DEADKAT [Editor's note: This stuff here is published to humor you. We do not in any way condone cruelty to any animal. This was found when one of our editors randomly fingered an account. If you've been into the hacking/phreaking scene for a while (at least since the 80's) like us (the editors) you will understand all of this...if not, just read it.] [GeeK-Speak mode: ON] (#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#) (#) (#) (#) /|narkiztik / \ ^ / ONE OF THOSE GREENPEACE OR SPCA FAGGOTZ THEN PHuCK YEW | | PANZIE, GO WATCH 101 DALMATIONS OR SUMTHING @!!@# / \ ====================================================== | . . | (" " ) ONE OF MY FAVOURiTE METHODZ OF KAT EXTERMINTATION IS A PLAY ON THE OLD HOCKEY KARD IN THE SPOKES OF YER BICYCLE TO MAKE A KEWL SOUND THING, IF YEW HAVE NEVER DONE THIS BEFORE WHAT ESSENTIALLY YOU DO IS AFFIX A HOCKEY KARD TO YER SPOKES AND AS YOU PEDAL IT MAKES A KEWL KLICKING SOUND.. WELL THIS IZ FOR PANZIE FAGGOTZ #@!@ IF YER KEWL WHAT YEW DO IZ TAKE A LiVE KAT aND AFFIX IT TO THE SPOKES OF YER BIKE AND PEDAL AROUND TOWN VIGOROUSLY, NOT ONLY DOEZ IT SOUND KEWL BUT ALSO YOU GET SUM CHOICE LOOKZ FROM ANYONE YOU HAPPEN TO PASS BY !@#@! [NoTe: Thiz method will not work on bikes without spokes, ie: big wheels, if you own a big wheel: get some skipping rope and tie one end to the kat and the other end to the back of your big wheel, position yourself at the top of a big hill and pedal downward vigorously] ANOTHER FAVOURITE OF MINE REQUIREZ ACCESS TO YER SCIENCE TEACHERS STOREROOM OR SOMEPLACE WHERE YOU KAN AQUIRE LARGE AMOUNTS OF PURE POTASSIUM. BASICALLY WHAT YOU DO IS SHOVE LARGE AMOUNTS OF PURE POTASSIUM DOWN THE CATS THROAT AND THEN ONCE IT IS SUFFICIENTLY STUFFED WHIP IT INTO THE BATHTUB WHEN YER MOTHER IS HAViNG A BATH OR EVEN INTO A PUBLIC SWIMMING POOL. YOU WILL REVEL IN THE XPLOSION OF KAT FUR AND INTESTINES THAT WILL RESULT FROM SUCH ELEETNEZZ.. IN KASE YOU DONT KNOW, POTASSIUM + h2o (water) kauses a minor xplosion. THE MORE PURE POTASSIUM YEW STUFF THE KAT WITH THE BETTER THE BOOM. [NoTe: Another play on this method iz to stuff the kat with the potassium and then remark to your mom that the kat looks like it needz a bath, when yer mom immerses the kat in water *B00M*.. hehe If you want to be elaborate, talk to your mom alot about spontaneous combustion, fill her head with lotz of horror stories about it then proceed with the plan... it will take her weekz to recover from the shock when FeFe goez BooM-BooM] [NoTe#2: ThiZ meth0d iz loadz of fun when you employ one of th0se panzie 'throw in yer quarterz' publik fountainz as yer detonator] DEW YEW HAVE A MIKROWAVE ?!?!? iF SO THiS NEXT MeTHOD IZ DEFINITELY THE THiNG TEW DEW ON THoZE RAiNY SUMMER DAZE WHEN YEW R BORED OUT OF YER MIND @!#@! EYE AM SURE BY NOW YEW R BORED OF MERELY JAMMiNG YER FAVOURiTE FELiNE iNTO THE MiCROWAVE ON HIGH FOR 10 MiNUTES, WELL HERE iZ A METHOD WHICH ADDZ SUM EXCiTEMENT !@#!@ WHAT YEW WiLL NEED BESiDES THE OBViOUS KAT AND MiCROWAVE iZ: a) YER MOTHERZ FAVOURiTE PEARL NECKLACE. b) A SHiTLOAD OF POPKORN KERNELZ !@#!@ STRiNG THE PEARLZ AROUND THE KAT, THROW IT IN THE MiCROWAVE AND THEN FiLL THE MiCROWAVE WiTH POPKORN... KLOSE THE DOOR, CRANK IT ON HIGH AND RUN LiKE HELL #@!# THiS METHoD iZ VERY MESSY #!@# THE RESULTANT EXPLOSION WiLL B MAMMOTH SEW MAKE SURE NOONE IZ AROUND BuT YEW WHEN YEW DEW THiS ONE !@#@! THiZ ENDZ PART ONE oF THE FELiS-MoRTiSiKON #@!# PHUCK YEW !@#@! WATCH FER MORE QUALiTY [ANuS] PHiLeZ KUMMING YER WAY SooN !@# GREETZ GOEZ OUT TEW: SKAR-TiSSUE, MuTiLaTeD-KaT [FEaR] SPECIAL GREETZ GOEZ OUT TEW ALL [FEaR] MEMBERZ @!#@! FeLiNe Exterminatorz/Anarkistik R0dentz 0H SHiT!@# THAT REMiNDZ ME, EYE FORGOT TO MENTION ANARKYKON @!