home *** CD-ROM | disk | FTP | other *** search
-
- __________________________________________________________________
-
- The Syndicate Report Feature Introduction Textus Page is published in
- order to inform TSR Readers of upcoming topics in The Syndicate Report
- Electronic Magazine. This textus page does not reflect the entire
- contents of the indicated magazine numbers, only a selected medley of
- what is about to penetrate an unforeseeable future w/TSR.
- __________________________________________________________________
-
- THE SYNDICATE REPORT MAGAZINE
- TEXTUS PAGE, FOR TSR #28
- Featuring:
-
- Editorial
-
- Operation SunDevil, A Rework
-
- The Title Reads: "COMPUTISTS ENDANGERED LIVES."
-
- Device IDs Fone Callers, Links To dBASE Files
-
- Journalist Faces New 'hacker' Charges
-
- Fiber Optics and Cable TV Combined?
-
- Kids Charged In Bomb Incidents
-
- The Electronic Frontier Foundation
-
- Cellular Eavesdropping, the 1990s Sport?
-
- ________________________________________________
-
- Brief Notes from the Report
-
- Quick and Hot News
-
- Vocabulary Tonic
- ________________________________________________
-
- Available on Chaotic Paradise 612.535.8106
- * The NEW Main TSR Distribution Site *
-
- by The Sensei
- Editor of The Syndicate Report Magazine
-
- (PWA is not directly affiliated with TSR)
- _____________________________________________________________________
-
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- THE SYNDICATE REPORT
-
- Information Transmittal No. 28
- (Part 1 of 2)
-
- Released September 5, 1990
- Featuring:
- ________________________________________________
-
- Editor's Note
-
- California Firm Again Challenges
- Hackers To BREAK Into System
-
- New Version 'EXTENDER BENDER' Supports the Apple //gs
-
- To Catch A Hacker
- "The True Story of John Maxfield, electronic asshole."
-
- Cellular Eavesdroping, the 1990s Sport?
-
- Fiber Optics and Cable TV Combined?
-
- Kids Charged In Bomb Incidents
-
- The Electronic Frontier Foundation
-
- ________________________________________________
-
- Brief Notes from the Report
-
- Vocabulary Tonic
- ________________________________________________
-
- by The Sensei
- Editor Syndicate Report Magazine
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- EXPOSITION: TSR
-
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through the CHAOTIC PARADISE Bulletin Board System @612-535-8106. Any info
- such as Busts, Phreaking, Hacking, Data / Telecommunications, and all new
- developments on any the previous mentioned specialties will be: accepted,
- labeled, and given full actual credit to the article/info provider(s), or
- writer(s). --
-
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). Some articles may
- have been commented by the editor. Comments are enclosed by brackets [].
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- EDITOR'S NOTE: TSR
-
- It been a while. This is it, TSR #28 -- finally here. In the future don't
- expect TSR to be released each month. It used to be fairly easy to accomplish
- the monthly dead-line. This one is months late. Expect future issues to be
- released randomly through-out the seasons.
-
- This issue was pretty fun to create -- a lot of interesting articles and
- new info accumulated over the months. It's especially nice to see a good cause
- in effect: The Electronic Frontier Foundation. Sounds like a piece out of
- Star Trek -- and probably is. Read about this group effort later in this
- issue.
-
- How many groups are currently active in the underground? More than you can
- count right? Well, locally in the 612 there hasn't really been any large
- cracking/hacking groups. PWA, which stands for Pirates With Attitudes is
- another new software cracking and distributing group. It's main HQ is Chaotic
- Paradise at 612 535 8106 -- the same number TSR resides. If anyone is
- interested in the group, dial up Chaotic Paradise.
-
- And on the stranger side...
-
- Has anyone ever been in the mood to see a Bill Gates movie? How he did it?
- How about a movie about Steve Jobs, the college rebel that built the now dead
- Apple // computer system. What about a Morris Jr. movie? The possibilities
- are endless in the movie industry. But who would go watch these movies?
- Us for certain -- but others would rather see Rosanne Barr eat a rolling
- donut. I guess there's always CH 2.
-
- Take it easy,
-
- ;The Sensei / TSR Editor
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- CALIFORNIA FIRM AGAIN CHALLENGES TSR (9/90)
- HACKERS TO BREAK INTO SYSTEM:
-
- [ Cut and paste this article. Send it to your printer and take the
- challenge. ]
-
- A Hayward, Calif., company has again challenged computer intruders to try to
- break its security system, offering a world trip to anyone who can do it.
