home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 39.9 KB | 837 lines | [TEXT/EDIT] |
- ########## ########## ########## | THE NET: WHAT'S IT GOOD FOR?|
- ########## ########## ########## | Three Personal Perspectives|
- #### #### #### | |
- ######## ######## ######## | THE SUNDEVIL DOCUMENTS|
- ######## ######## ######## | CPSR'S FOIA Release|
- #### #### #### | |
- ########## #### #### | ARE YOU AN INTERNET NERD?|
- ########## #### #### | Test Reveals Terrible Truth!|
- |
- EFF OPENS WASHINGTON OFFICE |
- |
- =====================================================================|
- EFFector Online January 18, 1992 Volume 2, Number 4 |
- =====================================================================|
-
- PIONEER AWARD NOMINATIONS DEADLINE
-
- Please note that the deadline for nominating a person or organization
- for the First Annual EFF/Pioneer Awards will be February 15.
-
- The Pioneer Awards will be made on Thursday, March 19,1992 at the
- L'Enfant Plaza Hotel in Washington, DC, during the Second Computers,
- Freedom and Privacy Conference.
-
- Pioneer Awards are for distinguished contributions, innovations, or
- service in the cause of advancing computer-based communications.
-
- Anyone may be nominated for an award, except for EFF Staff members.
- A nomination form can be found at the end of this issue of EFFector
- Online. We have already received many nominations, but we need to hear
- from you.
-
- The EFF is looking for the real pioneers. Help us find them.
-
- -==--==--==-<>-==--==--==-
-
- In this issue:
- "WHY WOULD ANYONE WANT TO USE A COMPUTER IN A LIBRARY?"
- LIBERATION TECHNOLOGY
- THE NET:WHAT'S IT WORTH?
- SUN DEVIL DOCUMENTS RELEASED
- WARNING - MICHELANGELO VIRUS (PC)
- BERMAN TO HEAD NEW EFF WASHINGTON OFFICE
- UPDATE ON EFF ACTIVITIES
- ARE YOU AN INTERNET NERD?
-
- -==--==--==-<>-==--==--==-
-
- NET WORK:
- Three Personal Perspectives on the Uses of the Net
-
- [As the creation of the Net goes forward, and many issues of a
- technical, legal or political nature surface, its easy to forget that
- the Net is made to be used by people in ways that are neither technical
- nor political. In various groups over the past few weeks, the question
- of what the Net is "good for" has arisen in several guises. In this
- edition of EFFector Online, we present three "answers". The first is
- from a librarian, the second from a college professor, and the third
- from an EFF staff member. Every so often, it helps to step back from
- the wiring, planning, programming, and social engineering and reflect
- on the ways in which humanity actually uses the tools it creates.]
-
- -==--==--==-<>-==--==--==-
-
- "WHY WOULD ANYONE WANT TO USE A COMPUTER IN A LIBRARY?"
- by Jean Polly
- (polly@LPL.ORG)
-
- How does the INTERNET relate to the little guy?
-
- [The previous posters] remarks remind me very much of the response
- I got from computer dealers in 1980 when I was seeking advice about
- acquiring a computer for public use at my public library.
-
- "Why would ANYONE want to use a computer in a public library-- what on
- earth would they use it for???" was the universal attitude, usually
- accompanied by a guffaw or two.
-
- Undaunted, I pressed ahead and by October of 1981 we had a 48K Apple II+
- out where the Masses could touch it. (Now my kid has 48K on his watch...)
-
- Ten years later, over 1,500 hours per month are reserved on the seven
- public computers in our lab. 75% of the use is by adults, although we
- have a percentage of families engaged in home-schooling their children
- who also use the lab to advantage.
-
- Our clients use the computers and laser printers for everything from
- resumes to learning desktop publishing. They create church newsletters,
- learn to use databases, practice languages, print mailing labels.
-
- Last year we got an Apple Library of Tomorrow grant, which brought
- interactive videodisc technology to our small village library. We have
- just become one of 37 libraries nationally to beta-test the Library of
- Congress' American Memory Project. This CD-ROM and videodisc archive
- contains some 25,000 turn of the Century postcard views of American
- landmarks, rare film footage from the 1901 Pan-American Exposition,
- audio archives of great American speeches and their text, with photos of
- the speakers, plus much more. Subsequent volumes will include Civil War
- photos by Matthew Brady, folk songs from the California gold rush days,
- oral histories from around the U.S. Everything in the collection is
- searchable, much is printable.
