home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 54.9 KB | 1,133 lines |
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = =
- - WELCOME TO THE SEVENTH ISSUE OF -
- = =
- - -=>PHANTASY<=- -
- = =
- - A PUBLICATION AND NEWSLETTER OF -
- = =
- - THE -
- = INTERNATIONAL =
- - INFORMATION -
- = RETRIEVAL =
- - GUILD -
- = =
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Volume Number Three,Issue Number Seven Dated 3/1/92
- Editor: Mercenary@f515.n141.z1.fidonet.org
-
- Article Submissions: The Mercenary/IIRG
- 862 Farmington Avenue
- Suite 306
- Bristol,Ct 06010
-
- Table of Discontents:
-
- [1] New Onslaught of Hacker Mania?
- Editorial By: The Silent Brotherhood
-
- [2] New Information on USA Bust
- From: Computer Underground Digest Issue #4.06
-
- [3] Quick Comment on USA Bust
- By: Mercenary
-
- [4] More Information on USA Bust
- Supplied By: Online BBS File
-
- [5] Phantasy Magazine to Carry C.O.D.E. and D.O.A.
- By: Knight Hack
-
- [6] Social Security Number Prefixes
- By: C.O.D.E. (Crackers Of Digital Equipment)
-
- [7] FireCrackers Part I
- By: Saint Anarchy/D.O.A.
-
- [8] PHANTASY TIDBITS: News and Views of Interest
-
- 1. Dad Downloads Gun into Son's Computer
- 2. MIT Anti-Semitic Problem
- 3. Digital Announces ALPHA
-
- [9] FOR THE PEOPLE
- Supplied By: Bulletin Boards Across the Country
- Edited by: Mercenary
-
- 1. Video Game Piracy
- 2. Cybertek
- 3. Note From "Static"
- 4. Michelangelo Virus Info
- 5. Genghis Khan's Bust
-
- [10] Listing of PHANTASY Distribution Sites
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- OFFICIAL DISLAIMER...
-
- All information in PHANTASY is from USER contributed material
- The Publishers and Editors of PHANTASY and THE IIRG disclaim
- any liability from any damages of any type that the reader or
- user of such information contained within this newsletter may encounter
- from the use of said information. All files are brought to you for
- entertainment purposes only! We also assume all information infringes
- no copyrights and hereby disclaim any liability.
-
- PHANTASY is (C) 1990 by The IIRG
- IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [1]: New Onslaught of Hacker Mania
- Editorial By: Silent Botherhood
-
- Staying Alive and Surviving in the Nineties.
-
- Seems to be a common theme amongst everyone nowdays, from the layed-off
- factory worker to the grandmother on Social-Security.
- And yet Big Brother seems fit to be on another current wave of round-ups
- of those "EVIL HACKERS" once again.
- Those of here at the Brotherhood have a few questions to ponder, and we'd
- ask you to join us on our contemplation.
-
- 1. How come during a declining Economy, Federal Agencies such as
- the Secret Service and F.B.I., always seem to Dig-up
- "Domestic Threats"?
-
- Response:
-
- Job Security, Who do you know that wants to be layed off?
- Agents must look busy, especially during an election year, and what better
- way to pad the payroll then by chasing a 15 year old computer enthusiast.
- Plus, this is much less demanding than say, rounding up real terrorists
- who just might actually have the gall to shoot back.
-
- 2. Why do Government Agencies such as the Secret Service and F.B.I.
- Confiscate equipment, Never press charges, then never return those
- items?
-
- Response:
-
- MONEY!! What better way to line the old pockets with a few extra bucks,
- Ever seen those ads for Government Auctions? I bet you have boys and girls!
- And it saves those agents the trouble of shoplifting, such as Secret Service
- Agent Joyce Fletcher,(A Dan Quayle Body-Guard), they're not very good at it.
-
- 3. Why Target Hackers,Phreakers, and Pirates?
-
- Response:
-
- Like we said earlier, a computer enthusiast makes a nice easy mark.
- Whens the last time you saw this headline,
-
- "SECRET SERVICE BUST GOES BAD, 15 YEAR OLD HACKER KILLS 5 WITH DISK DRIVE"
-
- Nice to know you won't be shot at, plus the real people ripping off
- more phone service than you can shake a stick at,"THE MOB", has guns
- and a few trigger happy boys to use them.
- As for Pirates, a little under the table "Bonus" for cracking down on
- someone dealing in your product has become a way of life.
-
- Well, it all boils down to Survival.... And unless the economy shores
- up or we get in a nice little war again, We won't see a let-up of
- pressure on the Federal Agencies to legitamize their payrolls.
-
- THE SILENT BROTHERHOOD
-
- P.S.: If your an F.B.I. or S.S. Agent reading the above article
- I own nothing, I live off of Food Stamps, I live under a bridge,
- and I sure as hell hope you don't hold a grudge....
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [2]: New Information on USA Bust
- From: CUD #4.06
-
- The following appeared in Computer Underground Digest Issue 4.06, it seems
- to conflict with what else we've learned about the Bust here at Phantasy.
- We present it here in its original form as to offer both sides of the
- story, as CUD's story appears to conflict with the news file currently
- circulating on the Pirate Community Boards. (SEE SECTION [4])
-
- -------------------------------------------------------------------------------
- Date: 8 Feb 92 17:31: 39 CST
- From: Moderators (tk0jut2@mvs.niu.edu)
- Subject: File 1--Bust of "NotSoHumble Babe" / USA
-
- The recent busts of three persons in the Detroit and Los Angeles areas
- for alleged carding, theft, software copyright violations and fraud
- raise a number of issues of CU relevance. Because of misinformation
- circulating on the nature of the case, we summarize what we know of it
- below. "Amy" (handle: "NotSoHumble Babe") was busted on her birthday,
- and is not untypical of many CU types, so we focus on her.
-
- 1. "Amy" was busted on Jan 30, in Farmington Hills (Mi), by local,
- state, and federal agents. There were reportedly up to 20 agents.