# OK: ========================== = ANARKYKON '94 = ========================== EYE ARRiVED AT THE CONVENTION CENTER AROUND 5PM JUST AS SEVERED LiMB AND DEMONiKiZT WERE HEADiNG OUT TO GO TRASHiNG AT SMITH AND WESSON, LUCKiLY THEY HAD ROOM FOR ME, SO OFF WE WENT.. THE THREE OF US SPED OFF TOWARDZ THE SMITH AND WESSON BUILDING IN DEMONiKiZT's VAN AT QUITE A FRANTiC PACE ONLY STOPPING AT A RED LiGHT ONCE TO PuLL OVER AND MaCE AN OLD LADY WHO WUZ STaNDiNG ON A KURB.. OK, WE ARRiVED AT SMiTH AND WESSON JUST AZ THEY WERE KLOSING SO WE WAiTED OUTSIDE IN THE VAN UNTIL THE LAST EMPLOYEE HAD LEFT, AT WHICH POINT DEMONIKiZT LEAPED OUT WiTH SEVERED LiMB AND EYE IN TOW, WE MADE A QUIK B LiNE TO THE DUMPSTER AND EYE LEAPED iN.. SEVERED LiMB LiT A SMOKE BOMB TO PROViDE US WITH SUM DEGREE OF COVER AND QUICKLY JOINED ME iN THE DUMPZTER @!# WE SiFTED THROUGH THE MEZZ AND ALL WE GOT WERE A FEW SHELL CAZINGZ AND EYE FOUND SUM PRiNTOUTZ FER A LAZERSKOPE PLANS OR SUMTHiNG #@!# OK BACK TO THA KONVENTION CENTER #!@# WHEN WE ARRiVED WE WERE GiVEN OUR NAMETAGZ AND SHuFFLED OFF TEW A ROOM WHERE A FEW TALKZ WERE GIVEN ON TERRORIZM AND A FEW BORING LEKTUREZ ON SNEAKING INTO BUILDINGZ AND LOCK PICKING #!@ EYE RAN INTO RANCiD MEAT AT THE LEKTUREZ AND HE INVITED ME UP TO HIZ ROOM TO LOOK AT HIZ CHEMICAL WEAPONS, WHEN WE GOT UP THERE HE SUGGEZTED WE TEAR GAZ THE LOBBY, WHICH WE DID... NEEDLEZZ TO SAY THE POLIZE SHOWED AND THA KONVENTION ENDED EaRLY @!#!@ PHUCK YEW !@#@! EYE GOTTa GO NOW.. D-CeLLeRaTiON TRaUMA [ANuS] '94 $@#!$#@$@$^M %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% EFF PERSONNEL ANNOUNCEMENTS By Stanton McCandlish (mech@eff.org) FOR IMMEDIATE RELEASE Personnel Announcements at EFF. Contact: EFF: Andrew Taubman , +1 202 861 7700 The Electronic Frontier Foundation (EFF) announced today several significant personnel changes. EFF is a non-profit, public interest organization that seeks to protect and enhance the growth of "Cyberspace" (the Global Information Infrastructure) as a diverse, free, responsible and empowering environment. David Johnson has been named Chair of the EFF Board of Directors and Senior Policy Fellow of EFF. Johnson, an EFF Board member since 1993, has been practicing computer law with the Washington, DC, law firm of Wilmer, Cutler & Pickering. He has direct experience with computer networks as Chairman of LEXIS Counsel Connect (an on-line system for lawyers). He joins Andrew Taubman, Executive Director and Chief Operating Officer, who began at EFF in September of 1994. Esther Dyson has been named Vice-Chair and will serve on the EFF Executive Committee. Dyson is President of EDventure Holdings Inc., a venture capital firm focused on emerging information technologies, particularly in Eastern Europe. Dyson is a member of the US National Information Infrastructure Advisory Council, has board memberships at the Global Business Network, Perot Systems, the Santa Fe Institute, and is a founding member of the Software Publishers Association. Johnson and Dyson join David J. Farber and Rob Glaser on the EFF Executive Committee. Farber holds the Alfred Fitler Moore Professorship of Telecommunications at the University of Pennsylvania, is a fellow at the Annenberg School for Public Policy and at the Glocom Institute in Japan and was one of the creators of many of the parts that evolved into the modern Internet - such as CSNet, CREN, and NSFNet. Glaser is President and CEO of Progressive Networks, an interactive media and services company and serves on such boards as the Foundation for National Programs and the Washington Public Affairs Network. EFF co-founders Mitchell Kapor (immediate past Chair) and John Perry Barlow (immediate past Vice-Chair) remain Directors and will continue to participate actively in the development and implementation of EFF policy programs. Also announced, Jerry Berman, who held the position of Policy Director, has left EFF. Janlori Goldman and Daniel Weitzner, who have worked closely with Mr. Berman over the years, and other policy staff members, also have left to establish with