-
- And yes, we hope to offer INTERNET connectivity in our lab sometime in
- the first half of 1992.
-
- FCC and other government regulations strive to protect public interest
- in, and access to, cable TV, radio, amateur radio and other
- communications highways; likewise should we advocate public uses of
- computer technology, and telecommunications.
-
- Haven't you noticed that your colleagues and friends are quickly being
- divided into "who's on email" and "who isn't". Don't you find yourself
- talking to "connected" colleagues a lot more frequently than your offline
- friends? This is Not a Good Thing. Institutionally. Nationally. Globally.
-
- I have a dream and it's happening right now. Kids talking about their
- lives, from Moscow to Mexico City, Cupertino to Halifax. People finding
- out about their similarities rather than focusing on what divides them.
- All possible on the net.
-
- Gee, you don't need the NREN for just Email, I can hear you say. Right.
- Not for text. What about when it includes video, color photos,
- multimedia?
-
- Gigabits you say. I don't know how much bandwidth I need to my house. In
- 1980, 48K did all I wanted, now my desktop takes 8 megs of RAM. I used to
- do this at 300 baud, now 9600 seems slow.
-
- You know Warhol's "everyone's famous for 15 minutes?" Once you are into
- computers you are only satisfied with what you've got for 15 minutes!
- ("Faster, higher, stronger", the Olympic motto, could be appropriated by
- how many of us, gazing into our CRTs...)
-
- So, to cut to the chase, yes. The little guy not only needs to be
- informed about What's Going on Out There, but he needs some way to Be Out
- There. I guess you can either be a signpost, or a roadblock, or line
- noise.
-
- Jean Armour Polly "Don't postpone joy!"
- Assistant Director,Public Services Liverpool Public Library
- INTERNET: polly@LPL.ORG
- -==--==--==-<>-==--==--==-
-
- LIBERATION TECHNOLOGY
- Equal Access Via Computer Communication
-
- by Norman Coombs
- (NRCGSH@RITVAX.ISC.RIT.EDU)
-
- I am a blind professor at the Rochester Institute of Technology.As such I
- use a computer with a speech synthesizer,and regularly teach a class of
- students online with a computer conference. Most of these students have
- no physical handicap. Some, however, are hearing impaired, and others
- totally deaf. I have team-taught another course at the New School for
- Social Research, some 350 miles away, with a teacher who is blind and
- confined to a wheelchair. On the computer screen, our handicaps of
- blindness and mobility make no difference.
-
- One of the courses I teach online is African American history. In that
- class, some students are White, some Black, others Asian, and still
- others Native American. Obviously, some of the class members are male and
- others female. All of these differences, like those of the handicaps
- described above, become unimportant on the computer screen. It isn't that
- these characteristics disappear; participants share their identities,
- views and feelings freely. However, these differences no longer block
- communication and community. In fact, conference members often feel free
- to make such differences one of the topics for discussion. A student in
- my Black history course said that what he liked about conducting a class
- discussion on the computer was that it didn't matter whether a person was
- male, female, Black, White, Red, Yellow, blind or deaf. His comments were
- accepted for their own worth and not judged by some prior stereotype.
-
- One myth about the computer is that it is cold, depersonalizing and
- intimidating. When I began using the computer to communicate with
- students, I had no idea of its potential to change my life and my
- teaching. First, it liberated me, a blind teacher, from my dependence on
- other people. I now have all my assignments submitted through electronic
- mail including take-home exams,and have little need for human readers.
- Because of this I have become a member of a pilot study using computer
- conferencing to replace classroom discussion for students in continuing
- education. Students with a personal computer and modem could work from
- home or the office. This freed them from the time and bother of commuting
- and also let them set their own schedule.The conference facilitates
- genuine group discussion without the class having to be in the same place
- at the same time. In addition, I find it easy to send frequent personal
- notes to individual students, giving me more contact with individual
- students than is usual in a traditional classroom.
-
- I find conferencing appeals to three groups. First, the off-campus
- continuing education students who no longer have to commute. Second,
- those who had been taking television or correspondence courses. The
- online experience gives them a means of exchanging information between
- themselves and their teacher. The third group turns out to be regular day
- students with scheduling problems. Online is especially valuable for
- students whose schedules are filled by laboratory courses.