- The large number was because there were several from each
- department, including the FBI, SecServ, Mi State police, and
- others. They reportedly showed no warrant, but knocked on the door
- and asked if they could come in. When "Amy" said "yes," they burst
- (rather than calmly entered) with weapons, including
- "semi-automatics." Her boyfriend was reportedly asleep, and the
- agents awakened him with a gun to his head. The agent in charge
- was Tony Alvarez of the Detroit SecServ.
-
- 2. There has been no indictment, but the agents indicated that charges
- would include theft, fraud, and copyright violations. (software
- piracy and carding). The initial figure given was a combined $20,000
- for the three ("Amy," "Tom," and Mike").
-
- 3. All equipment was confiscated, included "every scrap of paper in
- the house. She was informed that, whatever the outcome of the case,
- she would not receive the equipment back and that it would be kept
- for "internal use."
-
- The above account differs dramatically from one given by "anonymous"
- in "Phantasy #6," which was a diatribe against the three for
- "ratting." However, the above account seems fairly reliable, judging
- from a news account and a source close to the incident.
-
- "Amy" is 27, and reported to be the head of USA (United Software
- Alliance), which is considered by some to be the current top
- "cracking" group in the country. If memory serves, "ENTERPRISE BBS"
- was the USA homeboard. She was questioned for about 10 hours, and
- "cooperated." She has, as of Saturday (Feb 9) *not* yet talked to an
- attorney, although she was put in contact with one late Saturday. The
- prosecutor in Oakland County is the same one who is prosecuting Dr.
- Kavorkian (of "suicide machine" fame). He has a reputation as
- excessively harsh, and his demeanor in television interviews does not
- contradict this.
-
- The other two defendants, "Mike/The Grim Reaper," and "Tom/Genesis"
- are from the Detroit and Los Angeles areas.
-
- What are the issues relevant for us?
-
- My own radiclib concern is with over-criminalization created by
- imposing a label onto a variety of disparate behaviors and then
- invoking the full weight of the system against the label instead of
- the behaviors. It is fully possible to oppose the behaviors while
- recognizing that the current method of labelling, processing, and
- punishment may not be wise. Len Rose provides an example of how
- unacceptable but relatively benign behaviors lead to excessive
- punishment. This, however, is a broader social issue of which
- computer-related crimes is simply a symptom.
-
- Of more direct relevance:
-
- 1) It appears that the continued use of massive force and weaponry
- continues. We've discussed this before in alluding to cases in New
- York, Illinois, Texas, and California. The video tape of the bust
- of the "Hollywood Hacker" resembles a Miami Vice episode: A
- middle-aged guy is confronted with an army of yelling weapons with
- guns drawn charging through the door. Others on the board have
- reported incidences of being met with a shotgun while stepping out
- of the shower, a gun to the head while in bed, and (my favorite) a
- 15 year old kid busted while working on his computer and the
- agent-in-charge put her gun to his head and reportedly said, "touch
- that keyboard and die." The use of such force in this type of bust
- is simply unacceptable because of the potential danger (especially
- in multi-jurisdictional busts, which reduces the precision of
- coordination) of accidental violence.
-
- 2. Until indictments and supporting evidence are made public, we
- cannot be sure what the occured. But, it seems clear that, for
- "Amy" at least, we are not dealing with a major felon. Carding is
- obviously wrong, but I doubt that, in situations such as this,
- heavy-duty felony charges are required to "teach a lesson," "set
- an example," and re-channel behavior into more productive outlets.
-
- 3. We can continue to debate the legal and ethical implications of
- software piracy. There is a continuum from useful and fully
- justifiable "creative sharing" to heavy-duty predatory rip-off for
- profit. This case seems to be the former rather than the latter.
- There is no sound reason for treating extreme cases alike.
-
- 3. We should all be concerned about how LE frames and dramatizes such
- cases for public consumption. The Farmington newspaper gave it
- major coverage as a national crime of immense proportions. We
- should all be concerned about how piracy cases are handled, because
- even extreme cases have implications for minor ones. Does
- possession of an unauthorized copy of Aldus Pagemaker and Harvard
- Graphics, collective worth more than $1,000, really constitute a
- major "theft"? We have seen from the cases of Len and Craig how
- evaluation of a product is inflated to justify indictments that
- look serious but in fact are not.
-
- I'm not sure what purpose it serves to simply assert that people--even
- if guilty of carding or piracy--should "get what's coming to them"
- without reflecting on what it is they get and why. The issue isn't
- one of coddling or protecting "criminals," but to examine more
- carefully what kinds of computer-related crimes should be
- criminalized, which should be torts, and which should be accepted as
- minor nuisances and--if not ignored--at least not criminalized.
-
- To give the dead horse one last kick: I am not arguing that we condone
- behaviors. I am only suggesting that we reflect more carefully on how
- we respond to such behaviors. I do not know the circumstances of "Tom"
- and "Mike," but "Amy's" case raises many issues we can address without
- condoning the behavior.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [3]: QUICK COMMENT ON BUST
- By: MERCENARY
-
- CUD does not name its sources, but the following article in section
- four appears to Substantiate the Article supplied to our Headquarters BBS.
- by an Anonymous Donor.
- Although the article claims Five Men were detained, its suprising in its
- similarity of the original article supplied to us.
- Even the file Circulating By The NotSoHumble Babe says the members were
- going to pick up their carded packages.
- At the time of this printing, We're trying to prepare an interview with
- One of the busted members.
- In closing please read section Four and try to formulate your own
- conclusions.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [4]: More USA Bust Info
- Supplied By: Online BBS File
-
-
- Dateline: Livonia Observer, Monday, February 3, 1992 , Volume 52 Number 1
-
- AUTHORITIES CRACK NATIONAL COMPUTER FRAUD RING
-
- In a continuous 36-hour investigation, Farmington Hills Police, U.S.
- Secret Service and Michigan State Police cracked what is believed to be a
- nationwide computer fraud ring operating from Farmington Hills and involving
- men from Livonia, Canton, Plymouth.
