Vol. XIV June 1996 No.06

Newsletter of the Stanford I Palo Alto Users Group for PC

A Non-Profit I Educational Organization j $en.e'ta.l d'fee~ln.a - /j.u.n.e S!6~/a.@ 7:JO

Words from the Prez on installing it in the near future. On the question regarding communication and Bob Mitchell information, responses were heavily weighted in the direction of "average" or "little The Questionnaire - A Preliminary Look knowledge" regarding the Internet and information systems such as AOL or Three weeks of vacation is now history and I CompuServe. This was surprising since of the can now devote some time to the business of 32 returns, 31 individuals indicated their attempting to fulfill some of the systems included a modem. This does not responsibilities that I agreed to take on with mean that our group is not interested in the our group. My thanks to Brian Christopher subject, rather you want information about the who agreed to retain the leadership on my Internet so you can join the rest of the return. It wasn't easy considering a last minute computer world. This was demonstrated by 20 cancellation of a guest for the May meeting. responses of "very interested" and 12 "somewhat interested" to an area of the In an effort to determine what you the Internet explored at each meeting. members of SPAUG want, a questionnaire was offered that allowed us to determine what your Information software seemed to be much more i~terests were and allowed you to express your popular than game software. There were 21 views. So far, out of approximately 75 paid up responses indicating "not interested" in game members we have received 32 returns. There software with 6 "not interested" in educational were very interesting and in some cases very software. surprising results. LAN systems were of at least some interest to general knowledge of personal computing ?n 12 individuals with 20 "not interested". m general, PC Hardware, DOS and Windows, almost everybody regarded themselves average Reasons for not attending meetings included or above average. "Family problems", "conflicts with other activities", "meetings run too late", "late There were 5 responses indicating being "very notice" and "moves of meeting location". knowl~dgeable" 2 reflecting "little knowledge". Compelling reasons for attending future On Windows 3.x, we discovered the club has meetings included the addition (or repeat) of at least 2 DOS diehards. On Windows '95, 22 software demonstrations that included more indicated "little knowledge" with 10 (Continued on page 2) individuals who already have it and 8 planning (Continued from page 1) MS Office '95 and Netscape. useful applications such as utilities that resolve software conflict problems, personal data Based on this and questionnaires yet to be organization, and uninstallers with hardware returned we will be guided accordingly. At the demonstration of color scanners color printers moment, the input from 32 members will carry and CD Rom drives. There was also a heavy weight in shaping the future of suggestion that we should include some of the SPAUG. You still have time to exercise your basics on hardware (e.g.how does it work?). A "vote". number of members felt that the notices of upcoming meetings should do more in Considering national averages for responses to "selling" them on attending. surveys, this was outstanding. For all of those members who took the time to fill in the Most likable parts of meetings included blanks and offer your comments, a very sincere Random Access (Q&A), and presentations "Thank you". If there are substantial (demos) on new software and hardware. There refinements to this report we will include them were also votes for the drawings for free in the next PrintScreen. We will also provide software. On changes or eliminations, we you with some thoughts on the plans for the should locate the meetings in a place "like future based on the results of this survey. Varian" where the membership could see on a Stay tuned! projected image what was being demonstrated (good news coming on that). We should avoid MEmbErship lntErnEt AddrESSEs "glitzy" super salespersons, improve disk-of­ the-month (demos on a projected screen Beverly Altman [email protected] would do this), and a "blow off" of questions Audrey Borland [email protected] during random access. There was also a Frank Campbell rfvw9 [email protected] suggestion that there should be an attempt on Brian Christopher brianc@mediaci ty. com Jim Dinkey [email protected] better name recognition among the Karen Fung [email protected] membership. We should add: the mid meeting Dick Harding [email protected] break, location where you can "see" and "hear" Nancy Helmy [email protected] the presentations, more shareware Stein Hoffmoen [email protected] information, non-product presentations on Jess Kanarek [email protected] computer subjects, identify the officers, more Floyd Kessler [email protected] members including younger people in college Don Kleyensteuber [email protected] or recent college graduates. Mildred Kohn [email protected] Aldora Lee [email protected] Suggestions for hardware demos ran the gamut Bill McElhinney [email protected] John McFall [email protected] with particular emphasis on color scanners, Zip Bob Mitchell TVBob [email protected] drives and other removable disk type drives Robert Mitchell [email protected] such as Syquest, CD ROM drives, color Larry Mehl [email protected] printers, the fastest computers (133-166 Clark Moore [email protected] MHz), visioner paper port and a PC to TV Jim Powell [email protected] conversion unit, optical hard drives, sound Norm Rossen [email protected] cards, memory extenders, video boards, Ron Seltzer [email protected] laptops, modems and (horrors) a Power Mac. John Sessom [email protected] Lamont Shadowens [email protected] Russ Smith [email protected] Suggestions for software demos also covered Kendric Smith [email protected] the world. They included utilities (high Barry Smith [email protected] response) with individual requests for Ben Swan [email protected] Windows '95, foreign language, uninstallers, Walt Varner [email protected] Pagemaker, Printshop, Stackers, Family Tree Bill Weber [email protected] Maker, OS-2 applications, CAD, accounting Larry Weinberg [email protected] for small business, Quicken CD ROM Deluxe, Seth Wu [email protected]

2 Disk of The Month Daily Exercise [DOM9606] For The Nonathletic

Robert Mitchell Anonymous I contributed by Kendric Smith

MORECN.ZIP - Win 3.1 126K Proper weight control and physical fitness This program allows the user to easily access cannot be attained by dieting alone. Many those settings in WIN.INI & SYSTEN.INI people who are engaged in sedentary files from the user interface. Also lets occupations do not realize that calories can be user change colors in help menu, the alignment burned by the hundreds by engaging in of menus as well as vertical spacing between strenuous activities that do not require icons, fonts used in icon tittles, etc. physical exercise.

