Kedves Mindenki!
Az internetre a legnagyobb vesze1lyt, szerintem, az a legu1jabb amerikai
to2rve1ny jelenti, amely a ka1bel TV-ze1s e1s hasonlo1k mellett az
internetr3ol is szo1l...:(
A "Good Time"-ro1l szo1lo1 'figyelmeztete1s' itt "nationwide";) --hogy
ide1zzek az eredetibo3l:0-- pa1r ho1napja keringett (leguto1bb) e1s *kacsa*.
Viszont a Michaelangelo nevu3 valo1ban le1tezo3 PC vi1rus ma1rcius 6-a1n
mu3ko2dik, a maga kis szi1vderi1to3 mo1dja1n...
(Akiket a kacsa re1szletei is e1rdekelnek, annak sza1ma1ra idema1solok egy
anyagot, amelyet az Indiana University tuda1s ba1zisa1bo1l emeltem ide. A
leve1l ve1ge1n otthagytam az eredeti figyelmeztete1st, ha vki o2ssze akarja
vetni a bema1solt anyagban le1vo3 a1lli1ta1sokkal...:)
Mindenkinek a legjobbakat,
=kata=
******************
kata bimbo <kbimbo(a)cs.indiana.edu>
****************** inclusion
The "Good Times" virus is an urban legend!
[from the CIAC notes]
In the early part of December 1994, CIAC started to receive information
requests about a supposed "virus" which could be contracted via America
Online, simply by reading a message.
THIS IS A HOAX. Upon investigation, CIAC has determined that this message
originated from both a user of America Online and a student at a university
at approximately the same time, and it was meant to be a hoax.
CIAC has also seen other variations of this hoax, the main one is that any
electronic mail message with the subject line of "xxx-1" will infect your
computer.
This rumor has been spreading very widely. This spread is due mainly to the
fact that many people have seen a message with "Good Times" in the header.
They delete the message without reading it, thus believing that they have
saved themselves from being attacked. These first-hand reports give a false
sense of credibility to the alert message.
There has been one confirmation of a person who received a message with
"xxx-1" in the header, but an empty message body. Then, (in a panic,
because he had heard the alert), he checked his PC for viruses (the first
time he checked his machine in months) and found a pre-existing virus on
his machine. He incorrectly came to the conclusion that the E-mail message
gave him the virus (this particular virus could NOT POSSIBLY have spread
via an E-mail message). This person then spread his alert.
As of this date, there are no known viruses which can infect merely through
reading a mail message. For a virus to spread some program must be
executed. Reading a mail message does not execute the mail message. Yes,
Trojans have been found as executable attachments to mail messages, the
most notorious being the IBM VM Christmas Card Trojan of 1987, also the
TERM MODULE Worm (reference CIAC Bulletin B-7) and the GAME2 MODULE Worm
(CIAC Bulletin B-12). But this is not the case for this particular "virus"
alert.
If you encounter this message being distributed on any mailing lists,
simply ignore it or send a follow-up message stating that this is a false
rumor.
Karyn Pichnarczyk
CIAC Team
ciac(a)llnl.gov
CIAC is the U.S. Department of Energy's Computer Incident Advisory
Capability. For up-to-date information on computer viruses (and hoaxes,
such as "Good Times"), see the CIAC Web page:http://ciac.llnl.gov.
You can find more information about the Good Times hoax on the CIAC Web
site at these URLs:http://ciac.llnl.gov/ciac/notes/Notes09.shtmlhttp://ciac.llnl.gov/ciac/notes/Notes05d.shtml
****************** end of inclusion
{ }
{ } From: MX%"martinas(a)ludens.elte.hu" 5-MAR-1996 16:42:41.08
{ } To: MX%"martinas(a)ludens.elte.hu",MX%"csetenyi(a)nero.bke.hu",MX%"TOTHJ(a)mszi.gau.hu",MX%"KKTT001(a)URSUS.BKE.HU",MX%"KUTI(a)fs2.date.hu",MX%"MARKUS(a)phy.bme.hu",MX%"ms(a)cseles.atomki.hu",MX%"forrai(a)osiris.elte.hu",MX%"KOCSISEV(a)URSUS.BKE.HU",MX%"lepi(a)iserv.i
{ } CC:
{ } Subj: Egy uj internet virus!
{ }
{ } Return-Path: <martinas(a)ludens.elte.hu>
{ } Received: from ludens.elte.hu by osiris.elte.hu (MX V4.1 VAX) with SMTP; Tue,
{ } 05 Mar 1996 16:42:37 EST
{ } Received: by ludens.elte.hu (MX V4.1 VAX) id 58; Tue, 05 Mar 1996 16:42:11 +0100
{ } Sender: martinas(a)ludens.elte.hu
{ } Date: Tue, 05 Mar 1996 12:07:57 +0100
{ } From: Martinas Katalin <martinas(a)ludens.elte.hu>
{ } To: martinas(a)ludens.elte.hu, csetenyi(a)nero.bke.hu, TOTHJ(a)mszi.gau.hu,
{ } KKTT001(a)URSUS.BKE.HU, KUTI(a)fs2.date.hu, MARKUS(a)phy.bme.hu,
{ } ms(a)cseles.atomki.hu, forrai(a)osiris.elte.hu, KOCSISEV(a)URSUS.BKE.HU,
{ } lepi(a)iserv.iki.kfki.hu, FULOP(a)rmk530.rmki.kfki.hu,
{ } izsolajos(a)tttk.bme.hu, gaspar(a)nero.bke.hu, ropolyi(a)ludens.elte.hu
{ } Message-ID: <0099EE14.DB557DA0.58(a)ludens.elte.hu>
{ } Subject: Egy uj internet virus!
