home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 235.6 KB | 5,429 lines |
-
- Founded By: | _ _______
- Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? Are
- Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
- ------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
- \ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
- +---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
- | 20NOV91 | ___ ______ ___ ___ ___ FidoNet, et al.?
- | File 73 | ___ _____ ___ ___ ___ If so please drop us a
- +---------+ ____ _ __ ___ line at
- / \ ___ _ ___ nia@nuchat.sccsi.com
- ------------------+ __
- Editors: | _ Network Information Access
- Judge Dredd | Ignorance, There's No Excuse.
- Lord Macduff |
- ------------------+
-
- Issue 073 :: Volume 02
-
-
- "Censorship reflects society's lack of confidence in itself. It is a
- hallmark of an authoritative regime."
- - Supreme Court Justice Potter Stewart
-
-
-
- ============================================================================
- 1. NIA073 Index ................................................NIA Editors
- 2. Valley of the Nerds..........................................Walter Kirn
- 3. Internet to Anywhere...................................Industrial Phreak
- 4. Globally Tymnet................................................Hi Fi Del
- 5. Report on Interexchange Carriers.................................The FCC
- 6. Vox Populi: NIA News.........................................Judge Dredd
- 7. Hacking the HP3000 [Part I]...................................Malefactor
- 8. ** XmasCon '91 Announcement **...............................Santa Claus
- 9. Editor's Comments............................................NIA Editors
- ============================================================================
-
-
-
- / /
- / NIA073 / File 02 /
- / Valley of the Nerds /
- / by Walter Kirn /
- / /
-
- [Editor's Note: Walter Kirn has written about Spike Lee and John Updike for
- GQ. He's working in Montana on a new short-story collection.]
-
- The keys to our economic future are in the hands of Silicon Valley's young
- computer visionaries. And a lot of those visions are triggered by
- hallucinogens created in labs just yesterday. Welcome to the Second
- Psychedelic Revolution.
-
- They call themselves MacAddicts. They are hard-core users of the Apple
- Macintosh personal computer, and they've come to San Francisco by the tens of
- thousands for their annual tribal gathering, the Macworld Expo. Some have on
- suits and carry briefcases. Some have on Grateful Deat T-shirts and carry
- briefcases. More than a few of them look MacStoned.
-
- This is not just another convention; in many ways it's a cybernetic Woodstock,
- a be-in for the Information Age. Inside the vast Moscone Center, a dizzying
- sound-and-light show is in progress as corporate exhibitors with names such as
- Gizmo Technologies, MacroMind and Lifetree push their mind-bending wares,
- both hard and soft. The conventioneers stand mesmerized before the pulsing
- VDTs, absorbing each new data rush with giddy nods. A bearded man in an
- ill-fitting sport coat (he looks as if he wearrs a serape at home and subsists
- on ogranic trail mix) stares at a screen aswarm with 3-D graphics and grins
- beatifically. The Mac is beautiful, long live the Mac. Even the Japanese in
- attendance seem caught up in the digital euphoria. There is no doubt about
- it: The Apple PC, conceived in a garage by Stevens Jobs and Wozniak, has
- evolved from a kind of homegrown, countercultural calculator into a
- multibillion-dollar commercial miracle.
-
- But the Macintosh is not the only attraction at the Macworld Expo. On the
- sidewalk outside the convention hall, a trollish young man with
- shoulder-length hair and a funky brocade vest is drawing his own adoring
- audience. Ken Goffman, known to his public by the pen name R.U. Sirius, is
- the editor of _Mondo 2000_, a rapidly growing desktop-published glossy
- magazine that documents, among other things, the strange convergence of
- psychedelic-dru use and avant-garde computer science. Recent articles have
- included an interview with Timothy Leary on highter computer conscionsness
- (LSD meets the PC), a rundown of the latest intelligence-boosting
- pharmaceuticals and a talk with medical scientist John Lilly, the inventor of
- the sensory-deprivation tank and the trippy pioneer of human/dolphin
- communication.
-
- Today, Goffman has a new issue for sale, and MacAddicts, even the suited,
- Roledexed ones, are lining up to purchase it (at $5.95 a copy) at an
- astonishing rate. Possible thinking I'm with _Mondo_, one of the buyers
- apologizes to me for his Brooks Brothers costume ("My straight clothes")
- techie friends plan to drop 25D, a mild designer hallucinogen, and check out
- musician/computer-head Todd Rundgren's Utopia Grokware products.
-
- I look at the man's Macworld Expo badge and see that he's an employee of a
- major San Jose software firm. It doesn't surprise me at all. I've been in
- California for almost two weeks, deep in the psycho-silicon jungle, and I've
- met enough of its denizens to know that the "enemy" in the war on drugs
- includes quite a few of our country's best minds and leading scientific
- innovators. (Jobs, for example, is a self-confessed former acidhead.) If a
- massive nationwide raid were held today, it would net mathematicians,
- inventors, technicians and a multitude of free-lance visionaries--the very
- people we're counting on to beat out the Japanese, renew a stagnant economy
- and generally lead us in to the MacFuture. Indeed, this corps of turned-on
- nerds has already helped to change our lives, providing much of the high-test
- zeal that has joysticked us from the age of heavy industry into the
- point-and-click MacPresent of megabytes and mice, shrinking the modern office
- to the size of a laptop computer and enlarging the laptop computer, via such
- things as modems and networks, into a walkie-talkie for the global village.
-
- So before the crackdown goes any farther, perhaps it's time to ask: Can
- America afford to take the "high" out of high technology?
-
- Arnie Greif is the sort of young man who free-market conservatives applaud in
- principle but tent to ignore, or even to attack, in practice: a committed,
- free-thinknig entrepreneur. Along with his wife, Sherri, he operates a
- business, FractalVision, out of a modest one-story house in a Los Angeles
- suburb. He keeps a punishing schedule. By day, he toils full-time as a
- systems analyst for a large electronics corporation, then puts in another
- forty or fifty hours a week at the Sun workstation computer in his den.
- Fortunately, the long nocturnal hours are paying off. Unlike most small
- businesses these days, FractalVision is growing and has doubled income every
- year since 1987.
-
- Basically, what FractalVision produces is digitized hallucinations. Greif
- pops a tape into his VCR and plays some of the for me. Immediately, the
- screen is suffused with flowing fields of vibrant imagery. The images are
- abstract yet familiar, outrageous yet structured--the sort of shapes people
- often see after taking magic mushrooms. An iridescent snowbank melts away in
- time-lapse motion. Colonies of Martian microbes fuse and mutate and split
- apart. The effect on the viewer is slightly disconcerting; you feel as if
- you're peering into your own brain, watching neutrons fire by the millions.
- Greif explains that the forms are not random but are visual ranslations of
- cretain simple equations fed into his computer. This so-called "fractal
- geometry"--pioneered by Benoit Mandelbrot, an IBM research scientist--governs
- the behavior of natural phenomena from waterfalls to clouds to brainwaves.
- This is the new psychedelia, where math and mysticism mix.
-
- "On the Fourth of July, 1979," Greif says, "I stared at a blank white wall. I
- was doing a lot of hallucinogens at the time, and patterns like these are what
- I saw. Later, I discovered fractal geometry and learned that these shapes are
- the building blocks of the universe. Now I am able to reproduce these forms
- mathematically rather than chemically."
-
- Arnie goes on to detail the applications of his fractal designs. Some have
- appeared in music videos--in Cher's _Heart of Stone_, for example. Also,
- psychotherapists have used his tapes as relaxation aids for their patients.
- And the principles underlying the designs have implications for acoutic
- science. Currently, he is working with an engineer to improve studio recording
- techniques.
-
- Eventually, I ask the 30-year-old Grief if he still trips. It seems like an
- inappropriate question, given the squareness of our surrounding: a living room
- straight out of the Leviz catalogue, strictly suburban sub-modern.
-
- "No, but that doesn't mean I won't go out there again," he says, toying with a
- strand of shag run. "I've got kids now, so it's hard, it's hard to find the
- time. I don't really side with the war on drugs, however. Psychedelic drugs
- are like a chef's knife: dangerous in the wrong hands but useful to the
- professional."
-
- He nods at the video monitor and adds, "I don't think I could have
- accomplished what I have without them."
-
- Among high-tech entrepreneurs, Arnie Greif is not alone in feeling that
- chemicals and achievement really can mix, all those stern public-service
- announcements notwithstanding. Ron Lawrence and Vicki Marshall are the
- founders of a company called KnoWare, a Los Angeles publishing firm and
- Macintosh consultancy. "Whatever problem you're having with the Mac," Ron
- boasts, "we're here to solve it. Day or night." Most recently, KnoWare was
- summoned to troubleshoot the office system of a West Coast fashion magazine.
-
- Lawrence, a 45-year-old Vietnam eteran who returned from the war depressed and
- alienated, credits his personal salvation to three forces: the Macintosh
- computer, the writings of Timothy Leary (which KnoWare publishes) and
- psychedelic drugs. "Drugs for me were a catalyst," he says. "By taking
- sychedelics, you clean out the storage banks and have to reprogram yourself.
- Thats what I did. And that's what I do with this baby here." He pats his
- computer as if it were a pet, as if it were part of himself.
-
- "Just like with the mind," says Lawrence, "nothing appears on that screen that
- you don't put there. Psychedelics teach you that."
-
- David (not his real name) is a graduate of a top East Coast engieering program.
- He commutes from his communal house in Berkeley to a computing job at one of
- America's leading producers of professional video equipment. I interview him in
-
- hi home office, where he conducts a sideline business designing custom software
- packages. On the other side of the office door, at the kitchen table, his
- housemates are using razor blades to strip the tough green skin off a large San
- Pedro cactus, hoping to get at the mescaline inside.
-
- David's fingers wander lightly over his computer keyboard as he describes the
- appeal of psychoactive drugs for himself and some of his high-tech peers. his
- tranquil, cloistered manner reminds me of a friend of mine--an acidhead Ivy
- League computing major, who, last time I heard from him, was living near Palo
- Alto doing classified Star Wars research.
-
- "If you think about it," says David, "the computer is an alien presence. it
- takes a lot of courage to relate to such an amazing machine. Drugs help me to
- overcome my fear of the computer--especially the new drugs. For example, there
- was the time I used U4ia [a long-acting form of amphetamine] to solve a knotty
- programming problem. I'd been stuck on this problem for ages, and the drug help
-
- to free up my mind enough so I could see it in a while new way."
-
- The new drugs David is referring to come in an almost limitless variety.
- Because the drugs' molecular structures are somewhat malleable and can be
- changed around faster than the DEA can identify them, some of the newest have
- yet to made illegal. A number of the substances are designed and manufactured
- by respectable degree-holding chemists, one of whom is a full professor at a
- prestigious California university. There is MDMA, or ecstasy, which is said to
- evoke Aquarian feelings of love and brotherhood. There is ketamine, a potent
- operating-room anesthetic that I came across maybe a half-dozen times in my
- Silicon Valley travels. Ketamine, says David, "takes you on a submarine ride
- ton the bottom of the universe." Then there is DMT, the _Tyrannosaurus rex_ of
- psychedelics. Usually spoken of by users with a certain wide-eyed, trembling
- awe, DMT has the power, in the words of one programmer i met," to completely
- annihilate your ego in about a minute. Your body falls off like a peeled
- banana skin, and you rocket away in a ray of white light to the edge of known
- existence."
-
- Egoless, bodiless white-light astral travel sounds like pretty scary stuff, and
- those who have tried DMT readily admit its perils. One mathematics professor I
- interviewed put it this way: "YOu use the drug three times, and the words 'brain
-
- damage' literally appear before your eyes." Indeed, such sober warnings were
- common among the turned-on techies I encountered. For them, drug use is serious
-
- business, requiring meticulous preflight preparations. Prior to takeoff, a
- typical user fortifies his system with plenty of fruit juice and vitamins, then
- loads the CD player with congenial music--Bach, perhaps, for thte austerely
- intellectual; the Red Hot Chili Peppers for the more adventurous. He may even
- consult an instruction manual, such as the closely typed four-page leaflet that
- sometimes is provided by hyperresponsible dealers with doses of MDMA ("After an
- MDMA session, great care must be taken in swallowing solid food, since there is
- a minimem amount of anesthesia present..."). In the one DMT "experiment" I
- witnessed, the subject was carefully watched and attended to by a notetaking,
- water-drinking friends--the psychedelic equivalent of a designated driver.
-
- In this world of oddly stringent trippers, where so many genious IQs are on the
- line, there is little patience for sloppy procedure. The goal is intellectual
- adventure, not intoxication. Alcohol is widely dismissed as insufficiently
- insight-inducing. Cigarettes are scarce. Cocaine is charged with promoting
- aggression and stupidity. The drug-taking is discreet, almost monklike, and,
- consequently, busts are rare. None of my sources showed any interest in winning
-
- converts to higher chemical consciousness, let alone in making money off of drug
-
- sales. (Concerned parents will want to note that it doesn't seem likey DMT and
- ketamine will soon appear on your local playground, despite their popularity at
- your local high-tech research park.)
-
- Readers may logically wonder at this point just how people like David hold on to
-
- thier joob, considering the amount of time they spend riding cosmic submarines.
- What's more, in this age of widespread drug testing, how did they get their job
- in the first place? The answers to these questions lie in the nonconformist,
- fairly hallucinogenic nature of the computer industry itself. In a business
- that seeks to shrink the human mind and put it in a box for easy access, access
- to one's own mind is not a guilty pleasure but something approaching a duty.
-
- R.U. Sirius, whose journalistic rounds put him in constant contact with
- Siliconites of all descriptions, says, "In my experience, the most creative
- people in computers experiment with drugs. It's a very bizarre culture, where
- the freaks are the elite. At a company like Autodesk [a cutting edge developer
- of virtual-reality technology], the R&D department includes a little room full
- of people in sandals, with hair down to their ass. At Apple, they buy group
- tickets to the Grateful Dead show at the end of the year."
-
- But what about bad trips? What about those terrifying times when the submarine
- fails to surface? R.U.'s answer brims with common sense: "People in those
- fields, if they know what they're doing, seldom freak out. Say that a computer
- person takes some acid now, in 1991, and everything he sees and hears and feels
- in speeding by and changing shape. What's the difference between that and his
- everyday reality?"
-
- Chip Krauskopt is the manager of the Human Interface Programat Intel
- Corporation, the nation's top maker of microprocessors and also a Defense
- contractor. He corroborates R.U.'s impressions. That Krauskopf is
- willing--even eager--to speak for attribution underlines Silicon Valley's
- no-sweat attitude toward chemical recreation.
-
- "Some of the people here are very, very, very bright," says Krauskopf. "They
- were bored in school, and, as a result, they hung out, took drugs and got into
- computers. A lot of people I know took exactly that path. And remember, this
- is an industry that grew up in the Sixties, so there was never any stigma
- against so-called 'hippies.' People at Intel get judged strictly by how good
- they are. If their skills and arguments are strong, nobody cares if they wear
- tie-dye and sandals."
-
- But what about the urine tests often required by the federal government for
- suppliers such as Intel? Don't they weed out the heads? Well, no. For one
- things, urinalysis does not detect most hallucinogens--a fact that led
- cyberessayist Robert Anton Wilson to predict, in Mondo 2000, "The corporate
- structure of the short-term future will therefore this our the ranks of pot
- smokers and coke freaks while the acid heads climb merrily upward in the
- heirarchy." Furthermore, the tests can pick up only relatively high
- concentrations of drugs, and Intel's executives virtually see to it that
- potential employees have an opportunity to clean up their act, at least
- temporarily, before their pee is screened.
-
- "We tell candidates when they first come in for an interview that eventually
- they will be tested," says Krauskopf. "The levels that are tested at, you see,
- are such that you have to have taken drugs in the past forty-eight hours.
- Unless you're a total idiot and do drugs every day, you're going to test clean."
-
-
- If this comes as disturbing news to the straitlaced--the idea that inside the
- high inside the high-tech core of everything from your office PC to the guidance
-
- system of the Patriot missle lurks a psychedelic genie--just consider the
- alternative. If the drug testing were effective and if it had begun, say,
- twenty-five years ago, chances are that some of our country's most vital
- industries might not exist today. Software magnate Mitch Kapor, founder of
- Lotus Development, whose 1-2-3 spreadsheet forever changed accounting, has
- publicly credited "recreational chemicals" with helping him form his business
- outlook. David Bunnell, who started PC Magazine and helped create the Altair,
- oe of the first personal computers, remembers his co-poineers as looking as if
- "they were just coming down off a ten-year acid trip." (One of Bunnell's hippie
-
- colleagues, Microsoft's Bill Gates, is now one of the country's richest
- individuals, worth more than $4 billion.)
-
- It's time to face fact, America. With our buttoned-down financiers in prison,
- our uptight bankers in bankruptcy and our automotive titans in retreat, perhaps
- our freaks are our last, best hope. And it's not that they've been co-opted by
- the system--they've co-opted it. Yesterday's dropouts, in many cases, are
- todays insiders, and some of today's head honchos are heads.
- But what about tommorrow?
-
- If you're looking for a prophet of the scientific future, you could do worse
- than mathematician Ralph Abraham, a shaggy middle-aged professor at the
- University of California, Santa Cruz, who can use the word "grok" in casual
- conversation and get away with it. Abraham's revolutionary specialty, in which
- he is an acknowledged leader, has come to be known as "chaos math" or "dynamical
-
- system theory." What people such as Abraham try to do is graph and predict,
- with the help of computers, seemingly unpredictable events: global climatic
- change, the rise and fall of financial markets, even the social origins of war.
- What makes this math revolutionary, of course, is that no one has really
- mastered it yet, although aficianados believe it can be mastered and that the
- attempt is eminently worht making.
-
- The driving idea behind chaos math--that there is order in randomness and
- randomness in order--sounds like one of those drug-induced epiphanies you scrawl
-
- on a napkin at 3am and then throw away the next day. Well, in a rather literal
- sense, it is a drug-inspired notion, except that ralph Abraham kept the napkin
- and has been doodling on it ever since.
-
- "In the 1960s," he says, "a lot of people on the frontiers of math experimented
- with psychedelic substances. There was a brief and extremely creative kiss
- between the community of hippies and top mathematics. I know this because I was
-
- a purveyor of psychedelics to the mathematical community."
-
- Math and acid--not, on would think, a natural combination. It's like hearing a
- champion marathon runner credit his success to chain-smoking Camels. I'm
- confused. The image of a frying egg ("This is your brain on drugs") flashes in
- my mind's eye.
-
- Abraham explains, "To be creative in mathematics, you have to start from a point
-
- of total oblivion. Basically, math is revealed in a totally unconscious process
-
- in which one is completely ignorant of the social climate. And mathematical
- advance has always been the motor behind the advancement of consciousness.
- What's going on now with dynamical systems theory is at least big a thing as the
-
- invention of the wheel."
-
- He glances at his desk, at the ubiquitous Macintosh sitting the, with its blind
- gray screen. "Without this machine, of course," says Abraham, "what we're doing
-
- now would not be possible. The computer extends our intellect, which helps us
- create the future. It offers a door to perceiving complex space-time
- realities."
-
- Abraham explains, "To be creative in mathematics, you have to start from a point
-
- of total oblivion. Basically, math is revealed in a totally unconscious process
-
- in which one is completely ignorant of the social climate. And mathematical
- advance has always been the motor behind the advancement of consciousness.
- What's going on now with dynamical systems theory is at least as big a thing as
- the invention of the wheel."
-
- He glances at his desk, at the ubiquitous Macintosh sitting there, with its
- blind gray screen. "Without this machine, of course," says Abraham, "what we're
-
- doing now would not be possible. The computer extends our intellect, which
- helps us create the future. It offers a door of perception were cleansed every
- thing would appear to man as it is, infinite." But what, according to Abraham,
- will all this infinite portal-cleansing bring? Nothing less, he predicts, than
- global peace.
-
- "Social science, up until now, has not been very scientific. Now, with
- computers and the new mathematics, we may be able to change that. Soon we may
- be able to map and manipulate a certain set of parametes--social, cultural,
- economic, geographical--that will help us to anticipate and mediate
- international conflict. Loving on the largest possible scale will be enhanced
- by the intellectual capability to understand the complexity of the systems in
- which we live."
- Spoken like a true Macflower child.
-
- They are sitting in a darkened Berkeley living room, talking about virtual
- reality and smoking the milder, powdered form of ketamine. I'm with them but
- not with them, if you catch my drift. The ketamite is a bit way-out for me, and
-
- the conversation too. Because I don't wish these folks legal hassles, I won't
- say who they are, just that they know a lot about computers (on man runs a
- thriving electronics research firm) and more than a thing or two about drugs.
-
- Their speech, in case you're wondering, as perfectly coherent. Alarmingly
- coherent, when you consider its content.
-
- "You know that telephone-company saving," someone pipes up from the couch,
- " `Reach out and touch someone'? Well, soon, with the help of virtual reality,
- you will be able to do that, literally. You'll wear a kind of bodysuit with
- hundreds of little sensors and vibrators. You'll plug it into your computer,
- your partner across the country will plug in too, and you'll be able to feel
- each other up by moving around in the suits. There's a term for it already,
- `teledildonics.' The phenomenon of long-distance sex."
-
- The beautiful young woman sitting beside him--she's a computer musician, and we
- have just finished listening to her tape--takes a hit of ketamine, then says,
- "Perfect. No diseases. No unwanted pregnancies."
-
- "Here's something else," says another young man. "It's very, very possible that
-
- someday we will be able to transfer the contents of our brains straight onto a
- microchip."
-
- "Why?" I ask. "Why wouuld we want to do something like that?"
-
- "Come on," he says, "we do it already. We do it all the time, whenever we type
- our ideas into a compter. In the future, we'll just do it faster, more
- directly."
-
- I concede that, yes, it's a thought. They're all thoughts. Teledildonics,
- that's a thought too.
-
- And as the room fills up with thoughts--Utopian, stange, inspiring,
- ridiculous--it strikes me that this is precisely what Americans are supposed to
- do: think freely, then try to apply those thoughts, skeptics and solid citizens
-
- be damned. Ford did it, Eddison did it, Jobs and Wozniak did it, Eddison did
- it, Ralph Abraham is doing it now. It's what we're good at and, coincidentally,
-
- what some of our international competitors--with their ancient social rule books
-
- and close-order corporate calisthenic sessions--aren't so good at. In his
- recent book, _More Like Us_, Japan expert James Fallows argued convincingly
- that instead of trying tto ape Japan's regimented industrial economy, the United
-
- States would do better to unleash its individualistic potential. This may be
- another way of saying that weirdness can be an export commodity.
-
- Timothy Leary, who has welcomed the computer revolution with his characteristic
- cosmic enthusiasm, agrees. While Leary may be a prophet without honor in his
- own country, the Japanese think otherwise, and he is much in demand there as a
- lecturer and cultural consultant. "Japan is a tightly structured hive society,
- and they knokw it," says Leary. "So just as they go the Middle East for oil and
-
- Australia for wood, they come to California for creativity. They realize that
- creativity is a raw resource and that we have an abundance of it here."
-
- Part of the recipe for that abundance, like it or not, is chemical. When
- encountering some bizarre high-tech marvel, we often that we suspect, we're
- right. And how should we react to this? Is say: as tolerantly and calmly as
- possible. A little brain damage, in the end, may be a small price to pay for
- major brainstorms. And it's not as if we could stop these people even if we
- wanted to. As ever, the pioneers will continue to pioneer, assuming whatever
- risks they deem necessary. Judge them not by the trips they take but by the
- gifts they carry back.
-
- ============================================================================
-
-
- / /
- / NIA073 / File 03 /
- / Internet 2 Anywhere /
- / Industrial Phreak /
- / /
-
- In the last issue of Phrack magazine was published the uucp to
- compuserve gateway material. In light of the recent happenings of
- Phrack magazine I have decided to write the uucp to anywhere material
- and send it to NIA. This file will tell you how to recieve and send mail
- to everywhere reachable from internet. This is meant for those just starting
- on using the internet and thus the experienced users
- and dry. --Industrial Phreak
-
- Current networks that are connected by a gateway are as follows:
-
- applelink AppleLink (Apple Computer, Inc.'s in-house network)
- attmail AT&T Mail,AT&T's commercial e-mail service.
- bitnet international academic network
- bix Byte Information eXchange: Byte magazine's commercial BBS
- bmug Berkeley Macintosh Users Group
- compuserve commercial time-sharing service
- connect Connect Professional Information Network (commercial)
- easynet Easynet (DEC's in-house mail system)
- envoy Envoy-100 (Canadian commercial mail service)
- fax Facsimile document transmission
- fidonet PC-based BBS network
- geonet GeoNet Mailbox Systems (commercial)
- internet the Internet
- mci MCI's commercial electronic mail service
- mfenet Magnetic Fusion Energy Network
- nasamail NASA internal electronic mail
- peacenet non-profit mail service
- sinet Schlumberger Information NETwork
- span Space Physics Analysis Network (includes HEPnet)
- sprintmail Sprint's commercial mail service (formerly Telemail)
- thenet Texas Higher Education Network
-
- Ok, here goes the rest:
-
- I'm at: applelink
- You're at: internet
- To mail you i write to "user@domain@internet#" in which the domian can
- be the form of "site.bitnet" w/the address being less than 35 characters
-
- I'm at: AT&T Mail (Herein: attmail)
- You're at: internet
- To mail you I write to "internet!domain!user". For any problems contact
- the AT&T Mail Customer Assistance Center at 1.800.MAIL.672
-
- I'm at: bitnet
- You're at: internet
- There are a few ways of doing this depending upon your software. In
- most cases "user@domain" should work. If this doesn't, try
- "user%domain@gateway" where "gateway" is a regional Bitnet-Internet
- gateway site.
