Note: this is an OCR of a scan of a fax, so please forgive the errors. 0 93-20 1. You should have received product test reports on StopLight and on F-PROT PROFESSIONAL. I also gent out observations on Virus Simulator and on Virus Simulator MtE Supplement by Rosenthal Engineering. 2. The latest edition of 'Disaster Recovery Journal', Volume 6, issue 3, contains the annual compilation on alternate site alternatives, The Journal has changed its style over last several years- 'There are now more articles per issue, shorter articles, and articleg for novice to advanced contingency and disaster recovery specialists. Free subgcriptions are still offered to "qualified' individuals. One may contact Circulation Department, 'Disaster Recovery Journal'. 2712 Meramar Drive, St. Louis, MO 0312U; FAX number is 314-846-1023. 3. Articles of interest include: a. 'Jurassic Park's not security policies are prehistoric', by Mictel Kabay, in the Security Perspectives column, 'Network World', July 26. 1993. b, 'Disaster-revovery planning; Pricey, but worth it'. by Kristine Sullivan, 'PC Weeh', July 20, 199@. C. 'The PowerBook from Hell', by Andy Ihnatko, 'MacUser', September 1993. (this has nothing to do with security, more like for those days that you need a good laugh.) 4. The 'Communications of the ACM', Augugt 1993, hae several articles on information systems security. The most interesting, but somewhat demanding piece, is by Stephen Rent entitled 'Internet Privacy Enhanced Mail'. If you need a good introduction to PEM, this is the vehicle. 5. I will be moving tbig mail group to another host over the next month. This will be the third move this calendar year. lt appears that I am fast developing a reputation as a computer Jonah because it seems that as soon ag I get an account the decision is made to deactivate the host. It also means that I have to learn a third mailer. I live in an environment where graceful transitioning became extinct with the dinosaurs. At this point, unless I receive divine intervention, it appears thalt the only way I can suppress actual addresses in the 'to' line will be to send the message to myself and do a 'blind carbon copy' to the forty of you in Internet Land. So, if the next few messages appear strange, please bear with me.