because of unauthorized visits to inappropriate Web sites. Last month, for example, the Associated Press reported that more than 20 state employees in South Dakota were fired or disciplined for violating rules on Internet use. The action came in the wake of an investigation by state officials of the state government's top 100 Internet users, according to the news report. Recognizing that there must be a better balance between an employer's concerns for proper computer use and the employee's interest in personal privacy, Judge Rosenbaum proposed in his article a "cyber time-out." He said that an employer with a "definable reason" to examine an employee's computer ought to be permitted to do so. But prior to the search, the employer ought to give the worker notice of its concerns, perhaps 72 hours before the actual snooping. During the time-out, the worker can seek legal redress, if any, seek to limit the search, or even attempt to resolve matters. If the examination proceeds, the employee or a representative should be able to attend. Perhaps most importantly, once the subject of the search has been refined, the examination must be restricted to the noticed areas -- stored information beyond its scope is out of bounds. In a telephone interview, Judge Rosenbaum, a witty and down-to- earth Reagan appointee who has been on the federal bench since 1985, said that his proposal would inject "a modicum of process" into the searches. "It would give the person some notice, give him an opportunity to make some decisions . . . and it would restrict the company to what it is looking for, so they can't go see if someone has a boyfriend or mistress if they are looking whether someone is stealing money." Judge Rosenbaum said that he is surprised that there has been such an "uncritical acceptance" of the proposition that because a company owns the computer they have a right to all its contents. "If that's true, then why can't a company come into your house and get everything you ever wrote on a company pad with a company pencil," he said. "It's the same logic." "I think we are just following these things like a bunch of lemmings right now," he said. "I'm just trying to suggest other ways of thinking. I'm not looking to stimulate new lawsuits. We have plenty of those in the store." The essay on hard drive searches is the second contrarian piece that Judge Rosenbaum has penned for The Green Bag. His first article, published last year, argued that a computer's permanent memory is a flaw that undermines its value and endangers its human masters. That article, "In Defense of the DELETE Key," as well as his current essay, will be cited in an upcoming chapter on electronic discovery in Moore's Federal Practice, a multi-volume treatise on civil and criminal procedure that is updated regularly and sits on the shelf of every law library in the nation. Gregory Joseph, a New York lawyer and a member of the editorial board of the treatise, said that Judge Rosenbaum's article on workplace surveillance had "an interesting point of view." "Just because a company owns a computer, they can look at everything you write on it?" asked Joseph. "That's not a rational position but it is one that we uncritically accept," he said. Copyright 2001 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From brian at happygardening.com Fri Jul 27 00:21:09 2001 From: brian at happygardening.com (Brian High) Date: Fri, 27 Jul 2001 00:21:09 -0700 Subject: SCN: Re: Illegal attachment type found in message "file in the FreeHand " References: <20010727033103.408.qmail@arboretum.happygardening.com> Message-ID: <004501c1166c$be7df790$0200005a@happygardening.com> emailer1 at netzero.net, You probably have the Magistr virus: http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=PE_MAGISTR.A I know because I got this from you and I doubt you sent it on purpose ... and it looks like Magistr emails I have seen before. Update your Antivirus library and clean your system. Thanks. --Brian Received: from mail9.wlv.netzero.net (209.247.163.66) by Blackmail; 26 Jul 01 20:3 0:36 PDT Received: (qmail 15551 invoked from network); 27 Jul 2001 03:29:55 -0000 Received: from dialup-63.214.13.148.dial1.seattle1.level3.net (HELO smtp.netzero.n et) (63.214.13.148) by mail9.wlv.netzero.net with SMTP; 27 Jul 2001 03:29:55 -0000 FROM: emailer1 SUBJECT: file in the FreeHand X-MSMail-Priority: Normal X-Priority: 3 X-Mailer: Microsoft Outlook Express 4.72.3612.1700 