-
- I'm at: compuserve
- You're at: fax machine
- To send you something I simply send (in USA only) "FAX number". If you
- were at the number +1 512 666 1234 then in the number field I would put
- "15126661234". Not difficult.
-
- I'm at: compuserve
- You're at: mci
- If your address at mci was 666-6969 I would put ">MCIMAIL:666-6969".
-
- I'm at: connect
- You're at: internet
- I would send to CONNECT id "DASNET" and on the first line of the message
- put "\"user@domain\"@DASNET"
-
- I'm at: easynet
- You're at: bitnet
- The gateway is DECWRL::ADMIN. Therefore from VMS use NMAIL to send to
- "nm%DECWRL::\"user@site.bitnet\"". From Unix send to "user@site.bitnet"
- or if that fails send (via IP) "\"user%site.bitnet\"@decwrl.dec.com"
- or (via DECNET) send "DECWRL::\"user@site.bitnet\""
-
- I'm at: envoy
- You're at: internet
- The gateway is ICS.TEST or ICS.BOARD. Therefore send to
- "[RFC-822=\"user(a)domain\"]INTERNET/TELEMAIL/US" and for special
- characters use @=(a) !=(b) _=(u) any=(three octal digits)
-
- I'm at: fidonet
- You're at: internet
- Just send to "uucp" at the nearest gateway site and in the first line
- put "To: user@domain"
-
- I'm at: geonet
- You're at: internet
- I would send to "DASNET" and in the subject line put
- "user@domain!subject"
-
- I'm at: GSFCMail
- You're at: internet
- The nearest gateway is cust.svc. Therefore at the "To:" type POSTMAN
- and at the first line of your message enter "To: user@domain"
-
- I'm at: GSFCMail
- You're at: NASAMAIL
- The gateway is cust.svc so send to
- "(C:USA,ADMD:TELEMAIL,P:NASAMAIL,O:NASA,UN:userid)"
-
- I'm at: GSFCMail
- You're at: span (now nsi-decnet)
- The gateway is cust.svc. At the "To:" type "POSTMAIN" and in the first
- line of the message type "To: user@host.SPAN.NASA.GOV" or use GSFCCNE
- gateway and send it to
- (C:USA,ADMD:TELEMAIL,P:GSFCCNE,O:SPAN,OU:host,SN:user)
-
- I'm at: GSFCMail
- You're at: sprintmail
- For public networks send it to
- "(C:USA,ADMD:TELEMAIL,O:organization,UN:userid)"
- and for private networkds send it to
- "(C:USA,ADMD:TELEMAIL,PRMD:private_net,O:organization,UH:userid)"
-
- I'm at: internet
- You're at: applelink
- Just send it to "user@applelink.apple.com"
-
- I'm at: internet
- You're at: attmail
- Again just send it to "user@attmail.com"
-
- I'm at: internet
- You're at: bitnet
- I would send it to "user%site.bitnet@gateway" where gateway is the
- gateway host like cunyvm.cuny.edu or mitvma.mit.edu.
-
- I'm at: internet
- You're at: bix
- Just send it to "user@dcibix.das.net"
-
- I'm at: internet
- You're at: bmug
- If your name was Jack Off then I would send it to
- "Jack.Off@bmug.fidonet.org"
-
- I'm at: internet
- You're at: compuserve
- If your ID was "76969.666" then I would send it to
- "76969.666@compuserve.com"
-
- I'm at: internet
- You're at: connect
- If your NAME was JACK the I'd send it to "JACK@dcjcon.das.net"
-
- I'm at: internet
- You're at: easynet
- Your field is HOST::USER so I would send it to "user@host.enet.dec.com"
- or "user%host.enet@decwrl.dec.com".
-
- I'm at: internet
- You're at: easynet
- Lets say you're Jack Off @CUM, then I would send it to
- "Jack.Off@CUM.MTSMDEC.COM"
-
- I'm at: internet
- You're at: econet
- The gateway is <support@igc.org> so I would send to "user@igc.org".
-
- I'm at: internet
- You're at: envoy
- I'd send to "att!attmail!mhs!envoy!userid@UUNET.UU.NET" or if that
- didn't work thru US Sprint's X.400 gateway to
- "/C=CA/ADMD=TELECOM.CANADA/O=ENVOY/DD.ID=userid/@SPRINT.COM"
-
- I'm at: internet
- You're at: fidonet
- If you were jack off at 1:2/13:69 then I'd send to
- "jack.off@p69.f13.n2.z1.fidonet.org"
-
- I'm at: internet
- You're at: geonet
- I'd send to "user:host@map.das.net". [NOTE: the American host is geo4
- and European host is geo1].
-
- I'm at: internet
- You're at: GSFCMail
- The gateway is postmaster@ames.arc.nasa.gov so I'd send to
- "user@GSFCMAIL.NASA.GOV"
-
- I'm at: internet
- You're at: mci
- You're Jack Off (123-4567) I'd send to "1234567@mcimail.com".
-
- I'm at: internet
- You're at: mfenet
- Then I'd send to "user%mfenode.mfenet@nmfecc.arpa"
-
- I'm at: internet
- You're at: nasamail
- The gateway is <postmaster@ames.arc.nasa.gov> so I'd send it to
- "user@nasamail.nasa.gov"
-
- I'm at: internet
- You're at: peacenet
- The gateway is <support@igc.org> so I'd send it to "user@igc.org".
-
- I'm at: internet
- You're at: signet (through FidoNet)
- Ok, you're Jack Off again at 1:2/13:69 send it to
- Jack.Off@f527.n2.z2.fidonet.org (thats the Fido-SigNet gateway) and in
- the first line put "@DOMAIN SIGNet 1:2/13:69 FidoNet 2:2/527". [NOTE:
- The sysop of the gateway can be reached
- "andreas.levenitschnig@f527.n2.z2.fidonet.org".
-
- I'm at: internet
- You're at: sinet
- Your fields are node::user or node1::node::user so send to
- "user@node.SINet.SLB.COM" or "user%node@node1.SINet.SLB.COM"
-
- I'm at: internet
- You're at: span (now nsi-decnet)
- Your field is host::user and the gateway is netmgr@nssdca.gsfc.nasa.gov
- so send to "user@host.SPAN.NASA.GOV"
-
- I'm at: internet
- You're at: sprintmail
- The gateway is postmaster@sprint.com so for public networks send to
- "/C=US/ADMD=TELEMAIL/O=organization/DD.UN=userid/@SPRINT.COM"
- or if you know the recipients registered full name
- "/C=US/ADMD=TELEMAIL/O=organization/PN=firstname.lastname/@SPRINT.COM"
- for private networks send to
- "/C=USA/ADMD=TELEMAIL/PRMD=private_net/O=organization/DD.UN=userid/@SPRINT.COM"
-
- I'm at: internet
- You're at: thenet
- Send to "user%host.decnet@utadnx.cc.utexas.edu"
-
- I'm at: internet
- You're at: uninet (South Africa) (Thru FidoNet)
- Send the message to user.node@f4.n494.z5.fidonet.org (a list of uninet
- nodes can be obtained with a SEND UNINODE)
-
- I'm at: mci
- You're at: internet
- At the "To" prompt type "Jack Off (EMS)" at "EMS:" type "internet" and
- at the "Mbx:" type "user@domian".
-
- I'm at: nasamail
- You're at: internet
- At the "To:" prompt type "POSTMAN" and at the "Text:" (i.e. as the first
- line of your message) enter "To: user@domain".
-
- I'm at: sinet
- You're at: internet
- Send it to "M_MAILNOW::M_INTERNET::\"user@domain\"" or
- "M_MAILNOW::M_INTERNET::domain::user"
-
- I'm at: span (now nsi-decnet)
- You're at: GSFCMain
- The gateway is mssdca::netmgr so send to
- "AMES::\"user@GSFCMAIL.NASA.GOV"\"
-
- I'm at: span
- You're at: internet
- The gateway is nssdca::netmgr so send it to "AMES::\"user@domain\""
-
- I'm at: sprintmail
- You're at: internet
- The gateway is (c:usa,admd:telemail,o:telenet.tele,fn:technical,sn:support,i:t)
- so send to "(C:USA,ADMD:TELEMAIl,PRMD:INTERNET,ID:<user(a)domain>)"
-
- I'm at: thenet
- You're at: internet
- So you send it to "UTADNX::WINS%" user@domain "
-
-
- Networks not connected American Online, British Telecom Gold, DialCom,
- Dialog, Easylink, Eurokom, Fidelity Investments, GEnie, GoldNet, HandsNet,
- Midas Internation HQ, Nifty-Serve, OMNET (thru CMR send mail to OMNET users
- by "[omnet.user/OMNET]MAIL/USA%TELEMAIL"@Inetermail.ISI.EDU", Paranet,
- PC-Relay, Prodigy [thank god], PROFS (general), PROFS (IBM), QUICK-COMM, SABRE,
- Telemail, VNET.
-
- For comments on the file I can be found on internet at uk05769@ukpr.uky.edu
- Ciao!
-
-
- / /
- / NIA073 / File 04 /
- / Globally Tymnet [01/02] /
- / by Hi Fi Del /
- / /
-
- The following countries and their connections with Tymnet I have
- organized information on. This is in list/table type format. These countries
- are detailed: Jamaca, Japan, Kuwait, Luxembourg, Malaysia, Mexico, Netherlands
- and New Zealand. For those of ya' that don't know very much about Tymnet,
- see one of the numerous files that have been done on the basics. Enjoy!
-
-
-
- --- JAMAICA ---
-
- JAMAICA - ENHANCED GLOBAL CONNECTION SERVICE
-
-
- 1. TYMUSA Gateway Host Number: 5368
- 2. Node Number: 3676
- 3. Rates: $10.00/hour and $.50/Kchar
- 4. Dialup Locations and Numbers:
- (1.809) 924-9915 300/1200 Bps Bell 212A
- 5. Trouble Reporting Center:
- Support (local)
- phone: (1.809) 921 5312
- Hours of Operation: 24hrs
- Contact:
-
-
- JAMAICA - BASIC GLOBAL CONNECTION SERVICE
-
-
- Jamaica International Telecommunications Ltd. Net. Name: JAMANTEL
- 15, North Street DNIC: 3380
- P.O. Box 138
- Kingston, Jamaica
- Contact: Mr. Rickards (809) 921-5316/922-6063
- Telex: (381) 112
- OnTyme: INTL.JAMINTELCOMM
-
- 1. ACCESS/SPEEDS: Async dial-in/leased speeds: 300-1200 bps
- Synchronous leased speeds: 2400-9600 bps
-
- 2. PROTOCOLS: Async terminal interface, Sync X.25
-
- 3. PRICES: All Prices are in Jamaican Dollars.
- (1 $ U.S. = 5.35 Jam. $)
- Connect time: $ .75/minute
- Transmission: $ 2.25/Kchar.
-
- 4. COMMENTS: n/a
-
- --------------- OPERATIONAL/TECHNICAL INFORMATION -------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: Trouble Reporting
- Hours of Operation: 24hrs
- Phone: (809) 921 5312
- Fax: (809) 921 5329
- Ontyme: INTL.JAMINTEL
-
- 2. SERVICE INFORMATION ADDRESS:
-
- 3. TEST ADDRESS:
-
- 4. ASYNC ACCESS PROCEDURES:
-
- LOGON:
-
- TYMNET STYLE "please log in: "
-
- 5. TYMUSA AVAILABLE: Yes
-
- 6. DEFAULT PAD SETTINGS:
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- City/Territory Modem/Speed Access Number
- -----------------------------------------------------------------
- Kingston Bell 212A/300-1200bps (809)924-9915
-
-
-
-
-
- --- JAPAN ---
-
- JAPAN (NIS) - ENHANCED GLOBAL CONNECTION
-
-
- 1. TYMUSA Gateway Host Number: 5404
- 2. Dialup Node(s): TYM2 Gateway Node(s): 222
- 3. Rates: $11.40/Hour $0.30/Kilocharacter
- 4. Dialup Locations and Numbers:
-
- City V.21/300bps V.22/1200bps V.22 1200/2400bps
- -------- ----------- ------------ ---------------
- Akita 0188-65-5735 0188-65-5733
- Atsugi 0462-21-5331 0462-21-0404
- Chiba 0472-27-0671 0472-27-0601
- Fukui 0776-34-3308 0776-35-8840
- Fukuoka 092-474-7076 092-474-7196
- Hamamatsu 0534-56-7355 0534-56-7231
- Hiroshima 082-241-6857 082-243-9270
- Kagoshima 0992-22-8598 0992-22-8954
- Kanazawa 0762-24-2351 0762-24-2341
- Kobe 078-242-1097 078-242-1115
- Kouriyama 0249-38-5396
- Kumamoto 096-355-5233 096-354-3065
- Kyoto 075-431-6205 075-431-6203
- Matsuyama 0899-32-2975 0899-32-4207
- Mito 0292-24-1675 0292-24-4213
- Morioka 0196-54-8513 0196-54-7315
- Nagasaki 0958-28-6088 0958-28-6077
- Nagoya 052-911-1621 052-981-3221
- Naha 0988-61-4002 0988-61-3414
- Niigata 025-241-5409 025-241-5410
- Nogano 0262-34-3900
- Ohita 0975-38-2160
- Okayama 0862-32-6760 0862-31-4993
- Osaka 06-271-9028 06-271-9029 06-271-6876
- Sendai 022-231-5741 022-231-5355
- Sapporo 022-231-5741 022-231-5355
- Shizuoka 0542-84-3393 0542-84-3398
- Takamatsu 0878-23-0502 0878-23-0501
- Takasaki 0273-23-9739
- Tokuyama 0834-32-0991
- Tokyo 03-555-9525 03-555-9526 03-555-9696
- Toyama 0764-41-7578 0764-41-7769
- Tsuchiura 0298-55-6123 0298-55-6121
- Tuchiura 0298-55-5082 0298-55-6121
- Urawa 048-833-9341
- Utsunomiya 0286-34-8251
- Yokohama 045-453-7757 045-453-7637
- Yonago 0859-32-3201
-
- 5. Trouble Reporting Center:
- Support (local)
- Phone: (011.81.3)-551-6220
- Hours of Operation: 24hrs/day, 7days/week.
- Contact: Network Control Center
-
- 6. Comments:
- Domestic Username has to be valid with access from Class
- 17.
-
-
- JAPAN - BASIC GLOBAL CONNECTION SERVICE
-
-
- SERVICE OFFERINGS: 4406/NISnet (National & International)
-
- Network Information Service Co. (Tymnet Japan) Net. Name: NISNET
- Marketing and Sales Division DNIC: 4406
- 1-13-5 Kudanshita Chiyoda-Ku
- Tokyo, Japan 102
-
- Contact: Mr. Toshi Murakami Tel :(81.3)-262-8711
- Fax :(81.3)-262-8757
- Telex :(781)29720
- Ontyme:NIS.HQ
-
- U.S. Contact: Mr. Nobuhiro Takayama Tel: (212)351-5059
- Regional Manager of USA Fax: (212)351-5860
- c/o BT Tymnet, Inc.
- 335 Madison Avenue, 11th Floor
- New York, New York 10017
-
- 1. ACCESS/SPEED: Asynchronous dial-in speeds: 300, 1200, 2400bps
- Asynchronous leased speeds : 300-2400bps, 9600bps
- Synchronous leased speeds : 2400-14400bps
-
- 2. PROTOCOLS: Async, X.PC, Sync, X.25, RJE, 3270 Bisync, SDLC, CMT & SNA.
- (IBM, HITACHI, FUJITSU dialects supported)
-
- 3. PRICES: Please reference COMMENTS.
-
- Service Lead Times: NUI 3 days; Leased lines 30-45 days
-
- 4. COMMENTS:
-
- I. Service description
-
- Service name: Pegasus
-
- 1) T2 (TYMNET) Gateway Services
-
- (NIS) (TYMNET)
-
- ASYNC ASYNC
- ASYNC X.25
- X.25 ASYNC
- X.25 X.25
-
- 3270 BSC Native 3270 BSC Native
- (IBM, HITACHI, FUJITSU) (IBM HOST)
-
- 3270 XNA/CMT ASYNC
- 3270 BSC/CMT ASYNC
- (IBM, HITACHI, FUJITSU)
- ASYNC 3270 BSC/CMT(IBM)
- ASYNC 3270 SNA/CMT(IBM)
-
- SDLC SDLC
-
- 3780 3780
-
- ** X.PC is available in ASYNC protocol.
- ** Public TymDial 9.6 is available at Tokyo.
- ** X.25, SDLC, XNA interface is available at Tokyo, Osaka, Nagoya,
- Sappolo, Sendai, Fukui, Okayama, Fukuoka,Toyama and Shizuoka.
-
- 2) X.75 Gateway Services
-
- (NIS) (TYMNET)
-
- ASYNC ASYNC
- ASYNC X.25
- X.25 ASYNC
- X.25 X.25
-
- 3270 BSC/CMT ASYNC
- 3270 SNA/CMT ASYNC
-
- ASYNC 3270 BSC/CMT
- ASYNC 3270 SNA/CMT
-
- 3) International Dedicated Connection
-
- The IDC service is designed to provide any dedicated interface
- customer with a ceiling on connect time charges across their
- link. The customer will be charged a flat $1,000 or 140,000
- yen connect time charge for each interface which receives
- billing (either U.S. or Japan), plus normal character charges
- (see below). This means that a customer with one interface on each
- network making, host to host calls, will pay one IDC charge.
- Two interfaces receiving IDC traffic will be assess one IDC fixed
- charge for each interface. This is an ideal service where PVC's
- are required, for back-up service to an international leased line,
- or any dedicated application that uses more than 85 to 90
- hours per month. A separate order must be entered in
- OES to obtain this facility (see file, NIS.DOC).
-
- 4) TYMUSA Service: Yes
-
- II. Pricing.
-
-
- NIS INTERNATIONAL RATE SCHEDULE
- -------------------------------
-
- Rates are classified into Dedicated port services and Public(Dial-up)
- services. (Note 1$ U.S. = 150.53 Yen as of 7/90).
-
-
- 1. Dedicated line services
-
- Monthly rate
-
- 1) General accounting charge 25,000 yen
-
- This charge applies to all leased line customers.
-
- (Note) Current users that already use NIS domestic service
- will be charged 5,000 yen only, in addition to domestic
- General accounting rate.
-
- 2) Dedicated port charge 8,000 yen
-
- This charge applies to all dedicated interfaces.
-
- 3) Each NUI 500 yen
-
- 4) Enhanced service charge 15,000 yen
-
- This charge applies to customers using BSC or SDLC.
-
- 5) International Dedicated Connection (P.V.C.)
-
- 140,000 yen or $1,000 per month.
- This eliminates all connect charges.
- IDC is charged on a per interface basis,
- $1,000 for all connect charges across a
- link (see description above).
-
- 6) Leased line charge including a pair of modems.
-
- (yen per month)
- I--------------------------------------------------------I
- I -10 km -20km -30km -60km -120km I
- I--------------------------------------------------------I
- I 2400bps line 28,000 43,000 74,000 102,000 156,000 I
- I 4800bps line 32,000 47,000 78,000 106,000 160,000 I
- I 9600bps line 44,000 59,000 90,000 118,000 172,000 I
- I19200bps line 97,000 112,000 143,000 171,000 225,000 I
- I--------------------------------------------------------I
-
- Installation fee(one time) 212,000 each line
- 30,000 each modem
-
- 7) Dedicated Outdial and TymDial 9.6 facility.
-
- Installation 10,000 yen
- Dedicated port charge 8,000 yen
- Business Line Charges at cost
-
- 8) CPE (Customer Premise Equipment) Purchase Price
-
- ATC-4 478,000 yen
- ATC-8 584,000 yen
- Pico-Engine 1,498,000 yen
- Micro-Engine 2 512kb 2,652,000 yen
- Micro-Engine 3 1024kb 3,536,000 yen
- Micro-Engine 4 1024kb 3,536,000 yen
-
- 9) CPE Rental Price
-
- ATC-4 25,000 yen/month 100,000 yen/install
- ATC-8 30,000 yen/month 100,000 yen/install
- Pico* 60,000 yen/month 250,000 yen/install
- Micro-2* 90,000 yen/month 250,000 yen/install
- Micro-3* 115,000 yen/month 250,000 yen/install
- Micro-4* 115,000 yen/month 250,000 yen/install
-
- * Pico and Micro Price include node code and one
- interface code. Price for additional interface code
- is 25,000 yen/interface/month and 250,000 yen/interface/
- install.
-
- 2. Public (Dial-up) Service.*
-
- 1) General accounting charge None
-
- 2) Each NUI 500 yen
-
- *Available speeds are 300-2400bps, and 9600bps.
- There is no communication surcharge for 9600bps
- public dialup.
-
- 3. Communication charge
-
- 1) Caller paid
-
- 1.1 Connect charge 1,920 yen/hour
- IDC Customers do not pay connect charges.
-
- 1.2 Character transmission charge 45 yen/K-char
- Note step level discounts below.
-
- 2) Reverse Charge
- 2.1. Connect charge $11.40/hour
- 2.2. Character transmission charge $ .30/K-char
-
- 3) Step Level (Volume) discounts for transmission
-
- first 10,000 K-char $ .30 or 45 yen per K-char
- next 40,000 K-char $ .14 or 21 yen per K-char
- next 100,000 K-char $ .12 or 18 yen per K-char
- over 150,000 K-char $ .10 or 15 yen per K-char
-
-
- NIS Domestic Rates Schedule Last update: October 4, 1990
- ---------------------------------------------------------
-
- These rates apply to domestic customers only.
-
- 1. Subscription Charge (one time charge)
- 1. Dial up (Dedicated) Service 100,000 yen/each line
- 2. Leased line service 140,000 yen/each line
-
- 2. General Charge
-
- 1. Common to all type of service
- Customer Account charge 20,000 yen/month
- Each user name 500 yen/month
-
- 2. Dial-up(dedicated) and leased line service only
- Dedicated port charge 8,000 yen/month
- (Modem and line surcharge-- conform to the NIS specifics)
-
- 3. Communication Charge
-
- 1. Access Charge Dial-up (public) service only.
- 300,1200bps 300 yen/hour
- 2400bps 450 yen/hour
-
- 2. Character transmission Charge
-
- I--------------------------------------------------------------I
- I Kilo byte per month peak time off peak time I
- I--------------------------------------------------------------I
- I First 25,000 Kbyte 6.0 yen/Kbyte 2.0 yen/Kbyte I
- I I
- I Next 125,000 Kbyte 4.5 yen/Kbyte 2.0 yen/Kbyte I
- I I
- I Over 150,000 Kbyte 3.0 yen/Kbyte 2.0 yen/Kbyte I
- I--------------------------------------------------------------I
- peak time --from 8 a.m. to 8 p.m.
-
-
- Installation
- Each modem 30,000 yen
- Upgrade, Downgrade, Move-- priced at the rate NIS specifies
-
-
- MODEM AND LEASED LINE SURCHARGE RATES
-
- 1. Dial-up (Dedicated) service only
-
- each 300bps modem 5,000 yen/month
- each 1200bps modem 6,500 yen/month
- each 2400bps modem 7,500 yen/month
-
- 2. Leased line service only
-
- I------------------------------------------------------------------I
- I line speed -10km -20km -30km -60km -120km I
- I -----------------------------------------------------------------I
- I 2400 bps line 28,000 43,000 74,000 102,000 156,000 I
- I 4800 bps line 32,000 47,000 78,000 106,000 160,000 I
- I 9600 bps line 44,000 59,000 90,000 118,000 172,000 I
- J1f0?s X%997,000 112,000 143,000 171,000 225,000 I
- I------------------------------------------------------------------I
- (yen per month)
-
-
- ------------------ OPERATIONAL/TECHNICAL INFORMATION ---------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: Network Control Center
- Hours of Operation: 24hrs/day, 7days/week.
