Internet: guide-bugs@cs.widener.eduUUCP: …!widener!guide-bugs
If you are interested in future updates to this guide (aside from normal new editions), discussion about information to be included or removed, etc., write to guide-request@cs.widener.edu to be placed on a mailing list for such things.
@dots is actually `. . . .' "I've seed de first an de last @dots I seed de beginnin, en now I sees de endin." William Faulkner The Sound & The Fury April 8, 1928
————
Getting to Other Networks
Inter-connectivity has been and always will be one of the biggest goals in computer networking. The ultimate desire is to make it so one person can contact anyone else no matter where they are. A number of "gateways" between networks have been set up. They include:
AppleLink Quantum Services sells access to AppleLink, which is similar to QuantumLink for Commodore computers and PCLink for IBM PCs and compatibles. It also provides email access through the address user@applelink.apple.com.
ATTMail AT&T sells a commercial email service called ATTMail. Its users can be reached by writing to user@attmail.com.
BIX Users on BIX (the Byte Information eXchange) can be reached through the DAS gateway at user@cibix.das.net.
CompuServe (CI$) To reach a user on the commercial service CompuServe, you must address the mail as xxxxx.xxx@compuserve.com, with xxxxx.xxx being their CompuServe user ID. Normally CompuServe ids are represented as being separated by a comma (like 71999,141); since most mailers don't react well to having commas in addresses, it was changed to a period. For the above address, mail would be sent to 71999.141@compuserve.com.
EasyNet Digital sells a service called EasyNet; users that subscribe to it can be reached with the addresses user@host.enet.dec.com or user%host.enet@decwrl.dec.com.
FidoNet The FidoNet computer network can be reached by using a special addressing method. If John Smith is on the node 1:2/3.4 on FidoNet, his or her email address would be john.smith@p4.f3.n2.z1.fidonet.org (notice how the numbers fall in place?).
MCI Mail MCI also sells email accounts (similar to ATTMail). Users can be reached with user@mcimail.com.
PeaceNet Users on the PeaceNet network can be reached by writing to user@igc.org.
The Well Users on the service The Well can be reached by writing to user@well.sf.ca.us. The Well is directly connected to the Internet.
This table is far from complete. In addition to sites not being listed, some services are not (nor do they plan to be) accessible from the "outside" (like Prodigy); others, like GEnie, are actively investigating the possibility of creating a gateway into their system. For the latest information, consult a list called the Inter-Network Mail Guide. It's available from a number of FTP sites, including UUNET; Anonymous FTP, for more information on getting a copy of it using anonymous FTP.
Retrieving Files via Email
For those who have a connection to the Internet, but cannot FTP, there do exist a few alternatives to get those files you so desperately need. When requesting files, it's imperative that you keep in mind the size of your request—-odds are the other people who may be using your link won't be too receptive to sudden bursts of really heavy traffic on their normally sedate connection.
Archive Servers
An alternative to the currently well over-used FTPmail system is taking advantage of the many archive servers that are presently being maintained. These are programs that receive email messages that contain commands, and act on them. For example, sending an archive server the command help will usually yield, in the form of a piece of email, information on how to use the various commands that the server has available.
One such archive server is service@nic.ddn.mil. Maintained by the Network Information Center (NIC) in Chantilly, VA, the server is set up to make all of the information at the NIC available for people who don't have access to FTP. This also includes the WHOIS service (Whois). Some sample Subject: lines for queries to the NIC server are:
Subject: help Describes available commands.Subject: rfc 822 Sends a copy of RFC-822.Subject: rfc index Sends an index of the available RFCs.Subject: netinfo domain-template.txt Sends a domain application.Subject: whois widener Sends WHOIS information on `widener'.
More information on using their archive server can be obtained by writing to their server address service@nic.ddn.mil with a Subject: of help.
There are different "brands" of archive server, each with its own set of commands and services. Among them there often exists a common set of commands and services (e.g. index, help, etc). Be that as it may, one should always consult the individual help for a specific server before assuming the syntax—-100K surprises can be hard on a system.
FTP-by-Mail Servers Some systems offer people the ability to receive files through a mock-FTP interface via email. Anonymous FTP for a general overview of how to FTP. The effects of providing such a service varies, although a rule of thumb is that it will probably use a substantial amount of the available resources on a system.
The "original" FTP-by-Mail service, BITFTP, is available to BITNET users from the Princeton node PUCC. It was once accessible to anyone, but had to be closed out to non-BITNET users because of the heavy load on the system.
