home *** CD-ROM | disk | FTP | other *** search
- /\###############/\/\/###################/\/\/\/\/\/\/\/####/\/\/\/\/\
- /###############/\/\/\/#################/\/\/\/\/\/\/\/######/\/\/\/\/
- ###############/\/\/\/\/###############/\/\/\/\/\/\/\/########/\/\/\/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/\#####/\#####/\/\/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/#####/\/\#####/\/\/
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\#####/\/\/\#####/\/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/#####/\/\/\/\#####/\/
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
- #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
- ###############/\/\/\/\/###############/\/\/\/\/#####/\/\/\/\/\#####/\
- /###############/\/\/\/#################/\/\/\/\#####/\/\/\/\/\#####/\
- /\###############/\/\/###################/\/\/\/#####/\/\/\/\/\#####/\
- Center of Intelligent Anarchists
- Issue #2 Release date: April 3, 1994
-
- <><><><><><><><><>
- Table of Contents>>>>>>>>>.
- <><><><><><><><><>
- Introduction
- Subscription Information
- Writing for CIA
- Misconceptions of Computer Hacking
- Tips for The New Hacker
- Where to Get Information
-
-
-
- ><><><><><><>
- Introduction>>>>>>>
- ><><><><><><>
- Hello, to all of you that acutally downloaded my last issue, thanks
- for taking interest. I don't know if this will work out or not, but I am
- trying to put out one a month and am uploading to as many bbs as possible.
- In this issue I will cover probably more hacking than anything, because that
- is what I have really been getting into the past few weeks. I go through
- phases from phreaking, to hacking, to anarchy, etc. Right now I am in a
- hacking/phreaking stage. Well, thanks to those that downloaded the last one,
- spread it around. Upload to all your local Bulletin Boards. Give to your
- friends. If anyone is on internet, send a copy to Computer Underground
- Digest and give them this message for me:
- -------
- Dear CUD,
- I am now an avid collector of your publication. I am missing most of the
- issues, but I am building up my collection. I am also going to attempt to
- build up a collection of Phrack. Anyway, I thought that you might be
- interested in my new publication. If so, then send me a letter (U.S. Mail)
- and I can arrange for you to get a copy each month. My address is:
- Center for Intelligent Anarchits
- c/o Scott Wilcoxen
- 2400 Derby Drive
- Fallston, MD 21047
- Thanks.
- Sincerely,
- Totally Destroyed
- -----------
- Well, on with the files.
-
- ><><><><><><><><><><><><>
- Subscription Information>>>>>>>>>
- ><><><><><><><><><><><><>
- To receive the Center of Intelligent Anarchist's publication monthly
- by mail then send me a letter including Name, Address, and Where you get
- your copies of CIA (BBS name, Person, etc.). Prices are as follows:
- Hard Copy $15.00 12 issues
- Soft Copy Disks Supplied (specify size) $25.00 12 issues
- Soft Copy, you supply disks $20.00 12 issues
-
- Sample copies are available at $2.00 for hard copy and $3.50 for soft copy
- with the disk supplied (specify size). Send your name, address, phone number (Optional),
- and check, money order, or cash (Not Responisble for Lost Mail).
-
- Mail orders to:
- Center of Intelligent Anarchist's
- c/o Scott Wilcoxen
- 2400 Derby Drive
- Fallston, MD 21047
-
- <><><><><><><><>
- Writing for CIA>>>>>>>>>
- <><><><><><><><>
- If you wish to write for the Center of Intelligent Anarchist's publication
- submit article to:
- Center of Intelligent Anarchist's
- c/o Scott Wilcoxen
- 2400 Derby Drive
- Fallston, MD 21047
- Include your address, name, where I can get in touch with you (Mailing
- address U.S. Mail is fine), and the article. If you wish to become a
- regular writer tell me that as well.
-
-
- ><><><><><><><><><><><><><><><><><>
- Misconceptions of Computer Hacking>>>>>>>>>
- ><><><><><><><><><><><><><><><><><>
- I am here to point out many of the misconceptions of computer
- hacking. I am astonished as to the amount of ignorance there is on the
- subject. Many people are under the impression that we are here mainly to
- destroy, modify, and make life miserable to all computer users. This is
- obviously a lie. Lets take a look at the Hacker Ethics in the book Hackers
- by Steven Levy.
