home *** CD-ROM | disk | FTP | other *** search
- Chaos Digest Lundi 24 Mai 1993 Volume 1 : Numero 34
- ISSN 1244-4901
-
- Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
- Archiviste: Yves-Marie Crabbe
- Co-Redacteurs: Arnaud Bigare, Stephane Briere
-
- TABLE DES MATIERES, #1.34 (24 Mai 1993)
- File 1--"Chasseur II" pour Atari (critique)
- File 2--National Computer Virus Awareness Day, USA (fete nationale)
- File 3--Security&Control of IT in Society_ 12-7 Aout 93 (conference)
- File 4--S.A.M., le prochain bebe de France TELECOM (produit)
-
- Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost by sending a message to:
- linux-activists-request@niksula.hut.fi
- with a mail header or first line containing the following informations:
- X-Mn-Admin: join CHAOS_DIGEST
-
- The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
- or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
- 155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299)
- groups.
-
- Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
- 466893. Back issues of ChaosD can be found on the Internet as part of the
- Computer underground Digest archives. They're accessible using anonymous FTP:
-
- * kragar.eff.org [192.88.144.4] in /pub/cud/chaos
- * uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
- * halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
- * ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
- * ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
- * nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
- * orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos
-
- CHAOS DIGEST is an open forum dedicated to sharing French information among
- computerists and to the presentation and debate of diverse views. ChaosD
- material may be reprinted for non-profit as long as the source is cited.
- Some authors do copyright their material, and they should be contacted for
- reprint permission. Readers are encouraged to submit reasoned articles in
- French, English or German languages relating to computer culture and
- telecommunications. Articles are preferred to short responses. Please
- avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Chaos Digest contributors
- assume all responsibility for ensuring that articles
- submitted do not violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Mon May 17 15:25:47 +0200 1993
- From: internet!altair.univ-lyon1.fr!vido (vido )
- Subject: File 1--"Chasseur II" pour Atari (critique)
-
-
- Augustin VIDOVIC
- Tour Panoramique
- DUCHERE
- 69009 LYON
- a Jean-Bernard CONDAT
- B.P. 155
- 93404 St-Ouen CEDEX
-
- Bonjour;
-
- J'ai bien recu votre lettre du 13 mai 1993, et vous en remercie
- vivement: vraiment, je n'aurais jamais pense recevoir un jour du courrier
- me demandant mon avis au sujet d'une critique d'un de mes programmes...
- Surtout un aussi vieux programme que le CHASSEUR II! Voila qui fait un
- drole d'effet...
-
- Avant toute chose, je tiens a preciser que le CHASSEUR II date
- de 1991, qu'il etait une evolution du CHASSEUR tout court, qui a suffit
- aux debuts de l'evolution des boot-virus sur ATARI ST... Mais qu'il est
- depasse et insuffisant depuis une bonne annee. En effet, de nouveaux virus
- ont vu le jour, qui exploitent fort bien les failles du CHASSEUR II: ils
- savent se rendre "invisibles" en memoire (du moins jusqu'a un certain point),
- ils resistent fort bien a une reinitialisation ("a chaud", cependant) de
- la machine, se rendent meme "invisibles" sur le disque (le systeme lit un
- bootsecteur normal et inexecutable!), et changent de forme de facon
- aleatoire a chaque reproduction. Ils sont indetectables par le CHASSEUR II,
- et sont d'ailleurs etudies pour.
-
- C'est mon frere, Zvonimir, qui a cree ces nouveaux virus, afin de
- m'obliger a creer un programme plus puissant (le besoin cree la fonction).
- Attention, toutefois: cette nouvelle generation n'est jamais sortie de chez
- nous! Il s'agissait juste d'un interessant defi intellectuel. Nous ne sommes
- pas fous au point de diffuser un poison suffisamment puissant pour "tuer"
- toute une gamme de machines (ATARI ayant deja du mal a vivre!).
-
- Donc, je vais commenter et corriger (en expliquant les corrections!)
- la critique de M. Slade; mais cela n'a pas une bien grande importance: le
- CHASSEUR III, son successeur, a corrige tous ses defauts (du moins, tous
- ceux que nous avons pu remarquer a l'usage).
-
- Apres la critique, je vous joins en annexe le listing de README.VIR,
- qui est le petit fichier accompagnant le logiciel, destine a etre lu avant
- utilisation. Ceci afin de montrer que nulle part, il n'est dit que
- l'operation de vaccination est reversible.