{ } X-MX-Warning: VMS Mail To: line does not include all To: addresses
{ }
{ } From: MX%"elisabeth.list(a)balu.kfunigraz.ac.at" 4-MAR-1996 17:26:30.02
{ } To: MX%"netlist(a)igw.tuwien.ac.at"
{ } CC:
{ } Subj: warning -dangerous computer virus
{ }
{ } Return-Path: <elisabeth.list(a)balu.kfunigraz.ac.at>
{ } Received: from igw.tuwien.ac.at by ludens.elte.hu (MX V4.1 VAX) with SMTP; Mon,
{ } 04 Mar 1996 17:25:58 +0100
{ } Received: from balu.kfunigraz.ac.at (143.50.16.16) by igw.tuwien.ac.at with
{ } ESMTP (Apple Internet Mail Server 1.0); Mon, 4 Mar 1996 17:16:24 +0100
{ } Received: from bphi09 (BPHI09.kfunigraz.ac.at) by balu.kfunigraz.ac.at with
{ } SMTP (1.37.109.16/16.2) id AA223596159; Mon, 4 Mar 1996 17:15:59 +0100
{ } Date: Mon, 4 Mar 1996 17:15:59 +0100
{ } X-Sender: list(a)email.kfunigraz.ac.at
{ } X-Mailer: Windows Eudora Version 2.0.3
{ } MIME-Version: 1.0
{ } Content-Type: text/plain; charset="iso-8859-1"
{ } Content-Transfer-Encoding: BINARY
{ } To: netlist(a)igw.tuwien.ac.at
{ } From: elisabeth.list(a)balu.kfunigraz.ac.at (Elisabeth List)
{ } Subject: warning -dangerous computer virus
{ } Message-ID: <1386162712-37865857(a)igw.tuwien.ac.at>
{ } X-MX-Comment: QUOTED-PRINTABLE message automatically decoded
{ }
{ }
{ } Dear friends,
{ } I forward you this letter informing about a dangerous virus invading the
{ } internet. Be careful!
{ } Best regards, Elisabeth List
{ }
{ } l>
{ } >
{ } >
{ } >---------- Forwarded message ----------
{ } >Date: Wed, 14 Feb 1996 10:45:59 +0100
{ } >From: Marek <marek(a)bkfug.kfunigraz.ac.at>
{ } >To: rinofner(a)bkfug.kfunigraz.ac.at
{ } >Cc: marek(a)bkfug.kfunigraz.ac.at
{ } >Subject: Rundschreiben-14.2.
{ } >
{ } >
{ } >>>>>Subject: Fwd: FWD>>RE>VIRUS ALERT !!
{ } >>>>>
{ } >>>>>
{ } >>>>>>>Date: Fri, 26 Jan 1996 13:58:38 -0500 (EST)
{ } >>>>>>>Subject: FW: FW: VIRUS ALERT!!!!! (fwd)
{ } >>>>>>>
{ } >>>>>>> SUBJECT: VIRUSES--IMPORTANT PLEASE READ IMMEDIATELY
{ } >>>>>>>
{ } >>>>>>> There is a computer virus that is being sent across the Internet.
{ } >>>>>>>If you
{ } >>>>>>>receive an e-mail message with the subject line "Good Times", DO NOT
{ } >>>>>> read
{ } >>>>>>>the message, DELETE it immediately. Please read the messages below.
{ } >>>>>> Some
{ } >>>>>>>miscreant is sending e-mail under the title "Good Times" nation
{ } wide, if
{ } >>>>>>you
{ } >>>>>>>get anything like this, DON'T DOWN LOAD THE FILE! It has a virus that
{ } >>>>>>>rewrites your hard drive, obliterating anything on it. Please be
{ } >>>>>>careful
{ } >>>>>>>and forward this mail to anyone you care about.
