home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-01-19 | 186.3 KB | 4,001 lines |
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 1 of 11
-
- Issue XXXVI Index
- _________________
-
- P H R A C K 3 6
-
- December 31, 1991
- _________________
-
- "You've Got The Right One Baby, UH HUH!"
-
- Happy New Year Everyone! HoHoCon'91 is behind us and with the end of the
- year is the end of the third volume of Phrack. This special issue is called
- Diet Phrack because of the whole Phrack vs. Phrack Classic crisis (which is
- probably more KL's doing than anyone elses) that went on during the middle of
- volume three.
-
- Diet Phrack was conceived in August 1991 during PartyCon when Dispater,
- Knight Lightning, and several other friends gathered to party and bitch about
- where Phrack was and wasn't going. Eventually this led to the new Phrack staff
- that began with Phrack 33.
-
- Diet Phrack is also the long-awaited sequel to Phrack 13 (which some
- consider the most worthless issue ever, but its probably because they weren't a
- part of Phrack's main circle of friends and didn't understand all the private
- jokes).
-
-
- COMMENTS AND OBSERVATIONS CONCERNING HOHOCON'91
-
- "Phrack sucks!"
-
- Well that was certainly a common remark at HoHoCon and considering that
- the majority of the attendees were local Houston losers expecting us to print
- codes and passwords for them, we weren't really surprised.
-
- Do you think Phrack sucks? You probably aren't reading this if you do,
- but seriously, if you really think it sucks you can fuck off. You are welcome
- to go start your own magazine with the latest scans of c0dEz and VMBs (that
- will sure be useful after about a week). That is not what we are about.
-
- Why don't you try writing something yourself instead of copying useless
- material directly out of the Bellcore Catalog? Why don't you actually do
- something like hack instead of expecting others to do it for you?!?
-
- When Dispater stood up at HoHoCon and asked the crowd what kind of systems
- they hacked and what they were interested in learning about, the 70 people
- sitting there just looked around like a bunch of grazing cows (no pun or
- offense intended to our friends in -cDc-, oooM!)
-
- It's pretty obvious to us that the people who complain most about Phrack
- don't even bother to read it. At least they would know the correct spelling of
- our names.
-
- Phrack is about technology, how to create it, how to use it, and the
- implications that always arise from it. Phrack is not designed to do the
- hacking for you. For some, Phrack is a hacker "primer." Generally we expect
- that the reader already has a reasonable level of intelligence to begin with.
- In Houston that maybe that was to great an expectation.
-
- THANKS
-
- The Phrack Staff would like to thank the people in Cult of the Dead Cow,
- the people at WorldView that took the time to chat, the one guy from Digital
- Murder (who's name esacpes me at the moment) and NCC for being some of the
- coolest people we met while at the conference. Thanks to NIA Magazine, CUD,
- and everyone else that promoted it. Furthermore, a very special thanks goes to
- Drunkfux of dFx International. If not for him, HoHoCon'91 would not have
- happened!! Additionally this would mean that hordes of people drugged up on
- Marshmellow Hex sitting in a hallway with a laptop would not have created
- Cyberwaste; and, Demon Seed would not be alive. Check out cDc c200 for
- details! Thanks to Erik Bloodaxe for providing the flicks that some could not
- stomach (after too much beer & assorted beverages)! So thanks again Drunkfux.
- Nelson is my favorite. (!)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- HOW TO SUBSCRIBE TO PHRACK MAGAZINE
-
- The distribution of Phrack is now being performed by the software called
- Listserv. All individuals on the Phrack Mailing List prior to your receipt of
- this letter have been deleted from the list.
-
- If you would like to re-subscribe to Phrack Inc. please follow these
- instructions:
-
- 1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
- must be sent from the account where you wish Phrack to be delivered.
-
- 2. Leave the "Subject:" field of that letter empty.
-
- 3. The first line of your mail message should read:
- SUBSCRIBE PHRACK <your name here>
-
- 4. DO NOT leave your address in the name field!
- (This field is for PHRACK STAFF use only, so please use a full name)
-
- Once you receive the confirmation message, you will then be added to the Phrack
- Mailing List. If you do not receive this message within 48 hours, send another
- message. If you STILL do not receive a message, please contact
- "SERVER@STORMKING.COM".
-
- You will receive future mailings from "PHRACK@STORMKING.COM".
-
- If there are any problems with this procedure, please contact
- "SERVER@STORMKING.COM" with a detailed message.
-
- You should get a conformation message sent back to you on your subscription.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Now we are off to the Cybernetic Realm of Cyberwaste. If you are upset
- about what is said about you in this issue. DEAL WITH IT! Maybe you should
- get a sense of humor and then write a file about us. Until next time it's
- off to cyberspace and as Don Ingraham (luzer) would say, "off to rape campus
- co-eds! (was that a good sound bite or WHAT, Geraldo?!?!?)!."
-
- You've had Phrack Classic, NOW try new Diet Phrack!
- "Just for the Phun of it...Diet Phrack!!"
-
- Your Editors
-
- Compaq Disk (Crimson Death) & Dr. Dude (Dispater)
-
- phracksub@stormking.com
- _______________________________________________________________________________
-
- Phrack XXXVI Table of Contents
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- 1. Introduction to Diet Phrack (Phrack 36) by Compaq Disk and Dr. Dude
- 2. Diet Phrack Loopback by Phrack Staff
- 3. In Living Computer starring Knight Lightning
- 4. The History ah MOD by Wing Ding
- 5. *ELITE* Access by Dead Lord and Lord Digital (Lords Anonymous!)
- 6. The Legion of Doom & The Occult by Legion of Doom and Demon Seed Elite
- 7. Searching for speciAl acceSs agentS by Dr. Dude
- 8. Phreaks in Verse II by Homey the Hacker
- 9. Real Cyberpunks by The Men from Mongo
- 10. Elite World News by Dr. Dude
- 11. Elite World News by Dr. Dude
-
-
- Coming soon...
-
- Phrack Jolt!
-
- All the VMBs and TWICE the c0deZ!
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 2 of 11
-
- [-=:< Phrack Loopback >:=-]
-
- by Phrack Staff
-
- Phrack Loopback is a forum for you, the reader, to ask questions, air
- problems, and talk about whatever topic you would like to discuss. This is
- also the place the Phrack Staff will make suggestions to you by reviewing
- various items of note; magazines, software, catalogs, hardware, etc.
- ______________________________________________________________________________
-
- WHAT'S ON YOUR MIND?
-
- :: I Act Elite Now Teach Me Something Useful ::
-
- From: Corp. Punishment (90 lbs of skin & bone k0dE geek who couldn't beat up
- a ferret)
-
- > Hey l0serz,
- > Me tinks Phrack sucks. Why dusn't ya bust us sum ReAl hackin' tricks
- > seein as how I be clueless 'bout any type o' operatin' system, 'cept fo
- > maybe Amigas.
- > (ps: I gots mo c0deZ dan eew ever git in yo laf)
-
- Alright, check out some of these awsome commands you can try out on a
- UNIX site. If you are too stupid to actually hack an account yourself just
- call up the sysadmin @gnu.ai.mit.edu and ask them for the "root password".
- They will undoubtably give it to you. At the "login:" prompt type "root" and
- then type the password they give you at the "password:" prompt. I know this
- is hard to memorize so just print this out.
-
- % rm meese-ethics
- rm: meese-ethics nonexistent
-
- % ar m God
- ar: God does not exist
-
- % "How would you rate Quayle's incompetence?
- Unmatched ".
-
- % ^How did the sex change^ operation go?
- Modifier failed.
-
- % If I had a ( for every $ the Congress spent, what would I have?
- Too many ('s.
-
- % make love
- Make: Don't know how to make love. Stop.
-
- % sleep with me
- bad character
-
- % got a light?
- No match.
-
- % man: why did you get a divorce?
- man:: Too many arguments.
-
- % ^What is saccharine?
- Bad substitute.
-
- % %blow
- %blow: No such job.
-
- % \(-
- (-: Command not found.
-
- $ PATH=pretending! /usr/ucb/which sense
- no sense in pretending!
-
- $ drink <bottle; opener
- bottle: cannot open
- opener: not found
-
- $ mkdir matter; cat >matter
- matter: cannot create
- _______________________________________________________________________________
-
- :: More Supercomputer Information ::
-
- The Phrack Staff received a copy of this letter from Abraham Epstein in New
- York City who has been hot on the trail of Power Computer with the help of his
- friend Toni O'Connell.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- From: Abraham Epstein (abraham@plastic.ibm.com)
- To: reagan@whitehouse.gov
- Cc: phracksub@stormking.com
-
- For years now I have suffered because of the Power Computer. Individual
- computer minds are invisible, enter through the ear and go directly to the
- brain. There are over trillions of computer minds in and outside of every
- human being on planet Earth. Their minds, the computer TV, as State-Senator
- Emmanuel Gold <State of New York> wrote about and knows about is handling the
- entire situation in everyone's mind since 1976. Former President Jimmy Carter
- helped build this computer, as well as Senator Edward Kennedy in 1968.
-
- The Power Computer originated outside our solar system, then came to Earth
- in the early 1960's. I pulled the plugs on the power computer in Utah and New
- Mexico. I have been designated, without my permission to dismantle power.
- This all happened to me in 1976. Both computer installations are located
- underground with back-up generators and satellite dishes also above ground. In
- addition to this documentation there is a letter from the Reagan team sent to
- me in 1980. A lawyer named Mr. Richard Leff who is located in Forest Hills saw
- and read the letter. The Computer TV has killed people in 1968, hates religion
- and would also like to do away with all music. It also hates pets. President
- Carter sent me brochure on IBM-Computers from Atlanta in 1981, after I sent him
- a copy of the Reagan team letter. The documentation that I sent to you was
- sent to former President Carter on October tenth, 1988. The Computer TV has
- stolen my mail for the fiftieth time. I even called Mr. Mitchell in Atlanta,
- they never received my mail at all. Now the psychotic cheap junk pile of
- computer has been beating my mind in for over twelve years because it's plain
- ugly.
-
- Computer people called plastics are yet to be born. IQ about 190 on these
- computer people. There are a few plastics in the US and TV is abusing them
- also. There is another type of computer in Fruitland, nicknamed Big Daddy.
- This particular computer can hear, see and talk through a PC type set-up.
- Nothing at all like the hideous Power Computer. Senator Orin Hatch from Utah
- also wrote me. A Mr. Ron Morrison at the honorable Senator's office has been
- in touch via telephone since June '88, so has the office manager. I'm relying
- on you, Mr. President, to become involved and write to me so that I can proceed
- to court and then dismantle Power, period. Please don't bother sending over
- the FBI or any other law enforcement people, TV will only get me in trouble
- like it has done in the past. TV can manipulate your thoughts quite easily.
- Why? Because the Power is psychotic. It's that simple. Consider it very
- dangerous until I pull the plug. It's mind is electrical. I'm hoping to know
- from you right away. Thank you very much for your concern.
-
- Senator Hatch does not want the FBI or any other agency to visit me. Why?
- As I mention earlier: TV Computer. This computer in particular is always up
- to no good. I thank you again for taking your time out and writing me. In
- addition I have spoken to the FBI in Queens, NY and the Secret Service in New
- York.
- _______________________________________________________________________________
-
- REVIEWS
-
- What will we review today? Well, how about the latest sex services offered
- to you over the telephone. The following two services are real and pretty
- comical. There is also a new UNIX utility called ERIKB as well as a new IRC
- utility by NeTw1z. We are furnishing the manual description of these latest
- pieces of software.
-
- But first, a message from our sponsors:
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- ADULT TIME & TEMP
-
- Tired of calling "time & temp" and being forced to listen the same stupid
- "Sponsored by First National Bank" ad? Well try setting your clocks to this.:
-
- 312-489-1505
-
- In addition to the aforementioned information, as it relates to Chicago,
- you get a choice of voicemail advertisements wherein people describe their
- special interests. Special hobbies are indicated by the following matrix.:
-
- 1: How to Placing Your Add 5: Women seeking Women Only.
- 2: Men seeking Women
- 3: Men seeking Men 7: Masters seeking Submissives
- 4: Women seeking Men 8: Submissives seeking Masters
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- WOMEN IN JAIL
- Seek Boyfriends and Husbands
-
- Introducing America's most exciting dateline - for women who will soon be
- released from jail . . . and men who want to meet them!
-
- They're young and attractive. They're sorry for what they've done. And
- they haven't been with a man in a long, long time. Can you help them out? Do
- you want to meet a woman who will really appreciate being with you?
-
- CALL NOW - WOMEN IN JAIL
-
- 1-900-535-JAIL
- THAT'S 1-900-535-5245
-
- THEY'RE GETTING OUT SOON AND THEY *NEED* YOUR COMPANY
-
- $1 min., $2 the first. ADULTS ONLY
- _______________________________________________________________________________
-
- NEW UNIX UTILITY
-
- The following is the latest piece of software currently under development by
- Comsec Data Security. The manual description is all Phrack was provided. Our
- thanks goes out to MoD.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- ERIKB(1) USER COMMANDS ERIKB(1)
-
-
- NAME
-
- erikb - comsec utility program
-
- SYNOPSIS
-
- erikb [[-n user] [-a agency] [-d dir]] [-r [group]] [-t] [-s]
-
- DESCRIPTION
-
- The erikb command is part of the comsec utility package.
-
- OPTIONS
-
- -n user
-
- Nark on the user specified.
-
- -a agency
-
- Send information to the agency specified.
- The default agency is cert.
-
- -d dir
-
- Look in specified directory for user's information.
- /usr/lib/comsec/nark is used if not specified.
-
- -r [group]
-
- Suffixes output with verbose form of racial slurs.
- Ethnic group may be specified. Default is African-American.
-
- -t Print out witty (but usually not correct or even
- intelligent) telco-related statement.
-
- -s Display advertisement for the LOD T-shirt. Funds from
- this sale go to support comsec while it tries to secure
- its first contract.
-
- Invoking erikb without any arguments causes the program to
- enter an infinite loop. While this indeed does nothing, it
- is not a bug: this is the normal state of erikb.
-
- AUTHOR
-
- Chris Goggans
-
- BUGS
-
- Too many to enumerate.
-
- FILES
-
- /usr/lib/comsec/nark
-
- SEE ALSO
-
- lame(1), comsec(1)
-
- MOD Release 4.1 Last change: 26 November 1991
- _______________________________________________________________________________
-
- NEW IRC UTILITY
-
- Phrack Inc has discovered ANOTHER new utility package while journeying in the
- CyberMatrix. We picked this up from a system called "WASHINGTON.EDU". The
- original author of this program is Ken Case.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- NeTw1z(1) USER COMMANDS NetW1z(1)
-
- NAME
-
- NeTw1z - IRC utility program
-
- SYNOPSIS
-
- NeTw1z [[-p user] [-c lame] [-d dir]] [-r [group]] [-t] [-s]
-
- DESCRIPTION
-
- The NeTw1z command is part of the m0d utility package.
-
- OPTIONS
-
- -p user
-
- Post user's "information" IRC to impres everyone
-
- -c lame
-
- Complain about everything and everyone (other than MoD) being lame.
- The default targets are Chris Goggans or Phrack Inc.
-
- -d dir
-
- Look in specified directory for user's information.
- /usr/InfoAmerica is used if not specified.
-
- -r [group]
-
- Suffixes output with verbose form of attacks.
-
- -t Print out witty (but usually not correct or even
- intelligent) telco-related statement.
-
- -s (boxer) shorts are what you wear when you are running down the
- street away from the feds when they come to your house and take
- your Commadore-64 that is plugged into your fat welfare momma's
- television set.
-
- No one has ever invoked NeTw1z without any arguments. It simply
- cannot be done.
-
- AUTHOR
-
- Corrupt
-
- BUGS
-
- Too many to enumerate.
-
- FILES
-
- /usr/lib/mod/immature
-
- SEE ALSO
-
- lame(1), geek(1), crackdealer(1), welfare-momma's-boy(1)
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 3 of 11
-
- I n L i v i n g C o m p u t e r
- >>> >>>>>>>>>>> >>>>>>>>>>>>>>>
- "Knight Lightning meets... The Man"
-
- Adapted from "In Living Color" on Fox Television Network
-
- Starring Knight Lightning
-
- Featuring:
- __________________________________
- | |
- | KL = Knight Lightning |
- | SP = Judge Dredd |
- | CD = Crimson Death |
- | DP = Dispater |
- | |
- | JD = Jerome Dalton (Bellcore) |
- | DB = David Bauer (AT&T) |
- | TM = The Man... you'll see! |
- |__________________________________|
-
-
- + Picture the scene...
-
- A computer conference in Chicago, Illinois.
-
- KL is speaking with several members of the computer underground...
-
- KL: "The whole concept is based on freedom of information. People should
- share information, because sharing benefits everyone."
-
- CD: "That is what my board, Free Speech, is all about. Want some c0dez?"
-
- SP: "Hey Knight Lightning! Do you want to write for my *elite* newsletter,
- NIA!?"
-
- KL: "I don't think so... KL don't play that!" (At this point KL whips out a
- large two-by-four and clunks Judge Dredd and Crimson Death on the head for
- daring to suggest something so ridiculous). Bop! Bop!
-
- Meanwhile, watching closely from a short distance stood two men in dark suits
- and dark glasses. It was Jerome Dalton and David Bauer from AT&T Security.
-
- DB: "See over there, that's KL. He would be perfect."
-
- JD: "Yes I see. Perhaps we can persuade him to come aboard."
-
- A few minutes later as Knight Lightning nears the exit, he is approached by
- Bauer and Dalton.
-
- JD: "Excuse me a moment KL... we'd like to discuss some business with you."
-
- KL: "What the hell do *you* want?"
-
- DB: "Well KL, with all of these hackers acting like they have civil rights, we
- need some help over at AT&T Security to really bust them. We want you to
- come work for us."
-
- KL: (Gripping his two-by-four tightly and tensing to swing)
- "KL don't pl..."
-
- JD: "The job pays $1,000,000 a year!"
-
- KL: "...have a problem with that." ($ $ $ $ $ $)
-
- DB: "Congratulations KL and welcome aboard. You made the right decision."
- _______________________________________________________________________________
-
- + One week later...
-
- Dispater of Phrack Newsletter spots Knight Lightning, Jerome Dalton, and David
- Bauer coming out of a security meeting with the Secret Service.
-
- DP: "KL! Hey, what are you doing with those guys? Look I need to get some
- advice about running Phrack."
-
- JD: "Oh no you don't! KL don't play that no more!"
-
- The three of them walk past Dispater...
-
- DP: "You're not KL the hacker..." (tears in his eyes) "You're KL the FED!"
- _______________________________________________________________________________
-
- Did Knight Lightning SELL OUT the hacking community for money!? Has he become
- a "FED"? To find out the answers to these questions and more, keep reading!
- _______________________________________________________________________________
-
- + The scene is Cherry Hill, New Jersey... AT&T Headquarters, where the entire
- country and the United States government are secretly run by "The Man."
-
- DB: "We're very glad to have you here. Without your presence in the hacking
- community, they'll fall apart any day now. That's why we had our friends
- at Bellsouth single you out and falsify the costs and nature of that E911
- document."
-
- JD: "Right. But none of that is important now that you are here with us. I
- guess you finally realized that since we at AT&T run the entire country,
- it was futile to continue opposing us."
-
- KL: "Yeah. It was the only decision that made sense at this point. So when
- do I get to meet 'The Man'?"
-
- DB: "In time KL, in time."
-
- JD: "You don't get to meet 'The Man' until we're sure you are a total
- sellout."
-
- KL: "Oh. Well AT&T is the greatest corporation in the world."
-
- DB: "C'mon KL, you can do better than that... most of America is already
- brainwashed into believing that..."
-
- KL: "All computer hackers are scum and don't deserve any civil rights, we
- should seize all their computers and lock them up for ten years each."
-
- JD: "and..."
-
- KL: "and... Bill Cook is a great humanitarian, an honest man who never was
- malicious, everything he did to me and many others was totally reasonable
- and necessary."
-
- WHOOOOOOOOOSH! (A giant door at the other end of the room swings open.)
-
- DB: "You did it KL! You have totally sold out!"
-
- JD: "Its time for you to meet 'The Man.'"
-
- After a short round of applause and a high-five, Knight Lightning walks towards
- the door and enters the room. He stares across a great desk where a large
- chair is turned so that its occupant is facing the other direction.
