[1192] in RISKS Forum

home help back first fref pref prev next nref lref last post

RISKS DIGEST 17.67

daemon@ATHENA.MIT.EDU (RISKS List Owner)
Thu Jan 25 21:20:36 1996

From: RISKS List Owner <risko@csl.sri.com>
Date: Thu, 25 Jan 96 18:18:07 PST
To: risks@MIT.EDU

RISKS-LIST: Risks-Forum Digest  Thursday 25 January 1996  Volume 17 : Issue 67

   FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

***** See last item for further information, disclaimers, etc.       *****

  Contents: 
Risks of military technology in civilian life? (Howard Chalkley)
Unintended missile launches (Mary Shafer)
Turning off virus protection? (Dave Wagner)
WebCard Visa: It's everywhere you (don't) want to be? (Doug Claar)
I won't tell if you won't... (Ed Ravin)
New Book on Cyberculture (Gary Chapman)
"Civilizing Cyberspace" by Miller (Rob Slade)
Dangers of Ambiguous Headlines (Matt Welsh)
Warning on Thefts of Laptops (Tom Zmudzinski)
Re: Single computer breaks 40-bit RC4 in under 8 days (Paul C. Kocher)
Re: Cost to crack Netscape Security falls... (Peter Curran)
Re: Security hole in SSH 1.2.0 (Mike Alexander)
Dirty word filters: Sidewinder (Henry G. Baker)
Re: Antispamming technology (Cancelmoose, Jay Prince, Rob Slade)
Re: Hey, your mailing list is sending me viruses! (Phil Hammons,
    Joe A. Dellinger, Mitch Wagner)
ABRIDGED info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Thu, 25 Jan 1996 11:54:38 GMT0BST1
From: "Howard Chalkley" <HOWARD@gst-soft.demon.co.uk>
Subject: Risks of military technology in civilian life?

This anecdote has started spreading around the net...

A snippet spotted in Pilot Magazine and entered in Bike Magazine: The
article was entitled "In a hurry are we, sir?" ( British Police Wit).

Two members of the Lothian and Borders traffic police were out on the
Berwickshire moors with a radar gun recently, happily engaged in
apprehending speeding motorists, when their equipment suddenly locked-up
completely with an unexpected reading of well over 300 mph.  The mystery was
explained seconds later as a low flying Harrier hurtled over their heads.
The boys in blue, upset at the damage to their radar gun, put in a complaint
to the RAF, but were somewhat chastened when the RAF pointed out that the
damage might well have been more severe. The Harrier's target-seeker had
locked on to the `enemy' radar and triggered an automatic retaliatory
air-to-surface missile attack. Luckily(?), the Harrier was operating unarmed.

Howard Chalkley, GST Technology Ltd, Meadow Lane, St Ives, Huntingdon PE17 4LG
UK   +44 1480 496789   Fax: +44 1480 496189  howard@gst-soft.demon.co.uk

------------------------------

Date: Thu, 25 Jan 1996 14:30:27 -0800 (PST)
From: shafer@ferhino.dfrc.nasa.gov (Mary Shafer)
Subject: Unintended missile launches

The problem of unintended missile launches from aircraft is not a new one.
I have a friend who was flying CAP (Combat Air Patrol) in the Gulf when a
radar-guided missile launched itself from his fighter.  Subsequent
investigation determined the cause, but he was told at the time that there
had been at least three other such incidents, with the same aircraft/missile
combination.

In his case, the missile was heading for another Coalition aircraft, but
lock was broken when he turned off his radar.  This does not, of course,
work for IR-guided missiles like that in the Japanese F-15/Sidewinder
shootdown that was reported in RISKS-17.65 on 23 Jan 1996.

(Forgive my vagueness above, but I'm just not sure how public the story is
and don't feel it proper to give more details, since it's not my story.  I
only heard it when I asked Gus why he was called Gus--after Gus Grissom, of
course.)

