home *** CD-ROM | disk | FTP | other *** search
- ******************* BIOC AGENT 003
- 'S TUTORIAL IN *************************
- *
- *
- * ==========
- ========== *
- * =HACKING T
- HE HP2000= *
- * ==========
- ========== *
- *
- *
- ***************************************
- ****************************************
-
- PREFACE
- -------
-
- THE PURPOSE OF THIS TUTORIAL IS TO GIVE
- POTENTIAL HACKERS USEFUL INFORMATION
- ABOUT HEWLETT-PACKARD'S HP2000 SYSTEMS.
- THE FOLLOWING NOTATION WILL BE USED
- THROUGHOUT THIS TUTORIAL:
-
- <CR> - CARRIAGE RETURN, RETURN, ENTER,
- ETC.
- ^C - A CONTROL CHARACTER (CONTROL-C I
- N EXAMPLE)
- CAPITAL LETTERS - COMPUTER OUTPUT & USE
- R INPUT
-
-
- SYSTEM INFORMATION
- ------------------
-
- EACH HP2000 SYSTEM CAN SUPPORT UPTO 32
- USERS IN A TIMESHARED BASIC (TSB)
- ENVIRONMENT. THE SYSTEM**MU11ERUN A
- VERSION OF HEWLETT PACKARD'S
- TIMESHARED/BASIC 2000 (VARIOUS LEVELS).
-
-
- LOGON PROCEDURE
- ---------------
-
- ONCE CONNECTED TO A HP2000, TYPE A NUME
- RAL FOLLOWED BY A <CR>. THE SYSTEM
- SHOULD THEN RESPOND WITH: PLEASE LOG I
- N. IF IT DOES NOT IMMEDIATELY
- RESPOND KEEP ON TRYING THIS PROCEDURE U
- NTIL IT DOES (THEY TEND TO BE SLOW
- TO RESPOND).
-
- USER ID: THE USER ID CONSISTS OF A LET
- TER FOLLOWED BY 3 DIGITS, EG, H241.
-
- PASSWORD: THE PASSWORDS ARE FROM 1 TO
- 6 PRINTING AND/OR NON-PRINTING (CONTROL)
- CHARACTERS. THE FOLLOWING C
- HARACTERS WILL NOT BE FOUND IN ANY
- PASSWORDS SO DON'T BOTHER TR
- YING THEM: LINE DELETE (^X), NULL (^@),
- RETURN (^M), LINEFEED (^J),
- X-OFF (^S), RUBOUT, COMMA (^L), SPACE
- (^@), BACK ARROW (<-), & UND
- ERSCORE (_). HP ALSO SUGGESTS THAT ^E
- IS NOT USE IN PASSWORDS (BUT
- I HAVE SEEN IT DONE!).
-
- THE LOGON FORMAT IS: HELLO-A123,PASSWD
-
- WHERE: HELLO IS THE LOGI
- N COMMAND. IT MAY BE ABBREVIATED TO
- HEL. A123 IS THE
- USER ID & PASSWD IS THE PASSWORD.
-
- THE SYSTEM WILL RESPOND WITH EITHER ILL
- EGAL FORMAT OR ILLEGAL ACCESS DEPENDING
- UPON WHETHER YOU SCREWED UP THE SYNTAX
- OR IT IS AN INVALID USER ID OR PASSWORD.
- THE MESSAGES: PLEASE LOG IN, ILLEGAL F
- ORMAT, & ILLEGAL ACCESS ALSO HELP YOU
- IDENTIFY HP2000 SYSTEMS.
-
- THE SYSTEM MAY ALSO RESPOND WITH ALL PO
- RTS ARE BUSY NOW - PLEASE TRY AGAIN
- LATER OR A SIMILAR MESSAGE. ONE OTHER
- POSSIBILITY IS NO TIME LEFT WHICH MEANS
- THAT THEY HAVE USED UP THEIR TIME LIMIT
- WITHOUT PAYING.
-
- UNLIKE OTHER SYSTEMS WHERE YOU HAVE A C
- ERTAIN AMOUNT OF TRIES TO LOGIN, THE
- HP2000 SYSTEM GIVES YOU A CERTAIN TIME
- LIMIT TO LOGON BEFORE IT DUMPS YOU.