{ } >>>>>>>
{ } >>>>>>>**********************************************************************
{ } >>>>>>>*****
{ } >>>>>>******
{ } >>>>>>>*********
{ } >>>>>>>WARNING WARNING WARNING WARNING WARNING
{ } >>>>>>>**********************************************************************
{ } >>>>>>>*****
{ } >>>>>>******
{ } >>>>>>>*********
{ } >>>>>>>
{ } >>>>>>> The FCC released a warning last Wednesday concerning a matter of major
{ } >>>>>>>importance to any regular user of the Internet. Apparently a
{ } >>>>>> new
{ } >>>>>>>computer virus has been engineered by a user of AMERICA ON LINE
{ } >>>>>>>that is
{ } >>>>>>>unparalleled in its destructive capability. Other more well-known
{ } viruses
{ } >>>>>>such
{ } >>>>>>>as "Stoned", "Airwolf" and "Michaelangelo" pale in comparison
{ } >>>>>>>to the
{ } >>>>>>>prospects of this newest creation by a warped mentality. What makes
{ } >>>>>>this
{ } >>>>>>>virus so terrifying, said the FCC, is the fact that no program
{ } >>>>>>>needs to
{ } >>>>>>be
{ } >>>>>>>exchanged for a new computer to be infected. It can be spread
{ } >>>>>>>through the
{ } >>>>>>>existing e-mail systems of the Internet. Once a computer is
{ } >>>>>>>infected, one
{ } >>>>>>of
{ } >>>>>>>several things can happen. If the computer contains a hard drive,
{ } >>>>>>that
{ } >>>>>>>will most likely be destroyed. If the program is not stopped, the
{ } >>>>>>>computer's processor will be placed in an nth-complexity infinite binary
{ }
{ } >>>>>>loop
{ } >>>>>>>-which can severely damage the processor if left running that way too
{ } >>>>>>>long.
{ } >>>>>>>
{ } >>>>>>>Unfortunately, most novice computer users will not realize what is
{ } >>>>>>>happening until it is far too late. Luckily, there is one sure means of
{ } >>>>>>>detecting what is now known as the "Good Times" virus. It always
{ } >>>>>>travels
{ } >>>>>>to
{ } >>>>>>>new computers the same way in a text email message with the subject
{ } >>>>>>line
{ } >>>>>>>reading "Good Times". Avoiding infection is easy once the file
{ } >>>>>>>has been
{ } >>>>>>>received- not reading it! The act of loading the file into the mail
{ } >>>>>>server's
{ } >>>>>>>ASCII buffer causes the "Good Times" mainline program to initialize and
{ } >>>>>>execute.
{ } >>>>>>>
{ } >>>>>>> The program is highly intelligent- it will send copies of itself to
{ } >>>>>>everyone
{ } >>>>>>>whose e-mail address is contained in a receive-mail file or a
{ } sent-mail
{ } >>>>>>file,
{ } >>>>>>>if it can find one. It will then proceed to trash the computer it is
{ } >>>>>>running on.
{ } >>>>>>>The bottom line here is - if you receive a file with the subject line
{ } >>>>>>"Good
{ } >>>>>>>Times", delete it immediately! Do not read it. Rest assured that
{ } >>>>>>whoever's
{ } >>>>>>>name was on the "From" line was surely struck by the virus. Warn your
{ } >>>>>>>friends and local system users of this newest threat to the
{ } Internet! It
{ } >>>>>>could
{ } >>>>>>>save them a lot of time and money.
{ } >>>>>>>> ---- End of mail text
{ } >>>>>>>
{ } >>>>>>>>>>>>Take care, and remember, forward to anyone you know who has e-mail
{ } >>>>>>>>>>>>
{ } >>>>>>>>>>>>Jordan
{ } >>>>>>>>>>>>yankee23(a)inforamp.net
{ } >>>>>>>
{ } >>>>>>>>---------------------------------
{ } >>>>>>>>keep on truckin'
{ } >>>>>>>>
{ } >>>>>
{ } >>>>>
{ } >>>>>----- End Included Message -----
{ } >>>>>
{ } >
{ } >
{ } >>>>>
{ } >>>>>------- FORWARD, End of original message -------
{ } >>>>>
{ } >
{ } >
{ } >
{ } >
{ } >
{ } ===============================================================================
{ } Elisabeth List - Inst. f
{ } Tel.: +43 316 380 2305, FAX: +43 316 356144
{ } ===============================================================================
{ }
{ }
{ }
From: MX%"martinas(a)ludens.elte.hu" 5-MAR-1996 16:42:41.08
To: MX%"martinas(a)ludens.elte.hu",MX%"csetenyi(a)nero.bke.hu",MX%"TOTHJ(a)mszi.gau.hu",MX%"KKTT001(a)URSUS.BKE.HU",MX%"KUTI(a)fs2.date.hu",MX%"MARKUS(a)phy.bme.hu",MX%"ms(a)cseles.atomki.hu",MX%"forrai(a)osiris.elte.hu",MX%"KOCSISEV(a)URSUS.BKE.HU",MX%"lepi(a)iserv.iki.k
CC:
Subj: Egy uj internet virus!