-
- Farmington Hills police briefly detained the five men, who they say agreed
- Thursday to cooperate with the investigation.
-
- Oakland County and federal prosecutors are reviewing the case to determine
- what charges will be filed against the five men - two from Livonia, one form
- Farmington Hills, one from Plymouth and one from Canton, said Farmington Hills
- Det. Sgt. Charles Nebus.
-
- The five men were not identified pending arrest and arraignment.
-
- "They are computer hackers," said Farmington Hills Det. Patrick Monti. "They
- have a high level of expertise in computers."
-
- Members of the alleged fraud ring apparently gained access to computers of
- credit reporting companies and used information, such as credit card numbers,
- credit limit, card balance, and card holder names, to order computer
- equipment, Monti said.
-
- Purchases of computer equipment were billed to people who had no idea their
- credit card numbers and information were being used to place the orders, Monti
- said.
-
- The 36-hour investigation began early Wednesday, Jan. 29, with a telephone
- call to Farmington Hills police from a computer company with offices in Hawaii
- and Texas.
-
- Company officials told police they believed they had a fraudulent order that
- led to Farmington Hills.
-
- Police got in touch with Federal Express in Novi where packages where expected
- to arrive. Dectectives Monti, Tim Swanson and David Loe conducted
- surveillance of the area. They saw three men in three cars arrive to pick up
- packages from the computer company, Monti said.
-
- Detectives followed the men to a Farmington Hills apartment where a fourth man
- was waiting. "At that time we confronted the occupants of the apartment. And
- they agreed to cooperate with us." Monti said.
-
- Police surveillance continued to Meijer Thrifty Acres at Eight Mile and
- Haggerty roads, Northville Township, where the Canton man - considered to be
- the brains behind the operation - retrieved the packages, Nebus said.
-
- "It was a ring of people with the man in Canton as the main actor. He placed
- the orders and others delivered the packages to him."
-
- Police recovered packages, valued at about $20,000, ordered by the ring.
-
- Forfeiture proceedings are expected to intitiated on equipment owned by one of
- the men in the ring. The other packages of computers will be returned to the
- companies from which they were ordered, Monti said.
-
- "We determined all the packages we picked up were fraudulent," Monti added.
- "When they would go to Federal Express they would sign the name of the person
- (whose credit card numbers they used) for the packages.
-
- Farmington Hills police, Secret Service officers and the Michigan State
- Police searched the Canton man's house Thursday.
-
- "The Canton man placed the orders and advised a Farmington Hills man to go to
- Federal Express in Novi and pick up the packages," Monti said. "It is our
- belief they were selling the computers."
-
- The ring would make use of what is called a "bulletin board," which is
- computer information available throughout the country. While using the
- bulletin board is not illegal, the information ring members used is, Monti
- said.
-
- "The detectives did an outstanding job," Nebus said. "From the time the
- information came in, these guys really had to scramble. I credit them with
- doing an excellent job on surveillance."
-
- Nebus also credited Federal Express. "We really depend on them a lot. They're
- good folks to work with."
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [5]: Phantasy to Carry C.O.D.E. and D.O.A.
- By: Knight Hack
-
- Starting with this Issue, Number Seven. Phantasy Magazine will be carrying
- independently authored files by C.O.D.E. (Crackers of Digital Equipment)
- and D.O.A. (Distributors of Anarchy).
- These two groups have agreed to distribute thier files in Phantasy, instead
- of trying to distribute their files independently.
- If your group would like to take advantage of Phantasys Distribution
- network and not go through the hassle of setting up sites yourselves
- please contact Mercenary at any listed site or Anubis at Dark Shadows.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [6]: Social Security Number Prefixes
- By: C.O.D.E. (Crackers Of Digital Equipment)
-
- C.O.D.E Phile Number One
-
- SOCIAL SECURITY NUMBER PREFIXES
-
- SSNs (Social Security Numbers) are issued with prefixes related
- to the applicant's address at the time of application.
- The following is a list of those prefixes for you to rapidly look
- up by State.
- Although accurate as of this printing, the information
- this text provides may become obsolete. The Social Security
- Administration periodically adds to the numbers issued. It may
- at times assign numbers from one geographical area to another
- area.
-
- Prefix numbers are continuous from 001 through 626, and 700
- through 729. Numbers 627 through 699 and 730 or above may be
- suspect.
-
- -------------------------------------------------------------------------------
- STATE Prefixes Used Comment
- -------------------------------------------------------------------------------
- AK Alaska Prefixes: 574
- AL Alabama Prefixes: 416 thru 424
- AR Arkansas Prefixes: 429 thru 432
- AS American Samoa Prefixes: 586
- AZ Arizona Prefixes: 526,527
- AZ Arizona Prefixes: 600,601 Since August 1985
- CA California Prefixes: 545 thru 573
- CA California Prefixes: 602 thru 626 Since August 1985
- CO Colorado Prefixes: 521 thru 524
- CT Connecticut Prefixes: 040 thru 049
- DC District of Columbia Prefixes: 577 thru 579
- DE Deleware Prefixes: 221,222
- FL Florida Prefixes: 261 thru 267
- FL Florida Prefixes: 589 thru 595
- GA Georgia Prefixes: 252 thru 260
- GU Guam Prefixes: 586
- HI Hawaii Prefixes: 575,576
- IA Iowa Prefixes: 478 thru 485
- ID Idaho Prefixes: 518,519
- IL Illinois Prefixes: 318 thru 361
- IN Indiana Prefixes: 303 thru 317
- KS Kansas Prefixes: 509 thru 515
- KY Kentucky Prefixes: 400 thru 407
- LA Louisiana Prefixes: 433 thru 439
- MA Massachusetts Prefixes: 010 thru 034
- MD Maryland Prefixes: 212 thru 220
- ME Maine Prefixes: 004 thru 007
- MI Michigan Prefixes: 362 thru 386
- MN Minnesota Prefixes: 468 thru 477
- MO Missouri Prefixes: 486 thru 500
- MS Mississippi Prefixes: 425 thru 528
- MS Mississippi Prefixes: 587,588
- MT Montana Prefixes: 516,517
- NC North Carolina Prefixes: 232
- NC North Carolina Prefixes: 237 thru 246
- ND North Dakota Prefixes: 501,502
- NE Nebraska Prefixes: 505 thru 508
- NH New Hampshire Prefixes: 001,002,003
- NJ New Jersey Prefixes: 135 thru 158
- NM New Mexico Prefixes: 525,585
- NV Nevada Prefixes: 530
- NY New York Prefixes: 050 thru 134
- OH Ohio Prefixes: 268 thru 302
- OK Oklahoma Prefixes: 440 thru 448
- OR Oregon Prefixes: 540 thru 544
- PA Pennsylvania Prefixes: 159 thru 211
- PI Philippine Islands Prefixes: 586
- PR Puerto Rico Prefixes: 580 thru 584
- PR Puerto Rico Prefixes: 596 thru 599 Since August 1985
- RI Rhode Island Prefixes: 035 thru 039
- RR RailRoad Retirement Prefixes: 700 thru 729
- SC South Carolina Prefixes: 247 thru 257
- SD South Dakota Prefixes: 503,504
- TN Tennessee Prefixes: 408 thru 415
- TX Texas Prefixes: 449 thru 467
- UT Utah Prefixes: 528,529
- VA Virginia Prefixes: 223 thru 231
- VI Virgin Islands Prefixes: 580
- VT Vermont Prefixes: 008,009
- WA Washington Prefixes: 531 thru 539
- WI Wisconsin Prefixes: 387 thru 399
- WV West Virginia Prefixes: 232 thru 236
- WY Wyoming Prefixes: 520
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [7]: FireCrackers Part I
- By: Saint Anarchy/D.O.A.
-
- FireCrackers are so simple to make that many books on fireworks
- often ingnore them.
- There are two main types of FireCrackers, but many different mixtures
- or powder formulas.
- This month I will only look at the "GIANT" FireCracker Class.
- Handmade "GIANT" FireCrackers are made by first rolling paper around
- a 3/4 inch wooden dowel until the paper is 1/8 inch thick. This is the
- casing of the FireCracker.
- The best paper to use is from a brown paper grocery bag. It is cut into
- the desired width and length to make 1/8 inch when rolled.
- On the last layer of the rolling process, the paper is glued and the
- completed paper tube is slipped off the dowel.
- 1/4 Inch thick slice of the dowel is used to plug the end. The plug
- for the fuse end is drilled to allow for the fuse. The plugs are smeared
- with glue before being pressed into the end of the tube. More glue is
- squeezed around the fuse after being inserted.
- In all the directions I have for making giant FireCrackers, it is
- recommended that they be filled only about 1/3 full. It is generally
- accepted that completely filled ones are not as loud as 1/3 filled
- tubes.
- If you choose to only fill the tube 1/3 of the way, make sure you
- insert the fuse deep enough as to reach the powder.
- Adequate FireCrackers can be made with commercial gun powder, pistol
- powder being the best to use,but even shotgun powder will do.
- In Part II next month will look at complete powder formulas and
- the second class of FireCrackers.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [8]: PHANTASY TIDBITS
- News and Views of Interest
- Edited By: Mercenary
- -------------------------------------------------------------------------------
- Dateline: 2/11/92
- From: Spokane,Washington
-
- DAD DOWNLOADS GUN INTO SON'S COMPUTER
-
- A man apparently irritated by the amount of time his son spent using a
- Computer was arrested after firing seven shots into the machine, police said.
- Charles R. Hubbard,44,of Spokane was arrested late Tuesday for investigation
- of assault, He was released Wednesday after posting $20,000 Bail.
- "He appeared to be upset because his son was unemployed and all he did was
- mess with that -qoute- "STUPID" computer" police Sgt. Al Odenthal said.
- The assault charge was for allegedly pointing a .45-caliber semi-automatic
- handgun at his son, Odenthal said.
- "Im not sure if its against the law to shoot property in your own home,"
- he said.
-
- -------------------------------------------------------------------------------
- Dateline: 2/14/92
- From: MIT (Massachusetts Institute of Technology)
-
- Phantasy Note: It appears that MIT is having similar woes to Prodigy
- of Anti-Semitic Messages being placed on-line
- The following two letters have appeared in "The Tech",
- Volume 112,Number 5, (an MIT Newspaper).
-
- -------------------------------------------------------------------------------
- LETTER ONE:
-
- FREE SPEECH DOES NOT PROTECT ETHNIC "JOKES"
-
- Freedom of speech and the privilege of attending an institution like
- MIT imply, (but do not always require), responsibility.
- As MIT's president, it often falls to me to defend freedom of speech
- and academic freedom on our campus. I do so gladly and with conviction,
- because it is important that our campus and society allow people to give
- voice to difficult questions and analyses that may differ radically from
- the norm.
- Such defenses begin to ring hollow, however, when individuals engage in
- mindless,offensive,and hurtful behavior just to "prove a point".
- This is precisely how I would characterize the use of computer bulletin
- boards by an MIT student to disseminate repugnant ethnic "jokes".
- Surely those who exercise freedom of speech have a responsibility to
- consider the consequences of what they say. Disparaging remarks about
- certain groups within our cumminity are hurtful to those individuals
- and diminish us all.
-
- Charles M. Vest
- President
- ------------------------------------------------------------------------------
- LETTER TWO:
-
- COMPUTER NETWORK NOT THE PLACE FOR ANTI-SEMITIC HUMOR
-
- I'm deeply disturbed about reports that at least one student at MIT
- is using the computer network to broadcast misogynist and anti-semitic
- jokes, even holocaust jokes.
- The use of our communications technology in this way can only diminish
- and dehumanize the members of some groups in the eyes of others. To
- dehumanize is a precursor to harassment, and even to persecution and
- terror. If individuals want to demean themselves by telling such
- jokes in private, they are free to do so. But to use MIT communication
- facilities to greatly amplify the audience for such jokes should not be
- considered acceptable behavior at MIT.
- It is difficult enough to create a community of civility and caring
- where people feel safe to share and learn without being confonted with
- such ugly assault.
-
- Rev. Scott Paradise
- Episcopal Chaplain
- -------------------------------------------------------------------------------
- Dateline: 2/25/92
- From: Digital
-
- DIGITAL ANNOUNCES THE ALPHA OPEN COMPUTING ARCHITECTURE,
- THE WORLD'S FASTEST MICROPROCESSOR,
- AND NEW BUSINESS PRACTICES
-
-
- ...Lays the foundation for 21st century network computing
- with a solid bridge from the present.
-
-
- HUDSON, MA -- February 25, 1992 -- Digital Equipment Corporation
- today announced Alpha, its program for 21st century computing.
- According to Kenneth H. Olsen, President of Digital Equipment
- Corporation, "Alpha is a totally new, open computing
- architecture that will be the foundation for advanced 21st
- century computing. It will give computer users a clear and
- consistent growth path from today's computing technology to the
- benefits of advanced 21st century computer technology. The
- Alpha program is a major element in the new, more competitive
- Digital Equipment Corporation, and we believe it will
- significantly fuel Digital's growth in the coming years."
- "This new architecture will, over time, address the needs
- of a broad range of computer users by providing systems that
- span the desktop to the supercomputer. Alpha will offer users
- the flexibility to deploy current applications on popular
- operating environments, beginning with OSF/1 and VMS. It will
- enhance and extend the capability of today's Digital products.
- Customers can continue to buy today's leadership VMS and UNIX
- systems from Digital knowing they have a clear entry path into
- 21st century computing," added William Demmer, vice president of
- Digital's VAX VMS Systems and Servers group. "The beauty of
- Alpha is that it opens the future with a solid bridge from the
- present," he added.
-
- Announced today were:
-
- o The Alpha architecture. This advanced, full 64-bit
- Reduced Instruction Set Computing (RISC) architecture is
- optimized for speed, engineered to support multiple
- operating systems, and designed to increase performance
- by a factor of 1000 over its anticipated 25-year life.
-
- o The first Alpha product -- Digital's 21064-AA RISC
- microprocessor. This 150-MegaHertz microprocessor is the
- first in a family of full 64-bit chips with address space
- many thousands of times larger than 32-bit
- implementations from IBM, Hewlett-Packard, and Sun. The
- new chip has demonstrated performance at 200 MegaHertz,
- and over time Digital will offer versions of this
- microprocessor at various speeds.
-
- Evaluation quantities of the 21064-AA microprocessor are
- available now. It is priced at $3375 each in units of 1
- to 100; $1650 in units of 101 to 1,000; and $1559 for
- over 1,000. Quantity shipments will begin in July, 1992.
-
- The new RISC microprocessor chips are manufactured at the
- company's high-volume, state-of-the-art manufacturing
- plants in Hudson, Massachusetts, and South Queensferry,
- Scotland.
-
- o New business practices to achieve the broadest possible
- use of the Alpha architecture, and to make the widest
- range of software available on Alpha. Digital will sell
- Alpha at all levels of integration -- chip, board, and
- system -- to other computer companies and to OEMs.
- Digital also will license its operating systems
- (including DEC OSF/1 and VMS), compilers, and layered
- software products.
-
- To ensure a broad applications portfolio, Digital is
- offering a comprehensive support program to help leading
- software companies quickly move up to Alpha. Thirty
- Alpha Upgrade Centers are being located in the US, Europe
- and Asian Rim, staffed by software support personnel with
- expertise in VMS, ULTRIX, and DEC OSF/1. Complete
- documentation, seminars and training session are
- available now, and seed Alpha system will be available
- this summer. The Alpha Upgrade Program already is
- underway with many leading software companies. Major
- vendors supporting the Alpha platform will be highlighted
- at DECWORLD '92 beginning in April.
-
- o A variety of ways for customers to enhance their VMS and
- UNIX computing environments with Alpha. Customers can
- develop and run applications on today's leadership VAX
- and DECsystem products with the assurance that they
- easily will be able to add Alpha systems into their
- computing environments. Alpha systems will provide data,
- image, source code, and user interface compatibility with
- VAX systems running open VMS and DECsystem products
- running DEC OSF/1. Alpha systems will network with these
- products to share information and processing tasks, and
- will work in VAXcluster configurations. Common buses for
- VAX, DECsystem, and Alpha systems means that many
- peripherals will be able to be used between systems.
-
- o A complete portfolio of service programs for users and
- other vendors who incorporate Alpha technology into their
- products. Digital will support customers with services
- ranging from consulting to training, systems management,
- and integration and upgrade services. Digital will
- support vendors during product design and implementation.
- Through OEMs, VARs, or direct distribution channels,
- Digital also will provide services for vendors'
- Alpha-based products.
-
- Alpha will extend the ability of Digital's current software
- systems environment to address major business opportunities.
- Supercomputer or large mainframe applications -- seismic data
- analysis, econometric forecasting, molecular modeling,
- engineering design verification, and many others -- will be able
- to run on Alpha at a fraction of traditional mainframe price per
- unit of performance. Alpha will expand the market for networks
- of high performance distributed production systems and servers,
- replacing mainframes. The powerful new single-chip Alpha
- microprocessor will open new markets for embedded OEM
- applications and board-level products. Alpha will provide the
- power for emerging personal use applications that are beyond the
- capability of most of today's PCs, such as voice and video,
- visualization systems, imaging, and artificial intelligence.
- With Digital's NAS (Network Application Support), customers will
- have the flexibility to integrate leading-edge, Alpha-based
- applications with their current applications environment.
- "Alpha is based on the expertise Digital has gained from 35
- years of providing systems and networking based on leadership
- architectural design," noted Robert B.Palmer, Digital's vice
- president of manufacturing. "In addition, Digital has 15 years
- of experience in designing and delivering chip technology,
- including leading-edge CMOS technology. We have some of the
- industry's most advanced fabrication technology, and most
- experienced chip design teams using a leading-edge suite of CAD
- tools, involved in delivering the world's fastest RISC
- microprocessor."
