[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference hydra::amiga_v1

Title:AMIGA NOTES
Notice:Join us in the *NEW* conference - HYDRA::AMIGA_V2
Moderator:HYDRA::MOORE
Created:Sat Apr 26 1986
Last Modified:Wed Feb 05 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:5378
Total number of notes:38326

4720.0. "Be grateful PRODIGY doesn't 'do' Amiga!" by BOMBE::MOORE (Amiga: Where 'multimedia' REALLY began) Wed May 01 1991 21:57

                            <<< SHALOT::EMPPURPRO >>>
                         -< Employee Purchase Program >-
================================================================================
Note 390.0                 WARNING!!! to PRODOGY users                No replies
POBOX::KAPLOW "Set the WAYBACK machine for 1982"    346 lines   1-MAY-1991 18:10
--------------------------------------------------------------------------------
        [The following has been circulating around the Enet; in fact I've
        recieved 3 copies in the past 24 hours. I am posting it here in
        case anyone is using or knows anyone using Prodogy. Of course I
        cannot comment on the accuracy of these comments, but they do make
        me concerned - RGK]
        
        
RISKS-LIST: RISKS-FORUM Digest  Monday 29 April 1991  Volume 11 : Issue 56

        FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS 
   ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

  Contents: 
Prodigy and GEnie hate and rumors (George J Marengo, Donald E. Kimberlin, 
    Alex Cruz, from comp.dcom.telecom via Mark A. Emanuele, Jerry Sweet, 
    and Geoff Goodfellow)

 The RISKS Forum is moderated.  Contributions should be relevant, sound, in 
 good taste, objective, coherent, concise, and nonrepetitious.  Diversity is
 welcome.  CONTRIBUTIONS to [email protected], with relevant, substantive 
 "Subject:" line.  Others ignored!  REQUESTS to [email protected].  For
 vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
 CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 11, j always TWO digits).  Vol i
 summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
 <CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.
 If you cannot access "CRVAX.SRI.COM", try Internet address "128.18.10.1".
 ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
 Relevant contributions may appear in the RISKS section of regular issues
 of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

----------------------------------------------------------------------

Date: Mon, 29 Apr 91 07:31:47 MST
From: the terminal of Geoff Goodfellow <[email protected]>
Subject: Jerry Sweet: [comp.dcom.telecom: Prodigy and GEnie hate and rumors]

------- Forwarded Message

Date:  Sun, 28 Apr 91 22:44:01 MST
From:  Jerry Sweet <[email protected]>
Subject:  [comp.dcom.telecom: Prodigy and GEnie hate and rumors]
To:  "Jerry's Clipping Service":;@fernwood.mpk.ca.us

3 items: 
  - Prodigy or Fraudigy ???
  - Prodigy Questions
  - GEnie Management Acting a la Prodigy Management?

- ------- Forwarded Messages

Date:    26 Apr 91 19:09:50 GMT
From:    [email protected] (Mark A. Emanuele)
Subject: Prodigy or Fraudigy ???

I just downloaded this from a local bbs and thought it might be interesting.


 ### BEGIN BBS FILE ###

   218/250: Fraudigy  
   Name: George J Marengo #199 @6974 
   From: The Gangs of Vista (Southern California) 619-758-5920


        The L. A. County District Attorney is formally investigating PRODIGY
for deceptive trade practices.  I have spoken with the investigator assigned
(who called me just this morning, February 22, 1991).

We are free to announce the fact of the investigation.  Anyone can file a
complaint.  From anywhere.

The address is:                                                         

District Attorney's Office                                              
Department of Consumer Protection                                       
Attn: RICH GOLDSTEIN, Investigator                                      
Hall of Records   Room 540
320 West Temple Street                                                  
Los Angeles, CA 90012                                                   

Rich doesn't want phone calls, he wants simple written statements and
copies (no originals) of any relevant documents attached.  He will
call the individuals as needed, he doesn't want his phone ringing off
the hook, but you may call him if it is urgent at 1-213-974-3981.

PLEASE READ THIS SECTION EXTRA CAREFULLY.  YOU NEED NOT BE IN
CALIFORNIA TO FILE!!