Return-Path: <martinas(a)ludens.elte.hu>
Received: from ludens.elte.hu by osiris.elte.hu (MX V4.1 VAX) with SMTP; Tue,
05 Mar 1996 16:42:37 EST
Received: by ludens.elte.hu (MX V4.1 VAX) id 58; Tue, 05 Mar 1996 16:42:11 +0100
Sender: martinas(a)ludens.elte.hu
Date: Tue, 05 Mar 1996 12:07:57 +0100
From: Martinas Katalin <martinas(a)ludens.elte.hu>
To: martinas(a)ludens.elte.hu, csetenyi(a)nero.bke.hu, TOTHJ(a)mszi.gau.hu,
KKTT001(a)URSUS.BKE.HU, KUTI(a)fs2.date.hu, MARKUS(a)phy.bme.hu,
ms(a)cseles.atomki.hu, forrai(a)osiris.elte.hu, KOCSISEV(a)URSUS.BKE.HU,
lepi(a)iserv.iki.kfki.hu, FULOP(a)rmk530.rmki.kfki.hu,
izsolajos(a)tttk.bme.hu, gaspar(a)nero.bke.hu, ropolyi(a)ludens.elte.hu
Message-ID: <0099EE14.DB557DA0.58(a)ludens.elte.hu>
Subject: Egy uj internet virus!
X-MX-Warning: VMS Mail To: line does not include all To: addresses
From: MX%"elisabeth.list(a)balu.kfunigraz.ac.at" 4-MAR-1996 17:26:30.02
To: MX%"netlist(a)igw.tuwien.ac.at"
CC:
Subj: warning -dangerous computer virus
Return-Path: <elisabeth.list(a)balu.kfunigraz.ac.at>
Received: from igw.tuwien.ac.at by ludens.elte.hu (MX V4.1 VAX) with SMTP; Mon,
04 Mar 1996 17:25:58 +0100
Received: from balu.kfunigraz.ac.at (143.50.16.16) by igw.tuwien.ac.at with
ESMTP (Apple Internet Mail Server 1.0); Mon, 4 Mar 1996 17:16:24 +0100
Received: from bphi09 (BPHI09.kfunigraz.ac.at) by balu.kfunigraz.ac.at with
SMTP (1.37.109.16/16.2) id AA223596159; Mon, 4 Mar 1996 17:15:59 +0100
Date: Mon, 4 Mar 1996 17:15:59 +0100
X-Sender: list(a)email.kfunigraz.ac.at
X-Mailer: Windows Eudora Version 2.0.3
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: BINARY
To: netlist(a)igw.tuwien.ac.at
From: elisabeth.list(a)balu.kfunigraz.ac.at (Elisabeth List)
Subject: warning -dangerous computer virus
Message-ID: <1386162712-37865857(a)igw.tuwien.ac.at>
X-MX-Comment: QUOTED-PRINTABLE message automatically decoded
Dear friends,
I forward you this letter informing about a dangerous virus invading the
internet. Be careful!
Best regards, Elisabeth List
l>
>
>
>---------- Forwarded message ----------
>Date: Wed, 14 Feb 1996 10:45:59 +0100
>From: Marek <marek(a)bkfug.kfunigraz.ac.at>
>To: rinofner(a)bkfug.kfunigraz.ac.at
>Cc: marek(a)bkfug.kfunigraz.ac.at
>Subject: Rundschreiben-14.2.
>
>
>>>>>Subject: Fwd: FWD>>RE>VIRUS ALERT !!
>>>>>
>>>>>
>>>>>>>Date: Fri, 26 Jan 1996 13:58:38 -0500 (EST)
>>>>>>>Subject: FW: FW: VIRUS ALERT!!!!! (fwd)
>>>>>>>
>>>>>>> SUBJECT: VIRUSES--IMPORTANT PLEASE READ IMMEDIATELY
>>>>>>>
>>>>>>> There is a computer virus that is being sent across the Internet.
>>>>>>>If you
>>>>>>>receive an e-mail message with the subject line "Good Times", DO NOT
>>>>>> read
>>>>>>>the message, DELETE it immediately. Please read the messages below.
>>>>>> Some
>>>>>>>miscreant is sending e-mail under the title "Good Times" nation
wide, if
>>>>>>you
>>>>>>>get anything like this, DON'T DOWN LOAD THE FILE! It has a virus that
>>>>>>>rewrites your hard drive, obliterating anything on it. Please be
>>>>>>careful
>>>>>>>and forward this mail to anyone you care about.
>>>>>>>
>>>>>>>**********************************************************************
>>>>>>>*****
>>>>>>******
>>>>>>>*********
>>>>>>>WARNING WARNING WARNING WARNING WARNING
>>>>>>>**********************************************************************
>>>>>>>*****
>>>>>>******
>>>>>>>*********
>>>>>>>
>>>>>>> The FCC released a warning last Wednesday concerning a matter of major
>>>>>>>importance to any regular user of the Internet. Apparently a
>>>>>> new
>>>>>>>computer virus has been engineered by a user of AMERICA ON LINE
>>>>>>>that is
>>>>>>>unparalleled in its destructive capability. Other more well-known
viruses
>>>>>>such
>>>>>>>as "Stoned", "Airwolf" and "Michaelangelo" pale in comparison
>>>>>>>to the
>>>>>>>prospects of this newest creation by a warped mentality. What makes
>>>>>>this
>>>>>>>virus so terrifying, said the FCC, is the fact that no program
>>>>>>>needs to
>>>>>>be
>>>>>>>exchanged for a new computer to be infected. It can be spread
>>>>>>>through the
>>>>>>>existing e-mail systems of the Internet. Once a computer is
>>>>>>>infected, one
>>>>>>of
>>>>>>>several things can happen. If the computer contains a hard drive,
>>>>>>that
>>>>>>>will most likely be destroyed. If the program is not stopped, the
>>>>>>>computer's processor will be placed in an nth-complexity infinite binary
>>>>>>loop
>>>>>>>-which can severely damage the processor if left running that way too
>>>>>>>long.
