Received: by lemuria.sai.com (/\==/\ Smail3.1.21.1 #21.11) id ; Sat, 8 May 93 21:54 EDT Received: from uicvm.uic.edu by mv.MV.COM (5.67/1.35) id AA02749; Sat, 8 May 93 21:32:50 -0400 Message-Id: <9305090132.AA02749@mv.MV.COM> Received: from UICVM by UICVM.UIC.EDU (IBM VM SMTP V2R1) with BSMTP id 4453; Sat, 08 May 93 20:32:36 CDT Received: from UICVM by UICVM (Mailer R2.07) with BSMTP id 2489; Sat, 08 May 93 20:32:33 CDT Received: from NIU.BITNET by UICVM.UIC.EDU (IBM VM SMTP V2R1) with BSMTP id 4451; Sat, 08 May 93 20:32:24 CDT Date: Sat, 08 May 93 18:26 CDT To: TK0JUT1@NIU.BITNET From: Cu-Digest (tk0jut2@mvs.cso.niu.edu) Subject: Cu Digest, #5.34 Computer underground Digest Sun May 9 1993 Volume 5 : Issue 34 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Editor: Etaoin Shrdlu, Senrio CONTENTS, #5.34 (May 9 1993) File 1--Another response to gender issues File 2-- Response to Wes Morgan File 3--Cryptography and Mythology File 4--New NIST/NSA Revelations File 5--About the Clipper Proposal File 6--Dvorak criticizes the SPA File 7--New 'Zine (ORA.COM) by O'Reilly & Associates Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in Luxembourg BBS (++352) 466893; ANONYMOUS FTP SITES: UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud halcyon.com( 202.135.191.2) in /pub/mirror/cud AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: nic.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) Back issues also may be obtained through mailserver at: server@blackwlf.mese.com COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Sat, 1 May 93 09:25:02 EDT From: morgan@ENGR.UKY.EDU(Wes Morgan) Subject: File 1--Another response to gender issues In CuD 5.32, Sharon Boehlefeld wrote: >Women I've talked to (f2f and via cmc) are sometimes intimidated by >some males' exercise of their right to free speech. According to some of the men participating in soc.feminism (the moderated Usenet group concerned with feminist issues), it goes both ways. 8) >The problem >becomes one of a "chilling effect," in which speech is inhibited >because some speakers are afraid to voice their ideas and opinions. >They are afraid of opening themselves up to harassment, or worse. Are these same people unafraid to write a letter to the editor (or guest opinion) for their local newspaper? Are they afraid to march in a demonstration? Are they afraid to sign a petition? Are these same people afraid to stand by their beliefs in other forums? If so, why does the net deserve special recognition/analysis? Can you give an example of a free speech forum that does *NOT* have the po- tential to cause this fear and/or reticence? >Whether intentional or not comments like Landwehr's "feminist dogma" >remarks can have that chilling effect. (Not only women are silenced, >but also some men by such tactics.) If there is one phrase with which I have become completely disgusted, it is the dreaded 'chilling effect.' Have we become so sensitive that mere words on a screen can inhibit us? If so, what is the difference between a computer screen and _The New York Times_? Are you 'chilled' by the editorials you read in the paper? Are you 'chilled' by the fact that I disagree with you? Does the mere exercise of free speech 'chill' you? I notice that most writers seem to have few problems in using the traditional media, despite the presence of opposing (and, sometimes, obnoxious) viewpoints. Why should computer-mediated com- munication be different? Perhaps the immediacy of computer communication is part of the problem. The notion that a Usenet posting of email message will bring responses within minutes could conceivably generate a bit of concern, but I don't understand how it inhibits us. In fact, I would argue that computer- mediated communication can actually make the airing of potentially con- troversial opinions *much* easier. Pseudonymous servers are becoming more and more popular; if you aren't comfortable signing your real name to your postings, send them to anon.penet.fi or charcoal.com, where they will be posted with a unique, but anonymous, identifier such as "an83498." If you're dealing with a moderated newsgroup or mailing list, almost all moderators will strip your postings and/or submissions of identification before distributing them. If you really want to do some interesting research, you should do the following: - Pick 20 Usenet participants at random. - Read their postings for 2-3 months. - Arrange to meet them face to face. - After the meeting, marvel at the inaccuracy of your mental depiction of each of them. - Write and publish a paper on "Mistaken Impressions, or 'Don't Try to Read Between the Lines.'" I've met dozens, if not hundreds, of net participants over the last few years; *none* of them matched the mental image I had constructed from their words. One of the most forceful writers I've ever seen on the net turned out to be a rather quiet, almost mousy, young man; another, whose writings had always seemed unobtrusive and mellow, was a young lady with a dominant physical/intellectual presence. [ OPTIONAL EXERCISE