In response to this closure, Paul Vixie designed and installed a system called FTPmail on one of Digital's gateway computers, decwrl.dec.com. Write to ftpmail@decwrl.dec.com with help in the body of the letter for instructions on its use. The software is undergoing constant development; once it reaches a stable state, other sites will be encouraged to adopt it and provide the service also.
Newsgroup Creation
Everyone has the opportunity to make a Call For Votes on the Usenet and attempt to create a newsgroup that he/she feels would be of benefit to the general readership. The rules governing newsgroup creation have evolved over the years into a generally accepted method. They only govern the "world" groups; they aren't applicable to regional or other alternative hierarchies.
Discussion
A discussion must first take place to address issues like the naming of the group, where in the group tree it should go (e.g. rec.sports.koosh vs rec.games.koosh?), and whether or not it should be created in the first place. The formal Request For Discussion (RFD) should be posted to news.announce.newgroups, along with any other groups or mailing lists at all related to the proposed topic. news.announce.newgroups is moderated. You should place it first in the Newsgroups: header, so that it will get mailed to the moderator only. The article won't be immediately posted to the other newsgroups listed; rather, it will give you the opportunity to have the moderator correct any inconsistencies or mistakes in your RFD. He or she will take care of posting it to the newsgroups you indicated. Also the Followup-To: header will be set so that the actual discussion takes place only in news.groups. If a user has difficulty posting to a moderated group, he or she may mail submissions intended for news.announce.newgroups to the address announce-newgroups@rpi.edu.
The final name and charter of the group, and whether it will be moderated or unmoderated, will be determined during the discussion period. If it's to be moderated, the discussion will also decide who the moderator will be. If there's no general agreement on these points among those in favor of a new group at the end of 30 days, the discussion will be taken into mail rather than continued posting to news.groups; that way, the proponents of the group can iron out their differences and come back with a proper proposal, and make a new Request For Discussion.
Voting After the discussion period (which is mandatory), if it's been determined that a new group really is desired, a name and charter are agreed upon, and it's been determined whether the group will be moderated (and by whom), a Call For Votes (CFV) should be posted to news.announce.newgroups, along with any other groups that the original Request For Discussion was posted to. The CFV should be posted (or mailed to the news.announce.newgroups moderator) as soon as possible after the discussion ends (to keep it fresh in everyone's mind).
The Call for Votes should include clear instructions on how to cast a vote. It's important that it be clearly explained how to both vote for and against a group (and be of equivalent difficulty or ease). If it's easier for you or your administrator, two separate addresses can be used to mail yes and no votes to, providing that they're on the same machine. Regardless of the method, everyone must have a very specific idea of how to get his/her vote counted.
The voting period can last between 21 and 31 days, no matter what the preliminary results of the vote are. A vote can't be called off simply because 400 "no" votes have come in and only two "yes" votes. The Call for Votes should include the exact date that the voting period will end—-only those votes arriving on the vote-taker's machine before this date can be counted.
To keep awareness high, the CFV can be repeated during the vote, provided that it gives the same clear, unbiased instructions for casting a vote as the original; it also has to be the same proposal as was first posted. The charter can't change in mid-vote. Also, votes that're posted don't count—-only those that were mailed to the vote-taker can be tallied.
Partial results should never be included; only a statement of the specific proposal, that a vote is in progress on it, and how to cast a vote. A mass acknowledgement ("Mass ACK" or "Vote ACK") is permitted; however, it must be presented in a way that gives no indication of which way a person voted. One way to avoid this is to create one large list of everyone who's voted, and sort it in alphabetical order. It should not be two sorted lists (of the yes and no votes, respectively).
Every vote is autonomous. The votes for or against one group can't be transferred to another, similar proposal. A vote can only count for the exact proposal that it was a response to. In particular, a vote for or against a newsgroup under one name can't be counted as a vote for or against another group with a different name or charter, a different moderated/unmoderated status, or, if it's moderated, a different moderator or set of moderators. Whew!
Finally, the vote has to be explicit; they should be of the form I vote for the group foo.bar as proposed or I vote against the group foo.bar as proposed. The wording doesn't have to be exact, your intention just has to be clear.
The Result of a Vote
At the end of the voting period, the vote-taker has to post (to news.announce.newgroups) the tally and email addresses of the votes received. Again, it can also be posted to any of the groups listed in the original CFV. The tally should make clear which way a person voted, so the results can be verified if it proves necessary to do so.
