home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 46.5 KB | 1,203 lines |
- -------------------------------------------------------------------------------
-
- ######### ############ #########
- ########### ############ ###########
- #### #### #### #### ####
- #### #### #### #### ####
- #### #### ######## ###########
- #### #### ######## #########
- #### #### #### ####
- #### #### #### ####
- ########### #### ####
- ######### #### ####
-
- DIGITAL FREE PRESS
- -------------------------------------------------------------------------------
- Volume 1.0 Issue 4.0
- -------------------------------------------------------------------------------
-
- * A Publication of The Underground Computing Foundation (UCF) *
-
- * Send Subscription Requests to: dfp-req%underg@uunet.uu.net *
-
- * Send Submissions to: hackers%underg@uunet.uu.net *
-
- * Editor: Max Cray (max%underg@uunet.uu.net) *
-
- Back issues can be found in the CUD archives at ftp.eff.org
-
- [Note: BBS is not currently up. Sorry.]
- ------------------------------------------------------------------------------
-
- Statement of Purpose and Disclaimer
-
- The Digital Free Press is an uncensored forum to document current
- activities in and of the world of modern technology. It is published under the
- premise that it is better to know, rather than not know, so no attempt is made
- to hide any information no matter how dangerous it may be. Information is a
- double edged sword. It is neither good nor bad, and can be used for either
- good or bad. Warning: Some information in this document could be used for
- illegal activities. Use at your own risk. Articles are the opinion of the
- authors listed, and not of the editor (unless of course the editor wrote
- it). Information is not verified for accuracy.
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
- In this Issue:
-
- 1. Mail to Max
- 2. Privacy and Electronic Mail by GodNet Raider
- 3. Hardware Destructive Code by The BBC
- 4. Invisible Killer Chips by Jean-Bernard Condat
- 5. Short Takes:
- - Hacking Remote Access by PeeWee
- - Little Black Book of Viruses Review by PeeWee
- - Where to find Online Library Catalogs, and
- How to get info about DEC's new Alpha chip by Wes Morgan
- - Compiling C programs on a VMS system by Max Cray
- 6. Paid Advertisement by UPi
- 7. FutureCulture (Condensed) by Hawkeye
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- Mail to Max:
- -----------
-
- Date: Tue, 28 Apr 92 14:05 GMT
- From: Jean-Bernard Condat <uunet!mcimail.com!0005013469>
- To: Max Cray <underg!max>
- Subject: RE: DFP #3 Bounce Test
-
- Dear Max:
-
- The scene in France is very clear: nothing. The police look at what the
- Chaos Computer Club france (CCCF) make... and the secret services work
- on several formations for all the people! A lot of anti-virus softwares
- are available, but some softs are sell with viruses in it (!). I paid
- US$1,000 pro week like Craig Neidorf... because I "have perhaps possess
- one hard-to-find NUI"! I mind that the US hacking market is the same:
- you have some blue box codes available, the French hackers have some
- "Carte Pastel Internationale" codes... and France Telecom don't make any
- thing against that. Only some poor teenagers are arrested, but in 60%,
- they don't found the good people!
-
- Can I help you?
-
- Jean-Bernard Condat, General Secretary, CCCF
- B.P. 8005
- 69351 Lyon Cedex 08, France
-
- [Editor's note: Of course you can help! Send all your information to:
- hackers%underg@uunet.uu.net and I will try to edit it
- to make it even more useful, and then I will publish
- it in the DFP!]
-
- -----------------------------------------------------------------------------
-
- From: Root of all Evil Account <uunet!stormking.com!root>
- Subject: Re: Digital Free Press #3
- To: underg!max (Max Cray)
- Date: Sun, 26 Apr 92 19:38:24 EDT
- X-Mailer: ELM [version 2.3 PL11]
-
- Dear Mr. Cray,
-
- Recently, 4 users of this system complained about receiving
- copies of your "Digital Free Press". As the distribution site for Phrack,
- I in no way discourage freedom of electronic speech. I do, however,
- discourage "cyber junk-mail". Each of the users mentioned they had not
- specifically asked for this to be sent to them.
-
- In the future, please verify any subscriptions of your newsletter
- through me.
-
- The Root of all Evil at StormKing.Com
-
- [Editor's note: 'Mr. Cray' ... I like that!]
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- From: gnr@tsf.UUCP (GodNet Raider)
- Date: Wed, 26 Feb 92 05:17:53 EST
- Organization: The CyberUnderground
-
-
- -=[ Privacy and electronic mail ]=-
-
- -or-
-
- /*************************************/
- /* How to whisper over a crowded net */
- /*************************************/
-
- - written by -
- GodNet Raider
- - of -
- The CyberUnderground
-
- -=[ "Information is the greatest weapon of power to the modern wizard." ]=-
-
- ]----------------------------------------------------------------------------[
-
- Introduction:
- -------------
-
- A while back I was listening to a pro password sysop talk about the
- 'evils' of hacking. His biggest point was that 'a hacker could read
- private mail from/to the person whose' account they have accessed. The
- right or wrong of that point I will leave to others to discuss/flame/get
- flamed over. What stuck with me was the fact that he like many other
- sysops and system admin, their friends and whoever else can access the
- system at high level (or in the case of DOS, can pound the local
- keyboard), can also read any text messages they wish. Some even feel that
- it is a god given right to read any mail, strange seeing that the
- government and even ma bell (remember the phone chase from _the_cuckoo_
- nest_ they could not get the phone number for they did not have a valid
- warrant in in that state) must get a search WARRANT to do the same thing.