-
- J'espere que cela vous conviendra. Dans le cas contraire, je serais
- heureux de completer tout point que j'aurais laisse dans l'obscurite.
-
- Je vous envoie cette lettre par courrier electronique, en utilisant
- votre adresse jbcondat@attmail.com, et en esperant que cela vous parviendra
- bien. Pourriez-vous me fournir quelques renseignements au sujet du
- Chaos Computer Club? J'en ai entendu parler, mais je ne pensais pas y avoir
- affaire un jour.
-
- Je n'ose vous demander plus d'informations, car pour le moment je
- n'ai pas tres souvent acces a un terminal de la Toile ("Web Angels"-J.M. Ford)
- a cause du fait que j'effectue a l'heure actuelle mon service militaire
- (libere fin aout), et que je retourne seulement environ une ou deux fois par
- mois a l'observatoire. Pour la suite, n'etant pas certain de pouvoir
- continuer mes etudes, et ainsi de pouvoir acceder souvent au reseau, je
- prefere ne pas risquer pour le moment de surcharger a nouveau le mailsystem
- de image... Je me ferais sans doute taper sur les doigts! Sachez cependant
- que je brule d'envie de faire connaissance avec d'autres bidouilleurs,
- et que j'espere pouvoir prendre contact avec votre club tres bientot!
-
- Bien amicalement,
-
- A. VIDOVIC
-
- P.S.: Puisque vous avez rajoute "Av. Plateau" a l'adresse ecrite sur
- l'enveloppe de votre lettre, c'est que vous avez verifie sur l'annuaire
- notre existence; donc, vous avez notre numero de telephone. Que rien ne vous
- empeche de nous contacter par telephone pour tout renseignement
- complementaire.
-
- [ChaosD: Nous avons appele ce cher bleu(e) bit(te) au +33 78359559 qui nous a
- confie qu'en fonction des ventes de ses sharewares il reprendrai ou non ses
- etudes. A l'heure actuelle, la perspective de reprendre sa licence de physique
- parait pour lui la meilleure des solutions.]
-
- +++++
- > Of course no one will believe it, but this is *not* prompted by the recent
- > spate of calls for Atari and Amiga stuff. I recently had an opportunity to
- > do some partial testing of some antivirals on other systems and took it.
- > Unfortunately, the tests are not complete, and cannot be finished at this
- > time due to the absence of a viable "test suite". I have, however,
- > attempted to give some indication of the shareware utilities I was able to
- > round up, and have added the contact info to the CONTACTS.LST.
- >
- > Herewith, then, is the first.
- >
- > ATCHRSSR2.RVW 930430
- > Comparison Review
- >
- > Company and product:
- >
- > A. & Z. Vidovic
- > Tour Panoramique
- > Duchere
- > 69009 Lyon
- > France
- > Chasseur II
- >
- > Summary: Boot sector overwriter
- >
-
- > Cost 50 Fr (U$15)
- >
- > Rating (1-4, 1 = poor, 4 = very good)
- > "Friendliness"
- > Installation
- > Ease of use
- > Help systems
- > Compatibility
- > Company
- > Stability
- > Support
- > Documentation
- > Hardware required
- > Performance
- > Availability
- > Local Support
- >
- > General Description:
- >
- > Comparison of features and specifications
- >
- >
- > User Friendliness
- >
- > Installation
- >
- > The files (at least BOOTBASE.DAT) *must* be installed in a directory called
- > \CHASSEUR.II or else the program will not function.
-
- This is intended to avoid a memory loss to CHASSEUR II: BOOTBASE.DAT is the
- database file where are stored all the bootsectors archived by the users.
-
- > Ease of use
- >
- > There are only three options in the main menu: check disk, vaccinate and
- > check memory. These are represented by icons, with no words.
-
- The "check disk" option leads to a window containing the representation of
- the current bootsector, its name and quality ("loader","antivirus" or "virus")
- and another menu: read another disk, extract boot (make it executable as a
- stand-alone program, appearing in directory list), archive bootsector in
- database, maintain database, save database, kill bootsector, vaccinate disk.
- The difference between "kill bootsector" and "vaccinate disk" is: "to kill" is
- only to make it unexecutable at boot time (REVERSIBLE), and "to vaccinate" is
- to overwrite bootsector with the Vaccine (a boot-time memory check-up and
- cold-reset if the user wants to clean memory when in doubt): "vaccinate" is
- IRREVERSIBLE.
-
- The "maintain database" option leads to a secondary dialog box, which allows
- the user to edit all the bootsectors names and qualities he wants to, and to
- load the contents of a "virus killer" (commercial antiviral) library.