-
- Although computer conferencing had obvious benefits for me, I had failed
- to grasp its significance for disabled students in general. Only when a
- deaf student joined the class did I realize its potential. This deaf
- woman said that this was the first time in her life that she had
- conversed with one of her teachers without using an intermediary. She
- also remarked that mine had been her most valuable college course because
- she could share in the discussions easily and totally.
-
- Computer conferencing can also benefit people with mobility impairments.
- They can go to school while they stay at home. The distance involved
- could be anything from a few miles to all the way across the continent or
- across an ocean. Students with motor impairments can also use this
- system. There are a variety of alternate input devices to let motor
- impaired persons use a computer even though they cannot handle a
- keyboard.
-
- But conferencing liberates more people than the physically disabled. All
- students became less inhibited in the discussions. Once students got over
- any initial computer phobia, many found it easier to participate. Where
- there is no stage then there is no stage fright.
-
- While some educators prefer to keep the teaching process academic and
- objective, others are convinced that students learn more profoundly when
- they become emotionally engaged in the process. My class underlined this
- aspect of conferencing. In a discussion on welfare, one woman in her
- twenties confessed to being on welfare and described her feelings about
- it. In a Black history course, students described personal experiences as
- victims of racism. White students admitted to having been taught to be
- prejudiced and asked for help and understanding. Black students revealed
- that they had prejudices about various shades of color within their own
- community. As a teacher, I often felt that I was treading on privileged
- ground. These were experiences I had never had in the 29 previous years
- of my teaching career.
-
- Computer communications is infamous for people making thoughtless and
- irresponsible attacks on one another, something known as "flaming". In my
- experience, happily, there has been almost none of this. First, the
- teacher has the opportunity to set ground rules and establish a
- professional atmosphere. Second, a computer conference is different than
- electronic mail. Once a mass mailing has been sent, it is irretrievable,
- while the contents of a computer conference are posted publicly for all
- to see. Most students seemed intuitively aware of the potential for
- misunderstanding and, before criticizing someone, they frequently asked
- questions to be sure that they understood what had be meant by the
- previous author. On very rare occasions I have removed a posting before
- it was read by most of the class. Usually, I prefer to leave
- controversial material on the conference and utilize it as a group
- learning experience.
-
- Computer communication has other important implications for both the
- print handicapped and those with motor impairments. Library catalogs can
- already be accessed from a personal computer and a modem. Soon, growing
- numbers of reference works will be available on-line . While the
- copyright problems are complex, it seems inevitable that large amounts of
- text material from periodicals and books will also be accessible on a
- computer network. I still have vivid memories of the first time I
- connected my computer to a library catalog and found my book was really
- there. It was only a year ago that I had my first personal, unassisted,
- access to an encyclopedia. Not only is this technology liberating to
- those of us who have physical impairments, but in turn, it will help to
- make us more productive members of society.
-
- Not all handicapped persons rush to join the computer world. Indeed, many
- have become dependent on human support systems. Sometimes, independence
- is frightening, and handicapped students may need special assistance to
- get started. Another problem is cost. While the personal computer has
- decentralized power and is seen as a democratizing force in society, it
- works mainly for the middle class. Unless there is a deliberate policy to
- the contrary, such technology will leave the underclass further behind.
-
- Visually impaired computer users, at present, have one growing worry.
- They fear that graphic interfaces and touch screens may take away all
- that the computer has promised to them. Recently passed federal
- legislation has tried to guarantee that future computer hardware and
- software be accessible to all the physically disabled,but there is no
- real mechanism to enforce this. Besides, voluntary awareness and
- cooperation by computer providers is a far better approach to the
- problem. Educom has established EASI to work within the academic
- community for software access, and it is having an important impact on
- voluntary compliance. Others believe that adaptive software and hardware
- can be produced which can adequately interpret graphic interfaces for the
- visually impaired.
-
- Physical disabilities serve as an isolating factor in life. They also
- create a tremendous sense of powerlessness. Computer communication,
- however, serves to bring the world into one's home and puts amazing power
- at one's fingertips. Not only can this empowerment liberate the
- handicapped to compete in society more equally, but the sense of power
- changes how one feels about oneself.