FOR THE READER: [ Send me a description of the "mental image of me" that you have [ constructed from reading my postings. You can retrieve back [ issues of CuD for past postings; I also participate in many Use- [ net discussion groups. (look for a return address of either [ "morgan@engr.uky.edu" or "morgan@ms.uky.edu") I'd like to see [ just how accurate your perceptions can be. Feel free to speculate [ on my physical attributes, education, sexuality, events in my past, [ or any other topic that my words suggest to you. I'll answer pri- [ vately and tell you how close you are to the 'real me.' I may post [ a summary of responses, but identities will be held confidential. >Secondly, in Jim Thomas's response, he notes that he sees "no >significant evidence" that the "old boys" network is being recreated >in cyberspace. He notes, "The 'old boys' no longer control the >terrain..." I'm sure he realizes that the "old boys" have *never* >controlled the entire terrain, but the share allotted women has been, >and continues to be, small. Although some men seem consciously >willing to share larger portions of that terrain with women, what >little evidence we have to date seems to suggest that much of it is >still dominated by men. Larry Landwehr is obviously one of the men >unwilling to give up an inch of his cyberspace. Don't you see? Cyberspace doesn't belong to any one person; none of us can stake a claim to any part of it. Anyone who does so is both uninformed and egotistical. Take a look at the List of Lists, the compendium of publicly accessible mailing lists. *Very* few of them are managed/controlled by "well-known net personalities"; the vast majority of list owners are just regular folks. Some say that the cost of net access are too high for women/minorities to participate; I cannot agree with that perception any longer. These economic arguments against net.participation no longer hold water; if there is a site within local calling distance, one can establish a Cyberspace presence for less than $500 (a 286 PC and a modem). A quick glance at the UUCP maps shows that the following systems are being used as net sites: IBM PC/AT, PC/XT Apple Macintosh Plus Amiga 500 Atari 1040 Tandy Color Computer, TRS-80 AT&T 6300, 3B1, 3B2/310 If you can't pick up one of these systems for under $500, you aren't trying hard enough; I have seen some of these for sale at $200 and below. Software exists that simply 'drops in place'; very little technical expertise is required. In conclusion, I cannot dispute the fact that there are many obnoxious, offensive people on the net. However, I refuse to accept the notion that computer-mediated communication is significantly different from any other free speech forum. I believe that the current rush of gender issues in CMC -- from 'computer porn' to 'chilling effect' to 'old boy networks' -- are merely a reflection of the growing expanse of Cyber- space. I have yet to see evidence of *any* bias which is unique to computer-mediated communication. In fact, I submit that CMC provides better opportunities to respond to (or ignore) offensive material. I readily grant that CMC is far more direct (and timely) than almost any other form of group communication; however, the problems are neither based in nor reparable from a computational perspective. Fix the message, not the medium. ------------------------------ Date: Fri, 7 May 1993 13:59 CDT From: Subject: File 2-- Response to Wes Morgan Wes Morgan wrote: > Can you >give an example of a free speech forum that does *NOT* have the po- >tential to cause this fear and/or reticence? No, I can't, Wes, and maybe that's the point? I think it's obvious that I'm not one of the women who feels "chilled" by verbal sparring. Among the points which I was trying to make is that *some* women (and some men) are. Just as a quick recap, my main points (apparently ill developed) were these: 1. There's nothing wrong with using a feminist perspective to conduct social science studies of computer mediated communication and computer technology issues. I did not, and do not intend to, suggest other perspectives should not also be used. 2. Several factors (accessibility and "harassing" posts among them) may be operating in such a way as to systematically exclude women from full participation in the net community. 