Lines=117 The Computer Underground Digest Volume 2 \CUD2\cud201a.txt 5441 Moderators Corner \CUD2\cud201b.txt 11453 Proposed Changes in Computer Abuse Act(S.2476) \CUD2\cud201c.txt 3158 CPSR Seeks FBI Data on BBS Monitoring \CUD2\cud201d.txt 9252 Computers,Social/Political Actions \CUD2\cud201e.txt 3809 Another Experience with the SS \CUD2\cud201f.txt 7800 CU in the News \CUD2\cud202a.txt 3828 Moderators Corner \CUD2\cud202b.txt 6480 Musing over Operation Sun Devil \CUD2\cud202c.txt 1893 IPCO BBS Back On-Line \CUD2\cud202d.txt 17895 CUD Index Vol.1 (No's 1.00 thru 1.29) \CUD2\cud202e.txt 17018 CU in the News \CUD2\cud203a.txt 3136 Moderators' Corner \CUD2\cud203b.txt 23119 Len Rose's Experience with the S.S \CUD2\cud203c.txt 14287 Tim Wolson's Address & cite list \CUD2\cud203d.txt 8653 A Comment on Zod's Case \CUD2\cud204a.txt 4836 Moderators Corner \CUD2\cud204b.txt 1915 RE: Evidence (was RE:Musing Constitutionality) \CUD2\cud204c.txt 5175 Why The FBI Should Be Concerned About the S.S \CUD2\cud204d.txt 8688 California Computer Abuse Law Revisited \CUD2\cud204e.txt 3396 Candidate for Gov. Supports Electronic freedom \CUD2\cud204f.txt 7274 Review of Steven Levy's CLOAK & DAGGER \CUD2\cud204g.txt 6930 CU in the News \CUD2\cud205a.txt 3804 Moderators Corner \CUD2\cud205b.txt 1328 Re: CU in the News (Mail Reading) \CUD2\cud205c.txt 4256 Anarchist Times Inc. (ATI) Background \CUD2\cud205d.txt 5013 The Status of the Electronic Forum (BBS) \CUD2\cud205e.txt 6004 Another Experience with the Law \CUD2\cud205f.txt 6553 What to do if Questioned by LE Agents \CUD2\cud205g.txt 10797 CU in the News \CUD2\cud206a.txt 3326 Moderators Corner \CUD2\cud206b.txt 3357 From the Mailbag \CUD2\cud206c.txt 11434 MARS BBS Sting a Prank \CUD2\cud206d.txt 8940 Another View of Hacking \CUD2\cud206e.txt 9123 CU in the News \CUD2\cud207a.txt 3627 Moderators Corner \CUD2\cud207b.txt 3023 Re:IBM Mainframe Trojan Repost (Christma EXEC) \CUD2\cud207c.txt 3542 CPSR Annual Meeting (Oct 20-21 1990) \CUD2\cud207d.txt 1728 Electronic Frontier Foundations Hires Counsel \CUD2\cud207e.txt 9326 13th Annual Nat'l Computer Security Conf Pt.1 \CUD2\cud207f.txt 16458 13th Annual Nat'l Computer Security Conf Pt.2 \CUD2\cud207g.txt 4589 Summery of Computer Ethics (Book) \CUD2\cud207h.txt 6644 Introduction to Toxic Shock \CUD2\cud208a.txt 3153 Moderators Corner \CUD2\cud208b.txt 4449 From The Mailbag \CUD2\cud208c.txt 4758 Prodigy, Problems & Censorship \CUD2\cud208d.txt 10749 Censorship on Nets \CUD2\cud208e.txt 17988 PC's and Political Action \CUD2\cud209a.txt 3857 Moderators Corner \CUD2\cud209b.txt 1703 Len Rose Arrest \CUD2\cud209c.txt 2785 Mars was not "Censored" \CUD2\cud209d.txt 8496 Response to Mars "Censoring" \CUD2\cud209e.txt 5499 Steve Jackson Games (SJG) Update \CUD2\cud209f.txt 5897 Future of Hacking & System Security Proffession \CUD2\cud209g.txt 10521 The Ultimate Interface:Hackers & Private Sector \CUD2\cud209h.txt 7997 CU in the News Hackers Blackmail British Bank \CUD2\cud210a.txt 