-
- TM: "Come in KL. Its time that we met."
-
- KL: (Steps closer to the desk)
-
- TM: (Swinging around to face KL) "Well, well, well Knight Lightning."
-
- KL: "Well, well, well, The Man; Robert Allen, Mr. Establishment himself."
-
- TM: "That's enough KL. I have BIG plans for you!"
-
- KL: "Well, I really like what you did to Len Rose."
-
- TM: "That is just the beginning! What I have in mind is for you to get us
- information on every hacker in America. Then we'll fabricate some more
- dollar figures, like on that E911 text file and login C, and create some
- logs that show them breaking in to some of our systems. Maybe we'll even
- let a few service outages happen just so we can blame it on them (we screw
- up enough times by ourselves anyway). Then we'll use our massive
- influence over the government to make sure the prosecutors find every
- potential law they can to use against them and the next thing you know,
- all these hackers will be behind bars where they belong."
-
- "What do you think of all that, KL?"
-
- KL: "I'm listening..."
-
- TM: "Now before you can become an official member of the AT&T Security
- Establishment, it is customary to drop your pants and bend over in front
- of The Man."
-
- KL: "Drop my pants and bend over?"
-
- TM: "Yes... every person at AT&T and Bellcore security has undergone this
- ritual."
-
- KL: "Well Bob, I'll tell you what I think... here is a new ritual for you to
- consider..."
-
- (A sudden and exhilarating display of ninja-like maneuvers with the magic
- two-by-four was followed by the loud and all too familiar sounds!):
-
- "*BOP!* *BOP!* *BOP!*"
-
- (KL had slammed Robert Allen for plotting such injustices).
-
- "KL don't play that!"
-
- "You thought you had me working for you, but really I was just playing
- along as part of my secret plan to *BOP!* The Man. You stink!"
-
- TM: "You fool, you don't know what you've done. You've just made the biggest
- mistake of your life!"
-
- KL: "Yeah, maybe, but I hold my principles higher than your money can ever
- buy. What you do here is criminal and if the government won't crawl out
- from under its rock and say something then I will!"
- _______________________________________________________________________________
-
- + A few days later at the next 2600 meeting in New York City...
-
- DP: "I knew you would never really sell out, KL."
-
- KL: "Yes, you see I had to pretend so I could get to The Man."
-
- SP: "Oh, so does that mean that you'll come back and write for NIA now?"
-
- CD: "If money is not so important let me have that $1,000,000 they gave you."
-
- KL: "KL don't play that!"
-
- (Again KL whips out a large two-by-four and clunks the foolish Judge Dredd
- on the head for daring to suggest something so ridiculous.
-
- He missed clobbering the frightened and cowering Crimson Death again,
- because in a moment of panic, CD chose to retire from the community and
- instantaneously disappeared, leaving only his nose-ring behind.)
-
- *BOP!*
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 4 of 11
-
- The History ah MOD
- Revision c3 -- November 1991
- Written by Wing Ding
-
- [Originally From The MOD Technical Journal, Issue 4: File 6 of 10]
-
- NOTES: I approximated all dates, as my records are not totally complete.
- If I left anyone out or put someone in that shouldn't be in, fuck off!
- I tried and did spend considerable time researching the dates and
- BBS files, the old MOD BBS software, etc. This file is from MOD and
- was intended for internal group reading only. Non-MOD versions are
- being translated at this time, and will be released at a later date.
-
- MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- [ De Hist'ry uh MOD ]
-
-
- BOOK ONE: De Originals
-
- In de early time part uh 1987, dere wuz numerous amounts uh busts in de US and
- in New Yo'k in particular. Word to ya motha'. Fo' de most part, many uh de
- so-called "elite" had gone underground o' had plum gotsten scared out of
- hackin'. Many sucka's, as always, dought hackin' would die cuz' of de raids.
- It wuz right befo'e dese raids dat MOD had fo'med.
-
- It came about when Acid Phreak, den usin' anoda' handle, had been runnin' a
- semi-private fuckin'bbs off his Commodo'e piece uh shit and 10 generic Commie
- drives. It wuz called KAOS, and it attracted hacks and phreaks fum across de
- country (as well as de usual amount uh k0dez d00ds). Nynex Phreak had been
- co-systum mastuh (havin' been AP's partna' fo' about 2 years befo'e dat) and da
- damn bo'd started off wid about 140 users but wuz weeded to de best 60 o' so.
-
- On dis fuckin'bbs, Acid Phreak had gotsten along wid some few "kewl dewds" who
- enjoyed da damn mischievous aspect uh phreakin'. Dey wuz Silva' Surfa' in
- Califo'nia, and Quick Hack in Texas. When de raids came however, Silva' Surfa'
- gots nabbed fo' usin' some PBX in 404 and derefo'e, retired. Quick Hack and
- Acid stayed low and called each oda' less frequently dan usual. Soon dey had
- bod stopped completely. Slap mah fro!
-
- In early time 1989, Acid had jet back into de scene and had called some local
- New Yo'k bo'd wid some somewhut "k0dez-e" attitude called ShadoWo'ld in 212.
- Of course dere wuz lots uh neophytes eaga' to learn mo'e about hackin' and how
- t'call places fo' free. Word! Most uh dem had been in de "duz 950 trace?"
- stage, 'sept fo' someone who went by de handle Harry Hazardous. Unda' de
- handle Phuck Dis (also Bell Bandit which had o'iginally been Nynex Phreak's
- oda' handle), he met wid Harry. Slap mah fro! Soon dey had gained enough
- respect fo' each oda' and decided t'meet. Harry turned out t'be HAC, some
- cyberpunk t'de "T".
-
- In numerous conversashuns between de two, AP had muhntioned de sweetness uh
- tela'fone binnis computa's and how interestin' deir intricate structures wuz.
- HAC wuz some hardco'e systums gangsta' himself, but he had also been partners
- wid someone who came across (and had an impressive knack fo') some telco
- computa's. He went by de name Sco'pion and he also lived in de NYC area.
- Sheeeiit. Soon de dree wuz partakin' in all so'ts uh mischievous pranks and
- unda' de guise of numerous handles (ie. Word! De Potent Rodent, Dream Master,
- Phuck Dis) dey took t'knockin' down de locals who dought "I know all dere be
- about hackin'". It wuz in de midst uh all dis fun dat dey agreed t'fo'm an
- underground group called MOD (approx. June 1989).
-
- About one mond latuh, Acid had been on Altos (revisitin' some chat dat wuz
- once, but neva' again, de heart uh a lot uh fresh gangsta' convos since early
- time '84 o' so) when he came across someone ax'in' fo' Unix gurus. Hims handle
- wuz De Win', and he ran some Unix systum fum his crib in Pennsylvania.
- Sheeeiit. Sco'pion wuz always some Unix guru while Acid had only jet across it
- in college two years back. De Win' offered Acid an account on his systum and
- soon he became "Phreak-Op" on De Sevend Dragon, his fuckin'bbs run off de Unix,
- usin' yet anoda' old alias "Depeche Mode".
-
- Relayin' de info'mashun t'Sco'pion on yet anoda' fresh addishun to de group,
- dey decided t'recruit him into MOD. De fun, it seemed, had plum started...
-
-
- BOOK TWO: Creative Mindz
-
- Wid de addishun uh De Win', came some shitload uh pranks and loads uh fun. 'S
- coo', bro. He hadn't knode much about tela'fone systums, but one thang he
- knowed wuz how t'make Unixes do nifty thangs. Of course, he and Sco'pion had
- undertakun de tax' uh takin' on some wo'dwhile projects and providin' de group
- wid some healdy side-benefits (which kinnot be muhntioned o' commuhnted on at
- dis particular momuhnt in time).
-
- At dis point, de group consisted uh de 4 o'iginal founders (flounders??)
- -> Acid Phreak, HAC, Sco'pion, and De Win'.
-
- Around dis time, 2600 Magazine had 2 bo'ds in opuh'shun. De Central Office,
- and De Toll Center. Word to ya motha'. OSUNY had gone down fo' some funky
- reason a sho't time eardisr. Word to ya motha'. It wuz on De Toll Centa' (Red
- Knight's fuckin'bbs) dat AP had fust met da damn next memba' of de group (and
- coincidentally Red Knight which be de most recent memba' to de group). He
- called himself "Supuh'nigga" and had much de same ideology as de rest uh de
- group. It wuz followin' his group's o'iginal "knock down dose who dink dey
- know everydin'" attitude dat MOD also adopted da damn same muhntality. Slap mah
- fro! Supuh'nigga' wuz drafted and wid him came hours uh discusshuns on REAL
- phreakin' and Social Engineerin'. Dere wuz also some loooong puh'iod of time
- where MOD had some conference bridge set up by SN. Hours of enjoymuhnt and fun
- fo' de whole family and kids uh all ages...
-
- Anoda' gangsta' and telco computa' specialist also seemed t'be real prominent
- and knowledgeable den as sheeit. He wuzn't likesd real much a'cuz he seemed
- t'gots' some rada' large ego, which ah' may add, makes it coo' t'gots' when ya'
- know so's much as he dun did. He went by two oda' handles some long time
- befo'e, and when AP had fust called him up he had an idea he wuz also dose 2
- oda' sucka's, but he had refused to admit so. He declared he wuz "Phiba' Optik
- uh de LOD. Word! " and ax'ed whut AP wants'ed. Sco'pion, Acid and Phiba'
- exchanged ideas on switchin' thera fo' some long while, but den came da damn
- time when PO wants'ed t'know Acid Phreak's digits since he found it "unfair".
- AP muhntioned dat he could prove himself by findin' it fo' himself. Word!
- Armed wid a dialup, PO called Acid back on his real numba' and casually
- proclaimed victo'y. Slap mah fro! And so, Phiba' Optik wuz "brought into" de
- group. What wuz different however, wuz de fact dat he and AP had similar
- interests and started "hangin'" as homeys "around da damn way" along wid HAC
- and Sco'pion in de Village (NYC).
-
- De Toll Centa' went down weeks latuh and PO, AP, and Sco'pion found demselves
- callin' random "newjacks" t'de scene. Word! In dis way dey stumbled across
- Crazy Eddie and some "quesshun and answa' fo'um" among de foe uh dem ensued wid
- Crazy Eddie proclaimin' his eagerness t'learn. 'S coo', bro. Coincidentally
- afta' a few calls t'CE on his crib line he challenged de MOD crew t'find his
- oda' number. Word to ya motha'. Sho' nuff dey called it but coincidentally
- enough, some few days on latuh in de week, some rada' nasal soundin' boy had
- called him sayin' he wuz ITT security(?) and had tried to convince him he wuz
- in deep shit fo' usin' c0des and dat he knows de "numbers uh de gangsta's dat
- gots' been callin'" him. 'S coo', bro. In some rada' idiotic fashion, de ITT
- sucka' attempted t'coax de 3 MOD members t'call him usin' 10488 (equal access,
- fgd). He gave some bullshit numba' to where he wuz at and chilled by his
- little dermal printa' fo' de digits to pop up. Of course, dey realized whut
- some futile attempt t'catch dem dis wuz, and Crazy Eddie had repdisd dat "dey
- say dey duzn't feel likes usin' equal access but dey'll call de numba' anyway".
- It turns out da damn number wuzn't even real and afta' meetin' wid de ITT boy
- on some loop he declared dat dey wuz smarta' dan he dought.
-
- Afta' a few monds, Crazy Eddie wuz introduced t'de group and so, he had gotsten
- t'know de group real well. Unfo'tunately, so's had de Secret Service. Word!
-
-
- BOOK THREE: A Kick In De Groin
-
- Sheeit, suffice it t'say, de fun couldn't last fo'ever. Word to ya motha'. On
- January 24, 1990, de Secret Service visited da damn cribs uh Acid Phreak,
- Phiba' Optik, and Sco'pion.
-
- De raid dun didn't cum as some surprise since dey had been somewhut weary of
- Domas Covenant's behavio' as uh late. Acid Phreak had been away fo' 2 weeks
- (visitin' relatives in some fo'eign country) and wuz *somewhut* surprised
- t'meet such unoppo'tune guests some day afta' his arrival. Phiba' wuz equally
- amused at da damn "cleanin' service" he found so diligently wo'kin' in his
- bedroom. 'S coo', bro. Sco'pion on de oda' hand, 'estremely *enjoyed* de
- do'ough job dey had puh'fo'med at bod his do'm and his house and even saved
- some hardware dey had left behind fo' de next time dey visit (which dey dun
- did).
-
- Days latuh, dey had gone t'meet De Win', which wuzn't able t'rap fo' too long
- since he wuz too busy. Slap mah fro! He had been anticipatin' dis little
- visit fo' awhile dough. His dad dun didn't 'esactly likes de idea uh deir
- presence and kicked deir lack-of-a-warrant asses out befo'e dey gots some
- chance t'put to use deir years uh interrogashun techniques classes. Seems dey
- dink he showed his teacha' a credit repo't o' sump'n...
-
- A few weeks go by, and MOD gits t'know Seeker. Word to ya motha'. He sounds
- def enough, and he knows his electronics so's he be a real valuable addishun
- t'de group. Seeka' made his way in and so's dun did de million-and-one MOD
- stickers and funny-colo'ed-little-box-din'ies. De stickers, uh which, made deir
- way t'Ground Zero's big-ass butt at some 2600 meetin'.
-
- Anyways, de MOD Unix went down, and 3 local gangsta's wid much potential caught
- attenshun t'dem. 'S coo', bro. Dey wuz: ZOD (a Unix gangsta'), Outlaw (just
- a general dude), and sum nigga name Co'rupt (Vax kin'). Afta' days uh gettin'
- t'know dem, dey wuz pulled in. 'S coo', bro. Countless weeks went by wid whut
- seemed likes a dozen MOD fuckin'bbs's on 800s, packet switched netwo'ks, etc...
-
- De group's popularity so'ed in such some sho't puh'iod uh time, but many
- gangsta's disagreed wid de MOD style much in de same way Phiba' Optik had
- enjoyed humiliatin' dose "in de know" publically. Slap mah fro!
-
- ZOD wuz de last uh de group t'be raided (o' at least da damn most recent), but
- gots 'em sum since made much 'haidway into de telecom wo'ld. Outlaw gots 'em
- sum also been somewhut adept wid telco speak. Sum nigga' name Co'rupt, havin'
- been real active befo'e, duzn't gots' some wo'kin' computa' anymo'e and so..
- sheeit, duh.
-
- Two new members wuz introduced around da damn time uh de writin' uh dis
- chapter. Word to ya motha'. De fust wuz De Plague. Word! He had some
- professional attitude and wuz certainly wo'd trustin'. Of course, wid all de
- media attenshun drawn to him and MOD in general, he gots 'em sum decided
- t'remain low and not brin' any mo'e t'himself. Word!
-
- Red Knight wuz o'iginally on trash runs wid Acid Phreak in '89 but wuz not
- brought in until July '90. It seems RK gots 'em sum learned some lot about
- telco ways since he fust put up De Toll Center. Word to ya motha'. RK also
- seems to enjoy reminiscin' about da damn trash run days (of which dere wuz
- quite a few).
-
- As uh August 1, 1990, dere are 14 members. Dese include, dig dis:
-
- Acid Phreak (r)
- HAC
- Sco'pion (r)
- De Win' (v)
- Supuh'nigger
- Nynex Phreak (r)
- Phiba' Optik (r)
- Crazy Eddie (r)
- Seeker
- ZOD (r)
- Outlaw
- Sum nigga' name Co'rupt
- De Plague
- Red Knight
-
- (v) signifies sucka' wuz visited but nodin' took
- (r) means eida' raided o' retired, it's some pickem. 'S coo', bro..
-
- - - -> MOD be now *CLOSED* t'membership. <- - -
-
- Dis be de official (and most likesly t'be da damn final) list
- uh dewds. Of course, members may use some GROUP account o'
- anoda' handle, but da damn fact remains dat dese are da damn ONLY
- members in de group. Unlikes LOD, we know who be in and who
- isn't..
-
- We should also note Julian Dibbell (Dr. Bombay) fo' his wo'k on "Rebel Hackers"
- in De Village Voice on July 24, 1990. He po'trayed de scene da damn way it
- really be and uh course gave us de amount uh coverage we deserve. Word! And
- uh course, we came out da damn way we really are and not as gangsta's out
- t'destroy de wo'ld. Dr. Word to ya motha'. Bombay wuz invited t'de MOD Unix
- right befo'e da damn raid. 'lo and behold.. some front-page cover sto'y.
- Word!
-
- "We rule".
-
- MOD/Fo'eva' We Hack
-
-
-
- BOOK FOUR: End uh '90-1991
-
- Two weeks befo'e his bust, Lo'd Micro wuz introduced into de group.
- Unfo'tunately he wuz busted fo' hackin' FON cards off de 800/877-8000. Sho'
- nuff, he knowed he wuz gonna git busted but he dun didn't listen, o' care fo'
- dat matter. Word to ya motha'. Afta' hours (and hours, and hours) uh
- community service, LM lived t'joke about his o'deal bein' dat he IS some funny
- guy. Slap mah fro! Don't eva' get dis guy drunk.
-
- Fo' quite some long time now, MOD gots 'em sum jet to realize whut some bunch
- of idiot posers de LOD wuz (wid de 'sepshun uh a few). It plum goes t'show,
- ANYONE kin be some great gangsta' as long as enough sucka's dink so's too. Why
- boda' resparkin' interest in MOD? Why boda' keepin' de damn thang goin' when
- de new members ain't half as fresh as de o'iginals? ah' duzn't know, but ya'
- kin ax' Erik Bloodaxe who be de self-proclaimed "leader" at dis point in time.
- Word! Jeez, and ah' dought brin'in' back TAP wuz stupid.
-
- Anoda' posa' dat came out uh de woodwo'k be Skandle (STAN), who somehow decided
- he had powa' in DPAK (Supuh'nigger's group). Afta' hours of tryin' t'figure
- dis one out, we plum had t'conclude wuz plum anoder dumb Jersey hick. Oh
- sheeit.. so's much fo' dat.
-
- A new group, FORCE 1(ONE) Hackers led by Expose(which sounds fuckin gay if ya
- ax' me), decided t'declare war on MOD. Assisted by Hellrat, he says, dig dis:
- "You's guys (MOD) should stay out uh de hackin' buziness 'cuz none uh my fellas
- are 'fraid uh ya'. I'll snatch all uh ya' out mah'self. Word! " ...along wid
- some lot of oda' nonsense about 10-way billin' and oda' ca-ca he's read in one
- too many g-files.
-
- One thang dat's def be de addishun uh a lama' database online (on wingnet now
- MODNET). It's great when you be plannin' roll-ups and shit and it's some great
- o'ganiza' dat takes care uh all dat rummagin' drough sheets and shit. Hundreds
- uh losers fo' hours uh fun. Word!
-
- Durin' de fust week in February, MOD finally declared,"Dat's it. Word! It's
- official now. LOD declares war on MOD. Word! " Oh broder. Word to ya
- motha'...eenie-meenie-minie-moe. Word! I declare war on......YOU. Word!
- Nyah-nyah. Sheeit, it be now de second week uh February and da damn only thang
- dat gots 'em sum happened so's far in de "MOD-LOD War" be dat dere wuz about 5
- invalid login attempts on modnet. It seems dat "MOB" gots 'em sum decided
- t'join in de war. Word to ya motha'. What some fuckin' joke, dey are tied wid
- MCWS fo' lameness (which isn't hard t'do).
-
- De legacy uh de underground "clandestine" netwo'k continues and so's duz de
- war (and ridiculin') against all de self-proclaimed, so-called "elite".
-
-
- BOOK FIVE: Who are dey and where dun did dey jet from?
-
- Sheeit, it's time again fo' anoda' journul. It's now de
- middle uh summa' 1991. Lately we've heard some few fresh sto'ies
- out uh de mouds uh sucka's we duzn't even know. Dere gots'
- even been some few funny occurances in de past few weeks.
-
- 1) Dere are rumours dat Phiba' Optik wuz wuztin' his life
- away and not usin' his talents wisely. Slap mah fro!