-
- > Help systems
- >
- > None provided.
-
- When a dangerous option is activated, an alert box inform the user of the
- danger and asks for confirmation of the option.
-
- > Compatibility
- >
- > Unknown [...]
-
- The vaccinate option, although stated to be irreversible, seems not to harm
- MS-DOS disks, since it adds a jump at the beginning, and adds a memory check
- -up routine at the end. It's normal: the ATARI ST disk format is compatible
- with MS-DOS disk format, except for "system" disks. (MS-DOS "system" disks,
- of course, will no longer be bootable; but it has no importance: since the
- ATARI ST are not IBM PC compatible, no PC user will run CHASSEUR II.)
-
- > Company Stability
- >
- > Unknown.
-
- The Vidovic brothers are not dead. Moreover: they are young and healthy!
-
- > Company Support
- >
- > None provided.
-
- A new version exists: CHASSEUR III.
-
- > Documentation
- >
- > A README.VIR file state that they believe the program is simple enough that
- > there is no need for documentation. This is generally true, but it is a pity
- > that there is no more detail on some of the claims made for the program.
- >
- > System Requirements
- >
- > None stated.
-
- Any kind of ATARI ST may run CHASSEUR II.
-
- > Performance
- >
- Perfect if used correctly (with a machine booted with a vaccinated disk).
-
- > This seems to be a tool for very technically literate users, aimed at boot
- > sector infectors only.
- >
- > Local Support
- >
- > None provided.
- >
- > Support Requirements
-
- > It is unlikely that even intermediate users would understand, say, the
- > memory listings generated. However, it should be effective against boot
- > sector infectors even in novice cases. (One should note that *all* of the
- > Atari boot sector overwriting programs may damage certain self-booting
- > disks.)
- >
- > copyright Robert M. Slade, 1993 ATCHSSR2.RVW 930430
- >
- > =============
- >
- > Vancouver ROBERTS@decus.ca | Life is
- > Institute for Robert_Slade@sfu.ca | unpredicable:
- > Research into rslade@cue.bc.ca | eat dessert
- > User p1@CyberStore.ca | first.
- > Security Canada V7K 2G6 |
- +++++
-
- ANNEXE: README.VIR
-
-
- Hello !
- Hello !
- Hello !
-
- *************************************************
- * The TRAMIEL FAN CLUB proudly presents you its *
- * "virus buster", designed to solve many little *
- * problems, generally caused by nasty people *
- *************************************************
-
- This ANTI-VIRUS is especially designed to help you to know what kind
- of boot you got on your disks. It may either be a loader, a virus, or an
- anti-virus bootsector.
-
- Furthermore, we also supply one of the biggest bootsector databases you
- can see down here. If you have used so far the famous "virus-killer", then...
-
- *DON'T PANIC !!!*
-
- this megatool allows you to recover your old bootbase, by melting it with the
- one which is supplied in this package...
-
- ...KEEP BUSTING with CHASSEUR II !!!
-
- -=o=-
-
- This is a SHAREWARE program; if you're happy to live from now, you
- can show your appreciation by sending us your devotions :
-
- US $ 15.00 (or equivalent, ou 50,00 Francs francais de France ! )
-
- ... to the following address :
-
- +-----------------------+
- | A. & Z. VIDOVIC |
- | Tour Panoramique |
- | DUCHERE |
- | 69009 LYON |
- | FRANCE |
- +-----------------------+
-
- ... If you want, we will then send you the commented source-code for this
- New-Generation Hunter (100% pure Motorola 68000 Assembler)...
-
- -=o=-
-
- ( You can also send us your bug reports, or suggestions,
- without feeling compelled to buy it, of course ! )
-
- Note: we didn't wrote any documentation for using this, since we think it is
- already well-enough easy to use it (GEM, MOUSE, FORM/DIALOG BOXES).
-
- Question: Do you think we will get enough money with this to buy a
- bock of beer to each of us, even if it is this disgusting
- VALSTAR beer (one said to me that CASINO beer is even worse, but
- I can't seriously believe it) ?
-
- ------------------------------
-
- Date: Wed May 19 19:35:38 EDT 1993
- From: ae446@freenet.carleton.ca (Nigel Allen )
- Subject: File 2--National Computer Virus Awareness Day, USA (fete nationale)
-
-
- PRESS RELEASE
- From: National Computer Security Association.