-
- DEC, DECsystem, DECWORLD, ULTRIX, VAX, VAXcluster and VMS are trademarks of
- Digital Equipment Corporation.
- OSF/1 is a trademark of Open Software Foundation, Inc.
- UNIX is a registered trademark of UNIX System Laboratories, Inc.
- Hewlett-Packard is a registered trademark of Hewlett-Packard Company.
- IBM is a registered trademark of International Business Machines Corporation.
- SUN is a registered trademark of Sun Microsystems, Inc.
- -------------------------------------------------------------------------------
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [9]: "FOR THE PEOPLE"
- News of Interest from BBS's Around the Country
- Edited By: Mercenary
- -------------------------------------------------------------------------------
- IIRG NOTE: The following message has appeared on Pirate Boards across the
- country, The English is a little frayed but I think the message
- comes through Clear. We've Deleted the two American Board Numbers
- to protect their anonymity.
- -------------------------------------------------------------------------------
- _____
- / ___/ _______________ __ _________
- / /__ /\ /\\ __ \ __/\ __ \ / \/ __/ ___/
- \___ \ / // // ___/_/ / _/ / /\ \_/ \__ \
- ____/ // // // / / /___/ /\ \ / / / /_____/ /
- \____/ \___/ \/ \____/\/ \/ \/ \/_______/
- _____
- / ___/____ __ ____ _____ _____
- / /_ / __// \/ __// ___//\ ___/
- / /\ \/ _/ / /\ \_/ \__ \/ /__ \
- / /_/ / /__/ / / /______/ / /__/ /
- \____/\____// \/___/\___/\/\___/
- ____
- / __ \ ____ ____ __ ____ __ ____
- / /_/ // __/ / __// \ / __/ / \ / __/
- / ____// / / _/ / /\ \/ /\ \/ /\ \/ _/
- / / / /___ / /__/ / / / //\\ \/ / / /___
- \/ O \____/ O \____// \/\___/ \/ \/\____/
-
-
- VIDEO GAME PIRACY TEXT PART #3 !
-
-
- The Video Game Piracy has begun, call the bulletin boards for
- Super Famiocm/Nes, Megadrive/Genesis, PC Engine/Turbo Express
- Software!.
-
- S.S.M.S. Its an Alpha Flight again but it runs in Germany not in
- the USA.. There is only an Amiga Section and this great
- new Conference called `SUPER NiNTENDO / FAMiKOM'...
- The BBS runs by SAiNTZ...
-
- ULTRABOX This one is one of the biggest and oldest Crack Houses
- in Germany.. It runs by ULTRA and you can find there a
- Amiga and again this great Console Conference...
-
-
- WORLD OF MIRAGE On this bbs you can order The Super Magic drve
- in the USA and start to exchange file !
-
- TOXIC INSULT An indy BBS in search of quality users for support.
- Console conference is open and files should be pouring
- in real soon.
-
-
- >>>>>> ALL BOARD NUMBERS WITH A VIDEO GAME PIRACY CONF! <<<<<<
-
-
- THUNDERDOME AFLHQ +1 408-263-9136 Amiga, Consoles
-
- TREA.ISLAND IPHQ +44 992-465soon Amiga, Consoles
-
- ULT.DREAM IPHQ +44 222-495919 Amiga, Consoles
-
- LIVING HELL NEMHQ +44 386-765550 Amiga, Consoles
-
- THE OASIS CSLHQ +44 386-553876 Amiga, Consoles
-
- S.S.M.S. AFLHQ +49 303-339471 Amiga, Consoles
-
- ULTRABOX INDI. +49 303-943531 Amiga, Consoles
-
- TOXIC INSULT INDI. +1 [IIRG DELETE] Amiga, Consoles
-
- WORLD OF MIRAGE USA +1 [IIRG DELETE] Amiga/IBM Consoles
-
-
- Well hope this has been useful to all you console pirates. If you are
- Not and want to be you will need some sort of copying device, which
- Executioner/IP can supply you with, grab the files or call Ult Dream
- to find out more or to place an order!.
-
- Credits
- ~~~~~~~
-
- This Text File : {Mr.SCARFACE} of CRYSTAL!
- Ansi : {Mr.SCARFACE} of CRYSTAL!
- Game Copiers : EXECUTIONER of INF.PERFECTION!
- Modification : SAiNTZ of ALPHA FLiGHT
- Further mods.: Zeke of T.I
-
- Big hi's to all the Sysop's and Co-sysops who run the Boards above.
-
- -------------------------------------------------------------------------------
-
- CYBERTEK: The Cyberpunk Technical Journal
- P.O. Box 64, Brewster, NY 10509
-
- What is CYBERTEK?
- by Thomas Icom, editor
-
- CYBERTEK is The Cyberpunk Technical Journal. Our first issue was printed
- in April, 1990. We publish an issue once every two months. CYBERTEK is an
- informational and discussion forum for technological enthusiasts/survivalists/
- activists, and others whose desire is to maximize their freedom and be able to
- function as free citizens in a totalitarian society.
- CYBERTEK was created because within the past years, The United States,
- once the model of freedom, has slid downward to become more and more of a
- totalitarian state. With this downward slide has been the withholding from
- the people of certain knowledge and information which is essential to have if
- they desire to exist as free citizens in a free country. An ignorant populace
- is very easy for a tyrant to keep down, but people who are knowledgeable in
- the ways and means to live independently and fight totalitarianism are
- impossible for despotic state to have control over. As James Madison, the
- father of the U.S. Constitution, once said, "A people to mean to be their own
- governors must arm themselves with the power knowledge gives."
- CYBERTEK's primary objective is the dissemination of easy to understand by
- the average person technological survival information. This is also better
- known in Cyberpunk literature as "street tech". This covers, but is not
- limited to, COMPUTERS, ELECTRONICS, PHONES, ENERGY, WEAPONS, CHEMISTRY,
- SECURITY, FINANCIAL, and HEALTH/MEDICAL. Knowledge of these topics is
- necessary for anyone seeking self-reliance and personal independence in
- today's world; as well as for preparing for any "unforeseen circumstances".