SMTDOC.ZIP - Win 3.1/95 60K Here's the guide to calorie-burning activities This niffty little utility lets you convert and the number of calories per hour they standard Windows *.hip files into files that can consume. be read in ordinary text editors. Beating around the bush 75 SPARTA15.ZIP- Win 3.1 137K Jumping to conclusions 100 If you tired of the old Win 3.1 File Manager, Climbing the walls 150 but don't want to upgrade Win 95, this Swallowing your pride 50 program is for you. It makes Windows 3.1 Passing the buck 25 look like the Macintosh interface complete Throwing your weight around with garbage can on the right lower corner. (depending on your weight) 50-300 The main folders appear on the screen like the Dragging your heels 100 Mac. Their is a window with three buttons. Pushing your luck 250 They let you display a menu bar with Mac-like Hitting the nail on the head 50 menu's, Disk drives appear like they do on the Wading through paperwork 300 Mac as well as letting you use the old File Bending over backwards 75 Manager. It makes Windows as easy to Jumping on the bandwagon 200 use as Mac on this side of the fence. Balancing the books 25 Running around in circles 350 WINCHG21.ZIP - Win 3.1 131K Eating crow 225 This utility lets you customize windows by Tooting your own horn 25 letting you make the windows do what you Climbing the ladder of success 750 want them to do, 1) Find a buried window Pulling out the stops 75 easily, 2) Make a windows stay on top of Adding fuel to the fire 160 others, as well as change the menu's to your Wrapping it up at the day's end 12 needs. It also lets you run programs by Making mountains directory name or program name or by out of molehills 500 history of program has been run last. There are many other things this program can as well. To which you may want to add your own It uses very little memory and is easy to install. favorite activities, including:

WSCI22CE.ZIP - Win 3.1 943K Opening a can of worms 50 McAfee Anti Virus Scan tool for Windows 3.1, Putting your foot in your mouth. 300 a must have utility for all Windows users. Starting the ball rolling. 90 Protect you system from terrible viruses that Going over the edge 25 can damage vital files and hard drive boot Picking up the pieces after 350 sectors.

3 What is Shockwave? moved immediately to the World Wide W eh. The Macromedia shocked content that users of Macromedia authoring Macromedia's Internet Thrust tools bring to the Web Shockwave is a key component of completely change the look Macromedia's solution for moving creative and feel of Web pages professionals who develop digital media to the compared to static HTML. World Wide Web. It enables them to use their Web pages now include existing authoring tools, skills, and content interactive multimedia, immediately. vector graphics, sound, interactive information, and Shockwave consists of: more as Macromedia's tools Shockwave plug-ins for Macromedia's develop. Authorware, Director, and FreeHand authoring tools for Netscape Navigator 2.0 Shockwave is Everywhere and other popular Web browsers. Afterburner in Macromedia's Future utilities or Xtras that compress and optimize Shockwave solutions are now available for content for delivery on the Web. Macromedia's three most widely used authoring tools (Director, Authorware, and Since December 5, 1995, when the first FreeHand), and will be available for all of Shockwave for Director plug-ins were Macromedia's authoring products before long. published on Macromedia's site on the Web, Likewise, Shockwave will be ubiquitous in that over a million people have downloaded and it will be available for common computer used Shockwave to view thousands of platforms, and for the most widely used Web "shocked" Web sites. "Shocked" contents fit browser architectures. Shockwave plug-ins for into the dynamic Web sites created by the Director, FreeHand, and Authorware are now Backstage tools that Macromedia recently available as Netscape Live Objects compatible acquired from iBand. This combination with Netscape Navigator 2.0. Shockwave plug­ anchors Macromedia's Internet strategy on ins packaged as Active Objects for use with two strong pillars: Microsoft Internet Explorer will be available in the near future. To encourage development Shockwave-enabled authoring tools for the and use of "Shocked" content on the Web, creative professional. Construction and Macromedia makes the Shockwave player plug­ management tools for Web site designers and ins and Afterburner authoring software freely managers. These two sets of products are available to download at tightly integrated and work together to h ttp://www.macromedia.com/. provide all the functionality necessary to Development and release of Shockwave produce Web sites that are: software will occur rapidly and continuously, both in conjunction with major releases of dynamic easily and rapidly changed and Macromedia authoring tools, and in parallel, so customized based on context and events that our developers and authors can keep content rich including animation, graphics, current with the rapid evolution of the Web. sound, multimedia, and full interaction. A Short History of Shockwave Moving Digital Media to the Internet Macromedia introduced Shockwave on Macromedia's authoring tools are the de facto December 5, 1995, when it unveiled standards for the creation and distribution of Shockwave for Director 4. Overnight, it digital media by creative professionals. revolutionized the Internet by bringing Shockwave provides extensions to those tools interactive multimedia to the World Wide so that the expertise and existing body of work Web. On April 15, 1996, Macromedia owned by those creative professionals can be introduces new Shockwave software with

4 expanded abilities to display additional forms sound, pies movies, and other data, of interactive multimedia, learning, and digital downloaded on demand, and developer­ arts to the World Wide Web. The concept is specified segmentation of content to tailor it simple. With Shockwave software, anyone to the specific delivery network. Because using the Netscape Navigator 2.0 browser can Shockwave software operates on standard view interactive multimedia on the Web Macromedia files, the features of Macromedia's including animation, sound, and high­ products for creating multimedia and resolution scalable and zoomable digital art. interactive graphics applications are Surfing the Web or in-house Intranets will immediately accessible to the huge audience of now become dynamic, informative, over half a million creative professionals who entertaining, and fun. use Macromedia authoring tools today.

Customers who use one of Macromedia's What You Can Deliver with Shockwave authoring tools - Director, FreeHand, and Software? Authorware 3.5 for Windows or Macintosh - Shockwave software is optimized for online can create a "shocked" piece for the Internet or multimedia and interactive graphics. in-house Intranet. Users simply create the Developers have produced: piece, compress it using Macromedia's compression software (called the Afterburner) Online advertising to optimize the piece for Web delivery, and (Director) upload it to their Web page. That's it! You've Games (Director and got interactive media on the Web. Authorware) Presentations for Shockwave Nuts and Bolts communicating marketing Shockwave software is made up of two distinct and product messages parts: the Shockwave plug-ins and the (Director and Authorware) Afterburner applications. The Shockwave plug­ Computer-based training ins are a set of viewers for Macromedia and educational courseware including quizzes datatypes that are packaged as plug-ins to the and tests (Authorware) two major Web browser architectures, and Interactive reference works and publications which play back Macromedia titles on the (Authorware) network. The Afterburner application is a Kiosks for both communication and user Macromedia Xtra or separate utility program input (Director and Authorware) that compresses and optimizes standard Surveys and questionnaires (Authorware) Macromedia files for use on the Web. Separate Maps and site plans (FreeHand) plug-ins and Afterburners are currently Online technical illustrations and product available for Director, FreeHand, and catalogs (FreeHand) Authorware, and for different platforms of Presentation of illustrations, logos, artwork, Netscape Navigator 2.0, including 16-bit and and other graphic images (FreeHand) 32-bit on , and 68K and "Highlight" animations like "flying logos" that PowerPC on the Apple Macintosh. add interest to Web pages (Director) Macromedia's evolving Shockwave offering also includes: How to Get Shockwave Shockwave is available free of charge on Macromedia Open Architecture (MOA) Macromedia's Web site at extensions to our authoring tools which enable http://www.macromedia.com/. The developers to use their products and expertise Shockwave plug-ins can be downloaded in a immediately to generate digital media content single package ("Easy Installation") or the user for the Web. Technology for "streaming" or can choose which Shockwave product version progressively downloading multimedia content and platform to download. Each of the over networks. The first example of this is in Afterburner compression programs is also Authorware 3.5, which provides streaming of available for downloading.

