home *** CD-ROM | disk | FTP | other *** search
Text File | 2002-05-27 | 145.2 KB | 3,288 lines |
- ╒══════════════════════════════════════════════════════════════════╕
- │The HAVOC Technical Journal - http://www.thtj.com - │▒
- └──────────────────────────────────────────────────────────────────┘▒
- ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
-
- Vol. 1 | No.12 | July 1st, 1997 | A HAVOC Bell Systems Publication
-
- <AnonymousLammah> wHuTz UnIx? iS tHeRe A vErSiOn fOr wInDoWz 95?
- _____________________________________________________________________________
-
- -[The HAVOC Technical Journal Issue 12]-
- Editorial..............................Scud-O
- Bringing Back The Old School...........Revelation
- Basic Crypto...........................Scud-O
- Meridian Mail..........................grinchz
- Breaking into BCTel vans & Get Away....eclipse
- Nokia Cellular Programming Info........Keystroke
- Little Crypting System.................memor [HBS]
- A Story................................discore
- Slacking and not getting caught........SpookyOne
- Phreaking for some europeans...........memor [HBS]
- [ C Tutorials: Introduction to C ].....Fucking Hostile
- Oddville, THTJ.........................Scud-O
- The News...............................KungFuFox
- Phonecalls.............................THTJ
- Logs...................................THTJ
-
- -------------------------------------------------
-
- [ thtj.com has arrived! ]
- Ok, after the closing of antionline, i decided that it was time to
- move up and get out own domain name. I am still formulating the site, and we
- are still waiting for the Majordomo for subscribers to use to get thtj setup,
- but by next month, subscribe@thtj.com should be up. Now i just need to set up
- a CGI and a form for the webpage.
-
- [ A Note for HBS members ]
- Ok, since the majordomo is not up, and we are never all on IRC, and
- im busy as shit working, you all need to e-mail me at scud@thtj.com and tell
- me what you want for an e-mail at thtj.com . also tell me if you need web
- space on thtj.com.
- _____________________________________________________________
-
- The HAVOC Technical Journal - Information
- - Editor in Chief : Scud-O, scud@thtj.com
- - Assitant Editor : KungFuFox, mazer@cycat.com
- - Submissions Editor: Keystroke, keystroke@thepentagon.com
- - THTJ email address: thtj@thtj.com
- - THTJ website: http://www.thtj.com
- - THTJ mailing address: PO BOX 448 Sykesville, MD 21784
-
- The HAVOC Technical Journal Vol. 1, No.12, July 1st, 1997.
- A HAVOC Bell Systems Publication. Contents Copyright (⌐)
- 1997 HAVOC Bell Systems Publishing. All Rights Reserved.
- No part of this publication may be reproduced in whole or
- in part without the expressed written consent of HAVOC
- Bell Systems Publishing. [No copying THTJ, damnit.]
-
- The HAVOC Technical Journal does in no way endorse the
- illicit use of computers, computer networks, and
- telecommunications networks, nor is it to be held liable
- for any adverse results of pursuing such activities.
- [Actually, to tell you the honest to goodness truth, we
- do endorse that stuff. We just don't wanna get in trouble
- if you try it for yourself and something goes wrong.]
-
-
- For infomation about using articles published in THTJ, send mail to:
- e-mail: thtj@thtj.com
- mail: THTJ
- c/o HBS
- PO Box 448
- Sykesville, MD 21784
- _____________________________________________________________
- [Editorial : by Scud-O] The Old School
-
- During the past month, on #sin, Revelation had a long talk with me
- about the old school. Rev is a great person, and with his connections, power,
- and skills, i believe that he can help bring back the 'old school'. Right
- below this editorial, is Revelation's mission, and i want you all to read it.
- His look into the 'underground' is so true. Last month I almost brought to you
- all 'state of the underground' editorial, but after the offer from some people,
- i felt that it was time to first denounce selling out. i was going to publish
- my little state of the underground speech this month, but after Rev gave me
- his article on bringing back the underground, well i killed my state of the
- underground speech since his covers everything i wanted to talk about, and
- more.
- Revelation does provide so many revelations into the underground that
- so many people can not, or do not see. Many of the so called hackers,
- phreakers, anarchists, warez d00ds that are just so k-R4d 3reet should be
- ashamed of themselves. hacking and phreaking are not about messing with
- innocent people's lives, it is about helping the system, about telling
- sysadmin's about thier's problems, it is about shutting down a child porno
- site like Rev talks about. It is until we do things like this that we can
- regain respect for ourselves. Until then we will continue to go further and
- further down the hole until we can no longer see the light, the light towards
- honor, and respect and trust, those things which do not exist in today's
- underground. Until we become ethical, we will continue to be arrested in
- record numbers. And as for anarchists, well i will not even begin to talk
- about them, since i could spend hours rambling about anarchists.
- Hacking and phreaking were started to expand one's mind, and with
- the standard of today's hackers and phreakers, we are not expanding our minds,
- we are simply following cookbooks with step by step instruction on how to
- achieve our ends. Minds ARE being closed, and that is something that can not
- happen, for once we close our minds we are done for. closing our minds allows
- for people to control us, like Ingsoc and Big Brother ( read 1984 by George
- Orwell if you dont know what I am talking about ) , and this can not happen,
- for if it does, we are all doomed.
- In closing, i hope i have not depressed to too much, and I would like
- to thank Revelation and all of AS for thier goal of bringing back the old
- school, and i wish them well, they are a fine bunch of people, and they will
- succeed in thier goal. And if they ever need any help from me, or thtj/hbs,
- just let us know, we will be glad to help.
-
- Scud-O , Founder, and Editor in Chief of THTJ
-
-
- +----------------------------------------+
- Scud-O and HBS would like to hear your views on this issue.
- Please feel free to e-mail us at: scud@thtj.com
-
- ----------------------------------------------
- / ---/ --/ / / | /------/ / /
- /--- /-----/------/-----/ / / /
- /----------/ /--------/
- -of HAVOC Bell Systems-
-
- scud@thtj.com | http://www.thtj.com
-
- _____________________________________________________________
- In other news, FREE lurk3r, and
- e-mail Scud-O on you idea if he should expose Wal-Mart's computer
- and communication systems, since Wal-Mart is the ruiner of cities
- small and large, and they care nothing about the small business
- person. e-mail scud@thtj.com with a yes or no.
- _____________________________________________________________
-
-
- ███████████████████████████████████░░
- █ █░░
- █ BRINGING BACK THE OLD SCHOOL █░░
- █ By: █░░
- █ Revelation █░░
- █ LOA - AS █░░
- █ www.hackers.com █░░
- █ █░░
- ███████████████████████████████████░░
- ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
-
-
-
- Ah, yes...the Old School. Those of us who have been around for a little
- while remember it well. The time where knowledge gatherer's were respected
- because of their hard work and skills. We weren't dishonered by virii
- spreaders and e-mail bombers...we were free...freedom. Has a nice ring to
- it doesn't it? Well, these days freedom is becoming less important, and
- crashing the government is taking priority. Why? I'll tell you why...
- because of hype, plain and simple. People are no longer interested in
- expanding their minds...they're interested in closing it. What ever happend
- to the belief in Utopia...the freedom that unites us all? We're losing it...
- that's what happend. We're losing it...the only damn thing that made me get
- involved in the Underground is slipping away. Of course, there will always
- be, no matter what, ways to expand your mind. But why are we letting the one
- thing that we all care about get away? This I cannot I answer...but I can
- provide a solution...a means to bring back the old school ethics of non
- destruction, Utopia, and freedom. We still have the power to return the
- Underground to what it was originally meant to be...free, ethical, and
- informative.
-
- Bringing back the old school ways will be by no means easy. It will take
- long, hard work from each of us...but it will be worth it. Let's return the
- Underground to its' original form, let's bring back the old school. In this
- article I am take one step toward this freedom of the old school ways. This
- step will be AS (Axis Security). A group of people who want to return the
- respect and honesty back to the hacker name. A group of people who aren't
- interested in spreading virri, e-mail bombing, carding, and software piracy.
- We simply want to expand our own minds, and the minds of others'...while
- bringing about a return to the old school ways of the Underground.
- Our organization is made up of 8 members, no more, no less.
-
- These members are:
-
- Revelation - revelation@mail.hackers.com
- Ed Wilkinson - ed.wilkinson@mail.hackers.com
- Hyper Viper - hv@mail.hackers.com
- Phreaked Out - phreakedout@mail.hackers.com
- Phreak Show - phreakshow@mail.hackers.com
- Brimstone - brimstone@mail.hackers.com
- Fallout - fallout@mail.hackers.com
- Samurai7 - samurai7@mail.hackers.com
-
- This hand-picked group of hackers will begin the long awaited first step
- towards the New School...a return of the Old School. We propose and
- challenge you to follow in our footsteps with ethical hacking. Be the kind
- of hacker that makes people respect you, not be afraid of you. No more
- destructive virri spreading, e-mail bombing, and software piracy. Begin this
- first step with us and follow us. The New School era has begun...help us
- push it forward. Help us promote ethical hacking, by promoting it yourself.
- It is only by your will that we will enter this New School era...no one
- person can do it, we all must do it.
-
- Ask yourself what you want to accomplish by being a hacker? Do you want to
- make the "ultimate hack"? Do you want to hack a government web page? Well,
- try this instead...hack a child pornography page if your going to hack a
- web page...notify System Administrator's of their security flaws...write
- programs and text files that describe how to protect from attacks, not how to
- accomplish the attack. That is how we are going to expand our minds. By
- fixing current problems and security flaws we bring about new standards, and
- with these new standards comes new problems. It's a neverending circle that
- will make us all wiser and more helpful to society, instead of being
- destructive to it. All we ask is for your support...help us bring back the
- Old School...welcome to the new era...the era of ethics and greatness among
- hackers...welcome to the New School...
-
- In closing I would like to thank The Havoc Technical Journal for publishing
- this article...we are now one step closer to our goal because of them. I
- would also like to thank Scud-O for his support of my views and of those of
- the Old School. I would also like to thank the man who made all of this
- possible, the man who is the very definition of "true hacker"...Ed Wilkinson.
- Without Ed and his aid in the creation of AS, this wave of ethics may never
- have taken place. I would also like to thank Hyper Viper for being of
- termendous help and support. Shoutouts to everyone at AS, L0pht, S.I.N.,
- GkOS, THTJ, OTRiCS, Silicon Toad (for all your help and support),
- Phreaked Out, VC, Teknopia, Haknet, Stealth, #psychotic, LOA, LOD, Phrack
- (for being a terrific magazine), 2600 (for believing in freedom and having
- the guts to publish it), and everyone I forgot.
-
- If your leaving this article still believing in the destructiveness that
- nearly consumed the Underground...believe what you will...but the Old School
- is back, and badder than ever.
-
-
- Written By:
-
- Revelation (AS)
- Axis Security - www.hackers.com
- "Bringing Back The Old School...One Hacker At A Time."
-
-
- [ EOF ]
- _______________________________________________
- [ Basic Crypto ] by Scud-O
-
- --------------------------------------------
- -_Basic Cryptology_-
- --------------------------------------------
- Information and Pascal (yuck) Code by Scud-O
- --------------------------------------------
-
- I. Introduction
-
- This article is made to present you, the reader with the beginnings
- of cryptology. This is not made to fully describe every aspect of crypto. I
- am mainly dealing with very, very basic crypto such as substitution or
- transposition. For details on encryption methods such as idea, des, blowfish,
- etc. look for it in other future articles.
- I plan for at least 2-3 articles on basic crypto, this month covering
- beginning crypto such as substitution or transposition, next month to cover
- bit manipulation ( NOT, AND, OR, XOR, etc) and after that, maybe get into
- blowfish, idea, and other algorithms.
-
- II. Types of Ciphers
-
- First off, there are about a million different forms of ciphers and
- encryption methods that can be made, but for this month, the 2 methods i will
- discuss are substitution and tranpositition. substitution ciphers replace one
- character with another character, but leaves the message in the same order.
- However, transposition ciphers scramble the characters of a message according
- to some rule. These types of ciphers can be used at whatever level you feel
- like, and can also be intermixed. Another technique, which will be covered
- next month is bit manipulation, which has become popular with the use of
- computers.
- All three of these methods use a key. The key, of course is used to
- 'unlock' the message that is encrypted.
-
- III. Words to remember
-
- ciphertext : the encrypted text, for example: MJQQT, YMNX NX F YJXY.
-
- plaintext : the decrypted text, ie: HELLO, THIS IS A TEST.
-
- -------------------subs1.pas
- PROGRAM Subs1;
- (* simple substitution cipher. *)
-
- type
- str80 = string[80];
-
- var
- inf, outf : str80;
- start : integer;
- ch: char;
-
- PROCEDURE code(inf, outf: str80; start: integer);
-
- VAR
- infile, outfile: file of char; (* should just use text instead.. *)
- ch: char;
- t: integer;
-
- BEGIN
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
- if (ch>='A') and (ch<='Z') then
- begin
- t := ord(ch)+start;
- (* Wrap around *)
- if t > ord('Z') then t := t-26;
- ch := chr(t);
- end;
- write(outfile, ch);
- end;
- Writeln('File coded');
- close(infile);
- close(outfile);
- end;
-
- PROCEDURE decode(inf, outf: str80; start: integer);
-
- VAR
- infile, outfile: file of char; (* should just use text instead.. *)
- ch: char;
- t: integer;
-
- BEGIN
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
- if (ch>='A') and (ch<='Z') then
- begin
- t := ord(ch)-start;
- (* Wrap around *)
- if t < ord('A') then t := t+26;
- ch := chr(t);
- end;
- write(outfile, ch);
- end;
- Writeln('File decoded');
- close(infile);
- close(outfile);
- end;
-
- begin
- write('enter input file: ');
- readln(inf);
- write('enter output file: ');
- readln(outf);
- write('starting position (1-26): ');
- readln(start);
- write('code or decode (C or D) ');
- readln(ch);
- if upcase(ch)='C' then code(inf,outf,start)
- else if upcase(ch)='D' then decode(inf,outf,start);
- end.
-
-
- input: hello, this is a test. i hope it works.
- output: MJQQT, YMNX NX F YJXY. N MTUJ NY BTWPX.
- output2: HELLO, THIS IS A TEST. I HOPE IT WORKS.
-
-
- Now while this may fool the casual reader, it would not fool anyone
- with some knowledge of crypto, and this code would be broken in a few minutes.
- One problem with this cipher is that it leaves the spaces in place. To make
- this more 'secure' we should include the space. ( We should also include all
- punctuation and numbers, as well as uppercase letters, but i am going to leave
- that to you do to if you want to. )
-
- For example, take the alphabet:
-
- abcdefghijklmnopqrstuvwxyz<space>
-
- and change it to:
-
- qazwsxedcrfvtgbyhnujm ikolp
-
-
- Now while this may not seem to make this cipher more secure, it does
- since now there are 27 factoral ( 27! ) instead of only 26! ways for this
- cipher to use. In case you did not know, 6! would be 6*5*4*3*2*1 which equals
- 720, therefore, 26! is a larger number, and 27! is an even greater number.
-
- example:
- meet me at sunset
-
- would become
- tssjptspqjpumgusj
-
- now, would you like to have to break that code? i dont think so.