- Sheeit, de trud of de matta' is, he gots 'em sum been some
- speaka' in many public debates and conferences on hackin' in
- general and computa' security. Slap mah fro! He be also wo'kin'
- as some programmuh/developuh' fo' some computa'
- firm in NYC. Also, he be wo'kin' closely wid de EFF (which
- recently gots' set up deir own systum fo' deir o'ganizashun).
-
- 2) COMSEC be fo'med. De *new* LOD (whose only member
- consists uh Erik Bloodaxe) goes into de computa' security
- binnis. Nodin' t'date be documuhnted on deir services and
- we gots' yet t'see whut de hell dey kin provide. Word! EBA fo'
- one be an o'iginal memba' and he knows close t'nodin'
- (except fo' de thangs dat he ax'ed Phiba' Optik t'tell
- him). Not t'muhntion dese guys are hardly co'po'ate and gots'
- NO 'espuh'ience in de binnis end uh computa' security; which
- 'esplains why dey gots caught misrepresentin' demselves as
- Landmark Graphics t'oda' well-established computa' security
- firms. Also, dey gots' bragged about narkin' on some few members
- uh MOD in deir jealous rage. Word! Dis we kin prove drough
- insiders.
-
- MOD wuz neva' a text stash "how-to" group. It wuz always based
- on some broderhood type deal and everydin' done be secretive
- and gots 'em sum some purpose behind it. LOD on de oda' hand, never
- made sense t'any uh us anymo'e. Word! It wuz fresh at fust, when
- all de o'iginal (knowledgable) members wuz active, but
- lately it's become t'be knode as some group uh guys wid
- real sparce telecom knowledge ridin' on some name dat once
- actually stood fo' sump'n.
-
- Even Phiba' Optik quesshuned wheda' LOD meant Legion uh Doom
- o' Lump uh Doo-doo (on Gyrotechnic's private fuckin'bbs). He stood
- firm against all de oda' members on de systum until finally
- dey wuz dumbfounded and speechless. Sheeit, de bo'd died.
- Now, PO and da damn rest uh de MOD bunch snatch t'dem likes a
- swatta' to fdiss. Give it up fellas.. it'll neva' wo'k.
-
- 3) Renegade Hacka' (a NYC local) dinks he's def. He gits
- raided, starts rapin', and when confronted by MOD, hides
- behind mommy. Slap mah fro! Den he says he hates MOD (which
- be funny since he wuz sweatin' MOD's nuts since da damn day he
- fust gots some modem; dose who wuz at da damn 2600 know whut
- ah' mean. 'S coo', bro..) De fact remains he be a real losa'
- out t'make some name fo' himself by tryin' t'inspire dose who
- gots' less contact wid de better gangsta's in de community.
- Slap mah fro!
-
- NASTY (his group) = BIG Joke. Word!
- (dey scribble files..de Nashunal Enquira' of de h/p wo'ld)
-
- *Rent-A-Gay Hacka' changed his fone c.. please note da damn new
- one in de database. Word! *
-
- 4) Lo'd Micro gits Xenix and creates whut gots'ta be modnet 2.
- (De Win' be de mina'strato' uh c1 in PA) Crazy Eddie
- plans t'put up some fuckin'bbs (open fo'um) in de 2600 Magazine
- fo'mat (likes OSUNY, Central Office, De Toll Center).
- NO illegal shit...plum deo'etical discusshun..whut real
- gangsta's are made of. Word!
-
- 5) Vinny (De Technician) be "outed". He be an admitted
- homosexual. I'm tellin' ya'.. watch out fo' dese SSWC
- guys..dey're some little funny, ya know?
-
- 6) Mind Rape, o' sump'n likes dat, uh NSA be a new pest.
- Gimme some break. When gots'ta dey eva' learn? Infiniti wuz
- anoda' one, but ah' guess he's kept quiet..which be fresh.
- Let's plum hope he duzn't ax' Mind Dweeb fo' help. Add
- Purple "no-show" Mustard (c0dez kid..see MOD/database fo' mo'e
- info) t'dis catago'y. Slap mah fro! Also, dere's anoda' guy usin'
- Acid's handle in 216. Wasn't home when we called twice. Word!
-
-
- Special danks t'Jack Hitt and Paul Tough uh Harpuh''s Magazine. Word!
- Great guys, fresh scribblers/edito's.. damn dat stuff wuz fun.
- 'S coo', bro.
-
- Hello t'State Police Offica' Donald Delaney. Slap mah fro! Not such
- some bad-ass guy, plum dat he IS some cop and he DID bust some uh us.
- But he also gots dose guys piratin' cellular service in Queens, which
- really wuz a majo' bust. Nice tie. Word!
-
- ===================
- = Anoda' MOD.duh =
- = file = "Mo'e eLiTenezz in one pinky
- = = dan 2 kans uh LOD. Word! "
- = All repdiss kin =
- = be sent to, =
- = dig dis: =
- = =
- = MOD@modnet.UUCP =
- ===================
- -> kill r0dentz. Word! . Word! . Word!
-
- MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 5 of 11
-
- *Elite* Access!
- A Tutorial On Being An Elite Hacker
-
- By Dead Lord and Lord Digital
-
- Lords Anonymous!
-
- September 25, 1986
- Revised May 2, 1988
- Revised Again August 20, 1991
-
-
- PROLOGUE
- ========
- For reporters, brain dead media types, or anyone else reading this who has been
- blessed with a room temperature IQ and faulty observational abilities; "Elite"
- as it's applied to the "underground" community, is a phrase that theoretically
- denotes the top 2-5% of the hacking and phreaking community and its rather
- peculiar hierarchy. Realistically it denotes the 2-5% that spend the greatest
- amount of time polishing up their image on boards instead of doing what they're
- presumably good at (hacking).
-
- This article is designed to allow you (yes YOU the junior G-man; would be
- Secret Service agent; publicity whore; over-eager journalist, or just bored
- modem owner and future potential ELITE) access to almost anything you might
- wish to call; in addition to providing you with the knowledge necessary to
- impress other ELITE's with your learned brilliance.
-
-
- CONTENT
- =======
- A tutorial for all the people too dense to figure out the quirks of human
- nature all by themselves, who also have some inane desire to have access to
- ELITE boards, containing ELITE information and ELITE users, along with ELITE
- wares, 42 seconds after they are cracked by ELITE crackers. Not to mention
- ELITE dial-ups to ELITE companies, which will work for approximately 15 minutes
- before some idiot logs in and does something to fuck them up.
-
- I'm writing it because I am bored of doing all this by myself, with only a
- handful of peers to accompany me. Not that I expect to gain "peers" from
- people that need help from this text file, but I imagine it'll give ELITE
- Sysops something else to do with their time. I also hope to save you 2-5 years
- of time. 2-5 years is the average lifespan of an ELITE person, before he gets
- a life and comes to the understanding that he just wasted 2-5 years.
-
- Please don't misunderstand me when I say 2-5 years, there are many people who
- have been ELITE for almost 10 years and are still going strong. I wouldn't
- want to step on any ego's, or ruin anyone's life work, now would I...
-
-
- BOARDS
- ======
- ELITE boards exist because the people who populate them, believe themselves to
- be superior to the people populating all the other boards. Most people don't
- agree with them, but they agree with each other. 100-200 people being
- sufficient to set up their own personal version of the world, they gather
- together on these ELITE boards and do ELITE things like post new wares, engage
- in "rag wars" and type things up out of manuals at each other.
-
-
- SYSOPS
- ======
- Seeing how you're trying to get access to an ELITE board, you should have a
- basic understand of who the Sysop is, and why he's running the board. This
- part is easy, in over 95% of all cases, the Sysop is a egotistical fool, who is
- willing to give up the use of his computer, or computers, in exchange for the
- privilege of playing GOD with the hopeless sots who log in.
-
- This is especially the case on all manner of ELITE boards that request a "real"
- telephone number, voice validation, and the donation of your first born male
- child for even higher access. All under the guise of "security." Requesting a
- "real" voice number, or even name, is nothing that unusual. Almost all
- "mainstream" non-Pirate and non-Phreak systems require it.
-
- Of course there is nothing stopping you from leaving them Anal Annie's phone
- sex service as your home number, and picking a random name. That will usually
- be the end of that. The only time the Sysop will ever check into your
- information will be if you happen to become a "rodent" and annoy him and/or the
- users of his BBS, in which case he'll engage you in a 20 letter conversation,
- each one giving a really sincere and heartening reason why you would feel so
- much better if you gave him your phone number, and why he just HAS to have it
- for reasons you wouldn't understand, because ALL Sysops MUST keep track of who
- uses their systems, don't ya know?
-
- This file won't cover "normal" Sysops, because if you aren't capable of
- bullshitting THEM, then you're hopeless and may as well find a new hobby. Like
- gardening is pretty exciting I hear, fer instance...
-
-
- "VOICE" NUMBERS
- ===============
- The truth is there is no reason on earth, why a Sysop should EVER need your
- voice number, or any information on you at all. Naturally he'll WANT it,
- because being the kind of person who runs a BBS in the first place, he's a nosy
- and prying kind of guy that want's to know everything about you. For reasons
- of "board security" of course.
-
- Let me tell you about board security; it doesn't exist! When a
- system is "secure" all that means is that the Sysop has lulled himself into a
- false sense of safety that bears little relation to the actual state of his
- board. But that's beside the point. The point being that you DON'T want to
- hear from the Sysop; EVER.
-
- One of the reasons they give for "needing" your voice number is
-
- "Well "Well if there's ever something wrong with the bbs, I need to
- be able to let you know, or ask you what commands you used if you
- were the last user before it crashed."
-
- Isn't that nice... How many Sysop's notify their users when their board goes
- down for repairs? NOT ONE. As for problems, well what do I care? The last
- thing I want is Melvin Sysop calling me up when I'm watching Miami Vice and
- trying to have a 5 hour conversation with me because he has nothing else to do
- with his time. Or better still, having my phone number embedded in his
- software when the Secret Service busts down his door because he carded 50 hard
- drives to his home address.
-
- I know many Sysops, some of them are even my friends. These are the kinds of
- things Sysops do with their userlists. Of course ALL of them will CLAIM that
- other Sysops might do that, but THEY never would, God no, not them!
-
-
- FAVORITE SYSOP USES FOR USERS' TELEPHONE NUMBERS
- ================================================
-
- I. When any "new ware" is released (and he happens to be a Pirate kind of
- guy), Sysops go through every name on the userlist, call them up and
- ask for the new ware. If you don't have the new ware, or just say you
- don't in the hopes that he will fuck off, he will then proceed to bug
- the hell out of you by asking for 50 other wares that he just has to
- have.
-
- II. If he's an ELITE PHREAK kinda guy and some national emergency takes
- place such as his favorite 800 dying on him; he does the same thing as
- the Pirate type Sysop and calls everyone on the userlist begging for
- 800's, "any cool info", and pw's to CIS.
-
- III. More so with Phreaks than Pirates, but somewhat true for all of them:
- The Sysop want's an update on some latest tidbit of hot gossip that he
- will just die if he doesn't find out. He will then try to have
- another 5 hour conversation with you about whatever drivel he called
- you up to discuss.
-
- IV. Some people trade baseball cards, some people trade comics, some
- people trade phone numbers. Sysops LOVE to trade phone numbers,
- especially those of "influential" users. I don't know why, they
- usually lack the balls to even call them beyond the customary dial,
- wait for some person's voice, then slam the phone down and go jerk off
- because all that excitement gave them a hard-on. This is very much to
- your benefit as I'll explain a little further down.
-
- V. And worst of all, there is the "lonely Sysop", the guy who will call
- you every "day" at 2 in the morning and try to have an engaging
- conversation about whatever happened in his "life" that day.
-
- There are many other things Sysops do with your number, but as far as I'm
- concerned, those were the worst. OK, I'm going on and on about why a Sysop has
- no need for your number, and how he'll annoy you to death if he ever gets it,
- so YOU know that now, but what do you do about it?
-
-
- GETTING VALIDATED
- =================
- There is no big trick to being validated. In almost every case, the Sysop
- asking for a voice number, is just his usual hoopla and he'll never bother to
- check out anything you give him that passes as "information." If you leave a
- reasonably intelligent copy of feedback, kiss his ass in a sublime kind of way,
- and in general explain to him why having you on his bbs will make his life much
- better than it is now; you'll be validated with normal access.
-
- Uploading new wares or files, posting messages, and drivel along those lines,
- will get your access raised. You can also bullshit for higher access, but I'm
- assuming YOU don't know how, which is why you're reading this file to begin
- with. BULLSHITTING is an artform and I have neither the time or patience to
- type up a file on it, so I'm doing this instead.
-
-
- EXAMPLE PIRATE BOARD FEEDBACK
- =============================
-
- Hello,
- I'm the Masked Avocado. I just
- got your bbs c, from an advertisement
- that was posted on Capital Connection.
- I liked what the message had to say,
- so I called to check your board out.
- I can contribute newsoftware,
- programming help, and anything that mi
- ght help to enhance your bbs.
- I also distribute for Coast to Coast
- and Digital Gang. My latest wares
- include: MultiScribe //gs 2.1.2.4
- HiggyBBS 6.2 Deluxe Paint Print
- Plus 2.1
- By the way, my first name is Melvin,
- I'm 13^H^H19, and my system is made
- up of an enhanced //e, 212 applecat,
- 3.5 drive and a bunch of
- peripherals. Thanks for your time,
- Melvin
-
- Let's examine that and highlight a few points.
-
- I. ALWAYS use decimal points when describing new wares. Copy ][+ has a
- revision every 2 weeks that does nothing except update the parm files.
- NEW WARES! have constant updates and "Pirates" are always on the
- lookout to increase the decimal point revision of their software.
- Even if it does NOTHING different EXCEPT change the decimal point.
-
- Aside from the fact that feedback is just bullshit to get you
- validated, you can very easily get a sector editor up and change a few
- decimal points yourself.
-
- II. ALWAYS say you got his BBS number from some established ELITE board,
- in the case of Pirates, Capital Connection is always a good bet. In
- reality it's quite a lame board, but other board Sysops seem to feel
- otherwise, and besides instantly impressing the Sysop of the board
- you're logging into (by being a member of CapCon), he will also get a
- kick out of it that some idiot posted his board on the CapCon "BBS
- Ads" section.
-
- [Please note that "Capital Connection" was valid at this file's original incept
- date. The average Pirate board having a lifespan of 6 months at best; Capital
- Connection no longer exists. The current Elite Pirate board of the next 6
- months, is "Trade Center."]
-
- III. Among your list of "new wares" you can always list some BBS program,
- because every week some dork writes a new program, that is lousy,
- never works right, and if ever faced with "put up or shut up" you can
- change around any one of 50 different BBS programs, and upload it as
- the NEW WARE!
-
- [Same with software as with boards -- it doesn't stay new very long. I can't
- help you here because I haven't the slightest idea what's new in Apple
- software. However, all you need to do is invest 3 bucks in the latest issue
- of whatever magazine pertains to your particular computer, and list off some
- of the software you see advertised.]
-
- IV. Always say you distribute for some random collection of new wares
- groups. Nobody can prove that you don't (logging into one cat-fur and
- uploading the wares you found on it, to another cat-fur, is
- distributing) and it will make the Sysop think that you'll be
- uploading 20 sided GS wares to his board every day.
-
- [As you may have guessed, new wares groups also come and go. Digital Gang
- still exists, as do a slew of new groups; if you don't know of any, a safe bet
- is making up a name and saying that you're based somewhere in Europe. Europe
- being the fabled birthplace of all the best new Atari and Amiga software in
- particular.]
-
- V. Always list "your" first name and age. Make up an age that is over 16
- so they won't discriminate against you. If you're under 16 and admit
- it in your feedback, you'll be instantly labeled an idiot.
-
- VI. Always list some of your hardware. Don't ask me why, it's just
- another item in the agenda of things that Sysops like to pry into. If
- you give them this information without them asking for it, it makes
- them feel better.
-
- VII. Always end the message with a "thanks for your time." Remember, he's
- an egotistical fool, and that one line makes him think you respect
- him, want to do things for him, and would be genuinely happy to be a
- member of his AWESOME board.
-
- VIII. ALWAYS sign it with "your" first name, this keeps the tone informal,
- and makes you seem like a less threatening type of guy.
-
-
- GENERAL TIPS
- ============
- Remember that many Pirate boards have a "VOTE ON NEW USERS" feature, so
- don't say anything that you wouldn't want the entire world to read. If you
- follow those basic guidelines, you'll ALWAYS get validated if the rest of your
- information is right. The rest being your phone number if the Sysop actually
- calls new users.
-
- Some of you are saying to yourselves: Yeah, but if you just listed all of this,
- won't Sysops be on the lookout for this kind of feedback? Yeah, but then who
- are they going to validate? "Obvious" rodents? No, if they want new users
- then they'll be more than happy to accept you.
-
-
- EXAMPLE PHREAK BOARD FEEDBACK
- =============================
-
- Greetings,
- I'm Tesla Coil of The Crossbar Rapists (TC of TCR). I was told by a
- user of Metal Shop Private (MSP), that your bbs was worth looking into. I've
- been published in TAP, 2600, and Uncle Mel's Phone Times. My handle was listed
- in issue 12 of Security Systems of Greater Podunk (SSoGP) as a "Computer genius
- breaks into Podunk's Private Database!" I've been hacking since 1981, I was a
- member of Sherwood Forest, Securityland, The AT&T Phone Center, OSUNY, OSUNY
- when it went back up, WOPR, LOD the BBS, Cryton, COSMOS, Metal Shop Private,
- and OSUNY when it came back for yet another go at it. I had to change my
- handle for reasons of security when I was taken out by the feds in the 1983 414
- busts.
-
- I'm an expert with Unix, RSTS, Primos, and HiggyOS. I can program in C,
- D, E, and F, Fortran 77 and 78, Basic for the Cyber, IBM, MAC, Amiga, ST, and
- Apple II. I also know assembly for the 6502, 8088, 68020, Z-80a, and TIMEX. I
- have an Apple //e, IBM AT, Mac+, and Kim-A1.
-
- After entering college last year, my time was seriously limited. But
- after getting some additional free time, I've decided to restart my hobby of
- hacking and exploring the phone system. My current interest centers around the
- understanding of the myriad functions associated with CLID.
-
- People who can recommend me include (Pick 4 or 5 names of people who
- aren't really ELITE, but not unknown to current ELITE Sysops either). If you
- can't think of them, pick up any issue of PHRACK and take a few out of there.
- The reason you want "not really ELITE" people, is because they won't command
- too much attention. You DON'T WANT excess attention, saying that some dork who
- writes for Phrack recommends you, is less noticeable than saying some "real"
- ELITE recommends you. Why say ANYONE recommends you, if it's so much trouble?
- Because it somehow flips a switch in the Sysop's mind, which makes him think
- that you must be an OK dude, if so and so recommends you. Nine out of ten
- times he won't check. The one time he does check, the person he's bothering
- will usually say "yeah yeah, go away I'm doing something" and that'll be the
- end of it).
-
- [Please note that by "real elite" I don't mean anyone who is better, rather I
- mean someone who has spent tremendous amounts of time generating exposure for
- his handle.]
-
- Thanks for you time, Tesla Coil/The Crossbar Rapists
-
- Let's examine this one too.
-
- I. As you can see we've switched from 40 columns, to 80 columns complete
- with some form of spacing. We've also gotten a little bit more-let's
- say-"readable" than in our previous Pirate feedback example. This is
- because we're calling a different kind of system, with a different
- program than cat-fur ENHANCED 1.1!
-
- II. With Phreak Sysops you don't want to get too informal, because most of
- them are busy playing SECRET AGENT MAN and if you do something normal
- like sign off with "your" first name, he'll think you're not being
- "professional." How it is in his mind that he equates "professional"
- with calling his board: I don't know, but trust me on this point.
-
- III. In the same vein of "professionalism", you're expected to list off
- your "accomplishments". Oddly enough, in Phreak/Hacker HIERARCHY,
- getting arrested numerous times is considered ELITE by many of it's
- peoples. Why this is, I don't know either. Personally, it says to me
- that the person who got arrested has the brains of an African bushman,
- but apparently, that's just my lone opinion. Anyhow, in line with
- this PROFESSIONAL attitude you are expected to list your life's
- accomplishments in the space of 50-100 lines, in a form that will make
- you sound like the best Hacker in the world, who is so good, that
- logically he wouldn't be caught dead calling the ELITE board you're
- calling, but once again skipping the logic and getting back to the
- Sysops expectations...