I have read of numerous spontaneous launches in Vietnam.  I also believe
that there was an incident some time ago onboard a carrier in which a
missile "launched" itself while being attached to the aircraft (I think when
it was connected electrically to the airplane) causing injuries to the
arming personnel and other ground crew.

Mary Shafer, SR-71 Flying Qualities Lead Engineer, NASA Dryden Flight Research
Center, Edwards, CA  URL http://www.dfrc.nasa.gov/People/Shafer/mary.html

------------------------------

Date: Thu, 25 Jan 1996 09:32:00 -0600 (CST)
From: Dave Wagner <davew@winternet.com>
Subject: Turning off virus protection?

I just got my fancy TurboTax "Deluxe" CD in the mail the other day, and
decided to install it (Windows 3.1).  I dutifully put in the CD, and entered
d:\setup, and off it went installing the software seemingly correctly.
However, when I tried to run it, the program either crashed or hung.
Searching the "help", I find it says to make sure that you turn off all
virus checking software.  Hmm.  Just to see, I did that, and it installed
the same, but (after turning on the virus checker) it finally ran normally.
The risks here are pretty obvious..

- Since viruses have shown up in shrink-wrapped software, it seems
  pretty chancy to turn off protection while you run a program (the
  installation)

- Should we become used to turning off this when asked by the software
  (This is maybe a similar risk to the Java protections - "To get the
  most out of this web page, please turn off ...")

- And finally, for my own info, what is this install doing that's causing
  this problem??

Dave Wagner  davew@winternet.com

------------------------------

Date: Wed, 24 Jan 1996 19:23:54 -0800
From: Doug Claar <dclaar@hprtnyc.ptp.hp.com>
Subject: WebCard Visa: It's everywhere you (don't) want to be?

Just read an article in the *San Jose Mercury News* that Visa International
and Block Financial will offer a special "WebCard Visa".  The card will
allow users to access their account statements via Internet.  The article
goes on to say "The service will get around security concerns by never
transmitting the account number over the Internet.  Users will type in a
password instead."  As if somehow that will solve all the security problems!
In that Visa and Microsoft have co-developed the "Secure Transaction
Technology" specification (STT), there is probably/hopefully more to the
story than the newspaper lets on.  I haven't seen any discussion of how
secure STT is, but it is described at
  http://www.microsoft.com/intdev/inttech/wire15dx.htm

Doug Claar

------------------------------

Date: Tue, 23 Jan 1996 20:32:37 -0500 (EST)
From: Ed Ravin <eravin@panix.com>
Subject: I won't tell if you won't...

I just found this browsing through a router manufacturer's "Frequently
Asked Questions" file:

   Q3       I have a bridge/router, and I have forgotten my password.  I am
   no longer able to log in and configure the device(s).  What do I do
   now?
   
   Do not panic! Enter the following password at the password
   prompt:XYZZYHIMOM.  This should get you into the unit.  Notice!! This is
   a back door to the units, and should not be made available to people
   who do not need to know about it!
   
And I don't even own one of these routers -- I found this in a reseller's
online catalog.  Back doors in devices that are often hooked directly to
external networks are a Bad Idea, if you ask me.  At least the manufacturer
documented it...

(password above changed to protect the guilty)

Ed Ravin  +1 212 678 5545  eravin@panix.com

------------------------------

Date: Thu, 25 Jan 1996 16:16:12 -0600
From: gary.chapman@mail.utexas.edu (Gary Chapman)
Subject: New Book on Cyberculture

New and Recommended:

Escape Velocity: Cyberculture at the End of the Century

By Mark Dery

Grove Press, 1996

A pretty wild and entertaining look at "cyberculture," including all the
hype and a healthy dose of skepticism, from a journalist who has a distinct
and rather baroque style of writing that I find fun. Covers all the
personalities of cyberpunk, raves, computer sex, music, "posthuman" beings,
and all the other nutty things going on these days. Lots of fun and
educational too.