- Phone: (81.3)-551-6220
- Fax : (81.3)-551-6355
- Ontyme: NIS.NETCON
- NIS.TC
-
- 2. NETWORK INFORMATION ADDRESS: n/a
-
- 3. TEST ADDRESS:
-
- Drop Terminal: 440620000840
- Echo Host: 44062000089901
-
- 4. ASYNC ACCESS PROCEDURE:
-
- LOGON:
-
- TYMNET STYLE "please log in: "
-
- 5. TYMUSA Available: Yes, see note IBAND: n/a, see note
-
- Note: IBAND does not apply as network server is not used
-
- 6. DEFAULT PAD SETTINGS:
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- City V.21/300bps V.22/1200bps V.22 1200/2400bps
- ----------- ----------- ------------ -----------------
- Akita 0188-65-5735 0188-65-5733
- Atsugi 0462-21-5331 0462-21-0404
- Chiba 0472-27-0671 0472-27-0601
- Fukui 0776-34-3308 0776-35-8840
- Fukuoka 092-474-7076 092-474-7196
- Hamamatsu 0534-56-7355 0534-56-7231
- Hiroshima 082-241-6857 082-243-9270
- Kagoshima 0992-22-8598 0992-22-8954
- Kanazawa 0762-24-2351 0762-24-2341
- Kobe 078-242-1097 078-242-1115
- Kouriyama 0249-38-5396
- Kumamoto 096-355-5233 096-354-3065
- Kyoto 075-431-6205 075-431-6203
- Matsuyama 0899-32-2975 0899-32-4207
- Mito 0292-24-1675 0292-24-4213
- Morioka 0196-54-8513 0196-54-7315
- Nagasaki 0958-28-6088 0958-28-6077
- Nagoya 052-911-1621 052-981-3221
- Naha (Okinawa) 0988-61-4002 0988-61-3414
- Nogano 0262-34-3900
- Ohita 0975-38-2160
- Okayama 0862-32-6760 0862-31-4993
- Osaka 06-271-9028 06-271-9029 06-271-6876
- Sapporo 011-281-4343 011-281-4421
- Sendai 022-231-5741 022-231-5355
- Shizuoka 0542-84-3393 0542-84-3398
- Takamatsu 0878-23-0502 0878-23-0501
- Takasaki 0273-23-9739
- Tokuyama 0834-32-0991
- Tokyo 03-555-9525 03-555-9526 03-555-9696
- Toyama 0764-41-7578 0764-41-7769
- Tsuchiura 0298-55-6123 0298-55-6121
- Urawa 048-833-9341
- Utsunomiya 0286-34-8251
- Yokohama 045-453-7757 045-453-7637
- Yonago 0859-32-3201
-
-
- Note: For NISNET-Tymnet IVAN Installation & Implementation guide,
- please reference (INTLINFO:38)IIGUD.NIS
-
- For NISNET-Tymnet IVAN Service trouble report, please reference
- (INTLINFO:38)TBLPRO.NIS
-
- For detailed NIS business & operation information, please
- reference (INTLINFO:38)NIS.DOC
-
- ========================
-
- Kokusai Denshin Denwa Co. Ltd(KDD) Net. Name: VENUS-P
- NUI Marketing & Customer Service DNIC: 4408
- 2-2-2, Marunochi, Chi-Yoda-Ku
- Tokyo 100, Japan
- Contact: Mr Kohichi Ukegawa Tel : (81)3-347-5871
- Telex : (781)22500
- Ontyme: INTL.KDDMKTG
-
- Washington Liaison Office:
-
- Kokusai Denshin Denwa Company, Ltd. (KDD)
- 34K, Intelsat Building
- 3400 International Drive., NW
- Washington, D.C. 20008-3098
- Tel : (202)944-7900
- Telex : 440205 KDD UI
- Fax : (202)362-4365
- Ontyme: INTL.KDD/DC
-
- New York Liaison Office:
-
- Kokusai Denshin Denwa Company, Ltd. (KDD)
- 535 Madison Avenue 33rd Floor
- New York, NY 10022
- Contact: Mr Toshiki Ueda Tel : (212)832-3550
-
-
- 1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 110-300, 1200bps
- Asynchronous leased speeds: 110-300, 1200bps
- Synchronous Leased speeds: 2400, 4800, 9600bps
-
- 2. PROTOCOLS: X.25, Bisync, HDLC, Asynchronous terminal interface
-
- 3. PRICES: ALL Prices are in Japanese Yen
- (1$ US = 130.20 yen 7/88)
-
- 1: Communication Charges
- Connect Time: Yen 40/minute
- Transmission: Yen 2.4/segment
-
- A. Installation charges (one time)
- (for tie line contract)
- Leased Line Installation Yen 72,000. for 300 bps
- Yen 102,000. for 1200-9600
-
- DCE/Additional Service
- Installation: At cost
-
- B. Monthly Basic Charge
- 1. Tie Line Contract: Yen 21,400. for 300 bps
- Yen 28,200. for 1200 bps
- Yen 48,000. for 2400 bps
- Yen 75,000. for 4800 bps
- Yen 114,000. for 9600 bps
-
- Additional Net. Name:
- Multiple Logical Channel:
- Yen 90. per logical chnl.
- Abbreviated Dialing: Yen 1,080 for synchronous
- Yen 270. for asynchronous
- Yen 620. per line
-
- 2. Dial-up Contract: Yen 270. per NUI per month
- (abbreviated dialing)
-
- 4. COMMENTS: KDD's Liaison offices in New York & Washington are very
- helpful for any prospect.
-
-
- ------------------ OPERATIONAL/TECHNICAL INFORMATION -------------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: KDD IDSC Tokyo (Network Control Center)
- Hours of Operation: 24hrs/365 days
- Phone: (81)3-347-5221
- Telex: (781)26600
- Ontyme: INTL.KDDOPNS
-
- 2. NETWORK INFORMATION ADDRESS: n/a
-
- 3. TEST ADDRESS: 44082006001
-
- 4. ASYNC ACCESS PROCEDURES:
-
- LOGON:
-
- 1. On modem connect.
-
- 2. PAD prompt: .P=FA (FA is profile ID)
-
- 3. Login string: N<nui&password>-3106xxxxxx[Dcud]<cr>
- ^ ^
- optional CUD ___|____|
-
- 5. TYMUSA AVAILABLE: Yes
-
- 6. DEFAULT PAD SETTINGS:
-
- 1:1, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0, 12:1,
- 13:0, 14:0, 15:0, 16:8, 17:24, 18:0, 19:1, 20:0, 21:0, 22:0
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- 300bps(V.21) 1200bps(V.22) 2400bps(V.22bis)
- ----------------------------------------------------------------------
-
- Tokyo (81.3)-345-0300 343-1200 344-2400
-
- Osaka (81.6)-944-0300 942-1211 944-2400
-
- Note: These are toll free numbers that can not be accessed via IDDD.
-
-
-
-
-
-
- --- KUWAIT ---
-
- KUWAIT - BASIC GLOBAL CONNECTION SERVICE
-
-
- Ministry of Communications, KUPAC Section
- Kuwait
-
- Contact, Engineering: Tel: 965-2408906
-
-
- 1. ACCESS/SPEEDS:
-
- 2. PROTOCOLS:
-
- 3. PRICES: All prices are in Kuwaiti Dinars (KD)
- (1$ US = .29 KD 7/90)
-
- A. Fixed Charges:
-
- Speed Dial-up Access Leased Line Access
- --------------------------------------------------------
- 300-2400 bps 150 KD 200 KD
- 4800 bps N/A 250 KD
- 9600 bps N/A 300 KD
-
- B. International Connection Charges:
-
- 0.050 KD /min all countries
- 0.005 KD/segment all countries
-
- C. Local Connection Charges:
-
- 0.010 KD/minute
- 0.003 KD/segment
-
-
- 4. COMMENTS: Service is also provided via Bahrain.
-
-
- ------------------OPERATIONAL/TECHNICAL INFORMATION---------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: KUPAC Control
- Hours of Operation: 0400 - 1000 GMT
- Phone: 965-2408902/3/4
- Telex: 496-30828
- Fax: 965-2408907
-
- 2. SERVICE INFORMATION ADDRESS: n/a
-
- 3. TEST ADDRESS: Contact Customer Service for Test Address
-
- 4. ASYNC ACCESS PROCEDURES:
-
- 5. TYMUSA AVAILABLE: No
-
- 6. DEFAULT PAD SETTINGS:
- 1:1, 2:1, 3:126, 4:20, 5:2, 6:13, 7:2, 8:0, 9:0, 10:0, 12:1, 13:1,
- 14:0, 15:1, 16:127, 17:24, 18:18, 19:1, 20:0, 21:0, 22:0, 80:4, 81:88)
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- NATIONWIDE ACCESS:
-
- Modem Speed Access Phone Number
- --------------------------------------------
- 300 bps 143
- 1200 bps 142
- 2400 bps 141
-
-
-
-
-
- --- LUXEMBOURG ---
-
- LUXEMBOURG - BASIC GLOBAL CONNECTION SERVICE
-
-
- Administration des P. et T. Net. Name: LUXPAC
- Division des Telecommunications DNIC: 2704
- Bureau 211
- 5, rue de Hollerich
- L-2999 Luxembourg
- Contact: Mr. M. Barnig, Mr. P. Ney Tel. (352) 4991-710
- (for information about Luxpac) Telex: (848)3410 ptdt lu
-
- Mr. Gilbert Hoscheid Tel. (352) 4991-722
- (for subscription and tariffs) Fax (352) 493049
- Telex: (402) 60520
- OnTyme: INTL.LUXMKTG
-
- Mr. Paul Ney Tel: (352) 4991 732
- (engineering/technical) Fax: (352)491221
- Telex: (402) 3410
-
- Network Supervision and Maint. Tel: (352) 4991 742
- Fax: (352) 489324
-
- 1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 300, 1200, 1200/75,
- 2400 bps
- Asynchronous leased speeds: 300, 1200, 1200/75,
- 2400 bps
- Synchronous leased speeds: 2400, 4800, 9600,
- 19200, 48000, 64000 bps
-
- 2. PROTOCOLS: X.25, X.28, X.32
-
- 3. PRICES: All prices are in Luxembourg Francs (LF)
-
- - Usage Charges for Traffic to the USA
- (for both types of access: direct or via PSTN)
-
- Call set-up charge LF 0.25/call
- Connect Time LF 4.00/minute
- Transmission LF 0.20/segment
-
- - Direct Access
-
- a) Installation Charges
-
- for X.28 direct connection LF 5 000,00
- for X.25 direct connection LF 75 000,00
-
- b) Monthly Charges for leased lines connection
- (includes one modem at customer's site and
- one logical channel for X.25 connection)
-
- 110-300 bps X.28 LF 1 500.00
- 1200/75 bps X.28 LF 2 000.00
- 1200 bps X.28 LF 3 000.00
- 2400 bps X.28 LF 4 500.00
- 2400 bps X.25 LF 5 000.00
- 4800 bps X.25 LF 7 500.00
- 9600 bps X.25 LF 10 000.00
- 19200 bps X.25 LF 17 500.00
- 48000 bps X.25 LF 30 000.00
- 64000 bps X.25 LF 35 000.00
-
- c) Other Charges
-
- Additional logical channel:
- . Installation LF 500.00
- . Monthly charge LF 100.00
- . Access to Teletex
- conversion unit LF 1 000.00
-
- NUI:
- . One-time charge LF 500.00
- . Monthly charge LF 250.00
-
- - Dial-Up Access X.28 and X.32
-
- a) Installation Charges:
-
- NUI LF 1 000.00
-
- b) Monthly Charges X.28:
-
- NUI LF 100.00
- 300 bps LF 200.00
- 1200 bps LF 1 200.00
- 2400 bps LF 2 000.00
-
- c) Monthly Charges X.32:
-
- NUI LF 100.00
- 2400 bps LF 3 000.00
-
- 4. COMMENTS:
-
- --------------------- OPERATIONAL/TECHNICAL INFORMATION -------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Hours of Operation: 24 Hours a day, 7 days a week
- Phone: 17
- Telex: (402) 60745
- Fax: (352) 492617
- 2. SERVICE INFORMATION ADDRESS: n/a
-
- 3. TEST ADDRESS: 027044800000, 027044900000 Echo NUA
- 027044800001, 027044900001 Drop NUA
-
- 4. ASYNC ACCESS PROCEDURES:
-
- 1. On modem connect, LUXPAC replies xxx yyy zzz
- (xxx yyy zzz is the port and node number)
-
- 2. Type N followed by your LUXPAC NUI, and by the called
- NUA, separated by '-' :
- N<nui>-0<nua>(cr)
- or +
-
- 3. LUXPAC will reply: COM
-
- 5. TYMUSA AVAILABLE: No
-
- 6. DEFAULT PAD SETTINGS:
- 1:0, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0,
- 11:not defined, 12:1, 13:0, 14:0, 15:0, 16:8, 17:24, 18:42
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: (National wide)
-
- Modem/Speed Access Number
- ----------------------------------------------------------
- X.28 100-300 bps/V21 0731
- 300 bps/V21 0733
- 1200/75 bps/V23 0734
- 1200 bps/V22 0735
- 2400 bps/V22bis 0736
-
- X.32 2400 bps/V22bis 0732
-
-
-
-
-
-
- --- MALAYSIA ---
-
- MALAYSIA - BASIC GLOBAL CONNECTION SERVICE
-
-
-
- Syarikat Telecom Malaysia Berhad (STM)
- STM Headquarters
- Jalan Raja Chulan
- 50200 Kula Lumpur
- Malaysia
-
- Contact: Ms. Rafiah Ibrahim PH: 03-2329494
- Telex: MA 90196 NCCPJ
-
- 1. ACCESS/SPEEDS: Asynchronous 300, 1200 bps
- Synchronous 2400, 4800, 9600 bps
-
- 2. PROTOCOLS:
-
- 3. PRICES: All prices are in Malaysian Ringgit's (MR).
- (1$ US = 2.70 MR 10/90)
-
- Usage Charge
- Connect Time: $0.45 per minute or part thereof
- Transmission: $0.25 per 10 segments or part thereof
-
- (For dial-up subscribers calls to the MAYPAC exchange will
- be charged in the telephone bill).
-
- SPEED LINE RENTAL/MO. PORT RENTAL/MO.
-
- 300 MR 35.00 MR 135.00
- 1200 MR 35.00 MR 210.00
- 2400 MR 70.00 MR 320.00
- 4800 MR 70.00 MR 585.00
- 9600 MR 70.00 MR 720.00
-
- Installation:
-
- Deposit. . . . . . . . . . $500.00
-
- Connection Fee:
- 300 bps . . . . . . . . . $600.00
- 1200 bps . . . . . . . . . $850.00
- 2400 bps . . . . . . . . $1,300.00
- 4800 bps . . . . . . . . $ 850.00
- 9600 bps . . . . . . . . $ 850.00
-
- Speed of Line Rental Port Rental NUI
- Modem per month per month per mo.
-
- Dial-In Access 300 bps Normal Telephone $65.00 $10.00
- 1200 bps rental applies $105.00 $10.00
-
- 4. COMMENTS: For leased line connections, modems are included in the rental
- of lines.
-
- -----------------------OPERATIONAL/TECHNICAL INFORMATION-------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
-
- 2. SERVICE INFORMATION ADDRESS: 50211320025600
-
- 3. TEST ADDRESS: 50211320014510 Echo Host
- 50211320014211 Drop Terminal
-
- 4. ASYNC ACCESS PROCEDURES:
- Upon modem connect . . .
-
- Send: <CR> <CR>
- Receive: Maypac
- Terminal =
- Send: <CR>
- Receive: User ID =
- Send: User ID (Issued by Maypac)
- Receive: Password =
- Send: Password (Issued by Maypac)
- Receive: Destination =
- Send: Network user address (NUA) of intended destination
- Receive: Connection message
-
- 5. TYMUSA AVAILABLE: No
-
- 6. DEFAULT PAD SETTINGS: (X.3 Profile)
-
- 1:64, 2:1, 3:2, 4:20, 5:0, 6:5, 7:2, 8:0, 9:7, 10:0, 11:X read only par.,
- 12:0, 13:4, 14:7, 15:0, 16:8, 17:24, 18:18
-
- NOTE: The value "X" of parameter no. 11 (speed of the X.28 DTE) is set
- by the PAD when the physical circuit is established when a carriage
- return is entered at the "terminal =" by the user during the
- logon procedure. At the "terminal =" prompt the user may also
- enter the ID of the standard profile (from an ID list) most suitable
- for the terminal type and application.
-
- 7. ASYNC DIAL IN ACCESS TELEPHONE NUMBERS:
-
- City/Territory Modem/Speed Access Number
- ---------------------------------------------------------------------
- Kuala Lumpur/Federal Ter. V.21/300 (6.03) 2328800
- V.22/1200 (6.03) 2328855
- Penang/Pulau Pinang V.21/300 (6.04) 375588
- V.22/1200 (6.04) 360088
- Kota Kinabalu/Sabah V.21/300 (6.088) 218800
- V.22/1200 (6.088) 218855
- Petaling Jaya/Selangor V.21/300 (6.03) 7926600
- V.22/1200 (6.03) 7926655
- Ipoh/Perak V.21/300 (6.05) 548533
- V.22/1200 (6.05) 548444
- Kuantan/Pahang V.21/300 (6.09) 508800
- V.22/1200 (6.09) 508855
- Johore Bharu/Johor V.21/300 (6.07) 248800
- V.22/1200 (6.07) 248855
- Kuching/Sarawak V.21/300 (6.082) 418800
- V.22/1200 (6.082) 418855
- Kota Bharu/Kelantan V.21/300 (6.09) 748800
- V.22/1200 (6.09) 748855
- Malacca/Melaka V.21/300 (6.06) 238800
- V.22/1200 (6.06) 238855
- Alor Star/Kedah V.21/300 (6.04) 715544
- V.22/1200 (6.04) 716644
- Kuala Terengganu/ V.21/300 (6.09) 638800
- Terengganu V.22/1200 (6.09) 638855
- Miri/Sarawak V.21/300 (6.085) 410011
- V.22/1200 (6.085) 410055
- Sandakan/Sabah V.21/300 (6.089) 273300
- V.22/1200 (6.089) 273355
-
-
-
-
-
-
- --- MEXICO ---
-
- MEXICO - BASIC GLOBAL CONNECTION SERVICE
-
-
- (-4h GMT) Last Update: October 15, 1990
-
- Secretaria de Comunicaciones y Transportes Net. Name: TELEPAC
- Eje Lazaro Cardenas No. 567 DNIC: 3340
- 03020 Mexico, D.F. Mexico
- Contact: Jesus A. Ramirez Cordero (52.5) 530-2099
- Telex: (383) 170932
- OnTyme: INTL.SCTMKTG
-
- 1. ACCESS/SPEEDS: Public Dial-in : 110-300, 1200 bps
- Leased line: 2400, 4800, 9600 bps
-
- 2. PROTOCOLS:
-
- 3. PRICES: All prices are in U.S. dollars.
- All calls from Mexico should be sent reverse charged
- and billed in the U.S.
-
- Subscription Charge: $ 51.62 subscription
- $ 96.33 port usage dedicated
- line
- $ 24.08 port usage non dedicated
- line
- $17.20 rent for ID (NUI,monthly)
-
- These charges are one time charges and cover the
- subscription to Telepac. The NUI is a monthly charge.
-
- Domestic Usage: $240.00 monthly rent for dedicated
- (Intra Mexico) line
- $ 4.64 per hour
- $ 0.79 per kilosegment
-
- Traffic to the US: $ 6.50 per hour
- Transmission: $ 5.00/kilosegment (reverse chg.)
- Telephone Access Charge: None
-
- Telepac's customer service number is 905-530-2099.
- Calls to Tymnet from Mexico will be reverse charged
- billed.
-
- Tymnet can provide a NUI for access from Mexico. Our
- agent in Mexico is the best source of aid and information
- for communications from Mexico. For detailed information
- regarding the Tymnet NUI and Mexican dial-up access
- locations read ontyme file, "*** INTL.MEXICO", or consult
- your Tymnet Sales Representative.
-
- 4. COMMENTS:
- Tymnet Agent:
- Ing. Alejandro Acosta (525) 523-9421/543-0524
- Sistemas Ciberneticos, S.A. OnTyme: INTL.MEXICO/SICISA
- Concepcion
- Beistegui No. 109 6 Piso
- Mexico City, Mexico
-
-
- ------------------------OPERATIONAL/TECHNICAL INFORMATION---------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
-
- 2. SERVICE INFORMATION ADDRESS:
-
- 3. TEST ADDRESS:
-
- 4. ASYNC ACCESS PROCEDURES:
-
- Dial access number, (see list below). Upon modem connect. . .
-
- Receive: CONNECT 1200
- TELEPAC
- 905 401W
- TERMINAL=
-
- Send: <cr>
-
- Receive: @
-
- Send: "ID<sp><sp>/TYMNET"<cr>
-
- Receive: PASSWORD=
-
- Send: PASSWORD"030537" (password will not be echoed on screen)
-
- Receive: @
-
- Send: "C<sp><sp>031069<cr>
-
- Receive: 3106 9 CONNECTED
-
- tymnet: please log in:
-
- Send: "host username;password)"<cr>
-
- 5. TYMUSA AVAILABLE: No
-
- 6. DEFAULT PAD SETTINGS:
-
- 7. PAD PARAMETER LIST
-
- 8. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- City/Territory Modem/Speed Access Number
- --------------------------------------------------------------
- ACAPULCO 300 bps (748) 2-33-92 *
- 300 bps 2-12-48 *
- 3-70-41 %%x
- 1200 bps 3-61-17
- 1200 bps 3-70-15
- 1200 bps 3-70-67 **
-
- AGUASCALIENTES 1200 bps (491) 5-12-13 **
- 300 bps 5-12-21 *
- 300 bps 5-12-76
- 2400 bps 5-12-52
- 2400 bps 5-16-94
-
- COATZACOALCOS 300 bps (921) 2-15-20
- 300 bps 2-15-52
- 2-15-51
- 2-15-19
- 2-15-27
- 2-14-04
- 1200 bps 2-15-18
- 1200 bps 2-15-16
-
- CUERNAVACA 1200 bps (73) 12-86-02
- 300 bps 12-83-03
- 1200 bps 12-86-01
- 1200 bps 12-86-00
-
- CHIHUAHUA 300 bps (14) 16-73-30
- 300 bps 16-72-20
- 300 bps 16-74-75
- 1200 bps 16-75-75
- 1200 bps 16-75-95
- 1200 bps 16-77-47
- 16-79-50
- 16-79-00
- 16-78-00
- 16-77-57
-
- DURANGO 1200 bps (181) 1-28-51
- 1200 bps 1-28-52
- 1-28-58 **
- 1200 bps 1-28-60
- 300 bps 1-28-61
- 300 bps 1-28-76
- 1200 bps 1-28-85
-
- GUADALAJARA 300 bps (36) 26-55-68
- 300 bps 26-56-02
- 300 bps 26-55-80
- 300 bps 26-55-86
- 1200 bps 26-56-25
- 1200 bps 26-56-51
- 1200 bps 26-56-38
- 1200 bps 26-56-67
- 1200 bps 26-58-36
- 1200 bps 26-57-76
- 1200 bps 26-50-64
- 1200 bps 26-07-82
-
- HERMOSILLO 300 bps (621) 2-30-53
- 2-34-57
- 2-35-47 **
- 2-38-39
- 1200 bps 2-39-60
- 2-72-10
- 2-71-09
- 2-74-88 **
-
- LEON 300 bps (471) 4-81-89
- 4-80-79
- 1200 bps 4-86-13
- 4-87-60 **
- 4-81-82 *
- 6-57-51
- 6-58-12
- 6-58-54
- 6-58-56
- 6-58-70
- 6-58-93
- 6-58-16
- 6-59-55
-
- MAZATLAN (678) 2-03-77 *
- 2-09-31 *
- 2-04-87 *
- 2-05-86 *
- 1200 bps 2-01-29
- 2-02-77
-
- MERIDA (99) 24-41-55
- 300 bps 24-42-90
- 24-43-89
- 24-45-08
- 1200 bps 24-41-02
- 1200 bps 24-48-19
- 1200 bps 24-48-56
- 1200 bps 24-44-19
- 24-47-89
- 24-49-20
- 24-46-90
-
- MEXICALI (65) 53-63-01 **
- 300 bps 53-63-04 **
- 1200 bps 53-63-17
- 53-63-05
- 53-63-06
- 53-63-07
- 53-63-08
- 53-63-09
-
- MEXICO CITY 1200 bps (905) 590-8888
- 696-6198
- 695-6005
- 696-6099
-
- MONTERREY 1200 bps (83) 55-47-53
- 55-48-07
- 55-42-27
- 55-44-36
- 55-61-45
- 55-60-93
- 55-62-49
- 1200 bps 55-61-03
- 300 bps 55-45-46
- 300 bps 55-46-44
- 300 55-46-45
- 300 bps 55-41-75
-
- OAXACA 1200 bps (951) 6-99-89
- 300 bps 6-99-75
- 6-99-77
- 6-99-91
- 1200 bps 6-99-00
-
- PUEBLA 1200 bps 22 40-50-11
- 40-53-34 *
- 300 bps 40-53-00
- 1200 bps 40-54-91
- 300 bps 40-56-28
- 1200 bps 40-50-75
- 40-56-38
-
- QUERETARO 1200 bps (463) 4-22-23
- 4-29-72
- 300 bps 4-04-31 **
- 4-00-06 **
- 1200 bps 4-02-77
-
- SALTILLO 1200 bps (841) 4-54-88
- 1200 bps 4-55-39
- 300 bps 4-56-45 **
- 4-53-62 **
-
- TAMPICO (12) 15-77-90 *
- 15-76-10 **
- 15-77-28 **
- 1200 bps 15-71-90
- 15-79-97
- 15-71-99 **
- 15-71-48
- 15-77-40
- 15-75-45
-
- TOLUCA (721) 6-53-00 **
- 6-53-30 **
- 6-53-52 **
- 6-53-18 **
- 1200 bps 6-52-07
- 6-52-29
- 6-52-41
- 6-52-63
-
- TORREON 1200 bps (17) 16-50-40
- 16-52-38
- 16-59-92
- 16-50-30 **
- 16-50-82 **
- 1200 bps 16-51-86
- 1200 bps 16-50-92
-
- VERACRUZ (29) 31-40-33
- 31-41-58
- 1200 bps 31-42-83
- 31-44-08
- 31-45-33
- 31-46-58
- 31-47-83
- 31-49-08
- 31-50-33
- 31-51-58
- 31-52-83
- 31-54-08
- 31-55-11 **
- 31-56-36 **
- 31-57-61 **
- 31-58-86 **
-
- VILLAHERMOSA 300 bps (931) 3-14-02 **
- 3-14-55 **
- 3-15-69 **
- 1200 bps 3-15-10
- 3-14-55
- 3-15-64
- 3-15-03 *
-
- * DA%O MODEM
- ** DA%O L.P.
-
-
-
-
-
-
-
- --- NETHERLANDS ---
-
- NETHERLANDS - BT TYMNET GLOBAL NETOWRK CONNECTION SERVICE
-
-
- BT TYMNET Network Name: BT TYMNET
- K.P. Van Der Mandelelaan 78
- 3062 MB Rotterdam
- The Netherlands
-
- Contact: Sales and Marketing Telephone: (31.10)452 3866
- Fax: (31.10)453 2590
-
- 1. ACCESS/SPEEDS: Async dial-in speeds: 300-9600 bps
- Async leased speeds: 300-9600 bps
- Sync. leased speeds: 4800-14400 bps
- Higher speeds available upon request
-
- 2. PROTOCOLS: Async (X.28), X.25, IBM 3270 BSC, 3270 SNA/SDLC, SDLC,
- RJE/HASP, other services available upon request.
-
- 3. PRICES: All prices are in U.S. Dollars. Billing in local currency
- is available.
-
- Dial-up Async (X.28) Service:
-
- The following hourly rates ($/hour) apply depending on the destination
- of the call from the GNS public async port in the Netherlands. There
- are no data volume charges:
-
- --------------------------------------------------------------
- FROM: | TO:
- | EUR-I EUR-II USA JAPAN PACIFIC
- -------------|------------------------------------------------
- BT TYMNET |
- Netherland s | $8.00 $10.00 $18.00 $24.00 $24.00
- (EUR-I) |
- --------------------------------------------------------------
-
- EUR-I: France, Netherlands, United Kingdom, Germany, Belgium
- Denmark, Switzerland
- EUR-II: Italy, Sweden
- PACIFIC: Austrlia
-
- NOTE: Minimum session charge is 2.5 minutes
-
- CONTACT YOUR SALES REPRESENTATIVE FOR DETAILED INFORMATION
- AND ADDITIONAL SERVICES.
-
- 4. COMMENTS:
-
- ---------------------OPERATIONAL/TECHNICAL INFORMATION-------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: Customer Support
- Hours of Operation: 8:30am - 6:30pm local/M-F
- Telephone: (31.10)452 3866
- Fax: (33.10)453 2590
- After hours contact the 24 Customer Support Center in Vienna, Virginia
- at (703) 442-0145
-
- 2. SERVICE INFORMATION BULLETIN BOARD ADDRESS: Username INFORMATION
- Username HELP
-
- 3. TEST ADDRESS: 3106000715
-
- 4. ASYNC ACCESS PROCEDURES:
-
- Upon modem connect. . .
-
- Receive: Please type your terminal identifier
- (NOTE: String of characters may appear at speeds higher
- than 300 bps)
- Send: "a"
- Receive: Please log in:
- Send: TYMNET username (NUI)
- Receive: Password:
- Send: Your password
-
- 5. TYMUSA AVAILABLE: Yes
-
- 6. DEFAULT PAD SETTING: N/A
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- City/Territory Modem/Speed Access Number
- -------------------------------------------------------------------
- Alkmaar 300-9600 MNP (011.31.72) 155190
- Amsterdam 300-9600 MNP (011.31.20) 6610094
- Eindhoven 300-9600 MNP (011.31.4902)45530
- The Hague 1200 (011.31.70) 3814641
- 300-2400 MNP (011.31.70) 3475032
- 4800-9600 MNP (011.31.70) 3818448
- Rotterdam 300-9600 MNP (011.31.10) 4532002
- -------------------------------------------------------------------
-
- NOTE: Local X.25 gateway to PTT Datanet-1 service
-
- NUA: international: 2041170495
- national: 1170495
-
-
- NETHERLANDS - ENHANCED GLOBAL CONNECTION SERVICE
-
-
- 1. TYMUSA Gateway Host Number: 5393
-
- 2. Dialup Node(s): 3462
-
- 3. Rate: $15.00/hour and $0.80/Kchar
-
- 4. Dialup Locations and Numbers:
-
- Alkmaar
- (011.31.72) 155190 3-2400 MNP
-
- Amsterdam
- (011.31.20) 6610094 300/1200/1200/75/2400/9600 MNP
-
- Eindhoven
- (011.31.4902)45530 3-12-2400 V.21/22/bis
-
- The Hague
- (011.31.70) 3814641 1200
- (011.31.70) 3475032 300-2400 MNP
- (011.31.70) 3818448 4800/9600 MNP
-
- Rotterdam
- (011.31.10) 4532002 300/1200/1200-75/2400/9600 MNP
-
- 5. Trouble Reporting Center:
-
- Support (local)
- Phone: (011.31) 703820044
- Hours of Operation: M-F 8am - 5pm local time
- Contact: Jean Van Waterschoot (Customer Support)
-
- Support (Regional)
- Phone: (011.33.1)49112121
- Hours of Operation: M-F 9:00am - 5:30pm Paris, France
- Contact: Trouble Reporting Center
-
-
- NETHERLANDS - BASIC GLOBAL CONNECTION SERVICE
-
-
- PTT Telecom BV Net. Name: DATANET-1
- Telematics Systems and Services DNIC: 2041
- P.O. Box 30150
- 2500 GD's-Gravenhage
- The Netherlands
- Contact: Telematics Services Tel. (31.70) 43.86.11
- Mr. Peter Heuseveldt Tel. (31.70) 43.61.77
- Fax (31.70) 43.76.05
- (31.70) 43.75.67
- Telex: (844) 30515 or 31111
- OnTyme: INTL.DCTDATA
-
- 1. ACCESS/SPEEDS: Asynchronous dial-up 300, 1200, 1200/75 and 2400 bps
- Synchronous leased lines: 2400, 4800, 9600, 48000 bps
-
- 2. PROTOCOLS: X.25, X.28, X.75
- Asynchronous terminal access.
- MNP protocol is supported with async speeds of 1200
- and 2400 bit/s.
-
- 3. PRICES: All prices are in Dutch Florins (DFL).
- (1$ US = 2.08 DFL 7/88)
-
- 1. Permanent X.25 Connection
-
- a) X.25 Single Connection
-
- - Installation Charge
-
- 2400 bps (one logical channel) DFL 500.00
- 2400 bps DFL 500.00
- 4800 bps DFL 500.00
- 9600 bps DFL 500.00
- 48000 bps DFL 2000.00
- 64000 bps DFL 2000.00
-
- - Monthly Subscription
-
- 2400 bps (one logical channel) DFL 235.00
- 2400 bps DFL 375.00
- 4800 bps DFL 575.00
- 9600 bps DFL 750.00
- 48000 bps DFL 2000.00
- 64000 bps DFL 2000.00
-
- Extra logical channels for DFL 5.00
- incoming and outgoing calls
-
- b) X.25 Multiple Port Connection
-
- Installation Monthly
- Charge Subscription
-
- 2400 bps DFL 1500,00 DFL 1100.00
- 4800 bps DFL 1500,00 DFL 1350.00
- 9600 bps DFL 1500,00 DFL 1550.00
-
- Per extra pair of modems DFL 175.00
-
- c) Traffic Charges to the USA
-
- Connect Time - per minute DFL 0.25
- Transmission - per segment DFL 0.0125
- Call set-up - per call DFL 0.06
-
- 2. PAD Connection
-
- a) Monthly subscription per NUI DFL 30.00
-
- b) Traffic Charges to the USA
-
- Connect Time - per minute DFL 0.25
- Transmission - per segment DFL 0.015
- Call set-up - per call DFL 0.06
-
- c) Telephone Charges
-
- DFL 0.15 per 5 minutes.
-
- Telephone charges are billed separately.
-
- Service Lead Times: One week delay to obtain an NUI.
-
- 4. COMMENTS: PAD Connection:
-
- It is possible to communicate via the PAD in 2 ways:
-
- - identified, this means that you need a PTT
- identifier and a password ;
- - unidentified, you use no threshold access for which
- no identifier or password is required.
-
- The communication costs are charged to the Host and
- the user does not need a subscription to the PAD,
- a form of an electronic answer number is created for
- the users.
-
- --------------- OPERATIONAL/TECHNICAL INFORMATION-------------------
-
- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
- Contact: PTT - Datacommunications
- Hours of Operation: 24 Hours/7 Days
- Phone: (31) 2159 36604
- Telex: (844) 43198 DACOM NL
- Fax: (31) 2159 17393
-
- 2. SERVICE INFORMATION ADDRESS: 20412900090
-
- 3. TEST ADDRESS:
- Echo: 2041900
-
- 4. ASYNC ACCESS PROCEDURES:
-
- LOGON:
-
- 1. On modem connect you will recieve the msg: TER
-
- 2. Login string: A;1;<nui>;<password>;03106xxxxxx[P|DCUD]<cr>
- ^ ^
- optional CUD __|______|
-
- 5. TYMUSA AVAILABLE: Yes (Please contact your sales representative
- for additional information and access numbers)
-
- 6. DEFAULT PAD SETTING:
-
- 1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0, 11:x
- 12:1, 13:0, 14:0, 15:1, 16:127, 17:24, 18:18, 19:0, 20:0
- 21:0, 22:0
-
- PAD Profiles:
-
- Interactive 1
- PROF 10 = 1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0,
- 11:x, 12:1, 13:6, 14:0, 15:1, 16:127, 17:24, 18:18,
- 19:2, 20:0, 21:0, 22:0
-
- Transparent/File Transfer/Block Mode
- PROF 91 = 1:0, 2:0, 3:0, 4:20, 5:0, 6:0, 7:2, 8:0, 9:0, 10:0,
- 11:x, 12:0, 13:0, 14:0, 15:0, 16:127, 17:24, 18:0,
- 19:1, 20:0, 21:0, 22:0
-
-
- 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
-
- City/Territory V.21/300 V.23/1200/75 V.22/1200 and 2400 MNP
- ---------------------------------------------------------------------
- REGION 1
-
- ALKMAAR (072) 624814 624814 624814
- AMERSFOORT (033) 620492 620492 620492
- AMSTERDAM (020) 460031 460031 460031
- of (020) 6680531 6680531 6680531
- HAARLEM (023) 358324 272134 276284
- LELYSTAD (03200) 62040 62040 62040
- UTRECHT (030) 310032 340414 321114
-
- REGION 2
-
- ARNHEM (085) 432778 432778 432778
- DEVENTER (05700) 42011 42011 42011
- EMMEN (05910) 42600 42600 42600
- GRONINGEN (050) 143666 143555 143777
- HENGELO (074) 438355 438555 438255
- LEEUWARDEN (058) 128986 129188 129382
- MAASTRICHT (043) 434900 434020 435700
- NIJMEGEN (080) 600101 600015 600204
- VENLO (077) 544411 544411 544411
- ZWOLLE (038) 221133 221133 221133
-
- REGION 3
-
- BREDA (076) 227032 227040 226525
- DORDRECHT (078) 310811 310811 310811
- EINDHOVEN (040) 456345 440085 454585
- GOES (01100) 31006 31006 31006
- HERTOGENB. (073) 890840 890840 890840
- ROTTERDAM (010) 4140877 4334211 4045377
- TILBURG (013) 365440 365440 365440
- ZOETERMEER (079) 214092 212001 521547
-
-
-
-
-
-
- --- NEW ZEALAND ---
-
- NEW ZEALAND - BASIC GLOBAL CONNECTION SERVICE
-
-
- Last Update: June 29, 1990
-
- Net. Name: PACNET
- Telecom Networks and International Ltd. DNIC: 5301
- Telecom Networks House
- Switched Data Network Section
- 68-86 Jervois Quay
- P.O. Box 1092
- Wellington 1, New Zealand
- Contact: Alan Townsend Phone: (64.4)496 6132
- Telex: 791 31688
- Fax: (64.4) 496 6125
-
-
- 1. ACCESS/SPEEDS: Dial-up: 300, 1200, 1200/75, 2400
- Leased Line: 300 and 1200 bps asynchronous
- Leased Line: 2400, 4800 and 9600 bps synchronous
-
- 2. PROTOCOLS: X.25, Asynchronous terminal interface
-
- 3. PRICES: All prices are in New Zealand Dollars. (NZ Dls)
- (1$ US = 1.7 NZ Dls. 7/90)
-
- Traffic Charges to the USA:
- Time: NZ 12.00/hr
- Volume: NZ 12.00/ksegment
-
- Minimum Charge:
- For successful call: 6 segments
- For unsuccessful call: 2 segments
-
- Dial-Up Service:
- Registration Fee: NZ 18.18 (one time)
- Monthly Charge: NZ 5.00/NUI
-
- Leased Line Service:
-
- Async Connections:
- Installation Charge Monthly Charge
- 300bps NZ 240.00 NZ 190.00
- 1200bps NZ 280.00 NZ 255.00
-
-
- Synchronous Connections:
- Installation Charge Monthly Charge
- 2400bps NZ 280.00 NZ 160.00
- 4800bps NZ 280.00 NZ 170.00
- 9600bps NZ 280.00 NZ 190.00
- 48kbps NZ 1680.00 NZ 660.00
-
- ============================================================================
-
-
- / /
- / NIA073 / File 05 /
- / Report On Interexchange Carriers /
- / Compiled By The FCC /
- / /
-
- The following list outlines all Long Distance carriers purchasing
- switched access as of March, 1991. The list also outlines the type
- of access purchased. With feature group A and B, the caller gains
- access to the carrier's facilities by first dialing a remote access
- site. Feature group D indicates equal access.
-
-
- SERVICE ACCESS TYPE
- -------------------------------------------------------------
- 10 Plus Teleservices D
- Abcom A
- ACC Long Distance Corporation A B D
- Access Long Distance B D
- Access Plus A D
- Action Telecommunications Co. A B D
- Advanced Business Telephone, Inc. A B D
- Advanced Communication Technologies, Inc. A B D
- Advanced Communications Systems, Inc. A B D
- Advanced MKG, SVCS., dba Dial Anywhere A B D
- Aero Mayflower A
- Afford-A-Call A B D
- Allnet Comm. Svs., Inc. (LDX, Lexitel) A B D
- Altcom Corp. A
- Alternate Communication Technology, Inc. B D
- A.B.E. of Alabama, Inc., dba Econoline A
- Americall Corporation (Calif.) A B D
- Americall Systems of Louisville A B D
- American Long Distance Co. D
- American Long Distance Exchange, Inc. D
- American Long Lines A B D
- American National Telcom A B D
- American Network Exchange, Inc. A B D
- American Sharecom, Inc A B D
- American Telco, Inc. A B D
- American Telco Network Services, Inc. A B D
- American Telecommunications Holdings, Ltd. B D
- American Telesystems A B D
- Amerisystems, Inc B D
- Amvox D
- Ascom Autelca A
- Associated Telenet, Inc. A B D
- Associated Terminating Network A
- ATC A B D
- Atlantic Connection, Ltd. A
- ATX Telecommunications Services A B D
- AT&T Communications A D
- Austin Bestline A B D
- Automated Communications, Inc. B D
- Bay Communications A B D
- Bittel Telecommunications Corp. A B D
- Biz Tel Long Distance Telephone Co. D
- Biztel, Ltd. A B
- Bi-State Telephone Co. A
- Budget Telephone A
- Burlington Telephone Company A B D
- Business Communications Network, Inc. D
- Business Telecom, Inc. A B D
- Cable & Wireless Communications, Inc. (TDX) A B D
- Call America A B D
- Call America Business Comm. Corp. A B D
- Call America of Riverside A B D
- Call America/Palm Desert A B
- Call Savers of Fresno B D
- Call Technology Corp. of Philadelphia B D
- Call USA Corp. B D
- Call-USA, Inc. B
- Cambridge Communications A B D
- Cam-Net, Inc. A B D
- Capital Network System, Inc. A B D
- Capital Telecommunications, Inc. A B D
- Card*Tel A
- Centel Net D
- Central Lines A
- Central New York Talk-Transit A B
- Central Teleohone Systems, Inc. A B
- Central Texas Long Distance, Inc. A B D
- Century Area Long Lines A
- Century Network, Inc. A B
- Chadwick Telephone A B D
- Charter Corporation dba TRI-J A B D
- Charter Network A B D
- Chautauqua Tele-Saver A
- Checkrite A B
- Chicago Communications Services, Inc. A
- Cincinnati Bell Long Distance, Inc. B D
- Citynet Communications, Inc. B D
- Cleartel Communications B D
- Clifton Phone Systems D
- Coachella Valley Communications B D
- Coastal Telephone Company B D
- Colorado River Communications B D
- Com Systems Network Services A B D
- Comantel A
- Commander Systems, Inc. A
- Communication Cable Laying Co., Inc. A B D
- The Communigroup of N. Alabama A
- Communique Telecommunications, Inc. D
- Compu-Tel, Inc. A
- Com-Mar, Inc. A
- Conagra A
- Conifer Communications, Ltd. A B
- Conquest Communications Corporation B
- Conquest Long Distance Corp. A B D
- Conquest Operator Services Corp. B D
- Consolidated Network, Inc. B D
- Consortium Communications Inc. A
- Contact America A B D
- Contel ASC A B
- Continental Switching Corporation D
- Continental Telecommunications Group D
- Cont'l States Corp. dba TMC of Orlando D
- Coshocton L.D.S. A B
- CTI Telecommunications, Inc. A B D
- Custom Telecom. Network of Arizona D
- Cypress Telecommunications Corp. (CYTEL) A B D
- Dash Long Distance Service, Inc. A B D
- Data General Network Services A
- Datanet Communications, Inc. A B D
- Decco A
- Delta Communications, Inc. A B D
- Dial America, Inc. A B
- Dial-Net, Inc. A B D
- Digital Network, Inc. A B D
- Digital Signal, Inc. A
- Direct Communications, Inc. A B D
- Discount Communications Services A B
- Dunset A
- E & K Systems, Inc. A
- Eastern Microwave D
- Eastern Telelogic Corporation A D
- Eastern Telephone Systems, Inc. A B D
- Econo-Call, Inc. A B
- Econo-Line (Harrison, AR) B
- Econo. Call Long Distance Services A B D
- Econ-A-Call, Inc. of Heys A B D
- EDS A B
- Equicom Communications, Inc. B D
- Escondido Telephone Company B D
- Execuline of Sacramento A B D
- Execuline of the Northwest A B D
- Execulines, Inc. A
- FEB Corporation D
- Fiberfone of Florida, Inc. A B
- Fibernet Communications Corporation B D
- First Communications, Inc. (FDR) B
- First Data Resources, Inc. (FST) B D
- First Fone of Amarillo B D
- First Fone Long Distance B D
- First Interstate Service Co. B
- First Phone of New England A B D
- Flat Rate Communications B
- Flex Communications System A B D
- Fone America, Inc. A B D
- Fones West A
- Fox Communications Corp. B D
- Garden State Long Distance Telephone A D
- General Communication, Inc. A B D
- GEO Communications, Inc. A
- Glen Falls Long Distance Service A B
- GMW Company A B D
- Hart Communications Co. D
- Hi-Plains NTS Communications B
- Icon Communications, Corporation A B D
- Independant Long Distance D
- Indianapolis Telephone Corp., Inc. A
- Innovative Communications, Inc. B D
- Intelco A B D
- Inter Tel A
- International Pacific B D
- Internationsl Telecharge, Inc. A B D
- Internet Datacom, Inc. A
- Interstate Telephone Company A B
- Iowa Network Services, Inc. B D
- ITC Networks A B D
- J-Net Communications, Inc. A B D
- Kawahawi Company A
- KCC Communications D
- Ken-Tel Service, Inc. A B D
- Kentucky Telephone Corp. A B D
- Key System Corporation A
- Keystone Telecommunications, Inc. A B D
- Lake States Communications, Inc. D
- Lassman - Weber Communications, Inc. A B D
- LDB Corporation A B D
- LDDS A B D
- LDS of Alexandria B D
- LDS of Baton Rouge A B D
- LDS of Monroe A B D
- LDS of Shreveport A B D
- LDS of Tulsa A B D
- Lintel Sys. dba Lincoln Telephone L.D. B D
- Litel Telecommunications (Lightcall) A B D
- Lone Star Telecom D
- Long Distance Communications B D
- Long Distance Discount, Inc. A B D
- Long Distance for Less A B D
- Long Distance Management A B D
- Long Distandce Network, Inc. A D
- Long Distance Ohio, Inc. A B
- Long Distance Savers A B D
- Long Distance Service, Inc. A B D
- Long Distance Specialties Telephone Co. A B D
- Long Distance Telephone Savers, Inc. A B D
- Long Line Inc. A
- LTS, Inc. A B D
- Lufkin Tele. dba Star Tel of Lufkin A B
- Manitowoc Long Distance Service A D
- Marinette-Menominee LDS A B D
- Marshall LDDS A
- MCI A B D
- Metromedia/ITT A B D
- Metro Telephone, Inc. B D
- Metronet Long Distance Communications A D
- Mid Atlantic Telecom A B D
- Mid Atlantic Telephone Company A
- Midamerican Comm. (Midamerican L.D.) A B D
- Midco Communications A B D
- Midcom, Inc. B
- Midcom of Arizona, Inc. A D
- Midco-Tel of Aberdeen A
- Midwest Telephone Service, Inc. A B D
- Mid-Tel L.D., Inc., of Williston A B
- Minntelco A
- Mobile Comms., Corp. of America A
- Montana Long Distance, Inc. B D
- MSI Communications, Inc. B
- Nacogdoches Telecommunications, Inc. A B D
- NACT dba Network Telemanagement Services A B
- NAPA Valley Telecom Services A B D
- National Brands, Inc. B D
- National Network Corp. B
- National Technical Association dbs NTA B D
- National Telecommunications, Inc. A B D
- National Telephone Communications, Inc. A B
- National Telephone Exchange (N.Y.) A B D
- National Telephone Exchange (PA) A B
- National Telephone Exchange (TX) A B D
- National Teleservice A B D
- National Tele-Sav, Inc. B D
- NCHE Telecommunications Network, Inc. D
- Net Express Communications, Inc. D
- Netech Communications A B D
- Network 1, Inc. A B
- Network Communications, Inc. A
- Network Operator Services, Inc. B D
- Network Services, Ltd. B D
- Network Telecommunications A B D
- Network Telephone Services, Inc. D
- Nickle Fone A B D
- Norlight A
- North American Communications, Inc. A B D
- Northern Arizona Communications Corp. B D
- Northern Michigan L.D.S. A B
- Northern Wisconsin L.D.S. D
- Northland Telephone Systems, Ltd. A B D
- Northwest Network Communications, Inc. A B D
- Northwest Telecom, Ltd. A B D
- Northwest Telecomm, Co. A B D
- Novah of Michigan A
- NTS Communications, Inc. A B D
- NY Com, Inc. B D
- One Call Communications, Inc. A B D
- One-2-One Communications A B D
- Operator Service Company D
- Pace Long Distance Service A B D
- Page America Communications, Inc. A
- Panda Communications A
- Pass Word, Inc. B
- Payline Systems, Inc. B D
- Peninsula Long Distance Service, Inc. A D
- Penny Fone A B
- Petroleum Communications A
- Phoenix Communications Group, Inc. A B D
- Phoenix Network Corporation B D
- Phone America of Carolina A B D
- Phone Base Systems, Inc. D
- Phone One A B D
- Phonelink, Inc. A
- Phonenet, Inc. A
- Phonetel Technologies, Inc. D
- Pilgrim Telephone, Inc. D
- Prestwood Communications Co. A
- Professional Networks Management, Inc. A B D
- Pro-Com, Inc. A B D
- PSA, Inc. A B
- Qwest Microwave Corp. B
- Radius Telecommunications A
- RCI Long Distance A B D
- Resurgens Telecommunications D
- Roamer Services, Inc. D
- Rochester Telecomm Systems A
- San Marcos Long Distance, Inc. B
- Schneider Communications A B D
- Science Dynamics Corporation D
- Securitex dba Tylernet Long Distance A B D
- Sharecom A D
- Shared Use Network, Ltd. A B D
- Shared Use Network Service, Inc. A B D
- Shenandoah Long Distance Company B
- Sierra Telecommunications, Inc. B D
- SM Long Distance B D
- South Bay Communications, Inc. A B
- South Tel A B D
- Southern Interexchange Services, Inc. B
- Southnet Services, Inc. D
- Southwest Communications B
- Spectratel A
- St. Thomas & San Juan Telco, Inc. A
- Star Tel A B
- Star Tel of Abilene A B D
- Star Tel of Victoria A B D
- Star Tel Transmission Co., Inc. A B D
- Starline, Inc. B D
- Startec, Inc. D
- St. Joe Communications, Inc. D
- Sun Coast Comm Inc. A
- Sunshine Telephone, Inc. A B D
- Superior Telecom A B D
- Swiff Train Communications A B
- Switchboard of Oklahoma City A B
- Tacoma Telephone Exchange A
- Taconic Long Distance Service, Corp. A B D
- TCS Network Services A
- TEC West A
- Tel America, Inc. A B D
- Tel Com International, Inc. B D
- Tel Systems Management A
- Telamarketing Communications, Inc. A B D
- Telamarketing Communications of America D
- Telamarketing Communications of Arkansas A B D
- Telamarketing Communications of Bakersfield A B
- Telamarketing Communications of Baton Rouge D
- Telamarketing Communications of Birmingham A D
- Telamarketing Communications of Columbus A
- Telamarketing Communications of El Paso A D
- Telamarketing Communications of Evansville A B D
- Telamarketing Communications of Fresno A B
- Telamarketing Communications of Lafayette A D
- Telamarketing Communications of Louisville A D
- Telamarketing Communications of Milwaukee A B D
- Telamarketing Communications of Nashville A
- Telamarketing Communications of NW Indiana A
- Telamarketing Communications of Oklahoma A D
- Telamarketing Communications of Omaha A B D
- Telamarketing Communications of Piedmont A B D
- Telamarketing Communications of Providence A B D
- Telamarketing Communications of Raleigh A
- Telamarketing Communications of San Luis Obispo A B
- Telamarketing Communications of Savannah A
- Telamarketing Communications of Stockton A B
- Telamarketing Communications of Tri-States A B D
- Telamarketing Communications of Tulsa A D
- Telco of Baton Rouge, Inc. A B D
- Tele Tech, Inc. A B D
- Telecolumbus, USA dba Worldcom D
- Telecommunications Services Corporation A B D
- Telecommunications Consultants, Inc. B D
- Telecon Communications Corporation B
- Teledial America A B D
- Telefind Corporation B
- Telemanagement Consultants Corporation A B D
- Telenational Communications A B D
- Telephone Assoc., dba Fergus Falls LD B
- Telephone Assoc., dba Thief River Falls LD D
- Telephone Assoc. Long Distance SVCS. A B D
- Telephone Communications Corporation A D
- Telephone Connections, Inc. B
- Telephone Express A B D
- Telephone Express, Inc. A
- Telephone Systems A B
- Teleport Communications A
- Telepro dba Blue Ridge Telephone Company A B D
- Telesavers, Inc. A
- Telescan, Inc. B D
- Telesphere Network, Inc. A B D
- Telesphere of Houston B
- Tele$aver of New Mexico B D
- Tele-Fibernet Corporation A B D
- Tele-Sys, Inc. A B D
- Teltrust Network Service A B D
- Telvue Corporation B D
- Tel-America Network Services, Inc. A B D
- Tel-A-Save Communications Systems, Ltd. A B
- Tel-Central of Jefferson City A B D
- Tel-Com, Inc A B
- Tel-Share A B D
- Tel-Toll dba Econ-O Dial of Bishop A B
- Texas Long Distance Conroe A B
- Texustel, Inc. A B D
- The Communigroup A B D
- The Offshore Telephone Company A B
- The Pay Telephone Company B D
- The Switchboard A B
- Things, Inc. A B D
- Thrifty Telephone Ex. dba Ohio Digital Access B D
- TK Communications, Inc. A B D
- TMC of Lexington A B D
- TMC of San Diego A B D
- TMC of Southern Kentucky B D
- TMC of Southwest Florida A B D
- TMC of Washington, DC A B D
- Total-Tel USA, Inc. A B D
- Touch America, Inc. B D
- Touch-1 D
- To-Tel Comm Sys A
- Transamerica Telecommunications, Inc. A B D
- Transtel Comm Express Tel A
- Trans-Net, Inc. A B D
- Tri-Tel Communications A B D
- Tri-Tel Comunications Systems A B
- TRT Telecommunications Corporation A B D
- TTE of Charleston A D
- TTI Midland-Odessa B D
- Tuck Data Communications B
- Tyler Telecom A B D
- Tymnet A B
- T-Tel A B D
- United Comunications, Inc. B D
- United Telephone Co. dba Telamerica L.D. A B D
- United Telephone Long Distance D
- Unitel A D
- Universal Telephone Systems B D
- U.S. Link A B D
- U.S. Long Distance, Inc. D
- U.S. Sprint [Isacomm, Telenet, LD/USA] A B D
- U.S. Tele-Comm, Inc. D
- Valley Star-Tel A B D
- Valley Wats A B D
- Valu-Line of Amarillo A B D
- Valu-Line of Angletown A
- Valu-Line of Kansas, Inc. A B
- Valu-Line of Longview, Inc. A B D
- Valu-Line of of St. Joseph A D
- Valu-Line of of Wichita Falls A B D
- Vartec National, Inc. A B D
- Vertelco Systems A B
- Virtual Network Services Corp. A B D
- Vista-United Telecommunications A
- Vortel Communications, Inc. A B D
- VTA, Inc. D
- VYVX Telecom, Inc. A B D
- West Coast Telecommunications, Inc. A B D
- Westcom Data Tel A
- Westcom Long Distance A B
- Westel, Inc. A B D
- Westel Communications (Telamarketing Comm) A B D
- Western Express Communications, Inc. A
- Western Information Systems, Inc. A B
- Western Oklahoma Information Systems A B D
- Western Telenet, Inc. A D
- WI Amer Sharecom Inc. A
- Wiles Communication Service B D
- Williams Telecommunications Group A
- Wisconsin L.D.S. B D
- Wylon A B D
- Yavapai Telephone Exchange A B D
- -------------------------------------------------------------
-
- =============================================================================
-
-
- / /
- / NIA073 / File 06 /
- / Vox Populi: /
- / NIA News /
- / /
-
- ---
-
- Date: July 22, 1991
- Source: AT&T Newsbriefs
- C. Sources: San Fransisco Chronicle (7/20/91), Dallas Times Herald (7/20/91)
-
- A prankster who intercepted and rerouted confidential telephone messages from
- voice mail machines in City Hall <of Houston, Texas> prompted officials to pull
- the plug on the phone system. The city purchased the high-tech telephone
- system in 1986 for $28 million. But officials forget to require each worker to
- use a password that allows only that worker to retrieve or transfer voice
- messages from their "phone mailboxes," said AT&T spokesman Virgil Wildey. As a
- result, Wildey said, someone who understands the system can transfer messages
- around, creating chaos.
-
- ---
-
- Georgia's New Area Code
- Date: July 1991
- Source: Southern Bell Customer Newsletter
-
- Telephone use in Georgia has increased so rapidly -- caused by increased
- population and the use of services like fax machines and mobile telephones --
- that we are running out of telephone numbers.
-
- Southern Bell will establish a new area code -- 706 -- in Georgia in May 1992.
- The territory currently designated by the 404 area code will be split.
-
- Customers in the Atlanta Metropolitan local calling area will continue
- to use the 404 area code. Customers outside the Atlanta Metropolitan toll free
- calling area will use the 706 area code. The 912 area code (South Georgia)
- will not be affected by this change.
-
- We realize the transition to a new area code will take some getting used to.
- So, between May 3, 1992 and August 2, 1992, you can dial EITHER 706 or 404 to
- reach numbers in the new area. After August 2, 1992, the use of the 706 area
- code is required.
-
- We are announcing the new area code far in advance to allow customers to plan
- for the change.
-
- ---
-
- Countywide Calling For Southern Bell Customers
- Date: July 1991
- Source: Southern Bell Customer Newsletter
-
- As required by legislation enacted by the Georgia General Assembly and by order
- of Georgia Public Service Commission, beginning July 1, 1991, you will be able
- to make calls within your county free of toll charges.
-
- On July 1, calls within your county boundary that were previously long-distance
- calls are now local calls. Therefore, no itemization or toll charges will
- appear on your telephone bill for calls within your county.
-
- If you currently use the "1" plus 10-digit dialing or "1" plus seven-digit
- dialing, you should continue that same dialing pattern with the implementation
- of countywide calling on July 1.
-
- In addition, you can obtain a telephone number within your county by dialing
- 411 for Directory Assistance with applicable charges applying to these calls.
-
- ---
-
- Some Bellcore Acroynms
- Source: Telecom Digest
-
- BCR Bell Communications Research
- FCIF FACS Component Interface Format *
- (FACS = Facility Assignment and Control System *)
- LUSI Local User System Interface
- NMA Network Monitoring and Analysis System
- RUSI Remote User System Interface
- SCCS Switching Control Center System *
- SEAS Signaling Engineering and Administration System *
- SOP Service Order Processor *
- SSP Service Switching Point *
- TOP Transactions-Oriented Protocol *
- UPL User Program Layer
- USL User System Language
-
- * = belongs to Bellcore
-
- ---
-
- Source: United Press Wire
-
- BALTIMORE (UPI) -- Chesapeake and Potomac Telephone Co. wants to
- expand its Caller ID system to businesses with centrex systems.
-
- C&P has submitted a plan to the Public Service Commission that
- would allow any business with three or more lines to buy Caller ID.
-
- The service, which permits users to obtain the numbers of incoming
- calls, has been available in Maryland since October, 1989.
-
- So far, Caller ID mainly has been marketed and sold as a service
- for residential and small business customers.
-
- It also has been available to large businesses with PBX switchboards
- on a special-order basis.
-
- But the service has not been widely available to C&P's 11,000
- business customers with centrex. Centrex are large-scale
- telecommunications systems that can handle anywhere from three to
- 10,000 or more telephone lines.
-
- ---
-
- Teenage Hacker Emulates Hess
- Source: Summarised from Computer Weekly
- Date: 8th August 1991.
-
- A 16 year old schoolboy named Jamie Moulding has been cautioned by
- plain-clothed police after hacking into a military computer and trying to sell
- secrets to the USSR. He claims to have read the Ministry of Defence personnel
- and payroll files. One computer he entered held details of a British Army tank
- control system. Moulding first incorporated details of the system into his own
- simulation package, and then phoned the Soviet Union's London embassy to try to
- sell the information. Next day two policemen turned up at his home and spoke
- to his parents.
-
- Moulding's telephone bills were unwittingly paid by his school. He wrote an
- autodialer program and an automatic hack program which "planted a command which
- led to a display of passwords".
-
- DEC denied that its systems had been hacked. The police officers were
- unavailable for comment.
-
- ---
-
- Electronic Mail Beams Shuttle's Message Home
- By Joe Abernathy and Mark Carreau
- Source: Houston Chronicle, Page 1A, Copyright 1991
- Date: August 5th, 1991
-
- Electronic mail networks, the message medium of the information age, made
- their debut in the space age Sunday aboard the shuttle Atlantis as part of an
- effort to develop a communications system for a future space station.
- Details of the test were being closely guarded because of concerns over a
- possible hacker incident or "public free-for-all" on the nation's computer
- networks, according to one engineer involved with the project. Privacy and
- medical ethics also loom large as issues. [...]
- Electronic mail offers a new way for astronauts to stay in touch with their
- families, Mission Control, and potentially, the millions of people who use the
- nation's interlinked computer networks. It could produce far-reaching change in
- the way scientists and others interact with the space program. Currently, only
- the shuttle communicator is allowed to talk with the astronauts during a
- flight, except for a private medical conference each day. E-mail could change
- that by letting any number of people exchange information, while scientists and
- engineers on the ground could assume direct control over their experiments in
- space.
- [Bryon] Han and fellow Apple employees Michael Silver and James Beninghaus
- have donated their time to the project. They are using low-cost, commercially
- available products, rather than the costly custom products often used in
- science. [!!!] The e-mail will play a role in controlling experiments,
- electronic flight information, and transfer of experiment results to the
- ground, Han said, as well as sending data up to the shuttle.
- In the future, the system might be used to transmit and manipulate
- information from the many medical experiments NASA conducts. But this raises a
- number of problems regarding privacy and medical ethics. For example, one
- experiment in this flight seeks to correct a blood-flow problem associated with
- weightless ness that causes some astronauts to faint upon their return to
- Earth. But this experiment is being monitored with the same Apple computer
- that is playing host to the e-mail system. Even though the results aren't
- being transmitted over computer networks this time, they might be next time --
- and computer networks are notoriously insecure.
- Inquisitive computer enthusiasts -- hackers -- are in fact one of NASA's
- chief concerns in regard to the use of electronic mail. The space agency
- initially sought to conduct the tests without publicity, but word quickly
- percolated around the nation's computer networks -- perhaps indicating that the
- concerns were justified. A chorus of calls was heard requesting the e-mail
- address of the astronauts -- but that raised another problem more pressing than
- any threat from malicious hacking, that of capacity.
- "We have things we need to accomplish with the limited amount of time we
- have, and we do have a very limited amount of data we can move between Mission
- Control and the orbiter," said Deborah Muratore, an engineer in the space
- station support office at Johnson Space Center and the experiment manager.
- In addition to voice communication, the shuttles are equipped with Teletype
- and fax machines for the transmis sion and reception of printed material and
- even photo graphs.
- "Conceivably, everything they move that way could be moved from computer to
- computer," Muratore said. "From a space station standpoint it would be much
- preferable to transfer the information electronically without paper in the loop
- the way we do today on the shuttle." "Paper is going to be a limited
- resource, something that has to be thrown away or reused on the space
- station," she said. "It becomes trash. So the more we can eliminate on the
- space station the better off we are."
- The current experiment does not represent the first time that civilians have
- had a direct communications link with those in space. Since January, the Soviet
- space station Mir has maintained a "mail drop" for ham radio operators to use
- in leaving messages for the cosmonauts. "It's very similar" in function, said
- Gary Morris, a former member of the Johnson Space Center Amateur Radio Club who
- now lives in San Diego. "The packet bulletin board system on Mir allows an
- amateur (ham radio operator) on the ground to leave mail messages. "What
- they're doing with the Mac is different in that they're going through the whole
- (electronic mail) network. It's much more complex."
-
-
- ---
-
- Pentagon computer cracked by teen-age hacker in Israel
- Source: Houston Chronicle News Service
-
- KARMIEL, Israel -- An 18-year-old computer whiz gained access to a Pentagon
- computer and saw US military secrets in his home during the gulf war, police
- said friday.
- The hacker, identified as Deri Schriebman, was placed under house arrest
- Thursday after police searched his home in the northern Israeli city of
- Carmiel.
- Police have not heard from US authorities on the security aspects of the
- case, said Galilee Region Police Commander Rami Rav.
- "The way he cracked the Pentagon computer should certainly interest them. He
- was able to look at classified material during the gulf war, especially at one
- very sensitive project which is also connected to Israel," Rav told Reuters.
- Schriebman, already a graduate of Israel's Technion University, also built
- equipment to place international telephone calls free of charge, bypassing the
- computers of Israel's telephone company.
- Police said he also obtained the names of holders of Visa cards, passing the
- information to other computer "hackers" in North America, who were arrested
- after yearlong buying sprees.
- Police are investigating the case and have not yet said whether they will
- press charges. But Rav said the youth did not benefit from the Visa fraud.
- "Everything he did was out of curiousity...he made no profit from it, neither
- from the Visa cards nor from the sensitive security information."
-
- ---
-
- Subject: CIA dumps on the National Security Archive
-
- The National Security Archive (NSA), a non-profit clearinghouse for Freedom of
- Information Act (FOIA) materials, requested from the Central Intelligence
- Agency (CIA) a list of materials that the CIA had released under the FOIA. The
- CIA responded to the request by producing "a random dump", 5000-pages long
- summarizing the released material. The NSA and the CIA are frequently at odds
- with each other, hence the "hostile" reply by the CIA. Under the FOIA,
- agencies are not required to create (i.e. organize, sort, or merge) data,
- merely to provide information that already exists. So, it is unlikely that the
- NSA would have any recourse other than to attempt to reconstruct the index from
- the info-garbage it was given. [Common Cause 17(4): 20 (1991)]
-
- ---
-
- Subject: CAA grant Cat IIIB autoland clearance for 747/76
-
- In the September 19th Rolling Stone at page 67 an article titled "Samurai
- Hackers" by Lynda Edwards tells us that a: "new breed of hacker has been
- finding a niche in the corporate world in the last two years. These hackers
- are hired by white-collar professionals at ad agencies, law firms, newspapers,
- and investment houses who want to steal co-workers' ideas and clients or
- pillage supervisors computer files for marketing strategies, performance
- evaluations and managerial gossip."
-
- Ms. Edwards presents several tales of crackers hired by unethical people in
- business to snoop in or sabotage other peoples' computer files. She also
- describes how victims sometimes hire their own crackers to mount a
- counter-attack. The crackers use their knowledge and skills to ferret out
- information from companies' networks and minicomputers. They usually receive a
- leg up from their employers, who get them modem 'phone numbers and basic
- account/password info. The crackers then overcome or bypass the often trivial
- security on the target systems. Most of what they do could be done by any
- jackleg expert with a given system, but the crackers are the agents of computer
- Ms. Edwards presents several tales of crackers hired by unethical people in
- business to snoop in or sabotage other peoples' computer files. She also
- describes how victims sometimes hire their own crackers to mount a
- counter-attack. The crackers use their knowledge and skills to ferret out
- information from companies' networks and minicomputers. They usually receive a
- leg up from their employers, who get them modem 'phone numbers and basic
- account/password info. The crackers then overcome or bypass the often trivial
- security on the target systems. Most of what they do could be done by any
- jackleg expert with a given system, but the crackers are the agents of computer
- illiterates and thus constitute a threat unconsidered by the managers of
- systems in non-computer businesses.
-
- These crackers are seen to be somewhat akin to the wandering samurai of Japan's
- past. They work as mercenaries, honing their own skills and testing them in
- combat on behalf of employers they often hold in contempt. (The crackers are
- said to refer to ignorant computer users as "Stupids.") The samurai image is
- distorted and romanticized but the jobs the crackers take on are very real.
-
- These crackers are well paid by those who hire them through bulletin boards or
- by word-of-mouth. Tales of their exploits circulate on BBS's and they are
- getting some notice in 2600 magazine.
-
- ---
-
- Subject: Computer Security Breach at Rocky Flats Nuclear Weapons Plant
- Date: September 16, 1991
-
- AP writer Steven K. Paulson reports on 9/16/91 that security lapses at the
- Rocky Flats nuclear weapons plant included the storage of top-secret bomb
- designs for a week on a VAX accessible from the public phone network. In other
- instances, workers transferred classified working materials from secure
- computers to lower security ones, including PCs, because they were tired of
- constant changes in the secure systems and wanted to work on familiar [stable?]
- systems.
-
- Head of DOE operations at Rocky Flats Bob Nelson said that the agency started
- last year a $37M program to correct security problems, following the
- recommendations of outside security experts.
-
- Nelson also said that the unclassified VAX was used by employees working from
- home, but that if someone tries to break in ``bells and whistles go off'' [is
- he so sure???]
-
- According to other documents obtained by the AP, other DOE computers had been
- found to be vulnerable to break-ins.
-
- ---
-
-
- Subject: Denver Hacker Hacks NASA
- Source: The Denver Post, Denver & The West section p. 1
- Date: 9/25/91
-
- NASA vs. hobbyist: Computer whiz accused of illegal access, mischief
- By. Peter G. Chronis Denver Post staff writer
-
- An Aurora computer hobbyist who allegedly used a personal computer and his home
- phone to penetrate NASA computers hacked off Uncle Sam enough to be indicted on
- seven federal counts yesterday.
-
- Richard G. Wittman, 24, the alleged "hacker," was accused of two felonies,
- including gaining unauthorized access to NASA computers to alter, damage, or
- destroy information, and five misdemeanor counts of interfering with the
- government's operation of the computers.
-
- Wittman allegedly got into the NASA system on March 7, June 11, June 19, June
- 28, July 25, July 30, and Aug. 2, 1990.
-
- Bob Pence, FBI chief in Denver, said Wittman used a personal computer in his
- home and gained access to the NASA systems over telephone lines.
-
- The investigation, which took more than a year, concluded that Wittman accessed
- the NASA computer system and agency computers at the Marshall Space flight
- Center in Huntsville, Ala., and the Goddard Space Flight Center in Greenbelt,
- Md.
-
- The NASA computers are linked to a system called Telenet, which allows
- qualified people to access government data bases. A user name and password are
- required to reach the NASA computers.
-
- Federal sources declined to reveal more information because the complex case
- involves "sensitive material."
-
- Wittman, a high-school graduate, apparently hadn't worked in the computer
- industry and held a series of odd jobs.
-
- The felony counts against him each carry a possible five-year prison term and
- $250,000 fine.
-
- ---
-
- Source: NewsBytes
-
- According to a news release from {NewsByte}, direct international
- dialing is now available from Moscow from 0000-0900 each day.
-
- Local analysts say the reason for the start of direct-dial service is
- that a second international phone exchange, originally scheduled to
- start six months ago, has finally been launched.
-
- To dial international numbers from Moscow, one must dial 8, then wait
- for a second dial tone, dial 10 + country code + city code + phone
- number.
-
- ---
-
- Subject: Company Dares Computer Intruders to Hack Away
- Source: The Detroit News, Sunday, Aug. 4, p. 3A
-
-
- It's a little like inviting robbers to knock over your bank.
-
- To prove its computer programs are secure from electronic intruders,
- Unix System Laboratories wants hackers to try to break in.
-
- The company set up an unattended test computer at its headquarters in
- Summit, N.J., and bets that unauthorized users can't get into its mock
- payroll accounts, can't cut phony checks and can't breach private
- files.
-
- Initially, the challenge was issued to corporate security experts--and
- none has been able to sneak in during the past few months, said
- spokesman D. Scott Belin. Now, in a bold publicity stunt, the company
- will offer a toll-free phone number to let any whiz kid or mischief
- maker log onto a computer and hack away.
-
- "There's probably 10,000 computer hackers out there," Belin said.
- "We're trying to figure out a way tohandle all the phone calls once we
- make the number available."
-
- He said the company, which makes a computer operating system widely
- used by phone companies, has yet to decide how to publicize the
- toll-free access number.
-
- Marilyn Partel, an operating systems manager at the company, said the
- software has been redesigned so that no one--even if authorized--has
- unlimited access to the system.
-
- ---
-
- Subject: Looking for Sundevil Victims
-
- Contact: Craig Neidorf and David Sobel
- (Computer Professionals for Social Responsibility)
-
- Computer Professionals for Social Responsibility (CPSR) is pursuing a
- lawsuit against the Secret Service seeking the release of information
- concerning Operation Sun Devil. In recently filed court papers, the
- agency claims that the information cannot be disclosed because, among
- other reasons, disclosure would violate the privacy of those
- individuals who are the targets of the investigation. This argument
- can be overcome if CPSR obtains signed releases from those
- individuals. CPSR is requesting the cooperation of anyone who was the
- subject of a Sun Devil raid on or about May 7, 1990. We are prepared
- to enter into an attorney-client relationship with individuals
- responding to this request, so that confidentiality will be assured.
-
- Please respond ASAP to:
-
- David Sobel
- CPSR Legal Counsel
- (202) 544-9240
- dsobel@washofc.cpsr.org
-
- ---
-
- Source: NewsBytes
- Date: October 1, 1991
-
-
- JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk
- co-author Katie Hafner, in an interview with Newsbytes, has responded
- to allegations of fabrication raised by Kevin Mitnick, one of the main
- subjects of the book.
-
- Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner
- and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first
- section of the book called "Kevin: The Dark Side Hacker" to the
- activities of Mitnick and his associates, Lenny DiCicco, "Susan
- Thunder" and "Roscoe" (the last two names are pseudonyms; the persons
- would be interviewed only under the protection of anonymity). Mitnick,
- who served a prison term related to his intrusions into Digital
- Equipment Corporation's systems, says in a letter to the Summer 1991
- issue of 2600: The Hacker Quarterly that the section concerning him
- "is 20% fabricated and libelous."
-
- Mitnick, in the letter, suggests that the authors had motivation for
- the alleged unfairness. He said "It seems that the authors acted with
- malice to cause me harm after my refusal to cooperate. Interestingly,
- I did offer to participate as a factual information source if I was
- compensated for my time, but the authors refused, claiming it would
- taint my objectivity. So, consequently, I declined to cooperate."
-
- Hafner confirmed that Mitnick had refused cooperation after his offer
- to meet for pay was rejected but denied that his action caused any
- malicious or unfair behavior. She said "I feel that the payment of
- interview subjects is completely unethical and I have never been
- involved in such a thing and did not intend to start then. We
- mentioned in the book that Kevin had refused to cooperate but did not
- reveal that he had asked for payment. Since he has not brought the
- subject up, both in a call to the Tom Snyder radio show when I was on
- and in the 2600 letter, I will confirm the fact that his
- non-cooperation was due to our refusal to pay."
-
- Hafner continued "Mitnick's lack of cooperation certainly did not lead
- to any malice or bias directed toward him. Everything in the book is,
- to the best of my knowledge, factual and we did everything possible to
- insure its accuracy. We attempted to get a confirming source for
- everything we were told and interviewed dozens of persons for the Dark
- Hacker section alone."
-
- 'Kevin's lack of cooperation did make the job more difficult and, may
- have possibly hurt him. If he had been willing to talk, he would have
- had an opportunity to respond to other people's statements about him
- but, even though we sent him numerous "return receipt" and overnight
- letters asking him to meet with us, he refused. Two cases in point: in
- the 2600 letter, he says that we described him as always eating in a
- computer room while talking on the telephone to Bonnie, his future
- wife. He denies this and says that I was trying to 'paint an unsavory
- picture'. It was Bonnie who told us that he was always eating while he
- was talking -- we didn't make it up -- and without the ability to
- speak to him, we had to choose to go on."
-
- Hafner went on: "The second example is his statement that we said that
- he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark
- Brown'. Brown says that he has definitely spoken to Mitnick and that he
- remembers the calls well and can call to mind details from them. If we
- had spoken to Mitnick, he would have had a chance to dispute such
- statements.
-
- In response to Mitnick's object to the authors' changing of items that
- would possibly identify DiCicco as an unemployment cheat, Hafner said
- "That was my call. We tried to protect identities wherever it was
- desired. Lenny asked us to change the name and we did just as we
- also used public aliases for 'Roscoe' and 'Susan Thunder' at their
- request. Contrary to Kevin's statement, Lenny has not been travelling
- around with us promoting the book and has received no benefit from it
- other than the ability to tell his story as he understands it."
-
- ---
-
- Subject: Phone Gall
- Source: InformationWeek, pp.12-13
- (By Mary E. Thyfault with Diane Medina and Bob Violino)
- Date: August 26, 1991
-
- AT&T has sued nearly 20 of its large business users for refusing to pay
- for calls made by hackers through their corporate telephone In recent
- months, the question of whether businesses victimized by phone hackers
- should be forced to pay for such calls has stirred acrimonious debate
- and prompted numerous actions before the Federal Communications
- Commission. Estimates of the corporate monies lost annually to phone
- hackers begin at $500 million and go into the billions.
-
- Now an InformationWeek investigation reveals a broad effort by AT&T to
- shift this debate to the courts. Among the corporations AT&T has quietly
- sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp.,
- Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest
- such lawsuit uncovered by IW, the United Nations was the victim of
- nearly $1 million in unauthorized calls.
-
- While the existence of these lawsuits remains unknown to most large
- users, AT&T has been playing legal hardball with corporate customers for
- at least a year, in most cases collecting fees in confidential,
- out-of-court settlements. It appears no case has yet reached the trial
- stage.
-
- The fact that users back down is no surprise; AT&T is a $36.11 billion
- behemoth with a crack legal staff. The mere threat of a lawsuit is
- enough to force most firms to pull out their checkbooks.
-
- "Who can afford to go to court with the phone company?" asks Roger
- Longtin, counsel for electronics component distributor Avnet Inc. in
- Great Neck, N.Y. , which is currently negotiating with AT&T over nearly
- $1 million in disputed charges.
-
- AT&T's long-distance rivals MCI Communications Corp. and US Sprint
- Communications Co. say they have not sued any users over this issue, and
- IW could find no evidence of any legal actions. Such a suit, explains a
- spokesman for MCI, "is a good way to lose a customer".
-
- One analyst argues, however, that MCI and Sprint can't afford to be nice
- guys much longer. "I'd be surprised if MCI and Sprint didn't file suits
- - uncollectibles have been a horrendous problem in the long-distance
- business," says John Bain, senior VP at Raymond James & Associates Inc.
- in St. Petersburg, Fla. One lawyer who has represented corporate victims
- of toll fraud says the out-of-court settlements always involve some
- payments by customers. AT&T typically starts negotiations by knocking
- 15% off the user's bill, he says; that's about the break-even point for
- AT&T's profit on long-distance calls, according to analysts. AT&T does
- not discuss litigation, a spokesman says.
-
- Some customers are enraged at AT&T and the telecom industry over this
- issue. They argue that the carriers and PBX vendors are not providing
- enough warning, training, or support. "The carriers should do away with
- the attitude of 'The customer should've known,'" charges Tim Honaker CFO
- for Dearborn Financial Publishing lnc. in Chicago, which has been hacked
- for $65,000. The telcom suppliers "come in with these great technologies
- and then say, 'By the way, you gotta figure out how to manage this thing
- on your own.' Well, we're not in that business." Suppliers should at
- least share in the responsibility and liability for phone fraud charges,
- according to victims.
-
- Vendors respond that telecom managers can virtually end fraud by
- properly managing their phone systems, particularly remote access
- features. Some users agree. Says Jay Silverberg, president of the
- National Rolm Users Group, "Although from a technical perspective the
- vendor has the responsibility to provide the ability to make a system
- secure, it's the user's responsibility to manage it."
-
- The software to monitor such systems isn't cheap, however-about $120,000
- on average-and "it can only cut down the hemorrhaging, not eliminate
- hacking," says James Ross of Ross Engineering Inc., a software
- engineering firm in Sterling, Va. Most victims argue that carriers have
- the technology to detect hacking at their fingertips.
-
- While the victims' attorneys say AT&T hasn't improved its security
- measures, all the carriers and the major PBX vendors-Northern Telecom,
- Rolm Co., and the business telephone unit of AT&T-say they are putting
- increasing emphasis on helping users fight phone hacking. AT&T offers
- seminars at every user group meeting, for example, and Rolm announced in
- April it would begin assigning a security coordinator in each of its 31
- branch locations.
-
- Currently, AT&T has seven fulltime staffers charged with educating
- customers and investigating fraud cases. Users claim that number is
- woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation
- in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T
- has 40,000 PBX installations and 4 million business long-distance
- customers. "If they really want to protect the public, they need to hire
- more like 700 people," says Charles Helein, a Washington attorney who
- has represented several toll fraud victims. AT&T says it will add three
- more staffers next month. Some users even claim AT&T is not devoting
- more resources to ending toll fraud because it is making too much money
- on such calls-a charge AT&T vehemently denies.
-
- "If you significantly cut phone fraud, you have to wonder what kind of
- impact it would have on their revenue," says Thomas Crowe, attorney for
- Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in
- unauthorized calls.
-
- "That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous
- resources to this." The company argues that it is doing more than
- required. On a weekly basis, AT&T monitors the three area codes in South
- America and Central America that receive the most illegal calls. When a
- sudden increase in volume is noted, AT&T tries to notify customers,
- reaching about 25%, of them before they themselves notice the break-in.
-
- "I can't tell you that every week we get to everyone, but we attempt to
- based on our resources," says Robert Carman, head of AT&T's corporate
- security division. Still, the FCC says all complaints filed to date by
- users over this issue have involved AT&T.
-
- Frank Chrz, VP of office services at ITT Consumer Financial Corp. in
- Minneapolis, says AT&T "was very responsive" in helping him detect and
- stop the hackers that penetrated his company's Rolm PBX, racking up
- $100,000 in charges. But that cooperation ended when the bill came due
- and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and
- Rolm's PBX distributor. All four settled out of court. At least two
- other users have sued their PBX vendors after being sued by AT&T: New
- York City Human Resources Administration sued Northern Telecom Inc., and
- Western Diversified Life Insurance Co. in Deerfield, Ill., countersued
- AT&T as both its PBX supplier and long-distance carrier.
-
- In another twist, two corporations sued AT&T before AT&T could sue them:
- Mitsubishi International Corp. in New York (IW, June 24,p.14) and John
- D. Hollingsworth On Wheels Inc. in Greenville, S.C.
-
- Despite all the complex legal maneuvering, every case eventually comes
- down to finger-pointing. No one wants to accept responsibility for toll
- fraud. Until now, the FCC has typically ruled against users, but
- mounting corporate anger may mean the commission will impose some sort
- of liability ceiling. What is clear is that users and vendors will have
- to work together to solve the problem.
-
- "In no way are we inferring we can catch everything," says Bob Fox,
- Sprint's assistant VP of corporate security. "The majority of the time
- we're getting to the customer before he knows what's going on. But we're
- not going to catch everything every time. It takes teamwork.
-
- "The customer is going to get hurt if we do our thing but he doesn't do
- his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino
-
- ---
-
- Subject: Now It Can Be Told "Mad Hackers' Key Party" [excerpt]
- Source: Unknown User
- Date: September 30, 1991
-
- Hosted by Geraldo Rivera
-
- Geraldo: I'm Geraldo rivera. And now, It can be told.
-
- <First part of the program includes comments and interviews with
- Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn
- Schwartau, and other bit players. Focus of discussion is on hacking as
- "terrorism" and generous film and news clips of terrorism and war
- scenes interwoven amongst discussion of dangers of hackers to national
- security. We pick up the dialogue when Don Ingraham (Alameda County
- (Calif.) prosecutor and Craig Neidorf (former editor of PHRACK) join in>
-
- Geraldo: Joining us now via satellite from Oakland, CA is the
- Assistant District Attorney Don Ingraham ... for Alameda County and he
- has been prosecuting computer hackers for years.
-
- <Don is in the TV box, between Geraldo and Craig [KL]>
-
- Geraldo: Don, how do you respond to the feeling common among so many
- hackers that what they're doing is a public service; they're exposing
- the flaws in our security systems?
-
- Don: Right, and just like the people who rape a coed on campus are
- exposing the flaws in our nation's higher education security. It's
- absolute nonsense. They are doing nothing more than showing off to
- each other, and satisfying their own appetite to know something that
- is not theirs to know.
-
- Geraldo: Don, you stand by, Craig as well. And when we come back
- we'll hear more from prosecutor Ingraham and from, I guess his
- archrival here, the Mad Hacker Craig Neidorf.
-
- <Commercial>
-
- Geraldo: We're back with Craig Neidorf, a former University of
- Missouri student who ran a widely distributed electronic newsletter
- for computer hackers. He is so proud of being America's
- Most Wanted computer hacker that he has put together this very
- impressive scrapbook.
-
- <Geraldo holds up a colorful scrapbook..On the left page shows a
- lightning bolt hitting what looks to be a crown [Knight Lightning]
- ...And on the right it looks like a graphic saying "Knight Lightning"
- and below that is a black circle with a white lightning bolt, and
- next to that is a triangle that looks very similar to the triangle
- with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which
- said in it, the book that was seized by the Secret Service! see page
- 4...- but the one on KL is illegible]>
-
- Geraldo: Knight Lightning I guess that was your code?
-
- KL: It was my editor handle.
-
- Geraldo: That's your handle. OK. And from Oakland, CA we are
- talking with the Assistant District Attorney Don Ingraham, who is hard
- driven, you might say, to put people like Craig behind bars. Don, do
- you think Craig's lucky that he's not behind bars right now?
-
- Don: Yes, I think he's extraordinarily lucky. He was part of a
- conspiracy, in my opinion, to take property that wasn't his and share
- it with others. They charged him with interstate transport of stolen
- property - couldn't make the threshold -and it came out that it had
- been compromised by, unfortunately, released by another Bellcore
- subsidiary. But was certainly not through any doing of HIS that he is
- a free man.
-
- Geraldo: So you think that his activities stink, then.
-
- Don: Absolutely. No Question about it.
-
- Geraldo: Craig, you wanna respond? Are you doing something for the
- greater good of society?
-
- KL: Well I was merely publishing a newsletter. I didn't go out and
- find this document. Rather it was sent to me. In many ways it could
- be compared to Daniel Ellsberg sending the Pentagon Papers to the New
- York Times.
-
- Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
-
- Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
- release of the Pentagon Papers is the subject of a published court
- decision to point out it was a matter of national security and
- national interest. The E911 codes, which is the citizen's link to the
- police department are not a matter of national security. They're a
- matter of the central service to the community.......
-
- Geraldo: You broke into the 911 system? He broke into the 911
- system!
-
- KL: No, that's not correct. I never entered any 911 telephone
- system.
-
- Don: I didn't say he entered into it. What I said was that he and
- Riggs conspired together to take a code that they knew was necessary
- to 911 and to take it apart to see how it worked. They never had the
- owner's permission, they never asked for it.
-
- Geraldo: Alright, lemme ask you this....
-
- KL: The court found that there was no conspiracy here.
-
- Geraldo: You were acquitted. You were vindicated at least from
- criminal responsibility. Lemme just quickly ask you this: hackers
- have been inside the White House computer.
-
- KL: Yes they have.
-
- Geraldo: And they've been inside the Pentagon computer.
-
- KL: Yes.
-
- Geraldo: And if Saddam Hussein hired some hackers whether they're
- from Holland or any other place, he could've gotten into these
- computers, presumably.
-
- KL: Presumably, he could've.
-
- Geraldo: And gotten some valuable information.
-
- KL: It's definitely possible.
-
- Geraldo: And you still think hackers are performing a public service?
-
- KL: That's not what I said. I think that those kind of activities
- are wrong. But by the same token, the teenagers, or some of the
- people here that are not performing malicious acts, while they should
- be punished should not be published as extreme as the law currently
- provides.
-
- Geraldo: You're response to that Don?
-
- Don: I don't think they're being punished very much at all. We're
- having trouble even taking away their gear. I don't know one of them
- has done hard time in a prison. The book, Hafner's book on
- _Cyberpunk_, points out that even Mitnick who is a real electronic
- Hannibal Lecter ... did not get near any of the punishment that what
- he was doing entitled him to.
-
- Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,
- we'll be back with more of this debate in a moment...
-
- <commercials>
-
- Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,
- do you think hackers are voyeurs or are they potentially terrorists?
-
- KL: I think they resemble voyeurs more than terrorists. They are
- often times looking at places where they don't belong, but most
- hackers do not intend to cause any damage.
-
- Geraldo: Do you buy that Don?
-
- Don: If they stopped at voyeurism they would be basically
- sociopathic, but not doing near the harm they do now. But they don't
- stop at looking, that's the point. They take things out and share
- them with others, and they are not being accountable and being
- responsible as to whom they are sharing this information. That is the
- risk.
-
- Geraldo: Can they find out my credit rating? I know that's not a
- national security issue, but I'm concerned about it.
-
- Don: Piece of cake.
-
- Geraldo: No problem.
-
- Don: Assuming....
-
- Geraldo: Go ahead. Assuming I have a credit rating...hahahah....
-
- Don: Assume that the credit is not carried by someone who is using
- adequate security.
-
- Geraldo: But you think Craig it's not problem.
-
- KL: I think it's no problem.
-
- Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had
- you working for him.
-
- KL: I'm sorry?
-
- Geraldo: Abu Nidal, notorious .....
-
- KL: As far as your credit rating?
-
- Geraldo: No, not as far as my credit rating.. The world, national
- security.
-
- KL: Well, hackers have gotten into computer systems owned by the
- government before. At this point they've never acknowledged that it
- was anything that was ever classified. But even some unclassified
- information could be used to the detriment of our country.
-
- Geraldo: Like the counter-terrorist strategy on January 15th, the day
- of the deadline expired in the Persian Gulf.
-
- KL: Perhaps if Saddam Hussein had somehow known for sure that we were
- going to launch an attack, it might have benefited him in some way,
- but I'm really not sure.
-
- Geraldo: Don, worst case scenario, 30 seconds?
-
- Don: They wipe out our communications system. Rather easily done.
- Nobody talks to anyone else, nothing moves, patients don't get their
- medicine. We're on our knees.
-
- Geraldo: What do you think of Craig, quickly, and people like him?
-
- Don: What do I think of Craig? I have a lot of respect for Craig, I
- think he's probably going to be an outstanding lawyer someday. But he
- is contributing to a disease, and a lack of understanding ethically,
- that is causing a lot of trouble.
-
- Geraldo: One word answer. As the computer proliferate won't hackers
- also proliferate? Won't there be more and more people like you to
- deal with?
-
- Knight Lightning: I think we're seeing a new breed of hacker. And
- some of them will be malicious.
-
- Geraldo: Some of them will be malicious. Yes, well, that's it...for
- now. I'm Geraldo Rivera.
-
- [End of Program]
-
- ---
-
- Subject: 2600 Magazine Exposes Security Holes
- Source: NewsBytes
- Date: October 18, 1991
-
- 2600 Magazine Exposes Security Holes 10/18/91
- ARMONK, NEW YORK, U.S.A., 1991 OCT 18 (NB) -- Supported by videotape
- examples, Emmanuel Goldstein, editor and publisher of 2600 Magazine:
- The Hacker Quarterly, told those in attendance at an October 17th New
- York City press conference that "the American public is often lulled
- into a false sense of security; a security that is often not supported
- by the facts of specific cases."
-
- The videotapes, produced by 2600 and provided to the press show both
- the intrusion of a Dutch "hacker" in to United States Military
- computers and what Goldstein alleges is the fallability of a brand of
- mechanical, pushbutton locks used by, among others, New York State
- University sites, Federal Express, United Parcel Service, JFK
- International Airport, IBM and NASA.
-
- Goldstein told Newsbytes "We invested considerable time and money to
- wake people up to the fact that we have a false sense of security when
- it comes not only to computer networks but to physical safety as
- well."
-
- The tape of the Dutch "hacker" was made by Goldstein while in Europe.
- and shows the intrusion into a Unites States Army computer system. The
- intruder was able to set up a fictitious account called "danquayle"
- and, once into the system, was able to obtain "root" privileges thus
- giving him total control of the workings of the system.
-
- A portion of this tape had previously been shown with Goldstein's
- approval on an episode of the Gerald Rivera television show "Now It
- Can Be Told". Goldstein told Newsbytes that one reason for his release
- of the entire tape to the press was his feeling that the Rivera
- episode entitled "The Mad Hacker's Key Party" had distorted the
- message of the tape - "This was not a case of a terrorist break-in but
- was rather simply a demonstration of the lack of security of our
- systems. To find root accounts with password like "Kuwait" and lack of
- sophisticated security in our military computers should be of real
- concern and should not be lost in an explotation of the 'hacker'
- issue."
-
- A background paper provided at the conference by 2600 explains the
- entire intrusion effort in detail and states "The purpose of this
- demonstration is to show just how easy it really was. Great care was
- taken to ensure that no damage or alteration of data occurred on this
- particular system. No military secrets were taken and no files were
- saved to a disk by the hackers. What is frightening is that nobody
- knows who else has access to this information or what their
- motivations might be. This is a warning that cannot be taken lightly."
-
- The second videotape show Goldstein and other 2600 staff opening
- seemingly at will locks manufactured by Simplex Security Systems. The
- locks of the mechanical pushbutton combination variety were shown to
- be installed at the State of New York University at Stony Brook, JFK
- International Airport and on Federal Express and United Parcel pick-up
- boxes throughout the New York Metropolitan area.
-
- In the film, Goldstein is shown filling out a Federal Express envelope
- for delivery to 2600 Magazine and inserting in the Fedex dropbox. He
- then lifts the weather protection cover on the box's lock and keys a
- combination that allows him to open the lock and remove his envelope.
- Scott Skinner, a SUNY student and 2600 staff member told Newsbytes
- that it had actually taken the staff 10 minutes to determine the
- proper code combinations to open the lock.
-
- Skinner explained, "While Simplex prefers people to think that there
- is an endless number of permutations to the lock, there are actually
- only 1,085. In most cases, even this number is greatly reduced -- if
- one knows that only three buttons are being used, it reduces the
- possibilities to 135. Additionally, we found that, once we had the
- combination to one Federal Express dropbox, it worked in every other
- one that we tried in the New York area."
-
- Goldstein told Newsbytes "When we contacted Simplex, they first denied
- that the locks were unsafe and then said that the permutations were
- much greater. After some discussion, they admitted that the 1,085
- figure was correct but said that it would take a person with a
- complete listing of the combinations over four hours to try them all.
- Our experience obviously shows that they may be opened in a much
- shorter time than that."
-
- Goldstein also pointed out that, "although a $5 Master combination
- lock may be broken by a crowbar, it is a much more secure combination
- device. It has 64,000 combinations compared to the 1,085 with the
- Simplex."
-
- Goldstein continued, "One of the real problems is that, should a
- person have the misfortune to be robbed, entry due to a failure of the
- Simplex lock gives no evidence of a forcible break-in and police and
- insurance companies often put the blame on the homeowner or office
- manager for 'giving away the combination.' It really can create a
- problem."
-
- Skinner told Newsbytes "I'm really concerned about this. I'm a student
- at SUNY, Stony Brook and all our dormitories use these locks as the
- only means of security. I've shown the problem to Scott Law who is
- responsible for residence security but he has discounted the problem
- and said that the locks were installed at the recommendation of the
- campus locksmith. The locksmith, Garry Lenox contradicts Law and says
- that he recommended against these locks years ago and said that they
- were not secure for dormitory use." Skinner said that he will write an
- article for the college newspaper in an attempt to raise consciousness
- about this problem.
-
- Goldstein also said that he intends to publish the list of valid
- combinations in an up-coming issue of 2600 to demonstrate to the
- public the problems with the lock. He further said that he will raise
- the issue on his weekly radio show, "Off The Hook", heard on New
- York's WBAI-FM.
-
- In response to a Newsbytes question concerning how the 2600 staff
- happened to become involved in a problem with locks, Goldstein said,
- "We're hackers and when we see something with buttons on it, whether
- it's a computer or not, we tend to try it. While the average person
- tends to accept that things are secure just because he is told that
- they are, hackers will usually try them out. It's because of this
- 'trying out' that we can point out the problems with both the US
- military computer security and this lock -- and we feel that, in both
- cases, we have performed a service. People should be aware when they
- are at risk so that they may take action to correct it."
-
- ---
-
- Subject: CRIME IN CYBERSPACE session
- Source: Jim Thomas (CuD)
- Date: November 20, 1991
-
- The CuD moderators, Mike Godwin of the Electronic Frontier Foundation,
- and several other prominent scholars will participate in a panel on
- "CRIME IN CYBERSPACE" at the American Criminological Society annual
- meetings in San Francisco on Friday, November 22. Their session will
- be in the Yorkshire Room of the St. Francis hotel from 1:15 to 2:45.
-
- The complete session:
-
- Chair: Gordon Meyer: Co-editor Computer underground Digest
-
- Mike Godwin (Staff Attorney, Electronic Frontier Foundation):
- "Criminal law and the computer youth culture"
-
- Richard C. Hollinger (University of Florida):
- "Hackers, Crackers, and Pirates: Rethinking Social Control"
-
- Lee Tien (University of California, Berkeley):
- "Folk Notions of Property & Privacy in the Information Society"
-
- Jim Thomas (Northern Illinois University):
- "From Disk to Discourse: The Images of Techno-Evil"
-
- Gary T. Marx (Department of Urban Studies and Planning): Discussant
-
- Albrecht Funk (University of Hamburg): Discussant
-
- ---
-
- Subject: Cracker charged in Australia
- Date: August 13, 1991
-
- The AP (8/13/91) reports from Melbourne that Nahshon Even-Chaim, a 20-year old
- computer science student, is being charged in Melbourne's Magistrates' Court on
- charges of gaining unauthorized access to one of CSIRO's (Australia's
- government research institute) computers, and 47 counts of misusing Australia's
- Telecom phone system for unauthorized access to computers at various US
- institutions, including universities, NASA, Lawrence Livermore Labs, and
- Execucom Systems Corp. of Austin, Texas, where it is alleged he destroyed
- important files, including the only inventory of the company's assets. The
- prosecution says that the police recorded phone conversations in which
- Even-Chaim described some of his activities. No plea has been entered yet in
- the ongoing pre-trial proceedings.
-
- ---
-
- PHONE COMPANIES COULD TRANSMIT TV UNDER FCC PLAN
- -- Blow to Cable Industry
- -- Viewers Expected to Benefit From Many More Choices - New Lines Needed"
- Source: Edmund L. Andrews in {The New York Times}
- Date: October 25, 1991 at A1.
-
- In a surprising and controversial move to promote cable television
- competition, the Federal Communications Commission proposed today that
- local telephone companies be allowed to package and transmit
- television programming.
-
- The proposed rules, which were unanimously endorsed and are likely
- to be adopted within a year, would expose cable companies to the most
- threatening competition yet. But they could benefit cable television
- consumers, many of whom have seen their bills double and triple in
- recent years.
-
- The cable industry vowed to fight the proposals and threatened to
- challenge the rules in court if they are adopted. Telephone
- companies, eager to enter a lucrative new business, applauded.
-
- MORE CHOICES' FOR VIEWERS
-
- "Today's action will create competition and offer consumers more
- choices," said James R. Young, vice-president of regulatory and
- industry relations at the Bell Atlantic Corporation. "Let's hope it's
- a beginning to the end of turf wars."
-
- In essence, the commission recommended that telephone companies be
- allowed to offer "video dial tone" over telephone lines that would
- carry programming produced by outside companies. Consumers could view
- whatever programs they pleased and would be charged accordingly.
-
- Initially, telephone companies would serve promarily as a
- pipeline, not producing the programs. But the commission said
- telephone companies should also be allowed to organize and package
- video services, as long as they make their networks available to all
- programmers. The commission also opened an inquiry on whether to let
- telephone companies produce programs.
-
- CONGRESS HAS AVOIDED ISSUE
-
- The idea of allowing so-called video dial tone service has long
- been a favorite of the F.C.C.'s chairman, Alfred C. Sikes. Congress,
- which is weighing regulatory legislation to rein in cable proces has
- shied away from the issue. Today's action makes it more likely that
- lawmakers will have to reconsider the role of telephone companies in
- television.
-
- Before cable companies would feel much impact from today's F.C.C.