After the vote result is posted to news.announce.newgroups, there is a mandatory five-day waiting period. This affords everyone the opportunity to correct any errors or inconsistencies in the voter list or the voting procedure.
Creation of the Group
If, after the waiting period, there are no serious objections that might invalidate the vote, the vote is put to the "water test." If there were 100 more valid YES/create votes than NO/don't create votes, and at least two-thirds of the total number of votes are in favor of creation, then a newgroup control message can be sent out (often by the moderator of news.announce.newgroups). If the 100-vote margin or the two-thirds percentage isn't met, the group has failed and can't be created.
If the proposal failed, all is not lost—-after a six-month waiting period (a "cooling down"), a new Request For Discussion can be posted to news.groups, and the whole process can start over again. If after a couple of tries it becomes obvious that the group is not wanted or needed, the vote-taker should humbly step back and accept the opinion of the majority. (As life goes, so goes Usenet.)
————
Glossary
This glossary is only a tiny subset of all of the various terms and other things that people regularly use on The Net. For a more complete (and very entertaining) reference, it's suggested you get a copy of The New Hacker's Dictionary, which is based on a VERY large text file called the Jargon File. Edited by Eric Raymond (eric@snark.thyrsus.com), it is available from the MIT Press, Cambridge, Massachusetts, 02142; its ISBN number is 0-262-68069-6. Also see RFC-1208, A Glossary of Networking Terms.
:-) This odd symbol is one of the ways a person can portray "mood" in the very flat medium of computers—-by using "smilies." This is `metacommunication', and there are literally hundreds of them, from the obvious to the obscure. This particular example expresses "happiness." Don't see it? Tilt your head to the left 90 degrees. Smilies are also used to denote sarcasm.
Network addresses are usually of two types:
the physical or hardware address of a network interface card; for ethernet this 48-bit address might be 0260.8C00.7666. The hardware address is used to forward packets within a physical network. Fortunately, network users do not have to be concerned about hardware addresses since they are automatically handled by the networking software.
The logical or Internet address is used to facilitate moving data between physical networks. The 32-bit Internet address is made up of a network number, a subnetwork number, and a host number. Each host computer on the Internet, has a unique address. For example, all Internet addresses at Colorado State have a network number of 129.82, a subnet number in the range of 1-254, and a host number in the range of 1-254. All Internet hosts have a numeric address and an English-style name. For example, the Internet address for UCC's CYBER 840 is 129.82.103.96; its Internet name is csugreen.UCC.ColoState.EDU.
address resolutionConversion of an Internet address to the corresponding physical address.On an ethernet, resolution requires broadcasting on the local area network.
administrivia Administrative tasks, most often related to the maintenance of mailing lists, digests, news gateways, etc.
anonymous FTP Also known as "anon FTP"; a service provided to make files available to the general Internet community—-Anonymous FTP.
ANSI The American National Standards Institute disseminates basic standards like ASCII, and acts as the United States' delegate to the ISO. Standards can be ordered from ANSI by writing to the ANSI Sales Department, 1430 Broadway, New York, NY 10018, or by telephoning (212) 354-3300.
archie A service which provides lookups for packages in a database of the offerings of countless of anonymous FTP sites. archie for a full description.
archive server An email-based file transfer facility offered by some systems.
ARPA (Advanced Research Projects Agency) Former name of DARPA, the government agency that funded ARPAnet and later the DARPA Internet.
ARPAnet A pioneering long haul network funded by ARPA. It served as the basis for early networking research as well as a central backbone during the development of the Internet. The ARPAnet consisted of individual packet switching computers interconnected by leased lines. The ARPAnet no longer exists as a singular entity.
asynchronous Transmission by individual bytes, not related to specific timing on the transmitting end.
auto-magic Something which happens pseudo-automatically, and is usually too complex to go into any further than to say it happens "auto-magically."
backbone A high-speed connection within a network that connects shorter, usually slower circuits. Also used in reference to a system that acts as a "hub" for activity (although those are becoming much less prevalent now than they were ten years ago).
bandwidth The capacity of a medium to transmit a signal. More informally, the mythical "size" of The Net, and its ability to carry the files and messages of those that use it. Some view certain kinds of traffic (FTPing hundreds of graphics images, for example) as a "waste of bandwidth" and look down upon them.
BITNET (Because It's Time Network)An NJE-based international educational network.
bounceThe return of a piece of mail because of an error in its delivery.
btwAn abbreviation for "by the way."