- Well it seems what they feel god has giveth them, GodNet Raider can
- taketh away.
-
- So I thought there must be a simple way to make truly private
- messages to protect all from this 'hacker threat' and nosey sysops
- (etc..) as well (without having to resort to using DES and uuencode,
- for it is slow and a bit of a hassle to use a lot (but it should be noted
- this is the most secure method). Then I remembered an article I read
- in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion
- of Doom Technical Journals can be found in the CUD archives at
- ftp.eff.org. Highly recommended.] It contained a basic BASIC
- program and explanation to a simple text encryption method using
- cellular automatons by The Mentor (strongly recommended reading for
- understanding the theory behind the method).
-
- After converting the BASIC code for the second program to C (under
- Minix) I proceeded to make changes to (hopefully improve) it. What
- I came up with is included at the end of this file (MsgLock.c).
-
- Of the changes made:
-
- Added the use of stdin/stdout to support a wide extent of I/O
- methods.
-
- Used multiple cells in defining shift amount.
-
- Allowed the pass though of char.s not in aszValid array (raw
- output) to keep message integrity (returns and tabs that a
- message may gain/lose in some online editors).
-
- Added code to expand small key strings to fill out key cells.
-
- So I hope you find MsgLock of use and remember...
-
- WMIe`H-h(`[ga0)9oW-/V
-
- MsgLock wish list/projects:
- ---------------------------
-
- MsgLock is by no means complete following are some suggestions for
- the obsessed prodigies out there who want to expand on the basic idea.
-
- For a more private version one can change:
-
- The size of the key cells (#define WIDTH xx).
-
- The expansion methods used to fill out the initial key cells.
-
- The key cell update method.
-
- The order of the char.s in aszValid.
-
- Adding/removing char.s from aszValid.
-
- Msglock could use a way to know when an encoded area begins and
- ends (like the 'begin'/'end' in uuencoded files) to save post
- processing on net messages.
-
- Removal of char.s used in quoted messages so that it will not try
- to process (cook) char.s added to quoted messages.
-
- Changes to allow it to be treated like a ASCII Xfer protocol in
- term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS,
- etc..) as an auto encrypt for chat/general online use.
-
- Or many others I have not thought of.
-
- MsgLock source code:
- --------------------
-
- MsgLock was compiled in Minix using the ACK compatible compiler and
- under DOS using Turbo C++ using ANSI C compatible commands.
-
- Usage:
- msglock [-d] Key
-
- -d(code) : Decode stdin to stdout (MsgLock otherwise
- encodes stdin to stdout. -d is only
- used for decoding if followed by a
- space and is the first parameter following
- the command ('-dKEY' will be used as a key
- to encode stdin, use '-d -dKEY' instead to
- decode)
-
- Key : String of char. used to encode/decode stdin
- to stdout. String can contain spaces.
-
- Examples:
-
- msglock key <file1.txt >file2.txt
- Encode file 'file1.txt' to 'file2.txt' using the key string
- 'key'.
-
- msglock -d this is the key <foo
- Decode the file 'foo' to the screen using 'this is the key'
- as the key string.
-
- msglock knowledge is power >com1 (/dev/tty1 for minix users)
- Encode keyboard input (using the key 'knowledge is power')
- directly to the device/terminal on com port 1.
-
- +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
-
- /*
- MsgLock.c
- by GodNet Raider.
- Based on a program for encrypting using cellular automaton
- by The Mentor
-
- Allows encoding of text for transmittal over computer nets and BBSs.
-
- This program is not to DES standards and should not be considered 100%
- secure by any means.
- */
-
- #include <stdlib.h>
- #include <string.h>
- #include <stdio.h>
- #include <ctype.h>
-
- #define TRUE 1
- #define FALSE 0
- #define SPACE 0x20
- #define WIDTH 50
- #define MAX_CELLS (WIDTH + 2)
-
- char
- *aszErrMsg [] =
- {
- "Usage: msglock [-d(ecode)] Key",
- "Write error on stdout.",
- "Read error on stdin."
- },
- asCells [2] [MAX_CELLS],
- /* Not using 0 offset to prevent errors caused by the fact that */
- /* (0 % x == x % x). */
- aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST"
- "yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"",
- fActive = 0,
- fDecode = FALSE;
-
- void
- main (int, char **),
- FatalErr (int);
-
- void main (argc, argv)
- int
- argc;
- char
- *argv [];
- {
- char
- sWorkKey [WIDTH],
- cInChar;
- int
- nArgCnt = 1,
- nTmpCnt1 = 1,
- nTmpCnt2 = 0,
- nValidSize;
-
- nValidSize = strlen (aszValid) - 1;
- /* Check for missing parameters. */
- if (argc == 1)
- FatalErr (1);
- /* Check if decode, else default to encode */
- if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2])
- {
- /* Check for missing parameters, again. */
- if (argc < 3)
- FatalErr (1);
- fDecode = TRUE;
- nArgCnt++;
- }
- /* Move key in to encode/decode key cells to the max set by WIDTH. */
- while (nTmpCnt1 <= WIDTH && nArgCnt < argc)
- if (argv [nArgCnt] [nTmpCnt2])
- asCells [1] [nTmpCnt1++] =
- argv [nArgCnt] [nTmpCnt2++];
- else
- if (++nArgCnt < argc)
- {
- asCells [1] [nTmpCnt1++] = SPACE;
- nTmpCnt2 = 0;
- }
- nTmpCnt2 = 1;
- /* Fill unused cells in key cells up to WIDTH. */
- while (nTmpCnt1 <= WIDTH)
- asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^
- asCells [1] [nTmpCnt1 - 1];
- /* Process stdin. */
- while ((cInChar = (char) getc (stdin)) != EOF)
- {
- /* Check if char. is in aszValid list, if so cook, */
- /* else let it pass though raw. */
- nTmpCnt2 = nValidSize;
- while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar)
- nTmpCnt2--;
- if (nTmpCnt2)
- {
- /* Update key cells, excluding head and tail. */
- for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++)
- asCells [fActive] [nTmpCnt1] =
- asCells [fActive ^ 1] [nTmpCnt1 - 1] ^
- (asCells [fActive ^ 1] [nTmpCnt1] |
- asCells [fActive ^ 1] [nTmpCnt1 + 1]);
- /* Update head of key cells. */
- asCells [fActive] [0] =
- asCells [fActive ^ 1] [WIDTH + 1] ^
- (asCells [fActive ^ 1] [0] |
- asCells [fActive ^ 1] [1]);
- /* Update tail of key cells. */
- asCells [fActive] [WIDTH + 1] =
- asCells [fActive ^ 1] [WIDTH] ^
- (asCells [fActive ^ 1] [WIDTH + 1] |
- asCells [fActive ^ 1] [0]);
- /* Get char shift offset value */
- cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH;
- /* Get char shift value */
- cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)];
- /* Switch to updated key cells for next pass. */
- fActive ^= 1;
- /* If decode is TRUE then shift left though aszValid, else */
- /* shift right (negative numbers in cInChar reverses this). */
- if (fDecode)
- {
- /* Needed to bypass warning message (turbo C++ gets */
- /* confused sometimes when it sees a single '=' in */
- /* an 'if' statement, even though it is bracket to be */
- /* evaluated before the 'if'). */
- #ifdef __TURBOC__
- if ((cInChar = nTmpCnt2 - cInChar) != 0)
- #else
- if ((cInChar = nTmpCnt2 - cInChar))
- #endif
- {
- if ((cInChar %= nValidSize) < 1)
- cInChar = nValidSize + cInChar;
- }
- else
- cInChar = nValidSize;
- }
- else
- if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize))
- cInChar = nValidSize;
- /* Write cooked char. to stdout. */
- if (putc (aszValid [cInChar], stdout) == EOF &&
- ferror (stdout))
- FatalErr (2);
- }
- else
- /* Write raw char. to stdout. */
- if (putc (cInChar, stdout) == EOF && ferror (stdout))
- FatalErr (2);
- }
- /* Check for file error on stdin. */
- if (ferror (stdin))
- FatalErr (3);
- /* End program run. */
- exit (0);
- }
-
- void FatalErr (ErrNum)
- int
- ErrNum;
- {
- /* In every life a little rain must fall. */
- /* Complain and bail out. */
- fprintf (stderr, "\n%s\n", aszErrMsg [ErrNum - 1]);
- exit (ErrNum);
- }
-
- +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
-
- ]============================================================================[
-
- ...uunet!underg!tsf!gnr (GodNet Raider)
- -=[ "You gotta learn to listen, before you learn to play." ]=-
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- To: hackers@tsf.UUCP
- Subject: Text phile 5.
- From: bbc@tsf.UUCP (The BBC)
- Organization: The CyberUnderground
-
- Da da.. da da dup... Da da.. da da dup... Da da.. da da dup...
- Yes boys and girls... It time once again for your favorite waste
- of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel
- The moose show... So put your antlers on and lets now go to the
- magical land of frostbite Falls Min. An see what our heroes are up
- to...
-
- Golly gee Hack... Every time I crash a sysops hard drive with
- a trojan... they just reformat the drive and reinstall the
- software and are up and running again... I wish there was a way
- to bring them down that would really give them something to think
- about...
-
- Maybe there is lets go see Mr. Woopie and his 3D BBC,
- crashwinkel...
-
- So our HEROES went to see Mr. Woopie... But where confronted
- by Tennessee tuxedo and his friend chumly... But a quick squeeze
- of the trigger on their semi automatic weapons and a short thank
- you note to the NRA... An they where in...
-
- So you boys want to know how to cause more than just data loss
- with trojans? Well lets ask the 3D BBC...
-
- Thank you Mr. Woopie... It sounds like you boys want to hear
- about how to force hardware problems using software... 'Wow
- Hacket.I only thought you could only do major data loss with
- trojans.'... Yes but there are other nasties you could pull if you
- want to...
-
- Take this simple bit of code for example:
-
- ===============================================================
- mov Ax, 0508h
- mov CX, 8001h
- mov DX, 0000h
- int 13
- ===============================================================
-
- This small bit of codes just moves the disk heads past the inner
- most track... 'But what good is that BBC?'... Well our furry little
- friend... Some disks will lock and the only way to fix it is to open
- the bugger up... An since the only way to be sure this will or won't
- work is to try it... Well...
-
- Or how about this bit of code:
-
- ===============================================================
- xor Al, Al
- NextPass:
- mov DX,ffffh
- NextPort:
- out DX, AL
- dec DX
- jnz NextPort
- inc AL
- jmp short NextPass
- ===============================================================
-
- We like to call it armageddon... 'Ohhh, Ahhhh'... It simply
- looks for and writes to every port in the system... An based
- on the hardware in the system it can... Toast monitors, Change CMOS
- values, Change stepper rates, Change voltages (to burn/disable cards,
- boards, and memory), Reek havoc on co-processers, Disable networks,
- As well as other nasties too numerous to mention... Seeing that there
- is some time involved in writing all those ports... The poor fool
- has some time to guess what is going on and shut the computer down
- (oh about 4 min.)... 'But we can't test things like that on our
- computers.' 'How will we know if it will work or not.'... Who said
- to test it on your systems... Not that we would suggest you test
- it on others systems... That would make you a wast of humanity
- like...
-
- The BBC
-
- ----------------------------------------------------------------------
- ...uunet!galaxia!divinity!tsf!bbc (The BBC)
- -=[ "Anarchy is never HAVING to say you're sorry." ]=-
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- Invisible Killer Chips Now Available
-
-
- Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France)
- No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139
- By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France)
-
-
- The military use of computer viruses is often overblown, if not just
- simple disinformation as in the recent Iraqi case. But researchers at
- Boston University have developed and patented (U.S. patent 5 049 775)
- an infinitely more offensive and effective anti-computer agent: the
- silicon ant. Micro-electronics has perfected technologies for making
- toys and machines so small that they are invisible.
-
- Using piezoelectric ceramics which expand or contract under an
- electric current, the researchers constructed a microscopic ship with
- three "legs" on each side and a "cutter" in front. By alternating
- current in different sides of each "leg", it bends forward or backward.
-
- Under remote control the killer chips can be "walked" into a computer
- and cut up other microscopic chips, turn around and "walk" away, leaving
- invisible damage in the computer system. The killer chips could be solar
- powered and therefore have an indefinite life-span.
-
-
- PATENT DESCRIPTION
-
-
- 008245420 WPI Acc No: 90-132421/17
- XRPX Acc No: N90-102550
- Piezoelectric micro-machine or robot basic operating unit - made by
- covering silicon cantilever beams projecting from frame with
- piezoelectric material when applied voltages cause them to deflect
- Patent Assignee: (UYBO-) BOSTON UNIV
- Author (inventor): SMITS J G
- Number of Patents: 002
- Patent Family:
- CC Number Kind Date Week
- WO 9003665 A 900405 9017 (Basic)
- US 5049775 A 910917 9140
- Priority Data (CC,No,Date): US 251565 (880930);
- Applications (CC,No,Date): WO 89US4129 (890921);
- EP and/or WO Language: English
- EP and/or WO Cited Patents:
- No.SR.Pub
- Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU
- ; NL; SE
-
- Abstract (Basic): WO 9003665
-
- An electrical micromachine is made by securing films (20,22) of
- piezoelectric material to the top surfaces (16,18) of crystalline
- silicon beams (12,14) projecting from a crystalline silicon body (10)
- to form a bimorph structure. A potential applied across the ends
- (24,26) of the piezoelectric films causes the beams to deflect. The
- piezoelectric material used is zinc oxide.
- A number of such micromachines can be assembled to form a robot,
- and when a foot (30) is provided the machine can move itself along a
- surface by sequential deflecting and straightening of the beams. The
- foot can be associated with a toothed wheel to produce rotary motion.
- The micromachine may be solar powered, and can be associated with
- sensors or a microprocessor with programmable memory.