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_00A3_0121705F.1C705F80" Content-Transfer-Encoding: 7bit This is a multi-part message in MIME format. ------=_NextPart_000_00A3_0121705F.1C705F80 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Folder. When entering the name of a Photoshop plug-in, note that you must use the name of the actual function as it appears in the FreeHand Xtras menu after the wor d "[TIFF]. ------=_NextPart_000_00A3_0121705F.1C705F80 Content-Type: application/octet-stream; name="ADDREG.EXE" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="ADDREG.EXE" TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1v ----- Original Message ----- From: "System Anti-Virus Administrator" To: Cc: Sent: Thursday, July 26, 2001 8:31 PM Subject: Illegal attachment type found in message "file in the FreeHand " > [This message has been CC'ed to System Anti-Virus Administrator] > > Attention emailer1 . > > A Illegal attachment type was found in an Email message you sent. > This Email scanner intercepted it and stopped the entire message > reaching it's destination. > > The Illegal attachment type was reported to be: > > EXE attachments disallowed > > > Please contact your I.T support personnel with any queries regarding this > policy. > > Your message was sent with the following envelope: > > MAIL FROM: enailer1 at netzero.net > RCPT TO: brian at happygardening.com > > ... and with the following headers: > > From: emailer1 > Subject: file in the FreeHand > Date: Sun, 26 Jul 2001 20:31:3 > > > The original message is kept in: > > arboretum:/var/spool/qmailscan/viruses > > where the System Anti-Virus Administrator can further diagnose it. > > The Email scanner reported the following when it scanned that message: > > --- > > ---perlscanner results --- > Illegal attachment type 'EXE attachments disallowed' found in file /var/spool/qmailscan/arboretum996204637397/ADDREG.EXE > --- > > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From jj at scn.org Fri Jul 27 00:40:18 2001 From: jj at scn.org (J. Johnson) Date: Fri, 27 Jul 2001 00:40:18 -0700 (PDT) Subject: SCN: "Code Red" worm on July 31st. Message-ID: Never mind the Sircam virus! CERT has issued yet another advisory on the "Code Red" worm (a self-propagating piece of code that infects "IIS", the Microsoft web server product): it may choke the Internet at the end of the month. This worm is especially infectious--they reckon it infected over 250,000 sites in nine hours. And that in 18 hours it could infect nearly every vulnerable site in the world. (But it defaces only sites where English is the default language.) This is a timed-mode worm, that goes into different modes depending on the day of the month. CERT expects it to go crazy on August 1st (GMT; 7 PM July 31st our time), and possibly cause such heavy network traffic as to jam all Internet traffic. So if telnet response is abysmal Tuesdaay night--nope, it's not a probem with SCN! See www.cert.org for details. === JJ ============================================================= * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From shawn.macdougall at rainierfunds.com Fri Jul 27 10:16:05 2001 From: shawn.macdougall at rainierfunds.com (Shawn MacDougall) Date: Fri, 27 Jul 2001 10:16:05 -0700 Subject: SCN: plus test Message-ID: <1115F8CFF44CD211961800A0C9DA97C019DAB5@BDC1> gag * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From douglas at scn.org Fri Jul 27 10:55:58 2001 From: douglas at scn.org (Doug Schuler) Date: Fri, 27 Jul 2001 10:55:58 -0700 (PDT) Subject: SCN: Re: TOP Seeks Program Officer In-Reply-To: Message-ID: fyi... ****************************************************************** * New Community Networks: Wired for Change Now online * * http://www.scn.org/ncn * * Give us YOUR insights! Help write the new edition! * ****************************************************************** On Fri, 27 Jul 2001, Judy Sparrow wrote: > The Technology Opportunities Program (TOP) is seeking a Program Officer. TOP Program Officers are actively involved in the review of grant applications, providing assistance to awarded projects, and disseminating information to the general public on the lessons learned from TOP projects. Prospective applicants must apply using the Department of Commerce's electronic job application system, www.jobs.doc.gov > > Look for: > > "Telecommunications Policy Analyst, GS-0301-12/13" > National Telecommunications and Information Administration > Office of Telecommunications and Information Applications > Application Deadline: 8/24/2001 > * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Sat Jul 28 15:15:19 2001 From: steve at advocate.net (Steve) Date: Sat, 28 Jul 2001 15:15:19 -0700 Subject: SCN: Search engines Message-ID: <3B62D707.28170.36BF597@localhost> x-no-archive: yes ========================== (J.D. Lasica, Online Journalism Review)---Many of us in the new media industry have watched in despair during the past few months as several major search engines have abandoned all pretense at editorial integrity by adopting deceptive, misleading advertising practices at the expense of their users. Finally, someone has stood up and said, Enough is enough. And now it's time for the rest of us to join the battle as well. Commercial Alert, a 3-year-old consumer organization in Portland, Ore., founded by Ralph Nader, filed a formal complaint with the Federal Trade Commission last week, charging that eight of the major search engines were "inserting advertisements in search engine results without clear and conspicuous disclosure that the ads are ads." To which I say: Bravo! But also: It's not enough. Better that the search engines clean up their act on their own by bowing to their users' wishes rather than bend to government coercion. Why should this matter to journalists, researchers and other Net denizens? Because search engines have become indispensable to our online existence as we look for ways to sensibly navigate the Web's 2 billion pages and 14 billion links. Seven of the 10 most visited Web sites are search engines. A February survey by the Pew Internet & American Life Project found that Internet users' top two activities are e-mail and online searches. The Net is becoming central to Americans' everyday lives. A nationwide survey by the Markle Foundation released this month found that by a huge margin, the leading metaphor in the public's mind for the Internet is "a library" — not "a shopping mall." But an increasing number of search engines don't seem to understand that. "The problem has become acute lately," says Gary Ruskin, Commercial Alert's executive director. "Search engines have become essential to the quest for learning and knowledge in the Internet Age, and we don't want such an important platform to be used to deceive the public and skew search results on behalf of hucksters. They've chosen crass commercialism over editorial integrity." No one, including Commercial Alert, begrudges the search engines their right to turn a profit and make an honest buck. It's the honest part that's at issue. Here's what has happened: As the dot-com meltdown and economic slowdown have combined to pummel online ad revenues, Internet companies, including search engines, have scrambled to come up with other ways to staunch the flow of red ink. Search engines have increasingly turned to two significant revenue streams: ....Paid placement: In addition to the main editorial-driven search results, the search engines display a second — and sometimes third — listing that's usually commercial in nature. The more you pay, the higher you'll appear in the search results. ....Paid inclusion: An advertiser or content partner pays the search engine to spider its site and include the results in the main editorial listing. The result? A site is more likely to see its pages appear in a search result, but there are no guarantees. There's nothing intrinsically wrong with either of these business revenue streams. A user who enters "star wars" into a search engine may be doing research on the Strategic Defense Initiative - or she may want to buy plastic action figures. The trouble is that many search engines have gone to great lengths to fuzz the line between editorial and commercial listings. "This is a breach of the editorial-advertising line," Ruskin says. "We don't oppose advertising, of course. We just support editorial integrity." Commercial Alert's complaint names Lycos, HotBot, AltaVista, LookSmart, MSN.com, Netscape, iWon and Direct Hit, owned by Ask Jeeves. All eight display paid listings in addition to objective, algorithm-based results, but they call them "Featured Links" or "Partner Results" rather than disclosing that they're paid by sponsors. In addition, MSN, Alta Vista and LookSmart accept payments for inclusion in their editorial results. So, for example, LookSmart returns three listings: Featured Listings (paid listings), Directory Topics (spidered results) and Reviewed Web sites (including paid listings). Clear as a bell, no? Notably