- LeeMah DataCom Security Corp., which provides security systems to protect
- computers from unauthorized intrusions, challenged "hackers" to break the codes
- protecting a secret message hidden in its files.
- "We want to show the world that hackers can be beaten," LeeMah President John
- Tuomy told United Press International, adding that if he is wrong, the company
- will award a vacation for two to Tahiti or St. Moritz, Switzerland, to the
- first person who reaches the secret message.
-
- UPI reports the message is stored in PCs at the San Francisco and New York
- offices of the accounting firm Coopers & Lybrand, which is overseeing the
- contest. The computers are protected by the TraqNet security system developed
- by LeeMah.
- In an announcement late yesterday, LeeMah supplied two phone numbers --
- 212/307-6243 in New York and 415/512-7170 in San Francisco -- and a password,
- 533624, to enter either system. Contestants have two weeks to try to crack four
- levels of security and reach the message.
- LeeMah issued a similar challenge last year and logged 7,476 unsuccessful
- attempts. This year it added five extra phone lines to take incoming calls from
- contestants.
- Said Tuomy, "When we announced the challenge last year, a lot of hackers
- boasted that it was going to be child's play. When we beat them, some of them
- said it was because we only had one phone line and they couldn't get through.
- Now we're giving them their best shot."
- Tuomy says he estimates the odds of defeating the various levels of security
- protecting the message at one in 72 quadrillion.
- Meanwhile, some in the computing community are not thrilled with the LeeMah
- challenge.
- "One problem you have with this contest is they are advocating tele-crime,"
- said Ian Murphy, a Philadelphia security expert who goes by the moniker Captain
- Zap. "Hackers don't pay phone bills," instead often charging calls to stolen
- access account numbers.
- Tuomy said he did not know if crackers paid for calls to the challenge, but
- the company had no reports of tele-crime during last year's contest. If phone
- companies spotted a number of illicit calls to the challenge, they probably
- would have notified LeeMah, he said.
- He said that the contest, rather than encouraging computer intrusion, is
- intended to show what can be done to defeat invaders.
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- NEW VERSION 'EXTENDER BENDER' TSR (11/89)
- SUPPORTS THE APPLE //GS:
-
- For you Apple //gs freaks, Extender Bender 2.0 promises full Apple //gs
- support now. Other enhancements are full Hayes (and more modems)
- compatibility, including HST support.
-
- Tech Support, Modem Configs:
- - The Phantom Viper
-
- Okay, a lot of people seem to have a problem configuring Extender
- Bender to their modem. The modem drivers are going to be changed (again), and
- new driver types, including an HST driver is being added. So, for that, look
- forward too. Anyway, about the problems... before you come to me, do this:
- Try all of the modem types (except of course the Apple Cat). Ie: Modem Type
- [2] Hayes Compatible may work, while modem type [3] Apple Modem, etc. may be
- the correct type for you. If you're modem is in like slot 2, try number 7 [4]
- no driver. Try all of these until you find the one that works. [2] Hayes
- Compatible is your best bet, but if you can get [4] No Driver to work, it is to
- your advantage. Well, good luck. If anyone has any problems with Extender
- Bender, though I haven't heard of any justified complaints yet, anyway, leave
- me mail on Chaotic Paradise so I can fix it for version 3.0. It would be a
- great favor.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- TO CATCH A HACKER TSR (0/90)
- "The True Story of John Maxfield, electronic asshole."
-
- [ Notes from I, The Sensei, will be in brackets. This file had been typed
- directly from one of the better IBM PC publications. It is amazing that this
- magazine brings to life, "OLD NEWS." Then again, it is a very interesting
- story, and does tells us a lot about our foe John Maxfield. Maxfield = Maxie
- in this verbatim copy of the story. It does get into the latest craze on
- hacking voice mail and other forms of communications equipment. But this
- information was provided separate from the story, even written by a total
- different person Dara Pearlan and Don Steinberg. Ric Manning wrote the story
- about Maxie, everything you'll be reading from now on. Look for my
- intelligible comments in the brackets ][ - TS ]
-
- The Computer Crackers and phone phreaks who visited Cable Pair's cluttered
- office on August evening in 1983 much have thought they were in heaven.