Mark and I went to college together, years ago, so I'm happy to flog his
new book (in which I also appear -- but NOT in the chapter on cybersex!).
He previously edited another fun and useful collection, Flame Wars, which
includes my essay, "Taming the Computer" (Duke University Press, 1994).
(Together, we'll sell some books!)

Gary Chapman, The 21st Century Project, LBJ School of Public Affairs, Drawer Y,
Univ. Texas, Austin, TX 78713  512-471-8326  gary.chapman@mail.utexas.edu

------------------------------

Date: Wed, 17 Jan 1996 14:56:27 EST
From: "Rob Slade" <roberts@mukluk.hq.decus.ca>
Subject: "Civilizing Cyberspace" by Miller

BKCVLCYB.RVW   960108
 
"Civilizing Cyberspace", Steven E. Miller, 1996, 0-201-84760-4, U$26.85
%A   Steven E. Miller smiller@aw.com
%C   1 Jacob Way, Reading, MA   01867-9984
%D   1996
%G   0-201-84760-4
%I   Addison-Wesley Publishing Co./ACM Press
%O   U$26.85 800-822-6339 617-944-3700 Fax: (617) 944-7273 bkexpress@aw.com
%P   413
%T   "Civilizing Cyberspace: Policy, Power and the Information Superhighway"
 
On the rising wave of information superhighway books, and the increasing
backwash of anti-net tomes, no single author has been able to produce a work
that even remotely compares with Miller's.  Neither dazzled by technical
brilliance nor dreading the cyborg juggernaut, he provides the fruits of a
working relationship with the technology, thorough research, and insightful
analysis.
 
The book specializes in public policy, but since that can touch everyone and
everything it is not a limitation.  Miller is thus able to examine all aspects
of information structures and strictures.  His material is clear and well
reasoned: it does not provide ready answers at every point, but raises all
pertinent issues.  Even esoteric topics are handled well: obviously not all
areas can be covered in depth, but Miller knows more than he says and gives
accurate and helpful resumes.
 
One shortcoming in the book is the less than rigorous division of topics. 
While many issues in public policy interrelate, many chapters seem to flow
together without an obvious break.  This may be difficult to resolve, but it
was rather odd to find the same (fairly lengthy) quote used in almost identical
discussions on both pages 64 and 204.
 
copyright Robert M. Slade, 1996   BKCVLCYB.RVW   960108
DECUS Canada Communications, Desktop, Education and Security group newsletters
Editor and/or reviewer   ROBERTS@decus.ca  rslade@vanisl.decus.ca

------------------------------

Date: Thu, 18 Jan 1996 13:34:10 EST
From: mdw@CS.Cornell.EDU (Matt Welsh)
Subject: Dangers of Ambiguous Headlines

An article in ClariNet's clari.tw.computers newsgroup caught the eye
of a colleague of mine this morning. The headline is:

>       Subject: Lotus in Security Compromise

Immediately alarm bells began to ring: The security in Lotus 1-2-3 has
been compromised? 

But, alas, the article is of a tamer nature:

>       SAN FRANCISCO (AP) -- Lotus Development Corp. announced a 
>       compromise with the federal government Wednesday that will allow it 
>       to put better security features into the international version of 
>       its Notes program.  

The RISK here is obvious (although the implications may be subtle).
Ambiguous newspaper headlines have always been comic relief for some, but
now that our news stories and information are presented electronically, I
find it not difficult to believe that automated agents will soon be reading
our news for us, either presenting articles of interest or (worse)
attempting to summarize the content. (Indeed, I already employ the
``killfile'' feature of my newsreader to automatically select articles which
match certain expressions). Keywords such as ``Security Compromise'' would
certainly be targets for a reader who wishes to stay on top of current
happenings in computer and electronic security.

M. Welsh, mdw@cs.cornell.edu  Cornell University Robotics and Vision Laboratory

------------------------------

Date: Wed, 24 Jan 96 11:09:41 EST
From: "Tom Zmudzinski" <zmudzint@ncr.disa.mil>
Subject: Warning on Thefts of Laptops (fwd from Buddy Guynn)

The following advisory is being provided by Mr. Buddy Guynn, DMC Montgomery
Security Manager.  He received the information from the Army Material
Command regarding the security of Laptop Computers during travel.
  