>>>>>>>
>>>>>>>Unfortunately, most novice computer users will not realize what is
>>>>>>>happening until it is far too late. Luckily, there is one sure means of
>>>>>>>detecting what is now known as the "Good Times" virus. It always
>>>>>>travels
>>>>>>to
>>>>>>>new computers the same way in a text email message with the subject
>>>>>>line
>>>>>>>reading "Good Times". Avoiding infection is easy once the file
>>>>>>>has been
>>>>>>>received- not reading it! The act of loading the file into the mail
>>>>>>server's
>>>>>>>ASCII buffer causes the "Good Times" mainline program to initialize and
>>>>>>execute.
>>>>>>>
>>>>>>> The program is highly intelligent- it will send copies of itself to
>>>>>>everyone
>>>>>>>whose e-mail address is contained in a receive-mail file or a
sent-mail
>>>>>>file,
>>>>>>>if it can find one. It will then proceed to trash the computer it is
>>>>>>running on.
>>>>>>>The bottom line here is - if you receive a file with the subject line
>>>>>>"Good
>>>>>>>Times", delete it immediately! Do not read it. Rest assured that
>>>>>>whoever's
>>>>>>>name was on the "From" line was surely struck by the virus. Warn your
>>>>>>>friends and local system users of this newest threat to the
Internet! It
>>>>>>could
>>>>>>>save them a lot of time and money.
>>>>>>>> ---- End of mail text
>>>>>>>
>>>>>>>>>>>>Take care, and remember, forward to anyone you know who has e-mail
>>>>>>>>>>>>
>>>>>>>>>>>>Jordan
>>>>>>>>>>>>yankee23(a)inforamp.net
>>>>>>>
>>>>>>>>---------------------------------
>>>>>>>>keep on truckin'
>>>>>>>>
>>>>>
>>>>>
>>>>>----- End Included Message -----
>>>>>
>
>
>>>>>
>>>>>------- FORWARD, End of original message -------
>>>>>
>
>
>
>
>
===============================================================================
Elisabeth List - Inst. für Philosophie - Universität Graz
Tel.: +43 316 380 2305, FAX: +43 316 356144
===============================================================================
>
>
>Dear Colleagues,
>
> It is my pleasure to let you know that the I Regional Congress of
Psychology for Professionals in the Americas, organized by the Mexican
Institute of Invesigation on Family and Population A.C., (IMIFAP) and by the
Mexican Association of Social Psychology (AMEPSO), and sponsored by the
International Association of Applied Psychology (IAAP) in conjunction with
the International Union of Psychological Science (IUPsyS), the International
Society of Psychology (SIP) and the International Association of
Cross-Cultural Psychology (IACCP), will take place in Mexico City, Mexico,
from the 13th to the 19th of July, 1997.
>
> The Congress will be made up of workshops, state of the art invited
addresses, symposia, thematic sessions and posters, answering to the demand
of Latin American psychologists who have expressed their need for a forum in
which they could exchange knowledge and develop abilities in their specific
areas of work.
>
>Please let us know if you are interested in us forwarding you an invitation
and further information on the Congress. If so, please let us know what your
mailing address so we can send you further details on the event
>
>Thank you for your kind attention,
Sincerely,
>Dr. Susan Pick
>
Kedves Kollegak, aki Hernad Istvan marcius vegi kuzusaira akar
gyujtemenyt az lolvasmanyokbol,
az surgosen iratkozzon fel Kurgyisnal.
kurgyis(a)izabell.elte.hu-nal.
Udv Csaba
Kampis Gyorgy cikkolvaso szeminariumanak uj idopontja
hetfo, 12:00-13:30.
Talalkozunk jovo hetfoen, es majd behozzuk az emaradt
orakat is, kesobb egyeztetendo idopontokban.
Helyszin: Rakoczi u. 5. I. em 105 (konyvtar mellett).