3. I think the existing data are slim. We need more. I'll stop there, because even though there were some subpoints embedded in my first comments, I don't think I need to rehash them. I will say that since the post ran, I've received notes from folks whose opinions of what I wrote range from thinking I was "too obtuse" to thanking me for my "thoughtful response." But, to address Wes Morgan's concerns specifically, let me return to the line quoted at the top of this post. I cannot think of any existing "free speech forum" that doesn't include the potential for some chilling effect. I also believe other forums may also systematically exclude women from full participation. (Please note: I said *may* exclude. I have neither done, nor examined fully, existing research about those forums.) I'm interested, however, in the development of some kind of data base from which such hypotheses can be tested in an empirical manner. And I believe that is only one such hypothesis that needs testing. When people like Les Landwehr and others rail about "feminist dogma," I worry that the research necessary to come to some sort of reasonable conclusion about these hypotheses will be shunted aside for other, "easier" projects. OK, I'll admit that some folks will think this an imagined fear. Actually, I hope they're right. I agree with Wes that the problems which may exist in cyberspace are probably reflective, to a great extent, of problems within the larger society. I also agree that it's possible to ignore them in this medium, as it is to ignore them in other media. But I guess I don't really believe that ignoring a problem makes it go away. ------------------------------ Date: Fri, 7 May 93 11:43:56 EDT From: Jerry Leichter Subject: File 3--Cryptography and Mythology In a recent issue of Cud, Mike Godwin presented a series of interesting arguments concerning the Clipper initiative and the Constitution. Before he even got to those arguments, however, he mentions in passing a few issues that have been brought up repeatedly. I'd like to deal with one in particular. Mr. Godwin writes: > 2. Refusal to allow public scrutiny of the chosen >encryption algorithm(s), which is the normal procedure >for testing a cryptographic scheme, and I've seen this argument in various guises and in many different forums, from the most ill-informed flames in Usenet newsgroups to statements by the EFF and industry groups. What I find fascinating is the way that a claim like this can come to be believed, when in fact it has NO basis in reality. Until quite recently, almost all cryptography in the world was carried out by the defense establishments and foreign services of the world's governments. The systems they used, and the systems they continue to use to this day, were NEVER subject to public scrutiny. The NSA continues to attempt to keep under tight secrecy all information about their cryptographic work, including information about systems and techniques that were used 40 and more years ago. Despite their general success in this regard, as far as I can tell more information has been published about NSA systems and techniques than those of any other country (with the possible exception of Britain, if you believe what Peter Wright has to say in Spycatcher) - and some of what has been published out the techniques of others has probably come through NSA sources. What little private cryptography existed was based on modifications of older military cryptosystems - e.g., the famous Hagelin machines, based on modifi-cations of World War II technology. The security of these machines was never "subject to public scrutiny", and in fact we now know that they were long ago broken by the cryptoanalytic services of the world's major powers. Today, I think it's safe to say that the majority of encrypted communication is still carried out by the same organizations, using systems whose inner workings remain secret and definitely not subject to public scrutiny. Of the remaining encrypted communication, ignoring the many trivial algorithms in use, the bulk of significant encrypted traffic is almost certainly based on DES. While the DES algorithm is public, the design choices behind it remain secret to this day. It took Shamir's re-discovery of differential cryptography to justify the choice of the P boxes and the number of rounds in DES. To the shock of conspiracy theorists, differential cryptography ended up showing that DES was as strong with respect to this important class of attacks as any system of its size could be. What has gone unmentioned is that we STILL don't have a definitive statement as to the design principles behind DES: It took 15 years to re-discover differential cryptography. Might there be another, different attack that no one in the outside world has found yet? We don't know: The most widely used public cryptographic system is subject to only a limited degree of public scrutiny. If you watch the appropriate Usenet newsgroups, you'll get the impression that "everyone" is using PGP. In fact, not only is the total message traffic encrypted using PGP or related systems insignificant outside of this rather rarefied atmosphere, but it's worth pointing out that the PGP itself is based on IDEA (or is it FEAL?), a cryptosystem in the same class as DES - a class of cryptosystems that it is not at all clear is thoroughly understood in the research community. (Shamir's work demolished several related systems that had been seriously proposed. IDEA IS secure - against this class of attack.) Where, then, are we to find a "normal procedure for testing a cryptographic scheme" that involves "public scrutiny of the chosen encryption algorithm(s)"? "Public scrutiny" in the sense the term is being used here is very much at the center of academic life. It is NOT at the center of