     1.  The following information is valid not only for laptops but 
     also for other items of value such as briefcases while you are 
     in domestic or international travel status:
  
         "Laptop computers have become a premium target for theft
          throughout Europe.  Every international traveler who is 
          anticipating on carrying a laptop computer with them must 
          remain on constant alert as they traverse through all 
          airports.
  
          Two methods of theft have already occurred at separate 
          airports and the techniques that were used to steal the 
          laptop computers can occur at any airport.  Both methods 
          involved two thieves to carry out the theft.
  
          Recently, Brussels Airport security advised that one method 
          involved the use of security x-ray machines.  The first 
          thief would precede the traveler through the security check 
          point and then loiter around the area where the carry-on 
          luggage had already been examined.  When the traveler places 
          his laptop computer onto the conveyer belt of the x-ray 
          machine, the second thief would step in front of the 
          traveler and set off the metal detector.  While the traveler 
          was being delayed, the first thief would remove the 
          traveler's laptop computer from the conveyer belt just after 
          it had gone through the x-ray machine and quickly disappear.
  
          The most recent method of theft just occurred at the 
          Frankfurt International Airport, Germany, while the traveler 
          was walking around a crowd of people in the airport 
          terminal.  The traveler, who was carrying his laptop 
          computer on his rollbag, was preceded by the first thief. 
          Just as the traveler got around the crowd of people, the 
          first thief stopped abruptly, causing the traveler to stop 
          abruptly.  When they stopped momentarily, a second thief, 
          who had been following just behind them, quickly removed the 
          traveler's laptop computer from his rollbag and disappeared 
          in the crowd."
  
    2.  All travelers, both international and domestic, are urged to 
    be alert to the above methods used in stealing computers and 
    always be mindful of any abrupt diversions during your travels.  
    Report any losses immediately to authorities.  Keep serial 
    numbers, make, and model information of your laptop computers, or 
    of any items of value, separate from the item so you can give 
    precise information to authorities if the items are stolen.
  
    3.  Request widest dissemination of this correspondence.
  
------------------------------  
  
Date: Wed, 24 Jan 1996 16:20:42 -0800
From: pck@netcom.com (Paul C. Kocher)
Subject: Re: Single computer breaks 40-bit RC4 in under 8 days (Weimer, 17.66)

> ... I'm certainly not going to be concerned about what it is costing
> someone else for me to > crack keys.

On the contrary, many security weaknesses aren't prevented because people
*don't* consider the cost to break into the overall system, and instead
focus on the encryption.  For example, cryptographers (myself included, I
confess) like to use triple DES because a "fair" brute force attack will
take millions of years.  But in practice, the assumption that attackers will
actually use brute force makes about as much sense as wearing bright red
uniforms in the forest...

Brute force is almost never the simplest attack to mount -- it's the
simplest to understand and quantify.  For example, how much would it cost to
mail out free "demo" disks to unsuspecting users?  Although this isn't
playing "fair" by the cryptographer's rules (which require that the two
endpoints of a secure connection be secure), the cost per "break" is under
$10 once the trojan software has been written.

Unfortunately the number of key bits doesn't have much correlation to actual
security; estimated dollars per successful break-in is a much more useful
figure.  On a typical PC, there are just too many other security weaknesses
for there to be much practical difference between 3DES and 40-bit RC4.

Paul Kocher (pck@netcom.com)  Cryptography consultant

------------------------------

Date: Thu, 25 Jan 1996 14:52:52 GMT
From: pcurran@inforamp.net (Peter Curran)
Subject: Re: Cost to crack Netscape Security falls... (Peterson, RISKS-17.65)

 >P.S.  Don't blame Netscape, they are just abiding by ITAR.