udv kgy
---------------------------------------------------------------------------
LINGUIST List: Vol-7-339. Mon Mar 4 1996. ISSN: 1068-4875. Lines: 126
Subject: 7.339, FYI: Dutch Graduate School in Linguistics - Summer School
Moderators: Anthony Rodrigues Aristar: Texas A&M U. <aristar(a)tam2000.tamu.edu>
Helen Dry: Eastern Michigan U. <hdry(a)emunix.emich.edu> (On Leave)
T. Daniel Seely: Eastern Michigan U. <dseely(a)emunix.emich.edu>
Associate Editor: Ljuba Veselinova <lveselin(a)emunix.emich.edu>
Assistant Editors: Ron Reck <rreck(a)emunix.emich.edu>
Ann Dizdar <dizdar(a)tam2000.tamu.edu>
Annemarie Valdez <avaldez(a)emunix.emich.edu>
Software development: John H. Remmers <remmers(a)emunix.emich.edu>
Editor for this issue: lveselin(a)emunix.emich.edu (Ljuba Veselinova)
---------------------------------Directory-----------------------------------
1)
Date: Mon, 04 Mar 1996 10:36:53 +0100
From: lot(a)LET.RUU.NL ("LOT (Annette Nijstad)")
Subject: LOT Summerschool
---------------------------------Messages------------------------------------
1)
Date: Mon, 04 Mar 1996 10:36:53 +0100
From: lot(a)LET.RUU.NL ("LOT (Annette Nijstad)")
Subject: LOT Summerschool
FIRST ANNOUNCEMENT:
LOT Summerschool 1996
The Dutch Graduate School in Linguistics (LOT) hereby announces that
the LOT Summerschool 1996 will be held at the
University of Amsterdam,
June 17 -21 & 24-28 1996
Preliminary Program:
***First Week***
Everaert/Reuland (Utrecht):
Reflexivity
Mithun (Santa Barbara):
Typology and Diachrony of Case and Grammatical Relations
Grodzinsky (Tel Aviv):
Moved Constituents and Functional Heads in Aphasia
Cinque (Veneti=EB):
The Functional Architecture of the Clause
Hendriks (Utrecht):
Flexible Grammar
Rietveld (Nijmegen):
Variance-analysis and Power
Huybregts (Tilburg):
Arabic and Comparative Syntax
Daelemans (Tilburg):
Inductive Models of Linguistic Knowledge
Hermes & Terken (IPO, Eindhoven):
Perception of Accent and Prominence
***Second week***
Zwart (Groningen):
Recent Developments in Minimalist Syntactic Theory
Webelhuth (North Carolina):
Complex Predicates
Castelnovo (Milaan):
Temporal Interpretation
Fromkin (UCLA):
Issues in Psycholinguistics and Neurolinguistics and the Modularity=
Question
Hulstijn (VU, Amsterdam):
Second Language Acquisition
Fikkert (Konstanz) :
Acquisition of Phonology=09
Langacker (San Diego):
Cognitive Grammar
Arends (UvA, Amsterdam):
Internal and External Factors in Creole Formation
Pulleyblank (Vancouver, Leiden):
Grounded Phonology
-.-.-.-.-.-.-.-.-.-
Further announcements will be made concerning enrollments.
For further information:
E-mail: lot(a)let.ruu.nl
Phone: +31-30-2536006
Fax: +31-30-2536000
LOT
Landelijke Onderzoekschool Taalwetenschap
Netherlands Graduate School of Linguistics
Trans 10
3512 JK Utrecht
Phone: +31 30 2536006
Fax: +31 30 2536000
------------------------------------------------------------------------
LINGUIST List: Vol-7-339.
M E G H I V O
A Magyar Filozofiai Tarsasag Tudomanyfilozofiai Szakosztalya
meghivja Ont, munkatarsait es hallgatoit
CARLOS STEEL
professzor(Leuven)
SCIENTIA NATURALIS
On the question in what sense medieval philosophy and theology
have opened the way for the new sciences in the 17th century
cimu eloadasara. Az eloadas helye es ideje:
ELTE BTK Kari Tanacsterem
Budapest, V. Piarista koz 1. I. emelet
1996. III. 12., Kedd, 16:00
Kerjuk, a tisztelt kollegakat, hogy a fenti hirdetmenyt tegyek ki a
tanszeki / intezeti hirdetotablara!
Udvozlettel
Forrai Gabor
Margitay Tihamer
---------------------------------------------------------------------------
LINGUIST List: Vol-7-333. Sat Mar 2 1996. ISSN: 1068-4875. Lines: 188
Subject: 7.333, Confs: Lang acquisition (GALA 1997), Northwest Ling Conference
Moderators: Anthony Rodrigues Aristar: Texas A&M U. <aristar(a)tam2000.tamu.edu>
Helen Dry: Eastern Michigan U. <hdry(a)emunix.emich.edu> (On Leave)
T. Daniel Seely: Eastern Michigan U. <dseely(a)emunix.emich.edu>
Associate Editor: Ljuba Veselinova <lveselin(a)emunix.emich.edu>
Assistant Editors: Ron Reck <rreck(a)emunix.emich.edu>
Ann Dizdar <dizdar(a)tam2000.tamu.edu>
Annemarie Valdez <avaldez(a)emunix.emich.edu>
Software development: John H. Remmers <remmers(a)emunix.emich.edu>
Editor for this issue: dizdar(a)tam2000.tamu.edu (Ann Dizdar)
We'd appreciate your limiting conference announcements to 150 lines,
so that we can post more than 1 per issue. Please consider omitting
information useful only to attendees, such as information on housing,
transportation, or rooms and times of sessions. Thank you for your
cooperation.