- The secondary objective of CYBERTEK is the discussion of political,
- libertarian, populist, alternative & underground culture and opinions. It is
- our aim to allow people to exercise their First Amendment right to freedom of
- speech and discuss their opinions and views. In this respect, if we print a
- submission, it will be printed unedited, uncensored, and in it's entirety.
- Unlike the majority of the traditional mass newsmedia, CYBERTEK takes the bill
- of rights seriously, and will prove it.
- CYBERTEK is published for educational purposes only under The First
- Amendment of The United States Constitution. The subject matter, while
- controversial in the eyes of some, is 100% legal to own in the United States.
- Although some of the information presented in CYBERTEK could be used in an
- illegal manner, no illegal acts are suggested or implied.
- Subscriptions to CYBERTEK are $15 a year for six issues. Sample issues
- are $2.50. Payment is by check, M/O (recommended), or by cash (not
- recommended. do at own risk). You can send payment to the address at the top
- of this textfile.
-
- -------------------------------------------------------------------------------
- IIRG NOTE: The following file has been circulating with the USA BUST text
- files, We can neither Confirm nor deny its Authenticity and
- supply it here for your Judgement.
- -------------------------------------------------------------------------------
-
- From : Static #1
- To : All
- Subject: Bust
- Date : 01-31-92 00:47
-
- We were busted today, by some Secret Service guys and some FBI people..
- This is no bull shit, they were here and made me delete everything I had and
- get rid of all my disks or they were going to take my hardware with them.
-
- There is no hidden section anywhere on this system, from now on everything is
- Public Domain.. IE: Gifs,mods, stuff like that. When I get done cleaning the
- place of all my disks I will re-do the system to make the sections look right.
-
- They have my user log, so change your passwords. I am not helping them bust
- other boards or narcing on anyone, this is our deal and we will pay the price.
-
- I hope that all of you continue to call here, I will try to run the board the
- best I can.. We will go multi node soon as things settle down. And we will run
- a large gif section as they told me that was ok to do.
-
- Static
-
- -------------------------------------------------------------------------------
-
- THE MICHELANGELO VIRUS
- Prepared by Charles Rutstein
- Research Center
- National Computer Security Association
- 3631 Jenifer St. NW
- Washington, DC 20015
- Voice: 202-364-8252 Fax: 202-364-1320 BBS: 202-364-1304
-
- This document is copyright (c) 1992 by the National Computer Security
- Association. Call 202-364-8252 to learn more about viruses and what you
- can do to fight them.
-
-
-
- The Michelangelo virus is based on the Stoned virus replication
- process and is extremely destructive. It was only discovered in
- mid-1991, but it has spread extremely rapidly across the United
- States. Recently, several major companies have shipped products
- infected with the virus. Among these are Leading Edge Products,
- who shipped up to 6000 infected machines [San Francisco
- Chronicle, 25 Jan 1992], and DaVinci Systems, who shipped about
- 900 infected demo disks to customers and resellers [Virus-L Digest,
- Feb 4 1992].
-
- One of the major reasons for the growth in the number of
- Michelangelo infections is the fact that the virus is new and is
- undetectable by recently outdated scanners. Additionally, it is
- based on the same efficient replication process found in the Stoned
- virus, which is the most common virus in the United States today.
- Finally, the virus presents no messages to the user and so masks its
- presence until triggered.
-
- On March 6 of any year the virus will overwrite the hard disk with
- random information found in memory. The portions of the disk
- overwritten include the FAT (File Allocation Table) and Master
- Boot Record (MBR). Recovery from the damage caused by the
- virus is extremely difficult, if not impossible. For this reason,
- users should remember to keep updated backups and to check their
- systems for the presence of the virus before March 6.
-
- The virus infects the boot sectors of floppy disks and the master
- boot records of hard disks. When a system is booted from an
- infected disk, the virus will place itself into memory and infect the
- hard disk (if not already infected). The virus occupies about 2K
- (2048 bytes) of memory while resident, decreasing the available
- memory reported by DOS accordingly. While resident in memory,
- any action which accesses a floppy disk (via interrupt 13h) will
- cause that disk to become infected. The virus places itself in the
- last sector of the area on the diskette reserved for the root directory
- entries. Therefore, a disk with a full (or nearly full) root directory
- may experience an immediate data loss. Similarly, data loss can
- occur on an infected hard disk when the virus moves the original
- master boot record to a new location. Some reports indicate that
- the virus mis-interprets the Disk Parameter Block of 1.44 MB
- floppies, causing them to return the message "Invalid Media" when
- accessed again. Note that every floppy disk has a boot sector,
- regardless of whether or not it is a bootable disk. Therefore, any
- floppy disk can be a carrier of the virus.
-
- Michelangelo is relatively easy to remove. Before performing any
- disinfection, cold boot the machine with a clean, write protected
- diskette. To disinfect floppies, use the DOS "SYS" command to
- place a new boot sector on the disk. Syntax is "SYS X:", where
- X is the drive containing the infected diskette. The only easy way
- to remove a hard disk infection with DOS is to use the DOS 5.0
- FDISK program. Use only DOS 5.0 for this procedure; all other
- versions may destroy data! Type "FDISK /MBR" to remove the
- virus by rebuilding the MBR.
-
- All major recent anti-virus packages should be able to reliably
- remove the virus. Two shareware products available on the NCSA
- BBS (202-364-1304 8/n/1) are SCAN/CLEAN from McAfee
- Associates and F-Prot from FRISK software. With Clean, type
- "CLEAN X: [mich]", where X is the infected drive. With F-Prot,
- type "F-Prot /Auto /Disinf X:", where X is the infected drive. Call
- NCSA at 202-364-8252 for free help in removing this and any
- infection.
-
- -------------------------------------------------------------------------------
- IIRG NOTE: The following Two Messages illustrate the downfall of Genhis Khan,
- a Dayton,Ohio Area Hacker. The first message shows the root of the
- problem, the second shows the result.