-
- Finally, I am personally excited about the ability of computer networking
- to provide more equal access to education and information for many
- persons with physical disabilities. In the fall of 1991, The Rochester
- Institute of Technology and Gallaudet University in Washington will
- conduct an experiment involving two courses: one taught from Rochester
- and the other from Washington, DC. Students from both campuses will be
- enrolled in both classes. While some use will be made of videos and
- movies, class discussions and meetings between a student and a teacher
- will all be done with computer telecommunications using Internet as the
- connecting link. Some students will be hearing impaired, and one teacher
- will be blind.
-
- Norman Coombs
- Professor of History
- Rochester Institute of Technology
- One Lomb Memorial Dr.
- Rochester NY 14623
- Email: NRCGSH@RITVAX.ISC.RIT.EDU
-
- -==--==--==-<>-==--==--==-
-
- THE NET:WHAT'S IT WORTH?
- by Mike Godwin
- (mnemonic@eff.org)
-
- In a recent posting, dhirmes@hamp.hampshire.edu writes:
- >There is a lot of interesting talk about national data networks, ISDN,
- >federally funded networks, etc., but I was wondering how people felt
- >about its over-all importance in society. What are the practical
- >purposes of a national network (a terminal in every home) when people
- >are having a tough enough time keeping up with their mortgage payments?
- >With millions out of work, millions in fact, illiterate-- aren't there
- >economic and educational problems that have to be combatted before a
- >national data network can be seriously considered?
-
- There are a lot of answers to this question, and I can allude to only a
- few of them here.
-
- One answer has to do with the implied premise that there are either moral
- or practical reasons to address our most pressing social problems first,
- before we deal with public-policy issues that seem less pressing. Is this
- premise correct? I don't think so, for a couple of reasons. First of all,
- it does not follow that establishing national public networks entails
- *not* responding to the nation's economic problems. Surely we can do
- both.
-
- Secondly, there is a lot more consensus (even with all the debate one
- sees in this and other groups) about how to promote the building of a
- network infrastructure in this country than there is about such issues as
- poverty, the homeless, and illiteracy. (The disagreements about network
- infrastructure tend to be over minor matters, relatively speaking.)
-
- Third, getting people online may actually *help* solve the other
- problems, by allowing more public-policy discussion and more
- contributions of ideas. It should be noted that networked online
- communications are unusual among communications media in that they follow
- a "many-to-many" model (everyone on the "Net" can talk to everyone else,
- with minimal capital investment), as distinct from the "one-to-many"
- model (e.g., newspapers, broadcasting, cable) or the "one-to-one" model
- (telephones). What's more, discussions in this medium can be more
- discursive and more analytical, since one is not given tight time
- constraints to compose or reply to arguments, and since one cannot be
- interrupted. One of the reasons the First Amendment exists is to promote
- public participation in public-policy issues (such as how to handle
- poverty, or the homeless). Thus it makes sense to promote an
- infrastructure that allows for the greatest exercise of First Amendment
- prerogatives this country has ever seen.
-
- Fourth, if we don't consider the policy issues now, it's not the case
- that these issues will wait until we get around to them. They're being
- discussed and settled now, and we can't stop the process by not
- participating. The question is whether we want all the decisions to be
- made with public input or not.
-
- There are other arguments for addressing network policy now, even though
- we have other problems facing us, and I'm sure other folks will make
- them. But I have not the least moral qualm in giving attention to network
- and online-communication policy issues now, since I believe
- wholeheartedly that communication is part of the solution to all our
- other problems.
-
- -==--==--==-<>-==--==--==-
-
- SUN DEVIL DOCUMENTS RELEASED
-
- The Secret Service's response to CPSR's Freedom of Information Act (FOIA)
- request has raised new questions about the scope and conduct of the Sun
- Devil investigation. The documents disclosed to CPSR reveal that the
- Secret Service monitored communications sent across the Internet. The
- materials released through the FOIA include copies of many electronic
- newsletters, digests, and Usenet groups including "comp.org.eff.talk,"
- "comp.sys.att," "Computer Underground Digest" (alt.cud.cu-digest),
- "Effector Online," "Legion of Doom Technical Journals," "Phrack
- Newsletter," and "Telecom Digest (comp.dcom.telecom)". Currently, there
- is no clear policy for the monitoring of network communications by law
- enforcement agents. A 1982 memorandum prepared for the FBI by the
- Department of Justice indicated that the FBI would consider monitoring on
- a case by case basis. That document was released as a result of a
- separate CPSR lawsuit against the FBI.