Mr. Berman a new organization to be called the Center for Democracy and Technology (CDT). EFF wishes CDT success in its new venture and thanks Jerry and his colleagues for their substantial contributions over the past three years. In 1995, EFF will continue to pursue its policy mission of protecting the health and growth of the global computer networks. The 1995 policy agenda includes such projects as an innovative new "State of the Net" report; studies of the implications of the global nature of the net for jurisdictional and governance questions; a study of the protection of intellectual property on networks; and efforts to preserve the free flow of information across the Global Information Infrastructure. EFF expects to continue to intervene actively to counter threats to computer-mediated communications networks, and virtual communities, such as limitations on the use of cryptography and intrusions into personal privacy, as it has in previous years. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% READER FEEDBACK [Editor's note: This is a response form one of our readers in reply to the 'Porn On The Net' article we ran in the last issue] By Michael Stutz (at118@po.cwru.edu) Hello-- I didn't see a Letters section in this issue [vol i, issue 6] and I really hadn't intended on writing one, but that article -- Paul Pihichyn's rant on porn -- was so stupid I had to say *something*. Calling it all those names ("filth," "slime," etc) made it immediately suspect. What are these things he's talking about? Naked people. People without their clothes on. What's so filthy and slimy about that? Nothing. His fears about exposing porn to children are silly; what children know how to uudecode, assemble and view an image? None that *I* know. Besides, what would happen if a child saw a picture of a naked woman? What would happen? Probably nothing much. Maybe (s)he'd laugh, I don't know. While I'd hardly recommend throwing porn into the laps of kids, we have to remember that it doesn't do much for them, either. We're all naked and we all have sex. That this guy suggested that we don't 'need' groups like alt.sex is more than ridiculous -- it tells me that there's a lot of people out there (like him) who need help. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CALL SECURITY, PUBLIC KEY VOICE CRYPTOGRAPHY FAQ By Neil Johnson (njj@pokey.mc.com) Call Security, Public Key Voice Cryptography FAQ ------------------------------------------------ Call Security is a shareware program which provides public key cryptography for voice telephone conversations. In other words private phone conversations. Like as in voice scrambling. All you need is a modem, a sound card, PC, and someone to talk to (with the same). This my first version of the Call Security FAQ. Its very brief but should get you going if you plan to use it. If you have suggestions, comments, or criticism, please let the current editors know by sending e-mail to njj@mc.com. Things like, bugs, sound card how to, modem init. strings etc... are especially welcome. Many thanks to David Colston, Charlie Merritt the authors of Call Security. These guys have been sharing info with me regarding this program in the many months prior to its release. This is the very first & rough draft version of this faq. Some things are sure to be missing, just plain wrong, etc... Your get the point. Trust only what can you verify yourself. This faq is actually bound to create more questions than it answers. Hopefully it gets you to use Call Security. Call Security FAQ Author Neil J. Johnson, email njj@mc.com Table of Contents ----------------- 1. Overview, what is Call Security? 2. How well does it sound? 3. What kind of hardware do I need? 4. Where do I Get Call Security? 5. Quick, can you tell me how to run it step by step? 5.1 Ok how do I stop talking now? 6. How Does It Work? 7. What public key algorithm does it use? 8. Is it really secure?, You, decide! 