- THE SYSTEM DEFAULT IS 120 SECONDS (2 MI
- NUTES). THE SYSOP CAN CHANGE IT TO BE
- ANYWHERE BETWEEN 1 AND 255 SECONDS, THO
- UGH. IN MY EXPERIENCE, 120 SECONDS IS
- SUFFICIENT TIME FOR TRYING BETWEEN 20-3
- 0 LOGON ATTEMPTS WHILE HAND-HACKING &
- A MUCH HIGHER AMOUNT WHEN USING A HACKI
- NG PROGRAM.
-
- USERS
- -----
-
- THE VARIOUS USERS ARE IDENTIFIED BY THE
- IR USER ID (A123) & PASSWORD. USERS
- ARE ALSO IDENTIFIED BY THEIR GROUP. EA
- CH GROUP CONSISTS OF 100 USERS. FOR
- EXAMPLE, A000 THROUGH A099 IS A GROUP,
- AL"!I=U!A199 IS ANOTHER GROUP, &
- Z900 THROUGH Z999 IS THE LAST POSSIBLE
- GROUP. THE FIRST USER ID IN EACH GROUP
- IS DESIGNATED AS THE GROUP MASTER & HEJHAS CERTAIN PRIVILEGES. FOR EXAMPLE,
- A000, A100,...H200..., & Z900 ARE ALL G
- ROUP MASTERS. THE USER ID A000 IS KNOWN
- AS THE SYSTEM MASTER & HE HAS THE MOST
- PRIVILEGES (BESIDES THE HARDWIRED SYSOP
- TERMINAL). THE LIBRARY ASSOCIATED WITH
- USER Z999 CAN BE USED TO STORE A HELLO
- PROGRAM WHICH IS EXECUTED EACH TIME SOM
- EONE LOGS ON.
-
- SO, THE BEST THING TO HACK ON AN HP2000
- SYSTEM IS THE SYSTEM MASTER (A000)
- ACCOUNT. IT IS ALSO THE ONLY USER ID T
- HAT MUST BE ON THE SYSTEM. HE LOGS ON BY
- TYPING: HEL-A000,PASSWD. YOU JUST HAVE
- TO HACK OUT HIS PASWORD. IF YOU DECIDE
- TO HACK Z999, YOU CAN CREATE OR CHANGE
- THE HELLO PROGRAM TO GIVE EVERY USER
- YOUR OWN PERSONAL MESSAGE EVERY TIME HE
- LOGS ON! THIS IS ABOUT ALL YOU CAN DO
- WITH Z999 THOUGH SINCE IT IS OTHERWISE
- A NON-PRIVILEGED ACCOUNT.
-
- LIBRARY ORGANIZATION
- --------------------
-
- EACH USER HAS ACCESS TO 3 LEVELS OF LIB
- RARIES: HIS OWN PRIVATE LIBRARY, A
- GROUP LIBRARY, AND THE SYSTEM LIBRARY.
- TO SEE WHAT IS IN THESE LIBRARIES YOU
- WOULD TYPE: CATALOG, GROUP, & LIBRARY
- RESPECTIVELY (ALL COMMANDS CAN BE
- ABBREVIATED TO THE FIRST 3 LETTERS). T
- HE INDIVIDUAL USER IS RESPONSIBLE FOR
- HIS OWN LIBRARY AND MAINTANING ALL THE
- FILES. IF A PROGRAM IS IN YOUR CATALOG,
- THEN YOU CAN CHANGE IT.
-
- [GROUP MASTERS]
-
- GROUP MASTERS (GM) ARE RESPONSIBLE FOR
- CONTROLING ALL PROGRAMS IN THE GROUP
- LIBRARIES. ONLY MEMBERS OF THE GROUP C
- AN USE THESE PROGRAMS. THESE ARE VIEWED
- BY TYPING GROUP. FOR EXAMPLE, USER S50
- 0 CONTROLS ALL PROGRAMS IN THE GROUP
- LIBRARY OF ALL USERS BEGINNING WITH ID
- S5XX. OTHER USERS IN THE GROUP CANNOT
- MODIFY THESE PROGRAMS. ALL PROGRAMS IN
- THE GROUP LIBRARY ARE ALSO IN THE
- GROUP MASTERS PRIVATE LIBRARY (CATALOG)
- , THEREFORE HE CAN MODIFY THEM! THE
- GROUP MASTER ALSO HAS ACCESS TO 2 PRIVI
- LEGED COMMANDS. THEY ARE: PROTECT &
- UNPROTECT. WITH PROTECT, THE GROUP MAS
- TER CAN RENDER A PROGRAM SO IT CANNOT
- BE LISTED, SAVED, CSAVED, PUNCHED TO PA
- PER TAPE, OR XPUNCHED. FOR EXAMPLE, IF
- THE GM TYPED PRO-WUMPUS, OTHER USERS IN
- THE GROUP WOULD BE ABLE TO RUN WUMPUS
- BUT THEY WOULD NOT BE ABLE TO LIST IT.