almost anything else in the world. It's hard to find a single product that we use on a day to day basis that has been subject to "public scrutiny" in this sense. Important details of design and manufacture of products are trade secrets. GM won't tell you the algorithms used in the chips that control your new car's engine. Coca Cola won't tell you what goes into their "secret formula". Most of the world is not academia, and does not share academia's value system. The "normal procedure for testing cryptographic scheme(s)" does not exist, and has NEVER existed. What has existed is the "normal procedure for testing results presented for academic publication", which has been applied, quite properly, to academic work on cryptography. This is quite a different thing. ------------------------------ Date: Thu, 6 May 1993 13:09:12 EST From: David Sobel Subject: File 4--New NIST/NSA Revelations New NIST/NSA Revelations Less than three weeks after the White House announced a controversial initiative to secure the nation's electronic communications with government-approved cryptography, newly released documents raise serious questions about the process that gave rise to the administration's proposal. The documents, released by the National Institute of Standards and Technology (NIST) in response to a Freedom of Information Act lawsuit, suggest that the super-secret National Security Agency (NSA) dominates the process of establishing security standards for civilian computer systems in contravention of the intent of legislation Congress enacted in 1987. The released material concerns the development of the Digital Signature Standard (DSS), a cryptographic method for authenticating the identity of the sender of an electronic communication and for authenticating the integrity of the data in that communication. NIST publicly proposed the DSS in August 1991 and initially made no mention of any NSA role in developing the standard, which was intended for use in unclassified, civilian communications systems. NIST finally conceded that NSA had, in fact, developed the technology after Computer Professionals for Social Responsibility (CPSR) filed suit against the agency for withholding relevant documents. The proposed DSS was widely criticized within the computer industry for its perceived weak security and inferiority to an existing authentication technology known as the RSA algorithm. Many observers have speculated that the RSA technique was disfavored by NSA because it was, in fact, more secure than the NSA-proposed algorithm and because the RSA technique could also be used to encrypt data very securely. The newly-disclosed documents -- released in heavily censored form at the insistence of NSA -- suggest that NSA was not merely involved in the development process, but dominated it. NIST and NSA worked together on the DSS through an intra-agency Technical Working Group (TWG). The documents suggest that the NIST-NSA relationship was contentious, with NSA insisting upon secrecy throughout the deliberations. A NIST report dated January 31, 1990, states that The members of the TWG acknowledged that the efforts expended to date in the determination of a public key algorithm which would be publicly known have not been successful. It's increasingly evident that it is difficult, if not impossible, to reconcile the concerns and requirements of NSA, NIST and the general public through using this approach. The civilian agency's frustration is also apparent in a July 21, 1990, memo from the NIST members of the TWG to NIST director John W. Lyons. The memo suggests that "national security" concerns hampered efforts to develop a standard: THE NIST/NSA Technical Working Group (TWG) has held 18 meetings over the past 13 months. A part of every meeting has focused on the NIST intent to develop a Public Key Standard Algorithm Standard. We are convinced that the TWG process has reached a point where continuing discussions of the public key issue will yield only marginal results. Simply stated, we believe that over the past 13 months we have explored the technical and national security equity issues to the point where a decision is required on the future direction of digital signature standards. An October 19, 1990, NIST memo discussing possible patent issues surrounding DSS noted that those questions would need to be addressed "if we ever get our NSA problem settled." Although much of the material remains classified and withheld from disclosure, the "NSA problem" was apparently the intelligence agency's demand that perceived "national security" considerations take precedence in the development of the DSS. From the outset, NSA cloaked the deliberations in secrecy. For instance, at the March 22, 1990, meeting of the TWG, NSA representatives presented NIST with NSA's classified proposal for a DSS algorithm. NIST's report of the meeting notes that The second document, classified TOP SECRET CODEWORD, was a position paper which discussed reasons for the selection of the algorithms identified in the first document. This document is