9. Is it safe to give them my public key when i upgrade from shareware (512 bit key) to the registered version (1024 bit key)?, Yes, its only the public key! 10. How do I set up my sound card? 10.1 How do I set up my Gravis Ultrasound? 11. My modem is full duplex why isn't Call Security? 12. Are there any bugs in the program? 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security? Answers to Questions -------------------- 1. Overview Well Call Security (CS) turns your ordinary PC into a very secure voice telephone. CS also works as a general purpose data comm. program with zmodem support, ansi/vt100 terminal, & regular unencrypted digital voice. Call Security is also a general purpose public key cryptography program for encrypting/decrypting any computer file (like email). 2. How well does it sound? The sound quality varies depending upon how many (compressed) samples per second your hardware can do. Here is a little chart. Sample rates: 7600 Acceptable 10000 sounds like good CB Radio (486 with 14.4bps modem) 16000 Real sweet 3. What kind of hardware do I need? The minimum recommended system is a 386sx with a 9600bps modem & a sound blaster compatible sound card. A 486 system with a 14.4bps modem is recommended. A 28.8bps modem is still even better! You should also have a copy of pkunzip to uncompress the program if you get a zipped copy off the Call Security BBS. 4. Where do I Get Call Security? Right now the only place to get it is at the following BBS phone number. Note I didn't see any support for kermit transfers. I recommend using zmodem protocol. Call Security BBS 1 (501) 839 - 8579 - Give your full name. - The password is "security" - Use the "d" command to download - select transfer type like "z" for zmodem (sorry no kermit support) - enter file name "callsec1.zip" - put your comm program in zmodem mode (automatic for most comm programs) 5. Quick, can you tell me how to run it step by step? - DOS stuff >mkdir callsec1 >pkunzip callsec1 >pkunzip software - I recommend printing the documents, readme.1st, security.doc, svterm.doc. - If your in windows exit now. - determine which comm port your modem is on & determine the address & IRQ. The DOS command msd.exe (Microsoft Diagnostic) can help with this task. Write this down for later. - determine the address of your sound card. Write down for later use. - If you don't have a sound blaster then put you sound card in sound blaster emulation mode. - type "security" at the dos prompt. - Your now in the security program. Select option A. Make My Own Secret & Public Keys (cursor to & hit return) - Now unfortunately CS makes public key exchange a hassle. You need to extract your public key from your key list it (& uu encode it optionally), and give it to the person you wish to talk to with CS. The first 2 steps can be done with the menu picks. The last part can be done with CS zmodem, if you happen to have the DSZ shareware program. Since this is a quick start guide lets skip this for now and use password encryption instead. If you don't want to skip the public key stuff read the documentation. - Use menu pick J. Go To Secure Voice Terminal You will be prompted for info on you modem set up & sound card setup. Just enter the info as it comes up. For sample rate select 10,000 samples per sec. for a 14.4 modem, 16,0000 for a 28.8, & 7,600 for a 9,600. Note: if you have a 386 16/SX machine don't go over 8,000 samples per second. - When your done setting the modem & sound card you will be a menu for where to go next. Hit the return key. You will be popped into the comm. program/terminal emulator. - Now it time for one person using CS select auto answer mode & the other CS to dial. - the auto answer person/side presses function key F8 - the caller does the following: press function key F6. Enter name & number of