- proposal, however, most telephone companies would have to spend
- billions of dollars to install new fiber-optic transmission lines and
- switching equipment that could carry large volumes of television
- material. Analysts have estimated that the cost of converting every
- home in the country to a fiber-optic line would be $100 billion to
- $200 billion and that it would take at least five years.
-
- Most large telephone companies, including all of the regional Bell
- companies, already plan to replace their copper wires with fiber over
- the next two decades. The immense business opportunity posed by the
- $18 billion cable television market is likely to accelerate those
- plans.
-
- High-capacity communications lines that reach every home in
- America could radically alter the distribution of entertainment and
- enable people on home computers to tap distant libraries and obtain
- information in seconds.
-
- "Both program providers and consumers would have chances they
- don't have today, without the bottlenecks provided by cable companies
- and without the bottlenecks of broadcasting," said Richard Firestone,
- chief of the F.C.C.'s common carrier bureau.
-
- The move was immediately attacked by the National Cable Television
- Association, which threatened to challenge any new rules in court.
-
- "Until and unless the telco's monopoly in voice telephone is
- ended, no level of Government safeguards against cross-subsidies will
- be effective," said James P. Mahoney, president of the cable
- association.
-
- QUESTION OF TV PRODUCTION
-
- The most controversial issue, which the F.C.C. raised for
- discussion without recommendation, is whether telephone companies
- should be allowed to produce programming, a much bigger business than
- transmission. Many Bush Administration officials favor such a move,
- but television boradcasters and producers bitterly oppose it.
- Officials noted that such a shift would require changes in the Cable
- Television Act of 1984.
-
- "Among the top two or three concerns of ever cable operator has
- always been head-to-head competition against local telephone
- companies," said John Mansell, a senior analyst at Paul Kagan
- Associates, a marketing-research firm that monitors the cable
- industry.
-
- For telephone companies, the move could be a windfall. Steven R.
- Sieck, vice president of Link Resources Inc., a market-research firm
- in New York, said, "It's by far the largest market opportunity among
- the whole collection of information services" for telephone companies.
-
- It remains unclear, however, whether the new rules will survive in
- court. Teh Cable Television Act of 1984 bars a telephone company from
- owning a cable television franchise in the same market. The F.C.C.
- ruled today, however, that the law does not prevent a local telephone
- company from transmitting programs produced by other companies and
- that it does not bar long-distance carriers in any way.
-
- The Bell companies have lobbied strongly for legislation that
- would allow them to enter the cable business, and several companies
- have invested in European cable franchises. In addition, Pacific
- Telesis Group, which provides local phone service in California,
- already holds an option to buy a controlling interest in a Chicago
- cable franchise, which could be [sic] permissible since it is outside
- the company's telephone area.
-
- RULING ON FRANCHISE FEES
-
- The commission also handed down a ruling that could give telephone
- companies an important price advantage in future competition with
- cable operators and could prompt protests from local governments,
- ruling that neither a telephone company nor a video programmer needs
- to pay franchise fees to local governments.
-
- Under the cable act, by contrast, local governments can charge
- cable operators a franchise fee as high as five per cent of revenues.
-
- Explaining today's ruling, Mr. Sikes said, "We have segregation
- laws, and these segregation laws should be ended." He added that some
- cable companies were already installing optical fibers in their own
- networks, and that some were exploring the option of using their
- netowrks to offer telephone service.
-
- The proposals mark the second major change in longstanding
- restrictions on the telephone companies' ability to move into new
- services. Less than three weeks ago, a Federa appeals court cleared
- the way for the regional Bell companies to begin providing information
- services, like news, stock and sports tables, immediately.
-
- ---
-
- Source: Bell Labs News
- Date: October 28th, 1991
-
- These New Jersey Bell technicians are actually in the process of
- taking a very well-behaved -- and the nation's oldest -- 1ESS(tm) out
- of service. The switch became the world's first commercial electronic
- switching system when it was installed in Succasunna, NJ in 1965. It
- was replaced with a 5ESS(tm) on September 28th.
-
- The cutover was accomplished in three steps. First, the new
- 5ESS was installed and hooked up to the incoming lines -- which were
- also still going to the old switch -- but not powered up. Then, at
- 1:00 AM, when there is relatively little traffic on the old switch,
- the cables coming in to the 1ESS were quickly cut. Once all the lines
- were cut, the new switch was turned on. The whole operation took only
- a few minutes, and agencies involved in emergency services were
- notified in advance of the brief service outage.
-
- The 1ESS design project, which was conducted at Whippany in the
- early 60's, was the largest single development effort undertaken by
- the Bell System up to that point, occupying more than 300 engineers
- and technicians.
-
- AT&T Network Systems and New Jersey Bell are considering
- donating part of the retired switch to the Smithsonian Institution.
-
- ---
-
- Subject: Computer Saboteur Pleads Guilty
- Source: Wire service report in the `Los Angeles Times', 5 Nov. '91, p. D2
- Date: Wed, 6 Nov 1991
-
-
- Computer Saboteur Pleads Guilty: Michael John Lauffenburger, 31, a former
- General Dynamics computer programmer who planted a destructive `logic bomb' in
- one of the San Diego defense contractor's mainframe computers, pleaded guilty
- to one count of attempted computer tampering. He faces up to one year in
- prison and a fine of $100,000.
-
- Federal prosecutors said Lauffenburger had hoped to increase his salary by
- creating a problem only he could solve: a program that was designed to destroy
- a database of Atlas Rocket components. He set the program to activate, then
- resigned, hoping, investigators say, that the company would rehire him as a
- highly paid consultant once it discovered the damage. But another General
- Dynamics programmer inadvertently ran across the program and alerted security,
- which disarmed the program.
-
- Bellcore has just announced a new edition of its Specification of
- Signalling System Number 7 (issue 2). The notice that came my way in
- the mail had a list price of USD$550, document number TR-NWT-000246.
- Covered are such things as Message Transfer Part (MTP), Singalling
- Connection Control Part (SCCP), ISDN User Part (ISUP), Transaction
- Capabilities Application Part (TCAP), Operation, Maintenance and
- Administration Part (OMAP) and Interworking of ISDN Access and Network
- Signaling.
-
- SS7 is a protocol that provides signalling within a telephone network;
- the idea is that signalling is done on a common channel, away from the
- voice circuits, in order to improve security and efficiency of
- connections. Practical examples of the network include the Caller
- Number ID service (SS7 delivers the caller's number to the called
- party) or the almost instantaneous call completion after Toronto-area
- subscribers dial the last digit on most local phone calls.
-
- I do not represent Bellcore; I'm just one who gets mailings from them.
- For more information, contact 1 800 521.CORE (USA) or +1 908 699.5800
- (other), or check the FAQ for more info (mail address, Bellcore's
- activities).
-
- ---
-
- Sent by: Erik Bloodaxe
-
- "LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS!
-
- Now you too can own an official Legion of Doom T-shirt. This
- is the same shirt that sold-out rapidly at the "Cyberview"
- hackers conference in St. Louis. Join the other proud owners
- such as Lotus founder Mitch Kapor and award-winning author Bruce
- Sterling by adding this collector's item to your wardrobe. This
- professionally made, 100 percent cotton shirt is printed on both
- front and back. The front displays "Legion of Doom Internet World
- Tour" as well as a sword and telephone intersecting the planet
- earth, skull-and-crossbones style. The back displays the
- words "Hacking for Jesus" as well as a substantial list of "tour-stops"
- (internet sites) and a quote from Aleister Crowley. This T-shirt is sold
- only as a novelty item, and is in no way attempting to glorify computer
- crime.
-
- Shirts are only $15.00, postage included! Overseas add an
- additional $5.00. Send check or money-order (No CODs, cash or
- credit cards--even if it's really your card) made payable to
- Chris Goggans to:
-
- Chris Goggans
- 5300 N. Braeswood #4
- Suite 181
- Houston, TX 77096
-
- [Editor's Note: I have one, and for any collector this is an item that
- is insurpassable -- JD]
-
- =============================================================================
-
- / /
- / NIA073 / File 07 /
- / Hacking the HP3000 /
- / Malefactor /
- / /
-
- PRELUDE
- ^^^^^^^
-
- The HP3000 operating system MPE is a very intricate and varied system.
- So varied is MPE that two systems running the same version of the OS
- will reveal startling differances. This file will be a general overview of MPE,
-
- not a guide to any particular version. The two primary types of MPE
- systems you will encounter are MPE and MPE XL. The difference between these
- versions of MPE will be specifically indicated within this file, due to
- the frequent occurance of such differances.
-
- Identifying an HP3000
- ^^^^^^^^^^^^^^^^^^^^^
-
- HP3000's can be recognized quite easily. Primarily, two prompts can
- be obtained when first calling an HP3000...
-
- :
-
- or
-
- MPE XL:
-
- Another simple method of identifying an HP3000 is the error message
- i.e.
-
- EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
-
- Although the error message may vary, (CIERR XXXX) is relatively consistent.
-
- Now once into an hp there can be 3 passwords per login, but there usually arn't
- any. Within the hp system, many default accounts exist; if there are
- none, however, the hp printouts contain everything you need to get in. This is
- where trashing definately pays off. Here is a listing of a few defaults/common
- accounts.
-
- ======================
- Hacking into an HP3000
- ======================
-
- The HP3000 has numerous defaults/common accounts that are there I will
- briefly list a few of them:
-
- MGR.TELESUP (Has SM privelege)
- OPERATOR.SYS (Has SM privelege)
- FIELD.SUPPORT (Has SM privelege)
- MANAGER.SYS (Has SM privelege)
- MGR/MANAGER.HPOFFICE
- MGR/MANAGER.HPWORD
- MGR/MANAGER.ITF3000
- MGR/MANAGER.SUPPORT
- MGR/MANAGER.SECURITY
- MGR/MANAGER.ROBELLE
- MGR/MANAGER.COGNOS
- MGR/MANAGER.TELAMON
- MGR/MANAGER.NETBASE
- MGR/MANAGER.VESOFT
- MGR/MANAGER.RJE
- MGR/MANAGER.HPMAIL
- MGR/MANAGER.FINANCE
- MGR/MANAGER.HP4DEMO
- MGR/MANAGER.HPPL85
- MGR/MANAGER.HPPL87
- MGR/MANAGER.HPPL89
- MGR/MANAGER.ADMIN
- MGR/MANAGER.ACCOUNT
- MGR/MANAGER.PROD
- MGR/MANAGER.DISC
- MGR/MANAGER.TAXES
- MGR/MANAGER.CONV
- MGR/MANAGER.XLSERVER
- MGR/MANAGER.LIBRARY
- MGR/MANAGER.USER
- MGR/MANAGER.PATCH
- MGR/MANAGER.CALENDAR
- MGR/MANAGER.REGO
- MGR/MANAGER.VESOFT
- MGR/MANAGER.TOOLS
-
-
- There will always be a MGR or MANAGER user under every account. Because
- when an account is created on an HP3000 a user must be created to manage
- that account; thus, you have the manager or mgr. Almost always the user will
- be mgr.account, but occasionally manager is used. Only two accounts,
- manager.security and manager.itf3000, usually do not appear as mgr.
-
- Common Passwords and Password Explanation
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- There are two types of passwords primarily encountered on the HP3000.
- First and most common is staight MPE passwords which are entered at
- login. The second and more sinister are the Security 3000 passwords,
- which are entered after login. Mainly, you will encounter MPE password
- protection; however some system admins do utilize Security 3000 passwords.
- Security 3000 passwords will be discussed at greater length later within
- this file; I will now turn my attention to MPE passwords.
-
- MPE Passwording Scheme and Account Structure
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- The MPE passwording scheme works on all aspects of the login and can be
- entered in two ways examples...
-
- Example 1
- ^^^^^^^^^
- :HELLO OPERATOR.SYS,PUB
-
- ENTER ACCOUNT PASSWORD:CASPER
-
- ENTER USER PASSWORD:EMERALD
-
- Example 2
- ^^^^^^^^^
-
- :HELLO OPERATOR/EMERALD.SYS/CASPER, PUB
-
- The latter of these two methods is best, because it will allow multiple
- failures on different accounts while the first will disconnect after
- multiple invalid attempts on one account.
-
- Account Structure
- ^^^^^^^^^^^^^^^^^
-
- The account structure is split into four groups and is formatted thusly;
-
- Sessionsname,Username.AccountName,Groupname
-
- The session name and group name can be omitted for logon in most cases.
- If, however a message at account login states, "NO HOME GROUP FOR
- USER...", a group name then must be specified for that account. The
- default groupname is:
-
- PUB
-
- Logging into an HP3000
- ^^^^^^^^^^^^^^^^^^^^^^
-
-
- HELLO
- [SESSIONNAME,]USERNAME[/USERPASS].ACCTNAME[/ACCTPASS][,GROUPNAME[/GROUPPASS]]
-
- for example
-
- HELLO LOSERS, FIELD.SUPPORT/SUSAN,PUB/SECRET
-
- The above would log you into session LOSERS under the user FIELD and
- account SUPPORT with password SUSAN under the group PUB with password SECRET.
- Although this appears difficult, it is merely a formal example. In reality
- users are never passworded; the same goes for accounts. The only part of
- the HP that ever seems to be passworded is groups; and no group password
- is needed to get in, since there are many ways around it.
-
-
-
- To logon to an HP3000, logon in the following manner:
-
- HELLO USERNAME.ACCTNAME,GROUPNAME
-
- To hack the operators account, type:
-
- HELLO OPERATOR.SYS,PUB
-
- HELLO is the command on the HP3000 that begins an interactive session.
-
- Occasionally the HP3000 will appear to be slow or pause and break
- repeatedly; select a terminal type to remedy this situation. The
- primary terminal types are 9, 10, and 18. A finer point under the MPE XL
- operating system only 10 and 18 apply unless other terminal types have been
- established with the Workstation Configurator Utility (This is not important
- just trivial). To hasten the process, logon similiarly:
-
- HELLO OPERATOR.SYS,PUB;TERM=9
-
-
- HP3000 Defaults Passwords and Common Passwords
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- The following is a list of the primary defaults and common account
- passwords.
-
- Most Common and Default Passwords
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HPONLY (Almost always Telesup account Password)
- ONLYHP
- NEW
- HPUSER
- PASS
- PASSWORD
-
- Here is a secondary list of passwords. Mainly on the HP3000 you will find
- names to be the most common password.
-
- Secondary Password List
- ^^^^^^^^^^^^^^^^^^^^^^^
-
- $MONEY 123ABC ABC123 ADMIN AGNES ALYCE AMY APASS
- ASDF BARBAR BEER BELL BETTY BILL BOB BRUCE
- BRUTE
- BUDGET BUG BURDEN CARL CAROL CARROT CARTER CENTER
- CHARLIE CHICK CINDI CNTL COKE CONDOM CONNIE CONTROL
- CORRECT COW DATAPAC DAVE DAVID DEANNE DIAG DOC
- DON DONNA DONOR DOS EAST ELAINE ELISA ELLYCE
- ENTRY FALCON FIELD FUN FUZZ GENE GINA GLENN
- GONE GRAPHICS GREG GUIDED HAND HAROLD HEALTH HERMIT
- HOLD HOT HOTSTUFF INSIGHT JACKIE JENNI JOGGING JOHN
- JUDY KATHY KELLY KITTY LARRY LESLIE LINDA LISA
- LITTLE LOIS LOUISE LOVE MAESTRO MARCIA MARY MARY
- MIKE MODEM MONEY MYRTLE NELSON NET NETWORK NEW
- NORTH PAGAN PASS01 PATT PEPSI PETER PHIL PROD
- QUASAR QUEST QWERTY REMOTE RESULT ROLLO RUBBER RUNNING
- SAFE SAFESEX SAFETY SAILING SALLY SAM SANDY SCOTT
- SEA SECRET SECURITY SOUP SOUTH STEER STEVE TAPES
- TEACH TECH TELENET TEMP TEST TEST1 THISTL TODD
- TOOTIE TOOTSIE TOUR TYMNET USER USERPASS VICTOR VIVIAN
- WASH WAVE WEST WIDGET XYZ
-
- ==============================================
- Manipulating, Utilizing, and Raping the HP3000
- ==============================================
-
- There are 5 things to do once you are inside your HP3000 to ensure
- continued access and prosperity. The canonistic approach to take is:
-
- Five Points of Interest
- ^^^^^^^^^^^^^^^^^^^^^^^
-
- Check to See Who is on the System
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- To check who is the HP3000, simply type:
-
- SHOWJOB
-
- Pulling NUA's of Systems Networked with your HP3000
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- To pull the NUA's of the systems your HP3000 is networked with, type:
-
- RUN NETCONF.PUB.SYS
-
- After running this program, type list and a list of NUA's and parameters
- will appear.
-
- Grabbing the Password File
- ^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- To grab the entire password file, turn on the buffer and type:
-
- LISTUSER @.@
-
- This will list all of the users and passwords, there accounts they are
- under, and the accounts password. On MPE XL OS
- you will have to issue a...
-
- LISTUSER @.@ ;PASS
-
- Check for Telamon Software
- ^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- To check for Telamon Software do this:
-
- LISTF @.@.TELAMON,1
-
- An error or a listing will be released if Telamon Software is on
- the system. Telamon is networking software that allows HP3000's to dialout
- via the nets to; Dow Jones, Compuserve, Dialog, Easylink, etc... By looking
- through the Telamon files NUI and passwords to these systems can be
- obtained. The passwords are usually stored in easily recognizable files
- (i.e. EASYPW would be thier EASYLINK password.) NUI's they can usually be
- pulled out of AUTODIAL.
-
- Creating an Account and User and Account/User Parameters
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- The next step to do is create an account and user ID for yourself;
- according to the following command.
-
- NEWACCT HACK,MALEF;PASS=MALEF;CAP=SM,AM,AL,GL,DI,OP,NA,NM,SF,ND,UV,CV,CS,PS,
- LG,PH,DS,MR,PM <C/R>
-
- Explanation of above...
-
- NEWACCT = Command to create account
- HACK = Accountname
- MALEF = Manager of the account HACK
- PASS=MALEF = Sets the account password to RBOCR
- ; = Parameters Separator
- CAP=Whatever = This is the capabilities listing of the account see
- chart below.
-
- Capabilities Listing
- -=-=-=-=-=-=-=-=-=-=
-
- System Manager = SM
- Account Manager = AM
- Account Librarian = AL
- Group Librarian = GL
- Diagnostician = DI
- System Supervisor = OP
- Network Administrator = NA
- Node Manager = NM
- Save Files = SF
- Access to Nonshareable I/O Devices = ND
- Use Volumes = UV
- Create Volumes = CV
- Use Communication Subsystem = CS
- Programmatic Sessions = PS
- User Logging = LG
- Process Handling = PH
- Extra Data Segments = DS
- Multiple RINs = MR
- Priveleged Mode = PM
- Interactive Access = IA
- Batch Access = BA
-
- One last task remains type;
-
- ALTUSER MALEF.HACK;HOME=PUB;PASS=RBOCR;CAP=SM,AM,etc...
-
- Explanation of above:
-
- ALTUSER = Command to modify user
- MALEF = Username to be modified
- HACK = Account that user is in
- HOME=PUB = Sets users home group to pub
- PASS=RBOCR = This sets users password to RBOCR
- CAP=SM,AM... = This is the Capabilities of the User
- ; = Parameters Seperator
-
- The capabilities listings for both the user and the account are
- identical. Briefly mentioned here are a few more commands.
-
- NEWUSER (Creates New user) 1
-
- ALTUSER (Modifies User) 1
- PURGEUSER (Deletes User) 1
-
- NEWACCT (Creates New Account) 2
- ALTACCT (Modifies Account) 3
- PURGEACCT (Deletes Account) 3
-
- NEWGROUP (Creates New group) 4
- ALTGROUP (Modifies Group) 4
- PURGEGROUP (Deletes Group) 4
-
- All of these commands with the exception of the purge command work in
- the same fashion. Here is a general algorithm for their use with the numbers
- corresponding to the operation:
-
- COMMAND USER.ACCT/ACCT,USER/ACCT/GROUP.ACCT;PARMS;PARMS;PARMS
- 1 2 3 4
-
- The only other exception that is of concern is the difference between
- user + account capabilities and group capabilities. The group capabilities
- are differant and below follows a list.
-
- Group Capabilities
- -=-=-=-=-=-=-=-=-=
-
- Process Handling = PH
- Extra Data Segments = DS
- Multiple RN's = MR
- Priveleged Mode = PM
- Interactive Access = IA
- Batch Access = BA
-
- It is neccessary to be cognizant of the fact rules regarding accounts, users,
- and groups. A User's capabilities cannot exceed the accounts capabilities for
- example a user cannot have SM privelege if the account doesn't have SM
- privelege, the same applies to groups. A group cannot have PM privelege
- if the account doesn't have PM privelege. However, just because an account has
- SM privelege doesn't mean a user automatically gets SM privelege and the same
- goes for groups.
-
-
- User Defined Commands (UDC's)
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- User defined commands are self-explanatory, and are user defined commands.
- These commands are stored in catalogs throughout the system. An HP3000
- may have multiple catalogs each with different commands. To list the commands
- type:
-
- SHOWCATALOG
-
- This will print out a listing of commands for furthur information on a
- particular command type:
-
- HELP command
-
- To execute a particular command, type the command's name. i.e.
-
- SJ
-
- (Note: SJ is a commonly found UDC that is showjob just shortened to SJ)
-
- UDC's can be found under almost any account on the HP3000 and are usually
- named XXXUDC or SYSUDC or UDC1 etc... To peruse other UDC files that may
- have nice commands you can add them to your existing catalog like so...
-
- SETCATALOG SYSUDC.PUB.SYS;APPEND
-
- Explanaiton of above:
-
- SYSUDC = The UDC file
- PUB = The group the UDC file is located in
- SYS = The account the UDC file is located in
- ; = Parameter Separator
- APPEND = Adds UDC file to existing UDC file w/o overwriting it
-
- However this only works on MPE XL and not MPE to add another catalog
- on MPE you will have to type:
-
- SETCATALOG SYSUDC.PUB.SYS
-
- There isn't much of a differance to complain of, but always remember
- to reset the catalog to what it formally was before you began fucking
- with it. I cannot stress this fact enough if the legitemate user notices
- a differant UDC catalog (which he will unless he is ray charles) then the
- system will be alerted to intrusion.
-
- UDC can also have lockwords these are stored in command.pub.sys and
- can be pulled from there or are in a listf @.group.account,-2 or a listf
- @.group.account,-3 depending on the MPE version you are under.
-
- Creating UDC's is very simple go to the editor and follow the
- format...
-
- SJ
- showjob
- ***
-
- That is the format for the showjob command. This is how UDC files are
- created simply the UDC command;MPE command;***. There are a few minimal
- parameters to take into account and options. Today we will deal only
- with the options.
-
- LOGIN - Command executes at login
- NOLOGIN - Standard format doesn't execute at login (default)
- HELP - Help for udc (default)
- NOHELP - This won't give help for UDC
- BREAK - Can break out of command (default)
- NOBREAK - Can't break out of command
- LIST - Error reporting with ^
- NOLIST - No error reporting (default)
-
- SJ
- OPTION LOGIN
- SHOWJOB
- ****
-
- What follows now is a standard UDC file I use slightly modified for
- general public use, but still nonetheless useful. Here is how to do it and
- set it word for word. This is basically a unix command crossover for
- HP3000.
-
- SETCATALOG
-
- EDITOR
-
- /A
- sj
- option login
- showjob
- ***
- who
- showjob
- ***
- rm
- purge
- ***
- ls
- listf
- ***
- cd
- chgroup
- ***
- cp
- fcopy
- ***
- date
- showtime
- ***
- time
- showtime
- ***
- wall
- warn
- ***
- write
- tell
- ***
- deluser
- purgeuser
- ***
- chmod
- altsec
- ***
- //
-
- /K MALEUDC
-
- EXIT
-
- SETCATALOG MALEUDC
-
- Now your done.
-
- Files, Directories, and Parameters
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- I will begin this section with two listings of file codes with both the
- Integer value and the Mnemonic. These are charts to be used for referance and
- will come in handy.