- 1. Access to computers--and anything which might teach you something
- about the way the world works--should be unlimited and total. Always
- yield to the Hands-On Imperative!
-
- 2. All information should be free.
-
- 3. Mistrust authority--Promote Decentralization.
-
- 4. Hackers should be judged by their hacking, not bogus criteria
- such as degrees, age, race, or position.
-
- 5. You can created art and beauty on a computer.
-
- 6. Computers can change your life for the better.
-
- Hackers also strictly believe that no information should be modified or
- destroyed. If you wish to change something, make sure it is easily detected
- and fixed. Then only do it if it will make the system better or inform
- people about their system.
- ex. Once I heard of a hacker who logged onto a system "illegally" and
- put an user specific logon screen on the system. It read:
- Hello <Name>, I see that your password is <password>.
- You should consider the password "Carriage Return" instead,
- as this helps promote Free Information.
-
- No damage was done, the only problem was that anyone in the room saw the
- users password on the screen. Therefore all the users changed their
- passwords. And the System Operator had a small ten minute task to do,
- removing the message. It demonstrated that the security system was week.
- A smart sysop would have added more security or taken the messages advice
- and gotten rid of the security all together. This would work.
- ex. ITS (Incompatible Time-sharing System) was written for the PDP-6
- back in the sixties at MIT (Mass. Institute of Technology). It was
- a system that allowed full access to any user file by any user. It
- also supported no passwords and was more user friendly than any other
- system in use that day. It had up to date technology in the
- programming. Any user could enter a command to find out who else was
- online and could even get their screen on their terminal to watch what
- they were doing. The purpose, to simulate the old effect of everyone
- crowding around one terminal. Their was also a command called Kill
- System, which would Kill the System. The idea was to take the fun out
- of crashing the system and the above mentioned features took the fun
- out of hacking into other peoples files. Now all information in that
- particular computer was FREE!! Users could also modify the code of the
- system. This added to it and soon it became the best system around at
- the time, with every user working on it a little bit at a time. Making
- improvements, it grew. Yet no one crashed the system and files weren't
- lost. Why, because that required no skill on this system. People turned
- to more productive things like improving the system, because this
- required skill.
-
- So obviously the hacker ethic makes things better and we do no harm. It is
- against hacker ethics and morales to crash a system, let lose a virus, or
- damage a system in any other way.
- Now, here are some of the misconceptions of hacking by the general
- population. I will not mention names here and am in no way putting down
- this fine student who does quite well in school and is overall an intelligent
- and caring person. This is a list of the fallacies in his research project
- on hacking. His thesis is to prove that hacking should be illegal.
- 1. He defines hacking as follows:
- Computer hacking - the process of using a computer with a
- modem and connecting to another computer with a modem, then
- breaking passwords, in search of information and services
- [electronic trespasing], and/or make trouble.
-
- 2. He says the following about cyperpunks, computer enthusiasts, and
- hackers:
- Most work in gangs and gave secret code names to identify
- themselves.
-
- No girl cyperpunks, computer entusiasts, or hackers.
-
- Many come from broken homes or have pyschological problems.
-
- 3. He does define the Hacker Ethic correctly though. He defines it
- as follows:
- Hacker Ethic - It is ok to search, but never destroy.
-
- 4. We never transmit viruses as he says.
- 5. We don't delete hard drives neither, unless of course they're ours.
- 6. Yeah we crack passwords, and copy info., but only for educational
- purposes.
-
- The common betrayal of hackers as Charles Manson with a computer is totally
- bogus and a stereotype made by the mass media of today's world. I myself
- don't come from a broken home and many of us have no pyschological problems.
- Unless searching for information is considered a problem. And of course, we
- all know that hackers do not discriminate. There have been female hackers.
- And what he calls gangs, I don't have a clue as to what he means. Yet, we
- make no trouble, we delete no files, we don't damage a thing, and we don't
- crash systems and upload viruses. Yes, I know how to write destructive
- programs, but I don't use them. I merely posess the knowledge, I don't use
- it for any reason. This illustrates the common misconception of hackers
- and other computer enthusiasts. Lets be glad he didn't include phreakers in
- the paper too.
-
- <><><><><><><><><><><><>
- Tips for the New Hacker>>>>>>>>>>
- <><><><><><><><><><><><>
- Hopefully this will become a regular section in CIA magazine. In it
- you will find tips and hints for the new hacker. I know when I was starting
- I loved finding files on New Hacker Hints. Well, on with the premiere of
- this section.