-
- Additionally, CPSR has found papers that show Bell Labs in New Jersey
- passed copies of Telecom Digest to the Secret Service.
-
- The material (approximately 2500 pages) also suggests that the Secret
- Service's seizure of computer bulletin boards and other systems during
- Operation Sun Devil may have violated the Electronic Communications
- Privacy Act of 1986 and the Privacy Protection Act of 1980.
-
- Two sets of logs from a computer bulletin board in Virginia show that the
- Secret Service obtained messages in the Spring of 1989 by use of the
- system administrator's account. It is unclear how the Secret Service
- obtained system administrator access. It is possible that the Secret
- Service accessed this system without authorization. The more likely
- explanation is that the agency obtained the cooperation of the system
- administrator. Another possibility is that this may have been a bulletin
- board set up by the Secret Service for a sting operation. Such a bulletin
- board was established for an undercover investigation involving
- pedophiles.
-
- The documents we received also include references to the video taping of
- SummerCon, a computer hackers conference that took place in St. Louis in
- 1988. The Secret Service employed an informant to attend the conference
- and placed hidden cameras to tape the participants. The documents also
- show that the Secret Service established a computer database to keep
- track of suspected computer hackers. This database contains records of
- names, aliases, addresses, phone numbers, known associates, a list of
- activities, and various articles associated with each individual.
-
- CPSR is continuing its efforts to obtain government documentation
- concerning computer crime investigations conducted by the Secret Service.
- These efforts include the litigation of several FOIA lawsuits and
- attempts to locate individuals targeted by federal agencies in the course
- of such investigations.
-
- Contact sobel@washofc.cpsr.org (David Sobel)
-
- -==--==--==-<>-==--==--==-
-
- BERMAN TO HEAD NEW EFF WASHINGTON OFFICE
-
- The Electronic Frontier Foundation today announced the opening of
- a permanent office in Washington D.C. and named Jerry Berman,
- former head of the ACLU Information Technology Project, to direct
- its operations.
-
- In announcing the move, EFF President Mitchell Kapor said, "The
- creation of the Washington office and the appointment of Jerry
- Berman demonstrates our commitment to build a national
- organization. It will give the EFF the ability to effectively
- advocate policies that will reflect the public's interest in the
- creation of new computer and communications technologies."
-
- Jerry Berman, incoming Director of the EFF Washington Office,
- stated that, "Our goal is to be the public's voice in Washington
- on these issues, and to help create policies that will maximize
- both civil liberties and competitiveness in the new social
- environments created by digital media."
-
- "The EFF," Berman continued, "is hard at work developing
- initiatives that will ensure that all present and future
- 'electronic highways', from the telephone network to the National
- Research and Education Network, enhance First and Fourth Amendment
- rights, encourage new entrepreneurial activity, and are open and
- accessible to all segments of society."
-
- Jerry Berman was until December 1991 director of the ACLU
- Information Technology Project. Previously he was the ACLU's Chief
- Legislative Counsel in Washington, D.C.
-
- During his career, Mr. Berman has played a major role in the
- drafting and enactment of the Foreign Intelligence Surveillance
- Act of 1978 (warrants for national security wiretapping); the
- Electronic Communications Privacy Act of 1986 (warrant
- requirements for new voice, data, video electronic
- communications); and the Video Privacy Protection Act of 1988.
- Over the last two years, he has spearheaded efforts to establish
- public access rights to electronic public information.
-
- For more information contact:
- Jerry Berman, Director Gerard Van der Leun
- Electronic Frontier Foundation EFF
- 666 Pennsylvania Avenue,Suite 303 155 Second Street
- Washington, DC 20003 Cambridge, MA 02141
- Telephone: (202) 544-9237 Phone:(617) 864-0665
- FAX: (202) 547-5481 FAX: (617) 864-0866
- Email: jberman@eff.org Email: van@eff.org
-
- UPDATE ON EFF ACTIVITIES
-
- The EFF, through its headquarters in Cambridge and its newly
- opened office in Washington, is currently advocating that:
- *Congress establish an "open telecommunications platform"
- featuring "Personal ISDN" ;
- *the open platform be created with legislative safeguards
- that ensure a level playing field for all those competing
- in the information services market;
- *the NREN serve as a "testbed" for new voice, data, and video
- services that will eventually be offered over our National
- Public Network;
- *electronic bulletin boards be afforded the same First
- Amendment protections enjoyed by other media;
- *citizens who use computers for communications purposes be
- afforded the full protection of the Fourth Amendment;
- *an Electronic Freedom of Information Act be passed that will
- grant citizens access to the electronic version of public
- information consistent with the public's right to know; and
- that
- *technical means be mandated to insure the privacy of
- personal communications carried over cellular and other
- radio-based communications systems.