5 Remove-It Software already have on your system. And Vertisoft our sophisticated rule-based logic "Remove-ft is one of those gotta have utilities automatcially that can safely purge the leftovers of old recommend programs." unneeded files that PC Magazine are safe to remove. Change your Did you know your hard drive is being mind? No bombarded with garbage? Every time you problem ... install and application, connect online, receive Remove-It saves a fax, or install a CD-ROM, you dump bits of everything it electronic debris all over your hard drive. It deletes in a compressed back-up. quickly builds up, wasting disk space and slowing down your PC's performance. That's Even takes out Internet garbage - why you need Remove-It, to safely clean up automatically! that garbage once and for all! As junk builds up on your hard drive, deleting it manually is risky, ineffective, and time Extra strength for Windows 95. consuming. Remove-It automatically keeps Remove-It for Windows 95 is the most your drive clean by regularly alerting you when comprehensive removal system available. It garbage appears on your system. Even debris safely and accurately removes any 32-bit or 16- from online sessions comes clean in an instant! bit application. Remove-It fullly supports long filenames, the system Registry, drag-and-drop, Put applications in cold storage. and other Windows 95 features. For applications you use infrequently but don't want to permanently delete, you can create a Remove-It removes all this garbage compressed backup while the program icon from your hard drive: remains on your desktop for easy retrieval. To Unneeded applications, duplicate files, un­ run your application, just double-click its icon! referenced files, unused fonts, unused drivers, old downloaded files from online services, old Windows 3.1 version inside, too! faxes, orphan Windows 95 Registry entris, If you're a Windows 3.1 user, you also have the unneeded .INI files, empty Windows program #1 way to remove garbage from your hard groups, orphan icons, shortcuts, file drive. There's a full copy of our Windows 3.1 associations and embeddings, zero-byte files, version inside the box. And, when you're ready old backup files, unneeded temp files, lost to upgrade to Windows 95, our unique cluster files, unused text files, unneeded Help Upgrade Assistant configures your files, unnecessary wallpapers, unneeded picture applications for a smooth transition. files (PCX, BMP, ICO, TGA, GIF, etc.), unneeded multimedia files (A VI, WAV, MIDI, Try Remove-It without risk! MDI, etc.), unused screen savers, and old ZIP Your satisfaction is completely guaranteed. If archives. Remove-It doesn't effortlessly remove the garbage from your hard disk, simply return it The leader in safe removal technology. within 30 days for a full refund. Safety is everything when it comes to removing something from your hard drive. System Requirements Remove-It's automatic installation logging Windows 95 - 386DX or better, 4MB RAM feature guarantees you 100% accuracy in the (8MB recommended), 4MB free disk space, removal of new applications. Our Installation VGA or better monitor. Knowledge Base of over 1000 applications Windows 3.x - 386 or better, 4MB RAM, 3MB ensures the safe removal of applications you free disk space, VGA or better monitor.

6 SyOuest Technologies 1.3GB cartridges. SyJ et provides a high performance minimum sustained transfer rate Product Gallary 5/ 30/ 96 of 4MB per second and an average seek time condensed for PrintScreen of <11 msecs. SyJet also possesses the unique ability to go into an accelerated mach SyQuest has manufactured removable mode in extreme data intensive applications cartridge hard drives since 1982. Over the such as full motion video. SyJet 1.3 is the ideal years, the company has refined its solution for video editing and storage, technologies and processes, and now desktop publishing, imaging, audio, high produces removable cartridge hard drives that resolution photography and multimedia. At 7 demonstrate the quality level, reliability, cents per megabyte, the SyJet removable performance and capacity associated with cartridge hard drive offers the world's lowest fixed disk drives. cost/ MB. Configurations include an internal enhanced IDE and SCSI and external SCSI. SyQuest offers 5.25-inch, half-height SCSI II SyJet ships this fall. interface removable cartridge Winchester hard disk drives with formatted capacities of The SyQuest EZ135; First in the SyQuest EZ 88 and 200MB as well as 3.5- inch removable family, the award-winning EZ135 ideal for the cartridge Winchester disk drives with small office/ home office user. Popular formatted capacities of 230, 135 and 270MB, applications for the low-cost 3.5-inch EZ135 and a double-platter, 3.5-inch drive system, hard drive include easily accessible, secondary SyJet 1.3GB, to be shipped in the fall. storage for high-performance Mac and PC users. The EZ135 has a 13.5 milliseconds The EZFlyer; 230MB, the newest addition to access time, and a maximum sustained data SyQuest's 3.5-inch EZ family, offers the transfer rate of 2.4MB per second. EZ135 highest performance at the lowest price per configurations include internal enhanced IDE, megabyte for computer users with data and external SCSI and Parallel Port versions. intensive applications like desktop publishing, multimedia, photography, video, audio, pre­ The SyQuest SQ5200C: First shipped in press work and other imaging of complex 1994, the SQ5200C raised the SyQuest computer graphics, or those who frequently standard to a new level: 200MB of hard disk download files from the Internet. EZFlyer's capacity, 18 milliseconds average seek, 64 Winchester hard drive technology performs Kbytes buffer, and sustained transfer rates of with an access time of 13.5 milliseconds and a up to 1.9 MB per second (5 MB per second maximum sustained data transfer rate of burst). The SQ5200C reads and writes 2.4MB per second. At 230MB, the EZFlyer SyQuest 44MB and 88MB hard disk provides endless storage capacity with cartridges, protecting the investment of additional cartridges. It is the SyQuest's customers who have purchased price/ performance leader among removable more than a million SQ555 and cartridge hard drives priced under $500, and is SQ5110/ SQ5110C series hard disk drives and the only removable cartridge hard drive several million 44 and 88MB hard disk in this category. EZFlyer reads, writes and . cartridges. formats 230MB and 135MB cartridges and is available in external SCSI and Parallel Port The SyQuest SQ3270: Ideal for the laptop configurations for Macs and PCs. and desktop market, the SQ3270 is a high capacity, high performance removable The SyJet l.3GB: Packaged in a new user­ cartridge . It is packaged in the friendly, slim line design is SyQuest's highest industry standard 1-inch high 3.5-inch form capacity, highest performance removable factor. Each cartridge contains 270MB of cartridge hard disk drive ever, the SyJet 1.3 formatted hard disk storage. The average seek gigabyte hard disk drive. SyJet 1.3GB reads, time of 13.5 msecs matches current high writes and formats to 3.5-inch, double platter, performance Winchester fixed disk drives.