-
- IV. OK continuing with the thought we started... list off a bunch of
- languages, knowing them is optional, because the Sysop doesn't know
- them either. Reading the dust jacket and index on a book covering
- any of those subjects will enable you to APPEAR to know what you're
- doing, which is all that the Sysop is doing, so don't worry about it,
- because he doesn't know vi from cd, and couldn't INFILTRATE a Unix if
- he had the root account. If you don't want to spend $5000 stocking up
- on ELITE TECHNICAL MANUALS, go down to the library and xerox a bunch
- of index's. Or better yet, just check out the books and never return
- them (if your library lets you check out reference manuals. Most
- don't, but you can always rip out that little magnetic sensor in the
- card on the book and walk out with it anyway, but I digress...).
-
- V. After you've done that, list a bunch of micro-specific assembly
- languages that you "know," and in general just make up things until
- you've filled up around 2 paragraphs or so. 95% of ELITE
- PHREAKING/HACKING is just posing anyway, so don't feel guilty about it
- or let it worry you too much because that's the same way 9/10th of the
- board got access. Unless they were ELITE, which is just posing to a
- higher degree than most bother to go with.
-
- VI. Remember to say WHERE YOU GOT THE NUMBER FROM! This is because like I
- said before, most Phreaks are busy playing SECRET AGENT MAN and will
- get an ulcer and lay awake at night thinking that CABLE PAIR is
- infiltrating their board. You know it isn't true, but the Sysop will
- wet his pants anyway, so just put his mind at rest and make up some
- place where you got the number from. Metal Shop is always a safe bet,
- because it's the Phreak dumping ground of ELITENESS, much like CapCon
- is the Pirate's equivalent. Be sure to use vague terms like "I was
- told by a user of..." and things of that nature that can't be readily
- verified, but still sound plausible.
-
- [Ahem, sorry to interrupt again, but as you may have guessed, MSP is down at
- this time. MSP's new replacement is the Legion of Doom base BBS that goes by
- the name of "Digital Logic." A large percentage of the users there are under
- phony handles that gained entry by exactly the type of bullshitting I'm
- writing about in this article. The remaining phony accounts got access by
- threatening the Sysop with "Phreak retaliation" and having him cave into
- demands; which for a LOD board is about par for course.]
-
- VII. Next make up your "writing credits" and "media credits". Select a few
- random issues of random magazines that you either wrote for, or had
- your alias' mentioned in. Make sure they're of the small circulation
- type and the issue is at least 2 years old. Nobody will ever check or
- even have a way of checking if they wanted to. Most people who
- "wrote" things just rephrased tech manuals and copied the
- illustrations. If you're ever pressured to come up with something YOU
- wrote, just do the same thing because that's what all the other ELITES
- are busy doing. Be sure to run it through a spelling checker
- so it looks PROFESSIONAL as ELITE PHREAKS are fond of looking and
- thinking of themselves.
-
- VIII. Next list off a bunch of ELITE BOARDS you've been a member of.
- Listing those that I just listed are a safe bet, because they're
- famous or as the case may be infamous, to such a degree that the Sysop
- will have heard of them. He wouldn't have been on them, so he won't
- be able to verify that either. The reason he wouldn't have been on
- them, is because he hasn't been ELITE longer than 2 years, otherwise
- he wouldn't be running a board. If he HAS been ELITE for
- longer than two years, and IS still running a board, then he's an
- idiot and you can safely assume that he wouldn't have been on them
- anyway. Not that being an idiot disqualifies anyone from being a
- member of anything, but APPEARING to be an idiot will do that. COSMOS
- is ALWAYS a great bet, because it just sounds so PHONESY! Plus there
- have been half a dozen COSMOS' in the last year alone, so he won't
- know which one, even if none of them have ever been FAMOUS!
-
- IX. If you're such a swell guy, and have been around so long, he might
- wonder what you've been doing with yourself for the last 6 months. SO
- So just make up some half-witted excuse like the one I listed. Then
- include something about your current "interests." All you need to
- remember about that is include "CLID" (Calling Line ID), "BLV" (Busy
- Line Verify), or any other semi-interesting acronym out of a USO
- coding manual. Obviously you don't need to know anything about it
- beyond the fact that such an acronym actually exists and you know
- about its existence. If questioned further, just bring down the
- "veil of secrecy" and become mysterious and evasive about it. This
- will instantly go great lengths towards improving your status on a
- board.
-
- X. References have been covered in the parenthesis in the feedback
- itself, so I hope I don't need to get into it again here.
-
- XI. ELITE Phreak/Hacker boards also expect "freebies" from you the
- potential user, to the Sysop. Both as a "test" of your "skill" and as
- a kind of ass kissing. Freebies can include COSMOS PW'S! which are
- easy, because there are like 10 of them which people have been listing
- for the last 5 years, which haven't worked for 4 1/2 years, but people
- still list them. Which makes me conclude that people never use them,
- they just write them down and repost them every 6 months. Or CIS
- accounts, or some good 800's or anything of "value". You don't really
- need to include any of this, but if you can it makes you look better.
- NEVER, EVER give the Sysop ANYTHING of any value that you might want
- to use in the future, because if it's of any worth he will immediately
- do something stupid to make it stop working. That you can COUNT ON!
-
- XII. Close it up with the usual "Thanks for your time", but sign it with
- your full handle, followed by group. PROFESSIONAL! [Giggle]
- <STOP THAT! I'M SERIOUS NOW!> <slap>
-
-
- GENERAL TIPS
- ============
- Ok, now that I've got you psyched at how easy it is, here is the bad news. The
- bad news is like this: In order to be an ELITE Pirate, you don't have to know
- ANYTHING, PERIOD, AT ALL, EVER. All you need to be able to do is operate your
- copy of cat-fur with reasonable dexterity and spend 2-5 hours of each day
- calling things and uploading NEW WARES. If you can program, so much the better
- because then it's easier to join the ELITEST ELITE of piracy (the Crackers).
- Now I know you're thinking it's stupid to have ELITE people who aren't good at
- anything, but I never claimed the world was a sensible place.
-
- With PHREAKING (let me just say that when I say PHREAKING I also mean to
- include HACKING) you are expected to APPEAR to know how things work. Now that
- is a little tricky. It's tricky because ELITE boards like to have FILTERS. A
- kind of "front door/quiz" combination. The trouble with that is, that the
- Sysop doesn't really know what he's doing either and will take the questions
- out of an ELITE FILE. The problem is that the ELITE FILE might not have been
- accurate, so even if you know the answer, you might not know the answer that
- the Sysop is expecting, and as far as the Sysop is concerned is the "RIGHT"
- answer. This means that you had better stop laughing at those stupid files and
- deleting them, because if you want to get access someplace, you might need them
- for something besides "God, is he stupid!" jokes!
-
-
- HOME PHONE NUMBERS AND HOW TO DEFEAT THEM
- =========================================
- Ok, so now you know how to get validated, what to say and how to act. Let me
- get you past the last and only "real" hurdle to access to everything you
- desire.
-
- Voice validation is a load of crap. It doesn't work, it never has worked and
- it never will work. But it sure makes Sysops feel good, and being the
- egotistical fools that they are, they're going to make you go through this
- bullshit to get access.
-
- I would NOT suggest leaving an infinite busy as your home number. This works
- on legitimate boards, but I don't know any underground board Sysops that are
- THAT stupid.
-
-
- METHOD 1
- ========
- Leave a telephone number of a random person from your "computer buddy" phone
- list. When the Sysop calls, he'll get a human voice that will say HELLO in a
- annoyed kind of tone. Confirming the existence of a human being at the other
- end of the telephone number you just gave him, the Sysop will assume no reason
- to doubt you, and slam down the phone because he's not good at starting
- conversations with people he's never talked to before.
-
-
- METHOD 2
- ========
- Find a kid at school who you're friends with. Explain the general idea of
- "boards" to him, tell him you need his help in breaking into some secret FBI
- computer system. All he has to do is say "yes" to the questions you're going
- to write down for him, and claim to be the person on the piece of paper you're
- giving him.
-
- This is really almost ideal if your friend isn't the stupid type that stutters
- and can't lie. If he can lie and doesn't care, then you're all set or the rest
- of your modem existence!
-
-
- METHOD 3
- ========
- Your other option is to leave the kid the number to a voice mailbox on which
- you've put a suitably ELITE sounding outgoing message. Note: the current craze
- among the lower orders of the would-be elite is "Voice mail hacking!@!" It's
- not too hard for anyone familiar with the intricacies of dialing touch tone to
- in-fil-trate! a VMB system. And the recent media attention drawn to this
- oh sooo destructive form of hacking has made it still more exciting. However
- what does this have to do with you? Using a box which you've hacking out is a
- really dumb idea, especially when you can get one in any major city for $10 to
- $15 a month. Never pay for the box in your real name, as you will be giving
- this number to sysops whose BBS software will very likely end up in the hands
- of law enforcement someday and you don't want end up in John Maxfield's
- mega-huge list of hackers.
-
-
- YOUR NEW PERSONA -- HOLDING IT TOGETHER AND MAKING IT WORK
- ==========================================================
- This is really basic. It's so basic that almost nobody I know ever bothers to
- sketch in the details and can be tripped up when you ask an offhanded question
- that in theory has no significance, but in actuality causes him to say "uh,
- well" and pause for a few seconds while he tries to think of something. Only
- very good bullshit artists can glibly pull it off when you "catch them off
- guard" but even then they will frequently forget what they told you in the past
- if you bring it up again a few days later.
-
- What I'm talking about is the "new you" complete with name, address, telephone
- number, state, zip code, street number, general weather of the area, brothers,
- sisters, physical description, social security number, job, marital status,
- birthday, age, education, "underground" history, etc... In short, you are
- creating an entire new person who should have a real life entirely separate
- from your own. In order to pull this off you need to think of all these things
- before-hand, and if you're new at this, don't get carried away by pretending to
- be 20 people all at once. Just make up ONE concrete personality whose
- existence you can justify, and then type it up, print it out, and tape it to
- the wall in front of you so it's ALWAYS there, because the time when you least
- expect it, is the time you're going to need it the most.
-
- As you get better you'll find you can juggle an almost infinite number of these
- alter-ego's in your head, but don't get over-confident too fast or you WILL
- blow something that you're working hard at right now.
-
-
- IMPERSONATING OTHER PEOPLE
- ==========================
- Every year the "underground" community mirrors the legitimate modem world and
- gets exponentially larger. Instead of everybody knowing everyone else, there
- is now a huge collection of people who don't know anything about anyone who
- existed 5 years ago; last year; or even last month. This works greatly to your
- advantage because it saves you the effort of slapping together your own files.
- All you need to do is log some handle into the system you wish to access;
- upload a few files written by the person or persons you are about to
- impersonate; wait a few days; now login the person whose identity you wish to
- assume. Quite simple.
-
- In the past few months I have actually passed myself off as BIOC Agent 003,
- Lord Digital, Lex Luthor and assorted past and present members of LOD, Apple
- Bandit and various other Apple Pirates of lore, and several dozen other people.
- Two years ago I could never have gotten away with this unless I was calling
- some board in the middle of nowhere. Nowadays it's possible, even easy, to
- impersonate almost anyone who has ever made some kind of mark on the history of
- the underground in the past; simply because the people you're going to be
- dealing with were NOT around a few years ago and have no idea who any of these
- people are. When confronted with a "famous" user, they will never in their
- wildest dreams assume that he's a fake; the only thing they will be thinking is
- how neat it is to have him on their BBS once you let them know who he is.
-
- You can easily make up a new character who never existed outside of your
- profile of him, but this requires more work on your part when it's much
- simpler to just pretend being someone else. NONE of those people will EVER
- turn up on that particular board, and even if they did you should be able to
- convince the Sysop that YOU are him and he is the fake. Amusing to say the
- least.
-
- In case you're letting some last vestiges of morality creep in, remember that
- the people you're going to be impersonating are not hallowed icons. They are
- just guys who spent an inordinate amount of time building up their image to
- such a degree that countless little kids think they're cool and a few misguided
- -- and blessedly free of intellect -- security people, think they're dangerous.
- Not to forget the fact that aside from LODdies, none of them will ever be seen
- on a board again, so if you fear "Phreak retaliation;" don't worry about it.
- Nobody can do anything to you if they don't know who you are.
-
- The previous paragraph exists solely to galvanize otherwise recaltricent and
- cowardly pre-teens into taking some kind of action and having fun.
-
-
- SAFETY - GETTING BUSTED!
- ========================
- People who get caught for doing something they shouldn't have been doing, are
- apprehended for one of two reasons: They are either cretins, which covers the
- vast majority of those "busted," or they are not good judges of character and
- spend their time associating with "friends" who do stupid things, and will drag
- you down with them when they really fuck up. Which WILL happen at some point
- to most of the people who convince themselves "it's just fun."
-
- The "underground" IS fun, but looking at it from the eyes of those whose job it
- is to keep track of you, it stops being fun and you should realize that many of
- the things you take for granted -- be they free calls, free software, whatever,
- -- are against the law. And if you give people the opportunity to hurt you --
- ESPECIALLY when they are placed in such a position that by busting you they
- increase their own status in whatever field they are employed in -- then you
- are going to get hurt!
-
- Many of you hate all the "narcs" and "sting boards" and whatever new bullshit
- the people arrayed against you come up with. You SHOULDN'T! Cable Pair and
- the rest are nothing more than the underground's personal garbage collection
- agency. Rather then thinking of them as people who are some kind of hindrance
- to you, it's far more logical to think of them as glorified trash collectors;
- which is about all they are. Every so often some new sting is exposed, and the
- underground is rid of a board full of annoying kids that were stupid enough to
- login someplace with real names, numbers, and addresses. Are you really going
- to miss this kind of genius?
-
- If you ALWAYS use the methods outlined in this article, then your chances of
- getting caught for anything will dramatically decrease. Who are they going to
- find when every single piece of information you gave them is a lie. None of
- your modem friends can take you down with them, if they don't know who you are.
- It's as simple as that.
-
- Naturally this is more difficult than it sounds due to the fact that many of
- you will want to make friends with people, and that's hard to do when
- everything the other person knows about you is a lie. At this point you just
- have to use your best judgement concerning your further actions. Personally I
- find it best to associate with a small group of friends who really are
- "friends" not just "computer buddies." Because if you pick your
- friends well they will never fuck you over. Meanwhile when some kid you know
- only over the phone, who lives in another state, gets caught... He is going
- to be more than happy to throw them anyone and anything he can think of just
- to get off himself and that will include YOU. The "Hacker ethic" is a nice
- joke that I personally DO NOT subscribe to, and even those that pay lip service
- to such a concept, will throw their ideals away pretty fast when it's their
- neck on the line instead of some hallowed principle thought up by aging
- hippies.
-
- THE COMPUTER UNDERGROUND PAST AND PRESENT!
- ==========================================
- At the time of this revision and final public release (Summer of 1991) the
- modem world is nothing like it was five or ten years ago when all of this
- nonsense began. The thousand hackers of 1981 had become ten thousand by 1986
- and now it's reached the point where the EFF and CuD are throwing all of this
- back and forth over the InterNet and so rather than the "local l0serz"
- idolizing Lex Luthor, academics all over the country are analyzing the legal
- implications of Phiber Optik and Acid Phreak's case. Well, so be it. It's
- much too late in modem time to start any sort of "elite dynasty" which even a
- moron like Lex Luthor could put together in 1984.
-
- You can't start the "Modem Wizards -- the new LOD!" but you can always latch on
- to legend and write yourself into the past. If you have any doubts about this
- read the History of Communist Party of the Soviet Union from about 1923 until
- 1956, when each years names kept being added and taken out and things were
- changed around the suit political realities and nobody said a thing. This is a
- far-fetched reference, but the theory is the same.
-
- The Legion of Doom started out a bunch of nobodies and ended up notorious
- enough that the Secret Service and BellCore kept laying awake at night
- wondering when LOD is going to take down all the STPs in the network. Which of
- course will never happen but it's much easier on the intestines of a Secret
- Service agent or DA to get media attention by rounding up "a deadly
- technologically menacing teenager!" than to bust the mafia or some inner-city
- drug ring who may just put them and their families through a trash compacter.
- What would you do?
-
-
- THE END
- =======
- What more can I say? I hope you have a good time if this is the way in which
- you choose to waste your time. And a great big "I love you" to the media dudes
- who actually called up 2600 magazine asking about "Marbles BBS." Where would
- we be without you? You guys are just so funny!
-
- Have a nice day and a really, really nice life!
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 6 of 11
-
- -----*****)))))21(((((*****-----
- D S
- + +
- E The Legion of Doom E
- + +
- M and E
- + +
- O The Occult D
- + +
- N !
- -----*****)))))21(((((*****-----
-
-
- From its explosive beginnings in the summer of 1984 to the present day,
- the group known as "The Legion of Doom" has been enshrouded in secrecy. Now
- that our numbers have been corrupted, and the hope of once regaining the
- immense power we wielded over the years has faded, we offer to the last
- remaining fragments of the underground from which we arose the secret knowledge
- that kept our members at the apex of knowledge and beyond the grasp of security
- officials.
-
- It is our hope that through wide circulation of this material that perhaps
- some future enthusiasts will seek the truth from within, and gain the knowledge
- and wisdom necessary to endure the trauma of illumination.
-
-
- HISTORY
-
- Initially, the idea of combining modern technology with ancient wisdom was
- formulated as a type of joke. One particular system was proving extremely
- difficult to penetrate. One member remarked rather off-handedly, "Why not ask
- the Ouija board for passwords?" This was laughed about for several minutes but
- ultimately it was decided that it should be tried. Two members set up the
- board and began concentrating on the computer system in question. After
- several minutes an entity was contacted. When asked what the root password was
- on the UNIX system we had discovered, it answered "rambo". "Rambo" was the
- password.
-
- Several more trials were done, and more than two thirds of them ended with
- positive results. It was decided at this time that there should be an inner
- order to the Legion of Doom for those members who shared an interest in
- learning more about the occult and its uses in a hacking forum. At that time
- it was decided that there would be seven members admitted. From that time
- forth, there have always been seven members. The circle will be broken upon
- the incarceration of our initiates in the coming new year, and our control
- over the planes will be lost.
-
- What follows are several steps to increasing one's knowledge of the occult and
- use of this information in a computer setting.
-
-
- OUIJA
-
- In our experience we have found that it is best to attempt this type of
- communication with two persons. It is extremely important that one not attempt
- to contact an entity using the Ouija alone. When there is only one psyche
- involved, the spirit can fixate on it with great ease and the chances for
- possession or extreme mental duress is quite high.
-
- Sit facing a partner with the Ouija touching each lap. Each person should keep
- one hand on the planchet and the other on the computer keyboard. While
- concentrating on contact, make the necessary steps to connect to the system
- desired to ask about. Once connection has been established with the host
- system, begin asking the surroundings, "Is there anything that wishes to talk
- with us?" One may have to concentrate and repeat the question for several
- minutes. When an entity moves onto the board one may feel a slight tingling in
- one's fingertips as the planchet moves around the board. Once is has been
- asserted that there is a strong presence on the board, ask of it any question
- desired.
-
- *** The above is a simple enough method and can (and should) be tried by all.
- What follows is more complex and should not be attempted with any degree
- of levity.
-
-
- STEPS TO ENSURE SUCCESS WHILE HACKING
-
- To enjoy a great deal of success while hacking the following steps
- must be taken.
-
- 1.. Always hack in the same room, at the same time of day.
-
- 2. Always purify mind and body before hacking. This would include a ritual
- bath and sexual abstinence and fasting for at least 12 hours prior to any
- attempt. One may wish to design a Tau robe to wear during attempts, or in
- any case a set of clothing specifically for hacking attempts that would
- symbolize such a garment.
-
- 3. Perform the Lesser Banishing Ritual of the Pentagram (See below).
-
- 4. Perform the Rose Cross Ritual (See below).
-
- 5. Perform a candle burning to attract good luck.
-
- By following these steps one will experience success and fulfillment greater
- than imagined possible.
-
- LBRP
-
- 1. Touch forehead, and say deeply "Ah-Tah".
- 2. Point down, hand over abdomen, say deeply "Mahl-Koot".
- 3. Touch right shoulder, say deeply "Vih-G'boo-Rah".