missing from the list are Google, Yahoo and Excite, three of the industry's leaders, which clearly are wearing the white hats in this contest. Google, especially, has consistently staked out the high ground, telling Interactive Week: "We think if we're the only ones out there with a reputation for integrity in our search results, that can only be good for us." A second Google spokesperson told Searchenginewatch.com: "Our search engine results represent our editorial integrity, and we have no plans to alter our automated processes." Google publishes paid listings, but clearly marks them as "Sponsored Links." And it has bucked the commercial tidal wave by not using paid inclusions. Chaste almost to a fault, Google won't display search results for tens of thousands of pages that it has already crawled and indexed for internal use by corporate partners such as Cisco and MarthaStewart.com — because it doesn't want to show favoritism to its business clients. A rare virtue in these times. Fittingly, last Wednesday Google Inc. won the Webby Award for best practices, a new category that honors a single site that serves as a model of overall excellence. Danny Sullivan, editor of Searchenginewatch, has been one of the more seasoned observers of the portal business in recent years, keeping tabs on paid placements and paid inclusions by all the major search engines. Sullivan, speaking by phone from Shrewton, England, is no anti- business zealot. He observes, smartly, that search engines are still underutilized by advertisers seeking highly targeted audiences. "It amazes me that there's been so little written about this aspect of search engines," he says. "There are very few places where people tell you exactly what they want, in real time. Banner ads are a poor tool to respond to those requests. The ability to interact with the users right within a search results area - that's gold to the advertisers." And it should be gold to users, too - if it's done on the up and up. "We're seeing sites all over the Web displaying skyscraper ads and popup ads that are untargeted, intrusive, in-your-face," Sullivan says. "We should be clamoring for more targeted commercial search results, because they just might be relevant to my needs. People need to understand that if you don't support the sponsored areas, the alternative is an all-commercial zone." That's the big fear that Sullivan often hears from webmasters: that search engines will eventually offer nothing but paid listings. "That's not why most of us are on the Internet," he says. "It's more than just an online Yellow Pages." Writing a feature article on Aimee Mann? A business backgrounder on Dell? A medical story on Propecia? A travel piece on Maui? Get ready to wade through a torrent of commercial come-ons first when researching your story. "This is like one day opening your newspaper and finding it filled with nothing but ads," says Sullivan, who has covered the subject in essays such as Buying Your Way Into Search Engines, Can Portals Resist the Dark Side? and The Evolution of Paid Inclusion. Both Sullivan and Ruskin point out that many of the smaller search engines engage in similar practices, or worse. Dogpile used to be a fairly useful search engine, but search the Web on Dogpile today and you'll find page after page of paid commercial links (from GoTo, FindWhat, Sprinks, ePilot, ah-ha, BrainFox and Kanoodle) before it displays anything remotely relevant or objective. (Studies show that the vast majority of users don't bother looking past the top 30 results.) Also falling from grace into the pitfires of hell is Disney's Go, which once operated one of the slickest search engines on the Web in Infoseek but now merely coughs up results from GoTo's commercial engine. What's the reaction of search engines to all this? LookSmart and Alta Vista issued statements dismissing the charges as groundless. A few weeks earlier, LookSmart's CEO, Evan Thornley, told the San Francisco Chronicle his managers did not even raise the subject of ethics when the company adopted a pay-for-placement program last month. "We can't afford to have ideological debates anymore," he huffed. Sarah Lefko, a product manager for MSN.com, added that surveys by Microsoft show that consumers already assume that all search results are for sale. (How conveniently self-serving - and what rubbish.) Matt Stoever, a vice president at Lycos, told the New York Times: "We thought long and hard and decided it doesn't matter if we are