home *** CD-ROM | disk | FTP | other *** search
- Chaos Digest Lundi 8 Fevrier 1993 Volume 1 : Numero 7
-
- Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
- Archiviste: Yves-Marie Crabbe
- Co-Redacteurs: Arnaud Bigare, Stephane Briere
-
- TABLE DES MATIERES, #1.07 (8 Fev 1993)
- File 1--De l'origine du premier e-journal francais, ChaosD
- File 2--Comment ecrire a Clinton a la Maison Blanche?
- File 3--ICVC'93: Premiere conference bulgare sur les CPA's
- File 4--Proposition de nouvel "C2 Orange Book" aux USA
- File 5--Phreacking: Est-ce realisable?
- File 6--Attention au CCCF (Reprint)
- File 7--Re: NTPASS, module chargeable sous NetWare
- File 8--Reaction sur "The Little Black Book of Computer Virus"
-
- Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from jbcondat@attmail.com. The editors may be
- contacted by voice (+33 1 40101775), fax (+33 1 40101764) or S-mail at:
- Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
- 93400 St-Ouen, France
-
- Issues of Chaos-D can also be found on some French BBS. Back issues also
- may be obtained from the mail server at jbcondat@attmail.com: all incoming
- messages containing "Request: ChaosD #x.yy" in the "Suject:" field are
- answered (x is the volume and yy the issue).
-
- CHAOS DIGEST is an open forum dedicated to sharing French information among
- computerists and to the presentation and debate of diverse views. ChaosD
- material may be reprinted for non-profit as long as the source is cited.
- Some authors do copyright their material, and they should be contacted for
- reprint permission. Readers are encouraged to submit reasoned articles in
- French, English or German languages relating to computer culture and
- telecommunications. Articles are preferred to short responses. Please
- avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Chaos Digest contributors
- assume all responsibility for ensuring that articles
- submitted do not violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue Feb 2 08:01:27 EST 1993
- From: 441495@ACADVM1.UOTTAWA.CA (MICHAEL STRANGELOVE )
- Subject: File 1--De l'origine du premier e-journal francais, ChaosD
-
-
- I find it amazing that the first e-serial in France should only just
- appear in 1993, considering the size and age of Minitel. Does anyone
- have any comments on why this should be so?
-
- Michael Strangelove
- Department of Religious Studies
- University of Ottawa
-
- BITNET: 441495@Uottawa
- Internet: 441495@Acadvm1.Uottawa.CA
- S-Mail: 177 Waller, Ottawa, Ontario, K1N 6N5 CANADA
- Voice: (613) 747-0642
- FAX: (613) 564-6641
-
- +++++
-
- Date: Tue Feb 2 13:34:36 EST 1993
- From: JQRQC%CUNYVM.BITNET@VTVM1.CC.VT.EDU (Joe Raben )
-
- It just seems to me, Michael, that French >academics< are less turned on to
- netting than other nationalities, and they may not see Minitel as a meaningful
- >scholarly< medium. While SCHOLAR had at latest count 67 subscribers in
- Britain, 83 in Canada, 49 in the Netherlands, 31 in Australia, and 18 in
- Japan, only 6 have signed up so far in France, and my associates there ask me
- to send them faxes!
-
- +++++
-
- Date: Thu Feb 4 08:54:04 EST 1993
- From: guedon@ERE.UMontreal.CA (Guedon Jean-Claude )
-
- There is a second answer to Joe Raben's: to publish on Minitel, one
- had to have a periodical number, which explains why so many initial Minitel
- services were connected with well known publications such as Le Monde, etc...
- This was in response to the newspapeprs's fear of being faced with unfair
- competition from the new electronic medium and, in fact, some went so far
- as to claim that this was a plot to destroy freedom of the press by
- destroying the newspapers themselves. In order to reassure them, the
- government forced initial publishers on Minitel (I am using the word
- "publisher" in an extrapolated meaning, of course) to be connected with
- an existing publication.
-
- I don't know if this policy is still in force.
-
- ------------------------------
-
- Date: Wed, 20 Jan 93 05:32 GMT
- From: 0004381897@mcimail.com (David Daniels )
- Subject: File 2--Comment ecrire a Clinton a la Maison Blanche?