---------------------------------Directory-----------------------------------
1)
Date: Fri, 01 Mar 1996 17:33:37 GMT
From: heycock(a)ling.ed.ac.uk (Caroline Heycock)
Subject: Conf. announcement: GALA 97 in Edinburgh
2)
Date: Fri, 01 Mar 1996 11:47:59 PST
From: mgalvao(a)u.washington.edu (Maria Galvao)
Subject: NWLC 1996 Program
---------------------------------Messages------------------------------------
1)
Date: Fri, 01 Mar 1996 17:33:37 GMT
From: heycock(a)ling.ed.ac.uk (Caroline Heycock)
Subject: Conf. announcement: GALA 97 in Edinburgh
International Conference
on
Language Acquisition: Knowledge Representation and Processing
GALA 1997
4th - 6th April 1997
University of Edinburgh
---- INVITED SPEAKERS ----
Melissa Bowerman
Nina Hyams
Peter Jusczyk
Steven Pinker
Andrew Radford
Bonnie D. Schwartz
Paul Smolensky
This, the third of the GALA conferences on Language Acquisition, will
be held at the University of Edinburgh in 1997. Building on the
success of its predecessors (Groningen 1995, Durham 1993), this
conference aims to encourage a spirit of dialogue between
linguistically-oriented and psychologically-oriented researchers.
A call for papers and posters will be issued shortly.
Organisers: Antonella Sorace (Applied Linguistics), Caroline Heycock
(Linguistics), Richard Shillcock (Cognitive Science).
Address for email correspondence: gala97(a)ling.ed.ac.uk
Other correspondence: GALA 97
HCRC, University of Edinburgh
2 Buccleuch Place
Edinburgh EH8 9LW
Scotland
------------------------------------------------------------------------
2)
Date: Fri, 01 Mar 1996 11:47:59 PST
From: mgalvao(a)u.washington.edu (Maria Galvao)
Subject: NWLC 1996 Program
Northwest Linguistics Conference
University of Washington
Saturday, March 30th
8:30 BREAKFAST
9:00-9:30 Eliminating Overt Verb-Movement in Korean and Checking Theory
Tai-Soo Kim, University of Washington
9:30-10:00 Long-Distance Anaphora: the Minimalist Approach
Hyeran Lee, University of Florida
10:00-10:30 Attributive Adjectives and Case Matching
Enrique Mallen, Texas A&M University
10:30-10:45 BREAK
10:45-11:15 Syntactic Analysis of Focus Sentences in Japanese and its
Implication
Yuki Matsuda, University of Southern California
11:15-11:45 Right Dislocation as IP-ellipsis
Yael Sharvit, Rutgers University
11:45-12:15 Overt Expletive Subjects in Pro-drop Languages
Luis Silva-Villar, UCLA
12:15-12:45 Metalinguistic Use of "Any" and the Distribution of Free-Choice
Items in Polarity Contexts
Subhadra Ramachandran, University of Ottawa, Canada
12:45 LUNCH
2:15-3:15 *Invited Speaker: Heles Contreras
'Deconstructing Weak Crossover'
3:15-3:45 Locative and Temporal Weak Proforms
Javier Gutierrez and Luis Silva, UCLA
3:45-4:15 Mora Conservation in Optimality Theory: evidence from
Spanish diminutives
Gorka Elordieta, University of Southern California
Maria M. Carreira, California State University at Long Beach
4:15-4:30 BREAK
4:30-5:00 Suprasegmental Changes in Progress: Parallelism Between
Japanese and English
Noriko Hattori, Mie University, Japan
5:00-5:30 Untitled
Bowen Hui, University of British Columbia, Canada
5:30-6:00 Categorial and Phi-Features in Language Disorders
Monica Eszter Sanchez, Brock University, Canada
6:00 DINNER
Sunday, March 31st
8:30 BREAKFAST
9:00-9:30 The Acquisition of Determiner Phrases in Early Child Language
Ute Bohnacker, University of Durham, England
9:30-10:00 Morpheme Acquisition and the Count/Mass Distinction of Nouns
Keiko Okada and Yoichi Miyamoto, Ohio University
10:00-10:30 Assimilation, Weakening and Geminate Inalterability
Chang-Kook Suh, University of Arizona
10:30-10:45 BREAK
10:45-11:15 Nasal Harmony is Strictly Local
Rachel Walker, University of California, Santa Cruz
11:15-11:45 An Analogical Approach to German Plural Formation
Douglas J Wulf, University of Washington
11:45-12:15 Propositional Anaphora and Presupposition Denial
Orin Percus, MIT
12:15-12:45 Contrastive and Exhaustive Focus Readings in Korean
Mean-Young Song, Georgetown University
12:45 LUNCH
2:15-3:15 *Invited Speaker: Siri Tuttle
3:15-3:45 Syntax and Discourse Function of "Wa" Marking in Japanese
Akihiko Uechi, University of British Columbia, Canada
3:45-4:15 Transitivity and Japanese Floating Numeral Quantifiers
Yuji Yamaura, Saga College, Japan
4:15-4:45 Referentiality Effects and Verb Compounds
Ke Zou, California State University
4:45-5:00 SNACK
------------------------------------------------------------------------
LINGUIST List: Vol-7-333.