- THE GM CAN REMOVE THESE RESTRICTIONS
- WITH THE UNPROTECT COMMAND.
-
- [SYSTEM MASTER]
-
- THERE IS EXACTLY ONE SYSTEM MASTER (SM)
- AND HIS USER ID IS A000. HE CAN
- PROTECT & UNPROTECT PROGRAMS IN THE SYS
- TEM LIBRARY. ALL USERS HAVE ACCESS TO
- THESE FILES BY TYPING LIBRARY TO VIEW T
- HEM. ONLY THE SYSTEM MASTER CAN MODIFY
- THESE FILES SINCE HIS PRIVATE LIBRARY &
- GROUP LIBRARY CONSTITUTE THE SYSTEM
- LIBRARY. THE SM ALSO HAS ACCESS TO OTH
- ER PRIVILEGED COMMANDS SUCH AS:
-
- DIRECTORY: THIS COMMAND WILL PRINTOUT
- ALL FILES AND PROGRAMS STOED ON THE
- SYSTEM ACCORDING TO USERS.
- DIR WILL PRINT OUT THE ENTIRE
- DIRECTORY. DIR-S500 WILL S
- TART LISTING THE DIRECTORY WITH USER
- S500.
-
- EXAMPLE:
-
- DIR
- BOCES ED 1 053/84 1243
-
- ID NAME DATE LENGTH DISC
- DRUM
- A000 ALPHA 043/84 00498 001384
- BCKGMN 053/84 04564 001526
- FPRINT 053/84 00567 002077
- STOCK 038/84 04332 002753
- TFILE 020/83 F 00028 002804
- WUMPUS 053/84 P 02636 003142
- B451 BLJACK 316/75 03088 011887
- GOLF 316/75 02773 011911
- S500 GIS 050/84 C 03120 019061
- GISCL4 050/84 F 03741 022299
- Z999 HELLO 021/84 00058 011863
-
- IN THIS EXAMPLE, THE SYSTEM NAME IS BOC
- ES ED 1. THE DATE OF THE PRINTOUT IS
- THE 53RD DAY OF 1984 (053/84) AND THE T
- IME IS 12:43 (24-HR). THE FILES
- APPEARING UNDER A000 ARE THOSE IN THE S
- YSTEM LIBRARY. THE DATE ASSOCIATED WITH
- THE PROGRAM IS THE DATE IT WAS LAST REF
- ERENCED. THE LENGTH IS HOW LONG IT IS
- IN WORDS. DISC REFERS TO ITS STORAGE B
- LOCK LOCATION ON ONE OF THE HARD DRIVES.
- DRUM REFERS TO ITS LOCATION ON THE DRUM
- STORAGE UNIT. ONLY SANCTIFIED PROGRAMS
- ARE STORED ON A DRUM TO INCREASE THEIR
- ACCESS TIME. THE LETTERS AFTER THE DATE
- REFER TO F IF IT IS A FILE, P MEANS IT
- IS PROTECTED, AND C MEANS THE PROGRAM IS
- COMPILED. IN THE EXAMPLE THE SYSTEM PR
- OGRAM, WUMPUS, WAS LAST USED ON THE 53RD
- DAY OF 1984 (2-22-84); IT IS CURRENTLY
- UNLISTABLE (PROTECTED) AND IT OCCUPIES
- 2636 WORDS OF MEMORY STARTING AT DISC B
- LOCK 3142. THE COMMAND SDIRECTORY WILL
- PRINT OUT PROGRAMS THAT ARE ONLY STORED
- ON DRUM. MOST SYSTEM DIRECTORIES ARE
- USUALLY LONGER THAN THE EXAMPLE. THE A
- BOVE EXAMPLE IS AN ABRIDGED VERSION OF A
- 43 PAGE DIRECTORY! THE <BREAK> KEY WIL
- L STOP THE LISTING IF NECESSARY.
-
-
- REPORT
-
- THE REPORT COMMAND WILL SHOW THE USER I
- D, HOW MUCH TERMINAL TIME THEY HAVE USED
- SINCE THE LAST BILLING PERIOD (IN MINUT
- ES), AND HOW MUCH DISC SPACE THEY ARE
- USING.
-
- EXAMPLE:
-
- REPORT
- BOCES ED 1 055/84 1905
-
- ID TIME SPACE ID TIME SPACE
- I TIME SPACE
- A000 01150 12625 B451 00003 05861
- B864 00000 00000
- S500 00235 06861 S543 00421 00000
- Z999 00000 00058
-
- THE ADVANTAGE OF HACKING THE A000 PASSW
- ORD FIRST IS THAT YOU CAN USE THE
- PRIVILEGED COMMANDS TO SEE WHICH WHICH
- USER ID'S EXIST AND WHAT PROGRAMS ARE
- STORED WHERE SO THAT YOU CAN FURTHER PE
- NETRATE THE SYSTEM.
-
-
- PORT
-
- THIS COMMAND TELLS THE CHARACTER SIZE A
- ND BAUD RATE AT WHICH EACH OF THE 32
- PORTS ARE CONFIGURED. IT IS IN THE FOR
- MAT C-BBB, WHERE C=CHARACTER SIZE &
- BBB=BAUD RATE. IT IS SET UP IN COLUMNS
- OF 8. THE FIRST ROW CORRESPONDS TO
- PORTS 0-7, THE SECOND ROW CORRESPONDS T
- O 8-15, ETC. THIS IS GENERALLY USELESS
- IN MY OPINION. ALSO, THE PORTS ARE USU
- ALLY ONLY CONFIGURED SEPARATELY IF THE
- TERMINALS ARE ALL HARD-WIRED.
-
-
- STATUS
-
- THIS COMMAND ALLOWS THE SM TO VIEW INFO
- RMATION CONCERNING THE MASS-STORAGE
- DEVICES. IT GIVES CURRENT LOCATIONS OF
- THE ID TABLE, USER SWAP AREAS, LINE
- PRINTER STATUS, ETC. IT TENDS TO HOLD
- ALOT OF INFO IF IT IS READ CORRECTLY.
- UNFORTUNATELY, I DON'T HAVE THE ROOM TO
- FULLY DISCUSS IT HERE.
-
- SINCE ALL LOGINS & LOGOUTS ARE PRINTED
- AT THE SYSTEM CONSOLE ALONG WITH OTHER
- PERTINENT INFORMATION, I WOULD STRONGLY
- SUGGEST THAT YOU AVOID EXTENSIVE USE OF
- AN A000 PASSWORD IF YOU FIND ONE.
-
- THE SYSTEM OPERATOR HAS ACCESS TO ALOT
- OF OTHER COMMANDS. UNFORTUNATELY, HE IS
- SITUATED AT THE SYSTEM CONSOLE WHICH IS
- HARD-WIRED TO THE COMPUTER. IF ANYONE
- FIGURES OUT A WAY TO GIVE A REMOTE USER
- SYSOP PRIVILEGES, LET ME KNOW & I CAN
- HELP YOU WITH HIS COMMANDS.
-
-
- NON-PRIVILEGED COMMANDS
- -----------------------
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- LIBRARY - LISTS THE SYSTEM PROGRAMS. T
- HERE IS ONLY 1 SYSTEM LIBRARY & ANY USER
- CAN ACCESS IT.
- EXAMPLE:
-
- LIBRARYTO RETRIEVE A PROGRAM FROM THESYSTEM LI
- BRARY, YOU WOULD TYPE:
-
- GET-NAME (TO LOAD THE STOCK PRO
- GRAM, YOU WOULD TYPE GET-STOCK)
-
- YOU CAN THEN RUN OR LIST IT. IF YOU AT
- TEMPTED TO LIST WUMPUS WHICH IS
- PROTECTED (P), IT WOULD SAY RUN ONLY.
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- GROUP - LISTS ALL FILES IN YOUR GROUP.
- IT IS IN THE SAME FORMAT AS THE LIBRARY
- =5599
-
- TO RETRIEVE A PROGRAM FROM YOUR GROUP L
- IBRARY, YOU WOULD TYPE:
-
- GET-*NAME
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- CATALOG - LISTS ALL FILES IN YOUR PERSO
- NAL LIBRARY. IT IS ALSO IN THE SAME
- FORMAT AS THE LIBRARY COMMAND
- .
-
- TO RETRIVE A PROGRAM IN YOUR PERSONAL L
- IBRARY, YOU WOULD TYPE:
-
- GET-NAME
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- OTHER COMMANDS YOU CAN USE WITH YOUR PE
- RSONAL FILES (OR SYSTEM FILES IF LOGGED
- ON AS A000) INCLUDE:
-
- RUN RUNS THE PROGRAM IN THE
- USER SWAP AREA (MEMORY)
- LIST LISTS THE PROGRAM IN TH
- E USER SWAP AREA
- SAVE-NAME NAME MAY BE UPTO 6 CHAR
- ACTQ**HHMY5NAME SAVE IN COMPILED FORM
- NAME-NAME ASSIGN A NAME TO IT
- KILL-NAME DELETES A FILE FROM YOU
- R LIBRARY
- PUNCH PUNCHES A PROGRAM ONTO
- PAPER TAPE
- TAPE INPUT A PAPER TAPE
- APPEND-NAME ATTACHES THE FILE NAME
- TO CURRENT PROGRAM IN MEMORY
- LENGTH TELLS THE CURRENT LENGT
- H OF PROGRAM IN MEMORY
- LPRINTER DESIGNATES THE LINE PRI
- NTER AS USER OUTPUT DEVICE
- OPEN CREATES A FILE [OPEN-FI
- LE,# OF RECORDS, (RECORD LENGTHS)]
- RENUMBER RENUMBERS STATEMENTS
- [REN-(1ST STATEMENT #),
- (INTERVAL BETWEEN STATEMENTS),(# TO
- START RENUMBERING AT),
- (# TO END RENUMBERING)]
-
- NOTE: ALL COMMANDS CAN BE ABBREVIATED
- TO THE FIRST 3 DIGITS. THE MAIN COMMAND
- IS SEPARATED FROM THE FIRST PARA
- METER BY A DASH (-), THE FIRST PARAMETER
- IS SEPARATED BY THE SECOND PARAM
- ETER BY A COMMA (,), AND ALL FURTHER
- PARAMETERS ARE SEPARATED BY COMM
- AS. EG, HEL-A000,^C(I DID ACTUALLY
- FIND A SYSTEM WHERE THE SM PASSW
- ORD WAS ^C).
-
- OTHER USEFUL COMMANDS
- ---------------------
-
- BYE LOGS USER OFF
- ECHO-ON HALF-DUPLEX
- -OFF FULL-DUPLEX (DEFAULT)
- SCRATCH1IMUSERS SWAP AREA
- (NEW)
- KEY TRANSFERS CONTROL TO KE
- YBOARD
- TIME INFORMS USER OF TOTAL C
- ONNECT TIME & CONSOLE TIME
- MESSAGE SENDS A MESSAGE TO SYSO
- P CONSOLE [MES-(TEXT UPTO 68 CHARS)]
-
-
- TSB 2000
- --------
-
- THE PROGRAMMING OF THE SYSTEM IS ABOVE
- THE SCOPE OF THIS TUTORIAL. IF YOU DO
- MANAGE TO GET INTO THE A000 OR Z999 ACC
- OUNTS, THERE IS SUFFICIENT INFO
- PROVIDED IN THIS TEXT TO HELP YOU MANIP
- ULATE THE DATA. THE BASIC IS RATHER
- EXTENSIVE. THE FILE COMMANDS ARE EXCELL
- ENT & YOU CAN MASK FILES SO THAT NOBODY
- CAN READ THEM WITHOUT THE PROPER MASK (
- I HAVE ALREADY CRACKED THIS CODE,
- THOUGH!). BRIEFLY, IT IS SIMILAR TO MOS
- T OTHER BASIC'S. IF YOU WANT, ORDER
- THEIR PROGRAMMING MANUAL. IT IS CALLED
- 20854A TIMESHARED BASIC/2000, LEVEL F
- (PART # 02000-90073).
-
- NOTE: THERE ARE DIFFERENT LEVELS (VERS
- IONS) OF TSB/2000. THIS ARTICLE IS
- BASED PRIMARILY ON LEVEL F. MOS
- T OF THE LEVELS ARE SIMILAR IN THEIR
- COMMANDS SO THE DIFFERENCES SHOU
- LD NOT AFFECT THE HACKER. ALSO, SOME
- SYSTEMS ARE CUSTOMIZED. EG, ONE
- SYSTEM I KNOW DOESN'T HAVE THE MESSAGE
- COMMAND BECAU*_"!EDON'T WANT
- THE OPERATOR BOTHERED WITH MESSAGES.
