Date: Wed, 22 Feb 95 22:31:05 PST From: cnews@libtech.com (Computer News) To: Multiple Recipients of list Subject: Computer News: Volume II, Issue 8 ______ __ __ / ____/\ / \ / /\ / /\___\/ / /\ \ / / / / /_/__ / / /\ \/ / / /______/\ /_/ / \__/ / \\\\\\\\/ \\\/ \\\/ COMPUTER NEWS "Your eye to the computer industry"(tm) ------------------------------------------------------------------------- Wednesday, February 22nd 1995 Vol. II, Issue 08 ------------------------------------------------------------------------- INSIDE CN: ---------- Whoa. This was certainly a WIERD WEEK! First of all, there was the biggest e-mail storm i've ever seen, swamping everyone, including me, with tons of e-mail. I was getting about 50-70 messages from people angry about the G_Kelly thing each day for about three days! For more info on the G_Kelly thing, check "Letters to the Editor" in the "ETC" section. Second of all, CN Articles and such will now be terminated with the following sign: ->CN<- Not very wierd, but it shakes the very foundations of Computer News. If you have any suggestions on better terminators, please send them in! =) Oh, and be sure to find out about flying onions in the Lighter Side. ;^) ->Olo<- Olcay Cirit Editor-In-Chief THIS WEEK'S CONTRIBUTORS: ------------------------- The NullBytes News Service Rob Slade Quick Overview __________________________________________ NEWS: 1. Internet Games Standard Proposed 2. Prodigy to offer Web access 3. Apple loses interface war 4. Intel decides against `Sexium' 5. SEMINAR: Law of Electronic Commerce ARTICLES: 1. Book Reviews (3) ETC: 1. Letters to the Editor 2. Classified Ads 3. Lighter Side __________________________________________ __ __ / \ /\_\ / /\ \/\/ / /_/\/\ \/ / \_\/ \__/ EWS: Internet Games Standard Proposed -------------------------------- Paul Robinson (paul@tdr.com) Chief programmer at Tansin A. Darcos & Co. Has proposed a system that would let ten to twelve people play a a live action game across the Internet in real-time over TCP/IP connections. Id Software of Dallas, Texas (The makers of DOOM) is also working on code for a game that can be played over the internet, using a proprietary protocol developed by Id. Says Robinson: "Sooner or later, somebody's going to figure that there's money to be made playing games on the Net," The proposal recommends the development of a transaction-based messaging protocol that allows rapid communication among multiple players. Mark DeForest of Cyan Inc (The makers of Myst) says that games on the Internet will become so large, they won't even fit on Compact Discs anymore. However, this will allows for bigger, more complex games with thicker plots and storylines. (Source: Electronic Engineering Times, 2/20/95) Prodigy to offer Web access --------------------------- Prodigy, an on-line service, is the first to offer subscribers access to the World Wide Web, although it will probably be followed by the other on-line services in the not-so-distant future. The announcement will augment Prodigy's already formidable array of Internet services. The World Wide Web is a medium for the interactive display of information. It is one of the most appealing aspects of the Internet. (Source: NullBytes News Service) Apple loses interface war ------------------------- Apple Computer Inc. has lost the battle with Microsoft over similarities between Microsoft Windows and the Macintosh User Inter- -face. Microsoft allegedly copied parts of the Macintosh user interface illegally. However, the supreme court refused to consider Apple's appeal of a lower-court decision, which held that many of the features shared between the Macintosh and Windows interfaces were covered in a 1985 agreement between the two companies. The high court's decision effectively ends Apple's crusade against Microsoft. Intel Decides against `Sexium' ------------------------------ Breaking the new naming scheme, Intel marketers decided against naming the P6, Intel's upcoming processor, `Sexium'. Earlier chips made by Intel followed the x86 naming scheme, "086, 186, 286, 386, 486" however, since Intel named the chips after a number, they were unable to exercise trademark control over the chips, so they named what would be the 586, the `Pentium'. Intel marketers have yet to decide what the new chip will be called. SEMINAR: Law of Electronic Commerce ----------------------------------- On-line Seminar Starting March 13, May 9, Sept. 12 & Oct. 24, 1995 The National Computer Security Association announces a new form of professional education -- an on-line seminar.It is education delivered through the NCSA InfoSecurity Forum on CompuServe or via Internet mail.For 30 days, attorney and author Benjamin Wright will convene a seminar covering The Law of Electronic Commerce -- EDI and E-mail Contracts and Records. Participants will attend the seminar by exchanging computer messages with Wright in a private discussion forum.Thus, no one will have to travel or miss time away from the office or