7 http://www.philipsmedia.com/ dead didn't wash away. I media/games needed a tough case, a few bucks, and a reason The Dame Was Loaded is the world's first to live. They all arrived fully-interactive film noir detective adventure at the same time. set in the world of a 1940's Private Eye! In 1940's Los Angeles, a The door opened slowly. A young blonde Private Detective has entered the room, her cornflower blue eyes his work cut out for widening as they adjusted to the piles of him. In a heat wave paperwork marked with the red stamp of hotter than a hitman's gun barrel, diamonds "DECEASED." have been lifted, lives have been taken, and "Hello," she said. "My name is Carol Klein." people have disappeared. When a mystery I motioned for her to sit on the chair with the walks through Scott Anger's door in the shape four legs. of the sweet Carol Klein, the detective is set on "I'm looking for my missing brother, Dan a twisting road of intrigue and danger. With his Klein." notebook, his wits and his wisecracks, Anger She reached into her purse, for what I hoped sets out to solve the case. was a fist-full of cash, but knew was only a handful of trouble. -Rich 1940's world full of classy joints, sleazy "Do you have connections?" she asked dives and danger hesitantly. "Unsavory connections?" -The world's first fully-interactive film noir I looked at her naive expression, and realized detective adventure with incredible full-screen the handful of trouble was actually a truck­ video graphics load of sin. She passed me a photo of a rebellious-looking young man, the kind that -30 cunning characters in a deviously twisting, end up face down in the river.Her sad, blue non-linear plot eyes pleaded with mine momentarily. I felt my heart jump. -Play poker for cash and clues "You look like the kind of man who could help a poor girl like me." -Proven graphic adventure gameplay with one­ How could I refuse? on-one character discussions and items to collect and use Dames are trouble, but trouble is my business. For a dame, and maybe a few hundred bucks in -9 gripping conclusions, dependent on your advance, I'd lose a few teeth and a few friends. detective skills For sweet Carol Klein, I might even stand in front of a gun or two. In a sleazy world of = f= ~.:=f JJ corrupt officials, stolen diamonds, lust and r.Jf-___,_,;__ ___ murder, I must solve the case to stay alive. I~ ---- I'm a private detective. That's my job.

"My name is Scott Anger." I said. "Welcome to my office." -Two-disc set with over 40 hours of Scott Anger, Private Detective. That's what it gameplay says on my license, but you can't believe all you read. The only things I've investigated for -Original cool jazz soundtrack the last month have been the bottoms of whiskey bottles. The heat of the summer made -View the 13+ Mb demo at Happy Puppy. the excuses come easier, but the faces of the http://www.happypuppy.com

8 Windows NT 3.5 Hardware NT to recognize the Adaptec PCI card enable Frequently Asked Questions "PCI SCSI BIOS FOR OFF-BOARD DEVICES" in your WinAMI BIOS. Next, to Dale E. Reed Jr get DeskScan to work, you must have ver 2.1 a http://www.iea.com/-daler/nt/faq/toc.html (to work with third party scsi boards). This is available from HP at f tp-bio.external.hp.com Where can you get NT drivers for Philips CD­ in directory /pub/scanjets/win dos and the ROM drives? filename is ds21 en.exe. The sca-;,ner must be Philips has a BBS which has NT drivers for powered on when NT boots or else it will both 3. 1 and 3.5. The number is (612) 331- remain unavailable no matter what you do. 2689. This driver works decently in polling ([email protected]) mode, but is not optimized. Most people have at Hewlett Packard received crashes when trying the driver in interupt mode. How do I un-install a CD-ROM without NT crashing afterwards? Why can't DOS-shelled applications access my First you must go into Windows NT Setup sound card? (from program manager) and then go into Windows NT does NOT allow direct access to Options-> Add/Remove SCSI Adapters, hardware. Therefore dos programs can not remove the entry for you CD-ROM drive. It access hardware directly while running NT. may ask you to restart, but select to continue (Comment from [email protected]: instead. Next go into Control panel-> This can be solved by writing a VDD (Virtual Devices and find the "A TDISK" entry. Select Device Driver) that allows DOS programs Startup and enable BOOT. access to any device. Such a thing has been done to allow DOS programs to use the If you do not remove the CD ROM from the networking parts. Unfortunately, nobody has SCSI Ad.apter in Win Setup ... and Enable the gotten around to doing this yet.) ATDISK driver, the system will stil1 try to load the CD-ROM driver before ATDISK. If the Do Parallel tape drives work on NT? CD-ROM driver fails, NT senses this as a Currently, there are no drivers for parallel tape failed boot device, and will not boot. This is backup, like the Colorado Trakker systems. most common with an ATAPI CD-ROM drive, since the ATAPI CD-ROM driver has a Does the NEC CDR-260R work with higher boot priority than the ATDISK driver. Windows NT? The new NEC CDR-260R, like all IDE drives taff that conform to the ATAPI 1.2 standard, works with the built in ATAPI.SYS driver. The ob Mitchell older NEC CDR-260 is NOT ATAP 1.2 resident (415) 368-9530 compliant and will not work. rlan Kertz ice President (415) 368-9346 How do I know if my hardware is compatible alter Varner with NT? ccounting (408) 739-3488 Microsoft has an evaluation disk that will let ildred Kohn you test your system and see how it will work ecretary (415) 949-1833 for you. Call 800-426-9400, or download it everly Altman from CompuServe or the MS ftp site irector at Large (Membership Dues $35 annual) ( f tp.microsoft.com). embership List (415) 329-8252 endric Smith How do I use an HP Scanner with Wmdows ebMaster (415) 493-7210 NT? rian Christopher To get a HP IICX scanner to work with NT ditor (415) 952-5632 and an AHA2940w PCI SCSi card, First to get

9 Encryption civil libertarians call the eavesdropping a And Privacy On The Net violation of a citizen's rights?

Welcome to WEB WHIRL Stewart, in another 20 years, just how much with The Digital Diva privacy will any individual American have? Your Host: Michelle Slatalla Brought to you by Discovery Channel Online Stewart Baker April 26, 1996 http://www.us.net/-steptoe/baker.htm

Sparky: Good Afternoon, and welcome to Stewart Baker: The irony is that we will have Web Whirl with the Digital Diva! very little if unbreakable encryption spreads everywhere. The spread of encryption will give Web Whirl is designed as a guided tour: Our privacy against certain kinds of intrusions, but Fearless Leader, the Digital Diva, and me, her it will come at a cost to public safety that could faithful sidekick Sparky, prowl the Web and be significant. sniff out interesting sites for your entertainment and edification. We'll check out To my mind, the real threat to our privacy about a dozen sites in the next hour, and keep doesn't come from eavesdropping. It comes Diva's flying saucer moving at warp speed. from the free distribution of information we want to share with many people -- but not Our guest today is Stewart Baker, former with everyone everywhere. For example, General Counsel for the National Security there's nothing more chilling than running Agency, and presently an attorney in your own name through Alta Vista, and seeing private practice in Washington, DC. We'll be everything you've ever said published. discussing encryption and individual privacy on the Internet today.If some of these sites Diva: I found a photo of myself I didn't know interest you, bookmark 'em and goback to existed. them after the Whirl is over. That way, you won'tmiss any scintillating repartee from our Stewart Baker: Published Papers Diva, you won"t miss any new sites we push http://www.us.net/-steptoe/pubtoc.htm your way, and (most importantly) we won't melt anybody's server. Diva: I can imagine that you found a trove of information about yourself. You've been very Now, without further ado ... LET THE WEB vocal on this topic for some time. At a recent WHIRL BEGIN! debate last year, you and John Perry Barlow had a discussion about the role of government Diva: I want to thank Stewart Baker for joining in regulating online discourse. You said then us today as we examine one of the most that people who believe the Net is going to precious and fast-disappearing rights we have: create an anarchist utopia outside the authority the right to privacy. In an increasingly of government are uninformed. In what way? digitized world, where bits of personal information and confidential conversations Debate flow across insecure phone lines, we need to http://swarm.cs.wustl.edu/-mccap/debate/ use a tool to protect privacy. debate.html