- -------------------------------------------------------------------------------
- When : 2/6/92
- Subject: Public Domain...
- To : All
- From : Genghis Khan
-
- OK,
-
- In Dayton Ohio we have a little problem. A few months ago,
- someone pulled up this pd sysop's credit report, who was getting on our nerves
- with his anti-virus shit. Anyways.. over $7000 worth of charges were put on
- his credit cards. Some shit was sent to his house. But still I think it's
- $6300 is still unaccounted for.
- From there on, the PD has pretty much declared war on the underground.
- They have formed a group called LPACHUL with the main constituant being Hells
- Furrie. Hells Furrie gets information from narcs in the underground, and also
- get's people to try to infiltrate the underground boards. Then they capture
- everything they see and put it in these newsletters.
- I've locked out probably 10-15 people who could be narcs. I know a lot
- of other people have locked out a lot more also. I'm trying to run a not so
- super elite board. But one with Phreak Klass, Hack Klass and trying to teach
- the 'lamers' how to get around and not look like idiots.
- What I'm asking is this. We've done all kinds of shit. We played up
- and made them look like idiots by creating a group called Smells Furrie and
- made newsletters like Hells Furries' but with everythign turned around. We
- made annoyance dialers that would call the sysops home fone number. We made
- programs that plain made fun of the pd. And passed it around the pd. We had
- the main guy's fone disconnected (Al Lee). He got it reconnected the next day.
- We've tryed a lot of shit. But they still keep coming. And each newsletter
- they put out exposes more and more about the underground..
- So. We tryed to control it, but I think their views maybe nationwide.
- That they might want to take down h/p and warez boards around the country. If
- we don't stop them now, they may start telling other people in other towns to
- try the same thing.
- This is a big problem. So I'm asking for EVERYONE's help. If you can
- infiltrate their boards, and trash/crash them. Send shit to their house.
- Cause general Anarchy we can win this war. It's getting out of control. And I
- think that WE NEED TO STOP IT!
- So.. If you guys would like to terrorize, here is an address.
-
- [IIRG Edited]
- [IIRG Edited]
- Dayton Ohio 45414
- Home Fone Number [IIRG Edited]
- Data Fone Number [IIRG Edited]
-
- His board is called [IIRG Edited]. He is butt buddies with John
- McAffee and sends every file he gets to McAfee to get it checked out and shit.
- He passes around all them damn virus scanners and cleaners and shit, which make
- it hard to trash boards.
-
-
-
- Get this guy first. I'll have more address and fone numbers soon!
-
- Genghis Khan
-
- -------------------------------------------------------------------------------
-
- When : 2/14/92
- Subject: BUST
- To : All
- From : [IIRG Edited]
-
- Well, tonight at around 10:00 I got a call from my friend Genghis Khan, yes
- the one who is on my board and always posting on this net. It turns out that
- today, he recieved a visit from the Secret Service and the Sheriif. They
- confiscated about everything, his computer, all his disks, papers, printer, and
- everything else. He was busted for hacking and using the 1-800-733-5000
- extender and for pulling CBI's. It turns out that the head PD guy that we
- have been telling all of you about, reported him and there was also a narc (who
- we are almost positive was THE ENFORCER a.k.a THE PREVENTOR a.ka. Dave Rowe)
-
- I don;t have much time right now to go into further detail, but i will post
- more tommorrow and when i talk to him again. Along with Genghis, TERM INAL,
- was also busted, and possibly others. IF YOU RUN A SYSTEM OR ARE ON A SYSTEM
- THAT HAS EITHER OF THESE USERS, I WOULD RECOMEND DELETING THEIR ACCOUNTS,
- BECAUSE THEY WILL NOT BE CALLING ANYMORE. Please let people know that 733's
- and CBI have busted them, and play it safe.
-
-
- -------------------------------------------------------------------------------
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Section [10]: IIRG Distribution Sites
-
- IIRG World HQ: Dark Shadows
- 19.2/9600 Baud HST
- 24 Hours a Day
- 1.2 Gigs Online
- (203)-628-9660
-
-
- IIRG Distribution Site One: Restaurant at the End of the Universe
- 2400/1200 Baud (3 Nodes!!)
- 24 hours a day
- 130 Megs of Files
- (203)567-8903 2 Nodes 2400
- (203)567-4808 1 Node 1200
-
- IIRG Distribution Site Two: The Generic Access BBS
- INC New England Regional District HQs
- IUD New England Regional District HQs
- 1.2 gigs online
- USR Dual Standard HST
- NO Ratios
- (508) 281-3961
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Section [9]: Phantasy Distribution Sites
-
- Phantasy's Distribution Site's are continually growing,we apologize if you
- called a board and didn't find the Mag. Network Distribution Sites will
- have the Issues first, we suggest calling one of them if a problem does
- arise.
-
-
- 1. Lightning Systems
- 19,200-1200 BAUD, 24 hours a day
- (414) 363-4282
-
- 2. Sycamore Elite
- 19,200-1200 Baud HST, 24 Hours a day
- (815) 895-5573
-
- 3. The Works BBS at (617-861-8976)
- Largest Text Files BBS in the world, 3500+ text files online.
- 2400-300 Baud, 24 Hours a day
-
- 4. Pipers Pit BBS
- 19,200-9600 HST ONLY!!
- 24 Hours a Day
- THG DISTRO SITE
- (203)229-3251
-
- 5. Blitzkrieg BBS TAP Magazine
- (502)-499-8933 P.O. BOX 20264
- Home of TAP MAgazine Louisville,KY. 40250-0264
-
- 6. The Dickinson Nightlight
- (713)-337-1452
- Der WeltanSchauung Distro Site (World View Magazine)
- Phantasy Distro Site
-
- 7. Lucid Dreams
- (713)-522-0709
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- PHANTASY(C) IIRG 1991,1992
- May Odin Guide Your Way!
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Downloaded From P-80 International Information Systems 304-744-2253
-