- To: Business Desk, Computer Writer
-
- National Computer Virus Awareness Day to Showcase Virus Threat,
- Urge Protection for U.S. "Information Highway"
-
- Contact: Larry Teien of 3M, St. Paul,
- 612-736-5961, or
- Robert Bales of the National Computer Security Association,
- Carlisle, Pa., 717-258-1816, or
- Ken Greenberg of Fleishman-Hillard Inc., Los Angeles,
- 213-629-4974
-
- WASHINGTON, May 19 -- Moving the computer virus control battleground
- from the private sector to the public sphere, 3M and the National Computer
- Security Association (NCSA) will jointly host the first National Computer
- Virus Awareness Day in Washington on June 9 -- encouraging federal protection
- of the Clinton administration's proposed "data superhighway."
-
- National Computer Virus Awareness Day will serve as the focal point of a
- multi-tiered Capitol Hill public education campaign. Activities will include
- a June 9 briefing to Congress about the virus threat and recommended remedial
- action, along with an informational Hill virus control exhibit on June 9-10.
- Rep. Edward Markey (D-Mass.) is also expected to convene hearings on
- information security during that week.
-
- "As the nation moves to build the proposed `data superhighway,'
- information security must be the first pillar," said Robert Bales, executive
- director, NCSA, a Carlisle, Pa., organization dedicated to increasing
- awareness about data security issues.
-
- "For the sake of national competitiveness, NCSA has long advocated that
- companies establish effective in-house computer virus policies that will
- educate employees and equip them with protective measures," he said. "Now,
- with 3M and others, we're working with lawmakers to establish an appropriate
- federal response to virus propagation."
-
- As a media manufacturer with a major investment in the integrity of its
- products, 3M views education as basic to virus prevention, according to
- Virginia Hockett, information technology manager, 3M Memory Technologies
- Group, St. Paul, Minn.
-
- "Responsible computing requires that users be aware of the simple means
- of protection at their disposal," Hockett said. "This also means that media
- manufacturers -- and, for that matter, all major players in the computer
- industry -- have a responsibility to adopt, enforce and advocate safe
- computing practices.
-
- "The value of any information highway could well be wrecked without both
- virus education and effective virus control legislation."
-
- Congress to Probe Issue
-
- During the week of June 7, Markey, chairman of the House Telecommuni-
- cations and Finance Subcommittee of the Energy and Commerce Committee, is
- expected to hold hearings on information security. Markey will be seeking
- public comment on possible anti-virus legislation, with an eye toward the
- "data superhighway" bill championed by Vice President Al Gore.
-
- National Computer Virus Awareness Day comes in part as a response
- to a recent NCSA/Dataquest study, which revealed that 63 percent of
- corporations surveyed had battled a computer virus. NCSA reports that dozens
- of new virus strains are discovered every month. The June 9 event has been
- endorsed by an array of companies and professional organizations.
-
- Concurrent with National Computer Virus Awareness Day is NCSA's
- InfoSecurity Expo, a conference for information security professionals, which
- will be held at a nearby Capitol Hill hotel. During the conference, attendees
- will be canvassed on the proper federal role in virus education and
- prevention. Findings will be presented to Congress and the Administration.
-
- Founded in 1989, NCSA is an independent organization to help users
- improve the security of their information systems, ensure the integrity of
- their information resources and reduce the threat of computer viruses.
-
- 3M is the world's leading supplier of flexible magnetic recording media.
-
-
- Editors: For more information about the NCSA/Dataquest study, please
- contact
- the NCSA at 717-258-1816.
- --
- Nigel Allen, Toronto, Ontario, Canada ae446@freenet.carleton.ca
-
- ------------------------------
-
- Date: Mon, 3 May 1993 18:33:16 +0200
- From: brunnstein@rz.informatik.uni-hamburg.dbp.de
- Subject: File 3--Security&Control of IT in Society_ 12-7 Aout 93 (conference)
- Repost from: RISKS Digest #14.60.6
-
-
- SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY
- An IFIP WG 9.6 Working Conference to explore the issues:
- August 12 - 17, 1993
-
- Venue: the conference ship M/S Ilich between Stockholm and St.Petersburg
-
- Dependence on information technology (IT) is widespread. IT is used for the
- option and control of a range of social, industrial, commercial, governmental
- and regulatory processes, yet it introduces new potential threats to personal
- privacy and freedom, and new opportunities for criminal activity. These
- dangers have to be countered and controlled in a manner that balances the
- benefits of IT. Therefore careful consideration has to be given to determine
- what constitutes the most effective control and regulation of IT. Such topics
- should be high on national agendas.