Everyone agrees that encryption -- encoding Stewart Baker: The German prosecutor was information until it reaches its rightful able to keep CompuServe from giving access to destination -- will assure some measure of dozens of newsgroups. It may turn out that privacy. But how to encrypt? Who has the cyberspace is being regulated by everyone. right to use strong encryption? Should the government be able to preserve its right to Diva: How do we avoid having that happen? conduct court-approved wiretaps, even though Or can we?

10 Stewart Baker: I think we can, but it's going to tries to encourage use of key escrow in which take international pressure on governments the user has more choice about who controls that try to regulate too much. That means the his keys. That has more appeal, because as United States is going to have to take the lead more companies use encryption they in trying to prevent excessive regulation of the frequently discover that employees who die or Internet. leave on bad terms don't decrypt the files they leave behind. Very few companies want to give Diva: Jn the areas of encryption specifically? the only set of keys to their employees. Most Or are you speaking more generally about laws want to keep a copy somewhere. that govern online discourse, like the Communications Decency Act? Diva: So instead of a single repository that holds copies of keys to decrypt our private Stewart Baker: The latter. The regulations that transmissions, we're moving more to a model will not work on the Net are regulations of where there are different, private escrow individuals, like individual use of encryption. facilities? If this is true, will it dilute the The regulations that are likely to be excessive government's ability to gain access to those are those pertaining to businesses operating keys in the event of a court-approved wiretap online, or providing Internet infrastructure. situation?

Diva: Where did the United States government Stewart Baker: Yes. There are two problems go wrong in pushing the proposal to make the with the private escrow system, from the computer chip called Clipper the national government's point of view: First, very few encryption standard? companies have an interest in preserving the keys to phone conversations. So wiretapping NSA Home Page will become more difficult .... http://www.nsa.gov:8080/ Diva: Preserving those keys would mean Stewart Baker: The worst crime you can archiving a huge amount of data, wouldn't it? commit in Washington is to have a new idea. And Clipper was certainly a new idea. The chip Stewart Baker: Not necessarily. There are is actually not quite as dead as many believe: companies that monitor the phone calls of There will be hundreds of thousands deployed employees for good reasons (and sometimes in government operations over the next few for bad ones), and if the employees have years. encrypted lines, the companies might want to keep keys just long enough to listen in and Diva: Deployed because they are imbedded in then destroy them. After all, if you keep tapes equipment the government purchased? of the conversations, you don't need keys once the conversations are over. Stewart Baker: Yes. They will be in PC Cards used for secure e-mail, and some other RSA Security Inc. functions. http://www.rsa.com/

NSA Security Guidelines Diva: We're looking at the RSA home page. http://www.tscm.com/NSAsecmanual t .html The RSA created a strong public key cryptography system, which was a Diva: But Clipper as a national standard seems breakthrough: You could split your key, and to be an idea that's passe. make it harder for an enemy to crack your code. Would any of the initiatives that we're Stewart Baker: Yes. discussing today -- public or private Diva: Where are we headed now instead? -- have been possible without RSA?

Stewart Baker: The latest government initiative Stewart Baker: Public key encryption changed

11 the world forever. Before that, keys were investigations, but I do know the French automatically escrowed with the person who government was inclined to refuse licenses to administered the system. What RSA made US products containing 40-bit encryption. possible was a completely decentralized encryption system. Diva: Products containing encryption devices are sometimes classified as weapons, correct? Diva: No Big Brother? Stewart Baker: They are on the munitions list Stewart Baker: That's right. administered by the State Department. I'm not sure that an application was ever filed for them, RSA Frequently Asked Questions but they were designated t0 require a license http://www.rsa.com/rsalabs/faq/ for export, and probably did. faq_gnrl.html#gnrl Sparky: Stewart, is it true that T-shirts Diva: But no encryption system is inviolable. imprinted with the source for encryption Didn't some hackers recently crack RSA using algorithms and available via the Net were the combined strength of computers hooked themselves classified as munitions? up to the Net? Diva: Some guy had an algorithm tattooed on Stewart Baker: They broke what would now be his body in Wired magazine. described as a very short RSA key. We will always see advances in the ability of computers Stewart Baker: I believe all these things were to break keys through exhaustion of every variants of Perl code. possible key combination. But with public key encryption, it is far easier to increase the PGP - Pretty Good Privacy length of the key than tO increase the cracking http://netaccess.on.ca/ugali/crypt/index/html ability of supercomputers. Diva: We're looking at a site now that deals Diva: It makes me feel like the search for Truly with PGP, which as most people know stands Strong Encryption is like the search for a Holy for Pretty Good Privacy -- an encryption Grail. If what looks like strong encryption software programmed written by Phil roday becomes Swiss cheese tomorrow, who Zimmermann and distributed widely. can we trust? Why bother to use any encryption? Stewart, if everyone in the world adopted PGP to send their e-mail to each other, would that Stewart Baker: First, most people in this totally thwart the government's attempts to business are too quick to assume that gain access to encrypted conversations? decryption is easy. I have heard many cypherpunks refer to 40-bit encryption as "toy Stewart Baker: It would certainly make the encryption" or as "trivial to break." lives of investigators much more difficult. People who use encryption, even very good Diva: Even two-bit encryption would stop me encryption, often make mistakes. Law dead in my tracks. enforcement could exploit those mistakes.

Stewart Baker: Both the Los Angeles Police Diva: We're talking about these encryption Department and the French government have programs as if they're easy to use. But I had great difficulty dealing with encryption at imagine a very small percentage of the public even that strength. who uses modems actually uses encryption. Is that because people are uninformed about the Diva: Who was using such encryption to try to importance of the issue? Or is it because thwart the authorities? Do you know? encryption in its current incarnation is too Stewart Baker: I don't have details on particular hard to use?

12 Stewart Baker: It's not lack of information so Diva: And anyone who uses a Web browser much as a conviction that most of what we should be aware that the browser company transmit doesn't require encryption. One of may be giving personal information about its the dumbest things that industry has done in users to the administrators of Web sites that the debate is to insist that encryption is their users visit: e-mail address name ... age ... necessary for credit card numbers on the and any other registration information. In that Internet. sense, we're giving away our own privacy.