-
- The Electronic Frontier Foundation is also a co-sponsor (along
- with the Consumer Federation of American and the ACLU) and the
- principal coordinator of the Communications Policy Forum, which
- is designed to explore the means for achieving the communications
- goals of consumer organizations. Over 28 consumer groups, from the
- OMB Watch to the NAACP participate in forum activities. The
- Communications Policy Forum is funded by foundations as well as a
- diverse group of computer and communications firms.
-
- -==--==--==-<>-==--==--==-
-
- WARNING - MICHELANGELO VIRUS (PC)
- Original-Sender: Virus Alert List <VALERT-L@bitnet.LEHIIBM1>
- From: "A. Padgett Peterson" <padgett%dnet.tccslr@com.mmc>
-
-
- >From all reports this destructive virus is spreading world- wide very
- rapidly. Unlike the DataCrime "fizzle" in 1989 which contained similar
- destructive capability but never spread, the Michelangelo appears to have
- become "common" in just ten months following detection. I have
- encountered three cases locally in just the last few weeks.
-
- Three factors make this virus particularly dangerous:
-
- 1) The virus uses similar techniques as the "STONED" virus which
- while first identifies in early 1988 remains the most common virus
- currently reported. Since the virus infects only the Master Boot Record
- on hard disks and the boot record of floppy disks, viral detection
- techniques that rely on alteration of DOS executable files will not
- detect the virus. Similarly, techniques that monitor the status of the
- MBR may only provide users with a single warning that, if execution is
- permitted to continue, may not be repeated.
-
- 2) Michelangelo was first discovered in Europe in mid-1991
- consequently many virus scanners in use today will not pick up the virus
- unless more recent updates have been obtained.
-
- 3) Unlike the Stoned and Jerusalem (the most common viruses in
- the past) which are more annoying than dangerous, the Michelangelo virus
- will, on its trigger date of March 6th, attempt to overwrite vital areas
- of the hard disk rendering it unreadable by DOS. Further, since the FATs
- (file allocation tables) may be damaged , unless backups are available
- recovery will be very difficult and require someone who is able to
- rebuild a corrupt FAT (also a very time-consuming process).
-
- Fortunately, the Michelangelo virus is also very easy to detect: when
- resident in a PC, the CHKDSK (included with MS-DOS (Microsoft), PC-DOS
- (IBM), and DR-DOS (Digital Research) {all names are registered by their
- owners}) program will return a "total bytes memory" value 2048 bytes
- lower than normal. This means that a 640k PC which normally returns
- 655,360 "total bytes memory" will report 653,312. While a low value will
- not necessarily mean that Michelangelo or any other virus is present, the
- PC should be examined by someone familiar with viral activity to
- determine the reason.
-
- If the Michelangelo virus is found, the PC should be turned off until
- disinfected properly. All floppy disks and other machines in the area
- should then also be examined since the Michelangelo virus is spread in
- the boot record (executable area found on all floppy disks including
- data-only disks).
-
- Padgett Peterson
- Internet: padgett%tccslr.dnet@mmc.com
-
- -==--==--==-<>-==--==--==-
-
- ARE YOU AN INTERNET NERD?
-
- This quiz is dedicated to all of those people who find themselves
- constantly roaming the net. Do you leave yourself logged in
- twenty-four hours a day, even when you're not home? Is your
- wpm typing speed higher than your IQ? Are you having trouble seeing
- things at distances greater than 2 feet? Yes, YOU. You know who
- you are.
-
- Ok... shall we begin? Yes? 5 points... (you could've backed out.)
-
- Unless otherwise stated, point values are as follows: 2 for (a), 4 for
- (b), 6 for (c), and 10 for (d).
- --------------------------------------------------------------------
-
- 1) How many valid net addresses do you have?
- Multiple machines at the same site do not count.
-
- ____Internet ____UUCP ____Other public access ____Other
-
- ____Bitnet ____Freenet ____Internet BBS ____All seven
-
- (2 points each)
-
- 2) How many hours did it take for you to create your .sig?
- a) Huh?