- This is a long list of tips to avoid being caught, some include
- "hacker ethics".
-
- 1. Don't ever maliciously hack into a system. Do no damage and
- don't delete or modify files unless neccesary to cover your tracks.
-
- 2. Don't give out your voice phone number. Many famous phreaks or
- hackers have turned Narc when they got busted. If it gives them a
- chance they may turn you in.
-
- 3. Don't attempt to hack into Military or Government computers. They
- will almost definately bust you as they have all the time, money, and
- resources in the world.
-
- 4. Don't use codes from your house. You WILL almost always get
- busted. Most PBX/950/800 have ANI and will trace you.
-
- 5. Don't ever rat out someone. It will come back to you later.
-
- 6. Use only your own codes, never one given to you by anyone. They
- are almost always overused.
-
- 7. Be paranoid. Use a encryption program to encode all the files on
- your computer. Don't keep written notes. If you must write something
- down, burn it when your done. The fed's do trash, just like us.
-
- 8. If you get busted don't say anything. Refuse to speak without a
- lawyer.
-
- 9. If the police arrive at your house with a warrant. Look it over
- and know what they can and can't do. If they try something they can't
- do, stop them.
-
- 10. Try not to hack off your own line. Splice your neighboors, or
- call from a fortress phone. If you hack long enough you'll sooner
- or later get ANI'd. And Packet Switched Networks aren't entirely
- safe.
-
- 11. Make it tough to track you. Bounce the call off several outdials.
- If your on a PSN (Packet Switched Network) go through several pads,
- before you reach your destination. It will make more trouble for the
- investigators and make it easier for you to get away.
-
- That's all for this issue. More info next time. For all of you interested in
- a data encryption program, I can mail one to you (Shareware) and one other
- (PC Magazine, batch/asm routine) on the same disk. Cost is only $4.00.
- Send Name, Address, Phone (Optional), and check, money order, or cash (I am
- not responisble for lost mail) to:
- Center for Intelligent Anarchist's
- c/o Scott Wilcoxen
- 2400 Derby Drive
- Fallston, MD 21047
-
- ><><><><><><><><><><><><>
- Where to Get Information>>>>>>>
- ><><><><><><><><><><><><>
- Hacking/phreaking material is hard to obtain and often quite
- expensive. This will become a regular section with magazine/catalog/book
- Companies that sell materials on hacking/phreaking/etc. Here goes the list:
-
- Delta Press Ltd.
- P.O. Box 1625
- 215 South Washington Street
- El Dorado, AR 71731
- -explosives, improvised munitions, survival, espionage,
- survival, revenge, guns
-
- Palidan Press
- P.O. Box 1307
- Boulder, CO 80306
- -explosives, improvised munitions, survival, espionage,
- privacy, revenge, guns
-
- Eden Press
- 11623 Slater "E"
- P.O. Box 8410
- Fountain Valley, CA 92728
- -privacy, protection, jobs, credit, espionage, buisness ideas
- offshore finace, personal independance
-
- Books By Phone
- P.O. Box 522
- Berkeley, CA 94701
- 1-800-858-2665
- -drugs, criminology, cyberpunk, occult, rock & roll, sex,
- underground labs, survival
-
- There are many more, that I will include in later issues. I have a
- list of about thirty, but none are verified (old list) and as I receive info.
- you will receive info.
-
- _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
- Well that wraps it up for issue number two. Should have been released
- April 3,1994. If anyone is interested in speaking with me I can be reached
- on prodigy at GSTD79B. Name is Scott Wilcoxen. I will be canceling Prodigy
- soon and getting Compuserve, so I will post my CompuServe I.D. when I get it.
- Continue writing me on prodigy if you wish, I will be there. Some letters
- will be posted in a letters to editor section. You can reach me at:
- Center for Intelligent Anarchist's
- c/o Scott Wilcoxen
- 2400 Derby Drive
- Fallston, MD 21047
-
- Selected letters will be placed in a letters to the editor section. Well,
- until next month. Happy Hacking (Happy Easter too!!)
- ______________________________________________________________________________
- This just in, for some reason CUD has been ended. It will no longer be
- available!!!
-
-
-
-
-
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
- APRIL FOOLS!!!!!!!!!!!
-