paid for a link, so long as the results are what the user wants. The industry has trained users to avoid anything that looks commercial. By calling them paid listings, it hurts the user." Such is the arrogant, Alice-in-wonderland, upside-down world of Internet executives these days. Black is white, profit is all, and the entire Internet is filled with callow users who are either (a) so cynical that they assume all search results are bought and paid for, or (b) clueless droids who have somehow been goaded into ignoring wonderfully useful commercial listings. Says Ruskin: "Their arguments aren't credible. If what they're claiming is true, why wouldn't they be straight with the users and reveal that their ads are ads? The fact that they're hiding and obfuscating that fact proves that it's balderdash." Ruskin says it's too early to tell whether the FTC will move aggressively to act on the organization's complaint, noting that chairman Timothy J. Muris took over the agency's reins only last month. But he notes there are extensive precedents for the FTC to intervene. "For example, they've repeatedly told makers of infomercials that they have to disclose to the public that they're paid ads rather than independent programming," he says. Personally, I'm not counting on the Bush appointees on the FTC to defend my interests as a consumer. I'm voting with my mouse clicks by doing my searches on Google and Yahoo. But I also think the out-of-touch search engines could use some interaction with their audience. Ruskin agrees: "Yes, we're hoping that users will switch to sites that have more editorial integrity, and that they'll make their voices heard. It's a very simple request: We don't want trickery." Here's the message I hope the search engines will hear and begin to heed: We want our search results clean and unsullied. Display your paid listings, too, in a separate area, but be honest and upfront about them. Tell us your practices in a straightforward disclosure statement, and make it easy to find. Don't deceive us, and don't belittle us by saying we're too shallow to care about editorial integrity. Copyright 2001 Online Journalism Review * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From melissa at groupworks.org Sun Jul 29 20:32:06 2001 From: melissa at groupworks.org (Melissa Guest) Date: Sun, 29 Jul 2001 20:32:06 -0700 Subject: SCN: Can you come Party at The Guests?! Sunday 8/5 - 11am-10pm Message-ID: <011401c118a8$3b046280$0100a8c0@dellxpsr350> Seafair / Blue Angels Party @ The Guests Sunday, August 5th - 11am to 10pm (Blue Angels show on around noon) 5485 Highland Drive, Bellevue 98006 Hello! We haven't been able to party in months, and would love to have you and your favorite people join us to watch the Blue Angels (from our deck) and Hydro Races (on the big TV). Plus we have family visiting from England, and would love to help you get your fill of that lovely British accent. Lots of fun and games for everyone, including the youngins! RSVPs and Food to share appreciated, but not required! You can reply by email or call us at (425) 653-7353. **Directions** Steve & Melissa Guest 5485 Highland Drive, Bellevue 98006 hm: (425) 653 7353 cell: (425) 466 7976 BY CAR: take 405 to the Coal Creek Parkway exit, one exit south of I-90. Turn east from the exit ramp, then stay in the right lane through next few lights, going straight (not left) through lights for Factoria Blvd SE. Move into the left lane, and at the next set of lights, turn left up onto Forest Drive. Go past 1st left (Somerset Blvd), and take 2nd left up onto Highland Drive. Our house is on the NW corner of SE 55th and Highland Drive (our neighbors refer to us as Stonehenge thanks to our 2 upright boulders on SE corner) - park anywhere you can on the street (except in front of our hydrant!). BY BUS: Bus service isn't available directly to our house on Sundays, but if you can get yoursefl to Factoria Square or a Park & Ride in south Bellevue, and call from there, we can send someone to come get you! * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From jj at scn.org Sun Jul 29 23:45:33 2001 From: jj at scn.org (J. Johnson) Date: Sun, 29 Jul 2001 23:45:33 -0700 (PDT) Subject: SCN: Public Alert about the Code Red worm (fwd) Message-ID: CERT, along with Microsoft and other agencies, is warning of a possible Internet melt-down on Tuesday. If you are running Microsoft "Internet Information Server" web server software on Windows NT or Windows 2000, please either obtain