- b) More than one
- c) More than five
- d) I'm still looking for a really funky quote
-
- 3) On an average working day, how many email messages do you receive?
- a) Nobody sends me any mail... snif
- b) Three, but they're all from Lester in the next cubicle
- over, because he has nothing better to do
- c) I can't count that high, I failed calculus
- d) Don't ask me now, I'm too busy. Send me e-mail.
-
- 4) Alright, fess up. Have you ever read alt.sex.bondage just to
- see what the heck those perverts were talking about?
- a) Yes, and I'm so ashamed
- b) Yes, and I'm so embarrassed
- c) Yes, and would you please explain a few things to me...
- d) No, never. (10 points. You're lying.)
-
- 5) Have you ever met one of your past SO's (significant others)
- via a computer network?
- a) No
- b) Yes, through a newsgroup we both posted on
- c) Yes, by chatting randomly over the Internet (shame!)
- d) Yes, by chatting over RELAY
-
- 6) Once you've logged onto your system, what do you spend most
- of your time doing?
- a) Going through the library system and putting books on reserve
- b) Reading _Alice in Wonderland_ in the online bookshelf
- c) Reading the monthly postings on rec.humor.funny
- d) Writing up stupid quizzes because you've done everything else
-
- 7) If someone were to telephone your home at any given moment of the
- day, what would be the percent chance that your phone would
- be busy?
-
- a) Zero... I've got call waiting
- b) 25%.... I only dial in from work (Uh, hi, boss)
- c) 75%.... Duh, so that's why nobody ever calls me
- d) Zero... My modem has a separate phone line
-
- 8) Which Usenet newsgroups do you spend the most time reading?
- a) The comp. groups... because they're so informative
- b) The soc. groups.... because they're so multicultural
- c) The rec. groups.... because they're so diverting
- d) The alt. groups.... because I don't know what half those
- words mean
-
- 9) What's your worst complaint about having an Internet account?
- a) I have to pay $5/month for it
- b) The damn sysadmins won't give me enough quota to hold
- all my .GIF's
- c) All those programmers keep tying up the modem lines
- d) I have to stay in school to keep it
-
- 10) Check your watch now. What time is it?
- a) 10 am... coffee break
- b) 3 pm.... General Hospital's on
- c) 12 am... one last login before I hit the sack
- d) 4 am.... Oh my God, I've got a test tomorrow
-
- ALRIGHT, FOLKS. SCORING TIME!
-
- 0-25 points: You're not a nerd. Go read a manual or two and come back
- next year.
- 25-50 points: You're an up-and-coming Internet nerd. Why don't you
- telnet over to 128.6.4.8 and play around with the Quartz
- BBS for a while.
- 50-75 points: You're a full-fledged Internet nerd. Join the club.
- 75-100 points: You're an Internet addict. Try going to the library
- this week, it'll do you some good.
- 100+ points: You're an Internet obsessive-compulsive. Unplug your
- computer, go out in the woods for a few days, and relax.
- Lay back and listen to the birds singing. Clear your mind.
- And don't forget to unsubscribe yourself from all those
- lists before you leave.
-
-
- --written by slewis@magnus.acs.ohio-state.edu (Sarah Lewis) in a moment
- of extreme boredom. Disclaimer: OSU doesn't know I wrote this, and
- it's probably better that way. Sigh. Time to hit the books....
-
- -==--==--==-<>-==--==--==-
-
- THE ELECTRONIC FRONTIER FOUNDATION'S FIRST ANNUAL PIONEER AWARDS
- CALL FOR NOMINATIONS
- (Attention: Please feel free to repost to all systems worldwide.)
-
- In every field of human endeavor,there are those dedicated to expanding
- knowledge,freedom,efficiency and utility. Along the electronic frontier,
- this is especially true. To recognize this,the Electronic Frontier
- Foundation has established the Pioneer Awards. The first annual Pioneer
- Awards will be given at the Second Annual Computers, Freedom, and Privacy
- Conference in Washington, D.C. in March of 1992.
-
- All valid nominations will be reviewed by a panel of outside judges
- chosen for their knowledge of computer-based communications and the technical,
- legal, and social issues involved in networking.
-
- There are no specific categories for the Pioneer Awards, but the
- following guidelines apply:
- 1) The nominees must have made a substantial contribution to the
- health,growth, accessibility, or freedom of computer-based
- communications.