-
-
- It is only fitting that this happened on the eve of tomorrow's presidential
- inauguration: I sent a message today to the Clinton Transition Team and got
- the following response. Does this mean that they are not keeping up with
- their e-mail? So much for electronic democracy!!! :-)
-
- TO: * David Daniels / MCI ID: 438-1897
- Subject: Non delivery notification
-
- Message [...] sent Tue, Jan 19, 1993 07:16 PM EST, could not be delivery to:
- To: Clinton Transition Team
- EMS: CompuServe
- MBX: [75300,3115]
-
- for the following reasons:
-
- Mail Delivery Failure. No room in mailbox.
-
- ----- Returned message -----
-
- +++++
-
- Date: Thu, 28 Jan 1993 18:12:46 GMT
- From: barrett@forge.gatech.edu (James Barrett )
-
- > Mail Delivery Failure. No room in mailbox.
-
- This is because Jock Gill who handles Email for Clinton was at the
- inauguration and not near his computer for a week. The link is back up and
- generating *lots* of mail (press releases) from Clinton.
-
- +++++
-
- Date: Fri, 29 Jan 1993 20:32:42 GMT
- From: schneier@chinet.chi.il.us (Bruce Schneier )
-
- The White House is on-line. Send mail to them at:
-
- 75300.3115@Compuserve.COM
-
- Bruce
-
- ****************************************************************************
- * Bruce Schneier *
- * Counterpane Systems For a good prime, call 391581 * 2_216193 - 1 *
- * schneier@chinet.chi.il.us *
- ****************************************************************************
-
- +++++
-
- Si les americains ne cessent de discuter de l'etat de sante des boites-aux-
- lettres electroniques de Bill Clinton (ici dans RISKS #14-29/30 et dans
- "Computer Privacy Digest" #2.013, Thierry Platon, dans un papier "Download
- et e-Mail: la tour de Babel" de son dossier _Les BBS_ ("InfoPC", decembre
- 1992, no. 87, page 208) ecrit beaucoup mieux:
-
- Aux Etats-Unis toutefois, on n'utilise pas de code de pays, mais
- plutot des codes correspondant au type de message: .com s'il provient
- d'une entreprise commerciale, .edu pour une universite ou une ecole,
- .org pour une organisation non commerciale, .mil pour l'armee, . gov
- pour le gouvernement (Bill.Clinton@whitehouse.gov est une adresse va-
- lable!), etc.
-
- Nous n'avons pas manque de transmettre nos felicitations a Bill Clinton par
- un message chaleureux a l'adresse indique. Il nous est revenu avec un
- commentaire:
-
- Your mail to whitehouse.gov is undeliverable.
- whitehouse.gov: unknown host
-
- Mais l'auteur, soucieux de ne pas laisser le lecteur dans une douce ignorance
- recidive de plus belle:
-
- [...] Certains types de BBS commerciaux americains peuvent relier ce
- type de e-Mail. C'est le cas de CompuServe, par exemple, ou un utili-
- sateur reference 72241,407 aura pour code 72241,407@Compuserve.com.
-
- Thierry Platon n'a jamais utilise de messageries reliees a InterNet. Dans le
- cas cite, l'adressage exact pour la plupart des routeurs est particulier. Sur
- ATT-Mail, la syntaxe aurait ete:
-
- mhs!csmail!72241.4079
-
- Il saurait aussi que les virgules sont interdites en adressage... et qu'
- Atlas400 de Transpac n'est pas connecte a InterNet.
-
- Qui me dira pourquoi?
-
- ------------------------------
-
- Date: Tue, 02 Feb 93 17:48:55 +0000
- From: icvc93@acmbul.bg (Organizing Comitee )
- Subject: File 3--ICVC'93: Premiere conference bulgare sur les CPA's
-
-
- C A L L F O R P A P E R S
-
- ACMBUL's FIRST INTERNATIONAL COMPUTER VIRUS PROBLEMS AND
- ALTERNATIVES CONFERENCE
-
- 5-8 April, 1993 - Varna, Bulgaria
-
- The purpose of the 1993 International Computer Virus
- Conference is to provide a forum for anti-virus product
- developers, researchers and academicians to exchange
- information among themselves, students and the public.
- ICVC'93 will consist of open forums, distinguished keynote
- speakers, and the presentation of high-quality accepted
- papers. A high degree of interaction and discussion among
- Conference participants is expected, as a workshop-like
- setting is promoted.
-
- Because ICVC'93 is a not-for-profit activity funded
- primarily by registration fees, all participants are
- expected to have their organizations bear the costs of their
- expenses and registration. Accomodations will be available
- at reduced rates for confernece participants.