Diva: It's not? Web Browsers & Privacy r http://www.uiuc.edu/-ejk/WWW­ Stewart Baker: I have yet to hear of a single privacy.html instance in which credit cards were stolen through eavesdropping on the Net and used to Stewart Baker: Yes. I think Americans would buy products. Meanwhile, we've scared off the be better off if they took a slightly more consumers whose purchases would help to European view to privacy. We see government build a truly robust Net infrastructure. as a great threat to privacy; Europeans see businesses as the principal threat. We should Diva: This brings me to a key question (no probably worry more about business invasions pun intended): Do we have any idea how often of privacy than we do. someone -- a hacker, for instance-- is intercepting data transmissions such as e-mail Diva: But doesn't the United States over the Net? government hold a huge amount of personal information at its fingertips? The IRS? The Stewart Baker: I'm not a technologist, but it's Social Security Administration? HHS? NSA?? my understanding that eavesdropping on the Internet is a lot harder than most people Stewart Baker: Yes, they do. But it's not clear believe. The packets are traveling separately that they have more personal information than across the Net and are often reassembled only the credit rating bureaus and the insurers. on the user's servers. So eavesdropping between servers is often extremely difficult. Sparky: And doesn't the government have stricter policies about the cross-referencing AskMe: With the current level of encryption and centralization of that information than available, just how vulnerable are credit card private business? numbers to being intercepted? Stewart Baker: Certainly, the government has Stewart Baker: I think the risk is low. First, it's many more laws preventing the gathering and only going to cost you fifty dollars if it compilation of such information than private happens. Second, it requires access to a industry. That reflects our bias against machine along the path of the message you government invasions of privacy. sent. Finally, you have to ask yourself whether you treat your physical card with great care. Diva: You're guaranteeing that the IRS won't Most people hand it to a guy earning minimum give my tax returns to NSA if asked?? wage and wearing a ponytail and let him keep it 10 minutes a week! Stewart Baker: It would be illegal for NSA to ask -- and illegal for the IRS to provide it. The Diva: You're referring to Sparky? government probably doesn't pay civil servants enough for them to take that risk. Sparky: (Hey!) The Stalker's Page Stewart Baker: If you're willing to do that, you http://pages.ripco.com:8080/-glr/stalk.html can probably trust your card to the Net.

13 Diva: This is the Stalkers' Page. Why does it shocked you? comes as a big surprise that this kind of personal information is available online when Stewart Baker: No. Although I sometimes these public databases have been available off­ have been surprised about the extent of line for years? As a newspaper reporter, I was people's knowledge of public facts about me. able to use public databases to look up all kinds of really personal information about Diva: Such as? friends, colleagues, neighbors ... old college roommates .... Stewart Baker: I remember seeing an e-mail posting criticizing my position on encryption Stewart Baker. ... boyfriends ... and mentioning the town that I lived in.

Diva: Everything from their current addresses Diva: Did that make you feel vulnerable? to how big of a mortgage they held. to whether they were registered Republicans or Stewart Baker: When you work at NSA, you Democrats. I wonder if the average person has get used to the idea chat somebody is probably any sense at all of how exposed we all are. For trying to listen to all of your conversations. instance: Our addressees are probably accessible through the databases on this Web Anonymity site. http://www.suck.urc.rue.ni/-galacrus/ remailers/index-anon.html Stewart Baker. Yes, and this is part of the power of the Net. What you used to be able to Diva: Anonymous remailers are computers do only if you were in the business of that act as post office boxes on the Net. You gathering information anyone can do today can just sign up for one with a number and with a click of a mouse. drop off and pick up your e-mail there without revealing your identity. Don't anonymous Anonymity and Privacy on the Internet remailers totally subvert government attempts http://www.stack.urc.tue.nl/-galactus/ at surveillance, since the identity of the person remailers/index/html sending a data tra·nsmission remains secret?

Diva: Of course, what probably saves us is the Stewart Baker: They can -- although we've all fact that the average person is far less nosy seen rumors to the effect that some of these than I am .... remailers are operated by secret services of vanous governments. Sparky: (and she's pretty nosy) Diva: Do you believe the rumors? Diva: and wouldn't want to spend the time looking up the amount of his next door Stewart Baker: It would be cheap fun for neighbor's mongage. government agents. So it would surprise me if someone hadn't tried it at least once. Stewart Baker. Yes, this is security through being boring. Diva: In your opinion, should our government try to regulate the use of anonymous remailers Diva: For years it worked. in anyway?

Stewart Baker. For some of us, it still does. Stewart Baker. Anonymous remailers are not widely used. At one point, they had nearly Diva: Have you ever had a situation in your life disappeared because of concern about liability where someone found out something about for threatening messages through them. you -- something personal that you didn't know was in the public domain-- and it Diva: The owner of the computer could be

14 liable for the content sent through the from now would be difficult. Diffie's prime computer? contribution will be remembered as his use of digital signatures, rather than encryption. Stewart Baker: This is America -- anybody could be liable for anything! Diva: Could you explain what digital signatures are? Steganography http://www.stack.urc.tue.ni/-galactus/ Stewart Baker: They are the flip side of public remailers/index-stego.html key encryption. If I can encrypt a message with my private key, it can be decrypted with Stewart Baker: Seriously, if providing my public one. Since I'm the only one who anonymity prevented the police from tracing a knows my private key, I'm the only one that criminal message, the risk of liability can't be can send messages that my public key can ignored. decrypt.

Diva: If I were a kidnapper, I'd send all ransom Diva: Stewart, can you predict where all this is demands through a remailer in Holland. headed? What will our nation view of encryption be in, say, a year? or five years? Stewart Baker: I'd recommend sending it through about ten. Even in Finland, Stewart Baker: We are already beginning to see Scientologists were able to break the secrecy of other countries jump into this debate. Some, anonymous remailers though government like France, are trying to control encryption cooperation. strictly. Others, like Japan, seem to favor a more laissez-faire approach. In the long run, CryptoRebels my guess is that the United States will have a http://www.stack.urc.tue.nl/-galactus/ mix of strong encryption and escrowed remailers/index-stego.html encryption, while other countries will rely on escrowed encryption. Diva: Back to cryptography. We can thank a scientist named Whit Diffie for the start of the Ask.Me: What are the merits of having an crypto revolution. In the 1970s, he figured out encryption standard for doing business over how to split the key that decodes encrypted the Net? data. He devised a system in which each user has both a public and private key unique to the Stewart Baker: What we need for Internet owner. Distribute your public key to people transactions is a secure payment system. Those who want to send you messages; use your systems will use encryption. Once we have private key to decode the transmission. Of those, there won't be a risk of credit card fraud course, Diffie did not envision a time when a and impersonation. copy of a key might be escrowed. I think his purpose was to make sure that third parties Businesses will still want some encryption to would not be involved. In this way, the make sure their trade secrets are protected, but encryption would be considered stronger. we could have a very robust economy in Stewart, what would we do today if Diffie cyberspace if we just have digital signatures hadn't made this breakthrough discovery? and cryptography for credit cards.