home. The seminar is designed for security managers, Online and MIS professionals, EDI managers, purchasing managers who use EDI and E- mail, lawyers, accountants and auditors.Topics on the agenda: 1.Electronic Contracts 2.Electronic Data Interchange (EDI) and Electronic Funds Transfer 3.Electronic Signatures & the Role of Cryptography 4.EDI Trading Partner Agreements 5.Value-Added Network Agreements 6.Electronic & Optical Evidence 7.EDI & Optical Tax Records 8.UCC Article 4A 9.Electronic Healthcare Data 10. E-mail Privacy Says Nathaniel Borenstein of the seminar: "Electronic commerce, and particularly Internet commerce, is so new, and so different from what has come before, that there is an enormous amount of confusion, uncertainty, and misunderstanding surrounding it.The NCSA seminar manages to cut through a great deal of the fog and confusion and illuminate the underlying legal and technological realities that will shape the future of business. While participating as a guest lecturer in the seminar, I have been impressed at how much I have myself learned.I recommend this seminar to anyone who wants to better understand the shape of commerce to come." Tuition is $350 for NCSA members and $395 for non-members.(Group discounts are available.) The starting dates for the next sessions of the seminar are March 13, May 9, September 12 and October 24, 1995. Special Guest Lecturers: Nathaniel Borenstein, Chief Scientist, First Virtual Holdings Incorporated Richard K. Crone of KPMG Peat Marwick LLP, electronic banking expert Charles R. Merrill, Chair of the Computer and High Tech Dept., McCarter & English law firm For more information and a free brochure, contact: URL http://infohaus.com/access/by-seller/Benjamin_Wright /seminar.free.html National Computer Security Association 10 South Courthouse Ave. Carlisle, PA 17013 Tel: (800) 488-4595 Tel: (717) 258-1816 Fax: (717) 243-8642 74774.1326@compuserve.com Promotional support for this seminar is provided by First Virtual Holdings Incorporated, the leader in Internet payment systems. For more information, see URL http://www.fv.com or send email to info@fv.com. PLEASE FORWARD ->CN<- ____ /___/\ / /\ \/\ / /\/\ \/\ /_/\/__\ \/\ RTICLES: \_\/ \_\/ Book Reviews ------------ By Rob Slade Books ----------------------------------------------- 1. "Minding Your Cyber-Manners on the Internet" 2. "PGP: Pretty Good Privacy" 3. "Computer Networks" ----------------------------------------------- "Minding Your Cyber-Manners on the Internet", Rose, 1994, 1-56761-521-X Author: Donald Rose drose@pro-palmtree.socal.com Pub: Alpha Books, 201 West 103rd Street, Indianapolis, IN 46290 Pages: 194 Date: 1994 Price: U$12.99/C$16.99 Orders: 75141.2102@compuserve.com Ignoring the "smiley" books (BKSMILEY.RVW and BKSMLDCT.RVW) and one rather generic guide to grammar, out of the hundreds of books published so far on the subject of the Internet, this is only the second to be devoted to the etiquette of network communications (after Shea's "Netiquette", cf BKNTQUTT.RVW).It is a valuable and worthwhile addition. Coverage of the topic is very broad-ranging, although it is not, perhaps, complete.The material is very practical, with lists of do's and don'ts, summaries, and question-and-answer sections.Rose has a professional grasp of humour, and it is used extensively and effect- -ively throughout. The book is not without problems.There is a shortage of explanation of the "why" on various topics.There is a chapter on how flames start (and a pretty good one) -- but not until chapter six.Rose recommends against the spread of "dying child" letters--but doesn't explain the situation behind the Craig Shergold stories, nor the related "Neiman-Marcus cookie" legend or the "FCC Modem Tax" rumours. He mentions the frequent administrative mis-posts on mailing lists, but not how to avoid doing them. Some specific recommendations are questionable.He suggests the use of abbreviations and "cyberese" (the acronyms of common phrases, like BTW for "by the way") as a means of keeping messages short.This is no longer considered good etiquette, as it is highly confusing to new- -comers--and oldtimers as well, in certain cases.(In fact, the book contradicts itself at this point, recommending both for and against abbreviations, on a single page.) (Some may also consider the repeated promotion of Kent's "The Complete Idiot's Guide to the Internet" (BKIDTINT.RVW) and "The Complete Idiot's Next Step on the Internet" (sorry, haven't seen it yet) almost to constitute "spamming" within this book, itself.) I definitely recommend this work for all Internet users, and part- -icularly newcomers.I very much hope future editions will extend a work well begun. Copyright Robert M. Slade, 1995 BKCBRMNR.RVW 950120 ------------------------------------------------------------------------- "PGP: Pretty Good Privacy", Garfinkel, 1995, 1-56592-098-8 Author: Simson Garfinkel simsong@next.cambridge.ma.us simsong@expert.com Pub: O'Reilly & Associates, 103 Morris