-
-
- -------------------subs2.pas
- program subs2;
-
- type
- str80 = string[80];
-
- var
- inf, outf : str80;
- alphabet,sub : str80;
- ch: char;
-
-
- { this function returns the index into the substitution cipher. }
- function find(alphabet: str80; ch: char): integer;
-
- var
- t:integer;
-
- begin
- find:= -1; { error code }
- for t:= 1 to 27 do if ch=alphabet[t] then find := t;
- end; { find}
-
- { just like the c function, isalpha() }
- function isalpha(ch: char): boolean;
-
- begin
- isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z');
- end; { isalpha }
-
- procedure code(inf, outf: str80);
-
- var
- infile, outfile: file of char; { should just use text instead..}
- ch: char;
-
- begin
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
- if isalpha(ch) or (ch=' ') then
- begin
- ch := sub[find(alphabet, ch)];
- { find substitution }
- end;
- write(outfile, ch);
- end;
- Writeln('File coded');
- close(infile);
- close(outfile);
- end; {code}
-
- procedure decode(inf, outf: str80);
-
- var
- infile, outfile: file of char; { should just use text instead.. }
- ch: char;
-
-
- begin
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
- if isalpha(ch) or (ch=' ') then
- ch := alphabet[find(sub, ch)];
- { replace with real alphabet again }
- write(outfile, ch);
- end;
- Writeln('File decoded');
- close(infile);
- close(outfile);
- end; { decode }
-
- begin {main }
- alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ ';
- sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP';
- write('enter input file: ');
- readln(inf);
- write('enter output file: ');
- readln(outf);
- write('code or decode (C or D) ');
- readln(ch);
- if upcase(ch)='C' then code(inf,outf,start)
- else if upcase(ch)='D' then decode(inf,outf,start);
- end.
-
- Now, while this is a harder code to break, this is still easily
- breakable by a frequency table of the english language. Looking for the most
- common letter in the ciphertext will show you which letter is 'e' , since e
- is the most common letter in the alphabet.
- To make this just a little bit more confusion, lets throw in another
- round of subsititution. If you are really bored you can take this to the next
- step, and keep adding more and more levels of subsitution, but if you do end
- up doing that, there is seriously something wrong with you!
-
- -------------------subs3.pas
- program subs3;
-
- type
- str80 = string[80];
-
- var
- inf, outf : str80;
- alphabet,sub : str80;
- ch: char;
-
-
- { this function returns the index into the substitution cipher. }
- function find(alphabet: str80; ch: char): integer;
-
- var
- t:integer;
-
- begin
- find:= -1; { error code }
- for t:= 1 to 27 do if ch=alphabet[t] then find := t;
- end; { find}
-
- { just like the c function, isalpha() }
- function isalpha(ch: char): boolean;
-
- begin
- isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z');
- end; { isalpha }
-
- procedure code(inf, outf: str80);
-
- var
- infile, outfile: file of char; { should just use text instead..}
- ch: char;
- change : boolean;
-
- begin
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- change := TRUE;
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
-
- { switch alphabets with each space }
- if ch=' ' then change := not change;
- if isalpha(ch) then
- begin
- if change then
- ch := sub[find(alphabet, ch)];
- { find substitution }
- else
- ch := sub2[find(alphabet, ch)];
- { second sub }
- end;
- write(outfile, ch);
- end;
- Writeln('File coded');
- close(infile);
- close(outfile);
- end; {code}
-
- procedure decode(inf, outf: str80);
-
- var
- infile, outfile: file of char; { should just use text instead.. }
- ch: char;
- change : boolean;
-
- begin
- assign(infile, inf);
- reset(infile);
- assign(outfile, outf);
- rewrite(outfile);
-
- change := TRUE;
- while not eof(infile) do
- begin
- read(infile, ch);
- ch := upcase(ch);
- { switch alphabets on a space }
- if ch=' ' then change := not change;
- if isalpha(ch) then
- begin
- if change then
- ch := alphabet[find(sub, ch)];
- { replace with real alphabet again }
- else
- ch := alphabet[find(sub2, ch)];
- { second sub }
- write(outfile, ch);
- end;
- Writeln('File decoded');
- close(infile);
- close(outfile);
- end; { decode }
-
- begin {main }
- alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ ';
- sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP';
- sub2 := 'POI UYTREWQASDFGHJKLMNBVCXZ';
- write('enter input file: ');
- readln(inf);
- write('enter output file: ');
- readln(outf);
- write('code or decode (C or D) ');
- readln(ch);
- if upcase(ch)='C' then code(inf,outf,start)
- else if upcase(ch)='D' then decode(inf,outf,start);
- end.
-
- Ok, so before i go, this multi-encryption makes it much harder since
- at each space, the sub is changed, making frequency tables somewhat
- useless. I hope you enjoyed this article, and tune in next month for
- transpostion ciphers and bit-manipulation. cya.
-
- Scud-O
-
-
-
-
-
-
- -[ Meridian Mail : by grinchz ]-----------------------------------------------
-
- - Forew0rd -
-
- After a few weeks of searching for any info on phreaking the Meridian
- Mail system I realized there was basiclly none to be found. So
- natuarlly I went to work on my skoolz system and discovered what tha
- menus where and some other lil' neeto tid bits of info on what tha
- system it self is. ( i stole a little bit of the menuing system info
- and info on hacking it from some lil' thing i happened to find on da
- web )
-
- - About The Merdian Mail System -
-
- Meridian Mail is not just a stand alone system. Its actually and add
- on for Meridian switches made by Northern Telecom and also from
- British Telecom (UK Only). Tha system is very expensive averaging
- 2000 UK Pounds for a low end model.
-
-
- - Spoting a Meridian Mail System -
-
- Well spoting an MM is kinda hard but not to hard. The easiest to spot
- is the mail collection setup. This is when you dial the system and a
- digitized womens voice sez, " Welcome To Meridian Mail". And then
- followed by "Mail Box #?" and of course "Password?". The second setup
- is sounds just like an answering machine. When called it picks up and
- plays a msg for u. To get out of the recording simply hit "*" then
- press "#" and u will get a list of all options. To get to the login
- prompts press "81". Next is call routing which basiclly gives you a
- menu like "Press 1 For Butt sex" , "Press 2 For Sex w/ Muppets" , etc.
- Some these are pains in tha ass and u have to wait for the msg to end
- before u can get into tha fun but others will let u hit "*" and then
- press "#" to get the options and "81" to get to tha Login prompt. The
- last type of system is outgoing msg only. They Really Suck Stay Away
- From Them! U cannot use anything on them.... (probably cuz someone else
- already got to it :P).
-
-
- - The Guess 'n' Check -
-
- So u found an MM somewhere and u wanna get into it? Well here are a few
- things I learned while fucking around with my skoolz setup:
-
- +there is no set mail box #
- but is usually 4 digits
-
- +default passwd is the msg #
- also try mail box # backwards
-
- +passwd's are 4-16 digits in length
-
- +if u get in its kewl :P
-
- - The Menu's -
-
- From a mail box
-
- 0 - Operator Assistance
- 1 - Rewinds the current message about 10 seconds
- 2 - Play message
- 3 - Fast Forwards the current message by 10 seconds
- 4 - Previous Message
- 5 - Record, used when composing or forwarding a message.
- 6 - Next Message
- 7 - Message Commands(Sub Menu)
-
- 0 - Message Options (Sub Menu, can only be used on outgoing
- messages)
-
- 1 - Urgent, tag a message for urgent delivery.
- 2 - Standard, tag a message for standard delivery.
- 3 - Economy, tag a message for economy deliver.
- 4 - Private, tag a message private (private messages cannot
- be forwarded to other users)
- 5 - Acknowledgement, tag a message for acknowledgement,
- you'll be send an acknowledgement message when the message
- is received.
- 6 - Timed Delivers, specify a time and date for delivery.
-
- 1 - Reply, sends a message to the sender of the message. Can only
- be used on incoming messages from mailboxes on the same system.
- 2 - Play envelope - Gives all the details of the messages, such
- as who its from, time, if it was urgent, attached messages etc.,
- etc.
- 3 - Forward, forward the message to another user. 4 - Reply All,
- record a message to all the senders of the messages in your
- mailbox.
- 5 - Compose, compose a message to other users, either just one, a
- distribution list, or several boxes.
- 6 - Delete, deletes message, or if used on an deleted message
- restores it.
- 9 - Sends a message you've just recorded.
-
- 8 - Mail Box Commands (Sub Menu)
-
- 0 - Mailbox Options (Sub Menu) (Not always available on earlier
- versions of the software)
-
- 1 - Change Operator Assistance Number
-
- 1 - Login, enters the login process.
- 2 - Greeting (Sub Menu)
-
- 1 - External, record a greeting to be played to external
- callers.
- 2 - Internal, record a greeting to be played to internal
- callers.
-
- 3 - Log-off
- 4 - Password Change, change your password, enter your new
- password twice and your old password.
- 5 - Distribution Lists, create distribution lists.
- 6 - Goto, goto a message number in your mailbox.
- 9 - Personal Verification, record a personal verification which
- will be played instead of your mail box number to message
- recipients.
-
- 9 - Call Sender, when used on an incoming message will dial the
- extension of the sender, if the number is known.
-
- - Fun Stuff -
-
- Once you work your through the system if your allowed to Change
- Operator Assistance Number you will rool. Then you can change that #
- to wut eva u want say you wanna call Keystroke for instance ( :P~~~ )
- change tha # to XXX-XXX-XXXX and then go back into your box and hit
- "0" and voila! you have a dial-out to abuse and call ur friends.
-
- - Final Notes -
-
- Phew! I hope this satisfies you peoples fer muh first article.... I
- want to thank some guy named substance ( i unno who he is :P ) for
- writing out the menus so I didnt have to go thru and type all of
- them.... and thats about it see ya'll in #phreak.... latez
-
- grinchz@hotmail.com
- supplier of fine meats
- UIN: 1441903
-
- -[ EOF ]--------------------------------------------------------------------
-
- Breaking Into the BCTel Van - By eclipse.
-
- Ok, I'm sure you all heard about the first time cind3r and I broke
- into a Bctel Van, but I don't know if you heard about the time I did
- just a week ago. It's pretty lame, but its 1:30 am, and I can't get to
- sleep. Well, here's the story.
-
- So, It was about, 11 at night, and my friends had just gone home, and
- my other 2 friends were at a party. So, I went to the fence, which had
- some shitty aluminum linking from the last time it got victimized. In
- about 5 minutes, it was completely gone, and there was a hole in the
- fence from top to bottom. It was about 11:30 now, and I knew my friends
- would be out of the party at about 12. I decided to wait outside for
- them to pass my house, and they did. They wanted to help me with the van,
- but they had to go home, so me, trying to be all 31337 in front my my
- friends, got some porcelin and tried to break the window. That didn't
- work, so before they left, I got my crowbar. One hit, and *Bang*, a
- second, and *smash*. The window was broke, and I bolted across the street,
- and back to my house. I laid low for an hour or so, and then went back. It
- was all dark and quiet, so I figured it was safe. I looked in... one
- lineman's, one cb radio, and a box with assorted little goodies. I took the
- linemans and dumped it off at my house. Then, I went back and grabbed the
- box. It had 10 dollars in quarters in it, some BCTel stickers, and some phone
- boxes and shit. I sat under the lights of the store across the street from my
- house and looked over my findings, putting them in a bag. Then, knowing it was
- quality, and not quantity that I wanted, I went back for one more thing: the
- cb radio. I ripped it out of the van and was on my way out of the van when
- another linemans caught my eye. It was in the back of the van, so I had to
- reach across the van, with all that broken glass, and open the sliding door.
- I went back, and got the linemans, along with a nice, new telephone. I went
- home and went to sleep.
-
-
- Get away - By Eclipse.
-
- Tonight, while trying to start up a conf, I got a little more exercise
- than I had expected and wanted. I had already been there before: the store
- with 10 phone lines, 4 rural (8 city) blocks away from my house. I had
- unsuccessfully tried to start a conf, and not wanting to end the night without
- one, I decided I would go back. So, I got back, just as the sun had gone down
- over the mountains. It was fairly dark out, and I was safe with my linemans.
- I had JUST hooked it up, and called cind3r, expecting to start my 3,4,5,6,
- and eventually 10 way call. About 5 seconds (literally) into the call, a car
- pulls up, high beams on and everything. A male driver and a female passenger.
- "What are ya doin?" he asks. "Nothing" i say to him as i swear at cind3r and
- hang up on him. Paniked, I yanked my phone cord, and stuck it in my bag. "Oh,
- I know what you're doing, you little shit!" he yells, as i take off on my
- rollerblades, probably faster than I have ever gone in my life. I look back,
- and see him chasing after me on foot, but he was still a good 20 feet back,
- so I kept on going full tilt. I saw him run back to his car, and I knew I had
- some time to hide, but, bah, I was on a stretch with all houses. No bush. I
- saw him creep up behind me, following back in his car, about 5 feet behind me.
- He picked up a cell, he called the police, I would imagine. I turned down a
- street to get onto the slower street that wasn't on the highway. He was
- following me, close enough he could have probably reached out of his window
- and grabbed me. I was going fairly slow now, very out of breath from booting
- it 4 blocks already. I was one block away from my house, but I was at the
- other end of the street. I saw a car trying to turn onto the road, and I went
- in front of it, which turned down the road, giving me just a few seconds, but
- at the same time, a long time to get ahead of the guy. So I blade up the road,
- and turn off down the dirt and rock path. It was about 20 feet long, running
- the whole way on rollerblades. I almost fell a couple times. I looked back
- behind me, and saw the guy chasing after me. I laughed at him, and kept going.
- I was only 1 house away from my house. I got around the corner, and I saw him
- turn around and head back to his car. I was safe. I ran into my house and down
- the stairs, hot, sweaty and out of breath, while trying to explain why "i had
- to come home from James's house." Thats my story, the closest I have ever
- gotten to getting caught for phreaking. Thank god I didnt. I had more then
- enough shit with me for a possible stay in Juvy :). Including the linemans I
- had stole a week earlier from BCTel.
-
-
-
-
- _____________________________________________________
- Nokia Cellular Programming Info - Brought to you by Keystroke
-
- FOR AUTHORIZED DEALER USE ONLY
-
- NOKIA 2160 SERIES CELLULAR TELEPHONE NAM PROGRAMMING INSTRUCTIONS
-
- The Nokia 2160 Series handportable CMT uses an EEPROM NAM that can be programmed directally from the standard keypad. In order to
- access the NAM, you must enter the special access code currently programmed into the phone. Once the programming mode is accessed, NAM
- parameters are loaded by entering them into the display and "storing" them to selected memory locations. Be sure to obtain all parameters before
- proceeding.
-
- EASY NAM PROGRAMMING
- 1. Turn the phone on.
- 2. Enter the NAM access code. Access code is: *#639#
- 3. Verify the display now reads "Cellular number" and enter the 10 digit MIN for the phone.
- 4. Press the softkey under the word "OK" in the display. If less then 10 digits are entered an error message will prompt you to reenter
- the number
- 5. Verfit the display reads "Enter code" and enter the five digit SID followed by four zeros. (Example 001750000 is a SID of 175 followed
- by four zeros.) An error message will display if an incorrect entry is made. Do not add more than four zeros to the code.
- NOTE: Change the Lock code by adding a pound sign and new lock code after the code. (example: 001750000#7788. Lock code=7788)
- Change the Language by adding a pound sign and new language code after the code (example: 001750000#2. Language = 2)
- Language code: 0 (default) = English, 1 = French, 2 = Spanish, 3 = Portuguse
- Change the Lock code and Language code by seperating each set of numbers by a pound sign. (example: 001750000#7788#2) The
- SID =00175, Lock code = 7788, Language = 2 (Spanish)
- 6. Press the softkey under the word "OK" in the display.
- 7. The display will tell you that the activation was OK and instruct you to power off, then on again. When the phone powers back
- up, it will automatically select the correct system (A or B)
-
- ACCESS NAM PROGRAMMING MODE:
- 1. Turn the phone on.
- 2. Enter the NAM access code. Factory default is: * 3 0 0 1 # 1 2 3 4 5
- 3. Enter the softkey [Menu]
- 4. If this screen appears, ----------------- you have entered the access code correctly.
- | Field Test |
- | > NAM 1 |
- | NAM 2 |
- -----------------
- SELECTION FROM THE MAIN LEVEL MENU (FIRST LEVEL OF NAM MENU):
- 5. Press the scroll key up or down repeatedly until the desired main menu selection is displayed. Select from:
-
- NAM 1 NAM 2 NAM 3 Security Code Emergency Number SW version
- Serial No. Programmed Field Test
-
- 6. Press softkey [Select] to access the level menu for the your main selection. {Note from Key: They made that typo :P!}
-
- PROGRAMMING NAM'S 1 THROUGH 3 (SECOND LEVEL NAM MENU):
- 7. Press the key up or down to scroll through the selected NAM information list. Select from:
-
- HOME SYSTEM OWN NUMBER PSID/RSID LISTS (Note 1) CHANGE DEFAULTS
- CHANGE DEFAULTS"
- NAM STATUS ACCESS METHOD LOCAL OPTION PRIMARY PAGING CH
- SECONDARY PAGING CH DEDICATED CCH A DEDICATED CCH A NBR DEDICATED CCH B
- DEDICATED CCH B NBR OVERLOAD CLASS GROUP ID REAMING STATUS
- A-KEY
-
- 8. If the value is incorrect, press the softkey [Select] and use the numeric keypad or key to make any needed changed.
- 9. Enter softkey [OK] to save the value.
- 10. Repeat steps 7 through 9 for the remaining NAM info items to be viewed and/or changed.
- 11. To program NAMs, press [Quit] to return to the Main Menu list. Select NAM 2 or NAM 3. Once the Home System ID and Own
- number are programmed, the phone will automatically set the NAM Status to enabled.
-
- PROGRAMMING THE SECURITY CODE:
- 12. From Main Level Menu use the key to select the "Security" menu, press [Secect] and the current 5-digit security code will appear in the
- display. Default is 12345
- 13. If you wish to change the Security code at this time, use the numeric keys to change the value.
- 14. Press the softkey [OK] to store changes.
-
- PROGRAMMING EMERGENCY NUMBERS:
- 15. From Main Level Menu use the scroll key to select the "Emergency" menu, press the softkey [Select] to enter the emergency numbers.
- EMERGENCY NUMBER 1 (911) EMERGENCY NUMBER 2 (*911) EMERGENCY NUMBER 3 (None)
- 16. If you wish to change the displayed value, use the numeric keys to make
- changes. Use the scroll key to select the emergency number you wish to
- change and press [Select].
- 17. To change the value, press softkey [OK].
- 18. Press [QUIT] to exit the menu.
-
- <OTHER SIDE OF PAGE>
-
- 2160 Programming Continued:
- SW VERSION:
- 19. From the Main Level Menu use the scroll key to display the "SW version" menu, press [Select] to view software version, date, and product
- type.
- 20. Press [Quit] to exit the menu.
-
- SERIAL NUMBER (ESN):
- 21. From the Main Level Menu, use the key to display the "Programmed" menu.
- 24. Press [Select] and enter a four digit number that corrispondes to the month and year the phone is sold. Example (mmyy)
- 0197 = January 1997, 0996 = September 1996.
- NOTE: This menu location can be programmed only one time. Once that date had been entered it cannot be changed, Any attempt to enter the
- menu once it had been programmed will receive a short beep and the message "DATE ALREADY STORED".
-
- EXIT NAM PROGRAMMING:
- 25. To exit the NAM programming mode, turn off the phone and leave it off for five seconds.
-
- FIELD TEST:
- 26. The FIELD TEST MODE is used to investigate how the phone is reacting to the cellular system. The FIELD TEST
- information covers signal strength, battery changing status, cellular state and encryption status. The information is organized
- to display information relating to Analog Control Channels, Digital Control Channels, Analog Voice Channels, and Digital
- Voice channels. All the information provided in the FIELD TEST display is in accordance with IS136.
- For further information about the FIELD TEST mode, contace Nokia Customer Service at 1-800-456-5553 and ask for Nokia
- Field Service Bulletin ?????.
- 27. To activate the FIELD TEST mode you must first be in NAM programming. Instructions for entering NAM programming are on
- the opposite side of this page. Use the following steps to enable the FIELD TEST mode.
-
- 28. From the main menu use the scroll key to display the "FIELD TEST" menu and press the softkey [Select]. Use the
- key to select Enable and press the softket [OK].
-
- 29. Turn 2160 off then back on. Once the power up self test is complete, the FIELD TEST display will begin automatically.
- Scroll through the different displays using the scroll key.
-
- 30. To disable the FIELD TEST mode. Return to NAM programming and disable the function under the FIELD TEST menu.
-
-
- PROGRAMMING PSIDS AND RSIDS:
- The Nokia 2160 provides the option to program Private (PSIDs) and Residential (RSIDs) System ID's as perscribed by IS-136.
- The PSID/RSID list is programmed to support selection/reselection processes, system selection and SID display functions. Programming the
- PSID/RSID list is part of the NAM programming menu. All three NAMs have their own PSID/RSID list. Follow these instructions to program
- the PSID/RSID lists.
-
- 1. Enter the NAM programming menu and select NAM 1 (or the desired NAM). (Note: PSID/RSID is currently only avilable in the NAM 1
- location. PSID/RSID is included in NAM 2 and 3 for future use.)
- 2. Use the scroll key to display "PSID/RSID LISTS" and press [SELECT].
- 3. Use the scroll key to select the P/RSID 1 or the desired P/RSID (1 through 5). Press the [SELECT] softkey.
- 4. Each list contains:
- System type Select Private or Residential system type.
- PSID/RSID System ID for the Private or Residential system. Indicates which PSID/RSID the mobile will respond to.
- System ID Connected System ID. The SID the PSID/RSID is connected to.
- Alpha Tag The name of the Private or Residential SID.
- Operator Code (SOC) This is the System Operator Code. (US-McCaw Cellular = 001 (dec), Canada - Rogers Cantel Inc. = 002 (dec),
- and McCaw Cellular Communications (for international) = 2049 (dec).
- Country Code Enter the country code of the PSID/RSID.
-
- Keystroke
-
-
- _____________________________________________________________
-
- ************************
- *Little Crypting System* memor [HBS]
- ************************ ***********
-
- 1 / Why that little cryptography system
- ***************************************
-
- Well a few years ago, i was studying cryptography systems (Hill, Rabbin,
- Rsa ,Des, Vigenere..) and i thought it was funny to make my own "little"
- and easy crypting system in that country nammed France where the encoding
- systems are forbidden when the key and method you use for it arent given
- to the french governement.. i called it Random Routines, because its a
- stupide system using a random string as key to crypt.
-
- 2 / How it werks?
- *****************
-
- It only uses that key composed for instances of 26 caracters:
- AZERTYUIOPQSDFGHJKLMWX CVBN
-
- caracters with a cursor position:
-
- AZERTYUIOPQSDFGHJKLMWX VBN
- 1 5 1 1 2 2
- 0 5 0 6
-
- for making that caracters string that is as long as you want it can
- go from 26bytes to .. hm (the longest i did was 32kbytes).
-
- a little programm using C++ random functions or basics rnd can do it
- i guess that one can work (i didnt tryed it)
-
- #include <stdio.h> /* for presentation shit */
- #include <time.h> /* for a Borland C++ random command use */
-
- void makekey()
- {
- printf("Making da key\n");
- unsigned char key[32000];
- for(int i=0;i<32000;i++)
- key[i]=random(255);
- printf("Key made\n");
- }
-
- the second thing to have is of course the original text to crypt:
-
- the string to crypt here will be for instance "HELLO"
-
- using a rotating method on the key i'll first crypt the H:
-
- AZERTYUIOPQSDFGHJKLMWX VBN
- 1 5 1 1 2 2
- 0 5 0 6
-
- 1
- 6
-
- H is the pos 16.. the first crypted thing will be the number 16
- after from that H, i'll crypt the e (pos will move and the pos1 will start
- on the H)
-
- AZERTYUIOPQSDFGHJKLMWX VBN /* note that its a rotating position at the
- 1 1 2 21 5 11 string end, it continues on the string
- 2 5 0 6 01 begining */
-
- from the H, i'll go to the E .. i'll get pos 14..
- the begin of the "brute" crypted thing is 16,14..
- i'll continue to crypt now from the E to the L
-
- AZERTYUIOPQSDFGHJKLMWX VBN
- 221 5 1 1 2 2
- 56 0 5 0 4
-
- from the E, i'll go to the L .. i'll get pos 17..
- the begin of the "brute" crypted thing is 16,14,17..
- i'll continue to crypt now from the L to the L
-
- AZERTYUIOPQSDFGHJKLMWX VBN
- 9 1 1 2 221 5 8
- 2 5 0 56
-
-
- from the L, i'll go to the L .. i'll get pos 1..
- the begin of the "brute" crypted thing is 16,14,17,1..
- i'll continue to crypt now from the L to the O
-
- AZERTYUIOPQSDFGHJKLMWX VBN
- 9 1 1 2 221 5 8
- 2 5 0 56
-
-
- from the L, i'll go to the L .. i'll get pos 17..
- the begin of the "brute" crypted thing is 16,14,17,1,17..
- i'll continue to crypt now from the L to the O
-
- well finally, the crypted "numerous" string will be
- 16,14,17,1,17
-
- well next step is to use only a little "decalage" crypting system from
- "hidding" like +1,+1,+1,+2 on all the numbers we get
-
- 16,14,17,1,17
- + + + + +
- 1 1 2 2 1
- -------------
- 17,15,19,3,18
-
- the next step will be to crypt thoses numbers in letters will a 2nd
- key like.. hmm..
-
- ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789
- 1 5 1 1 2 2 3 3 3
- 0 5 0 5 0 5 7
-
- 16 will be O
- 15 will be N
- 19 will be R
- 3 will be C
- 18 will be Q
-
- so the finally crypted string will be "ONRCQ"
-
- now tell me how to found without knowing that crypting method that
- "HELLO" == "ONRCQ" ?
- and the keys are of course easy to find when they are of 26 30 bytes, but
- imagine that the key are 32000bytes.. i guess its a bit harder to find
- the right key and the good crypting method..
-
- for 32000 bytes.. hmm .. lucks are 1/(255^32000) == really little!
-
- crypting ratio is 1:1.. for 1 uncrypted byte, you get 1 crypted byte.
- but of course you need 2 keys.
-
- 3 / Making that system a bit more complex :
- *******************************************
-
- well i will include in it the Source coming and the destination , thoses
- are in 2 caracters that the spies will choice..
-
- Kevin who is sending the crypted message "HELLO" to Oscar choose the "name"
- KN .. he knows Oscar name which is "FK".
-
- for that, i'll separate the crypted text with RN caracters.
- it will be RNxRNxRNxRNxRNxRNxRN <- x are the crypted bytes.
- so the crypted "HELLO" will be now RNORNNRNRRNCRNQRN
-
- we will put the first letter of Kevin "name" before the first RN , it
- will gives:
-
- KRNORNNRNRRNCRNQRN
-
- we will now put the second letter of Oscar "name" just after that one,
- it will gives :
-
- KKRNORNNRNRRNCRNQRN
-
- we will put the first letter of Oscar "name" just after the last RN , we
- will get
-
- KKRNORNNRNRRNCRNQRNF
-
- and we will put finnaly the 2nd letter of Kevin name just at the end of
- the string, we will finnaly have :
-
- "KKRNORNNRNRRNCRNQRNFN" is the final crypted string.
-
- that RN and name thing will be like a checksum, because if you
- receive a msg without crypted letters under RN and with a bad source and
- destination name, i guess that the crypted text is not for you and that
- your keys wont work for decrypting it.
-
- another little checksum will be the 1st key string lenght at the end of
- the crypted text. Our 1st key is 26 bytes long.
-
- 2nd key :
-
- ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789
- 1 5 1 1 2 2 3 3 3
- 0 5 0 5 0 5 7
-
- 2 is the B and 6 is the space.. so now the crypted string will be:
-
- "KKRNORNNRNRRNCRNQRNFNRNB "
-
- 4 / so now, for a spy how to guess that "KKRNORNNRNRRNCRNQRNFNRNB "
- *******************************************************************
- == "HELLO" ?
- ************
-
- well i'll use that thing nammed "Crypt-Analysis"
-
- "KKRNORNNRNRRNCRNQRNFNRNB "
- --**x**x**x**x**x**--**--
-
- i'll see that "RN" are repeated.. especially in the middle string,
- so i'll know that the letter upper to the x will be crypted letters.
-
- i'll think probably that the letters uppers to the -- will be some
- checksum thing or key making shit..
-
- so i wont be really advanced, i'll only know that:
-
- "KKFNB " <- its checksum or keymaking shit.. maybe KK are checksum and
- "FNB " are key making shit, or "KK" key making and "FNB " checksum , or
- no checksum and only key making, or checksum without key making... i'll
- be damn LOST!
-
- i'll know that ONRCQ will be some crypted text with a key, maybe 2 keys,
- maybe 3 keys??! here too, i'll be totally lost.
-
- the only thing i'll really know is that RN are only here for separating
- the crypted thing parts... but how all that thing works? LOST LOST LOST!
-
- well i made that cryptography system for fun, if u have any question,
- i coded it a few years ago on AtariSt systems with 256 bytes key ,
- it was nammed rndrt.lzh if u have C coding questions too..
- mail me in memor@mygale.org
-
- memor [HBS]
-
- _____________________________________________________________
- ººº-Slacking and not getting caught-ººº
-
- I'm going to murder all of you. Now that I got that out of the way on
- with the article. Are you like me, do you go to a high school (or any school)
- that has computer lab using Novell netware and some windows companion like
- "USERNET"?. If you do then good, but if you don't here is what USERNET, or
- other similar Novell windows companion's are about. The idea behind "USERNET"
- is that once the user is logged in he/she can not execute any other program
- besides those that are available (ones that have icons). But if your like me
- and are tired of hearing the instructor telling you run Microsoft windows tour
- or make a Pascal program that adds integer's then I have got a great way of
- slacking and not being caught. First off, all the things I'm going to tell
- you are good for doing what you want on a "USERNET" system, but is no
- substitute for just hacking the admin, or booting up without "USERNET" into
- DOS prompt, but both of these ways run the risk of you being caught slacking.
- So here we go. You have logged into "USERNET" and are doing whatever pathetic
- thing the instructor told you to do, now most school's have courses in HTML
- or just have web access, so Netscape navigator is available to run. RUN IT.
- Now once your in, go to options/general preferences and then to the APPS
- section. Once there look for a dialog box called "Telnet Application".
- Obviously this box is used to point to the external Telnet program the
- Netscape calls on when it is requested by the user. Now put any executional
- that you want into the box and it can be run simply by exiting options(OK)
- and typing "telnet://" then Enter in the URL box of Netscape. This tells
- Netscape to run the Telnet program, or in this case any program you have put
- into that dialog box. Now I know your saying "THAT IS THE DUMBEST THING I
- HAVE EVER HEARD IN MY INTIRE LIFE YOU FUCKHEAD", but it works and more you can
- easly switch between whatever program you ran, back to whatever your suppose
- to be doing (ALT+TAB) in a second and avoid being caught. My suggestions of
- program's to run are "C:\WINDOWS\DOSPROMT.PIF" or FileManager. If you
- thought this article was a waste of time and taught you nothing new then you
- should not have read it!
-
- So have fun, slack and take it easy.
- SpookyOne
-
- _____________________________________________________________
- A Story, by discore
- -------------------------
-
- listen kiddies!
- i have a story of mass porportions
- a garbling gaggle of great somethings
- hi! discore speaking, i got a great story to tell cause its time to piss
- some ppl off, and thats what i do best.
- it all started in a land far far away (salt lake city) about 2 months ago
- when my friend who we will call jeff started getting a slight drug
- problem. he ended up getting busted every week or so when he stole bottles
- of alchohol from his parents or something like that. then he was downtown
- at a crackhouse on like... the 15th of june, and he had a gun on him, and
- of course the crackhouse got raided, him being caught with the gun and in
- a shitnitz of trouble. so right after he was fingerprinted, all his infoz
- pulled etc he went immdiatly to my house to find me tiffany and shaun
- taking down this tent we were playing with. and he totally 100% freaks out
- at my house all starts crying and shaking. then his mom came and picked
- him up. the stupid slut that she is let him go and do what he wants the
- next day, so he is fucking durnk out of his mind and has a go kart
- (something you dont want jeff to have). so anyways, later in the day his
- mom offers me to stay up at his house that night, something that doesnt
- happen very often, of course i take the offer and me and jeff do something
- that night. in the morning im awakend by his clueless dad and 4 ppl from a
- detox program. they take jeff away that morning, on his best friends
- birthday (june 20th).