-
- Cable Pair was a sysop for a hacker forum in the Twilight Phone, a
- Detroit-area computer bulletin board. The forum had become a meeting place for
- members of the Inner Circle, a nation wide hacker group that used the Twilight
- Phone's message base to trade stolen passwords and swap tips on phone
- phreaking.
- Cable Pair's visitors that evening were some of the Inner Circle's most
- active members, highly placed in the hacker pecking order. They had come in
- response to messages that Cable Pair had posted on the board, inviting them to
- take a guided tour of his headquarters, and they were suitably impressed.
- Computer equipment was everywhere. The sysop's console consisted of several
- terminals connected to a remote HP minicomputer.
- IN a back room was a bank of electromechanical telephone switches -- old
- stuff, but enough to run a phone system for a small town. Cable Pair even had
- an official Bell version of the infamous "blue box." TO demo the magic box, he
- keyed in a 2600 Hz tone and was rewarded with the clear whisper of AT&T's LD
- circuit.
- Then, like jazz players in a jam session, group members took turns show
- what they could do. One tapped in AT&T's 0-700 teleconferencing system.
- Another bragged about how he once nearly had Ronald Reagan, Queen Elizabeth,
- and the pope on the same conference call.
- One hacker's specialty was getting into Arpanet, the advanced research
- network that links universities and government agencies, including defense
- research centers. "The Wizard of Arpanet sat right there at the keyboard and
- hacked into the system," says Cable Pair, smiling at the memory. "And we
- captured every keystroke."
- It was probably Cable Pair's finest hour. He was not, after all, just
- another hacker. The gathering that evening was the culmination of an elaborate
- sting operation.
- Outside the office, FBI agents watched everyone who entered and left the
- building. A few months after the jam session, police raided homes across the
- country. They confiscated computers and disks and charged about a dozen adults
- and teenagers with various counts of computer abuse and wire fraud.
- Cable Pair was John Maxfield, whose career as an FBI informant had started
- a year earlier. Now approaching the age of 50, he is still chasing hackers,
- phone phreaks, and computer pirates. When his cover was blown in a hacker
- newsletter soon after the office party, he attracted a network of double
- agents, people who found it more convenient -- and safer -- to work with him
- than against him. Some continue to maintain their status in the hacker
- underground and pass information to Maxfield.
-
- SPY STORY. The nature of Maxfield's calling depends on your frame of
- reference. If you've read enough cheap fiction, you might see him as a private
- disk in a digital overcoat. Or a stagecoach guard sitting on the strongbox,
- eyes scanning the horizon, electron gun across his knees. He refers to the
- hacker phenomenon in the nebulous language of Cold War espionage, casting
- himself in a spy-noble role as a warrior fighting battles that both sides will
- deny ever happened.
- There's something of a CIA-versus-KGB type of professional courtesy in
- what people in the hacker community say about Maxfield.
- "He's very good at getting hackers together on one thing," says Eric
- Corley, editor of 2600 magazine, the hacker publication that fingered Maxfield
- more than six years ago. "I can think of nothing that hackers agree on except
- that John Maxfield is EVIL."
- Maxfield responds in kind. "Hackers are like electronic cockroaches," he
- says. "You can't see them, but they're there, and at night they raid the
- refrigerator." Although a lot of hackers are what Maxfield calls "tourists" --
- young people who go into a systems simply because it's there, just to look
- around -- more sinister influences often lurk behind them.
- "The tourist may go into a system and look around, but when he leaves,
- he's god a password, and he'll share it when others because he's got an ego and
- wants to show how good he is," says Maxfield.
- "It's my experience that every hacker gang has one or more adult members
- who direct activities and manipulate the younger ones. What could be better
- than to have these naives doing your dirty work for you? They can open all the
- doors and unlock the systems, and then you go in a steal space-shuttle plans."
- "The hackers are one step away from the shadow world of the spies," Maxie
- says. "Some have deliberately sought out and made contact with the KGB." Maxie
- wasn't surprised at West German police announced in March 1988 that they had
- arrested a group of hackers who used overseas links to U.S. computer networks
- to steal sensitive data. (See "The Cuckoo's Egg, the book.) And he thinks
- computer companies and corporations haven't learned much about securing their
- systems. "There are more interconnections," he says, "and that leads to more
- vulnerability."
-
- A good example was the worm that Morris unleashed. But that's old news.
-
- "The hackers will tells you that this kind of thing is just a practical
- joke, a harmless prank. But it can do some very serious damage," says Maxie.
- Computer systems experts who testified at Morris's trial last January estimated
- that the cost of cleaning up after the chaos reeked by the Unix worm was $15
- million.
- The information that Maxie collects about these computer pranksters and
- criminals goes into a database that he maintains to help him identify hackers
- and monitor their activities. (Though they've tried on more than a few
- occasions, hackers have no chance of breaking into this database -- there's no
- dialup access to it.) B.S.!
- Maxie tracks the phone phreaks' identities and aliases to help his
- clients, who are managers at large corporations, credit card companies, and
- telephone companies --business-people who feel the need to protect their
- electronic goods and services.
-
- :::: Information from PC Magazine ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- FIBER OPTICS AND CABLE TV COMBINED? TSR (9/90)
-
- One regional phone company is planning to install fiber optics "curb to
- curb" by the year 2010.
-
- The pros to this are obvious...
-
- Con side is that anti-trust situation might develop, and that Cable TV
- industry might be burned a little, or might end up being sold to phone
- companies, eliminating competition.
-
- Many problems jump out from behind trees. As a whole, consumers don't
- necessarily want it. They figure they've already got perfectly good digital
- lines, and don't want to pay for a complete renovation. Reminds me of the
- natural gas conversion hangups that neighborhoods fought tooth and nail.
-
- On the other hand, we've got the technology rapped up and tested enough that
- it's beginning to infiltrate into the new developments. (we've got numberous
- small 'fiber to the home' test spots around the country, and are receiving
- favorable results) Unfortunately, since deregulation, the replacement costs
- are directly passed on to the consumer, rather than deferred or subsidised as
- with the Ma Bell system.
-
- A definate catch-22.
-
- But as for changing over, and combining cable and phone, that sounds like it
- would likely be more economical for consumers. Having consumer pay to improve
- the company's ability to make money, sounds wrong.
-
- Keep in mind that Cable TV companies would soon be able to compete with the
- phone company for telephone service too! This could break the citywide or
- region wide monopoly on phone service. Phone company might be forced to
- compete with cable companies, and I doubt that cable companies would expect
- customers to pay for their improved ability to earn money.
-
- According to some Senators, consumers very much DO want improved communication
- services. The fiber network stuff, coming from either RBOC or Cable
- companies, would serve rural areas better. People in the country would be
- able to have CABLE TV, where they couldn't get it before. The more massive
- business traffic on such fibers, would more readily justify very extensive
- market penetration. $26 phone bill, and $20 cable bill per month, could be
- combined at $35 of monthly revenue per drop.
-
- It sounds as if I, the consumer, would pay for a bigger and
- more profitable vending machine. Isn't that the merchant's problem?
-
- Yup, but the RBOCs don't see it that way. They view it as an assesment to
- the property, and will charge the endusers directly. (at least for now)
-
- The advantage isn't improved communication services in the common sense of
- the word. Fiber has the ability to carry multiple signals (TV, Data, Voice
- etc) within a very small media, and needs much less repeater capability. (Let
- alone cheaper). We're experimenting with it in a few locations, and, although
- the concept is great, we're running into a few logistical problems - Such as
- cooperation between providers, routing (can't bend the stuff, Y'know), and
- switching. (The fiber Optic switch is a biggie - even techwise).
-
- Nope. We're on our own to develop, market, install, and license whatever
- technology and process we feel is profitable. If we can unload a giant OSP
- Fiber Loop Converter, or a nice hefty Fiber Distribution Frame on Pacific
- Bell, then so be it.
-
- Since the Crash of the Monopoly, Multi-regional services were forced to
- diversify, and split into smaller providers altogether. Each is free to
- market, and sell their particular form of service as they see fit.
-
- I think it'll happen, but don't hold your breath...
-
- ;The Sensei, TSR Editor
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- CELLULAR EAVESDROPING, THE 1990s SPORT: TSR (0/89)
-
- Eavesdroping on cellular telephone conversations is an illegal but
- increasingly popular activity. Lack of privacy on portable cellular phones is a
- little-discussed blemish on an otherwise productive industry. By the end of
- last year, 3.5 million cellular phones were in use - mostly in cars - a 67
- percent rise over 1988.
-
- Industry officials say that changes in frequency involved in a cellular
- conversation discourage listeners from hearing lengthy conversations. And the
- increased popularity of cellular phones makes it harder to pick out single
- conversations. "You used to be able to get some juicy conversations. Now you
- get a headache" because of crowded frequencies, says a listener.
-
- Cellular phone conversations are as easy to intercept as any other radio
- transmissions. And they can be overheard for miles around, unlike those on the
- cordless phone you take into the backyard. Cordless phones have a range of
- 1,000 feet or less, but the cellular technology transmits more than 50 miles
- away.
-
- The market for scanners and equipment for eavesdroping is growing. Most
- scanners now are aimed at police and fire communications, and omit cellular
- phone frequencies - roughly between 800 and 900 megahertz. But scanners are
- easy to modify with the snip of a wire or addition of a cheap converter.
-
- Cellular companies, fearful of losing sales and subscribers, have failed
- to warn customers that random eavesdroping is possible. Some phones include
- warnings, but most do not. A 1987 survey by the California Public Utilities
- Commission found that 60 percent of cellular phone users were unaware their
- conversations could be intercepted.
-
- The problem of cellular eavesdroping gradually will disappear as the
- industry moves toward a "digital" method of transmission in the next few years,
- says industry experts. The conversion will bring greater clarity as well as
- security. But experts say as soon as phones go digital, someone will start
- selling a device that will undigitalize it for scanner owners.
-
- :::: Information Provided by Cellular Phreak ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- KIDS CHARGED IN BOMB INCIDENTS: TSR (9/90)
-
- Four Maryland youths -- two 15-year-olds and two 16-year-olds -- who are so-
- called to have used computers to retrieve information about making pipe bombs
- have been charged with manufacturing and detonating explosives.
- In Harford County,, Md., Deputy Fire Marshal Bob Thomas said three pipe bombs
- destroyed a mailbox, a soft drink machine and a phone booth between July 30 and
- Aug. 12 in the Havre de Grace-Level area. He said three other explosive devices
- in two other mailboxes did not detonate. No one was injured in the incidents.
- Thomas said investigators found computer material and files the four
- allegedly used to share information on how to make pipe bombs and about
- specific targets. United Press International quotes Thomas as saying the
- arrests mark the second time in about a year that Maryland juveniles allegedly
- used computers to share information on pipe bombs and other homemade explosive
- devices.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- ELECTRONIC FRONTIER FOUNDATION: TSR (7/90)
-
- Software pioneer Mitch Kapor, founder and former chairman of Lotus
- Development, has found a new high-tech crusade to keep him busy: fighting
- overzealous computer crime stoppers.
-
- At a news conference today, Kapor, now chairman of a new software company,
- is scheduled to announce the creation of the Electronic Frontier Foundation, a
- group that will study and publicize the novel social and legal issues arising
- from the increasing use of *computers* to communicate and dispense information.
-
- The new foundation is part of a small but growing concern that the
- continuing government crackdown on computer tampering, electronic
- eavesdroping and other hacker activities has gone too far. Some members of the
- foundation have said recent law enforcement steps threaten civil liberties,
- particularly First Amendment guarantees of free speech and Fourth Amendment
- protections against improper searches and seizures.
-
- Kapor, who wrote the all-time best-selling personal computer program Lotus
- 1-2-3, has been speaking out in recent months about the dangers posed by
- overzealous enforcement of anti-hacker laws and has expressed interest in
- helping to pay the legal fees of those charged under the laws.
-
- However, a spokeswoman for Kapor said the new foundation will be "more
- than a hacker defense fund" and will support and fund public education and
- government lobbying efforts in addition to intervening in court cases.
-
- Co-founder of the group is John Perry Barlow, a Wyoming cattle rancher
- active in Republican party politics who is perhaps best known as a lyricist for
- the Grateful Dead rock band. Steve Wozniak, co-founder of Apple Computer, is a
- major donor to the foundation that will be based in Cambridge, Mass., near
- Kapor's current business.
-
- Initially, the foundation will underwrite a $275,000 study of the issues
- by Computer Professionals for Social Responsibility, a group of engineers and
- others in the computer industry.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::::
-
- // New Fone Can Screen Visitors //
-
- Citizen has unveiled a telephone device in Las Vegas that lets residents see
- who is at the door. The two-part gadget has a 3 by 5 1/2 inch doorbell unit
- that hides a black-and-white camera, and a phone with a 3-inch screen. A
- doorbell ring activates the camera and the visitors image is projected onto the
- phone unit.