IMHO, this is letting Netscape off the hook far too easily.  There is a
simple solution to the ITAR problem - develop the software in a location not
subject to US export laws (i.e. almost anywhere else in the world).  Anyhow
who is claiming to be addressing the problem of network security, etc., on a
global basis should be adopting this solution.  The USA has no monopoly on
software development expertise, and there is no reason the world should be
held ransom to US military nonsense.

Peter Curran                               pcurran@inforamp.net

------------------------------

Date: Thu, 25 Jan 1996 13:44:17 -0500
From: mta@umich.edu (Mike Alexander)
Subject: Re: Security hole in SSH 1.2.0 (RISKs of being "too careful"?)

The bug in ssh described by Barry Jaspan is a good example of a whole class
of Unix security bugs that result from the fact that Unix associates all
access controls with users and has no way to assign access rights to a
program independent of the user running the program.  This is not true of
all operating systems.  One (certainly not the only) example is MTS (the
Michigan Terminal System).  Each program in the system is assigned a Program
Key and access to files and other system resources can be granted to the
program (or a combination of a program and a user) as well as to a user.
This makes it much easier to write programs such as ssh since they never
have to masquerade as a super user.

Of course there are lots of other problems one has to solve.  The algorithm
for switching program keys as control switches among different code in the
same process is important, for example.  One also needs to make sure that
users can't sniff at the memory of a process that holds important
information (such as passwords).  In MTS this is done by making the memory
of a process invisible when a "run only" program is loaded in it.  Using
Program Keys, a run only program is one whose file is permitted to the
program loader, but not to the user running it.  Hence a program may be run
only to one person and not to another.  All in all this scheme has worked
quite well for the last 25 years or so.

Mike Alexander, University of Michigan  mta@umich.edu  MAlexander@aol.com

------------------------------

Date: Wed, 24 Jan 1996 11:23:13 -0800 (PST)
From: hbaker@netcom.com (Henry G. Baker)
Subject: Dirty word filters: Sidewinder

Apparently, 'dirty word filters' for email (and presumably for news, as
well) are almost here.

Quoting from http://www.sidewinder.com/:

"   FAQ Backdrop Image Sidewinder Frequently Asked Questions
...
    6. What is type enforcement?
...
       ... Future releases will provide application layer
       filters that can detect some irregularities on incoming electronic
       mail addresses, validate traffic based on cryptographic
       signatures, check for restricted legends in outgoing files, and so
       on.
...       
    8. How does Sidewinder control network traffic?
       
       Sidewinder uses the following (Rule Setting and Filtering)
       techniques to control your network traffic:
...
          + Content Based Access Control
            
            NOTE: This following is a set of capabilities we intend to
            provide in future Sidewinder releases. 
            
            Sidewinder will be able to allow or prevent the delivery of
            data based on the data contents. For example, Sidewinder
            could enforce access control based on user names in
            electronic mail messages.
            
            Sidewinder could also control access based on the presence or
            absence of key words in a message, file, or Web page (i.e.
            PROPRIETARY or FOR PUBLIC RELEASE).
            
    9. How are new controls and access limitations added?
       
       Controls and access limitations for existing services are
       controlled through configuration files. These configuration files
       may only be modified by authorized administrators accessing the
       files via the internal network or a directly connected terminal."
...
"   FAQ Backdrop Image Sidewinder Frequently Asked Questions
                   SIDEWINDER(TM) INTERNET CLIENT SERVICES
   
   This section provides questions and answers related to the services
   that Sidewinder(tm) provides to Internet clients (external users).
...   
    3. How is the mail passed? Does Sidewinder "read" the entire mail
       message?
...       
       Future versions of Sidewinder will provide an e-mail filter that
       applies access control and other security checks."

End of quote.
   -----

I also seem to recall seeing a picture of theirs showing how this
product filters email with a 'Dirty Word Filter'.

I believe that this product has the capability of causing alarms under
programmed conditions.  I presume that one could configure this program
to ring a bell every time a certain 'dirty word' was detected in anyone's
email or on usenet news.

The RISKS to civil liberties here are obvious.
       