Street, Suite A, Sebastopol, CA 95472 Pages: 393 Date: 1995 Orders: 800-998-9938 707-829-0515 fax: 707-829-0104 info@ora.com or nuts@ora.com Part one of this guide to Phil Zimmermann's "Pretty Good Privacy" (universally known by its initials, PGP) contains two rather disjointed chapters introducing PGP, itself, and cryptography basics.After that rocky start, however, part two is both readable and rivetting.Chapters on the history of cryptography, the history and development of PGP, privacy, and patents gather both the technical and social aspects of PGP together in one place.The conceptual background for public key cryptography is presented both soundly and in a manner accessible for non-experts.The many controversies over PGP are presented in a very detailed manner. Part three, "Using PGP", has chapters on file encryption, key creation, key management, email encryption, digital signatures (authentication), key distribution and certification, and Internet key servers.The style of the nutshell books give a very "technical" look to the material, and in some cases the content is very terse in comparison to Stallings' "Protecting Your Privacy" (cf. BKPRTPRV.RVW).In others (such as key management), though, the text here is paradoxically clearer.In any case, the examples are straightforward and easily followed.(Readers may, however, be excused for failing to follow the explanation of Diffie-Hellman on page 356.) The appendices cover obtaining and installing PGP for MS-DOS, UNIX and Macintosh. Copyright Robert M. Slade, 1995 BKPGPGAR.RVW 950116 ------------------------------------------------------------------------- "Computer Networks", Black, 1993, 0-13-175605-2 Author: Uyless Black Pub: Prentice Hall Pages: 436 Date: 1993 Orders: (515) 284-6751 FAX (515) 284-2607 beth_hespe@prenhall.com This is a very complete and well organized text on data communications. The intent of the work is to address the components of a computer network system, and this succeeds quite well. (Those interested in network specific topics, such as routing, should look elsewhere.) Areas covered include introductory material, layered protocols, polling protocols, satellite networks, local area networks, packet switching, X.25, digital networks, a brief look at TCP/IP, personal computers, PBX and upper layer protocols.Additional reference material is included in the appendices. Occasionally, the material becomes too specific and shows signs of age. The chapter on personal computer networks uses concepts and jargon which will be quite foreign to those familiar with the micro field. By and large, however, this is an excellent source not only for a general overview, but as a reference in a number of data communications areas. Copyright Robert M. Slade, 1995 BKCMPNTW.RVW 950109 ->CN<- _____ / ___/\ / /\\\\/ / ___/\ / /\\\\/ /____/\ \\\\\\/ TC: Letters to the Editor: ---------------------- Regarding Last Weeks' Issue: =-=-=-=-=-=-=-=-=-=-=-=-=-=- > That something is probably one of the _most_ advanced branch > prediction/speculative execution facilities yet. The P6 will > be able to guess past five to seven branches at a time, if it > guesses correctly, it will get a speed boost, if it guesses > wrong, it slows down a bit. It'll slow down more than a bit if I'm running a debugger with a breakpoint in one of those speculative branches.It'll also be really fun to watch it run with certain memory mapped hardware peripherals which responds to mere accesses to their address space. :) -Dick Mills Power Technologies Regarding the "G_Kelly" thing: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Some of these people responding to the list server mix-up "technical term" are quite indignant. Think of this as an opportunity to meet people you otherwise wouldn't get to meet. I think we should rename the list server Hal, in memory of 2001, a space odyssey. -Ben C. Dixon Response: =-=-=-=-= This would be a good place to clarify just what happened in the G_Kelly thing: Someone (G_Kelly) tried subscribing to CN, but instead of sending it to majordomo@libtech.com, they sent the request to cn@libtech.com, the main distribution list for Computer News. They did this maybe twice, and this started a whole bunch of responses from people who (apparently) thought they were doing the "right thing". They tried to forwarding the subscribe message to me, but unknowingly forwarded back to the list. The resulting tidal wave of e-mail was sent over to everyone on the list, causing people to complain that their mailboxes were swamped with e-mail regarding "G_Kelly". The cycle was broken when we made CN a moderated list, thereby preventing anyone from posting to the list without my permission. Although I know it wasn't exactly her fault, the G_Kelly scandal caused maybe 15 people to unsubscribe. :( BTW, it *wasn't* the list-servers (majordomo's) fault that all this happened. So I guess you can forget about changing his name to "Hal" (For now, at least :) ->CN<- Classifieds ----------- The