- ANOTHER SYSTEM SAYS ??? INSTEAD
- OF PLEASE LOG IN AND ILLEGAL INSTEAD OF
- ILLEGAL ACCESS. THESE ARE ONLY
- TRIVIAL PROBLEMS, THOUGH.
- PROGRAMS
- --------
-
- HEWLETT-PACKARD OFTEN SUPPLIES PROGRAMS
- FROM THEIR TSB LIBRARY FOR THE SYSTEMS.
- UTILITIES SUCH AS ASCII*, FPRINT, & OTH
- ERS ARE ALMOST INEVITABLY FOUND ON
- EVERY SYSTEM. STANDARD GAMES SUCH AS W
- UMPUS, STOCK, LUNAR, & MANY OTHERS ARE
- ALSO A "SYSTEM OUST." OTHER COMPANIES
- OFFER VERY LARGE PROGRAMS FOR THE
- HP2000 ALSO. GIS (GUIDANCE INFORMATION
- SYSTEMS) IS A DATABASE TO HELP GUIDANCE
- COUNSELORS HELP STUDENTS TO SELECT COLL
- EGES, JOBS, FINANCIAL AID, ETC. GIS IS
- USUALLY FOUND IN TH S5XX GROUP LIBRARY
- (ANYONE WITH AN S5XX PASSWORD CAN USE
- IT). UNFORTUNATELY, SOMETIMES THESE PR
- OGRAMS ARE SET SO THAT A CERTAIN
- PASSWORD WILL AUTOMATICALLY RUN THEM.
- IN SOME CASES YOU CAN ABORT BY PRESSING
- THE <BREAK> KEY. THERE IS A BASIC FUNC
- TION [X=BRK(0)] THAT DISABLES THE
- <BREAK> KEY. IN THIS CASE, ONLY THE SY
- SOP OR THE PROGRAM CAN THROW YOU INTO
- BASIC.
-
- THERE ARE MANY ALLEGED BUGS ON THE HP20
- 00 THAT ALLOW USERS TO DO ALL SORTS OF
- THINGS. IF YOU RUN ACROSS ANY OF THESE
- BE SURE TO LET ME KNOW.
-
- I HAVE SEEN ONE SYSTEM THAT CONSISTED O
- F 2 HP2000'S RUNNING TOGETHER. IN THIS
- CASE, THE MULTIEAIWOULD FIRST ASK T
- HE USER SYSTEM 1 OR SYSTEM 2? BEFORE
- LOGGING IN. YOU WOULD THEN TYPE SYS1 O
- R SYS2.
-
- MOST OF THE HP2000 SYSTEMS ARE USED BY
- SCHOOLS, SCHOOL DISTRICTS, BOCES,
- AND VARIOUS BUSINESSES. THIS WAS AN ID
- EAL SYSTEM FOR SCHOOLS BEFORE MICRO-
- COMPUTERS EXISTED. THE HP2000 SYSTEM H
- AS BEEN IN EXISTANCE SINCE AROUND 1973.
- IT HAS BEEN REPLACED BY THE HP3000 BUT
- THERE ARE STILL MANY HP2000 SYSTEMS IN
- EXISTANCE & I BELIEVE THAT THEY WILL ST
- AY THERE FOR AWHILE.
-
- HERE ARE THE DIAL-UPS TO A FEW HP2000 S
- YSTEMS TO GET YOU STARTED:
-
- [314/645-1289]
- [203/622-1933]
- [312/398-8170]
-
- IF YOU NEED HELP WITH ANYTHING ON AN HP
- 2000 OR FIND OTHER HP2000 SYSTEMS, FEEL
- FREE TO ASK ME. ANY COMMENTS, CORRECTI
- ONS, AND/OR THREATS ARE ALSO WELCOME.
-
- YOURS TRULY,
-
- *****BIOC
- *==*AGENT
- *****003
-
- <<=-FARGO 4A-=>>
-
- (P) APRIL 8, 1984 [THE YEAR OF BIG BRO
- THER]
-
- SHERWOOD FOREST ][ - (914) 359-1517
- RACS III - (914) 942-2638
-
- PS SYSOPS OF OTHER BBS'S ARE WELCOME TO
- USE THIS MATERIAL ON THEIR BOARD
- PROVIDING THEY DO NOT ALTER ANYTHING
- .
-
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
-
- Downloaded from P-80 Systems.....
-