> Prof. STEVAN HARNAD
>
> EXPLAINING THE MIND (PS-KK16.24, PS-430.46)
>
> 25-29. March, 1996
>
> Arrangement of the classes:
> March 25th, Mon.: 4.30-6.30 pm, #405
> March 26th, Tue.: 4-6 pm, #301
> March 27th, Wed.: 4-6 pm, #201
> March 28th, Thu.: 4.30-6.30 pm, #301
> March 29th, Fri.: 4-6 pm, #405
>
> The natural way to try to explain the mind is by looking into it. This
> method is called introspection, and we all do it whenever we think about
> thinking. The only problem is that no explanation has ever come out of
> this. We have no idea at all how we perceive, think, understand,
> remember. If we did have any idea, cognitive psychology would be easy;
> we could all do it by sitting in our armchairs observing our minds. It's
> not quite that easy, though, because the real workings of our minds are
> unconscious: We can't observe them. We can only observe their effects,
> in what we do and feel. So the real question is: How are we able to do
> and feel all the things we can do and feel?
>
> Explaining what we can do seems as if it would be the easier part, but
> it turns out to be devilishly difficult; all we have so far is tiny
> parts of the puzzle. And the feeling part turns out be more difficult
> still, because it gets us entangled in some deep philosophical problems,
> especially the "mind/body" problem: Everyone can can see what you do,
> but only you can feel what you feel, so how can everyone agree on an
> explanation?
>
> Among the things you can do is to see, hear, use, name, and describe the
> many things around you in the world. We will examine explanations of how
> your mind manages to do all this: theories of perception, learning,
> categorisation, and language. We will discuss how things are represented
> in your mind. We will look especially closely at mental images: Do they
> explain how we think? Or should we look at how the brain works? Or do
> machines that can do some of the things we can do give us a clue? Are we
> like machines?
>
> In the background of all of this will be consciousness: If the hard work
> is done unconsciously, what good is consciousness? Do we really have a
> choice, or do our brains and biology dictate it all? And if they dictate
> the humdrum things, like how we see red and how we remember names and
> faces, do they also explain our creative moments, when we think of
> something no one else has ever thought of?
>
> The mind has not yet been explained. But the basic questions have now
> been raised. And we think we also have the right means to begin
> answering them. You will learn the unfolding details of these answers in
> later courses in cognitive psychology. In this course we will focus on
> the questions, the means, and the directions in which they promise to
> take us.
>
> LECTURE 1:
>
> From Introspectionism to Behaviourism to Cognitivism:
> Psychology in Search of a Method
>
> What is special about psychology is that it deals with the mental and
> not just the physical. Yet the history of psychology is one of a very
> uneasy relation with the mental.
>
> The Mind/Body Problem Continues to Beset Psychology
>
> It is no wonder that psychologists had trouble with the mental in the
> short lifetime of their field. Philosophers have been struggling with it
> for centuries.
>
> LECTURE 2:
>
> Is the Brain the Solution?
>
> One natural place to turn in order to shake loose from the mind/body
> problem is the brain. And the brain reveals some remarkable
> "disconnections" in mental function. But is it the way to understand the
> mind?
>
> The Mind's Eye: Mental Imagery and Its Discontents
>
> The debate about the role of mental imagery virtually created the field
> of cognitive psychology. Is "I did it in my head using images" a
> cognitive explanation?
>
> LECTURE 3:
>
> Mental Models I: Are Mental States Computer States?
>
> The most powerful theory of thinking at the moment is that it is some
> form of computation. What is computation? And can thinking be that?
>
> Mental Models II: Or Are Mental States States in a Neural Net?
>
> The strongest rival to the theory that thinking is computation is that
> it is the activity in an interconnected neural network. What can be
> said for and against that view?
>
> LECTURE 4:
>
> Learning and Categorisation
>
> How does the "blooming, buzzing confusion" we are born into get sorted
> out into the many objects and events we can recognise and name?
>
> Language and Representation
>
> How are the categories we recognise and name represented in our heads?
> And what is language, that it allows us to communicate them to one
> another?
>
> LECTURE 5:
>
> Our Darwinian Past
>
> How unique is thinking and mental function to our own species? Can our
> evolutionary past help explain our minds?
>
> Consciousness Faced Head-On
>
> Can consciousness be investigated directly? Can we measure when a mental
> event happens? What causal role does consciousness play?
>
> Readings are available electronically from:
>
> http://cogsci.soton.ac.uk/~harnad/
>
>
M E G H i V o
Az ELTE Altalanos Pszichologia Tanszeke
minden erdeklodot szeretettel meghiv a hagyomanyos tanszeki
"Keddi Szeminariumok"
marciusi masodik eloadasara.
marcius 12. kedd:
MESZAROS Eva
(Orszagos Orvosi Rehabilitacios Intezet)
Mondatismetlesi teljesitmeny egy Broca-afazias betegnel.
(az eloadas nyelve: magyar)
A szeminariumok idopontja es helye ebben a szemeszterben:
keddenkent, 12.00- kb. 13.30- ig
VI. ker Izabella u. 46, IV. em. 403-as terem.
* * *