CFV (Call For Votes) Initiates the voting period for a Usenet newsgroup. At least one (occasionally two or more) email address is customarily included as a repository for the votes. See Newsgroup Creation for a full description of the Usenet voting process.
ClariNewsThe fee-based Usenet newsfeed available from ClariNet Communications.
client The user of a network service; also used to describe a computer that relies upon another for some or all of its resources.
CyberspaceA term coined by William Gibson in his fantasy novelNeuromancer to describe the "world" of computers, and thesociety that gathers around them.
datagram The basic unit of information passed across the Internet. It contains a source and destination address along with data. Large messages are broken down into a sequence of IP datagrams.
disassemblingConverting a binary program into human-readable machine language code.
DNS (Domain Name System)The method used to convert Internet names to their correspondingInternet numbers.
domain A part of the naming hierarchy. Syntactically, a domain name consists of a sequence of names or other words separated by dots.
dotted quad A set of four numbers connected with periods that make up an Internet address; for example, 147.31.254.130.
email The vernacular abbreviation for electronic mail.
email address The UUCP or domain-based address that a user is referred to with. For example, the author's address is brendan@cs.widener.edu.
ethernet A 10-million bit per second networking scheme originally developed by Xerox Corporation. Ethernet is widely used for LANs because it can network a wide variety of computers, it is not proprietary, and components are widely available from many commercial sources.
FDDI (Fiber Distributed Data Interface) An emerging standard for network technology based on fiber optics that has been established by ANSI. FDDI specifies a 100-million bit per second data rate. The access control mechanism uses token ring technology.
flame A piece of mail or a Usenet posting which is violently argumentative.
FQDN (Fully Qualified Domain Name) The FQDN is the full site name of a system, rather than just its hostname. For example, the system lisa at Widener University has a FQDN of lisa.cs.widener.edu.
FTP (File Transfer Protocol) The Internet standard high-level protocol for transferring files from one computer to another.
FYI An abbreviation for the phrase "for your information." There is also a series of RFCs put out by the Network Information Center called FYIs; they address common questions of new users and many other useful things. RFCs for instructions on retrieving FYIs.
gateway A special-purpose dedicated computer that attaches to two or more networks and routes packets from one network to the other. In particular, an Internet gateway routes IP datagrams among the networks it connects. Gateways route packets to other gateways until they can be delivered to the final destination directly across one physical network.
header The portion of a packet, preceding the actual data, containing source and destination addresses and error-checking fields. Also part of a message or news article.
hostname The name given to a machine. (See also FQDN.)
IMHO (In My Humble Opinion) This usually accompanies a statement that may bring about personal offense or strong disagreement.
Internet A concatenation of many individual TCP/IP campus, state, regional, and national networks (such as NSFnet, ARPAnet, and Milnet) into one single logical network all sharing a common addressing scheme.
Internet number The dotted-quad address used to specify a certain system. The Internet number for the site cs.widener.edu is 147.31.254.130. A resolver is used to translate between hostnames and Internet addresses.
interoperate The ability of multi-vendor computers to work together using a common set of protocols. With interoperability, PCs, Macs, Suns, Dec VAXen, CDC Cybers, etc, all work together allowing one host computer to communicate with and take advantage of the resources of another.
ISO (International Organization for Standardization)Coordinator of the main networking standards that are put into use today.
kernel The level of an operating system or networking system that contains the system-level commands or all of the functions hidden from the user. In a Unix system, the kernel is a program that contains the device drivers, the memory management routines, the scheduler, and system calls. This program is always running while the system is operating.
LAN (Local Area Network) Any physical network technology that operates at high speed over short distances (up to a few thousand meters).
mail gateway A machine that connects to two or more electronic mail systems (especially dissimilar mail systems on two different networks) and transfers mail messages among them.
mailing list A possibly moderated discussion group, distributed via email from a central computer maintaining the list of people involved in the discussion.
mail path A series of machine names used to direct electronic mail from one user to another.
medium The material used to support the transmission of data. This can be copper wire, coaxial cable, optical fiber, or electromagnetic wave (as in microwave).
multiplex The division of a single transmission medium into multiple logical channels supporting many simultaneous sessions. For example, one network may have simultaneous FTP, telnet, rlogin, and SMTP connections, all going at the same time.
net.citizen An inhabitant of Cyberspace. One usually tries to be a good net.citizen, lest one be flamed.
netiquette A pun on "etiquette"; proper behavior on The Net. Usenet Netiquette.
network A group of machines connected together so they can transmit information to one another. There are two kinds of networks: local networks and remote networks.