available at NSA for review by properly cleared senior NIST officials. In other words, NSA presented highly classified material to NIST justifying NSA's selection of the proposed algorithm -- an algorithm intended to protect and authenticate unclassified information in civilian computer systems. The material was so highly classified that "properly cleared senior NIST officials" were required to view the material at NSA's facilities. These disclosures are disturbing for two reasons. First, the process as revealed in the documents contravenes the intent of Congress embodied in the Computer Security Act of 1987. Through that legislation, Congress intended to remove NSA from the process of developing civilian computer security standards and to place that responsibility with NIST, a civilian agency. Congress expressed a particular concern that NSA, a military intelligence agency, would improperly limit public access to information in a manner incompatible with civilian standard setting. The House Report on the legislation noted that NSA's natural tendency to restrict and even deny access to information that it deems important would disqualify that agency from being put in charge of the protection of non-national security information in the view of many officials in the civilian agencies and the private sector. While the Computer Security Act contemplated that NSA would provide NIST with "technical assistance" in the development of civilian standards, the newly released documents demonstrate that NSA has crossed that line and dominates the development process. The second reason why this material is significant is because of what it reveals about the process that gave rise to the so- called "Clipper" chip proposed by the administration earlier this month. Once again, NIST was identified as the agency actually proposing the new encryption technology, with "technical assistance" from NSA. Once again, the underlying information concerning the development process is classified. DSS was the first test of the Computer Security Act's division of labor between NIST and NSA. Clipper comes out of the same "collaborative" process. The newly released documents suggest that NSA continues to dominate the government's work on computer security and to cloak the process in secrecy, contrary to the clear intent of Congress. On the day the Clipper initiative was announced, CPSR submitted FOIA requests to key agencies -- including NIST and NSA -- for information concerning the proposal. CPSR will pursue those requests, as well as the pending litigation concerning NSA involvement in the development of the Digital Signature Standard. Before any meaningful debate can occur on the direction of cryptography policy, essential government information must be made public -- as Congress intended when it passed the Computer Security Act. CPSR is committed to that goal. *************************************************** David L. Sobel CPSR Legal Counsel (202) 544-9240 dsobel@washofc.cpsr.org ------------------------------ Date: Tue, 4 May 1993 10:29:54 From: The Advocate Subject: File 5--About the Clipper Proposal Gentlemen. No matter about the clipper proposal. What the Federal government has not done in either the digital telephony statutes or the clipper chip proposal is prove that a problem exists nor that this is the least intrusive measure to resolve the problem. Digital encryption promises great power to the individual user, but the government has enormous power. The CIA and the NSA spend about 70 billion dollars a year, most of which is on technical signals capture and decryption. No-one has demonstrated that the CIA lacks the technology to still conduct wiretaps at points ahead of the encrypters, nor has anyone demonstrated that the NSA lacks the resources to de-crypt conversations. If in fact the NSA lacks the resources to de-crypt civilian conversations, then what have we been spending all this money for? Constitutional theory dictates that any government intrusion on a civil right, must take the form of the least intrusion. This proposal has not been demonstrated to be the least intrusive, nor has there been ademonstration that there is even a need. ------------------------------ From: Jim Thomas Subject: File 6--Dvorak criticizes the SPA Date: Fri, 7 May 1993 02:20:21 EDT A recent article by John C. Dvorak from the May 11, 1993 issue of PC Magazine, commented on the Rusty & Edie's bust (we thank Mike Castle for drawing our attention to the piece). Dvorak was especially critical of the SPA. Dvorak is the second major columnist in the past month to begin challenging the SPA's philosophy and tactics. In CuD 5.32, we reported Michael Alexander's (editor of INFOSECURITY NEWS) criticisms and call for the SPA to change its direction. Alexander concluded: However, I believe that the SPA's much-publicized raids on businesses whose users are allegedly making unauthorized copies of software do little to advance the cause of information systems security. Any infosecurity practitioner will tell you that fear, intimidation