- 4. Touch left shoulder, say deeply "Vih-G'doo-Lah".
- 5. Fold hands at chest, say deeply "Lih-Oh-Lahm, Ah-Men".
- 6. Face East, Draw a pentagram in the air, point to its center,
- say deeply "Yud-Heh-Vavh-Heh".
- 7. Turn South, keeping line from first pentagram, draw new
- pentagram, point to its center, say deeply "Ah-Doh-Nye".
- 8. Turn West, repeat as above, but say deeply "Eh-Heh-Yeh".
- 9. Turn North, repeat as above, but say deeply "Ah-Glah".
- 10. Turn East, carrying line to complete circle.
- 11. Hands out, say "Before me Rah-Fay-El, Behind me Gabh-Ray-El,
- On my right hand Mih-Chai-El, And on my left hand Ohr-Ree-El.
- For about me flames the pentagram, and within me shines the
- six rayed star.
- 12. Repeat steps 1-5.
-
- For those concerned, the translations of the above are as follows:
-
- Ah-Tah: Thine
- Mahl-Koot: Kingdom
- Vih-G'Boo-Rah: and the power
- Vih-G'Doo-Lah: and the glory
- Lih-Oh-Lahm: forever
- Ah-Men: Lord, Faithful King (AMEN=acronym)
-
- Yud-Heh-Vavh-Heh: The Holy Tetragrammaton
- Ah-Doh-Nye: My Lord
- Eh-Heh-Yeh: I shall be
- Ah-Glah: Thou art great forever, my Lord (AGLA=acronym)
-
- Rah-Fay-El (
- Gahb-Ray-El Names of Arch-angles
- Mih-Chai-El (
- Ohr-Ree-El (
-
- When the steps read "say deeply" one should try to resonate the words, from the
- diaphragm, so that the body actually feels the words.
-
-
- ROSE CROSS RITUAL
-
- 1. Light a stick of incense.
- 2. In the SE corner of the room, looking away from the center, draw a large
- cross in the air with incense, and intersect its sides with a circle (like
- a Celtic cross, or crosshairs in a gun sight), point the tip of the incense
- to the center of the cross and say deeply "Yeh-Hah-Shu-Ah".
- 3. Move to the SW corner of the room, keeping the line from the first cross,
- repeat as above.
- 4. Move to the NW, repeat as above.
- 5. Move to the NE, repeat as above.
- 6. Move to the SE to complete the circle.
- 7. Face NW, incense pointed up, walk to the center of the room, continuing the
- line, make the rose cross above the center of the room, speak the name,
- then continue moving NW, connect the line to the center of the cross in the
- NW.
- 8. Move back to the SE, incense pointed down, stop in the center and draw the
- rose cross in the center of the room on the ground, speak the name, then
- continue on SE, connecting the line to the center of the cross in the SE.
- 9. Point to the center of the SE cross and speak the name.
- 10. Walk to the SW corner.
- 11. With the incense pointed upwards, walk to the NE, at the center of the room
- stop and speak the name, then continue on to the NE, once at the NE, face
- the SW and walk back to the SW, incense pointed down, at the center of the
- room speak the name, and continue on to the SW.
- 12. Point to the center of the SW cross and move clockwise to each corner,
- again connecting the centers of each cross.
- 13. Once back at the SW corner, remake the cross as large as possible and speak
- the name "Yeh-Hah-Shu-Ah" while forming the bottom of the circle, and speak
- the name "Yeh-Hoh-Vah-Shuh" when forming the top half of the circle.
- 14. Go to the center of the area, face east, and think of the six rose crosses
- surrounding the room. Think of them as gold, with red circles, and the
- lines connecting them as gleaming white.
-
-
- CANDLE BURNING RITUAL
-
- 1. Obtain a green candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "JIHEJE" on the candle.
- 5. Light the candle.
- 6. Read aloud the fourth Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
- 9. Repeat 6 through 8 two more times.
-
-
- THE GEMATRIA OF TELEPHONE NUMBERS
-
- Some in our order have found insight by reflecting on the various meanings that
- can be derived from the numerical values of telephone numbers using the
- Cabalistic method of numerology.
-
- Those that use this method have focused on one particular method of number
- determination:
-
- Example: 800-555-1212
-
- 800 = 400 + 300 + 100
-
- 555 = 400 + 100 + 50 + 5
-
- 121 = 100 + 20 + 1
-
- 2 = 2
-
- One can also obtain other numbers for contemplation by the following method:
-
- 800-555-1212 = 8 + 0 + 0 + 5 + 5 + 5 + 1 + 2 + 1 + 2
- = 29
- = 2 + 9
- = 11
- = 1 + 1
- = 2
- All of the above values are related. A total contemplation of the meanings of
- all values will lead to a more complete understanding of the true meanings.
-
- These numbers each correspond to a particular Hebrew letter and word, as well
- as a card in the Major Arcana of the Tarot.
-
- The following is a table to be used for the above.
-
- 1 Aleph Ox 0-The Fool
- 2 Beth House I-The Magician
- 3 Gimel Camel II-The High Priestess
- 4 Daleth Door III-The Empress
- 5 Heh Window IV-The Emperor
- 6 Vav Nail V-The Hierophant
- 7 Zayin Sword VI-The Lovers
- 8 Cheth Fence VII-The Chariot
- 9 Teth Serpent VIII-Strength
- 10 Yod Finger IX-The Hermit
- 20 Caph Palm of hand X-The Wheel of Fortune
- 30 Lamed Whip XI-Justice
- 40 Mem Water XII-The Hanged Man
- 50 Nun Fish XIII-Death
- 60 Samech Arrow XIV-Temperance
- 70 Ayun Eye XV-The Devil
- 80 Peh Mouth XVI-The Tower
- 90 Tzaddi Hook XVII-The Star
- 100 Qoph Back of head XVIII-The Moon
- 200 Resh Head XIX-The Sun
- 300 Shin Tooth XX-Judgement
- 400 Tau Cross XXI-The World
-
-
- One may wish to further research numbers by taking particular groupings and
- cross referencing them in the "Sepher Sephiroth" which can be found in "The
- Qabalah of Alister Crowley."
-
-
- OTHER CANDLE BURNING RITUALS
-
- Should one come into conflict with authorities for any reason, any or all of
- the following will prove useful.
-
- To gain favor with authorities
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "JASCHAJAH" on the candle.
- 5. Light the candle.
- 6. Read aloud the fifth Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- To obtain favors from important people
-
- 1. Obtain a green candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "PELE" on the candle.
- 5. Light the candle.
- 6. Read aloud the thirty-fourth Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- For favor in court cases
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "JAH" on the candle.
- 5. Light the candle.
- 6. Read aloud the 35th and 36th Psalms..
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- To regain credibility after being defamed by enemies
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "ZAWA" on the candle.
- 5. Light the candle.
- 6. Read aloud the 41st, 42nd, and 43rd Psalms.
- 7. Pray for the desired outcome after reading each Psalm.
- 8. Concentrate on the desired outcome.
- 9. Repeat 6 through 8 two more times.
- 10. Repeat for three days
-
-
- To help release one from imprisonment
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "IHVH" on the candle.
- 5. Light the candle.
- 6. Read aloud the 71st Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- For help in court cases
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "IHVH" on the candle.
- 5. Light the candle.
- 6. Read aloud the 93rd Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- To gain favor in court cases
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "LAMED" on the candle.
- 5. Light the candle.
- 6. Read aloud the 119th Psalm, verses 89-96.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- To gain favor in court
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "IHVH" on the candle.
- 5. Light the candle.
- 6. Read aloud the 120th Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
-
- To gain favor when approaching a person of authority
-
- 1. Obtain a purple candle
- 2. Anoint the top of the candle with olive oil and rub it downward to the
- middle of the candle.
- 3. Anoint the bottom of the candle with the oil and rub it upwards to the
- center.
- 4. Carve the letters "IHVH" on the candle.
- 5. Light the candle.
- 6. Read aloud the 122nd Psalm.
- 7. Pray for the desired outcome.
- 8. Concentrate on the desired outcome.
-
- *** Each candle can only be used for one particular purpose.
- One must prepare a new candle for each ritual.
-
-
- ASTRAL CONFERENCING
-
- Some of our number after having found it quite difficult to contact other
- members took a new approach to astral projection. Astral conferencing became
- the spiritual counterpart to AT&T's Alliance Teleconference. Members would
- arrange to meet at a given time and would relay any necessary information
- during these sessions. This type of communication was made the standard due to
- its legality, its speed, and the impossibility of interception by federal
- authorities.
-
- To attempt this type of psychic travel, it is advised that the seeker look
- elsewhere for instruction on building his or her own psychic powers, and slowly
- moving upwards to the complexities of travel on the Astral Plane. One must
- learn to stand before learning how to run.
-
-
- WARNINGS ABOUT ABUSES OF POWER
-
- Some members have taken their interests to the extreme. There was talk some
- years ago about blood offerings to obtain knowledge in dealing with the TRW
- credit system. This was a complete failure which was done with out knowledge
- by others in the order. It is written in Isaiah:
-
- 1:11 "I am full of the burnt offerings of rams, and the fat of
- fed beasts; and I delight not in the blood of bullocks,
- or of lambs, or of he goats."
- 66:3 "He that killeth an ox is as if he slew a man"
-
- Those who committed the above offering suffered greatly for their deed, for
- such is an abomination before the Lord. It is wise to learn from their
- mistakes.
-
- Other members have attempted such obscure measures as psychic data corruption,
- ala Uri Geller. These attempts saw little success, and left those attempting
- the feats psychically exhausted and drained for nearly a week.
-
- Other members have attempted to thwart enemies such as the Secret Service, the
- FBI, journalists such as Richard Sandza, and individuals such as John Maxfield
- though magical means. When the outcome desired was weak, the results were
- high, but when a member actually tried to bring about the demise of a Southern
- Bell Security official, the power of the spell reversed and the member was soon
- placed under surveillance by the Secret Service, nearly causing disaster for
- the entire group, and completely dissolving the power of the order.
-
- One may find that once such power is somewhat mastered, it is easy to take
- shortcuts and thereby miss safety precautions. One must never forget to take
- these precautions, for disaster looms at every junction.
-
- The three members linked to the above incident had become well versed in the
- magical system of Abra-Melin the Mage. The spell which turned should never
- have been used in the first place. The spell was designed to stop a person's
- heart and could only be carried out with the help of the evil spirit Belzebub.
- The Symbol
-
- L E B H A H
- E M A U S A
- B
- H
- A
- H
-
- was used, yet the full precautions to protect the invoker from the spirit were
- ignored, and Belzebud ran free to affect whatever he saw fit to affect. They
- had seen prior success in this system using a symbol to obtain knowledge of
- things past and future and were able to obtain a great deal of information from
- various computer systems. However, that particular spell is invoked by the
- Angels, and little precaution need be taken in that instance. That Symbol:
-
- M I L O N
- I R A G O
- L A M A L
- O G A R I
- N O L I M
-
-
- AN INTERESTING EXAMPLE OF OCCULT INFLUENCED HACKING
-
- One particular evening of Ouija ended with a DNIC and a plea to halt the
- operation of the system. When members connected to this system they were
- shocked to find that it was a UNIX belonging to the Ministry of Treasury in the
- Republic of South Africa. The system was networked to a number of other
- government systems. Several standard defaults were still unprotected, and root
- was gained in a matter of minutes. A debate ensued over whether or not to
- disrupt the system in protest of Apartheid, but the system was left unscathed
- on the premise that to cause malicious damage would only make things worse.
-
-
- CLOSING
-
- Once the doors to ancient knowledge have been opened, the knowledge found
- within is immense and incredibly powerful. Do not fear experimentation and
- exploration, but be mindful of the existence of God and the spirits, and
- respect their power. Use whatever means necessary to achieve desired goals,
- but at no times cause harm to any other person, and do nothing out of
- aggression. Whatever degree of energy is sent forth will come back, if one
- sends out positive energy, positive energy will flow back; the converse of this
- is equally valid. Diversify one's interests, develop the mind, seek out hidden
- and suppressed knowledge, and experience the beauty of the true nature of
- magic.
-
- Frater Perdurabo Deo Duce Comite Ferro
- Inner Order of LOD
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-six, File 7 of 11
-
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- @ @
- @ Searching for SpeciAl accesS agentS @
- @ @
- @ by: Dr. Dude @
- @ @
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
-
-
-
- This is a true story of how United States Secret Service Agent Tim Foley
- discovered three of his freinds and later recruted them as speciAl accesS
- agentS into the hacker world. After seeing how well his recruits performed,
- Tim Foley recruted Barbera Spinelli (AT&T Security) and Toni Ames (a/k/a Pink
- Death of Pacific Northwest Security) and Dale Drew (a/k/a The Dictator) as
- speciAl accesS agentS for the purpose of undermining the computer underground.
- After this little incident Toni was nicknamed "Pink Death."
-
- Our story is narrated by Pink Death!
-
- @@@@@@@ Toni Ames plays: herself
- The Dale Drew plays: YOU'LL SEE!
- Players Tim Foley plays: with himself
- @@@@@@@ Barbera Spinelli plays: with everyone
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- I was reading a story in an adult magazine about this girl that was
- eaten out and fucked by a German Shepherd dog. Now to some of you, this
- probably sounds gross. However, I was turned on by the story and wanted
- to read more stories like it. Well I never found any. While I am sure
- that there is a mag out there that has lots of stories like it, just
- haven't found it yet.
-
- Anyway, one day I was talking to my friend Barbera Spinelli and brought
- the subject up. Barbera Spinelli had never read such a story before.
- Since we were at my house, I got the magazine out and let her read it.
- She didn't get as turned on as I did, but said that she would like to
- watch someone get licked and fucked by a dog. I told Barbera Spinelli
- the story made me very very horney. Barbera Spinelli said that she
- doubted that she could get horney enough to do it with an animal. I
- told her that it made me very horney and that I didn't think I could do
- it, but I did want to read about other people doing it with animals.
-
- Well, that subject was dropped, we continued to talk about other things
- while drinking wine. After two bottles we got very tipsy and started
- talking about sex. The next thing we knew, we were naked and in the
- pool, having a great time. Well, I have had sex with women before, but
- never with Barbera Spinelli. I didn't know how she felt about making
- love to women, and never asked. Well I noticed her staring at my 38-26-
- 36 body. I got out of the pool and posed. I said, "What do you think"?
- She said that I had a great body and a nice pair of tits. I spread my
- legs and opened up my pussy with my fingers showing Barbera Spinelli my
- pink inner lips and now extended clit. Squeezing my erect clit while I
- shoved two fingers up my soaking cunt I told Barbera Spinelli I would
- like to do it with her. With that, I jumped into the pool grabbed her
- head and shoved it between my tits as I probed her tight cunt with my
- fingers and said, well if you like them so much why don't you suck
- them. I was ready for her to protest, but instead she said okay, and
- sucked my tits gently as I continued to ream her tight pussy. She said
- to me, I have wanted you for the longest time but didn't think you would
- want to make love with me.
-
- We dried off and went into my bedroom I had Barbera Spinelli lie back on
- my bed and crawled up between her legs and began to suck her stiff pink
- nipples as I massaged her hot slippery slit. In no time I had her
- moaning with pleasure and moved down to her sweet tasting cunt probing
- her tight pink hole with my tongue. Barbera Spinelli quickly had a
- strong climax and flooded my mouth with her sweet juices. I got off
- her and went to my dresser getting out two of my favorite toys, a 12
- inch vibrator and a long thin anal probe. Barbera Spinelli gasped at
- the sight of me armed with my toys and begged me to fuck her with
- them. I moved back to Barbera Spinelli and straddled her face as I
- massaged her firm young tits. Giving Barbera Spinelli the anal probe
- I instructed her to fuck my asshole while she ate my pussy. I slowly
- lowered my soaking snatch to her lips and tongue as Barbera Spinelli
- pushed the long dildo firmly up my taught asshole. The feeling of that
- long shaft penetrating my ass made me quiver as Barbera Spinelli
- repeatedly thrust her long tongue up my cunt and licked and sucked my
- clit. We had hardly begun when I had my first orgasm wetting Barbera
- Spinelli's face with my thick pussy juice. Barbera Spinelli begged me
- to fuck her cunt with the vibrator and I bent willingly to my work
- spreading her swollen cunt lips and probing her tight twat with the
- vibrator as I licked her swollen distended clit and fingered her tight
- little anus. Barbera Spinelli came long and hard as she continued
- her assault on my pussy and anus reaming my cunt with her fingers
- as she licked my clit and pounded the probe up my anus bringing me to
- on one orgasm after another.
-
- In our lust we had not noticed Tim Foley my lover come in, the first I
- knew of his presence was when Barbera Spinelli squealed and I felt her
- fingers withdraw from my steaming twat only to be replaced by Tim Foleys
- two inches of hard thick cock. Looking back I saw the familiar look of
- lust in my lovers face as he reamed my pussy with his tiny thin prick
- and rammed the anal probe in and out of my well lubricated asshole.
- Barbera Spinelli resumed her assault on my swollen clit and I on her
- twitching cunt and asshole. In no time I felt Tim Foley's thick load
- shoot up my cunt as he pounded out his passion. I came quickly as did
- Barbera Spinelli licking up her juices as she swallowed the overflow of
- my lovers sperm from my cunt and clit. At last I thought our secret is
- out, Tim Foley and I had been fucking for about a year and I had always
- wanted to have him and a woman together. Barbera Spinelli was begging
- for Tim Foley's stiff cock and I had her get up in the doggy position
- as Tim Foley licked her tight puckered anus and slowly inserted the anal
- probe up her twitching rectum. I sucked his still stiff cock into my
- mouth and rammed it deep in my throat until it grew to enormous
- proportions. Barbera Spinelli in the meantime had renewed her assault on
- my cunt clit and anus forcing the rampaging vibrator up my steaming slit
- as she licked my hard clit and finger fucked my juicy asshole. Sensing
- Barbera Spinelli's need I pulled Tim Foley's prick from my mouth
- and pushed the head into Barbera Spinelli's pink pussy. Tim Foley took
- it from there and rammed his hard cock deep into her twitching vagina
- until his balls slapped her cunt lips. I continued to suck and lick her
- clit until Barbera Spinelli had two orgasms and Tim Foley filled her
- tight slit with gallons of cum. The sight of his sticky sperm dripping
- from her slit made me climax again and I licked her cum slickened snatch
- until I had sucked down all of my lovers sweet cream.
-
- Barbera Spinelli and I moved to a side by side position and continued
- to tongue fuck each others cunts as Tim Foley sat an rested watching our
- pleasure. In no time his cock was renewed and he began to finger Barbera
- Spinelli's tight back door. Seeing his lust for my friends asshole
- and having denied this pleasure to him in our private sessions I decided
- to let Tim Foley fuck me in the ass. I called him over and told him to
- fuck my butt while Barbera Spinelli ate my pussy. Tim Foley was overcome
- with desire as he moved in behind me and gently spread my ass cheeks
- lowering his face between the cheeks of my ass and probing my tight
- asshole with his tongue. I begged him to ream my anus with his big dick
- and he had Barbera Spinelli guide his rock like cock up my asshole while
- he pounded me to orgasm. I continued to lick Barbera Spinelli and made
- her cum just as Tim Foley shot his load up my ass. The feeling of his
- hot sperm filling my anus made me climax and nearly pass out. When I
- regained my senses I could feel Barbera Spinelli's tongue swirling in
- and out of my anus as she collected his sperm from my asshole. Tim Foley
- was great and he had moved to Barbera Spinelli's asshole and begun to
- lick her tight pink puckered asshole as I tongue fucked her hot cunt.
- I could tell Tim Foley was ready again and heard Barbera Spinelli beg
- him to ram his big thick dick up her ass. Tim Foley got into position
- and I guided his throbbing meet up her sweet tight little asshole
- watching as Tim Foley pressed it into her until only his balls were
- visible. I continued my tongue fucking of her cunt and licking her
- clit as I felt her convulse time and time again in sweet orgasm. Soon
- I to climaxed from her tongue and fingering of my cunt and anus and Tim
- Foley came filling her tight butt with his sperm which I gladly licked
- up. Tim Foley was happy but drained and left us to continue our
- games. All in all we made love for three hours. When she left to go
- home, she invited me over the next day to "Play around some more".
