Time: Fri Jun 13 07:09:18 1997 by primenet.com (8.8.5/8.8.5) with SMTP id VAA02084 for [address in tool bar]; Thu, 12 Jun 1997 21:21:15 -0700 (MST) Delivered-To: liberty-and-justice-outgoing@majordomo.pobox.com Date: Thu, 12 Jun 1997 21:16:18 -0700 To: liberty-and-justice@pobox.com From: Paul Andrew Mitchell [address in tool bar] Subject: L&J: W A R N I N G: NETSCAPE SPY "BUG" It's no accident. The type of behavior you are describing would take 500 to 1000 lines of high-level language code, to do properly. So, there is no way this is a "bug." A bug is a logical error which causes a program to malfunction. What you are describing here is not a "bug", and I don't mean that this as a mere semantic distinction. /s/ Paul Mitchell At 08:46 PM 6/12/97 -0700, you wrote: > (Post.Office MTA v3.1 release PO203a ID# 0-36386U2500L250S0) > with ESMTP id AAA240 for <ewolfe@involved.com>; > Thu, 12 Jun 1997 20:26:14 -0700 WAA24092 for okcbomb-mail; Thu, 12 Jun 1997 22:23:01 -0500 (CDT) mars.galstar.com (8.8.5/8.8.5) with ESMTP id WAA24084 for <okcbomb@mars.galstar.com>; Thu, 12 Jun 1997 22:22:57 -0500 (CDT) > by smtp2.erols.com (8.8.5/8.8.5) with SMTP id XAA07786; > Thu, 12 Jun 1997 23:22:08 -0400 (EDT) >Date: Thu, 12 Jun 1997 23:22:08 -0400 (EDT) >To: liberty-and-justice@pobox.com >From: Ian Goddard <igoddard@erols.com> >Subject: okcbomb] W A R N I N G: NETSCAPE SPY "BUG" > >SPREAD THIS FAR & WIDE > >CNN just ran a special report revealing the existence of >a so called "bug" in NETSCAPE that allows a host's system >from which you download a webpage to access any file on your >computer. CNN proved that this bug does exist. As CNN states: > > The bug makes it possible for Web-site > operators to read anything stored on the > hard drive of a PC logged on to the Web site. > >The host site must know what files to look for. Interesting >that, in the course of my TWA 800 research, while accessing >some U.S. military webpages that once existed but now would >no longer come in, the small icons on the lower right hand >side of my screen would indicate that quite a lot of data >was being uploaded to the host server. The lights would go >from the icon representing my computer to the host computer >for almost a minute, the opposite of the normal download >light sequencing. My hard drive would also be activated >during this time. Gee whiz... ?? Such as this military >URL on CEC: http://130.163.113.252/cec_eng.htm Probably >there's another explanation for the reverse sequence, >but in light of this report, it's worth pondering. > >I find it rather strange that there would be a "bug" that >just happens to perform such an underhanded function. Is not >a "bug" defined as something that prevents, not facilitates, >a function? Something that would allow me to target and >acquire a file on a remote computer would seem to be a >function. It would therefore seem that this function cannot >be defined as a "bug." If the host can target a given file, >this is not a bug but a secret program in the program. > >I further suspect that the host could enter a command to >find all files that are for example twa*.* and thus all >files with "twa" at the beginning would be lifted off >one's system. I wonder what other convenient "bugs" >might lurk inside the rat-fink NETSCAPE program. > >I wonder if this is not grounds for a class-action law >suit, if it could be proven that the "bug" is no accident. >That it just happens to be in all versions of Netscape >including their latest version released yesterday is a >little hard to dismiss as error. I'm sure any qualified >programmer could determine if it is by error or design. >It could be a means by which to steal the source codes >of programers that they develop, where the thief has >a clue about possible file names for those codes. > >NETSCAPE BUG: http://cnnfn.com/digitaljam/9706/12/netscape_pkg/ > > >*********************************************************************** > IAN GODDARD (igoddard@erols.com) Q U E S T I O N A U T H O R I T Y >----------------------------------------------------------------------- > VISIT Ian Williams Goddard ------> http://www.erols.com/igoddard >_______________________________________________________________________ > > TWA 800: THE FACTS --> http://www.erols.com/igoddard/twa-fact.htm > > OKC BOMBING ---> http://www.erols.com/igoddard/prior.htm > >--- >For list service help, send a message to okcbomb-request@mars.galstar.com with a subject of HELP. > > ======================================================================== Paul Andrew Mitchell : Counselor at Law, federal witness B.A., Political Science, UCLA; M.S., Public Administration, U.C. Irvine tel: (520) 320-1514: machine; fax: (520) 320-1256: 24-hour/day-night email: [address in tool bar] : using Eudora Pro 3.0.2 on 586 CPU website: http://www.supremelaw.com : visit the Supreme Law Library now ship to: c/o 2509 N. Campbell, #1776 : this is free speech, at its best Tucson, Arizona state : state zone, not the federal zone Postal Zone 85719/tdc : USPS delays first class w/o this As agents of the Most High, we came here to establish justice. We shall not leave, until our mission is accomplished and justice reigns eternal. ======================================================================== [This text formatted on-screen in Courier 11, non-proportional spacing.] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Unsub info - send e-mail to majordomo@majordomo.pobox.com, with "unsubscribe liberty-and-justice" in the body (not the subject) Liberty-and-Justice list-owner is Mike Goldman <whig@pobox.com>
Return to Table of Contents for
Supreme Law School: E-mail