- USE - Microsurgical tools, and robots for grasping, carrying or
- cutting tasks. @(33pp Dwg.No.1/10)@
-
- Abstract (US): 9140 US 5049775
-
- The piezoelectric actuation machine comprises two cantilever beams
- extending from a frame. The beams comprise a piezoelectric material
- such that application of an electric potential across the material of
- each beam rotationally diplaces the first and second beams relative to
- each other.
- An actuating member is secured between displaceable surfaces on
- the beams and extends orthogonally from a plane through the beams such
- that relative displacement of the beams displaces a portion of the
- member in a direction orthogonal to beam displacement. A rigid object
- contacting the displaced portion of the member is translated relative
- to the member and the frame.
- USE - For piezoelectric micromachines e.g. small robot or cutting
- tool. @(17pp)@
-
- File Segment: EPI
- Derwent Class: S05; V06; X25; R46;
- Int Pat Class: H01L-041/09
- Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E
-
-
- Jean-Bernard Condat
- General Secretary
- Chaos Computer Club France
- B.P. 8005
- 69351 Lyon Cedex 08, France
- Tel.: +33 78 61 15 88
- <uunet!mcimail.com!0005013469>
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- Short Takes:
- -----------
-
- ------------------------------------------------------------------------------
-
- From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee)
-
- Hey, press alt-200 (on the numberpad) to access the highest level
- menu in Remote Access v1.10. Often lets u shell out to DOS.
-
- ------------------------------------------------------------------------------
-
- From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee)
-
- Hey! have you got your copy of The little black book of
- Computer viruses yet?
-
- It's very detailed and good! I had to order it and have it
- shipped over here to me, took me about 3 months (worth the wait!)
- The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle
-
- ------------------------------------------------------------------------------
-
- From: Wes Morgan <uunet!engr.uky.edu!morgan>
-
- Obligatory Information Pointers:
-
- List of Online Library Catalogs:
- Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library.
- Versions are available in plaintext, PostScript, and WordPerfect 5.0.
-
- [Editor's note: With these lists of online library catalogs you can find out
- much information by learning what libraries have the info
- that you need, and then requesting it via an inter-library
- loan.]
-
- DEC's new Alpha chip (for you hardware fanatics):
- Call 1-800-332-2717 and ask for the "Alpha Packet". They'll send you
- the Architecture Handbook (detailed) and more information about the
- Alpha chip.
-
- ------------------------------------------------------------------------------
-
- From: Max Cray <max%underg@uunet.uu.net>
-
- On a VMS system you can not simply type 'CC HELLO.C' to compile a C
- program. First you have to define a Link Library. This command will work
- for a generic program that does not need floating point:
-
- DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL
-
- For more information use the excellent help system in VMS. Simply Type
- 'HELP CC'.
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- PAID POLITICAL ADVERTISEMENT
-
- UPi has once again returned and it no longer the shit group it used to be in
- the past. UPi is a group that puts out newsletters that deals with the
- H/P/C/A world. In the past, our newsletters averaged only 1 article in length
- (which in size means a range of 25-50k) but now in the all new UPi newsletter
- we have decided to expand it so it will contain more articles (and all quality
- articles which means no more of those little shitty files that contains
- useless information). What we are looking for are quality members and sites
- that are willing to contribute to the group and support the group. We are
- also looking for people who can freelance write for us too. We are looking
- for people who are experienced in electronics and chemistry, and as well as
- any of the P/H/C/A topics. If you would like to join UPi either as a site or
- a member or become a freelance writer for us please send mail to The Lost
- Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or
- you can contact him on his voice mail box at 416-402-0788.
-
- The Lost Avenger/UPi
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- From: uunet!isis.cs.du.edu!ahawks (floyd)
- Subject: FutureCulture Update
- To: hackers%underg@uunet.uu.net
- Date: Tue, 12 May 92 20:38:20 MDT
-
- [Editor's note: This is an edited version of Hawkeye's excellent e-mail
- FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave
- scene and thus is rather large and comprehensive. I edited out most of the
- cultural listings, and left most of the tech listings, since I intend for
- the DFP to be more of a technical journal. However it is highly recommended
- that you send him mail and get on the mail list.]
-
- _____________________________________________________________________________
- | |
- | Magazines (hardcopy) of interest: |
- |_____________________________________|
-
- Communications of the ACM
- (Association for Computing Machinery, Inc.)
- -sorry, don't have the address or subscription info, but should be
- available at any decent newsstand - also, the ACM has forums
- available on the Internet
-
- Cybertek
- OCL/Magnitude
- PO Box 64
- Brewster, NY 10509
- -hacking, cyberpunks, technology, culture
- $10 a year
-
- Fact Sheet Five
- 6 Arizona Avenue
- Rensselaer, NY 12144-4502
- 518.479.3707
- -independently-oriented reviewers of the culture
- $3.50 an issue, $33 a year for 8 issue subscriptions
- (unconfirmed rumors say it's no longer in production)
-
- Hac-Tic
- pb 22953, 1100 DL
- Amsterdam, The Netherlands
- ropg@ooc.uva.nl (Internet)
- -published near that hotbed of hackers in holland/amsterdam
- European counterpart to 2600
- $2.30 US an issue
-
- [Editor's note: The above is not in English! Is there a translator?]