-
- WHO SHOULD ATTEND
-
- The conference is intended for computer security
- researchers, managers, advisors, EDP auditors, network
- administrators, and help desk personnel from government and
- industry, as well as other information technology
- professionals interested in computer security.
-
-
- CONFERENCE THEME
-
- This Conference, devoted to advances in virus prevention,
- will encompass developments in both theory and practice.
- Papers are invited in the areas shown and may be
- theoretical, conceptual, tutorial or descriptive in nature.
- Submitted papers will be refereed, and those presented at
- the Conference will be included in the proceedings.
-
-
- Possible topics of submissions include, but are not
- restricted to:
-
- o Virus Detection o Virus Trends and Forecast
- o Virus Removal o Virus Prevention Policies
- o Recovering from Viruses o Incident Reporting
- o Viruses on various platforms o Emergency Response
- (Windows, Unix, LANs, WANs, etc.) o Viruses and the Law
- o Virus Geneology o Education & Training
-
-
- THE REFEREEING PROCESS
-
- All papers and panel proposals received by the submission
- deadline and which meet submission requirements will be
- considered for presentation at the Conference.
-
- All papers presented at ICVC'93 will be included in the
- Conference proceedings, copies of which will be provided to
- Conference attendees. All papers presented, will also be
- included in proceedings to be published by the ACMBUL.
-
-
- INSTRUCTIONS TO AUTHORS
-
- [1] Two (2) copies of the full paper, consisting of
- up-to 20 double-spaced, typewritten pages, including
- diagrams, must be received no later than 28 February 1993.
-
- [2] The language of the Conference is English.
-
- [3] The first page of the manuscript should include
- the title of the paper, full name of all authors, their
- complete addresses including affiliation(s), telephone
- number(s) and e-mail address(es), as well as an abstract of
- the paper.
-
-
- IMPORTANT DATES
-
- o Full papers to be received in camera-ready form by the
- Organizing Committee by 28 February 1993.
-
- o Notification of accepted papers will be mailed to the
- author on or before 10 March 1993.
-
- o Conference: 5-11 April 1993, St. Konstantine Resort,
- Varna, Bulgaria
-
-
- WHOM TO CONTACT
-
- Questions or matters relating to the Conference Program
- should be directed to the ACMBUL:
-
- ICVC'93
- Attn: Mr. Nickolay Lyutov
- ACMBUL Office
- Varna University of Economics
- 77 Boris I Blvd, 9002 P.O.Box 3
- Varna
- Bulgaria
-
- Phone/Fax: (+35952) 236-213
- E-mail: ICVC93@acmbul.bg
-
- icvc93@acmbul.bg (Organizing Comitee)
- ACMBUL -- Bulgarian Chapter of ACM
-
- icvc93@acmbul.bg (Organizing Comitee)
- ACMBUL -- Bulgarian Chapter of ACM
-
- -------------------
-
- Date: Thu Feb 4 10:31:32 EST 1993
- From: lynch@csmes.ncsl.nist.gov (nicki lynch )
- Subject: File 4--Proposition de nouvel "C2 Orange Book" aux USA
-
-
- CONTACT:
- Nickilyn Lynch
- Computer Scientist, National Computer Systems Laboratory
- National Institute of Standards and Technology (NIST)
-
-
- The **PRELIMINARY DRAFT** of the U.S. Federal Criteria for Information
- Technology Security (FC) (which will eventually replace the "Orange Book")
- is available on-line. The files are located on the NIST Computer Security
- Bulletin Board. When printed out, both volumes of the document total
- approximately 280 pages double-sided.
-
- By the second week of February, the FC (without the figures) should be
- available in ASCII format at that site. The figures will also be available
- individually in postscript form.
-
- What follows are instructions on how to download the files from the site,
- how to register your name for announcements, and how to send in comments.
-
- +++++
-
- TO DOWNLOAD THE FILES FROM NIST'S BBS
-
- The following information is on obtaining the draft Federal Criteria from
- the NIST BBS in electronic form. Please use these instructions for
- obtaining the files:
-
- You can obtain the files three ways:
-
- * anonymous ftp (PostScript):
-
- ftp to csrc.nist.gov (129.6.54.11)
- user anonymous
- password <your-e-mail-address>
- cd pub/nistpubs
- get fcvol1.ps, get fcvol2.ps
- quit
-
- * e-mail (PostScript)
-
- Send the following message only to docserver@csrc.nist.gov (no subject
- line necessary, use lower case):
- send fcvol1.ps
- send fcvol2.ps
- The files will be e-mailed to your account.