Public Key Cryptography Diva: We're out of time for today, http://raphael.math.uic.edu/-jeremy/ unfortunately, so we'll say goodbye. Thank crypt/pub_ key.html you again, Stewart, for joining us today.

Stewart Baker: Without encryption, we could Stewart Baker: It was a pleasure. l8J do most of the things we're doing today. But most of the things we expect to do five years

15 Zip-It SoftwarE Anyone can extract zipped files without a hassle. Vertisoft With the old DOS-based compression utilities, you "Now, compressing any file by up to 98% is as had to extract an entire ZIP easy as point-and-click." archive to get a single file If you want to save time and money out. With Vertisoft Zip-It, compressing or trasferring files online, simply point-and-click to Vertisoft Zip-it is a must-have utility. Vertisoft extract just the files you Zip-It is the fastest and easiest way to ZIP and want.And, V ertisoft Zip- unZIP files in Windows 95 and Windows 3.1. 1t 's exclusive Zip-It Plus Compressing, viewing or extracting zipped feature creates self­ files is as easy as pont-and-click! extracting files you can easily share with anyone File compression has never been so easy! else. Just double-click the Forget those cryptic commands you have to icon and extract the files use with DOS-based files compression you want. programs. With Vertisoft Zip-It, just pick the files you want zipped, drag and drop them Powerful archive tools. onto Zip-It's window, and you're done. For extra large files Vertisoft Zip-It's Span Disk 100% PKZIP-compatible, 100% lntemet­ feature automatically backs ready. up zipped archvies across Vertisoft Zip-It is 100% compatible with the multiple diskettes. And, industry standard PKZIP format. It is also Vertisoft Zip-It's handy fully compatible with the TAR archive format Search feature helps you used in many Internet sites. locate files inside ZIP files in a flash, while our Zip Zips into Windows 95 or Windows 3.1, Options let you customize automatically! your archiving. Vertisoft Zip-It automatically adds itself to the Windows 95 Explorer and the Windows 3.1 Try Zip-It without risk! File Manager interfaces. To compress, view, or We guarantee your extract, you simply point-and-click. satisfaction 100 percent. If Vertisoft Zip-It doesn't Instantly view or edit zipped files. simplify your file Vertisoft Zip-It gives you the power to management and speed up instantly view files within any archive without online downloads, you can having to extract them. Just point-and-click to return it within 30 days for view, edit or even run files that are still zipped. a prompt refund. Vertisoft Zip-It even lets you work with multiple ZIP files at the same time.

Exclusive built-in viewer instantly shows you System Requirements any of these popular file formats: Windows 95 - 386DX or better, 4MB RAM ASCII, Hex, PCX, TIP, GIF, BMP, WMF, (8MB recommended), 3MB free disk space, ICO, Microsoft Word, WordPerfect, AMI VGA or better monitor.Windows 3.x - 386 or PRO/WordPro, Q&A, Windows Write, xBase, better, 4MB RAM, 3MB free disk space, VGA Paradox, Lotus, Excel, Quattro Pro, Microsoft or better monitor. Works, LZH, ZIP.

16 NamE-lt SottwarE Cool Tools

Vertisoft http://www.vdolive.com/index.html Watch streaming video with the VDOLive Automatically update Windows 3.1 applications plug-in for Netscape 2.0b. Yahoo, Ziff-Davis to use Windows 95 long filenames! Net and CBS are already sending live feeds If you think Windows 95 lets you give all your down the Web. VDOLive is a cinch to install files long, meaningful names, think again. The and doesn't bog down the view screen with fact is, you can't use Windows 95 long proprietary navigation buttons or scroll bars. filenames with any of your Windows 3.1 Currently only a Windows version is available. applications. http://204.62.160.251/ Luckily, there is a solution. Xing's Streamworks is another tool for We call it Name-It. If you want long filenames, streaming video and audio over the Net. you need Name-It! With Name-It, every single Country music station KPIG, NBC and one of your Windows 3.1 applications can use Bloomberg Information News Radio WBBR filenames that state exactly what each file is, are only a handful of the broadcasters using instead of those old eight-character filenames Xing's technology. Streamworks is available to that often look like secret codes. Wouldn't you Unix, Windows and Macintosh platforms. rather call a file 'Third Quarter 1995 Sales" instead of "3qt95sal.xls"? It's no contest. Name­ http://www.worlds.net It frees you from confusing, abbreviated W odds Inc.has redefined chat as we know it. filenames - automatically! Start using long Download AlphaWorld and go for a 3-D spin filenames today. Name-It lets you exploit the in the virtual community of the future. Talk to, advantages of long filenames right now. You or walk through, your neighbors. Build city don't have to wait for the Windows 95 upgrade streets, blocks, houses or anything your heart of your favorite application, or spend literally desires. It's "Snow Crash" brought to life. hundreds of dollars upgrading all your Worlds Inc. software is available for Windows Windows 3.1 applications. platforms.

For online and Internet users http://www.paperinc.com/index.html Name-It is perfect to use with your favorite W ebFX is the first VRML plug-in for online service or Web browser. With Name-It, Netscape. It lets you fly through 3-D worlds you can now give meaningful filenames to your seamlessly through the browser. This is downloaded files instead of the 8-character currently only PC-compatible and the WebFX limit you currently have. beta 3 version expires March 1, 1996.

Absolutely hassle-free operation Name-It installs in seconds, works quietly in the background, and automatcially updates Windows 3.1 applications so you can use http://www.realaudio.com/ Windows 95 long filenames. It's a snap! You The Real Audio plug-in is a must for Web just install it and forget it. Name-It is expressly surfers. So many sites are posting Real Audio designed for the Windows 95 so the files, you'd better download the player, lest you long filenames it creates can be used by any be left out of the loop. ABC, NPR, Hotwired, Windows 3.1 and Windows 95 applications. C/Net are among those using RealAudio to add sound to their sites. RA 2.0b allows for System Requirements : Windows 95 - 386DX 28.8 modem connections or faster to play FM­ or better, 4MB RAM (8MB recommended), quality broadcasts and is now available for Mac, .5MB free disk space, VGA or better monitor. PC and Unix platforms . Windows 3.x - 386 or better, 4MB RAM, .5MB free disk space, VGA or better monitor. (Corztir1ued or1 page 19)