and apply a patch, or disable IIS. See the message from CERT, below, for details. All Internet users should be aware there is a potential for disruption and delay of all Internet services, including e-mail, web, and telnet, beginning Tuesday, July 31, around 5 PM PDT. === JJ ============================================================= ---------- Forwarded message ---------- Date: Sun, 29 Jul 2001 16:18:39 -0400 (EDT) From: CERT Advisory To: cert-advisory at cert.org Subject: Public Alert about the Code Red worm -----BEGIN PGP SIGNED MESSAGE----- We the CERT/CC, along with other organizations listed below are jointly publishing this alert about a serious threat to the Internet For Immediate Release: 3:00 PM EDT July 29, 2001 A Very Real and Present Threat to the Internet: July 31 Deadline For Action Summary: The Code Red Worm and mutations of the worm pose a continued and serious threat to Internet users. Immediate action is required to combat this threat. Users who have deployed software that is vulnerable to the worm (Microsoft IIS Versions 4.0 and 5.0) must install, if they have not done so already, a vital security patch. How Big Is The Problem? On July 19, the Code Red worm infected more than 250,000 systems in just 9 hours. The worm scans the Internet, identifies vulnerable systems, and infects these systems by installing itself. Each newly installed worm joins all the others causing the rate of scanning to grow rapidly. This uncontrolled growth in scanning directly decreases the speed of the Internet and can cause sporadic but widespread outages among all types of systems. Code Red is likely to start spreading again on July 31st, 2001 8:00 PM EDT and has mutated so that it may be even more dangerous. This spread has the potential to disrupt business and personal use of the Internet for applications such as electronic commerce, email and entertainment. Who Must Act? Every organization or person who has Windows NT or Windows 2000 systems AND the IIS web server software may be vulnerable. IIS is installed automatically for many applications. If you are not certain, follow the instructions attached to determine whether you are running IIS 4.0 or 5.0. If you are using Windows 95, Windows 98, or Windows Me, there is no action that you need to take in response to this alert. What To Do If You Are Vulnerable? a. To rid your machine of the current worm, reboot your computer. b. To protect your system from re-infection: Install Microsoft?s patch for the Code Red vulnerability problem: * Windows NT version 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833 * Windows 2000 Professional, Server and Advanced Server: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800 Step-by-step instructions for these actions are posted at www.digitalisland.com/codered Microsoft's description of the patch and its installation, and the vulnerability it addresses is posted at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-033.asp Because of the importance of this threat, this alert is being made jointly by: Microsoft The National Infrastructure Protection Center Federal Computer Incident Response Center (FedCIRC) Information Technology Association of America (ITAA) CERT Coordination Center SANS Institute Internet Security Systems Internet Security Alliance -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 iQCVAwUBO2RpCgYcfu8gsZJZAQGFrAP/TzyQ7lyshdKb7XeNNaVTFAZzO1hB1vKG CZsaPxzqF2/GMgAQJ8HNum43QBSzr+H96f/5c7Op9ac1SefzuyWs14z+BhBXr6mf Io9vClcL3h9saqV/J1Bkv0psYhhImTgLvAWZIYneYMuvY39zjxLC2/jkKLw8dWze lcdFPH5j9vE= =3biQ -----END PGP SIGNATURE----- * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From joann545kj at yahoo.com Mon Jul 30 16:48:06 2001 From: joann545kj at yahoo.com (joann545kj at yahoo.com) Date: Mon, 30 Jul 2001 18:48:06 -0500 Subject: SCN: Requesting Info....! Message-ID: <000012415d07$0000324b$000038ed@> $ $ $ SERIOUS MONEY! What EVERYONE Has Been Waiting For! $ $ $ Starting Today You Can Earn $2,000 to $8,000 in a Matter of Weeks! For details on this money making opportunity click on the hyperlink below: http://www.geocities.com/intercash2001 If you have a problem with the above hyperlink send us a email at mailto:jimmydee236 at yahoo.com?subject=show me: WE will send you a new link. To be removed from this mailing list type remove in the subject box mailto:lndpn7 at yahoo.com?subject=remove, or fax us at 1561.273.2567 with your email address and remove me. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * *