home *** CD-ROM | disk | FTP | other *** search
-
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 06
- Release Date: November 19, 1987
-
-
- So far the beginning files are about halfway finished. This issue (#6) will
- start off with news on protection against "Trojan Horses."
-
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: HD Sentry: "Hard Disk Protection from Trojan Horse Programs"
- FROM: The Computer Shopper
- DATE: June 1987
-
-
- PROTECTION FROM TROJAN HORSE PROGRAMS
-
- Every day, thousands of free programs are downloaded from public
- bulletin board systems throughout the worl. While the system itself is
- generally owned and operated by an individual, much of the contents of the
- BBS come from the public domain. The system operators of these
- bulletin boards, or sysops as they are affectionately called, rely on their
- callers for new material that could be of interest to others. Some of the
- material uploaded by users include articles, software reviews, program patches,
- unprotects (ways to crack copy protection), pleas for assistance and, of
- course, software. A problem has recently come to the attention of the user
- community concerning the software uploaded to these systems. every once in a
- while a program is uploaded to a BBS that, when run, maliciously attacks the
- systems hard disk. Since these programs are disguised as innocent software,
- they are referred to as "Trojan" programs.
-
- THE TROJAN LEGEND
-
- According to Greek mythology, Paris, son of King Priam of Troy, brought Helen,
- the wife of Kings Menelaus of Sparta, to Troy. Being somewhat agitated over
- this occurrence, the Greeks sent an expedition to Troy in order to recover
- Helen. For ten years, the Greeks and the Trojans fought to a stalemate.
- Finally, however, a Greek named Odysseus devised a military stratagem that
- would be remembered throughout time. The Greeks faked a retreat leaving behind
- a large wooden horse as a "gift" to the residents of troy. Inside the large
- horse however, was a squad of Greek soldiers. The unsuspecting Trojans brought
- the wooden horse into their city for all to see. That night,the soldiers that
- had hidden in the horse came out and opened the gates to the city. The rest of
- the Greek army, which had returned under darkness, was wating by the gates. By
- daybreak, the slaughter was over. The term "Trojan horse" took on a meaning
- that would forever go unchanged, a threatenin object that appears safe on the
- outside.
-
- TROJAN SOFTWARE SCENARIO
-
- Every single one of us has been told, at one tim or another, that you can't
- harm a computer by typing on it; software just can't damage hardware. A long
- time ago (foore computer owners were warned
- that a certain set of commands could permantently damage the PET monitors. This
- was one of the first instances that a combination of software commands were
- known to be hazardous to hardware. There is, however, one disastrous act that
- almost any software program can do, and that is to erase, delete, format , or
- otherwise damage a floppy diskette or, worse yet, a large capacity DASD hard
- disk. People tend to be lazy and system back-ups don't occurs as often as they
- should. When this situtation occurs, you have the potential for disaster. This
- is where most Trojan programs tend to strike. It all begins by calling a
- reputable BBS somewhere in North America. The first thing you do after you log
- on is to see what neat new programs are availiable for downloading on the
- system. You skip over the boring junk like system utility programs. After all,
- how many people really use a debugger disk packer or file encryption utility?
- But then, to your delight, you discover a listing you just can't pass up! Right
- there, in modems reach, is the program called "WHATEVER.COM". The short
- narrative that is displayed informs you that this program is a combination
- widget counter and word processing package. Boy, you think, that is just what I
- needed. A word processor AND a widget counter, in one fully integrated package!
- Best of all the program is only 13K! No match for your 1200 baud Hayes modem,
- you think as you begin the XMODEM download protocol. In a matter of minutes,
- the file resides on your hard disk ready to be used.
-
- You run the program and the disk drive light comes on. Then it stays on, for
- what seems like eternity. "Gee," you think to yourself, "sure is taking a long
- time to load a small 13K file." So you hit the good 'ol Ctrl-Alt-Del and rebbot
- the system. Then comes the error message telling you to insert your DOS
- diskette in A:. You realized minutes later that WHATEVER.COM has just eaten
- your gard disk for dinner. All that remains are timing marks....
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- As pointed out, Trojan Horses can be very dangerous to software. There are
- many different opinions as to what a Trojan Horse program is. This article
- used the definition of a Trojan Horse as a program that when used will destroy
- a disk (format it or erase all files) or will change the disk in some way.
-
- One other definition of a Trojan Horse is the type that can be used on a Unix
- and allows you to capture another user's LOGIN and password. There are
- other opinions as to what the words "Trojan Horse Program" actually mean.
-
- The Trojan Horse described in this article might better be described as
- a "Logic Bomb" or a "Virus Program". Again, the definitions for these
- programs vary.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Check This: Ma Bell is a Generous Soul
- FROM: The Ann Landers syndicated advice column
- DATE: July 1, 1987
-
-
- Dear Ann Landers: I think I can top the person who wrot complaining thne compan
- y. Talk about garbage in, garbage out!
- When AT&T split with Bell we had three phones in our house. The equipment
- belonged to Ma Bell and the service belonged to AT&T. After we returned all the
- phone equipment to Ma Bell, we received a bill for $0.00. My husband and I took
- turns calling people to get this straightened out. Shortly after that we were
- informed that our bill for $0.00 was overdue. My husband, just to be cute, sent
- a check to Ma Bell for $0.00. A few weeks later, we recieved a check for $5 and
- a note thanking us. We didn't cash the check the check, thinking this had to be
- a mistake. Several months later, we received another computerized bill for
- $0.00. We called again, got nowhere, so we sent another check for $0.00. A few
- weeks later we recieved another $5 refund with the same thank you. This went on
- every three months for two years. Now we are down to once a year and have given
- up trying to straighten this out. We just cash the $5 and forget about it. They
- say that computers don't make mistakes, but people sure do. Someone out there
- likes us very much, or they are very stupid.
-
- -Linda K.R. in California
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- Just a humorous little article I decided to print....
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Sign In and then Sign On
- FROM: The Chicago Tribune
- DATE: June 20, 1987
-
-
- James Dao says he has a foolproof way to foil computer hackers who ferret
- out secret passwords and spy mechanically. Punt the passwords, Dao
- says. Using software developed by Dao's company, Communications Intelligence
- Corp. (CIC) of Menlo Park, Calif., computer users must sign in in order to
- sign on. CIC's Handwriter program allows you to sign your name with an
- electronic pen on a flat plastic plate underlaid with a grid of wires. The
- computer then analyzes your signature against several that you have
- previously submitted to make sure that it's not a forgery before giving you
- access to informations. The handwriting analysis is more sophisticated than a
- simple comparison of letters. According to Dao, the company takes into account
- how quickly you write and how you accelerate from beginning to end. It
- also examines the points at which you apply most pressure with the pen. All
- of these factors are unique to your signature. Signature analysis is only
- one part of the Handwriter program. Other features include the ability to
- write longhand memos and letters that the computer translates into
- printed material. Right now, the technology is availiable only for
- mainframe and personal computers, Dao says. But one day, he predicts,
- businessmen will sit on planes scribling with electronic pens on
- plastic plates attached to laptop computers. "We're opening up computers
- to a segment of the population that's afraid of typing," he explains.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- This type of technology might be the computer security of the futur the downfall
- of computer security. If the logins were determined
- by the handwriting analysis ONLY and no passwords or logins, then a good forger
- or hacker might be able to trash a business for different signatures. The
- signatures would be different every time and the security wouldn't be too
- accurate. Don't be too scared by this article. This type of security is far
- into he future and it may never even be used.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: How to Beat Phone Assault
- FROM: .. some small town newspaper
- DATE: June 25, 1987
-
-
- NEW TECHNOLOGY
-
- Thanks to improved technology, phone call tracing, known to police as putting
- a "trap" on the line, is now a feasibile solution. Forget about old
- movies that depict police urging the perspiring victim to "Keep him
- talking-stay on the line!" while the diligent telephone engineers hurry through
- racks of wires to pinpoint the origin of the call. It's all computerized now,
- and the trap is quick and decisive, with a success rate, says Abel, "near 100
- percent. With our computerized switching center, it's almost
- instantaneous." To obtain a telephone trap, a customer with persistent
- harassing calls must notify police. The police then contact Illinois Bell and
- the trap is installed. A trap costs $20 for a week, $7 each additional
- week. In life-threatening situtations, there is no charge. Although Illinois
- Bell quickly locates every call made during the trap, legalities often cause
- a time lag in providing the information to police. Police eventually release
- the caller's identity to the victim and the caller is arrested. Maximum penalty
- is a six-month sentence and a $500 fine. However, as of June 1, the new
- state legislation requires a police subpoena to obtain phone trap
- information from Bell, a process lasting as long as one month.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- "a 'trap' on the line"- refers to CLID (Calling Line Identification)
-
- "computerized switching center"- refers to ESS (Electronic Switching
- system)
-
- The good news on this article came at the end when the reporter explained how
- there are new restrictions in releasing the results of a "trap" on the line.
- This helps to protect an individual's/phreak's rights.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Prisoner Phone Phreaks
- FROM: Tolmes News Service Magazine (Issue #6)
- DATE: November 19, 1987
-
-
- This article is just something I am writing on the events that happed at
- the Dade County Jail in Miami, Florida. This information mainly comes
- from different AT&T Newslines. This is not a transcript of the newslines but
- is the news on what has been going on in the Dade County Jail. The Dade
- County Jail in Miami, Florida was slapped with a phone bill of $153,000.
- It seems that the inmates were blue boxing, using AT&T Calling Cards,
- billing to third parties, and conning operators. One call on Thanksgiving was
- to Columbia and lasted about 3 hours. Another call to a dial-a for about 4 hours
- and cost $220. The police are now investigating and
- the county's taxpayers are going to have to pay the bill. The payphones at
- the prison are supposed to be used for local calls only. This type of prison
- phone fraud has been happening at a number of prisons. Supposedly, a leader
- of a criminal organization known as the El Rukns was put into prison on drug
- charges. According to all reports, the gang leader had a conference with Momar
- Khadafi in which he offered to do acts of terrorism. All of the conversations
- took place while the man was in prison. Many prisons have stopped the phone
- fraud by lessening the number of phones and monitoring calls. Hmm... phreaks in
- prison....
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Suburban Kids are Too Dumb to Steal
- FROM: The Chicago Tribune (Mike Royko's column)
- DATE: July 14, 1987
-
-
- It's sad, but even amount the well-to-do, being a parent can be a
- depressing experience. You give the kid all the advantages that money can buy-
- good schools, tennis lessons, riding lessons, a personal computer, a low-slung
- car, stereo, CD player, summer camps, music camps, diet camps and a ticket to
- one of the better universities. All that, and the kid turns out to be a mope.
- That's the sinking feeling that is currently experienced by several dozen North
- Shore families. The story begins several weeks ago in a White Hen Pantry store
- in Glenview, when a businessman stopped to use the pay phone to make a
- long-distance call. In making the call, he gave the operator his telephone
- credit-card number. He didn't realize it, but a 17-year-old boy from Northbrook
- was standing nearby. When the lad heard the man give his credit-card number, he
- alertly jotted it down. The businessman didn't know it of course. It wasn't
- until he received his next phone bill that he suspected that some. Strange? He
- almost jumped out of his shoes. There were more than 100 calls that he never
- made. He called the phone company to see if a mistake had been made, maybe a
- glitch in the computer. No, the calls had been made. So he and the phone
- company started investigating. As you probably guessed, the kid in the White
- Hen had said "goody," or something to that effect, and began using the
- credit-card to phone his pals. Then, being the sharing sort, he passed the
- number on to his friends, And they began charging calls. There were calls-local
- and long distance- being made from Winnetka, Lake Forest, Glenview, Northbrook,
- Skokie, Bensenville, St. Charles and other suburbs. One young lady went off to
- the National Music Camp in Interlochen , Mich., and she generously shared the
- credit-card number with her fellow music campers. Some of them were from
- Europe, so they used the number to call home or friends in Israel, West
- Germany, Ireland, and England. A girl who phoned a friend in England gave the
- credit-card number. So the friend in England used it to call a friend in
- Arizona. All of this was easy to establish, for two reasons. Reason number one.
- As I se well educated, well-bred young people turned out to be
- dense. They didn't realize that the number of the phone they used would shoe up
- on the businessman's bill. And the well-bred dopes were calling from their own
- homes, the music camp's phone and, in one case, from Grandma's house. Reason
- two. The moment that they were confronted with the evidence-their own phone
- numbers-they eagerly squeled on each other. The businessman, who asked that his
- name be withheld, said: "The amazing thing is that these are all brilliant,
- well-to-do kids. But they didn't know that the phone calls caught so easily.
- "And it's not like they're lacking financial support. They come
- from families with money. Some of them are spending wonderful summer vacations
- all over the world. One is traveling to Turkey, one in South America.
- "They're in the top of their class, in debate clubs, getting music
- scholarships. Some are going to MIT and Princeton. Their parents are well
- off. One is a child psychiatrist. "And the reaction of the parents is amazing.
- One guy said to me: 'That's impossible. My son is a brilliant student, and he
- is going to Princeton.' When he realized what his Princeton kid had
- really done it, he almost went into shock. "Another told me: 'You are to
- blame, too. If you had been more careful, they wouldn't have gotten the
- number.' Imagine that? He blamed me for his kid being a little crook because I
- didn't whisper my number to the operator." And another woman pleaded
- witht he businessman not to tell the grandmother, whose phone had been used
- for some of the calls. They were afraid that their son would be cut out
- of Grandma's will. The phone company's computers haven't come up with the
- final figure for the phone bill, but with all the long-distance and trans
- continental calls, it's expected to be enormous. And who will pay it? Not the
- businessman, of course. It will come from all of those bright kids' mommies
- and dadies. It's also possible that warrants will be issueed for fraud by
- wire, which, if pursued, can result in five-figure fines and jail terms. "And
- if they had just used payphones," the businessman said, "there wouldn't have
- been any way to trace them." That just shows there can be gaps in the academic
- programs at even the best private and suburban schools. What they need is a
- course in Remedial Stealing.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- Just something on some kids who did something that they shouldn't have.
- The kids involved were incredibly stupid (or rather ignorant since they are
- good in school). Just a basic case of phone fraud.
-
-