person you plan to dial. Note: field are separated with spaces, tab keys won't work. Now dial, directions are on the screen to do this (I think you just hit the return key). - The machines will now connect. Anything you type will go on their screen. Anything they type will go on your screen. Note, this text is not encrypted. - When your ready to talk hit alt-s on you key board. Then select password mode (or public key if you've done public key exchange). Each side now enters the same secret password (like hello). - On your screen it will either indicate that your listening or talking. to toggle listening/talking hit the space bar. To end the session hit the esc key. Note: it helps if you use it like a CB & say over while you hit the space key (when your done talking). 5.1 Ok how do I stop talking now? Well If your talking you must hit the space key to become the listener. To end a voice session & go back to the terminal chat mode, you must hit the key while you are in talk mode. 6. How Does It Work? In laymans terms, each person who uses CS has two keys, a matched pair. One is public & the other is private. The way program works is public key are used to encrypt voice (or computer files/email). Private keys are used to decrypt the voice. Hence know one can listen in on a conversation (or computer file/email) that was meant for you (encrypted with your public key). However you still have to trust the person you are talking to! 7. What public key algorithm does it use? No CS doesn't use the RSA [Rivest, Shamir, and Adleman] public key cryposystem as featured in PGP. A bonus feature of not using RSA is the avoidance of RSA patent restrictions. CS uses QPK Quick Public Keys by David Colston. This public key system has been reviewed by Whit Diffee, Gus Simmons (Sandia Labs), and posted on sci.crypt. On the plus side QPK is fast. On the down side the CS implementation of QPK does not support digital signatures. FYI, Digital signatures are signed with private keys & verified with public keys. Like virtually all public key systems CS uses QPK to encrypt a random (private) session key, The session key is then used to encrypt the voice conversation. This is because public key systems are too slow for realtime voice. The private (session) key encryption algorithm uses a very long many bit linear feedback shift register LFSR pattern which is xored with the voice data. To greatly increase the security, only short (many times less than the LSFR total length) sequences of this LFSR are used between transmission of a new (really) random seed for the LFSR. Hence a random seed constantly restarts the LFSR at truly random points in the sequence. Well I'm sure I didn't do justice to the crypto stuff, but its a start. If you want to know more general info read the cryptography-faq. It can be found in news groups sci.crypt, talk.politics.crypto, sci.answers, news.answers, talk.answers. Another good faq is pgp-faq found in news groups alt.security.pgp, alt.answers. Once you have read these faqs you will have to consult the authors of CS for more specific info on the various crypto features of CS and QPK. 8. Is it really secure?, You, decide! Well the public keys system used by Call Security, QPK ( Quick Public Keys) by Dave Colston has survived peer review. This is good. Charlie Merritt did the single private key stuff. I described this algorithm briefly (from a phone conversation) in question 7. Maybe this needs further public review? Also we don't have the source code so its hard to check for trap doors. I don't know what their motivation for a trap door is however. They want to make money off this thing. Plus all the normal stuff needs to be considered, like did some one put a bug (transmitter) in you sound card microphone, did they break in and steal the private key off your harddrive/ floppy drive, etc... Well you decide if you think call