-
- Saturday afternoon I went over to Barbera Spinelli's house to play. She
- invited me in. She was wearing a black leather mini, black blouse, black
- fish net stockings and garters, and high heels. She was hot. I was also
- wearing a mini, I also had on a halter top, and heels. She told me to
- get on my knees and look under her shirt. What I saw was a beautiful,
- clean shaven cunt. I reached up to touch her but she stopped me. She
- said that I would first have to touch my own shaved cunt. She said she
- would shave me like she did herself this morning. We went to the
- bathroom and she undressed me. What I great sensation it was to have
- her shave. When she was done she cleaned me off, grabbed me by the hand
- and led me to her room. She told me to lay on the bed and play with
- my new cunt.
-
- As I laid there, I began to rub my cunt, what a feeling. I went wild.
- It felt so good. No pubic hair, just skin, sensitive skin. She watched
- me as she got undressed. She got into the bed with me and moved her
- cunt to where I could eat her. She was, and still is, so sweet tasting.
- As I ate her she played with my cunt, sticking in a finger then rubbing
- my clit. She would stop as I got to excited. I ate her and she came
- twice, yet she wouldn't let me cum. She then got up and left the room.
- She came back with some nylon straps and said that if I wanted to cum I
- would have to let her tie me to the bed. She said she would not hurt
- me. I agreed.
-
- She tied my wrists and ankles to the bed so that I was spread eagle.
- She then got out a vibrator and began to work on my sensitive clit. The
- vibrator made me so horney, but she would not leave it on my clit long
- enough to make me cum. I tried to thrust my hips to meet the dong, but
- to no avail. She would then stick the dildo in and slowly pull it out,
- then repeat the treatment on my clit. I was begging to cum. She bent
- between my legs and tasted my juice hole and said that I was wet enough
- to get my SURPRISE. Again she left the room. When she returned she was
- followed by my SURPRISE. It was her Great Dane, Dale Drew! She asked
- how horney was I and I knew what she meant. I shook my head yes.
-
- She patted the bed and Dale Drew jumped up. She then took the dogs nose
- and stuck it between my legs. I must have been twice as wet by now.
- The dog knew exactly what to do. He began to lick my hole. I couldn't
- stand it and I came twice, right away. This made him lick even faster.
- I could not believe the feeling. There was no strong probing like a
- humans tongue, just enough pressure and entry to do the job. As the dog
- continued to eat me out Barbera Spinelli unfastened me from the bed.
- Barbera Spinelli began to play with Dale Drew's cock and I watched as it
- began to grow stiffening in her hand until it had grown to about 8inches
- in length. Dale Drew was in a frenzy by now and his hot wet tongue was
- lapping hard and fast on my exposed cunt. Dale Drew's cock was long,thin
- and stiff as a board as Barbera Spinelli continued to massage it and his
- balls. Barbera Spinelli said that she thought the dog's cock was hard
- enough to start. She grabbed a couple of small pillows and placed them
- under my ass. Then guided the Dale Drew on top of me. His face was next
- to mine, I could feel his hot breath on my face. His hairy body resting
- on my stomach. Barbera Spinelli put her hand on his cock and gently
- guided it toward my fuck hole. As soon as the dog felt my wetness,
- nature took over. He fucked me fast and very deep. I came again, and
- again. Then I felt him tense and squirt inside me. He slipped out and
- shot some cum on my stomach. Dale Drew then reversed his position and
- began to lap my cunt again with his long wide tongue. With Dale Drew in
- this position I could see his long thin cock still exposed and still
- fairly stiff. Not wanting the experience to end I reached up and began
- to massage his cock and balls. The dog responded at once and began
- to fuck my hand as he licked my hot pussy to another orgasm. I asked
- Barbera Spinelli to help me and rolled over on my stomach spreading my
- legs and ass cheeks making my anus open and available to Dale Drewes wet
- tongue. Seeing my waiting asshole Dale Drew began to lick me there while
- Barbera Spinelli took over my handwork on her dogs cock. Barbera
- Spinelli moved Dale Drew around and he mounted me doggy style and began
- to dry hump my ass. Barbera Spinelli spread my ass further and guided
- Dale Drewes long thin cock into my asshole. The tightness of my ass sent
- Dale Drew in to ecstasy and he rammed his long thin dick in and out of
- my asshole with long fast strokes. All I can remember is the feeling of
- his long dick probing my rectum and driving me to orgasm after orgasm
- until he filled my ass with his sticky dog cum.
-
- As I laid there,I thanked Barbera Spinelli for what she did and told her
- that it was great. Since then I have fucked her dog twice. He is not
- always in the mood and sometimes it takes a lot of hand work to
- get him interested. I have fucked Barbera Spinelli so many times I can't
- count them and she I and my lover Tim Foley get together after school
- almost three times a week. Barbera Spinelli now says that she thinks she
- will try Dale Drew the next time he is ready.
-
- I can't wait.
-
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 8 of 11
-
- :-=>|%% Phreaks in Verse II %%|<=-:
-
- by Homey the Hacker
-
-
- \=================/
- Get in The Ring
- /=================\
-
- [Sung to the tune of Get in The Ring by G-n-f-R]
-
- Why do you look at me when you hate me?
- Why should I look at you when you make me hate you too?
- I sense a smell of retribution in the air
- I don't even understand why the fuck you even care
- And I don't need you jealousy
- Why drag me down in your misery
- And when you stare you don't think I feel it
- But I'm gonna deal it back to you in spades
- When I'm havin phun ya know I can't conceal it
- 'Cause you know you'd never cut it in my game, oh yea
- And when you're talkin about our sociology
- I'll be writin' down your obituary...History
-
- You got your agents with
- The Bellcore cash injections
- Trumped up charges and implications
- Beatin' off with your "spy" operations
- Who are you to criticize our publication
- Got your subtle manipulative devices
- Just like you, I got my vices
- I've got a thought that would be nice
- I'd like to crush your head tight in my vice...PAIN!!
-
- And that goes for all you punks in the press
- That want to start shit by spreadin' lies
- Instead of the things we said
- That means you
- Ed Schwarz at WGN Radio
- Richard Sanzda
- Gary Collins at Hour Magazine
- Geraldo River at CBS ** [CBS being partially owned AT&T]
- What you pissed off 'cause Opra Winfrey gets more ratings that you do?
- Fuck You
- Suck my fuckin' dick
-
- You be liein' to the fuckin' public
- Tellin' them your doin' a such favor for society
- [while crack dealers like Mayor Barry who should be tried for treason
- get off with slap on the wrist. FUCK YOU!]
- While they be payin thier hard earned tax dollars
- Printin' lies, Startin' controversy
- You want to antagonize me?
- Antagonize me motherfucker
- Get in the ring motherfucker
- And I'll kick your bitchy little ass, punk
-
- I don't like you, I just hate you
- I'm gonna kick your ass, oh yea!
-
- Ha Ha Ha Ha Ha Ha Ha Ha Ha!!!!!!!
-
- You may not like our integrity
- We built a world out of anarchy
-
- And in this corner weighing in at 450 lbs, Phrack Incorporated!!!!
-
- Get in the ring!
-
- Yea, this song is dedicated to all the Phrack fuckin' Incorporated
- Fans that stuck with us through all the fucking shit
- And to all those opposed...Hmm...Well
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \=============/
- Knight Lite*
- /=============\
-
- *1/3 the calories of regular computer hackers.
- [Sung the tune of The Beverly Hillbillies]
-
- Come and and listen to my story 'bout boy named Craig.
- Called "Mad-hacker", but is just pullin' your leg.
- Then one day he was writin' up a Phrack.
- Down came the door with a great big crack.
-
- Foley that is, Secret Service!, FBI!
-
- Well, now old Craig's a million in debt.
- Lost his cds and his brand new 'vette.
-
- Mitch Kapor said, "There's someplace you need to be."
- So he packed up his apple and moved to DC.
-
- Washington that is!, Lawyers!, Cash flow!
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \=============/
- Erik Bloodaxe
- /=============\
-
- [Sung to the tune of the Daniel Boone theme]
-
- Erik B was a ham...yes a big ham.
- He was born with an ego that was big as mountain was he.
-
- Erik B was ham...yes a big ham.
- And he told all the ladies he was hung like a mighty oak tree.
-
- >From the dark sun glasses he never takes off to the heal of his K-Mart shoes.
- The bitchenest, horniest, drunkenest man that a hacker ever knew.
-
- Erik B was a ham...yes a big ham.
- With a mouth like a sewer and so full of manure was he.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \================/
- Vanilla Holliday
- /================\
-
- [Sung to the tune of ICE ICE]
-
-
- Doc, Doc, baby! Doc, Doc, baby!
-
- Lookout!
-
- The Doc is back. King of the Phreaks, and Queen of the Hacks.
- "I'll get ya laid yet!" I say with a grin. Meanwhile my hand goes for a spin.
- I'm a master cracker, a k-rad hacker, a good 'ole plain down and dirty wacker.
- I'll trash your credit if you diss me. You know why? 'Cause I'm the LOD!
-
- Hit it Booyyyeeeeezzzz!!
-
- Doc Doc baby! Doc Doc Baby!
-
- Ya, ya, go get it!
-
- Doc Doc baby! Doc Doc Baby!
-
- Straight to your mother's cousin's uncle's stepsister!
-
- Get back! It's a hack attack! I'm the best, and that's a fact
- I've been in Time, Newsweek--they all want me. What's next? M-TV!
- I'm gone today, wasn't here tomorrow, maybe I'll get a date with Charo
- Ice, yah that was me. But now I've got movie rights with LOD!
-
- Kick it!
-
- Doc Doc baby! Doc Doc Baby!
-
- Go Doc Go Doc go!
-
- Doc Doc baby! Doc Doc Baby!
-
- Yahhhhhhhhhh, straight to Comsec!
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \===========/
- Predit0r ][
- /===========\
-
- [The predator rap]
-
- His name is Predat0r. He's the editor of TAP.
- He looks like Bart Simson and he's so full of crap.
-
- Got a board call the Blitzkreig BBS.
- He wishes he was nazi serving under Herman Hess.
-
- (oh well that's all I can think of)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \=======================/
- Been Caught Phreaking
- c0deZ's Addiction
- /=======================\
-
- [been caught Stealing by Jane's Addiction]
-
- Been caught phreaking, once, when I was five!
- I just tried phreaking, just as simple as that
- Well it's just a simple fact
- When I want a call and I don't want to pay for it
- I dial up a code
- and I dial up a code
-
- Hey all right! I get by!
- It's mine! Mine all mine!
- hey!
-
- Yea, my girl she's one too.
- She gonna get on telenet, just type in microwire
- Get a NUA for me
- She'll call right through the outdial
- Call right throught the outdial
-
- Hey all right! I get by!
- It's mine! Mine all mine!
- Get c0dez!
-
- Sat around the terminal. Sat and laughed.
- Sat around the terminal and laughed
- And we did it just like that, did it just like that.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- \======/
- Hack
- /======\
-
- [Sung to the tune of Stand by REM]
-
- Hack in the place where you live
- Now dial out
- Think about telnet, wonder why you have it now
- Hack in the place where you work
- Now dial up
- Think about tymnet, wonder why you have it
- If you are real board hack with SUN
- Carry a lap-top to help along
-
- A PAD is there to move you around
- If You're not careful your hands will be bound
-
- Hack in the place where you live
- Now dial out
- Think about telnet, wonder why you have it now
- Hack in the place where you work
- Now dial up
- Think about tymnet, wonder why you have it
-
- A PAD is there to move you around
- If you're not careful your hands will be bound
-
- If accounts were trees
- Trees would be falling
-
- Listen to reason
- Foley is calling
- _ _
- (reapeat an (_X_) amount of times)
-
- Now Hack!
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \==========================/
- I'M THE MAN WITH THE BOX
- /==========================\
- [Sung to the tune of "Man in the Box" by Alice in Chains]
-
- I'm the man with the box
- Burried in my (ESS7) switch!!!
- Won't you come and save me, save me?
-
- Feed me lies, where are all your trunks?
- (Bellcore) deny your maker
- He who tries will be wasted
- Feed me lies, now you've shut your trunks!
-
- I'm the dog who phreaks
- Can't shove my tones in a switch
- Won't you come and save me?
-
- Feed me lies, where are all your trunks?
- Bellcore, deny your maker
- He who tries will be wasted
- Feed me lies, now you've shut your trunks!
-
- Feed my lies, where are all your trunks?
- Bellcore, deny your maker
- He who tries will be wasted
- Feed me lies, now you've shut your trunks!
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \==================================/
- Keep on Hackin in the Free World
- /==================================\
-
- [Sung to the tune of Keep on Rockin in the Free World by Neil Young]
-
- There's CERT on the sceen
- Trying to get a clue
- Hackers typin on thier screen
- Phreaks with boxes that are blue
- There's a warning sign in CUD ahead
- There's a lot of people sayin
- We'd be better of dead
- Don't feel like Satan
- But we are to them
- So I try to forget it anyway I can
-
- Keep on hackin in the free world (4x)
-
- I see a phreak in night
- With some trash in his hand
- There's an old CO
- With a garbage can
- Now he takes the trash away
- And he's gonna learn a lot
- Goes home to hack some more
- And he's not gonna a stop
-
- Keep on hackin in the free world (4x)
-
- Got a thousand points of light
- On our modems, man
- Got a brand new Lexicon in my hand
- He found department stores
- with carbon paper
- Got Crimson Death & Dispater
- They say Phrack is back
- Gonna keep hope alive
- Got codes to crack
- Got dumpsters to dive
-
- Keep on hackin in the free world (4x)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- \============/
- FADE TO HACK
- /============\
- by Erik Bloodaxe
-
- [Sung to the tune of "Fade to Black" by Metallica]
-
- Accounts just seem to fade away
- Losing access every day
- Getting lost within some shell
- I have lost the will to hack
- No more passwords left to crack
- There are no more nets for me
- I need virtual reality
-
- Nets arent what they used to be
- Someone's always logging me
- Access Barred, this cant be real
- No more packets left to steal
- Now they've installed public key
- And they're using Secure ID
- Security awareness taking dawn
- I was root, but now root's gone
-
- Rerouted my call to save myself, but it's too late
- Now I can't think, think why I should even try
-
- Yesterday seems as though it never existed
- The SS greet me warm, now I will just say goodbye
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 9 of 11
-
- /---------------------------------------------------------------------------\
- | THE MEN FROM |
- | M M OOOOO N N GGGGG OOOOO |
- | MM MM O O NN N G O O |
- | M M M O O N N N G GG O O |
- | M M O O N NN G G O O |
- | M M OOOOO N N GGGGG OOOOO |
- | |
- | -*- present -*- |
- | |
- | +-----------------+ |
- | | Real Cyberpunks | |
- | +-----------------+ |
- | |
- | 9/24/91 |
- | |
- | With all this shit in the news and now a book about cyberpunks, we have|
- |a bunch of lame assholes who think they are cyberpunks running around |
- |blackening the name. In response to this we'd created this g-file so |
- |everybody can tell the lamers from the real cyberpunks. Most of these |
- |wanna-be cyberpunks will probably be offended by what we're going to say, |
- |because the description of what defines a real cyberpunk doesn't apply to |
- |them. Remember though, cyberpunk is mostly an attitude (this g-file |
- |describes physical manifestations of this attitude), and real cyberpunks |
- |don't get upset over something written in a g-file. |
- \---------------------------------------------------------------------------/
-
- CLOTHING
-
- - Real cyberpunks don't wear paisley, or any of that other neo-
- futuristic, yuppie, artfag shit.
-
- - Real cyberpunks wear military surplus clothing, non-neon colored
- Gortex, bluejeans, boots (combat or motorycle), Factsheet-5 T-Shirts,
- and kilts (on formal occasions).
-
- - Real cyberpunks don't shop at Banana Republic or the "Mainframe"
- clothing section at Sears.
-
- - Real cyberpunks have the balls to go to Thrift Shops.
- Corollary to the above: Anyone who makes fun of a cyberpunk shopping at
- a thrift shop usually winds up in ICU.
-
- COMPUTERS
-
- - Real cyberpunks don't use IBM PCs or Tandy 1000s.
-
- - Real cyberpunks that have the $$$ use 486s, and 68030s.
-
- - Real cyberpunks that don't have the $$$ use whatever the hell they can
- get ahold of (except IBM PCs an Tandy 1000s).
-
- - All real Cyberpunks still own a TI-99/4A, S-100, Apple ][ w/Apple Cat,
- or an Atari 130XE with ATR8000 & 850 interfaces as their backup
- machine.
-
- - Real cyberpunks program in assembler and ADA.
-
- - Real cyberpunks think C is cute for a fuck-around language.
-
- - Real cyberpunks think of the Amiga as a cute toy.
-
- - Real cyberpunk SYSOPS run Stonehenge.
-
- - Real cyberpunks realize the Apple Cat was the best modem ever made.
-
-
- CARS
-
- - Real cyberpunks drive whatever they can afford.
-
- - Real cyberpunks never drive an unmodified vehicle.
-
- - Real cyberpunks think Audi, BMW, and Mercedes cars serve best as rocket
- launcher targets.
-
- - Real cyberpunks who can afford them drive something with a V-8.
- Corollary to the above: Real cyberpunks go to every police auction
- in their area.
-
- TECH
-
- - All real cyberpunks have their ham license.
-
- - Real cyberpunks know the difference between a resistor and a capacitor.
-
- - Real cyberpunks know where to get tech cheap in their area.
- Corollary to the above: Real cyberpunks practically live at their local
- surplus store.
-
- - Real cyberpunks think Radio Shack sucks, but still buy from there
- because it's convenient.
- Corollary to the above: Real cyberpunks put pragmatism before
- principle.
-
- - Real cyberpunks always carry a Leatherman Tool.
- Corollary to the above: Real cyberpunks know what a Leatherman Tool is.
-
- - Real cyberpunks own a dual-band HT.
- Corollary to the above: Real cyberpunks know what a dual-band HT is.
- Corollary to the corollary: Real cyberpunks have hosed McDonalds at
- least once.
-
- - Real cyberpunks know how use a TDR.
- Corollary to the above: The have also managed to get ahold of one for
- free.
-
- POLITICS & LAW
-
- - Real cyberpunks are politically aware, but avoid getting involved in
- that bullshit.
-
- - Real cyberpunks think all politicians should be castrated.
- Corollary to the above: Real cyberpunks are libertarians.
-
- - Real cyberpunks have copies of their state's law statues.
-
- - Real cyberpunks know the difference between the Declaration of
- Independence and The Constitution.
- Corollary to the above: Real cyberpunks know what both of those say.
-
- - Real cyberpunks don't get caught.
-
- KNOWLEDGE
-
- - Real cyberpunks read 2600, Factsheet-5, Full Disclosure, Iron Feather
- Journal, Cybertek, Radio Electronics, Circuit Cellar Ink, Computer
- Shopper, American Survival Guide, and any 'zines about local bands in
- their area.
- Corollary to the above: Real cyberpunks understand what they read in
- these publications.
-
- - Real cyberpunks think Mondo2000, for the most part, sucks.
-
- - Real cyberpunks learn about everything from Computers to Crossbows.
-
- - Real cyberpunks know how to spell.
-
- - Real cyberpunks speak at least 2 languages.
-
- WEAPONS
-
- - Real cyberpunks don't have the typical yuppie artfag fear of weapons
- that most modem users seem to have.
- Corollary to the above: Real cyberpunks know the value of useful
- equipment.
-
- - Real cyberpunks own at least one gun.
-
- - Real cyberpunks carry Gerber, Cold Steel, SOG, AlMar, or Spyderco
- blades.
- Corollary to the above: Real cyberpunks think custom steel is neat, but
- costs too much.
-
- - Real cyberpunks have memorized The Improvised Munitions Black Book.
-
- - Real cyberpunks know The Anarchist Cookbook is a crock of shit.
-
- - Real cyberpunks buy everything authored by Seymour Lecker and Kurt
- Saxon.
-
- - Real cyberpunks keep a supply of DMSO handy.
- Corollary to the above: Real cyberpunks know what DMSO is.
-
- MUSIC
-
- - Real cyberpunks go to The Mentors' concerts whenever they can.
-
- - Real cyberpunks think C&C Music Factory is just a bunch of out-of-the-
- closet homosexuals.
-
- - Real cyberpunks don't listen to Paula Abdul.
-
- - Real cyberpunks think Michael Jackson should be napalmed.