NFS (Network File System) A method developed by Sun Microsystems to allow computers to share files across a network in a way that makes them appear as if they're "local" to the system.
NICThe Network Information Center.
nodeA computer that is attached to a network; also called a host.
NSFnet The national backbone network, funded by the National Science Foundation and operated by the Merit Corporation, used to interconnect regional (mid-level) networks such as WestNet to one another.
packet The unit of data sent across a packet switching network. The term is used loosely. While some Internet literature uses it to refer specifically to data sent across a physical network, other literature views the Internet as a packet switching network and describes IP datagrams as packets.
polling Connecting to another system to check for things like mail or news.
postmaster The person responsible for taking care of mail problems, answering queries about users, and other related work at a site.
protocols A formal description of message formats and the rules two computers must follow to exchange those messages. Protocols can describe low-level details of machine-to-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet).
recursion The facility of a programming language to be able to call functions from within themselves.
resolve Translate an Internet name into its equivalent IP address or other DNS information.
RFD (Request For Discussion) Usually a two- to three-week period in which the particulars of newsgroup creation are battled out.
route The path that network traffic takes from its source to its destination.
router A dedicated computer (or other device) that sends packets from one place to another, paying attention to the current state of the network.
RTFM (Read The Fantastic Manual). This anacronym is often used when someone asks a simple or common question. The word `Fantastic' is usually replaced with one much more vulgar.
SMTP (Simple Mail Transfer Protocol) The Internet standard protocol for transferring electronic mail messages from one computer to another. SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail.
serverA computer that shares its resources, such as printers and files, withother computers on the network. An example of this is a Network FileSystem (NFS) server which shares its disk space with other computers.
signal-to-noise ratio When used in reference to Usenet activity, signal-to-noise ratio describes the relation between amount of actual information in a discussion, compared to their quantity. More often than not, there's substantial activity in a newsgroup, but a very small number of those articles actually contain anything useful.
signature The small, usually four-line message at the bottom of a piece of email or a Usenet article. In Unix, it's added by creating a file ..signature in the user's home directory. Large signatures are a no-no.
summarize To encapsulate a number of responses into one coherent, usable message. Often done on controlled mailing lists or active newsgroups, to help reduce bandwidth.
synchronous Data communications in which transmissions are sent at a fixed rate, with the sending and receiving devices synchronized.
TCP/IP (Transmission Control Protocol/Internet Protocol)A set of protocols, resulting from ARPA efforts, used by the Internet tosupport services such as remote login (telnet), file transfer(FTP) and mail (SMTP).
telnet The Internet standard protocol for remote terminal connection service. Telnet allows a user at one site to interact with a remote timesharing system at another site as if the user's terminal were connected directly to the remote computer.
terminal server A small, specialized, networked computer that connects many terminals to a LAN through one network connection. Any user on the network can then connect to various network hosts.
TeXA free typesetting system by Donald Knuth.
twisted pair Cable made up of a pair of insulated copper wires wrapped around each other to cancel the effects of electrical noise.
UUCP (Unix to Unix Copy Program) A store-and-forward system, primarily for Unix systems but currently supported on other platforms (e.g. VMS and personal computers).
WAN (Wide-Area Network)A network spanning hundreds or thousands of miles.
workstationA networked personal computing device with more power than a standardIBM PC or Macintosh. Typically, a workstation has an operating systemsuch as unix that is capable of running several tasks at the same time.It has several megabytes of memory and a large, high-resolution display.Examples are Sun workstations and Digital DECstations.
worm A computer program which replicates itself. The Internet worm (The Internet Worm) was perhaps the most famous; it successfully (and accidentally) duplicated itself on systems across the Internet.
wrtWith respect to.
"I hate definitions."Benjamin DisraeliVivian Grey, bk i chap ii
———Bibliography
What follows is a compendium of sources that have information that will be of use to anyone reading this guide. Most of them were used in the writing of the booklet, while others are simply noted because they are a must for any good net.citizen's bookshelf.