classified ad section is free for anyone who would like to post an advertisement. There is no real length limit, and anonymous post- -ings are accepted, as well as things not related to computers. By posting, your message will get to +/- 1500 people. NOTICE: PRODUCTS AND/OR SERVICES DISPLAYED HERE ARE NOT NECESSARILY THOSE ENDORSED BY COMPUTER NEWS. ---Begin Classified Ads--- ------------------------------------------------------------------------- ***************************** MISCELLANEOUS ***************************** ------------------------------------------------------------------------- Posted By: Computer News Server Subject: LIST OF SERVICES & FEATURES FOUND IN COMPUTER NEWS: Services: ========= Help with Windows Problems Help with DOS Problems Classified Ads Features: ========= Weekly News Reporting Weekly Book Reviews Monthly Internet Entertainment Reviews Humor Section "Lighter Side" Suggestions for any new features, services, or how we could improve any one of our features or services, can be directed to cnews@libtech.com. --- Posted By: krystyna@brax.se (Krystyna De Heras) Subject: Mrs PC memory --- ------------------------------------------------------------------------- ****************************** NETWORKING ******************************* ------------------------------------------------------------------------- Posted By: nac@planet.net Subject: BUY/SELL NEW/USED WAN PRODUCTS Information Data Products Corp; we specialize in new and refurbished wide area networking products such as modems, DSU/CSU's, T-1 , Bridge/Router and other products. We are looking to buy / sell any used hardware of this type. For company info e-mail: wan-info@planet.net or http://www.planet.net/idpc Thanks --- ---End Classified Ads--- ->CN<- __ / /\ / / / / /_/_ /_____/\ \_____\/ ighter Side -------------------- Hello... After having an onion thrown at us, we decided to change the Lighter Side around a bit... (And please, no more onions... It starts to smell after awhile. ;) C'Mon, Governor, Just _one_more_ round... ----------------------------------------- "...but it came too late for the the state of Virginia, where addiction to Solitaire (and other computer games) among state workers had reached epidemic proportions. Finding his bureaucrats sorting aces and kings instead of processing hunting licenses and some such, the Governor ordered these amusements expunged from all government computers to save the state from massive waste, if not total collapse." -- Charles Krauthammer, TIME Magazine Are they still ALIVE? --------------------- "The EDLIN Group" -- Name of local PC repair shop Bzzzzzz...Bzzzzzzz...ClickClick...Bzzzzz ---------------------------------------- "Programmers can be domesticated the same way beekeepers tame bees" -- Orson Scott Card, Windows Sources Hey Bobby, here's that floppy you asked for... ---------------------------------------------- "So the kid walks in, hands the clerk $10, and asks for a floppy disk. Now in those days, floppies were not 5.25 inches, but 8. The kid takes the floppy, folds into four parts, stuffs it into his back pocket, and leaves..." -- Unknown Those durn floppies... ---------------------- [Brrrrriiiiinnnnggg! I pick up phone] Tech: Acme Tech Support, how may I help you? Man: Yeah, these floppies... Sure aren't the most reliable medium to back up a hard disk on... Tech: What do you mean? Man: Well, y'see... I wrote a story about a duck, and saved it on a disk. Tech: Uh-huh... Man: And the next morning, I loads up the durn thing, and the disk is blank!!! Tech: Well, ummm... Man: An' I was wondering, if yous could come over here an' see what's wrong... Tech: Ok. [2 hours later...] Man: See, here's where I keeps ma floppies... [He pulls off a white, revealing several floppies clamped to a metal closet with a large bar magnet.] ->CN<- ------------------------------------------------------------------------- ALL TEXT CONTAINED HEREIN IS COPYRIGHT (C) 1995 BY OLCAY F. CIRIT, EXCEPT WHERE SPECIFIED OTHERWISE. ALL TRADEMARKS/COPYRIGHTS CONTAINED HEREIN, MARKED OR UNMARKED, BELONG TO THEIR RESPECTIVE OWNERS.THE TEXTS CONTAINED HEREIN MAY BE REDISTRIBUTED PROVIDED THAT THE ARTICLE REMAIN INTACT AND THAT PROPER RECOGNITION BE GIVEN TO COMPUTER NEWS. THIS ARTICLE MAY NOT UNDER ANY CIRCUMSTANCES BE RESOLD OR REDISTRIBUTED IN ANY FORM FOR ANY COMPENSATION OF ANY KIND WITHOUT PRIOR WRITTEN PERMISSION FROM MR. OLCAY F. CIRIT. ------------------------------------------------------------------------- To SUBSCRIBE to Computer News, send e-mail to majordomo@libtech.com with the following in the body of the message: subscribe cn To UNSUBSCRIBE from Computer News send e-mail to majordomo@libtech.com with the following in the body of the message: unsubscribe cn ------------------------------------------------------------------------- Suggestions/Submissions/Comments may be directed to ------------------------------------------------------------------------- Computer News is edited by Olcay Cirit