4389 Moderators Corner \CUD2\cud210b.txt 2260 Len Rose Funds-A Humanitarian Necessity \CUD2\cud210c.txt 3416 EFF Seeks Executive Director \CUD2\cud210d.txt 13237 Massachusetts Computer Crime Bill \CUD2\cud210e.txt 3306 Re: C-u-D #2.09 Censoring of .GIF's \CUD2\cud210f.txt 1983 The Piratical Dilemma \CUD2\cud210g.txt 2298 Obtaining Identification Cards \CUD2\cud210h.txt 4239 Logisticom vs. Revlon \CUD2\cud210i.txt 8845 In-House Security Problems \CUD2\cud211.txt 41543 Special Issue-Steve Jackson Games \CUD2\cud212a.txt 7839 Moderators Corner \CUD2\cud212b.txt 3169 PhD Candidate Seeks Info on CuD \CUD2\cud212c.txt 3578 Riggs, Darden, and Grant Sentenced \CUD2\cud212d.txt 8475 Prodigy Saga Continues \CUD2\cud212e.txt 5786 Re: Response to Mars "Censoring" \CUD2\cud212f.txt 3211 Response to SJG Affidavit (Part 1) \CUD2\cud212g.txt 3583 Warrants Schmarrants! The S.S. is Crazy \CUD2\cud212h.txt 4487 More Guidlines-on What to do if Busted \CUD2\cud212i.txt 11204 CU in the News-England & Emma Nicholson;VOGON \CUD2\cud213a.txt 4834 Moderators Corner \CUD2\cud213b.txt 17924 EPIC (Effective Performance in Candidates) \CUD2\cud213c.txt 10711 The Riggs Sentencing (Reprint From Newsbytes) \CUD2\cud213d.txt 5456 First Conf. on Computers, Freedom & Privacy \CUD2\cud213e.txt 5748 Hackers Break into DEA Lines \CUD2\cud214a.txt 3976 Moderators Corner \CUD2\cud214b.txt 6682 Len Rose Indicted \CUD2\cud214c.txt 1917 CPSR's FOIA request from the FBI \CUD2\cud214d.txt 5944 Int'l Information Retrieval Guild \CUD2\cud214e.txt 7406 A Note on Censorship \CUD2\cud214f.txt 11830 Two Comments on Prodigy \CUD2\cud214g.txt 4428 Dont Talk to Cops \CUD2\cud214h.txt 7074 Response to DEA/PBX News Story \CUD2\cud215a.txt 3479 Moderators Corner \CUD2\cud215b.txt 8050 Len Rose Indictment in Illinois \CUD2\cud215c.txt 5837 2600 Response to Atlanta Sentencing \CUD2\cud215d.txt 6816 List of Computer Underground Clippings \CUD2\cud215e.txt 3655 Computer Crime Laws List \CUD2\cud215f.txt 9727 Media and the CU \CUD2\cud215g.txt 10314 The Hermetic Underground \CUD2\cud216.txt 38162 Special: Atlanta 3 Sentenced \CUD2\cud217a.txt 3849 Moderators' Corner \CUD2\cud217b.txt 5388 From the Mailbag \CUD2\cud217c.txt 13066 EFF Response to Atlanta Sentencing \CUD2\cud217d.txt 5755 Thoughts on Atlanta Sentencing \CUD2\cud217e.txt 4072 Earning Your Stripes \CUD2\cud217f.txt 7049 Playground of the Mind: Cyberspace \CUD2\cud217g.txt 11371 CU in the News \CUD2\cud218a.txt 6822 Moderators' Corner \CUD2\cud218b.txt 9833 From the Mailbag \CUD2\cud218c.txt 5460 Computers Under Attack \CUD2\cud218d.txt 17035 CU Resources in Germany \CUD2\cud218e.txt 12197 Trade Secrets: When Are They Bad? \CUD2\cud219a.txt 5022 Moderators' Corner \CUD2\cud219b.txt 10263 From the Mailbag \CUD2\cud219c.txt 8677 Telecoms Ripping Off BBS's? \CUD2\cud219d.txt 8513 Michigan Bell vs. BBS's \CUD2\cud219e.txt 7631 Clarification on Modem Licensing \CUD2\cud219f.txt 5779 a.k.a. Freedom of Expression \CUD2\cud219g.txt 5394 Z-modem Virus Alert