- so now the story is his m0m thinks i have a gun here, so tells my mom that
- and of course she shits a brick, i tell her to fuck off and to get out of
- my room. now heres the fun part
- the detox program that jeff is in tapped my phone line for unknown
- reasons. i cant name anything cause i plan on sue'ing the living shit out
- of this detox facility.
- the point of my story is to realize this isnt a free world anymore. you
- are owned by your law enforcement and your government. the have the power
- to kill you for no reason or lock you up in jail for the rest of your
- life. and i dont fucking like it, so you know what i say? i say fuck the
- system be yourself and listen to the doors instead of going to church!
-
- AND A BIG FUCK YOU TO JEFF'S MOM
-
- discore!
- btw... although nothing illegal is here dont rage anarchy because of this
- article, its not my fucking fault if you get shot im simb0lia or something
- because of this!
-
- _____________________________________________________________
- *****************************************
- ***Phreaking for some europeans *** memor [HBS]
- *****************************************
-
- French and european people, all thoses barbars want to phone without paying their call,
- but they HAVE NO skills in electronics , so they always, mostly ask lame questions.. so their
- is some methods that doesnt needs thoses "electronician" skills.
-
- Well the first method if u dont want to pay yer bills is blueboxing.
- ---------------------------------------------------------------------------------------------------------
-
-
- Remember thoses two mf frequencies 1st:
- ---------------------------------------------------------------------
- they are composed of two basics frequencies (its do the mf) ,a lenght of that frequencie playing and
- a little delay before playing the next frequencie.
-
- Frequencie n░1:
- --------------------------
- frequencie a:usually 2600 Hertz
- frequencie b:usually 2400 Hertz
- lenght : 150ms (random lenght)
- delay : 10ms
-
- Frequencie n░2:
- --------------------------
- frequencie a:usually 2400 Hertz
- frequencie b:usually 2400 Hertz
- lenght : 300ms (random lenght)
- delay : 10ms
-
- Some goodies for frenchz now:
- --------------------------------------------------
-
- anyways, their is for the french phreakers that old coloumbia local bluebox.. (only call drugs sellers in bogotta and
- others doodz in columbia ONLY)
-
- Number :
- ---------------
- 0800909000 (old 05909000)
-
- Frequencie n░1:
- --------------------------
- frequencie a:usually 2650 Hertz
- frequencie b:usually 2350 Hertz
- lenght : 170ms
- delay : 10ms
-
- Frequencie n░2:
- --------------------------
- frequencie a:usually 2450 Hertz
- frequencie b:usually 2350 Hertz
- lenght : 320ms
- delay : 10ms
-
- interest
- ------------
- well find a friend or a local provider in columbia, really clean line.. its an inexistant number in
- columbia (el numero no es blahblah..)
-
- and well there is another local one if u want to call a little dude in malaysia in normal 2600 2400 for the first
- frequencie.
-
- Number :
- ---------------
- 0800909140 (old 05909040)
-
- Frequencie n░1:
- --------------------------
- frequencie a:usually 2600 Hertz
- frequencie b:usually 2400 Hertz
- lenght : 170ms
- delay : 10ms
-
- Frequencie n░2:
- --------------------------
- frequencie a:usually 2450 Hertz
- frequencie b:usually 2350 Hertz
- lenght : 320ms
- delay : 10ms
-
- interest
- ------------
- well find a friend or a local provider in columbia, clean line.. operator answers.
-
- Warning:
- ---------------
-
- Don't bluebox too much , remember NHP/HI (great dude) in besanτon city who got busted for month agos for
- blueboxing and carding.(for french : but well anyways if u want to bluebox, scan 0800906000 to 0800909999 number,
- its like a bunch of foreign lame countries operators, nonexistant , busy , carding, vmb numbers.) , beforer thoses ones,
- its "industrialized countries" like USA , Britain or others..
-
-
- Well another method is the use of PBX :
- -----------------------------------------------------------------
-
- It is the thing i use mostly now, bluebox is not really secure i think and i really prefer using thoses little lame thing
- (in france) with only a little 4 digits password.
- like that one 0800901234 (easy to remember eh?) , a foreign country PBX with only 4 digits.. only 10 000 attempts and
- u'll find it.. it doesnt have fake tones or shit.. protection level : 0.
- scanning method..well easy as HELL:
-
- ATDT 0800901234,,,0000,,3336431515 to ATDT 0800901234,,,9999,,3336431515
- -------------------- ------- -------------------- --------
- \ \ \ \
- PBX number Scan is french number end of
- begining to call and to see scanning
- if the passwd works
-
- ATDT is the Dial Tone prefix for compatible Hayes modems.
- well easy to script or to programm is u have some skills of course.. i YOU don't have any skill .. well
- OR learn programming , lame scripting
- OR use ure favorite fone and dial 0800901234 , wait 6 seconds, dial 0000 wait 4 seconds, dial 3336431515
- TO
- dial 0800901234 , wait 6 seconds, dial 9999 wait 4 seconds, dial 3336431515
-
- Well another method is the use of Calling Card (YUCK):
- -----------------------------------------------------------------------------------------
-
- Uhm.. if you use windows95, if you use Compudaze or AoHell.. i guess u have the correct iq (25) to use that method
- calling card.. well i dont have to talk a lot about that.. its easy as hell..
- 1st step: go in a WAREZ channel and ask for it (dont go in #phreak because you will get banned)
- 2nd step: dial your favorite ATT or France Telecom operator
- 3rd step: a) get an american voice if u are french and say:
- ------------------------------------------------------------------------------
- "Hello i would like an international call"
- - Card Number Please?
- Dial on your phone pad or tell it "My card number is blahblahblah"
- - Phone number to call?
- "i want to call 33 36431515" and then prepare your modem with an ATD to connect the french teletel
- network and prepare to play on ure favorite lame game servers on it (mud in 1200 bauds, imagines yuck).
- (Dangerous, if u are suspected on the server you are to fraud, the system operator will call
- 0800361415 and tells that someone is frauding on his server your id on his server )
-
- b) you use a France telecom paster card.
- ------------------------------------------------------------------
- its only a device, dial your card digits and the number to call without the 33 if its in France cause u are damn
- calling local in france (Really dangerous, get busted if you dont do it from a Payfone)
-
-
- Well for easy use, only that method for you lazy people,next time i'll talk about some methods for experienced people
- i guess.. write me and ask me questions in memor@mygale.org
-
- memor [HBS]
-
- -----=====[ C Tutorials: Introduction to C ]=====----------------------------
-
- Well here it is. My Attempt to help people learn programming in C.
- Thanks to Scud-O I will be releaseing a new tutorial in each issue of THTJ.
- If you already know C then this first tutorial will not be much help to you,
- I plan on starting off with the very basics and I assume the reader has no
- current knowledge of the C language.
-
- First some basic things. You need to understand that you are not
- going to be able to write Windows programs by reading this, and there is
- no quick way to it. Windows programming is not easy and you will *not* find
- a quick guide to it. All the applications you learn to write thru this will
- be text-mode. Depending on how long I keep releaseing tutorials thru THTJ
- things will pick up the pace. You also need to know that what I tell you here
- is no different then what you would find in a beginners guide to C book. What
- is the main differnce then? Well from me it is free and if you want to go
- buy a book it about 50 dollars. Also you can communicate with me. Any
- questions you have you can always e-mail me and I will help you out.
-
- Also if I refer to certain compiler I will be refering to Microsoft
- Visual C++, because this is the compiler I use. It really doesn't matter tho
- because I have used Borland C++ and there is basically no differnce accept
- for certain options.
-
- When you write a program it always starts out with the source. You
- open up your editor and write the source for the program. The source is what
- tells your program what you want it to do. The traditional first c program
- is usually hello.c, well here is my version of it... fuckyou.c
-
- #include <stdio.h>
-
- void main()
- {
- printf("Fuck you, world!@!\n");
- }
-
-
- Now what does all that do? I will explain that in a moment. First off just
- write that in you editor. And go to build and you should see the following:
-
- --------------------Configuration: fuckyou - Win32 Debug--------------------
- Compiling...
- fuckyou.c
- Linking...
- fuckyou.exe - 0 error(s), 0 warning(s)
-
- Pretty easy huh? Now on to the next step. Compiling the program. Go to compile
- and you will see the following:
-
- --------------------Configuration: fuckyou - Win32 Debug--------------------
- Compiling...
- fuckyou.c
- fuckyou.obj - 0 error(s), 0 warning(s)
-
- Now you have done it. Your first program. All this program does is it will
- open up a DOS window and print the words "Fuck you, world!@!" If you didn't
- get this then you most likely messed up the source somewhere. That is no
- problem tho. Suppose you left out the ; after \n"). Then you would get
- this as the result of compiling:
-
- --------------------Configuration: fuckyou - Win32 Debug--------------------
- Compiling...
- fuckyou.c
- C:\Windows\Desktop\fuckyou.c(6) : error C2143: syntax error : missing ';' before '}'
- Error executing cl.exe.
- fuckyou.obj - 1 error(s), 0 warning(s)
-
- The compiler tells you where the error is. [C:\Windows\Desktop\fuckyou.c(6)]
- The (6) tells you that the error occured on line 6 of the program. And it tells
- you what the error is, missing ';' before '}'. So all you do is go back to
- the source and insert ; where it belongs in the source and try again. This time
- it should work.
-
- So now back to the original source..
-
- #include <stdio.h>
-
- void main()
- {
- printf("Fuck you, world!@!\n");
- }
-
- What does all this mean? Well I am just gonna put what each part means in the
- order they occur:
-
- #include - This is what tells the compiler to include another file along with
- your source.
-
- <stdio.h> - This is the included file with the program you just wrote. The
- file stdio.h has standard input/output commands that most programs need.
-
- void main - This has two parts. Void identified the type of function and what
- it produces. This would be main, and since main does not produce anything in
- this program you have void.
-
- () - Right now this doesn't matter. Just know that you do it. You occasionaly
- may have something in them but not now.
-
- You then have {. Everything between the first { bracket and the last } bracket
- is a function. The {} show that everything between them is a function of main().
-
- printf - This tells the program what to do. This is also one of the reasons
- you need to include stdio.h with this program. With out it the compiler does
- not understand printf.
-
- After printf you have a string (the text you wrote) include in parentheses.
- When you want to print words on the screen you will use the following:
- (" Blah blah blah \n") The \n is just showing its the end of the string and
- that you start a new line after that.
-
- The whole line ends with ; which tells the compiler that the statement ends.
- Then you finish the whole thing off with the last } bracket.
-
- So there you have it. Like I said this first one was going to be very
- basic but in following issues of THTJ I plan to move along faster and not
- get very technical with things you don't really need to know. But this is
- it for now.
-
- - Fucking Hostile (fh@sinnerz.com)
-
- _____________________________________________________________
- Oddville, THTJ - From the Mailboxes of Scud-O
-
- Ok, I think it is time for you all to read some of the lame ass and
- wierd ass mail i get from month to month. Anyway, all names have been changed
- to hide the lame ass or crazy ass people. However, next month, if you send
- ANY lame mail to my old address i will post your name, since my old address is
- no longer for h/p mail, use scud@thtj.com for h/p mail.
- My replies are inside the brackets.
-
- ---
-
- Subject:
- Starting a elite realm
- Date:
- Fri, 4 Jul 97 20:04:13 +0000
- From:
- xxx xxxxxx <xxxxxxx@xxxx.net>
- To:
- my old e-mail address
-
-
- Hey. My name is Xxx Xxxxxx and I am a Anarchist/Hacker/Phreaker
- and was wondering if you guys would like to start a club,a realm of
- Anarchists,hackers,phreakers,crackers and such if you will.The wanna be
- members would fill out a form and we would review it and then decide to
- let them in or not.If you agree to what I am proposing I would gladly be
- the Memebership reviwer and a hard working memeber.Write Back Asap
-
- [ five minutes of uncontrolable laughter... ]
-
- [ One word : NO. Gee i just love this 'great' idea of yours. First of, i have
- no fucking clue who you are, and 2, i told people to leave my old e-mail the
- fuck alone! ]
-
- ---
-
- Subject:
- [Fwd: Shotgun rules]
- Date:
- Wed, 2 Jul 97 22:19:53 +0000
- From:
- psych0
-
- just passing stuff along.....
- for reference, section II, #6... all i have to say is: "jabba"
-
- -psych0
- ----------------------------
-
-
- Subject:
- Shotgun rules
- Date:
- Wed, 2 Jul 97 08:20:15 +0000
- From:
- disantis@fr.com
- To:
- comedy@fatboy.geog.unsw.edu.au
-
-
- The rules listed below apply to the calling of Shotgun (the passenger seat) in
- an automobile. These rules are definitive and binding.
-
- Section I
- The Basic Rules
-
- 1. In order to call Shotgun, the caller must pronounce the word "Shotgun" in a
- clear voice. This call must be heard and acknowledged by the driver. The other
- occupants of the vehicle need not hear the call as long as the driver verifies
- the call.
-
- 2. Shotgun may only be called if all occupants of the vehicle are outside and
- on the way to said vehicle.
-
- 3. Early calls are strictly prohibited. Shotgun may only be called while
- walking toward the vehicle and only applies to the drive immediately
- forthcoming. Shotgun can never be called while inside a vehicle or
- stilltechnically on the way to the first location. For example, one can not get
- out of a vehicle and call Shotgun for the return journey.
-
- 4. The driver has final say in all ties and disputes. The driver has the right
- to suspend or remove all shotgun privileges from one or more persons.
-
-
- Section II
- Special Cases
-
- These special exceptions to the rules above should be considered in the order
- presented; the case listed first will take precedence over any of the cases
- beneath it, when applicable.
-
- 1. In the instance that the normal driver of a vehicle is drunk or otherwise
- unable to perform their duties as driver, then he/she is automatically given
- Shotgun.
-
- 2. If the instance that the person who actually owns the vehicle is not
- driving, then he/she is automatically given Shotgun, unless they decline.
-
- 3. In the instance the the driver's spouse, lover, partner, or hired prostitute
- for the evening is going to accompany the group, he/she is automatically given
- Shotgun, unless they decline.
-
- 4. In the instance that one of the passengers may become so ill during the
- course of the journey that the other occupants feel he/she will toss their
- cookies, then the ill person should be given Shotgun to make appropriate use of
- the window.
-
- 5. In the instance that only one person knows how to get to a given location
- and this person is not the driver, then as the designated navigator for the
- group they automatically get Shotgun, unless they decline.
-
- 6. In the instance that one of the occupants is too wide or tall to fit
- comfortably in the back seat, then the driver may show mercy and award Shotgun
- to the genetic misfit. Alternatively, the driver and other passengers may
- continually taunt the poor fellow as they make a three hour trip with him
- crammed in the back.
-
-
- Section III
- The Survival of the Fittest Rule
-
- 1. If the driver so wishes, he/she may institute the Survival of the Fittest
- Rule on the process of calling Shotgun. In this case all rules, excepting I-4,
- are suspended and the passenger seat is occupied by whoever can take it by
- force.
-
- 2. The driver must announce the institution of the Survival of the Fittest Rule
- with reasonable warning to all passengers. This clause reduces the amount of
- blood lost by passengers and the damage done to the vehicle.
-
- Please follow the above rules to the best of your ability. If there are any
- arguments or exceptions not covered in these rules, please refer to rule I-4.
-
- -----------------------------------------------------------------------------
-
- END OF ARTICLE
- **************
-
- To join the comedy list, send the command:
-
- subscribe comedy
-
- in the body of a message to "majordomo@fatboy.geog.unsw.edu.au".
-
- [ Im not sure why i posted this, but who cares, its pretty funny. ]
-
- ---
-
- Subject:
- Proggie
- Date:
- Sat, 28 Jun 97 02:46:56 +0000
- From:
- XxxxXxxx@aol.com
- To:
- my old e-mail address
-
-
- hey i have a question
- do you have any proggies or programs that actually tos someone off
- line....the reason i ask is because soemone tossed me and i want that program
- if you have on. What happed was he IMed me very fast and it made aol mess
- up! Can you send that program to me?
-
- Please
- Xxxxx
-
- [ Look, im not going to waste my time looking for some program for you, and
- i do not have any icmp or other type of nuking programs on my hard drive. go
- do a search on yahoo or lycos or something. and, you might not get tossed off
- line so much if you got off of aol. ]
- ---
-
- Subject:
- http://www.sinnerz.com/scud-o/ [ <- old address, thtj.com now ]
- Date:
- Tue, 24 Jun 97 01:57:46 +0000
- From:
- xxxxxxx@xxxxxxx.xxxxxxx.xx
- To:
- my old e-mail
-
-
- wondering how to subscribe your zine
-
- [Ok, this is for you and the countless others who have asked for info on how
- to subscribe, go to http://www.thtj.com in a few days, and scroll down to the
- form that should be up and enter your e-mail address this will add you to the
- majordomo e-mail list, if my hosting server ever decides to set up the
- majordomo. if there is no form, there should be instructions next to the
- picture of the guy with the coffee maker in his car. ]
- ---
-
- Subject:
- THTJ
- Date:
- Sun, 22 Jun 97 13:04:46 +0000
- From:
- "xxxxxx xxxxxx" <xxxxxxxx@xxxxxxx.com>
- To:
- old e-mail address
-
-
- Scud-O
-
- Just thought i'd drop you a line and say how great THTJ is.
- I've read every edition and spent many a happy hour playing with toys.
- Keep up the good work :)
-
- BTW What's the deadline for submitting articles for each issue?
-
- Do you have any cool contacts in the UK?
-
- [ Ok, once again, for you and all the people who have asked, the deadline for
- aritcles for each issue, is around the 23rd to the 25th of each month, and the
- issue will be released on the 1st of the folling month. We do like to get
- articles in ASAP, so send it in when it is done, and we will add it in right
- away. ]
-
- ---
- From: xxxxxxxxxxxxxxxxxxx
- To : hellcore@juno.com
- Sup:
-
-
- Where can I find your tech. manuals?
-
- bye
-
- [ Once again, to the number of people who have asked me, hellcore is not going
- to publish any manuals for a LONG time, since we are so damn busy with thtj.
- so quit bugging me! ]
-
-
- ---
- From: xxxxxx@aol.com
- To: hellcore@juno.com
-
- do u have the password for havoc
-
- [ What the FUCK? ]
-
- ---------------
- Well this is it for this month's installment of Oddville, THTJ , which is
- in no way related to Oddville, MTV.
- ---------------
- ----------------------------------------------
- --------------
- --=[The News]=--
- Compiled & edited by KungFuFox
- --------------
-
- 1 : Bellcore signs MOU with World Communication Group to explore...
- 2 : AT&T CEO to argue merits of Baby Bell tie-up
- 3 : U S West pulls high-speed, low-cost service, angers ISPs...
- 4 : AOL "Snoops On Members' Privacy"
- 5 : Netscape bug illustrates risky world of Net security
- 6 : Netscape fixes flaw, foils blackmail threat
- 7 : McNealy Injects Java With $150 Million
- 8 : NTT Gets Carved Up Into Three Carriers
- 9 : Spy Agency Wants To Sell Advice
- 10: Hacker Vows 'Terror' for Child Pornographers
- 11: The Ultimate Caller ID
- 12: Poll: U.S. hiding knowledge of aliens
- 13: Computer group unites to break computer code But it took 4 months
- 14: Senate Votes to Outlaw Bomb-Making Info
- 15: AT&T, Baby Bell Knot "Unthinkable"
- 16: Hackers' Dark Side Gets Even Darker
-
- Serpentor (rlb@ts60-06.tor.iSTAR.ca) has joined #phreak
- <Serpentor> Is it true that all teenagers who use irc
- regularly are virgins who can't get laid
- <Serpentor> Well, stud that I am, I often find it
- necessary to go for months, no, years, without a date
- or even talking to girl - but instead choosing to sit
- at a computer screen 18 hours a day - my head growing
- out of my neck at a 90 degree angle, personal hygiene
- and a social life sacrificed for the purpose of finding
- somem new pbx's.
- <Serpentor> But other than that I women basically
- consider me to be a sex symbol.
- [#phreak - home of the studliest guys on IRC!]
- _____________________________________________________________
-
- Bellcore signs MOU with World Communication Group to explore wireless local
- loop opportunities in China
- June 9, 1997
-
- SINGAPORE -- Bellcore International and World Communication Group announced
- today that they signed a Memorandum Of Understanding (MOU) to explore the
- possibilities of deploying wireless local loop and mobility networks
- throughout China. The two companies announced this during Asia Telecom 1997.
-
- Under the terms of the memorandum, WCG would serve as system integrator and
- general contractor. Bellcore would provide consulting services to WCG on a
- variety of issues, including planning and engineering, integration testing
- and training. Bellcore would also supply software products such as mobility
- and network management products.
-
- "We have every expectation that Wireless Local Loop (WLL) service and
- technology will help meet unmet demand for telephone services throughout
- China," said Peter Wang, WCG's president and CEO. This MOU with Bellcore, a
- world-class provider of communications software with in-depth network
- knowledge, is a very important first step. Now we look forward to increasing
- the number of signed agreements with hardware suppliers and winning numerous
- new deployment contracts.
-
- At the basis of the memorandum is Personal Access Communications System, or
- PACS, an outgrowth of Bellcore Technologies. PACS services are a low-cost,
- wireline-quality alternative to conventional wireless services. They are
- particularly well-suited to densely populated areas, such as urban and
- suburban environments.
-
- "We believe our MOU with WCG marks a great beginning," said Kevin Connolly,
- president of Bellcore International. "Our wireless telecommunications
- software and consulting expertise is complemented by WCG's system integration
- strengths, on the ground sales, service and engineering staff, and track
- record in China. We're excited about working with them to make PACS WLL and
- mobility services available in China, arguably the world's largest potential
- telecom market."
-
- Bellcore International is a wholly owned subsidiary of Bellcore. Bellcore,
- based in Morristown, New Jersey, USA, is a leading provider of communications
- software, engineering and consulting services based on world-class research.
- Bellcore provides business solutions that help information technology work
- for telecommunications carriers, businesses and governments worldwide. On
- November 21, 1996 SAIC (Science Applications International Corporation)
- announced it had agreed to purchase Bellcore when the requisite regulatory
- approvals had been obtained. More information about Bellcore is available on
- the Web at www.bellcore.com.
-
- WCG is a fast growing wireless telecommunication company headquartered in
- Hazlet, New Jersey. It is a leading distributor of wireless telephony (fixed
- wireless) equipment and also a major service provider in China. The majority
- of its products and services focus on wireless local loop technology and
- wireless payphones.
-
- ⌐Business Wire
- _____________________________________________________________
-
- AT&T CEO to argue merits of Baby Bell tie-up
- June 9, 1997
- By Eric Auchard
-
- NEW YORK (Reuter) - AT&T Corp Chairman Robert Allen plans to defend a
- possible merger between AT&T and a Baby Bell local phone carrier in a
- luncheon speech Tuesday before an exeuctive group in Boston, the company
- said.
-
- An AT&T spokeswoman said Allen's comments on such a potential merger will be
- "hypothetical" and that he will not comment on recent media reports that AT&T
- is in talks to merge with SBC Communications Inc., a leading U.S. Baby Bell.
-
- Sources familiar with those talks have confirmed that the two companies have
- been holding substantive talks in recent months on a combination that could
- be valued at more than $50 billion, in what would be the largest merger in
- history.
-
- Both companies have declined to comment on the reports.
-
- A union of SBC and AT&T would combine a mighty provider of local phone
- services with the nation's leading long-distance powerhouse in the first such
- merger since the 1982 federal order breaking apart the Bell phone system
- monopoly.
-
- Allen is set to deliver the speech before the Chief Executives Club at the
- Boston Harbor Hotel.
-
- He will discuss the pros and cons that a merger with a regional local phone
- operator might give AT&T, the spokeswoman said.
-
- Among the questions he will address are whether there is any way in which a
- merger could be in keeping with the spirit of recent efforts to deregulate
- the phone industry, and the U.S. Telecommunications Act of 1996 in
- particular, she said.
-
- He will confront widespread antitrust concerns such a mega-merger might raise
- by arguing that a combination with a regional Bell company could actually act
- to spur greater competition in U.S. telecommunication markets, she said.
-
- "Is such a hypothetical merger that unthinkable? Is there any way in which
- it could actually function to spur local competition?" the spokeswoman said,
- referring to topics to be raised by Allen in his speech.
-
- "The main thing will be to firmly reiterate our commitment to competition
- and set the record staight on that," she said. "He certainly is going to
- address how significant we consider entry into the local service market."
-
- Jeffrey Kagan, an industry analyst based in Atlanta, speculated, "Tomorrow
- will probably be an effort to soften the criticism that reports of AT&T's
- merger talks with SBC have inspired."
-
- Critics have argued an AT&T merger would delay the advent of increased
- competition in local U.S. phone markets and note that SBC retains
- near-monopoly status in seven states in the Southern, central and Western
- United States, including the region served by SBC's recently acquired Pacific
- Telesis Group unit.
-
- "Everybody is thinking of every reason why it can't happen," Kagan said of
- the initial public reaction to AT&T's reported merger talks. "Allen will
- argue everything that could possibly go right with such a merger."
-
- He said Allen may sketch a potential plan to open up local phone markets to
- competition by splitting Baby Bell operators into separate wholesale and
- retail operations.
-
- The wholesale unit would then sell its services to both competitors and to a
- combined AT&T-Baby Bell local service retail operation, Kagan said.
-
- The plan would be designed to answer U.S. regulators' concerns that the
- market be "irreversibly open" to competition before Baby Bells are allowed
- into the U.S. long-distance phone market, he said.
-
- ⌐Reuters Ltd. All rights reserved.
- _____________________________________________________________
-
- U S West pulls high-speed, low-cost service, angers ISPs, according to
- 'Inter@ctive Week'
- June 6, 1997
-
- GARDEN CITY, N.Y. -- U S West Communications, the $13 billion communications
- giant, is discontinuing a service that allows competing telephone companies
- and Internet service providers to offer high-speed services at low prices,
- according to a story posted on the Website of Inter@ctive Week.
-
- The move is drawing the ire of the Internet community.
-
- U S West, which does business in 14 Great Plains and Pacific Northwest
- states, has stoped leasing "dry copper" lines in seven or eight of its
- states, and is working to pull the plug in its remaining service areas,
- according to the Inter@ctive Week report.
-
- Dry copper lines -- also known as Local Area Data Service, or LADS -- are
- standard twisted pair copper lines that are in place but aren't hooked up to
- provide telephone service. The lines, which use a low-powered signal are used
- for such things as security alarms and are relatively cheap to lease from U S
- West -- as low as $20 per month.
-
- In recent months, however, Internet service providers, or ISPs, and
- competitive local exchange carriers, or CLECs, have bought dry copper lines
- to resell to business customers equipped with Digital Subscriber Line, or
- xDSL, modems, devices that allow for fast Internet access.
-
- By cutting off the low-cost resale of dry copper lines, however, U S West
- effectively cuts off competitive provision of xDSL service at prices below
- what the telephone company wants to charge. U S West's Interprise Networking
- Services group, meanwhile, is slated to offer its own xDSL service this
- summer.
-
- Ray Guadia, director of AZAP Inc., a Las Vegas-based company that specializes
- in secure store and forward data transfers sees the move as an effort by U S
- West to protect artificially high prices for other services, such as its T-1
- service at 1.5 Mbps.
-
- "It is not in the telcos' advantage to allow that wide bandwidth access under
- the 1996 telecommunications law because customers who are currently leasing
- (dedicated) T-1 for $2,000 can lease (dry copper) T-1 lines for under $100 a
- month, literally hundreds of millions of profits can switch from the telcos
- to the business community at large," Guadia told Inter@ctive Week.
-
- U S West said, however, that it's concerned about network degradation because
- these dry copper connections weren't intended to support high-speed services.
-
- XDSL signals can disrupt other services, when wires carrying both sets of
- service are bundled together within the telephone network.
-
- "The (dry copper connections) were intended to be just a signaling channel,
- like burglar alarm companies use," said Jeremy Story, spokesman for the U S
- West Interprise Networking Services group. "Essentially ISPs have latched on
- to this to create their own circuits and are providing (lots of) bandwidth
- across them. What that's doing is messing up the network," he said.
-
- Having high-bandwidth connections ruining in two directions within a central
- switching office results in what is known as cross-talk, said Joe Glynn,
- director of product marketing for megabit services, including xDSL services,
- at Interprise.
-
- Cross talk is caused by electromagnetic fields surrounding xDSL circuits that
- causes degradation on nearby cable bundles, he said.
-
- U S West is grandfathering in existing companies that are using the copper
- connections for high-bandwidth services. But that's a very limited group at
- this time, Story said.
-
- Inter@ctive Week, with a circulation of 100,000 is the leading publication
- for the Internet-involved business professional. Inter@ctive Week is
- published by Inter@ctive Enterprises LLC.
-
- ⌐Business Wire.
- _____________________________________________________________
-
- AOL "Snoops On Members' Privacy"
- 06/09/97
- By David Braun, TechInvestor
-
- WASHINGTON û America Online snoops into its subscribersÆ incomes and details
- of their children, selling the information aggressively through a broker to
- third parties, a consumer watchdog group charged Monday.
-
- At a press conference to coincide with this weekÆs hearings by the Federal
- Trade Commission on online privacy issues, the editor of Privacy Times, Evan
- Hendricks, said he had spoken to at least 10 members of AOL, "and not one of
- them was aware this could be happening to them."
-
- While AOL users may be in the dark, the company has made it quite clear to
- investors that it expects to market its members. And AOL shares have surged
- recently on stronger-than-expected earnings and speculation that the company
- would be announcing more marketing deals to profit from its members.
-
- Hendricks published a front-page article in the latest edition of Privacy
- Times which said Reston, Va.-based AOL had turned to traditional direct
- marketing techniques to learn about its 8 million subscribersÆ incomes,
- length of residence, age and children.
-
- "Then it aggressively sells its subscriber list through a broker, which can
- break it out into various segments."
-
- Consequently, Hendricks added, AOL members increasingly are targeted by junk
- mailers. "The practices raise questions about the adequacy of notice that AOL
- provides its members about marketing practices."
-
- Privacy Times quoted AOL spokesperson Tricia Primrose saying the online
- service provider was not willing to give details of how much money the
- company made selling membersÆ lists.
-
- Hendricks said AOL recently put on the market a specialized list of 1.4
- million AOL members who purchase books, CD Roms, software games, AOL apparel
- from the AOL Store, direct mail and marketing. "The vast majority of AOL
- members on this specialized list are married with children living at home,
- are between the ages of 35-54, own their home, have income over $55,000, are
- at their home addresses and are credit worthy û over 90 percent pay by credit
- card," he said.
-
- The lists, which are said to be selling well, go for $110 per thousand names.
- They are marketed through a company called List Services Corp.
-
- Primrose said Monday she would comment later on HendricksÆ allegations.
-
- AOL members interested in learning about the companyÆs list practices are
- told to enter "marketing preferences" into a key-word search. The company
- tells members it "occasionally makes our membership list available to select,
- reputable companies whose products and services may be of interest to you AOL
- carefully screens all offers to its mailing list to ensure they are
- appropriate." Members are invited to list hobbies and interests they can
- check-off so they can receive information about those interests. According to
- Hendricks, none of the lists sold by List Services Corp. referenced the 15
- hobbies and interests on AOLÆs marketing preferences screen.
-
- Hendricks said personal details, such as income levels and information about
- children, are added to AOLÆs profiles by means of marketing research.
-
- AOL members are given the option to check a box on the marketing preferences
- screen to request that they do not receive any junk mail.