-
- [Moderateur: J'ai fait la demande par un simple message internet et j'ai
- recu 3 fichiers: un accuse de reception de ma demande de 1,3K et deux fichiers
- PostScript de 1012K et 894K]
-
- * via a BBS and a modem (PostScript compressed w/ PKZIP)
-
- Set parameters to 8 bit characters, no parity, 1 stop bit.
- For 9600 BPS, dial 1-301-948-5140
- For 2400 BPS, dial 1-301-948-5717
- If not a registered user, follow instructions for registering.
- Go to Files section, follow instructions for Downloading, file
- names are fcvol1.zip, fcvol2.zip (files are compressed using the
- PKZIP utility, which can also be downloaded here, filename is
- pkz110.exe)
-
- +++++
-
- REGISTERING YOUR NAME
-
- When you receive an electronic copy of the draft FC, please send us
- you name, mailing address, telephone, and e-mail address to the e-
- mail address listed below and state that you have an electronic
- copy of the FC. If you distribute the document to additional people
- in your organization, please send us the same information on those
- people as well. We will put the names into our database for any
- further announcements, meeting notices, draft announcements, etc.,
- related to the effort. NIST will be sending out a LIMITED NUMBER
- of hard copies, but due to the substantial expense of sending out
- such a large document--even at book rate, we would prefer people
- to receive the document electronic means. Therefore, by sending us
- your name and the names of those in your organization who have
- the downloaded copies of the document, it saves us from having to
- send additional hard copies.
-
- +++++
-
- COMMENTS
-
- We are soliciting TECHNICAL, SUBSTANTIVE comments on the document.
- The deadline for comments is:
-
- March 31, 1993
-
- All those who contribute substantive comments will be invited to a two-day
- workshop at the end of April 1993 to resolve the comments. The workshop
- will be held in the Washington-Baltimore area in a to-be-announced
- location.
-
- Please send your comments to:
-
- lynch@csmes.ncsl.nist.gov
-
- or, if you prefer, you can send us a 3.5" or 5.25" diskette in
- MSDOS or UNIX format (please indicate which) to:
-
- Federal Criteria Comments
- ATTN: Nickilyn Lynch
- NIST/CSL, Bldg 224/RM A241
- Gaithersburg, MD 20899
-
- We would prefer to receive electronic copies of comments and/or
- name registrations, but we will also receive hardcopy comments/name
- registrations at this same address. You can also contact us via
- the following fax:
-
- FAX: (301) 926-2733
- (please note that this number will be active starting in March)
-
- Thank you in advance for your interest in this effort.
-
- Federal Criteria Group
- National Institute of Standards and Technology
-
- --------------------
-
- Date: Tue Feb 2 11:41:25 EST 1993
- From: TAWED%ETSU.bitnet@CUNYVM.CUNY.EDU (Ed Street )
- Subject: File 5--Phreacking: Est-ce realisable?
-
-
- Hey!!!!
- I just recently came up with a way that we here could hack our way into the
- telephone system. It involves dialing a long distance number and placing a
- counter on the calling card number, if the card number is valid then there
- is silence, if it's invalid then it returns a busy line.
-
- I think that a computer with a modem could be programed to dial a selected
- number and then place a counter on the calling card number, dial the two and
- see if it's busy or not. If it's busy then cycle to the next card number. A
- very simple algorithm. I was talking to one of my friends that works for the
- press and he asked if it was realistic. I think that it would be. But the
- only problem is that there is 9 digits to the calling card number. :-(
-
- That's 999,999,999 possibilities! this part seems that it would be
- unrealistic. What do you think?? Think that it could take a long time or a
- short time. I even thought about getting together a hacking squad, assign a
- range to each one to break up the time that it would take.
-
- My friend in the press said that for anyone to believe it I would need proof,
- a few simple numbers would sufice.
-
- Any comments??
-
- ed.
- East Tennessee State University
-
- --------------------
-
- Date: Mon Dec 28 22:36:51 -0500 1992
- From: server@stormking.com (Storm King ListServ Account )
- Subject: File 6--Attention au CCCF (Reprint)
- Copyright: Phrack, Inc., 1992
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty-One, File 2 of 13
-
- +++++
- From: Synaps a/k/a Clone1 a/k/a Feyd
- Date: September 2, 1992
- Subject: Remarks & Warning!