        If any of us "locals" want to discuss this, call me at the Office
Numbers: (818) 989-2434; (213) 874-4044.  Remember, the next time you pay your
property taxes, this is what you are supposed to be getting ... service.  Flat
rate?  [laugh] BTW, THE COUNTY IS REPRESENTING THE STATE OF CALIFORNIA.  This
ISN'T limited to L. A.  County and complaints are welcome from ANYWHERE in the
Country or the world. The idea is investigation of specific Code Sections and
if a Nationwide Pattern is shown, all the better.

LARRY ROSENBERG, ATTY

  Prodigy: More of a Prodigy Than We Think? 
  By: Linda Houser Rohbough                                    

     The stigma that haunts child prodigies is that they are difficult to get
along with, mischievous and occasionally, just flat dangerous, using innocence
to trick us. I wonder if that label fits Prodigy, Sears and IBM's
telecommunications network?

     Those of you who read my December article know that I was tipped off at
COMDEX to look at a Prodigy file, created when Prodigy is loaded STAGE.DAT. I
was told I would find in that file personal information form my hard disk
unrelated to Prodigy.  As you know, I did find copies of the source code to our
product FastTrack, in STAGE.DAT. The fact that they were there at all gave me
the same feeling of violation as the last time my home was broken into by
burglars.
                                                                          
     I invited you to look at your own STAGE.DAT file, if you're a Prodigy
user, and see if you found anything suspect. Since then I have had numerous
calls with reports of similar finds, everything from private patient medical
information to classified government information.
                                                                          
     The danger is Prodigy is uploading STAGE.DAT and taking a look at your
private business. Why? My guess is marketing research, which is expensive
through legitimate channels, and unwelcomed by you and I.  The question now is:
Is it on purpose, or a mistake?  One caller theorizes that it is a bug. He
looked at STAGE.DAT with a piece of software he wrote to look at the physical
location of data on the hard disk, and found that his STAGE.DAT file allocated
950,272 bytes of disk space for storage.
                                                                          
     Prodigy stored information about the sections viewed frequently and the
data needed to draw those screens in STAGE.DAT. Service would be faster with
information stored on the PC rather then the same information being downloaded
from Prodigy each time.
                                                                          
     That's a viable theory because ASCII evidence of those screens shots can
be found in STAGE.DAT, along with AUTOEXEC.BAT and path information. I am led
to belive that the path and system configuration (in RAM) are diddled with and
then restored to previous settings upon exit. So the theory goes, in allocating
that disk space, Prodigy accidently includes data left after an erasure (As you
know, DOS does not wipe clean the space that deleted files took on the hard
disk, but merely marked the space as vacant in the File Allocation Table.)
                                                                           
     There are a couple of problems with this theory. One is that it assumes
that the space was all allocated at once, meaning all 950,272 bytes were
absorbed at one time.  That simply isn't true.  My STAGE.DAT was 250,000+ bytes
after the first time I used Prodigy. The second assumption is that Prodigy
didn't want the personal information; it was getting it accidently in uploading
and downloading to and from STAGE.DAT. The E-mail controversy with Prodigy
throws doubt upon that. The E-mail controversy started because people were
finding mail they sent with comments about Prodigy or the E-mail, especially
negative ones, didn't ever arrive. Now Prodigy is saying they don't actually
read the mail, they just have the computer scan it for key terms, and delete
those messages because they are responsible for what happens on Prodigy.
                                                                           
     I received a call from someone from another user group who read our
newsletter and is very involved in telecommunications.  He installed and ran
Prodigy on a freshly formatted 3.5 inch 1.44 meg disk. Sure enough, upon
checking STAGE.DAT he discovered personal data from his hard disk that could
not have been left there after an erasure. He had a very difficult time trying
to get someone at Prodigy to talk to about this.
                                                                       
                           --------------

Excerpt of email on the above subject:

THERE'S A FILE ON THIS BOARD CALLED 'FRAUDIGY.ZIP' THAT I SUGGEST ALL
WHO USE THE PRODIGY SERVICE TAKE ***VERY*** SERIOUSLY.  THE FILE
DESCRIBES HOW THE PRODIGY SERVICE SEEMS TO SCAN YOUR HARD DRIVE FOR
PERSONAL INFORMATION, DUMPS IT INTO A FILE IN THE PRODIGY
SUB-DIRECTORY CALLED 'STAGE.DAT' AND WHILE YOU'RE WAITING AND WAITING
FOR THAT NEXT MENU COME UP, THEY'RE UPLOADING YOUR STUFF AND LOOKING
AT IT.