security is secure. I think it is but what do I know? Only time will tell how secure CS really is. 9. Is it safe to give them my public key when i upgrade from shareware (512 bit key) to the registered version (1024 bit key)?, Yes, its only the public key! Yes, the authors only want half of your public key. This public key is then used to create a file which enables receiving encrypted voice with your larger key. Note: Non-registered versions work just fine with registered users with large keys. 10. How do I set up my sound card? Well if you have an original mono 8 bit sound blaster you do nothing. If you don't have a classic sound blaster then you should put you sound card in sound blaster (8 bit mono) emulation. Please send me email njj@mc.com on how you set up your sound card to work with CS. I will add the info to this faq. 10.1 How do I set up my Gravis Ultrasound? Ultrasound cards have two sound blaster emulators. Only the SBOS emulator works with Call Security. Don't use MEGAEM. Before you run Call Security "SECURITY.EXE" Just exit windows & type SBOS at the DOS prompt. You should here the words SBOS installed on your sound card speakers, plus you will see confirmation of SBOS loading on your computer screen. If SBOS doesn't work consult your ultrasound documentation. Or read the gravis faq found on the news group comp.sys.ibm.pc.soundcard. Other sights for gravis sound card info include: FTP Sites Archive Directories --------- ------------------- Main N.American.Site: archive.orst.edu pub/packages/gravis wuarchive.wustl.edu systems/ibmpc/ultrasound Main Asian Site: nctuccca.edu.tw PC/ultrasound Main European Site: src.doc.ic.ac.uk /packages/ultrasound Main Australian Site: ftp.mpx.com.au /ultrasound/general /ultrasound/submit South African Site: ftp.sun.ac.za pub/packages/ultrasound Submissions: archive.epas.utoronto.ca pub/pc/ultrasound/submit Newly Validated Files: archive.epas.utoronto.ca pub/pc/ultrasound Mirrors: garbo.uwasa.fi mirror/ultrasound ftp.st.nepean.uws.edu.au pc/ultrasound ftp.luth.se pub/msdos/ultrasound Gopher Sites Menu directory ------------ -------------- Main Site: src.doc.ic.ac.uk packages/ultrasound WWW Pages --------- Main Site: http://www.cs.utah.edu/~debry/gus.html Main European Site: http://src.doc.ic.ac.uk/packages/ultrasound/ Main Australian Site: http://ftp.mpx.com.au/archive/ultrasound/general/ http://ftp.mpx.com.au/archive/ultrasound/submit/ http://ftp.mpx.com.au/gravis.html Mirrors: http://www.st.nepean.uws.edu.au/pub/pc/ultrasound/ 11. My modem is full duplex why isn't Call Security? The simple answer is sound blasters (and virtually every other sound card known to the program authors) are not full duplex. You can't sample digital sound at the same time you are playing digital sound! But if the authors, Dave & Charlie start making money off Call Security maybe they will be motivated to do a version with 2 sound cards, one for record the other for playback. 12. Are there any bugs in the program? Well one very minor bug is the wrong help file (security.doc) pops up when you request help in the terminal session of the program. What you really want to see is the svterm.doc file when trying to figure out how to send/receive voice messages. As I stated before print the documentation files svterm.doc, securty.doc, & readme.1st before running the program. Remember the Call Security is not windows compatible, so you can't have help in one window and call security in the other window! Another feature I find annoying is that public key exchange is not built in to the voice session. Okay maybe public key exchange is not something you want to do for every call (to prevent forgery) but at least make it a non-default menu pick! The best work around is to pull a copy of DSZ or GSZ off one of the shareware sights. This will allow Secure Voice to perform file exchange. Then use DSZ to exchange public keys prior to running a voice session. 