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- Netscape bug illustrates risky world of Net security
- June 15, 1997
- BY DAVID L. WILSON
- Mercury News Staff Writer
-
- Fifteen-year-old Tim Howe of Milpitas did millions of Internet users a favor
- in March when he identified a security hole in Microsoft's Internet Explorer
- Web browser, a flaw that might have let outsiders view data on someone
- else's computer. He says he had trouble getting the software giant to take
- him seriously, but eventually Microsoft agreed there was a problem.
-
- "I was hoping for maybe a thank you," the 10th grader said, laughing, "but
- at least they fixed it, and that was the point."
-
- It's the point for a legion of Internet bug finders these days. They range
- from self-taught youngsters to computer science professionals. Howe worked
- solo, and didn't spend a great deal of time looking for the bug. Others work
- in teams, sometimes knowing teammates only by code names, and devote many of
- their waking hours to the task. And among the teams, some have malevolent
- aims.
-
- The bug finders' work matters because your electronic privacy matters, as was
- made clear again last week with the discovery of a bug in the Netscape
- browser. Computer security is a growing issue as more and more of our
- computers become connected via networks. Bugs that leave security holes in
- Internet software can be a threat to data on all kinds of computers,
- including the ones at home.
-
- Competitive pressures, meanwhile, have led software developers to push their
- products out the door sooner than ever. There have always been bugs in
- software, but the rush to market has made them more common, experts say. In
- addition, today's programs are much larger, with more capabilities, and are
- therefore more likely to conflict with each other in ways that cause
- problems.
-
- Like many bug finders, Howe went immediately to the company with his
- findings. But some bug-hunting teams first share their findings via the Net,
- banding together to explore the severity of the problem and to cobble
- together a solution. They are hackers in the original sense of the word,
- exploring and testing new systems just for fun. Some people, including
- Eugene H. Spafford, associate professor of computer science at Purdue
- University, call those who work to repair computer security holes the
- "White Hats."
-
- Also looking for bugs -- but in ways that Spafford and other experts find
- alarming -- are more malevolent hackers, known as "crackers" or "Black
- Hats." They don't want to plug the security holes, however. They want to use
- those bugs to snoop, spy, steal and often harass. (The precise definition of
- "hacker" or "cracker" depends largely on who's using the terms; many
- crackers insist they're hackers.)
-
-
- Formality shunned
-
- In keeping with the anarchic nature of the Net itself, the White Hats have
- no formal organization. They shun the semi-official Internet security system
- that revolves about the Computer Emergency Response Team Coordination
- Center, based at Carnegie Mellon University in Pittsburgh.
-
- The White Hats and security teams are often in direct conflict, with the
- official teams trying to keep a lid on knowledge about bugs until a fix is
- available. At the same time, the White Hats publicly pool their knowledge,
- racing to stay ahead of the Black Hats who, they assume, have as much
- information as they do.
-
- Black Hats and White Hats -- the crackers and the hackers -- both win status
- points from peers for solving tough problems, and enjoy the intellectual
- challenges presented by computer security. But White Hats work on security
- problems to make the Net a little safer for everyone, including themselves.
-
- White Hats and Black Hats rarely engage in the work for direct monetary
- profit, however, and that's one of the things that made last week's incident
- with Netscape Communications Corp. so unusual. In that case, a man who
- appears to represent a Danish computer consulting company called Cabocomm
- told Netscape that he wanted a large payment or else he would distribute the
- information publicly, with obvious risks to the company's stock price.
-
-
- Question of reward
-
- The consultant said Netscape's $1,000 bounty for significant bugs wasn't
- close to what the information was worth; most other companies provide
- something like a T-shirt for such information.
-
- Netscape announced last week that it had developed a patch for the problem
- itself.
-
- Offering money for bug discoveries has drawn contempt from some hackers.
-
- "We had a standing offer of $10,000 to anybody who could break into our
- site, but we stopped offering money when people in the community told us it
- was insulting," said Brett Nelson, firewalls product marketing manager for
- Secure Computing Corp., a computer security company with headquarters in
- Roseville, Minn. "Now we just offer things like nice leather jackets."
-
- Nelson said no one has successfully broken into the site, and he calls the
- Netscape incident unusual.
-
- "To a certain degree, what happened with Netscape -- you pay me what I want,
- or I hurt you -- is extortion, and right now it's not extremely common," he
- said. "But if somebody like Netscape caved in, I think it could become
- common."
-
- Already common are concerted efforts to test security systems by hackers and
- crackers alike. At any time, on any computer system, the odds are good that
- software written by the "intruder community," as law enforcement calls it,
- is probing for unplugged holes.
-
- If a vulnerable computer is found, word quickly spreads throughout the Black
- Hat community, whose members then rifle through files for anything useful.
- They sometimes use the machine to hide data, but nearly always use it as a
- jumping-off point to stage more attacks and better conceal their identities.
-
-
- Shared solutions
-
- The White Hats also constantly run such software through the paces, and
- whenever anybody finds something troubling, they post it to one of many
- electronic mailing lists or bulletin boards that deal with the topic. Other
- list members study the bug and try to re-create it on different systems.
- Then they proffer temporary solutions while working on more permanent fixes.
-
- One of the most respected security mailing lists is BUGTRAQ, administered by
- a man whose nom de guerre is Aleph One. He says his real name is Elias Levy,
- and that he is a computer security expert employed by a major Silicon Valley
- company. (Levy agreed to an interview on condition that his company remain
- unnamed.)
-
- Levy doesn't get paid for administering the list, which can suck up free time
- the way a black hole sucks in light. "If we didn't do this, you'd never see
- fixes for problems, because only the bad guys would know about them," he
- said.
-
- Levy and others deride the concept of not telling people about bugs until
- you've got a fix for them -- a policy they call "security through
- obscurity." It doesn't work because the intruder community already knows
- about the flaws, they insist.
-
- Many members of the teams that don't announce bugs before fixes acknowledge
- the system's potential flaws. "I can see both sides to it," said William J.
- Orvis, a member of the U.S. Energy Department's Computer Incident Advisory
- Capability, which, along with the other nearly 60 members of the
- international Forum of Incident Security Response Teams, keeps its lips
- zipped about problems until finding a solution.
-
-
- `A hard call'
-
- "I would love to involve everybody in the process, on the assumption that
- the bad guys already know about it, but the wannabes might not know about
- it," he said. "This is a hard call to make, but we don't put out a
- bulletin until we have a fix."
-
- A member of another security team, commenting on condition of anonymity, said
- this policy has won reasonably good cooperation from some major software
- vendors who know that their product lines won't be damaged by a public
- announcement of a security problem with no solution.
-
- "But some of these companies have had significant problems with their
- products for years, and have made no attempt to patch them," said the team
- member. "Oftentimes, the only way to get these guys to act is when something
- gets publicized."
-
- In that sense, the official security community and the unofficial White Hat
- community work with each other. Often, the mailing lists identify a problem,
- and the security teams -- members read the lists religiously -- squeeze the
- software vendor to build a patch. And many corporate computer security
- administrators wait for an official release from a security team before using
- a fix the White Hats have created.
-
- There's not likely to be any lack of work for members of either group any
- time soon.
-
- "The bad guys are just looking for a machine to break into," said Orvis.
- "They don't care what's in the machine. If you've got 1,000 computers
- connected to the Internet, it's a good bet that somebody is banging on your
- door daily."
-
- ⌐1997 San Joes Mercury News
- _____________________________________________________________
-
- Netscape fixes flaw, foils blackmail threat
- June 14, 1997
- BY TOM QUINLAN
- Mercury News Staff Writer
-
- A trans-Atlantic cyber scandal reached a rapid resolution Friday as Netscape
- Communications Corp. said it had fixed a serious security problem in its
- widely used Internet browser products, thus ending the get-rich-quick scheme
- of the Danish computer consultant who had notified Netscape of the problem
- and sought a reward.
-
- The Mountain View company plans to post early next week the solution for the
- browser bug -- which in rare cases would let a Web site operator grab files
- stored on a personal computer.
-
- The company said that, after testing the solution, it will first post to its
- Web site the fix for Netscape Communicator, its newest browser. Software
- fixes for Netscape Navigator's 2.0 and 3.0 series, which represent the
- overwhelming majority of current Netscape users, will be posted "shortly
- thereafter," a spokeswoman said, although no specific time frame was given.
-
- The bug affects all systems supported by Netscape's browsers, including
- computers running the Windows, Macintosh and Unix operating systems.
-
- Although software glitches are common, the Netscape bug drew attention
- because of the way it unfolded late Thursday, with Netscape characterizing
- the Danish company as behaving outrageously in its efforts to extract a big
- payment rather than cooperate in fixing the flaw.
-
- In e-mail correspondence, the consulting company told Netscape, using
- increasingly threatening tones, that it would publicly reveal the flaw's
- existence if Netscape didn't pay more than its standard $1,000 bounty to bug
- finders.
-
- The Danish outfit -- identified as Cabocomm and represented by Christian
- Orellana in e-mail exchanges obtained Friday from Netscape -- did indeed
- arrange for media coverage Thursday, at the time Netscape was holding its
- developer conference in San Jose and was preparing for the imminent shipment
- of Communicator.
-
- The messages to Netscape began several days ago, with Orellana at first
- seeming exasperated that he hadn't received a response and then asking for
- unspecified but significant amounts of money. Early on, providing only a
- bare-bones description of the flaw, Orellana asked that Netscape respond by
- the time of the developers' conference.
-
- "I think the person most suited for handling this is somebody in charge of
- the company checkbook," Orellana wrote.
-
- In later messages, Orellana informed Netscape that he was prepared to release
- the information to news organizations if the two companies could not reach an
- agreement.
-
- After detailing the effects of the bug, "...I think all pre-Communicator
- versions of Navigator... would be pretty worthless," Orellana said. "I'll
- leave it to you to estimate what impact that would have on Netscape stocks."
-
- Cable News Network's vehicle for financial news, CNNfn, and PC Magazine both
- reported the problem Thursday, and Netscape's stock dropped Friday, by $1.06
- to $32.25.
-
- During the week, senior engineers and programmers at Netscape talked to
- Cabocomm engineers in an effort to determine exactly what the problem was,
- said company spokeswoman Jennifer O'Mahony. "(Cabocomm) wasn't very
- forthcoming," she said. "They felt if they said too much, they'd be giving
- everything away."
-
- While Netscape was talking with Cabocomm, a separate Netscape team of
- programmers tried to track down the problem independently.
-
- Although Netscape wouldn't identify details of the glitch Friday, or where in
- the program it resided, "in the end Cabocomm wasn't any help," O'Mahony
- said. "We ended up knowing a lot more about it than they did."
-
- Efforts by the Mercury News to contact Orellana by telephone Friday were
- unsuccessful.
-
- Netscape said Friday it was determining whether it would seek legal action
- against the Danish firm.
-
- Although the idea of threatening to go public with the information could be
- seen as a form of extortion under California's criminal code, extortion could
- be a very difficult point to prove, said Alan Ruby, a San Jose attorney who
- is a criminal law specialist.
-
- "It's a fine line, sometimes," Ruby said. "Things that corporations say
- everyday in the course of normal business dealings sometimes come close. It
- really depends on how something is said, and the context it's said in."
-
- An increasing number of security breaches have come to light in recent
- months, even as the Internet takes shape as a key global medium for business
- and personal communications. Financial transactions and other sensitive
- information frequently travel across the Net.
-
- In the case of the Netscape browser flaw, a person who was aware of it could
- develop a Web site that could read files directly off a user's hard drive.
- The Web site would have to know the exact name of the files it wanted to
- read, as well as the location on the user's hard disk.
-
- That's not as hard as it might appear because file names share a lot of
- similar characteristics. Someone seeking to read those files would probably
- be able to successfully guess file names, at least occasionally.
-
- Netscape downplayed the seriousness of the flaw, pointing out that apparently
- only one Web site had been created that took advantage of the bug, even
- though the problem has been in Netscape's products for at least 17 months.
- And Netscape was able to fix the problem in a matter of days after it learned
- of it.
-
- Microsoft Corp. recently acknowledged that Web-based applications written
- with the two most popular Internet software development environments -- known
- as Java and ActiveX -- can be written to damage or change information stored
- on a user's computer, something that Java users had been told would be
- impossible. Microsoft has said that all known problems in its Web browsing
- software have been fixed.
-
- Also, special software can read e-mail messages or determine what someone is
- looking at on the Web if the data are flowing through certain cable modems,
- which are expected to be one of the most commonly used ways for consumers to
- surf the Internet.
-
- ⌐1997 San Jose Mercury News
- _____________________________________________________________
-
- McNealy Injects Java With $150 Million
- 06/13/97
- By Malcolm Maclachlan, TechWire
-
- SAN JOSE, Calif. -- Sun Microsystems CEO Scott McNealy is not known for
- holding back his opinions. True to form, McNealy delivered some zingers
- Friday on why Java is better than Windows.
-
- Delivering the final keynote at the Netscape Developer Conference here,
- McNealy attacked Microsoft on areas such as scalability and compatibility. He
- also outlined a vision of the future in which Java is embedded in computers
- from the mainframe down to the smart card.
-
- "When you hear the word `thin client,' you may think of this," he said,
- pulling a smart card out of his wallet. "See how thin this is? Now can you
- imagine any Windows technology on a smart card? If you wanted to put it in
- your wallet, you'd have to redesign every pair of trousers on the planet."
-
- The tools exist today, he said, to embed Java in everyday items such as wrist
- watches, which could then communicate the information to the level of
- mainframes. The result, he said, could be a world in which a watch, with an
- antennae in the hand, could act as a debit card, car key and airplane
- boarding pass.
-
- This is the kind of scalability Microsoft is still trying to reach, he said,
- with its multiple versions of Windows, ranging from the handheld version, Win
- CE, up to the server software, Win NT.
-
- Sun is investing $150 million in R&D in Java in the next year, McNealy said.
- Among these projects: a default Java user interface for NCs, PCs and other
- devices; new chips that will make Java run faster; the new Java Developer Kit
- 1.2 Security Manager; and an Active X "bridge" for encapsulating Active X
- code into a Java-type bean.
-
- McNealy pointed to his company's close relationship with Netscape
- Communications, in Mountain View, Calif. Most of Netscape's Web hosting and
- databases run on SunSoft's Solaris, he said, and the company uses 700 Sun
- Stations. Sun, in the meantime, hosts numerous Netscape engineers working on
- joint development.
-
- This meeting of Netscape and the Solaris development offers the greatest hope
- for open standards for Internet development, he said, and for continued
- opportunities for small developers.
-
- "When is the last time you heard of a Windows start-up?," he asked. "Do a
- Windows business plan, submit it to a venture capitalist and see if you get a
- call back."
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- NTT Gets Carved Up Into Three Carriers
- 06/13/97
- By Douglas Hayward, TechWire
-
- TOKYO -- Japan's expensive and heavily regulated telecommunications market
- came closer to U.S.-style competition Friday, when the Japanese parliament
- passed legislation restructuring the country's dominant carrier, Nippon
- Telegraph and Telephone.
-
- The upper house of Japan's legislature gave final approval to a government
- provision that will divide NTT into three carriers -- two regional companies
- and an international carrier -- controlled by a single holding company. NTT,
- which has sales of 8 trillion yen ($70 billion), will also be allowed to
- compete in the international market for the first time.
-
- Friday's passage of the law will put the company into direct competition with
- KDD, Japan's dominant international carrier, in both international and
- domestic markets. In return for NTT being allowed to compete in the
- international market, KDD will be allowed to compete with the former
- state-owned NTT when the law goes into effect, probably in late 1999.
-
- KDD is said to be talking to regional Japanese utilities about plans to
- establish a second national telecom infrastructure.
-
- Japan's Ministry of Posts and Telecommunications said the reforms will
- increase the competitiveness -- and reduce the costs -- of Japan's huge but
- expensive telecom industry. The Japanese government said it is committed to
- letting foreign telecom carriers -- such as AT&T -- enter the domestic
- market, though legislation deregulating the Japanese market has not yet been
- passed.