     TODAY I WAS IN BABBAGES'S, ECHELON TALKING TO TIM WHEN A
GENTLEMAN WALKED IN, HEARD OUR DISCUSSION, AND PIPED IN THAT HE WAS A
COLUMNIST ON PRODIGY. HE SAID THAT THE INFO FOUND IN 'FRAUDIGY.ZIP'
WAS INDEED TRUE AND THAT IF YOU READ YOUR ON-LINE AGREEMENT CLOSELY,
IT SAYS THAT YOU SIGN ALL RIGHTS TO YOUR COMPUTER AND ITS CONTENTS TO
PRODIGY, IBM & SEARS WHEN YOU AGREE TO THE SERVICE.

     I TRIED THE TESTS SUGGESTED IN 'FRAUDIGY.ZIP' WITH A VIRGIN
'PRODIGY' KIT.  I DID TWO INSTALLATIONS, ONE TO MY OFT USED HARD DRIVE
PARTITION, AND ONE ONTO A 1.2MB FLOPPY.  ON THE FLOPPY VERSION, UPON
INSTALLATION (WITHOUT LOGGING ON), I FOUND THAT THE FILE 'STAGE.DAT'
CONTAINED A LISTING OF EVERY .BAT AND SETUP FILE CONTAINED IN MY 'C:'
DRIVE BOOT DIRECTORY.  USING THE HARD DRIVE DIRECTORY OF PRODIGY THAT
WAS SET UP, I PROCEDED TO LOG ON.  I LOGGED ON, CONSENTED TO THE
AGREEMENT, AND LOGGED OFF. REMEMBER, THIS WAS A VIRGIN SETUP KIT.

     AFTER LOGGING OFF I LOOKED AT 'STAGE.DAT' AND 'CACHE.DAT' FOUND
IN THE PRODIGY SUBDIRECTORY.  IN THOSE FILES, I FOUND POINTERS TO
PERSONAL NOTES THAT WERE BURIED THREE SUB-DIRECTORIES DOWN ON MY
DRIVE, AND AT THE END OF 'STAGE.DAT' WAS AN EXACT IMAGE COPY OF MY
PC-DESKTOP APPOINTMENTS CALENDER.

     CHECK IT OUT FOR YOURSELF.

 ### END OF BBS FILE ###

I had my lawyer check his STAGE.DAT file and he found none other than
CONFIDENTIAL CLIENT INFO in it.

Needless to say he is no longer a Prodigy user.


Mark A. Emanuele   V.P. Engineering  Overleaf, Inc.
218 Summit Ave   Fords, NJ 08863   (908) 738-8486 
[email protected]


[Moderator's Note: Thanks very much for sending along this fascinating
report for the readers of TELECOM Digest. I've always said, and still
believe that the proprietors of any online computer service have the
right to run it any way they want -- even into the ground! -- and
that users are free to stay or leave as they see fit. But it is really
disturbing to think that Prodigy has the nerve to ripoff private stuff
belonging to users, at least without telling them. But as I think
about it, *who* would sign up with that service if they had bothered
to read the service contract carefully and had the points in this
article explained in detail?    PAT]

- ------- Message 2

Date:    27 Apr 91 19:53:00 GMT
From:    [email protected] (Donald E. Kimberlin)
Subject: Re: Prodigy Questions

     In article (Digest v11, iss303), Arnette P. Baker <ihlpf!kityss@
att.uucp> asks:

> I am looking for information on Prodigy.  I am looking into it because
> my parents just bought a PC and are looking for things to do with it
> ...question I have involves e-mail.

     Prodigy's interpretaion of what constitutes "mail," particularly e-mail,
has been a particular point of discussion.  It seems that from the perspective
of a lot of the public, Prodigy wants to have its cake and eat it too, in that
they CHARGE you for its delivery, and then CENSOR anything they don't like.

     Even the Postal Service doesn't look inside your envelope when you mail
something, even though that may be something objectionable.  We can. of course,
understand an electronic bulletin board's System Operator reserving the right
to delete items not in keeping with the Sysop's policies.