-
- IFIP's Working Group on Information Technology Misuse and the Law (WG 9.6) is
- holding a working conference to explore these issues, from 12 to 17 August,
- aboard the conference ship M/S Ilich between Stockholm and St.Petersburg. On
- the Saturday of the conference week the conference will convene in St.-
- Petersburg for meetings with Russian representatives, providing a valuable
- opportunity to discuss some of the problems of IT in an emerging capitalist
- economy.
-
- The conference, Security and Control of Information Technology, will explore
- major issues, including particular reference to Eastern European Economies.
- The organisers are keen to attract people representing a wide range of
- interests, including central government, regulatory bodies, information system
- users, relevant public interest groups, the legal profession, and academics.
- Participants from all parts of Europe and beyond will be welcome. In addition
- to full conference papers there will be discussion groups and shorter
- presentations.
-
- Eur. Ing. Richard Sizer (UK), chairman of WG 9.6, is conference chairman, Dr.
- Louise Yngstrom (Sweden) is in charge of local organisation and Prof. Martin
- Wasik is chairman of the International Programme Committee. The proceedings
- will be published by Elsevier North Holland and edited by Ing. Sizer, Prof. M.
- Wasik and Prof. R. Kaspersen (Netherlands).
-
- Those desiring to attend the conference and requiring further
- information may contact Prof. Wasik at:
-
- Faculty of Law, Manchester University, Manchester M13 9PL, U.K.,
- Tel. +44 61 275 3594, Fax +44 61 275 3579.
-
- or for local arrangements, contact Ann-Marie Bodor at:
-
- Dept of Computer ans Systems Sciences, Stockholm University/KTH,
- Electrum 230, Sweden, Tel +46 8 162000, Fax +46 8 7039025.
-
-
- CONFERENCE PROGRAMME
-
- Thursday Evening, August 12
- +---------------------------
-
- Opening presentation: "The law cannot help"
-
- A debate led by K.Brunnstein (Germany) and R.Kaspersen (Netherlands)
- Chairman: Eur. Ing. Richard Sizer (U.K.)
-
-
- Friday, August 13
- +-------------------------
- Morning:
- Paper 1: "Privacy and Computing: a Cultural Perspective"
- R.Lundheim, G.Sindre (Norway)
-
- Paper 2: "Is International Law on Security of Information Systems Emerging ?"
- B.Spruyt, B.de Schutter (Belgium)
-
- Paper 3: "On the cutting edge between Privacy and Security"
- J.Holvast, R.Ketelaar (Netherlands), S.Fischer-Huebner (Germany)
-
- Paper 4: "Protection of the Information of Organisations in the
- Asia-Pacific region", M.Jackson (Australia)
-
- Afternoon: Two Discussion Streams
- Stream 1: International cultural perspectives on IT, privacy and security
- (led by J.Holvast)
-
- Stream 2: Priorities for IT in emerging economies (led by R.Kaspersen)
-
-
- Saturday August 14
- +------------------
-
- * Part I: "IT and Security in Russia. Experts view"
-
- "IT and Security in Russia", E.V. Evtyushin (Russ. Agency for New Information)
-
- "IT vs. Security in Russia", E.A. Musaev (Russian Academy of Sciences)
-
- "Problems of information protection in the Northwestern region of Russia"
- P.A. Kuznetsov (Association for Information Protection)
-
- * Part II: "IT and Security in Russia - Commercial sector"
-
- TBD (Sberbank of Russia), TBD (St Petersburg Chamber of Commerce)
-
- * Part III: "It and Security in Russia - Public Sector"
-
- TBD (Public Sector)
-
- * Part IV: "Western Developments in IT-Security"
-
- R.Hackworth (U.K.): "The OECD Guidelines on IT Security"
- M.Abrams (USA): "From Orange Book to new US Criteria"
- P.White (U.K.): "Drafting Security Policies"
- TBD "INFOSEC Security Issues in the EC"
-
-
- Sunday August 15: Tour of St.Petersburg
- +---------------------------------------
-
-
- Monday, August 16
- +-----------------
-
- Morning:
- Paper 5: "Recent development in IT security evaluation"
- K.Rannenberg (Germany)
-
- Paper 6: "On the formal specification of security requirements"
- A.Jones, M.Sergot (Norway)
-
- Paper 7: "Symbiosis of IT security standards"
- M.Abrams (USA)
-
- Paper 8: "An Academic Programme for IT Security"
- L.Yngstrom (Sweden)
-
- Afternoon: Two workshops based on:
- * Workshop 1:
-
- Paper 9: "Are US Computer Crime Laws Adequate ?"