-
- Hi,
-
- I've been a regular reader of Phrack for two years now and I approve fully the
- way you continue Phrack. It's really a wonderful magazine and if I can help
- its development in France, I'll do as much as I can! Anyway, this is not
- really the goal of my letter and excuse me for my English, which isn't very
- good.
-
- My remarks are about the way you distribute Phrack. Sometimes, I don't
- receive it fully. I know this is not your fault and I understand that (this
- net sometimes has some problems!). But I think you could provide a mail
- server like NETSERV where we could get back issues by mail and just by MAIL
- (no FTP).
-
- Some people (a lot in France) don't have any access to international FTP and
- there are no FTP sites in France which have ANY issues of Phrack. I did use
- some LISTSERV mailers with the send/get facility. Could you install it on
- your LISTSERV?
-
- My warning is about a "group" (I should say a pseudo-group) founded by Jean
- Bernard Condat and called CCCF. In fact, the JBC have spread his name through
- the net to a lot of people in the Underground. As the Underground place in
- France is weak (the D.S.T, anti-hacker staff is very active here and very
- efficient), people tend to trust JBC. He seems (I said SEEMS) to have a good
- knowledge in computing, looks kind, and has a lot of resources. The only
- problem is that he makes some "sting" (as you called it some years ago)
- operation and uses the information he spied to track hackers. He organized a
- game last year which was "le prix du chaos" (the amount of chaos) where he
- asked hackers to prove their capabilities.
-
- It was not the real goal of this challenge. He used all the materials hackers
- send him to harass some people and now he "plays" with the normal police and
- the secret police (DST) and installs like a trade between himself and them.
- It's really scary for the hacking scene in France because a lot of people
- trust him (even the television which has no basis to prove if he is really a
- hacker as he claims to be or if he is a hacker-tracker as he IS!).
- Journalists take him as a serious source for he says he leads a group of
- computer enthusiasts.
-
- But we discovered that his group doesn't exist. There is nobody in his group
- except his brother and some other weird people (2 or 3) whereas he says there
- is 73 people in his club/group. You should spread this warning to everybody
- in the underground because we must show that "stings" are not only for USA!
- I know he already has a database with a lot of information like addresses and
- other stuff like that about hackers and then he "plays" with those hackers.
-
- Be very careful with this guy. Too many trust him. Now it's time to be
- "objective" about him and his group!
-
- Thanks a lot and goodbye.
-
- Synaps a/k/a Clone1 a/k/a Feyd
-
- ------------------------------
-
- Date: Fri Feb 5 06:12:29 GMT 1993
- From: Chantal CARTON, Novell (fax: 146989461)
- Subject: File 7--Re: NTPASS, module chargeable sous NetWare
-
-
- Cher Monsieur,
-
- Le programme NTPASS pour lequel vous nous demandez notre avis est un NLM,
- c'est a dire un module chargeable dynamiquement de NetWare v3.11. Pour l'
- installer, il faut donc suivre le processus suivant.
-
- - Il faut tout d'abord avoir acces physique au serveur. Nous tenons a
- vous rappeler que les normes de securite C2 exigent que l'acces au ser-
- veur soit protege et tout administrateur de reseau qui assure la securite
- de son reseau met un acces physique sur les serveurs.
-
- - Il faut ensuite avoir un acces logique au serveur: NetWare permet de
- verrouiller la console par un mot de passe. Encore une fois cette fonc-
- tionnalite est utilise par tous les administrateurs et superviseurs de
- reseau quotidiennement.
-
- - Il faut ensuite appeler "AccessData" qui demande le numero de serie de
- NetWare et le numero de serie de NT PASS et qui alors, finalement, deli-
- vre une cle d'acces. Ceci permet de changer (et non de restituer comme
- semble le faire croire l'article) tous les mots de passe: ceci fait une
- difference fondamentale car toute personne du reseau s'en rend compte im-
- mediatement.
-
- Qui, dans une societe, connait le numero de serie du systeme d'exploita-
- tion NetWare a l'exception de l'administrateur ou du superviseur?
-
- Donc, en resume, un utilisateur, a partir de son porte NE PEUT PAS ins-
- taller ce logiciel et briser la securite de NetWare. Si les normes de
- securite les plus elementaires sont respectees (surtout la premiere), ce
- logiciel n'est pas utilisable.