Henry Baker  www/ftp directory: ftp.netcom.com:/pub/hb/hbaker/home.html

------------------------------

Date: Thu, 25 Jan 1996 05:41:22 GMT
From: "Cancelmoose[tm]" <moose@cm.org>
Subject: Re: Antispamming technology

For about 5 months I've been working on a project to reliably detect Usenet
spam, and allow people who are bothered by it to avoid seeing it.  The
"Automoose" is a daemon which scans usenet articles, and when it sees the
same message that has been posted too many times, it notifies the world via
a NoCeM notice.

These notices are PGP signed to prevent forgery.  They are read by special
clients which check the signatures, and mark spam messages as 'read'.  NoCeM
has no effect on those who aren't interested, and the user can control whose
notices are applied by adding or removing keys from the keyring.

For more information see http://www.cm.org or email me: moose@cm.org.

  [Let's bring back Monty Python, who spammed spam itself.  PGN]

------------------------------

Date: Wed, 24 Jan 96 18:46:27 TZ
From: Jay Prince (EDP) <a-jayp@microsoft.com>
Subject: Re: Antispamming technology (Kealey, RISKS-17.66)

Martin proposes an excellent idea for locking potential spams:

One fault of his proposal is this: If it becomes very popular, scanning for
the string "send a message with `unlock.87326482376' " and extracting the
unlock code would be a simple matter for a spammer to script.  Thereby, the
return address on the spam would be a daemon that watches for your Anti-Spam
message and then immediately sends the unlock message.

It would be a simple matter for the spammer to change the domain name
of the originating spams (As well as usernames) to get around them then
being locked out by AntiSpam after unlocking the first message.

So, your idea suffers because it relies on the other side of the spam being
a person (for whom it would be a hassle to change their address if they are
blocked) rather than a professional spammer.  But, it is a great start.

Jay

------------------------------

Date: Wed, 24 Jan 1996 13:19:13 EST
From: "Rob Slade" <roberts@mukluk.hq.decus.ca>
Subject: Re: Antispamming technology (Kealey, RISKS-17.66)

>I'm working on an idea that I hope will increase the cost of
>advertising by requiring manual intervention for each separate
>recipient, while not stopping messages from valid senders.

The system would halt e-mail from an unknown site/account, and require a
manual response in order to have the sender placed on an "approved" list in
order to allow his/her/its mail into the system.

>Some risks that I can see:  [...]

I can see quite a variety of problems.

 -  dealing with any listserver, mailbot or other automated agent.  I use
them a lot.

 -  the 48 hour limit would frequently be a problem with systems (see 
recent situations with AOL and MSN) that have become overloaded with mail,
and also with users who only check mail once a week or so.  (I know that
many high volume listservers have this response limit, but in that case
you do have recourse to a human list owner.)

 -  our site has had four or five changes to the mail gateway in the past
two years.  Each has meant a change in the address.  (Also, I am listed at
least five times in Godin's "Internet White Pages" simply because of changes
to my "real name".)

 -  as described, the "approved" list would apply to an entire site.  This
would mean that a moments impatience or inattention could get someone barred
from a whole site.  Conversely, one could get around the restriction by
sending an innocent message to someone at the site, become "approved", and
then spam the site.  (Many Freenets, and no few ISPs, use numbered accounts.
Someone recently spammed Mindlink in Vancouver using this method.  Mindlink
has now blocked mail to account numbers: the sender must use the recipient's
"alias".)

I could go on, but I think this indicates that such a program would quickly
become very complex.  I suspect that spamming is a natural risk of email in
much the same way that telemarketing is a risk of telephones and viruses are
a risk of computers.  It just goes with the territory.  So far, the net has
proven to have protections against the most flagrant violators.  Today I saw
a note in Edupage which reported that MCI now has a policy which allows them
to terminate the accounts of spammers.  (It takes a lot to get corporate
monoliths to respond in this manner.)