- ________________________________________________
-
- // New Soft. Breaks Barriers //
-
- New intelligent communications software from Data General is making it
- possible for networks to have intelligent conversations in digital voice,
- facsimile, image or text format. How: Product determines how to share data and
- retrieve and deliver information. User can access data in their own familiar
- computer format, regardless of the sender's format.
- ________________________________________________
-
- // School Created in a MicroCHIP //
-
- Desert View Middle School in El Paso, Texas, has created "The Academy," a
- computer bulletin board that allows students to read, write and explore
- cultures. Students tap into a wide-ranging database; the Academy has logged
- 41,800 calls in two years, most of the 692 registered users are students.
- ________________________________________________
-
- // County Employees Warned //
-
- Fifty thousand dollars in calls to porn lines, and other 900 numbers were
- made on Nassau County, N.Y., phones since 1988, officials say. County employees
- were warned to stop unauthorized calls or face firing.
- ________________________________________________
-
- // Man STOPPED for Using Cellular Car Fone //
-
- Better think twice about using a car phone in Wilkes-Barre, Penn. Dave
- Davies got a $25 ticket for using his phone while driving. A police sergeant
- cited Davies for violating a law that says drivers cannot "operate a vehicle
- while wearing or using one or more headphones, earphones or any similar device
- which would impair the ability of the driver to hear traffic sounds."
- ________________________________________________
-
- // BELL Atlantic Files Request //
-
- Bell Atlantic of Arlington, Va., Thursday filed a request with the Justice
- Department for permission to offer improved videotex gateway service. The
- relief sought by Bell Atlantic would make its Gateway service easier for
- consumers to use. Bell Atlantic Gateway service allows people with computers to
- reach electronic services such as home shopping, dining and travel guides, and
- medical news.
- ________________________________________________
-
- // More Hotels Offer Voice Mail //
-
- Hotels are turning to high technology to improve a basic but critical
- service: Taking guests' telephone messages. Instead of relying solely on human
- operators, more hotels are installing voice-mail systems. All 65 Westin Hotels
- will have voice-mail systems by the end of the year. Homewood Suites and
- several Sheraton hotels already use voice mail.
- ________________________________________________
-
- // Callers can be Tracked ! //
-
- Callers to 900 numbers for all types of services are not faceless customers.
- Through a sophisticated tracking system (CLID), the 900 line providers can
- cross-check names, phone numbers, addresses and zip codes, said Scott Roberts,
- president of Digital Corrections Corp., the Riviera Beach, Fla., firm that
- provides 900 lines to various 1-900 retailers.
-
- ____________________________________________________________________________
- ___________________________________________________________________________
-
- ::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
-
- What "Vocab. Tonic" is, is a list of acronyms and definitions to help
- educate the ignorant hacker. With an extensive vocabulary, there is virtually
- nothing one can't learn. Study on...
-
- BNU - Basic Networking Utilities. System V.3's uucp package.
-
- LAN - Local Area Network.
- NETWORK - A group of machines set up to exchange information and/or
- resources.
-
- node - A terminating machine on a network.
- package.
-
- CON - Control Functions (Sys Admin payroll/timesheet functions)
-
- ACT - Field Activity (Handles field activities)
-
- BIL - Bill Paying (Processing purchase orders, producing expense
- accounts.)
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
-
- "Lighting Strikes When & Where You Least Expect
- ... It, Protect Thy God MODEM"
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- and any other information on Chaotic Paradise Bulletin Board
- Systems.
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- C H A O T I C P A R A D I S E
- 6 1 2 - 5 3 5 - 8 1 0 6
-
- - The Syndicate Report Support -
- - Bulletin Board System -
- - Accommodating 14.4k bps, Over 300+ Megs, P/H Msg Bases, & Files --
- ...and the official Pirates With Attitudes (PWA) system -
-
- (PWA is not affiliated with TSR in anyway)
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- This concludes this Transmittal No. 28
- (Part 1 of 2)
-
- Released September 5th, 1990
-
- by The Sensei
- Editor of The Syndicate Report
- ____________________________________________________________________________
- ____________________________________________________________________________
-
-