and threats do not make for better security. What works is education, communication and cooperation. Dvorak's piece, "BBS Easy Target in FBI Bust" begins by summarizing Rusty and Edie's troubles when the FBI seized their equipment and other material in February. Dvorak cites one "intelligence-gathering" service that estimated that as many as 2,000 BBSes of the 25,000 it monitors specialize in "pirated" software, and that any of these could have been busted. However, he claims that R&E's was particularly vulnerable: But Rusty and Edie had made a lot of enemies in the BBS community because they had a reputation for reposting nudie .GIFs from other sources, removing the original promotional material and inserting their own promotional stuff--a practice despised by BBS operators. Many bulletin board services barely eke out a living and would be profitless if it weren't for the peculiar demand for downloadable pictures of people in the buff. Rusty had also done little to make friends in the BBS community. It's one of the few BBSs that do not even post the number of other BBSs for the convenience of subscribers. So when Rusty was busted, the community did nothing and said nothing. Many operators quietly smirked or applauded. Yes indeed, the SPA picked a convenient target. Dvorak argues that R&E's was not an outrageous pirate board that flaunted commercial software or other illicit activities. It was, he contends, a board that promoted shareware, which he calls a "legitimate threat to the software companies that sponsor the SPA." Why, he asks, didn't the SPA call R&E's or conduct an audit as they do in other cases? It was, Dvorak reasons, when R&E announced their intention to expand to 500 lines that "the FBI got serious." He adds with sarcasm that it's also a coincidence that "a major source of shareware is obliterated." Dvorak does not defend piracy, and he is explicit in stating that commercial software publishers should be compensated for their efforts. His column is not a defense of R&E, but a criticism of the SPA. Dvorak concludes: The SPA should protect the BBS operator from having equipment confiscated. These are computers, not drugs or illegal weapons! The rational means any PC Magazine reader suspected of having pirated software may have a PC confiscated. As in Stalin's Russia, it only takes a tip from an unfriendly neighbor. The SPA is that neighbor today. A disgruntled employee or jilted lover will be that neighbor tomorrow. Dvorak makes several good points. First, the current criminalization trend of even trivial computer delinquency risks unacceptable invasion by law enforcement. Second, the SPA--counter to it's claim to be a "good neighbor" may be acting in bad faith to promote its own vested interests. Finally, he has taken what until now has been an issue of concern to a small proportion of computer users and suggested how a continuation of the SPA's policies could lead to an oppressive climate in cyberspace. CuD has become increasingly critical of the SPA, and we have severe reservations with their professed goal of combatting piracy through education. It is our view that they are not acting in good faith and that they play rather loose with facts to bolster their raiding tactics. We will elaborate on this in a special issue in about two weeks. ------------------------------ From: CuD Moderators Subject: File 7--New 'Zine (ORA.COM) by O'Reilly & Associates Date: Fri, 7 May 1993 11:40:11 CDT ((MODERATORS' NOTE: CuD does not advertise, and we receive no compensation for plugging an occasional product. We run the occasional blurb announcing a product when it seems of interest to computer hobbyists, or--which happens periodically--when we come across something of sufficient quality that we think it's worth checking out, as is the case here)). O'Reilly & Associates, the publishers who put out a line of first-rate Unix books, recently came out with a catalogue/newsletter that's slick, informative, and--for an inhouse advertising (ORA.COM) 'Zine--fun to read. What especially caught our eye was the sales figures for THE WHOLE INTERNET. Although it only appeared within the past year, it's in its fifth printing (125,000 copies in print) and in some stores has outsold Madonna as the best seller. We like ORA.COM for a couple of reasons: It's informative and gives a nice summary of the O'Reilly line (which it's supposed to do); The layout is not typical of most publishers' catalogues--it more closely resembles WIRED and similar cyber-age 'Zines; It's FREE! The premier issue of ORA.COM includes news and features, including an Internet department, general news and tips of interest to sysops, sysads, and computer users, and tips and tricks for becoming more adept at computer use. It's worth a look. For more information, contact: Brian W. Erwin O'Reilly & Associates, Inc. 103 Morris Street, Suite A Sebastopol, CA 95472 Internet: letters@ora.com / Voice: (800) 998-9938 - (707) 829-0515 ------------------------------ End of Computer Underground Digest #5.34 ************************************