-
- Intertek: The Cyberpunk Journal
- Steve Steingerg
- 325 Ellwood Beach #3
- Goleta, CA 93117
- steve@cs.ucsb.edu
- -formerly Frank Drake's W.O.R.M
- hacking, cyberspace, interviews, designer drugs, cryonics, etc.
- $2.50 an issue
-
- Iron Feather Journal
- PO Box 1905
- Boulder, CO 80306
- -hacking, anarchy, techno-phun
- $2 an issue
-
- Mondo 2000
- PO Box 10171
- Berkeley, CA 94709
- 415.845.9018 (phone)
- 415.649.9630 (fax)
- mondo2000@mcimail.mci.com
- -your definitive guide to all things cyberpunk and some things not
- should be available at any decent newsstand
- was Reality Hackers and High Frontiers
- $21 for 5 issues (published quarterly)
-
- TAP
- PO Box 20264
- Louisville, KY 40250
- -the original phreaker's rag, begun by Abbie Hoffman
- formerly YIPL (Youth International Party Line) and then it was
- Technilogical Assistance Program, now it's
- Technilogical Advancement Party
- hacking, anarchy, some political
- has undergone many publishing changes
- operates Blitzkrieg BBS @ 502.499.8933
- TAP-Online also available on some BBSes / FTP sites
-
- 2600
- PO Box 752
- Middle Island, NY 11953-0752
- 516.751.2600 (office)
- 516.751.2608 (fax)
- 2600@well.sf.ca.us (Internet)
- -the original infamous hacker's zine
- subscriptions are $21 for 4 issues (published quarterly)
- back issues are $25 / year
-
- [Editor's note: They also have meetings on the first friday of the month in
- New York City.]
-
- Whole Earth Review
- PO Box 38
- Sausalito, CA 94966-9932
- (Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us)
- -combines new age, techno-culture, california fads, etc.
- should be available at any decent newsstand
- $20 year for subscriptions
-
- ____________________________________________________________________________
- | |
- | E-Magazines and digests: |
- |_____________________________|
-
- [Editor's note: I edited out the listings that did not have references on how
- to get them. Suffice it to say that there are many more journals available
- that are not listed here. See some of the Internet and BBS listings for
- places to find these items.]
-
- Activist Times Incorporated
- gzero@tronsbox.xei.com
- -political, hacking, anarchy
-
- Computers and Academic Freedom
- listserv@eff.org <add comp-academic-freedom-news>
- -computing freedom, mostly deals with college campuses
-
- Computer Underground Digest
- tk0jut2@niu.bitnet
-
- Digital Free Press
- dfp-req%underg@uunet.uu.net
- -hacking, information, etc.
-
- EFF News (EFFector Online)
- effnews-request@eff.org
- -sends out EFFector Online, the Electronic Frontier foundation's
- e-journal
-
- Freaker's Bureau International
- au530@cleveland.freenet.edu
- -anarchy, hacking, cyberpunk
-
- Informatik
- inform@doc.cc.utexas.edu
- -hacking, phreaking, computer underground, cyberpunk, etc.
-
- Network Information Access
- nia@nuchat.sccsi.com
- -hacking, computer underground, etc.
-
- Phantasy
- Mercenary@f515.n141.z1.fidonet.org
- -anarchy, hacking
-
- Phrack
- phracksub@stormking.com
- -need we say more - the one, the only hacking e-zine...
-
- Pirate Radio
- brewer@ace.enet.dec.com
- -pirate radio
-
- RISKS Digest
- risks-request@csl.sri.com
- -the RISKS of computing in our lives
-
- Telecom Privacy Digest
- telecom-priv-request@pica.army.mil
- -deals with privacy aspects of telecommunications
- most of the conversation revolves around Caller-ID and such
-
- Telecom Digest
- telecom-request@eecs.nwu.edu
- -deals with all aspects of telecommunications
-
- Virus-l Digest
- krvw@cert.sei.cmu.edu
- (also virus-l on BITNET)
- -discussion of viruses and all aspects of 'em
-
- Worldview - Der Weltanschauung
- fox@nuchat.sccsi.com
- -hacking, computer underground, church of subgenius, political, etc.
-
- _____________________________________________________________________________
- | |
- | E-Mail Addresses: |
- |____________________|
-
- (please use care and consideration when mailing to these people)
-
- Aristotle uk05744@ukpr.uky.edu
- John Perry Barlow barlow@well.sf.ca.us
- Dorothy Denning denning@cs.georgetown.edu
- Peter J Denning pjd@cs.gwu.edu
- Desert Fox dfox@taronga.com
- Dispater dispater@stormking.com
- The EFF eff@eff.org
- Freaker's Bureau Int'l au530@cleveland.freenet.edu
- Gatsby gatsby@ryptyde.tcs.com
- Mike Godwin mnemonic@eff.org
- Emmanuel Goldstein emmanuel@well.sf.ca.us
- Ground Zero gzero@tronsbox.xei.com
- Hactic ropg@ooc.uva.nl
- Hawkeye (put this art. together)ahawks@nyx.cs.du.edu
- Intertek steve@cs.ucsb.edu
- Judge Dredd elisem@nuchat.sccsi.com
- Mitch Kapor mkapor@eff.org
- Knight Lightning (Craig Neidorf)knight@well.sf.ca.us
- kl@stormking.com
- Lord Macduff macduff@nuchat.sccsi.com
- Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb
- Mondo 2000 mondo2000@mcimail.mci.com
- Gordon Meyer 72307.1502@compuserve.com
- Peter G Neumann neumann@csl.sri.com
- Pengo (Hans Heubner) hans@trabant.at
- John S Quarterman jsq@tic.com
- Len Rose len@netsys.netsys.com
- RU Sirius rusirius@well.sf.ca.us
- Cliff Stoll cliff@cfa.harvard.edu
- Michael Synergy synergy@metaphor.com
- Jim Thomas tk0jut1@niu.bitnet
- Tuc tuc@stormking.com
- 2600 2600@well.sf.ca.us
-
- [Editor's note: How about Eric S. Raymond author of 'The New Hacker's
- Dictionary'? He is at: eric@snark.thyrsus.com.
-
- Also Belgorath provides these alternate addresses:
-
- Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or
- hans@skoda.vie.artcom.de
-
- Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu]
-
- _____________________________________________________________________________
- | |
- | FTP Sites: |
- |______________|
-
- (all of these sites carry either computer underground information, information
- on drugs, music, subgenius, etc.)
-
- 18.26.0.36 lcs.mit.edu
- 18.26.0.179 zurich.ai.mit.edu
- 128.6.4.15 pyrite.rutgers.edu
- 128.6.60.6 quartz.rutgers.edu
- 128.8.2.114 sayshell.umd.@edu
- 128.83.132.20 ??
- 128.95.136.1 milton.u.washington.edu
- 128.100.3.6 ftp.cs.toronto.edu
- 128.135.46.7 ??
- 128.135.252.7 ??
- 128.174.5.50 @uxc.@cso.@uiuc.@edu
- 128.214.6.100 @nic.@funet.fi
- 128.235.33.1 ??
- 128.252.135.4 @wuarchive.@wustl.@edu
- 129.173.4.5 cs.dal.ca
- 130.18.64.2 ??
- 130.43.2.3 bric-a-brac.apple.com
- 130.56.96.2 ??
- 130.71.192.18 stolaf.edu
- 130.234.0.1 jyu.fi
- 131.188.31.3 faui43.informatik.uni-erlangen.de
- 131.210.1.4 cs.uwp.edu
- 133.137.4.3 ??
- 134.60.66.21 ??
- 134.95.132.2 aix370.rrz.uni-koeln.de
- 137.39.1.9 uunet.uu.net
- 146.169.3.7 ??
- 192.88.144.4 eff.org
- 192.88.209.5 cert.sei.cmu.edu
- _____________________________________________________________________________
- | |
- | BBSes: |
- |__________|
- 201.451.3063 Wrong Number
- 203.485.0088 Rune Stone
- 203.628.9660 Dark Shadows
- 206.454.0075 Manta lair
- 209.526.3194 Tequilla Willie's Great Subterranean Carnival
- 214.324.3501 KeelyNet
- 214.522.5321 Dead Zone
- 215.449.1902 Time Enough for Love BBS
- 303.438.1481 The Kracker Box
- 303.871.4824 Nyx (public access unix)
- 312.528.5020 Ripco
- 401.847.2603 Underground
- 414.789.4210 PC Exec
- 415.332.6106 The Well
- 415.472.5527 The Cyberden
- 502.499.8933 Blitzkrieg
- 503.635.2615 Awakening Technology
- 512.447.4449 The Illuminati BBS
- 517.337.7319 Pure Nihilism
- 602.861.3167 Frayed Ends
- 617.475.6187 Convent
- 617.861.8976 The Works
- 618.549.4955 Free Speech
- 708.672.5426 World Trade Center
- 713.242.6853 Face-2-Face
- 718.358.9209 Switchboard
- 718.428.6776 Milliways
- 806.794.4362 Demon Roach Underground
- 914.761.6877 Uncensored
- 916.673.8412 Greenpeace's Inverted Granola Bar
-
- --
-
- [Editor's note: The Underground is no longer up (I moved). Perhaps at a
- later date I will put it back up.
-
- Other Boards I know about:
-
- 408.241.9760 NetCom - Network Access
-
- 408.245.7726 darkside.com (The Waffle support BBS)
-
- 408.867.7400 Spies in the Wire
- Most Notorius hangout for hardened Cyber-
- Criminals. Ask for access to 'The Good Stuff'
- and tell them Max sent ya.
-
- 602.894.1757 Unphamiliar Territory
- NUP (New user Password) 'Bunnylust'
-
- 717.361.0947 Digital Warfare
- Phalcon-Skism, 40 Hex Mag, Viruses
- (Sorry, forgot the NUP)
-
- 916.481.2306 Phun Line
- Password 'Darkness has Fallen'
-
- 359.2.20.4198 Virus eXchange BBS in Sofia, Bulgaria
- Working hours:
- 20:00 - 06:00 GMT (in the winter)
- 19:00 - 05:00 GMT (in the summer)
-
- Also the NUP for Blitzkrieg is 'Columbian Coke'.]
- _____________________________________________________________________________
- | |
- | Merchandise/Companies: |
- |__________________________|
-
- (a lot of the companies on this list are on the very edge of the underground,
- and would not exist but for the 1st amendment - please use caution and care
- when dealing with these people, and don't abuse them, otherwise you'll ruin it
- for us all!)
-
- Abbie Yo-Yo Inc.
- PO Box 15
- Worcester, MA 01613
- -things related to Abbie Hoffman
-
- Amok
- PO Box 861867 Terminal Annex
- Los Angeles, CA 90086-1867
- -hard to find/underground books
- catalog is a whopping $9 (400 pages)
-
- Autodesk, Inc.
- 2320 Marinship Way
- Sausalito, CA 94965
- -makers of Chaos software. $59.95
-
- Books by Phone
- Box 522
- Berkeley, CA 94701
- 800.858.2665 (orders)
- 510.548.2124 (info)
- -large library of hard-to-find books related to CP, drugs, etc.
- nice resource, but you pay a lot for it :-)
-
- Consumertronics
- 2011 Crescent Dr.
- PO Drawer 537
- Alamogordo, NM 88310
- 505.434.0234
- 500.434.0234 (fax - orders only)
- -hacking/phreaking manuals
-
- Feral House Productions
- PO Box 861893
- Los Angeles, CA 90086-1893
- -obscure books
-
- Further Connections
- Waves Forest
- PO Box 768
- Monterey, CA 93940
- -fringe science
-
- Kodak's Center for Creative Imagining
- 800.428.7400
- -offers classes in electronic imaging "taught by artists and industry
- experts with state-of-the-art technology"
- anyway, call 'em and ask 'em for their catalogue - might be decent
- (at least the ad in Mondo looks nifty :-)
-
- Loopmanics, Ltd.
- PO Box 1197
- Port Townsend, WA 98368
- -carries a large collection of underground/hard-to-find books and stuff
- send for a catalog
-
- NewTek, Inc.
- 215 SE 8th St.
- Topeka, KS 66603
- 800.843.8934
- -makers of the great Video Toaster
- send 'em $4.95 for a demo tape of what the Video Toaster does
-
- Paladin Press
- PO Box 1307
- Boulder, CO 80306
- -obscure books
-
- Re/Search Publications
- 70 Romolo Street #B
- San Franssico, CA 94133
-
- Rip Off Press
- PO Box 4686
- Auburn, CA 96504
-
- Sense8
- 1001 Bridgeway #477
- sausalito, CA 94965
- 415.331.6318
- 415.331.9148 (fax)
- -vr firm
-
- Survival Books
- 11106 Magnolia Blvd.
- North Hollywood, CA 91601
-
- TOPYUS (Psychic TV)
- PO Box 18223
- Denver, CO 80218
- -Genesis P-Orridge's Psychic TV
- send a SASE for info on Psychic TV, catalogs, albums, t-shirts,
- videos, books, etc.
-
- Virtual Research
- 1313 Socorro Ave
- Sunnyvale, CA 94089
- 408.739.7114
- -a vr firm
-
- VPL Research, Inc.
- 656 Bair Island Rd. Suite 304
- Redwood, CA 94063
- 415.361.1710
- -Jaron Lanier's famous virtual reality firm
-
- Zentech
- Box 138
- Morgan Bay Rd.
- Surry, ME 04684
- -cyberpunk, virtual reality merchandise
-
- _____________________________________________________________________________
- | |
- | see ya! |
- |___________|
- Welp, that looks like it for now. Have fun!
-
- Again, if you have any questions/comments/concerns/criticisms/corrections or
- any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The
- Kracker Box BBS at 303.438.1481.
-
- I can be reached at: ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu.
-
- ------------------------------------------------------------------------------
- ##############################################################################
- ------------------------------------------------------------------------------
-
- Personal Notes: Hello to the RI Hackers from the New Texas Hacker.
- Metacom2 send me mail!
-
- Well folks, thats all for DFP #4.
-
- Keep that e-mail coming!
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- -= Max Cray =- Freedom
- Net: underg%max@uunet.uu.net Justice
- UUCP: ...!uunet!underg!max Equality
- CI$: 76334,2203 Responsibility
-