17 JAZ-ThE UltimatE Hard DrivE! Use one Jaz disk to: Save over 8 hours of CD-quality sound Iomega Supplement your existing hard disk with expandable storage Faster than most hard drives (works as Perform non-linear editing on broadcast­ fast as you do!) quality video for commercials, special Provides 1GB of disk space on each effects sequences, and animation compact cartridge (enough to back up Develop and master CD-ROM your entire hard drive!) applications Portable - goes where you go (makes Transfer huge graphics files to service transporting information easier!) bureaus and printers Backup your entire system on one disk, An ideal answer for multimedia quickly Jaz drives and disks are the ideal solution for Collect 150 color photos in your very own storing, transporting and playing multimedia digital photo album applications. You can pack up to 1 gigabyte of Record a 2-hour movie each disk, and there is no limit to the number of disks you can use. The Jaz drive's speedy Network Manager access times and rapid transfer rate mean you ''The key to data security is regular backup, and can quickly and easily move files around. And the key to regular backup is to make the the Jaz drive can handle even the most process as painless as possible. Being able to demanding usage's, including full screen, backup a gigabyte every five minutes does fullmotion video. much to take the pain out of even full system backups." Elegant backup for large systems Backing up today's larger PCs and network MIS Director systems has been tough. Now, with aJaz drive, "Half our users outgrow their hard drives every you can backup a 1 gigabyte hard disk in as year. Replacing those drives was both a cost little as 5 minutes. With the Jaz drive's speed and hassle issue. With Jaz drives, we will get and the Jaz disk's capacity (up to 2 gigabytes off the upgrade treadmill without paying a per disk with compression), even large system performance or capacity penaity to go to backups are easier. removable drives."

Eliminate the anxiety of hard drive upgrades Graphic Designer Jaz is the 5-minute solution to upgrading hard ''This is the drive of the future for the graphics drives. Simply plug the Jaz drive into a SCSI industry. The combination of great capacity, port and you instantly have a second hard unlimited storage, incredible performance and drive: one that works faster than most and has affordable pricing make Jaz the answer to a a full gigabyte of capacity. And, you can have designer's prayers." access to unlimited storage space by simply adding disks as you need them. For those who Video Editor want a more compact solution, a Jaz insider "Non-linear editing of broadcast-quality video drive fits into any available 3.5" drive bay. is a tremendous memory hog. The Jaz disk is the only economical answer to providing the Jaz disk mean creativity has no limits speed and capacity we need. I expect to see Jaz No longer will file size constraints limit your drives in every post-production suite within a creative processes. With the combination of year." Jaz drives and disks you have the answer to all your storage needs, both for today and for the Jaz tools software makes finding future. the right stuff easy Keeping track of several gigabytes of file space is simple with !omega's J az tools. A cataloging

18 feature tracks all your files on all you Jaz disks. presenting some of the concerns today in the Existing files on floppy disks, Bernoulli disks computer industry and how those concerns or any other removable media can be easily will become very serious problems in the consolidated onto Jaz disks with a few simple future. Those problems included invasions of commands. And, because of the huge capacity privacy, unemployment, endangerment of first of each Jaz disk, backing up your hard drive amendment rights, employee rights, and has never been easier - get it all on one outrageous costs of services, hardware and compact disk! software. Robert Mitchell who had prepared the disk of the month, explained what it Jaz product line contained and it was offered to the members. Portable Jaz drive with SCSI connection (In the future with the availability of a large Insider Jaz drive with SCSI connection 1 projection screen, the DOM will be gigabyte Jaz disk (1,070MB PC formatted demonstrated.) capacity) 540 megabyte Jaz disk SCSI Interface cards GazJet & others) Jaz travel case double­ The date and new location of the next meeting click its icon! was announced as June 26 in the executive conference room at EPRI (Electric Power Genera/ Meeting Minutes Research Institute) on Hillview in Palo Alto. June 5, 1996 Gratitude was expressed to Bob Evans, Paul Krenski and Les Lakey at MediaCity for Dan Gillmor, computing editor for the San providing us with the facilities we have had for Jose Mercury was the first guest of the the past many months. Thanks was also evening. Mr. Gillmor spoke of what's ahead in expressed to Jim Dinkey for making the the computer industry and more particularly arrangements that will allow the use of the the direction the Internet is taking and what facilities of EPRI. Random Access and a we might expect. He foresaw the information drawing concluded the meeting. potential of the Internet eventually causing a dramatic change in the newspaper business Upcoming Meetings: July 31 particularly in circulation which ultimately Syrnantec/ Utilities/Comm effects revenue and the ultimate need to Suite downsize. He pointed out how low cost network computers built for the limited Cool tools from page I 7 purpose of accessing the network will become as common as telephones. The question was http://www.vocaltec.com posed for the need for some kind of control of InternetPhone from Vocal T ec is a cool tool the Internet and who should do it. There was the phone company doesn't want you to know also concern with first amendment rights with about. If you've got a microphone and sound regard to potential censorship. One of a card on your PC, you can talk in real-time to number of other subjects covered included the other Net users. Internet Phone works future of the Apple Corporation. It was through voice-activation, so your predicted that whatever happens to Apple, the conversations are seamless. You can also click Mac platform is here to stay. to find who else is in your Net calling circle. The latest version, InternetPhone 3.1 b, is now The second guest of the evening, was Audrie available for free. Krause, the executive director of CPSR (Computer Professionals for Social http://home.netscape.com/com prod/ Responsibility). The mission of CPSR is to products/navigator/version_2.0/plugins/ provide the public and policy makers with index.html realistic assessments of the power, promise and Netscape plug-ins are constantly being problems of information technology and what developed; it seems there is a new tool effect it has on society in general. Ms. Krause announced every day. Stay on top of the latest broadened the subject of the future by for-release and beta products available.

19 Stanford Palo Alto Users Group for PC POB3738 Stanford, CA. 94309-3738 http://www.mediacity.com/-spaug/ Membership Dues $35 annual

Address Correction Requested

Inside News

Words from the Prez - pg 1

Disk of the Month - pg 3

Daily Exercise - pg 3 What is Shockwave? - pg 4 NEW Location Remove-It Software - pg 6 NEW Date SyQuest Technology - pg 7 ~e'C.al d'f.eetlnl The Dame Was Loaded - pg 8 'Ve'Ct&ftJJemo Windows NT Hardware - FAQs - pg 9 cJtemova-'lt Encryption & Privacy on the Net - pg 10 dfame-'lt Zip-It Software - pg 16 Jlp-'lt Name-It Software - pg 17

Cool Tools - pg 17 Wednesday, June 26th

Jaz Hard Drive - pg 18 7:30 PM Electric Power Research General Meeting Minutes - pg 19 Institute Conference Center SuppEr with SPAUG 3412 Hillview Avenue

6PM Palo Alto (415) 855-2000 before General Meeting 2515 El Camino Real The SPAUG Home Page is sponsored Palo Alto and provided by: The Olive Garden MediaCity Inc. (415) 321-6800 (near Page Mill Rd.)