- 2) The contribution may be technical, social, economic or cultural.
- 3) Nominations may be of individuals, systems, or organizations in the
- private or public sectors.
- 4) Nominations are open to all, and you may nominate more than one
- recipient. You may nominate yourself or your organization.
- 5) All nominations, to be valid, must contain your reasons, however
- brief, on why you are nominating the individual or organization, along
- with a means of contacting the nominee, and your own contact number. No
- anonymous nominations will be allowed.
- 5) Every person or organization, with the single exception of EFF
- staff members, are eligible for Pioneer Awards.
-
- You may nominate as many as you wish, but please use one form per
- nomination. You may return the forms to us via email at:
- pioneer@eff.org.
- You may mail them to us at:
- Pioneer Awards, EFF,
- 155 Second Street
- Cambridge MA 02141.
- You may FAX them to us at:
- (617) 864-0866.
-
- Just tell us the name of the nominee, the phone number or email address
- at which the nominee can be reached, and, most important, why you feel
- the nominee deserves the award. You can attach supporting documentation.
- Please include your own name, address, and phone number.
-
- We're looking for the Pioneers of the Electronic Frontier that have made
- and are making a difference. Thanks for helping us find them,
-
- The Electronic Frontier Foundation
-
- -------EFF Pioneer Awards Nomination Form------
-
- Please return to the Electronic Frontier Foundation via email to:
- pioneer@eff.org
- or via surface mail to EFF 155 Second Street, Cambridge,MA 02141 USA;
- or via FAX to USA (617)864-0866.
-
-
- Nominee:
-
- Title:
-
- Company/Organization:
-
- Contact number or email address:
-
- Reason for nomination:
-
-
- Your name and contact number:
-
- Extra documentation attached:
-
- -------EFF Pioneer Awards Nomination Form------
-
- -==--==--==-<>-==--==--==-
-
- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION
-
- In order to continue the work already begun and to expand our efforts
- and activities into other realms of the electronic frontier, we need the
- financial support of individuals and organizations.
-
- If you support our goals and our work, you can show that support by
- becoming a member now. Members receive our quarterly newsletter,
- EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
- have an electronic address that can be reached through the Net), and
- special releases and other notices on our activities. But because we
- believe that support should be freely given, you can receive these
- things even if you do not elect to become a member.
-
- Your membership/donation is fully tax deductible.
-
- Our memberships are $20.00 per year for students, $40.00 per year for
- regular members. You may, of course, donate more if you wish.
-
- Our privacy policy: The Electronic Frontier Foundation will never, under
- any circumstances, sell any part of its membership list. We will, from
- time to time, share this list with other non-profit organizations whose
- work we determine to be in line with our goals. But with us, member
- privacy is the default. This means that you must actively grant us
- permission to share your name with other groups. If you do not grant
- explicit permission, we assume that you do not wish your membership
- disclosed to any group for any reason.
-
- ---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<<
-
- Mail to: The Electronic Frontier Foundation, Inc.
- 155 Second St. #22
- Cambridge, MA 02141
-
- I wish to become a member of the EFF I enclose:$
- $20.00 (student or low income membership)
- $40.00 (regular membership)
- $100.00(Corporate or company membership.
- This allows any organization to
- become a member of EFF. It allows
- such an organization, if it wishes
- to designate up to five individuals
- within the organization as members.)
-
- [ ] I enclose an additional donation of $
-
- Name:
- Organization:
- Address:
- City or Town:
- State: Zip: Phone:( ) (optional)
- FAX:( ) (optional)
- Email address:
-
- I enclose a check [ ].
- Please charge my membership in the amount of $
- to my Mastercard [ ] Visa [ ] American Express [ ]
-
- Number:
-
- Expiration date:
-
- Signature: ________________________________________________
-
- Date:
-
- I hereby grant permission to the EFF to share my name with
- other non-profit groups from time to time as it deems
- appropriate [ ].
- Initials:___________________________
-
- |====================================================================|
- | EFFector Online is published by |
- | The Electronic Frontier Foundation |
- | 155 Second Street, Cambridge MA 02141 |
- | Phone:(617)864-0665 FAX:(617)864-0866 |
- | Internet Address: eff@eff.org |
- | Reproduction of this publication in electronic media is encouraged |
- | To reproduce signed articles individually, |
- | please contact the authors for their express permission. |
- |====================================================================|
-
-
-
-