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security? I haven't tried personally tried DSZ or GSZ yet. But here is one FTP sight (the SIMTEL primary mirror sight) I downloaded DSZ from while writing this faq: FTP Location: oak.oakland.edu: /pub/msdos/zmodem dsz-read.me A 516 890115 Explains what DSZ program is dsz0920.zip B 91253 940930 X/Y/Zmodem protocol file transfer pgm txzm241.zip B 42734 941005 Texas Zmodem: Fast/free Zmodem prot. driver gsz0920.zip B 112428 940930 X/Y/ZMODEM driver with graphic file xfer For more info on shareware sights read the news group comp.archives.msdos.announce. Other SIMTEL mirror sights include: St. Louis, MO: wuarchive.wustl.edu (128.252.135.4) /systems/ibmpc/msdos Corvallis, OR: archive.orst.edu (128.193.2.13) /pub/mirrors/simtel/msdos Australia: archie.au (139.130.4.6) /micros/pc/oak England: src.doc.ic.ac.uk (146.169.2.10) /pub/packages/simtel Finland: ftp.funet.fi (128.214.248.6) /pub/msdos/SimTel France: ftp.ibp.fr (132.227.60.2) /pub/pc/SimTel/msdos Germany: ftp.uni-paderborn.de (131.234.2.32) /SimTel/msdos Hong Kong: ftp.cs.cuhk.hk (137.189.4.57) /pub/simtel/msdos Israel: ftp.technion.ac.il (132.68.1.10) /pub/unsupported/dos/simtel Poland: ftp.cyf-kr.edu.pl (149.156.1.8) /pub/mirror/msdos South Africa: ftp.sun.ac.za (146.232.212.21) /pub/simtel/msdos Sweden: ftp.sunet.se (130.238.127.3) /pub/pc/mirror/SimTel/msdos Switzerland: ftp.switch.ch (130.59.1.40) /mirror/msdos Taiwan: NCTUCCCA.edu.tw (140.111.1.10) /PC/simtel Thailand: ftp.nectec.or.th (192.150.251.33) /pub/mirrors/SimTel/msdos %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% THERE IS A BODY ON THE INTERNET From Uncle Bob's Network News #103 There is a body on the Internet! At the annual meeting of the Radiological Society of America in Chicago on November 18, 1994, the National Library of Medicine unveiled its "Visible Man," a three-dimensional, computer-generated cybernetic body, which is now available on the Internet. "Visible Man" is an atlas of the human body, assembled digitally from thousands of x-ray, magnetic, and photographic images of cross sections of the body of Joseph Paul Jernigan, who was executed in Texas for murder, and who had willed his body to medical science. Using digitalized radiological data from the cadaver, researchers at the Heath Science Center of the University of Colorado, under a project funded by the NLM, compiled a virtual human body that can be viewed on a screen from any angle, dissected and reassembled by anatomy students, or used as a model to study the growth of cancer cells, for example. First, the real body was photographed with CT scans, magnetic resonance imaging, and conventional x-rays. Then it was embedded in gelatin, frozen, and sliced with a laser knife into more than 1,800 cardboard-thin cross-sections. One by one, the cross-sections were removed from the cadaver and digitally photographed. Thousands of pictures were entered into the computer. The main users are expected to be medical schools and researchers at large medical centers. There is no charge for the access but users must sign a licensing agreement with the NLM. The library has already heard from about 300 applicants, including brain surgeons, clothing designers, and traffic safety crash testers. According to NLM director Donald A. B. Lindburg, "People are awestruck by how detailed and good the images are." Don't expect to download "Visible Man" at home: the program is so complex it will require up to two weeks of Internet time to download and a capacity on the receiving computer of 15 gigabytes--or 15,000 megabytes. The project, costing $1.4 million, will continue next year with phase two: "Visible Woman." (compiled from news reports in The Richmond Times-Dispatch, The Washington Post, and The New York Times) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%