     But Prodigy seems to be trying to go a step further, charging you for more
than a minimal amount of transmission, and heavily censoring what it
transports.  This might sound incredible, but the press report I saw at the
peak of public outrage concerned Prodigy censoring a message in which a coin
collector was asking about "Roosevelt dimes."  When he asked the Prodigy staff
why they deleted his mail, the unbelievably stupid retort was that "pro{oting
personalities is prohibited."  When he pressed about what "personality
promotion" was involved with Roosevelt dimes, the more unbelievably stupid
reason was, "Why, Roosevelt Dimes, the Chicago Bears football player, of
course!"  I have NOT made this story up.  I wish I could recall the publication
source to prove it.

     Incidents like this have caused suficient public outcry that Prodigy is
under investigation, as summed up in the following snippet from <Information
WEEK>, 4/22/91:

                      "FAR FROM A PRODIGY"

     (Network World, April 15, p.4) Prodigy Services Co. is being investigated
for possible criminal or civil violations stemming from its electronic-mail
pricing and bulletin board editing policies.  Users are complaining about the
on-line service's recently established 25-cent price tag for every E-mail
message after the first 30 allowed per month; they claim that Prodigy's policy
pf deleting or editing controversial or obscene' (since when are Roosevelt
dimes either controversial OR obscene?) "messages from bulletin boards violates
the First Amendment.  (DA Probes BBS Practices at Prodigy, by Barton
Crockett)."

     My own opinion is that your parents would be best off to assert one of our
few remaining rights, to just take that Prodigy kit and return it to Sears
before they cancel the famous Sears money-bakc guarantee.  There are plenty of
other places to have both bbs recreation and to use "electronic mail" provided
by responsible parties.  Even MCIMail has a deal where your e-mail (of moderate
length) costs only 25 cents per message, while it reaches a far wider range,
including real business.

     And, oh. Compu$erve's "e-mail" to the outside world is really a port to
MCIMail, so why not just open an MCIMail account and buy it direct, and
cheaper?

     All you need to do to help is to get an easy-to-use comms program for
their Sears-bought PS/1 (I recommend BOYAN as a very easy program for beginners
to use, especially if you install it and enter the dialing directory numbers
for them) and introduce them to the world of REAL bbs-ing. In fact, if you get
onto a commercial e-mail service and request it of our Moderator, he can get
the Digest delivered to DOS, MAC or what-have-you there daily!

[Moderator's Note: This is correct. TELECOM Digest can be (and is!) delivered
to almost every commercial email service in the world.  Copies go to MCI Mail,
ATT Mail, Telemail/Sprint Mail, Compuserve, Portal, and many others including
the Telebox Mail system in Germany.  All you have to do is provide me with a
working path to get there.  PAT]

- ------- Message 3

Date:    26 Apr 91 13:56:00 GMT
From:    [email protected]
Subject: GEnie Management Acting a la Prodigy Management?

Dear Telecom Readers:

In the {MacWeek}, April 16th, 1991, Volume 5, Number 14 issue, there
is a story about a user lockout in the GEnie on-line service:

A Toronto couple requested an explanation of the online service's recent
lockout of members who disagreed publicly with GEnie management.

Linda Kaplan, a GEnie member for more than five years, had both her internal
account and her paid account discontinued last month in what she described as a
series of personality conflicts and escalating misunderstandings.  She said
that GEnie cancelled accounts not on the basis of rules being broken but just
because someone lost their temper.

Apparently, GEnie officials refused to comment on the matter but said
that they would clarify their policies in the future.

Ms. Kaplan had a paid account but she mainly used a systemwide free account
designed to bring in more users.  She said that some account holders were bound
by the secret agreements forbidding them from criticizing GEnie, its sysops or
executives.  She added that friends who inquired about her absence from forums
or who questioned management's handling of the incident either in on-line
forums or private electronic mail found themselves drawn into the fray.

When another long time user, Peter Pawlyschyn, contacted management
and inquired about his rights on the service, he found himself
censored and harassed.

Other members have said that they were reduced to read-only status or had their
accounts cancelled after simply mentioning Kaplan's name in postings.