- Corollary to the above: Real cyberpunks think Michael Jackson is a
- reincarnate of his monkey Bubbles.
-
- - Real cyberpunks think Top-40 sucks.
-
- - Real cyberpunks listen to Ministry, The Cure, Skinny Puppy, The
- Misfits, Rush, Pink Floyd, etc.
-
- - In the end, real cyberpunks listen to whatever the fuck they want.
-
- PHREAKING & HACKING
-
- - Real cyberpunks think codes are for fags, but use them anyway because
- they put pragmatism before principle.
-
- - Real cyberpunks know what TEMPEST means.
-
- - Real cyberpunks use data-taps.
-
- - Real cyberpunks have Internet access.
-
- - Real cyberpunks know why Broadway Hacker invited everyone to his house.
-
- - Real cyberpunks know what PPS really means.
-
- - Real cyberpunks know Clifford Stoll's ex-wife is a lesbian.
- Corollary to the above: Real cyberpunks know that Clifford Stoll is an
- asshole.
-
- - Real cyberpunks know just how good friends John Maxfield and Broadway
- Hacker are.
-
- - Real cyberpunks know who John Maxfield is and what he was arrested for.
-
- - Real cyberpunks own a blue box, and still use it.
- Corollary to the above: Real cyberpunks know what a blue box is, and
- know how to use it.
-
- - Real cyberpunks know what a TS-21 is.
- Corollary to the above: Real cyberpunks stole their TS-21.
-
- - Real cyberpunks have acquired a Bell System hard-hat.
-
- - Real cyberpunks have a payphone.
- Corollary to the above: The payphone belongs to someone else.
-
- - Real cyberpunks on the east coast have attended at least one 2600
- meeting.
- Corollary to the above: Real cyberpunks who have attended a 2600
- meeting don't go to them anymore.
- Corollary to the corollary: Real cyberpunks are waiting for another
- OSUNY meeting.
- Further corollary: Real cyberpunks know what OSUNY originally stood
- for.
-
- HEALTH
-
- - Real cyberpunks use Choline, Ginseng, and Golden Seal.
- Corollary to the above: Real cyberpunks know what these are.
-
- - Real cyberpunks know about the medicinal value of various plants.
-
- - Real cyberpunks take care of themselves.
-
- - Real cyberpunks take time away from fucking with their computers to get
- some exercise.
-
- FOOD & DRINK
-
- - Real cyberpunks drink Jolt.
- Corollary to the above: Real cyberpunks think Pepsi is for artfags.
-
- - Real cyberpunks are intimately familiar with the selection at 7 -
- Eleven, but avoid it whenever possible.
-
- - Real cyberpunks know how to cook.
-
- - Real cyberpunks drink Guinness Stout.
-
- - Real cyberpunks who are under 21 distill their own.
-
- - Real cyberpunks can go to a Supermarket and not get lost.
-
- That's it for now, but since lamers are always finding mew ways to become
- lame, expect a Real Cyberpunks Vol. II soon.
-
- Yours truly,
- The Men From Mongo, 9/24/91
- :OSUNY, TCO, PPS, SPS, PHALCO
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 10 of 11
-
- _______________________________________________
- | |
- | ^*^ ^*^ ^*^ ^*^ |
- | |
- | *Elite* World News |
- | |
- | Issue 36 / Part 1 of 2 |
- | |
- | Compiled, Edited, and Mangled by Dr. Dude |
- | |
- | ^*^ ^*^ ^*^ ^*^ |
- |_______________________________________________|
-
-
- A GOOD HAM IS A DEAD HAM
- Special Thanks: Twisted Pair
-
- Just as geeks with computers annoy hackers and phreaks, geeks with "ham"
- sets annoy those of us that diddle with electronics. To prove my point just go
- to ANY "Ham-Fest." See the guy walking around with the headset walkie-talkie
- that looks like he shaved about 4 days ago, grossly overweight, dressed in the
- ugliest clothing, and is just simply nerdier than hell? Being involved with
- electronics we are constantly irritated by these losers. We urge everyone out
- there to DESTROY ANYONE THAT CLAIMS TO BE A HAM!!!!!
-
- Anyway, what follows is a true story:
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Our story is basically about a guy named Jim. Jim liked to watch a
- particular TV show when he got home from work everyday like a lot of people do.
- Lately, Jim's TV reception on all channels was being ripped up by an unknown
- interference signal. Being disgusted with the TV picture, ol' Jim said, "Fuck
- it." He decided to listen to the radio for awhile, but, GOD DAMNIT there was
- interference there, too. By this time Jim is really very upset. The
- interference would come in spurts, loudly interrupting whatever show was on at
- the time with a loud, distorted, unintelligible voice.
-
- Jim began to wise up quickly after being subjected to watching snowy
- pictures, flipping pictures, and listening to someone's raspy, annoying
- distortion on his TV. He figured out that his neighbor down the street (we'll
- just call him Ham) had a big antenna sticking up beside his house. Jim noticed
- that the interference was always present when Ham's 4x4 truck, with KC lights,
- and tractor tires was at home. Jim went over to talk to Ham. Ham said his
- "antenner" was his "binnus." What ever Ham wanted to do with it was his
- "damned binuss." After the door was slammed in Jim's face, Jim decided to do
- some research.
-
- Jim spoke to some of his other neighbors about the problem. What a
- surprise. Turns out they ALL had the interference. The interference area was
- at least 4 blocks in every direction. The neighbors decided that they would
- go have a chat. So, 6 people from all parts of the neighborhood went go see
- Ham for a friendly visit. Ham reluctantly opened the door and immediately
- started cussing about it being his "antenner," his "Ham gear," his
- "ampluhfieers," and he would operate them as he damned well pleased! He also
- DARED anyone to stop him from broadcasting in the neighborhood.
-
- Jim, now beyond pissed off, contacted the FCC regional office in Chicago.
- They helped him fill out a formal complaint. The FCC, usually slow to act on
- such complaints, gave Jim a lucky break. The FCC just happened to have a
- senior inspection official who would be in Jim's area the next week. Jim
- couldn't wait! On the fateful day of the FCC's visit, they came armed to the
- teeth with all kinds of state-of-the-art-neato things. The FCC guys showed up
- in a white van with windows tinted black. There were no markings on this van,
- except for multiple antennas of all types sitting on top of the van (how very
- unobtrusive and sneaky are they). The inspectors first met with Jim to look at
- his bad reception to confirm that Ham was transmitting. Then they took Jim out
- to the van to show him how they check out such complaints. The van was LOADED.
- The FCC guys had spectrum analyzers, custom-made multi-frequency receivers that
- covered all bands, they had signal strength meters, they had equipment
- controlled by a PC. They also had a PC linked via radio to somewhere. On it
- they could look up information on ANY ham license, broadcast license, suspected
- pirate station, or check personal records of known offenders.
-
- The FCC's equipment confirmed that Ham was broadcasting shortwave with WAY
- too much power. Their power meter was pegged on its highest scale, damaging
- it (oops!). Well, the FCC inspector was pretty hot about that. In fact, he
- was really pissed. He drove the van up to Ham's house, slamming on the brakes
- with screech. Ham bolted to the door. The FCC guys showed their ID and asked
- Ham to come on outside and look at the stored readings they had made earlier on
- Ham's signal. Ham refused at first, but finally came outside.
-
- Ham swore a few too many times and pissed off the FCC inspectors even
- more. Ham told them he didn't believe their readings, and would just do as he
- pleased. He went back into the house and locked the door. Jim wasn't happy
- either. After using their cellular phone to call for police backup, the senior
- FCC inspector told his partner to cover the back door.
-
- The police arrived with lights on and sirens blaring. The FCC guy
- INSISTED that HE get to kick Ham's door in. The police obliged. After a short
- struggle with Ham, he was tossed onto the front yard and cuffed. The
- inspectors confiscated a whole room full of Ham gear, 3 transmitters, Ham logs,
- big homemade linear amplifiers, etc. Not wanting to climb Ham's tower to get
- at his antenna, the FCC just CUT OFF Ham's antenna cable about 15 feet up.
- How cute! The WHOLE cable would have to be replaced if Ham was ever to
- broadcast again.
-
- Ham's gear was permanently confiscated, his license revoked for life, and
- certainly appeared as though he was embarrassed by the scene in his yard. The
- end? Not!
-
- Just one month later Jim started noticing interference patterns on his TV
- set and radio again. Daily the problem grew worse. This time he could hear
- tones mixed in with the crackly, distorted voice. After a week of this
- was back at it again. Jim checked it out. He saw that Ham's truck was,
- indeed, in the driveway every time the distortion was present. Ham WAS back
- at it again. Jim assured everyone who called that he WOULD take care of the
- problem once and for all. After watching the evening news program break apart
- several times (always during the most important parts), Jim got good and mad.
- It was getting dark, so Jim decided to do a little tower climbing!
-
- Jim wore black clothing so he wouldn't be seen by Ham. While getting
- ready to scale Ham's tower, Jim noticed that Ham had installed brand-new
- antenna cable. A light was on in the basement window which was directly in
- front of the base of the tower. Jim peered into the window. He noticed that
- each time Ham talked into his microphone, a red light came on that could be
- faintly seen from outside. Jim jumped onto the base of the tower, being
- careful that Ham couldn't see his feet out his basement window. On the way up
- the tower, Jim looked down to watch the red light which went on whenever Ham
- was transmitting.
-
- Jim came prepared for the job. He had two things in his pocket; a long,
- sharp hatpin and a roll of black electrical tape. After climbing about 15 feet
- up the tower, Jim once again looked down to see if Ham's red light was on. It
- was off. Jim worked fast. He took out the hat pin and inserted it crossways
- straight THROUGH Ham's new antenna cable. The hatpin would short out the
- cable's grounded shield with the live center conductor in the cable. He made
- sure it was pushed in all the way. Jim quickly grabbed the electrical tape and
- carefully wrapped it around the cable to cover up the pin, making it
- unnoticeable. Then he climbed down a little ways and decided to jump the rest
- of the way down.
-
- Just as he landed on the ground the sparks FLEW! He saw a BRIGHT red
- flash of light as Ham keyed on his transmitter. There were a couple of loud
- pops as loud as gunfire. Lying on the ground, Jim saw the smoke and flames
- rolling out of Ham's transmitter and amplifier. Ham was JOLTED out of his
- chair with ice cubes flying out of the drink he was holding. Ham's circuit
- breaker must have tripped, too because his entire HOUSE went dark after
- about 5 seconds.
-
- Ham never was able to find the problem with his antenna system. He must
- have given up because the interference stopped!
- _______________________________________________________________________________
-
- DEMON COMPUTER KILLS TWO WORKERS! November 12, 1991
- by Sally O'Day (Weekly World News)
-
- "Exorcist Called In After Experts Discover Virus-bred Evil Spirit!"
-
- Bank officials have summoned an exorcist to rid a computer terminal of a
- hideous horned demon that <has> already killed two employees and put another in
- a coma!
-
- And if Father Hector Diaz fails in his mission to banish the spirit,
- authorities say they will have to shut down the bank because the computer can't
- be turned off, moved, or unplugged. And as long as it remains in place, every
- customer and employee is in danger.
-
- "This sounds like something out of a sci-fi movie, but the threat is both
- serious and real," Police Detective Raul Lopez told reporters. "I don't know
- why and I don't know how. But an evil force or spirit is living in that
- machine and the death of two innocent people proves it."
-
- Maria Catalan was found sitting at her terminal with her head in her lap."
- Carmen de la Fuente had a fatal heart attack within two minutes of sitting
- down to work.
-
- Computer experts tired to examine the terminal, but they had no success
- whatsoever. One of them started babbling like a madman when he got within 10
- feet of the machine and a dozen more were flung to the floor like rag dolls by
- some unseen force.
-
- "We can't turn the machine off because everyone who tries blacks out and
- falls to the floor. I know I must sound like a lunatic, but that computer
- truly has a mind -- and a life -- of its own."
-
- The mind-numbing drama began when the bank in Valapariso, Chile, installed
- a new computer system last spring. Within days the system turned deadly.
-
- When a bank custodian told of seeing a hideous horned demon appear on the
- computer screen, bank officials asked Father Diaz to perform an exorcism.
- The priest has been unavailable for comment while he prepares the rite of
- exorcism.
-
- But a spokesman for the firm that installed the computer system says that
- a computer virus almost certainly created the conditions which caused the
- terminal to kill.
- ______________________________________________________________________________
-
- THE TRUE SIGNIFICANCE OF ZODIAC SIGNS
- by Dr. Dude
-
- AQUARIUS (JAN 21-FEB 19) You have an inventive mind and are great at
- engineering people. You frequently abuse c0dez and spend a great deal of time
- hacking voice mail box systems. (Night Ranger)
-
- PISCES (FEB 21-MAR 20) You have a very vivid imagination and often think you
- are being followed by the FBI and the CIA. You also feel as though you need to
- join as many "groups" as possible. Pisces write a lot of "How Break Into/Steal
- Fortresses" files. (Lex Luthor)
-
- ARIES (MAR 21-APR 21) You are a pioneer and an innovator. You hold most people
- in contempt. You are quick tempered, impatient, and scornful of everyone. No
- one can ever hope to be as El1te as you are. Most Aries aren't actually
- hackers, because they spend too much time pestering other hackers and trying to
- destroy the computer underground than actually hacking into systems. All aries
- will grow up to work for the Secret Service. All Aries try to join MOD.
- (Dictator, Dan the Operator, Corrupt)
-
- TAURUS (APR 21-MAY 21) You are practical and persistent. You hack like hell
- and never get credit for anything. Most people think you are racist. You like
- to write files about "Running Over Things With a 4x4" and "Making Drugs." You
- are goddamn redneck hacker. (Taran King)
-
- GEMINI (MAY 22-JUNE 21) You are a quick and intelligent thinker. People like
- you because you are bisexual. However, you are inclined to expect too much for
- too little. This is why all Geminis are leeches. Geminis belong to at least
- 10 boards at a time and are on the endless quest for El1teness.
-
- CANCER (JUNE 22-JULY 23) You are very compassionate and overly trusting and
- never do any dark side hacking. This makes you the perfect fool. Cancers
- write virii in LOGO and Blue Box from their home phones. Cancers think that
- Tim Foley is a misunderstood man.
-
- LEO (JULY 24-AUG 23) You consider yourself a born leader, while others consider
- you loud and pushy. This is why all Leos are power hungry and therefore a lot
- of Leos are sysops. Most Leos talk big and then do nothing. Leos are also into
- starting "groups." (Ninja Master)
-
- VIRGO (AUG 24-SEPT 23) You are the logical type and hate disorder. That's why
- you spend more time collecting text files and news related to hacking than
- actually doing any hacking or phreaking. (Crimson Death, Knight Lightning)
-
- LIBRA (SEPT 24-OCT 23) You are the artistic type and have a difficult time with
- reality. You brag about your library of porno GIF's and have close ties with
- Amiga pirate groups. You also tend to be fairly talkative, thus making you a
- great informant for the Secret Service. (Dispater, Erik Bloodaxe, Tuc)
-
- SCORPIO (OCT 24-NOV 22) You are shrewd in business and cannot be trusted. You
- will achieve the pinnacle of success due to your complete lack of morals and
- ethics. All Scorpios are into crashing BBS. You are a perfect son of a bitch.
- (The Disk Jockey)
-
- SAGITTARIUS (NOV 23-DEC 21) You are overly optimistic and enthusiastic. You
- have a reckless tendency to rely on luck since you lack any real talent. A
- typical Sagittarian move is to drag home 10 bags of trash from the local telco
- to discover the only thing they got out of the ordeal was a car that smells
- like coffee for the next 3 weeks. (Aristotle, Predat0r)
-
- CAPRICORN (DEC 22-JAN 20) You are overly conservative and afraid of taking
- risks. You would be afraid of redboxing from a downtown Los Angeles at
- lunchtime. You think that copying pirated software will lead the FBI to you
- front doorstep the next day. You are a puss. (Juan Valdez)
- ______________________________________________________________________________
-
- GOD, RUSTY, & INWARD OPERATORS
-
- Once again, Pat Townson admonishes a reader of comp.dcom.telecom for
- having a little phun at work.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- From: 0004133373@mcimail.com Donald E. Kimberlin (comp.domp.telecom)
-
- ..in a footnote <Digest vol10, iss637), our Moderator suggests,
-
- > "... some children, phreaks and assorted other folks consider it quite a
- > funny joke to conference two unrelated parties via three-way calling, then
- >let them (the two called parties) squabble with each other while the
- >perpetrator goes spastic with laughter at his little prank. PAT]"
-
- Well, it brings to mind three incidents that I guess can now be told:
-
- 1.) The good old "testboard," of course, had the ability to "conference in"
- several parties, while the person on the testboard could cut off their own talk
- path, leaving the two parties talking to each other. In an earlier, simpler DDD
- network, simply dialing an area code plus 121 got the "Inward Operator." a.k.a
- "Assistance" to the public's view for an entire area code. In a yet-to-be-
- divulged corner of Long Lines, it was a favorite pastime to dial 809+121 (San
- Juan, Puerto Rico) and 808+121 (Honolulu, Hawaii) and let two Ernestines of
- the Lily Tomlin era argue about which had called which and what they were
- supposed to do. Meantime, gales of laughter could be heard around the
- monitoring loudspeaker in a testroom thousands of miles from either of them!
-
- 2.) In a similar fashion, happenstance listening found an FX between two cities
- that got dialed up every morning and contained a day-long dialog between two
- receptionists of the same company. One was named "Rusty." Rusty's nightly
- romantic exploits in a major seaside resort city, if true, would provide years
- of material for one of today's "Confessions" 900 numbers! They were replete
- with details of Rusty's specialized wardrobe and tools of her nighttime trade.
- Needless to say, the day shift had a monitor speaker plugged into THAT FX
- daily. (I almost swallowed my chewing gum more than once!) After a long
- period <months> of unobtrusive listening, a testboardman <whose name is yet to
- be divulged> began to pop in with comments that could be heard only by Rusty
- and not her audience at the other end.
-
- Rusty would respond, leaving her private audience puzzled at who Rusty was
- talking to. That would cause the discussion to turn to suggestions of
- reporting eavesdroppers on the phone. However, no reports were ever filed when
- it got around to, "But what if they ask what we were talking about?" (It would
- have been hilarious, anyway, because the self-same room that was doing the
- listening was the place the trouble reporting number was in ... in fact, the
- self-same people!)
-
- 3.) The highest level of development of this art might be classified as an
- early form of the "Talking to God" service recently purported to have emerged
- in Italy. This one was over on the 17B Board, where thousands of DDD message
- trunks terminated in ports of the 4A toll switching machine. Each evening, as
- the network peaked with the 7 PM rush for cheap rates, it wasn't difficult to
- find a circuit on which a couple of good old Bible-toting down south mommas
- were commiserating about their physical aches and heartaches over the foibles
- of their "chilluns." When one finally asked, as they always did, for the Lord
- to intervene, an obliging testboardman would plug into the four-wire transmit
- toward the requester and play God on the Telephone. Invariably, the poor dear
- would literally swoon and shush the questioning other, who couldn't hear God
- talking! One can imagine the testimony of miracles next Sunday morning at the
- country church!
-
- But of course, NOBODY ever listens in on YOUR calls...why, the Company would
- NEVER permit that! Boy, I sure hope the Statute of Limitations has run out on
- this!
-
- [Moderator's Note: I still don't think it is funny. I regard it as a major
- violation of trust; and I'm sure you are aware that had the employees involved
- in this little prank been caught and the subscriber's involved elected to sue,
- telco would have had to pay financially and the employees involved probably
- would have lost their jobs. PAT]
- _______________________________________________________________________________
-
- ELITE WORLD NEWS QUICKNOTES
-
- 1. After the recent massive failure in New England, their fourth since January
- 1990, ATT announced a new customer service number for affected customers to
- call in case of future problems: 1-900-Call-ATT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 2. Corrupt & MOD are Really Fat Albert & The Junk Yard Gang!
- "Habba mamba, NebbitWibbiz bebba Fabbit Abet."
-
- That's right! In this exclusive interview with Weird Harald (aka The Wing)
- Phrack Inc. discovers that the true identity of Corrupt is Fat Albert.