-
- Par contre, l'objectif initial de ce produit est respecte. En effet, il
- permet a un administrateur qui aurait oublie le mot de passe superviseur
- et qui n'aurait pas cree d'equivalent superviseur (et cela arrive...) de
- se recreer un nouveau mot de passe pour retrouver l'acces a son serveur.
-
- En esperant que ces elements repondent a votre question et restant a vo-
- tre disposition pour tout renseignement complementaire, je vous prie de
- croire, Monsieur, a l'expression de mes sentiments les meilleurs.
-
-
- Chantal CARTON-DEMAZURE
- Directrice du Marketing
-
- ------------------------------
-
- Date: Sun Jan 10 13:00:58 -0500 1993
- From: jbcondat@ATTMAIL.COM (Chaos Computer Club France )
- Subject: File 8--Reaction sur "The Little Black Book of Computer Virus"
- Copyright: ComputerWorld, 1992
-
-
- Virus fighters fume over little black book
- Debate rages over merits of publishing codes
- Byline: James Daly, CW Staff
- Journal: Computerworld Page Number: 4
- Publication Date: June 29, 1992
-
- A little book is rattling a lot of chains in the computer security
- business these days. A little black book, to be exact.
-
- Only two weeks after being picked up by a small publishing house, The
- Little Black Book of Computer Viruses has initiated as nasty and divisive a
- free speech battle as this community has seen.
-
- That is because the 178-page ebony volume is chock full of the
- necessary source code for creating potentially destructive viruses. And for
- $15, the less technically inclined can simply send in a coupon and order
- floppy disks already loaded with compiled and executable virus programs.
-
- Anger flames
-
- Professional virus fighters such as Alan Solomon at S&S International
- are madder than angry hornets over the publication. They are encouraging
- anti-black book campaigns that include picketing author Mark Ludwig's
- house, boycotting shops that sell the book, petitioning Congress and even
- bringing in lawyers.
-
- Others said the book is relatively harmless because any hacker who
- really wants to get virus source code only has to dial up one of the
- innumerable hacker bulletin boards to quickly and easily download dozens of
- viruses.
-
- Critics dismissed Ludwig's First Amendment defense as the
- computational equivalent of yelling ''fire'' in a crowded movie theater.
- Inherently 'evil'
-
- ''Any virus, by its nature, is evil, and Ludwig presents sample after
- sample of ways to go about writing damaging code,'' said David Stang,
- chairman of the International Computer Security Association in Washington,
- D.C.
-
- ''The fundamental attraction of computers is that we can understand,
- control and predict what they do,'' he added. ''We do not want that data
- messed with, but Ludwig seems to think it's okay.''
-
- Not true, according to Ludwig, who claimed the purpose of the book is
- not destructive but educational.
-
- ''Computer viruses are not evil, and programmers have a right to
- create them, possess them and experiment with them,'' Ludwig said. ''These
- viruses are designed so that security people can see what a virus looks
- like and how it behaves. How can anyone realistically be in charge of
- security without having ever seen a virus?''
-
- The book's jacket cautions that those who misuse its viruses can be
- held legally liable, even if the misuse is unintentional. Additionally,
- Ludwig said, the viruses in the book are protected by copyright law and
- anyone who uses them without his permission will be subject to both civil
- and criminal prosecution.
-
- Stang has suggested that if Ludwig's altruistic claims are true, then
- he should offer to donate the proceeds from The Little Black Book of
- Computer Viruses to a fund that would fight the spread of damaging computer
- viruses.
-
- Others have suggested that Ludwig should have included ''pseudo-code''
- versions of the viruses, which contain enough information to illustrate a
- point without providing a full working virus.
-
- First in a series
-
- The book is scheduled to be the first in a series of three books about
- computer viruses. Ludwig first published the book himself last year and
- became its primarily salesman after it was reportedly turned down by a
- succession of publishers.
-
- The Upland, Pa.-based Diane Publishing Co. picked up the distribution
- rights to The Little Black Book of Computer Viruses earlier this month.
-
- ''We see nothing wrong with it,'' Diane Publishing President Herman
- Baron said. ''We put it out for the simple reason that it fits in with our
- catalog of computer security books.''
-
- ------------------------------
-
- End of Chaos Digest #1.07
- ************************************
-