Soooooo, here we go again with the issue of censoring certain
materials in large online systems.  Or is it really an issue?
                                    ^^^^^^^^^^^^^^^^^^^^^^^^^
Alex Cruz  Associate, Center for Advanced Study in Telecommunications
Consultant, American Airlines Decision Technologies

- ------- End of Forwarded Messages
------- End of Forwarded Message

------------------------------

End of RISKS-FORUM Digest 11.56
************************

T.RTitleUserPersonal
Name
DateLines
4720.1RebuttalBOMBE::MOOREAmiga: Where &#039;multimedia&#039; REALLY beganThu May 02 1991 20:4491
                            <<< SHALOT::EMPPURPRO >>>
                         -< Employee Purchase Program >-
================================================================================
Note 390.1                 WARNING!!! to PRODOGY users                    1 of 1
CSSE32::SCHUETZ "CSSE RALLY Maintainability Enginee" 84 lines   2-MAY-1991 12:45
                     -< You should post the rebuttal too. >-
--------------------------------------------------------------------------------

<forwards deleted>

Subj:	FWD: Followup on Prodigy:  a rebuttal

Subj:	Prodigy counterpoint

Subj:	Telecom  Volume 11 : Issue 316

DEC-ADMINISTRIVIA           TELECOM Digest     Mon, 29 Apr 91 21:20:30 CDT    
Volume 11 : Issue 316
 
From: Toby Nixon <[email protected]>
Subject: Re: Prodigy or Fraudigy ???
Date: 29 Apr 91 17:48:19 GMT
Organization: Hayes Microcomputer Products, Norcross, GA
 
 
In article <[email protected]>, overlf!emanuele@kb2ear.
ampr.org (Mark A. Emanuele) posted a BBS file containing hysterical
raving about Prodigy supposedly snooping through user's disks,
uploading and processing confidential information.
 
This is nonsense.  The STAGE.DAT file is allocated in large chunks
according to the level of usage of the service and the number of
different areas you visit.  The Prodigy software requests the space
from DOS, which allocates it from areas of the disk which previously
contained other files.  DOS does not erase the old information -- and
neither does the Prodigy software.  But the Prodigy software does not
READ sectors to which it has not first WRITTEN.  Any non-Prodigy
information in the STAGE.DAT file is left over from deleted files, in
sectors to which the Prodigy software has not yet written.  Remember
that even formatting a disk does not remove old information!
 
I was involved in early beta testing of Prodigy, was a charter member,
and have watched HOURS of Prodigy traffic on data line monitors.  I
have NEVER seen any information transmitted that was not typed by the
user, or originated within the software.  I've never seen ANYTHING
that even remotely gave me the impression that information from
previously-delete files was being transmitted.
 
The idea that Prodigy is slow because they're using bandwidth to
upload confidential information for analysis is just wrong. Watch your
modem lights!  Only tiny little bursts of transmission are sent.  MOST
of the time, the line is completely idle in both directions.  The
simple fact is that Prodigy is slow because the software is SLOW (it
was written in anticipation of us all having very fast CPUs, video
cards, and modems before too much longer), not because of some
sinister conspiracy to invade our private files.  Who could honestly
believe that two companies who are big fat targets for lawsuits would
do something so supremely stupid and easily detectable?
 
No, the biggest mistake Prodigy made was in not wiping clean
newly-allocated disk space in order to remove any questions in this
regard -- and I suspect that the next Prodigy software update will do
just that, considering the amount of noise that has been generated
over this non-issue.  We should all be concerned about privacy, but
this is grossly misplaced paranoia.
 
 
Toby Nixon, Principal Engineer    | Voice   +1-404-840-9200  Telex 151243420
Hayes Microcomputer Products Inc. | Fax     +1-404-447-0178  CIS   70271,404
P.O. Box 105203                   | UUCP uunet!hayes!tnixon  AT&T    !tnixon
Atlanta, Georgia  30348  USA      | Internet       [email protected]
 
 
 
End of TELECOM Digest V11 #316
******************************
 
% ====== Internet headers and postmarks (see DECWRL::GATEWAY.DOC) ======
Received: by enet-gw.pa.dec.com; id AA20254; Mon, 29 Apr 91 21:25:47 -0700
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id aa15446;
          29 Apr 91 23:12 CDT
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id ac21051;
          29 Apr 91 21:54 CDT
Date:     Mon, 29 Apr 91 21:20:41 CDT
From: TELECOM Moderator <[email protected]>
[To]:     [email protected]
Subject:  TELECOM Digest V11 #316
Message-Id:  <[email protected]>



4720.2Experiment seems to clear ProdigyBOLTON::PLOUFFAhhh... cider!Fri May 03 1991 10:4422
    More recent postings to the Internet Risks Digest and to Usenet
    newsgroup comp.dcom.telecom have included tests run with much more
    care.  People did stuff like zero all unused sectors on their hard
    disk, i.e. "wipe" them, then reinstall Prodigy.
    