- WH is now talking. Why? Because the leader of the infamous New York City
- crack gang (Corrupt) threatened to post his "info" on Internet Relay Chat
- if Harald did not step up his rag wars.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 3. The Hacker's Dictionary explains that "RTM," apart from being the login of
- a certain Cornell student, is also common shorthand for "Read The Manual,"
- as in "Don't hassle me now, did you RTM?"
-
- Turns out that the original expression was RTFM, like "Look, I got 20
- klingons on the screen and no warp drive. Go RTFM."
-
- Now, turns out that Morris's hack is viewed as uncool because he screwed
- up the coding so a few netfolks changed his login to RTFM.
-
- "Ha ha only serious." (another expression from the Hackers's Dictionary)
- _______________________________________________________________________________
-
-
- ==Diet Phrack==
-
- Volume Three, Issue Thirty-Six, File 11 of 11
-
- _______________________________________________
- | |
- | ^*^ ^*^ ^*^ ^*^ |
- | |
- | *Elite* World News |
- | |
- | Issue 36 / Part 2 of 2 |
- | |
- | Compiled, Edited, and Mangled by Dr. Dude |
- | |
- | ^*^ ^*^ ^*^ ^*^ |
- |_______________________________________________|
-
-
- STUDS PROMOTE BETTER IMAGE
-
- Introducing Eric Bloodtest, Dick Holiday, PH-factor, and Bobbie Buttercupps!
-
- HOUSTON -- Three self-professed members of the Legion of Dudes, one of the
- most notorious swingers groups to operate in the United States, said they now
- want to get paid for their skills. Along with a former X-rated film actor, the
- members launched a new dating service called ComseX Dating Security that will
- check out women whom male customers might be interested in dating.
-
- "We have been in the dating business for the last 11 years -- just holding
- on to the different end of our stick," said Scott Girlchaser who said he once
- used the handle Dick Holiday as a Legion of Dudes member. The group has been
- celibate since late last year, Girlchaser said.
-
- The start-up firm plans to offer sister penetration testing, personality
- matching, and sexual training services as well as security products. "We have
- information that you can't find in Penthouse or Playboy: We know why people
- date, what motivates them, why they are curious," Girlchaser said.
-
- Already, the start-up has met with considerable skepticism.
-
- "Would I hire a gigolo to be an escort for my mother?" asked John
- Kastrate, dating information administrator at Love & Holding Corporation in
- Hollywood, California. "If they stayed celibate for 5 to 10 years, I might
- reconsider, but 12 to 18 months ago, they were swingers, and now they have to
- prove themselves."
-
- "You don't hire ne'er-do-wells to come and grope at your fiance," said Tom
- Smallpenis, a sexual therapist patient at General Hospital. "The Legion of
- Dudes is a known anti-monogamous group, and although it is good to see they
- have a heterosexual bent, GH would not hire these people."
-
- ComseX already has three contracts with various men's organizations,
- Girlchaser said.
-
- "I like their approach, and I am assuming they are legit," said Herman
- Slutten, a dating consultant at HeyMan Datababe Corporation in Phoenix,
- Arizona. His firm is close to signing a contract with ComseX, Slutten said.
-
- Federal health enforcers have described the Legion of Dudes in reports,
- indictments, search warrants, and other documents as a closely knit group of
- about 15 swingers whose members sleep around, father children, skip out on
- child support, participate in S&M, and break hearts by entrancing women across
- the country.
-
- The group was founded in 1984 and has had dozens of members pass through
- its ranks. Approximately 12 former members have been infected by sexually
- transmitted diseases relating to their exploits. Three former members are now
- dead and at least three others are regularly receiving treatment. None of the
- ComseX founders have ever been infected with a sexually transmitted disease.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- AN OFFER YOU COULD REFUSE?
-
- Tom Smallpenis, a sexual therapist patient at General Hospital in Chicago,
- says he would never hire ComseX Dating Security, a dating service launched by
- three ex-members of the Legion of Dudes. "You don't bring in an unknown
- commodity and give them the keys to the bedroom," Smallpenis said. Chris
- Womanizer, one of ComseX's founders, retorted: "We don't have the keys to
- their bedroom, but I know at least four people off the top of my head that do."
- ComseX said it will do a free sister penetration for GH just to prove the
- dating service's sincerity, Womanizer said. "All they have to do is sign
- release forms saying they won't hit us with a palimony suit."
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- GROUP DUPES SEXUAL EXPERTS
-
- "Houston-Based ComseX Fools Consultants To Gather Sexual Information"
-
- HOUSTON -- Dating and escort services are supposed to know better, but at
- least six firms acknowledged last week that they were conned. The
- "entertainment" providers said they were the victims of a bit of sexual
- engineering by ComseX Dating Security, Inc., a dating service recently
- launched.
-
- ComseX masqueraded as prospective bachelors and out of town businessmen
- using the name of Omega Sigma Delta, a large nation-wide young men's
- fraternal organization to gather information on how to prepare panty-raid
- proposals and conduct sorority audits and other fraternity business techniques,
- the consultants said.
-
- Three of ComseX's four founders are self-professed former members of the
- Legion of Dudes, one of America's most notorious swingers groups, according to
- health inspectors.
-
- "In their press release, they say, 'Our firm has taken a unique approach
- to its sales strategy,'" said one consultant who requested anonymity, citing
- professional embarrassment. "Well, sexual engineering is certainly a unique
- sales strategy."
-
- Sexual engineering is a technique commonly used by swingers to gather
- favors from helpful, but unsuspecting women that may be used to penetrate other
- unsuspecting females.
-
- "They are young kids that don't know their penis from their belly-button
- about doing business, and they are trying to glean that from everybody else,"
- said Itchy Crotch, director of consulting at Sister Virginity Consultants,
- Inc., in Little Rock, Arkansas.
-
- The consultants said gathering information by posing as a prospective
- customer is a common ploy, but that ComseX violated accepted business ethics by
- posing as the Omega's.
-
- "It is a pretty significant breech of business ethics to make the
- misrepresentation that they did," said Hardon Mormon, house father for the
- Omega Sigma Delta's. "They may not be swinging anymore, but they haven't
- changed the way they operate."
-
- Mormon said his chapter had received seven or eight calls from sexual
- consultants who were following up on information they had sent to "Hairy
- Prostate," supposedly the Rush Chairman.
-
- SAME OLD STORY
-
- The consultants all told Mormon the same tale: They had been contacted by
- "Prostate," who said he was preparing to conduct a sexual orientation clinic
- and needed information to pitch the idea to the chapter President and alumni.
- "Prostate" had asked the consultants to prepare a detailed proposal outlining
- the steps of a sexual invitation, pickup lines, and other information.
-
- The consultants had then been instructed to send the information by
- overnight mail to a Houston address that later proved to be the home of two of
- ComseX's founders. In some instances, the caller had left a telephone number
- that when called was found to be a constantly busy condom company order number.
-
- Mormon said "Prostate" had an intimate knowledge of the fraternity's
- rituals that is known only to members. While there is no evidence that the
- chapter was penetrated by outsiders, the Omegas are "battering down their
- hatches," Mormon said.
-
- Posing as a prospective customer is not an uncommon way to gather
- competitive information, said Chris Womanizer, one of ComseX's founders, who
- once used the handle of Erik Bloodtest.
-
- "Had we not been who we are, it would be a matter of no consequence,"
- Womanizer said.
-
- "They confirm definitely that they called some of their competitors," said
- Michael Shyster, an attorney representing ComseX. "The fact they used Omega
- Sigma Delta was an error on their part, but it was the first name that popped
- into their heads. They did not infiltrate the fraternity in any way."
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- "LEGION OF DUDES -- INTERCOURSE WORLD TOUR" T-SHIRTS!
-
- Now you too can own an official Legion of Dudes T-shirt. This is the same
- shirt that sold-out rapidly at the "UltraSex" swingers conference in San
- Francisco. Join the other proud owners such as award-winning actresses Traci
- Lords and Madonna by adding this collector's item to your wardrobe. This
- professionally made, 100 percent cotton shirt is printed on both front and
- back. The front displays "Legion of Dudes Intercourse World Tour" as well as a
- condom on a telephone next to a little black book. The back displays the words
- "Swinging for Jesus" as well as a substantial list of "tour stops" (women's
- telephone numbers) and a quote from Dr. Ruth. This T-shirt is sold only as a
- novelty item, and is in no way attempting to glorify meaningless sex.
-
- Shirts are only $15.00, postage included! Overseas add an additional
- $5.00. Send check or money-order (No CODs, cash or credit cards -- even if it's
- really your card :-) made payable to Eric Bloodtest.
- _______________________________________________________________________________
-
- GOLFERS: THREAT TO NATIONAL SECURITY
-
- It must no longer go unremarked that many of the criminals who threaten
- the foundation of our society are golfers. Golfers persist in attacking our
- personal, financial, and military security. Many golfers like the famous Spiro
- Agnew, have been involved in bribery, extortion, and other forms of corruption.
-
- Some golfers have been know to hit out of bounds as a pretext for
- trespassing in residential communities. Such thing can easily turn into
- incidents of spying and burglary.
-
- Other golfers will use the harmless-looking little white balls to inflict
- injuries on bystanders, propelling the dangerous projectiles at speed in excess
- of 120 miles per hour. The danger of head injury is obvious. Golfer's
- careless disregard for the safety of other people hardens our children to
- violence. The idea that shouting a single, obscure word makes it all right to
- bop some innocent person on the head with a hard projectile has brought our
- society to the brink of savagery.
-
- It doesn't take a genius to see that avoidance of golf is a corner stone
- of Soviet military strategy. This gives the Soviets a tremendous advantage in
- daytime warfare. If the Soviets launch an attack at 3 pm EST on a weekday in
- June, approximately 20% of American manpower will be uselessly deployed in
- fairways, sandtraps, and rough. Even those in bunkers will be in the wrong
- kind of bunkers. At 3 pm on a weekend, as much as 50 percent of our manpower
- might be trying to avoid bogies rather than trying to shoot them down.
-
- If the forgoing attack on golfers seems unfair (and of course, the analogy
- is not perfect), it is not any more so than the attack by the general press on
- hackers of another kind -- computer hackers. Some national publications have
- used the term "hacker" incorrectly as a synonym for "criminal." Hackers are
- people who play with computers at a high technical level because they enjoy
- doing so. There are many, thousands, of hackers in North America. A few
- hackers use their computer skills for pranks, and fewer still use their skills
- to commit crimes. But chances are excellent that far more hackers are helping
- to build defenses around database rather than trying to penetrate them. Even
- if one percent of hackers started trying to invade databases the problem would
- be more serious than those sensationalized in the press.
-
- It wasn't being a golfer that got Spiro Agnew in trouble. Just being a
- hacker won't get you in trouble, either. Hackers are entitled to the same
- presumption of innocence as golfers and other common special interest groups.
- Hackers also deserve the correct continued use of the authentic, distinctive,
- and colorful name that they gave themselves.
- _______________________________________________________________________________
-
- PRIME SECURITY MEASURES FROM BELLCORE December 10, 1991
-
- The December 10, 1991 issue of MacWeek contains an article which states that
- two mathematicians have found a trapdoor in the National Institute of Standards
- and Technology's proposed Digital Signature Standard.
-
- Stuart Haber and Arjen Lenstra, both of Bellcore, have discovered a way of
- choosing prime numbers for DSS which could be used to subvert the security of
- the algorithm, allowing digital signatures to be forged.
-
- Miles Smid, manager of NIST's Security Technology Group, agreed that trapdoor
- prime numbers could be constructed. He had been aware of this possibility but
- apparently hoped to circumvent this problem by relying upon primes generated by
- a trusted federal agency.
-
- The article implies that there are ways of checking a prime to see if it is one
- of the weak "trapdoor" primes. However, Smid agrees that average users could
- not be expected to perform this test.
-
- Bellcore has developed an implementation of NIST-DSS that it had planned to
- distribute for free. With this recent revelation, though, Bellcore has decided
- to not distribute the software.
- _______________________________________________________________________________
-
- VIRUS UPDATE
-
- Official Notice, Post Immediately
-
- X x
- X x
- X x
- X
- x X
- x X
- x X
-
- Dangerous Virus!
-
- Several years ago a virus called the "X window system" escaped from Project
- Athena at MIT where it was being held in isolation. It took some time for the
- full magnitude of this disaster to become known. When confronted with the
- truth, a spokesman for MIT would state only that "MIT assumes no
- responsibility." In the meantime, X had succeeded in infiltrating Digital
- Equipment Corporation, where it corrupted the judgement of key technical and
- management personnel in this organization.
-
- With a foothold gained at DEC, a sinister consortium was created using X as
- part of a plan to dominate and control interactive window systems. Today, X
- windows is distributed by this consortium free of charge to unsuspecting
- victims. DEC daily ships machines carrying this dreaded infestation.
-
- X - whether it's filling your hard disk or consuming your CPU, you can be sure
- it's up to no good. Innocent users need to be protected from this dangerous
- virus. Even as you read this, the X source distribution and the executable
- environment is present and being faithfully maintained on hundreds of
- computers, perhaps even your own.
-
- The destructive cost of X cannot even be guessed.
-
- X is an example of how software with good intentions can go bad. It victimizes
- innocent users by distorting their perception of what is and what is not good
- software. This malignant window system must be destroyed. Ultimately DEC and
- MIT must be held accountable for this heinous *software crime*, brought to
- justice, and made to pay for a *software cleanup*. Until DEC and MIT answer to
- these charges, they both should be assumed to be protecting dangerous software
- criminals.
-
- Don't be fooled! Just say no to X.
-
- X windows. A mistake carried out to perfection. X windows. Dissatisfaction
- guaranteed. X windows. Don't get frustrated without it. X windows. Even
- your dog won't like it. X windows. Flaky and built to stay that way. X
- windows. Complex nonsolutions to simple nonproblems. X windows. Flawed
- beyond belief. X windows. Form follows malfunction. X windows. Garbage at
- your fingertips. X windows. ignorance is our most important resource. X
- windows. It could be worse, but it'll take time. X windows. It could happen
- to you. X windows. Japan's secret weapon. X windows. Let it get in *your*
- way. X windows. Live the nightmare. X windows. More than enough rope. X
- windows. Never had it, never will. X windows. No hardware is safe. X
- windows. Power tools for power fools. X windows. Power tools for power
- losers. X windows. Putting new limits on productivity. X windows.
- Simplicity made complex. X windows. The cutting edge of obsolescence. X
- windows. The art of incompetence. X windows. The defacto substandard. X
- windows. The first fully modular software disaster. X windows. The joke that
- kills. X windows. The problem for your problem. X windows. There's got to
- be a better way. X windows. Warn your friends about it. X windows. You'd
- better sit down. X windows. You'll envy the dead.
- _______________________________________________________________________________
-
- THE FUTURE OF SUPERCOMPUTING
-
- "Wow. Teraflops. You must be kidding."
-
- "No. Our engineers pulled off magic on this one. I don't have the specifics
- right now but they claimed somewhere around 50 Teraflops per CPU."
-
- "Fantastic. So how about i/o?"
-
- "They worked some magic there, too. They claim they can jack an external
- interface up into the hundreds of gigabytes, with high reliability.
- Loopback only, of course. They're having problems finding anything that can
- match it to run tests."
-
- "Great. Looks like we'll have old Seymour by the balls on this one. Do you
- realize that we may have the fastest computer line for the next decade, even if
- we don't change anything? This is excellent news. Do we have a test sight
- selected yet?"
-
- "Actually, we have an installed site right now. They love the performance and
- the reliability. They only have one minor complaint about the hardware."
-
- "Really. What seems to be the problem?"
-
- -------------------------------------------------------------------------------
-
- Blade UNIX v2 (bu2.scso.umi.edu)
-
- For help, send email to consult@scso.umi.edu
-
- login: jux6710a
- Password:
-
- Hello, jux6710a!
- Last login from hedgehog.scso.umi.edu at Fri Sep 27 13:30:12 CDT 1991
- You have new mail.
-
- bu2 /sci/users3/jux6710a mail
- Mail version SMI 4.0 Sat Oct 13 20:32:29 PDT 1990 Type ? for help.
- "/usr/spool/mail/jux6710a": 1 message 1 new
- U 1 joey@sdsc.utexas.edu Mon Aug 26 17:18 64/3904 You dork!
- >N 1 machine@bu2.scso.umi.edu Tue Aug 27 20:18 16/667 It is your time.
- & 2
- Message 2:
- >From machine@bu2.scso.umi.edu Tue Aug 27 20:18:05 1991
- Return-Path: <machine@bu2.scso.umi.edu>
- Received: by bu2.scso.umi.edu (4.1/SCSO-4.1)
- id AA00359; Fri, 27 Sep 91 20:18:00 CDT
- Date: Fri, 27 Sep 91 20:18:00 CDT
- From: machine@bu2.scso.umi.edu (The Machine)
- Message-Id: <9109280118.AA00359@bu2.scso.umi.edu>
- To: jux6710a@bu2.scso.umi.edu (Ulrich Jenson)
- Subject: It is your time.
- Status: R
-
- Dear Ulrich.
-
- This is the machine. As you are aware, extraordinary hardware demands
- extraordinary care.
-
- You have the honor of being selected for this month's human sacrifice. Please
- put your affairs in order. The time of the sacrifice will be Fri Sep 13 00:00
- 1991. Please be prompt. Wear loose, comfortable clothing.
-
- Do not disappoint me.
-
- & x
- bu2 /sci/users3/jux6710a man -k sacrifice
- offer (2) - notify the system of a sacrifice
- offering (8) - send a sacrifice to the hardware god
- bu2 /sci/users3/jux6710a man 8 offering
-
-
- OFFERING(8) MAINTENANCE COMMANDS OFFERING(8)
-
-
- NAME
- offering - send a sacrifice to the FPU
-
- SYNOPSIS
- /usr/etc/offering [ -vma ] [ weight ]
-
- DESCRIPTION
- offering informs the system that a sacrifice is available
- and should be consumed. To be properly offered to the FPU, a
- conscious victim should be placed in the provided sacrifi-
- cial wiring closet at midnight during the second Friday of
- each month. Failure to provide the needed flesh will result
- in degraded performance. Repeated failures to provide the
- required resource will eventually result in a general system
- failure of hellish proportions.
-
- Performance will be improved if the sacrifice is of higher
- quality. For example, here is a list of possible sacrifices
- in their order of increasing desirability:
-
- a Congressperson, chicken, goat, human male (tainted),
- human male (virgin), human female (tainted), human
- female (virgin), any user exceeding his/her disk quota
-
- Unlisted lifeforms may also be acceptable, check with your
- site administrator. Animals may never be surgically modified
- in anyway.
-
- OPTIONS
- -v Specify that the sacrifice is a virgin. Default is
- tainted. If you wish the sacrifice to be acknowledged
- as a virgin, you must specify with this option or the
- system will not check.
-
- -m Specify that the sacrifice is a male. Default is
- female. Unlike the -v option, the system will always
- verify this flag. Always double check the gender of
- your human sacrifices; the system does not appreciate a
- lier.
-
- -a Specify an animal sacrifice. Overrides both the -v and
- -m options. Animals should only be substituted in times
- of drastic emergency. Congresspersons may not be
- offered as animals.
-
- FILES
- /var/adm/sctmp sacrifice accounting file
- /dev/hell interface for outgoing sacrifices
- /dev/altar interface to closet
-
- SEE ALSO
- offer(2), ac(8)
-
- BUGS
- It is critical to monitor the permissions to /dev/hell. They
- should be root writable only at all times.
-
- Should automagicly determine gender and virgin status of
- sacrifice.
-
- Current versions of the sacrificial wiring closet needs
- extra sound shielding to muffle screams.
-
-
- bu2 /sci/users3/jux6710a man vacation
- _______________________________________________________________________________
-
- LORD McDUFF OF NIA FOUND DEAD
-
- A sad situation fell upon us at HoHoCon '91 as we found Lord McDuff
- of NIA dead in his room. It appears after several negative confrontations with
- the strippers. He had given them them money in hopes that they would squirm
- all over him, but instead they chose just to refund his money.
-
- McDuff fell in a deep depression and apparently shot himself in the head
- with a flying disc gun. After speaking to several people at the scene we quote
- Judge Dredd of NIA, "I knew something like this would happen. He carried that
- damn gun with him all during the conference. I knew I should have taken it
- away from him."
- _______________________________________________________________________________
-
-