-
- The new law and the planned deregulation measures would create "a new era of
- competition" in the Japanese telecom market, said Hisao Horinouchi, the
- minister for posts and telecommunications.
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- Spy Agency Wants To Sell Advice
- 06/11/97
- By Douglas Hayward, TechWire
-
- LONDON -- The computer services arm of Britain's largest spy agency wants to
- sell security advice to private utility companies facing hacking attacks
- from terrorist organizations.
-
- But utilities fearing imminent attacks from terrorist hackers will have to
- wait for advice -- the British government has been pondering the proposal for
- more than two years and has yet to give a date for any decision.
-
- The Communications Electronic Security Group said it wants British government
- officials to grant it the right to advise utilities -- such as electricity,
- gas and telephone companies -- on defense against so-called "information
- warfare" attacks by terrorist groups.
-
- Information warfare involves crippling military and civil information
- networks in pursuit of political and military objectives. The group has the
- right only to sell advice to government organizations.
-
- "Government systems are potential targets for information warfare attacks --
- that is clear, and it's in our charter," said Tim Webb, head of policy in the
- group, which is part of the giant Government Communications Headquarters
- communications interception organization. Webb's public appearance Wednesday
- at the "Delivering Security To The Desktop" seminar here was one of the first
- by an officer of the spy agency.
-
- But, Webb added, the vulnerability of a nation does not lie in just
- government systems. "Recently the Irish Republican Army was attempting to
- blow up all the [electricity] power sub-stations in London with explosives,"
- he said. "Another way to stop the power supply is to hack into the
- appropriate computers and bring the whole lot down."
-
- The computer group of the spy agency is responsible for the security of
- British government networks. As part of its mission, it develops security
- hardware and software, including encryption algorithms.
-
- The Cabinet Office, the government unit that controls the civil service, is
- considering whether to apply some of the group's knowledge about information
- security to protect the national infrastructure, Webb said.
-
- The desire to break into the utilities consulting market stems from reforms
- introduced by the free-market Conservative government of John Major, under
- which the agency was forced for the first time to sell its services to
- government departments to generate operating revenues.
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- Hacker Vows 'Terror' for Child Pornographers
- by Steve Silberman
-
- 2:32pm 13.Jun.97.PDT -- After 17 years in the hacker underground, Christian
- Valor - well known among old-school hackers and phone phreaks as "Se7en" -
- was convinced that most of what gets written in the papers about computers
- and hacking is sensationalistic jive. For years, Valor says, he sneered at
- reports of the incidence of child pornography on the Net as
- "exaggerated/over-hyped/fearmongered/bullshit."
-
- Now making his living as a lecturer on computer security, Se7en claims he
- combed the Net for child pornography for eight weeks last year without
- finding a single image.
-
- That changed a couple of weeks ago, he says, when a JPEG mailed by an
- anonymous prankster sent him on an odyssey through a different kind of
- underground: IRC chat rooms with names like #littlegirlsex, ftp directories
- crammed with filenames like 6yoanal.jpg and 8&dad.jpg, and newsgroups like
- alt.binaries.pictures.erotica.pre-teen. The anonymous file, he says,
- contained a "very graphic" image of a girl "no older than 4 years old."
-
- On 8 June, Se7en vowed on a hacker's mailing list to deliver a dose of
- "genuine hacker terror" to those who upload and distribute such images on the
- Net. The debate over his methods has stirred up tough questions among his
- peers about civil liberties, property rights, and the ethics of vigilante
- justice.
-
- A declaration of war
-
- What Se7en tapped into, he says, was a "very paranoid" network of traders of
- preteen erotica. In his declaration of "public war" - posted to a mailing
- list devoted to an annual hacker's convention called DefCon - Se7en explains
- that the protocol on most child-porn servers is to upload selections from
- your own stash, in exchange for credits for more images.
-
- What he saw on those servers made him physically sick, he says. "For someone
- who took a virtual tour of the kiddie-porn world for only one day," he
- writes, "I had the opportunity to fully max out an Iomega 100-MB Zip disc."
-
- Se7en's plan to "eradicate" child-porn traders from the Net is "advocating
- malicious, destructive hacking against these people." He has enlisted the
- expertise of two fellow hackers for the first wave of attacks, which are
- under way.
-
- Se7en feels confident that legal authorities will look the other way when the
- victims of hacks are child pornographers - and he claims that a Secret
- Service agent told him so explicitly. Referring to a command to wipe out a
- hard drive by remote access, Se7en boasted, "Who are they going to run to?
- The police? 'They hacked my kiddie-porn server and rm -rf'd my computer!'
- Right."
-
- Se7en claims to have already "taken down" a "major player" - an employee of
- Southwestern Bell who Se7en says was "posting ads all over the place." Se7en
- told Wired News that he covertly watched the man's activities for days,
- gathering evidence that he emailed to the president of Southwestern Bell.
- Pseudonymous remailers like hotmail.com and juno.com, Se7en insists, provide
- no security blanket for traders against hackers uncovering their true
- identities by cracking server logs. Se7en admits the process of gaining
- access to the logs is time consuming, however. Even with three hackers on the
- case, it "can take two or three days. We don't want to hit the wrong person."
-
- A couple of days after submitting message headers and logs to the president
- and network administrators of Southwestern Bell, Se7en says, he got a letter
- saying the employee was "no longer on the payroll."
-
- The hacker search for acceptance
-
- Se7en's declaration of war received support on the original mailing list. "I
- am all for freedom of speech/expression," wrote one poster, "but there are
- some things that are just wrong.... I feel a certain moral obligation to the
- human race to do my part in cleaning up the evil."
-
- Federal crackdowns targeting child pornographers are ineffective, many
- argued. In April, FBI director Louis Freeh testified to the Senate that the
- bureau operation dubbed "Innocent Images" had gathered the names of nearly
- 4,000 suspected child-porn traffickers into its database. Freeh admitted,
- however, that only 83 of those cases resulted in convictions. (The Washington
- Times reports that there have also been two suicides.)
-
- The director's plan? Ask for more federal money to fight the "dark side of
- the Internet" - US$10 million.
-
- Pitching in to assist the Feds just isn't the hacker way. As one poster to
- the DefCon list put it, "The government can't enforce laws on the Internet.
- We all know that. We can enforce laws on the Internet. We all know that too."
-
- The DefCon list was not a unanimous chorus of praise for Se7en's plan to give
- the pornographers a taste of hacker terror, however. The most vocal dissenter
- has been Declan McCullagh, Washington correspondent for the Netly News.
- McCullagh is an outspoken champion of constitutional rights, and a former
- hacker himself. He says he was disturbed by hackers on the list affirming the
- validity of laws against child porn that he condemns as blatantly
- unconstitutional.
-
- "Few people seem to realize that the long-standing federal child-porn law
- outlawed pictures of dancing girls wearing leotards," McCullagh wrote -
- alluding to the conviction of Stephen Knox, a graduate student sentenced to
- five years in prison for possession of three videotapes of young girls in
- bathing suits. The camera, the US attorney general pointed out, lingered on
- the girls' genitals, though they remained clothed. "The sexual implications
- of certain modes of dress, posture, or movement may readily put the genitals
- on exhibition in a lascivious manner, without revealing them in a nude
- display," the Feds argued - and won.
-
- It's decisions like Knox v. US, and a law criminalizing completely synthetic
- digital images "presented as" child porn, McCullagh says, that are making the
- definition of child pornography unacceptably broad: a "thought crime."
-
- The menace of child porn is being exploited by "censor-happy" legislators to
- "rein in this unruly cyberspace," McCullagh says. The rush to revile child
- porn on the DefCon list, McCullagh told Wired News, reminded him of the
- "loyalty oaths" of the McCarthy era.
-
- "These are hackers in need of social acceptance," he says. "They've been
- marginalized for so long, they want to be embraced for stamping out a social
- evil." McCullagh knows his position is a difficult one to put across to an
- audience of hackers. In arguing that hackers respect the property rights of
- pornographers, and ponder the constitutionality of the laws they're
- affirming, McCullagh says, "I'm trying to convince hackers to respect the
- rule of law, when hacking systems is the opposite of that."
-
- But McCullagh is not alone. As the debate over Se7en's declaration spread to
- the cypherpunks mailing list and alt.cypherpunks - frequented by an older
- crowd than the DefCon list - others expressed similar reservations over
- Se7en's plan.
-
- "Basically, we're talking about a Dirty Harry attitude," one network
- technician/cypherpunk told Wired News. Though he senses "real feeling" behind
- Se7en's battle cry, he feels that the best way to deal with pornographers is
- to "turn the police loose on them." Another participant in the discussion
- says that while he condemns child porn as "terrible, intrinsically a crime
- against innocence," he questions the effectiveness of Se7en's strategy.
-
- "Killing their computer isn't going to do anything," he says, cautioning that
- the vigilante approach could be taken up by others. "What happens if you have
- somebody who doesn't like abortion? At what point are you supposed to be
- enforcing your personal beliefs?"
-
- Raising the paranoia level
-
- Se7en's loathing for aficionados of newsgroups like alt.sex.pedophilia.swaps
- runs deeper than "belief." "I myself was abused when I was a kid," Se7en told
- Wired News. "Luckily, I wasn't a victim of child pornography, but I know what
- these kids are going through."
-
- With just a few hackers working independently to crack server logs, sniff IP
- addresses, and sound the alarm to network administrators, he says, "We can
- take out one or two people a week ... and get the paranoia level up," so that
- "casual traders" will be frightened away from IRC rooms like
- "#100%preteensexfuckpics."
-
- It's not JPEGs of clothed ballerinas that raise his ire, Se7en says. It's
- "the 4-year-olds being raped, the 6-year-old forced to have oral sex with cum
- running down themselves." Such images, Se7en admits, are very rare - even in
- online spaces dedicated to trading sexual imagery of children.
-
- "I know what I'm doing is wrong. I'm trampling on the rights of these guys,"
- he says. "But somewhere in the chain, someone is putting these images on
- paper before they get uploaded. Your freedom ends when you start hurting
- other people."
-
- ⌐1993-97 Wired Ventures, Inc.
- _____________________________________________________________
-
- The Ultimate Caller ID
- by David J. Wallace
-
- 9:07am 13.Jun.97.PDT -- Move over, GPS. British astronomer Peter
- Duffett-Smith has invented a technology that can pinpoint a digital cellular
- phone's location within a few hundred feet. The system, called Cursor,
- tracks a handset by radio triangulation - a method similar to the use of
- radio telescopes to chart distant galaxies.
-
- Using a ping-and-reply system, a transmitter network relays the handset's
- location on the same 900-MHz phone frequencies. When the technology becomes
- commercially available in 1998, marketer Cambridge Positioning Systems
- envisions GPS-like uses such as regional mapping and enhanced 911 tracking.
-
- Privacy advocates have another take on it. "This is likely to be used by law
- enforcement to trace signals," says Marc Rotenberg, director of the
- Electronic Privacy Information Center. Under current law, telcos don't reveal
- call locations. But the FBI is petitioning to change this. "In the old days,"
- notes Rotenberg, "the phone didn't move."
-
- ⌐1993-97 Wired Ventures, Inc.
- _____________________________________________________________
-
- Poll: U.S. hiding knowledge of aliens
-
- (CNN) -- Nearly 50 years since an alleged UFO was sighted at Roswell, New
- Mexico, a new CNN/Time poll released Sunday shows that 80 percent of
- Americans think the government is hiding knowledge of the existence of
- extraterrestrial life forms.
-
- While nearly three-quarters of the 1,024 adults questioned for the poll said
- they had never seen or known anyone who saw a UFO, 54 percent believe
- intelligent life exists outside Earth.
-
- Sixty-four percent of the respondents said that aliens have contacted humans,
- half said they've abducted humans, and 37 percent said they have contacted
- the U.S. government. The poll has a margin of error of plus or minus 3
- percentage points.
-
- But only 9 percent said they believed there were any aliens near the
- Hale-Bopp comet, which recently passed close enough to Earth to be seen with
- the naked eye.
-
- Some "ufologists" believed a spacecraft was hidden near the comet, and
- members of the Heaven's Gate cult committed suicide, believing that they
- would be taken aboard the craft and returned "home."
-
- What happened in Roswell?
-
- As for the Roswell incident, nearly two-thirds of the respondents to the poll
- said they believed that a UFO crash-landed in a field outside the New Mexico
- town 50 years ago next month.
-
- In one of the most famous UFO "sightings" in U.S. history, Roswell residents
- in 1947 saw lights in the night sky, followed by a loud explosion. A rancher
- found the "crash site" and removed a large piece of debris, storing it in his
- shed.
-
- A few days later, Air Force officials from nearby Roswell Air Force Base
- inspected the site and the debris, and issued a press release announcing the
- recovery of a "flying disc." The Air Force quickly retracted that statement,
- and claimed the debris was from a weather balloon.
-
- But countless statements -- some from military personnel -- appeared to
- contradict the Air Force's revised position. And several "witnesses" claimed
- to have seen bodies of dead aliens whisked away by the military.
-
- Roswell today capitalizes on its fame as a UFO crash site -- whether or not
- it actually happened -- and is hosting a 50th anniversary celebration the
- first week of July. Friend or foe?
-
- Most people -- 91 percent -- told the pollsters that they had never had
- contact with aliens or known anyone who had. A similar number -- 93 percent
- -- said they had never been abducted or known anyone whisked away by beings
- from another planet.
-
- But if they do meet someone from a galaxy far, far away, 44 percent said they
- expect to be treated as friends, while 26 percent think they'll be treated as
- enemies.
-
- Thirty-nine percent don't expect aliens to appear very humanoid, although 35
- percent said they probably look "somewhat" human.
-
- ⌐1997 Cable News Network
- _____________________________________________________________
-
- Computer group unites to break computer code But it took 4 months
- June 19, 1997
-
- SAN FRANCISCO (AP) -- Using the Internet to harness the combined power of
- their machines, thousands of computer users broke a government-endorsed code
- that protects electronic money transfers.
-
- The group, organized by programmer Rocke Verser, took four months to read a
- message that had been scrambled using the code, known as the Data Encryption
- Standard. The code was finally broken Tuesday.
-
- The national standard, or DES, was considered almost unbreakable when
- introduced in 1977. It is required in most federal agencies but not the
- military, and is also widely used in the private sector.
-
- Critical information in computers is protected by the national standard and
- other encryption programs that use very large numbers to scramble
- information. Only the correct "key" can unlock the encrypted information. The
- longer the key, the harder it is to crack.
-
- Given the fact that it took four months to break through the standard code,
- experts say the nation's financial institutes are hardly at risk. Most of
- them use what it known as dynamic key exchange, which changes the keys almost
- constantly during a transaction. Taking months to crack the code wouldn't do
- thieves much good.
-
- Verser and his group were responding to a $10,000 challenge offered in
- January by RSA Data Security Inc., a Redwood City, California, company that
- sells encryption programs.
-
- The actual attack on the code was quite simple. Verser wrote a program that
- ran through every possible combination that might unlock the coded message --
- 72 quadrillion of them in all.
-
- Then he put a copy of the program on his Web site and invited others to work
- on cracking it. Anyone could download the program, which would then run in
- the background as they went about their work.
-
- The project began with 20 computers and ended with 14,000 working on the
- problem. All told, they used 10 million hours of computer time. Had they
- started with 14,000 computers it would have taken about 30 days, Verser said
- from his Loveland, Colorado, home.
-
- While the code-cracking doesn't have much practical uses, it's a harbinger of
- things to come, said David Weisman, director of money and technology
- strategies for Cambridge, Massachusetts-based Forrester Research.
-
- "It's not something to cause a panic. But people have known that as computing
- power increases, key lengths have to increase," he said.
-
- The incident is likely to prompt more calls for relaxing U.S. laws that
- restrict the export of longer codes.
-
- ⌐1997 Associated Press.
- _____________________________________________________________
-
- Senate Votes to Outlaw Bomb-Making Info
- by Rebecca Vesely
-
- 12:09pm 20.Jun.97.PDT -- The Senate has voted 94-0 to tack onto a Defense
- Department spending bill an amendment that would prohibit the distribution
- of bomb-making instructions in the United States.