Books
Comer, Douglas E.Internetworking With TCP/IP, 2nd ed., 2vPrentice HallEnglewood Cliffs, NJ1991
Davidson, JohnAn Introduction to TCP/IPSpringer-VerlagBerlin1988
Frey, Donnalyn, and Adams, Rick!@%:: A Directory of Electronic Mail Addressing and NetworksO'Reilly and AssociatesNewton, MA1989
Gibson, WilliamNeuromancerAceNew York, NY1984
LaQuey, TracyUsers' Directory of Computer NetworksDigital PressBedford, MA1990
Levy, StephenHackers: Heroes of the Computer RevolutionAnchor Press/DoubledayGarden City, NY1984
Partridge, CraigInnovations in InternetworkingARTECH HouseNorwood, MA1988
Quarterman, John S.The Matrix: Computer Networks and Conferencing Systems WorldwideDigital PressBedford, MA1989
Raymond, Eric (ed)The New Hacker's DictionaryMIT PressCambridge, MA1991
Stoll, CliffordThe Cuckoo's EggDoubledayNew York1989
Tanenbaum, Andrew S.Computer Networks, 2d edPrentice-HallEnglewood Cliffs, NJ1988
Todinao, GraceUsing UUCP and USENET: A Nutshell HandbookO'Reilly and AssociatesNewton, MA1986
The Waite GroupUnix Communications, 2nd ed.Howard W. Sams & CompanyIndianapolis1991
Periodicals & Papersmagazine: Barlow, JComing Into The CountryCommunications of the ACM 34:32March 1991Addresses "Cyberspace"—-John Barlow was a co-founder of the EFF.
proceedings: Collyer, G., and Spencer, HNews Need Not Be SlowProceedings of the 1987 Winter USENIX Conference181—90USENIX Association, Berkeley, CAJanuary 1987
magazine: Denning, PThe Internet WormAmerican Scientist126—128March—April 1989
magazine: The Science of Computing: Computer NetworksAmerican Scientist127—129March—April 1985
magazine: Frey, D., and Adams, RUSENET: Death by Success?UNIX REVIEW55—60August 1987
magazine: Gifford, W. SISDN User-Network InterfacesIEEE Journal on Selected Areas in Communications343—348May 1986
magazine: Ginsberg, KGetting from Here to ThereUNIX REVIEW45January 1986
magazine: Hiltz, S. RThe Human Element in Computerized Conferencing SystemsComputer Networks421—428December 1978
proceedings: Horton, MWhat is a Domain?Proceedings of the Summer 1984 USENIX Conference368—372USENIX Association, Berkeley, CAJune 1984
magazine: Jacobsen, Ole JInformation on TCP/IPConneXions—-The Interoperability Report14—15July 1988
magazine: Jennings, D., et alComputer Networking for ScientistsScience943—95028 February 1986
paper: Markoff, J"Author of computer `virus' is son of U.S. electronic security expert."New York TimesNov. 5, 1988A1
paper: "Computer snarl: A `back door' ajar."New York TimesNov. 7, 1988B10
magazine: McQuillan, J. M., and Walden, D. CThe ARPA Network Design DecisionsComputer Networks243—2891977
magazine: Ornstein, S. MA letter concerning the Internet wormCommunications of the ACM 32:6June 1989
proceedings: Partridge, CMail Routing Using Domain Names: An Informal TourProceedings of the 1986 Summer USENIX Conference366—76USENIX Association, Berkeley, CAJune 1986
magazine: Quarterman, JEtiquette and EthicsConneXions—-The Interoperability Report12—16March 1989
magazine: Notable Computer NetworksCommunications of the ACM 29:10October 1986This was the predecessor to The Matrix.
magazine: Raeder, A. W., and Andrews, K. LSearching Library Catalogs on the Internet: A SurveyDatabase Searcher 616—31September 1990
proceedings: Seeley, DA tour of the wormProceedings of the 1989 Winter USENIX Conference287—304USENIX Association, Berkeley, CAFebruary 1989
magazine: Shulman, GLegal Research on USENET Liability Issues;login: The USENIX Association Newsletter11—17December 1984
magazine: Smith, KE-Mail to AnywherePC World220—223March 1988
magazine: Stoll, CStalking the Wily HackerCommunications of the ACM 31:514May 1988This article grew into the book The Cuckoo's Egg.
proceedings: Taylor, DThe Postman Always Rings Twice: Electronic Mail in a Highly DistributedEnvironmentProceedings of the 1988 Winter USENIX Conference145—153USENIX Association, Berkeley, CADecember 1988
magazine: U.S.Gen'l Accounting OfcComputer Security: Virus Highlights Need for Improved Internet ManagementGAO/IMTEC-89-57,1989Addresses the Internet worm.
"And all else is literature."Paul VerlaineThe Sun, New YorkWhile he was city editor in 1873—1890.
— Bill Walther, Carleton University, Ottawa, Canada