Now, if you want a *real* risk to the net, look at the Web ...   :-)

roberts@decus.ca    slade@freenet.victoria.bc.ca    Rob_Slade@mindlink.bc.ca
Author "Robert Slade's Guide to Computer Viruses" 0-387-94663-2 (800-SPRINGER)

------------------------------

Date: Wed, 24 Jan 96 15:13:40 PST
From: Phil Hammons <hammonsp@post.AES.COM>
Subject: Re: "Hey, your mailing list is sending me viruses! (Dellinger, 17-66)

In his remarks, Joe comments on modems that disconnect on "+++". Like the
Internet Goodtime virus, this has a grain of truth in it. With the (sic)
"Hayes-compatible" Modems, when this string is sent into the serial port of
the modem (i.e. from the calling station), it causes the modem to go into
command mode. The connection is not hung up at this time. If you know what
you are doing, you can drop back into data mode. (How many do? Quien Sabe?).
If received via the phone port, it is just another string of bits. "Too
little knowledge is very bad and not enough is still confusing. Mil Gracias.

   [Actually, I meant to mention in RISKS-17.66 that the +++ problem
   is discussed in RISKS-14.45,46,47, back in April 1993.  PGN]

------------------------------

Date: Thu, 25 Jan 96 10:38:28 CST
From: jdellinger@amoco.com (Joe A. Dellinger)
To: Phil Hammons <hammonsp@post.AES.COM>
Subject: Re: Hey, your mailing list is sending me viruses! 

Phil, I agree that what you describe is what is SUPPOSED to happen.  But not
all "Hayes-compatible" modems behave exactly as they are supposed to.  There
is also a risk in believing that "compatible" products are indeed 100%
compatible as advertised.

------------------------------

Date: Thu, 25 Jan 1996 22:08:15 GMT
From: mwagner@netcom.com (Mitch Wagner)
Subject: Re: Hey, your mailing list is sending me viruses!

>	I'm told some brands of modem will promptly disconnect if they see
>the string "+++" go by at any point in the data stream.

I'm told that the string "NO CARRIER", with the "N" at column one, will
cause some comm software to hang up.

------------------------------

Date: 11 January 1996 (LAST-MODIFIED)
From: RISKS-request@csl.sri.com
Subject: ABRIDGED info on RISKS (comp.risks)

 The RISKS Forum is a moderated digest.  Its USENET equivalent is comp.risks.
 SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) on
 your system, if possible and convenient for you.  BITNET folks may use a 
 LISTSERV (e.g., LISTSERV@UGA): SUBSCRIBE RISKS or UNSUBSCRIBE RISKS.  [...]
 DIRECT REQUESTS to <risks-request@csl.sri.com> (majordomo) with one-line, 
   SUBSCRIBE (or UNSUBSCRIBE) [with net address if different from FROM:]
   INFO     [for further information]

 CONTRIBUTIONS: to risks@csl.sri.com, with appropriate,  substantive Subject:
 line, otherwise they may be ignored.  Must be relevant, sound, in good taste,
 objective, cogent, coherent, concise, nonrepetitious, and without caveats
 on distribution.  Diversity is welcome, but not personal attacks.  [...]
 ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
 By submitting an item that is accepted for publication in RISKS, the author
 grants permission for unlimited noncommercial public distribution and 
 redistribution in electronic and print form.  Relevant contributions may 
 appear in the RISKS section of regular issues of ACM SIGSOFT Software 
 Engineering Notes or SIGSAC Review.

 RISKS can also be read on the web at URL http://catless.ncl.ac.uk/Risks 

 RISKS ARCHIVES: "ftp ftp.sri.com<CR>login anonymous<CR>[YourNetAddress]<CR> 
 cd risks<CR> or cwd risks<CR>, depending on your particular FTP.  [...]
 [Back issues are in the subdirectory corresponding to the volume number.]
   Individual issues can be accessed using a URL of the form
     http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue]
     ftp://unix.sri.com/risks  [if your browser accepts URLs.]

------------------------------

End of RISKS-FORUM Digest 17.67 
************************

home help back first fref pref prev next nref lref last post