-
- Although the word "Internet" is not mentioned in the four-page amendment, the
- legislation would outlaw Web sites, newspapers, zines, and books that publish
- instructions on how to make a bomb - such as The Anarchist's Cookbook and The
- Terrorist Handbook. Violators would face fines and prison sentences of up to
- 20 years.
-
- Sponsored by Senator Dianne Feinstein (D-California), who has been trying to
- get the legislation on the books since 1995, the amendment passed Thursday is
- narrowly written to include only the distribution of material that has an
- "intent to harm."
-
- In April, the Justice Department released a study that found there indeed is
- a connection between the availability of bomb-making instructions and the
- actual making of bombs. It also concluded that legislation criminalizing the
- publication of such information, if narrowly written, would not be a
- violation of the First Amendment. The Justice Department determined that the
- distribution of such materials is not a basic free-speech right, but an
- obstruction of justice.
-
- The Senate will vote on the defense bill early next week. The bill - and the
- amendment - will then go to a House conference committee.
-
- ⌐1993-97 Wired Ventures, Inc.
- _____________________________________________________________
-
- AT&T, Baby Bell Knot "Unthinkable"
- 06/19/97
- By David Braun, TechInvestor
-
- WASHINGTON -- Any combination between No. 1 long-distance company AT&T and
- a Baby Bell would be "unthinkable," Federal Communications Commission
- chairman Reed Hundt said Thursday.
-
- In a speech to the Brookings Institution in Washington, Hundt, who recently
- announced his intention to resign as FCC chief, attempted to put a spoke in
- the wheels of the merger being negotiated between AT&T and SBC
- Communications.
-
- The deal, which if approved will be the largest corporate marriage in US
- history, is expected to be announced formally within weeks. It will have to
- be cleared by federal regulators, including the FCC.
-
- "We are at a watershed point in the evolution of the telecommunications
- industry. Whether we have competitive or monopolized markets depends on the
- interactive and complex decisions of private firms, investors, Congress,
- agencies and courts. At stake is the possibility of billions of dollars of
- economic growth and astounding feats of innovation only achievable through
- competition," Hundt said in his speech.
-
- Combining the long distance market share of AT&T in any RBOC (regional bell
- operating company) region, even as it may be reduced by RBOC entry, with the
- long distance market share that reasonably can be imputed to the RBOC would
- yield a resulting concentration that was unthinkable, the FCC chief said.
-
- AT&T slapped back Thursday, saying all the FCC needed to do was to evaluate
- any merger proposal, "when and if it is made," on whether or not it
- accelerates competition in all local markets.
-
- "AT&T and the other long distance companies have documented the RBOC's
- foot-dragging with enough paper to fill an FCC hearing room," said Mark
- Rosenblum, AT&T vice president -- law and federal government affairs. "All we
- have suggested is that partnership transactions should not be an unthinkable
- way of breaking the logjam and accelerating the process of bringing real
- competition to local markets.
-
- "If a partnership between a long distance company and a local RBOC can be
- structured to increase competition both in the RBOC's home territory and in
- the states it does not currently serve, then it ought to be considered.
-
- "The chairman of the FCC said that if a merger between a long distance
- company and an RBOC is presented in the future, he will judge it on the law
- and the specific facts that are placed on the record. That's exactly what the
- FCC should do."
-
- Hundt had said that in analyzing an AT&T-RBOC hypothetical merger in terms of
- the local market, "Every RBOC is, in its region, by far the dominant firm in
- the provision of in-region local exchange service. Only a tiny fraction of
- customers choose any other local service provider."
-
- One of the best positioned entrants in the local exchange market was AT&T,
- Hundt said. "It is the largest telecommunications company in the country. It
- already has a business relationship with presumably about half the customers
- in any given Bell region. It has extensive network assets, a powerful brand,
- customer information, and sales force expertise. AT&T has already publicly
- set the goal of taking one-third market share in Bell markets.
-
- "Indeed, it's difficult to imagine that any other firm will be a more
- effective broad-based local entrant than AT&T as long as the market-opening
- provisions of the Telecom Act are fully implemented and enforced. It seems
- unreasonable to assert that AT&T cannot obtain at least some meaningful entry
- in Bell markets if it seeks to enforce all the rights of entry given to it
- under the new law and our rules.
-
- "Imputing to AT&T even a modest percentage of market share taken from the
- existing Bell incumbent in that Bell's region, as we must do under our
- potential or precluded competitor doctrine, then under conventional and
- serviceable antitrust analysis, a merger between it and the Bell incumbent is
- unthinkable. It would be exactly the type of horizontal combination that
- antitrust law frowns upon," he said.
-
- Hundt said the concerns created by an AT&T-RBOC merger were not confined to
- in-region combinations. Many of the RBOCs have expressed intentions to
- compete out-of-region in long distance and, eventually, local markets. They
- could be formidable competitors of AT&T, among others, in all out-of-region
- markets. This would be particularly true if the RBOCs supported and used the
- pro-competitive rules written by the FCC.
-
- Hundt stressed that because the Bell Atlantic-NYNEX merger was currently
- before the FCC, "I cannot and will not comment on that merger or how I think
- it should be categorized. Nothing in this speech should be read as any kind
- of communication on the topic of that merger."
-
- Meanwhile, Lehman Brothers lowered its rating Thursday on a range of
- telephone concerns to hold from outperform: U S West Communications, SBC
- Communications, GTE, BellSouth, Bell Atlantic, and Ameritech.
-
- The brokerage said it expected slower revenue growth in the sector.
-
- Earlier this week, A. G. Edwards lowered its ratings on Sprint, Ameritech,
- Nynex, SBC, and U S West, due to valuation.
-
- At market close Thursday, most of the RBOCÆs shares were down. Nynex [NYN]
- was off 3/8 to 58 3/8; Bell Atlantic [BEL] was down 1/2 to 76 5/8; SBC [SBC]
- added 3/8 to 60 5/8; U S West [USW] was up 3/8 to 37 5/8; Ameritech [AIT]
- slipped 5/8 to 70 3/4; and BellSouth [BLS] retreated 3/8 to 46 1/ 4.
-
- AT&T [T] was up 3/8 to 37 7/8. Other long-distance companies were mixed. MCI
- International [MCIC] was up 1 to 39 5/8. Sprint [FON] was off 3/4 to 51 1/8.
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- Hackers' Dark Side Gets Even Darker
- 06/19/97
- By Douglas Hayward, TechWire
-
- LONDON -- The hacker community is splitting into a series of distinct
- cultural groups -- some of which are becoming dangerous to businesses and a
- potential threat to national security, an official of Europe's largest
- defense research agency warned Thursday.
-
- New types of malicious hackers are evolving who use other hackers to do their
- dirty work, said Alan Hood, a research scientist in the information warfare
- unit of Britain's Defense Evaluation and Research Agency (DERA).
-
- Two of the most dangerous types of malicious hackers are information brokers
- and meta-hackers, said Hood, whose agency develops security systems for the
- British military. Information brokers commission and pay hackers to steal
- information, then resell the information to foreign governments or business
- rivals of the target organizations.
-
- Meta-hackers are sophisticated hackers who monitor other hackers without
- being noticed, and then exploit the vulnerabilities identified by these
- hackers they are monitoring. A sophisticate meta-hacker effectively uses
- other hackers as tools to attack networks. "Meta-hackers are one of the most
- sinister things I have run into," Hood said. "They scare the hell out of me."
-
- DERA is also concerned that terrorist and criminal gangs are preparing to use
- hacking techniques to neutralize military, police and security services, Hood
- said.
-
- Other cultural groups evolving within the hacker community include gangs
- known as elites, who form closed clubs and look down on those ordinary
- hackers who employ commonly used attack tools, Hood said. "These guys
- [elites] develop their own tools," Hood said. "They get a camaraderie and an
- appreciation of their prowess from their peers."
-
- Another group -- known as "darksiders" -- use hacking techniques for
- financial gain or to create malicious destruction. They reject the classic
- motivation for hackers, which is to gain a feeling of achievement and
- authority, Hood said. "Hackers don't see electronic trespass as wrong per se,
- but the important thing about darksiders is that they cross the line [drawn
- by hackers] and start to be bad guys," he said. "That generally means they do
- it for gain or to cause harm."
-
- Users should stop believing they can build security systems capable of
- repelling any attack from hackers, Hood added. Instead, organizations should
- concentrate on minimizing the damage caused by attacks, and on deterring
- hackers.
-
- "I don't believe you can stop every hacker forever," Hood said. "All they
- need is one new technique you haven't heard about. But what you can do is
- minimize the target, by using knowledge and resources."
-
- According to DERA, users should divide their anti-hacker strategies into
- deterrence, protection, detection and reaction.
-
- Deterrence means making it so difficult for hackers that most give up and try
- another target, Hood said. Protection means more than installing firewalls
- and security software and procedures; it also means getting to know your
- system and removing all but essential content. "Everything you have on your
- system is at risk -- you should strip out anything you don't need," Hood
- said.
-
- "Make sure your system does what you want it to do -- no more and no less --
- and make sure you have procedural policies to stop social engineering. If
- someone rings up and says they have forgotten their password, the person at
- the other end of the phone shouldn't automatically say OK and give them a new
- one," Hood said. Social engineering is the term used by hackers to describe
- how they obtain passwords, confidential information and credit by deception.
-
- Users should install monitoring software, preferably with the ability to
- detect attacks in real time, and should react to everything that looks out of
- place. DERA employs 14,00 staff and has a budget of $1.5 billion. Hood's
- division, the command and information systems division, is responsible for
- secure communications and information warfare and employs more than 500
- scientists and engineers.
-
- ⌐CMP Media, 1996.
- _____________________________________________________________
-
- _____________________________________________________________
- LOGS
- 1. telnet log from memor
- 2. #phreak log from psych0
- 3. #hacking log from Optima
-
- --- 1 - telnet log from memor
-
- %TELNET-I-SESSION, Session 01, host mail.pratique.fr, port 25
- 220-prat.iway.fr Sendmail 8.6.12/8.6.12 ready at Thu, 5 Jun 1997 00:19:05 +0200
- 220 ESMTP spoken here
- helo a
- 250 prat.iway.fr Hello clp2.clpgh.org [192.204.3.2], pleased to meet you
- mail from:hbs@hbs.org
- 250 hbs@hbs.org... Sender ok
- rcpt to:root@skypub.com
- 250 root@skypub.com... Recipient ok
- data
- 354 Enter mail, end with "." on a line by itself
- hi,
- You finished by finding that .phf in cgi-bin of www.skypub.com , good job,
- dont forget a ls -a in /htdocs .. we didnt do bad things, only little hacking
- for making that group known.. HBS HAVOC BELL SYSTEMS.. talk a bit about us in
- yer magazine hm? :) that would make a big ads for us, please.. anyways.. phf
- is boggus, php.cgi is too, webdist.cgi, wievsource, wrap.. lots of cgi scripts
- are bogus.. so.. be carefull when ya intall one ;)
- bye
-
- memz [HBS]
- .
- 250 AAA06509 Message accepted for delivery
-
-
- --- 2 - a log from #phreak ( i think )
- Subject:
- just a lamer to brighten your day
- Date:
- Sat, 14 Jun 97 16:14:32 +0000
- From:
- psych0
- To:
- Scud-O
-
- name: Rebel_Log (phraud@ip203-126.cc.interlog.com)
-
- proof:
- [12:11] *** Rebel_Log (phraud@ip203-126.cc.interlog.com) has joined
- #phreak
- <psych0> heh... /list again =)
- [12:11] <KungFuFox> the amount of scroll he got must've given him a
- heart attack
- [12:12] <Rebel_Log> sup poin dexter's
- <psych0> hey guys.. type /whois * ... =)
- [12:12] *** Rebel_Log has quit IRC (Max Sendq exceeded)
-
-
- --- 3 - a long in #hacking on Undernet
-
- This log is of a really stupid person who thinks that if they scroll
- jiberish in the channel that it will flood people off (rarely happens). You
- have done a great job on THTJ and keep it up the good work.
-
-
- This log is from #hacking on Undernet
-
- [14:41] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] Quits: CrazyPooh (Excess Flood)
- <Optima> haha
- [14:42] Joins: Ocnty (FireIce@sdn-ts-005cacoviP03.dialsprint.net)
- [14:42] <fubar> lol
- [14:42] <fubar> what a lamer
- [14:42] <fubar> haha
- [14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:42] <Ocnty> hi
- [14:42] Quits: CrazyPooh (Excess Flood)
- <Optima> Heh
- [14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:42] <fubar> so crazypooh
- [14:42] <fubar> i stil havnt died
- <Optima> CrazyPooh: You are lame as hell!
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <Optima> HAHAHA
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:42] <fubar> lol
- [14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <C
- [14:42] <fubar> oh my god
- [14:42] <CrazyPooh> what
- [14:42] Parts: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:42] <fubar> i`m gonna piss myself
- [14:43] <fubar> haha
- [14:43] <fubar> now he`s message flooding me
- [14:43] <fubar> haha
- [14:43] <fubar> i love my bitchx...
- [14:43] Ocnty is now known as \JamesBon
- [14:43] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:43] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPoo h> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:43] <fubar> haha
- [14:43] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:43] <fubar> wb CP
- [14:43] Quits: CrazyPooh (Excess Flood)
- [14:43] <fubar> lol
- <Optima> shit...How Stupid is he?
- [14:44] <fubar> oh my god
- [14:44] <fubar> 2 lines and he floods himself off
- [14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] <fubar> haha
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] Quits: CrazyPooh (Excess Flood)
- <Optima> heh
- [14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
- [14:44] <fubar> fuck he`s dumb
- [14:44] Quits: CrazyPooh (Excess Flood)
-
-
- This log has been provided by Optima
-
-
-
-
- _____________________________________________________________
-
- ------------------------ ----------------------
- -[HAVOC Bell Systems]- -[Acknowledgements]-
- ------------------------ ----------------------
-
- ArcAngl : Just joined up
- Agrajag : Back from the dead btm : Elite (MIA?)
- darkcyde : #phreak old-schooler digipimp : Co-conspirator
- Digital_X : Nemesis (MIA?) dr1x : It's 420!
- disc0re : Thinks were on NBC ec|ipse : Hysterical bastard
- Keystroke : Submissions Editor shamrock : nice hair
- KungFuFox : Helped Reform #phreak RBCP : Funniest man alive
- memor : Ueberleet French phreak shoelace : FINALLY has ops
- psych0 : Lame ass mofo WeatherM : anarchist
- REality : Owns Own3r darc : Left #phreak
- Scud-O : Has a new car! JP : killed Antionline.com
- Redtyde : #phreak not so old-schooler tombin : phear!
- theLURK3R : Out Clubing antifire : NT security guru
- UnaBomber : Tired of IRC (MIA?) ChiaPope : sniff, we miss wrath!
- FH : want scud to have ICQ
- ------------------- TMessiah : Likes PGP
- -[ Channels ]- Revelation: old schooler
- ------------------- Modify : Lives near Scud-O
- #phreak : Newly Reformed |Banshee| : Also lives near Scud-O
- #sin : SIN Home mC : infected.com - nuff said!
- silitoad : Did ya like thtj?
-
-
- _____________________________________________________________
-
- This Month's Question:
- _____________________________________________________________
-
- Next Month:
- Look, we can predict the future about as well as a weatherman, so
- just chill out until july 1st to see what is going to be in thtj13!
-
- Issue 13 is out August 1st!
-
- Send all articles for issue 13 to Keystroke at: keystroke@thepentagon.com
-
- Tune in next time, Same Bat Time, Same Bat Channel!
-
- ==========================================================
- = Is this copy of The HAVOC Technical Journal skunked? =
- = If this file doesn't read at 152009 bytes, it probably =
- = doesn't have a born on date! Get a fresh copy from our =
- = NEW site at: http://www.thtj.com =
- ==========================================================
-
- -[End of Communique]-
-