    Conclusion:  as suggested at the bottom of the previous reply, Prodigy
    software pre-allocates a huge file for STAGE.DAT, and whatever happened
    to be on those physical sectors then showed up inside the unwritten
    parts of STAGE.DAT.
    
    BTW, the Amiga filesystem works the same way, otherwise "undelete"
    programs wouldn't work.  Think about it.
    
    There's no evidence from these experiments that Prodigy uploads
    anything from STAGE.DAT or CACHE.DAT.  It's worth noting that all the
    people who commented said that it didn't prove that Prodigy _could_ not
    upload personal data, just that it appeared that the software _did_
    not.  A more important point about Prodigy is that the service uses its
    customers' choice of activities on the system to sell targeted mailing
    lists to mass marketers.
    
    Wes
4720.3Its possible - concealable too.ULTRA::BURGESSMad Man across the waterFri May 03 1991 10:5937

	OK, here's the disclaimer:  This is pure speculation on how a 
bad guy MIGHT be able to do something like this, with a couple of 
guesses as to how it could be made difficult to detect.  I have no
evidence to support the original claim that it was being done, or to
support the rebuttal that it was NOT being done. 

	*_PURE SPECULATION ON HOW IT COULD BE DONE_*.


	Well, how much bandwidth or traffic would it take ?

	If I were a bad guy (which I'm not) with an interest in my
users' personal data, I'd do approx the following;

i)	Look around for most of the Home finance and tax prep 
packages.... that would take a fairly small number of milliseconds.

ii)	Locate the work-sheets in another few milliseconds.

iii)	Send up a few characters at a time, not the whole work-sheet, 
just the box contents from the 1040, schedules A & B ... a couple of 
K-bytes or so.  I'd somehow apend these to "regular messages".
  
iv)	Create a smoke screen, such as the file refered to - I guess 
I'd do that first (-:

v)	Delete the snooping code for, say a period roughly equal to
1,000 times the period that it was there and active.  So, you have
about a 0.1% chance of it being there if/when you look for it -
assuming you could detect it.  I don't think the snoop code would need
to be very big, so it (or different parts of it) could be down-loaded
many times.  OK, it would still be detectable - but tough.

	Reg

4720.4paranoia can be fun too...BAGELS::BRANNONDave BrannonFri May 03 1991 12:5323
    re:.3
    
    so that would be sort of next generation virus or trojan horse...
    instead of trashing your system, it gathers info to trash your
    bank account or credit rating.  Another variant might be to have it
    autodial your internal modem at 3am to upload the info or call it's
    favorite 900 romance line.  Just think what it could do with a FAX
    board :-)
    
    Yet another reason to buy an external modem and keep it turned off
    when not in use by you :-)
    
    re: zeroing the sectors
    when Dave Haynie first released DiskSalv, lots of interesting things 
    were found on commercial disks.  Because of that, somebody came up
    with a program to zero fill all sectors.  It's on one of the Fish disks.
    
    Wasn't there a bug that was fixed for WB 1.3 - it now zeroes the info in the
    buffer used to write the floppy bootblock sectors, instead of writing
    whatever happened to be in the memory used for the buffer.
    
    Dave
    
4720.5Fundamental Problems RGB::ROSEFri May 03 1991 13:2716
	There are two fundamental problems here:

1. You have to run THEIR program to access Prodigy. If you could use a generic
   terminal emulator, it's YOUR program. You can change to another one if you
   want. You can have better assurance that you are not running a program that
   goes rummaging through your files.

2. If Prodigy can downline code and execute it, that's a classic Trojan Horse.
   You are totally at the mercy of Prodigy and any employees who have the
   the ability to change the code that runs on their machines. Whether or not 
   Prodigy does any bad things may be a moot point for some people. The point 
   is that while you are on line and running the program, your machine is 
   vulnerable to theft or destruction of your data.

	PC's are not secure. This should give a lot of people something to
think about.