-
- File Codes for MPE
- ^^^^^^^^^^^^^^^^^^
-
- Integer Mnemonic Meaning
- -------------------------------------------------------------------------------
- 1024 USL User Subprogram Library
- 1025 BASD BASIC Data
- 1026 BASP BASIC Program
- 1027 BASFP BASIC Fast Program
- 1028 RL Relocatable Library
- 1029 PROG Program file
- 1030 NMPRG Native Mode Program file
- 1031 SL Segmented Library
- 1032 NMSL Native Mode Executable Library file
- 1033 NMRL Native Mode Relocatable Library file
- 1035 VFORM View Form file
- 1036 VFAST View Fast Forms file
- 1037 VREF View Reformat file
- 1040 XLSAV Cross Loader ASCII file (SAVE)
- 1041 XLBIN Cross Loader Relocated Binary file
- 1042 XLDSP Cross Loader ASCII file (DISPLAY)
- 1050 EDITQ Edit Quick file
- 1051 EDTCQ Edit KEEPQ file (COBOL)
- 1052 EDTCT Edit TEXT file (COBOL)
- 1054 TDPDT TDP Diary file
- 1055 TDPQM TDP Proof Marked QMARKED
- 1056 TDPP TDP Proof marked non-COBOL file
- 1057 TDPCP TDP Proof Marked COBOL file
- 1058 TDPQ TDP Workfile
- 1059 TDPXQ TDP Workfile (COBOL)
- 1060 RJEPN RJE Punch file
- 1070 QPROC QUERY Procedure file
- 1080 KSAMK KSAM Key file
- 1083 GRAPH GRAPH Specification file
- 1084 SD Self-describing file
- 1090 LOG User Logging logfile
- 1100 WDOC HPWORD Document
- 1101 WDICT HPWORD Hyphenation dictionary
- 1102 WCONF HPWORD Configuration file
- 1103 W2601 HPWORD Attended Printer Environment
- 1110 PCELL IFS/3000 Character Cell file
- 1111 PFORM IFS/3000 Form file
- 1112 PENV IFS/3000 Environment file
- 1113 PCCMP IFS/3000 Compiled Character Cell file
- 1114 RASTR Graphics Image in RASTR Format
- 1130 OPTLF OPT/3000 logfile
- 1131 TEPES TEPE/3000 Script file
- 1132 TEPEL TEPE/3000 logfile
- 1133 SAMPL APS/3000 logfile
- 1139 MPEDL MPEDCP/DRP logfile
- 1140 TSR HPToolset Root file
- 1141 TSD HPToolset Data file
- 1145 DRAW Drawing File for HPDRAW
- 1146 FIG Figure File for HPDRAW
- 1147 FONT Reserved
- 1148 COLOR Reserved
- 1149 D48 Reserved
- 1152 SLATE Compressed SLATE file
- 1153 SLATW Expanded SLATE workfile
- 1156 DSTOR Store file for RAPID/3000 Utility DICTDBU
- 1157 TCODE Code file for Transact/3000 Compiler
- 1158 RCODE Code file for Report/3000 Compiler
- 1159 ICODE Code file for Inform/3000 Compiler
- 1166 MDIST HPDESK Distribution list
- 1167 MTEXT HPDESK Text
- 1168 MARPA ARPA Message file
- 1169 MARPD ARPA Distribution list
- 1170 MCMND HPDESK Abbreviated Commands file
- 1171 MFRTM Reserved
- 1172 Reserved
- 1173 MEFT Reserved
- 1174 MCRPT Reserved
- 1175 MSERL Reserved
- 1176 UCSF Reserved
- 1177 TTYPE Term Type file
- 1178 TVFC Term Vertical Format Control file
- 1192 NCONF Network Configuration file
- 1193 NTRAC Network Trace file
- 1194 NLOG Network logfile
- 1195 MIDAS Reserved
- 1211 ANODE Reserved
- 1212 INODE Reserved
- 1213 INVRT Reserved
- 1214 EXCEP Reserved
- 1215 TAXON Reserved
- 1216 QUERF Reserved
- 1217 DOCDR Reserved
- 1226 VC VC file
- 1227 DIF DIF file
- 1228 LANGD Language Definition file
- 1229 CHARD Character Set Definition File
- 1230 MGCAT Formatted Application Message Catalog
- 1236 BMAP Reserved
- 1242 BDATA Basic Data file
- 1243 BFORM Basic Field Order File for VPLUS
- 1244 BSAVE Basic Saved Program file
- 1245 BCNFG Config. File for Default Option Basic Program
- 1246 BKEY Function Key Definition file
- 1258 PFSTA Pathflow STATIC file
- 1259 PFDYN Pathflow DYNAMIC file
- 1270 RTDCA Revisable Form DCA Document*
- 1271 FFDCA Document Interchange Unit file HPWORD/150
- 1272 DIU DISOSS Filing Information file
- 1273 PDOC Search Result Information file
- 1275 DFI Reserved
- 1276 SRI HPMAP/3000 Map Specification file
- 1401 CWPTX Reserved
- 1421 MAP Reserved
- 1422 GAL HPBRW Dictionary file
- 1425 TTX HPBRW Specification file
- 1428 RDIC HPBRW Specification file (frozen)
- 1429 RSPEC HPBRW Execution file
- 1430 RSPCF HPBRW Report Job file
- 1431 REXEC HPBRW Intermediate Report file
- 1432 RJOB HPBRW Dictionary Output file
- 1433 ROUTI HPBRW Print file
- 1434 ROUTD HPBRW Configuration file
- 1435 PRINT Reserved
- 1436 RCONF Native Mode Object file
- 1441 PIF PASCAL Source Library
- 1461 NMOBJ Reserved
- 1462 PASLB PASCAL Source Library
- 3333 Reserved
-
-
- File Codes for MPE XL
- ^^^^^^^^^^^^^^^^^^^^^
-
- Integer Mnemonic Meaning
- ------------------------------------------------------------------------
- 1024 USL User Subprogram Library
- 1025 BASD Basic Data
- 1026 BASP Basic Program
- 1027 BASFP Basic Fast Program
- 1028 RL Compatibility Mode Relocatable Library
- 1029 PROG Compatibility Mode Program File
- 1030 NMPROG Native Mode Program File
- 1031 SL Segmented Library
- 1032 NMXL Native Mode Executable Library
- 1033 NMRL Native Mode Relocatable Library
- 1035 VFORM VPLUS Forms File
- 1036 VFAST VPLUS Fast Forms File
- 1037 VREF VPLUS Reformat File
- 1040 XLSAV Cross Loader ASCII File (SAVE)
- 1041 XLBIN Cross Loader Relocated Binary File
- 1042 XLDSP Cross Loader ASCII File (DISPLAY)
- 1050 EDITQ Edit Quick File
- 1051 EDTCQ Edit KEEPQ File (COBOL)
- 1052 EDTCT Edit TEXT File (COBOL)
- 1054 TDPDT TDP Diary File
- 1055 TDPQM TDP Proof Marked QMARKED
- 1056 TDPP TDP Proof Marked non-COBOL File
- 1057 TDPCP TDP Proof Marked COBOL File
- 1058 TDPQ TDP Work File
- 1059 TDPXQ TDP Work File (COBOL)
- 1060 RJEPN RJE Punch File
- 1070 QPROC QUERY Procedure File
- 1080 KSAMK KSAM Key File
- 1083 GRAPH GRAPH Specification File
- 1084 SD Self-describing File
- 1090 LOG User Logging Log File
- 1100 WDOC HPWORD Document
- 1101 WDICT HPWORD Hyphenation Dictionary
- 1102 WCONF HPWORD Configuration File
- 1103 W2601 HPWORD Attended Printer Environment
- 1110 PCELL IFS/3000 Character Cell File
- 1111 PFORM IFS/3000 Form File
- 1112 PENV IFS/3000 Environment File
- 1113 PCCMP IFS/3000 Compiled Character Cell File
- 1114 RASTR Graphics Image in RASTER Format
- 1130 OPTLF OPT/3000 Log File
- 1131 TEPES TEPE/3000 Script File
- 1132 TEPEL TEPE/3000 Log File
- 1133 SAMPL APS/3000 Log File
- 1139 MPEDL MPEDCP/DRP Log File
- 1140 TSR HPToolset Root File
- 1141 TSD HPToolset Data File
- 1145 DRAW Drawing File for HPDRAW
- 1146 FIG Figure File for HPDRAW
- 1147 FONT Reserved
- 1148 COLOR Reserved
- 1149 D48 Reserved
- 1152 SLATE Compressed SLATE File
- 1153 SLATW Expanded SLATE Work File
- 1156 DSTOR RAPID/3000 DICTDBU Utility Store File
- 1157 TCODE Code File for Transact/3000 Compiler
- 1158 RCODE Code File for Report/3000 Compiler
- 1159 ICODE Code File for Inform/3000 Compiler
- 1166 MDIST HPDESK Distribution list
- 1167 MTEXT HPDESK Text
- 1168 MARPA ARPA Messages File
- 1169 MARPD ARPA Distribution List
- 1170 MCMND HPDESK Abbreviated Commands File
- 1171 MFRTM HPDESK Diary Free Time List
- 1172 None Reserved
- 1173 MEFT HPDESK External File Transfer Messages File
- 1174 MCRPT HPDESK Encrypted Item
- 1175 MSERL HPDESK Serialized (Composite) Item
- 1176 VCSF Version Control System File
- 1177 TTYPE Terminal Type File
- 1178 TVFC Terminal Vertical Format Control File
- 1192 NCONF Network Configuration File
- 1193 NTRAC Network Trace File
- 1194 NTLOG Network Log File
- 1195 MIDAS Reserved
- 1211 NDIR Reserved
- 1212 INODE Reserved
- 1213 INVRT Reserved
- 1214 EXCEP Reserved
- 1215 TAXON Reserved
- 1216 QUERF Reserved
- 1217 DOCDR Reserved
- 1226 VC VC File
- 1227 DIF DIF File
- 1228 LANGD Language Definition File
- 1229 CHARD Character Set Definition File
- 1230 MGCAT Formatted Application Message Catalog
- 1236 BMAP Base Map Specification File
- 1242 BDATA BASIC Data File
- 1243 BFORM BASIC Field Order File for VPLUS
- 1244 BSAVE BASIC Saved Program File
- 1245 BCNFG Configuration File for Default Option BASIC Program
- 1246 BKEY
-
-
-
-
-
-
-
- Function Key Definition File for Terminal
- 1247 BSVXL Business Basic/XL Program File
- 1248 BDTXL Business Basic/XL Data File
- 1249 BDNCM Business Basic/V Binary File
- 1258 PFSTA Pathflow Static File
- 1259 PFDYN Pathflow Dynamic File
- 1270 RFDCA Revisable Form DCA Data Stream
- 1271 FFDCA Final Form DCA Data Stream
- 1272 DIU Document Interchange Unit File
- 1273 PDOC HPWORD/150 Document
- 1275 DFI DISOSS Filing Information File
- 1276 SRI Search Restart Information File
- 1401 CWPTX Chinese Word Processor Text File
- 1421 MAP HPMAP/3000 Map Specification File
- 1422 GAL Reserved
- 1425 TTX Reserved
- 1428 RDIC HP Business Report Writer (BRW) Dictionary File CM
- 1429 RSPEC BRW Specification File
- 1430 RSPCF BRW Specification File
- 1431 REXEC BRW Execution File
- 1432 RJOB BRW Report Job File
- 1433 ROUTI BRW Intermediate Report File
- 1434 ROUTD BRW Dictionary OUTPUT
- 1435 PRINT BRW Print File
- 1436 RCONF BRW Configuration File
- 1437 RDICN BRW NM Dictionary File
- 1438 REXNM BRW NM Execution File
- 1441 PIF Reserved
- 1461 NMOBT Native Mode Object File
- 1462 PASLB Pascal Source Library
- 1476 TIFF TAG Image File Format
- 1477 RDF Revisable Document Format
- 1478 SOF Serial Object File
- 1479 GPH Chart File for Charting Gallery Chart
- 1480 GPD Data File for Charting Gallery Chart
- 1483 VCGPM Virtuoso Code Generator Proccessed Micro File
- 1484 FRMAT Formatter
- 1485 DUMP Dump Files Created and used by IDAT and DPAN
- 1486 NWMD0 New Wave Mail Distribution List
- 1491 X4HDR X.400 Header for HPDesk Manager
- 1500 WP1 Reserved
- 1501 WP2 Reserved
- 1502 LO123 Lotus 123 Spread Sheet
- 1514 FPCF Form Tester Command Spec File
- 1515 INSP Spooler XL Input Spool File
- 1516 OUTSP Spooler XL Output Spool File
- 1517 CHKSP Spooler XL Checkpoint File
- 1521 DSKIT HPDesk Intrinsics Transaction File
- 1526 MSACK Mail Server Acknowledgement
- 1527 MSNDN Mail Server Non-Delivery Notification
- 1528 MSTRC Mail Server Trace File
- 3333 Reserved
-
- Briefly I would like to explain the directory structure under MPE. The
- structure is very bizarre, but not as bad as VMS. In MPE you have accounts
- and groups, the groups are sub-directories so to speak of, of the accounts.
- The accounts are separate entities in that one account cannot be directly
- logged to from another account. For example if you are under the SYS account
- you can look at files in the COGNOS account, but you cannot change directories
- to the COGNOS account. The account you start off in is your working account/
- directory. (Note: There is no true directory structure under MPE, but the
- allegory may help out some readers.) The same principle holds true most of the
- time for groups except under the latter versions of MPE XL where a CHGROUP
- command has been added. This command allows you to change groups. i.e.
-
- CHGROUP PRIVATE/SECRET
-
- Explanation of above
- ^^^^^^^^^^^^^^^^^^^^
-
- chgroup = The command to change groups
- private = The group name switched to
- / = separator
- secret = This is the password to the group private
-
- This is simple enough and really needed no explanation, but we need to be
- christian even to the slow ones. The next most important command is listf
- this will give a files listing and has various differant combinations and
- parameters, but I wont go into it basically there are 3 parameters you need
- to know.
-
- LISTF @.@.@,-3
-
- Explanation of Above (needed)
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- LISTF = Command to list files
- @ = 1st @ is the wildcard in the file specification slot
- @ = 2nd @ is the wildcard in the group specification slot
- @ = 3rd @ is the wildcard in the account specification slot
- , = separator
- -3 = parameter which will list the lockword on a file if any
-
- The other parameters are these -3 is for MPE XL only and will list the
- lockword if the file is password protected more on this later. The -2
- specification will list the lockword under MPE. The 1 specification will
- list the account/group the file is under good for doing searches and getting
- more information.
-
- Examples of LISTF
- ^^^^^^^^^^^^^^^^^
-
- LISTF @.PUB.SYS = lists all files in the group pub under the account sys
-
- LISTF LIST@.@.@,1 = will list all files and accounts/groups that thier in; that
- begin with the word list this is how you will have to
- search for a listfile or listtext program since MPE
- doesn't provide one for you. Otherwise you won't be able
- to type text files to the screen.
-
- LISTF ?????UDC.@.ROBELLE,1 = this will search for anything beginning with 5
- alphanumeric characters and ending with UDC
- under the account robelle the '?' is the wildcard
- for single alphanumerics.
-
- File Security Provisions
- ^^^^^^^^^^^^^^^^^^^^^^^^
-
- ALTSEC is the command to modify RWX permissions on a file or device.
- To modify security on a file you would simply do the following.
-
- ALTSEC FILENAME;ACCESS=(RWX:CR;R:ANY)
-
- Explanation of Above
- ^^^^^^^^^^^^^^^^^^^^
-
- ALTSEC = Command to modify security provisions
- FILENAME = The file simply
- ; = Separator
- ACCESS= = What you are specifying
- ( = Open Parenthesis for permissions
- RWX:CR = Read, Write, Execute for the creator
- R:ANY = Read any user
- ) = Close parenthesis for permissions
-
- This is basically simple enough below follows the mode types i.e. RWX,
- and a second chart for user types.
-
- Mode Types
- ==========
- R = Read
- W = Write
- X = Execute
- L = Lock
- A = Append
-
- Note: both lock and append privs' are granted with W (write) privelege.
-
- User Types
- ==========
- ANY = Any user
- AC = Account members only
- GU = Group members only
- AL = Account Librarian
-
- HP3000 EDIT/3000
- ^^^^^^^^^^^^^^^^
-
- The HP3000 editor basically sucks but it will always be there if you
- need it so here goes.
-
- :EDITOR
-
- Now you should be in the editor the commands that follow are the most
- useful a full editor command list will be in the end of this portion you
- can play with the others if you want to.
-
- ADD - Begins editing section this adds lines to an existing file or
- creates a new one.
- END - Exits the editor.
- KEEP - This saves your work format; "KEEP FILENAME".
- // - This puts you back into command mode.
- TEXT - This loads a file into the editor format; "TEXT FILENAME"
- LIST - This lists the file examples...
- 1. LIST X - lists x line number.
- 2. LIST X/Y - lists range of numbers x -> y.
- 3. LIST ALL - lists everything
- MODIFY - This modifies a line number see below for explanation.
- XPLAIN - Help on editor commands format; "XPLAIN MODIFY".
- DELETE - Deletes lines.
- JOIN - Imports/adds another text file to the existing file in memory.
- GATHER - Move lines and fix's line numbers.
-
- The HP3000 editor uses basic conventions with Delete, List, etc... in
- form listed above i.e. LIST 1, 2, and 3. These conventions apply to all
- commands where applicable. To insert lines in the middle of text you
- can add 6.1 or 6.01 or 6.001. Then use the gather command to resort the
- line numbers into integers.
-
- The modify command is very archaic to say the least for example their
- are three primary commands D, I, R which are Delete, Insert, Replace
- respectively; These commands are sub-commands of modify. Here is how
- it works...
-
- MODIFY X
-
- now let's say X says, "sakdfjs HAck or Dei"
- to correct this line we would do the following
-
- MODIFY X
- sakdfjs HAck or DEi
- d d <C/R> (This deletes a range of letters)
- HAck or Dei
- ra <C/R> (This replaces A with the letter a)
- Hack or Dei
- d <C/R> (This deletes the i)
- Hack or De
- ii <C/R> (This inserts an i)
-
- Now this is very painful and takes time to get used to, but I never
- said the editor was good. Many HP's have other editors besides
- EDIT/3000, but to explain them all would be too time-consuming. The
- best or my favorite is QEDIT which can be found in the robelle account
- if it is there. A nice shortcut is that editor commands can be
- abbreviated i.e. T filename as opposed to text filename. This makes it
- a little better, but not much.
-
- Screen Blanking
- ^^^^^^^^^^^^^^^
-
- This is basically a stupid trick but a nice way to keep people from
- watching over your shoulder. Here is how it goes.
-
- ESC ;
-
- This makes everything you type not echo.
-
-
- ---
-
- Unfortunatly the finalized version of this file was wiped, therefore
- this is the shortened version. I didn't want to re-type the rest of it.
- It wouldn't meet the deadline.
-
- Malefactor!
-
- [Editors Note: The second part of this file should come out into a later
- issue. -JD ]
-
-
- / /
- / NIA073 / File 08 /
- / HoHoCon/XmasCon '91 /
- / Santa Claus /
- / /
-
-
- NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
-
-
- The Second Annual
-
- X M A S C O N
-
-
- Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
- Authors and Other Interested Parties.
-
- Where: Houston Airport Hilton Inn
- 500 North Belt East
- Houston, Texas 77060
- U.S.A.
- Tel: (713) 931-0101
- Fax: (713) 931-3523
-
- When: Friday December 27 through Sunday December 29, 1991
-
-
- Yes, ladies and gentlemen, you read it right... Xmascon has returned! This
- will undoubtedly be the telecom event of the year. Unlike certain conferences
- in the past, Xmascon 91 has a devoted and dedicated staff who are putting in
- an unmentionable ammount of time to ensure a large, vast and organized
- collection of some of the most diversified people in the telecommunications
- world. The event will be open to the public so that anyone may attend and
- learn more about the different aspects of computer security.
-
-
- Hotel Information
- -----------------
-
- The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
- Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night,
- your choice of either single or double. There are also 7 suites availble, the
- prices of which vary from $140 to $250. You can call the hotel to find out
- the differences and availability of the suites, and you will also NEED to
- tell them you are with the Xmascon Conference to receive the reduced room
- rate, otherwise, you will be paying $69.00. There is no charge for children,
- regardless of age, when they occupy the same room as their parents. Specially
- designed rooms for the handicapped are available. The hotel provides free
- transportation to and from the airport, as well as neighbouring Greenspoint
- Mall, every 30 minutes on the hour, and on call, if needed. There are 2
- restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
- Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
- buffets each day. There is a piano bar, The Cycle Club, as well as a sports
- bar, Chaps, which features numerous table games, large screen tv, and a disco
- with a DJ. Within the hotel compound, there are 3 pools, 2 of which are
- indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
- which features universal weights, a whirlpool and sauna. A car rental agency
- is located in the hotel lobby, and you can arrange to pick your car up at
- either the airport or the hotel. Xmascon attendees are entitled to a
- discounted rate. Contact the hotel for more information.
-
- Xmascon will last 3 days, with the main conference being held on Saturday,
- December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
- on throughout the evening. This year, we have our own complete wing of the
- hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
- is completely seperated from the rest of the hotel, so we are strongly
- encouraging people to make their reservations as far in advance as possible
- to enusre themselves a room within our area.
-
- Why To Contact Us, And How To Do It
- -----------------------------------
-
- We are hoping to have a number of people speak on a varied assortment of
- topics. If you would like to speak, please contact us as soon as possible and
- let us know who you are, who you represent (if anyone), the topic you wish to
- speak on, a rough estimate of how long you will need, and whether or not you
- will be needing any audio-visual aids.
-
- There will be a display case inside the meeting room which will hold items of
- telecom interest. Specific items that will be available, or that we hope to
- have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
- non-computer related magazines that feature articles of interest, a wide
- array of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will
- also have a VCR and monitor set up, so if you have any interesting videos
- (such as the Unsolved Mysteries show featuring Kevin Poulsen), or if you have
- anything you think people would enjoy having the chance to see, please let us
- know ahead of time, and tell us if you will need any help getting it to the
- conference. If all else fails, just bring it to the con and give it to us
- when you arrive.
-
- Media support has been very strong so far. Publications that have agreed to
- print pre-conference announcements and stories include Computer World, Info
- World, New York Times, San Francisco Chronicle, Austin Chronicle, Houston
- Chronicle, Independent Journal, Mondo 2000, CuD, Informatik, a leading
- Japanese computer magazine, NME, Regeneration (Germany), and a few other
- European based magazines. PBS stations WHNY, WNET, and KQED, as well as the
- stations that carry their syndicated shows, will be mentioning the conference
- also. If you are a journalist and would like to do a story on Xmascon 91, or
- know someone who would, contact us with any questions you may have, or feel
- free to use and reprint any information in this file.
-
- If anyone requires any additional information, needs to ask any questions,
- wants to RSVP, or would like to be added to the mailing list to receive the
- Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
- Lord Macduff via Internet at:
-
- nia@nuchat.sccsi.com
-
- Or via US Mail at:
-
- Hard Data Corporation
- ATTN: HoHo
- P.O. Box 60695
- Houston, Texas
- 77205-9998
- U.S.A.
-
-
- We will hopefully have an 800 mailbox before the next update is sent out. If
- someone cares to donate a decent one, that will stay up throughout the end of
- the year, please let us know. We should also be listing a few systems as an
- alternative form of reaching us.
-
-
- Xmascon 91 will be a priceless learning experience for professionals, and
- gives journalists a chance to gather information and ideas direct from the
- source. It is also one of the very few times when all the members of the
- computer underground can come together for a realistic purpose. We urge
- people not to miss out on an event of this caliber, which doesn't happen very
- often. If you've ever wanted to meet some of the most famous people from the
- hacking community, this may be your one and only chance. Don't wait to read
- about it in all the magazines, and then wish you had attended, make your
- plans to be there now! Be a part of our largest and greatest conference ever.
-
-
- Remember, to make your reservations, call (713) 931-0101 and tell them you're
- with Xmascon.
-
-
- "In closing... if you miss this one, you're only cheating yourself."
- -- Drunkfux
-
-
- ---cut here---
-
- This is the famous HoHoCow,
- ** we know of no other cow which
- /\ costs so much to keep at HoHo. Our
- **** exclusive beechwood grazing produces
- (00) a Mooo-ability, smellabiltiy, and
- /-------\/ a milkability you will find in no
- / |h0h0 || other cow in any other state!
- * ||W---|| --The CowWeiser Creed
- ^^ ^^
- Dadadadaa!
- Its H0H0C0W (wha'd ya'll 'spect? Yer comin' to Texas!)
- (C)Special SantaClausASCII Graphix
-
- ---cut here---
-
-
- ---paste here---
- =============================================================================
-
- / /
- / NIA073/ File 09 /
- / Editor's Comments /
- / JD & LMcD /
- / /
-
- Well, another issue out the gateway here at NIA. Things have been
- rather hectic here, with the Xmascon planning, Lord Macduff's new baby and
- classes starting again. We hope you enjoy this issue, and look for another
- around the first of the new year.
-
- We'd like to take this chance to ask the readers for their submissions,
- questions comments, donations of used equipment, and anything else they may
- care to send. Please direct all items to nia@nuchat.sccsi.com.
-
- Back issues of NIA and first releases of new issues can be obtained
- from the CuD archive servers (Refer: CuD Magazine) ftp.cs.widener.edu and
- EFF archive server (Refer: EFF Magazine) eff.org. Also a bbs entitled
- Internal Affairs (HOUTX), TTR (TinselTown Rebellion Node 2 @ 713.952.7971),
- RipCo BBS (1.312.528.5020), Blitzkrieg (TAP) and the current Phrack home
- archives the magazine.
-
- I thank the contributers who have been sending in donations in the
- way of files, hardware, information and other things. Please keep on doing
- so. In addition, Len Rose has a fund, please contact EFF (Refer:
- eff@eff.org / 617.864.0665) to donate.
-
- We look forward to seeing all of you at HoHoCon, and urge you to make
- your reservations _now_. The hotel has been filling up quickly and there are
- only a few rooms left (Refer: NIA073 / File 07).
-
- "There's nothing worse than a bad haircut. You go around looking like a
- dork...half apologizing always self concious, totally out of your groove for
- about a week. But at least you're reading NIA."
- - C.N. 11/16/91
-
- Keep The Faith,
- JD & LMcD
- Ignorance, There Is No Excuse.
- <eof>
-
-
-