- L.Young (USA)
-
- Paper 10:"Computer Crime in Slovakia ?"
- J.Dragonev, J.Vyskoc (Slovakia)
-
- Paper 11:"Computer Crime Coroners for an IT Society"
- S.Kowalski (Sweden)
-
- * Workshop 2:
-
- Paper 12:"Computer supported security intelligence"
- I.Orci (Sweden)
-
- Paper 13:"Design for security functions of chipcard software"
- K.Dippel (Germany)
-
- Paper 14: "Court ordered wiretapping in USA"
- G.Turner (USA)
-
-
- CLOSING DISCUSSION AND CONCLUSIONS, Chairman: R.Sizer (U.K)
-
- (TBD: Speakers to be decided. Details of conference sessions are
- subject to change)
-
- The costs of attending the conference are now set as follows:
-
- One delegate: 4175 Swedish Krona
- Two delegates sharing one cabin: 3275 Swedish Krona (per person)
- Accompanying person: 3175 Swedish Krona (no conference proceedings)
-
- These prices include accommodation, all meals on board of the M/S Ilich and
- while in St.Petersburg, an excursion on Sunday and, for delegates, a copy of
- all conference papers. Cabins on the ship each have a window and a shower.
-
- Cheques or money orders (in Swedish Krona) should be made payable to the
- account: "Foriningen for Sakerhetsinformatik: IFIP WG 9.6" and sent as soon as
- possible and, in any event, not later than June 11, to:
-
- Ann-Marie Bodor, Dept. of Computer and Systems Sciences
- Stockholm University/KTH, Electrum 230, S-164 40 Kista, Sweden
-
- All registrations are responsible for making their own arrangements for travel
- to and from Stockholm, and for their visas and insurance. Registrations most
- probably cannot be accepted after June 11 due to the booking deadline for the
- cabins on board.
-
- ------------------------------
-
- Date: Sat, 15 May 93 05:02 EDT
- From: NDURAND@cipcinsa.insa-lyon.fr (Nicolas Durand )
- Subject: File 4--S.A.M., le prochain bebe de France TELECOM (produit)
-
-
- METTEZ VOTRE MINITEL ET VOTRE CORRESPONDANCE
- DANS VOTRE MICRO !
-
- S.A.M. est le premier logiciel pour micro-ordinateur qui vous permet
- d'utiliser directement tous les services de communication de FRANCE TELECOM
- (services du Minitel, telecopie, telex, telephone, messageries profession-
- nelles, transfert de fichiers...).
-
- Il est destine a tous les professionnels disposant d'un micro-ordinateur
- PC ou Macintosh equipe d'une carte ou d'un boitier modem.
-
- Par exemple : vous venez de preparer un document sur votre traitement
- de texte: avec S.A.M., rien de plus simple que de l'envoyer par telecopie, par
- telex ou par messagerie electronique a tous vos destinataires. Vous pouvez
- meme le diffuser sous forme de lettre a l'adresse postale d'un ou plusieurs
- destinataires (diffusion jusqu'a 250 destinataires par envoi) !
-
- Vous consultez tous les jours les cours de la Bourse par Minitel : avec
- S.A.M., rien de plus simple que d'enregistrer cette consultation sur votre
- micro. Votre micro pourra des lors se connecter automatiquement au serveur
- Bourse, recuperer les informations qui vous interessent et pourra meme les
- traiter si vous le souhaitez !
-
- Dans votre travail, vous devez quotidiennement vous connecter a des
- serveurs de donnees, transferer des fichiers sur ou depuis votre micro : avec
- S.A.M., vous disposez de tous les outils necessaires pour ces transferts.
-
- S.A.M. integre pour vous toutes ces formes de communication dans un
- logiciel unique !
-
- De plus, a chaque communication, votre carnet d'adresses S.A.M. peut
- enregistrer les coordonnees de correspondants et les tenir a votre disposition
- pour utilisation ulterieur.
-
- Tous ces services sont accessibles a partir d'une simple ligne
- telephonique. Vous n'avez pas a souscrire d'abonnement
-
- **************************************************
- *** DURAND Nicolas. Your Best Night Mire. ***
- *** NDURAND@cicpinsa.insa-lyon.fr ***
- **************************************************
-
- ------------------------------
-
- End of Chaos Digest #1.34
- ************************************
-